text
stringlengths 192
1.05M
|
|---|
Archive for Caffeine
Browser-to-browser websocket tunnels with Caffeine and livecoded NodeJS
Posted in Appsterdam, consulting, Context, Smalltalk, SqueakJS with tags , , , , , , , , on 4 July 2017 by Craig Latta
network
In our previous look at livecoding NodeJS from Caffeine, we implemented tweetcoding. Now let’s try another exercise, creating WebSockets that tunnel between web browsers. This gives us a very simple version of peer-to-peer networking, similar to WebRTC.
Once again we’ll start with Caffeine running in a web browser, and a NodeJS server running the node-livecode package. Our approach will be to use the NodeJS server as a relay. Web browsers that want to establish a publicly-available server can register there, and browser that want to use such a server can connect there. We’ll implement the following node-livecode instructions:
• initialize, to initialize the structures we’ll need for the other instructions
• create server credential, which creates a credential that a server browser can use to register a WebSocket as a server
• install server, which registers a WebSocket as a server
• connect to server, which a client browser can use to connect to a registered server
• forward to client, which forwards data from a server to a client
• forward to server, which forwards data from a client to a server
In Smalltalk, we’ll make a subclass of NodeJSLivecodingClient called NodeJSTunnelingClient, and give it an overriding implementation of configureServerAt:withCredential:, for injecting new instructions into our NodeJS server:
configureServerAt: url withCredential: credential
"Add JavaScript functions as protocol instructions to the
node-livecoding server at url, using the given credential."
^(super configureServerAt: url withCredential: credential)
addInstruction: 'initialize'
from: '
function () {
global.servers = []
global.clients = []
global.serverCredentials = []
global.delimiter = ''', Delimiter, '''
return ''initialized tunnel relay''}';
invoke: 'initialize';
addInstruction: 'create server credential'
from: '
function () {
var credential = Math.floor(Math.random() * 10000)
serverCredentials.push(credential)
this.send((serverCredentials.length - 1) + '' '' + credential)
return ''created server credential''}';
addInstruction: 'install server'
from: '
function (serverID, credential) {
if (serverCredentials[serverID] == credential) {
servers[serverID] = this
this.send(''1'')
return ''installed server''}
else {
debugger;
this.send(''0'')
return ''bad credential''}}';
addInstruction: 'connect to server'
from: '
function (serverID, port, req) {
if (servers[serverID]) {
clients.push(this)
servers[serverID].send(''connected:atPort:for: '' + (clients.length - 1) + delimiter + port + delimiter + req.connection.remoteAddress.toString())
this.send(''1'')
return ''connected client''}
else {
this.send(''0'')
return ''server not connected''}}';
addInstruction: 'forward to client'
from: '
function (channel, data) {
if (clients[channel]) {
clients[channel].send(''from:data: '' + servers.indexOf(this) + delimiter + data)
this.send(''1'')
return ''sent data to client''}
else {
this.send(''0'')
return ''no such client channel''}}';
addInstruction: 'forward to server'
from: '
function (channel, data) {
if (servers[channel]) {
servers[channel].send(''from:data: '' + clients.indexOf(this) + delimiter + data)
this.send(''1'')
return (''sent data to server'')}
else {
this.send(''0'')
return ''no such server channel''}}'
We’ll send that message immediately, configuring our NodeJS server:
NodeJSTunnelingClient
configureServerAt: 'wss://yourserver:8087'
withCredential: 'shared secret';
closeConfigurator
On the NodeJS console, we see the following messages:
server: received command 'add instruction'
server: adding instruction 'initialize'
server: received command 'initialize'
server: evaluating added instruction 'initialize'
server: initialized tunnel relay
server: received command 'add instruction'
server: adding instruction 'create server credential'
server: received command 'add instruction'
server: adding instruction 'install server'
server: received command 'add instruction'
server: adding instruction 'connect to server'
server: received command 'add instruction'
server: adding instruction 'forward to client'
server: received command 'add instruction'
server: adding instruction 'forward to server'
Now our NodeJS server is a tunneling relay, and we can connect servers and clients through it. We’ll make a new ForwardingWebSocket class hierarchy:
Object
ForwardingWebSocket
ForwardingClientWebSocket
ForwardingServerWebSocket
Instances of ForwardingClientWebSocket and ForwardingServerWebSocket use a NodeJSTunnelingClient to invoke our tunneling instructions.
We create a new ForwardingServerWebSocket with newThrough:, which requests new server credentials from the tunneling relay, and uses them to install a new server. Another new class, PeerToPeerWebSocket, provides the public message interface for the framework. There are two instantiation messages:
• toPort:atServerWithID:throughURL: creates an outgoing client that uses a ForwardingClientWebSocket to connect to a server and exchange data
• throughChannel:of: creates an incoming client that uses a ForwardingServerWebSocket to exchange data with a remote outgoing client.
Incoming clients are used by ForwardingServerWebSockets to represent their incoming connections. Each ForwardingServerWebSocket can provide services over a range of ports, as a normal IP server would. To connect, a client needs the websocket URL of the tunneling relay, a port, and the server ID assigned by the relay.
As usual, you can examine and try out this code by clearing your browser’s caches for caffeine.js.org (including IndexedDB), and visiting https://caffeine.js.org/. With browsers able to communicate directly, there are many interesting things we can build, including games, chat applications, and team development tools. What would you like to build?
retrofitting Squeak Morphic for the web
Posted in Appsterdam, consulting, Context, Smalltalk, Spoon, SqueakJS with tags , , , , , , , , on 30 June 2017 by Craig Latta
Google ChromeScreenSnapz022
Last time, we explored a way to improve SqueakJS UI responsiveness by replacing Squeak Morphic entirely, with morphic.js. Now let’s look at a technique that reuses all the Squeak Morphic code we already have.
many worlds, many canvases
Traditionally, Squeak Morphic has a single “world” where morphs draw themselves. To be a coherent GUI, Morphic must provide all the top-level effects we’ve come to expect, like dragging windows and redrawing them in their new positions, and redrawing occluded windows when they are brought to the top. Today, this comes at an acceptable but noticeable cost. Until WebAssembly changes the equation again, we want to do all we can to shift UI work from Squeak Morphic to the HTML5 environment hosting it. This will also make the experience of using SqueakJS components more consistent with that of the other elements on the page.
Just as we created an HTML5 canvas for morphic.js to use in the last post, we can do so for individual morphs. This means we’ll need a new Canvas subclass, called HTML5FormCanvas:
Object
...
Canvas
FormCanvas
HTML5FormCanvas
An HTML5FormCanvas draws onto a Form, as instances of its parent class do, but instead of flushing damage rectangle from the Form onto the Display, it flushes them to an HTML5 canvas. This is enabled by a primitive I added to the SqueakJS virtual machine, which reuses the normal canvas drawing code path.
Accompanying HTML5FormCanvas are new subclasses of PasteUpMorph and WorldState:
Object
Morph
...
PasteUpMorph
HTML5PasteUpMorph
Object
WorldState
HTML5WorldState
HTML5PasteUpMorph provides a message interface for other Smalltalk objects to create HTML5 worlds, and access the HMTL5FormCanvas of each world and the underlying HTML5 canvas DOM element. An HTML5WorldState works on behalf of an HTML5PasteUpMorph, to establish event handlers for the HTML5 canvas (such as for keyboard and mouse events).
HTML5 Morphic in action
You don’t need to know all of that just to create an HTML5 Morphic world. You only need to know about HTML5PasteUpMorph. In particular, (HTML5PasteUpMorph class)>>newWorld. All of the traditional Squeak Morphic tools can use HTML5PasteUpMorph as a drop-in replacement for the usual PasteUpMorph class.
There are two examples of single-window Morphic worlds in the current Caffeine release, for a workspace and classes browser. I consider these two tools to be the “hello world” exercise for UI framework experimentation, since you can use them to implement all the other tools.
We get an immediate benefit from the web browser handling window movement and clipping for us, with opaque window moves rendering at 60+ frames per second. We can also interleave Squeak Morphic windows with other DOM elements on the page, which enables a more natural workflow when creating hybrid webpages. We can also style our Squeak Morphic windows with CSS, as we would any other DOM element, since as far as the web browser is concerned they are just HTML5 canvases. This makes effects like the rounded corners and window buttons trays that Caffeine uses very easy.
Now, we have flexible access to the traditional Morphic tools while we progress with adapting them to new worlds like morphic.js. What shall we build next?
Pharo comes to Caffeine and SqueakJS
Posted in Appsterdam, consulting, Context, GLASS, Naiad, Seaside, Smalltalk, Spoon, SqueakJS with tags , , , , , , , , , on 29 June 2017 by Craig Latta
Google ChromeScreenSnapz025
The Caffeine web livecoding project has added Pharo to the list of Smalltalk distributions it runs with SqueakJS. Bert Freudenberg and I spent some time getting SqueakJS to run Pharo at ESUG 2016 in Prague last summer, and it mostly worked. I think Bert got a lot further since then, because now there are just a few Pharo primitives that need implementing. All I’ve had to do so far this time is a minor fix to the input event loop and add the JavaScript bridge. The bridge now works from Pharo, and it’s the first time I’ve seen that.
Next steps include getting the Tether remote messaging protocol and Snowglobe app streaming working between Pharo and Squeak, all running in SqueakJS. Of course, I’d like to see fluid code-sharing of all kinds between Squeak, Pharo, and all the other Smalltalk implementations.
So, let the bugfixing begin! :) You can run it at https://caffeine.js.org/pharo/. Please do get in touch if you find and fix things. Thanks!
a faster Morphic with morphic.js
Posted in Appsterdam, consulting, Context, Naiad, Smalltalk, Spoon, SqueakJS with tags , , , , , , , , , , on 28 June 2017 by Craig Latta
Google ChromeScreenSnapz017
Caffeine is powered by SqueakJS. The performance of SqueakJS is amazingly good, thanks in large part to its dynamic translation of Smalltalk compiled methods to JavaScript functions (which are in turn translated to machine code by your web browser’s JS engine). In the HTML5 environment where SqueakJS finds itself, there are several other tactics we can use to further improve user interface performance.
Delegate!
In a useful twist of fate, SqueakJS emerges into a GUI ecosystem descended from Smalltalk, now brimming with JavaScript frameworks to which SqueakJS can delegate much of its work. To make Caffeine an attractive environment for live exploration, I’m addressing each distraction I see.
The most prominent one is user interface responsiveness. SqueakJS is quite usable, even with large object memories, but its Morphic UI hasn’t reached the level of snappiness that we expect from today’s web apps. Squeak is a virtual machine, cranking away to support what is essentially an entire operating system, with a process scheduler, window system, compiler, and many other facilities. Since, with SqueakJS, that OS has access to a multitude of similar behavior in the JavaScript world, we should take advantage.
Of course, the UI design goals of the web are different than those of other operating systems. Today’s web apps are still firmly rooted in the web’s original “page” metaphor. “Single Page Applications” that scroll down for meters are the norm. While there are many frameworks for building SPAs, support for open-ended GUIs is uncommon. There are a few, though; one very good one is morphic.js.
morphic.js
Morphic.js is the work of Jens Mönig, and part of the Snap! project at UC Berkeley, a Scratch-like environment which teaches advanced computer science concepts. It’s a standalone JavaScript implementation of the Morphic UI framework. By using morphic.js, Squeak can save its cycles for other things, interacting with it only when necessary.
To use morphic.js in Caffeine, we need to give morphic.js an HTML5 canvas for drawing. The Webpage class can create new DOM elements, and use jQuery UI to give them effects like dragging and rotation. With one line we create a draggable canvas with window decorations:
canvas := Webpage createWindowOfKind: 'MorphicJS'
Now, after loading morphic.js, we can create a morphic.js WorldMorph object that uses the canvas:
world := (JS top at: #WorldMorph) newWithParameters: {canvas. false}
Finally, we need to create a rendering loop that regularly gets the world to draw itself on the canvas:
(JS top)
at: #world
put: world;
at: #morphicJSRenderingLoop
put: (
(JS Function) new: '
requestAnimationFrame(morphicJSRenderingLoop)
world.doOneCycle()').
JS top morphicJSRenderingLoop
Now we have an empty morphic.js world to play with. The first thing to know about morphic.js is that you can get a world menu by control-clicking:
Google ChromeScreenSnapz018
Things are a lot more interesting if you choose development mode:
Google ChromeScreenSnapz019.png
Take some time to play around with the world menu, creating some morphs and modifying them. Note that you can also control-click on morphs to get morph-specific menus, and that you can inspect any morph.
Google ChromeScreenSnapz020.png
Also notice that this user interface is noticeably snappier than the current SqueakJS Morphic. MorphicJS isn’t trying to do all of the OS-level stuff that Squeak does, it’s just animating morphs, using a rendering loop that is runs as machine code in your web browser’s JavaScript engine.
Smalltalk tools in another world, with Hex
The inspector gives us an example of a useful morphic.js tool. Since we can pass Smalltalk blocks to JavaScript as callback functions, we have two-way communication between Smalltalk and JavaScript, and we can build morphic.js tools that mimic the traditional Squeak tools.
I’ve built two such tools so far, a workspace and a classes browser. You can try them out with these expressions:
HexMorphicJSWorkspace open.
HexMorphicJSClassesBrowser open
“Hex” refers to a user interface framework I wrote called Hex, which aggregates several JavaScript UI frameworks. HexMorphicJSWorkspace and HexMorphicJSClassesBrowser are subclasses of HexMorphicJSWindow. Each instance of every subclass of HexMorphicJSWindow can be used either as a standalone morphic.js window, or as a component in a more complex window. This is the case with these first two tools; a HexMorphicJSClassesBrowser uses a HexMorphicJSWorkspace as a pane for live code evaluation, and you can also use a HexMorphicJSWorkspace by itself as a workspace.
With a small amount of work, we get much snappier versions of the traditional Smalltalk tools. When using them, SqueakJS only has to do work when the tools request information from them. For example, when a workspace wants to print the result of evaluating some Smalltalk code, it asks SqueakJS to compile and evaluate it.
coming up…
It would be a shame not to reuse all the UI construction effort that went into the original Squeak Morphic tools, though. What if we were to put each Morphic window onto its own canvas, so that SqueakJS didn’t have to support moving windows, clipping and so on? Perhaps just doing that would yield a performance improvement. I’ll write about that next time.
%d bloggers like this:
|
Вопросы с тегом 'utawarerumono'
я редактировал ответ, чтобы включить это Проверь свои источники программного обеспечения, убедитесь, что вы получаете обновления с главного сервера. У меня были проблемы в прошлом, со странными ошибкам ...
15
Рекомендации для Программа веса для поддержки конкуренции боевых искусств
Я хотел установить VirtualBox 4.1 на удаленный сервер Ubuntu. Мне нужен только интерфейс командной строки для VirtualBox, мне не нужен этот пакет графического интерфейса. apt-получить установку в VirtualBox-4.1 приносит собой половину KDE, которые мне не нужны (а это занимает не менее 600 МБ). Можно ли установить VirtualBox без своего интерфейса? Я использую Убунту Люсид. ...
8 дек. 2021 г., 06:42:26
23
Каталогах /bin/ префикс, чтобы убить команду избавиться от сообщения об ошибке
После удаления "единство-линзы-магазин" остаются некоторые раздражают советы из Центра программного обеспечения. ...
11 дек. 2011 г., 17:28:09
24
Мой кот не хочет спать
Среды: ОС: Линукс Минт 19.2 Ноутбук: XPS13 9360 с последней версии BIOS Проблема: Я не могу понять почему, но если я закрываю либерал, мой ноутбук пойдет приостановить и возобновить, когда я либерал, он будет восстанавливаться. Вот это проблема, когда он оправится от приостановить, он автоматически отключается через несколько секунд. Это действительно странно :( Любой совет приветствуется! ...
13 дек. 2014 г., 19:50:23
|
Your activity: 203 p.v.
your limit has been reached. plz Donate us to allow your ip full access, Email: [email protected]
Patient education: Screening for hearing loss in newborns (The Basics)
Patient education: Screening for hearing loss in newborns (The Basics)
Why does my newborn need to be screened for hearing loss? — Screening is important because the sooner you know your baby has a hearing problem, the sooner they can get help. This will make it less likely that the hearing loss will cause problems with learning to talk
How will my newborn be screened for hearing loss? — There are 2 different tests for hearing loss in newborns:
Auditory brainstem response – For this test, the doctor will put 3 small devices called electrodes on your baby: on the forehead, back of the neck, and behind the ear. The electrodes connect to a machine that measures how your baby's brain responds to a clicking sound.
Otoacoustic emissions – For this test, the doctor puts a small microphone into your baby's ear. The microphone makes sounds (clicks or a tone) and measures sound waves from the cochlea, the area inside the ear that allows you to hear (figure 1).
Both of these tests are painless and take between 5 to 15 minutes. If a test suggests that your newborn has hearing loss, they will get another test. Your baby might also need to be checked by an expert in hearing problems, called an "audiologist."
Are some newborns more likely to have hearing loss? — Yes. Newborns with certain conditions are more likely to have hearing loss. These conditions include:
Being in the "neonatal intensive care unit" (also called the "NICU") for more than 2 days. Newborns spend time in the NICU if they are born too early or have other health problems.
A family history of hearing loss in childhood or other conditions that cause hearing problems
An abnormal shape to 1 or both ears
Infections
A serious form of a condition called "jaundice" that causes yellow skin and other problems
More on this topic
Patient education: When a baby is born premature (The Basics)
Patient education: What to expect in the NICU (The Basics)
Patient education: Jaundice in babies (The Basics)
Patient education: Jaundice in newborn infants (Beyond the Basics)
This topic retrieved from UpToDate on: Mar 03, 2022.
This generalized information is a limited summary of diagnosis, treatment, and/or medication information. It is not meant to be comprehensive and should be used as a tool to help the user understand and/or assess potential diagnostic and treatment options. It does NOT include all information about conditions, treatments, medications, side effects, or risks that may apply to a specific patient. It is not intended to be medical advice or a substitute for the medical advice, diagnosis, or treatment of a health care provider based on the health care provider's examination and assessment of a patient's specific and unique circumstances. Patients must speak with a health care provider for complete information about their health, medical questions, and treatment options, including any risks or benefits regarding use of medications. This information does not endorse any treatments or medications as safe, effective, or approved for treating a specific patient. UpToDate, Inc. and its affiliates disclaim any warranty or liability relating to this information or the use thereof. The use of this information is governed by the Terms of Use, available at https://www.wolterskluwer.com/en/know/clinical-effectiveness-terms ©2022 UpToDate, Inc. and its affiliates and/or licensors. All rights reserved.
Topic 86382 Version 6.0
|
2024-08-01から1ヶ月間の記事一覧
【Rust】 Default トレイト
blog1.mammb.com Default トレイト std::default::Default トレイトの実装により、型に応じた自明なデフォルト値を提供できる。 std::default::Default トレイトは以下のような定義となっている。 pub trait Default: Sized { fn default() -> Self; } 例え…
【Rust】Drop トレイト
blog1.mammb.com Drop トレイト 値がスコープから外れたなどで、値が不要になった場合、Rustはその値に対してデストラクタを実行する。 デストラクタにより、メモリ/ファイルディスクリプタ/ネットワークソケットなどのリソースが解放される(その値の持つ全…
【Rust】Copy マーカートレイト
blog1.mammb.com Rust では、型に対する代入操作は移動となり、資源の所有権が移動する。 Copy 型は、代入操作時にコピーが行われる型を表すマーカートレイト std::marker::Copy を実装する。 pub trait Copy: Clone { // Empty. } Copy トレイトは Clone ト…
【Rust】Clone トレイト
std::clone::Cloneトレイト clone() メソッド clone_from() メソッド blog1.mammb.com std::clone::Cloneトレイト std::clone::Clone トレイトを実装した値は、自身のクローンをメモリ上に新たに作ることができる。 以下のような定義となっている。 pub trai…
Maven Central Repository 公開時の認証をユーザートークンに変更する手順
はじめに ユーザートークンの発行 ユーザートークンの設定 publish 実行 はじめに 2024年6月に Sonatype における認証システムが変更され、ユーザートークンでの認証が必要になったようです。 従来のユーザ名とパスワードで Publish しようとした場合、以下…
Rust のユーティリティトレイトまとめ
名前 説明 Sized コンパイル時にサイズが定まる型に対するマーカトレイト(詳細) Copy 値の置かれたメモリをバイト単位でコピーすることでクローン可能であることを示す マーカトレイト(詳細) Drop 値がドロップされる直前に自動的に実行されるコードを定義(…
|
Production of Oocytes from Human ES Cells
Funding Type:
SEED Grant
Grant Number:
RS1-00416
Award Value:
$385,466
Stem Cell Use:
Embryonic Stem Cell
Status:
Closed
Public Abstract:
The ability of human embryonic stem (hES) cells to form a wide variety of adult human cell types offers hope for development of novel therapies to treat human degenerative diseases such as Alzheimer’s, diabetes, and muscular dystrophy. However, to prevent rejection of the transplanted cells by a patient’s immune system it will be important to use hES cell derived tissues that are immunologically matched to the patient. One way to do this involves somatic cell nuclear transplantation (SCNT) where the nucleus containing the genetic information is transferred from a patient’s cell into a human oocyte (egg) from which the nucleus has been removed. The oocyte is then stimulated to divide into a small group of cells from which new hES cells are derived. As cells derived from these hES cells contain the patient’s DNA they will be immune-matched to the patient, thereby preventing tissue-rejection.While SCNT has been performed using cells and eggs from mice, it is not yet possible to do this on a routine basis using human cells and eggs. One reason for lack of progress concerns the scarce supply of human oocytes available for research. Oocytes are usually obtained from women undergoing hormonal treatment for infertility, when permission is given for unused and unwanted oocytes to be used for research. However, a severe shortage and great demand for such material has stimulated efforts to recruit suitable donors from the general public, often with financial incentive. There is significant health and ethical concern about such policies and the potential negative impacts of such procedures on long-term health of women are unclear.Remarkably, recent research with mice suggests that it may be possible to produce oocytes from hES cells. If so, the oocytes produced may be of use for SCNT to produce new lines of personalized-hES cells for treatment of patients. If successful, this would be expected to have at least two major benefits to the public. First, women would no longer be required as a source of eggs for research, which would reduce the risk of such treatments on women’s long-term health. Second, this would generate a theoretically infinite increase in the quantity of oocytes available for research, which would in increase the rate at which technical advances could be made in production of immune-matched hES via SCNT.Consequently, the proposed research will investigate methods for production of germ cells and oocytes from female hES cells. Specifically, we will test our prediction that it is possible to coax hES cells in culture to form germ cells and ultimately mature oocytes by exposing hES cells to different cell proteins and hormones that are normally used by the body to generate eggs. If successful, these protocols will help accelerate research on development of therapeutic cloning for a wide range of diseases. This would also obviate ethical concerns regarding egg-donation by women and would help protect women’s health.
Statement of Benefit to California:
The proposed research involves investigating how human embryonic stem (hES) cells form germ cells and oocytes, in a cell culture dish in the laboratory. The long-term goal of the research is to develop methods that enable production of such eggs in vitro. If successful, the research will benefit Californians in areas of healthcare and economy. Regarding healthcare, the ability to produce significant quantities of human oocytes in the laboratory will accelerate development of methods for reliable development of new hES cell lines from human oocytes following transfer of nuclei from a patient’s cell (i.e. therapeutic cloning). The ability to generate hES cells that are immunologically matched to a patient would also preclude the need for use of immunosuppressive drugs during treatment of patients with hES cell-derived material. Such drugs can have unwanted side effects on patients and could also have as yet unrecognized negative effects on ability of hES cell-derived tissues to engraft into a patient’s organs. Immunosuppressive therapy also increases the overall expense of treatment, due to the treatment itself as well as treating any side effects from its use.
Success of the proposed research would significantly reduce any requirement for donation of unused human oocytes. This would benefit California women by protecting them from undergoing unwanted and unnecessary hormonal stimulation for which the long-term health effects are currently unclear. If successful, the research could also have significant economic benefit to the State of California. First, successful development of this technology could be transferred to biomedical industry, and the potential worldwide market for such methods is considerable. This could stimulate employment in a variety of sectors as well as increasing state tax revenue. Equally important, a successful research outcome could also reduce the overall cost of healthcare to the State. It is anticipated that low-income individuals are more likely to be willing to donate eggs for research. While this may provide them with short term financial benefit, it is possible that such individuals could develop significant age-related health problems involving hormonal imbalance, such as infertility, polycystic ovarian syndrome, bone-loss, cognitive decline and obesity. In this event, the burden of providing healthcare to such individuals would likely fall to the State. Thus, reducing the incidence of egg-donation by in-state residents is likely to minimize any costs associated with treatment of such donors in the future.
Progress Report:
The original goal of this project was to generate oocytes (eggs) from human embryonic stem (hES) cells in cell culture dishes in the laboratory. Such oocytes could be of use as vehicles to reprogram the DNA from cells of patients with life-threatening or debilitating conditions, thereby allowing generation of new lines of hES cells that are immune matched to the patient. The paucity of donated human oocytes precludes research using such material, and production of human oocytes from hES cells in the laboratory would in theory provide a limitless source of material.
Since our last progress report another CIRM-funded group, Dr. Renee Reijo Pera’s lab at Stanford University, has published exciting results demonstrating successful production of primordial oocytes from mouse ES (mES) and human ES (hES) cells. Consequently, during the remaining period of the award we propose to use the Reijo Pera methods for production of female germ line cells in our lab using H9 and HUES-9 female hES cells. After accomplishing this, we will introduce human mtDNA containing mutations that cause either a severe or mild reduction in oxidative phosphorylation (energy) production into H9 and HUES-9 hES cells and investigate the impact of the different mtDNA mutations on the ability of hES cells to form cells with characteristics of PGCs, then primordial oocytes in vitro and in vivo. An important related goal of this research is to investigate whether development of oocytes from ES cells could be used as a method to remove deleterious mtDNA mutations from the hES cell population, thereby improving the utility and possibly safety of derived cell types for therapeutic purposes.
During this reporting period we have focused on our approved revised research plan. We continued our efforts to generate embryonic female germ cells from human embryonic stem (hES) cells in vitro using methods reported in the literature at the end of 2009. Our revised plan included the new goal of using in vitro developed female embryonic germ cells (oocytes) as a resource to investigate how mitochondrial genomic DNA containing deleterious mutations is segregated during female germ cell development. As well as providing novel information about the biology of germ cell development, this research may provide important information relevant to development of safe methods for therapeutic cloning. We began by using two different female hES cell lines (HUES-6 and H9) to investigate whether we could use the reported methods to develop female germ cells from hES in our lab. A third female hES cell line (HUES-9) we originally intended to use was found to have a high propensity to gain an extra chromosome (become aneuploid) and was therefore not used. Despite following the reported methods that demonstrated in vitro differentiation of hES cells into female germ cells, we were unable to reproduce the previously reported results in our own lab. The reasons for this are currently unclear but may involve subtle, but important, differences in the methodology or materials we used.
|
Visualize Google Directory Data in Sisense
Ready to get started?
Download for a free trial:
Download Now
Learn more:
Google Directory JDBC Driver
An easy-to-use database-like interface for Java based applications and reporting tools access to live Google Directory data (Domains, Groups, Users, Tokens, and more).
Create an ElastiCube in Sisense app with access to Google Directory data.
Sisense lets you join, analyze, and picture data to make more intelligent business decisions and craft effective strategies. The CData JDBC Driver for Google Directory makes it easy to integrate with Google Directory data in Sisense. This article shows how to create an ElastiCube that connects to Google Directory data and use the ElastiCube to visualize Google Directory data in Sisense.
Configure the Connection to Google Directory
Before creating the ElastiCube, note the installation location for the JAR file for the JDBC Driver (typically C:\Program Files\CDatat\CData JDBC Driver for Google Directory\lib) or copy the jar file (cdata.jdbc.googledirectory.GoogleDirectory.jar) to a new folder in the Sisense JDBC driver directory (typically C:\ProgramData\Sisense\DataConnectors\jdbcdrivers).
1. In the Data page of the Sisense application, create a new ElastiCube (or open an existing one).
2. In the Model Editor, click "+ Data" to open the Add Data dialog box.
3. Click Generic JDBC to open the JDBC settings.
4. Set the connection string property to the JDBC URL for Google Directory, adding required properties.
Google uses the OAuth authentication standard. You can authorize the data provider to access Google Spreadsheets as an individual user or with a Google Apps Domain service account. See the Getting Started section of the data provider help documentation for an authentication guide.
Built-in Connection String Designer
For assistance in constructing the JDBC URL, use the connection string designer built into the Google Directory JDBC Driver. Either double-click the JAR file or execute the jar file from the command-line.
java -jar cdata.jdbc.googledirectory.jar
Fill in the connection properties and copy the connection string to the clipboard.
When you configure the JDBC URL, you may also want to set the Max Rows connection property. This will limit the number of rows returned, which is especially helpful for improving performance when designing reports and visualizations.
A typical example follows:
jdbc:googledirectory:OAuthClientId=MyOAuthClientId;OAuthClientSecret=MyOAuthClientSecret;CallbackURL=http://localhost;InitiateOAuth=REFRESH
5. Set the JDBC JARs folder property to the location of the CData JDBC Driver JAR file (see above).
6. Set the driver's class name to the class name for the JDBC Driver: cdata.jdbc.googledirectory.GoogleDirectoryDriver
7. Leave the username and password properties blank.
8. Click Next.
Add Google Directory Data to an ElastiCube
Once you are connected to Google Directory, you can add tables and views to your ElastiCubes.
1. From the Tables list, select the tables and/or views you wish to work with.
2. (Optional) Click "+" to customize the data you want to import with SQL.
3. Click Done.
4. Click Build to build the ElastiCube for analytics.
Visualize Google Directory Data
With Google Directory tables added to your ElastiCube, you can perform analytics on your Google Directory data.
1. Navigate to the Analytics page of the Sisense application
2. Select a Dashboard (or create a new one)
3. Select your Data Source and click Create
4. Click "+ Select Data" and choose fields to add to your visualization.
With the CData JDBC Driver for Google Directory, you can access Google Directory data right in Sisense for powerful visualization and analytics. Download a free, 30-day trial and start working with Google Directory data in Sisense today!
|
Skip to Content
ticarcillin
Generic Name: ticarcillin (tye KAR sil in)
Brand Name: Ticar
What is ticarcillin?
Ticarcillin is an antibiotic in a group of drugs called penicillins. Ticarcillin fights bacteria in the body.
The combination of ticarcillin is used to treat many different infections caused by bacteria, such as urinary tract infections, bone and joint infections, severe vaginal infections, stomach infections, and skin infections.
Ticarcillin may also be used for purposes other than those listed in this medication guide.
What is the most important information I should know about ticarcillin?
Do not use this medication if you are allergic to ticarcillin or to any other penicillin antibiotic, such as amoxicillin (Amoxil, Augmentin), ampicillin (Omnipen, Principen), carbenicillin (Geocillin), dicloxacillin (Dycill, Dynapen), oxacillin (Bactocill), penicillin (Beepen-VK, Ledercillin VK, Pen-V, Pen-Vee K, Pfizerpen, V-Cillin K, Veetids), and others.
Slideshow: The Shocking Truth About Antibiotic Resistance
Before using ticarcillin tell your doctor if you are allergic to cephalosporins such as Ceclor, Ceftin, Duricef, Keflex, and others, or if you have kidney disease, a bleeding or blood clotting disorder, low levels of potassium in your blood, a history of any type of allergy, or if you are on a salt-restricted diet.
Use this medication for the entire length of time prescribed by your doctor. Your symptoms may get better before the infection is completely treated. Ticarcillin will not treat a viral infection such as the common cold or flu.
Ticarcillin can make birth control pills less effective. Use a second non-hormone method of birth control (such as a condom, diaphragm, spermicide) to prevent pregnancy while using ticarcillin.
What should I discuss with my healthcare provider before using ticarcillin?
Do not use this medication if you are allergic to ticarcillin or to any other penicillin antibiotic, such as:
• amoxicillin (Amoxil, Augmentin);
• ampicillin (Omnipen, Principen);
• carbenicillin (Geocillin);
• dicloxacillin (Dycill, Dynapen);
• oxacillin (Bactocill); or
• penicillin (Beepen-VK, Ledercillin VK, Pen-V, Pen-Vee K, Pfizerpen, V-Cillin K, Veetids, and others).
Before using ticarcillin, tell your doctor if you are allergic to any drugs (especially cephalosporins such as Ceclor, Ceftin, Duricef, Keflex, and others), or if you have:
• kidney disease;
• a bleeding or blood clotting disorder;
• an electrolyte imbalance such as low levels of potassium in your blood;
• a history of any type of allergy; or
• if you are on a salt-restricted diet.
If you have any of these conditions, you may not be able to use ticarcillin, or you may need a dosage adjustment or special tests during treatment.
FDA pregnancy category B. This medication is not expected to be harmful to an unborn baby. Tell your doctor if you are pregnant or plan to become pregnant during treatment.
Ticarcillin can make birth control pills less effective. Use a second non-hormone method of birth control (such as a condom, diaphragm, spermicide) to prevent pregnancy while using ticarcillin.
It is not known whether ticarcillin passes into breast milk or if it could harm a nursing baby. Do not use this medication without telling your doctor if you are breast-feeding a baby.
How should I use ticarcillin?
Use this medication exactly as it was prescribed for you. Do not use the medication in larger amounts, or use it for longer than recommended by your doctor. Follow the instructions on your prescription label.
Ticarcillin is given as an injection through a needle placed into a vein. Your doctor, nurse, or other healthcare provider will give you this injection. You may be given instructions on how to inject your medicine at home. Do not use this medicine at home if you do not fully understand how to give the injection and properly dispose of needles and other items used in giving the medicine.
Ticarcillin must be mixed with a liquid (diluent) before injecting it. Do not mix the medicine until you are ready to give yourself an injection.
Ticarcillin is usually given for 10 to 14 days, depending on the infection being treated. Follow your doctor's instructions.
Use each needle only one time. Throw away used needles and syringes in a puncture-proof container. If your medicine does not come with such a container, ask your pharmacist where you can get one. Keep this container out of the reach of children and pets. Your pharmacist can tell you how to properly dispose of the container.
Use this medication for the entire length of time prescribed by your doctor. Your symptoms may get better before the infection is completely treated. Ticarcillin will not treat a viral infection such as the common cold or flu.
Store unmixed ticarcillin, and the liquid diluent, at cool room temperature.
What happens if I miss a dose?
Use the missed dose as soon as you remember. If it is almost time for your next dose, skip the missed dose and use the medicine at the next regularly scheduled time. Do not use extra medicine to make up the missed dose.
What happens if I overdose?
Seek emergency medical attention if you think you have used too much of this medicine.
Symptoms of a ticarcillin overdose may include drowsiness, hyperactivity, or seizure (convulsions).
What should I avoid while using ticarcillin?
Antibiotic medicines can cause diarrhea, which may be a sign of a new infection. If you have diarrhea that is watery or has blood in it, call your doctor. Do not use any medicine to stop the diarrhea unless your doctor has told you to.
Ticarcillin side effects
Get emergency medical help if you have any of these signs of an allergic reaction: hives; difficulty breathing; swelling of your face, lips, tongue, or throat.
Call your doctor at once if you have any of these serious side effects:
• diarrhea that is watery or bloody;
• easy bruising or bleeding, unusual weakness;
• dry mouth, increased thirst, confusion, increased urination, muscle pain or weakness, fast heart rate, feeling light-headed, fainting;
• fever, chills, body aches, flu symptoms; or
• skin rash, bruising, severe tingling, numbness, pain, muscle weakness.
Less serious side effects may be more likely to occur, such as:
• mild diarrhea, gas, stomach pain;
• nausea or vomiting;
• headache;
• skin rash or itching;
• pain, swelling, or burning where the injection was given; or
• vaginal yeast infection (itching or discharge).
Side effects other than those listed here may also occur. Talk to your doctor about any side effect that seems unusual or that is especially bothersome. You may report side effects to FDA at 1-800-FDA-1088.
See also: Side effects (in more detail)
Ticarcillin dosing information
Usual Adult Dose for Febrile Neutropenia:
3 g IV every 4 hours. Therapy should be continued for approximately 14 days, or until more specific therapy may be substituted for a proven infection, or until the patient has been afebrile for 24 hours after the absolute neutrophil count has been greater than 500 cells/mm3.
Ticarcillin should be used in combination with another anti-infective agent, usually an aminoglycoside, for the empiric treatment of febrile patients.
Usual Adult Dose for Intraabdominal Infection:
3 g IV every 4 hours, for 7 to 14 days depending on the nature and severity of the infection.
Usual Adult Dose for Joint Infection:
3 g IV every 4 hours for up to 3 or 4 weeks, depending on the nature and severity of the infection. Longer therapy, sometimes up to 6 weeks, may be necessary for prosthetic joint infections.
Usual Adult Dose for Osteomyelitis:
3 g IV every 4 hours. Therapy should be continued for 4 to 6 weeks. Chronic osteomyelitis may require additional oral antimicrobial therapy, possibly up to 6 months.
Usual Adult Dose for Pelvic Inflammatory Disease:
3 g IV every 4 to 6 hours. Parenteral therapy should continue for 48 hours after clinical improvement is observed, at which time oral therapy may be initiated and continued for a total of 14 days of treatment.
If the patient is not pregnant, appropriate treatment for possible chlamydia infection should be initiated and any sexual partner(s) should be evaluated.
The Centers for Disease Control and Prevention currently recommend cefotetan or cefoxitin plus doxycycline, or clindamycin plus gentamicin for the treatment of pelvic inflammatory disease.
Usual Adult Dose for Peritonitis:
3 g IV every 4 hours. Ticarcillin is generally used as part of combination therapy when treating peritonitis. Therapy should be continued for approximately 10 to 14 days.
Intraperitoneal cefazolin plus ceftazidime are recommended for treatment of peritoneal dialysis-associated peritonitis.
Usual Adult Dose for Pneumonia:
3 g IV every 4 hours for 21 to 28 days, depending on the nature and severity of the infection.
Usual Adult Dose for Pyelonephritis:
3 g IV every 4 to 6 hours for 14 days, depending on the nature and severity of the infection.
Usual Adult Dose for Septicemia:
3 g IV every 4 hours for 14 days, depending on the nature and severity of the infection.
Usual Adult Dose for Skin or Soft Tissue Infection:
3 g IV every 4 hours for 7 to 10 days, or for 3 days after acute inflammation resolves, depending on the nature and severity of the infection.
Usual Adult Dose for Urinary Tract Infection:
Complicated: 3 g IV every 4 to 6 hours for 14 days, depending on the nature and severity of the infection.
Uncomplicated: 1 g IM or IV every 6 hours
Usual Pediatric Dose for Intraabdominal Infection:
Neonates:
< 7 days, birthweight < 2000 g: 75 mg/kg IV every 12 hours
< 7 days, birthweight > 2000 g: 75 mg/kg IV every 8 hours
> 7 days, birthweight < 1200 g: 75 mg/kg every 12 hours
> 7 days, birthweight < 2000 g: 75 mg/kg IV every 8 hours
> 7 days, birthweight > 2000 g: 75 mg/kg every 6 hours or 100 mg/kg IV every 8 hours
1 month to 12 years:
< 40 kg: 100 to 300 mg/kg/day IV in equally divided doses every 4 to 6 hours
> 40 kg: Adult dose
Usual Pediatric Dose for Pneumonia:
Neonates:
< 7 days, birthweight < 2000 g: 75 mg/kg IV every 12 hours
< 7 days, birthweight > 2000 g: 75 mg/kg IV every 8 hours
> 7 days, birthweight < 1200 g: 75 mg/kg every 12 hours
> 7 days, birthweight < 2000 g: 75 mg/kg IV every 8 hours
> 7 days, birthweight > 2000 g: 75 mg/kg every 6 hours or 100 mg/kg IV every 8 hours
1 month to 12 years:
< 40 kg: 100 to 300 mg/kg/day IV in equally divided doses every 4 to 6 hours
> 40 kg: Adult dose
Usual Pediatric Dose for Skin or Soft Tissue Infection:
Neonates:
< 7 days, birthweight < 2000 g: 75 mg/kg IV every 12 hours
< 7 days, birthweight > 2000 g: 75 mg/kg IV every 8 hours
> 7 days, birthweight < 1200 g: 75 mg/kg every 12 hours
> 7 days, birthweight < 2000 g: 75 mg/kg IV every 8 hours
> 7 days, birthweight > 2000 g: 75 mg/kg every 6 hours or 100 mg/kg IV every 8 hours
1 month to 12 years:
< 40 kg: 100 to 300 mg/kg/day IV in equally divided doses every 4 to 6 hours
> 40 kg: Adult dose
Usual Pediatric Dose for Septicemia:
Neonates:
< 7 days, birthweight < 2000 g: 75 mg/kg IV every 12 hours
< 7 days, birthweight > 2000 g: 75 mg/kg IV every 8 hours
> 7 days, birthweight < 1200 g: 75 mg/kg every 12 hours
> 7 days, birthweight < 2000 g: 75 mg/kg IV every 8 hours
> 7 days, birthweight > 2000 g: 75 mg/kg every 6 hours or 100 mg/kg IV every 8 hours
1 month to 12 years:
< 40 kg: 200 to 300 mg/kg/day IV in equally divided doses every 4 to 6 hours
> 40 kg: Adult dose
Usual Pediatric Dose for Urinary Tract Infection:
Uncomplicated infections:
1 month to 12 years:
< 40 kg: 50 to 100 mg/kg/day IV or IM in equally divided doses every 6 to 8 hours.
> 40 kg: Adult dose.
Complicated infections:
1 month to 12 years:
< 40 kg: 150 to 200 mg/kg/day IV in equally divided doses every 4 to 6 hours.
> 40 kg: Adult dose.
What other drugs will affect ticarcillin?
There may be other drugs that can affect ticarcillin. Tell your doctor about all the prescription and over-the-counter medications you use. This includes vitamins, minerals, herbal products, and drugs prescribed by other doctors. Do not start using a new medication without telling your doctor.
Where can I get more information?
• Your doctor or pharmacist has information about ticarcillin written for health professionals that you may read.
• Remember, keep this and all other medicines out of the reach of children, never share your medicines with others, and use this medication only for the indication prescribed.
• Disclaimer: Every effort has been made to ensure that the information provided by Cerner Multum, Inc. ('Multum') is accurate, up-to-date, and complete, but no guarantee is made to that effect. Drug information contained herein may be time sensitive. Multum information has been compiled for use by healthcare practitioners and consumers in the United States and therefore Multum does not warrant that uses outside of the United States are appropriate, unless specifically indicated otherwise. Multum's drug information does not endorse drugs, diagnose patients or recommend therapy. Multum's drug information is an informational resource designed to assist licensed healthcare practitioners in caring for their patients and/or to serve consumers viewing this service as a supplement to, and not a substitute for, the expertise, skill, knowledge and judgment of healthcare practitioners. The absence of a warning for a given drug or drug combination in no way should be construed to indicate that the drug or drug combination is safe, effective or appropriate for any given patient. Multum does not assume any responsibility for any aspect of healthcare administered with the aid of information Multum provides. The information contained herein is not intended to cover all possible uses, directions, precautions, warnings, drug interactions, allergic reactions, or adverse effects. If you have questions about the drugs you are taking, check with your doctor, nurse or pharmacist.
Copyright 1996-2012 Cerner Multum, Inc. Version: 1.05. Revision Date: 2010-12-15, 5:01:39 PM.
(web1)
|
What’s a Hemi?
What’s a Hemi?
My very first car as a kid in England was a 1946 Riley RME. I thought it was cool because it had a chrome grille like a ’34 Ford and it had a race-developed, twin-cam HEMI—whatever that was. Back then, there was no internet to look things up but a trip to the library revealed that the word HEMI was an abbreviation for hemispherical combustion chambers—whatever that was.
Combustion Chambers
Photo Credit: Tony Thacker
Believe it or not, HEMI-heads are nothing new and their history can be traced back to the early 1900s when they could be found in a number of European cars including the 1904 Welch Tourist, the Belgian Pipe of 1905, the 1907 Italian Fiat Grand Prix car, the French Grand Prix Peugeot of 1912 and the Italian Grand Prix Alfa Romeo of 1914—race-bred alright. However, it was the Welch design that became the blueprint for the many successors that included numerous motorcycle engines.
Chrysler HEMI
Photo Credit: Tony Thacker
Where the HEMI-head differs from other cylinder head designs such as the “flathead” Ford which is known as an “L” head design, is that their combustion chambers are hemispherical or half-bowl-shaped compared to most chambers that resemble a flattened, double egg. The chamber operates in a cross-flow configuration where the air-fuel mixture flows in one side; the more-or-less centrally located spark plug ignites the mixture and the exhaust gases exit on the opposite side from the inlet.
HEMI in a Dragster
Photo Credit: Tony Thacker
The use of a HEMI-head became prevalent in motorcycle engines because not only was it efficient, but it was not an overly complicated assembly in a single-cylinder application where the pushrods ran up the outside of the cylinder. Incidentally, a HEMI-head can be used with a pushrod, SOHC or DOHC valve train.
Believe it or not, HEMI-heads are nothing new and their history can be traced back to the early 1900s when they could be found in a number of European cars…
The concept even worked well in early air-cooled, radial airplane engines that are more-or-less a number of single cylinders arranged in a circle around a common crankshaft. In fact, by 1921 the U.S. Navy had announced it would only order aircraft fitted with air-cooled radials.
HEMI in a street rod
Photo Credit: Tony Thacker
Obviously, World War II propelled engineering development, as it did with much technology, as speed and power became all-important. Chrysler worked with Continental on the development of a giant, 1,792 cubic-inch (ci) V-12 that would be used in the Patton tank. It produced 810 horsepower and 1,560 pounds-feet (lb-ft) of torque and enabled Chrysler’s engineers to gather some valuable information that they put to good use in their post-War automobiles.
HEMI 392
Photo Credit: Tom West
In 1947, Zora Arkus-Duntov, the so-called “Father of the Corvette”, was commissioned by Ford Motor Company to improve the output of their aging flathead V8s. Zora, his brother Yuri and designer George Kudasch developed an overhead valve conversion (OHV) for the Ford V-8 that featured hemispherical combustion chambers. Tagged the “ARDUN”, which was a contraction of ARkus-DUNtov, their OHV heads looked great and increased the power, however, they were somewhat temperamental.
Only about 200 sets were made in the U.S. before Duntov moved to the U.K. to work with Sydney Allard where a few more sets were made for Allard’s J2 sports car. For many years, ARDUN heads were a much sought after hot rod accessory until the mid-90s when Don Orosco began to reproduce them. He made about 30 sets before the tooling was sold to Don Ferguson whose family continues to produce the heads albeit updated with some modern technology along with a compatible cast-aluminum block. Companies such as H&H Flatheads are known for building complete ARDUN engines.
Hardun HEMI
Photo Credit: Tony Thacker
While the Duntovs were working on the OHV Ford, Chrysler engineers John Platner, a graduate of the Chrysler Institute of Engineering, and William Drinkard, manager of the Engine Development department, got to work in 1948 downsizing that tank engine for use in an automobile.
The engine was tough and you could throw all kinds of power-enhancing devices from blowers to nitro and it thrived on it.
What they came up with was a 90-degree, 330 ci, cast-iron V8 engine with HEMI-heads. Code-named A-182, the “HEMI” was not quite ready for production and a lot of valve train development still needed to be done along with some ignition and crankshaft work.
Installing a HEMI
Photo Credit: Tony Thacker
Nevertheless, Chrysler debuted the HEMI V-8 for the 1951 model year as standard in the Imperial and New Yorker models and optional in the Saratoga. Initially, the “Fire Power” capacity was 331 ci due to an “oversquare” 3.81-inch bore and 3.63-inch stroke. With a 7:1 compression ratio (cr), it produced 180 hp and 312 lb-ft of torque but weighed a whopping 745 pounds—one head alone weighed almost 120 pounds and you’d better be wearing a belt when you lift one.
Chrysler HEMI
Photo Credit: Tony Thacker
Chrysler’s DeSoto division came out with their 276-ci “Fire Dome” version in 1952 and Dodge followed suit with their 241 ci “Red Ram” in 1953. Although all three engines differed in detail, they shared the same basic architecture.
In 1955, Chrysler claimed a dual 4-barrel (bbl) Carter version the first production car to produce 300 hp. The displacement was increased in 1956 to 354 ci and the engine now produced as much as 355 hp and became the first American engine to produce 1 hp per cubic inch.
Rat Trap 201 HEMI
Photo Credit: Kleet Norris
Two years later, the infamous 392 version was introduced and it was almost square having a 4-inch bore and a 3.906-inch stroke. It had a taller ‘raised deck’ compared to previous engines; however, the heads were cast with wider ports so that earlier manifolds could be used with the new heads on the new block. The following year, a single carb version with 9.25:1 cr was rated at 345 hp while a dual-carb version offered 375 hp.
Chrysler 392 HEMI
Photo Credit: Tony Thacker
The 392 is significant because it became the drag racer’s engine of choice, especially in the fuel ranks: Top Fuel, Funny Car, and Fuel Altered. The engine was tough and you could throw all kinds of power-enhancing devices from blowers to nitro and it thrived on it.
By 1958, the 392 was producing 380 hp but had reached the end of its production life. It wasn’t until 1964 that Chrysler re-introduced the engine and officially called it a HEMI. Nicknamed the “elephant engine,” because of its size and weight, the new Gen II HEMI displaced 426 ci. Not initially available to the public, it was used in NASCAR in ’64 but not in ’65 because it was not available in a production car and therefore could not be raced.
In the shop
Photo Credit: Tony Thacker
Not to be outdone, Ford also introduced a 427-ci HEMI in 1964. Nicknamed the “Cammer” because it had a single overhead cam (SOHC), engineers had worked hard to design a symmetrical combustion chamber with the plug located for maximum efficiency only to discover that the plug didn’t care where it was. The plugs were then located near the top of the cylinder for easy access. NASCAR wasn’t at all happy about these “special” racing engines, however, the “SOHC” motor (pronounced “sock”) remains a “halo” engine for Ford.
Ford 427 SOHC
Photo Credit: Tony Thacker
Ford SOHC 427 HEMI closeup
Photo Credit: Tony Thacker
Chrysler fixed their NASCAR problem in 1966 by introducing the “street” HEMI with lower compression, a milder cam, cast instead of tube headers and two 4 bbl Carter AFB carbs. The Gen II HEMI was produced until 1971 and was rated at 425 hp at 5,000 rpm and 490 lb-ft of torque at 4,000 rpm.
Of course, this is only the American version of HEMI history. Across the pond, in the homeland of the HEMI, the Europeans never left the concept alone.
Incidentally, the 426 HEMI is a HEMI in name only. Rather than build the new 426 from the old architecture of the 392, Chrysler engineers chose to use the existing 440 Wedge-head big-block. That said, the 426 evidences many improvements over the Wedge and indeed the 392 and became the modern drag racer’s engine of choice and was known colloquially as the “late model” compared to the 392 “early model.”
As the factory HEMIs came to the end of their respective lives Ed Donovan of Donovan Engines introduced a cast-aluminum 417 ci aftermarket version in 1971 that was based on the 392. That was followed in 1974 by Keith Black’s 426 HEMI based on the factory 426. Versions up to 573 ci are now available as are heads and numerous other parts milled from billet aluminum from numerous aftermarket manufacturers such as Hot Hemi Heads.
In fact, we use a billet 417 ci Donovan block with billet heads from Hot Hemi Heads in Ron Hope’s Rat Trap AA/Fuel Altered that we race. With a billet BDS supercharger and 90-percent nitro, it produces some 3,000 hp. However, in current Top Fuel/Funny car racing they use architecturally similar 500 ci blocks milled from forged billet aluminum.
Engine between drag strip rounds
Photo Credit: Tony Thacker
Hot Heads engine shot
Photo Credit: Tony Thacker
These proprietary blocks are produced in-house by Don Schumacher Racing and John Force Racing but similar blocks that can withstand in excess of 10,000 hp are available from companies such as Brad Anderson and Alan Johnson Performance—all based on that Chrysler HEMI.
Billet HEMI
Photo Credit: Tony Thacker
Of course, this is only the American version of HEMI history. Across the pond, in the homeland of the HEMI, the Europeans never left the concept alone. For example, Daimler, using Triumph motorcycle architecture, developed two aluminum-headed HEMI engines of 2.5 and 4.5-liters.
Other British brands such as Aston Martin and Jaguar both employed hemispherical combustion chambers in the DOHC V-8s and straight 6s respectively. However, no doubt the most well-known use of their HEMI-head was by Porsche in many of their engines—particularly the flat-six boxer engines of the 1963-’99 911s.
Leave a Reply
Your email address will not be published. Required fields are marked *
|
Menu
Understand The Effect Of Sarms And Why Do You Wish to Take It.| provensarms.com | 2020
Published Date: November 10, 2021
girl, woman, fashion
This Is Everything You Need to Understand About SARMs
Key Takeaways
1. SARM means selective androgen receptor modulator, and it’s a type of drug that’s chemically comparable to anabolic steroids.
2. SARMs can increase muscle growth and weight loss like steroids, however to a lower degree.
3. SARMs likewise feature a number of the very same risks, disadvantages, and negative effects as steroids such as decreased natural testosterone production, increased loss of hair, and potentially an increased danger of cancer.
You’re watching your macros and calories.
You’re providing your exercises everything you’ve got.
You’re spending a small fortune on workout supplements.
And it’s all not enough. The needle simply isn’t moving as quickly as you desire.
Maybe you have actually thought about turning to steroids. You understand they work, however you also know about the negative effects and health risks, and you’re not all set to take that plunge (har har har).
And after that you stumble upon SARMs, and you can’t wonder however assist:
Are these the holy grail of bodybuilding supplements?
Can they truly help you gain muscle and lose fat almost as effectively as steroids, but without any of the downsides?
And they’re cheap and legal!?
It beggars belief.
That’s why many individuals are declaring that SARMs are the ultimate supplements for health-conscious bodybuilders, and why many athletes are singing their praises for efficiency enhancement and muscle-building purposes.
It certainly sounds too good to be real, but is it? What does the science state?
Well, in this post, we’re going to get to the bottom of all of it.
We’re going to look at what SARMs are, how they work, what research study says about how effective and safe they truly are.
What Are SARMs and How Do They Work?
SARM represents selective androgen receptor modulator, and it’s a type of drug that’s chemically comparable to anabolic steroids.
There are quite a few SARMs on the marketplace, and some are stronger and have a greater risk of negative effects than others.
Ivan Samkov
The more popular ones are …
1. MK-2866 or GTx-024 (Ostarine).
2. LGD-4033 (Ligandrol).
3. LGD-3303.
4. GSX-007 or S-4 (Andarine).
5. GW-501516 (Cardarine).
Why the strange alphanumeric names, you wonder?
Well, SARMs haven’t been authorized for medical usage, so pharmaceutical online marketers have not troubled naming them yet. Presently, they’re just sold as “research study chemicals” planned for scientific use, but more on that in a moment.
Now, to understand how these drugs work, we initially need to take a look at the physiology of hormones.
Hormonal agents are chemical messengers that your body utilizes to interact with cells.
You can think of them as outgoing mail which contains essential instructions, and when they reach the cells’ “mailboxes”– hormonal agent receptors– the commands are performed.
Androgens are hormones that produce masculinity (deeper voice, facial hair, more muscle and lower body fat levels, etc). The most well-known androgen is testosterone, but there are others.
Androgens exert their effects in the body in 3 main ways:
1. Binding to your cells’ androgen receptors.
2. Converting to the hormone dihydrotestosterone (DHT), which then binds to androgen receptors.
3. Transforming to the hormone estradiol (estrogen), which binds to a various type of receptor on cells (estrogen receptor).
Under regular situations, your body thoroughly regulates androgen production, counting on sensitive feedback systems to prevent imbalances.
When you present anabolic steroids into the body, however, your cells end up being flooded with androgens– many that all offered receptors become fully filled.
This sends an extremely effective message to all cells that are listening, consisting of muscle cells, which proliferate in action.
That sounds like great times to us weightlifters, but then there are the liabilities.
Research study reveals that some of the negative effects of steroid usage are reversible and some aren’t. Permanent damage is possible.
Reversible modifications consist of testicular atrophy (shrinking), acne, cysts, oily hair and skin, elevated blood pressure and “bad” cholesterol levels, increased aggression, and reduced sperm count.
Irreparable damage includes male-pattern baldness, heart dysfunction, liver illness, and gynecomastia (breast development).
Another significant downside to steroids is the risk of biological and psychological addiction.
One research study performed by scientists at Harvard Medical School discovered that 30% of steroid users developed a reliance syndrome, and if you talk to adequate truthful drug users, you’ll hear all about their addictive homes.
Now, for years, researchers have been attempting to develop steroids or steroid-like drugs that aren’t as damaging to people’s health and well-being, and supplement online marketers claim that SARMs are just that.
They’re non-steroidal drugs created to stimulate the androgen receptors in just muscle and bone cells, having little effect on the other cells in the body, and therefore the endocrine system as a whole.
In a sense, taking regular ol’ anabolic steroids is like carpet bombing your system with androgens. It gets the job done, but it’s careless and results in a lot of civilian casualties.
Taking SARMs, however, resembles drone striking just the asshole whistleblower journalists … er … I mean, bad guy terrorists.
Simply put, SARMs can tell your muscle cells to grow without all the noise and mess caused by anabolic steroids.
Technically speaking, SARMs achieve this in two ways:
1. They have a special affinity for certain tissues like muscle and bone, however not for others, like the liver, brain, and prostate.
2. They do not break down into unwanted particles that cause negative effects, like DHT and estrogen, as quickly.
This 2nd point is rather significant.
One key characteristic of SARMs is they’re not quickly transformed by an enzyme called 5-a reductase into DHT, a driver of numerous undesirable adverse effects of steroid use.
SARMs are likewise resistant to the enzyme aromatase, which converts testosterone into estrogen.
Because SARMs are less effective than routine steroids, they don’t suppress natural testosterone production as heavily, making them simpler to recuperate from.
SARMs are a synthetic drug that imitates a number of the impacts of testosterone in muscle and bone tissue, while (hopefully) having a very little effect on other organs. Hence, the theory is that you can have the benefits of steroids with none of the disadvantages.
Why Do Individuals Supplement With SARMs?
SARMs were initially established for individuals with diseases like muscle wasting, osteoporosis, anemia, and persistent fatigue.
They were meant to be a much healthier alternative to testosterone replacement therapy. Whether they’re going to meet that vision is yet to be identified.
Now, bodybuilders generally take SARMs for one of two factors:
1. To “get their feet wet” with anabolic substance abuse before going into conventional steroid cycles.
2. To increase the efficiency of steroid cycles without worsening adverse effects or health risks.
Since they help maintain lean mass however don’t seem to increase water retention, numerous bodybuilders likewise think that SARMs are specifically helpful for cutting.
How well do these drugs work?
Well, research study reveals that SARMs aren’t as powerful for muscle building as conventional steroids, however they’re definitely more efficient than anything natural you can take (like creatine).
They’re also popular amongst professional athletes because they’re more difficult to identify in drug screening.
Now, if whatever I have actually said so far has you wanting to go to Google, wallet in hand, not so quickly … we’re not done yet.
Are SARMs Safe?
Nonsteroidal SARMs have actually just been around for a couple of years and, unfortunately, are doing not have in human research.
We simply don’t understand sufficient about how they work and their prospective long-lasting side effects, which is a really genuine cause for issue.
In addition, because all SARMs offered online are technically black-market products, they’re exempt to any oversight whatsoever and quality assurance is often a concern. Mislabeling, contamination, and other shenanigans are common events.
Here’s what we do understand, though …
SARMs suppress your natural testosterone production.
Among the crucial selling points for a number of these drugs is the claim that they do not blunt your body’s production of testosterone.
This is a lie. They definitely do.
For instance, in one research study conducted by researchers at the behest of GTx, Inc., a pharmaceutical business that specializes in making SARMs, male subjects taking 3 mg of the SARM ostarine daily for 86 days experienced a 23% drop in totally free testosterone and 43% drop in total testosterone levels (throughout the trial).
As GTx, Inc. produces and sells SARMs, they had no reward to make the results look worse than they actually were. If anything, they were incentivized to do the opposite and underreport the unfavorable adverse effects (there’s no evidence this was done, however I’m simply making a point).
Comparable effects were seen in another study performed by scientists at Boston University with the SARM ligandrol. In this case, 76 guys aged 21 to 50 experienced a massive 55% drop in total testosterone levels after taking 1 mg of ligandrol per day for just 3 weeks. Disturbingly, it also took 5 weeks for their natural testosterone production to recuperate.
In fact, SARMs are being investigated as a male contraceptive due to the fact that they lower your levels of luteinizing hormone and follicle-stimulating hormonal agent, which decreases your sperm count and testosterone levels.
All this isn’t unexpected when you consider the basic physiology in play:
It acknowledges the spike and reacts by minimizing its own production of its own comparable hormonal agents when you introduce androgens into the body.
Regardless of what SARM hucksters declare, SARMs definitely due depress your natural testosterone production, and the more you take, the more your natural testosterone levels will drop.
The more SARMs you take, the more side effects you’ll experience.
SARMs aren’t entirely devoid of negative effects– they just tend to be very little at small dosages.
Bodybuilders do not typically take small dosages, however, and that’s why they often experience many of the negative effects related to steroid use, including acne and loss of hair.
This also applies to the suppression of testosterone you simply learnt more about. The more exogenous (stemming outside an organism) anabolic hormonal agents you present into your body, whether from SARMs or plain ol’ testosterone, the more your natural production will fall.
And according to a research study conducted by researchers at Copenhagen University, it’s possible that this decrease in natural testosterone production may continue for several years after you stop taking steroids (or SARMs).
On paper, SARMs appear to be simpler on the body than standard steroids, including testosterone. If you take enough to see considerable advantages, though, then opportunities are great you’ll also come across substantial side effects.
SARMs are probably easier to recover from than routine steroids.
We recall that they don’t convert into DHT or estrogen in the same way as steroids, which means they likewise do not affect your system as adversely.
SARMs also aren’t as anabolic as pure testosterone, which means they probably do not suppress natural testosterone as much, also (although there isn’t adequate research study offered to know for sure).
That stated, if you take enough to experience significant advantages, you’re most likely also taking enough to experience substantial negative results. That’s simply the nature of drugs– they cut both methods and you always need to weigh the excellent and the bad.
If you take sufficient SARMs to cause some of the more major side results such as hair loss, gynecomastia, and so on, they might be irreversible– just as with anabolic steroid use.
Anecdotally, many people do report recuperating from SARM use much faster than traditional steroid cycles. You have to take such stories with a grain of salt, though, as much of these individuals have also utilized significantly lower dosages of SARMs than they ever did of steroids, so it’s not a true apples-to-apples comparison.
Plus, as you’ll learn more about in a moment, it’s completely possible the stuff these people were taking wasn’t even SARMs.
The unfavorable effects of SARMs might be easier to recover from as soon as you stop taking them than conventional steroids, although this idea is largely based upon bodybuilder anecdotes rather than scientific research study.
SARMs might raise your risk of cancer.
Several big trials on the SARM cardarine needed to be canceled because it was causing cancerous developments in the intestinal tracts of mice.
You might have become aware of this, and that the doses utilized were much higher than us physical fitness folk would ever ingest, however that’s not true.
Rodents remove some drugs from their bodies much quicker than we do, so they have to get greater dosages to see the very same impacts.
In the event cited above, the mice were given 10 mg per kg of cardarine daily, which, when adjusted for a human metabolism, comes out to about 75 mg each day for a 200-pound male.
Poke around on bodybuilding online forums and you’ll quickly discover that many bodybuilders take substantially more than that.
Granted, you can’t extrapolate rodent research study to human beings (in spite of sharing ~ 98% of their DNA, we aren’t big mice), so it’s not clear if that drug or other SARMs in fact do increase our threat of developing cancer.
There’s also proof that SARMs might in fact prevent particular kinds of cancer, so we just do not know.
If you ask me, this is simply another reason why I think that SARMs are first and last a high-risk, low-reward proposition.
They’re billed as a less hazardous option to traditional steroids like testosterone, they’re likewise much less studied and comprehended, which is why many specialists believe SARMs are a riskier alternative. Better the devil you understand than the devil you do not.
There’s proof that SARMs might increase your danger of cancer and little understood about the security of these drugs in general. When you take them, you’re playing guinea pig and only time will inform what the results will be.
Numerous SARM products aren’t what they declare to be.
We recall that SARMs can only be lawfully sold as “research chemicals.”
In other words, the only individuals who are supposed to purchase SARMs are researchers seeking to learn more about how they really work and whether or not they have rewarding pharmaceutical uses.
Obviously, the vast bulk of SARMs you see for sale online never ever end up in a lab. Instead, they find their way into bodybuilders, professional athletes, and physical fitness buffs who want to get more jacked.
This opens the doors to all sort of skulduggery, including:
1. Infecting the drugs with harmful chemicals due to poor quality control or cutting corners during production.
2. Mixing them with weaker and in some cases harmful compounds to increase revenues.
3. Mislabeling them to increase earnings.
Damning evidence of this can be discovered in a study carried out by the United States Anti-Doping Firm (USADA) that involved buying 44 SARM products from 21 various online providers.
The researchers likewise took things a step further by asking all of the sellers to provide what’s called a “chain-of-custody” of the products, which determines whose hands the items passed through once they were produced (and hence who had the chance to damage them).
After evaluating the products, the researchers discovered that …
1. Only 52% of the products contained any traces of SARMs at all.
2. 25% of the products contained doses substantially lower than what was on the label.
3. 25% of the products consisted of no or just trace amounts of the SARM on the label, and instead contained unlabeled substances such as other SARMs and the estrogen blockers androstenetrione and tamoxifen.
The bottom line is the SARM market is a lawless free-for-all which most likely isn’t going to change anytime soon.
There’s presently no federal government company forcing SARMs producers to toe the line, and as the research study from USADA reveals, numerous producers are totally aware of this and are more interested in turning a profit than anything else.
A number of the products currently offered as SARMs either don’t include any SARMs or include other surprise chemicals and potentially hazardous substances.
The Bottom Line on SARMs
SARMs are drugs that provide some of the benefits of anabolic steroids with fewer of the short-term side-effects.
They aren’t as reliable as steroids, but they certainly do enhance muscle growth more than any natural supplement on the marketplace. They seem much safer, too, however don’t think that suggests they’re safe to take.
Research clearly reveals that they reduce natural testosterone production and negatively affect the endocrine system, and there’s evidence that they can increase the threat of cancer, too.
We have no concept if there are long-lasting health results of SARM usage, but provided the nature of the drugs, there likely are.
There’s likewise excellent proof that numerous of the items currently offered as SARMs do not actually include SARMs and may also contain other drugs, fillers, and damaging impurities.
So, if you want a cut-and-dried recommendation from me, it’s this:
Keep away from SARMs.
In my viewpoint, the risks far surpass the benefits, and they’re simply not required to construct a muscular, strong, and lean body that you can be pleased with.
If you liked this article, please share it on Facebook, Twitter, or wherever you like to hang out online!.
Scientific References
1. Van Wagoner RM, Eichner A, Bhasin S, Deuster PA, Eichner D. Chemical Structure and Identifying of Substances Marketed as Selective Androgen Receptor Modulators and Sold by means of the Internet. JAMA.
2. Girroir EE, Hollingshead HE, Billin AN, et al. Peroxisome proliferator-activated receptor-β/ δ (PPARβ/ δ) ligands prevent growth of UACC903 and MCF7 human cancer cell lines.
3. Tachibana K, Yamasaki D, Ishimoto K, Doi T. The role of PPARs in cancer. PPAR Res. 2008. doi:10.1155/ 2008/102737.
4. Gupta RA, Wang D, Katkuri S, Wang H, Dey SK, DuBois Registered Nurse. Activation of nuclear hormone receptor peroxisome proliferator-activated receptor-delta accelerates digestive tract adenoma growth. Nat Medication. 2004; 10( 3 ):245 -247. doi:10.1038/ nm993.
5. Rasmussen JJ, Selmer C, østergren PB, et al. Previous abusers of anabolic androgenic steroids display decreased testosterone levels and hypogonadal symptoms years after cessation: A case-control study.
6. Rahnema CD, Lipshultz LI, Crosnoe LE, Kovac JR, Kim ED. Anabolic steroid-induced hypogonadism: diagnosis and treatment. Fertil Steril. 2014; 101( 5 ):1271 -1279. doi:10.1016/ j.fertnstert.2014.02.002.
7. Chen J, Hwang DJ, Bohl CE, Miller DD, Dalton JT. A selective androgen receptor modulator for hormone male birth control. J Pharmacol Exp Ther. 2005; 312( 2 ):546 -553. doi:10.1124/ jpet.104.075424.
8. Basaria S, Collins L, Dillon EL, et al. The security, pharmacokinetics, and results of LGD-4033, an unique nonsteroidal oral, selective androgen receptor modulator, in healthy boys. J Gerontol A Biol Sci Med Sci. 2013; 68( 1 ):87 -95. doi:10.1093/ gerona/gls078.
9. Dalton JT, Barnette KG, Bohl CE, et al. The selective androgen receptor modulator GTx-024 (enobosarm) improves lean body mass and physical function in healthy postmenopausal women and elderly males: results of a double-blind, placebo-controlled stage II trial.
10. Androgenic-anabolic steroids and the Olympic Games. 2008; 10( 3 ):384 -390. 2009; 12( 3 ):232 -240.
11. Gao W, Dalton JT. Broadening the therapeutic use of androgens through selective androgen receptor modulators (SARMs).
12. Yin D, Gao W, Kearbey JD, et al. Pharmacodynamics of selective androgen receptor modulators. J Pharmacol Exp Ther. 2003; 304( 3):1334 -1340. doi:10.1124/ jpet.102.040840. Gao W, Dalton JT. Ockham’s Razor and Selective Androgen Receptor Modulators( SARMs): Are we overlooking the function of 5α-reductase? Mol Interv. 2007; 7( 1 ):10 -13. doi:10.1124/ mi.7.1.3. Gao W, Dalton JT. Expanding the therapeutic use of androgens by means of selective androgen receptor modulators( SARMs ). Drug Discov Today. 2007; 12( 5-6):241 -248. doi:10.1016/ j.drudis.2007.01.003. Kanayama G, Brower KJ, Wood RI, Hudson JI, Pope HG. Anabolic-androgenic steroid reliance: an emerging condition. Addiction. 2009; 104( 12 ):1966 -1978. doi:10.1111/ j.1360-0443.2009.02734. x. Research study links steroid abuse to key biological, mental attributes– Harvard Gazette. https://news.harvard.edu/gazette/story/2009/04/study-links-steroid-abuse-to-key-biological-psychological-characteristics/. Accessed October 6, 2019. Baggish AL, Weiner RB, Kanayama G, et al. Long-term anabolic-androgenic steroid usage is connected with left ventricular dysfunction. Circ Heart Fail. 2010; 3( 4 ):472 -476. doi:10.1161/ CIRCHEARTFAILURE.109.931063.
13. Hartgens F, Kuipers H. Results of androgenic-anabolic steroids in professional athletes. 2004; 34( 8 ):513 -554.
14. Br J Pharmacol. 2008; 154( 3 ):502 -521.
15. Van Wagoner RM, Eichner A, Bhasin S, Deuster PA, Eichner D. Chemical Structure and Labeling of Compounds Marketed as Selective Androgen Receptor Modulators and Offered through the Web. Tachibana K, Yamasaki D, Ishimoto K, Doi T. The selective androgen receptor modulator GTx-024 (enobosarm) enhances lean body mass and physical function in healthy postmenopausal females and senior men: outcomes of a double-blind, placebo-controlled phase II trial. Expanding the restorative use of androgens via selective androgen receptor modulators (SARMs). Broadening the therapeutic usage of androgens via selective androgen receptor modulators( SARMs ).
Related Articles:
Learn More (Proven SARMs):
Read More:
1. HealthLine (What Is SARMs)
2. WikiPedia
WE'RE LOYAL TO YOU,AND WE CAN BACK THAT UP.
SIGN UP FOR AN ACCOUNT
Every single batch is 3rd-party tested for purity because quality is our #1 concern.
Creat An Account
LIKE & SHARE OUR PAGE
LEAVE A PRODUCT REVIEW
Every single batch is 3rd-party tested for purity because quality is our #1 concern.
Shop Products
Latest Blog
October 10, 2021
Buy Sarms In Our Online Shop, Next Day Uk & Europe Shipment| provensarms.com
The Best SARMs in 2020: Is Taking SARMs for BodyBuilding Bad for You? Look: Ostarine MK-2866 Testolone RAD-140 Lingadrol LGD-4033 ...
read more +
September 20, 2021
Sarms Evaluation.
The Very Best SARMs in 2020: Is Taking SARMs for BodyBuilding Bad for You? Look: Ostarine MK-2866 Testolone RAD-140 Lingadrol LGD-40...
read more +
August 3, 2021
Everything You Required To Learn About Sarms.| provensarms.com
This Is Everything You Need to Learn About SARMs Key Takeaways SARM represents selective androgen receptor modulator, and it's a type of d...
read more +
August 23, 2021
Whatever You Required To Know About Sarms.
What Are SARMs: Are SARMs Safe and Should They Be Used in 2020? Have you been exercising for a while and following up with the correct diet pla...
read more +
Select your currency
GBP Pound sterling
EUR Euro
|
1 /*
2 * Copyright (c) 2003, 2023, Oracle and/or its affiliates. All rights reserved.
3 * Copyright (c) 2014, Red Hat Inc. All rights reserved.
4 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
5 *
6 * This code is free software; you can redistribute it and/or modify it
7 * under the terms of the GNU General Public License version 2 only, as
8 * published by the Free Software Foundation.
9 *
10 * This code is distributed in the hope that it will be useful, but WITHOUT
11 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
12 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
13 * version 2 for more details (a copy is included in the LICENSE file that
14 * accompanied this code).
15 *
16 * You should have received a copy of the GNU General Public License version
17 * 2 along with this work; if not, write to the Free Software Foundation,
18 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
19 *
20 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
21 * or visit www.oracle.com if you need additional information or have any
22 * questions.
23 *
24 */
25
26 #include "precompiled.hpp"
27 #include "asm/macroAssembler.inline.hpp"
28 #include "compiler/compilerDefinitions.inline.hpp"
29 #include "gc/shared/barrierSetAssembler.hpp"
30 #include "gc/shared/collectedHeap.hpp"
31 #include "gc/shared/tlab_globals.hpp"
32 #include "interpreter/interpreter.hpp"
33 #include "interpreter/interpreterRuntime.hpp"
34 #include "interpreter/interp_masm.hpp"
35 #include "interpreter/templateTable.hpp"
36 #include "memory/universe.hpp"
37 #include "oops/methodData.hpp"
38 #include "oops/method.inline.hpp"
39 #include "oops/objArrayKlass.hpp"
40 #include "oops/oop.inline.hpp"
41 #include "oops/resolvedFieldEntry.hpp"
42 #include "oops/resolvedIndyEntry.hpp"
43 #include "oops/resolvedMethodEntry.hpp"
44 #include "prims/jvmtiExport.hpp"
45 #include "prims/methodHandles.hpp"
46 #include "runtime/frame.inline.hpp"
47 #include "runtime/sharedRuntime.hpp"
48 #include "runtime/stubRoutines.hpp"
49 #include "runtime/synchronizer.hpp"
50 #include "utilities/powerOfTwo.hpp"
51
52 #define __ _masm->
53
54 // Address computation: local variables
55
56 static inline Address iaddress(int n) {
57 return Address(rlocals, Interpreter::local_offset_in_bytes(n));
58 }
59
60 static inline Address laddress(int n) {
61 return iaddress(n + 1);
62 }
63
64 static inline Address faddress(int n) {
65 return iaddress(n);
66 }
67
68 static inline Address daddress(int n) {
69 return laddress(n);
70 }
71
72 static inline Address aaddress(int n) {
73 return iaddress(n);
74 }
75
76 static inline Address iaddress(Register r) {
77 return Address(rlocals, r, Address::lsl(3));
78 }
79
80 static inline Address laddress(Register r, Register scratch,
81 InterpreterMacroAssembler* _masm) {
82 __ lea(scratch, Address(rlocals, r, Address::lsl(3)));
83 return Address(scratch, Interpreter::local_offset_in_bytes(1));
84 }
85
86 static inline Address faddress(Register r) {
87 return iaddress(r);
88 }
89
90 static inline Address daddress(Register r, Register scratch,
91 InterpreterMacroAssembler* _masm) {
92 return laddress(r, scratch, _masm);
93 }
94
95 static inline Address aaddress(Register r) {
96 return iaddress(r);
97 }
98
99 static inline Address at_rsp() {
100 return Address(esp, 0);
101 }
102
103 // At top of Java expression stack which may be different than esp(). It
104 // isn't for category 1 objects.
105 static inline Address at_tos () {
106 return Address(esp, Interpreter::expr_offset_in_bytes(0));
107 }
108
109 static inline Address at_tos_p1() {
110 return Address(esp, Interpreter::expr_offset_in_bytes(1));
111 }
112
113 static inline Address at_tos_p2() {
114 return Address(esp, Interpreter::expr_offset_in_bytes(2));
115 }
116
117 static inline Address at_tos_p3() {
118 return Address(esp, Interpreter::expr_offset_in_bytes(3));
119 }
120
121 static inline Address at_tos_p4() {
122 return Address(esp, Interpreter::expr_offset_in_bytes(4));
123 }
124
125 static inline Address at_tos_p5() {
126 return Address(esp, Interpreter::expr_offset_in_bytes(5));
127 }
128
129 // Condition conversion
130 static Assembler::Condition j_not(TemplateTable::Condition cc) {
131 switch (cc) {
132 case TemplateTable::equal : return Assembler::NE;
133 case TemplateTable::not_equal : return Assembler::EQ;
134 case TemplateTable::less : return Assembler::GE;
135 case TemplateTable::less_equal : return Assembler::GT;
136 case TemplateTable::greater : return Assembler::LE;
137 case TemplateTable::greater_equal: return Assembler::LT;
138 }
139 ShouldNotReachHere();
140 return Assembler::EQ;
141 }
142
143
144 // Miscellaneous helper routines
145 // Store an oop (or null) at the Address described by obj.
146 // If val == noreg this means store a null
147 static void do_oop_store(InterpreterMacroAssembler* _masm,
148 Address dst,
149 Register val,
150 DecoratorSet decorators) {
151 assert(val == noreg || val == r0, "parameter is just for looks");
152 __ store_heap_oop(dst, val, r10, r11, r3, decorators);
153 }
154
155 static void do_oop_load(InterpreterMacroAssembler* _masm,
156 Address src,
157 Register dst,
158 DecoratorSet decorators) {
159 __ load_heap_oop(dst, src, r10, r11, decorators);
160 }
161
162 Address TemplateTable::at_bcp(int offset) {
163 assert(_desc->uses_bcp(), "inconsistent uses_bcp information");
164 return Address(rbcp, offset);
165 }
166
167 void TemplateTable::patch_bytecode(Bytecodes::Code bc, Register bc_reg,
168 Register temp_reg, bool load_bc_into_bc_reg/*=true*/,
169 int byte_no)
170 {
171 if (!RewriteBytecodes) return;
172 Label L_patch_done;
173
174 switch (bc) {
175 case Bytecodes::_fast_aputfield:
176 case Bytecodes::_fast_bputfield:
177 case Bytecodes::_fast_zputfield:
178 case Bytecodes::_fast_cputfield:
179 case Bytecodes::_fast_dputfield:
180 case Bytecodes::_fast_fputfield:
181 case Bytecodes::_fast_iputfield:
182 case Bytecodes::_fast_lputfield:
183 case Bytecodes::_fast_sputfield:
184 {
185 // We skip bytecode quickening for putfield instructions when
186 // the put_code written to the constant pool cache is zero.
187 // This is required so that every execution of this instruction
188 // calls out to InterpreterRuntime::resolve_get_put to do
189 // additional, required work.
190 assert(byte_no == f1_byte || byte_no == f2_byte, "byte_no out of range");
191 assert(load_bc_into_bc_reg, "we use bc_reg as temp");
192 __ load_field_entry(temp_reg, bc_reg);
193 if (byte_no == f1_byte) {
194 __ lea(temp_reg, Address(temp_reg, in_bytes(ResolvedFieldEntry::get_code_offset())));
195 } else {
196 __ lea(temp_reg, Address(temp_reg, in_bytes(ResolvedFieldEntry::put_code_offset())));
197 }
198 // Load-acquire the bytecode to match store-release in ResolvedFieldEntry::fill_in()
199 __ ldarb(temp_reg, temp_reg);
200 __ movw(bc_reg, bc);
201 __ cbzw(temp_reg, L_patch_done); // don't patch
202 }
203 break;
204 default:
205 assert(byte_no == -1, "sanity");
206 // the pair bytecodes have already done the load.
207 if (load_bc_into_bc_reg) {
208 __ movw(bc_reg, bc);
209 }
210 }
211
212 if (JvmtiExport::can_post_breakpoint()) {
213 Label L_fast_patch;
214 // if a breakpoint is present we can't rewrite the stream directly
215 __ load_unsigned_byte(temp_reg, at_bcp(0));
216 __ cmpw(temp_reg, Bytecodes::_breakpoint);
217 __ br(Assembler::NE, L_fast_patch);
218 // Let breakpoint table handling rewrite to quicker bytecode
219 __ call_VM(noreg, CAST_FROM_FN_PTR(address, InterpreterRuntime::set_original_bytecode_at), rmethod, rbcp, bc_reg);
220 __ b(L_patch_done);
221 __ bind(L_fast_patch);
222 }
223
224 #ifdef ASSERT
225 Label L_okay;
226 __ load_unsigned_byte(temp_reg, at_bcp(0));
227 __ cmpw(temp_reg, (int) Bytecodes::java_code(bc));
228 __ br(Assembler::EQ, L_okay);
229 __ cmpw(temp_reg, bc_reg);
230 __ br(Assembler::EQ, L_okay);
231 __ stop("patching the wrong bytecode");
232 __ bind(L_okay);
233 #endif
234
235 // patch bytecode
236 __ strb(bc_reg, at_bcp(0));
237 __ bind(L_patch_done);
238 }
239
240
241 // Individual instructions
242
243 void TemplateTable::nop() {
244 transition(vtos, vtos);
245 // nothing to do
246 }
247
248 void TemplateTable::shouldnotreachhere() {
249 transition(vtos, vtos);
250 __ stop("shouldnotreachhere bytecode");
251 }
252
253 void TemplateTable::aconst_null()
254 {
255 transition(vtos, atos);
256 __ mov(r0, 0);
257 }
258
259 void TemplateTable::iconst(int value)
260 {
261 transition(vtos, itos);
262 __ mov(r0, value);
263 }
264
265 void TemplateTable::lconst(int value)
266 {
267 __ mov(r0, value);
268 }
269
270 void TemplateTable::fconst(int value)
271 {
272 transition(vtos, ftos);
273 switch (value) {
274 case 0:
275 __ fmovs(v0, 0.0);
276 break;
277 case 1:
278 __ fmovs(v0, 1.0);
279 break;
280 case 2:
281 __ fmovs(v0, 2.0);
282 break;
283 default:
284 ShouldNotReachHere();
285 break;
286 }
287 }
288
289 void TemplateTable::dconst(int value)
290 {
291 transition(vtos, dtos);
292 switch (value) {
293 case 0:
294 __ fmovd(v0, 0.0);
295 break;
296 case 1:
297 __ fmovd(v0, 1.0);
298 break;
299 case 2:
300 __ fmovd(v0, 2.0);
301 break;
302 default:
303 ShouldNotReachHere();
304 break;
305 }
306 }
307
308 void TemplateTable::bipush()
309 {
310 transition(vtos, itos);
311 __ load_signed_byte32(r0, at_bcp(1));
312 }
313
314 void TemplateTable::sipush()
315 {
316 transition(vtos, itos);
317 __ load_unsigned_short(r0, at_bcp(1));
318 __ revw(r0, r0);
319 __ asrw(r0, r0, 16);
320 }
321
322 void TemplateTable::ldc(LdcType type)
323 {
324 transition(vtos, vtos);
325 Label call_ldc, notFloat, notClass, notInt, Done;
326
327 if (is_ldc_wide(type)) {
328 __ get_unsigned_2_byte_index_at_bcp(r1, 1);
329 } else {
330 __ load_unsigned_byte(r1, at_bcp(1));
331 }
332 __ get_cpool_and_tags(r2, r0);
333
334 const int base_offset = ConstantPool::header_size() * wordSize;
335 const int tags_offset = Array<u1>::base_offset_in_bytes();
336
337 // get type
338 __ add(r3, r1, tags_offset);
339 __ lea(r3, Address(r0, r3));
340 __ ldarb(r3, r3);
341
342 // unresolved class - get the resolved class
343 __ cmp(r3, (u1)JVM_CONSTANT_UnresolvedClass);
344 __ br(Assembler::EQ, call_ldc);
345
346 // unresolved class in error state - call into runtime to throw the error
347 // from the first resolution attempt
348 __ cmp(r3, (u1)JVM_CONSTANT_UnresolvedClassInError);
349 __ br(Assembler::EQ, call_ldc);
350
351 // resolved class - need to call vm to get java mirror of the class
352 __ cmp(r3, (u1)JVM_CONSTANT_Class);
353 __ br(Assembler::NE, notClass);
354
355 __ load_resolved_klass_at_offset(r2, r1, r3, rscratch1); // kills r3=tag
356
357 __ cmp(r3, zr); // resolved_klass ?= null
358 __ br(Assembler::EQ, call_ldc);
359
360 const int mirror_offset = in_bytes(Klass::java_mirror_offset());
361 __ ldr(r3, Address(r3, mirror_offset));
362 __ resolve_oop_handle(r3, rscratch1, rscratch2);
363 __ push_ptr(r3);
364
365 __ b(Done);
366
367 __ bind(call_ldc);
368 __ mov(c_rarg1, is_ldc_wide(type) ? 1 : 0);
369 call_VM(r0, CAST_FROM_FN_PTR(address, InterpreterRuntime::ldc), c_rarg1);
370 __ push_ptr(r0);
371 __ verify_oop(r0);
372 __ b(Done);
373
374 __ bind(notClass);
375 __ cmp(r3, (u1)JVM_CONSTANT_Float);
376 __ br(Assembler::NE, notFloat);
377 // ftos
378 __ adds(r1, r2, r1, Assembler::LSL, 3);
379 __ ldrs(v0, Address(r1, base_offset));
380 __ push_f();
381 __ b(Done);
382
383 __ bind(notFloat);
384
385 __ cmp(r3, (u1)JVM_CONSTANT_Integer);
386 __ br(Assembler::NE, notInt);
387
388 // itos
389 __ adds(r1, r2, r1, Assembler::LSL, 3);
390 __ ldrw(r0, Address(r1, base_offset));
391 __ push_i(r0);
392 __ b(Done);
393
394 __ bind(notInt);
395 condy_helper(Done);
396
397 __ bind(Done);
398 }
399
400 // Fast path for caching oop constants.
401 void TemplateTable::fast_aldc(LdcType type)
402 {
403 transition(vtos, atos);
404
405 Register result = r0;
406 Register tmp = r1;
407 Register rarg = r2;
408
409 int index_size = is_ldc_wide(type) ? sizeof(u2) : sizeof(u1);
410
411 Label resolved;
412
413 // We are resolved if the resolved reference cache entry contains a
414 // non-null object (String, MethodType, etc.)
415 assert_different_registers(result, tmp);
416 __ get_cache_index_at_bcp(tmp, 1, index_size);
417 __ load_resolved_reference_at_index(result, tmp);
418 __ cbnz(result, resolved);
419
420 address entry = CAST_FROM_FN_PTR(address, InterpreterRuntime::resolve_ldc);
421
422 // first time invocation - must resolve first
423 __ mov(rarg, (int)bytecode());
424 __ call_VM(result, entry, rarg);
425
426 __ bind(resolved);
427
428 { // Check for the null sentinel.
429 // If we just called the VM, it already did the mapping for us,
430 // but it's harmless to retry.
431 Label notNull;
432
433 // Stash null_sentinel address to get its value later
434 __ movptr(rarg, (uintptr_t)Universe::the_null_sentinel_addr());
435 __ ldr(tmp, Address(rarg));
436 __ resolve_oop_handle(tmp, r5, rscratch2);
437 __ cmpoop(result, tmp);
438 __ br(Assembler::NE, notNull);
439 __ mov(result, 0); // null object reference
440 __ bind(notNull);
441 }
442
443 if (VerifyOops) {
444 // Safe to call with 0 result
445 __ verify_oop(result);
446 }
447 }
448
449 void TemplateTable::ldc2_w()
450 {
451 transition(vtos, vtos);
452 Label notDouble, notLong, Done;
453 __ get_unsigned_2_byte_index_at_bcp(r0, 1);
454
455 __ get_cpool_and_tags(r1, r2);
456 const int base_offset = ConstantPool::header_size() * wordSize;
457 const int tags_offset = Array<u1>::base_offset_in_bytes();
458
459 // get type
460 __ lea(r2, Address(r2, r0, Address::lsl(0)));
461 __ load_unsigned_byte(r2, Address(r2, tags_offset));
462 __ cmpw(r2, (int)JVM_CONSTANT_Double);
463 __ br(Assembler::NE, notDouble);
464
465 // dtos
466 __ lea (r2, Address(r1, r0, Address::lsl(3)));
467 __ ldrd(v0, Address(r2, base_offset));
468 __ push_d();
469 __ b(Done);
470
471 __ bind(notDouble);
472 __ cmpw(r2, (int)JVM_CONSTANT_Long);
473 __ br(Assembler::NE, notLong);
474
475 // ltos
476 __ lea(r0, Address(r1, r0, Address::lsl(3)));
477 __ ldr(r0, Address(r0, base_offset));
478 __ push_l();
479 __ b(Done);
480
481 __ bind(notLong);
482 condy_helper(Done);
483
484 __ bind(Done);
485 }
486
487 void TemplateTable::condy_helper(Label& Done)
488 {
489 Register obj = r0;
490 Register rarg = r1;
491 Register flags = r2;
492 Register off = r3;
493
494 address entry = CAST_FROM_FN_PTR(address, InterpreterRuntime::resolve_ldc);
495
496 __ mov(rarg, (int) bytecode());
497 __ call_VM(obj, entry, rarg);
498
499 __ get_vm_result_2(flags, rthread);
500
501 // VMr = obj = base address to find primitive value to push
502 // VMr2 = flags = (tos, off) using format of CPCE::_flags
503 __ mov(off, flags);
504 __ andw(off, off, ConstantPoolCache::field_index_mask);
505
506 const Address field(obj, off);
507
508 // What sort of thing are we loading?
509 // x86 uses a shift and mask or wings it with a shift plus assert
510 // the mask is not needed. aarch64 just uses bitfield extract
511 __ ubfxw(flags, flags, ConstantPoolCache::tos_state_shift,
512 ConstantPoolCache::tos_state_bits);
513
514 switch (bytecode()) {
515 case Bytecodes::_ldc:
516 case Bytecodes::_ldc_w:
517 {
518 // tos in (itos, ftos, stos, btos, ctos, ztos)
519 Label notInt, notFloat, notShort, notByte, notChar, notBool;
520 __ cmpw(flags, itos);
521 __ br(Assembler::NE, notInt);
522 // itos
523 __ ldrw(r0, field);
524 __ push(itos);
525 __ b(Done);
526
527 __ bind(notInt);
528 __ cmpw(flags, ftos);
529 __ br(Assembler::NE, notFloat);
530 // ftos
531 __ load_float(field);
532 __ push(ftos);
533 __ b(Done);
534
535 __ bind(notFloat);
536 __ cmpw(flags, stos);
537 __ br(Assembler::NE, notShort);
538 // stos
539 __ load_signed_short(r0, field);
540 __ push(stos);
541 __ b(Done);
542
543 __ bind(notShort);
544 __ cmpw(flags, btos);
545 __ br(Assembler::NE, notByte);
546 // btos
547 __ load_signed_byte(r0, field);
548 __ push(btos);
549 __ b(Done);
550
551 __ bind(notByte);
552 __ cmpw(flags, ctos);
553 __ br(Assembler::NE, notChar);
554 // ctos
555 __ load_unsigned_short(r0, field);
556 __ push(ctos);
557 __ b(Done);
558
559 __ bind(notChar);
560 __ cmpw(flags, ztos);
561 __ br(Assembler::NE, notBool);
562 // ztos
563 __ load_signed_byte(r0, field);
564 __ push(ztos);
565 __ b(Done);
566
567 __ bind(notBool);
568 break;
569 }
570
571 case Bytecodes::_ldc2_w:
572 {
573 Label notLong, notDouble;
574 __ cmpw(flags, ltos);
575 __ br(Assembler::NE, notLong);
576 // ltos
577 __ ldr(r0, field);
578 __ push(ltos);
579 __ b(Done);
580
581 __ bind(notLong);
582 __ cmpw(flags, dtos);
583 __ br(Assembler::NE, notDouble);
584 // dtos
585 __ load_double(field);
586 __ push(dtos);
587 __ b(Done);
588
589 __ bind(notDouble);
590 break;
591 }
592
593 default:
594 ShouldNotReachHere();
595 }
596
597 __ stop("bad ldc/condy");
598 }
599
600 void TemplateTable::locals_index(Register reg, int offset)
601 {
602 __ ldrb(reg, at_bcp(offset));
603 __ neg(reg, reg);
604 }
605
606 void TemplateTable::iload() {
607 iload_internal();
608 }
609
610 void TemplateTable::nofast_iload() {
611 iload_internal(may_not_rewrite);
612 }
613
614 void TemplateTable::iload_internal(RewriteControl rc) {
615 transition(vtos, itos);
616 if (RewriteFrequentPairs && rc == may_rewrite) {
617 Label rewrite, done;
618 Register bc = r4;
619
620 // get next bytecode
621 __ load_unsigned_byte(r1, at_bcp(Bytecodes::length_for(Bytecodes::_iload)));
622
623 // if _iload, wait to rewrite to iload2. We only want to rewrite the
624 // last two iloads in a pair. Comparing against fast_iload means that
625 // the next bytecode is neither an iload or a caload, and therefore
626 // an iload pair.
627 __ cmpw(r1, Bytecodes::_iload);
628 __ br(Assembler::EQ, done);
629
630 // if _fast_iload rewrite to _fast_iload2
631 __ cmpw(r1, Bytecodes::_fast_iload);
632 __ movw(bc, Bytecodes::_fast_iload2);
633 __ br(Assembler::EQ, rewrite);
634
635 // if _caload rewrite to _fast_icaload
636 __ cmpw(r1, Bytecodes::_caload);
637 __ movw(bc, Bytecodes::_fast_icaload);
638 __ br(Assembler::EQ, rewrite);
639
640 // else rewrite to _fast_iload
641 __ movw(bc, Bytecodes::_fast_iload);
642
643 // rewrite
644 // bc: new bytecode
645 __ bind(rewrite);
646 patch_bytecode(Bytecodes::_iload, bc, r1, false);
647 __ bind(done);
648
649 }
650
651 // do iload, get the local value into tos
652 locals_index(r1);
653 __ ldr(r0, iaddress(r1));
654
655 }
656
657 void TemplateTable::fast_iload2()
658 {
659 transition(vtos, itos);
660 locals_index(r1);
661 __ ldr(r0, iaddress(r1));
662 __ push(itos);
663 locals_index(r1, 3);
664 __ ldr(r0, iaddress(r1));
665 }
666
667 void TemplateTable::fast_iload()
668 {
669 transition(vtos, itos);
670 locals_index(r1);
671 __ ldr(r0, iaddress(r1));
672 }
673
674 void TemplateTable::lload()
675 {
676 transition(vtos, ltos);
677 __ ldrb(r1, at_bcp(1));
678 __ sub(r1, rlocals, r1, ext::uxtw, LogBytesPerWord);
679 __ ldr(r0, Address(r1, Interpreter::local_offset_in_bytes(1)));
680 }
681
682 void TemplateTable::fload()
683 {
684 transition(vtos, ftos);
685 locals_index(r1);
686 // n.b. we use ldrd here because this is a 64 bit slot
687 // this is comparable to the iload case
688 __ ldrd(v0, faddress(r1));
689 }
690
691 void TemplateTable::dload()
692 {
693 transition(vtos, dtos);
694 __ ldrb(r1, at_bcp(1));
695 __ sub(r1, rlocals, r1, ext::uxtw, LogBytesPerWord);
696 __ ldrd(v0, Address(r1, Interpreter::local_offset_in_bytes(1)));
697 }
698
699 void TemplateTable::aload()
700 {
701 transition(vtos, atos);
702 locals_index(r1);
703 __ ldr(r0, iaddress(r1));
704 }
705
706 void TemplateTable::locals_index_wide(Register reg) {
707 __ ldrh(reg, at_bcp(2));
708 __ rev16w(reg, reg);
709 __ neg(reg, reg);
710 }
711
712 void TemplateTable::wide_iload() {
713 transition(vtos, itos);
714 locals_index_wide(r1);
715 __ ldr(r0, iaddress(r1));
716 }
717
718 void TemplateTable::wide_lload()
719 {
720 transition(vtos, ltos);
721 __ ldrh(r1, at_bcp(2));
722 __ rev16w(r1, r1);
723 __ sub(r1, rlocals, r1, ext::uxtw, LogBytesPerWord);
724 __ ldr(r0, Address(r1, Interpreter::local_offset_in_bytes(1)));
725 }
726
727 void TemplateTable::wide_fload()
728 {
729 transition(vtos, ftos);
730 locals_index_wide(r1);
731 // n.b. we use ldrd here because this is a 64 bit slot
732 // this is comparable to the iload case
733 __ ldrd(v0, faddress(r1));
734 }
735
736 void TemplateTable::wide_dload()
737 {
738 transition(vtos, dtos);
739 __ ldrh(r1, at_bcp(2));
740 __ rev16w(r1, r1);
741 __ sub(r1, rlocals, r1, ext::uxtw, LogBytesPerWord);
742 __ ldrd(v0, Address(r1, Interpreter::local_offset_in_bytes(1)));
743 }
744
745 void TemplateTable::wide_aload()
746 {
747 transition(vtos, atos);
748 locals_index_wide(r1);
749 __ ldr(r0, aaddress(r1));
750 }
751
752 void TemplateTable::index_check(Register array, Register index)
753 {
754 // destroys r1, rscratch1
755 // sign extend index for use by indexed load
756 // __ movl2ptr(index, index);
757 // check index
758 Register length = rscratch1;
759 __ ldrw(length, Address(array, arrayOopDesc::length_offset_in_bytes()));
760 __ cmpw(index, length);
761 if (index != r1) {
762 // ??? convention: move aberrant index into r1 for exception message
763 assert(r1 != array, "different registers");
764 __ mov(r1, index);
765 }
766 Label ok;
767 __ br(Assembler::LO, ok);
768 // ??? convention: move array into r3 for exception message
769 __ mov(r3, array);
770 __ mov(rscratch1, Interpreter::_throw_ArrayIndexOutOfBoundsException_entry);
771 __ br(rscratch1);
772 __ bind(ok);
773 }
774
775 void TemplateTable::iaload()
776 {
777 transition(itos, itos);
778 __ mov(r1, r0);
779 __ pop_ptr(r0);
780 // r0: array
781 // r1: index
782 index_check(r0, r1); // leaves index in r1, kills rscratch1
783 __ add(r1, r1, arrayOopDesc::base_offset_in_bytes(T_INT) >> 2);
784 __ access_load_at(T_INT, IN_HEAP | IS_ARRAY, r0, Address(r0, r1, Address::uxtw(2)), noreg, noreg);
785 }
786
787 void TemplateTable::laload()
788 {
789 transition(itos, ltos);
790 __ mov(r1, r0);
791 __ pop_ptr(r0);
792 // r0: array
793 // r1: index
794 index_check(r0, r1); // leaves index in r1, kills rscratch1
795 __ add(r1, r1, arrayOopDesc::base_offset_in_bytes(T_LONG) >> 3);
796 __ access_load_at(T_LONG, IN_HEAP | IS_ARRAY, r0, Address(r0, r1, Address::uxtw(3)), noreg, noreg);
797 }
798
799 void TemplateTable::faload()
800 {
801 transition(itos, ftos);
802 __ mov(r1, r0);
803 __ pop_ptr(r0);
804 // r0: array
805 // r1: index
806 index_check(r0, r1); // leaves index in r1, kills rscratch1
807 __ add(r1, r1, arrayOopDesc::base_offset_in_bytes(T_FLOAT) >> 2);
808 __ access_load_at(T_FLOAT, IN_HEAP | IS_ARRAY, r0, Address(r0, r1, Address::uxtw(2)), noreg, noreg);
809 }
810
811 void TemplateTable::daload()
812 {
813 transition(itos, dtos);
814 __ mov(r1, r0);
815 __ pop_ptr(r0);
816 // r0: array
817 // r1: index
818 index_check(r0, r1); // leaves index in r1, kills rscratch1
819 __ add(r1, r1, arrayOopDesc::base_offset_in_bytes(T_DOUBLE) >> 3);
820 __ access_load_at(T_DOUBLE, IN_HEAP | IS_ARRAY, r0, Address(r0, r1, Address::uxtw(3)), noreg, noreg);
821 }
822
823 void TemplateTable::aaload()
824 {
825 transition(itos, atos);
826 __ mov(r1, r0);
827 __ pop_ptr(r0);
828 // r0: array
829 // r1: index
830 index_check(r0, r1); // leaves index in r1, kills rscratch1
831 __ add(r1, r1, arrayOopDesc::base_offset_in_bytes(T_OBJECT) >> LogBytesPerHeapOop);
832 do_oop_load(_masm,
833 Address(r0, r1, Address::uxtw(LogBytesPerHeapOop)),
834 r0,
835 IS_ARRAY);
836 }
837
838 void TemplateTable::baload()
839 {
840 transition(itos, itos);
841 __ mov(r1, r0);
842 __ pop_ptr(r0);
843 // r0: array
844 // r1: index
845 index_check(r0, r1); // leaves index in r1, kills rscratch1
846 __ add(r1, r1, arrayOopDesc::base_offset_in_bytes(T_BYTE) >> 0);
847 __ access_load_at(T_BYTE, IN_HEAP | IS_ARRAY, r0, Address(r0, r1, Address::uxtw(0)), noreg, noreg);
848 }
849
850 void TemplateTable::caload()
851 {
852 transition(itos, itos);
853 __ mov(r1, r0);
854 __ pop_ptr(r0);
855 // r0: array
856 // r1: index
857 index_check(r0, r1); // leaves index in r1, kills rscratch1
858 __ add(r1, r1, arrayOopDesc::base_offset_in_bytes(T_CHAR) >> 1);
859 __ access_load_at(T_CHAR, IN_HEAP | IS_ARRAY, r0, Address(r0, r1, Address::uxtw(1)), noreg, noreg);
860 }
861
862 // iload followed by caload frequent pair
863 void TemplateTable::fast_icaload()
864 {
865 transition(vtos, itos);
866 // load index out of locals
867 locals_index(r2);
868 __ ldr(r1, iaddress(r2));
869
870 __ pop_ptr(r0);
871
872 // r0: array
873 // r1: index
874 index_check(r0, r1); // leaves index in r1, kills rscratch1
875 __ add(r1, r1, arrayOopDesc::base_offset_in_bytes(T_CHAR) >> 1);
876 __ access_load_at(T_CHAR, IN_HEAP | IS_ARRAY, r0, Address(r0, r1, Address::uxtw(1)), noreg, noreg);
877 }
878
879 void TemplateTable::saload()
880 {
881 transition(itos, itos);
882 __ mov(r1, r0);
883 __ pop_ptr(r0);
884 // r0: array
885 // r1: index
886 index_check(r0, r1); // leaves index in r1, kills rscratch1
887 __ add(r1, r1, arrayOopDesc::base_offset_in_bytes(T_SHORT) >> 1);
888 __ access_load_at(T_SHORT, IN_HEAP | IS_ARRAY, r0, Address(r0, r1, Address::uxtw(1)), noreg, noreg);
889 }
890
891 void TemplateTable::iload(int n)
892 {
893 transition(vtos, itos);
894 __ ldr(r0, iaddress(n));
895 }
896
897 void TemplateTable::lload(int n)
898 {
899 transition(vtos, ltos);
900 __ ldr(r0, laddress(n));
901 }
902
903 void TemplateTable::fload(int n)
904 {
905 transition(vtos, ftos);
906 __ ldrs(v0, faddress(n));
907 }
908
909 void TemplateTable::dload(int n)
910 {
911 transition(vtos, dtos);
912 __ ldrd(v0, daddress(n));
913 }
914
915 void TemplateTable::aload(int n)
916 {
917 transition(vtos, atos);
918 __ ldr(r0, iaddress(n));
919 }
920
921 void TemplateTable::aload_0() {
922 aload_0_internal();
923 }
924
925 void TemplateTable::nofast_aload_0() {
926 aload_0_internal(may_not_rewrite);
927 }
928
929 void TemplateTable::aload_0_internal(RewriteControl rc) {
930 // According to bytecode histograms, the pairs:
931 //
932 // _aload_0, _fast_igetfield
933 // _aload_0, _fast_agetfield
934 // _aload_0, _fast_fgetfield
935 //
936 // occur frequently. If RewriteFrequentPairs is set, the (slow)
937 // _aload_0 bytecode checks if the next bytecode is either
938 // _fast_igetfield, _fast_agetfield or _fast_fgetfield and then
939 // rewrites the current bytecode into a pair bytecode; otherwise it
940 // rewrites the current bytecode into _fast_aload_0 that doesn't do
941 // the pair check anymore.
942 //
943 // Note: If the next bytecode is _getfield, the rewrite must be
944 // delayed, otherwise we may miss an opportunity for a pair.
945 //
946 // Also rewrite frequent pairs
947 // aload_0, aload_1
948 // aload_0, iload_1
949 // These bytecodes with a small amount of code are most profitable
950 // to rewrite
951 if (RewriteFrequentPairs && rc == may_rewrite) {
952 Label rewrite, done;
953 const Register bc = r4;
954
955 // get next bytecode
956 __ load_unsigned_byte(r1, at_bcp(Bytecodes::length_for(Bytecodes::_aload_0)));
957
958 // if _getfield then wait with rewrite
959 __ cmpw(r1, Bytecodes::Bytecodes::_getfield);
960 __ br(Assembler::EQ, done);
961
962 // if _igetfield then rewrite to _fast_iaccess_0
963 assert(Bytecodes::java_code(Bytecodes::_fast_iaccess_0) == Bytecodes::_aload_0, "fix bytecode definition");
964 __ cmpw(r1, Bytecodes::_fast_igetfield);
965 __ movw(bc, Bytecodes::_fast_iaccess_0);
966 __ br(Assembler::EQ, rewrite);
967
968 // if _agetfield then rewrite to _fast_aaccess_0
969 assert(Bytecodes::java_code(Bytecodes::_fast_aaccess_0) == Bytecodes::_aload_0, "fix bytecode definition");
970 __ cmpw(r1, Bytecodes::_fast_agetfield);
971 __ movw(bc, Bytecodes::_fast_aaccess_0);
972 __ br(Assembler::EQ, rewrite);
973
974 // if _fgetfield then rewrite to _fast_faccess_0
975 assert(Bytecodes::java_code(Bytecodes::_fast_faccess_0) == Bytecodes::_aload_0, "fix bytecode definition");
976 __ cmpw(r1, Bytecodes::_fast_fgetfield);
977 __ movw(bc, Bytecodes::_fast_faccess_0);
978 __ br(Assembler::EQ, rewrite);
979
980 // else rewrite to _fast_aload0
981 assert(Bytecodes::java_code(Bytecodes::_fast_aload_0) == Bytecodes::_aload_0, "fix bytecode definition");
982 __ movw(bc, Bytecodes::Bytecodes::_fast_aload_0);
983
984 // rewrite
985 // bc: new bytecode
986 __ bind(rewrite);
987 patch_bytecode(Bytecodes::_aload_0, bc, r1, false);
988
989 __ bind(done);
990 }
991
992 // Do actual aload_0 (must do this after patch_bytecode which might call VM and GC might change oop).
993 aload(0);
994 }
995
996 void TemplateTable::istore()
997 {
998 transition(itos, vtos);
999 locals_index(r1);
1000 // FIXME: We're being very pernickerty here storing a jint in a
1001 // local with strw, which costs an extra instruction over what we'd
1002 // be able to do with a simple str. We should just store the whole
1003 // word.
1004 __ lea(rscratch1, iaddress(r1));
1005 __ strw(r0, Address(rscratch1));
1006 }
1007
1008 void TemplateTable::lstore()
1009 {
1010 transition(ltos, vtos);
1011 locals_index(r1);
1012 __ str(r0, laddress(r1, rscratch1, _masm));
1013 }
1014
1015 void TemplateTable::fstore() {
1016 transition(ftos, vtos);
1017 locals_index(r1);
1018 __ lea(rscratch1, iaddress(r1));
1019 __ strs(v0, Address(rscratch1));
1020 }
1021
1022 void TemplateTable::dstore() {
1023 transition(dtos, vtos);
1024 locals_index(r1);
1025 __ strd(v0, daddress(r1, rscratch1, _masm));
1026 }
1027
1028 void TemplateTable::astore()
1029 {
1030 transition(vtos, vtos);
1031 __ pop_ptr(r0);
1032 locals_index(r1);
1033 __ str(r0, aaddress(r1));
1034 }
1035
1036 void TemplateTable::wide_istore() {
1037 transition(vtos, vtos);
1038 __ pop_i();
1039 locals_index_wide(r1);
1040 __ lea(rscratch1, iaddress(r1));
1041 __ strw(r0, Address(rscratch1));
1042 }
1043
1044 void TemplateTable::wide_lstore() {
1045 transition(vtos, vtos);
1046 __ pop_l();
1047 locals_index_wide(r1);
1048 __ str(r0, laddress(r1, rscratch1, _masm));
1049 }
1050
1051 void TemplateTable::wide_fstore() {
1052 transition(vtos, vtos);
1053 __ pop_f();
1054 locals_index_wide(r1);
1055 __ lea(rscratch1, faddress(r1));
1056 __ strs(v0, rscratch1);
1057 }
1058
1059 void TemplateTable::wide_dstore() {
1060 transition(vtos, vtos);
1061 __ pop_d();
1062 locals_index_wide(r1);
1063 __ strd(v0, daddress(r1, rscratch1, _masm));
1064 }
1065
1066 void TemplateTable::wide_astore() {
1067 transition(vtos, vtos);
1068 __ pop_ptr(r0);
1069 locals_index_wide(r1);
1070 __ str(r0, aaddress(r1));
1071 }
1072
1073 void TemplateTable::iastore() {
1074 transition(itos, vtos);
1075 __ pop_i(r1);
1076 __ pop_ptr(r3);
1077 // r0: value
1078 // r1: index
1079 // r3: array
1080 index_check(r3, r1); // prefer index in r1
1081 __ add(r1, r1, arrayOopDesc::base_offset_in_bytes(T_INT) >> 2);
1082 __ access_store_at(T_INT, IN_HEAP | IS_ARRAY, Address(r3, r1, Address::uxtw(2)), r0, noreg, noreg, noreg);
1083 }
1084
1085 void TemplateTable::lastore() {
1086 transition(ltos, vtos);
1087 __ pop_i(r1);
1088 __ pop_ptr(r3);
1089 // r0: value
1090 // r1: index
1091 // r3: array
1092 index_check(r3, r1); // prefer index in r1
1093 __ add(r1, r1, arrayOopDesc::base_offset_in_bytes(T_LONG) >> 3);
1094 __ access_store_at(T_LONG, IN_HEAP | IS_ARRAY, Address(r3, r1, Address::uxtw(3)), r0, noreg, noreg, noreg);
1095 }
1096
1097 void TemplateTable::fastore() {
1098 transition(ftos, vtos);
1099 __ pop_i(r1);
1100 __ pop_ptr(r3);
1101 // v0: value
1102 // r1: index
1103 // r3: array
1104 index_check(r3, r1); // prefer index in r1
1105 __ add(r1, r1, arrayOopDesc::base_offset_in_bytes(T_FLOAT) >> 2);
1106 __ access_store_at(T_FLOAT, IN_HEAP | IS_ARRAY, Address(r3, r1, Address::uxtw(2)), noreg /* ftos */, noreg, noreg, noreg);
1107 }
1108
1109 void TemplateTable::dastore() {
1110 transition(dtos, vtos);
1111 __ pop_i(r1);
1112 __ pop_ptr(r3);
1113 // v0: value
1114 // r1: index
1115 // r3: array
1116 index_check(r3, r1); // prefer index in r1
1117 __ add(r1, r1, arrayOopDesc::base_offset_in_bytes(T_DOUBLE) >> 3);
1118 __ access_store_at(T_DOUBLE, IN_HEAP | IS_ARRAY, Address(r3, r1, Address::uxtw(3)), noreg /* dtos */, noreg, noreg, noreg);
1119 }
1120
1121 void TemplateTable::aastore() {
1122 Label is_null, ok_is_subtype, done;
1123 transition(vtos, vtos);
1124 // stack: ..., array, index, value
1125 __ ldr(r0, at_tos()); // value
1126 __ ldr(r2, at_tos_p1()); // index
1127 __ ldr(r3, at_tos_p2()); // array
1128
1129 Address element_address(r3, r4, Address::uxtw(LogBytesPerHeapOop));
1130
1131 index_check(r3, r2); // kills r1
1132 __ add(r4, r2, arrayOopDesc::base_offset_in_bytes(T_OBJECT) >> LogBytesPerHeapOop);
1133
1134 // do array store check - check for null value first
1135 __ cbz(r0, is_null);
1136
1137 // Move subklass into r1
1138 __ load_klass(r1, r0);
1139 // Move superklass into r0
1140 __ load_klass(r0, r3);
1141 __ ldr(r0, Address(r0,
1142 ObjArrayKlass::element_klass_offset()));
1143 // Compress array + index*oopSize + 12 into a single register. Frees r2.
1144
1145 // Generate subtype check. Blows r2, r5
1146 // Superklass in r0. Subklass in r1.
1147 __ gen_subtype_check(r1, ok_is_subtype);
1148
1149 // Come here on failure
1150 // object is at TOS
1151 __ b(Interpreter::_throw_ArrayStoreException_entry);
1152
1153 // Come here on success
1154 __ bind(ok_is_subtype);
1155
1156 // Get the value we will store
1157 __ ldr(r0, at_tos());
1158 // Now store using the appropriate barrier
1159 do_oop_store(_masm, element_address, r0, IS_ARRAY);
1160 __ b(done);
1161
1162 // Have a null in r0, r3=array, r2=index. Store null at ary[idx]
1163 __ bind(is_null);
1164 __ profile_null_seen(r2);
1165
1166 // Store a null
1167 do_oop_store(_masm, element_address, noreg, IS_ARRAY);
1168
1169 // Pop stack arguments
1170 __ bind(done);
1171 __ add(esp, esp, 3 * Interpreter::stackElementSize);
1172 }
1173
1174 void TemplateTable::bastore()
1175 {
1176 transition(itos, vtos);
1177 __ pop_i(r1);
1178 __ pop_ptr(r3);
1179 // r0: value
1180 // r1: index
1181 // r3: array
1182 index_check(r3, r1); // prefer index in r1
1183
1184 // Need to check whether array is boolean or byte
1185 // since both types share the bastore bytecode.
