url
stringlengths 22
1.01k
| url_host_registered_domain
stringlengths 5
36
⌀ | crawl
stringlengths 15
15
| content_mime_type
stringlengths 2
68
| content_mime_detected
stringlengths 9
39
⌀ | warc_filename
stringlengths 108
138
| warc_record_offset
int64 16.1k
1.59B
| warc_record_length
int64 537
1.05M
| content
stringlengths 0
1.05M
|
---|---|---|---|---|---|---|---|---|
http://www.nursingresearch.co.nz/refbase/search.php?sqlQuery=SELECT%20author%2C%20title%2C%20type%2C%20year%2C%20publication%2C%20abbrev_journal%2C%20volume%2C%20issue%2C%20pages%2C%20keywords%2C%20abstract%2C%20thesis%2C%20editor%2C%20publisher%2C%20place%2C%20abbrev_series_title%2C%20series_title%2C%20series_editor%2C%20series_volume%2C%20series_issue%2C%20edition%2C%20language%2C%20author_count%2C%20online_publication%2C%20online_citation%2C%20doi%2C%20serial%20FROM%20refs%20WHERE%20serial%20%3D%201618%20ORDER%20BY%20created_date%20DESC%2C%20created_time%20DESC%2C%20modified_date%20DESC%2C%20modified_time%20DESC%2C%20serial%20DESC&client=&formType=sqlSearch&submit=Cite&viewType=&showQuery=0&showLinks=1&showRows=15&rowOffset=&wrapResults=1&citeOrder=creation-date&citeStyle=APA&exportFormat=RIS&exportType=html&exportStylesheet=&citeType=LaTeX&headerMsg= | nursingresearch.co.nz | CC-MAIN-2019-35 | application/x-latex | application/x-latex | crawl-data/CC-MAIN-2019-35/segments/1566027314959.58/warc/CC-MAIN-20190819201207-20190819223207-00438.warc.gz | 289,049,823 | 1,345 | %&LaTeX
\documentclass{article}
\usepackage[latin1]{inputenc}
\usepackage[T1]{fontenc}
\usepackage{textcomp}
\begin{document}
\begin{thebibliography}{1}
\bibitem{Brown2019} Brown, J. (2019). \textit{Thorn in the flesh: the experience of women living with surgical mesh complications}. Master{\textquoteright}s thesis, University of Otago, Dunedin. Retrieved August 20, 2019, from https://www.nzno.org.nz/resources/library/theses
\end{thebibliography}
\end{document}
|
http://theanarchistlibrary.org/library/benjamin-tucker-tolstoyism-gone-to-seed.tex | theanarchistlibrary.org | CC-MAIN-2020-29 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2020-29/segments/1593655924908.55/warc/CC-MAIN-20200711064158-20200711094158-00361.warc.gz | 142,478,806 | 3,121 | \documentclass[DIV=12,%
BCOR=10mm,%
headinclude=false,%
footinclude=false,%
fontsize=11pt,%
twoside,%
paper=210mm:11in]%
{scrartcl}
\usepackage{fontspec}
\usepackage{polyglossia}
\setmainfont{Linux Libertine O}
% these are not used but prevents XeTeX to barf
\setsansfont[Scale=MatchLowercase]{CMU Sans Serif}
\setmonofont[Scale=MatchLowercase]{CMU Typewriter Text}
\setmainlanguage{english}
\let\chapter\section
% global style
\pagestyle{plain}
\usepackage{microtype} % you need an *updated* texlive 2012, but harmless
\usepackage{graphicx}
\usepackage{alltt}
\usepackage{verbatim}
% http://tex.stackexchange.com/questions/3033/forcing-linebreaks-in-url
\PassOptionsToPackage{hyphens}{url}\usepackage[hyperfootnotes=false,hidelinks,breaklinks=true]{hyperref}
\usepackage{bookmark}
% footnote handling
\usepackage{bigfoot}
\usepackage{perpage}
\DeclareNewFootnote{default}
\DeclareNewFootnote{B}
\MakeSorted{footnoteB}
\renewcommand*\thefootnoteB{(\arabic{footnoteB})}
% continuous numbering across the document. Defaults to resetting at chapter. Unclear
% \usepackage{chngcntr}
% \counterwithout{footnote}{chapter}
\usepackage[shortlabels]{enumitem}
\usepackage{tabularx}
\usepackage[normalem]{ulem}
\def\hsout{\bgroup \ULdepth=-.55ex \ULset}
% https://tex.stackexchange.com/questions/22410/strikethrough-in-section-title
% Unclear if \protect \hsout is needed. Doesn't looks so
\DeclareRobustCommand{\sout}[1]{\texorpdfstring{\hsout{#1}}{#1}}
\usepackage{wrapfig}
\usepackage{indentfirst}
% remove the numbering
\setcounter{secnumdepth}{-2}
% remove labels from the captions
\renewcommand*{\captionformat}{}
\renewcommand*{\figureformat}{}
\renewcommand*{\tableformat}{}
\KOMAoption{captions}{belowfigure,nooneline}
\addtokomafont{caption}{\centering}
% avoid breakage on multiple <br><br> and avoid the next [] to be eaten
\newcommand*{\forcelinebreak}{\strut\\*{}}
\newcommand*{\hairline}{%
\bigskip%
\noindent \hrulefill%
\bigskip%
}
% reverse indentation for biblio and play
\newenvironment*{amusebiblio}{
\leftskip=\parindent
\parindent=-\parindent
\smallskip
\indent
}{\smallskip}
\newenvironment*{amuseplay}{
\leftskip=\parindent
\parindent=-\parindent
\smallskip
\indent
}{\smallskip}
\newcommand*{\Slash}{\slash\hspace{0pt}}
\addtokomafont{disposition}{\rmfamily}
\addtokomafont{descriptionlabel}{\rmfamily}
% forbid widows/orphans
\frenchspacing
\sloppy
\clubpenalty=10000
\widowpenalty=10000
% http://tex.stackexchange.com/questions/304802/how-not-to-hyphenate-the-last-word-of-a-paragraph
\finalhyphendemerits=10000
% given that we said footinclude=false, this should be safe
\setlength{\footskip}{2\baselineskip}
\title{“Tolstoyism Gone to Seed”}
\date{November 25, 1927}
\author{Benjamin Tucker}
\subtitle{}
% https://groups.google.com/d/topic/comp.text.tex/6fYmcVMbSbQ/discussion
\hypersetup{%
pdfencoding=auto,
pdftitle={“Tolstoyism Gone to Seed”},%
pdfauthor={Benjamin Tucker},%
pdfsubject={},%
pdfkeywords={letter}%
}
\begin{document}
\thispagestyle{empty}
\strut\vskip 2em
\begin{center}
{\usekomafont{title}{\huge “Tolstoyism Gone to Seed”\par}}%
\vskip 1em
\vskip 2em
{\usekomafont{author}{Benjamin Tucker\par}}%
\vskip 1.5em
{\usekomafont{date}{November 25, 1927\par}}%
\end{center}
\vskip 3em
\par
November 25, 1927
Dear Mr. Schumm:
I wrote you of the proposition of the National Institute for the Blind regarding ‘The Ego and His Own.’ It turns out to be a bit less encouraging than the first letters to Fifield indicated. Not bad, though, after all. What it amounts to is this; a copy is to be cut in raised type, by hand, by a volunteer, for Helen Keller, and a duplicate is to be put in the general library of raised type for the blind. I suppose, then, that Helen Keller is interested, or, if not, that some enthusiastic person hopes to interest her.
One sees now in Russia the perfect realization of “peace at any price,’ a land that knows not hate, the flowering of the gospel of universal love, Tolstoyism gone to seed. What a spectacle does that unhappy country present today! Simple, stupid, sodden; reeking, rotting, rampant; a deliquescent nest of life that crawls and creeps, she melts, she sprawls, she slops, she stinks! A gigantic Camembert, in the last disgusting stage.
Yours sincereley,
Benj R. Tucker
c\Slash{}o Munroe \& Co.
4 rue Ventadour
Paris, France
% begin final page
\clearpage
% if we are on an odd page, add another one, otherwise when imposing
% the page would be odd on an even one.
\ifthispageodd{\strut\thispagestyle{empty}\clearpage}{}
% new page for the colophon
\thispagestyle{empty}
\begin{center}
The Anarchist Library
\smallskip
Anti-Copyright
\bigskip
\includegraphics[width=0.25\textwidth]{logo-en}
\bigskip
\end{center}
\strut
\vfill
\begin{center}
Benjamin Tucker
“Tolstoyism Gone to Seed”
November 25, 1927
\bigskip
Retrieved on 2016-10-28 from http:\Slash{}\Slash{}marxists.architexturez.net\Slash{}archive\Slash{}tucker\Slash{}1927\Slash{}tolstoyism.htm
Source: Benjamin R. Tucker Papers, New York Public Library; Transcribed: by Mitchell Abidor, 2009.
\bigskip
\textbf{theanarchistlibrary.org}
\end{center}
% end final page with colophon
\end{document}
|
http://release-notes.trms.com/tex/199 | trms.com | CC-MAIN-2023-14 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2023-14/segments/1679296945376.29/warc/CC-MAIN-20230325222822-20230326012822-00021.warc.gz | 41,103,228 | 1,286 | \section{Carousel 5.1.3 Release Notes}
\begin{description}
\item[{\color{red}
\textbf{3119} \textbf{Configuration window nesting problem}
\textbf{Added a missing target attribute to the "main menu" link in the error screen.}
\item[{\color{red}
\textbf{3159} \textbf{Possible crash when the DisplayEngine displays many zones}
\textbf{Fixed issue where the DisplayEngine was not allocating enough memory for its internal zone list which could potentially corrupt memory and crash with a large number of zones.}
\item[{\color{red}
\textbf{3163} \textbf{5.1.2's DisplayEngine won't launch on some systems}
\textbf{Fixed issue where the DisplayEngine required runtime libraries that weren't available on some systems.}
\end{description}
|
https://www.math.bgu.ac.il/en/teaching/fall2021/courses/linear-algebra-for-biotechnology.tex | bgu.ac.il | CC-MAIN-2022-49 | text/tex | application/x-tex | crawl-data/CC-MAIN-2022-49/segments/1669446710900.9/warc/CC-MAIN-20221202082526-20221202112526-00737.warc.gz | 913,946,389 | 2,397 | \documentclass[oneside,final,11pt]{article}
\usepackage{amssymb}
\usepackage{amsmath}
\usepackage{xunicode}
\usepackage{fancyhdr}
\addtolength{\headheight}{5\baselineskip}
\renewcommand{\headrulewidth}{0pt}
\fancyhead[L,R]{}
\fancyhead[C]{\includegraphics[scale=0.5]{bguhead.png}}
\fancyfoot[L,C,R]{}
\addtolength{\voffset}{-70pt}
\usepackage{hyperref}
\usepackage{xstring}
\def\rooturl{https://math.bgu.ac.il/}
\hyperbaseurl{\rooturl}
\let\hhref\href
\providecommand{\extrahref}[2][]{\LTRfootnote{\LR{\IfBeginWith*{#2}{http}{\nolinkurl{#2}}{\nolinkurl{\rooturl#2}}}}}
\renewcommand{\href}[2]{\IfBeginWith*{#1}{http}{\hhref{#1}{#2}}{\hhref{\rooturl#1}{#2}}\extrahref{#1}}
\usepackage{polyglossia}
\usepackage{longtable}
%% even in English, we sometimes have Hebrew (as in course hours), and we
%% can't add it in :preamble, since it comes after hyperref
%%\usepackage{bidi}
\setdefaultlanguage{english}
\setotherlanguage{hebrew}
\setmainfont[Ligatures=TeX]{Libertinus Serif}
\SepMark{.}
\robustify\hebrewnumeral
\robustify\Hebrewnumeral
\robustify\Hebrewnumeralfinal
% vim: ft=eruby.tex:
\begin{document}
\pagestyle{empty}
\pagenumbering{gobble}
\pagestyle{fancy}
\begin{center}
\huge{The Department of Mathematics}\\[0.1\baselineskip]
\Large{2020--21--A term}\\[0.2\baselineskip]
\end{center}
\begin{description}
\item[Course Name]
Linear Algebra for Biotechnology
\item[Course Number]
\LRE{201.1.9551}
\item[Course web page]\mbox{}\\
\url{https://www.math.bgu.ac.il//en/teaching/fall2021/courses/linear-algebra-for-biotechnology}
\item[Lecturer]
Dr. Natalia Gulko,
\nolinkurl{<[email protected]>},
Office מינוס 108
\item[Office Hours]
\url{https://www.math.bgu.ac.il/en/teaching/hours}
\end{description}
\section*{Abstract}
\section*{Requirements and grading\footnote{Information may change during the first two weeks of the term. Please consult the webpage for updates}}
\section*{Course topics}
Complex numbers.Systems of linear equations. Solving linear systems: row reduction and echelon forms. Homogenous and inhomogenous systems.Rank of matrix.Vector spaces. Linearly independent and linearly dependent sets of vectors. Linear combinations of vectors.Inner (dot) product, length, and orthogonality. The Gram - Schmidt process.Matrices: vector space of matrices, linear matrix operations, matrix multiplication, inverse matrix. An algorithm for finding inverse matrix by means of elementary row operations.Rank of matrix and its invertibility. Solving systems of linear equations by means of inverse matrix.Determinants. Condition detA=0 and its meaning. Tranposed matrix.Eigenvectors and eigenvalues. The characteristic polynomial and characteristic equation. Finding of eigenvectors and eigenvalues.Diagonalization and diagonalizable matrices. Symmetric matrices.
% vim: ft=eruby.tex:
\end{document}
% vim: ft=eruby.tex:
|
https://www.freehaven.net/doc/fh-related-pubs.tex | freehaven.net | CC-MAIN-2019-13 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2019-13/segments/1552912203326.34/warc/CC-MAIN-20190324043400-20190324065400-00344.warc.gz | 742,883,580 | 12,899 | \section{Publication Services}
There are a number of projects and papers which discuss anonymous publication
services.
We start this section by providing an overview of some of the related projects
and papers. After this overview, we examine in detail the amount of anonymity
and privacy protection that each project offers.
\subsection{The Eternity Service}
Ross Anderson's paper on the Eternity Service \cite{eternity}
is the motivation
for this entire project. It includes a wonderful vision of how the
world might work in the future, in terms of data havens and distributed
decentralized data storage. The overall goal is to build a system that
provides highly available data: as Anderson phrases, it ``[t]he basic
idea is to use redundancy and scattering techniques to replicate data
across a large set of machines (such as the Internet), and add anonymity
mechanisms to drive up the cost of selective service denial attacks.''
A publisher would upload a document and some digital cash, along with a
requested file duration (cost would be based on document size and desired
duration). In the simple design, a publisher would upload the document to
100 servers, and remember ten of these servers for the purposes of auditing
their performance. Because he does not record most of the servers to whom he
submitted the file, there is no way to identify which of the participating
eternity servers are storing his file. Document queries are done via broadcast,
and document delivery is achieved through one-way anonymous remailers.
On the other hand, it relies on a stable
digital cash scheme, which is certainly not available today. Further, it has a strong
correlation between ability to store data into the system and amount of real-world
capital available. While our proposal does have a loose correlation between available
resources and amount of influence over the servnet, the correlation is not nearly as direct.
There are also a number of contradictions and other issues which are not addressed in
his brief paper: for instance, if documents are submitted anonymously but publishers
are expected to remember a random sample of servers so they can audit them, what do they do when
they find that some server is cheating? Since publishers are anonymous, it would seem that they
have no power at all. Anderson passes this responsibility on to the digital cash
itself, so servers do not receive payment if they stop providing the associated service. He
does not elaborate on the possible implications of this increased accountability to the anonymity of
the authors.
Another problem is that there is no consideration at all to maintaining a dynamic
list of available servers and allowing servers to smoothly join and leave.
He proposes that a directory of files in the system should itself be a file in the system.
However, without a mechanism for updating or revising files, this would appear very difficult
to achieve.
\subsection{The {\tt .cz} implementation}
A team of students at Charles University in Czechoslovakia decided to implement their
version \cite{eternitycz}
of Anderson's
idea. They use a mixnet and made overall reasonable design decisions.
Tonda Bene wrote his PhD
thesis \cite{benethesis}
on this design, and provided many more
concrete explanations of the details that Anderson skips over in his
original paper. However, there
are a number of issues that we have with their implementation:
\begin{itemize}
\item They implement everything they need by themselves. They do not exist in a
vacuum -- for example, the world already has `good enough' loose time
synchronization applications such as xntpd, so there is no need to implement a new
API and designs. This leads to code bloat and too
many layers of abstraction, which makes verifying security very difficult.
\item Almost all of their files are binary. It would be easier to examine or modify
their configuration files if they were in a human-readable and human-writable format.
\item BSD-limited. Their code is not ported to Linux yet, much less other platforms.
First of all, the port is probably
difficult if they have not yet successfully ported it to another platform. Secondly,
a well-designed system (whether in perl, C, or
Java) should be extremely portable already -- this does not bode well.
\item A centralized (single or few) trusted bank system is assumed.
\end{itemize}
\subsection{Eternity Usenet}
Adam Back proposed \cite{eternityusenet}
a simpler implementation of the Eternity Service, using the existing Usenet
infrastructure to distribute the posted files all around the world. This is an
excellent idea, but on the other hand this limits the participating servers to systems
which already host Usenet news. Further, news administrators much specifically choose to
participate in this variant of the eternity service, and so they may well choose not
to carry the `alt' groups that
comprise the service.
Eternity Usenet uses normal Usenet mechanisms for retrieval, posting,
and expiring, so publishers may not have control over the expiration time or
propagation rate of their document.
To achieve anonymity in publishing, Eternity Usenet employs cypherpunks
type I and type II (mixmaster) remailers as gateways from email to newsgroups.
Publishers PGP-sign documents which they wish to publish into the system:
these documents are formatted in html, and readers make http search or query requests to
`Eternity Servers' which map these requests into NNTP commands either
to a remote news server or a local news spool. With the initial implementation,
the default list of newsgroups to read consists only of
{\tt alt.anonymous.messages}. The Eternity Server effectively provides an interface
to a virtual web filesystem which posters populate via Usenet posts.
Back treats Usenet as an append-only file system. His system provides support
for replacing files (virtual addresses) because newer posts signed with the same
PGP key are assumed to be from the same publisher. Addresses are claimed on a
first-come first-served basis, and PGP signatures provide linkability between an
initial file at a given address and a revision of that file. However, he does not appear
to provide an explanation of conflict resolution that might arise from two addresses
being claimed at the same time -- since Usenet posts may arrive out of order, it
would seem that there might be some subtle attacks against file coherency if two
different Eternity Servers have a different notion of who owns a file.
Also, while the system is not directly `censorable' as we usually consider it,
the term `eternity' is misleading.
Usenet posts expire based on age and size. Back does not provide an analysis of how
long a given document will survive in the network. The task of making a feasible
distributed store of Eternity documents is left as a future work.
Four public-access Eternity Servers are listed at the end of the article; none of
these servers is still available. This indicates that active work on Eternity Usenet
is not ingoing.
%so anonymity might not be as strongly preserved on either side of the
%transaction. Additionally, people can post data to the service, and then
%prove that a specific server was hosting that data (since all of them are).
%This is crucial for laws where mere possession of the data is illegal.
%\subsection{India Project}
%While the India Project{\footnote {\tt http://www.eecs.harvard.edu/\~{}india/}} has no
%real anonymity measures and is designed with efficiency (high bandwidth reads) in mind,
%it includes an implementation of Rabin's information dispersal algorithm; this might be
%able to be lifted entirely and reused for our project.
% \subsection{Internet Memory Project}
% It, uhm, exists. We should look it up. I bet it doesn't address anonymity.
\subsection{Napster}
The Napster service\cite{napster} is a company based around
connecting people who are offering MP3 files to people who want to download them.
While they provide no real anonymity and disclaim all legal liability, a very important
thing to note about the Napster service is that it is highly successful. Thousands of
people use Napster daily to exchange music; if there were greater security (and comparable
ease of use), we suspect that many thousands more would participate. The existence of
Napster presents a
very clear argument that the Internet community wants a service like this, at least
for music.
%The response to the Metallica suit\cite{metallica} --- in particular,
%the continued use of Napster for trading of illegal MP3 files ---
%indicates that the Internet community is willing to continue use of
%this service even knowing that it could have negative legal
%consequences.
\subsection{Gnutella}
Gnutella\cite{gnutella} is a peer-to-peer Napster clone. It was
developed by a subsidiary company of AOL, and once it went public it
was immediately shut down by AOL (presumably since AOL has interests
in not disrupting the music and movie industries).
Development is proceeding via a widely scattered group of open-source contributors.
Gnutella depends on the ``Small Worlds'' model to maintain a connected
network; see Subsection \ref{subsec:smallworlds} for a more detailed description
and analysis of this idea.
According to the new developers' web site:
\begin{quotation}
Gnutella puts a stop to all those shenanigans. When you send a query
to the GnutellaNet, there is not much in it that can link that query
to you. I'm not saying it's totally impossible to figure out who's
searching for what, but it's pretty unlikely, and each time your query
is passed, the possibility of discovering who originated that query is
reduced exponentially. More on that in the next section.
In short, there is no safer way to search without being watched.
A big however, however. To speed things up, downloads are not
anonymous. Well, we have to make compromises. But again, nobody's
keeping logs, and nobody's trying to profile you.
\end{quotation}
There is a strong contradiction between their bold statement about
perfection and their warnings that users concerned about maintaining
anonymity really should avoid using the system. Behind the media hype,
it is clear there are a number of aspects of their protocol
\cite{gnutellaprotocol}
that help to reveal identities of users.
The header of a Gnutella packet contains a number of fields. Two of
these fields are the `TTL' (time to live: the number of additional hops
after which the packet should be dropped) and `Hops taken' (the number
of hops this packet has made since its creation). The TTL is started at
some default value based on the expected size of the network, and the
Hops value is effectively an inverse of the TTL during the travel of
the packet. Because the Hops value is 1 when the packet is initially
sent, it is clear when a given server is generating a query (assuming
it is playing by the protocol, which for the vast majority of users is a
reasonable assumption). Even if there were no Hops value, the fact that
the TTL itself has a default value for most client programs is sufficient
to make a server originating a request distinguishable from another
server in the system, in the mathematical sense presented in Chapter 2.
