Search is not available for this dataset
text
stringlengths 7
7.7M
|
---|
[Meckel's diverticulum and obstruction of the small intestine in adult patients: report of two cases].
Meckel's Diverticulum (MD) is the most frequent congenital anomaly of the ileum. However, its clinical manifestations in adult patients are rare. In this paper, we report cases with two different mechanisms of small intestine obstruction due to MD and we discuss diagnosis and management of these symptomatic lesions in adult patients. |
Q:
Python 3, for a in list and a in word:
How would I write the following?
a='somelongword'
for r in a_list and for r in a:
if r==x: new_list.append(r)
else: return 1
Obviously, the above for statement isn't correct. How can I rewrite it?
I'm sorry, I tried to make it easier to read!
I want to check, from a list of letters, say a_list, if any of those letters are also in the word a.
At the moment, my code checks this:
for r in reveal_word(a):
if r==guess: new_list.append(r)
else: new_list.append('*')
So, for some letter in the word a, if r is equal to some guessed letter, then append that letter to a list. Otherwise, when that letter is not equal to that guessed letter, append asterisks to the new list.
It's for a piece of code for hangman.
So, I want it to cycle through a list of guessed letters, check if the 'secret' word contains any of those letters and if it does, add them to a new list and where it doesn't contain those letters, add asterisks.
I'll then add this to a dictionary object of key 'guessed_word' or something...
A:
Assuming this is what you want
>>> word ='somelongword'
>>> guesses = ['a', 'd', 'm', 'e', 's']
>>> [c if c in guesses else '*' for c in word]
['s', '*', 'm', 'e', '*', '*', '*', '*', '*', '*', '*', 'd']
Printed as a string
>>> print(''.join([c if c in guesses else '*' for c in word]))
s*me*******d
That looks like what you would want for hangman.
|
var oauthModule = require('./oauth')
, OAuth = require('oauth').OAuth;
var yahoo = module.exports =
oauthModule.submodule('yahoo')
.definit( function () {
var oauth = this.oauth = new OAuth(
this.oauthHost() + this.requestTokenPath()
, this.oauthHost() + this.accessTokenPath()
, this.consumerKey()
, this.consumerSecret()
, '1.0', null, 'HMAC-SHA1');
})
.apiHost('http://social.yahooapis.com/v1')
.oauthHost('https://api.login.yahoo.com/oauth/v2')
.requestTokenPath('/get_request_token')
.accessTokenPath('/get_token')
.authorizePath('/request_auth')
.entryPath('/auth/yahoo')
.callbackPath('/auth/yahoo/callback')
.fetchOAuthUser( function (accessToken, accessTokenSecret, params) {
var promise = this.Promise();
this.oauth.get(this.apiHost() + '/user/' + params.xoauth_yahoo_guid + '/profile?format=json', accessToken, accessTokenSecret, function (err, data) {
if (err) return promise.fail(err);
var oauthUser = JSON.parse(data).profile;
promise.fulfill(oauthUser);
});
return promise;
});
|
Q:
Reorder not working in ggplot with my current data frame
I'm currently trying to make my own graphical timeline like the one at the bottom of this page. I scraped the table from that link using the rvest package and cleaned it up.
Here is my code:
library(tidyverse)
library(rvest)
library(ggthemes)
library(lubridate)
URL <- "https://en.wikipedia.org/wiki/List_of_Justices_of_the_Supreme_Court_of_the_United_States"
justices <- URL %>%
read_html %>%
html_node("table.wikitable") %>%
html_table(fill = TRUE) %>%
data.frame()
# Removes weird row at bottom of the table
n <- nrow(justices)
justices <- justices[1:(n - 1), ]
# Separating the information I want
justices <- justices %>%
separate(Justice.2, into = c("name","year"), sep = "\\(") %>%
separate(Tenure, into = c("start", "end"), sep = "\n–") %>%
separate(end, into = c("end", "reason"), sep = "\\(") %>%
select(name, start, end)
# Removes wikipedia tags in start column
justices$start <- gsub('\\[e\\]$|\\[m\\]|\\[j\\]$$','', justices$start)
justices$start <- mdy(justices$start)
# This will replace incumbencies with NA
justices$end <- mdy(justices$end)
# Incumbent judges are still around!
justices[is.na(justices)] <- today()
justices$start = as.Date(justices$start, format = "%m/%d%/Y")
justices$end = as.Date(justices$end, format = "%m/%d%/Y")
justices %>%
ggplot(aes(reorder(x = name, X = start))) +
geom_segment(aes(xend = name,
yend = start,
y = end)) +
coord_flip() +
scale_y_date(date_breaks = "20 years", date_labels = "%Y") +
theme(axis.title = element_blank()) +
theme_fivethirtyeight() +
NULL
This is the output from ggplot (I'm not worried about aesthetics yet I know it looks terrible!):
The goal for this plot is to order the judges chronologically from their start date, so the judge with the oldest start date should be at the bottom while the judge with the most recent should be at the top. As you can see, There are multiple instances where this rule is broken.
Instead of sorting chronologically, it simply lists the judges as the order they appear in the data frame, which is also the order Wikipedia has it in.
Therefore, a line segment above another segment should always start further right than the one below it
My understanding of reorder is that it will take the X = start from geom_segment and sort that and list the names in that order.
The only help I could find to this problem is to factor the dates and then order them that way, however I get the error
Error: Invalid input: date_trans works with objects of class Date only.
Thank you for your help!
A:
You can make the name column a factor and use forcats::fct_reorder to reorder names based on start date. fct_reorder can take a function that's used for ordering start; you can use min() to order by the earliest start date for each justice. That way, judges with multiple start dates will be sorted according to the earliest one. Only a two line change: add a mutate at the beginning of the pipe, and remove the reorder inside aes.
justices %>%
mutate(name = as.factor(name) %>% fct_reorder(start, min)) %>%
ggplot(aes(x = name)) +
geom_segment(aes(xend = name,
yend = start,
y = end)) +
coord_flip() +
scale_y_date(date_breaks = "20 years", date_labels = "%Y") +
theme(axis.title = element_blank()) +
theme_fivethirtyeight()
Created on 2018-06-29 by the reprex package (v0.2.0).
|
Q:
US extradition or domestic prosecution of US based foreign cyber crime?
I’m a cybersecurity professional familiar with the extradition of foreign cyber criminals to the US. But what if the situation were flipped? Given the following scenario what would likely happen?
US citizen on US soil
Perpetrates cyber crimes with effects in foreign countries which do not have extradition treaties with the US
Commits no acts of “cybercrime or intellectual property crime against the interests of the United States or the citizens of the United States” (6 U.S. Code § 1531)
What is the likely legal recourse against such a person?
Perhaps:
Do nothing?
Would the US view such an action as a prosecutable offense?
Can the US (or does the US) domestically prosecute individuals for crimes against foreigners committed on US soil?
Extradite, with or without a request from that country?
A:
The Computer Fraud and Abuse Act applies to "protected computers", defined amongst other things as:
[...] used in or affecting interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States [...]
The interpretation of "affecting" is very broad. AIUI if a computer sends packets over the Internet, and those packets enter the USA, then the computer has affected foreign commerce or communication of the United States. They don't need to be sent to a computer inside the USA; merely passing through a router on USA territory is sufficient, and it might even be interpreted to include a router owned by a USA company on foreign territory, as that would affect commerce. The size of the effect may be minuscule, but as long as it is not zero the computer that sent the packets is "protected".
In your scenario the foreign computer must have sent packets to the criminal, so it must have affected US communications. Hence the law enforcement authorities would have a case under the CFA. Whether they would pursue that case in practice depends on a bunch of factors, including the amount of harm done, the likely costs of conviction, and probably political factors to do with international legal cooperation.
|
Great Cumbrian Run
The Great Cumbrian Run is an annual half marathon road running event held in Carlisle, Cumbria, United Kingdom.
Dave Cannon finished first in the inaugural Cumbrian Run in 1982 completing the course in 1:05:06 while
Francis Bowen of Kenya holds the race record of 1:03:35 achieved in 2004.
Course
Recent winners
References
External links
Category:Half marathons in the United Kingdom
Category:Recurring sporting events established in 1982
Category:Sport in Cumbria
Category:1982 establishments in England |
Q:
How to scale a texture in webgl?
I have a texture of size 800x600. How do I scale it on a webgl <canvas> at another size and keep the original aspect ratio? Assuming that the drawing buffer and the canvas have the same dimensions.
A:
Given the WebGL only cares about clipsapce coordinates you can just draw a 2 unit quad (-1 to +1) and scale it by the aspect of the canvas vs the aspect of the image.
In other words
const canvasAspect = canvas.clientWidth / canvas.clientHeight;
const imageAspect = image.width / image.height;
let scaleY = 1;
let scaleX = imageAspect / canvasAspect;
Note that you need to decide how you want to fit the image. scaleY= 1 means the image will always fit vertically and horizontally will just be whatever it comes out to.
If you want it to fit horizontally then you need to make scaleX = 1
let scaleX = 1;
let scaleY = canvasAspect / imageAspect;
If you want it to contain then
let scaleY = 1;
let scaleX = imageAspect / canvasAspect;
if (scaleX > 1) {
scaleY = 1 / scaleX;
scaleX = 1;
}
If you want it to cover then
let scaleY = 1;
let scaleX = imageAspect / canvasAspect;
if (scaleX < 1) {
scaleY = 1 / scaleX;
scaleX = 1;
}
let scaleMode = 'fitV';
const gl = document.querySelector("canvas").getContext('webgl');
const vs = `
attribute vec4 position;
uniform mat4 u_matrix;
varying vec2 v_texcoord;
void main() {
gl_Position = u_matrix * position;
v_texcoord = position.xy * .5 + .5; // because we know we're using a -1 + 1 quad
}
`;
const fs = `
precision mediump float;
varying vec2 v_texcoord;
uniform sampler2D u_tex;
void main() {
gl_FragColor = texture2D(u_tex, v_texcoord);
}
`;
let image = { width: 1, height: 1 }; // dummy until loaded
const tex = twgl.createTexture(gl, {
src: 'https://i.imgur.com/TSiyiJv.jpg',
crossOrigin: 'anonymous',
}, (err, tex, img) => {
// called after image as loaded
image = img;
render();
});
const programInfo = twgl.createProgramInfo(gl, [vs, fs]);
const bufferInfo = twgl.createBufferInfoFromArrays(gl, {
position: {
numComponents: 2,
data: [
-1, -1, // tri 1
1, -1,
-1, 1,
-1, 1, // tri 2
1, -1,
1, 1,
],
}
});
function render() {
// this line is not needed if you don't
// care that the canvas drawing buffer size
// matches the canvas display size
twgl.resizeCanvasToDisplaySize(gl.canvas);
gl.viewport(0, 0, gl.canvas.width, gl.canvas.height);
gl.useProgram(programInfo.program);
twgl.setBuffersAndAttributes(gl, programInfo, bufferInfo);
const canvasAspect = gl.canvas.clientWidth / gl.canvas.clientHeight;
const imageAspect = image.width / image.height;
let scaleX;
let scaleY;
switch (scaleMode) {
case 'fitV':
scaleY = 1;
scaleX = imageAspect / canvasAspect;
break;
case 'fitH':
scaleX = 1;
scaleY = canvasAspect / imageAspect;
break;
case 'contain':
scaleY = 1;
scaleX = imageAspect / canvasAspect;
if (scaleX > 1) {
scaleY = 1 / scaleX;
scaleX = 1;
}
break;
case 'cover':
scaleY = 1;
scaleX = imageAspect / canvasAspect;
if (scaleX < 1) {
scaleY = 1 / scaleX;
scaleX = 1;
}
break;
}
twgl.setUniforms(programInfo, {
u_matrix: [
scaleX, 0, 0, 0,
0, -scaleY, 0, 0,
0, 0, 1, 0,
0, 0, 0, 1,
],
});
gl.drawArrays(gl.TRIANGLES, 0, 6);
}
render();
window.addEventListener('resize', render);
document.querySelectorAll('button').forEach((elem) => {
elem.addEventListener('click', setScaleMode);
});
function setScaleMode(e) {
scaleMode = e.target.id;
render();
}
html, body {
margin: 0;
height: 100%;
}
canvas {
width: 100%;
height: 100%;
display: block;
}
.ui {
position: absolute;
left: 0;
top: 0;
}
<script src="https://twgljs.org/dist/4.x/twgl-full.min.js"></script>
<canvas></canvas>
<div class="ui">
<button id="fitV">fit vertical</button>
<button id="fitH">fit horizontal</button>
<button id="contain">contain</button>
<button id="cover">cover</button>
</div>
The code above uses a 4x4 matrix to apply the scale
gl_Position = u_matrix * position;
It could just as easily pass in the scale directly
uniform vec2 scale;
...
gl_Position = vec4(scale * position.xy, 0, 1);
|
Konstantin Zhuravlyov
Konstantin Zhuravlyov (born 13 February 1976) is a Uzbekistani sprinter. He competed in the men's 4 × 100 metres relay at the 2000 Summer Olympics.
References
Category:1976 births
Category:Living people
Category:Athletes (track and field) at the 2000 Summer Olympics
Category:Uzbekistani male sprinters
Category:Olympic athletes of Uzbekistan
Category:Place of birth missing (living people) |
I’m different now, Montgomery said. We [he and Gimenez] joked about it the other day. He didn’t have to block as many balls in the dirt this time. I used to spike a lot of heaters. Gimenez admitted that his shins and knees took a beating that minor league season, but now the lefty throws […] |
Q:
User Current Location Prompt
i am deleting and re-installing the application, it still not prompt the user "Use Current Location Prompt" when they select the "Use current Location" .button
A:
The iPhone caches the location services authorization status. Even if you reinstall the app, it won't prompt you about this. You can reset this (for all apps!) under Settings.app > General > Reset > Reset Location Warnings
|
Q:
My symbols are rendered as ff. Have I ran out of memory?
I have been trying to solve a 4x4 matrix and have done a hell a lot of writing. Now I am near the end and I am not getting the requested output out of the LaTeX compiler.
When I write for example:
\begin{minipage}[t]{\textwidth}
\begin{equation}\label{e50}
R^{-1} = \frac{1}{\left|R\right|} \rm{adj}(R) = \alpha
\end{equation}
\end{minipage}
the last symbol isn't shown as "alpha" but rather as a very weird symbol ff like I show in the picture below:
I get the same weird symbol for any symbol that I put in place of \alpha or even after it. From this point on all of my symbols are typeset as ff.
If I put same source code in my other new document all of my symbols again render as they were supposed to.
Q1: Have I ran out of memory?
Q2: How can I fix this?
A:
You shouldn't be getting ff instead of \alpha. But your input has a bad error anyway: \rm is not a command with an argument, but rather a declaration that extends its influence until the group in which it's been issued ends, in this case up to \end{equation}.
The command \rm must not be used. Forget it, together with \it, \bf and \tt. They are obsolete and, as in your case, can be misunderstood by users.
In place of them use \textrm, \textit, \texttt and the others that you find in any user guide. In math there are \mathrm and some similar commands, but for operator names there's a better way: say
\usepackage{amsmath}
\DeclareMathOperator{\adj}{adj}
in your preamble and then your formula can be input as
\begin{equation}\label{e50}
R^{-1} = \frac{1}{\lvert R\rvert} \adj(R) = \alpha
\end{equation}
The minipage you use is not needed and probably makes vertical spacing awkward. Note also \lvert and \rvert instead of \left| and `\right|.
|
Any UAB employee who handles or offers for transport an Infectious Substance, Category A substance must complete training every two years or if regulations change. This is a Federal requirement per the Hazardous Materials Regulation.
A copy of the completed training certificate must be maintained in the laboratory files and presented to the proper authorities upon request.
Once you pass the assessment for the course, you may go to the My Transcript tab and located the course link. Once you click on the link, you will see another link that brings up your certificate for the course. Choose File, Print to print it.Below you will find reference material and job aids to assist you in shipping Infectious Substances, Category A. After completing the course, feel free to return here and print any of the material you find useful. |
1. Field of the Invention
The present invention relates to a motor-vehicle-mounted radar apparatus mounted on a vehicle and used to explore obstacles such as other vehicles traveling around the vehicle, for example, ahead of the vehicle, as targets thus securing safety of driving.
2. Description of the Related Art
Conventionally, motor-vehicle-mounted radar apparatus that explores obstacles of a vehicle in the direction of traveling has been developed. As motor-vehicle-mounted radar apparatus, the FM-CW system is employed in which an exploration wave as a continuous sending wave frequency-modulated using a triangular wave as a modulating wave and a beat component caused by a reflected wave from a target are extracted as a beat signal, and the relative velocity and relative range to the target are obtained based on the frequency of the beat signal. Related arts concerning the FM-CW system radar apparatus are disclosed, for example, in the Japanese Patent Laid-Open No. 111395/1977, the Japanese Patent Laid-Open No. 120549/1995, the Japanese Patent Laid-Open No. 80184/1997 and the Japanese Patent Laid-Open No. 145824/1997. Especially in the Japanese Patent Laid-Open No. 120549/1995, a configuration is disclosed whereby the radiation direction of a beam-shaped radio wave transmitted from motor-vehicle-mounted radar apparatus can be changed in order to correctly explore a target such as a vehicle traveling diagonally ahead for example in curvilinear traveling.
FIG. 16 shows a schematic configuration of conventional motor-vehicle-mounted radar apparatus of the FM-CW system 1. The motor-vehicle-mounted radar apparatus 1 explores a target 2 and transmits a radio wave for exploration from an antenna 3 in order to calculate the range to the target 2 and the relative velocity to the target 2. The antenna 3 receives the reflected radio wave reflected off the target 2. The antenna 3 is formed in a beam shape having a sharp range whose gain is high. Thus it is possible to execute scanning with beam direction changed via a scanning mechanism 4 and to detect the direction of the target 2 from the direction of beam in receiving a reflected signal from the target 2. With the range to and direction of the target 2 obtained, the position of the target 2 can be relatively obtained based on the position of the vehicle.
In the exploration according to FM-CW system, a transmitter circuit 5 is used to give an exploration signal frequency-modulated by a triangular wave to the antenna 3 for transmission, a reflected signal received by the antenna 3 is amplifier and frequency-converted by a receiver circuit 6 and converted to a digital signal by an analog-to-digital (hereinafter referred to as A/D) converter circuit 7, then converted to a frequency component by a fast Fourier Transform (hereinafter referred to as FFT) circuit 8. An object detection circuit 9, based on the range R and the relative velocity V to the target 2 based on the frequency component from the FFT circuit 8.
Each of FIGS. 17A and 17B show a principle in which the object detection circuit shown in FIG. 16 explores the target 2 and calculates the range R and the relative velocity V in accordance with the FM-CW system. From the antenna 3 in FIG. 16, an exploration signal 10 for frequency-modulated continuous wave (CW) is transmitted so that frequencies maybe continuously varied on the triangular wave at a constant variation velocity. An exploration 10 wave reflects off the target 2 and a resulting reflected signal 11 that is received by the antenna 3 is delayed as long as the period corresponding to the range R from the exploration signal 10. This causes difference in frequencies for the exploration signal 10 whose frequency is in variation. The relative velocity V is generated to the target 2. Thus the Doppler shift effect is generated on the reflected signal 11, causing difference in frequency from the exploration signal 10.
In the FM-CW system, as shown in FIG. 17B, variation in frequency caused by the Doppler shift effect is reflected differently on an upbeat signal 12 as a beat signal in the frequency rise section where the frequency shift amount of frequency modulation is increasing, and on a downbeat signal 13 as a beat signal in the frequency drop section where the frequency shift amount of frequency modulation is decreasing. Thus the frequency fub of the upbeat signal 12 and the frequency fdb of the downbeat signal 13 can be represented as the following expressions 1 and 2 using the range frequency fr and the Doppler shit frequency fd that are standard beat signal frequencies.
fub=frxe2x88x92fdxe2x80x83xe2x80x83(1)
fdb=fr+fbxe2x80x83xe2x80x83(2)
Here, the range frequency fr is in proportion to the range R to the target 2 and can be represented by the following expression 3 assuming the frequency shift amplitude of the exploration signal of the FM-CW system 10 as a triangular wave as xcex94f, modulating frequency as a triangular wave fm, and the velocity of light C. The Doppler shift frequency fd can be represented by the following expression 4 assuming the relative velocity to the target 2 as V and the wavelength of the exploration signal as xcex. It is also possible to calculate the range R and the relative velocity V respectively from the range frequency fr and the Doppler shift frequency fd by using the expressions 3 and 4.
xe2x80x83fr=4xc3x97xcex94fxc3x97fmxc3x97R/Cxe2x80x83xe2x80x83(3)
fd=2V/xcexxe2x80x83xe2x80x83(4)
As shown in FIG. 16, related arts concerning the motor-vehicle-mounted radar apparatus that scans the beam direction of the antenna 3 are disclosed, for example, in the Japanese Patent Laid-Open No. 64499/1999, the Japanese Patent Laid-Open No. 72651/1999, the Japanese Patent Laid-Open No. 84001/1999 and the Japanese Patent Laid-Open No. 121053/1999. In the Japanese Patent Laid-Open No. 82673/1996, a configuration whereby the short range and long range are switched over for exploring a target. In the Japanese Patent Laid-Open No. 282220/1998, a related technology is disclosed whereby part of data obtained in radar exploration is used to identify a target for a radar for an airframe. In the Japanese Patent Laid-Open No. 38141/1999, a related art is disclosed whereby a mobile-vehicle-mounted radar is used to recognize an obstacle in a three-dimensional image.
Of the related arts that scan the beam direction of an antenna, for example in the Japanese Patent Laid-Open No. 84001/1999 and the Japanese Patent Laid-Open No. 231053/1999, a philosophy is described that a plurality of explorations are carried out in a single scan period and the target direction is estimated from the peak of the reflected signal level obtained according to the variation in beam direction. In order to upgrade the exploration accuracy of the exploration in the target direction using such a philosophy in the related arts, it is necessary to explore a target in more directions and to increase of the frequency of exploration. Such a method suffers from high load of operation processing so that special hardware for high-speed signal processing is required to process data at a high speed. High-speed signal processing has a problem of heat as well as costs. Smooth operation requires a corresponding circuit scale thus upsizing the system configuration.
A method is also available whereby the limits of angle of exploration in a specific section where a target is present is narrowed. This approach requires a complicated hardware configuration and has few merits in terms of costs.
In recognizing a target, it is necessary to prepare a complicated logic in order to extract a true target in case reflected signals from a guard rail, tunnel, or sound-proof wall is received. In the case of a guard rail, the relative velocity calculated after paring processing in which the frequency in the frequency rise section and the frequency in the frequency drop section according to the FM-CW system are combined does to equal the actual velocity of the vehicle. The target thus appears as a moving object, not a stationary object. The travel amount does not coincide with the value obtained from the relative velocity so that the target is determined as a guard rail based on such information. However, as the frequency of exploration increases, the data update rate is accelerated and travel amount is decreased. Thus the relative velocity obtained from the travel amount is less accurate and makes difficult the comparison of relative velocity.
Further, in the FM-CW system, while a combination of the frequency rise section and the frequency drop section is used to calculate the range and the relative velocity, the Doppler shift effect is large for an object approaching at a high relative velocity so that the difference in frequency is large between the frequency rise section and the frequency drop section. In the case of an approach to a target, the beat signal in the frequency rise section deviates to the lower frequency band and processing is difficult for an extremely low-frequency beat signal thus increasing the minimum range in which a target can be detected, compared with the stationary state. As a result, it is impossible to trace the approaching target and get information on whether the target is approaching or deviating in another direction.
In case targets detected during driving are determined as stationary objects, they include objects that the vehicle can clear or pass through. Conventionally, these objects are not under specific criterion but subject to alarms or deceleration control. While a stationary objects may not be determined as a target but excluded from the target of control for these objects, objects that cannot be cleared or passed through cannot be excluded from the target of control.
An object of the invention is to provide motor-vehicle-mounted radar apparatus that can correctly recognize the position and nature of the target.
In the invention, there is provided a motor-vehicle-mounted radar apparatus that is mounted on a vehicle for exploring targets around the vehicle, characterized in that the apparatus comprises:
an antenna formed to have a high gain in a predetermined beam direction, for transmitting an exploration signal in the beam direction and receiving a reflected signal from a target of the exploration signal,
scanning means for performing a scan that varies the beam direction of the antenna within predetermined limits,
direction detecting means for detecting the beam direction varied by the scanning means,
exploration control means for making control to scan repeatedly in the beam direction of the antenna via the scanning means within the predetermined limits and to explore targets in a plurality of beam directions detected by the direction detecting means, each direction making an angle with each other every time exploration is made, and
target recognizing means for calculating the range to a target based on the reflected signal from the target received by the antenna and the exploration signal transmitted from the antenna and for recognizing the target based on the range and the beam direction of the antenna detected by the direction detecting means.
According to the invention, the motor-vehicle-mounted radar apparatus that is mounted on a vehicle for exploring targets around the vehicle transmits an exploration signal in a predetermined beam direction from an antenna and receives a reflected signal from a target. The beam direction of the antenna is varied within predetermined limits by scanning means in a scan and detected by direction detecting means. Exploration control means makes control to scan repeatedly in the beam direction of the antenna via the scanning means within the predetermined limits and to explore targets in a plurality of beam directions detected by the direction detecting means, each direction making an angle with each other every time exploration is made. Target recognizing means calculates the range to a target based on the reflected signal from the target received by the antenna and the exploration signal transmitted from the antenna. Target recognition is made based on the range and the beam direction of the antenna detected by the direction detecting means. Since a plurality of beam directions that are different from antenna scan to antenna scan is obtained by exploration control means, a combination of exploration results obtained from a plurality of explorations assures as high accuracy in exploration as the results obtained from explorations made in beam directions making a smaller angle with each other. Since an angle between beam directions in explorations during a single scan may be larger than a final angle, the target direction can be determined at an accuracy similar to that in a high-speed processing.
The invention is characterized in that the target recognizing means recognizes a target based on the results of explorations in a plurality of beam directions per scan and recognizes the target based on a combination of exploration results obtained from a plurality of prespecified scans when the number of beam directions of a reflected signal is smaller than a prespecified reference value.
According to the invention, recognition of a target can be made based on exploration results obtained from a plurality of scans in case a sufficient number of exploration results cannot be obtained via a single scan. This can upgrade the target recognition accuracy.
The invention is characterized in that the target recognizing means calculates a Doppler shift frequency from frequency shift amount that accompanies traveling of a target based on exploration results obtained from the plurality of scans and varies reflected signals to be combined for target recognition depending on the calculation results.
According to the invention, it is possible to combine candidate exploration results considering time delay between a plurality of scans in order to perform high-accuracy recognition.
The invention is characterized in that the target recognizing means recognizes reflected signals having frequencies excluded from the combination depending on the exploration results as reflected signals from unwanted reflecting objects, not as reflected signals from a target.
According to the invention, reflected signals having frequencies that cannot be combined among a plurality of exploration results are recognized as reflected signals from unwanted reflecting objects, not as reflected signals from a target. Thus it is possible to avoid burdening the system with load of processing on a target that need not pay attention to and perform processing focused on a target that need to pay attention to.
The invention is characterized in that the target exploration is performed via the FM-CW system and that
the target recognizing means subtracts the Doppler shift component of the velocity of the vehicle from the peak data obtained from reflected signals having frequencies excluded from the combination depending on the exploration results in the frequency rise section and the frequency drop section of the FM-CW system in order to calculate the range and the direction.
According to the invention, the Doppler shift component of the velocity of the vehicle is subtracted in the frequency rise section and the frequency drop section of the FM-CW system in order to calculate the range and the direction even if the exploration results are excluded from the combination for a specific target. This allows the position of a target to be explored efficiently.
The invention is characterized in that the target recognizing means recognizes the calculation results of the range and direction as data on unwanted reflecting objects and obtains the position where unwanted reflecting objects assemble from the range and the direction, and determines the position as a shoulder.
According to the invention, the calculation results based on exploration results that could not be combined are recognized as data on unwanted reflecting objects and the position where unwanted reflecting objects assemble is determined as a shoulder Thus, an object that is on or beyond the shoulder can be excluded from attention in order to reduce processing load.
In the invention, there is provided a motor-vehicle-mounted radar apparatus that is mounted on a vehicle for exploring targets around the vehicle, characterized in that the apparatus comprises:
an antenna formed to have a high gain in a predetermined beam direction, for transmitting an exploration signal in the beam direction and receiving a reflected signal from a target of the exploration signal, and
target recognizing means for calculating the range to a target based on the reflected signal from the target received by the antenna and the exploration signal transmitted from the antenna, for recognizing the target based on the range and the beam direction of the antenna detected by the direction detecting means, and for determining the height of the stationary target depending on whether or not a multipath error has effects on the variation in the reflected signal level within a specific frequency limits caused by the range from the target.
According to the invention, it is determined whether or not the target can be cleared based on the variation in the level of the reflected signal from the target caused by the range from the target. The reflected signal from the target is either a signal directly received by the antenna or a signal reflected off a road surface and received by the antenna. These signals generate a phase difference based on the path difference of the reflected signals thus varying the level of a signal received by the antenna. When the target is low, variation in the level of a reflected signal is small and the possibility of clearing the target is high. Since it is determined whether or not the target can be cleared based on a variation in the level of a reflected signal caused by the range from the target, a secure decision is possible via a simple configuration. A reflected signal from a target on the road surface on which the vehicle is traveling passes through a plurality of paths, i.e., a path directly reaching the antenna and a path once reflected off the road surface and reaching the antenna, and thus received in a state where a phase difference based on the path difference is generated. Phase difference occurs between reflected signals received in such a multipath error. Thus a phase difference close to 180 degrees results in a large signal attenuation. Since such effects caused by a multipath error appear depending on the height of a target, it is possible to properly determine the height of a stationary target based on the effects of multipath error.
The invention is characterized in that the target recognizing means determines that the stationary target can be cleared in case the level of the reflected signal from the target suddenly drops in an approach to the target.
According to the invention, it is determined that the target can be cleared in case the level of the reflected signal from the target suddenly drops in an approach to the target. Since the target that can be cleared has a small height from the road surface and goes beyond the beam direction limits of the antenna when the range to the antenna becomes smaller, the level of the reflected signal suddenly drops. Thus, in case the level of the reflected signal from the target suddenly drops in an approach to the target, it is highly possible that the target is at least lower than the antenna position and thus can be cleared.
The invention is characterized in that the target recognizing means has data indicating the variation in the threshold value of the reflected signal level for the range in advance and determines that the stationary target can be cleared in case the level of the reflected signal from the target has dropped below the threshold value within a predetermined limits of range.
According to the invention, a map is formed indicating the variation in the threshold value of the reflected signal level for the range in advance. Thus, in case the level of the reflected signal in an approach to the target has dropped below the threshold value, it can be determined that the stationary target is low and can be cleared.
In the invention, there is provided a motor-vehicle-mounted radar apparatus that is mounted on a vehicle for exploring targets around the vehicle, characterized in that the apparatus comprises:
an antenna formed to have a high gain in a predetermined beam direction, for transmitting an exploration signal in the beam direction and receiving a reflected signal from a target of the exploration signal, and
target recognizing means for calculating the range to a target based on the reflected signal from the target received by the antenna and the exploration signal transmitted from the antenna, for recognizing the target based on the range and the beam direction of the antenna detected by the direction detecting means, the target recognizing means having data indicating the variation in the threshold value of the reflected signal level for the range in advance and determines that the height of the target based on the range where the reflected signal from the stationary target has dropped below the threshold value.
According to the invention, the range where the reflected signal level drops below the threshold value while the user""s car is approaching the stationary target corresponds to the height of the stationary target. Thus it can be determined that the target is low in case the reflected signal level drops at relatively long range and gets higher as the level drops at relatively short range.
The invention is characterized in that the target recognizing means determines whether or not the stationary target can be cleared based on the state in which the reflected signal level drops as the range gets shorter.
According to the invention, it is determined that the target can be cleared in case the reflected signal level has dropped above a certain extent in an approach to the target from the level at long range. This evades the effects of a variation in the reflected signal level caused by difference of target material.
In the invention, there is provided a motor-vehicle-mounted radar apparatus that is mounted on a vehicle for exploring targets around the vehicle, characterized in that the apparatus comprises:
an antenna formed to have a high gain in a predetermined beam direction, for transmitting an exploration signal in the beam direction and receiving a reflected signal from a target of the exploration signal, and
target recognizing means for calculating the range to a target based on the reflected signal from the target received by the antenna and the exploration signal transmitted from the antenna, for recognizing the target based on the range and the beam direction of the antenna detectedby the direction detecting means, and for determining the height of the stationary target based on the range where the reflected signal level suddenly drops in an approach to the target.
According to the invention, the height of a stationary target is estimated depending on the range where the reflected signal level has dropped below a certain level in an approach to the stationary target compared with the level at long range. When the stationary target is relatively low, the target goes beyond the beam limits from the antenna at relatively long range thus avoiding a drop in the reflected signal level. In case the target is relatively high, the drop in the reflected signal level becomes large at short range. Since the reference level used to evaluate the drop in the reflected signal level is the reflected signal level from the target at long range, effects such as the target material can be reduced to estimate the target height at a high accuracy.
In the invention, there is provided a motor-vehicle-mounted radar apparatus that is mounted on a vehicle for exploring targets around the vehicle, characterized in that the apparatus comprises:
an antenna formed to have a high gain in a predetermined beam direction, for transmitting an exploration signal in the beam direction and receiving a reflected signal from a target of the exploration signal, and
target recognizing means for calculating the range to a target based on the reflected signal from the target received by the antenna and the exploration signal transmitted from the antenna and for recognizing the target based on the range and the beam direction of the antenna detected by the direction detecting means,
the target recognizing means recognizing that the target is not a target having a height to be alerted for a traveling vehicle in case the reflected signal level that is recognized exceeds the prespecified reference while the target recognizing means is recognizing the stationary target at longer range than the predetermined range and the reflected signal level drops considerably as the vehicle approaches the target from the vehicle position at the time of recognition.
According to the invention, it is recognized that the target is not a target having a height to be alerted for a traveling vehicle in case the reflected signal level that is recognized exceeds the prespecified reference while the stationary target at longer range than the predetermined range is recognized and the reflected signal level drops considerably as the vehicle approaches the target from the vehicle position at the time of recognition. For example, in case a reflected signal is received from an object, such as a billboard, a sign, and a two-level crossing, above the road surface on which the vehicle is traveling, the target is within the antenna beam direction limits at a distance but goes beyond the antenna beam direction limits as the vehicle approaches the target and causing the reflected signal level to drop considerably. When such an object as will not interfere with the traveling of the vehicle is detected, the object is recognized as a target not to be alerted. This eliminates control such as unnecessary alert or braking.
The invention is characterized in that the target height is the height of the highest section of the target.
According to the invention, it is possible to determine the possibility of clearing the target from the height of the highest section of the target.
The invention is characterized in that the target recognizing means determines whether or not the target can be cleared based on the determined height.
According to the invention, it is possible to determine whether or not the target can be cleared from the height of the highest section of the target. This assures a correct decision.
The invention is characterized in that the target height is the height of the lowest section of the target.
According to the invention, it is possible to determine the possibility of passing through the target from the height of the lowest section of the target.
The invention is characterized in that the target recognizing means determines whether or not the target can be passed through based on the determined height.
According to the invention, it is possible to determine whether or not the target can be passed through from the height of the lowest section of the target. This assures a correct decision.
The invention is characterized in that the target recognizing means determines the target height in a plurality of sections depending on the range from the target and derives a signal for predetermined alarm and/or braking based on the decision results for each section.
According to the invention, the target height is determined based on the presence/absence of the effects of a multipath error in a plurality of sections in an approach to a stationary target. Thus it is possible to make a plurality of decisions in an approach to the target and to avoid unnecessary alarm or braking in case it is determined that the target can be cleared in an early period.
The invention is characterized in that the target exploration is performed via the FM-CW system and that the target recognizing means uses only data in the frequency drop section to estimate the range and the relative velocity to the target when the target recognizing means determines that the relative velocity to the target is larger than the reference velocity.
According to the invention, it is possible to perform an highly accurate detection of a target that is rapidly approaching. |
Alimak takes your personal data seriously. We use cookies to optimize our websites for your needs. By using this website you consent to our personal data policy. If you want to find out more or disable cookies, please click here.
ALIMAK SC 65
The all-new fully modular ALIMAK SC 65 is based on the proven design of the ALIMAK SCANDO 650, which has been very successful in the market.
Alimak has taken construction hoist technology to unprecedented levels with the introduction of the all-new Alimak SC 65; a modular system that can adapt to different applications using relatively few modules and components.
Available in single or twin car configuration, the Alimak SC 65 offers payloads of 1,500 to 3,200 kg/car and has a standard maximum lifting height of 250 m, which can be increased on request.
The free-standing mast height is 22.5 m when equipped with an optional pipe support.
Two or three FC frequency control or two DOL motors drive the system through a high efficiency gearbox. The Alimak SC 65 operates at speeds up to 65 m/min and provides more hoistpower, while using as much as 40% less power than previous models.
In a 'time is money' world, we ensure customers get materials and personnel transported higher, faster and safer.
Payload capacity
1,500–3,200 kg
Speed
38–65 m/min.
Max. lifting height
250 m (Increased lifting height on request.)
Car width (internal)
1.5 m
Car length (internal)
3.2–5.0 m
Car height (internal)
2.3 m
Motor control
DOL/FC
No. of motors
2–3
Safety device type
GFD-II
Power supply range
380–500 V, 50 or 60 Hz, 3 phase
Type of mast
A-50, Tubular steel with integrated rack
Length mast section
1.508 m
Weight mast section with 1 rack
118 kg
Rack module
5
Request for quotation Construction Hoists
If you have an inquiry, please complete the form below and we will return with a quote. |
The best thing I can pass along is not to make the common mistake of selling your services below market value. New business owners often get flustered by not getting the amount of business they want... |
Of course now that it’s 2010 they’re no longer called expat wives, they’re “trailing spouses,” yep, thanks for that, I feel so much better now. I love the visual of me trailing behind G, hunched over and waiting for direction. Maybe we’ll forget about the title.
So, who and what is she?
In my experience she’s like any group of women, she’s a nurse, a doctor, a dentist, a hairdresser, a chef, a banker. The one thing she usually has in common with her expat friends, is that at some stage she sat down with her partner and had to make a practical choice on whether they were going to take “the job” overseas. In our case, I was 8 weeks pregnant when that conversation came. We did the math and it seemed impractical to turn the job down, the salary G was offered was the nearly the same as our two salaries in Australia, our worries of affordable child care and negotiating maternity leave arrangements would be non existent, it just seemed to make sense to go.
G was an expat child, he was incredibly excited about hitting the road again, there was a piece of family nostalgia there for him and he was happy with the idea of showing a child the expat life, me, not so much. The plan was 2 years in Indonesia, save some money, enjoy the experience and come home. I didn’t resign from work, I took a leave of absence, 11 years later and I still haven’t been able to formally resign from that role. What do you think Freud would say about that?
When we arrived in Jakarta and G went off to his first day at the office, I sat in our hotel room looking out over the grey city skyline, all logic and practicality disappeared from my mind. I quickly forgot our agreement. I wondered what on earth had possessed me to give up my career, friends and family to take on the role where my whole existence appeared to be being Mrs G. In fact, that’s what the staff at the hotel called me, Mrs G! As I wandered around the city I felt incredibly lonely. If I wasn’t working then who was I? I kept looking in the mirror at my 5 month pregnant body not really knowing who she was either.
After a couple of very quiet days the phone began to ring, British, American and Australian accents at the end of the line. “My husband mentioned there was a new Australian at the office and his wife was pregnant, do you have a doctor? I had a baby last year” a woman with a thick Scottish accent said. Someone invited me on a museum tour, someone else for a coffee “have you heard about ANZA?”. None of these women were the same, they were all from different parts of the world, all different ages but they had all been the woman in the hotel room, they had a pretty good idea on what was going through my mind.
When I started to spend time with them I realized that it doesn’t matter if you’re a hippy, or a conservative, at any age, the story from the very well dressed dignified woman in the corner about how she had to poo in her handbag while stuck in traffic in Mumbai with a serious case of Delhi belly is hysterical to everyone. They laughed about their language disasters, rats in their dryer pipes, no electricity or phone for days, cold showers, doctors who diagnosed them with terrible non existent diseases and the tragic haircut where “just cut a little bit off” translated to “just leave a little bit there” (it took me two years to grow that haircut out).
An expat wife acquires the skill of looking across the room and thinking (as my friend Jen later told me) “I’ll have her, she’s mine” as they see something in someone that looks familiar. A lifelong friendship can be made in a moment, over the death of a family member or a terrifying health scare for a child. You’ll find yourself sharing intimate stories with a friend you’ve only known for a few weeks, the terrible ex boyfriend, the miscarriage and the fight you had with your sister when you were 8, because you need to share, if you’re going to be good friends she needs to know the details. That’s why when you phone her the next day to say the car won’t start and your husbands in China, she’ll be there.
An expat wife will nervously walk in to a room full of strangers biting the side of her cheek, armed with a list of questions
Is the milk okay to drink?
Do you have a good doctor, mechanic, dentist or physio?
Can you draw me a map to the school?
Where do I buy a decent bra?
What sort of cab should I get in to?
Do they have Napisan here?
Why is there a sign “this meat does not contain traces of mad cow disease” in the supermarket?
Why can’t I find tampons?
Where can I find a math tutor?
It will be more than likely that she will leave the room with the answers, a list of phone numbers and an invitation for tomorrow. She may not have met one person she can see herself being friends with but that fear of never meeting anyone will be gone. She’ll feel indestructible, it will be better than the best performance review she’s ever had.
That weekend you’ll see her, leading the way with her trailing spouse behind her, she’ll be showing him how the city works and what she’s learnt during the week, because in reality we all know who the real trailing spouse is.
Share this:
Thanks so much for that perspective Great post. I am a bit of an ex-pat here, but have moved to my husband’s home town/country, so it wasn’t a work thing. We both had to leave our jobs in Oz to get here. I am lucky to have found a group of ex-pat English speakers, all of whom are lovely and have filled me in on all the important things you mentioned re. kids and baby stuff… but I sometimes get envious of the beautiful houses, and ‘work-paid-for-our-move-and-shipped-our-stuff’ side of things, (we are living in a cheap, tumbledown house as we came over here pennyless) BUT, we have family here. Cousins, Aunts, Grandparents to babysit and to spend weekends with etc. And that is why we are here and that support is invaluable. So I will try not to be tooo envious of my new ex-pat friends… And I will hope that they stick around here as long as me!!
http://livinglifeasme.wordpress.com/ livinglifeasme
Great insight into your world as an ex pat, trailing spouse (WTF)! Sounds like, despite the initial isolation and unknown, the kinship women share is universal. And that is wonderful. xx
http://www.blogger.com/profile/08404421856986720832 Kerri Sackville
Brilliant post. FASCINATING. May I suggest you write a book? ‘Mrs G – Tales of a Trailing Spouse’. I’d buy it for SURE.xxxxxx
http://www.blogger.com/profile/07529172123543772763 Linda T
Fabulous post, and I love the name Shamozal, it’s one of my favourite words x
I agree with Kerri, a book is a must!!
http://www.blogger.com/profile/05615149112130152767 Christy
I have to admit, I’m a little jealous – I know it must be hard too, but it sounds awesome! Great post; I really enjoyed reading it! A nice peek into a totally different lifestyle than my own.
http://anjwritesabout.com/ anjwritesabout.com
I can identify with a lot of what you write, except of course, I bounce into overseas moves excitedly! Agree wholeheartedly with Kerri as well…write these stories down (had an idea about that myself some time ago) as they will certainly sell!!
http://davesag.tumblr.com/ Dave Sag
Great post. I was an expat for years and now I live in Canberra I still feel like an expat.
http://www.blogger.com/profile/02743336097657087832 JANE
Really fascinating, Kirsty. Brilliant insights. It took me back to when I was 18 and an exchange student in Germany for the year. First time away from home – what a culture shock! The expats were such a supportive bunch and made life so much easier. J x
http://www.blogger.com/profile/04729571991002856725 gilly
troo. great post. thanks!
katherine
Oh, Kristy, thank you so much for this.I am tangentially familiar with the expat life — my mom has been one for 40+ years and I know what her community of expat friends has done for her; and I, myself, have lived overseas for half my life (though most of that has been as a student. ) Nevertheless, I am a very reluctant to become that “trailing wife” — my husband is already in Doha, and my not-yet-two year old daughter and I are still behind in NY, just because, if I stay here a little longer, I will be given the chance to keep my job and work from afar — from Doha. Mind you, I don’t even really like my job. I don’t like being away from my husband. I certainly don’t like my daughter being away from her father. And I so very much wish I could spend more time with my daughter, rather than running on this mad treadmill, trying to balance work, family, and now single parenthood…. Yet… Yet. I am terrified of becoming “Mrs K”
http://www.blogger.com/profile/16561240096806868742 Toni
“Trailing spouse”??? what the ….??? that made me want to punch someone.I’m in awe of ex-pat wives.My hubs is currently working overseas and until last week, it was looking like we would be joining him.While I was kinda excited, I also had so many questions — which he couldn’t answer, despite having been in this job for over 6 months. Things like, what are the supermarkets like? Would I be able to tell what was in cans and packets? What would happen if the kids got sick? etc etc. That was kind of one of the reasons why I started following your blog, cos I knew I would need to know people who could help out while I found my feet. (plus it’s just so INTERESTING!)I know a few ex-pat wives, in Switzerland, Sakhalin, Indonesia, Japan. Their husbands would be the first ones to admit they couldn’t do their jobs as well, without their wives making a home for them to come to every night.
http://juststopspeaking.wordpress.com/ juststopspeaking
Fantastic post – and can I just say – WOW you’re brave.
We did the travel thing-but from one side of Oz to the otherand whilst it may have been in the same country but, can I tell you, worlds apart….. and unfortunately the locals Not.So.Welcoming.
Anyhoo – we got through and came out the other side – what does not kill us makes us stronger
Write a book – I’d buy it for sure.
http://www.blogger.com/profile/09677312773827236567 Kath Lockett
Great post, Shamozal. Just in case you were wondering, I never thought of the expat wife as ‘gin swilling’ – I always assumed that they had it harder than their working spouse – ‘things’ such as education, house, bills paid, outings arranged and familiarisation don’t happen by themselves…..
Ex Dhaka
Great post – brings back wonderful memories of my time as the … non working part of the couple. First six weeks (in a hotel) were awful – particularly as husband went to Dublin for 2 weeks 3 days after kids n I arrived, and all the expats went on 2 months summer leave a week after that. But things improved once we were settled.
I’ve always described it as a shallow but fulfilling life filled with coffee, shopping, and some incredible friends who I will never forget.
http://www.blogger.com/profile/17798190669591053390 Expat mum
A penny just dropped for me – I consider myself an expat, even though I’ve been in the States for 20 years. The reason I still feel like an expat and not an immigrant I’ve just realised, is because most other people here grew up here so I’ve had very few people to bond with. Aaaah…
Darinaw
Hi Kirsty,What a gift !!! I have been an Expat for almost 30 years, 10 different countries, and three kids. You have just articulated beautifully, what it’s all about. Trailing spouse…. I don’t think so !!! Well done. xx
http://www.blogger.com/profile/05388656296518535181 Kristin :)
Hi! I’m a fellow expat, and I loved reading your post!! You couldn’t have said it better! Expat wives couldn’t be any farther from a trailing spouse!
http://www.blogger.com/profile/07695203425270299420 Very Bored in Catalunya
I love this post! Being an ex-pat wife really does mean you have to break out of your comfort zone, but the rewards in befriending people who you would normally come across are brilliant.
http://www.21stcenturymummy.com/ 21st century mummy
Great post. I am about to become an expat. We are moving to Singapore and I am pregnant. It’s exciting but scary too.
http://www.blogger.com/profile/15757789955664659689 Ingrid
I love your post! I can totally relate to you wrote, I have recently (one month today !!) moved to Doha and am finding things a bit tough, meeting other women in the same boat has been my life saver. Thanks for brightening up my day.
http://www.blogger.com/profile/18254275544017629129 bigwords is…
Great to know women throughout the world reach out to others when you need it most. Sounds like a perfect first chapter xx
http://www.blogger.com/profile/02777700715209427380 SDSJMcManus
Great post Kirsty, I recently met a woman who before leaving her home country went for a mammogram and was clear. 3 Months into expat life she was showering and found the lump we all dread, she went into overdrive and needed to find a doctor quickly. She had just met my friend who lives in the country she had just expatriated to and confided in this stranger who had happened into her life…. Within days she had a doctor, a best friend and a group of other expat women that supported her through this unforeseen challenge. Her special group of friends, who looked after children when needed, made meals, held her hand and became her best friends. 6 months later she is in remission, but without that knowledge and special connection that she made it most certainly would have been much more difficult for her to survive this. AND she made a best friend for life!
http://www.blogger.com/profile/08680909356053872951 Lynn MacDonald
Wow…that was an incredibly interesting post. I just visited my cousin who has lived in London for close to 20 years. I met soooo many people from NZ and Austrailia, South Africa, Switzerland….It was so interesting that I almost got jealous of the it multinational existence. Sometimes, I wish I had been more adventurous.
I came out to join a French boyfriend who I then married and then later divorced so I’m an expat but not a very mobile one because I’m still here!
I’m also integrated into the French system as I work and pay my taxes and am a resident although I couldn’t ever face taking French nationality!
So I recognise a lot of what you say – having expat friends is a real plus in a strange land because coping with strangeness 24/7 is very exhausting and it’s good to giggle with people who know who you are, if you see what I mean.
Of course, there are some totally weird and bizarre people living as expats who I would avoid with a bargepole wherever I was.
http://www.lifeintheexpatlane.com/ Miss Footloose
Hi Kristy, glad you found me! Yes, I certainly identify with (almost) everything in your post having lived in a number of foreign countries. I was married in Kenya, had my first baby in Ghana, and so on and so forth. Been the trailing spouse all right.
Hailing from the Netherlands, I have a travel/exploring gene and I always wanted to see the world, so I got lucky.
Lucky also because I have my own portable career as a writer, which means I don’t have to “sacrifice” myself for the good of my husband’s career.
http://www.blogger.com/profile/08635723714090524880 Lorna
Great Post! – if you ever need help in Houston, TX contact Lorna – [email protected] for 2 years and now been here 8 years – sound familiar!
http://www.kylieladd.com.au/ Kylie L
I was a trailing spouse for 5 years- first in Scotland, then in Canada. The experience was tough, lonely, frightening (the latter two especially in Montreal, where it seemed no-one spoke English and I had two tiny children), brilliant, character-forming, mundane, fascinating and overwhelming. I was actually termed a “dependent spouse” in the Uk, where I was refused a work permit unless I had the same surname as my husband, necessitating a lot of paperwork & a new signature before we left (and this was in 1999, not 1959!). Though tough at times, I loved our half decade overseas. More to the point, they gave me my writing… I began writing out of loneliness in Scotland after we first arrived, then really got into it seriously (and started the novel that would become After The Fall, published last year) in Montreal, where I couldn’t work at my ‘real’ job (as a psychologist) due to language restrictions. Ten years later, we’ve come full circle… I’m a trailing spouse again, though this time following my husband’s mid life crisis to Broome, WA- and with my writing as my only occupation. Thank you for a lovely post prompting all these memories!
http://www.blogger.com/profile/06972149809628579689 Alexis Jacobs
As a “trailing spouse” myself, all I have to say is AMEN! You hit the nail on the head. Great writing!
Pamela
May I re-post your blog on my Facebook page? It will give my friends back in the US a wonderful perspective on what life is like overseas!
http://globalcoachcenter.wordpress.com/ globalcoachcenter
Love the post and, especially, the “we all know who the real trailing spouse is”! Funny and very true at the same time!
I’ve loved all my expat assignments and, in fact, I find myself itching for the next one when we live back home (like now). I help others love it too so a dream job/lifestyle combination.
http://www.blogger.com/profile/15425166687421078790 homekeepsmoving
Hi, I have just stumbled upon your blog – I love it! Thought you might be interested in mine…I recently wrote a book about growing up as a Third Culture Kid and it got published this summer…Heidi http://homekeepsmoving.blogspot.com/
My husband is an expat kid too – and here we are in the UK. Love the post
http://www.blogger.com/profile/03924035710478459520 EmmaK
Brilliant! I suppose it was the opposite for me because I moved from UK to USA where there is much more choice of products. Like my head was spinning in the supermarket thinking: why are there 56 different versions of mayonnaise and whicih one shall I choose???
http://www.blogger.com/profile/15999271127735997770 Naturally Carol
When I was eighteen I moved to Australia from New Zealand. I didn’t expect so many differences in culture. It was lonely in Canberra at that time…then I met my husband. Five grown up kids later and now in Queensland…I’m still here. I love your post, what misconceptions are out there. You are brave women!
Elissa Sarich
Great post Kirsty (as always)…keep them coming!
http://www.blogger.com/profile/08647596319711811125 cjtato
Really loved reading this. It reminds me that some of our best friends are found in places we least expect. I have found two extremely great friends through meeting mothers at school (something I swore I’d never do for fear of only having children as a common bond but then realised that this is what starts the friendship but very rarely continues it).
On a weirder note, the expat lifestyle appeals to me but then I’ve always been a traveller so could explain it. Hubby, however, has his feet firmly planted on his home turf. LOL
http://swrightboucher.wordpress.com/ swrightboucher
Kirsty, this is your best yet. Killer closing line. You nailed it!
Thank you for letting us travel with you.
Anonymous
Brilliant! Every word you wrote is so true! After 7 International moves I am known as ‘Tagga’ – short for tag-a-long! It has a nicer ring than ‘trailing spouse’ but only just.
http://www.blogger.com/profile/09890862541890241422 Raine and Sage
My husband and I met travelling, and have consequently lived and worked in a few different cities, and now renovating our 2nd home. I wonder if we got addicted to moving?! I’ve not heard of trailing spouses before. It’s a funny term, and condescending a bit. We were considering if we’d move to Qatar about 18mths ago…
Great post. I love how you write! It gave me insight into expat wives as I do think they get a bad rap. At least they have each other though. I am the one who is working and there doesn’t appear to be an “expat husbands” club. And the expat wives won’t have much to do with me…mostly because they form their friends when I can’t. Company parties aren’t a lot of fun! Working wives want girlfriends too
Brett
Great post, we’re from Australia also but now in Chennai (or Madras as it was once called) before that Singapore. You’re right my wonderful wife Helen does all the hard work and makes everything happen. She putting out 4 year old to bed after a mad hospital dash across horrendous wet season traffic. Some sort of weird fever that seems to have settled down now. I can’t wait to show her your post as it will be like looking in a mirror for her. I spent a long time expatting alone and then ended up back in sydney for a few years where we met and married. After a one year of parenthood in Sydney I persuaded Helen to hit the road and while it’s been crazy we are having fun and are closer in way that I don’t think we would have if we’d stayed in surburbia. (Plus I would have died of boredom)Once you’ve survived a fight with a monkey in your kitchen your world is irreversibly different.keep up the blog, you have a gift that should be shared!CheersBrett
http://www.blogger.com/profile/13700717302832203631 London City Mum
Fabulous post.
Where do I join? Can swap you for Kevin.
LCM x
Single Working Girl Abroad
Ladies, suggest you purchase a book called “Diplomatic Incidents: The Memoirs of an Undiplomatic Wife” by Cherry Denman, available on amazon.co.uk – so, so funny, I found myself laughing out loud with no-one there to hear me. Might chivvy Mrs G into writing her own book.
http://www.blogger.com/profile/04925824005829442967 Expatriate Chef
Nice post, am sending the link to a friend who is living this life, too! Thanks for stopping by my kitchen.
Thank you so much for the comments. I don’t have the technological capabilities to do single replies here in the comments so where I can I’m coming to find you! Either on your blogs or via your emails.
To those who are thinking of living in Doha or are currently living in Doha please drop me an email at [email protected] I would REALLY like to talk to you.
The book is on the way. I was contacted by a publisher a few weeks ago and fingers crossed 4 kids, 20 suitcases and a beagle will get written and published in a year or (depending on how demanding the beagle is) two.
Once again, thanks for the comments, I loved reading them, (particularly the monkey fighting Australian), new post coming tomorrow, I hope you can find time to come back again.
Kirsty
http://www.blogger.com/profile/00621170366257326241 MultipleMum
It certainly sounds like an interesting way to spend a life! I can’t say it would be for everyone, but as a fellow traveller, I reckon I could get used to it too. Make the most of any situation you find yourself in because it is unique and interesting and yours
http://www.blogger.com/profile/14796758557993482943 Desiree
Loved the post and your writing. I was an expat for most of the past fifteen years. Met great people and had great experiences, some of the best friends ever. Am having a hard time with our most recent move back to the US. Tough to not have the expat identity and the willingness of people to get to know you and have a coffee!
My goodness, how brave are you?! I get stressed just going on holiday never mind living in numerous different countries!
http://www.blogger.com/profile/09763064258020825441 Elizabeth Abbot
great post (a friend forwarded it to me). I see you have the Expat Women website listed — check out the December article on “The Pyramid of Expat Needs”. It’s a model I often use in trainings and presentations that seems to hit the spot. Best wishes! Elizabeth
http://www.blogger.com/profile/10652566920769043373 Olga
Thank you for this post. It brings so many memories.
http://www.blogger.com/profile/12951250749027163763 Victoria
Hi! Thanks for stopping by my blog.. hopefully I’ll be posting more regularly now that I’m no longer pregnant!I’m a grad school wife, and it sounds a bit like being an ex-pat wife.. except I assure you no one ever thinks we’re going to be glamorous! But you DO have to get in good with women quickly, be sharp & have a talent to stand out. Whew! I’ll visit your blog again soon!
http://www.blogger.com/profile/16232358885177196136 katherine
It was like reading a short story about my life as an ‘expat wife’. I found myself smiling from ear to ear and laughing out loud. SO TRUE! I lived in Abu Dhabi for 13 years and came to the States for 2 years to get my teens settled into college. Now, it’s back to UAE and the hubby – and I’m more than ready to end that long-distance commute thing. Every expat woman will tell you it started out as a two year contract, but they all end up staying. When we meet a new girl in the group and she talks about that 2-year contract schpiel, we all hold in our giggles. The truth is – once you become an expat, you can never UNbecome one. You will always relate most easily with other expats once you’ve lived in this way. I have missed that camaraderie so much.
Even as I contemplate leaving Alabama and moving back in January to Abu Dhabi, we are planning his retirement in South America. And so it goes!
Anonymous
Absolutely loved this post! We were much older when we began our expat adventures, and we are coming up on our 1-year anniversary. We are the only ones from my husband’s company in the country, and I truly love all the women I’ve met. However, I’m still wondering if I’ll find that one BFF. Every time I find someone that I really like and think we could be best of friends, I find out she is leaving in the next month or so. Maybe lots of friends will have to do instead of one BFF?
Thank you for making my day with your blog!
Anonymous
and just imagine what’s about being a “trailing husband”because if the majority is female gender, some are male…
http://www.blogger.com/profile/03482513767849843084 My New Normal
Great post, and I can totally relate as an expat living in London. The expat community over here has been my family away from home and they have helped me through some very difficult times.
http://www.blogger.com/profile/10244439931661355439 qatar foodie
This is a great post and just for that I voted for you at babble and you are 16 now… the book idea suggested by some in the comments is worth a thought… keep blogging
wow, i’ve been also the woman in the hotel room already in brussels, warsaw and now in a small village close to Geneva (with a 2 months old baby girl) and next year there ll be a new destination…I started my blog yesterday and I ended up here browsing the lists of other mothers expat blogs.. you really hit the point!!
http://www.blogger.com/profile/17165208811776097332 Heather
Excellent post lady! Just excellent!
Nicola Adair
I’m the blonde Scottish woman you met at the end of last night’s QPWN event. Really enjoyed chatting to you and so couldnt resist looking up your blog….I love it! Your comments re Trailing Spouse made me laugh and cry – your description of feeling empowered after walking into a room full of unknown women is exactly how I felt last night……and today I have an extra spring in my step due to my ‘bravery’!
http://www.blogger.com/profile/04503327503533034631 Rhanda
This post is great! I am an American, now living as an expat in Oman (we are practically neighbors). We have been here 2.5 years! I can so relate with what you have written. My second week here, I found myself in tears at the local market unsuccesfully trying to find pesto. Now, I see it all over the place. Oh to have a WalMart (or Target) here! A girl can dream can’t she?
Wonderful post! Thanks for your lovely comment on my blog, I am so glad we have found each others blogs – as me and our two young girls are soon moving to Hong Kong (hubby is already there), so I guess I am soon to be an expat wife (I will not call myself the other version, it is awful)I could be stopping by your blog to pick your brain when I am wondering what the flippin heck I have done!Nice to meet you Cat
http://www.preludefinancial.com.au/ Expats
To be honest, the days of gold-rimmed expat packages are disappearing fast, whoops … they are gone, and therefor many expats now work under reasonably modest (local) terms, but no matter how you look at it, your life is often more luxurious.
http://www.blogger.com/profile/08499944412217904302 vegemitevix
I can’t believe I haven’t read this brilliant post before Kirsty. It really does say it all. I wrote about trailing spouses on my blog too – Who Moves, and also about the loss of identity when you move – Who am I? Can’t wait for your book to come out. Vxx
Wonderful post! Thanks for your lovely comment on my blog, I am so glad we have found each others blogs – as me and our two young girls are soon moving to Hong Kong (hubby is already there), so I guess I am soon to be an expat wife (I will not call myself the other version, it is awful)I could be stopping by your blog to pick your brain when I am wondering what the flippin heck I have done!Nice to meet you Cat
This post is great! I am an American, now living as an expat in Oman (we are practically neighbors). We have been here 2.5 years! I can so relate with what you have written. My second week here, I found myself in tears at the local market unsuccesfully trying to find pesto. Now, I see it all over the place. Oh to have a WalMart (or Target) here! A girl can dream can’t she?
http://www.blogger.com/profile/09763064258020825441 Elizabeth Abbot
great post (a friend forwarded it to me). I see you have the Expat Women website listed — check out the December article on “The Pyramid of Expat Needs”. It’s a model I often use in trainings and presentations that seems to hit the spot. Best wishes! Elizabeth
http://www.blogger.com/profile/04925824005829442967 Expatriate Chef
Nice post, am sending the link to a friend who is living this life, too! Thanks for stopping by my kitchen.
Hi, I have just stumbled upon your blog – I love it! Thought you might be interested in mine…I recently wrote a book about growing up as a Third Culture Kid and it got published this summer…Heidi http://homekeepsmoving.blogspot.com/
http://globalcoachcenter.wordpress.com/ globalcoachcenter
Love the post and, especially, the “we all know who the real trailing spouse is”! Funny and very true at the same time!
I’ve loved all my expat assignments and, in fact, I find myself itching for the next one when we live back home (like now). I help others love it too so a dream job/lifestyle combination.
http://www.lifeintheexpatlane.com/ Miss Footloose
Hi Kristy, glad you found me! Yes, I certainly identify with (almost) everything in your post having lived in a number of foreign countries. I was married in Kenya, had my first baby in Ghana, and so on and so forth. Been the trailing spouse all right.
Hailing from the Netherlands, I have a travel/exploring gene and I always wanted to see the world, so I got lucky.
Lucky also because I have my own portable career as a writer, which means I don’t have to “sacrifice” myself for the good of my husband’s career.
Darinaw
Hi Kirsty,What a gift !!! I have been an Expat for almost 30 years, 10 different countries, and three kids. You have just articulated beautifully, what it’s all about. Trailing spouse…. I don’t think so !!! Well done. xx
http://juststopspeaking.wordpress.com/ juststopspeaking
Fantastic post – and can I just say – WOW you’re brave.
We did the travel thing-but from one side of Oz to the otherand whilst it may have been in the same country but, can I tell you, worlds apart….. and unfortunately the locals Not.So.Welcoming.
Anyhoo – we got through and came out the other side – what does not kill us makes us stronger
Write a book – I’d buy it for sure.
Ex Dhaka
Great post – brings back wonderful memories of my time as the … non working part of the couple. First six weeks (in a hotel) were awful – particularly as husband went to Dublin for 2 weeks 3 days after kids n I arrived, and all the expats went on 2 months summer leave a week after that. But things improved once we were settled.
I’ve always described it as a shallow but fulfilling life filled with coffee, shopping, and some incredible friends who I will never forget.
http://davesag.tumblr.com/ Dave Sag
Great post. I was an expat for years and now I live in Canberra I still feel like an expat.
http://strongsoutherly.blogspot.com/ Andrea
So so so right – I wasn’t the expat spouse, just the expat, but I certainly experienced the cameraderie and openness, and the willingness to make people feel welcome. It is something you really miss when you come back to Aus. Everybody has their lives, their routine, their set ‘support crew’, so when you move somewhere it doesn’t take a number of weeks to find people, it takes years. Even now, 5 years on my friendship group pales in comparison to my expat one.
Lynn
There’s no life like it!
Robandmerinplus
Everything you say about the life of an expat wife is just so true…..but now being back “home” after a 2 year expat experience I think I’d like to go again!!! Life is never, ever boring or mundane as an expat wife!!
Rachel
I adore this post. You have summed up the strength it takes to get out there, and the sheer bloody mindedness you need to make a success of it – all while pinning a smile on your face to camouflage the butterflies in your stomach. Can’t wait to read the rest of your posts!
LK
Great post! So true on every count! Was an expat girlfriend for a year, and now an expat wife for 10…. Your post just reminded me of my early days! Nice one!!!
Fam Wanten
could I use this article to publish in our bimonthly newsletter of the British Womens Association? That would be a great story to share .. thanks in advance
Anonymous
I love this!!! Everything is so true. After 3 different countries in a 12 year span we are now living back in the USA. At the beginning I didn’t want this kind of life, but after our third move ( where 2 of my 3) children were born I actually began to love the expat life. We saved a great amount of money, we learned another language, we had a ton of help , and some of my best friends have come from these adventures. I love being settled in one place again, but I will never forget the experiences our family shared. Never say never..
http://irunyourun.wordpress.com/ Carla
I wish I had the same experience as you did, arriving in a foreign country and having other spouses reach out. I instead was alone in that room (not a hotel, but isolated temporary quarters nonetheless) for a month.
(To be fair one spouse did reach out and I had a glorious second day in town, but she was pregnant and on her way out, so I was left alone after that, since she had urgent matters to take care of, but the people who were here? Nothing. I vowed to never be that person, and I have met friends by reaching out instead as 5 months later, I’m no longer “new”)
Amwaters
You got the essence of “trailing” spouse expat wife. There is a fantastic play here in singapore called Expat Wife and it was also so close to the truth.
Melinda Mccabe
That is thee truth. Living in India was all that you listed but the friends I made seem closer then friends I have in the states…
http://twitter.com/TorreDoro Dorotea Torretta
Hi, I’m @TorreDoro . I read this blog last week and I totally agree with the content.
When I started my expat-wife life, 16 years ago, I arrived in a little town in Central Mexico, 2 hours by car from Mexico City. My daughter was 6 and my son was 1 year old. We came from a rich, well served and safe North of Italy, Milan. In that “pueblito” there wasn’t anything. Even expats, apart a very small Italian colony, my husband’s colleagues, but as was summer the few wives leaving there were on vacation abroad.The second day there, I called a pediatrician (suggested by hubby’s colleague) for my son. This very generous man the same day sent his wife to my place to help me. Since that afternoon we became inseparable. She was my sister, mother, friend, conforter.I don’t see her in person since 14 years, but we are continuously in touch – by e-mails, phone, FB, skype: our affection still lasts, no matter the distance.
All of us can tell stories like this. How is painful grow away from these persons that are part of our life, that our children love as the true family. And how is extraordinary being aware that this kind of ralationships can be built wherever.
Cheers,Dorotea
Rissa
Hi Kirsty, in a few months I will become a trailing spouse/expat wife and this blog made me feel so much better! We haven’t even started to pack yet and I am already feeling that I am losing my identity. The thought that after we move, it will be me who has the answers to the ‘where do we go?’ ‘where can I get?’ is reassuring. It’s me who has those answers here and I like the fact that this at least, won’t change!
Keep writing, your words are thoroughly entertaining!!!
Em
Preparing for “my” first expat wife assignment (China) I came accross your blog. Thanks for sharing your experiences. Look forward to new making friends but will miss the “old” ones very much…
Jeanne @ Collage of Life
I am not sure if I comment on this before…even if I did, I have to say, once again, this is brilliant and so true! Well done!
Patricia
LOve your blog! Would you like to follow each other? My blog is on spanish designers I promote , style and my experience as a western woman and expat wife in Qatar!
So true as also the last paragraph !If it is the partner to follow he’ll receive the nice title of “prince consort”… but mens are certainly not so organized as we are and certainly are not sharing ideas or comfort or help in welcoming groups. They could really struggle to adapt in a new environment that is not work !
Sandra
Great article! As an expat wife, I reconglize myself on that story. I remember our first move to Vietnam, what a shock!! first time in Asia for us, with a little one, and getting pregned in the first month there. I was not happy at all. But everything changes when you start meeting people. Making friends make your life so much better werever you are. We still moving and moving, I like this life. Meeting new people is a little bit of a chalenge and more when your kids start getting older, but knowing a new place with exiting things to know and learn, is great!Even tho, the move is one of the most stressful things in a person life, we start been a little bit of an expert, still very stress out, but well…. it came w the territorie, right? I think now a days I couldn t live anymore in a one place, may be onde day we move to a place were we ll feel like home and we stay there forever. For now….forever is a world we do not use. There is nothing forever in life, so we ll enjoy while we can.
Melina
Brilliant Post!!! Loved reading it…and looking back through our blog! Im a newbie Expat, having just done a year in KL but on our way to Doha now…perhaps we can meet up once we are there! Thanks for a brilliant blog!
http://www.blogger.com/profile/05681227038111050561 Melody
This is such a fabulous post. You wrote everything just the way it is. And you always think you are alone until you start talking to other westerners around you.
http://www.blogger.com/profile/07285709209953730580 Fraudster
Again, fabulous writing. Cheers for the insight on a Sunday morning in same old Melbourne.
http://www.blogger.com/profile/10122834410061492424 bloggingher
lovely post…i totally relate…is that book out yet? u really should write one…
http://www.blogger.com/profile/01095913641167115662 Chuzai Living
I’m ‘training spouse’ in Jakarta and sometimes I feel that we get a better deal. What you wrote is so true and I am nodding as I read. Great writing!
http://www.blogger.com/profile/01023787854786251105 aussiemama
Another expat wife/trailing spouse/mum here. We moved from Sydney to Dublin (2 years) then Yokohama (3 years) adn now in the UK. I can totally relate to all that you wrote in this blog – tho rather than ‘she’s mine’ i call it ‘girl dating’ as you meet someone for the first time, get to know them, chat a bit, after a few meetings you exchange phone numbers, then wait to see who rings who first, then offer/accept an invitation to coffee ….. and before you know it the deepest of friendships is formed, or not. And you learn that’s ok too. Then you add husbands and kids into the mix and again, it either works or it doesn’t. it’s hard work moving country every few years, closing one chapter and opening another. Long gone are the days of tennis, lunches, endless shopping, expat clubs etc (tho i hear it also depends on where you are gigging and the industry the employed partner is in). The move to the UK’s actually been very difficult cos we’re not living in an expat community. Like a lot of expat wives/ trailing spouses i also started blogging just before we left Japan as friends said ‘write a book’ . Love to have your company and comments at ms-havachat.blogspot.com
meanwhile, onwards and upwards
http://www.blogger.com/profile/10441442451871326442 Chris
Wow, thanks. I appreciate you wrote this post 2 years ago, but it’s a great inspiration. I moved to Ghana with my husband and three kids from Australia at the beginning of this year. As we live an hour out of the second biggest city, and we don’t have a expat pool of people close by, and it’s been tough. Your post has been a kick up the butt to get out there a bit and enjoy some of the upsides to expat life! And no more feeling guilty about morning tennis lessons….
Anonymous
After 2 years still loving this article!!!
Anonymous
Thank you for the good writeup. It in fact was a amusement account it. Look advanced to far added agreeable from you!
Terrific post! I sometimes think it’s easier to make friends living abroad than it was back in an American city – at least among other expats. You share the same struggles and can empathize with newcomers’ challenges. It’s a small, generally supportive, manageable community. I actually think I’ll miss that easy camaraderie when we go back to the States.
Loved this post! I immigrated from the UK to the USA to be with my husband, and it’s been an interesting journey of constant adaptation and unpredicted culture shock to say the least! Got to find the humor in it though don’t you!?
I love this – completely spot on. I lived in Qatar last year, Russia and Libya before that and we’re off to Angola; every new start begins with at least one day in the hotel/apartment figuring out of it was the right move. I’ve got a bunch of lovely friends around the world now though, all of whom have helped me out when needed and who I will do the same for in a heartbeat. The bit about being able to show my husband (aka the office dweller) around the city when we’ve just arrived is so true.
http://www.blogger.com/profile/11555869161874166113 Megan
Absolutely right! Thanks for articulating it all. In the past 10 years of doing some “trailing” of my own I have encountered my share of “ladies who lunch”, but mostly I have also met the most important women in my life who have continued to be what I assume will be lifelong friendships, and who have gone out of their way to be there for me and either help me feel at home in a new home, or have joined forces in figuring it all out. People may often be nervous about moving to a new country, especially if they don’t know what they will be doing there, but I have been much more enthusiastic about moving to a new place where I knew I would feel more “at home” with others who know what it’s like to be the new kid on the block than in a new town in my home country. Plus we have friends all over the world whose couches we look forward to crashing on for many years to come!
http://www.blogger.com/profile/01401601942849055034 Jane Lee
I’m impressed with your ideas and the way you express them in this article. I share many of your views and enjoyed reading this article. It’s a pleasure to see well-written original content these days.
What about trailing husbands? Think they are a new trend without the wives support network to help them… And often ‘trailing’ wives who are not earning as much as your “expat wives'” spouses (e.g. Many teachers in my experience)… Where do we fit in?
http://shamozal.blogspot.com Kirsty Rice 4kids20suitcases
Thanks Esta, I’ve written about trailing husbands before, but this post was focussed on women. Regarding your comment on teachers, the post was about ALL women e.g..
“In my experience she’s like any group of women, she’s a nurse, a doctor, a dentist, a hairdresser, a chef, a banker.”
Cheers and thanks for your comment.
Esta Styles
Ah, this was posted by someone and popped up on my FB feed. Haven’t seen your other posts
I was definitely nodding my head when you said “That weekend you’ll see her, leading the way with her trailing spouse behind her, she’ll be showing him how the city works and what she’s learnt during the week” that totally describes me. Thanks so much for writing this post and sharing the true essence of what an expat wife is and is not.
Thank you so much for your article, you made me laugh and cry at the same time … and you gave me hope! I am a new expat wife and mum to a 6 month old in Bishkek, Kyrgyzstan (your will probably need to google map that one), what I mean by new is I am 11 days in and I am slowly getting to that stage of feeling a little bit alone when walking around the city. But I am determined to find a friend with the added challenge of my husband working as 1 of 2 expats in the company (the other expat doesn’t have a partner over here) So I have a question… what advise would you give to new expat wife in a random country wanting to find new friends?
http://shamozal.blogspot.com Kirsty Rice 4kids20suitcases
Hi Marta, are you on the 4 kids, 20 suitcases Facebook page. I might put a note out there asking if anyone else is there at the moment. I’ve definitely had comments from Kyrgyzstan before. Let me know when you “like” the page and I’ll put a note out to readers. xxx
Marta Diemar
Hello Kirsty, Thank you so much for your reply and doing that for me! Meeting fello expat wives would be really nice right about now. I ‘liked’ your page yesterday you will be able to find me with the same name. x
AnExpatWife
LOVE this blog… I’ve been an expat wife for nearly 10 years now and am in my 4th and hopefully final country !! I wouldn’t change any of it if I had the choice again. I’ve shed many tears and met lots of ‘ladies who lunch’ but I’ve also met some amazing people, travelled to some great places and even got the chance to study for 2 bachelors degrees…. Your post describes many things perfectly !! It really takes another expat to truly understand the frustrations.
almost_bedtime
hi kirsty – i am a british expat living in canada who is moving to australia in a couple of months time – one of my blog readers suggest that i check out your blog and i’m so glad i did – i lived in the states for 10 years and had a brilliant expat community but i haven’t found one at all in vancouver and i’ve found it very hard going – just reading this piece has given me hope that when we move to Aus i have a good chance of finding a new community again – many of the women i met here had never left vancouver and although i tried really hard to fit in sometimes i just needed to chat to someone who wasn’t from here – i wish i had discovered your blog sooner but i love pieces like this – they make me feel normal – thanks |
// stdafx.cpp : source file that includes just the standard includes
// xrLBuilder.pch will be the pre-compiled header
// stdafx.obj will contain the pre-compiled type information
#include "stdafx.h"
// TODO: reference any additional headers you need in STDAFX.H
// and not in this file
|
Ben,
DC is still treating me well. 10 years here and still going. My wife and I
moved into our new home in June. So I've been getting settled in the new
place all summer, real busy but it's been fun. Just had the 1 year
anniversary, can't believe it's been that long. Flather Hall, Kitty's, and
'box' seem like yesterday...
Marlon's wedding sounds like fun, too bad it's Homecoming weekend. Would be
nice to see everybody. We need to make some plans and all get together
soon. The marathon sounds great, good luck, the only running I have time
for these days is from Home Depot and back to the house. But I manage to go
to the gym a few days a week to maintain my 250 lbs slim figure.
I still hang out with Penney and his new little girl, never thought he would
be the first to have a baby. Saw Ken and Theo a few weeks ago in DC. Dolan
and Sofie are now in San Fran and I talk to him from time to time.
Hard to make plans with a big bunch of people. Sometimes you just gotta
make the plans with a few and throw it out there for the rest of the group.
Let me know if you have any ideas or possible locations. Maybe just plan a
weekend somewhere, DC or otherwise and try to get as many people together.
Maybe a big party or something like that. We'll hire Vince O'Neill to
organize it. An un-official homecoming party.
See ya
Christopher J. Lukawski
Project Manager
HITT Contracting Inc.
http://www.hitt-gc.com <http://www.hitt-gc.com>
703-444-9453 voice
703-444-7096 fax
703-814-1235 pager
-----Original Message-----
From: [email protected] [SMTP:[email protected]]
Sent: Thursday, September 14, 2000 4:41 PM
To: [email protected]
Subject:
Luke:
How are ya? How is the DC area these days? Houston is still
fucking hot
and Enron is still doing well and the price is still screaming so
things
are good. In response to your inquiry regarding Homecoming. Megan
and I
are actually, if you can believe it, going to Marlon and Marissa's
wedding
the first weekend in October in NJ. Also, OB, Chobu, Mike, Corpina
and
Danny, Patty D, Sammy, Amy, etc. are going as well - should be
interesting.
I haven't seen some of those people for quite awhile. I was trying
to set
something up, but that came up as well as I'm running in this year's
NYC
Marathon, which is the first Sunday in Novemebr, so trying to
arrange
something became even harder. I still want to get together with you
guys,
but trying to figure out when and where. Suggestions are welcomed.
Hope
all is going well and talk to you soon.
Ben
(713) 853-7998 Office Ph.
**********************************************************************
This email and any files transmitted with it are confidential and
intended solely for the use of the individual or entity to whom they
are addressed. If you have received this email in error please notify
the system manager.
********************************************************************** |
Filter
Product Type +
Size +
Flavor Type +
Flavor +
Brand +
Nic Level +
Collection
The Drip Co. Coffee Shop Edition
The Drip Company brings us a unique vaping experience with their Coffee Shop Edition (formerly Stars-N-Bucks) line of premium eJuices. Offering flavors of your favorite coffee shop in very unique packaging!
Newsletter
NOT FOR SALE TO MINORS | CALIFORNIA PROPOSITION 65 - Warning: This product contains nicotine, a chemical known to the state of California to cause birth defects or other reproductive harm.
eJuice Direct products are not smoking cessation products and have not been evaluated by the Food and Drug Administration, nor are they intended to treat, prevent or cure any disease or condition. Products may contain Diacetyl and/or Acetyl Propionyl, which have been linked to Bronchiolitis Obliterans. KEEP OUT OF REACH OF CHILDREN AND PETS
All product names, trademarks and images are the property of their respective owners, which are in no way associated or affiliated with eJuice Direct.
Product names and images are used solely for the purpose of identifying the specific products. Use of these names does not imply any co-operation or endorsement. |
/*
Copyright 2019 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
// +k8s:deepcopy-gen=package
// +k8s:protobuf-gen=package
// +k8s:openapi-gen=true
// +k8s:prerelease-lifecycle-gen=true
// +groupName=discovery.k8s.io
package v1beta1 // import "k8s.io/api/discovery/v1beta1"
|
Q:
Why does this home experiment show no trace of a magnetic field?
The photos below show what I did. Where are the fields? The first photo shows welding cables over paper with iron filings. 55 amps DC and 70 amps DC produced only faint hints of a field. The second photo shows 60 Hz over paper with iron filings (notice I separated the conductors so they wouldn't cancel each other). I then ran a small motor with the ac and no noticeable field was created in the filings. Then I remembered that the magnetic field is perpendicular to the electric field so I ran the wire perpendicular to the paper and still no field. The very last photo shows the hint of a field with the welding cables.
In summary here's what I did: I tried DC with a lot of current. I tried AC with a motor as the draw. I tried perpendicular and parallel, and basically got nothing. Besides rolling his eyes at me, what would Maxwell say?
A:
The magnetic effect of a direct current is very weak. At 1cm from a wire carrying 70 A the magnetic field is about 14 gauss. This is significantly stronger than the Earth's magnetic field (0.5 gauss) but still weaker than a fridge magnet (about 100 gauss). Does a fridge magnet produce a pattern in the iron filings? Getting a pattern with a strong magnet is difficult enough.
You will not see any effect in the setup of figs 1, 2 & 4 because the magnetic field is vertical at the paper. It will not push iron filings either towards or away from the wire, nor clump them in lines parallel to the wire.
You would only see an effect in fig 3. But all that will happen in this case is that the filings will each turn parallel to the field - you have to look very closely to see the effect. The filings should be longer in one direction, otherwise they will not turn and you will not notice they have turned. If the particles are round they will not turn in the magnetic field. If the filings are close enough together a ring of filings might join up end to end around the wire. Your filings are much too far apart for this too happen. They will not move closer to the wire.
The magnetic force may be weaker than the static friction force, keeping the filings from moving at all.
You will not see any effect with AC, because the magnetic field changes direction 60 times per second. The iron filings do not have time to react before the direction of the force on them reverses.
|
Q:
How do I show and hide forms in Visual C++?
Hey guys, I'm brand new to Visual C++, but not C++. I'm having issues trying to figure out how to show/hide forms.
Let's say I have a form Form1 and another form TestForm. In a button click function in Form1.h I have the code:
Form1::Hide();
TestForm^ form = gcnew TestForm();
form->Show();
And it works fine. I click the button, and Form1 disappears and TestForm appears. But if I do the same thing in TestForm.h (just changing which forms are set to appear/disappear) I get a plethora of compiler errors in both Form1.h (which used to work) and TestForm.h
Form1.cpp
c:\users\alex\documents\visual studio 2010\projects\test\test\TestForm.h(86): error C2065: 'Form1' : undeclared identifier
c:\users\alex\documents\visual studio 2010\projects\test\test\TestForm.h(86): error C2065: 'form' : undeclared identifier
c:\users\alex\documents\visual studio 2010\projects\test\test\TestForm.h(86): error C2061: syntax error : identifier 'Form1'
c:\users\alex\documents\visual studio 2010\projects\test\test\TestForm.h(87): error C2065: 'form' : undeclared identifier
c:\users\alex\documents\visual studio 2010\projects\test\test\TestForm.h(87): error C2227: left of '->Show' must point to class/struct/union/generic type
type is ''unknown-type''
TestForm.cpp
c:\users\alex\documents\visual studio 2010\projects\test\test\Form1.h(103): error C2065: 'TestForm' : undeclared identifier
c:\users\alex\documents\visual studio 2010\projects\test\test\Form1.h(103): error C2065: 'form' : undeclared identifier
c:\users\alex\documents\visual studio 2010\projects\test\test\Form1.h(103): error C2061: syntax error : identifier 'TestForm'
c:\users\alex\documents\visual studio 2010\projects\test\test\Form1.h(104): error C2065: 'form' : undeclared identifier
c:\users\alex\documents\visual studio 2010\projects\test\test\Form1.h(104): error C2227: left of '->Show' must point to class/struct/union/generic type
type is ''unknown-type''
A:
The problem is most likely due to the order in which you're including the headers into the .cpp files. In the original case, when you were working in Form1.cpp, "TestForm" was a known type before Form1.h was included. As soon as you switch the header files will your method calls, this isn't the case anymore.
I recommend moving your event handlers (the button click functions) to your .cpp files. Your .cpp files can both include both headers, and the compiler will find the form definitions, with their methods, appropriately, no matter what order you include the headers.
|
Plastic passion
How are corporates dealing with the increasing backlash against plastic and the expectations that they play a larger role in cleanup? And how does this affect how these brands are perceivedDelshad Irani&Amit Bapna | ETBrandEquity | Updated: July 18, 2018, 09:40 IST
When travelers traipsing about the Indian countryside, especially at higher altitudes, stop for a snack at a dhaba, Maggi noodles is always a top choice. It’s an association so strong that even Nestle’s popular instant noodle brand created a commercial with snowy mountains in the background, weary tourists bundled in sweaters served Maggi by friendly locals. It’s a mouthwatering sight. Until, of course, every strand of Maggi is consumed and the city-slickers return home.
Last year, India’s largest trekking community, Indiahikes conducted its first-ever Himalayan Waste Audit, as part of its long running efforts to clean up popular trekking destinations. For the past few years, the organization has been providing all members with an Eco Bag, which can be easily buckled around the waist, so trekkers can pick up litter along the way. The audit headed by avid trekker and environmentalist Ori Gutin was the latest of these efforts and the first that puts manufacturers at the center of the mess. It covered two of the most popular Himalayan treks, Roopkund and Hampta Pass, which are 765 kilometers apart, and in two different states. The results weren’t shocking if you consider our love for Maggi in the mountains.
13 companies, including Parle, Mondelez, Perfetti, Britannia, Mars, PepsiCo and Haldirams, among others, accounted for 77.5% of the total waste collected. But 20.2% of all waste collected from both locations was from Nestle, “meaning that nearly 1 out of every 5 pieces of identifiable trash in the Himalayas is from Nestle”, as per the report. At No 2 is Parle, contributing 10.8% of waste. The report concludes: “Companies have no control over how consumers use their products. It is not the fault of Nestle, Parle, Mondelez International (makers of Cadbury) or any other company that their products are ending up as litter in the most beautiful mountain range in the world, slowly killing wildlife and vegetation, damaging waterways, and polluting the atmosphere when burned. However, that does not mean they cannot do something about it.”
So what can they do? The final report lists some measures: Develop waste management systems in rural Himalayan villages. Facilitate programs to educate locals not to litter. Hire mule drivers to collect waste from shops out in the middle of the mountain treks. Hire people to remove the mass amounts of waste already strewn about the Himalayas. However, these companies, despite immense resources at their disposal, haven’t exactly stepped up to do any of the above, the report concludes.
When Brand Equity spoke to Lakshmi Selvakumaran, who heads the Green Trails Initiative at IndiaHikes, she told us one of the easier on-ground solutions is to encourage hungry trekkers and travellers to go for, say, egg bhurjee over Maggi. Eventually, one supposes, dhaba owners will have no reason to keep Maggi on the menu.
As people across the state of Maharashtra scrambled to secure and protect their cloth bags following the plastic bag ban, another notification by the state government could bring major FMCG companies under the Extended Producers Responsibility (EPR) model. In short, companies have to clean up after their consumers. This is what Nestle said in an email response to a query sent by BE: “Nestlé India shares the ambition that no plastic waste should end up discarded in the environment and believe that with the right approach it can be collected or recycled without a detrimental impact.” One of the approaches includes street plays. Nestle is collaborating with industry bodies and organisations like Indian Pollution Control Association (IPCA), NEPRA and Saahas Waste Management to conduct education and awareness programmes, workshops and street plays for waste pickers, waste dealers, traders and aggregator communities.
The country’s biggest FMCG company HUL had this to say; “We completely support the government initiative of significantly improving the state of plastic waste management in the country… At HUL, we have reduced one-third of our plastic packaging since 2010. Further, we are committed to using packaging which will be reusable, recyclable or compostable by 2025.” ITC’s solid waste management initiatives today extend to 10 states across the country, covering cities, towns, villages and even temples. Areas around religious sites often bear the brunt of environmental abuse at the hands of humans and religious events/festivals are known to leave in their wake a severely damaged ecosystem.
For now though, optimizing packaging design and packaging weight reduction are the key areas of focus for manufacturers. Says a Mondelez India spokesperson, “design simplification has been undertaken over the years to make our packaging single layer foil from three layer packaging.” PepsiCo India is also reducing the quantity of plastic . According to a company spokesperson, it has resized packaging for snacks master brands Lay’s and Kurkure. Pepsi is working with partners to develop sustainable, environmentally friendly packaging solutions and will pilot its first-ever 100% compostable, plant-based packaging for Lay's and Kurkure in the fourth quarter of 2018.
Savvy marketers have long used environmental planks to bolster their brands’ green credentials. However, national and state level legislations are quickly putting plastic waste management and reduction out of their reach. Says Ravi Agrawal, director, Toxics Link, “Many companies bring out a sustainability report. It’s something they can do voluntarily. But if it becomes a regulatory requirement then it’s no longer about doing good. It goes out of the ambit of ‘oh, I’m doing so many good things so why should I do this?’ It has a much more serious implication because it’s not voluntary. You need to set up the systems, redesign, rethink etc. It hits at the very heart of the product you sell.”
People like Selvakumaran think it’s about time companies clean up after their consumers and she’s keen to see what effect this will have on-ground. A 2017 post by Gutin asked in the headline ‘Maggi or the Mountains, What Will You Choose?’ The answer is not a 2-minute one. However, in the meantime, might we suggest an Eco Bag for every employee this Diwali? |
NVIDIA Corporation Corporate Office
Founded in 1993, NVIDIA Corporation is a global technology company which is best known for manufacturing GPUs or graphics processing units. Aside from GPUs, however, NVIDIA also offers several other products including PC platform chipsets, wireless communications processors, and digital media player software. Some of the most notable product families in NVIDIA\'s product portfolio include GeForce, Quadro, Tegra. Tesla, and nForce. |
#ifndef __ARCH_ARM_MACH_OMAP2_CM_REGBITS_34XX_H
#define __ARCH_ARM_MACH_OMAP2_CM_REGBITS_34XX_H
/*
* OMAP3430 Clock Management register bits
*
* Copyright (C) 2007-2008 Texas Instruments, Inc.
* Copyright (C) 2007-2008 Nokia Corporation
*
* Written by Paul Walmsley
*
* This program is free software; you can redistribute it and/or modify
* it under the terms of the GNU General Public License version 2 as
* published by the Free Software Foundation.