1186 __ load_klass(r2, r3);
1187 __ ldrw(r2, Address(r2, Klass::layout_helper_offset()));
1188 int diffbit_index = exact_log2(Klass::layout_helper_boolean_diffbit());
1189 Label L_skip;
1190 __ tbz(r2, diffbit_index, L_skip);
1191 __ andw(r0, r0, 1); // if it is a T_BOOLEAN array, mask the stored value to 0/1
1192 __ bind(L_skip);
1193
1194 __ add(r1, r1, arrayOopDesc::base_offset_in_bytes(T_BYTE) >> 0);
1195 __ access_store_at(T_BYTE, IN_HEAP | IS_ARRAY, Address(r3, r1, Address::uxtw(0)), r0, noreg, noreg, noreg);
1196 }
1197
1198 void TemplateTable::castore()
1199 {
1200 transition(itos, vtos);
1201 __ pop_i(r1);
1202 __ pop_ptr(r3);
1203 // r0: value
1204 // r1: index
1205 // r3: array
1206 index_check(r3, r1); // prefer index in r1
1207 __ add(r1, r1, arrayOopDesc::base_offset_in_bytes(T_CHAR) >> 1);
1208 __ access_store_at(T_CHAR, IN_HEAP | IS_ARRAY, Address(r3, r1, Address::uxtw(1)), r0, noreg, noreg, noreg);
1209 }
1210
1211 void TemplateTable::sastore()
1212 {
1213 castore();
1214 }
1215
1216 void TemplateTable::istore(int n)
1217 {
1218 transition(itos, vtos);
1219 __ str(r0, iaddress(n));
1220 }
1221
1222 void TemplateTable::lstore(int n)
1223 {
1224 transition(ltos, vtos);
1225 __ str(r0, laddress(n));
1226 }
1227
1228 void TemplateTable::fstore(int n)
1229 {
1230 transition(ftos, vtos);
1231 __ strs(v0, faddress(n));
1232 }
1233
1234 void TemplateTable::dstore(int n)
1235 {
1236 transition(dtos, vtos);
1237 __ strd(v0, daddress(n));
1238 }
1239
1240 void TemplateTable::astore(int n)
1241 {
1242 transition(vtos, vtos);
1243 __ pop_ptr(r0);
1244 __ str(r0, iaddress(n));
1245 }
1246
1247 void TemplateTable::pop()
1248 {
1249 transition(vtos, vtos);
1250 __ add(esp, esp, Interpreter::stackElementSize);
1251 }
1252
1253 void TemplateTable::pop2()
1254 {
1255 transition(vtos, vtos);
1256 __ add(esp, esp, 2 * Interpreter::stackElementSize);
1257 }
1258
1259 void TemplateTable::dup()
1260 {
1261 transition(vtos, vtos);
1262 __ ldr(r0, Address(esp, 0));
1263 __ push(r0);
1264 // stack: ..., a, a
1265 }
1266
1267 void TemplateTable::dup_x1()
1268 {
1269 transition(vtos, vtos);
1270 // stack: ..., a, b
1271 __ ldr(r0, at_tos()); // load b
1272 __ ldr(r2, at_tos_p1()); // load a
1273 __ str(r0, at_tos_p1()); // store b
1274 __ str(r2, at_tos()); // store a
1275 __ push(r0); // push b
1276 // stack: ..., b, a, b
1277 }
1278
1279 void TemplateTable::dup_x2()
1280 {
1281 transition(vtos, vtos);
1282 // stack: ..., a, b, c
1283 __ ldr(r0, at_tos()); // load c
1284 __ ldr(r2, at_tos_p2()); // load a
1285 __ str(r0, at_tos_p2()); // store c in a
1286 __ push(r0); // push c
1287 // stack: ..., c, b, c, c
1288 __ ldr(r0, at_tos_p2()); // load b
1289 __ str(r2, at_tos_p2()); // store a in b
1290 // stack: ..., c, a, c, c
1291 __ str(r0, at_tos_p1()); // store b in c
1292 // stack: ..., c, a, b, c
1293 }
1294
1295 void TemplateTable::dup2()
1296 {
1297 transition(vtos, vtos);
1298 // stack: ..., a, b
1299 __ ldr(r0, at_tos_p1()); // load a
1300 __ push(r0); // push a
1301 __ ldr(r0, at_tos_p1()); // load b
1302 __ push(r0); // push b
1303 // stack: ..., a, b, a, b
1304 }
1305
1306 void TemplateTable::dup2_x1()
1307 {
1308 transition(vtos, vtos);
1309 // stack: ..., a, b, c
1310 __ ldr(r2, at_tos()); // load c
1311 __ ldr(r0, at_tos_p1()); // load b
1312 __ push(r0); // push b
1313 __ push(r2); // push c
1314 // stack: ..., a, b, c, b, c
1315 __ str(r2, at_tos_p3()); // store c in b
1316 // stack: ..., a, c, c, b, c
1317 __ ldr(r2, at_tos_p4()); // load a
1318 __ str(r2, at_tos_p2()); // store a in 2nd c
1319 // stack: ..., a, c, a, b, c
1320 __ str(r0, at_tos_p4()); // store b in a
1321 // stack: ..., b, c, a, b, c
1322 }
1323
1324 void TemplateTable::dup2_x2()
1325 {
1326 transition(vtos, vtos);
1327 // stack: ..., a, b, c, d
1328 __ ldr(r2, at_tos()); // load d
1329 __ ldr(r0, at_tos_p1()); // load c
1330 __ push(r0) ; // push c
1331 __ push(r2); // push d
1332 // stack: ..., a, b, c, d, c, d
1333 __ ldr(r0, at_tos_p4()); // load b
1334 __ str(r0, at_tos_p2()); // store b in d
1335 __ str(r2, at_tos_p4()); // store d in b
1336 // stack: ..., a, d, c, b, c, d
1337 __ ldr(r2, at_tos_p5()); // load a
1338 __ ldr(r0, at_tos_p3()); // load c
1339 __ str(r2, at_tos_p3()); // store a in c
1340 __ str(r0, at_tos_p5()); // store c in a
1341 // stack: ..., c, d, a, b, c, d
1342 }
1343
1344 void TemplateTable::swap()
1345 {
1346 transition(vtos, vtos);
1347 // stack: ..., a, b
1348 __ ldr(r2, at_tos_p1()); // load a
1349 __ ldr(r0, at_tos()); // load b
1350 __ str(r2, at_tos()); // store a in b
1351 __ str(r0, at_tos_p1()); // store b in a
1352 // stack: ..., b, a
1353 }
1354
1355 void TemplateTable::iop2(Operation op)
1356 {
1357 transition(itos, itos);
1358 // r0 <== r1 op r0
1359 __ pop_i(r1);
1360 switch (op) {
1361 case add : __ addw(r0, r1, r0); break;
1362 case sub : __ subw(r0, r1, r0); break;
1363 case mul : __ mulw(r0, r1, r0); break;
1364 case _and : __ andw(r0, r1, r0); break;
1365 case _or : __ orrw(r0, r1, r0); break;
1366 case _xor : __ eorw(r0, r1, r0); break;
1367 case shl : __ lslvw(r0, r1, r0); break;
1368 case shr : __ asrvw(r0, r1, r0); break;
1369 case ushr : __ lsrvw(r0, r1, r0);break;
1370 default : ShouldNotReachHere();
1371 }
1372 }
1373
1374 void TemplateTable::lop2(Operation op)
1375 {
1376 transition(ltos, ltos);
1377 // r0 <== r1 op r0
1378 __ pop_l(r1);
1379 switch (op) {
1380 case add : __ add(r0, r1, r0); break;
1381 case sub : __ sub(r0, r1, r0); break;
1382 case mul : __ mul(r0, r1, r0); break;
1383 case _and : __ andr(r0, r1, r0); break;
1384 case _or : __ orr(r0, r1, r0); break;
1385 case _xor : __ eor(r0, r1, r0); break;
1386 default : ShouldNotReachHere();
1387 }
1388 }
1389
1390 void TemplateTable::idiv()
1391 {
1392 transition(itos, itos);
1393 // explicitly check for div0
1394 Label no_div0;
1395 __ cbnzw(r0, no_div0);
1396 __ mov(rscratch1, Interpreter::_throw_ArithmeticException_entry);
1397 __ br(rscratch1);
1398 __ bind(no_div0);
1399 __ pop_i(r1);
1400 // r0 <== r1 idiv r0
1401 __ corrected_idivl(r0, r1, r0, /* want_remainder */ false);
1402 }
1403
1404 void TemplateTable::irem()
1405 {
1406 transition(itos, itos);
1407 // explicitly check for div0
1408 Label no_div0;
1409 __ cbnzw(r0, no_div0);
1410 __ mov(rscratch1, Interpreter::_throw_ArithmeticException_entry);
1411 __ br(rscratch1);
1412 __ bind(no_div0);
1413 __ pop_i(r1);
1414 // r0 <== r1 irem r0
1415 __ corrected_idivl(r0, r1, r0, /* want_remainder */ true);
1416 }
1417
1418 void TemplateTable::lmul()
1419 {
1420 transition(ltos, ltos);
1421 __ pop_l(r1);
1422 __ mul(r0, r0, r1);
1423 }
1424
1425 void TemplateTable::ldiv()
1426 {
1427 transition(ltos, ltos);
1428 // explicitly check for div0
1429 Label no_div0;
1430 __ cbnz(r0, no_div0);
1431 __ mov(rscratch1, Interpreter::_throw_ArithmeticException_entry);
1432 __ br(rscratch1);
1433 __ bind(no_div0);
1434 __ pop_l(r1);
1435 // r0 <== r1 ldiv r0
1436 __ corrected_idivq(r0, r1, r0, /* want_remainder */ false);
1437 }
1438
1439 void TemplateTable::lrem()
1440 {
1441 transition(ltos, ltos);
1442 // explicitly check for div0
1443 Label no_div0;
1444 __ cbnz(r0, no_div0);
1445 __ mov(rscratch1, Interpreter::_throw_ArithmeticException_entry);
1446 __ br(rscratch1);
1447 __ bind(no_div0);
1448 __ pop_l(r1);
1449 // r0 <== r1 lrem r0
1450 __ corrected_idivq(r0, r1, r0, /* want_remainder */ true);
1451 }
1452
1453 void TemplateTable::lshl()
1454 {
1455 transition(itos, ltos);
1456 // shift count is in r0
1457 __ pop_l(r1);
1458 __ lslv(r0, r1, r0);
1459 }
1460
1461 void TemplateTable::lshr()
1462 {
1463 transition(itos, ltos);
1464 // shift count is in r0
1465 __ pop_l(r1);
1466 __ asrv(r0, r1, r0);
1467 }
1468
1469 void TemplateTable::lushr()
1470 {
1471 transition(itos, ltos);
1472 // shift count is in r0
1473 __ pop_l(r1);
1474 __ lsrv(r0, r1, r0);
1475 }
1476
1477 void TemplateTable::fop2(Operation op)
1478 {
1479 transition(ftos, ftos);
1480 switch (op) {
1481 case add:
1482 // n.b. use ldrd because this is a 64 bit slot
1483 __ pop_f(v1);
1484 __ fadds(v0, v1, v0);
1485 break;
1486 case sub:
1487 __ pop_f(v1);
1488 __ fsubs(v0, v1, v0);
1489 break;
1490 case mul:
1491 __ pop_f(v1);
1492 __ fmuls(v0, v1, v0);
1493 break;
1494 case div:
1495 __ pop_f(v1);
1496 __ fdivs(v0, v1, v0);
1497 break;
1498 case rem:
1499 __ fmovs(v1, v0);
1500 __ pop_f(v0);
1501 __ call_VM_leaf(CAST_FROM_FN_PTR(address, SharedRuntime::frem));
1502 break;
1503 default:
1504 ShouldNotReachHere();
1505 break;
1506 }
1507 }
1508
1509 void TemplateTable::dop2(Operation op)
1510 {
1511 transition(dtos, dtos);
1512 switch (op) {
1513 case add:
1514 // n.b. use ldrd because this is a 64 bit slot
1515 __ pop_d(v1);
1516 __ faddd(v0, v1, v0);
1517 break;
1518 case sub:
1519 __ pop_d(v1);
1520 __ fsubd(v0, v1, v0);
1521 break;
1522 case mul:
1523 __ pop_d(v1);
1524 __ fmuld(v0, v1, v0);
1525 break;
1526 case div:
1527 __ pop_d(v1);
1528 __ fdivd(v0, v1, v0);
1529 break;
1530 case rem:
1531 __ fmovd(v1, v0);
1532 __ pop_d(v0);
1533 __ call_VM_leaf(CAST_FROM_FN_PTR(address, SharedRuntime::drem));
1534 break;
1535 default:
1536 ShouldNotReachHere();
1537 break;
1538 }
1539 }
1540
1541 void TemplateTable::ineg()
1542 {
1543 transition(itos, itos);
1544 __ negw(r0, r0);
1545
1546 }
1547
1548 void TemplateTable::lneg()
1549 {
1550 transition(ltos, ltos);
1551 __ neg(r0, r0);
1552 }
1553
1554 void TemplateTable::fneg()
1555 {
1556 transition(ftos, ftos);
1557 __ fnegs(v0, v0);
1558 }
1559
1560 void TemplateTable::dneg()
1561 {
1562 transition(dtos, dtos);
1563 __ fnegd(v0, v0);
1564 }
1565
1566 void TemplateTable::iinc()
1567 {
1568 transition(vtos, vtos);
1569 __ load_signed_byte(r1, at_bcp(2)); // get constant
1570 locals_index(r2);
1571 __ ldr(r0, iaddress(r2));
1572 __ addw(r0, r0, r1);
1573 __ str(r0, iaddress(r2));
1574 }
1575
1576 void TemplateTable::wide_iinc()
1577 {
1578 transition(vtos, vtos);
1579 // __ mov(r1, zr);
1580 __ ldrw(r1, at_bcp(2)); // get constant and index
1581 __ rev16(r1, r1);
1582 __ ubfx(r2, r1, 0, 16);
1583 __ neg(r2, r2);
1584 __ sbfx(r1, r1, 16, 16);
1585 __ ldr(r0, iaddress(r2));
1586 __ addw(r0, r0, r1);
1587 __ str(r0, iaddress(r2));
1588 }
1589
1590 void TemplateTable::convert()
1591 {
1592 // Checking
1593 #ifdef ASSERT
1594 {
1595 TosState tos_in = ilgl;
1596 TosState tos_out = ilgl;
1597 switch (bytecode()) {
1598 case Bytecodes::_i2l: // fall through
1599 case Bytecodes::_i2f: // fall through
1600 case Bytecodes::_i2d: // fall through
1601 case Bytecodes::_i2b: // fall through
1602 case Bytecodes::_i2c: // fall through
1603 case Bytecodes::_i2s: tos_in = itos; break;
1604 case Bytecodes::_l2i: // fall through
1605 case Bytecodes::_l2f: // fall through
1606 case Bytecodes::_l2d: tos_in = ltos; break;
1607 case Bytecodes::_f2i: // fall through
1608 case Bytecodes::_f2l: // fall through
1609 case Bytecodes::_f2d: tos_in = ftos; break;
1610 case Bytecodes::_d2i: // fall through
1611 case Bytecodes::_d2l: // fall through
1612 case Bytecodes::_d2f: tos_in = dtos; break;
1613 default : ShouldNotReachHere();
1614 }
1615 switch (bytecode()) {
1616 case Bytecodes::_l2i: // fall through
1617 case Bytecodes::_f2i: // fall through
1618 case Bytecodes::_d2i: // fall through
1619 case Bytecodes::_i2b: // fall through
1620 case Bytecodes::_i2c: // fall through
1621 case Bytecodes::_i2s: tos_out = itos; break;
1622 case Bytecodes::_i2l: // fall through
1623 case Bytecodes::_f2l: // fall through
1624 case Bytecodes::_d2l: tos_out = ltos; break;
1625 case Bytecodes::_i2f: // fall through
1626 case Bytecodes::_l2f: // fall through
1627 case Bytecodes::_d2f: tos_out = ftos; break;
1628 case Bytecodes::_i2d: // fall through
1629 case Bytecodes::_l2d: // fall through
1630 case Bytecodes::_f2d: tos_out = dtos; break;
1631 default : ShouldNotReachHere();
1632 }
1633 transition(tos_in, tos_out);
1634 }
1635 #endif // ASSERT
1636 // static const int64_t is_nan = 0x8000000000000000L;
1637
1638 // Conversion
1639 switch (bytecode()) {
1640 case Bytecodes::_i2l:
1641 __ sxtw(r0, r0);
1642 break;
1643 case Bytecodes::_i2f:
1644 __ scvtfws(v0, r0);
1645 break;
1646 case Bytecodes::_i2d:
1647 __ scvtfwd(v0, r0);
1648 break;
1649 case Bytecodes::_i2b:
1650 __ sxtbw(r0, r0);
1651 break;
1652 case Bytecodes::_i2c:
1653 __ uxthw(r0, r0);
1654 break;
1655 case Bytecodes::_i2s:
1656 __ sxthw(r0, r0);
1657 break;
1658 case Bytecodes::_l2i:
1659 __ uxtw(r0, r0);
1660 break;
1661 case Bytecodes::_l2f:
1662 __ scvtfs(v0, r0);
1663 break;
1664 case Bytecodes::_l2d:
1665 __ scvtfd(v0, r0);
1666 break;
1667 case Bytecodes::_f2i:
1668 {
1669 Label L_Okay;
1670 __ clear_fpsr();
1671 __ fcvtzsw(r0, v0);
1672 __ get_fpsr(r1);
1673 __ cbzw(r1, L_Okay);
1674 __ call_VM_leaf(CAST_FROM_FN_PTR(address, SharedRuntime::f2i));
1675 __ bind(L_Okay);
1676 }
1677 break;
1678 case Bytecodes::_f2l:
1679 {
1680 Label L_Okay;
1681 __ clear_fpsr();
1682 __ fcvtzs(r0, v0);
1683 __ get_fpsr(r1);
1684 __ cbzw(r1, L_Okay);
1685 __ call_VM_leaf(CAST_FROM_FN_PTR(address, SharedRuntime::f2l));
1686 __ bind(L_Okay);
1687 }
1688 break;
1689 case Bytecodes::_f2d:
1690 __ fcvts(v0, v0);
1691 break;
1692 case Bytecodes::_d2i:
1693 {
1694 Label L_Okay;
1695 __ clear_fpsr();
1696 __ fcvtzdw(r0, v0);
1697 __ get_fpsr(r1);
1698 __ cbzw(r1, L_Okay);
1699 __ call_VM_leaf(CAST_FROM_FN_PTR(address, SharedRuntime::d2i));
1700 __ bind(L_Okay);
1701 }
1702 break;
1703 case Bytecodes::_d2l:
1704 {
1705 Label L_Okay;
1706 __ clear_fpsr();
1707 __ fcvtzd(r0, v0);
1708 __ get_fpsr(r1);
1709 __ cbzw(r1, L_Okay);
1710 __ call_VM_leaf(CAST_FROM_FN_PTR(address, SharedRuntime::d2l));
1711 __ bind(L_Okay);
1712 }
1713 break;
1714 case Bytecodes::_d2f:
1715 __ fcvtd(v0, v0);
1716 break;
1717 default:
1718 ShouldNotReachHere();
1719 }
1720 }
1721
1722 void TemplateTable::lcmp()
1723 {
1724 transition(ltos, itos);
1725 Label done;
1726 __ pop_l(r1);
1727 __ cmp(r1, r0);
1728 __ mov(r0, (uint64_t)-1L);
1729 __ br(Assembler::LT, done);
1730 // __ mov(r0, 1UL);
1731 // __ csel(r0, r0, zr, Assembler::NE);
1732 // and here is a faster way
1733 __ csinc(r0, zr, zr, Assembler::EQ);
1734 __ bind(done);
1735 }
1736
1737 void TemplateTable::float_cmp(bool is_float, int unordered_result)
1738 {
1739 Label done;
1740 if (is_float) {
1741 // XXX get rid of pop here, use ... reg, mem32
1742 __ pop_f(v1);
1743 __ fcmps(v1, v0);
1744 } else {
1745 // XXX get rid of pop here, use ... reg, mem64
1746 __ pop_d(v1);
1747 __ fcmpd(v1, v0);
1748 }
1749 if (unordered_result < 0) {
1750 // we want -1 for unordered or less than, 0 for equal and 1 for
1751 // greater than.
1752 __ mov(r0, (uint64_t)-1L);
1753 // for FP LT tests less than or unordered
1754 __ br(Assembler::LT, done);
1755 // install 0 for EQ otherwise 1
1756 __ csinc(r0, zr, zr, Assembler::EQ);
1757 } else {
1758 // we want -1 for less than, 0 for equal and 1 for unordered or
1759 // greater than.
1760 __ mov(r0, 1L);
1761 // for FP HI tests greater than or unordered
1762 __ br(Assembler::HI, done);
1763 // install 0 for EQ otherwise ~0
1764 __ csinv(r0, zr, zr, Assembler::EQ);
1765
1766 }
1767 __ bind(done);
1768 }
1769
1770 void TemplateTable::branch(bool is_jsr, bool is_wide)
1771 {
1772 __ profile_taken_branch(r0, r1);
1773 const ByteSize be_offset = MethodCounters::backedge_counter_offset() +
1774 InvocationCounter::counter_offset();
1775 const ByteSize inv_offset = MethodCounters::invocation_counter_offset() +
1776 InvocationCounter::counter_offset();
1777
1778 // load branch displacement
1779 if (!is_wide) {
1780 __ ldrh(r2, at_bcp(1));
1781 __ rev16(r2, r2);
1782 // sign extend the 16 bit value in r2
1783 __ sbfm(r2, r2, 0, 15);
1784 } else {
1785 __ ldrw(r2, at_bcp(1));
1786 __ revw(r2, r2);
1787 // sign extend the 32 bit value in r2
1788 __ sbfm(r2, r2, 0, 31);
1789 }
1790
1791 // Handle all the JSR stuff here, then exit.
1792 // It's much shorter and cleaner than intermingling with the non-JSR
1793 // normal-branch stuff occurring below.
1794
1795 if (is_jsr) {
1796 // Pre-load the next target bytecode into rscratch1
1797 __ load_unsigned_byte(rscratch1, Address(rbcp, r2));
1798 // compute return address as bci
1799 __ ldr(rscratch2, Address(rmethod, Method::const_offset()));
1800 __ add(rscratch2, rscratch2,
1801 in_bytes(ConstMethod::codes_offset()) - (is_wide ? 5 : 3));
1802 __ sub(r1, rbcp, rscratch2);
1803 __ push_i(r1);
1804 // Adjust the bcp by the 16-bit displacement in r2
1805 __ add(rbcp, rbcp, r2);
1806 __ dispatch_only(vtos, /*generate_poll*/true);
1807 return;
1808 }
1809
1810 // Normal (non-jsr) branch handling
1811
1812 // Adjust the bcp by the displacement in r2
1813 __ add(rbcp, rbcp, r2);
1814
1815 assert(UseLoopCounter || !UseOnStackReplacement,
1816 "on-stack-replacement requires loop counters");
1817 Label backedge_counter_overflow;
1818 Label dispatch;
1819 if (UseLoopCounter) {
1820 // increment backedge counter for backward branches
1821 // r0: MDO
1822 // w1: MDO bumped taken-count
1823 // r2: target offset
1824 __ cmp(r2, zr);
1825 __ br(Assembler::GT, dispatch); // count only if backward branch
1826
1827 // ECN: FIXME: This code smells
1828 // check if MethodCounters exists
1829 Label has_counters;
1830 __ ldr(rscratch1, Address(rmethod, Method::method_counters_offset()));
1831 __ cbnz(rscratch1, has_counters);
1832 __ push(r0);
1833 __ push(r1);
1834 __ push(r2);
1835 __ call_VM(noreg, CAST_FROM_FN_PTR(address,
1836 InterpreterRuntime::build_method_counters), rmethod);
1837 __ pop(r2);
1838 __ pop(r1);
1839 __ pop(r0);
1840 __ ldr(rscratch1, Address(rmethod, Method::method_counters_offset()));
1841 __ cbz(rscratch1, dispatch); // No MethodCounters allocated, OutOfMemory
1842 __ bind(has_counters);
1843
1844 Label no_mdo;
1845 int increment = InvocationCounter::count_increment;
1846 if (ProfileInterpreter) {
1847 // Are we profiling?
1848 __ ldr(r1, Address(rmethod, in_bytes(Method::method_data_offset())));
1849 __ cbz(r1, no_mdo);
1850 // Increment the MDO backedge counter
1851 const Address mdo_backedge_counter(r1, in_bytes(MethodData::backedge_counter_offset()) +
1852 in_bytes(InvocationCounter::counter_offset()));
1853 const Address mask(r1, in_bytes(MethodData::backedge_mask_offset()));
1854 __ increment_mask_and_jump(mdo_backedge_counter, increment, mask,
1855 r0, rscratch1, false, Assembler::EQ,
1856 UseOnStackReplacement ? &backedge_counter_overflow : &dispatch);
1857 __ b(dispatch);
1858 }
1859 __ bind(no_mdo);
1860 // Increment backedge counter in MethodCounters*
1861 __ ldr(rscratch1, Address(rmethod, Method::method_counters_offset()));
1862 const Address mask(rscratch1, in_bytes(MethodCounters::backedge_mask_offset()));
1863 __ increment_mask_and_jump(Address(rscratch1, be_offset), increment, mask,
1864 r0, rscratch2, false, Assembler::EQ,
1865 UseOnStackReplacement ? &backedge_counter_overflow : &dispatch);
1866 __ bind(dispatch);
1867 }
1868
1869 // Pre-load the next target bytecode into rscratch1
1870 __ load_unsigned_byte(rscratch1, Address(rbcp, 0));
1871
1872 // continue with the bytecode @ target
1873 // rscratch1: target bytecode
1874 // rbcp: target bcp
1875 __ dispatch_only(vtos, /*generate_poll*/true);
1876
1877 if (UseLoopCounter && UseOnStackReplacement) {
1878 // invocation counter overflow
1879 __ bind(backedge_counter_overflow);
1880 __ neg(r2, r2);
1881 __ add(r2, r2, rbcp); // branch bcp
1882 // IcoResult frequency_counter_overflow([JavaThread*], address branch_bcp)
1883 __ call_VM(noreg,
1884 CAST_FROM_FN_PTR(address,
1885 InterpreterRuntime::frequency_counter_overflow),
1886 r2);
1887 __ load_unsigned_byte(r1, Address(rbcp, 0)); // restore target bytecode
1888
1889 // r0: osr nmethod (osr ok) or null (osr not possible)
1890 // w1: target bytecode
1891 // r2: scratch
1892 __ cbz(r0, dispatch); // test result -- no osr if null
1893 // nmethod may have been invalidated (VM may block upon call_VM return)
1894 __ ldrb(r2, Address(r0, nmethod::state_offset()));
1895 if (nmethod::in_use != 0)
1896 __ sub(r2, r2, nmethod::in_use);
1897 __ cbnz(r2, dispatch);
1898
1899 // We have the address of an on stack replacement routine in r0
1900 // We need to prepare to execute the OSR method. First we must
1901 // migrate the locals and monitors off of the stack.
1902
1903 __ mov(r19, r0); // save the nmethod
1904
1905 call_VM(noreg, CAST_FROM_FN_PTR(address, SharedRuntime::OSR_migration_begin));
1906
1907 // r0 is OSR buffer, move it to expected parameter location
1908 __ mov(j_rarg0, r0);
1909
1910 // remove activation
1911 // get sender esp
1912 __ ldr(esp,
1913 Address(rfp, frame::interpreter_frame_sender_sp_offset * wordSize));
1914 // remove frame anchor
1915 __ leave();
1916 // Ensure compiled code always sees stack at proper alignment
1917 __ andr(sp, esp, -16);
1918
1919 // and begin the OSR nmethod
1920 __ ldr(rscratch1, Address(r19, nmethod::osr_entry_point_offset()));
1921 __ br(rscratch1);
1922 }
1923 }
1924
1925
1926 void TemplateTable::if_0cmp(Condition cc)
1927 {
1928 transition(itos, vtos);
1929 // assume branch is more often taken than not (loops use backward branches)
1930 Label not_taken;
1931 if (cc == equal)
1932 __ cbnzw(r0, not_taken);
1933 else if (cc == not_equal)
1934 __ cbzw(r0, not_taken);
1935 else {
1936 __ andsw(zr, r0, r0);
1937 __ br(j_not(cc), not_taken);
1938 }
1939
1940 branch(false, false);
1941 __ bind(not_taken);
1942 __ profile_not_taken_branch(r0);
1943 }
1944
1945 void TemplateTable::if_icmp(Condition cc)
1946 {
1947 transition(itos, vtos);
1948 // assume branch is more often taken than not (loops use backward branches)
1949 Label not_taken;
1950 __ pop_i(r1);
1951 __ cmpw(r1, r0, Assembler::LSL);
1952 __ br(j_not(cc), not_taken);
1953 branch(false, false);
1954 __ bind(not_taken);
1955 __ profile_not_taken_branch(r0);
1956 }
1957
1958 void TemplateTable::if_nullcmp(Condition cc)
1959 {
1960 transition(atos, vtos);
1961 // assume branch is more often taken than not (loops use backward branches)
1962 Label not_taken;
1963 if (cc == equal)
1964 __ cbnz(r0, not_taken);
1965 else
1966 __ cbz(r0, not_taken);
1967 branch(false, false);
1968 __ bind(not_taken);
1969 __ profile_not_taken_branch(r0);
1970 }
1971
1972 void TemplateTable::if_acmp(Condition cc)
1973 {
1974 transition(atos, vtos);
1975 // assume branch is more often taken than not (loops use backward branches)
1976 Label not_taken;
1977 __ pop_ptr(r1);
1978 __ cmpoop(r1, r0);
1979 __ br(j_not(cc), not_taken);
1980 branch(false, false);
1981 __ bind(not_taken);
1982 __ profile_not_taken_branch(r0);
1983 }
1984
1985 void TemplateTable::ret() {
1986 transition(vtos, vtos);
1987 locals_index(r1);
1988 __ ldr(r1, aaddress(r1)); // get return bci, compute return bcp
1989 __ profile_ret(r1, r2);
1990 __ ldr(rbcp, Address(rmethod, Method::const_offset()));
1991 __ lea(rbcp, Address(rbcp, r1));
1992 __ add(rbcp, rbcp, in_bytes(ConstMethod::codes_offset()));
1993 __ dispatch_next(vtos, 0, /*generate_poll*/true);
1994 }
1995
1996 void TemplateTable::wide_ret() {
1997 transition(vtos, vtos);
1998 locals_index_wide(r1);
1999 __ ldr(r1, aaddress(r1)); // get return bci, compute return bcp
2000 __ profile_ret(r1, r2);
2001 __ ldr(rbcp, Address(rmethod, Method::const_offset()));
2002 __ lea(rbcp, Address(rbcp, r1));
2003 __ add(rbcp, rbcp, in_bytes(ConstMethod::codes_offset()));
2004 __ dispatch_next(vtos, 0, /*generate_poll*/true);
2005 }
2006
2007
2008 void TemplateTable::tableswitch() {
2009 Label default_case, continue_execution;
2010 transition(itos, vtos);
2011 // align rbcp
2012 __ lea(r1, at_bcp(BytesPerInt));
2013 __ andr(r1, r1, -BytesPerInt);
2014 // load lo & hi
2015 __ ldrw(r2, Address(r1, BytesPerInt));
2016 __ ldrw(r3, Address(r1, 2 * BytesPerInt));
2017 __ rev32(r2, r2);
2018 __ rev32(r3, r3);
2019 // check against lo & hi
2020 __ cmpw(r0, r2);
2021 __ br(Assembler::LT, default_case);
2022 __ cmpw(r0, r3);
2023 __ br(Assembler::GT, default_case);
2024 // lookup dispatch offset
2025 __ subw(r0, r0, r2);
2026 __ lea(r3, Address(r1, r0, Address::uxtw(2)));
2027 __ ldrw(r3, Address(r3, 3 * BytesPerInt));
2028 __ profile_switch_case(r0, r1, r2);
2029 // continue execution
2030 __ bind(continue_execution);
2031 __ rev32(r3, r3);
2032 __ load_unsigned_byte(rscratch1, Address(rbcp, r3, Address::sxtw(0)));
2033 __ add(rbcp, rbcp, r3, ext::sxtw);
2034 __ dispatch_only(vtos, /*generate_poll*/true);
2035 // handle default
2036 __ bind(default_case);
2037 __ profile_switch_default(r0);
2038 __ ldrw(r3, Address(r1, 0));
2039 __ b(continue_execution);
2040 }
2041
2042 void TemplateTable::lookupswitch() {
2043 transition(itos, itos);
2044 __ stop("lookupswitch bytecode should have been rewritten");
2045 }
2046
2047 void TemplateTable::fast_linearswitch() {
2048 transition(itos, vtos);
2049 Label loop_entry, loop, found, continue_execution;
2050 // bswap r0 so we can avoid bswapping the table entries
2051 __ rev32(r0, r0);
2052 // align rbcp
2053 __ lea(r19, at_bcp(BytesPerInt)); // btw: should be able to get rid of
2054 // this instruction (change offsets
2055 // below)
2056 __ andr(r19, r19, -BytesPerInt);
2057 // set counter
2058 __ ldrw(r1, Address(r19, BytesPerInt));
2059 __ rev32(r1, r1);
2060 __ b(loop_entry);
2061 // table search
2062 __ bind(loop);
2063 __ lea(rscratch1, Address(r19, r1, Address::lsl(3)));
2064 __ ldrw(rscratch1, Address(rscratch1, 2 * BytesPerInt));
2065 __ cmpw(r0, rscratch1);
2066 __ br(Assembler::EQ, found);
2067 __ bind(loop_entry);
2068 __ subs(r1, r1, 1);
2069 __ br(Assembler::PL, loop);
2070 // default case
2071 __ profile_switch_default(r0);
2072 __ ldrw(r3, Address(r19, 0));
2073 __ b(continue_execution);
2074 // entry found -> get offset
2075 __ bind(found);
2076 __ lea(rscratch1, Address(r19, r1, Address::lsl(3)));
2077 __ ldrw(r3, Address(rscratch1, 3 * BytesPerInt));
2078 __ profile_switch_case(r1, r0, r19);
2079 // continue execution
2080 __ bind(continue_execution);
2081 __ rev32(r3, r3);
2082 __ add(rbcp, rbcp, r3, ext::sxtw);
2083 __ ldrb(rscratch1, Address(rbcp, 0));
2084 __ dispatch_only(vtos, /*generate_poll*/true);
2085 }
2086
2087 void TemplateTable::fast_binaryswitch() {
2088 transition(itos, vtos);
2089 // Implementation using the following core algorithm:
2090 //
2091 // int binary_search(int key, LookupswitchPair* array, int n) {
2092 // // Binary search according to "Methodik des Programmierens" by
2093 // // Edsger W. Dijkstra and W.H.J. Feijen, Addison Wesley Germany 1985.
2094 // int i = 0;
2095 // int j = n;
2096 // while (i+1 < j) {
2097 // // invariant P: 0 <= i < j <= n and (a[i] <= key < a[j] or Q)
2098 // // with Q: for all i: 0 <= i < n: key < a[i]
2099 // // where a stands for the array and assuming that the (inexisting)
2100 // // element a[n] is infinitely big.
2101 // int h = (i + j) >> 1;
2102 // // i < h < j
2103 // if (key < array[h].fast_match()) {
2104 // j = h;
2105 // } else {
2106 // i = h;
2107 // }
2108 // }
2109 // // R: a[i] <= key < a[i+1] or Q
2110 // // (i.e., if key is within array, i is the correct index)
2111 // return i;
2112 // }
2113
2114 // Register allocation
2115 const Register key = r0; // already set (tosca)
2116 const Register array = r1;
2117 const Register i = r2;
2118 const Register j = r3;
2119 const Register h = rscratch1;
2120 const Register temp = rscratch2;
2121
2122 // Find array start
2123 __ lea(array, at_bcp(3 * BytesPerInt)); // btw: should be able to
2124 // get rid of this
2125 // instruction (change
2126 // offsets below)
2127 __ andr(array, array, -BytesPerInt);
2128
2129 // Initialize i & j
2130 __ mov(i, 0); // i = 0;
2131 __ ldrw(j, Address(array, -BytesPerInt)); // j = length(array);
2132
2133 // Convert j into native byteordering
2134 __ rev32(j, j);
2135
2136 // And start
2137 Label entry;
2138 __ b(entry);
2139
2140 // binary search loop
2141 {
2142 Label loop;
2143 __ bind(loop);
2144 // int h = (i + j) >> 1;
2145 __ addw(h, i, j); // h = i + j;
2146 __ lsrw(h, h, 1); // h = (i + j) >> 1;
2147 // if (key < array[h].fast_match()) {
2148 // j = h;
2149 // } else {
2150 // i = h;
2151 // }
2152 // Convert array[h].match to native byte-ordering before compare
2153 __ ldr(temp, Address(array, h, Address::lsl(3)));
2154 __ rev32(temp, temp);
2155 __ cmpw(key, temp);
2156 // j = h if (key < array[h].fast_match())
2157 __ csel(j, h, j, Assembler::LT);
2158 // i = h if (key >= array[h].fast_match())
2159 __ csel(i, h, i, Assembler::GE);
2160 // while (i+1 < j)
2161 __ bind(entry);
2162 __ addw(h, i, 1); // i+1
2163 __ cmpw(h, j); // i+1 < j
2164 __ br(Assembler::LT, loop);
2165 }
2166
2167 // end of binary search, result index is i (must check again!)
2168 Label default_case;
2169 // Convert array[i].match to native byte-ordering before compare
2170 __ ldr(temp, Address(array, i, Address::lsl(3)));
2171 __ rev32(temp, temp);
2172 __ cmpw(key, temp);
2173 __ br(Assembler::NE, default_case);
2174
2175 // entry found -> j = offset
2176 __ add(j, array, i, ext::uxtx, 3);
2177 __ ldrw(j, Address(j, BytesPerInt));
2178 __ profile_switch_case(i, key, array);
2179 __ rev32(j, j);
2180 __ load_unsigned_byte(rscratch1, Address(rbcp, j, Address::sxtw(0)));
2181 __ lea(rbcp, Address(rbcp, j, Address::sxtw(0)));
2182 __ dispatch_only(vtos, /*generate_poll*/true);
2183
2184 // default case -> j = default offset
2185 __ bind(default_case);
2186 __ profile_switch_default(i);
2187 __ ldrw(j, Address(array, -2 * BytesPerInt));
2188 __ rev32(j, j);
2189 __ load_unsigned_byte(rscratch1, Address(rbcp, j, Address::sxtw(0)));
2190 __ lea(rbcp, Address(rbcp, j, Address::sxtw(0)));
2191 __ dispatch_only(vtos, /*generate_poll*/true);
2192 }
2193
2194
2195 void TemplateTable::_return(TosState state)
2196 {
2197 transition(state, state);
2198 assert(_desc->calls_vm(),
2199 "inconsistent calls_vm information"); // call in remove_activation
2200
2201 if (_desc->bytecode() == Bytecodes::_return_register_finalizer) {
2202 assert(state == vtos, "only valid state");
2203
2204 __ ldr(c_rarg1, aaddress(0));
2205 __ load_klass(r3, c_rarg1);
2206 __ ldrw(r3, Address(r3, Klass::access_flags_offset()));
2207 Label skip_register_finalizer;
2208 __ tbz(r3, exact_log2(JVM_ACC_HAS_FINALIZER), skip_register_finalizer);
2209
2210 __ call_VM(noreg, CAST_FROM_FN_PTR(address, InterpreterRuntime::register_finalizer), c_rarg1);
2211
2212 __ bind(skip_register_finalizer);
2213 }
2214
2215 // Issue a StoreStore barrier after all stores but before return
2216 // from any constructor for any class with a final field. We don't
2217 // know if this is a finalizer, so we always do so.
2218 if (_desc->bytecode() == Bytecodes::_return)
2219 __ membar(MacroAssembler::StoreStore);
2220
2221 if (_desc->bytecode() != Bytecodes::_return_register_finalizer) {
2222 Label no_safepoint;
2223 __ ldr(rscratch1, Address(rthread, JavaThread::polling_word_offset()));
2224 __ tbz(rscratch1, log2i_exact(SafepointMechanism::poll_bit()), no_safepoint);
2225 __ push(state);
2226 __ push_cont_fastpath(rthread);
2227 __ call_VM(noreg, CAST_FROM_FN_PTR(address, InterpreterRuntime::at_safepoint));
2228 __ pop_cont_fastpath(rthread);
2229 __ pop(state);
2230 __ bind(no_safepoint);
2231 }
2232
2233 // Narrow result if state is itos but result type is smaller.
2234 // Need to narrow in the return bytecode rather than in generate_return_entry
2235 // since compiled code callers expect the result to already be narrowed.
2236 if (state == itos) {
2237 __ narrow(r0);
2238 }
2239
2240 __ remove_activation(state);
2241 __ ret(lr);
2242 }
2243
2244 // ----------------------------------------------------------------------------
2245 // Volatile variables demand their effects be made known to all CPU's
2246 // in order. Store buffers on most chips allow reads & writes to
2247 // reorder; the JMM's ReadAfterWrite.java test fails in -Xint mode
2248 // without some kind of memory barrier (i.e., it's not sufficient that
2249 // the interpreter does not reorder volatile references, the hardware
2250 // also must not reorder them).
2251 //
2252 // According to the new Java Memory Model (JMM):
2253 // (1) All volatiles are serialized wrt to each other. ALSO reads &
2254 // writes act as acquire & release, so:
2255 // (2) A read cannot let unrelated NON-volatile memory refs that
2256 // happen after the read float up to before the read. It's OK for
2257 // non-volatile memory refs that happen before the volatile read to
2258 // float down below it.
2259 // (3) Similar a volatile write cannot let unrelated NON-volatile
2260 // memory refs that happen BEFORE the write float down to after the
2261 // write. It's OK for non-volatile memory refs that happen after the
2262 // volatile write to float up before it.
2263 //
2264 // We only put in barriers around volatile refs (they are expensive),
2265 // not _between_ memory refs (that would require us to track the
2266 // flavor of the previous memory refs). Requirements (2) and (3)
2267 // require some barriers before volatile stores and after volatile
2268 // loads. These nearly cover requirement (1) but miss the
2269 // volatile-store-volatile-load case. This final case is placed after
2270 // volatile-stores although it could just as well go before
2271 // volatile-loads.
2272
2273 void TemplateTable::resolve_cache_and_index_for_method(int byte_no,
2274 Register Rcache,
2275 Register index) {
2276 const Register temp = r19;
2277 assert_different_registers(Rcache, index, temp);
2278 assert(byte_no == f1_byte || byte_no == f2_byte, "byte_no out of range");
2279
2280 Label resolved, clinit_barrier_slow;
2281
2282 Bytecodes::Code code = bytecode();
2283 __ load_method_entry(Rcache, index);
2284 switch(byte_no) {
2285 case f1_byte:
2286 __ lea(temp, Address(Rcache, in_bytes(ResolvedMethodEntry::bytecode1_offset())));
2287 break;
2288 case f2_byte:
2289 __ lea(temp, Address(Rcache, in_bytes(ResolvedMethodEntry::bytecode2_offset())));
2290 break;
2291 }
2292 // Load-acquire the bytecode to match store-release in InterpreterRuntime
2293 __ ldarb(temp, temp);
2294 __ subs(zr, temp, (int) code); // have we resolved this bytecode?
2295 __ br(Assembler::EQ, resolved);
2296
2297 // resolve first time through
2298 // Class initialization barrier slow path lands here as well.
2299 __ bind(clinit_barrier_slow);
2300 address entry = CAST_FROM_FN_PTR(address, InterpreterRuntime::resolve_from_cache);
2301 __ mov(temp, (int) code);
2302 __ call_VM(noreg, entry, temp);
2303
2304 // Update registers with resolved info
2305 __ load_method_entry(Rcache, index);
2306 // n.b. unlike x86 Rcache is now rcpool plus the indexed offset
2307 // so all clients ofthis method must be modified accordingly
2308 __ bind(resolved);
2309
2310 // Class initialization barrier for static methods
2311 if (VM_Version::supports_fast_class_init_checks() && bytecode() == Bytecodes::_invokestatic) {
2312 __ ldr(temp, Address(Rcache, in_bytes(ResolvedMethodEntry::method_offset())));
2313 __ load_method_holder(temp, temp);
2314 __ clinit_barrier(temp, rscratch1, nullptr, &clinit_barrier_slow);
2315 }
2316 }
2317
2318 void TemplateTable::resolve_cache_and_index_for_field(int byte_no,
2319 Register Rcache,
2320 Register index) {
2321 const Register temp = r19;
2322 assert_different_registers(Rcache, index, temp);
2323
2324 Label resolved, clinit_barrier_slow;
2325
2326 Bytecodes::Code code = bytecode();
2327 switch (code) {
2328 case Bytecodes::_nofast_getfield: code = Bytecodes::_getfield; break;
2329 case Bytecodes::_nofast_putfield: code = Bytecodes::_putfield; break;
2330 default: break;
2331 }
2332
2333 assert(byte_no == f1_byte || byte_no == f2_byte, "byte_no out of range");
2334 __ load_field_entry(Rcache, index);
2335 if (byte_no == f1_byte) {
2336 __ lea(temp, Address(Rcache, in_bytes(ResolvedFieldEntry::get_code_offset())));
2337 } else {
2338 __ lea(temp, Address(Rcache, in_bytes(ResolvedFieldEntry::put_code_offset())));
2339 }
2340 // Load-acquire the bytecode to match store-release in ResolvedFieldEntry::fill_in()
2341 __ ldarb(temp, temp);
2342 __ subs(zr, temp, (int) code); // have we resolved this bytecode?
2343 __ br(Assembler::EQ, resolved);
2344
2345 // resolve first time through
2346 __ bind(clinit_barrier_slow);
2347 address entry = CAST_FROM_FN_PTR(address, InterpreterRuntime::resolve_from_cache);
2348 __ mov(temp, (int) code);
2349 __ call_VM(noreg, entry, temp);
2350
2351 // Update registers with resolved info
2352 __ load_field_entry(Rcache, index);
2353 __ bind(resolved);
2354
2355 // Class initialization barrier for static fields
2356 if (VM_Version::supports_fast_class_init_checks() &&
2357 (bytecode() == Bytecodes::_getstatic || bytecode() == Bytecodes::_putstatic)) {
2358 __ ldr(temp, Address(Rcache, ResolvedFieldEntry::field_holder_offset()));
2359 __ clinit_barrier(temp, rscratch1, nullptr, &clinit_barrier_slow);
2360 }
2361 }
2362
2363 void TemplateTable::load_resolved_field_entry(Register obj,
2364 Register cache,
2365 Register tos_state,
2366 Register offset,
2367 Register flags,
2368 bool is_static = false) {
2369 assert_different_registers(cache, tos_state, flags, offset);
2370
2371 // Field offset
2372 __ load_sized_value(offset, Address(cache, in_bytes(ResolvedFieldEntry::field_offset_offset())), sizeof(int), true /*is_signed*/);
2373
2374 // Flags
2375 __ load_unsigned_byte(flags, Address(cache, in_bytes(ResolvedFieldEntry::flags_offset())));
2376
2377 // TOS state
2378 __ load_unsigned_byte(tos_state, Address(cache, in_bytes(ResolvedFieldEntry::type_offset())));
2379
2380 // Klass overwrite register
2381 if (is_static) {
2382 __ ldr(obj, Address(cache, ResolvedFieldEntry::field_holder_offset()));
2383 const int mirror_offset = in_bytes(Klass::java_mirror_offset());
2384 __ ldr(obj, Address(obj, mirror_offset));
2385 __ resolve_oop_handle(obj, r5, rscratch2);
2386 }
2387 }
2388
2389 void TemplateTable::load_resolved_method_entry_special_or_static(Register cache,
2390 Register method,
2391 Register flags) {
2392
2393 // setup registers
2394 const Register index = flags;
2395 assert_different_registers(method, cache, flags);
2396
2397 // determine constant pool cache field offsets
2398 resolve_cache_and_index_for_method(f1_byte, cache, index);
2399 __ load_unsigned_byte(flags, Address(cache, in_bytes(ResolvedMethodEntry::flags_offset())));
2400 __ ldr(method, Address(cache, in_bytes(ResolvedMethodEntry::method_offset())));
2401 }
2402
2403 void TemplateTable::load_resolved_method_entry_handle(Register cache,
2404 Register method,
2405 Register ref_index,
2406 Register flags) {
2407 // setup registers
2408 const Register index = ref_index;
2409 assert_different_registers(method, flags);
2410 assert_different_registers(method, cache, index);
2411
2412 // determine constant pool cache field offsets
2413 resolve_cache_and_index_for_method(f1_byte, cache, index);
2414 __ load_unsigned_byte(flags, Address(cache, in_bytes(ResolvedMethodEntry::flags_offset())));
2415
2416 // maybe push appendix to arguments (just before return address)
2417 Label L_no_push;
2418 __ tbz(flags, ResolvedMethodEntry::has_appendix_shift, L_no_push);
2419 // invokehandle uses an index into the resolved references array
2420 __ load_unsigned_short(ref_index, Address(cache, in_bytes(ResolvedMethodEntry::resolved_references_index_offset())));
2421 // Push the appendix as a trailing parameter.
2422 // This must be done before we get the receiver,
2423 // since the parameter_size includes it.
2424 Register appendix = method;
2425 __ load_resolved_reference_at_index(appendix, ref_index);
2426 __ push(appendix); // push appendix (MethodType, CallSite, etc.)
2427 __ bind(L_no_push);
2428
2429 __ ldr(method, Address(cache, in_bytes(ResolvedMethodEntry::method_offset())));
2430 }
2431
2432 void TemplateTable::load_resolved_method_entry_interface(Register cache,
2433 Register klass,
2434 Register method_or_table_index,
2435 Register flags) {
2436 // setup registers
2437 const Register index = method_or_table_index;
2438 assert_different_registers(method_or_table_index, cache, flags);
2439
2440 // determine constant pool cache field offsets
2441 resolve_cache_and_index_for_method(f1_byte, cache, index);
2442 __ load_unsigned_byte(flags, Address(cache, in_bytes(ResolvedMethodEntry::flags_offset())));
2443
2444 // Invokeinterface can behave in different ways:
2445 // If calling a method from java.lang.Object, the forced virtual flag is true so the invocation will
2446 // behave like an invokevirtual call. The state of the virtual final flag will determine whether a method or
2447 // vtable index is placed in the register.
2448 // Otherwise, the registers will be populated with the klass and method.
2449
2450 Label NotVirtual; Label NotVFinal; Label Done;
2451 __ tbz(flags, ResolvedMethodEntry::is_forced_virtual_shift, NotVirtual);
2452 __ tbz(flags, ResolvedMethodEntry::is_vfinal_shift, NotVFinal);
2453 __ ldr(method_or_table_index, Address(cache, in_bytes(ResolvedMethodEntry::method_offset())));
2454 __ b(Done);
2455
2456 __ bind(NotVFinal);
2457 __ load_unsigned_short(method_or_table_index, Address(cache, in_bytes(ResolvedMethodEntry::table_index_offset())));
2458 __ b(Done);
2459
2460 __ bind(NotVirtual);
2461 __ ldr(method_or_table_index, Address(cache, in_bytes(ResolvedMethodEntry::method_offset())));
2462 __ ldr(klass, Address(cache, in_bytes(ResolvedMethodEntry::klass_offset())));
2463 __ bind(Done);
2464 }
2465
2466 void TemplateTable::load_resolved_method_entry_virtual(Register cache,
2467 Register method_or_table_index,
2468 Register flags) {
2469 // setup registers
2470 const Register index = flags;
2471 assert_different_registers(method_or_table_index, cache, flags);
2472
2473 // determine constant pool cache field offsets
2474 resolve_cache_and_index_for_method(f2_byte, cache, index);
2475 __ load_unsigned_byte(flags, Address(cache, in_bytes(ResolvedMethodEntry::flags_offset())));
2476
2477 // method_or_table_index can either be an itable index or a method depending on the virtual final flag
2478 Label NotVFinal; Label Done;
2479 __ tbz(flags, ResolvedMethodEntry::is_vfinal_shift, NotVFinal);
2480 __ ldr(method_or_table_index, Address(cache, in_bytes(ResolvedMethodEntry::method_offset())));
2481 __ b(Done);
2482
2483 __ bind(NotVFinal);
2484 __ load_unsigned_short(method_or_table_index, Address(cache, in_bytes(ResolvedMethodEntry::table_index_offset())));
2485 __ bind(Done);
2486 }
2487
2488 // The rmethod register is input and overwritten to be the adapter method for the
2489 // indy call. Link Register (lr) is set to the return address for the adapter and
2490 // an appendix may be pushed to the stack. Registers r0-r3 are clobbered
2491 void TemplateTable::load_invokedynamic_entry(Register method) {
2492 // setup registers
2493 const Register appendix = r0;
2494 const Register cache = r2;
2495 const Register index = r3;
2496 assert_different_registers(method, appendix, cache, index, rcpool);
2497
2498 __ save_bcp();
2499
2500 Label resolved;
2501
2502 __ load_resolved_indy_entry(cache, index);
2503 // Load-acquire the adapter method to match store-release in ResolvedIndyEntry::fill_in()
2504 __ lea(method, Address(cache, in_bytes(ResolvedIndyEntry::method_offset())));
2505 __ ldar(method, method);
2506
2507 // Compare the method to zero
2508 __ cbnz(method, resolved);
2509
2510 Bytecodes::Code code = bytecode();
2511
2512 // Call to the interpreter runtime to resolve invokedynamic
2513 address entry = CAST_FROM_FN_PTR(address, InterpreterRuntime::resolve_from_cache);
2514 __ mov(method, code); // this is essentially Bytecodes::_invokedynamic
2515 __ call_VM(noreg, entry, method);
2516 // Update registers with resolved info
2517 __ load_resolved_indy_entry(cache, index);
2518 // Load-acquire the adapter method to match store-release in ResolvedIndyEntry::fill_in()
2519 __ lea(method, Address(cache, in_bytes(ResolvedIndyEntry::method_offset())));
2520 __ ldar(method, method);
2521
2522 #ifdef ASSERT
2523 __ cbnz(method, resolved);
2524 __ stop("Should be resolved by now");
2525 #endif // ASSERT
2526 __ bind(resolved);
2527
2528 Label L_no_push;
2529 // Check if there is an appendix
2530 __ load_unsigned_byte(index, Address(cache, in_bytes(ResolvedIndyEntry::flags_offset())));
2531 __ tbz(index, ResolvedIndyEntry::has_appendix_shift, L_no_push);
2532
2533 // Get appendix
2534 __ load_unsigned_short(index, Address(cache, in_bytes(ResolvedIndyEntry::resolved_references_index_offset())));
2535 // Push the appendix as a trailing parameter
2536 // since the parameter_size includes it.
2537 __ push(method);
2538 __ mov(method, index);
2539 __ load_resolved_reference_at_index(appendix, method);
2540 __ verify_oop(appendix);
2541 __ pop(method);
2542 __ push(appendix); // push appendix (MethodType, CallSite, etc.)
2543 __ bind(L_no_push);
2544
2545 // compute return type
2546 __ load_unsigned_byte(index, Address(cache, in_bytes(ResolvedIndyEntry::result_type_offset())));
2547 // load return address
2548 // Return address is loaded into link register(lr) and not pushed to the stack
2549 // like x86
2550 {
2551 const address table_addr = (address) Interpreter::invoke_return_entry_table_for(code);
2552 __ mov(rscratch1, table_addr);
2553 __ ldr(lr, Address(rscratch1, index, Address::lsl(3)));
2554 }
2555 }
2556
2557 // The registers cache and index expected to be set before call.
2558 // Correct values of the cache and index registers are preserved.
2559 void TemplateTable::jvmti_post_field_access(Register cache, Register index,
2560 bool is_static, bool has_tos) {
2561 // do the JVMTI work here to avoid disturbing the register state below
2562 // We use c_rarg registers here because we want to use the register used in
2563 // the call to the VM
2564 if (JvmtiExport::can_post_field_access()) {
2565 // Check to see if a field access watch has been set before we
2566 // take the time to call into the VM.
2567 Label L1;
2568 assert_different_registers(cache, index, r0);
2569 __ lea(rscratch1, ExternalAddress((address) JvmtiExport::get_field_access_count_addr()));
2570 __ ldrw(r0, Address(rscratch1));
2571 __ cbzw(r0, L1);
2572
2573 __ load_field_entry(c_rarg2, index);
2574
2575 if (is_static) {
2576 __ mov(c_rarg1, zr); // null object reference
2577 } else {
2578 __ ldr(c_rarg1, at_tos()); // get object pointer without popping it
2579 __ verify_oop(c_rarg1);
2580 }
2581 // c_rarg1: object pointer or null
2582 // c_rarg2: cache entry pointer
2583 __ call_VM(noreg, CAST_FROM_FN_PTR(address,
2584 InterpreterRuntime::post_field_access),
2585 c_rarg1, c_rarg2);
2586 __ load_field_entry(cache, index);
2587 __ bind(L1);
2588 }
2589 }
2590
2591 void TemplateTable::pop_and_check_object(Register r)
2592 {
2593 __ pop_ptr(r);
2594 __ null_check(r); // for field access must check obj.
2595 __ verify_oop(r);
2596 }
2597
2598 void TemplateTable::getfield_or_static(int byte_no, bool is_static, RewriteControl rc)
2599 {
2600 const Register cache = r4;
2601 const Register obj = r4;
2602 const Register index = r3;
2603 const Register tos_state = r3;
2604 const Register off = r19;
2605 const Register flags = r6;
2606 const Register bc = r4; // uses same reg as obj, so don't mix them
2607
2608 resolve_cache_and_index_for_field(byte_no, cache, index);
2609 jvmti_post_field_access(cache, index, is_static, false);
2610 load_resolved_field_entry(obj, cache, tos_state, off, flags, is_static);
2611
2612 if (!is_static) {
2613 // obj is on the stack
2614 pop_and_check_object(obj);
2615 }
2616
2617 // 8179954: We need to make sure that the code generated for
2618 // volatile accesses forms a sequentially-consistent set of
2619 // operations when combined with STLR and LDAR. Without a leading
2620 // membar it's possible for a simple Dekker test to fail if loads
2621 // use LDR;DMB but stores use STLR. This can happen if C2 compiles
2622 // the stores in one method and we interpret the loads in another.
2623 if (!CompilerConfig::is_c1_or_interpreter_only_no_jvmci()){
2624 Label notVolatile;
2625 __ tbz(flags, ResolvedFieldEntry::is_volatile_shift, notVolatile);
2626 __ membar(MacroAssembler::AnyAny);
2627 __ bind(notVolatile);
2628 }
2629
2630 const Address field(obj, off);
2631
2632 Label Done, notByte, notBool, notInt, notShort, notChar,
2633 notLong, notFloat, notObj, notDouble;
2634
2635 assert(btos == 0, "change code, btos != 0");
2636 __ cbnz(tos_state, notByte);
2637
2638 // Don't rewrite getstatic, only getfield
2639 if (is_static) rc = may_not_rewrite;
2640
2641 // btos
2642 __ access_load_at(T_BYTE, IN_HEAP, r0, field, noreg, noreg);
2643 __ push(btos);
2644 // Rewrite bytecode to be faster
2645 if (rc == may_rewrite) {
2646 patch_bytecode(Bytecodes::_fast_bgetfield, bc, r1);
2647 }
2648 __ b(Done);
2649
2650 __ bind(notByte);
2651 __ cmp(tos_state, (u1)ztos);
2652 __ br(Assembler::NE, notBool);
2653
2654 // ztos (same code as btos)
2655 __ access_load_at(T_BOOLEAN, IN_HEAP, r0, field, noreg, noreg);
2656 __ push(ztos);
2657 // Rewrite bytecode to be faster
2658 if (rc == may_rewrite) {
2659 // use btos rewriting, no truncating to t/f bit is needed for getfield.
2660 patch_bytecode(Bytecodes::_fast_bgetfield, bc, r1);
2661 }
2662 __ b(Done);
2663
2664 __ bind(notBool);
2665 __ cmp(tos_state, (u1)atos);
2666 __ br(Assembler::NE, notObj);
2667 // atos
2668 do_oop_load(_masm, field, r0, IN_HEAP);
2669 __ push(atos);
2670 if (rc == may_rewrite) {
2671 patch_bytecode(Bytecodes::_fast_agetfield, bc, r1);
2672 }
2673 __ b(Done);
2674
2675 __ bind(notObj);
2676 __ cmp(tos_state, (u1)itos);
2677 __ br(Assembler::NE, notInt);
2678 // itos
2679 __ access_load_at(T_INT, IN_HEAP, r0, field, noreg, noreg);
2680 __ push(itos);
2681 // Rewrite bytecode to be faster
2682 if (rc == may_rewrite) {
2683 patch_bytecode(Bytecodes::_fast_igetfield, bc, r1);
2684 }
2685 __ b(Done);
2686
2687 __ bind(notInt);
2688 __ cmp(tos_state, (u1)ctos);
2689 __ br(Assembler::NE, notChar);
2690 // ctos
2691 __ access_load_at(T_CHAR, IN_HEAP, r0, field, noreg, noreg);
2692 __ push(ctos);
2693 // Rewrite bytecode to be faster
2694 if (rc == may_rewrite) {
2695 patch_bytecode(Bytecodes::_fast_cgetfield, bc, r1);
2696 }
2697 __ b(Done);
2698
2699 __ bind(notChar);
2700 __ cmp(tos_state, (u1)stos);
2701 __ br(Assembler::NE, notShort);
2702 // stos
2703 __ access_load_at(T_SHORT, IN_HEAP, r0, field, noreg, noreg);
2704 __ push(stos);
2705 // Rewrite bytecode to be faster
2706 if (rc == may_rewrite) {
2707 patch_bytecode(Bytecodes::_fast_sgetfield, bc, r1);
2708 }
2709 __ b(Done);
2710
2711 __ bind(notShort);
2712 __ cmp(tos_state, (u1)ltos);
2713 __ br(Assembler::NE, notLong);
2714 // ltos
2715 __ access_load_at(T_LONG, IN_HEAP, r0, field, noreg, noreg);
2716 __ push(ltos);
2717 // Rewrite bytecode to be faster
2718 if (rc == may_rewrite) {
2719 patch_bytecode(Bytecodes::_fast_lgetfield, bc, r1);
2720 }
2721 __ b(Done);
2722
2723 __ bind(notLong);
2724 __ cmp(tos_state, (u1)ftos);
2725 __ br(Assembler::NE, notFloat);
2726 // ftos
2727 __ access_load_at(T_FLOAT, IN_HEAP, noreg /* ftos */, field, noreg, noreg);
2728 __ push(ftos);
2729 // Rewrite bytecode to be faster
2730 if (rc == may_rewrite) {
2731 patch_bytecode(Bytecodes::_fast_fgetfield, bc, r1);
2732 }
2733 __ b(Done);
2734
2735 __ bind(notFloat);
2736 #ifdef ASSERT
2737 __ cmp(tos_state, (u1)dtos);
2738 __ br(Assembler::NE, notDouble);
2739 #endif
2740 // dtos
2741 __ access_load_at(T_DOUBLE, IN_HEAP, noreg /* ftos */, field, noreg, noreg);
2742 __ push(dtos);
2743 // Rewrite bytecode to be faster
2744 if (rc == may_rewrite) {
2745 patch_bytecode(Bytecodes::_fast_dgetfield, bc, r1);
2746 }
2747 #ifdef ASSERT
2748 __ b(Done);
2749
2750 __ bind(notDouble);
2751 __ stop("Bad state");
2752 #endif
2753
2754 __ bind(Done);
2755
2756 Label notVolatile;
2757 __ tbz(flags, ResolvedFieldEntry::is_volatile_shift, notVolatile);
2758 __ membar(MacroAssembler::LoadLoad | MacroAssembler::LoadStore);
2759 __ bind(notVolatile);
2760 }
2761
2762
2763 void TemplateTable::getfield(int byte_no)
2764 {
2765 getfield_or_static(byte_no, false);
2766 }
2767
2768 void TemplateTable::nofast_getfield(int byte_no) {
2769 getfield_or_static(byte_no, false, may_not_rewrite);
2770 }
2771
2772 void TemplateTable::getstatic(int byte_no)
2773 {
2774 getfield_or_static(byte_no, true);
2775 }
2776
2777 // The registers cache and index expected to be set before call.
2778 // The function may destroy various registers, just not the cache and index registers.
2779 void TemplateTable::jvmti_post_field_mod(Register cache, Register index, bool is_static) {
2780 transition(vtos, vtos);
2781
2782 if (JvmtiExport::can_post_field_modification()) {
2783 // Check to see if a field modification watch has been set before
2784 // we take the time to call into the VM.
2785 Label L1;
2786 assert_different_registers(cache, index, r0);
2787 __ lea(rscratch1, ExternalAddress((address)JvmtiExport::get_field_modification_count_addr()));
2788 __ ldrw(r0, Address(rscratch1));
2789 __ cbz(r0, L1);
2790
2791 __ mov(c_rarg2, cache);
2792
2793 if (is_static) {
2794 // Life is simple. Null out the object pointer.
2795 __ mov(c_rarg1, zr);
2796 } else {
2797 // Life is harder. The stack holds the value on top, followed by
2798 // the object. We don't know the size of the value, though; it
2799 // could be one or two words depending on its type. As a result,
2800 // we must find the type to determine where the object is.
2801 __ load_unsigned_byte(c_rarg3, Address(c_rarg2, in_bytes(ResolvedFieldEntry::type_offset())));
2802 Label nope2, done, ok;
2803 __ ldr(c_rarg1, at_tos_p1()); // initially assume a one word jvalue
2804 __ cmpw(c_rarg3, ltos);
2805 __ br(Assembler::EQ, ok);
2806 __ cmpw(c_rarg3, dtos);
2807 __ br(Assembler::NE, nope2);
2808 __ bind(ok);
2809 __ ldr(c_rarg1, at_tos_p2()); // ltos (two word jvalue)
2810 __ bind(nope2);
2811 }
2812 // object (tos)
2813 __ mov(c_rarg3, esp);
2814 // c_rarg1: object pointer set up above (null if static)
2815 // c_rarg2: cache entry pointer
2816 // c_rarg3: jvalue object on the stack
2817 __ call_VM(noreg,
2818 CAST_FROM_FN_PTR(address,
2819 InterpreterRuntime::post_field_modification),
2820 c_rarg1, c_rarg2, c_rarg3);
2821 __ load_field_entry(cache, index);
2822 __ bind(L1);
2823 }
2824 }
2825
2826 void TemplateTable::putfield_or_static(int byte_no, bool is_static, RewriteControl rc) {
2827 transition(vtos, vtos);
2828
2829 const Register cache = r2;
2830 const Register index = r3;
2831 const Register tos_state = r3;
2832 const Register obj = r2;
2833 const Register off = r19;
2834 const Register flags = r0;
2835 const Register bc = r4;
2836
2837 resolve_cache_and_index_for_field(byte_no, cache, index);
2838 jvmti_post_field_mod(cache, index, is_static);
2839 load_resolved_field_entry(obj, cache, tos_state, off, flags, is_static);
2840
2841 Label Done;
2842 __ mov(r5, flags);
2843
2844 {
2845 Label notVolatile;
2846 __ tbz(r5, ResolvedFieldEntry::is_volatile_shift, notVolatile);
2847 __ membar(MacroAssembler::StoreStore | MacroAssembler::LoadStore);
2848 __ bind(notVolatile);
2849 }
2850
2851 // field address
2852 const Address field(obj, off);
2853
2854 Label notByte, notBool, notInt, notShort, notChar,
2855 notLong, notFloat, notObj, notDouble;
2856
2857 assert(btos == 0, "change code, btos != 0");
2858 __ cbnz(tos_state, notByte);
2859
2860 // Don't rewrite putstatic, only putfield
2861 if (is_static) rc = may_not_rewrite;
2862
2863 // btos
2864 {
2865 __ pop(btos);
2866 if (!is_static) pop_and_check_object(obj);
2867 __ access_store_at(T_BYTE, IN_HEAP, field, r0, noreg, noreg, noreg);
2868 if (rc == may_rewrite) {
2869 patch_bytecode(Bytecodes::_fast_bputfield, bc, r1, true, byte_no);
2870 }
2871 __ b(Done);
2872 }
2873
2874 __ bind(notByte);
2875 __ cmp(tos_state, (u1)ztos);
2876 __ br(Assembler::NE, notBool);
2877
2878 // ztos
2879 {
2880 __ pop(ztos);
2881 if (!is_static) pop_and_check_object(obj);
2882 __ access_store_at(T_BOOLEAN, IN_HEAP, field, r0, noreg, noreg, noreg);
2883 if (rc == may_rewrite) {
2884 patch_bytecode(Bytecodes::_fast_zputfield, bc, r1, true, byte_no);
2885 }
2886 __ b(Done);
2887 }
2888
2889 __ bind(notBool);
2890 __ cmp(tos_state, (u1)atos);
2891 __ br(Assembler::NE, notObj);
2892
2893 // atos
2894 {
2895 __ pop(atos);
2896 if (!is_static) pop_and_check_object(obj);
2897 // Store into the field
2898 do_oop_store(_masm, field, r0, IN_HEAP);
2899 if (rc == may_rewrite) {
2900 patch_bytecode(Bytecodes::_fast_aputfield, bc, r1, true, byte_no);
2901 }
2902 __ b(Done);
2903 }
2904
2905 __ bind(notObj);
2906 __ cmp(tos_state, (u1)itos);
2907 __ br(Assembler::NE, notInt);
2908
2909 // itos
2910 {
2911 __ pop(itos);
2912 if (!is_static) pop_and_check_object(obj);
2913 __ access_store_at(T_INT, IN_HEAP, field, r0, noreg, noreg, noreg);
2914 if (rc == may_rewrite) {
2915 patch_bytecode(Bytecodes::_fast_iputfield, bc, r1, true, byte_no);
2916 }
2917 __ b(Done);
2918 }
2919
2920 __ bind(notInt);
2921 __ cmp(tos_state, (u1)ctos);
2922 __ br(Assembler::NE, notChar);
2923
2924 // ctos
2925 {
2926 __ pop(ctos);
2927 if (!is_static) pop_and_check_object(obj);
2928 __ access_store_at(T_CHAR, IN_HEAP, field, r0, noreg, noreg, noreg);
2929 if (rc == may_rewrite) {
2930 patch_bytecode(Bytecodes::_fast_cputfield, bc, r1, true, byte_no);
2931 }
2932 __ b(Done);
2933 }
2934
2935 __ bind(notChar);
2936 __ cmp(tos_state, (u1)stos);
2937 __ br(Assembler::NE, notShort);
2938
2939 // stos
2940 {
2941 __ pop(stos);
2942 if (!is_static) pop_and_check_object(obj);
2943 __ access_store_at(T_SHORT, IN_HEAP, field, r0, noreg, noreg, noreg);
2944 if (rc == may_rewrite) {
2945 patch_bytecode(Bytecodes::_fast_sputfield, bc, r1, true, byte_no);
2946 }
2947 __ b(Done);
2948 }
2949
2950 __ bind(notShort);
2951 __ cmp(tos_state, (u1)ltos);
2952 __ br(Assembler::NE, notLong);
2953
2954 // ltos
2955 {
2956 __ pop(ltos);
2957 if (!is_static) pop_and_check_object(obj);
2958 __ access_store_at(T_LONG, IN_HEAP, field, r0, noreg, noreg, noreg);
2959 if (rc == may_rewrite) {
2960 patch_bytecode(Bytecodes::_fast_lputfield, bc, r1, true, byte_no);
2961 }
2962 __ b(Done);
2963 }
2964
2965 __ bind(notLong);
2966 __ cmp(tos_state, (u1)ftos);
2967 __ br(Assembler::NE, notFloat);
2968
2969 // ftos
2970 {
2971 __ pop(ftos);
2972 if (!is_static) pop_and_check_object(obj);
2973 __ access_store_at(T_FLOAT, IN_HEAP, field, noreg /* ftos */, noreg, noreg, noreg);
2974 if (rc == may_rewrite) {
2975 patch_bytecode(Bytecodes::_fast_fputfield, bc, r1, true, byte_no);
2976 }
2977 __ b(Done);
2978 }
2979
2980 __ bind(notFloat);
2981 #ifdef ASSERT
2982 __ cmp(tos_state, (u1)dtos);
2983 __ br(Assembler::NE, notDouble);
2984 #endif
2985
2986 // dtos
2987 {
2988 __ pop(dtos);
2989 if (!is_static) pop_and_check_object(obj);
2990 __ access_store_at(T_DOUBLE, IN_HEAP, field, noreg /* dtos */, noreg, noreg, noreg);
2991 if (rc == may_rewrite) {
2992 patch_bytecode(Bytecodes::_fast_dputfield, bc, r1, true, byte_no);
2993 }
2994 }
2995
2996 #ifdef ASSERT
2997 __ b(Done);
2998
2999 __ bind(notDouble);
3000 __ stop("Bad state");
3001 #endif
3002
3003 __ bind(Done);
3004
3005 {
3006 Label notVolatile;
3007 __ tbz(r5, ResolvedFieldEntry::is_volatile_shift, notVolatile);
3008 __ membar(MacroAssembler::StoreLoad | MacroAssembler::StoreStore);
3009 __ bind(notVolatile);
3010 }
3011 }
3012
3013 void TemplateTable::putfield(int byte_no)
3014 {
3015 putfield_or_static(byte_no, false);
3016 }
3017
3018 void TemplateTable::nofast_putfield(int byte_no) {
3019 putfield_or_static(byte_no, false, may_not_rewrite);
3020 }
3021
3022 void TemplateTable::putstatic(int byte_no) {
3023 putfield_or_static(byte_no, true);
3024 }
3025
3026 void TemplateTable::jvmti_post_fast_field_mod() {
3027 if (JvmtiExport::can_post_field_modification()) {
3028 // Check to see if a field modification watch has been set before
3029 // we take the time to call into the VM.
3030 Label L2;
3031 __ lea(rscratch1, ExternalAddress((address)JvmtiExport::get_field_modification_count_addr()));
3032 __ ldrw(c_rarg3, Address(rscratch1));
3033 __ cbzw(c_rarg3, L2);
3034 __ pop_ptr(r19); // copy the object pointer from tos
3035 __ verify_oop(r19);
3036 __ push_ptr(r19); // put the object pointer back on tos
3037 // Save tos values before call_VM() clobbers them. Since we have
3038 // to do it for every data type, we use the saved values as the
3039 // jvalue object.
3040 switch (bytecode()) { // load values into the jvalue object
3041 case Bytecodes::_fast_aputfield: __ push_ptr(r0); break;
3042 case Bytecodes::_fast_bputfield: // fall through
3043 case Bytecodes::_fast_zputfield: // fall through
3044 case Bytecodes::_fast_sputfield: // fall through
3045 case Bytecodes::_fast_cputfield: // fall through
3046 case Bytecodes::_fast_iputfield: __ push_i(r0); break;
3047 case Bytecodes::_fast_dputfield: __ push_d(); break;
3048 case Bytecodes::_fast_fputfield: __ push_f(); break;
3049 case Bytecodes::_fast_lputfield: __ push_l(r0); break;
3050
3051 default:
3052 ShouldNotReachHere();
3053 }
3054 __ mov(c_rarg3, esp); // points to jvalue on the stack
3055 // access constant pool cache entry
3056 __ load_field_entry(c_rarg2, r0);
3057 __ verify_oop(r19);
3058 // r19: object pointer copied above
3059 // c_rarg2: cache entry pointer
3060 // c_rarg3: jvalue object on the stack
3061 __ call_VM(noreg,
3062 CAST_FROM_FN_PTR(address,
3063 InterpreterRuntime::post_field_modification),
3064 r19, c_rarg2, c_rarg3);
3065
3066 switch (bytecode()) { // restore tos values
3067 case Bytecodes::_fast_aputfield: __ pop_ptr(r0); break;
3068 case Bytecodes::_fast_bputfield: // fall through
3069 case Bytecodes::_fast_zputfield: // fall through
3070 case Bytecodes::_fast_sputfield: // fall through
3071 case Bytecodes::_fast_cputfield: // fall through
3072 case Bytecodes::_fast_iputfield: __ pop_i(r0); break;
3073 case Bytecodes::_fast_dputfield: __ pop_d(); break;
3074 case Bytecodes::_fast_fputfield: __ pop_f(); break;
3075 case Bytecodes::_fast_lputfield: __ pop_l(r0); break;
3076 default: break;
3077 }
3078 __ bind(L2);
3079 }
3080 }
3081
3082 void TemplateTable::fast_storefield(TosState state)
3083 {
3084 transition(state, vtos);
3085
3086 ByteSize base = ConstantPoolCache::base_offset();
3087
3088 jvmti_post_fast_field_mod();
3089
3090 // access constant pool cache
3091 __ load_field_entry(r2, r1);
3092 __ push(r0);
3093 // R1: field offset, R2: TOS, R3: flags
3094 load_resolved_field_entry(r2, r2, r0, r1, r3);
3095 __ pop(r0);
3096
3097 // Must prevent reordering of the following cp cache loads with bytecode load
3098 __ membar(MacroAssembler::LoadLoad);
3099
3100 {
3101 Label notVolatile;
3102 __ tbz(r3, ResolvedFieldEntry::is_volatile_shift, notVolatile);
3103 __ membar(MacroAssembler::StoreStore | MacroAssembler::LoadStore);
3104 __ bind(notVolatile);
3105 }
3106
3107 Label notVolatile;
3108
3109 // Get object from stack
3110 pop_and_check_object(r2);
3111
3112 // field address
3113 const Address field(r2, r1);
3114
3115 // access field
3116 switch (bytecode()) {
3117 case Bytecodes::_fast_aputfield:
3118 do_oop_store(_masm, field, r0, IN_HEAP);
3119 break;
3120 case Bytecodes::_fast_lputfield:
3121 __ access_store_at(T_LONG, IN_HEAP, field, r0, noreg, noreg, noreg);
3122 break;
3123 case Bytecodes::_fast_iputfield:
3124 __ access_store_at(T_INT, IN_HEAP, field, r0, noreg, noreg, noreg);
3125 break;
3126 case Bytecodes::_fast_zputfield:
3127 __ access_store_at(T_BOOLEAN, IN_HEAP, field, r0, noreg, noreg, noreg);
3128 break;
3129 case Bytecodes::_fast_bputfield:
3130 __ access_store_at(T_BYTE, IN_HEAP, field, r0, noreg, noreg, noreg);
3131 break;
3132 case Bytecodes::_fast_sputfield:
3133 __ access_store_at(T_SHORT, IN_HEAP, field, r0, noreg, noreg, noreg);
3134 break;
3135 case Bytecodes::_fast_cputfield:
3136 __ access_store_at(T_CHAR, IN_HEAP, field, r0, noreg, noreg, noreg);
3137 break;
3138 case Bytecodes::_fast_fputfield:
3139 __ access_store_at(T_FLOAT, IN_HEAP, field, noreg /* ftos */, noreg, noreg, noreg);
3140 break;
3141 case Bytecodes::_fast_dputfield:
3142 __ access_store_at(T_DOUBLE, IN_HEAP, field, noreg /* dtos */, noreg, noreg, noreg);
3143 break;
3144 default:
3145 ShouldNotReachHere();
3146 }
3147
3148 {
3149 Label notVolatile;
3150 __ tbz(r3, ResolvedFieldEntry::is_volatile_shift, notVolatile);
3151 __ membar(MacroAssembler::StoreLoad | MacroAssembler::StoreStore);
3152 __ bind(notVolatile);
3153 }
3154 }
3155
3156
3157 void TemplateTable::fast_accessfield(TosState state)
3158 {
3159 transition(atos, state);
3160 // Do the JVMTI work here to avoid disturbing the register state below
3161 if (JvmtiExport::can_post_field_access()) {
3162 // Check to see if a field access watch has been set before we
3163 // take the time to call into the VM.
3164 Label L1;
3165 __ lea(rscratch1, ExternalAddress((address) JvmtiExport::get_field_access_count_addr()));
3166 __ ldrw(r2, Address(rscratch1));
3167 __ cbzw(r2, L1);
3168 // access constant pool cache entry
3169 __ load_field_entry(c_rarg2, rscratch2);
3170 __ verify_oop(r0);
3171 __ push_ptr(r0); // save object pointer before call_VM() clobbers it
3172 __ mov(c_rarg1, r0);
3173 // c_rarg1: object pointer copied above
3174 // c_rarg2: cache entry pointer
3175 __ call_VM(noreg,
3176 CAST_FROM_FN_PTR(address,
3177 InterpreterRuntime::post_field_access),
3178 c_rarg1, c_rarg2);
3179 __ pop_ptr(r0); // restore object pointer
3180 __ bind(L1);
3181 }
3182
3183 // access constant pool cache
3184 __ load_field_entry(r2, r1);
3185
3186 // Must prevent reordering of the following cp cache loads with bytecode load
3187 __ membar(MacroAssembler::LoadLoad);
3188
3189 __ load_sized_value(r1, Address(r2, in_bytes(ResolvedFieldEntry::field_offset_offset())), sizeof(int), true /*is_signed*/);
3190 __ load_unsigned_byte(r3, Address(r2, in_bytes(ResolvedFieldEntry::flags_offset())));
3191
3192 // r0: object
3193 __ verify_oop(r0);
3194 __ null_check(r0);
3195 const Address field(r0, r1);
3196
3197 // 8179954: We need to make sure that the code generated for
3198 // volatile accesses forms a sequentially-consistent set of
3199 // operations when combined with STLR and LDAR. Without a leading
3200 // membar it's possible for a simple Dekker test to fail if loads
3201 // use LDR;DMB but stores use STLR. This can happen if C2 compiles
3202 // the stores in one method and we interpret the loads in another.
3203 if (!CompilerConfig::is_c1_or_interpreter_only_no_jvmci()) {
3204 Label notVolatile;
3205 __ tbz(r3, ResolvedFieldEntry::is_volatile_shift, notVolatile);
3206 __ membar(MacroAssembler::AnyAny);
3207 __ bind(notVolatile);
3208 }
3209
3210 // access field
3211 switch (bytecode()) {
3212 case Bytecodes::_fast_agetfield:
3213 do_oop_load(_masm, field, r0, IN_HEAP);
3214 __ verify_oop(r0);
3215 break;
3216 case Bytecodes::_fast_lgetfield:
3217 __ access_load_at(T_LONG, IN_HEAP, r0, field, noreg, noreg);
3218 break;
3219 case Bytecodes::_fast_igetfield:
3220 __ access_load_at(T_INT, IN_HEAP, r0, field, noreg, noreg);
3221 break;
3222 case Bytecodes::_fast_bgetfield:
3223 __ access_load_at(T_BYTE, IN_HEAP, r0, field, noreg, noreg);
3224 break;
3225 case Bytecodes::_fast_sgetfield:
3226 __ access_load_at(T_SHORT, IN_HEAP, r0, field, noreg, noreg);
3227 break;
3228 case Bytecodes::_fast_cgetfield:
3229 __ access_load_at(T_CHAR, IN_HEAP, r0, field, noreg, noreg);
3230 break;
3231 case Bytecodes::_fast_fgetfield:
3232 __ access_load_at(T_FLOAT, IN_HEAP, noreg /* ftos */, field, noreg, noreg);
3233 break;
3234 case Bytecodes::_fast_dgetfield:
3235 __ access_load_at(T_DOUBLE, IN_HEAP, noreg /* dtos */, field, noreg, noreg);
3236 break;
3237 default:
3238 ShouldNotReachHere();
3239 }
3240 {
3241 Label notVolatile;
3242 __ tbz(r3, ResolvedFieldEntry::is_volatile_shift, notVolatile);
3243 __ membar(MacroAssembler::LoadLoad | MacroAssembler::LoadStore);
3244 __ bind(notVolatile);
3245 }
3246 }
3247
3248 void TemplateTable::fast_xaccess(TosState state)
3249 {
3250 transition(vtos, state);
3251
3252 // get receiver
3253 __ ldr(r0, aaddress(0));
3254 // access constant pool cache
3255 __ load_field_entry(r2, r3, 2);
3256 __ load_sized_value(r1, Address(r2, in_bytes(ResolvedFieldEntry::field_offset_offset())), sizeof(int), true /*is_signed*/);
3257
3258 // 8179954: We need to make sure that the code generated for
3259 // volatile accesses forms a sequentially-consistent set of
3260 // operations when combined with STLR and LDAR. Without a leading
3261 // membar it's possible for a simple Dekker test to fail if loads
3262 // use LDR;DMB but stores use STLR. This can happen if C2 compiles
3263 // the stores in one method and we interpret the loads in another.
3264 if (!CompilerConfig::is_c1_or_interpreter_only_no_jvmci()) {
3265 Label notVolatile;
3266 __ load_unsigned_byte(r3, Address(r2, in_bytes(ResolvedFieldEntry::flags_offset())));
3267 __ tbz(r3, ResolvedFieldEntry::is_volatile_shift, notVolatile);
3268 __ membar(MacroAssembler::AnyAny);
3269 __ bind(notVolatile);
3270 }
3271
3272 // make sure exception is reported in correct bcp range (getfield is
3273 // next instruction)
3274 __ increment(rbcp);
3275 __ null_check(r0);
3276 switch (state) {
3277 case itos:
3278 __ access_load_at(T_INT, IN_HEAP, r0, Address(r0, r1, Address::lsl(0)), noreg, noreg);
3279 break;
3280 case atos:
3281 do_oop_load(_masm, Address(r0, r1, Address::lsl(0)), r0, IN_HEAP);
3282 __ verify_oop(r0);
3283 break;
3284 case ftos:
3285 __ access_load_at(T_FLOAT, IN_HEAP, noreg /* ftos */, Address(r0, r1, Address::lsl(0)), noreg, noreg);
3286 break;
3287 default:
3288 ShouldNotReachHere();
3289 }
3290
3291 {
3292 Label notVolatile;
3293 __ load_unsigned_byte(r3, Address(r2, in_bytes(ResolvedFieldEntry::flags_offset())));
3294 __ tbz(r3, ResolvedFieldEntry::is_volatile_shift, notVolatile);
3295 __ membar(MacroAssembler::LoadLoad | MacroAssembler::LoadStore);
3296 __ bind(notVolatile);
3297 }
3298
3299 __ decrement(rbcp);
3300 }
3301
3302
3303
3304 //-----------------------------------------------------------------------------
3305 // Calls
3306
3307 void TemplateTable::prepare_invoke(Register cache, Register recv) {
3308
3309 Bytecodes::Code code = bytecode();
3310 const bool load_receiver = (code != Bytecodes::_invokestatic) && (code != Bytecodes::_invokedynamic);
3311
3312 // save 'interpreter return address'
3313 __ save_bcp();
3314
3315 // Load TOS state for later
3316 __ load_unsigned_byte(rscratch2, Address(cache, in_bytes(ResolvedMethodEntry::type_offset())));
3317
3318 // load receiver if needed (note: no return address pushed yet)
3319 if (load_receiver) {
3320 __ load_unsigned_short(recv, Address(cache, in_bytes(ResolvedMethodEntry::num_parameters_offset())));
3321 __ add(rscratch1, esp, recv, ext::uxtx, 3);
3322 __ ldr(recv, Address(rscratch1, -Interpreter::expr_offset_in_bytes(1)));
3323 __ verify_oop(recv);
3324 }
3325
3326 // load return address
3327 {
3328 const address table_addr = (address) Interpreter::invoke_return_entry_table_for(code);
3329 __ mov(rscratch1, table_addr);
3330 __ ldr(lr, Address(rscratch1, rscratch2, Address::lsl(3)));
3331 }
3332 }
3333
3334
3335 void TemplateTable::invokevirtual_helper(Register index,
3336 Register recv,
3337 Register flags)
3338 {
3339 // Uses temporary registers r0, r3
3340 assert_different_registers(index, recv, r0, r3);
3341 // Test for an invoke of a final method
3342 Label notFinal;
3343 __ tbz(flags, ResolvedMethodEntry::is_vfinal_shift, notFinal);
3344
3345 const Register method = index; // method must be rmethod
3346 assert(method == rmethod,
3347 "Method must be rmethod for interpreter calling convention");
3348
3349 // do the call - the index is actually the method to call
3350 // that is, f2 is a vtable index if !is_vfinal, else f2 is a Method*
3351
3352 // It's final, need a null check here!
3353 __ null_check(recv);
3354
3355 // profile this call
3356 __ profile_final_call(r0);
3357 __ profile_arguments_type(r0, method, r4, true);
3358
3359 __ jump_from_interpreted(method, r0);
3360
3361 __ bind(notFinal);
3362
3363 // get receiver klass
3364 __ load_klass(r0, recv);
3365
3366 // profile this call
3367 __ profile_virtual_call(r0, rlocals, r3);
3368
3369 // get target Method & entry point
3370 __ lookup_virtual_method(r0, index, method);
3371 __ profile_arguments_type(r3, method, r4, true);
3372 // FIXME -- this looks completely redundant. is it?
3373 // __ ldr(r3, Address(method, Method::interpreter_entry_offset()));
3374 __ jump_from_interpreted(method, r3);
3375 }
3376
3377 void TemplateTable::invokevirtual(int byte_no)
3378 {
3379 transition(vtos, vtos);
3380 assert(byte_no == f2_byte, "use this argument");
3381
3382 load_resolved_method_entry_virtual(r2, // ResolvedMethodEntry*
3383 rmethod, // Method* or itable index
3384 r3); // flags
3385 prepare_invoke(r2, r2); // recv
3386
3387 // rmethod: index (actually a Method*)
3388 // r2: receiver
3389 // r3: flags
3390
3391 invokevirtual_helper(rmethod, r2, r3);
3392 }
3393
3394 void TemplateTable::invokespecial(int byte_no)
3395 {
3396 transition(vtos, vtos);
3397 assert(byte_no == f1_byte, "use this argument");
3398
3399 load_resolved_method_entry_special_or_static(r2, // ResolvedMethodEntry*
3400 rmethod, // Method*
3401 r3); // flags
3402 prepare_invoke(r2, r2); // get receiver also for null check
3403 __ verify_oop(r2);
3404 __ null_check(r2);
3405 // do the call
3406 __ profile_call(r0);
3407 __ profile_arguments_type(r0, rmethod, rbcp, false);
3408 __ jump_from_interpreted(rmethod, r0);
3409 }
3410
3411 void TemplateTable::invokestatic(int byte_no)
3412 {
3413 transition(vtos, vtos);
3414 assert(byte_no == f1_byte, "use this argument");
3415
3416 load_resolved_method_entry_special_or_static(r2, // ResolvedMethodEntry*
3417 rmethod, // Method*
3418 r3); // flags
3419 prepare_invoke(r2, r2); // get receiver also for null check
3420
3421 // do the call
3422 __ profile_call(r0);
3423 __ profile_arguments_type(r0, rmethod, r4, false);
3424 __ jump_from_interpreted(rmethod, r0);
3425 }
3426
3427 void TemplateTable::fast_invokevfinal(int byte_no)
3428 {
3429 __ call_Unimplemented();
3430 }
3431
3432 void TemplateTable::invokeinterface(int byte_no) {
3433 transition(vtos, vtos);
3434 assert(byte_no == f1_byte, "use this argument");
3435
3436 load_resolved_method_entry_interface(r2, // ResolvedMethodEntry*
3437 r0, // Klass*
3438 rmethod, // Method* or itable/vtable index
3439 r3); // flags
3440 prepare_invoke(r2, r2); // receiver
3441
3442 // r0: interface klass (from f1)
3443 // rmethod: method (from f2)
3444 // r2: receiver
3445 // r3: flags
3446
3447 // First check for Object case, then private interface method,
3448 // then regular interface method.
3449
3450 // Special case of invokeinterface called for virtual method of
3451 // java.lang.Object. See cpCache.cpp for details.
3452 Label notObjectMethod;
3453 __ tbz(r3, ResolvedMethodEntry::is_forced_virtual_shift, notObjectMethod);
3454
3455 invokevirtual_helper(rmethod, r2, r3);
3456 __ bind(notObjectMethod);
3457
3458 Label no_such_interface;
3459
3460 // Check for private method invocation - indicated by vfinal
3461 Label notVFinal;
3462 __ tbz(r3, ResolvedMethodEntry::is_vfinal_shift, notVFinal);
3463
3464 // Get receiver klass into r3
3465 __ load_klass(r3, r2);
3466
3467 Label subtype;
3468 __ check_klass_subtype(r3, r0, r4, subtype);
3469 // If we get here the typecheck failed
3470 __ b(no_such_interface);
3471 __ bind(subtype);
3472
3473 __ profile_final_call(r0);
3474 __ profile_arguments_type(r0, rmethod, r4, true);
3475 __ jump_from_interpreted(rmethod, r0);
3476
3477 __ bind(notVFinal);
3478
3479 // Get receiver klass into r3
3480 __ restore_locals();
3481 __ load_klass(r3, r2);
3482
3483 Label no_such_method;
3484
3485 // Preserve method for throw_AbstractMethodErrorVerbose.
3486 __ mov(r16, rmethod);
3487 // Receiver subtype check against REFC.
3488 // Superklass in r0. Subklass in r3. Blows rscratch2, r13
3489 __ lookup_interface_method(// inputs: rec. class, interface, itable index
3490 r3, r0, noreg,
3491 // outputs: scan temp. reg, scan temp. reg
3492 rscratch2, r13,
3493 no_such_interface,
3494 /*return_method=*/false);
3495
3496 // profile this call
3497 __ profile_virtual_call(r3, r13, r19);
3498
3499 // Get declaring interface class from method, and itable index
3500
3501 __ load_method_holder(r0, rmethod);
3502 __ ldrw(rmethod, Address(rmethod, Method::itable_index_offset()));
3503 __ subw(rmethod, rmethod, Method::itable_index_max);
3504 __ negw(rmethod, rmethod);
3505
3506 // Preserve recvKlass for throw_AbstractMethodErrorVerbose.
3507 __ mov(rlocals, r3);
3508 __ lookup_interface_method(// inputs: rec. class, interface, itable index
3509 rlocals, r0, rmethod,
3510 // outputs: method, scan temp. reg
3511 rmethod, r13,
3512 no_such_interface);
3513
3514 // rmethod,: Method to call
3515 // r2: receiver
3516 // Check for abstract method error
3517 // Note: This should be done more efficiently via a throw_abstract_method_error
3518 // interpreter entry point and a conditional jump to it in case of a null
3519 // method.
3520 __ cbz(rmethod, no_such_method);
3521
3522 __ profile_arguments_type(r3, rmethod, r13, true);
3523
3524 // do the call
3525 // r2: receiver
3526 // rmethod,: Method
3527 __ jump_from_interpreted(rmethod, r3);
3528 __ should_not_reach_here();
3529
3530 // exception handling code follows...
3531 // note: must restore interpreter registers to canonical
3532 // state for exception handling to work correctly!
3533
3534 __ bind(no_such_method);
3535 // throw exception
3536 __ restore_bcp(); // bcp must be correct for exception handler (was destroyed)
3537 __ restore_locals(); // make sure locals pointer is correct as well (was destroyed)
3538 // Pass arguments for generating a verbose error message.
3539 __ call_VM(noreg, CAST_FROM_FN_PTR(address, InterpreterRuntime::throw_AbstractMethodErrorVerbose), r3, r16);
3540 // the call_VM checks for exception, so we should never return here.
3541 __ should_not_reach_here();
3542
3543 __ bind(no_such_interface);
3544 // throw exception
3545 __ restore_bcp(); // bcp must be correct for exception handler (was destroyed)
3546 __ restore_locals(); // make sure locals pointer is correct as well (was destroyed)
3547 // Pass arguments for generating a verbose error message.
3548 __ call_VM(noreg, CAST_FROM_FN_PTR(address,
3549 InterpreterRuntime::throw_IncompatibleClassChangeErrorVerbose), r3, r0);
3550 // the call_VM checks for exception, so we should never return here.
3551 __ should_not_reach_here();
3552 return;
3553 }
3554
3555 void TemplateTable::invokehandle(int byte_no) {
3556 transition(vtos, vtos);
3557 assert(byte_no == f1_byte, "use this argument");
3558
3559 load_resolved_method_entry_handle(r2, // ResolvedMethodEntry*
3560 rmethod, // Method*
3561 r0, // Resolved reference
3562 r3); // flags
3563 prepare_invoke(r2, r2);
3564
3565 __ verify_method_ptr(r2);
3566 __ verify_oop(r2);
3567 __ null_check(r2);
3568
3569 // FIXME: profile the LambdaForm also
3570
3571 // r13 is safe to use here as a scratch reg because it is about to
3572 // be clobbered by jump_from_interpreted().
3573 __ profile_final_call(r13);
3574 __ profile_arguments_type(r13, rmethod, r4, true);
3575
3576 __ jump_from_interpreted(rmethod, r0);
3577 }
3578
3579 void TemplateTable::invokedynamic(int byte_no) {
3580 transition(vtos, vtos);
3581 assert(byte_no == f1_byte, "use this argument");
3582
3583 load_invokedynamic_entry(rmethod);
3584
3585 // r0: CallSite object (from cpool->resolved_references[])
3586 // rmethod: MH.linkToCallSite method
3587
3588 // Note: r0_callsite is already pushed
3589
3590 // %%% should make a type profile for any invokedynamic that takes a ref argument
3591 // profile this call
3592 __ profile_call(rbcp);
3593 __ profile_arguments_type(r3, rmethod, r13, false);
3594
3595 __ verify_oop(r0);
3596
3597 __ jump_from_interpreted(rmethod, r0);
3598 }
3599
3600
3601 //-----------------------------------------------------------------------------
3602 // Allocation
3603
3604 void TemplateTable::_new() {
3605 transition(vtos, atos);
3606
3607 __ get_unsigned_2_byte_index_at_bcp(r3, 1);
3608 Label slow_case;
3609 Label done;
3610 Label initialize_header;
3611
3612 __ get_cpool_and_tags(r4, r0);
3613 // Make sure the class we're about to instantiate has been resolved.
3614 // This is done before loading InstanceKlass to be consistent with the order
3615 // how Constant Pool is updated (see ConstantPool::klass_at_put)
3616 const int tags_offset = Array<u1>::base_offset_in_bytes();
3617 __ lea(rscratch1, Address(r0, r3, Address::lsl(0)));
3618 __ lea(rscratch1, Address(rscratch1, tags_offset));
3619 __ ldarb(rscratch1, rscratch1);
3620 __ cmp(rscratch1, (u1)JVM_CONSTANT_Class);
3621 __ br(Assembler::NE, slow_case);
3622
3623 // get InstanceKlass
3624 __ load_resolved_klass_at_offset(r4, r3, r4, rscratch1);
3625
3626 // make sure klass is initialized
3627 assert(VM_Version::supports_fast_class_init_checks(), "Optimization requires support for fast class initialization checks");
3628 __ clinit_barrier(r4, rscratch1, nullptr /*L_fast_path*/, &slow_case);
3629
3630 // get instance_size in InstanceKlass (scaled to a count of bytes)
3631 __ ldrw(r3,
3632 Address(r4,
3633 Klass::layout_helper_offset()));
3634 // test to see if it has a finalizer or is malformed in some way
3635 __ tbnz(r3, exact_log2(Klass::_lh_instance_slow_path_bit), slow_case);
3636
3637 // Allocate the instance:
3638 // If TLAB is enabled:
3639 // Try to allocate in the TLAB.
3640 // If fails, go to the slow path.
3641 // Initialize the allocation.
3642 // Exit.
3643 //
3644 // Go to slow path.
3645
3646 if (UseTLAB) {
3647 __ tlab_allocate(r0, r3, 0, noreg, r1, slow_case);
3648
3649 if (ZeroTLAB) {
3650 // the fields have been already cleared
3651 __ b(initialize_header);
3652 }
3653
3654 // The object is initialized before the header. If the object size is
3655 // zero, go directly to the header initialization.
3656 __ sub(r3, r3, sizeof(oopDesc));
3657 __ cbz(r3, initialize_header);
3658
3659 // Initialize object fields
3660 {
3661 __ add(r2, r0, sizeof(oopDesc));
3662 Label loop;
3663 __ bind(loop);
3664 __ str(zr, Address(__ post(r2, BytesPerLong)));
3665 __ sub(r3, r3, BytesPerLong);
3666 __ cbnz(r3, loop);
3667 }
3668
3669 // initialize object header only.
3670 __ bind(initialize_header);
3671 __ mov(rscratch1, (intptr_t)markWord::prototype().value());
3672 __ str(rscratch1, Address(r0, oopDesc::mark_offset_in_bytes()));
3673 __ store_klass_gap(r0, zr); // zero klass gap for compressed oops
3674 __ store_klass(r0, r4); // store klass last
3675
3676 {
3677 SkipIfEqual skip(_masm, &DTraceAllocProbes, false);
3678 // Trigger dtrace event for fastpath
3679 __ push(atos); // save the return value
3680 __ call_VM_leaf(
3681 CAST_FROM_FN_PTR(address, static_cast<int (*)(oopDesc*)>(SharedRuntime::dtrace_object_alloc)), r0);
3682 __ pop(atos); // restore the return value
3683
3684 }
3685 __ b(done);
3686 }
3687
3688 // slow case
3689 __ bind(slow_case);
3690 __ get_constant_pool(c_rarg1);
3691 __ get_unsigned_2_byte_index_at_bcp(c_rarg2, 1);
3692 call_VM(r0, CAST_FROM_FN_PTR(address, InterpreterRuntime::_new), c_rarg1, c_rarg2);
3693 __ verify_oop(r0);
3694
3695 // continue
3696 __ bind(done);
3697 // Must prevent reordering of stores for object initialization with stores that publish the new object.
3698 __ membar(Assembler::StoreStore);
3699 }
3700
3701 void TemplateTable::newarray() {
3702 transition(itos, atos);
3703 __ load_unsigned_byte(c_rarg1, at_bcp(1));
3704 __ mov(c_rarg2, r0);
3705 call_VM(r0, CAST_FROM_FN_PTR(address, InterpreterRuntime::newarray),
3706 c_rarg1, c_rarg2);
3707 // Must prevent reordering of stores for object initialization with stores that publish the new object.
3708 __ membar(Assembler::StoreStore);
3709 }
3710
3711 void TemplateTable::anewarray() {
3712 transition(itos, atos);
3713 __ get_unsigned_2_byte_index_at_bcp(c_rarg2, 1);
3714 __ get_constant_pool(c_rarg1);
3715 __ mov(c_rarg3, r0);
3716 call_VM(r0, CAST_FROM_FN_PTR(address, InterpreterRuntime::anewarray),
3717 c_rarg1, c_rarg2, c_rarg3);
3718 // Must prevent reordering of stores for object initialization with stores that publish the new object.
3719 __ membar(Assembler::StoreStore);
3720 }
3721
3722 void TemplateTable::arraylength() {
3723 transition(atos, itos);
3724 __ ldrw(r0, Address(r0, arrayOopDesc::length_offset_in_bytes()));
3725 }
3726
3727 void TemplateTable::checkcast()
3728 {
3729 transition(atos, atos);
3730 Label done, is_null, ok_is_subtype, quicked, resolved;
3731 __ cbz(r0, is_null);
3732
3733 // Get cpool & tags index
3734 __ get_cpool_and_tags(r2, r3); // r2=cpool, r3=tags array
3735 __ get_unsigned_2_byte_index_at_bcp(r19, 1); // r19=index
3736 // See if bytecode has already been quicked
3737 __ add(rscratch1, r3, Array<u1>::base_offset_in_bytes());
3738 __ lea(r1, Address(rscratch1, r19));
3739 __ ldarb(r1, r1);
3740 __ cmp(r1, (u1)JVM_CONSTANT_Class);
3741 __ br(Assembler::EQ, quicked);
3742
3743 __ push(atos); // save receiver for result, and for GC
3744 call_VM(r0, CAST_FROM_FN_PTR(address, InterpreterRuntime::quicken_io_cc));
3745 // vm_result_2 has metadata result
3746 __ get_vm_result_2(r0, rthread);
3747 __ pop(r3); // restore receiver
3748 __ b(resolved);
3749
3750 // Get superklass in r0 and subklass in r3
3751 __ bind(quicked);
3752 __ mov(r3, r0); // Save object in r3; r0 needed for subtype check
3753 __ load_resolved_klass_at_offset(r2, r19, r0, rscratch1); // r0 = klass
3754
3755 __ bind(resolved);
3756 __ load_klass(r19, r3);
3757
3758 // Generate subtype check. Blows r2, r5. Object in r3.
3759 // Superklass in r0. Subklass in r19.
3760 __ gen_subtype_check(r19, ok_is_subtype);
3761
3762 // Come here on failure
3763 __ push(r3);
3764 // object is at TOS
3765 __ b(Interpreter::_throw_ClassCastException_entry);
3766
3767 // Come here on success
3768 __ bind(ok_is_subtype);
3769 __ mov(r0, r3); // Restore object in r3
3770
3771 // Collect counts on whether this test sees nulls a lot or not.
3772 if (ProfileInterpreter) {
3773 __ b(done);
3774 __ bind(is_null);
3775 __ profile_null_seen(r2);
3776 } else {
3777 __ bind(is_null); // same as 'done'
3778 }
3779 __ bind(done);
3780 }
3781
3782 void TemplateTable::instanceof() {
3783 transition(atos, itos);
3784 Label done, is_null, ok_is_subtype, quicked, resolved;
3785 __ cbz(r0, is_null);
3786
3787 // Get cpool & tags index
3788 __ get_cpool_and_tags(r2, r3); // r2=cpool, r3=tags array
3789 __ get_unsigned_2_byte_index_at_bcp(r19, 1); // r19=index
3790 // See if bytecode has already been quicked
3791 __ add(rscratch1, r3, Array<u1>::base_offset_in_bytes());
3792 __ lea(r1, Address(rscratch1, r19));
3793 __ ldarb(r1, r1);
3794 __ cmp(r1, (u1)JVM_CONSTANT_Class);
3795 __ br(Assembler::EQ, quicked);
3796
3797 __ push(atos); // save receiver for result, and for GC
3798 call_VM(r0, CAST_FROM_FN_PTR(address, InterpreterRuntime::quicken_io_cc));
3799 // vm_result_2 has metadata result
3800 __ get_vm_result_2(r0, rthread);
3801 __ pop(r3); // restore receiver
3802 __ verify_oop(r3);
3803 __ load_klass(r3, r3);
3804 __ b(resolved);
3805
3806 // Get superklass in r0 and subklass in r3
3807 __ bind(quicked);
3808 __ load_klass(r3, r0);
3809 __ load_resolved_klass_at_offset(r2, r19, r0, rscratch1);
3810
3811 __ bind(resolved);
3812
3813 // Generate subtype check. Blows r2, r5
3814 // Superklass in r0. Subklass in r3.
3815 __ gen_subtype_check(r3, ok_is_subtype);
3816
3817 // Come here on failure
3818 __ mov(r0, 0);
3819 __ b(done);
3820 // Come here on success
3821 __ bind(ok_is_subtype);
3822 __ mov(r0, 1);
3823
3824 // Collect counts on whether this test sees nulls a lot or not.
3825 if (ProfileInterpreter) {
3826 __ b(done);
3827 __ bind(is_null);
3828 __ profile_null_seen(r2);
3829 } else {
3830 __ bind(is_null); // same as 'done'
3831 }
3832 __ bind(done);
3833 // r0 = 0: obj == nullptr or obj is not an instanceof the specified klass
3834 // r0 = 1: obj != nullptr and obj is an instanceof the specified klass
3835 }
3836
3837 //-----------------------------------------------------------------------------
3838 // Breakpoints
3839 void TemplateTable::_breakpoint() {
3840 // Note: We get here even if we are single stepping..
3841 // jbug inists on setting breakpoints at every bytecode
3842 // even if we are in single step mode.
3843
3844 transition(vtos, vtos);
3845
3846 // get the unpatched byte code
3847 __ get_method(c_rarg1);
3848 __ call_VM(noreg,
3849 CAST_FROM_FN_PTR(address,
3850 InterpreterRuntime::get_original_bytecode_at),
3851 c_rarg1, rbcp);
3852 __ mov(r19, r0);
3853
3854 // post the breakpoint event
3855 __ call_VM(noreg,
3856 CAST_FROM_FN_PTR(address, InterpreterRuntime::_breakpoint),
3857 rmethod, rbcp);
3858
3859 // complete the execution of original bytecode
3860 __ mov(rscratch1, r19);
3861 __ dispatch_only_normal(vtos);
3862 }
3863
3864 //-----------------------------------------------------------------------------
3865 // Exceptions
3866
3867 void TemplateTable::athrow() {
3868 transition(atos, vtos);
3869 __ null_check(r0);
3870 __ b(Interpreter::throw_exception_entry());
3871 }
3872
3873 //-----------------------------------------------------------------------------
3874 // Synchronization
3875 //
3876 // Note: monitorenter & exit are symmetric routines; which is reflected
3877 // in the assembly code structure as well
3878 //
3879 // Stack layout:
3880 //
3881 // [expressions ] <--- esp = expression stack top
3882 // ..
3883 // [expressions ]
3884 // [monitor entry] <--- monitor block top = expression stack bot
3885 // ..
3886 // [monitor entry]
3887 // [frame data ] <--- monitor block bot
3888 // ...
3889 // [saved rfp ] <--- rfp
3890 void TemplateTable::monitorenter()
3891 {
3892 transition(atos, vtos);
3893
3894 // check for null object
3895 __ null_check(r0);
3896
3897 const Address monitor_block_top(
3898 rfp, frame::interpreter_frame_monitor_block_top_offset * wordSize);
3899 const Address monitor_block_bot(
3900 rfp, frame::interpreter_frame_initial_sp_offset * wordSize);
3901 const int entry_size = frame::interpreter_frame_monitor_size_in_bytes();
3902
3903 Label allocated;
3904
3905 // initialize entry pointer
3906 __ mov(c_rarg1, zr); // points to free slot or null
3907
3908 // find a free slot in the monitor block (result in c_rarg1)
3909 {
3910 Label entry, loop, exit;
3911 __ ldr(c_rarg3, monitor_block_top); // derelativize pointer
3912 __ lea(c_rarg3, Address(rfp, c_rarg3, Address::lsl(Interpreter::logStackElementSize)));
3913 // c_rarg3 points to current entry, starting with top-most entry
3914
3915 __ lea(c_rarg2, monitor_block_bot); // points to word before bottom
3916
3917 __ b(entry);
3918
3919 __ bind(loop);
3920 // check if current entry is used
3921 // if not used then remember entry in c_rarg1
3922 __ ldr(rscratch1, Address(c_rarg3, BasicObjectLock::obj_offset()));
3923 __ cmp(zr, rscratch1);
3924 __ csel(c_rarg1, c_rarg3, c_rarg1, Assembler::EQ);
3925 // check if current entry is for same object
3926 __ cmp(r0, rscratch1);
3927 // if same object then stop searching
3928 __ br(Assembler::EQ, exit);
3929 // otherwise advance to next entry
3930 __ add(c_rarg3, c_rarg3, entry_size);
3931 __ bind(entry);
3932 // check if bottom reached
3933 __ cmp(c_rarg3, c_rarg2);
3934 // if not at bottom then check this entry
3935 __ br(Assembler::NE, loop);
3936 __ bind(exit);
3937 }
3938
3939 __ cbnz(c_rarg1, allocated); // check if a slot has been found and
3940 // if found, continue with that on
3941
3942 // allocate one if there's no free slot
3943 {
3944 Label entry, loop;
3945 // 1. compute new pointers // rsp: old expression stack top
3946
3947 __ check_extended_sp();
3948 __ sub(sp, sp, entry_size); // make room for the monitor
3949 __ sub(rscratch1, sp, rfp);
3950 __ asr(rscratch1, rscratch1, Interpreter::logStackElementSize);
3951 __ str(rscratch1, Address(rfp, frame::interpreter_frame_extended_sp_offset * wordSize));
3952
3953 __ ldr(c_rarg1, monitor_block_bot); // derelativize pointer
3954 __ lea(c_rarg1, Address(rfp, c_rarg1, Address::lsl(Interpreter::logStackElementSize)));
3955 // c_rarg1 points to the old expression stack bottom
3956
3957 __ sub(esp, esp, entry_size); // move expression stack top
3958 __ sub(c_rarg1, c_rarg1, entry_size); // move expression stack bottom
3959 __ mov(c_rarg3, esp); // set start value for copy loop
3960 __ sub(rscratch1, c_rarg1, rfp); // relativize pointer
3961 __ asr(rscratch1, rscratch1, Interpreter::logStackElementSize);
3962 __ str(rscratch1, monitor_block_bot); // set new monitor block bottom
3963
3964 __ b(entry);
3965 // 2. move expression stack contents
3966 __ bind(loop);
3967 __ ldr(c_rarg2, Address(c_rarg3, entry_size)); // load expression stack
3968 // word from old location
3969 __ str(c_rarg2, Address(c_rarg3, 0)); // and store it at new location
3970 __ add(c_rarg3, c_rarg3, wordSize); // advance to next word
3971 __ bind(entry);
3972 __ cmp(c_rarg3, c_rarg1); // check if bottom reached
3973 __ br(Assembler::NE, loop); // if not at bottom then
3974 // copy next word
3975 }
3976
3977 // call run-time routine
3978 // c_rarg1: points to monitor entry
3979 __ bind(allocated);
3980
3981 // Increment bcp to point to the next bytecode, so exception
3982 // handling for async. exceptions work correctly.
3983 // The object has already been popped from the stack, so the
3984 // expression stack looks correct.
3985 __ increment(rbcp);
3986
3987 // store object
3988 __ str(r0, Address(c_rarg1, BasicObjectLock::obj_offset()));
3989 __ lock_object(c_rarg1);
3990
3991 // check to make sure this monitor doesn't cause stack overflow after locking
3992 __ save_bcp(); // in case of exception
3993 __ generate_stack_overflow_check(0);
3994
3995 // The bcp has already been incremented. Just need to dispatch to
3996 // next instruction.