Further, the Gnutella network is not so well distributed as they might
lead users to believe. While the protocol is designed for a user to
set up connections with his `friends', there is no infrastructure in
place for easily building such a set of friends. Instead, the Gnutella
site offers a `default' set of friends with which users can start. Most
users will never change this file if the service is functional. This
means that the actual network is built not as a flat network but rather
as a hierarchical system, as shown in their pictures of the Gnutella
network topology \cite{gnutellamaps}. There are a small number of
central nodes which would be ideal targets for government agencies or
other organizations collecting information about users.
%If the TTL and Hops fields aren't enough, every message in the system is
%stamped with a Globally Unique Identifier (GUID). This identifier is used
%to recognize messages which have already been seen, so they are not passed
%on redundantly. This prevents the Gnutella network from an exponential
%explosion of messages, since the default TTL is typically as high as 25.
If the TTL and Hops fields aren't enough to reveal identities, it turns out that
only the queries have any
semblance of anonymity protection. The actual downloads are done by
point-to-point connections, meaning that the IP addresses of server
and reader are both revealed to each other. This is done for reasons
of efficiency.
Sites such as the Gnutella Wall of Shame\cite{gnushame}, which attempts
to entrap child pornographers using the Gnutella service, show that the
direct file-transfer portion of the Gnutella service has been demonstrated
to not adequately protect the anonymity of servers or readers.
Gnutella is not designed to be an anonymous communications or publication
network. Gnutella is a network designed to provide {\em availability} for
data from one user to the next, and it does a relatively good job of this.
%http://gnutella.wego.com/go/wego.pages.page?groupId=116705&view=page&folderId=118398&pageId=118400
%http://capnbry.dyndns.org/gnutella/protocol.html
%http://www.rixsoft.com/Knowbuddy/gnutellafaq.html
\subsection{Freenet}
The Freenet project \cite{freenet} is
one of the most popular related works. Like Gnutella, Freenet proposes
an interconnected network of nodes, each acting as both client and
server. When a user wishes to request a document, she hashes the name of
that document (where she gets this name is outside the scope of Freenet)
and then queries her own server about the location. If her server does not
have it, it passes the query on to a nearby server which is `more likely'
to have it. Freenet clusters documents with similar hashes nearby each
other, and uses a complex routing protocol to route queries `downhill'
until they arrive at the desired document.
Freenet is similar to Gnutella in that its main purpose is to provide
highly {\em available} data to its users. There are also a number of
differences between Freenet and Gnutella. First of all, Freenet caches
data near requestors. Specifically, when a request is answered over a
given path, all servers along that path cache that document. This means
that future queries for that document will be answered very quickly,
assuming the copies of that document haven't expired from the nearby
caches. This introduces another important feature: persistence of
data. Because nodes cache documents as they are requested, the documents
do not disappear from the system when the server offering those documents
disappears. This is a key improvement over Napster and Gnutella.
Freenet bases document lifetime on the popularity of the document:
frequently requested files get duplicated around the system, whereas
infrequently requested files live in only a few places or die out
completely. While this is a valid choice for a system that emphasizes
availability, it precludes certain uses of the system. For instance,
I can see circumstances where a file has a 12 month lifetime but only
becomes popular in the last few months of its lifetime. Examples
include photos of JFK Jr.\ saluting his father, or a (timestamped) Idaho
phone book that has those ten extra names that the FBI might one day be
accused of `erasing'. Indeed, this is already happening --
\cite{yugo} describes a case where Yugoslav phone books are being collected ``to
document residency for the close to one million people forced to evacuate
Kosovo.''
Freenet takes some steps to increase anonymity. Their goals include both
sender and reader anonymity, as well as plausible deniability for servers
-- the notion that a server does not know the contents of documents it
is storing. They provide this last, which we clarify as isolated-server
document-anonymity (as opposed to connected-server), by referencing
and storing files as $H(name)$ and having users encrypt the documents
themselves with $name$ before inserting them. This means that anybody who
knows the original $name$ string can decrypt the document, but the server
storing the document is unable to invert $H(name)$ to determine $name$.
However, they have the same flaw with publisher- and reader-anonymity
that Gnutella does, due to the presence of the TTL and Depth (comparable
to Hops) fields in the Freenet message headers. Because the document
requests are also sent through the network (rather than peer-to-peer
as they are in Gnutella), there's room for a little bit more anonymity
than Gnutella provides. However, nodes nearby a reader still have a
greater than even chance of being able to identify that reader. Further,
statistical attacks similar to those described in the Crowds \cite{crowds}
paper might work to pinpoint the location of a given reader or publisher;
however, the caching does provide some protection against this since
the network topology for a given document changes dramatically after
each request. This needs to be analyzed further.
Another attack to consider is that simply doing a request from a strict
political environment will cause a copy of the data to migrate into that
jurisdiction, giving law enforcement more reason to shut those servers
down. On the other hand, it may well be that such environments will close
down servers without requiring `sufficient cause', so the political and
legal arguments are meaningless.
It might even be that a less anonymous system is more likely to be
accepted in more parts of the world. This will have to be explored simply
by trying it. However, because Freenet provides weaker anonymity than
Free Haven, it is currently unsuitable for use by those who are truly
concerned about maintaining their privacy, such as political dissidents
or other whistleblowers. (See Chapter 4 for more details about these issues.)
\subsection{Graduated Mirroring}
The `Graduated Mirroring' proposal \cite{gradmirroring} was introduced
by Ron Rivest in response to our initial proposals about a buddy system
and other accountability measures that greatly increase the complexity
of the system. In short, this idea involves a group of servers, each
controlled by a person called the `manager', which all sign up to receive
documents published to the service. Each published document arrives at
each server; the manager manually peruses the document and decides how
important or valuable he believes it to be. Based on this evaluation,
he chooses how many shares of the document to store. For each share,
he basically chooses a random share number and generates that share
via some information dispersal algorithm -- this share generation is
implemented by evaluating a polynomial which describes the overall
document at a number of random values.
Server managers can modify their support for a given document. If they
want to support the document less, they simply throw out some of their
shares. If they want to support the document more, they retrieve the
document and generate some new shares.
When a document no longer has enough support for readers to be able to
reconstruct it, that document has effectively expired; server managers
still holding information about that document may then decide to throw
away whatever they have about the document -- this effectively replaces
the notion of a publisher-chosen expiration date with a much simpler
notion of server-popularity. This notion of popularity is similar to the
notion that Freenet uses, but the duration of a document is based on
how much the {\em servers} like the document rather than on how much the
readers like the document.
While this system has some excellent features, including simplicity first
and foremost, we have a number of issues with it. The first issue is that
it is not what we want to build: the fact that only popular data would get
mirrored is counter to our design goal of content-neutrality. We believe
that it does not capture the essence of what we want from a data haven.
Indeed, it also goes against our basic assumptions about computing: we
have a lot of hardware, and very few people. This trend will get more
pronounced as time goes on. Having a person hand-sort and consider each
item really cuts down on the number of people who would be willing to
host a server. Overall, we believe that paving the way for an automated
robust data haven based on privacy of publisher and data is going to
have more of an effect in the long run.
%\subsection{Anon}
%http://www.inf.tu-dresden.de/\~{}hf2/anon/
\subsection{Intermemory}
The Intermemory Project \cite{GY98} \cite{CEGGSY98} is an initiative at NEC
Research aimed at producing an archival system which makes use of
spare space on the Internet. The goal is high availability and high
persistence of information. Intermemory uses information dispersal
to mitigate the consequences of server failure, and spends much time
addressing systems issues such as synchronization of information
between many different servers.
Servers join Intermemory and donate a certain amount of space
temporarily in return for the right to store some small fraction of
that space in the system forever. The ``economic'' viability of the
Intermemory design depends on the assumption that tomorrow's storage
will be cheap and plentiful enough to meet the obligations incurred
today.
At present, Intermemory exists as a prototype implementation within NEC.
The public papers on Intermemory do not even address security, much
less anonymity, and it is not clear how the system reacts in the
presence of malicious adversaries. We therefore do not formally compare
Intermemory to the other systems listed here. Instead, we mention it
as an example of a publication and archival system which is designed
without the severe constraints necessary to ensure anonymity.
\subsection{Publius}
Publius attacks the problem of anonymous publishing from a different angle.
Rather than trying to come up with a routing protocol like Gnutella and
Freenet, Publius simply employs some one-way anonymous channel to transfer
documents from publishers to servers. The Publius protocol is designed to
maintain availability of documents on these servers.
In this system, a publisher generates a key $K$ for her document, and encrypts the document
with this key. She performs Shamir's secret-sharing algorithm to build a set
of $n$ key shares, any $k$ of which is sufficient to reconstruct $K$. From
there, she chooses some $n$ of the Publius servers and anonymously delivers
the encrypted message plus one share to each of these $n$ servers.
In this way, the document is replicated over each server, but the key is split
over the $n$ servers. Document reading is implemented by running a local web proxy
on the reader's machine; the $n$ addresses chosen as servers are concatenated into
a URL which is presumably published or otherwise remembered. (Publius provides no
description of how a directory service
might be built, or any other mechanism for remembering URLs after documents are
inserted.)
The URL used to retrieve the document specifies all $n$ servers at which the document
was stored. This means that to retrieve a given document, the local proxy fetches
each document independently, reconstructs the original key $K$, and then decrypts
the document.
The Publius system provides strong publisher-anonymity, because a one-way
channel is sufficient for communications to the servers. In addition,
because a cryptographically strong secret-sharing protocol is used and
each server only receives one share, Publius provides both computational
and also information-theoretic isolated-server document-anonymity:
a given server is not able to determine anything about a document that
it is helping to store.
On the other hand, there are a number of limitations beyond those the
authors of the paper enumerate. For instance, the entire scheme is based
on a static, system-wide list of available servers. Since these servers
are permanent, there is no support for adding new servers or purging dead
ones. Perhaps more importantly, however, there is no support for recognizing
misbehaving servers and removing from them the list of available servers.
Another point is that readers cannot determine if a share is corrupt
simply by examining it: the reader must request all of the shares and attempt
to reconstruct in order to determine the integrity of a share. Providing a
mechanism for self-evident share integrity checking might provide significant
robustness to the system.
Publius is by far the strongest related work in terms of our notions of
anonymity. The paper is very well-written and goes into considerable detail
on various attacks and counters to those attacks.
\subsection{An analysis of anonymity}
Many of these related works offer their own variant of `anonymity' for some
of the agents in the system. In this section, we analyze this anonymity that
each work provides in the context of the definitions and formalizations
proposed in Chapter 2.
% \begin{center}
\begin{table}[htc]
\begin{tabular}{|c|ccccc|}
\hline
Project & Publisher & Reader & Server & Document & Query \\
\hline
Gnutella & & & & & \\
\hline
FreeNet & & & & \cm & \\
\hline
Eternity Usenet& \cm & & & & \\
\hline
Publius & \cm & & & \cm & \\
\hline
Free Haven & \cm & \cm & \cm & \cm & \\
\hline
\end{tabular}
\caption{Overview: Computational Anonymity}
\label{table:comp-anon-pub}
\end{table}
% \end{center}
This first table provides an overview of the protections
for each of the broad categories of anonymity against computationally-limited
adversaries.
Informally, for polynomially-bounded adversaries who have passive access
to some of the edges between agents, a \cm on this table indicates that the
adversary has less than a polynomial + $\frac12$ chance of correctly
guessing the identity of one of the individuals involved in any given
transaction.
Gnutella fails to provide publisher-anonymity, reader-anonymity, or
server-anonymity because of the peer-to-peer connections for actual
file transfer. Because Gnutella servers start out knowing the intended
contents of the document they are offering, they also fail to provide
document-anonymity.
Freenet achieves document-anonymity because servers are not unable to
reverse the hash of the document name to determine the key with which
to decrypt the document. However server-anonymity is not provided because
given a document, it is very easy to locate a server that is carrying
that document -- querying any server at all will result in that server
carrying the document! Because of the TTL and Hops fields for both reading
and publishing, Freenet also fails to achieve publisher- or reader-anonymity.
Eternity Usenet provides publisher anonymity via the use of one-way anonymous
remailers. Reader anonymity is not protected, and it is clear that a Usenet
service that offers Eternity files is carrying the Eternity feed. Because
each downstream host gets its only entire copy of the feed, there is no
document-anonymity in Eternity Usenet.
Publius achieves document-anonymity because
the key is split between the $n$ servers, and without sufficient shares
of the key a server is unable to decrypt the document that is stores.
Because documents are published to Publius through a one-way anonymous
remailer, it provides publisher-anonymity. However, it provides no support
for protecting readers, and the servers containing a given file are clearly
marked in the URL used for retrieving that file.
Free Haven achieves publisher-anonymity via an anonymous remailer channel.
Similarly, reader-anonymity is provided because the responses are directed
through a mixnet to a temporary address that the reader provides. Server
anonymity is maintained because document requests are performed via broadcast,
and the results arrive out of a one-way channel.
Free Haven achieves document-anonymity because the document itself is
split; assuming a wide enough dispersal of documents, a given server will
never see enough shares of a document to be able to reconstruct it. Certainly
a server that is not actively trying to rebuild a document (for instance, by
doing a request for the other shares) will not have the document available,
since it is broken into shares before publication.
\begin{table}[htc]
%\begin{center}
\begin{tabular}{|c|ccc|ccc|ccc|cc|cc|}
\hline
Project & \multicolumn{3}{c}{Publisher} & \multicolumn{3}{c}{Reader} \vline & \multicolumn{3}{c}{Server}
\vline & \multicolumn{2}{c}{Document} \vline & \multicolumn{2}{c}{Query} \vline \\
& C & I-T & P-F & C & I-T & P-F & C & I-T & P-F & C & I-T & C & I-T \\
\hline
Gnutella & & & & & & & & & & & & & \\
\hline
FreeNet & & & & & & & & & & \cm & & & \\
\hline
Eternity Usenet & \cm & \cm & \cm &&&& &&& && & \\
\hline
Publius & \cm & \cm & \cm & & & & & & & \cm & \cm & & \\
\hline
Free Haven & \cm & \cm & \cm & \cm & & \cm & \cm & & & \cm & & & \\
\hline
FH + ideal mix &\cm&\cm&\cm & \cm & \cm & \cm & \cm & \cm &\cm & \cm & & & \\
\hline
\end{tabular}
\caption{Anonymity Properties of Publishing Systems}
\label{table:real-anon-pub}
\end{table}
%\end{center}
This second table provides a more detailed view of the different publishing
systems which we examined. There are a number of interesting points that
become clearer once we increase the resolution of the table.
First of all,
we see that the secret sharing algorithm which Publius uses provides a stronger
form of document-anonymity, since an isolated server really can learn nothing at all
about the contents of a document that it is helping to store. Secondly, we
see that those systems which provide publisher anonymity tend to provide a
very strong form of it -- namely, computational, information-theoretic, and
also perfect-forward publisher anonymity. This is because the publishers can
make use of one-way communications channels, effectively removing any linkability;
removing the need for a reply pseudonym on the mixnet means that there is
`nothing to crack'. Thirdly, we note that Free Haven achieves perfect-forward
reader anonymity: this is because readers make up a new pseudonym for every
document request, so there is no linkability.
The most important line by far in this table is the last line, though. The
fact that it implies that Free Haven is part of the reason it achieves
this much anonymity is slightly misleading: it really is the ideal mix
which is providing the first nine aspects of anonymity. Assuming a robust
ideal mix network like that described in Chapter 2, there would be no
linkability between transactions, and mere computational ability on the
part of the adversary would be insufficient to identify the parties in a
transaction.
This would mean that we could in fact relegate most of the anonymity to the
communications channel itself, and provide a simple back-end file system or
equivalent service to transfer documents between agents. Thus the design of
the back-end system could be based primarily on addressing other issues such
as availability of documents, protections against flooding and denial of
service attacks, and accountability in the face of this enforced anonymity.
Unfortunately, the design and deployment of such an ideal mix network is
a very challenging task, and one for our future works chapter. Until then,
we focus on providing increased anonymity with a combination of more
conventional mix networks and a publication system tailored for the mixnet.
|
http://dlmf.nist.gov/6.16.E2.tex | nist.gov | CC-MAIN-2014-10 | application/x-tex | null | crawl-data/CC-MAIN-2014-10/segments/1394010650250/warc/CC-MAIN-20140305091050-00004-ip-10-183-142-35.ec2.internal.warc.gz | 56,116,574 | 666 | \[S_{n}(x)=\sum_{{k=0}}^{{n-1}}\frac{\mathop{\sin\/}\nolimits\!\left((2k+1)x%
\right)}{2k+1}=\frac{1}{2}\int_{0}^{x}\frac{\mathop{\sin\/}\nolimits\!\left(2%
nt\right)}{\mathop{\sin\/}\nolimits t}dt=\tfrac{1}{2}\mathop{\mathrm{Si}\/}%
\nolimits\!\left(2nx\right)+R_{n}(x),\] |
http://mirror.math.ku.edu/tex-archive/graphics/pgf/contrib/braids/braids.sty | ku.edu | CC-MAIN-2014-49 | text/x-tex | null | crawl-data/CC-MAIN-2014-49/segments/1416931009551.23/warc/CC-MAIN-20141125155649-00159-ip-10-235-23-156.ec2.internal.warc.gz | 202,740,165 | 3,600 | %%
%% This is file `braids.sty',
%% generated with the docstrip utility.
%%
%% The original source files were:
%%
%% braids.dtx (with options: `package')
%% ----------------------------------------------------------------
%% braids --- a style file for drawing braid diagrams with TikZ/PGF
%% E-mail: [email protected]
%% Released under the LaTeX Project Public License v1.3c or later
%% See http://www.latex-project.org/lppl.txt
%% ----------------------------------------------------------------
%%
\NeedsTeXFormat{LaTeX2e}
\ProvidesPackage{braids}[2011/05/07 v1.0 Tikz/PGF commands for drawing braid diagrams]
\def\braid@pgfversion{2.10}%
\ifx\pgfversion\braid@pgfversion
\else
\PackageWarning{braids}{This package was designed using PGF2.10; you are using \pgfversion.}%
\fi
\long\def\ge@addto@macro#1#2{%
\begingroup
\toks@\expandafter\expandafter\expandafter{\expandafter#1#2}%
\xdef#1{\the\toks@}%
\endgroup}
\newcommand{\braid}[1][]{%
\begingroup
\braid@start{#1}}
\def\braid@process{%
\afterassignment\braid@handle\let\braid@token=%
}
\def\braid@process@start{%
\afterassignment\braid@handle@start\let\braid@token=%
}
\def\braid@handle@start{%
\let\braid@next=\braid@handle
\ifx\braid@token a
\let\braid@next=\braid@maybe@locate
\else
\ifx\braid@token(%)
\iffalse)\fi %Indentation hack!