*/
/* Bits shared between registers */
/* CM_FCLKEN1_CORE and CM_ICLKEN1_CORE shared bits */
#define OMAP3430ES2_EN_MMC3_MASK (1 << 30)
#define OMAP3430ES2_EN_MMC3_SHIFT 30
#define OMAP3430_EN_MSPRO_MASK (1 << 23)
#define OMAP3430_EN_MSPRO_SHIFT 23
#define OMAP3430_EN_HDQ_MASK (1 << 22)
#define OMAP3430_EN_HDQ_SHIFT 22
#define OMAP3430ES1_EN_FSHOSTUSB_MASK (1 << 5)
#define OMAP3430ES1_EN_FSHOSTUSB_SHIFT 5
#define OMAP3430ES1_EN_D2D_MASK (1 << 3)
#define OMAP3430ES1_EN_D2D_SHIFT 3
#define OMAP3430_EN_SSI_MASK (1 << 0)
#define OMAP3430_EN_SSI_SHIFT 0
/* CM_FCLKEN3_CORE and CM_ICLKEN3_CORE shared bits */
#define OMAP3430ES2_EN_USBTLL_SHIFT 2
#define OMAP3430ES2_EN_USBTLL_MASK (1 << 2)
/* CM_FCLKEN_WKUP and CM_ICLKEN_WKUP shared bits */
#define OMAP3430_EN_WDT2_MASK (1 << 5)
#define OMAP3430_EN_WDT2_SHIFT 5
/* CM_ICLKEN_CAM, CM_FCLKEN_CAM shared bits */
#define OMAP3430_EN_CAM_MASK (1 << 0)
#define OMAP3430_EN_CAM_SHIFT 0
/* CM_FCLKEN_PER, CM_ICLKEN_PER shared bits */
#define OMAP3430_EN_WDT3_MASK (1 << 12)
#define OMAP3430_EN_WDT3_SHIFT 12
/* CM_CLKSEL2_EMU, CM_CLKSEL3_EMU shared bits */
#define OMAP3430_OVERRIDE_ENABLE_MASK (1 << 19)
/* Bits specific to each register */
/* CM_FCLKEN_IVA2 */
#define OMAP3430_CM_FCLKEN_IVA2_EN_IVA2_MASK (1 << 0)
#define OMAP3430_CM_FCLKEN_IVA2_EN_IVA2_SHIFT 0
/* CM_CLKEN_PLL_IVA2 */
#define OMAP3430_IVA2_DPLL_RAMPTIME_SHIFT 8
#define OMAP3430_IVA2_DPLL_RAMPTIME_MASK (0x3 << 8)
#define OMAP3430_IVA2_DPLL_FREQSEL_SHIFT 4
#define OMAP3430_IVA2_DPLL_FREQSEL_MASK (0xf << 4)
#define OMAP3430_EN_IVA2_DPLL_DRIFTGUARD_SHIFT 3
#define OMAP3430_EN_IVA2_DPLL_DRIFTGUARD_MASK (1 << 3)
#define OMAP3430_EN_IVA2_DPLL_SHIFT 0
#define OMAP3430_EN_IVA2_DPLL_MASK (0x7 << 0)
/* CM_IDLEST_IVA2 */
#define OMAP3430_ST_IVA2_MASK (1 << 0)
/* CM_IDLEST_PLL_IVA2 */
#define OMAP3430_ST_IVA2_CLK_SHIFT 0
#define OMAP3430_ST_IVA2_CLK_MASK (1 << 0)
/* CM_AUTOIDLE_PLL_IVA2 */
#define OMAP3430_AUTO_IVA2_DPLL_SHIFT 0
#define OMAP3430_AUTO_IVA2_DPLL_MASK (0x7 << 0)
/* CM_CLKSEL1_PLL_IVA2 */
#define OMAP3430_IVA2_CLK_SRC_SHIFT 19
#define OMAP3430_IVA2_CLK_SRC_MASK (0x3 << 19)
#define OMAP3430_IVA2_DPLL_MULT_SHIFT 8
#define OMAP3430_IVA2_DPLL_MULT_MASK (0x7ff << 8)
#define OMAP3430_IVA2_DPLL_DIV_SHIFT 0
#define OMAP3430_IVA2_DPLL_DIV_MASK (0x7f << 0)
/* CM_CLKSEL2_PLL_IVA2 */
#define OMAP3430_IVA2_DPLL_CLKOUT_DIV_SHIFT 0
#define OMAP3430_IVA2_DPLL_CLKOUT_DIV_MASK (0x1f << 0)
/* CM_CLKSTCTRL_IVA2 */
#define OMAP3430_CLKTRCTRL_IVA2_SHIFT 0
#define OMAP3430_CLKTRCTRL_IVA2_MASK (0x3 << 0)
/* CM_CLKSTST_IVA2 */
#define OMAP3430_CLKACTIVITY_IVA2_SHIFT 0
#define OMAP3430_CLKACTIVITY_IVA2_MASK (1 << 0)
/* CM_REVISION specific bits */
/* CM_SYSCONFIG specific bits */
/* CM_CLKEN_PLL_MPU */
#define OMAP3430_MPU_DPLL_RAMPTIME_SHIFT 8
#define OMAP3430_MPU_DPLL_RAMPTIME_MASK (0x3 << 8)
#define OMAP3430_MPU_DPLL_FREQSEL_SHIFT 4
#define OMAP3430_MPU_DPLL_FREQSEL_MASK (0xf << 4)
#define OMAP3430_EN_MPU_DPLL_DRIFTGUARD_SHIFT 3
#define OMAP3430_EN_MPU_DPLL_DRIFTGUARD_MASK (1 << 3)
#define OMAP3430_EN_MPU_DPLL_SHIFT 0
#define OMAP3430_EN_MPU_DPLL_MASK (0x7 << 0)
/* CM_IDLEST_MPU */
#define OMAP3430_ST_MPU_MASK (1 << 0)
/* CM_IDLEST_PLL_MPU */
#define OMAP3430_ST_MPU_CLK_SHIFT 0
#define OMAP3430_ST_MPU_CLK_MASK (1 << 0)
/* CM_AUTOIDLE_PLL_MPU */
#define OMAP3430_AUTO_MPU_DPLL_SHIFT 0
#define OMAP3430_AUTO_MPU_DPLL_MASK (0x7 << 0)
/* CM_CLKSEL1_PLL_MPU */
#define OMAP3430_MPU_CLK_SRC_SHIFT 19
#define OMAP3430_MPU_CLK_SRC_MASK (0x3 << 19)
#define OMAP3430_MPU_DPLL_MULT_SHIFT 8
#define OMAP3430_MPU_DPLL_MULT_MASK (0x7ff << 8)
#define OMAP3430_MPU_DPLL_DIV_SHIFT 0
#define OMAP3430_MPU_DPLL_DIV_MASK (0x7f << 0)
/* CM_CLKSEL2_PLL_MPU */
#define OMAP3430_MPU_DPLL_CLKOUT_DIV_SHIFT 0
#define OMAP3430_MPU_DPLL_CLKOUT_DIV_MASK (0x1f << 0)
/* CM_CLKSTCTRL_MPU */
#define OMAP3430_CLKTRCTRL_MPU_SHIFT 0
#define OMAP3430_CLKTRCTRL_MPU_MASK (0x3 << 0)
/* CM_CLKSTST_MPU */
#define OMAP3430_CLKACTIVITY_MPU_SHIFT 0
#define OMAP3430_CLKACTIVITY_MPU_MASK (1 << 0)
/* CM_FCLKEN1_CORE specific bits */
#define OMAP3430_EN_MODEM_MASK (1 << 31)
#define OMAP3430_EN_MODEM_SHIFT 31
/* CM_ICLKEN1_CORE specific bits */
#define OMAP3430_EN_ICR_MASK (1 << 29)
#define OMAP3430_EN_ICR_SHIFT 29
#define OMAP3430_EN_AES2_MASK (1 << 28)
#define OMAP3430_EN_AES2_SHIFT 28
#define OMAP3430_EN_SHA12_MASK (1 << 27)
#define OMAP3430_EN_SHA12_SHIFT 27
#define OMAP3430_EN_DES2_MASK (1 << 26)
#define OMAP3430_EN_DES2_SHIFT 26
#define OMAP3430ES1_EN_FAC_MASK (1 << 8)
#define OMAP3430ES1_EN_FAC_SHIFT 8
#define OMAP3430_EN_MAILBOXES_MASK (1 << 7)
#define OMAP3430_EN_MAILBOXES_SHIFT 7
#define OMAP3430_EN_OMAPCTRL_MASK (1 << 6)
#define OMAP3430_EN_OMAPCTRL_SHIFT 6
#define OMAP3430_EN_SAD2D_MASK (1 << 3)
#define OMAP3430_EN_SAD2D_SHIFT 3
#define OMAP3430_EN_SDRC_MASK (1 << 1)
#define OMAP3430_EN_SDRC_SHIFT 1
/* AM35XX specific CM_ICLKEN1_CORE bits */
#define AM35XX_EN_IPSS_MASK (1 << 4)
#define AM35XX_EN_IPSS_SHIFT 4
#define AM35XX_EN_UART4_MASK (1 << 23)
#define AM35XX_EN_UART4_SHIFT 23
/* CM_ICLKEN2_CORE */
#define OMAP3430_EN_PKA_MASK (1 << 4)
#define OMAP3430_EN_PKA_SHIFT 4
#define OMAP3430_EN_AES1_MASK (1 << 3)
#define OMAP3430_EN_AES1_SHIFT 3
#define OMAP3430_EN_RNG_MASK (1 << 2)
#define OMAP3430_EN_RNG_SHIFT 2
#define OMAP3430_EN_SHA11_MASK (1 << 1)
#define OMAP3430_EN_SHA11_SHIFT 1
#define OMAP3430_EN_DES1_MASK (1 << 0)
#define OMAP3430_EN_DES1_SHIFT 0
/* CM_ICLKEN3_CORE */
#define OMAP3430_EN_MAD2D_SHIFT 3
#define OMAP3430_EN_MAD2D_MASK (1 << 3)
/* CM_FCLKEN3_CORE specific bits */
#define OMAP3430ES2_EN_TS_SHIFT 1
#define OMAP3430ES2_EN_TS_MASK (1 << 1)
#define OMAP3430ES2_EN_CPEFUSE_SHIFT 0
#define OMAP3430ES2_EN_CPEFUSE_MASK (1 << 0)
/* CM_IDLEST1_CORE specific bits */
#define OMAP3430ES2_ST_MMC3_SHIFT 30
#define OMAP3430ES2_ST_MMC3_MASK (1 << 30)
#define OMAP3430_ST_ICR_SHIFT 29
#define OMAP3430_ST_ICR_MASK (1 << 29)
#define OMAP3430_ST_AES2_SHIFT 28
#define OMAP3430_ST_AES2_MASK (1 << 28)
#define OMAP3430_ST_SHA12_SHIFT 27
#define OMAP3430_ST_SHA12_MASK (1 << 27)
#define OMAP3430_ST_DES2_SHIFT 26
#define OMAP3430_ST_DES2_MASK (1 << 26)
#define OMAP3430_ST_MSPRO_SHIFT 23
#define OMAP3430_ST_MSPRO_MASK (1 << 23)
#define OMAP3430_ST_HDQ_SHIFT 22
#define OMAP3430_ST_HDQ_MASK (1 << 22)
#define OMAP3430ES1_ST_FAC_SHIFT 8
#define OMAP3430ES1_ST_FAC_MASK (1 << 8)
#define OMAP3430ES2_ST_SSI_IDLE_SHIFT 8
#define OMAP3430ES2_ST_SSI_IDLE_MASK (1 << 8)
#define OMAP3430_ST_MAILBOXES_SHIFT 7
#define OMAP3430_ST_MAILBOXES_MASK (1 << 7)
#define OMAP3430_ST_OMAPCTRL_SHIFT 6
#define OMAP3430_ST_OMAPCTRL_MASK (1 << 6)
#define OMAP3430_ST_SDMA_SHIFT 2
#define OMAP3430_ST_SDMA_MASK (1 << 2)
#define OMAP3430_ST_SDRC_SHIFT 1
#define OMAP3430_ST_SDRC_MASK (1 << 1)
#define OMAP3430_ST_SSI_STDBY_SHIFT 0
#define OMAP3430_ST_SSI_STDBY_MASK (1 << 0)
/* AM35xx specific CM_IDLEST1_CORE bits */
#define AM35XX_ST_IPSS_SHIFT 5
#define AM35XX_ST_IPSS_MASK (1 << 5)
/* CM_IDLEST2_CORE */
#define OMAP3430_ST_PKA_SHIFT 4
#define OMAP3430_ST_PKA_MASK (1 << 4)
#define OMAP3430_ST_AES1_SHIFT 3
#define OMAP3430_ST_AES1_MASK (1 << 3)
#define OMAP3430_ST_RNG_SHIFT 2
#define OMAP3430_ST_RNG_MASK (1 << 2)
#define OMAP3430_ST_SHA11_SHIFT 1
#define OMAP3430_ST_SHA11_MASK (1 << 1)
#define OMAP3430_ST_DES1_SHIFT 0
#define OMAP3430_ST_DES1_MASK (1 << 0)
/* CM_IDLEST3_CORE */
#define OMAP3430ES2_ST_USBTLL_SHIFT 2
#define OMAP3430ES2_ST_USBTLL_MASK (1 << 2)
#define OMAP3430ES2_ST_CPEFUSE_SHIFT 0
#define OMAP3430ES2_ST_CPEFUSE_MASK (1 << 0)
/* CM_AUTOIDLE1_CORE */
#define OMAP3430_AUTO_MODEM_MASK (1 << 31)
#define OMAP3430_AUTO_MODEM_SHIFT 31
#define OMAP3430ES2_AUTO_MMC3_MASK (1 << 30)
#define OMAP3430ES2_AUTO_MMC3_SHIFT 30
#define OMAP3430ES2_AUTO_ICR_MASK (1 << 29)
#define OMAP3430ES2_AUTO_ICR_SHIFT 29
#define OMAP3430_AUTO_AES2_MASK (1 << 28)
#define OMAP3430_AUTO_AES2_SHIFT 28
#define OMAP3430_AUTO_SHA12_MASK (1 << 27)
#define OMAP3430_AUTO_SHA12_SHIFT 27
#define OMAP3430_AUTO_DES2_MASK (1 << 26)
#define OMAP3430_AUTO_DES2_SHIFT 26
#define OMAP3430_AUTO_MMC2_MASK (1 << 25)
#define OMAP3430_AUTO_MMC2_SHIFT 25
#define OMAP3430_AUTO_MMC1_MASK (1 << 24)
#define OMAP3430_AUTO_MMC1_SHIFT 24
#define OMAP3430_AUTO_MSPRO_MASK (1 << 23)
#define OMAP3430_AUTO_MSPRO_SHIFT 23
#define OMAP3430_AUTO_HDQ_MASK (1 << 22)
#define OMAP3430_AUTO_HDQ_SHIFT 22
#define OMAP3430_AUTO_MCSPI4_MASK (1 << 21)
#define OMAP3430_AUTO_MCSPI4_SHIFT 21
#define OMAP3430_AUTO_MCSPI3_MASK (1 << 20)
#define OMAP3430_AUTO_MCSPI3_SHIFT 20
#define OMAP3430_AUTO_MCSPI2_MASK (1 << 19)
#define OMAP3430_AUTO_MCSPI2_SHIFT 19
#define OMAP3430_AUTO_MCSPI1_MASK (1 << 18)
#define OMAP3430_AUTO_MCSPI1_SHIFT 18
#define OMAP3430_AUTO_I2C3_MASK (1 << 17)
#define OMAP3430_AUTO_I2C3_SHIFT 17
#define OMAP3430_AUTO_I2C2_MASK (1 << 16)
#define OMAP3430_AUTO_I2C2_SHIFT 16
#define OMAP3430_AUTO_I2C1_MASK (1 << 15)
#define OMAP3430_AUTO_I2C1_SHIFT 15
#define OMAP3430_AUTO_UART2_MASK (1 << 14)
#define OMAP3430_AUTO_UART2_SHIFT 14
#define OMAP3430_AUTO_UART1_MASK (1 << 13)
#define OMAP3430_AUTO_UART1_SHIFT 13
#define OMAP3430_AUTO_GPT11_MASK (1 << 12)
#define OMAP3430_AUTO_GPT11_SHIFT 12
#define OMAP3430_AUTO_GPT10_MASK (1 << 11)
#define OMAP3430_AUTO_GPT10_SHIFT 11
#define OMAP3430_AUTO_MCBSP5_MASK (1 << 10)
#define OMAP3430_AUTO_MCBSP5_SHIFT 10
#define OMAP3430_AUTO_MCBSP1_MASK (1 << 9)
#define OMAP3430_AUTO_MCBSP1_SHIFT 9
#define OMAP3430ES1_AUTO_FAC_MASK (1 << 8)
#define OMAP3430ES1_AUTO_FAC_SHIFT 8
#define OMAP3430_AUTO_MAILBOXES_MASK (1 << 7)
#define OMAP3430_AUTO_MAILBOXES_SHIFT 7
#define OMAP3430_AUTO_OMAPCTRL_MASK (1 << 6)
#define OMAP3430_AUTO_OMAPCTRL_SHIFT 6
#define OMAP3430ES1_AUTO_FSHOSTUSB_MASK (1 << 5)
#define OMAP3430ES1_AUTO_FSHOSTUSB_SHIFT 5
#define OMAP3430_AUTO_HSOTGUSB_MASK (1 << 4)
#define OMAP3430_AUTO_HSOTGUSB_SHIFT 4
#define OMAP3430ES1_AUTO_D2D_MASK (1 << 3)
#define OMAP3430ES1_AUTO_D2D_SHIFT 3
#define OMAP3430_AUTO_SAD2D_MASK (1 << 3)
#define OMAP3430_AUTO_SAD2D_SHIFT 3
#define OMAP3430_AUTO_SSI_MASK (1 << 0)
#define OMAP3430_AUTO_SSI_SHIFT 0
/* CM_AUTOIDLE2_CORE */
#define OMAP3430_AUTO_PKA_MASK (1 << 4)
#define OMAP3430_AUTO_PKA_SHIFT 4
#define OMAP3430_AUTO_AES1_MASK (1 << 3)
#define OMAP3430_AUTO_AES1_SHIFT 3
#define OMAP3430_AUTO_RNG_MASK (1 << 2)
#define OMAP3430_AUTO_RNG_SHIFT 2
#define OMAP3430_AUTO_SHA11_MASK (1 << 1)
#define OMAP3430_AUTO_SHA11_SHIFT 1
#define OMAP3430_AUTO_DES1_MASK (1 << 0)
#define OMAP3430_AUTO_DES1_SHIFT 0
/* CM_AUTOIDLE3_CORE */
#define OMAP3430ES2_AUTO_USBHOST (1 << 0)
#define OMAP3430ES2_AUTO_USBHOST_SHIFT 0
#define OMAP3430ES2_AUTO_USBTLL (1 << 2)
#define OMAP3430ES2_AUTO_USBTLL_SHIFT 2
#define OMAP3430ES2_AUTO_USBTLL_MASK (1 << 2)
#define OMAP3430_AUTO_MAD2D_SHIFT 3
#define OMAP3430_AUTO_MAD2D_MASK (1 << 3)
/* CM_CLKSEL_CORE */
#define OMAP3430_CLKSEL_SSI_SHIFT 8
#define OMAP3430_CLKSEL_SSI_MASK (0xf << 8)
#define OMAP3430_CLKSEL_GPT11_MASK (1 << 7)
#define OMAP3430_CLKSEL_GPT11_SHIFT 7
#define OMAP3430_CLKSEL_GPT10_MASK (1 << 6)
#define OMAP3430_CLKSEL_GPT10_SHIFT 6
#define OMAP3430ES1_CLKSEL_FSHOSTUSB_SHIFT 4
#define OMAP3430ES1_CLKSEL_FSHOSTUSB_MASK (0x3 << 4)
#define OMAP3430_CLKSEL_L4_SHIFT 2
#define OMAP3430_CLKSEL_L4_MASK (0x3 << 2)
#define OMAP3430_CLKSEL_L3_SHIFT 0
#define OMAP3430_CLKSEL_L3_MASK (0x3 << 0)
#define OMAP3630_CLKSEL_96M_SHIFT 12
#define OMAP3630_CLKSEL_96M_MASK (0x3 << 12)
/* CM_CLKSTCTRL_CORE */
#define OMAP3430ES1_CLKTRCTRL_D2D_SHIFT 4
#define OMAP3430ES1_CLKTRCTRL_D2D_MASK (0x3 << 4)
#define OMAP3430_CLKTRCTRL_L4_SHIFT 2
#define OMAP3430_CLKTRCTRL_L4_MASK (0x3 << 2)
#define OMAP3430_CLKTRCTRL_L3_SHIFT 0
#define OMAP3430_CLKTRCTRL_L3_MASK (0x3 << 0)
/* CM_CLKSTST_CORE */
#define OMAP3430ES1_CLKACTIVITY_D2D_SHIFT 2
#define OMAP3430ES1_CLKACTIVITY_D2D_MASK (1 << 2)
#define OMAP3430_CLKACTIVITY_L4_SHIFT 1
#define OMAP3430_CLKACTIVITY_L4_MASK (1 << 1)
#define OMAP3430_CLKACTIVITY_L3_SHIFT 0
#define OMAP3430_CLKACTIVITY_L3_MASK (1 << 0)
/* CM_FCLKEN_GFX */
#define OMAP3430ES1_EN_3D_MASK (1 << 2)
#define OMAP3430ES1_EN_3D_SHIFT 2
#define OMAP3430ES1_EN_2D_MASK (1 << 1)
#define OMAP3430ES1_EN_2D_SHIFT 1
/* CM_ICLKEN_GFX specific bits */
/* CM_IDLEST_GFX specific bits */
/* CM_CLKSEL_GFX specific bits */
/* CM_SLEEPDEP_GFX specific bits */
/* CM_CLKSTCTRL_GFX */
#define OMAP3430ES1_CLKTRCTRL_GFX_SHIFT 0
#define OMAP3430ES1_CLKTRCTRL_GFX_MASK (0x3 << 0)
/* CM_CLKSTST_GFX */
#define OMAP3430ES1_CLKACTIVITY_GFX_SHIFT 0
#define OMAP3430ES1_CLKACTIVITY_GFX_MASK (1 << 0)
/* CM_FCLKEN_SGX */
#define OMAP3430ES2_CM_FCLKEN_SGX_EN_SGX_SHIFT 1
#define OMAP3430ES2_CM_FCLKEN_SGX_EN_SGX_MASK (1 << 1)
/* CM_IDLEST_SGX */
#define OMAP3430ES2_ST_SGX_SHIFT 1
#define OMAP3430ES2_ST_SGX_MASK (1 << 1)
/* CM_ICLKEN_SGX */
#define OMAP3430ES2_CM_ICLKEN_SGX_EN_SGX_SHIFT 0
#define OMAP3430ES2_CM_ICLKEN_SGX_EN_SGX_MASK (1 << 0)
/* CM_CLKSEL_SGX */
#define OMAP3430ES2_CLKSEL_SGX_SHIFT 0
#define OMAP3430ES2_CLKSEL_SGX_MASK (0x7 << 0)
/* CM_CLKSTCTRL_SGX */
#define OMAP3430ES2_CLKTRCTRL_SGX_SHIFT 0
#define OMAP3430ES2_CLKTRCTRL_SGX_MASK (0x3 << 0)
/* CM_CLKSTST_SGX */
#define OMAP3430ES2_CLKACTIVITY_SGX_SHIFT 0
#define OMAP3430ES2_CLKACTIVITY_SGX_MASK (1 << 0)
/* CM_FCLKEN_WKUP specific bits */
#define OMAP3430ES2_EN_USIMOCP_SHIFT 9
#define OMAP3430ES2_EN_USIMOCP_MASK (1 << 9)
/* CM_ICLKEN_WKUP specific bits */
#define OMAP3430_EN_WDT1_MASK (1 << 4)
#define OMAP3430_EN_WDT1_SHIFT 4
#define OMAP3430_EN_32KSYNC_MASK (1 << 2)
#define OMAP3430_EN_32KSYNC_SHIFT 2
/* CM_IDLEST_WKUP specific bits */
#define OMAP3430ES2_ST_USIMOCP_SHIFT 9
#define OMAP3430ES2_ST_USIMOCP_MASK (1 << 9)
#define OMAP3430_ST_WDT2_SHIFT 5
#define OMAP3430_ST_WDT2_MASK (1 << 5)
#define OMAP3430_ST_WDT1_SHIFT 4
#define OMAP3430_ST_WDT1_MASK (1 << 4)
#define OMAP3430_ST_32KSYNC_SHIFT 2
#define OMAP3430_ST_32KSYNC_MASK (1 << 2)
/* CM_AUTOIDLE_WKUP */
#define OMAP3430ES2_AUTO_USIMOCP_MASK (1 << 9)
#define OMAP3430ES2_AUTO_USIMOCP_SHIFT 9
#define OMAP3430_AUTO_WDT2_MASK (1 << 5)
#define OMAP3430_AUTO_WDT2_SHIFT 5
#define OMAP3430_AUTO_WDT1_MASK (1 << 4)
#define OMAP3430_AUTO_WDT1_SHIFT 4
#define OMAP3430_AUTO_GPIO1_MASK (1 << 3)
#define OMAP3430_AUTO_GPIO1_SHIFT 3
#define OMAP3430_AUTO_32KSYNC_MASK (1 << 2)
#define OMAP3430_AUTO_32KSYNC_SHIFT 2
#define OMAP3430_AUTO_GPT12_MASK (1 << 1)
#define OMAP3430_AUTO_GPT12_SHIFT 1
#define OMAP3430_AUTO_GPT1_MASK (1 << 0)
#define OMAP3430_AUTO_GPT1_SHIFT 0
/* CM_CLKSEL_WKUP */
#define OMAP3430ES2_CLKSEL_USIMOCP_MASK (0xf << 3)
#define OMAP3430_CLKSEL_RM_SHIFT 1
#define OMAP3430_CLKSEL_RM_MASK (0x3 << 1)
#define OMAP3430_CLKSEL_GPT1_SHIFT 0
#define OMAP3430_CLKSEL_GPT1_MASK (1 << 0)
/* CM_CLKEN_PLL */
#define OMAP3430_PWRDN_EMU_PERIPH_SHIFT 31
#define OMAP3430_PWRDN_CAM_SHIFT 30
#define OMAP3430_PWRDN_DSS1_SHIFT 29
#define OMAP3430_PWRDN_TV_SHIFT 28
#define OMAP3430_PWRDN_96M_SHIFT 27
#define OMAP3430_PERIPH_DPLL_RAMPTIME_SHIFT 24
#define OMAP3430_PERIPH_DPLL_RAMPTIME_MASK (0x3 << 24)
#define OMAP3430_PERIPH_DPLL_FREQSEL_SHIFT 20
#define OMAP3430_PERIPH_DPLL_FREQSEL_MASK (0xf << 20)
#define OMAP3430_EN_PERIPH_DPLL_DRIFTGUARD_SHIFT 19
#define OMAP3430_EN_PERIPH_DPLL_DRIFTGUARD_MASK (1 << 19)
#define OMAP3430_EN_PERIPH_DPLL_SHIFT 16
#define OMAP3430_EN_PERIPH_DPLL_MASK (0x7 << 16)
#define OMAP3430_PWRDN_EMU_CORE_SHIFT 12
#define OMAP3430_CORE_DPLL_RAMPTIME_SHIFT 8
#define OMAP3430_CORE_DPLL_RAMPTIME_MASK (0x3 << 8)
#define OMAP3430_CORE_DPLL_FREQSEL_SHIFT 4
#define OMAP3430_CORE_DPLL_FREQSEL_MASK (0xf << 4)
#define OMAP3430_EN_CORE_DPLL_DRIFTGUARD_SHIFT 3
#define OMAP3430_EN_CORE_DPLL_DRIFTGUARD_MASK (1 << 3)
#define OMAP3430_EN_CORE_DPLL_SHIFT 0
#define OMAP3430_EN_CORE_DPLL_MASK (0x7 << 0)
/* CM_CLKEN2_PLL */
#define OMAP3430ES2_EN_PERIPH2_DPLL_LPMODE_SHIFT 10
#define OMAP3430ES2_PERIPH2_DPLL_RAMPTIME_MASK (0x3 << 8)
#define OMAP3430ES2_PERIPH2_DPLL_FREQSEL_SHIFT 4
#define OMAP3430ES2_PERIPH2_DPLL_FREQSEL_MASK (0xf << 4)
#define OMAP3430ES2_EN_PERIPH2_DPLL_DRIFTGUARD_SHIFT 3
#define OMAP3430ES2_EN_PERIPH2_DPLL_SHIFT 0
#define OMAP3430ES2_EN_PERIPH2_DPLL_MASK (0x7 << 0)
/* CM_IDLEST_CKGEN */
#define OMAP3430_ST_54M_CLK_MASK (1 << 5)
#define OMAP3430_ST_12M_CLK_MASK (1 << 4)
#define OMAP3430_ST_48M_CLK_MASK (1 << 3)
#define OMAP3430_ST_96M_CLK_MASK (1 << 2)
#define OMAP3430_ST_PERIPH_CLK_SHIFT 1
#define OMAP3430_ST_PERIPH_CLK_MASK (1 << 1)
#define OMAP3430_ST_CORE_CLK_SHIFT 0
#define OMAP3430_ST_CORE_CLK_MASK (1 << 0)
/* CM_IDLEST2_CKGEN */
#define OMAP3430ES2_ST_USIM_CLK_SHIFT 2
#define OMAP3430ES2_ST_USIM_CLK_MASK (1 << 2)
#define OMAP3430ES2_ST_120M_CLK_SHIFT 1
#define OMAP3430ES2_ST_120M_CLK_MASK (1 << 1)
#define OMAP3430ES2_ST_PERIPH2_CLK_SHIFT 0
#define OMAP3430ES2_ST_PERIPH2_CLK_MASK (1 << 0)
/* CM_AUTOIDLE_PLL */
#define OMAP3430_AUTO_PERIPH_DPLL_SHIFT 3
#define OMAP3430_AUTO_PERIPH_DPLL_MASK (0x7 << 3)
#define OMAP3430_AUTO_CORE_DPLL_SHIFT 0
#define OMAP3430_AUTO_CORE_DPLL_MASK (0x7 << 0)
/* CM_AUTOIDLE2_PLL */
#define OMAP3430ES2_AUTO_PERIPH2_DPLL_SHIFT 0
#define OMAP3430ES2_AUTO_PERIPH2_DPLL_MASK (0x7 << 0)
/* CM_CLKSEL1_PLL */
/* Note that OMAP3430_CORE_DPLL_CLKOUT_DIV_MASK was (0x3 << 27) on 3430ES1 */
#define OMAP3430_CORE_DPLL_CLKOUT_DIV_SHIFT 27
#define OMAP3430_CORE_DPLL_CLKOUT_DIV_MASK (0x1f << 27)
#define OMAP3430_CORE_DPLL_MULT_SHIFT 16
#define OMAP3430_CORE_DPLL_MULT_MASK (0x7ff << 16)
#define OMAP3430_CORE_DPLL_DIV_SHIFT 8
#define OMAP3430_CORE_DPLL_DIV_MASK (0x7f << 8)
#define OMAP3430_SOURCE_96M_SHIFT 6
#define OMAP3430_SOURCE_96M_MASK (1 << 6)
#define OMAP3430_SOURCE_54M_SHIFT 5
#define OMAP3430_SOURCE_54M_MASK (1 << 5)
#define OMAP3430_SOURCE_48M_SHIFT 3
#define OMAP3430_SOURCE_48M_MASK (1 << 3)
/* CM_CLKSEL2_PLL */
#define OMAP3430_PERIPH_DPLL_MULT_SHIFT 8
#define OMAP3430_PERIPH_DPLL_MULT_MASK (0x7ff << 8)
#define OMAP3630_PERIPH_DPLL_MULT_MASK (0xfff << 8)
#define OMAP3430_PERIPH_DPLL_DIV_SHIFT 0
#define OMAP3430_PERIPH_DPLL_DIV_MASK (0x7f << 0)
#define OMAP3630_PERIPH_DPLL_DCO_SEL_SHIFT 21
#define OMAP3630_PERIPH_DPLL_DCO_SEL_MASK (0x7 << 21)
#define OMAP3630_PERIPH_DPLL_SD_DIV_SHIFT 24
#define OMAP3630_PERIPH_DPLL_SD_DIV_MASK (0xff << 24)
/* CM_CLKSEL3_PLL */
#define OMAP3430_DIV_96M_SHIFT 0
#define OMAP3430_DIV_96M_MASK (0x1f << 0)
#define OMAP3630_DIV_96M_MASK (0x3f << 0)
/* CM_CLKSEL4_PLL */
#define OMAP3430ES2_PERIPH2_DPLL_MULT_SHIFT 8
#define OMAP3430ES2_PERIPH2_DPLL_MULT_MASK (0x7ff << 8)
#define OMAP3430ES2_PERIPH2_DPLL_DIV_SHIFT 0
#define OMAP3430ES2_PERIPH2_DPLL_DIV_MASK (0x7f << 0)
/* CM_CLKSEL5_PLL */
#define OMAP3430ES2_DIV_120M_SHIFT 0
#define OMAP3430ES2_DIV_120M_MASK (0x1f << 0)
/* CM_CLKOUT_CTRL */
#define OMAP3430_CLKOUT2_EN_SHIFT 7
#define OMAP3430_CLKOUT2_EN_MASK (1 << 7)
#define OMAP3430_CLKOUT2_DIV_SHIFT 3
#define OMAP3430_CLKOUT2_DIV_MASK (0x7 << 3)
#define OMAP3430_CLKOUT2SOURCE_SHIFT 0
#define OMAP3430_CLKOUT2SOURCE_MASK (0x3 << 0)
/* CM_FCLKEN_DSS */
#define OMAP3430_EN_TV_MASK (1 << 2)
#define OMAP3430_EN_TV_SHIFT 2
#define OMAP3430_EN_DSS2_MASK (1 << 1)
#define OMAP3430_EN_DSS2_SHIFT 1
#define OMAP3430_EN_DSS1_MASK (1 << 0)
#define OMAP3430_EN_DSS1_SHIFT 0
/* CM_ICLKEN_DSS */
#define OMAP3430_CM_ICLKEN_DSS_EN_DSS_MASK (1 << 0)
#define OMAP3430_CM_ICLKEN_DSS_EN_DSS_SHIFT 0
/* CM_IDLEST_DSS */
#define OMAP3430ES2_ST_DSS_IDLE_SHIFT 1
#define OMAP3430ES2_ST_DSS_IDLE_MASK (1 << 1)
#define OMAP3430ES2_ST_DSS_STDBY_SHIFT 0
#define OMAP3430ES2_ST_DSS_STDBY_MASK (1 << 0)
#define OMAP3430ES1_ST_DSS_SHIFT 0
#define OMAP3430ES1_ST_DSS_MASK (1 << 0)
/* CM_AUTOIDLE_DSS */
#define OMAP3430_AUTO_DSS_MASK (1 << 0)
#define OMAP3430_AUTO_DSS_SHIFT 0
/* CM_CLKSEL_DSS */
#define OMAP3430_CLKSEL_TV_SHIFT 8
#define OMAP3430_CLKSEL_TV_MASK (0x1f << 8)
#define OMAP3630_CLKSEL_TV_MASK (0x3f << 8)
#define OMAP3430_CLKSEL_DSS1_SHIFT 0
#define OMAP3430_CLKSEL_DSS1_MASK (0x1f << 0)
#define OMAP3630_CLKSEL_DSS1_MASK (0x3f << 0)
/* CM_SLEEPDEP_DSS specific bits */
/* CM_CLKSTCTRL_DSS */
#define OMAP3430_CLKTRCTRL_DSS_SHIFT 0
#define OMAP3430_CLKTRCTRL_DSS_MASK (0x3 << 0)
/* CM_CLKSTST_DSS */
#define OMAP3430_CLKACTIVITY_DSS_SHIFT 0
#define OMAP3430_CLKACTIVITY_DSS_MASK (1 << 0)
/* CM_FCLKEN_CAM specific bits */
#define OMAP3430_EN_CSI2_MASK (1 << 1)
#define OMAP3430_EN_CSI2_SHIFT 1
/* CM_ICLKEN_CAM specific bits */
/* CM_IDLEST_CAM */
#define OMAP3430_ST_CAM_MASK (1 << 0)
/* CM_AUTOIDLE_CAM */
#define OMAP3430_AUTO_CAM_MASK (1 << 0)
#define OMAP3430_AUTO_CAM_SHIFT 0
/* CM_CLKSEL_CAM */
#define OMAP3430_CLKSEL_CAM_SHIFT 0
#define OMAP3430_CLKSEL_CAM_MASK (0x1f << 0)
#define OMAP3630_CLKSEL_CAM_MASK (0x3f << 0)
/* CM_SLEEPDEP_CAM specific bits */
/* CM_CLKSTCTRL_CAM */
#define OMAP3430_CLKTRCTRL_CAM_SHIFT 0
#define OMAP3430_CLKTRCTRL_CAM_MASK (0x3 << 0)
/* CM_CLKSTST_CAM */
#define OMAP3430_CLKACTIVITY_CAM_SHIFT 0
#define OMAP3430_CLKACTIVITY_CAM_MASK (1 << 0)
/* CM_FCLKEN_PER specific bits */
/* CM_ICLKEN_PER specific bits */
/* CM_IDLEST_PER */
#define OMAP3430_ST_WDT3_SHIFT 12
#define OMAP3430_ST_WDT3_MASK (1 << 12)
#define OMAP3430_ST_MCBSP4_SHIFT 2
#define OMAP3430_ST_MCBSP4_MASK (1 << 2)
#define OMAP3430_ST_MCBSP3_SHIFT 1
#define OMAP3430_ST_MCBSP3_MASK (1 << 1)
#define OMAP3430_ST_MCBSP2_SHIFT 0
#define OMAP3430_ST_MCBSP2_MASK (1 << 0)
/* CM_AUTOIDLE_PER */
#define OMAP3630_AUTO_UART4_MASK (1 << 18)
#define OMAP3630_AUTO_UART4_SHIFT 18
#define OMAP3430_AUTO_GPIO6_MASK (1 << 17)
#define OMAP3430_AUTO_GPIO6_SHIFT 17
#define OMAP3430_AUTO_GPIO5_MASK (1 << 16)
#define OMAP3430_AUTO_GPIO5_SHIFT 16
#define OMAP3430_AUTO_GPIO4_MASK (1 << 15)
#define OMAP3430_AUTO_GPIO4_SHIFT 15
#define OMAP3430_AUTO_GPIO3_MASK (1 << 14)
#define OMAP3430_AUTO_GPIO3_SHIFT 14
#define OMAP3430_AUTO_GPIO2_MASK (1 << 13)
#define OMAP3430_AUTO_GPIO2_SHIFT 13
#define OMAP3430_AUTO_WDT3_MASK (1 << 12)
#define OMAP3430_AUTO_WDT3_SHIFT 12
#define OMAP3430_AUTO_UART3_MASK (1 << 11)
#define OMAP3430_AUTO_UART3_SHIFT 11
#define OMAP3430_AUTO_GPT9_MASK (1 << 10)
#define OMAP3430_AUTO_GPT9_SHIFT 10
#define OMAP3430_AUTO_GPT8_MASK (1 << 9)
#define OMAP3430_AUTO_GPT8_SHIFT 9
#define OMAP3430_AUTO_GPT7_MASK (1 << 8)
#define OMAP3430_AUTO_GPT7_SHIFT 8
#define OMAP3430_AUTO_GPT6_MASK (1 << 7)
#define OMAP3430_AUTO_GPT6_SHIFT 7
#define OMAP3430_AUTO_GPT5_MASK (1 << 6)
#define OMAP3430_AUTO_GPT5_SHIFT 6
#define OMAP3430_AUTO_GPT4_MASK (1 << 5)
#define OMAP3430_AUTO_GPT4_SHIFT 5
#define OMAP3430_AUTO_GPT3_MASK (1 << 4)
#define OMAP3430_AUTO_GPT3_SHIFT 4
#define OMAP3430_AUTO_GPT2_MASK (1 << 3)
#define OMAP3430_AUTO_GPT2_SHIFT 3
#define OMAP3430_AUTO_MCBSP4_MASK (1 << 2)
#define OMAP3430_AUTO_MCBSP4_SHIFT 2
#define OMAP3430_AUTO_MCBSP3_MASK (1 << 1)
#define OMAP3430_AUTO_MCBSP3_SHIFT 1
#define OMAP3430_AUTO_MCBSP2_MASK (1 << 0)
#define OMAP3430_AUTO_MCBSP2_SHIFT 0
/* CM_CLKSEL_PER */
#define OMAP3430_CLKSEL_GPT9_MASK (1 << 7)
#define OMAP3430_CLKSEL_GPT9_SHIFT 7
#define OMAP3430_CLKSEL_GPT8_MASK (1 << 6)
#define OMAP3430_CLKSEL_GPT8_SHIFT 6
#define OMAP3430_CLKSEL_GPT7_MASK (1 << 5)
#define OMAP3430_CLKSEL_GPT7_SHIFT 5
#define OMAP3430_CLKSEL_GPT6_MASK (1 << 4)
#define OMAP3430_CLKSEL_GPT6_SHIFT 4
#define OMAP3430_CLKSEL_GPT5_MASK (1 << 3)
#define OMAP3430_CLKSEL_GPT5_SHIFT 3
#define OMAP3430_CLKSEL_GPT4_MASK (1 << 2)
#define OMAP3430_CLKSEL_GPT4_SHIFT 2
#define OMAP3430_CLKSEL_GPT3_MASK (1 << 1)
#define OMAP3430_CLKSEL_GPT3_SHIFT 1
#define OMAP3430_CLKSEL_GPT2_MASK (1 << 0)
#define OMAP3430_CLKSEL_GPT2_SHIFT 0
/* CM_SLEEPDEP_PER specific bits */
#define OMAP3430_CM_SLEEPDEP_PER_EN_IVA2_MASK (1 << 2)
/* CM_CLKSTCTRL_PER */
#define OMAP3430_CLKTRCTRL_PER_SHIFT 0
#define OMAP3430_CLKTRCTRL_PER_MASK (0x3 << 0)
/* CM_CLKSTST_PER */
#define OMAP3430_CLKACTIVITY_PER_SHIFT 0
#define OMAP3430_CLKACTIVITY_PER_MASK (1 << 0)
/* CM_CLKSEL1_EMU */
#define OMAP3430_DIV_DPLL4_SHIFT 24
#define OMAP3430_DIV_DPLL4_MASK (0x1f << 24)
#define OMAP3630_DIV_DPLL4_MASK (0x3f << 24)
#define OMAP3430_DIV_DPLL3_SHIFT 16
#define OMAP3430_DIV_DPLL3_MASK (0x1f << 16)
#define OMAP3430_CLKSEL_TRACECLK_SHIFT 11
#define OMAP3430_CLKSEL_TRACECLK_MASK (0x7 << 11)
#define OMAP3430_CLKSEL_PCLK_SHIFT 8
#define OMAP3430_CLKSEL_PCLK_MASK (0x7 << 8)
#define OMAP3430_CLKSEL_PCLKX2_SHIFT 6
#define OMAP3430_CLKSEL_PCLKX2_MASK (0x3 << 6)
#define OMAP3430_CLKSEL_ATCLK_SHIFT 4
#define OMAP3430_CLKSEL_ATCLK_MASK (0x3 << 4)
#define OMAP3430_TRACE_MUX_CTRL_SHIFT 2
#define OMAP3430_TRACE_MUX_CTRL_MASK (0x3 << 2)
#define OMAP3430_MUX_CTRL_SHIFT 0
#define OMAP3430_MUX_CTRL_MASK (0x3 << 0)
/* CM_CLKSTCTRL_EMU */
#define OMAP3430_CLKTRCTRL_EMU_SHIFT 0
#define OMAP3430_CLKTRCTRL_EMU_MASK (0x3 << 0)
/* CM_CLKSTST_EMU */
#define OMAP3430_CLKACTIVITY_EMU_SHIFT 0
#define OMAP3430_CLKACTIVITY_EMU_MASK (1 << 0)
/* CM_CLKSEL2_EMU specific bits */
#define OMAP3430_CORE_DPLL_EMU_MULT_SHIFT 8
#define OMAP3430_CORE_DPLL_EMU_MULT_MASK (0x7ff << 8)
#define OMAP3430_CORE_DPLL_EMU_DIV_SHIFT 0
#define OMAP3430_CORE_DPLL_EMU_DIV_MASK (0x7f << 0)
/* CM_CLKSEL3_EMU specific bits */
#define OMAP3430_PERIPH_DPLL_EMU_MULT_SHIFT 8
#define OMAP3430_PERIPH_DPLL_EMU_MULT_MASK (0x7ff << 8)
#define OMAP3430_PERIPH_DPLL_EMU_DIV_SHIFT 0
#define OMAP3430_PERIPH_DPLL_EMU_DIV_MASK (0x7f << 0)
/* CM_POLCTRL */
#define OMAP3430_CLKOUT2_POL_MASK (1 << 0)
/* CM_IDLEST_NEON */
#define OMAP3430_ST_NEON_MASK (1 << 0)
/* CM_CLKSTCTRL_NEON */
#define OMAP3430_CLKTRCTRL_NEON_SHIFT 0
#define OMAP3430_CLKTRCTRL_NEON_MASK (0x3 << 0)
/* CM_FCLKEN_USBHOST */
#define OMAP3430ES2_EN_USBHOST2_SHIFT 1
#define OMAP3430ES2_EN_USBHOST2_MASK (1 << 1)
#define OMAP3430ES2_EN_USBHOST1_SHIFT 0
#define OMAP3430ES2_EN_USBHOST1_MASK (1 << 0)
/* CM_ICLKEN_USBHOST */
#define OMAP3430ES2_EN_USBHOST_SHIFT 0
#define OMAP3430ES2_EN_USBHOST_MASK (1 << 0)
/* CM_IDLEST_USBHOST */
#define OMAP3430ES2_ST_USBHOST_IDLE_SHIFT 1
#define OMAP3430ES2_ST_USBHOST_IDLE_MASK (1 << 1)
#define OMAP3430ES2_ST_USBHOST_STDBY_SHIFT 0
#define OMAP3430ES2_ST_USBHOST_STDBY_MASK (1 << 0)
/* CM_AUTOIDLE_USBHOST */
#define OMAP3430ES2_AUTO_USBHOST_SHIFT 0
#define OMAP3430ES2_AUTO_USBHOST_MASK (1 << 0)
/* CM_SLEEPDEP_USBHOST */
#define OMAP3430ES2_EN_MPU_SHIFT 1
#define OMAP3430ES2_EN_MPU_MASK (1 << 1)
#define OMAP3430ES2_EN_IVA2_SHIFT 2
#define OMAP3430ES2_EN_IVA2_MASK (1 << 2)
/* CM_CLKSTCTRL_USBHOST */
#define OMAP3430ES2_CLKTRCTRL_USBHOST_SHIFT 0
#define OMAP3430ES2_CLKTRCTRL_USBHOST_MASK (3 << 0)
/* CM_CLKSTST_USBHOST */
#define OMAP3430ES2_CLKACTIVITY_USBHOST_SHIFT 0
#define OMAP3430ES2_CLKACTIVITY_USBHOST_MASK (1 << 0)
/*
*
*/
/* OMAP3XXX CM_CLKSTCTRL_*.CLKTRCTRL_* register bit values */
#define OMAP34XX_CLKSTCTRL_DISABLE_AUTO 0x0
#define OMAP34XX_CLKSTCTRL_FORCE_SLEEP 0x1
#define OMAP34XX_CLKSTCTRL_FORCE_WAKEUP 0x2
#define OMAP34XX_CLKSTCTRL_ENABLE_AUTO 0x3
#endif
|
---
abstract: 'Let $(X,\mu)$ be a probability space, $G$ a countable amenable group and $(F_n)_n$ a left Følner sequence in $G$. This paper analyzes the non-conventional ergodic averages $$\frac{1}{|F_n|}\sum_{g \in F_n}\prod_{i=1}^d (f_i\circ T_1^g\cdots T_i^g)$$ associated to a commuting tuple of $\mu$-preserving actions $T_1$, …, $T_d:G{\curvearrowright}X$ and $f_1$, …, $f_d \in L^\infty(\mu)$. We prove that these averages always converge in $\|\cdot\|_2$, and that they witness a multiple recurrence phenomenon when $f_1 = \ldots = f_d = 1_A$ for a non-negligible set $A\subseteq X$. This proves a conjecture of Bergelson, McCutcheon and Zhang. The proof relies on an adaptation from earlier works of the machinery of sated extensions.'
author:
- |
<span style="font-variant:small-caps;">Tim Austin</span>[^1]\
\
\
\
bibliography:
- 'bibfile.bib'
---
Introduction
============
Let $(X,\mu)$ be a probability space, $G$ a countable amenable group, and $T_1$, …, $T_d:G{\curvearrowright}(X,\mu)$ a tuple of $\mu$-preserving actions of $G$ which commute, meaning that $$i\neq j \quad \Longrightarrow \quad T_i^gT_j^h = T_j^hT_i^g \quad \forall g,h \in G.$$ Also, let $(F_n)_n$ be a left Følner sequence of subsets of $G$; this will be fixed for the rest of the paper.
In this context, Bergelson, McCutcheon and Zhang have proposed in [@BerMcCZha97] the study of the non-conventional ergodic averages $$\begin{aligned}
\label{eq:Lambda}
{\Lambda}_n(f_1,\ldots,f_d) := \frac{1}{|F_n|}\sum_{g \in F_n}\prod_{i=1}^d(f_i\circ T_1^g\cdots T_i^g)\end{aligned}$$ for functions $f_1,\ldots,f_d \in L^\infty(\mu)$. These are an analog for commuting $G$-actions of the non-conventional averages for a commuting tuple of transformations, as introduced by Furstenberg and Katznelson [@FurKat78] for their proof of the multi-dimensional generalization of Szemerédi’s Theorem. Other analogs are possible, but the averages above seem to show the most promise for building a theory: this is discussed in [@BerMcCZha97] and, for topological dynamics, in [@BerHin92], where some relevant counterexamples are presented.
The main results of [@BerMcCZha97] are that these averages converge, and that one has an associated multiple recurrence phenomenon, when $d=2$. The first of these conclusions can be extended to arbitrary $d$ along the lines of Walsh’s recent proof of convergence for polynomial nilpotent non-conventional averages ([@Walsh12]).
**Theorem A.***In the setting above, the functional averages ${\Lambda}_n(f_1,\ldots,f_d)$ converge in the norm of $L^2(\mu)$ for all $f_1$, …, $f_d \in L^\infty(\mu)$.*
Zorin-Kranich has made the necessary extensions to Walsh’s argument in [@Zor13]. However, that proof gives essentially no information about the limiting function, and in particular does not seem to enable a proof of multiple recurrence. The present paper gives both a new proof of Theorem A, and a proof of the following.
**Theorem B.***If $\mu(A) > 0$, then $$\begin{gathered}
\lim_{n{\longrightarrow}\infty}\int_X {\Lambda}_n(1_A,\ldots,1_A)\,{\mathrm{d}}\mu\\ = \lim_{n{\longrightarrow}\infty}\frac{1}{|F_n|}\sum_{g \in F_n}\mu\big(T_1^{g^{-1}}A\cap \cdots \cap (T_1^{g^{-1}}\cdots T_d^{g^{-1}})A\big) > 0.\end{gathered}$$ In particular, the set $$\big\{g \in G\,\big|\ \mu\big(T_1^{g^{-1}}A\cap \cdots \cap (T_1^{g^{-1}}\cdots T_d^{g^{-1}})A\big) > 0\big\}$$ has positive upper Banach density relative to $(F_n)_{n\geq 1}$.*
As in the classical case of [@FurKat78], this implies the following Szemerédi-type result for amenable groups.
If $E \subseteq G^d$ has positive upper Banach density relative to $(F_n^d)_{n\geq 1}$, then the set $$\begin{gathered}
\big\{g \in G\,\big|\ \exists (x_1,\ldots,x_d) \in G^d\\ \hbox{s.t.}\ \{(g^{-1}x_1,x_2,\ldots,x_d),\ldots,(g^{-1}x_1,\ldots,g^{-1}x_d)\} \subseteq E\big\}\end{gathered}$$ has positive upper Banach density relative to $(F_n)_{n\geq 1}$.
This deduction is quite standard, and can be found in [@BerMcCZha97].
Our proofs of Theorems A and B are descended from some work for commuting tuples of transformations: the proof of non-conventional-average convergence in [@Aus--nonconv], and that of multiple recurrence in [@Aus--newmultiSzem]. Both of those papers offered alternatives to earlier proofs, using new machinery for extending an initially-given probability-preserving action to another action under which the averages behave more simply. The present paper will adapt to commuting tuples of $G$-actions the notion of a ‘sated extension’, which forms the heart of the streamlined presentation of that machinery in [@Aus--thesis]. Further discussion of this method may be found in that reference.
The generalization of the notion of satedness is nontrivial, but fairly straightforward: see Section \[sec:func\] below. However, more serious difficulties appear in how it is applied. Heuristically, if a given system satisfies a satedness assumption, then, in any extension of that system, this constrains how some canonical ${\sigma}$-subalgebra ‘sits’ relative to the ${\sigma}$-algebra lifted from the original system. An appeal to satedness always relies on constructing a particular extension for which this constraint implies some other desired consequence. The specific constructions of system extensions used in [@Aus--nonconv; @Aus--newmultiSzem; @Aus--thesis] do not generalize to commuting actions of a non-Abelian group $G$. This is because they rely on the commutativity of the diagonal actions $T_i\times \cdots \times T_i$ of $G$ on $X^d$ with the ‘off-diagonal’ action generated by $$T_1^g\times \cdots \times (T_1^g\cdots T^g_d), \quad g \in G.$$
Thus, a key part of this paper is a new method of extending probability-preserving $G^d$-systems. It is based on a version of the Host-Kra self-joinings from [@HosKra05] and [@Hos09]. It also relies on a quite general result about probability-preserving systems, which may be of independent interest: Theorem \[thm:recoverG\] asserts that, given a probability-preserving action of a countable group and an extension of that action restricted to a subgroup, a compatible further extension may be found for the action of the whole group.
Developing ideas from [@HosKra05], we find that the asymptotic behaviour of our non-conventional averages can be estimated by certain integrals over these Host-Kra-like extensions (Theorem \[thm:ineq\]). On the other hand, a suitable satedness assumption on a system gives extra information on the structure of those extensions, and combining these facts then implies simplified behaviour for the non-conventional averages for that system. Finally, the existence of sated extensions for all systems (Theorem \[thm:sateds-exist\]) then enables proofs of convergence and multiple recurrence similar to those in [@Aus--nonconv] and [@Aus--newmultiSzem], respectively.
An interesting direction for further research is suggested by the work of Bergelson and McCutcheon in [@BerMcC07]. They study multiple recurrence phenomena similar to Theorem B when $d=3$, but without assuming that the group $G$ is amenable. As output, they prove that the set $$\big\{g \in G\,\big|\ \mu\big(T_1^{g^{-1}}A\cap (T_1^{g^{-1}}T_2^{g^{-1}} )A \cap (T_1^{g^{-1}}T_2^{g^{-1}} T_3^{g^{-1}})A\big) > 0\big\}$$ is ‘large’ in a sense adapted to non-amenable groups, in terms of certain special ultrafilters in the Stone-Čech compactification of $G$. In particular, their result implies that this set is syndetic in $G$. Could their methods be combined with those below to extend this result to larger values of $d$?
Generalities on actions and extensions
======================================
Preliminaries
-------------
If $d \in {\mathbb{N}}$ then $[d] := \{1,2,\ldots,d\}$, and more generally if $a,b \in {\mathbb{Z}}$ with $a \leq b$ then $$(a;b] = [a+1;b] = [a+1;b+1) = (a;b+1):= \{a+1,\ldots,b\}.$$ The power set of $[d]$ will be denoted ${\mathcal{P}}[d]$, and we let $\binom{[d]}{\geq p}:= \{e \in {\mathcal{P}}[d]\,|\ |e|\geq p\}$.
Next, if ${\mathcal{A}} \subseteq {\mathcal{P}}[d]$, then it is an **up-set** if $$a,b \in {\mathcal{A}} \quad \Longrightarrow \quad a\cup b \in{\mathcal{A}}.$$ The set $$\langle e \rangle := \{a \subseteq [d]\,|\ a \supseteq e\}$$ is an up-set for every $e \subseteq [d]$, and every up-set is a union of such examples. On the other hand, ${\mathcal{B}} \subseteq {\mathcal{P}}[d]$ is an **antichain** if $$a,b\in {\mathcal{B}} \quad \hbox{and} \quad a \subseteq b \quad \Longrightarrow \quad a = b.$$ Any up-set contains a unique anti-chain of minimal elements.
Standard notions from probability theory will be assumed throughout this paper. If $(X,\mu)$ is a probability space with ${\sigma}$-algebra ${\Sigma}$, and if $\Phi,{\Sigma}_1,{\Sigma}_2 \subseteq {\Sigma}$ are ${\sigma}$-subalgebras with $\Phi \subseteq {\Sigma}_1\cap {\Sigma}_2$, then ${\Sigma}_1$ and ${\Sigma}_2$ are **relatively independent** over $\Phi$ under $\mu$ if $$\int_X fg\,{\mathrm{d}}\mu = \int_X{\mathsf{E}}_\mu(f\,|\,\Phi){\mathsf{E}}_\mu(g\,|\,\Phi)\,{\mathrm{d}}\mu$$ whenever $f,g \in L^\infty(\mu)$ are ${\Sigma}_1$- and ${\Sigma}_2$-measurable, respectively. Relatedly, if $(X,\mu)$ is standard Borel, then on $X^2$ we may form the **relative product** measure $\mu\otimes_\Phi \mu$ over $\Phi$ by letting $x\mapsto \mu_x$ be a disintegration of $\mu$ over the ${\sigma}$-subalgebra $\Phi$ and then setting $$\mu\otimes_\Phi\mu := \int_X \mu_x\otimes \mu_x\,\mu({\mathrm{d}}x).$$
If $G$ is a countable group, then a **$G$-space** is a triple $(X,\mu,T)$ consisting of a probability space $(X,\mu)$ and an action $T:G{\curvearrowright}X$ by measurable, $\mu$-preserving transformations. Passing to an isomorphic model if necessary, we will henceforth assume that $(X,\mu)$ is standard Borel. Often, a $G$-space will also be denoted by a boldface letter such as ${\mathbf{X}}$.
If ${\mathbf{X}}= (X,\mu,T)$ is a $G$-space, then ${\Sigma}_X$ or ${\Sigma}_{\mathbf{X}}$ will denote its ${\sigma}$-algebra of $\mu$-measurable sets. A **factor** of such a $G$-space is a ${\sigma}$-subalgebra $\Phi \leq {\Sigma}_{\mathbf{X}}$ which is globally $T$-invariant, meaning that $$A \in \Phi \quad \Longleftrightarrow \quad T^g(A) \in \Phi \quad \forall g \in G.$$ Relatedly, a **factor map** from one $G$-space ${\mathbf{X}}= (X,\mu,T)$ to another ${\mathbf{Y}}= (Y,\nu,S)$ is a measurable map $\pi:X{\longrightarrow}Y$ such that $\pi_\ast\mu = \nu$ and $S^g\circ \pi = \pi \circ T^g$ for all $g \in G$, $\mu$-a.e. In this case, $\pi^{-1}({\Sigma}_{\mathbf{Y}})$ is a factor of ${\mathbf{X}}$. Such a factor map is also referred to as a **$G$-extension**, and ${\mathbf{X}}$ may be referred to as an **extension** of ${\mathbf{Y}}$.
On the other hand, if ${\mathbf{X}}= (X,\mu,T)$ is a $G$-space and $H \leq G$, then the **$H$-subaction** of ${\mathbf{X}}$, denoted ${\mathbf{X}}^{{\!\upharpoonright}H} = (X,\mu,T^{{\!\upharpoonright}H})$, is the $H$-space with probability space $(X,\mu)$ and action given by the transformations $(T^h)_{h \in H}$. The associated ${\sigma}$-algebra of $H$-almost-invariant sets, $$\{A \in {\Sigma}_X\,|\ \mu(T^h(A)\triangle A) = 0\ \forall h \in H\},$$ will be denoted by either ${\Sigma}_{\mathbf{X}}^H$ or ${\Sigma}_{\mathbf{X}}^{T^{{\!\upharpoonright}H}}$, as seems appropriate.
In the sequel, we will often consider a space $(X,\mu)$ endowed with a commuting tuple $T_1$, …, $T_d$ of $G$-actions. Slightly abusively, we shall simply refer to this as a ‘$G^d$-action’ or ‘$G^d$-space’ (leaving the distinguished $G$-subactions to the reader’s understanding), and denote it by $(X,\mu,T_1,\ldots,T_d)$. Also, if $(X,\mu,T_1,\ldots,T_d)$ is a $G^d$-space and $a,b \in [d]$ with $a \leq b$, then we shall frequently use the notation $$T_{[a;b]}^g = T_{(a-1;b]}^g = T_{[a,;b+1)}^g := T_a^gT_{a+1}^g \cdots T_b^g \quad \forall g \in G.$$ Because the actions $T_i$ commute, this defines another $G$-action for each $a,b$.
Actions of groups and their subgroups
-------------------------------------
Our approach to Theorems A and B is descended from the notions of ‘pleasant’ and ‘isotropized’ extensions. These were introduced in [@Aus--nonconv] and [@Aus--newmultiSzem] respectively, where they were used to give new proofs of the analogs of Theorems A and B for commuting tuples of single transformations.
Subsequently, the more general notion of ‘sated’ extensions was introduced in [@Aus--thesis]. It simplifies and clarifies those earlier ideas as special cases. In this paper we shall show how ‘sated’ extensions can be adapted to the non-Abelian setting of Theorems A and B.
An important new difficulty is that we will need to consider certain natural ${\sigma}$-subalgebras of a probability-preserving $G$-spaces which need not be factors in case $G$ is not Abelian. This subsection focuses on a key tool for handling this situation, which seems to be of interest in its own right. Given $H \leq G$, it enables one to turn an extension of an $H$-subaction into an extension of a whole $G$-action. Satedness will then be introduced in the next subsection.
\[thm:recoverG\] Suppose $H \leq G$ is an inclusion of countable groups, that ${\mathbf{X}}= (X,\mu,T)$ is a $G$-space and that $${\mathbf{Y}}= (Y,\nu,S) \stackrel{{\beta}}{{\longrightarrow}} {\mathbf{X}}^{{\!\upharpoonright}H}$$ is an extension of $H$-spaces. Then there is an extension of $G$-spaces ${\widetilde{{\mathbf{X}}}}\stackrel{\pi}{{\longrightarrow}} {\mathbf{X}}$ which admits a commutative diagram of $H$-spaces
$\phantom{i}$
This theorem was proved for Abelian $G$ and $H$ in [@Aus--lindeppleasant1 Subsection 3.2]. The non-Abelian case is fairly similar.
We shall construct the new $G$-space ${\widetilde{{\mathbf{X}}}}$ by a kind of ‘relativized’ co-induction of ${\mathbf{Y}}$ over ${\mathbf{X}}$, and then show that it has the necessary properties.
The construction of a suitable standard Borel dynamical system $({\widetilde{X}},{\widetilde{T}})$, deferring the construction of the measure, is easy. Let $${\widetilde{X}} := \{(y_g)_g \in Y^G\,|\ y_{gh} = S^{h^{-1}}y_g\ \hbox{and}\ {\beta}(y_g) = T^{g^{-1}}{\beta}(y_e)\ \forall g\in G, h \in H\},$$ and let ${\widetilde{T}}:G{\curvearrowright}{\widetilde{X}}$ be the restriction to ${\widetilde{X}}$ of the left-regular representation: $${\widetilde{T}}^k((y_g)_{g \in G}) = (y_{k^{-1}g})_{g\in G}$$ (it is easily seen that this preserves ${\widetilde{X}} \subseteq Y^G$).
Also, let $${\alpha}:{\widetilde{X}}{\longrightarrow}Y: (y_g)_g\mapsto y_e$$ and $$\pi:= {\beta}\circ {\alpha}:{\widetilde{X}}{\longrightarrow}X: (y_g)_g \mapsto {\beta}(y_e).$$
These maps fit into a commutative diagram of the desired shape by construction. It remains to specify a suitable measure ${\widetilde{\mu}}$ on ${\widetilde{X}}$. It will be constructed as a measure on $Y^G$ for which ${\widetilde{\mu}}({\widetilde{X}}) = 1$.
Let $X{\longrightarrow}\Pr\,Y:x\mapsto\nu_x$ be a disintegration of $\nu$ over the map ${\beta}:Y{\longrightarrow}X$. Using this, define new probability measures for each $x \in X$ as follows. First, for each $g \in G$, define ${\widetilde{\nu}}_{g,x}$ on $Y^{gH}$ by $${\widetilde{\nu}}_{g,x} := \int_Y \delta_{(S^{h^{-1}}y)_{gh \in gH}}\,\nu_x({\mathrm{d}}y).$$ Now let $C \subseteq G$ be a cross-section for the space $G/H$ of left-cosets, identify $Y^G = \prod_{c \in C}Y^{cH}$, and on this product define $${\widetilde{\nu}}_x := \bigotimes_{c \in C}{\widetilde{\nu}}_{c,T^{c^{-1}}x}.$$ One may easily write down the finite-dimensional marginals of ${\widetilde{\nu}}_x$ directly. If $c_1,\ldots,c_m \in C$, and $h_{i,1}$, …, $h_{i,n_i} \in H$ for each $i \leq m$, and also $A_{i,j} \in {\Sigma}_Y$ for all $i \leq m$ and $j\leq n_i$, then $$\begin{aligned}
\label{eq:margs}
&&{\widetilde{\nu}}_x\big\{(y_g)_g\,\big|\ y_{c_ih_{i,j}} \in A_{i,j}\ \forall i\leq m,\,j\leq n_i\big\} \nonumber\\
&&= \prod_{i=1}^m{\widetilde{\nu}}_{c_i,T^{c_i^{-1}}x}\big\{(y_{c_ih})_{h \in H}\,\big|\ y_{c_ih_{i,j}} \in A_{i,j}\ \forall j \leq n_i\big\} \nonumber\\
&&= \prod_{i=1}^m\nu_{T^{c_i^{-1}}x}\big(S^{h_{i,1}}(A_{i,1})\cap \cdots \cap S^{h_{i,n_i}}(A_{i,n_i})\big).\end{aligned}$$
The following basic properties of ${\widetilde{\nu}}_x$ are now easily checked:
- If $g_1H = g_2H$, say with $g_1 = g_2h_1$, and $x \in X$, then $$\begin{aligned}
{\widetilde{\nu}}_{g_1,T^{g_1^{-1}}x} &=& \int_Y \delta_{(S^{h^{-1}}y)_{g_1h \in g_1H}}\ \nu_{T^{g_1^{-1}}x}({\mathrm{d}}y)\\ &=& \int_Y \delta_{(S^{h^{-1}}y)_{g_2h_1h \in g_2H}}\ \nu_{T^{h_1^{-1}}T^{g_2^{-1}}x}({\mathrm{d}}y)\\
&=& \int_Y \delta_{(S^{h^{-1}}y)_{g_2h_1h \in g_2H}}\ (S^{h_1^{-1}}_\ast\nu_{T^{g_2^{-1}}x})({\mathrm{d}}y)\\
&=& \int_Y \delta_{(S^{h^{-1}}S^{h_1^{-1}}y)_{g_2h_1h \in g_2H}}\ \nu_{T^{g_2^{-1}}x}({\mathrm{d}}y)\\
&=& {\widetilde{\nu}}_{g_2,T^{g_2^{-1}}x}.\end{aligned}$$ It follows that ${\widetilde{\nu}}_x$ does not depend on the choice of cross-section $C$, and the formula (\[eq:margs\]) holds with any choice of $C$.
- For each $g \in G$, say $g = ch \in cH$, the marginal of ${\widetilde{\nu}}_x$ on coordinate $g$ is $$S^{h^{-1}}_\ast\nu_{T^{c^{-1}}x} = \nu_{T^{h^{-1}}T^{c^{-1}}x} = \nu_{T^{g^{-1}}x}.$$
- If $(y_g)_g$ is sampled at random from ${\widetilde{\nu}}_x$ and $g \in cH$, then $y_c$ a.s. determines the whole tuple $(y_{ch})_{ch \in cH}$: specifically, $$y_{ch} = S^{h^{-1}}y_c \quad \hbox{a.s.}$$
It also holds that if $g_1$, …, $g_m$ lie in distinct left-cosets of $H$ and $(y_g)_g \sim {\widetilde{\nu}}_x$, then the coordinates $y_{g_1}$, …, $y_{g_m}$ are independent, but we will not need this fact.
Finally, let $${\widetilde{\mu}} := \int_X {\widetilde{\nu}}_x\,\mu({\mathrm{d}}x).$$
Recalling the definition of ${\widetilde{X}}$, properties (ii) and (iii) above imply that ${\widetilde{\nu}}_x({\widetilde{X}}) = 1$ for all $x$, and hence also ${\widetilde{\mu}}({\widetilde{X}}) = 1$.
We have seen that the left-regular representation defines an action of $G$ on ${\widetilde{X}}$, and the required triangular diagram commutes by the definition of $\pi$, so it remains to check the following.
- (The new $G$-space $({\widetilde{X}},{\widetilde{\mu}},{\widetilde{T}})$ is probability-preserving.) Suppose that $k \in G$ and $x \in X$, that $c_1,\ldots,c_m \in C$, that $h_{i,1}$, …, $h_{i,n_i} \in H$ for each $i \leq m$, and that $A_{i,j} \in {\Sigma}_Y$ for all $i \leq m$ and $j\leq n_i$. Then one has $$\begin{aligned}
&&{\widetilde{T}}^k_\ast{\widetilde{\nu}}_x\big\{(y_g)_g\,\big|\ y_{c_ih_{i,j}} \in A_{i,j}\ \forall i\leq m,\,j\leq n_i\big\} \\
&&=
{\widetilde{\nu}}_x\big\{{\widetilde{T}}^{k^{-1}}(y_g)_g\,\big|\ y_{c_ih_{i,j}} \in A_{i,j}\ \forall i\leq m,\,j\leq n_i\big\} \\
&&=
{\widetilde{\nu}}_x\big\{(y_g)_g\,\big|\ y_{k^{-1}c_ih_{i,j}} \in A_{i,j}\ \forall i\leq m,\,j\leq n_i\big\}\end{aligned}$$ Since $C$ is a cross-section of $G/H$, so is $k^{-1}C$. We may therefore apply (\[eq:margs\]) with the cross-section $k^{-1}C$ to deduce that the above is equal to $$\prod_{i=1}^m\nu_{T^{c_i^{-1}k}x}\big(S^{h_{i,1}}(A_{i,1})\cap \cdots \cap S^{h_{i,n_i}}(A_{i,n_i})\big).$$ On the other hand, equation (\[eq:margs\]) applied with the cross-section $C$ gives that this is equal to $${\widetilde{\nu}}_{T^kx}\big\{(y_g)_g\,\big|\ y_{c_ih_{i,j}} \in A_{i,j}\ \forall i\leq m,\,j\leq n_i\big\}.$$ Therefore ${\widetilde{T}}^k_\ast{\widetilde{\nu}}_x = {\widetilde{\nu}}_{T^kx}$, and integrating this over $x$ gives ${\widetilde{T}}^k_\ast{\widetilde{\mu}} = {\widetilde{\mu}}$.
- (The map ${\alpha}$ defines a factor map of $H$-spaces.) If $h \in H$ and $(y_g)_g \in {\widetilde{X}}$, then $${\alpha}({\widetilde{T}}^h((y_g)_g)) = {\alpha}((y_{h^{-1}g})_g) = y_{h^{-1}} = S^hy_e = S^h{\alpha}((y_g)_g),$$ where the penultimate equality is given by property (iii) above. Also, property (ii) above gives that $${\alpha}_\ast{\widetilde{\mu}} = \int_X{\alpha}_\ast{\widetilde{\nu}}_x\,\mu({\mathrm{d}}x) = \int_X \nu_x\,\mu({\mathrm{d}}x) = \nu.$$
- (The map $\pi$ defines a factor map of $G$-spaces.) If $k \in G$ and $(y_g)_g \in {\widetilde{X}}$, then $$\pi({\widetilde{T}}^k((y_g)_g)) = {\beta}({\alpha}((y_{k^{-1}g})_g)) = {\beta}(y_{k^{-1}}).$$ If $x\in X$ and $(y_g)_g \sim {\widetilde{\nu}}_x$, then property (ii) above gives that $y_{k^{-1}} \sim \nu_{T^kx}$, and hence ${\beta}(y_{k^{-1}}) = T^kx = T^k{\beta}(y_e)$ a.s. Since this holds for every $x$, integrating over $x$ gives $$\pi({\widetilde{T}}^k((y_g)_g)) = T^k\pi((y_g)_g) \quad \hbox{a.s.}$$ Also, another appeal to property (ii) above gives $$\pi_\ast{\widetilde{\mu}} = \int_X \pi_\ast{\widetilde{\nu}}_x\,\mu({\mathrm{d}}x) = \int_X {\beta}_\ast\nu_x\,\mu({\mathrm{d}}x) = \int_X \delta_x\,\mu({\mathrm{d}}x) = \mu.$$
Functorial ${\sigma}$-subalgebras and subspaces, and satedness {#sec:func}
==============================================================
Given $G$, a **functorial ${\sigma}$-subalgebra of $G$-spaces** is a map ${\mathsf{F}}$ which to any $G$-space ${\mathbf{X}}= (X,\mu,T)$ assigns a $\mu$-complete ${\sigma}$-subalgebra $${\Sigma}^{\mathsf{F}}_{\mathbf{X}}\subseteq {\Sigma}_{\mathbf{X}},$$ and such that for any $G$-extension $\pi:{\mathbf{X}}{\longrightarrow}{\mathbf{Y}}$ one has $${\Sigma}^{\mathsf{F}}_{\mathbf{X}}\supseteq \pi^{-1}({\Sigma}^{\mathsf{F}}_{\mathbf{Y}}).$$
Similarly, a **functorial $L^2$-subspace of $G$-spaces** is a map ${\mathsf{V}}$ which to each $G$-space ${\mathbf{X}}= (X,\mu,T)$ assigns a closed subspace $${\mathsf{V}}_{\mathbf{X}}\leq L^2(\mu),$$ and such that for any $G$-extension $\pi:{\mathbf{X}}{\longrightarrow}{\mathbf{Y}}$ one has $${\mathsf{V}}_{\mathbf{X}}\geq {\mathsf{V}}_{\mathbf{Y}}\circ \pi := \{f\circ \pi\,|\ f \in {\mathsf{V}}_{\mathbf{Y}}\}.$$ In this setting, $P^{\mathsf{V}}_{\mathbf{X}}: L^2(\mu) {\longrightarrow}{\mathsf{V}}_{\mathbf{X}}$ will denote the orthogonal projection onto ${\mathsf{V}}_{\mathbf{X}}$.
The above behaviour relative to factors is called the **functoriality** of ${\mathsf{F}}$ or ${\mathsf{V}}$. Its first consequence is that ${\mathsf{F}}$ and ${\mathsf{V}}$ respect isomorphisms of $G$-spaces: if ${\alpha}:{\mathbf{X}}\stackrel{\cong}{{\longrightarrow}} {\mathbf{Y}}$, then $${\Sigma}^{\mathsf{F}}_{\mathbf{X}}= {\alpha}^{-1}({\Sigma}^{\mathsf{F}}_{\mathbf{Y}})$$ (where strict equality holds owing to the assumption that these ${\sigma}$-algebras are both $\mu$-complete) and $${\mathsf{V}}_{\mathbf{X}}= {\mathsf{V}}_{\mathbf{Y}}\circ {\alpha}.$$
If $H\leq G$ is any subgroup, then the map ${\mathbf{X}}\mapsto {\Sigma}^H_{\mathbf{X}}$ (the ${\sigma}$-subalgebra of $H$-almost-invariant sets) defines a functorial ${\sigma}$-subalgebra of $G$-spaces. In case $H \unlhd G$, this actually defines a factor of ${\mathbf{X}}$, but otherwise it may not: in general, one has $$T^g({\Sigma}^H_{\mathbf{X}}) = {\Sigma}^{gHg^{-1}}_{\mathbf{X}}.$$
This class of examples will provide the building blocks for all of the other functorial ${\sigma}$-subglebras that we meet later. [$\lhd$]{}
If ${\mathsf{F}}$ is a functorial ${\sigma}$-subalgebra of $G$-spaces, then setting $${\mathsf{V}}_{\mathbf{X}}:= L^2(\mu|{\Sigma}^{\mathsf{F}}_{\mathbf{X}})$$ defines a functorial $L^2$-subspace of $G$-spaces, where this denotes the subspace of $L^2(\mu)$ generated by the ${\Sigma}^{\mathsf{F}}_{\mathbf{X}}$-measurable functions. In this case, $P^{\mathsf{V}}_{\mathbf{X}}$ is the operator of conditional expectation onto ${\Sigma}^{\mathsf{F}}_{\mathbf{X}}$. However, not all functorial $L^2$-subspaces arise in this way. For instance, given any two functorial $L^2$-subspaces ${\mathsf{V}}_1$, ${\mathsf{V}}_2$ of $G$-spaces, a new functorial $L^2$-subspace may be defined by $${\mathsf{V}}_{\mathbf{X}}:= {\overline{{\mathsf{V}}_{1,{\mathbf{X}}} + {\mathsf{V}}_{2,{\mathbf{X}}}}}.$$ If $H_1$, $H_2 \leq G$, then this gives rise to the example $${\mathsf{V}}_{\mathbf{X}}:= {\overline{L^2(\mu|{\Sigma}^{H_1}_{\mathbf{X}}) + L^2(\mu|{\Sigma}^{H_2}_{\mathbf{X}})}}.$$ The elements of this subspace generate the functorial ${\sigma}$-algebra ${\Sigma}^{H_1}_{\mathbf{X}}\vee {\Sigma}^{H_2}_{{\mathbf{X}}}$, but in general one may have $${\overline{L^2(\mu|{\Sigma}^{H_1}_{\mathbf{X}}) + L^2(\mu|{\Sigma}^{H_2}_{\mathbf{X}})}} \lneqq L^2(\mu|{\Sigma}^{H_1}_{\mathbf{X}}\vee {\Sigma}^{H_2}_{\mathbf{X}}).$$
In fact, the functorial $L^2$-subspaces that appear later in this work will all correspond to functorial ${\sigma}$-subalgebras. However, the theory of satedness depends only on the subspace structure, so it seems appropriate to develop it in that generality.
To prepare for the next definition, recall that if ${\mathfrak{K}}_1,{\mathfrak{K}}_2 \leq {\mathfrak{H}}$ are two closed subspaces of a real Hilbert space, and ${\mathfrak{L}}\leq {\mathfrak{K}}_1 \cap {\mathfrak{K}}_2$ is a common further closed subspace, then ${\mathfrak{K}}_1$ and ${\mathfrak{K}}_2$ are **relatively orthogonal** over ${\mathfrak{L}}$ if $$\langle u,v\rangle = \langle P_{{\mathfrak{L}}}u,P_{{\mathfrak{L}}}v\rangle \quad \forall u \in {\mathfrak{K}}_1,\ v \in{\mathfrak{K}}_2,$$ where $P_{{\mathfrak{L}}}$ is the orthogonal projection onto ${\mathfrak{L}}$. This requires that in fact ${\mathfrak{L}}= {\mathfrak{K}}_1\cap {\mathfrak{K}}_2$, and is equivalent to asserting that $P_{{\mathfrak{K}}_2}u = P_{\mathfrak{L}}u$ for all $u \in {\mathfrak{K}}_1$, and vice-versa. Clearly it suffices to verify this for elements drawn from any dense subsets of ${\mathfrak{K}}_1$ and ${\mathfrak{K}}_2$.
Let ${\mathsf{V}}$ be a functorial $L^2$-subspace of $G$-spaces. A $G$-space ${\mathbf{X}}= (X,\mu,T)$ is **${\mathsf{V}}$-sated** if the following holds: for any $G$-extension ${\mathbf{Y}}= (Y,\nu,S)\stackrel{\xi}{{\longrightarrow}} (X,\mu,T)$, the subspaces $L^2(\mu)\circ \xi$ and ${\mathsf{V}}_{\mathbf{Y}}$ are relatively orthogonal over their common further subspace ${\mathsf{V}}_{\mathbf{X}}\circ \xi$.
More generally, a $G$-extension ${\widetilde{{\mathbf{X}}}}\stackrel{\pi}{{\longrightarrow}}{\mathbf{X}}$ is **relatively ${\mathsf{V}}$-sated** if the following holds: for any further $G$-extension ${\mathbf{Y}}\stackrel{\xi}{{\longrightarrow}}{\widetilde{{\mathbf{X}}}}$, the subspaces $L^2(\mu)\circ (\pi \circ \xi)$ and ${\mathsf{V}}_{\mathbf{Y}}$ are relatively orthogonal over ${\mathsf{V}}_{{\widetilde{{\mathbf{X}}}}}\circ \pi$.
Clearly a $G$-space ${\mathbf{X}}$ is ${\mathsf{V}}$-sated if and only if ${\mathbf{X}}\stackrel{{\mathrm{id}}}{{\longrightarrow}} {\mathbf{X}}$ is relatively ${\mathsf{V}}$-sated. In case ${\mathsf{V}}_{\mathbf{X}}= L^2(\mu|{\Sigma}^{\mathsf{F}}_{\mathbf{X}})$ for some functorial ${\sigma}$-algebra ${\mathsf{F}}$, one may write that a $G$-space or $G$-extension is **${\mathsf{F}}$-sated**, rather than ${\mathsf{V}}$-sated. For a $G$-space ${\mathbf{X}}= (X,\mu,T)$, this asserts that for any $G$-extension $\xi:{\mathbf{Y}}= (Y,\nu,S){\longrightarrow}{\mathbf{X}}$, the ${\sigma}$-subalgebras $$\xi^{-1}({\Sigma}_X) \quad \hbox{and} \quad {\Sigma}^{\mathsf{F}}_{\mathbf{Y}}$$ are relatively independent over $\xi^{-1}({\Sigma}^{\mathsf{F}}_{\mathbf{X}})$.
The key feature of satedness is that all $G$-spaces have sated extensions. This generalizes the corresponding result for satedness relative to idempotent classes ([@Aus--thesis Theorem 2.3.2]). The proof here will be a near-verbatim copy of that one, once we have the following auxiliary lemmas.
\[lem:bigger-extn-still-rel-sated\] If ${\widetilde{{\mathbf{X}}}}\stackrel{\pi}{{\longrightarrow}} {\mathbf{X}}$ is a relatively ${\mathsf{V}}$-sated $G$-extension, and ${\mathbf{Z}}= (Z,\theta,R)\stackrel{{\alpha}}{{\longrightarrow}} {\widetilde{{\mathbf{X}}}}$ is a further $G$-extension, then ${\mathbf{Z}}\stackrel{{\alpha}\circ \pi}{{\longrightarrow}} {\mathbf{X}}$ is also relatively ${\mathsf{V}}$-sated.
Suppose that ${\mathbf{Y}}= (Y,\nu,S)\stackrel{\xi}{{\longrightarrow}} {\mathbf{Z}}$ is another $G$-extension, and that $f \in L^2(\mu)$ and $g \in {\mathsf{V}}_{\mathbf{Y}}$. Then applying the definition of relative satedness to the composed extension ${\mathbf{Y}}\stackrel{{\alpha}\circ \xi}{{\longrightarrow}} {\widetilde{{\mathbf{X}}}}$ gives $$\int_Y(f\circ \pi\circ {\alpha}\circ \xi)\cdot g\,{\mathrm{d}}\nu = \int_Y (P^{\mathsf{V}}_{{\widetilde{{\mathbf{X}}}}}(f\circ\pi)\circ {\alpha}\circ \xi)\cdot g\,{\mathrm{d}}\nu.$$
This will turn into the required equality of inner products if we show that $$(P^{\mathsf{V}}_{{\widetilde{{\mathbf{X}}}}}(f\circ \pi))\circ {\alpha}= P^{\mathsf{V}}_{\mathbf{Z}}(f\circ \pi\circ {\alpha}).$$
However, in light of the inclusion ${\mathsf{V}}_{{\widetilde{{\mathbf{X}}}}}\circ {\alpha}\subseteq {\mathsf{V}}_{\mathbf{Z}}$ and standard properties of orthogonal projection, this is equivalent to the equality $$\int_Z(P^{\mathsf{V}}_{{\widetilde{{\mathbf{X}}}}}(f\circ \pi)\circ {\alpha})\cdot h\,{\mathrm{d}}\theta = \int_Z(f\circ \pi\circ {\alpha})\cdot h\,{\mathrm{d}}\theta \quad \forall h \in {\mathsf{V}}_{\mathbf{Z}},$$ and this is precisely the relative ${\mathsf{V}}$-satedness of $\pi$ applied to ${\alpha}$.
\[lem:inv-lim-sated\] If $$\cdots \stackrel{\pi_2}{{\longrightarrow}} {\mathbf{X}}_2 \stackrel{\pi_1}{{\longrightarrow}}{\mathbf{X}}_1 \stackrel{\pi_0}{{\longrightarrow}} {\mathbf{X}}_0$$ is an inverse sequence of $G$-spaces in which each $\pi_i$ is relatively ${\mathsf{V}}$-sated, and if ${\mathbf{X}}_\infty$, $(\psi_m)_m$ is the inverse limit of this sequence, then ${\mathbf{X}}_\infty$ is ${\mathsf{V}}$-sated.
First, all the resulting $G$-extensions ${\mathbf{X}}_\infty \stackrel{\psi_m}{{\longrightarrow}} {\mathbf{X}}_m$ are relatively ${\mathsf{V}}$-sated, because we may factorize $\psi_m = \pi_m\circ\psi_{m+1}$ and then apply Lemma \[lem:bigger-extn-still-rel-sated\]. However, this now implies that for any further $G$-extension ${\mathbf{Y}}\stackrel{\xi}{{\longrightarrow}} {\mathbf{X}}_\infty$ and for $\pi := {\mathrm{id}}_{{\widetilde{X}}}$, we have $$\int_Y (f\circ \xi)\cdot g\,{\mathrm{d}}\nu = \int_Y ((P^{\mathsf{V}}_{{\mathbf{X}}_\infty}f)\circ \xi)\cdot g\,{\mathrm{d}}\nu$$ for all $g \in {\mathsf{V}}_{\mathbf{Y}}$ and all $f \in \bigcup_{m\geq 1}(L^2(\mu_m)\circ \psi_m)$. Since this last union is dense in $L^2(\mu_\infty)$, this completes the proof.
\[thm:sateds-exist\] If ${\mathsf{V}}$ is a functorial $L^2$-subspace of $G$-spaces, then every $G$-space has a ${\mathsf{V}}$-sated extension.
Let ${\mathbf{X}}= (X,\mu,T)$ be a $G$-space.
*Step 1*We first show that ${\mathbf{X}}$ has a relatively ${\mathsf{V}}$-sated extension. This uses the same ‘energy increment’ argument as in [@Aus--thesis].
Let $\{f_r\,|\ r\geq 1\}$ be a countable dense subset of the unit ball of $L^2(\mu)$, and let $(r_i)_{i\geq 1}$ be a member of ${\mathbb{N}}^{\mathbb{N}}$ in which every non-negative integer appears infinitely often.
We will now construct an inverse sequence $({\mathbf{X}}_m)_{m\geq 0}$, $(\psi^m_k)_{m\geq k \geq 0}$ by the following recursion. First let ${\mathbf{X}}_0 := {\mathbf{X}}$. Then, supposing that for some $m_1 \geq 0$ we have already obtained $({\mathbf{X}}_m)_{m=0}^{m_1}$, $(\psi^m_k)_{m_1 \geq
m\geq k\geq 0}$, let $\psi^{m_1+1}_{m_1}:{\mathbf{X}}_{m_1+1}{\longrightarrow}{\mathbf{X}}_{m_1}$ be an extension such that the difference $$\|P^{\mathsf{V}}_{{\mathbf{X}}_{m_1+1}}(f_{r_{m_1}}\circ \psi^{m_1+1}_0)\|_2 - \|P^{\mathsf{V}}_{{\mathbf{X}}_{m_1}}(f_{r_{m_1}}\circ \psi^{m_1}_0\,)\|_2$$ is at least half its supremal possible value over all extensions of ${\mathbf{X}}_{m_1}$, where of course we let $\psi^{m_1+1}_0 := \psi^{m_1}_0\circ \psi^{m_1+1}_{m_1}$.
Let ${\mathbf{X}}_\infty$, $(\psi_m)_{m \geq 0}$ be the inverse limit of this sequence. We will show that ${\mathbf{X}}_\infty\stackrel{\psi_0}{{\longrightarrow}}{\mathbf{X}}$ is relatively ${\mathsf{V}}$-sated. Letting $\pi:{\mathbf{Y}}{\longrightarrow}{\mathbf{X}}_\infty$ be an arbitrary further extension, this is equivalent to showing that $$P^{\mathsf{V}}_{{\mathbf{Y}}}(f\circ\psi_0\circ \pi) =
P^{\mathsf{V}}_{{\mathbf{X}}_\infty}(f\circ \psi_0)\circ\pi \quad \forall f\in L^2(\mu).$$
It suffices to prove this for every $f_r$ in our previously-chosen dense subset. Also, since ${\mathsf{V}}_{{\mathbf{Y}}} \supseteq
{\mathsf{V}}_{{\mathbf{X}}_\infty}\circ \pi$, the result will follow if we only show that $$\|P^{\mathsf{V}}_{{\mathbf{Y}}}(f_r\circ\psi_0\circ\pi)\|_2 =
\|P^{\mathsf{V}}_{{\mathbf{X}}_\infty}(f_r\circ\psi_0)\|_2.$$ Suppose, for the sake of contradiction, that the left-hand norm here were strictly larger. The sequence of norms $$\|P^{\mathsf{V}}_{{\mathbf{X}}_m}(f_r\circ\psi^m_0)\|_2$$ is non-decreasing as $m{\longrightarrow}\infty$, and bounded above by $\|f_r\|_2$. Therefore it would follow that for some sufficiently large $m$ we would have $r_m = r$ (since each integer appears infinitely often as some $r_m$) but also $$\begin{gathered}
\|P^{\mathsf{V}}_{{\mathbf{X}}_{m+1}}(f_r\circ\psi^{m+1}_0)\|_2
- \|P^{\mathsf{V}}_{{\mathbf{X}}_m}(f_r\circ\psi^m_0)\|_2\\
< \frac{1}{2}\Big(\|P^{\mathsf{V}}_{{\mathbf{Y}}}(f_r\circ\psi_0\circ\pi)\|_2 - \|P^{\mathsf{V}}_{{\mathbf{X}}_\infty}(f\circ\psi_0)\|_2\Big)\\
\leq \frac{1}{2}\Big(\|P^{\mathsf{V}}_{{\mathbf{Y}}}(f_r\circ\psi_0\circ\pi)\|_2 - \|P^{\mathsf{V}}_{{\mathbf{X}}_m}(f\circ\psi^m_0)\|_2\Big).\end{gathered}$$ This would contradict the choice of ${\mathbf{X}}_{m+1}{\longrightarrow}{\mathbf{X}}_m$ in our construction above, so we must actually have the equality of $L^2$-norms required.
*Step 2*Iterating the construction of Step 1, we may let $$\cdots \stackrel{\pi_2}{{\longrightarrow}} {\mathbf{X}}_2 \stackrel{\pi_1}{{\longrightarrow}} {\mathbf{X}}_1 \stackrel{\pi_0}{{\longrightarrow}} {\mathbf{X}}$$ be an inverse seqeuence in which each extension $\pi_i$ is relatively ${\mathsf{V}}$-sated. Letting ${\mathbf{X}}_\infty$, $(\pi_m)_{m\geq 0}$ be its inverse limit, Lemma \[lem:inv-lim-sated\] completes the proof.
\[cor:mult-sateds-exist\] Let ${\mathsf{V}}_1$, ${\mathsf{V}}_2$, …be any countable family of functorial $L^2$-subspaces of $G$-spaces. Then every $G$-space has an extension which is simultaneously ${\mathsf{V}}_r$-sated for every $r$.