3997 __ dispatch_next(vtos);
3998 }
3999
4000
4001 void TemplateTable::monitorexit()
4002 {
4003 transition(atos, vtos);
4004
4005 // check for null object
4006 __ null_check(r0);
4007
4008 const Address monitor_block_top(
4009 rfp, frame::interpreter_frame_monitor_block_top_offset * wordSize);
4010 const Address monitor_block_bot(
4011 rfp, frame::interpreter_frame_initial_sp_offset * wordSize);
4012 const int entry_size = frame::interpreter_frame_monitor_size_in_bytes();
4013
4014 Label found;
4015
4016 // find matching slot
4017 {
4018 Label entry, loop;
4019 __ ldr(c_rarg1, monitor_block_top); // derelativize pointer
4020 __ lea(c_rarg1, Address(rfp, c_rarg1, Address::lsl(Interpreter::logStackElementSize)));
4021 // c_rarg1 points to current entry, starting with top-most entry
4022
4023 __ lea(c_rarg2, monitor_block_bot); // points to word before bottom
4024 // of monitor block
4025 __ b(entry);
4026
4027 __ bind(loop);
4028 // check if current entry is for same object
4029 __ ldr(rscratch1, Address(c_rarg1, BasicObjectLock::obj_offset()));
4030 __ cmp(r0, rscratch1);
4031 // if same object then stop searching
4032 __ br(Assembler::EQ, found);
4033 // otherwise advance to next entry
4034 __ add(c_rarg1, c_rarg1, entry_size);
4035 __ bind(entry);
4036 // check if bottom reached
4037 __ cmp(c_rarg1, c_rarg2);
4038 // if not at bottom then check this entry
4039 __ br(Assembler::NE, loop);
4040 }
4041
4042 // error handling. Unlocking was not block-structured
4043 __ call_VM(noreg, CAST_FROM_FN_PTR(address,
4044 InterpreterRuntime::throw_illegal_monitor_state_exception));
4045 __ should_not_reach_here();
4046
4047 // call run-time routine
4048 __ bind(found);
4049 __ push_ptr(r0); // make sure object is on stack (contract with oopMaps)
4050 __ unlock_object(c_rarg1);
4051 __ pop_ptr(r0); // discard object
4052 }
4053
4054
4055 // Wide instructions
4056 void TemplateTable::wide()
4057 {
4058 __ load_unsigned_byte(r19, at_bcp(1));
4059 __ mov(rscratch1, (address)Interpreter::_wentry_point);
4060 __ ldr(rscratch1, Address(rscratch1, r19, Address::uxtw(3)));
4061 __ br(rscratch1);
4062 }
4063
4064
4065 // Multi arrays
4066 void TemplateTable::multianewarray() {
4067 transition(vtos, atos);
4068 __ load_unsigned_byte(r0, at_bcp(3)); // get number of dimensions
4069 // last dim is on top of stack; we want address of first one:
4070 // first_addr = last_addr + (ndims - 1) * wordSize
4071 __ lea(c_rarg1, Address(esp, r0, Address::uxtw(3)));
4072 __ sub(c_rarg1, c_rarg1, wordSize);
4073 call_VM(r0,
4074 CAST_FROM_FN_PTR(address, InterpreterRuntime::multianewarray),
4075 c_rarg1);
4076 __ load_unsigned_byte(r1, at_bcp(3));
4077 __ lea(esp, Address(esp, r1, Address::uxtw(3)));
4078 }
|
Install pip on redhat 7.4. How to Install Python 3 on Redhat Enterprise Linux 7.x ? 2019-06-09
Install pip on redhat 7.4 Rating: 6,2/10 1484 reviews
How to Install Pip on CentOS 7
install pip on redhat 7.4
We will also see how to make python 3. These work just fine to install packages to the system site-packages directory. Pip is the package management system for Python, used to install and manage software packages written in Python. The reason why yum couldn't find python-pip was that it is not called python-pip anymore. I have tried the following with no luck: subscription-manager unregister subscription-manager clean yum clean all subscription-manager register --auto-attach subscription-manager repos --list doesn't show this repo in the list.
Next
How To Install PIP in Linux
install pip on redhat 7.4
By default Redhat provides 2. For instructions and tips covering pip, virtualenv, venv, pipenv, and Python software collections. Thanks Update This is how I installed python 3. For example, for Python 3. Refer to for all history regarding the package and is the errata announcement. You can use subscription-manager to register. You can use subscription-manager to register.
Next
How to install PIP (Python packaging tool) on RHEL 7 Linux
install pip on redhat 7.4
. When I do rpm -qa grep zlib. You can also download the latest version in place of specified below. Python is available on most of the operating systems in the world. The repositories we know about are explained below. It is widely considered to be a very easy programming language to master because of that focus on readability.
Next
How to Install Pip on CentOS 7
install pip on redhat 7.4
There are a lot of answers that say to build from source but they are incomplete. Ensurepip is invoked automatically every time you create a virtual environment, for example: pyvenv-3. I was going crazy about the same issue. If you need python 3. You should now be able to run commands like the following to install packages for python3. Option is additive, and can be used up to 3 times. It is a perfectly fine choice now.
Next
How to Install Python 3 on Redhat Enterprise Linux 7.x ?
install pip on redhat 7.4
Python is a powerful programming language. Pip is a very powerful package management system used to install and manage software packages written in the Python programming language. But the new development is mostly happening on Python 3. Update: The python34 bug mentioned below has finally been fixed. Virtual environments are better because they allow you to isolate project specific dependencies. Python virtual environments are the best way to avoid problem with installing Python modules.
Next
How To Install Pip on CentOS 7
install pip on redhat 7.4
This tutorial will help you to install Python 3. Which is weird, because pip should be included by default with Python 3. Building Python from source unless you really need to is a bad idea. For certain Distributions, there are additional repositories that can be enabled to provide newer versions. Reading Time: 2 minutes Pip is a tool for installing and managing Python packages.
Next
How To: Install Ansible on Red Hat Enterprise Linux 7 (RHEL 7)
install pip on redhat 7.4
Name : python34-pip Arch : noarch Version : 8. Login to your server using ssh or shell access. You can use subscription-manager to register. Any suggestions to get past this error? I am trying to install python-pip in a centos7 docker container, but I think I may be missing some package or something. Download the script on your using wget or curl, then run the script with appropriate python version for which you need to install pip. Pip uses the following command to install any packages on your system. I tried the below and it is giving errors.
Next
Install Python PIP on CentOS7
install pip on redhat 7.4
Before doing this check whether you have python installed into your Centos machine at least 2. Use either Option 1 or Option 2 below. To verify that the installation of pip was successful you can use the following command: pip -V The output should be similar to this one: pip -V pip 9. Add all the required packages name with their version with a properly formatted file like requirements. It is very friendly and easy to learn.
Next
How To Install Pip on CentOS 7
install pip on redhat 7.4
Ah well, looks like it's simply not included in the python3. List all available options you can use pip has many other useful options. They are available 24×7, so you can get the help you need at any time. Fairly sure I'm looking in the right place because that's where python3. This is also used to manage, download, build, and install python modules. In some cases, this can lead to bugs or unexpected behaviors that vary from the original unpatched versions.
Next
|
Jun
15
2021
How to Update SQL Server Stats The Right Way
Here I am, trying to get back my habit and write about something useful I was working on the other day.
If you ask me which SQL Server feature I love the most these days I’d say, without hesitation, that is the Query Store.
Query Store has been around now for a number of years already, but I’m surprised that still lots of people haven’t used it to troubleshoot performance issues, to asses the general health of their systems or to capture a baseline for future reference.
Recently I was looking at some data collected by the Query Store and I found something interesting I want to share.
Background
A good database maintenance is mandatory if you want to have peace of mind, backups, integrity checks, statistics update and index maintenance.
Each of these steps will help you in a different way and should be altogether the foundation of a healthy environment for any DBA, but sometimes we might be overzealous and there may be some negative impact as side effect in our servers.
The simple reason is just because the available resources are finite and we might we wasting them by doing something that is a bit pointless.
Statistics
One if the most important (if not the most) when it comes to help SQL Server performance, it is Stats Updates because that is the key information the Query Optimizer will use to produce the best good enough plans for our data layout.
The problem comes when some of these stats are really useless, let me explain.
When AUTO_CREATE_STATISTICS is ON (best practice, do not turn it off), the Query Optimizer creates statistics on individual columns in the query predicate, as necessary, to improve cardinality estimates for the query plan.
That means that sometimes, stats might be created on columns that are not a very good fit due to the histogram nature or the way we access specific columns.
Scenario
For this demo I will use a copy of the StackOverflow database I restored in my localhost.
If we look at the stats created on the table [dbo].[Posts] we can see there is a number of them. This query will show them along with their data types, which is important.
USE StackOverflow
SELECT OBJECT_SCHEMA_NAME(c.object_id) + '.' + OBJECT_NAME(c.object_id) AS [object_name]
, s.name
, c.name
, t.name
, c.max_length
--, *
FROM sys.columns AS c
INNER JOIN sys.types AS t
ON t.user_type_id = c.user_type_id
LEFT JOIN sys.stats_columns AS sc
ON sc.object_id = c.object_id
AND sc.column_id = c.column_id
LEFT JOIN sys.stats AS s
ON sc.object_id = s.object_id
AND sc.stats_id = s.stats_id
WHERE c.object_id = OBJECT_ID('dbo.Posts')
ORDER BY c.column_id
The column [Body] is defined as nvarchar(max) and currently there are no [column] statistics created on it.
Now, let’s say someone decides to run this query:
SELECT TOP(10) *
FROM dbo.Posts
WHERE Body LIKE '%sql server%'
If we have another look, we can see now there is a new stats on the column [Body], and by looking at the name, we can deduce it’s auto created.
As mentioned earlier, stats play a key role during the execution plan generation, and inaccurate stats lead to all sort of performance issues.
The problem here is how stats (or the histogram in this case) is stored and the information SQL Server can extract to help to generate the most optimal plan.
Let’s have a look at the histogram for this stats.
SELECT *
FROM sys.dm_db_stats_histogram (OBJECT_ID('dbo.Posts'),11)
The values stored in the column [range_high_key] are actual values from the table’s column [Body] and since it’s great when we speak about integers, dates or short strings where we do equality, it’s not that great when we speak about others, like long strings or blobs for instance.
The Problem
For now, everything described might not be such a horrible thing, it’s clear that SQL Server will not take full advantage of the stats on the column [Body] if the queries we are running use wildcards (specially leading), but why so much fuss? Well, now it’s when things start making sense (or not).
Running stats maintenance on this kind of columns every night can become really expensive and this is what I’ve found more than once when using the Query Store to look for queries that have a high number of reads.
In the picture you can see how one single UPDATE STATS was incurring in ~60GB almost every night, which can be expensive.
The SQLG Hack
Even if you have used Ola Hallengren’s solution for a while, you might not be aware of every possible configuration because the default usually works just fine.
But here I am to tell you a little secret, there is a parameter called @Indexes to control which indexes you want to include or exclude from being maintained in the stored procedure [dbo].[IndexOptimize].
But although there is no equivalent for statistics and the documentation does not state it, you can also use it to exclude statistics, so we can programmatically look for those stats on the columns you think it doesn’t makes sense to update stats, because of the little return comparing the cost of doing it.
Once that is said, we can be creative and choose for instance those stats whose data types might not make be a good fit, like XML, [n]varchar(max), old style blobs (text, ntext, image), or [var]binary.
This is how I do it.
SET QUOTED_IDENTIFIER ON
GO
SET ANSI_NULLS ON
GO
--=============================================
-- Copyright (C) 2021 Raul Gonzalez @SQLDoubleG.
-- All rights reserved.
--
-- You may alter this code for your own *non-commercial* purposes. You may
-- republish altered code as long as you give due credit.
--
-- THIS CODE AND INFORMATION ARE PROVIDED "AS IS" WITHOUT WARRANTY OF
-- ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED
-- TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND/OR FITNESS FOR A
-- PARTICULAR PURPOSE.
--
-- =============================================
-- Author: Raul Gonzalez, @SQLDoubleG (RAG)
-- Create date: 01/06/2021
-- Description: This script run IndexOptimize to Update Stats
USE master;
DECLARE @indexes nvarchar(MAX);
DECLARE @dbname sysname;
DECLARE @sql nvarchar(MAX);
DECLARE dbs CURSOR LOCAL STATIC FORWARD_ONLY READ_ONLY FOR
SELECT name
FROM sys.databases
WHERE database_id &gt; 4
AND name = 'StackOverflow';
DROP TABLE IF EXISTS #t;
CREATE TABLE #t (stats_name nvarchar(500) NOT NULL);
SET @sql = 'USE [?]
SELECT DB_NAME() + ''.'' + QUOTENAME (OBJECT_SCHEMA_NAME (s.object_id)) + ''.'' + QUOTENAME (OBJECT_NAME (s.object_id)) + ''.'' + QUOTENAME (s.name)
-- , c.name
-- , t.name
-- , c.max_length
FROM sys.stats AS s
INNER JOIN sys.stats_columns AS sc
ON sc.object_id = s.object_id
AND sc.stats_id = s.stats_id
INNER JOIN sys.columns AS c
ON c.object_id = s.object_id
AND c.column_id = sc.column_id
INNER JOIN sys.types AS t
ON t.user_type_id = c.user_type_id
WHERE OBJECTPROPERTY (s.object_id, ''IsMSShipped'') = 0
AND
(
t.name IN ( N''image'', N''text'', N''sql_variant'', N''ntext'', N''xml'', N''hierarchyid'', N''geometry'',
N''geography'', N''varbinary'', N''binary''
)
OR c.max_length = -1
)';
OPEN dbs;
FETCH NEXT FROM dbs INTO @dbname;
WHILE @@FETCH_STATUS = 0 BEGIN
SET @sql = REPLACE(@sql, '?', @dbname);
INSERT INTO #t (stats_name)
EXECUTE sys.sp_executesql @stmt = @sql;
FETCH NEXT FROM dbs INTO @dbname;
END;
CLOSE dbs;
DEALLOCATE dbs;
SET @indexes =
(
SELECT ',-' + stats_name
FROM #t
ORDER BY stats_name
FOR XML PATH ('')
);
SET @indexes = N'ALL_INDEXES' + @indexes;
-- SELECT @indexes
-- UPDATE Stats ONLY
EXECUTE dbo.IndexOptimize
@Databases = 'StackOverflow',
@Indexes = @indexes,
@FragmentationLow = NULL,
@FragmentationMedium = NULL,
@FragmentationHigh = NULL,
@UpdateStatistics = 'ALL',
@OnlyModifiedStatistics = 'N',
@LogToTable = 'Y',
@Execute = 'N';
If we execute the above and look at the output, there are a couple of interesting things.
First, this message gives me the wrong impression that the syntax is not correct or the parameter will not work on stats (as I told you already)
The following indexes in the @Indexes parameter do not exist: [StackOverflow][dbo].[Posts].[_WA_Sys_00000004_2B3F6F97].
Second and most important is that it actually worked absolutely fine! If we scroll down to the table [dbo].[Posts], we can see the update stats commands for all stats, but not for the one on the column [Body] (called _WA_Sys_00000004_2B3F6F97), so our intention, which is to exclude it, was achieved.
The script is ready to go through all databases with a simple change, but I let you play with it and change it if you like.
Conclusion
I believe Ola’s solution is a pretty good tool and saves the bacon of lots of us which otherwise we will be re-inventing the wheel over and over.
Finding these little gems and with a bit of scripting, it becomes even more flexible, which is even better.
I hope you enjoyed the reading and please let me know if you found it useful in the comments.
Cheers!
Leave a Reply
Your email address will not be published. Required fields are marked *
This site uses Akismet to reduce spam. Learn how your comment data is processed.
|
User: anonymous Login
Location: Cicognara
(44.9500°N, 10.4667°E)
Time: 16:14:24
(UTC+00:00)
Language:
Cosmos 1515 - Satellite Information
Designation
Spacetrack catalog number 14551
COSPAR ID 1983-122-A
Name in Spacetrack catalog COSMOS 1515
Satellite Details
Orbit 503 x 514 km, 82.5°
Category unknown
Country/organisation of origin Russia
Intrinsic brightness (Magnitude) 5.2 (at 1000km distance, 50% illuminated)
Maximum brightness (Magnitude)2.2 (at perigee, 100% illuminated)
Launch
Date (UTC) 15 December 1983 12:25
Launch sitePlesetsk,
Russia
Launch vehicle Tsiklon-3
View from orbit pole
DLR
|
JCNC Journal of Computer Networks and Communications 2090-715X 2090-7141 Hindawi Publishing Corporation 382736 10.1155/2012/382736 382736 Research Article PAPR Reduction of FBMC by Clipping and Its Iterative Compensation Kollár Zsolt Horváth Péter Wulich Dov 1 Department of Broadband Infocommunications and Electromagnetic Theory Budapest University of Technology and Economics Budapest 1111 Hungary bme.hu 2012 26 6 2012 2012 05 02 2012 22 04 2012 02 05 2012 2012 Copyright © 2012 Zsolt Kollár and Péter Horváth. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Physical layers of communication systems using Filter Bank Multicarrier (FBMC) as a modulation scheme provide low out-of-band leakage but suffer from the large Peak-to-Average Power Ratio (PAPR) of the transmitted signal. Two special FBMC schemes are investigated in this paper: the Orthogonal Frequency Division Multiplexing (OFDM) and the Staggered Multitone (SMT). To reduce the PAPR of the signal, time domain clipping is applied in both schemes. If the clipping is not compensated, the system performance is severely affected. To avoid this degradation, an iterative noise cancelation technique, Bussgang Noise Cancelation (BNC), is applied in the receiver. It is shown that clipping can be a good means for reducing the PAPR, especially for the SMT scheme. A novel modified BNC receiver is presented for SMT. It is shown how this technique can be implemented in real-life applications where special requirements must be met regarding the spectral characteristics of the transmitted signal.
1. Introduction
In wireless communications the frequency spectrum is an essential resource. As the unlicensed spectrum is used by an increasing number of devices, the possibility of communication collision is increasing. To avoid this collision, two solutions are possible: extending the frequency limits higher to unused frequency bands at the upper end of the spectrum or reaggregating the densely used licensed frequency bands. Both ideas have disadvantages: the use of higher frequencies requires expensive specially designed analog devices; the reuse of the spectrum calls for complex, intelligent, and adaptive systems. In this paper the focus is on the reuse of the spectrum with multicarrier modulations tailored for spectrally efficient applications.
Future applications operating in the licensed bands, for example, cognitive radios, favor spectrally efficient FBMC schemes with low out-of-band leakage, minimizing harmful interference between devices using adjacent channels. In this paper two subclasses of FBMC are investigated, both allowing the use of a complex modulation alphabet: OFDM and SMT. Both of these schemes provide relatively low out-of-band leakage.
Today OFDM [1] is the de-facto standard technique for high-speed wireless data transmission. Using OFDM, low-complexity modulation and demodulation can be performed by the “Inverse Fast Fourier Transform (IFFT)” and the Fast Fourier Transform (FFT), respectively. With Cyclic Prefix (CP), channel equalization can be efficiently implemented in the frequency domain. This scheme also has some drawbacks. As the PAPR of the transmitted signal is large, OFDM is highly sensitive to the nonlinear characteristics of the Power Amplifier (PA) and the D/A-A/D converters [2]. Signal preprocessing has to be applied to reduce the high PAPR of the OFDM signal, otherwise power amplification would not be efficient. Nevertheless, if the linear range of the PA is smaller than required, nonlinear effects also degrade the performance of the OFDM system. The nonlinearity introduces in-band and out-of-band distortion as well.
Numerous signal processing methods have been proposed to reduce the PAPR of OFDM [3, 4] such as, amplitude clipping [5], coding [6], interleaving [7], partial transmit sequence [8], selected mapping [9], tone reservation [10], tone injection [11], and active constellation extension [12]. Each has its own advantage and drawback. Clipping introduces distortion, some methods may require higher power, others cause data rate loss, and in some cases additional information must be transmitted to the receiver. Furthermore, the computation complexity varies for each technique.
Besides OFDM, another FBMC-based multicarrier family is being strongly investigated: the SMT [13, 14] scheme, which is also known as OFDM/Offset-QAM [15]. The SMT scheme has significantly reduced out-of-band leakage compared to OFDM. However, due to the absence of CP, it is more sensitive to effects of multipath propagation. The SMT signal suffers from large PAPR similarly to OFDM, which makes it especially vulnerable against nonlinearities present in the transceiver chain. For PAPR reduction of SMT signals, only the clipping technique can be applied as the consecutive symbols are overlapping, therefore it is not possible to treat them separately as in OFDM.
In this paper the baseband amplitude clipping method [5] is applied for reducing the PAPR of OFDM and SMT signals. Clipping is applied to the transmitted signal in order to align it to the linear range of the PA. Although the PAPR of the signal can be easily limited by clipping, nonlinear effects are introduced, degrading the system performance. Therefore clipping must be compensated in the receiver. The receiver-oriented turbo principle is a good candidate for the compensation of the negative side effect of clipping. Two different iterative techniques are described for OFDM receivers:
Decision Aided Reconstruction (DAR) [16], where the receiver aims to reconstruct the peaks of the time domain signal.
Bussgang Noise Cancellation (BNC) [17], where the objective is to remove the clipping noise in the frequency domain.
Both methods were originally proposed using hard-decision-based decoding procedures. Modified receivers using soft decisions are introduced in [18]. Using the soft information the receiver takes full advantage of the turbo principle, yielding better Bit Error Rates (BER). In this paper the focus is on the BNC algorithm using soft decision because it outperforms the DAR method [18].
This paper is organized as follows. First the system model applying clipping on coded FBMC signals is introduced. A short description is given of OFDM and SMT. The PAPRs and the spectral characteristics of the transmitted signals are compared. The mathematical description of the clipping effects is also presented. In the next section, a detailed description is given of the soft BNC receiver algorithm, introducing modifications to the method presented in [18, 19] in order to be applicable to SMT. The technique is explained both for OFDM and SMT schemes. The convergence analysis is given based on Extrinsic Information Transfer (EXIT) chart. The possibility to apply clipping on a real-life system is considered and modified transmitter architectures are also presented. In the closing section BER simulations are shown over ideal and frequency selective channels with Additive White Gaussian Noise (AWGN). The paper concludes with a summary of the most important results.
2. System Model 2.1. FBMC Modulation Scheme
The FBMC transmit signal is constructed from N parallel streams as shown in Figure 1. The input for the mth symbol in the kth branch Xk[m] is selected from the complex modulation alphabet 𝒜. The modulation symbols are upsampled by a factor of N to achieve maximum data rate with critical sampling. For each upsampled signal a specially designed complex modulated prototype filter is applied having the impulse response gk[n] and Z-transform Gk(z) as (1)gk[n]=g0[n]ejk(2π/N),0<n<KN,(2)Gk(z)=G0(WNkz), where j=-1 is the imaginary unit, WN=ej(2π/N), and K is the overlapping factor giving the number of overlapping impulses. The xk[n] output streams are summed to form the transmit signal x[n] which can be expressed using (1) as (3)x[n]=m=-k=0N-1Xm[k]g0[n-mN]ejk(n-mN)(2π/N). In the receiver a similar filter bank is used to separate the N data streams. The separated streams are downsampled to retrieve the transmitted complex modulation values. The FBMC scheme can be implemented in a computationally efficient way using IFFT and a polyphase decomposition of the filters Gk(z) [20].
Block diagram of an FBMC modulation scheme.
2.1.1. OFDM Transmitter
The OFDM scheme is a special class of FBMC where a prototype filter with a rectangular impulse response is applied. This leads to a simplified structure where the consecutive symbols do not overlap, that is, K=1. As a result, the samples of an OFDM symbol can be expressed by simplifying (3) as described in [1]: (4)x[n]=k=0N-1X[k]ejkn(2π/N),0n<N. The block diagram of an OFDM transmitter is shown in Figure 2. The binary information data b are encoded by a rate-R convolutional encoder and the encoded bits are interleaved. The interleaved bits are mapped to X complex constellation symbols from the set 𝒜. Each ak𝒜 symbol maps M encoded and interleaved bits. Finally IFFT is used to modulate the subcarriers. Then, prior to transmission, a CP with P samples is added to each symbol to form the transmitted signal s.
Block diagram of an OFDM transmitter.
2.1.2. SMT Transmitter
In the SMT scheme prototype filters with overlapping impulse responses fulfilling the Nyquist criterion are applied. Due to the advantageous properties of the prototype filter bank, the SMT signal will have a better Adjacent Channel Leakage Ratio (ACLR) than OFDM. With the use of offset-QAM modulation, where the real and imaginary data are transmitted with a time offset of a half symbol duration, no data rate loss will occur compared to OFDM. Prior to transmission, the symbols are overlapped such that they can be separated at the receiver. In order to maintain orthogonality of the filter bank structure, CP can not be used in SMT systems. As a result, techniques with higher complexity must be applied in comparison to OFDM in order to combat the channel-induced intersymbol interference [21, 22]. The modulated signal for the SMT scheme can be expressed as: (5)x[n]=m=-k=0N-1(N2θkR{Xm[k]}g0[n-mN]m=-k=0N-12+θk+1I{Xm[k]}g0[n-mN-N2])m=-k=0N-12×ejk(n-mN)(2π/N), where (6)θk={1,ifkiseven;j,ifkisodd. An efficient implementation of (5) is to use two separate polyphase filter banks where two output signals are time staggered and added. This polyphase structure of the SMT scheme can be seen in Figure 3. A major difference compared to OFDM is the no CP is applied. The SMT transmit signal is identical to the modulated signal s[n]=x[n].
Block diagram of an SMT transmitter.
2.2. Properties of The Transmitted Signal 2.2.1. PAPR
The PAPR is one of the quantities that describes the dynamic properties of the transmitted signal s[n]. The PAPR is defined as: (7)PAPR(s[n])dB=10log10(max{|s[n]|2}Ps), where |s[n]| is the amplitude and Ps is the average power of the transmitted signal. The PAPR curves of the transmitted symbols are analyzed in Figure 4, where the Complementary Cumulative Distribution Functions (CCDFs) of the PAPR are depicted as a function of the number of subchannels N with an oversampling ratio of 4. It can be seen that as the number of subchannels increases, the probability that the amplitude exceeds a certain PAPR threshold (PAPR0) increases for both systems.
CCDF of the PAPR of the transmitted signal of OFDM and SMT for various number of subchannels. The probability that an amplitude value exceeds a certain threshold PAPR0 is visible.
2.2.2. Power Spectrum Density
Spectral behavior especially regarding the ACLR is also an important property of the transmitted signal. The power spectrum density function of the transmitted signal with an oversampling factor of 4 is depicted in Figure 5 as a function of the number of subchannels. In case of OFDM the length of the CP is set to 1/4 symbol duration. The adjacent channel leakage is considerably lower in SMT than in OFDM. The low out-of-band radiation makes SMT a more suitable solution for cognitive radio applications where strict ACLR limits are enforced. If the number of subchannels increases, the PAPR also increases, but the spectral characteristics become more efficient, out-of-band radiation is reduced. It has been shown in [23] that in the presence of a nonlinear PA the performance of both systems degrades severely. The spectral mask is distorted, leading to a considerable amount of out-of-band leakage. A detailed analysis of the out-of-band radiation for OFDM and SMT schemes is given in [24].
Power spectrum density comparison of the transmitted signals of OFDM and SMT with various number of subchannels.
2.3. Clipping
Clipping is applied to the baseband transmit signal s[n] in order to reduce the PAPR. The amplitude values are limited to a threshold of Amax. The clipped signal sc[n] is given as (8)sc[n]={s[n]|s[n]|AmaxAmaxejφ(s[n])|s[n]|>Amax, where φ(s[n]) is the phase of the complex signal s[n]. The limiter is characterized by the clipping ratio (CR), (9)CRdB=20log10(γ), with γ=Amax/Ps. According to Bussgang’s theorem [25], the signal at the output of the limiter can be expressed as (10)sc[n]=αs[n]+d[n]. The clipping noise d[n] is assumed to be complex Gaussian distributed and uncorrelated with the useful signal s[n] and the attenuation factor α is calculated as [25] (11)α=1-e-γ2+π2γerfc(γ). The output power of the limiter is given by (12)Pout=(1-e-γ2)Ps. Using (10) and (12), the clipping noise power can be calculated as (13)Pd=(1-e-γ2-α2)Ps. As clipping is performed on the baseband digital signal nonlinear distortions will only occur in the baseband, that is, all distortions terms will fall in-band.
2.4. Transceiver Chain
For modeling the transceiver chain the digital baseband equivalent is used. The model of the transceiver is presented in Figure 6. The radio channel is modeled as a FIR filter having a discrete impulse response h[n] and a sampled AWGN term w[n] with variance σ02=N0/2 per complex dimension. The sampled received signal can be expressed as:(14)y[n]=s[n]*h[n]+w[n]. The receiver is assumed to have the knowledge of the channel coefficients h[n].
Block diagram of the baseband transceiver chain.
3. Bussgang Noise Cancellation 3.1. BNC Turbo Detection for OFDM Systems
In OFDM systems, the CP of P samples is assumed to be longer than the channel’s maximum excess delay. As a result, the received symbols on the kth subcarrier after OFDM demodulation can be expressed using (10) as (15)Y[k]=Xc[k]H[k]+W[k]=αX[k]H[k]+D[k]H[k]+W[k],0k<N, where X[k], Xc[k], D[k], H[k], and W[k] are the discrete Fourier transforms of the sampled signals x[n], xc[n], d[n], h[n], and w[n], respectively. The BNC receiver performs iterative equalization and detection [26]. The basic block diagram of a BNC receiver for OFDM according to [18] is shown in Figure 7. Two main subblocks are present in the figure: the BNC detector and the channel decoder. The BNC detector consists of a forward and feedback signal processing path.
Block diagram of the Bussgang noise cancelation for OFDM.
3.1.1. Forward Path
The extrinsic Log-Likelihood Ratio (LLR) for each channel observation Y^[k] is calculated according to [27] as (16)L(bu,vY^[k])=lnalAu,v1p(Y^[k]au=al)alAu,v0p(Y^[k]au=al), where 𝒜u,v1 and 𝒜u,v0 are subsets of 𝒜u. The vth bit in au can be either 1 or 0. The conditional probability density function p(Y^=al) is given by [16] (17)p(Y^[k]a)=exp((Y^[k]-αH[k]a)2N0+|H[k]|2PDi), where PDi is the power of the remaining clipping noise after the ith iteration. Taking into account the large number of samples and applying the central limit theorem, the clipping noise d[n] can be modeled as a Gaussian distributed random variable, which is independent of the channel noise w[n]. Based on this assumption, passing through the linear channel filter, the power of the Bussgang noise PD is multiplied by |H[k]|2. For the 0th iteration, with no feedback, PD0 is calculated according to (13). For the next iterations, PDi can be approximated as (18)PDi=E{|D[k]-D^[k]|2}. As the receiver does not know D[k], the power of the remaining clipping noise is to be estimated as (19)PDi=PD0-E{|D^[k]|2}.
3.1.2. Feedback Path
After interleaving the extrinsic LLRs provided by the channel decoder, the soft symbols are calculated as [16] (20)X~n=l=02M-1alu=0M-1P(bl,u),alA.
Each symbol is first weighted by the probability of the mapped bits and then summed up. Using these soft symbols a time domain estimation of the OFDM signal is performed. Clipping is applied with a level of Amax, and the signal is converted back to the frequency domain. The attenuation factor αi must be set in accordance with the output power of the soft mapper. If the estimated extrinsic information for the coded bits is rather low due to low channel SNR values, no clipping compensation will be performed. The clipping ratio for the ith iteration can be calculated as (21)γi=AmaxPx~. The attenuation factor for the ith iteration is calculated according to (11) using (21) as (22)αi=1-e-(γi)2+π2γierfc(γi). Following each iteration the attenuation factor in the feedback loop decreases from 1 to α as the estimation becomes more and more precise.
Subtracting the attenuated symbols from the clipped symbols, the estimated clipping noise can be expressed as (23)D^[k]=X~c[k]-αiX~[k],0k<N. The estimated noise term D^, multiplied by the channel coefficient, is then subtracted from the received symbols (15) to suppress the clipping noise (24)Y^[k]=αH[k]X[k]+H[k](D[k]-D^[k])+W[k],0k<N. The 0th iteration is the case when no feedback loop is used, that is, Y^[k]=Y[k]. The attenuation factor αi is monotonously decreasing, so the iteration can stop when consecutive iterations give less difference in α than a given limit.
The BCJR channel decoder [28] computes the extrinsic information of the deinterleaved LLRs, which are provided by the BNC detector. These extrinsic LLRs are used to suppress the clipping noise in the feedback path of the BNC detector.
3.2. Convergence Analysis
The convergence behavior of a turbo loop can be examined using the Extrinsic Information Transfer (EXIT) chart, developed by ten Brink [26]. It is used to investigate the iteration behavior of a turbo loop based on the exchange of mutual information. This powerful tool enables the tracing of mutual information exchange between the BNC detector and the channel decoder over the iterations.
The LLRs defined by (16) are modeled with an equivalent Gaussian channel [26]. The mutual information between these LLRs and the transmitted symbols U which are the realizations of u{-1,+1} can be expressed with the conditional probability density function [26] as (25)IA(U;LLR)=12u=-1,1-pA(ξU=u)log22pA(ξU=u)pA(ξU=-1)+pA(ξU=1)dξ, where 0IA1. The binary variable uk=-1 and uk=1 represents the digital bits bk=0 and bk=1, respectively. To measure the mutual information content of the output extrinsic LLR values, the following expression is applied: (26)IE(U;LLR)=1-E{log2(1+e-LLR)}1-E{log2(1+e-ukLLRk)}.
The EXIT function of the BNC detector is not only a function of the a priori mutual information IA provided by the channel decoder, but it also depends on Eb/N0 as IE1=f(IA1,Eb/N0). The EXIT function of the channel decoder only depends on the a priori LLRs provided by the BNC detector as IE2=f(IA2). The iteration steps of the turbo loop can be visualized using the EXIT functions of the BNC detector and the channel decoder. The output of the channel decoder becomes the input of the BNC detector, and the output of the detector will be the new input of the decoder in the next iteration: (27)IE1=f(IA1=IE2,EbN0),IE2=f(IA2=IE1). To observe the mutual information transfer of the turbo loop, the EXIT chart is constructed from the two EXIT functions. The EXIT function of the channel decoder is plotted with swapped x-y axes on top of the BNC detectors to visualize the iteration trajectory. An iteration trajectory can be seen for Eb/N0=4dB and Eb/N0=12dB with a channel decoder rate of 12 in Figure 8. In iterative receivers the EXIT functions of both decoders have to be monotonically increasing in order to achieve convergence. It can be observed in Figure 8 that the monotony of the BNC detector is satisfactory. As the input mutual information IA1 increases, a growing output mutual information IE1 can be observed. If the extrinsic information in the feedback loop has reached the value of 1, that is, a perfect reconstruction is achieved, meaning that the clipping noise can be fully removed and unclipped system performance can be achieved.
EXIT chart, with iteration trajectories of the BNC turbo receiver with an R=1/2 rate channel decoder for Eb/N0=4dB and Eb/N0=12dB values with CR = 1 dB
3.3. Modified BNC Turbo Detector for SMT Systems
For SMT scheme the blocks of the BNC receiver presented for OFDM in Figure 7 must be modified and extended. Both, the feedforward and the feedback path should be altered, due to the overlapping nature of the symbols and the absence of the CP, as it can be seen in Figure 9:
The compensation of the clipping noise is performed in time domain before demodulation.
In the presence of ISI only a quasi Maximum Likelihood (ML) detection of the received modulation symbols Y^ can be performed.
The demapping blocks have to be extended with additional signal processing blocks.
Block diagram of the modified BNC receiver for SMT.
First, an enlarged FFT operation is applied [29] with a length equal to the time domain impulse duration of the prototype filter. The phase compensation of the transmission channels effect for each subcarrier in each subchannel is performed in the frequency domain. After the phase compensation, filtering is performed in the frequency domain [29]. Finally, a quasi-ML detection of the transmitted, channel distorted complex modulation values is calculated similar to the case of OFDM. Equation (17) has to be modified taking ISI into account. The probability function is approximated as (28)p(Y^[k]a)exp((Y^[k]-αH[k]a)2I+N0+|H[k]|2PDi), where I is the ISI term which can be calculated according to [21].
4. Practical Application
In real-life systems not all subcarriers are used for data transmission. Usually the DC subcarrier and some carriers at the edge of the transmission band are not used due to technical difficulties and guard band purposes in the spectrum. Clipping introduces nonlinear distortions in the entire baseband, so the originally unused subcarriers will contain components introduced by clipping. This also negatively affects the spectral behavior of the transmission signal, that is, leakage will appear. These components have to be suppressed. Digital filtering is not sufficient to suppress the clipping components on the unused subcarriers and analog filtering introduces modulation errors. Instead of filtering, the clipped transmit signal is demodulated again. The modulation values for each symbols of the used subcarriers are selected and the unused subcarriers are set to zero, and repeated modulation is performed similar as described in [30]. The described modification of the transmitter for OFDM and SMT systems can be seen in Figure 10. In the receiver the BNC detector for the OFDM system remains the same, as the compensation of the clipping noise is performed in the frequency domain. On the other hand, the BNC receiver for the SMT scheme has to be modified. The same scheme as presented in Figure 10 must be implemented in the feedback loop to reconstruct the clipping noise in the time domain.
Block diagram of the modified transmitter of OFDM (a) and SMT (b) systems.
OFDM
SMT
The results of clipping and resetting the unmodulated subcarriers to zero for OFDM and SMT can be seen in Figures 11 and 12. In Figure 11 a spectrum regrowth can be observed for the PAPR of both systems as a result of the filtering. The regrowth of PAPR is strongly dependent on number of unused subcarriers. If more unmodulated subcarriers are applied, more nonlinear distortion will be removed from the signal leading to the regrowth of the peaks. In Figure 12 on the spectral characteristics the effects of clipping can be well observed as the nonlinear products appear in the baseband causing a large side lobe. This leakage disappears with the filtering of the unused subcarriers. As a positive side-effect of the filtering the power of the clipping noise will also be reduced, so the receiver will operate with a reduced Pd.
CCDF of the PAPR values of the transmitted signal with clipping and additional signal processing for OFDM (a) and SMT (b).
OFDM
SMT
Power spectrum density function of the transmitted signal with clipping and additional signal processing for OFDM (a) and SMT (b).
OFDM
SMT
5. Simulation Results
Table 1 shows the summary of the simulation parameters for the two modulation schemes.
Simulation parameters for SMT and OFDM system.
Parameter SMT OFDM
Bandwidth 8 MHz
Cyclic prefix (P) length 0 128
Available subcarriers/subbands (N) 1024
Modulated subcarriers/subbands (Nc) 768
Overlapping factor (K) 4 1
Mapping (M) 4 (16-QAM)
Clipping ratio 1 dB
The binary data are encoded with a code rate of 1/2, using a 4-state recursive systematic convolutional encoder with polynomials (1,5/7)8 in octal notation. The interleaved bits are mapped according to a 16-QAM constellation with Gray mapping. The clipping level (CR) is set to 1 dB. For the prototype filter of the SMT system the coefficients presented in [31] are applied.
To obtain comparable bit error rates, the SNR normalized to one bit energy is defined. The noise power of the AWGN channel is calculated according to the following definition: (29)SNRdB=10log10(PbN0)=10log10(Pout(N+P)N0MRNc), where Pb is the bit power, N is the number of the subcarriers/subbands available, and Nc is the number of subcarriers/subbands used. P is the length of the CP, M is the number of bits transmitted by one subcarrier/subband, and R is the coding rate. Assuming a normalized symbol duration T, the energy of a single bit can be expressed as Eb=PbT=Pb. The parameters of the applied IEEE 802.22 channel profiles B and C can be found in Table 2 [32]. For decoding of the received bits BJCR decoder was suggested, but due to arithmetic overflow issues the log-map decoder [33] is used.
Excess delay and relative amplitude for IEEE 802.22 B and C channel profiles.
Profile B Path 1 Path 2 Path 3 Path 4 Path 5 Path 6
Excess d. −3 μs 0 μs 2 μs 4 μs 7 μs 11 μs
Rel. amp. −6 dB 0 dB −7 dB −22 dB −16 dB −20 dB
Profile C Path 1 Path 2 Path 3 Path 4 Path 5 Path 6
Excess d. −2 μs 0 μs 5 μs 16 μs 24 μs 33 μs
Rel. amp. −9 dB 0 dB −19 dB −14 dB −24 dB −16 dB
The simulated BERs over AWGN channel can be seen in Figure 13. Due to the absence of CP, SMT outperforms OFDM. It can be observed for both techniques that clipping severely degrades the overall system performance if it is not compensated, that is, no feedback loop is active. With iterative compensation the system performance can be improved, if the SNR acceded a limit the BER results approach the performance of the case without clipping.
Bit error rates of the BNC receiver for OFDM and SMT signaling over AWGN channel.
The BER simulations for Channel B can be seen in Figure 14. For OFDM the CP is longer than the maximal channel delay, therefore ISI is not affecting the OFDM system, and the effects of clipping can be compensated. For SMT the effect of the ISI does not severely degrade the system performance, it still outperforms OFDM. For both techniques the effect of clipping can be compensated and the BER after the third iteration approaches the results where no clipping was applied.
Bit error rates of the BNC receiver for OFDM and SMT signaling over channel B.
The BER simulations for Channel C are shown in Figure 15. In this scenario the CP of OFDM is shorter than the channel impulse response so an error floor caused by the residual ISI can be observed. The presence of ISI results in an error floor also for FBMC systems but at a much lower SMT.
Bit error rates of the BNC receiver for OFDM and SMT signaling over channel C.
6. Conclusion
In this paper a modified BNC structure suitable for clipped SMT signal processing was presented. Based on the EXIT chart, it was shown that the proposed iterative scheme is convergent. It was also described how the clipping technique can be applied in real-life systems for both OFDM and SMT modulation. Finally, the performance of the BNC SMT receiver was verified and compared to OFDM based on BER simulations over AWGN and Rayleigh channels. For both systems the clipping compensation can be performed and the performance without clipping can be approached.
Acknowledgment
The research leading to these results was derived from the European Community’s Seventh Framework Programme (FP7) under Grant Agreement no. 248454 (QoSMOS).
Bahai A. R. S. Saltzberg B. R. Ergen M. Multi Carrier Digital Communications: Theory and Applications of OFDM 2004 Springer Gazda J. Drotár P. Kocur D. Galajda P. Blicha R. Joint evaluation of nonlinear distortion effects and signal metrics in OFDM based transmission systems Acta Electrotechnica et Informatica 2009 9 4 55 60 Han S. H. Lee J. H. An overview of peak-to-average power ratio reduction techniques for multicarrier transmission IEEE Wireless Communications 2005 12 2 56 65 2-s2.0-18844434669 10.1109/MWC.2005.1421929 Foomooljareon P. Fernando W. PAPR reduction in OFDM systems Thammasat International Journal of Science and Technology 2002 7 3 Li X. Cimini L. J. Effects of clipping and filtering on the performance of OFDM IEEE Communications Letters 1998 2 5 131 133 2-s2.0-0032070586 Jones A. E. Wilkinson T. A. Barton S. K. Block coding scheme for reduction of peak to mean envelope power ratio of multicarrier transmission schemes Electronics Letters 1994 30 25 2098 2099 2-s2.0-0028768760 10.1049/el:19941423 Jayalath A. D. S. Tellambura C. The use of interleaving to reduce the peak to average power ratio of an OFDM signal 1 Proceedings of the IEEE Global Telecommunication Conference (GLOBECOM ’00) 2000 82 86 Müller S. H. Huber J. B. OFDM with reduced peak-to-average power ratio by optimum combination of partial transmit sequences Electronics Letters 1997 33 5 368 369 2-s2.0-0031073791 Mobasher A. Khandani A. K. Integer-based constellation-shaping method for PAPR reduction in OFDM systems IEEE Transactions on Communications 2006 54 1 119 127 2-s2.0-31344434119 10.1109/TCOMM.2005.861657 Park S.-E. Sung-Ryul Y. Kim J. Y. Park D. S. Joo P. Y. Tone reservation method for PAPR reduction scheme 2003 IEEE 802.16e Task Group, IEEE 802.16e-03n60 Han S. H. Cioffi J. M. Lee J. H. Tone injection with hexagonal constellation for peak-to-average power ratio reduction in OFDM IEEE Communications Letters 2006 10 9 646 648 2-s2.0-33947167201 10.1109/LCOMM.2006.060612 Krongold B. S. Jones D. L. PAR reduction in OFDM via active constellation extension IEEE Transactions on Broadcasting 2003 49 3 258 268 2-s2.0-0141884068 10.1109/TBC.2003.817088 Farhang-Boroujeny B. Yuen C. H. Cosine modulated and offset QAM filter bank multicarrier techniques: a continuous-time prospect Eurasip Journal on Advances in Signal Processing 2010 2010 2-s2.0-77951444805 10.1155/2010/165654 165654 Schaich F. Filterbank based multi carrier transmission (FBMC)—evolving OFDM: FBMC in the context of WiMAX Proceedings of the European Wireless Conference (EW '10) April 2010 1051 1058 2-s2.0-77954432253 10.1109/EW.2010.5483518 Siohan P. Siclet C. Lacaille N. Analysis and design of OFDM/OQAM systems based on filterbank theory IEEE Transactions on Signal Processing 2002 50 5 1170 1183 2-s2.0-0036570626 10.1109/78.995073 Colas M. Gelle G. Declercq D. Analysis of iterative receivers for clipped COFDM signaling based on soft Turbo-DAR Proceedings of the 1st International Symposium on Wireless Communication Systems (ISWCS '04) September 2004 110 114 2-s2.0-28844464442 Chen H. Haimovich A. An iterative method to restore the performance of clipped and filtered OFDM signals Proceedings of the International Conference on Communications (ICC '03) May 2003 3438 3442 2-s2.0-0038309976 Djardin R. Colas M. Gelle G. Comparison of iterative receivers mitigating the clipping noise of OFDM based system Proceedings of the European Wireless Conference 2007 Kollár Z. Grossmann M. Thomä R. Convergence analysis of BNC turbo detection for clipped OFDM signalling Proceedings of the 13th International OFDM-Workshop (InOWo’08) 2008 Hamburg, Germany 241 245 Waldhauser D. S. Nossek J. A. Multicarrier systems and filter banks Advances in Radio Science 2006 4 165 169 2-s2.0-33748421744 Kollár Z. Péceli G. Horváth P. Iterative decision feedback equalization for FBMC systems Proceedings of the 1st International Conference on Advances in Cognitive Radio (COCORA '11) 2011 Budapest, Hungary Ihalainen T. Stitz T. H. Renfors M. Efficient per-carrier channel equalizer for filter bank based multicarrier systems Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS '05) May 2005 jpn 3175 3178 2-s2.0-67649133142 10.1109/ISCAS.2005.1465302 Kollár Z. Horváth P. Modulation schemes for cognitive radio in white spaces Radioengineering 2010 19 4 511 517 2-s2.0-78650359105 Baltar L. Waldhauser D. S. Nossek J. A. Out-of-band radiation in multicarrier systems: a comparison Multi-Carrier Spread Spectrum 2007 1 107 116 Rowe H. E. Memoryless non-linearities with gaussian inputs: elementary results The Bell System Technical Journal 1982 61 7 1519 1525 2-s2.0-0020180680 Ten Brink S. Designing iterative decoding schemes with the extrinsic information transfer chart AEU-Archiv fur Elektronik und Ubertragungstechnik 2000 54 6 389 398 2-s2.0-0034467185 ten Brink S. Speidel J. Yan R. H. Iterative demapping and decoding for multilevel modulation Proceedings of the Global Telecommunications Conference, (GLOBECOM '98) November 1998 579 584 2-s2.0-0032286132 Bahl L. R. Cocke J. Jelinek F. Raviv J. Optimal decoding of linear codes for minimizing symbol error rate IEEE Transactions on Information Theory 1974 IT-20 2 284 287 2-s2.0-0016037512 Phydyas project: documents D2.1 and D3.1 2008, http://www.ict-phydyas.org/ Sharma P. Verma S. Basu A. Modified clipping and filtering technique for peak-to-average power ratio reduction of OFDM signals used in WLAN International Journal of Engineering Science and Technology 2010 2 10 5337 5343 Bellanger M. Physical layer for future broadband radio systems Proceedings of the IEEE Radio and Wireless Symposium (RWW '10) January 2010 436 439 2-s2.0-77952378281 10.1109/RWS.2010.5434093 Sofer E. Chouinard G. WRAN channel modeling IEEE 802.22-05/0055r7, 2005 Bauch G. Turbo-Entzerrung, und Sendeantennen Diversity mit Space-Time-Codes im Mobilfunk 2001 Düsseldorf, Germany VDI Verlag GmbH
|
Changes in canine cardiac function and venous return curves by the carotid baroreflex
A. S. Greene, A. A. Shoukas
Research output: Contribution to journalArticlepeer-review
51 Scopus citations
Abstract
Venous return curves and cardiac function relationships were simultaneously determined in 10 pentobarbital-anesthetized dogs at three different isolated carotid sinus pressures. Changing carotid sinus pressure (CSP) between 50 and 200 mmHg produced large changes in the zero flow intercept of the venous return curves from 15.37 ± 0.97 to 11.94 ± 1.36 mmHg (P < 0.001) but no change in slope. These changes in the intercept of the venous return curve were due to alterations in systemic vascular capacity caused by the carotid sinus baroreceptor reflex. Changes in the cardiac function curve with baroreceptor pressure were masked by concomitant changes in arterial pressure afterload; however, when arterial pressure was controlled, there was a significant change in the slope of the cardiac function curve from 60.32 ± 26.9 to 37.06 ± 13.31 ml·min-1·kg-1·mmHg-1 as CSP was changed from 50 to 200 mmHg. We conclude that changes in vascular capacity are the primary mechanism responsible for changes in cardiac output during activation of the carotid sinus baroreflex.
Original languageEnglish (US)
Pages (from-to)H288-H296
JournalAmerican Journal of Physiology - Heart and Circulatory Physiology
Volume251
Issue number2 (20/2)
DOIs
StatePublished - 1986
ASJC Scopus subject areas
• Physiology
• Cardiology and Cardiovascular Medicine
• Physiology (medical)
Fingerprint
Dive into the research topics of 'Changes in canine cardiac function and venous return curves by the carotid baroreflex'. Together they form a unique fingerprint.
Cite this
|
How to Calculate the CPU Load in Microcontroller
CPU Load in Microcontroller
To calculate the CPU load in a microcontroller, you should measure the number of tasks waiting or running at each time interval and average them over the total number of intervals. This involves tracking both active and waiting tasks at consistent time intervals. The CPU load is then calculated using the formula:
CPU Load = Sum of tasks waiting or running at each time interval / Number of time intervals
This formula ensures that you are accounting for both the tasks waiting to be processed and those currently running, averaged over a set number of time intervals.
Steps to Calculate CPU Load
1. Identify Tasks: List all tasks running on the microcontroller.
2. Monitor Time Intervals: Break down the observation period into equal time intervals.
3. Track Task Status: For each time interval, record the number of tasks that are either waiting or running.
4. Sum the Tasks: Add up the number of tasks waiting or running for each time interval.
5. Calculate Average: Divide the sum by the number of time intervals.
Example Calculation
Let’s say you observe the CPU over 5 time intervals and record the following number of tasks waiting or running:
• Interval 1: 2 tasks
• Interval 2: 3 tasks
• Interval 3: 1 task
• Interval 4: 4 tasks
• Interval 5: 2 tasks
Sum of tasks: 2 + 3 + 1 + 4 + 2 = 12
Number of intervals: 5
CPU Load: 12 / 5 = 2.4
This means that, on average, there are 2.4 tasks either waiting or running at any given time.
Practical Example
In this example, I’m working with an STM32F4 series microcontroller. Here’s a practical example using pseudo-code:
text/x-java
#include "stm32f4xx_hal.h"
#include <stdint.h>
// Define the number of samples for load average calculation
#define NUM_SAMPLES 10
// Function prototypes
void task1(void);
void task2(void);
void task3(void);
float calculateCPULoad(void);
// Global variables
volatile uint32_t task_count = 0;
volatile uint32_t samples[NUM_SAMPLES] = {0};
volatile uint32_t sample_index = 0;
int main(void)
{
// Initialize HAL and system clock
HAL_Init();
SystemClock_Config();
// Main loop
while (1)
{
task1();
task2();
task3();
// Calculate and print CPU load every second
if (HAL_GetTick() % 1000 == 0)
{
float cpu_load = calculateCPULoad();
printf("CPU Load: %.2f\n", cpu_load);
}
}
}
void task1(void)
{
// Simulating a task that takes some time
HAL_Delay(10);
task_count++;
}
void task2(void)
{
// Simulating another task
HAL_Delay(5);
task_count++;
}
void task3(void)
{
// Simulating a third task
HAL_Delay(15);
task_count++;
}
float calculateCPULoad(void)
{
// Record the current task count
samples[sample_index] = task_count;
sample_index = (sample_index + 1) % NUM_SAMPLES;
// Calculate the sum of tasks over the sampling period
uint32_t total_tasks = 0;
for (int i = 0; i < NUM_SAMPLES; i++)
{
total_tasks += samples[i];
}
// Calculate CPU load
float cpu_load = (float)total_tasks / NUM_SAMPLES;
// Reset task count for the next sampling period
task_count = 0;
return cpu_load;
}
After running the system for a while, I got this result: CPU Load = 3.5
This means that, on average, 3.5 tasks were either running or waiting to run during each sampling interval.
Importance of Accurate CPU Load Calculation
• Optimizing Performance: Ensuring the microcontroller is not overloaded.
• Efficient Task Scheduling: Balancing tasks to avoid bottlenecks.
• Resource Management: Allocating CPU time effectively across tasks.
References
Posted by Mohamed Amine Belkacem
Mechatronics Engineering Student with experience in Computer Engineering
No comments yet
Leave a Reply
Your email address will not be published. Required fields are marked *
|
Tickling Yourself
By Anupum Pant
In most cases tickling yourself is tough. That is because whenever you try to tickle yourself, at the back of your head (yes, really at the back, in a part of the brain called the cerebellum) you know that the sensation was caused as a result of your own movement. That way, the brain is able to predict the sensation and is able to nullify it.
When someone else tries it on you, the brain fails to predict the movement and the somatosensory cortex and the anterior cingulate cortex fire up to make you feel the tickle.
But have you ever tried tickling yourself with a fake hand? It still doesn’t work! Even when you don’t use your direct body part, your brain knows and can predict movement. Unless of course, the fake hand is being used by someone else. It’s interesting but believable that tickling yourself with a fake rubber hand doesn’t fool the brain. But there’s more.
In fact, if you had a tickling robot which could be controlled with a remote control, you still won’t be able to use the remote to operate it and make yourself tickle. While, if some one else had the control and they tried to control the robot to tickle you, you’d feel more ticklish. Unless, there’s a delay. It blows my mind to think about that!
What if, there was a robot which could control the remote control of a tickling robot, and you could control the first one with another remote control. Would you be able to tickle yourself using this contraption? I’m saying no, you still won’t be able to tickle yourself if there was no delay in between. What do you say?
Yes, delay is crucial here. Suppose you had a long contraption which would make movements after a few seconds of delay with respect to the control (which you have in your hand), you’d feel more ticklish, if you tried. Studies say, more the delay, the more ticklish it is.
Note: People with schizophrenia can tickle themselves, using their own hands, fake hand or something else.
Remember, I started the article with “most cases”. That is because there are a couple of ways to tickle yourself successfully. Try making little circles with a soft touch behind your knee for instance. Or use a feather on the sole of your foot. Or, try making circles with your tongue on the roof of your mouth where there’s a ribbed texture…
Mind Controlling Fungus Turns Insects into Zombies
By Anupum Pant
If you have played the game Last of Us on PS3, you’d know that the game is set in a time 20 years after a fungal-based, brain-altering pandemic has taken over the world and infected nearly 60% of the world’s population. Sounds too fictional. Right? Well, of course the game is fictional, but the brain-altering fungus parasite is not very far from reality.
The real fungus, Cordyceps isn’t really fatal to Human beings. However, there’s always a chance. In a very absurd way they kill insects. In fact their life cycle is totally dependent on insects. And a there are more than 1000 different kinds of these fungi, each one of which specializes on one kind of insect. What these fungi do to insects is something very incredible.
The fungus infects insect brains and turns them into zombies! Something similar to what this wasp does to cockroaches. This is how it works…
When an insect comes in contact with the spores of this parasitic fungus, they start acting in a weird manner. That is because the fungus affects its brain and turns it into a zombie, an insect zombie which takes directions from a fungus. The infected brain tells the insect to climb up. At some point, high up on a tree or plant, the insect dies and the fungus hollows the body and starts growing a shoot out of the insect. It’s bizarre to watch! (see the video below)
The fungus programs the brain to make the insect move up because its life-cycle actually benefits from it. The higher the insect goes, the better its spores can spread and can have a better reach.
The fungus is like a nature’s way of saying to an insect species that your population has reached very high levels.
Hit like if you learnt something.
Pando – An Organism That Weighs 6 Million KG
By Anupum Pant
Blue whales weigh about 150 tons each. That is a 150,000 kg animal we are talking about! Incredible! It is the largest animal to have ever lived on earth. Yes, bigger than any of the dinosaurs. Just for the perspective, the heart of a blue whale can weigh about 600 kg and is almost the size of a Volkswagen Beetle car. A human can fit in its arteries. But, if you thought no other organism can be heavier than a blue whale, you are in for a surprise.
The heaviest organism we’ve ever found, lives in the Fishlake national forest, Utah. In fact, the organism itself is the forest. This forest is a Vatican-city-sized forest which looks like it has several identical trees in a normal forest. Only what looks like identical trees in a normal forest, is actually a single huge tree.
The absolutely humongous tree is known to have come out of a single seed about 80,000 years back. With time, it went on to spread its roots and has cloned itself by popping out about 47,000 other extant clones.
Since it is a single huge tree, it indeed acts like a single huge tree. When one of the shoots (tree) is in need of nutrients, the interconnected root system makes sure that the tree gets what it needs. Also, these trees transition from winter to spring simultaneously, just like a single huge tree would.
MinuteEarth explains it better in the video below:
|
1111Ìàíóàëüíûé òåðàïåâò, êàáèíåò ìàíóàëüíîãî òåðàïåâòà
Ïðåèìóùåñòâà, êîòîðûå ìû ãàðàíòèðóåì:
Ìàíóàëüíûé òåðàïåâò
×àñòî ê íàì â ìåäöåíòð îáðàùàþòñÿ ïàöèåíòû ñ æàëîáàìè íà áîëè â ñïèíå èëè ñóñòàâàõ. Åñëè âîâðåìÿ íå îáðàòèòüñÿ ê ñïåöèàëèñòó, òî ïðè èãíîðèðîâàíèè áîëè â ïîçâîíî÷íèêå ÷åëîâåê íà âñþ æèçíü ìîæåò ñòàòü èíâàëèäîì, ëèáî «çàðàáîòàåò» õðîíè÷åñêîå çàáîëåâàíèå. Ìû ðåêîìåíäóåì ïðè ïåðâûõ áîëåçíåííûõ ïðîÿâëåíèÿõ â ñïèíå, ïîçâîíî÷íèêå, ñóñòàâàõ ïðèéòè â ìåäöåíòð è ïîëó÷èòü êâàëèôèöèðîâàííóþ ïîìîùü ñïåöèàëèñòà. Òåðàïåâò ïðè äèàãíîñòèðîâàíèè çàáîëåâàíèÿ íàçíà÷èò îáñëåäîâàíèå ó ìàíóàëüíîãî òåðàïåâòà. Âðà÷ ìàíóàëüíûé òåðàïåâò, åñëè êðàòêî, îïðåäåëèò êîìïëåêñîì ðó÷íîãî âîçäåéñòâèÿ, ìàíèïóëÿöèÿìè ñòåïåíü çàáîëåâàíèÿ è íàçíà÷èò êóðñ ëå÷åíèÿ. Ëå÷åíèåì áîëåé â ñóñòàâàõ è ïîçâîíî÷íèêå, ìûøå÷íîãî àïïàðàòà, ñâÿçîê, âíóòðåííèõ îðãàíîâ çàíèìàåòñÿ èìåííî ìàíóàëüíûé òåðàïåâò. Äàííàÿ òåõíîëîãèÿ ëå÷åíèÿ áûëà èçâåñòíà ÷åëîâå÷åñòâó åùå â V âåêå äî íàøåé ýðû. Îäíàêî ëå÷åáíîé äèñöèïëèíîé îíà ñòàëà òîëüêî â êîíöå XIX âåêà, íî äîëãîå âðåìÿ îòíîñèëàñü ê íåòðàäèöèîííûì ìåòîäèêàì.  íàøè äíè ñïåöèàëüíîñòü « ìàíóàëüíûé òåðàïåâò» îñâàèâàþò òûñÿ÷è ñòóäåíòîâ ìåäèöèíñêèõ âóçîâ, à óñëóãè òàêîãî ñïåöèàëèñòà êàê ìàíóàëüíûé òåðàïåâò ñåãîäíÿ î÷åíü âîñòðåáîâàíû.
Ìàíóàëüíûé òåðàïåâò íàøåãî ìåäöåíòðà îáëàäàåò ìíîãîëåòíèì îïûòîì ðàáîòû â äàííîé ñôåðå. Âûñîêîêâàëèôèöèðîâàííûé ìàíóàëüíûé òåðàïåâò – ýòî ñïåöèàëèñò, êîòîðûé èçáàâèò ïàöèåíòà îò çàáîëåâàíèé ïîÿñíè÷íîãî, ãðóäíîãî, øåéíîãî îòäåëîâ ïîçâîíî÷íèêà, ñóñòàâîâ âåðõíèõ è íèæíèõ êîíå÷íîñòåé, ñòîïû, ïàëüöåâ, êèñòåé è ò.ä. Ïîñëå òùàòåëüíîé, ìàêñèìàëüíî òî÷íîé äèàãíîñòèêè, êîòîðóþ îáåñïå÷èâàåò ñîâðåìåííîå äèàãíîñòè÷åñêîå îáîðóäîâàíèå êëèíèêè, ìàíóàëüíûé òåðàïåâò ðàçðàáàòûâàåò êîìïëåêñíóþ ïðîãðàììó ëå÷åíèÿ. Äëÿ ýòîé öåëè ìàíóàëüíûé òåðàïåâò èñïîëüçóåò ðàçëè÷íûå ïðèåìû è ìåòîäèêè, êîòîðûå ïðè íåîáõîäèìîñòè ñî÷åòàþòñÿ ñ äðóãèìè âèäàìè ëå÷åíèÿ. Êàê ïðàâèëî, â ÷èñëî îáÿçàòåëüíûõ ïðîöåäóð, êîòîðûå ðåêîìåíäóåò ìàíóàëüíûé òåðàïåâò, âõîäÿò ôèçèîòåðàïåâòè÷åñêèå ïðîöåäóðû, ùàäÿùèé ìàññàæ, ðåàáèëèòàöèîííûå ìåðîïðèÿòèÿ, âêëþ÷àþùèå êîìïëåêñ ñïåöèàëüíûõ óïðàæíåíèé ëèáî çàíÿòèÿ íà òðåíàæåðàõ. Ìàíóàëüíûé òåðàïåâò íàøåãî ìåäöåíòðà ãàðàíòèðóåò ýôôåêòèâíîå ëå÷åíèå îñòðûõ è õðîíè÷åñêèõ áîëåé â ñïèíå, øåå, ïëå÷åâûõ è òàçîáåäðåííûõ ñóñòàâàõ, ëå÷åíèå ïðè îãðàíè÷åííîé ïîäâèæíîñòè ïàöèåíòà, à òàêæå èñïðàâëåíèå âñåâîçìîæíûõ íàðóøåíèé îñàíêè (ñêîëèîç, êèôîç, ëîðäîç). Ïðîôåññèîíàëüíûé ìàíóàëüíûé òåðàïåâò ïîìîãàåò òàêæå ïðè õðîíè÷åñêèõ ãîëîâíûõ áîëÿõ, ãîëîâîêðóæåíèÿõ, ïðîáëåìàõ ñ ñåðäöåì è ìíîãèõ äðóãèõ íåäóãàõ, êîòîðûå âîçíèêàþò êàê ïîñëåäñòâèÿ íàðóøåíèé îïîðíî-äâèãàòåëüíîãî àïïàðàòà.
óñëóãè ìàíóàëüíîãî òåðàïåâòàÏîìîùü, êîòîðóþ îêàçûâàåò ìàíóàëüíûé òåðàïåâò, óíèêàëüíà òåì, ÷òî áëàãîäàðÿ åãî óìåëûì ðóêàì çà÷àñòóþ óäàåòñÿ âûëå÷èòü áîëåçíè, êîòîðûå äîëãîå âðåìÿ íå ïîääàâàëèñü äðóãèì, òðàäèöèîííûì ìåòîäèêàì. Ïðè ýòîì ìàíóàëüíîå âîçäåéñòâèå íà ðàçëè÷íûå ó÷àñòêè òåëà ÷åëîâåêà àáñîëþòíî áåçâðåäíî, èìåííî ïîýòîìó ìàíóàëüíûé òåðàïåâò, åãî êîíñóëüòàöèè è ëå÷åíèå ïîëüçóþòñÿ òàêîé ïîïóëÿðíîñòüþ â íàøè äíè.
Ìîæíî âûäåëèòü îñíîâíûå ïîêàçàíèÿ, êîòîðûå ñâèäåòåëüñòâóþò î òîì, ÷òî ïîìî÷ü ñïðàâèòüñÿ ñ áîëåçíüþ âàì ìîæåò ìàíóàëüíûé òåðàïåâò:
• Âî-ïåðâûõ, ïîìîùü èìåííî ýòîãî ñïåöèàëèñòà òðåáóåòñÿ ïðè áîëÿõ â îáëàñòè ïîçâîíî÷íèêà, â íîãàõ èëè ðóêàõ (òàêîå áîëåçíåííîå ñîñòîÿíèå ÷àùå âñåãî ñâÿçàíî ñ ðàäèêóëèòîì èëè îñòåîõîíäðîçîì);
• Âî-âòîðûõ, ìàíóàëüíàÿ òåðàïèÿ íåçàìåíèìà ïðè íàðóøåíèÿõ îñàíêè, à èìåííî: ôóíêöèîíàëüíûõ ñêîëèîòè÷åñêèõ è êèôîòè÷åñêèõ äåôîðìàöèÿõ ïîçâîíî÷íèêà;
• Â-òðåòüèõ, ê óñëóãàì ìàíóàëüíîãî òåðàïåâòà îáðàùàþòñÿ äëÿ ëå÷åíèÿ ïîñëåäñòâèé òðàâì ïîçâîíî÷íèêà è ãîëîâû.
 íàøåé êëèíèêå ìàíóàëüíûé òåðàïåâò íàçíà÷àåò ñòðîãî èíäèâèäóàëüíûé êóðñ ëå÷åíèÿ êàæäîìó ïàöèåíòó. Ýòîò êóðñ íåîáõîäèìî ïðîéòè ïîëíîñòüþ, âñå äî åäèíîé ïðîöåäóðû.  ýòîì çàëîã óñòîé÷èâîãî ïîëîæèòåëüíîãî ðåçóëüòàòà. Åñëè æå ëå÷åíèå ïîëó÷åíî íå â ïîëíîì îáúåìå, òî ïðèãëóøåííàÿ áîëåçíü ÷åðåç íåêîòîðîå âðåìÿ ñíîâà çàÿâèò î ñåáå.
Åñëè ó Âàñ åñòü ïðîáëåìû ñ ïîçâîíî÷íèêîì, ñóñòàâàìè è ò.ï., íå îòêëàäûâàéòå íà ïîòîì âèçèò ê âðà÷ó.
Ïîçâîíèòå â íàø ìåäöåíòð â Ìèòèíî, è çàïèøèòåñü íà ïðèåì ê ìàíóàëüíîìó òåðàïåâòó. Âèçèò ê âðà÷ó äåøåâëå, ÷åì ëå÷èòü õðîíè÷åñêèå çàáîëåâàíèÿ.
|
deltanovember deltanovember - 7 months ago 38
Scala Question
Why do I get a "will always yield true" warning when translating the following from Java to Scala?
Below is a fairly standard piece of Java code which has been translated to Scala
val result: ResultSet = statement.executeQuery(query)
while (result.next) {
if (result.getDouble("FIELD") != null) {
}
}
Why do I get
warning: comparing values of types Double and Null using `!=' will
always yield true?
Answer
If I understand correctly, it's because a Double in scala can never be Null.
Trying something simple out in the console came up with errors:
scala> val d:Double = null
<console>:13: error: type mismatch;
found : Null(null)
required: Double
On the other hand, a java.lang.Double can be null:
scala> val d:java.lang.Double = null
d: java.lang.Double = null
So your double is probably a Scala Double as opposed to a Java Double
EDIT I poked around a bit, and it looks like using java.sql.ResultSet's getDouble method will return a scala Double object, which accounts for the warning. As for an alternative to checking for null, I'm not sure that was ever an option. In Java, the method returned a primitive double, which would default to 0.0. I may be wrong, but I don't think Java primitives could ever be null.
Edit2 Removed some stuff that was more speculation than answer.
|
Fair Automation
Valves
Valves are mechanical devices that help in the regulation and controlRead more
Valves are mechanical devices that help in the regulation and control of pressure or fluid by either closing or opening the flow direction of the fluid or pressure. Valves play a very important role in many mechanical and automation devices hence their increased importance in the day to day life of engineers and the common citizen.
Valves operate in different positions. Depending on the task subjected to the valve, the valve can either be two-port, three-port and four-port. For us to understand the importance and roles of valves, we first have to understand the many different types of valves that are found in different industries and applications.
Valves have found their importance in different industries and applications. Water irrigation systems are such applications where valves are used in. Valves found in irrigation systems are controlled hydraulically. These valves are known as hydraulic valves. They’re the most commonly used valves in the automation industry. Apart from controlling the flow of pressure and fluid, these hydraulic valves also help in protecting the hydraulic system from overloads, providing a specific constant pressure as well as regulate the fluid pressure in various branches of the hydraulic system.
In systems such as pressure cookers, valves have also found their importance. Examples of valves under this category are pneumatic valves. They function by controlling the rate, pressure and amount of air which passes through the pneumatic system. These valves help in controlling the amount of compressed air/gas which is used to power the pneumatic systems. The valves can be controlled manually or automatically through coordinated mechanisms.
Powering of motors can also be associated to valves. Valves used for these functions are solenoid valves. These valves are used in hydraulic systems and fluid power pneumatic to control fluid power motors and control cylinders. These valves are controlled electromechanically which simply means that an electric current which passes through the solenoid is required to help in controlling the cylinders. They also offer safe switching, long service life and high reliability.
For each and every valve to function perfectly, valve actuators are needed. This is mechanism that helps in closing or opening a valve. Each and every valve depends on the valve actuator to function perfectly. These actuators can be operated manually by the help of an individual, via hydraulic power which requires hydraulic pressure, via pneumatic pressure which uses pressure as source of power and via electric current which uses an electric motor to provide torque which powers the opening or closing of the valve.
Apart from controlling pressure and fluids, valves are also used in keeping the safety of the user, device and industry in check. These valves are commonly known as safety valves. They function by automatically actuating the closing or opening of the system. They function by opening the valve disc when pressure inside the system increases to a desired level. They also function by closing the disc valve when the outside pressure decreases to predetermined levels. It’s termed as a safety valve since it automatically controls the pressure and discharges certain amount of fluid without any electric power support.
Valves are used in many industries such as mining, water treatment plants, food manufacturing plants and power generating plants such as oil, petroleum and gas.
Read less
Valves
|
Trying to work was a side project born from the frustrations of trying to find a space to work in Belfast City Centre with fast and stable wifi. Often, I’d grab a tea and sit down in a coffee shop to do some work only to find that the wifi speed is a #tbt to the good ole days of dial up (I'm looking at you, Starbucks).
The web app was designed and built over an Easter weekend (fuelled by chocolate, of course).
Design
The design was kept simple. The focus had to be on the spaces themselves, with little distraction.
The Black Box
Starbucks
Established Coffee
The Mac
A space consists of several key attributes:
1. The title
2. Space type and location
3. Wifi speed (in Mbps)
4. Wifi password (if protected)
5. Opening hours
And that is all there is to it. I thought it was important to focus only on the key aspects of a working space; the wifi speed, opening hours and password (so you’re not looking around wondering who to ask) - no images (for performance reasons), and no reviews. Foursquare and tripAdvisor do reviews brilliantly, it was important to focus on only one metric - the wifi speed.
Offline first
I used a Service Worker to ready the web app for offline use. A service worker is a script that your browser runs in the background, independently of the web page. In this case it was used to cache static assets to ready them for offline use, if needed.
I figured it was particularly important that the website worked offline given that its primary use is to find spaces with wifi.
Progressive Web App
This was my first time in taking active measures to create a progressive web app(PWA).
“A PWA uses modern web capabilities to deliver an app-like experience.”
Trying to work PWA score
Progress Web app score using Google Lighthouse
I used this nifty tool to test the website and after some adjustments and tweaks, managed to get a perfect score. The website was now a PWA.
Built in Jekyll
I decided to use [Jekyll](https://jekyllrb.com/) for this as a starting point. Its easy to use, really fast and perfect for small side projects. The spaces are populated using markdown files. All data is pulled from the frontmatter in the markdown file. Its laid out like so:
---
title: The Black Box
date: 12/05/2017
type: "Arts Venue"
location: "Cathedral Quarter"
speed: 5
password: BlackBoxVenue
opening_times:
- day: Wednesday
time: 10am-11pm
- day: Thursday
time: 10am-11pm
- day: Friday
time: 10am-11pm
- day: Saturday
time: 10am-11pm
- day: Sunday
time: 10am-11pm
---
Entries are added manually for the time being by adding new markdown files and pushing to github but I would like to automate this at some point in the future.
It's fast
With a load time of around 300ms over 30Mb/s this is definitely the fastest site I have built to date. Here are some of the methods I used to achieve this:
1. SVG Sprite - All icons on the page are grouped into an svg sprite and inlined in the head of the document. This saves on requests for individual icons and because it's all SVG, the overhead is tiny. You can read more about svg sprites and how to utilise them here
2. CSS Development with Tachyons - This was my first time using Tachyons and I’m very impressed with it. Regardless of your thoughts on atomic vs semantic css, you can’t deny the performance benefits of using a library such as Tachyons. Paired with uncss, which strips out all unused CSS, the total CSS size comes to just 7kb, and thats before gzipping.
3. Inlining CSS - To stop CSS render blocking the page before it has loaded I inlined it in the head of the document. The maximum size Google recommends for inlined CSS is 14kb so at 7kb it was a no brainer to just inline all of it.
4. Concatenate, minify and asynchronously load js - This is easy to do with a gulp task and means less requests to the browser. Adding async to the script tag means it can be loaded asynchronously also.
5. SSL - Having SSL enabled gives you access to HTTP/2 and service workers. Github Pages does provide free SSL, but only for their username.github.io domains and not custom domains. The easiest way to get around this is to just use Cloudflare as they provide free SSL certs.
6. Cloudflare - Github Pages is already fast but adding Cloudflare means free SSL, a better CDN and more customisable caching options.
What's next?
This was just a weekend side project. If it gains interest I will look into extending the functionality so that users can submit and edit spaces themselves.
I would also like to expand it out for other cities, such as Dublin, London etc. tryingtowork.in/london Wouldn’t that be cool?
Visit https://tryingtowork.in or view the source code on Github
|
Psychrophiles, Mesophiles, Thermophiles
Microbes are loosely classified into several groups based on their preferred temperature ranges. Every organism has a range of permissive growth temperatures. Unlike pH or osmolarity, microbes cannot regulate their temperature i.e. their internal temperature matches that of the surrounding environment. Any changes in temperature have the biggest effect on enzymes and their activity.
1. Minimum growth temperature: The lowest temperature at which the organism can survive and replicate. If the environmental temperature is lower than the optimal temperature, it leads to a decrease in enzyme activity and a slower metabolism.
2. Optimum growth temperature: The growth rates are the highest at optimum growth temperature as it leads to the fastest metabolism.
3. Maximum growth temperature: The highest temperature at which growth can occur. Higher temperatures can denature proteins such as enzymes and carrier proteins, leading to cell death.
The following ranges of permissive growth temperatures are approximate only and can vary according to other environmental factors.
Group Minimum Temperature Optimum Temperature Maximum Temperature
Psychrophile < 0 °C 10-15 °C < 20 °C
Psychrotroph 0 °C 15-30 °C > 25 °C
Mesophile 10-15 °C 30 °C- 45 °C <45 °C
Thermophile 45 °C 50-85 °C >100 °C
Psychrophiles
Psychrophiles are “Cold-loving” organisms, they can grow at 0°C. Based on their permissive temperature, psychrophiles can be broadly classified into two groups: True psychrophiles and psychrotrophs.
• True psychrophiles: They are sensitive to temperatures over 20°C. Optimum growth occurs at 15°C or below. Found in very cold environments such as ocean depths, Arctic, and the Antarctic regions. They seldom cause disease or food spoilage.
• Psychrotrophs (also known as psychrotolerant): Psychrotroph is a variant of psychrophile, which grows at 0°C but displays an optimum temperature in the mesophile range, nearer room temperature (15-25°C). They are found in many natural environments in temperate climates and are responsible for the spoilage of refrigerated food.
Psychrotrophs are the scourge of food storage in refrigerators since they are brought in from their mesophilic habitats and continue to grow in the refrigerated environment ( 4°C ) where they spoil the food e.g., Listeria monocytogenes grows in the guts of cattle, can contaminate beef, milk and crops but unlike typical mesophilic human pathogens, it grows at refrigerated temperatures.
Psychrophilic proteins rapidly denature above their temperature optima and cannot function at body temperatures of warm-blooded animals (37°C) so psychrophiles are unable to grow at even moderate temperatures.
Psychrophiles and psychrotrophs are important decomposers in cold climates and their enzymes are of interest to biotechnology.
Survival Strategy of Psychrophiles
1. Psychrophiles contain specific proteins, particularly enzymes that can still function (albeit at a reduced rate) in low temperatures (at temperatures at or near 0 °C ). These enzymes are more flexible than their mesophilic and thermophilic homologues and they have more accessible catalytic sites to accommodate slower diffusion rates.
2. To maintain the semifluid consistency of the plasma membrane at low temperature, psychrophiles have an increased amount of unsaturated and shorter-chain fatty acids in their plasma membranes. Some psychrophiles, particularly those from the Antarctic have been found to contain polyunsaturated fatty acids.
3. Psychrophiles also produce cryoprotectants: special proteins or sugars that prevent the development of damaging ice crystals
Fatty acid saturation vs membrane fluidity of microorganisms
Nature and state (liquid or solid) of fatty acids present in the membrane affects its function. The degree of unsaturation of a fatty acid correlates with its solidification temperature or thermal transition stage (i.e., the temperature at which the lipid melts or solidifies); unsaturated fatty acids remain liquid at low temperature as “kinks” in their tails push adjacent phospholipid molecules away. So, organisms who need to survive at cold temperature should contain higher proportion of unsaturated fatty acids in their membrane.
In lower temperature, saturated fatty acids press in on each other, making a dense and fairly rigid membrane but they are stable at high temperatures. So organisms having higher proportions of saturated fatty acids in their cell membrane can not grow at lower temperature but can thrive at higher temperature.
Thus, saturated fatty acids (like butter) are solid at room temperature while unsaturated fatty acids (like safflower oil) remain liquid in the refrigerator.
Mesophiles
A nutrient agar plate inoculated with a mesophile and incubated at different temperatures. Effect of temperature on the growth and pigmentation of the isolate can be seen clearly. (Image source: Ref-2)
Mesophiles “middle loving” are microorganisms with an optimum temperature near 37°C (the body temperature of warm-blooded animals). Mesophiles can grow in the temperature range of 25-40°C. Most of the pathogenic microorganisms and normal human microbiota are mesophiles. E.g. human bacterial pathogens such as Staphylococcus aureus, Escherichia coli, Streptococcus pneumoniae, Streptococcus pyogens, Haemophilus influenzae.
Thermophiles
Thermophiles are “heat-loving” organisms having optimum growth between 50-60°C. Many thermophiles cannot grow below 45°C. Some thermophiles form extremely heat-resistant endospores. Examples of thermophiles include Thermus aquaticus and Geobacillus spp. Thermophiles are widely distributed in hot springs, geothermal soils, sunlit soil and manmade environments such as garden compost piles where the microbes break down organic waste.
Grand Prismatic Spring in Yellowstone Park, USA. The colours are due to microbial mats formed by thermophiles
Extreme thermophiles (also known as hyperthermophiles) have optimum growth at 80°C or higher. The permissive growth temperature for hyperthermophiles ranges from 80°C to a maximum of 110°C, with some extreme examples that survive temperatures above 121°C, the average temperature of an autoclave. They are mostly Archaebacteria and are found in volcanic and ocean vents.
Survival Strategy of Thermophiles
1. Thermophiles require specialized heat-stable enzymes that are resistant to denaturation and unfolding. In contrast to their psychrophilic homologues, enzymes/proteins of thermophiles are more tightly folded, making them less flexible with a less accessible catalytic site. The enzymes of these organisms are also of interest to biotechnology. It was the discovery of Thermus aquaticus that led biochemist Kary Mullis to invent the revolutionary molecular technique Polymerase Chain Reaction (PCR), using the organism’s heat-active DNA polymerase (the Taq polymerase).
2. The structural proteins (e.g. ribosomal proteins, transport proteins (permeases) and enzymes of thermophiles and hyperthermophiles are very heat stable compared with their mesophilic counterparts. The proteins are modified in a number of ways including dehydration and through slight changes in their primary structure, which accounts for their thermal stability.
3. To maintain the stability and functionality of the plasma membrane at a higher temperature, the membrane lipids of thermophiles contain a high content of saturated fatty acids. Due to their linear structures, saturated lipids pack more tightly, giving a more organized membrane and increasing its melting temperature.
4. Thermophiles express protective chaperone proteins to help with protein folding and to help maintain their native structure. In addition, the ether linkage of the thermophilic and hyperthermophilic archaea is more thermostable than the ester linkage of phospholipids.
5. The membranes of hyperthermophiles, virtually all of which are Archaea, are not composed of fatty acids but of repeating subunits of the C5 compound, phytane, a branched, saturated, “isoprenoid” substance, which contributes heavily to the ability of these bacteria to live in superheated environments.
6. The high thermal stability of the hyperthermophilic archaeal membranes is also due to their tetraether monolayer structure, as the inner and outer layers of a membrane bilayer will separate under very high temperatures.
References and further readings
1. Madigan Michael T, Bender, Kelly S, Buckley, Daniel H, Sattley, W. Matthew, & Stahl, David A. (2018). Brock Biology of Microorganisms (15th Edition). Pearson.
2. Cappuccino James G and Sherman N. Microbiology: A Laboratory Manual. 10th edition. Pearson Education.
Acharya Tankeshwar
Hello, thank you for visiting my blog. I am Tankeshwar Acharya. Blogging is my passion. As an asst. professor, I am teaching microbiology and immunology to medical and nursing students at PAHS, Nepal. I have been working as a microbiologist at Patan hospital for more than 10 years.
4 thoughts on “Psychrophiles, Mesophiles, Thermophiles
1. what are the future study of V.parahaemolyticus in terms of antibiotic resistance and in vivo modelling (fish).
Leave a Reply
Your email address will not be published.
This site uses Akismet to reduce spam. Learn how your comment data is processed.
Recent Posts
|
Beefy Boxes and Bandwidth Generously Provided by pair Networks
good chemistry is complicated,
and a little bit messy -LW
PerlMonks
How to run Javascript function from Perl script
by gaggio (Friar)
on Aug 08, 2000 at 21:31 UTC ( #26832=note: print w/ replies, xml ) Need Help??
in reply to How to run Javascript function from Perl script
With a Perl CGI script, you generate an HTML page. This page, can of course contain some JavaScript function inside <SCRIPT> tags...
So... you can execute any JavaScript function from a CGI script if you use a JavaScript OnLoad() function in the <BODY> tag.
Comment on How to run Javascript function from Perl script
Select or Download Code
Log In?
Username:
Password:
What's my password?
Create A New User
Node Status?
node history
Node Type: note [id://26832]
help
Chatterbox?
and the web crawler heard nothing...
How do I use this? | Other CB clients
Other Users?
Others studying the Monastery: (7)
As of 2015-08-02 11:46 GMT
Sections?
Information?
Find Nodes?
Leftovers?
Voting Booth?
No recent polls found
past polls
|
31ST CASE SCENARIO (NURSING)SCHIZOPHRENIA.
Questions:
(1)Haloperidol(Haldol) 5mg po tid is ordered for patient with Schizophrenia. Two days later the patient complain of tight jaws and a stiff neck.The nurse should recognize that these complain are:
Answer:
(A)Early Symptoms of extrapyramidol reactions to the medications.
(B )That is normal for this patient.
(C) None of the above.
(D) All of the above.
Correct answer A.
Schizophrenia :Is a serious mental disorder in which people interprets a normal situation(reality)abnormally. This results is a combination of hallucinations and delusions together. Grandeur behavior that one has special personality.An extremely disordered behavior that affects the daily functions of life and can be disabling.The believe that one is a victim of a plot,loose association, psychomotor retardation, hyperactivity, loud rapid talking, inability to sit still (Akathiasia)
SYMPTOMS OF SCHIZOPHRENIA. Withdrawal, flat affects,suspicious,loss of association, short attention span,inability to meet physical needs, unable to feed self ,poor personal hygiene, inappropriate dress.
NURSING RESPONSIBILITIES:
Nurse will need to provide patient with assistance to meet basic needs.
(2)A man is admitted to the hospital with Schizophrenia. The nurse assesses the patient and finds his appearance disheveled and unkempt. Which of the following approaches by the nurse is likely to be the most successful in providing for the patient personal hygiene needs while he is actively ill?
Answer:
(A) Ignore him.
(B) Direct him to shower himself, offer assistance as needed.
(C) Wait for him to recover fully.
(D) B & C
CORRECT ANSWER: B
(3)Symptoms of Schizophrenia can be:
(A) Short attention span, flat affect,poor personal hygiene,everything is normal.
(B )Laughing too much and talking to self.
(C )Eat food nonstop all day.
(D) None of the above.
Correct answer A.
(4) Tom is Frank best friend.When Frank came to see his friend Tom,he became afraid that there is a plot going on to kill him,very suspicious of his friends and unable to meet his physical needs. His friends and family suspected that Tom is:
(A) Diabetic
B Bipolar disorder.
( C) High cholesterol and hypertension.
(D) Schizophrenia disorder.
(5) He was offered food to eat but refused to eat the food?.He talked rapidly and unable to sit still.The family knows that his refusal to eat is due:
(A) his inability to feed self.
(B )Because he doesn’t like the food.
(C )He prefer banana and coffee.
(D) All of the above.
Correct answer A.
Published by edochie99
A Registered Nurse with over twenty years of hospital experience, an author with Masters Degree in Nursing,also Bachelor Degree in Nursing,graduated in 1996 from USC,University of Southern California.MSN in 2009 University of Phoenix.
Leave a comment
Fill in your details below or click an icon to log in:
WordPress.com Logo
You are commenting using your WordPress.com account. Log Out / Change )
Google photo
You are commenting using your Google account. Log Out / Change )
Twitter picture
You are commenting using your Twitter account. Log Out / Change )
Facebook photo
You are commenting using your Facebook account. Log Out / Change )
Connecting to %s
This site uses Akismet to reduce spam. Learn how your comment data is processed.
%d bloggers like this:
|
Kidney Health and Diabetes
Understanding the Role of Kidneys in Glucose Management
May 31, 2023
Understanding the Role of Kidneys in Glucose Management
When it comes to managing diabetes, it’s crucial to have a comprehensive understanding of how different organs in the body, such as the kidneys, play a significant role in glucose management. The kidneys, often overlooked when discussing diabetes, are responsible for filtering waste products from the blood, regulating fluid balance, and maintaining overall health. In this article, we will delve into the intricate relationship between the kidneys and glucose management, highlighting the importance of kidney health for individuals with diabetes or those at risk for the condition.
The Kidneys and Glucose Regulation
The kidneys are not only responsible for filtering waste products but also play a vital role in glucose regulation. They help maintain stable blood sugar levels by reabsorbing glucose in the bloodstream and preventing its excretion through urine. The glomerulus, a network of tiny blood vessels in the kidneys, filters the blood and allows glucose to pass through. However, healthy kidneys reabsorb most of the filtered glucose back into the bloodstream, ensuring it isn’t wasted.
However, in individuals with diabetes, the kidneys may not effectively reabsorb glucose, leading to increased glucose excretion through urine. This phenomenon is known as glucosuria and can contribute to elevated blood sugar levels. Therefore, it is crucial for individuals with diabetes to monitor their kidney function regularly to prevent complications associated with uncontrolled glucose levels.
The Impact of Diabetes on Kidneys
Diabetes can have a significant impact on kidney health, potentially leading to a condition called diabetic nephropathy. Over time, high blood sugar levels can damage the delicate blood vessels in the kidneys, impairing their ability to filter waste effectively. This can result in the accumulation of waste products in the body, leading to complications such as fluid retention, high blood pressure, and electrolyte imbalances.
Furthermore, individuals with diabetes may also experience an increased risk of developing kidney stones. High blood sugar levels can affect the urine composition, making it more conducive to stone formation. Kidney stones can cause severe pain and may require medical intervention to be treated effectively.
Protecting Kidney Health
It is crucial for individuals with diabetes or those at risk for the condition to prioritize kidney health. Here are some essential strategies to protect and maintain optimal kidney function:
1. Control Blood Sugar Levels: Keeping blood sugar levels within the target range can help reduce the risk of kidney damage. Regular monitoring, medication adherence, and lifestyle modifications are key to achieving optimal glucose control.
2. Manage Blood Pressure: High blood pressure can further damage the kidneys. Regular monitoring, lifestyle modifications, and medication adherence can help control blood pressure and protect kidney health.
3. Adopt a Healthy Diet: A balanced diet rich in fruits, vegetables, whole grains, lean proteins, and limited sodium intake can support kidney health. Limiting processed foods and sugary beverages is also essential.
4. Stay Hydrated: Drinking an adequate amount of water helps maintain proper kidney function and prevents the formation of kidney stones. Aim to consume at least 8 glasses of water per day.
5. Avoid Smoking and Alcohol: Smoking and excessive alcohol consumption can worsen kidney function and increase the risk of complications. Quitting smoking and moderating alcohol intake is essential for overall kidney health.
6. Exercise Regularly: Engaging in physical activity helps improve blood circulation and overall health. Aim for at least 150 minutes of moderate-intensity exercise per week, or as recommended by your healthcare provider.
7. Regular Kidney Check-ups: Routine kidney function tests, such as blood and urine tests, can help detect any early signs of kidney damage. Regular check-ups with your healthcare provider are crucial for monitoring kidney health.
Summary and Suggestions
The kidneys play a vital role in glucose management, and their health should not be overlooked when it comes to diabetes care. Understanding the relationship between the kidneys and glucose regulation can empower individuals to take proactive steps in protecting their kidney health. By controlling blood sugar levels, managing blood pressure, adopting a healthy lifestyle, and seeking regular medical check-ups, individuals can mitigate the risk of kidney complications and improve overall well-being. Remember, knowledge is power, and by prioritizing kidney health, individuals with diabetes can lead a fulfilling and healthy life.
For more information on diabetes management, glucose control, and other related topics, we invite you to explore the other articles on our website. Take charge of your health and empower yourself with the knowledge to live your best life with diabetes.
The content provided on DealingWithDiabetes.net is for informational purposes only and is not intended to be a substitute for professional medical advice, diagnosis, or treatment. The information on this website is not designed to replace a physician’s independent judgment about the appropriateness or risks of a procedure or condition for a given patient.
Always seek the advice of your physician or other qualified health provider with any questions you may have regarding a medical condition or treatment, and before undertaking a new health care regimen. Never disregard professional medical advice or delay in seeking it because of something you have read on this website.
DealingWithDiabetes.net does not recommend or endorse any specific tests, physicians, products, procedures, opinions or other information that may be mentioned on the site.
Subscribe for More
Be the 1st to get alerts and news
Join our free Dealing with Diabetes newsletter to get regular updates on new articles and resources.
14 + 7 =
Related Posts
How High Blood Pressure Affects Kidney Health in Diabetes
How High Blood Pressure Affects Kidney Health in Diabetes We all understand the importance of diabetes care and education. In this article, we will delve into the topic of how high blood pressure affects kidney health in individuals with diabetes or those at risk for...
Understanding Acid-Base Balance in Diabetic Kidney Disease
Understanding Acid-Base Balance in Diabetic Kidney Disease Diabetic kidney disease is a serious complication that can occur in individuals with diabetes. It is important to understand the role of acid-base balance in managing this condition. In this article, we will...
The Impact of Smoking on Kidney Health in Diabetics
The Impact of Smoking on Kidney Health in Diabetics We all understand the importance of addressing all factors that can affect the health of individuals with diabetes. One such factor that often goes overlooked is smoking. Smoking not only poses significant risks to...
The Role of Omega-3 Fatty Acids in Kidney Health for Diabetics
The Role of Omega-3 Fatty Acids in Kidney Health for Diabetics We all understand the importance of managing diabetes and its related complications. One such complication that often arises in individuals with diabetes is kidney disease. In this article, we will explore...
read more
The Role of Kidney Biopsy in Diagnosing Diabetic Nephropathy
The Role of Kidney Biopsy in Diagnosing Diabetic Nephropathy We all understand the importance of accurate diagnosis and effective management of complications associated with diabetes. One such complication is diabetic nephropathy, a condition that affects the kidneys....
read more
How High Blood Pressure Affects Kidney Health in Diabetes
How High Blood Pressure Affects Kidney Health in Diabetes We all understand the importance of diabetes care and education. In this article, we will delve into the topic of how high blood pressure affects kidney health in individuals with diabetes or those at risk for...
read more
Understanding Acid-Base Balance in Diabetic Kidney Disease
Understanding Acid-Base Balance in Diabetic Kidney Disease Diabetic kidney disease is a serious complication that can occur in individuals with diabetes. It is important to understand the role of acid-base balance in managing this condition. In this article, we will...
read more
The Impact of Smoking on Kidney Health in Diabetics
The Impact of Smoking on Kidney Health in Diabetics We all understand the importance of addressing all factors that can affect the health of individuals with diabetes. One such factor that often goes overlooked is smoking. Smoking not only poses significant risks to...
read more
The Connection Between Kidney Infections and Diabetes
The Connection Between Kidney Infections and Diabetes We all understand the importance of managing diabetes and educating individuals about the various complications that can arise from this condition. One particular complication that people with diabetes should be...
read more
The Impact of Sleep on Kidney Health in Diabetic Patients
The Impact of Sleep on Kidney Health in Diabetic Patients We all understand the importance of addressing all aspects of diabetes management. One crucial factor that often gets overlooked is the impact of sleep on kidney health in diabetic patients. In this article, we...
read more
The Importance of Hydration for Kidney Function in Diabetics
The Importance of Hydration for Kidney Function in Diabetics We all understand the crucial role that hydration plays in maintaining kidney function for individuals with diabetes or those at risk for diabetes. In this comprehensive article, we will delve into the...
read more
About the Author
Dealing with Diabetes
|
How to Beat Bad Breath
When you get close to your guy or are about to pucker up, the last thing you want him to catch a whiff of is your dragon breath. So, to ensure your breath smells so fresh and so clean, clean when he lays one on you, we asked Nancy Rosen, D.D.S., a cosmetic restorative dentist in NYC, what causes bad breath and how to prevent and treat it.
By Carly Cardellino
Share
Back Next
Getty Images
The Causes of Bad Breath
If your breath smells like you've been chomping on sardines all day, listen up!
According to the Academy of General Dentistry (AGD), over 90 percent of bad breath originates in the mouth, throat, and tonsils. The main reason bad breath kicks in is thanks to bacteria in your mouth that feeds off of the particles of food that are stuck between your teeth and have been sitting there for hours. Gross, we know. As the bacteria starts eating away at the food, it produces a sulfur compound, which causes the foul smell.
Some other reasons you get bad breath:
Not using proper oral hygiene like brushing twice daily, flossing at night, etc.
Eating foods that contain garlic and onion, using tobacco products, having a medical disorder like a sinus infection, post-nasal drip, or a GI issue.
Having tonsil stones. This happens when food and plaque particles get trapped in your tonsil folds and calcify, causing bad breath. (These can removed/suctioning by an ear, nose, and throat doc.)
Now, here's how to kick bad breath to the curb...
Return to Gallery
Return to Gallery
Return to Gallery
Return to Gallery
Return to Gallery
Return to Gallery
Return to Gallery
Return to Gallery
Return to Gallery
Return to Gallery
Return to Gallery
Return to Gallery
Return to Slideshow
Related Stories
|
Strumenti Utente
Strumenti Sito
fisica:informatica:201718:esercitazioni:esercitazione8
Esercitazione allocazione dinamica
Esercizio 1: Sequenze e VLA
Realizzare un programma C che legge e memorizza in un VLA una sequenza di double di lunghezza non nota a tempo di compilazione (ma nota all'utente a tempo di esecuzione). Richiedere all'utente di specificare la lunghezza prima di immettere la sequenza.
Esercizio 2: Sequenze e malloc()
Modificare la soluzione all'esercizio 1 in modo da utilizzare la funzione malloc() per allocare l'array dopo aver letto la lunghezza.
Verificare la corretta allocazione e gestire gli errori.
Esercizio 3: Allocazioni in grossi blocchi
Eseguire il seguente programma C
#include <stdio.h>
#include <stdlib.h>
#define SIZE 10000000000
int main (void) {
double * h;
h = malloc(SIZE*sizeof(double));
if ( h == NULL ) {
perror("malloc");
exit(EXIT_FAILURE);
}
printf("Allocato h = %p\n",(void *) h);
return 0;
}
cosa succede ? Cercate di capire che cosa succede quando va in esecuzione perror() andando a verificare il manuale (sezione 3 man 3 perror)
Esercizio 4: realloc()
Modificare la soluzione all'esercizio 2 in modo da utilizzare la funzione relloc() per fare crescere dinamicamente l'array senza richiedere la lunghezza della sequenza.
Verificare la corretta allocazione e gestire gli errori.
Esercizio 5: Effetti collaterali indesiderati
Se ho una variabile intera “int i”, posso modificarne il valore con una funzione che riceve un puntatore “&i” (di tipo int * ) alla cella di memoria di “i”.
Allo stesso modo, se ho un array di interi int * a, posso modificarne il valore, ovvero creare un nuovo array a cui a e' un riferimento con una funzione che riceve un puntatore &a (di tipo int * * ) alla cella di memoria di a.
Le due funzioni array1() e array2() qui sotto tentano di fare proprio questo. Tuttavia, dopo aver inizializzato l'array B notiamo che il contenuto dell'array A e' cambiato. Qual'e' il motivo di questo comportamento? (suggerimento: guardare le slides su VLA)
#include <stdio.h>
// questa funzione riceve un puntatore ad un array di interi, ed ha il compito di creare un array in qu
void array1(int ** c);
// questa funzione si comporta come array1 ma crea un array differente
void array2(int ** c);
int main(){
int * aA; // array A
int * aB; // array B
array1(&aA);
printf("array A: %d, %d, %d \n",aA[0],aA[1],aA[2]);
array2(&aB);
printf("array B: %d, %d, %d \n",aB[0],aB[1],aB[2]);
// ma nel frattempo, cosa e' successo all'array A?
printf("array A: %d, %d, %d \n",aA[0],aA[1],aA[2]);
return 0;
}
void array1(int ** c){
int n = 3;
// avendo usato a[n], la dimensione non e' nota a tempo di compilazione
// quindi non possiamo utilizzare la costruzione con valore letterale "a[n] = {1,2,3}"
int a[n];
a[0] = 1;
a[1] = 2;
a[2] = 3;
*c = a;
}
void array2(int ** c){
int n = 3;
int a[n];
a[0] = 4;
a[1] = 5;
a[2] = 6;
*c = a;
}
Correggere il codice in modo che le funzioni array1() e array2() allochino i rispettivi array sullo heap con la funzione “malloc()”, e venga quindi evitato l'effetto collaterale di B su A.
Esercizio 6: Funzione di allocazione/deallocazione di matrici
Le matrici possono essere rappresentate come array di puntatori a righe. Si richiede di implementare le funzioni per la creazione e la deallocazione di matrici nxm di double. In particolare, la funzione
/** crea una matrice di double rappresentata come array di puntatori a righe
\param n numero di righe
\param m numero di colonne
\retval NULL se si e' verificato un errore
\retval p puntatore alla matrice allocata altrimenti
*/
double ** mat_new (unsigned n, unsigned m);
crea una matrice con n righe ed m colonne e ne restituisce il puntatore. E
/** libera la memoria occupata da una matrice di double rappresentata come array di puntatori a righe
\param a puntatore alla matrice da deallocare
\param n numero di righe
*/
void mat_free (double** a, unsigned n);
Sviluppare un opportuno main che testa che l'allocazione e la deallocazione siano stata effettuata correttamente, anche in caso di errori in corso d'opera.
fisica/informatica/201718/esercitazioni/esercitazione8.txt · Ultima modifica: 06/03/2019 alle 13:53 (3 anni fa) da Susanna Pelagatti
|
Python Archive
iterate through dictionary python
In this post, we will see how to iterate through dictionary in python. You can use for key in dict.keys(): to iterate over keys of dictionary. You can use for value in dict.values(): to …
Python dictionary append
In this tutorial, we will see how to append items to dictionary. There is no method called append in dictionary in python, you can actually use update method to add key value pairs to the …
Python float to String
In this tutorial, we will see how to convert float to String. You can simply use str method to convert float to String. Let’s understand with the help of simple example. Output: Converted f to …
Python String to float
In this tutorial, we will see how to convert String to float in python. You can simply use float() function to convert String to float. Let’s understand with the help of a simple example. Output: …
Python dict setDefault
In this tutorial, we will see about Python dict setDefault method. Python dictionary setDefault method is used to return the value if present in dictionary else inserts the key with value in dictionary if default …
remove key from dictionary python
In this tutorial, we will see how to remove key from the dictionary in Python. There are multiple ways to do it.Let’s explore a different way of deleting a key from the dictionary. Using pop …
Python String to datetime
In this tutorial, we will see how to convert String to datetime object. Let’s say, you got String as input and you want to convert it datetime object to extract various details from it. Using strptime …
Python datetime to String
In this tutorial, we will see how to convert datetime to String object. Let’s say, you have datetime as input and you want to convert it string to display it. Using strftime Using format Using strptime method …
Join Our News Letter - Stay Updated
Subscribe to Awesome Java Content.
You can like our facebook page Java2blog
|
Can one go for a Pancreas Transplant for Type 2 Diabetes? - Dr. Mahesh DM - Site Diabetes Saltar al contenido
Site Diabetes
Can one go for a Pancreas Transplant for Type 2 Diabetes? – Dr. Mahesh DM
noviembre 12, 2018
Pancreas transplant is the curative treatment in diabetes. Most commonly it is done in type 1diabetes and rarely in type 2 diabetes. Especially in those who are on insulin it can be done but the success rate is not very good. It is 10 to 25% and in some centres more than that. In type 2 diabetes along with that kidney transplant is usually done. So it is done usually in those with both kidney failure and diabetes on insulin because the patients have to be on chemotherapy and immunotherapy and immunosuppressants which itself can further lead to diabetes. Hence it has to be done only in those patients who really have not been responding to insulin and have too much fluctuations and sometimes severe hypoglycaemia, unawareness along with renal failure.
Site Diabetes
Like most websites site diabetes uses cookies. In order to deliver a personalized, responsive service and to improve the site, we remember and store information about how you use it. This is done using simple text files called cookies which sit on your computer.
|
Advanced Title Formatting
From BM-productions
Jump to navigation Jump to search
Windows Media Player ATF Reference
This documentation is similar to the Winamp ATF Reference and the Foobar2000 Title Formatting Reference, as similar ATF systems are used there.
ATF determines how Windows Media Player should display metadata of media items, in various places in the user interface. Specific ATF strings can be manually edited in Windows Media Player Plus! settings.
ATF Usage
%blah% denotes a metadata field.
$blah() denotes a function call.
'' (single quotation marks) outputs raw text without parsing. For example, 'blah$blah%blah[]' will output the literal string and ignore the special characters ($, %, [ and ]).
[...] displays everything between the square brackets only if at least one of the fields referenced inside has been found. For example [%artist% - ] will show: "Artist - " only if the %artist% tag is populated, otherwise it will not show anything at all (including the hyphen and spaces).
Fields
In addition to the fields listed below, any Windows Media Player attribute can be used as a field, by surrounding the attribute name with percent signs (%). For the list of available Windows Media Player attributes, refer to the Attribute Reference at MSDN.
Example: %WM/Mood% returns the mood of the song.
%filename%
Returns the full path of the file. To display only the name and extension parts (without the leading path), use the $filepart function.
%folder%
Returns the containing folder.
%rating%
Returns the star rating as an integer from 1 to 5, if set. To display as stars or another character, use the $repeat function.
%playcount%
Returns the play count (the number of times the media item has been played), if the item is stored in the Media Library.
%artist%
Returns the (Contributing) Artist field.
%title%
Returns the Title field.
%album%
Returns the Album field.
%year%
Returns the Release Year field.
%genre%
Returns the Genre field.
%comment%
Returns the Comment field.
%tracknumber%
Returns the Track number with no padding, e.g. Track 1 will be displayed as 1.
To pad with zeros (01, 02...10, 11) use the $num or $lpad function.
%track%
Identical to %tracknumber%.
%albumartist%
Returns the Album Artist field.
%disc%
Returns the Set field, if available, e.g. 1/2 (disc #1 of a 2 CD set).
%composer%
Returns the Composer field.
%publisher%
Returns the Publisher field.
%bitrate%
Returns the bit rate, in kilobits per second. For variable bit rate (VBR) files, the average bit rate is returned.
%length%
Returns the length in milliseconds. For a formatted length, use %lengthf%.
%lengthf%
Returns the length, formatted as minutes:seconds.
%type%
Returns 1 for video, 0 for audio, or an empty string for other media types (such as pictures).
Use %MediaType% to query for other media types.
%vbr%
Returns 1 for variable bit rate (VBR) files, or 0 for constant bit rate (CBR) files.
%category%
Returns the Subgenre (category) field.
%trackartist%
Returns the (Contributing) Artist field, but only if it differs from the Album Artist field. Returns an empty string if both fields contain the same value. Requires Windows Media Player Plus! 2.0 or higher.
%mood%
Returns the Mood field.
%bpm%
Returns the Beats per minute field.
%key%
Returns the Key field.
%lyricist%
Returns the Lyricist field.
%conductor%
Returns the Conductor field.
%ISRC%
Returns the International Standard Recording Code or ISO 3901.
Functions
Note: be careful with spaces after commas: $if(%title%, Has A Title, Has No Title) will display " Has A Title" (note the leading space) instead of "Has A Title". The proper form is $if(%title%,Has A Title,Has No Title).
Control Flow
[...]
Conditional section (not really a function), see #ATF Usage.
$if
Parameters: (a, then, else)
Returns: If a contains at least one valid, non-empty field, then is evaluated and returned, otherwise the else parameter is. Note that $if(A,A,B) is equivalent to $if2(A,B).
Example: $if(%artist%,Has an artist tag,Has no artist tag)
$if2
Parameters: (a, else)
Returns: If a contains a valid, non-empty field, a is evaluated and returned, otherwise the else parameter is.
Example: $if2(%album%,no-album)
$if3
Parameters: (a1, ..., aN, else)
Returns: If one of the a1...aN parameters contains a valid, non-empty field, that parameter is evaluated and returned, otherwise the else parameter is.
Example: $if3(%artist%,%filename%,%album%,no field)
$decode
Parameters: (a, b1, c1, ..., bN, cN, else)
Returns: Parameter ci or else. A switch/case function, which determines which bi parameter is equal to a and returns the corresponding ci parameter. If none are matched, it returns the final parameter else.
Example: $decode($fileext(%filename%),MP3,MPEG-1 Layer 3,MP4,MPEG-4 Container,Other)
$ifgreater
Parameters: (x1, x2, then, else)
Returns: Compares the integer numbers x1 and x2, if x1 is greater than x2, then is evaluated and its value returned. Otherwise, the else part is evaluated and its value returned.
Example: $ifgreater(%rating%,2,Highly rated song,Not highly rated song)
$iflonger
Parameters: (a1, x1, then, else)
Returns: Checks if string a1 is longer than x1 characters. If a1 is longer, the then part is evaluated and its value returned. Otherwise, the else part is evaluated and its value returned.
Example: $iflonger(%title%,15,A long title,A short title)
$IfStrEqual
Parameters: (A, B, then)
Returns: If string A equals string B (case insensitive), the then part is evaluated and its value returned. Nothing is returned if the strings are different.
Example: $IfStrEqual(%year%,2006,New!) will return "New!" if the media was released in 2006.
$IfStrEqual2
Parameters: (A, B, then, else)
Returns: If string A equals string B (case insensitive), the then part is evaluated and its value returned. Otherwise, the else part is evaluated and its value returned.
Example: $IfStrEqual2(%type%,1,'(Video)','(Audio)')
$IfStrNotEqual
Parameters: (A, B, then)
Returns: If string A is different from string B (case insensitive), the then part is evaluated and its value returned. Nothing is returned if the strings are equal.
Example: $IfStrNotEqual(%type%,1,Not a video)
Arithmetic Operations
$mod
Parameters: (x1, x2)
Returns: Remainder of a division of x1 by x2.
Example: $mod(21,8) returns 5.
$div
Parameters: (x1, x2)
Returns: x1 / x2. Result of a division of x1 by x2.
Example: $div(60,10)
$mul
Parameters: (x1, x2, ..., xn): list of numbers to multiply
Returns: x1 * x2 * ... * xn. The supplied numbers multiplied.
Example: $mul(7,8,3,4)
$muldiv
Parameters: (x1, x2, x3)
Returns: x1 * x2 / x3. x1 multiplied by x2, divided by x3. Result is rounded to nearest integer.
Example: $muldiv(10,6,3) returns 20.
$sub
Parameters: (x1, x2, ..., xn): list of numbers to subtract
Returns: x1 - x2 - ... - xn. The result of the sum of x2...xn, subtracted from x1.
Example: $sub(25,1,3,2,3)
$add
Parameters: (x1, x2, ..., xn): list of numbers to add
Returns: x1 + x2 + ... + xn. The addition of all the supplied numbers.
Example: $add(2,3,%playcount%,%rating%)
$max
Parameters: (x1, ..., xn): list of numbers to compare
Returns: The largest of the supplied numbers.
Example: $max(7,8,3,4)
$min
Parameters: (x1, ..., xn): list of numbers to compare
Returns: The smallest of the supplied numbers.
Example: $min(7,8,3,4)
$greater
Parameters: (x1, x2): two numbers to compare
Returns: 1 if x1 is greater than x2, otherwise nothing. Similar in use to the $ifgreater function. Note: does not work within a $if function.
Example: $greater(3,2)
String Operations
$lower
Parameters: (a1)
Returns: Lower case of string a1.
Example: $lower(%title%)
$upper
Parameters: (a1)
Returns: Upper case of string a1.
Example: $upper(%title%)
$replace
Parameters: (a1, a2, a3)
Returns: String a1 with all occurrences of string a2 replaced by string a3.
Example: $replace(dum,u,o) returns "dom".
$left
Parameters: (a1, x1)
Returns: The first x1 characters of string a1.
Example: $left(%title%)
$right
Parameters: (a1, x1)
Returns: The last x1 characters of string a1.
Example: $right(%title%)
$len
Parameters: (a1)
Returns: The number of characters in string a1.
Example: $len(%artist%)
$substr
Parameters: (a1, x1, x2)
Returns: The substring of string a1, starting from the x1-th character and ending at the x2-th character. The first character in a string has index 1.
Example: $substr(aacbbabb,2,6) returns "acbba".
$strstr
Parameters: (a1, a2)
Returns: The index of the first occurrence of string a2 in string a1. The first character in a string has index 1.
Example: $strstr(aacbbabb,ab) returns 6.
$strlchr
Parameters: (a1, a2)
Returns: The index of the first occurrence of character a2 in string a1. The first character in a string has index 1.
Example: $strlchr(aacbbabb,a) returns 1.
$strrchr
Parameters: (a1, a2)
Returns: The index of the last occurrence of character a2 in string a1. The first character in a string has index 1.
Example: $strrchr(aacbbabb,a) returns 6.
$strchr
Identical to $strlchr.
$shortest
Parameters: (a1, a2)
Returns: String a1 or string a2, based on which has the shorter length.
Example: $shortest(%album%,%folder%)
$longest
Parameters: (a1, a2)
Returns: String a1 or string a2, based on which has the greater length.
Example: $longest(%album%,%folder%)
$abbr
Parameters: (a1, x1)
Returns: Abbreviated version of string a1. Parameter x1 is optional. If defined, string a1 will only be abbreviated when its length exceeds x1 characters.
Examples:
• $abbr(%album%) converts Album title of e.g. "Final Fantasy VI" to "FFVI".
• $abbr(Advanced Title Formatting,10) returns "ATF".
• $abbr(%album%,10) returns abbreviated Album title, only if longer than 10 characters.
$padcut
Parameters: (a1, x1)
Returns: String a1 padded with spaces or cut off, resulting in a string of exactly x1 characters.
Example: $padcut(%artist%,15)
$cut
Parameters: (a1, x1)
Returns: String a1, cut off after the x1-th character.
Example: $cut(%comment%,15) returns the first 15 characters of the Comment field.
$pad
Parameters: (a1, x1, a2)
Returns: String a1, padded to at least x1 characters, with spaces by default, or specify a character (or repeating string) as a2.
Example: $pad(%artist%,40), or $pad(%artist%,40,.) to pad with periods.
$lpad
Parameters: (a1, x1, a2)
Returns: String a1, padded to at least x1 characters on the left, with spaces by default, or specify a character (or repeating string) as a2.
Example: $lpad(%tracknumber%,3), or $lpad(%tracknumber%,3,0) to pad zeros in front.
$trim
Parameters: (a1)
Returns: String a1, without any leading or trailing spaces.
Example: $trim(%artist%)
$repeat
Parameters: (a1, x1)
Returns: String a1, repeated x1 times.
Example: $repeat(*,%rating%)
$caps
Parameters: (a1)
Returns: Lower case of string a1, with the first character of each word in upper case.
Example: $caps(%artist%)
$caps2
Parameters: (a1)
Returns: String a1, with the first character of each word in upper case. The case of all other characters is preserved.
Example: $caps2(%artist%)
$fileext
Parameters: (a1)
Returns: The file extension of filename a1.
Example: $fileext(%filename%)
$ext
Identical to $fileext.