\let\braid@next=\braid@assign@name
\else
\ifx\braid@token\@sptoken
\let\braid@next=\braid@process@start
\fi
\fi
\fi
\braid@next%
}
\let\braid@semicolon=;
\let\braid@bar=|
\def\braid@handle{%
\let\braid@next=\braid@process
\ifnum\the\catcode`\;=\active
\expandafter\let\expandafter\braid@semicolon\tikz@activesemicolon
\fi
\ifnum\the\catcode`\|=\active
\expandafter\let\expandafter\braid@bar\tikz@activebar
\fi
\ifx\braid@token\braid@semicolon
\let\braid@next=\braid@render
\else
\ifx\braid@token^
\let\braid@next=\braid@sup
\else
\ifx\braid@token_
\let\braid@next=\braid@sub
\else
\ifx\braid@token-
\braid@increase@levelfalse
\else
\ifx\braid@token[
\let\braid@next=\braid@process@options
\else
\ifx\braid@token\braid@bar
\edef\braid@tmp{,\expandafter\the\value{braid@level}}%
\ge@addto@macro\braid@floors\braid@tmp%
\else
\ifx\braid@token\bgroup
\braid@beginscope
\else
\ifx\braid@token\egroup
\braid@endscope
\else
\ge@addto@macro\braid@label{\braid@token}%
\fi
\fi
\fi
\fi
\fi
\fi
\fi
\fi
\braid@next%
}
\def\braid@maybe@locate{%
\afterassignment\braid@@maybe@locate\let\braid@token=%
}
\def\braid@@maybe@locate{%
\let\braid@next=\braid@handle
\ifx\braid@token t
\let\braid@next=\braid@find@location
\fi
\braid@next%
}
\def\braid@find@location{%
\afterassignment\braid@@find@location\let\braid@token=%
}
\def\braid@@find@location{%
\let\braid@next=\braid@location@error
\ifx\braid@token(%)
\let\braid@next=\braid@locate
\else
\ifx\braid@token\@sptoken
\let\braid@next=\braid@find@location
\fi
\fi
\braid@next%
}
\def\braid@location@error{%
\PackageWarning{braids}{Could not figure out location for braid}%
\braid@process@start%
}
\def\braid@locate#1){%
\tikz@scan@one@point\braid@relocate(#1)%
}
\def\braid@relocate#1{%
#1\relax
\advance\pgf@x by -\braid@width
\pgftransformshift{\pgfqpoint{\pgf@x}{\pgf@y}}
\braid@process@start%
}
\def\braid@assign@name#1){%
\def\braid@name{#1}%
\braid@process@start%
}
\def\braid@process@options#1]{%
\tikzset{#1}%
\braid@process%
}
\def\braid@sup#1_#2{\g@addto@macro\braid@label{_{#2}^{#1}}\braid@add@crossing{#2}{#1}}
\def\braid@sub#1{\@ifnextchar^{\braid@@sub{#1}}{\g@addto@macro\braid@label{_{#1}}\braid@add@crossing{#1}{1}}}
\def\braid@@sub#1^#2{\g@addto@macro\braid@label{_{#1}^{#2}}\braid@add@crossing{#1}{#2}}
\def\braid@ne{1}
\def\braid@add@crossing#1#2{%
\edef\braid@crossing@type{#2}%
\edef\braid@this@strand{#1}%
\pgfmathtruncatemacro{\braid@next@strand}{#1+1}
\ifbraid@increase@level
\stepcounter{braid@level}
\fi
\braid@increase@leveltrue
\braid@tx=\braid@this@strand\braid@width
\braid@ty=\value{braid@level}\braid@height
\advance\braid@ty by \braid@eh
\braid@nx=\braid@tx
\braid@ny=\braid@ty
\advance\braid@nx by \braid@width
\advance\braid@ny by \braid@height
\braid@cy=\braid@ty
\braid@dy=\braid@ny
\advance\braid@cy by .5\braid@height
\advance\braid@dy by -.5\braid@height
\advance\braid@ty by .05\braid@height
\advance\braid@ny by -.05\braid@height
\expandafter\let\expandafter\braid@this@path@origin\csname braid@strand@\braid@this@strand @origin\endcsname
\ifx\braid@this@path@origin\relax
\let\braid@this@path@origin\braid@this@strand
\pgfsyssoftpath@setcurrentpath{\@empty}
\pgfpathmoveto{\pgfpoint{\braid@tx}{0pt}}
\pgfsyssoftpath@getcurrentpath{\braid@this@path}
\else
\expandafter\let\expandafter\braid@this@path\csname braid@strand@\braid@this@path@origin\endcsname
\fi
\expandafter\let\expandafter\braid@next@path@origin\csname braid@strand@\braid@next@strand @origin\endcsname
\ifx\braid@next@path@origin\relax
\let\braid@next@path@origin\braid@next@strand
\pgfsyssoftpath@setcurrentpath{\@empty}
\pgfpathmoveto{\pgfpoint{\braid@nx}{0pt}}
\pgfsyssoftpath@getcurrentpath{\braid@next@path}
\else
\expandafter\let\expandafter\braid@next@path\csname braid@strand@\braid@next@path@origin\endcsname
\fi
\pgfsyssoftpath@setcurrentpath{\braid@this@path}
\pgfpathlineto{\pgfqpoint{\braid@tx}{\braid@ty}}
\ifx\braid@crossing@type\braid@over@cross
\pgfpathcurveto{\pgfqpoint{\braid@tx}{\braid@cy}}{\pgfqpoint{\braid@nx}{\braid@dy}}{\pgfqpoint{\braid@nx}{\braid@ny}}
\else
\pgfpathcurvebetweentimecontinue{0}{.4}{\pgfqpoint{\braid@tx}{\braid@ty}}{\pgfqpoint{\braid@tx}{\braid@cy}}{\pgfqpoint{\braid@nx}{\braid@dy}}{\pgfqpoint{\braid@nx}{\braid@ny}}
\pgfpathcurvebetweentime{.6}{1}{\pgfqpoint{\braid@tx}{\braid@ty}}{\pgfqpoint{\braid@tx}{\braid@cy}}{\pgfqpoint{\braid@nx}{\braid@dy}}{\pgfqpoint{\braid@nx}{\braid@ny}}
\fi
\pgfsyssoftpath@getcurrentpath{\braid@this@path}
\pgfsyssoftpath@setcurrentpath{\braid@next@path}
\pgfpathlineto{\pgfqpoint{\braid@nx}{\braid@ty}}
\ifx\braid@crossing@type\braid@over@cross
\pgfpathcurvebetweentimecontinue{0}{.4}{\pgfqpoint{\braid@nx}{\braid@ty}}{\pgfqpoint{\braid@nx}{\braid@cy}}{\pgfqpoint{\braid@tx}{\braid@dy}}{\pgfqpoint{\braid@tx}{\braid@ny}}
\pgfpathcurvebetweentime{.6}{1}{\pgfqpoint{\braid@nx}{\braid@ty}}{\pgfqpoint{\braid@nx}{\braid@cy}}{\pgfqpoint{\braid@tx}{\braid@dy}}{\pgfqpoint{\braid@tx}{\braid@ny}}
\else
\pgfpathcurveto{\pgfqpoint{\braid@nx}{\braid@cy}}{\pgfqpoint{\braid@tx}{\braid@dy}}{\pgfqpoint{\braid@tx}{\braid@ny}}
\fi
\pgfsyssoftpath@getcurrentpath{\braid@next@path}
\expandafter\let\csname braid@strand@\braid@this@path@origin \endcsname\braid@this@path
\expandafter\let\csname braid@strand@\braid@next@path@origin \endcsname\braid@next@path
\expandafter\let\csname braid@strand@\braid@this@strand @origin\endcsname\braid@next@path@origin
\expandafter\let\csname braid@strand@\braid@next@strand @origin\endcsname\braid@this@path@origin
\pgfmathparse{\value{braid@strands} < \braid@next@strand ? "\noexpand\setcounter{braid@strands}{\braid@next@strand}" : ""}
\pgfmathresult
\braid@process%
}
\def\braid@floors@trim,{}
\def\braid@render@floor{%
\draw (\floorsx,\floorsy) rectangle (\floorex,\floorey);
}
\def\braid@render{
\ifx\braid@floors\@empty
\else
\pgfsys@beginscope
\pgfsyssoftpath@setcurrentpath{\empty}
\edef\braid@floors{\expandafter\braid@floors@trim\braid@floors}
\braid@tx=\braid@width
\advance\braid@tx by \braid@eh
\braid@nx=\value{braid@strands}\braid@width
\advance\braid@nx by -\braid@eh
\foreach \braid@f in \braid@floors {
\pgfsys@beginscope
\braid@ty=\braid@f\braid@height
\advance\braid@ty by \braid@eh
\advance\braid@ty by \braid@height
\braid@ny=\braid@ty
\advance\braid@ny by \braid@height
\edef\floorsx{\the\braid@tx}
\edef\floorsy{\the\braid@ty}
\edef\floorex{\the\braid@nx}
\edef\floorey{\the\braid@ny}
\let\tikz@options=\pgfutil@empty
\expandafter\tikzset\expandafter{\braid@floors@style}
\pgfmathtruncatemacro{\braid@ff}{\braid@f+2}
\expandafter\let\expandafter\braid@floor@style\csname braid@options@floor@\braid@ff\endcsname
\ifx\braid@floor@style\relax
\else
\expandafter\tikzset\expandafter{\braid@floor@style}%
\fi
\tikz@options
\braid@render@floor
\pgfsys@endscope
}
\pgfsys@endscope
\fi
\stepcounter{braid@level}
\foreach \braid@k in {1,...,\value{braid@strands}} {
\pgfsys@beginscope
\tikz@mode@drawtrue%
\let\tikz@mode=\pgfutil@empty
\let\tikz@options=\pgfutil@empty
\braid@tx=\braid@k\braid@width
\braid@ty=\value{braid@level}\braid@height
\advance\braid@ty by 2\braid@eh
\expandafter\let\expandafter\braid@path@origin\csname braid@strand@\braid@k @origin\endcsname
\ifx\braid@path@origin\relax
\pgfsyssoftpath@setcurrentpath{\@empty}
\pgfpathmoveto{\pgfqpoint{\braid@tx}{0pt}}
\let\braid@path@origin\braid@k
\else
\expandafter\let\expandafter\braid@path\csname braid@strand@\braid@path@origin\endcsname
\pgfsyssoftpath@setcurrentpath{\braid@path}
\fi
\pgflineto{\pgfqpoint{\braid@tx}{\braid@ty}}
\expandafter\tikzset\expandafter{\braid@style}
\expandafter\let\expandafter\braid@style\csname braid@options@strand@\braid@path@origin\endcsname
\ifx\braid@style\relax
\else
\expandafter\tikzset\expandafter{\braid@style}
\fi
\braid@options
\tikz@mode
\tikz@options
\edef\tikz@temp{\noexpand\pgfusepath{%
\iftikz@mode@draw draw\fi%
}}%
\tikz@temp
\ifx\braid@name\pgfutil@empty
\else
\coordinate (\braid@name-\braid@path@origin-e) at (\braid@tx,\braid@ty);
\coordinate (\braid@name-rev-\braid@k-e) at (\braid@tx,\braid@ty);
\braid@nx=\braid@path@origin\braid@width
\coordinate (\braid@name-\braid@path@origin-s) at (\braid@nx,0pt);
\coordinate (\braid@name-rev-\braid@k-s) at (\braid@nx,0pt);
\fi
\pgfsys@endscope
}
\ifx\braid@name\pgfutil@empty
\else
\braid@tx=\value{braid@strands}\braid@width
\braid@ty=\value{braid@level}\braid@height
\advance\braid@ty by 2\braid@eh
\advance\braid@tx by \braid@width
\braid@tx=.5\braid@tx
\braid@ty=.5\braid@ty
\coordinate (\braid@name) at (\braid@tx,\braid@ty);
\fi
\pgfsys@endscope
\endgroup}
\def\braid@start#1{%
\pgfsys@beginscope
\setcounter{braid@level}{-1}%
\let\braid@label\@empty
\let\braid@floors\@empty
\let\braid@name\empty
\pgfkeys{/pgf/braid/.cd,#1}
\let\braid@options\tikz@options
\tikz@transform
\setcounter{braid@strands}{\pgfkeysvalueof{/pgf/braid/number of strands}}%
\braid@width=\pgfkeysvalueof{/pgf/braid/width}
\braid@height=\pgfkeysvalueof{/pgf/braid/height}
\braid@eh=\pgfkeysvalueof{/pgf/braid/border height}
\braid@height=-\braid@height
\braid@eh=-\braid@eh
\braid@increase@leveltrue
\braid@process@start
}
\newdimen\braid@width
\newdimen\braid@height
\newdimen\braid@tx
\newdimen\braid@ty
\newdimen\braid@nx
\newdimen\braid@ny
\newdimen\braid@cy
\newdimen\braid@dy
\newdimen\braid@eh
\newif\ifbraid@increase@level
\let\braid@style\pgfutil@empty
\let\braid@floors@style\pgfutil@empty
\def\braid@over@cross{1}
\newcounter{braid@level}
\newcounter{braid@strands}
\pgfkeys{
/tikz/braid/.search also={/pgf},
/pgf/braid/.search also={/pgf,/tikz},
/pgf/braid/.cd,
number of strands/.initial=0,
height/.initial=1cm,
width/.initial=1cm,
border height/.initial=.25cm,
name/.code={%
\def\braid@name{#1}%
},
at/.code={%
\braid@relocate{#1}%
},
floor command/.code={%
\def\braid@render@floor{#1}%
},
style strands/.code 2 args={%
\def\braid@temp{#2}%
\braidset{style each strand/.list={#1}}%
},
style each strand/.code={%
\expandafter\edef\csname braid@options@strand@#1\endcsname{\braid@temp}%
},
style floors/.code 2 args={%
\def\braid@temp{#2}%
\braidset{style each floor/.list={#1}}%
},
style each floor/.code={%
\expandafter\edef\csname braid@options@floor@#1\endcsname{\braid@temp}%
},
style all floors/.code={%
\def\braid@floors@style{#1}
}
}
\def\braidset#1{%
\pgfkeys{/pgf/braid/.cd,#1}}
%%
%% Copyright (C) 2011 by Andrew Stacey <[email protected]>
%%
%% This work may be distributed and/or modified under the
%% conditions of the LaTeX Project Public License (LPPL), either
%% version 1.3c of this license or (at your option) any later
%% version. The latest version of this license is in the file:
%%
%% http://www.latex-project.org/lppl.txt
%%
%% This work is "maintained" (as per LPPL maintenance status) by
%% Andrew Stacey.
%%
%% This work consists of the files braids.dtx
%% braids_doc.tex
%% and the derived files README.txt,
%% braids.ins,
%% braids.pdf,
%% braids.sty,
%% braids_doc.pdf.
%%
%%
%% End of file `braids.sty'.
|
https://mirror.anarhija.net/usa.anarchistlibraries.net/mirror/l/lv/lucien-van-der-walt-2010-anarchist-survey.tex | anarhija.net | CC-MAIN-2022-33 | application/octet-stream | application/x-tex | crawl-data/CC-MAIN-2022-33/segments/1659882570692.22/warc/CC-MAIN-20220807181008-20220807211008-00479.warc.gz | 369,160,862 | 6,208 | \documentclass[DIV=12,%
BCOR=10mm,%
headinclude=false,%
footinclude=false,%
fontsize=11pt,%
twoside,%
paper=210mm:11in]%
{scrartcl}
\usepackage[noautomatic]{imakeidx}
\usepackage{microtype}
\usepackage{graphicx}
\usepackage{alltt}
\usepackage{verbatim}
\usepackage[shortlabels]{enumitem}
\usepackage{tabularx}
\usepackage[normalem]{ulem}
\def\hsout{\bgroup \ULdepth=-.55ex \ULset}
% https://tex.stackexchange.com/questions/22410/strikethrough-in-section-title
% Unclear if \protect \hsout is needed. Doesn't looks so
\DeclareRobustCommand{\sout}[1]{\texorpdfstring{\hsout{#1}}{#1}}
\usepackage{wrapfig}
% avoid breakage on multiple <br><br> and avoid the next [] to be eaten
\newcommand*{\forcelinebreak}{\strut\\*{}}
\newcommand*{\hairline}{%
\bigskip%
\noindent \hrulefill%
\bigskip%
}
% reverse indentation for biblio and play
\newenvironment*{amusebiblio}{
\leftskip=\parindent
\parindent=-\parindent
\smallskip
\indent
}{\smallskip}
\newenvironment*{amuseplay}{
\leftskip=\parindent
\parindent=-\parindent
\smallskip
\indent
}{\smallskip}
\newcommand*{\Slash}{\slash\hspace{0pt}}
% http://tex.stackexchange.com/questions/3033/forcing-linebreaks-in-url
\PassOptionsToPackage{hyphens}{url}\usepackage[hyperfootnotes=false,hidelinks,breaklinks=true]{hyperref}
\usepackage{bookmark}
\usepackage{fontspec}
\usepackage{polyglossia}
\setmainlanguage{english}
\setmainfont{LinLibertine_R.otf}[Script=Latin,%
Ligatures=TeX,%
Path=/usr/share/fonts/opentype/linux-libertine/,%
BoldFont=LinLibertine_RB.otf,%
BoldItalicFont=LinLibertine_RBI.otf,%
ItalicFont=LinLibertine_RI.otf]
\setmonofont{cmuntt.ttf}[Script=Latin,%
Ligatures=TeX,%
Scale=MatchLowercase,%
Path=/usr/share/fonts/truetype/cmu/,%
BoldFont=cmuntb.ttf,%
BoldItalicFont=cmuntx.ttf,%
ItalicFont=cmunit.ttf]
\setsansfont{cmunss.ttf}[Script=Latin,%
Ligatures=TeX,%
Scale=MatchLowercase,%
Path=/usr/share/fonts/truetype/cmu/,%
BoldFont=cmunsx.ttf,%
BoldItalicFont=cmunso.ttf,%
ItalicFont=cmunsi.ttf]
\newfontfamily\englishfont{LinLibertine_R.otf}[Script=Latin,%
Ligatures=TeX,%
Path=/usr/share/fonts/opentype/linux-libertine/,%
BoldFont=LinLibertine_RB.otf,%
BoldItalicFont=LinLibertine_RBI.otf,%
ItalicFont=LinLibertine_RI.otf]
\let\chapter\section
% global style
\pagestyle{plain}
\usepackage{indentfirst}
% remove the numbering
\setcounter{secnumdepth}{-2}
% remove labels from the captions
\renewcommand*{\captionformat}{}
\renewcommand*{\figureformat}{}
\renewcommand*{\tableformat}{}
\KOMAoption{captions}{belowfigure,nooneline}
\addtokomafont{caption}{\centering}
\deffootnote[3em]{0em}{4em}{\textsuperscript{\thefootnotemark}~}
\addtokomafont{disposition}{\rmfamily}
\addtokomafont{descriptionlabel}{\rmfamily}
\frenchspacing
% avoid vertical glue
\raggedbottom
% this will generate overfull boxes, so we need to set a tolerance
% \pretolerance=1000
% pretolerance is what is accepted for a paragraph without
% hyphenation, so it makes sense to be strict here and let the user
% accept tweak the tolerance instead.
\tolerance=200
% Additional tolerance for bad paragraphs only
\setlength{\emergencystretch}{30pt}
% (try to) forbid widows/orphans
\clubpenalty=10000
\widowpenalty=10000
% given that we said footinclude=false, this should be safe
\setlength{\footskip}{2\baselineskip}
\title{2010 Anarchist Survey}
\date{December 2010}
\author{Lucien van der Walt}
\subtitle{Notes for a critical assesment}
% https://groups.google.com/d/topic/comp.text.tex/6fYmcVMbSbQ/discussion
\hypersetup{%
pdfencoding=auto,
pdftitle={2010 Anarchist Survey},%
pdfauthor={Lucien van der Walt},%
pdfsubject={Notes for a critical assesment},%
pdfkeywords={notes; anarchist movement}%
}
\begin{document}
\thispagestyle{empty}
\strut\vskip 2em
\begin{center}
{\usekomafont{title}{\huge 2010 Anarchist Survey\par}}%
\vskip 1em
{\usekomafont{subtitle}{Notes for a critical assesment\par}}%
\vskip 2em
{\usekomafont{author}{Lucien van der Walt\par}}%
\vskip 1.5em
{\usekomafont{date}{December 2010\par}}%
\end{center}
\vskip 3em
\par
Recently, an “Anarchist Survey” was run online, with the results appearing around August 2010.
This is a very interesting, indeed important, initiative – let me stress that. However, it is let down by some important flaws in research design and data analysis. The use of the internet to deliver the survey also some inherent problems. Because of these issues, the survey cannot be considered representative and it cannot be considered a solid basis from which to draw conclusions about anarchism today.
Regarding \textbf{administration}, participation is entirely self-selected, as people were invited to participate. This means there are no controls for representivity, and no way to judge response rates. Moreover, it would overrepresent people who like filling out forms on the internet. There is no way to measure to ensure that people don’t vote twice, thrice or whatever.
The invitation was through internet networks, mainly linked to anarchism. Obviously people outside of those networks are not included, and, since the authors defined anarchism very loosely (see below), the invitation also went out to networks of people whose links to anarchism are tenuous at best.
The internet, of course, is an extremely cheap delivery platform with an amazing coverage, but it is shaped by language, heavily biased towards some regions and its demographics are not representative in terms of age, class or race. Its hardly surprising that only 17.6 percent of those who responded are over 36 – what does \emph{not} follow is that this is an accurate reflection of anarchism\Slash{} syndicalism \emph{as a whole.}
In effect, a survey in English, on the internet, will be affected by factors outside of its control: the overwhelming weight of the US internet audience, the overrepresentation of middle class people, the massive underrepresentation of regions like India and Africa; all of these factors will also shape the contours of the networks which were drawn into the survey. In the case of even Anglophone Africa,the internet is profoundly dominated by South Africa, a country in which internet access is itself tied directly to class and race.
Consequently, it is not surprising that less than 10\% of respondents are from Africa, Asia and Latin America. Most are from North America and Europe (just short of 90\%), and North America means almost only Canada and the US, not Mexico; Europe here, given language, really mainly means the UK and Ireland.
Obviously this has a large impact on the data generated, and on the ability of the survey’s administrators to answer some of the questions that they hoped to answer e.g. “whether or not anarchism was in fact appealing to a significant number of non-whites (sic.)”. The authors themselves concede in the report that most respondents are “white straight men between the ages of 16 and 45” [but then try explain this away:] “Then again, this is also the dominant group of Internet users\dots{}” [Actually, this is the “dominant group of Internet users that a survey like this will \emph{attract\dots{}} so] this not quite true; \dots{} the[y[ should qualify [this] with the statement “\dots{}\emph{in the US and UK}“; it is simply not true globally.
There are serious problems with the \textbf{design}. The survey uses categories that cause problematic results. There are problems with the language used (such as the term “non-white”, considered pejorative in many countries).
While trying to get a sense of the racial categories of respondents, the designers left out major categories, such as Latinos\Slash{} Hispanic, now the largest US racial “minority”, not to mention Latin American categories like \emph{mestizo} and Indian.
The analysis of the data apologises for this omission, but seems to think it is addressed by the category “indigenous”. However, “indigenous” is a much larger category and could include e.g. aboriginals in Australia [and would not include a great many Latin Americans]. Moreover, the US construct Latinos\Slash{} Hispanic applies to \emph{all} Latin Americans, white, black, \emph{mestizo}, \emph{pardo}, Indian etc., but these categories are clearly differentiated in Latin America. Meanwhile, in the survey “white” (dubbed Caucasian, an Americanism) is separated from “semitic”, although Jews (who would presumably fit here) are considered white in almost all countries.
The authors then go on to worry, in their analysis, that the data suggests that the movement has an “ostensible lack of appeal [\dots{}] for non-whites [that] warrants further discussion.” [But] since the survey tells us more about who could (or bothered to) respond, it does itself not demonstrate an “ostensible lack of appeal” in general. (This is not to say that there isn’t an issue here – simply that such a conclusion cannot be drawn from the data set that this survey constructs).
As noted earlier, the definition of anarchism used is rather loose and questionable, so questionable groups like “anarcho-capitalists” and “primitivists” and “Christian anarchism” are included as types of anarchism, while categories like “revolutionary syndicalism” and “anarchist people of colour” are not. Authors listed as “anarchists” included people who have nothing to with anarchism, like John Zerzan, the “primitivist” crank, Steve Best, the animal rights extremist etc.
Rather than use anarchist or Marxist definitions of class, it uses marketing survey-type class categories like “lower middle class,” [and] distinguishes “working class” from “poor\Slash{} unemployed”. No definition is given of these categories, so what it means to be in (say) “lower middle class” [is unclear]. Where a “working class” person who earns a minimum wage would fit in is unclear [- are they “poor,” “working class,” “lower middle class”?].
In discussing “work sector”, there are some peculiar design decisions. The question here slips between [economic] sectors (e.g. education), specific occupations that cut across sectors (e.g. “art”), and types of work (e.g. manual labour). Where an electrician at a university, for example, goes is unclear.
Strikingly, the main economic sectors are entirely absent: defence\Slash{} war, manufacturing, mining, agriculture, and most of the service sector e.g. transport, security, cleaning, finance.
That pretty much excludes 80\% of everyone employed in most countries. On the other hand, “art”, hardly a site of mass employment, is listed.
Similar issues arise with other questions. For instance, on the issue of whether “violence” can be used by anarchists, has overlapping, imprecise and leading options like “violence should only be used as a form of defence” and “violence will unfortunately be part of the revolution”. The mainstream anarchist position is that violence should only be used for “self-defence” and \emph{this is why} it would be “part of the revolution” since the ruling class will not quietly. Throwing in “unfortunately” implies a judgement against violence which goes against this basic logic. Meanwhile, violence as a \emph{strategy,} as insurrectionist anarchism, is not covered.
In short, interesting results but of an anecdotal quality only.
Even so, interestingly, responses to question 25 showed that most people [who responded] disagreed that “anarcho-capitalists,” “individualists,” “lifestyle anarchists” (and its sub-category, so-called “Crimethinc”), “primitivists” and “Christian anarchists” etc. are anarchists in the first place.
Equally, it is interesting that responses to question 20 showed the most common anarchist “labels” people used were the traditional, red anarchist ones: anarchist-communist, libertarian socialist, social anarchist and anarcho-syndicalist.
Question 27, on favourite anarchist thinkers, was dominated by actual anarchists and syndicalists, with the exception of Bookchin, and in question 45 (favourite book ), Kropotkin dominated, with Bakunin, Berkman, Chomsky, Goldman, Rocker and \emph{Black Flame} (!) all coming out towards the top.