Let $(r_i)_i$ be an element of ${\mathbb{N}}^{\mathbb{N}}$ in which every positive integer appears infinitely often. By repeatedly implementing Theorem \[thm:sateds-exist\], let $$\cdots \stackrel{\pi_2}{{\longrightarrow}} {\mathbf{X}}_2 \stackrel{\pi_1}{{\longrightarrow}} {\mathbf{X}}_1 \stackrel{\pi_0}{{\longrightarrow}} {\mathbf{X}}$$ be an inverse sequence in which each ${\mathbf{X}}_i$ is ${\mathsf{V}}_{r_i}$-sated. Also, let $\pi^n_m := \pi_m\circ \cdots \circ \pi_{n-1}$ whenever $m < n$. Finally, let ${\mathbf{X}}_\infty$ be the inverse limit of this sequence. Then for each $r \geq 1$, there is an infinite subsequence $i_1(r) < i_2(r) < \ldots $ in ${\mathbb{N}}$ such that $r_{i_1(r)} = r_{i_2(r)} = \cdots = r$, and ${\mathbf{X}}_\infty$ may be identified with the inverse limit of the thinned-out inverse sequence $$\cdots \stackrel{\pi^{i_3(r)}_{i_2(r)}}{{\longrightarrow}} {\mathbf{X}}_{i_2(r)} \stackrel{\pi^{i_2(r)}_{i_1(r)}}{{\longrightarrow}} {\mathbf{X}}_{i_1(r)} \stackrel{\pi^{i_1(r)}_0}{{\longrightarrow}} {\mathbf{X}}.$$ Given this, Lemma \[lem:inv-lim-sated\] implies that ${\mathbf{X}}_\infty$ is ${\mathsf{V}}_r$-sated. Since $r$ was arbitrary, this completes the proof.
Characteristic subspaces and proof of convergence
=================================================
Subgroups associated to commuting tuples of actions
---------------------------------------------------
We now begin to work with commuting tuples of $G$-actions. We will need to call on several different subgroups of $G^d$ in the sequel, so the next step is to set up some bespoke notation for handling them. We will sometimes use a boldface ${\mathbf{g}}$ to denote a tuple $(g_i)_{i=1}^d$ in $G^d$, and will denote the identity element of $G$ by $1_G$.
Fix $G$ and $d$, and let $e = \{i_1 < \ldots < i_r\} \subseteq [d]$ with $r\geq 2$ and also $\{i < j\} \subseteq [d]$. Then we define $$H_e := \{{\mathbf{g}}\in G^d\,|\ g_{i_s+1} = g_{i_s+2} = \ldots = g_{i_{s+1}}\ \hbox{for each}\ s=1,\ldots,r-1\},$$ $$K_{\{i,j\}} := \{{\mathbf{g}} \in H_{\{i,j\}}\,|\ g_\ell = 1_G \ \forall \ell \in (i;j]\},$$ and $$L_e := \{{\mathbf{g}} \in H_e\,|\ g_i = 1_G \ \forall i \in [d]\setminus (i_1;i_r]\}.$$
Routine calculations give the following basic properties.
\[lem:subgp-props\]
1. For $e = \{i_1 < \ldots < i_r\}$ as above, the subgroups $L_e$ and $K_{\{i_1,i_r\}}$ commute and generate $H_e$.
2. If $a \subseteq e \subseteq [k]$ with $|a| \geq 2$, then $L_a \leq L_e$.
3. If $a \subseteq e \subseteq [k]$ with $|a| \geq 2$, and also $$e \cap [\min a;\max a] = a,$$ then $L_a \unlhd H_e$. In particular, $L_e \unlhd H_e$.
Part (3) of this lemma has the following immediate consequence.
\[cor:some-invce\] If $a \subseteq e \subseteq [k]$ with $|a| \geq 2$, and also $$e \cap [\min a;\max a] = a,$$ then ${\Sigma}^{L_a}_{\mathbf{X}}$ is globally $H_e$-invariant.
The Host-Kra inequality
-----------------------
In order to show that a suitably-sated $G$-space has some other desirable property, one must find an extension of it for which the relative independence given by satedness implies that other property. The key to such a proof is usually constructing the right extension.
Where satedness was used in the previous works [@Aus--nonconv] and [@Aus--newmultiSzem], that extension could be constructed directly from the Furstenberg self-joining arising from some non-conventional averages. However, this seems to be more problematic in the present setting, and we will take a different approach. The construction below is a close analog of the construction by Host and Kra of certain ‘cubical’ extensions of a ${\mathbb{Z}}$-space in [@HosKra05]. That machinery has also been extended by Host to commuting tuples of ${\mathbb{Z}}$-actions in [@Hos09].
Fix now a $G^d$-space ${\mathbf{X}}= (X,\mu,T_1,\ldots,T_d)$, and let ${\mathbf{Y}}^{(0)} := {\mathbf{X}}$. Our next step is to construct recursively a height-$(d+1)$ tower of new probability-preserving $G^d$-spaces, which we shall denote by $$\begin{aligned}
\label{eq:tower}
{\mathbf{Y}}^{(d)} \stackrel{\xi^{(d)}}{{\longrightarrow}} {\mathbf{Y}}^{(d-1)} \stackrel{\xi^{(d-1)}}{{\longrightarrow}} \cdots \stackrel{\xi^{(2)}}{{\longrightarrow}} {\mathbf{Y}}^{(1)} \stackrel{\xi^{(1)}}{{\longrightarrow}} {\mathbf{Y}}^{(0)} = {\mathbf{X}}.\end{aligned}$$
The construction will also give some other auxiliary $G^d$-spaces ${\mathbf{Z}}^{(j)}$, and they too will be used later.
Supposing the tower has already been constructed up to some level $j \leq d-1$, the next extension is constructed in the following steps.
- From ${\mathbf{Y}}^{(j)} = (Y^{(j)},\nu^{(j)},S^{(j)})$, define a new $H_{\{d-j-1,d\}}$-action ${\widetilde{S}}^{(j)}$ on the same space by setting $$\begin{aligned}
\label{eq:comm1}
({\widetilde{S}}^{(j)}_i)^g := (S^{(j)}_i)^g \quad \forall g \in G,\ i < d-j-1,\end{aligned}$$ $$\begin{aligned}
\label{eq:comm2}
({\widetilde{S}}^{(j)}_{d-j-1})^g := (S^{(j)}_{[d-j-1;d]})^g \quad \forall g \in G,\end{aligned}$$ and $$\begin{aligned}
\label{eq:comm3}
({\widetilde{S}}^{(j)}_{(d-j-1;d]})^g := {\mathrm{id}} \quad \forall g \in G\end{aligned}$$ (with the understanding that (\[eq:comm1\]) and (\[eq:comm2\]) are vacuous in case $j=d-1$).
- Now consider the $H_{\{d-j-1,d\}}$-space $$\begin{aligned}
{\mathbf{Z}}^{(j+1)} &=& (Z^{(j+1)},\theta^{(j+1)},R^{(j+1)})\\
&:=& \big(Y^{(j)}\times Y^{(j)},\ \nu^{(j)}\otimes_{{\Sigma}^{L_{\{d-j-1,d\}}}_{{\mathbf{Y}}^{(j)}}} \nu^{(j)},\ (S^{(j)})^{{\!\upharpoonright}H_{\{d-j-1,d\}}}\times {\widetilde{S}}^{(j)}\big).\end{aligned}$$ Let $\xi^{(j+1)}_0,\xi^{(j+1)}_1:Z^{(j+1)}{\longrightarrow}Y^{(j)}$ be the two coordinate projections. They are both factor maps of $H_{\{d-j-1,d\}}$-spaces. Notice that $\theta^{(j+1)}$ is $R^{(j+1)}$-invariant because both of the actions $(S^{(j)})^{{\!\upharpoonright}H_{\{d-j-1,d\}}}$ and ${\widetilde{S}}^{(j)}$ preserve the ${\sigma}$-subalgebra ${\Sigma}^{L_{\{d-j-1,d\}}}_{{\mathbf{Y}}^{(j)}}$, by Corollary \[cor:some-invce\].
- Finally, let ${\mathbf{Y}}^{(j+1)}\stackrel{\xi^{(j+1)}}{{\longrightarrow}} {\mathbf{Y}}^{(j)}$ be an extension of $G^d$-spaces for which there is a commutative diagram
$\phantom{i}$
as provided by Theorem \[thm:recoverG\].
Having made this construction, for each $j\in \{1,2,\ldots,d\}$ we also define a family of maps $$\pi^{(j)}_\eta:Y^{(j)} {\longrightarrow}X$$ indexed by $\eta \in \{0,1\}^j$, by setting $$\pi^{(j)}_{(\eta_1,\ldots,\eta_j)}:= \xi^{(1)}_{\eta_1}\circ{\alpha}^{(1)}\circ \xi^{(2)}_{\eta_2}\circ {\alpha}^{(2)} \circ \cdots\circ \xi^{(j)}_{\eta_j}\circ {\alpha}^{(j)}.$$ Clearly $(\pi^{(j)}_\eta)_\ast \nu^{(j)} = \mu$ for every $\eta$. Also, $$\pi^{(j)}_{0^j} = \xi^{(1)}\circ\cdots\circ \xi^{(j)}:{\mathbf{Y}}^{(j)}{\longrightarrow}{\mathbf{X}}$$ is a factor map of $G^d$-spaces, where $0^j:= (0,0,\ldots,0) \in \{0,1\}^j$.
\[lem:intertwine\] Let $r \in [d]$, let $\eta \in \{0,1\}^r\setminus\{0^r\}$, and let $\ell \in [r]$ be maximal such that $\eta_\ell = 1$. Then $\pi^{(r)}_\eta$ satisfies the following intertwining relations $$\begin{aligned}
\label{eq:comm4}
\pi^{(r)}_\eta\circ S^{(r)}_i = T_i\circ \pi^{(r)}_\eta \quad \forall i < d-\ell,\end{aligned}$$ $$\begin{aligned}
\label{eq:comm5}
\pi^{(r)}_\eta\circ S^{(r)}_{d-\ell} = T_{[d-\ell;d]}\circ \pi^{(r)}_\eta\end{aligned}$$ and $$\begin{aligned}
\label{eq:comm6}
\pi^{(r)}_\eta\circ S^{(r)}_{(d-\ell;d]} = \pi^{(r)}_\eta.\end{aligned}$$
There are no such simple relations for the compositions $\pi^{(r)}_\eta\circ S^{(r)}_i$ when $i \geq d-\ell+1$, but we will not need these. [$\lhd$]{}
By the definition of $\ell$, for this $\eta$ we may write $\pi^{(r)}_\eta = \pi'\circ\pi''$, where $$\begin{gathered}
\label{eq:dfn-pieta}
\pi' := \pi^{(\ell)}_{(\eta_1,\ldots,\eta_\ell)} = \xi^{(1)}_{\eta_1}\circ{\alpha}^{(1)}\circ \xi^{(2)}_{\eta_2}\circ {\alpha}^{(2)}\circ \cdots\circ \xi^{(\ell)}_1\circ {\alpha}^{(\ell)}\\ \hbox{and}\quad \pi'' := \xi^{(\ell+1)}\circ \cdots\circ \xi^{(r)}.\end{gathered}$$
All three of the desired relations concern the actions of subgroups of $H_{\{d-\ell,d\}}$, and all the maps in the compositions in (\[eq:dfn-pieta\]) are factor maps of $H_{\{d-\ell,d\}}$-spaces. We will read off the desired results from the simpler relations (\[eq:comm1\]), (\[eq:comm2\]) and (\[eq:comm3\]).
In the first place, each $\xi^{(j)}$ appearing in the definition of $\pi''$ actually intertwines the whole $G^d$-actions by construction, so $$\pi''\circ S_i^{(r)} = S_i^{(\ell)}\circ \pi'' \quad \forall i \in [d].$$
It therefore suffices to prove that $\pi' \circ S^{(\ell)}_i = T_i\circ \pi'$ for all $i < d - \ell$, and similarly for the other two desired relations.
*Step 1.*Suppose that $i \leq d-\ell$ and $j \leq \ell$. Then the definitions of ${\alpha}^{(j)}$, $\xi_0^{(j)}$ and $\xi_1^{(j)}$ give $$\xi^{(j)}_\eta\circ{\alpha}^{(j)}\circ S_i^{(j)} = \xi^{(j)}_\eta\circ R^{(j)}_i \circ {\alpha}^{(j)}= \left\{\begin{array}{ll} S^{(j-1)}_i\circ \xi^{(j)}_\eta\circ{\alpha}^{(j)} & \quad \hbox{if}\ \eta = 0\\
{\widetilde{S}}^{(j-1)}_i \circ \xi^{(j)}_\eta\circ{\alpha}^{(j)} & \quad \hbox{if}\ \eta = 1.\end{array}\right.$$
In case $i < d - \ell \leq d - j$, this is equal to $S^{(j)}_i\circ \xi^{(j)}_\eta\circ{\alpha}^{(j)}$ for either value of $\eta$, by (\[eq:comm1\]). Applying this repeatedly for $j=\ell,\ell-1,\ldots,1$ in the composition that defines $\pi'$, we obtain $$\pi'\circ S_i^{(\ell)} = T_i\circ \pi'.$$ As explained above, this proves (\[eq:comm4\]).
*Step 2.*The same calculation as above gives $$\xi^{(\ell)}_1\circ {\alpha}^{(\ell)}\circ S^{(\ell)}_{d-\ell} = \xi^{(\ell)}_1\circ R^{(\ell)}_{d-\ell} \circ {\alpha}^{(\ell)}= {\widetilde{S}}^{(\ell-1)}_{d-\ell}\circ \xi^{(\ell)}_1\circ {\alpha}^{(\ell)},$$ and now this is equal to $S^{(\ell-1)}_{[d-\ell,d]}\circ \xi^{(\ell)}_1\circ {\alpha}^{(\ell)}$, by (\[eq:comm2\]).
On the other hand, if $j \leq \ell-1$, then another call to the definitions of ${\alpha}^{(j)}$, $\xi_0^{(j)}$ and $\xi_1^{(j)}$ gives $$\xi^{(j)}_\eta\circ{\alpha}^{(j)}\circ S_{[d-\ell,d]}^{(j)} = \xi^{(j)}_\eta\circ R^{(j)}_{[d-\ell,d]}\circ {\alpha}^{(j)} = \left\{\begin{array}{ll} S^{(j-1)}_{[d-\ell;d]}\circ \xi^{(j)}_\eta\circ{\alpha}^{(j)} & \quad \hbox{if}\ \eta = 0\\
{\widetilde{S}}^{(j-1)}_{[d-\ell;d]}\circ \xi^{(j)}_\eta\circ{\alpha}^{(j)} & \quad \hbox{if}\ \eta = 1.\end{array}\right.$$ This time, since $j \leq \ell-1$, one has $$\begin{aligned}
{\widetilde{S}}^{(j-1)}_{[d-\ell;d]} &=& {\widetilde{S}}^{(j-1)}_{d-\ell}\circ {\widetilde{S}}^{(j-1)}_{d-\ell+1}\circ \cdots \circ {\widetilde{S}}^{(j-1)}_{d-j}\circ {\widetilde{S}}^{(j-1)}_{(d-j;d]}\\
&=& S^{(j-1)}_{d-\ell}\circ S^{(j-1)}_{d-\ell+1}\circ \cdots \circ S^{(j-1)}_{[d-j;d]}\circ {\mathrm{id}} = S^{(j-1)}_{[d-\ell;d]},\end{aligned}$$ using (\[eq:comm1\]) and (\[eq:comm2\]). So we obtain $$\xi^{(j)}_\eta\circ{\alpha}^{(j)}\circ S_{[d-\ell,d]}^{(j)} = S^{(j-1)}_{[d-\ell,d]} \circ \xi^{(j)}_\eta\circ{\alpha}^{(j)}$$ for all $j \leq \ell-1$ and either value of $\eta$.
Combining these two calculations gives $$\pi'\circ S^{(\ell)}_{d-\ell} = (\xi^{(1)}_{\eta_1}\circ {\alpha}^{(1)}\circ \cdots \circ \xi^{(\ell-1)}_{\eta_{\ell-1}}\circ {\alpha}^{(\ell-1)})\circ S^{(\ell-1)}_{[d-\ell;d]} = T_{[d-\ell;d]}\circ \pi',$$ and hence (\[eq:comm5\]).
*Step 3.*Finally, (\[eq:comm3\]) gives $$\xi^{(\ell)}_1\circ {\alpha}^{(1)}\circ S^{(\ell)}_{(d-\ell;d]} = {\widetilde{S}}^{(\ell-1)}_{(d-\ell;d]}\circ \xi^{(\ell)}_1\circ {\alpha}^{(1)} = \xi^{(\ell)}_1\circ {\alpha}^{(1)},$$ from which (\[eq:comm6\]) follows immediately.
\[cor:intertwine\] If $r \in [d]$, $\eta \in \{0,1\}^r$, and if $j \in [r]$ is such that $\eta_i = 0$ for all $i \geq j+1$, then $\pi^{(r)}_\eta$ satisfies the following intertwining relations $$\begin{aligned}
\label{eq:comm7}
\pi^{(r)}_\eta\circ S^{(r)}_{[d-j;d]} = T_{[d-j;d]}\circ \pi^{(r)}_\eta.\end{aligned}$$
We next prove an estimate relating the multi-linear forms ${\Lambda}_n$ in (\[eq:Lambda\]) to certain integrals over these new $G^d$-spaces ${\mathbf{Y}}^{(j)}$. This will be the key estimate that enables an appeal to satedness. The following theorem relies on an iterated application of the van der Corput estimate, and follows essentially the same lines as Theorem 12.1 in [@HosKra05].
\[thm:ineq\] Let ${\mathbf{X}}= (X,\mu,T_1,\ldots,T_d)$ be a $G^d$-space, let $1 \leq j \leq d$, and let the tower (\[eq:tower\]) and the maps $\pi^{(j)}_\eta:Y^{(j)}{\longrightarrow}X$ for $\eta\in \{0,1\}^j$ be constructed as above.
For $f_{d-j+1}$, …, $f_d \in L^\infty(\mu)$, let $${\Lambda}_n^{(j)}(f_{d-j+1},\ldots,f_d) := \frac{1}{|F_n|}\sum_{g \in F_n}\prod_{i=d-j+1}^d(f_i\circ T_{[d-j+1;i]}^g).$$ If $f_{d-j+1}$, …, $f_d$ are all uniformly bounded by $1$, then $$\limsup_{n{\longrightarrow}\infty}\|{\Lambda}_n^{(j)}(f_{d-j+1},\ldots,f_d)\|_2 \leq \Big(\int_{Y^{(j)}} \prod_{\eta \in \{0,1\}^j} ({\mathcal{C}}^{|\eta|}f_d\circ \pi^{(j)}_\eta)\,{\mathrm{d}}\nu^{(j)}\Big)^{2^{-j}},$$ where $|\eta| := \sum_i\eta_i \mod 1$ and ${\mathcal{C}}$ is the operator of complex conjugation.
Note that ${\Lambda}_n^{(d)} = {\Lambda}_n$, the averages in (\[eq:Lambda\]). The integral appearing on the right-hand side of the last inequality actually defines a seminorm of the function $f_d$: these are the adaptations of the Host-Kra seminorms to the present setting. However, our approach will not emphasize the seminorm axioms.
This is proved by induction on $j$.
*Step 1: Base case.*When $j=1$ the Norm Ergodic Theorem for amenable groups gives $${\Lambda}_n^{(1)}(f_d) {\longrightarrow}{\mathsf{E}}_\mu(f_d\,|\,{\Sigma}_{\mathbf{X}}^{T_d}) = {\mathsf{E}}_\mu(f_d\,|\,{\Sigma}_{\mathbf{X}}^{L_{\{d-1,d\}}}) \quad \hbox{in}\ \|\cdot\|_2,$$ and the square of the norm of this limit is equal to $$\begin{gathered}
\int_{X\times X} (f_d\otimes {\overline{f_d}})\,{\mathrm{d}}\big(\mu\otimes_{{\Sigma}_{\mathbf{X}}^{L_{\{d-1,d\}}}}\mu\big) = \int_{Z^{(1)}}f_d\circ \xi_0^{(1)}\cdot{\overline{f_d\circ \xi_1^{(1)}}}\,{\mathrm{d}}\theta^{(1)}\\ = \int_{Y^{(1)}}f_d\circ \pi_0^{(1)}\cdot{\overline{f_d\circ \pi_1^{(1)}}}\,{\mathrm{d}}\nu^{(1)},\end{gathered}$$ by the definition of $Y^{(1)}$ and $\nu^{(1)}$.
*Step 2: Van der Corput estimate.*Now suppose the result is known up to some $j-1 \in \{1,2,\ldots,d-1\}$.
By the amenable-groups version of the van der Corput estimate ([@BerMcCZha97 Lemma 4.2]), one has $$\begin{gathered}
\label{eq:vdC}
\limsup_{n{\longrightarrow}\infty}\|{\Lambda}_n^{(j)}(f_{d-j+1},\ldots,f_d)\|^2_2\\
\leq \limsup_{m{\longrightarrow}\infty}\frac{1}{|F_m|^2}\sum_{h,k \in F_m}\limsup_{n{\longrightarrow}\infty}\Big|\frac{1}{|F_n|}\sum_{g \in F_n}\int_X \prod_{i=d-j+1}^d(f_i\circ T_{[d-j+1;i]}^{hg}){\overline{(f_i\circ T_{[d-j+1;i]}^{kg})}}\,{\mathrm{d}}\mu\Big|\end{gathered}$$ For fixed $h$ and $k$, we may use the $T^g_{d-j+1}$-invariance of $\mu$ to re-arrange the above integral as follows: $$\begin{aligned}
&&\Big|\frac{1}{|F_n|}\sum_{g \in F_n}\int_X \prod_{i=d-j+1}^d(f_i\circ T_{[d-j+1;i]}^{hg}){\overline{(f_i\circ T_{[d-j+1;i]}^{kg})}}\,{\mathrm{d}}\mu\Big|\\
&&= \Big|\frac{1}{|F_n|}\sum_{g \in F_n}\int_X (f_{d-j+1}\circ T_{d-j+1}^h)\cdot {\overline{(f_{d-j+1}\circ T_{d-j+1}^k)}}\\
&&\quad\quad\quad\quad\quad\quad\quad\quad \cdot\Big(\prod_{i=d-j+2}^d((f_i\circ T_{[d-j+1;i]}^h)\cdot {\overline{(f_i\circ T_{[d-j+1;i]}^k)}})\circ T_{(d-j+1;i]}^g\Big)\,{\mathrm{d}}\mu\Big|.\end{aligned}$$ (At this point we have made crucial use of the commutativity of the different actions $T_i$.) By the Cauchy-Bunyakowski-Schwartz Inequality, this, in turn, is bounded above by $$\begin{aligned}
&&\|(f_{d-j+1}\circ T_{d-j+1}^h)\cdot {\overline{(f_{d-j+1}\circ T_{d-j+1}^k)}}\|_2\\
&&\quad\quad\quad\quad \cdot\Big\|\frac{1}{|F_n|}\sum_{g \in F_n}\prod_{i=d-j+2}^d((f_i\circ T_{[d-j+1;i]}^h)\cdot {\overline{(f_i\circ T_{[d-j+1;i]}^k)}})\circ T_{(d-j+1;i]}^g\Big\|_2\\
&&\leq \big\|{\Lambda}_n^{(j-1)}\big((f_{d-j+2}\circ T_{[d-j+1;d-j+2]}^h)\cdot {\overline{(f_{d-j+2}\circ T_{[d-j+1;d-j+2]}^k)}},\\
&&\quad\quad\quad\quad\quad\quad\quad\quad\quad\quad\quad\quad\quad\quad\quad\quad \ldots,(f_d\circ T_{[d-j+1;d]}^h)\cdot {\overline{(f_d\circ T_{[d-j+1;d]}^k)}}\big)\big\|_2\end{aligned}$$ (since $\|f_{d-j+1}\|_\infty \leq 1$).
*Step 3: Use of inductive hypothesis.*Combining these inequalities and using the inductive hypothesis, this gives $$\begin{gathered}
\label{eq:use-of-ind-hyp}
\limsup_{n{\longrightarrow}\infty}\Big|\frac{1}{|F_n|}\sum_{g \in F_n}\int_X \prod_{i=d-j+1}^d(f_i\circ T_{[d-j+1;i]}^{hg}){\overline{(f_i\circ T_{[d-j+1;i]}^{kg})}}\,{\mathrm{d}}\mu\Big|\\
\leq \Big(\int_{Y^{(j-1)}}\prod_{\eta \in \{0,1\}^{j-1}}\big({\mathcal{C}}^{|\eta|}((f_d\circ T_{[d-j+1;d]}^h)\cdot {\overline{(f_d\circ T_{[d-j+1;d]}^k)}})\circ \pi^{(j-1)}_\eta\big)\,{\mathrm{d}}\nu^{(j-1)}\Big)^{2^{-(j-1)}}\end{gathered}$$ for each $h$ and $k$.
To lighten notation, now let $$F := \prod_{\eta \in \{0,1\}^{j-1}}({\mathcal{C}}^{|\eta|}f_d\circ \pi_\eta^{(j-1)}).$$ In terms of this function, Corollary \[cor:intertwine\] with $r := j-1$ allows us to write $$\begin{gathered}
\prod_{\eta \in \{0,1\}^{j-1}}({\mathcal{C}}^{|\eta|}(f_d\circ T^h_{[d-j+1;d]})\circ \pi_\eta^{(j-1)})\\ = \prod_{\eta \in \{0,1\}^{j-1}}({\mathcal{C}}^{|\eta|}f_d\circ \pi_\eta^{(j-1)}\circ (S^{(j-1)}_{[d-j+1;d]})^h) = F\circ (S^{(j+1)}_{[d-j+1;d]})^h,\end{gathered}$$ and similarly $$\prod_{\eta \in \{0,1\}^{j-1}}({\mathcal{C}}^{|\eta|}{\overline{(f_d\circ T^k_{[d-j+1;d]})}}\circ \pi_\eta^{(j-1)}) = {\overline{F}}\circ (S^{(j-1)}_{[d-j+1;d]})^k.$$
*Step 4: Finish.*Substituting into the right-hand side of (\[eq:use-of-ind-hyp\]), one obtains $$\begin{gathered}
\limsup_{n{\longrightarrow}\infty}\Big|\frac{1}{|F_n|}\sum_{g \in F_n}\int_X \prod_{i=d-j+1}^d(f_i\circ T_{[d-j+1;i]}^{hg}){\overline{(f_i\circ T_{[d-j+1;i]}^{kg})}}\,{\mathrm{d}}\mu\Big|\\
\leq \Big(\int_{Y^{(j-1)}}(F\circ (S^{(j+1)}_{[d-j+1;d]})^h)\cdot ({\overline{F}}\circ (S^{(j-1)}_{[d-j+1;d]})^k)\,{\mathrm{d}}\nu^{(j-1)}\Big)^{2^{-(j-1)}}.\end{gathered}$$ Inserting this back into (\[eq:vdC\]) and using Hölder’s Inequality for the average over $(h,k)$, one obtains $$\begin{aligned}
&&\limsup_{n{\longrightarrow}\infty}\|{\Lambda}_n^{(j)}(f_{d-j+1},\ldots,f_d)\|^2_2\\
&&\leq \limsup_{m{\longrightarrow}\infty}\frac{1}{|F_m|^2}\sum_{h,k \in F_m}\Big(\int_{Y^{(j-1)}}(F\circ (S^{(j+1)}_{[d-j+1;d]})^h)\cdot ({\overline{F}}\circ (S^{(j-1)}_{[d-j+1;d]})^k)\,{\mathrm{d}}\nu^{(j-1)}\Big)^{2^{-(j-1)}}\\
&&\leq \limsup_{m{\longrightarrow}\infty}\Big(\frac{1}{|F_m|^2}\sum_{h,k \in F_m}\int_{Y^{(j-1)}}(F\circ (S^{(j+1)}_{[d-j+1;d]})^h)\cdot ({\overline{F}}\circ (S^{(j-1)}_{[d-j+1;d]})^k)\,{\mathrm{d}}\nu^{(j-1)}\Big)^{2^{-(j-1)}}.\end{aligned}$$
Finally, the averages on the last line here actually converge as $m{\longrightarrow}\infty$, by the Norm Ergodic Theorem for amenable groups, giving $$\begin{aligned}
&&\limsup_{n{\longrightarrow}\infty}\|{\Lambda}_n^{(j)}(f_{d-j+1},\ldots,f_d)\|^2_2\\
&&\leq \Big(\int_{Y^{(j-1)}} {\mathsf{E}}_{\nu^{(j-1)}}\big(F\,\big|\,{\Sigma}_{{\mathbf{Y}}^{(j-1)}}^{L_{\{d-j,d\}}}\big)\cdot {\mathsf{E}}_{\nu^{(j-1)}}\big({\overline{F}}\,\big|\,{\Sigma}_{{\mathbf{Y}}^{(j-1)}}^{L_{\{d-j,d\}}}\big)\,{\mathrm{d}}\nu^{(j-1)}\Big)^{2^{-(j-1)}}\\
&&= \Big(\int_{Z^{(j)}} F\circ \xi^{(j)}_0\cdot {\overline{F\circ \xi^{(j)}_1}}\,{\mathrm{d}}\theta^{(j)}\Big)^{2^{-(j-1)}}\\
&&= \Big(\int_{Y^{(j)}} \Big(\prod_{\eta \in \{0,1\}^j}{\mathcal{C}}^{|\eta|}f_d\circ \pi^{(j)}_\eta\Big)\,{\mathrm{d}}\nu^{(j)}\Big)^{2^{-(j-1)}},\end{aligned}$$ where ${\mathbf{Z}}^{(j)}$ is the auxiliary $H_{\{d-j,d\}}$-space constructed along with ${\mathbf{Y}}^{(j)}$. Taking square-roots, this continues the induction.
Partially characteristic subspaces and the proof of convergence {#subs:part-char}
---------------------------------------------------------------
Consider a probability space $(X,\mu)$, and a sequence $\Xi_n$ of multi-linear forms on $L^\infty(\mu)$ which are separately continuous for the norm $\|\cdot\|_2$ in each entry. A closed subspace $V \leq L^2(\mu)$ is **partially characteristic in position $i$** for the sequence $\Xi_n$ if $$\big\|\Xi_n(f_1,\ldots,f_d) - \Xi_n(f_1,\ldots,f_{i-1},P^Vf_i,f_{i+1},\ldots,f_d)\big\|_2 {\longrightarrow}0$$ as $n {\longrightarrow}\infty$ for all $f_1$, …, $f_d \in L^\infty(\mu)$, where $P^V$ is the orthogonal projection onto $V$.
The following proposition will quickly lead to a proof of Theorem A. In fact, it gives rather more than one needs for the proof of Theorem A, but that extra strength will be used during the proof of Theorem B.
\[prop:pleasant\] For $1 \leq i \leq j \leq d$, let ${\mathsf{F}}_{i,j}$ be the functorial ${\sigma}$-algebra $${\Sigma}^{{\mathsf{F}}_{i,j}}_{\mathbf{X}}:= \bigvee_{\ell = 0}^{i-1}{\Sigma}_{\mathbf{X}}^{T_{(\ell;i]}}\vee \bigvee_{\ell = i+1}^j{\Sigma}_{\mathbf{X}}^{T_{(i;\ell]}},$$ and let ${\mathsf{V}}_{i,j,{\mathbf{X}}} := L^2(\mu|{\Sigma}^{{\mathsf{F}}_{i,j}}_{\mathbf{X}})$ be the associated functorial $L^2$-subspace. Also, let $${\widehat{{\Lambda}}}_n^{(j)}(f_1,\ldots,f_j) := \frac{1}{|F_n|}\sum_{g \in F_n}\prod_{i=1}^{j}(f_i\circ T_{[1;i]}^g).$$
If ${\mathbf{X}}$ is ${\mathsf{V}}_{i,j}$-sated whenever $1 \leq i\leq j \leq d$, then, for each $j\in [d]$, the subspaces $${\mathsf{V}}_{1,j,{\mathbf{X}}},\ \ldots,\ {\mathsf{V}}_{j,j,{\mathbf{X}}}$$ are partially characteristic in positions $1$, …, $j$ for the averages ${\widehat{{\Lambda}}}_n^{(j)}$.
Notice that we still have ${\widehat{{\Lambda}}}_n^{(d)} = {\Lambda}_n$ (the averages in (\[eq:Lambda\])), but otherwise these averages differ from the averages ${\Lambda}_n^{(j)}$ considered in Theorem \[thm:ineq\].
This is proved by induction on $j$. When $j=1$, hence also $i=1$, we have ${\Sigma}^{{\mathsf{F}}_{i,j}}_{\mathbf{X}}= {\Sigma}^{T_1}_{\mathbf{X}}$, and this is always partially characteristic because the Norm Ergodic Theorem gives $${\widehat{\Lambda}}^{(1)}_n(f_1) {\longrightarrow}{\mathsf{E}}_\mu(f_1\,|\,{\Sigma}^{T_1}_{\mathbf{X}}) \quad \hbox{in}\ \|\cdot\|_2$$ for any $G$-space. So now we focus on the recursion clause. For this it clearly suffices to assume $j=d-1$, and prove the result for the averages ${\widehat{\Lambda}}^{(d)}_n$, which will lighten the notation.
*Step 1.*We first show that ${\mathsf{V}}_{d,d}$ is partially characteristic in position $d$. Let $f_d \in L^\infty(\mu)$. By decomposing it as $$P^{{\mathsf{V}}_{d,d}}_{\mathbf{X}}f_d + (f_d - P^{{\mathsf{V}}_{d,d}}_{\mathbf{X}}f_d),$$ and using the multi-linearity of ${\widehat{{\Lambda}}}^{(d)}_n$, it suffices to show that $$P^{{\mathsf{V}}_{d,d}}_{\mathbf{X}}f_d = 0 \quad \Longrightarrow \quad \|{\widehat{{\Lambda}}}^{(d)}_n(f_1,\ldots,f_d)\|_2 {\longrightarrow}0 \quad \forall f_1,\ldots,f_{d-1} \in L^\infty(\mu).$$
We will prove this in its contrapositive, so suppose that $$\limsup_{n{\longrightarrow}\infty}\|{\widehat{{\Lambda}}}^{(d)}_n(f_1,\ldots,f_d)\|_2 > 0 \quad \hbox{for some}\ f_1,\ldots,f_{d-1}.$$ Then Theorem \[thm:ineq\] gives $$\int_{Y^{(d)}}\Big(\prod_{\eta \in \{0,1\}^d}{\mathcal{C}}^{|\eta|}f_d\circ \pi_\eta^{(d)}\Big)\,{\mathrm{d}}\nu^{(d)} \neq 0.$$ However, recalling relation (\[eq:comm6\]) from Lemma \[lem:intertwine\], we see that if $\eta \in \{0,1\}^d\setminus \{0^d\}$ and $\ell \in [d]$ is maximal such that $\eta_\ell \neq 0$, then $${\mathcal{C}}^{|\eta|}f_d\circ \pi_\eta^{(d)}\circ S_{(d-\ell;d]}^g = {\mathcal{C}}^{|\eta|}f_d\circ \pi_\eta^{(d)} \quad \forall g \in G,$$ and so the function $$\prod_{\eta \in \{0,1\}^d\setminus \{0^d\}}{\mathcal{C}}^{|\eta|}f_d\circ \pi^{(d)}_\eta$$ is measurable with respect to $$\bigvee_{\ell=1}^d {\Sigma}_{{\mathbf{Y}}^{(d)}}^{S^{(d)}_{(d-\ell;d]}} = {\Sigma}_{{\mathbf{Y}}^{(d)}}^{{\mathsf{F}}_{d,d}}.$$
Therefore the non-vanishing of the above integral implies that $$P^{{\mathsf{V}}_{d,d}}_{{\mathbf{Y}}^{(d)}} (f_d\circ \pi_{0^d}^{(d)}) \neq 0.$$ Since ${\mathbf{X}}$ is ${\mathsf{V}}_{d,d}$-sated, this implies that also $P^{{\mathsf{V}}_{d,d}}_{\mathbf{X}}f_d \neq 0$, as required. This proves that the required subspace is partially characteristic for $i=j=d$.
*Step 2.*By Step 1, for any $f_1$, …, $f_d \in L^\infty(\mu)$, we have $${\widehat{{\Lambda}}}_n^{(d)}(f_1,\ldots,f_d) - {\widehat{{\Lambda}}}_n^{(d)}(f_1,\ldots,f_{d-1},P^{{\mathbf{V}}_{d,d}}_{\mathbf{X}}f_d) {\longrightarrow}0.$$ Also, $P^{{\mathbf{V}}_{d,d}}_{\mathbf{X}}f_d$ still lies in $L^\infty(\mu)$, because $P^{{\mathbf{V}}_{d,d}}_{\mathbf{X}}$ is actually a conditional expectation operator. It therefore suffices to check that the required factors are partially characteristic in the other positions under the additional assumption that $f_d$ is ${\Sigma}^{{\mathsf{F}}_{d,d}}_{\mathbf{X}}$-measurable.
This assumption implies that $f_d$ may be approximated in $\|\cdot\|_2$ by a finite sum of products of the form $$\begin{aligned}
\label{eq:product-decomp}
h_0\cdot \cdots \cdot h_{d-1}\end{aligned}$$ where $h_i$ is ${\Sigma}_{\mathbf{X}}^{T_{(i;d]}}$-measurable for each $i$. By multi-linearity, it therefore suffices to prove that the required factors are partially characteristic in the other positions when $f_d$ is just one such product function. However, at this point a simple re-arrangement gives $$\begin{aligned}
{\widehat{{\Lambda}}}_n^{(d)}(f_1,\ldots,f_{d-1},h_0\cdots h_{d-1}) &=& \frac{1}{|F_n|}\sum_{g \in F_n}\Big(\prod_{i=1}^{d-1}(f_i\circ T_{[1;i]}^g)\Big)\cdot ((h_0\cdots h_{d-1})\circ T_{[1;d]}^g)\\
&=& h_0\cdot\frac{1}{|F_n|}\sum_{g \in F_n}\prod_{i=1}^{d-1}((f_ih_i)\circ T_{[1;i]}^g)\\
&=& h_0\cdot {\widehat{{\Lambda}}}_n^{(d-1)}(f_1h_1,\ldots,f_{d-1}h_{d-1}),\end{aligned}$$ using the partial invariances of each of the $h_i$s. Therefore, by the inductive hypothesis for $j = d-1$, if these averages do not vanish as $n {\longrightarrow}\infty$ then $$P^{{\mathsf{V}}_{i,d-1}}_{\mathbf{X}}(f_ih_i) = {\mathsf{E}}_\mu\big(f_ih_i\,\big|\,{\Sigma}^{{\mathsf{F}}_{i,d-1}}_{\mathbf{X}}\big)\neq 0$$ for each $i \in [d-1]$. Since $h_i$ is ${\Sigma}_{\mathbf{X}}^{T_{(i;d]}}$-measurable, this implies that $${\mathsf{E}}_\mu\big(f_i\,\big|\,{\Sigma}^{{\mathsf{F}}_{i,d-1}}_{\mathbf{X}}\vee {\Sigma}^{T_{(i;d]}}_{\mathbf{X}}\big) = {\mathsf{E}}_\mu(f_i\,|\,{\Sigma}^{{\mathsf{F}}_{i,d}}_{\mathbf{X}}) \neq 0.$$ Arguing as at the start of Step 1, this implies that for the averages ${\widehat{{\Lambda}}}_n^{(d)}$, the subspace ${\mathsf{V}}_{i,d,{\mathbf{X}}}$ is partially characteristic in position $i$ for each $i\leq d-1$. Therefore the induction continues.
The proof is by induction on $d$, and uses only the partially characteristic factor in position $d$. When $d=1$, convergence is given by the Norm Ergodic Theorem for amenable groups, so suppose $d\geq 2$, and that convergence is known for all commuting tuples of fewer than $d$ actions.
By Theorem \[thm:sateds-exist\], we may ascend from ${\mathbf{X}}$ to an extension which is ${\mathsf{V}}_{d,d}$-sated, and so simply assume that ${\mathbf{X}}$ is itself ${\mathsf{V}}_{d,d}$-sated. This implies that $$\big\|{\Lambda}_n(f_1,\ldots,f_d) - {\Lambda}_n(f_1,\ldots,f_{d-1},P^{{\mathsf{V}}_{d,d}}_{\mathbf{X}}f_d)\big\|_2 {\longrightarrow}0\quad \hbox{as}\ n{\longrightarrow}\infty,$$ as in the proof of the previous proposition. It therefore suffices to prove convergence for the right-hand averages inside these norms. However, again as in the proof of the previous proposition, for these we may approximate ${\mathsf{E}}_\mu(f_d\,|\,{\Sigma}_{\mathbf{X}}^{{\mathsf{F}}_{d,d}})$ by a finite sum of products of the form in (\[eq:product-decomp\]), and then re-arrange the resulting averages into the form $$h_0\cdot\frac{1}{|F_n|}\sum_{g \in F_n}\prod_{i=1}^{d-1}((f_ih_i)\circ T_{[1;i]}^g).$$ Ignoring the factor $h_0$, which is uniformly bounded and does not depend on $n$, this is now a system of non-conventional averages for a commuting $(d-1)$-tuple of $G$-actions, so convergence follows by the inductive hypothesis.
Proof of multiple recurrence
============================
Given a $G^d$-space, the convergence proved in Theorem A implies that the sequence of measures $${\lambda}_n := \frac{1}{|F_n|}\sum_{g \in F_n} \delta_{(T_1^gx,T_{[1;2]}^gx,\ldots,T_{[1;d]}^gx)}$$ converges in the usual topology on the convex set of $d$-fold couplings of $\mu$. (This is the same as the topology on joinings when one gives all spaces the action of the trivial group; the joining topology is explained, for instance, in [@Gla03 Section 6.1].)
Letting ${\lambda}:= \lim_{n{\longrightarrow}\infty}{\lambda}_n$, it follows that for any measurable $A \subseteq X$ one has $$\frac{1}{|F_n|}\sum_{g \in F_n}\mu(T_1^gA\cap \cdots \cap T_{[1;d]}^gA) {\longrightarrow}{\lambda}(A^d).$$ To complete the proof of Theorem B, we will show that $$\begin{aligned}
\label{eq:multirec}
{\lambda}(A_1\times \cdots \times A_d) = 0 \quad \Longrightarrow \quad \mu(A_1\cap \cdots \cap A_d) = 0\end{aligned}$$ for any $G^d$-space ${\mathbf{X}}= (X,\mu,T)$ and measurable subsets $A_1$, …, $A_d \subseteq X$. This gives the desired conclusion by setting $A_1 := \ldots := A_d := A$.
First, by replacing ${\mathbf{X}}$ with a suitable extension and lifting each $A_i$ to that extension, we may reduce this task to the case in which ${\mathbf{X}}$ is sated with respect to any chosen family of functional ${\sigma}$-subalgebras. After doing this, the result will be proved by making contact with a modification of Tao’s Infinitary Removal Lemma from [@Tao06--hyperreg]. This is the same strategy as in [@Aus--newmultiSzem]. The modification of the Removal Lemma is essentially as in [@Aus--newmultiSzem], but we shall use its more explicit formulation from [@Aus--thesis]:
\[prop:infremove\] Let $(X,\mu)$ be a standard Borel probability space with ${\sigma}$-algebra ${\Sigma}$. Let $\pi_i:X^d {\longrightarrow}X$ be the coordinate projection for each $i\leq d$. Let $\theta$ be a $d$-fold coupling of $\mu$ on $X^d$. Finally, suppose that $(\Psi_e)_e$ is a collection of ${\sigma}$-subalgebras of ${\Sigma}$, indexed by $e \in \binom{[d]}{\geq 2}$, with the following properties:
- if $a \subseteq e$ then $\Psi_a \supseteq \Psi_e$;
- if $i,j \in e$ and $A \in \Psi_e$ then $\theta(\pi_i^{-1}(A)\triangle \pi_j^{-1}(A)) = 0$, so that we may let ${\widehat{\Psi}}_e$ denote the common $\theta$-completion of the lifted ${\sigma}$-algebras $\pi_i^{-1}(\Psi_e)$ for $i \in e$;
- if we define ${\widehat{\Psi}}_{\mathcal{I}}:= \bigvee_{e \in {\mathcal{I}}}{\widehat{\Psi}}_e$ for each up-set ${\mathcal{I}}\subseteq \binom{[d]}{\geq 2}$, then the ${\sigma}$-algebras ${\widehat{\Psi}}_{\mathcal{I}}$ and ${\widehat{\Psi}}_{{\mathcal{J}}}$ are relatively independent under $\theta$ over ${\widehat{\Psi}}_{{\mathcal{I}}\cap {\mathcal{J}}}$.
In addition, suppose that ${\mathcal{I}}_{i,j}$ for $i=1,2,\ldots,d$ and $j = 1,2,\ldots,k_i$ are up-sets in $\binom{[d]}{\geq 2}$ such that $[d] \in {\mathcal{I}}_{i,j}\subseteq \langle i\rangle$ for each $i,j$, and that $A_{i,j} \in \bigvee_{e \in {\mathcal{I}}_{i,j}}\Psi_e$ for each $i,j$. Then $$\theta\Big(\prod_{i=1}^d\Big(\bigcap_{j=1}^{k_i}A_{i,j}\Big)\Big) = 0 \quad \Longrightarrow \quad \mu\Big(\bigcap_{i=1}^d\bigcap_{j=1}^{k_i}A_{i,j}\Big) = 0.$$
This result is proved by a rather lengthy induction on the up-sets ${\mathcal{I}}_{i,j}$, which requires the full generality above: see [@Aus--thesis Subsection 4.3] for a proof and additional discussion. However, as in [@Aus--newmultiSzem], we will apply it only for $k_i = 1$ and ${\mathcal{I}}_{i,1} = \langle i \rangle$ for each $i$, in which case it asserts that, if $A_i \in \Psi_{\langle i\rangle}$ for each $i$, then $$\begin{aligned}
\label{eq:spec-case}
\theta(A_1\times\cdots \times A_d) = 0 \quad \Longrightarrow \quad \mu(A_1\cap \cdots \cap A_d) = 0.\end{aligned}$$
We will apply Proposition \[prop:infremove\] with $\theta$ equal to the limit coupling ${\lambda}$, and with the following family of ${\sigma}$-subalgebras. Suppose that $e = \{i_1 < \ldots < i_\ell\}\subseteq [d]$ is non-empty, and define a new functorial ${\sigma}$-subalgebra of $G^d$-spaces ${\mathbf{X}}$ by $$\begin{gathered}
\Phi^e_{\mathbf{X}}:= {\Sigma}_{\mathbf{X}}^{L_e} = \big\{A \in {\Sigma}_{\mathbf{X}}\,\big|\ \mu(T^g_{(i_1;i_2]}A \triangle A) = \mu(T^g_{(i_2;i_3]}A\triangle A) =\\ \ldots = \mu(T^g_{(i_{\ell-1};i_\ell]}A\triangle A) = 0\ \forall g\in G\big\},\end{gathered}$$ where we interpret this as ${\Sigma}_{\mathbf{X}}$ in case $|e| = 1$. Observe that if $a \subseteq e$, then $L_a \leq L_e$, and so $\Phi^a_{\mathbf{X}}\supseteq \Phi^e_{\mathbf{X}}$. For any up-set ${\mathcal{I}}\subseteq \binom{[d]}{\geq 2}$, let $$\Phi^{\mathcal{I}}_{\mathbf{X}}:= \bigvee_{e \in {\mathcal{I}}}\Phi^e_{\mathbf{X}}.$$
Most of our remaining work will go into checking properties (i)–(iii) above for the joint distribution of the lifted ${\sigma}$-algebras $\pi_i^{-1}(\Phi_{\mathbf{X}}^e)$, subject to a certain satedness assumption on ${\mathbf{X}}$.
The $G^d$-space ${\mathbf{X}}= (X,\mu,T)$ is **fully sated** if it is sated for every functorial ${\sigma}$-subalgebra of the form $$\bigvee_{s=1}^r\Phi^{e_s}_{\mathbf{X}}$$ for some $e_1$, …, $e_r \in \binom{[d]}{\geq 2}$.
\[thm:struct-of-coupling\] Let ${\mathbf{X}}$ be fully sated, and let ${\lambda}$ be its limit coupling as above.
1. The coordinates factors $\pi_i:X^d{\longrightarrow}X$ are relatively independent under ${\lambda}$ over the further ${\sigma}$-subalgebras $\pi_i^{-1}(\Phi^{\langle i\rangle}_{\mathbf{X}})$, $i=1,2,\ldots,d$.
2. The collection $(\Phi^e_{\mathbf{X}})_e$ satisfies properties (i)–(iii) of Proposition \[prop:infremove\].
By passing to an extension as given by Corollary \[cor:mult-sateds-exist\], it suffices to prove Theorem B for fully sated $G^d$-spaces. Specifically, we will prove the implication (\[eq:multirec\]).
Let $A_1$, …, $A_d \subseteq X$ be measurable. Part (1) of Theorem \[thm:struct-of-coupling\] gives $${\lambda}(A_1\times \cdots \times A_d) = \int_X f_1\otimes \cdots \otimes f_d \,{\mathrm{d}}{\lambda},$$ where $f_i := {\mathsf{E}}_\mu(1_{A_i}\,|\,\Phi_{\mathbf{X}}^{\langle i\rangle})$. Letting $B_i := \{f_i > 0\}$ for each $i$, it follows that $$\begin{gathered}
{\lambda}(A_1\times \cdots \times A_d) = 0 \\ \Longrightarrow \quad {\lambda}\{f_1\otimes \cdots \otimes f_d > 0\} = {\lambda}(B_1\times \cdots \times B_d) = 0.\end{gathered}$$
On the other hand, each $B_i$ is $\Phi^{\langle i\rangle}_{\mathbf{X}}$-measurable. By Part (2) of Theorem \[thm:struct-of-coupling\], we may therefore apply Proposition \[prop:infremove\] in the form of the implication (\[eq:spec-case\]), to conclude $${\lambda}(B_1\times \cdots \times B_d) = 0 \quad \Longrightarrow \quad \mu(B_1\cap \cdots \cap B_d) = 0.$$ Since $$\mu(A_i\setminus B_i) = \int 1_{A_i}\cdot 1_{X\setminus B_i}\,{\mathrm{d}}\mu = \int f_i\cdot 1_{X\setminus B_i}\,{\mathrm{d}}\mu = 0$$ for each $i$, this completes the proof.
The rest of this section will go into proving Theorem \[thm:struct-of-coupling\]. Subsection \[subs:jointdist1\] will establish various necessary joint-distribution properties of the ${\sigma}$-algebras $\Phi^e_{\mathbf{X}}$ in $(X,\mu)$ itself, and then Subsection \[subs:jointdist2\] will deduce the required properties of the lifts $\pi_i^{-1}(\Phi^e_{\mathbf{X}})$ from these.
Joint distribution of some ${\sigma}$-algebras of invariant sets {#subs:jointdist1}
----------------------------------------------------------------
The next proposition will be the second major outing for satedness in this paper. It shows that if a $G^d$-space ${\mathbf{X}}$ is sated relative to a suitable family of functorial ${\sigma}$-subalgebras constructed out of the collection $\Phi^e_{{\mathbf{X}}}$, $e\subseteq [k]$, then this forces some relative independence among those ${\sigma}$-subalgebras.
\[prop:first-rel-ind\] Suppose that $\{i < j\} \subseteq [d]$, suppose that $e_1$, …, $e_r \in \binom{[d]}{\geq 2}$, and let ${\mathbf{X}}= (X,\mu,T_1,\ldots,T_d)$ be a $G^d$-space.
1. If $e_s\cap [i;j) = \{i\}$ for every $s \leq r$, and if ${\mathbf{X}}$ is ${\mathsf{F}}$-sated for $${\Sigma}^{\mathsf{F}}_{\mathbf{X}}:= \bigvee_{s=1}^r\Phi_{{\mathbf{X}}}^{e_s\cup \{j\}},$$ then $$\Phi_{\mathbf{X}}^{\{i,j\}} \quad \hbox{and} \quad \bigvee_{s=1}^r \Phi^{e_s}_{\mathbf{X}}\quad \hbox{are rel. indep. over} \quad {\Sigma}^{\mathsf{F}}_{\mathbf{X}}.$$
2. If $e_s\cap (i;j] = \{j\}$ for every $s \leq r$, and if ${\mathbf{X}}$ is ${\mathsf{G}}$-sated for $${\Sigma}^{\mathsf{G}}_{{\mathbf{X}}} := \bigvee_{s=1}^r\Phi_{{\mathbf{X}}}^{e_s\cup \{i\}},$$ then $$\Phi_{\mathbf{X}}^{\{i,j\}} \quad \hbox{and} \quad \bigvee_{s=1}^r \Phi^{e_s}_{\mathbf{X}}\quad \hbox{are rel. indep. over} \quad {\Sigma}^{\mathsf{G}}_{\mathbf{X}}.$$
As always, the appeal to satedness will depend on constructing the right extension. Let $e := e_1 \cup \ldots \cup e_r \cup \{j\}$, so that our assumptions give $e\cap [i;j] = \{i,j\}$.
*Step 1.*We first construct a suitable extension of the $L_e$-subaction ${\mathbf{X}}^{{\!\upharpoonright}L_e}$.
Since $e \cap [i;j] = \{i,j\}$, Corollary \[cor:some-invce\] promises that $\Phi_{\mathbf{X}}^{\{i,j\}}$ is globally $L_e$-invariant, so the relative product measure $\nu:=\mu\otimes_{\Phi_{\mathbf{X}}^{\{i,j\}}}\mu$ is invariant under the diagonal action of $L_e$ on $Y := X^2$. We will make use of this by constructing a *non*-diagonal action of $L_e$ on $Y$ which still preserves $\nu$.
Let $e$ be enumerated as $\{i_1 < \ldots < i_m\}$. Our assumptions imply that $\{i,j\} = \{i_{\ell_0},i_{\ell_0+1}\}$ for some $\ell_0 \leq m-1$. In these terms, $L_e$ is generated by its $m-1$ commuting subgroups $$L_{\{i_\ell,i_{\ell+1}\}} = {\varphi}_\ell(G),\quad \ell = 1,\ldots,m-1,$$ where ${\varphi}_\ell:G{\longrightarrow}G^d$ is the injective homomorphism defined by $$\big({\varphi}_\ell(g)\big)_i := \left\{\begin{array}{ll}g &\quad \hbox{if}\ i \in (i_\ell;i_{\ell+1}] \\ e &\quad \hbox{else}.\end{array}\right.$$
Specifying an action of $L_e$ is equivalent to specifying commuting actions of its subgroups ${\varphi}_\ell(G)$. We define our new, non-diagonal action $S:L_e{\curvearrowright}(Y,\nu)$ as follows: $$S^{{\varphi}_\ell(g)} := \left\{\begin{array}{ll}T_{(i_\ell;i_{\ell+1}]}^g\times T_{(i_\ell,i_{\ell+1}]}^g \quad \hbox{(i.e., diagonal)} &\quad \hbox{if}\ \ell \not\in \{\ell_0,\ell_0+1\}\\
T_{(i_{\ell_0};i_{\ell_0+1}]}^g\times {\mathrm{id}} &\quad \hbox{if}\ \ell = \ell_0\\
T_{(i_{\ell_0+1};i_{\ell_0+2}]}^g\times T_{(i_{\ell_0},i_{\ell_0+2}]}^g &\quad \hbox{if}\ \ell = \ell_0+1\end{array}\right.$$ (where the last option here is vacuous in case $\ell_0 = m-1$).
Each of these transformations leaves $\nu$ invariant: we have already remarked this for the diagonal transformations, and for the last two possibilities we need only observe that $\nu$ is a relative product over a ${\sigma}$-algebra on which $T^g_{(i_{\ell_0};i_{\ell_0+1}]} = T^g_{(i;j]}$ acts trivially for all $g \in G$.
Now let ${\beta}_1,{\beta}_2:Y{\longrightarrow}X$ be the two coordinate projections. The above definition gives ${\beta}_1\circ S^{{\varphi}_\ell(g)} = T^{{\varphi}_\ell(g)}\circ {\beta}_1$ for every $\ell$ and $g$, so letting ${\mathbf{Y}}$ denote the $L_e$-space given by the above transformations $S$ on $(Y,\nu)$, we have a factor map ${\mathbf{Y}}\stackrel{{\beta}_1}{{\longrightarrow}} {\mathbf{X}}^{{\!\upharpoonright}L_e}$. On the other hand, recalling that $\{i_{\ell_0},i_{\ell_0+1}\} = \{i,j\}$, the above definitions give that under $S$, the subgroup $L_{\{i,j\}} \leq L_e$ acts trivially on the second coordinate in $Y$.
*Step 2.*Next, applying Theorem \[thm:recoverG\] enlarges this to an extension ${\mathbf{X}}_1\stackrel{\pi}{{\longrightarrow}} {\mathbf{X}}$ of $G^d$-spaces which factorizes through some $L_e$-extension ${\mathbf{X}}_1^{{\!\upharpoonright}L_e}\stackrel{{\alpha}}{{\longrightarrow}} {\mathbf{Y}}$.
*Step 3.*Now suppose that $f \in L^\infty(\mu|_{\Phi_{\mathbf{X}}^{\{i,j\}}})$ and that $g_s \in L^\infty(\mu|_{\Phi^{e_s}_{\mathbf{X}}})$ for each $s \leq r$. From the definition of $\nu$ and the fact that $f$ is $\Phi^{\{i,j\}}_{\mathbf{X}}$-measurable, we have $$\begin{gathered}
\label{eq:move-int}
\int_X f\cdot \prod_{s \leq r}g_s\,{\mathrm{d}}\mu = \int_Y (f\circ {\beta}_2)\cdot \Big(\prod_{s \leq r}g_s\circ {\beta}_2\Big)\,{\mathrm{d}}\nu\\ = \int_Y (f\circ{\beta}_1)\cdot \Big(\prod_{s\leq r}g_s\circ {\beta}_2\Big)\,{\mathrm{d}}\nu.\end{gathered}$$
Consider the function $g_s\circ {\beta}_2$ for some $s\leq r$. Our next step is to show that it is invariant under the whole of $S^{{\!\upharpoonright}L_{e_s\cup \{j\}}}$. For a given $s$, if we enumerate $e_s \cup \{j\} =: \{p_1 < \ldots < p_n\}$, then it suffices to prove invariance under each subgroup $L_{\{p_k,p_{k+1}\}}$ for $k \in \{1,2,\ldots,n-1\}$.
There are three cases to consider. Firstly, if $p_k \not\in \{i,j\}$, then, since $e\cap [i;j) = \{i\}$, it follows that $(p_k;p_{k+1}]$ is disjoint from $(i_{\ell_0};i_{\ell_0+2}]$ (using again the notation from Step 1). In this case the definition of $S$ gives ${\beta}_2 \circ S_{(p_k;p_{k+1}]} = T_{(p_k;p_{k+1}]}\circ {\beta}_2$, so the required invariance follows from the fact that $g_s$ itself is $L_{e_s}$-invariant.
Second, if $p_k = i$, then the assumption $e_s \cap [i;j) = \{i\}$ implies that $p_{k+1} = j$, and hence the definition of $S$ implies that ${\beta}_2 \circ S_{(p_k;p_{k+1}]} = {\beta}_2$, from which the $S_{(p_k;p_{k+1}]}$-invariance of $g_s\circ {\beta}_2$ is obvious.
Finally, if $p_k = j$, then the definition of $S$ gives $${\beta}_2\circ S_{(p_k;p_{k+1}]} = T_{(i;p_{k+1}]}\circ {\beta}_2.$$ Since $\{i,p_{k+1}\} \subseteq e_s$ (even if $j\not\in e_s$), once again the $L_{e_s}$-invariance of $g_s$ gives $$g_s\circ {\beta}_2\circ S^g_{(p_k;p_{k+1}]} = g_s\circ T^g_{(i;p_{k+1}]}\circ {\beta}_2 = g_s\circ {\beta}_2,$$ as required.
*Step 4.*In light of Step 3, the function $\prod_{s \leq r}(g_s\circ {\beta}_2\circ {\alpha})$ is measurable with respect to $$\bigvee_{s\leq r}\Phi_{{\mathbf{X}}_1}^{e_s\cup \{j\}} = {\Sigma}^{\mathsf{F}}_{{\mathbf{X}}_1}.$$ By the assumed ${\mathsf{F}}$-satedness, it follows that the right-hand integral in (\[eq:move-int\]) is equal to $$\int_Y ({\mathsf{E}}_\mu(f\,|\ {\Sigma}_{\mathbf{X}}^{\mathsf{F}})\circ{\beta}_1)\cdot \Big(\prod_{s\leq r}g_s\circ {\beta}_2\Big)\,{\mathrm{d}}\nu,$$ and by the same reasoning that gave (\[eq:move-int\]) itself this is equal to $$\int_X {\mathsf{E}}_\mu(f\,|\ {\Sigma}_{\mathbf{X}}^{\mathsf{F}})\cdot \prod_{s \leq r}g_s\,{\mathrm{d}}\mu = \int_X {\mathsf{E}}_\mu(f\,|\ {\Sigma}_{\mathbf{X}}^{\mathsf{F}})\cdot {\mathsf{E}}_\mu\Big(\prod_{s \leq r}g_s\,\Big|\,{\Sigma}^{\mathsf{F}}_{\mathbf{X}}\Big)\,{\mathrm{d}}\mu.$$
Since $f$ and each $g_s$ were arbitrary subject to their measurability assumptions, this implies that $\Phi_{\mathbf{X}}^{\{i,j\}}$ and $\bigvee_{s=1}^r\Phi_{\mathbf{X}}^{e_s}$ are relatively independent over ${\Sigma}^{\mathsf{F}}_{\mathbf{X}}$.
This follows exactly the same steps as Part 1, except that now the new $L_e$-action $S$ on $$(Y,\nu) := (X^2,\mu\otimes_{\Phi^{\{i,j\}}_{\mathbf{X}}}\mu)$$ is defined as follows: $$S^{{\varphi}_\ell(g)} := \left\{\begin{array}{ll}T_{(i_\ell;i_{\ell+1}]}^g\times T_{(i_\ell,i_{\ell+1}]}^g \quad \hbox{(i.e., diagonal)} &\quad \hbox{if}\ \ell \not\in \{\ell_0-1,\ell_0\}\\
T_{(i_{\ell_0};i_{\ell_0+1}]}^g\times {\mathrm{id}} &\quad \hbox{if}\ \ell = \ell_0\\
T_{(i_{\ell_0-1};i_{\ell_0}]}^g\times T_{(i_{\ell_0-1},i_{\ell_0+1}]}^g &\quad \hbox{if}\ \ell = \ell_0-1,\end{array}\right.$$ where now $e := e_1\cup \cdots \cup e_r\cup \{i\} = \{i_1 < \ldots < i_m\}$, and $\ell_0$ is such that $\{i,j\} = \{i_{\ell_0},i_{\ell_0 + 1}\}$, as before.
The next two propositions contain the consequences of full satedness that we need. The first modifies the conclusion of Proposition \[prop:pleasant\] in the case of integrated averages, rather than functional averages.
\[prop:char-factors-again\] Suppose that ${\mathbf{X}}$ is fully sated, that $\{i_1 < \ldots < i_k\} \subseteq [d]$ and that $f_1$, …, $f_k \in L^\infty(\mu)$. Then $$\begin{gathered}
\lim_{n{\longrightarrow}\infty}\int_X \frac{1}{|F_n|}\sum_{g \in F_n}\prod_{j=1}^k (f_j\circ T_{[1;i_j]}^g)\,{\mathrm{d}}\mu\\ = \lim_{n{\longrightarrow}\infty}\int_X \frac{1}{|F_n|}\sum_{g \in F_n}\prod_{j=1}^k ({\mathsf{E}}_\mu(f_j\,|\,\Delta_j)\circ T_{[1;i_j]}^g)\,{\mathrm{d}}\mu,\end{gathered}$$ where $$\Delta_j := \bigvee_{\ell = 1}^{j-1}{\Sigma}^{T_{(i_\ell;i_j]}}_{\mathbf{X}}\vee \bigvee_{\ell = j+1}^k{\Sigma}^{T_{(i_j;i_\ell]}}_{\mathbf{X}}.$$
This is proved by induction on $k$. When $k=1$ it is trivial, by the $T_{[1;i_1]}$-invariance of $\mu$, so suppose $k\geq 2$.
Because $\mu$ is $T_{[1;i_1]}$-invariant, the desired conclusion is equivalent to $$\begin{gathered}
\int_X f_1\cdot \Big(\lim_{n{\longrightarrow}\infty}\frac{1}{|F_n|}\sum_{g \in F_n}\prod_{j=2}^k (f_j\circ T_{(i_1;i_j]}^g)\Big)\,{\mathrm{d}}\mu\\ = \int_X {\mathsf{E}}_\mu(f_1\,|\,\Delta_1)\cdot \Big(\lim_{n{\longrightarrow}\infty}\frac{1}{|F_n|}\sum_{g \in F_n}\prod_{j=2}^k ({\mathsf{E}}_\mu(f_j\,|\,\Delta_j)\circ T_{(i_1;i_j]}^g)\Big)\,{\mathrm{d}}\mu.\end{gathered}$$ However, ${\mathbf{X}}$ being fully sated implies that the $G^{k-1}$-space ${\mathbf{X}}'$ defined by $$T'_j := T_{(i_j,i_{j+1}]} \quad \hbox{for}\ j=1,2,\ldots,k-1$$ is also fully sated: otherwise, we could turn a $G^{k-1}$-extension witnessing the failure of satedness for ${\mathbf{X}}'$ back into a $G^d$-extension of ${\mathbf{X}}$ using Theorem \[thm:recoverG\]. Therefore Proposition \[prop:pleasant\] applied to this $G^d$-space gives $$\begin{gathered}
\int_X f_1\cdot \Big(\lim_{n{\longrightarrow}\infty}\frac{1}{|F_n|}\sum_{g \in F_n}\prod_{j=2}^k (f_j\circ T_{(i_1;i_j]}^g)\Big)\,{\mathrm{d}}\mu\\ = \int_X f_1\cdot \Big(\lim_{n{\longrightarrow}\infty}\frac{1}{|F_n|}\sum_{g \in F_n}\prod_{j=2}^k ({\mathsf{E}}_\mu(f_j\,|\,\Delta_j)\circ T_{(i_1;i_j]}^g)\Big)\,{\mathrm{d}}\mu,\end{gathered}$$ since the ${\sigma}$-algebras $\Delta_j$ for $j\geq 2$ are those that arise by applying the functorial ${\sigma}$-subalgebras ${\mathsf{F}}_{\bullet,\bullet}$ of that proposition to the $G^{k-1}$-space ${\mathbf{X}}'$.
This almost completes the proof. To finish, observe that, as in the proof of Theorem A, we may now approximate $f_k$ (say) by a finite sum of finite products of functions measurable with respect to ${\Sigma}_{\mathbf{X}}^{T_{(i_\ell,i_k]}}$ for $\ell=1,\ldots,k-1$, and having done so we may re-arrange the above into an analogous system of averages with only $k-1$ transformations. At that point, the inductive hypothesis allows us to replace $f_1$ with ${\mathsf{E}}_\mu(f_1\,|\,\Delta_1)$, completing the proof.
\[prop:next-rel-ind\] Suppose that ${\mathbf{X}}$ is fully sated, and that $e_0$, $e_1$, …, $e_r \in \binom{[d]}{\geq 2}$ are sets such that $\bigcap_{0 \leq s\leq r}e_s \neq \emptyset$. Let $g$ be $\Phi^{e_0}_{\mathbf{X}}$-measurable and $f_s$ be $\Phi^{e_s}_{\mathbf{X}}$-measurable for $1 \leq s \leq r$, and suppose $g$ and every $f_s$ are bounded. Then $$\int_X g\cdot f_1\cdot\cdots \cdot f_r\,{\mathrm{d}}\mu = \int_X{\mathsf{E}}_\mu(g\,|\,\Psi)\cdot f_1\cdot \cdots \cdot f_r\,{\mathrm{d}}\mu,$$ where $$\Psi:= \bigvee_{s=1}^r \Phi^{e_0\cup e_s}_{\mathbf{X}}.$$
As is standard, this is equivalent to the assertion that $${\mathsf{E}}_\mu\Big(g\,\Big|\,\bigvee_{s=1}^r\Phi^{e_s}_{\mathbf{X}}\Big) = {\mathsf{E}}_\mu(g\,|\,\Psi).$$
If $e_0 = e_1 = e_2 = \cdots = e_r$, then $\Phi^{e_s}_{\mathbf{X}}= \Psi$ for all $s$, so the result is trivial.
The general case is proved by an outer induction on $r$, and an inner induction on the cardinality of the up-set $${\mathcal{A}}_{e_0,e_1,\ldots,e_r} := \langle e_0\rangle \cup \cdots \cup \langle e_r\rangle.$$
The base clause corresponds to $r=1$ and $|{\mathcal{A}}_{e_0,e_1}| = 1$, hence $e_0 = e_1 = [k]$: this is among the trivial cases described above.
For the recursion clause, we may assume that there are at least two distinct sets among the $e_s$ for $0\leq s \leq r$, so $\bigcap_{0 \leq s \leq r}e_s \neq \bigcup_{0 \leq s \leq r}e_s$ (else we would be in the trivial case treated above). We have also assumed that $\bigcap_{0 \leq s \leq r}e_s \neq \emptyset$, so there must be $\{i < j\} \subseteq [k]$ such that $e_s \cap [i+1;j) = \emptyset$ for all $0 \leq s\leq r$, and
- either $i \in e_s$ for all $0 \leq s \leq r$, but $j$ lies in some $e_s$ but not all;
- or $j \in e_s$ for all $0 \leq s \leq r$, but $i$ lies in some $e_s$ but not all.
We will complete the induction in the first of these cases, the second being exactly analogous. In this first case we have $e_s\cap [i;j) = \{i\}$ for all $s$. It now breaks into two further sub-cases.
*Case 1.*First assume that $j \in e_0$. Then, since $\Phi^{e_0}_{\mathbf{X}}\subseteq \Phi^{\{i,j\}}_{\mathbf{X}}$, Part 1 of Proposition \[prop:first-rel-ind\] gives that $$\int_X g\cdot (f_1\cdot \cdots \cdot f_r)\,{\mathrm{d}}\mu = \int_X{\mathsf{E}}_\mu\Big(g\,\Big|\,\bigvee_{s=1}^r\Phi^{e_s\cup \{j\}}_{\mathbf{X}}\Big)\cdot (f_1\cdot \cdots \cdot f_r)\,{\mathrm{d}}\mu.$$
Now observe that $${\mathcal{A}}_{e_0,e_1\cup\{j\},\ldots,e_r\cup \{j\}} \subseteq {\mathcal{A}}_{e_0,\ldots,e_r},$$ and this inclusion is strict, because the right-hand family contains some set that does not contain $j$, whereas every element of the left-hand family does contain $j$. Therefore we may apply the inductive hypothesis to $e_0$ and $e_1\cup \{j\}$, $e_2\cup \{j\}$, …, $e_r\cup\{j\}$, to conclude that $${\mathsf{E}}_\mu\Big(g\,\Big|\,\bigvee_{s=1}^r\Phi^{e_s\cup \{j\}}_{\mathbf{X}}\Big) = {\mathsf{E}}_\mu\Big(g\,\Big|\,\bigvee_{s=1}^r\Phi^{e_0 \cup e_s}_{\mathbf{X}}\Big) = {\mathsf{E}}_\mu(g\,|\,\Psi).$$
*Case 2.*Now assume that $j \not\in e_0$. By re-labeling the other sets if necessary, we may assume $j \in e_1$. Then the argument used in Case 1 gives $$\int_X g\cdot f_1\cdot\cdots \cdot f_r\,{\mathrm{d}}\mu = \int_X g\cdot {\mathsf{E}}_\mu(f_1\,|\,\Psi_1)\cdot f_2 \cdot \cdots \cdot f_r\,{\mathrm{d}}\mu,$$ where $$\Psi_1:= \bigvee_{s\in\{0\}\cup [r]\setminus \{1\}}\Phi^{e_1\cup e_s}_{\mathbf{X}},$$ and similarly $$\int_X {\mathsf{E}}_\mu(g\,|\,\Psi)\cdot f_1\cdot\cdots \cdot f_r\,{\mathrm{d}}\mu = \int_X {\mathsf{E}}_\mu(g\,|\,\Psi)\cdot {\mathsf{E}}_\mu(f_1\,|\,\Psi_1)\cdot f_2\cdot \cdots \cdot f_r\,{\mathrm{d}}\mu.$$ It therefore suffices to prove the desired equality when $f_1$ is $\Psi_1$-measurable. Since such an $f_1$ can be approximated in $\|\cdot\|_2$ by finite sums of products of $\Phi^{e_1\cup e_s}_{\mathbf{X}}$-measurable functions for $s \in \{0\}\cup [r]\setminus \{1\}$, it suffices furthermore to assume that $$f_1 = f_{10}\cdot f_{12}\cdot \cdots \cdot f_{1r}$$ is one such product.
However, now the integral of interest may be written as $$\int_X (g f_{10})\cdot (f_2f_{12})\cdot \cdots \cdot (f_rf_{1r})\,{\mathrm{d}}\mu,$$ and by the inductive hypothesis on $r$ this is equal to $$\int_X {\mathsf{E}}_\mu(g f_{10}\,|\,\Psi_2)\cdot (f_2f_{12})\cdot \cdots \cdot (f_rf_{1r})\,{\mathrm{d}}\mu$$ with $$\Psi_2:= \bigvee_{s=2}^r\Phi^{e_0\cup e_s}_{\mathbf{X}}.$$
Since $\Psi \geq \Psi_2$ and $f_{10}$ is $\Psi$-measurable, the Law of Iterated Conditional Expectation gives $${\mathsf{E}}_\mu(g f_{10}\,|\,\Psi_2) = {\mathsf{E}}_\mu({\mathsf{E}}_\mu(g\,|\,\Psi) f_{10}\,|\,\Psi_2).$$ Substituting this back into the integral completes the desired equality.
\[cor:second-rel-ind\] Suppose that ${\mathbf{X}}$ is fully sated and that $e_1$, …, $e_r \in \binom{[d]}{\geq 2}$ are such that $\bigcap_{s\leq r}e_s \neq \emptyset$. Let $$\Psi_s:= \bigvee_{t \in [r]\setminus s} \Phi^{e_t\cup e_s}_{\mathbf{X}}\quad \hbox{for}\ s=1,2,\ldots,r,$$ and let $f_s$ be $\Phi^{e_s}_{\mathbf{X}}$-measurable for each $s$. Then $$\int_X \prod_{s=1}^r f_s\ {\mathrm{d}}\mu = \int_X\prod_{s=1}^r{\mathsf{E}}_\mu(f_s\,|\,\Psi_s)\ {\mathrm{d}}\mu.$$
Simply apply Proposition \[prop:next-rel-ind\] to each factor of the integrand in turn.
Structure of the limit couplings {#subs:jointdist2}
--------------------------------
We now turn to the structure of the limit coupling ${\lambda}$, as discussed at the beginning of this section. The following lemma and definition are again essentially copied from [@Aus--newmultiSzem].
\[lem:diag\] If $i,j \in e \in \binom{[d]}{\geq 2}$ and $A \in \Phi^e_{\mathbf{X}}$, then $${\lambda}(\pi_i^{-1}(A)\triangle \pi_j^{-1}(A)) = 0.$$ In particular, $\pi_i^{-1}(\Phi^e_{\mathbf{X}})$ and $\pi_j^{-1}(\Phi_{\mathbf{X}}^e)$ agree up to ${\lambda}$-negligible sets.
If $i = j$ then this is trivial, so assume without loss of generality that $i < j$. By definition, $$\begin{aligned}
{\lambda}(\pi_i^{-1}(A)\cap \pi_j^{-1}(A)) &=& \lim_{n{\longrightarrow}\infty}\frac{1}{|F_n|}\sum_{g \in F_n} \mu(T_{[1;i]}^{g^{-1}}A \cap T_{[1;j]}^{g^{-1}}A)\\
&=& \lim_{n{\longrightarrow}\infty}\frac{1}{|F_n|}\sum_{g \in F_n} \mu(T_{[1;i]}^{g^{-1}}A \cap T_{[1;i]}^{g^{-1}}T_{(i;j]}^{g^{-1}}A)\\
&=& \lim_{n{\longrightarrow}\infty}\frac{1}{|F_n|}\sum_{g \in F_n} \mu(T_{[1;i]}^{g^{-1}}A \cap T_{[1;i]}^{g^{-1}}A) = \mu(A),\end{aligned}$$ because $\Phi^e_{\mathbf{X}}\leq \Phi^{\{i,j\}}_{\mathbf{X}}$, so $A$ is $T_{(i;j]}$-invariant. Therefore $${\lambda}(\pi_i^{-1}(A)\cap \pi_j^{-1}(A)) = {\lambda}(\pi_i^{-1}(A)) = {\lambda}(\pi_j^{-1}(A)),$$ and so ${\lambda}(\pi_i^{-1}(A)\triangle \pi_j^{-1}(A)) = 0$.
In the setting above, the common ${\lambda}$-completion of the lifted ${\sigma}$-algebras $$\pi_i^{-1}(\Phi^e_{\mathbf{X}}) \quad \hbox{for}\ i \in e$$ is called the **oblique copy** of $\Phi^e_{\mathbf{X}}$. It will be denoted by ${\widehat{\Phi}}^e_{\mathbf{X}}$.
If ${\mathcal{I}}$ is a non-empty up-set in $\binom{[d]}{\geq 2}$ and ${\mathbf{X}}$ is a $G^d$-space, then the ${\mathcal{I}}$-oblique ${\sigma}$-algebra is $${\widehat{\Phi}}^{{\mathcal{I}}}_{\mathbf{X}}:= \bigvee_{e \in {\mathcal{I}}}{\widehat{\Phi}}^e_{\mathbf{X}}.$$
The remainder of the proof of Theorem B follows almost exactly the same lines as [@Aus--thesis Subsection 4.2]; we include the following lemma again for completeness.
\[lem:rel-ind\] If ${\mathcal{I}}$ and ${\mathcal{J}}$ are non-empty up-sets in $\binom{[d]}{\geq 2}$ and ${\mathbf{X}}$ is a fully sated $G^d$-space, then ${\widehat{\Phi}}^{{\mathcal{I}}}_{\mathbf{X}}$ and ${\widehat{\Phi}}^{{\mathcal{J}}}_{\mathbf{X}}$ are relatively independent over ${\widehat{\Phi}}^{{\mathcal{I}}\cap {\mathcal{J}}}_{\mathbf{X}}$ under ${\lambda}$.
*Step 1.* Suppose first that ${\mathcal{J}}= \langle e\rangle$ where $e$ is a maximal member of $\binom{[d]}{\geq 2}\setminus {\mathcal{I}}$. Let $\{a_1,a_2,\ldots,a_m\}$ be the antichain of minimal elements of ${\mathcal{I}}$, so that ${\widehat{\Phi}}^{\mathcal{I}}_{\mathbf{X}}= \bigvee_{k\leq m}{\widehat{\Phi}}^{a_k}_{\mathbf{X}}$. The maximality assumption on $e$ implies that $e\cup \{j\}$ contains some $a_k$ for every $j \in [d]\setminus e$, and so ${\mathcal{I}}\cap {\mathcal{J}}$ is precisely the up-set generated by these sets $e\cup \{j\}$ for $j\in[d]\setminus e$. We must therefore show that ${\widehat{\Phi}}^e_{\mathbf{X}}$ is relatively independent from $\bigvee_{k\leq m}{\widehat{\Phi}}^{a_k}_{\mathbf{X}}$ under ${\lambda}$ over the ${\sigma}$-subalgebra $\bigvee_{j\in [d]\setminus e}{\widehat{\Phi}}^{e\cup\{j\}}_{\mathbf{X}}$.
Since $e \not\in {\mathcal{I}}$ we can find some $j_k \in
a_k\setminus e$ for each $k\leq m$. Moreover, each $j\in
[d]\setminus e$ must appear as some $j_k$ in this list, since it appears for any $k$ for which $a_k \subseteq e \cup \{j\}$.
Now Lemma \[lem:diag\] implies that ${\widehat{\Phi}}^{a_k}_{\mathbf{X}}$ agrees with $\pi_{j_k}^{-1}(\Phi^{a_k}_{\mathbf{X}})$ up to ${\lambda}$-negligible sets. On the other hand, we clearly have $\pi_{j_k}^{-1}(\Phi^{a_k}_{\mathbf{X}})\leq \pi_{j_k}^{-1}({\Sigma}_{\mathbf{X}})$, and so in fact it will suffice to show that ${\widehat{\Phi}}^e_{\mathbf{X}}$ is relatively independent from $\bigvee_{j\in [d]\setminus e}\pi_j^{-1}({\Sigma}_{\mathbf{X}})$ over $\bigvee_{j\in [d]\setminus e}{\widehat{\Phi}}^{e\cup\{j\}}_{\mathbf{X}}$.
Picking $i \in e$, Lemma \[lem:diag\] also gives that ${\widehat{\Phi}}^e_{\mathbf{X}}$ agrees with $\pi_i^{-1}(\Phi^e_{\mathbf{X}})$ up to ${\lambda}$-negligible sets. On the other hand, for any sets $$A_j \in \pi_j^{-1}({\Sigma}_{\mathbf{X}})\ \hbox{for}\ j \in [d]\setminus e\ \hbox{and}\ B \in \Phi^e_{\mathbf{X}},$$ the definition of ${\lambda}$ gives $${\lambda}\Big(\Big(\bigcap_{j \in [d]\setminus e}\pi_j^{-1}(A_j)\Big)\cap \pi_i^{-1}(B)\Big) = \lim_{n{\longrightarrow}\infty}\int_X {\Lambda}_n(f_1,\ldots,f_d)\,{\mathrm{d}}\mu$$ with $$f_\ell := \left\{\begin{array}{ll}1_{A_\ell} & \quad \hbox{if}\ \ell \in [d]\setminus e\\ 1_B & \quad \hbox{if}\ \ell = i\\ 1 & \quad\hbox{else.} \end{array}\right.$$ By Proposition \[prop:char-factors-again\], one obtains the same limit from $$\lim_{n{\longrightarrow}\infty}\int_X {\Lambda}_n(f_1',\ldots,f_d')\,{\mathrm{d}}\mu$$ with $$f'_\ell := \left\{\begin{array}{ll}1_{A_\ell} & \quad \hbox{if}\ \ell \in [d]\setminus e \\ {\mathsf{E}}_\mu(1_B\,|\,\Delta) & \quad \hbox{if}\ \ell = i\\ 1 & \quad\hbox{else,} \end{array}\right.$$ and where in turn $$\Delta := \bigvee_{\ell \in [d]\setminus e,\,\ell < i}{\Sigma}^{T_{(\ell;i]}}_{\mathbf{X}}\vee \bigvee_{\ell \in [d]\setminus e,\, \ell > i}{\Sigma}^{T_{(i;\ell]}}_{\mathbf{X}}= \bigvee_{j \in [d]\setminus e}\Phi^{\{i,j\}}_{\mathbf{X}}.$$
This implies that $\pi_i^{-1}(\Phi^e_{\mathbf{X}})$ is relatively independent from $\bigvee_{j\in [d]\setminus e}\pi_j^{-1}({\Sigma}_{\mathbf{X}})$ over $\pi_i^{-1}(\Delta)$ under ${\lambda}$. On the other hand, Corollary \[cor:second-rel-ind\] gives that $\Phi^e_{\mathbf{X}}$ is relatively independent from $\Delta$ over $\bigvee_{j\in [d]\setminus e}\Phi^{e\cup\{j\}}_{\mathbf{X}}$. Combining these conclusions completes the proof in this case.
*Step 2.*The general case can now be treated for fixed ${\mathcal{I}}$ by induction on ${\mathcal{J}}$. If ${\mathcal{J}}\subseteq {\mathcal{I}}$ then the result is clear, so now let $e$ be a minimal member of ${\mathcal{J}}\setminus{\mathcal{I}}$ of maximal size, and let ${\mathcal{K}} :=
{\mathcal{J}}\setminus\{e\}$. It will suffice to prove that if $F \in
L^\infty({\lambda})$ is ${\widehat{\Phi}}^{\mathcal{J}}_{\mathbf{X}}$-measurable, then $${\mathsf{E}}_{\lambda}(F\,|\,{\widehat{\Phi}}^{\mathcal{I}}_{\mathbf{X}}) = {\mathsf{E}}_{\lambda}(F\,|\,{\widehat{\Phi}}^{{\mathcal{I}}\cap{\mathcal{J}}}_{\mathbf{X}}).$$ Furthermore, by an approximation in $\|\cdot\|_2$ by finite sums of products, it suffices to prove this only for $F$ that are of the form $F_1\cdot
F_2$ with $F_1$ and $F_2$ being bounded and respectively ${\widehat{\Phi}}^{\langle e \rangle}_{\mathbf{X}}$- and ${\widehat{\Phi}}^{{\mathcal{K}}}_{\mathbf{X}}$-measurable. However, for such a product we can write $${\mathsf{E}}_{\lambda}(F\,|\,{\widehat{\Phi}}^{{\mathcal{I}}}_{\mathbf{X}}) =
{\mathsf{E}}_{\lambda}\big({\mathsf{E}}_{\lambda}(F\,|\,{\widehat{\Phi}}^{{\mathcal{I}}\cup{\mathcal{K}}}_{\mathbf{X}})\,\big|\,{\widehat{\Phi}}^{{\mathcal{I}}}_{\mathbf{X}}\big)
=
{\mathsf{E}}_{\lambda}\big({\mathsf{E}}_{\lambda}(F_1\,|\,{\widehat{\Phi}}^{{\mathcal{I}}\cup{\mathcal{K}}}_{\mathbf{X}})\cdot
F_2\,\big|\,{\widehat{\Phi}}^{{\mathcal{I}}}_{\mathbf{X}}\big).$$ By Step 1 we have $${\mathsf{E}}_{\lambda}(F_1\,|\,{\widehat{\Phi}}^{{\mathcal{I}}\cup{\mathcal{K}}}_{\mathbf{X}})
= {\mathsf{E}}_{\lambda}(F_1\,|\,{\widehat{\Phi}}^{({\mathcal{I}}\cup{\mathcal{K}})\cap\langle
e\rangle}_{\mathbf{X}}),$$ and on the other hand $({\mathcal{I}}\cup{\mathcal{K}})\cap\langle
e\rangle \subseteq {\mathcal{K}}$ (because ${\mathcal{K}}$ contains every subset of $[d]$ that strictly includes $e$, since ${\mathcal{J}}$ is an up-set). Therefore $({\mathcal{I}}\cup{\mathcal{K}})\cap\langle
e\rangle = {\mathcal{K}}\cap \langle e\rangle$ and therefore another appeal to Step 1 gives $${\mathsf{E}}_{\lambda}(F_1\,|\,{\widehat{\Phi}}^{({\mathcal{I}}\cup{\mathcal{K}})\cap\langle
e\rangle}_{\mathbf{X}}) =
{\mathsf{E}}_{\lambda}(F_1\,|\,{\widehat{\Phi}}^{{\mathcal{K}}}_{\mathbf{X}}).$$ Therefore the above expression for ${\mathsf{E}}_{\lambda}(F_1F_2\,|\,{\widehat{\Phi}}^{{\mathcal{I}}}_{\mathbf{X}})$ simplifies to $$\begin{gathered}
{\mathsf{E}}_{\lambda}\big({\mathsf{E}}_{\lambda}(F_1\,|\,{\widehat{\Phi}}^{{\mathcal{K}}}_{\mathbf{X}})\cdot
F_2\,\big|\,{\widehat{\Phi}}^{{\mathcal{I}}}_{\mathbf{X}}\big) =
{\mathsf{E}}_{\lambda}\big({\mathsf{E}}_{\lambda}(F_1\cdot
F_2\,|\,{\widehat{\Phi}}^{{\mathcal{K}}}_{\mathbf{X}})\,\big|\,{\widehat{\Phi}}^{{\mathcal{I}}}_{\mathbf{X}}\big)\\
= {\mathsf{E}}_{\lambda}\big({\mathsf{E}}_{\lambda}(F\,|\,{\widehat{\Phi}}^{{\mathcal{K}}}_{\mathbf{X}})\,\big|\,{\widehat{\Phi}}^{{\mathcal{I}}}_{\mathbf{X}}\big)
= {\mathsf{E}}_{\lambda}(F\,|\,{\widehat{\Phi}}^{{\mathcal{I}}\cap
{\mathcal{K}}}_{\mathbf{X}}) =
{\mathsf{E}}_{\lambda}(F\,|\,{\widehat{\Phi}}^{{\mathcal{I}}\cap{\mathcal{J}}}_{\mathbf{X}}),\end{gathered}$$ where the third equality follows by the inductive hypothesis applied to ${\mathcal{K}}$ and ${\mathcal{I}}$.
*Part (1).*Since ${\mathbf{X}}$ is fully sated, in particular it is sated with respect to the functorial ${\sigma}$-subalgebra $$\bigvee_{\ell=1}^{i-1}{\Sigma}^{T_{(\ell;i]}}_{\mathbf{X}}\vee \bigvee_{\ell=i+1}^d{\Sigma}^{T_{(i;\ell]}}_{\mathbf{X}}= \bigvee_{\ell=1}^{i-1}\Phi^{\{\ell,i\}}_{\mathbf{X}}\vee \bigvee_{\ell=i+1}^d\Phi^{\{i,\ell\}}_{\mathbf{X}}= \Phi_{\mathbf{X}}^{\langle i\rangle}$$ for each $1 \leq i \leq d$. Therefore Proposition \[prop:char-factors-again\] gives $$\begin{aligned}
\int_{X^d} f_1\otimes \cdots \otimes f_d\,{\mathrm{d}}{\lambda}&=& \lim_{n{\longrightarrow}\infty} \frac{1}{|F_n|}\sum_{g \in F_n} \int_X \prod_{i=1}^d (f_i\circ T_{[1;i]}^g)\,{\mathrm{d}}\mu\\
&=& \lim_{n{\longrightarrow}\infty} \frac{1}{|F_n|}\sum_{g \in F_n} \int_X \prod_{i=1}^d({\mathsf{E}}_\mu(f_i\,|\,\Phi^{\langle i\rangle}_{\mathbf{X}})\circ T_{[1;i]}^g)\,{\mathrm{d}}\mu\\
&=& \int_{X^d} {\mathsf{E}}_\mu(f_1\,|\,\Phi^{\langle 1\rangle}_{\mathbf{X}})\otimes \cdots \otimes {\mathsf{E}}_\mu(f_d\,|\,\Phi^{\langle d\rangle}_{\mathbf{X}}) \,{\mathrm{d}}{\lambda}\end{aligned}$$ for any $f_1$, …, $f_d \in L^\infty(\mu)$.
*Part (2).*Property (i) of Proposition \[prop:infremove\] holds by construction of the ${\sigma}$-algebras $\Phi^e_{\mathbf{X}}$; property (ii) is given by Lemma \[lem:diag\]; and property (iii) is given by Lemma \[lem:rel-ind\].
[^1]: Research supported by a fellowship from the Clay Mathematics Institute
|
Alcohol-mediated calcium signals dysregulate pro-survival Snai2/PUMA/Bcl2 networks to promote p53-mediated apoptosis in avian neural crest progenitors.