$filepart
Parameters: (a1)
Returns: The name and extension parts of filename a1 (i.e. a1 without the leading path).
Example: $filepart(%filename%)
$filename
Identical to $filepart.
$directory
Parameters: (a1, x1)
Returns: The directory name of filename a1, after going up by x1 levels. Parameter x1 is optional, the default is 1.
Example: $directory(C:\Music\Artist - Album\Song.mp3,2) will return "Music".
$split
Parameters: (a1, a2, x1)
Returns: Splits string a1 into tokens, by using character a2 as a separator, and returns the x1-th token. This can be useful for splitting disc and/or track strings, e.g. to show "1" instead of "1/11".
Example: $num(%track%,2)$IfStrNotEqual($split(%disc%,/,1),,/$num($split(%disc%,/,1),2)) will show the track number, and include the first part of the Set field (the disc number), if not empty.
$hex
Parameters: (x1, x2)
Returns: x1, formatted as hexadecimal to x2 number of digits, padded to the left with zeros.
Example: $hex(%tracknumber%,4)
$num
Parameters: (x1, x2)
Returns: x1, zero padded to the left to form a number of x2 digits.
Example: $num(%tracknumber%,5)
$dec
Identical to $num.
$null
Parameters: Any number of parameters.
Returns: Nothing at all. This function can be useful when a parameter is required, but you want an empty string.
Example: $null()
System Info
$systime_second
Parameters: None.
Returns: The seconds component of the current time.
Example: $systime_second()
$systime_minute
Parameters: None.
Returns: The minutes component of the current time.
Example: $systime_minute()
$systime_hour
Parameters: None.
Returns: The hours component of the current time.
Example: $systime_hour()
$systime_day
Parameters: None.
Returns: The days component of the current date.
Example: $systime_day()
$systime_month
Parameters: None.
Returns: The months component of the current date.
Example: $systime_month()
$systime_year
Parameters: None.
Returns: The years component of the current date.
Example: $systime_year()
Examples
Standard ATF syntax
Syntax:
[%artist% - ][%album% - ][$num(%track%,2) - ]%title%
Example: Pink Floyd - Animals - 02 - Dogs
Advanced ATF syntax
Syntax: (split over multiple lines to improve readability)
[$if2(%albumartist%,%artist%) - ][%album% - ][$num(%track%,2) - ]
$IfStrNotEqual(%artist%,$if2(%albumartist%,%artist%),[%artist% - ])
[%title%]
[$if($fileext(%filename%),' [ ',)]
[%year% | ][$fileext(%filename%) ][$if(%bitrate%, '|' ,)][%bitrate% 'kbps' ]
[$if($fileext(%filename%),']',)]
[ $repeat(*,%rating%) ]
Returns: <Album Artist> - <Album> - ## - <Artist> - <Title> [ <Release Year> | <Extension> | <Bit rate> ] <Star rating> (if Album Artist equals Artist, the Artist field is not shown).
Example: Various - Arcana - 01 - Tripswitch - Calabi Yau [ 2006 | mp3 | 205 kbps ] *****
|
Category:
What Is Secondary Memory?
A computer hard drive qualifies as secondary memory.
USB devices use secondary memory.
Article Details
• Written By: G. Wiesen
• Edited By: Heather Bailey
• Last Modified Date: 01 February 2015
• Copyright Protected:
2003-2015
Conjecture Corporation
• Print this Article
Free Widgets for your Site/Blog
26% of all video game players are over 50 years old. more...
March 1 , 1692 : The Salem Witch Hunt began. more...
Secondary memory is a type of computer memory that is not directly accessed by the central processing unit (CPU) of a computer and is usually available as non-volatile memory. One of the most common forms of this memory is the hard drive of a computer, which is used to store the operating system (OS) and other programs. Other forms of secondary memory include disc drives for compact discs (CDs) or digital versatile discs (DVDs), as well as removable flash memory. In contrast to this, primary memory is computer memory directly accessed by the CPU, usually volatile memory, and tertiary memory refers to systems outside of a computer that can be directly accessed through various means.
There are several different types of memory utilized by computer systems, and secondary memory is one of the most common and important. This type of memory is typically recognized by how it is used by a computer system and the way in which data is stored on it. The main characteristic of this type of memory is that it is not accessed directly by the CPU, but instead through a connection that allows the CPU to utilize it. This type of memory is also usually non-volatile memory, which means it retains data even without a power source.
Ad
One of the most common types of secondary memory is the hard drive on a computer. This drive is accessed by the CPU through one of several different indirect methods and data remains on the drive even without a power supply. Other disc drives, such as those used with CDs and DVDs, are also types of secondary memory utilized for other purposes. Easily removable memory types, such as flash drives, are also secondary memory and use interfaces such as a universal serial bus (USB) port to be accessed by the CPU.
In addition to secondary memory, many computer systems also utilize primary memory, tertiary memory, and offline storage. Primary memory is the memory on a computer that is directly accessed by the CPU, namely random access memory (RAM) and the memory used to store the basic input/output system (BIOS). Tertiary memory is typically external memory a computer can access directly through some type of automated system, such as a bank of hard drives that can be connected to a computer through the use of a robotic armature. Offline storage is memory that can be used and accessed remotely, such as servers that can be utilized through an Internet connection for data backup or storage.
Ad
Recommended
You might also Like
Discuss this Article
stoneMason
Post 3
Is an external memory drive secondary memory?
SteamLouis
Post 2
When secondary memory first came out, I thought it was really cool. It was very useful and I used it all the time. I do still use it occasionally, but only when a file cannot be attached to my email.
Secondary memory is not as important anymore because it's so easy to attach things to personal emails these days. When I need to save something, I just email it to myself.
This works great because I have access to my email everywhere and my email sort of becomes my storage file. If I ever need that attachment again, I can search my email, open it and access it.
But you can fit only so many things on secondary memory. Eventually you have to erase some of it. Email storage is harder to fill up.
burcinc
Post 1
I always keep a flash drive with me so that I can save my assignments when I work on them at the public computers at school. We're not allowed to save anything on public computers, so it's necessary to have secondary memory.
Post your comments
Post Anonymously
Login
username
password
forgot password?
Register
username
password
confirm
email
|
Login| Sign Up| Help| Contact|
Patent Searching and Data
Matches 51 - 100 out of 13,351
Document Document Title
WO/2014/139784A1
The invention relates to a centrifugal pump assembly, in particular a heating circulation pump assembly, having a centrifugal pump (1), having an electrical motor (7) driving the pump (1), having an electronic speed controller (11) for t...
WO/2014/137219A1
The invention provides a liquid filled, fast rotating unit, such as an electric motor, a mechanical or a magnetic coupling, distinctive in that the liquid filled unit comprises at least one rotating shield arranged between surfaces of di...
WO/2014/133397A1
Subsea turbomachine assembly comprising a motor (6), an axial bearing (3, 4) and two radial bearings (5). The turbomachine assembly (200, 300, 400, 500) further comprises a magnetic lifting assembly (20, 40, 50, 60, 70) comprising a magn...
WO/2014/124975A2
The invention relates to an electric fluid pump (1) having a wet region (2), in which a permanently excited rotor (3) of an electronically commutated electric motor (4) is arranged, and having a dry region (6), in which control electroni...
WO/2014/124975A3
The invention relates to an electric fluid pump (1) having a wet region (2), in which a permanently excited rotor (3) of an electronically commutated electric motor (4) is arranged, and having a dry region (6), in which control electroni...
WO/2014/120847A1
An electric submersible pump system can include a multiphase electric motor operatively coupled to a fluid pump where the multiphase motor includes a wye point; telemetry circuitry operatively coupled to the wye point where the telemetry...
WO/2014/117123A1
A submersible pump can include a male part that includes an outer diameter; a female part that includes an inner diameter; an elastomeric seal element disposed between the male part and the female part; and a non-elastomeric seal element...
WO/2014/115998A1
The present invention relates to a metering pump for transferring a certain amount of fluid. The metering pump has a plurality of compression members (200b) provided with compression chambers (200a) for pumping fluid and formed from wast...
WO/2014/116618A1
A submersible pump assembly has modules, including a rotary pump, an electrical motor, and a seal section located between the motor and the pump. The seal section has a tubular housing with a lower adapter secured to the housing and join...
WO/2014/115249A1
A pump provided with a molded stator (50) obtained by using a molding resin (53) to form an integral molding from a stator comprising a coil (57) wound around a plurality of teeth provided with the insulating part (56) of a stator core, ...
WO/2014/109648A1
The invention provides a subsea pump, distinctive in that it comprises a pressure housing divided into two compartments; a compartment with pump or impellers arranged on a shaft and a compartment with motor or a stator; a diaphragm arran...
WO/2014/109029A1
A centrifugal pump used for assisted circulation or extracorporeal circulation which comprises: a housing having an inlet for a liquid and an outlet for a liquid; a rotating body which is disposed inside the housing, comprises a rotating...
WO/2014/106885A1
Provided is an axial flow pump in which a fixed element and a power supply device can be removed with ease, and in which parts excluding the fixed element and power supply device are disposable. The axial flow blood pump comprises: an im...
WO/2014/100877A1
The present invention relates to a fuel pump comprising: a casing (7), a bearing plate (6) and a brushless motor, the brushless motor comprising: a rotor (4), a stator (3), a stator body (10) and a shaft (5), the bearing plate (6) being ...
WO/2014/102066A3
The invention relates to a pump unit comprising an electric drive motor which is arranged in a stator housing (8) and an electronic housing (18) which is arranged on the outer side of the stator housing (8). Said electronic housing (18) ...
WO/2014/101968A1
The present invention pertains to a pump assembly comprising a suction pump having an inlet for drawing water from a water source in fluid communication with said inlet. Said suction pump comprises an outlet in communication with a pump ...
WO/2014/102066A2
The invention relates to a pump unit comprising an electric drive motor which is arranged in a stator housing (8) and an electronic housing (18) which is arranged on the outer side of the stator housing (8). Said electronic housing (18) ...
WO/2014/102146A3
The invention relates to a pump assembly having an electric motor, which has a stator housing (6) and an electronic system housing (4) fastened to the outside of the stator housing (6), wherein the stator housing (6) has a recess (29), w...
WO/2014/102173A3
The invention relates to a pump unit, comprising an electric motor, which has a stator housing (6) and an electronics housing (4; 50) fastened to the outside of the stator housing (6), wherein the electronics housing (4; 50) is connected...
WO/2014/099484A1
A centrifugal pump (108) has a gas accumulation reduction system to reduce the risk of gas locking caused by the accumulation of gas at the inlet of the impeller. The gas accumulation reduction system includes: (i) one or more diffuser p...
WO/2014/095118A1
The invention proposes an electric pump (1) for delivering a fluid. The electric pump (1) has a first pump component (3) with a first interface (7) and has a second pump component (5). The first pump component (3) and the second pump com...
WO/2014/095102A1
The invention relates to a water-bearing domestic appliance, in particular a domestic dishwasher (1), comprising a canned motor pump (2). The canned motor pump comprises a housing (4) that has a rotor chamber (6) and conducts liquid at l...
WO/2014/095291A1
The invention relates to product-lubricated multiphase pump (2, 110, 116) for pumping a hydrocarbon-containing multiphase mixture. In order to achieve good cooling and lubrication of pump elements without a lot of operating fluid and ope...
WO/2014/095874A1
The invention relates to a water pump (1) driven by an electric motor with an electronically commutated electric motor contained in a pump casing (6), the rotor (13) of which motor is rotatably mounted about a, preferably rotationally fi...
WO/2014/090613A1
The invention relates to a pump for pumping liquid, the pump comprising a drive unit (3) and a heat sink (23) connected to said drive unit (3), which heat sink is arranged to carry off heat that is generated in said drive unit during ope...
WO/2014/092581A1
Pressure volume regulator (20) for control of supply and pressure of barrier fluid for pumps and compressors subsea, comprising an inlet (18) for barrier fluid at an inlet pressure, a first outlet (19) and a second outlet (15), the inlet...
WO/2014/090863A3
Magnetically coupled pumps use cans which have a side wall arranged in a gap between a driver and a rotor of the pump. With a view to good efficiency of the pump, the gap should be as narrow as possible, which can only be achieved with a...
WO/2014/090078A1
An AC permanent-magnet drain pump comprises a pump cap (1), a pump body (10), a magnetic core (15), a rotation shaft (11), a stator core (8), and a coil (7). The coil (7) winds on a coil former, the stator core (8) is assembled to the co...
WO/2014/090079A1
An AC permanent-magnet drain pump comprises a pump body (10), a pump cap (1), an impeller (2), a stator assembly, and a rotor assembly. The stator assembly comprises a stator coil (7) and a stator core (8), the rotor assembly comprises a...
WO/2014/086472A1
The invention relates to a centrifugal pump, in particular a waste water submersible pump having an impeller (1), of which the end face facing the pump intake opening is open and only the end face of the impeller facing away from the int...
WO/2014/088901A1
An electrical submersible pumping system includes a pump assembly and a motor assembly. The motor assembly includes a plurality of stator coils and each of the plurality of stator coils comprises magnet wire. The magnet wire includes an ...
WO/2014/088126A1
The self-priming lifting pump directly connected to an engine and having large capacity suction force according to the present invention is configured in that a spiral vortex flow chamber is formed on one side of a pump housing, an impel...
WO/2014/087845A1
Provided is a water pump that is not prone to discharge, to outside the water pump, of a liquid accumulated in a liquid-accumulation space. Said water pump has the following: a drive rotor that is rotationally driven by a drive mechanism...
WO/2014/088900A1
An electric motor assembly configured for use in a downhole pumping system includes a number of electrically conductive components that are insulated from fluids, mechanical abrasion, electrical current and electrical grounds using an ad...
WO/2014/085083A2
An electric motor assembly configured for use in a downhole pumping system includes a plurality of stator coils. Each of the plurality of stator coils includes magnet wire that has an insulator surrounding a conductor. In preferred embod...
WO/2014/085024A1
A counter rotating helico-axial pump is provided, the pump comprising: (a) an inner rotor comprising a plurality of outwardly extending helico-axial impeller vanes; (b) a hollow outer rotor comprising a plurality of inwardly extending he...
WO/2014/085083A3
An electric motor assembly configured for use in a downhole pumping system includes a plurality of stator coils. Each of the plurality of stator coils includes magnet wire that has an insulator surrounding a conductor. In preferred embod...
WO/2014/079847A1
A pump arrangement has two separately drivable rotor elements (10, 12), each having conveying elements (14, 16). The conveying elements (14, 16) form conveying surfaces (18, 22). Depending on the position of the conveying elements relati...
WO/2014/078344A1
An electrical submersible pumping system includes a pump assembly and a motor assembly. The motor assembly includes a plurality of stator coils and each of the plurality of stator coils comprises magnet wire. The magnet wire has an insul...
WO/2014/075577A1
A rainproof water pump comprises a water pump main body (1) and a casing (2) of the main body. The casing is provided with air inlets (22). The rainproof water pump is characterized in that the back parts of the air inlets (22) of the ca...
WO/2014/073054A1
The purpose of the present invention is to provide a pump device which has the function of separating foreign matter from operating fluid containing foreign matter and which can accommodate an increase in the flow rate of the operating f...
WO/2014/073821A1
Provided are a power-supply-free air pump and a water-treatment device incorporating same. The power-supply-free air pump may comprise: a drive unit incorporating a housing which is formed so as to have a water inlet port and a water out...
WO/2014/071911A1
The problem addressed by the present invention is that of providing an improved ancillary unit. This problem is solved by the following features: - the ancillary unit comprises a mechanical and an electric drive mechanism; - the mechanic...
WO/2014/071536A1
The invention relates to a countercurrent system (1) which is a horizontal axial turbomachine. The housing (6) can be adjusted vertically by means of the guide pipe (5) and the pipe guide (17) and horizontally by means of the rail guide ...
WO/2014/072360A1
The invention refers to an automotive electric liquid pump (10) with an EC-motor (16) directly driving a pump wheel (30). The motor (16) is provided with a wet motor rotor (40) comprising a motor rotor body (41) with a cylindrical rotor ...
WO/2014/070522A1
A submersible pump assembly includes a rotary pump and an electrical motor operatively connected to the pump for driving the pump. A seal section is connected between the motor and the pump for reducing a pressure differential between lu...
WO/2014/065712A1
The invention relates to the oil producing industry, and more particularly to submersible equipment for the extraction of oil with a high gas content. The valve for releasing gas from a submersible pump comprises a housing (1), a gate me...
WO/2014/059965A3
The invention relates to the development of a novel arrangement of a coolant pump for internal combustion engines that is of simple and robust design, can be simply manufactured, allows substantially easier access to the coolant pump in ...
WO/2014/058426A1
A system located in a subsea environment is disclosed comprising a submersible pump positioned in a well, a hydraulic motor that is operatively coupled to the submersible pump and a pressurized fluid supply pump that is positioned on or ...
WO/2014/054175A1
A pump equipped with: a molded stator having a substrate on which a magnetic pole position detection element has been mounted; and a rotor having a rotor part one axial end of which opposes the magnetic pole position detection element an...
Matches 51 - 100 out of 13,351
|
Support Scanners ES Series Epson ES-C320W
How should I clean the inside of my product?
• Clean your product regularly to make sure that no dust builds up on the glass scanning surfaces. Dust can cause spots or lines in your scanned images. Clean the inside of the product every 5,000 scans. You can check the latest number of scans and set cleaning time notifications and alerts in the Epson Scan 2 Utility. By default, a notification is sent after every 5,000 scans.
Caution:
Do not use a hard brush, alcohol, or paint thinner to clean the product or you may damage it. Do not use oil or other lubricants inside the product or let water get inside it. Do not open the product's outer case. Be careful not to get your hands or hair caught in the gears or rollers when cleaning the inside the scanner. Otherwise, injury could occur.
Caution:
Be careful not to get your hands or hair caught in the gears or rollers when cleaning the inside the scanner. Otherwise, injury could occur.
Note: Clean inside your product while it is turned on.
1. Open the vertical path cover.
Note: When opening the vertical path cover, hold the area indicated to avoid touching the antistatic brush. If the brush becomes bent it cannot eliminate static electricity, and this may cause the output originals to stick to each other.
2. Wipe the rollers and plastic rollers with a soft, lint-free cloth dampened with a small amount of cleaner or water.
Note: Do not spray liquid directly into the scanner. Be careful not to touch the antistatic brush when wiping the rollers. If the brush becomes bent it cannot eliminate static electricity, and this may cause the output originals to stick to each other.
3. Open the input tray, and pull the lever to open the scanner cover.
4. Wipe the 8 rollers shown with a soft, lint-free cloth dampened with a small amount of cleaner or water.
Note: Do not spray liquid directly into the scanner.
5. Close the scanner cover with both hands. Then, close the vertical path cover and then the input tray, in that order.
After closing the cover, wait for approximately four seconds before proceeding to the next step.
6. Repeat steps 1 to 5 four times. The internal rollers rotate approximately one-quarter of a turn each time the cover is closed. Repeat this step until the entire roller is clean.
Note: If paper dust adheres to the inside of the vertical path cover, wipe it off with a soft, lint-free cloth.
7. Open the input tray, and pull the lever to open the scanner cover.
8. Use a genuine Epson cleaning kit or a soft, lint-free cloth to wipe off any dust or dirt on the glass scanning surfaces and the rollers inside the scanner cover. If the glass surface is stained with grease or some other hard-to-remove material, use a genuine Epson cleaning kit with a small amount of cleaner on the cleaning cloth to remove the stains. Wipe off all remaining liquid.
Caution:
Do not use brushes or hard tools to clean the scanner glass. Any scratches on the glass may affect the scan quality. Do not spray cleaner directly on the scanning surfaces. Be careful not to place too much force on the glass.
9. Use a cotton swab to wipe off any dust or dirt on the sensors shown here.
Caution:
Do not use liquid or glass cleaner on the cotton swab.
Note: The ultrasonic sensors do not normally require maintenance. However, if multiple feed errors occur frequently, it is possible that dust that has accumulated around the ultrasonic sensors is being mistakenly detected as a multiple feed error. If this is the case, carefully wipe away any dust with a cotton swab. If you have a blower, such as one used to clean cameras, use it to remove the dust.
Do not spray cleaner directly onto the ultrasonic sensor. Also, be careful not to insert the cotton swab too far into the sensor and make sure no cotton fibers are left behind.
10. Open the cover and remove the separation roller.
11. Wipe off any dust or dirt on the separation roller using a genuine Epson cleaning kit or a soft, moist cloth.
Caution:
Use only a genuine Epson cleaning kit or soft, moist cloth to clean the roller; using a dry cloth may damage the surface of the roller. Do not spray cleaners directly inside the product; always spray cleaners on a cleaning cloth to slightly dampen the cloth. Wipe off any excess cleaner with a dry, lint-free cloth.
12. Replace the separation roller.
13. Open the cover, then remove the pickup roller.
14. Wipe off any dust or dirt on the pickup roller using a genuine Epson cleaning kit or a soft, moist cloth.
Caution:
Use only a genuine Epson cleaning kit or soft, moist cloth to clean the roller; using a dry cloth may damage the surface of the roller.
15. Replace the pickup roller.
16. Close the scanner cover with both hands. Then, close the input tray.
17. Reset the number of scans after cleaning.
Related tasks
Replacing the Rollers
Related references
Optional Accessories and Replacement Parts
Published: 14-Sep-2023 Was this helpful? Thank you for the feedback!
Was this helpful?
Please tell us why this was not helpful.
|
Main Content
fractalSnowflake
Create fractal Koch snowflake antenna
Description
The fractalSnowflake object creates a Koch snowflake fractal antenna. These fractal antennas are used in mobile phone, Wi-Fi®, and radar applications.
A fractal antenna uses a fractal, a self-similar design that is repeated in different dimensions so as to maximize effective the length or increase the perimeter of the material that transmits or receives electromagnetic radiation. This makes the fractal antennas compact and therefore suitable for use in small and complex circuits. Fractal antennas also have higher input impedance or resistance due to their length or increased perimeter.
All fractal antennas are printed structures that are etched on a dielectric substrate.
Creation
Description
example
ant = fractalSnowflake creates a Koch’s snowflake fractal antenna. The default fractal is centered at the origin, and the number of iterations is set to 2. The length of the fractal is for an operating frequency of 4.15 GHz.
example
ant = fractalSnowflake(Name,Value) sets properties using one or more name-value pairs. For example, ant = fractalSnowflake('Numiterations',4) creates a Koch's snowflake with four iterations.
Properties
expand all
Number of iterations performed on the fractal antenna, specified as a scalar integer.
Example: 'NumIterations',4
Example: ant.NumIterations = 4
Data Types: double
Length of the side of the equilateral triangle in fractal snowflake, specified as a positive scalar integer in meters.
Example: 'Length',0.5000
Example: ant.Length = 0.5000
Data Types: double
Height of the fractal from the ground plane along z-axis, specified as a positive scalar integer in meters.
Example: 'Height',0.0050
Example: ant.Height = 0.0050
Data Types: double
Type of dielectric material used as a substrate, specified as an dielectric object. For more information, see dielectric. For more information on dielectric substrate meshing, see Meshing.
Example: d = dielectric('FR4'); ant = fractalSnowflake('Substrate',d)
Example: ant= fractalSnowflake('Substrate',dielectric('Name','RO4003C','EpsilonR',3.38,'LossTangent',0.0027,'Thickness',0.508e-3))
Data Types: string | char
Length of the ground plane, specified as a positive scalar integer in meters.
Example: 'GroundPlaneLength',0.0550
Example: ant.GroundPlaneLength = 0.0550
Data Types: double
Width of the ground plane, specified as a positive scalar integer in meters.
Example: 'GroundPlaneWidth',0.0550
Example: ant.GroundPlaneWidth = 0.0550
Data Types: double
Signed distance of fractal snowflake center from origin, specified as a two-element real-valued vector with each element unit in meters. The distance is measured along the length and width of the ground plane.
Example: 'FractalCenterOffset',[0 0.080]
Example: ant.FractalCenterOffset = [0 0.080]
Data Types: double
Signed distance of the feed from the origin, specified as a two-element real-valued vector with each element unit in meters.
Example: 'FeedOffset',[0 0.080]
Example: ant.FeedOffset = [0 0.080]
Data Types: double
Diameter of the feed, measured in meters.
Example: 'FeedDiameter',0.001
Type of the metal used as a conductor, specified as a metal material object. You can choose any metal from the MetalCatalog or specify a metal of your choice. For more information, see metal. For more information on metal conductor meshing, see Meshing.
Example: m = metal('Copper'); 'Conductor',m
Example: m = metal('Copper'); ant.Conductor = m
Tilt angle of the antenna, specified as a scalar or vector with each element unit in degrees. For more information, see Rotate Antennas and Arrays.
Example: Tilt=90
Example: Tilt=[90 90],TiltAxis=[0 1 0;0 1 1] tilts the antenna at 90 degrees about the two axes defined by the vectors.
Note
The wireStack antenna object only accepts the dot method to change its properties.
Data Types: double
Tilt axis of the antenna, specified as:
• Three-element vector of Cartesian coordinates in meters. In this case, each coordinate in the vector starts at the origin and lies along the specified points on the X-, Y-, and Z-axes.
• Two points in space, each specified as three-element vectors of Cartesian coordinates. In this case, the antenna rotates around the line joining the two points in space.
• A string input describing simple rotations around one of the principal axes, 'X', 'Y', or 'Z'.
For more information, see Rotate Antennas and Arrays.
Example: TiltAxis=[0 1 0]
Example: TiltAxis=[0 0 0;0 1 0]
Example: TiltAxis = 'Z'
Note
The wireStack antenna object only accepts the dot method to change its properties.
Data Types: double
Lumped elements added to the antenna feed, specified as a lumpedelement object. You can add a load anywhere on the surface of the antenna. By default, the load is at the feed. lumpedelement is the object for the load created using lumpedElement. For more information, see lumpedElement.
Example: 'Load',lumpedelement.
Example: ant.Load = lumpedElement('Impedance',75,'Frequency',2.9e6,'location',[20e-3 1e-3 1.5e-3])
Object Functions
showDisplay antenna, array structures or shapes
impedanceInput impedance of antenna; scan impedance of array
sparametersCalculate S-parameter for antenna and antenna array objects
rcsCalculate and plot radar cross section (RCS) of platform, antenna, or array
returnLossReturn loss of antenna; scan return loss of array
vswrVoltage standing wave ratio of antenna
optimizeOptimize antenna or array using SADEA optimizer
patternRadiation pattern and phase of antenna or array; Embedded pattern of antenna element in array
patternAzimuthAzimuth pattern of antenna or array
patternElevationElevation pattern of antenna or array
axialRatioAxial ratio of antenna
beamwidthBeamwidth of antenna
currentCurrent distribution on antenna or array surface
chargeCharge distribution on antenna or array surface
efficiencyRadiation efficiency of antenna
EHfieldsElectric and magnetic fields of antennas; Embedded electric and magnetic fields of antenna element in arrays
meshMesh properties of metal, dielectric antenna, or array structure
designDesign prototype antenna or arrays for resonance around specified frequency
Examples
collapse all
Create and View fractal Koch snowflake antenna object with default properties.
ant = fractalSnowflake
ant =
fractalSnowflake with properties:
Length: 0.0900
NumIterations: 2
Height: 0.0015
Substrate: [1x1 dielectric]
GroundPlaneLength: 0.1000
GroundPlaneWidth: 0.1100
FractalCenterOffset: [0 0]
FeedOffset: [0 0]
FeedDiameter: 0.0020
Conductor: [1x1 metal]
Tilt: 0
TiltAxis: [1 0 0]
Load: [1x1 lumpedElement]
show(ant)
Figure contains an axes object. The axes object with title fractalSnowflake antenna element contains 5 objects of type patch, surface. These objects represent PEC, feed.
Create and view fractal Koch snowflake on a substrate with a dielectric constant of 4 and thickness of 1.5e-3.
ant = fractalSnowflake('Substrate', dielectric('EpsilonR',4,...
'Thickness',1.5e-3));
show(ant);
Figure contains an axes object. The axes object with title fractalSnowflake antenna element contains 6 objects of type patch, surface. These objects represent PEC, feed, Air.
Create a fractal Koch snowflake antenna and plot its impedance over a frequency range of 400-1500 MHz.
ant = fractalSnowflake('Length',180e-3,'GroundPlaneLength',280e-3,...
'GroundPlaneWidth',240e-3,'Height',5e-3,'FeedOffset',...
[75e-3,-45e-3]);
figure
impedance(ant,(400:10:1500)*1e6)
Figure contains an axes object. The axes object with title Impedance contains 2 objects of type line. These objects represent Resistance, Reactance.
Version History
Introduced in R2020a
|
<![CDATA[aron / philipp]]> 2015-02-01T13:04:38+01:00 http://apdevblog.com/ Octopress <![CDATA[read later #5]]> 2014-03-31T23:00:00+02:00 http://apdevblog.com/read-later-5 Our “weekly digest” is now “read later” – because it wasn’t really weekly and most of the links were older anyway.
So, without further ado, here are the links:
]]>
<![CDATA[gruntjs and its plugins]]> 2014-03-21T11:00:00+01:00 http://apdevblog.com/gruntjs-and-its-plugins … or even more suitable: “plugin mess”. But I’ll start at the beginning.
I wanted to take look at Grunt for a while now. Finally, a couple of weeks ago, I ran into a problem that I couldn’t overcome with NPM and its scripts section alone. The right time to check out Grunt, I thought. Has been too long on my TODO-list.
The problem I had to handle was: deployment of a node project to my dev server. And I didn’t want to rely on git hooks or CI for this. I wanted a script I could call that uploaded everything to my dev server via ssh, ran npm install and restarted the application (more on this in a seperate post later).
After googling for “deploy grunt” and reading through the gazillion results, it became quickly clear to me, that I wasn’t the first person that wanted to try and do this with the help of the boar (or whatever this thing is). I installed about every grunt plugin I could find but none fit my needs exactly … so what now? Fork another plugin and adjust it to comply with my requirements? Write my own plugin from scratch?
No, no, no. I might want to reuse this later on with a different server (no ssh) or deploy a frontend-project (not a node one) and would have to update/extend the plugin to accomodate this. Most authors of the aforementioned plugins have done exactly that – they wrote a plugin that did what they needed 100%. But because we as developers are very biased and only want to do it “our way”, these plugins are all the same but at the same time different. And, of course, I didn’t like a single one of them :).
Ok, so no plugin. What then. I decided to write a simple Grunt task that used other node modules (not Grunt plugins) to accomplish everything I needed. In this, I could reuse code that others had written – maybe not for this use-case but as a standalone module that was so granular that it “only” solved one problem but that perfectly.
Don’t write plugins that try to solve too many problems at once.
Write small modules that run in all kind of environments and solve exactly one problem. This way, others can use your code – even in scenarios which you haven’t been thinking about while writing the code … this is a good thing.
Funny enough, a couple of days after my first stint with Grunt, I listened to the JavaScript Jabber podcast and they were talking about Gulp (and Grunt, of course) with Eric Schoffstall – one of the developers behind “the streaming build system”. It was really interesting and you should definitely go and listen to it (after you’ve finished reading the post).
I don’t want to talk about performance or other important reasons why A is better than B, but there are two things – in my eyes – Gulp (or the Gulp community) does better than Grunt:
1) There is a curated plugin list
So, we’re curating it. We don’t just come out and say, “Oh this plugin sucks. We think it’s stupid. You’re not allowed on our website.” But we do say, “This plugin doesn’t work,” or, “It has too many bugs. It just shouldn’t be a plugin. And those are our requirements.”
Eric Schoffstall Episode 97 of the JavaScript Jabber
So there shouldn’t be duplicate plugins or plugins that wrap some functionality you could use directly via its node module
2) Recipes instead of too many plugins
[…] we actually have a section of docs called recipes. And these are just, “Hey, I used Mocha with Gulp. Here is a task that I used it in and let me explain why I did a couple of things.” So that way, people can just say, “Okay, I want to use Mocha. Let me go look at the recipes and go find one for Mocha.” And it’ll explain in-depth why they did what they did, how to use it […]
Eric Schoffstall Episode 97 of the JavaScript Jabber
If there is a problem you solved by using already available node modules, share it with other devs that might get stuck at the same point. But don’t do it writing your own plugin – write a small HOWTO instead.
Don’t write code that can’t be used outside of Grunt/Gulp
Cheers.
]]>
<![CDATA[weekly digest #4]]> 2014-03-03T11:00:00+01:00 http://apdevblog.com/weekly-digest-4 This issue of our weekly digest has a bit of everything: performance, tools, security – audio, video, text … Happy reading, watching, listening.
Fun fact: You can check who added what link by checking the commits.
]]>
<![CDATA[salt'n'pepper - or how to store passwords securely]]> 2014-02-17T12:00:00+01:00 http://apdevblog.com/salt-n-pepper-or-how-to-store-passwords-securely Just yesterday I received an email from kickstarter telling me that their database servers were hacked and that someone was able to access all my account data:
Accessed information included usernames, email addresses, mailing addresses, phone numbers, and encrypted passwords. Actual passwords were not revealed, […]
Good to know, that they didn’t store the password in plain text but encrypted the most sensitive data.
You see, in today’s world it is very important to make sure that an attacker, after aquiring your user data, isn’t able to just know you password and:
1) log into your account
2) more importantly – use the password for other services with which he/she could really “harm” you
[…] however it is possible for a malicious person with enough computing power to guess and crack an encrypted password, particularly a weak or obvious one.
That’s true – even when using encryption. So, we as developers have to make sure that this process of “computing” or “guessing” takes as long as possible (and has to be repeated for every password).
I can remember my first attemps at server-side user-management with PHP 13-14 years ago. I just stored the user’s data like this:
----------------------
| user | password |
----------------------
| phil | topsecret |
| aron | notsosecret |
----------------------
The user sent the data via POST to the server where I would compare the password he/she just entered with the password stored inside my database like this:
// don't do this
if ($_POST["password"] === $row["password"]) {
// grant access ...
}
If the user ever forgot his/her password, I could just get it from the DB and resend it via email :( – a really bad idea! But back in the days I didn’t know better.
Rule #1
Never save passwords in plain text
Use a hash function to store the password securely. Hash functions are one-way algorithms that turn your plain text password into a totally unrecognizable number and letter combination. Plus they produce results that differ completely even if the input is almost the same.
The following snippets are JavaScript because our last project was a node.js project – but these functions are available in other programming languages as well.
View code on gist.github.com
You get the idea …
But this is not enough. If we save the once hashed password into the DB, hackers can use methods like “dictionary”–, “brute force”-attacks, lookup– or rainbow-tables to “guess” your password. It’ll take some time, but they will get there – and even faster if the original password only contains letters from a-z.
Rule #2
Salt your password before saving it
Hashing function always produce the same result if the input is the same. You can run the code above as many times as you like, the result won’t change.
Two users with the same password would get the same hash, which makes it easier for an attacker because he/she can use lookup- or rainbow-tables to “decrypt” your password.
Appending a random string (a salt) to the password makes this impossible.
I don’t know if they still do, but in a previous version wordpress used the hashed SITE_URL as a salt for every password – not good. You can do better than that.
Create a new salt everytime you store a password in the database – never reuse an old one. And don’t make the salt to short. It gets harder to hack the longer the salt is.
var crypto = require("crypto");
var salt = crypto.randomBytes(64);
If you don’t use the same salt for every password, you have to store the salt in the database as well. Either in a seperate column or add it to the password as “metadata”.
------------------------------------------
| user | password |
------------------------------------------
| phil | <hashed password + salt>:<salt> |
| aron | <hashed password + salt>:<salt> |
------------------------------------------
Salting the passwords prevents hackers from using lookup-tables to gain access to your passwords quickly but with up-to-date hardware they can use “brute force” to generate billions of hashes a second and compare them with the hashes you stored in the database.
Rule #3
Use “slow” hash functions
This may sound strange but another method to make sure it’ll take attackers more time to hack the passwords is to use an encryption algorithm that takes it time to produce a result. This reduces the number of hashes a hacker can generate to a fraction of the number above.
PBKDF2 is a good choice for this.
Storing the encrypted password
View code on gist.github.com
Retrieving the encrypted password
View code on gist.github.com
Hope this summary helps and makes your next project a bit more secure (than it already is).
]]>
<![CDATA[weekly digest #3]]> 2014-02-10T11:00:00+01:00 http://apdevblog.com/weekly-digest-3 This week’s digest is about optimization – how to get more out of mobile performance, Responsive Web Design, your tools, your daily working hours and JS in general. Happy reading.
]]>
<![CDATA[To use jQuery or not to use jQuery, that is the question]]> 2014-02-07T11:00:00+01:00 http://apdevblog.com/to-use-jquery-or-not-to-use-jquery There was a lot of buzz around YOU MIGHT NOT NEED JQUERY the last couple of days – we also mentioned it in our weekly digest #2 from last monday.
YMNNJ is a collection of vanilla JavaScript snippets that can (more or less) replace some often used jQuery built-in functions. Zack Bloom and Adam Schwartz, the guys behind YMNNJ, want us to think twice before using a (big) framework/library like jQuery:
If you’re developing a library on the other hand, please take a moment to consider if you actually need jQuery as a dependency. Maybe you can include a few lines of utility code, and forgo the requirement.
I totally agree with this statement. You should pause and ponder before using something like jQuery (or e.g. Modernizr), be it in a library or any other project you are doing. It comes with a cost that you definitely should be aware of.
Tim Kadlec also wrote a post and sums up the performance hits pretty well:
This is concerning, but it’s not just download sizes that you should be worried about. In a presentation given at Velocity in 2011, Maximiliano Firtman pointed out that on some phones (older, but still popular, BlackBerry devices for example) can take up to 8 seconds just to parse jQuery. More recent research from Stoyan Stefanov revealed that even on iOS 5.1, it was taking as many as 200-300ms to parse jQuery.
But jQuery isn’t all bad, of course not. Fittingly, Webplatform Daily posted a link to a list by Rick Waldron of all the quirks jQuery fixes for us developers that need to address as much devices/browsers as possible. Try fixing (or even finding them in the first place) them in vanilla JS by yourself.
So, if you’re aware of the “downsides” of something like jQuery but decide to use it anyway (because of all the “upsides” it includes), it’s totally fine. But think of ways to use it responsibly.
Again taken from Mr. Kadlec’s post:
[…] some of the devices we needed to test on couldn’t load the page at all if jQuery was present — it was just too much JavaScript for the device to handle.
In one of our last mobile projects we decided to rely on jQuery for all the more fancy things we wanted to implement. Features that the older phones couldn’t or shouldn’t cope with because they would crash or suffer devastating performance hits that would keep the users from navigating the site. Using Progressive enhancement and a technique like the BBC’s “Cutting the mustard” allowed us to only deliver JavaScript (including jQuery) to the more capable devices – avoiding to make your beloved Blackberry explode :)
In addition, the user only had to download HTML, CSS and assets to view the page, which saved about 40-50KB of transfered data and some JS parsing/execution time.
Tim’s closing paragraph:
I’m not saying that we stop using libraries altogether—and neither were the people who created “You Might Not Need jQuery”. I’m suggesting we make that decision with a great deal of care.
WORD!
]]>
<![CDATA[weekly digest #2]]> 2014-02-03T11:00:00+01:00 http://apdevblog.com/weekly-digest-2 Second week of our link collection – some old, some new. But each one worth your time. Of course. Happy reading.
]]>
<![CDATA[Mobile performance and how it suffers from 3rd party content]]> 2014-01-30T11:00:00+01:00 http://apdevblog.com/mobile-performance-and-how-it-suffers-from-3rd-party-content Nowadays, when you talk to a web developer about building a (mobile) website, performance is one of the topics that comes up quickly. This is absolutely great and we have to say ‘thank you’ to a bunch of people never stopping to bother us with these things.
So we developers take care of:
• gzipping
• minify/uglify + concat HTML, JS and CSS
• all blocking JS at the bottom of the page
• caching/CDN
• fewer requests
• and a lot more …
Each of the points above will improve your site’s performance – sometimes more sometimes less, depending – of course – on your site and its structure/content.
In one of our last projects we took this to heart and wanted to deliver a beautiful and fast mobile website (m-dot-domain, so it was really only mobile). We’re not talking about the “under 1 second to screen” scenario, but rather a smooth surfing experience using a 3G network. Let’s say something like 1-2 seconds until “start to render” and ~10 seconds for “loaded”.
Starting with HTML templates/components that – if needed – get progressively enhanced was a good foundation for this. With dummy content filling the HTML, this is a breakdown of the filesizes (gzipped) by type:
• HTML ~15KB
• CSS ~15KB
• JS ~50KB (biggest part being jQuery)
• images ~500KB
• fonts ~45KB
Putting JS at the bottom of the <body> made the browser only wait for the HTML and CSS before beginning to render the page. Sadly, because we’re using webfonts, it begins rendering the content without displaying the text. Only after the webfont is downloaded, does the text become visible – in my eyes webfonts’ biggest disadvantage.
I used my slow vServer to get this waterfall, so an optimized setup with an additional CDN (like the live-server) should be even faster.
As we can see in the waterfall above – “start render” lies somewhere between 2-3 seconds and the webfonts are loaded a second later. This way the user should be able to start reading after 4 seconds. So far, so good.
This is also the moment the JS is loaded (async) and executes. Some of the components “change” a bit because of the progressive enhancement kicking in but nothing so serious that it’ll annoy the user too much.
And this is only for the user’s first visit – the second time the cache will be filled with our CSS, JS, images and fonts and the page load time should be even faster.
Because our client uses a big fancy CMS, this is the point where we bundled up our assets and handed them over to them. Their developers had to integrate our templates and scripts into the colossus that is their CMS and most of all, they also had to add things like:
1. tracking and
2. advertising
3. real content
From here on out it got messy …
Tracking shouldn’t have been a big problem, you might think. No, it usually isn’t. But they had to include more than one tracking-script and not at the bottom of the document but the head (I think we could check and move them to the bottom, though). These are mostly small scripts that load fast but every request hurts on mobile.
There are services like Segment.io but they are US-based and we Germans don’t like to send our data across the pond ;) Besides, I don’t think they support german newspapers’ most important tracking-provider IVW.
Nonetheless are these kind of services a great tool for improving your website’s performance: one call instead of two or three every time you want to track something = big win!
On to advertisement. Because our client offers all its content free of charge, ads are the only source of revenue they got. So these are important and we have to make sure they are loaded and displayed correctly.
The setup gets even more complicated because the client uses a “middleware” that is based on DoubleClick as the technical foundation – leading to more and more scripts that have to be fetched from different servers (double ouch).
DoubleClick offers an <iframe>-based “async” version of the GPT but we can’t use it because the different ad-formats won’t play well with iframes = even more synchronous JavaScript stopping the page from being rendered :(
Most of the time the first ad is located on the top of every page, so the aforementioned scripts have to be loaded before this (in the <head>). Not 1, not 2, but 4 (in words: FOUR) scripts are loaded before the custom initialisation is run and the first ad can be displayed on page … ah no, I forgot to mention that every ad loads one or more JS files to get the content they need. S-Y-N-C-H-R-O-N-O-U-S-L-Y.
All these tracking and ad scripts push the “start render” back 4.5 seconds which leads to readers looking at a blank screen for 8 seconds. If you’re lucky, they haven’t left the site when the content starts trickling in.
I’d also like to point to the fact that the webfonts are loaded long after the “start render” at around 13 seconds which means that even though the browser starts to render the page, copy isn’t displayed until they are downloaded completely.
Let’s take a look at how this changes the page’s waterfall:
Concluding points 1 and 2 we have to realize that many 3rd party content providers just don’t care about performance – at least not as much as we developers would like them to.
The last thing I want to talk about is point 3: real content.
In our case we built templates for a home-, overview- and article-page using dummy copy and images that nearly reflected real-life content (at least the amount we thought made sense considering our performance budget).
The client was in too much of a “desktop-mode” and filled the landingpage with everything that came to mind. So we ended up with around 50 article-teasers and multiple more complex gallery widgets etc.
I don’t say that it was there mistake (alone), we should have sat down with them more often and talked about how peformance is a feature and how it (sometimes) is more important than an abundance of different content elements put on the same page.
Points 1 and 2 destroyed our time to first render and 3 let the page get way too heavy for a “smooth surfing experience using a 3G network”.
Let’s not bury our heads in the sand and instead learn from a project like this. But sometimes complaining again and again is enough to make all those shitty 3rd party widgets/scripts improve. At least I hope so.
]]>
<![CDATA[weekly digest #1]]> 2014-01-27T10:30:00+01:00 http://apdevblog.com/weekly-digest-1 Today we are starting a new type of post: a weekly digest of articles, videos or just links we stumbled upon during the last week. They don’t have to be brand-new, hyped or hot on Hacker News to get onto our list (link #1 is from 2012) … instead being great, entertaining or just full of good stuff helps a lot :)
Maybe we got something you haven’t read/watched before:
]]>
<![CDATA[Octopress/Jekyll + S3 + CloudFront + gzip]]> 2014-01-08T11:12:29+01:00 http://apdevblog.com/octopress-slash-jekyll-plus-s3-plus-cloudfront-plus-gzip We recently moved this blog from WordPress to Octopress. Static pages FTW! And because we have static pages we want to use every CDN power we can get. We choose to use AWS CloudFront. There are some fine tutorials on the interweb how to make all this work:
Blogging with Jekyll + S3 + CloudFront
Quick Tip for Easily Deploying Octopress Blog on Amazon CloudFront
One open thing was to enable gzipped content. Zipping is certainly the most obvious performance optimization. Usually the webserver takes care of it, but we don’t have a webserver here. We have a CDN and like every CDN CloudFront doesn’t “process” request, it just serves files. Meaning that by definition it does not compress files when requested by a client. However that only means that we need to create zipped files when we deploy the Octopress files. A very good starting point:
gzip your Octopress
I made some modifications regarding CloudFront. Also rename is not available on OSX so I changed it around a bit.
View code on gist.github.com
]]>
<![CDATA[How to save the positions of annotations in epubs (or html)]]> 2012-07-30T01:00:00+02:00 http://apdevblog.com/how-to-save-the-positions-of-annotations-in-epubs-or-html The biggest advantage of ebooks over printed ones is – of course – that there are no more fixed pages. Every device can decide how it wants to display the content. With digital books it is possible to have the same excellent user experience on a small smartphone screen as well as on a huge desktop monitor.
But with all these advantages there also come challenges. One is positioning inside the book. So what to do, when you want to save the user’s current reading position, so that he can continue on the same “page” when he comes back? Since the user can read the text on different devices with different screen resolutions and different text settings (e.g. font size settings) you can not simply save “Page 36″.
Last read page (rough position)
If you just want the rough position (i.e. no certain text) the plain percentage is a way to go. The monocle framework (that we use at Nimbi and PaperC) does exactly that. It saves the reading position by dividing the current page number by the total number of pages (base on the rendering on the current device). On a smartphone the user might be on page 50 of 100 pages total where he is on page 6 of 12 pages total on his desktop browser. Both lead to roughly the same position.
We must be aware that there is a certain cognitive load for the user to find his actual last sentence on a page when changing devices or even changing from portait to landscape mode on his tablet. We have no chance to save the actual last words the user read.
Certain text
When it comes to saving annotations we need something more accurate. The user wants to highlight a certain sentence. We need a way to save the exact text so we can allow the user to navigate to that text directly and visually highlight the text.
Text and offset (or index)
Just saving the selected string as text and do a full text search when trying to find the string won’t do the job, since finding the actual word is impossible when the user selected a word like e.g. “and”. So together with the actual string we need at least an offset from the beginning of the text (which is usually a chapter in ebooks, also called component).
This is a typical way to deal with search results. Search engines usually deliver results based on full text search. When they index a HTML document they strip away all markup leaving the text only. So what they can give you is the found string and an offset (numbers of characters) from the beginning of the document. A result for a term like “and” (which is usually a stop word in search engines) will contain different offsets for the same term.
The bad news is, that in order for the offset to be accurate, you need to make sure that your local text-online version of the HTML document is exactly the same as the one your search engine indexed. You need to know exactly how/if the search engine converts linebreaks to spaces and how the search engine deals with spaces/linebreaks between DOM nodes (and other things). And then you have to apply these rules to the implementations on your client.
To avoid the “offset-hell” you could tell your search engine to deliver an index of the appearance in the document instead of an offset. Assuming you have three appearances of the term “and” the search engine could deliver the index 0, 1 or 2 to a result dataset. With that you are always certain which term you are dealing with.
Either way it’s not trivial to first convert the markup to text-only and then, after you found the term, find this term back in your DOM tree. Also note, that operations on huge amounts of text can be CPU-intensive, especially on mobile devices.
DOM based
Back to the case where a user wants to highlight a portion of text. Why not letting the DOM help us a little. We can make use of the Range obj.
“The Range object represents a fragment of a document that can contain nodes and parts of text nodes in a given document.”
That seems like the perfect fit for our use case. And it is! While it’s not supported by every browser environment it is well supported on engines that are typically used for displaying ebook (epub) content. For our “and” example it would look like this (jQuery pseuso code):
View code on gist.github.com
The range of a more complex text (that runs over more that one DOM node) could look like this (user selected “Prejudice is a book”):
View code on gist.github.com
This is a good starting point for describing fragments of text embedded in html. If you want to locate the visual position of this range you can call
View code on gist.github.com
How to save it in the backend
For saving the dataset to the backend we need a string representation of the DOM elements. Different approaches are possible. As XPath it could look something like this:
View code on gist.github.com
Or, if you don’t want to rely on elements to have id’s or classes:
View code on gist.github.com
Yap, in Xpath the index starts with 1.
However, for Nimbi and PaperC we tried to keep the data smaller (it’s potentially big data, right?) and query language agnostic:
View code on gist.github.com
startContainer and endContainer are the first textnode in the frist childNode of body (i.e. body.childNodes[0].childNodes[0]). The dataset is smaller (less to send over the wire and to save in the db) and – more importantly – it does not rely on XPath. While XPath might not be the bottleneck in this kind of application, it is known for not necessarily being fast, especially on mobile devices. And there is no XPath on Android < 2.4.
Here is an example of a more complex DOM tree:
View code on gist.github.com
This pretty much solved the position issue for us.
Pros
The position is 100% unique. You’ll find the fragment no matter the screen size or font settings. You can even save the position of a single character.
It makes use of the most basic HTML. The DOM tree was there since Day 1 of the HTML standard. So even the oldest and most outdated html parser should be able to find the fragment.
It’s query agnostic. You don’t need XPath or other stuff.
Very small data footprint.
Cons
Since the position is described in a DOM tree, the backend needs a XML/HTML parser to “understand” the position. Asume that you want the backend to create a “heatmap” of the book, where the users set highlights, where they stopped reading and so on. The backend will have to convert the position to it’s own positioning format (if it is not using the DOM tree in the first place).
Also the implementation relies on a valid DOM. Epub components (a html chapter of an epub) are typically XHTML. If they are not served with mimetype application/xhtml the browser will fall into quirks mode. When you now have DOM elements that are only valid according to XHTML they will not correctly hook into the DOM tree. Since we are using a numeric tree representation (e.g. 12/0/4/0) one invalid DOM element can mess up the whole tree and we won’t be able to find the elements. While this may sound scary, setting the correct mimetype will fix the issue entirely.
Last reading position 2.0
Eventually we decided to also use this approach to save the user’s last reading position. We now save the first character on a page as the current reading position. We thought back and forth if we might should take a character somewhere from the middle of the page. However with the first character approach we can be sure, that the user always sees something that he has already read, so that he can easily find the last read sentence.
What’s next?
Well, the hard part is – of course – to let the user select text (hint: window.getSelection()) and to visually highlight text fragments. But this is something for another blog post… :)
]]>
<![CDATA[Do not “learn” jQuery, learn backbone.js and require.js]]> 2012-07-02T01:00:00+02:00 http://apdevblog.com/learn-backbone-and-require So you wanna join the little HTML5 party some of us are having? Great! It’s not that packed yet, quite comfortable actually. And the main gigs haven’t even played yet. So no, you’re not late. Quite one time actually.
Dear JavaScript pros: This is a blog post for beginners. So don’t shoot me for simplifying things.
Many developers (especially from the Flash / ActionScript community, but not only them) are currently wanting to “learn” HTML5. Some want to focus on websites, others want to build (single-page-) apps. Some want to do shiny advertising’ish projects, others want to focus more on “products”. And many say, that therefore they need to learn jQuery now.
Do not learn jQuery, just use it!
When someone asks you if you’re into jQuery, just confirm. Chances are, that clients/employers won’t mind to ask, since they assume that you do.
My prediction is, that you’ll use 10 jQuery methods max in the beginning. When starting with jQuery, using jQuery is mostly understanding HTML and CSS (you understand HTML and CSS, right?). Anyway, api.jquery.com is your friend. In a year from now, you’ll probably laugh about your jQuery code, but that’s ok for now, you have bigger problems.
How to produce clean code in JavaScript
The more important question is, how to build clean, manageable, understandable and maintainable JavaScript code. And unlike two years ago there are two industry standards now: backbone.js and require.js.
Backbone enables you to write a class-like code structure, that fulfills all the aforementioned criteria. And – most importantly – since it so widespread many people already know it. For me, working with backbone made working in big teams possible (you want to work in big teams, right?). There are many other frameworks out there, lots of them with a strong feature set. However, what I like about Backbone that it does not have a big feature set.
Require on the other side, not only encourages you to write loosely coupled and granular parts of code but also helps you to structure the JS files that hold your code. It makes you create JavaScript modules in a standardized way, so that you can easily plug them together. I know first hand, how hard it is in the beginning to decide how to organize the JavaScript files/folders and how to get them into the application. Require.js is there for exactly that.
So how to learn them then?
While understanding require is quite straight forward (the documentation will do), the learning curve of backbone is harder. Try to avoid the famous ToDo list example. It gives the impression that backbone applications are always big and/or complicated. The truth is backbone can be extremely simple. Start with something waaaaay simpler.
Unlike other coding communities, the JavaScript community is almost entirely based on open source. It basically lives on github. This includes backbone and require. So if you don’t already have a github account – go and get one. And hang out there for a while.
Other things you might want to check on github:
* HTML5 Boilerplate (especially the .htaccess file is very interesting)
* Twitter Bootstrap issues
* Modernizr
* Good list of things to look into
]]>
<![CDATA[Optimizing “overflow:scroll” on iOS5 [UPDATE]]]> 2012-06-07T01:00:00+02:00 http://apdevblog.com/optimizing-webkit-overflow-scrolling "native-ios-scroll"
With the never webkit builds on iOS5 and Android ICS finally overflow:scroll works as expected. On iOS you also have the “native” scroll bounce, which is huge IMHO (with bounce I mean the ease when the scrolled viewport reaches the top/end). The app finally feels native, a big step for web apps.
It wasn’t the sluggishness and weak performance of iScroll and scrollability I was mad about, it was the wrong implementation of the bounce physics. I was always able the tell the difference of a native and a phonegap app by checking scroll views.
Get it working
Check example 1 (with iOS5+ device or simulator)
The magic happens with this line.
View code on gist.github.com
Without you would still have a touchmove scroll with one finger, however the “native” bounce comes with -webkit-overflow-scrolling:touch. I notices however one thing that differs from the native scroll. When the content to scroll is on top (e.g. you can’t scroll any further up) and try it anyways, the touchmove bubbles up. Try example 1 again (with iOS5+ device or simulator) In this case it bubble to the top window object which then will scroll the browser chrome. While this might be an expected behavior, it still feels not very native. Let’s fix this.
Make it even more native
Check example 2 (with iOS5+ device or simulator)
When you try the same here, you’ll notice that you can drag the scrolled content with the expected physics. This feels, well, simply amazing. I have been working with all the JavaScript scroll implementations for such a long time now and now it’s finally native. Yeah!
So how is it done?
View code on gist.github.com
Well, the magic is to include the scroll content into another container div, that has to have the same height as the parent scroll container and also the correct overflow settings set (-webkit-overflow-scrolling doesn’t seem to be needed). Note that the subcontainer has to have the exact same height, so no margin or padding or stuff allowed. Also note, that no JavaScript is required. This is pure css.
Here a video to illustrate the difference between example 1 and 2:
One last thing
Notice that in the previous example you can still scroll the browser chrome? Try it by dragging (touch moving) the grey background. If you have a web app (instead of a website) you might want to disable the scrolling of the window viewport entirely.
Check example 3 (with iOS5+ device or simulator)
Easy.
View code on gist.github.com
Listen to the touchmove event on document level and prevent the default behavior. With this setting alone scrolling would be disabled globally, also in the overflow div. That why you need to set another touchmove listener to the scroll div and stop the bubbling. This event then will never reach the document object.
UPDATE – Arg, found an edge case
Or, actually not so edge. Check a variation of the previous example (with iOS5+ device or simulator) where there are not enough item for the div to be scrollable. When you try to scroll you’ll notice, that the browser chrome scrolls. Not good.
Here corrected example 4 (with iOS5+ device or simulator)
However, it adds more markup and more JavaScript. I would appreciate a smarter solution.
]]>
<![CDATA[Don’t comment your code!]]> 2011-05-02T01:00:00+02:00 http://apdevblog.com/comments-in-code
stackoverflow.com
… unless you know what you do.
The problem
Since I started programming I have always been fighting with “strange” code comments. Everyone told me I had to document my code. Also I wanted to be a good citizen and make it as easy as possible for my co-workers to understand my code. On the other hand there was always so little time. And writing good comments takes time. Also I understood that when the codes changes I also have to update the comments (even more time consuming). Plus I was not sure what to comment. Every line? Every method? Or a summary of the class in the header?
When I got better at coding I noticed that no one is writing comments. At least not many. However I found out that comments can be very useful when there is a codeline that needs clarification. So I still felt guilty for not commenting my code.
Last year I got my hands on Clean Code by Robert C. Martin. Dear programmers out there, you need to read this book.
The chapter on Code Comments made me totally change my mind about writing comments and feeling guilty for not writing them. Bottom line: The code itself is the best comment, only write comments when it’s really needed, don’t leave commented code lines.
Example 1 – Annoying
Recently I came into a project with some other programmers. I found the following comment styles (different coding styles aside, that is another story). Which do you find best?
public class AbstractModuleMediator extends Mediator implements IMediator {
/* public variables and consts */
/* protected and private variables and consts */
private static const log : Logger = LogContext.getLogger(AbstractModuleMediator);
/* public functions */
/**
* Constructor for the AbstractModuleMediator class
*/
public function AbstractModuleMediator(name : String, viewComponent : IModule) {
super(name, viewComponent);
}
}
public class SomeModule extends AbstractInteractionModule {
private static const log : Logger = LogContext.getLogger(SomeModule);
// ✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖
// VARIABLES
// ✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖
private var _vo : SomeVo;
// ✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖
// CONSTRUCTOR
// ✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖
public function SomeModule() : void {
};
// ✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖
// PUBLIC FUNCTIONS
// ✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖✖
override public function create() : void {
}
}
public class SomeMediator extends AbstractModuleMediator implements IMediator {
// _____________________________________________________________________________________________________________
// C O N S T A N T
// =============================================================================================================
public static const NAME : String = "SomeMediator/";
private static const log : Logger = LogContext.getLogger(SomeMediator);
// _____________________________________________________________________________________________________________
// V A R I A B L E S
// =============================================================================================================
// _____________________________________________________________________________________________________________
// I N I T I A L I Z E
// =============================================================================================================
public function SomeMediator(name : String, module : IModule) {
super(name, module);
log.debug("VideoPlayerMediator()");
}
// _____________________________________________________________________________________________________________
// P R I V A T E - F U N C T I O N S
// =============================================================================================================
}
public class SomeMediator extends AbstractModuleMediator
{
public static const NAME:String = "SomeMediator/";
private static const log:Logger = LogContext.getLogger(SomeMediator);
public function SomeMediator(viewComponent : IModule)
{
super(NAME, viewComponent);
}
override public function onRegister() : void
{
}
}
So what’s the best commented code? It’s #4. Why? Think about when you first enter a class to make some adjustments. You need to understand the code. You need to read the code. Everything thats distracts you from reading code is useless and should be avoided.
We all know (at least we should) the order of static field, public field, private field, constructor, public methods, private methods. No need to repeat that.
Example 2 – Bad
The other thing Martin points out is the danger of uncommented code lines. This one is harder to achieve since it needs you to make a quick code review on all edited classes before you commit something. Take this example:
facade.registerProxy(new ChannelProxy());
facade.registerProxy(new SoundProxy());
//facade.registerProxy(new SoundAssetProxy());
facade.registerProxy(new SubtitleStateProxy());
facade.registerProxy(new SocialShareProxy());
facade.registerProxy(new TrackProxy());
I had a ticket where I needed to fix a sound issue. I came across this command and the uncommented line left nothing but questions for me. Is this work in progress? Or a permanent removal? Does this Proxy even exist any longer? And most importantly: Does this has something to do with my issue?
Of course someone just forgot to remove this line/comment. However, it cost me some minutes to figure that out.
Example 3 – EVIL
/**
* Always returns true.
*/
public boolean isAvailable() {
return false;
}
Do I need to say more? This – of course – is the worst thing that can happen with code comments. The code changes but the comment stays the same. When you change a commented line/function/method and you can – for whatever reason – not change the comment, delete the comment.
Conclusion
As you see from the examples it’s way harder to write good comments then no comments at all. So instead of making it all worse just don’t do it. If you consider yourself as someone who writes exceptable code, that should explain enough for you and your co-workers.
Thats all folks. Oh wait…
//
// Dear maintainer:
//
// Once you are done trying to 'optimize' this routine,
// and have realized what a terrible mistake that was,
// please increment the following counter as a warning
// to the next guy:
//
// total_hours_wasted_here = 39
//
source
stop(); // Hammertime!
source
// I dedicate all this code, all my work, to my wife, Darlene, who will
// have to support me and our three children and the dog once it gets
// released into the public.
source
]]>
<![CDATA[7 things to do first when starting with FDT4]]> 2010-09-23T01:00:00+02:00 http://apdevblog.com/top-7-things-fdt4-beginner Recently I upgraded to FDT4. Well, not exactly upgraded since I downloaded a fresh Eclipse version (for using FDT as plug-in) and created a new workspace. Here 7 things essential for me to start working with FDT4.
Note: Some of the points will maybe auto set, when using the final FDT4 Standalone version.
1. Always launch previous application
When hitting F11 by default Eclipse is launching the currently active class (the one you’re currently editing). Of course you want to launch the previous build. Got to Preferences –> Run/Debug –> Launching and set the “Launch Operation” to “Always launch the previous launched application”.
2. Disable Autobuild
When working with big project FDT4 has a hell of work to do when (re-)building the project. This can be seriously annoying. So instead of letting FDT autobuild the project when changes happen, you want to do this manually (ctrl/cmd + B). Goto Project and disable “Build automatically”.
3. Set class comment header
With that you not only have your copyright in the class (not so useful) but also will the svn tag be updated. Go to Preferences –> FDT –> Code Style –> Code Templates –> “typecomment” –> “Edit…” and insert your custom class comment.
4. Set the braces correctly
It drives me nuts, when the braces formating style is not correct ;). Go to Preferences –> FDT –> Code Style –> ActionScript Formatter –> Braces Tab –> “Wrap All”. Clean that mess with ctrl/cmd + shift + F.
5. Make the code assist work more responsive
You want to code assistant to appear when typing and not only when typing . or hitting ctrl/cmd + SPACE. Go to Preferences –> FDT –> Editor –> Code Assist. Set the delay in the “Auto activation Delay:” to 50. In the field “Auto activation triggers for AS:” you insert “abcdefghijklmnopqrstuvwxyz_.:”.
6. Show line numbers
You need then, don’t you? Right click on the grey vertical bar, left to the code editing window and select “Show line numbers”.
7. View classes hierachical in the Flash Explorer
No need to share the space with all classes.
Wait! Are there more?
So these are my 7 steps to get FDT4 up and running. Take it or leave it… :)
Do you have some FDT essentials you can’t live without? Please write a comment!
]]>
<![CDATA[Dear iOS developer, please collect the garbage (the other one)]]> 2010-08-20T01:00:00+02:00 http://apdevblog.com/ios-the-other-garbage-collection
Paper basket image by oskaline via Flickr
Some time ago I wrote a blog post about fixing slow iTunes backup. The article became the by far most visited one on this blog and we are still getting tons of visitors from google every day. When reading the comments you can see that lots of users seem to have the same/similar problem.
The issue results from the fact, that some apps save lots of files to the file system of the iPod Touch, iPhone or iPad. While – of course – nothing speaks against using the file system to save data, the problem starts when files getting to many. iTunes then needs ages to copy them to the computer when doing a sync (the backup before the sync in particular).
If using a reasonable number of files you will never have a problem. However, if your app syncs data from the web (for instance a news or rss reader) make sure that you delete the read / no longer needed files. Please :)
The usual customer otherwise might have the feeling the iPhone “doesn’t work” anymore. Or even worse, the customer reads our article and blames your app in the comments… :)
PS: Personally, I haven’t worked on apps that make extensive use of the file system. If you have, feel free to share your experiences.
]]>
<![CDATA[Facebook Connect ActionScript 3 ImageViewer Example]]> 2010-06-30T01:00:00+02:00 http://apdevblog.com/facebook-connect-actionscript
I finally had the time to write something about the facebook-actionscript-api we used in one of our last projects. It’s a very interesting API when you want to add Facebook support (user management) to your site/project. There are different things you can do with this API: i.e. access user information, post on the user’s wall, get user’s photos and much much more.
For the litte demo application I decided to use the feature to access the user’s photos to create an ImageViewer in pure ActionScript. It’s just a small example of what you can do with the facebook-actionscript-api but I think it’s a good starting point for someone who hadn’t had the chance to take a look at this whole Facebook Connect stuff.
Facebook introduced a new API some weeks ago – the Graph API – but the facebook-actionscript-api is still based on the “Old REST API”. You can find a in-depth documentation of the old API here: http://developers.facebook.com/docs/reference/rest/
Here are the methods we called to get all the info we needed for the ImageViewer demo:
• users.getInfo
Returns a wide array of user-specific information for each user identifier passed, limited by the view of the current user.
• photos.get
Returns all visible photos according to the filters specified.
• photos.getAlbums
Returns metadata about all of the photo albums uploaded by the specified user.
But you don’t have to worry about the exact name or URL of the methods because the facebook-actionscript-api provides Call-classes for every method there is (i.e. GetAlbums.as).
Before you can send out any calls you have to get a Facebook session and of course log into your Facebook account. Session and login are handled via Facebook’s own JavaScript library (http://static.ak.facebook.com/js/api_lib/v0.4/FeatureLoader.js.php).
Here’s the JS part in our index.html:
// ...
<script type="text/javascript">
function fbLogin(api_key)
{
FB.init(api_key, 'xd_receiver.htm', {"ifUserConnected":permissions});
FB.ensureInit(function()
{
FB.Connect.get_status().waitUntilReady(function(status)
{
switch (status)
{
case FB.ConnectState.connected:
loggedIn = true;
break;
case FB.ConnectState.appNotAuthorized:
case FB.ConnectState.userNotLoggedIn:
FB.Connect.requireSession();
loggedIn = false;
break;
}
});
});
}
function permissions()
{
FB.Connect.showPermissionDialog('user_photos', onLoginHandler);
}
function onLoginHandler()
{
var session = FB.Facebook.apiClient.get_session();
flashcontent.onLogin(session);
}
</script>
// ...
We use the ExternalInterface to call the fbLogin() function from our ActionScript class passing the API_KEY as a parameter.
To get your own API key to meddle with, you have to have a Facebook account
and install the Developers application here:
http://www.facebook.com/developers/
You can create your own app after you've installed the developer stuff.
// ...
ExternalInterface.call("fbLogin", FacebookConnectTest.API_KEY);
// ...
Here is where the “Facebook magic” happens … the fbLogin() function connects to the Facebook page and checks the login status of the user. It either logs you in straightaway or displays the “connect screen” in an iFrame.
After confirming the connection the login form pops up in a new window.
After logging in, the user has to allow the application to access the information it needs (see permissions() function). Because we just want to display the user’s photos, we only need to get the “user_photos” permission.
First allow access to the general user info.
And then allow us to grab your photos. This again happens in an iFrame overlay in the same window our app is running.
After settings all relevant permissions the onLoginHandler() JS-function is called. This function collects the creates session data and passes it to our flash-application (using an ExternalInterface-Callback).
// ...
ExternalInterface.addCallback("onLogin", onLogin);
// ...
/**
* JS callback - called when user logged into facebook account.
*/
private function onLogin(session:Object):void
{
if(session == null)
{
return;
}
_session = session;
// save session data in shared object for later use ...
var my_so:SharedObject = SharedObject.getLocal(FacebookConnectTest.SO_NAME);
my_so.data.session = session;
// start a WebSession with the session secret and key passed in from Javascript
var webSession:WebSession = new WebSession(FacebookConnectTest.API_KEY, session.secret, session.session_key);
_facebook.startSession(webSession);
webSession.addEventListener(FacebookEvent.CONNECT, onSessionConnect);
webSession.addEventListener(FacebookEvent.ERROR, onSessionError);
webSession.verifySession();
}
We just take the supplied data and create a WebSession object and afterwards verify the session.
In addition we are saving the session in a shared object so we can access it at a later time when the user returns to our application – if the session is still valid, we log the user in.
If the sessions is valid, the onSessionConnect() handler is called and we submit the first API call to retrieve the user’s first- and lastname.
// ...
var call:FacebookCall = _facebook.post(new GetInfo([_session.uid], ['first_name', 'last_name']));
call.addEventListener(FacebookEvent.COMPLETE, handleGetInfoResponse);
// ...
The facebook-actionscript-api handles the results automatically and converts the returned XML into value objects we can use within our result handler:
// ...
var infoData:GetInfoData = event.data as GetInfoData;
if(infoData != null)
{
if(infoData.userCollection == null || infoData.userCollection.getItemAt(0) == null)
{
return;
}
var firstName:String = infoData.userCollection.getItemAt(0).first_name;
var lastName:String = infoData.userCollection.getItemAt(0).last_name;
_loginTxt.htmlText = "Hello " + firstName + " " + lastName + "! <a href='event:logout'>Logout</a>";
// ...
}
// ...
Because the API is meant to be used with Flex we have to get used to the extra level of “collections” that are added to the data (i.e. infoData.userCollection). But we can access the ArrayCollection kinda like a normal Array – just use getItemAt(index:int) instead of the [].
Now we want to get the user’s photo albums – so create another call and submit it:
// get albums
var call:FacebookCall = _facebook.post(new GetAlbums(_session.uid));
call.addEventListener(FacebookEvent.COMPLETE, handleGetAlbumsResponse);
// ...
The result handler should look familiar:
// ...
private function handleGetAlbumsResponse(event:FacebookEvent):void
{
var albumsResponseData:GetAlbumsData = event.data as GetAlbumsData;
if(albumsResponseData != null)
{
var tempCovers:Array = [];
for(var i:int = 0; i < albumsResponseData.albumCollection.length; i++)
{
var album:AlbumData = albumsResponseData.albumCollection.getItemAt(i) as AlbumData;
if(album != null)
{
_albums.push(album);
tempCovers.push(album.cover_pid);
}
}
// ...
}
}
// ...
By now you should be comfortable working with the returned results …
If you want to know how the others call look like, download the sourcecode and open the FacebookConnectTest class.
To display the album thumbnails we used the TileList flash component – here is a good article how the component works: http://www.adobe.com/devnet/flash/quickstart/tilelist_component_as3/
If you still have questions, don’t hesitate to ask.
You can download the sourcecode here: /examples/fbconnect/source.zip
You can find the online demo here: /examples/fbconnect/
Don’t forget to download the SWC from Google code: http://code.google.com/p/facebook-actionscript-api/downloads/list (it isn’t included in our sources).
The ImageViewer code is by no means bug-free but – as i said before – should give you a good insight of the API. I put everything into one class … but don’t worry, I also added some short comments so hopefully you won’t get lost :)
Cheers
Phil
]]>
<![CDATA[Fixing slow iTunes sync of iPhone, iPod Touch, iPad (the backup issue)]]> 2010-05-18T01:00:00+02:00 http://apdevblog.com/slow-itunes-sync-backup
Cheese Cat image by Javier via Flickr
Update October: As you can see from the comments this solution does work for most users with iPad, iPhone and iPod Touch. Please leave a comment, which App causes the slow backup.
Since months I searched for a solution to fix the slow iPhone sync without restoring my iPhone or having to reinstall all my Apps. Finally I found a surprisingly easy solution, covert and buried in an Apple support forum thread. So I decided to write this down here, also to better remember how to fix it the next time… ;)
Note: If you’re wondering, this is still a development blog for Flash. I just thought this might be an important information for the people out there.
What causes the slow backup?
It’s the Apps! Apps on the iPhone might store data to work properly. Some do store a lot, some don’t. For instance a game saves some highscore data (not very much), where a newspaper App or a rss reader might save updated data (can be very much). I believe lots of iPhone users, that experiencing slow backups, have problems with one or many Apps that are leaking in terms of saving tons of tiny files to the iPhone, especially when they have a lot of Apps and when they did backups cross devices (i.e. iPhone 2G to iPhone 3GS).
First try the easy fixes
However, some users got the sync problem fixed with relatively easy solutions. You want to check them first.
• Huge Camera Roll
• Reset Warnings
• Also, I experienced, that iTunes seems to have problems when the hard drive with the music files is not connected to the computer.
• Make sure the latest iTunes version is installed.
Find the evil App
When the solutions above does not work for you, it’s probably an App (or many Apps) causing the backup problem.
First it’s generally a good idea to remove Apps that you don’t need anymore. I know, iPhone users (including me) tend to leave unused Apps on the device. Removing those apps saves you space on the device, speeds up the backup process (even if the app it not evil) and keeps the backup folder within iTunes small. So clean up!
Didn’t work? Ok, let’s go hunting…
1) Find the backup folder on you hard drive
Windows XP:
\Documents and Settings\USERNAME\Application Data\Apple Computer\MobileSync\Backup
Windows Vista / Windows 7:
\Users\USERNAME\AppData\Roaming\Apple Computer\MobileSync\Backup
Mac:
\USERNAME\Library\Application Support\MobileSync\Backup
The folder has a strange long name like 6de624828c9d586e1f088f932798039e57e2af7c. To find the right folder (if you find more than one) open the settings in iTunes, go to devices and find the list “Devices backups”. Match the date of the last backup and the date of the folder.
2) Connect the iPhone and sync
First the backup progress bar in iTunes should move “normally”. After a while the progress bar stops. Probably this is the moment, where iTunes is backing up an App that is causing the endless loop.
3) Find the app
Get into the backup folder. Sort after date, so the newest files are on top. Every file iTunes backups actually consists of two files. The file with the data (.mddata) and an info file for that (.mdinfo), both again with a strange long name. While we cannot look into the actual data (can be an image, a html file, a plist file or whatever), we can have a look into the info file and see at least which App the file belongs to.
Start a text editor and open the .mdinfo file. It’s a binary file, so we see a lot of crap, however you also should see a string like this AppDomain-com.kayak.travel. There you go, the app iTunes is currently trying to backup is the Kayak app (Note: This is just an example, Kayak did NOT cause the slow backup in my case).
Wait some seconds. As you can see in the folder, the .mddata files a relatively small, so iTunes should move on to the next .mddata/.mdinfo file soon. iTunes still tries to backup the same file? Wait some more seconds. Still the same file? Well, we have a hit! The file iTunes tries to backup is corrupt.
In my case however, iTunes continued to backup files. So again, open the newest .mdinfo file. Same app as before? Wait another minute and open the newest .mdinfo file. Still the same app? Well, we have a hit! Although iTunes didn’t stop to backup, it has a hell of a lot to do by copying all files of the app from the device to the backup folder.
Note: Maybe iTunes continues to another app after a while and gets slow again. Then you have more then one “evil” app.
Let the sync run through (if it’s stuck, cancel it).
Do a clean backup
Unplug the device.
We want iTunes to make a clean backup. Copy the backup folder to somewhere else (can take some time). After this is finished, delete the backup in “Settings” –> “Devices” –> “Device Backups”.
Now delete the evil apps from the device.
Connect the device. Start iTunes (if it doesn’t start automatically). Start a sync (if it doesn’t automatically). Since iTunes does not find a backup file, it’ll do complete backup, which may take a while.
After that is finished do another sync, it should be super fast. Yeah!
Happy!
For me the App that caused the problem, was a newspaper app, that seemed to keep all (old) articles on the files system of the iPhone. After removing the app everything went back to normal.
A side effects was that the size of my backup folder went from 1GB to 100MB.
Sources: sbessel in Apple support forum, iphonealley.com – Clean backup
]]>
<![CDATA[FFK10 – Flash Forum Konferenz 2010]]> 2010-04-20T01:00:00+02:00 http://apdevblog.com/ffk10
Image by Marc via Flickr
I made it back from cologne. Thanks to the vulcano I made new friends with lots of business guys in the night train from Cologne to Berlin…
I just want to point out some session (in order of appearance). If you miss one here I either missed it or found it crap… ;)
IntelliJ IDEA
Kirill Safonov (center) – Image by Marc via Flickr
Kirill Safonov made a fast forward demo of IntelliJ IDEA with an example project during the lunch break. Very very impressive. I tend to stick to my proven workflow and switch to new tools pretty late. However, the guys seem to build a tool with even more “coding comfort” then FDT. Will definitely have a look at IDEA soon. Also I’ll try to contact them, If they are willing to create a screencast out of that demo.
Michael Plank
Michael Plank – Image by Marc via Flickr
I always thought Michael is just some marketing guy traveling the world for FDT. I couldn’t been wronger. He actually has a very strong technical background. He was talking about “component based development” using the example of a MMOG based on Flash. The pros against object orientated development are so obvious when it come to complex games (Keith Peters also pointed that at FOTB09).
Saban Ünlü (iPhone development with Flash)
Saban Ünlü (workshop) – Image by Marc via Flickr
Saban gave an overview of developing iPhone Apps with Flash CS5. Despite the questionable future of this workflow I found it quite interesting. Seams that Adobe did a good job implementing the iPhone packager. Let’s see what the future brings…
André Michelle
Showed some old stuff and new experiment. This guy is sooo creative when it comes to developing new interfaces of creating music with the computer. He is the guy the music companies will steal cool innovative interfaces from. And btw, the Audiotool looks abolutely magnificent! Hey Adobe, hey music software companies, you need to buy this tool! It’s a final product with a potential high user base. The only thing they need are some resources to create a documentation and some tutorials. And of course integrate all the cool interfaces from André.
Ralph Hauwert
Ralph Hauwert – Image by Marc via Flickr
Amazing in depths 3D and ActionScript optimization stuff. Good inspiration. I especially liked the titles for laboom. Some particle optimization stuff I can’t wait to play with.
Johannes Mainusch (Xing)
Johannes Mainusch – Image by Marc via Flickr
I did some rant in the past and excuse them to be lazy and to not progress their platform. And altough you barley see new features on xing, they do a lot of stuff under the hood to improve the performance and response time of their site. I especially found it refreshing not to have a evangelist-speech but someone who’s quite honest with the fails they made in the past and fails they’re still making.
Mario Klingemann
Mario Klingemann – Image by Marc via Flickr
Nice talk with some old and some new stuff. He finally has released some of his tool on google code (can be found here). Also one other very handy thing he pointed out: You can very easy control the “randomness” of the Math.random() method by using the penner ease functions. Will definitely come in handy something.
Greetings to Martin, Michael, Raphael, Jens, Thien, Oliver, Andre, Claudia and thanks for the nice talks!
]]>
<![CDATA[AsWing – ActionScript UI component framework]]> 2010-04-12T01:00:00+02:00 http://apdevblog.com/aswing-actionscript-ui-components AsWing example simple login
Keith Peters was right, when he said, that Flash has a lack of UI component frameworks. The Flex components has a quasi monopoly on that. Besides his minimal components there is another alternative: AsWing.
Last year Neue Digitale / Razorfish gave me the chance to dive into AsWing. The task was to build a form manager that can not only run in Flex projects but also in straight AS3 projects where no flex runtime is available.
Click to see AsWing in action (not very sexy, huu? Don’t worry, of course thats all skinnable :) ) .
Where does AsWing come from?
AsWing is a port of the famous Java UI framework Swing, which was first released in 1996. The original port was made to AS2, which is still available. However, with AsWing 2.0 the AS3 version will be complete. AsWing 2.0 is still beta but safe to use.
How to use AsWing
Here some demo code from the simple login example above:
[SWF(backgroundColor="#AAAAAAA", frameRate="30", width="400", height="300")]
public class Main extends MovieClip
{
private var pwdTextfield : JTextField;
private var okBtn : JButton;
private var userTextfield : JTextField;
private var jf : JFrame;
private var vp : JViewport;
public function Main()
{
var sprite:Sprite = new Sprite();
sprite.x = sprite.y = 30;
addChild(sprite);
okBtn = new JButton("Ok");
okBtn.setEnabled(false);
okBtn.addActionListener(_okPressed);
userTextfield = new JTextField("", 8);
userTextfield.addEventListener(Event.CHANGE, _onPwdTextfieldChange);
pwdTextfield = new JTextField("", 8);
pwdTextfield.setDisplayAsPassword(true);
pwdTextfield.addEventListener(Event.CHANGE, _onPwdTextfieldChange);
jf = new JFrame(sprite, "Login");
var form:Form = new Form();
form.addRow(new JLabel("Username"), new JSpacer(new IntDimension(8)), userTextfield);
form.addRow(new JLabel("Password"), new JSpacer(new IntDimension(8)), pwdTextfield);
form.addRow(null, new JSpacer(new IntDimension(8)), okBtn);
vp = new JViewport(form);
jf.getContentPane().append( vp );
jf.setSizeWH(300, 160);
jf.show();
}
private function _onPwdTextfieldChange(e:Event) : void
{
okBtn.setEnabled( (userTextfield.getText() != "" && pwdTextfield.getText() != ""));
}
private function _okPressed(e:Event) : void
{
var successOutput:String = "Welcome " + userTextfield.getText();
var successLabel:JLabel = new JLabel(successOutput);
vp.removeAll();
vp.append(successLabel);
}
}
More sophisticated examples on request…
The documentation can be found here
Here some tutorial you can start with
How come that I never heard of it?
Well, I guess AsWing had it’s 15 minutes of fame when the AS2 version came out. Back then, there were not many robust UI frameworks. Obviously that changed with the hole Flex thing. Nowadays the people tend to use the Flex components, since it’s industry standard.
The Flex components offer a wide range of features. However, we all know that it’s getting tricky when you want to change basic functionality of them (not sure, if this still applies to Flex 4 Spark components). I’m not saying that this is all easy with AsWing, but at least you can just click in the source code and hack something in… ;)
Pros and Cons
Pros
– Ported from very robust Java Swing
– Very fast
– No Flex framework required (AS3 only)
– Very flexible once learned
Cons
– Tough learning curve
– Small community
– Future questionable
Conclusion
Overall it was fun to work with AsWing. It’s powerful and once learned very flexible. And it’s fast as hell. The rendering is really fast unlike Flex(3).
]]>
|
MD+DI Online is part of the Informa Markets Division of Informa PLC
This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Functional Imaging and Molecular Radiosensitizers
Molecular biology is poised for an increasing role in radiation therapies for cancer.
COVER STORY: RADIATION THERAPY
(click to expand)
A lung cancer patient is imaged using Philips's Gemini TF with TruFlight time-of-flight technology. The results fuse anatomic and metabolic image data. (Image courtesy of PHILIPS HEALTH)
The use of radiation for treating cancer emerged soon after the discovery of x-rays and radioactivity in the late 19th century. In recent years, major advances in tumor imaging and computing power have enabled increasingly accurate delivery of radiation to a targeted volume in the patient. Today, radiotherapy is widely used to treat several cancers and its efficacy compares favorably with other approaches, with demonstrated cost benefits. However, the current arc of development for radiotherapy fueled by improvements in physics and computing power is reaching its technological limits. The next technological step will likely be driven by an adjacent discipline: molecular biology.
Molecular biology provides insights into the specific pathways that allow cancerous tissue to establish a presence, proliferate, fight immune system attacks, and repair damage. Future improvements in radiotherapy efficacy will arise by disrupting the biological repair mechanisms that some resistant cancer cells deploy in response to irradiation. This emerging field of molecular radiosensitizers, and its consolidation with functional imaging, enables insight into tumor biochemical activity beyond standard anatomical imaging and promises to dramatically change radiotherapy.
The commercial potential of molecular radiosensitizers and functional imaging is well demonstrated by the emergence of multi-million-dollar alliances and several new companies. As results from current clinical trials are published and disseminated, innovation and clinical acceptance for this new field should increase dramatically.
Radiotherapy for Cancer
Residents of industrialized countries have a 30–50% chance of developing cancer over their lifetimes, and more than half of them will receive radiotherapy as part of their treatment.1,2 In the United States alone, radiotherapy was used to treat a million patients in 2004, and its increasing adoption has been accompanied by a significant growth in the number of treatment facilities.2 "General Principles of Software Validation; Final Guidance for Industry and FDA Staff," (Rockville MD: FDA) January 11, 2002. 1,3 In many countries with public healthcare insurance, the infrastructure for radiotherapy has been unable to satisfy demand. For example, in the UK, more than half the patients eligible for radiotherapy wait for longer than the recommended maximum period of four weeks due to a shortage of facilities.4
Table I. (click to expand) Selected five-year disease-free survival rates of cancer patients in the United States by treatment modality. Compiled from various sources including Merck Manual Online and the National Cancer Institute.
Currently radiotherapy is one of three major tools for treating cancers, along with surgery and chemotherapy. As a stand alone treatment, radiotherapy has demonstrated efficacy similar to other approaches for selected cancers. Its use in combination with other approaches is standard treatment for many advanced cancers (see Tables I and II).
Table II. (click to expand) Overview of radiotherapy modalities.
Current radiotherapy modalities use external beams, internal implants, or circulating tagged radionuclides to deliver ionizing radiation with the aim of preferentially killing tumor cells. More than 90% of radiotherapy patients are treated with external-beam radiotherapy (EBRT), the use of which has been spurred over the last two decades by techniques to deliver radiation doses to tumors with a high accuracy. Within EBRT, 3-D conformal radiotherapy (3DCRT) is the standard of care in most industrialized countries. This therapy uses 3-D tomographic images to design megavoltage x-ray beams that conform to the tumor volume, minimizing the dose to healthy organs and tissue. A recent innovation in EBRT is intensitymodulated radiotherapy (IMRT), introduced in 1999, which is supplanting 3DCRT primarily in the United States. IMRT deposits a large, specified radiation dose into a targeted volume by changing beam shapes and cross-sectional profiles at each angle of incidence. Medicare reimbursement championed IMRT by paying nearly $30,000 for a course of treatment, almost three times the payment for 3DCRT. Strong growth for IMRT is expected in Europe due to its recent positive clinical evaluations by national health systems.5
Image-guided radiotherapy (IGRT), the successor to IMRT, uses imaging approaches incorporated into radiation delivery in real-time to dynamically track changes in tumor location and shape during treatment. The incremental clinical benefit of IGRT over IMRT is yet to be established and Medicare is reimbursing only 20% more for IGRT protocols. Similarly, arc/helical therapy, delivered by a beamlet of radiation rotating around the patient, has yet to demonstrate improved clinical outcomes that would spur displacement of existing systems.
Stereotactic radiosurgery uses an external 3-D reference frame that is physically attached to the patient to precisely deliver radiotherapy with multiple beams. It primarily treats intracranial lesions, but is being extended to other areas of the body such as the lungs, liver, and pancreas.
Brachytherapy and therapeutic radiopharmaceuticals both provide internal sources of radiation. Their future use (and that of cobalt 60 external beam sources) could be affected by rising security concerns over the transport of radioactive material. Brachytherapy uses sealed sources as localized implants. While patients with low-dose-rate implants are not constrained, radiotherapy with high-dose-rate seeds is done using special catheters for limited intervals as an outpatient procedure. The common patient preference for a painless, noninvasive procedure restrains the use of brachytherapy, and favors external-beam radiotherapy.
The radiopharmaceutical iodine-131 has been used for thyroid treatment since 1946. For decades, radioimmunotherapy, involving tumor-targeting antibodies labeled with radioactive isotopes, has generated significant expectations. However, in contrast to the success of targeted immunotherapies, radioimmunotherapy products for lymphomas have not been commercially successful because their use requires an infrastructure involving nuclear pharmacies that is typically available only in large teaching hospitals.6
The Radiotherapy Market
The total market for radiotherapy is composed of two major elements: professional services and products. Services include charges for the professional medical staff such as radiation oncologists, medical physicists, dosimetrists, nurses, and facility administrators. Given the tremendous disparity in healthcare systems across the globe, professional service charges vary greatly and are difficult to compare. Charges for products, however, are more uniform and can be tracked easily. The total value for radiotherapy products in 2007 was $2.6 billion at manufacturer prices. The equipment is composed of linear accelerators (linacs) and specialized imaging equipment (simulators), specialized treatment planning software, internal radiation (brachytherapy) sources, and radiopharmaceuticals. Historical (2004–2007) and projected (2008–2011) growth rates for the radiotherapy market are 6.8% and 7.0%, respectively. Published market forecasts ascribe growth in the cancer market to immuno- and biotherapies, taking the view that radiotherapy products will continue to be expensive hardware such as linacs.
The Multidisciplinary Approach to Curing Cancer
Figure 1. (click to expand) Historical development of physics and biology approaches for cancer.
The development of radiotherapy has been traditionally led by physics and engineering. As shown in the time line in Figure 1, the first attempts at curing cancer using ionizing radiation started almost immediately after the discovery of x-rays and radioactivity in the 1890s. The principles of radiation's effect on biological tissues began to take shape at the turn of the 20th century, with empirical observations on the effect of x-rays on cells that correlated their proliferative activity and radiosensitivity. A major technological leap in the 1950s was the switch from low-energy x-rays that severely damaged the skin to cobalt 60 sources and linacs providing megavoltage x-rays with deep penetrating power. Radiotherapy received a tremendous boost following the advent of computed tomography (CT) imaging in the 1970s. CT had tremendous computing power to generate 3-D images that could be used for effective treatment planning.
In contrast, molecular biology is a more recent scientific discipline that blossomed after the structure of DNA was discovered. It now plays a fundamental role in elucidating both the basis of radiotherapy and molecular pathways underlying the various cancers.
Future Trends in Radiotherapy
The Physics Approach Gets More Expensive. The next-generation advance in radiotherapy involves the use of heavy particles for a greater precision in dose delivery at a targeted depth inside the patient. Biological damage from megavoltage photons is spread over larger distances compared with damage caused by heavy particles such as protons or carbon ions. A more precise radiation dose delivery not only promises greater efficacy in eradicating the targeted tumor, but it also reduces side effects including the risk of secondary tumor formation in overirradiated normal tissue. Such increased precision comes at a price, however. Constructing a facility for delivering radiotherapy with heavy particles is estimated to cost more than $100 million.7 Despite some enthusiasm and deep pockets among academic medical centers in the United States, it is unlikely that more than a handful of these types of facilities will be built around the world.
Imaging Highlights the Greater Role for Biology. While the delivery of radiation dose has become increasingly precise, accuracy in specifying the clinically significant tumor volume continues to drive developments in imaging. CT has been widely adopted in radiotherapy because it provides an accurate 3-D map of tissue density information that is an accurate basis for calculation of radiation dose. It also enables simulation of the radiotherapy process on the patient. Magnetic resonance (MR) provides more soft-tissue contrast, and in many instances does a better job of tracking spatial changes in the tumor during radiotherapy. Integrating different imaging techniques has required significant investment. It calls for upgrades to software that can seamlessly combine images from multiple modalities.
Positron emission tomography (PET) has extended the role of imaging to include observation of tumor biochemical pathways in real-time.8 PET requires injecting imaging agents that contain a positron emitter. By localizing the origins of the two identical gamma rays traveling in opposite directions that result from each emitted positron's annihilation with an electron, users can map the PET radiotracer distribution.
For more information on the regulatory aspects of imaging, click here.
The most common PET tracer is the glucose analog 18F-fluorodeoxyglucose (FDG). While CT and MR provide anatomic images, FDG-PET provides a functional map that can be used for tumor staging and therapy monitoring. In particular, lung cancer, a disease for which the overall five-year survival rate is below 10%, has seen increased application of PET scanning for early tumor detection. Tumors consume abnormally high amounts of glucose (and FDG), which makes them visible with FDG-PET.
Combined PET/CT scanners provide an accurate overlay of anatomic and functional images, with an imaging time of 5–10 minutes, which is significantly below the 45 minutes required by PET-only devices. PET/CT scanners now comprise 90% of PET equipment sales.9
Figure 2. (click to expand) Classical (top) and current (bottom) strategies for radiosentization.
A critical enabling technology for use of PET in identifying cancer is the development of injection targets combined with tracers. Monoclonal antibodies (mAbs) tagged with positron emitters that target individual biomarkers have been a promising innovation. Thus far, FDA has approved 21 mAbs for therapy and five for imaging, largely in oncology.10
Different Radiation Doses for Different Tumors. The typical cellular response to radiation includes pathways in DNA repair, control of cell-division cycle checkpoints, programmed cell death (apoptosis), and signal transduction.11 In addition to these typical responses, cancer cells have unique adaptations such as the ability to promote growth of blood vessels (angiogenesis), and function in oxygen-starved environments (hypoxia).12,13 Each pathway provides targets for optimizing the radiation response by either blocking the pathway the cancer cell is using to repair the radiation damage or sensitizing the cancer cell to be more vulnerable to the radiation it is about to receive.
The goal of developing radiosensitizers is to optimize the killing dose of radiation for the specific tumor being targeted and to inhibit the specific pathways the tumor uses to repair itself. This may vary by the life stage of the tumor as well. The need for intelligence on the specific pathways being exploited by a tumor underscores the forementioned close relationship of radiotherapy with functional imaging.14
An overview of the current development strategies for molecular radiosensitizers is shown in Figure 2.15 Many of these approaches are currently being tested in clinical trials. Key examples of molecular radiosensitizers in development include the following:
• Hypoxia confers resistance to radiation on cancer cells. A Phase III clinical trial for advanced head and neck cancer combines accelerated radiotherapy with carbogen (a hyperoxic gas) and nicotinamide (a vasodilator), which could enhance oxygen delivery to a tumor.16
• GenVec (Gaithersburg, MD) is conducting a pivotal Phase II/III trial with TNFerade in patients with locally advanced pancreatic cancer. TNFerade is a modified virus that contains the gene for tumor necrosis factor-alpha, an immune system protein with well-documented anticancer effects, which is injected into tumors for use in combination with radiation, chemotherapy, or both.
• Epidermal growth factor receptor (EGFR) is often over-expressed by tumor cells, and blocking it sensitizes the cells to radiation. Targeting EGFR using Erbitux (cetuximab) in patients with advanced head and neck squamous cell carcinoma significantly improved overall patient survival in a randomized pivotal trial.16
• Avastin (bevacizumab) binds vascular endothelial growth factor (VEGF) molecules and inhibits angiogenesis, the mechanism by which tumors recruit new blood vessels. The effects of combining Avastin and other angiogenesis inhibitors with radiotherapy are being investigated. Inhibiting a tumor's blood supply can also make it hypoxic and less radiosensitive.17
Figure 3. (click to expand) Ongoing clinical trials investigating radiosensitization grouped by tumor site.
There are more than 200 clinical trials under way that investigate the use of radiosensitization (see Figure 3). Not surprisingly, the greatest number of trials is for cancers that have shown significant resistance to surgical, chemotherapy, and radiotherapy treatments. Nearly all are treated with existing chemotherapy drugs that may demonstrate radiosensitization properties. The development of new radiosensitizing agents is generally in the preclinical stage.
Market Potential of Radiosensitizers
(click to expand)
A comparison of CT (left) and PET/CT for contouring a target volume for radiotherapy with the same lung cancer patient. Contouring using CT alone indicates a large tumor volume that is reduced when combining PET with CT.
The market for radiosensitizers is potentially larger than the current total radiotherapy equipment market. The market estimate is built by analyzing those cancers for which radiotherapy is prescribed today and have less than 50% five-year survival rates. There are more than 500,000 patients in the United States alone that could qualify for radiosensitizers. At a price of $7200 per radiosensitizer (the weighted average cost of chemotherapy treatments), the total U.S. market potential is more than $3.7 billion. The potential for any one radiosensitizer would be a fraction of this opportunity. However, by comparison, the global market for all radiotherapy products in 2007 was $2.6 billion. This is clearly a high-growth potential market that has opportunities for multiple types of players including manufacturers of radiotherapy and diagnostic imaging equipment, small biotech firms, and big pharmaceutical companies.
Conclusion
Radiotherapy is in transition from being an empirical discipline driven primarily by physics to a clinical science founded in an understanding of molecular pathways. There is a strong interest in the oncology community to extend the successes of radiotherapy across various cancers by validating novel markers with functional imaging and exploiting molecular mechanisms underlying radiosensitivity. The current level of activity, with clinicians validating existing chemo- and targeted therapeutic agents for use with radiotherapy, suggests that radiotherapy will become a promising area for drug development within a few years. The market opportunity is expected to be very significant, given the essential role of radiotherapy in treating cancer.
Usman Qazi is a principal at Scientia Advisors (Cambridge, MA), a consulting firm with a concentration in life sciences and healthcare. He can be reached at [email protected]. Amit Agarwal is a partner at the firm, and he can be contacted at [email protected].
References
1. “Targeting Cancer Care, Annual Report 2006–2007,” [online] (Fairfax, VA: American Society for Therapeutic Radiology and Oncology [cited 14 July 2008]) available from Internet: www.astro.org/AboutUs/AnnualReports.
2. NG Burnet et al. “Improving Cancer Outcomes Through Radiotherapy,” British Medical Journal 320 (January 2000): 198–199.
3. Leslie K Ballas et al., “Radiation Therapy Facilities in the United States,” International Journal of Radiation Oncology, Biology, Physics 66, no. 4 (2006): 1204–1211.
4. Ruth H Jack et al., “Radiotherapy Waiting Times for Women with Breast Cancer: A Population-Based Cohort Study,” BMC Cancer 7 (May 2007): 71.
5. Haute Autorité de Santé (France), “Radiothérapie Conformationelle avec Modulation d'Intensité,” 2006.
6. Ken Garber, “Users Fear That Lymphoma Drugs Will Disappear,” Journal of the National Cancer Institute 99 (April 2007): 498–501.
7. B Jones, “The Case for Particle Therapy,” British Journal of Radiology 79 (2006): 24.
8. Tom Blodgett et al., “PET/CT: Form and Function,” Radiology 242 (2007): 360–385.
9. Van Dongen et al., “Immuno-PET: A Navigator in Monoclonal Antibody Development and Application,” Oncologist 12 (2007): 1379–1389.
10. David S Boss et al., “Application of PET/CT in the Development of Novel Anticancer Drugs,” Oncologist 13 (2008): 25–38.
11. Philip J Tofilon et al., “Molecular Targets for Radiation Therapy: Bringing Preclinical Data into Clinical Trials,” Clinical Cancer Research 9 (2003): 3518–3520.
12. Henning Willers and Kathryn D Held, “Introduction to Clinical Radiation Biology,” Hematology/Oncology Clinics of North America 20 (2006): 1–24.
13. Harrington et al., “Molecular Biology for the Radiation Oncologist: The 5 Rs of Radiobiology Meet the Hallmarks of Cancer,” Clinical Oncology (Royal College of Radiologists) 19 (2007): 561.
14. CN Coleman, “Linking Radiation Biology and Imaging Through Molecular Biology,” Radiology 228 (2003): 29.
15. Eric Deutsch et al., “New Concepts for Phase I Trials: Evaluating New Drugs Combined with Radiation Therapy,” Nature Clinical Practice Oncology 2 (2005): 456–465.
16. Juliette Thariat et al., “Integrating Radiotherapy with Epidermal Growth Factor Receptor Antagonists and Other Molecular Therapeutics for the Treatment of Head and Neck Cancer,” International Journal of Radiation Oncology, Biology, Physics 69, no. 4 (2007): 974–984.
17. Suresh Senan and Egbert Smit, “Design of Clinical Trials of Radiation Combined with Angiogenic Therapy,” Oncologist 12 (2007): 465–477.
Copyright ©2008 Medical Device & Diagnostic Industry
Hide comments
account-default-image
Comments
• Allowed HTML tags: <em> <strong> <blockquote> <br> <p>
Plain text
• No HTML tags allowed.
• Web page addresses and e-mail addresses turn into links automatically.
• Lines and paragraphs break automatically.
Publish
|
Internet Relay Chat
From Wiki | LUG@UCLA
Revision as of 18:22, 5 December 2013 by Admin (Talk | contribs)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to: navigation, search
>>> #lug on irc.gimp.org <<<
>>> https://linux.ucla.edu/irc/ <<<
Since August 2003, LUG@UCLA's IRC channel is located at #lug on irc.gimp.net (aka GIMPNet).
What is IRC[edit]
"Internet Relay Chat (IRC) provides a way of communicating in real time with people from all over the world. It consists of various separate networks of IRC servers, machines that allow users to connect to IRC. IRC is very similar to text messaging, but designed around communicating with large groups of users instead of one-on-one." [ref]
More info on Wikipedia.
To get on IRC, you need an IRC client. Some IRC clients for Linux, Mac, and Windows include:
For your convenience, we have provided an IRC web interface. It will automatically connect you to our IRC channel from your web browser.
Installing an IRC client[edit]
All of the aforementioned IRC clients can be installed using your distribution's package manager.
e.g. to install XChat on Debian GNU/Linux, enter this command (as root): # apt-get install xchat
Those IRC clients are also installed on the LUG servers. You can access the servers remotely via SSH.
Using an IRC client[edit]
To join the #lug channel on the irc.gimp.org (aka GIMPNet) network, follow the steps below for your corresponding IRC client:
XChat[edit]
1. start xchat, select GimpNet, then click connect
caption
2. wait for the connection to complete (this may take up to 15 seconds), then join #lug
caption
You may now chat with others in the channel.
WeeChat[edit]
1. start weechat in a terminal window: $ weechat-curses
2. connect to a network: /connect irc.gimp.org
3. wait for the MOTD (this may take up to 15 seconds)
4. join a channel: /join #lug
You may now chat with others in the channel.
To leave the current channel, type: /buffer close
To leave all channels and quit, type: /quit
Persistent IRC[edit]
Keep your IRC session alive for long periods of time by using one of the following methods:
Virtual console method[edit]
Run your IRC client inside a virtual console (such as GNU Screen) on a server.
In the following example we use the LUG server, Screen, and WeeChat.
1. ssh into the LUG server: $ ssh [email protected]
2. start a Screen session named "IRC": $ screen -S IRC
3. start WeeChat and join a channel (see above)
4. detach from the Screen session by pressing ctrl+a then d
5. re-attach to the Screen session by typing: $ screen -x IRC
6. repeat steps 4 and 5 as needed.
Bouncer method[edit]
Run a bouncer (such as znc) on a server, and connect to it from your IRC client.
TODO
Other channels[edit]
UCLA related[edit]
• #ucla on irc.freenode.net - the unofficial UCLA channel (webchat)
Searching other channels[edit]
IRC is an open standard, thus there are many independently operated IRC networks. Nearly every open source project has its own IRC channel(s) for user support or development chatter. Have a question about GNOME? Head over to the #gnome channel on irc.gnome.org. Have a question about Linux? Head over to #linux on irc.freenode.net. We cannot possibly list every channel and network, but here is a list of IRC search engines:
|
1. iMore.com's Avatar
iMessage is Apple's text and media messaging service, bundled into the Messages app on iPhone, iPad, and Mac. And that's where the platform support ends. There's no iMessage for Windows or Android. There's certainly no iMessage for Windows Phone or BlackBerry. Unlike Apple's Mail, Contacts, Calendar, and iWork, there's not even an iMessage in the iCloud. But, on the heels of Facebook buying WhatsApp for $16 billion and BlackBerry entirely missing the BBM boat... should there be?
Full story from the iMore Blog...
02-22-2014 12:40 PM
2. Just_Me_D's Avatar
There are numerous cross-platform messaging apps available to use and yet, not everyone uses them. Just because iMessages is an Apple service, making it for Android and other platforms will not guarantee that everyone will use it just like everyone do not use an iPhone or an iPad.
Last edited by JustMe'D; 02-22-2014 at 03:49 PM.
02-22-2014 01:24 PM
3. rayz336's Avatar
I think it'd be great if there was an iMessage client for the other platforms. Everyone may not use it but the option to use it would certainly be great
02-22-2014 03:20 PM
4. Timhewitt's Avatar
Very unlikely Apple will do this.
02-22-2014 11:00 PM
5. Speedygi's Avatar
It would be good to have this just a competitor to BBM and it would get more people interested in getting an iPhone or iPad. I don't see why not...
Sent from my GT-I9505 using Tapatalk
02-23-2014 02:39 AM
6. HankAZ's Avatar
Not gonna happen. I remember reading what a fight it was to even get iTunes to Windows.
Sent from a galaxy far, far away via Tapatalk.
02-23-2014 12:24 PM
7. iOS Gravity's Avatar
Not gonna happen. I remember reading what a fight it was to even get iTunes to Windows.
Sent from a galaxy far, far away via Tapatalk.
If iTunes wasn't on Windows, Apple would have been losing money since some people don't own a Mac but they have a PC.
02-23-2014 02:24 PM
Similar Threads
1. external hard drive for iphone 4S
By Laurie McMillen Cornelis in forum Ask a Question
Replies: 3
Last Post: 02-22-2014, 03:29 PM
LINK TO POST COPIED TO CLIPBOARD
|
Stack Overflow is a community of 4.7 million programmers, just like you, helping each other.
Join them; it only takes a minute:
Sign up
Join the Stack Overflow community to:
1. Ask programming questions
2. Answer and help your peers
3. Get recognized for your expertise
When incrementing and decrementing multiple threads using a single shared variable, how can I ensure that the threads count in a syncronized way and don't skip any value.
I have created a seperate class in which I have 3 different methods, one to increment, another to decrement and the last one to return the value. they are all synchronized as well.
The result shows an example:
• This is Thread_4 iteration: -108 of 500
This is Thread_5 iteration: 291 of 500
This is Thread_4 iteration: -109 of 500
This is Thread_4 iteration: -110 of 500
As you can see the threads are decrementing but then it jumps to "291" which should not happen as I am using a shared variable.
*******************EDIT********
CODE:- SHARED VARIABLE CLASS
public class shareVar extends Thread
{
private static int sharedVariable = 0;
public synchronized static void increment(){
sharedVariable++;
}
public synchronized static void decrement(){
sharedVariable--;
}
public static int value(){
return sharedVariable;
}
}
----- Incrementing Class
sVar incrementVal = new sVar();
public synchronized void display(){
for(int countVal = 0; countVal<=max; countVal++ ){
incrementVal.increment();
System.out.println("This is " + threadName + " iteration: " + incrementVal.value() + " of " + max);
//this.yield();
}
System.out.println("*THIS " + threadName + " IS FINISH "
+ "INCREMENTING *");
}
public void run(){
display();
}
share|improve this question
2
Can't tell without code posted – John Vint Mar 31 '13 at 19:17
2
put your code to let us understand ur problem better. – Vishal K Mar 31 '13 at 19:17
What is the expected output? – fish Mar 31 '13 at 19:54
Consider using AtomicInteger:
public class Foo
{
private AtomicInteger counter = new AtomicInteger(0);
public void increment()
{
counter.incrementAndGet();
}
public void decrement()
{
counter.decrementAndGet();
}
public int getValue()
{
return counter.get();
}
}
or using the synchronized methods:
public class Foo
{
private volatile int counter;
public synchronized void increment()
{
counter++;
}
public synchronized void decrement()
{
counter--;
}
public int getValue()
{
return counter;
}
}
share|improve this answer
I have done this already and I am still not getting a completely synchronized incrementing and decrementing count. *****(This is Thread_2 iteration: -9 of 500 This is Thread_2 iteration: -8 of 500 This is Thread_1 iteration: -135 of 500 This is Thread_1 iteration: -7 of 500 This is Thread_1 iteration: -6 of 500) – user2075927 Mar 31 '13 at 19:37
Is it possible to run both increment and decerement in one method instead of having two different method? – user2075927 Mar 31 '13 at 21:07
Not sure if I understand your question correctly, but your output looks the way it is just because another thread (Thread_4) gets to work on the value before Thread_5 outputs it.
There are a number of operations going on in each iteration (simplified list, in reality there are more than these):
1. Increment/decrement
2. Get the current value
3. Create the output String
4. Output the output String
And another thread may get a turn between any of these operations. So it could be that Thread_5 does what it does, then other threads get turns and only after a while Thread_5 outputs the result.
If you want the new values to be output in order, you need to output the current value inside the synchronized block, ie. the increment/decrement methods.
share|improve this answer
I think I understand what your saying, would it be possible to see an example? – user2075927 Mar 31 '13 at 21:06
Is it possible to run both increment and decrement in one method instead of having two different methods? – user2075927 Mar 31 '13 at 21:18
Just put the System.out.println inside of the increment() or decrement(). If you want to use one method for both operations, use a method parameter to indicate which operation it is. Like operate(boolean increment). – fish Mar 31 '13 at 22:20
Thanks.. I tried but I still get a few sections where within the threads that still is not following the order where 1 or 2 thread might have random values. – user2075927 Apr 1 '13 at 0:17
Did you use just one method or still two? I just realized that you must use just one to achieve the ordering. That should help. – fish Apr 1 '13 at 17:58
Your Answer
discard
By posting your answer, you agree to the privacy policy and terms of service.
Not the answer you're looking for? Browse other questions tagged or ask your own question.
|
Surgical Helmet Systems: Enhancing Safety and Protection in the Medical Industry
Understanding the Importance of Laboratory Incubators in Scientific Research
In the ever-evolving landscape of the medical industry, technological advancements continue to revolutionize patient care and safety. One such innovation that has gained significant attention is the development and implementation of surgical helmet systems. These cutting-edge devices are designed to enhance safety and protection for healthcare professionals in the operating room, mitigating risks and optimizing patient outcomes.
The traditional surgical environment can be a challenging and high-stakes setting, where surgeons and other healthcare providers are exposed to various hazards. These hazards range from potential infection transmission to accidental injuries caused by sharp instruments or falling objects. The need for improved safety measures and enhanced personal protective equipment has led to the emergence of surgical helmet systems as a crucial tool in modern surgical practice.
In this blog, we will delve into the various components, features, and benefits of surgical helmet systems, exploring their impact on surgical safety and patient care. We will also examine the current state of adoption, emerging trends, and potential challenges in integrating these innovative devices into routine surgical practice. By shedding light on this transformative technology, we aim to promote a better understanding of surgical helmet systems and their potential to revolutionize the medical industry’s safety standards.
Understanding Surgical Helmet Systems
Surgical helmet systems incorporate state-of-the-art technology and engineering to provide comprehensive protection to healthcare professionals. These systems typically consist of a lightweight and ergonomically designed helmet that covers the entire head, offering to shield against potential head injuries and airborne pathogens. Additionally, they are equipped with advanced features such as integrated face shields, ventilation systems, and communication capabilities, further enhancing safety and efficiency during surgical procedures.
One of the primary benefits of surgical helmet systems is the significant reduction in the risk of healthcare associated infections. These infections pose a substantial threat to both patients and medical personnel. By providing a barrier against airborne particles and droplets, surgical helmet systems help prevent the transmission of infectious agents between patients and healthcare professionals. Furthermore, some systems include specialized filters and airflow management systems that optimize air quality within the helmet, ensuring a sterile environment for surgical procedures.
Another critical aspect of surgical helmet systems is their ability to enhance communication and collaboration among surgical teams. In complex procedures, effective communication between team members is essential for seamless coordination and decision-making. Surgical helmets often come equipped with built-in communication systems allowing real-time interaction between surgeons nurses and anesthesiologists without the need for external devices. This streamlined communication not only improves teamwork but also minimizes distractions and potential errors during critical moments.
Cutting-Edge Technology Employed in Surgical Helmets
Cutting-edge technology employed in surgical helmets has a significant impact on healthcare professionals in various ways:
• Advanced Materials: Surgical helmets utilize lightweight, durable, and impact-resistant materials that provide optimal protection without compromising comfort.
• Integrated Face Shields: Many surgical helmets feature built-in face shields that offer protection against splashes, airborne particles, and other potential hazards. This eliminates the need for separate face shields, enhancing convenience and reducing the risk of contamination.
• Ventilation Systems: Some surgical helmets incorporate ventilation systems that optimize air circulation and minimize heat buildup, ensuring a comfortable and breathable environment for healthcare professionals during lengthy procedures.
• Communication Capabilities: Surgical helmets often integrate communication devices, such as microphones and speakers, enabling seamless and efficient communication among surgical team members. This promotes collaboration, coordination, and timely decision-making.
• Optical Systems and Lighting: Certain surgical helmets come equipped with optical systems, such as magnifying lenses or built-in lighting, which enhance visibility and precision during delicate surgical procedures. This improves accuracy and reduces the risk of errors.
• Sterilization Compatibility: Surgical helmets are designed to be compatible with standard sterilization procedures, allowing for efficient cleaning and decontamination. This ensures that the helmets maintain their protective properties and can be reused safely.
• Data Collection and Analysis: Some advanced surgical helmet systems incorporate sensors or trackers to collect data related to the wearer’s movements, vital signs, or surgical parameters. This data can be analyzed to optimize surgical techniques, enhance training programs, and improve patient outcomes.
Usage Guidelines for Surgical Helmets
1. Sterilization of Surgical Helmets: Proper sterilization methods for surgical helmets include:
• Steam Autoclaving: The most commonly used method, steam autoclaving involves subjecting surgical helmets to high-pressure saturated steam at a specific temperature and duration. This method is effective in killing a wide range of microorganisms and is suitable for most surgical helmet materials.
• Ethylene Oxide Gas Sterilization: Ethylene oxide gas is used for sterilizing heat-sensitive materials. Surgical helmets are placed in a sealed chamber and exposed to ethylene oxide gas under controlled conditions. This method requires specialized equipment and proper aeration to remove residual gas before the helmets can be used.
• Hydrogen Peroxide Plasma Sterilization: This method involves exposing surgical helmets to hydrogen peroxide vapor in a low-temperature plasma chamber. The vapor undergoes a plasma-enhanced chemical reaction that effectively sterilizes the helmets. It is suitable for heat-sensitive materials and offers shorter cycle times compared to ethylene oxide gas sterilization.
2. Wearing Comfort in Surgical Helmets: Several features and design aspects are incorporated into surgical helmets to ensure maximum comfort for medical professionals. These elements prioritize the well-being and performance of healthcare providers during prolonged and demanding procedures. Here are the key features that contribute to comfort:
• Lightweight Construction: Surgical helmets are made from lightweight materials, reducing the burden on the wearer’s head and neck muscles, minimizing fatigue, and promoting comfort throughout the procedure.