% begin final page
\clearpage
% if we are on an odd page, add another one, otherwise when imposing
% the page would be odd on an even one.
\ifthispageodd{\strut\thispagestyle{empty}\clearpage}{}
% new page for the colophon
\thispagestyle{empty}
\begin{center}
The Anarchist Library (Mirror)
\smallskip
Anti-Copyright
\bigskip
\includegraphics[width=0.25\textwidth]{logo-yu.pdf}
\bigskip
\end{center}
\strut
\vfill
\begin{center}
Lucien van der Walt
2010 Anarchist Survey
Notes for a critical assesment
December 2010
\bigskip
Retrieved on 8\textsuperscript{th} September 2021 from \href{https://lucienvanderwalt.com/2011/01/15/2010-anarchist-survey-notes-for-a-critical-assesment/}{lucienvanderwalt.com}
(minor edit Feb 2013, marked with [])
\bigskip
\textbf{usa.anarchistlibraries.net}
\end{center}
% end final page with colophon
\end{document}
% No format ID passed.
|
https://www.coaps.fsu.edu/bibliography/search.php?sqlQuery=SELECT%20author%2C%20title%2C%20type%2C%20year%2C%20publication%2C%20abbrev_journal%2C%20volume%2C%20issue%2C%20pages%2C%20keywords%2C%20abstract%2C%20thesis%2C%20editor%2C%20publisher%2C%20place%2C%20abbrev_series_title%2C%20series_title%2C%20series_editor%2C%20series_volume%2C%20series_issue%2C%20edition%2C%20language%2C%20author_count%2C%20online_publication%2C%20online_citation%2C%20doi%2C%20serial%2C%20area%20FROM%20refs%20WHERE%20serial%20%3D%20296%20ORDER%20BY%20first_author%2C%20author_count%2C%20author%2C%20year%2C%20title&client=&formType=sqlSearch&submit=Cite&viewType=&showQuery=0&showLinks=1&showRows=10&rowOffset=&wrapResults=1&citeOrder=&citeStyle=APA&exportFormat=RIS&exportType=html&exportStylesheet=&citeType=LaTeX&headerMsg= | fsu.edu | CC-MAIN-2023-06 | application/x-latex | application/x-latex | crawl-data/CC-MAIN-2023-06/segments/1674764500126.0/warc/CC-MAIN-20230204110651-20230204140651-00753.warc.gz | 694,687,377 | 1,488 | %&LaTeX
\documentclass{article}
\usepackage[latin1]{inputenc}
\usepackage[T1]{fontenc}
\usepackage{textcomp}
\begin{document}
\begin{thebibliography}{1}
\bibitem{Misra_etal2011} Misra, V., Moeller, L., Stefanova, L., Chan, S., O{\textquoteright}Brien, J. J., Smith III, T. J., et al. (2011). The influence of the Atlantic Warm Pool on the Florida panhandle sea breeze: FLORIDA SEA BREEZE VARIATIONS. \textit{J. Geophys. Res.}, \textit{116}(D21).
\end{thebibliography}
\end{document}
|
https://ctan.math.washington.edu/tex-archive/info/examples/lgc2/8-2-12.ltx | washington.edu | CC-MAIN-2022-27 | text/x-tex | text/x-matlab | crawl-data/CC-MAIN-2022-27/segments/1656103821173.44/warc/CC-MAIN-20220630122857-20220630152857-00559.warc.gz | 232,581,648 | 1,436 | %%
%% The LaTeX Graphics Companion, 2ed (first printing May 2007)
%%
%% Example 8-2-12 on page 527.
%%
%% Copyright (C) 2007 Michel Goossens, Frank Mittelbach, Denis Roegel, Sebastian Rahtz, Herbert Vo\ss
%%
%% It may be distributed and/or modified under the conditions
%% of the LaTeX Project Public License, either version 1.3
%% of this license or (at your option) any later version.
%%
%% See http://www.latex-project.org/lppl.txt for details.
%%
\documentclass{ttctexa}
\pagestyle{empty}
\setcounter{page}{6}
\setlength\textwidth{348.0pt}
\StartShownPreambleCommands
\usepackage{array}\usepackage{xymtexps}
\StopShownPreambleCommands
\begin{document}
\setlength{\tabcolsep}{1mm}
\changeunitlength{.05pt}
\begin{tabular}{@{}>{\small}lcccc@{}}\hline
\emph{Ring Size}
& \multicolumn{4}{c@{}}{\itshape\small Specific Commands}\\\hline
3
& \cyclopropanev {1==a1;2==a2;3==a3}
& \cyclopropanevi {1==a1;2==a2;3==a3}
& \cyclopropaneh {1==a1;2==a2;3==a3}
& \cyclopropanehi {1==a1;2==a2;3==a3} \\
& \footnotesize\verb|\cyclopropanev|
& \footnotesize\verb|\cyclopropanevi|
& \footnotesize\verb|\cyclopropaneh|
& \footnotesize\verb|\cyclopropanehi| \\
4
& \cyclobutane {1==a1;2==a2;3==a3}
&&& \\
& \footnotesize\verb|\cyclobutane|
&&& \\
5
& \cyclopentanev {1==a1;2==a2;3==a3}
& \cyclopentanevi {1==a1;2==a2;3==a3}
& \cyclopentaneh {1==a1;2==a2;3==a3}
& \cyclopentanehi {1==a1;2==a2;3==a3} \\
& \footnotesize\verb|\cyclopentanev|
& \footnotesize\verb|\cyclopentanevi|
& \footnotesize\verb|\cyclopentaneh|
& \footnotesize\verb|\cyclopentanehi| \\
6
& \cyclohexanev {1==a1;2==a2;3==a3}
&
& \cyclohexaneh {1==a1;2==a2;3==a3}
& \\
& \footnotesize\verb|\cyclohexanev|
&
& \footnotesize\verb|\cyclohexaneh|
& \\
5,6
& \indanev {1==a1;2==a2;3==a3}
& \indanevi {1==a1;2==a2;3==a3}
& \indaneh {1==a1;2==a2;3==a3}
& \indanehi {1==a1;2==a2;3==a3} \\
& \footnotesize\verb|\indanev|
& \footnotesize\verb|\indanevi|
& \footnotesize\verb|\indaneh|
& \footnotesize\verb|\indanehi| \\
6,6
& \decalinev {1==a1;2==a2;3==a3}
& \decalineh {1==a1;2==a2;3==a3}
& \decalinevb {1==a1;2==a2;3==a3}
& \decalinevt {1==a1;2==a2;3==a3} \\
& \footnotesize\verb|\decalinev|
& \footnotesize\verb|\decalineh|
& \footnotesize\verb|\decalinevb|
& \footnotesize\verb|\decalinevt| \\
6,6,6
& \hanthracenev {1==a1;2==a2;3==a3}
& \hphenanthrenev {1==a1;2==a2;3==a3}
&& \\
& \footnotesize\verb|\hanthracenev|
& \footnotesize\verb|\hphenanthrenev|
&& \\
\end{tabular}
\end{document}
|
https://defelement.com/img/element-NCE-hexahedron-2-3.tex | defelement.com | CC-MAIN-2022-27 | application/x-tex | text/x-matlab | crawl-data/CC-MAIN-2022-27/segments/1656104675818.94/warc/CC-MAIN-20220706151618-20220706181618-00643.warc.gz | 236,897,608 | 24,846 | % -------------------------------------------------------
% This plot is from DefElement (https://defelement.com)
% and is available under a Creative Commons Attribution
% 4.0 International (CC BY 4.0) license:
% https://creativecommons.org/licenses/by/4.0/
% -------------------------------------------------------
\begin{tikzpicture}[x=0.2mm,y=0.2mm]
\definecolor{color0}{HTML}{DD2299}
\definecolor{color1}{HTML}{44AAFF}
\definecolor{color2}{HTML}{AAAAAA}
\definecolor{color3}{HTML}{FF8800}
\clip (0,0) rectangle (210.0,210.0);
\draw[color0,line width=2pt,line cap=round](80.0,80.0) -- (92.5,85.0);
\draw[color0,line width=2pt,line cap=round](89.975,82.25) -- (92.5,85.0);
\draw[color0,line width=2pt,line cap=round](88.775,85.25) -- (92.5,85.0);
\draw[color1,line width=3pt,line cap=round](30.0,60.0) -- (80.0,80.0);
\draw[color2,line width=3pt,line cap=round](80.0,80.0) -- (180.0,72.0);
\draw[color2,line width=3pt,line cap=round](80.0,80.0) -- (80.0,180.0);
\draw[color0,fill=white,line width=1.5pt] (80.0,80.0)circle (6pt);
\node[anchor=center] at (80.0,80.0) {\small\color{color0}3};
\draw[color3,line width=0.9463186635198292pt,line cap=round](83.57142857142857,85.14285714285714) -- (88.30302188902772,87.0354944698968);
\draw[color3,line width=0.9463186635198292pt,line cap=round](87.34724003887268,85.994543940025) -- (88.30302188902772,87.0354944698968);
\draw[color3,line width=0.9463186635198292pt,line cap=round](86.89300708038317,87.13012633624878) -- (88.30302188902772,87.0354944698968);
\draw[color3,line width=0.36396871673839537pt,line cap=round](83.57142857142857,99.42857142857143) -- (85.39127215512055,100.15650886204823);
\draw[color3,line width=0.36396871673839537pt,line cap=round](85.02366375121477,99.75614327363598) -- (85.39127215512055,100.15650886204823);
\draw[color3,line width=0.36396871673839537pt,line cap=round](84.84895876718033,100.19290573372206) -- (85.39127215512055,100.15650886204823);
\draw[color3,line width=0.36396871673839615pt,line cap=round](97.85714285714286,84.0) -- (99.67698644083484,84.7279374334768);
\draw[color3,line width=0.36396871673839615pt,line cap=round](99.30937803692906,84.32757184506457) -- (99.67698644083484,84.7279374334768);
\draw[color3,line width=0.36396871673839615pt,line cap=round](99.13467305289463,84.76433430515064) -- (99.67698644083484,84.7279374334768);
\draw[color3,line width=0.059558517284465665pt,line cap=round](83.57142857142857,113.71428571428572) -- (83.27363598500624,113.59516867971679);
\draw[color3,line width=0.059558517284465665pt,line cap=round](83.33379008746354,113.66068304872971) -- (83.27363598500624,113.59516867971679);
\draw[color3,line width=0.059558517284465665pt,line cap=round](83.36237817576009,113.58921282798835) -- (83.27363598500624,113.59516867971679);
\draw[color3,line width=0.71920218427507pt,line cap=round](76.42857142857142,82.28571428571428) -- (80.02458234994677,83.72411865426443);
\draw[color3,line width=0.71920218427507pt,line cap=round](79.29818814382895,82.93299625156185) -- (80.02458234994677,83.72411865426443);
\draw[color3,line width=0.71920218427507pt,line cap=round](78.95297109537691,83.79603887269194) -- (80.02458234994677,83.72411865426443);
\draw[color3,line width=0.13998796797630605pt,line cap=round](97.85714285714286,98.28571428571429) -- (98.55708269702438,98.5656902216669);
\draw[color3,line width=0.13998796797630605pt,line cap=round](98.41569484936832,98.41170345689297) -- (98.55708269702438,98.5656902216669);
\draw[color3,line width=0.13998796797630605pt,line cap=round](98.3485006247397,98.57968901846452) -- (98.55708269702438,98.5656902216669);
\draw[color3,line width=0.3242630385487539pt,line cap=round](83.57142857142857,128.0) -- (81.95011337868479,127.3514739229025);
\draw[color3,line width=0.3242630385487539pt,line cap=round](82.27761904761904,127.70816326530613) -- (81.95011337868479,127.3514739229025);
\draw[color3,line width=0.3242630385487539pt,line cap=round](82.43326530612244,127.31904761904761) -- (81.95011337868479,127.3514739229025);
\draw[color2,line width=3pt,line cap=round](30.0,160.0) -- (80.0,180.0);
\draw[color2,line width=3pt,line cap=round](80.0,180.0) -- (180.0,172.0);
\draw[color3,line width=0.43014484705446965pt,line cap=round](83.57142857142857,142.2857142857143) -- (81.42070433615622,141.42542459160535);
\draw[color3,line width=0.43014484705446965pt,line cap=round](81.85515063168123,141.89858392336527) -- (81.42070433615622,141.42542459160535);
\draw[color3,line width=0.43014484705446965pt,line cap=round](82.06162015826737,141.3824101068999) -- (81.42070433615622,141.42542459160535);
\draw[color3,line width=0.02290712203248677pt,line cap=round](97.85714285714286,112.57142857142858) -- (97.74260724698043,112.52561432736361);
\draw[color3,line width=0.02290712203248677pt,line cap=round](97.76574344023324,112.55081216159934) -- (97.74260724698043,112.52561432736361);
\draw[color3,line width=0.02290712203248677pt,line cap=round](97.77673885880883,112.52332361516036) -- (97.74260724698043,112.52561432736361);
\draw[color3,line width=0.05955851728446466pt,line cap=round](112.14285714285715,82.85714285714285) -- (111.84506455643483,82.73802582257392);
\draw[color3,line width=0.05955851728446466pt,line cap=round](111.90521865889214,82.80354019158683) -- (111.84506455643483,82.73802582257392);
\draw[color3,line width=0.05955851728446466pt,line cap=round](111.93380674718868,82.73206997084547) -- (111.84506455643483,82.73802582257392);
\draw[color3,line width=0.2766162247211804pt,line cap=round](76.42857142857142,96.57142857142857) -- (77.81165255217732,97.12466102087093);
\draw[color3,line width=0.2766162247211804pt,line cap=round](77.53227016520893,96.82038317367763) -- (77.81165255217732,97.12466102087093);
\draw[color3,line width=0.2766162247211804pt,line cap=round](77.39949437734276,97.15232264334306) -- (77.81165255217732,97.12466102087093);
\draw[color3,line width=0.37720394280161196pt,line cap=round](83.57142857142857,156.57142857142856) -- (81.68540885742051,155.81702068582533);
\draw[color3,line width=0.37720394280161196pt,line cap=round](82.06638483965014,156.2319450229071) -- (81.68540885742051,155.81702068582533);
\draw[color3,line width=0.37720394280161196pt,line cap=round](82.24744273219491,155.77930029154516) -- (81.68540885742051,155.81702068582533);
\draw[color3,line width=0.12471655328798247pt,line cap=round](97.85714285714286,126.85714285714286) -- (97.23356009070295,126.6077097505669);
\draw[color3,line width=0.12471655328798247pt,line cap=round](97.35952380952381,126.74489795918367) -- (97.23356009070295,126.6077097505669);
\draw[color3,line width=0.12471655328798247pt,line cap=round](97.41938775510204,126.5952380952381) -- (97.23356009070295,126.6077097505669);
\draw[color3,line width=0.022907122032486477pt,line cap=round](112.14285714285715,97.14285714285714) -- (112.02832153269472,97.09704289879217);
\draw[color3,line width=0.022907122032486477pt,line cap=round](112.05145772594753,97.1222407330279) -- (112.02832153269472,97.09704289879217);
\draw[color3,line width=0.022907122032486477pt,line cap=round](112.06245314452312,97.09475218658892) -- (112.02832153269472,97.09704289879217);
\draw[color3,line width=0.27661622472118097pt,line cap=round](90.71428571428572,81.14285714285714) -- (92.09736683789163,81.6960895922995);
\draw[color3,line width=0.27661622472118097pt,line cap=round](91.81798445092323,81.3918117451062) -- (92.09736683789163,81.6960895922995);
\draw[color3,line width=0.27661622472118097pt,line cap=round](91.68520866305707,81.72375121477162) -- (92.09736683789163,81.6960895922995);
\draw[color3,line width=0.16544032579018259pt,line cap=round](83.57142857142857,170.85714285714286) -- (82.74422694247765,170.5262622055625);
\draw[color3,line width=0.16544032579018259pt,line cap=round](82.91132167152574,170.7082465639317) -- (82.74422694247765,170.5262622055625);
\draw[color3,line width=0.16544032579018259pt,line cap=round](82.99073302790504,170.50971817298347) -- (82.74422694247765,170.5262622055625);
\draw[color3,line width=0.16544032579018103pt,line cap=round](97.85714285714286,141.14285714285717) -- (97.02994122819194,140.8119764912768);
\draw[color3,line width=0.16544032579018103pt,line cap=round](97.19703595724002,140.99396084964602) -- (97.02994122819194,140.8119764912768);
\draw[color3,line width=0.16544032579018103pt,line cap=round](97.27644731361931,140.79543245869777) -- (97.02994122819194,140.8119764912768);
\draw[color3,line width=0.0037484381507703196pt,line cap=round](112.14285714285715,111.42857142857143) -- (112.16159933361101,111.43606830487298);
\draw[color3,line width=0.0037484381507703196pt,line cap=round](112.15781341107872,111.43194502290713) -- (112.16159933361101,111.43606830487298);
\draw[color3,line width=0.0037484381507703196pt,line cap=round](112.15601416076636,111.43644314868804) -- (112.16159933361101,111.43606830487298);
\draw[color3,line width=0.04526447313619399pt,line cap=round](76.42857142857142,110.85714285714286) -- (76.20224906289044,110.76661391087048);
\draw[color3,line width=0.04526447313619399pt,line cap=round](76.247966180758,110.8164048313203) -- (76.20224906289044,110.76661391087048);
\draw[color3,line width=0.04526447313619399pt,line cap=round](76.26969312786338,110.76208746355685) -- (76.20224906289044,110.76661391087048);
\draw[color3,line width=0.3242630385487528pt,line cap=round](126.42857142857143,81.71428571428571) -- (124.80725623582767,81.06575963718821);
\draw[color3,line width=0.3242630385487528pt,line cap=round](125.13476190476192,81.42244897959185) -- (124.80725623582767,81.06575963718821);
\draw[color3,line width=0.3242630385487528pt,line cap=round](125.29040816326531,81.03333333333333) -- (124.80725623582767,81.06575963718821);
\draw[color3,line width=0.4920857050303113pt,line cap=round](69.28571428571428,79.42857142857143) -- (71.74614281086585,80.41274283863206);
\draw[color3,line width=0.4920857050303113pt,line cap=round](71.24913624878523,79.87144856309871) -- (71.74614281086585,80.41274283863206);
\draw[color3,line width=0.4920857050303113pt,line cap=round](71.01293511037069,80.46195140913508) -- (71.74614281086585,80.41274283863206);
\draw[color3,line width=0.10639085566199252pt,line cap=round](90.71428571428572,95.42857142857143) -- (91.24623999259569,95.64135313989543);
\draw[color3,line width=0.10639085566199252pt,line cap=round](91.13878522837707,95.52432319866723) -- (91.24623999259569,95.64135313989543);
\draw[color3,line width=0.10639085566199252pt,line cap=round](91.08771761765932,95.65199222546163) -- (91.24623999259569,95.64135313989543);
\draw[color3,line width=0.14507843953908225pt,line cap=round](97.85714285714286,155.42857142857142) -- (97.13175065944745,155.13841454949323);
\draw[color3,line width=0.14507843953908225pt,line cap=round](97.27827988338193,155.29800083298622) -- (97.13175065944745,155.13841454949323);
\draw[color3,line width=0.14507843953908225pt,line cap=round](97.34791753436069,155.12390670553933) -- (97.13175065944745,155.13841454949323);
\draw[color3,line width=0.02040816326530572pt,line cap=round](112.14285714285715,125.71428571428571) -- (112.24489795918367,125.75510204081633);
\draw[color3,line width=0.02040816326530572pt,line cap=round](112.22428571428573,125.7326530612245) -- (112.24489795918367,125.75510204081633);
\draw[color3,line width=0.02040816326530572pt,line cap=round](112.21448979591837,125.75714285714285) -- (112.24489795918367,125.75510204081633);
\draw[color3,line width=0.24643990929705287pt,line cap=round](76.42857142857142,125.14285714285714) -- (75.19637188208617,124.64997732426303);
\draw[color3,line width=0.24643990929705287pt,line cap=round](75.44527619047619,124.92106122448979) -- (75.19637188208617,124.64997732426303);
\draw[color3,line width=0.24643990929705287pt,line cap=round](75.56356734693878,124.62533333333334) -- (75.19637188208617,124.64997732426303);
\draw[color3,line width=0.12471655328798188pt,line cap=round](126.42857142857143,96.0) -- (125.80498866213152,95.75056689342404);
\draw[color3,line width=0.12471655328798188pt,line cap=round](125.93095238095239,95.88775510204081) -- (125.80498866213152,95.75056689342404);
\draw[color3,line width=0.12471655328798188pt,line cap=round](125.99081632653062,95.73809523809524) -- (125.80498866213152,95.75056689342404);
\draw[color3,line width=0.06363089453468622pt,line cap=round](97.85714285714286,169.71428571428572) -- (97.53898838446943,169.58702392521633);
\draw[color3,line width=0.06363089453468622pt,line cap=round](97.60325558794946,169.65701790920448) -- (97.53898838446943,169.58702392521633);
\draw[color3,line width=0.06363089453468622pt,line cap=round](97.63379841732612,169.58066083576287) -- (97.53898838446943,169.58702392521633);
\draw[color3,line width=0.027072053311119695pt,line cap=round](112.14285714285715,140.0) -- (112.27821740941275,140.05414410662223);
\draw[color3,line width=0.027072053311119695pt,line cap=round](112.25087463556851,140.02436484798) -- (112.27821740941275,140.05414410662223);
\draw[color3,line width=0.027072053311119695pt,line cap=round](112.23788004997918,140.05685131195332) -- (112.27821740941275,140.05414410662223);
\draw[color3,line width=0.32691008376139685pt,line cap=round](76.42857142857142,139.42857142857144) -- (74.79402100976444,138.77475126104864);
\draw[color3,line width=0.32691008376139685pt,line cap=round](75.12420019436344,139.13435235318616) -- (74.79402100976444,138.77475126104864);
\draw[color3,line width=0.32691008376139685pt,line cap=round](75.28111703456891,138.7420602526725) -- (74.79402100976444,138.77475126104864);
\draw[color3,line width=0.020408163265306117pt,line cap=round](126.42857142857143,110.28571428571429) -- (126.53061224489795,110.32653061224491);
\draw[color3,line width=0.020408163265306117pt,line cap=round](126.51,110.30408163265308) -- (126.53061224489795,110.32653061224491);
\draw[color3,line width=0.020408163265306117pt,line cap=round](126.50020408163265,110.32857142857144) -- (126.53061224489795,110.32653061224491);
\draw[color3,line width=0.017409412744690118pt,line cap=round](90.71428571428572,109.71428571428572) -- (90.62723865056226,109.67946688879634);
\draw[color3,line width=0.017409412744690118pt,line cap=round](90.6448221574344,109.6986172428155) -- (90.62723865056226,109.67946688879634);
\draw[color3,line width=0.017409412744690118pt,line cap=round](90.65317867555184,109.67772594752186) -- (90.62723865056226,109.67946688879634);
\draw[color3,line width=0.43014484705446815pt,line cap=round](140.71428571428572,80.57142857142857) -- (138.56356147901337,79.71113887731963);
\draw[color3,line width=0.43014484705446815pt,line cap=round](138.9980077745384,80.18429820907954) -- (138.56356147901337,79.71113887731963);
\draw[color3,line width=0.43014484705446815pt,line cap=round](139.20447730112454,79.66812439261417) -- (138.56356147901337,79.71113887731963);
\draw[color3,line width=0.04526447313619312pt,line cap=round](105.0,79.99999999999999) -- (104.77367763431904,79.9094710537276);
\draw[color3,line width=0.04526447313619312pt,line cap=round](104.8193947521866,79.95926197417741) -- (104.77367763431904,79.9094710537276);
\draw[color3,line width=0.04526447313619312pt,line cap=round](104.84112169929197,79.90494460641399) -- (104.77367763431904,79.9094710537276);
\draw[color3,line width=0.18926373270396563pt,line cap=round](69.28571428571428,93.71428571428572) -- (70.23203294923411,94.09281317969365);