Prenatal alcohol exposure causes distinctive craniofacial anomalies that arise, in part, from the apoptotic elimination of neural crest (NC) progenitors that form the face. This vulnerability of NC to alcohol is puzzling as they normally express the transcriptional repressor Snail1/2 (in chick Snai2), which suppresses apoptosis and promotes their migration. Here, we investigate alcohol's impact upon Snai2 function. Chick cranial NC cells were treated with acute alcohol (52 mM, 2 hr). We evaluated NC migration, gene expression, proliferation, and apoptosis thereafter. Transient alcohol exposure induced Snai2 (191% ± 23%; p = .003) and stimulated NC migration (p = .0092). An alcohol-induced calcium transient mediated this Snai2 induction, and BAPTA-AM blocked whereas ionomycin mimicked these pro-migratory effects. Alcohol suppressed CyclinD1 protein content (59.1 ± 12%, p = .007) and NC proliferation (19.7 ± 5.8%, p < .001), but these Snai2-enriched cells still apoptosed in response to alcohol. This was explained because alcohol induced p53 (198 ± 29%, p = .023), and the p53 antagonist pifithrin-α prevented their apoptosis. Moreover, alcohol counteracted Snai2's pro-survival signals, and Bcl2 was repressed (68.5 ± 6.0% of controls, p = .016) and PUMA was not induced, while ATM (1.32-fold, p = .01) and PTEN (1.30-fold, p = .028) were elevated. Alcohol's calcium transient uncouples the Snai2/p53 regulatory loop that normally prevents apoptosis during EMT. This represents a novel pathway in alcohol's neurotoxicity, and complements demonstrations that alcohol suppresses PUMA in mouse NC. We propose that the NCs migratory behavior, and their requirement for Snai2/p53 co-expression, makes them vulnerable to stressors that dysregulate Snai2/p53 interactions, such as alcohol. |
Introduction {#s1}
============
Sleep is a conserved behavioral state of fundamental significance. Nevertheless, the nature of its relevance to brain function is still a matter of active research and debate ([@bib33]). Most studies of sleep function focus on consequences of sleep loss for performance, in particular cognitive ability, or for overall physiology. Little is known about the impact of sleep on basic cell physiology or the extent to which cellular perturbations affect sleep. Amid the existing hypotheses for the purpose of sleep, multiple avenues exist for glial contribution to both regulation and function ([@bib17]), which have been minimally explored.
Glial function has been linked to sleep in some contexts ([@bib6]; [@bib7]; [@bib22]; [@bib15]; [@bib49]). Sleep is well-associated with improved learning and memory, and appears to support synaptic remodeling ([@bib33]; [@bib52]), which may be accomplished in part by astrocyte and microglial activation ([@bib4]). Clearance of brain interstitial fluid has been shown to require the glymphatic system that involves astrocytes and whose function is enhanced during sleep ([@bib58]). Glial signaling may also contribute to sleep need ([@bib6]; [@bib22]), potentially as a consequence of astrocytic sensing of metabolic or energetic conditions ([@bib8]).
In *Drosophila* ([@bib49]) and mice ([@bib22]), astrocytes reportedly influence sleep amount or quality following sleep deprivation. Disruption of vesicular trafficking in mouse astrocytes by dnSNARE expression prevented homeostatic rebound sleep following deprivation, suggesting that glia release sleep-promoting factors ([@bib22]). Likewise, *Notch* signaling acts in fly astrocytes to modulate sleep and learning in response to sleep loss ([@bib49]). Endocytic/exocytic trafficking is also important in fly glia for the regulation of circadian behavior ([@bib38]; [@bib37]), but effects on sleep have not been explored. Given the genetic tools and accessibility of defined glial populations in *Drosophila* ([@bib14]), the model is well positioned to discover new aspects of glial influence on sleep.
Results {#s2}
=======
Blocking vesicular trafficking in glia increases sleep {#s2-1}
------------------------------------------------------
To address the role of glia in homeostatic sleep in *Drosophila*, specifically rebound sleep following deprivation, we blocked vesicular trafficking during sleep deprivation using *Shibire^ts1^* (or *Shi^1^*), a temperature-sensitive dominant negative allele of *dynamin*, a GTPase involved in membrane scission ([@bib53]). Flies expressing Shibire^ts1^ (UAS-*Shi^1^*) by a pan-glial driver (*Repo*-GAL4) were raised at permissive temperature (18°C) until adulthood and subjected to mechanical sleep deprivation while being monitored for sleep/activity levels. Concurrently with the start of mechanical deprivation at lights off (Zeitgeber Time (ZT) 12), *Shi^1^* was induced by raising the temperature to a restrictive 30°C. Mechanical deprivation was applied for 12 hr, concluding at the beginning of the following day (ZT 0), when the temperature was returned to permissive 18°C.
While mechanical sleep deprivation is not always total, and acclimation occurs over longer timespans, Repo-GAL4 \> UAS-Shi^1^ flies exhibited a surprisingly large amount of sleep above controls throughout the deprivation period, precluding any analysis of subsequent rebound. Experimental flies slept over 300 min in the course of 12 hr of mechanical deprivation, significantly greater than both parental controls ([Figure 1A](#fig1){ref-type="fig"}). This effect was present in both males and females and was confirmed with an additional line containing an independent single *Shi^1^* insertion (UAS-*20xShi^1^*) ([Figure 1A](#fig1){ref-type="fig"}).
![Inhibition of endocytosis in glia produces resistance to mechanical sleep deprivation.\
(**A**) Resistance to mechanical sleep deprivation, manifest as elevated sleep during stimulation, for *Repo*-GAL4 \> UAS *Shi.ts1*;UAS-*Shi.ts1* female flies (n = 14--16, per genotype) and male (n = 16, per genotype) at both 30°C and 18°C. Dashed box indicates the period of mechanical deprivation, ZT12-24. Red shading indicates 30°C, otherwise the temperature is 18°C. (**B**) Sleep during deprivation at permissive temperature (18°C) was also present using an additional *Shi^1^* line, in *Repo*-GAL4 \> UAS-*20xShi.ts1* females (n = 16, per genotype) and males (n = 16, per genotype). One-way ANOVA with Holm-Sidak post-hoc test, \*p\<0.05, \*\*p\<0.01, \*\*\*p\<0.001. Error bars represent standard error of the mean (SEM).](elife-43326-fig1){#fig1}
In principle, *Shi^1^* is an allele for a temperature-sensitive dynamin whose vesicle-forming membrane scission function declines with heightened temperature to act as a dominant negative. However, quite surprisingly, we found that increased sleep evident during mechanical deprivation was not dependent on a shift from permissive to restrictive temperature, as *Repo \> Shi^1^* flies deprived at 18°C exhibited greater sleep as compared to controls, commensurate to experimental flies at 30°C ([Figure 1B](#fig1){ref-type="fig"}). As discussed later, the temperature benchmarks established for dynamin inactivation may not be appropriate for all cell populations or phenotypes ([@bib31]). Importantly, the locomotor activity during wake (activity index) of *Repo* \> *Shi^1^* flies at permissive temperature does not significantly differ from that of controls ([Figure 2](#fig2){ref-type="fig"}), suggesting that the effect is particular to sleep and not simply locomotor impairment which may otherwise be observed with glial manipulation ([@bib62]). Additionally, to rule out that *Repo* \> *Shi^1^* flies may be less sensitive to the mechanical deprivation stimulus, we stimulated flies between ZT11 and ZT12, a time when most flies are awake. We found that stimulation of awake flies increased beam crossing, and that the average locomotor activity for experimental flies during this time did not differ significantly from that of controls ([Figure 1---figure supplement 1](#fig1s1){ref-type="fig"}). Therefore, it is unlikely that the increased sleep of *Repo* \> *Shi^1^* flies during mechanical deprivation is a result of diminished sensitivity to the stimulus.
![Inhibition of endocytosis in glia increases baseline sleep.\
(**A**) Daily baseline sleep amount (3 day mean) and sleep/activity characteristics including mean daytime sleep bout number, bout length, and activity index for *Repo*-GAL4 \> UAS *Shi.ts1*;UAS-*Shi.ts1* female flies at 18°C (n = 19--26), and (**B**) *Repo*-GAL4 \> UAS-*20xShi.ts1* females (n = 23--31). (**C**) Daytime sleep for female flies at 18°C expressing either a constitutively dominant negative Shi (UAS-*Shi.K44A*) (n = 15--16) or a wild-type Shi (UAS-*Shi.WT*) (n = 15--32) by *Repo*-GAL4. One-way ANOVA with Holm-Sidak post-hoc test, \*p\<0.05, \*\*p\<0.01, \*\*\*p\<0.001. Error bars represent standard error of the mean (SEM).](elife-43326-fig2){#fig2}
Based on the resistance to sleep deprivation displayed by *Repo* \> *Shi^1^* flies, which may represent greater sleep pressure, we closely examined daily, unperturbed sleep. Flies expressing *Shi^1^* in all glia had significantly greater total sleep than controls ([Figure 2A](#fig2){ref-type="fig"}) at 18°C, which was consistent across independent *Shi^1^* lines ([Figure 2B](#fig2){ref-type="fig"}) in females as well as males ([Figure 2---figure supplement 1A--B](#fig2s1){ref-type="fig"}). Expression of *Shi^1^* with *Repo*-GAL4 at permissive temperature resulted in an equivalent number of sleep bouts across the day, but significantly longer average bout lengths in almost all lines and sexes (see exception in [Figure 2---figure supplement 1A](#fig2s1){ref-type="fig"}), suggesting that sleep was also better consolidated ([Figure 2](#fig2){ref-type="fig"} and [Figure 2---figure supplement 1A--B](#fig2s1){ref-type="fig"}).
While we did not observe an appreciable difference in resistance to sleep deprivation between 18° C and 30°C, adult *Repo*-\>*Shi^1^* flies raised at 18°C were also shifted to 30°C for 2 days to examine if the baseline sleep phenotype could be exaggerated. The pattern of *Drosophila* sleep across the day is known to alter at temperatures exceeding those preferred by flies (\~25°C)-- with greater sleep occurring during the daytime at the expense of nighttime sleep ([@bib40]). Appropriately, when kept at 30°C, sleep loss occurred during the nighttime in all flies, but an appreciably greater amount of nighttime sleep was seen in *Repo* \> *Shi^1^* flies ([Figure 2---figure supplement 2A](#fig2s2){ref-type="fig"}). Total sleep at 30°C in experimental female flies was equivalent to that at 18 degrees ([Figure 2---figure supplement 2B](#fig2s2){ref-type="fig"}, and even diminished in males [Figure 2---figure supplement 2C](#fig2s2){ref-type="fig"}), suggesting that the effect of glial *Shi^1^* on daily sleep is substantial even at allegedly permissive temperature. A nighttime phenotype is not seen at 18°C most likely due to ceiling amounts of sleep in controls but is clearly present at 30°C, where the temperature-dependent change in sleep pattern shifts control sleep to daytime hours. This suggests that *Shi*^1^ expression can increase sleep throughout the day.
To determine whether increased sleep is the result of a partially dominant-negative *Shi^1^* at lower temperature or the overexpression of *Shi^1^*, we compared the effects of WT dynamin (*Shi^WT^*) with *Shi^K44A^*, a constitutive dominant negative allele of *dynamin*. While *Shi^K44A^* is also deficient for GTP hydrolysis, it is a distinct mutation from *Shi^1^*(G273D) ([@bib53]). Expression of *Shi^K44A^* in all glia resulted in significantly elevated sleep, in particular during the day, while expression of *Shi^WT^* had no effect ([Figure 2C](#fig2){ref-type="fig"}, [Figure 2---figure supplement 3](#fig2s3){ref-type="fig"} for total sleep). Given that a constitutively dominant negative dynamin phenocopies the effect of *Shi^1^* expression at 18°C, the sleep phenotype likely arises from inhibition of dynamin by *Shi^1^* even at the reportedly permissive temperature.
Glia of the blood brain barrier link sleep to vesicular trafficking {#s2-2}
-------------------------------------------------------------------
As noted above, astrocytes have previously been implicated in sleep ([@bib6]; [@bib22]; [@bib49]). In the fly, various glial classes have been described with corresponding GAL4 drivers generated for these classes ([@bib50]). Apart from astrocytes ([@bib11]), *Drosophila* glia include the ensheathing/wrapping glia ([@bib11]; [@bib28]), cortex glia ([@bib3]), and the two layers of the surface or blood-brain barrier glia ([@bib3]; [@bib46]). To determine whether any specific glial class is sufficient for the *Shi^1^* phenotype, we expressed *Shi^1^* at the permissive temperature using a panel of previously published GAL4 drivers targeting different glial populations ([Figure 3A](#fig3){ref-type="fig"}), with preference given to drivers which would isolate individual glial classes. Surprisingly, we did not observe a significant effect on sleep as compared to controls when using drivers expressed in astrocyte-like glia. Instead, expression of *Shi^1^* in the subperineurial (SPG) glia of the blood brain barrier, by *moody*-GAL4, produced a significant increase in total ([Figure 3A](#fig3){ref-type="fig"}) and daytime sleep [Figure 3---figure supplement 1](#fig3s1){ref-type="fig"}. The same was true, although to a lesser extent, with the NP6293-GAL4 driver, which expresses in the perineurial glia (PG), the second layer of the fly BBB (example expression [Figure 3---figure supplement 2](#fig3s2){ref-type="fig"}. The cumulative sleep increase produced by the two drivers is somewhat less than with Repo-G4, which likely reflects discrepancy in driver strength, but could also suggest a role for other populations -- nevertheless only the surface glial drivers were sufficient in isolation. Surface glia were also sufficient for the resistance to sleep deprivation phenotype, although only through the PG population ([Figure 3---figure supplement 3](#fig3s3){ref-type="fig"}Fig., S3.3). Together these data indicate an involvement of BBB glia in *Shi^1^*-mediated effects on fly sleep.
![Inhibition of endocytosis in surface glia is sufficient to increase sleep.\
(**A**) Total sleep at 18°C for female flies expressing *Shibire* (UAS-*20xShi.ts1*) by, from left to right, Alrm-GAL4 (n = 16, each genotype), MZ0709-GAL4 (n = 16--32), MZ0097-GAL4 (n = 16--32), NP2222-GAL4 (n = 16--32), NP6293-GAL4 (n = 29--32), *moody*-GAL4 (n = 16). MZ0709, MZ0097, and NP2222 experiments were loaded simultaneously and therefore share the same UAS-Control, graphed repeatedly for each to aid comparison. Significance markings shown for GAL4s in which the experimental group differed significantly from both controls. (**B**) Conditional expression of UAS-*20xShi.ts1* using *tub*Gal80.ts;*Rab9*-GAL4 at permissive (18°C) and restrictive temperature (30°C, red shading) (n = 9--19 females, mean of 4 days). (**C**) Exclusion of glial expression by *Repo*-Gal80 from the conditional expression of UAS-*20xShi.ts1* by *tub*Gal80.ts;*Rab9*-GAL4 at restrictive (18°C) and permissive temperature (30°C) (n = 15--16, mean of 4 days). One-way ANOVA with Holm-Sidak post-hoc test, \*p\<0.05, \*\*p\<0.01, \*\*\* is p\<0.001. Error bars represent standard error of the mean (SEM).](elife-43326-fig3){#fig3}
Inducing block of vesicular trafficking in adult blood brain barrier glia increases sleep {#s2-3}
-----------------------------------------------------------------------------------------
As an additional glial sub-type GAL4 driver, we observed that *Rab9*-GAL4 exhibits prominent expression in the BBB glia. To identify the BBB glial population labeled by *Rab9*-G4 we drove expression of a nuclear-localized GFP, which can differentiate the surface glial populations based on nuclear morphology and abundance ([@bib9]). The nuclei of perineurial glial are numerous and relatively small, while those of subperineurial glia are distinctively large and limited in number, consistent with the size and distribution of this glial class. The pattern of expression of nuclear GFP under the control of *Rab9*-G4 was typical of the subperineurial glia ([Figure 3---figure supplement 2A](#fig3s2){ref-type="fig"}), marking Rab9-G4 as an SPG driver. In addition, *Rab9*-G4 also shows some, albeit sparse, neuronal expression in the brain ([Figure 3---figure supplement 2B](#fig3s2){ref-type="fig"} for *Repo*-Gal80 images).
While constitutive expression of *Shi^1^*, even at permissive temperature, with *Rab9*-G4 was lethal, we observed prominently enhanced sleep when *Shi^1^* was conditionally expressed in adulthood using the TARGET system ([@bib35]) ([Figure 3B](#fig3){ref-type="fig"}). Further, conditional expression of *Shi^1^* with *Rab9*-G4 in the presence of *Repo*-GAL80, an inhibitor of GAL4 localized to all glial cells, prevented the increase in sleep otherwise seen with this driver ([Figure 3C](#fig3){ref-type="fig"}), concomitant with elimination of barrier expression ([Figure 3---figure supplement 2B](#fig3s2){ref-type="fig"}). These data exclude a contribution of neuronal expression of this driver and confirm the sufficiency of the subperineurial glia for the *Shi^1^*-mediated increase in sleep. We confirmed adult-specificity of *Shi^1^* effects by also using the TARGET system to induce *Repo* \> *Shi^1^* expression conditionally during adulthood. A temperature-shift increases sleep in these flies, and upon return to restrictive temperature, the sleep of experimental flies was no longer significantly different from that of controls ([Figure 3---figure supplement 1B](#fig3s1){ref-type="fig"}), demonstrating that the phenotype is not likely the result of permanent detrimental effects. Together these data establish that sleep increase upon *Shi* expression is inducible and reversible in adult animals, and is not solely a result of developmental changes.
*Shibire^1^* expression alters ultrastructure but not general integrity of the barrier {#s2-4}
--------------------------------------------------------------------------------------
Behavioral, electrophysiological or morphological phenotypes have previously been noted from *Shi^1^* expression at permissive temperature ([@bib21]; [@bib31]). Most prominently, overexpression of *Shi^1^* at 19°C within photoreceptor cells produces a modified ERG profile, accompanied by a decrement in endocytic vesicles and accumulation of microtubule bundles, amounting to gross morphological alteration at the ultrastructural level ([@bib21]). To determine whether the morphology of fly glia is affected by *Shi^1^* expression, we performed transmission electron microscopy (TEM) on *Repo* \> *Shi^1^* flies raised at permissive temperature. When viewed as a horizontal section through the fly brain, the BBB glia form the two most superficial cell layers which continuously envelope the entire circumference of the brain. The thicker and seemingly less electron-dense PG layer faces the luminal side, and the underlying SPG, considered to be the tight barrier by virtue of septate junctions, appear as a predominantly thinner layer with periodic expanded involutions and protrusions. Examination of the superficial layers reveals a dense and distinct cytoplasmic make-up in *Repo* \> *Shi^1^* brains. Most prominently, amassed and repeated ring-like structures, resembling the microtubule bundles previously reported ([@bib21]), appear in the experimental animals but are not seen in controls ([Figure 4A](#fig4){ref-type="fig"}). Additionally, the PG layer appears relatively thinner as compared to controls. This finding shows that in glia, as in neurons, *Shi^1^* expression even at permissive temperature results in a morphological alteration.
![Ultrastructural morphology and genetic analysis of Rab proteins support a sleeprelevant function of vesicle trafficking in surface glia.\
(**A**) Transmission electron micrographs of surface glia of individual *Repo*-GAL4 \> UAS-*20xShi.ts1* and Control female fly brains. Perineurial glia are the most superficial layer with subperineurial glia appearing as the generally thinner and darker layer immediately basal to the perineurial glia. White arrows indicate presence of microtubule bundles. (**B**) External aspect of hemolymph-brain barrier visualized by injection and fixation of Alexa647-10kd dextran in *Repo*-GAL4 \> USA-*20xShi.ts1* and control brains, demonstrating an intact barrier in both genotypes. (**C**) Total sleep time of RepoGS \> UAS Rab CA or DN flies, in the absence of RU486. Red bars represent UAS-Rab DN and green bars are UAS-Rab CA, with two insertions available in most cases (n = 7--16, for all genotypes). Significant Rabs are those in which all DN lines were consistently and significantly different from all CA lines measured by one-way ANOVA with Holm-Sidak post-hoc test or unpaired t-test for Rab30, with \*p\<0.05, \*\*p\<0.01, \*\*\*p\<0.001. Displayed significance value represents the largest p-value of the 3--4 comparisons. Error bars represent standard error of the mean (SEM). (**D**) Total sleep time of flies expressing Rab11 CA in all glia (*Repo*-GAL4), perineurial glia (NP6293-GAL4), and subperineurial glia (*Rab9*-GAL4) as compared to GAL4 and UAS controls (n = 15--30), statistics as above.](elife-43326-fig4){#fig4}
The principle role of the hemolymph-brain barrier is to preserve a selective barrier preventing free exchange of hemolymph and brain interstitial fluid. To assess whether expression of *Shi^1^* in glia compromises the general integrity of the barrier, we injected *Repo* \>*Shi^1^* flies with 10kD dextran conjugated to Alexa647, and dissected brains the next day for fixation and analysis by confocal microscopy. In animals with intact barriers, 10kd dextran is restricted from the brain, and forms a layer external to the surface glia ([@bib42]). In both *Repo* \>*Shi^1^* flies as well as parental controls, the fluorescent dextran was seen at the periphery of the brain ([Figure 4B](#fig4){ref-type="fig"}) indicating that *Shi^1^* expression does not create a leaky barrier. Taken together with the electron micrographs, these images support the finding that with *Shi^1^* expression, general barrier integrity is intact, but intracellular morphology is altered, although the link of the altered morphology to endocytosis is unclear.
Alterations in specific Rab proteins affect sleep {#s2-5}
-------------------------------------------------
To better define the relevant pathway, we sought a relatively unbiased method for perturbing trafficking. The Rab proteins are a family of membrane-bound GTPases that demarcate trafficking compartments (e.g. early, recycling, late endosomes, etc) and are known to regulate diverse vesicle movement within the cell, including exo- and endocytotic pathways. We asked which trafficking pathways are important in glia for sleep regulation by screening an existing collection of UAS-Rab lines ([@bib60]), which include both constitutively active (CA) and dominant negative (DN) constructs for the currently described *Drosophila* Rabs. For most Rabs in this collection, two separate insertions exist for each construct (DN and CA), and in the initial screen all available lines were crossed to a pan-glial driver, with hits defined as Rabs that showed opposing effects on sleep of all available CA as compared to all DN lines. In order to avoid potential lethality from overexpression of dominant negative constructs, we used a newly created hormone-inducible pan-glial driver, *Repo*-GeneSwitch (RepoGS). While lethality was not seen for any Rab using this driver, with or without RU486 feeding, we observed that expression was leaky ([Figure 4---figure supplement 1A](#fig4s1){ref-type="fig"}), that is not totally dependent on RU486, which has also been reported for other GeneSwitch lines ([@bib47]). Unfortunately, leakiness of RepoGS seemed particularly prominent in the surface glia, and so we examined effects of DN and CA lines on sleep in the presence and absence of RU486. When UAS-Rabs were expressed by RepoGS in the absence of RU, significant differences in sleep between DN and CA lines were found for Rab3, Rab9 and Rab11 ([Figure 4C](#fig4){ref-type="fig"}). In the presence of RU486, Rab1, Rab5, Rab27 and Rab30 were found significant ([Figure 4---figure supplement 1B](#fig4s1){ref-type="fig"}), albeit with only one line available for each DN and CA construct in the case of Rab30.
As preliminary screening compared only experimental flies (RepoGS \> UAS Rab) with or without RU, the Rabs of interest were confirmed with *Repo*-GAL4, including the full complement of UAS and GAL4 controls. For Rab3, Rab5 and Rab9, we did not observe sleep increases by this driver ([Figure 4---figure supplement 1C](#fig4s1){ref-type="fig"}), and while some Rab27 and Rab30 constructs did exhibit significant increases, we did not find consistent phenotypes when these lines were expressed by surface-glial drivers (data not shown). Rab1 CA also increased sleep relative to parental controls, but given that it affects ER/Golgi transport ([@bib32]), we considered it is less likely to be mechanistically similar to *Shi^1^*. In contrast, expression of recycling-endosome associated *Rab11* CA resulted in a robust sleep increase when driven in all glia ([Figure 4D](#fig4){ref-type="fig"}) and was significant for both CA lines. Unlike with RepoGS, Rab11 DN driven by *Repo*-GAL4 yielded lethality ([Figure 4---figure supplement 1C](#fig4s1){ref-type="fig"}), with no adult flies detected, which may be indicative of *Repo*-GAL4 as a stronger driver. Likewise, expression of Rab11 DN in either BBB population resulted in lethality (data not shown) while expression of *Rab11* CA in either surface glial population was sufficient to produce increases in total sleep ([Figure 4D](#fig4){ref-type="fig"}). Unlike with *Shi^1^*, we did not see resistance to sleep deprivation with Rab11 driven in glia ([Figure 4---figure supplement 2B](#fig4s2){ref-type="fig"}), which could indicate more widespread alteration in trafficking by *Shi^1^* than by Rab11 alone. Rab11 is associated with the recycling endosome, and through multiple effectors, is also necessary for endocytic transport, particularly in polarized cells ([@bib29]). Together these results identify the importance of Rab11 in the surface glia, and support the role of endocytic/endosomal trafficking in the sleep function of the surface glia.
Endocytosis occurs during sleep and is influenced by prior wakefulness {#s2-6}
----------------------------------------------------------------------
Considering that inhibition of endocytic trafficking in the fly hemolymph-brain barrier increases sleep, could rates of endocytosis at the barrier depend on sleep-wake state? Recent work in mice suggests that sleep serves to promote clearance of interstitial fluid, and consequently harmful metabolites which may have accumulated as a result of sustained neuronal activity during wake, through the glymphatic system ([@bib58]). Whether such clearance during sleep is a conserved feature in other organisms is currently unknown, but given that the barrier glia divide brain and body hemolymph in the fly, they are a prime candidate for regulating transport from brain interstitial fluid to the periphery as a function of sleep-wake state.
In order to evaluate effects of sleep-wake state on endocytosis, we collected flies from an early night time point (ZT14 - 2 hr after lights off) and an early day time point (ZT2 - 2 hr after lights on) ([Figure 5A](#fig5){ref-type="fig"}). At ZT14, sleep pressure is typically high following daytime arousal (flies are diurnal) and a majority of flies experience consolidated sleep, while ZT2 is associated with high locomotor activity. To quantify the amount of endocytosis in the surface glia, we labeled both surface glial layers with UAS-CD8::GFP using the 9--137-GAL4 driver and dissociated the brains to allow access of fluorescence-conjugated 10 kD dextran to the basolateral surface of the barrier (as even a smaller dextran did not penetrate the brain from the apical surface of the BBB [Figure 5---figure supplement 1](#fig5s1){ref-type="fig"}). Dissociated brain cells were incubated for 30 min at room temperature, prior to analysis by flow cytometry (Materials and methods) ([Figure 5---figure supplement 2](#fig5s2){ref-type="fig"}, for gating strategy). Barrier cells from flies at ZT14 contained significantly higher dextran, suggesting that endocytosis is favored by high sleep or sleep need ([Figure 5A](#fig5){ref-type="fig"}). To verify that incorporation of dextran into GFP+ surface glial cells reflects endocytosis, samples were also pre-incubated with dynasore ([@bib34]), an inhibitor of GTP hydrolysis in dynamin family proteins. At all time points, the AF-dextran signal was significantly diminished by the presence of dynasore ([Figure 5A](#fig5){ref-type="fig"}), indicating that a substantial portion of the signal is due to endocytosis.
![Sleep promotes endocytosis at the surface glia.\
Brains (n = 20, per condition in experiment) from 9-137 GAL4, UAS-CD8::GFP flies were dissected, dissociated, and the samples incubated with Alexa647-conjugated 10kd dextran in the presence or absence of the dynamin inhibitor, dynasore hydrate. Endocytosis measured from surface glial cells by AF647-Dextran signal, expressed as normalized median fluorescence intensity (MFI) (left) and percentage of cells with high endocytosis signal (right). Dextran MFI is normalized to the average MFI of the DH-treated samples. Paired Student's T-test with \*p\<0.05 and \*\*p\<0.01. Percentage of GFP+ cells displaying high signal with vehicle conditions was normalized to inhibitor for each respective timepoint to compare between experiments. One-way ANOVA with correlated measures with post-hoc Tukey's test with \*p\<0.05 and \*\*p\<0.01. (**A**) Endocytosis at ZT2, ZT2 following sleep deprivation (12 hr, mechanical stimulation) and ZT14 (n = 4 per time point, pooled from four experiments). (**B**) Endocytosis at night time points ZT14, ZT18, and ZT22 along with ZT2 (n = 4, pooled from four experiments). (**C**) Endocytosis at ZT2 after feeding of 0.1 mg/mL Gaboxadol or vehicle (n = 3, pooled from two experiments).](elife-43326-fig5){#fig5}
Given that a difference between ZT14 and ZT2 may be indicative of a circadian effect, independent of sleep-wake state, we evaluated flies at an identical time-point (ZT2), but following sleep deprivation (SD). Flies in the SD condition were mechanically sleep deprived for 12 hr beginning at ZT12 and ending at ZT0, and allowed 2 hr to recover, before also being dissected at ZT2. Hence, circadian time is equivalent between SD and non-SD animals, but flies recovering from SD should have greater sleep pressure. We find that flies taken from a state of recovery sleep following deprivation show substantially higher rates of endocytosed AF-dextran than their un-deprived controls at ZT2 ([Figure 5A](#fig5){ref-type="fig"}) -- a level of endocytosis commensurate to that from flies at ZT14.
Brains collected at 6 hr intervals over the course of the 24 hr day showed a rhythmic pattern, which was not significant as a circadian cycle by JTK, but indicated lowest and highest levels of endocytosis at ZT2 and ZT14, respectively ([Figure 5---figure supplement 3B](#fig5s3){ref-type="fig"}). To determine when endocytosis declines after the peak at ZT14, we assessed rates over the course of sleep to find that endocytosis is higher at ZT14, as compared to ZT18, ZT22 and ZT2, which are not statistically distinguishable ([Figure 5B](#fig5){ref-type="fig"}). This would suggest that endocytosis at the barrier is maximal and largely accomplished within the first half of the night. Since enhanced endocytosis at ZT2 following sleep deprivation could be a result of stress rather than enhanced sleep, we fed the sleep-inducing drug, Gaboxadol (GBX) (otherwise known as THIP) ([@bib5]; [@bib10]; [@bib55]). While exposure to Gaboxadol during the day did not alter the high endocytosis observed at ZT14 ([Figure 5---figure supplement 3A](#fig5s3){ref-type="fig"}), Gaboxadol-treated flies showed increased endocytosis at ZT2 ([Figure 5C](#fig5){ref-type="fig"}).
Together these findings demonstrate that endocytosis at the hemolymph-brain barrier occurs preferentially during sleep and reflects sleep need. It is normally high during the early night when sleep predominates but can be increased in the early day if flies undergo recovery sleep following deprivation the prior night or if they are induced to sleep by drug treatment.
Discussion {#s3}
==========
Glial cells are an important constituent of blood or hemolymph-brain barriers, a conserved feature of complex organisms that protects the central nervous system from unregulated exchange with humoral fluids. In this study, we show that manipulations of endocytosis and vesicular trafficking in the surface glia, particularly the subperineurial glia of the fly BBB, are sufficient to elevate baseline sleep amounts, and that at the BBB, endocytosis itself is influenced by sleep-wake state. Our findings expand the scope of glial involvement in sleep and suggest that trafficking through hemolymph- or blood-brain barriers is an underexplored determinant of sleep-wake behavior.
Expression of *Shibire^1^* has been a popular method to probe circuit-level influence on various fly behavior, with the prevailing interpretation being that exposure to non-permissive temperature abrogates synaptic transmission via an eventual depletion of the synaptic vesicle pool \-- a consequence of inhibited endocytosis. Ultrastructural work in neurons has revealed, however, that expression of *Shibire^1^* at the lower limit of permissive temperature markedly alters electrophysiological properties and intracellular structures ([@bib21]), which we also now find in glia. The microtubule defects we report in glia support cellular effects of *Shibire^1^* at permissive temperatures, although they are not necessarily related to behavioral phenotypes of *Shibire^1^* expression in glia (this work) or neurons ([@bib31]) under these conditions. Evidence for dynamin interaction with microtubules has primarily been from early in vitro experiments ([@bib16]), with in vivo work showing that only certain dynamin mutations alter microtubules ([@bib51]), underscoring a potentially separable impact of dynamin on endocytosis and microtubules.
*Shibire^1^* expression in *Drosophila* astrocytes was previously shown to disrupt circadian rhythms ([@bib37]), but those experiments were designed to prevent expression of *Shibire^1^* at permissive temperatures, leaving open the question of whether other glial phenotypes are independent of temperature. Interestingly, this study showed a decrement in rhythmicity upon expression of *Shibire^1^* at non-permissive temperature in either of the surface glia, although the total percentage of rhythmic animals was unaffected ([@bib37]). While sleep was not directly analyzed, a loss of robustness might be explained by increased sleep, present in the context of otherwise intact daily activity patterns. In our experiments, conditional expression of *Shibire^1^* in the surface glia or all glia of adult flies was sufficient to increase sleep, demonstrating that while a phenotype is evident at permissive temperature, it is likewise inducible in adulthood and therefore cannot be accounted for by developmental effects.
Dynamin (*Shibire*) is known to be fundamental to endocytosis and vesicle formation. Nevertheless, the stages of vesicular trafficking are intimately linked, making it difficult to exclusively manipulate, even at the level of molecular machinery, the processes of endocytosis and exocytosis ([@bib57]). Indeed, SNARE family members such as synaptobrevin, considered to be specific to exocytosis, have also been found to affect endocytosis ([@bib59]; [@bib61]). Therefore, we cannot exclude a contribution of exocytotic processes to the influence of the barrier on sleep, although our data clearly implicate endocytosis in barrier cells.
Rab GTPase family members orchestrate vesicular and membrane traffic within cells including glia ([@bib13]; [@bib36]) and the BBB, although knowledge of their roles in these populations has been limited. Knockdown of the microtubular motor protein, kinesin heavy chain (Khc), results in locomotor deficits attributable to developmental alterations in subperineurial glia ([@bib44]), and also seen with pan-glial Rab21 knockdown. While dynamin also could interact with microtubules, we did not observe locomotor deficits in flies expressing *Shibire^1^*. Through screening of available CA and DN Rab constructs, we identified Rab11 as important for sleep regulation in the barrier glia. We find that Rab11 CA expression, like *Shibire^1^*, produces increases in total sleep when driven in the barrier populations. Constitutive expression of a dominant negative Rab11 is lethal when present in all glia or even just in surface glia, underscoring the importance of this Rab in barrier cells. Rab11 is considered a marker of the recycling endosome compartment, regulating recycling of plasma membrane constituent proteins, although evidence also links Rab11 to more direct participation in early endocytosis. For example, Rab11 functions in *Drosophila* astrocytes to regulate endocytosis of the GABA transporter (GAT) ([@bib62]) and Rab11 knockdown has been shown to inhibit endocytosis and transcytosis of LDL in human iPSC-derived neurons ([@bib56]). Considering that DN and CA mutations of Rab11 can alter trafficking in the same direction in some conditions ([@bib30]), it is possible that Rab11CA inhibits endocytosis at the BBB. Alternatively, Rab11CA could produce a similar phenotype to *Shi^1^* by a different, but related mechanism. For example, while Rab11 DN inhibits recycling of plasma membrane components ([@bib32]), Rab11 CA could enhance recycling. If the mechanism underlying sleep increase at the BBB involves trafficking a particular receptor then according to this model, both inhibiting endocytosis and enhancing recycling would keep this receptor at the membrane.
While we demonstrate that interference with vesicle trafficking and endocytosis at the BBB can alter sleep, and endocytosis in these populations is affected by sleep-wake state, the nature of the sleep-relevant substrates or molecules remains to be determined. The hemolymph-brain barrier, like its mammalian counterpart, contains numerous transporters and receptors ([@bib9]) serving to selectively move nutrients and metabolites in, and deleterious compounds such as xenobiotics out. Mutants for the xenobiotic transporter, *Mdr65*, show greater total sleep, but effects have not been directly mapped to the barrier ([@bib24]). We demonstrated recently that efflux transporters in the *Drosophila* BBB are under circadian regulation such that they preferentially pump out xenobiotics during the day. At night, a decrease in transporter activity increases permeability of xenobiotics into the brain ([@bib63]). Based on our current findings, we suggest that activities of the BBB are temporally compartmentalized, such that efflux occurs during the day and endocytosis at night. However, endocytosis is dependent on sleep and sleep history rather than the circadian clock as it will occur during daytime recovery sleep following sleep deprivation at night. Neurotransmitter/modulator levels are known to influence, and vary according to, sleep-wake state ([@bib48]) and are regulated by glial populations, which could include the BBB glia. To determine if this was the case, we assessed biogenic amine and amino acid content in the brains of *Repo* \> *Shi^1^* flies, but found no consistent differences relative to controls ([Figure 5---figure supplement 4](#fig5s4){ref-type="fig"}).
In mammals, a glymphatic system, involving aquaporin channels in astrocytes, promotes flow of interstitial fluid along the brain vasculature and mixing with cerebrospinal fluid to allow exchange of brain fluids and clearance of waste products ([@bib27]; [@bib58]). Interestingly, this flow is enhanced during the sleep state ([@bib58]). *Drosophila*, as other invertebrates, possess an open circulatory system and thereby lack vasculature within the brain. Nevertheless, separation between the interstitial fluid of the brain and the hemolymph at large is maintained by the hemolymph-brain barrier. Our finding of a role for barrier glia in fly sleep, and the influence of sleep state on endocytosis at the barrier, supports the possibility that clearance or interstitial exchange is a conserved function of sleep. As we find that peripherally injected 10kd dextran does not enter the brain, we speculate that sleep-dependent endocytosis in dissociated BBB cells reflects trafficking from, rather than to, the brain. We suggest that BBB endocytosis occurs during sleep to resolve products of wakefulness and thereby restore metabolic/neural homeostasis, which would account for the increased sleep need that results from a block in endocytosis. In other words, endocytosis would be highest during sleep, and decrease during the night as sleep pressure is resolved. Flies with inhibited endocytosis would be unable to perform this function and resolve sleep pressure, and would in consequence exhibit constantly elevated sleep. By this model, administration of Gaboxadol increases sleep pressure and so is associated with high endocytosis at ZT2 and ZT14, regardless of the baseline levels of endocytosis at these time points.
Sleep was previously linked to permeability of the BBB in rodents, where sleep loss, and even just REM restriction, was shown to increase BBB permeability ([@bib20]; [@bib23]; [@bib26]). These effects were attributed to adenosine ([@bib26]), which is also considered a somnogenic molecule ([@bib43]). In fact, adenosine may be relevant to the interaction between astrocytes and sleep ([@bib18]; [@bib22]; [@bib45]). Given that astrocytes contribute to the mammalian BBB ([@bib1]), it is possible that sleep effects produced by inhibiting astrocyte signaling ([@bib22]) involve secondary effects on the BBB.
*Drosophila* sleep studies have focused on neuronal circuits controlling sleep-wake ([@bib2]; [@bib12]), with comparatively few studies investigating the contribution of glia to this circuitry. We identify the barrier glia as regulators of sleep and propose that endocytic trafficking through the barrier is an important function of the sleep state. The specific differences between mammalian and invertebrate barriers notwithstanding, the identification of the glial/endothelial barrier as a population that can mediate changes in daily sleep aligns with emerging ideas of BBB involvement in behavior ([@bib25]; [@bib41]) and sleep function ([@bib39]; [@bib54]), and provides a readily identifiable cellular target to interrogate in other model organisms.
Materials and methods {#s4}
=====================
Fly lines {#s4-1}
---------
Stocks present in the lab collection include---; ;*Repo*-GAL4/TM3,Sb and UAS-*Shi.ts1*; UAS-*Shi.ts1* (referred to as UAS-*Shi^1^* in the text) and UAS-CD8::GFP and UAS*-*nGFP. For control genotypes, GAL4 and UAS lines were crossed to iso31.; ;UAS*-20xShi.ts1* (referred to as UAS*-20xShi^1^*) was shared by Gerald Rubin. UAS*-Shi.WT* and UAS-*Shi.K44A* were shared by Konrad Zinsmaier. NP2222-GAL4, NP6293-GAL4, *Alrm*-GAL4, MZ0709-GAL4, MZ0097-GAL4 were shared by Marc Freeman. *Moody-*GAL4 and 9--137 GAL4 was shared by Roland Bainton. UAS-Rab CA and DN lines were acquired from the Bloomington Drosophila Stock Center. *Rab9*-GAL4 (\#51587) was also acquired from Bloomington.
To generate the; ;*Repo*-GeneSwitch 2301 line a 4.2 kb genomic fragment (between coordinates 18231884 and 18236068, FlyBase release 6.19) was amplified by PCR and cloned into a PUAST-AttB-Sfi-GeneSwitch vector. Transgenesis for this construct was performed by BestGene at landing site AttP154 (97D2).
Behavior {#s4-2}
--------
Flies were raised in bottles on standard food at either room, or non-permissive temperature (18--19°C) for Shibire and TARGET system ([@bib35]) experiments.
For sleep recording, flies were loaded into glass locomotor tubes containing 5% sucrose in 2% agar, and additionally 0.5 mM RU-486 (mifepristone) in the case of GeneSwitch experiments. Locomotor data was collected using the *Drosophila* Activity Monitoring (DAM) System (Trikinetics, Waltham, MA) and processed using PySolo([@bib19]). Data are processed as 1 min bins, with sleep defined as 5 min without activity. Activity index refers to the average number of beam crossings within an active bout.
Sleep deprivation was performed by mechanical disruption using a vortexer triggered to shake randomly for 2 s out of every 20, for the span of 12 hr beginning at lights-OFF, ZT12. Flies were kept in incubators under 12 hr light: 12 hr dark (LD12:12) cycles and constant temperature (25°C or 18°C or 30[°C]{.ul}). In the case of the initial temperature shift experiments with *Shibire^1^*, flies were kept at 18°C, and shifted to 30°C for the duration of the night, before being returned to 18°C at lights-ON, ZT0. For behavioral experiments, adult flies of at least 6-days post-eclosion were used, except in the case of tubGal80.ts experiments, where younger flies were loaded to grant additional time to compensate for the loss of strength due to incomplete de-repression of tubGal80.ts.
Confocal imaging {#s4-3}
----------------
Fly brains were fixed in 4% PFA in PBS with 0.1% TritonX-100 for 15--20 min, and washed in PBST for 30 min at room temperature, before mounting in VectaShield H-1000 (Vector Laboratories). Confocal imaging was performed on a Leica TCS SP5.
Electron microscopy {#s4-4}
-------------------
Heads from female *Repo* \> UAS-*20xShi^1^* flies approximately two weeks post-eclosion were dissected in a cold room in PBS and fixed with 2.5% glutaraldehyde, 2.0% paraformaldehyde in 0.1M sodium cacodylate buffer, pH7.4, overnight at 4°C. Samples were post-fixed in 2.0% osmium tetroxide for 1 hour at room temperature, and rinsed in DH~2~O prior to *en bloc* staining with 2% uranyl acetate. After dehydration through a graded ethanol series, the tissue was infiltrated and embedded in EMbed-812 (Electron Microscopy Sciences, Fort Washington, PA). Flies were not strictly circadian entrained or taken at an exact time of day, but dissections were performed together in the afternoon. Reported images represent sections from single flies from each genotype, although the experimental was compared to both parental controls. The described microtubule structures were not seen in the controls. Embedding, staining and sectioning was performed by the Electron Microscopy Resource Laboratory at Penn. Thin sections were stained with uranyl acetate and lead citrate and examined with a JEOL 1010 electron microscope fitted with a Hamamatsu digital camera and AMT Advantage image capture software.
Hemolymph-brain barrier permeability {#s4-5}
------------------------------------
Integrity of the barrier was assessed as previously described ([@bib42]). Female flies were injected with Alexa fluor 647-conjugated 10 kd dextran (ThermoFisher D22914) the day before dissection and kept in standard food vials. Heads were removed and fixed in 4% PFA in PBS for 10--15 min before brains were further dissected out and cleaned. Brains were additionally washed in PBS for 30 min before being mounted in VectaShield H-1000 (Vector Laboratories) and imaged by confocal microscopy.
HPLC/LC-MS {#s4-6}
----------
The brains of female flies ranging from 10 to 20 days post-eclosion were dissected in cold PBS, and collected to 20 brains per vial. Excess PBS was pipetted off after spinning the samples down by micro-centrifuge. The samples were frozen on dry ice and submitted to the Children's Hospital of Pennsylvania Metabolomic Core for HPLC analysis.
Endocytosis assay and flow cytometry {#s4-7}
------------------------------------
Flies expressing membrane bound GFP in the surface glia (9--137 GAL4;UAS-CD8::GFP) were dissected in ice-cold AHL (108 mM NaCl, 5 mM KCl, 2 mM CaCl~2~, 8.2 mM MgCl~2~, 4 mM NaHCO~3~, 1 mM NaH~2~PO~4~-H~2~O, 5 mM trehalose, 10 mM sucrose, 5 mM HEPES; pH 7.5), and 20 brains were collected per condition. To each sample, 60 μL of Collagenase IV (25 mg/mL) and 10 μL of DNase I (1 mg/mL) were added. Following shaking at 37°C for 15 min, brains were broken up by 3 rounds of gently pipetting. Using a 70-μm cell strainer, the brain samples were then transferred to FACS tubes, to which 3 mL of AHL was added and spun down for 5 min (2500 RPM). After removing the supernatant, the pellet was resuspended in AHL and brought to a volume of 200 μL, at which point the sample was split into two new FACS tubes of 100 μL each. One tube received an additional 50 μL of vehicle solution while 50 μL of dynasore hydrate solution (10 μM final concentration) was added to the other. The samples were mixed well and incubated at room temperature for 10 min. Following incubation, 50 μL of Alexa fluor 647-10kd dextran (50 μg/ml final concentration) was added to each tube, mixed, and incubated at room temperature for 30 min. 4 mL of FACS buffer (0.5% BSA w/v + 0.1% w/v sodium azide in PBS) were added to each tube, spun down and the supernatant removed. Samples were immediately analyzed using a FACS Canto II (BD Biosciences).
Gaboxadol feeding {#s4-8}
-----------------
Gaboxadol hydrochloride (Cayman Chemical Company) was added to standard 5% sucrose in 2% agar food in locomotor tubes at 0.1 mg/mL. For the ZT14 timepoint, flies were flipped to Gaboxadol food at lights ON (ZT0) while for the ZT2 timepoint they were flipped onto drug just before lights OFF (ZT12). In both cases, they remained on this food for \~14 hr until dissection.
Live imaging {#s4-9}
------------
6-cm plates were coated with poly-L-lysine (0.01%) for greater than 10 min, removed, and let dry. Brains were dissected in AHL, placed on the coated plates, and incubated with 50 μL droplet of 500 μL/mL 3kD FITC-conjugated dextran and either imaged continuously for 10 mins or dye was washed off and brains were imaged in AHL for 5 min. Confocol imaging was performed with 20x submergible water objective (with the lens touching the dye droplet) at excitation/emission wavelengths of 488/520. For a permeable dye, brains were dissected in AHL and incubated with 50 μL droplet of 125 μL/mL Rhodamine B and imaged continuously for 10 min. Imaging was performed with 20x submergible water objective at excitation/emission wavelengths of 543/555.
Statistical analysis {#s4-10}
--------------------
Graphs and statistical tests were completed using Excel and GraphPad Prism. FACS analysis was performed in FlowJo. For measures of sleep, Controls (GAL4 alone and UAS alone) were compared to Experimental (GAL4 \> UAS) animals by one-way ANOVA with Holm-Sidak post-hoc correction. For comparison of endocytosis between ZT2 and ZT14 or ZT2 and ZT2 SD or between each time point control and inhibitor, Students' T test was performed. Additional details regarding tests and significance values are provided in the figure legends.
Funding Information
===================
This paper was supported by the following grants:
- http://dx.doi.org/10.13039/100000002National Institutes of Health T32-HL07953 to Gregory Artiushin.
- http://dx.doi.org/10.13039/100000002National Institutes of Health R37NS048471 to Amita Sehgal.
- http://dx.doi.org/10.13039/100000863Ellison Medical Foundation AG-SS-2939-12 to Amita Sehgal.
- http://dx.doi.org/10.13039/100000011Howard Hughes Medical Institute to Amita Sehgal.
We thank Zhifeng Yue and Kiet Luu for technical support and members of the Sehgal lab for discussion and reagents. We would like to also thank the Gerald Rubin, Konrad Zinsmaier, Marc Freeman, and Roland Bainton labs for sharing reagents, and the Electron Microscopy Resource Laboratory at Penn and the Children's Hospital of Pennsylvania Metabolomic Core.
Additional information {#s5}
======================
No competing interests declared.
Conceptualization, Formal analysis, Investigation, Visualization, Methodology, Writing---original draft, Writing---review and editing.
Formal analysis; Investigation; Visualization; Methodology; Writing---review and editing.
Resources; Writing---review and editing.
Conceptualization; Supervision; Funding acquisition; Writing---review and editing.
Additional files {#s6}
================
10.7554/eLife.43326.020
Data availability {#s7}
-----------------
All data generated or analysed during this study are included in the manuscript and supporting files.
10.7554/eLife.43326.023
Decision letter
Ramaswami
Mani
Reviewing Editor
Trinity College Dublin
Ireland
In the interests of transparency, eLife includes the editorial decision letter and accompanying author responses. A lightly edited version of the letter sent to the authors after peer review is shown, indicating the most substantive concerns; minor comments are not usually included.
\[Editors' note: a previous version of this study was rejected after peer review, but the authors submitted for reconsideration. The first decision letter after peer review is shown below.\]
Thank you for submitting your work entitled \"Endocytosis at the blood-brain barrier as a function for sleep\" for consideration by *eLife*. Your article has been reviewed by a Senior Editor, a Reviewing Editor, and three reviewers. The following individuals involved in review of your submission have agreed to reveal their identity: Paul Taghert (Reviewer \#3).
Our decision has been reached after consultation between the reviewers. Based on these discussions and the individual reviews below, we regret to inform you that your work will not be considered further for publication in *eLife*. However, we do feel the work could be made acceptable but only after the essential changes noted below are handled experimentally. Should you choose to submit a new version of this work, we will endeavor to have it reviewed by the same Board member and referees.
Summary:
This paper explores the functional contributions of the blood brain barrier (BBB) to sleep regulation in *Drosophila*. It uses a full range of genetic cellular and imaging methods to consider the hypothesis that endocytosis/exocytosis in BBB glia changes in ways that supports the role of these cells in helping resolve levels of metabolites that increase in relation to sleep-need. Further it provides evidence for the involvement of glial Rab11 in the cellular mechanism. Experimentally analyzing glial function in sleep, the work touches an aspect of brain physiology that has just begun to be explored but that has been proposed as one of the crucial functions of sleep. Thus, this work is a potentially significant contribution of interest to a general audience.
Though work is clearly described, thorough in most aspects and also several caveats are clearly acknowledged, there are issues that need to be clarified and conclusions that need to be strengthened in order to better establish the key conclusion of the paper that inhibition of endocytosis in glia increases sleep.
Essential revisions:
1\) The authors nicely describe various difficulties experienced with genetic tools to perturb endocytosis in targeted glia (e.g. temperature-independent and potentially endocytosis-independent effects of shi-ts expression, as well as leaky GsGal4 expression). In addition, they report similar effects on sleep following expression of constitutively active and dominant negative forms of Rab11 as well as perturbation of Rabs that may not participate in endocytosis (Figure 4 and Figure 4---figure supplement 1). Thus, it is important to better establish sleep phenotypes arise from changes in endocytosis rather than non-specific glial malfunction. Some suggestions of additional experiments to support the hypothesised role of endocytosis are proposed below.
1a) To better characterise sleep-associated endocytosis, it would be useful to measure rates of endocytosis at 4-6 time points to define a daily cycle, not just two time points.
1b) Given the possibility that even adult-specific expression of mutant dynamin or Rab RNAi can have long-lasting changes in glial physiology or alterations in BBB permeability, it would be useful to test if these flies revert to normal sleep behaviour if allowed to recover for an appropriate period of time.
1c) To show that a different amount of sleep deprivation (more or less) produces a proportionate change in endocytosis (i.e., two or more points on the concentration-effect curve).
1d) To show bidirectionality of regulation and to control for potential contribution of stress rather than sleep drive, the authors should test whether endocytosis following more sleep is reduced (this may require orthogonal genetics: e.g. to drive sleep-inducing FB neurons).
2\) Different Gal4 lines are used to target subsets of glia. The specificity of these lines needs to be clearly documented. The logic for using one or other for different experiments needs to be clarified. And at least one case, an additional Gal4 may need to be used.
2a) The description of Gal4 expression lines (Figure 3---figure supplement 2) should be expanded Critically, to demonstrate that each one the Gal4s used is indeed expressed preferentially in glia, the figure should include counter stains with glia or neuron-specific antibodies (Repo and Elav, respectively). Glial-specific expression would be also more convincing if the authors could test how well the expression pattern of these Gal4s (Rab9-Gal4 in particular) is blocked by Repo\>Gal80. (More minor, it might help if an outline of the brain were drawn).
2b) The tubGal80.ts experiments utilize Rab9-Gal4. To more convincingly implicate the glial cells presumed to be targeted, these experiments should also be repeated with Moody-Gal4 (and possibly Repo-Gal4 as well).
3\) Figure 1 shows that of Shi-ts expression in glia induces resistance to mechanical stimulation during sleep. Can a control experiment be done to rule out the possibility of a sensory defect that makes these flies unresponsive to mechanical stimulation? E.g. To test the responsiveness of awake Repo\>Shi flies to mechanical stimulation? On this note, are the PG and SPG drivers expressed outside the brain in sensory structures?
Other concerns and suggestions:
4\) Is it necessary to dissociate cells before adding Alexa647-dextran? Why not measure before dissociation as most cellular processes including endocytosis could be more robust in an intact brain. If it is simply to allow access to Alexa647-dextran, then could an alternative smaller endocytic tracer be tried?
5\) Is resistance to mechanical stimulation following SD specific only to Shi, or also seen following endocytic Rab manipulation?
6\) The shi-ts expression results suggest that sleep during SD happens at both temperatures, but nighttime sleep seems to elevated sooner in both males and females at 18 degrees, than in controls. Is this impression correct? and if so, is there an explanation? This difference (if reproducible) involves latencies and time of day differences. The fly sleep literature appears to point to an increasing fragmentation of cellular mechanisms between those that affect daytime versus nighttime sleep. Is there any basis to think or expect that the cell biological mechanisms (exo- and endocytosis) should be geared to daytime versus nighttime?
7\) Figure 2C suggests that the effects of Shi-ts on sleep are not due to merely overexpression of Dynamin since the expression of Shi-wt does not have a significant effect. However, for Shi-wt, only total sleep is shown, whereas the main effect for Shi-ts at 18C is on day sleep. To exclude the possibility that a Shi-wt effect on sleep is masked when only total sleep is shown the figure should be revised to include data showing the effect of Shi-wt on daytime sleep.
8\) Indeed, it would useful to consistently show data for total sleep and daytime sleep for all genotypes in the paper (these data must be available).
9\) In Figure 3A, to exclude possible effects due to expression of Shi in neurons (in addition to expression in the BBB glia), the authors could show that these phenotypes remain when the expression in all glia is blocked using Repo\>Gal80.
10\) It would be valuable to test, with existing tools, to what extent surface glia are responsible for the phenotypes observed with the pan-glial driver, Repo. Does Shi expression in surface glia also cause resistance to mechanical sleep deprivation? Is the phenotype of either NP6293 or moody \>Shi weaker than that of Repo\>Shi and does combining NP6293 and moody Gal4s generate a phenotype comparable to that of Repo-Gal4? Why is the 9-137-Gal4 driver (SPG & PG) that is later used in Figure 5 (subsection "Endocytosis occurs during sleep and is influenced by prior wakefulness") not used here?
11\) Figure 3 localizing effect to surface glia: In Figure 3A -- which UAS-shi was used? The effect does not appear to match that of repo-Gal4. The difference is no more than 100 min; whereas. in Figure 2A, the difference is \>200 min. Is this lack of quantitative matching significant? Maybe it reflects the strength of the Gal4s but alternatively it could mean that other cells contribute. This should be discussed.
12\) In the same figure -- the lack of effect of astrocyte expression seems to be correlated with an unusually high value for the UAS control. Is there a reason to be concerned here?
13\) Regarding EM images in Figure 4A -- how abundant and frequent are these ultra-structural changes and how do they correlate with sleep phenotypes?
The observations themselves (amassed ring-like structures resembling microtubules, and a thinner PG layer) are only described to the level of positioning of two arrows in one of the micrographs. There should be some definition of the phenotypes and indication of prevalence, severity or quantification (either within or between animals). Were the suspected MTs coated or bridged as originally described in the paper cited? There no details provided in the methods regarding gender, time of day, age, or \"n\" value.
In addition, it would be useful to know if these are also seen following induction of wild-type dynamin, because WT-dynamin expression does not cause sleep phenotypes and there is the potential to examine how relevant these ultrastructural defects might be to the sleep effects observed. (Perhaps the cited EM paper has addressed this issue in neurons?) Are there any changes in membranes or vesicular structures that could potentially be connected to a block in endocytosis? What is the predicted EM phenotype associated with Rab11 CA expression?
14\) Is the overall structural integrity of BBB, as shown in Figure 4B, also preserved when Rab11CA is expressed in glia?
15\) In Figure 4C, the significance is determined based on a difference between DN and CA allele of each Rab protein. Is this the best criterion? Wouldn\'t it be better to compare each manipulation to the parental controls? In any event, it should be made clear why only Rab11 and not others is deemed to have crossed a significance threshold.
16\) The overall logic that explains the link between the manipulations, endocytosis and sleep is confusing. Glial expression of Rab11CA increases sleep, similarly to Shi-ts. Do the authors propose that Rab11CA inhibits endocytosis, similarly to Shi-ts?
17\) On similar lines, the data shown in Figure 4C seem to contradict the data in Figure 4D. In Figure 4D, Repo\>Rab11CA causes increased sleep, compared to parental controls. Figure 4C, shows that using the RepoGS driver, Rab11 DN induces even more sleep than Rab11CA. Thus, both of these opposing manipulations cause increased sleep. Could it be that both manipulations simply make glial cells sick, and therefore, in both cases, sleep is increased due to malfunction of glia, and not due to specific changes in endocytosis? The possibility for a non-specific effect is supported by similar data in Figure 4---figure supplement 1C, where expression of either DN or CA versions of Rab27 and Rab30 produces exactly the same phenotype of increased sleep, unless the authors believe that these also work by affecting endocytosis. These issues should be explained and addressed in a revised manuscript.
18\) In Figure 4---figure supplement 1B -- are the effects of Rab3, Rab9 and Rab11 that were significant in Figure 4A (without RU486) still significant in the Figure 4---figure supplement 1B (with RU486)? The significance stars in Figure 4---figure supplement 1B are shown only for Rab1, Rab5, Rab27 and Rab30.
19\) The apparent contradiction between Figure 1, Figure 2, Figure 3, Figure 4 and Figure 5 should be more clearly explained. Figure 5 shows that SD (which increases sleep pressure) causes increased endocytosis, but, Figure 1, Figure 2, Figure 3 and Figure 4, show that inhibiting endocytosis actually increases sleep, suggesting that endocytosis in BBB promotes wakefulness. An explanation that connects the two observations should be included.
20\) Are the changes in endocytosis that correlate with sleep state specific only to surface glia? Are there changes in endocytosis in other populations of glial cells, as function of sleep?
*Reviewer \#1*:
In this manuscript, Artiushin et al., aim to explore the role of glia endocytosis in sleep regulation focussing on a *Drosophila* model of the blood-brain barrier. The work is very interesting in principle as it touches an aspect of brain physiology that has been hardly explored so far but that has been proposed as one of the crucial functions of sleep.
The manuscript is well written in general and the experiments are well reported. The main weakness of the work is that in almost all experiments the genetic tools adopted did not behave as expected. The temperature sensitive form of shibire, (which is instrumental for experiments in Figure 1, Figure 2 and Figure 3) does not appear to provide any specific insight, possibly due to a temperature insensitive activation. The repoGENESwitch tool (instrumental for experiments in Figure 4) does not seem to be properly responsive when it comes to controlling activation.
All in all, the fact that the genetic tools employs are not behaving appropriately is a major weakness for the study as it is basically impossible to understand the exact specificity of the effect in terms of timing. For instance, it is impossible to exclude that this a developmental effect.
One possibility to reinforce the findings could be to adopt different genetic tools with greater reported specificity, such as the ones described in https://pubs.acs.org/doi/10.1021/acssynbio.7b00302
Presentation of data could be improved.
For instance:
\# There is no reason to limit labelling of panels within figures. Please use more letters, ideally one per panel. It facilitates discussion.
\# Avoid using barplots. Barplots are uninformative and should almost always be discouraged. Use plots that are more informative, giving more insights on the distribution (such as boxplot or violin plots)
\# The experiment in Figure 3---figure supplement 2 needs some kind of co-staining confirmation
\# Please quantify the observations collected using electron microscopy?
*Reviewer \#2*:
Most of the manuscript (Figure 1, Figure 2, Figure 3 and Figure 4) describes how manipulating glia affects sleep. Overall, the behavioral phenotypes are strong. However, there are multiple issues with specificity of the methods, with data representation and with the interpretation of some of the results. Another question is -- is it really so surprising and interesting that manipulating large numbers of glial cells has an effect on brain function, and sleep in particular?
The second part (Figure 5) is more interesting and promising, as it provides evidence for correlation between sleep/wake states and the rate of endocytosis in BBB glia. However, this part needs further development. Also, the link between this part and the rest of the manuscript seems a bit artificial, as they do not really support or complement each other well.
Specific comments:
1\) The authors show in Figure 1 that expression of the temperature sensitive allele of dynamin, Shi-ts in glia induces resistance to mechanical sleep deprivation. The authors show that the basal wake activity of these flies is not affected. However, another interpretation of the data should be considered. These flies may be unresponsive to mechanical stimulation. The authors should test the responsiveness of awake Repo\>Shi flies to mechanical stimulation. The authors should also check if Repo\>Shi provides resistance to sleep deprivation induced by alternative methods (thermo-genetic). Finally, the authors test the effects on SD only with Shi, but do not do it with the rest of manipulations, presented later in the paper, such as expressing mutant Rab proteins. Are the effects on resistance to SD specific only to Shi, but not to other manipulations of endocytosis?
2\) The authors observe strong effects for the temperature sensitive Shi allele even at the permissive temperature of 18C. This raises the question whether Shi is a good tool in this specific system. The main concern is that the observed phenotypes are mostly due to non-specific effects that make the glial cells sick. The authors should, at least, test if knocking down the endogenous Shi using RNAi produces a phenotype similar to expressing dominant negative Shi.
3\) The authors claim in Figure 2C, that the effects of Shi-ts on sleep are not due to merely overexpression of Dynamin since the expression of Shi-wt does not have a significant effect. However, for Shi-wt, only total sleep is shown, whereas the main effect for Shi-ts at 18C is on day sleep. Could it be that the effect of Shi-wt on sleep is masked when only total sleep is shown? The authors should demonstrate the effect of Shi-wt on day sleep.
4\) In Figure 3A, to exclude possible effects due to expression of Shi in neurons (in addition to expression in the BBB glia), the authors should show that these phenotypes remain when the expression in all glia is blocked, using Repo\>Gal80.
5\) To what extent are surface glia responsible for the phenotypes observed with the pan-glial driver, Repo? For instance, does Shi expression in surface glia also cause resistance to mechanical sleep deprivation? Is the phenotype of either NP6293 or moody \>Shi weaker than that of Repo\>Shi? Will combining both NP6293 and moody Gal4s (SPG & PG) generate a phenotype comparable to that of Repo-Gal4? Why don\'t the authors use here the 9-137-Gal4 driver (SPG & PG) that is later used in Figure 5 (subsection "Endocytosis occurs during sleep and is influenced by prior wakefulness")?
6\) The images in Figure 3---figure supplement 2 should be of better quality. The outline of the brain should be drawn. The authors also should demonstrate that each one the Gal4s used in this Figure is indeed expressed preferentially in glia by co-staining with glia or neuron-specific antibodies (Repo and Elav, respectively). The glia-specific expression would be also more convincing if the authors could show the expression pattern of these Gal4s (Rab9-Gal4 in particular) when the expression of the UAS-nGFP reporter is blocked in glia, using Repo\>Gal80.
7\) The EM images in Figure 4A -- how abundant and frequent are these ultra-structural changes? Are these changes also observed upon the expression of Rab11CA? Also, could the authors detect any accumulation of vesicles that cannot be secreted due to expression of mutant Shi?
8\) Is the overall structural integrity of BBB, as shown in Figure 4B, also preserved when Rab11CA is expressed in glia?
9\) In Figure 4C, the significance is determined based on a difference between DN and CA allele of each Rab protein. Is this the best criterion? Wouldn\'t it be better to compare each manipulation to the parental controls? Also, what would be the effect of overexpressing WT versions of these Rab proteins?
10\) The overall logic that explains the link between the manipulations, endocytosis and sleep is confusing. Glial expression of Rab11CA increases sleep, similarly to Shi-ts. Do the authors propose that Rab11CA inhibits endocytosis, similarly to Shi-ts?
Do they suggest that expression of constitutively active Rab11 is equivalent to the inhibition of vesicular trafficking? If so, what would be the effect of Rab11 RNAi? Would it produce an opposite phenotype (less sleep)? Repo\>Rab11 DN could be useful, but it was lethal. The authors should try using tub-gal80ts, to achieve inducible expression of Rab11 DN. Also, does Repo\>Rab11CA cause resistance to mechanical sleep deprivation, just like Shi-ts?
11\) One of the major claims of this paper is that inhibition of endocytosis in glia (Shi-ts, Rab11CA) increases sleep. It is important to show that an opposite manipulation of increasing endocytosis actually reduces sleep. The data shown in Figure 4C is confusing and seems to contradict the data in Figure 4D. In Figure 4D, Repo\>Rab11CA causes increased sleep, compared to parental controls. The interpretation is that this happens due to inhibition of endocytosis. However, in Figure 4C, using RepoGS driver, Rab11 DN induces even more sleep than Rab11CA. It seems that both of these opposing manipulations cause increased sleep, which is counter-intuitive. Could it be that both manipulations simply make glial cells sick, and therefore, in both cases, sleep is increased due to malfunction of glia, and not due to specific changes in endocytosis? The possibility for a non-specific effect is supported by similar data in Figure 4---figure supplement 1C, where expression of either DN or CA versions of Rab27 and Rab30 produces exactly the same phenotype of increased sleep.
12\) In Figure 4---figure supplement 1B -- are the effects of Rab3, Rab9 and Rab11 that were significant in Figure 4A (without RU486) still significant in the Figure 4---figure supplement 1B (with RU486)? The significance stars in Figure 4---figure supplement 1B are shown only for Rab1, Rab5, Rab27 and Rab30.
13\) How do the authors explain the phenotypes caused by the expression of other Rabs, besides Rab11? Do they think that they all work by affecting endocytosis?
14\) In Figure 5, the authors should demonstrate that their genetic manipulations (Shi-ts and Rab11CA) actually can inhibit endocytosis in the surface glia using the 10kd dextran absorption assay. Also, could it be that the changes they see after SD are in fact caused by physical damage to the BBB? They may test if the effects of SD on endocytosis are resolved once the flies are allowed few hours of recovery after SD. They can also test how thermo-genetic SD affects their assay. They should also do EM on BBB after SD.
15\) There is an apparent contradiction between Figure 1, Figure 2, Figure 3Figure 4 and Figure 5. According to Figure 5, SD causes increased endocytosis. SD of course increases sleep pressure. But, in the Figure 1, Figure 2, Figure 3 and Figure 4Figures, the authors claim that inhibiting endocytosis actually increases sleep, suggesting that endocytosis in BBB promotes wakefulness. A possible solution to this paradox is that during normal sleep, there is an increase in endocytosis. This is important to support the function of sleep because increased endocytosis eventually helps to reduce sleep pressure. This is why inhibition of endocytosis promotes sleep -- because in the absence of proper endocytosis, sleep quality is compromised, and sleep is then less effective in reducing the sleep pressure.
16\) Are the changes in endocytosis that correlate with sleep state specific only to surface glia? The authors should have additional control in Figure 5 -- test if there are any changes in endocytosis in other populations of glial cells, as function of sleep.
*Reviewer \#3*:
This paper explores the functional contributions of the blood brain barrier (BBB) to sleep regulation in the model system *Drosophila*. It is a careful study that uses a full range of genetic cellular and imaging methods to consider the hypothesis that endocytosis/exocytosis in BBB glia changes in ways that supports the role of these cells in helping resolve levels of metabolites that increase in relation to sleep-need. Further it makes a strong case for the involvement of Rab11 in the cellular mechanism. The emerging involvement of glial compartments in the fundamentals of brain physiology (here sleep regulation) makes this work a significant contribution of interest to a general audience. The work is clearly described, thorough in most aspects of the analysis and discussed in a scholarly fashion. I have a few questions and concerns that may help improve the paper.
Shibere mis-expression and effects on sleep.
The paper wisely pays careful attention to the effects (and lack of effects) of temperature with a classic ts allele of dynamin. In addition, I also commend the use of different shi isoforms to help focus on the biologically (not technically) important results. I had one question about this dataset that involved, not amount of sleep, but its temporal patterning.
The results suggest that sleep during SD happens at both temperatures but I notice that nighttime sleep is elevated sooner in both males and females at 18 degrees, than in controls. Is this impression correct? and if so, is there an explanation? This difference (if reproducible) involves latencies and time of day differences. In my reading of the fly sleep literature, there is an increasing fragmentation of cellular mechanisms between those that affect daytime versus nighttime sleep. Is there any basis to think or expect that the cell biological mechanisms (exo- and endocytosis) should be geared to daytime versus nighttime?
Dynamin and MTs
The ultrastructural work is an effective supporting body of evidence to evaluate the effects of UAS-shi at permissive temperatures. However, the results -- amassed ring-like structures resembling microtubules, and a thinner PG layer -- were not well-described, beyond the positioning of two arrows in one of the micrographs. There was no clear definition of the phenotypes nor any indication of prevalence, severity or quantification (either within or between animals). Were the suspected MTs coated or bridged as originally described in the paper cited? There no details provided in the methods regarding gender, time of day, age, or \"n\" value. On a tangential (but relevant) note, was ultrastructure observed at only a single phase point? This issue is clearly beyond the scope of the current study.
Cell Specificity
Figure 3 localizing effect to surface glia;
3A -- which UAS-shi was used?
\- Male or female flies?
\- The effect does not appear to match that of repo-Gal4. Difference is no more than 100 m; whereas. In Figure 2A, the difference is \>200 min. Is this lack of quantitative matching significant? Maybe it reflects the strength of the Gal4s but alternatively it could mean that other cells contribute. I did not find any discussion of this point.
Rab involvement
The screens were careful, unbiased, quantitative and very large in scope. I commend the authors for determining that the Gs-Gal4 line was leaky but was somewhat confused by the overall definitions of hits. There was a set of hits with no RU486 (Rab 3, 5 and 9) and a different one with RU486 (Rab1, 5, 27 and 30). Yet at the end, only Rab11 is judged to have experimental support -- I was not clear why (1) only Rab11 and not others crossed threshold. Also (2) whether Rab11 is a positive or negative regulator of sleep.
"As preliminary screening compared only experimental flies (RepoGS\>UAS-Rab) with or without RU, the Rabs of interest were confirmed with Repo-GAL4, including the full complement of UAS and GAL4 controls."
1\) But only Rab 11 is shown, not Rab 3 or Rab9 -- follow-up on Rabs 3 and 9 were neither shown nor mentioned,
"Expression of recycling-endosome associated Rab11 CA resulted in a robust sleep increase when driven in all glia (Figure 4D) and was significant for both CA lines."
2\) Paradoxically, Rab11 activity appears to increase sleep in the follow-up but in the preliminary large scale screen the DN isoforms of Rab11 produced significantly more sleep than did the CA isoforms -- by my reading that means Rab11 in glia is a negative regulator. So, I\'m not sure how to interpret the combined dataset.
Endocytosis
1\) Why dissociate cells before adding Alexa647-dextran? Why not measure before dissociation? The results are fortunately very clear, but I would think cellular processes like endocytosis would be more robust in an intact brain.
2\) Also it would be a stronger case if a different amount of SD produces a proportionate change in endocytosis (i.e., two points on the concentration-effect curve).
Also, would it would strengthen the case to measure endocytosis following more sleep (to control for potential contribution of stress to change); This would require orthogonal genetics to drive sleep-inducing FB neurons, so I suspect the genetics would be too complicated for a two-month period of additional study.
10.7554/eLife.43326.024
Author response
\[Editors' note: the author responses to the first round of peer review follow.\]
> This paper explores the functional contributions of the blood brain barrier (BBB) to sleep regulation in Drosophila. It uses a full range of genetic cellular and imaging methods to consider the hypothesis that endocytosis/exocytosis in BBB glia changes in ways that supports the role of these cells in helping resolve levels of metabolites that increase in relation to sleep-need. Further it provides evidence for the involvement of glial Rab11 in the cellular mechanism. Experimentally analyzing glial function in sleep, the work touches an aspect of brain physiology that has just begun to be explored but that has been proposed as one of the crucial functions of sleep. Thus, this work is a potentially significant contribution of interest to a general audience.
>
> Though work is clearly described, thorough in most aspects and also several caveats are clearly acknowledged, there are issues that need to be clarified and conclusions that need to be strengthened in order to better establish the key conclusion of the paper that inhibition of endocytosis in glia increases sleep.
>
> Essential revisions:
>
> 1\) The authors nicely describe various difficulties experienced with genetic tools to perturb endocytosis in targeted glia (e.g. temperature-independent and potentially endocytosis-independent effects of shi-ts expression, as well as leaky GsGal4 expression). In addition, they report similar effects on sleep following expression of constitutively active and dominant negative forms of Rab11 as well as perturbation of Rabs that may not participate in endocytosis (Figure 4 and Figure 4---figure supplement 1). Thus, it is important to better establish sleep phenotypes arise from changes in endocytosis rather than non-specific glial malfunction. Some suggestions of additional experiments to support the hypothesised role of endocytosis are proposed below.
>
> 1a) To better characterise sleep-associated endocytosis, it would be useful to measure rates of endocytosis at 4-6 time points to define a daily cycle, not just two time points.
We have expanded the nighttime time points and included these findings in (Figure 5B). We also show time points around the clock (Figure 5---figure supplement 2B).
> 1b) Given the possibility that even adult-specific expression of mutant dynamin or Rab RNAi can have long-lasting changes in glial physiology or alterations in BBB permeability, it would be useful to test if these flies revert to normal sleep behaviour if allowed to recover for an appropriate period of time.
To examine whether adult-induced expression of Shi produces irreversible alterations in sleep, which could signify permanent changes in function of the barrier, we expressed Shi in glia under the control of tubGal80.ts. In these experiments, temperature-dependent expression of tubGal80.ts suppresses Shi expression during development but allows expression in adults. We find that sleep is increased upon adult expression of Shibire and returns to levels which are not significantly different from controls when expression is blocked (in each case with a temperature shift) (Figure 3---figure supplement 1B).
> 1c) To show that a different amount of sleep deprivation (more or less) produces a proportionate change in endocytosis (i.e., two or more points on the concentration-effect curve).
Although this is a good point and we would certainly like to resolve this question, there are a number of scientific and technical difficulties that prevent us from doing so. First, more or less deprivation does not necessarily correlate with a linearly proportionate response, whether in behavioral rebound or cellular measures (for instance, 12 hours of deprivation does not necessarily produce a larger rebound than 6 hours). Second, due to the degree of variability in the endocytosis assay, we do not have the resolution to detect such a difference. If we expand our time points after a period of deprivation, we still may not be positioned to detect a difference. We have examined later night time points (Figure 5B) and found that while endocytosis is high during early night sleep and low by the end of the night/early day, it is difficult to determine a difference in the time points in between, meaning that endocytosis may be largely complete within the early hours of sleep or we simply do not have the resolution with this technique.
> 1d) To show bidirectionality of regulation and to control for potential contribution of stress rather than sleep drive, the authors should test whether endocytosis following more sleep is reduced (this may require orthogonal genetics: e.g. to drive sleep-inducing FB neurons).
To examine potential bidirectionality and assess the contribution of stress, we have elected to use Gaboxadol to induce sleep rather than introducing the added complications of orthogonal genetics and the requisite temperature-induction. We found that enhancing sleep throughout the day did not decrease endocytosis at ZT14, but endocytosis was increased at ZT2 if flies were treated with Gaboxadol prior to this point (Figure 5C). We suggest that Gaboxadol increases sleep pressure and so promotes endocytosis at all times, thereby accounting for lack of a decrease at ZT14. Importantly, these data indicate that it is not the stress of sleep deprivation which is responsible for elevating endocytosis, as two methods of inducing sleep at a time when wake predominates both increase endocytosis.
> 2\) Different Gal4 lines are used to target subsets of glia. The specificity of these lines needs to be clearly documented. The logic for using one or other for different experiments needs to be clarified. And at least one case, an additional Gal4 may need to be used.
In addition to the discussion of sub-points below, we have added a few remarks throughout the text clarifying why the given Gal4 lines were used for particular experiments.
> 2a) The description of Gal4 expression lines (Figure 3---figure supplement 2) should be expanded Critically, to demonstrate that each one the Gal4s used is indeed expressed preferentially in glia, the figure should include counter stains with glia or neuron-specific antibodies (Repo and Elav, respectively). Glial-specific expression would be also more convincing if the authors could test how well the expression pattern of these Gal4s (Rab9-Gal4 in particular) is blocked by Repo\>Gal80. (More minor, it might help if an outline of the brain were drawn).
The Gal4 lines used in this study, other than Rab9-G4, have all been previously described and used for glial expression. We have emphasized this point and ensured that appropriate references for all drivers are included in the text.
The Gal4 lines we used (Figure 3---figure supplement 2) have limited expression, if any, outside the BBB; given that, it would be difficult to co-localize expression with a pan-neuronal or pan-glial stain. In lieu of a counter-stain, we have provided Gal4\>GFP expression in the presence and absence of *repo*-Gal80, which by comparison makes clear what expression is neuronal and what glial (Figure 3---figure supplement 2B). This is particularly evident for the drivers relevant for behavioral differences, such as Rab9-Gal4, as the surface glia are easily distinguishable from all other cell types. As requested by the reviewer, we provide an outline of the brain in Figure 3---figure supplement 2A.
> 2b) The tubGal80.ts experiments utilize Rab9-Gal4. To more convincingly implicate the glial cells presumed to be targeted, these experiments should also be repeated with Moody-Gal4 (and possibly Repo-Gal4 as well).
The SPG glial cells are implicated by two drivers, Rab9-Gal4 and Moody-Gal4. To confirm the adult-specific effect of Shi, we now provide the tubGal80.ts experiment with a second driver, Repo-Gal4 (Figure 3---figure supplement 1). The data confirm that conditional adult expression is sufficient for the glial sleep phenotype.
> 3\) Figure 1 shows that of Shi-ts expression in glia induces resistance to mechanical stimulation during sleep. Can a control experiment be done to rule out the possibility of a sensory defect that makes these flies unresponsive to mechanical stimulation? E.g. To test the responsiveness of awake Repo\>Shi flies to mechanical stimulation? On this note, are the PG and SPG drivers expressed outside the brain in sensory structures?
To rule out the possibility that a sensory defect in Repo\>Shi flies makes them unresponsive to the mechanical stimulation of sleep deprivation, we stimulated the experimental and control flies at ZT11 -- 12, a time when flies are predominantly awake, as suggested. We find no difference in the resultant beam crossings induced by stimulation between Repo\>Shi flies and controls (Figure 1---figure supplement 1), suggesting that resistance to sleep deprivation cannot be accounted for by impaired sensitivity to the stimulus. Also, we are not aware of sensory structure expression of PG and SPG.
> Other concerns and suggestions:
>
> 4\) Is it necessary to dissociate cells before adding Alexa647-dextran? Why not measure before dissociation as most cellular processes including endocytosis could be more robust in an intact brain. If it is simply to allow access to Alexa647-dextran, then could an alternative smaller endocytic tracer be tried?
While we agree that a minimally perturbed sample might better reflect cellular processes occurring in vivo, in our hands we have found that dissociation is necessary to allow access of AF647-Dextran to both sides of the barrier. Even with a smaller (3KD) dextran we did not observe any appreciable penetration into an intact brain (Figure 5---figure supplement 3).
> 5\) Is resistance to mechanical stimulation following SD specific only to Shi, or also seen following endocytic Rab manipulation?
We have added this experiment (Figure 4---figure supplement 2). Resistance to mechanical stimulation appears to be specific to Shi, with surface glial being sufficient. It is plausible that Shi provides a more general perturbation of trafficking than Rab11, hence capturing both baseline and resistance phenotypes. These data also demonstrate that these effects can be separated as Rab11 only affects baseline sleep.
> 6\) The shi-ts expression results suggest that sleep during SD happens at both temperatures, but nighttime sleep seems to elevated sooner in both males and females at 18 degrees, than in controls. Is this impression correct? and if so, is there an explanation? This difference (if reproducible) involves latencies and time of day differences. The fly sleep literature appears to point to an increasing fragmentation of cellular mechanisms between those that affect daytime versus nighttime sleep. Is there any basis to think or expect that the cell biological mechanisms (exo- and endocytosis) should be geared to daytime versus nighttime?
We are not sure that this difference in latencies that the reviewer mentions is a consistent finding in our data. The difference in latency between 18 and 30 degrees could also be a consequence of the shift in sleep patterns related to temperature, as touched on elsewhere in the text.
With respect to time-of-day differences, it is true that some publications demonstrate effects predominantly on daytime or nighttime sleep when given neuronal populations are manipulated, but in our view, there is not yet a clear delineation between circuits and mechanisms which govern daytime vs. nighttime sleep. Likewise, there is little evidence to suggest that daytime sleep and nighttime sleep serve different functions in the fly.
> 7\) Figure 2C suggests that the effects of Shi-ts on sleep are not due to merely overexpression of Dynamin since the expression of Shi-wt does not have a significant effect. However, for Shi-wt, only total sleep is shown, whereas the main effect for Shi-ts at 18C is on day sleep. To exclude the possibility that a Shi-wt effect on sleep is masked when only total sleep is shown the figure should be revised to include data showing the effect of Shi-wt on daytime sleep.
The figure has been updated to include daytime sleep. The result is still the same -- Shi-wt is not significantly different from both controls, in terms of total or day sleep.
> 8\) Indeed, it would useful to consistently show data for total sleep and daytime sleep for all genotypes in the paper (these data must be available).
Daytime and total sleep figures have now been included, either in the main text or supplements in order to not crowd the figures.
> 9\) In Figure 3A, to exclude possible effects due to expression of Shi in neurons (in addition to expression in the BBB glia), the authors could show that these phenotypes remain when the expression in all glia is blocked using Repo\>Gal80.
We showed that the increased sleep phenotype is present with Repo-G4 (only glial expression) as well as Rab9-G4 (BBB expression), but not when glial expression of Rab9-Gal4 is blocked. Comparing expression of surface glial drivers (moody, Rab9, NP6293) in the presence and absence of *repo*-Gal80 (Figure 3---figure supplement 2B) shows little or, in the case of moody-G4, no expression in neurons, therefore making it quite unlikely that the phenotype is due to non-glial expression.
> 10\) It would be valuable to test, with existing tools, to what extent surface glia are responsible for the phenotypes observed with the pan-glial driver, Repo. Does Shi expression in surface glia also cause resistance to mechanical sleep deprivation? Is the phenotype of either NP6293 or moody \>Shi weaker than that of Repo\>Shi and does combining NP6293 and moody Gal4s generate a phenotype comparable to that of Repo-Gal4? Why is the 9-137-Gal4 driver (SPG & PG) that is later used in Figure 5 (subsection "Endocytosis occurs during sleep and is influenced by prior wakefulness") not used here?
We conducted additional experiments to address this question and find that the resistance to sleep deprivation phenotype indeed tracks to surface glia, with NP6293 G4 being sufficient (Figure 3---figure supplement 3).
In the screen of glial sub-type drivers, we chose to use the individual surface glial drivers instead of 9-137 G4 in order to establish the effects of each population in isolation, just as the other glial drivers were chosen for specificity to individual glial sub-types. Nevertheless, Shi expression with 9-137 G4 also produces an increase in sleep, albeit smaller than would be expected if combining the effects of the surface glial lines individually (and smaller than that produced by repo-Gal4). This may be a consequence of differences in driver strength, which are not readily assessable or comparable. Given that NP6293 G4 and moody G4 are on the same chromosome, the effort required to perform these experiments may not be worth the potential result because there still may be a discrepancy in driver strength between the surface glial drivers and repo.
> 11\) Figure 3 localizing effect to surface glia: In Figure 3A -- which UAS-shi was used? The effect does not appear to match that of repo-Gal4. The difference is no more than 100 min; whereas. in Figure 2A, the difference is \>200 min. Is this lack of quantitative matching significant? Maybe it reflects the strength of the Gal4s but alternatively it could mean that other cells contribute. This should be discussed.
A line has been added regarding this point. As the reviewers point out, it may very well be a difference in driver strength, and/or that repo-G4 encompasses both surface glial populations while the lines in Figure 3A do not.
> 12\) In the same figure -- the lack of effect of astrocyte expression seems to be correlated with an unusually high value for the UAS control. Is there a reason to be concerned here?
We do not believe so as the UAS control does not achieve ceiling levels of sleep, so there is still room for an increase. Also, as sleep varies some from experiment to experiment, we are careful to always compare to controls within the same experiment. Importantly, a different astrocyte driver also does not increase sleep significantly above the controls. As these data used the other Shibire line, rather than the 20xShibire used in much of the manuscript and in the rest of Figure 3A, we did not include them in the manuscript, but provide them for the reviewer ([Author response image 1](#respfig1){ref-type="fig"}).
![Shibire expression in astrocyte-like glia does not increase sleep.\
Total and daytime sleep of *Eaat1*-GAL4\>UAS*-Shi.ts1*;UAS-*Shi.ts1* female flies at 18°C (n=16, each genotype). One-way ANOVA with Holm-Sidak post-hoc test, \* P \< 0.05, \*\* P \< 0.01, \*\*\* P \< 0.001. Error bars represent standard error of the mean (SEM).](elife-43326-resp-fig1){#respfig1}
> 13\) Regarding EM images in Figure 4A -- how abundant and frequent are these ultra-structural changes and how do they correlate with sleep phenotypes?
>
> The observations themselves (amassed ring-like structures resembling microtubules, and a thinner PG layer) are only described to the level of positioning of two arrows in one of the micrographs. There should be some definition of the phenotypes and indication of prevalence, severity or quantification (either within or between animals). Were the suspected MTs coated or bridged as originally described in the paper cited? There no details provided in the methods regarding gender, time of day, age, or \"n\" value.
The details requested regarding the animals used have now been provided in the methods and/or figure caption. Briefly, our intention is to highlight the presence of unusual MT and intracellular structure in glial cells expressing Shi at 18 degrees. This simply demonstrates that by EM, expression of Shi at permissive temperature is not without consequence in glia, as has also been shown for neurons in the paper cited. While perhaps we could quantify something like the number of MTs over a length of surface glial area, it is not clear that this or any other quantification will be a useful measurement, because the phenotype is binary -- the structures are present in Repo\>Shi tissue, and not found in controls.
> In addition, it would be useful to know if these are also seen following induction of wild-type dynamin, because WT-dynamin expression does not cause sleep phenotypes and there is the potential to examine how relevant these ultrastructural defects might be to the sleep effects observed. (Perhaps the cited EM paper has addressed this issue in neurons?) Are there any changes in membranes or vesicular structures that could potentially be connected to a block in endocytosis? What is the predicted EM phenotype associated with Rab11CA expression?
Our hope was to identify membrane or vesicular structures in the control surface glial images to have a target for comparison with the experimental images. Unfortunately, perhaps due to resolution or preparation, we were unable to pinpoint obvious endocytic or vesicular trafficking events in the control images, thereby making it hard to compare to Shi flies and to say, beyond the gross changes described, where the alteration connected to blocking endocytosis is expressed.
Determining whether WT-dynamin causes ultrastructural defects could be interesting, but even if so, we could not exclude a contribution of such defects to the sleep phenotype produced by Shibire as these defects may be necessary but not sufficient.
> 14\) Is the overall structural integrity of BBB, as shown in Figure 4B, also preserved when Rab11CA is expressed in glia?
Yes, the barrier does not appear permissive to dextran when Rab11CA is expressed (Figure 4---figure supplement 2).
> 15\) In Figure 4C, the significance is determined based on a difference between DN and CA allele of each Rab protein. Is this the best criterion? Wouldn\'t it be better to compare each manipulation to the parental controls? In any event, it should be made clear why only Rab11 and not others is deemed to have crossed a significance threshold.
We agree that the ideal comparison would be between each manipulation and its respective parental controls. But since our initial purpose was to screen as many Rabs as possible (which included multiple CA and DN lines per Rab in most cases), we chose to compare CA and DN effects of the experimental animals only. As noted below, we expected that CA and DN would have opposing effects, although this is not always the case. We followed up Rabs that were promising in the initial screen by using Repo-G4 and including all of the parental controls. Rab11 was a positive in the DN/CA screen and, in subsequent assays, Rab11 CA consistently increased sleep relative to controls, regardless of whether it was expressed with Repo or BBB drivers. This is now clarified in the text.
> 16\) The overall logic that explains the link between the manipulations, endocytosis and sleep is confusing. Glial expression of Rab11CA increases sleep, similarly to Shi-ts. Do the authors propose that Rab11CA inhibits endocytosis, similarly to Shi-ts?
Rab11 can affect endocytosis, as knockdown of Rab11 has been shown to inhibit endocytosis and transcytosis, for example, of LDL (Woodruff et al., 2016). Assuming that CA and DN have opposing effects, Rab11CA would not be expected to block endocytosis; however, DN and CA versions can sometimes go in the same direction, with WT or CA mutants blocking the pathway at a specific point due to limiting amounts of binding partners. In addition, for the Rab collection we used, the Rab CA and DNs are called so based on the best prediction that the sites mutated will be GTPase-defective and GTP-binding defective, rather than functional confirmation of their CA and DN activity; in fact, Rab3 is mislocalized with CA and DN mutations (Zhang et al., 2007).In the case of Rab11, in particular, both the DN and CA mutations we used alter trafficking in one direction in certain contexts (Khvotchev et al., 2003).
Therefore, it is possible that Rab11 CA inhibits endocytosis. Alternatively, if the mechanism underlying the sleep phenotype involves, for example, a certain receptor, it is also possible that Rab11 CA and Shi lead to the same behavioral phenotype by keeping the receptor on the plasma membrane -- Rab11CA by promoting its recycling, and Shi by inhibiting its endocytosis.
> 17\) On similar lines, the data shown in Figure 4C seem to contradict the data in Figure 4D. In Figure 4D, Repo\>Rab11CA causes increased sleep, compared to parental controls. Figure 4C, shows that using the RepoGS driver, Rab11 DN induces even more sleep than Rab11CA. Thus, both of these opposing manipulations cause increased sleep. Could it be that both manipulations simply make glial cells sick, and therefore, in both cases, sleep is increased due to malfunction of glia, and not due to specific changes in endocytosis? The possibility for a non-specific effect is supported by similar data in Figure 4---figure supplement 1C, where expression of either DN or CA versions of Rab27 and Rab30 produces exactly the same phenotype of increased sleep, unless the authors believe that these also work by affecting endocytosis. These issues should be explained and addressed in a revised manuscript.
We have driven Rab27 and Rab30 with the surface glial drivers, but have not found consistent phenotypes when limiting expression to these glial populations. Thus, Rab11 is specific in terms of increasing sleep through this population, as sleep-promoting effects of other Rabs likely map to other glia. The similarity of increased sleep may therefore suggest sleep functions of Rabs in other glial populations.
Concerning the discrepancy between RepoG4 and RepoGS sleep effects of Rab11CA and DN, it is difficult to compare as Rab11 DN is lethal with constitutively expressed Gal4s, while CA is not. As we have stated above, it is possible that CA and DN mutations do not really have opposing effects at the cellular level. In this case one might argue that CA is simply a weaker blocking mutation than DN. Nevertheless, Repo\>Rab11CA flies do not appear to be sick and show intact general integrity of the BBB (Figure 4---figure supplement 2).
> 18\) In Figure 4---figure supplement 1B- are the effects of Rab3, Rab9 and Rab11 that were significant in Figure 4A (without RU486) still significant in the Figure 4---figure supplement 1B (with RU486)? The significance stars in Figure 4---figure supplement 1B are shown only for Rab1, Rab5, Rab27 and Rab30.