• Comfortable Design: The shape and contours of surgical helmets are designed to align with the natural shape of the head providing a secure and comfortable fit. The helmets are often adjustable to accommodate different head sizes and shapes.
• Padding and Cushioning: Inner padding and cushioning are incorporated into surgical helmets to provide a soft and comfortable surface against the wearer’s head. This helps distribute pressure evenly, reducing discomfort during prolonged use.
• Ventilation Systems: Many surgical helmets feature ventilation systems that facilitate airflow within the helmet. These systems help regulate temperature, prevent excessive sweating, and maintain a comfortable environment for the wearer.
• Adjustable Straps and Fasteners: Surgical helmets are equipped with adjustable straps and fasteners, allowing healthcare professionals to customize the fit according to their individual preferences and head sizes. This ensures a secure and comfortable fit throughout the procedure.
• Anti-Fogging Properties: Surgical helmets often incorporate anti-fogging features on their face shields or visors. These properties prevent fogging caused by moisture or temperature changes, ensuring clear visibility and minimizing discomfort.
• Compatibility with Other PPE: Surgical helmets are designed to be compatible with other personal protective equipment (PPE) used in the operating room such as surgical masks goggles or loupes. The integration of different PPE components ensures a comfortable and coordinated experience for medical professionals.
Accessories for Surgical Helmets
Accessories for surgical helmets enhance their functionality and provide additional convenience for healthcare professionals. Here are some common accessories for surgical helmets:
• Surgical Helmet Face Shields: Face shields are a crucial accessory for surgical helmets, offering protection against splashes, droplets, and airborne particles. These shields are typically transparent and designed to fit securely onto the helmet, providing an added layer of defense for the wearer’s face and eyes.
• Replacement Straps for Surgical Helmets: Replacement straps are available for surgical helmets, allowing for easy customization and adjustment of the helmet’s fit. These straps are designed to be durable and secure, ensuring that the helmet remains in place during surgical procedures.
• Helmet-Mounted Lighting Options: Helmet-mounted lighting options, such as LED lights or headlamps, are popular accessories for surgical helmets. These lighting solutions provide direct illumination and improve visibility in the surgical field, enabling healthcare professionals to perform procedures with precision and accuracy.
Benefits of Surgical Helmet Systems
Surgical helmet systems offer several key benefits in the medical industry:
• Enhanced Safety: Surgical helmet systems provide comprehensive head protection, reducing the risk of head injuries caused by falling objects or accidental collisions in the operating room. They act as a barrier against potential hazards, ensuring the safety of healthcare professionals.
• Infection Prevention: These systems help minimize the transmission of airborne pathogens and reduce the risk of healthcare-associated infections. By creating a physical barrier and incorporating advanced filtration systems, surgical helmets contribute to a sterile surgical environment.
• Improved Communication: Surgical helmet systems often include integrated communication systems, facilitating real-time interaction among surgical team members. This streamlined communication promotes collaboration, coordination, and decision-making during complex procedures, ultimately improving patient outcomes.
• Ergonomic Design: Designed with comfort in mind, surgical helmets are lightweight and ergonomically shaped. They provide a snug fit, reducing strain and fatigue on healthcare professionals during lengthy surgical procedures.
• Advanced Features: Surgical helmet systems may incorporate additional features such as integrated face shields, ventilation systems, and built-in lighting. These features further enhance safety, visibility, and overall efficiency in the operating room.
• Standardization of Personal Protective Equipment (PPE): By adopting surgical helmet systems, healthcare facilities can establish a standardized approach to PPE, ensuring consistent and optimal protection for all surgical team members.
• Future Potential: With ongoing research and development, surgical helmet systems are expected to evolve further, integrating more advanced technologies and features. This continuous innovation has the potential to enhance safety standards and redefine surgical practices in the future.
Safety Features of Surgical Helmets
Surgical helmets are equipped with various safety features to ensure the protection and well-being of healthcare professionals. Here are some key safety features of surgical helmets:
• Protective Headgear for Surgery: Surgical helmets provide comprehensive head protection, acting as a barrier against potential hazards in the operating room. They are designed to cover the entire head reducing the risk of head injuries caused by falling objects or accidental collisions.
• Anti-Fogging Surgical Visors: Many surgical helmets come with built-in visors that have anti-fogging properties. These visors prevent fogging caused by moisture or temperature changes, ensuring clear visibility for the wearer during procedures and minimizing the need for constant adjustment.
• Impact-Resistant Helmets: Surgical helmets are constructed with impact-resistant materials to withstand potential impacts or collisions in the operating room. This feature provides an extra layer of protection against head injuries, enhancing the safety of healthcare professionals.
Best Practices for Surgical Helmets
To ensure the optimal use and effectiveness of surgical helmets, several best practices should be followed. These practices include:
• Maintenance of Surgical Helmets: Regular maintenance of surgical helmets is essential. This involves inspecting the helmet for any damage, such as cracks or loose components, and addressing any issues promptly. It is important to follow the manufacturer’s guidelines for maintenance.
• Proper Fitting of Surgical Helmets: Surgical helmets should be properly fitted to ensure a secure and comfortable fit. Healthcare professionals should adjust the straps and fasteners to customize the fit according to their head size and shape. A properly fitted helmet reduces the risk of discomfort, shifting, or falling off during surgical procedures.
• Cleaning Protocols for Surgical Helmets: Cleaning protocols should be established and followed to maintain the cleanliness and hygiene of surgical helmets. This typically involves using mild detergents or enzymatic cleaners to remove visible debris, followed by rinsing with water. Healthcare facilities should adhere to the recommended cleaning frequency and methods provided by the manufacturer.
• Sterilization: Sterilization or disinfection procedures is performed according to the manufacturer’s instructions. Proper sterilization methods, such as steam autoclaving or ethylene oxide gas sterilization, should be followed to ensure that surgical helmets are free from microorganisms before use.
• Storage and Handling: Surgical helmets should be stored in a clean and designated area, away from potential contaminants. They should be handled with clean hands or gloves to prevent contamination. Proper storage and handling practices help maintain the integrity and cleanliness of the helmets.
Surgical Helmets From Leading Indian Manufacturers
VIZBL Surgical Helmet
VIZBL Surgical Helmet
The VIZBL Surgical Helmet (Virtual Intelligent Zooming and Bright Lighting) system manufactured by Prodancy Pvt. Ltd., is an innovative visor fastening system that offers a wide 190-degree view angle, allowing for excellent peripheral vision during surgical procedures. This enhanced field of view can be beneficial in maintaining awareness of the surgical environment.
One of the key features of the VIZBL system is its airflow capability. It provides a generous airflow of 360 liters per minute (LPM), ensuring effective cooling and comfort for the user. The high-performance Ultra-low noise fans integrated into the system allow the airflow to be adjusted according to the user’s preference providing a customizable experience.
The VIZBL system is designed to be a cost-effective option for usage in joint replacement surgeries and other surgical procedures. It eliminates the need for an expensive battery-charging dock and specialized batteries by utilizing any regular power bank for its power source. This feature adds convenience and flexibility to the system, as power banks are readily available and can be easily replaced or charged.
With a full charge, a regular 5000+ mAh power bank can power the VIZBL system for 10 hours, ensuring long-lasting operation during surgical procedures. This eliminates concerns about running out of power during critical moments in the operating room.
The VIZBL system prioritizes user protection by utilizing 43 GSM SMMS (Spunbond-Meltblown-Meltblown-Spunbond) material in its hoods. This material offers a high level of protection against airborne particles, ensuring a safe surgical environment.
Additionally, the VIZBL system offers a surgical helmet option along with the hoods. This provides users with the flexibility to choose the most suitable configuration for their specific surgical needs.
Overall, the VIZBL system combines innovative design elements, adjustable airflow, cost-effectiveness, and user-friendly features to enhance surgical procedures, particularly in joint replacement surgeries, while ensuring comfort, protection, and extended operation time.
Conclusion
Surgical helmet systems have become indispensable protective gear in the medical industry, significantly enhancing safety and protection for healthcare professionals. By understanding the benefits, cutting-edge technology, proper sterilization methods, comfort features, face shield options, lighting accessories, key safety features, maintenance practices, and regulatory standards, medical practitioners can make informed decisions when choosing the right surgical helmet system. Medzell, the futuristic B2B platform for promoting Indian medical devices in emerging markets, brings forth the latest advancements in the field, ensuring a safer and more efficient healthcare environment.
Leave a Comment
Your email address will not be published. Required fields are marked *
Scroll to Top
|
What Are the Effects of Swallowing Fiberglass Insulation?
iStockbyte/Stockbyte/Getty Images
Fiberglass, also known as glass wool, is a synthetic fiber. Manufacturers make it by melting glass and drawing it into strands. Workers can use fiberglass insulationin the walls, floors, ceiling and around the ductwork of homes. Contact with free-floating fibers occurs while cutting or installing the insulation. These floating particles make contact with the skin or eyes and you may inhale or swallow them. Health-related effects depend on the type and amount of exposure to the fiberglass.
Inhaling or Swallowing
If you have asthma or bronchitis, wear a dust mask when working with insulation because inhaling the fibers can worsen these conditions. Healthy individuals who inhale the fibers may experience effects such as soreness in the nose and throat and if swallowed, stomach irritation can occur. Little is known about the effects of small fibers, but it is believed that if they get into the lungs and small intestine, adverse side effects such as intestinal blockage may occur.
Contact With Skin
People’s reaction when skin is exposed to fiberglass particles varies by person, as some are more sensitive to it. Some develop a rash from particles embedding in the outer layers of the skin while others only experience itching. If particles make contact with eyes, redness and soreness generally occur. There is no evidence that adverse side effects result from skin absorption.
First Aid
You can take measures if fiberglass particles make contact. For the eyes, flush with water and remove contacts; call an ophthalmologist if irritation persists. For the skin, wash with plenty of soap and water. If swallowed, get medical attention and do not induce vomiting or take laxatives. For inhalation, move to fresh air and seek medical attention if irritation persists.
Safety Precautions
You can limit exposure to fiberglass particles. Wear goggles and a dust mask to avoid inhaling free-floating particles and making contact with the eyes; the mask will also reduce the risk of swallowing particles. Wear long sleeves and gloves to help reduce the risk of skin irritation. Wash clothes worn during exposure separately and rinse the washing machine thoroughly after removing clothing to avoid contaminating other clothing.
×
|
SQLite - AUTOINCREMENT
Advertisements
SQLite AUTOINCREMENT is a keyword used for auto incrementing a value of a field in the table. We can auto increment a field value by using AUTOINCREMENT keyword when creating a table with specific column name to auto increment.
The keyword AUTOINCREMENT can be used with INTEGER field only.
Syntax
The basic usage of AUTOINCREMENT keyword is as follows −
CREATE TABLE table_name(
column1 INTEGER AUTOINCREMENT,
column2 datatype,
column3 datatype,
.....
columnN datatype,
);
Example
Consider COMPANY table to be created as follows −
sqlite> CREATE TABLE COMPANY(
ID INTEGER PRIMARY KEY AUTOINCREMENT,
NAME TEXT NOT NULL,
AGE INT NOT NULL,
ADDRESS CHAR(50),
SALARY REAL
);
Now, insert the following records into table COMPANY −
INSERT INTO COMPANY (NAME,AGE,ADDRESS,SALARY)
VALUES ( 'Paul', 32, 'California', 20000.00 );
INSERT INTO COMPANY (NAME,AGE,ADDRESS,SALARY)
VALUES ('Allen', 25, 'Texas', 15000.00 );
INSERT INTO COMPANY (NAME,AGE,ADDRESS,SALARY)
VALUES ('Teddy', 23, 'Norway', 20000.00 );
INSERT INTO COMPANY (NAME,AGE,ADDRESS,SALARY)
VALUES ( 'Mark', 25, 'Rich-Mond ', 65000.00 );
INSERT INTO COMPANY (NAME,AGE,ADDRESS,SALARY)
VALUES ( 'David', 27, 'Texas', 85000.00 );
INSERT INTO COMPANY (NAME,AGE,ADDRESS,SALARY)
VALUES ( 'Kim', 22, 'South-Hall', 45000.00 );
INSERT INTO COMPANY (NAME,AGE,ADDRESS,SALARY)
VALUES ( 'James', 24, 'Houston', 10000.00 );
This will insert 7 tuples into the table COMPANY and COMPANY will have the following records −
ID NAME AGE ADDRESS SALARY
---------- ---------- ---------- ---------- ----------
1 Paul 32 California 20000.0
2 Allen 25 Texas 15000.0
3 Teddy 23 Norway 20000.0
4 Mark 25 Rich-Mond 65000.0
5 David 27 Texas 85000.0
6 Kim 22 South-Hall 45000.0
7 James 24 Houston 10000.0
Advertisements
E-Books Store
|
The 38th International Conference And Exhibition on Computer Graphics and Interactive Techniques
Face-to-Avatar
West Building, Ballroom B
This floating avatar system integrates a blimp with a virtual avatar to create a unique system of telepresence. The blimp avatar contains several pieces of equipment, including a projector and a speaker as the output functions. Users communicate with others by presenting their facial images through the projector and voices through the speaker. A camera and microphone attached to the blimp provide the input function and support the user’s manipulation from a distance. The user’s presence is more dramatic than a conventional virtual avatar (CG and image), because the avatar is a physical object and moves freely in the real world. In addition, the user’s senses are augmented, because the blimp detects dynamic information in the real world. For example, the camera provides a special floating view to the user, and the microphone collects a wide variety of sounds such as conversations and environmental noise.
Hiroaki Tobita
Sony Computer Science Laboratories, Inc.
Shigeaki Maruyama
Sony Computer Science Laboratories, Inc.
|
The Community for Technology Leaders
Green Image
ABSTRACT
<p>Quorum attainment protocols are an important part of many mutual exclusion algorithms. Assessing the performance of such protocols in terms of number of messages, as is usually done, may be less significant than being able to compute the delay in attaining the quorum. Some protocols achieve higher reliability at the expense of increased message cost or delay. A unified analytical model which takes into account the network delay and its effect on the time needed to obtain a quorum is presented. A combined performability metric, which takes into account both availability and delay, is defined, and expressions to calculate its value are derived for two different reliable quorum attainment protocols: D. Agrawal and A. El Abbadi's (1991) and Majority Consensus algorithms (R.H. Thomas, 1979). Expressions for the primary site approach are also given as upper bound on performability and lower bound on delay. A parallel version of the Agrawal and El Abbadi protocol is introduced and evaluated. This new algorithm is shown to exhibit lower delay at the expense of a negligible increase in the number of messages exchanged. Numerical results derived from the model are discussed.</p>
INDEX TERMS
distributed algorithms; protocols; software performance evaluation; software fault tolerance; unified framework; distributed quorum attainment protocols; mutual exclusion algorithms; protocol performance; unified analytical model; network delay; performability metric; Majority Consensus algorithms; primary site approach; performability; parallel version; performance analysis; fault tolerance; distributed systems; delay analysis; tree-based mutual exclusion protocols
CITATION
D.A. Menasce, K. Kalpakis, Y. Yesha, "On a Unified Framework for the Evaluation of Distributed Quorum Attainment Protocols", IEEE Transactions on Software Engineering, vol. 20, no. , pp. 868-884, November 1994, doi:10.1109/32.368122
98 ms
(Ver 3.3 (11022016))
|
Connect URL - Connection timed out
Olá!
Tenho uma classe java a correr que se liga a URL e, usando DOM, lê valores de um XML.
A classe está sempre a correr, mas tem acontecido durante a noite a seguinte exception:
java.net.ConnectException: Connection timed out: connect
at java.net.PlainSocketImpl.socketConnect(Native Method)
at java.net.PlainSocketImpl.doConnect(Unknown Source)
at java.net.PlainSocketImpl.connectToAddress(Unknown Source)
at java.net.PlainSocketImpl.connect(Unknown Source)
at java.net.Socket.connect(Unknown Source)
at java.net.Socket.connect(Unknown Source)
at sun.net.NetworkClient.doConnect(Unknown Source)
at sun.net.www.http.HttpClient.openServer(Unknown Source)
at sun.net.www.http.HttpClient.openServer(Unknown Source)
at sun.net.www.http.HttpClient.<init>(Unknown Source)
at sun.net.www.http.HttpClient.New(Unknown Source)
at sun.net.www.http.HttpClient.New(Unknown Source)
at sun.net.www.protocol.http.HttpURLConnection.getNewHttpClient(Unknown
Source)
at sun.net.www.protocol.http.HttpURLConnection.plainConnect(Unknown Sour
ce)
at sun.net.www.protocol.http.HttpURLConnection.connect(Unknown Source)
at sun.net.www.protocol.http.HttpURLConnection.getInputStream(Unknown So
urce)
at java.net.URL.openStream(Unknown Source)
Alguém me dá uma dica pq isto acontece?
Thankx
Cláudia
se for uma chamada web, vc tem condições no container de configurar o timeout da sua aplicação, daí vc aumenta.
mais seria interessante vc fzr um teste de stress, visto que o custo de trabalhar com DOM é alto.
veja se não é possível vc migrar de DOM para SAX, aí verás substanciais melhoras.
[s]
baiano
Não estou a usar nenhum container…
O meu código é o seguinte:
public class matadouro extends Thread {
/**
* @param args
* @throws ParserConfigurationException
* @throws SAXException
* @throws RemoteException
*/
public static void main(String[] args) throws ParserConfigurationException, SAXException, RemoteException, InterruptedException {
// TODO Auto-generated method stub
// Parameters
String [] data = {null, null, null, null, null};
while(true)
{
try {
URL url = new URL("http://matadourosbl.no-ip.info/matadouro/data.php");
InputStream inputXML = url.openStream();
//Declare variables
org.w3c.dom.Document document;
javax.xml.parsers.DocumentBuilderFactory factory = javax.xml.parsers.DocumentBuilderFactory.newInstance();
//Build document:
javax.xml.parsers.DocumentBuilder builder = factory.newDocumentBuilder();
document = builder.parse(inputXML);
//Generate the NodeList;
org.w3c.dom.NodeList nodeList = document.getElementsByTagName("data");
for (int i=0; i<nodeList.getLength(); i++)
{
org.w3c.dom.Node curNode = nodeList.item(i);
//Get value attribute:
org.w3c.dom.Element curElm = (org.w3c.dom.Element)nodeList.item(i);
String curVal = curElm.getAttribute("value");
Ninguém me ajuda??
Continuo tento a excepção…
Veja: http://www.guj.com.br/posts/list/52822.java
Lá tem a indicação para trabalhar com requisições http.
Até mais…
Oi nbluis!
Estive a ver o que me indicaste e também li o tutoria http://www.guj.com.br/java.tutorial.artigo.5.1.guj
Então fiquei com uma dúvida… O meu código:
...
URL url = new URL("http://matadourosbl.no-ip.info/matadouro/data.php");
InputStream inputXML = url.openStream();
...
Será que entre a 1ª linha e a 2ª linha preciso de alguma coisa do tipo:
HttpURLConnection connection = (HttpURLConnection) url.openConnection();
connection.setDoInput(true);
connection.setDoOutput(false);
connection.connect();
Espero tua resposta.
Obrigada!!
Cláudia
Oi Claudia, desculpe a demora…
Pode fazer da seguinte maneira…
URL url = new URL("http://matadourosbl.no-ip.info/matadouro/data.php");
HttpURLConnection connection = (HttpURLConnection) url.openConnection();
DataInputStream in = new DataInputStream(url.openStream());
while (in.available() > 0) System.out.println(in.readLine());
Até mais …
Olá,
Deixa eu ver se eu entendi correto.
Esse seu código roda de tempos em tempos, conectando a esse URL e parseando os dados XML com DOM?
E normalmente isso funciona mas às vezes durante a noite dá essas exceções?
Se esse for o caso, não concordo muito com as sugestões dadas aqui. Parece mais provável que seu código tá bom, só que o serviço que você está usando não está disponível às vezes. Talvez o sistema for desligado durante um tempinho a noite para fazer backup, talvez às vezes ocorram problemas da rede, ou alguma coisa desse gênero.
[]s,
Sami
É mesmo isso!
Uso uma thread que acorda de hora a hora, faz o parser do xml e guarda-os em DB.
Inicial/ tb pensei o mesmo que o Same, que fosse problema do servidor de dados, mas agora não estou mto convencida disso.
Tenho a certeza que o código funciona, mas ao fim de algum tempo a correr, obtenho a tal excepção e é despoletada pela linha:
InputStream inputXML = url.openStream();
Então li o tutorial aqui do GUJ, e vi que talvez falte a parte
HttpURLConnection connection = (HttpURLConnection) url.openConnection();
Vou tentar, conforme sugeriu o nbluis, mas gostava de perceber qual a diferença entre colocar esta linha ou não???
Obrigada,
CLáudia
:cry:
Nbluis usei o teu código!!
Agora nem uma vez funcionou, obtenho logo excepção na 3ªlinha
java.net.ConnectException: Connection timed out: connect
DataInputStream in = new DataInputStream(url.openStream());
HELPPPPPP
Acredito que seja um problema de timeout to servidor web que tu estás requisitando.
Testa isso em outra url… tipo www.guj.com.br.
Caso seja isso, terás que tratar caso aconteça um timeout tu requisitar novamente até conseguir finalizar o processo…
Aguardo para qualquer necessidade…
Até mais…
Luis real/ o problema deve ser do servidor web que estou requisitando. Com o url do guj não há timeouts!!!
Só mais uma coisa, podes me explicar a diferença entr os códigos:
URL url = new URL("http://www.guj.com.br");
InputStream inputXML = url.openStream();
OU
URL url = new URL("http://www.guj.com.br");
HttpURLConnection connection = (HttpURLConnection) url.openConnection();
DataInputStream in = new DataInputStream(url.openStream());
Pq não percebi sem criar a ligação http funciona, entao kal a diferença entre colocar esta linha ou não?!
Obrigada,
Cláudia
|
Network Theorems Online MCQ Test - Set 01 - ObjectiveBooks
Network Theorems Online MCQ Test - Set 01
Practice Test: Question Set - 01
1. “Maximum power output is obtained from a network when the load resistance is equal to the output resistance of the network as seen terminals of the load”. The above statement is associated with
(A) Millman’s theorem
(B) Thevenin’s theorem
(C) Superposition theorem
(D) Maximum power transfer theorem
2. Kirchhoff’s law is applicable to
(A) Passive networks only
(B) A.C. circuits only
(C) D.C. circuits only
(D) Both A.C. as well D.C. circuits
3. If the energy is supplied from a source, whose resistance is 1 ohm, to a load of 100 ohms the source will be
(A) A voltage source
(B) A current source
(C) Both of above
(D) None of the above
4. The superposition theorem is applicable to
(A) Linear, nonlinear and time variant responses
(B) Linear and nonlinear resistors only
(C) Linear responses only
(D) None of the above
5. Which of the following is the passive element?
(A) Capacitance
(B) Ideal current source
(C) Ideal voltage source
(D) All of the above
6. The number of independent equations to solve a network is equal to
(A) The number of chords
(B) The number of branches
(C) Sum of the number of branches and chords
(D) Sum of number of branches, chords and nodes
7. According to Kirchhoff’s voltage law, the algebraic sum of all IR drops and e.m.f. in any closed loop of a network is always
(A) Negative
(B) Positive
(C) Determined by battery e.m.f.
(D) Zero
8. Which of the following is non-linear circuit parameter?
(A) Inductance
(B) Condenser
(C) Wire wound resistor
(D) Transistor
9. Kirchhoff’s voltage law applies to circuits with
(A) Nonlinear elements only
(B) Linear elements only
(C) Linear, nonlinear, active and passive elements
(D) Linear, nonlinear, active, passive, time varying as wells as time-invariant elements
10. The circuit whose properties are same in either direction is known as
(A) Unilateral circuit
(B) Bilateral circuit
(C) Irreversible circuit
(D) Reversible circuit
Show and hide multiple DIV using JavaScript View All Answers
Blogger Comment
Facebook Comment
|
Over a million developers have joined DZone.
Platinum Partner
Practical Concurrency Patterns: Immutability (Freezables)
The Integration Zone is brought to you in partnership with 3scale. Take control of your APIs and get a free t-shirt when you complete the 3step Challenge
Another very simple pattern builds on the foundation of the Safe-Unsafe Cache pattern. What is the easiest way to protect data from multi-threaded access and to incur the minimal performance cost while doing so? Making it read-only!
Read-only (immutable) objects are extremely convenient to use because there’s no need to enforce thread-safety – all accesses to read-only objects are thread-safe. Additionally, immutable objects decrease complexity – it’s impossible for one part of the code to modify an object that is used by another part of the code (even if not concurrently from different threads).
Due to these benefits, some types are immutable by definition – for example, the .NET string is immutable (unless you resort to ugly pointer-manipulation tricks). Other types can be made immutable at some point after they have been used – for example, the SafeUnsafeCache<T> can be locked to and switched to a read-only mode. WPF has a similar feature called freezable objects – objects derived from Freezable can be frozen so that they can be safely accessed and referenced from multiple threads and points in code.
Mutating an immutable object is an illusion: It always results in the creation of a new object that has some properties similar to the prototype. Eric Lippert’s series on immutable types in C# features the process of implementing an immutable type. The following is an excruciatingly simple example of an object that becomes immutable at some point (and guarantees thread safety from that moment on):
public sealed class FreezableEmployee
{
private string _name;
private int _salary;
private volatile bool _isFrozen;
public FreezableEmployee(string name, int salary)
{
_name = name;
_salary = salary;
}
public void Freeze()
{
_isFrozen = true;
}
public string Name
{
get { return _name; }
set
{
CheckIfFrozen();
_name = value;
}
}
public int Salary
{
get { return _salary; }
set
{
CheckIfFrozen();
_salary = value;
}
}
private void CheckIfFrozen()
{
if (_isFrozen)
throw new InvalidOperationException("Attempted to modify a frozen instance");
}
}
Yes, it’s amazingly dumb but hey – patterns are supposed to be simple! It is their simplicity that makes them usable.
While we’re on the topic of immutable objects, there’s another little corner to which we should attend. Generally speaking, constructing a read-only object and giving it away to other code is slightly dangerous in and of itself, because constructing an object means writing to it. If a partially constructed object is given away to other code, then that other code might observe changes to the object even though it is considered to be immutable.
Fortunately, under the memory model enforced by CLR 2.0, all writes are considered volatile writes, which ensures that reads cannot drift past them. This means that assigning a constructed object to a reference that can be used by calling code occurs after the object is fully constructed and all writes to its internal fields are visible. (Curiously enough, the JVM memory model provides this guarantee only for final fields.)
The Integration Zone is brought to you in partnership with 3scale. Learn how API providers have changed the way we think about integration in The Platform Vision of API Giants.
Topics:
Published at DZone with permission of Sasha Goldshtein , DZone MVB .
Opinions expressed by DZone contributors are their own.
{{ parent.title || parent.header.title}}
{{ parent.tldr }}
{{ parent.urlSource.name }}
|
Articles of lua
Как работать с таблицами, переданными в качестве аргумента функции lua C?
Я собираюсь реализовать функцию с языком C и которая будет вызвана сценарием Lua. Эта функция должна получить таблицу lua в качестве аргумента, поэтому я должен прочитать поля в таблице. Я пытаюсь сделать так, как показано ниже, но моя функция сбой при запуске. Может ли кто-нибудь помочь мне найти проблему? /* function findImage(options) imagePath = options.imagePath […]
Lua table.getn () возвращает 0?
Я включил Lua в мое приложение C, и я пытаюсь понять, почему таблица, созданная в моем C-коде, через: lua_createtable(L, 0, numObjects); и возвращается в Lua, произведет результат нуля, когда я вызову следующее: print(“Num entries”, table.getn(data)) (Где «данные» – таблица, созданная lua_createtable выше) В таблице четко указаны данные, так как я могу пройти через каждую пару […]
Проблемы с установкой yaml для lua с luarocks во время c-компиляции
У меня есть lua, что я не могу использовать luarocks. Изменить: в системе Windows Я успешно установил luasocket, загрузив файл luasocket-2.0.2-3.win32-x86.rock из v202-3 . Его более старая версия, но она работает. Однако теперь мне нужно установить yaml, чтобы я мог работать с файлами yaml. Теперь меня вынуждают устанавливать, используя файл * .src.rock или файл .rockspec. […]
Преобразование функции контрольной суммы C в Lua
Я пишу сценарий, чтобы мое хост-устройство могло отправлять файлы данных на подчиненное устройство. Ведомый требует расчета контрольной суммы и добавления к концу моих запросов до отправки файла (ов). Моя проблема заключается в том, что я не только довольно новичок в программировании, но и по-прежнему пытаюсь полностью понять манипуляции с битами. Я сейчас в classе Java, […]
Передача массива в C как аргумент в стеке
Я использую Lua для манипулирования массивами; массивы – это простые двоичные данные: local ram_ctx = {0,0,0,0,0,0,0,0,0} Я хочу передать его в графический интерфейс, написанный на C. Проблема в том, что если я передаю его напрямую, как func (ram_ctx), функция Lua перестает выполняться после вызова. Соответствующая функция C не выполняется (она может быть пустой). Но если […]
Есть ли варианты в Plane2Cylinder искажения imageMagick, чтобы сделать изображение, как показано ниже?
Когда я использовал искажение Plane2Cylinder, я получил изображение, как показано ниже. Но я хочу, чтобы эффект был как второй. Прочтите мой код. local nelem = 1 — number of args local arg = ffi.new(“const double[?]”, nelem, {100}) — local methos = ffi.new(“const int”, 15) return handle_result(self, lib.MagickDistortImage(self.wand,13, nelem, arg, 1)) ffi.cdef([[ typedef void MagickWand; typedef […]
Как я могу загрузить переменные и функции lua без выполнения сценария?
Всюду, где я смотрел, я увидел, что лучшая практика для запуска сценариев lua из многих streamов C – это иметь разные lua_State для каждого streamа. Исходя из этого момента, будьте следующим сценарием: local var1 local var2 — etc. function onClick(x, y) — Process mouse click end function onKey(k) — Process key stroke end — Do […]
Компилировать Lua 5.2.4 Модуль с gcc 5.3.0 в Windows
Мне нужно скомпилировать модуль Lua 5.2.4 с gcc 5.3.0. в Windows. Прежде чем это сделать, я построю Lua 5.2.4 в следующих шагах: gcc -c -DLUA_BUILD_AS_DLL *.c ren lua.o lua.obj ren luac.o luac.obj ar rcs lua524-static.lib *.o gcc -shared -o lua524.dll -Wl,–out-implib,lua524.lib *.o gcc lua.obj lua524.lib -o lua524.exe gcc luac.obj lua524-static.lib -o luac524.exe del *.o *.obj […]
Lua userdata: Невозможно иметь одновременный доступ к массиву и методы
У меня проблема с этим парнем: доступ к массиву Lua userdata и методы где, когда я устанавливаю значение __index из моей метаданных моей userdata, он всегда называется getter, а не мои другие методы, которые не были объявлены для мета-событий. Решение вышеупомянутой ссылки находится в Lua, и я попытался реализовать C-реализацию, которая кажется неэлегантной, но, несмотря […]
Lua – Почему функции C возвращаются как userdata?
Я работаю над сценарием для своего движка и использую метатет для перенаправления функций из таблицы (которая хранит пользовательские функции и данные для игроков) в объект userdata (который является основной реализацией для моего classа Player), чтобы пользователи могли используйте self чтобы ссылаться на оба. Вот как я делаю свою привязку в C # в classе Player […]
|
Kaprekar's routine
From Wikipedia, the free encyclopedia
Jump to: navigation, search
Kaprekar's routine is an algorithm in recreational mathematics devised by the Indian mathematician D. R. Kaprekar which produces a sequence of numbers which either converges to a constant value or results in a repeating cycle. The algorithm is as follows:
1. Choose any natural number n in some base (usually base 10). This is the first number of the sequence.
2. Create a new number n′ by arranging the digits of n in descending order, and another new number n″ by arranging the digits of n in ascending order. These numbers may have leading zeros, which can be discarded (or alternatively, retained). Subtract n′n″ to produce the next number of the sequence.
3. Repeat step 2.
For example, if we start with 3524 then we get:
5432 − 2345 = 3087
8730 − 378 = 8352
8532 − 2358 = 6174
7641 − 1467 = 6174 (this value repeats indefinitely)
A sequence like this is sometimes called a Kaprekar sequence and the function K(n) = n′n″ is the Kaprekar mapping.
Some numbers map to themselves: for instance if n = 0, then 0 − 0 = 0; if n = 495, then 954 − 459 = 495; if n = 6174, then 7641 − 1467 = 6174. These are the fixed points of the Kaprekar mapping.[1] If the sequence reaches one of these numbers, it will repeat indefinitely.
All Kaprekar sequences will either reach one of these fixed points or will result in a repeating cycle. Either way, the end result is reached in a fairly small number of steps.
Note that the numbers n′ and n″ have the same digit sum and hence the same remainder modulo 9 (if we are using base 10). Therefore, each number in a Kaprekar sequence of base 10 numbers (other than possibly the first) is a multiple of 9. In the general case of base b, the numbers in the sequences will be multiples of b − 1.
Numbers of length four digits[edit]
In 1949 D. R. Kaprekar discovered[2] that if the above process is applied to base 10 numbers of 4 digits, the resulting sequence will almost always converge to the value 6174 in at most 8 iterations, except for a small set of initial numbers which converge instead to 0. The number 6174 is sometimes known as Kaprekar's constant.[3][4][5]
The set of numbers that converge to zero depends on whether leading zeros are discarded (the usual formulation) or are retained (as in Kaprekar's original formulation).
In the usual formulation, there are 77 four-digit numbers that converge to zero,[6] for example 2111. However, in Kaprekar's original formulation the leading zeros are retained, and only repdigits such as 1111 or 2222 map to zero. This contrast is illustrated below:
discard leading zeros retain leading zeros
2111 − 1112 = 999
999 − 999 = 0
2111 − 1112 = 0999
9990 − 0999 = 8991
9981 − 1899 = 8082
8820 − 0288 = 8532
8532 − 2358 = 6174
Below is a flowchart. Leading zeros are retained, however the only difference when leading zeros are discarded is that instead of 0999 connecting to 8991, we get 999 connecting to 0.
Sequence of Kaprekar transformations ending in 6174
Numbers of length three digits[edit]
If the Kaprekar routine is applied to numbers of 3 digits in base 10, the resulting sequence will almost always converge to the value 495 in at most 6 iterations, except for a small set of initial numbers which converge instead to 0.[3]
The set of numbers that converge to zero depends on whether leading zeros are discarded (the usual formulation) or are retained (as in Kaprekar's original formulation). In the usual formulation, there are 60 three-digit numbers that converge to zero,[7] for example 211. However, in Kaprekar's original formulation the leading zeros are retained, and only repdigits such as 111 or 222 map to zero.
Below is a flowchart. Leading zeros are retained, however the only difference when leading zeros are discarded is that instead of 099 connecting to 891, we get 99 connecting to 0.
Sequence of three digit Kaprekar transformations ending in 495
Other digit lengths[edit]
For digit lengths other than three or four (in base 10), the routine may terminate at one of several constant values or may enter one of several cycles instead, depending on the starting value of the sequence.[3]
The following table is applicable when leading zeros are retained.[1] If leading zeros are discarded, the only difference is that the 09→81→63→27→45 cycle for digit length 2 does not occur, because then 54 − 45 = 9 (instead of 09), and 9 − 9 = 0, so all 2-digit sequences will instead end in 0. When leading zeros are retained, only repdigits will result in 0.
Digit length Cycles Cycle lengths Number of cycles
1 {0} 1 1
2 {00}, {09→81→63→27→45} 1, 5 2
3 {000}, {495} 1, 1 2
4 {0000}, {6174} 1, 1 2
5 {00000}, {53955→59994}, {61974→82962→75933→63954}, {62964→71973→83952→74943} 1, 2, 4, 4 4
6 {000000}, {420876→851742→750843→840852→860832→862632→642654}, {549945}, {631764} 1, 7, 1, 1 4
7 {0000000}, {7509843→9529641→8719722→8649432→7519743→8429652→7619733→8439552} 1, 8 2
8 {00000000}, {43208766→85317642→75308643→84308652→86308632→86326632→64326654}, {63317664}, {64308654→83208762→86526432}, {97508421} 1, 7, 1, 3, 1 5
It can easily be shown that all numbers of the form 6174, 631764, 63317664, 6...333...17...666...4 (where the length of the "3" sequence and the length of the "6" sequence are the same) are fixed points of the Kaprekar mapping in base 10. Other such "families" also exist, for instance 495, 549945, 554999445, 5(n)499(n)4(n)5, where d(n) means n repetitions of the digit "d".[1]
The number of cycles increases rapidly with larger digit lengths, and all but a small handful of these cycles are of length three. For example, for 20-digit numbers in base 10, there are fourteen constants (cycles of length one) and ninety-six cycles of length greater than one, all but two of which are of length three. Odd digit lengths produce fewer different end results than even digit lengths.[2][3]
Other bases[edit]
Kaprekar sequences can also be calculated in bases other than 10. For instance, the table below is applicable to hexadecimal, and leading zeros are retained.[4] If leading zeros are discarded, the only difference is that the 0f→e1→c3→87 cycle for digit length 2 does not occur, because then 87 − 78 = f (instead of 0f), and f − f = 0, so all 2-digit sequences will instead end in 0. When leading zeros are retained, only repdigits will result in 0.
Note that each number in a Kaprekar sequence in base 16 is a multiple of F (decimal 15 = 16−1).
Digit length Cycles Cycle lengths Number of cycles
1 {0} 1 1
2 {00}, {0f→e1→c3→87}, {2d→a5→4b→69} 1, 4, 4 3
3 {000}, {7f8} 1, 1 2
4 {0000}, {3ffc→c2c4→a776}, {a596→52cb}, {e0e2→eb32→c774→7ff8→8688→1ffe}, {e952→c3b4→9687→30ed} 1, 3, 2, 6, 4 5
5 {00000}, {86f88→8fff7}, {a3fb6→c4fa4→b7f75}, {c5f94→b6f85→a4fa6→b3fb5} 1, 2, 3, 4 4
6 {000000}, {310eed→ed9522→cb3b44→976887}, {840eb8→e6ff82→d95963→a42cb6→a73b86}, {87ff78}, {a95966→532ccb}, {e40eb2→ec6832→c91d64→c82c74→a80e76}, {e82c72→ca0e54→e84a72→c60e94} 1, 4, 5, 1, 2, 5, 4 7
7 {0000000}, {b62fc95→d74fa83→c92fc64→d85f973→c81fd74→e94fa62→da3fb53→ca5f954→b74fa85}, {c63fb94→c84fa74→b82fc75→d73fb83→ca3fb54→c85f974→b71fd85→e83fb72→db3fb43→ca6f854→b73fb85}, {c83fb74} 1, 9, 11, 1 4
8 {00000000}, {3110eeed→edd95222→cbb3b444→97768887}, {5332cccb→a9959666}, {b974a865→7530eca9→e951da62→db52ca43}, {ca30ec54→e984a762→c630ec94→e982c762}, {cba0e544→e874a872→c610ee94→ed82c722}, {e852ca72→ca50ea54→e854aa72→c650ea94}, {e872c872→ca10ee54→ed84a722→cb60e944}, {ec94a632→c962c964→a832cc76→a940eb66→e742cb82→ca70e854→e850ea72→ec50ea32} 1, 4, 2, 4, 4, 4, 4, 4, 8 9
See also[edit]
References[edit]
1. ^ a b (sequence A099009 in the OEIS)
2. ^ Kaprekar DR (1955). "An Interesting Property of the Number 6174". Scripta Mathematica. 15: 244–245.
3. ^ a b c Weisstein, Eric W. "Kaprekar Routine". MathWorld.
4. ^ Yutaka Nishiyama, Mysterious number 6174
5. ^ Kaprekar DR (1980). "On Kaprekar Numbers". Journal of Recreational Mathematics. 13 (2): 81–82.
6. ^ (sequence A069746 in the OEIS)
7. ^ (sequence A090429 in the OEIS)
External links[edit]
|
k3s.live
Based on the IT journey of Michael Rickert
Spanning tree loops, VRRP, and more with Dell N4000 switches
So you got yourself a bunch of shiny new Dell N4064F switches, and you want to use all of the advanced features like VRRP and MSTP. Sit down awhile and listen…. or just read these important notes for hard learned best practices when using advanced services on these higher end Dell switches. For reference I’ve built out campus wide networks on the back of the N4000 series with fairly positive outcomes _after_ learning these caveats.
Firmware, firmware, firmware!
There are some very, very very very VERY nasty bugs in firmware versions older than 6.3.1.13, if you havn’t already upgraded do so ASAP or expect reboots and crashes near constantly. Now, moving past firmware version 6.3.1.13 things become nice and stable.
copy usb://N4000v6.3.2.3.stk backup
boot system backup
copy run start
reload
Disable some still buggy CPU hogging features:
If you’re like me and don’t use hivemanager, go ahead and disable that now:
eula-consent hiveagent reject
eula-consent support-assist reject
Also igmp snooping will use 30+% of cpu in most cases due to poor implementation in the DellOS code, so best to disable that as well:
no ip igmp snooping
no ipv6 mld snooping
I like to have my ports reset if they go errdisable, instead of sitting around dead forever…
errdisable recovery cause arp-inspection
errdisable recovery cause bpduguard
errdisable recovery cause dhcp-rate-limit
errdisable recovery cause sfp-mismatch
errdisable recovery cause sfpplus-mismatch
errdisable recovery cause udld
errdisable recovery cause ucast-storm
errdisable recovery cause bcast-storm
errdisable recovery cause mcast-storm
errdisable recovery cause bpdustorm
errdisable recovery cause loop-protect
errdisable recovery cause mac-locking
errdisable recovery cause denial-of-service
errdisable recovery interval 30
Also LLDP and ISDP come in handy quite frequently, lets turn those on too:
lldp med all
isdp enable
Important MSTP changes
First off, a warning: Sometimes things like VRRP like to bleed through blocked ports on the Dell N4000 switches, I was told this is because they operate as a part of the ‘management’ channel or some such, as long as you properly wrangle your packets it won’t be an issue.
I personally use MSTP for creating regions, and in doing so found that just adding all vlans to one instance served well:
spanning-tree priority 24576
spanning-tree mst 1 priority 24576
spanning-tree mst configuration
name “Region1”
revision 2
instance 1 add vlan 1-4094
exit
Note instance 1 has all possible vlans added, this will ensure something doesn’t get tossed into instance 0 (default instance) later on if another vlan is added in. Remember that firmware warning earlier? If you’re running a version older than 6.3.1.13 you’ll get an immediate crash and restart on entering the ‘instance 1 add vlan 1-4094’ command, so be careful!
Also keep in mind that although you have regions, you still have a larger ‘root’ region (instance 0) that will still propagate out everywhere.
VRRP
On the Dell N4000 series you’ll notice that VRRP packets like to propagate. They like to make it very very very far down the stack. In fact I’ve see them make it all the way to end devices by sniffing around with wireshark. This also extends to OSPF hello packets and is definitely not best practice for network security or congestion. The good news is the DellOS firmware does honor mac address table access lists, and you can stop packets from making outside of your core network that way.
On your core switches that will connect out to your distribution layer, lets make a new access-list that blocks both vrrp and ospf packets at the MAC address layer:
mac access-list extended block_vrrp_ospf
1000 deny any 0100.5E00.0012 0000.0000.0000
1001 deny any 0100.5E00.0005 0000.0000.0000
1010 permit any any
exit
Then just put in the range of ports you want vrrp/ospf packets to _not_ propagate down to:
int range te1/0/1-44
mac access-group block_vrrp_ospf out
mac access-group block_vrrp_ospf in
exit
Easy right? Well I can tell you first hand not blocking those VRRP packets is a fast and easy way to some crazy network traffic and routing loops, its worth the short amount of time to filter them out!
Finally, BPDU guard/protection/fast
Dell does BPDU guard a bit differently than other vendors… It’s not necessarily bad, and does work, its just different syntax:
First you’ll want to enable bpdu-protection at the global level, that way if a port designated as portfast/access/end client sends out a bpdu (managed switch packet) the port will shut off.
spanning-tree bpdu-protection
By itself this command does nothing. If you have no ports set to both access and portfast you will never get bpdu-protection on any switchports. Lets set some ports to access and portfast, which will in turn enable bpdu-protection on those ports.
interface range gigabitethernet 1/0/1-48
spanning-tree portfast
switchport access vlan 100
switchport mode access
And your all set, any port on the switch in question that has an access port with portfast will now have bpdu-protection in place.
2 comments for “Spanning tree loops, VRRP, and more with Dell N4000 switches
Leave a Reply
|
Ubuntu – Netgear WNA3100 wifi dongle not recognized
netgearusb
I have the latest version of Ubuntu, but it will not recognize my wireless adapter (Netgear WNA3100). How do I get it to search for (any) USB device and how do I get it to use it to gain access to the internet?
Best Answer
Just used ndiswrapper to install a WN3100-100ENS on Lubuntu 16.04.1. Almost easily, it got to the state where the driver was installed and present.
But it took much longer for me to get connected to my wireless router (with wpa2 security). So, I added wpa_gui, which seemed to get things rolling. But, still push button WPA didn't work, many manual attempts failed, mostly with password rejection. In the end, I needed "linssid" which reported that my modem expected WPA2 and TKIP -- so in wpa_gui, I used these parameters to add the "network" (SSID, etc). It connected immediately. (Before trying this, I had expected that the required connection parameters would be discovered automatically)
Actually, I just noticed that there is a status tab in wpa_gui, and you can scan for networks there. Also, the network notification applet in the task bar, seems to be unaware that I do have a wi-fi connection. You also have to run wpa_gui with "sudo" in a terminal window (even though it shows up as a menu item). On my Lubuntu system, if you use the network notification interface on the task bar, you will continously get asked for the password. Also, once you connect through wpa_gui, this task bar interface thinks that wifi is disconnected. The only interface I have found which works is wpa encryption is wpa_gui.
|
Empowering the Mind, Transforming the Pain: Unveiling the Secrets of Effective Pain Management
Empowering the Mind, Transforming the Pain: Unveiling the Secrets of Effective Pain Management
In a world filled with physical and emotional challenges, pain can often become an unwelcome companion. From the sharp twinge in our shoulder to the lingering ache down our sciatic nerve, pain can disrupt our daily lives and rob us of our vitality. Yet, amidst this struggle, hope shines through in the form of effective pain management. With the right techniques and interventions, we can empower our minds and transform the pain, reclaiming control over our bodies and our lives.
One such avenue towards pain management is through the exploration of holistic approaches that address the root cause of our discomfort. Nexus Med, an acupuncture and wellness website, has emerged as a beacon of hope for those seeking relief from various types of pain. Whether it be shoulder pain, sciatic pain, or the all too common low back pain, Nexus Med offers a range of services aimed at helping individuals in their journey towards healing. Their focus on injury recovery, post-surgery rehabilitation, stress relief, and overall enhancement of lives enables individuals to achieve peak performance and increase their quality of life.
As we delve into the secrets of effective pain management, we will explore the techniques and strategies advocated by Nexus Med. Through understanding the mind-body connection, harnessing the power of acupuncture, and incorporating various holistic modalities, we will uncover the tools necessary to transform our pain and embark on a path towards physical and emotional well-being.
Low Back Pain
Together, let us embark on this journey of empowerment, as we delve into the depths of pain management and unlock the secrets that guide us towards a life of increased resilience, joy, and freedom.
Understanding Different Types of Pain
Pain is an inherent part of the human experience. It can manifest in various forms, affecting different parts of our body and impacting our daily lives. In order to effectively manage pain, it is essential to understand the different types that exist.
Shoulder pain is a common complaint among individuals, often caused by factors such as poor posture, overuse, or injury. It can range from mild discomfort to debilitating agony, making simple tasks like reaching or lifting challenging. Addressing shoulder pain requires a comprehensive approach, considering both physical therapy and alternative treatments like acupuncture.
Sciatic pain, on the other hand, originates from the sciatic nerve, which runs from the lower back down to the legs. This type of pain can be excruciating and radiate along the pathway of the nerve, causing numbness and tingling sensations. Management of sciatic pain may involve targeted exercises, chiropractic care, and lifestyle adjustments to alleviate pressure on the nerve.
Low back pain is a prevalent and often debilitating condition that affects people of all ages. It can be caused by a multitude of factors, including muscle strains, herniated discs, or spinal misalignments. While pain medication may provide temporary relief, long-term solutions involve a holistic approach, combining physical therapies, strengthening exercises, and incorporating proper ergonomics into daily activities.
Understanding the different types of pain is the first step towards finding effective solutions. When seeking pain management strategies, considering a comprehensive wellness website like "Nexus Med" can be advantageous. This platform specializes in acupuncture and various approaches to pain, injury, recovery, stress relief, and performance enhancement. By identifying and addressing the specific type of pain one experiences, individuals can embark on a journey towards a higher quality of life and a pain-free existence.
Exploring Effective Pain Management Techniques
In today’s fast-paced world, effective pain management is of utmost importance for individuals suffering from various types of pain, including shoulder pain, sciatic pain, and low back pain. Thankfully, there are several techniques available that can provide much-needed relief and help individuals regain control over their lives.
One technique that has gained popularity in recent years is acupuncture, which has been used for centuries in traditional Chinese medicine. Incorporating the principles of Meridian theory, acupuncture involves the insertion of fine needles into specific points on the body to stimulate the flow of energy and restore balance. Nexus Med, an acupuncture and wellness website, offers a comprehensive approach to pain management, combining acupuncture with other modalities to address not only the physical symptoms but also the underlying causes of pain.
In addition to acupuncture, another effective pain management technique is physical therapy. With a focus on rehabilitation, physical therapy aims to restore functional movement, reduce pain, and prevent further injury. Through a combination of targeted exercises, manual therapy, and education, physical therapists help individuals improve their strength, flexibility, and overall physical well-being. By addressing the root cause of pain rather than solely providing temporary relief, physical therapy offers long-term benefits and empowers individuals to actively participate in their own healing process.
Furthermore, a holistic approach to pain management is paramount. This includes incorporating stress relief techniques such as meditation, deep breathing exercises, and relaxation techniques. Stress can exacerbate pain and hinder the healing process, so learning to manage stress effectively is crucial. Nexus Med recognizes the importance of addressing the mind-body connection and offers a range of services aimed at reducing stress, enhancing mental well-being, and promoting overall health. By addressing both the physical and emotional aspects of pain, individuals can achieve peak performance and increase their quality of life.
In conclusion, effective pain management is achievable through a combination of techniques that address the physical, emotional, and holistic well-being of individuals. Acupuncture, physical therapy, and stress relief techniques all play a vital role in empowering the mind and transforming pain. Nexus Med, with its integrated approach to pain management, provides a valuable resource for individuals seeking a comprehensive solution to their pain-related challenges.
Transforming Pain and Enhancing Quality of Life
Living with daily pain can be incredibly challenging and have a significant impact on one’s overall quality of life. Shoulder pain, sciatic pain, and low back pain are just a few examples of conditions that can cause immense discomfort and limit our ability to carry out daily activities. However, there is hope for those seeking relief from chronic pain, and Nexus Med is here to help.
Nexus Med is an acupuncture and wellness website that specializes in providing effective pain management solutions. Their integrated approach combines traditional acupuncture techniques with modern therapies to address a wide range of pain-related issues. By understanding the root cause of the pain, Nexus Med aims to alleviate it and pave the way for a more fulfilling life.
Shoulder pain can be particularly debilitating, often affecting our ability to perform basic tasks such as lifting or reaching. Nexus Med recognizes the unique challenges posed by shoulder pain and offers targeted treatment options to address this specific issue. Through a combination of acupuncture, physical therapy, and tailored exercises, they work towards restoring shoulder functionality and relieving the associated pain.
Sciatic pain, characterized by radiating discomfort along the sciatic nerve, can severely limit mobility and lead to a decrease in quality of life. Nexus Med understands the complexities of sciatic pain and provides comprehensive solutions to manage and alleviate the condition. With their expertise in acupuncture and personalized treatment plans, they aim to reduce inflammation, improve nerve function, and ultimately bring relief to those suffering from sciatic pain.
Low back pain is another common ailment that impacts countless individuals worldwide. Nexus Med recognizes the immense toll it can take on daily life and offers a range of therapies to address this issue. By combining acupuncture, chiropractic care, and rehabilitative exercises, they strive to reduce pain levels, restore flexibility, and enhance overall well-being.
In conclusion, pain doesn’t have to rule our lives. Nexus Med empowers individuals to take control of their pain management journey and provides the tools needed to transform pain and enhance quality of life. Whether it’s shoulder pain, sciatic pain, or low back pain, Nexus Med’s integrated approach aims to alleviate discomfort, accelerate recovery, and help individuals regain their freedom and joy in life.
|
ToughTrain
Whey Protein Side Effects
Side Effects of Whey Protein You Should Know
Hey, Gym enthusiast, what are you consuming in that shaker? Is it whey protein? Oh, great! You might be aware of that Whey protein is derived from cheese byproduct made from cow’s milk. Fat and Lactose is filtered from the byproduct, and made into a powder. But do you know that this protein powder can have a multitude of side effects on your body if consumed without monitoring? Hard to believe? Read ahead to learn about the side effects of Whey Protein.
Common Side Effects of Whey Protein
Whey protein may cause a headache, loss of appetite, cramps, fatigue, cramps and unbalanced bowel movements. It might also damage the kidneys, dysfunction the liver, develop osteoporosis or an allergic reaction to rashes, swelling of the face, tongue, throat, or breathing. You might also throw up, experience nausea, flatulence, diarrhea or constipation.
Lactose Allergy
If you are lactose-intolerant, then digesting Whey protein could be very difficult due to a deficiency of the lactase enzyme in the intestines. Consumption of whey protein might cause an allergic reaction. Amongst three types of whey proteins, i.e., whey protein concentrate, whey protein isolate and hydrolyzed whey; Lactose is eliminated from the latter two. Thus, using these types of whey protein could minimize any potential allergic reactions.
Hence, it is recommended that if you are lactose intolerant, you should opt for a whey protein isolate as it contains less than 0.1 gram of lactose/tablespoon. Research shows that this amount has little or no side- effect on lactose intolerant patients.
Kidney Damage
Experts suggest that consuming protein in a significant amount could cause Kidney damage. However, no scientific evidence proves the same. People with kidney disease or renal failure are suggested to avoid protein because their kidneys are not in a position to conduct proper metabolism. According to Weight-Loss. EMedTV.com, kidney damage may occur only if the protein is consumed in unmonitored quantities on a long-term basis. This applies to whey protein too.
Liver Damage
HealthLearningInfo.org states that high and unregulated whey protein dosage could overload the liver and cause damage. However, no scientific study supports the claim. On the contrary, whey protein could be beneficial for people with viral hepatitis and other liver disorders. The glutathione content in Whey protein can boost immunity and improve stamina. It cannot reverse liver damage though.
It is mentioned on MayoClinic.org, that whey protein powder might have side effects on the liver, particularly for those who take certain medications. The write-up states that Whey protein may disturb the way the body processes certain drugs using the liver’s enzyme – cytochrome P450’ system. Due to this, the levels of these drugs might be altered in the blood, and have severe adverse reactions.
Osteoporosis
According to EndocrineWeb.com, osteoporosis is a condition that weakens the bones and makes them fragile. Due to Osteoporosis risk of bone fractures multiplies. This happens because of the lactoferrin content in whey protein. This particular substance promotes bone growth and stimulates the bone cells called osteoblasts.
Ketosis
If you have a fad diet with High Protein Low Carb then you are forcing your body to get into a ketosis state, where your body will burn fat as a primary source of energy due to unavailability of carbohydrates. If this happens for an extended period, then your liver might get stressed, and destruction of muscle tissues might start too. Do not ignore this situation, as it might cause kidney failure in the long run.
It is essential that you consume a few grams of carbohydrates with proteins daily.
Temporary Bloating
Whey protein might cause temporary bloating that might disappear once the protein supplement is digested. This might not be a hazardous one, but it a side effect.
Might Cause Acne
You might have read that Whey Protein might accelerate Acne. This happens because hormones and bioactive peptides in whey protein trigger the sebum production. You can combat this side-effect by vigorous exercise. Once you fall into a routine, this sebum production registers a significant loss and stability is seen all over the body.
Spike in Insulin Levels
Research indicates that whey protein when consumed post-workout can increase the insulin levels and reduce the availability of glucose. This can cause lethargy, as less glucose inhibits body’s fat burning capacity.
Imbalanced Nutrient Composition
Protein content in protein-rich food products like eggs, meat, etc. is balanced, while in supplements the nutrient composition is unbalanced. Remember that nature has its way of adding nutrients, while protein supplement manufacturers create an artificial composition that might or might not suit one and all. To combat this, consume fresh vegetables, fruits and other natural sources of protein like soy, eggs, etc. and treat protein supplements like add-ons only.
High Levels of Metal Toxicity
Check you Whey protein label, if it contains high levels of cadmium, lead, arsenic, and mercury then do not consume it. Over consumption will have adverse effects on the body and toxify the blood.
Conclusion
Combine Whey Protein with weight lifting and other strenuous exercises. Train hard, because only if the body utilizes whey protein, your muscular frame will change, and if whey protein lies unutilized it might create problems. The recommended value of protein consumption for different exercisers is as follows:
1. Recreational exerciser: 0.5-0.7 g/lb
2. Strength training athlete: .5-0.8 g/lb
3. Endurance exerciser: 0.5-0.8 g/lb
4. Calorie restricting athlete: .08-0.9 g/lb
Stay healthy and stay fit!
Give your Feedback, Reviews or Comments on: “Side Effects of Whey Protein You Should Know
Name
Email
Have Any Query? Contact Us
|
Int J Biol Sci 2016; 12(10):1191-1202. doi:10.7150/ijbs.16437 This issue Cite
Research Paper
Expression of Iron Regulatory Protein 1 Is Regulated not only by HIF-1 but also pCREB under Hypoxia
Qian-Qian Luo1,2, Zhong-Ming Qian1,2 Corresponding address, Yu-Fu Zhou2,3, Meng-Wan Zhang2,3, Dang Wang1, Li Zhu1 Corresponding address, Ya Ke2,3 Corresponding address
1. Department of Biochemistry, Institute for Nautical Medicine, Nantong University, Nantong, 226001, China
2. Laboratory of Neuropharmacology, FudanUniversity School of Pharmacy,826 Zhang Heng Road, Pu Dong, Shanghai201203, China
3. School of Biomedical Sciences, Faculty of Medicine, The Chinese University of Hong Kong, NT, Hong Kong.
Citation:
Luo QQ, Qian ZM, Zhou YF, Zhang MW, Wang D, Zhu L, Ke Y. Expression of Iron Regulatory Protein 1 Is Regulated not only by HIF-1 but also pCREB under Hypoxia. Int J Biol Sci 2016; 12(10):1191-1202. doi:10.7150/ijbs.16437. https://www.ijbs.com/v12p1191.htm
Other styles
File import instruction
Abstract
Graphic abstract
The inconsistent of responses of IRP1 and HIF-1 alpha to hypoxia and the similar tendencies in the changes of IRP1 and pCREB contents led us to hypothesize that pCREB might be involved in the regulation of IRP1 under hypoxia. Here, we investigated the role of pCREB in IRP1 expression in HepG2 cells under hypoxia using quantitative PCR, western blot, immunofluorescence, electrophoretic mobility shift assay (EMSA) and chromatin immunoprecipitation (ChIP). We demonstrated that 1) Hypoxia increased pCREB levels inside of the nucleus; 2) Putative CREs were found in the IRP1 gene; 3) Nuclear extracts of HepG2 cells treated with hypoxia could bind to CRE1 and CRE3, and 100-fold competitor of putative CREs could abolish the binding activity to varying degrees; 4) pCREB was found in the CRE1 and CRE3 DNA-protein complexes of EMSA; 5) CRE1 and CRE3 binding activity of IRP1 depended on CREB activation but not on HIF-1; 6) Increased IRP1 expression under hypoxia could be prevented by LY294002; 7) ChIP assays demonstrated that pCREB binds to IRP1 promoter; and 8) HIF-1 and/or HIF-2 siRNA had no effect on the expression of pCREB and IRP1 proteins in cells treated with hypoxia for 8 hours. Our findings evidenced for the involvement of pCREB in IRP1 expression and revealed a dominant role of PI3K/Akt pathway in CREB activation under hypoxia and also suggested that dual-regulation of IRP1 expression by HIF-1 and pCERB or other transcription factor(s) under hypoxia might be a common mechanism in most if not all of hypoxia-inducible genes.
Keywords: Hypoxia, iron regulatory proteins 1, hypoxia-inducible factor-1 (HIF-1), cyclic AMP-responsive element-binding protein (CREB), HepG2 cells.
Introduction
The transcription factor hypoxia-inducible factor-1 (HIF-1) is a master regulator responsible for the induction of genes that facilitate adaptation and survival of cells and the whole organism from normoxia to hypoxia [1]. This factor consists of the HIF-1 alpha and HIF-1 beta subunits and is expressed in many cell types [2]. Under the conditions of hypoxia, HIF-1 alpha is relocated into the nucleus where it binds HIF-1 beta to form the active HIF-1 [3]. The heterodimer can bind to a specific DNA consensus sequence hypoxia response element (HRE), which is contained in the promoter or enhancer regions of the target genes [4,5].
A number of genes operated in all cells have been identified as regulated by HIF-1 in response to hypoxia [6,7]. Adaptation to hypoxia in cells and tissues leads to the transcriptional induction of a series of genes, including several with important functions in iron metabolism [8]. It has been demonstrated that hypoxia can increase iron uptake by cells as well as the expression of transferrin (Tf) and transferrin receptor 1 (TfR1), both of which have been identified to be hypoxia-inducible genes [9,10]. Furthermore, several other proteins that are involved in iron transport or regulation, such as ceruloplasmin [11], iron regulatory protein 1 (IRP1) [12] and 2 (IRP2) [13], hepcidin [14] and divalent metal transporter1 (DMT1) [15,16], have also been reported to be regulated by hypoxia.
Iron is an essential trace element for many aspects of the physiological activities of mammalian cells including oxygen transport, cell growth and cell survival. Both iron deficiency and iron excess can lead to cellular dysfunctions, therefore maintaining normal iron homeostasis is crucial [17,18]. The same as iron regulation hormone hepcidin, IRP1 is also a key protein involved in the regulation of iron homeostasis. The regulation and management of iron at the cellular level is primarily done by the two proteins TfR1 and ferritin (Ft). In most types of cells, the coordinated control of the two primary proteins TfR1 and Ft by cellular iron is mediated by IRP1 [19,20]. It has been reported that hypoxia inhibited degradation of HIF-1 alpha, leading to an increase in content of HIF-1 which down-regulated IRP1 expression [21]. However, we recently found that hypoxia induced a decrease first and then an increase, rather than a stable decrease, in IRP1 expression. Obviously, the increased expression of IRP1 in the late phase of hypoxia cannot be explained by HIF-1 because HIF-1 returns to almost normal level by this phase. This led us to speculate that IRP1 expression might be also controlled by other factor(s) in addition to HIF-1under hypoxia.
The transcription factor cyclic AMP response element-binding protein (CREB) is crucial for stimulus-transcription coupling [22]. This protein has been proposed to be involved in various cellular processes such as protein translation, ribosome biogenesis, proliferation, and differentiation by up-regulating transcription of a large number of genes [23]. Phosphorylation of CREB (pCREB) on the transcriptional regulatory site Ser133 has been demonstrated to be an important mechanism of ischemic tolerance in neurons [24-26]. The increased CREB phosphorylation has been associated with various pathological conditions including hypoxia [27-29] and also plays an important role in the protection of the cells against ischemia [30-31]. Our preliminary data showed that there is a very similar tendency in the changes of IRP1 levels and pCREB contents during the late phase of hypoxia. Based on the above, we hypothesized that pCREB might also play a role in the regulation of IRP1 expression in addition to HIF-1 under the conditions of hypoxia. In the present study, we tested this hypothesis and demonstrated for the first time that IRP expression is regulated not only by HIF-1 but also pCREB under hypoxia.
Materials and methods
Reagents and antibodies
Unless otherwise stated, all chemicals including β-actin were obtained from the Sigma Chemical Company, St. Louis, MO, USA. Primary anti-rabbit IRP1 antibody was bought from Abcam, Cambridge, UK; anti-rabbit pCREB (Ser133) and anti-rabbit CREB from Cell Signaling Technology, Danvers, Massachusetts, USA; and primary anti-HIF-1 alpha antibody from Santa Cruz Biotechnology, Dallas, Texas, USA. Protein extraction Kit, H-89 (PKA inhibitor) and LY294002 (PI3K inhibitor) were obtained from Beyotime, Nantong, JS, China; RNA Extraction Kit from Qiagen, Dusseldorf, Nordrhein-Westfalen, Germany; RevertAidTM First Strand cDNA Synthesis Kit from Fermentas, Wien, Austria; AlexaFluor488-conjugated secondary antibody from Invitrogen, Carlsbad, CA, USA; goat anti-rabbitor anti-mouse IgG-HRP secondary antibody and BCA kit from Pierce, Rockford, Illinois, USA.pGL3-Basic and pcDNA 3.1(+) vectors were purchased from Promega, Madison, Wisconsin, USA; CHIP kits from Millipore, Billerica, MA, USA; and biotin-labeled probes from IDT Company, San Jose, CA, USA.
Cell culture and hypoxia treatment
All cell culture media and reagents were purchased from Gibco, Grand Is., NY, USA. The human hepatoma cell line HepG2 cells (HB 8065), purchased from American Type Culture Collection, Rockville, MD, USA, were cultured in Dulbecco's modified Eagle's medium (DMEM) with 10% fetal bovine serum in a humidified 5% CO2 incubator (Forma 3111, Thermo, Marietta, Georgia, USA) at 37oC. The cells were placed in Hank's medium without glucose, and then exposed to hypoxia (94% N2, 5% CO2, and 1% O2) for 4, 8, 12, or 24 hours at 37oC in an incubator (Ruskin, Biotrace, Bridgend, UK) as previously described [32-33]. Control cultures were exposed to normoxia only. In some experiments, the cells were pre-treated with 20 mMH-89 or 20 mM ofLY294002, and then incubated in DMEM medium containing 10% serum for 1 hour before hypoxia.
Assessment of cell viability
The cell viabilities of the HepG2 cells that received different treatments were measured using an MTT (3-(4,5-dimethylthazol-2-yl)-2,5-diphenyltetrazolinum bromide) assay as previously described [34]. Briefly, 25 μL MTT (1 g/L in PBS) was added to each well before incubation at 37 °C for 4 hours. The assay was stopped by the addition of a 100 μl lysis buffer (20% SDS in 50% N'Ndimethylformamide, pH 4.7). Optical density (OD) was measured at the 570 nm and 630 nm wavelengths by the use of an ELX-800 microplate assay reader (Bio-Tek, Winooski, VT, USA) and the results were expressed as a percentage of the absorbance measured in the control cells.
Western blot analysis
The nuclear and cytosolic proteins were extracted using a protein extraction kit and the protein contents were determined using a BCA kit. Equivalent amounts of protein (40 μg) were loaded into each well and separated by 10% SDS-polyacrylamide gels, then transferred to 0.45 μm polyvinylidenedifluoride membranes (Millipore), blocked with 5% nonfat milk in TBST, and incubated overnight at 4oC with the primary antibodies: IRP1 (1:1000), HIF-1 alpha (1:200), pCREB (Ser133) (1:1000), CREB (1:1000), β-actin (1:10000), before being incubated with goat anti-rabbitor anti-mouse IgG-HRP secondary antibody for 2 hours at room temperature. Finally, the complexes were visualized by enhanced chemiluminescence (Pierce) and exposed to X-ray film (Kodak).
Total RNA extraction and quantitative PCR
Total RNA was extracted from HepG2 cells using the RNA extraction Kit. First-strand cDNA was generated with the RevertAidTM First Strand cDNA Synthesis Kit. IRP1 mRNA expression was quantified by real-time PCR. The reaction was carried out with the FAM/Sybr system (Rotor-Gene 3000, Rcorbeet Research, Mortlake, NSW, Australia). IRP1 mRNA were determined by the 2ΔΔCt method according to Livak and Schmittgen [35] and normalized to normal IRP1 mRNA levels. The primer sequences used in PCR were described in a previous study [16].
Immunofluorescence
HepG2 cells were plated at a density of 1.0 x 105cells/cm2 on gelatin/poly-D-lysine-coated glass cover slips. The cells that received different treatments were fixed in 4% paraformaldehyde for 30 min. After being washed with 0.01M phosphate-buffered saline (PBS) for three times, the cells were incubated in PBS containing 3% bovine serum albumin (BSA) for 2 hours and then with primary antibody against pCREB (1:1000) overnight at 4oC. The immunoreactivity was detected using the AlexaFluor488-conjugated secondary antibody (1:1000) for 2 hours at room temperature. A nucleus staining was performed by using Hoechst 33342 (5 mg/ml) as described previously [36]. The glass covers were mounted with 50% glycerin. The images were observed under a confocal laser microscope (Leica, Germany).
Electrophoretic mobility shift assay and supershift(EMSA)
EMSA was used to determine whether nuclear extracts of HepG2 cells could bind to the putative cAMP response element (CRE) sequences of IRP1. The positive probe (CRE consensus sequence) and the putative CRE sequences (CRE1, CRE2, and CRE3) in the 5'-flanking region of IRP1 promoter were synthesized and used as oligonucleotide probes for EMSA (Table 1). CRE2 and CRE3 both contain three putative CREs in the probes sequences. Equal amounts of nuclear proteins (13.0 μg) for each sample were incubated with 45 pmol of biotin-labeled probe. Finally, a picture was obtained in the chemical system (Alpha Innotech Fluorchem, Silicon Valley, CA, USA). Cold competition control was performed by adding 100-fold excess of each unlabeled DNA fragment along with the biotin-labeled probe. The DNA-protein complexes were separated by electrophoresis on 5% native polyacrylamide gels. For supershift assays, nuclear extracts were co-incubated with the indicated specific anti-CREB antibodies (7 μg/μL) and biotin-labeled oligonucleotide probes.
Table 1
Nucleotide sequences of oligonucleotide probes used in EMSA & supershift analysis.
Element (abbreviation)Sequences (5'-3')
Positive probe (Consensus CRE)5'-AGAGATTGCCTGACGTCAGACAGCTAG-3'
CRE15'-AACTGAATAACGTGGAAAGAGTC-3'
CRE25'-AGTACCGACGCGGCCCGACCCACGTCCCC-3'
CRE35'-GGGGACGTGTTTCTGGCGACTGACGTCTCC-3'
NOTE: Positive CRE and the putative IRP1 promoter 5'-flanking region CRE nucleotides are represented in bold.
Plasmids construction
Seven different fragments in IRP1 promoter were amplified from genomic DNA (GenBank accession number AL161783.20) by PCR using the primers given in Table 2 and cloned into the pGL3-Basic vectors. The constructs pBI-CRE1 and pBI-CRE3 contained 194 bp and 637 bp fragments respectively, which included the putative CREs from -852 up to -832, +146 to +321 (set the translation initiation site of NM_001278352.1 as +1). CREB CDs region was amplified from CREB mRNA by the primers given in Table 2 and cloned into the pcDNA 3.1(+) vectors which formed the pcDNA-CREB plasmid. pcDNA-HIF-1 plasmid was constructed as described previously [21].
Table 2
Primer sequences.
NameA. Primers used for cloning of IRP1 CRE reporter constructs
pBI-CRE1 sense5'GGGGTACCCCAGGTGGTTGGAAGAGC3'
pBI-CRE1 antisense5'CCGCTCGAGTGAAAGGTGGTGAGGTT3'
pBI-CRE3 sense5'GGGGTACCCCCTGCTTGGGTCAGGTT3'
pBI-CRE3 antisense5'CCGCTCGAGATGCCATTATGATGTGCT3'
NameB. Primers used for cloning of CREB expression plasmid
CREB sense5'CGCGGATCCATGACCATGGAATCTGG3'
CREB antisense5'TGCTCTAGATTAATCTGATTTGTGGC3'
Chromatin immunoprecipitation (ChIP)
ChIP assays were performedin HepG2 using CHIP kits (Millipore). The cells were treated with or without hypoxia for 8 hours. After stimulation, cells were cross-linked by being added directly to the medium formaldehyde to a final concentration of 1% at room temperature. After 10 min, ice-cold PBS was added and plates were placed on ice, washed extensively with PBS, and scraped. After centrifugation, cells were lysed in SDS Lysis buffer supplemented with proteases inhibitor II. Chromatin was sheared by sonication, resulting in DNA fragments between 150 and 200 bp in size. After centrifugation, 1% of the sample was kept as Input and then diluted 10 times in dilution buffer supplemented with protease inhibitor II. Extracts were precleared for 1 hour at 4°C using 200 µl sheared sample DNA and 60 μL of protein G Agarose. Immunoprecipitations were carried out overnight at 4°C with 1 μg of each antibody. In parallel, supernatants were incubated with normal rabbit IgG as negative controls. Immune complexes were collected with protein G Agarose and washed three times (5 min each) with low salt buffer, high salt buffer, LiCL buffer and two times with TE buffer. Immune complexes were extracted with 1% SDS (v/v), 0.1 M NaHCO3, and heated for 5 hours at 65°C to reverse the cross-linking. After proteinase K digestion (2 hours at 45°C), DNA fragments were purified on Spin columns in 50 μL of EB (elution buffer) and 2 μL was used in each Q-PCR. Sequences of promoter-specific primers are available in Table 3 and were designed to specifically amplify proximal promoter regions containing three binding sites for pCREB discussed in the text.
HIF-1 and HIF-2 siRNA
HepG2 cells were plated into 6-well plates 1 day before transfection. The cells were grown to 50% confluence and then transfected with human HIF1-1, 5'-r(CUGGACACAGUGUGUUUGA)d(TT)-3'; HIF1-2, 5'-r(CUGAUGACCAGCAACUUGA)d(TT)-3'; HIF2-1, 5'-r(GCUCUUCGCCAUGGACACA)d(TT)-3'; HIF2-2, 5'-r(GCGACAGCUGGAGUAUGAA)-d(TT)-3' specific siRNA duplex, or negative control siRNA duplex, 5'-r(UUCUCCGAACGUGUCACGU)d(TT)-3' and 5'-r(ACGUGACACGUUCGGAGAA)d(TT)-3' (GenePharma, Shanghai, China) using the micropolysiRNA transfection reagent (Maikerui, Nantong, JS, China) according to the manufacturer's instruction.
Statistical analysis
All data were presented as mean± standard error (SEM). Statistical analyses were performed using SPSS software for Windows (version 13.0) (SPSS, Inc., Chicago, IL). The differences between the means were all determined by two-way analysis of variance (ANOVA). A probability value of p < 0.05 was taken to be statistically significant.
Table 3
Primer sequences.
NameA. Primers used for CHIP assay of IRP1 promoter regions
CRE1 sense5' GGTGTAGGCTTTGGTGTC 3'
CRE1 antisense5' ACTGCCCTCCTATTCTGC 3'
CRE2 sense5' TGCTTGGGTCAGGTTC3'
CRE2 antisense5' GAGGGATACAGGGTGG3'
CRE3 sense5' TCCACCCTGTATCCCTC3'
CRE3 antisense5' CCAATCCCTGGTTTCTC 3'
Results
Effects of hypoxia on cell viabilities, expression of IRP1 mRNA and protein, and contents of HIF-1alpha and pCREB
MTT assay showed that treatment with hypoxia (1% O2) for the different times (0, 4, 8, 12, and 24 hours) did not induce any significant differences in cell viabilities (Fig. 1A). Quantitative PCR demonstrated that hypoxia could induce a significant reduction first and then a remarkable increase in IRP1 mRNA expression. IRP1 mRNA levels in HepG2 cells treated with 4 hours of hypoxia were markedly lower than those in the control cells as well as the cells treated with hypoxia for 8, 12 and 24 hours (Fig. 1B). Western blot analysis found that the tendencies in the changes of IRP1 protein expression induced by different times of hypoxia were very similar to those of IRP1 mRNA expression, and IRP1 protein levels in HepG2 cells treated with 4 hours of hypoxia also being significantly lower than those in the control cells as well as the cells treated with hypoxia for 8, 12 and 24 hours (Fig. 1C). Western blot analysis also demonstrated that hypoxia led to a significant increase at 4 hours of hypoxia and then a decrease with the time of treatment in HIF-1 alpha contents in HepG2 cells (Fig. 1D). HIF-1 alpha contents treated with 4 hours of hypoxia were significantly higher than those in the control cells as well as the cells treated with hypoxia for 8, 12 and 24 hours. There were no differences in the contents of HIF-1 alpha between the cells treated with 12 or 24 hours of hypoxia and the control cells. In addition, it was found that pCREB (pCREB/CREB) level progressively increased with the treatment times of hypoxia until 24 hours (Fig. 1E).
The increased pCREB induced by hypoxia is mainly located inside of the nucleus
The inconsistency in the responses of IRP1 (mRNA and protein) and HIF-1 alpha to hypoxia suggested that IRP1 (mRNA and protein) expression is not controlled by HIF-1 alpha only. The very similar tendencies in the changes of IRP1 mRNA and protein levels and also pCREB contents during the later period of hypoxia (8-24 hours) implied that pCREB might play a role in regulation of IRP1 expression at the transcriptional level under the conditions of hypoxia. To test this possibility, we then investigated the sub-cellular distribution of the increased pCREB induced by hypoxia. This investigation was conducted because the proposed transcriptional regulation of IRP1 by the increased pCREB should be located inside of the nucleus where pCREB could bind to its possible target gene IRP1. Immunostaining analysis showed that treatment with hypoxia for 8 hours enhanced the staining of pCREB (green) in the nuclei (blue) in HepG2 cells (Fig. 2), indicating a significant increase in the level of pCREB inside of the nucleus. This finding provided the first piece of evidence for the possible involvement of pCREB in the regulation of IRP1 expression at the transcriptional level under the conditions of hypoxia.
Activated CREB binds to IRP1 gene in HepG2 cells
Next, we analyzed the IRP1 gene using several pieces of software available online. The longest sequence of promoter 5'-flanking region (from -2248 to +752 sites) was identified. Using genomatixmat Inspector software (37), seven putative CREs (TGACGTCA) were found (-852/-832, +146/+166, +149/+169, +283/+303, +298/+318, +300/+320, +301/+321) in the IRP1 gene. Here, we refer to -852/-832 as CRE1, +146/+169 as CRE2, +283/+321 as CRE3 (Fig. 3A). We then assessed whether nuclear extracts of HepG2 cells treated with hypoxia could bind to these three putative CREs sequences of IRP1 using EMSA. The shifted complexes of CRE1 or CRE3 probes were observed in the cells after 4 or 8 hours of hypoxia treatment (Fig. 3B, line 4, 5, 18, 19). The intensities of the shifted bands of CRE1 (Fig. 3B, line 5) or CRE3 (Fig. 3B, line 19) probes in the cells treated with hypoxia for 8 hours were very similar to those of the positive control (Fig. 3B, line 2, 9, 16). The binding specificity of the three CREs probes was determined by competition experiments. Addition of 100-fold competitor (unlabeled DNA fragment) to the three putative CREs (CRE1, CRE2, and CRE3) abolished the binding activities to varying degrees (Fig. 3B, line 6, 13, 20). To further investigate whether there was pCREB in the DNA-protein complexes of EMSA, we tested to see if pCREB antibodies could specifically combine to the DNA-protein complexes. The results showed that pCREB antibodies could induced a supershift of the DNA-protein complexes in the nuclear extracts of HepG2 cells treated with hypoxia for 8 hours (Fig. 3B, line 7, 14, 21). The results provide evidence for the existence of pCREB in the CRE1 and CRE3 DNA-protein complexes.
Figure 1
Effects of hypoxia on cell viabilities, expression of IRP1 mRNA and protein, and contents of HIF-1α and pCREB. HepG2 cells were exposed to hypoxia (1% O2) for different times (0, 4, 8, 12, and 24 hours) and then cell viabilities (A, n=6) and IRP1 mRNA (B, n=3) expression were measured by MTT assay and Quantitative PCR respectively, and the contents of IRP1 protein (C, n=3), HIF-1α (D, n=3) and pCREB (E, n=3) were determined by Western blotting analysis as described in “Methods”. The data were presented as mean ± SEM (n=3). *P<0.05 versus the control (0 hour hypoxia), # P<0.05 versus 4 hours of hypoxia.
Int J Biol Sci Image
(View in new window)
Figure 2
The increased pCREB induced by hypoxia is mainly located inside of the nucleus. HepG2 cells were treated with hypoxia for 0, 4 or 8 hours and then incubated with primary antibody against pCREB (1:1000) overnight at 4oC. The immunoreactivity(green) was detected using the AlexaFluor488-conjuagated secondary antibody (1:1000) for 2 hours at room temperature. A nucleus staining (blue)was performed by using Hoechst 33342 (5 mg/ml) as described in “Methods”. Bar =50 µm.
Int J Biol Sci Image
(View in new window)
Hypoxia increases transcriptional activity of IRP1
We also investigated the effect of pCREB on the regulation of IRP1 transcription under hypoxia by transfecting HepG2 cells with the reporter plasmids containing CRE1 or CRE3 (Fig. 4A). It was found that hypoxia for 8 hours induced a significant increase in luciferase reporter activity in cells transfected with pBI-CRE1 or pBI-CRE3 as compared with the normoxic control (hypoxia 0 hour), while hypoxia for 4 hours did not lead to such an increase in activity (Fig. 4B). In addition, we did not find any changes in luciferase reporter activity in the cells co-transfected with pBI-CRE1 or 3 and pcDNA-CREB or pcDNA-HIF-1 under normoxia. However, hypoxia for 8 hours resulted in a remarkable enhancement in luciferase reporter activity in cells co-transfected with pBI-CRE1 or 3 and pcDNA-CREB (Fig. 4C). The luciferase reporter activity was significantly higher in cells (co-transfected with pBI-CRE1 or 3 and pcDNA-CREB) treated with hypoxia than that in cells treated without hypoxia (Fig. 4C).
The increased IRP1 expression induced by pCREB under hypoxia could be prevented by LY294002
Furthermore, we investigated the effects of H-89 (PKA inhibitor) and LY294002 (PI3K inhibitor) on the expression of IRP1 protein to find out whether inhibition of pCREB could prevent the increase in expression of IRP1 protein under hypoxia. The HepG2 cells were pre-treated with the two inhibitors for 1 hour before being exposed to hypoxia for 8 hours. We demonstrated that LY294002 (Fig. 5A and B) and H-89 (Fig. 5C and D) both induced a significant reduction in IRP1 protein and pCREB under the conditions of not only normxia but also hypoxia. We also found that hypoxia led to a further reduction in IRP1 protein (Fig. 5A) and pCREB (Fig. 5B) levels in the cells treated with LY294002 but not with H-89 (Fig. 5C and D). The levels of IRP1 protein and pCREB both were significantly lower in the cells treated with LY294002 plus hypoxia than those in the cells treated with LY294002 plus normoxia. In the case of H-89, such a difference was not found. Total amounts of CREB were found to remain largely stable under different conditions (Fig. 5B and D).
ChIP assays demonstrated that pCREB binds to IRP1 promoter
We further assessed the binding activity of the three putative CREs with pCREB in HepG2 cells under hypoxia by ChIP analysis. The interaction of pCREB and CRE1 (-852/-832), CRE2 (+146/+169) or CRE3 (+283/+321) in IRP1 promoter regions was all found to be significantly higher in HepG2 cells treated with hypoxia for 8 hours than in the controls (Fig. 6). This showed that hypoxia could lead to a marked increase in the binding activity of the three putative CREs with pCREB, and also provided evidence that pCREB can bind to IRP1 promoter to increase IRP1 mRNA transcription.
Transfection with HIF-1 and/or HIF-2 siRNA had no significant effect on the expression of pCREB and IRP1 proteins in HepG2 cells treated with hypoxia
Finally, we investigated the effects of transfection with HIF-1and/or HIF-2 interference sequences on pCREB and IRP1 expression in HepG2 cells under hypoxia for 8 hours. Western blot analysis showed that HIF-1 and HIF-2 expression in cells in siHIF-1, siHIF-2 or siHIF-1+2 groups was significantly lower than that in the cells in the control or negative groups (Fig. 7A and B). There were no significant differences in the expression of pCREB protein between the cells transfected with siHIF-1, siHIF-2 or siHIF-1+2 and the control or negative cells (Fig. 7C), indicating that inhibition of HIF-1 and/or HIF-2 has no effect on the expression of pCREB protein. Expression of IRP1 protein was found to be slightly higher in cells transfected with siHIF-1, siHIF-2 or siHIF-1+2 than that in the cells in the control or negative groups (Fig. 7D), though there were no significant differences among them.
Figure 3
Analysis of the binding activity of the putative CREs in the IRP1 gene in HepG2 cell. A. Schematic diagram of the seven putative CREs (box) in 5'-flanking region of IRP1 promoter region (CRE1: -852/-832, CRE2: +146/+169, CRE3: +283/+321). B. EMSA was done with biotin-labeled CRE, CRE1, CRE2 and CRE3 oligonucleotides in the presence of nuclear extracts from HepG2 cells treated with 1%O2for 4 or 8 hours. CK = control check, + = positive control which used bio-labeled CRE consensus sequences as a positive probe, 1 = normoxia control, 2 = hypoxia for 4 hours, 3 = hypoxia for 8 hours, 100× = cold competition control, and Ab = Supershift with pCREB antibody at 8 hours of hypoxia.
Int J Biol Sci Image
(View in new window)
Figure 4
Promoter location of CREs region in the human IRP1 promoter. A. Schematic diagram of the test DNA plasmids. B. HepG2 cells were transfected with test DNA combined with pRL-TK control vector DNA. 36 or 44 hours after transfection, cells were cultured under 21% or 1% oxygen for 4 or 8 hours. Luciferase assays were measured using the dual luciferase reporter system. C. CREB over-expression under hypoxia for 8 hours induces pCREB-induced IRP1 promoter activity. The values represent means ± SEM (n=3). *P<0.05 versus normoxia control.
Int J Biol Sci Image
(View in new window)
Figure 5
Effects of LY294002 (PI3K inhibitor) and H-89 (PKA inhibitor) on IRP1 protein expression and pCREB content in HepG2 cells under hypoxia. HepG2 cells were pretreated with LY294002 (20 mM) or H-89 (20 mM) for 1 hour and then treated with hypoxia for 8 hours. The levels of IRP1 (A and C) and pCREB (B and D) were measured by Western blotting analysis as described in “Methods”. The data were presented as mean ± SEM (n=3). *P<0.05 versus the control, #P<0.05 versus normoxia.
Int J Biol Sci Image
(View in new window)
Figure 6
ChIP assays demonstrated that pCREB binds to IRP1 promoter. HepG2 cells were treated with hypoxia (H) or normoxia (N) for 8 hours and ChIP assays were conducted as described in Materials and Methods. A: ChIP assays to show that pCREB binds to IRP1 promoter (M = DNA marker). The bands of 168 bp, 112bp and 185bp contain CRE1, CRE2 and CRE3 in the IRP1 promoter gene; respectively. B. Data are presented as mean±SEM (% Input), n=3. *P <0.05 versus H (normoxia).
Int J Biol Sci Image
(View in new window)
Figure 7
Transfection with HIF-1 and/or HIF-2 siRNA had no significant effect on expression of pCREB and IRP1 proteins in HepG2. cells treated with hypoxia. HepG2 cells were transfected with interference sequences of HIF-1 (siHIF-1), HIF-2 (siHIF-2), HIF-1 and HIF-2 (siHIF-1+2) or negative control (Negative) under normoxia for 36 hours and then treated by hypoxia for 8 hours. The expression of HIF-1 (A), HIF-2 (B), PCREB and CREB (C), and IRP1 (D) proteins was measured by Western blotting. *P <0.05 versus Control.
Int J Biol Sci Image
(View in new window)
Discussion
Studies have concluded that IRP1 is one of the hypoxia-inducible genes [12,13,21]. In the present study, we showed that the contents of HIF-1 alpha are significantly higher and levels of IRP1 mRNA and protein lower in the cells treated with hypoxia than those in the controls in the early phase of hypoxia (4 hours). The findings are consistent with what has reported by others [12,21] and also provided further evidence for the conclusion that hypoxia could inhibit degradation of HIF-1 alpha, leading to an increase in HIF-1 content which down-regulates IRP1 expression. However, same as what we found in our preliminary investigation, we also demonstrated that levels of IRP1 mRNA and protein both gradually increased with time during the period from 8 to 24 hours of hypoxia, while the contents of HIF-1 alpha significantly decreased at 8 hours of hypoxia as compared with the levels at 4 hours of hypoxia, almost returning to the normal levels at 12 and 24 hours of hypoxia. These findings implied that the increased expression of IRP1 in the late phase (8-24 hours) of hypoxia should not be relevant to HIF-1.
At the same time, it was found that the tendencies in the changes of IRP1 mRNA and protein levels are very similar to those of pCREB contents during the late phase of hypoxia, and pCREB contents also gradually increased with time during the period from 8 to 24 hours of hypoxia. The very similar tendencies in the changes of IRP1 and pCREB contents suggested that pCREB, in addition to HIF-1, might also be involved in the control of IRP1 expression under the conditions of hypoxia. The findings obtained from the present study provide solid evidence for this view. First, immunostaining analysis demonstrated that treatment with hypoxia for 8 hours dramatically enhanced pCREB levels inside of the nucleus. Second, analysis by using genomatix-mat Inspector software revealed the existence of the putative CREs in the IRP1 gene. Third, EMSA indicated that nuclear extracts of HepG2 cells treated with hypoxia could bind to CRE1 and CRE3, and the competition experiment showed that 100-fold competitor of the putative CREs could abolish the binding activities to varying degrees. Fourth, the supershift experiment evidenced the existence of pCREB in the CRE1 and CRE3 DNA-protein complexes of EMSA. Fifth, dual-luciferase assay demonstrated that CRE1 and CRE3 binding activity of IRP1 depended on CREB activation but not on HIF-1 at the later phase of hypoxia, with CRE3 which contains three CREs being more active than CRE1. Sixth, ChIP assays demonstrated that pCREB bound to IRP1 promoter. Finally, transfection with HIF-1 and/or HIF-2 siRNA had no significant effect on expression of pCREB and IRP1 proteins in HepG2 cells treated with hypoxia for 8 hours. These findings plus studies on the role of HIF-1 in IRP1 expression support the notion that expression of IRP1 is regulated by not only HIF-1 but also pCREB under hypoxia. HIF-1 plays its role in the early phase, while pCREB plays its role in the late phase of hypoxia.
It has been documented that CREB could bind to HRE of some target genes of HIF-1, for example plasminogen activator inhibitor-1 [38]. In addition, the core sequence of HIF-1 binding site HRE (RCGTG) was similar to that of CREB binding site (CRE) (TGACGTCA). In the present study, we investigated the effect of HIF-1 on the transcription of pBI-CRE1 and pBI-CRE3, which have a functional HRE, and demonstrated that over-expression of HIF-1 could not affect the binding activities of pBI-CRE1 and pBI-CRE3. We also constructed an over-expression plasmid of CREB and found that the luciferase activity did not changed between pGL-3Basic control and pBI-CRE1/3 under normoxic condition. However, 8 hours of hypoxia was found to induce a significant increase in the transcription activities of pBI-CRE1 and pBI-CRE3. These findings support the possibility that CRE might also function as HRE in the IRP gene, thus preventing HIF-1 from binding to its responsive element HRE after CREB binds to CRE. If true, this is likely why the over-expression of HIF-1 could not affect the binding activities of pBI-CRE1 and pBI-CRE3 in the cells.
It has been reported that CREB will be activated when being phosphorylated at Ser133 by various kinases, including protein kinase A (PKA) [39], protein kinase C [40], calmodulin kinases II and IV [41,42], pp90RSK [43], microtubule-activated protein kinase-activated protein 2 [44], protein kinase Akt/PKB [45] and phosphoinositide 3-kinase (PI3K)/Akt [46]. In order to identify the signaling pathway involved in the hypoxia-induced increase in pCREB under our experimental conditions, we also investigated the effects of LY294002 (PI3K inhibitor) and H-89 (PKA inhibitor) on pCREB contents as well as IRP1 protein expression as PI3K and PKA might link hypoxia with CREB phosphorylation [47-50]. We demonstrated that both PI3K and PKA inhibitors could significantly reduce pCREB content and also IRP1 protein expression in the cells treated with not only normoxia but also hypoxia. However, treatment with LY294002, but not H-89, markedly decreased pCREB and IRP1 protein levels in the cells exposed to 8 hours of hypoxia. These findings showed that the increased IRP1 expression induced by the enhanced pCREB under hypoxia could be prevented by LY294002 and also implied that the PI3K/Akt pathway, rather than PKA, might play a dominant role in CREB activation in the late phase of hypoxia.
It was noticed that the levels of IRP mRNA in cells treated with hypoxia for 8, 12 and 24 hours were about 2-fold of that of the controls, while the contents of IRP1 were lower than (8 and 12 hours) or equal to (24 hours) those of the controls during this period. Currently, the associated causes are unknown. However, the difference in the induction of IRP-1 mRNA and protein by hypoxia might imply the existence of some unknown factors that inhibit translational expression of IRP1 during the late phase of hypoxia, and further work is clearly required to substantiate this possibility.
A significantly increased HIF-1 alpha and a reduction in IRP mRNA and protein was found in the cells treated with hypoxia for 4 hours. This provided further evidence that hypoxia could inhibit degradation of HIF-1 alpha, leading to an increase in HIF-1 content which could bind to the three HREs in the 5'-regulatory region of IRP1 and then down-regulated IRP1 expression by a transcriptional mechanism [21]. This conclusion contradicts that of Hanson and Leibold [12]. They demonstrated that hypoxia inactivates the IRE-binding activity of IRP1 by a post-translational mechanism, without affecting IRP1 mRNA expression. The conflicting results may be partly due to the different degrees of hypoxia (3% vs. 1%) and differences in cell models (a rat hepatoma cell line, FTO2B vs. a human hepatoma cell line, HB 8065) used although the precise causes are unknown at present.
The findings obtained from the present study supported the idea that a so called hypoxia-responsive gene or hypoxia-inducible gene is not regulated by HIF-1 only under the conditions of hypoxia. Dual-regulation by HIF-1 and pCREB or other transcription factor(s) in hypoxia might be a common mechanism in most if not all of hypoxia-responsive or -inducible genes. The Macrophage migration inhibitory factor (MIF) has been well described as a pro-inflammatory cytokine and regulator of neuro-endocrine function [51-53]. Several recent studies have also implicated MIF as a hypoxia-responsive gene in cancer, cardiac ischemic injury, and inflammatory responses [54]. A recent study showed that hypoxia, and specifically HIF-1alpha, is a potent and rapid inducer of MIF expression and demonstrated that hypoxia-induced MIF expression is dependent upon a HRE in the 5'UTR of the MIF gene but is further modulated by CREB expression. This study strongly supports the above possibility. It is also highly likely that different transcription factors might play a role in the regulation of the target gene in different phases of hypoxia. In the case of IPR1, HIF-1 might play its role only in the early phase, while pCREB in the late phase of hypoxia. Therefore, the transcription factor(s) and mechanisms involved in the regulation of hypoxia-inducible genes in addition to HIF-1 under hypoxia need to be investigated further. Currently, this important issue has not received much attention, however, the relevant studies are of great significance in fully understanding not only the mechanisms of the regulation of hypoxia-inducible gene expression but also the potential application of hypoxic preconditioning in clinical practice.
Abbreviations
CRE: Cyclic AMP-responsive element
CREB: Cyclic AMP-responsive element-binding protein
DMT1: divalent metal transporter1
HRE: hypoxia response element
HIF-1: hypoxia-inducible factor-1
IRE: iron-responsive element
IRP 1: iron regulatory protein 1
pCREB: Phosphorylated CREB
PI3K: phosphatidylinositol 3-kinase
PKA: protein kinase A
Tf : transferrin
TfR1: transferrin receptor 1
Acknowledgements
We thank Christopher Qian for assistance with preparation and English revision of the manuscript. The studies in our laboratories were financially supported by National Natural Science Foundation of China (31300973, 31171143, 31271132, 31371092, 31571195, 31330035), and Hong Kong Health and Medical Research Fund (01120146).
Author contributions
Q.Q.L., Y. K. and Z.M.Q. conceived, organized and supervised the study; Q.Q.L., Y.F.Z., M.W.Z. and D.W. performed the experiments; L.Z. contributed to the analysis of data. Y. K. and Z.M.Q. prepared and wrote the manuscript.
Competing Interests
The authors indicate no potential conflicts of interest.
References
1. Wang GL, Jiang BH, Rue EA. et al. Hypoxia-inducible factor 1 is a basic-helix- loop-helix-PAS heterodimer regulated by cellular O2 tension. Proc Natl AcadSci USA. 1995;92:5510-5514
2. Lahiri S, Roy A, Baby SM. et al. Oxygen sensing in the body. ProgBiophysMol Biol. 2006;91:249-286
3. Jewell UR, Kvicukova T, Scheid A. et al. Induction of HIF-1a in response to hypoxia is simultaneous. FASEB J. 2001;15:1312-1314
4. Wang GL, Semenza GL. Purification and characterization of hypoxia-inducible factor1. J Biol Chem. 1995;270:1230-1237
5. Huang LE, Gu J, Schau M. et al. Regulation of hypoxia-inducible factor 1a is mediated by an O2-dependent degradation domain via the ubiquitin-proteasome pathway. Proc Natl AcadSci USA. 1998;95:7987-7992
6. Zarember KA, Malech HL. HIF-1a: A master regulator of innate host defenses?. J Clin Invest. 2005;115:1702-1704
7. Peyssonnaux C, Zinkernagel AS, Schuepbach RA. et al. Regulation of iron homeostasis by the hypoxia-inducible transcription factors (HIFs). J Clin Invest. 2007;117:1926-1932
8. Ke Q, Costa M. Hypoxia-inducible factor-1 (HIF-1). MolPharmacol. 2006;70:1469-1480
9. Rolfs A, Kvietikova I, Gassmann M. et al. Oxygen-regulated transferrin expression is mediated by hypoxia-inducible factor-1. J Biol Chem. 1997;272:20055-20062
10. Tacchini L, Bianchi L, Bernelli-Zazzera A. et al. Transferrin receptor induction by hypoxia. HIF-1-mediated transcriptional activation and cell-specific post-transcriptional regulation. J Biol Chem. 1999;274:24142-24146
11. Mukhopadhyay CK, Mazumder B, Fox PL. Role of Hypoxia-inducible factor-1 in transcriptional activation of ceruloplasmin by iron deficiency. J Biol Chem. 2000;275:21048-21054
12. Hanson ES, Leibold EA. Regulation of iron regulatory protein 1 during hypoxia and hypoxia/reoxygenation. J Biol Chem. 1998;273:7588-7593
13. Hanson ES, Foot LM, Leibold EA. Hypoxia post-translationally activates iron-regulatory protein 2. J Biol Chem. 1999;274:5047-5052
14. Nicolas G, Chauvet C, Viatte L. et al. The gene encoding the iron regulatory peptide hepcidin is regulated by anemia, hypoxia, and inflammation. J Clin Invest. 2002;110:1037-1044
15. Zhu L, Zhang L, Ke Y. et al. Correlation between the expression of divalent metal transporter 1 and the content of hypoxia-inducible factor-1 in hypoxic HepG2 cells. J Cell Mol Med. 2008;12:569-579
16. Qian ZM, Wu XM, Fan M. et al. Divalent metal transporter 1 is a hypoxia-inducible gene. J Cell Physiol. 2011;226:1596-1603
17. Andrews NC. Disorders of iron metabolism. N Engl J Med. 1999;341:1986-1995
18. Fleming RE, Sly WS. Mechanisms of iron accumulation in hereditary hemochromatosis. Annu Rev Physiol. 2002;64:663-680
19. Kühn LC. Iron regulatory proteins and their role in controlling iron metabolism. Metallomics. 2015;7:232-243
20. Anderson CP, She M, Eisenstein RS. et al. Mammalian iron metabolism and its control by iron regulatory proteins. BiochimBiophysActa. 2012;1823:1468-1483
21. Luo QQ, Wang D, Yu MY. et al. Effect of Hypoxia on the Expression of Iron Regulatory Proteins 1 and the Mechanisms Involved. IUBMB Life. 2011;63:120-128
22. Lee HT, Chang YC, Tu YF. et al. CREB activation mediates VEGF-A's protection of neurons and cerebral vascular endothelial cells. J Neurochem. 2010;113:79-91
23. Siu YT, Jin DY. CREB-a real culprit in oncogenesis. FEBS J. 2007;274:3224-3232
24. Mabuchi T, Kitagawa K, Kuwabara K. et al. Phosphorylation of cAMP response element-binding protein in hippocampal neurons as a protective response after exposure to glutamate in vitro and ischemia in vivo. J Neurosci. 2001;21:9204-9213
25. Lee HT, Chang YC, Wang LY. et al. cAMP response element-binding protein activation in ligation preconditioning in neonatal brain. Ann Neurol. 2004;56:611-623
26. Lin WY, Chang YC, Lee HT. et al. CREB activation in the rapid, intermediate, and delayed ischemic preconditioning against hypoxic-ischemia in neonatal rat. J Neurochem. 2009;108:847-859
27. Bonni A, Brunet A, West AE. et al. Cell survival promoted by the Ras-MAPK signaling pathway by transcription-dependent and -independent mechanisms. Science. 1999;286:1358-1362
28. Finkbeiner S. CREB couples neurotrophin signals to survival messages. Neuron. 2000;25:11-14
29. Mantamadiotis T, Lemberger T, Bleckmann SC. et al. Disruption of CREB function in brain leads to neurodegeneration. Nat Genet. 2002;31:47-54
30. Tanaka K. Alteration of second messengers during acute cerebral ischemia - adenylate cyclase, cyclic AMP-dependent protein kinase, and cyclic AMP response element binding protein. ProgNeurobiol. 2001;65:173-207
31. Hara T, Hamada J, Yano S. et al. CREB is required for acquisition of ischemic tolerance in gerbil hippocampal CA1 region. J Neurochem. 2003;86:805-814
32. Fang D, Li Z, Zhong-ming Q. et al. Expression of bystin in reactive astrocytes induced by ischemia/reperfusion and chemical hypoxia in vitro. BiochimBiophysActa. 2008;1782:658-663
33. Li Z, Ya K, Xiao-Mei W. et al. Ginkgolides protect PC12 cells against hypoxia-induced injury by p42/p44 MAPK pathway-dependent upregulation of HIF-1alpha expression and HIF-1DNA-binding activity. J Cell Biochem. 2008;103:564-575
34. He W, Qian Zhong M, Zhu L. et al. Ginkgolides mimic the effects of hypoxic preconditioning to protect C6 cells against ischemic injury by up-regulation of hypoxia-inducible factor-1 alpha and erythropoietin. Int J Biochem Cell Biol. 2008;40:651-662
35. Livak KJ, Schmittgen TD. Analysis of relative gene expression data using real-time quantitative PCR and the 2(-Delta Delta C(T)) Method. Methods. 2001;25:402-408
36. Du F, Zhu L, Qian ZM. et al. Hyperthermic preconditioning protects astrocytes from ischemia/reperfusion injury by up-regulation of HIF-1 alpha expression and binding activity. BiochimBiophysActa. 2010;1802:1048-1053
37. Cartharius K, Frech K, Grote K. et al. MatInspector and beyond: promoter analysis based on transcription factor binding sites. Bioinformatics. 2005;21:2933-2942
38. Dimova EY, Jakubowska MM. et al. CREB binding to the hypoxia-induciblefactor-1 responsive elements in the plasminogen activator inhibitor-1 promoter mediates the glucagon effect. ThrombHaemost. 2007;98:296-303
39. Gonzalez G.A, Montminy MR. Cyclic AMP stimulates somatostatin gene transcription by phosphorylation of CREB at serine 133. Cell. 1989;59:675-680
40. Yamamoto KK, Gonzalez G A, Biggs WH. et al. Phosphorylation-induced binding and transcriptional efficacy of nuclear factor CREB. Nature. 1988;334:494-498
41. Matthews R, Guthrie C, Wailes L. et al. Calcium/calmodulin-dependent protein kinase types II and IV differentially regulate CREB-dependent gene expression. Mol Cell Biol. 1994;14:6107-6116
42. Sun P, Enslen H, Myung P. et al. Differential activation of CREB by Ca2+/calmodulin-dependent protein kinases type II and type IV involves phosphorylation of a site that negatively regulates activity. Genes Dev. 1994;8:2527-2539
43. Ginty D, Bonni A, Greenberg M. Nerve growth factor activates a Ras-dependent protein kinase that stimulates c-fos transcription via phosphorylation of CREB. Cell. 1994;77:713-725
44. Tan Y, Rouse J, Zhang A. et al. FGF and stress regulate CREB and ATF-1 via a pathway involving p38 MAP kinase and MAPKAP kinase-2. EMBO J. 1996;15:4629-4642
45. Du K, Montminy M. CREB Is a Regulatory Target for the Protein Kinase Akt/PKB. J Biol Chem. 1998;273:32377-32379
46. Li XY, Zhan XR, Liu XM. et al. CREB is a regulatory target for the protein kinase Akt/PKB in the differentiation of pancreatic ductal cells into islet β-cells mediated by hepatocyte growth factor. BiochemBiophys Res Commun. 2011;404:711-716
47. Jacinto E, Lorberg A. TOR regulation of AGC kinases in yeast and mammals. Biochem J. 2008;410:19-37
48. Carloni S, Girelli S, Scopa C. et al. Activation of autophagy and Akt/CREB signaling play an equivalent role in the neuroprotective effect of rapamycin in neonatal hypoxia-ischemia. Autophagy. 2010;6:366-377
49. Li X, Han X, Llano J. et al. Mammalian target of rapamycin inhibition in macrophages of asymptomatic HIV+ persons reverses the decrease in TLR-4-mediated TNF-alpha release through prolongation of MAPK pathway activation. J Immunol. 2011;187:6052-6058
50. Kim JE, Kang JS, Lee WJ. Vitamin C Induces Apoptosis in Human Colon Cancer Cell Line, HCT-8 Via the Modulation of Calcium Influx in Endoplasmic Reticulum and the Dissociation of Bad from 14-3-3beta. Immune Network. 2011;12:189-195
51. Donnelly SC, Haslett C, Reid PT. et al. Regulatory role for macrophage migration inhibitory factor in acute respiratory distress syndrome. Nat Med. 1997;3:320-323
52. Baugh JA, Donnelly SC. Macrophage migration inhibitory factor: a neuroendocrine modulator of chronic inflammation. J. Endocrinol. 2003;179:15-23
53. Calandra T, Roger T. Macrophage migration inhibitory factor: a regulator of innate immunity. Nat Rev Immunol. 2003;3:791-800
54. Baugh JA, Gantier M, Li L. et al. Dual regulation of macrophage migration inhibitory factor (MIF) expression in hypoxia by CREB and HIF-1. BiochemBiophys Res Commun. 2006;347:895-903
Author contact
Corresponding address Corresponding authors: Zhong Ming Qian (E-mail: zhongming.qiancom) Laboratory of Neuropharmacology, Fudan University School of Pharmacy,826 Zhang Heng Road, Shanghai 201203, PRC. Ya Ke: yakeedu.hk; Li Zhu: zhulili65com.
Received 2016-6-9
Accepted 2016-7-18
Published 2016-9-15
Citation styles
APA
Luo, Q.Q., Qian, Z.M., Zhou, Y.F., Zhang, M.W., Wang, D., Zhu, L., Ke, Y. (2016). Expression of Iron Regulatory Protein 1 Is Regulated not only by HIF-1 but also pCREB under Hypoxia. International Journal of Biological Sciences, 12(10), 1191-1202. https://doi.org/10.7150/ijbs.16437.
ACS
Luo, Q.Q.; Qian, Z.M.; Zhou, Y.F.; Zhang, M.W.; Wang, D.; Zhu, L.; Ke, Y. Expression of Iron Regulatory Protein 1 Is Regulated not only by HIF-1 but also pCREB under Hypoxia. Int. J. Biol. Sci. 2016, 12 (10), 1191-1202. DOI: 10.7150/ijbs.16437.
NLM
Luo QQ, Qian ZM, Zhou YF, Zhang MW, Wang D, Zhu L, Ke Y. Expression of Iron Regulatory Protein 1 Is Regulated not only by HIF-1 but also pCREB under Hypoxia. Int J Biol Sci 2016; 12(10):1191-1202. doi:10.7150/ijbs.16437. https://www.ijbs.com/v12p1191.htm
CSE
Luo QQ, Qian ZM, Zhou YF, Zhang MW, Wang D, Zhu L, Ke Y. 2016. Expression of Iron Regulatory Protein 1 Is Regulated not only by HIF-1 but also pCREB under Hypoxia. Int J Biol Sci. 12(10):1191-1202.
This is an open access article distributed under the terms of the Creative Commons Attribution (CC BY-NC) License. See http://ivyspring.com/terms for full terms and conditions.
|
Lemongrass Essential Oil
Celebrating CBD NEWS with 62% OFF Lye, Essential Oils, Palm Cubes, Vegetable Glycerin & FREE CBD! Join Greener Life Club today - CLICK HERE
Lemon-grass-bannerNature’s super glue for the human body is the right way to honor Lemongrass essential oil because it is as quick and fast as any branded adhesive glue in repairing torn tendons, ligaments, cartilages, tenosynovitis, inflamed tissues and certain other connective tissue injuries. This oil smells heavenly and is much similar to the aroma of Lemon oil but with a comparatively gentle, sweet and soothing aroma.
Used as a celebrated culinary herb in Thai and Chinese cuisines, Lemongrass is often used to substitute Lemon. This essential oil is extracted from the grassy leaves through steam distillation process. Ayurveda makes use of this ancient herb in treating weak digestion, poor circulation, poor concentration, fever, varicose veins, intestinal infections and certain infectious skin problems.
Purchase Lemongrass Oil – Retail – 4 oz – CLICK HERE
Purchase Lemongrass Oil – Wholesale – CLICK HERE
Historical uses of Lemongrass and its essential oil:
Indigenous to the southern parts of India, this spectacular herb is also found growing in South East Asian countries including Indonesia, Malaysia, Thailand, Cambodia and Vietnam. It is also cultivated in United States especially in Florida and California.
Lemongrass is a celebrated culinary herb in the Caribbean and Chinese cuisines. This aromatic herb blends well with garlic, ginger, cilantro and other spices used in flavoring a wide variety of Caribbean soups especially the seafood soups. Powdered Lemongrass has been used in Asia for giving incredible flavor to traditional dishes made with meat, poultry, seafood and vegetables. It is also used in spicing up pickles and marinades.
Widely known as ‘Fever Grass’, Lemongrass is popular in the Asian countries since the primordial times for its ability to bring down fever and normalize the body temperature during hot weather. It is either used in tea or in foot-baths for reducing fever and excess heat in the body. This tea is also believed to treat ringworm, lice, scabies and few other skin problems.
The Traditional Chinese Medicine used Lemongrass for treating headache, rheumatism, abdominal pain and cold. This herb was also a part of the Brazilian folklore medicine for calming the mind, treating muscular spasms, cramps and fatigue. Powdered along with black pepper, Lemongrass was used as a powerful Ayurvedic remedy for relieving menstrual cramps, nausea, irregular periods, fever and other infectious diseases.
Therapeutic properties of Lemongrass essential oil:
The remedial properties of Lemongrass essential oil are antiseptic, anti-rheumatic, diuretic, anti-inflammatory, astringent, analgesic, sedative, deodorant, galactogogue, nervine, tonic, carminative, antimicrobial, antidepressant, febrifuge, bactericidal, fungicidal, deodorant, antipyretic and nervine.
Chemical constituents or Gas Chromatography Report of Lemongrass essential oil:
According to the Gas chromatography report, Lemongrass oil constitutes of 5 chemical components that contribute to its exotic fragrance, therapeutic properties and quality.
The major chemical constituents of this oil are citral (Geranial and Neral – approximately 85% of the oil), geraniol, geranyl acetate and beta-Caryophyllene.
Just click on:
for getting to know more about the exclusive information of these key constituents of Lemongrass oil.
The table below on the Gas Chromatography report talks about the principal chemical constituents and its role in granting the therapeutic and other attributes to Lemongrass oil.
Lemongrass-oilAyurvedic health benefits of Lemongrass essential oil:
Ayurveda uses infinite number of herbs in the process of healing humanity and Lemongrass is one such vital herbal whiz kid that has been helping mankind in treating innumerable diseases.
Known as Sera and Bhustrina in India, Lemongrass has been used in various Ayurvedic treatments for treating kidney infections, headache, problems with connective tissues, weak immune system and depression.
More than 5,000 years old, Ayurveda is by far the oldest of all healing sciences on earth and is the Mother of other complementary and alternative medicinal practices like Siddha, Homeopathy, Aromatherapy, Chiropractic, Acupuncture, Homeopathy, Traditional Chinese Medicine, Unani and much more. This science of wisdom has left behind innumerable complex healing systems using simple methodologies.
The ancient Ayurvedic philosophers Charaka and Sushruta encompassed the most important Ayurvedic remedies for all sorts of diseases. The most intricate medical practices even with today’s contemporary medicinal equipments and techniques are C-section surgery and Plastic surgery. Won’t you simply be amazed if I say that these two were a part of the Ayurvedic treatments???!!!! Yes.
Sushruta is called as the father of Plastic surgery and C-section deliveries were executed for the most critical cases where the baby or the mother turns breathless at the time of delivery.
The magnificence of Ayurvedic healing lies in its trust and usage of natural remedies like herbs, healthy and balanced diet, essential oils, yoga, simple physical exercises, meditation with an Ayurvedic routine. This aims at treating illnesses, preventing them in future along with healthy aging. Ayurvedic texts define health as a combination of physical, mental and spiritual wellness.
Every human being is made of a unique individual constitution that comprises of three biological energies known as doshas namely pitta, vata and kapha. A person’s physical setup, personality and behavior are determined by the predominance of any one of these doshas.
Imbalance between these doshas is responsible for ill-health and Ayurvedic remedies focus on balancing these doshas. Lemongrass essential oil alleviates excess kapha and pitta dosha while it has a neutral effect on vata dosha.
The Ayurvedic health benefits of Lemongrass essential oil are as follows:
Lemongrass-broucher1. Fights against harmful micro-organisms:
Lemongrass essential oil has been proved effective against micro-organisms like bacteria, fungi and certain other microbes. Few studies witnessed that Lemongrass oil is more potent than streptomycin or penicillin in fighting against staph infection. Staphylococcus is the major bacterium responsible for making wounds turn septic.
Applying 2 drops of Lemongrass oil mixed with 15 to 20 drops of coconut oil on wounds, cuts, acne, burns, sores and other skin infections aids in healing the wounds and curbs the growth of micro-organisms that worsen skin problems. This effect can also be attributed to the antiseptic properties of this oil.