\draw[color3,line width=0.18926373270396563pt,line cap=round](70.0408765792031,93.88462307371928) -- (70.23203294923411,94.09281317969365);
\draw[color3,line width=0.18926373270396563pt,line cap=round](69.9500299875052,94.11173955296404) -- (70.23203294923411,94.09281317969365);
\draw[color3,line width=0.11111111111111104pt,line cap=round](126.42857142857143,124.57142857142857) -- (126.98412698412699,124.79365079365078);
\draw[color3,line width=0.11111111111111104pt,line cap=round](126.87190476190477,124.67142857142856) -- (126.98412698412699,124.79365079365078);
\draw[color3,line width=0.11111111111111104pt,line cap=round](126.81857142857143,124.80476190476189) -- (126.98412698412699,124.79365079365078);
\draw[color3,line width=0.023740108288212325pt,line cap=round](112.14285714285715,154.28571428571428) -- (112.26155768429823,154.3331945022907);
\draw[color3,line width=0.023740108288212325pt,line cap=round](112.23758017492713,154.30708038317366) -- (112.26155768429823,154.3331945022907);
\draw[color3,line width=0.023740108288212325pt,line cap=round](112.22618492294879,154.3355685131195) -- (112.26155768429823,154.3331945022907);
\draw[color3,line width=0.2866749965292249pt,line cap=round](76.42857142857142,153.7142857142857) -- (74.9951964459253,153.14093572122724);
\draw[color3,line width=0.2866749965292249pt,line cap=round](75.28473819241981,153.4562782174094) -- (74.9951964459253,153.14093572122724);
\draw[color3,line width=0.2866749965292249pt,line cap=round](75.42234219075385,153.11226822157434) -- (74.9951964459253,153.14093572122724);
\draw[color3,line width=0.09478458049886669pt,line cap=round](90.71428571428572,124.0) -- (90.24036281179139,123.81043083900228);
\draw[color3,line width=0.09478458049886669pt,line cap=round](90.33609523809524,123.91469387755103) -- (90.24036281179139,123.81043083900228);
\draw[color3,line width=0.09478458049886669pt,line cap=round](90.3815918367347,123.8009523809524) -- (90.24036281179139,123.81043083900228);
\draw[color3,line width=0.017409412744689715pt,line cap=round](105.0,94.28571428571428) -- (104.91295293627655,94.2508954602249);
\draw[color3,line width=0.017409412744689715pt,line cap=round](104.9305364431487,94.27004581424406) -- (104.91295293627655,94.2508954602249);
\draw[color3,line width=0.017409412744689715pt,line cap=round](104.93889296126613,94.24915451895042) -- (104.91295293627655,94.2508954602249);
\draw[color3,line width=0.16544032579018014pt,line cap=round](140.71428571428572,94.85714285714286) -- (139.88708408533483,94.5262622055625);
\draw[color3,line width=0.16544032579018014pt,line cap=round](140.0541788143829,94.7082465639317) -- (139.88708408533483,94.5262622055625);
\draw[color3,line width=0.16544032579018014pt,line cap=round](140.1335901707622,94.50971817298348) -- (139.88708408533483,94.5262622055625);
\draw[color3,line width=0.14739229024943304pt,line cap=round](126.42857142857143,138.85714285714286) -- (127.16553287981858,139.15192743764172);
\draw[color3,line width=0.14739229024943304pt,line cap=round](127.01666666666665,138.98979591836732) -- (127.16553287981858,139.15192743764172);
\draw[color3,line width=0.14739229024943304pt,line cap=round](126.94591836734693,139.16666666666666) -- (127.16553287981858,139.15192743764172);
\draw[color3,line width=0.18926373270396596pt,line cap=round](83.57142857142858,78.28571428571429) -- (84.5177472349484,78.66424175112222);
\draw[color3,line width=0.18926373270396596pt,line cap=round](84.32659086491739,78.45605164514787) -- (84.5177472349484,78.66424175112222);
\draw[color3,line width=0.18926373270396596pt,line cap=round](84.2357442732195,78.68316812439262) -- (84.5177472349484,78.66424175112222);
\draw[color3,line width=0.010412328196583488pt,line cap=round](112.14285714285715,168.57142857142858) -- (112.19491878384008,168.59225322782174);
\draw[color3,line width=0.010412328196583488pt,line cap=round](112.18440233236153,168.5807996668055) -- (112.19491878384008,168.59225322782174);
\draw[color3,line width=0.010412328196583488pt,line cap=round](112.17940441482718,168.5932944606414) -- (112.19491878384008,168.59225322782174);
\draw[color3,line width=0.1257346476005382pt,line cap=round](76.42857142857142,168.0) -- (75.79989819056874,167.74853070479892);
\draw[color3,line width=0.1257346476005382pt,line cap=round](75.92689018464527,167.88683881715951) -- (75.79989819056874,167.74853070479892);
\draw[color3,line width=0.1257346476005382pt,line cap=round](75.98724281549353,167.73595724003889) -- (75.79989819056874,167.74853070479892);
\draw[color3,line width=0.12573464760053754pt,line cap=round](90.71428571428572,138.2857142857143) -- (90.08561247628303,138.03424499051323);
\draw[color3,line width=0.12573464760053754pt,line cap=round](90.21260447035958,138.17255310287382) -- (90.08561247628303,138.03424499051323);
\draw[color3,line width=0.12573464760053754pt,line cap=round](90.27295710120784,138.0216715257532) -- (90.08561247628303,138.03424499051323);
\draw[color3,line width=0.027072053311120274pt,line cap=round](140.71428571428572,109.14285714285715) -- (140.84964598084133,109.1970012494794);
\draw[color3,line width=0.027072053311120274pt,line cap=round](140.8223032069971,109.16722199083716) -- (140.84964598084133,109.1970012494794);
\draw[color3,line width=0.027072053311120274pt,line cap=round](140.80930862140775,109.19970845481052) -- (140.84964598084133,109.1970012494794);
\draw[color3,line width=0.0028488129945854162pt,line cap=round](105.0,108.57142857142857) -- (105.01424406497293,108.57712619741774);
\draw[color3,line width=0.0028488129945854162pt,line cap=round](105.0113667638484,108.57399250312369) -- (105.01424406497293,108.57712619741774);
\draw[color3,line width=0.0028488129945854162pt,line cap=round](105.009999333611,108.5774110787172) -- (105.01424406497293,108.57712619741774);
\draw[color3,line width=0.030970428987922103pt,line cap=round](69.28571428571428,108.00000000000001) -- (69.13086214077467,107.93805914202417);
\draw[color3,line width=0.030970428987922103pt,line cap=round](69.16214227405246,107.97212661391089) -- (69.13086214077467,107.93805914202417);
\draw[color3,line width=0.030970428987922103pt,line cap=round](69.17700807996667,107.93496209912539) -- (69.13086214077467,107.93805914202417);
\draw[color3,line width=0.3772039428016108pt,line cap=round](155.0,79.42857142857143) -- (153.11398028599194,78.6741635429682);
\draw[color3,line width=0.3772039428016108pt,line cap=round](153.49495626822156,79.08908788004999) -- (153.11398028599194,78.6741635429682);
\draw[color3,line width=0.3772039428016108pt,line cap=round](153.67601416076636,78.63644314868804) -- (153.11398028599194,78.6741635429682);
\draw[color3,line width=0.24643990929705215pt,line cap=round](119.28571428571428,78.85714285714285) -- (118.05351473922903,78.36426303854874);
\draw[color3,line width=0.24643990929705215pt,line cap=round](118.30241904761905,78.63534693877548) -- (118.05351473922903,78.36426303854874);
\draw[color3,line width=0.24643990929705215pt,line cap=round](118.42071020408164,78.33961904761904) -- (118.05351473922903,78.36426303854874);
\draw[color3,line width=0.12925170068027197pt,line cap=round](126.42857142857143,153.14285714285714) -- (127.07482993197279,153.40136054421768);
\draw[color3,line width=0.12925170068027197pt,line cap=round](126.94428571428571,153.25918367346938) -- (127.07482993197279,153.40136054421768);
\draw[color3,line width=0.12925170068027197pt,line cap=round](126.88224489795917,153.41428571428568) -- (127.07482993197279,153.40136054421768);
\draw[color3,line width=0.14739229024943293pt,line cap=round](140.71428571428572,123.42857142857143) -- (141.4512471655329,123.7233560090703);
\draw[color3,line width=0.14739229024943293pt,line cap=round](141.30238095238096,123.56122448979593) -- (141.4512471655329,123.7233560090703);
\draw[color3,line width=0.14739229024943293pt,line cap=round](141.2316326530612,123.73809523809524) -- (141.4512471655329,123.7233560090703);
\draw[color2,line width=3pt,line cap=round](130.0,52.0) -- (180.0,72.0);
\draw[color2,line width=3pt,line cap=round](180.0,72.0) -- (180.0,172.0);
\draw[color3,line width=0.07279374334767909pt,line cap=round](83.57142857142858,92.57142857142858) -- (83.93539728816697,92.71701605812393);
\draw[color3,line width=0.07279374334767909pt,line cap=round](83.86187560738581,92.63694294044149) -- (83.93539728816697,92.71701605812393);
\draw[color3,line width=0.07279374334767909pt,line cap=round](83.82693461057893,92.72429543245869) -- (83.93539728816697,92.71701605812393);
\draw[color3,line width=0.11025961404970246pt,line cap=round](90.71428571428572,152.57142857142856) -- (90.1629876440372,152.35090934332914);
\draw[color3,line width=0.11025961404970246pt,line cap=round](90.27434985422741,152.4721949187838) -- (90.1629876440372,152.35090934332914);
\draw[color3,line width=0.11025961404970246pt,line cap=round](90.32727446897127,152.33988338192418) -- (90.1629876440372,152.35090934332914);
\draw[color3,line width=0.01551020408163229pt,line cap=round](105.0,122.85714285714285) -- (105.07755102040818,122.88816326530612);
\draw[color3,line width=0.01551020408163229pt,line cap=round](105.06188571428572,122.87110204081633) -- (105.07755102040818,122.88816326530612);
\draw[color3,line width=0.01551020408163229pt,line cap=round](105.05444081632655,122.88971428571428) -- (105.07755102040818,122.88816326530612);
\draw[color3,line width=0.1686167800453519pt,line cap=round](69.28571428571428,122.28571428571429) -- (68.44263038548752,121.94848072562358);
\draw[color3,line width=0.1686167800453519pt,line cap=round](68.61293333333332,122.13395918367348) -- (68.44263038548752,121.94848072562358);
\draw[color3,line width=0.1686167800453519pt,line cap=round](68.6938693877551,121.93161904761905) -- (68.44263038548752,121.94848072562358);
\draw[color3,line width=0.09478458049886622pt,line cap=round](119.28571428571428,93.14285714285714) -- (118.81179138321995,92.95328798185942);
\draw[color3,line width=0.09478458049886622pt,line cap=round](118.90752380952381,93.05755102040817) -- (118.81179138321995,92.95328798185942);
\draw[color3,line width=0.09478458049886622pt,line cap=round](118.95302040816327,92.94380952380953) -- (118.81179138321995,92.95328798185942);
\draw[color3,line width=0.1450784395390811pt,line cap=round](155.0,93.71428571428571) -- (154.2746078023046,93.42412883520754);
\draw[color3,line width=0.1450784395390811pt,line cap=round](154.42113702623908,93.58371511870052) -- (154.2746078023046,93.42412883520754);
\draw[color3,line width=0.1450784395390811pt,line cap=round](154.49077467721781,93.40962099125363) -- (154.2746078023046,93.42412883520754);
\draw[color3,line width=0.26496922578555204pt,line cap=round](62.14285714285714,76.57142857142857) -- (63.4677032717849,77.10136702299967);
\draw[color3,line width=0.26496922578555204pt,line cap=round](63.20008435374149,76.80990087463556) -- (63.4677032717849,77.10136702299967);
\draw[color3,line width=0.26496922578555204pt,line cap=round](63.07289912536443,77.12786394557821) -- (63.4677032717849,77.10136702299967);
\draw[color3,line width=0.1955203850247579pt,line cap=round](140.71428571428572,137.71428571428572) -- (141.69188763940952,138.10532648433525);
\draw[color3,line width=0.1955203850247579pt,line cap=round](141.49441205053452,137.890254060808) -- (141.69188763940952,138.10532648433525);
\draw[color3,line width=0.1955203850247579pt,line cap=round](141.40056226572264,138.12487852283772) -- (141.69188763940952,138.10532648433525);
\draw[color3,line width=0.05668934240362798pt,line cap=round](126.42857142857143,167.42857142857144) -- (126.71201814058958,167.54195011337868);
\draw[color3,line width=0.05668934240362798pt,line cap=round](126.65476190476191,167.4795918367347) -- (126.71201814058958,167.54195011337868);
\draw[color3,line width=0.05668934240362798pt,line cap=round](126.62755102040818,167.54761904761904) -- (126.71201814058958,167.54195011337868);
\draw[color3,line width=0.04835947984636141pt,line cap=round](90.71428571428572,166.85714285714286) -- (90.47248831505391,166.76042389745012);
\draw[color3,line width=0.04835947984636141pt,line cap=round](90.52133138969873,166.81361932528114) -- (90.47248831505391,166.76042389745012);
\draw[color3,line width=0.04835947984636141pt,line cap=round](90.544543940025,166.7555879494655) -- (90.47248831505391,166.76042389745012);
\draw[color3,line width=0.02057476051645089pt,line cap=round](105.0,137.14285714285714) -- (105.10287380258225,137.18400666389005);
\draw[color3,line width=0.02057476051645089pt,line cap=round](105.08209329446063,137.16137442732193) -- (105.10287380258225,137.18400666389005);
\draw[color3,line width=0.02057476051645089pt,line cap=round](105.07221740941273,137.1860641399417) -- (105.10287380258225,137.18400666389005);
\draw[color3,line width=0.22367532046832364pt,line cap=round](69.28571428571428,136.57142857142858) -- (68.16733768337266,136.12407793049192);
\draw[color3,line width=0.22367532046832364pt,line cap=round](68.39324975704568,136.37012078300708) -- (68.16733768337266,136.12407793049192);
\draw[color3,line width=0.22367532046832364pt,line cap=round](68.50061391087047,136.10171039844508) -- (68.16733768337266,136.12407793049192);
\draw[color3,line width=0.023740108288213376pt,line cap=round](155.0,108.0) -- (155.11870054144106,108.04748021657643);
\draw[color3,line width=0.023740108288213376pt,line cap=round](155.09472303206996,108.02136609745939) -- (155.11870054144106,108.04748021657643);
\draw[color3,line width=0.023740108288213376pt,line cap=round](155.08332778009162,108.04985422740525) -- (155.11870054144106,108.04748021657643);
\draw[color3,line width=0.015510204081632678pt,line cap=round](119.28571428571428,107.42857142857143) -- (119.36326530612246,107.4595918367347);
\draw[color3,line width=0.015510204081632678pt,line cap=round](119.3476,107.44253061224491) -- (119.36326530612246,107.4595918367347);
\draw[color3,line width=0.015510204081632678pt,line cap=round](119.34015510204082,107.46114285714286) -- (119.36326530612246,107.4595918367347);
\draw[color3,line width=0.011911703456893189pt,line cap=round](83.57142857142858,106.85714285714288) -- (83.51187005414411,106.83331945022908);
\draw[color3,line width=0.011911703456893189pt,line cap=round](83.52390087463557,106.84642232403166) -- (83.51187005414411,106.83331945022908);
\draw[color3,line width=0.011911703456893189pt,line cap=round](83.52961849229489,106.83212827988339) -- (83.51187005414411,106.83331945022908);
\draw[color3,line width=0.030970428987921596pt,line cap=round](97.85714285714286,77.14285714285714) -- (97.70229071220325,77.0809162848813);
\draw[color3,line width=0.030970428987921596pt,line cap=round](97.73357084548104,77.11498375676801) -- (97.70229071220325,77.0809162848813);
\draw[color3,line width=0.030970428987921596pt,line cap=round](97.74843665139525,77.07781924198251) -- (97.70229071220325,77.0809162848813);
\draw[color3,line width=0.16544032579017948pt,line cap=round](169.28571428571428,78.28571428571428) -- (168.4585126567634,77.95483363413392);
\draw[color3,line width=0.16544032579017948pt,line cap=round](168.62560738581146,78.13681799250311) -- (168.4585126567634,77.95483363413392);
\draw[color3,line width=0.16544032579017948pt,line cap=round](168.70501874219076,77.9382896015549) -- (168.4585126567634,77.95483363413392);
\draw[color3,line width=0.32691008376139574pt,line cap=round](133.57142857142858,77.71428571428571) -- (131.9368781526216,77.06046554676291);
\draw[color3,line width=0.32691008376139574pt,line cap=round](132.2670573372206,77.42006663890045) -- (131.9368781526216,77.06046554676291);
\draw[color3,line width=0.32691008376139574pt,line cap=round](132.4239741774261,77.02777453838677) -- (131.9368781526216,77.06046554676291);
\draw[color3,line width=0.17145633763709514pt,line cap=round](140.71428571428572,152.0) -- (141.5715674024712,152.3429126752742);
\draw[color3,line width=0.17145633763709514pt,line cap=round](141.39839650145774,152.1543107038734) -- (141.5715674024712,152.3429126752742);
\draw[color3,line width=0.17145633763709514pt,line cap=round](141.31609745939193,152.3600583090379) -- (141.5715674024712,152.3429126752742);
\draw[color3,line width=0.1292517006802723pt,line cap=round](155.0,122.28571428571428) -- (155.64625850340136,122.54421768707482);
\draw[color3,line width=0.1292517006802723pt,line cap=round](155.5157142857143,122.40204081632652) -- (155.64625850340136,122.54421768707482);
\draw[color3,line width=0.1292517006802723pt,line cap=round](155.45367346938775,122.55714285714285) -- (155.64625850340136,122.54421768707482);
\draw[color3,line width=0.08444444444444447pt,line cap=round](119.28571428571428,121.71428571428571) -- (119.70793650793651,121.88317460317461);
\draw[color3,line width=0.08444444444444447pt,line cap=round](119.62264761904763,121.79028571428572) -- (119.70793650793651,121.88317460317461);
\draw[color3,line width=0.08444444444444447pt,line cap=round](119.58211428571428,121.89161904761906) -- (119.70793650793651,121.88317460317461);
\draw[color3,line width=0.10191124068675056pt,line cap=round](62.14285714285714,90.85714285714286) -- (62.65241334629089,91.06096533851637);
\draw[color3,line width=0.10191124068675056pt,line cap=round](62.54948299319727,90.94886297376094) -- (62.65241334629089,91.06096533851637);
\draw[color3,line width=0.10191124068675056pt,line cap=round](62.50056559766763,91.07115646258505) -- (62.65241334629089,91.06096533851637);
\draw[color3,line width=0.018042482299041266pt,line cap=round](105.0,151.42857142857142) -- (105.09021241149522,151.4646563931695);
\draw[color3,line width=0.018042482299041266pt,line cap=round](105.07198950437318,151.44480966264055) -- (105.09021241149522,151.4646563931695);
\draw[color3,line width=0.018042482299041266pt,line cap=round](105.06332911286965,151.46646064139938) -- (105.09021241149522,151.4646563931695);
\draw[color3,line width=0.1961460502568382pt,line cap=round](69.28571428571428,150.85714285714283) -- (68.30498403443009,150.46485075662915);
\draw[color3,line width=0.1961460502568382pt,line cap=round](68.50309154518949,150.68061141191168) -- (68.30498403443009,150.46485075662915);
\draw[color3,line width=0.1961460502568382pt,line cap=round](68.59724164931278,150.44523615160347) -- (68.30498403443009,150.46485075662915);
\draw[color3,line width=0.06485260770975093pt,line cap=round](83.57142857142858,121.14285714285715) -- (83.24716553287982,121.01315192743765);
\draw[color3,line width=0.06485260770975093pt,line cap=round](83.31266666666667,121.08448979591837) -- (83.24716553287982,121.01315192743765);
\draw[color3,line width=0.06485260770975093pt,line cap=round](83.34379591836736,121.00666666666667) -- (83.24716553287982,121.01315192743765);
\draw[color3,line width=0.011911703456892974pt,line cap=round](97.85714285714286,91.42857142857143) -- (97.7975843398584,91.40474802165764);
\draw[color3,line width=0.011911703456892974pt,line cap=round](97.80961516034986,91.41785089546022) -- (97.7975843398584,91.40474802165764);
\draw[color3,line width=0.011911703456892974pt,line cap=round](97.81533277800918,91.40355685131195) -- (97.7975843398584,91.40474802165764);
\draw[color3,line width=0.06363089453468533pt,line cap=round](169.28571428571428,92.57142857142857) -- (168.96755981304085,92.4441667823592);
\draw[color3,line width=0.06363089453468533pt,line cap=round](169.03182701652088,92.51416076634735) -- (168.96755981304085,92.4441667823592);
\draw[color3,line width=0.06363089453468533pt,line cap=round](169.06236984589754,92.43780369290573) -- (168.96755981304085,92.4441667823592);
\draw[color3,line width=0.12573464760053688pt,line cap=round](133.57142857142858,92.0) -- (132.9427553334259,91.74853070479894);
\draw[color3,line width=0.12573464760053688pt,line cap=round](133.06974732750245,91.88683881715951) -- (132.9427553334259,91.74853070479894);
\draw[color3,line width=0.12573464760053688pt,line cap=round](133.13009995835068,91.73595724003889) -- (132.9427553334259,91.74853070479894);
\draw[color3,line width=0.17145633763709603pt,line cap=round](155.0,136.57142857142858) -- (155.85728168818548,136.91434124670278);
\draw[color3,line width=0.17145633763709603pt,line cap=round](155.68411078717202,136.72573927530198) -- (155.85728168818548,136.91434124670278);
\draw[color3,line width=0.17145633763709603pt,line cap=round](155.6018117451062,136.93148688046648) -- (155.85728168818548,136.91434124670278);
\draw[color3,line width=0.11201814058956923pt,line cap=round](119.28571428571428,136.0) -- (119.84580498866214,136.22403628117914);
\draw[color3,line width=0.11201814058956923pt,line cap=round](119.73266666666667,136.1008163265306) -- (119.84580498866214,136.22403628117914);