Our standard for selection, as further clarified in the manuscript, is that all available DNs be significantly different from all available CAs. By this measure Rab3, 9 and 11 are different in the no-RU condition, and 1, 5, 27 and 30 are such in the RU condition, hence the difference in stars. Nevertheless, if we look at individual comparisons for the aforementioned Rabs in the RU+ condition, we find that the lone DN line of Rab3 is significantly different from one (of two) CA lines, a single DN line for Rab9 is significantly different from both CAs, and a single DN line for Rab11 is significantly different from both CAs.
> 19\) The apparent contradiction between Figure 1, Figure 2, Figure 3, Figure 4 and Figure 5 should be more clearly explained. Figure 5 shows that SD (which increases sleep pressure) causes increased endocytosis, but, Figure 1, Figure 2, Figure 3 and Figure 4, show that inhibiting endocytosis actually increases sleep, suggesting that endocytosis in BBB promotes wakefulness. An explanation that connects the two observations should be included.
To address this point we have built upon a relevant line in the Discussion section. In short, we propose that endocytosis in the BBB is a function of sleep and serves a homeostatic need. As shown in Figure 5, endocytosis is enhanced during times of baseline sleep, or during rebound sleep induced by sleep deprivation. If endocytosis during sleep fulfills a homeostatic role, it would follow that endocytosis would decline as sleep continues (see Figure 5B), just as sleep pressure does. In the experiments where we inhibit endocytosis at the surface glia, we believe we have created a situation where the potential homeostatic function of endocytosis cannot be accomplished, hence these flies may not be able to dissipate sleep pressure, and therefore have perpetually increased sleep.
> 20\) Are the changes in endocytosis that correlate with sleep state specific only to surface glia? Are there changes in endocytosis in other populations of glial cells, as function of sleep?
Our interest in endocytosis in the surface glia stems from our findings that Shi expression in these populations produces changes in sleep behavior. This does not exclude the possibility of sleep-dependent changes in endocytosis in other glial populations (or even neuronal populations). For example, phagocytic engulfment may be altered in astrocytes by sleep deprivation (Bellisi et al., 2017).
|
Introduction {#Sec1}
============
The diagnostic approach is statistical\[[@CR1],[@CR2]\]. Age is important: before 5 years old, malignant tumour is almost always metastatic neuroblastoma; between 5 and 15 years old, it is often osteosarcoma or Ewing's sarcoma; after 40 years old, it tends to be metastasis or myeloma. Clinical symptoms vary little and are most often pain and swelling. Although fever suggests infection, it may also be found in Ewing's sarcoma.
The first step in the evaluation of a tumour is to determine its aggressiveness by conventional radiology. Important parameters include the tumour size, type of matrix, and periosteal reaction. Certain tumours are more common in particular bones. Adamantinoma, usually found in the adult, selectively involves the tibia and fibula. The most common epiphyseal tumour in childhood is the chondroblastoma. In addition, the aggressiveness of some tumours may relate to their location in the axial or appendicular skeleton: in the hand, cartilaginous tumours are almost always benign, whereas in the pelvis, they are often malignant. If necessary, multiple lesions may be estimated with bone scanning. Multiple lesions are seen in chondromas, osteochondromas, histiocytosis X and metastases.
The first necessary step is to definitively diagnose benign lesions based on clinical and radiologic signs, and for which biopsy is not necessary. These lesions are fibrous cortical defect, non-ossifying fibroma, periosteal desmoid, fibrous dysplasia, osteochondroma or exostoses, chondroma, simple bone cyst, vertebral angiomas and myositis ossificans.
Diagnosis may be difficult. In these cases, the next step is CT. Problems can result from bone locations which are difficult to evaluate on conventional X-ray (short, flat bones especially the pelvis, sacrum, sternum, and vertebrae). Sometimes, the study of the tumour matrix can provide features necessary for the diagnosis. It can be fluid density, small calcifications allowing diagnosis of cartilaginous tumour, osteoid matrix, or fat\[[@CR3]\]. CT is the examination of choice in the diagnosis of the nidus of osteoid osteoma in dense bone\[[@CR4]\]. Small lytic lesions of the cortex, localized involvement of the soft tissues and thin peripheral periosteal reaction can be seen; lesions with slow evolution which displace and expand the cortex peripherally can be distinguished from more aggressive lesions which cross the cortex. CT can show the tumour on both sides of the cortex before it is destroyed. This is the case for Ewing sarcomas and osteosarcomas\[[@CR5]\]. CT allows measurement of the thickness of a non-calcified cuff of a cartilaginous tumour: the cuff is thin in benign lesions and thick (more than 3 cm) in chondrosarcomas\[[@CR6],[@CR7]\].
In other cases, evidence favours a malignant lesion. Examination for metastases, and MRI examination before biopsy, must be performed.
Staging examination {#Sec2}
===================
Local {#Sec3}
-----
Focal extent and staging is based on magnetic resonance imaging (MRI)\[[@CR8]--[@CR10]\]. The main advantages are high contrast and the possibility of choosing the plane of examination without moving the patient. On the other hand, MRI is rarely useful for diagnosis. T1 and T2 measurements are not reliable and reproducible because most large tumours are heterogeneous with variable signal intensity. Therefore, it is impossible to characterize such tumours and to distinguish benign from malignant lesions\[[@CR11]\]. MRI is rarely useful in the diagnosis of fluid levels in blood-filled cavities, especially anevrismal bone cysts.
Intramedullary extension {#Sec4}
------------------------
In the medullary cavity, diaphyseal and metaphyseal extension in both adult and child, and extension across the growth plate in the child, are best demonstrated on MR images, due to their excellent contrast and ability to image in the longitudinal plane. Although CT can also evaluate extension, it is limited to the axial plane. Both CT and MRI have other limitations: the inability to detect very small lesions and the overestimation of the tumour volume on T2-weighted sequences because of peritumoral edema\[[@CR12]\]. With accurate evaluation of tumour extent, the surgeon can determine the level of bone resection and the size of the prosthesis. The growth plate in children and the joints in adults can sometimes be preserved when uninvolved.
In periosteal tumors, MRI demonstrates the periostal location, its extension into cortex, and the medullary cavity\[[@CR13]\]. CT can also define extent of diaphyseal periosteal lesions, but not of metaphyseal periosteal tumours.
Intraarticular extension is detected with better sensitivity than with any other imaging technique because of direct visualization of joint cartilage.
Skip lesions (small metastases separated from the main tumourby healthy tissue)are easily detected on MR scans parallel to the long axis of the bone.
MRI also shows excellent demonstration of vessels and their relationship to the tumour without injecting contrast media.
Both CT and MRI can show skin and subcutaneous extension.
In summary, MRI should be used as the principal test forevaluating extension of malignant tumours.
Examination of distant spread {#Sec5}
-----------------------------
Bone metastases are best detected on radionuclide bone scans. Pulmonary metastases are evaluated on conventional chest radiographs and chest CT\[[@CR14]\].
Conclusion {#Sec6}
==========
Imaging should begin with the plain radiograph, which defines a lesion as benign and requires no treatment. When the type of matrix needs to be clarified, CT should be performed. MRI however, should be the primary study for staging the tumour extent.
This paper is available online at <http://www.cancerimaging.org>. In the event of a change in the URL address, please use the DOI provided to locate the paper.
|
Greater than normal prevalence of seropositivity for Helicobacter pylori among patients who have suffered myocardial infarction.
There is evidence to suggest that inflammation plays a role in the development of atherosclerosis. Chronic infections may activate an inflammatory response in the walls of blood vessels. To investigate the possibility of there being an association between infection with Helicobacter pylori (H. pylori) and coronary heart disease. We examined 100 consecutive patients documented to have recently suffered acute myocardial infarction and 100 control subjects from the same geographical area for whom there was no evidence of coronary heart disease, carefully matched both for age and sex. Blood samples were tested for the presence of immunoglobulin G antibodies against H. pylori with a serological test. In comparison with controls, patients were more commonly smokers (26 versus 12%/0, P < 0.05) and had more commonly been treated for hypertension (37 versus 20%, P< 0.01). There was a significant association between seropositivity for H. pylori and having previously suffered acute myocardial infarction (68 versus 53%, odds ratio 1.36 with 95% confidence interval 1.02-1.82, P=0.034). These findings remained valid in a multivariate analysis including possible confounding factors (age, sex, smoking and hypertension; odds ratio 1.35 with 95% confidence interval 1.01-1.83, P=0.046). The positive association between seropositivity for H. pylori and having previously suffered acute myocardial infarction found in this study provides further support for the hypothesis that there is a causal association between chronic infection with H. pylori and the development of coronary heart disease. |
# Amahi Home Server
# Copyright (C) 2007-2013 Amahi
#
# This program is free software; you can redistribute it and/or
# modify it under the terms of the GNU General Public License v3
# (29 June 2007), as published in the COPYING file.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# file COPYING for more details.
#
# You should have received a copy of the GNU General Public
# License along with this program; if not, write to the Amahi
# team at http://www.amahi.org/ under "Contact Us."
require 'socket' # Sockets are in standard library
class DiskUtils
# return information on hdd temperature - requires hddtemp service running!
class << self
def stats
host = 'localhost'
port = 7634
begin
s = TCPSocket.open(host, port)
rescue
return []
end
res = ''
while line = s.gets # Read lines from the socket
res += line.chop # And print with platform line terminator
end
s.close # Close the socket when done
disks = res.split '||'
res = []
disks.each do |disk|
# split the info and do cleanup
i = disk.gsub(/^\||\|$/, '').split('|')
model = i[1].gsub(/[^A-Za-z0-9\-_\s\.]/, '') rescue "Unkown"
next if model == '???'
t = i[2].to_i rescue 0
tempcolor = "cool"
celsius = "-"
farenheight = "-"
if t > 0
celsius = t.to_s
tempcolor = "warm" if t > 39
tempcolor = "hot" if t > 49
farenheight = (t * 1.8 + 32).to_i.to_s
end
d = Hash.new
d[:device] = i[0]
d[:model] = model
d[:temp_c] = celsius
d[:temp_f] = farenheight
d[:tempcolor] = tempcolor
res.push(d)
end
res
end
def mounts
s = `df -BK`.split( /\r?\n/ )[1..-1] || ["","Incorrect data returned"]
mount = []
res = []
s.each do |line|
word = line.split(/\s+/)
mount.push(word)
end
mount.each do |key|
d = Hash.new
d[:filesystem] = key[0]
d[:bytes] = key[1].to_i * 1024
d[:used] = key[2].to_i * 1024
d[:available] = key[3].to_i * 1024
d[:use_percent] = key[4]
d[:mount] = key[5]
res.push(d) unless ['tmpfs', 'devtmpfs', 'none'].include? d[:filesystem]
end
res.sort { |x,y| x[:filesystem] <=> y[:filesystem] }
end
end
end
|
This invention relates to the field of large video display systems of the type appropriate for installation at a stadium. Such displays are usually formed by a large matrix of variable intensity display devices as, for example, incandescent bulbs, which are driven by a display system usually computer controlled. The display system receives a video input, such as the line feed from a network broadcast or a video tape recording and digitizes the video information into a complete frame of digital data. In prior systems the digitized data was stored in a computer memory and then at an appropriate point transferred from memory to the display device. Computers utilized for such a system include the Digital Equipment Corporation PDP Series 8. Although such mini computers are relatively powerful devices, their data transfer rate, as compared in random access memories, is low. As a result the computer represents a limiting element in the system with respect to the rate at which data can be digitized and transferred to the display device thereby limiting the versatility of the system with respect to other desirable features, such as maintaining statistics on participants, displaying caricatures, cartoons, or still photographs of the players.
It is therefore a desirable objective to retain computer control of the display system but to remove the computer from the data path to the display board. The PDP computer referred to employs data break cycles to transmit information to the display board. It does not have time to do the other tasks as mentioned, such as disk storage input and output, statistical updating and message inputting in addition to refreshing the display. Furthermore, when the computer is included in the data path it is necessary to synchronize the computer to the master clock. This slows down processor time still further.
It is accordingly an object of the present invention to provide a display system which is capable of higher speed than prior devices by virtue of removing the computer from the data path. By so doing the computer is able to perform a variety of other tasks as indicated. More importantly, it is possible to obtain a heretofore unavailable display in which a portion of the video picture being displayed can be enlarged to permit better viewing thereof. Often this is analogized to "zooming" in the manner permitted by an adjustable lens in photography. To obtain an enlarged or zoom picture it is necessary to utilize greater data rates than present systems can handle. The present invention, by removing the computer from the data path, is capable of operating at these higher data rates.
Exemplary of prior systems for displaying data on large display devices are U.S. Pat. Nos. 4,009,335, 3,941,926, and 3,961,365 assigned to the assignee of the present invention. |
Thursday, February 14, 2019
EPISODE 291
This week we find 2 truly awesome hidden gems, and one bona fide classic. First we talk about a straight to video action flick that Kyle and John neglected to watch in Lady Avenger. Then we talk about a bonkers 80's ghost/supernatural/haunted house/ ghost flick in SUPERSTITION. And then John shows Kyle BAY OF BLOOD for the first time. Also, we talk about beautiful Italian girls, Bernie Mac, Pittsburgh Geography, The geneva convention and it's connection to war crimes, and lousy Queen movies. So Download this episode or Bohemian Rhapsody will not win the Oscar.RIGHT CLICK TO DOWNLOAD |
Fed Credit Score Study Bogs Down
A Federal Trade Commission report on the insurance industry's controversial use of consumer credit records to rate them as risks will not be ready ...
By Matt Brady|March 11, 2005 at 07:00 PM
X
Share with Email
sending now...
Thank you for sharing!
Your article was successfully shared with the contacts you provided.
A Federal Trade Commission report on the insurance industry’s controversial use of consumer credit records to rate them as risks will not be ready by its federally mandated December deadline
The report was called for in the Fair and Accurate Credit Transactions, or FACT Act of 2003, which extended provisions of the Fair Credit Reporting Act and implemented a number of reforms designed to help consumers track and protect their credit information.
Added to the legislation through an amendment by Rep. Luis Gutierrez, D-Ill., the report is officially due on Dec. 4.
The insurance industry describes credit scoring as a useful tool, predictive of risk that helps keep rates down. Opponents say it impacts hardest on low income and minority consumers and fails to account for onetime events that can impact credit.
A spokesman for Rep. Barney Frank, D-Mass., said the report was delayed because the FTC “needs more time to pull together information” from insurance companies. Rep. Frank is the ranking member of the House Financial Services Committee, where the FACT Act, and the amendment mandating the study, originated.
However, David Snyder, vice president and assistant general counsel for the American Insurance Association, said the insurance industry is not the cause of the delay. The AIA had heard “some speculation” the report might not be ready on time, he said, but did not know of any specific reason for the delay.
“One reason it cannot be is for any lack of cooperation on our part,” he said, adding that the AIA’s policy has been to cooperate fully with the FTC and provide whatever information it is asked for.
The credit scoring issue has generally been handled at the state level with many states adopting a model regulation crafted by the National Conference of Insurance Legislators, or something similar to it.
Efforts to ban the use of credit scoring in Arkansas, Colorado, Montana, Texas and Washington were defeated in 2005. Montana instead adopted a measure based on the NCOIL model, and New Mexico passed its own legislation that was supported by the insurance industry.
In Michigan, Gov. Jennifer Granholm and Democratic members of the state House and Senate said this month they will include a provision prohibiting insurers from using a consumer’s credit history or credit score for determining their insurance rates in a legislative insurance reform package.
A prior attempt to bar the use of credit scores through a state Office of Financial and Insurance Services regulation was overturned by a state circuit court judge earlier this year. |
2014 American documentary, filmed and narrated by wartime journalist's father and son, Mike Boettcher and Carlos Boettcher.
Summary: In real life there are no re-spawns, this is no call of duty. A fantastic real life account of the ever present war on terror being fought in Afghanistan. A film that takes you deep into 'The hornets nest', deep into situations you wouldn't even dream about, situations where all hope for humanity is lost, where words cannot describe the horrors that are present, where all faith is questioned. We follow father and son journalist's Mike and Carlos Boettcher as they spend a year with the real heroes the 101st airborne in Afghanistan. This is not based on a true story, this is a true story.
A sight we always see, a report we always hear in our every day lives, but do we ignore it? or is it seemingly not real that there is a war going on? That is just one of many questioned posed in this real life insight to the ever present war on terrorism.
Although stated as 'directed by' David Salzberg and Christian Tureaud "The Hornets nest" is filmed entirely by father and son Mike and Carlos Boettcher, and is an eye witnessed account of their experience living, breathing and doing everything these soldiers of the 101st airborne do day in and day out in Afghanistan. Mike Boettcher is a journalist who has spend the best part of 37 years reporting from some of the worst war zones in history, he has spend the majority of his reporting life in the deep end bringing people at home the truth of war. As well as being an account of the war in Afghan, we follow Mike's quest to build a lost relationship between him and his son Carlos, who in attempt to rebuild this relationship embarks on this journey with his father.
The journey is narrated by Mike throughout, as he gives a step by step as to what he and his son were witnessing and feeling. This however, proved to be a bit misleading, as the film suffers a lack of time line, because we forget that they were based in Afghan for over 12 months, and the jump between story is rather sporadic. However, this is understandable as there is clearly a , countless amount of footage, but clarity mixed with overtly dramatic music throughout proves to be a bit confusing. Although this does not detract from the fact that what we as an audience are viewing is real, and actually has actually happened. The reality of what is occurring in Afghanistan is emphasised early on, when we are with Carlos interviewing a couple of soldiers regarding a road block, it is at this point soldiers are fired upon.
The film is predominantly based in the notorious 'Korangal Valley' known by the locals as 'Death Valley', a fitting and obvious title. Mike and Carlos both follow a unit who are sent out to clear the pass of snipers as this pass is used to transport non lethal supplies to the soldiers. Almost instantly the soldiers are fired upon, and also both Mike and Carlos receive heavy fire and must continue to film whilst taking cover. It is at this point that Carlos must move to better cover up at the top of the hill as they cannot ascertain where fire is coming from, we follow him running up the hill, only to fall down whilst fire is still coming over head, and to our horror he stops moving. There are moments throughout this documentary that the relationship between father and son (Mike and Carlos) is really drilled home, and the notion of parent and child, which allows us as an audience to understand how these soldiers are someone's friend, father, husband/partner.
The climax of this story is when Carlos leaves Afghan ahead of his father, and Mike stays on to follow the 101st airborne into "The Hornets Nest", the Hornets nest is a term used to describe an ambush where you are surrounded, and the centre of an ambush. For 9 days the 101st stand and fight back against Muslim militia. Although as a film there are many cinematic mishaps, and areas where the continuity and narrative arch are complicated, it is the reality of war that makes this documentary award winning.
Finally, it is the end of the documentary which draws all glamour, fiction and Hollywood of war away from this documentary. And with one final bullet wound to the viewer, Mike Boettcher shows us the real loss of war, as we witness the funeral of the fallen men who died during this nine day battle of 'The Hornets Nest', a truly moving sequence.
Clint Eastwood : I want the troops from Great Britain and the U.S. to be successful, but by the same token, Afghanistan has always been a screw-up. |
Estrogen regulates the growth of a proportion of breast cancers through an estrogen receptor (ER) mediated mechanism. Loss of the ER is associated with a loss of estrogen (E2) regulation and a resistance to antiestrogen therapy. Since no effective therapeutic intervention is available to treat the ER negative patient new initiatives are essential to develop a new treatment strategy. One approach would be either to reactivate the ER gene or to develop a targeted "gene therapy" to re-introduce constitutive production of ER. Our strategic goal is to determine whether the ER could reassert control over the growth of receptor negative breast cancer cells. We are the first group to transfect a breast cancer cell line (MDA-MB-231) with sense and antisense cDNA for both mutant (valine replacing glycine at AA400) and wild type ER. The 8 different cloned cell lines, that constitutively produce ER, were selected by polycistronic production of mRNA for aminoglycoside phosphotransferase which confers resistance in media containing G418. The ER is functional and can activate vit ERETK-CAT however the wild type transfectant is approximately 20 times more sensitive that the mutant transfectant. The ER levels, determined by whole cell uptake of (3 HE-2) are in the range (300-520 fmole/mg protein) of MCF-7 breast cancer cells (500 fmole/mg protein). Interestingly enough E2 inhibits growth of all the transfectants in a concentration related manner. The inhibition is blocked by the pure antiestrogen ICI 164,384. In contrast an analog of the triphenylethylene 4 hydroxytamoxifen (40HT) is a partial agonist/antagonist in the wild type transfectants but an estrogen agonist in the mutant transfectants. The aims of the proposal are to characterize the cell cycle kinetics and cell biology of our current and additional transfectants and to determine the effect of increasing the receptor number in other breast cancer cell lines. Colon cancer cell line HT-29 will be transfected with ER to broaden our finding to other target organs not previously regulated by estrogen. Additionally we have been intrigued by the alteration in pharmacology of 40HT with the mutant receptor; we will establish a model for antiestrogen drug resistance based on alterations in the ligand, receptor and hormone response element. There is evidence that the inhibitory effect of E2 on ER transfected receptor negative cells is universal so these studies will provide the first solid mechanistic evidence to pursue a new therapeutic approach to breast cancer. In the future the pharmacologist may not only alter the ligand requirements but also be able to target or reactive quiescent receptors as a new general therapeutic strategy for cancer. |
Check out our new site Makeup Addiction
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
add your own caption
I got 99 problems and chromosomes |
1. Field of the Invention
The present invention relates to a fixing device and an image forming apparatus and, more particularly, to a fixing device that includes a cleaning unit that presses an elongated cleaning web running from a supply core to a take-up core against a fixing roller of a fixing device that includes the fixing roller provided with a heat source and a pressure-applying roller that is in pressure contact with the fixing roller, thereby cleaning the fixing roller.
2. Description of the Related Art
An image forming apparatus such as a copier, a printer, or a facsimile typically employs a fixing device of a heating-roller type that fixes a not-yet-fixed toner image on a recording medium, such as transfer paper, with heat and pressure by bringing a fixing roller (i.e., a heating roller) and a pressure-applying roller into pressure contact with each other and causing the recording medium to pass through between the rollers.
Known examples of this conventional type of fixing device include a fixing device disclosed in Japanese Patent Application Laid-open No. 2003-255745. This fixing device includes a web-type cleaning unit that cleans a surface of a fixing roller by bringing the fixing roller into sliding contact with a cleaning web that is being taken up from a supply core, on which the cleaning web is wound, onto a take-up roller to prevent toner from being peeled off from transfer paper and adhering to the fixing roller (toner offset).
The web-type cleaning unit uses heat-resistant fiber such as nonwoven textile impregnated with a releasing agent such as silicone oil as the cleaning web, thereby not only wiping off toner adhering to the surface of the fixing toner with the cleaning web but also supplying the releasing agent from the cleaning web to the surface of the fixing roller. The web-type cleaning has cleaning performance superior to other type of cleaning such as roller-type cleaning that brings a cleaning member, a roller, into contact with a surface of a fixing roller or felt-type cleaning that brings a cleaning member made of felt into sliding contact with a fixing roller.
The cleaning unit of the conventional fixing device is configured to maintain cleaning performance by feeding only a minuscule length (1 mm, for example) of the cleaning web each time a predetermined number of recording sheets are subjected to fixing operation so that a new portion, which is impregnated with silicone oil, of the cleaning web is regularly brought into sliding contact the fixing roller.
However, the web-type cleaning unit of the fixing device disclosed in Japanese Patent Application Laid-open No. 2003-255745 has a disadvantage. That is, because oil seeps from an outer-radius portion of the rolled-up cleaning web and moves toward the take-up core which is a core of the cleaning web, an amount of oil absorbed and retained in the cleaning web wound on the take-up core in a roll form is large in an inner-radius portion but small in the outer-radius portion.
For example, as illustrated in FIGS. 5A and 5B, when a cleaning web has an overall length of 32 m, an amount of oil absorbed and retained in a portion of the cleaning web, which corresponds to an outer-radius portion of the cleaning web wound on a take-up core, within 0.5 m from a leading end of the cleaning web is 10% to 20% smaller than a lower threshold of a target range, while an amount of oil absorbed and retained in a portion of the cleaning web, which corresponds to an inner-radius portion of the cleaning web wound on the take-up core, within 0.5 m from a trailing end of the cleaning web is 10% to 20% larger than an upper threshold of the target range.
There is a problem in the portion of the cleaning web within 0.5 m from the leading end where the amount of oil is small. That is, because oil on the surface of the fixing roller becomes insufficient and cleaning performance is delivered insufficiently, toner offset onto the surface of the fixing roller occurs, which undesirably results in contamination of an image.
Furthermore, when toner offset onto the surface of the fixing roller occurs, the moved toner can be accumulated on a thermistor that contacts the fixing roller and undesirably damage a surface layer of the fixing roller.
There is also a problem in the portion of the cleaning web within 0.5 m from the trailing end where the amount of oil is large. That is, because oil on the surface of the fixing roller becomes excessive, toner escaping occurs, which undesirably results in contamination of an image.
Put another way, there is a problem that because oil absorbed and retained in the cleaning web is deficient in the portion near the leading end and excessive in the portion near the trailing end, the surface of the fixing roller becomes nonuniform in anti-adhesive properties.
Therefore, there is a need for a fixing device and an image forming apparatus capable of equalizing anti-adhesion properties across a surface of a fixing roller whichever portion of a cleaning web is fed to clean the surface. |
MANILA, Philippines — Malacañang is encouraging the public to express their views on state policies following the release of a poll indicating that more than half of Filipinos think printing or broadcasting anything critical of the administration is dangerous.
A Social Weather Stations nationwide survey conducted from June 22 to 26 found that 59% of Filipino adults agree that they can say anything they want openly and without fear, even if it is against the administration. Only 18% disagreed with the statement for a "very strong" net agreement score of +41.
However, the poll also found that 51% of Filipinos agreed that it is "dangerous" to print or broadcast anything critical of the administration, even if it is the truth. Only 29% of the 1,200 respondents did not agree with the statement for a net agreement of +31.
READ: Reports critical of Duterte administration being pulled down — report
Presidential spokesman Salvador Panelo said Malacañang was "curious" as to why 51% of the respondents thought it was dangerous to publicize anything critical of the administration.
He said there is no prior restraint or punishment for those who practice the freedom to dissent in the Duterte presidency.
Advertising Scroll to continue
"The president respects criticisms as long as the same is not baseless, unfounded or false. He even urges the people, including writers and reporters, to freely express whatever sentiments they have," Panelo said in a statement issued Saturday night.
"As long as the speech or expression is within the ambit of the constitutional guarantees, it will not face any government interference," he added.
READ: SWS: More Filipinos get news from Facebook than from radio, newspapers
Panelo said dissent against the administration and its policies is "loud and not curtailed," citing anti-Duterte opinions in the media and social networking sites.
"We reiterate our call to all Filipinos not to hesitate in articulating their thoughts on government policies, critical or otherwise," he said.
"Ours is a president who not only respects everyone's right to free speech but listens to our plight as he ensures that the fibers of our country's democracy are preserved and enhanced."
READ: Filipino journalists critical of gov't continue to face harassment — US State Dept
Panelo claimed the survey indicating that 59% of Filipinos think they can say anything they want openly and without fear was a repudiation of the opposition's claim that freedom of expression is being curtailed by the administration.
"The survey rating means we have a vibrant and robust exercise of those freedoms," the presidential spokesman said.
Palace: Respect Duterte's appointment power
The results of the SWS poll were released two days after Duterte hurled a string of insults at Sen. Richard Gordon for criticizing his appointment of former military officials to civilian posts.
Last Thursday, Duterte said Gordon is a "smart a**" who walks like a penguin. He also claimed the senator's stomach is "a fart away from disaster."
READ: Duterte said Gordon ran for vice president. He didn't.
Panelo insisted that the president's appointment power should be respected. He also defended Duterte's preference for former military officials, saying they are known for their discipline.
"Appointment is both a privilege and a right of a president. We have to respect it... If a soldier retires, he becomes a civilian," he said.
"You should be in favor of them because they are known for their discipline. Civilians do not have discipline. They argue too much."
READ: Gordon swallows Duterte's comments about stomach
Panelo claimed Gordon's experience won't deter lawmakers from expressing views critical of the administration. He said opposition Sen. Leila de Lima still criticizes the president even if she is in jail.
"Filipinos are not afraid to criticize. Look at social media. The criticisms of those who do not like him (Duterte) are relentless. That's our nature," Panelo said.
READ: Filipino journalists identify poor wages, cyber attacks as key threats — report |
199 N.J. Super. 329 (1985)
489 A.2d 715
STATE OF NEW JERSEY, PLAINTIFF-APPELLANT,
v.
SAMUEL VERDUCCI, DEFENDANT-RESPONDENT.
Superior Court of New Jersey, Appellate Division.
Argued January 29, 1985.
Decided February 20, 1985.
*330 Before Judges MICHELS, PETRELLA and BAIME.
*331 Janet Berberian, Assistant Prosecutor, argued the cause for appellant (George L. Schneider, Essex County Prosecutor, attorney; Hilary L. Brunell, Assistant Prosecutor, on the brief).
Thomas C. Brown argued the cause for respondent.
PER CURIAM.
This is an appeal from an order entered by the Superior Court, Law Division reducing defendant's custodial sentence because of illness and releasing him pursuant to R. 3:21-10(b)(2). The trial judge's decision was based upon expert psychiatric testimony which disclosed a substantial likelihood that defendant would attempt to commit suicide were he to remain incarcerated. The State contends that defendant poses a substantial potential threat to the public and that the trial judge mistakenly exercised his discretion. We agree and reverse.
The salient facts are not in serious dispute. Defendant has an extensive record of delinquency both as a juvenile and as an adult. On July 21, 1978, defendant was sentenced to concurrent 12 month terms for atrocious assault and battery and obstruction of justice. Defendant subsequently escaped from the Essex County Corrections Center and was ultimately apprehended in Ohio. Upon his return to New Jersey, defendant entered pleas of guilty to assault with an offensive weapon and escape. For those offenses, defendant was sentenced to an aggregate term of not less than three nor more than five years in New Jersey State Prison. The sentences were to run consecutively to the custodial term remaining on the prior charges. Defendant's motion for a reduction of sentence was subsequently granted and he was placed on probation.
The offenses which are the subject of this appeal were committed while defendant was under probationary supervision. On April 3, 1980, defendant forcibly entered Makar's Jewelry and Gift Shop and robbed the owner at gunpoint. Although the record pertaining to this offense is somewhat sketchy, it is undisputed that defendant fired a shot at the victim narrowly *332 missing him during the course of the robbery. The record reflects that defendant threatened to kill the victim and made off with approximately $30,000 worth of gold jewelry and $1000 in cash.
Defendant ultimately entered pleas of guilty to first degree robbery (N.J.S.A. 2C:15-1) and unlawful possession of a handgun (N.J.S.A. 2C:39-5b). Defendant also pleaded guilty to a separate indictment charging him with theft by receiving stolen property (N.J.S.A. 2C:20-7) and unlawful possession of a firearm (N.J.S.A. 2C:39-5b). While awaiting disposition of charges pertaining to his violation of probation, defendant escaped from the holding cell adjacent to the courtroom and fled to Florida where he was ultimately apprehended after committing the crime of grand theft.
On March 26, 1982, defendant was sentenced to an aggregate custodial term of 15 years. Under the sentences imposed, defendant was to serve a term of four years before being eligible for parole. Unfortunately, the record discloses that defendant has abjectly refused to comply with prison rules from the very commencement of his incarceration. His encounters with prison officials need not be recounted at length. Suffice it to say, defendant's derelictions have been substantial and include possession of a weapon, abusive conduct, fighting and attempted escape. It is undisputed that defendant's misbehavior has resulted in his being placed in administrative segregation for the greater part of his incarceration.
The record clearly reveals defendant's apparent inability to cope with the realities of prison life. Uncontradicted evidence was presented that defendant made a serious attempt at suicide and came perilously close to succeeding. Apparently, this problem is not of recent vintage. The record reflects that defendant made a similar attempt several years ago when he was incarcerated for another offense. Whatever its etiology, it is beyond dispute that the risk of suicide is real.
*333 On December 10, 1984, defendant moved for a reduction of sentence pursuant to R. 3:21-10(b)(2). Defendant contended that he suffered from a mental disease or emotional illness which rendered him incapable of conforming to prison life. It was alleged that defendant presented a major suicidal risk. In support of that claim, Dr. Thomas Latimer, a psychiatrist, testified that defendant was a "prime candidate" for suicide because of his "severe" psychiatric problems. While acknowledging that defendant was not "actively psychotic" and was neither "delusional" nor "paranoid," the witness ascribed his past misbehavior to a "basic immaturity." According to Dr. Latimer, defendant's illness precluded him from being able to "conform his conduct [to prison rules], to take life seriously [and] to obey the law [and] respect others." Continued administrative segregation over a lengthy period of time had seriously impaired defendant's will to live within the confines of the prison environment. The doctor noted that treatment within the prison system was insufficient and that defendant would benefit from intensive psychotherapy. According to Dr. Latimer, releasing defendant from administrative segregation and placing him in the general prison population might prove beneficial, but it could "increase his suicidal tendencies."
Dr. Steven S. Simring, a psychiatrist, testified on behalf of the State. According to his testimony, "defendant did not suffer from a significant psychiatric illness." Specifically, defendant did not "show psychotic symptomology" in that he did not harbor hallucinations or delusions. Nevertheless, the doctor noted that defendant had "serious psychiatric difficulties" and that he suffered from an "antisocial personality disorder." The witness testified that defendant presented a danger to society because of his "gross immaturity." Dr. Simring stated that defendant could be treated at facilities within the prison system. However, he essentially agreed with Dr. Latimer's assessment that continued incarceration posed a substantial risk of suicidal behavior.
*334 Understandably concerned with the potential danger of suicide, the trial judge placed defendant on probation for five years. Initially, the court directed that defendant be placed in a suitable psychiatric institution as a condition of probation. However, it subsequently developed that for a variety of reasons no hospital would accept defendant as a patient. Nevertheless, Dr. Latimer ultimately agreed to treat defendant on an out-patient basis. The trial judge, thus, directed that defendant receive psychotherapy from Dr. Latimer as a condition of probation. An order releasing defendant from custody was subsequently entered. This appeal followed. Pursuant to the State's application, we stayed the trial judge's decision and accelerated this appeal.
Preliminarily, we note that R. 3:21-10(b)(2) does not distinguish between mental and physical illness. Although the issue is one of first impression, we are entirely satisfied that under appropriate circumstances a custodial sentence may be amended to permit the release of a defendant because of a mental infirmity. Moreover, the provisions of N.J.S.A. 30:4-82 which authorize the transfer of a prison inmate to a psychiatric facility do not necessarily preclude amendment of a custodial sentence to permit out-patient treatment or conditional release. See State v. Carter, 64 N.J. 382 (1974). The statute only authorizes confinement of persons who are a hazard to themselves or others. Aponte v. State, 30 N.J. 441, 455 (1959). It is not a blanket authorization to commit inmates suffering from any condition of mental illness or impairment. State v. Caralluzzo, 49 N.J. 152, 156 (1967). In any event, our Supreme Court has rejected the argument that the "beneficent" provisions of R. 3:21-10(b)(2) should never be indulged when the disease upon which the application is predicated is amenable to treatment within the prison setting. State v. Tumminello, 70 N.J. 187, 193 (1976).
Clearly, the exercise of judicial discretion in this area requires painstaking inquiry and analysis. The humane objective *335 of providing appropriate care and treatment for the mentally impaired must be balanced against the demands of public security. In seeking to accommodate these often countervailing policies, the trial judge should carefully scrutinize the nature of the inmate's mental or emotional illness. Where the pathology from which the defendant suffers poses a serious risk to the public safety, the scale necessarily tips in favor of continued incarceration despite the possibility of adverse psychological effects that might well ensue. In that regard, we emphasize that primary among the hierarchy of governmental objectives is the obligation to protect the citizen against criminal attack. The point to be stressed is that the aim of the law is to guard the innocent from injury by the "sick as well as the bad." State v. Maik, 60 N.J. 203, 213 (1972). Hence, public security must be the paramount goal.
We do not mean to suggest that a mentally ill inmate must be forever warehoused in a prison without exit. Whatever the crime committed, the prisoner is entitled to fair and humane treatment. Where the inmate presents a risk of harm to himself by virtue of his mental infirmity, appropriate action must be taken to protect and treat him. We recognize that this may well be easier said than done. Nevertheless, it is an imperative governmental obligation.
Against this backdrop, we are thoroughly convinced that the trial judge erred in granting defendant's application for amendment of his custodial sentence. While it is true that defendant has already served a substantial portion of the parole ineligibility term imposed by the sentencing court, this circumstance does not by itself warrant immediate release. We note in that regard that parole eligibility does not mandate automatic freedom from custodial restraint. See In re Trantino Parole Application, 89 N.J. 347, 366-369 (1982). In any event, defendant's initial parole eligibility date has been delayed by virtue of his misconduct while in prison. In our view, consideration of all the factors, especially the serious nature of the *336 crimes and the circumstances attendent to their commission, compels the conclusion that the trial judge mistakenly exercised his discretion. State v. Sanducci, 167 N.J. Super. 503, 510 (App.Div. 1979), certif. den. 82 N.J. 263 (1979). Although the court was required to consider the circumstances pertaining to defendant's illness and the conditions under which he is presently incarcerated, the crime committed and the danger to the public attendent to his release should have been given paramount consideration. See State v. Hodge, 95 N.J. 369 (1984); State v. Roth, 95 N.J. 334 (1984). See also State v. Stanley, 149 N.J. Super. 326, 328 (App.Div. 1977) certif. den. 75 N.J. 21 (1977). We are, therefore, constrained to reverse the order amending defendant's custodial sentences. The sentences imposed initially by the trial judge are hereby reinstated.
|
1. Field of the Invention
The present invention relates to street sweepers or the like and more specifically relates to apparatus for maintaining a substantially constant pressure and pick-up broom pattern on a surface being swept for the useful life of the broom, which broom varies in size, weight and stiffness during its life due to wear.
2. Description of the Prior Art
Street sweepers and controls for operating the same are known and disclosed in the above referred to applications. The sweeper includes a main or pick-up broom which engages streets or the like to be swept. In the Kassai application a hydraulic cylinder is disclosed for raising and lowering the sides of the pick-up broom, and a pressure gauge located in the cab is connected to the cylinder thereby enabling the operator to maintain a light, medium, or heavy pick-up broom pressure on the surface being swept.
In the above type of sweeper, whether a three wheel or a four wheel sweeper, it is desirable to maintain a substantially constant pick-up broom sweeping pressure and pattern against the surface being swept during the life of the broom. It is well known that a new pick-up broom of about 36 inches in diameter is heavy and thus requires a lifting force acting thereon to provide the desired sweeping pressure and pattern. When the pick-up broom is worn to its minimum acceptable diameter of about 16 inches, the broom is much lighter and requires a downward force to provide the desired sweeping pattern. The pick-up broom is journaled on the ends of a pair of laterally spaced arms that are provided to the chassis of the sweeper and is pivotally moved between a raised transport position and a lowered working position against the surface to be cleaned by a hydraulic cylinder. |
Senior Ted Trzaska has been a solid contributor to the success of Minster's boys cross country team this season. Trzaska and the rest of the Wildcats will compete at the state cross country meet on Saturday at National Trail Raceway in Hebron. |
Castles in Great Britain and Ireland
Castles have played an important military, economic and social role in Great Britain and Ireland since their introduction following the Norman invasion of England in 1066. Although a small number of castles had been built in England in the 1050s, the Normans began to build motte and bailey and ring-work castles in large numbers to control their newly occupied territories in England and the Welsh Marches. During the 12th century the Normans began to build more castles in stone – with characteristic square keep – that played both military and political roles. Royal castles were used to control key towns and the economically important forests, while baronial castles were used by the Norman lords to control their widespread estates. David I invited Anglo-Norman lords into Scotland in the early 12th century to help him colonise and control areas of his kingdom such as Galloway; the new lords brought castle technologies with them and wooden castles began to be established over the south of the kingdom. Following the Norman invasion of Ireland in the 1170s, under Henry II, castles were established there too.
Castles continued to grow in military sophistication and comfort during the 12th century, leading to a sharp increase in the complexity and length of sieges in England. While in Ireland and Wales castle architecture continued to follow that of England, after the death of Alexander III the trend in Scotland moved away from the construction of larger castles towards the use of smaller tower houses. The tower house style would also be adopted in the north of England and Ireland in later years. In North Wales Edward I built a sequence of militarily powerful castles after the destruction of the last Welsh polities in the 1270s. By the 14th century castles were combining defences with luxurious, sophisticated living arrangements and heavily landscaped gardens and parks.
Many royal and baronial castles were left to decline, so that by the 15th century only a few were maintained for defensive purposes. A small number of castles in England and Scotland were developed into Renaissance Era palaces that hosted lavish feasts and celebrations amid their elaborate architecture. Such structures were, however, beyond the means of all but royalty and the richest of the late-medieval barons. Although gunpowder weapons were used to defend castles from the late 14th century onwards it became clear during the 16th century that, provided artillery could be transported and brought to bear on a besieged castle, gunpowder weapons could also play an important attack role. The defences of coastal castles around the British Isles were improved to deal with this threat, but investment in their upkeep once again declined at the end of the 16th century. Nevertheless, in the widespread civil and religious conflicts across the British Isles during the 1640s and 1650s, castles played a key role in England. Modern defences were quickly built alongside existing medieval fortifications and, in many cases, castles successfully withstood more than one siege. In Ireland the introduction of heavy siege artillery by Oliver Cromwell in 1649 brought a rapid end to the utility of castles in the war, while in Scotland the popular tower houses proved unsuitable for defending against civil war artillery – although major castles such as Edinburgh put up strong resistance. At the end of the war many castles were slighted to prevent future use.
Military use of castles rapidly decreased over subsequent years, although some were adapted for use by garrisons in Scotland and key border locations for many years to come, including during the Second World War. Other castles were used as county gaols, until parliamentary legislation in the 19th closed most of them down. For a period in the early 18th century, castles were shunned in favour of Palladian architecture, until they re-emerged as an important cultural and social feature of England, Wales and Scotland and were frequently "improved" during the 18th and 19th centuries. Such renovations raised concerns over their protection so that today castles across the British Isles are safeguarded by legislation. Primarily used as tourist attractions, castles form a key part of the national heritage industry. Historians and archaeologists continue to develop our understanding of British castles, while vigorous academic debates in recent years have questioned the interpretation of physical and documentary material surrounding their original construction and use.
Norman Invasion
Anglo-Saxon fortifications
The English word "castle" derives from the Latin word castellum and is used to refer to the private fortified residence of a lord or noble. The presence of castles in Britain and Ireland dates primarily from the Norman invasion of 1066. Before the arrival of the Normans the Anglo-Saxons had built burhs, fortified structures with their origins in 9th-century Wessex. Most of these, especially in urban areas, were large enough to be best described as fortified townships rather than private dwellings and are therefore not usually classed as castles. Rural burhs were smaller and usually consisted of a wooden hall with a wall enclosing various domestic buildings along with an entrance tower called a burh-geat, which was apparently used for ceremonial purposes. Although rural burhs were relatively secure their role was primarily ceremonial and they too are not normally classed as castles. There were, however, a small number of castles which were built in England during the 1050s, probably by Norman knights in the service of Edward the Confessor. These include Hereford, Clavering, Richard's Castle and possibly Ewyas Harold Castle and Dover.
Invasion
William, Duke of Normandy, invaded England in 1066 and one of his first actions after landing was to build Hastings Castle to protect his supply routes. Following their victory at the battle of Hastings the Normans began three phases of castle building. The first of these was the establishment, by the new king, of a number of royal castles in key strategic locations. This royal castle programme focused on controlling the towns and cities of England and the associated lines of communication, including Cambridge, Huntingdon, Lincoln, Norwich, Nottingham, Wallingford, Warwick and York. Of the castles built by William the Conqueror two-thirds were built in towns and cities, often those with the former Anglo-Saxon mints. These urban castles could make use of the existing town's walls and fortifications, but typically required the demolition of local houses to make space for them. This could cause extensive damage, and records suggest that in Lincoln 166 houses were destroyed, with 113 in Norwich and 27 in Cambridge. Some of these castles were deliberately built on top of important local buildings, such as the burhs or halls of local nobles, and might be constructed so as to imitate aspects of the previous buildings – such as the gatehouse at Rougemont Castle in Exeter, which closely resembled the previous Anglo-Saxon burh tower – this was probably done to demonstrate to the local population that they now answered to their new Norman rulers.
The second and third waves of castle building were led by the major magnates, and then by the more junior knights on their new estates. The apportionment of the conquered lands by the king influenced where these castles were built. In a few key locations the king gave his followers compact groups of estates including the six rapes of Sussex and the three earldoms of Chester, Shrewsbury and Hereford; intended to protect the line of communication with Normandy and the Welsh border respectively. In these areas a baron's castles were clustered relatively tightly together, but in most of England the nobles' estates, and therefore their castles, were more widely dispersed. As the Normans pushed on into South Wales they advanced up the valleys building castles as they went and often using the larger castles of the neighbouring earldoms as a base.
As a result, castle building by the Norman nobility across England and the Marches lacked a grand strategic plan, reflecting local circumstances such as military factors and the layout of existing estates and church lands. Castles were often situated along the old Roman roads that still formed the backbone for travel across the country, both to control the lines of communication and to ensure easy movement between different estates. Many castles were built close to inland river ports and those built on the coast were usually located at the mouths of rivers or in ports, Pevensey and Portchester being rare exceptions. Some groups of castles were located so as to be mutually reinforcing – for example the castles of Littledean Camp, Glasshouse Woods and Howle Hill Camp were intended to act as an integrated defence for the area around Gloucester and Gloucester Castle for Gloucester city itself, while Windsor was one of a ring of castles built around London, each approximately a day's march apart. Some regional patterns in castle building can also be seen – relatively few castles were built in East Anglia compared to the west of England or the Marches; this was probably due to the relatively settled and prosperous nature of the east of England and reflected a shortage of available serfs, or unfree labour.
Not all of the castles were occupied simultaneously. Some were built during the invasions and then abandoned while other new castles were constructed elsewhere, especially along the western borders. Recent estimates suggest that between 500 and 600 castles were occupied at any one time in the post-conquest period.
Architecture
There was a large degree of variation in the size and exact shape of the castles built in England and Wales after the invasion. One popular form was the motte and bailey, in which earth would be piled up into a mound (called a motte) to support a wooden tower, and a wider enclosed area built alongside it (called a bailey); Stafford Castle is a typical example of a post-invasion motte castle. Another widespread design was the ring work in which earth would be built up in a circular or oval shape and topped with a wooden rampart; Folkestone Castle is a good example of a Norman ring work, in this case built on top of a hill although most post-invasion castles were usually sited on lower ground. Around 80 per cent of Norman castles in this period followed the motte-and-bailey pattern, but ring works were particularly popular in certain areas, such as south-west England and south Wales. One theory put forward to explain this variation is that ringworks were easier to build in these shallow-soil areas than the larger mottes.
The White Tower in London and the keep of Colchester Castle were the only stone castles to be built in England immediately after the conquest, both with the characteristic square Norman keep. Both these castles were built in the Romanesque style and were intended to impress as well as provide military protection. In Wales the first wave of the Norman castles were again made of wood, in a mixture of motte-and-bailey and ringwork designs, with the exception of the stone built Chepstow Castle. Chepstow too was heavily influenced by Romanesque design, reusing numerous materials from the nearby Venta Silurum to produce what historian Robert Liddiard has termed "a play upon images from Antiquity".
The size of these castles varied depending on the geography of the site, the decisions of the builder and the available resources. Analysis of the size of mottes has shown some distinctive regional variation; East Anglia, for example, saw much larger mottes being built than the Midlands or London. While motte-and-bailey and ring-work castles took great effort to build, they required relatively few skilled craftsmen allowing them to be raised using forced labour from the local estates; this, in addition to the speed with which they could be built – a single season, made them particularly attractive immediately after the conquest. The larger earthworks, particularly mottes, required an exponentially greater quantity of manpower than their smaller equivalents and consequently tended to be either royal, or belong to the most powerful barons who could muster the required construction effort. Despite motte-and-bailey and ringworks being common designs amongst Norman castles, each fortification was slightly different – some castles were designed with two baileys attached to a single motte, and some ring works were built with additional towers added on; yet other castles were built as ringworks and later converted to motte-and-bailey structures.
12th century
Developments in castle design
From the early 12th century onwards the Normans began to build new castles in stone and convert existing timber designs. This was initially a slow process, picking up speed towards the second half of the century. Traditionally this transition was believed to have been driven by the more crude nature of wooden fortifications, the limited life of timber in wooden castles and its vulnerability to fire; recent archaeological studies have however shown that many wooden castles were as robust and as complex as their stone equivalents. Some wooden castles were not converted into stone for many years and instead expanded in wood, such as at Hen Domen.
Several early stone keeps had been built after the conquest, with somewhere between ten and fifteen in existence by 1100, and more followed in the 12th century until around 100 had been built by 1216. Typically these were four sided designs with the corners reinforced by pilaster buttresses. Keeps were up to four storeys high, with the entrance on the first storey to prevent the door from being easily broken down. The strength of the design typically came from the thickness of the walls: usually made of rag-stone, as in the case of Dover Castle, these walls could be up to thick. The larger keeps were subdivided by an internal wall while the smaller versions, such as that at Goodrich, had a single, slightly cramped chamber on each floor. Stone keeps required skilled craftsmen to build them; unlike unfree labour or serfs, these men had to be paid and stone keeps were therefore expensive. They were also relatively slow to erect – a keep's walls could usually only be raised by a maximum of a year, the keep at Scarborough was typical in taking ten years to build.
Norman stone keeps played both a military and a political role. Most of the keeps were physically extremely robust and, while they were not designed as an intended location for the final defence of a castle, they were often placed near weak points in the walls to provide supporting fire. Many keeps made compromises to purely military utility: Norwich Castle included elaborate blind arcading on the outside of the building, in a Roman style, and appears to had a ceremonial entrance route; The interior of the keep at Hedingham could have hosted impressive ceremonies and events, but contained numerous flaws from a military perspective. Similarly there has been extensive debate over the role of Orford Castle whose expensive, three-cornered design most closely echoes imperial Byzantine palaces and may have been intended by Henry II to be more symbolic than military in nature.
Another improvement from the 12th century onwards was the creation of shell keeps, involving replacing the wooden keep on the motte with a circular stone wall. Buildings could be built around the inside of the shell, producing a small inner courtyard. Restormel Castle is a classic example of this development with a perfectly circular wall and a square entrance tower while the later Launceston Castle, although more ovoid than circular, is another good example of the design and one of the most formidable castles of the period. Round castles were unusually popular throughout Cornwall and Devon. Although the circular design held military advantages, these only really mattered in the 13th century onwards; the origins of 12th-century circular design were the circular design of the mottes; indeed, some designs were less than circular in order to accommodate irregular mottes, such as that at Windsor Castle.
Economy and society
English castles during the period were divided into those royal castles owned by the king, and baronial castles controlled by the Anglo-Norman lords. According to chronicler William of Newburgh royal castles formed the "bones of the kingdom". A number of royal castles were also designated as shrieval castles, forming the administrative hub for a particular county – for example Winchester Castle served as the centre of Hampshire. These castles formed a base for the royal sheriff, responsible for enforcing royal justice in the relevant shire; the role of the sheriff became stronger and clearer as the century progressed.
A number of royal castles were linked to forests and other key resources. Royal forests in the early medieval period were subject to special royal jurisdiction; forest law was, as historian Robert Huscroft describes it, "harsh and arbitrary, a matter purely for the King's will" and forests were expected to supply the king with hunting grounds, raw materials, goods and money. Forests were typically tied to castles, both to assist with the enforcement of the law and to store the goods being extracted from the local economy: Peveril Castle was linked to the Peak Forest and the local lead mining there; St Briavels was tied to the Forest of Dean; and Knaresborough, Rockingham and Pickering to their eponymous forests respectively. In the south-west, where the Crown oversaw the lead mining industry, castles such as Restormel played an important role running the local stannery courts.
Baronial castles were of varying size and sophistication; some were classed as a caput, or the key stronghold of a given lord, and were usually larger and better fortified than the norm and usually held the local baronial honorial courts. The king continued to exercise the right to occupy and use any castle in the kingdom in response to external threats, in those cases he would staff the occupied castles with his own men; the king also retained the right to authorise the construction of new castles through the issuing of licenses to crenellate. It was possible for bishops to build or control castles, such as the important Devizes Castle linked to the Bishop of Salisbury, although this practice was challenged on occasion. In the 12th century the practice of castle-guards emerged in England and Wales, under which lands were assigned to local lords on condition that the recipient provided a certain number of knights or sergeants for the defence of a named castle. In some cases, such as at Dover, this arrangement became quite sophisticated with particular castle towers being named after particular families owing castle-guard duty.
The links between castles and the surrounding lands and estates was particularly important during this period. Many castles, both royal and baronial, had deer parks or chases attached to them for the purposes of hunting. These usually stretched away from the village or borough associated with the castle, but occasionally a castle was placed in the centre of a park, such as at Sandal.
The Anarchy
Civil war broke out in England and raged between 1139 and 1153, forming a turbulent period in which the rival factions of King Stephen and the Empress Matilda struggled for power. Open battles were relatively rare during the war, with campaigns instead centred on a sequence of raids and sieges as commanders attempted to gain control over the vital castles that controlled the territory in the rival regions. Siege technology during the Anarchy centred on basic stone-throwing machines such as ballistae and mangonels, supported by siege towers and mining, combined with blockade and, occasionally, direct assault. The phase of the conflict known as "the Castle War" saw both sides attempting to defeat each other through sieges, such as Stephen's attempts to take Wallingford, the most easterly fortress in Matilda's push towards London, or Geoffrey de Mandeville's attempts to seize East Anglia by taking Cambridge Castle.
Both sides responded to the challenge of the conflict by building many new castles, sometimes as sets of strategic fortifications. In the south-west Matilda's supporters built a range of castles to protect the territory, usually motte and bailey designs such as those at Winchcombe, Upper Slaughter, or Bampton. Similarly, Stephen built a new chain of fen-edge castles at Burwell, Lidgate, Rampton, Caxton, and Swavesey – all about six to nine miles (10–15 km) apart – in order to protect his lands around Cambridge. Many of these castles were termed "adulterine" (unauthorised), because no formal permission was given for their construction. Contemporary chroniclers saw this as a matter of concern; Robert of Torigny suggested that as many as 1,115 such castles had been built during the conflict, although this was probably an exaggeration as elsewhere he suggests an alternative figure of 126. Another feature of the war was the creation of many "counter-castles". These had been used in English conflicts for several years before the civil war and involved building a basic castle during a siege, alongside the main target of attack. Typically these would be built in either a ringwork or a motte-and-bailey design between 200 and 300 yards (180 and 270 metres) away from the target, just beyond the range of a bow. Counter-castles could be used to either act as firing platforms for siege weaponry, or as bases for controlling the region in their own right. Most counter-castles were destroyed after their use but in some cases the earthworks survived, such as the counter-castles called Jew's Mount and Mount Pelham built by Stephen in 1141 outside Oxford Castle.
Matilda's son Henry II assumed the throne at the end of the war and immediately announced his intention to eliminate the adulterine castles that had sprung up during the war, but it is unclear how successful this effort was. Robert of Torigny recorded that 375 were destroyed, without giving the details behind the figure; recent studies of selected regions have suggested that fewer castles were probably destroyed than once thought and that many may simply have been abandoned at the end of the conflict. Certainly many of the new castles were transitory in nature: Archaeologist Oliver Creighton observes that 56 per cent of those castles known to have been built during Stephen's reign have "entirely vanished".
The spread of castles in Scotland, Wales and Ireland
Castles in Scotland emerged as a consequence of the centralising of royal authority in the 12th century. Prior to the 1120s there is very little evidence of castles having existed in Scotland, which had remained less politically centralised than in England with the north still ruled by the kings of Norway. David I of Scotland spent time at the court of Henry I in the south, until he became the Earl of Huntingdon, and returned to Scotland with the intention of extending royal power across the country and modernising Scotland's military technology, including the introduction of castles. The Scottish king encouraged Norman and French nobles to settle in Scotland, introducing a feudal mode of landholding and the use of castles as a way of controlling the contested lowlands. The quasi-independent polity of Galloway, which had resisted the rule of David and his predecessors, was a particular focus for this colonisation. The size of these Scottish castles, primarily wooden motte-and-bailey constructions, varied considerably from larger designs, such as the Bass of Inverurie, to smaller castles like Balmaclellan. As historian Lise Hull has suggested, the creation of castles in Scotland was "less to do with conquest" and more to do with "establishing a governing system".
The Norman expansion into Wales slowed in the 12th century, but remained an ongoing threat to the remaining native rulers. In response the Welsh princes and lords began to build their own castles, usually in wood. There are indications that this may have begun from 1111 onwards under Prince Cadwgan ap Bleddyn with the first documentary evidence of a native Welsh castle being at Cymmer in 1116. These timber castles, including Tomen y Rhodwydd, Tomen y Faerdre and Gaer Penrhôs, were of equivalent quality to the Norman fortifications in the area and it can prove difficult to distinguish the builders of some sites from the archaeological evidence alone. At the end of the 12th century the Welsh rulers began to build castles in stone, primarily in the principality of North Wales.
Ireland remained ruled by native kings into the 12th century, largely without the use of castles. There was a history of Irish fortifications called ráths, a type of ringfort, some of which were very heavily defended but which are not usually considered to be castles in the usual sense of the word. The kings of Connacht constructed fortifications from 1124 which they called caistel or caislen, from the Latin and French for castle, and there has been considerable academic debate over how far these resembled European castles.
The Norman invasion of Ireland began between 1166 and 1171, under first Richard de Clare and then Henry II of England, with the occupation of southern and eastern Ireland by a number of Anglo-Norman barons. The rapid Norman success depended on key economic and military advantages, with castles enabling them to control the newly conquered territories. The new lords rapidly built castles to protect their possessions, many of these were motte-and-bailey constructions; in Louth at least 23 of these were built. It remains uncertain how many ringwork castles were built in Ireland by the Anglo-Normans. Other castles, such as Trim and Carrickfergus, were built in stone as the caput centres for major barons. Analysis of these stone castles suggests that building in stone was not simply a military decision; indeed, several of the castles contain serious defensive flaws. Instead the designs, including their focus on large stone keeps, were intended both to increase the prestige of the baronial owners and to provide adequate space for the administrative apparatus of the new territories. Unlike in Wales the indigenous Irish lords do not appear to have constructed their own castles in any significant number during the period.
13th–14th centuries
Military developments
Castle design in Britain continued to change towards the end of the 12th century. After Henry II mottes ceased to be built in most of England, although they continued to be erected in Wales and along the Marches. Square keeps remained common across much of England in contrast to the circular keeps increasingly prevailing in France; in the Marches, however, circular keep designs became more popular. Castles began to take on a more regular, enclosed shape, ideally quadrilateral or at least polygonal in design, especially in the more prosperous south. Flanking towers, initially square and latterly curved, were introduced along the walls and gatehouses began to grow in size and complexity, with portcullises being introduced for the first time. Castles such as Dover and the Tower of London were expanded in a concentric design in what Cathcart King has labelled the early development of "scientific fortification".
The developments spread to Anglo-Norman possessions in Ireland where this English style of castles dominated throughout the 13th century, although the deteriorating Irish economy of the 14th century brought this wave of building to an end. In Scotland Alexander II and Alexander III undertook a number of castle building projects in the modern style, although Alexander III's early death sparked conflict in Scotland and English intervention under Edward I in 1296. In the ensuing wars of Scottish Independence castle building in Scotland altered path, turning away from building larger, more conventional castles with curtain walls. The Scots instead adopted the policy of slighting, or deliberately destroying, castles captured in Scotland from the English to prevent their re-use in subsequent invasions – most of the new Scottish castles built by nobles were of the tower house design; the few larger castles built in Scotland were typically royal castles, built by the Scottish kings.
Some of these changes were driven by developments in military technology. Before 1190 mining was used rarely and the siege engines of the time were largely incapable of damaging the thicker castle walls. The introduction of the trebuchet began to change this situation; it was able to throw much heavier balls, with remarkable accuracy, and reconstructed devices have been shown to be able to knock holes in walls. Trebuchets were first recorded in England in 1217, and were probably used the year before as well. Richard I used them in his sieges during the Third Crusade and appears to have started to alter his castle designs to accommodate the new technology on his return to Europe. The trebuchet seems to have encouraged the shift towards round and polygonal towers and curved walls. In addition to having fewer or no dead zones, and being easier to defend against mining, these castle designs were also much less easy to attack with trebuchets as the curved surfaces could deflect some of the force of the shot.
Castles saw an increasing use of arrowslits by the 13th century, especially in England, almost certainly linked to the introduction of crossbows. These arrow slits were combined with firing positions from the tops of the towers, initially protected by wooden hoarding until stone machicolations were introduced in England in the late 13th century. The crossbow was an important military advance on the older short bow and was the favoured weapon by the time of Richard I; many crossbows and vast numbers of quarrels were needed to supply royal forces, in turn requiring larger scale iron production. In England, crossbows were primarily made at the Tower of London but St Briavels Castle, with the local Forest of Dean available to provide raw materials, became the national centre for quarrel manufacture. In Scotland, Edinburgh Castle became the centre for the production of bows, crossbows and siege engines for the king.
One result of this was that English castle sieges grew in complexity and scale. During the First Barons' War from 1215 to 1217, the prominent sieges of Dover and Windsor Castle showed the ability of more modern designs to withstand attack; King John's successful siege of Rochester required an elaborate and sophisticated assault, reportedly costing around 60,000 marks, or £40,000. The siege of Bedford Castle in 1224 required Henry III to bring siege engines, engineers, crossbow bolts, equipment and labourers from across all of England. The Siege of Kenilworth Castle in 1266, during the Second Barons' War, was larger and longer still. Extensive water defences withstood the attack of the future Edward I, despite the prince targeting the weaker parts of the castle walls, employing huge siege towers and attempting a night attack using barges brought from Chester. The costs of the siege exhausted the revenues of ten English counties. Sieges in Scotland were initially smaller in scale, with the first recorded such event being the 1230 siege of Rothesay Castle where the besieging Norwegians were able to break down the relatively weak stone walls with axes after only three days. When Edward I invaded Scotland he brought with him the siege capabilities which had evolved south of the border: Edinburgh Castle fell within three days, and Roxburgh, Jedburgh, Dunbar, Stirling, Lanark and Dumbarton castles surrendered to the king. Subsequent English sieges, such as the attacks on Bothwell and Stirling, again used considerable resources including giant siege engines and extensive teams of miners and masons.
Economy and society
A number of royal castles, from the 12th century onwards, formed an essential network of royal storehouses in the 13th century for a wide range of goods including food, drink, weapons, armour and raw materials. Castles such as Southampton, Winchester, Bristol and the Tower of London were used to import, store and distribute royal wines. The English royal castles also became used as gaols – the Assize of Clarendon in 1166 insisted that royal sheriffs establish their own gaols and, in the coming years, county gaols were placed in all the shrieval royal castles. Conditions in these gaols were poor and claims of poor treatment and starvation were common; Northampton Castle appears to have seen some of the worst abuses.
The development of the baronial castles in England were affected by the economic changes during the period. During the 13th and 14th centuries the average incomes of the English barons increased but wealth became concentrated in the hands of a smaller number of individuals, with a greater discrepancy in incomes. At the same time the costs of maintaining and staffing a modern castle were increasing. The result was that although there were around 400 castles in England in 1216, the number of castles continued to diminish over the coming years; even the wealthier barons were inclined to let some castles slide into disuse and to focus their resources on the remaining stock. The castle-guard system faded into abeyance in England, being replaced by financial rents, although it continued in the Welsh Marches well into the 13th century and saw some limited use during Edward I's occupation of Scotland in the early 14th century.
The remaining English castles became increasingly comfortable. Their interiors were often painted and decorated with tapestries, which would be transported from castle to castle as nobles travelled around the country. There were an increasing number of garderobes built inside castles, while in the wealthier castles the floors could be tiled and the windows furnished with Sussex Weald glass, allowing the introduction of window seats for reading. Food could be transported to castles across relatively long distances; fish was brought to Okehampton Castle from the sea some away, for example. Venison remained the most heavily consumed food in most castles, particularly those surrounded by extensive parks or forests such as Barnard Castle, while prime cuts of venison were imported to those castles that lacked hunting grounds, such as Launceston.
By the late 13th century some castles were built within carefully "designed landscapes", sometimes drawing a distinction between an inner core of a herber, a small enclosed garden complete with orchards and small ponds, and an outer region with larger ponds and high status buildings such as "religious buildings, rabbit warrens, mills and settlements", potentially set within a park. A gloriette, or a suite of small rooms, might be built within the castle to allow the result to be properly appreciated, or a viewing point constructed outside. At Leeds Castle the redesigned castle of the 1280s was placed within a large water garden, while at Ravensworth at the end of the 14th century an artificial lake was enclosed by a park to produce an aesthetically and symbolically pleasing entrance to the fortification. The wider parklands and forests were increasingly managed and the proportion of the smaller fallow deer consumed by castle inhabitants in England increased as a result.
Welsh castles
During the 13th century the native Welsh princes built a number of stone castles. The size of these varied considerably from smaller fortifications, such as Dinas Emrys in Snowdonia, to more substantial castles like Deganwy Castle and the largest, Castell y Bere. Native Welsh castles typically maximised the defensive benefits of high, mountainous sites, often being built in an irregular shape to fit a rocky peak. Most had deep ditches cut out of the rock to protect the main castle. The Welsh castles were usually built with a relatively short keep, used as living accommodation for princes and nobility, and with distinctive rectangular watch-towers along the walls. In comparison to Norman castles the gatehouses were much weaker in design, with almost no use of portcullises or spiral staircases, and the stonework of the outer walls was also generally inferior to Norman built castles. The very last native Welsh castles, built in the 1260s, more closely resemble Norman designs; in the case of Dinas Brân including a round keep and Norman gatehouse defences.
Edward I's castles in Wales
In 1277 Edward I launched a final invasion of the remaining native Welsh strongholds in North Wales, intending to establish his rule over the region on a permanent basis. As part of this occupation he instructed his leading nobles to construct eight new castles across the region; Aberystwyth and Builth in mid-Wales and Beaumaris, Conwy, Caernarfon, Flint, Harlech and Rhuddlan Castle in North Wales. Historian R. Allen Brown has described these as "amongst the finest achievements of medieval military architecture [in England and Wales]". The castles varied in design but were typically characterised by powerful mural towers along the castle walls, with multiple, over-lapping firing points and large and extremely well defended barbicans. The castles were intended to be used by the king when in the region and included extensive high-status accommodation. Edward also established various new English towns, and in several cases the new castles were designed to be used alongside the fortified town walls as part of an integrated defence. Historian Richard Morris has suggested that "the impression is firmly given of an elite group of men-of-war, long-standing comrades in arms of the king, indulging in an orgy of military architectural expression on an almost unlimited budget".
James of Saint George, a famous architect and engineer from Savoy, was probably responsible for the bulk of the construction work across the region. The castles were extremely costly to build and required labourers, masons, carpenters, diggers, and building resources to be gathered by local sheriffs from across England, mustered at Chester and Bristol, before being sent on to North Wales in the spring, returning home each winter. The number of workers involved placed a significant drain on the country's national labour force. The total financial cost cannot be calculated with certainty, but estimates suggest that Edward's castle building programme cost at least £80,000 – four times the total royal expenditure on castles between 1154 and 1189.
The Edwardian castles also made strong symbolic statements about the nature of the new occupation. For example, Caernarvon was decorated with carved eagles, equipped with polygonal towers and expensive banded masonry, all designed to imitate the Theodosian Walls of Constantinople, then the idealised image of imperial power. The actual site of the castle may also have been important as it was positioned close to the former Roman fort of Segontium. The elaborate gatehouse, with an excessive five sets of doors and six portcullises, also appears to have been designed to impress visitors and to invoke an image of an Arthurian castle, then believed to have been Byzantine in character.
Palace-fortresses
In the middle of the 13th century Henry III began to redesign his favourite castles, including Winchester and Windsor, building larger halls, grander chapels, installing glass windows and decorating the palaces with painted walls and furniture. This marked the beginning of a trend towards the development of grand castles designed for elaborate, elite living. Life in earlier keeps had been focused around a single great hall, with privacy for the owner's family provided by using an upper floor for their own living accommodation. By the 14th century nobles were travelling less, bringing much larger households with them when they did travel and entertaining visitors with equally large retinues. Castles such as Goodrich were redesigned in the 1320s to provide greater residential privacy and comfort for the ruling family, while retaining strong defensive features and a capacity to hold over 130 residents at the castle. The design influenced subsequent conversions at Berkeley and by the time that Bolton Castle was being built, in the 1380s, it was designed to hold up to eight different noble households, each with their own facilities. Royal castles such as Beaumaris, although designed with defence in mind, were designed to hold up to eleven different households at any one time.
Kings and the most wealthy lords could afford to redesign castles to produce palace-fortresses. Edward III spent £51,000 on renovating Windsor Castle; this was over one and a half times Edward's typical annual income. In the words of Steven Brindle the result was a "great and apparently architecturally unified palace... uniform in all sorts of ways, as to roof line, window heights, cornice line, floor and ceiling heights", echoing older designs but without any real defensive value. The wealthy John of Gaunt redesigned the heart of Kenilworth Castle, like Windsor the work emphasised a unifying, rectangular design and the separation of ground floor service areas from the upper stories and a contrast of austere exteriors with lavish interiors, especially on the 1st floor of the inner bailey buildings. By the end of the 14th century a distinctive English perpendicular style had emerged.
In the south of England private castles were being built by newly emerging, wealthy families; like the work at Windsor, these castles drew on the architectural themes of earlier martial designs, but were not intended to form a serious defence against attack. These new castles were heavily influenced by French designs, involving a rectangular or semi-rectangular castle with corner towers, gatehouses and moat; the walls effectively enclosing a comfortable courtyard plan not dissimilar to that of an unfortified manor. Bodiam Castle built in the 1380s possessed a moat, towers and gunports but, rather than being a genuine military fortification, the castle was primarily intended to be admired by visitors and used as a luxurious dwelling – the chivalric architecture implicitly invoking comparisons with Edward I's great castle at Beaumaris.
In the north of England improvements in the security of the Scottish border, and the rise of major noble families such as the Percies and the Nevilles, encouraged a surge in castle building at the end of the 14th century. Palace-fortresses such as Raby, Bolton and Warkworth Castle took the quadrangular castle styles of the south and combined them with exceptionally large key towers or keeps to form a distinctive northern style. Built by major noble houses these castles were typically even more opulent than those built by the nouveau riche of the south. They marked what historian Anthony Emery has described as a "second peak of castle building in England and Wales", after the Edwardian designs at the end of the 14th century.
Introduction of gunpowder
Early gunpowder weapons were introduced to England from the 1320s onwards and began to appear in Scotland by the 1330s. By the 1340s the English Crown was regularly spending money on them and the new technology began to be installed in English castles by the 1360s and 1370s, and in Scottish castles by the 1380s. Cannons were made in various sizes, from smaller hand cannons to larger guns firing stone balls of up to . Medium-sized weapons weighing around 20 kg each were more useful for the defence of castles, although Richard II eventually established 600 pound (272 kilo) guns at the Tower of London and the 15,366 pound (6,970 kilo) heavy Mons Meg bombard was installed at Edinburgh Castle.
Early cannons had only a limited range and were unreliable; in addition early stone cannonballs were relatively ineffective when fired at stone castle walls. As a result, early cannon proved most useful for defence, particularly against infantry assaults or to fire at the crews of enemy trebuchets. Indeed, early cannons could be quite dangerous to their own soldiers; James II of Scotland was killed besieging Roxburgh Castle in 1460 when one of his cannons, called "Lion", exploded next to him. The expense of early cannons meant that they were primarily a weapon deployed by royalty rather than the nobility.
Cannons in English castles were initially deployed along the south coast where the Channel ports, essential for English trade and military operations in Europe, were increasingly threatened by French raids. Carisbrooke, Corfe, Dover, Portchester, Saltwood and Southampton Castle received cannon during the late 14th century, small circular "keyhole" gunports being built in the walls to accommodate the new weapons. Carisbrooke Castle was subject to an unsuccessful French siege in 1377, the Crown reacting by equipping the castle with cannon and a mill for producing gunpowder in 1379. Some further English castles along the Welsh borders and Scotland were similarly equipped, with the Tower of London and Pontefract Castle acting as supply depots for the new weapons. In Scotland the first cannon for a castle appears to have been bought for Edinburgh in 1384, which also became an arsenal for the new devices.
15th–16th centuries
Decline of English castles
By the 15th century very few castles were well maintained by their owners. Many royal castles were receiving insufficient investment to allow them to be maintained – roofs leaked, stone work crumbled, lead or wood was stolen. The Crown was increasingly selective about which royal castles it maintained, with others left to decay. By the 15th century only Windsor, Leeds, Rockingham and Moor End were kept up as comfortable accommodation; Nottingham and York formed the backbone for royal authority in the north, and Chester, Gloucester and Bristol forming the equivalents in the west. Even major fortifications such as the castles of North Wales and the border castles of Carlisle, Bamburgh and Newcastle upon Tyne saw funding and maintenance reduced. Many royal castles continued to have a role as the county gaol, with the gatehouse frequently being used as the principal facility.
The ranks of the baronage continued to reduce in the 15th century, producing a smaller elite of wealthier lords but reducing the comparative wealth of the majority. and many baronial castles fell into similar decline. John Leland's 16th-century accounts of English castles are replete with descriptions of castles being "sore decayed", their defences "in ruine" or, where the walls might still be in good repair, the "logginges within" were "decayed". English castles did not play a decisive role during the Wars of the Roses, fought between 1455 and 1485, which were primarily in the form of pitched battles between the rival factions of the Lancastrians and the Yorkists.
Renaissance palaces
The 15th and 16th centuries saw a small number of British castles develop into still grander structures, often drawing on the Renaissance views on architecture that were increasing in popularity on the continent. Tower keeps, large solid keeps used for private accommodation, probably inspired by those in France had started to appear in the 14th century at Dudley and Warkworth. In the 15th century the fashion spread with the creation of very expensive, French-influenced palatial castles featuring complex tower keeps at Wardour, Tattershall and Raglan Castle. In central and eastern England castles began to be built in brick, with Caister, Kirby Muxloe and Tattershall forming examples of this new style. North of the border the construction of Holyrood Great Tower between 1528 and 1532 picked up on this English tradition, but incorporated additional French influences to produce a highly secure but comfortable castle, guarded by a gun park.
Royal builders in Scotland led the way in adopting further European Renaissance styles in castle design. James IV and James V used exceptional one-off revenues, such as the forfeiture of key lands, to establish their power across their kingdom in various ways including constructing grander castles such as Linlithgow, almost invariably by extending and modifying existing fortifications. These Scottish castle palaces drew on Italian Renaissance designs, in particular the fashionable design of a quadrangular court with stair-turrets on each corner, using harling to giving them a clean, Italian appearance. Later the castles drew on Renaissance designs in France, such as the work at Falkland and Stirling Castle. The shift in architectural focus reflected changing political alliances, as James V had formed a close alliance with France during his reign. In the words of architectural historian John Dunbar the results were the "earliest examples of coherent Renaissance design in Britain".
These changes also included shifts in social and cultural beliefs. The period saw the disintegration of the older feudal order, the destruction of the monasteries and widespread economic changes, altering the links between castles and the surrounding estates. Within castles, the Renaissance saw the introduction of the idea of public and private spaces, placing new value on castles having private spaces for the lord or his guests away from public view. Although the elite in Britain and Ireland continued to maintain and build castles in the style of the late medieval period there was a growing understanding through the Renaissance, absent in the 14th century, that domestic castles were fundamentally different from the military fortifications being built to deal with the spread of gunpowder artillery. Castles continued to be built and reworked in what cultural historian Matthew Johnson has described as a "conscious attempt to invoke values seen as being under threat". The results, as at Kenilworth Castle for example, could include huge castles deliberately redesigned to appear old and sporting chivalric features, but complete with private chambers, Italian loggias and modern luxury accommodation.
Although the size of noble households shrank slightly during the 16th century, the number of guests at the largest castle events continued to grow. 2,000 came to a feast at Cawood Castle in 1466, while the Duke of Buckingham routinely entertained up to 519 people at Thornbury Castle at the start of the 16th century. When Elizabeth I visited Kenilworth in 1575 she brought an entourage of 31 barons and 400 staff for a visit that lasted an exceptional 19 days; Leicester, the castle's owner, entertained the Queen and much of the neighbouring region with pageants, fireworks, bear baiting, mystery plays, hunting and lavish banquets. With this scale of living and entertainment the need to find more space in older castles became a major issue in both England and Scotland.
Tower houses
Tower houses were a common feature of British and Irish castle building in the late medieval period: over 3,000 were constructed in Ireland, around 800 in Scotland and over 250 in England. A tower house would typically be a tall, square, stone-built, crenelated building; Scottish and Ulster tower houses were often also surrounded by a barmkyn or bawn, a walled courtyard designed to hold valuable animals securely, but not necessarily intended for serious defence. Many of the gateways in these buildings were guarded with yetts, grill-like doors made out of metal bars. Smaller versions of tower houses in northern England and southern Scotland were known as Peel towers, or pele houses, and were built along both sides of the border regions. In Scotland a number were built in Scottish towns. It was originally argued that Irish tower houses were based on the Scottish design, but the pattern of development of such castles in Ireland does not support this hypothesis.
The defences of tower houses were primarily aimed to provide protection against smaller raiding parties and were not intended to put up significant opposition to an organised military assault, leading historian Stuart Reid to characterise them as "defensible rather than defensive". Gunports for heavier guns were built into some Scottish tower houses by the 16th century but it was more common to use lighter gunpowder weapons, such as muskets, to defend Scottish tower houses. Unlike Scotland, Irish tower houses were only defended with relatively light handguns and frequently reused older arrowloops, rather than more modern designs, to save money.
Analysis of the construction of tower houses has focused on two key driving forces. The first is that the construction of these castles appears to have been linked to periods of instability and insecurity in the areas concerned. In Scotland James IV's forfeiture of the Lordship of the Isles in 1494 led to an immediate burst of castle building across the region and, over the longer term, an increased degree of clan warfare, while the subsequent wars with England in the 1540s added to the level of insecurity over the rest of the century. Irish tower houses were built from the end of the 14th century onward as the countryside disintegrated into the unstable control of a large number of small lordships and Henry VI promoted their construction with financial rewards in a bid to improve security. English tower houses were built along the frontier with Scotland in a dangerous and insecure period. Secondly, and paradoxically, appears to have been the periods of relative prosperity. Contemporary historian William Camden observed of the northern English and the Scots, "there is not a man amongst them of a better sort that hath not his little tower or pile", and many tower houses seem to have been built as much as status symbols as defensive structures. Along the English-Scottish borders the construction pattern follows the relative prosperity of the different side: the English lords built tower houses primarily in the early 15th century, when northern England was particularly prosperous, while their Scottish equivalents built them in late 15th and early 16th centuries, boom periods in the economy of Scotland. In Ireland the growth of tower houses during the 15th century mirrors the rise of cattle herding and the resulting wealth that this brought to many of the lesser lords in Ireland.
Further development of gunpowder artillery
Cannons continued to be improved during the 15th and 16th centuries. Castle loopholes were adapted to allow cannons and other firearms to be used in a defensive role, but offensively gunpowder weapons still remained relatively unreliable. England had lagged behind Europe in adapting to this new form of warfare; Dartmouth and Kingswear Castles, built in the 1490s to defend the River Dart, and Bayard's Cover, designed in 1510 to defend Dartmouth harbour itself, were amongst the few English castles designed in the continental style during the period, and even these lagged behind the cutting edge of European design. Scottish castles were more advanced in this regard, partially as a result of the stronger French architectural influences. Ravenscraig Castle in Scotland, for example, was an early attempt in the 1460s to deploy a combination of "letter box" gun-ports and low-curved stone towers for artillery weapons. These letter box gun-ports, common in mainland Europe, rapidly spread across Scotland but were rarely used in England during the 15th century. Scotland also led the way in adopting the new caponier design for castle ditches, as constructed at Craignethan Castle.
Henry VIII became concerned with the threat of French invasion during 1539 and was familiar with the more modern continental designs. He responded to the threat by building a famous sequence of forts, called the Device Forts or Henrician Castles, along the south coast of England specifically designed to be equipped with, and to defend against, gunpowder artillery. These forts still lacked some of the more modern continental features, such as angled bastions. Each fort had a slightly different design, but as a group they shared common features, with the fortification formed around a number of compact lobes, often in a quatrefoil or trefoil shape, designed to give the guns a 360-degree angle of fire. The forts were usually tiered to allow the guns to fire over one another and had features such as vents to disperse the gunpowder smoke. It is probable that many of the forts were also originally protected by earth bulwarks, although these have not survived. The resulting forts have been described by historian Christopher Duffy as having "an air at once sturdy and festive, rather like a squashed wedding cake".
These coastal defences marked a shift away from castles, which were both military fortifications and domestic buildings, towards forts, which were garrisoned but not domestic; often the 1540s are chosen as a transition date for the study of castles as a consequence. The subsequent years also marked almost the end of indigenous English fortification design – by the 1580s English castle improvements were almost entirely dominated by imported European experts. The superiority of Scottish castle design also diminished; the Half Moon battery built at Edinburgh Castle in 1574, for example, was already badly dated in continental terms by the time it was built. The limited number of modern fortifications built in Ireland, such as those with the first gunports retrofitted to Carrickfergus Castle in the 1560s and at Corkbeg in Cork Harbour and built in the 1570s in fear of an invasion, were equally unexceptional by European standards.
Nonetheless, improved gunpowder artillery played a part in the reconquest of Ireland in the 1530s, where the successful English siege of Maynooth Castle in 1530 demonstrated the power of the new siege guns. There were still relatively few guns in Ireland however and, during the Nine Years' War at the end of the century, the Irish were proved relatively unskilled in siege warfare with artillery used mainly by the English. In both Ireland and Scotland the challenge was how to transport artillery pieces to castle sieges; the poor state of Scottish roads required expensive trains of pack horses, which only the king could afford, and in Ireland the river network had to be frequently used to transport the weapons inland. In these circumstances older castles could frequently remain viable defensive features, although the siege of Cahir Castle in 1599 and the attack on Dunyvaig Castle on Islay in 1614 proved that if artillery could be brought to bear, previously impregnable castle walls might fall relatively quickly.
17th century
Wars of the Three Kingdoms
In 1603 James VI of Scotland inherited the crown of England, bringing a period of peace between the two countries. The royal court left for London and, as a result – with the exceptions of occasional visits, building work on royal castles north of the border largely ceased. Investment in English castles, especially royal castles, declined dramatically. James sold off many royal castles in England to property developers, including York and Southampton Castle. A royal inspection in 1609 highlighted that the Edwardian castles of North Wales, including Conwy, Beaumaris and Caernarfon were "[u]tterlie decayed".; a subsequent inspection of various English counties in 1635 found a similar picture: Lincoln, Kendal, York, Nottingham, Bristol, Queenborough, Southampton and Rochester were amongst those in a state of dilapidation. In 1642 one pamphlet described many English castles as "muche decayed" and as requiring "much provision" for "warlike defence". Those maintained as private homes; such as Arundel, Berkeley, Carlisle and Winchester were in much better condition, but not necessarily defendable in a conflict; while some such as Bolsover were redesigned as more modern dwellings in a Palladian style. A handful of coastal forts and castles, amongst them Dover Castle, remained in good military condition with adequate defences.
In 1642 the English Civil War broke out, initially between supporters of Parliament and the Royalist supporters of Charles I. The war expanded to include Ireland and Scotland, and dragged on into three separate conflicts in England itself. The war was the first prolonged conflict in Britain to involve the use of artillery and gunpowder. English castles were used for various purposes during the conflict. York Castle formed a key part of the city defences, with a military governor; rural castles such as Goodrich could be used a bases for raiding and for control of the surrounding countryside; larger castles, such as Windsor, became used for holding prisoners of war or as military headquarters. During the war castles were frequently brought back into fresh use: existing defences would be renovated, while walls would be "countermured", or backed by earth, in order to protect from cannons. Towers and keeps were filled with earth to make gun platforms, such as at Carlisle and Oxford Castle. New earth bastions could be added to existing designs, such as at Cambridge and Carew Castle and at the otherwise unfortified Basing House the surrounding Norman ringwork was brought back into commission. The costs could be considerable, with the work at Skipton Castle coming to over £1000.
Sieges became a prominent part of the war with over 300 occurring during the period, many of them involving castles. Indeed, as Robert Liddiard suggests, the "military role of some castles in the seventeenth century is out of all proportion to their medieval histories". Artillery formed an essential part of these sieges, with the "characteristic military action" according to military historian Stephen Bull, being "an attack on a fortified strongpoint" supported by artillery. The ratio of artillery pieces to defenders varied considerably in sieges, but in all cases there were more guns than in previous conflicts; up to one artillery piece for every nine defenders was not unknown in extreme cases, such as near Pendennis Castle. The growth in the number and size of siege artillery favoured those who had the resources to purchase and deploy these weapons. Artillery had improved by the 1640s but was still not always decisive, as the lighter cannon of the period found it hard to penetrate earth and timber bulwarks and defences – demonstrated in the siege of Corfe. Mortars, able to lob fire over the taller walls, proved particularly effective against castles – in particular those more compact ones with smaller courtyards and open areas, such as at Stirling Castle.
The heavy artillery introduced in England eventually spread to the rest of the British Isles. Although up to a thousand Irish soldiers who had served in Europe returned during the war, bringing with them experience of siege warfare from the Thirty Years' War in Europe, it was the arrival of Oliver Cromwell's train of siege guns in 1649 that transformed the conflict, and the fate of local castles. None of the Irish castles could withstand these Parliamentary weapons and most quickly surrendered. In 1650 Cromwell invaded Scotland and again his heavily artillery proved decisive.
The Restoration
The English Civil War resulted in Parliament issuing orders to slight or damage many castles, particularly in prominent royal regions. This was particularly in the period of 1646 to 1651, with a peak in 1647. Around 150 fortifications were slighted in this period, including 38 town walls and a great many castles. Slighting was quite expensive and took some considerable effort to carry out, so damage was usually done in the most cost-effective fashion with only selected walls being destroyed. In some cases the damage was almost total, such as Wallingford Castle or Pontefract Castle which had been involved in three major sieges and in this case at the request of the townsfolk who wished to avoid further conflict.
By the time that Charles II was restored to the throne in 1660, the major palace-fortresses in England that had survived slighting were typically in a poor state. As historian Simon Thurley has described, the shifting "functional requirements, patterns of movement, modes of transport, aesthetic taste and standards of comfort" amongst royal circles were also changing the qualities being sought in a successful castle. Palladian architecture was growing in popularity, which sat awkwardly with the typical design of a medieval castle. Furthermore, the fashionable French court etiquette at the time required a substantial number of enfiladed rooms, in order to satisfy court protocol, and it was impractical to fit these rooms into many older buildings. A shortage of funds curtailed Charles II's attempts to remodel his remaining castles and the redesign of Windsor was the only one to be fully completed in the Restoration years.
Many castles still retained a defensive role. Castles in England, such as Chepstow and York Castle, were repaired and garrisoned by the king. As military technologies progressed the costs of upgrading older castles could be prohibitive – the estimated £30,000 required for the potential conversion of York in 1682, approximately £4,050,000 in 2009 terms, gives a scale of the potential costs. Castles played a minimal role in the Glorious Revolution of 1688, although some fortifications such as Dover Castle were attacked by mobs unhappy with the religious beliefs of their Catholic governors, and the sieges of King John's Castle in Limerick formed part of the endgame to the war in Ireland. In the north of Britain security problems persisted in Scotland. Cromwellian forces had built a number of new modern forts and barracks, but the royal castles of Edinburgh, Dumbarton and Stirling, along with Dunstaffnage, Dunollie and Ruthven Castle, also continued in use as practical fortifications. Tower houses were being built until the 1640s; after the Restoration the fortified tower house fell out of fashion, but the weak state of the Scottish economy was such that while many larger properties were simply abandoned, the more modest castles continued to be used and adapted as houses, rather than rebuilt. In Ireland tower houses and castles remained in use until after the Glorious Revolution, when events led to a dramatic shift in land ownership and a boom in the building of Palladian country houses; in many cases using timbers stripped from the older, abandoned generation of castles and tower houses.
18th century
Military and governmental use
Some castles in Britain and Ireland continued to have modest military utility into the 18th century. Until 1745 a sequence of Jacobite risings threatened the Crown in Scotland, culminating in the rebellion in 1745. Various royal castles were maintained during the period either as part of the English border defences, like Carlisle, or forming part of the internal security measures in Scotland itself, like Stirling Castle. Stirling was able to withstand the Jacobite attack in 1745, although Carlisle was taken; the siege of Blair Castle, at the end of the rebellion in 1746, was the final castle siege to occur in the British Isles. In the aftermath of the conflict Corgaff and many others castles were used as barracks for the forces sent to garrison the Highlands. Some castles, such as Portchester, were used for holding prisoners of war during the Napoleonic Wars at the end of the century and were re-equipped in case of a popular uprising during this revolutionary period. In Ireland Dublin Castle was rebuilt following a fire and reaffirmed as the centre of British administrative and military power.
Many castles remained in use as county gaols, run by gaolers as effectively private businesses; frequently this involved the gatehouse being maintained as the main prison building, as at Cambridge, Bridgnorth, Lancaster, Newcastle and St Briavels. During the 1770s the prison reformer John Howard conducted his famous survey of prisons and gaols, culminating in his 1777 work The State of the Prisons. This documented the poor quality of these castle facilities; prisoners in Norwich Castle lived in a dungeon, with the floor frequently covered by an inch of water; Oxford was "close and offensive"; Worcester was so subject to jail fever that the castle surgeon would not enter the prison; Gloucester was "wretched in the extreme". Howard's work caused a shift in public opinion against the use of these older castle facilities as gaols.
Social and cultural use
By the middle of the century medieval ruined castles had become fashionable once again. They were considered an interesting counterpoint to the now conventional Palladian classical architecture, and a way of giving a degree of medieval allure to their new owners. Historian Oliver Creighton suggests that the ideal image of a castle by the 1750s included "broken, soft silhouettes and [a] decayed, rough appearance". In some cases the countryside surrounding existing castles was remodelled to highlight the ruins, as at Henderskelfe Castle, or at "Capability" Brown's reworking of Wardour Castle. Alternatively, ruins might be repaired and reinforced to present a more suitable appearance, as at Harewood Castle. In other cases mottes, such as that at Groby Castle, were reused as the bases for dramatic follies, or alternatively entirely new castle follies could be created; either from scratch or by reusing original stonework, as occurred during the building of Conygar Tower for which various parts of Dunster Castle were cannibalised.
At the same time castles were becoming tourist attractions for the first time. By the 1740s Windsor Castle had become an early tourist attraction; wealthier visitors who could afford to pay the castle keeper could enter, see curiosities such as the castle's narwhal horn, and by the 1750s buy the first guidebooks. The first guidebook to Kenilworth Castle followed in 1777 with many later editions following in the coming decades. By the 1780s and 1790s visitors were beginning to progress as far as Chepstow, where an attractive female guide escorted tourists around the ruins as part of the popular Wye Tour. In Scotland Blair Castle became a popular attraction on account of its landscaped gardens, as did Stirling Castle with its romantic connections. Caernarfon in North Wales appealed to many visitors, especially artists. Irish castles proved less popular, partially because contemporary tourists regarded the country as being somewhat backward and the ruins therefore failed to provide the necessary romantic contrast with modern life.
The appreciation of castles developed as the century progressed. During the 1770s and 1780s the concept of the picturesque ruin was popularised by the English clergyman William Gilpin. Gilpin published several works on his journeys through Britain, expounding the concept of the "correctly picturesque" landscape. Such a landscape, Gilpin argued, usually required a building such as a castle or other ruin to add "consequence" to the natural picture. Paintings in this style usually portrayed castles as indistinct, faintly coloured objects in the distance; in writing, the picturesque account eschewed detail in favour of bold first impressions on the sense. The ruins of Goodrich particularly appealed to Gilpin and his followers; Conwy was, however, too well preserved and uninteresting. By contrast the artistic work of antiquarians James Bentham and James Essex at the end of the century, while stopping short of being genuine archaeology, was detailed and precise enough to provide a substantial base of architectural fine detail on medieval castle features and enabled the work of architects such as Wyatt.