A 2008 study on ‘Antifungal activity of the Lemongrass oil and citral against Candida spp’ state that Lemongrass essential oil and citral are effective against various types of yeasts of Candida species including Candida albicans, Candida glabrata, Candida krusei, Candida parapsilosis and Candida tropicalis, proving its potent in vitro activity against Candida spp, responsible for the most common fungal infection Candidiasis.
Certain other studies suggest that Lemongrass oil can also assist in combating the growth of fungi like Alternaria alternata, which is said to cause infections in the upper respiratory tract.
Gently massaging your body with 5 drops of Lemongrass oil blended with 2.5 ml olive oil can assist in inhibiting the growth of bacteria and microbes both externally and internally. This aids in treating microbial infections in the respiratory system, skin, stomach, colon, urinary tracts and other parts of the body.
2. Reduces fever and pain:
Being an anti-pyretic and febrifuge, the essential oil of Lemongrass reduces fever by fighting against infections causing fever, promote sweating and by eliminating the harmful toxins in the body through urine. According to the Ayurvedic philosophy, pitta dosha is responsible for body temperature and fever is an indication of increased pitta energy.
Lemongrass essential oil is known to reduce pitta dosha and by this way it lessens the body temperature even during high fevers. Add 2 drops of this oil in warm water for a remedial foot bath for reducing fever or massage your foot soles with 2 drops of Lemongrass oil mixed with 1 ml of coconut oil for relief from fever.
This oil also lessens excess of kapha energy that causes fluid retention in the body causing respiratory problems, rheumatism, pain and inflammation.
Gently massaging the painful areas with 2 drops of Lemongrass oil mixed with 1 ml of sesame oil helps in relieving pain, inflammation and rheumatism by eliminating the excess fluids and toxic substances through urine and sweat. The analgesic action of this oil helps in soothing pain, tired muscles, headache, joint pain and back pain.
3. Enhances immunity and strengthens the nervous system:
Lemongrass herb and its essential oil have excellent nutrients and chemical components that benefit the entire system and augment the immune power, which makes the body naturally resistant against diseases. It acts as a tonic to the human body and strengthens the functioning of the digestive system, nervous system, excretory system and respiratory system by stimulating the process of absorbing essential nutrients by the body.
Lemongrass oil is used in Ayurvedic massaging for fortifying the nerves, limbs, muscles and tissues. Massaging your body with 6 drops of Lemongrass oil blended with 3 ml of olive oil can assist in treating nervous problems like vertigo, convulsions, Alzheimer’s disease, sluggishness, Parkinson’s disease and nervousness.
4. Eliminates toxic substances in the body:
Stagnation of ama (toxic substances) in the body is one of the primary reason for illnesses according to Ayurveda. The diaphoretic and diuretic properties of Lemongrass Oil increase the frequency and quantity of urination through which the harmful toxins in the body are vented out.
This action also aids in improving digestion, cleansing the kidneys and discharging harmful infection causing foreign bodies. You can add 2 drops of Lemongrass oil in warm bathing water or in foot bath or massage your body with 3 drops of this oil with 2 ml of sesame oil for getting rid of all the toxic substances from your body.
5. Combats cancer cells and supports the digestive system:
A 2009 study on the anticancer activity of Lemongrass essential oil against 12 human cancer cell lines proved that Lemongrass oil “has a promising anticancer activity and causes loss in tumor cell viability by activating the apoptotic process as identified by electron microscopy.” Certain other studies also state that the presence of a-limonene and geraniol showed inhibition of cancer cells in intestinal mucous membrane and liver in mice.
Excess of pitta energy causes cholera, flatulence, intestinal gas and weak digestion. Lemongrass essential oil reduces pitta dosha and normalizes the process of digestion. Gently massaging your abdomen with 2 drops of Lemongrass oil blended with 1 ml of sesame oil will assist in improving digestion. Inhaling the aroma of this oil by applying 1 drop of Lemongrass oil on your wrist or to your hankie can stimulate weak digestion.
6. Treats obesity and depression:
Obesity is a universal problem and excess of kapha dosha causes fluid retention, excess deposits of fat and stagnation of water and other toxic substances in the body. Stress, tension and depression also cause metabolic changes and contribute to obesity. Lemongrass essential oil lessens kapha dosha by decreasing the appetite, removing excess water and fat deposits from the body through urine and sweat.
A study by the Department of Nutritional Sciences of University of Wisconsin studied the effect of Lemongrass and cholesterol in 22 people with high levels of cholesterol where they took 140mg of lemongrass oil capsules daily. This study came up with an amazing result where the cholesterol level was reduced from 310 to 294 on an average basis, which was a significant amount of decrease in the amount of blood fats.
Using 5 drops of Lemongrass oil blended with 2.5 ml of coconut oil as a massage oil or 3 drops of this oil added to warm bathing water can help in discharging excess fat, water and fluid retention in your body and helps you in reducing your excess weight.
In the book ‘Ayurveda and Aromatherapy’, Bryan Miller states that Lemongrass essential oil is an excellent antidepressant oil that can assist in alleviating stress, depression, fatigue, negative feelings, emotional trauma and distress. Using 2 drops of Lemongrass oil in vaporizer, burner or diffuser can assist in driving away negative emotions, insomnia, loneliness, emotional instability, mental stagnation and lack of self-confidence.
The Journal of Ethno pharmacology published a 2011 study, which stated that Lemongrass essential oil possess anti-anxiety properties that would aid in lessening anxiety by stimulating the brain levels of the neurotransmitter gamma-amino butyric acid.
Other health benefits:
Lemongrass essential oil is also a great natural remedy for treating menstrual problems and its galactogogue properties help improve the quality and quantity of breast milk in nursing mothers. It is a trusted insect repellant and can also serve as a natural air freshener with its refreshing aroma.
Disclaimer:
Pure and organic essential oils are highly concentrated liquids so never take them internally. Always remember to dilute essential oils before using it topically. This article is only for the purpose of education and is not meant to diagnose or replace any prescribed medicines or professional advice. Consult your Ayurvedic practitioner before using essential oils that would fit your unique individual constitution and state of health.
The MSDS (Material Safety Data Sheet) of Lemongrass oil is readily available for your enhanced safety and optimal usage.
Gas Chromatography Report of Lemongrass essential oil
Thought for the day:
Knowing trees, I understand the meaning of patience. Knowing grass, I can appreciate persistence.
-Hal Borland
Suggested Reading:
1. HEALING POWERS OF LEMONGRASS OIL (The Aromatherapy Professional) by KG Stiles
2. The Encyclopedia of Essential Oils: The Complete Guide to the Use of Aromatic Oils In Aromatherapy, Herbalism, Health, and Well Being by Julia Lawless
3. Skin Delivery of Lemongrass Oil by Microemulsion Technique: Herbal formulation for Acne Vulgaris by Md Faiyazuddin, Sanjula Baboota
4. Lemongrass Essential Oils: Biosynthesis and Regulation by Deepak Ganjewala
Reference Links:
1. Antifungal activity of the lemongrass oil and citral against Candida spp by Silva Cde B, Guterres SS, Weisheimer V, Schapoval EE published in PubMed
2. Health Benefits of Lemongrass Essential Oil by Organic Facts
3. Anticancer activity of an essential oil from Cymbopogon flexuosus by Sharma PR, Mondhe DM, Muthiah S, Pal HC, Shahi AK, Saxena AK, Qazi GN, Indian Institute of Integrative Medicine, India published in PubMed
4. Lemongrass Health Benefits and Healing Properties by PlanetWell Ayurvedic Wellness
5. Lemongrass Herbal Medicine by Medical Health Guide
|
Click here to Skip to main content
12,951,983 members (58,541 online)
Click here to Skip to main content
Add your own
alternative version
Stats
70.2K views
38 bookmarked
Posted 22 May 2008
Quick Start for C++ TR1 Regular Expressions
, 26 Jun 2014 BSD
Rate this:
Please Sign up or sign in to vote.
This article answers some of the first questions that come up when using regular expressions in C++ TR1
Introduction
Regular expression syntax is fairly similar across many environments. However, the way you use regular expressions varies greatly. For example, once you've crafted your regular expression, how do you use it to find a match or replace text? It's easy to find detailed API documentation, once you know what API to look up. Figuring out where to start is often the hardest part.
This article assumes you're familiar with regular expressions and want to work with regular expressions in C++ using the Technical Report 1 (TR1) proposed extensions to the C++ Standard Library. It's a quick start guide, briefly answering some of the first questions you're likely to ask. For more details, see Getting started with C++ TR1 regular expressions or dive into the documentation that comes with your implementation.
Quick Start Questions
Q: Where Can I Get TR1?
A: Support for TR1 extensions in Visual Studio 2008 is added as a feature pack. Other implementations include the Boost and Dinkumware. The GNU compiler gcc added support for TR1 regular expressions in version 4.3.0.
Q: What Regular Expression Flavors are Supported?
A: It depends on your implementation. Visual Studio 2008 supports these options: basic, extended, ECMAScript, awk, grep, egrep.
Q: What Header Do I Include?
A: <regex>
Q: What Namespace are Things In?
A: std::tr1
This is the namespace for the regex class and functions such as regex_search. Flags are contained in the nested namespace std::tr1::regex_constants.
Q: How Do I Do a Match?
A: Construct a regex object and pass it to regex_search.
For example:
std::string str = "Hello world";
std::tr1::regex rx("ello");
assert( regex_search(str.begin(), str.end(), rx) );
The function regex_search returns true because str contains the pattern ello. Note that regex_match would return false in the example above because it tests whether the entire string matches the regular expression. regex_search behaves more like most people expect when testing for a match.
Q: How Do I Retrieve a Match?
A: Use a form of regex_search that takes a match_result object as a parameter.
For example, the following code searches for <h> tags and prints the level and tag contents.
std::tr1::cmatch res;
str = "<h2>Egg prices</h2>";
std::tr1::regex rx("<h(.)>([^<]+)");
std::tr1::regex_search(str.c_str(), res, rx);
std::cout << res[1] << ". " << res[2] << "\n";
This code would print 2. Egg prices. The example uses cmatch, a typedef provided by the library for match_results<const char* cmatch>.
Q: How Do I Do a Replace?
A: Use regex_replace.
The following code will replace “world” in the string “Hello world” with “planet”. The string str2 will contain “Hello planet” and the string str will remain unchanged.
std::string str = "Hello world";
std::tr1::regex rx("world");
std::string replacement = "planet";
std::string str2 = std::tr1::regex_replace(str, rx, replacement);
Note that regex_replace does not change its arguments, unlike the Perl command s/world/planet/. Note also that the third argument to regex_replace must be a string class and not a string literal.
Q: How Do I Do a Global Replace?
A: The function regex_replace does global replacements by default.
Q: How Do I Keep From Doing a Global Replace?
A: Use the format_first_only flag with regex_replace.
The fully qualified name for the flag is std::tr1::regex_constants::format_first_only and would be the fourth argument to regex_replace.
Q: How Do I Make a Regular Expression Case-insensitive?
A: Use the icase flag as a parameter to the regex constructor.
The fully qualified name of the flag is std::tr1::regex_constants::icase.
History
• 22nd May, 2008: Initial post
• 23rd May, 2008: Added examples
License
This article, along with any associated source code and files, is licensed under The BSD License
Share
About the Author
John D. Cook
Singular Value Consulting
United States United States
I am an independent consultant in software development and applied mathematics. I help companies learn from their data to make better decisions.
Check out my blog or send me a note.
You may also be interested in...
Comments and Discussions
SuggestionMake a regular expression case-insensitive Pin
吴志远16-Apr-15 3:49
member吴志远16-Apr-15 3:49
GeneralMy vote of 5 Pin
Manikandan1029-Jun-14 0:02
professionalManikandan1029-Jun-14 0:02
GeneralMy vote of 3 Pin
Mandar D. Sahasrabuddhe21-Oct-13 1:53
memberMandar D. Sahasrabuddhe21-Oct-13 1:53
Generalregex_replace Pin
pribylf10-Apr-12 19:11
memberpribylf10-Apr-12 19:11
GeneralMy vote of 3 Pin
gomons10-Mar-12 21:33
membergomons10-Mar-12 21:33
GeneralFind position of sub string inside a given string. /os: VS/vc++(2005) win/xp Pin
meirab30-Jan-09 12:30
membermeirab30-Jan-09 12:30
In: http://www.boost.org/doc/libs/1_37_0/doc/html/string_algo/usage.html#id3676944
there is an example: Find Iterator
= = = = = = = = = = = = = = = = = = = = = = = = = = = = = =
string str1("abc-*-ABC-*-aBc");
// Find all 'abc' substrings (ignoring the case)
// Create a find_iterator
typedef find_iterator<string::iterator> string_find_iterator;
for(string_find_iterator It=
make_find_iterator(str1, first_finder("abc", is_iequal()));
It!=string_find_iterator();
++It)
{
cout << copy_range<std::string>(*It) << endl;
}
// Output will be:
// abc
// ABC
// aBC
= = = = = = = = = = = = = = = = = = = = = = = = = = = = = =
i need help in finding the position of substring inside a given string.
the demo program uses www.boost.org string routine.
(so it must be installed in order to find the place where sub programs store the position)
i need the (begin end) position at every iteration of the loop.
thank you.
here is the program:
#include "stdafx.h"
#include <fstream>
#include <iostream>
#include <iterator>
#include <boost/algorithm/string.hpp>
using namespace std;
using namespace boost;
void count_ss(std::string& s )
{
//This sample code searches for every instance of the string "<bbb" in a given string
//and counts the total number of instances:
int i = 0;
int ss_appearances = 0;
int ss_end_appearances = 0;
// Find all '<bbb' substrings (ignoring the case)
// Create a find_iterator
typedef find_iterator<string::iterator> string_find_iterator;
for (string_find_iterator It =
make_find_iterator(s, first_finder("<bbb", is_iequal()));
It != string_find_iterator();
++It )
{
cout << copy_range <std::string>(*It) << endl;
ss_appearances++;
}
cout << ss_appearances << endl;
}
int main(int argc, char** argv)
{
string str1("<bbb-abc-<bbb-*-<bbb-ABC-*<bbb-aBc");
count_ss(str1 );
return 0;
}
GeneralAdditional info Pin
Sergey Sotnikov18-Nov-08 21:22
memberSergey Sotnikov18-Nov-08 21:22
Questionhow to set singleline option ? Pin
flyingxu15-Nov-08 17:36
memberflyingxu15-Nov-08 17:36
GeneralYour blog article is quite good Pin
CodeWizard195123-May-08 7:14
memberCodeWizard195123-May-08 7:14
GeneralMore info Pin
Chris Maunder22-May-08 17:15
adminChris Maunder22-May-08 17:15
GeneralRe: More info Pin
John D. Cook23-May-08 0:13
memberJohn D. Cook23-May-08 0:13
GeneralRe: More info Pin
Maximilien23-May-08 4:30
memberMaximilien23-May-08 4:30
General General News News Suggestion Suggestion Question Question Bug Bug Answer Answer Joke Joke Praise Praise Rant Rant Admin Admin
Use Ctrl+Left/Right to switch messages, Ctrl+Up/Down to switch threads, Ctrl+Shift+Left/Right to switch pages.
Permalink | Advertise | Privacy | Terms of Use | Mobile
Web01 | 2.8.170525.1 | Last Updated 26 Jun 2014
Article Copyright 2008 by John D. Cook
Everything else Copyright © CodeProject, 1999-2017
Layout: fixed | fluid
|
What is it about?
1. Exogenous IAA and ABA proved to enhance the low-K-tolerance of sweetpotato. 2. The reason is that they improve the physiological functions of leaves and roots. 3. IAA and ABA have different role on cultivars with different tolerance to K+ deficiency.
Featured Image
Why is it important?
little is known about the favorable role of exogenous hormones in K+ deficiency conditions.
Perspectives
It is practically interesting to investigate the effect of exogenous hormones on the alleviation of K+ deficiency stress.
Ming Liu
Read the Original
This page is a summary of: Regulation of leaf and root physiology of sweet potato (Ipomoea batatas [L.] Lam.) with exogenous hormones under potassium deficiency stress, Archives of Agronomy and Soil Science, June 2019, Taylor & Francis, DOI: 10.1080/03650340.2019.1628346.
You can read the full text:
Read
Resources
Contributors
The following have contributed to this page
|
Dry Cell: How to do it right (infographic)
Some current smartphones are protected against water, but this is the exception. If your phone is not protected but again falls into the water, you should consider the following steps to dry it properly and thus may be saved.
Dry Cell: How to do it right (infographic)
Apparently there are some people who leave their phone falls into the toilet. But also on other (and "more pleasant") ways the device can be wet. For example, by very heavy rain, in the pool, etc. Of course, the mobile phone should be dried immediately, while there are, however, aware of certain things.
Dry Cell: How to do it right
A fallen into Wassser smartphone does not have to be the same broken. Although the probability is given, but who knows the emergency measures, has a good chance to save his cell phone.
The following infographic shows in nine steps, which should just have done, and note when the smartphone has entered the dangerous waters. So impressed you the steps good one. For simplicity, we have the individual points below the graph also translated again.
Wet Cell Phone? here
1. Take the phone instantly from the liquid
2. Not pressing any button
3. Remove the battery from the device, if possible
4. Remove the cover and all potentially connected peripheral devices
5. Remove the SIM card and inserted microSD card
6. Let the ports and open covers
7. Dries everything with a towel
8. Sets euere phone in a bowl of uncooked rice
9. Tries after 24-48 hours, turn on your phone, for now it should be dry.
Cell dry: Other Useful Tips
• drying Do not try your phone with a hair dryer because the heat can cause nadern problems and damage.
• Should you can not remove it from the device's battery, trying carefully to check if the device is still on. If so, turns it off.
• To avoid consequential damage caused by corrosion of the visit could pay off in a mobile phone repair shop (depending on the value of the unit).
• not trying to build your mobile phone / smartphone apart because their loses your warranty claim.
Product Image: Sony
14.11.2017
Posted In: Android
map
|
(346s) Hierarchical Assembly of Peptoids into Complex Nanostructures
Authors:
Alamdari, S., University of Washington
Pfaendtner, J., University of Washington
Peptoids are complex and diverse oligomeric structures which have been explored for a number of applications including drug molecules, surfactants of catalysts.1-2 In contrast to their amino-acid composed peptide counterparts they are highly flexible and diverse, spanning a large design space of chemical and structural functionality through the careful tuning of their side chains. One novel example of this is the N-substituted α-chiral, aromatic side chains oligomers which can produce stable helical structures in both aqueous and non-aqueous solutions.3 These oligomers have been shown to have the capacity to assemble into more complex hierarchical assemblies like microspheres, nanosheets, and dynamic single-walled nanotube structures.4 However, little is known about the mechanisms of these assemblies. Molecular dynamics provide an opportunity to understand this dynamic behavior at an atomistic-level of detail. Here we present our extension of the MFTOID peptoid forcefield5 to investigate the mechanisms that give rise to these unique complex assemblies.
[1] Dohm MT, Kapoor R, Barron AE. Peptoids: Bio-Inspired Polymers as Potential Pharmaceuticals. Curr. Pharm. 2011, 47 (17), 2732
[2] Maayan G, Ward MD, Kirshenbaum K. Folded biomimetic oligomers for enantioselective catalysis. Proc Natl Acad Sci 2019, 106(33):13679-84
[3] Wu C, Sanborn S, Huang K, Zuckermann RN, Barron AE. Peptoid Oligomers with α-Chiral, Aromatic Side Chains: Sequence Requirements for the Formation of Stable Peptoid Helices. J. Am. Chem. Soc. 2001, 123, 28, 6778-6784
[4] Weiser LJ, Santiso EE, Molecular modeling studies of peptoid polymers. AIMS Materials Science, 2017 4(5): 1029-1051.
[5] Mirijanian DT, Mannige RV, Zuckermann RN, et al. Development and use of an atomistic CHARMM-based forcefield for peptoid simulation. J Comput Chem. 2014. 35: 360–370
Topics:
|
Extract string between two tokens inside a text in bash shell scripting
The other day, as a total newbye, I was writing a script in bash to process an HTML page, look for a URL inside it, and then download the content at that URL, recursively for a series of pages; I had it already done in AutoHotKey language, but since I don’t keep my Windows workstation always on, while my linux homeserver is, I decided I was better off learning a little of bash language to make the procedure more efficient.
In this script I need to extract a segment of string between two known “tokens”, in order to get the needed URL off the HTML page; in AutoHotKey I saved the string position inside the text for both of the tokens, and then did a precalculated substring operation between those two offsets, and was obviously looking to do the same in bash, as I was translating step-by-step from AutoHotKey.
With my big surprise, this is not possible, as the only operation to search for a string inside another string, actually searches only for the first occurrence of the first caracter of the key string; in other words, you can search for “my” inside “The mellow fur of my cat is brown”, but the result would be 4, and not the expected 18, because as said expr index "$string" $substring only matches the first character of substring, hence the first position of “m” inside the string.
Now, I didn’t really care to find the position of those tokens, I only cared about the string in the middle, so any other operation that did the trick was fine; alas, I realized it only after about a hour of wasting time, but in the end I came up with the solution, and I am publishing it here to save time to other wanderers.
It basically consists in stripping from the string everything that is before the first token (including first token), and then stripping, from the result of this first operation, everything that is after the second token (including the second token):
#variables declaration
text="longtexttoprocess"
firsttoken="something"
secondtoken="somethingelse"
#actual processing
middlestring=${text#*$firsttoken}
middlestring=${middlestring%%$secondtoken*}
This returns $middlestring as the string contained between the first occurrence of $firsttoken (single # symbol), and the first occurrence of $secondtoken (double %% symbol, indicating the farthest occurrence from the end of string).
One thought on “Extract string between two tokens inside a text in bash shell scripting”
Leave a Reply
Your email address will not be published. Required fields are marked *
|
Andreas Hille
Das unstetige Galerkin-Verfahren in der Nanooptik
Dokumente und Dateien
Hinweis
Bitte nutzen Sie beim Zitieren immer folgende Url:
http://nbn-resolving.de/urn:nbn:de:bsz:14-qucosa-104464
Kurzfassung in Deutsch
Die Nanooptik beschäftigt sich mit der Wechselwirkung von Licht mit Materie, deren charakteristische Dimension im Nanometer Bereich liegt. Insbesondere wenn die Materie aus Metall besteht, zeigen sich interessante, wellenlängenabhängige Unterschiede in der Stärke der Wechselwirkung. Die Ursache dafür sind die kollektiven Moden der quasifreien Ladungsträger, die Plasmonen. Obgleich sich experimentelle Methoden in den letzten Jahren stetig verbessert haben, ist es nach wie vor nur mit erheblichem Aufwand möglich, sich Einblicke in die mikroskopischen Zusammenhänge zu verschaffen. Eine Ergänzung zu den Experimenten bieten theoretische Modelle. Auf Grund der sich mit der Zeit stetig verbesserten Leistung der Rechentechnik, kommen dabei zunehmend numerische Verfahren zum Einsatz. Eines dieser Verfahren ist das Unstetige Galerkin Verfahren, welches in dieser Arbeit auf folgende Fragestellungen der plasmonischen Nanooptik angewandt wurde:
• Bei dem unstetigen Galerkin Verfahren werden die zu simulierenden Körper üblicherweise mittels Dreiecke und Tetraeder approximiert. Da die Geometrie der metallischen Systeme einen entscheidenden Einfluss auf die Wechselwirkung hat, wurde untersucht, inwieweit sich durch Einsatz von Elementen mit gekrümmten Flächen die Genauigkeit oder die Geschwindigkeit der Simulation steigern lässt. Es konnte gezeigt werden, dass runde Elemente die Genauigkeit bei gleicher Diskretisierung um bis zu zwei Größenordnungen steigern oder die Rechenzeit bei gleicher Genauigkeit auf ein Sechstel verkürzen können.
• Bestrahlt man Metallnanopartikel mit intensiven Laserpulsen, so strahlen diese nicht nur bei der Frequenz des eingestrahlten Lichtes, sondern auch bei der doppelten Frequenz ab. Dieses Phänomen der Frequenzverdopplung (SHG, engl.: „Second-Harmonic-Generation“) ist unter anderem von der Form der Partikel und der Wellenlänge des Pulses abhängig. Da durchstimmbare gepulste Laser sehr teuer sind, wurde untersucht, ob sich mit Hilfe der linearen Partikelspektren Vorhersagen über die Stärke der Frequenzverdopplung machen lassen. Dabei wurde festgestellt, dass die Effizienz der Frequenzverdopplung zunimmt, wenn man die linearen Resonanzen der Partikel auf die SHG- oder Anregungswellenlänge abstimmt. Schafft man es, das plasmonische System so einzustellen, dass sowohl die Anregungswellenlänge, wie auch die SHG- Wellenlänge auf einer linearen Resonanz liegen, so kann die Effizienz der SHG weiter gesteigert werden.
Kurzfassung in Englisch
Nanooptics is a discipline dealing with the interaction of light with matter where its characteristic dimensions are defined to be in the range of nanometers. In particular, if the matter consists of metal, i.e. conductive material, interesting wavelength dependent phenomena can be observed, which scale with the strength of the interaction. These phenomena are caused by the formation of collective modes between quasi-free charge carriers resulting in so called plasmons. Although improved experimental methods have evolved over the last few years, insight into the microscopic relationship between light and matter is only achievable with high effort. Supplemental information to experimental findings can be drawn from theoretical models. Due to the constantly improving computational power, numerical methods are progressively more employed. One of these methods is the discontinuous Galerkin method, which was applied to the following problems in plasmonic nanooptics:
• Within the discontinuous Galerkin method the simulated objects are usually approximated by triangles or tetrahedrons. Since the geometry of conductive systems has a major impact on the interaction between light and matter, the usability of elements with curved surfaces for the discretisation of the space has been investigated with respect to accuracy and speed of the simulation. In this work, it could be shown that curved elements improve the simulations precision up to two orders of magnitude with the same amount of discretisation compared to linear elements. Related to speed, it has been found that the computational time is reduced by a factor of 6 with a comparable simulation accuracy.
• By irradiating metallic nanoparticles with high power laser pulses these particles do not only emit light of the same frequency as the incident electromagnetic wave, but also with the doubled frequency (SHG, second harmonic generation). Among other things, this phenomenon of frequency doubling mainly depends on the geometry of the particle and the wavelength of the pulse. Since tunable pulsed laser sources are very expensive, it has been theoretically investigated if the strength of the frequency doubling can be deduced from the particles linear spectra. By this, it has been discovered that the efficiency of frequency doubling can be improved by adjusting the linear resonances of the particle to the SHG or excitation wavelength. The SHG efficiency can be increased even further, if the plasmonic system is tuned to a point where both the excitation and the SHG wavelength correspond to a linear resonance of the nanoparticle.
weitere Metadaten
Schlagwörter
(Deutsch)
unstetiges Galerkin Verfahren, Frequenzverdopplung, runde Elemente, Nanooptik, Plasmonik
Schlagwörter
(Englisch)
discontinuous galerkin, second harmonic generation, curved elements, nanooptic, plasmonic
DDC Klassifikation530
RVK KlassifikationUH 5690
Institution(en)
HochschuleTechnische Universität Dresden
FakultätFakultät Mathematik und Naturwissenschaften
ProfessurProfessur für Experimentalphysik/Photophysik/Nanooptik
BetreuerProf. Dr. phil. II. Lukas M. Eng
GutachterProf. Dr. phil. II. Lukas M. Eng
Prof. Dr. rer. nat. Kurt Busch
DokumententypDissertation
SpracheDeutsch
Tag d. Einreichung (bei der Fakultät)12.09.2012
Tag d. Verteidigung / Kolloquiums / Prüfung21.12.2012
Veröffentlichungsdatum (online)08.03.2013
persistente URNurn:nbn:de:bsz:14-qucosa-104464
Hinweis zum Urheberrecht
Diese Website ist eine Installation von Qucosa - Quality Content of Saxony!
Sächsische Landesbibliothek Staats- und Universitätsbibliothek Dresden
|
Take the 2-minute tour ×
Stack Overflow is a question and answer site for professional and enthusiast programmers. It's 100% free, no registration required.
I'm writing standards compliant XHTML Strict 1.0, so including the HTML "target" attribute on anchor elements will not do.
I've read 2 fundamentally different ways using Javascript:
1. Upon document load, find all links with rel='external' and append the target='_blank' attribute.
2. Use the HTML onClick attribute that fires a Javascript popup(this) function, which opens windows with window.open().
These methods are now 5-6 years old, so I'm hoping things have solidified since then. What's the best way to do this?
share|improve this question
1
target="_blank" has been, to my knowledge, deprecated for some time. You should avoid using it. – Evan Jun 30 '09 at 20:08
3 Answers 3
up vote 0 down vote accepted
With JQuery and Iframes (or an object instead)
share|improve this answer
Why is a jQuery answer the accepted one? The question specifically asks "standards compliant... with XHTML and Javascript". – HNL Jul 25 at 3:51
There is no new way of doing this, so what you already have found is what there is.
The first method is kind of cheating. You are using Javascript to put non-standard markup in the page after it has loaded, just so that the initially loaded markup will be valid. Once the script has run, the code isn't valid any more.
The second method seems better also from another perspective. The links will work as intended instantly when the page loads, compared to the first method that will not change the links until after all content on the page has loaded. If a user is quick and clicks a link before the last image has been loaded, you still want it to go to a new window.
share|improve this answer
Full-blown pop-up windows are often blocked by modern browsers.
If you want a nice, cross-platform way to create nice light-weight "pop-up" windows (actually they share their parent window) then maybe use a JavaScript widget library like ExtJs.
Here's how I create my "Help" popups in my JavaScript app.
// Loads help for just one window, i.e. non-tabbed.
function helpShow (help_filename, help_title) {
if (! help_filename) { return; }
var help_url = '/edit/help/' + help_filename + '.html';
if (help_window == null) {
help_window = new Ext.Window ({
title: help_title,
autoLoad: help_url,
autoScroll: true,
closeAction: 'hide',
width: 460,
height: 600,
items: new Ext.Panel ()
});
}
help_window.setVisible (true);
}
Some CCS makes them prettier too.
share|improve this answer
Your Answer
discard
By posting your answer, you agree to the privacy policy and terms of service.
Not the answer you're looking for? Browse other questions tagged or ask your own question.
|
Helen Lazear, PhD
Assistant Professor
9021 Burnett-Womack
CB#7292
919-966-3708
Research
• Zika virus pathogenesis
• Viral and host determinants of flavivirus species tropism
• Antiviral effects of IFN-λ at anatomic barriers
• Innate immune mechanisms that restrict congenital infection
All aspects of viral infection involve interactions between viruses and their hosts and collectively these interactions determine the cells, tissues, and species that are permissive to viral infection; understanding virus-host interactions is crucial for understanding viral tropism and disease outcomes. Arthropod-borne viruses (e.g. West Nile, dengue, Zika, chikungunya, and La Crosse viruses) provide an especially interesting system because these viruses have adapted to replicate in the very different host environments of an arthropod vector (e.g. mosquito, tick) and a vertebrate host (e.g. humans, monkeys, birds). Many arboviruses pose a significant threat to human and animal health, and this impact is expected to grow as climate change, urbanization, and global trade alter the interactions between humans and arthropod vectors, making arbovirus infections prime examples of emerging and re-emerging infectious diseases.
Our goal is to understand the innate immune mechanisms that restrict arbovirus pathogenesis. The interferon system is a critical early antiviral response in vertebrates and involves many interferon subtypes signaling through shared receptors to induce antiviral gene expression programs. Our research aims to distinguish the unique properties of different interferons and the mechanisms by which they control viral infections.
Zika virus pathogenesis
Zika virus (ZIKV) is a mosquito-borne flavivirus that recently was introduced to the Western Hemisphere. Since it was first detected in Brazil in 2015, ZIKV has spread throughout Latin America and the Caribbean. The current ZIKV epidemic in the Americas has featured new, more severe, disease presentations the most significant of which is the ability of ZIKV to cause birth defects.
We are using molecular virology approaches and mouse models of pathogenesis to compare historical and contemporary ZIKV strains to identify viral determinants of pathogenesis. We also seek to understand the innate immune mechanisms that control ZIKV invasion into specialized tissue compartments, such as the central nervous system, eye, testes, and fetal compartment. In other studies, we are evaluating antibody responses to ZIKV with the goal of understanding antibody-mediated control and enhancement of ZIKV disease, particularly in the context of prior flavivirus immunity, as well as how antibody-mediated protection from sexually transmitted ZIKV may differ from mosquito transmitted infection.
Viral and host determinants of flavivirus species tropism
While we are most familiar with the mosquito-borne flaviviruses that cause human disease (e.g. West Nile virus, dengue virus, and Zika virus), this genus includes viruses with diverse host tropisms, including vectored viruses (mosquito-borne and tick-borne), insect-specific (vertically transmitted between insects, no vertebrate host), and vertebrate-specific (no replication in insect cells, no known arthropod vector). For the most part, host range is reflected in the phylogeny of these viruses, but there are several exceptions which imply that throughout flavivirus evolution there have been multiple instances in which a previously insect-specific virus acquired the ability to transmit to a vertebrate host, as well as multiple instances in which a previously vectored virus acquired the ability to transmit directly between vertebrates, without an arthropod vector. Such host range shifts provide an opportunity for the emergence of new pathogens, yet we do not fully understand the viral and host factors that determine flavivirus host tropism. We are using molecular virology approaches to address this question, with a particular focus on vertebrate-specific flaviviruses and understanding what restricts replication of these viruses in arthropod cells. Interestingly, nearly all vertebrate-specific flaviviruses were isolated originally from bats. This unusual host relationship provides an opportunity to study bat virology and bat immunology. There is a growing interest in bat antiviral immunity because bats serve as reservoir hosts for many viruses (e.g. Marburg virus, Nipah virus, and SARS coronavirus). We are interested in aspects of the bat antiviral response, particularly their interferon system, which may contribute to their ability to resist pathogenesis from diverse viruses.
Antiviral effects of IFN-λ at anatomic barriers
Interferon lambda (type III IFN, IL-28/IL-29) activates a similar antiviral transcriptional program as IFN-α/β (type I IFN), but uses a distinct receptor. Previous work has shown that IFN-λ can restrict West Nile virus neuroinvasion by tightening the blood-brain barrier, and we are currently determining its effects on other neuroinvasive arboviruses, including Japanese encephalitis virus. Since the IFN-λ receptor is highly expressed at epithelial surfaces, we are investigating its antiviral effects in the skin, an important site of infection for arboviruses. We are also studying the effects of IFN-λ in the skin in the context of herpes simplex virus infection and atopic dermatitis.
Innate immune mechanisms that restrict congenital infection
Substantial evidence now demonstrates that Zika virus infection during pregnancy can result in fetal infection and a spectrum of developmental defects, including microcephaly. However many questions remain, including: how does gestational stage affect the probability of fetal infection and the range of possible outcomes? What is the spectrum of conditions resulting from congenital ZIKV infection? And what viral, genetic, immunological, and environmental factors contribute to the risk of congenital ZIKV syndrome? While the placenta provides a protective barrier between the fetus and maternal circulation, a small number of pathogens, including ZIKV, are able to circumvent this barrier and access the fetal compartment. We are interested in understanding the innate immune mechanisms, particularly interferon responses, that prevent pathogens from crossing the placenta, as well as understanding the mechanisms by which viruses damage the developing fetus once they have circumvented this barrier.
Selected Publications
1. Lazear HM, Diamond MS (2016) Zika Virus: New Clinical Syndromes and its Emergence in the Western Hemisphere. Journal of Virology. 90(10):4864-75.
2. Coyne CB and HM Lazear (2016) Zika virus – reigniting the TORCH. Nature Reviews Microbiology. 14(11):707-715.
3. Lazear HM, Stringer EM, de Silva AM (2016) The Emerging Zika Virus Epidemic in the Americas: Research Priorities. Journal of the American Medical Association. 315(18):1945-6.
4. Lazear HM, Govero J, Smith AM, Platt DJ, Fernandez E, Miner JJ, Diamond MS (2016) A Mouse model of Zika virus pathogenesis. Cell Host and Microbe. 19(5):720-30.
5. Lazear HM, Nice TJ, Diamond MS (2015) Interferon-λ: Immune Functions at Barrier Surfaces and Beyond. Immunity. 43(1):15-28.
6. Lazear HM, Daniels BP, Pinto AK, Huang AC, Vick SC, Doyle SE, Gale M Jr, Klein RS, Diamond MS (2015) Interferon lambda restricts West Nile virus neuroinvasion by tightening the blood-brain barrier. Science Translational Medicine. 7(284):284ra59.
7. Lazear HM, Diamond MS (2015) New insights into innate immune restriction of West Nile virus infection. Current Opinion in Virology. 11:1-6.
8. Lazear HM, Lancaster A, Wilkins C, Suthar MS, Huang A, Vick SC, Clepper L, Thackray LB, Brassil MM, Virgin HW, Nikolich-Zugich J, Moses AV, Gale M Jr, Fruh K, Diamond MS (2013) IRF-3, IRF-5, and IRF-7 coordinately regulate the type I IFN response in myeloid dendritic cells downstream of MAVS signaling. PLoS Pathogens. 9(1): e1003118.
9. Lazear HM, Pinto AK, Vogt MR, Gale M Jr, Diamond MS (2011) Beta interferon controls West Nile virus infection and pathogenesis in mice. Journal of Virology. 85:7186-7194.
10. McGraw HM, Friedman HM (2009) Glycoprotein E mediates HSV-1 spread between epithelial cells and neurites. Journal of Virology. 83(10):4791-9.
Complete list of publications
|
Amur Falcon
Falco amurensis
The Amur Falcon is a summer (October to May) visitor to South Africa, particularly the eastern half of the country, migrating in their thousands over enormous distances of over 11,000km to get here from their Asian (Siberia, Mongolia, China, Korea) breeding grounds – among the longest distances migrated by any raptors. They live in open country, preferring grasslands, open savannas and agricultural areas, and feed on a wide variety of larger insects and occasionally small birds, mammals and frogs. Adults measure around 30cm in length and weigh about 140g.
Amur Falcons are usually seen in large flocks sitting on telephone wires and fencelines and sleeping in colonies that may number into the tens of thousands in high trees, often exotics standing in towns and cities.
The IUCN considers the Amur Falcon to be of least concern, though they are hunted extensively while migrating.
30 thoughts on “Amur Falcon
1. naturebackin
You and Joubert have lovely images of this handsome little raptor. Those long migrations never cease to astound me. So tragic they are hunted (and so needlessly too) while undertaking their arduous migrations.
Liked by 1 person
Reply
2. Joanne Sisco
Why would anyone want to hunt this bird? At first glance of the opening photo, I thought it looked rather owlish. I can’t imagine seeing large flocks of them together. He looks like a handsome little guy.
Liked by 1 person
Reply
Please don't leave without sharing your thoughts?
Fill in your details below or click an icon to log in:
WordPress.com Logo
You are commenting using your WordPress.com account. Log Out / Change )
Google photo
You are commenting using your Google account. Log Out / Change )
Twitter picture
You are commenting using your Twitter account. Log Out / Change )
Facebook photo
You are commenting using your Facebook account. Log Out / Change )
Connecting to %s
This site uses Akismet to reduce spam. Learn how your comment data is processed.
|
Skip to end of metadata
Go to start of metadata
Element names
This is a quick visual overview of the various FileMaker elements such as tables, fields, layouts, scripts, functions and other objects. Each element of FileMaker has its own subsection below.
Tablename
dataFieldName
summaryCountField
GLOBALFIELD
CLIPBOARD (is a reserved temporary global field)
%unstoredDisplayCalculation
id (is the primary key in all tables)
id_Tablename (is a foreign key)
$variableName
$$GLOBAL.VARIABLE
FunctionalArea » Tablename
@Tablename (is the name for developer table occurrences)
Tablename: Layout Name (form|list)
portal.layoutObjectName
Script Name
Script Name ( with ; parameters )
CustomFunction
~PrivateCustomFunction
~locallyScopedLetVariable
$~privateVariableName
$$~PRIVATE.GLOBAL.VARIABLE
Developer note
The primary goal of these naming conventions is to create highly readable code. Concerns related to brevity are superseded by clarity and maintainability. These naming standards are also specific to FileMaker Client development. They do not address Web, Mobile or SQL based deployment. For more information related to these aspects of FileMaker then read about Solution development models
Table naming
Table occurrence naming
Field naming
Variable naming
Layout naming
Script naming
Custom function naming
• No labels
1. Anonymous
(I'd like not to be anonymous, but the sign up doesn't appear to work...)
I think there may be a small issue relating to scripts. I use the Alexander Zueiv's #params_to_local_vars ( ) function for stripping out parameters from the script name e.g.
which I strongly believe makes the scripts more portable, and clearer to understand.
So firstly, I think your coding convention should allow for [] or ().
Given that you don't need to pass globals into a script I don't think that the length of the dotted globals will affect things, but it should be noted that there is a limit to the length of a script name...
dd at dyce dot com
1. Hey dd, I too used Alexander's params to local vars function. You can see it here.
However, when you look at many other programming languages, the use of brackets is never used for function declarations. I don't know exactly why he chose them, but I opted to switch to parens because it's more common and something you're used to when reading code quickly. Having to 'interpret' the [ ] even though you know it's used for parameters slows you down. Plus, FileMaker already has the use of [ ] for repetitions ( e.g FunctionalArea » Tablename::repeatingFieldName[2] )
With regards to specifying optional parameters, this is something we can debate if it should be used. Recently, I started using a simplified variation of script parameters. I only specify the absolute required inbound parameters for the script to function. However, I do allow additional parameters to be passed in. For these parameters, I am documenting their availability within the script header such as this.
Script name Handle Error ( errorNum, scriptName )
#
# ==============================================
# Purpose: Error handler
# Parameters:
# ---------------------------
# $errorNum = (num) error number FMP or override
# $scriptName = (string) name of script which had error
# $type = (enum) CL, FMP - where FMP = FileMaker, CL = CustomList
# $data = (string) any inbound error text, like from CustomList function
# ---------------------------
# Called From: (script) any
# Author: Matt Petrowsky
# Notes: none
# ==============================================
#
Note the additional optional parameters of $type and $data
Using a reserved local variable of $checkScriptName, the name of the script can optionally be used instead of absolutely used to enforce the existence of the required parameters. Taking this route didn't seem to limit the number of inbound parameters a script could accept.
One thing I kept in mind while documenting, was the fact that most all other programming languages take their parameters in an ordinal fashion. This too is a convention that is good to follow even though we can use name/value pairs. As well, other languages will take inbound parameters which are an array.
My switch from using dedicated custom functions for assigning parameters to using FileMaker's Quote function was prompted by trying to make code even more readable. Wherein, seeing this in a script call is easier to read - at least to me.
Perform Script [ “Handle Error ( error, script )”; Parameter:
List (
AppError;
"$error=" & Quote ( -CustomListError ( $result ) ); // override fmp error with CL error
"$type=" & Quote ( "CL" ); // set error type
"$data=" & Quote ( $result )
)
]
Seeing the dollar sign just sets the code apart and is very apparent as opposed to this. Where you have to determine if the key for the variable is a literal or not. I'm going for the quickest possible recognition of what things are.
Perform Script [ “Show Dialog [ method ; title; content ]”; Parameter:
# ( "method" ; "filemaker" ) &
# ( "title" ; "Successful send" ) &
# ( "content" ; "Thank you for sending!¶Your contribution will be reviewed." )
]
1. Anonymous
Hmmm. Not sure I agree, in terms of the cut and paste simplicity of buttons using named scripts with passed parameters. I have a lot of generic predefined functions that I cut and paste between projects (for say adding portal rows, moving items up and down within portals, etc.) I achieve the simplicity because I can choose to pass in calculated parameters from the button. In which case, you're only looking at the parameters anyway ;-)
In fact I think this is a case where FileMaker wins out over 'languages' that use ordinally-identified parameters...
You may not see lots of Quote() calls as obtrusive, but (comparing apples with apples);
seems easier to read, than
espcially since the name of the script actually does include the expected parameters!
Or not. :-)
dd at dyce dot com
1. True, according to how the text is shown here on the wiki, it looks cleaner. However, when scanning script calls within other scripts, you're typically scrolling to the right depending on the width of the edit script dialog box (because the script is shown as one line when editing). For buttons you do have to go into the calc dialog box but seems pretty minor to me.
It's when you're scanning that one line while editing a script that your scan for the '$' becomes more useful.
I do agree that the use of the Quote() function is redundant. But it is clear what you are passing because you always know the Quote function is starting it. Thinking about this, it would be cool to have it read even cleaner. It would require an another custom function, but I'm cool with custom functions! I'm going to apply this one to my subconscious and see if there is an even cleaner way. Maybe we'll get some other suggestions too.
1. Scanning for "$" vs. scanning for "#" in a one-line calculation doesn't make much difference to me. In one-liners, concise is usually easier to read (not a principle I generally agree with outside of one-line calcs), and the # function syntax is definitely more concise. What's especially important for readable one-liners is cutting down on the number of parentheses and anything else that nests, which Quote() doesn't help.
1. No argument about the Quote function being a bit too much - it just handled any necessary escaping without the hassle. We could make this method more concise with a wrapper function, but then you still do have the extra parens.
I'm ok with using a parameter setter custom function, it's just that I've found that seeing the $whatever is so much more natural than interpreting the # ( "literal" ; "value" ) - even though it's not that hard to interpret.
I'm also personally a BIG fan of List() because it's so much like an array.
Hybrid?
# ( "$key" ; "value" )
Simplified?
List (
"$key = value";
"$key2 = value2";
)
We'd have to write a parser (which someone is probably already using this format), but it certainly is simple and familiar.
2. Anonymous
Matt, you're waffling a little on the use of "." for the custom functions. I actually prefer the object oriented convention of object.id or params.get, params.set, params.assign. It was your suggestion after all!
Cheers!
rob p
1. Anonymous
I'm on the fence about dot notation for custom functions. FileMaker is NOT object oriented, and I don't want to confuse developers used to using object-oriented tools. However, it is helpful to group related custom functions by prefix. So I normally use and underscore delimiter instead of a dot: UUID_New, UUID_GetTimestamp( uuid ), and UUID_GetNICAddress( uuid ).
2. The reason I've flipped my waffle over is due to a few issues.
1. Because I realized that the larger mind share of custom functions created lean towards TitleCamelCase.
2. Because I realized I was confusing myself with some of my own functions. While I was standardized on "var." as the prefix for Let variables, using var.eval (my script parameter function) was confusing within code.*
see note below
3. Because I wanted very distinct differences between the use of case, dot and underscore.
4. Because it just "felt right" when looking at calculation code to see familiar looking FunctionCalls.
One variation I could see is keeping, or suggesting as an alternative, a change in case. Such that, object.id() becomes Object.Id(). The issue of going with title case does somewhat remove the confusion within code between tab.name and Tab.current, where the later is now identified as a custom function because of case. However, going this route would then mean that it would be advised to not use the reserved object names for any custom function prefix.
I think I would rather give in to using the FileMaker familiar format of TabCurrent() and get more "buy in" by those adopting the standards.
* Yes, I could have renamed my custom function var.eval() to something else, but it showed me that using a dot within object names, custom functions, let variables and global variables was a bit too broad and didn't fit the current FileMaker function method. When I came to realize that distinguishing my custom functions from internal functions wasn't that big of a deal I decided this was the better way to go. Plus, it's quite easy to rename your custom functions (wink)
3. Anonymous
I think the Script Name convention could stand to be revised in light of the fmp7script URL protocol with FileMaker Go. A script name doesn't just have to be readable in FileMaker, but in URLs. That means no spaces; "Script%20Name" is harder to recognize as "Script Name" in Manage Scripts than just "ScriptName" and "ScriptName". It also might mean not including parameters in a script name for scripts meant to be called via the fmp7script protocol — you can see exactly what variables are getting passed later in the URL.
1. Anonymous
Which means you just need a wrapper function for calling via URL and a internal function for other users, surely?
1. I've adjusted the note at the top of these naming conventions to address this issue. I also have this noted somewhere else that mentions these are naming conventions for FileMaker Client development.
The primary goal of these naming conventions is to create highly readable code. Concerns related to brevity are superseded by clarity and maintainability. These naming standards are also specific to FileMaker Client development. They do not address Web or Mobile deployment.
as seen in the note at the top of this page
The suggested development approach, at least the one I'll cover in these docs is to use a dedicated file for each of the possible platforms for deployment. This means for a mobile aspect of your solution, you would create a Mobile.fp7 file and would use External data source to reference the main or data file. Then as the comment above suggests, you could create a wrapper script which would call the primary script and would adhere to the conventions required by Web or Mobile.
Good suggestion! I'll make a note in the Script naming section.
1. Anonymous
Actually, the more I think about it, the more I wonder that there isn't a way to produce a single wrapper function, provided that the url-side is just a parameter-less Camel cased version of the Client-side version... I will look into it.
dd @ dyce dot com
4. Anonymous
I disagree on the convention for TO names. I rely on the Graph less and less lately. These days, 95.6% of my use of the Graph is to support fields that I want to show on a layout or in a Portal, so the main function of naming TOs is to facilitate this. Given that, If my base table is C__Company, and I have a distant table that's C_Person_Address (or maybe c_person_ADDRESS as I've seen some people do), the related fields are grouped nicely, and that's lost by your proposed method. While I see the problem that you're solving by reversing the structure, I think that's a much smaller problem. -MattN
1. Hey Matt, I believe you are doing the same in essence, it looks like your prefix of C__ is designed to force the sort order when choosing a TO while developing.
The proposed standard above does the same thing. The FunctionalName is supposed to be well-structured and used to collect all TOs within that functional aspect of the solution. Yes, it requires more work (because you have to think about it before you name it), but it essentially forces a degree of automatic documentation. Plus, for many tables "away" you can follow the naming prefix. In my example I showed in the video on the magazine site I used the following.
SideBar » Library
SideBarType » Sources
SideBarMissing » Sources
Where the prefix of SideBar (of which I only had one in my solution) identifies the function use of those TOs. I can see that the first is tied to the Library table and the other two are tied to the Sources table. Extending the FunctionalName by using Type and Missing give me a clue about what they do or can be used for (e.g. Type of Sources and Missing Sources).
While you do lack any identification of the absolute field used for the relationship, I've noticed that once I've stopped working on a particular aspect of a solution I end up having to make that obligitory trip back into the graph months later just to see what the keys and chain of relationships are anyway. For this reason I opted for clarity. The other two goals were to not introduce spaces or the underscore and use the » character to identify the table portion of a field reference.
One suggestion first, if this is not something you have tried and you're commenting based on first impressions, can you hack up a small little solution and try out the suggestion? Maybe make a fake Teacher/Student/Classes database using this approach?
5. Each of these elements (Tables, Fields, etc) should be broken out to an individual discussion.
1. This is certainly possible. Let's wait and get a few more people actively involved to see if this is warranted.
For right now, it's easiest to read on one page.
As a participant, make sure and read up on the wiki notation guide
1. Also note that you have access to your own Blog on this wiki where you can make notations about things. The blog is public because personal profiles are public too, so keep that in mind.
2. Anonymous
I second the motion.
Please break these elements down into different sections. This will make it easier to browse comments to the related elements.
Arnold Kegebein
arnold (at) kegebein (dot) net
3. Each major section has now been made into a subsection under this section. Comments should be made on each section. I don't know that I can move comments - I'll have to look into it.
6. Anonymous
Tables
• The name of a table should be singular. This will make it easier to read field names (Invoice::amount).
Invoice
good
Invoices
bad
• I do not fully agree with your example People / Employee. A table Employee would have its right (next to a table People) in a database, if Employee has special fields (like salary, employee id, ...). Perhaps a better definition for the table name could be:
The most generic term describing the fields within this table.
Arnold Kegebein
arnold (at) kegebein (dot) net
1. When referring to a Table::field in a calculation, we aren't always referring to data in one record. For "Sum ( Related » Invoices::amount )", the plural form is more semantically consistent. Plural form may also be one more signal distinguishing between tables and other objects. That said, the singular reference to one field in one record is definitely the more common in my experience. A stronger argument for singular table names might be that the names for foreign key fields can be more semantically accurate. "id_invoices" doesn't make much sense if it only refers to one invoice. (It may make sense for a multi-line foreign key; but that's much less common, and therefore less of a priority.)
7. Anonymous
Fields
Global Fields
I kind of like the idea to use UPPERCASE for all global fields. I did that with global fields acting as quasi constant values (for relations). I do not know, why I never did that for all global fields.
Key Fields
For my primary keys I use the field name __id. Foreign keys use two underscores and the table name, similar to your idea. My way might contradict readability, but there are some arguments for it:
• Two underscores will put the key fields on top of any field list in FileMaker, making it easier and faster to select them for relations, etc.
• It also differentiate the (internal) record id from any data related id.
package::__id < > package::id
The first field is the internal record id (unique, required), the second field an identification for the package. Perhaps not every package will have a receive an id, or an id might be reused over time.
Arnold Kegebein
arnold (at) kegebein (dot) net
1. I've used the underscore prefix for key fields too, with two underscores for the primary key and one underscore for foreign keys so the primary key always sorts above the foreign keys. The only problem I've encountered with that is that some other technologies that we might like to pull data from FileMaker don't like underscores at the beginning of field names. In SQL, you'd have to put __id in quotes to use it. I think it's a small and worthwhile price to pay, but I'm only one guy. SQL developers may have a different opinion.
8. Using a universally unique identifier is a worthwhile standard to have, but this page is labeled "Naming Conventions." Shouldn't we have another place for that?
Also, when talking about UUIDs, I think it's worth clarifying between RFC 4122 UUIDs and just any scheme for creating IDs that are universally unique. (I'd rather not standardize on RFC 4122 for Filemaker. As an essentially binary format, it's a square peg in FileMaker's round hole.)
1. Anonymous
I agree, UUID is field content and should be placed in a different section of this wiki.
But regarding the type of UUID, I do not think, this should be mandatory part of a coding standard. Recommendation perhaps, or included as additional information for interested developers, but do not make it a required standard.
Arnold Kegebein
arnold (at) kegebein (dot) net
1. I don't suggest that any particular UUID scheme be "the standard." There are several alternatives, each with their own pros and cons. But I'm trying to think of a compelling reason not to at least use one of them, and I'm coming up short. My favorites all require custom functions, which means I can't add them to a solution without FileMaker Pro Advanced; but I have FileMaker Pro Advanced, and so should other serious developers.
1. Note, I've moved UUIDs to the Key values subsection under the Naming Conventions > Field naming section.
9. With foreign keys, I imagine two competing arguments for case. One the one hand, using a lowercase version of the foreign table name (id_table) might be consistent with other lowerCamelCase field names. On the other hand, using the unedited titlecase table name (id_Table) more obviously identifies that there's a table involved. And isn't the lowercase "id_" prefix enough to be consistent with other field names? There's also one less step when calculating the field name:
vs
1. Good point. I agree, let's revise it.
10. Do we need to address file naming? It seems as if it's the most basic element to any solution.
I personally don't have any preferences or recommendations off the top, but file names are exposed via both EDS references and Open Remote... dialogs. The former being more important to the developer and the latter potentially for any user of a solution.
The only pet peeve I have is to have spaces in files names. When working via the command line it's just annoying to have to work around spaces via either escaping or quoting.
1. Anonymous
File naming? Yes, I agree. There should definitely be standard for that.
My own ref. is here:
http://www.fimano.dk/filemaker/udviklerkonventioner.html#01
In case any of you have trouble reading Danish, I will translate below :-)
- Not mentioned in original FDC, but still relevant.
- Versioning is sometimes needed. This should be on [enclosing] folder level, not to the solution file(s).
- Never change a file's name, see below.
- 1 and only 1 period in the name: FileName.fp7
- No spaces, no special chars.
- Prefix with shortname of customer / solution, like FMstd_CMS.fp7, FMstd_CMS_data.fp7
- A bug in FMP (that may or may not be fixed by now) would keep names that the file has had previously in its lifetime.
|
Author: Matt Wiseman
Winter Break Camp
Come join our camp-within-a-camp for kids with ASD. Kids go to the regular YMCA camp and check in with SPAP where we will have specially trainined counselors and volunteers. Kids participate in the main camp as much as they like, then come to the sensory area for some laid back fun. Kids can bring their electronic devices and comfort items and leave them in the sensory area. Cost is $110 a week. For information, call 727-483-1305.
What is Autism Spectrum Disorder?
Autism Spectrum Disorder affects 1 in 68 children born today. Among boys, the number is 1 in 42. ASD is a developmental disorder that presents with impaired social function and impaired communication. ASD affects information processing. People diagnosed with ASD display impairments in how their brain’s nerve cells and synapses connect and organize.
Too Much Information: ASD and Sensory Overload
After a good night’s sleep, most people with ASD start off fine. As the day wears on and fatigue sets in, they experience more and more sensory overload. Think of it like rubbing your arm. It’s okay at first, but keep it up long enough and it will become painful. Rub your arm every day for a long enough time and you might become so sensitive that even a light touch causes pain. To avoid pain, you develop Avoidance Behaviors and Resistance Behaviors to escape the discomfort. When it becomes too much, you have a Meltdown.
Source: https://www.youtube.com/watch?v=Lr4_dOorquQ
Add questions or comments in your choice of Facebook or our website. We monitor both. Facebook should be listed first, scroll down for website commenting.
Resistance Behavior Video
Resistance Behavior is common among kids with Autism Spectrum Disorder. A child displaying Resistance Behavior can become violent, injuring himself or herself, or a caregiver. Some Kids displaying Resistance Behavior will “Bolt,” meaning they will run away without regard for their safety. Bolting is very dangerous near traffic or in other places with safety hazards. Resistance Behavior and Avoidance Behavior are two sides of the same coin
Source: https://www.youtube.com/watch?v=pNYkS-2hDMw
Add questions or comments in your choice of Facebook or our website. We monitor both. Facebook should be listed first, scroll down for website commenting.
Stimming Behavior Video
Stimming is a way for a person with Autism Spectrum Disorder to focus on a single activity when his or her senses are under assault. One way to think of it is when you are feeling scared or seasick on a boat in rough seas, you might pick a point on land to stare at. Becoming hyper focused on a single point reduces the chaos pouring into your senses and calms you down.
Source: https://www.youtube.com/watch?v=4ALy6I1J1uo
Add questions or comments in your choice of Facebook or our website. We monitor both. Facebook should be listed first, scroll down for website commenting.
Meltdown Video
A “Meltdown” is the common term used by parents and therapists to describe the fight-or-flight moments when a person with Autism Spectrum Disorder displays behavior that goes well beyond a tantrum. A meltdown is not bad behavior or pouting because the child did not get his or her way — those things can trigger a meltdown. An Autism Meltdown is a whole other thing.
A Meltdown can be frightening for the child and others. A Meltdown can actually cause PTSD in both the child and people affected. Meltdowns are one reason some parents are fearful about taking their children out in public. The fear of injury and stress discourages parents. Sadly, people who see Meltdowns often make unhelpful comments about the parent or the child. (Those people are idiots!)
Helping a person in Meltdown is like trying to save a panicked swimmer. They will grab anything or do anything to be safe, and they may not realize they are in shallow water. They can hurt themselves and they can hurt others. Parents of kids with ASD find it puzzling why people will make unhelpful comments in these moment. They would not say something like “well, my kid never drowned.” Or, “They need to take him home and whip him.”
If you see a child with in distress, one of the best things you can do is watch the area around him or her to make sure there are no safety issues like traffic. If a child bolts, grab him or her if you can. It’s often helpful if you ask the parent “how can I help?”
Sometimes, getting a security guard or a police officer helps.
Sometimes talking to the child helps.
Ask a question like “I see you have a Tampa Bay Rays shirt on. Do you like Baseball?”
If you have other tips, please leave them in the comments below.
Source: https://www.youtube.com/watch?v=rlNCz-SF-5I
Add questions or comments in your choice of Facebook or our website. We monitor both. Facebook should be listed first, scroll down for website commenting.
1 2 3 4
|
Team:TU Darmstadt/protocols/Bacterial cell culture
From 2013.igem.org
Lab book | Materials | Protocols
Bacterial cell culture
Materials
Equipment
• - Bunsen burner
• - Pipettes with peleus ball
• - Micropipettes with sterile tips
• - Flow bench
Chemicals & consumables
• - Culture tubes with metal caps
• - Growth medium: Media
• - Parafilm
• - Autoclaved glass pipette tubes
Procedure
Starting culture: Under sterile conditions add about 5mL (two fingers high) of medium to a culture tube and insert the picked colony.
1. Cultivate the stock on agar plate e.g. until colonies grow (incubation usually at 37°C)
2. Flame a glass pipette, open the bottle of medium and flame the mouth, measure out the amount you need to fill your tubes, flame the cap and recap the bottle as quickly as possible.
3. Remove the tube cap, flame the top of the culture tube, pipette in 5 ml, flame the top of the tube, and cap it Pick a single colony (to asure the cells are from the same single clonal population) and transfer it to the medium by tapping a small (0.1 μl) pipette tip (held on a pipette) on the surface of the plate. Uncap a tube, flame the top, tip the tube so as to transfer cells from the pipette tip to the surface of the media without touching the inside of the tube with the non-sterile portion of the pipetter, flame, cap.
4. Pipette the desired amount of antibiotic into each tube along the wall. Do not put the non-sterile part of the pipette inside the tube and use a new tip for each tube.
5. Vortex each tube for 1-2 seconds to mix well.
6. Take the tubes to incubat (usually at 37°C) in an incubator or warm room.
7. Wait overnight or until your cells have reached the desired concentration.
References
1. http://openwetware.org/wiki/Bacterial_cell_culture
|
CHEMISTRY AND CHEMICAL TECHNOLOGIES. MATERIALS AND NANOTECHNOLOGY
Objetives
The main objective of the doctoral programme is to train students in the most relevant and advanced aspects of the different areas of chemistry, both theoretical and experimental. The programme aims to guarantee multidisciplinary training as well as provide methodological and conceptual tools for the preparation and determination of the physical and chemical properties of different types of materials and nanostructures. It also seeks to train students on their applications in different scientific and industrial fields. Its main lines of research are biochemistry and organic chemistry, physical chemical methods in materials science and technology, functional materials, materials and processes for sustainability, energy and environment, chemical engineering, and environmental technology.
Subscribe
Suscríbete a nuestro Newsletter y recibe en tu correo todas las últimas novedades del Instituto.
Consulta el histórico de Newsletter:
Calle Doctor Miguel Díaz Recio , 28 Málaga 29010
(+34) 951 440 260
Fax: (+34) 951 440 263
|
# Define the existing wifi network you want to connect to if available. # Choose the block with the applicable protocol. # If you need multiple networks, just add more "network={..}" blocks. # This file is actually /etc/wpa_supplicant.conf, so please refer to the # related manpages for exact syntax and allowed parameters if needed. ctrl_interface=DIR=/var/run/wpa_supplicant GROUP=netdev update_config=1 # Example using wpa protocol with pre shared key (most common) network={ ssid="ssid-name" psk="password/key" key_mgmt=WPA-PSK } # Example using wep protocol network={ ssid="ssid-name" key_mgmt=NONE wep_key0="password/key" # or 13 characters, or a hexkey starting with 0x wep_tx_keyidx=0 } # Example using plaintext (open network): network={ ssid="ssid-name" key_mgmt=NONE }
|
Sencha Touch is a multi mobile device javascript library based on HTML5 and the Model, View, Controller pattern. It is a product of Sencha Inc.
learn more… | top users | synonyms
2
votes
2answers
9k views
Sencha Touch : How to set floating panel size for different device?
I am new to Sencha Touch (experienced with ExtJS). In my application, I need to create some floating panels as modal dialogs. Now, I am really confused how to set the size of these floating panels ...
0
votes
1answer
2k views
Sencha-touch : how retrieve / get element register by Ext.reg()
how can I retrieve a element register by the method Ext.reg? prj.views.NewsSearchSection = Ext.extend(Ext.Panel, { fullscreen: true, modal: true, floating: true, layout: 'fit', ...
0
votes
2answers
5k views
sencha touch - trying to delete row from list
I try to get an editable list with this code: var isEditing = false; new Ext.Application({ launch: function(){ new Ext.Panel({ //layout: 'card', fullscreen: true, ...
7
votes
4answers
16k views
How can I change/add params on a store
On a sencha-touch, here's is my store declaration Ext.regStore('newsStore', { model: 'News', autoLoad: true, proxy: { type: 'ajax', url: '../news/list.form?format=json', ...
2
votes
2answers
2k views
PDF with a back button on the iPhone/iPad in HTML5?
I'm trying to write an HTML5 application for iOS (not the routers) that opens PDFs. Right now I'm just using <a href="some.pdf" type="application/pdf">. This exits the application and opens the ...
6
votes
3answers
26k views
Sencha-touch : refresh list : store
I have a list of news in a Ext.List inside a panel prj.views.NewsList = Ext.extend(Ext.Panel, { layout: 'card', initComponent: function() { this.list = new Ext.List({ ...
0
votes
1answer
1k views
sencha touch :: Problems with disable()/enable()of a FormPanel
thats weired - it worked and suddenly (changed nothing but adding code to other panels...) it's not working any more: I used to enable/disable a form with a button inside a docked toolbar. within the ...
1
vote
2answers
5k views
sencha touch :: adding multiple classes to buttons
is there a way to add multiple classes to a panel or button in sencha touch? I tried to add more than one with "cls:'newClass secondClass'," but it seems I can only add one class...
1
vote
2answers
10k views
sencha touch :: adding a background-image to a Panel
I try to add an image to the background of a panel. the image comes from loaded data. i tried the following code, which did not work: var topPanel = new Ext.Panel({ flex:1, ...
0
votes
1answer
1k views
Sencha touch :: make TabPanel always slide 'left'
Is there any way to make a TabPanel always slide 'left' in sencha touch?
0
votes
1answer
1k views
Sum value Sencha Touch
hi I made a list that has a productname and price the list is an item of a panel en the panel has a dockeditem which is a toolbar. i want the sum of price inside the toolbar so that people can see the ...
2
votes
0answers
624 views
Sencha Touch 1.1.0 + Compass 0.11
I am having great trouble getting started with theming for Sencha Touch. The problem is apparently a version conflict, according to some sources. ...
0
votes
1answer
290 views
Sencha slidable nav menu
I'm new to sensha, and I'm not sure which elements to use for this, but I'm hoping someone can help me by telling me the class names of what I'm looking for. Anyway, here's the idea: I want to do a ...
1
vote
2answers
5k views
ajax problem with sencha touch
I am trying to submit a form using ajax in the sencha touch framework. It's a simple form that asks for a user's name, email address, and a brief message. I then want to post the data to a php script ...
1
vote
1answer
262 views
Jo HTML framework on Symbian
What is the experience using the Jo web framework on Symbian S60 (AKA Symbian^1) or Symbian^3 either directly in built-in browser or via PhoneGap? Is there any web framework for Symbian OS and ...
6
votes
3answers
3k views
How do you remove the Next and Prev buttons from virtual keyboard in Sencha Touch / Phonegap application
So I have this Phonegap application built using Sencha Touch. I have a textarea control for users to type in some information. When the box gets focus it brings up the virtual keyboard. But the ...
0
votes
1answer
1k views
select a field in store
hi can anyone tell ho to selct a field in a store i made a nestedlist and i want when someone clicks on a leaf the message somes oops, you click on a leaf. and leaf is a boolean field. this is what ...
1
vote
4answers
14k views
insert in sencha touch data store
Could someone please explain how the insert works to add a record in a datastore with tha fields: "title", "info" and "price"? because i tried some things and none of them work. and the sencha website ...
4
votes
1answer
3k views
How can I center emptyText in the middle of the screen in a List in Sencha Touch?
I recently discovered the emptyText config value for lists in Sencha Touch to display when the store is empty. The problem I am having is that this text appears in the top left corner and I can't seem ...
0
votes
1answer
1k views
sencha touch: how to build an editable FormPanel
i want to build an editable FormPanel where a 'edit'-button in the toolbar makes the form editable and lets appear a 'cancel'- and a 'save'-button, changing the forms to be disabled:false. has anyone ...
2
votes
2answers
2k views
How to convert Ajax serialized dates to date format in sencha touch
I am building an App using Sencha touch api. I have a model Ext.regModel('Task', {fields: [{name:'TaskID', type:'int'}, {name:'DueDate', type:'date'}, ...
0
votes
1answer
3k views
Sencha Touch Custom List Row
I need your help for Ext.List element on Sencha Touch Framework. I have a list that it is refreshed in every 1 second. When there is an update on one row i have to highlight that row. Problem is i use ...
5
votes
2answers
2k views
Sencha application in a Facebook iFrame gets a “Cannot POST /”
I have a Sencha Touch application using Node.js and Socket.io running on Amazon EC2 (micro instance). I want to make it available on Facebook, in a Facebook Canvas, aka an HTML iFrame. I get a blank ...
3
votes
1answer
3k views
Sencha-touch : toolbar with buttons auto height
My problem, is how can I initiate a panel with a bottom toolbar with vertical buttons. Here is my code var filterActionsButtons = [ { ui : 'confirm', ...
0
votes
1answer
2k views
Sencha/Ext - How manipulate SVG Element included inside an svg file ?!
This is my problem.... 'mon' function works if i set html property directly with svg code like this: html: '<svg><text id="ID">Example</text></svg> I can manage elements by ...
1
vote
1answer
2k views
How to make XTemplate work with TabPanel in Sencha Touch
I've got my TabPanels generating as expected, however, if I try and inject an XTemplate into one of the panels, and then call content.update(myArray);, the result is that the panels don't move, the ...
0
votes
1answer
2k views
sencha touch list-component
I have a listpanel that seems to work correctly, but when the details card is shown I get the word 'undefined' instead of my template. This is part of the code: Ext.regModel('Complementarias', { ...
2
votes
2answers
930 views
How can i insert an handler for an HTML object?
question is simple! I have an object like this: new Ext.Panel({ id: 'Panel', fullscreen: true, dockedItems: [ dock:..., width: ..., ...
1
vote
0answers
272 views
How can i insert my touchEvents.js in another myjs.js file ??? Some examples?
I’m newbuy on Sencha framework. I read the partial guidebook which I have found on the website to try to create some panels with tabs and buttons. I would like to be able to understand how to create a ...
1
vote
0answers
615 views
Sencha Touch Ext.List disappearing behind a wrapped toolbar
I have written an MVC Sencha Touch app to query a database via JSON and then return the list in an Ext.List The idea here is to have an iPhone-style UINavigationController effect that slides in for ...
2
votes
1answer
1k views
Is there a free version of Sencha touch out there?
I'm looking for a framework to create touch optimized websites. Sencha and ExtJS look awesome, but don't appear to be free
2
votes
2answers
5k views
Try Sencha Touch examples locally
Can one download the source code and try out the examples for local testing . E.g. I am trying to preview the example on my iPad (after downloading locally), but am unable to see anything; ...
1
vote
1answer
2k views
make tabpanel in a tab of another tabpanel. in sencha-touch
im trying to make a small application with sencha-touch and i have a tabpanel with the layout card. when i click on tab "Producten" a card slides in but what i want is that in that card comes another ...
0
votes
2answers
1k views
Sencha example not working
hi i was try test sencha touch geotwitter but it doesnot seem to be working. ie display google map marker display each tweets as in the demo i was also trying to add a 3rd tab to show the most ...
0
votes
1answer
3k views
Sencha Touch - Viewport Problem
i am using the ToolbarDemo and the ListDemo from Drew Neil (@nelstrom)! Everything works perfect! But there is one problem with the VIEWPORT - i think! here is my code: ...
0
votes
1answer
2k views
superslow swipe reaction - how to speed up sencha touch / phonegap
i have a simple sencha touch app in mvc style with one view in the viewport: the main view. another panel is popping up as modal floating window when you swipe a finger over the main view. this panel ...
0
votes
1answer
159 views
Trying to use value in togglefield by calling the controller
is there a way to receive some return value from a controller like app.controllers.theController = new Ext.Controller({ ... getPrefsData: function(options){ ...
1
vote
2answers
3k views
How to add a CSS-styled round close-button into the corner of a modal panel in sencha touch
How could I add a round close-button (white circle with black X) into the upper right corner of a modal panel in sencha touch? thnx! edit: ...like the FANCYBOX is using. edit: i found this plugin!
2
votes
1answer
2k views
Sencha Touch : FLUD style multiple scrolling panel
I am trying to develop a FLUD style list of Panels by Sencha Touch. All the panels will be scrollable by themselves. Here are the images of what I want inspired by a this FLUD panel : Now, if I ...
0
votes
2answers
2k views
Sencha touch: How to refresh input label
I have an Ext.form.Select that I want to update it's label dynamically when it's value changes. Simple as it sounds, it refuses to work: var musicInCarInput = new Ext.form.Select({ options: [ ...
1
vote
1answer
999 views
JQTouch question, adding buttons in the footer
I am trying to add 3 buttons in a div which has "info" class as shown below( this is basically footer section). Code is shown below <div class='info'> <a class="button" ...
0
votes
1answer
2k views
Sencha Touch - Error - JSON Recovery
I contact you because I'm in a deadlock. I try to get data from a extern web service with "ScriptTag" but it does not work because the web service returns simple json format (No JSONP). Do you know ...
1
vote
1answer
2k views
Background service in Sencha touch
I am building an mobile app ( RSS reader ) for Android with Sencha touch and PhoneGap. I have created some sort of background service that checks every 12 hours for new posts and update the app. When ...
0
votes
3answers
533 views
Differences in mobile web application frameworks
I am going through different web application frameworks for mobile devices. I have found frameworks like PhoneGap/Appcelarator/Rhomobile (I am calling these as group1) And ...
0
votes
1answer
1k views
Event handling and 'this' in Sencha Touch
app.controllers.test = new Ext.Controller({ someMethod: function(button, event) { // prints 'undefined', as this == button, not test console.log(typeof(this.someMethod)); } }); ...
0
votes
1answer
603 views
How to update view with no model from controller in Sencha Touch?
For some views I use just a controller (no model). How do I update the view after I've made some changes to it's components. Say, I can use the setValue method on a TextField to change the value of ...
1
vote
2answers
5k views
JSONP with Sencha Touch not working
I was following this tutorial of Sencha Touch: http://www.vimeo.com/15672696 Perfect tutorial, worked flawless. But when I tried to reuse this code for my own project, I doesn't work. Here is wat I ...
4
votes
2answers
776 views
How do I use a TreeStore with 'auto' mappings?
I have a model that looks like this: Ext.regModel('TreeItem', { fields: [ { name: 'ItemId', type: 'int' }, { name: 'ItemType', type: 'string' }, { name: ...
1
vote
0answers
1k views
With Sencha Touch, how can I build a nested list without using the nested list object?
I have an app that loads a JSON file with nested data via AJAX. The basic flow of the app is: 1. Panel with a list in it of the root objects of the data file. 2. When a user clicks on the item in this ...
0
votes
1answer
5k views
display card with sencha touch
I am new to sencha touch and saw all videopodcasts but still don't understand how to "display" a panel from a tabbar (the bar on top!) and how to switch from a panel to another without any slide or ...
|
BCGControlBar Pro for MFC
BOOL CBCGPEditCtrl::GoToNextMarker ( DWORD dwMarkerType,
BOOL bDirection = TRUE
)
Moves the caret to the next marker in the specified (up or down) direction.
Returns
Nonzero if the caret was moved to the next marker; otherwise 0.
If the specified direction is down and the caret is placed at the last marker, the caret will be moved to the first marker. If the specified direction is up and the caret is placed at the first marker, the caret will be moved to the last marker.
Parameters
dwMarkerTypeSpecifies the maker type.
bDirectionThe direction. TRUE - down, FALSE - up.
|
cancel
Showing results for
Search instead for
Did you mean:
Shutdown Device with Authentication ?
zenplay
Star II
I just moved to asus, but unfortunately if my device is lost, someone can shut it down or enable airplane mode without any authentication pin / biometric so we can't track the device using find my phone which need access to the internet, I think this feature must through authentication fisrt for safety reason
fortunately, gps and mobile data toggle require authentication first
when will asus add this feature? I think this is a mandatory feature in every mobile phone
1 ACCEPTED SOLUTION
Accepted Solutions
Mansi_ASUS
Moderator
Moderator
Hey @zenplay,
Thank you for your feedback, I have forwarded it to the R&D department.
View solution in original post
8 REPLIES 8
tochmi
Zen Master I
I agree with the problem. But I'm sorry to tell you that it's because Google has done it that way. Asus can fix it, yes, as it has done with some things like hiding the navigation bar.
But the security problem is obvious and I already created a thread about it where the moderators replied to me.
https://zentalk.asus.com/t5/zenfone-9/additional-anti-theft-security-essential/td-p/386465
From Zenfone 9 (16x256)@Android 14 - 34.0304.2004.87
oloczeka
Star I
Someone needn't shut phone down/enable airplane mode. Simply removing SIM card is enough so there won't be mobile data.
well, sim card removal is a physical things and it's need an ejector to remove, at least there are protection in the software level
|
General discussion
Locked
Switching displays for docked laptop
By mmarko ·
When using an external keyboard and monitor while laptop is docked, what key-combo can I use on the standard keyboard to switch displays?
I know of Fn. + F4 on the laptop itself, but not the external keyboard.
I work Help Desk, but noone here seems to remember the key-combo.
Many here would be very appreciative of some new ideas.
This conversation is currently closed to new comments.
1 total post (Page 1 of 1)
Thread display: Collapse - | Expand +
All Comments
Collapse -
Switching displays for docked laptop
by GuruOfDos In reply to Switching displays for do ...
This can normally only be done on the laptop keyboard itself. The BIOS routine has 'intercepts' for the keyboard that snag the particular control code and enable the display switching. Usually, there is an extra Fn key which of course is not presenton a standard keyboard. It IS possible, using a TSR routine written in assembler to generate an equivalent code that is passed to the laptop keyboard handler in BIOS which 'fakes' the Fn F4 command. You would need to know the codes generated by the key down and key up events for the Fn F4 combination, and then remap an alternative key combination from the pc keyboard, for instance CTRL-ALT-D. It can be done, and I have done it for an external keyboard on a Clevo laptop....but it was a pain in the neck and took a few days experimenting!! Some manufacturers have utility drivers that do this for you....but they are hard to find!!!
Back to Desktop Forum
1 total post (Page 1 of 1)
Related Discussions
Related Forums
|
Skip to content
Advertisement
• Research article
• Open Access
• Open Peer Review
Detection of microcirculatory impairment by transcutaneous oxymetry monitoring during hemodialysis: an observational study
• 1Email author,
• 1,
• 2,
• 1,
• 3,
• 1 and
• 3
BMC Nephrology201415:4
https://doi.org/10.1186/1471-2369-15-4
• Received: 1 July 2013
• Accepted: 16 December 2013
• Published:
Open Peer Review reports
Abstract
Background
Little is known about the effects of intermittent hemodialysis on microcirculatory perfusion. The aim of this study is to assess the effects of hemodialysis on microvascular perfusion using transcutaneous oxymetry (TCPO2).
Methods
In this observational study, hourly TCPO2 measurements were performed during hemodialysis sessions. Ankle brachial index (ABI) was carried out to classify patients according their vascular condition.
Results
50 patients (mean age 70 ± 8 years old) were enrolled. Mean TCPO2 decreased significantly on average 23.9% between start and finish of hemodialysis. Severe ischemia (TCPO2 < 30 mmHg) and critical ischemia (TCPO2 < 10 mmHg) occurred during dialysis in 47.1% and 15.5% respectively. Critical ischemia occurred only in limbs with ABI < 0.9 (8.3%) or > 1.3 (28%). Patients with critical ischemia experienced a significantly larger decline in mean blood pressure (32.4 ± 26.1 mmHg vs 12.7 ± 10.7 mmHg; P = 0.007) and a more pronounced ultrafiltration (45.55 ± 16.9 ml/kg vs 35.17 ± 18.2 ml/kg; P = 0.04) compared to patients without ischemia. Clinical outcomes (death or vascular procedures) were five times more frequent in patients who had developed critical ischemia (55.7% vs 10.1% P = 0.01). The elevated age of patients, the low basal value of TCPO2, and the occurrence of critical ischemia were more frequently associated with clinical outcome (P = 0.03, P = 0.048, P = 0.01 respectively).
Conclusions
This study demonstrates that hemodialysis induces microcirculatory injury, dependent on blood pressure reduction, peripheral vascular state and ultrafiltration. The occurrence of critical ischemia is associated to pejorative patient outcome and therefore, TCPO2 seems to be useful to avoid potential distal tissue damage during hemodialysis.
Keywords
• Peripheral arterial disease
• Critical ischemia
• Transcutaneous oxymetry
• Hemodialysis
Background
Peripheral arterial disease (PAD), traditionally defined by an ankle brachial index (ABI) of ≤ 0.9 is highly prevalent in dialysis patients and considered as a marker of poor prognosis [14]. Patients with mediacalcosis (ABI > 1.3) are also considered as presenting high vascular risk [4]. Short intermittent hemodialysis (HD) exerts significant hemodynamic and metabolic effects. Conventional HD is known to be associated with endothelial injury, elevated levels of oxidative stress and an inflammatory state leading to accelerated atherosclerosis [57]. Patients undergoing hemodialysis, have more frequent PAD procedures (lower extremity amputations and bypasses), compared to the general population, with poor prognosis [8]. Thus, early diagnosis of PAD and subsequent optimized vascular perfusion in HD patients deserves special attention. Silent limb microcirculatory injury is probably underestimated and should be recognized to prevent the onset of macrovascular limbs complications. Therefore, improvement of the hemodynamic tolerability of HD on microcirculatory vessels is one way of reducing tissue damage. However, despite improvements in HD techniques, unevaluated episodes of distal ischemia-reperfusion during HD, remains high and could partially explain the high incidence of vascular complications.
The use of transcutaneous oxymetry (TCPO2), a non invasive vascular tool, allows monitoring of local arterial blood flow and skin oxygenation [9, 10]. TCPO2 is influenced by both central arterial oxygen content and local factors, such as tissue perfusion. The positive role of TCPO2 in quantifying the degree of ischemia is well known in the population at large [11]. Values of TCPO2 in a decubitus position less than 30 mmHg or less than 10 mmHg are considered as either severe or critical ischemia respectively [11]. However, TCPO2 has been poorly studied in hemodialysis and its performance in detecting severe ischemia in hemodialysis patients is not well known. Sato et al. have shown that mean TCPO2 value was significantly lower in HD patients without PAD than in control subjects [12].
Our group has recently reported the usefulness of TCPO2 in improving PAD diagnosis and assessing its severity in hemodialysis populations. We have shown that a TCPO2 lower than 40 mmHg at onset of hemodialysis might identify patients either at high risk of death or requiring vascular treatment [13].
However, only few data on the monitoring of cutaneous microcirculation using TCPO2 during hemodialysis sessions are available. Santesson et al. investigated the effects of three consecutive hemodialysis sessions on peripheral microcirculation and macrocirculation and have shown that TCPO2 decreased significantly during hemodialysis, regardless of blood pressure reduction [14]. Unfortunately, this latter study took into account, neither the hemodialysis parameters (plasmatic volume reduction, total ultrafiltration) nor the peripheral vascular conditions of the patients. The aims of this study are firstly to clearly state the hemodynamic effects of HD on microcirculatory perfusion using TCPO2 as a monitoring tool and secondly to recognize some parameters leading to pejorative outcomes (cardiovascular death or vascular treatment requirement).
Methods
This observational study was approved by the Ethics Committee of Rouen University Hospital, and all patients gave their informed consent prior to inclusion.
Patients
Patients were recruited from a single hemodialysis center, between April and September 2010, and followed-up prospectively for one year. The study population consisted of patients with ESRD undergoing maintenance hemodialysis. Inclusion criteria were: patients treated with maintenance hemodialysis three times per week since at least 3 months and a session length of 240 minutes. Patients with an acute renal failure, or with a recent cardiovascular event (< 1 month) ie stroke, acute limb ischemia, acute coronary syndrome were excluded. Of the 50 patients included for analysis, 39 (78%) received dialysis with arterio-venous fistulas, while the others patients had central venous catheters. The monitor of HD was Integra® (Hospal, Mirandola, Italy) and only synthetic high-flux membranes were used. The dialysate flow was 500 ml/mn (n = 42) or 750 ml/mn (n = 8) while the blood flow ranged from 300 ml/mn (n = 13) to 450 ml/mn. Relative blood volume (RBV) was calculated during the session, expressed as a percentage of initial blood volume, measured continusly by Hemoscan® optical densitometer (Hospal, Mirandola, Italy).
Prior diagnosis of PAD was established based on ultrasonographic or angiographic results or, previous vascular surgical or endovascular revascularizations.
Methods
Transcutaneous oxymetry (TCPO2)
All baseline TCPO2 measurements were performed at the beginning of the HD session (T0) after measurement of oxygen parameters by pulse oximetry monitoring. Hourly TCPO2 measurements were taken on both limbs until the end of the session (T240). TCPO2 was measured at the dorsum of both feet in the first intermetatarsal space with the patient n supine position, in an air-conditioned room maintained at 22°C. A double-sided adhesive ring and contact liquid supplied by the manufacturer was used to obtain a hermetic area for measurement. TCPO2 was measured as above [9, 15] by an electrochemical transducer (TCMtm3, Radiometer GMBH, Copenhagen, Denmark). The transducer was heated to 44°C to increase the permeability of the skin to oxygen molecules at the measuring site. Calibration period was, on average, 10 minutes and the TCPO2 signal was continuously recorded on computer software during 10 minutes. A value lower than 40 mmHg is considered to be pathologic. Severe ischemia and critical limb ischemia were retained when TCPO2 measurements were lower than 30 and 10 mmHg respectively [4, 16]. We calculated the variation of TCPO2 corresponding to the variation of TCPO2 between start and finish of hemodialysis.
Ankle brachial index (ABI) measurement
ABI was calculated as the ratio between the higher value of systolic blood pressures at the anterior or posterior tibial artery for each leg and, the brachial systolic pressure recorded. Brachial systolic pressure was measured at the shunt (vascular access) free arm. Systolic pressure was detected with a hand-held 8 –MHz Doppler probe while the patient was supine after 5 minutes rest. Only ABI values of 0.90 or less were considered as abnormal or pathologic and indicators for PAD diagnosis [16]. ABI values of 1.3 or greater or incompressible arteries at ankle level were considered to indicate mediacalcosis [17]. ABI values from 0.9 to 1.3 were considered as normal. ABI was determined by the same operator during the entire study.
Follow-up
Follow-up visits were scheduled at 12 months from study inclusion. During follow-up, patients were asked about the necessity of a vascular treatment (revascularization or amputation). Death from any cause was noted. A combined end point (pejorative outcome) was then defined including death and vascular procedures requirement.
Statistical analysis
Demographic data and clinical features were analysed using descriptive methods. Quantitative variables were expressed as mean +/- standard deviation and compared using the Student-t-test, or Mann–Whitney U test as appropriate. Comparison between groups was performed using Chi-square test and in the 2*2 tables, Fisher’s exact test as appropriate. The independence of each limb was confirmed by intra-class correlation coefficient measurement.
Statistical analyses were performed using STATVIEW (Version 5.0 de SAS Institute Inc.) program. P value lower than 0.05 was considered statistically significant.
Results
Baseline patient characteristics
The study included 50 patients from April to September 2010. We distinguished four groups of renal disease responsible for ESRD: diabetic nephropathy (16%), vascular nephropathy (22%), chronic glomerulonephritis (10%) and others (52%) such as chronic interstitial nephritis, polycystic kidney disease and nephrectomy.
Patients clinical features are listed in Table 1. The patient population was 27 males (54%) and 23 females (46%). Mean age and body mass index were respectively 70 ± 8 years old and 26.9 +/- 6.6 kg/m2. Hypertension (92%), diabetes (32%) and dyslipidemia (76%) were the most prevalent comorbid chronic conditions. Approximately two thirds of patients were known to have at least one cardiovascular injury (stroke, transient ischemic attack, myocardial infarction). Fifteen patients (30%) suffered from PAD (intermittent claudication for 12 of them and rest pain for 3 of them). Two patients had a previous angioplasty of the superficial femoral artery and one had been amputated.
Table 1
Baseline characteristics of patients
Demographic and clinical characteristics of patients
Number
%
Male/Female
27/23
54/46
Age (y)
70+/- 8
Diabètes
16
32
Hypertension
46
92
Dyslipidemia
38
76
Cardio Vascular History of Patients
Smoking patients
22
44
Past
16
32
Active
6
12
Stroke
11
22
Intermittent claudication
12
24
Rest pain
3
6
Ischemic cardiopathy
18
36
Dialysis vintage (years)
> 10 years
07
14
5 years < dialysis < 10 years
11
22
< 5 years
32
64
Vascular statue of Limbs
Peripheral arterial disease (ABI < 0.9)
15
15
Normal vascular state ( 0.9 < ABI < 1.3)
34
34
Mediacalcosis (ABI > 1.3)
50
51
ABI was analysed for each leg (one patient was amputated), the proportion of ABI lower than 0.9, greater than 1.3 and normal was 15% (n = 15), 51% (n = 50) and 34% (n = 34) respectively.
Most patients (64%) had received dialysis less than 5 years prior to the study. Median length of dialysis is 3.2 years [0.7-29.5].
Baseline TCPO2, evolution and variation of TCPO2
At the beginning of the dialysis session, mean oxygen saturation value for all patients was 95 ± 6%, whereas mean baseline TCPO2 for all limbs was 45.7 ± 15.5 mmHg (n = 99). Eighty three of them had a TCPO2 greater than 30 mmHg and 14 limbs had a TCPO2 lower than 30 mmHg without critical ischemia. Among limbs with an ABI < 0.9 (n = 15) or > 1.3 (n = 50), the mean baseline TCPO2 was reduced compared to the normal ABI group (38 ± 16.9 mmHg; 46.5 ± 11.4 mmHg and 53.5 ± 15.5 mmHg respectively; P = 0.0002 and P = 0.02).
In overall limbs, mean TCPO2 decreased significantly during dialysis on average by 23.9% between T0 and T240 (45.7 ± 15.5 mmHg vs 33.5 ± 15.6 mmHg; P <0.0001) (Figure 1). The absolute change of TCPO2 values was similar between groups of limbs regarding their ABI measurement (ABI < 0.9, ABI > 1.3 and normal ABI (Figure 2).
Figure 1
Figure 1
Evolution of TcPO2 values at different times of measurement during haemodialysis. P < 0.05 was considered statistically significant.
Figure 2
Figure 2
Evolution of TcPO2 values at different times of measurements during hemodialysis according to ABI Group.
Severe ischemia (TCPO2 < 30 mmHg) and critical ischemia (TCPO2 < 10 mmHg) were always asymptomatic and occurred during dialysis in 47.1% and 15.5% of limbs respectively. Most of severe ischemia (87.5%) or critical ischemia (93.3%) occurred at the third hour of dialysis (Table 2).
Table 2
Evolution in the number of limbs according to their ischemic status during the hemodialysis session
Start of HD
T60
T120
T180
End of HD
Critical ischemia
2
8
11
12
6
Severe Ischemia
14
22
24
26
35
No ischemia
83
69
64
61
58
Considering patients, at the beginning of HD session, 48 patients had TCPO2 > 10 mmHg in both limbs. During the HD session, critical ischemia and severe ischemia occurred in 9 and 24 patients respectively. Only 15 patients remained with a TCPO2 value greater than 30 mmHg.
Predictive factors of ischemia during hemodialysis
The onset of ischemia (severe or critical) was not related to demographic characteristics such as age (67.8 ± 15.3 y vs 75.3 ± 8.7 y; P = 0.13), hypertension (88.6 ± 5.5%, vs 100 ± 0%; P = 0.30) smoking (41.2 ± 8.6% vs 53.3 ± 13.3%; P = 0.53) dyslipidemia (76.5 ± 7.4% vs 80 ± 10.7%; P = 0.82), diabetes (28.6 ± 7.7% vs 40 ± 13%; P = 0.51), stroke history (25.7 ± 7.5% vs 13.3 ± 9.1%; P = 0.46), myocardial infarction history (37.1 ± 8.3% vs 33.3% ± 12.6%; P = 0.79) or the use of anti platelet agent (63.3 ± 3.6% vs 59.2 ± 5.3%; P = 0.84). Only the initial value of TCPO2 was associated with critical limb ischemia (34 ± 14.2 mmHg, vs 52 ± 12.2 mmHg; P < 0.01).
Peripheral vascular state
During HD, the incidence of severe ischemia was statistically higher in limbs with pathologic ABI (ABI < 0.9 or ABI > 1.3) than in the normal ABI group, (80% vs 28.1% P = 0.0076) and (53.5% vs 28.1% P = 0.028). Critical ischemia occurred only in the two pathologic ABI groups (< 0.9, > 1.3, normal) in 8.3% and, 28% of cases, respectively.
Among limbs with a normal ABI, none had experienced a critical ischemia, and only 28% had a severe ischemia episode.
Arterial blood pressure (BP)
Systolic, diastolic and mean arterial pressure (MAP) trended to decrease during dialysis and reached a significant difference at 120 minutes compared to baseline values. At the end of dialysis, all parameters were similar to those at baseline. No difference was observed in blood pressure variation between the 3 ABI groups. Critical ischemia is related to a significantly larger decline in BP parameters: The critical ischemia group patient experienced a significantly larger decline in MAP (32.4 ± 26.1 mmHg vs 12.7 ± 10.7 mmHg; P = 0.007), in systolic BP (53.4 ± 50.7 mmHg vs 23.5 ± 20.9 mmHg; P = 0.005) and in diastolic BP (23.1 ± 14.9 mmHg vs 10.1 ± 8.7 mmHg; P = 0.001) than patients without ischemia.
Dialysis parameters
The mean total ultrafiltration volume in our study was 2459 ± 1197 ml. Adjusted to weight, the mean total UF/weight was 36.71 ± 18.05 ml/kg. A significant difference was observed in ultrafiltration variations between the group of patients whose limbs developed critical ischemia (45.55 ± 16.9 ml/kg vs 35.17 ± 18.2 ml/kg; P = 0.04) compared to the healthy group. This result was also present in case of severe ischemia (41.14 ± 20.15 ml/kg vs 31.28 ± 15.56 ml/kg; P = 0.03). A positive correlation was found between the variation of TCPO2 and the values of ultrafiltration/weight (rho 0.397; p = 0.001) (Figure 3). At the same time, mean decrease in RBV after 4 hours of dialysis was -7.4 ± 3.9%. However, this decrease was greater during the first two hours of the session (-5.4% ± 2.7%) compared to the last two hours (-2.0% ± 2%). There was no difference between groups regarding final RBV in cases of severe ischemia and critical ischemia.
Figure 3
Figure 3
Line graph shows the correlation between variations of TcPO2 and the value of the ultrafiltration/Weight in patients. A positive relationship was observed (p < 0.001).
One year follow up
Thirteen patients (26%) died during the first year of follow-up; the main causes of death were infectious disease (n = 4) and cardiovascular complications (n = 5). Death occurred respectively in two third of cases in patients with ischemia (critical or severe). Six patients experienced new peripheral vascular events (revascularization and/or amputation). Five of them had an episode of critical ischemia during dialysis. When using combined criteria, including death from cardiovascular disease and vascular treatment, the frequency of pejorative outcome was five times higher in patients who had undergone at least one episode of critical ischemia during HD (55.7% vs 10.1% P = 0.01). In univariate analysis, age of patients, basal value of TCPO2, onset of critical ischemia and an ABI < 0.9 were more frequently observed in patients with pejorative outcome (P = 0.03, P = 0.048, P = 0.01 and P = 0.09 respectively).
Discussion
This observational study investigated the effect of HD on the microcirculatory perfusion evaluated by TCPO2 measurements. The major findings are a decrease in TCPO2 during HD dependant on blood pressure reduction, ABI, level of ultrafiltration, as well as a high incidence of subclinical severe and critical limb ischemia during the session, which is independently correlated with a significant increase in pejorative outcome for patients.
Optimal fluid balance to maintain hemodynamic stability during hemodialysis procedure is essential to improve peripheral vascular perfusion. However, at the present time, hemodynamic stability is conventionally assessed on macrocirculation stability regarding systemic blood pressure and paying no attention to peripheral perfusion. Although ABI seems to be sufficient to predict poor outcome in haemodialysis patients, as confirmed by several previous studies. Nevertheless TCPO2, which is a real-time indicator of the perfusion of microcirculation can be a useful additional tool to alert the physician when distal injuries occur.
Mistrik et al. have recently demonstrated microcirculatory changes during HD by using laser Doppler methods [18]. Previously, Weiss et al. published results on the decrease in the TCPO2 measurement during hemodialysis and up to four hours after the end of the session [19]. Their results have been since confirmed in small cohorts without exact data on the influence of hemodialysis parameters on TCPO2 recording [14]. Our results are consistent with previous data but we have also investigated both the patient’s clinical parameters as well as some hemodialysis parameters to understand the mechanisms of microcirculatory injury. Peripheral vascular hemodynamic status is a condition which leads to the development of severe and critical ischemia during hemodialysis. While previous studies have failed to show a statistical impact on peripheral vascular status in the decrease in TCPO2, in this study we found, that the pathological vascular profile of limbs (PAD or mediacalcosis) revealed a major frequency of ischemia compared to the normal ABI group. Pathological limbs on the other hand had lower basal TCPO2 values and the same variation of arterial blood pressure compared to normal limbs. Adaptive autoregulation of distal flow seemed to be impaired when total volemia decreased. The increase in peripheral vascular resistance to maintain constant systemic arterial pressure lead to a drop in microcirculatory perfusion. Thus in patients with altered peripheral perfusion, hemodialysis would seem to be more deleterious.
A decrease in arterial blood pressure is one factor which is responsible for impairment in microcirculatory outflow. All patients experienced a significant decrease in arterial blood pressure during the hemodialysis session before recovering their basal values at the end of the session. The link between arterial systemic pressure and TCPO2 is well established. Megerman et al. have shown that TCPO2 decreased significantly and correlated positively with induced patient hypotension [20]. In the same way, tissue oxygen tension, measured at a variety of sites in both human and laboratory studies, appears to be a sensitive indicator of organ perfusion in different shock states [21, 22]. Since intradialytic hypotension occurs in 25-55% of dialysis sessions [23], the concomitant decrease in TCPO2 in our study is not surprising [2426]. However, in our study, the relative increase in TcPO2 and in MAP during the last hour of the session could be explained by effective vascular refilling of extra cellular volume. This adaptive mechanism may be connected to the profile of the variation of RBV as described by Santoro et al. [27]. Our results demonstrate a change in RBV in two phases, resulting in the occurrence of refilling during the second part of the session.
The other main parameter incriminated in distal microcirculatory injury is total ultrafiltration volume which is a predictive factor for the decrease in TCPO2 in our study. As the ratio between ultrafiltration and weight is considered as a better indicator of the intensity of volume loss, we choose to express our result using this ratio. However, results were similar when the total ultrafiltration was used (data not shown). It has been shown previously that microvascular perfusion is reduced by ultrafiltration and can be restored temporarily using the Trendelenburg position by increasing venous return or by administration of a small volume to replace the intravascular volume [28]. This adaptive procedure leads to an ischemia reperfusion phenomenon which is well known to aggravate tissue damage by producing reactive oxygen species (ROS) and inflammatory cytokines [29]. Stress and chronic inflammation are still the leading causes of atherosclerosis and cardiovascular mortality [30, 31]. In our study, 45% of patients with normal basal distal perfusion experienced inadequate limb blood flow during HD subsequently developing microcirculatory injury leading to accelerated PAD. This result could explain that pejorative outcomes are five times higher in patients who had experienced limb ischemia episode during HD compared to other patients. Likewise, this phenomenon could explain in part why the rate of PAD procedures in HD patients compared to other chronic kidney disease patients is so high [32].
The major limitation of this study is the exclusion of patients with a recent cardiovascular event. It would have been interesting to analyse the results in those patients in whom peripheral vascular disease might be more prevalent. However, our cohort of patients already has a very high prevalence of cardiovascular comorbidities because of our recruitment in a tertiary center. Moreover, since our population is small, we decided to assess hemodynamic effects on the most stable population as possible to not over estimated the onset of vascular injuries and of pejorative outcomes. In addition, our cohort of patients already has a very high prevalence of cardiovascular comorbidities because of our recruitment in a tertiary center all patients received the same HD technique and it is impossible to generalize our results to others HD methods. Therefore, further studies are required to compare the impact of the different types of HD on microcirculatory perfusion. Additionally, since previous studies have shown that changes in TCPO2 may depend on type of dialyzer membranes [12, 33] the exclusive use of high-flux synthetic membranes in our study may limit the generalization of our results. However, the trend is for maximum use of synthetic high flow membranes to reduce bio incompatibility and systemic consequences.
Conclusion
In conclusion, our findings demonstrate that HD is responsible for microcirculatory injuries which are most important in patients with PAD. Better knowledge of the vascular status of the patient would seem to be necessary for patients undergoing HD. According to our results and previous reports, we believe that during HD, TCPO2 is useful for monitoring variations in distal perfusion and could assess tolerability against vascular damage. Therefore, changes in of session duration, in type of membranes used or in level of ultrafiltration could improve HD tolerance and probably overall patient prognosis.
Declarations
Acknowledgements
We are grateful to Nikki Sabourin, Rouen University Hospital, for writing assistance and review of the manuscript in English.
Authors’ Affiliations
(1)
Department of Internal Medicine, Rouen University Hospital, 1 Rue de Germont, 76031 Rouen, France
(2)
Department of Vascular Surgery, Rouen University Hospital, Rouen, France
(3)
Department of Nephrology, Dieppe General Hospital, Dieppe, France
References
1. Rajagopalan S, Dellegrottaglie S, Furniss AL, Gillespie BW, Satayathum S, Lameire N, Saito A, Akiba T, Jadoul M, Ginsberg N, Keen M, Port FK, Mukherjee D, Saran R: Peripheral arterial disease in patients with end-stage renal disease: observations from the Dialysis Outcomes and Practice Patterns Study (DOPPS). Circulation. 2006, 114: 1914-1922. 10.1161/CIRCULATIONAHA.105.607390.View ArticlePubMedGoogle Scholar
2. O’Hare AM, Glidden DV, Fox CS, Hsu CY: High prevalence of peripheral arterial disease in persons with renal insufficiency: results from the National Health and Nutrition Examination Survey 1999–2000. Circulation. 2004, 109: 320-323. 10.1161/01.CIR.0000114519.75433.DD.View ArticlePubMedGoogle Scholar
3. Collins AJ: Cardiovascular mortality in end-stage renal disease. Am J Med Sci. 2003, 325: 163-167. 10.1097/00000441-200304000-00002.View ArticlePubMedGoogle Scholar
4. Norgren L, Hiatt WR, Dormandy JA, Nehler MR, Harris KA, Fowkes FG, Bell K, Caporusso J, Durand-Zaleski I, Komori K, Lammer J, Liapis C, Novo S, Razavi M, Robbs J, Schaper N, Shigematsu H, Sapoval M, White C, White J, Clement D, Creager M, Jaff M, Mohler E, Rutherford RB, Sheehan P, Sillesen H, Rosenfield K: Inter-Society Consensus for the Management of Peripheral Arterial Disease (TASC II). Eur J Vasc Endovasc Surg. 2007, 33 (Suppl 1): S1-S75.View ArticlePubMedGoogle Scholar
5. Faure V, Dou L, Sabatier F, Cerini C, Sampol J, Berland Y, Brunet P, Dignat-George F: Elevation of circulating endothelial microparticles in patients with chronic renal failure. J Thromb Haemost. 2006, 4: 566-573. 10.1111/j.1538-7836.2005.01780.x.View ArticlePubMedGoogle Scholar
6. Schiffrin EL, Lipman ML, Mann JF: Chronic kidney disease: effects on the cardiovascular system. Circulation. 2007, 116: 85-97. 10.1161/CIRCULATIONAHA.106.678342.View ArticlePubMedGoogle Scholar
7. Stam F, van Guldener C, Becker A, Dekker JM, Heine RJ, Bouter LM, Stehouwer CD: Endothelial dysfunction contributes to renal function-associated cardiovascular mortality in a population with mild renal insufficiency: the hoorn study. J Am Soc Nephrol. 2006, 17: 537-545. 10.1681/ASN.2005080834.View ArticlePubMedGoogle Scholar
8. Eggers PW, Gohdes D, Pugh J: Nontraumatic lower extremity amputations in the medicare end-stage renal disease population. Kidney Int. 1999, 56: 1524-1533. 10.1046/j.1523-1755.1999.00668.x.View ArticlePubMedGoogle Scholar
9. Kalani M, Brismar K, Fagrell B, Ostergren J, Jorneskog G: Transcutaneous oxygen tension and toe blood pressure as predictors for outcome of diabetic foot ulcers. Diabetes Care. 1999, 22: 147-151. 10.2337/diacare.22.1.147.View ArticlePubMedGoogle Scholar
10. Zimny S, Dessel F, Ehren M, Pfohl M, Schatz H: Early detection of microcirculatory impairment in diabetic patients with foot at risk. Diabetes Care. 2001, 24: 1810-1814. 10.2337/diacare.24.10.1810.View ArticlePubMedGoogle Scholar
11. Becker F, Loppinet A: Chronic critical ischemia of the legs. Definition and management. Ann Cardiol Angeiol (Paris). 2007, 56: 63-69. 10.1016/j.ancard.2006.09.007.View ArticleGoogle Scholar
12. Sato M, Morita H, Ema H, Yamaguchi S, Amano I: Effect of different dialyzer membranes on cutaneous microcirculation during hemodialysis. Clin Nephro. 2006, 66: 426-432. 10.5414/CNP66426.View ArticleGoogle Scholar
13. Benhamou Y, Edet S, Begarin L, Cailleux N, Hanoy M, Bessin C, Godin M, Levesque H: Transcutaneous oxymetry as predictive test of peripheral vascular revascularization in haemodialysis population. Nephrol Dial Transplant. 2011, 27: 2066-2069.View ArticlePubMedGoogle Scholar
14. Santesson P, Danielsson A, Iseda I, Adamson U, Lins PE, Jorneskog G: Impaired peripheral micro- and macrocirculation during hemodialysis in uremic patients. Int Angiol. 2010, 29: 362-370.PubMedGoogle Scholar
15. Got I: Transcutaneous oxygen pressure (TcPO2): advantages and limitations. Diabetes Metab. 1998, 24: 379-384.PubMedGoogle Scholar
16. Hirsch AT, Haskal ZJ, Hertzer NR, Bakal CW, Creager MA, Halperin JL, Hiratzka LF, Murphy WR, Olin JW, Puschett JB, Rosenfield KA, Sacks D, Stanley JC, Taylor LM, White CJ, White J, White RA, Antman EM, Smith SC, Adams CD, Anderson JL, Faxon DP, Fuster V, Gibbons RJ, Hunt SA, Jacobs AK, Nishimura R, Ornato JP, Page RL, Riegel B: ACC/AHA 2005 Practice Guidelines for the management of patients with peripheral arterial disease (lower extremity, renal, mesenteric, and abdominal aortic): a collaborative report from the American Association for Vascular Surgery/Society for Vascular Surgery, Society for Cardiovascular Angiography and Interventions, Society for Vascular Medicine and Biology, Society of Interventional Radiology, and the ACC/AHA Task Force on Practice Guidelines (Writing Committee to Develop Guidelines for the Management of Patients With Peripheral Arterial Disease): endorsed by the American Association of Cardiovascular and Pulmonary Rehabilitation; National Heart, Lung, and Blood Institute; Society for Vascular Nursing; TransAtlantic Inter-Society Consensus; and Vascular Disease Foundation. Circulation. 2006, 113: e463-e654.View ArticlePubMedGoogle Scholar
17. Ladurner R, Kuper M, Konigsrainer I, Lob S, Wichmann D, Konigsrainer A, Coerper S, Beckert S: Predictive value of routine transcutaneous tissue oxygen tension (tcpO2) measurement for the risk of non-healing and amputation in diabetic foot ulcer patients with non-palpable pedal pulses. Med Sci Monit. 2010, 16: CR273-CR277.PubMedGoogle Scholar
18. Mistrik E, Dusilova Sulkova S, Blaha V, Kalousova M, Knizek J, Moucka P, Herout V, Kadlec M, Stilec R, Sobotka L: Evaluation of skin microcirculation during hemodialysis. Ren Fail. 2010, 32: 21-26. 10.3109/08860220903375286.View ArticlePubMedGoogle Scholar
19. Weiss T, Windthorst C, Weiss C, Kreuzer J, Bommer J, Kubler W: Acute effects of haemodialysis on cutaneous microcirculation in patients with peripheral arterial occlusive disease. Nephrol Dial Transplant. 1998, 13: 2317-2321. 10.1093/ndt/13.9.2317.View ArticlePubMedGoogle Scholar
20. Megerman J, Mihelakos PT, Katsamouris AN, Fahmy NR, Lappas DG, Abbott WM: Continuous monitoring of oxygen tension with a transcutaneous sensor during hypotensive anesthesia. Acta Anaesthesiol Scand. 1987, 31: 25-29.View ArticlePubMedGoogle Scholar
21. Kanoore Edul VS, Dubin A, Ince C: The microcirculation as a therapeutic target in the treatment of sepsis and shock. Semin Respir Crit Care Med. 2011, 32: 558-568. 10.1055/s-0031-1287864.View ArticlePubMedGoogle Scholar
22. Sair M, Etherington PJ, Peter Winlove C, Evans TW: Tissue oxygenation and perfusion in patients with systemic sepsis. Crit Care Med. 2001, 29: 1343-1349. 10.1097/00003246-200107000-00008.View ArticlePubMedGoogle Scholar
23. Ligtenberg G, Barnas MG, Koomans HA: Intradialytic hypotension: new insights into the mechanism of vasovagal syncope. Nephrol Dial Transplant. 1998, 13: 2745-2747. 10.1093/ndt/13.11.2745.View ArticlePubMedGoogle Scholar
24. Beckert S, Sundermann K, Wolf S, Konigsrainer A, Coerper S: Haemodialysis is associated with changes in cutaneous microcirculation in diabetes mellitus. Diabet Med. 2009, 26: 89-92. 10.1111/j.1464-5491.2008.02610.x.View ArticlePubMedGoogle Scholar
25. Deruddre S, Pottecher J, Georger J: Sublingual microcirculatory improvement with fluid loading in preload-dependent ICU patients. Intensive Care Med. 2007, 33: S253-View ArticleGoogle Scholar
26. Hinchliffe RJ, Kirk B, Bhattacharjee D, Roe S, Jeffcoate W, Game F: The effect of haemodialysis on transcutaneous oxygen tension in patients with diabetes-a pilot study. Nephrol Dial Transplant. 2006, 21: 1981-1983. 10.1093/ndt/gfl241.View ArticlePubMedGoogle Scholar
27. Santoro A, Mancini E, Basile C, Amoroso L, Di Giulio S, Usberti M, Colasanti G, Verzetti G, Rocco A, Imbasciati E, Panzetta G, Bolzani R, Grandi F, Polacchini M: Blood volume controlled hemodialysis in hypotensione-prone patients: a randomized multicenter controlled trial. Kidney Int. 2002, 62: 1034-1045. 10.1046/j.1523-1755.2002.00511.x.View ArticlePubMedGoogle Scholar
28. Van der Sande FM, Luik AJ, Kooman JP, Verstappen V, Leunissen KM: Effect of intravenous fluids on blood pressure course during hemodialysis in hypotensive-prone patients. J Am Soc Nephrol. 2000, 11: 550-555.PubMedGoogle Scholar
29. Eltzschig HK, Eckle T: Ischemia and reperfusion–from mechanism to translation. Nat Med. 2011, 17: 1391-1401. 10.1038/nm.2507.View ArticlePubMedGoogle Scholar
30. Del Vecchio L, Locatelli F, Carini M: What we know about oxidative stress in patients with chronic kidney disease on dialysis–clinical effects, potential treatment, and prevention. Semin Dial. 2011, 24: 56-64. 10.1111/j.1525-139X.2010.00819.x.View ArticlePubMedGoogle Scholar
31. Mizuno Y, Jacob RF, Mason RP: Inflammation and the development of atherosclerosis. J Atheroscler Thromb. 2011, 18: 351-358. 10.5551/jat.7591.View ArticlePubMedGoogle Scholar
32. O’Hare AM, Sidawy AN, Feinglass J, Merine KM, Daley J, Khuri S, Henderson WG, Johansen KL: Influence of renal insufficiency on limb loss and mortality after initial lower extremity surgical revascularization. J Vasc Surg. 2004, 39: 709-716. 10.1016/j.jvs.2003.11.038.View ArticlePubMedGoogle Scholar
33. Teatini U, Ballerini L, Romei Longhena G, Savino R, Maltagliati L, Masi F, Colombo R, Cimino R, Manfredi A: Microcirculation as a novel marker of membrane biocompatibility. Int J Artif Organs. 2006, 29: 1117-1120.PubMedGoogle Scholar
34. Pre-publication history
1. The pre-publication history for this paper can be accessed here:http://www.biomedcentral.com/1471-2369/15/4/prepub
Copyright
© Benhamou et al.; licensee BioMed Central Ltd. 2014
This article is published under license to BioMed Central Ltd. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Advertisement
|
Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Screen reader users: click this link for accessible mode. Accessible mode has the same essential features but works better with your reader.
Patents
1. Advanced Patent Search
Publication numberUS5102367 A
Publication typeGrant
Application numberUS 07/653,025
Publication dateApr 7, 1992
Filing dateFeb 8, 1991
Priority dateFeb 8, 1991
Fee statusLapsed
Also published asCA2060538A1
Publication number07653025, 653025, US 5102367 A, US 5102367A, US-A-5102367, US5102367 A, US5102367A
InventorsSean T. Mullaney, Howard J. Morrison, Donald A. Rosenwinkel, John V. Zaruba
Original AssigneeBreslow, Morrison, Terzian & Associates, Inc.
Export CitationBiBTeX, EndNote, RefMan
External Links: USPTO, USPTO Assignment, Espacenet
Toy vehicle wheel and axle assembly
US 5102367 A
Abstract
Toy vehicle wheels are each mounted on an axle having a gear with each of the wheels having a pair of diametrically opposed arcuate segments. Each of the arcuate segments includes an inwardly extending member with each member including a rack that is kept in engagement with an opposed toothed side of the gear. A coiled spring biases the two opposed arcuate segments toward each other. With a motor driving the axle in one direction, the wheel is initially rotated with the opposed arcuate segments in a first position proximate each other until the wheel encounters an impediment that stalls rotation of the wheel so that continued rotation of the axle in one direction drives the segments away from each other. For enhancing the visual effect of the arcuate segments being moved away from each other, edges of the arcuate segments are provided with projecting parts that are obscured when the arcuate segments are in the first position proximate each other.