\draw[color3,line width=0.11201814058956923pt,line cap=round](119.67889795918369,136.23523809523812) -- (119.84580498866214,136.22403628117914);
\draw[color3,line width=0.07520014808644472pt,line cap=round](140.71428571428572,166.2857142857143) -- (141.09028645471795,166.43611458188718);
\draw[color3,line width=0.07520014808644472pt,line cap=round](141.01433430515064,166.3533944189921) -- (141.09028645471795,166.43611458188718);
\draw[color3,line width=0.07520014808644472pt,line cap=round](140.97823823406915,166.44363459669583) -- (141.09028645471795,166.43611458188718);
\draw[color3,line width=0.10191124068675089pt,line cap=round](76.42857142857143,75.42857142857143) -- (76.93812763200518,75.63239390994494);
\draw[color3,line width=0.10191124068675089pt,line cap=round](76.83519727891155,75.52029154518951) -- (76.93812763200518,75.63239390994494);
\draw[color3,line width=0.10191124068675089pt,line cap=round](76.78627988338192,75.64258503401362) -- (76.93812763200518,75.63239390994494);
\draw[color3,line width=0.007913369429403308pt,line cap=round](105.0,165.71428571428572) -- (105.03956684714703,165.73011245314453);
\draw[color3,line width=0.007913369429403308pt,line cap=round](105.03157434402333,165.7214077467722) -- (105.03956684714703,165.73011245314453);
\draw[color3,line width=0.007913369429403308pt,line cap=round](105.0277759266972,165.73090379008747) -- (105.03956684714703,165.73011245314453);
\draw[color3,line width=0.08602896941089429pt,line cap=round](69.28571428571428,165.14285714285714) -- (68.85556943865981,164.97079920403536);
\draw[color3,line width=0.08602896941089429pt,line cap=round](68.94245869776482,165.06543107038735) -- (68.85556943865981,164.97079920403536);
\draw[color3,line width=0.08602896941089429pt,line cap=round](68.98375260308204,164.96219630709427) -- (68.85556943865981,164.97079920403536);
\draw[color3,line width=0.08602896941089407pt,line cap=round](83.57142857142858,135.42857142857144) -- (83.1412837243741,135.25651348974966);
\draw[color3,line width=0.08602896941089407pt,line cap=round](83.22817298347911,135.35114535610165) -- (83.1412837243741,135.25651348974966);
\draw[color3,line width=0.08602896941089407pt,line cap=round](83.26946688879633,135.24791059280858) -- (83.1412837243741,135.25651348974966);
\draw[color3,line width=0.020574760516451428pt,line cap=round](133.57142857142858,106.28571428571429) -- (133.67430237401084,106.3268638067472);
\draw[color3,line width=0.020574760516451428pt,line cap=round](133.65352186588922,106.30423157017911) -- (133.67430237401084,106.3268638067472);
\draw[color3,line width=0.020574760516451428pt,line cap=round](133.6436459808413,106.32892128279885) -- (133.67430237401084,106.3268638067472);
\draw[color3,line width=0.010412328196582674pt,line cap=round](169.28571428571428,106.85714285714286) -- (169.3377759266972,106.87796751353602);
\draw[color3,line width=0.010412328196582674pt,line cap=round](169.32725947521865,106.86651395251977) -- (169.3377759266972,106.87796751353602);
\draw[color3,line width=0.010412328196582674pt,line cap=round](169.3222615576843,106.87900874635568) -- (169.3377759266972,106.87796751353602);
\draw[color3,line width=0.0019491878384005198pt,line cap=round](97.85714285714286,105.71428571428572) -- (97.86688879633488,105.71818408996252);
\draw[color3,line width=0.0019491878384005198pt,line cap=round](97.86492011661808,105.71603998334028) -- (97.86688879633488,105.71818408996252);
\draw[color3,line width=0.0019491878384005198pt,line cap=round](97.86398450645565,105.71837900874637) -- (97.86688879633488,105.71818408996252);
\draw[color3,line width=0.016676384839650542pt,line cap=round](62.14285714285714,105.14285714285715) -- (62.05947521865889,105.10950437317786);
\draw[color3,line width=0.016676384839650542pt,line cap=round](62.076318367346936,105.12784839650148) -- (62.05947521865889,105.10950437317786);
\draw[color3,line width=0.016676384839650542pt,line cap=round](62.08432303206997,105.10783673469389) -- (62.05947521865889,105.10950437317786);
\draw[color3,line width=0.16861678004535152pt,line cap=round](112.14285714285714,76.0) -- (111.29977324263038,75.66276643990929);
\draw[color3,line width=0.16861678004535152pt,line cap=round](111.47007619047618,75.84824489795918) -- (111.29977324263038,75.66276643990929);
\draw[color3,line width=0.16861678004535152pt,line cap=round](111.55101224489796,75.64590476190475) -- (111.29977324263038,75.66276643990929);
\draw[color3,line width=0.28667499652922424pt,line cap=round](147.85714285714286,76.57142857142857) -- (146.42376787449672,75.99807857837013);
\draw[color3,line width=0.28667499652922424pt,line cap=round](146.71330962099123,76.31342107455228) -- (146.42376787449672,75.99807857837013);
\draw[color3,line width=0.28667499652922424pt,line cap=round](146.85091361932527,75.9694110787172) -- (146.42376787449672,75.99807857837013);
\draw[color3,line width=0.15035401915868402pt,line cap=round](155.0,150.85714285714286) -- (155.7517700957934,151.15785089546023);
\draw[color3,line width=0.15035401915868402pt,line cap=round](155.59991253644313,150.9924614743857) -- (155.7517700957934,151.15785089546023);
\draw[color3,line width=0.15035401915868402pt,line cap=round](155.52774260724698,151.1728862973761) -- (155.7517700957934,151.15785089546023);
\draw[color3,line width=0.09823129251700685pt,line cap=round](119.28571428571428,150.28571428571428) -- (119.77687074829932,150.48217687074828);
\draw[color3,line width=0.09823129251700685pt,line cap=round](119.67765714285714,150.3741224489796) -- (119.77687074829932,150.48217687074828);
\draw[color3,line width=0.09823129251700685pt,line cap=round](119.63050612244898,150.492) -- (119.77687074829932,150.48217687074828);
\draw[color3,line width=0.112018140589569pt,line cap=round](133.57142857142858,120.57142857142857) -- (134.13151927437642,120.79546485260771);
\draw[color3,line width=0.112018140589569pt,line cap=round](134.01838095238097,120.67224489795917) -- (134.13151927437642,120.79546485260771);
\draw[color3,line width=0.112018140589569pt,line cap=round](133.96461224489795,120.80666666666666) -- (134.13151927437642,120.79546485260771);
\draw[color3,line width=0.0566893424036245pt,line cap=round](169.28571428571428,121.14285714285714) -- (169.5691609977324,121.2562358276644);
\draw[color3,line width=0.0566893424036245pt,line cap=round](169.51190476190476,121.19387755102042) -- (169.5691609977324,121.2562358276644);
\draw[color3,line width=0.0566893424036245pt,line cap=round](169.48469387755102,121.26190476190476) -- (169.5691609977324,121.2562358276644);
\draw[color3,line width=0.07544078856032277pt,line cap=round](83.57142857142858,149.7142857142857) -- (83.19422462862696,149.56340413716504);
\draw[color3,line width=0.07544078856032277pt,line cap=round](83.27041982507289,149.6463890045814) -- (83.19422462862696,149.56340413716504);
\draw[color3,line width=0.07544078856032277pt,line cap=round](83.30663140358185,149.555860058309) -- (83.19422462862696,149.56340413716504);
\draw[color3,line width=0.03919663103336564pt,line cap=round](76.42857142857143,89.71428571428572) -- (76.62455458373826,89.79267897635245);
\draw[color3,line width=0.03919663103336564pt,line cap=round](76.58496598639455,89.74956268221575) -- (76.62455458373826,89.79267897635245);
\draw[color3,line width=0.03919663103336564pt,line cap=round](76.56615160349854,89.7965986394558) -- (76.62455458373826,89.79267897635245);
\draw[color3,line width=0.010612244897958877pt,line cap=round](97.85714285714286,120.0) -- (97.91020408163266,120.02122448979591);
\draw[color3,line width=0.010612244897958877pt,line cap=round](97.89948571428572,120.00955102040815) -- (97.91020408163266,120.02122448979591);
\draw[color3,line width=0.010612244897958877pt,line cap=round](97.8943918367347,120.0222857142857) -- (97.91020408163266,120.02122448979591);
\draw[color3,line width=0.09079365079365125pt,line cap=round](62.14285714285714,119.42857142857143) -- (61.68888888888888,119.24698412698413);
\draw[color3,line width=0.09079365079365125pt,line cap=round](61.78059047619047,119.34685714285715) -- (61.68888888888888,119.24698412698413);
\draw[color3,line width=0.09079365079365125pt,line cap=round](61.82417142857142,119.23790476190476) -- (61.68888888888888,119.24698412698413);
\draw[color3,line width=0.06485260770975057pt,line cap=round](112.14285714285714,90.28571428571429) -- (111.81859410430839,90.15600907029479);
\draw[color3,line width=0.06485260770975057pt,line cap=round](111.88409523809523,90.22734693877551) -- (111.81859410430839,90.15600907029479);
\draw[color3,line width=0.06485260770975057pt,line cap=round](111.91522448979592,90.14952380952381) -- (111.81859410430839,90.15600907029479);
\draw[color3,line width=0.1102596140497016pt,line cap=round](147.85714285714286,90.85714285714285) -- (147.30584478689434,90.63662362904346);
\draw[color3,line width=0.1102596140497016pt,line cap=round](147.41720699708455,90.75790920449812) -- (147.30584478689434,90.63662362904346);
\draw[color3,line width=0.1102596140497016pt,line cap=round](147.4701316118284,90.62559766763847) -- (147.30584478689434,90.63662362904346);
\draw[color3,line width=0.14859549261881602pt,line cap=round](133.57142857142858,134.85714285714286) -- (134.31440603452265,135.1543338423805);
\draw[color3,line width=0.14859549261881602pt,line cap=round](134.16432458697767,134.99087880049981) -- (134.31440603452265,135.1543338423805);
\draw[color3,line width=0.14859549261881602pt,line cap=round](134.09299875052062,135.16919339164238) -- (134.31440603452265,135.1543338423805);
\draw[color3,line width=0.06594474524503735pt,line cap=round](155.0,165.14285714285717) -- (155.32972372622518,165.27474663334723);
\draw[color3,line width=0.06594474524503735pt,line cap=round](155.26311953352769,165.2022074135777) -- (155.32972372622518,165.27474663334723);
\draw[color3,line width=0.06594474524503735pt,line cap=round](155.23146605581007,165.28134110787175) -- (155.32972372622518,165.27474663334723);
\draw[color3,line width=0.07520014808644018pt,line cap=round](169.28571428571428,135.42857142857144) -- (169.6617150261465,135.57897172474432);
\draw[color3,line width=0.07520014808644018pt,line cap=round](169.5857628765792,135.49625156184925) -- (169.6617150261465,135.57897172474432);
\draw[color3,line width=0.07520014808644018pt,line cap=round](169.5496668054977,135.58649173955297) -- (169.6617150261465,135.57897172474432);
\draw[color3,line width=0.04308390022675755pt,line cap=round](119.28571428571428,164.57142857142858) -- (119.50113378684807,164.65759637188208);
\draw[color3,line width=0.04308390022675755pt,line cap=round](119.45761904761905,164.61020408163265) -- (119.50113378684807,164.65759637188208);
\draw[color3,line width=0.04308390022675755pt,line cap=round](119.4369387755102,164.66190476190476) -- (119.50113378684807,164.65759637188208);
\draw[color3,line width=0.033088065158036827pt,line cap=round](83.57142857142858,164.0) -- (83.40598824563838,163.93382386968392);
\draw[color3,line width=0.033088065158036827pt,line cap=round](83.439407191448,163.97022074135776) -- (83.40598824563838,163.93382386968392);
\draw[color3,line width=0.033088065158036827pt,line cap=round](83.45528946272387,163.93051506316812) -- (83.40598824563838,163.93382386968392);
\draw[color3,line width=0.014077467721782092pt,line cap=round](97.85714285714286,134.28571428571428) -- (97.92753019575179,134.31386922115786);
\draw[color3,line width=0.014077467721782092pt,line cap=round](97.91331195335277,134.2983840066639) -- (97.92753019575179,134.31386922115786);
\draw[color3,line width=0.014077467721782092pt,line cap=round](97.90655476884632,134.31527696793003) -- (97.92753019575179,134.31386922115786);
\draw[color3,line width=0.12044055717525162pt,line cap=round](62.14285714285714,133.71428571428572) -- (61.54065435698088,133.4734045999352);
\draw[color3,line width=0.12044055717525162pt,line cap=round](61.662299319727886,133.60588921282798) -- (61.54065435698088,133.4734045999352);
\draw[color3,line width=0.12044055717525162pt,line cap=round](61.72011078717201,133.46136054421768) -- (61.54065435698088,133.4734045999352);
\draw[color3,line width=0.018042482299042137pt,line cap=round](147.85714285714286,105.14285714285714) -- (147.94735526863806,105.17894210745523);
\draw[color3,line width=0.018042482299042137pt,line cap=round](147.92913236151605,105.15909537692627) -- (147.94735526863806,105.17894210745523);
\draw[color3,line width=0.018042482299042137pt,line cap=round](147.9204719700125,105.18074635568513) -- (147.94735526863806,105.17894210745523);
\draw[color3,line width=0.01061224489795918pt,line cap=round](112.14285714285714,104.57142857142858) -- (112.19591836734693,104.5926530612245);
\draw[color3,line width=0.01061224489795918pt,line cap=round](112.1852,104.58097959183674) -- (112.19591836734693,104.5926530612245);
\draw[color3,line width=0.01061224489795918pt,line cap=round](112.18010612244898,104.59371428571428) -- (112.19591836734693,104.5926530612245);
\draw[color3,line width=0.03785274654079303pt,line cap=round](55.0,73.71428571428571) -- (55.189263732703964,73.7899912073673);
\draw[color3,line width=0.03785274654079303pt,line cap=round](55.151032458697756,73.74835318617242) -- (55.189263732703964,73.7899912073673);
\draw[color3,line width=0.03785274654079303pt,line cap=round](55.13286314035818,73.79377648202139) -- (55.189263732703964,73.7899912073673);
\draw[color3,line width=0.006413994169096425pt,line cap=round](76.42857142857143,104.00000000000001) -- (76.39650145772595,103.98717201166183);
\draw[color3,line width=0.006413994169096425pt,line cap=round](76.40297959183674,103.99422740524783) -- (76.39650145772595,103.98717201166183);
\draw[color3,line width=0.006413994169096425pt,line cap=round](76.4060583090379,103.98653061224492) -- (76.39650145772595,103.98717201166183);
\draw[color3,line width=0.22367532046832353pt,line cap=round](126.42857142857144,74.85714285714285) -- (125.31019482622982,74.4097922162062);
\draw[color3,line width=0.22367532046832353pt,line cap=round](125.53610689990283,74.65583506872136) -- (125.31019482622982,74.4097922162062);
\draw[color3,line width=0.22367532046832353pt,line cap=round](125.64347105372762,74.38742468415936) -- (125.31019482622982,74.4097922162062);
\draw[color3,line width=0.016676384839650064pt,line cap=round](90.71428571428572,74.28571428571428) -- (90.63090379008747,74.25236151603498);
\draw[color3,line width=0.016676384839650064pt,line cap=round](90.64774693877553,74.2707055393586) -- (90.63090379008747,74.25236151603498);
\draw[color3,line width=0.016676384839650064pt,line cap=round](90.65575160349854,74.25069387755102) -- (90.63090379008747,74.25236151603498);
\draw[color3,line width=0.12573464760053632pt,line cap=round](162.14285714285714,75.42857142857142) -- (161.51418390485446,75.17710213337035);
\draw[color3,line width=0.12573464760053632pt,line cap=round](161.641175898931,75.31541024573093) -- (161.51418390485446,75.17710213337035);
\draw[color3,line width=0.12573464760053632pt,line cap=round](161.70152852977924,75.1645286686103) -- (161.51418390485446,75.17710213337035);
\draw[color3,line width=0.1303068166041923pt,line cap=round](133.57142857142858,149.14285714285714) -- (134.22296265444953,149.40347077606552);
\draw[color3,line width=0.1303068166041923pt,line cap=round](134.0913527696793,149.2601332778009) -- (134.22296265444953,149.40347077606552);
\draw[color3,line width=0.1303068166041923pt,line cap=round](134.0288054977093,149.41650145772593) -- (134.22296265444953,149.40347077606552);
\draw[color3,line width=0.09823129251700707pt,line cap=round](147.85714285714286,119.42857142857142) -- (148.3482993197279,119.62503401360543);
\draw[color3,line width=0.09823129251700707pt,line cap=round](148.24908571428568,119.51697959183673) -- (148.3482993197279,119.62503401360543);
\draw[color3,line width=0.09823129251700707pt,line cap=round](148.20193469387755,119.63485714285713) -- (148.3482993197279,119.62503401360543);
\draw[color3,line width=0.06594474524502972pt,line cap=round](169.28571428571428,149.71428571428572) -- (169.61543801193943,149.84617520477576);
\draw[color3,line width=0.06594474524502972pt,line cap=round](169.54883381924193,149.77363598500622) -- (169.61543801193943,149.84617520477576);
\draw[color3,line width=0.06594474524502972pt,line cap=round](169.51718034152432,149.85276967930028) -- (169.61543801193943,149.84617520477576);
\draw[color3,line width=0.05777777777777779pt,line cap=round](112.14285714285714,118.85714285714286) -- (112.43174603174603,118.9726984126984);
\draw[color3,line width=0.05777777777777779pt,line cap=round](112.37339047619048,118.90914285714285) -- (112.43174603174603,118.9726984126984);
\draw[color3,line width=0.05777777777777779pt,line cap=round](112.34565714285714,118.97847619047619) -- (112.43174603174603,118.9726984126984);
\draw[color3,line width=0.012344856309870192pt,line cap=round](97.85714285714286,148.57142857142856) -- (97.91886713869222,148.5961182840483);
\draw[color3,line width=0.012344856309870192pt,line cap=round](97.90639883381925,148.58253894210742) -- (97.91886713869222,148.5961182840483);
\draw[color3,line width=0.012344856309870192pt,line cap=round](97.90047330279052,148.59735276967928) -- (97.91886713869222,148.5961182840483);
\draw[color3,line width=0.10561710398445155pt,line cap=round](62.14285714285714,147.99999999999997) -- (61.61477162293488,147.78876579203106);
\draw[color3,line width=0.10561710398445155pt,line cap=round](61.721444897959174,147.90494460641395) -- (61.61477162293488,147.78876579203106);
\draw[color3,line width=0.10561710398445155pt,line cap=round](61.77214110787172,147.77820408163262) -- (61.61477162293488,147.78876579203106);
\draw[color3,line width=0.03492063492063527pt,line cap=round](76.42857142857143,118.28571428571429) -- (76.25396825396825,118.21587301587302);
\draw[color3,line width=0.03492063492063527pt,line cap=round](76.2892380952381,118.25428571428571) -- (76.25396825396825,118.21587301587302);
\draw[color3,line width=0.03492063492063527pt,line cap=round](76.306,118.21238095238095) -- (76.25396825396825,118.21587301587302);
\draw[color3,line width=0.014558748669535625pt,line cap=round](55.0,88.0) -- (55.072793743347674,88.02911749733907);
\draw[color3,line width=0.014558748669535625pt,line cap=round](55.05808940719144,88.01310287380258) -- (55.072793743347674,88.02911749733907);
\draw[color3,line width=0.014558748669535625pt,line cap=round](55.051101207830065,88.03057337220602) -- (55.072793743347674,88.02911749733907);
\draw[color3,line width=0.08602896941089368pt,line cap=round](126.42857142857144,89.14285714285715) -- (125.99842658151697,88.97079920403536);
\draw[color3,line width=0.08602896941089368pt,line cap=round](126.08531584062197,89.06543107038735) -- (125.99842658151697,88.97079920403536);
\draw[color3,line width=0.08602896941089368pt,line cap=round](126.12660974593919,88.96219630709427) -- (125.99842658151697,88.97079920403536);
\draw[color3,line width=0.006413994169096221pt,line cap=round](90.71428571428572,88.57142857142857) -- (90.68221574344024,88.55860058309038);
\draw[color3,line width=0.006413994169096221pt,line cap=round](90.68869387755103,88.56565597667638) -- (90.68221574344024,88.55860058309038);
\draw[color3,line width=0.006413994169096221pt,line cap=round](90.6917725947522,88.55795918367347) -- (90.68221574344024,88.55860058309038);
\draw[color3,line width=0.04835947984636093pt,line cap=round](162.14285714285714,89.71428571428571) -- (161.90105974362535,89.617566754593);
\draw[color3,line width=0.04835947984636093pt,line cap=round](161.94990281827017,89.670762182424) -- (161.90105974362535,89.617566754593);
\draw[color3,line width=0.04835947984636093pt,line cap=round](161.97311536859644,89.61273080660837) -- (161.90105974362535,89.617566754593);
\draw[color2,line width=3pt,line cap=round](130.0,152.0) -- (180.0,172.0);
\draw[color3,line width=0.13030681660419308pt,line cap=round](147.85714285714286,133.71428571428572) -- (148.5086769401638,133.9748993474941);
\draw[color3,line width=0.13030681660419308pt,line cap=round](148.37706705539358,133.8315618492295) -- (148.5086769401638,133.9748993474941);
\draw[color3,line width=0.13030681660419308pt,line cap=round](148.31451978342358,133.98793002915454) -- (148.5086769401638,133.9748993474941);
\draw[color3,line width=0.057152112545698165pt,line cap=round](133.57142857142858,163.42857142857144) -- (133.85718913415707,163.54287565366283);
\draw[color3,line width=0.057152112545698165pt,line cap=round](133.79946550048592,163.48000832986259) -- (133.85718913415707,163.54287565366283);
\draw[color3,line width=0.057152112545698165pt,line cap=round](133.77203248646398,163.5485908649174) -- (133.85718913415707,163.54287565366283);