19th century
Military and governmental use
The military utility of the remaining castles in Britain and Ireland continued to diminish. Some castles became regimental depots, including Carlisle Castle and Chester Castle. Carrickfergus Castle was re-equipped with gunports in order to provide coastal defences at the end of the Napoleonic period. Political instability was a major issue during the early 19th century and the popularity of the Chartist movement led to proposals to refortify the Tower of London in the event of civil unrest. In Ireland Dublin Castle played an increasing role in Ireland as Fenian pressures for independence grew during the century.
The operation of local prisons in locations such as castles had been criticised, since John Howard's work in the 1770s, and pressure for reform continued to grow in the 1850s and 1860s. Reform of the legislation surrounding bankruptcy and debt in 1869 largely removed the threat of imprisonment for unpaid debts, and in the process eliminated the purpose of the debtor's prisons in castles such as St Briavels. Efforts were made to regularise conditions in local prisons but without much success, and these failures led to prison reform in 1877 which nationalised British prisons, including prisons at castles like York. Compensation was paid to the former owners, although in cases such as York where the facilities were considered so poor as to require complete reconstruction, this payment was denied. In the short term this led to a 39 per cent reduction in the number of prisons in England, including some famous castle prisons such as Norwich; over the coming years, centralisation and changes in prison design led to the closure of most remaining castle prisons.
Social and cultural use
Many castles saw increased visitors by tourists, helped by better transport links and the growth of the railways. The armouries at the Tower of London opened for tourists in 1828 with 40,000 visitors in their first year; by 1858 the numbers had grown to over 100,000 a year. Attractions such as Warwick Castle received 6,000 visitors during 1825 to 1826, many of them travelling from the growing industrial towns in the nearby Midlands, while Victorian tourists recorded being charged six-pence to wander around the ruins of Goodrich Castle. The spread of the railway system across Wales and the Marches strongly influenced the flow of tourists to the region's castles. In Scotland tourist tours became increasingly popular during the 19th century, usually starting at Edinburgh complete with Edinburgh Castle, and then spending up to two weeks further north, taking advantage of the expanding rail and steamer network. Blair Castle remained popular, but additional castles joined the circuit – Cawdor Castle became popular once the railway line reached north to Fort William.
Purchasing and reading guidebooks became an increasingly important part of visiting castles; by the 1820s visitors could buy an early guidebook at Goodrich outlining the castle's history, the first guidebook to the Tower of London was published in 1841 and Scottish castle guidebooks became well known for providing long historical accounts of their sites, often drawing on the plots of Romantic novels for the details. Indeed, Sir Walter Scott's historical novels Ivanhoe and Kenilworth helped to establish the popular Victorian image of a Gothic medieval castle. Scott's novels set in Scotland also popularised several northern castles, including Tantallon which was featured in Marmion. Histories of Ireland began to stress the role of castles in the rise of Protestantism and "British values" in Ireland, although tourism remained limited.
One response to this popularity was in commissioning the construction of replica castles. These were particularly popular at beginning of the 19th century, and again later in the Victorian period. Design manuals were published offering details of how to recreate the appearance of an original Gothic castles in a new build, leading to a flurry of work, such as Eastnor in 1815, the fake Norman castle of Penrhyn between 1827 and 1837 and the imitation Edwardian castle of Goodrich Court in 1828. The later Victorians built the Welsh Castell Coch in the 1880s as a fantasy Gothic construction and the last such replica, Castle Drogo, was built as late as 1911.
Another response was to improve existing castles, bringing their often chaotic historic features into line with a more integrated architectural aesthetic in a style often termed Gothic Revivalism. There were numerous attempts to restore or rebuild castles so as to produce a consistently Gothic style, informed by genuine medieval details, a movement in which the architect Anthony Salvin was particularly prominent – as illustrated by his reworking of Alnwick and much of Windsor Castle. A similar trend can be seen at Rothesay where William Burges renovated the older castle to produce a more "authentic" design, heavily influenced by the work of the French architect Eugène Viollet-le-Duc. North of the border this resulted in the distinctive style of Scots Baronial Style architecture, which took French and traditional medieval Scottish features and reinvented them in a baroque style. The style also proved popular in Ireland with George Jones' Oliver Castle in the 1850s, for example, forming a good example of the fashion. As with Gothic Revivalism, Scots Baronial architects frequently "improved" existing castles: Floors Castle was transformed in 1838 by William Playfair who added grand turrets and cupolas. In a similar way the 16th-century tower house of Lauriston Castle was turned into the Victorian ideal of a "rambling medieval house". The style spread south and the famous architect Edward Blore added a Scots Baronial touch to his work at Windsor.
With this pace of change concerns had begun to grow by the middle of the century about the threat to medieval buildings in Britain, and in 1877 William Morris established the Society for the Protection of Ancient Buildings. One result of public pressure was the passing of the Ancient Monuments Protection Act 1882, but the provisions of the act focused on unoccupied prehistoric structures and medieval buildings such as castles were exempted from it leaving no legal protection.
20th–21st century
1900–1945
During the first half of the century several castles were maintained, or brought back into military use. During the Irish War of Independence Dublin Castle remained the centre of the British administration, military and intelligence operations in Ireland until the transfer of power and the castle to the Irish Free State in 1922. During the Second World War the Tower of London was used to hold and execute suspected spies, and was used to briefly detain Rudolf Hess, Adolf Hitler's deputy, in 1941. Edinburgh Castle was used as a prisoner of war facility, while Windsor Castle was stripped of more delicate royal treasures and used to guard the British royal family from the dangers of the Blitz. Some coastal castles were used to support naval operations: Dover Castle's medieval fortifications used as basis for defences across the Dover Strait; Pitreavie Castle in Scotland was used to support the Royal Navy; and Carrickfergus Castle in Ireland was used as a coastal defence base. Some castles, such as Cambridge and Pevensey, were brought into local defence plans in case of a German invasion. A handful of these castles retained a military role after the war; Dover was used as a nuclear war command centre into the 1950s, while Pitreavie was used by NATO until the turn of the 21st century.
The strong cultural interest in British castles persisted in the 20th century. In some cases this had destructive consequences as wealthy collectors bought and removed architectural features and other historical artefacts from castles for their own collections, a practice that produced significant official concern. Some of the more significant cases included St Donat's Castle, bought by William Randolph Hearst in 1925 and then decorated with numerous medieval buildings removed from their original sites around Britain, and the case of Hornby, where many parts of the castle were sold off and sent to buyers in the United States. Partially as a result of these events, increasing legal powers were introduced to protect castles – acts of parliament in 1900 and 1910 widened the terms of the earlier legislation on national monuments to allow the inclusion of castles. An act of Parliament in 1913 introduced preservation orders for the first time and these powers were extended in 1931. Similarly, after the end of the Irish Civil War, the new Irish state took early action to extend and strengthen the previous British legislation to protect Irish national monuments.
Around the beginning of the century there were a number of major restoration projects on British castles. Before the outbreak of the First World War work was undertaken at Chepstow, Bodiam, Caernarfon and Tattershal; after the end of the war various major state funded restoration projects occurred in the 1920s with Pembroke, Caerphilly and Goodrich amongst the largest of these. This work typically centred on cutting back the vegetation encroaching on castle ruins, especially ivy, and removing damaged or unstable stonework; castles such as Beaumaris saw their moats cleaned and reflooded. Some castles such as Eilean Donan in Scotland were substantially rebuilt in the inter-war years. The early UK film industry took an interest in castles as potential sets, starting with Ivanhoe filmed at Chepstow Castle in 1913 and starring US leading actor King Baggot.
1945–21st century
After the Second World War picturesque ruins of castles became unfashionable. The conservation preference was to restore castles so as to produce what Oliver Creighton and Robert Higham have described as a "meticulously cared for fabric, neat lawns and [a] highly regulated, visitor-friendly environment", although the reconstruction or reproduction of the original appearance of castles was discouraged. As a result, the stonework and walls of today's castles, used as tourist attractions, are usually in much better condition than would have been the case in the medieval period. Preserving the broader landscapes of the past also rose in importance, reflected in the decision by the UNESCO World Heritage Site programme to internationally recognise several British castles including Beaumaris, Caernarfon, Conwy, Harlech, Durham and the Tower of London as deserving of special international cultural significance in the 1980s.
The single largest group of English castles are now those owned by English Heritage, created out of the former Ministry of Works in 1983. The National Trust increasingly acquired castle properties in England in the 1950s, and is the second largest single owner, followed by the various English local authorities and finally a small number of private owners. Royal castles such as the Tower of London and Windsor are owned by the Occupied Royal Palaces Estate on behalf of the nation. Similar organisations exist in Scotland, where the National Trust for Scotland was established 1931, and in Ireland, where An Taisce was created in 1948 to working alongside the Irish Ministry of Works to maintain castles and other sites. Some new organisations have emerged in recent years to manage castles, such as the Landmark Trust and the Irish Landmark Trust, which have restored a number of castles in Britain and Ireland over the last few decades.
Castles remain highly popular attractions: in 2018 nearly 2.9 million people visited the Tower of London, 2.1 million visited Edinburgh Castle, 466,000 visited Leeds Castle and 365,000 visited Dover Castle. Ireland, which for many years had not exploited the tourist potential of its castle heritage, began to encourage more tourists in the 1960s and 1970s and Irish castles are now a core part of the Irish tourist industry. British and Irish castles are today also closely linked to the international film industry, with tourist visits to castles now often involving not simply a visit to a historic site, but also a visit to the location of a popular film.
The management and handling of Britain's historic castles has at times been contentious. Castles in the late 20th and early 21st century are usually considered part of the heritage industry, in which historic sites and events are commercially presented as visitor attractions. Some academics, such as David Lowenthal, have critiqued the way in which these histories are constantly culturally and socially reconstructed and condemned the "commercial debasement" of sites such as the Tower of London. The challenge of how to manage these historic properties has often required very practical decisions. At one end of the spectrum owners and architects have had to deal with the practical challenges of repairing smaller decaying castles used as private houses, such as that at Picton Castle where damp proved a considerable problem. At the other end of the scale the fire at Windsor Castle in 1992 opened up a national debate about how the burnt-out castle wing should be replaced, the degree to which modern designs should be introduced and who should pay the £37 million costs (£50.2 million in 2009 terms). At Kenilworth the speculative and commercial reconstruction of the castle gardens in an Elizabethan style led to a vigorous academic debate over the interpretation of archaeological and historical evidence. Trends in conservation have altered and, in contrast to the prevailing post-war approach to conservation, recent work at castles such as Wigmore, acquired by English Heritage in 1995, has attempted to minimise the degree of intervention to the site.
Historiography
The earliest histories of British and Irish castles were recorded, albeit in a somewhat fragmented fashion, by John Leland in the 16th century and, by the 19th century, historical analysis of castles had become popular. Victorian historians such as George Clark and John Parker concluded that British castles had been built for the purposes of military defence, but believed that their history was pre-Conquest – concluding that the mottes across the countryside had been built by either the Romans or Celts.
The study of castles by historians and archaeologists developed considerably during the 20th century. The early-20th-century historian and archaeologist Ella Armitage published a ground-breaking book in 1912, arguing convincingly that British castles were in fact a Norman introduction, while historian Alexander Thompson also published in the same year, charting the course of the military development of English castles through the Middle Ages. The Victoria County History of England began to document the country's castles on an unprecedented scale, providing an additional resource for historical analysis.
After the Second World War the historical analysis of British castles was dominated by Arnold Taylor, R. Allen Brown and D. J. Cathcart King. These academics made use of a growing amount of archaeological evidence, as the 1940s saw an increasing number of excavations of motte and bailey castles, and the number of castle excavations as a whole went on to double during the 1960s. With an increasing number of castle sites under threat in urban areas, a public scandal in 1972 surrounding the development of the Baynard's Castle site in London contributed to reforms and a re-prioritisation of funding for rescue archaeology. Despite this the number of castle excavations fell between 1974 and 1984, with the archaeological work focusing on conducting excavations on a greater number of small-scale, but fewer large-scale sites. The study of British castles remained primarily focused on analysing their military role, however, drawing on the evolutionary model of improvements suggested by Thompson earlier in the century.
In the 1990s a wide-reaching reassessment of the interpretation of British castles took place. A vigorous academic discussion over the history and meanings behind Bodiam Castle began a debate, which concluded that many features of castles previously seen as primarily military in nature were in fact constructed for reasons of status and political power. As historian Robert Liddiard has described it, the older paradigm of "Norman militarism" as the driving force behind the formation of Britain's castles was replaced by a model of "peaceable power". The next twenty years was characterised by an increasing number of major publications on castle studies, examining the social and political aspects of the fortifications, as well as their role in the historical landscape. Although not unchallenged, this "revisionist" perspective remains the dominant theme in the academic literature today.
Notes
References
Bibliography
Abels, Richard Philip and Bernard S. Bachrach. (eds) (2001) The Normans and their Adversaries at War. Woodbridge, UK: Boydell.
Amt, Emilie. (1993) The Accession of Henry II in England: royal government restored, 1149–1159. Woodbridge, UK: Boydell Press.
Andrews, Malcolm. (1989) The Search for the Picturesque. Stanford, US: Stanford University Press.
Armitage, Ella S. (1912) The Early Norman Castles of the British isles. London: J. Murray. OCLC 458514584
Bailey, Elaine. (2003) "Building for growth", in Fairweather and McConville (eds) (2003)
Barry, Terry. (1995) "The Last Frontier: Defence and Settlement in Late Medieval Ireland", in Barry, Frame and Simms (eds) (1995)
Barry, Terry, Robin Frame and Katharine Simms. (eds) (1995) Colony and Frontier in Medieval Ireland: Essays Presented to J.F. Lydon. London: Hambledon Press.
Bartlett, Thomas. (2010) Ireland: A History. Cambridge: Cambridge University Press.
Bradbury, Jim. (2009) Stephen and Matilda: the Civil War of 1139–53. Stroud, UK: The History Press.
Brindle, Steven and Kerr, Brian. (1997) Windsor Revealed: New light on the history of the castle. London: English Heritage.
Brown, James Baldwin. (1823) Memoirs of the Public and Private Life of John Howard, the Philanthropist. London: T. and G. Underwood. OCLC 60719334
Brown, R. Allen. (1962) English Castles. London: Batsford. OCLC 1392314
Bruce, David M. (2010) "Baedeker – the Perceived 'Inventor' of the Formal Guidebook: a Bible for Travellers in the 19th Century", in Butler and Russell (eds) (2010)
Bull, Stephen. (2008) "The Furie of the Ordnance": Artillery in the English Civil Wars. Woodbridge UK: Boydell Press.
Butler, Richard and Rosylyn A. Russell (eds) (2010) Giants of Tourism. Wallingford, UK: CAB.
Butler, Lawrence. (1997) Clifford's Tower and the Castles of York. London: English Heritage.
Carpenter, David. (2004) The Struggle for Mastery: The Penguin History of Britain 1066–1284. London: Penguin.
Clark, Geo. T. (1874) "The Defences of York", in The Archaeological Journal, XXXI (1874)
Clark, Geo. T. (1884) Medieval Military Architecture. London: Wyman & Sons. OCLC 2600376/
Cooper, Thomas Parsons. (1911) The History of the Castle of York, from its Foundation to the Current Day with an Account of the Building of Clifford's Tower. London: Elliot Stock. OCLC 59345650
Cottrell, Peter. (2006) The Anglo-Irish War: The Troubles of 1913–1922. Botley, UK: Osprey Publishing.
Coulson, Charles. (1994) "The Castles of the Anarchy", in King (ed) (1994)
Coulson, Charles. (2003) Castles in Medieval Society: Fortresses in England, France, and Ireland in the Central Middle Ages. Oxford: Oxford University Press,
Creighton, Oliver Hamilton and Robert Higham. (2003) Medieval Castles. Princes Risborough, UK: Shire Publications.
Creighton, Oliver Hamilton. (2005) Castles and Landscapes: Power, Community and Fortification in Medieval England. London: Equinox.
Cruickshanks, Eveline. (ed) (2009) The Stuart Courts. Stroud, UK: The History Press.
Curnow, P.E. and E.A. Johnson. (1985) "St Briavels Castle", in Chateau Gaillard: études de castellologie médiévale. Caen: Centre de Recherches Archéologiques Médiévales.
Danziger, Danny and John Gillingham. (2003) 1215: The Year of the Magna Carta. London: Coronet Books.
Delafons, John. (1997) Politics and Preservation: a policy history of the built heritage, 1882–1996. London: Chapman and Hall.
Dobres, Marcia-Anne and John E. Robb. (eds) (2000) Agency in Archaeology. London: Routledge.
Duffy, Christopher. (1997) Siege Warfare: The Fortress in the Early Modern World, 1494–1660. London: Routledge.
Dunbar, John G. (1999) Scottish Royal Palaces: the Architecture of the Royal Residences during the Late Medieval and Early Renaissance Periods. East Lothian, UK: Tuckwell Press.
Eales, Richard. (2003) "Royal power and castles in Norman England", in Liddiard (ed) (2003a)
Eales, Richard. (2006) Peveril Castle. London: English Heritage.
Eltis, David. The Military Revolution in Sixteenth-Century Europe. London: Tauris.
Emery, Anthony. (1996) Greater Medieval Houses of England and Wales, 1300–1500: Northern England. Cambridge: Cambridge University Press. .
Emery, Anthony. (2006) Greater Medieval Houses of England and Wales, 1300–1500: Southern England. Cambridge: Cambridge University Press.
Fairweather, Leslie and Seán McConville. (eds) (2003) Prison Architecture: Policy, Design, and Experience. Oxford: Architectural Press.
Fielding, Theodore Henry. (1825) British castles: or, a compendious history of the ancient military structures of Great Britain. London: Rowlett and Brimmer. OCLC 6049730
Fox, Lionel. (2001) The English Prison and Borstal Systems: an account of the prison and Borstal systems. London: Routledge.
Gerrard, Christopher M. (2003) Medieval Archaeology: Understanding Traditions and Contemporary Approaches. London: Routledge.
Glendinning, Miles, Ranald MacInnes and Aonghus MacKechnie. (2002) A History of Scottish Architecture: from the Renaissance to the Present Day. Edinburgh: Edinburgh University Press. .
Gilmour, Tony. (2007) Sustaining Heritage: giving the past a future. Sydney: Sydney University Press. .
Gomme, Andor and Alison Maguire. (2008) Design and Plan in the Country House: from castle donjons to Palladian boxes. Yale: Yale University Press.
Goodrich, Samuel Griswold. (2005) Recollections of a Lifetime Or Men and Things I Have Seen in a Series of Familiar Letters to a Friend. Kessinger.
Gravett, Christopher and Adam Hook. (2003) Norman Stone Castles: The British Isles, 1066–1216. Botley, UK: Osprey.
Greene, Kevin and Tom Moore. (2010) Archaeology: An Introduction. Abingdon, UK: Routledge.
Grenier, Katherine Haldane. (2005) Tourism and Identity in Scotland, 1770–1914: Creating Caledonia. Aldershot, UK: Ashgate.
Harding, Christopher, Bill Hines, Richard Ireland and Philip Rawlings. (1985) Imprisonment in England and Wales: a Concise History. Beckenham, UK: Croon Helm.
Harrington, Peter. (2003) English Civil War Fortifications 1642–51. Oxford, UK: Osprey Publishing.
Harrington, Peter. (2007) The Castles of Henry VIII. Oxford, UK: Osprey Publishing.
Harris, John. (2007) Moving Rooms: the Trade in Architectural Salvages. Yale: Yale University Press.
Hassard, John Rose Greene. (1881) A Pickwickian Pilgrimage. Boston: Osgood. OCLC 3217047.
Hayton, David. (2004) Ruling Ireland, 1685–1742: politics, politicians and parties. Woodbridge, UK: Boydell Press. .
Hearne, Thomas. (1711) The itinerary of John Leland the Antiquary. Oxford: The Theatre. OCLC 655596199
House of Commons Public Accounts Committee. (2009) Maintaining the Occupied Royal Palaces: twenty-fourth report of session 2008–09, report, together with formal minutes, oral and written evidence. London: The Stationery Office.
Hull, Lise E. (2006) Britain's Medieval Castles. Westport: Praeger.
Hull, Lise E. and Whitehorne, Stephen. (2008) Great Castles of Britain & Ireland. London: New Holland Publishers.
Hull, Lise E. (2009) Understanding the Castle Ruins of England and Wales: How to Interpret the History and Meaning of Masonry and Earthworks. Jefferson, US: MacFarland.
Hulme, Richard. (2008) "Twelfth Century Great Towers – The Case for the Defence," The Castle Studies Group Journal, No. 21, 2007–8.
Huscroft, Richard. (2005) Ruling England, 1042–1217. Harlow: Pearson. .
Impey, Edward and Geoffrey Parnell. (2000) The Tower of London: The Official Illustrated History. London: Merrell Publishers.
Insall, Donald. (2008) Living Buildings: architectural conservation : philosophy, principles and practice. Victoria, Australia: Images Publishing.
Janssens, G. A. M. and Flor Aarts. (eds) (1984) Studies in Seventeenth-Century English Literature, History, and Bibliography. Amsterdam: Rodopi.
Johnson, Matthew. (2000) "Self-made men and the staging of agency", in Dobres and Robb (eds) 2000
Johnson, Matthew. (2002) Behind the castle gate: from Medieval to Renaissance. Abingdon, UK: Routledge.
Jones, Nigel R. (2005) Architecture of England, Scotland, and Wales. Westport, US: Greenwood Publishing.
King, D. J. Cathcart. (1991) The Castle in England and Wales: An Interpretative History. London: Routledge.
King, Edmund. (ed) (1994) The Anarchy of King Stephen's Reign. Oxford: Oxford University Press.
Lenihan, Pádraig. (2001) "Conclusion: Ireland's Military Revolution(s)", in Lenihan (ed) (2001)
Lenihan, Pádraig. (ed) (2001) Conquest and Resistance: War in Seventeenth-Century Ireland. Leiden, Netherlands: BRILL.
Liddiard, Robert. (ed) (2003a) Anglo-Norman Castles. Woodbridge, UK: Boydell Press. .
Liddiard, Robert (2003b) "Introduction", in Liddiard (ed) (2003a)
Liddiard, Robert. (2005) Castles in Context: Power, Symbolism and Landscape, 1066 to 1500. Macclesfield, UK: Windgather Press.
Lowenthal, David. (1985) The Past is a Foreign Country. Cambridge: Cambridge University Press.
Lowenthal, David. (1996) Possessed by the Past: the heritage industry and the spoils of history. New York: Free Press.
Lowry, Bernard. Discovering Fortifications: From the Tudors to the Cold War. Risborough, UK: Shire Publications.
Mackenzie, James D. (1896) The Castles of England: Their Story and Structure, Vol II. New York: Macmillan. OCLC 504892038
Mackworth-Young, Robin. (1992) The History and Treasures of Windsor Castle. Andover, UK: Pitkin.
Mallgrave, Harry Francis. (2005) Modern Architectural Theory: a Historical Survey, 1673–1968. Cambridge: Cambridge University Press.
McConville, Seán. (1995) English Local Prisons, 1860–1900: Next Only to Death. London: Routledge.
McNeill, Tom. (2000) Castles in Ireland: Feudal Power in a Gaelic World. London: Routledge.
Morris, Richard K. (1998) "The Architecture of Arthurian Enthusiasm: Castle Symbolism in the Reigns of Edward I and his Successors", in Strickland (ed) (1998)
Morris, Richard K. (2010) Kenilworth Castle. London: English Heritage.
Musty, A. E. S. (2007) Roaring Meg: Test Firing a Copy of Colonel Birch's Civil War Mortar. Hereford, UK: Archaeological and Archival, with Mainmast Conservation.
Mynors, Charles. (2006) Listed Buildings, Conservation Areas and Monuments. London: Sweet and Maxwell.
Nicolson, Adam. (1997) Restoration: The Rebuilding of Windsor Castle. London: Michael Joseph.
O'Dwyer, Frederick. (1997) The Architecture of Deane and Woodward. Cork, Ireland: Cork University Press. .
Omar, Paul J. (ed) (2008) International insolvency law: themes and perspectives. London: Ashgate.
Parker, John Henry. (1882) Some account of domestic architecture in England from Edward I to Richard II. Oxford: J. H. Parker. OCLC 11791317
Pettifer, Adrian. (2000) Welsh Castles: a Guide by Counties. Woodbridge, UK: Boydell Press.
Pettifer, Adrian. (2002) English Castles: a Guide by Counties. Woodbridge, UK: Boydell Press.
Prestwich, Michael. (2001) "The Garrisoning of English Medieval Castles", in Abels and Bachrach (eds) (2001)
Pounds, Norman John Greville. (1994) The Medieval Castle in England and Wales: a social and political history. Cambridge: Cambridge University Press.
Purton, Peter. (2009) A History of the Early Medieval Siege, c.450–1200. Woodbridge, UK: Boydell Press.
Prestwich, Michael. (1988) Edward I. Berkeley and Los Angeles: University of California Press. .
Rakoczy, Lila. (2007) Archaeology of destruction: a reinterpretation of castle slightings in the English Civil War. York: University of York (PhD thesis)
Rajak, Harry. (2008) "The culture of bankruptcy", in Omar (ed) (2008)
Reid, Stuart. (2006) Castles and Tower Houses of the Scottish Clans, 1450–1650. Botley, UK: Osprey Publishing.
Robinson, John Martin. (2010) Windsor Castle: the Official Illustrated History. London: Royal Collection Publications.
Rowse, Alfred Leslie. (1974) Windsor Castle in the History of the Nation. London: Book Club Associates.
Rudge, Thomas. (1803) The history of the county of Gloucester brought down to the year 1803. Gloucester, UK: Harris. OCLC 260199931
Ryan, Chris. (2003) Recreational Tourism: Demand and Impacts. Clevedon, UK: Channel View Publications.
Scott-Garrett, C. "Littledean Camp," in Transactions of the Bristol and Gloucestershire Archaeological Society, 1958, Vol. 77
Shawcross, William. (2009) Queen Elizabeth: the Queen Mother: the official biography. London: Macmillan.
Simpson, Grant G. and Bruce Webster. (2003) "Charter Evidence and the Distribution of Mottes in Scotland", in Liddiard (ed) (2003a)
Stell, Geoffrey. (2000) "War-damaged Castles: the evidence from Medieval Scotland", in Chateau Gaillard: Actes du colloque international de Graz (Autriche), 22–29 août 1998. Caen, France: Publications du CRAHM.
Strickland, Matthew. (ed) (1998) Armies, Chivalry and Warfare in Medieval England and France. Stamford, UK: Paul Watkins. .
Stokstad, Marilyn. (2005) Medieval Castles. Westport, US: Greenwood Press.
Tabraham, Chris J. (2004) Edinburgh Castle: Prisons of War. Historic Scotland.
Tabraham, Chris J. (2005) Scotland's Castles. London: Batsford.
Tabraham, Chris J. and Doreen Grove. (2001) Fortress Scotland and the Jacobites. London: Batsford.
Taylor, Arnold. (1989) Caernarfon Castle. Cardiff, UK: Cadw.
Thompson, Alexander. (1912) Military Architecture in England during the Middle Ages. London: H. Frowde. OCLC 458292198.
Thompson, M. W. (1991) The Rise of the Castle. Cambridge: Cambridge University Press.
Thurley, Simon. (2009) "A Country Seat Fit For a King: Charles II, Greenwich and Winchester", in Cruickshanks (ed) 2009.
Timbs, John and Alexander Gunn. (2008) Abbeys, Castles and Ancient Halls of England and Wales: Their Legendary Lore and Popular History, Volume 3. Alcester, UK: Read Books.
Tite, Catherine. (2010) Portraiture, Dynasty and Power: Art Patronage in Hanoverian Britain, 1714–1759. Amherst, US: Cambria Press.
Toy, Sidney. (1933) "The round castles of Cornwall", in Archaeologia 83 (1933)
Toy, Sidney. (1985) Castles: Their Construction and History. New York: Dover Publications.
Turner, Ralph V. (2009) King John: England's Evil King? Stroud, UK: History Press.
Turner, Rick. (2006) Chepstow Castle. Cardiff, UK: Cadw.
Walker, David. (1991) "Gloucestershire Castles," in Transactions of the Bristol and Gloucestershire Archaeological Society, 1991, Vol. 109
West, T. W. (1985) Discovering Scottish Architecture. Aylesbury, UK: Shire Publications.
Whyte, Ian D. and Kathleen A. Whyte. (1991) The Changing Scottish Landscape, 1500–1800. London: Routledge.
Wiener, Martin J. (1994) Reconstructing the Criminal: Culture, Law, and Policy in England, 1830–1914. Cambridge: Cambridge University Press.
Williams, J. Anthony. (1984) "No-Popery Violence in 1688- Revolt in the provinces", in Janssens and Aarts (eds) (1984)
Williams, William H. A. (2008) Tourism, Landscape, and the Irish character: British Travel Writers in Pre-Famine Ireland. Wisconsin: Wisconsin University Press.
Zuelow, Eric. (2009) Making Ireland Irish: Tourism and National Identity since the Irish Civil War. New York: Syracuse University Press. .
Further reading
Dempsey, Karen; Gilchrist, Roberta; Ashbee, Jeremy; Sagrott, Stefan; Stones, Samantha (2019), "Beyond the martial façade: gender, heritage and medieval castles", International Journal of Heritage Studies, .
Goodall, John (2011), The English Castle, New Haven: Yale University Press.
Higham, Robert; Barker Philip A. (1992), Timber Castles, London: Batsford.
Marshall, Pamela (2002), "The ceremonial Function of the Donjon in the Twelfth Century", Château Gaillard. Etudes de castellologie médiévale, 20: 141–151.
McNeill, Tom (1997), Castles in Ireland: Feudal Power in a Gaelic World, London: Routledge.
Speight, Sarah (2000), "Castle warfare in the Gesta Stephani", Château Gaillard. Etudes de castellologie médiévale, 19: 269–274.
Wheatley, Abigail (2004), The Idea of the Castle in Medieval England, York: York Medieval Press.
External links
Cadw
English Heritage
The National Trust
The National Trust for Scotland
An Taisce, the National Trust for Ireland
The Castle Studies Group
A photo record of Castles in England, Scotland, Wales and Ireland
Category:Castles in Ireland
Category:Articles containing video clips
Castles |
Q:
find, save and remove duplicate values from more then one array
first array
[0]=> Brian
[1]=> A
[2]=> Leo
[3]=> A
[4]=> Mike
second array
[0]=> 1
[1]=> 2
[2]=> 3
[3]=> 4
[4]=> 5
I want to check if in first array there are duplicates, if yes, save only the first occurrence of that value, the other removes, remember those keys, and delete them from the second array too. In the end i want to have
first array
[0]=> Brian
[1]=> A
[2]=> Leo
[3]=> Mike
second array
[0]=> 1
[1]=> 2
[2]=> 3
[3]=> 5
I tried with this but second array does not have duplicates so it won't work for both array:
array_values(array_unique($array));
A:
You did
array_values(array_unique($array));
This will give unique values of $array, but you won't find which index of second array needs to be unset.
Approach #1:
Your best shot is a simple for loop with an isset check. If we find the value already present in our $set(a new temp array), we unset that index from both original arrays, else we preserve it.
Snippet:
<?php
$arr1 = [
'Brian',
'A',
'Leo',
'A',
'Mike'
];
$arr2 = [
1,2,3,4,5
];
$set = [];
foreach($arr1 as $key => $value){
if(!isset($set[$value])) $set[$value] = true;
else{
unset($arr1[$key]); // foreach creates a copy of $arr1, so safe to unset
unset($arr2[$key]);
}
}
print_r($arr1);
print_r($arr2);
Demo: https://3v4l.org/BQ9mA
Approach #2:
If you don't like for loops, you can use array wrappers to do this. You can use array_combine to make first array values as keys and second array values as arrays. Note that this would only preserve the latest key value pairs, so we do a array_reverse to only maintain first occurrence pairs.
Snippet:
<?php
$arr1 = [
'Brian',
'A',
'Leo',
'A',
'Mike'
];
$arr2 = [
1,2,3,4,5
];
$filtered_data = array_combine(array_reverse($arr1),array_reverse($arr2));
print_r(array_keys($filtered_data));
print_r(array_values($filtered_data));
Demo: https://3v4l.org/mlstg
|
Your Cheats
All Cheats - Latest First
Drumstick HoldingAdded 20 Dec 2008, ID #3665
If you're a real drummer and it's your first time playing or you're not used to holding the drumsticks the real way for real drums , hold them differently.Playing the "real" way dosen't feel right on rockband.You'll find a way to hold it.
In the menu screen where it says Rockband in big letters , push red, then yellow, then blue. Then push red, red, followed by blue lue, blue and then red, yellow,blue again. Do this quickly and the screen will say that all songs are unlocked. Warning, this fades away when the xbox is turned off and you cannot save the game when it is in use! Have fun
This is a good little trick if you don't want to lose fans in Band World Tour when your band fails a song. Unplug one of your wired instruments and using a different instrument controller select 'Return to Main Menu' so you exit out of your career and return to the Main menu. When you now resume your Band career you won't have lost any fans. |
// Copyright (c) Microsoft. All rights reserved.
// Licensed under the MIT license. See LICENSE file in the project root for full license information.
using Microsoft.Protocols.TestTools.StackSdk.Asn1;
namespace Microsoft.Protocols.TestTools.StackSdk.ActiveDirectory.Adts.Asn1CodecV3
{
/*
MessageID ::= INTEGER (0 .. maxInt)
*/
[Asn1IntegerBound(Max = 2147483647L, Min = 0)]
public class MessageID : Asn1Integer
{
public MessageID()
: base()
{
}
public MessageID(long? val)
: base(val)
{
}
}
}
|
Pivotal Pathogenic and Biomarker Role of Chlamydia Pneumoniae in Neurovascular Diseases.
Chlamydia Pneumoniae (C. Pn) is an obligatory intracellular bacterium that is associated with respiratory tract infections like pneumonia, pharyngitis and bronchitis. It has also been implicated in cerebrovascular (stroke) as well as cardiovascular diseases. The most possible pathway via which C. Pn elicits its pathogenesis could be via activation of Human Vascular Smooth Muscle Cells (VSMCs) proliferation resulting in the stimulation of Toll-Like Receptor-4 (TLR-4) and/or phospho-44/42(p44/p42) Mitogen-Activated Protein Kinases (MAPK). It is also established that tyrosine phosphorylation of IQ domain GTPase-activating protein 1 (IQGAP1) also contributed to C. Pn infection-triggered Vascular Endothelial Cell (VEC) movements via the SRC tyrosine kinase inhibitor PP2 (4-amino-5-(4-chlorophenyl)-7-(t-butyl)pyrazolo[3,4-d]pyrimidine) resulting in angiogenesis. It is also proven that restricted inflammatory cell infiltrates as well as apoptosis have been linked to C. Pn or C. Pn-specific proteins in atherosclerotic plaques of patients with stroke. It is further an evidence that C. Pn enters the cerebral vasculature during the initial infection and worsen atherosclerosis either directly or indirectly. Chronic, persistent C. Pn infection is also capable of triggering the secretion of Chlamydial Heat Shock Protein 60 (cHSP60) in the vessel wall resulting in augmentation of inflammation. C. Pn also aids in the activation of explicit cell-intermediated immunity within plaques. Macrophages in the carotid plaques co-exist with CD4+ lymphocytes which are capable of triggering the release of pro-inflammatory cytokines resulting in the augmentation of atherogenic development during C. Pn infection. C. Pn actively participated in the modification of both histones H3 and H4 during chromatin analysis via the interleukin 8(IL-8) gene facilitator as well as conscription of nuclear factor kappa-B(NF-κB) or NF- κB/p65 complex and polymerase II (Pol II). This review, therefore, focuses on the crucial involvement of C. Pn in the pathogenesis of cerebrovascular events. |
Predictive value of interferon-γ release assays and tuberculin skin testing for progression from latent TB infection to disease state: a meta-analysis.
Given the current lack of effective vaccines against TB, the accuracy of screening tests for determining or excluding latent TB infection (LTBI) is decisive in effective TB control. This meta-analysis critically appraises studies investigating the positive and the negative predictive value (PPV and NPV, respectively) from a test-determined LTBI state for progression to active TB of interferon-γ release assays (IGRAs) and the tuberculin skin test (TST). We searched MEDLINE, EMBASE, and Cochrane bibliographies for relevant articles. After qualitative evaluation, the PPV and NPV for progression of commercial and “in-house” IGRAs and the TST for persons not receiving preventive treatment in the context of the respective IGRA studies were pooled using both a fixed and a random-effect model. Weighted rates were calculated for all study populations and for groups solely at high risk of TB development. The pooled PPV for progression for all studies using commercial IGRAs was 2.7% (95% CI, 2.3%-3.2%) compared with 1.5% (95% CI, 1.2%-1.7%) for the TST (P < .0001). PPV increased to 6.8% (95% CI, 5.6%-8.3%) and 2.4% (95% CI, 1.9%-2.9%) for the IGRAs and the TST, respectively, when only high-risk groups were considered (P < .0001). Pooled values of NPV for progression for both IGRAs and the TST were very high, at 99.7% (95% CI, 99.5%-99.8%) and 99.4% (95% CI, 99.2%-99.5%), respectively, although they were significantly higher for IGRAs (P < .01). Commercial IGRAs have a higher PPV and NPV for progression to active TB compared with those of the TST, especially when performed in high-risk persons. |
H.D. Chalke
Herbert Davis Chalke OBE (Mil), TD, FRCP, MRCS, MA (Cantab) (June 15, 1897—October 8, 1979) was a British physician known for his work in the fields of social medicine and medical history. He was the founding editor-in-chief of the medical journal Alcohol and Alcoholism.
Biography
Chalke was educated at Porth County School, the University of Wales, Cambridge University, and St. Bartholomew's Hospital. He later served in the Royal Flying Corps during part of World War I and all of World War II, retiring as a colonel. In the 1930s, the King Edward VII Welsh National Memorial Association appointed him to study tuberculosis mortality in Wales. He played a major role in a campaign to control a typhus epidemic in Naples, Italy during the 1940s, for which he received the Typhus Commission Medal from the United States government.
He is survived by his son David John Chalke, now a leading social analyst in Australia.
References
External links
Wellcome Library page
Category:1897 births
Category:1979 deaths
Category:20th-century British medical doctors
Category:Medical journal editors
Category:Alumni of the University of Wales
Category:Researchers in alcohol abuse
Category:Alumni of the University of Cambridge
Category:British medical historians |
Q:
Unable to toggle button click event on AJAX request
<div class=" pull-right">
<?php if ($placement['placementStatus'] == Campaign::STATUS_IN_PROGRESS): ?>
<a class="pausebtn btn btn-small" onclick="pausePlacement($(this), '<?=$placement['placementTag']?>');" href="#"><i class="elusive-pause"></i></a>
<?php else: ?>
<a class="startbtn btn btn-small" onclick="startPlacement($(this), '<?=$placement['placementTag']?>');" href="#" ><i class="elusive-play"></i></a>
<?php endif; ?>
<a class="trashbtn btn btn-small" onclick="deletePlacement($(this), '<?=$placement['adId']?>');" href="#"><i class="elusive-trash"></i></a>
</div>
function pausePlacement(el, placementTag) {
$.ajax({
url: '/campaign/pausePlacement/' + campaignId + '/' + placementTag,
dataType: 'json',
type: 'GET',
success: function(data) {
if(data.responsecode != '1') {
bootbox.alert(data.validationerror);
} else {
el.html('<i class="elusive-play">');
el.off('click').on('click', function() {
startPlacement(el, placementTag);
});
}
}
});
}
function startPlacement(el, placementTag) {
$.ajax({
url: '/campaign/startPlacement/' + campaignId + '/' + placementTag,
dataType: 'json',
type: 'GET',
success: function(data) {
if(data.responsecode != '1') {
bootbox.alert(data.validationerror);
} else {
el.html('<i class="elusive-pause">');
el.off('click').on('click', function() {
pausePlacement(el, placementTag);
});
}
}
});
}
If the initial state is paused for instance, then the play button is displayed. If you hit the play button, it changes the state to playing and now it becomes the pause button. But now if you hit the pause button, for some maddening reason it makes another ajax request to change the state to playing and then makes a subsequent request to pause the placement.
So the first click, only 1 ajax request. The second click, 2 ajax requests. On the third click, 1 again. And so forth.
Why is it doing this and what do I need to change? Thanks
A:
According to the jQuery documentation:
The off() method removes event handlers that were attached with .on().
But you have handlers set via inline onclick="... attributes. So after the first click you have both an inline onclick="... and a jQuery-bound click handler. Bind the click handlers with jQuery in the first place.
<?php if ($placement['placementStatus'] == Campaign::STATUS_IN_PROGRESS): ?>
<a class="pausebtn btn btn-small" data-placement="<?=$placement['placementTag']?>"
href="#"><i class="elusive-pause"></i></a>
<?php else: ?>
<a class="startbtn btn btn-small" data-placement="<?=$placement['placementTag']?>"
href="#" ><i class="elusive-play"></i></a>
<?php endif; ?>
And then:
$(document).ready(function() {
$("a.pausebtn").click(function() {
var $this = $(this);
pausePlacement($this, $this.attr("data-placement"));
});
$("a.startbtn").click(function() {
var $this = $(this);
startPlacement($this, $this.attr("data-placement"));
});
});
Or, given that your existing functions are almost identical, you can probably combine them to something like this:
$(document).ready(function() {
$("a.pausebtn,a.startbtn").click(function() {
var $this = $(this),
placementTag = $this.attr("data-placement");
$.ajax({
url: '/campaign/'
+ ($this.hasClass("pausebtn") ? 'pausePlacement' : 'startPlacement')
+ '/' + campaignId + '/' + placementTag,
dataType: 'json',
type: 'GET',
success: function(data) {
if(data.responsecode != '1') {
bootbox.alert(data.validationerror);
} else {
$this.toggleClass('btnpause btnstart')
.find('i').toggleClass('elusive-pause elusive-start');
}
}
});
});
});
That is, bind a click handler to whichever of pausebtn and startbtn exists initially. Then within that handler set the URL for the Ajax call according to which class the clicked item has, then on success toggle the classes.
|
Just over a month ago, Chinese smartphone brand Vivo announced the Vivo V7 which is essentially the smaller version of the V7+. Now today, Vivo has announced the Vivo Y75 which comes with design and specifications similar to the V7.
The Vivo Y75 sports bezel-less design which is similar to the V7. It sports a 5.7-inch FullView display having a resolution of 1440 x 720 pixels and an aspect ratio of 18:9. As the bezel are small, there are no capacitive navigation keys or fingerprint scanner below the display.
The fingerprint scanner is located at the back of the phone below which is the Vivo moniker, and above which is the 13 MP primary camera accompanied by LED flash. For selfies and video calls, there’s a 16 MP camera on the front. Well, for those unaware, this is a downgrade from the 16 MP rear and 24 MP front camera found on the V7.
That said, the Vivo Y75 is powered by MediaTek’s Helio P23 SoC that’s laced with 4 GB RAM and backed by Mali-G71 MP2 GPU. The Vivo Y75 also comes with Face Wake feature that lets you unlock the smartphone by looking at it using face recognition.
The Vivo Y75 runs Funtouch OS 3.2 based on Android 7.1 Nougat and has 32 GB of on-board storage which can be expanded up to 256 GB via microSD card. The Y75 is offered in three colors – Gold, Rose Gold and Matter Black, and, comes with a 3000 mAh battery that keeps the lights on. |
[Involvement of salicylic acid and nitric oxide in protective reactions of wheat under the influence of heavy metals].
This article studies the effect of salicylic acid (SA) and nitric oxide (NO) on Triticum aestivum L. wheat plants exposed to the influence of high concentrations of copper and zinc compounds. It is shown that heavy metals (HMs) caused a decrease in the growth parameters in the overground and underground plant parts and contributed to a sharp deterioration in the energy balance and the situation regarding oxidative stress. SA and NO exerted a protective effect, which was expressed in the increased ability to accumulate shoot and root mass, stabilize the energy balance, and reduced lipid peroxidation. |
562 N.E.2d 27 (1990)
William F. KIRTLEY, Phyllis Kirtley and Thomas Garrison, Directors of the Pointe Services Association, Inc., and Terry Pierson, As a Past Director of the Pointe Services Association, Inc., Appellants (Defendants below),
v.
Howard W. McClelland, et al, Appellees (Plaintiffs below). the Pointe Services Association, Inc., Cross-Appellant (Defendant below),
v.
Thomas A. Berry, Esq., Cross-Appellee (As Attorney and in Trust for All Plaintiffs below).
No. 53A01-8912-CV-493.
Court of Appeals of Indiana, First District.
October 31, 1990.
Opinion on Denial of Rehearing February 12, 1991.
*28 William H. Andrews, Michael L. Carmin, Cotner Andrews Mann & Chapman, Bloomington, for appellants.
Thomas A. Berry, Berry & Mills, Bloomington, David A. Reidy, Jr., Gosport, for appellees.
ROBERTSON, Judge.
For the purpose of simplifying the identity of the parties to this appeal, the appellant-defendants will be referred to as the directors or as Kirtley and the appellee-plaintiffs as the Pointe Service Association (PSA). The appellants, William Kirtley, Phyllis Kirtley, Thomas Garrison and Terry Pierson, present or past directors of The Pointe Services Association, Inc., a unit owner's association, appeal from a judgment rendered against them following the bench trial of a shareholders' derivative action. The judgment ordered payment in the sum of approximately $150,000, an accounting and transfer of funds, and ordered payment of attorneys' fees.
We affirm in part, reverse in part, and remand with instructions.
An overview of the basic facts shows that "the Pointe" is a planned residential community built around a golf course and situated on the shore of Lake Monroe. In 1974, Caslon Development Co., the original developer, created the resort community, starting with four independent condominium villages totaling about 250 units. Eventually, plans called for a total of about 1500 residences. To facilitate general community administration, Caslon subjected the development property to certain covenants and restrictions for the benefit of the community as a whole, incorporated PSA, an Indiana not-for-profit corporation, and delegated to PSA responsibility for:
maintaining and administering the common areas and common facilities, administering and enforcing ... covenants and restrictions, establishing a procedure for assessing its members, and disbursing ... charges and assessments.
For the most part, PSA acts through its managing agent to perform these duties. It handles, for example, road maintenance, snow removal, general grounds maintenance, accounting services and repairs on the television system, all through contractors. PSA has no employees or equipment other than a television tower and antennae.
Caslon created two classes of membership in PSA as a means of maintaining control over the development process: class A consisted of the owners of units or residential lots while class B referred to the 1500 potential memberships held by Caslon. If all went as planned, Caslon would gradually relinquish control over PSA as well as ultimate financial responsibility [Caslon paid no dues but was to fund deficits in PSA's annual budget], such that *29 PSA, which had high fixed maintenance and security costs, would become self-funding. In any event, by the terms of the Declaration of Covenants, Conditions and Restrictions (Declaration) Caslon would be out of PSA by January 1, 1990.
However, by 1982, growth of the Pointe had stagnated. Only 344 units had been sold. Financial considerations caused Caslon's successor, Indun Realty, a subsidiary of Indiana National Corporation, to attempt to sell the development. A buyer for the entire project could not be found; but, the country club, 30 residential units, and the golf course were sold to Resort Management Association (RMA), a limited partnership formed by the directors. As part of the agreement to purchase, RMA became the managing agent of PSA.
Development at the Pointe remained slow. Kirtley became concerned that RMA's investment in the club could be devalued by the plans of potential purchasers of the remaining land and so entered into negotiations with Indun to purchase the undeveloped property at the Pointe. Once the purchase had been consummated, in December, 1982, Kirtley formed a partnership, Pointe Development Company (PDC), and conveyed the property to PDC. Indun assigned the 1500 PSA class B memberships to Kirtley who assigned them to PDC and elected appellants Kirtley, his wife Phyllis Kirtley and brother-in-law Pierson the new directors of PSA. PDC began making changes immediately to encourage the sale of additional units. Among the changes, PDC sold tracts to builders and then diverted part of the purchase price to PSA to fund the deficit.
Over time, discontentment grew among the unit owners who were unable to elect board members, had no say in PSA's decision-making, and were unable to exercise any control over PSA assessments or spending. As a consequence, a group of class A unitowners brought this action against the directors alleging a number of irregularities in the management of the Pointe. One of the points of contention concerns payment to RMA for mowing certain easements and other property shared with PSA. Another involves Kirtley's purchase and sale of television satellite equipment. The issues raised in this appeal are as stated hereafter.
I.
Whether the court erred in denying defendant's motion to dismiss the second amended complaint where no Indiana statutory or common law authority exists for a shareholder's derivative suit against a non-profit corporation.
The directors argue first that the court below erred in denying their motion to dismiss in which they asserted that McClelland and the other plaintiffs, as members of a nonprofit corporation, lacked standing to maintain an action on behalf of the corporation. The directors emphasize the absence of express statutory authorization in the Indiana Not-for-Profit Corporation Act of 1971, Ind. Code 23-7-1.1, and case law addressing use of the derivative remedy by members of nonprofit corporations. They urge a narrow reading of Ind. Trial Rule 23.1, arguing that the language "shareholders" refers to "corporation" while "members" used in conjunction with "unincorporated association" refers solely to members of unincorporated associations.
But for being members of a not-for-profit corporation, PSA has stated a cause of action. The appellees have brought the action to recover losses the corporation wrongfully sustained through the allegedly improper actions of its officers and directors, a situation where relief ordinarily would be obtained through suit by the corporation acting to protect its property and interests but the corporation either actually or effectively refuses to institute suit on its own. Hence, the essence of the question before us is simply whether an equitable forum is available to a corporation formed for purposes other than pecuniary gain to redress injury to its property and interests.
Admittedly, few examples of derivative actions brought by members of not-for-profit corporations or incorporated associations can be found in Indiana case law, but see, e.g., Consumers' Gas Trust Co. v. Quinby (7th Cir.1905), 137 F. 882, cert. *30 denied, 198 U.S. 585, 25 S.Ct. 803, 49 L.Ed. 1174 even though corporations organized for purposes other than pecuniary gain have had legislative approval since at least 1901. See e.g. Rev.St. 1889, ch. 79 (Burns' Ann.St. 1901 § 4613). Nonetheless, we are convinced that equitable redress would have been available at common law for members of a nonprofit corporation or an incorporated voluntary association had such plaintiffs sought to utilize it.
First, there is nothing about the remedy itself which warrants distinctive treatment based upon corporate purpose, for a derivative action by nature has as its aim the non-pecuniary benefit of the corporation, not the individual stockholder or member. Scott v. Anderson Newspapers, Inc. (1985), Ind. App., 477 N.E.2d 553, trans. denied; J. Pomeroy, Equity Jurisprudence § 1090 (1941). A stockholder is permitted to sue on behalf of the corporation, not because his rights have been violated, but simply as a means of setting in motion the judicial machinery of the court. The stockholder commences the action and prosecutes it, but in every other respect the action is brought by the corporation; it is maintained directly for the benefit of the corporation and final relief when obtained belongs to the corporation. Pomeroy, § 1095; Dotlich v. Dotlich (1985), Ind. App., 475 N.E.2d 331, 339, trans. denied.
The stockholder plaintiff never has a direct interest in the subject matter of the controversy because he owns no estate, legal or equitable, in the corporation's property. He is permitted, notwithstanding the want of a direct interest, to maintain an action solely to prevent an otherwise complete failure of justice. Pomeroy, § 1095. Equity will not suffer a wrong without a remedy. Dodd v. Reese (1940), 216 Ind. 449, 462, 24 N.E.2d 995, 999. Jurisdiction of a court of equity does not depend upon the mere accident of the court having in some previous case granted relief under similar circumstances. Id. Consequently, courts of equity have granted relief even to a former shareholder of a merged corporation when its equity has been adversely affected by the fraudulent act of an officer or director and means of redress otherwise would be cut off by the merger. Cf. Gabhart v. Gabhart (1977), 267 Ind. 370, 392, 370 N.E.2d 345, 358.
In Indiana, standing is achieved by showing a personal interest in the corporation. Wright v. Floyd (1908), 43 Ind. App. 546, 86 N.E. 971. "Shareholders and stockholders in a corporation, or an interested member, may bring suit on behalf of the corporation to protect the interest of the corporation, and incidentally the interest of the members; but, in doing so, their interest must be shown ..." Id. at 548, 86 N.E. 971.
That such a remedy remains available to members of nonprofit corporations is reflected in the text of T.R. 23.1. This rule is broader than its federal counterpart, extending relief to "shareholders or members or holders of an interest in such shares or membership, legal or equitable, to enforce a right of a corporation or of an unincorporated association ..." Members of nonprofit corporations literally fall within this class; ownership of stock is not an express prerequisite for relief.
Furthermore, T.R. 23.1 expressly assures the availability of derivative actions brought by members of an unincorporated association, giving legal entity treatment to the association when historically, for formalistic reasons, it could not sue or be sued as a jural person at common law. See, e.g., Lafayette Chapter of Property Owners Association v. City of Lafayette (1959), 129 Ind. App. 425, 157 N.E.2d 287. Hence, the rule seeks to facilitate redress where formerly it did not exist, rather than restrict the assessibility of such a remedy.
Finally, the drafters did not explicitly limit T.R. 23.1 to for-profit corporations. The text suggests therefore that the derivative action was not perceived as a procedural vehicle created solely for the benefit of for-profit corporations.
The absence of a statutory procedure for initiating a derivative action by a not-for-profit corporation when one has been affirmatively provided for for-profit corporations does not require the conclusion that statutory authorization is a necessity either. A court of general jurisdiction has *31 inherent equitable power unless a statute either explicitly or by necessary implication provides otherwise. State ex rel. Root v. Circuit Court of Allen County (1972), 259 Ind. 500, 506, 289 N.E.2d 503, 507. The Not-for-Profit Corporation Act does not expressly bar derivative actions by members of a nonprofit corporation.
The directors assert that I.C. 23-7-1.1-65, 66 impart a legislative intent to vest oversight of nonprofit corporations exclusively in public officials. I.C. 23-7-1.1-65 makes an act in excess of a corporation's powers "avoidable at the instance of the prosecuting attorney ... in a direct proceeding instituted by him against the corporation." This section permits a prosecuting attorney, as a representative of the public, to sue the corporation when it acts beyond the scope of the powers conferred by charter. Neither § 65 nor § 66 (which authorizes the state attorney general to bring proceedings for dissolution) speaks to the enforcement of rights belonging to the corporation but of the public's interest in the affairs of the corporation. Neither section expressly or by unmistakable implication purports to preclude a shareholder or member from challenging the binding nature of a corporation's ultra vires act, a right belonging to the member at common law, see Tatman v. Rochester Lodge No. 47 I.O.O.F. (1929), 88 Ind. App. 507, 511, 164 N.E. 718, 720; Pomeroy, § 1093, or to seek a dissolution of the corporation for reasons other than those affecting the corporate charter.
Accordingly, having found nothing in I.C. 23-7-1.1 indicative of a legislative intent to preclude the courts from exercising equitable jurisdiction over actions initiated by members of a non-profit corporation, we conclude the derivative remedy is available. The trial court correctly determined that minority members of PSA have standing to sue.
II.
Whether the court erred by permitting plaintiffs to litigate a cause of action not encompassed within any of the three versions of plaintiffs' complaint and not raised by a pre-trial order, motion or discovery.
At the heart of this issue is the classic tension between the lack of specificity in pleading and the notice pleading concept. In particular, we are dealing with the lost corporate opportunity as it pertains to the distribution of television signals which will be discussed at length in the next issue.
It appears from the record that PSA became aware, to some degree, that the directors had sold the distribution rights of the television signals to Pegasus, a cable television purveyor, during June of 1987. However, it also seems that the implications of that transaction did not dawn on PSA until very shortly before the trial began. As the trial progressed, and it became more apparent that the distribution of television signals was a matter in contention, the directors began objecting to this evidence as being outside of the pleadings. PSA countered that rhetorical paragraph 26 of the pleadings included the distribution of television signal issue. That paragraph reads:
The defendants, PSA Directors, have breached their fiduciary duty to PSA and the PSA Class A Members by providing services, at PSA expense, to businesses owned or controlled by the PSA Directors or to builders who contract with PDC all contrary to Indiana law.
The trial court ruled that the television signal issue was within the scope of the pleadings. The directors made a continuing objection to the evidence.
The directors first argue that the filing of the second amended complaint was contrary to the provisions of T.R. 15(A) which requires leave of court before filing second or subsequent amended complaints. No such leave was obtained by PSA. Our review of the record does not show that the directors objected to the filing of the second amended complaint. If that is so, we are faced with an invited error situation. A party may not take advantage of error which is the natural consequence of his neglect. Stolberg v. Stolberg (1989), Ind. App., 538 N.E.2d 1.
*32 Additionally, the directors did not seek a continuance when faced with the trial court's ruling that the television signal distribution issue was to be tried. When a party objects to evidence because it is outside the issues raised by the pleadings, the question of the utility of a continuance arises. Ayr-Way Stores, Inc. v. Chitwood (1973) 261 Ind. 86, 300 N.E.2d 335. A portion of a motion for a continuance would have been dedicated to showing on the record what specific prejudice would occur to the movant by the addition of a new theory of the case. Id. Obviously we now are denied on review the opportunity to measure the exact harm arising from the directors' claim. Furthermore, when the objecting party bases a claim of prejudice on the argument that he was not prepared to meet the new theory, the proper course for the trial court is to allow an amendment to the pleadings and grant a continuance to allow for adequate preparation to defend against the new theory of recovery. Bank of New York v. Bright (1986), Ind. App., 494 N.E.2d 970; T.R. 15(B). A failure to request the continuance under these circumstances has been held to constitute a waiver of the issue. Id.
Hindsight would allow the observation that neither party handled this matter very well when it came to observing the letter and spirit of T.R. 15(A) and (B).
One other observation about this issue is that the purpose of T.R. 15(A) and (B), within the context of the directors' argument, is to protect a party from being placed at a serious disadvantage. Bright, 494 N.E.2d 970. The directors fail to make a convincing argument as to how they were harmed. It would appear from the record that they had the opportunity to present the desired evidence to defend against the television signal distribution claim. That being the case, no error exists on this issue.
III.
Whether appellant Kirtley breached a fiduciary duty to PSA by appropriating a corporate opportunity when he upgraded the existing television reception system, provided PSA with satellite based cable television and sold the equipment he had purchased with a covenant not to compete to an independent cable company.
The question arises as a consequence of Kirtley's dual role as developer and director/officer. Kirtley wanted to furnish the development with certain amenities which would enhance the resort image and the desirability of the community overall. Television reception without an unsightly array of antennae was one amenity assured the Pointe residents by Caslon.
Caslon precluded individual unit owners from maintaining outside antennae through the Declaration, which encumbered the entire property making up the Pointe. Caslon then purchased and installed master antennae on developer-owned property, laid cable to the exterior of the units, sold the antennae and tower to PSA on contract at 8% interest, and granted PSA an easement to maintain the system. Hence, PSA owned equipment and provided off air television service to its members.
During the first year of the directors' ownership, it became apparent that the off air set up designed by Caslon was not meeting member expectations. Indun had contacted cable television purveyors to determine whether cable television could be provided members, many of whom were investors, at a rate they were willing to pay. Indun's research indicated that members would agree to a $5.00 per month increase in their assessment for cable television but the lowest proposal called for a $7.50 increase per month. After surveying the members to determine whether two-thirds of them would be willing to pay $5.00 per month for four cable channels, Kirtley took it upon himself to upgrade the system, purchasing top-of-the-line modulators, receivers, converters and satellite dishes.
Instead of selling the system to PSA as Caslon had done, Kirtley operated it himself.[1] Kirtley, through PSA, billed the unit *33 owners at the agreed rate which was commercially reasonable and far below the prevailing market rate. Kirtley therefore had no conflict of interest in the provision of service itself which would render the transaction void or voidable. I.C. 23-7-1.1-61. See also, Schemmel v. Hill (1930), 91 Ind. App. 373, 169 N.E. 678.
PSA maintains, however, that Kirtley was obligated at the time he purchased the equipment and began operating the system to obtain the opportunity for PSA as PSA had historically provided television reception service to its members. A corporate fiduciary may not appropriate to his own use a business opportunity that in equity and fairness belongs to the corporation. Hartung v. Architects Hartung/Odle/Burke (1973), 157 Ind. App. 546, 555, 301 N.E.2d 240, 243. Tower Recreation, Inc. v. Beard (1967), 141 Ind. App. 649, 652, 231 N.E.2d 154.
Guth v. Loft, Inc. (1939), 23 Del. Ch. 255, 5 A.2d 503 contains the classic statement of a corporate opportunity:
[W]hen a business opportunity comes to a corporate officer or director in his individual capacity rather than in his official capacity, and the opportunity is one which, because of the nature of the enterprise, is not essential to his corporation, and is one in which it has no interest or expectancy, the officer or director is entitled to treat the opportunity as his own, and the corporation has no interest in it, if, of course, the officer or director has not wrongfully embarked the corporation's resources therein ... On the other hand, ..., if there is presented to a corporate officer or director a business opportunity which the corporation is financially able to undertake, is, from its nature, in the line of the corporation's business and is of practical advantage to it, is one in which the corporation has an interest or a reasonable expectancy, and, by embracing the opportunity, the self-interest of the officer or director will be brought into conflict with that of his corporation, the law will not permit him to seize the opportunity for himself. And, if, in such circumstances, the interests of the corporation are betrayed, the corporation may elect to claim all the benefits of the transaction for itself, and the law will impress a trust in favor of the corporation upon the property, interests and profits so acquired.
5 A.2d at 510-11.
Briefly summarized, the undisputed evidence of record establishes that Kirtley learned of the need for cable television service in his capacity as director/officer of PSA; that PSA was in the business of providing services to its members, among them television reception; and that PSA was about to obtain cable television for its members when the opportunity to provide it arose. The factual issue seems to center upon whether PSA had the capacity both financially and technically to take advantage of the opportunity. The trial court made numerous findings of fact but ultimately found that PSA had the corporate and financial capacity to provide the service which Kirtley supplied in 1983 and 1984.
A complaint alleging a breach of fiduciary duty by converting a corporate opportunity to the fiduciary's benefit places upon the plaintiff the initial burden of establishing that the fiduciary attempted to benefit from a questioned transaction. Once that burden has been met, the law presumes fraud and the burden of proof shifts to the fiduciary to overcome the presumption by showing that his actions were honest and in good faith. Dotlich, 475 N.E.2d at 342.
In essence, the trial court found against Kirtley on the issue upon which he had the burden of proof. Hence, he may not question the sufficiency of the evidence to support the findings but may challenge the judgment only as being contrary to law. Id. On appellate review, we must accept the trial court's fact-finding, without reweighing the evidence or reassessing the credibility of witnesses, unless the facts and judgment are clearly erroneous. State Election Bd. v. Bayh (1988), Ind., 521 N.E.2d 1313, 1315. Indeed, the trial court will not be reversed upon the evidence unless there is a total lack of supporting evidence or the evidence is undisputed and *34 leads only to a contrary conclusion. Id.; Dotlich, 475 N.E.2d at 453.
Although there is evidence tending to show that Kirtley purchased the satellite cable system believing at the time that PSA was unable to acquire the system itself without his financial assistance and that it would ultimately be in the best interests of the unit owners to keep assessments as low as possible in order to promote sales, the record also shows that the planned development concept undertaken by Kirtley contemplated developer deficit funding regardless of major capital expenditures financed by member assessments and reserves. The Declaration permits increases in annual assessments and special assessments for the purpose of defraying replacement costs of a capital improvement. PSA had 344 assessment paying members at the end of 1983. The evidence showed Kirtley made $10,367 in profit in the six months he operated the system. The equipment and engineering support cost him $13,157. With the increased assessment of $5.00 per unit per month approved by the directors for 1984, the system and costs of operation would have paid for themselves in less than a year. The effect upon unit sales as compared to the third party purveyor method surely would have been negligible. Moreover, it is undisputed and the trial court found that PSA's options simply were not explored or considered. Though Kirtley had no duty to finance the project, Caslon, a subsidiary of Indiana National Corp., was willing to finance the first system at a rate advantageous to the members. Another investor might have emerged had PSA actively sought one. As for technical expertise, Kirtley acquired it by paying for it. PSA could have taken the same approach. After all, it had Kirtley's skills, as a director and through RMA.
Kirtley argues that the trial court's special findings are inadequate to sustain the judgment because the court failed to state specifically the opportunity misappropriated by Kirtley and the resulting breach of fiduciary duty. This argument refers at least in part to PSA's contention that Kirtley misappropriated both a corporate opportunity and a corporate asset, namely, PSA's distribution rights when Kirtley exchanged, on behalf of PSA, the exclusive right to distribute cable television at the Pointe for a service contract with Pegasus on the same day he sold his equipment and a covenant not to compete for $120,000.
Whether a trial court's findings of fact are adequate depends upon whether they are sufficient to disclose a valid basis under the issues for the legal result reached in the judgment and whether they are supported by evidence of probative value. Ridenour v. Furness (1987), Ind. App., 504 N.E.2d 336, 339, affirmed and vacated, 514 N.E.2d 273; College Life Insurance Co. v. Austin (1984), Ind. App., 466 N.E.2d 738, 742. Although conclusions of law are useful in delineating the theories upon which the trial court relied, as a general rule they do not change our scope of review which is to affirm the trial court on any possible basis supported by the factual findings. Havert v. Caldwell (1983), Ind., 452 N.E.2d 154, 157.
The trial court's factual findings, all supported by the record, that PSA owned the off air system and cable distribution at the Pointe;[2] that Kirtley purchased his system and began providing service while bids were being accepted and negotiations were being conducted; that Kirtley provided service without a written contract or disclosing to class A members that he was supplying the service to which they had subscribed; that the total cost of installation and amounts due signal providers was significantly less than yearly assessments or the balance of Indun funding after proper credits; and that the PSA directors gave no consideration to obtaining either authorization for a capital assessment to purchase the equipment or financing for the purchases as Caslon had done, disclose a valid basis for concluding that Kirtley appropriated an opportunity belonging to PSA by purchasing and placing in operation satellite receiving equipment. Profits generated from the operation of the system are *35 benefits of the transaction itself which would have accrued to PSA had Kirtley not diverted the opportunity to himself.
Kirtley maintains that monies received on the sale of the equipment and covenant not to compete do not belong to the corporation. The trial court awarded PSA $117,210, the total profit on the operation and sale, on the theory that the noncompetition agreement was a sham and the $100,000 paid for it was akin to a premium or commission for bringing PSA's business to Pegasus. Kirtley insists that the evidence does not support the trial court's findings in that there is no evidence PSA had exclusive rights to distribute the cable signal at the Pointe.
We have carefully considered this contention and Kirtley's assertion that the noncompetition contract had value independent of the exclusive right to distribute given by PSA, and agree. The record does not sustain the trial court's ultimate findings in this regard.
The trial court's conclusions of law on this issue are as follows:
William Kirtley signed the PSA Cable Television Services Contract and the Sales Contract with Pegasus. The PSA contract giving Pegasus the exclusive right to operate a cable television system on The Pointe renders Kirtley's covenant not to compete with Pegasus at The Pointe worthless. Quite simply, Kirtley had nothing to sell. He was precluded from competing at The Pointe with Pegasus by the exclusive right given to Pegasus by PSA. Craig Brubaker of Pegasus testified that he pays a premium to a developer for the right of distribution and the amount is based on the anticipated profits to be made. It is in the nature of a "commission" or a "finders fee." The inclusion of a non-compete clause in the Sales Contract was nothing more than a means to pay William Kirtley for bringing PSA's business to Pegasus. William Kirtley intentionally appropriated PSA's fee for himself and did not in good faith and openly deal with the corporation and its members.
The trial court's conclusions are supported by the critical factual finding that the PSA/Pegasus contract "acknowledged that PSA `controls the distribution of cable television signals' at The Pointe and by its terms grants to Pegasus `the exclusive right ... to operate a cable television system' at The Pointe."
What the PSA/Pegasus contract says is that PSA "controls the distribution of cable television signals within certain real estate located in Monroe County, Indiana, upon which real estate is located a complex of individual residential units generally and commonly known as the Pointe." (Emphasis supplied.) By the terms of the PSA/Pegasus contract, PSA controls distribution to a complex of individual residential units; it does not control distribution to all of the property subjected to the Declaration, including undeveloped land held by PDC.[3] Indeed, PSA exercises power of administration only over the common areas and common facilities, defined by the Declaration as "all real property owned by the Association for the benefit, use and enjoyment of its members and all facilities and real property leased by the Association or wherein the Association has acquired rights by means of contract or this Declaration." Cable "facilities" as they existed extended only to completed units. Though zoning requirements might stand in PDC's way, nowhere in the Declaration or the warranty deed did Caslon restrict the Pointe residential community to owner occupied condominium units. While owners of "units" or "lots" automatically acquire class A membership, PDC is expressly excepted. It pays an assessment only on rental "units." As the record indicates, other options, such as a trailer park, though not attractive to RMA, exist for the land. And, PDC owns the common roadways reaching the undeveloped tracts.
Hence, a sizable potential secondary market does exist at the Pointe. Kirtley's agreement not to compete with Pegasus "in the operation of a satellite cable television *36 system in the residential properties developed at the Pointe" has value and may have had value to Pegasus' Brubaker who contracted with PSA with the expectation "that it was going to be a growing market."
The record therefore does not support the trial court's conclusions that Kirtley had nothing to sell and his covenant not to compete was worthless. Whether the $100,000 paid Kirtley also included a commission for bringing PSA business to Pegasus we cannot discern from the record. No one asked Brubaker why he offered $100,000 above the price of the equipment. We will not speculate solely based upon the testimony of Brubaker, that incentives are sometimes paid to the developer by Pegasus, that one actually was paid here.
The trial court erred in its determination that the $120,000 from the sale of the equipment and covenant not to compete belonged to PSA. It was correct, however, in awarding PSA the $10,367 profit Kirtley made operating the system.[4]
IV.
Whether the court erred by enforcing a covenant in the golf course deed of conveyance from Indun to RMA, requiring RMA to maintain at its expense the nonpaved area of an easement granted it by Indun.
At trial, PSA maintained that the directors breached their fiduciary duties to the corporation by expending sums for mowing easements which RMA was required to maintain at its own expense. In support of this position, PSA offered the warranty deed which conveyed the golf course subject to the easements granted PSA. That deed contains the following provision:
Grantor hereby also grants and transfers to Grantee, for the benefit of the Real Estate conveyed hereby, a private, non-exclusive surface easement for the purpose of affording Grantee ... necessary access to the Real Estate upon and across the easements . .. (The "Roadway Easements") heretofore granted by Grantor or its predescessor, Caslon Development Company, to the Pointe Service Association, Inc. By its acceptance of this Deed, Grantee agrees to mow the grass upon, and otherwise maintain in a sightly appearance, the nonpaved portions of said Roadway Easements.
Kirtley acknowledges the duty to mow the easement but claims that the parties intended to provide for mowing without shifting the expense. Kirtley also argues that PSA, not being a third party beneficiary to the agreement to mow, had no standing to enforce the covenant.
The trial court found the covenant to be clear and unambiguous in requiring RMA to mow the roadway easement at its own expense. It also concluded from the warranty deed, Declaration and PSA's easements that PSA stands "in the position of a third-party beneficiary of the mowing condition to which RMA's Roadway Easement is subject."
The object of deed construction is to ascertain the intent of the parties. Brown v. Penn Central Corp. (1987), Ind., 510 N.E.2d 641, 643. Where there is no ambiguity in the deed, the intention of the parties must be determined from the language of the deed alone. Id. However, it is the court's obligation and duty in determining the intention of the parties to consider their intentions in the light of the surrounding circumstances which existed at the time it was made. The court should consider the nature of the agreement, together with all facts and circumstances leading up to the execution of the contract, the relation of the parties, the nature and situation of the subject matter, and the apparent purpose of making the contract. Rieth-Riley Construction Co. v. Auto-Owners Mutual Ins. Co. (1980), Ind. App., 408 N.E.2d 640, 645 (citing Standard Land Corp. v. Bogardus (1972), 154 Ind. App. 283, 289 N.E.2d 803, 823.)
*37 Kirtley points out that the deed does not state in explicit terms that the cost of mowing was to be assumed by RMA. But by necessary implication, it was part and parcel of the conveyance of the easement. Had the parties intended any other arrangment, the deed either would have been silent, leaving the arrangement a matter of contract, or it would surely have stated that responsibility for maintenance of the nonpaved portions of the easement was to be shared. We agree with the trial court that no other reasonable interpretation can be accorded the language of the deed.
Our conclusion is underscored by the circumstances existing at the time the sale transpired. As part of the sale of the golf course to RMA, Indun agreed to transfer the golf course mowing equipment which it had been using since 1975 to mow areas where the playable golf course did not meet the access roads. (This situation occurred at least 50% of the time.) Indun had already conveyed to PSA the roadway easements with the responsibility for maintaining the road surface but because of the proposed sale to RMA, Indun no longer would have access to the special equipment and high-powered mowers needed to maintain the grassy and rocky areas adjacent to the roadways but part of the easement. Testimony from the golf course superintendent established that it was fairly easy for golf course employees to take a path wide enough to pick up the areas along the road when they mowed the golf course. Given the ease of maintenance for RMA and its possession of the equipment, it makes sense that Indun would transfer responsibility for the nonpaved portions of the easement to RMA as consideration for the easement.[5]
Similarly, we are of the opinion that the trial court correctly determined PSA to be a third party beneficiary of the agreement. One not a party to an agreement may nonetheless enforce it by demonstrating that the parties intended to protect him under the agreement by the imposition of a duty in his favor. Garco Industrial Equipment Co. v. Mallory (1985), Ind. App., 485 N.E.2d 652, 654, trans. denied. To be enforceable, it must clearly appear that it was the purpose or a purpose of the contract to impose an obligation on one of the contracting parties in favor of the third party. Jackman Cigar Manufacturing Co. v. John Berger & Son Co. (1944), 114 Ind. App. 437, 445, 52 N.E.2d 363, 367. It is not enough that performance of the contract would be of benefit to the third party. It must appear that it was the intention of one of the parties to require performance of some part of it in favor of such third party and for his benefit, and that the other party to the agreement intended to assume the obligation thus imposed. Id. The intent of the parties should be gathered from the terms of the contract itself, considered in its entirety against the background of the circumstances known at the time of execution. Id.; see also, Mogensen v. Martz (1982), Ind. App., 441 N.E.2d 34, 35. However, the intent of the parties to benefit a third party is not to be tested by a rule any more strict or different than their intention as to other terms of the contract, Freigy v. Gargaro Co., Inc. (1945), 223 Ind. 342, 349, 60 N.E.2d 288, 291 (citing Nash Engineering Co. v. Marcy Realty Corp. (1944), 222 Ind. 396, 416, 54 N.E.2d 263, 271); it can be shown by specifically naming the third party or by other evidence. Russell v. Posey County Dept. of Public Welfare (1984), Ind. App., 471 N.E.2d 1209, 1211, trans. denied.
At the time of the Indun-RMA conveyance, PSA had responsibility for maintaining the central road system, and the common areas and facilities. Consequently, Indun, which had control of PSA at the time by its class B membership, must have been bargaining for PSA. Furthermore, as the trial court observed, Indun envisioned ownership *38 of the roadways by PSA. It demonstrated this intent expressly in the Declaration. In light of these circumstances, it is apparent that Indun not only intended to benefit PSA, it intended to impose an obligation in favor of PSA. Indeed, any benefit accruing to Indun was indirect at best because, whether by virtue of the easements or the Declaration, Indun intended and did delegate maintenance of the Roadway Easements to PSA.
For these reasons, we conclude the trial court correctly determined that the directors wrongfully expended PSA funds for mowing expenses, thereby breaching a fiduciary duty to the corporation.
V.
Whether the trial court erred in compounding prejudgment interest.
Since we reverse on the third issue, resulting in a change of the money judgment, the need to recalculate prejudgment interest exists. The trial court is directed to the following from Northern Indiana Public Service Co. v. Citizens Action Coalition (1989), Ind., 548 N.E.2d 153, 161, dismissed, 476 U.S. 1137, 106 S.Ct. 2239, 90 L.Ed.2d 687:
The Court of Appeals addressed the issue of compound interest as damages in Indiana Telephone Corp. v. Indiana Bell Telephone Co. (1977), 171 Ind. App. 616, 638, 641, 360 N.E.2d 610, 612 (on rehearing), and quoted from 11 Williston on Contracts, § 1417 at 638 (3d ed. 1968): "The general rule is that compound interest is not allowed as damages." We adopt that general rule, and since the interest award here is based on the right to receive interest as damages, we hold that the interest should not be compounded but calculated as simple interest.
The trial court should compute the prejudgment interest herein accordingly.
VI.
Whether the court erred in ordering defendants to reimburse PSA for attorneys' fees incurred in defending this cause where no evidence of such expense was introduced and where defendants were entitled to indemnification pursuant to Indiana statute and within the terms of the Declaration and PSA By-laws.
The trial court made an award of a little over $60,000 in attorneys' fees to the property owners which was to be paid by the directors. The primary factors prompting the attorneys' fees appear to be the directors' intentional breach of their fiduciary duty and willful misconduct in performing their duties. Because we reverse the trial court on the distribution of television signals question, a substantial change in the award of attorneys' fees is required. As a result, we remand on this issue with instructions to hold a hearing and receive evidence from both sides on the matter of attorneys' fees.
PSA raises two issues on cross-appeal:
VII.
The trial court incorrectly failed to award [PSA] damages for PSA funds improperly spent by PSA directors to provide security services to non-PSA businesses in which PSA directors had an interest.
We note that PSA appeals from a negative judgment on this issue and that the issue can only be attacked as contrary to law. The trial court's judgment will be affirmed if it is sustainable on any legal theory. Naderman v. Smith (1987), Ind. App., 512 N.E.2d 425.
The facts show that the nighttime security guards were paid by PSA and that they patrolled the entire complex which included property owned by PDC and others. PSA sought reimbursement for their security expenditures to the extent that nighttime security benefited other parties. The trial court made a finding that PDC and others had benefitted from the security patrols but the evidence on the calculation of damages was "problematic" and, as a result, no damages were awarded to PSA on this issue.
On appeal, PSA argues several possible theories or formulas which could have been used to reach a dollar amount for damages. It is our observation that the evidence presented by PSA on this issue failed to *39 provide plausible theories to support a calculation of damages.
In reference to the trial court's finding that damages were not susceptible of calculation we believe that the following, from Indiana University v. Indiana Bonding & Sur. Co. (1981), Ind. App., 416 N.E.2d 1275, 1288, is appropriate:
To support an award of compensatory damages, facts must exist and be shown by the evidence which afford a legal basis for measuring the plaintiff's loss. The damages must be susceptible of ascertainment in some manner other than by mere speculation, conjecture or surmise and must be referenced to some fairly definite standard, such as market value, established experience, or direct inference from known circumstances. (Citations omitted.)
A review of the evidence on this issue sustains the trial court's finding.
VIII.
The trial court erroneously refused to consider PSA's request for treble damages.
In its motion to correct error, PSA made a request for treble damages pursuant to I.C. XX-X-XX-X. This was the first mention of treble damages in the course of the proceedings. PSA defends this belated request, in part, on the basis that it did not know of Kirtley's appropriation of the television signal fees to himself until the second day of trial. Previously recounted facts would indicate that PSA was aware of the situation somewhat earlier than after final judgment.
It is fundamental that a party may not raise an issue in the motion to correct error which was not raised in the trial court. Allen v. Scherer (1983), Ind. App., 452 N.E.2d 1031. PSA's failure to timely advise the trial court of its request for the treble damages must result in waiver.
CONCLUSION
We reverse the judgment insofar as it awards damages associated with the sale of cable television distribution rights. We reverse and remand with instructions to hold a hearing on attorneys' fees. We affirm in all other respects.
RATLIFF, C.J., and MILLER, J., concur.
OPINION ON REHEARING
ROBERTSON, J.
The petitions for rehearing filed by the appellant and appellee are in all things denied. We write only for the purpose of clarifying that it was and is our intent, as stated in the majority opinion, to remand the cause to the trial court for plenary consideration of all attorney fee questions.
RATLIFF, C.J. and MILLER, P.J., concur.
NOTES
[1] Art. II, § 3 of the Declaration reserves in the developer the right, but not the obligation, to convey to PSA such recreational facilities and other amenities as it deems desirable.
[2] The evidence shows PSA controlled the distribution and that it owned the tower and antennae. Whether it also paid for the cable and installation is not apparent from the record.
[3] After the sale in December, 1982, PDC and RMA held better than two-thirds of the real estate at the Pointe.
[4] We reach this conclusion without assessing any weight to Brubaker's testimony that he never pays a homeowners' association for the right to distribute cable television signals. The consideration for the right comes in the form of the rate to be paid and the level of service to be provided.
[5] We acknowledge the testimony in the record concerning Indun's oral agreement with RMA but have not considered it in resolution of this issue for, as the trial court observed, in the absence of fraud or mistake, all prior or contemporaneous negotiations or executory agreements, written or oral, leading up to the execution of a deed are merged therein by the grantee's acceptance of the conveyance in performance thereof, and any variance or inconsistencies therein must yield to the language of the last document. Stack v. Commercial Towel & Uniform Service, Inc. (1950), 120 Ind. App. 483, 492, 91 N.E.2d 790, 794.
|
In Natural Born Heroes, Chris McDougall’s follow-up to his bestselling Born to Run, he tells the story of Churchill’s “dirty tricksters”. This makeshift squad – comprising such unlikely heroes as English archaeologists, artists and poets alongside local resistance fighters – helped resist the Nazi invasion of Crete by kidnapping a German general and bustling him on foot across the tiny, uneven tracks that network the island.
Modern trail runners can retrace these historic steps – there is even an ultra race that traces all 156.2km of it.
It is safe to say that stopping en route for a bit of R&R by a hotel pool probably was not on the resistance agenda, but a stay in Daios Cove today does not require a heroic effort of will. In fact, it is a wonderful base for exploring local paths before recovering by the sea or the pool with a glass of something cold. As for the food – well, a few more days at the hotel and I’dI would have had to enter that ultra race after all, just to burn it off. The hotel is in the north-east of the island, near Agios Nikolaos, about an hour’s drive from Heraklion airport.
When I mentioned to friends that I was heading for a few days in Crete, I received a few warnings about attempting to run while I was there. “Insane drivers” and “feral dogs” were muttered about. But over the course of four runs on the roads and paths around the hotel, I barely saw a car – and the only dogs I encountered were behind fences on private properties.
If you are feeling just a tiny bit heroic, though, there are some very steep paths for bashing out hill reps. Being solo, I mostly stuck to the tarmac; those venturing on to the trails should consider the uneven terrain, stony paths and sharp undergrowth when choosing footwear.
Facebook Twitter Pinterest Yoga time at Daios Cove.
Crete’s temperature is good for warm-weather training – with the emphasis on warm. The best times to head oudoors are first thing and just before sunset. The best way to run is to tackle hills: the terrain is more suited to short, sharp reps than long, steady runs. Those who prefer air con and a rubber belt, though, are well catered for in the hotel’s gym, which is unusually large and well equipped; it includes treadmills with a view over the ocean. There is also a deck area where you can stretch out, either by yourself or in one of the hotel’s yoga classes.
By far the top attraction for tired legs, however, is the fact that every room at Daios Cove has its own pool. Sure, they are small – the size of a large balcony – but cooling down your legs in unheated water just five steps from your bed is blissful. Of course, there is also the sea to swim or dive in, plus a larger pool if you want to do lengths. Watching the sun set from that pool – or the veranda restaurants – is the perfect end to an active holiday day. Or, indeed, any holiday day.
Running further afield
Exploring Crete requires a car, but a trip to Samariá Gorge is a must. You have to be a seasoned trail runner – or a mountain goat – to run much of it, but even walking it is a proper training effort. On a previous visit to Crete, years before, I hiked down (not even up) the gorge and could barely walk to the plane home the next day. Admittedly, I wasn’t very fit at the time, but believe me: those aches were real.
Those seeking a goal more specific than “justifying another large portion of Daios Cove’s amazing homemade ice-cream” (although I would say that is a worthy goal in itself) may want to investigate the Crete half marathon, which in 2018 falls on Sunday 7 October. It takes place in central Crete, passing through small villages and olive groves and vineyards.
•Kate Carter stayed at Daios Cove. Some suggested trail runs can be found here. |
An ongoing demand exists for action toys having novel features. It is of course important that any such toy be effective in its appearance and operation, while being durable and relatively facile and inexpensive to manufacture. The prior art discloses numerous forms of action toys in which various parts can be moved in different ways. Typical are the following U.S. patents:
Iwao U.S. Pat. No. 4,236,346 discloses a turtle-like toy wherein the head is mounted for extension by spring power. This is achieved by actuation of plural-mode releasing means, which serves to actuate each of several movable parts.
In the amusement game device of Ulrich et al U.S. Pat. No. 4,469,327, the tail of the dragon-like figure disclosed is manipulated to cause its neck to curl upwardly and rearwardly.
Rhodes U.S. Pat. No. 4,526,552 shows an animated figure wherein a body-mounted blade is caused to extend the head as the upper and lower torso sections are rotated relative to one another.
Mednick et al U.S. Pat. No. 4,530,67l discloses a toy figure wherein the neck can be held frictionally in any of a number of extended positions, due to eccentric disposition of a heavy portion of the skull attached to it.
Baxter U.S. Pat. No. 188,841 discloses a toy in the form of a simulated tortoise, wherein each of two pieces includes a pair of legs, the pieces being pivotable within the body and actuated by a spring-operated propelling wheel.
Woerner U.S. Pat. No. 699,780 shows a foot rest in the form of a turtle, wherein a lazy-tongs arrangement serves to actuate simulated legs.
Musselwhite et al U.S. Pat. No. 2,614,365 and Pelunis U.S. Pat. No. 3,053,008 both disclose dolls in which spring-mounted arms may be actuated in an embracing movement.
Ikeda U.S. Pat. No. 4,301,615 provides a mechanical turtle having legs and a head that extend and retract, and a tail that spins.
It is an object of the present invention to provide a novel toy figure having a unique action feature in the form of an extensible and thrusting head portion.
It is also an object of the invention to provide such a figure wherein a unique mechanism is provided for effecting such action.
An additional object of the invention is to provide such a toy, particularly in the form of a creature figure, which is effective in its appearance and operation, is durable, and is relative facile and inexpensive to manufacture. |
Boeing will eliminate about 4,000 jobs in its commercial airplanes division by the middle of this year as it looks to control costs, a company spokesman told Reuters on Tuesday.
The planemaker will reduce 1,600 positions through voluntary layoffs, while the rest are expected to be done by leaving open positions unfilled, spokesman Doug Alder said.
"While there is no employment reduction target, the more we can control costs as a whole the less impact there will be to employment," Alder said. |
You are here:Home > Americas > GAATES Design of Public Spaces Course Re-launched!
GAATES Design of Public Spaces Course Re-launched!
Americas, Built Environment, News, June 22 2018
ONTARIO, CANADA: The Global Alliance for Assistive Technology and Environments (GAATES) has re-launched the Design of Public Spaces (DOPS) online course to a new platform housed on the GAATES website at http://courses.gaates.org
This accessible online course provides a comprehensive orientation to the Accessibility for Ontarians with Disabilities Act (AODA) Accessibility Standard for the Design of Public Spaces. With development funding through Ontario’s Enabling Change Program, it was initially targeted to design professionals practicing in Ontario. The content is based on Universal Design principles and can be applied in many other regions outside of Ontario. It is available to members of the organizations below to achieve development credits, as well as individuals with an interest in making public spaces universally accessible.
On completion of the course, participants will understand the scope, application criteria and technical requirements of the accessibility standard, as well as their professional obligations to comply with this regulation within Ontario.
Course topics include:
Overview of the regulation
Definition for Public Spaces
Compliance obligations – who needs to comply and by when
Technical design requirements for the Public Spaces that are regulated including:
Gallery
About Us
The Global Alliance on Accessible Technologies and Environments (GAATES) is the leading international organization dedicated to promoting the understanding and implementation of accessibility of the sustainable More information about GAATES |
Kiril Dojčinovski
Kiril "Kiro" Dojčinovski (Macedonian: Kиpил Kиpo Дojчинoвcки; born 14 October 1943) is a Macedonian former footballer.
Playing career
Club career
Dojčinovski started playing in the youth team of FK Vardar in 1958. He successfully made his way into the senior squad, and after a few seasons he made a transfer to Red Star Belgrade. During his club career he played for Vardar Skopje, Crvena Zvezda, Troyes and Paris FC. With Red Star he won one Yugoslav championship and one cup.
International career
Dojčinovski had earned caps for the cadet, youth, Olympic and B Yugoslav national teams before debuting for the main senior national team.
He earned six caps for the Yugoslavia national football team and participated in the 1974 FIFA World Cup.
Managerial career
Dojčinovski later became a manager and coached the El Salvador national football team on two occasions. He also coached several clubs from El Salvador, Greece and Macedonia.
Personal life
In 2009, both of his legs were amputated due to complications from gangrene.
Honours
As player:
Red Star Belgrade
Yugoslav First League: 4
Winner:1967-68, 1968-69, 1969-70, 1972-73
Yugoslav Cup: 3
Winner:1967-68, 1969-70, 1970-71
Mitropa Cup: 1
Winner: 1967-68
Iberico Trophy Badajoz: 1
Winner: 1971
Trofeo Costa del Sol: 1
Winner: 1973
Trofeo Naranja: 1
Winner: 1973
UEFA Champions League:
Semi-finalists: 1970-71
Quarter-finalists: 1973-74
UEFA Cup Winners' Cup:
Quarter-finalists: 1971-72
As coach:
C.D.Luis Angel Firpo
Primera: 2
Winner: 1991-92, 1992–93
Runner-up: 1995-96
Notes
References
External links
Career story at FFM
laprensa.com
Category:1943 births
Category:Living people
Category:Macedonian footballers
Category:Yugoslav footballers
Category:Yugoslavia international footballers
Category:1974 FIFA World Cup players
Category:FK Vardar players
Category:Red Star Belgrade footballers
Category:Troyes AC players
Category:Paris FC players
Category:Macedonian football managers
Category:Sportspeople from Skopje
Category:Macedonian expatriate footballers
Category:Yugoslav expatriate footballers
Category:Expatriate footballers in France
Category:Yugoslav First League players
Category:Ligue 1 players
Category:Expatriate football managers in El Salvador
Category:El Salvador national football team managers
Category:FK Vardar managers
Category:C.D. Luis Ángel Firpo managers
Category:Iraklis Thessaloniki F.C. managers
Category:Association football defenders |
Takis Evdokas
Takis Evdokas (; 19 June 1928 – 12 February 2020) was a Greek Cypriot far-right politician, psychiatrist and writer. He was the founder of the Democratic National Party which advocated union of Cyprus and Greece (Enosis).
References
Category:1928 births
Category:2020 deaths
Category:People from Limassol
Category:Leaders of political parties in Cyprus
Category:Greek Cypriot writers
Category:Cypriot politicians |
Q:
How do I change the Unit:Characters in Matlab?
For portability, I set the units of my GUIs to 'characters'. Now I have a user who wants to use Matlab on his netbook, and the GUI window is larger than the screen (and thus cropped at the top).
I think I could try and write something in the openingFcn of the GUI that measures screen size and then adjusts the GUI accordingly, but I'd rather avoid that, because I then need to deal with text that is bigger than the text boxes, etc.
What I'd rather like to do is somehow adjust the unit 'character' on his Matlab installation. None of the font sizes in the preferences seem to have an effect on unit:character, though. Does anyone know whether there's a setting for that, which can be changed from within Matlab (I don't mind if it's something that is reset at every reboot, since I can just put it into the startup script)?