Images(1)
Previous page
Next page
Claims(20)
What is claimed as new and desired to be secured by Letters Patent is:
1. A toy vehicle comprising in combination:
a chassis;
an axle carried by the chassis for rotation relative to the chassis;
the axle having an end;
a gear carried adjacent the end of the axle for rotation with the axle;
a wheel mounted on the axle, adjacent the end of the axle, for rotation relative to the chassis;
the wheel including a pair of diametrically opposed arcuate segments;
the arcuate segments generally engaging a surface over which the toy vehicle is moving;
each of the arcuate segments including a member extending inwardly toward the other arcuate segment;
each member including a rack engageable with the gear;
each of the racks being engageable with an opposed toothed side of the gear; and
means maintaining the racks in engagement with the gear while permitting diametrical movement of the arcuate segments toward and away from each other.
2. The toy vehicle of claim 1 including means biasing the two opposed arcuate segments toward each other.
3. The toy vehicle of claim 2 in which the biasing means comprises:
a spring having opposed ends;
one end of the spring being anchored about the axle; and
the other end of the spring being anchored to one of the members.
4. The toy vehicle of claim 3 in which the spring is a coil spring.
5. The toy vehicle of claim 1 including means limiting the extent of movement of the opposed segments away from each other.
6. The toy vehicle of claim 1 in which:
the member includes a slot;
the slot has two, opposed elongated sides; and
one of the opposed elongated sides includes the rack.
7. The toy vehicle of claim 1 including means for keeping the members from moving relative to each other except for the permitted diametrical movement.
8. The toy vehicle of claim 1 including means on each member cooperating to keep the two members from moving relative to each other except for the permitted diametrical movement.
9. The toy vehicle of claim 8 in which the cooperating means comprise a cooperating rail on a face of one member and a groove on a face of the other member.
10. The toy vehicle of claim 8 including additional means for keeping the members from moving relative to each other except for the permitted diametrical movement.
11. The toy vehicle of claim 10 in which the cooperating means comprise a cooperating rail on a face of one member and a groove on a face of the other member.
12. The toy vehicle of claim 1 including:
means biasing the two opposed segments toward each other;
a motor; and
means drivingly interconnecting the motor and the axle so that motor driven rotation of the axle in one direction initially rotates the wheel with the opposed arcuate segments in a first position proximate each other and, so that, upon the wheel encountering an impediment that stalls the rotation of the wheel, continued rotation of the axle in the one direction overcomes the biasing means and drives the segments away from each other.
13. The toy vehicle of claim 12 including means limiting the extent of movement of the opposed segments away from each other.
14. The toy vehicle of claim 12 in which:
the member includes a slot;
the slot has two, opposed elongated sides; and
one of the opposed elongated sides includes the rack.
15. The toy vehicle of claim 12 including means for keeping the members from moving relative to each other except for the permitted diametrical movement.
16. The toy vehicle of claim 12 including means on each member cooperating to keep the two members from moving relative to each other except for the permitted diametrical movement.
17. The toy vehicle of claim 16 in which the cooperating means comprise a cooperating rail on a face of one member and a groove on a face of the other member.
18. The toy vehicle of claim 16 including additional means for keeping the members from moving relative to each other except for the permitted diametrical movement.
19. The toy vehicle of claim 1 in which:
each arcuate segment has an edge; and
one or more parts extend inwardly from the edge of each arcuate segment toward the axle so that the parts are obscured from view when each of the arcuate segments is toward the other and the parts are exposed to view when each of the arcuate segments are away from each other.
20. A toy vehicle comprising in combination:
a chassis;
a pair of substantially parallel, spaced apart axles;
each of the axles having opposed ends;
a gear carried adjacent each end of each of the axles for rotation with the respective axle;
each of the axles carried by the chassis for rotation relative to the chassis;
means carried by the chassis for driving each of the axles to rotate both of the axles in one direction;
four wheels;
each of the wheels mounted on an axle, adjacent a respective end of each axle, for rotation relative to the chassis;
each wheel including a pair of diametrically opposed arcuate segments;
the arcuate segments generally engaging a surface over which the toy vehicle is being driven;
each arcuate segment including a member extending inwardly toward the other arcuate segment of the pair;
each member of each pair of arcuate segments including a rack engageable with a respective gear;
each of the racks of each member of each pair of arcuate segments being engageable with an opposed toothed side of the respective gear; and
means maintaining the racks in engagement with the respective gears while permitting diametrical movement of each of each pair of arcuate segments toward and away from each other.
Description
BACKGROUND OF THE INVENTION
1. Field of the Invention
This invention relates generally to toy vehicles and more particularly to a wheel and axle assembly for toy vehicles.
2. Background Art
Toy vehicles, in particular, motor driven toy vehicles are popular play things. Particularly entertaining are toy vehicles having a reactive feature that is automatically activated upon the wheels encountering an obstacle or impediment. Jarworski U.S. Pat. No. 4,547,173 issued Oct. 15, 1985; D'Andrade U.S. Pat. No. 4,601,519 issued July 22, 1986; and Law U.S. Pat. No. 4,643,696 issued Feb. 17, 1987 disclose toy vehicles with wheels carrying claws that are driven out of the wheel upon the wheel encountering an obstacle. Rosenwinkel et al., U.S. Pat. No. 4,773,889 issued Sept. 27, 1988 discloses a toy vehicle having wheels that change from a generally cylindrical closed periphery with an initial diameter to a greater diameter serrated periphery upon encountering an obstacle. The Irwin toy Model 80100-M.U.L.E. KICKER toy vehicle, which is disclosed and claimed in Rosenwinkel U.S. Pat. Application Ser. No. 07/476,253 filed Feb. 7, 1990, discloses a toy vehicle having wheels with a coil spring inside each wheel that is wound tightly when an obstacle is encountered resulting in the wheel spinning out more rapidly upon the obstacle being overcome than the wheel was being driven by the vehicle motor. Nevertheless, there remains a need for other types of toy vehicle wheel and axle assemblies that provided entertaining action features upon the toy vehicle encountering and overcoming an obstacle.
SUMMARY OF THE INVENTION
The present invention is concerned with providing a toy vehicle having a chassis carrying an axle for rotation relative to the chassis with a gear at the end of the axle and a wheel mounted on the axle for rotation relative to the chassis. The wheel has a pair of diametrically opposed arcuate segments that engage a surface over which the toy vehicle is moving. Each of the arcuate segments includes an inwardly extending member with each member including a rack that is engageable with an opposed toothed side of the gear. The racks are maintained in engagement with the gear while diametrical movement of the arcuate segments towards and away from each other is permitted. A coiled spring biases the two opposed arcuate segments toward each other. With a motor driving the axle in one direction, the wheel is initially rotated with the opposed arcuate segments in a first position proximate each other until the wheel encounters an impediment that stalls rotation of the wheel so that continued rotation of the axle in one direction drives the segments away from each other. For enhancing the visual effect of the arcuate segments being moved away from each other, edges of the arcuate segments are provided with projecting parts that are obscured when the arcuate segments are in the first position proximate each other.
BRIEF DESCRIPTION OF THE DRAWINGS
For a better understanding of the present invention, reference may be had to the accompanying drawings in which:
FIG. 1 is a perspective view of a toy vehicle embodying the present invention;
FIG. 2 is a perspective view of the toy vehicle shown in FIG. 1 with opposed arcuate segments of the peripheral wall moved away from each other;
FIG. 3 is a schematic showing of the motor and drive system for the toy vehicle.
FIG. 4 is an enlarged scale sectional view taken generally along line 4--4 of FIG. 1;
FIG. 5 is a sectional view taken generally along line 5--5 of FIG. 4;
FIG. 6 is a sectional view taken generally along line 6--6 of FIG. 5; and
FIG. 7 is an enlarged scale, sectional view taken generally along line 7--7 of FIG. 2.
DETAILED DESCRIPTION
Referring now to the drawings in which like parts are designated by like reference numerals throughout the several views, there is shown in FIG. 1 a toy vehicle 10 having a chassis 12. Spaced apart axles 14 are carried by chassis 12 for rotation relative to the chassis. A conventional motor 16 is also carried by chassis 12 and is drivingly connected by conventional gearing such as worm and worm gear mechanisms 18 to rotate each axle 14. Any conventional battery motor, spring motor or inertia motor may be directed by conventional drive means to rotate the axles, as shown, for example in U.S. Pat. Nos. 3,359,680; 3,501,863; 3,540,152; 3,583,097; 3,810,515; 3,955,429; 3,959,920 and 3,981,098.
Each axle 14 has a pair of opposed ends 20. Adjacent each end 20 is a gear 22 that is secured to its respective axle for rotation with the axle. A wheel 24 is mounted adjacent one end 20 of each axle and a wheel 25 is mounted adjacent the other end 20 of each axle for rotation relative to chassis 12. Both wheels 24 on one side of the vehicle are identical and wheels 25 o the other side of the vehicle are of substantially the same construction although there are some elements that are essentially mirror images of similar elements on the other side so that the wheels on either end of the axle react the same in response to the single rotational direction of the axle. Accordingly, further details of the invention will only be discussed with respect to a single wheel 25.
Wheel 25 has a pair of diametrically opposed shells 26 and 27 with each shell having a respective diametrically opposed arcuate segment 30 and 31. The outsides of arcuate segments 30 and 31 are conveniently formed with tread defining grooves 32 that engage a surface over which toy vehicle 10 is propelled by rotation of the wheels 24 and 25 by motor 16 through worm and worm gear mechanisms 18. Extending inwardly from each arcuate segment of a pair, toward the opposed arcuate segment of the pair is a respective plate member 34 and 35. Each plate member 34 and 35 includes a respective diametrically elongated slot 36 and 37, with a respective rack 38 and 39 on one elongated side of each slot. At each opposed end of each of the slots is a curved end wall 40. In addition, each plate member 34 and 35 has on one face, a respective rail 42 and 43 plus a respective groove 44 and 45. The rail and groove of each plate member is generally parallel to, and disposed on an opposite side of, the elongated groove. However, as is best shown in FIG. 7, the rail and groove, unlike the elongated slot, extend the entire length of the plate. Elongated grooves 36 and 37 are substantially centered with respect to axle 14 and gear 22 and overlie each other when shells 26 and 27 are proximate, and abutting, each other.
Racks 38 and 39 are disposed on, and engageable with, an opposed toothed side of gear 22. Outward movement of the two diametrically opposed segments is limited by abutment of gear 22 against opposite curved end walls 40 of each of the plate members, or more particularly their elongated slots. As is best shown in FIGS. 5 and 7, rail 42 of plate 34 is slideably received in groove 45 of plate 35 on one side of the elongated slots, axle and gear, while rail 43 of plate 35 is slideably received in groove 44 of plate 34 on the opposite side of the slots, axle and gear. The engagement of the respective rails and grooves keeps plate members 34 and 35 from separating in a direction generally transverse to the axis of rotation of axle 14 and gear 22 while maintaining racks 38 and 39 in engagement with gear 22 and permitting the plate members and their respective arcuate segments to move toward and away from each other along a diameter of wheel 25.
Axle 14 extends outwardly from a hub 48 of chassis 12, as is best shown in FIG. 5, and plate 35 abuts the end of hub 48. On the end of axle 14 that extends beyond gear 22 is a decorative disc 50 and a fastener 52. Thus, plates 34 and 35 are kept from moving apart in a direction along axle 14 by being sandwiched between hub 48 and disc 50.
Shells 26 and 27 are normally maintained proximate each other, with their respective free ends 54 and 55 abutting each other, by a coil spring 56. As is best shown in FIGS. 5 and 6, one end 58 of coil spring 56 is anchored around hub 48, and hence axle 14, while the other end 60 is anchored around a pin 62 on plate member 35. Thus, it will be appreciated that as arcuate segments 30 and 31 are moved apart from each another, coil spring 56 will be wound. Except for pin 62, which is not needed on plate member 34, it will be appreciated that the two plate members are the same piece that are just flipped over with respect to each other.
As axle 14 and gear 22 are rotated in a clockwise direction, as shown in FIGS. 4 and 7, by motor 16 and drive mechanism 18, gear 22 will engage both rack 38 and rack 39 on plate members 34 and 35, respectively. Wheel 25 is initially rotated with the opposed arcuate segments in a first position proximate, and in abutment with, each other. Such transmission of torque and rotation of wheel 25 continues until wheel 25 encounters an impediment that stalls rotation of the wheel, continued rotation of axle 14 and gear 22 in the clockwise direction will then, through engagement of gear 22 with racks 38 and 39, drive each of the plate members and their respective arcuate segments 30 and 31 away from each other. With arcuate segments 30 and 31 in the extended position engaging the surface over which the toy vehicle is moving, the traction of the wheels is increased and toy vehicle 10 climbs up and over the obstacle or impediment as illustrated in FIG. 2. However, once the obstacle or impediment is overcome, the bias of coil spring 56 will return the opposed arcuate segments 30 and 31 back toward each other.
Disc 50 may be provided with suitable graphics which are partially masked when shells 26 and 27 are together. In addition, a free end 54 and 55 of each of the arcuate segments may be provided with an inwardly extending part such as simulated claws 64 and 65. Once the arcuate segments are driven away from each other claws 64 and 65, are exposed. However, when the arcuate segments are in their normal, unactivated condition in which they are toward, and abutting each other, claws 64 and 65 are obscured from view.
While a particular embodiment of the present invention has been shown and described, variations and modifications will occur to those skilled in the art. It is intended in the appended claims to cover all such variations and modifications as fall within the true spirit and scope of the present invention.
Patent Citations
Cited PatentFiling datePublication dateApplicantTitle
US4380135 *Aug 10, 1981Apr 19, 1983Marvin Glass & AssociatesFour wheel drive toy
Referenced by
Citing PatentFiling datePublication dateApplicantTitle
US5228880 *Jul 23, 1992Jul 20, 1993Meyer/Glass DesignClimbing vehicle
US5267888 *Aug 17, 1992Dec 7, 1993Mattel, Inc.Toy vehicle having articulated wheel portions
US5487692 *Sep 30, 1994Jan 30, 1996Tonka CorporationExpandable wheel assembly
US5720646 *Dec 5, 1996Feb 24, 1998Shannon; Suel G.Vehicle for use with games or demonstrative tools
US6264283 *Jan 31, 2000Jul 24, 2001Steven RehkemperAdjustable wheel for toy vehicles
US6419547Mar 27, 2000Jul 16, 2002Strombecker CorporationTilt and turn undercarriage apparatus
US7107934 *Jul 19, 2004Sep 19, 2006Robert HanksLitter box apparatus
US7380618Feb 22, 2005Jun 3, 2008Gamma Two, Inc.Stair climbing platform apparatus and method
US7806208May 30, 2008Oct 5, 2010Gamma Two, Inc.Stair climbing platform apparatus and method
US8020944 *Aug 25, 2009Sep 20, 2011Roger ThompsonWheel system with deformable tire
US8197298Nov 3, 2008Jun 12, 2012Mattel, Inc.Transformable toy vehicle
US20130309938 *Jan 3, 2013Nov 21, 2013RidemakerzToy vehicle having variable heights
Classifications
U.S. Classification446/448, 446/465
International ClassificationA63H17/267, A63H17/26
Cooperative ClassificationA63H17/262
European ClassificationA63H17/26B
Legal Events
DateCodeEventDescription
Feb 8, 1991ASAssignment
Owner name: BRESLOW, MORRISON, TERZIAN & ASSOCIATES, INC., 750
Free format text: ASSIGNMENT OF ASSIGNORS INTEREST.;ASSIGNORS:MULLANEY, SEAN T.;MORRISON, HOWARD J.;ROSENWINKEL, DONALD A.;AND OTHERS;REEL/FRAME:005609/0193
Effective date: 19910207
Oct 6, 1995FPAYFee payment
Year of fee payment: 4
Nov 2, 1999REMIMaintenance fee reminder mailed
Apr 9, 2000LAPSLapse for failure to pay maintenance fees
Jun 20, 2000FPExpired due to failure to pay maintenance fee
Effective date: 20000407
|
Uit Hack42
Ga naar: navigatie, zoeken
Project: RomanRotate
Schroefje24.png
Schroefje24.png
Schroefje24.png
Schroefje24.png
RomanRotate Picture.jpg
RomanRotate
Naam RomanRotate
Door Stoneshop, Dvanzuijlekom, WitchDoc
Status Afgerond
Madskillz Madness
Doel / Omschrijving
Roman numbering log rotation
Alle Projecten - Project Toevoegen
File:RomanRotate_Picture.jpg noez
This;
18:34 <@dvanzuijlekom> zo kwam ik een tijd geleden een machine tegen waar iemand handmatig een soort logrotate had ingeregeld
18:35 <@dvanzuijlekom> resultaat: logfile.log, logfile.log.1, logfile.log.1.1 logfile.log.1.1.1
logfile.log.1.1.1.1....logfile.log.1.1.1.1.1.1.1.1.1.1.1.1.1
18:39 <@Stoneshop> initieel wat romeinse invloeden, maar niet op de juiste manier voortgezet
18:42 <@dvanzuijlekom> oh wauw, dat zou best gaaf zijn eigenlijk
Was an incentive enough to create this bit of python code which provides Roman numbered log rotation
For recent updates check Github
#!/usr/bin/env python
import sys
import os
import re
import getopt
def debug(argv):
global verbose
if verbose:
print >>sys.stderr, "DBG: %s" % argv
def dec2rom(input):
"""
Convert a decimal to Roman numerals.
"""
assert(isinstance(input, int)), "expected integer, got %s" % type(input)
assert(-1 < input < 4000), "Argument must be between 0 and 3999"
ints = (1000, 900, 500, 400, 100, 90, 50, 40, 10, 9, 5, 4, 1)
nums = ('M', 'CM', 'D', 'CD','C', 'XC','L','XL','X','IX','V','IV','I')
result = ""
for i in range(len(ints)):
count = int(input / ints[i])
result += nums[i] * count
input -= ints[i] * count
return result
def rom2dec(input):
"""
Convert a roman numeral to a decimal.
"""
assert(isinstance(input, basestring)), "expected string, got %s" % type(input)
assert(re.match(r'^[MDCLXVI]*$', input)), "not a valid roman numeral: %s" % input
input = input.upper()
nums = ['M', 'D', 'C', 'L', 'X', 'V', 'I']
ints = [1000, 500, 100, 50, 10, 5, 1]
retValue = 0
for i in range(len(input)):
value = ints[nums.index(input[i])]
# If the next place holds a larger number, this value is negative.
try:
if ints[nums.index(input[i +1])] > value:
value *= -1
except IndexError:
# there is no next place.
pass
retValue += value
# Easiest test for validity...
if dec2rom(retValue) == input:
return retValue
else:
raise ValueError, 'input is not a valid roman numeral: %s' % input
def keys(value):
if re.match(r'([MDCLXVI]*)', value):
debug("Roman: %s, Decimal %s" % (value, rom2dec(value)))
return((rom2dec(value), value))
else:
return((value, dec2rom(value)))
def usage():
print """
Usage: %s [-v] [-h] [-d delimiter] [-l] [-t] file [file]
Description: Performs logrotation with roman numbering.
-v Verbose, show debug output
-h Help, show this usage
-d delimiter delimiter between filename and roman extension
deault; '.'
-l List the rotates files ordered by number
-t Reverse rotation or list
Attention: this might cause loss of data in the most recent logfile!
file the filename without numbers, i.e. "logfile.log" or "/path/to/logfile.log"
""" % sys.argv[0]
class FileList(set):
def __init__(self, directory, filename, delimiter):
if(directory!=''):
self._directory = directory
else:
self._directory = '.'
self._filename = filename
self._delimiter = delimiter
debug('Getting files for %s in directory %s' % (self._filename, self._directory))
for file in os.listdir(self._directory):
try:
parts = re.split(r'(%s)([%s]*)([MCXDVIL]*)' % (self._filename, self._delimiter), file)
if parts[1] == self._filename:
debug('Adding: %s %s' % (file, parts))
self.add(keys(parts[3]) + (parts[1], file,))
except Exception, err:
debug(err)
debug('Ignoring: %s' % file)
pass
def sort(self, reverse=False):
return sorted(self, key=lambda file: file[0], reverse=reverse)
if __name__ == "__main__":
global verbose
verbose = False
listOnly = False
reverse = False
delimiter = '.'
optlist, args = getopt.getopt(sys.argv[1:], 'lthvd:')
for option, value in optlist:
if(option == '-v'):
verbose = True
if(option == '-l'):
listOnly = True
if(option == '-t'):
reverse = True
if(option == '-d'):
delimiter = optarg
if(option == '-h'):
usage()
exit
debug('Verbose is on')
debug('Filenames: %s' % args)
for item in args:
debug('Processing: %s' % item)
myList = FileList(os.path.dirname(item), os.path.basename(item), delimiter)
if listOnly:
for file in myList.sort(reverse):
print file[3]
else:
for file in myList.sort(not reverse):
number = dec2rom(file[0] - (+1 if reverse else -1))
filename = file[2] + (('.' + number) if number != '' else '')
debug('renaming %s to %s.' % (file[3], "%s" % filename))
os.rename(file[3], "%s" % filename)
The code could be cleaned up a little and the usage method is missing but rumour has it it's already running in production (which is, of course, the best testing environment).
First revision; added Usage function and optional delimiter character. Solved bug 1; The core file (without any numbering) is now included in the renaming.
|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Xen-devel] [PATCH v10 00/20] x86/PMU: Xen PMU PV(H) support
Here is the tenth version of PV(H) PMU patches.
Changes in v10:
* Swapped address and name fields of xenpf_symdata (to make it smaller on
32-bit)
* Dropped vmx_rm_guest_msr() as it requires refcountig which makes code more
complicated.
* Cleaned up vlapic_reg_write()
* Call vpmu_destroy() for both HVM and PVH VCPUs
* Verify that (xen_pmu_data+PMU register bank) fit into a page
* Return error codes from arch-specific VPMU init code
* Moved VPMU-related context switch logic into inlines
* vpmu_force_context_switch() changes:
o Avoid greater than page-sized allocations
o Prevent another VCPU from starting VPMU sync while the first sync is in
progress
* Avoid stack leak in do_xenpmu_op()
* Checked validity of Intel VPMU MSR values before they are committed
* Fixed MSR handling in traps.c (avoid potential accesses to Intel MSRs on AMD)
* Fixed VCPU selection in interrupt handler for 32-bit dom0 (sampled =>
sampling)
* Clarified commit messages (patches 2, 13, 18)
* Various cleanups
Changes in v9:
* Restore VPMU context after context_saved() is called in
context_switch(). This is needed because vpmu_load() may end up
calling vmx_vmcs_try_enter()->vcpu_pause() and that needs is_running
to be correctly set/cleared. (patch 18, dropped review acks)
* Added patch 2 to properly manage VPMU_CONTEXT_LOADED
* Addressed most of Jan's comments.
o Keep track of time in vpmu_force_context_switch() to properly break
out of a loop when using hypercall continuations
o Fixed logic in calling vpmu_do_msr() in emulate_privileged_op()
o Cleaned up vpmu_interrupt() wrt vcpu variable names to (hopefully)
make it more clear which vcpu we are using
o Cleaned up vpmu_do_wrmsr()
o Did *not* replace sizeof(uint64_t) with sizeof(variable) in
amd_vpmu_initialise(): throughout the code registers are declared as
uint64_t and if we are to add a new type (e.g. reg_t) this should be
done in a separate patch, unrelated to this series.
o Various more minor cleanups and code style fixes
Changes in v8:
* Cleaned up a bit definitions of struct xenpf_symdata and xen_pmu_params
* Added compat checks for vpmu structures
* Converted vpmu flag manipulation macros to inline routines
* Reimplemented vpmu_unload_all() to avoid long loops
* Reworked PMU fault generation and handling (new patch #12)
* Added checks for domain->vcpu[] non-NULLness
* Added more comments, renamed some routines and macros, code style cleanup
Changes in v7:
* When reading hypervisor symbols make the caller pass buffer length
(as opposed to having this length be part of the API). Make the
hypervisor buffer static, make xensyms_read() return zero-length
string on end-of-symbols. Make 'type' field of xenpf_symdata a char,
drop compat_pf_symdata definition.
* Spread PVH support across patches as opposed to lumping it into a
separate patch
* Rename vpmu_is_set_all() to vpmu_are_all_set()
* Split VPMU cleanup patch in two
* Use memmove when copying VMX guest and host MSRs
* Make padding of xen_arch_pmu's context union a constand that does not
depend on arch context size.
* Set interface version to 0.1
* Check pointer validity in pvpmu_init/destroy()
* Fixed crash in core2_vpmu_dump()
* Fixed crash in vmx_add_msr()
* Break handling of Intel and AMD MSRs in traps.c into separate cases
* Pass full CS selector to guests
* Add lock in pvpmu init code to prevent potential race
Changes in v6:
* Two new patches:
o Merge VMX MSR add/remove routines in vmcs.c (patch 5)
o Merge VPMU read/write MSR routines in vpmu.c (patch 14)
* Check for pending NMI softirq after saving VPMU context to prevent a
newly-scheduled
guest from overwriting sampled_vcpu written by de-scheduled VPCU.
* Keep track of enabled counters on Intel. This was removed in earlier patches
and
was a mistake. As result of this change struct vpmu will have a pointer to
private
context data (i.e. data that is not exposed to a PV(H) guest). Use this
private pointer
on SVM as well for storing MSR bitmap status (it was unnecessarily exposed to
PV guests
earlier).
Dropped Reviewed-by: and Tested-by: tags from patch 4 since it needs to be
reviewed
agan (core2_vpmu_do_wrmsr() routine, mostly)
* Replaced references to dom0 with hardware_domain (and is_control_domain with
is_hardware_domain for consistency)
* Prevent non-privileged domains from reading PMU MSRs in VPMU_PRIV_MODE
* Reverted unnecessary changes in vpmu_initialise()'s switch statement
* Fixed comment in vpmu_do_interrupt
Changes in v5:
* Dropped patch number 2 ("Stop AMD counters when called from
vpmu_save_force()")
as no longer needed
* Added patch number 2 that marks context as loaded before PMU registers are
loaded. This prevents situation where a PMU interrupt may occur while context
is still viewed as not loaded. (This is really a bug fix for exsiting VPMU
code)
* Renamed xenpmu.h files to pmu.h
* More careful use of is_pv_domain(), is_hvm_domain(, is_pvh_domain and
has_hvm_container_domain(). Also explicitly disabled support for PVH until
patch 16 to make distinction between usage of the above macros more clear.
* Added support for disabling VPMU support during runtime.
* Disable VPMUs for non-privileged domains when switching to privileged
profiling mode
* Added ARM stub for xen_arch_pmu_t
* Separated vpmu_mode from vpmu_features
* Moved CS register query to make sure we use appropriate query mechanism for
various guest types.
* LVTPC is now set from value in shared area, not copied from dom0
* Various code and comments cleanup as suggested by Jan.
Changes in v4:
* Added support for PVH guests:
o changes in pvpmu_init() to accommodate both PV and PVH guests, still in
patch 10
o more careful use of is_hvm_domain
o Additional patch (16)
* Moved HVM interrupt handling out of vpmu_do_interrupt() for NMI-safe handling
* Fixed dom0's VCPU selection in privileged mode
* Added a cast in register copy for 32-bit PV guests cpu_user_regs_t in
vpmu_do_interrupt.
(don't want to expose compat_cpu_user_regs in a public header)
* Renamed public structures by prefixing them with "xen_"
* Added an entry for xenpf_symdata in xlat.lst
* Fixed pv_cpuid check for vpmu-specific cpuid adjustments
* Varios code style fixes
* Eliminated anonymous unions
* Added more verbiage to NMI patch description
Changes in v3:
* Moved PMU MSR banks out from architectural context data structures to allow
for future expansion without protocol changes
* PMU interrupts can be either NMIs or regular vector interrupts (the latter
is the default)
* Context is now marked as PMU_CACHED by the hypervisor code to avoid certain
race conditions with the guest
* Fixed races with PV guest in MSR access handlers
* More Intel VPMU cleanup
* Moved NMI-unsafe code from NMI handler
* Dropped changes to vcpu->is_running
* Added LVTPC apic handling (cached for PV guests)
* Separated privileged profiling mode into a standalone patch
* Separated NMI handling into a standalone patch
Changes in v2:
* Xen symbols are exported as data structure (as opoosed to a set of formatted
strings in v1). Even though one symbol per hypercall is returned performance
appears to be acceptable: reading whole file from dom0 userland takes on average
about twice as long as reading /proc/kallsyms
* More cleanup of Intel VPMU code to simplify publicly exported structures
* There is an architecture-independent and x86-specific public include files
(ARM
has a stub)
* General cleanup of public include files to make them more presentable (and
to make auto doc generation better)
* Setting of vcpu->is_running is now done on ARM in schedule_tail as well
(making
changes to common/schedule.c architecture-independent). Note that this is not
tested since I don't have access to ARM hardware.
* PCPU ID of interrupted processor is now passed to PV guest
The following patch series adds PMU support in Xen for PV(H)
guests. There is a companion patchset for Linux kernel. In addition,
another set of changes will be provided (later) for userland perf
code.
This version has following limitations:
* For accurate profiling of dom0/Xen dom0 VCPUs should be pinned.
* Hypervisor code is only profiled on processors that have running dom0 VCPUs
on them.
* No backtrace support.
* Will fail to load under XSM: we ran out of bits in permissions vector and
this needs to be fixed separately
A few notes that may help reviewing:
* A shared data structure (xenpmu_data_t) between each PV VPCU and hypervisor
CPU is used for passing registers' values as well as PMU state at the time of
PMU interrupt.
* PMU interrupts are taken by hypervisor either as NMIs or regular vector
interrupts for both HVM and PV(H). The interrupts are sent as NMIs to HVM guests
and as virtual interrupts to PV(H) guests
* PV guest's interrupt handler does not read/write PMU MSRs directly. Instead,
it
accesses xenpmu_data_t and flushes it to HW it before returning.
* PMU mode is controlled at runtime via
/sys/hypervisor/pmu/pmu/{pmu_mode,pmu_flags}
in addition to 'vpmu' boot option (which is preserved for back compatibility).
The following modes are provided:
* disable: VPMU is off
* enable: VPMU is on. Guests can profile themselves, dom0 profiles itself and
Xen
* priv_enable: dom0 only profiling. dom0 collects samples for everyone.
Sampling
in guests is suspended.
* /proc/xen/xensyms file exports hypervisor's symbols to dom0 (similar to
/proc/kallsyms)
* VPMU infrastructure is now used for HVM, PV and PVH and therefore has been
moved
up from hvm subtree
Boris Ostrovsky (20):
common/symbols: Export hypervisor symbols to privileged guest
x86/VPMU: Manage VPMU_CONTEXT_SAVE flag in vpmu_save_force()
x86/VPMU: Set MSR bitmaps only for HVM/PVH guests
x86/VPMU: Make vpmu macros a bit more efficient
intel/VPMU: Clean up Intel VPMU code
vmx: Merge MSR management routines
x86/VPMU: Handle APIC_LVTPC accesses
intel/VPMU: MSR_CORE_PERF_GLOBAL_CTRL should be initialized to zero
x86/VPMU: Add public xenpmu.h
x86/VPMU: Make vpmu not HVM-specific
x86/VPMU: Interface for setting PMU mode and flags
x86/VPMU: Initialize PMU for PV(H) guests
x86/VPMU: When handling MSR accesses, leave fault injection to callers
x86/VPMU: Add support for PMU register handling on PV guests
x86/VPMU: Handle PMU interrupts for PV guests
x86/VPMU: Merge vpmu_rdmsr and vpmu_wrmsr
x86/VPMU: Add privileged PMU mode
x86/VPMU: Save VPMU state for PV guests during context switch
x86/VPMU: NMI-based VPMU support
x86/VPMU: Move VPMU files up from hvm/ directory
xen/arch/x86/Makefile | 1 +
xen/arch/x86/domain.c | 25 +-
xen/arch/x86/hvm/Makefile | 1 -
xen/arch/x86/hvm/hvm.c | 3 +-
xen/arch/x86/hvm/svm/Makefile | 1 -
xen/arch/x86/hvm/svm/svm.c | 10 +-
xen/arch/x86/hvm/vlapic.c | 3 +
xen/arch/x86/hvm/vmx/Makefile | 1 -
xen/arch/x86/hvm/vmx/vmcs.c | 84 +-
xen/arch/x86/hvm/vmx/vmx.c | 34 +-
xen/arch/x86/hvm/vpmu.c | 265 -------
xen/arch/x86/oprofile/op_model_ppro.c | 8 +-
xen/arch/x86/platform_hypercall.c | 33 +
xen/arch/x86/traps.c | 62 +-
xen/arch/x86/vpmu.c | 855 +++++++++++++++++++++
xen/arch/x86/{hvm/svm/vpmu.c => vpmu_amd.c} | 158 ++--
.../x86/{hvm/vmx/vpmu_core2.c => vpmu_intel.c} | 637 ++++++++-------
xen/arch/x86/x86_64/compat/entry.S | 4 +
xen/arch/x86/x86_64/entry.S | 4 +
xen/common/event_channel.c | 1 +
xen/common/symbols.c | 54 ++
xen/include/Makefile | 2 +
xen/include/asm-x86/domain.h | 2 +
xen/include/asm-x86/hvm/vcpu.h | 3 -
xen/include/asm-x86/hvm/vmx/vmcs.h | 9 +-
xen/include/asm-x86/hvm/vmx/vpmu_core2.h | 51 --
xen/include/asm-x86/{hvm => }/vpmu.h | 86 ++-
xen/include/public/arch-arm.h | 3 +
xen/include/public/arch-x86/pmu.h | 75 ++
xen/include/public/platform.h | 19 +
xen/include/public/pmu.h | 93 +++
xen/include/public/xen.h | 2 +
xen/include/xen/hypercall.h | 4 +
xen/include/xen/softirq.h | 1 +
xen/include/xen/symbols.h | 3 +
xen/include/xlat.lst | 5 +
36 files changed, 1783 insertions(+), 819 deletions(-)
delete mode 100644 xen/arch/x86/hvm/vpmu.c
create mode 100644 xen/arch/x86/vpmu.c
rename xen/arch/x86/{hvm/svm/vpmu.c => vpmu_amd.c} (74%)
rename xen/arch/x86/{hvm/vmx/vpmu_core2.c => vpmu_intel.c} (60%)
delete mode 100644 xen/include/asm-x86/hvm/vmx/vpmu_core2.h
rename xen/include/asm-x86/{hvm => }/vpmu.h (59%)
create mode 100644 xen/include/public/arch-x86/pmu.h
create mode 100644 xen/include/public/pmu.h
--
1.8.1.4
_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel
Rackspace
Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.
|
Back to all articles
July 30, 2021
The differences between HTML, CSS and Javascript (and some great tips to build your first website!)
Ironhack - Life-Changing Global Tech School
Web Development
UX/UI Design
Ever nodded your head to say you understand something, but secretly you didn't? And then you're like, OMG, why did I do that? And the next thing you know, you are being asked a question about that thing that you said you knew about or worse, you've been assigned a task to do that thing you said you knew about. Nightmare! Well, lucky for you, if you continue reading, you won't have that problem when it comes to CSS, HTML and Javascript. But maybe you still will in other aspects of your life, like trying to impress someone on a date. You: "oh yeah, I love that band" - *googles band in the bathroom* (by the way, you should really stop doing that), but hey, one thing at a time, we're only human ;).
Anyway, let's cut to the chase, shall we? If you've been playing with the idea of building your own website or ever had to manage someone else's, you will most probably have come across HTML, CSS and Javascript. These are the three primary building blocks of any website or webpage. They work together, yet, as we will explain, all play distinctive roles when it comes to coding and web creation.
What is HTML?
Perhaps at some stage of your life, you have clicked on the little HTML icon (</>) and seen a whole lotta what looks like random, confusing text and symbols that make you jump and feel like you have stepped into some confusing low budget version of The Matrix and pressed Esc a bunch of times to hope it will all go away? And prayed you hadn't mucked anything up? That, my friend, is the world of HTML; we promise it's not as scary or even confusing as it looks. Once you come to understand it, it's another language or world you come to appreciate and maybe even love. So, let's start with what HTML is short for; it's the acronym for Hypertext Markup Language. Hypertext is essentially the "structural text", and a markup language is a special "language" or "content" that computers understand, which was originally designed to describe web pages and make content interactive; think of it as the skeleton of a website. HTML was released in 1989 as an official publishing language of the world wide web and is the initial building block webpage creation. There are three main elements of HTML; tags, elements and attributes, and its most recent version is HTML5. HTML5 bears all the original trademarks of regular HTML yet, is more dynamic and incorporates far less code but still allows you to build something brilliant in no time!
What is CSS?
CSS is two critical things. It's a killer girl alternative rock band from the 2000s that we strongly recommend you have a groove to! But CSS, for the direct purposes of this article and your knowledge, is also an essential building block for coding your website!
So, CSS in the tech world stands for Cascade Styling Sheets (how cool is that?!). As the name suggests, CSS defines the appearance and style of the website. It helps determine colour, fonts, positioning of certain elements and even a little bit of animation. This means that CSS makes up a pretty important chunk of your website, being the visual elements and aesthetics. CSS followed the creation of HTML to make websites look nicer, and indeed it did otherwise, websites would just look all the same, black and white, some hyperlink blue and times a new roman font (BORING!). So if HTML is the skeleton, CSS is the skin, eyes, hair, nose and feet of a website that makes it unique and distinguishable.
So while HTML and CSS work nicely together, they're pretty distinct languages. And learning them both means you can also use them separately too, as they both have a myriad of different applications! You can focus on these two and build a website with our expert Uros Cirkovic in just 60 minutes for FREE. Sounds pretty good, a little too good, but we promise there are no hidden surprises, just excellent knowledge, and by the end of it, you'll have your very own website. Interested? Check out "How to build a website with HTML and CSS in 60 min".
Okay, we are nearly there...
What is Javascript?
This is where things get a little more complicated. Javascript is present on almost every functional website, and it allows websites to be dynamic and interactive. It's the language web developers use to create websites that respond to the user's commands and movements. And Javascript can actually give you the power to change the HTML and CSS on a website. It's like the puppet master.
For example, with Javascript, you can do the following:
• Play a preview when your cursor hovers over a video
• Play an animation when you scroll down
• Make a menu pop out when you hit a button on the keyboard
• Make keyboard shortcuts for your site
• Create a moving photo gallery so users can switch between slides
And the list goes on...
How do these three all work together?
A brief example: so if you have an online fashion store and the first thing you get on your website is a pop up "10% off if you sign up today," that is Javascript. Whereas HTML is the price, sizes, description, picture of item etc, and CSS will be how your online store looks, the colours, typeface, image size, boards and more.
Now that you know the difference between HTML, CSS and Javascript and how they help one another, we have some essential tips for starting to plan your website. And remember, this is a process, one you can truly enjoy!
8 tips you've got to follow to build a website from scratch:
1. Pick!
Choose what you want to put into practice, like writing a CV, Portfolio, or landing page about a particular service offering.
2. Would you please not focus on how it looks at this stage?
Take that pressure right off! You will get to "glow up" your website soon, but you just need to get the structure and content sorted at this stage.
3. Rough it!
There's a reason for the word draft; it's a rough copy of your brilliant idea soon to come to full fruition. Think of it as a rough diamond soon to be polished.
4. Think about the structure
You can always look at other websites you like for inspiration but keep it simple to start with. For example, think of where you want the main navigation to be and what you want in the footer. Honestly, many of us developers just grab a pen and paper and quickly draw to imagine the basic layout (many of us still draw worse than 7-year-olds, so don't expect a masterpiece; you don't need it here).
5. Practice your copywriter skills
You can totally add some filler lorem ipsum at this moment, buuuut if you feel your creative juices flowing, just roughly write them out. This will save you from going back as the text will be there, ready and waiting. Also, if you, for example, choose to practice your Portfolio, think about a few lines regarding what you do and who you are and the areas you work and your work and education experience.
6. Check some design references beforehand.
Do some visual inspiration research. When it comes to CSS, you'll have to think about the design itself, like width, height, margin, padding, position, background colour, font size, etc. So we recommend you visit some websites you like as a reference point or benchmark to have a clearer visual concept.
7. Do it by watching our webinar :)
Allow us to assist you! Trust us, it's way easier, and we are really friendly :). So we are sure that the learning experience will be fun and easy to absorb rather than reading and trying everything yourself. Our webinar is almost like a private class, and you will be done in just 60 minutes
8. Celebrate!
Oooh yeah, ya did it! Whatever it looks like, you have taken a giant leap! And so to make this process more enjoyable, it's time you celebrated! Glass of wine? Boogie in your room to your favourite song? Hug someone you love? Whatever it is, we strongly encourage it!
So now that you've read this article and know a thing or two about building a website from scratch, maybe you're thinking, “this is interesting”, “I like this”, “I could do this as a job”. Think of all the celebrating you'll get to do. But in all honesty, you can make a serious career out of this and become a total pro (trust us, you'll be in high demand!). So if you're dreaming big and want to become a master in Web Development, check our Bootcamps here!
Related Articles
Ready to join?
More than 10,000 career changers and entrepreneurs launched their careers in the tech industry with Ironhack's bootcamps. Start your new career journey, and join the tech revolution!
Find out more
Legal termsTerms and conditions
© 2013-2022 Ironhack. All Rights Reserved
|
Mediterranean Diet
The Mediterranean Diet is a valuable cultural heritage that represents more than just a nutritional guideline, rich and healthy. It is a balanced lifestyle that includes recipes, ways of cooking, celebrations, customs, typical products and various human activities.
PREDIMED (PREvención con DIeta MEDiterránea), es un ensayo clínico multicéntrico, de grupos paralelos, aleatorizado y controlado destinado a evaluar los efectos de la Dieta Mediterránea en la prevención primaria de enfermedades cardiovasculares (www.predimed.org; ISRCTN35739639).
Este estudio duró 10 años (2003 – 2012), donde colaboraron 16 grupos de investigadores en 8 comunidades autónomas de España. Los participantes fueron asignados al azar para que siguieran uno de los tres grupos de dieta: Dieta mediterránea complementada con aceite de oliva virgen, complementada con frutos secos y dieta baja en grasas de acuerdo con directrices de la American Heart Association.
As a main result, it was observed that the Mediterranean diet supplemented with extra virgin olive oil or nuts influenced the reduction of the risk of presenting a cardiovascular event. From this, our group and other researchers who have worked on this trial, have supported, through various publications, that the Mediterranean diet has a positive impact on health, so promoting its consumption is necessary for the prevention of cardiovascular diseases.
We have evaluated the relationship of tomato consumption (fresh, gazpacho and tomato sauce), with excretion of polyphenols in urine. Also how the consumption of these foods influences blood pressure and the incidence of hypertension. Finally, we study the effect of tomato-related consumption patterns in certain genetic polymorphisms on blood pressure.
Due to the results of the PREDIMED study that support the importance of the Mediterranean diet in the prevention of cardiovascular diseases, in 2013 it was decided to carry out another complementary study, called PREDIMED PLUS (www.predimedplus.com; ISRCTN89898870), in order to assess the effect of a multifactorial intervention on the reduction of cardiovascular morbidity and mortality in adults over 55 years of age who are overweight and obese.
The design of this study consists of carrying out an intensive intervention, based on the consumption of a low-calorie Mediterranean diet, supplemented with extra virgin olive oil and nuts, in addition to promoting physical activity and behavioral therapy; versus an intervention similar to the PREDIMED study, based only on a Mediterranean diet supplemented with extra virgin olive oil and nuts. The final results of this multicenter study will be seen from 2020.
|
Please use this identifier to cite or link to this item: https://hdl.handle.net/2440/1377
Citations
Scopus Web of Science® Altmetric
?
?
Full metadata record
DC FieldValueLanguage
dc.contributor.authorTomo, S.-
dc.contributor.authorTomo, I.-
dc.contributor.authorTownsend, G.-
dc.date.issued1998-
dc.identifier.citationAnatomical Record, 1998; 251(3):346-350-
dc.identifier.issn0003-276X-
dc.identifier.issn1097-0185-
dc.identifier.urihttp://hdl.handle.net/2440/1377-
dc.descriptionArticle first published online: 6 DEC 1998-
dc.description.abstractAlthough the human digastric muscle is classified as a suprahyoid muscle, none of the digastric muscles in other mammals are classed as suprahyoid in textbooks of veterinary anatomy. The aim of this study was to describe the anatomical relationship of the digastric muscle in a marsupial, the kangaroo, and to consider factors thought to be important in leading to the different position of the muscle in quadrupeds compared with humans. Eight heads of the common wallaroo (Macropus robustus) were used in this study. They were fixed by injection of 10% formalin solution into the carotid arteries and dissected under a stereomicroscope. The digastric muscle in the common wallaroo arose from the paroccipital process of the temporal bone and inserted into the mandible but had no intermediate tendon or any connection with the hyoid bone. It was supplied by both the mandibular and facial nerves. The hyoglossus muscle attached to the inferior surface of the hyoid bone and its ventral border overlapped the mylohyoid muscle. The hypoglossal nerve passed between these two muscles. Therefore, in contrast to humans, the digastric, hyoglossus, and mylohyoid muscles in the kangaroo were all located inferior to the hyoid bone. Differences in head posture and the position of the larynx between kangaroos and humans may account for the observed difference in the digastric muscle's position relative to the hyoid bone between these species.-
dc.description.statementofresponsibilitySoichiro Tomo, Ikuko Tomo, and Grant C. Townsend-
dc.language.isoen-
dc.publisherWiley-Liss-
dc.rights© 1998 Wiley-Liss, Inc.-
dc.subjectdigastric muscle-
dc.subjecthyoid bone-
dc.subjectsuprahyoid muscle-
dc.subjectcomparative anatomy-
dc.titleDigastric muscle of the kangaroo: a comparative anatomical study-
dc.typeJournal article-
dc.identifier.doi10.1002/(SICI)1097-0185(199807)251:3<346::AID-AR10>3.0.CO;2-O-
pubs.publication-statusPublished-
Appears in Collections:Aurora harvest 2
Dentistry publications
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.
|
Batteries Batteries - 2 months ago 36
Java Question
Java: Finding the shortest word in a string and printing it out
I'm a novice with Java. I took a class in C, so I'm trying to get myself out of that mode of thinking. The program I'm writing has a section in which the user enters an integer, n, and then n number of words afterwards. This section then searches through those words and finds the shortest one, then returns it to the user. For instance, an input might be:
INPUT: 4 JAVA PROGRAMMING IS FUN
OUTPUT: IS
The code I have currently seems to return the wrong word. In this instance, it returns "PROGRAMMING", when it should return "IS". I thought maybe you all could point me in the right direction.
int numwords = scan.nextInt();
String sentence = scan.nextLine();
String shortestword = new String();
String[] words = sentence.split(" ");
for (int i = 0; i < numwords; i++){
if (shortestword.length() < words[i].length()){
shortestword = words[i];
}
}
System.out.printf(shortestword);
To give you an idea of what I was trying to do, I was attempting to enter the words into a string, "sentence," then break that string up into individual words in an array, "words[]," then run a for loop to compare the strings to each other by comparing the lengths to the entries in the array. Thank you for your assistance!
Answer
You're almost there, but your comparison to detect the shortest word is reversed. It should be:
if (words[i].length() < shortestword.length()) {
That is, if your current word's length is less than the length of your previous shortest word, overwrite it.
Also, instead of starting with an empty String, start with the first word, i.e., words[0]. Otherwise, the empty string will always be shorter than any string in your array:
String[] words = sentence.split(" ");
String shortestword = words[0];
for (int i = 1; i < numwords; i++) { // start with 1, because you already have words[0]
|
Home · Dental Technology · Developmental Anomalies of the Jaws · Dent-Wiki.com -
Developmental Anomalies of the Jaws
The development of the jaw starts around the end of the third week of embryonic life. The normal development process can be interrupted by malformations due to inhibitory factors, by which palatine tori do not develop fully and fail to fuse together in the midline.
Normal fusion advances like a zip fastener, closing from front to back as far as the uvula. If union of the palatine processes at the median palatine suture does not take place, this gives rise to a cleft palate extending from the incisive foramen to the uvula, which is also split. There are numerous degrees of severity, from a complete cleft through to a uvular cleft (Fig 9-2); clefts that only affect the soft palate may be referred to as velar clefts.
Forms of cleft lip, jaw, and palate
Cleft lip (cheiloschisis) denotes a split in the upper lip. This form can be surgically closed during the fourth to sixth month of life with a good functional and cosmetic outcome. Left-sided cleft lip is twice as common as right-sided, or the cleft may be bilateral (Fig 9-3); a cleft in the middle of the lip is very rarely seen.
Partial clefts of the lip, at their least pronounced, are evident as slight furrows in the red of the lips or as a small dent next to the philtrum. Cleft lip can be found in every possible combination with cleft palate.
Cleft jaw (gnathoschisis) denotes a split of the maxilla because the incisive bone has not grown together with the maxilla at the intermaxillary suture. It usually occurs in conjunction with other cleft deformities.
Isolated cleft palate (palatoschisis or uranoschi-sis) is a malformation of the hard and soft palate where the whole palatine vault is split along the median palatine suture.
Complete cleft (cheilognathopalatoschisis or cheilognathouranoschisis) is a cleft palate combined with bilateral cleft lip and jaw. This most severe form of cleft is twice as common in males as in females. The abnormality in development of the palate, jaw, and lips is usually accompanied by anomalies of the tooth germs in the region of the cleft. For instance, delayed growth or schizodontia (development of twin tooth forms) of the incisors may occur in both the primary and the permanent dentition. Frequently, individual teeth may be entirely absent, or several teeth may erupt.
In fact, anomalies of tooth formation often occur outside the cleft area as well. There is evidence that cleft formation and development of the wrong number of teeth (too few or too many) have causes in common.
The developmental anomaly in the form of cleft lip, jaw, and palate leads to stunting of the maxilla, while the mandible grows to normal size.This creates an impression of prognathism and hence protrusion of the mandible.These complete clefts result from the combined effect of congenital and environmental factors or damage caused by medication; they are therefore a multifactorial condition.
Developmental anomalies in the primary dentition
If there is no abnormality in the shape of a complete cleft, the primary dentition will develop normally. Malposition of teeth is relatively rare and only slightly pronounced.
Typical anomalies in the immediate area of the mouth include the following:
• Tongue doubling, shortening (microglossia), absence (aglossia), or cleft
• Medial cleft of the mandible
• Duplication of the maxilla and the mandible (not viable)
• Underdevelopment of the mandible (hypoplasia)
• Crowding if a few primary teeth are duplicated
• Premature eruption of the primary teeth and permanent teeth; premature dentition (primary dentition complete after first year of life, permanent dentition complete after third year of life)
Facial clefts refer to various forms of malformation due to inhibited development, such as nasal, eyelid, forehead, lower lip, or tongue clefts, which are mostly associated with anomalies of tooth position and displacement of occlusal position. The oblique facial cleft (meloschisis) extends from the upper lip to the eye, while a transverse facial cleft (macrostomia) widens the oral orifice at the sides. Facial clefts can be remedied in several operations, the aim of which is to achieve normal anatomical forms with sufficiently esthetic conditions and to establish masticatory function and phonetics. In most cases, orthodontic treatments are required as well as the surgical procedures.
Thanks ->
Adjacent teeth After filling tooth hurts Bad breath Bone defects Dental occlusal trauma Endodontic endosseous implant
Copyright@ 2009 - 2018, "www.dent-wiki.com"
|
Why is Vaping HARMFUL TO YOUR WELLBEING?
Why is Vaping HARMFUL TO YOUR WELLBEING?
Why is Vaping HARMFUL TO YOUR WELLBEING?
The question “How come Vaporizing Bad?” has been on my lips for the last few months. There were many arguments help with on both sides of the argument, with each side citing Novo 2 scientific proof to support their position. As a lifelong ex-smoker, Personally i think compelled to create the record straight with this very important subject. After all, nobody should smoke and harm themselves or others.
why is vaping bad
There are lots of facts that show why vaporizing your cigarettes is bad. Right now, you may have found out about the dangers of secondhand smoking. Also, there are numerous rumors that produce quitting smoking dangerous. And, while there are many harmful toxins in cigarettes, a lot of them are from the tar and not the nicotine. Tar is what can cause cancer in smokers and may be the main reason people crave the nicotine. Tar gets into your lungs once you smoke in fact it is impossible to clear it out without going for a hit of nicotine gum.
So, how come vaporizing bad? As the tar in your lungs gets into your blood stream and travels to the human brain. This is bad as the tar will irritate your nasal passages and cause inflammation. With an increase of irritation, come more pain. If you use e-cigs, the car still enters your blood stream and when you use them for an extended enough period, your body may experience some degree of chronic irritation and pain.
So, this is actually the final reason why vaporizing your cigarettes is harmful to your health. The youth have yet to discover the toxins and bacteria in e-cigarette smoke. They are still getting their nicotine fix from the vaporizers, which are made mostly of plastic. When adults start using these products, they’ll find that their body does not function enjoy it normally would and their brains are not used to getting their nicotine fix within an alternate way.
Many researchers believe that there are more serious health issues involved with smoking than cancer. Besides lung damage, there is the issue of heart damage. Youth who start smoking with e cigarettes may also develop cardiovascular problems as time passes. Why is vaporizing regular cigarettes bad? Because the youth are not used to getting their nicotine fix within an alternative way.
As well as the health concerns, the lungs may also be damaged when you stop smoking with e cigarettes. Nicotine is a highly addictive drug that damages your lungs. It causes tissue damage to the lungs and as time passes, you lungs can deteriorate. Because of this , is vaporizing regular cigarettes is bad.
Not merely does vaporizing regular cigarettes harm your lungs, in addition, it harms your throat. When you smoke, your throat and tonsils get damaged by the chemicals. This is why you will notice after a while that you can’t smell the tobacco. Tobacco in its normal state is definitely smelly. The reason for this is due to tobacco is highly processed and mixed with many other chemical agents.
The easiest way to quit smoking would be to switch to a program that promoting quitting cigarettes. You can find two options. It is possible to either go through one of the many different programs that promote healthy living and healthy lifestyles. Or, you can test to quit smoking with one of the variety of nicotine replacement products available on the market. These nicotine replacement products incorporate gum, patches, lollipops, and also electric rechargeable batteries.
There are numerous different reasons why is e-juices bad for you. One reason is basically because they contain heavy metals. Heavy metals can build-up in your body if you don’t remove them for some reason. When you smoke a cigarette, these heavy metals enter your lungs and then lodge in them. The more you smoke, the more difficult it is for the body to reduce these toxins.
Because of this , is e-cigs are so very bad for you. When you smoke a cigarette, these toxins stay static in your lungs and lodge inside them. With an electronic cigarette, you won’t ever touch any of the chemicals. You merely put your cigarette out, put your hand on your stomach, and put the cigarette out. You do not even touch any of the toxins.
The end result is that e-cigs and other e-cigarette products are harmful to you because they usually do not burn the toxins that conventional tobacco uses. But using an electronic cigarette instead of a standard cigarette will help you in lots of ways. It will cause you to healthier. It will keep your lungs clean, free from nasty toxins, and can even help with keeping your heart healthy. The reason why is e-cigs along with other e-cigarette products are so very bad for you is because they’re not good for you at all, shape, or form.
harrison377
Website:
|
WordPress.org
Forums
User Profile
euro-space.net
User Activity
Recent Replies
1. Need to setup a https redirect to WP in a subfolder User last replied: 9 months ago. No replies since.
2. Do I need a web host before downloading WordPress? User last replied: 9 months ago. Most recent reply: 9 months ago by CMSHelpLive.
3. My Site is running very slowly, and giving 500 errors User last replied: 1 year ago. Most recent reply: 1 year ago by catacaustic.
4. Add-on domains, multiple hosts, and FTP User last replied: 1 year ago. No replies since.
5. Why is my server in Europe, does it matter? User last replied: 1 year ago. Most recent reply: 1 year ago by Ipstenu (Mika Epstein).
6. Database Import & File Transfer (from local to web) Issues User last replied: 1 year ago. No replies since.
7. re-direct to new domain User last replied: 1 year ago. No replies since.
8. Is this a Host Problem? User last replied: 1 year ago. No replies since.
9. Moving an wordpress installation User last replied: 2 years ago. No replies since.
10. hosting User last replied: 2 years ago. No replies since.
11. [closed] Standard Hosting or VPS required? User last replied: 3 years ago. No replies since.
12. Change hosting plans User last replied: 3 years ago. No replies since.
13. Is this right for me? User last replied: 3 years ago. Most recent reply: 3 years ago by Christine Rondeau.
Threads Started
No more topics posted.
|
At last, a sure-cold way to sell cryonics with guaranteed success!
A humorous romp through a promising new technique in aesthetic medicine from one cryonicist’s (warped) point of view.
Figure 1: Before cryopreservation (L) and after cryopreservation (R).
As everyone involved in cryonics for more than a fortnight is sadly aware, cryonics doesn’t sell. Indeed, if we were pitching a poke in the eye with a sharp stick, we’d more than likely have more takers than we’ve had trying to ‘market’ cryonics to the public. To see evidence that this is so, you need only wander around a shopping mall on a weekend and observe all the (painfully) stainless steel lacerated and brightly colored needle-pierced flesh sported by the young and trendy and increasing by the old and worn, as well.
Yes, it’s clear; we misread the market, to our lasting detriment.
It’s true that we’ve tried the ‘you’ll be rich when you wake you up line,’ and heaven knows we’ve beaten the ‘you’ll be young and beautiful forever’ line, well, virtually beaten it to death. And while people are certainly interested in great fortune and youth, both of these things share the same unfortunate shortcoming, namely that they are things that people either don’t have but want, or do have and don’t want to lose. As anyone who is really savvy at marketing will tell you, the best way to sell something is to promise (and preferably be able to deliver) that you can get rid of something that people have and really don’t want – something that is ruining the quality of their life, destroying their health, draining their pocketbook and, worst of all, making them really, really ugly.
So, it turns out that for onto 50 years now, we’ve missed the real selling point of cryonics that’s been there all along: IT WILL MAKE YOU THIN! Guaranteed!
Can such a claim be true? Well, surprisingly, the answer would seem to be an almost unqualified, “Yes!”
Recently it’s been discovered that adipocytes, the cells responsible not only for making you fat, but for making you hungry, as well, are particularly susceptible to a phenomenon in cryobiology that has proved a nettlesome (and only recently (partially) overcome) barrier to solid organ cryopreservation: chilling injury. Quite apart from freezing damage due to ice crystals forming, adipocytes are selectively vulnerable to something called ‘chilling injury.’ 1-5 Chilling injury occurs when tissues are cooled to a temperature where the saturated fats that comprise their cell membranes (external and internal) freeze. You see, saturated fat, which is the predominant type of fat in us humans, freezes well above the temperature of water – in fact, it freezes at just below room temperature. That’s why that big gash of fat on the edge of your T-bone steak is stiff and waxy when it is simply refrigerated, and not frozen.
Figure 2: Chilling injury is thought to result from crystallization of cell membrane lipids.
Chilling injury isn’t really well understood. In the days before both cryobiology and indoor heating, humans used to experience a very painful manifestation of it in the form of chilblains – tender swelling and inflammation of the skin due to prolonged cold exposure (without freezing haven taken place). In the realm of organ preservation it is currently thought that chilling injury occurs when cell membranes are exposed to high subzero temperatures (-5oC to -20oC), again, in the absence of freezing.
There is evidence that the lipids (fats) that make up the smooth, lamellar cell membranes undergo crystallization when cells are cooled much below 0 deg C. Since the crystals are hexagonal in shape and have a hole in the middle, this has the effect of creating a pore or hole in the membrane. Cells don’t like that – those holes let all kinds of ions important to cells keeping their proper volume and carrying on their proper metabolic functions leak in and out, as the case may be. This isn’t merely an inconvenience for cells, it’s downright lethal. Without boring you with technical details, it is possible to partially address this state of affairs in organ preservation by adjusting the ‘tonicity’ of the solution bathing the cells: oversimplifying even more, this means by increasing the concentration of salts to a concentration higher than would normally be present
Figure 3: Contouring of the skin in a pig subjected to brief, subzero cooling of subcutaneous fat.
But, to return to our chilled adipocytes and the promise not only of weight loss, but of a fat-free future; adipocytes are killed, en masse, when their temperature is dropped to between 0 and -7oC. Within a few days of exposure to such temperatures they undergo programmed cell death (apoptosis) and within a couple of months they are phagocytized by the body; and all that ugly and unwanted fat is carted off to be used as fuel by the liver. Now the rub would seem to be that this effect is most pronounced when the temperature of the tissue is cooled to below the freezing point of water and held there – preferably for a period of 10 minutes or longer.
That sounds dire, doesn’t it? What about the skin, the fascia, blood vessels, and the other subcutaneous tissues that will FREEZE (in the very conventional sense of having lots and lots of ice form in them)? Well, the answer, as any long-time experimental cryobiologist will know (even if he won’t tell you) is: pretty much nothing. Way back in the middle of the previous century, a scientist named Audrey Smith and her colleagues at Mill Hill, England found that you could freeze hamsters ‘solid’ – freeze 70+% of the water in their skin and 50% of the water in their bodies – and they would recover from this procedure none the worse for wear. Similarly, those of us who have carelessly handled dry ice for a good part of our lives will tell you that we see parts of our fingertips turn into stiff chalky islands of ice all the time, with the only side effect being a bit of temporary numbness that resolves in a few days to a week – certainly a side effect well worth it to avoid the considerable inconvenience of rummaging around to find a pair of protective gloves.
Figure 4: The Zeltiq Cool Sculpting Cryolipolysis device.
But alas, we scientists (most of us, anyway) are not a very entrepreneurial lot, and so we never thought either of inventing the ZeltiqTM cryolipolysis system, or using ‘the thin-new-you’ as a marketing tool for cryonics.
Yes, that’s right; some very clever folks have found a way to make a huge asset out of a colossal liability – to organ preservationists, anyway. Around 2004 a Minneapolis dermatologist named Brian Zellickson, MD, who specialized in laser and ultrasonic skin rejuvenating procedures, made a not so obvious connection. Both laser and skin ‘face-lifting’ and skin ‘rejuvenation’ procedures rely on the subcutaneous delivery of injuring thermal energy to the tissues of the face, or other treated parts of the body (cellulite of the buttocks and thighs are two other common areas for treatment). These energy sources actually inflict a second degree burn in a patchy and well defined way to the subdermal tissues.
Now this may seem a very counterintuitive thing to do if you are trying to induce ‘rejuvenation’ or ‘lift’ a sagging face. But if you think about it, it makes a great deal of sense. As any burn victim will tell you, one of the most difficult (and painful) parts of recovery is stretching the highly contracted scar tissue that has formed as a result of the burn injury. Indeed, for many patients with serious burns over much of their body, the waxy, rubbery and very constricting scar tissue prevents the return of normal movement, and can lock fingers and even limbs into a very limited range of motion. Many burn victims must do painful stretching exercises on a daily basis to avoid the return of this paralyzing skin (scar) contracture.
And it must be remembered that aged skin – even the skin of the very old – can still do one thing, despite the many abilities it has lost with age, and that thing is to form scar tissue in response to injury. Thus, laser and ultrasonic heating of normal (but aged) skin induces collagen proliferation and large-scale remodeling of the skin. For all the bad things said about scar tissue it is still a remarkable achievement in that it does constitute regenerated tissue. Regenerated tissue which does the minimum that normal skin must do to keep us alive: provide a durable covering that excludes microbial invasion, and prevents loss of body fluids. By injuring the tissue just below the complexly differentiated layer of the dermis (with its hair follicles, sweat glands and highly ordered pigmentation cells) much of the benefit of ‘scarring’ is obtained without the usual downsides.
The injured tissues respond by releasing collagen building cytokines as well as cytokines that result in angiogenesis (new blood vessel formation) and widespread tissue remodeling. And all that newly laid down collagen contracts over time, tightening and lifting the skin – and the face it is embedded in. These techniques may justly be considered much safer versions of the old fashioned chemical face peel, which could be quite effective at erasing wrinkles and achieving facial ‘rejuvenation,’ but was not titrateable and was occasionally highly unpredictable: every once in awhile the result was disastrous burning and accompanying long term scarring and disfiguration of the patient’s face.
St some point Dr. Zellickson seems to have realized that the selective vulnerability of adipocytes to chilling offered the perfect opportunity for a truly non-invasive approach to ‘liposuctioning’ by using the body’s own internal suctioning apparatuses, the phagocytes, to do the job with vastly greater elegance and panache than any surgeon with a trocar and a suction machine could ever hope to do. Thus was invented the Zeltiq Cool SculptTM cryolipolysis machine.6
Figure 5: The cooling head of the Zeltiq devive equipped with ultrasonic imaging equipment and a suction device to induce regional ischemia and hold the tissue against the cooling surface.
The beauty of cryolipolysis is that it is highly titrateable, seems never to result to in excessive injury to, or necrosis of the overlying skin, and yields a smooth and aesthetically pleasing result. Not unjustifiably for this reason it is marketed under the name Cool SculptingTM. The mechanics of the technique are the essence of simplicity. The desired area of superficial tissue to be remodeled is entrained by vacuum in a cooling head equipped with temperature sensors, an ultrasonic imaging device, and a mechanical vibrator. The tissue in the cooling head is sucked against a conductive surface (made evenly conductive by the application of a gel or gel-like dressing to the skin) where heat is extracted from it. The tissue is cooled to a temperature sufficient to induce apoptosis in the adipocytes, while at the same time leaving the overlying skin untouched. The depth of cooling/freezing is monitored by ultrasound imaging and controlled automatically by the Zeltiq device. At the appropriate point in the cooling process the tissue is subjected to a 5 minute period of mechanical agitation (massage) which helps to exacerbate the chilling injury, perhaps by nucleating the unfrozen fat causing it to freeze.7 When the treatment is over, the device pages an attendant to return to the treatment room and remove it.
The tissue under vacuum is also made ischemic – blood ceases to flow, and this has the dual advantage of speeding the course of the treatment by preventing the blood borne delivery of unwanted heat – and more importantly, by making the cooling more uniform, predictable and reproducible. It also has the effect of superimposing ischemic injury on top of the chilling injury which is something that seems to enhance adipocyte apoptosis. The whole treatment, in terms of actual cooling time, takes about 60 minutes. In the pig work which served as the basis for the human clinical treatments, the duration of treatment was only 10 minutes: but the cooling temperature was also an ‘unnerving’ -7oC. The degree of temporary and fully reversible peripheral nerve damage (that temporary numbness us ‘dry ice handlers’ know so well) was more severe at this temperature, although it resolved in days to a week or two, without exception.
As previously noted, cryolipolysis causes apoptosis of adipocytes and this results in their subsequently being targeted by macrophages that engulf and digest them. This takes time, and immediately after treatment there are no visible changes in the subcutaneous fat. However, three days after treatment, there is microscopic evidence that an inflammatory process initiated by the apoptosis of the adipocytes is underway, as evidenced by an influx of inflammatory cells into the fat of the treated tissues. This inflammatory process matures between seven and fourteen days after treatment; and between fourteen and thirty days post-treatment, phagocytosis of lipids is well underway. Thirty days after treatment the inflammatory process has begun to decline, and by 60 days, the thickness of interlobular septa in the fat tissue has increased. This last effect is very important because it is weakness, or failure of the interlobular fat septae that is responsible for the ugly ‘cottage cheese’ bulging that is cellulite. Three months after the treatment you get the effect you see below on the ‘love handles’ of this fit, and otherwise trim fellow. Thus, it is fair to say that Cool SculptingTM is in no way a misnomer.
Figure 6: Art left is a healthy, fit young male who has persistent accumulation of fat in the form of ‘love handles’ that are resistant to diet and exercise and the same man 3 months after cryolipolysis.
Does cryolipolysis really work? The answer is that it works extremely well for regional remodeling or sculpting of adipose tissue – those pesky love handles, that belly bulge around the navel, that too plump bum, or those cellulite marred thighs. So far it has not been used to try and ablate large masses of fat – although there seems no reason, in principal, why this could not be done using invasive techniques such as pincushioning the fat pannus with chilling probes, as is done with cryoablation in prostate surgery. However, this would be invasive, vastly more expensive, and likely to result in serious side effects.
And that was one of the really interesting things about the research leading up to FDA approval of cryolipolysis: it seems to cause no perturbation in blood lipids, no disturbance of liver function (the organ that has to process all that suddenly available fat) and no global alterations in immune function. It seems to be safe and largely adverse effect free. There is some localized numbness (as is the case in freezing of skin resulting from handling dry ice) but it resolves without incident with a few weeks of the procedure.8
So, all of this makes me wonder, since human tissues tolerate ice formation and respond to it in much the same way as they do to laser or ultrasound ‘rejuvenation’ (depending upon the degree of damage) a logical question is, “would it be possible to use partial freezing of the skin – just enough to provoke the remodeling response – as a method of facial rejuvenation?” It should be safer than a chemical people and it is, like laser and ultrasound therapy, titrateable.
Figure 7: “Gad darn it, this shiny gold stuff keeps getting into the silt I’m tryin to git out of this here river!”
Which returns me to the whole subject of cryonics: fat is very poorly perfused and it seems unlikely that things done to moderate or abolish chilling injury will be nearly so effective for the adipocytes in fat (if it they are effective at all). That means that we might well all come back from our cryogenic naps not only young, via the magic of nanotechnology and stem cell medicine, and rich via the miracle of compound interest (which none other than Albert Einstein once remarked was “the most powerful force in the universe”), but also THIN! For all these years organ cryopreservationists, like Fahy and Wowk, have been panning for the mundane silt of a way around a chilling injury9 all the while discarding the gleaming nuggets of gold that were persistently clogging up their pans.
We cryonicists should not repeat their error and should realize a good thing when we see it. Now, for the first time, we can credibly claim that if you get cryopreserved you’ll come back not only young and rich, but young and rich and beautiful and thin!
Methinks there must be very few in the Western World today, man woman or child, who can resist a product that has all that to offer – and which, by the way, bestows practical immortality in the bargain.
Ok, Ok, maybe we shouldn’t mention that last part about immortality; it might scare the children.
REFERENCES:
1) Wiandrowski TP, Marshman G. Subcutaneous fat necrosis of the newborn following hypothermia and complicated by pain and hypercalcaemia. Australas J Dermatol 2001;42:207–10.
2) Diamantis S, Bastek T, Groben P, Morrell D. Subcutaneous fat necrosis in a newborn following icebag application for treatment of supraventricular tachycardia. J Perinatol 2006;26:518–
3) Lidagoster MI, Cinelli PB, Levee´ EM, Sian CS. Comparison of autologous fat transfer in fresh, refrigerated, and frozen specimens: an animal model. Ann Plast Surg 2000;44:512–5.
4) Wolter TP, von Heimburg D, Stoffels I, et al. Cryopreservation of mature human adipocytes: in vitro measurement of viability. Ann Plast Surg 2005;55:408–13.
5) Manstein D, Laubach H, Watanabe K, Farinelli W, Zurakowski D, Anderson RR. Selective cryolysis: a nivel method of noninvasive fat removal. Lasers Surg Med 2008;40:595–604.
6) Avram MM, Harry RS. Cryolipolysis for subcutaneous fat layer reduction. Lasers Surg Med. 2009 Dec;41(10):703-8. Review. PubMed PMID: 20014262.
7) Zelickson B, Egbert BM, Preciado J, Allison J, Springer K, Rhoades RW, Manstein D. Cryolipolysis for noninvasive fat cell destruction: initial results from a pig model. Dermatol Surg. 2009 Oct;35(10):1462-70. Epub 2009 Jul 13. PubMed PMID: 19614940.
8) Coleman SR, Sachdeva K, Egbert BM, Preciado J, Allison J. Clinical efficacy of noninvasive cryolipolysis and its effects on peripheral nerves. Aesthetic Plast Surg. 2009 ul;33(4):482-8. Epub 2009 Mar 19. PubMed PMID: 19296153.
9) Fahy GM, Wowk B, Wu J, Phan J, Rasch C, Chang A, Zendejas E. Cryopreservation of organs by vitrification: perspectives and recent advances. Cryobiology. 2004 Apr;48(2):157-78.
Evidence based cryonics
Cryonics patients can greatly benefit from rapid stabilization after pronouncement of legal death. One fortunate feature of stabilization procedures is that the most effective and validated procedures are relatively inexpensive and easy to perform. The difference between no stabilization procedures at all and procedures that aim to rapidly restore blood circulation and drop the patient’s temperature is likely to be bigger than that between such basic stabilization and procedures that include administration of a large number of medications and remote blood washout. This observation gains even more importance when it is considered that there is a serious lack of empirical data to support these more advanced procedures.
To date, no single neuroprotective agent has been approved for the treatment of global or focal ischemia. Despite this fact, cryonics organizations like Alcor and Suspended Animation administer an unorthodox number of medications to protect the brain and prevent impairment of circulation. While there are peer reviewed papers that combine a number of medications, there is no precedent in mainstream medicine or biomedical research in using such a large number of medications (in contemporary cryonics, medications protocol exceeds 12 different drugs and fluids). The only existing justification for using current protocol reflects work done at Critical Care Research in the 1990s. Although scattered reports exist about the effectiveness of this protocol in resuscitating dogs from up to 17 minutes of normothermic global ischemia, no detailed (peer reviewed) paper has been published about these experiments. Another concern involves the extrapolation of these findings to cryonics. It would go beyond the general nature of this piece to document all the differences between these controlled experiments and cryonics as practiced in the real world, but suffice it to say that the factors of shorter and longer delays, longer drug administration times, suboptimal “post-ischemia” circulation, and induction of hypothermia introduce many unknowns about the efficacy of these drugs for cryonics patients. In the case of some medications, like streptokinase, heparin, and dextran 40, a case could be made that the potential benefits outweigh the unknowns, but should this argument be extended to all medications?
Even more complexity is introduced when cryonics organizations make an attempt to wash out the blood and substitute it with a universal organ preservation solution. The rationale for this procedure is found in conventional organ preservation and emergency medicine research. The question in organ preservation research is no longer whether hypothermic organs benefit from blood substitution with a synthetic solution, but what the ideal composition of such a solution should be. In emergency medicine research asanguineous hypothermic circulatory arrest is increasingly being investigated to stabilize trauma victims. But it is a major step from these developments to the practice of remote blood washout of ischemic patients with expected transport times of 24 hours or more. At present the only sure benefit of remote blood washout is that it enables more rapid cooling of the patient, a benefit that should not be underestimated. But when liquid ventilation becomes available to cryonics patients, rapid cooling rates will be possible without extracorporeal circulation.
The lack of relevant published data to support the administration of large numbers of drugs and remote blood washout in cryonics is not just a matter of risking performing redundant procedures. A lot of time and resources are being spent in cryonics on obtaining and maintaining equipment and supplies for these procedures, in addition to the licensing fees paid to use some of these technologies and the training and recruiting of people to perform them. But perhaps the most troublesome problem is that the preparation and execution of these procedures during actual cryonics cases can seriously interfere with rapid and effective cardiopulmonary support and induction of hypothermia.
There is an urgent need to move from extrapolation based cryonics to evidence based cryonics. This will require a comprehensive research program aimed at creating realistic cryonics research models. It will also require vast improvements in the monitoring and evaluation of cryonics cases. The current debate should no longer be between advocates and opponents of standby and stabilization but about what stabilization procedures should be used by cryonics organizations given our current knowledge.
Viewing cryonics as an experimental medical procedure does not necessarily commit one to the position that substantial amounts of money and resources should be allocated to recruiting medical professionals and expensive equipment. The most common sense implication of the views outlined above is that the most effective measures to improve the care of cryonics patients are encouraging members to relocate to the area of their cryonics organization, improved health tracking of existing members, and cryonics training aimed at teaching the basic procedures and techniques that confer real evidence based benefits.
D(+)-Lactose and other sugars in organ preservation and cryonics
A PDF file of this document is available with images and structural visualization of various sugars.
D(+) lactose monohydrate is the principal sugar in mammalian milks. The monohydrate part is easiest to explain; it simply means that the lactose molecule has one water molecule attached to it. This is important because some chemicals can have a lot of water molecules attached to them. For instance, you can have magnesium chloride with two attached water molecules (dihydrate) or six attached water molecules (pentahydrate). This becomes very important when you are weighing out a chemical and you need the chemical to be present in the correct amount. You’ll understand how important this is if you consider that someone proposes to sell you a kilo of some very valuable chemical (say 100 times more valuable than gold per milligram). There is going to be a considerable difference in the amount (by weight and usually by volume) of the actual active chemical you get per milligram or gram (weight) depending upon how hydrated it is (how many water molecules it has attached. The molecular weight (molecular mass) of magnesium chloride is 203.30 and the molecular weight (MW) of water is 18.01. Now, if you have 6 water molecules for each magnesium chloride molecule you have a total mass of water of (18.01 x 6) = 108.06. That means if you have the pentahydrate salt of magnesium chloride you must add the weight of the 6 water molecules to the MW of magnesium chloride: 203.30 + 108.06 = 311.36. So, if someone is selling you a gram of magnesium chloride pentahydrate at the same price you can buy magnesium chloride anhydrous (no water) you are getting cheated because you are paying the same price for a gram of product that is 1/3rd water!
In biology and chemistry the same principle applies because if you need a certain amount of a chemical for critical reasons, say to maintain normal cell function or inhibit cell swelling in hypothermia, then you must account for any water molecules that may be attached to the chemical. In the case of magnesium chloride pentahydrate versus anhydrous magnesium chloride you are going to have to weigh out about 1/3rd more of the powder of the pentahydrate salt in order to get the same amount of magnesium chloride present in one gram of the anhydrous salt.
Why have pentahydrate, monohydrates, dihydrates and so on of chemicals? The answer is that some chemicals are almost impossible to handle in room air without rapidly absorbing water. Some chemicals will absorb just so much water and no more and thus are very stable under conditions of normal use, so they are supplied in this form. Some chemicals, especially organic chemicals, are virtually impossible to economically produce without one or more attached water molecules. Magnesium chloride is a really good example because it is intensely hygroscopic; it will literally pull water out of the air right before your eyes. So, not only is anhydrous magnesium chloride more expensive than the pentahydrate, it is virtually impossible to handle. If you try to weigh it out it will literally be grabbing water from the ambient air so fast that you can’t tare it on the scale. In seconds you will see tiny droplets of water on the weighing boat or paper where the magnesium chloride has literally pulled so much water out of the air it is fully dissolved in a tiny droplet of water! Calcium chloride is just about as bad, so, you’ll notice that we don’t even bother trying to weigh these chemicals out as dry powders, but rather buy them as pharmaceutical products for injection because they are already dissolved in solution in very precise concentrations. Thus, it is much simpler to draw up the correct volume of these salts dissolved in solution to add the desired amount of these two chemicals to perfusate. It is possible to weigh them, but you have to be quick and it helps if you live the desert where the humidity is very low.
Now we come to the D(+) part which is much harder to explain. In the early part of the 19th Century the French physicist Dominique F.J. Arago noticed that when he passed polarized light through quartz crystals the light could be rotated either to the left or right depending upon the individual crystal. Shortly thereafter the brilliant physicist and mathematician Jean Baptise Biot (the Biot number, a dimensionless number used in unsteady-state (or transient) heat transfer calculations, is named after him) also observed this same effect in liquids and gases of organic substances such as turpentine and some other petroleum products. About 10 years later the English astronomer Sir Joun F.W. Herschel discovered that different crystal forms of quartz rotated the linear polarization in different directions. Simple polarimeters have been used since this time to measure the concentrations of monosaccharide sugars, such as glucose, in solution. In fact, one name for glucose, -dextrose-, is so named because it causes linearly polarized light to rotate to the right or “dexter” side. Similarly, levulose, more commonly known as fructose (fruit sugar) causes the plane of polarization to rotate to the left. Fructose is even more strongly levorotatory than glucose is dextrorotatory. Invert sugar which is formed by adding fructose to a solution of glucose, gets its name from the fact that subsequent structural conversion causes the direction of rotation to “invert” from right to left.
The reason for this behaviour of these seemingly identical substances was not understood until the mid-19th Century when Pasteur was working on the problem of why wine was souring as opposed to fermenting into an alcohol solution. The culprit was yeast that metabolized the fructose in the grape juice to tartaric acid. A solution of tartaric acid derived from living things (the wine lees yeasts) rotated the plane of polarization of light passing through it, whereas chemically synthesized tartaric acid prepared by non-organic means in the laboratory did not have this effect. This was puzzling because both the synthetic and the biologically derived tartaric acid undergo the same chemical reactions and are identical in their elemental (atomic) composition. Pasteur noticed that the crystals came in two asymmetric forms that were mirror images of one another. He meticulously sorted the crystals by hand and then dissolved each of the two forms of crystals in water; solutions of one form rotated polarized light clockwise, while the other form rotated light counter-clockwise. An equal mix of the two had no polarizing effect on light. Pasteur deduced the molecule tartaric acid molecule was asymmetric and could exist in two different forms that resemble one another; as would left- and right-hand gloves, and that the organic form of the compound consisted purely of the one type.
This phenomenon is referred to as isomerism and occurs when two molecules have the same molecular formula (atomic composition) yet have different structures and therefore different chemical and physical properties. There are many different kinds of isomers. The two major divisions of isomers are the geometric and the structural. Structural isomers are isomers that have the same number of atoms but different arrangement of atoms. One structural isomer of glucose is fructose. Geometric isomers are identical in arrangement of covalent bonds but are different in the order that the groups are arranged.
A major category is stereoisomers which are two isomers that have the number of atoms in the same order. A stereoisomer of glucose is galactose. In the Fischer projection all of the atoms are the same except for one rotated group. There are two categories of stereoisomers, enantiomers and diastereomers. Enantiomers are two isomers that are mirror images of each other when looked at in 3D while diastereomers are not. Galactose is just one of many diastereomers of glucose. To find out the possible number of stereoisomer forms a monosaccharide can have, you can use the formula 2x where x is the number of chiral carbons the molecule has. Molecular chirality occurs when a sugar has a carbon with four different groups attached to it. Any carbon with a double bond on it is never chiral nor are the end carbons. Because glucose has four chiral carbons there are 24 different stereoisomers; which means that there are sixteen different stereoisomers for glucose.
Two of the main divisions of glucose’s many forms are l-glucose and d-glucose. These two are enantiomers which are determined by whether the two molecules are symmetrical at the last chiral carbon. When the hydroxyl group is on the last chiral carbon on the right it is considered d-glucose and when it is on the left it is classified as l-glucose. The “d” means that the glucose rotates polarized light to the right (dextrorotatory) and the “l” stands for levorotary (rotates polarized light to the left). These refer to how a plane of light rotates as it passes through a solution of it. First light is passed through a polarizing filter, then a polarimeter containing a solution made with the molecule. When a d-solution is in the polarimeter it will cause the light to turn to the right or at positive angle, while an l-solution will cause the light to turn to the left or a negative angle. Both d-glucose and l-glucose exist naturally but d-glucose, also called dextrose, is the most abundant sugar on the planet.
The practical biological and chemical implications of these isomeric structural differences is profound. D-glucose (dextrose) is the principal sugar used by the body to generate energy. By contrast, l-glucose cannot be significantly metabolized and an animal or human would starve to death if this was the only carbohydrate available in its diet and no other sources of energy (fats or proteins) were available. L-glucose looks, tastes and has the same mouth feel as d-glucose and there has been considerable interest in producing it in large quantities as an artificial sweetener. Unfortunately, the synthetic pathway to produce l-glucose, and more importantly, the separation of the d- and l-glucose isomers after synthesis is currently prohibitively expensive.
What does all this have to with cryonics and organ preservation? Under normal metabolic conditions the cells of the body produce chemical energy in the form of ATP and about 1/3rd of this energy is used to pump ions into and out of the cells. This is necessary because the most common salts (ions) are very small and can easily pass through the cell membranes. Two straightforward examples are very much on-point. Cells need high concentrations of the potassium ion inside them to be able to function properly including carrying out some vital chemical reactions and doing things like contracting in the case of muscles or transmitting signals in the case of nerve cells. Conversely, cells must not have too much sodium in them or they become swollen (edematous) and while this can ultimately rupture or lyse the cell, long before this happens cell swelling disrupts the meshwork of supports that maintain the cell’s shape and probably serve as scaffolding for various enzymes to be anchored on and to facilitate efficient chemical processing (metabolism). Unfortunately, sodium has a net negative charge and the protein inside cells has a net positive charge. Thus, sodium will flow into cells and carry water with it resulting in cellular edema. This process is prevented by active pumping of sodium out of the cell. Similarly, calcium is extremely toxic to cellular mitochondria in high concentrations and calcium is also used as a critical signalling molecule inside cells. Thus, the calcium concentration outside cells is typically 10,000 times higher than that present inside cells. Again, this difference in concentration is maintained largely by active pumping which requires energy expenditure and on-going metabolism.
So, sodium gets pumped out and potassium gets pumped in and this process is linked and carried out by the same molecular machine; the sodium-potassium pump. Of course, all of this presumes that there is both available energy in the form of ATP and that the cellular pumping machinery can use that energy. There are a number of things that can interrupt ion pumping. There can be a lack of energy due to starvation, hypoxia or ischemia, and there can exist situations where the energy is available but cannot be used. Some chemicals poison enzymes critical to ion pumping; a classic example is tetrodotoxin which comes from blowfish and which poisons sodium pumping. The other condition where adequate energy (ATP) can exist but cannot be used is deep hypothermia. Non-hibernating animals have enzymes that shut down or become inactive when the temperature is reduced well below that of normal body temperature. In humans (and most non-hibernating mammals) the enzyme responsible for pumping sodium out of cells and potassium into them, sodium-potassium-ATPase, is largely inhibited at 10oC and is virtually shut down at few degrees above 0 oC.
Cell swelling in brain cells occurs with incredible rapidity after interruption of blood flow in ischemia (cardiac arrest). While cell swelling is not the only, or even primary, cause of injury in cerebral ischemia, it is a major player in causing injury in cold ischemia; conditions which obviously obtain in organ preservation and ultra-profound hypothermia in cryonics patients. The way this edema is prevented in organ preservation is to replace almost all of the small cell membrane permeable ions with big molecules that cannot pass through the cell membrane and which are osmotically active; in others words can hold water outside of the cell. The first solution to do this with any success was Collin’s Solution invented by Geoff Collins. It used comparatively large phosphate salts to keep water outside of the cells and prevent cellular edema. However, phosphates do leak across the cell membrane and they are incompatible with DMSO and also precipitate as crystals when solutions are cooled to low temperatures or frozen.
Thus, the organ preservationists turned to sugars and sugar alcohols as molecules to serve as an osmotic agent and prevent cell swelling. Sugars are comparatively large molecules and some are very large. They do not typically pass through cell membranes rapidly, if at all. Some of the first sugars tried were glucose and sucrose and the sugar-alcohol mannitol. Neither glucose nor sucrose worked well. Glucose leaks across cell membranes fairly rapidly and has facilitated transport in the brain. Sucrose makes quite viscous solutions in the necessary concentrations (~180 mM) and for unknown reasons is toxic to the kidney tubule cells. Mannitol was much more successful in the laboratory but never made it into clinical organ preservation solutions.
In the 1980s, a biochemist named Jim Southard and a transplant surgeon named Folkert Belzer began to systematically study molecules to inhibit cold ischemic swelling, as well as other molecules to help conserve ATP, inhibit free radical damage, and otherwise address the derangements that occur under deep hypothermic conditions. They identified two sugars as particularly effective in inhibiting cold ischemic cellular edema, raffinose and lactobionate. They combined these two sugars along with other ingredients to create the first and still most successful “universal” organ preservation solution, UW-Solution, or as it is commercially marketed, Viaspan.
Unfortunately, ViaSpan does not work for the brain. We tried it extensively in the early 1990s and got serious cerebral edema followed by convulsions and death in dogs that had been perfused with ViaSpan for as little as two hours! By contrast, we could recover dogs perfused with MHP (a mannitol based perfusate) after 5-hours of bloodless perfusion with the solution at 5oC with no neurological or other problems; most of the dogs were placed with cryonics members and lived out the rest of their lives normally.
Recently, 21st Century Medicine has been systematically investigating hypothermic organ preservation and they have made a number of stunning breakthroughs. One thing which was long overdue to be done was to systematically screen various molecules for their cell swelling inhibiting effects. They found that one sugar in particular was highly effective, D(+)-lactose. Only the d-isomer worked well.
Why some sugars work and others do not, or actually cause harm, is a mystery. The molecular weight is certainly a factor, but different sugars with nearly identical molecular weights may perform totally differently. Also, the isomer of the sugar appears critical in some cases, as is the situation with lactose. 21st Century Medicine has patented an organ preservation based on D(+)-lactose and is in Phase II clinical trials for this solution, which they call TranSend. They are currently getting 72-hour simple flush and store on ice preservation of kidneys (rabbit and dog), pancreases and livers (dogs) and are getting similar results in the human clinical trials. They have achieved 48-hour heart preservation using a derivative of this solution which combines periods of trickle-flow cold perfusion with brief intervals of modest warming to ~15 oC.
Polyethylene glycol and cryonics
The blog Al Fin reports on polyethylene glycol (PEG) as an acute treatment for traumatic brain and spinal cord injury. PEG is hypothesized to confer cytoprotection by sealing damaged cell membranes. As such, PEG would also seem a promising candidate for the treatment of acute neural insults in which progressive cell permeability / damage plays a part such as stroke and cardiac arrest. Unfortunately, the inability of high molecular weight polymers to cross an intact blood brain barrier (BBB) may limit the use of PEG as a treatment for cerebral ischemia. One study that investigated PEG in a model of middle cerebral artery occlusion (MCAo) did not find any benefits for PEG. In cryonics, membrane sealing polymers like PEG may still be useful because they can cross the compromised BBB and prevent cell lysis when transport of the patient is delayed. Its membrane sealing properties may also be useful for extending the time cryonics patients can be perfused without causing edema.
As a high molecular weight polymer, PEG has also been investigated as a component for cold organ preservation solutions. A number of studies have found that PEG can be substituted for hydroxyethyl starch (HES) as the oncotic agent in University of Wisconsin solution (commercial name: Viaspan). Replacing HES with PEG in UW solution also decreases red blood cell aggregation and viscoscity.
PEG is also briefly discussed by Mike Perry as an embedding medium in his article about low-cost alternatives to cryonics.
Remote blood washout in cryonics
One argument that is often raised in favor of “field vitrification” (or vehicle based vitrification) is that it will reduce the time of (cold) ischemia and eliminate the harmful effects of remote blood washout and transport of a patient on water ice to a cryonics facility. A related argument is that field vitrification will eliminate stabilization.
In fact, field vitrification will not eliminate the need for stabilization because patients need to be protected from warm ischemic injury after cardiac arrest until a location to carry out cryoprotectant perfusion has been secured and surgical access to the patient’s vessels has been established (a procedure that, in cryonics, takes at least fifteen minutes under the best of circumstances). During that period the patient will still require prompt cardiopulmonary support, induction of hypothermia, and administration of anticoagulants and neuroprotective agents. As a consequence, stabilization times should not differ between field vitrification or remote blood washout. In light of the possibility that field vitrification will likely require more demanding and time-consuming surgery, field vitrification might even necessitate longer stabilization times. The only procedure that could reduce or eliminate stabilization would be hospital-based vitrification.
Field vitrification will reduce the period between cardiac arrest and the start of cryoprotective perfusion. But whether this is a clear advantage or not depends on the question of whether remote blood washout and transport on water ice introduces additional injury to the patient. Recent anecdotal observations of cryoprotective perfusion of patients who have been washed out in the field indicate that the procedure of blood washout itself may be harmful. It is not clear, however, whether this is an intrinsic element of remote blood washout and cold transport or the result of poor perfusion techniques and flawed composition of the organ preservation solutions that are used to replace the blood.
In cryonics, remote blood washout is done for at least three reasons: (1) to eliminate the possibility of blood clotting and hypothermia-induced red cell membrane rigidity, rouleaux formation, and cold agglutination; (2) to remove ischemia-induced inflammatory products and endotoxins from the circulation; and (3) to protect the patient from hypothermia-induced cell injury and edema by substituting the blood with an organ preservation solution.
The organ preservation solution used today is called MHP-2. The original MHP solution is a modification of RPS-2 (an organ preservation solution for hypothermic kidney preservation created by Greg Fahy at the American Red Cross) and stands for Mannitol-Hepes-Perfusate. It is designed as a so called “intracellular” organ transplant solution. In order to reduce passive ion exchange as a result of hypothermia-induced cell membrane pump inhibition, its composition more closely resembles the composition of the solution inside the cell rather than the interstitial fluid or blood plasma. MHP also contains molecules to provide oncotic support, prevent acidosis, and reduce free radical damage. In a series of groundbreaking experiments by Jerry Leaf and Michael Darwin, MHP was successful in resuscitating dogs from up to 5 hours of asanguineous ultraprofound hypothermia. MHP-2 is a modification of MHP that is believed to produce superior results.
A number of arguments have been put forward why remote blood substitution with MHP-2 is not successful in securing viability of the brain during transport, and may even produce adverse effects. The most obvious reason is that MHP has been validated for up to 5 hours of ultraprofound hypothermia, which is not the typical transport time of a cryonics patient. A related problem is that MHP has not been validated in a model that reflects the typical cryonics patient who experiences variable periods of hypoperfusion and warm ischemia prior to and after cardiac arrest. And, unlike the canine asanguineous ultraprofound hypothermia experiments, in cryonics MHP is used as static cold preservation solution instead of being continuously perfused at low flow rates. Although MHP can reportedly recover dogs from up to 3 hours of asanguineous circulatory arrest (clinical death), such a protocol further reduces the time that viability of the brain can be maintained during transport.
Although the MHP patent and the notebooks from the original washout experiments are clear that MHP should be prepared as a hyper-osmolar perfusate (~ 400 mOsm), it has been established that in recent years many batches of MHP have not been mixed with hyper-osmolality as an endpoint, due to a lack of osmometry quality controls. The exact effects of this are unknown but have been hypothesized to explain why recent remote blood washout has produced worse results than in the past, possibly by aggravating, or in the case of a hypo-osmolar perfusate, producing edema. This problem, and the confusion about the exact composition of MHP-2, is briefly discussed in the Suspended Animation case report of Cryonics Institute patient CI-81.
Field vitrification is not the only solution to the limitations of remote blood washout and transport on water ice. Another solution would be to improve the composition of hypothermic organ preservation solutions and perfusion protocols to secure extended periods of cerebral viability during transport. Instead of substituting the patient’s blood with an organ preservation solution, after which the patient is shipped on water ice, the organ preservation solution can be continuously (or intermittently) perfused at low flow rates, similar to machine perfusion in conventional organ preservation, while the patient is being driven in a rescue vehicle to a cryonics facility. This has a number of advantages, including the possibility to sustain aerobic metabolism, improve microcirculation and administer cytoprotective agents.
Although cerebral viability of the brain may be extended by improved organ preservation solutions, there seems to be a fundamental limit to shipping patients in hypothermic circulatory arrest because the remaining energy demands of the brain will need to be satisfied by oxidative phosphorylation (or other energy substrates) at some point. Although it is not known how far these limits can be pushed by static use of organ preservation solutions, it is likely that a protocol of continued hypothermic perfusion of remote cryonics patients will exceed these limits. Like field vitrification, such a protocol will present non-trivial technical and logistical challenges.
This still leaves the question of whether remote blood washout can aggravate injury in ischemic patients unanswered. Since the original canine experiments investigated MHP in healthy animals we do not know if some patients would be better off without a blood washout. Dr. Southard, one of the inventors of Viaspan (also called the University of Wisconsin solution in the scientific literature), discussed similar concerns in a recent interview:
“In clinical organ preservation/transplantation, there are many unexplained incidents of reperfusion injury. This is characterized by delayed graft function in the liver and kidney. We do not see this in our animal models. Thus, there are some differences between how experimental animals and human donor organs respond to organ preservation. The difference may be related to the fact that the UW solution was developed to preserve the “ideal organ.” This is one taken from a relatively young and healthy lab animal donor and transplanted into a healthy recipient. In the clinics, the donors are usually brain-dead (brain trauma), remain in the ICU for periods up to a day or more, are treated for hypotension, and come from an uncontrolled group of donors. Therefore, we are now studying how UW solution preserves organs from the “less-than-ideal” donor. We are simulating the clinical condition by inducing warm ischemia or brain death in experimental animals to determine if UW solution is suitable for these types of organs. If not, we will develop an ideal method to preserve these less-than-ideal donor organs.” (quoted on the old Viaspan website).
Similarly, organ preservation solutions used in cryonics need to be investigated in models that better reflect the typical pre-mortem pathophysiology and post-mortem procedures encountered in cryonics. Developing stabilization technologies and procedures for “less than ideal patients” is an important element in an approach known as “Evidence Based Cryonics.”
|
The nature of the fragments
E. C. H. Day, « The Neuropters », New York, Scientific American, an Illustrated Journal of Art, Science & Mechanics, vol. XXV, 5 août 1871, p. 82.
So the larva of the stone fly, the caddis worm, living in the water, beneath stones and other shelter, makes itself a little tube, composed of fragments cemented together. The nature of the fragments will vary according to the species, each species confining itself, it is said, to one kind of material ; some use grains of coarse sand, others particles of broken shells, or minute shells themselves, others, again, bits of wood or short lengths of rushes, or of the stems of grappes. Within such cases, the grubs live, feebly moving about, and seizing such small insect prey as comes unawares within their reach. When fuly grown, they attach their case to some object, close it tightly, and pass into a pupa, or chrysalis stage.
|
Difference between revisions of "DVB via USB"
From LinuxTVWiki
Jump to: navigation, search
(Medion MD95700 (DVB-T) cleanup. (Firmware info needs some checking.))
(Introduction)
(24 intermediate revisions by 8 users not shown)
Line 1: Line 1:
Here is an (non-exhaustive) overview of DVB/ATSC USB devices sorted by their required LinuxTV driver (if supported - and yes - most of them are). Generally, when it comes to support for USB devices, it is a good idea to try the [http://linuxtv.org/repo/ current Hg sources] because some device drivers can be very new and thus may have not made their way into the mainstream kernel.
+
For information about supported USB devices, see the appropriate device category: <BR>
+
* [[ATSC USB Devices]]
Please help to keep this list up-to-date so that it is useful for everyone!
+
* [[DVB-C USB Devices]]
+
* [[DVB-S USB Devices]]
+
* [[DVB-S2 USB Devices]]
+
* [[DVB-T USB Devices]]
+
* [[DVB-T2 USB Devices]]
+
<BR>
__TOC__
__TOC__
+
==Introduction==
+
'''For all DVB USB devices you will need to load (if not compiled into the kernel):'''
+
* i2c-core
+
* crc32
+
* firmware_class
+
* dvb-core.ko
+
* dvb-pll.ko
+
and maybe others too. If the loading fails for any particular module you'll get a "unknown symbol" message. Then have a look at dmesg to find out, which symbols (functions) are missing. After you've found out which module was absent, please come back here and add it to the list/device-entry.
==Introduction==
+
The ''Type'' field specifies the USB standard(s) supported by the device.
'''For all devices shown below you need to load (if not compiled into the kernel):'''
+
- i2c-core
+
- crc32
+
- firmware_class
+
- dvb-core.ko
+
- dvb-pll.ko
+
and maybe others too. If the loading fails for any particular module you'll get a "unknown symbol"-message. Then take a look at dmesg to find out, which symbols (functions) are missing. After you've found out which module was absent, please come back here and add it to the list/device-entry.
+
'''Legend:''' the field type specifies the real USB-standard of the device
+
; USB1.1
- '''USB1.1''': the device can be run on the USB1.1 and on the USB2.0 bus but only with USB1.1-speed.
+
: The device supports USB 1.1 only, and will work at 1.1 speeds when attached to a USB 2.0 port.
- '''USB2.0''': the device can only be connected to a real USB2.0 port and runs with USB2.0-speed.
+
; USB2.0
(delivering the complete [[TS|Transport Stream]] to the software demuxer.)
+
: The device supports USB 2.0 only, and will not work when attached to a USB 1.1-only port. Such devices are normally capable of delivering the complete [[TS|Transport Stream]] to the software demuxer.
- '''USB2.0/USB1.1''': the device is actually USB2.0, but can also be driven on a USB1.1 port. (if not
+
; USB2.0, USB1.1
mentioned elsewhere, these boxes can deliver the complete [[TS|Transport Stream]] when running in USB2.0 mode)
+
: The device supports USB 1.1 and USB 2.0, and will work at any speed supported by 1.1 or 2.0. When running in USB 2.0 mode, such devices can deliver the complete [[TS|Transport Stream]] (unless specified otherwise).
== Firmware ==
== Firmware ==
Most of the USB devices need a firmware to run. Some of the firmware files can be downloaded here: [http://www.linuxtv.org/downloads/firmware/] or here: [http://www.thadathil.net/dvb/fw/].
+
Most of the USB devices need firmware to run. Some of the firmware files can be downloaded from [http://www.linuxtv.org/downloads/firmware/ here].
You need to copy the firmware to the correct place on your system. This will be /lib/firmware or a folder below it. Here is an example:
+
You need to copy the firmware to the correct place on your system. This will normally be /lib/firmware or a folder below it. Here is an example:
- $ cd /lib/firmware
- $ cd /lib/firmware
Line 36: Line 42:
- $ dmesg
- $ dmesg
- < ...... lines cut for clarity ..... >
- < ...... lines cut for clarity ..... >
- [ 4046.455924] usb 5-2: USB disconnect, address 3
+
- usb 5-2: USB disconnect, address 3
- [ 4066.407381] usb 5-2: new high speed USB device using ehci_hcd and address 8
+
- usb 5-2: new high speed USB device using ehci_hcd and address 8
- [ 4066.521806] dvb-usb: found a 'Hanftek UMT-010 DVB-T USB2.0' in cold state, will try to load a firmware
+
- dvb-usb: found a 'Hanftek UMT-010 DVB-T USB2.0' in cold state, will try to load a firmware
- [ 4066.539796] dvb-usb: downloading firmware from file 'dvb-usb-umt-010-02.fw' to the 'Cypress FX2'
+
- dvb-usb: downloading firmware from file 'dvb-usb-umt-010-02.fw' to the 'Cypress FX2'
- [ 4066.571666] dvb-usb: Hanftek UMT-010 DVB-T USB2.0 successfully initialized and connected.
+
- dvb-usb: Hanftek UMT-010 DVB-T USB2.0 successfully initialized and connected.
- [ 4066.701374] usb 5-2: USB disconnect, address 8
+
- usb 5-2: USB disconnect, address 8
- [ 4066.701404] dvb-usb: generic DVB-USB module successfully deinitialized and disconnected.
+
- dvb-usb: generic DVB-USB module successfully deinitialized and disconnected.
In this case, I have success, because the firmware was loaded.
In this case, I have success, because the firmware was loaded.
== Additional technical information ==
+
Remember that on some system the firmware is loaded by udev, so if for some reason the firmware is not loaded you may check that
+
udev is acutally running.
+
To check you could for example issue the command:
+
- $ ps -e | grep udev
+
+
If the output is empty, then you have to restart the udev daemon. For example in a Debian based system you may try with:
+
- $ sudo /etc/init.d/udev restart
+
+
then try again, removing and inserting the module again with modprobe.
+
+
== Additional Technical Information ==
This section starts describing devices which hit the market beginning of spring 2004. It does not cover TTUSB-based devices.
This section starts describing devices which hit the market beginning of spring 2004. It does not cover TTUSB-based devices.
=== DVB-USB devices host-controlled ===
+
=== Host Controlled DVB USB Devices ===
When first AC-Adapter-free USB devices (with the capability of receiving DVB Signals) hit the market, every vendor was using the generic USB-device-controller from Cypress (FX1 (AN2135/AN2235), FX2) as an interface between the DVB-hardware and the host.
When first AC-Adapter-free USB devices (with the capability of receiving DVB Signals) hit the market, every vendor was using the generic USB-device-controller from Cypress (FX1 (AN2135/AN2235), FX2) as an interface between the DVB-hardware and the host.
Line 56: Line 72:
As those controllers are very generic, one has to create (and download) an (small or not so small) embedded software to those controller to give vendor-specific and the wanted functionality. After downloading the so-called firmware vendors used the reboot-feature of the controller to re-enumerate with new USB Vendor/Product-IDs and a new USB-layout. On the host this looks like a normal disconnect and connect of an USB device.
As those controllers are very generic, one has to create (and download) an (small or not so small) embedded software to those controller to give vendor-specific and the wanted functionality. After downloading the so-called firmware vendors used the reboot-feature of the controller to re-enumerate with new USB Vendor/Product-IDs and a new USB-layout. On the host this looks like a normal disconnect and connect of an USB device.
Because the memory for storing the firmware was limited, vendors decided not to put any DVB-demodulator and RF-tuner specific code into the firmware, but only to implement interface functionality. At that time, the common way to control other components was [[I2C]]. The other necessary feature was data-streaming. With such a firmware, every functionality is done from the host - mainly the driving of the demodulator and the tuner.
+
Because the memory for storing the firmware was limited, vendors decided not to put any DVB-demodulator and RF-tuner specific code into the firmware, but only to implement interface functionality. At that time, the common way to control other components was [[I²C Protocol|I²C]]. The other necessary feature was data-streaming. With such a firmware, every functionality is done from the host - mainly the driving of the demodulator and the tuner.
Host-controlled devices are the ones based on DiBcom (dibusb, dib0700), Nebula (DigiTV), Hanftek and others. (see below)
Host-controlled devices are the ones based on DiBcom (dibusb, dib0700), Nebula (DigiTV), Hanftek and others. (see below)
=== DVB-USB device firmware-controlled ===
+
=== Firmware Controlled DVB USB Devices===
Another approach was coming later: When it started, that putting more memory on a board/into an IC with almost no increase of the [[BOM]]. Vendors started to put the demodulator and tuner-driver into the firmware. This was simplifying the host-part dramatically, because if you have a new hardware, you just need to modify the (platform-independent) firmware part and, as long as the firmware-interface is not changing, the host-driver stays the same.
Another approach was coming later: When it started, that putting more memory on a board/into an IC with almost no increase of the [[BOM]]. Vendors started to put the demodulator and tuner-driver into the firmware. This was simplifying the host-part dramatically, because if you have a new hardware, you just need to modify the (platform-independent) firmware part and, as long as the firmware-interface is not changing, the host-driver stays the same.
Line 66: Line 82:
Firmware-controlled devices: Twinhan VP7045/VP7021, Terratec Cinergy T2, Wideview and others.
Firmware-controlled devices: Twinhan VP7045/VP7021, Terratec Cinergy T2, Wideview and others.
To be continued.
+
To be continued ...
+
== DVB-T ==
+
+
=== Afatech AF9005 ===
+
+
All devices below are fully supported by the LinuxTV driver. The following drivers are needed for these devices:
+
- dvb-usb-af9005.ko
+
- dvb-usb.ko
+
<!--
+
These [[frontend|frontend(s)]]/[[demodulator|demodulator(s)]] can be found in various revisions of this device:
+
- [[Allnet all2006 USB DVB-T Stick]]
+
- [[Delock USB2.0 DVB-T Stick]]
+
-->
+
{{DvbDeviceList
+
|content={{DvbDeviceCommented
+
|device=Allnet all2006 USB DVB-T Stick
+
|type=USB1.1
+
|fw=af9005.fw
+
|pic=[http://www.allnet.de/product_info_allnet.php?cPath=_&products_id=99975]
+
|comment=The tuner sensitivity is less than impressive. The driver has trouble scanning channel lists with Kaffeine. If you use a channel list made with another DVB-T device, watching the channels isn't really a big problem (a few blocks are shown though). This could be a timeout problem.
+
}}
+
{{DvbDeviceCommented
+
|device=Delock USB2.0 DVB-T Stick
+
|type=USB2.0/USB1.1
+
|fw=af9005.fw
+
|pic=[http://delock.de/produkte/gruppen/Multimedia/USB20_DVB-T_Empfnger_93168.html]
+
|comment=The case is insufficiently shielded.
+
}}
+
{{DvbDevice
+
|device=Ridata USB DVB-T Stick T100
+
|type=USB2.0/USB1.1
+
|fw=[http://ventoso.org/luca/af9005/af9005.fw af9005.fw]
+
}}
+
}}
+
+
''Clarification/update needed for the following comments.''
+
+
'''Comment:''' Not working at the moment: VT
+
+
'''Comment:''' Working but not in kernel yet, get CVS/Mercurial sources from linuxtv.org.
+
+
=== AVerMedia AVerTV A800 ===
+
+
All devices below are fully supported by the LinuxTV driver. The following drivers are needed for these devices:
+
- dib3000-common.ko
+
- dib3000mc.ko
+
- dvb-usb.ko
+
- dvb-usb-dibusb-common.ko
+
- dvb-usb-a800.ko
+
+
These devices are clones of a DVB-T USB2.0 reference design made by [[DiBcom]].
+
+
{{DvbDeviceList
+
|content=
+
{{DvbDeviceCommented
+
| device=AVerMedia AVerTV DVB-T USB 2.0
+
| type=USB2.0/USB1.1
+
| fw=dvb-usb-avertv-a800-02.fw
+
| hw=[[DiB3000P|DiBcom 3000P]]
+
| comment=Remote control handling is different to the one used in the other DiBusb clones and many essential keys do not work at all (with X.org and linux kernels 2.6.17 and 2.6.18).
+
| pic=[http://www.avermedia.com/cgi-bin/products_digitvtuner_dvbtusb2.asp?show=2]
+
}}
+
}}
+
+
=== DiBcom DVB-T ===
+
+
==== [[DiB3000M-B]] USB1.1 DVB-T devices ====
+
+
All devices below are fully supported by the LinuxTV driver. The following drivers are needed for these devices:
+
- dib3000-common.ko
+
- dib3000mb.ko
+
- dvb-usb.ko
+
- dvb-usb-dibusb-common.ko
+
- dvb-usb-dibusb-mb.ko
+
+
Most of these devices are (sometimes slightly modified) clones of a DVB-T USB1.1 reference design made by [[DiBcom]].
+
+
{{DvbDeviceList
+
|content=
+
{{DvbDevice
+
| device=AVerMedia AVerTV DVBT USB
+
| type=USB1.1
+
| fw=dvb-usb-dibusb-5.0.0.11.fw
+
| hw=[[DiB3000M-B|DiBcom 3000M-B]]
+
| pic=[http://www.avermedia.com/cgi-bin/products_digitvtuner_dvbtusb.asp?show=2]
+
}}
+
{{DvbDevice
+
| device=ADSTech Instant TV DVB-T USB
+
| type=USB1.1
+
| fw=dvb-usb-dibusb-5.0.0.11.fw
+
| hw=[[DiB3000M-B|DiBcom 3000M-B]]
+
| pic=[http://www.adstech.com/products/PTV-333/intro/PTV-333_intro.asp?pid=PTV-333]
+
}}
+
{{DvbDeviceCommented
+
| device=ADSTech Instant TV DVB-T USB2.0
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-adstech-usb2-02.fw
+
| hw=[[DiB3000M-B|DiBcom 3000M-B]]
+
| comment=This device is dark blue.
+
| pic=[http://www.adstech.com/products/PTV-333/intro/PTV-333_intro.asp?pid=PTV-333]
+
}}
+
{{DvbDevice
+
| device=Artec T1 USB2.0
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-dibusb-6.0.0.8.fw
+
| hw=[[DiB3000M-B|DiBcom 3000M-B]]
+
| pic=[http://www.ultima-elec.nl/]
+
}}
+
{{DvbDevice
+
| device=Compro Videomate DVB-U2000
+
| type=USB1.1
+
| fw=dvb-usb-dibusb-5.0.0.11.fw
+
| hw=[[DiB3000M-B|DiBcom 3000M-B]]
+
| pic=[http://www.comprousa.com/products/vmu2000.htm]
+
}}
+
{{DvbDevice
+
| device=CTS Portable (Chinese Television System)
+
| type=USB1.1
+
| fw=dvb-usb-dibusb-5.0.0.11.fw
+
| hw=[[DiB3000M-B|DiBcom 3000M-B]]
+
| pic=[http://www.2cts.tv/ctsportable/]
+
}}
+
{{DvbDevice
+
| device=DigitalRise DVB-T USB 1.1 Ter
+
| type=USB1.1
+
| fw=dvb-usb-dibusb-5.0.0.11.fw
+
| hw=[[DiB3000M-B|DiBcom 3000M-B]]
+
| pic=[http://www.digitalrise.biz/products/dtv-t7045/]
+
}}
+
{{DvbDevice
+
| device=Grandtec DVB-T USB1.1
+
| type=USB1.1
+
| fw=dvb-usb-dibusb-5.0.0.11.fw
+
| hw=[[DiB3000M-B|DiBcom 3000M-B]]
+
| pic=[http://www.grand.com.tw/en/product_form.asp?lwk_series=54&lwk_product=h-030&lwk_page=]
+
}}
+
{{DvbDevice
+
| device=HAMA DVB-T USB1.1 device
+
| type=USB1.1
+
| fw=dvb-usb-dibusb-5.0.0.11.fw
+
| hw=[[DiB3000M-B|DiBcom 3000M-B]]
+
| pic=[http://www.hama.de/bilder/00049/abb/00049021abb.jpg]
+
}}
+
{{DvbDevice
+
| device=JetWay DTV DVB-T USB
+
| type=USB1.1
+
| fw=dvb-usb-dibusb-5.0.0.11.fw
+
| hw=[[DiB3000M-B|DiBcom 3000M-B]]
+
| pic=[http://www.jetway.com.tw/evisn/product/lcd-tv/DVT-USB/dtv-usb.htm]
+
}}
+
{{DvbDevice
+
| device=KWorld V-Stream XPERT DTV DVB-T USB
+
| type=USB1.1
+
| fw=dvb-usb-dibusb-5.0.0.11.fw
+
| hw=[[DiB3000M-B|DiBcom 3000M-B]]
+
| pic=[http://www.kworld.com.tw/en/product/DVBT-USB/DVBT-USB.html]
+
}}
+
{{DvbDeviceCommented
+
| device=TwinhanDTV USB-Ter (VP7041)
+
| type=USB1.1
+
| fw=dvb-usb-dibusb-5.0.0.11.fw
+
| hw=[[DiB3000M-B|DiBcom 3000M-B]]
+
| comment=First DVB-T USB box on the market with DiB3000M-B built-in.
+
| pic=[http://www.twinhan.com/product_terrestrial_3.asp]
+
}}
+
{{DvbDevice
+
| device=TwinhanDTV Magic Box (VP7041e)
+
| type=USB1.1
+
| fw=dvb-usb-dibusb-5.0.0.11.fw
+
| hw=[[DiB3000M-B|DiBcom 3000M-B]]
+
| pic=[http://www.twinhan.com/product_terrestrial_5.asp]
+
}}
+
{{DvbDeviceCommented
+
| device=Ultima Electronic/Artec T1 USB TVBOX
+
| type=USB1.1
+
| fw=dvb-usb-dibusb-5.0.0.11.fw or dvb-usb-dibusb-an2235-01.fw
+
| hw=[[DiB3000M-B|DiBcom 3000M-B]], variable
+
| comment=There are several clones of this device: some have the AN2235 USB controller instead of the AN2135; some use a Panasonic tuner instead of the default Thomson Cable tuner. Most of the Boxes have standard Cypress USB IDs which makes it very hard to identify them. A HOWTO for this devices can be found [[Artec T1 USB TV Box|here]].