\draw[color3,line width=0.0766439909297052pt,line cap=round](112.14285714285714,133.14285714285714) -- (112.52607709750566,133.29614512471656);
\draw[color3,line width=0.0766439909297052pt,line cap=round](112.44866666666665,133.2118367346939) -- (112.52607709750566,133.29614512471656);
\draw[color3,line width=0.0766439909297052pt,line cap=round](112.4118775510204,133.30380952380952) -- (112.52607709750566,133.29614512471656);
\draw[color3,line width=0.02892313387939304pt,line cap=round](169.28571428571428,164.00000000000003) -- (169.43032995511126,164.0578462677588);
\draw[color3,line width=0.02892313387939304pt,line cap=round](169.40111758989306,164.02603082049146) -- (169.43032995511126,164.0578462677588);
\draw[color3,line width=0.02892313387939304pt,line cap=round](169.38723448563096,164.06073858114675) -- (169.43032995511126,164.0578462677588);
\draw[color3,line width=0.005414410662223113pt,line cap=round](97.85714285714286,162.85714285714286) -- (97.88421491045398,162.8679716784673);
\draw[color3,line width=0.005414410662223113pt,line cap=round](97.87874635568512,162.86201582673885) -- (97.88421491045398,162.8679716784673);
\draw[color3,line width=0.005414410662223113pt,line cap=round](97.87614743856726,162.86851311953353) -- (97.88421491045398,162.8679716784673);
\draw[color3,line width=0.04632329122125124pt,line cap=round](62.14285714285714,162.28571428571428) -- (61.91124068675089,162.19306770327177);
\draw[color3,line width=0.04632329122125124pt,line cap=round](61.958027210884346,162.24402332361515) -- (61.91124068675089,162.19306770327177);
\draw[color3,line width=0.04632329122125124pt,line cap=round](61.98026239067055,162.18843537414963) -- (61.91124068675089,162.19306770327177);
\draw[color3,line width=0.046323291221250916pt,line cap=round](76.42857142857143,132.57142857142858) -- (76.19695497246518,132.47878198898607);
\draw[color3,line width=0.046323291221250916pt,line cap=round](76.24374149659863,132.52973760932946) -- (76.19695497246518,132.47878198898607);
\draw[color3,line width=0.046323291221250916pt,line cap=round](76.26597667638484,132.47414965986394) -- (76.19695497246518,132.47878198898607);
\draw[color3,line width=0.014077467721782528pt,line cap=round](126.42857142857144,103.42857142857144) -- (126.49895876718034,103.45672636401501);
\draw[color3,line width=0.014077467721782528pt,line cap=round](126.48474052478134,103.44124114952105) -- (126.49895876718034,103.45672636401501);
\draw[color3,line width=0.014077467721782528pt,line cap=round](126.47798334027489,103.45813411078719) -- (126.49895876718034,103.45672636401501);
\draw[color3,line width=0.007913369429402576pt,line cap=round](162.14285714285714,104.0) -- (162.18242399000417,104.0158267388588);
\draw[color3,line width=0.007913369429402576pt,line cap=round](162.17443148688045,104.00712203248646) -- (162.18242399000417,104.0158267388588);
\draw[color3,line width=0.007913369429402576pt,line cap=round](162.17063306955436,104.01661807580176) -- (162.18242399000417,104.0158267388588);
\draw[color3,line width=0.0010495626822156234pt,line cap=round](90.71428571428572,102.85714285714286) -- (90.7195335276968,102.8592419825073);
\draw[color3,line width=0.0010495626822156234pt,line cap=round](90.71847346938776,102.85808746355686) -- (90.7195335276968,102.8592419825073);
\draw[color3,line width=0.0010495626822156234pt,line cap=round](90.7179696793003,102.85934693877552) -- (90.7195335276968,102.8592419825073);
\draw[color3,line width=0.0023823406913788974pt,line cap=round](55.0,102.28571428571429) -- (54.988088296543104,102.28094960433154);
\draw[color3,line width=0.0023823406913788974pt,line cap=round](54.99049446064139,102.28357017909205) -- (54.988088296543104,102.28094960433154);
\draw[color3,line width=0.0023823406913788974pt,line cap=round](54.99163798417326,102.28071137026241) -- (54.988088296543104,102.28094960433154);
\draw[color3,line width=0.014558748669535871pt,line cap=round](69.28571428571429,72.57142857142857) -- (69.35850802906197,72.60054606876764);
\draw[color3,line width=0.014558748669535871pt,line cap=round](69.34380369290574,72.58453144523115) -- (69.35850802906197,72.60054606876764);
\draw[color3,line width=0.014558748669535871pt,line cap=round](69.33681549354435,72.60200194363459) -- (69.35850802906197,72.60054606876764);
\draw[color3,line width=0.19614605025683765pt,line cap=round](140.71428571428572,73.71428571428571) -- (139.73355546300152,73.32199361377204);
\draw[color3,line width=0.19614605025683765pt,line cap=round](139.93166297376092,73.53775426905456) -- (139.73355546300152,73.32199361377204);
\draw[color3,line width=0.19614605025683765pt,line cap=round](140.0258130778842,73.30237900874634) -- (139.73355546300152,73.32199361377204);
\draw[color3,line width=0.09079365079365079pt,line cap=round](105.0,73.14285714285714) -- (104.54603174603174,72.96126984126984);
\draw[color3,line width=0.09079365079365079pt,line cap=round](104.63773333333333,73.06114285714285) -- (104.54603174603174,72.96126984126984);
\draw[color3,line width=0.09079365079365079pt,line cap=round](104.68131428571428,72.95219047619047) -- (104.54603174603174,72.96126984126984);
\draw[color3,line width=0.1142690545606004pt,line cap=round](147.85714285714286,148.0) -- (148.42848812994586,148.2285381091212);
\draw[color3,line width=0.1142690545606004pt,line cap=round](148.31307638483966,148.1028421491045) -- (148.42848812994586,148.2285381091212);
\draw[color3,line width=0.1142690545606004pt,line cap=round](148.25822723865056,148.23996501457725) -- (148.42848812994586,148.2285381091212);
\draw[color3,line width=0.06721088435374155pt,line cap=round](112.14285714285714,147.42857142857142) -- (112.47891156462586,147.5629931972789);
\draw[color3,line width=0.06721088435374155pt,line cap=round](112.41102857142857,147.48906122448977) -- (112.47891156462586,147.5629931972789);
\draw[color3,line width=0.06721088435374155pt,line cap=round](112.37876734693879,147.56971428571427) -- (112.47891156462586,147.5629931972789);
\draw[color3,line width=0.07664399092970514pt,line cap=round](126.42857142857144,117.71428571428572) -- (126.81179138321997,117.86757369614513);
\draw[color3,line width=0.07664399092970514pt,line cap=round](126.73438095238096,117.78326530612244) -- (126.81179138321997,117.86757369614513);
\draw[color3,line width=0.07664399092970514pt,line cap=round](126.6975918367347,117.8752380952381) -- (126.81179138321997,117.86757369614513);
\draw[color3,line width=0.04308390022675415pt,line cap=round](162.14285714285714,118.28571428571428) -- (162.3582766439909,118.37188208616779);
\draw[color3,line width=0.04308390022675415pt,line cap=round](162.3147619047619,118.32448979591837) -- (162.3582766439909,118.37188208616779);
\draw[color3,line width=0.04308390022675415pt,line cap=round](162.29408163265305,118.37619047619046) -- (162.3582766439909,118.37188208616779);
\draw[color3,line width=0.04062196307094331pt,line cap=round](76.42857142857143,146.85714285714283) -- (76.22546161321671,146.77589893100094);
\draw[color3,line width=0.04062196307094331pt,line cap=round](76.26648979591836,146.820583090379) -- (76.22546161321671,146.77589893100094);
\draw[color3,line width=0.04062196307094331pt,line cap=round](76.28598833819241,146.77183673469386) -- (76.22546161321671,146.77589893100094);
\draw[color3,line width=0.0057142857142854645pt,line cap=round](90.71428571428572,117.14285714285714) -- (90.74285714285715,117.1542857142857);
\draw[color3,line width=0.0057142857142854645pt,line cap=round](90.73708571428573,117.148) -- (90.74285714285715,117.1542857142857);
\draw[color3,line width=0.0057142857142854645pt,line cap=round](90.73434285714286,117.15485714285714) -- (90.74285714285715,117.1542857142857);
\draw[color3,line width=0.012970521541950495pt,line cap=round](55.0,116.57142857142857) -- (54.93514739229025,116.54548752834467);
\draw[color3,line width=0.012970521541950495pt,line cap=round](54.94824761904761,116.55975510204081) -- (54.93514739229025,116.54548752834467);
\draw[color3,line width=0.012970521541950495pt,line cap=round](54.95447346938776,116.54419047619047) -- (54.93514739229025,116.54548752834467);
\draw[color3,line width=0.005599518719052193pt,line cap=round](69.28571428571429,86.85714285714286) -- (69.31371187930955,86.86834189458096);
\draw[color3,line width=0.005599518719052193pt,line cap=round](69.3080563654033,86.86218242399) -- (69.31371187930955,86.86834189458096);
\draw[color3,line width=0.005599518719052193pt,line cap=round](69.30536859641816,86.86890184645286) -- (69.31371187930955,86.86834189458096);
\draw[color3,line width=0.07544078856032216pt,line cap=round](140.71428571428572,88.0) -- (140.3370817714841,87.84911842287936);
\draw[color3,line width=0.07544078856032216pt,line cap=round](140.41327696793002,87.93210329029571) -- (140.3370817714841,87.84911842287936);
\draw[color3,line width=0.07544078856032216pt,line cap=round](140.449488546439,87.84157434402331) -- (140.3370817714841,87.84911842287936);
\draw[color3,line width=0.03492063492063492pt,line cap=round](105.0,87.42857142857143) -- (104.82539682539682,87.35873015873017);
\draw[color3,line width=0.03492063492063492pt,line cap=round](104.86066666666667,87.39714285714287) -- (104.82539682539682,87.35873015873017);
\draw[color3,line width=0.03492063492063492pt,line cap=round](104.87742857142857,87.35523809523811) -- (104.82539682539682,87.35873015873017);
\draw[color3,line width=0.10167060021287411pt,line cap=round](126.42857142857144,132.0) -- (126.93692442963581,132.20334120042577);
\draw[color3,line width=0.10167060021287411pt,line cap=round](126.8342371234208,132.0915035401916) -- (126.93692442963581,132.20334120042577);
\draw[color3,line width=0.10167060021287411pt,line cap=round](126.78543523531862,132.21350826044707) -- (126.93692442963581,132.20334120042577);
\draw[color3,line width=0.05011800638622863pt,line cap=round](147.85714285714286,162.2857142857143) -- (148.107732889074,162.38595029848676);
\draw[color3,line width=0.05011800638622863pt,line cap=round](148.0571137026239,162.3308204914619) -- (148.107732889074,162.38595029848676);
\draw[color3,line width=0.05011800638622863pt,line cap=round](148.03305705955853,162.39096209912537) -- (148.107732889074,162.38595029848676);
\draw[color3,line width=0.029478458049886563pt,line cap=round](112.14285714285714,161.71428571428572) -- (112.29024943310657,161.77324263038548);
\draw[color3,line width=0.029478458049886563pt,line cap=round](112.26047619047618,161.74081632653062) -- (112.29024943310657,161.77324263038548);
\draw[color3,line width=0.029478458049886563pt,line cap=round](112.24632653061225,161.77619047619046) -- (112.29024943310657,161.77324263038548);
\draw[color3,line width=0.05715211254569385pt,line cap=round](162.14285714285714,132.57142857142858) -- (162.42861770558562,132.68573279651997);
\draw[color3,line width=0.05715211254569385pt,line cap=round](162.37089407191448,132.62286547271972) -- (162.42861770558562,132.68573279651997);
\draw[color3,line width=0.05715211254569385pt,line cap=round](162.34346105789254,132.69144800777454) -- (162.42861770558562,132.68573279651997);
\draw[color3,line width=0.01781665046971246pt,line cap=round](76.42857142857143,161.14285714285714) -- (76.33948817622287,161.10722384191772);
\draw[color3,line width=0.01781665046971246pt,line cap=round](76.35748299319728,161.1268221574344) -- (76.33948817622287,161.10722384191772);
\draw[color3,line width=0.01781665046971246pt,line cap=round](76.36603498542273,161.10544217687072) -- (76.33948817622287,161.10722384191772);
\draw[color3,line width=0.007580174927113294pt,line cap=round](90.71428571428572,131.42857142857144) -- (90.75218658892129,131.44373177842564);
\draw[color3,line width=0.007580174927113294pt,line cap=round](90.7445306122449,131.43539358600583) -- (90.75218658892129,131.44373177842564);
\draw[color3,line width=0.007580174927113294pt,line cap=round](90.7408921282799,131.44448979591834) -- (90.75218658892129,131.44373177842564);
\draw[color3,line width=0.017205793882179195pt,line cap=round](55.0,130.85714285714286) -- (54.9139710305891,130.8227312693785);
\draw[color3,line width=0.017205793882179195pt,line cap=round](54.931348882410106,130.8416576426489) -- (54.9139710305891,130.8227312693785);
\draw[color3,line width=0.017205793882179195pt,line cap=round](54.93960766347355,130.82101068999026) -- (54.9139710305891,130.8227312693785);
\draw[color3,line width=0.012344856309870924pt,line cap=round](140.71428571428572,102.28571428571429) -- (140.77600999583507,102.31040399833402);
\draw[color3,line width=0.012344856309870924pt,line cap=round](140.7635416909621,102.29682465639317) -- (140.77600999583507,102.31040399833402);
\draw[color3,line width=0.012344856309870924pt,line cap=round](140.75761615993338,102.31163848396503) -- (140.77600999583507,102.31040399833402);
\draw[color3,line width=0.005714285714285713pt,line cap=round](105.0,101.71428571428572) -- (105.02857142857142,101.72571428571429);
\draw[color3,line width=0.005714285714285713pt,line cap=round](105.0228,101.71942857142858) -- (105.02857142857142,101.72571428571429);
\draw[color3,line width=0.005714285714285713pt,line cap=round](105.02005714285714,101.72628571428572) -- (105.02857142857142,101.72571428571429);
\draw[color3,line width=0.0009162848812996078pt,line cap=round](69.28571428571429,101.14285714285715) -- (69.2811328613078,101.14102457309455);
\draw[color3,line width=0.0009162848812996078pt,line cap=round](69.28205830903791,101.14203248646399) -- (69.2811328613078,101.14102457309455);
\draw[color3,line width=0.0009162848812996078pt,line cap=round](69.28249812578092,101.14093294460642) -- (69.2811328613078,101.14102457309455);
\draw[color3,line width=0.08602896941089319pt,line cap=round](155.0,72.57142857142857) -- (154.56985515294554,72.39937063260678);
\draw[color3,line width=0.08602896941089319pt,line cap=round](154.65674441205053,72.49400249895876) -- (154.56985515294554,72.39937063260678);
\draw[color3,line width=0.08602896941089319pt,line cap=round](154.69803831736775,72.39076773566569) -- (154.56985515294554,72.39937063260678);
\draw[color3,line width=0.00238234069137854pt,line cap=round](83.57142857142858,71.42857142857142) -- (83.5595168679717,71.42380674718866);
\draw[color3,line width=0.00238234069137854pt,line cap=round](83.56192303207,71.42642732194918) -- (83.5595168679717,71.42380674718866);
\draw[color3,line width=0.00238234069137854pt,line cap=round](83.56306655560185,71.42356851311953) -- (83.5595168679717,71.42380674718866);
\draw[color3,line width=0.18926373270396613pt,line cap=round](47.857142857142854,70.85714285714286) -- (46.91082419362302,70.47861539173492);
\draw[color3,line width=0.18926373270396613pt,line cap=round](47.101980563654024,70.68680549770929) -- (46.91082419362302,70.47861539173492);
\draw[color3,line width=0.18926373270396613pt,line cap=round](47.192827155351935,70.45968901846453) -- (46.91082419362302,70.47861539173492);
\draw[color3,line width=0.12044055717525107pt,line cap=round](119.28571428571429,72.0) -- (118.68351149983803,71.75911888564949);
\draw[color3,line width=0.12044055717525107pt,line cap=round](118.80515646258505,71.89160349854225) -- (118.68351149983803,71.75911888564949);
\draw[color3,line width=0.12044055717525107pt,line cap=round](118.86296793002916,71.74707482993196) -- (118.68351149983803,71.75911888564949);
\draw[color3,line width=0.08915729557128954pt,line cap=round](126.42857142857144,146.28571428571428) -- (126.87435790642789,146.46402887685684);
\draw[color3,line width=0.08915729557128954pt,line cap=round](126.78430903790088,146.36595585172842) -- (126.87435790642789,146.46402887685684);
\draw[color3,line width=0.08915729557128954pt,line cap=round](126.74151353602666,146.472944606414) -- (126.87435790642789,146.46402887685684);
\draw[color3,line width=0.05011800638622161pt,line cap=round](162.14285714285714,146.85714285714286) -- (162.39344717478826,146.9573788699153);
\draw[color3,line width=0.05011800638622161pt,line cap=round](162.34282798833817,146.90224906289046) -- (162.39344717478826,146.9573788699153);
\draw[color3,line width=0.05011800638622161pt,line cap=round](162.3187713452728,146.96239067055393) -- (162.39344717478826,146.9573788699153);
\draw[color3,line width=0.06721088435374166pt,line cap=round](140.71428571428572,116.57142857142857) -- (141.05034013605442,116.70585034013605);
\draw[color3,line width=0.06721088435374166pt,line cap=round](140.98245714285713,116.63191836734694) -- (141.05034013605442,116.70585034013605);
\draw[color3,line width=0.06721088435374166pt,line cap=round](140.95019591836734,116.71257142857144) -- (141.05034013605442,116.70585034013605);
\draw[color3,line width=0.006647230320699131pt,line cap=round](90.71428571428572,145.7142857142857) -- (90.74752186588921,145.72758017492708);
\draw[color3,line width=0.006647230320699131pt,line cap=round](90.7408081632653,145.72026822157432) -- (90.74752186588921,145.72758017492708);
\draw[color3,line width=0.006647230320699131pt,line cap=round](90.73761749271138,145.72824489795914) -- (90.74752186588921,145.72758017492708);
\draw[color3,line width=0.031111111111111107pt,line cap=round](105.0,116.0) -- (105.15555555555555,116.06222222222222);
\draw[color3,line width=0.031111111111111107pt,line cap=round](105.12413333333333,116.028) -- (105.15555555555555,116.06222222222222);
\draw[color3,line width=0.031111111111111107pt,line cap=round](105.10919999999999,116.06533333333333) -- (105.15555555555555,116.06222222222222);
\draw[color3,line width=0.015088157712064997pt,line cap=round](55.0,145.1428571428571) -- (54.92455921143967,145.112680827433);
\draw[color3,line width=0.015088157712064997pt,line cap=round](54.93979825072886,145.12927780091627) -- (54.92455921143967,145.112680827433);
\draw[color3,line width=0.015088157712064997pt,line cap=round](54.94704056643065,145.11117201166178) -- (54.92455921143967,145.112680827433);
\draw[color3,line width=0.004988662131519525pt,line cap=round](69.28571428571429,115.42857142857143) -- (69.26077097505669,115.4185941043084);
\draw[color3,line width=0.004988662131519525pt,line cap=round](69.26580952380952,115.42408163265307) -- (69.26077097505669,115.4185941043084);
\draw[color3,line width=0.004988662131519525pt,line cap=round](69.26820408163265,115.41809523809525) -- (69.26077097505669,115.4185941043084);
\draw[color3,line width=0.03308806515803652pt,line cap=round](155.0,86.85714285714286) -- (154.83455967420983,86.79096672682678);
\draw[color3,line width=0.03308806515803652pt,line cap=round](154.86797862001944,86.82736359850063) -- (154.83455967420983,86.79096672682678);
\draw[color3,line width=0.03308806515803652pt,line cap=round](154.8838608912953,86.78765792031098) -- (154.83455967420983,86.79096672682678);
\draw[color3,line width=0.0009162848812994693pt,line cap=round](83.57142857142858,85.71428571428571) -- (83.56684714702209,85.71245314452311);
\draw[color3,line width=0.0009162848812994693pt,line cap=round](83.56777259475221,85.71346105789254) -- (83.56684714702209,85.71245314452311);
\draw[color3,line width=0.0009162848812994693pt,line cap=round](83.56821241149522,85.71236151603497) -- (83.56684714702209,85.71245314452311);
\draw[color3,line width=0.07279374334767943pt,line cap=round](47.857142857142854,85.14285714285715) -- (47.493174140404456,84.99726965616179);
\draw[color3,line width=0.07279374334767943pt,line cap=round](47.56669582118562,85.07734277384424) -- (47.493174140404456,84.99726965616179);
\draw[color3,line width=0.07279374334767943pt,line cap=round](47.6016368179925,84.98999028182703) -- (47.493174140404456,84.99726965616179);
\draw[color3,line width=0.046323291221250444pt,line cap=round](119.28571428571429,86.28571428571429) -- (119.05409782960804,86.1930677032718);
\draw[color3,line width=0.046323291221250444pt,line cap=round](119.10088435374149,86.24402332361517) -- (119.05409782960804,86.1930677032718);
\draw[color3,line width=0.046323291221250444pt,line cap=round](119.1231195335277,86.18843537414968) -- (119.05409782960804,86.1930677032718);
\draw[color3,line width=0.08915729557128993pt,line cap=round](140.71428571428572,130.85714285714286) -- (141.16007219214217,131.03545744828543);
\draw[color3,line width=0.08915729557128993pt,line cap=round](141.07002332361515,130.937384423157) -- (141.16007219214217,131.03545744828543);
\draw[color3,line width=0.08915729557128993pt,line cap=round](141.02722782174095,131.04437317784257) -- (141.16007219214217,131.03545744828543);
\draw[color3,line width=0.039104077004951276pt,line cap=round](126.42857142857144,160.57142857142858) -- (126.6240918135962,160.64963672543848);
\draw[color3,line width=0.039104077004951276pt,line cap=round](126.5845966958212,160.60662224073303) -- (126.6240918135962,160.64963672543848);