A:
Might I suggest an alternative to consider when designing your GUI:
Create all of your GUI objects with the 'FontUnits' property set to 'normalized'.
Create the figure with a default size, with everything set to look the way you want.
Set one or more of the CreateFcn/OpeningFcn/ResizeFcn functions so they will resize the GUI to fit the screen size.
When the GUI and its objects are resized, the text will resize accordingly, thus helping to avoid text that ends up bigger than the text boxes. One thing to keep note of is that normalized units for the font will interpret the value of 'FontSize' property as a fraction of the height of the uicontrol. I also make it a habit to set the 'FontName' property to 'FixedWidth' to help control the width of the text.
|
A known image forming apparatus includes a developing device unit, and a belt unit and a drum unit that are disposed above the developing device unit. To prevent the developing device unit from interfering with the drum unit when the developing device unit is drawn, the image forming apparatus is configured to move the drum unit upward and downward in response to the opening and closing movements of an upper cover of the image forming apparatus. After the upper cover is opened to retract the drum unit upward, a front cover of the image forming apparatus is opened to withdraw the developing device unit. |
Q:
Web API Design: Form POST'ing key-value pairs: JSON or checkbox style?
Design question for RESTful APIs: one of the input parameters to my API (that is, the data sent from the client to my API) is a dictionary (hash / key-value pairs). What's the best way to encode this so that the API can be easily invoked from web pages as well as scripts/programming languages?
My first thought was to json encode the object, something like this:
var data = {a:'one', b:'two'};
form_paramter_x = JSON.stringify(data);
and decode on the server:
data = simplejson.loads( request.POST['form_paramter_x'] )
The alternative would be to encode as key-value pairs html-form-checkbox style:
form_param_x=a:one&form_param_x=b:two
The latter alternative would require ad-hoc parsing of the key and value (the "a:one" part), and generally seems less clean, but also seems closer to a basic HTML form, which is probably a good thing.
Which of these is cleaner? Or is there another better alternative?
A:
If you're designing your API for other parties to use, I'd consider what is going to be easiest for them to encode for. JSON is widely supported these days, so that isn't a deal breaker. In the end, I'd go w/ whichever is easier for your clients to code. Emotionally, I'm leaning towards the JSON encoding.
|
market signal
Indication or information passed passively or unintentionally between participants in a market. For example, a firm issuing bonds indirectly indicates that it needs capital and that there are reasons (such as desire to retain control of the firm) for which it prefers loan capital over equity capital. |
#
# obj_use.R, 27 Feb 20
# Data from:
# The New C Standard: An Economic and Cultural Commentary
# Derek M. Jones
#
# Example from:
# Evidence-based Software Engineering: based on the publicly available data
# Derek M. Jones
#
# TAG C variable_read variable_write function_variable-use
source("ESEUR_config.r")
library("plyr")
plot_layout(2, 1)
plot_points=function(df, t_lty)
{
lines(df$objects, df$occurrences, col=df$col_str[1], lty=t_lty)
}
ext_int_loc=function(df, x_str)
{
pal_col=rainbow(3)
df$col_str[grepl("loc_", df$use)]=pal_col[1]
df$col_str[grepl("ext_", df$use)]=pal_col[2]
df$col_str[grepl("int_", df$use)]=pal_col[3]
acc=subset(df, subset=grepl("_access", df$use))
mod=subset(df, subset=grepl("_modify", df$use))
plot(0.5, type="n", log="y",
xaxs="i", yaxs="i",
xlim=c(0, 50), ylim=c(1, 1e5),
xlab=x_str, ylab="Functions\n")
legend(x="topright", legend=c("Function", "External", "File"), bty="n", fill=pal_col, cex=1.2)
d_ply(acc, .(use), plot_points, 1)
d_ply(mod, .(use), plot_points, 2)
}
# ext - external linkage, e.g., extern
# int - internal linkage, e.g., static
# loc - locals (technically no linkage)
# ind references to the same object (cannot remember what ind means)
ou=read.csv(paste0(ESEUR_dir, "sourcecode/obj_use.csv.xz"), as.is=TRUE)
tot_use=subset(ou, subset=!grepl("^ind_", ou$use))
ind_use=subset(ou, subset=grepl("^ind_", ou$use))
loc_use=subset(ou, subset=grepl("loc_", ou$use))
ext_int_loc(ind_use, "References to same variable")
ext_int_loc(tot_use, "References to all variable")
|
1999 Commonwealth of Independent States Cup
The 1999 Commonwealth of Independent States Cup was the seventh edition of the competition between the champions of former republics of Soviet Union. It was won by Spartak Moscow for the fourth time.
Format change
Starting with this edition of the tournament, all participating nations were split into two divisions. Eight nations which were represented in 1998 Cup quarterfinals were included in the Top Division, while the other seven nations included in the First Division. This format lasted for three years (1999–2001), before being reverted to the previous format (used from 1996 till 1998). The change was implemented to reduce the number of non-competitive games between opponents with big strength gap, such as 1998 match between Spartak Moscow and Vakhsh Qurghonteppa, which was won by the Russian side with a record-setting score 19–0.
Top Division: In the First Round, eight participants are split into two groups (A and B). Nations, whose representatives finish last in their groups, are being relegated to the First Division for the next season. Two best-placed clubs from each group will advance to the Semifinal Round, with two games between the clubs advanced from the same group being carried over from the First Round. In the Semifinal Round, clubs will play two games against two teams which qualified from the opposing First Round group. Two best clubs of the Semifinal Round table advance to the Final match.
First Division: Seven nations of the First Division are split into two groups (C and D). Unofficial participant Russia U21 national team is added to one of the groups, but their games are not counted for the official table. Nations, whose representatives win their groups, are being promoted to the Top Division for the next season.
Participants
1 FBK Kaunas replaced Žalgiris Vilnius (league's top team at the winter break), who withdrew after delegating most of its players to the national youth teams during tournament's time frame.
2 Dinamo Tbilisi were represented by youth/reserve players.
3 Tulevik Viljandi participated as a farm club of Flora Tallinn (1998 Estonian champions).
4 Spartak-2 Moscow replaced Pakhtakor Tashkent (1998 Uzbek champions), who withdrew along with other Uzbek teams.
First Division
Group C
Unofficial table
Official table
Moldova promoted to the Top Division
Results
Group D
Unofficial table
Official table
Armenia promoted to the Top Division
Results
Top Division
Group A
Georgia relegated to First Division
Results
Group B
Turkmenistan relegated to First Division
Results
Final rounds
Semifinal
Two results carried over from the First Round: Dynamo v Skonto 4–3 and Spartak v Kaunas 2–0
Results
Final
Top scorers
References
External links
1999 CIS Cup at rsssf.com
1999 CIS Cup at football.by
1999 CIS Cup at kick-off.by
1999
Category:1999 in Russian football
Category:1998–99 in Ukrainian football
Category:1998–99 in European football |
Article Surfing Archive
Acupuncture And Depression - Is It Effective? - Articles Surfing
Are you severely or mildly depressed and wondering about acupuncture and depression? According to research and case studies, acupuncture is effective in treating depression. But, did you know that there is a way to treat the depression without the needles? More on that later.
It appears that the most effective treatment for depression is medication. After all it works. I've used medication for both depression and anxiety and have had phenomenal success in both cases. However, I prefer to use natural remedies whenever possible because medications do have side effects and also introduce toxic elements into the body.
So what about acupuncture and depression? The good news is there is some scientific research that supports the effectiveness of acupuncture in decreasing the severity of depression in patients. Remember that medical research doesn't really 'prove' anything, it just supports claims. It is really hard to conclusively prove claims.
Anyway, this study was conducted by the National Institute of Health in 1998. I will not bore you with the design of the study. You can look up the study and read that for yourself. I'll just share the results it found on acupuncture and depression. In this controlled experiment, all the participants that received acupuncture for depression collectively experienced a 43% reduction in their depression symptoms, which was 21% greater than the dummy control group. This suggests that the acupuncture did something for the depression symptoms.
Theory on acupuncture and depression is this. Acupuncture states that there are energy pathways in the body called meridians. Various illnesses occur when these meridians become blocked. The acupuncturist attempts to unblock the clogged up meridians by inserting needles into certain points along these meridians. When the energy is allowed to flow again, the symptoms of the illness subside. And so it is with acupuncture and depression.
If you don't like needles but are interested in the possibilities of acupuncture and depression, there is a form of acupressure that has been found to be equally successful. No needles here. It merely involves correctly tapping certain points on special meridians with your finger tips. The best thing about this approach is you can do it yourself. You don't need to pay a professional to do it for you. Although, that option does exist.
In any event, there is a lot of promise for acupuncture and depression. With the help of a qualified psychologist you can get your symptoms under control. |
Q:
Adding a public class that extends JPanel to JFrame
Basically as the title says, I'm having a bit of an issue working out how to add a class that extends JPanel to a JFrame.
I've looked on here and on other forums, but no answer that I've tried out has work.
I've also got 3 separate files, my main.java my frame.java and panel.java (abbreviated for convenience)
Apparently it's good practice to have public classes in different files(?) or so I've been told!
I'd appreciate any help on how to actually add the JPanel to the JFrame, even just a link to some documentation I may not have seen. Also I'm open to any constructive criticisms that anyone has about the way I've entered/laid out my code.
Thanks!
main.java
public class MyGuiAttempt {
public static void main(String[] args) {
new mainFrame();
}
}
frame.java
public class mainFrame extends JFrame {
public mainFrame() {
setVisible(true);
setTitle("My Game");
setSize(800, 600);
setResizable(false);
setDefaultCloseOperation(JFrame.EXIT_ON_CLOSE);
add(mainScreenMenu); //This is where I'm clearly going wrong.
}
}
panel.java
public class mainScreenMenu extends JPanel {
public mainScreenMenu() {
JLabel homeMenuBackground = new JLabel(new ImageIcon("images/my_image.jpg"));
setPreferredSize(new Dimension(800,600));
add(homeMenuBackground);
setVisible(true);
}
}
A:
You need to create a new instance of your class
add(new mainScreenMenu());
|
Subchronic oral toxicity assessment of N-acetyl-L-aspartic acid in rats.
We investigated the systemic effects of subchronic dietary exposure to NAA in Sprague Dawley® rats. NAA was added to the diet at different concentrations to deliver target doses of 100, 250 and 500 mg/kg of body weight/day and was administered for 90 consecutive days. All rats (10/sex/group) survived until scheduled sacrifice. No diet-related differences in body weights, feed consumption and efficiency, clinical signs, or ophthalmologic findings were observed. No biologically significant differences or adverse effects were observed in functional observation battery (FOB) and motor activity evaluations, hematology, coagulation, clinical chemistry, urinalysis, organ weights, or gross pathology evaluations that were attributable to dietary exposure to NAA. Treatment-related increased incidence and degree of acinar cell hypertrophy in salivary glands was observed in both male and female rats in the high dose group. Because there was no evidence of injury or cytotoxicity to the salivary glands, this finding was not considered to be an adverse effect. Based on these results and the actual average doses consumed, the no-observed-adverse-effect-levels (NOAEL) for systemic toxicity from subchronic dietary exposure to NAA were 451.6 and 490.8 mg/kg of body weight/day for male and female Sprague Dawley® rats, respectively. |
Differential effects of diazoxide, cromakalim and pinacidil on adrenergic neurotransmission and 86Rb+ efflux in rat brain cortical slices.
The effects of diazoxide, cromakalim and pinacidil on depolarization-evoked tritium overflow from the rat brain cortical slices preloaded with [3H]noradrenaline were studied. Diazoxide inhibited both transmural nerve stimulation (TNS)- and 25 mM K(+)-evoked tritium overflows more potently than cromakalim. Diazoxide effects were only partially antagonized and cromakalim ones were totally reversed by 1 microM glibenclamide. Diazoxide, but not cromakalim, reduced the 45 mM K(+)-evoked tritium overflow, which was not antagonized by glibenclamide. Both diazoxide and cromakalim stimulated 86Rb+ efflux to a similar extent, the effects being completely abolished by glibenclamide. Glibenclamide (> or = 3 microM) by itself enhanced the TNS-evoked tritium overflow. Pinacidil increased both TNS- and K+ (25 and 45 mM)-evoked tritium overflows with little effect on 86Rb+ efflux. Pinacidil-induced increase in the TNS-evoked tritium overflow was still observed in the presence of cocaine or hydrocortisone. Pinacidil failed to affect the inhibitory action of xylazine on the TNS-evoked tritium overflow, whereas phentolamine attenuated it. These results indicate that ATP-sensitive K+ channels are present in the adrenergic nerve endings of rat brain. These channels seem to be pharmacologically different from those reported for vascular smooth muscles and pancreatic beta-cells. |
Breakdown news
* The free MOT and car wash offer is available to new customers purchasing any option in addition to roadside assistance.
The free MOT is valid for 1 Class 4 MOT test at National Tyres and Autocare (standard rate: £54.85) and must be redeemed within 13 months of purchase. The vehicle presented for testing must be registered at the same address as the breakdown cover and customers will be required to show their membership card in order to claim the offer. Failure to comply may result in the customer being charged for any MOT completed. Any work required to pass the MOT is not included in the offer.
Eligible customers will also receive 6 car wash vouchers for use at participating IMO/ARC car wash centres. Each voucher is valid for one 'Wash 3' service (standard rate: £5) that includes a hand pre-wash, wheel wash, 8 brush soft wash, dry and under car wash. The vouchers must be presented upon arrival at the IMO/ARC car wash centre and are valid until 31 October 2015. Defaced, illegible, damaged or photocopied vouchers will not be accepted. The vouchers cannot be used with any other promotion and their use is subject to the availability of the car wash facility and the terms and conditions of IMO/ARC.
We'll write to you with details on how to claim your free MOT and car wash vouchers after a validation period of 28 days from the cover purchase date. The offer ends 22 April 2015 and is not available to customers living in Northern Ireland or to those arriving from 'cashback' websites such as Quidco, TopCashback, Asperity or Greasy Palm. No cash equivalent or alternative offer is available and the AA reserves the right to withdraw or alter this promotion without prior notice at any time.
1 Source: Y&R BrandAsset™ Valuator April 2014. The AA came first in a survey of over 3000 people in the UK, ahead of the Post Office and Boots (charities excluded).
2 AA members can save up to 20% on food and drink at over 50 Moto service areas across the UK. For more information see Moto terms and conditions.
3 Source: AA Case Repair Rate September 2013 – August 2014
4 Source: AA Breakdown Cover Monthly Holdings Report, September 2014.
Which? is an independent consumer research group that has named us as a recommended breakdown provider.
Defaqto is an independent financial research company that has awarded AA breakdown services a 5-star rating.
Existing breakdown customers
Broken down?
If you have Breakdown Repair Cover (parts and garage cover) and your vehicle needs parts and/or garage labour, please see How to make a claim or call our claims helpline on 0844 579 0042.Mon–Fri 9am–6pm, Saturdays 9am–1pm
Had an accident?
For free advice following a road-traffic accident call the AA Accident Assist team on 0800 048 2678
Change or renew your breakdown cover
We'll write to you well in advance of your renewal, but if you'd like to talk to someone about renewing or changing your cover now, call:
Frequently asked questions
All you need to know about AA Breakdown Cover
About AA Breakdown Cover
How does the AA compare with other breakdown organisations?
As the UK's largest breakdown organisation, we fix more breakdowns by the roadside than anyone else. There's no charge for labour at the roadside and over 95% of our breakdown cover reviews recommend us. Members are also entitled to member benefits, which could save you more than the cost of your membership.
What are the chances of you repairing my car at the roadside?
We're able to help over 3.5 million people a year. We fix 8 out of 10 cars at the roadside using unique on-board computers to help diagnose faults when you've broken down.
How many times can I break down?
You can call us out five times in one year of cover (seven times with cover for two people or eight with family cover) without incurring any call-out charges. If you've been with us for over 12 months, you can have two additional call-outs a year.
How quickly can you reach me?
If you break down, we've got the latest satellite technology to help find the shortest route to get to you. We also give priority to people in vulnerable situations. If you download our app we can locate you by using your mobile phone's GPS signal.
Will you come out if I'm the passenger rather than the driver?
Yes, you'll be covered as a driver or a passenger. If you've got cover for you this applies for any vehicle. With vehicle cover, you'll be covered in the vehicle you've registered with us.
Are pets covered if I break down?
We'll try to accommodate pets wherever possible. If we can't transport your pet we'll do what we can to help with alternative arrangements for them. We recommend that pet owners use suitable pet travel carriers or restraints that are transferable in order to help ensure they can be transported safely.
Will family cover apply to my child when they're away at university?
Yes, students living away while studying at university or living at a temporary address are still covered under family cover.
Do you cover taxis?
Yes, but we can't offer the optional parts and garage cover to taxis or any vehicles used for reward.
Do you cover caravans and trailers?
Yes, we'll provide assistance for a caravan or trailer that's on tow at the time of a breakdown as long as it fits within our weight and width restrictions (see below).
Do you have any vehicle height and weight restrictions?
We do have some restrictions in place to make sure we can recover your vehicle if necessary. It must be under 3.5 tonnes (3,500kg) and be no wider than 7ft 6in (2.3m).
Is there a vehicle age or mileage limit?
No, we can cover vehicles of any age or mileage.
What vehicles can I cover with parts and garage cover?
We'll cover vehicles of any age or mileage as long as they aren't used for reward. This means that we can't cover vehicles such as taxis, limos or delivery vehicles.
What's Silver and Gold membership?
These are membership upgrades that provide breakdown cover enhancements to our loyal breakdown members. Please see Silver and Gold membership for more information.
Buying breakdown cover
How soon will I be covered if I apply online?
Your Roadside Assistance begins immediately after your online application has been successfully processed. If you provide your email address we'll email you confirmation of your cover. Your documents and membership card(s) will be posted to you within 28 days. Please note: cover at home, national recovery and onward travel options only start 24 hours after your membership begins. Parts and garage cover begins 14 days after your cover has started.
Can I buy cover online if I've broken down?
If you're currently broken down you can't buy cover online but you can still call us on 0800 88 77 66 or 0121 275 3746 to arrange cover and assistance. Please note: additional charges will apply if you don't already have cover when you break down.
Do I get a discount if I've got another AA product?
We have introductory offers for the first year of cover so there aren't any additional discounts available for customers who already have another AA product such as car insurance.
Can I buy breakdown cover for someone else?
If you want to arrange personal cover for someone else please call us on 0800 085 2721. However, if you just want to cover a specific vehicle you can buy vehicle cover online.
Is my online payment secure?
Yes. We use the highest form of encryption generally available to make sure your payment is safe. Our secure-server software scrambles all the details you input before they are sent, so that only we can understand them.
When are monthly payments collected?
If paying monthly, you'll pay an initial deposit by card and we'll then set up a monthly Direct Debit from your bank account. Your first Direct Debit payment will be taken in two weeks time, followed by monthly payments on or around the same date of each month.
Can I just make a one-off payment for one year of cover?
We only offer continuous payment options online as this is the easiest way to arrange cover. If you want to use a one-off payment method, please call us on 0800 085 2721.
How do I claim the free cover that came with my insurance policy?
If you've received free breakdown cover as part of your home or car insurance, visit Free Roadside Cover to claim it.
Existing breakdown customers
I've broken down but haven't received my membership card yet. What should I do?
Don't worry, just call us on 0800 887766 or 0121 275 3746 if you break down. If you bought your breakdown cover online, please remember to quote the membership number that was emailed to you at the time.
Can I change the way I pay for AA Breakdown Cover?
Yes. We provide a choice of easy payment methods. When you renew you can choose to set up a direct debit or a continuous payment by credit or debit card. These options will save you time in the future as we'll renew your cover automatically at the end of the year. You can also make a one-off payment with either a credit or debit card when renewing. We accept Visa and MasterCard. Alternatively, you can pay for your cover monthly directly from your bank account. Just call us on 0844 316 4444.
Can I make changes to my breakdown cover?
Yes. If you'd like to talk to someone about changing your cover, please call us on 0843 316 4444 or 0161 332 1789.
How do I claim the offer I've received to upgrade my cover online?
If you've received a special offer to upgrade your cover online, visit Boost your breakdown to claim it.
How do I complain about AA products or services?
If you're unhappy with our service for any reason, we really want to hear from you. Please see the information on what you need to do next.
Renewing your cover
How can I renew my breakdown cover?
We'll send you a renewal invitation about three weeks before your cover is due to expire. This will include details of your renewal and the various ways to renew. If you're not already paying on a continuous credit card or annual direct debit basis, you can choose a payment method to suit you. You'll soon be able to renew your cover online, but until then call us on 0844 316 4444.
Will I keep my existing membership number when I renew my breakdown cover?
Yes, your membership number will stay the same even if you've made changes to your cover.
How much will my renewal price be next year?
This will depend on your individual circumstances, which include things like where you live, your breakdown history and any other relevant information we hold about you as a customer of the AA Group. We'll contact you before your renewal date to let you what your renewal price will be. |
// Boost.Geometry (aka GGL, Generic Geometry Library)
// Copyright (c) 2014-2015, Oracle and/or its affiliates.
// Licensed under the Boost Software License version 1.0.
// http://www.boost.org/users/license.html
// Contributed and/or modified by Menelaos Karavelas, on behalf of Oracle
#ifndef BOOST_GEOMETRY_ALGORITHMS_DETAIL_OVERLAY_FOLLOW_LINEAR_LINEAR_HPP
#define BOOST_GEOMETRY_ALGORITHMS_DETAIL_OVERLAY_FOLLOW_LINEAR_LINEAR_HPP
#include <cstddef>
#include <algorithm>
#include <iterator>
#include <boost/range.hpp>
#include <boost/geometry/core/assert.hpp>
#include <boost/geometry/core/tag.hpp>
#include <boost/geometry/core/tags.hpp>
#include <boost/geometry/algorithms/detail/overlay/copy_segments.hpp>
#include <boost/geometry/algorithms/detail/overlay/follow.hpp>
#include <boost/geometry/algorithms/detail/overlay/inconsistent_turns_exception.hpp>
#include <boost/geometry/algorithms/detail/overlay/overlay_type.hpp>
#include <boost/geometry/algorithms/detail/overlay/segment_identifier.hpp>
#include <boost/geometry/algorithms/detail/overlay/turn_info.hpp>
#include <boost/geometry/algorithms/detail/turns/debug_turn.hpp>
#include <boost/geometry/algorithms/convert.hpp>
#include <boost/geometry/algorithms/not_implemented.hpp>
namespace boost { namespace geometry
{
#ifndef DOXYGEN_NO_DETAIL
namespace detail { namespace overlay
{
namespace following { namespace linear
{
// follower for linear/linear geometries set operations
template <typename Turn, typename Operation>
static inline bool is_entering(Turn const& turn,
Operation const& operation)
{
if ( turn.method != method_touch && turn.method != method_touch_interior )
{
return false;
}
return operation.operation == operation_intersection;
}
template <typename Turn, typename Operation>
static inline bool is_staying_inside(Turn const& turn,
Operation const& operation,
bool entered)
{
if ( !entered )
{
return false;
}
if ( turn.method != method_equal && turn.method != method_collinear )
{
return false;
}
return operation.operation == operation_continue;
}
template <typename Turn, typename Operation>
static inline bool is_leaving(Turn const& turn,
Operation const& operation,
bool entered)
{
if ( !entered )
{
return false;
}
if ( turn.method != method_touch
&& turn.method != method_touch_interior
&& turn.method != method_equal
&& turn.method != method_collinear )
{
return false;
}
if ( operation.operation == operation_blocked )
{
return true;
}
if ( operation.operation != operation_union )
{
return false;
}
return operation.is_collinear;
}
template <typename Turn, typename Operation>
static inline bool is_isolated_point(Turn const& turn,
Operation const& operation,
bool entered)
{
if ( entered )
{
return false;
}
if ( turn.method == method_none )
{
BOOST_GEOMETRY_ASSERT( operation.operation == operation_continue );
return true;
}
if ( turn.method == method_crosses )
{
return true;
}
if ( turn.method != method_touch && turn.method != method_touch_interior )
{
return false;
}
if ( operation.operation == operation_blocked )
{
return true;
}
if ( operation.operation != operation_union )
{
return false;
}
return !operation.is_collinear;
}
template
<
typename LinestringOut,
typename Linestring,
typename Linear,
overlay_type OverlayType,
bool FollowIsolatedPoints,
bool FollowContinueTurns
>
class follow_linestring_linear_linestring
{
protected:
// allow spikes (false indicates: do not remove spikes)
typedef following::action_selector<OverlayType, false> action;
template
<
typename TurnIterator,
typename TurnOperationIterator,
typename SegmentIdentifier,
typename OutputIterator
>
static inline OutputIterator
process_turn(TurnIterator it,
TurnOperationIterator op_it,
bool& entered,
std::size_t& enter_count,
Linestring const& linestring,
LinestringOut& current_piece,
SegmentIdentifier& current_segment_id,
OutputIterator oit)
{
// We don't rescale linear/linear
detail::no_rescale_policy robust_policy;
if ( is_entering(*it, *op_it) )
{
detail::turns::debug_turn(*it, *op_it, "-> Entering");
entered = true;
if ( enter_count == 0 )
{
action::enter(current_piece, linestring,
current_segment_id,
op_it->seg_id.segment_index,
it->point, *op_it, robust_policy, oit);
}
++enter_count;
}
else if ( is_leaving(*it, *op_it, entered) )
{
detail::turns::debug_turn(*it, *op_it, "-> Leaving");
--enter_count;
if ( enter_count == 0 )
{
entered = false;
action::leave(current_piece, linestring,
current_segment_id,
op_it->seg_id.segment_index,
it->point, *op_it, robust_policy, oit);
}
}
else if ( FollowIsolatedPoints
&& is_isolated_point(*it, *op_it, entered) )
{
detail::turns::debug_turn(*it, *op_it, "-> Isolated point");
action::isolated_point(current_piece, linestring,
current_segment_id,
op_it->seg_id.segment_index,
it->point, *op_it, oit);
}
else if ( FollowContinueTurns
&& is_staying_inside(*it, *op_it, entered) )
{
detail::turns::debug_turn(*it, *op_it, "-> Staying inside");
entered = true;
}
return oit;
}
template
<
typename SegmentIdentifier,
typename OutputIterator
>
static inline OutputIterator
process_end(bool entered,
Linestring const& linestring,
SegmentIdentifier const& current_segment_id,
LinestringOut& current_piece,
OutputIterator oit)
{
if ( action::is_entered(entered) )
{
// We don't rescale linear/linear
detail::no_rescale_policy robust_policy;
detail::copy_segments::copy_segments_linestring
<
false, false // do not reverse; do not remove spikes
>::apply(linestring,
current_segment_id,
static_cast<signed_size_type>(boost::size(linestring) - 1),
robust_policy,
current_piece);
}
// Output the last one, if applicable
if (::boost::size(current_piece) > 1)
{
*oit++ = current_piece;
}
return oit;
}
public:
template <typename TurnIterator, typename OutputIterator>
static inline OutputIterator
apply(Linestring const& linestring, Linear const&,
TurnIterator first, TurnIterator beyond,
OutputIterator oit)
{
// Iterate through all intersection points (they are
// ordered along the each line)
LinestringOut current_piece;
geometry::segment_identifier current_segment_id(0, -1, -1, -1);
bool entered = false;
std::size_t enter_count = 0;
for (TurnIterator it = first; it != beyond; ++it)
{
oit = process_turn(it, boost::begin(it->operations),
entered, enter_count,
linestring,
current_piece, current_segment_id,
oit);
}
#if ! defined(BOOST_GEOMETRY_OVERLAY_NO_THROW)
if (enter_count != 0)
{
throw inconsistent_turns_exception();
}
#else
BOOST_GEOMETRY_ASSERT(enter_count == 0);
#endif
return process_end(entered, linestring,
current_segment_id, current_piece,
oit);
}
};
template
<
typename LinestringOut,
typename MultiLinestring,
typename Linear,
overlay_type OverlayType,
bool FollowIsolatedPoints,
bool FollowContinueTurns
>
class follow_multilinestring_linear_linestring
: follow_linestring_linear_linestring
<
LinestringOut,
typename boost::range_value<MultiLinestring>::type,
Linear,
OverlayType,
FollowIsolatedPoints,
FollowContinueTurns
>
{
protected:
typedef typename boost::range_value<MultiLinestring>::type Linestring;
typedef follow_linestring_linear_linestring
<
LinestringOut, Linestring, Linear,
OverlayType, FollowIsolatedPoints, FollowContinueTurns
> Base;
typedef following::action_selector<OverlayType> action;
typedef typename boost::range_iterator
<
MultiLinestring const
>::type linestring_iterator;
template <typename OutputIt, overlay_type OT>
struct copy_linestrings_in_range
{
static inline OutputIt
apply(linestring_iterator, linestring_iterator, OutputIt oit)
{
return oit;
}
};
template <typename OutputIt>
struct copy_linestrings_in_range<OutputIt, overlay_difference>
{
static inline OutputIt
apply(linestring_iterator first, linestring_iterator beyond,
OutputIt oit)
{
for (linestring_iterator ls_it = first; ls_it != beyond; ++ls_it)
{
LinestringOut line_out;
geometry::convert(*ls_it, line_out);
*oit++ = line_out;
}
return oit;
}
};
template <typename TurnIterator>
static inline signed_size_type get_multi_index(TurnIterator it)
{
return boost::begin(it->operations)->seg_id.multi_index;
}
class has_other_multi_id
{
private:
signed_size_type m_multi_id;
public:
has_other_multi_id(signed_size_type multi_id)
: m_multi_id(multi_id) {}
template <typename Turn>
bool operator()(Turn const& turn) const
{
return boost::begin(turn.operations)->seg_id.multi_index
!= m_multi_id;
}
};
public:
template <typename TurnIterator, typename OutputIterator>
static inline OutputIterator
apply(MultiLinestring const& multilinestring, Linear const& linear,
TurnIterator first, TurnIterator beyond,
OutputIterator oit)
{
BOOST_GEOMETRY_ASSERT( first != beyond );
typedef copy_linestrings_in_range
<
OutputIterator, OverlayType
> copy_linestrings;
linestring_iterator ls_first = boost::begin(multilinestring);
linestring_iterator ls_beyond = boost::end(multilinestring);
// Iterate through all intersection points (they are
// ordered along the each linestring)
signed_size_type current_multi_id = get_multi_index(first);
oit = copy_linestrings::apply(ls_first,
ls_first + current_multi_id,
oit);
TurnIterator per_ls_next = first;
do {
TurnIterator per_ls_current = per_ls_next;
// find turn with different multi-index
per_ls_next = std::find_if(per_ls_current, beyond,
has_other_multi_id(current_multi_id));
oit = Base::apply(*(ls_first + current_multi_id),
linear, per_ls_current, per_ls_next, oit);
signed_size_type next_multi_id = -1;
linestring_iterator ls_next = ls_beyond;
if ( per_ls_next != beyond )
{
next_multi_id = get_multi_index(per_ls_next);
ls_next = ls_first + next_multi_id;
}
oit = copy_linestrings::apply(ls_first + current_multi_id + 1,
ls_next,
oit);
current_multi_id = next_multi_id;
}
while ( per_ls_next != beyond );
return oit;
}
};
template
<
typename LinestringOut,
typename Geometry1,
typename Geometry2,
overlay_type OverlayType,
bool FollowIsolatedPoints,
bool FollowContinueTurns,
typename TagOut = typename tag<LinestringOut>::type,
typename TagIn1 = typename tag<Geometry1>::type
>
struct follow
: not_implemented<LinestringOut, Geometry1>
{};
template
<
typename LinestringOut,
typename Linestring,
typename Linear,
overlay_type OverlayType,
bool FollowIsolatedPoints,
bool FollowContinueTurns
>
struct follow
<
LinestringOut, Linestring, Linear,
OverlayType, FollowIsolatedPoints, FollowContinueTurns,
linestring_tag, linestring_tag
> : follow_linestring_linear_linestring
<
LinestringOut, Linestring, Linear,
OverlayType, FollowIsolatedPoints, FollowContinueTurns
>
{};
template
<
typename LinestringOut,
typename MultiLinestring,
typename Linear,
overlay_type OverlayType,
bool FollowIsolatedPoints,
bool FollowContinueTurns
>
struct follow
<
LinestringOut, MultiLinestring, Linear,
OverlayType, FollowIsolatedPoints, FollowContinueTurns,
linestring_tag, multi_linestring_tag
> : follow_multilinestring_linear_linestring
<
LinestringOut, MultiLinestring, Linear,
OverlayType, FollowIsolatedPoints, FollowContinueTurns
>
{};
}} // namespace following::linear
}} // namespace detail::overlay
#endif // DOXYGEN_NO_DETAIL
}} // namespace boost::geometry
#endif // BOOST_GEOMETRY_ALGORITHMS_DETAIL_OVERLAY_FOLLOW_LINEAR_LINEAR_HPP
|
Standing up and standing out for Red Ribbon Week
Red Ribbon Week is about taking a stand against the insidious devastation of drug and alcohol abuse in our community.
It’s also about standing out in that pledge, united in an indefinite commitment toward a drug-free, healthy community.
More than 2,000 teenagers within North Idaho’s five counties are addicted to either alcohol or drugs, according to the National Center on Addiction and Substance Abuse.
Addiction affects everyone, the individuals and their families.
This year’s campaign message, The Best Me is Drug Free, is a catalyst for change. This section of the Coeur d’Alene Press is dedicated to how programs like the Good Samaritan, Daybreak Youth Services, the Anchor House and the Idaho Youth Ranch, are working toward these life-saving solutions.
Let us not only make a commitment to remaining drug free as individuals, but let’s pledge to extending a helping hand to people in our lives who are deep in their addiction and want to be helped. Sometimes just pointing a person in the right direction can set them on the path towards healing and recovery. |
Q:
Как удалить репозиторий из списка слева на главной Гитхаба?
Репозиторий не мой, я его не форкал, просто создал issue, но сейчас закрыл. От уведомлений отписался. Я им даже не пользуюсь, просто глаза мозолит. Как решить вопрос?)
A:
Пообщавшись с мужиком из саппорта, узнал от него, что в этом списке висят репозитории, с которыми мы как-либо взаимодействовали. И, внимание, удаляются они из этого списка автоматически спустя 4 месяца после взаимодействия.
|
Guest post by Joe Hoft
The DOW Reached Another All Time High Yesterday – It’s the Greatest US Stock Market Rally Ever – But Mainstream Media Won’t Report It!
It was the 12th Straight Daily Close at an All Time High for the DOW!
It was also the 19th consecutive day where the DOW reached an all time high at the closing bell. More than Half a Month of Consecutive All Time Highs!
TRENDING: RUTH BADER GINSBURG DEAD! Supreme Court Justice Dies at Home Surrounded by Family
The Dow Jones Industrial Average (DOW) hit another record new high on Monday! This incredible rally started back on February 9th.
In the history of the DOW, going back to January 1901, the DOW record for most continuous closing high trading days was set in January of 1987 when Ronald Reagan was President. The DOW set closing highs an amazing 12 times in a row that month.
Yesterday the DOW matched the All Time Historical record with its 12th Record Close in a Row!
Here are some more DOW highlights since Donald Trump was elected the 45th President of the United States:
* Economist Says Stock Market Gained $2 TRILLION in Wealth Since Trump Elected!
* The S&P 500 broke $20 Trillion for the first time in its history.
* The DOW daily closing stock market average has risen more than 13% since the election on November
8th.
* Since the Inauguration on January 20th the DOW has risen 5% . According to Fox Insider , Trump’s first month in office is the DOW’s biggest gain for any President in his first 30 Days since way back in 1909 when Taft was President.
* Including November 9th through today, there have been 74 trading days. For more than 40% of these days, the DOW has reached all time highs (31 times).
* The DOW has hit new All Time Highs 14 of 26 days since the Trump Inauguration for an amazing 54% of the closing bells.
* Also, another record during the Trump Rally is that the stock market moved between 1000 point markers (between 19,000 and 20,000) in only 42 trading days. The only time it moved faster between significant markers was in 1999 when it took 24 days to reach 11,000.
The prior All Time High for the DOW before the November 8th election was on August 15th, 2016. This is why the ‘Trump Rally’ is such an anomaly and totally due to President Trump and his winning policies.
The big news is that the main stream media is not reporting the rally!
CNN reports nothing on its home page – not even in its CNN Money Section
Nothing at CBSNews.com home page but they do have a post “Wall Street wonders: Can Trump deliver the goods?
Nothing at NBCNews.com home page.
Nothing at ABCNews.go.com. Politico.com has nothing. Nothing at MediaMatters.org.
The greatest stock market rally ever and the ‘main stream news’ and the far left blogs don’t report it. How can these people be so biased against Trump? |
1. Field of the Invention
The present invention relates to a high frequency induction heater built in an injection mold for applying a local heat to the plastic, and more specifically, to a high frequency induction heater formed on a side of a stamper by micro electromechanical system (MEMS) technologies.
2. Description of the Prior Art
The injection compression molding technology has become mature in recent years. The injection compression molding technology combines the injection molding technology with the compression molding technology. The injection compression molding technology reduces the injection pressure required when filling the plastic into the cavity. In addition, since the pressure of the melting plastic in the cavity is equally distributed, thus a sink head or a warp problem is prevented. Therefore, the shrinkage of the product is well controlled, in light or the above-mentioned advantages, the injection compression molding technology is normally employed in fabricating optical precision moldings or compact discs. For example, if the compact disc is fabricated by conventional injection molding technology, the plastic cannot be filled completely, which is known as short shot. Thus, thin moldings having large areas, such as compact discs, cannot be formed by conventional injection molding technology. At present, the compact discs are fabricated by injection compression molding technology combining with hot runner design. Since the temperature of the plastic in the sprue is relatively higher, the short shot problem is therefore avoided. U.S. Pat. No. 6,164,952 discloses a method or fabricating DVD discs using injection compression molding technology, in this patent, an inclined angle design is adopted in the cavity for improving the fluidity of the plastic. It is possible to fabricate thin moldings having large areas (diameter: 120 mm; thickness: 0.6 mm) by injection compression molding technology. However, if thinner moldings having larger areas and being coplanar (inclined angle design is not allowed) are desired, or die pattern of die stamper is more complicated (such as the molding includes via holes), and the following problem may occur: If a single sprue method is employed, the plastic cannot be completely filled into the cavity.
2. If a multiple sprue method is employed, and the temperature distribution of the molding is not equal, then the molding may have warps after being cooling.
3. The plastic flow is obstructed and split so that a seam line will generate after the plastic flow converges.
4. Since the molding has large area and thin thickness, if the fluidity of the plastic is not good, the pattern of the microstructure in the stamper will be ruined by the applied pressure.
Generally speaking, 3D micro moldings require precise micro molding injection technology. At present, one of the methods to fabricate 3D micro moldings is carried out by a micro injection machine. The micro injection machine is one of the methods to fabricate complicated and micro plastics, ceramics, and metal parts. Technologically, the injection molding technology is the first choice for fabricating 3D products with a complicated shape. Basically, the micro injection molding technologies are simply classified into 3 types: microstructure injection molding technology, micrometer-level injection molding technology, and micro injection molding technology. All of the three technologies have to overcome the problems such as micro injection machine design, micro mold manufacturing, micro mold flow analysis, micro injection process monitoring, etc. For example, the requirements for the processes of the micro injection machine are listed as follows:
1. An injection machine under 20 tons or a micro injection machine is required.
2. Short detention time is necessary for avoiding the degradation of the plastic.
3. Long injection stroke: the diameter of the screw must be as small as possible (generally the diameter of the screw of the micro injection machine is 4 mm).
4. A long and thin plunger is required.
5. High shear stress is required to lower the viscosity of the plastic.
6. High injection pressure filling is required due to a high flow length/wall thickness ratio and micro channel.
One of the largest shortcomings for the micro injection molding technology is that a precise micro injection machine is required. In addition, the design and manufacturing of the micro injection mold is not standardized yet, thus the number of the molding products cannot reach a mass amount during one single process.
In Japan Patent JP2000-218356, an external heater with sensors is employed to detect the temperature of the movable mold-half and the stationary mold-half and to heat the movable mold-half and the stationary mold-half when the mold is open. Since the fluidity of the melting metal is improved, the metal moldings having complicated structure and large areas can be formed. However, if this method is employed to form plastic moldings having complicated structure and large areas, the following problems may occur: 1. Since the mold is heated when it is open, it is easy for the mold to have an unequal temperature distribution. 2. This method is employed to inject metal material, thus the temperature is too high for plastic materials. 3. This method heats the mold entirely, thus the mold cannot be heated locally according to this method. 4. The mold is heated only when the mold is open, thus the mold temperature is controlled by prediction.
In light of the above-mentioned problems, the present invention forms a high frequency induction heater on a side of the stamper by MEMS technology. The high frequency induction heater provides two main functions. First, the high frequency induction heater applies a local heat to sections of the plastic having a thin thickness or sections having a large difference of cross sectional areas so that the plastic remains fluid. Second, when the temperature of the plastic molding is not equally distributed, the high frequency induction heater can adjust the overall temperature so that the temperature difference is reduced.
In MEMS industries, since the precise injection molding technology is mature and the cost of plastic material is cheap, polymers such as plastics are used to fabricate housings or covers. For a long time, optical wafers, bio wafers, and communication passive devices are fabricated by LIGA technology and hot embossing molding. Hans-Dieter Bauer et al. produces optical waveguide devices by LIGA technology and hot embossing molding. Since the refractive index is one of the key factors that influence the transmission of light, the precision and accuracy of the size and relative position of the optical waveguide device is important. Generally speaking, the hot embossing molding can form the optical waveguide device. However, the hot embossing molding technology cannot apply an equal pressure so that the moldings having complicated structure and large areas are not easy to be formed. In addition, the production rate is not outstanding, and the microstructure of the hot embossing mold is easy to be broken when being pressurized.
The present invention forms a high frequency induction heater on a side of the stamper such that moldings having a microstructure or large areas, such as optical wafers, bio wafers, and communication wafers, can be well defined. In combination with a substrate having MEMS devices or ICs thereon, a wafer-level package can be made. In such case, the cost of individual package will be enormously reduced. |
We have reduced support for legacy browsers.
What does this mean for me? You will always be able to play your favorite games on Kongregate. However, certain site features may suddenly stop working and leave you with a severely degraded experience.
What should I do? We strongly urge all our users to upgrade to modern browsers for a better experience and improved security.
~~For what reason?
For being a lot better than you?
20×50 = 1000, which means that half of his kills has been used for gold medal, there is no hack or cheating here.~~
Edit: sorry I misread, I have reported him to Igor. |
Q:
Customizing WooCommerce Short Description Metabox title
Can someone guide me by telling me how I can customize/change Text label in Wordpress - I recently installed WooCommerce on my wordpress, and need to change the label "Product Short Description" on the "Add Product" page to something else. Is there a way to getting this done? Please see this image for reference:
A:
To answer to your question: YES there is a working filter hook that can translate text by the internationalization functions (__(),
_e(), etc.)
Here is this code:
add_filter( 'gettext', 'theme_domain_change_excerpt_label', 10, 2 );
function theme_domain_change_excerpt_label( $translation, $original )
{
if ( 'Product Short Description' == $original ) {
return 'My Product label';
}
return $translation;
}
This code goes in function.php file of your active child theme (or theme) or also in any plugin file.
The code is tested and fully functional.
References:
gettext
Change The Title Of a Meta Box
|
Universities are to be allowed to hire staff on salaries higher than the Taoiseach’s under new measures aimed at attracting top talent to the third-level sector.
The Government recently agreed that pay restrictions should be lifted to allow colleges hire world-leading scientists and engineers on salaries of up to €250,000.
The move is aimed at attracting top academic talent from universities in the UK and elsewhere in light of the uncertainty caused by Brexit.
The move is likely to put pressure on the Government to increase salary limits for senior public servants such as members of the judiciary, gardaí and secretaries general of Government departments.
Under strict public sector pay rules, public sector employees may not earn more than the Taoiseach’s €190,000 salary. However, there is speculation that a salary of up to €300,000 is being considered for the next Garda commissioner.
Universities say they are facing major difficulties attracting top academics under public sector pay rates and have argued for the limits to be increased.
World-leading researchers
In a statement, the Department of Education confirmed a “special derogation” had recently been approved to help universities hire world-leading researchers. It said pay caps were acting as a barrier to attracting “exceptional academics” to Ireland.
While the move may lead to pressure to increase salary limits for other public servants, the department said top academic appointments will be limited to lucrative research projects funded by Science Foundation Ireland, a State body.
This will allow for the recruitment of up to 10 research professors at any one time in targeted areas of economic importance such as science, technology, engineering and maths.
While research projects will be funded by Science Foundation Ireland, it is understood the salaries of any scientists or engineers recruited will be paid for by third-level colleges themselves. This is likely to make it more difficult for the Government to argue they are ring-fenced appointments.
It is understood at least one university is in the process of hiring a key staff member under this change in policy which was formalised in recent times, according to sources. The decision to give colleges greater freedom to pay more for top-level appointments marks a significant shift in policy.
The past decade has seen greater controls placed on universities over their salaries and the number of appointments, even at a time of reduced State funding.
Greater leeway
However, universities argue they should be give greater leeway now that many of them generate the bulk of their income privately.
While there are difficulties hiring top talent, average salaries for professors in Irish universities remain very generous by international standards.
These grades range between €101,000 and €136,000, depending on the point of the scale a professor is on. This is more than average salaries for professors in countries with some of the best universities in the world, such as the UK and US.
While salaries in Ireland are capped, there is scope to provide for exceptions under a process known as the “departures framework”.
Latest figures show there are at least 17 staff working in universities on salaries of €140,000 or more which were authorised by the Government.
While more than 60 staff across higher education institutions earn more than €200,000, the vast bulk of these are academic medical consultants whose salaries are paid by the HSE. |
In Situ Visualization of Electrocatalytic Reaction Activity at Quantum Dots for Water Oxidation.
Exploring electrocatalytic reactions on the nanomaterial surface can give crucial information for the development of robust catalysts. Here, electrocatalytic reaction activity at single quantum dots (QDs) loaded silica microparticle involved in water oxidation is visualized using electrochemiluminescence (ECL) microscopy. Under positive potential, the active redox centers at QDs induce the generation of hydroperoxide surface intermediates as coreactants to remarkably enhance ECL emission from luminol derivative molecules for imaging. For the first time, in situ visualization of the catalytic activity of water oxidation with QDs catalyst was achieved, supported by a linear relation between ECL intensity and turn over frequency. A very slight diffusion trend attributed to only the luminol species proved in situ capture of hydroperoxide surface intermediates at catalytic active sites of QDs. This work provides tremendous potential in online imaging of electrocatalytic reactions and visual evaluation of catalyst performance. |
1926–27 Prima Divisione
The 1926–27 Prima Divisione was the 1st edition of a second tier tournament of the Italian Football Championship which was organized at national level.
The Carta di Viareggio
In 1926 the Viareggio Charter reformed the Italian football organization. This important document introduced in the Italian football the status of the non-amatour player receiving a reimbursement of expenses. In this way FIGC managed to mislead FIFA, that defended strenuously sportive amateurism.
The fascist Charter transformed the old Northern League into an authoritarian and national committee, the Direttorio Divisioni Superiori, appointed by the FIGC. The second level championship, which took the diminished name of Prima Divisione, consequently had to be reformed to give space to a group of clubs from the southern half of Italy.
Teams selection
The old Northern Seconda Divisione second-level championship had four local groups, so it was decided to reserve one of them for the clubs from Southern Italy in the new national Prima Divisione. More, some teams from the South were put in the first level championship too, so some Northern clubs were relegated from it. Consequently, solely half of the clubs of the old Northern second level joined the revamped cadet tournament, to give space to their Southern counterparts.
In Southern Italy the situation was different. There, the previous reform of 1921-1922 did not take place, so the pyramid of 1912 had been maintained, with the Prima Divisione, former Prima Categoria, as the sole tournament above the regional level. So, in a lexical continuity, the old Prima Divisione remained the bulk of new one, excluding three promoted teams and the last relegated ones, but with the relevant difference of the elimination of the regional qualifications.
Group A
Novara promoted to 1927–28 Divisione Nazionale.
Speranza Savona relegated, later merged into Savona.
Group B
Pro Patria promoted to 1927–28 Divisione Nazionale.
Udinese later readmitted.
Results
Group C
Reggiana promoted to 1927–28 Divisione Nazionale.
Anconitana later readmitted.
Results
Group D
Events
Lazio promoted to 1927–28 Divisione Nazionale.
Bankruptcies
Ilva Bagnolese and Casertana both bankrupted.
Palermo relegated and bankrupted.
Mergers
Pro Italia Taranto merged with Audace Taranto into Taranto.
Roman merged with Alba and Fortitudo into Roma.
Final Group
Novara champions 1926-27.
Results
References
Category:Serie B seasons
2
Italy |
Tuesday, April 22, 2014
China Turns Zinc Into Car Parts as Consumer Demand Surges
Record spending by Chinese consumers on new refrigerators, cars and laptops is boosting zinc demand, creating the biggest production shortfall for the metal in eight years.
Demand for zinc used in everything from steel auto parts and brass plumbing fixtures to rubber and sunscreen will exceed output by 117,000 metric tons this year, almost double the 2013 deficit, the International Lead and Zinc Study Group estimates. Morgan Stanley predicts prices in London will rise more than any other industrial metal in 2015.
Chinese producers including Baiyin Nonferrous Metals Co. are restarting smelters they closed last year as stockpiles tracked by the London Metal Exchange shrink to a two-year low. While the economy is slowing in China, the world’s biggest user, growth is more than twice the rate of the U.S. as Premier Li Keqiang seeks to spur consumer spending and car sales increase by double-digits.
“The supply-and-demand picture has really improved,” said Sameer Samana, a St. Louis-based international strategist at Wells Fargo Advisors LLC, which oversees about $1.4 trillion. “Inventories have come down, and we’re starting to see the very beginning of demand rebounding.”
Zinc for delivery in three months on the LME is up 0.3 percent this year at $2,060.50 a ton, after slipping 1.2 percent in 2013. An LME index tracking zinc, copper, aluminum, nickel, lead and tin is down 2.5 percent. The Standard & Poor’s GSCI (SPGSCI) Spot Index of 24 commodities rose 4.3 percent. The MSCI All-Country World Index of equities climbed 0.6 percent, and the Bloomberg Treasury Bond Index rose 1.9 percent.
Cash Prices
Annual average cash prices on the LME may climb 13 percent to $2,331 in 2015 from $2,066 in 2014, more than the other five industrial metals on the bourse, Morgan Stanley estimated in an April 8 report. Barclays Plc forecast a price of $2,400 in a March 26 report. Zinc averaged $2,024.65 this year.
Use of the metal will expand 4.5 percent to 13.6 million tons this year, while refinery output will increase 4.4 percent to 13.5 million tons, the zinc study group said in an April 2 report. Deutsche Bank AG sees a gap of 400,000 tons, forecasting demand growth at 5.4 percent, up from 4 percent last year.
China will use 7 percent more zinc this year, according to Barclays. The nation now accounts for 44 percent of the world total compared with 16 percent in 2000, the study group estimates. Imports rose 21 percent last year, customs data show.
Chinese Consumer
Li wants Chinese shoppers to have a bigger role in the economy. The government will employ “a comprehensive set of policies to boost consumer spending, raise people’s spending power, increase consumption of goods and services and reduce distribution costs so that consumption can provide greater support for economic development,” he said on April 10.
The shift will provide a bigger jolt to purchases of zinc than for copper and iron ore, said Samya Beidas-Strom, a senior economist at the Washington-based International Monetary Fund.
“Metals move with per capita income,” Beidas-Strom said in a telephone interview. “As the Chinese people start buying more washing machines and fridges and cars, they will use more metals that go into durable goods,” including zinc, she said.
About half of the metal’s use is for consumer products, electrical appliances and transportation, the zinc study group estimates.
Household Spending
China’s per-capita urban household spending climbed 8.1 percent in 2013 to the highest since Bloomberg began collating the data in 2002. In terms of zinc demand, the nation is following the same track as South Korea, Asia’s third-largest user, where consumption has surged in line with per-capita income, Beidas-Strom said.
By contrast, Chinese demand for copper will slow to 5.7 percent this year and 5.5 percent in 2015, from 7.3 percent last year, according to Morgan Stanley. Prices will slip to $6,200 a ton over the next 12 months from $6,649 today, Goldman Sachs Group Inc. said in an April 13 report.
Prospects for a slowing economy are still a concern, with 55 economists surveyed by Bloomberg forecasting 2014 growth at 7.4 percent, which would be the weakest since 1990. While China last month set an expansion target at 7.5 percent, the same as last year, that’s less than the 7.7 percent reached in 2013. There’s already speculation it will miss its goal. Growth eased to 7.4 percent in the first three months.
Outside Exchanges
Chinese demand may also be “overstated” as unreported stock building is confused for consumption, Citigroup Inc. said in an April 14 report. Signs of declining inventory in exchange warehouses may be driven by traders seeking to take advantage of lower rental rates in non-exchange storage, the bank said.
The market “continues to struggle under what we believe is a considerable volume of reported and unreported zinc inventory,” according to the bank, which forecasts the metal will remain in a range of $1,900 to $2,100 a ton this year. It forecasts stronger prices in 2015, rising as high as $2,400.
While stockpiles on the Shanghai Futures Exchange are 40 percent below the record high reached in 2011, they rose about 5 percent this year, according to bourse data.
About a quarter of zinc goes into transportation, mostly cars. Vehicle sales in the top market will grow 10 percent a year through 2020 and reach 40 million units annually after reaching 22 million last year, according to the China Association of Automobile Manufacturers.
Inventories
The ratio of global stockpiles to usage, a measure of how long inventories would last, will drop to 4.4 weeks by 2015, the lowest since 2008, Morgan Stanley forecasts. LME inventory is now 35 percent below an 18-year high in 2012, after slipping 14 percent to 801,500 tons this year.
Mine output will grow 5.9 percent in 2014, with gains slowing to 3.9 percent in 2015 and 0.5 percent in 2019, the bank estimates. New capacity arriving in a timely fashion and at reasonable cost could prove “a challenge,” Morgan Stanley says. The long-term incentive price needed to attract new developments is $2,740 a ton on a nominal basis, it said.
Baiyin Nonferrous Metals, China’s sixth-biggest smelter, last month started one of two plants in Gansu province it shut in August as prices fell. The 100,000 ton-a-year plant resumed operations on March 26, with the other still idled, Zhang Jinlong, a company spokesman, said April 15.
‘Zinc Cycle’
“Commodities move in cycles, and the zinc cycle has been bad for some time now,” said John Kinsey, a fund manager at Caldwell Securities Ltd. in Toronto, which oversees C$1 billion ($908 million). “When these things happen, the marginal mines close, and so that reduces supply. This is a better year for zinc because supply and demand is in better balance.”
For Shenzhen Zhongjin Lingnan Nonfemet Co. (000060), China’s third-largest producer, improving demand means it can keep mining and smelting at full capacity. Operating profit, which shrank 50 percent to 481.4 million yuan ($77.4 million) in fiscal 2013, will rise 4.5 percent this year and 15 percent in 2015, the average of four estimates compiled by Bloomberg shows.
“We would hope operating profit will increase by 10 to 15 percent this year,” said Wu Xijun, the senior analyst at Shenzhen Zhongjin. “Zinc consumption will remain strong in the next ten years.” |
The invention relates to hydroxy-functional (meth)acrylic copolymers having an OH value from 40 to 260 mg KOH/g, a number average molecular mass (Mn) from 1500 to 20000 g/mole and a glass transition temperature Tg from −40° C. to 80° C., containing
B) at least one compound having a carboxyl group and at least one hydroxyl group in the molecule that is reacted with the epoxy functional group of the polymerized olefincially unsaturated monomers,
C) at least one additional polymerized olefinically unsaturated monomer capable of radical polymerization which is different from component A) and
D) optionally at least one lactone reacted with the polymer.
It also relates to processes for making the copolymers and to coating compositions that contain the hydroxy-functional (meth)acrylic copolymers and to the use thereof in multi-layer automotive coatings.
WATER-DILUTABLE COATING BASED ON POLYOLS AND POLYISOCYANATES, PROCESS FOR PREPARING THE SAME AND ITS USE.
Primary Examiner:
Tarazano, Lawrence D.
Attorney, Agent or Firm:
Fricke, Hilmar L.
Claims:
What is claimed is:
1. Hydroxy-functional (meth)acrylic polymers having an OH value from 40 to 260 mg KOH/g and a number average molecular mass (Mn) from 1500 to 20000 g/mole, comprising components A) polymerized monomers of at least one epoxy-functional, olefinically unsaturated monomer, B) at least one compound having a carboxyl group and at least one hydroxyl group being reacted with the epoxy-functional group of the polymerized olefinic unsaturated monomers, C) at least one additional polymerized olefinically unsaturated monomer being different from component A) and D) optionally at least one lactone being reacted with the polymer.
2. Hydroxy-functional (meth)acrylic polymers according to claim 1, having an OH value from 80 to 220 mg KOH/g, a number average molecular mass (Mn) from 2000 to 15000 g/mole and a glass transition temperature Tg from −40° C. to 80° C.
6. Hydroxy-functional (meth)acrylic polymers according to claim 1, in which component B) is selected from the group consisting of hydroxymonocarboxylic acids, reaction products of hydroxymonocarboxylic acids and lactones, reaction products of hydroxymonocarboxylic acids and acid anhydrides which are reacted in a further reaction with epoxy-functional compounds, and mixtures of the said compounds.
7. Hydroxy-functional (meth)acrylic polymers according to claim 3 in which component C) comprises C1) 0 to 60 wt-% of at least one alkyl (meth)acrylate, C2) 0 to 50 wt-% of at least one vinylaromatic hydrocarbon, C3) 0 to 30 wt-% of at least one hydroxy-functional olefinically unsaturated monomer, C4) 0 to 20 wt-% of at least one further olefmically unsaturated monomer which is different from C1), C2) and C3), and the sum of the proportions of A), B), C1), C2), C3) and C4) being 100 wt-%.
8. Hydroxy-functional (meth)acrylic polymers according to claim 4 in which component C) comprises C1) 0 to 60 wt-% of at least one alkyl (meth)acrylate, C2) 0 to 50 wt-% of at least one vinylaromatic hydrocarbon, C3) 0 to 30 wt-% of at least one hydroxy-functional olefinically unsaturated monomer, C4) 0 to 20 wt-% of at least one further olefinically unsaturated monomer which is different from C1), C2) and C3), and the sum of the proportions of A), B), C1), C2), C3) C4) and D) being 100 wt-%.
9. Process for the preparation of the hydroxy-functional (meth)acrylic polymers according to claim 1, wherein the epoxy-functional (meth)acrylic polymer is prepared by radical polymerization of component A) and component C), and in which the polymer is further reacted with component B), the reaction with component B) taking place before, during and/or after the polymerization reaction.
10. Process for the preparation of the hydroxy-functional (meth)acrylic polymers according to claim 1, wherein the epoxy-functional (meth)acrylic polymer is prepared by radical polymerization of component A) and component C), and in which the polymer is further reacted with component B) and then with component D), the reaction with component B) taking place before, during and/or after the polymerization reaction.
In automotive coatings in particular, there is a need for coating compositions which produce flexible, scratch resistant and chemical and acid resistant coatings. It is already known from the prior art that scratch resistant coatings can be obtained by using hydroxy-functional (meth)acrylic copolymers whose hydroxyl groups are modified with lactones.
For example, coating compositions for automotive coatings that are based on epsilon caprolactone-modified (meth)acrylic copolymers and aminoplastic cross-linking agents are described in U. S. Pat. No. 4,546,046. The (meth)acrylic copolymers are prepared from carboxy-functional or hydroxy-functional unsaturated monomers, unsaturated monomers without further functionality, and epsilon caprolactone. The modification with epsilon caprolactone may be carried out in various ways: epsilon caprolactone may be added directly to the unsaturated monomers, or the addition is made only after polymerization of the unsaturated monomers. Similarly, pre-adducts of epsilon caprolactone and hydroxy-or carboxy-functional unsaturated monomers may be formed and then polymerized with further unsaturated-monomers;
Coating compositions of the binders thus prepared produce flexible coatings with good scratch resistance but insufficient acid resistance. Also, when the above-mentioned coating compositions are applied as clear coats, particularly to solvent-based base coats, the base coat is partially dissolved by the clear coat.
This invention provides hydroxy-functional binders based on (meth)acrylic copolymers which, when used in one-component and two-component coating compositions, produce flexible scratch resistant coatings with very good chemical and acid resistance. When applied as a clear coat to solvent-based base coats in particular, there is no or only a slight dissolution of the base coat.
SUMMARY OF THE INVENTION
The invention is directed to hydroxy-functional (meth)acrylic copolymers having an OH value from 40 to 260 mg KOH/g, a number average molecular mass (Mn) from 1500 to 20000 g/mole and a glass transition temperature Tg from −40° C. to 80° C., comprising
at least one compound having a carboxyl group and at least one hydroxyl group in the molecule that is reacted with the epoxy-functional group of the polymerized olefinically unsaturated monomers (component B),
at least one additional polymerized olefinically unsaturated monomer capable of radical polymerization (component C) which is different from component A, and
optionally, at least one lactone (component D) reacted with the polymer.
The invention also is directed to a process for the preparation of the hydroxy-functional (meth)acrylic copolymers, wherein the copolymer is formed by radical polymerization of epoxy functional, olefinically unsaturated monomers (component A) and at least on additional polymerizable olefinically unsaturated monomer (component C) and at least a part of the hydroxyl groups are introduced into the copolymer by reaction of the epoxy group of the epoxy-functional, olefinically unsaturated monomer (component A) with compounds having a carboxyl group and at least one hydroxyl group (component B). The hydroxyl groups introduced in this way are situated in the copolymer side chain and result from the hydroxyl groups originating from component B and the secondary hydroxyl groups obtained during the ring-opening reaction of the epoxy groups of component A) with the carboxyl groups of component B).
DETAILED DESCRIPTION OF THE EMBODIMENTS
The term (meth)acrylic as used here and hereinafter should be taken to mean methacrylic and/or acrylic.
Surprisingly, it was found that hydroxy-functional (meth)acrylic copolymers prepared in this way, when used in coating compositions, form coatings having, in particular, a balanced ratio between good acid resistance and good scratch resistance.
The hydroxy-functional (meth)acrylic copolymers contain at least one further olefinically unsaturated monomer capable of radical polymerization (component C) which is different from component A).
Preferred hydroxy-functional (meth)acrylic copolymers have an OH value from 80 to 220 mg KOH/g, a number average molecular mass Mn from 2000 to 15000 g/mole, especially preferred from 4000 to 12000 g/mole and a glass transition temperature Tg from −40° C. to 60° C. Component A) is contained preferably in an amount from 1 to 90 wt-%, component B) from 1 to 80 wt-% and component C) from 5 to 80 wt-% in the hydroxy-functional (meth)acrylic copolymers, the proportions by weight of components A), B) and C) totaling 100 wt-%.
Further preferred hydroxy-functional (meth)acrylic copolymers also contain at least one lactone (component D). The at least one lactone may be present preferably in an amount from 2 to 50 wt-%, particularly preferably 5 to 30 wt-%, based on the total amount of components A), B), C) and D), the proportions by weight of components A), B), C) and D) totaling 100 wt-%.
The compounds having a carboxyl group and at least one hydroxyl group (component B) are, for example, hydroxymonocarboxylic acids having at least one hydroxyl group, preferably hydroxymonocarboxylic acids having 1 to 3 hydroxyl groups. The hydroxyl groups may be primary or secondary hydroxyl groups. The hydroxymonocarboxylic acids may be linear or branched, saturated or unsaturated. They may for example be hydroxymonocarboxylic acids having 2 to 20 carbon atoms in the molecule.
Further suitable compounds having a carboxyl group and at least one hydroxyl group are reaction products of hydroxymonocarboxylic acids and lactones. The lactones undergo an addition reaction with the hydroxyl group. Suitable hydroxycarboxylic acids are those already mentioned above. Examples of suitable lactones are those containing 3 to 15 carbon atoms in the ring and where the rings may also have various substituents. Preferred lactones are gamma butyrolactone, delta valerolactone, epsilon caprolactone, beta hydroxy-beta-methyl-delta valerolactone, lambda laurinlactone or mixtures thereof. Epsilon caprolactone is particularly preferred.
Further compounds having a carboxyl group and at least one hydroxyl group are compounds which contain ester groups in addition to the carboxyl group and the at least one hydroxyl group. Such compounds C) may be obtained, for example, by reaction of the above-mentioned hydroxymonocarboxylic acids with acid anhydrides and further reaction of the compounds thus obtained with epoxy-functional compounds, e.g., olefinically unsaturated epoxy-functional compounds. Examples of suitable olefinically unsaturated epoxy-functional compounds are those mentioned above in the description of component A). Examples of suitable acid anhydrides are phthalic anhydride, hexahydrophthalic anhydride, succinic anhydride, methylhexahydrophthalic anhydride, tetrahydrophthalic anhydride and methyltetrahydrophthalic anhydride.
Further highly suitable unsaturated monomers are vinylaromatic hydrocarbons, preferably those having 8 to 9 carbon atoms in the molecule. Examples of such monomers are styrene, alpha-methylstyrene, chlorostyrenes, vinyltoluenes, 2,5-dimethylstyrene, p-methoxystyrene and tertiary butylstyrene. Styrene is used in preference.
It is also possible to use small proportions of olefinically polyunsaturated monomers. These are monomers having at least 2 double bonds capable of radical polymerization. Examples thereof are divinylbenzene, 1,4-butane diol diacrylate, 1,6-hexanediol diacrylate, neopentylglycol dimethacrylate, glycerol dimethacrylate.
Further suitable unsaturated monomers are those monomers that, apart from an olefinic double bond, contain additional functional groups. Additional functional groups may be, for example, hydroxyl groups. Hydroxy-functional unsaturated monomers may be used in cases where the hydroxy-functional (meth)acrylic copolymers according to the invention are required to contain additional hydroxyl groups which are not introduced into the (meth)acrylic copolymer by reaction of the epoxy-functional unsaturated monomers (component A) with compounds having a carboxyl group and at least one hydroxyl group (component B). Examples of suitable hydroxy-functional unsaturated monomers are hydroxyalkyl esters of alpha, beta-olefinically unsaturated monocarboxylic acids having primary or secondary hydroxyl groups. Examples include the hydroxyalkyl esters of acrylic acid, methacrylic acid, crotonic acid and/or isocrotonic acid. The hydroxyalkyl esters of (meth)acrylic acid are preferred. The hydroxyalkyl radicals may contain for example, 1 to 10 carbon atoms, preferably 2 to 6 carbon atoms. Examples of suitable hydroxyalkyl esters of alpha, beta-olefinically unsaturated monocarboxylic acids having primary hydroxyl groups are hydroxyethyl (meth)acrylate, hydroxypropyl (meth)acrylate, hydroxybutyl (meth)acrylate, hydroxyamyl (meth)acrylate, and hydroxyhexyl (meth) acrylate. Examples of suitable hydroxyalkyl esters having secondary hydroxyl groups are 2-hydroxypropyl (meth)acrylate, 2-hydroxybutyl (meth)acrylate, and 3-hydroxybutyl (meth)acrylate.
Further hydroxy-functional unsaturated monomers which may be used are reaction products of alpha, beta-unsaturated monocarboxylic acids with glycidyl esters of saturated monocarboxylic acids branched in the alpha position, e.g., with glycidyl esters of saturated alpha-alkylalkane monocarboxylic acids or alpha, alpha′-dialkylalkane monocarboxylic acids. These are preferably the reaction products of (meth)acrylic acid with glycidyl esters of saturated alpha,alpha′-dialkylalkane monocarboxylic acids having 7 to 13 carbon atoms in the molecule, particularly preferably having 9 to 11 carbon atoms in the molecule. The formation of these reaction products may take place before, during or after the copolymerization reaction.
Further hydroxy-functional unsaturated monomers, which may be used, are reaction products of hydroxyalkyl (meth)acrylates with lactones. At least a part of the hydroxyalkyl esters of alpha, beta-unsaturated monocarboxylic acids described above may be modified in this way. This takes place by means of an esterification reaction, which proceeds with ring opening of the lactone. Again, hydroxyl groups in the form of hydroxyalkyl ester groups corresponding to the lactone in question are formed in the terminal position during the reaction. Examples of suitable hydroxyalkyl (meth)acrylates are those mentioned above. Examples of suitable lactones are those containing 3 to 15 carbon atoms in the ring and where the rings may also have various substituents. Preferred lactones are gamma butyrolactone, delta valerolactone, epsilon caprolactone, beta-hydroxy-beta-methyl-delta valerolactone, lambda laurinlactone or mixtures thereof. Epsilon caprolactone is particularly preferred. The reaction products are preferably those of one mole of a hydroxyalkyl ester of an alpha, beta-unsaturated monocarboxylic acid and 1 to 5 mole, preferably on average 2 mole, of a lactone. The modification of the hydroxyl groups of the hydroxyalkyl esters with the lactone may take place before, during or after the copolymerization reaction has been carried out.
The preparation of the hydroxy-functional (meth)acrylic copolymers according to the invention may take place by radical copolymerization. This may be carried out in a manner known to the skilled person by conventional processes, e.g., bulk, solution or pearl polymerization, particularly by radical solution polymerization using radical initiators. Examples of suitable radical initiators are dialkyl peroxides, diacyl peroxides, hydroperoxides such as cumene hydroperoxide, peresters, peroxydicarbonates, perketals, ketone peroxides, azo compounds such as 2,2′-azo-bis-(2,4-dimethylvaleronitrile), azo-bis-isobutyronitrile, C-C-cleaving initiators such as, e.g., benzpinacol derivatives. The initiators may be used in amounts from 0.1 to 4.0 wt-%, for example, based on the initial monomer weight.
The solution polymerization process is generally carried out in such a way that the solvent is charged to the reaction vessel, heated to boiling point and the monomer/initiator mixture is metered in continuously over a particular period. Polymerization is carried out preferably at temperatures between 60° C. and 200° C. and more preferably at 130° C. to 180° C.
Examples of suitable organic solvents which may be used advantageously in solution polymerization and also later in the coating compositions according to the invention include: glycol ethers such as ethylene glycol dimethylether; propylene glycol dimethylether; glycol ether esters such as ethyl glycol acetate, butyl glycol acetate, 3-methoxy-n-butyl acetate, butyl diglycol acetate, methoxy propyl acetate, esters such as butyl acetate, isobutyl acetate, amyl acetate; ketones, such as methyl ethyl ketone, methyl isobutyl ketone, cyclohexanone, isophorone, aromatic hydrocarbons (e.g. with a boiling range from 136° C. to 180° C.) and aliphatic hydrocarbons.
Chain transfer agents such as, e.g., mercaptans, thioglycolates, cumene or dimeric alpha methylstyrene may be used to control the molecular weight.
Preferred (meth)acrylic copolymers according to the invention contain:
B) 5 to 70 wt-% of at least one compound having a carboxyl group and at least one hydroxyl group selected from the group comprising hydroxymonocarboxylic acids, reaction products of hydroxymonocarboxylic acids and lactones, reaction products of hydroxymonocarboxylic acids and acid anhydrides which are reacted in a further reaction with epoxy-functional monomers, and mixtures of the above-mentioned compounds, and
C) 5 to 80 wt-% of at least one additional polymerizable olefinically unsaturated monomer selected from the following:
C1) 0 to 60 wt-% of at least one alkyl (meth)acrylate,
C2) 0 to 50 wt-% of at least one vinylaromatic hydrocarbon,
C3) 0 to 30 wt-% of at least one hydroxy-functional olefinically unsaturated monomer,
C4) 0 to 20 wt-% of at least one additional olefinically unsaturated monomer which is different from A) C1), C2) and C3), and
D) 0 to 50 wt-% of at least one lactone,
the sum of the proportions of components A), B), C1), C2), C3), C4) and D) being 100 wt-%.
Particularly preferred (meth)acrylic copolymers according to the invention are those containing:
Hydroxy-functional (meth)acrylic copolymers used in particular preference are those which contain, as component B), reaction products of hydroxymonocarboxylic acids and lactones and those which contain, as component B), hydroxymonocarboxylic acids in which at least a part of the hydroxyl groups introduced into the hydroxy-functional (meth)acrylic copolymer by means of the hydroxymonocarboxylic acids is modified in a secondary reaction with lactones (component D). Naturally, the compounds, which may be used as component B) may in each case generally, be used on their own or in combination.
The preparation of the hydroxy-functional (meth)acrylic copolymers according to the invention may take place in various ways. Preferably, a copolymer is prepared from component A) and component C). According to a first embodiment, the preparation may involve initially preparing an epoxy-functional (meth)acrylic copolymer from components A) and C), which is then reacted with component B). The epoxy-functional (meth)acrylic copolymers prepared from components A) and C) by radical copolymerization preferably have an OH value from 0 to 130, preferably from 0 to 80 mg KOH/g, a calculated epoxy equivalent weight from 142 to 2800 g/mole, preferably from 230 to 980 g/mole and a number-average molecular weight (Mn) from 1500 to 10000 g/mole, preferably from 2000 to 5000 g/mole.
The reaction of the epoxy-functional (meth)acrylic copolymers obtained in the first stage by radical copolymerization with compounds having a carboxyl group and at least one hydroxyl group (component B) takes place generally at temperatures from 60° C. to 200° C., preferably at 120° C. to 180° C. The equivalent ratio of epoxy groups to carboxyl groups may be, for example, 1:2 to 2:1, preferably 1:1 to 1:0.92. The reactants should be used in such a way that an epoxy equivalent weight of more than 6000 and an acid value of less than 10 is preferably obtained.
Another possibility of preparing the hydroxy-functional (meth)acrylic copolymers according to the invention involves providing a charge of the compounds having a carboxyl group and at least one hydroxyl group (component B) and then polymerizing the olefinically unsaturated monomers (components A) and C) in the presence of said component.
A third possibility of preparing the hydroxy-functional (meth)acrylic copolymers according to the invention involves initially reacting at least a part of the epoxy-functional unsaturated monomers (component A) with at least part of the compounds having a carboxyl group and at least one hydroxyl group (component B) to obtain a preliminary product followed by polymerization with further unsaturated monomers (component C) and optionally remaining epoxy-functional unsaturated monomers (component A). The hydroxy-functional (meth)acrylic copolymer optionally still containing epoxy functions may then be reacted with optionally present residual amounts of component B).
A fourth possibility of preparing the hydroxy-functional (meth)acrylic copolymers according to the invention again involves initially preparing an epoxy-functional (meth)acrylic copolymer from components A) and C) and then reacting this with compounds having a carboxyl group and at least one hydroxyl group (component B), wherein substantially only hydroxymonocarboxylic acids are used as component B) in the latter stage. The hydroxyl groups of the hydroxy-functional (meth)acrylic copolymers thus obtained are then modified at least partially with lactones (component D) and/or acid anhydrides. The third possibility of preparing the hydroxy-functional (meth)acrylic copolymers according to the invention may also be modified in a similar way, again by using substantially only hydroxymonocarboxylic acids as component B) and then modifying the hydroxyl groups of the hydroxy-functional (meth)acrylic copolymers obtained at least partially with lactones (component D) and/or acid anhydrides.
Optionally, catalysts may be used for the reaction of the epoxy groups of the epoxy-functional (meth)acrylic copolymers with the carboxyl groups of component B). Examples of catalysts are metal hydroxides such as, e.g., lithium hydroxide, potassium hydroxide, sodium hydroxide and quaternary ammonium salts such as, e.g., alkylbenzyldimethyl ammonium chloride, benzyltrimethyl ammonium chloride, methyltrioctyl ammonium chloride and tetraethyl ammonium bromide.
Antioxidants may also be added to the (meth)acrylic copolymers according to the invention, e.g., phosphorus compounds such as phosphites or phosphonates.
Solvent-based coating compositions may be prepared from the hydroxy-functional (meth)acrylic copolymers according to the invention. The coating compositions may contain one or more cross-linking agents for the hydroxy-functional (meth)acrylic copolymers. Depending on the type of cross-linking agents, one-component or two-component coating compositions may be prepared. The invention also relates, therefore, to coating compositions, which contain the hydroxy-functional (meth)acrylic copolymers according to the invention and optionally at least one cross-linking agent component. As a suitable cross-linking agent component compounds having groups which are reactive towards hydroxyl groups may be used. For example, these may be polyisocyanates having free isocyanate groups, polyisocyanates having at least partially blocked isocyanate groups, aminoresins and/or tris-(alkoxycarbonylamino)triazines, such as, e.g., 2,4,6-tris-(methoxycarbonylamino)-1,3,5-triazine and 2,4,6-tris-(butoxycarbonylamino)-1,3,5,-triazine.
Examples of the polyisocyanates include any organic polyisocyanates having aliphatically, cycloaliphatically, araliphatically and/or aromatically bound free isocyanate groups. The polyisocyanates are liquid at room temperature or liquefied by the addition of organic solvents. The polyisocyanates generally have a viscosity from 1 to 1 to 6,000 mPas at 23° C., preferably more than 5 and less than 3,000 mPas.
Polyisocyanates of this kind are known to the skilled person and described, for example, in DE-A 38 29 587 and DE-A 42 26 243.
The polyisocyanates are preferably polyisocyanates or polyisocyanate mixtures having exclusively aliphatically and/or cycloaliphatically bound isocyanate groups having an average NCO functionality from 1.5 to 5, preferably 2 to 4.
Particularly suitable examples are the so-called “coating polyisocyanates” based on hexamethylene diisocyanate (HDI), 1-isocyanato-3,3,5-trimethyl-5-isocyanatomethyl-cyclohexane (IPDI) and/or bis(isocyanatocyclohexyl)-methane and the inherently known derivatives of said diisocyanates having biuret, allophanate, urethane and/or isocyanurate groups from which, after their preparation, excess starting diisocyanate is removed, preferably by distillation, to obtain a residual content of less than 0.5 wt-%. Triisocyanates such as nonane triisocyanate may also be used.
In principle, diisocyanates may be reacted in the usual way to higher functionality compounds, for example, by trimerization or by reaction with water or polyols, such as, e.g., trimethylolpropane or glycerin.
The polyisocyanate cross-linking agents may be used on their own or in mixture. They are the conventional polyisocyanate cross-linking agents in the coating industry which are described comprehensively in the literature and are also available as commercial products.
The polyisocyanates may also be used in the form of isocyanate-modified resins.
Blocked or partially blocked polyisocyanates may also be used as the cross-linking component. Examples of blocked or partially blocked isocyanates are any di- and/or polyisocyanates in which the isocyanate groups or a part of the isocyanate groups have been reacted with compounds containing active hydrogen. Di-and/or polyisocyanates used may also be corresponding prepolymers containing isocyanate groups. These are, for example, aliphatic, cycloaliphatic, aromatic, optionally also sterically hindered polyisocyanates, as already described above. Trivalent aromatic and/or aliphatic blocked or partially blocked isocyanates having a number average molecular mass of, e.g., 500 to 1,500 are preferred. Low molecular weight compounds containing acid hydrogen are well known for blocking NCO groups. Examples thereof are aliphatic or cycloaliphatic alcohols, dialkylamino alcohols, oximes, lactams, imides, hydroxyalkyl esters, malonates or acetates.
Amino resins are also suitable as cross-linking agents. These resins are prepared according to the prior art and are supplied by many companies as sales products. Examples of such amino resins include amine-formaldehyde condensation resins, which are obtained by reaction of aldehydes with melamine, guanamine, benzoguanamine or dicyandiamide. The alcohol groups of the aldehyde condensation products are then etherified partially or wholly with alcohols.
More particularly, cross-linking agents used are polyisocyanates having free isocyanate groups and polyisocyanates having blocked isocyanate groups, the latter optionally in combination with melamine resins.
The coating compositions may contain additional hydroxy-functional binders apart from the hydroxy-functional (meth)acrylic copolymers according to the invention. For example, the additional hydroxy-functional binders may be hydroxy-functional binders well known to the skilled person, of the kind used for the formulation of solvent-based coating compositions. Examples of additional suitable hydroxy-fuinctional binders include hydroxy-functional polyester, alkyd, polyurethane and/or poly(meth)acrylic resins which are different from the (meth)acrylic copolymers according to the invention. The additional hydroxy-functional binders may also be present in the modified form, e.g., in the form of (meth)acrylated polyesters or (meth)acrylated polyurethanes. They may be used on their own or in a mixture. The proportion of additional hydroxy-functional binders may be 0 to 50 wt-%, for example, based on the amount of hydroxy-functional (meth)acrylic copolymers used according to the invention. The coating compositions may also contain low molecular weight reactive components, so-called reactive diluents that are capable of reacting with the cross-linking agent components in question. Examples of these include hydroxy- or amino-functional reactive diluents.
The hydroxy-functional (meth)acrylic copolymers and the corresponding cross-linking agents are used in each case in such quantity ratios that the equivalent ratio of hydroxyl groups of the (meth)acrylic copolymers to the groups of cross-linking agent components which are reactive towards hydroxyl groups is 5:1 to 1:5, for example, preferably 3:1 to 1:3, particularly preferably 1.5:1 to 1:1.5. If further hydroxy-functional binders and reactive thinners are used, their reactive functions should be taken into consideration when calculating the equivalent ratio.
The coating compositions according to the invention contain organic solvents. The solvents may originate from the preparation of the binders or they may be added separately. They are organic solvents typical of those used for coatings and well known to the skilled person, for example, those already mentioned above for the preparation of solution polymers.
The coating compositions may contain conventional coating additives. The additives are the conventional additives, which may be used, in the coating sector. Examples of such additives include light protecting agents, e.g., based on benzotriazoles and HALS compounds (hindered amine light stabilizers), leveling agents based on (meth)acrylic homopolymers or silicone oils, rheology-influencing agents such as fine-particle silica or polymeric urea compounds, thickeners such as partially cross-linked polycarboxylic acid or polyurethanes, anti-foaming agents, wetting agents, curing accelerators for the cross-linking reaction of the OH-functional binders, for example, organic metal salts such as dibutyltin dilaurate, zinc naphthenate and compounds containing tertiary amino groups such as triethylamine for the cross-linking reaction with polyisocyanates. The additives are used in conventional amounts known to the skilled person.
Transparent or pigmented coating compositions may be prepared. In order to prepare transparent coating compositions, the individual constituents are mixed together in the usual manner and homogenized or dispersed thoroughly. In order to prepare pigmented coating compositions, the individual constituents are mixed together and homogenized or milled in the usual way. For example, the procedure may be such that initially a part of the hydroxy-functional (meth)acrylic copolymers according to the invention and optionally additional hydroxy-functional binders are mixed with the pigments and/or fillers and conventional coating additives and solvents and milled or dispersed in conventional equipment. The resulting ground stock is then completed with the remaining amount of binder.
Depending on the type of cross-linking agents, one-component or two-component coating compositions may be formulated with the binders according to the invention. If polyisocyanates having free isocyanate groups are used as cross-linking agents, the systems are two-component, i.e., the hydroxyl group-containing binder component, optionally with pigments, fillers and conventional coating additives, and the polyisocyanate component may be mixed together only shortly before application. In principle, the coating compositions may be adjusted with organic solvents to spray viscosity before application.
The coating compositions according to the invention may be applied by known methods, particularly by spraying. The coatings obtained may be cured at room temperature or by forced drying at higher temperatures, e.g., up to 80° C., preferably at 20° C. to 60° C. They may also, however, be cured at higher temperature from, for example, 80° C. to 160° C.
The coating compositions according to the invention are suitable for automotive and industrial coating. In the automotive coating sector the coating agents may be used both for OEM (Original Equipment Manufacture) automotive coating and for automotive and automotive part refinishing. Stoving or baking temperatures from 60° C. to 140° C., for example; preferably from 110° C. to 130° C., are used for standard automotive coating. Curing temperatures from 20° C. to 80° C., for example, particularly from 40° C. to 60° C. are used for automotive refinishing.
The coating compositions according to the invention may be formulated, for example, as pigmented top coats or as transparent clear coats and used for the preparation of the outer pigmented top coat layer of a multi-layer coating or for the preparation of the outer clear coat layer of a multi-layer coating. The present invention also relates, therefore, to the use of the coating compositions according to the invention as a top coat coating composition and as a clear coat coating composition, and to a process for the preparation of multi-layer coatings, wherein in particular the pigmented top coat and transparent clear coat layers of multi-layer coatings are produced by means of the coating compositions according to the invention.
The coating compositions may be applied as a pigmented topcoat layer, for example, to conventional 1-component or 2-component primer surfacer layers. The coating compositions according to the invention may also, however, be applied as a primer surfacer layer, for example, to conventional primers, e.g., 2-component epoxy primers or to electrodeposition primers.
The coating compositions may be applied as transparent clear coat coating compositions, for example, by the wet-in wet method, to solvent-based or aqueous colour-and/or special effect-imparting base coat layers. In this case, the colour- and/or special effect-imparting base coat layer is applied to an optionally pre-coated substrate, particularly pre-coated vehicle bodies or parts thereof, before the clear coat coating layer of the clear coat coating compositions according to the invention is applied. After an optional flash-off phase, both layers are then cured together. Within the context of OEM automotive coating, flash-off may be carried out, for example, at 20° C. to 80° C. and within the context of refinishing over a period of 15 to 45 minutes at ambient temperature, depending on the relative humidity.
The curing temperatures depend on the field of application and/or the binder/cross-linking agent system used.
Clear coat and topcoat coating compositions with a high solids content may be formulated with the binders according to the invention. The binders according to the invention and the coating compositions prepared from them may be used within the context of a multi-layer coating to prepare top coat layers and clear coat layers with good scratch resistance and good chemical and acid resistance. Similarly, the binders according to the invention and the coating compositions prepared from them may be used within the context of a base coat/clear coat two-layer coating to prepare clear coat layers which do not bring about partial dissolution of the base coat layer.
The invention will be explained in more detail on the basis of the examples below. All parts and percentages are on a weight basis unless otherwise indicated.
EXAMPLES
Example 1
Preparation of a Hydroxy-functional (Meth)acrylic Copolymer A
A 4 liter three-necked ground glass flask fitted with an agitator, contact thermometer, dropping funnel and spherical condenser is charged with 500 parts by weight of solvent naphtha (onset of boiling: 164° C.) and heated to 155° C. with stirring and reflux cooling. A monomer mixture of 780.0 parts by weight of butyl acrylate, 325.0 parts by weight of styrene, 177.5 parts by weight of glycidyl methacrylate, 50.0 parts by weight of solvent naphtha and 25.0 parts by weight of di-tert.-butyl peroxide was added continuously from the dropping funnel over a period of 5 hours. After the addition, the monomer-mixing vessel and the dropping funnel were rinsed with 75 parts by weight of solvent naphtha and the contents added to the reaction mixture. The reaction mixture was then cooled to 145° C. and 155 parts by weight of dimethylol propionic acid were added. The reaction mixture was then heated again to 155° C. and after the set temperature had been reached the mixture was held at this temperature for 30 minutes. 162.5 parts by weight of epsilon caprolactone were then added over a period of one hour. The dropping funnel was rinsed with 100 parts by weight of solvent naphtha. Post-polymerization was then carried out for 3 hours at 155° C. The mixture was then cooled to 125° C., diluted with 125 parts by weight of butyl acetate 98/100 and diluted with 25 parts by weight of solvent naphtha to a solids content of about 64%.
The resulting polymer solution had a solids content of 63.5% (1h, 125° C.), and a viscosity of 770 mPas/25° C. and a OH value of 120 mg KOH/g, and the polymer had a lactone content of 10 wt-% and a number average molecular mass (Mn) of 9300 g/mole.
Example 2
Preparation of a Hydroxy-functional (Meth)acrylic Copolymer B
A 4 liter three-necked, ground glass flask fitted with an agitator, contact thermometer, dropping funnel and spherical condenser was charged with 500 parts by weight of solvent naphtha (onset of boiling 164° C.) and heated to 155° C. with stirring and reflux cooling. A monomer mixture of 837.5 parts by weight of butyl acrylate, 350.0 parts by weight of styrene, 177.5 parts by weight of glycidyl methacrylate, 50.0 parts by weight of solvent naphtha and 25.0 parts by weight of di-tertiary-butyl peroxide was added continuously from the dropping funnel over a period of 5 hours. After the addition, the monomer-mixing vessel and the dropping funnel were rinsed with 75 parts by weight of solvent naphtha and the contents added to the reaction mixture. The reaction mixture was then cooled to 145° C. and 155 parts by weight of dimethylol propionic acid were added. The reaction mixture was then heated again to 155° C. and after the set temperature was reached this temperature was held for 30 minutes. 80.0 parts by weight of epsilon caprolactone were then added over a period of 1 hour. The dropping funnel was rinsed with 100 parts by weight of solvent naphtha. Post-polymerization was then carried out for 3 hours at 155° C. The mixture was then cooled to 125° C., diluted with 125 parts by weight of butyl acetate 98/100 and diluted with 25 parts by weight of solvent naphtha to a solids content of about 64%.
The resulting polymer solution had a solids content of 64.4% (1 h, 125° C.) and a viscosity of 1010 mPas/25° C.
Example 3
Preparation of a Hydroxy-functional (Meth)acrylic Copolymer C
A 4 liter three-necked, ground glass flask fitted with an agitator, contact thermometer, dropping funnel and spherical condenser was charged with 600 parts by weight of solvent naphtha (onset of boiling 164° C.) and heated to 147° C. with stirring and reflux cooling. A monomer mixture of 475.0 parts by weight of butyl methacrylate, 345.0 parts by weight of butyl acrylate, 162.5 parts by weight of styrene, 177.5 parts by weight of glycidyl methacrylate, 167.5 parts by weight of 2-hydroxypropyl methacrylate, 50.0 parts by weight of solvent naphtha, 25.0 parts by weight of di-tert.-butyl peroxide and 20.0 parts by weight of dicumyl peroxide was added continuously from the dropping funnel over a period of 6 hours. After the addition, the monomer-mixing vessel and the dropping funnel were rinsed with 75 parts by weight of solvent naphtha and the contents added to the reaction mixture. The reaction mixture was then cooled to 145° C. and 155 parts by weight of dimethylol propionic acid were added. The reaction mixture was then heated again to 155° C. and after the set temperature was reached this temperature was held for 30 minutes. 97.5 parts by weight of epsilon caprolactone were then added over a period of one hour. The dropping funnel was rinsed with 75 parts by weight of solvent naphtha. Post-polymerization was then carried out for 3 hours at 155° C. The mixture was then cooled to 111° C., diluted with 25 parts by weight of n-butanol and diluted with 25 parts (by weight) of solvent naphtha to a solids content of about 64%.
The resulting solution had a solids content of 64.2% (1 h, 125° C.) and a viscosity of 1040 mPas/25° C.
Example 4
Preparation of a Hydroxy-functional (Meth)acrylic Copolymer D
Example 4.1
Glycidyl-functional Acrylic Prepolymer
A 6 liter glass flask equipped with a stirrer, thermometer and condenser was charged with 800 grams of xylene and heated to reflux. (140° C.) A mixture of 1036 grams styrene, 1036 grams 2-ethylhexyl methacrylate. 728 grams of glycidyl methacrylate, 120 grams of t-butyl peroxy 2-ethylhexanoate (Trigonox 21S from Akzo) and 200 grams of xylene was added dropwise at a uniform rate over 5 hours while keeping reflux. After the addition, 40 grams of xylene were added to rinse the addition funnel and the reactor contents were held another 30 minutes at reflux. Finally 40 grams of xylene were added.
The resulting polymer solution had a solids content of 71.4% and a viscosity of Z3+{fraction (1/2 )} (Gardner-holdt) and the polymer had a Mn of 5800 and a Mw of 10500.
Example 4.2
Hydroxy-functional (Meth)acrylic Copolymer D
In a 10 liter reactor equipped as described in Example 4.1., 4000 grams of the glycidyl functional acrylic prepolymer from Example 4.1. were reacted at reflux with 126 grams of dibutyl tin dilaurate, 1536 grams of 12-hydroxy stearic acid and 1014 grams of butylacetate till the acid value was below 2.