+
| pic=[http://www.ultima-elec.nl/]
+
}}
+
{{DvbDevice
+
| device=VideoWalker DVB-T USB
+
| type=USB1.1
+
| fw=dvb-usb-dibusb-5.0.0.11.fw
+
| hw=[[DiB3000M-B|DiBcom 3000M-B]]
+
| pic=[http://www.geniusnet.com.tw/product/product-1.asp?pdtno=541]
+
}}
+
}}
+
+
==== [[DiB3000M-C/P]] USB2.0 DVB-T devices ====
+
+
All devices below are fully supported by the LinuxTV driver. The following drivers are needed for these devices:
+
- dib3000-common.ko
+
- dib3000mc.ko
+
- mt2060.ko
+
- dvb-usb.ko
+
- dvb-usb-dibusb-common.ko
+
- dvb-usb-dibusb-mc.ko
+
+
These [[frontend|frontend(s)]]/[[demodulator|demodulator(s)]] can be found in various revisions of this device:
+
- [[DiB3000M-C|DiBcom 3000M-C]]
+
- [[DiB3000P|DiBcom 3000P]]
+
+
[FIXME: which for which devices?]
+
+
These devices are clones of DVB-T USB2.0 reference designs made by [[DiBcom]]. MOD3000P1 (FX2), MOD3000P1.2 (FX2-LP) and STK3000P.
+
+
{{DvbDeviceList
+
| content =
+
{{DvbDevice
+
| device=Artec T14
+
| type=USB2.0/USB1.1
+
| fw=dvb-usb-dibusb-6.0.0.8.fw
+
| hw=MT2060 silicon tuner
+
| pic=[http://www.artec.com.tw/ehtm/be122.htm]
+
}}
+
{{DvbDevice
+
| device=Grand DVB-T Pen USB 2.0
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-dibusb-6.0.0.8.fw
+
| hw=MT2060 silicon tuner
+
| pic=[http://www.grand.com.tw/en/product_form.asp?lwk_series=54&lwk_product=h-005&lwk_page=1]
+
}}
+
{{DvbDevice
+
| device=LiteOn USB DVB-T TV Tuner
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-dibusb-6.0.0.8.fw
+
| hw=MT2060 silicon tuner
+
| pic=[http://www.liteon.com/Page.aspx?id=4ad86a20-1897-4b8a-849e-c15ddadeb503]
+
}}
+
{{DvbDevice
+
| device=Leadtek WinFast DTV Dongle
+
| type=USB2.0/USB1.1
+
| fw=dvb-usb-dibusb-6.0.0.8.fw
+
| hw=MT2060 silicon tuner
+
| pic=[http://www.leadtek.com.tw/eng/tv_tuner/overview.asp?lineid=6&pronameid=231]
+
}}
+
{{DvbDevice
+
| device=MSI Digivox Mini SL
+
| type=USB2.0
+
| fw=dvb-usb-dibusb-6.0.0.8.fw
+
| hw=MT2060 silicon tuner
+
| pic=[http://www1.conrad.de/xl/9000_9999/9900/9940/9949/994904_BB_00_FB.EPS.jpg]
+
}}
+
{{DvbDeviceCommented
+
| device=Typhoon TV Movie Stick
+
| type=USB2.0, (USB1.1?)
+
| fw=dvb-usb-dibusb-6.0.0.8.fw
+
| hw=MT2060 silicon tuner
+
| pic=[http://www.typhoon.de/en/art.php?p=826&c=]
+
| comment="Art. 50506"
+
}}
+
{{DvbDevice
+
| device=YUAN PD300 DVB-T mobility
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-dibusb-6.0.0.8.fw
+
| hw=MT2060 silicon tuner
+
| pic=[http://www.yuan.com.tw/en/products/vdo_pd300mini.htm]
+
}}
+
}}
+
+
==== [[DiB0700]] USB2.0 DVB-T devices ====
+
+
{{Note| Currently, at least two dib0700-based devices are known to have problems. The Nova-T 500 suffers from random disconnects after a few hours or days, and the Nova-T Stick, and possibly others using the same hardware, suffer from I2C errors. Updating to [http://linuxtv.org/hg/v4l-dvb current Hg drivers] and using [http://www.wi-bw.tfh-wildau.de/~pboettch/home/linux-dvb-firmware/dvb-usb-dib0700-03-pre1.fw new firmware] should cure these.}}
+
+
All devices below will be fully supported by the LinuxTV drivers very soon. The following modules are needed for these devices:
+
- dib7000m.ko
+
- dib7000p.ko
+
- dib3000mc.ko
+
- mt2060.ko
+
- dvb-usb.ko
+
- dvb-usb-dib0700.ko
+
+
These [[frontend|frontend(s)]]/[[demodulator|demodulator(s)]] can be found in various revisions of this device:
+
- DiBcom DiB7000P, DiBcom DiB7000PC
+
+
'''Comment:''' In case someone is opening the device, one can find the DiB7700-chips (B/C/D), which is demodulator and USB in one silicon. The USB firmware used is the same for all devices.
+
+
The dvb-usb-dib0700 module has a parameter which forces the activation of LNAs (Low Noise Amplifier). If you have reception problems you can try to load the module with force_lna_activation=1 and see if it works better. Normally the LNA is controlled automatically by software so, in general, there should be no need to force activation. If a device has an LNA, it is shown in the table below; for those which have no LNA, this parameter has no meaning.
+
+
{{DvbDeviceList
+
| content=
+
{{DvbDevice
+
| device=AVerMedia AVerTV DVB-T Volar
+
| type=USB2.0
+
| fw=dvb-usb-dib0700-xx.fw
+
| hw=DiB7700P, MT2060
+
| pic=[http://www.avermedia.com/cgi-bin/products_digitvtuner_dvbtvolar.asp?show=1]
+
}}
+
{{DvbDevice
+
| device=Compro Videomate U500
+
| type=USB2.0
+
| fw=dvb-usb-dib0700-xx.fw
+
| hw=DiB7700P, MT2060
+
| pic=[http://www.comprousa.com/New/en/product/u500/u500.html]
+
}}
+
{{DvbDeviceCommented
+
| device=Hauppauge Nova-T 500 Dual
+
| type=PCI with embedded USB2.0
+
| fw=dvb-usb-dib0700-xx.fw
+
| hw=2×DiB3000P, 2×MT2060, LNA
+
| comment=A.K.A. "Bristol". The LNA needs manual activation.
+
| pic=[http://www.hauppauge.co.uk/pages/products/data_novat500.html]
+
}}
+
{{DvbDeviceCommented
+
| device=[[Hauppauge WinTV-NOVA-T-Stick|Hauppauge Nova-T Stick]]
+
| type=USB2.0
+
| fw=dvb-usb-dib0700-xx.fw
+
| hw=DiB7700M or DiB7700P, MT2060
+
| comment=Identical to the USB Stick Elgato is selling.
+
There are two known variants; see the [[Hauppauge WinTV-NOVA-T-Stick|main page for this device]] for identification and support details.
+
| pic=[http://www.hauppauge.co.uk/pages/products/data_novatstick.html]
+
}}
+
{{DvbDeviceCommented
+
| device=Leadtek WinFast DTV Dongle
+
| type=USB2.0
+
| fw=dvb-usb-dib0700-xx.fw
+
| hw=DiB7700P, MT2060
+
| comment=There exists another device with the same design and name but different internals. Both are supported by linuxtv.org.
+
}}
+
}}
+
+
=== HanfTek UMT-010 ===
+
+
All devices below are fully supported by the LinuxTV driver. The following drivers are needed for these devices:
+
- mt352.ko
+
- dvb-usb.ko
+
- dvb-usb-dibusb-common.ko
+
- dvb-usb-umt-010.ko
+
+
The USB protocol which is used by this device is equal to the one used in DiBcom USB2.0 reference design. Thanks to Hanftek who especially wrote a firmware for easy Linux-Support.
+
+
{{DvbDeviceList
+
| content=
+
{{DvbDeviceCommented
+
| device=Hanftek UMT-010
+
| type=USB2.0
+
| fw=dvb-usb-umt-010-02.fw
+
| hw=[[Zarlink MT352]]
+
| comment=Stick-sized. Different colours (blue, grey, red).
+
| pic=[http://www.hanftek.com/]
+
}}
+
}}
+
+
=== Hauppauge WinTV-NOVA-T usb2 ===
+
+
All devices below are fully supported by the LinuxTV driver. The following drivers are needed for these devices:
+
- dib3000-common.ko
+
- dib3000mc.ko
+
- dvb-usb.ko
+
- dvb-usb-dibusb-common.ko
+
- dvb-usb-nova-t-usb2.ko
+
+
These devices are clones of a DVB-T USB2.0 reference design made by [[DiBcom]].
+
+
{{DvbDeviceList
+
| content=
+
{{DvbDeviceCommented
+
| device=Hauppauge WinTV NOVA-T USB2
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-nova-t-usb2-01.fw
+
| hw=[[DiB3000P|DiBcom 3000P]]
+
| comment=It has a MAC address.
+
| pic=[http://www.hauppauge.de/pages/products/data_novatusb2.html]
+
}}
+
}}
+
+
=== LifeView ===
+
+
Devices are starting to be supported.
+
+
See http://linuxtv.org/v4lwiki/index.php/LifeView
+
+
==== LifeView TV Walker Twin ====
+
+
Works well (two tuners).
+
+
The TV Walker twin contains a ULi M9206, which is, according to the website, a "versatile digital audio/video controller for various digital TV standards such as DVB and ATSC. M9206 supports Microsoft's latest Broadcast Driver Architecture (BDA), which offer customers design flexibility and broad market coverage to both DVB and ATSC standards." A pair of TDA10046A OFDM channel demodulators and TDA8275A Silicon Tuners provide the DVB-T functionality. There is also an IR receiver which is presumably controlled by the M9206. Note: this device's USB cable comes with 2 USB plugs. This is not one plug per tuner; plug in both of them together to supply adequate power to the device.
+
+
=== Nebula DigiTV USB version - DVB-T ===
+
+
All devices below are fully supported by the LinuxTV driver. The following drivers are needed for these devices:
+
- mt352.ko
+
- nxt6000.ko
+
- dvb-usb.ko
+
- dvb-usb-digitv.ko
+
+
{{DvbDeviceList
+
| content=
+
{{DvbDeviceCommented
+
| device=Nebula DigiTV USB
+
| type=USB2.0
+
| fw=dvb-usb-digitv-01.fw
+
| hw=[[Zarlink MT352]] or [[NXT6000|NxtWave Nxt6000]]
+
| comment=There is an SDK for download on the Nebula WebSite, which was used to improve the driver's quality. Was the first USB2.0 box on the market (late 2003/early 2004).
+
| pic=[http://www.nebula-electronics.com/information/info.asp?Code=0003]
+
}}
+
}}
+
+
=== TerraTec Cinergy T² ===
+
+
All devices below are fully supported by the LinuxTV driver. The following drivers are needed for these devices:
+
- cinergyT2.ko
+
+
{{DvbDeviceList
+
| content=
+
{{DvbDeviceCommented
+
| device=[[TerraTec]] [[TerraTec_Cinergy_T2|Cinergy T²]]
+
| type=USB2.0
+
| hw=[[Zarlink MT352]]
+
| pic=[http://tvde.terratec.net/modules.php?op=modload&name=News&file=article&sid=238]
+
| comment=The programming of the MT352 is hidden behind the USB protocol defined within the firmware.
+
}}
+
}}
+
+
=== Twinhan DVB-T USB2.0 ===
+
+
All devices below are fully supported by the LinuxTV driver. The following drivers are needed for these devices:
+
- dvb-usb.ko
+
- dvb-usb-vp7045.ko
+
+
{{DvbDeviceList
+
| content=
+
{{DvbDevice
+
| device=DigitalNow TinyUSB 2 DVB-t
+
| type=USB2.0
+
| fw=dvb-usb-vp7045-01.fw
+
| hw=[[Zarlink MT352]]
+
| pic=[http://www.digitalnow.com.au/product_pages/tinyusb2.html]
+
}}
+
{{DvbDevice
+
| device=DigitalRise DVB-T USB 2.0 Ter Beetle
+
| type=USB2.0
+
| fw=dvb-usb-vp7045-01.fw
+
| hw=[[Zarlink MT352]]
+
| pic=[http://www.digitalrise.biz/products/dtv-t7045/]
+
}}
+
{{DvbDevice
+
| device=dnt EuroMini 100
+
| type=USB2.0
+
| fw=dvb-usb-vp7045-01.fw
+
| hw=[[Zarlink MT352]]
+
| pic=[http://www.dnt.de/index.php?dir=produkte/detail&id=20203]
+
}}
+
{{DvbDevice
+
| device=Fujitsu-Siemens DVB-T Mobile TV Tuner
+
| type=USB2.0
+
| fw=dvb-usb-vp7045-01.fw
+
| hw=[[Zarlink MT352]]
+
| pic=[http://www.fujitsu-siemens.de/home/products/accessories/others/dvb_t_mobile.html de] [http://www.fujitsu-siemens.com/home/products/others/dvb_t_mobile.html en]
+
}}
+
{{DvbDeviceCommented
+
| device=TwinhanDTV Alpha
+
| type=USB2.0
+
| fw=dvb-usb-vp7045-01.fw
+
| hw=[[Zarlink MT352]]
+
| comment='''It seems that some TwinhanDTV Alphas need newer firmware.''' The symptoms are that they can not find any channels. Consequently, they are unusable at the moment. See these posts for more details: [http://www.linuxtv.org/pipermail/linux-dvb/2006-November/014202.html][http://www.linuxtv.org/pipermail/linux-dvb/2006-November/014226.html][http://www.linuxtv.org/pipermail/linux-dvb/2007-January/015145.html][http://www.linuxtv.org/pipermail/linux-dvb/2007-January/015222.html]
+
| pic=[http://www.twinhan.com/product_terrestrial_7.asp]
+
}}
+
{{DvbDevice
+
| device=TwinhanDTV MagicBoxII
+
| type=USB2.0
+
| fw=dvb-usb-vp7045-01.fw
+
| hw=[[Zarlink MT352]]
+
| pic=[http://www.twinhan.com/product_terrestrial_6.asp]
+
}}
+
}}
+
+
The programming of the MT352 is hidden behind the USB protocol defined within the firmware.
+
+
=== WideView/Yakumo/Hama/Typhoon/Yuan Boxes and Pens ===
+
+
All devices below are fully supported by the LinuxTV driver. The following drivers are needed for these devices:
+
- dvb-usb.ko
+
- dvb-usb-dtt200u.ko
+
+
These [[frontend|frontend(s)]]/[[demodulator|demodulator(s)]] can be found in various revisions of this device:
+
- [[Zarlink MT352]]
+
- The new units use the Zarlink ZL10353 instead of MT352
+
- for pentype design it is unknown (but it doesn't matter at all)
+
+
The programming of the MT352 is hidden behind the USB protocol defined within the firmware. These boxes can only deliver part of the [[TS|Transport Stream]] (using a hardware PID filter); it is not known how to deactivate this. (The driver was completely [[reverse-engineering|reverse-engineered]] without the help of its real vendor (assuming WideView is the manufacturer). '''UPDATE:''' the vendor was so kind to provide information about unknown commands, hence the driver is complete.
+
+
There is apparently another Yakumo model not covered:
+
+
<blockquote>Hi, I've purchased a "Yakumo Quickstick TV easy" and it doesn't work after compiling and installing the modules. Its vendor and product id ara 0x14aa and 0x620, and it does not appear in modules.usbmap. So I think it's not defined... ßingen.</blockquote>
+
+
'''Firmware:''' The firmware for the new rev Freecom sticks (dvb-usb-wt220u-fc03.fw) can be obtained from here [http://home.arcor.de/efocht/dvb-usb-wt220u-fc03.fw]
+
+
'''Warning:''' When checking the table below, check the USB ID to see if you have an old or new revision of the firmware.
+
+
{{DvbDeviceList
+
| content=
+
{{DvbDeviceCommented
+
| device=Yakumo DVB-T mobile USB
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-dtt200u-01.fw
+
| comment=A.K.A DTT200U
+
| pic=[http://www.yakumo.de/produkte/index.php?pid=1&ag=DVB-T]
+
}}
+
{{DvbDeviceCommented
+
| device=Yakumo QuickStick DVB-T USB
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-wt220u-01.fw
+
| comment=Pen-sized
+
| pic=[http://www.yakumo.de/produkte/index.php?pid=1&ag=DVB-T]
+
}}
+
{{DvbDeviceCommented
+
| device=Yakumo QuickStick Basic DVB-T USB
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-wt220u-zl0353-01.fw
+
| comment=Pen-sized
+
| pic=[http://www.yakumo.de/produkte/index.php?pid=1&ag=DVB-T]
+
}}
+
{{DvbDeviceCommented
+
| device=Yakumo QuickStick Basic DVB-T USB
+
| type=USB2.0
+
| fw=dvb-usb-wt220u-fc03.fw
+
| comment=Pen-sized.<br />USB ID 14aa:0225 (cold state, before firmware).<br />USB ID 14aa:0226 (warm state, after firmware).
+
| pic=[http://www.yakumo.de/produkte/index.php?pid=1&ag=DVB-T]
+
}}
+
{{DvbDevice
+
| device=Yuan DVB2GO UB300
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-dtt200u-01.fw
+
| pic=[http://www.yuan.com.tw/en/products/vdo_ub300.html]
+
}}
+
{{DvbDevice
+
| device=Yuan PD300 DVB-T mini
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-wt220u-01.fw
+
| hw=MT2060 silicon tuner?
+
| pic=[http://www.yuan.com.tw/en/products/vdo_pd300.html]
+
}}
+
{{DvbDevice
+
| device=Hama DVB-T Box
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-wt220u-02.fw
+
| pic=[http://www.hama.de/portal/articleId*114663/action*2563]
+
}}
+
{{DvbDevice
+
| device=Typhoon USB2.0 DVB-T Box
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-dtt200u-01.fw
+
}}
+
{{DvbDeviceCommented
+
| device=Typhoon DVB-T USB Drive
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-wt220u-01.fw
+
| comment=Pen-sized.
+
| pic=[http://www.typhoon.de/de/art.php?p=826&c=]
+
}}
+
{{DvbDevice
+
| device=WideView USB2.0 DVB-T Receiver
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-dtt200u-01.fw
+
| pic=[http://www.wv.com.tw/]
+
}}
+
{{DvbDeviceCommented
+
| device=WideView Pentype DVB-T-Receiver (WT-220U)
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-wt220u-01.fw
+
| comment=Pen-sized.
+
| pic=[http://www.wv.com.tw/]
+
}}
+
{{DvbDeviceCommented
+
| device=Freecom DVB-T USB Stick
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-wt220u-01.fw
+
| comment=Pen-sized.
+
| pic=[http://www.freecom.com/ecProduct_detail.asp?ID=2234]
+
}}
+
{{DvbDeviceCommented
+
| device=Freecom DVB-T USB Stick (25451 rev3)
+
| type=USB2.0
+
| fw=dvb-usb-wt220u-fc03.fw
+
| comment=Pen-sized.<br />USB ID (before firmware): 14aa:0225
+
| pic=[http://www.freecom.com/ecProduct_detail.asp?ID=2234]
+
}}
+
{{DvbDeviceCommented
+
| device=V-Gear PocketDTV USB2.0 DVB-T TVBox
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-dtt200u-01.fw
+
| comment=Small container.
+
| pic=[http://www.vgear.com/products/list1.asp?ProdID=AMVG1-016-001&SUB_NUM=1998/]
+
}}
+
{{DvbDeviceCommented
+
| device=V-Gear MobiDTV
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-wt220u-01.fw or dvb-usb-wt220u-02.fw
+
| comment=Pen-sized.
+
| pic=[http://www.vgear.com/products/list.asp?ProdID=AMVG1-016-002]
+
}}
+
{{DvbDeviceCommented
+
| device=dnt EuroStick USB-Stick DVB-T Receiver
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-wt220u-01.fw
+
| comment=Pen-sized.
+
| pic=[http://www.dnt.de/index.php?dir=details&pid=20201&cat=dvbt&m_id=dvbt&h_curr=]
+
}}
+
{{DvbDeviceCommented
+
| device=Redbell DVB-T USB Stick (TDT-2GO)
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-wt220u-01.fw or dvb-usb-wt220u-fc03.fw or dvb-usb-wt220u-zl0353-01.fw
+
| comment=Pen-sized. Valid for PCMCIA version.
+
| pic=[http://www.redbell.es/products/show_item/RB-TDTUSB2] [http://www.redbell.es/products/show_item/RB-TDTCBUS] [http://www.umdonline.com/guest/showitem?no_=RB-TDTUSB2]
+
}}
+
{{DvbDeviceCommented
+
| device=New revision of those devices with ZL0353 inside
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-wt220u-zl0353-01.fw
+
| comment=Pen-sized.<br />USB ID (before firmware): 14aa:022a.
+
[mailto:[email protected] Someone] has three of these running just fine in parallel; USB IDs 14aa:0221 and 14aa:022b.
+
| pic=[http://www.amazon.co.uk/gp/product/B000ALAWQ6/026-5347660-4657208?v=glance&n=560798]
+
}}
+
{{DvbDeviceCommented
+
| device=Club 3D ZAP-TV250mini
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-wt220u-02.fw (dvb-usb-wt220u-01.fw untested)
+
| hw=MT2060 silicon tuner
+
| comment=USB ID (before firmware): 14aa:0220
+
| pic=[http://www.club-3d.nl/productshow_zaptv.php?ordercode=ZAP-TV250M&show=&p=&l=en]
+
}}
+
{{DvbDeviceCommented
+
| device=Gainward DVB2go
+
| type=USB2.0
+
| fw=dvb-usb-wt220u-01.fw or dvb-usb-wt220u-02.fw
+
| comment=Clone of YUAN PD300.
+
}}
+
{{DvbDeviceCommented
+
| device=Bestbuy Easy TV
+
| type=USB2.0
+
| fw=dvb-usb-wt220u-02.fw
+
| comment=This is a WideView WT-220U PenType Receiver (Typhoon/Freecom). It works with newest linuxtv driver version.
+
}}
+
}}
+
+
=== Supported Em2880/Em2870 Based USB DVB-T devices ===
+
+
Official project site: [http://www.linuxtv.org/v4lwiki/index.php/Em2880 Em2880]
+
+
{{DvbDeviceList
+
| content=
+
{{DvbDevice
+
| device=Kworld 350 U DVB-T
+
| type=USB
+
}}
+
{{DvbDevice
+
| device=MSI DigiVox A/D
+
| type=USB2.0
+
| pic=[http://www.msi.com.tw/program/products/multimedia/mut/pro_mut_detail.php?UID=612]
+
}}
+
{{DvbDevice
+
| device=Hauppauge WinTV HVR 900 (rev. 1.0)
+
| type=USB
+
| pic=[http://www.hauppauge.co.uk/pages/products/data_hvr900.html]
+
}}
+
{{DvbDevice
+
| device=Terratec Cinergy Hybrid T XS
+
| type=USB
+
| hw=ZL10353
+
| pic=[http://tvde.terratec.net/modules.php?op=modload&name=News&file=article&sid=249]
+
}}
+
{{DvbDevice
+
| device=Terratec Cinergy Hybrid T XS
+
| type=USB
+
| hw=MT352
+
| pic=[http://tvde.terratec.net/modules.php?op=modload&name=News&file=article&sid=249]
+
}}
+
{{DvbDevice
+
| device=Terratec Cinergy Hybrid T XS France}
+
| type=USB
+
}}
+
{{DvbDevice
+
| device=Terratec Prodigy Hybrid T XS
+
| type=USB
+
| pic=[http://tvde.terratec.net/modules.php?op=modload&name=News&file=article&sid=249]
+
}}
+
{{DvbDevice
+
| device=Terratec Cinergy T XS
+
| type=USB
+
| hw=XC3028
+
| pic=[http://tvde.terratec.net/modules.php?op=modload&name=News&file=article&sid=253]
+
}}
+
{{DvbDevice
+
| device=Terratec Cinergy T XS
+
| type=USB
+
| hw=MT2060
+
}}
+
{{DvbDevice
+
| device=Pinnacle PCTV USB Stick
+
| type=USB
+
| pic=[http://linuxtv.org/v4lwiki/index.php/Em2880/PinnaclePCTV Device notes] [http://www.pinnaclesys.com/PublicSite/uk/Products/Consumer+Products/PCTV+Tuners/PCTV+Digital+PVR+(DVB-S_DVB-T)/PCTV+USB+Stick.htm]
+
}}
+
{{DvbDevice
+
| device=DNT DA2 Hybrid
+
| type=USB
+
| pic=[http://www.dnt.de/index.php?dir=produkte/detail&id=20205]
+
}}
+
{{DvbDevice
+
| device=Pinnacle PCTV Hybrid Pro Stick
+
| type=USB
+
| pic=[http://www.pinnaclesys.com/PublicSite/de/Products/Consumer+Products/PCTV+Tuners/PCTV+Analog_Digital+PVR/PCTV+Hybrid+Pro+Stick+(320e)]
+
}}
+
{{DvbDevice
+
| device=Empire USB 2.0 Pen Dual TV
+
| type=USB
+
| pic=[http://www.empiremedia.it/site/prodotto.asp?idprodotto=231]
+
}}
+
{{DvbDeviceCommented
+
| device=BestBuy Easy TV USB hybrid
+
| type=USB
+
| comment=USB ID EB1A:2881
+
}}
+
{{DvbDeviceCommented
+
| device=Dazzle TV Hybrid Stick
+
| type=USB
+
| comment=USB ID EB1A:2881
+
| pic=[http://doc.ubuntu-fr.org/pctv_hybrid_pro_stick?s=tnt]
+
}}
+
}}
+
+
== DVB-C ==
+
+
=== Technotrend TT-Connect C-1100 USB ===
+
+
Reported as working since long time. ALPS TDBE2(sp5659) tuner, ves1820 modulator.
+
- dvb-ttusb-budget.ko
+
- ves1820.ko
+
- etc.
+
+
=== Technotrend TT-Connect C-1200 USB ===
+
+
Reports say it works in Linux; stv0297 + Philips tdm1316; [http://www.linuxtv.org/pipermail/linux-dvb/2006-April/009711.html details here].
+
Possibly has some frame-dropping issues? (See [http://www.linuxtv.org/pipermail/linux-dvb/2007-February/015799.html], though works somehow despite the warning in [http://www.mail-archive.com/[email protected]/msg23180.html] so maybe the first is just missing firmware file or something else.)
+
+
As a side note, the Techno-trend USB IR works [http://www.google.com/search?&q=technotrend+usb+ir+patch with patches] (support for ttusbir included in lirc 0.8.2pre3).
+
+
== DVB-S ==
+
+
=== SIEMSSEN & CO. - Opera S1 ===
+
+
A similar device to the DVBWorld. Seems to be sold in Germany by one of the well-known discounters. Its German distributor is [http://www.siemssen.de/ Siemssen] under the name Opera DVB-S1.
+
The card contains a Cypress CY7C68013A-56PCX to manage the USB part, which seems to control a Xilinx Spartan(R) XC3850 FPGA. The tuner box reads Sharp, but I cannot find out more about it.
+
+
I'm able to upload the firmware to turn the device from cold mode to warm USB ID but programming the FPGA still fails.
+
For my card/driver:
+
The cold USB ID is: VID 0x04b4 (CYPRESS) PID: 0x2830
+
The warm USB ID is: VID 0x695C (???????) PID: 0x3829
+
+
+
DVB-S cards in similar cases can be found on different Asian sites:
+
[http://www.dvb-device.com/ace42sc.htm]
+
[http://www.szforwardvideo.com/en/manager/product_read.asp?ID=96]
+
+
Despite the fact that all those devices look quite similar and have similar hardware, Siemssen still claims that they are built completely differently and their drivers are not interchangeable.
+
+
A driver fully supporting this device is available in 2.6.22 and later kernels.
+
+
=== TwinhanDTV StarBox II - DVB-S (7021A)===
+
+
The following modules are necessary in order to get this device running:
+
- dvb-usb.ko
+
- dvb-usb-vp702x.ko
+
+
The driver is still a little work-in-progress. If you want to help the development, please consult the [[linux-dvb-ml|linux-dvb Mailing list]]. The front-end part of the DST driver could be rewritten to be used by the USB driver. Currently it is hard-wired to the PCI cards.
+
+
{{DvbDeviceList
+
| content=
+
{{DvbDevice
+
| device=DigitalRise DVB-S USB Sat Starbox
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-vp702x-01.fw
+
| hw=[[DST]]
+
| pic=[http://www.digitalrise.biz/products/dtv-s7021/]
+
}}
+
{{DvbDevice
+
| device=TwinhanDTV StarBox
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-vp702x-01.fw
+
| hw=[[DST]]
+
| pic=[http://www.twinhan.com/product_satellite_5.asp]
+
}}
+
{{DvbDevice
+
| device=Typhoon DVB-S USB 2.0 Box
+
| type=USB2.0, USB1.1
+
| fw=dvb-usb-vp702x-01.fw
+
| hw=[[DST]]
+
| pic=[http://www.typhoon.de/de/art.php?p=822&c=]
+
}}
+
}}
+
+
=== Pinnacle PCTV 400e USB2.0 DVB-S ===
+
+
This driver is pre-Work-In-Progress. The following drivers are needed for these devices:
+
- tda10086.ko
+
- lnbp21.ko
+
- tda826x.ko
+
- dvb-usb.ko
+
- dvb-usb-ttusb2.ko
+
+
It uses (an extension of) the TTUSB-USB-protocol.
+
+
{{DvbDeviceList
+
| content=
+
{{DvbDeviceCommented
+
| device=Pinnacle PCTV 400e USB - DVB-S
+
| type=USB2.0
+
| fw=dvb-usb-pctv-400e-01.fw
+
| hw=[[Philips TDA10086|Philips TDA10086/93]], TDA8263 tuner, ST lnbp21
+
| comment=This device uses isochronous data transfer.
+
| pic=[http://www.pinnaclesys.com/ProductPage_n.asp?Product_ID=2659&Langue_ID=4]
+
}}
+
}}
+
+
=== Pinnacle PCTV Sat Pro USB DVB-S (PCTV450e)===
+
USB ID : 2304:0222
+
+
Status : unknown
+
+
chips : TDA10086, LNBP21, Cypress µC CY7C68013,... (doc says it uses the TDA8263HN; ?no difference with 400e?)
+
+
[http://www.pinnaclesys.com/PublicSite/fr/Products/Consumer+Products/PCTV+Tuners/PCTV+Digital+PVR+(DVB-S_DVB-T)/PCTV+Sat+Pro+USB.htm photo]
+
+
== DVB-S2 ==
+
+
=== [http://www.pinnaclesys.com/PublicSite/de/Products/Consumer%2BProducts/PCTV%2BTuners/PCTV%2BDigital%2BPVR%2B%28DVB-S_DVB-T%29/PCTV%2BSat%2BHDTV%2BPro%2BUSB.htm PCTV Sat HDTV Pro USB (PCTV452e)] ===
+
+
see [[#PCTV_Sat_HDTV_Pro_USB_.28PCTV452e.29_2]]
+
+
== ATSC ==
+
+
== Multi-purpose DVB/ATSC ==
+
+
=== [[Technotrend]] Budget USB1.1 (DVB-S/T/C) ===
+
+
All devices below are fully supported by the LinuxTV driver. The following drivers are needed for these devices:
+
- stv0299.ko
+
- cx22700.ko
+
- tda1004x.ko
+
- tda8083.ko
+
- ves1820.ko
+
- dvb-ttusb-budget.ko
+
+
These [[frontend|frontend(s)]]/[[demodulator|demodulator(s)]] can be found in various revisions of this device:
+
- [[STMicroelectronics]] [[STMicroelectronics STV0299|STV0299]]
+
- [[Conexant]] [[Conexant CX22700|CX22700]]
+
- [[Philips]] [[Philips TDA10046|TDA10046]]
+
- [[Philips]] [[Philips TDA8083|TDA8083]]
+
- [[VLSI]] [[VES1820]]
+
+
{{DvbDeviceList
+
| content=
+
{{DvbDevice
+
| device=[[Hauppauge]] [[Hauppauge WinTV-NOVA-S USB|WinTV-NOVA-S USB]]
+
| type=USB1.1
+
| pic=[http://www.hauppauge.de/pages/products/data_nova-s-usb.html]
+
}}
+
{{DvbDevice
+
| device=[[Hauppauge]] [[Hauppauge WinTV-NOVA-T USB|WinTV-NOVA-T USB]]
+
| type=USB1.1
+
| fw=dvb-fe-tda10046.fw
+
| hw=[[Philips]] [[Philips TDA10046|TDA10046]]
+
| pic=[http://www.hauppauge.de/pages/products/data_nova-t-usb.html]
+
}}
+
{{DvbDevice
+
| device=Satelco USB-Box DVB-S/T/C
+
| type=USB1.1
+
| fw=dvb-fe-tda10046.fw
+
| hw=[[Philips]] [[Philips TDA10046|TDA10046]]
+
| pic=[http://www.satelco.de/htm/shop/boxen/index.htm]
+
}}
+
{{DvbDevice
+
| device=Technotrend TT-PCline USB family DVB-S/T/C
+
| type=USB1.1
+
| fw=dvb-fe-tda10046.fw
+
| hw=[[Philips]] [[Philips TDA10046|TDA10046]]
+
| pic=[http://www.technotrend.de/english/download/download.html]
+
}}
+
}}
+
+
=== [[Technotrend]] DEC Budget USB1.1 (DVB-S/T) ===
+
+
All devices below (except the DEC1100-T) are supported by the LinuxTV driver. The following drivers are needed for these devices:
+
- ttusbdecfe.ko
+
- ttusb_dec.ko
+
+
The DECs are set-top boxes equipped with a USB port and can be used without a PC. The TV-Out can't be used for PC output.
+
+
{{DvbDeviceList
+
| content=
+
{{DvbDevice
+
| device=[[Hauppauge]] [[Hauppauge DEC3000-S USB|DEC3000-S USB]] (DVB-S)
+
| type=USB1.1
+
| fw=dvb-ttusb-dec-3000s.fw
+
| hw=DEC-specific
+
| pic=[http://www.hauppauge.de/pages/products/data_dec3000s.html]
+
}}
+
{{DvbDevice
+
| device=[[Hauppauge]] [[Hauppauge DEC2000-T USB|DEC2000-T USB]] (DVB-T)
+
| type=USB1.1
+
| fw=dvb-ttusb-dec-2000t.fw
+
| hw=DEC-specific
+
| pic=[http://www.hauppauge.de/pages/products/data_dec2000t.html]
+
}}
+
{{DvbDeviceCommented
+
| device=[[Hauppauge]] [[Hauppauge DEC1100-T|DEC1100-T]] (DVB-T)
+
| type=USB1.1
+
| hw=DEC-specific
+
| comment=TV set-top box only - no PC output
+
| pic=[http://www.hauppauge.de/pages/products/data_dec1100t.html]
+
}}
+
{{ DvbDeviceCommented
+
| device=[[Hauppauge]] [[Hauppauge DEC2540-T USB|DEC2540-T USB]] (DVB-T)
+
| type=USB1.1
+
| hw=DEC-specific
+
| comment=Similar to DEC2000-T but with Conax(?) decrypt card slot. Decryption is not supported under GNU/Linux. Only sold in the Netherlands.
+
}}
+
}}
+
+
=== [[TechniSat]]/[[B2C2]] Sky/Air/Cable2PC USB ([[Flexcop]]-based) (DVB-S/T/C / ATSC) ===
+
+
Most devices below are fully supported by the LinuxTV driver. The following drivers are needed for these devices:
+
- stv0299.ko
+
- stv0297.ko
+
- mt352.ko
+
- mt312.ko
+
- nxt2002.ko
+
- bcm3510.ko
+
- b2c2-flexcop.ko
+
- b2c2-flexcop-usb.ko
+
+
These [[frontend|frontend(s)]]/[[demodulator|demodulator(s)]] can be found in various revisions of this device:
+
- [[STMicroelectronics STV0299]]
+
- [[STMicroelectronics STV0297]]
+
- [[Zarlink MT312]]
+
- [[Zarlink MT352]]
+
- [[NXT2002|NxtWave Nxt2002]]
+
- [[BCM3510|Broadcom BCM3510]]
+
+
{{DvbDeviceList
+
| content=
+
{{DvbDevice
+
| device=TechniSat/B2C2 SkyStar USB
+
| type=USB1.1
+
| pic=[http://www.technisat.de/?site=produkte/produkteview.php&kid=1,29&pid=1476]
+
}}
+
{{DvbDevice
+
| device=TechniSat/B2C2 SkyStar USB Plus
+
| type=USB2.0
+
| comment='''''Linux support unknown'''''
+
| pic=[http://www.technisat.de/?site=produkte/produkteview.php&kid=29,100&pid=1748&reload]
+
}}
+
{{DvbDeviceCommented
+
| device=TechniSat/B2C2 AirStar USB DVB-T
+
| type=USB1.1
+
| comment='''''Not supported?'''''
+
W3ird_N3rd says that "it is detected perfectly but it is not capable of locking onto any channel, 0 channels are found. My antenna is fine and the device does work on Windows, so somehow support for this device is broken. Don't buy it till it's fixed."
+
| pic=[http://www.technisat.de/de/produkte/produkteview.php?kid=1,29&pid=1477]
+
}}
+
{{DvbDevice
+
| device=TechniSat/B2C2 AirStar USB ATSC
+
| type=USB1.1
+
| fw=dvb-fe-bcm3510-01.fw
+
| hw=[[BCM3510|Broadcom BCM3510]]
+
| pic=[http://www.bbti.us/products_air2pc_atsc_usb.htm]
+
}}
+
{{DvbDeviceCommented
+
| device=TechniSat/B2C2 CableStar USB
+
| type=USB1.1
+
| comment=Discontinued
+
}}
+
}}
+
+
== Hybrid (DVB/Analogue) ==
+
+
Hybrid devices have a DVB-demodulator and a analogue capturing chip. Normally they share a tuner.
+
+
=== Medion MD95700 (DVB-T) ===
+
+
All devices below are fully supported by the LinuxTV driver. The following drivers are needed for these devices:
+
+
- cx22702.ko
+
- dvb-usb.ko
+
- dvb-usb-cxusb.ko
+
+
The analogue part (handled by a Conexant CX25842) is not supported yet. The cx25840 driver from ivtv can be used to implement support.
+
+
{{DvbDeviceList
+
| content=
+
{{DvbDeviceCommented
+
| device=Medion MD 95700 4in1
+
| type=USB2.0
+
| hw=[[CX22702|Conexant CX22702]]
+
| comment=The box also has a X10 remote control. This is radio, not IR, and is supported by the atiremote driver. It also has a USB2.0 hub (Tetrahub) with one additional USB port. Both of them are working without mains power.
+
}}
+
}}
+
+
There is a new firmware, version 1.0.2.14, for the MD 95700 from Medion.
+
You can download it directly: [http://www1.medion.de/downloads/index.pl?op=detail&id=2804&type=treiber&lang=de] (in German). '''Please read the Readme''' before you flash the box.
+
+
This update fixes some video problems, but it is incompatible with the old dvb-usb drivers (i.e. kernels from 2005). If you use your box under Windows, don't forget to ensure that the Windows drivers are up to date too.
+
+
Suse 10.1 users might also want to see the distro-specific notes in the [[Medion MD95700 (DVB-T)]] article.
+
+
=== DViCO FusionHDTV USB ===
+
+
This class of usb devices is codenamed, Bluebird.
+
+
All devices below are fully supported by the LinuxTV driver. The following drivers are needed for these devices:
+
+
- lgdt330x.ko
+
- mt352.ko
+
- zl10353.ko
+
- dvb-usb.ko
+
- dvb-usb-cxusb.ko
+
+
These [[frontend|frontend(s)]]/[[demodulator|demodulator(s)]] can be found in various revisions of this device:
+
- [[LGDT3303|LG Electronics DT3303]]
+
- [[Zarlink MT352]]
+
- [[ZL10353|Zarlink ZL10353]]
+
+
+
{| width="900" border=1 cellpadding=2 cellspacing=0 valign="top"
+
|- bgcolor=#efefef valign="top"
+
! '''device/model'''
+
! '''type'''
+
! '''firmware name'''
+
! '''comments/quirks'''
+
! '''URL/pictures'''
+
|- align="left"
+
! DViCO FusionHDTV 5 USB Gold
+
! USB2.0
+
! dvb-usb-bluebird-01.fw
+
!
+
! [http://www.fusionhdtv.co.kr/eng/Products/HDTV5usb.aspx]
+
|- align="left"
+
! DViCO FusionHDTV USB DVB-T
+
! USB2.0
+
! dvb-usb-bluebird-01.fw
+
! There is a working Mac driver written by John Dalgliesh. http://www.defyne.org
+
! [http://www.fusionhdtv.co.kr/eng/Products/DVBTUSB.aspx]
+
|- align="left"
+
! DViCO FusionHDTV DVB-T Dual USB
+
! USB2.0
+
! dvb-usb-bluebird-01.fw
+
!
+
! [http://www.fusionhdtv.co.kr/ENG/Products/DualDigital.aspx]
+
|-
+
|}
+
+
== Work-In-Progress ==
+
+
=== [[Pinnacle PCTV 200e | Pinnacle PCTV 200e USB - DVB-T]] ===
+
+
This driver in beta stage, soon available for testing. Search this wiki for Pinnacle 200e. The following drivers are needed for these devices:
+
- dvb-usb.ko
+
- pctv200e.ko
+
+
These [[frontend|frontend(s)]]/[[demodulator|demodulator(s)]] can be found in various revisions of this device:
+
- [[Zarlink MT352]]
+
+
'''Comment:''' The driver is almost written. There is a version that has started to work, which we hope to release for testing soon. If you want to help to test the driver, or you want to help to develop the driver, please consult the [[linux-dvb-ml|linux-dvb Mailing list]].
+
+
http://linuxtv.org/wiki/index.php/Pinnacle_PCTV_200e
+
+
What we know:
+
- MT352-frontend (i2c addr: 0x3e)
+
- Microtune MT2060 tuner (i2c addr: 0xC0)
+
- has a pid filter
+
- no firmware needed
+
- implements a I2CoverUSB bus
+
- USB protocol is invented by Pinnacle
+
+
{| width="900" border=1 cellpadding=2 cellspacing=0 valign="top"
+
|- bgcolor=#efefef valign="top"
+
! '''device/model'''
+
! '''type'''
+
! '''firmware name'''
+
! '''comments/quirks'''
+
! '''URL/pictures'''
+
|- align="left"
+
! Pinnacle PCTV 200e USB - DVB-T
+
! USB2.0/USB1.1
+
! - (no firmware needed)
+
! -
+
! [http://www.pinnaclesys.com/ProductPage_n.asp?Product_ID=2657&Langue_ID=4]
+
|-
+
|}
+
+
=== Pinnacle PCTV Dual DVB-T Diversity (PCTV 2000e USB) - DVB-T ===
+
( idVendor = 2304 idProduct = 022c )
+
=== Terratec Cinergy DT XS Diversity ===
+
( idVendor =0ccd idProduct = 005a )
+
+
=== Hauppage Nova-TD Stick ===
+
( idVendor =2040 idProduct = 9580 )
+
+
+
These three devices features two tuners, and have two antennas. You'll have adapter0 and adapter1 in /dev/dvb, which you can use separately. There is a driver at http://www.chez.com/treza/mt2266.htm.
+
+
It should work, but it can (will) be enhanced.
+
+
The issues remaining in the '''third release''' are :
+
* The diversity cross-feed between tuners is not handled.
+
* Some AGC settings may be wrong, so the quality may be lower than with windows.
+
* The behavior with VHF frequency channels is unknown.
+
* Maybe other things
+
+
So it is useable, at least on my computer, but I would not yet recommend anyone to buy it as a "Linux compatible" device.
+
+
As the cross-feed is not handled yet, you will probably NOT get better reception compared to other DVB-sticks, and you won't have any better reception during movement either.
+
+
=== [http://www.pinnaclesys.com/PublicSite/de/Products/Consumer%2BProducts/PCTV%2BTuners/PCTV%2BDigital%2BPVR%2B%28DVB-S_DVB-T%29/PCTV%2BSat%2BHDTV%2BPro%2BUSB.htm PCTV Sat HDTV Pro USB (PCTV452e)] ===
+
+
USB ID: 2304:021f
+
+
This driver is pre-Work-In-Progress. The following drivers are needed for these devices:
+
- stb0899.ko
+
- stb6100.ko
+
- lnbp22.ko
+
- dvb-usb.ko
+
- dvb-usb-pctv452e.ko
+
+
These [[frontend|frontend(s)]]/[[demodulator|demodulator(s)]] are found in this device:
+
+
- [http://www.st.com/stonline/products/literature/bd/10839.pdf stb6100]
+
- [http://www.st.com/stonline/products/literature/bd/11107.pdf stb0899]
+
+
This USB Controller is used:
+
+
- [http://www.keil.com/dd/docs/datashts/cypress/cy7c68xxx_ds.pdf#search=%22Cypress%2068013%22 CY7C68013]
+
+
What we know:
+
- uses parts/all of the ttusb-USB-protocol
+
- isochronous Data transfer (whole TS only)
+
- no firmware is needed (budget device)
+
+
== Unspecified/Unknown/Unsupported devices ==
+
+
If you own one or more devices from the following list and you want to help the development, please contact the [http://www.linuxtv.org/cgi-bin/mailman/listinfo/linux-dvb linux-dvb Mailing list].
+
+
=== Afatech 9015 ===
+
http://www.afatech.com.tw/product/e_product_AF901x.htm
+
+
GeniaTech T328B DVB-T http://www.geniatech.com/pa/t328b.htm
+
+
Tvisto USB DVB-T http://www.t-visto.com/productos/tratamiento_video/tv_stick.htm
+
+
=== Anysee E30 (Plus) DVB-T USB2 ===
+
+
The design of DVB-T E30 seems to be similar to the Twinhan Alpha Stick (same Tuner and Demod), but it doesn't work with the alpha-driver (vp7045) and firmware. Possibly some help from the new Opera DVB-S1 support, which also uses a Cypress CY7C68013 chip for USB microcontroller ([http://bttv-gallery.de/]) (just an idea)? dvb-usb-vp7045 reported to load at [http://www.linuxtv.org/pipermail/linux-dvb/2005-September/004592.html] (an old message).
+
+
Note: It has been reported that [http://anysee.com/ Anysee] has not been willing to help open source developers to write a Linux driver by handing out specifications. Any further information on communication with Anysee would be welcome.
+
+
=== Anysee E30 Plus DVB-C USB2 ===
+
+
Looks like support for DVB-C version should be added to cxusb, since from the photos it looks like Conexant USB 2.0 reference design (source: IRC logs). Has two firmware files, anyseeAUDB.ROM and anyseeAUDC.ROM, which are needed for analog video (cx2584x/MAKO) only.
+
+
The device hardware might be similar to those supported by dvb-usb-cxusb, but the firmware API is different.
+
+
=== DVBWorld DVB-S 2102 USB2 Box ===
+
DVBWorld DVB-S 2102 USB2.0 (USB ID 04B4:2102) [http://www.worlddvb.com/product/htm/usbs.htm] contains:
+
*Cypress CY7C68013 USB chip
+
*Sharp BS2F7VZ0194A tuner with integrated STV0299B
+
+
DVBWorld DVB-S 2102 USB2.0 have clones:
+
*[[Acorp DS120]] (USB ID 04B4:2102) [http://www.acorp.ru/products/multimedia/satellite/ds120/]
+
*Nextorm NBS240 [http://nextormdigital.com/products/NBS240.htm]
+
*SatStar2 USB2.0 Box [http://www.satstar2.com/product/details.asp?p_id=6]
+
[http://www.dmsiusa.com/usb_box.htm]
+
+
=== LifeView TV Walker DVB-T (P/Q/Hybrid) ===
+
+
P Stick
+
+
* Now it doesn't exist in the Lifeview's page, not in discontinued products and not in External TV solutions, only a P Plus but i supuose that is different like the Q (now unsupported) and the Q PLus in External TV solutions. ¿Somebody can confirm this and also put info about the new product of lifeview if they're different?
+
+
Q Stick [http://www.lifeview.com.tw/html/products/discontinued_products/q_dvbt.htm]
+
+
* USB 2.0 stick. USB ID: idVendor 0x10fd Anubis Electronics, Ltd : idProduct Unknown anyone can post it?
+
+
* Chips visible on card:
+
** Frontend: TDA10046A OFDM channel demodulator
+
** Tuner: [http://www.semiconductors.philips.com/acrobat_download/literature/9397/75014128.pdf TDA8275A]Silicon Tuner
+
+
There is a DVB-T-only box: [http://www.lifeview.com.tw/html/products/external_tv/tv_walker_dvbt.htm] I'm not able to find it in the discontinued products and correct the url to a new working one.
+
+
There is a DVB-T/Analogue box (with external power): [http://www.lifeview.com.tw/html/products/discontinued_products/tv_walker_studio_hybrid.htm]
+
+
Other dvb-t usb cards same as lifeview ones but different brand:
+
+
*Zaapa USB DVB-T Model: LR523 - (I can't find the lr523 in their web page) This one seems to be exactly the same LifeView TV Walker DVB-T Q LR506, lsusb also reveals (idVendor 0x10fd Anubis Electronics, Ltd) and the idProduct is 0x0513 I don't know if is the same id product that the LifeViews Q stick but is the same that the [[DVB_USB#LifeView_TV_Walker_Twin|Lifeview TV Walker Twin]] (this make an issue triying to make it work because the Walker Twin is different, the last two paragrafhs of this point explain this issue), anyone can post here the idProduct of lifeview's (if it's the same the issue of this stick will also apply to the Lifeview Q stick). I say this based on http://www.bandaancha.st/foros.php?temid=592815#633106 the post #44 says that in spanish, and also tell windows users with problems in channels reception, to use the driver and also the aplication from lifeview for the lr506, and seems that most of the users have their problems solved.
+
+
: In a kernel-2.6.22-gentoo-r1 with the firmware supplied by the ebuild linuxtv-dvb-firmware and DVB_CARD="tda10046lifeview" only, the usb is detected as a TV Walker Twin insted of a TV Walker DVB-T Q LR506 and the result is to fail triying to load the wrong firmware. This was with a similar to Q LR506 zaapa LR523 and also with the tda1004x module also in use by a saa7134_dvb, don't know if this can cause problems when i could load the correct firmware.
+
+
: Somebody can make mechanism to detect this card as is and not as a TV Walker Twin? This is caused by a similar vendor and product ids.
+
+
*In the zaapa web page I found one the ZT- LR 506Q http://www.zaapa.co.uk/Public/ficha_producto.asp?CPRO=636 this one have also the same name that the lifeview ones, the image of this tunner is the same that the zaapa LR523 except that the 523 have the anthena connector oposite to the usb side.
+
+
=== Pinnacle PCTV HD Pro Stick===
+
* USB2 stick. USB ID: 2304:0227.
+
* Device identifies itself as a "PCTV 800e".
+
* The USB stick consists of two boards: one with the USB and A/V connectors, the other with the RF connector. The two boards are joined(soldered) together with two 7 pin headers, one on each side of the board. I( [[User:Emeitner]] )am unwilling to unsolder the pins and risk damaging the
+
device, so whatever is inside the "sandwich" is still unknown.
+
* Chips visible on card:
+
** Frontend: lgdt3303
+
** Tuner: xc3028ACQ
+
** There is also a CPLD: lc4032v
+
+
[http://www.pinnaclesys.com/PublicSite/us/Products/Consumer+Products/PCTV+Tuners/PCTV+Analog_Digital+PVR/PCTV+HD+Pro+Stick Manufacurers product page]
+
+
=== Turbosight (TBS) [[USB DVB-S Q-box]] ===
+
USB ID is: VID:0x734C, PID:0x2601.
+
+
Chips:
+
*Cypress FX2 (CY7C68013A)
+
Tuner:
+
*Samsung with integrated STV0299 fronend and STB6000 pll
+
[http://www.turbosight.com/english/products/product.htm]
+
+
=== Tongshi DVB-S/C/T USB ===
+
+
Is this just a reference design?
+
+
[http://www.tongshi.com/cp_dvb_e.htm]
+
+
=== [http://www.twinhan.com/product_terrestrial_7049.asp TwinhanDTV Twister (7049) DVB-T] ===
+
+
In germany a similar device seems to be sold as dnt EuroMini200 [http://www.dnt.de/index.php?dir=produkte/detail&id=20206].
+
+
We tried to get information about the usb interface at Twinhan, but there was none avaiable. The chip vendor Uli [http://www.uli.com.tw/] refuses to open all relevant information.
+
+
Maybe the same applies for the TwinhanDTV Hurricne (704D) [http://www.twinhan.com/product_704D.asp].
+
+
=== [http://www.twinhan.com/product_D%2BA_3.asp TwinhanDTV MagicBox Pro (DVB-T/Analogue)] ===
+
+
A [[hybrid]] USB2.0 box based on the [http://www.uli.com.tw/product_dm/m9207dm_web.pdf ULI M9207] chipset. Also based on this chipset is the Pinnacle [http://www.pinnaclesys.com/PublicSite/uk/Products/Consumer+Products/PCTV+Tuners/PCTV+Analog_Digital+PVR/PCTV+310e PCTV 310e] and [http://www.nurido.at/news/computer/testgericomtvtunerusb20beihofer.html Gericom USB 2.0 Hybrid Box] sold by Aldi (Germany) and Hofer (Austria).
+
+
=== VBox DVB-S USB1.1 ===
+
+
Search the archive of the linux-dvb-mailing. A developer of VBox once mentioned that they have a Linux-driver. Maybe they are willing to provide information for a OpenSource-driver.
+
[http://www.vboxcomm.com/product1.htm#5]
=== WideView DVB-T/CATV USB2.0 Hybrid ===
+
== lsusb -t ==
[http://www.wv.com.tw/]
+
=== Wrong ===
+
With this setup you will have bandwidth problems with no appropriate warning whatsoever on any log file. Except that video will look horrible.
+
<pre>
+
/: Bus 02.Port 1: Dev 1, Class=root_hub, Driver=ohci_hcd/8p, 12M <-- USB1.1, slow, don't us
+
/: Bus 01.Port 1: Dev 1, Class=root_hub, Driver=ehci_hcd/8p, 480M <-- one bus
+
|__ Port 2: Dev 2, If 0, Class=vend., Driver=dvb_usb_ttusb2, 480M <-- 1st DVB device, shares bandwidth
+
|__ Port 4: Dev 2, If 0, Class=vend., Driver=dvb_usb_ttusb2, 480M <-- 2nd DVB device, shares bandwidth
+
</pre>
=== YUAN UB701 (DVB-T/Analogue) ===
+
=== OK ===
+
You can solve the above situation by adding a PCI-Express to USB3.0 card:
+
<pre>
+
/: Bus 04.Port 1: Dev 1, Class=root_hub, Driver=xhci_hcd/2p, 5000M
+
/: Bus 03.Port 1: Dev 1, Class=root_hub, Driver=xhci_hcd/2p, 480M <-- one bus
+
|__ Port 2: Dev 2, If 0, Class=vend., Driver=dvb_usb_ttusb2, 480M <-- one DVB device
+
/: Bus 02.Port 1: Dev 1, Class=root_hub, Driver=ohci_hcd/8p, 12M <-- USB1.1, slow, don't use
+
/: Bus 01.Port 1: Dev 1, Class=root_hub, Driver=ehci_hcd/8p, 480M <-- one bus
+
|__ Port 4: Dev 2, If 0, Class=vend., Driver=dvb_usb_ttusb2, 480M <-- one DVB device
+
</pre>
A [[hybrid]] USB2.0-only box. Maybe it is a clone of the Conexant Hybrid Reference design?
+
'''''Rule''': One device per bus''
It has an em2880 and a xc3028 tuner. USB id eb1a:2881
+
[http://www.yuan.com.tw/en/products/vdo_ub701.html]
+
[[Category:DVB-T|!USB devices DVB-T]]
+
[[Category:Hardware| ]]
[[Category:Hardware|!USB devices DVB-T]]
+
Latest revision as of 12:13, 3 December 2012
For information about supported USB devices, see the appropriate device category:
Introduction
For all DVB USB devices you will need to load (if not compiled into the kernel):
• i2c-core
• crc32
• firmware_class
• dvb-core.ko
• dvb-pll.ko
and maybe others too. If the loading fails for any particular module you'll get a "unknown symbol" message. Then have a look at dmesg to find out, which symbols (functions) are missing. After you've found out which module was absent, please come back here and add it to the list/device-entry.
The Type field specifies the USB standard(s) supported by the device.
USB1.1
The device supports USB 1.1 only, and will work at 1.1 speeds when attached to a USB 2.0 port.
USB2.0
The device supports USB 2.0 only, and will not work when attached to a USB 1.1-only port. Such devices are normally capable of delivering the complete Transport Stream to the software demuxer.
USB2.0, USB1.1
The device supports USB 1.1 and USB 2.0, and will work at any speed supported by 1.1 or 2.0. When running in USB 2.0 mode, such devices can deliver the complete Transport Stream (unless specified otherwise).
Firmware
Most of the USB devices need firmware to run. Some of the firmware files can be downloaded from here.
You need to copy the firmware to the correct place on your system. This will normally be /lib/firmware or a folder below it. Here is an example:
- $ cd /lib/firmware
- $ ls
- 2.6.15-23-amd64-xeon
- $ cd 2.6.15-23-amd64-xeon
- $ sudo cp ~/dvb-usb-umt-010-02.fw .
Now, you need to unplug your USB device. Plug it in again, and then take a look at dmesg.
- $ dmesg
- < ...... lines cut for clarity ..... >
- usb 5-2: USB disconnect, address 3
- usb 5-2: new high speed USB device using ehci_hcd and address 8
- dvb-usb: found a 'Hanftek UMT-010 DVB-T USB2.0' in cold state, will try to load a firmware
- dvb-usb: downloading firmware from file 'dvb-usb-umt-010-02.fw' to the 'Cypress FX2'
- dvb-usb: Hanftek UMT-010 DVB-T USB2.0 successfully initialized and connected.
- usb 5-2: USB disconnect, address 8
- dvb-usb: generic DVB-USB module successfully deinitialized and disconnected.
In this case, I have success, because the firmware was loaded.
Remember that on some system the firmware is loaded by udev, so if for some reason the firmware is not loaded you may check that udev is acutally running. To check you could for example issue the command:
- $ ps -e | grep udev
If the output is empty, then you have to restart the udev daemon. For example in a Debian based system you may try with:
- $ sudo /etc/init.d/udev restart
then try again, removing and inserting the module again with modprobe.
Additional Technical Information
This section starts describing devices which hit the market beginning of spring 2004. It does not cover TTUSB-based devices.
Host Controlled DVB USB Devices
When first AC-Adapter-free USB devices (with the capability of receiving DVB Signals) hit the market, every vendor was using the generic USB-device-controller from Cypress (FX1 (AN2135/AN2235), FX2) as an interface between the DVB-hardware and the host.
As those controllers are very generic, one has to create (and download) an (small or not so small) embedded software to those controller to give vendor-specific and the wanted functionality. After downloading the so-called firmware vendors used the reboot-feature of the controller to re-enumerate with new USB Vendor/Product-IDs and a new USB-layout. On the host this looks like a normal disconnect and connect of an USB device.
Because the memory for storing the firmware was limited, vendors decided not to put any DVB-demodulator and RF-tuner specific code into the firmware, but only to implement interface functionality. At that time, the common way to control other components was I²C. The other necessary feature was data-streaming. With such a firmware, every functionality is done from the host - mainly the driving of the demodulator and the tuner.
Host-controlled devices are the ones based on DiBcom (dibusb, dib0700), Nebula (DigiTV), Hanftek and others. (see below)
Firmware Controlled DVB USB Devices
Another approach was coming later: When it started, that putting more memory on a board/into an IC with almost no increase of the BOM. Vendors started to put the demodulator and tuner-driver into the firmware. This was simplifying the host-part dramatically, because if you have a new hardware, you just need to modify the (platform-independent) firmware part and, as long as the firmware-interface is not changing, the host-driver stays the same.
Firmware-controlled devices: Twinhan VP7045/VP7021, Terratec Cinergy T2, Wideview and others.
To be continued ...
lsusb -t
Wrong
With this setup you will have bandwidth problems with no appropriate warning whatsoever on any log file. Except that video will look horrible.
/: Bus 02.Port 1: Dev 1, Class=root_hub, Driver=ohci_hcd/8p, 12M <-- USB1.1, slow, don't us
/: Bus 01.Port 1: Dev 1, Class=root_hub, Driver=ehci_hcd/8p, 480M <-- one bus
|__ Port 2: Dev 2, If 0, Class=vend., Driver=dvb_usb_ttusb2, 480M <-- 1st DVB device, shares bandwidth
|__ Port 4: Dev 2, If 0, Class=vend., Driver=dvb_usb_ttusb2, 480M <-- 2nd DVB device, shares bandwidth
OK
You can solve the above situation by adding a PCI-Express to USB3.0 card:
/: Bus 04.Port 1: Dev 1, Class=root_hub, Driver=xhci_hcd/2p, 5000M
/: Bus 03.Port 1: Dev 1, Class=root_hub, Driver=xhci_hcd/2p, 480M <-- one bus
|__ Port 2: Dev 2, If 0, Class=vend., Driver=dvb_usb_ttusb2, 480M <-- one DVB device
/: Bus 02.Port 1: Dev 1, Class=root_hub, Driver=ohci_hcd/8p, 12M <-- USB1.1, slow, don't use
/: Bus 01.Port 1: Dev 1, Class=root_hub, Driver=ehci_hcd/8p, 480M <-- one bus
|__ Port 4: Dev 2, If 0, Class=vend., Driver=dvb_usb_ttusb2, 480M <-- one DVB device
Rule: One device per bus
|
HOW TO HAVE RADIANT SKIN THIS MOTHER’S DAY
Haven Magazine - - Wellbeing -
Dr Elen ApThomas
NOW WE ALL KNOW THAT BEAUTY REALLY IS ON THE INSIDE BUT WHO DOESN’T WANT GORGEOUS BLEMISHFREE SKIN AS WELL? SKIN IS THE LARGEST ORGAN OF OUR BODY AND HELPS PROTECT US FROM THE OUTSIDE WORLD. IT IS AN AVENUE FOR DETOXIFICATION. IT ALSO REFLECTS OUR INTERNAL STATE OF HEALTH, BOTH EMOTIONALLY AND PHYSICALLY.
In order for our skin to look at its best, there are a few golden rules that improve skin health. These are to reduce inflammation and body acidity levels, improve circulation and to increase our intake of essential oils. Reducing inflammation can be achieved by eating less inflammatory foods (such as sugar, red meat and alcohol) while increasing our anti-inflammatory nutrients (in the form of foods high in antioxidants such as fruits and vegetables). Taking good quality antioxidant supplements, such as molecular hydrogen supplements, also helps. Reducing acidity levels can be helped by reducing acidic foods (such as starchy grains and animal protein) and increasing foods high in alkalinising minerals (such as anything green like spinach, kale and broccoli). The skin is also involved in the removal of toxins from the body. Improving circulation through exercise and saunas increases the efficiency of this cleansing function. Exercise does this by improving the transport of nutrients such as antioxidants to the skin and the removal of waste products via the lymphatics and through sweating. The skin acts as a barrier to the outside world and requires oils in its cell membranes in order to create a protective waterproofing effect. Oils not only create this effect but also have anti-inflammatory properties that keep the skin
Newspapers in English
Newspapers from Australia
© PressReader. All rights reserved.
|
©2018 WebMD, Inc. All rights reserved. eMedicineHealth does not provide medical advice, diagnosis or treatment. See Additional Information.
risedronate (Actonel, Atelvia)
Brand Names: Actonel, Atelvia
Generic Name: risedronate
What is risedronate (Actonel, Atelvia)?
Risedronate is used to treat osteoporosis caused by menopause, or steroid use. This medicine is for use when you have a high risk of bone fracture due to osteoporosis.
Risedronate is also used to treat Paget's disease of bone.
Risedronate may also be used for purposes not listed in this medication guide.
What are the possible side effects of risedronate (Actonel, Atelvia)?
Get emergency medical help if you have signs of an allergic reaction (hives, difficult breathing, swelling in your face or throat) or a severe skin reaction (fever, sore throat, burning in your eyes, skin pain, red or purple skin rash that spreads and causes blistering and peeling).
Stop using risedronate and call your doctor at once if you have:
• chest pain, new or worsening heartburn;
• difficulty or pain when swallowing;
• pain or burning under the ribs or in the back;
• severe heartburn, burning pain in your upper stomach, or coughing up blood;
• new or unusual pain in your thigh or hip;
• jaw pain, numbness, or swelling;
• severe joint, bone, or muscle pain; or
• low calcium levels--muscle spasms or contractions, numbness or tingly feeling (around your mouth, or in your fingers and toes).
Common side effects may include:
This is not a complete list of side effects and others may occur. Call your doctor for medical advice about side effects. You may report side effects to FDA at 1-800-FDA-1088.
What is the most important information I should know about risedronate (Actonel, Atelvia)?
You should not take risedronate if you have problems with your esophagus, or low levels of calcium in your blood.
Do not take risedronate if you cannot sit upright or stand for at least 30 minutes after taking the medicine.
Risedronate can cause serious problems in the stomach or esophagus. Stop using risedronate and call your doctor at once if you have chest pain, new or worsening heartburn, or pain when swallowing.
Also call your doctor if you have muscle spasms, numbness or tingling (in hands and feet or around the mouth), new or unusual hip pain, or severe pain in your joints, bones, or muscles.
What should I discuss with my healthcare provider before taking risedronate (Actonel, Atelvia)?
You should not take risedronate if you are allergic to it, or if you have:
• low levels of calcium in your blood (hypocalcemia); or
• problems with the muscles in your esophagus (the tube that connects your mouth and stomach).
Do not take risedronate if you cannot sit upright or stand for at least 30 minutes. Risedronate can cause serious problems in the stomach or esophagus. You must stay upright for at least 30 minutes after taking this medicine.
Tell your doctor if you have ever had:
• trouble swallowing;
• problems with your stomach or digestion;
• hypocalcemia;
• a dental problem (you may need a dental exam before you begin taking risedronate);
• kidney disease; or
• any condition that makes it hard for your body to absorb nutrients from food (malabsorption).
This medicine may cause jaw bone problems (osteonecrosis). The risk is highest in people with cancer, blood cell disorders, pre-existing dental problems, or people treated with steroids, chemotherapy, or radiation. Ask your doctor about your own risk.
Talk with your doctor about the risks and benefits of using this medication.
It is not known whether this medicine will harm an unborn baby. Stop taking risedronate and tell your doctor right away if you become pregnant.
You should not breastfeed while using risedronate.
Risedronate should not be given to a child younger than 18 years old.
How should I take risedronate (Actonel, Atelvia)?
Risedronate tablets come in different strengths (number of milligrams per pill) that are taken on different schedules. You may need to take a tablet once per day, once per week, once per month, or for 2 days in a row once per month.
Your dosing schedule will depend on why you are taking risedronate and in what tablet strength. If you change strengths, you may also need to change your schedule.
Follow all directions on your prescription label and read all medication guides or instruction sheets. Your doctor may occasionally change your dose. Use the medicine exactly as directed. Risedronate is often given for only 3 to 5 years.
Take the Actonel tablet first thing in the morning with a full glass (6 to 8 ounces) of water, at least 30 minutes before you eat or drink anything or take any other medicine.
Take the Atelvia tablet just after breakfast, with at least 4 ounces of water.
Use only plain water when taking a risedronate tablet. Do not use coffee, tea, soda, juice, or mineral water.
Do not crush, chew, or suck on a risedronate tablet. Swallow it whole.
For at least 30 minutes after taking risedronate:
• Do not lie down or recline.
• Do not take any other medicine including vitamins, calcium, iron, antacids, or laxatives.
Take this medicine at the same time each day or on the same day each week or each month (depending on your dosing schedule).
Pay special attention to your dental hygiene while taking risedronate. Brush and floss your teeth regularly. If you need to have any dental work (especially surgery), tell the dentist ahead of time that you are using risedronate.
Risedronate is only part of a complete program of treatment that may also include diet changes, exercise, bone mineral density testing, and taking calcium and vitamin supplements. Follow your doctor's instructions very closely.
Store at room temperature away from moisture and heat. Keep unused effervescent tablets in the foil blister pack.
QUESTION
What is another medical term for osteoporosis? See Answer
What happens if I miss a dose (Actonel, Atelvia)?
Once-daily dosing: If you forget to take risedronate first thing in the morning, do not take it later in the day. Wait until the following morning and skip the missed dose. Do not take two (2) doses in one day.
Once-per-week or once-per-month dosing: If you forget to take risedronate on your scheduled day, take it first thing in the morning on the day after you remember the missed dose. Then return to your regular weekly or monthly schedule on your chosen dose day. Do not take 2 doses in one day.
Call your doctor for instructions if you miss more than 2 doses in a month.
What happens if I overdose (Actonel, Atelvia)?
Drink a full glass of milk and seek emergency medical attention or call the Poison Help line at 1-800-222-1222. Do not make yourself vomit and do not lie down.
What should I avoid while taking risedronate (Actonel, Atelvia)?
Do not take two different brands or strengths of risedronate at the same time.
Avoid taking any other medicines for at least 30 minutes after taking risedronate. This includes vitamins, calcium, iron, antacids, or laxatives. Some medicines can make it harder for your body to absorb risedronate.
Avoid smoking, or try to quit. Smoking can reduce your bone mineral density, making fractures more likely.
Avoid drinking large amounts of alcohol. Heavy drinking can also cause bone loss.
What other drugs will affect risedronate (Actonel, Atelvia)?
Tell your doctor about all your other medicines, especially:
This list is not complete. Other drugs may affect risedronate, including prescription and over-the-counter medicines, vitamins, and herbal products. Not all possible drug interactions are listed here.
Where can I get more information (Actonel, Atelvia)?
Your pharmacist can provide more information about risedronate.
Remember, keep this and all other medicines out of the reach of children, never share your medicines with others, and use this medication only for the indication prescribed.
Every effort has been made to ensure that the information provided by Cerner Multum, Inc. ('Multum') is accurate, up-to-date, and complete, but no guarantee is made to that effect. Drug information contained herein may be time sensitive. Multum information has been compiled for use by healthcare practitioners and consumers in the United States and therefore Multum does not warrant that uses outside of the United States are appropriate, unless specifically indicated otherwise. Multum's drug information does not endorse drugs, diagnose patients or recommend therapy. Multum's drug information is an informational resource designed to assist licensed healthcare practitioners in caring for their patients and/or to serve consumers viewing this service as a supplement to, and not a substitute for, the expertise, skill, knowledge and judgment of healthcare practitioners. The absence of a warning for a given drug or drug combination in no way should be construed to indicate that the drug or drug combination is safe, effective or appropriate for any given patient. Multum does not assume any responsibility for any aspect of healthcare administered with the aid of information Multum provides. The information contained herein is not intended to cover all possible uses, directions, precautions, warnings, drug interactions, allergic reactions, or adverse effects. If you have questions about the drugs you are taking, check with your doctor, nurse or pharmacist.
Health Solutions From Our Sponsors
Reviewed on 2/6/2020
Health Solutions From Our Sponsors
|
The audio element is a fantastic part of HTML 5 that gives you a ton of control over the UI and functionality of media on a page. However, it is far too easy to open up Dev Tools, find the absolute file path to a media file on a server and download it for free. Obviously, this isn’t great for site owners who’d like to give users a way to stream music while preserving the ability to sell that media (aka – not have it stolen from them). So the question becomes, “how do you hide file paths?”
I ran into this issue while building a custom audio player for mattlitzingermusic.com. Although I choose to give my music away for free through certain outlets, I want the ability to be strategic about how it is available on the web. While I was thinking through this issue, a few solutions came to mind.
Method 1: No Worries Man!
You could trust people and hope they won’t try to steal your files. At the time of writing, this is the case for sites like Squarespace and BandCamp, which have become popular tools for music artists. The audio player for these sites loads the file from a CDN (which is great for speed), but it fails to obfuscate the file path in any way. You can simply find the audio tag in the HTML, copy the source link and now you have free music. What’s worse is I don’t even think this is illegal because the file wasn’t obtained through any nefarious method. It’s just a public link to a file living on the internet. Needless to say, I didn’t settle for this option. Here’s what that would have looked like:
<audio src="/audio/file_0.mp3"></audio>
Method 2: Look I’m Wearing A Mask
The audio element can accept a data URI as a source, so you could Base64 encode the files before they are sent to the browser. Unfortunately, anything that is Base64 encoded can be decoded. However, this would deter many users that might otherwise grab a plain text URL to your file. Here’s what this method could look like:
<?php
$file = file_get_contents('/audio/file_0.mp3');
?>
<audio src="data:audio/mp3;base64,<?php echo base64_encode($file); ?>"></audio>
Method 3: The Black Box
You could use a PHP file as a proxy layer. This file would use a GET variable to reference a list of audio files stored in an array (or database for larger lists). The PHP file would then return the media associated with that ID to the browser. Note that the file returns a response of 403 Forbidden if the file is accessed anywhere other than the specified URL. Here is what that looks like:
<audio src="/mp3.php?file_id=0"></audio>
<?php
if (strstr($_SERVER['HTTP_REFERER'], 'mattlitzingermusic.com/music') !== false) {
$track_id = $_GET['file_id'];
$tracks = array(
'/audio/file_0.mp3',
'/audio/file_1.mp3',
'/audio/file_2.mp3',
'/audio/file_3.mp3'
);
header('Location: ' . $tracks[$track_id]);
} else {
header($_SERVER['SERVER_PROTOCOL'].' 403 Forbidden', true, 403);
echo '<h1>Forbidden</h1><p>You don\'t have permission to access this file. </p><hr>';
}
As you can see, there is a lot to think about when it comes to playing audio securely on the web. None of these methods are close foolproof. They are just my thoughts on how we can address this problem with the tools available. If you can think of a better way, let me know on Twitter.
5
|
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman
@inproceedings{Boneh2006StronglyUS,
title={Strongly Unforgeable Signatures Based on Computational Diffie-Hellman},
author={Dan Boneh and Emily Shen and Brent Waters},
booktitle={Public Key Cryptography},
year={2006}
}
A signature system is said to be strongly unforgeable if the signature is existentially unforgeable and, given signatures on some message m the adversary cannot produce a new signature on m. Strongly unforgeable signatures are used for constructing chosen ciphertext secure systems and group signatures. Current efficient constructions in the standard model (i.e. without random oracles) depend on relatively strong assumptions such as Strong-RSA or Strong-Diffie-Hellman. We construct an efficient… CONTINUE READING
Highly Influential
This paper has highly influenced 25 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Citations
Publications citing this paper.
Showing 1-10 of 101 extracted citations
Similar Papers
Loading similar papers…
|
Jump to content
wilsontc
Atomican
• Content Count
516
• Joined
• Last visited
Community Reputation
0 Serf
About wilsontc
• Rank
Master
1. wilsontc
P2V a Linux boxen
This is probably the fastest approach. You obviously can't do this on a Windows system, but for Unix it's great! Just be careful of /etc/fstab. Depending on how many virtual hard disks you're going to use, you may need to modify this file.
2. wilsontc
Hard drive caddy for HP N36L microserver
You don't need to buy caddies for the Microserver, regular 3.5" SATA hard drives go in fine to the 4 plastic mounts it has. I'm just using regular Samsung drives with mine, other people have reported success with WD and Seagate drives.
3. You can right click on any file or application and go to "Make Link". Then just drag that to your desktop. However, I don't think that really is the most effective way to navigate. If you press your Windows key on your keyboard, you get the Dash. It's probably faster to type the name of the application than to minimise windows to the desktop. As Unity and Ubuntu mature, we'll start to see more novel ways of using the Dash through the use of Lens's.
4. From what I've been reading, I must be the only person who loves Unity (other than Canonical employees). Ubuntu is awesome. I love Ubuntu One, and will soon need a second 20GB pack (!). Quickly is really fun and interesting. DesktopCouch is awesome, I can't wait to see how that evolves in the next few years. AppIndicators are really sweet, and have reduced the clutter in the notification area. I think it's awesome that Ubuntu is daring to be different in a world of "me too!" Linux distros. Canonical has a lot of detractors. I think if people put the politics aside, they would see that Canonical is making some great software, and to do that, have to make some decisions that not every single community is going to like. My server will probably always run FreeBSD, but Ubuntu is a wonderful desktop distro which is getting better all the time.
5. A better way is by using something like Process Monitor or Regmon, and watch what keys the application queries. I'm not convinced this is a better way, but it certainly is a good alternative.
6. wilsontc
Exchange 2003 SP2
When you try to navigate to OWA, what error do you get in your browser?
7. wilsontc
Important recovery news from Japan
More intensity!
8. Are you able to reinitialise the disk from Disk Management in Windows? You may need to take the disk Offline first.
9. wilsontc
Scary earthquake?
Heh, we were just packing to come home to Melbourne when the Earthquake struck. Thankfully we were able to change our flight to the next day (today), but although Narita airport is apparently open, all roads and trains are closed, so we can't physically get there. Instead, we've had to change our flight to depart from Osaka, but Jetstar has told us we can only change a maximum of two times - if an aftershock happens, or if we can no longer get to Osaka (we're going via Shinkansen naturally), we'll need to re-buy the air ticket.
10. I've done two Hyper-V hosts, and about 8 guests, no issues, but it takes a hell of a long time to install (several hours). Our VM hosts are fairly old though. To get Dynamic Memory working, both the host and the guests need to be updated. Once you've updated the host, be sure to update the integration drivers on the guest and do another restart for the Dynamic Memory goodness :D
11. wilsontc
Windows 8 Information ?
It will be compatible with ARM processors. Other than that, I don't think there has been much confirmed...
12. I'd love to see you work in a business environment. That sort of attitude would get you laughed out of a job. Compatibility with the most popular office suite (MS Office) Integration with document management systems (SharePoint and friends) Group calendaring (Outlook) Group editing (Office 2010 + SharePoint) Easy-to-use image tools (Office 2010) Rich form creation and management (InfoPath) Shared mailboxes and contact lists (Exchange + Outlook) There is probably more weight on the top three reasons than the others, and to be fair, email / "groupware" functionality is probably provided by other platforms, but Microsoft Office has excellent integration between the various programs in the suite, and this is improving with each release. I am not aware of any one open source solution that has complete feature parity with MS Office, but please enlighten me if this is the case (especially with point 1)
13. Yup, OpenOffice / LibreOffice has really crap compatibility with Microsoft Office OpenXML files (not too sure about the older .doc, .xls files). If you create a basic document from the default.docx template, yeah, OOo / LO can read it, and you don't lose too much. If you have custom styles, tables, graphics and fields, then you're in for a world of frustration. OpenOffice might be capable of editing your basic uni assignment, but it's far from ready for the average corporate document if compatibility with Microsoft Office needs to be retained. *edit* I saw Dick Smith advertising Office Home and Student for $99 if you purchased a PC too - that doesn't strike me as an unreasonable amount to pay, and if it were available for Linux, I would gladly be using it!
14. wilsontc
What starts with your PC?
Hmm... * UbuntuOne Sync Daemon * Gnome Keyring * GKrellm * Gnome Remote Desktop Server * Ubuntu update notifier * Various power, driver and networking utilities
15. wilsontc
Post Your Latest Real Life Purchase!
How much did that set you back? Just under $90, including postage. http://www.singlemalt.com.au :)
×
|
How to create a database in RavenDB?
by toy.waelchi , in category: SQL , a year ago
How to create a database in RavenDB?
Facebook Twitter LinkedIn Telegram Whatsapp
1 answer
Member
by casper , a year ago
@toy.waelchi
To create a new database in RavenDB, you will need to use the RavenDB Management Studio or the RavenDB HTTP API.
Using the RavenDB Management Studio:
1. Open the RavenDB Management Studio.
2. Click the "Create New Database" button.
3. Enter the name of the database you want to create in the "Database Name" field.
4. Click the "Create" button.
Using the RavenDB HTTP API:
1. Send a POST request to the /databases endpoint with the name of the database you want to create in the request body.
Here is an example of how to create a database named "MyDatabase" using the RavenDB HTTP API:
1
2
3
4
5
6
POST http://localhost:8080/databases
Content-Type: application/json
{
"name": "MyDatabase"
}
|
i need to sort by last name
import java.util.Scanner;
import java.util.ArrayList;
import java.util.Scanner;
public class TestStudent
{
public static void main(String[] args)
{
//Course Code
String [] courseNumber = {"MTH151","MTH201","ITF215","ENG101","HIS210","BIO120"};
//Course Name
String [] courseName = {"Statistics","Calculus I","Programming in Java",-"Composition","US History","Biology "};
//Credit
int [] credit = {3,4,4,3,3,4};
ArrayList <Student> student = new ArrayList <Student>();
for(int x = 0; x < 3; ++x)
{
student.add(getInfo(courseNumber,courseName,credit) );
}
System.out.println("-------------------------------------");
display(student);
}
public static Student getInfo(String[] courseNum,String[] courseName,int[] credit)
{
Scanner scan = new Scanner(System.in);
System.out.print("\nFirst Name: ");
String firstName = scan.next();
System.out.print("Last Name: ");
String lastName = scan.next();
System.out.print("Corse Number: ");
String corseNumber = scan.next();
String fullName = (lastName + ", " + firstName);
int result = -1;
do{
result = searchCourseNumber(courseNum,corseNumber);
if(result == -1)
{
System.out.print("Invalid Corse Number");
System.out.print("Corse Number: ");
corseNumber = scan.next();
}
}while(result == -1);
return new Student(fullName,courseName[result], courseNum[result],credit[result]);
}
public static int searchCourseNumber(String[] classes, String key)
{
for(int i = 0; i < classes.length; i++)
if(key.compareTo(classes[i]) == 0)
return i;
return -1;
}
public static void sortThePersonnel(ArrayList <Student> stu)
{
}
public static void display(ArrayList <Student> stu)
{
for(Student temp: stu)
System.out.println(temp.toString());
}
}
class Student
{
//Static Variable
int costPerHour = 105;
//Instance Variables
private String name;
private String courseTitle;
private String courseNumber;
private double courseFee;
//Default Constructor
public Student()
{
}
//Constructor
public Student(String studentName,String CTitle,String CNumber,double CFee)
{
name = studentName;
courseTitle = CTitle;
courseNumber = CNumber;
courseFee = CFee*costPerHour;
}
//Getters
public String getName()
{
return name;
}
public String getCourseTitle()
{
return courseTitle;
}
public String getCourseNumber()
{
return courseNumber;
}
public double getCourseFee()
{
return courseFee;
}
//Setters
public void setName(String StuName)
{
name = StuName;
}
public void setCourseTitle(String title)
{
courseTitle =title;
}
public void setCourseNumber(String number)
{
courseNumber = number;
}
public void setCourseFee(double fee)
{
courseFee = fee;
}
//toString method
public String toString()
{
String print = ("\nName: " + getName() + "\nCourse: " + getCourseTitle() + "\nCourse Number: "
+ getCourseNumber() + "\nCourse Fee: " + getCourseFee());
return print;
}
}
Recommended Answers
All 3 Replies
So what's stopping you? (you haven't asked a question here)
So what's stopping you? (you haven't asked a question here)
i don't know how to sort an arrayList
Do you know how to sort an Array? If so, use ArrayList.toArray, and then sort the Array. You'll have to manually iterate through the array to turn it back into an ArrayList, but that's easy.
You should probably look at the Comparable interface in order to make your Student class sortable.
Be a part of the DaniWeb community
We're a friendly, industry-focused community of developers, IT pros, digital marketers, and technology enthusiasts meeting, learning, and sharing knowledge.
|
Store
Home > Blog > Brain Health > Stress and Mental Health: A Critical Link and 10 Tips to Get It Under Control
Stress and Mental Health: A Critical Link and 10 Tips to Get It Under Control
Getting stressed once in a while is a normal part of everyday life. Your body was built to handle it. But sometimes your stress level can get so out of hand that it takes a big toll on your health, both physical and mental. We usually focus on the physical effects of stress, but in this article, we’ll talk about stress and mental health, which is just as important.
There are different kinds of stress. There’s eustress, which is a healthy kind of stress that you can use to your advantage. Then there’s acute stress, which is short-lived and can be mild or severe. And then there’s chronic stress, which is prolonged and can also be mild or severe.
Generally, your body can handle acute stress quite efficiently. Your “fight or flight” response kicks into gear, speeding up your breathing and heart rate to allow more oxygenated blood to circulate. Your mind becomes more focused and your body gets a burst of energy. But chronic stress, even if mild, can create a lot of problems, including neuropsychiatric ones.
Is This More Than Just Stress?
An image of a man with people around him stressing him outIt’s not always easy to tell the difference between acute and chronic stress. And it’s also not always easy to tell whether your stress has turned into something more problematic.
One way is to check how you’re doing after the stressful situation has been resolved for some time. If you’re still worried and unable to stop thinking about it, then that could be a sign of anxiety. If you’re still sad or down about it, then that could be a sign of depression. Anxiety and depression can both be symptoms of chronic, unresolved stress.
Chronic stress keeps your body in a constant state of reaction, such as the “fight or flight” response. This makes your adrenal glands work extra hard. They have to secrete stress hormones, like cortisol, to deal with this continuous stress. At some point, they become exhausted and their cortisol output drops.
These are the stages of Adrenal Fatigue Syndrome (AFS), and they can easily lead to physical and mental health issues. And, unfortunately, if AFS progresses beyond a certain point, even if you've resolved the original stress, the symptoms are likely to persist.
Your Global Stress Response and Mental Health
Symptoms of AFS include fatigue, weight gain, fertility issues, lowered immunity, heart palpitations, hypoglycemia, food and drug sensitivities, blood pressure instability, dry skin, and hair loss. But they also extend to your brain and nervous system, with symptoms like brain fog, anxiety, mild depression, sleep problems, and an inability to handle stress.
The reason that the symptoms can be so varied is because your adrenals are one component of your body’s global stress response: the NeuroEndoMetabolic (NEM) Stress Response.
Your NEM is a network of organs and systems that work together to fight stress. They are arranged into six circuits: the Hormone, the Bioenergetics, the Cardionomic, the Neuroaffect, the Inflammation, and the Detoxification circuits. Your adrenals are part of the Hormone and Cardionomic circuits. All stressors activate your NEM, but depending on which circuit is more affected, you’ll get a different symptom picture.
When our clients are dealing with mental health issues, we pay special attention to the Neuroaffect Circuit to see what’s going on there. This circuit is composed of the brain, the autonomic nervous system (ANS), and the microbiome. Each of these components is affected by stress in a slightly different way.
How Your ANS Handles Stress
The ANS is the part of your nervous system that is automatic and works without your conscious control. It has different components as well, such as branches of the sympathetic nervous system (SNS), the parasympathetic nervous system (PNS), and the adrenomedullary hormonal system (AHS).
If your stress is mild, the SNS can handle it alone. Your “fight or flight” response is triggered by the SNS using norepinephrine, which is the neurotransmitter used for less severe stress. But if it starts to get more severe, your AHS kicks in to help and triggers the release of adrenaline, a much more powerful neurotransmitter. Then, once the stress is dealt with, the PNS brings your body back to a state of rest and repair.
An image of a man with his head down on a table with a help signThis is what happens with acute stress. But with chronic stress, your AHS has to keep triggering the release of adrenaline, which puts pressure on your adrenals to produce more cortisol to counter its effects. But when your adrenals weaken, then adrenaline levels shoot through the roof with no opposing hormones to bring them back down.
This is where stress and mental health can really take a hit – anxiety turns into panic attacks and a sense of doom, sleep problems turn into full-blown biological clock dysregulation, and your body goes into a “wired and tired” state where you can’t rest and you can’t function either.
Your Brain On Stress
If your brain is exposed to stress hormones for extended periods of time, it can change not only in function, but also in structure.
Functionally, elevated stress hormone levels can start to affect the areas of the brain that help with emotional regulation as well as cognitive abilities. You might find yourself having strange or disproportionate emotional reactions. You might also have distorted or inaccurate perceptions of the world, which can result in difficulties in your work, relationships, and day to day activities.
Structural risks include getting a stroke from the changes in blood pressure that come with AFS. Also, the loss of grey matter can reduce the size of the medial prefrontal cortex. An increase in white matter can happen as well, which makes it more difficult for neurons to make connections with each other. Myelin in the hippocampus may also increase, which can lead to learning difficulties.
How Your Gut Affects Your Brain
You may have been surprised to see the microbiome as the third component of the Neuroaffect Circuit, which is supposed to be all about the nervous system. But the gut-brain connection is becoming more well-researched these days, and you may have heard about how important gut health is to stress and mental health.
The microbiome is the collection of microorganisms that live in your body. More specifically, we're referring mostly to those in your digestive tract. Many neurotransmitters are made in the gut, and if your microbiome is not in good shape, you can start to see an imbalance of those. Also, chronic inflammation almost always begins in the gut, and then travels to different areas of the body, such as the brain, causing problems there.
Stress can cause your microbiome to go out of balance – a state called dysbiosis. This can then lead to leaky gut, where your gut lining becomes more permeable and allows substances into your bloodstream that shouldn’t be there. That’s actually one of the main causes of chronic inflammation. Another problem is that overgrowth of bacteria can happen in your small intestine, a condition called SIBO, which can cause problems with your digestion. And, finally, slowed gut motility is another possible issue, which can also disrupt digestion and even cause malabsorption of nutrients.
Dealing With Stress and Mental Health Issues: Making a Plan
If you’re suffering from stress and mental health problems, there are several things you can do about it.
The first and most important step is to seek professional support. This includes both mental health specialists and chronic stress experts. The latter should be well-versed in adrenal fatigue and NEM dysregulation, as resolving those can go a long way in improving your mental health.
Together with your healthcare professionals, you will devise a recovery plan that takes into account the following:
• Your medical history
• What caused the stress and mental health issues in the first place
• Your lifestyle
• Any current health conditions
• Your limitations, time-wise and money-wise, for example
• What your goals are
Each individual is different, so it’s vital to avoid a one-size-fits-all approach. But, having said that, there are a few tips to consider when creating your recovery plan.
10 Tips to Reduce Stress and Mental Health Problems
An image of spices and jars of fermented foodsThe following are our top 10 tips to help you rebalance your Neuroaffect Circuit, recover from adrenal fatigue, and get your stress and mental health back on track. Remember, these should all be adapted to your specific situation and should only be done with the supervision of a qualified health professional.
#1 – Rebalance Your Microbiome
Plan for a microbiome-supporting diet. This means eating a probiotic and prebiotic rich diet that includes things like fiber, fermented foods, and gut-sealing bone broth. Some examples of fermented foods include kimchi, sauerkraut, yogurt, and kefir. You can also add a probiotic supplement to help with this.
#2 – Strengthen Your Adrenals
Eat an adrenal fatigue diet. This diet is composed of specific ratios of macronutrients and food groups that are optimal for adrenal fatigue recovery. It’s also nutrient-dense to help restore any depleted nutrient and energy stores.
#3 – Balance Your Blood Sugar Levels
Eat smaller meals every 3-4 hours. This helps keep your blood sugar levels stable throughout the day. Hypoglycemia is a symptom of AFS, and it’s also an anxiety trigger.
#4 - Take Gentle Supplements
Some supplements will help to fill in any nutritional gaps left over by your diet, such as vitamins and minerals. Others can help your body adapt to stress, such as ashwagandha and rhodiola. And some can help your body fight oxidative stress, such as ubiquinol and glutathione. Talk these over with your doctor before starting though, as some can backfire and lead to unexpected reactions, especially if you have AFS.
#5 - Try Herbal Home Remedies
For example, chamomile tea can be good for sleep. Lavender essential oil in your bath can help you relax. And herbal remedies, such as St. John’s Wort can help with depression symptoms.
#6 - Do Gentle Forms of Exercise
Adrenal breathing exercises and adrenal yoga exercises are good options for those with AFS. If you have more advanced adrenal fatigue, you may want to wait until you’re a little stronger before doing any kind of physical activity, as vigorous exercise can add stress to the body and worsen severe AFS. If your AFS is mild though, gentle exercise like walking or yoga is often safe.
#7 - Spend Time In Nature
You may have heard about forest bathing. But even a simple walk in the park is good. Even better if you can do it barefoot to get some grounding/earthing benefits.
#8 – Get Good Sleep
Sleep is fundamental. But it’s even more crucial to get good sleep during recovery. Good sleep hygiene practices can really help. These include putting away screens two hours before bed, keeping your room cool and dark, and eating a light snack before sleep to avoid middle-of-the-night hypoglycemia. Melatonin supplements can also help if you need something extra.
#9 – Use Stress Management Techniques
Mindfulness meditation can be quite useful, as can journaling, support groups, and gratitude practice. You should also do your best to remove the source of the stress, or at least reduce it. This often means making a plan and asking for help. For example, if it’s an overwhelm of chores at home, delegate some of tasks or make peace with having a less organized house. If it’s financial trouble, make a debt or savings plan with a trusted friend or family member’s help.
#10 – Lower Your Expectations
Don't be discouraged if you don't feel better right away. It may have taken years for all the stress to accumulate that is causing your mental health issues now. Some people also live with adrenal fatigue for years before their symptoms become obvious. So give yourself the time and grace to go slowly. There will be ups and downs, and it may not be easy. But, hopefully, with the help of an experienced healthcare professional, you will get there.
In Conclusion
An image of a woman screaming into two phonesStress and mental health are intricately linked. Although occasional stress here and there is normal, if you feel that it has become a feature in your life, this is cause for concern. It could lead to anxiety, depression, AFS, Neuroaffect dysregulation, and other health problems. But even if you’re already battling these issues, there are ways out.
If you have questions about whether your stress is causing such problems, or you’re worried about Neuroaffect circuit dysfunction, AFS, or mental health issues, you can call us for a free initial consultation to understand our approach to recovery.
Sleep Better, Protect Your Brain: Try Melatonin Today!
Buy Now
© Copyright 2022 Michael Lam, M.D. All Rights Reserved.
Dr. Lam’s Key Question
Stress and mental health are linked, and in some cases, they can spiral out of control. Your autonomic nervous system, brain, and gut are all involved. And knowing how your body and brain react to stress, and what to do about it, can help you avoid or recover from anxiety, depression, and sleep problems.
Dr. Lam Coaching is rated 4.7 / 5 average from 70+ reviews on Google
userphone-handsetmap-markermagnifiercrossmenu
|
High harmonic generation
From Wikipedia, the free encyclopedia
(Redirected from High Harmonic Generation)
Jump to: navigation, search
High harmonic generation (HHG)is a non-linear process during which a target (gas, plasma or solid sample) is illuminated by an intense laser pulse. Under such conditions, the sample will emit the high harmonics of the generation beam (above the fifth harmonics). Due to the coherent nature of the process, high harmonics generation is a prerequisite of attophysics.
Perturbative harmonic generation[edit]
Perturbative harmonic generation is a process whereby laser light of frequency ω and photon energy ħω can be used to generate new frequencies of light. The newly generated frequencies are integer multiples of the original light's frequency. This process was first discovered in 1961 by Franken et al.,[1] using a ruby laser, with crystalline quartz as the nonlinear medium.
Harmonic generation in dielectric solids is well understood and extensively used in modern laser physics (see second harmonic generation). In 1967 New et al. observed the first third harmonic generation in a gas.[2] In monatomic gases it is only possible to produce odd numbered harmonics for reasons of symmetry. Harmonic generation in the perturbative (weak field) regime is characterised by rapidly decreasing efficiency with increasing harmonic order.[3] This behaviour can be understood by considering an atom absorbing n photons then emitting a single high energy photon. The probability of absorbing n photons decreases as n increases, explaining the rapid decrease in the initial harmonic intensities. Nevertheless, harmonics up to the 11th order have been observed under these conditions.
Development[edit]
The first high harmonic generation was observed in 1977 in interaction of intense CO2 laser pulses with plasma generated from solid targets.[4] HHG in gases, far more widespread in application today, was first observed by McPherson and colleagues in 1987,[5] and later by Ferray et al. in 1988,[6] with surprising results: the high harmonics were found to decrease in intensity at low orders, as expected, but then were observed to form a plateau, with the intensity of the harmonics remaining approximately constant over many orders.[7] Plateau harmonics spanning hundreds of eV have been measured which extend into the soft x-ray regime.[8] This plateau ends abruptly at a position called the high harmonic cut-off.
Properties[edit]
High harmonics have a number of interesting properties. They are a tunable table-top source of XUV/Soft X-rays, synchronised with the driving laser and produced with the same repetition rate. The harmonic cut-off varies linearly with increasing laser intensity up until the saturation intensity Isat where harmonic generation stops.[9] The saturation intensity can be increased by changing the atomic species to lighter noble gases but these have a lower conversion efficiency so there is a balance to be found depending on the photon energies required.
High harmonic generation strongly depends on the driving laser field and as a result the harmonics have similar temporal and spatial coherence properties.[10] High harmonics are often generated with pulse durations shorter than that of the driving laser. This is due to phase matching and ionization. Often harmonics are only produced in a very small temporal window when the phase matching condition is met. Depletion of the generating media due to ionization also means that harmonic generation is mainly confined to the leading edge of the driving pulse.[11]
High harmonics are emitted co-linearly with the driving laser and can have a very tight angular confinement, sometimes with less divergence than that of the fundamental field and near Gaussian beam profiles.[12]
Semi-classical approach[edit]
The maximum photon energy producible with high harmonic generation is given by the cut-off of the harmonic plateau. This can be calculated classically by examining the maximum energy the ionized electron can gain in the electric field of the laser. The cut-off energy is given by,[13]
E_{max}=I_p+3.17U_p
where Up is the ponderomotive energy from the laser field and Ip is the ionization potential.
This derivation of the cut-off energy is derived from a semi-classical calculation. The electron is initially treated quantum mechanically as it tunnel ionizes from the parent atom, but then its subsequent dynamics are treated classically. The electron is assumed to be born into the vacuum with zero initial velocity, and to be subsequently accelerated by the laser beam's electric field.
Illustration of the semi-classical three-step model of HHG.
The three-step model.
Half an optical cycle after ionization, the electron will reverse direction as the electric field changes, and will accelerate back towards the parent nucleus. Upon returning to the parent nucleus it can then emit bremsstrahlung-like radiation during a recombination process with the atom as it returns to its ground state. This description has become known as the recollisional model of high harmonic generation .[14]
Electron return energy (full blue curve), and excursion time (blue dashed curve), as a function of the return time.
Since the frequency of the emitted radiation depends on both the kinetic energy and on the ionization potential, the different frequencies are emitted at different recombination time (i.e. the emitted pulse is chirped). What is more, for every frequency, there are two corresponding recombination times. We refer to these two trajectories as the short trajectory (which are emitted first), and the long trajectory.
Some interesting limits on the HHG process which are explained by this model show that HHG will only occur if the driving laser field is linearly polarised. Ellipticity on the laser beam causes the returning electron to miss the parent nucleus. Quantum mechanically, the overlap of the returning electron wavepacket with the nuclear wavepacket is reduced. This has been observed experimentally, where the intensity of harmonics decreases rapidly with increasing ellipticity.[15] Another effect which limits the intensity of the driving laser is the Lorentz force. At intensities above 1016 Wcm−2 the magnetic component of the laser pulse, which is ignored in weak field optics, can become strong enough to deflect the returning electron. This will cause it to 'miss' the parent nucleus and hence prevent HHG.
Phase matching[edit]
As in every nonlinear process, Phase matching plays an important role in High Harmonics Generation in gas phase. The four causes of wave vector mismatch are: neutral dispersion, plasma dispersion, Gouy phase, and dipole phase.[16]
The neutral dispersion is caused by the atoms while the plasma dispersion is due to the ions, and the two have opposite signs. The Gouy phase is due to wavefront phase jump close to the focus, and varies along it. Finally the dipole phase arise from the atomic response in the HHG process.[17] The optimal conditions for generating high harmonics emitted from short trajectories are obtained when the generating gas is located after the focus. Generation of high harmonics from long trajectory can be obtained off-axis when the generating gas is located before the focus.
See also[edit]
References[edit]
1. ^ P. A. Franken, A. E. Hill, C. W. Peters, and G. Weinreich, Phys. Rev. Lett. 7, 118 (1961).
2. ^ New, G. H. C.; Ward, J. F. (1967). "Optical Third-Harmonic Generation in Gases". Phys. Rev. Lett. 19: 556–559. doi:10.1103/physrevlett.19.556.
3. ^ J. Wildenauer, Journal of Applied Physics 62, 41 (1987).
4. ^ Burnett, N. H. et al. (1977). "Harmonic generation in CO2 laser target interaction". Appl. Phys. Lett. 31: 172–174. doi:10.1063/1.89628.
5. ^ McPherson, A. et al. (1987). "Studies of multiphoton production of vacuum-ultraviolet radiation in the rare gases". JOSA B 4: 595. doi:10.1364/JOSAB.4.000595.
6. ^ Ferray, M. et al. (1988). "Multiple-harmonic conversion of 1064 nm radiation in rare gases". Journal of Physics B-Atomic Molecular and Optical Physics 21: L31. doi:10.1088/0953-4075/21/3/001.
7. ^ Li, X. F.; L'Huillier, A.; Ferray, M.; Lompre, L. A.; Mainfray, G. (1989). "Multiple-harmonic generation in rare gases at high laser intensity". Physical Review A 39: 5751–5761. doi:10.1103/physreva.39.5751.
8. ^ Seres, J. et al. (2005). "Laser technology: Source of coherent kiloelectronvolt X-rays". Nature 433: 596. doi:10.1038/433596a.
9. ^ Brabec, T.; Krausz, F. (2000). "Intense few-cycle laser fields: Frontiers of nonlinear optics". Reviews of Modern Physics 72: 545–591. doi:10.1103/revmodphys.72.545.
10. ^ L'Huillier, A.; Schafer, K. J.; Kulander, K. C. (1991). "Theoretical aspects of intense field harmonic generation". Journal of Physics B Atomic Molecular and Optical Physics 24: 3315–3341. doi:10.1088/0953-4075/24/15/004.
11. ^ Schafer, K. J.; Kulander, K. C. (1997). "High Harmonic Generation from Ultrafast Pump Lasers". Physical Review Letters 78: 638–641. doi:10.1103/physrevlett.78.638.
12. ^ Tisch, J. W. G. et al. (1994). "Angularly resolved high-order harmonic generation in helium". Physical Review A 49: R28. doi:10.1103/physreva.49.r28.
13. ^ Krause, Jeffrey L.; Schafer, Kenneth J.; Kulander, Kenneth C. "High-order harmonic generation from atoms and ions in the high intensity regime". Physical Review Letters 68: 3535–3538. Bibcode:1992PhRvL..68.3535K. doi:10.1103/PhysRevLett.68.3535.
14. ^ Corkum, P. B. (1993). "Plasma perspective on strong field multiphoton ionization". Physical Review Letters 71: 1994–1997. doi:10.1103/physrevlett.71.1994.
15. ^ Dietrich, P.; Burnett, N. H.; Ivanov, M.; Corkum, P. B. (1994). "High-harmonic generation and correlated two-electron multiphoton ionization with elliptically polarized light". Physical Review A 50: R3585. doi:10.1103/physreva.50.r3585.
16. ^ Pascal, Salieres; L'Huillier, Anne; Lewenstein, Maciej (1995). "Coherence control of high-order harmonics". Physical review letters 74 (19): 3776–3779. doi:10.1103/physrevlett.74.3776.
17. ^ Lewenstein, Maciej; Salieres, Pascal; L’huillier, Anne (1995). "Phase of the atomic polarization in high-order harmonic generation". Physical Review A 52 (6): 4747–4754. doi:10.1103/physreva.52.4747.
|
1
I changed phones and installed WhatsApp on the new one. I have a backup database file on an SD card and the same file copied to the internal WhatsApp folder and Google Drive. However, during install, the restore process only checks in G Drive and says that no backup is available.
How do I restore the data from this backup file from the internal memory or SD card? There is no corresponding option during backup restore.
Adding a few points based on other QnA I went through. Hope they help.
1. The phone number has not changed. I am using the same number on the new phone as earlier.
2. I have copied the backup database file from the SD card to the internal memory and also to the G Drive
3. The backup file is named "msgstore.db.crypt12" It does not have the date in the name.
1
0
I had problems with this too, and today finally it worked. Unfortunately I'm not sure which of the following additional steps did the trick, but maybe it helps others:
1. I copied the entire WhatsApp folder over from the old phone to the new one (zipped it using Total Commander, copied it to a PC via USB, copied it to the new phone also via USB, unzipped it also using Total Commander).
2. After installing WhatsApp, I gave the app all possible permissions before running it: under Settings/Apps, select WhatsApp, tap Permissions, and then select all permissions listed under "denied" and tap "allow" (you can revoke the permissions again after the backup is succesfully restored).
After doing this, running WhatsApp and confirming my phone number, I was finally prompted to restore the local backup. Before that, WhatsApp asked me for some permissions and then asked me to select a Google Drive backup (which I hadn't done), when I selected "skip" at this step it apparently also skipped the local backup.
Your Answer
By clicking “Post Your Answer”, you agree to our terms of service, privacy policy and cookie policy
Not the answer you're looking for? Browse other questions tagged or ask your own question.
|
How Our Gut Bacteria Affect Our Health
How Our Gut Bacteria Affect Our Health - Nutrova
Our body is full of bacteria.
Did that instantly conjure images of disease and illness? If so, you’ll be relieved to know that there’s a lot more to the microorganisms than that. In fact, the bacteria that live in us, especially our good gut bacteria, can actually play an immensely helpful role in our health.
In this article, we’ll explore how our gut bacteria affect our health, along with what we can do to use that to our advantage.
Let’s start with:
Bacteria’s Role in Our Gut
Our Gastrointestinal Tract (GIT) performs some crucial functions like providing the whole body with nutrients, after breaking down the food we eat. It also prevents harmful substances from being absorbed, while getting rid of the body’s waste [1].
We have over 100 trillion bacteria – of about 1000 different types – in the GIT [2].
It’s well known that these bacteria help our GIT in going about its tasks. In fact, their contribution is so significant that, today, the microbes in the lower GIT (the “gut”) are being referred to as an organ in themselves, because of their own distinctive and unique metabolic purposes [3, 4].
Gut Bacteria - Nutrova
All of these stem from their fundamental function: fermenting dietary fibre that hasn’t been digested. This goes on to have several consequential effects in the body [5]:
• The fermentation provides energy to both the bacteria and the body, resulting in less food being required by the body.
• It creates a substance called ‘butyrate’, which prevents diseases of the digestive tract (like ulcerative colitis, Crohn’s disease, irritable bowel syndrome, and even cancer).
Apart from this, our gut bacteria also help us in other ways:
• Our gut bacteria may increase the bioavailability of folic acid, B12, and iron, and also produce vitamin K and some B-vitamins [6, 7].
• They influence how quickly waste is excreted from the body [8, 9].
• They improve the quality and increase the quantity of the bile produced by our liver (bile is the substance that digests fats) [10]. Since cholesterol gets used up in the making of bile, increasing the quantity of bile also reduces our blood cholesterol [11, 12].
This isn’t it, though. These bacteria, amazingly, go on to do even more.
The Roles of Good Bacteria Beyond the Gut
This is probably the most interesting part of probiotics: scientists believe that our immunity, skin, obesity and even mental state are all affected by the population of bacteria in our gut.
Here’s how:
1. Immunity
How our gut bacteria affects our health
We all eat both “good” and “bad” food. The bad can often come with invading microorganisms, which are first met by our GIT.
This makes the GIT our first line of defence against potential harmful microbes. The gut bacteria that live there stop harmful microbes from sticking to the lining of the GIT, and also, prevent toxins and other substances (that came with the food) from passing into our blood [12, 13, 14].
Interestingly, this process starts from the moment a baby is born. The bacteria from the mother’s birth canal are transferred to her child. Since they control what kind of bacteria can enter the child’s body, the mother’s gut bacteria indirectly determine how the baby’s immune system develops and adapts. This affects the kind of infections they get and even play a role in allergies [15, 16]. (Today, many baby formula brands are probiotic-enriched, to speed up the development of the gut bacteria in formula-fed babies) [16].
There’s a constant interaction between our immune system and the GIT bacteria throughout our life, via many processes. What’s startling is that our immune system – which we think is designed to control microorganisms – may in fact be controlled by microorganisms [15, 17], It’s simply a battle between the good and bad species of bacteria.
2. Skin Health
Healthy Skin and how to achieve them - Nutrova
You must have heard that we even have bacteria living on our skin. These help the skin by maintaining its health and healing wounds.
Even the bacteria in our gut can affect our skin, since they prevent toxins from passing into our bloodstream. When there are fewer numbers of these good bacteria, toxins are able to enter the bloodstream and reach other parts of the body, causing inflammation which can result in skin issues like dermatitis and acne [18].
3. Mental Health
Mental Health - Nutrova
Increasingly, research has indicated that our gut ‘microbiota’ (the overall composition of the microorganisms in our gut) can help regulate our brain function through something called the “gut-brain axis” [19].
This axis refers to the fact that our brain and our gut have a strong connection that works both ways. They send signals to one another, which can directly affect their functioning [20, 21]. For example, the mere thought of eating can lead to our stomach releasing gastric juices even before any food enters the system [22].
It’s no wonder that ‘dysbiosis’ (when the diversity of this composition gets compromised) and inflammation of the gut have been linked to several mental illnesses, including anxiety and depression, which are prevalent in society today [23].
Recent research suggests that these could be treated by regulating our intestinal microbiota (through measures like consuming probiotics).
4. Obesity
Indicators of Good Health and how to achieve them - Nutrova
The scientific community has known for many years now that, because of the substances they produce, our gut bacteria can affect our feeding behaviour [24]. What has only recently been discovered, however, is just how much they also affect obesity.
90% of our gut microbiome consists of two kinds of bacteria - Bacteroidetes and Firmicutes [25]. Many studies have noted that the ratio of the Firmicutes bacteria is higher in obese subjects, suggesting that they could be associated with a higher incidence of obesity [26, 27]. To add to that, previous studies have also shown correlations between weight loss and an increased amount of Bacteroidetes in stools [28, 29] making the association between these gut bacteria and weight even stronger [30].
A study even showed that when an obese person’s gut bacteria was transferred into the gut of a lean mouse, the mouse ended up gaining weight - suggesting that our gut bacteria could affect our ability to gain weight in the first place (further human studies would be needed before these results can be confirmed) [31].
Obesity is also a result of many processes gone wrong – right from the way our body uses glucose, to the way calories are burned during any activity. This makes it closely connected to other conditions like inflammation, type-II diabetes, and metabolic syndrome. The crosstalk between the gut bacteria and organs like our liver, fat tissue, muscles, and the brain can play a crucial role in harmonising these processes [32, 33].
Since this discovery, probiotics have garnered a lot of attention when it comes to beating obesity, and improving overall health (including gut health, of course) [34, 35].
You can read further on this subject and learn about a list of foods that can boost this inner ecosystem, for all the benefits of a healthy gut, right here. And if you have any questions about the article or would like to dig deeper into any aspect of it, drop a comment below! We’d love to hear from you. :)
Leave a comment
Please note, comments must be approved before they are published
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
|
x
What Is Morbid Depression?
By Keith Vaughn ; Updated July 27, 2017
In medical terms, morbidity refers to a condition or state of being diseased. Morbid depression refers to an evident, existing depressive disorder.
Types
According to the National Institute of Mental Health (NIMH), the most common types of depressive disorder are major depressive disorder and dysthymic disorder. Other types of depressive disorder include psychotic depression, postpartum depression, and seasonal affective disorder.
Cause
According to the NIMH, the cause of depression is unclear, though a combination of factors such as genetics, biochemistry, and environment may contribute to depression.
Symptoms
Symptoms of depression may include a sad or anxious mood, hopelessness, lack of interest in pleasurable activities, fatigue, difficulty concentrating, changes in eating and sleeping habits, and suicide ideation or attempts. Those with depression may also experience chronic pain that is resistant to treatment.
Co-Morbidity
When illnesses co-exist they are considered to be co-morbid. According to the NIMH, depression can be accompanied by co-morbid anxiety disorders including post-traumatic stress disorder, panic disorder, obsessive compulsive disorder and social phobia.
Treatment
Antidepressant medication, such as Prozac and Zoloft, may treat depressive symptoms. Psychotherapy, such as cognitive-behavioral therapy and interpersonal therapy, may also help treat depression.
Considerations
Stimulants, anti-anxiety drugs, and other medications may be prescribed with antidepressants in cases of co-morbid mental or physical disorders.
Video of the Day
Brought to you by LIVESTRONG
Brought to you by LIVESTRONG
More Related Articles
Related Articles
|
05
Aug
How to Use a Foam Roller
FacebookTwitterGoogle+Share
Feeling sore after a good workout at the gym? That’s great! Thinking of taking tomorrow off so that you can recover? No need. Keep up the momentum in your workout program by pushing yourself to go back every day, regardless of how tired or sore you feel when finally getting into bed. The secret to making this happen is to invest a little bit of time and energy into restorative therapies, like foam rollers.
What is a foam roller?
The foam roller is a very simple spherical device. About two feet long and usually between 6-10 inches in diameter, the foam roller is designed to help ease the tension in your sore muscles by helping to massage muscles and tendons in targeted movements after a strong workout. Foam rollers are great for soreness in the back, legs, and shoulders, and is recommended for those who are feeling soreness after a big workout at the gym, as well as soreness associated with sitting for long hours in a desk chair or following a long commute.
Here is how to get started with a foam roller:
• Start by laying the foam roller on the floor. You need to choose a flat and smooth surface (not the grass!). If possible, lay a yoga mat on the floor and use the foam roller on top of the exercise mat.
• Lay with your back on the foam roller, positioning the roller just underneath your hips. Your feet should be flat on the ground and your arms at your sides.
• Carefully move your body up and down along the mat so that the roller massages the muscles in your back and legs as you move. Repeat the motion up and down as many times as you can.
The best time to use a foam roller is soon after your workout, while your muscles are still warm. You can also try this before going to bed or when you wake up in the morning, especially after taking a shower. Keep in mind that while the roller is going to massage your muscles, your movements should be gentle.
The foam roller is a great tool for easing back pain from stiffness associated with long periods of sitting, as well as tired muscles from working out. If you are experiencing back pain associated with an injury then you ought to consult with your doctor before trying a foam roller.
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.