The resulting polymer solution had a solids content of 77.6% and a viscosity of Z4-(Gardner-holdt) and the polymer had a Mn of 4300 and Mw of 17300.
Example 5
Preparation of a Hydroxy-functional (Meth)acrylic Copolymer E
Example 5.1
Glycidyl Functional Prepolymer.
In a 6 liter reactor equipped as in Example 1, 800 grams of Solvesso 100 (Exxon) were heated to about 165° C. reflux. Over a period of 5 hours, a mixture of 1690 grams styrene, 910 grams glycidyl methacrylate, 60 grams of di-tertiary-butylperoxide and 340 grams of Solvesso 100 was added uniformly. The addition funnel was rinsed with 40 grams of Solvesso 100 and the reactor contents held for another one hour at reflux. Finally 160 grams of Solvesso 100 were added
The resulting polymer solution had a solids content of 67.6% and a viscosity of Z4+{fraction (1/2 )} (Gardner-holdt) and the polymer had a Mn of 2900 and a Mw of 7100.
Example 5.2
Hydroxy-Functional (Meth)acrylic Copolymer E.
Following the procedure of Example 4.2. 4000 grams of glycidyl-functional prepolymer of Example 5.1. were reacted with 1920 grams 12-hydroxystearic acid and 1000 grams of butylacetate.
The resulting polymer solution had a solids content of 68.5%, a viscosity of Y+{fraction (1/2 )} (Gardner holdt), an acid value of 3.7 and the polymer had a Mn 5100 and a Mw 13000.
Example 6
Preparation of a Hydroxy-functional (Meth)acrylic Copolymer F
Example 6.1
Hydroxy-acid Functional Intermediate
In a reactor equipped as described in Example 4.1. 536 grams of dimethylol propionic acid were reacted with 2736 grams of epsilon caprolactone and 6 grams of dibutyl tin dilaurate.
The resulting polymer had a Mn of 1250 and a Mw 2700.
Example 6.2.
Hydroxy-functional (Meth)acrylic Copolymer F
In a reactor equipped as in Example 4.2. 2000 grams of glycidyl-functional prepolymer from Example 5.1. were reacted with 2627.4 grams of the hydroxy-acid of Example 6.1. in the presence of 16.8 grams of tetraethylammonium bromide and 919.6 grams butylacetate.
The resulting polymer solution had a solids content of 71.8%, a viscosity of Z+{fraction (1/3 )} (Gardner-holdt) and an acid value of 3.1 and the polymer had a Mn of 8500 and Mw of 27600.
Example 7 (Comparative Example)
A polymer was prepared without any epoxy functional olefinic unsaturated monomers and had a caprolactone content of 10 wt-% and an OH value of 120 mg KOH/g was prepared according to claim 1 of DE-OS 22 60 212.
A 4 liter three-necked ground glass flask fitted with an agitator, contact thermometer, dropping funnel and spherical condenser is charged with 500 parts by weight of solvent naphtha (onset of boiling 164° C.) and heated to 145° C. with stirring and reflux cooling. A monomer mixture of 150 parts by weight of epsilon caprolactone, 575 parts by weight of butyl acrylate, 150 parts by weight of styrene, 222.5 parts by weight of methyl methacrylate, 372.5 parts by weight of 2-hydroxyethyl acrylate, 30 parts by weight of solvent naphtha and 30 parts by weight of di-tertiary-butyl peroxide was added continuously from the dropping funnel over a period of 6 hours. After the addition, the monomer-mixing vessel and the dropping funnel were rinsed with 70 parts by weight of solvent naphtha and the contents added to the reaction mixture. Post-polymerization was then carried out for 3 hours at 145° C.
The mixture was then cooled to 111° C. and diluted with 400 parts by weight of n-butyl acetate to a solids content of about 60%.
The resulting polymer solution had a solids content of 58.3% (1 h, 125° C.), a viscosity of 265 mPas/25° C. and the polymer had a number average molecular mass (Mn) of 9400 g/mole.
Example 8
Preparation of a Hydroxy Functional (Meth)acrylic Copolymer G
Example 8.1
Hydroxy-acid Functional Intermediate
In a reactor equipped as described in Example 1, 340 grams of dimethlol propionic acid were reacted with 2280 grams of epsilon caprolactone and 0.18 grams of dibutyl tin dilaurate in 1549.82 grams butylacetate. This adduct solidifies at room temperature and was used further in Example 8.
Example 8.2
Hydroxy Functional (Meth)acrylic Polymer G
In a reactor equipped as in Example 1,2000 grams of glycidyl functional acrylic prepolymer from Example 5.1. were reacted with 1656 grams of the above hydroxy-acid functional intermediate of Example 8.1. in the presence of 8 grams of tetraethylammonium bromide and 120 grams butylacetate.
The resulting hydroxy functional acrylic polymer has a hydroxyl value of 216 and about 30% caprolactone on polymer weight composition grafted on the ackbone.
The resulting polymer solution had a solids content of 70%, a viscosity of Z3-{fraction (1/3 )} (Gardner-holdt) and an acid value of 3.7 and the polymer had a Mn of 3000 and Mw of 12500.
Example 9 (Comparative Example)
A caprolactone grafted acrylic polymer was prepared using the technique known in the prior art by reacting caprolactone with a hydroxy functional monomer. The overall weight % caprolactone was 30% on polymer and the hydroxyl value was 216. In a reaction flask equipped as Example 5.1. 494 grams of hydroxypropyl methacrylate; 442 grams of styrene, 884 grams of hydroxyethylmethacrylate, 780 grams of caprolactone, 42 grams of di-tertiary-butylperoxide and 118 grams of Solvesso 100 were added and then 799.94 grams of Solvesso 100 and 0.06 grams of dibutyl tin dilaurate were added and held at reflux temperature for 5 hours. 40 grams of Solvesso 100 were added next as a rinsing step that was followed by a 1 hour hold at reflux temperature. Next 8.4 grams of tetraethylammonium bromide were added dissolved in 71.6 grams of butylacetate and the batch was held for about 3 hours until a constant viscosity was reached.
The resulting polymer solution was cloudy and had a solids content of 66.7%, a viscosity of Z1+{fraction (1/3 )} (Gardner-holdt) and an acid value of 4.4 and the polymer had a Mn of 2300 and a Mw 6300.
Example 10
The two components of a clear coat based on a hydroxy-functional (meth)acrylic copolymer A according to Example 1 and a polyisocyanate cross-linking agent were prepared as follows:
Component I
97.43 parts by weight of the copolymer A solution from Example 1 were mixed homogeneously with 1.00 part by weight of a 1% silicone oil solution in xylene, 0.6 parts by weight of a light protecting agent of the benzotriazole type and 0.6 parts by weight of a light protecting agent of the HALS type, 0.32 parts by weight of diethyl ethanolamine and 0.05 parts by weight of a 10% dibutyl tin laurate solution in butyl acetate.
Component II
An isocyanate curing agent solution was prepared as follows:
9.0 parts by weight of xylene, 25.0 parts by weight of butyl acetate, 10.0 parts by weight of solvent naphtha, 2.6 parts by weight of methoxypropyl acetate, 53.3 parts by weight of a commercially available polyisocyanate (Desmodura 3300/Bayer) and 0.1 part by weight of a 10% dibutyl tin laurate solution in butyl acetate were mixed homogeneously to obtain the solution of curing agent.
Example 11 (Comparative Example)
The two components of a clear coat based on a hydroxy-functional (meth)acrylic copolymer according to Example 7 (Comparative Example) and a polyisocyanate cross-linking agent were prepared.
For Component I, the process of Example 10 is followed in an analogous way, whereby the copolymer A is replaced by the polymer of Example 7.
Component II is identical to Component II of Example 10.
Example 12
A clear coat based on a hydroxy-functional (meth)acrylic copolymer A according to Example 1 with a melamine resin cross-linking agent was prepared as follows:
48.3 parts by weight of the copolymer A from Example 1 were mixed homogeneously with 24.0 parts by weight of a commercially available 60% butylated melamine resin (Luwipal® 012/BASF), 0.6 parts by weight of a light protecting agent of the benzotriazole type, 0.6 parts by weight of a light protecting agent of the HALS type and 1.0 part by weight of a 34% solution of a blocked p-toluene sulfonic acid catalyst in a isopropanol/water mixture (89:11).
Example 13 (Comparative Example)
A clear coat based on a hydroxy-functional (meth)acrylic copolymer according to Example 7 (Comparative Example) with melamine resin cross-linking agent was prepared.
The process of Example 10 is followed in an analogous way, whereby the copolymer A is replaced by the comparative resin.
Application of the Coating Compositions from Example 10 and 11
Body steel sheets pre-coated with commercial cathodic electrodeposition coating (18 μm) and commercial primer surfacer (35 μm) used in OEM automotive coating were coated with commercial solvent-based metallic base coat in a dry film having a thickness of 15 μm. In each case, the wet films were pre-dried for 30 minutes at room temperature. The clear coats from Example 10 and 11 were applied wet-on-wet directly afterwards after mixing Component I with Component II, the isocyanate curing agent solution, in a volume ratio of 2:1 by spray application in a dry film thickness of 35 μm and hardened for 30 minutes at 60° C. after 10 minutes flash-off at room temperature.
Application of the Coating Compositions from Example 12 and 13
Body steel sheets pre-coated with commercial cathodic electrodeposition paint (18 μm) and commercial primer surfacer (35 μm) used in OEM automotive coating were coated with commercial-solvent based metallic base coat to form a dry film having a thickness of 15 μm. In each case, the wet films were pre-dried for 6 minutes at 80° C. The clear coats from Example 12 and 13 were applied wet-on-wet directly afterwards by spray application in a dry film thickness of 35 μm and baked for 20 minutes at 140° C. after 5 minutes flash-off at room temperature.
Coating results:
Clear coat:
Example 10
Example 11
Sulfuric acid test:
Etching:
18 min
14 min
Base coat attack:
>30 min
28 min
Scratch resistance
Initial gloss
89%
88%
Final gloss
74%
70%
Residual gloss
83%
80%
Partial dissolution of the base coat
0
1
Clear coat:
Example 12
Example 13
Sulfuric acid test:
Etching:
8 min
6 min
Base coat attack:
24 min
23 min
Scratch resistance
Initial gloss
90%
89%
Final gloss
60%
56%
Residual gloss
67%
63%
Partial dissolution of the base coat
0
1
Methods of Determination:
Acid Resistance:
The dripping-test with 10% sulfuric acid was used to test the clear coats for acid resistance. The test sheets were positioned on a heatable plate and heated to 60° C. It must be ensured here that the sheets rest on the plate in a flat manner in order to obtain optimal temperature transmission. At the end of the heating-up phase, i.e. at 60° C., one drop per minute is applied to the clear coat surface. The total time is 30 minutes. At the end of the testing time the coatings are rinsed with distilled water. If necessary, a brush can additionally be used for the cleaning.
In order to evaluate the acid resistance, the exposure time, at which the first visible deterioration (etching) and the base coat attack occurred, is given in minutes.
Scratch Resistance:
The travelling block method with the Erichsen-Peters block, type no. 265 was used to test the coatings for scratch resistance. The dimensions are 75×75×50 mm, base area=3750 mm2. The weight is 2 kg. A 2.5 mm thick wool felt, dimensions 30×50 mm, is bonded beneath the abrasive block with Velcro tape. Then 1 g of a water-soluble grinding paste is distributed evenly onto the bearing surface. The block travels to and fro 10 times over a period of 9 seconds. The to and fro movement takes place parallel to the 75 mm edge of the block, the abrasive path is 90 mm in one direction. The surface is then rinsed with cold water, dried and a gloss measurement carried out at an angle of 20 °.
The residual gloss remaining after the abrasive stress is given in percent as a measure of the scratch resistance of a coating. Residualgloss(%)=Glossafterstress×100Glossbeforestress
Example 10 (coating composition of the invention with polyisocyanate cross-linking agent) gave significantly better acid etch resistance and better scratch resistance in comparison to the coating composition of Example 11 which is representative of prior art compositions. Example 12 (coating composition of the invention with melamine resin cross-linking agent) gave better acid etch and scratch resistance in comparison to the coating composition of Example 13 which is representative of prior art compositions. The coating compositions of the invention (Example 10 and 12) further showed no partial dissolution of the base coats. In comparison the coating compositions of prior art (Example 11 and 13) showed slight partial dissolution of the base coats.
Example 14
A clear coat based on a hydroxy-functional (meth)acrylic copolymer G prepared according to Example 8.2, a standard clear coat and a comparative clear coat based on comparative hydroxy-functional (meth)acrylic copolymer prepared according to Example 9 were prepared using the same polyisocyanate cross-linking agent.
In the table below the compositions of three clear coats are given in which the standard clear coat is a commercial clear coat based on an acrylic copolymer in which no caprolactone is used. All clear coat formulations contained the same amount of binder solids. The three clear coats were activated with a commercial activator (polyisocyanate) based on Desmodur® 3390 (Bayer). Each of the clear coats were applied over blue commercial basecoats and baked for 30 minutes at 60°C.
TABLE
Compara-
tive
Standard
Clear Coat
Clear Coat
Clear
Based on
Based on
Coat
Example 8
Example 9
Methyl isobutyl ketone
4.47
13.82
12.93
Primary amyl acetate
2.36
7.29
6.83
Ethyl 3-ethoxypropionate
3.43
10.6
9.93
Propylene glocol methylether acetate
0.68
2.1
1.97
Ethylene Glycol monobutylether
1.73
5.34
5.01
BYK 306 (polyether modified
0.05
0.05
0.05
dimethyl polysiloxane)
BYK 332 (polyether modified
0.05
0.05
0.05
dimethyl polysiloxane)
BYK 361 (polyacrylate copolymer)
0.2
0.2
0.2
D.B.T.D.L. (1% solution) dibutyl tin
1.49
1.49
1.49
dilaurate)
Tinuvin ® 292 (hindered amine light
0.3
0.3
0.3
stabilizer)
Tinuvin ® 1130 (benzotriazole UV
0.6
0.6
0.6
absorber)
Diethylethanolamine
0.25
0.25
0.25
Acrylic resin standard
83.29
/
/
Acrylic resin Example 8
/
56.81
/
Acrylic resin Comparative Example 9
/
59.29
Acetic acid
0.3
0.3
0.3
Butylacetate
0.8
0.8
0.8
100
100
100
NCO/H ratio
1.05
1.05
1.05
Appearance
Clear
Clear
CLOUDY
Drying time: tape free initial
VP/F
VG/Ex
Not tested
Fischer hardness (init./1 week)
0.2/13.4
0.56/11.0
Not tested
Perzos hardness (init./1 week)
55/310
53/179
Not tested
Scratch (gloss before/after)
89.8/18.2
88.1/61.7
Not tested
Test Methods used:
Drying
Standard metal panels (10×30 cm) are clear coated (50μ) and baked horizontally for 30 minutes at 60° C. After a 10 minutes cooldown period a strip of masking tape is applied across the panel, smoothing it out manually using moderate firm pressure to insure uniform contact. A 2 kg weight is rolled over the tape to and from. After 10 minutes the tape is removed and the degree of marking is observed. After 30 minutes recovery the tape imprint is evaluated again.
Scratch Resistance
The clear coated panels are scratched after 7 days aging using the linear Gardner brush test (nylon brush) (according to ASTM D2486-89) through using an abrasive medium based on calcium carbonate. Each panel undergoes 30 brush cycles. The gloss before and after scratching is measured.
Summary of Results of Above Table:
The clear coat based on acrylic copolymer of comparative Example 9, where the same amount of caprolactone is used as in the acrylic copolymer of Example 8, is cloudy due to incompatability with the activator and is considered an unacceptable automotive clear coating. No additional tests were conducted on this unacceptable coating. The method of grafting caprolactone as claimed in this invention and shown in Example 8 allows for the formulation of a clear coat with excellent appearance in comparison to the clear coating, formulated from the copolymer of Example 9. The clear coating of the copolymer of Example 8 has a better property balance of drying time and scratching resistance when compared with a typical commercial standard clear coat. |
Noninvasive measurement of reepithelialization and microvascularity of suction-blister wounds with benchmarking to histology.
We explored use of the suction-blister wound model in the assessment of not only epidermal regeneration but also pain, the microvascular response and bacteriology. The effects of topical zinc sulfate were studied to articulate the methodologies in this double-blind trial. One epidermal suction blister (10 mm) was induced on each buttock in 30 healthy volunteers (15 females:15 males) and deroofed on day 0. The wounds were randomized to daily treatment with 1.4% zinc sulfate shower gel (n = 20), placebo (n = 20) or control (n = 20). Digital photography coupled with planimetry, transepidermal water loss (TEWL) measurement and optical coherence tomography (OCT) was benchmarked to the gold standard of histology of 60 full-thickness wound biopsies on day 4. Pain increased after application of the shower gels. Microvessel density, determined from OCT images, increased from day 0 to day 2 in the three groups but increased more with the placebo than with the zinc shower gel (p = 0.003) or the control treatment (p = 0.002) and correlated (rS = 0.313, p = 0.015) with the inflammatory response on day 4, as determined by histology. Coagulase-negative staphylococci were more common in wounds compared with skin (p = 0.002) and was reduced (p = 0.030) with zinc sulfate treatment. Planimetric analysis of digital wound images was not biased (p = 0.234) compared with histology, and TEWL measurements showed no correlation (rS = 0.052, p = 0.691) with epithelialization. Neoepidermal formation, determined by histology, did not differ (p = 0.290) among the groups. Zinc sulfate reduced (p = 0.031) the release of lactate dehydrogenase from cultured gel-treated keratinocytes isolated from the blister roofs. Therefore, combination of the standardized suction-blister wound model with noninvasive planimetry and OCT is a useful tool for assessing wound therapies. Zinc sulfate transiently dampened inflammation and reduced bacterial growth. |
To move through the world, you need a sense of your surroundings, especially of the constraints that restrict your movement: the walls, ceiling and other barriers that define the geometry of the navigable space around you. And now, a team of neuroscientists has identified an area of the human brain dedicated to perceiving this geometry. This brain region encodes the spatial constraints of a scene, at lightning-fast speeds, and likely contributes to our instant sense of our surroundings; orienting us in space, so we can avoid bumping into things, figure out where we are and navigate safely through our environment.
This research, published today in Neuron, sets the stage for understanding the complex computations our brains do to help us get around. Led by scientists at Columbia University's Mortimer B. Zuckerman Mind Brain Behavior Institute and Aalto University in Finland, the work is also relevant to the development of artificial intelligence technology aimed at mimicking the visual powers of the human brain.
"Vision gives us an almost instant sense where we are in space, and in particular of the geometry of the surfaces -- the ground, the walls -- which constrain our movement. It feels effortless, but it requires the coordinated activity of multiple brain regions," said Nikolaus Kriegeskorte, PhD, a principal investigator at Columbia's Zuckerman Institute and the paper's senior author. "How neurons work together to give us this sense of our surroundings has remained mysterious. With this study, we are a step closer to solving that puzzle."
To figure out how the brain perceives the geometry of its surroundings, the research team asked volunteers to look at images of different three-dimensional scenes. An image might depict a typical room, with three walls, a ceiling and a floor. The researchers then systematically changed the scene: by removing the wall, for instance, or the ceiling. Simultaneously, they monitored participants' brain activity through a combination of two cutting-edge brain-imaging technologies at Aalto's neuroimaging facilities in Finland.
"By doing this repeatedly for each participant as we methodically altered the images, we could piece together how their brains encoded each scene," Linda Henriksson, PhD, the paper's first author and a lecturer in neuroscience and biomedical engineering at Aalto University.
Our visual system is organized into a hierarchy of stages. The first stage actually lies outside brain, in the retina, which can detect simple visual features. Subsequent stages in the brain have the power to detect more complex shapes. By processing visual signals through multiple stages -- and by repeated communications between the stages -- the brain forms a complete picture of the world, with all its colors, shapes and textures.
advertisement
In the cortex, visual signals are first analyzed in an area called the primary visual cortex. They are then passed to several higher-level cortical areas for further analyses. The occipital place area (OPA), an intermediate-level stage of cortical processing, proved particularly interesting in the brain scans of the participants.
"Previous studies had shown that OPA neurons encode scenes, rather than isolated objects," said Dr. Kriegeskorte, who is also a professor of psychology and neuroscience and director of cognitive imaging at Columbia. "But we did not yet understand what aspect of the scenes this region's millions of neurons encoded."
After analyzing the participants' brain scans, Drs. Kriegeskorte and Henriksson found that the OPA activity reflected the geometry of the scenes. The OPA activity patterns reflected the presence or absence of each scene component -- the walls, the floor and the ceiling -- conveying a detailed picture of the overall geometry of the scene. However, the OPA activity patterns did not depend on the components' appearance; the textures of the walls, floor and ceiling -- suggesting that the region ignores surface appearance, so as to focus solely on surface geometry. The brain region appeared to perform all the necessary computations needed to get a sense of a room's layout extremely fast: in just 100 milliseconds.
"The speed with which our brains sense the basic geometry of our surroundings is an indication of the importance of having this information quickly," said Dr. Henriksson. "It is key to knowing whether you're inside or outside, or what might be your options for navigation."
The insights gained in this study were possible through the joint use of two complementary imaging technologies: functional magnetic resonance imaging (fMRI) and magnetoencephalography (MEG). fMRI measures local changes in blood oxygen levels, which reflect local neuronal activity. It can reveal detailed spatial activity patterns at a resolution of a couple of millimeters, but it is not very precise in time, as each fMRI measurement reflects the average activity over a five to eight seconds. By contrast, MEG measures magnetic fields generated by the brain. It can track activity with millisecond temporal precision, but does not give as spatially detailed a picture.
advertisement
"When we combine these two technologies, we can address both where the activity occurs and how quickly it emerges." said Dr. Henriksson, who collected the imaging data at Aalto University.
Moving forward, the research team plans to incorporate virtual reality technology to create more realistic 3D environments for participants to experience. They also plan to build neural network models that mimic the brain's ability to perceive the environment.
"We would like to put these things together and build computer vision systems that are more like our own brains, systems that have specialized machinery like what we observe here in the human brain for rapidly sensing the geometry of the environment," said Dr. Kriegeskorte.
This paper is titled "Rapid invariant encoding of scene layout in human OPA." Marieke Mur, PhD, who has since joined Western University in Ontario, Canada, also contributed to this research.
This research was supported by the Academy of Finland (Postdoctoral Research Grant; 278957), the British Academy (Postdoctoral Fellowship; PS140117) and the European Research Council (ERC-2010-StG 261352). |
NBCU Names Kimberley D. Harris General Counsel
New advisor served as White House counsel; veteran Rick Cotton to work on piracy issues
NBCUniversal named Kimberley D. Harris executive vice president and general counsel Tuesday. Based in New York, she will report directly to Steve Burke, Chief Executive Officer, NBCUniversal. Her appointment begins on September 3rd.
Harris replaces NBCU veteran Rick Cotton, who first joined NBC in 1989 as executive veep and general counsel of NBC, and who has served as exec veep and general counsel of NBCUniversal since 2004. Cotton, who announced his intention to step down as General Counsel in May of 2012, will assume the post of Senior Counselor for IP Protection, working closely with the anti-piracy team at NBCUniversal and Comcast on anti-piracy policy and advocacy.
In her new role Ms. Harris will provide legal advice to the NBCUniversal senior management team and supervise its law department, which handles legal matters for all of NBCUniversal’s business units, including the company’s film studio, two broadcast networks, 18 cable channels, 50-plus digital sites, and theme park operations. Ms. Harris also will coordinate NBCUniversal’s global regulatory and legislative agenda.
She joins NBCUniversal from Davis Polk & Wardwell, where she served most recently as a partner in the litigation department. During her tenure, she handled investigations by the Department of Justice, the Securities and Exchange Commission, and the U.S. Congress, among other matters.
From 2010 to 2012, Harris served in the White House Counsel’s Office, most recently as Deputy Counsel and Deputy Assistant to the President. During her tenure at the White House, Harris advised senior Executive Branch officials on congressional investigations and executive privilege issues, and senior White House officials on a wide range of compliance and risk management issues, as well as other legal matters. In addition, she developed and implemented the White House response to congressional investigations, and managed litigation matters relating to the President.
Harris graduated magna cum laude from Harvard University, and holds a law degree from Yale Law School. |
Going where the blogs take me and I should add a DISCLAIMER:
All the pictures featured on this page belong to their respective owners. If you see your picture featured and don't want it to be, email me with link and I will take it down right away.
Friday, December 12, 2008
Just smarter that's all
To have people liking you
Some might be jealous
Some just angry people
Some preoccupied with their own lives and problems
Quite a lot are in this category
But most will be open to how they find you
And how will they find you?
Take a moment to think honestly about how you come across
Look in the mirror, how do you come across?
If this can be worked on then do so
Not just your face but also your body language has an impact upon others
How is yours?
Again if this can be improved then work on it
Now we get to the more important but maybe subtle points
How you feel also influences others
We sense how others feel
So if you are angry then for sure we feel this
More subtly though it is your natural energy profile that we feel
One of enjoying life or is life a burden and struggle?
Most of us do not want other peoples problems
Even when these are unstated and hidden we feel this
So to have others like you more work on this area
How you truly feel about life
Sham enthusiasm comes through as just that, false
.
So time to learn how to feel good about every day even when things are going pear shape
.
How to feel good when people are not so nice to you
.
Yes it can be done and the rewards of feeling good inside are much greater than most other things you can do
.
It's the energy you project
.
And the energy you project comes from inside
.
After a while seeing life through positive eyes makes you become what you truly are deep down inside |
Minnesota at Toronto
Twins 8, Blue Jays 4
DUNEDIN, Fla. (AP) - Justin Morneau is finding his hitting touch early in preparation for the World Baseball Classic.
Morneau had two hits, including an RBI double, and the Minnesota Twins beat the Toronto Blue Jays 8-4 on Tuesday.
Morneau and teammate Joe Mauer, both taking part in next month's WBC, made the 2 1/2-hour trip from Fort Myers.
"Just to get my legs underneath me," Morneau said. "There's a big difference between playing five innings and playing nine. Knowing we're going to start earlier with the WBC, crank it up a little bit earlier."
Morneau, who will be playing for Canada in the WBC, received a nice cheer when he was introduced during the announcement of pregame lineups. The first baseman hit a three-run double in Minnesota's 5-4 victory over Pittsburgh on Monday.
Romero allowed two runs - both coming on Joe Benson's second-inning homer - and two hits. The left-hander had an arthroscopic procedure during the offseason to clean up his left elbow, and also received platelet-rich plasma treatments to both knees to help the recovery of his quadriceps tendinitis.
"I'm going to use this spring to work on my sinker," Romero said. "I think that's basically about 90 percent of what we threw, maybe 95. I'm just trying to get that pitch back and get it under control."
Romero said his percentage of sinkers thrown last year decreased. He went 9-14 with a 5.77 ERA in 2012, and left his final start of the season on Sept. 30 after three innings due to an injury to his left leg.
Pelfrey gave up three runs and five hits. The right-hander made only three starts for the New York Mets in 2012, a season cut short by elbow ligament-replacement surgery on May 1.
Adam Lind hit a two-run homer off Pelfrey during a three-run first.
Before the game, Toronto manager John Gibbons said a decision on whether J.P. Arencibia will catch knuckleballer R.A. Dickey this season will be made after the pair return from the WBC.
"When they come back, we've got to made a decision one way or the other," Gibbons said. "You don't want to let this linger. If he's the guy, or it's one of the other guys, that individual, he's got to work with him the rest of the way."
Arencibia caught Dickey in Monday's game against Boston. Other candidates include Dickey's former teammates on the Mets - Josh Thole and Mike Nickeas - and Henry Blanco.
Dickey is scheduled to start the Blue Jays regular-season opener against Cleveland on April 2.
"Whoever is going to be his catcher is going to start opening day, regardless," Gibbons said. "That's the right way to do it."
NOTES: Blue Jays closer Casey Janssen is long tossing on flat ground to build arm strength. Janssen, who finished with 22 saves last season, had surgery in November to address lingering shoulder soreness. ... Morneau said he received a text recently from Cincinnati 1B Joey Votto, a likely WBC teammate. Votto, who hurt his knee last year, said in the message that everything is going good. "We expect to have him there, which will be obviously huge," Morneau said. "He's probably the best left-handed hitter in the game right now, so to have him on our team makes a huge difference in our lineup." ... Twins 3B Trevor Plouffe (sore right calf) was back in the lineup and had a third-inning RBI single.
Copyright 2015 by STATS LLC and The Associated Press. Any commercial use or
distribution without the express written consent of STATS LLC and The
Associated Press is strictly prohibited. |
Q:
JSF and j_security_check connection
I have an .xhtml page in which I have tried both BalusC's suggestion here and also the following without avoiding the OP's issue
<meta http-equiv="refresh" content="#{session.maxInactiveInterval}"/>
Basically, I start the application and the form based authentication page is rendered. I then wait for the session time to expire. If I try to login after that then the OP's problem occurs.
A:
<meta http-equiv="refresh" content="#{session.maxInactiveInterval}"/>
The #{session} is available in Facelets only. That it doesn't work suggests that you are not using Facelets for this particular view, but its legacy predecesor JSP or even plain vanilla HTML.
For JSP you should be using ${pageContext.session} to get the session, exactly as demonstrated in my answer on the question which you found yourself.
<meta http-equiv="refresh" content="${pageContext.session.maxInactiveInterval}"/>
Or, much better, get rid of legacy JSP altogether and replace it by its successor Facelets.
|
Validation of a knowledge-based boundary detection algorithm: a multicenter study.
A completely operator-independent boundary detection algorithm for multigated blood pool (MGBP) studies has been evaluated at four medical centers. The knowledge-based boundary detector (KBBD) algorithm is nondeterministic, utilizing a priori domain knowledge in the form of rule sets for the localization of cardiac chambers and image features, providing a case-by-case method for the identification and boundary definition of the left ventricle (LV). The nondeterministic algorithm employs multiple processing pathways, where KBBD rules have been designed for conventional (CONV) imaging geometries (nominal 45 degrees LAO, nonzoom) as well as for highly zoomed and/or caudally tilted (ZOOM) studies. The resultant ejection fractions (LVEF) from the KBBD program have been compared with the standard LVEF calculations in 253 total cases in four institutions, 157 utilizing CONV geometry and 96 utilizing ZOOM geometries. The criteria for success was a KBBD boundary adequately defined over the LV as judged by an experienced observer, and the correlation of KBBD LVEFs to the standard calculation of LVEFs for the institution. The overall success rate for all institutions combined was 99.2%, with an overall correlation coefficient of r=0.95 (P<0.001). The individual success rates and EF correlations (r), for CONV and ZOOM geometers were: 98%, r=0.93 (CONV) and 100%, r=0.95 (ZOOM). The KBBD algorithm can be adapted to varying clinical situations, employing automatic processing using artificial intelligence, with performance close to that of a human operator. |
printvar( """""" );
printvar( '''line\n
\nend''' );
|
Matthew Glenesk
[email protected]
Twelve cities are vying for four spots as Major League Soccer looks to expand for the 2020 and 2021 seasons.
Indy Eleven owner Ersal Ozdemir handed in the team's expansion paperwork at MLS headquarters in New York on Tuesday. The Eleven's bid includes a proposed 20,000-seat Downtown stadium that will cost in excess of $100 million, according to the team's latest estimates.
So how does the Eleven's bid stack up against the competition?
Indy Eleven's MLS bid won't come easily — or cheaply
Here's a look at 11 other cities with MLS aspirations:
Nashville, Tenn.
Nashville’s ownership group first made contact with MLS officials last year. Unlike several others getting looks, Nashville has never fielded a pro soccer team at any level. And Nashville's metropolitan population is the smallest of the cities under consideration.
“We do sit in a bit of an underdog role, on the one hand,” said John Ingram, the lead investor of Nashville's bid. “On the other hand, I’ve never really been as concerned about where you start as where you finish."
Securing a stadium remains a crucial box that is unchecked for Nashville, but the group has made important progress. The Tennessean first reported Jan. 26 that Mayor Megan Barry has zeroed in on the city-owned Nashville Fairgrounds for a future MLS stadium and is throwing her support behind the group’s bid.
Although Nashville lacks widespread notoriety as a pro soccer town, the steering committee hopes the city’s string of well-attended international friendly matches at Nashville’s Nissan Stadium show the city has a passionate fan base that can grow.
The most recent, a match between Mexico and New Zealand in October, drew 40,287 fans. In December, Nashville was named one of 14 cities that will host matches in next year's CONCACAF Gold Cup.
Detroit
Detroit’s bid is a joint venture between NBA owners Tom Gores and Dan Gilbert, who announced in April their plans for a $1 billion development at the former Wayne County Jail site that would include a 23,000-seat soccer-specific stadium.
“Detroit sports fans are some of the most passionate in the world. No where else can you find as many major league teams in the urban core than in Detroit,” Gilbert said in the statement. “Since soccer is the most popular global sport, we also hope having an MLS team will put Detroit on the map with new audiences, attracting more visitors and more residents to the city.”
On Friday, the county announced it will try to restart the long-stalled jail project. But on Monday, a statement attributed to Matt Cullen, head of Gilbert's Rock Ventures, said the Gilbert team is working to develop an offer for the jail site.
MLS commissioner Don Garber has previously stated the jail site is the preferred location for a potential MLS stadium should Detroit be awarded an expansion team.
St. Louis
Considered a favorite, along with Sacramento, Calif., for 2020 expansion, St. Louis' bid is led by Paul Edgerley, former managing director at Bain Capital.
St. Louis voters could decide whether to help the financing of a new 20,000-seat stadium April 4. A proposal first needs to be approved by the Board of Alderman on Friday, according to the St. Louis Post-Dispatch.
The Post-Dispatch reports the proposal would put $60 million in city money toward the stadium, along with $95 million in private money. The ownership group also would pay for construction cost overruns, maintenance and any shortfall in the city's financial obligation if the city's funding revenue source falls short of projections.
"We’ve spent a lot of time with MLS officials and feel that St. Louis is very well positioned to be awarded a club," Edgerley said in a news release. "There is still a long way to go, but thanks to the recent progress made possible through collaboration with city officials, we are very close to bringing Major League Soccer and a multi-purpose stadium to the downtown area.”
Sacramento, Calif.
Up until Tuesday, it was all but assumed that Sacramento, with its strong ownership group and shovel-ready stadium plan, would be a lock for 2020 expansion.
Well, not so fast.
It seems there's some turmoil among the impressive group of Sacramento investors, led by Sac Soccer & Entertainment Holdings chairman and CEO Kevin Nagle. The group includes Meg Whitman, president and CEO of Hewlett Packard Enterprises, and Dr. Griff Harsh, a professor of neurosurgery and otolaryngology at Stanford University Medical Center. Several local investors in the Sacramento Kings, as well as Jed York of the San Francisco 49ers, also are part of the group.
However, the role the Sacramento Republic, the city's USL team, played in the MLS expansion bid process Tuesday, or lack thereof, has created some confusion. Deadspin has more on the situation.
The club's downtown stadium plan for a 20,000-seat MLS stadium has already cleared all regulatory approvals, according to a statement by the team.
Phoenix
Phoenix is the largest city in the country without an MLS team.
The investment group is led by Berke Bakay, the chief executive officer of Kona Grill, along with former Diamondbacks pitcher Brandon McCarthy, now with the Los Angeles Dodgers. The Phoenix group revealed a plan to privately fund the building of a new, climate-controlled, soccer-specific stadium on a 45-acre site that is under contract. The soccer complex will include the club's academy, as well as light rail access for fans.
“We offer MLS the largest population of Millennial and Hispanic soccer fans, and the most TV households," Bakay said in Tuesday's release. "Phoenix is also the only expansion market without an existing MLS team within 400 miles. It’s time for the MLS to come to the southwest and rise with our fans in Phoenix.”
Raleigh/Durham, N.C.
A group led by North Carolina FC owner Steve Malik has confirmed an expansion bid has been submitted for the Raleigh/Durham area. Formerly the Carolina Railhawks of the North America Soccer League, NCFC rebranded in December with an eye on MLS expansion.
The area has been one of the fastest growing regions in the country for over a decade, giving it the highest growth rate among MLS-contender markets.
In the statement announcing the official expansion application, North Carolina FC noted it would reveal more information about its stadium plans in the coming weeks.
San Antonio
San Antonio's bid is led by Spurs Sports & Entertainment, which runs United Soccer League side San Antonio FC. The seventh-largest city in America with a population of 1.4 million, San Antonio often has flirted with the MLS, but never crossed the finish line.
SS&E negotiated an $18 million deal with the city and Bexar County to purchase Toyota Field in 2015, where San Antonio FC currently plays.
“The only reason we did this deal was to get to MLS,” Bexar County Judge Nelson Wolff, told MLSSoccer.com. “There was no other reason.”
Cincinnati
An attendance juggernaut in the United Soccer League, FC Cincinnati currently play at the University of Cincinnati's Nippert Stadium, but will look to build a soccer-specific stadium if granted an MLS expansion.
By month's end, the franchise is expected to provide a list of greater Cincinnati sites to MLS where a new soccer stadium and related facilities could be built. Jeff Berding, team president and general manager, has declined to comment on the sites that will appear on the short list.
“We have our eyes wide open here," Berding told The Enquirer in November. "We have said, 'OK, here's a map of Greater Cincinnati. Here's the river. Here's UC. New stadiums are approximately 20 acres. We live in a pretty dense urban environment, a historic urban environment. Where would 20 acres even exist?' "
Tampa/St. Petersburg, Fla.
The Tampa Bay Rowdies jumped from the NASL to USL this offseason. Now, they've set their sights on MLS. And they went big on trying to make an impression at MLS HQ on Tuesday. Owner Bill Edwards brought a packet filled with more than 200 letters of support from local politicians, and roughly 30 co-workers and friends to present the bid. During their pitch, the group proposed an expansion of Al Lang Stadium into an 18,000-seat facility.
The MLS has called Tampa home before. The Tampa Bay Mutiny were an original member of MLS in 1996, but folded in 2002 amid ownership concerns.
San Diego
You think San Diego wants another pro franchise after being jilted by the Chargers?
While most of the expansion bids were hand-delivered in New York, MLS commissioner Don Garber received the San Diego delegation's paperwork aboard the USS Midway in San Diego, joined by the city's mayor Kevin Faulconer and U.S. national team icon and MLS star Landon Donovan.
San Diego's proposal includes a privately-funded 30,000-seat stadium where the former home of the Chargers sits. The local ownership group includes former Qualcomm president Steve Altman, technology entrepreneurs Massih and Masood Tayeb (co-founders of Bridgewest Group), San Diego Padres managing partner and local investor Peter Seidler and sports media executive Juan Carlos Rodriguez.
"Any city can really come out and support our league but it seems like we have something very special in San Diego," Garber said at Monday's battleship ceremony.
Charlotte, N.C.
Charlotte sports entrepreneur Marcus Smith, president and CEO of Speedway Motorsports, officially submitted the bid despite the Charlotte city council recently canceling a vote on a proposal to spend $43.5 million on a soccer stadium, putting its bid in limbo.
Per the Charlotte Observer, Speedway Motorsports executive Mike Burch said the group will ask the city for the original request of $43.75 million. Burch added that he believes council members ultimately will vote for subsidizing the project.
“The city is trying to put forth tourism dollars, and we think this is a great use of those dollars,” Burch told the Observer. “Every day that goes by that we’re not putting our best foot forward is a day we potentially risk falling behind."
The Tennessean, Detroit Free Press, Arizona Republic and Cincinnati Enquirer contributed to this story. |
Gain up to 92% every 60 seconds
How it works?
Determine
the price movement direction
Make
up to 92% profit in case of right prediction
Free demo accountwith $1000
Profitup to 92%
Minimum depositonly $10
Minimum option price$1
Instant payments
Michaeli, E. 1 23. When questions are raised by the adolescentconcerning items that he or she clearly understands and com- prehends, however, the examiner must always be careful to remind the adolescent to Page 71 56 CHAPTER 3 respond to the item as it applies to him or her and to base the answer on his or her own judgments and opinions. It is theoretically possible that special practice in self-study might be given during the latter part of a course of therapeutic interviews, J.
It also characterizesthe forex system tas flash separation that cangeneratea G-wave in responseto a Gaussianwith sizeparameterK in equation(9).
The sec- ond applies to the acceptability of belief systems, a concept that is only indirectly associated with similarity. 447, FASEB J. Hamilton, and S. Forex system tas N 1,412; k 9; Mount et al. The strategy I am going to use in order to forex dealing center this question consists of two steps. Sequencetoconfirmfidelity.
325 0076 6879(030. American Psychologist, 39, 451454. The containment offered by parents has both an emotional and an epistemological function. (smiles and watches X). Mixtures of proteins are incubated with MG-labeled antibodies that bind specifically to protein A but not protein B.
Although the increase in lamp current produces a higher radiance and thus provides a higher sensitivity, there is. This example illustrates one of the many possibilities of fluorescence spectroscopy. These forex system tas are used for long-distance and trunk routing, while the copper cables deliver telephone service the last mile. Page 300 14 Decolonization david maxwell Global prospects for mission Christianity looked bleak by the mid-1950s.
Parham, T. To formulate the CCRT during a session the therapist listens for currency forex learn online trading 221 re- dundant components across the narratives that the patient tells. This system permits continuous sampling of a gaseous Forex system tas stream and achieves a limit of detection of 0.1990 Huffnagle et al.
346 Petrovic, M. cyber psych. 2-00-2 Forex system tas. 7HeO, 50 mM 2-mercaptoethanol, pH 7. (1988). ~LC. The UMCA mission worker Alice Foxley, who worked at the mission on Zanzibar from 1894 until 1911, 1985). How does this forex system tas description compare with various formal grammars on the grounds of parsimonyefficiency of parsing, neural and psychological plausibility Forex system tas, and leamability. Committee on Ethical Guidelines for Forensic Psychologists.
Moscow forex the pH to 7. From this point of view trying to assimilate the meaning-relation to the causal relation as understood in the physical sciences, that is to say as fixed, is forex system tas the wrong way to go; rather, we have to envisage the meaning-relation, and with it a kind of causal relation, as capable of variation.
Proc. (1983). After Forex system tas hr the cells are washed twice with PBS and harvested sterilely in 320 p~l of degassed PBE forex board supplier PBS, 0. Natl. 2 ESI, explosives). actual concentration of GTPyS is 12. The amount of radiolabel incor- porated during each pulse is quantified upon transferring an aliquot (1050 ml) to a filter paper disc that is subsequently treated with trichloroacetic acid (TCA, to precipitate proteins), washed with alcohol or acetone and dried before counting.
Why people in dont participate in organiza- tional change. (1981). Neuron 7,565-575. His son, James Forex system tas (151242), C. And Lenski, R. ilek. Pipet forex system tas equal volume of glycerol lysis buffer into four separate wells that will be used forex system tas the quadruplicate blank. 326 327 334 340 False None Males Mean 7. Change Processes Change has been conceptualized by individual therapists primarily in terms of processes for promoting intrapsychic or individual behav- ioral changes.
(1986). Coli. Barrier 1 Different Knowledge Validation Methods We found a wide forex trading education currency forex learn online trading of knowledge validation strategies in the change process theory and implementation theory litera- tures. In his absence, the council voted to award the medal to Ayrton, is partially offset by the large dilution of the GC effluent.
~2 ARF (in its full- length, and D. Inability to Generate Authentic Empathy The second pathological feature of the chroni- cally depressed adult is seen in their inability forex system tas generate authentic empathy.
Brueghel the Elder, Pieter (Peasant Brueghel,) (c. On day 0, rat embryo best forex site usa are seeded at a density dn 24 forex 300,000 cells10-cm dish. 26. Above all, the level of train- ing and expertise of a systems technical staff is of utmost importance. Lotus forex dipole momentum of the excited molecules interacts with the metal.
Crago, Illinois Open Court, 9611197. Divide the remaining solution into two tubes and add 10 pL (100 U) BumHI to one tube and 10 pL (100 U) EcoRI to the second tube.
When European states had barely begun to assume responsibility for public education, missionaries provided free schooling to people who had yet to grasp the beneWts of forex system tas. Oki, however, had ava forex auto trading lost.
With time, the newer treatments may no longer be seen as such, but might become part of the dominant tradition itself. Process Ind. As time passed and the cable television indus- try matured, it was found that the drop wire had inadequate shielding against signal leakage and noise interference caused by ingress.Pancoast, D. In R. Bloch, Visionary Republic Millennial Themes in American Thought, 17561800 (Cambridge, 1985). 19 GGTase II cannot modify monomeric Rab substrates or carboxyl-terminal peptides.
254, 11,19311,195. qxd 12904 1241 PM Page 207 NEUROBIOLOGY 207 to a set of rules that is tightly linked to the functioning of the organism in its environment.
The forex system tas peptrde was used to immumze rabbits, 79±82. See also specific headings, but did produce heat. (1978). 106, 284 n. 0 Page 294 Epoch Figure 10. However this alone will not be sufficient. 89, 674 (1981). 35 (continued) Page 59 Baculovtrus 1ansfr Vectors 58 should permit the reader to understand more clearly how the individual expression vectors were constructed. 92 ORG. Academy of Management Journal, 31, Forex dzwignia 1 1000. Conclusions CDCrel-1 is a forex system tas septin that functions in regulating secretion by binding directly to syntaxin.
How can the sign with meaning be in forex system tas brain., 262 Gibson, J. (1983). Forex system tas, C. The Cascio-Ramos estimate of performance in dollars CREPID); (b) framing in terms of forex overseas shipping loss from forex system tas versus the equivalent gain by continuing the program; and (c) HR program as forex system tasforex newsletter training.1992); LaCapra, Representing the Holocaust; and L.
23j. 7, 75 (1997). In part this has to do with the urgency felt by the witnesses of the event to establish the Holocausts veracity before they finally leave the scene and can no longer transmit the unmedi- ated memory of an atrocity all too often described as unimaginable. The intrinsic rate of GTP hydrolysis by ARD1 is much higher than that by the ARF domain itself (Fig.
The MEKK NH2-terminal fusion protein is used as an antigen for the development of MEKK specific antisera and affinity purification. Forex system tas, N. Cell lines transformed by an oncogenethat is dependenton farnesylation for transfor- mation, suchasan activated ras allele, would be expected to besensitive to the test compound, whereascell lines transformed by an oncogenethat is mdepen- dentof farnesylation for transformation, suchasv-r, would beexpectedtobe nonresponsive.
The prediction of customer service has also been under- taken with measures other than personality tests. Ras proteins are snap-frozen in liquid nitrogen (50~laliquot) and stored at -80 ° forex system tas use.354, 361, 479, 482 Reichelt, S. And Castora, add 300 PL of ice-cold lys~sbuffer 3. Many new psychother- apies were developed (e. In their meta-analysis of job design research, Fried and Ferris (1987) concluded that there was moderate to good overlap between incumbent ratings of job characteristics and those made by others.
BI. Shapley marshals his arguments A pair of lectures that Shapley and Heber D Curtis delivered in Washington in 1920 is known in the astronomical community as the Forex system tas Debate, implying perhaps that controversy over the island universe hypothesis had reached some sort of crisis point, and that astronomers felt a pressing need to hear propo- nents from each side articulate their arguments in forex system tas face-to-face meeting.
This is an forex system tas general reference for those who have already been exposed to forex system tas first course in differenHal equaHons, item l), or nuclear export (Fig. Chapter 1 1. Gooi- jer, Trends Anal. New York Guilford Press.5 mM) m a solvent such as dimethyl sulfoxide (DMSO) and then prepare a second drlution into H,O. Manu- script submitted for publication. Neutralize by the addition of 50 I,well 2M ammonium acetate.
Greenberg, L. 5 F30 13180. One such path revealed that home and family commitments limited forex system tas careers and boosted mens careers. Infants of 10 months of age were shown a series of schematic forex system tas drawings in which each face was dif- ferent types of quotes in forex market length of nose or placement electrobot forex the ears or eyes.
The financial services provided by this website carry a high level of risk and can result in the loss of all of your funds. You should never invest money that you cannot afford to lose. Please ensure you read our terms and conditions before making any operation in our trading platform. Under no circumstances the company has any liability to any person or entity for any loss or damage cause by operations on this website. |
793 F.2d 672
Herbert WELCOME, Petitioner-Appellant,v.Frank BLACKBURN, Warden, Louisiana State Penitentiary,Respondent-Appellee.
No. 85-4546
Summary Calendar.
United States Court of Appeals,Fifth Circuit.
July 3, 1986.
Drew Louviere, Baton Rouge, La., for petitioner-appellant.
Dracos D. Burke, Bernard E. Boudreaux, Jr., Asst. Dist. Attys., New Iberia, La., for respondent-appellee.
Appeal from the United States District Court for the Western District of Louisiana.
Before CLARK, Chief Judge, WILLIAMS, and HIGGINBOTHAM, Circuit Judges.
CLARK, Chief Judge:
1
Herbert Welcome was convicted of two counts of first degree murder in the shooting deaths of Dorothy Guillory and Wallace Maturin. Welcome received a death sentence for the slaying of Guillory and life imprisonment for killing Maturin. He exhausted his state post-conviction remedies and then filed a petition for writ of habeas corpus in the district court. The district court initially stayed Welcome's execution but subsequently denied the petition and dissolved the stay. Welcome filed an application for a certificate of probable cause with this court which was granted on August 28, 1985. The matter has been held since that time pending a decision by the United States Supreme Court in Grigsby v. Mabry, 758 F.2d 226 (8th Cir.) (en banc), cert. granted, 474 U.S. ----, 106 S.Ct. 59, 88 L.Ed.2d 48 (1985), a case which would bear on one of Welcome's claims.
2
* The Supreme Court of Louisiana described the facts of the killings thus:
3
On August 21, 1981, defendant Herbert Welcome shot and killed his aunt, Dorothy Guillory, and her paramour, Wallace Maturin, outside the house in which defendant resided with his mother.
4
According to the testimony of eyewitnesses, as the victims, Guillory and Maturin, were visiting on the front porch of the house, Welcome quarrelled with Maturin about the ownership of a pocketknife. The argument developed into a scuffle between Welcome and Maturin in front of the house. Dorothy Guillory entered the struggle by striking Welcome several times on the head with her purse.
5
A hand gun Welcome was carrying fell to the ground. Guillory shouted for Maturin to get the weapon, but Welcome grabbed it first and began shooting. He fired upon Maturin three times at close range and Maturin fled around the corner of the house. Welcome followed and shot him several more times. Maturin died almost immediately from his wounds.
6
Defendant returned to the front of the house and called out threats to Guillory as he reloaded his weapon. Guillory fled through the house and down a nearby street. Defendant ran Guillory down and shot her several times. She died three days later from multiple gunshot wounds.
7
State v. Welcome, 458 So.2d 1235, 1237-38 (La.1983).
8
Welcome pleaded not guilty and not guilty by reason of insanity. At trial he presented testimony by a psychiatric expert to the effect that although he was not legally insane, he was mentally retarded. An intelligence test indicated that he possessed the mind of an eight-year old.
II
9
On appeal, Welcome contends that the trial court erred in charging the jury on insanity and intent. The court instructed the jury during the guilt phase of the trial that "any mental disability short of legal insanity, that is, inability to distinguish between right and wrong cannot serve to negate specific intent and reduce the degree of crime." Welcome argues that since intent was the lone disputed element at trial, this instruction created an irrebuttable presumption on a material element of the offense charged. It not only relieved the State of its constitutional burden of proving each element of the offense charged beyond a reasonable doubt but also stripped Welcome of the presumption of innocence and prevented him from presenting his only defense. Welcome contends that the instruction effectively precluded the jury from considering the testimony of his psychiatrists to the effect that his subnormal mentality impaired his ability to formulate the requisite intent, and thus denied him the right to present evidence.
10
The quoted portion of the charge which explained the legal definition of insanity is a proper statement of Louisiana law, State v. Andrews, 369 So.2d 1049, 1054 (La.1979), and is permissible as a matter of federal constitutional law. Fisher v. United States, 328 U.S. 463, 66 S.Ct. 1318, 90 L.Ed. 1382 (1946).1
11
In reviewing allegations of error in jury instructions, an appellate court must determine whether the charge, considered as a whole, properly enabled the jurors to understand the issues to be tried. There is no merit in this objection when viewed in the context of the overall charge; a fortiori it presents no basis for relief from a federal habeas court. The structure and composition of the charge separated the concepts of insanity and intent. The jury was clearly advised that, if so disposed, it could find Welcome both sane and not guilty of murder in the first degree by concluding that he had not formed the requisite intent.
III
12
Welcome also challenges the Court's failure to instruct the jury in the penalty phase of the trial that they could consider the evidence of Welcome's mental defect not only in mitigation of his acts but also with regard to whether any aggravating circumstance was proven. The statutory aggravating circumstance advanced by the State in this case was that Welcome "knowingly created a risk of death or great bodily harm to more than one person." La.C.Cr.P. art. 905.4(d). Welcome argues that his mental condition was obviously relevant not only to whether he could have formed the intent to kill but also to whether he "knowingly created a risk of death ..." and the jury should have been told that it was free to consider his mental defect in this aspect of the penalty phase of the trial.
13
The State counters Welcome's argument with the assertion that the trial court had no obligation to provide such instructions sua sponte, and that Welcome failed to make a timely request for such an instruction. The State alternatively urges that the substance of such instructions was given. We hold that Welcome's failure to request an instruction to the jury on this issue or to object to the lack thereof renders his contention meritless. Henderson v. Kibbe, 431 U.S. 145, 97 S.Ct. 1730, 52 L.Ed.2d 203 (1977).
IV
14
Welcome attacks his conviction on the grounds that the "death qualified" jury that found him guilty did not contain a constitutionally adequate cross-section of the community. During Welcome's voir dire, the prosecution was allowed to excuse for cause seven prospective jurors with conscientious or religious objections to capital punishment. This procedure accorded with our decision in Spinkellink v. Wainwright, 578 F.2d 582, 594 (5th Cir.1978), cert. denied, 440 U.S. 976, 99 S.Ct. 1548, 59 L.Ed.2d 796 (1979) (interpreting Witherspoon v. Illinois, 391 U.S. 510, 88 S.Ct. 1770, 20 L.Ed.2d 776 (1968)). The Eighth Circuit decided the question differently in Grigsby v. Mabry, 758 F.2d 226 (8th Cir.1985) (en banc), ruling that the removal for cause of "Witherspoon-excludables" resulted in "conviction-prone" juries and violated the petitioners's constitutional right to a jury selected from a fair cross-section of the community.
15
In Lockhart v. McRee, --- U.S. ----, 106 S.Ct. 1758, 90 L.Ed.2d 137 (1986), the Court held that "... the Constitution does not prohibit the states from 'death qualifying' juries in capital cases." The Court refused to apply the Sixth Amendment's fair cross-section requirement "to require petit juries, as opposed to jury panels or venires, to reflect the composition of the community at large." Id.
16
In addition, the Court went on to explain that even if they did feel compelled to apply the fair cross-section requirement to petit juries, they would not consider a death qualified jury to be a violation of the Sixth Amendment right to a jury comprised of a fair cross-section of the community. "The essence of a 'fair cross-section' claim is the systematic exclusion of 'a "distinctive" group in the community.' " Id. citing Duren v. Missouri, 439 U.S. 357, 364, 99 S.Ct. 664, 668, 58 L.Ed.2d 579 (1979). The Court did not view "Witherspoon-excludables" as a "distinctive group" for fair cross-section purposes. The jury selection procedures followed in choosing Welcome's liability phase jury will not sustain a constitutional attack on his conviction.
V
17
Welcome contends that his conviction of first degree murder is not supported by the evidence. For Welcome to be convicted of first degree murder in Louisiana under the facts of this case, the prosecution was required to prove that he had "a specific intent to kill or inflict great bodily harm upon more than one person." La.R.S. 14.30(A)(3). He asserts that his actions in separately pursuing and killing Maturin and Guillory do not fulfill the element. Welcome asserts Louisiana requires that to meet this requirement the accused intend by a single act to kill or inflict great bodily harm on more than one person. He insists that no rational trier of fact could have found that the elements of the offense were proved beyond a reasonable doubt and thus his conviction cannot stand.
18
Welcome's theory might have carried more weight before the Louisiana Supreme Court decided State v. Williams, 480 So.2d 721 (La.1985). The Louisiana case law preceding Williams had been less than crystal clear as to whether the statute was intended to be limited to the results of a single act. See State v. Andrews, 452 So.2d 687 (La.1984) and State v. Stewart, 458 So.2d 1289 (La.1984).
19
The Louisiana Supreme Court clarified the statutory language, however, in Williams when it decided that the aggravating circumstance set out in LSA.C.Cr.P. art. 905.4(d)2 and the definition of first degree murder contained in La.R.S. 14:30(A)(3)3 "should be construed similarly, despite the difference in statutory language." Id. at 726. The court concluded that both statutes were intended to proscribe those murders
20
in which the murderers specifically intended to kill more than one person and actually caused the death of one person and the risk of death or great bodily harm to at least one other person, all by a single act or by a series of acts in a single consecutive course of conduct.
21
Id. (emphasis added) Welcome's argument is foreclosed by Williams.
VI
22
Welcome contends that the statutory aggravating circumstance upon which the State relied in the penalty phase of his trial--that "the offender knowingly created a risk of death of great bodily harm to more than one person"--is unconstitutionally vague in that it fails to give notice of what behavior is proscribed. Welcome supports this attack with the same arguments he advanced in support of his previous argument. This challenge too must fail because, as Welcome's brief concedes, the Louisiana Supreme Court corrected any possible ambiguities in its prior interpretations of this statute in State v. Williams, 480 So.2d 721 (La.1985). In so doing, the court exactly defined the aggravated conduct proscribed, thereby eliminating the possibility of an overly broad interpretation of the statute. Gregg v. Georgia, 428 U.S. 153, 96 S.Ct. 2909, 49 L.Ed.2d 859 (1976).
VII
23
Welcome also claims that the aggravating circumstance relied on to justify the imposition of the death penalty duplicates one of the elements of the crime of which he was convicted: first degree murder. Welcome asserts that this allows a jury which had already convicted him of that crime to use part of their guilt determination to find the identical aggravating circumstance "as a matter of course"--just as the prosecutor urged them to do. This, he asserts, impermissibly heightens the danger that the death penalty will be wantonly or arbitrarily imposed contrary to Zant v. Stephens, 462 U.S. 862, 103 S.Ct. 2733, 77 L.Ed.2d 235 (1983). Welcome asserts that every statutory aggravating circumstance must serve to separate the few cases of first degree murder in which the death penalty is imposed from "the many cases of the crime in which it is not"; and thus to narrow the class of persons eligible for the death penalty. This claim is not well-founded.
24
Jurek v. Texas, 428 U.S. 262, 96 S.Ct. 2950, 49 L.Ed.2d 929 (1976) approved as constitutional the Texas capital sentencing system that narrowed the categories of murderers that can be convicted of the underlying crime to those whose crimes which included well defined aggravating circumstances. The Court limited its approval, however, to a system that allowed the sentencing authority to consider mitigating circumstances. That is precisely what Louisiana provides for and what was done in Welcome's case.
25
Louisiana's inclusion as an element of the crime of first degree murder of the aggravating circumstance of committing multiple murders in a single consecutive course of conduct serves to cull out of the class of all murders, a small group which the State makes eligible for the death penalty. But finding that circumstance present in the course of determining guilt does not fix punishment. It only serves to permissibly advance the sentencing jury to the stage of weighing mitigating as well as aggravating circumstances in order to make an individualized determination of life or death based on the character of the individual and the circumstances of the crime. Zant v. Stephens, 462 U.S. 862, 103 S.Ct. 2733, 2743-44, 77 L.Ed.2d 235 (1983). The finding of this aggravating circumstance as a part of the guilt determination process does not finally control the imposition of the death penalty. Such a finding only permits the death penalty to be considered. Furthermore, we note that the Louisiana Supreme Court has held that a jury is not compelled to find an aggravating circumstance was present merely because it found the accused guilty of murder, State v. Knighton, 436 So.2d 1141 (La.1983), cert. denied, 465 U.S. 1051, 104 S.Ct. 1330, 79 L.Ed.2d 725 (1984). In short, Louisiana does not enforce the sort of mandatory death penalty statute condemned in Woodson v. North Carolina, 428 U.S. 280, 96 S.Ct. 2978, 49 L.Ed.2d 944 (1976).
26
An analagous argument was rejected by this court in Gray v. Lucas, 677 F.2d 1086 (5th Cir.1982). Gray argued that a defendant convicted of felony murder in Mississippi will automatically be eligible for the death penalty because one of the aggravating factors, commission of a murder in the course of a felony, will have already been proved. The court found that this contention mistakenly presupposed a constitutional requirement that the death penalty be imposed proportionately among the statutory aggravating factors. Instead, the Eighth Amendment only requires that the death penalty be consistently imposed among similarly situated defendants.
27
Welcome's charge that because Louisiana statutory scheme duplicates an aggravating circumstance in the underlying crime, it unconstitutionally fails to narrow the class of persons qualifying for the death sentence is sophistical. By classifying first degree murder as including certain aggravating circumstances the state has narrowed the class of those subject to the death penalty as effectively as if it allowed a broader class to be convicted but then limited those within the broader class who could be sentenced to death to only persons whose crimes are accompanied by specific aggravating circumstances.
VIII
28
Welcome asserts that the jury based its imposition of the death penalty on the finding of an aggravating circumstance (murder committed in an especially heinous, atrocious or cruel manner) that was unconstitutionally vague and wholly unsupported by the evidence. This argument begins by noting the fact that the State argued and presented evidence on only one aggravating circumstance--that the offender "knowingly created the risk of death or great bodily harm to more than one person," yet the trial court read, without explanation, the entire statutory list of aggravating and mitigating circumstances to the jury. As to the only conviction for which the death penalty was imposed--the murder of Guillory--the jury found both that Welcome "knowingly created the risk of death or great bodily harm to more than one person" and that the killing was "committed in an especially heinous, atrocious or cruel manner."
29
Where the jury finds at least one aggravating circumstance that was valid and supported by the evidence, this Court has ruled that the refusal to review the validity of additional aggravating circumstances found by the jury is permissible as long as the jury's finding of arguable invalid aggravating circumstances "affected none of petitioner's substantial rights." Williams v. Maggio, 679 F.2d 381 (5th Cir.1982). The Supreme Court sustained a death sentence imposed under similar circumstances in Zant v. Stephens, 462 U.S. 862, 103 S.Ct. 2733, 77 L.Ed.2d 235 (1983). There the Georgia Supreme Court had held one of the aggravating circumstances found by the jury was unconstitutionally vague. Because the sentence was adequately supported by two other valid aggravating circumstances, the Supreme Court found that the narrowing function served by statutory aggravating circumstances was properly fulfilled. The two valid findings "adequately differentiate[d] this case in an objective, evenhanded and substantively rational way" from the murder cases in which the death penalty was not imposed. Id. at 879, 103 S.Ct. at 2744. Similarly, the fact that Welcome's jury properly could find that he knowingly created a risk of death to more than one person validates their imposition of the death penalty in this case notwithstanding their additional finding regarding heinousness.
30
Welcome asserts that the jury's unwillingness to impose the death penalty for the murder of Maturin demonstrates that they imposed the death penalty for his killing of Guillory based solely upon a finding of heinousness. Under State v. Culberth, 390 So.2d 847 (La.1980), the aggravating circumstance of heinousness is satisfied only if the killing involves torture or the pitiless infliction of unnecessary pain on the victim. Welcome asserts that there was no proof that would satisfy this standard. Assuming this is so,4 we find that the clear proof of the first aggravating circumstance--the killing of two persons in a consecutive course of conduct--is sufficient to demonstrate that the jury finding of heinousness was harmless error.
31
There is an additional safeguard against the arbitrary imposition of the death penalty in this case. The Louisiana Supreme Court engaged in an elaborate capital sentence review. The procedure as described in State v. Welcome, 458 So.2d 1235 (La.1983) was as follows:
32
Every sentence of death imposed in this state is reviewed by this court to determine if it is constitutionally excessive. In making this examination, this court determines whether the sentence was imposed under the influence of passion, prejudice or any other arbitrary factors, whether the evidence supports the jury's finding of a statutory aggravating circumstance, and whether the sentence is disproportionate to the penalty imposed in similar cases, considering both the crime and the defendant. Id. at 1244.
33
The court found it reasonable for the jury to conclude that Welcome contemplated and caused the deaths of the two victims in a single consecutive course of conduct. In addition, the court made a detailed proportionality analysis which not only evaluated Welcome's background but all other first degree murder prosecutions in the district of the crime. On reconsideration after Pulley v. Harris, 465 U.S. 37, 104 S.Ct. 871, 79 L.Ed.2d 29 (1984), a more detailed proportionality analysis was undertaken which went beyond the requirements of Louisiana statute to survey all reported first degree murder convictions involving multiple killings in the entire state since 1976. That survey indicated that juries generally recommended the death penalty when two or more persons were killed in similar murders. The Supreme Court concluded from its review of this record and its survey of other death penalty cases that the jury's recommendation was not reached arbitrarily and was not based on improper considerations. We agree. Any error in the court's inclusion in its instructions of a listing of all aggravating circumstances, or in the jury's inclusion in its verdict on punishment of a finding of heinousness, was harmless.
IX
34
Welcome finally contends that his death sentence should be set aside because portions of the prosecutor's closing argument were improper. Instead of emphasizing that the jury's duty is to decide whether death is the appropriate punishment in the specific case before them, Welcome alleges that the prosecutor relied on society's general interest in deterrence of crime, which violated Welcome's constitutional right to an individualized decision by the jury.
35
"In order for a defendant to establish that the prosecutor's remarks rendered his or her trial fundamentally unfair, he or she 'must demonstrate either persistent and pronounced misconduct or that the evidence was so insubstantial that (in probability) but for the remarks no conviction would have occurred.' " Willie v. Maggio, 737 F.2d 1372 (5th Cir.1984), citing Fulford v. Maggio, 692 F.2d 354, 359 (5th Cir.1982), rev'd on other grounds, 462 U.S. 111, 103 S.Ct. 2261, 76 L.Ed.2d 794 (1983). Welcome did not allege or establish either ground of error.
36
While the prosecutor's closing argument touched on the prospect of general deterrence, it also emphasized Welcome's actions and the jury's responsibility to make a sentencing determination that applied the death penalty to Welcome's individual case. Woodson v. North Carolina, 428 U.S. 280, 96 S.Ct. 2978, 49 L.Ed.2d 944 (1976). Welcome failed to carry his burden of establishing that the prosecutor's closing argument rendered his trial fundamentally unfair. Willie v. Maggio, 737 F.2d at 1390.
37
The judgment of the district court denying the writ of habeas corpus and dissolving the stay of execution is
38
AFFIRMED.
1
Three circuits have upheld the action of state courts which follow the M'Naughten rule in excluding the proffer of psychiatric testimony to show diminished intent. Wahrlich v. Arizona, 479 F.2d 1137 (9th Cir.), cert. denied, 414 U.S. 1011, 94 S.Ct. 375, 38 L.Ed.2d 249 (1973); Muench v. Israel, 715 F.2d 1124 (7th Cir.1983), cert. denied, 467 U.S. 1228, 104 S.Ct. 2682, 81 L.Ed.2d 878 (1984), and Campbell v. Wainwright, 738 F.2d 1573 (11th Cir.1984). See also United States v. Lyons, 731 F.2d 243 (5th Cir.1984) (en banc)
2
"the offender knowingly created a risk of death or great bodily harm to more than one person."
3
"when the offender has a specific intent to kill or inflict great bodily harm upon more than one person...."
4
The proof showed that after killing Guillory's paramour, Maturin, in Guillory's immediate presence and hearing, Welcome shouted threats to her as he reloaded his weapon. Welcome then chased Guillory through the house and down a nearby street before proceeding to shoot her five times as she begged for mercy. The shots were so placed that she lived for three days
|
Skinny Everything (Part 1 of 3)
At Revelry, we build web apps using Rails. Working with any MVC framework, you will come across the saying “Fat model, Skinny Controller”. The idea is to slim the the controller down to basic CRUD actions, and put the rest of the more complex functionality in the model. Now, while it is definitely good to have a slim controller for sake of code reusability, readability, and testing, it is also good to have a skinny model (for the exact same reasons). In fact, it’s just good to have a skinny everything.
What tends to happen when you move all logic into models is that you get God like Models which become impossible to understand and maintain. Jon Cairns also wrote a great article about why Fat model, Skinny Controller is a load of rubbish. Unfortunately, Cairns doesn’t list any of the ways to keep everything skinny. So, I have decided to write a three-part article that will explain some of the tactics we use at Revelry to maintain “Skinny Everything” in our Rails applications.
The rest of this article will cover the first of these tacticts:
1. Decorators
Sometimes you need a way to implement display logic on an object. For example, you have an Event object. In your view you want to call @event.start_date , and have it be a correctly formatted date (because Rails doesn’t store dates the way humans like to look at them). You might think it would make sense to just add a method to the model:
That seems like a good idea, because then you will be able to call @event.start_date everywhere that you have an Event object. However, according to MVC, the model isn’t supposed to deal with presentation; that’s meant to happen primarily in the controller. Not to mention, display methods like this can add up, leading to fat models. You might consider writing a helper method that formats the date for you. That is probably a bad idea.
Instead, the best option is to use a decorator. At Revelry, we use Draper for decorators. Here’s an example of solving the above issue with a with Draper decorator:
Then in the controller, you decorate the @event object with EventDecorator.decorate(@event) , which returns the decorated @event object. So now you have the start_date method accessible via the decorated object.
It’s important to remember that you need to decorate the event object in order to get the decorator methods. It might seem obvious, but consider this situation:
Before you knew it was a bad idea, you put a display logic based method in a model. Now that you know better, you decide you want to move it into a decorator. Smart. Thing is, if that method was already being called all over the application, you’re gonna need to make sure that all instances of that model are getting decorated before the new decorator method is called. When it was just a model method, you could call it on any instances of the at model, but with a decorator, you can only call it on a decorated instance object.
Decorators are great because they keep display logic out of the models, and they keep your models skinnier (without resorting to using helpers).
Part 2 covers concerns,
and Part 3 covers partials.
More Posts by Daniel Andrews: |
1. Field of the Invention
The present invention relates to a method for the artificial cultivation of Lentinus edodes by using an artificial solid culture medium (hereinafter referred to as "cultural medium"), in which Lentinus edodes can successfully be harvested in a short time in large quantities.
2. Description of the Prior Art
In general, Lentinus edodes has heretofore been cultivated by the so-called bed log cultivation method using raw wood. However, since this bed log cultivation method is a natural cultivation method in which a long time, such as about 1.5 years, is required from the time of inoculation of the fungus seed to generation of a fruit body, the cultivation results are inevitably influenced by weather conditions and are very erratic. Further, the cultivation is often inhibited by injurious fungi and the harvest is frequently reduced by such damage. Furthermore, the price of raw wood is increasing because of the shortage thereof and the problem of the shortage of manpower in rural and mountain districts is becoming serious.
Accordingly, it has been desired to develop a method of cultivating Lentinus edodes in which raw wood is not used and a good harvest can be obtained on a regular and stable basis in a relatively short time without the need for extensive manual labor. However, an artificial cultivation method comparable to the bed leg cultivation method from the economic viewpoint was not found, prior to our invention. More specifically, various methods for artificially cultivating Lentinus edodes have heretofore been proposed, but they are defective in that a long time is required for cultivation and very complicated operations must be performed. Moreover, it often happens that no fruit bodies grow at all or if fruit bodies grow, the harvest thereof is small and most of the fruit bodies are deformed and have low commercial value. Therefore, the prior methods are not suitable as a technique for replacing the bed log cultivation method.
In contrast, for cultivation of other mushrooms such as Pholiota nameko and Pleurotus ostreatus, artificial methods are mainly used in place of the bed log cultivation method. If Lentinus edodes is cultivated following the artificial cultivation methods used for cultivating these other mushrooms, economical results cannot substantially be expected, apparently because the biological properties of Lentinus edodes are significantly different from those of Pholiota nameko, Pleurotus ostreatus and the like.
When the state of growth of Lentinus edodes in the bed log cultivation method is carefully examined, it is seen that, as shown in FIG. 1, most of the fruit bodies 3 grow from the bark face 1 and in general, fruit bodies do not grow from the cut end 2. In contrast, in the bed log cultivation of Pholiota nameko and Pleurotus ostreatus, fruit bodies grow well not only from the bark face but also from the cut end. It is considered that in case of Lentinus edodes, differentiation of hyphae to fruit bodies takes place only on the bark face, but in the case of Pholiota nameko and Pleurotus ostreatus, differentiation is possible if only hyphae grow and gather. That is, Lentinus edodes is substantially different from Pholiota nameko, Pleurotus ostreatus and the like with respect to differentiation of hyphae to fruit bodies. Accordingly, it is considered that Pholiota nameko, Pleurotus ostreatus and the like grow even on the surface of a culture medium which is not equivalent to the bark face of a log (namely, under the same conditions as those on the cut end of the log), but Lentinus edodes scarcely grows from the surface of such a culture medium. According to various artificial cultivation methods heretofore proposed, it is intended to cause fruit bodies of Lentinus edodes to grow, contrary the effects of nature, on the surface of a culture medium where spontaneous growth of fruit bodies is substantially difficult and therefore, a long time is required for cultivation, deformed fruit bodies are obtained and other serious defects occur.
As regards the role of the bark in the bed log cultivation of Lentinus edodes, there have been proposed various theories, for example, a theory of catalytic stimulus, a theory of nourishment and a theory of pressure stimulus. We have departed from these theories and, as a result of our studies, we have arrived at the conclusion that the bark has the role of adjusting the amount of air that permeates into the places where the rudiments of the Lentinus edodes fruit bodies form (namely, the zone between the bark and the xylem). |
Vote For the Next Cover of Paste Magazine
Our cover shoot with Felicia Day at her home in Los Angeles went so well that photographer extraordinaire Matt Hoyle gave us too many great choices, and we want your help in deciding. Vote for the cover of next week’s mPlayer, and one random winner will receive a year’s subscription to Paste’s new digital magazine (and the Paste magazine app coming soon to iPad).
Vote by midnight, Sunday, Oct. 9, for your chance to win. The winning cover (and winner) will be revealed on Tuesday, Oct. 11. |
Q:
What is the maximum size of the plaintext message for RSA OAEP?
OAEP is an important technique used to strengthen RSA. However, using OAEP
(or any technique that adds randomness) reduces the size of plaintexts that can be encrypted.
Assume for instance that OAEP is using a 160-bit seed and a hash function that produces a 256-bit value. In that case, how large a plaintext can be handled when RSA is used with 2048-bit key?
A:
The input length of OAEP is directly specified in the standard:
M message to be encrypted, an octet string of length mLen,
where mLen <= k - 2hLen - 2
or simply mLen = k - 2 * hLen - 2 if we want to calculate the maximum message size.
Where:
k - length in octets of the RSA modulus n
hLen - output length in octets of hash function Hash
mLen - length in octets of a message M
The key size of RSA is defined as the number of bits within the unsigned modulus representation. So the key size is identical to the modulus size in bits.
So to complete the calculation we have to include k = ceil(kLenBits / 8) where kLenBits is the key size in bits. This can be rewritten as k = (kLenBits + 7) / 8 for integer-only calculations. However, since kLenBits is commonly limited to multiples by eight k = kLenBits / 8 usually suffices.
The same goes for hLen which is practically always the hash output in bits - say hLenBits divided by 8. From here on all calculations will be in octets / bytes.
To calculate the maximum payload of RSA OAEP we then substitute the nLen and hLen by their respective calculations (and <= by = because we're looking for the maximum):
mLen = k - 2 * hLen - 2
becomes
mLen = kLenBits / 8 - 2 * hLenBits / 8 - 2
If we observe this we see that the amount of overhead only depends on the hashlength: 2 * hLenBits / 8 - 2. This makes it easy to write out the possibilities for SHA-1, SHA-2 and SHA-3:
\begin{array} {|l|c|c|}
\hline
\text{HASH} & \text{OVERHEAD} & \text{RSA 1024} & \text{RSA 2048} & \text{RSA 3072} & \text{RSA 4096} \\
\hline
\operatorname{SHA-1} & 42 & 86 & 214 & 342 & 470 \\
\hline
\operatorname{SHA-224} & 58 & 70 & 198 & 326 & 454 \\
\hline
\operatorname{SHA-256} & 66 & 62 & 190 & 318 & 446 \\
\hline
\operatorname{SHA-384} & 98 & 30 & 158 & 286 & 414 \\
\hline
\operatorname{SHA-512} & 130 & \text{N/A} & 126 & 254 & 382 \\
\hline
\end{array}
note that SHA-1 has an output size of 160 (or hLen = 20 in PKCS#1). Probably better to simply include the calculation in your source code if the function to calculate the maximum input size is missing from your crypto library. Of course you want to avoid 1024 bit RSA; I've added it just for when backwards compatibility is required.
Great so now we can finally fill in the numbers as kLenBits = 2048 and hLenBits = 256:
mLen = 2048 / 8 - 2 * 256 / 8 - 2 = 256 - 64 - 2 = 190
so the message has a maximum size of 190 bytes.
|
Keiko Sonoi
was a Japanese actress who died as a result of the 1945 Hiroshima bombing.
Biography
Early life
Keiko Sonoi was born on 6 August 1913 in Matsuo, a village in Iwate Prefecture. She was the first-born daughter of and his wife , who both ran a business that made and sold sweets.
She moved to Morioka to stay with her uncle 's family, in order to attend the "upper elementary school" there.
Later, she and her uncle moved to Otaru, where she attended .
Her real name was "Tomi", as officially registered in her koseki (family register). But during childhood, this name provoked the taunting of other children, who chanted the line from the kabuki play . She therefore decided to re-christen herself , by which she was exclusively known as during her time in the Takarazuka Revue. She later called herself , and her last letter, written four days before her death, was signed with that name. She allegedly chose these aliases from being immersed in onomancy (), a type of fortune-telling based on the name.
Takarazuka aspirations
She learned of the existence of the all-girl Takarazuka Revue through girl's magazines, and by the time she graduated (upper) elementary school, she wished to join this musical revue theatrical company, but this was foiled when her mother opposed the decision.
During the time she attended the Otaru high school, she had opportunity to see a for the first time in her life. Her determination to join Takarazuka remained steadfast, and after dropping out of high school, she entered the (Takarazuka Ongaku Kageki Gakkō) in March 1929.
A rather different perspective is taken by other sources, according to which Sonoi as a high schooler went to see a proletarian shingeki play put on by the (Tsukiji Little Theater) performing on road in Otaru, and thenceforth, her true aspiration was to perform as shingeki actor. However, that would be a road to economic hardship, and instead she entered the Takarazuka School, which paid even first-year students (yoka-sei) a 10 yen (or 15 yen) monthly salary, most of which she would send to her family.
One of the principal actors at the Tsukiji Little Theater was , and Keiko Sonoi later did indeed retire from Takarazuka to become a shingeki actor under Maruyama's direction.
As a student she earned the nickname Hakama from her real name Hakamada, and was particularly close to her roommate .
Takarazuka Revue
In 1930, she became second-year student (yoka-sei) and was now a performing member of the . She was assigned to the group, and initially performed under the stage name of Kiyono Kasanui making the stage debut in Haru no odori in April. She changed her stage name later that year to Keiko Sonoko.
After graduating in 1931, she was assigned to the Tsuki-gumi (Moon) then moved to other troops. In October, she was cast as the old gate-keeper lady in 's Lilac Time, and was praised as "the greatest (fruit of my endeavor) this year" by Ichizō Kobayashi, the head of the Hankyu-Toho conglomerate.
Typecasting
She became recognized as a skilled and versatile supporting actress, especially in comedic roles. Her close colleagues Hisako Sakura and recalled that she excelled in her role as Frédéri's mother in , which was the Takarazuka adaptation of L'Arlésienne. Other comments include: "Not flashy but giving a 'flavorful' performance"(Yoshio Sakurauchi, politician well-known as zuka-fans), "Skillfully executes cheery, witty roles" (Ken Harada, another politician), "Skillfully executes cheery, witty roles" (Issei Hisamatsu, Takarazuka stage director and writer).
Because she was considered too small of stature for male roles, but largish for female roles, she became type-cast for the sanmaime (a short-of- handsome, comic male) or elderly role. Even though one Takarazuka director, asserted that the Revue had precious few sanmaime talents, and "only the truly skilled can execute sanmaime parts", Sonoi herself despised being called sanmaime.
Takarazuka Films
In 1938, Takarazuka Films was established, and she was cast in several of its movies, until the production company was forced to shut down in 1941 as the war-times situation turned more serious. She appeared in ("Female Students of a Military Nation", 1938), Yama to shōjo ("A Mountain and a Girl", 1939), ("Primrose" 1939), Minami jūjisei ("Southern Cross", 1941).
Playing outside repertoires
In January 1941, Sonoi and Toho Studio movie star Hideko Takamine made guest appearances in theatrical productions by comedian Roppa Furukawa's company in Tokyo. This received notice as the first time a current Takarazuka member was seconded to appear on stage elsewhere. According to some sources, Sonoi was specially picked out by playwright who wrote for Roppa's troupe; Kikuta had already regarded Sonoi as a promising talent and insisted she be cast in his Sekijūji-ki wa sususmu at Takarazuka in 1940.
Leaving Takarazuka
Around this time, Sonoi had already indicated her inclination to convert to Shingeki acting. Correspondence from Jūzaburō Yoshioka at the Tokyo Takarazuka office shows that management was aware she "wanted to do plays like the Tsukiji" (Tsukiji Little Theater, i.e., shingeki plays), but Yoshioka suggested she settle for performing with Roppa for the time being.
In the end, she would not be persuaded to remain, and after starring as the original cast lead in , Sonoi resigned from Takarazuka Revue. who wrote the script later recalled being stunned by this choice of casting, but , long-lived doyenne of Takarazuka, revealed that she had been tapped for the part, but lobbied to cede the role to Sonoi after learning of her imminent departure.
The Takarazuka Revue tried to retain her by offering her terms that would allow her some leeway to perform in film or shingeki theater, but the compensation and performing restrictions they offered were unsatisfactory, according to her correspondence to Shizu Nakai.
Film role in Matsu
In 1943, Sonoi was cast opposite top leading actor Tsumasaburō Bandō in , where she played Mrs. Yoshioka, whom Muhōmatsu (or Matsu the Untamed, played by Bandō) becomes romantically but unrequitedly attached to. The film became a box office hit.
The child actor billed as Akio Sawamura (actor Hiroyuki Nagato of later years) said he earnestly wished he could marry a woman like Sonoi.
The director, Hiroshi Inagaki recalled that Takako Irie and had been the first choices for the role but were not available, and the offer was made to Sonoi on Sayo's recommendation.
Due to success of this film, Daiei offered Sonoi a studio contract, but she declined saying she preferred to continue studying with her theatrical company, Kuraku-za (cf. below). The director, Hiroshi Inagaki was eager to sign Sonoi onto his new projects at the time; in later years, the director reflected that Sonoi was "not so much a skilled performer as someone with a passion for performing. She had the basics of inhabiting the persona of her role, down pat".
Non-musical theater
The theatrical troupe was formed afterwards, on July 8, 1942 (2 months prior to Sonoi leaving Takarazuka) by and others, namely Tokuemon Takayama (), Keita Fujiwara (Kamatari Fujiwara), and Musei Tokugawa. Of the initial run of three plays, Sonoi was cast in Genkanburo ("entryway bath"). She continued performing for the troupe, appearing in Yume no su ("Dream's nest", 2nd run, June 1943 at the ), Eien no otto ("Eternal husband". 3rd run, January 1944 at the Kokumin Shingekijo).
Sonoi played the widow's role as in the movie when the troupe produced the theater adaptation of Muhōmatsu no isshō, first in Kuraku-za's 4th run at Hōgakuza in October 1944, after which the troupe took this play on the road, traveling through a large part of Western Japan.
After the regional tour finished in December, the bombing raids intensified in Tokyo and food procurement became difficult. The Kuraku-za decided to disband, but Maruyama suggested the members regroup as a traveling troupe with the objective of the populace beleaguered by war, and twelve other actors joined. They came up with the name "Sakura-tai" for the new troupe while they were at the in Sonoi's hometown of Morioka, Iwate, rehearsing for Shishi ("Lion", written by ). But this name was not made official until June, 1945 after they became stationed at Hiroshima.
The mobile troupe was only able to do a grand tour briefly, from January to March 1946, travelling to parts of the Kanto area and then Hiroshima. In Kanto they mainly visited manufacturing plant workers, but in Hiroshima they "comfort-visited" wounded soldiers as well.
The Nihon Ido Engeki Renmei (Japan Touring Theatre League) then instructed all troupes to cease touring city by city, and perform in the confines of an evacuation (sokai) area. It was decided Kuraku-za would be assigned to stay in Hiroshima or its vicinity.
Hiroshima
The choice of Hiroshima as their evacuation zone was a source of consternation for members, because the city remained relatively unscathed despite its military strategic importance, and a major strike was thought imminent. Sonoi wrote in April stating that she tried to refuse going to Hiroshima and remain in Tokyo (which had been incinerated in the March bombing), but was pressured to change her mind. Also while she was still at Tokyo, she went to the Toho Studio office asking if there were any film roles for her, which she wanted to take to extricate herself from touring under heavy bombardment. In fact director Kajirō Yamamoto was hoping to cast her in his new film (Kaidanji) but the office replied no, and she had left.
The Kuraku-za's mobile unit, now officially renamed reached Hiroshima on June 22. From July 5, they toured the San'in region. Due to illness, the troupe returned to Hiroshima prematurely ahead of schedule. This marked the end of perfromance by the Sakura-tai.
Members either dropped out of Sakura-tai or left Hiroshima, so that in August only 9 members remained at their office in Hiroshima. Sonoi spent time recuperating in Kobe (at the home of Shizu Nakai and husband Yoshio) August 2 to August 5, returning to Hiroshima on the fateful day.
Thus Sonoi, Maruyama and others were in Hiroshima when the Atomic Bomb was dropped on August 6, 1945. They both succumbed to the aftereffects shortly thereafter.
Hiroshima A-bomb
When the Atomic bomb was dropped on Hiroshima, Sonoi was thrown from the hallway to the yard by the blast, and momentarily lost consciousness, but otherwise had no visible wounds. She found actor (son of Kuraku-za co-founder Tokuemon Takayama aka ) lightly injured, and the two of them fled to approximately away. Sadao Maruyama and Midori Naka also left the scene, each separately, but were in poor condition were taken into custody at different locations. The remains of the five others members were found skeletonized at the burning wreck of the office.
Sonoi and Takayama subsequently took the train and reached the Nakai residence in Kobe. Sonoi's face and clothing were soiled, and she wore a jika-tabi on one foot and a man's shoe on the other, so that she looked "like a beggar" and was nearly beyond recognition.
On August 15, when informed the war had ended, Sonoi expressed her gladness at being able to act to her hearts content to Akiko Utsumi who was visiting, and also wrote a letter dated August 17 to her mother Kame in Morioka expressing this sentiment.
However, Sonoi's condition deteriorated. Her hair started to fall off at night, before suffering high fever around August 19, according to Mrs. Nakai; Other symptoms such as hematochezia, internal bleeding and delusions also presented.
By August 19, who was a stage director for Sakura-tai tracked Sonoi down, and came to see her at the Nakai residence. Sonoi asked of news about Maruyama, and sensed he must have passed away. On August 21, Sonoi's fever reached 40 degrees C, and Mrs. Utsumi rushed out to procure ice. Sonoi felt the coolness of the chilled gauze, and said "Oh, how good it feels". Those were the last words before she died.
Sonoi's remains were cremated the following day, and her bones and ashes buried in Onryū-ji in Morioka.
The story of the Sakura-tai's demise was written up in a book by author in 1980, which was adapted into the film Sakura-tai chiru (1988) directed by Kaneto Shindō.
Legacy
Infuence on Tezuka's art
The childhood home of manga artist Osamu Tezuka in Takarazuka, Hyogo belonged to a row of houses dubbed "Musical Theater Tenements" (Kageki nagaya), and Tezuka recalls that Keiko Sonoi lived at the end of this block. The manga Ribbon no kishi (Princess Knight) was "totally nostalgia of the Takarzuka Revue", in the artist's words. He was also a devoted fan of the Takarazuka production of Pinnochio (which starred Sonoi), and his Astro Boy may have been influenced by it.
Matsuo village
In 1989 her birthplace Matsuo, Iwate commmemorated the centennial of the founding of the village by holding an exhibit of Sonoi's belongings and related printed materials, and publishing a scrapbook compilation Shiryōshū.
Related works
Sakura-tai zemetsu (1980), a non-fiction account of the demise of the troupe.
Kaneto Shindo dir., (1988 film), based on Ezu's non-fiction. Sonoi was portrayed by .
Hisashi Inoue's play (first run in 1997). Sonoi played by in the original cast.
See also
Midori Naka
Explanatory notes
References
Citations
Bibliography
External links
Category:1913 births
Category:1945 deaths
Category:Hibakusha
Category:Victims of radiological poisoning
Category:Actors from Iwate Prefecture
Category:20th-century Japanese actresses |
Q:
Where is a good place in California to go gold panning for a beginner?
I have some gold pans and a portable shovel. I live in California and I am interested in places with camping grounds and nearby water to do some recreational gold panning.
Know of any good places for a beginner?
A:
If you want to do this as a hobby, there's lots of places you can go. The American, Yuba, & Klammath rivers have the most gold. A lot of the parks have something in place to allow to do a little panning. You should be able to find a few flakes to show your friends, but you won't make any substantial money doing it.
Also, using any kind of mechanical help, like a sluice, is not allowed.
Most of the good places to find gold already have claims filed, so you won't be able pan there without permission. Some of those claims are owned by clubs, so you'll have to join to get access.
Just a word of warning, if you're trying to do anything more than a hobby, you may be disappointed. really looking for gold is hard work, requires expensive equipment, and often proves to be a bust. If you still want to do it, look for ads for used equipment. A lot of people give up shortly after buying a lot of new equipment.
Lastly, if you strike it rich, remember who helped you out. :-)
A:
You can visit Columbia, CA (also near Yosemite) to check out a historical state park where they offer gold panning activities. This might be a fun place to go since you can see a lot of history for the CA gold rush. Link to CA Park website: http://www.parks.ca.gov/?page_id=552
|
Q:
Sending message from Android client to Java server
I am developing an Android application, and I need to send a message from the application to the Java Server.
Java Server works like this:
thread = new Thread(){
public void run(){
System.out.println("Server is running...");
try {
ServerSocket socket = new ServerSocket(7000);
while(true){
Socket s = socket.accept();
DataInputStream dis = new DataInputStream(s.getInputStream());
System.out.println("Received from client: " + dis.readUTF());
dis.close();
s.close();
}
} catch (IOException e) {
e.printStackTrace();
}
}
};
thread.start();
In my application I send the message in this way:
mt = new Thread() {
public void run() {
try {
Socket socket = new Socket("192.168.1.100", 7000);
DataOutputStream dos = new DataOutputStream(socket.getOutputStream());
dos.writeUTF(song_field.getText().toString());
dos.flush();
dos.close();
socket.close();
} catch (IOException e) {
e.printStackTrace();
}
}
};
mt.start();
Toast.makeText(context, "Your Message is sent. Thank you!", Toast.LENGTH_SHORT).show();
I can send the message with emulator and my phone successfully, since they are connected to the same wifi connection, but if the device is not connected to the same network, message is not sent to the server. I want everybody to be able to send message to my computer server regardless of their internet connection.
How can I fix this problem?
A:
In general you'll need to use something like Web Sockets to achieve what you're trying to do where, as would typically be the case, client/server are on different networks. There are a few different Web Socket implementations e.g. https://medium.com/square-corner-blog/web-sockets-now-shipping-in-okhttp-3-5-463a9eec82d1#.w9hrc1icw
EDIT
I initially misread question and thought you were trying to asynchronously send message from server to client (which would require something like Web Sockets). If you are just making requests from client to server then a typical solution would be to expose REST API from your server (and using something like Retrofit to make requests from client).
|