\draw[color3,line width=0.039104077004951276pt,line cap=round](126.56582673885882,160.653547133139) -- (126.6240918135962,160.64963672543848);
\draw[color3,line width=0.021981581748337566pt,line cap=round](162.14285714285714,161.14285714285717) -- (162.25276505159883,161.18682030635384);
\draw[color3,line width=0.021981581748337566pt,line cap=round](162.230563654033,161.16264056643067) -- (162.25276505159883,161.18682030635384);
\draw[color3,line width=0.021981581748337566pt,line cap=round](162.22001249479382,161.1890184645287) -- (162.25276505159883,161.18682030635384);
\draw[color3,line width=0.041269841269841276pt,line cap=round](105.0,130.28571428571428) -- (105.2063492063492,130.36825396825398);
\draw[color3,line width=0.041269841269841276pt,line cap=round](105.16466666666666,130.32285714285715) -- (105.2063492063492,130.36825396825398);
\draw[color3,line width=0.041269841269841276pt,line cap=round](105.14485714285713,130.37238095238095) -- (105.2063492063492,130.36825396825398);
\draw[color3,line width=0.0029154518950429524pt,line cap=round](90.71428571428572,160.0) -- (90.72886297376094,160.0058309037901);
\draw[color3,line width=0.0029154518950429524pt,line cap=round](90.72591836734695,160.00262390670557) -- (90.72886297376094,160.0058309037901);
\draw[color3,line width=0.0029154518950429524pt,line cap=round](90.72451895043731,160.0061224489796) -- (90.72886297376094,160.0058309037901);
\draw[color3,line width=0.006617613031607901pt,line cap=round](55.0,159.42857142857142) -- (54.96691193484196,159.4153362025082);
\draw[color3,line width=0.006617613031607901pt,line cap=round](54.973595724003886,159.42261557684296) -- (54.96691193484196,159.4153362025082);
\draw[color3,line width=0.006617613031607901pt,line cap=round](54.976772178259054,159.41467444120505) -- (54.96691193484196,159.4153362025082);
\draw[color3,line width=0.0066176130316075695pt,line cap=round](69.28571428571429,129.71428571428572) -- (69.25262622055625,129.7010504882225);
\draw[color3,line width=0.0066176130316075695pt,line cap=round](69.25931000971818,129.70832986255726) -- (69.25262622055625,129.7010504882225);
\draw[color3,line width=0.0066176130316075695pt,line cap=round](69.26248646397335,129.70038872691936) -- (69.25262622055625,129.7010504882225);
\draw[color3,line width=0.011911703456892705pt,line cap=round](47.857142857142854,99.42857142857144) -- (47.91670137442732,99.45239483548522);
\draw[color3,line width=0.011911703456892705pt,line cap=round](47.90467055393585,99.43929196168264) -- (47.91670137442732,99.45239483548522);
\draw[color3,line width=0.011911703456892705pt,line cap=round](47.89895293627655,99.45358600583091) -- (47.91670137442732,99.45239483548522);
\draw[color3,line width=0.00758017492711364pt,line cap=round](119.28571428571429,100.57142857142858) -- (119.32361516034986,100.58658892128281);
\draw[color3,line width=0.00758017492711364pt,line cap=round](119.31595918367347,100.57825072886298) -- (119.32361516034986,100.58658892128281);
\draw[color3,line width=0.00758017492711364pt,line cap=round](119.31232069970847,100.58734693877553) -- (119.32361516034986,100.58658892128281);
\draw[color3,line width=0.005414410662222526pt,line cap=round](155.0,101.14285714285715) -- (155.02707205331112,101.15368596418159);
\draw[color3,line width=0.005414410662222526pt,line cap=round](155.02160349854228,101.14773011245315) -- (155.02707205331112,101.15368596418159);
\draw[color3,line width=0.005414410662222526pt,line cap=round](155.01900458142438,101.15422740524782) -- (155.02707205331112,101.15368596418159);
\draw[color3,line width=0.00014993752603072836pt,line cap=round](83.57142857142858,100.0) -- (83.57217825905873,100.00029987505206);
\draw[color3,line width=0.00014993752603072836pt,line cap=round](83.57202682215744,100.00013494377343) -- (83.57217825905873,100.00029987505206);
\draw[color3,line width=0.00014993752603072836pt,line cap=round](83.57195485214494,100.00031486880467) -- (83.57217825905873,100.00029987505206);
\draw[color3,line width=0.012970521541950107pt,line cap=round](97.85714285714286,70.28571428571428) -- (97.79229024943311,70.25977324263039);
\draw[color3,line width=0.012970521541950107pt,line cap=round](97.80539047619048,70.27404081632653) -- (97.79229024943311,70.25977324263039);
\draw[color3,line width=0.012970521541950107pt,line cap=round](97.81161632653063,70.25847619047619) -- (97.79229024943311,70.25977324263039);
\draw[color3,line width=0.1056171039844511pt,line cap=round](133.57142857142856,70.85714285714286) -- (133.04334305150633,70.64590864917395);
\draw[color3,line width=0.1056171039844511pt,line cap=round](133.15001632653062,70.76208746355684) -- (133.04334305150633,70.64590864917395);
\draw[color3,line width=0.1056171039844511pt,line cap=round](133.20071253644315,70.63534693877551) -- (133.04334305150633,70.64590864917395);
\draw[color3,line width=0.07279374334767921pt,line cap=round](62.142857142857146,69.71428571428572) -- (61.77888842611875,69.56869822759036);
\draw[color3,line width=0.07279374334767921pt,line cap=round](61.85241010689991,69.6487713452728) -- (61.77888842611875,69.56869822759036);
\draw[color3,line width=0.07279374334767921pt,line cap=round](61.88735110370679,69.5614188532556) -- (61.77888842611875,69.56869822759036);
\draw[color3,line width=0.07818408996251601pt,line cap=round](140.71428571428572,145.14285714285714) -- (141.1052061640983,145.29922532278218);
\draw[color3,line width=0.07818408996251601pt,line cap=round](141.02624023323614,145.2132228238234) -- (141.1052061640983,145.29922532278218);
\draw[color3,line width=0.07818408996251601pt,line cap=round](140.98871187005415,145.30704373177844) -- (141.1052061640983,145.29922532278218);
\draw[color3,line width=0.06485260770975027pt,line cap=round](47.857142857142854,113.71428571428572) -- (48.181405895691604,113.84399092970521);
\draw[color3,line width=0.06485260770975027pt,line cap=round](48.11590476190475,113.77265306122449) -- (48.181405895691604,113.84399092970521);
\draw[color3,line width=0.06485260770975027pt,line cap=round](48.084775510204075,113.85047619047619) -- (48.181405895691604,113.84399092970521);
\draw[color3,line width=0.03619047619047619pt,line cap=round](105.0,144.57142857142856) -- (105.18095238095238,144.6438095238095);
\draw[color3,line width=0.03619047619047619pt,line cap=round](105.1444,144.60399999999996) -- (105.18095238095238,144.6438095238095);
\draw[color3,line width=0.03619047619047619pt,line cap=round](105.12702857142857,144.64742857142855) -- (105.18095238095238,144.6438095238095);
\draw[color3,line width=0.041269841269841165pt,line cap=round](119.28571428571429,114.85714285714286) -- (119.4920634920635,114.93968253968254);
\draw[color3,line width=0.041269841269841165pt,line cap=round](119.45038095238095,114.89428571428572) -- (119.4920634920635,114.93968253968254);
\draw[color3,line width=0.041269841269841165pt,line cap=round](119.43057142857143,114.94380952380952) -- (119.4920634920635,114.93968253968254);
\draw[color3,line width=0.029478458049883884pt,line cap=round](155.0,115.42857142857143) -- (155.14739229024943,115.48752834467119);
\draw[color3,line width=0.029478458049883884pt,line cap=round](155.11761904761906,115.45510204081631) -- (155.14739229024943,115.48752834467119);
\draw[color3,line width=0.029478458049883884pt,line cap=round](155.1034693877551,115.49047619047619) -- (155.14739229024943,115.48752834467119);
\draw[color3,line width=0.005803137581563734pt,line cap=round](69.28571428571429,143.99999999999997) -- (69.25669859780646,143.98839372483684);
\draw[color3,line width=0.005803137581563734pt,line cap=round](69.26255976676384,143.99477717617657) -- (69.25669859780646,143.98839372483684);
\draw[color3,line width=0.005803137581563734pt,line cap=round](69.26534527280299,143.98781341107866) -- (69.25669859780646,143.98839372483684);
\draw[color3,line width=0.0008163265306120513pt,line cap=round](83.57142857142858,114.28571428571428) -- (83.57551020408164,114.2873469387755);
\draw[color3,line width=0.0008163265306120513pt,line cap=round](83.57468571428572,114.28644897959182) -- (83.57551020408164,114.2873469387755);
\draw[color3,line width=0.0008163265306120513pt,line cap=round](83.57429387755101,114.28742857142856) -- (83.57551020408164,114.2873469387755);
\draw[color3,line width=0.004988662131519275pt,line cap=round](97.85714285714286,84.57142857142857) -- (97.83219954648526,84.56145124716554);
\draw[color3,line width=0.004988662131519275pt,line cap=round](97.83723809523809,84.56693877551021) -- (97.83219954648526,84.56145124716554);
\draw[color3,line width=0.004988662131519275pt,line cap=round](97.83963265306122,84.56095238095239) -- (97.83219954648526,84.56145124716554);
\draw[color3,line width=0.0406219630709427pt,line cap=round](133.57142857142856,85.14285714285714) -- (133.36831875607385,85.06161321671526);
\draw[color3,line width=0.0406219630709427pt,line cap=round](133.4093469387755,85.1062973760933) -- (133.36831875607385,85.06161321671526);
\draw[color3,line width=0.0406219630709427pt,line cap=round](133.42884548104956,85.05755102040817) -- (133.36831875607385,85.06161321671526);
\draw[color3,line width=0.0279975935952613pt,line cap=round](62.142857142857146,84.00000000000001) -- (62.00286917488084,83.94400481280948);
\draw[color3,line width=0.0279975935952613pt,line cap=round](62.031146744412055,83.97480216576427) -- (62.00286917488084,83.94400481280948);
\draw[color3,line width=0.0279975935952613pt,line cap=round](62.044585589337785,83.94120505344996) -- (62.00286917488084,83.94400481280948);
\draw[color3,line width=0.08602896941089323pt,line cap=round](47.857142857142854,128.0) -- (48.28728770419732,128.1720579388218);
\draw[color3,line width=0.08602896941089323pt,line cap=round](48.20039844509232,128.07742607246982) -- (48.28728770419732,128.1720579388218);
\draw[color3,line width=0.08602896941089323pt,line cap=round](48.159104539775086,128.1806608357629) -- (48.28728770419732,128.1720579388218);
\draw[color3,line width=0.03429126752741936pt,line cap=round](140.71428571428572,159.42857142857144) -- (140.88574205192282,159.4971539636263);
\draw[color3,line width=0.03429126752741936pt,line cap=round](140.85110787172013,159.45943356934615) -- (140.88574205192282,159.4971539636263);
\draw[color3,line width=0.03429126752741936pt,line cap=round](140.83464806330696,159.50058309037902) -- (140.88574205192282,159.4971539636263);
\draw[color3,line width=0.054745707806932095pt,line cap=round](119.28571428571429,129.14285714285717) -- (119.55944282474896,129.25234855847103);
\draw[color3,line width=0.054745707806932095pt,line cap=round](119.50414965986396,129.1921282798834) -- (119.55944282474896,129.25234855847103);
\draw[color3,line width=0.054745707806932095pt,line cap=round](119.47787172011662,129.2578231292517) -- (119.55944282474896,129.25234855847103);
\draw[color3,line width=0.01587301587301591pt,line cap=round](105.0,158.85714285714286) -- (105.07936507936508,158.88888888888889);
\draw[color3,line width=0.01587301587301591pt,line cap=round](105.06333333333333,158.87142857142857) -- (105.07936507936508,158.88888888888889);
\draw[color3,line width=0.01587301587301591pt,line cap=round](105.05571428571429,158.8904761904762) -- (105.07936507936508,158.88888888888889);
\draw[color3,line width=0.03910407700494763pt,line cap=round](155.0,129.71428571428572) -- (155.19552038502474,129.79249386829562);
\draw[color3,line width=0.03910407700494763pt,line cap=round](155.15602526724973,129.7494793835902) -- (155.19552038502474,129.79249386829562);
\draw[color3,line width=0.03910407700494763pt,line cap=round](155.13725531028734,129.7964042759961) -- (155.19552038502474,129.79249386829562);
\draw[color3,line width=0.0025452357813880388pt,line cap=round](69.28571428571429,158.28571428571428) -- (69.27298810680735,158.2806238141515);
\draw[color3,line width=0.0025452357813880388pt,line cap=round](69.27555879494655,158.28342357351104) -- (69.27298810680735,158.2806238141515);
\draw[color3,line width=0.0025452357813880388pt,line cap=round](69.2767805081216,158.28036929057336) -- (69.27298810680735,158.2806238141515);
\draw[color3,line width=0.0010828821324445012pt,line cap=round](83.57142857142858,128.57142857142858) -- (83.5768429820908,128.57359433569346);
\draw[color3,line width=0.0010828821324445012pt,line cap=round](83.57574927113703,128.57240316534777) -- (83.5768429820908,128.57359433569346);
\draw[color3,line width=0.0010828821324445012pt,line cap=round](83.57522948771347,128.5737026239067) -- (83.5768429820908,128.57359433569346);
\draw[color3,line width=0.006647230320699774pt,line cap=round](133.57142857142856,99.42857142857143) -- (133.60466472303207,99.44186588921283);
\draw[color3,line width=0.006647230320699774pt,line cap=round](133.59795102040815,99.43455393586005) -- (133.60466472303207,99.44186588921283);
\draw[color3,line width=0.006647230320699774pt,line cap=round](133.59476034985423,99.44253061224491) -- (133.60466472303207,99.44186588921283);
\draw[color3,line width=0.004581424406497169pt,line cap=round](62.142857142857146,98.2857142857143) -- (62.16576426488963,98.2948771345273);
\draw[color3,line width=0.004581424406497169pt,line cap=round](62.16113702623907,98.28983756768015) -- (62.16576426488963,98.2948771345273);
\draw[color3,line width=0.004581424406497169pt,line cap=round](62.158937942523956,98.29533527696795) -- (62.16576426488963,98.2948771345273);
\draw[color3,line width=0.0008163265306122387pt,line cap=round](97.85714285714286,98.85714285714286) -- (97.86122448979592,98.85877551020408);
\draw[color3,line width=0.0008163265306122387pt,line cap=round](97.8604,98.85787755102041) -- (97.86122448979592,98.85877551020408);
\draw[color3,line width=0.0008163265306122387pt,line cap=round](97.86000816326529,98.85885714285715) -- (97.86122448979592,98.85877551020408);
\draw[color3,line width=0.011911703456892991pt,line cap=round](76.42857142857143,68.57142857142857) -- (76.4881299458559,68.59525197834235);
\draw[color3,line width=0.011911703456892991pt,line cap=round](76.47609912536444,68.58214910453977) -- (76.4881299458559,68.59525197834235);
\draw[color3,line width=0.011911703456892991pt,line cap=round](76.47038150770513,68.59644314868804) -- (76.4881299458559,68.59525197834235);
\draw[color3,line width=0.41638021194872515pt,line cap=round](40.71428571428571,68.0) -- (38.632384654542086,67.16723957610255);
\draw[color3,line width=0.41638021194872515pt,line cap=round](39.05292866861029,67.62525780924615) -- (38.632384654542086,67.16723957610255);
\draw[color3,line width=0.41638021194872515pt,line cap=round](39.25279117034569,67.12560155490767) -- (38.632384654542086,67.16723957610255);
\draw[color3,line width=0.017205793882178737pt,line cap=round](112.14285714285715,69.14285714285714) -- (112.05682817344626,69.10844555509277);
\draw[color3,line width=0.017205793882178737pt,line cap=round](112.07420602526726,69.12737192836316) -- (112.05682817344626,69.10844555509277);
\draw[color3,line width=0.017205793882178737pt,line cap=round](112.08246480633072,69.10672497570455) -- (112.05682817344626,69.10844555509277);
\draw[color3,line width=0.04632329122125002pt,line cap=round](147.85714285714286,69.71428571428571) -- (147.6255264010366,69.62163913184321);
\draw[color3,line width=0.04632329122125002pt,line cap=round](147.67231292517008,69.67259475218658) -- (147.6255264010366,69.62163913184321);
\draw[color3,line width=0.04632329122125002pt,line cap=round](147.69454810495628,69.6170068027211) -- (147.6255264010366,69.62163913184321);
\draw[color2,line width=3pt,line cap=round](30.0,60.0) -- (130.0,52.0);
\draw[color2,line width=3pt,line cap=round](30.0,60.0) -- (30.0,160.0);
\draw[color3,line width=0.07544078856032173pt,line cap=round](47.857142857142854,142.28571428571425) -- (48.23434679994446,142.4365958628349);
\draw[color3,line width=0.07544078856032173pt,line cap=round](48.15815160349854,142.35361099541853) -- (48.23434679994446,142.4365958628349);
\draw[color3,line width=0.07544078856032173pt,line cap=round](48.121940024989584,142.44413994169093) -- (48.23434679994446,142.4365958628349);
\draw[color3,line width=0.048007774538386574pt,line cap=round](119.28571428571429,143.42857142857142) -- (119.52575315840622,143.5245869776482);
\draw[color3,line width=0.048007774538386574pt,line cap=round](119.47726530612245,143.47177842565597) -- (119.52575315840622,143.5245869776482);
\draw[color3,line width=0.048007774538386574pt,line cap=round](119.45422157434403,143.52938775510202) -- (119.52575315840622,143.5245869776482);
\draw[color3,line width=0.03429126752741367pt,line cap=round](155.0,144.0) -- (155.17145633763707,144.06858253505482);
\draw[color3,line width=0.03429126752741367pt,line cap=round](155.13682215743438,144.03086214077467) -- (155.17145633763707,144.06858253505482);
\draw[color3,line width=0.03429126752741367pt,line cap=round](155.1203623490212,144.07201166180755) -- (155.17145633763707,144.06858253505482);
\draw[color3,line width=0.036190476190476356pt,line cap=round](133.57142857142856,113.71428571428571) -- (133.75238095238095,113.78666666666666);
\draw[color3,line width=0.036190476190476356pt,line cap=round](133.71582857142857,113.74685714285714) -- (133.75238095238095,113.78666666666666);
\draw[color3,line width=0.036190476190476356pt,line cap=round](133.69845714285714,113.7902857142857) -- (133.75238095238095,113.78666666666666);
\draw[color3,line width=0.0009496043315280763pt,line cap=round](83.57142857142858,142.85714285714283) -- (83.57617659308622,142.85904206580588);
\draw[color3,line width=0.0009496043315280763pt,line cap=round](83.57521749271137,142.85799750104118) -- (83.57617659308622,142.85904206580588);
\draw[color3,line width=0.0009496043315280763pt,line cap=round](83.57476168263224,142.85913702623904) -- (83.57617659308622,142.85904206580588);
\draw[color3,line width=0.02494331065759616pt,line cap=round](62.142857142857146,112.57142857142858) -- (62.26757369614512,112.62131519274377);
\draw[color3,line width=0.02494331065759616pt,line cap=round](62.24238095238095,112.59387755102041) -- (62.26757369614512,112.62131519274377);
\draw[color3,line width=0.02494331065759616pt,line cap=round](62.2304081632653,112.62380952380953) -- (62.26757369614512,112.62131519274377);
\draw[color3,line width=0.004444444444444428pt,line cap=round](97.85714285714286,113.14285714285714) -- (97.87936507936507,113.15174603174603);
\draw[color3,line width=0.004444444444444428pt,line cap=round](97.87487619047619,113.14685714285713) -- (97.87936507936507,113.15174603174603);
\draw[color3,line width=0.004444444444444428pt,line cap=round](97.87274285714284,113.15219047619047) -- (97.87936507936507,113.15174603174603);
\draw[color3,line width=0.004581424406497284pt,line cap=round](76.42857142857143,82.85714285714286) -- (76.45147855060392,82.86630570595585);
\draw[color3,line width=0.004581424406497284pt,line cap=round](76.44685131195335,82.86126613910871) -- (76.45147855060392,82.86630570595585);
\draw[color3,line width=0.004581424406497284pt,line cap=round](76.44465222823824,82.8667638483965) -- (76.45147855060392,82.86630570595585);
\draw[color3,line width=0.1601462353648944pt,line cap=round](40.71428571428571,82.28571428571429) -- (39.91355453746124,81.9654218149845);
\draw[color3,line width=0.1601462353648944pt,line cap=round](40.07530223517978,82.14158267388588) -- (39.91355453746124,81.9654218149845);
\draw[color3,line width=0.1601462353648944pt,line cap=round](40.15217242815493,81.949407191448) -- (39.91355453746124,81.9654218149845);
\draw[color3,line width=0.006617613031607221pt,line cap=round](112.14285714285715,83.42857142857143) -- (112.10976907769911,83.41533620250821);
\draw[color3,line width=0.006617613031607221pt,line cap=round](112.11645286686104,83.42261557684299) -- (112.10976907769911,83.41533620250821);
\draw[color3,line width=0.006617613031607221pt,line cap=round](112.11962932111621,83.41467444120505) -- (112.10976907769911,83.41533620250821);
\draw[color3,line width=0.017816650469712092pt,line cap=round](147.85714285714286,84.0) -- (147.7680596047943,83.96436669906058);
\draw[color3,line width=0.017816650469712092pt,line cap=round](147.7860544217687,83.98396501457727) -- (147.7680596047943,83.96436669906058);
\draw[color3,line width=0.017816650469712092pt,line cap=round](147.7946064139942,83.9625850340136) -- (147.7680596047943,83.96436669906058);
\draw[color3,line width=0.0330880651580355pt,line cap=round](47.857142857142854,156.57142857142856) -- (48.02258318293303,156.63760470174464);
\draw[color3,line width=0.0330880651580355pt,line cap=round](47.98916423712342,156.6012078300708) -- (48.02258318293303,156.63760470174464);
\draw[color3,line width=0.0330880651580355pt,line cap=round](47.97328196584756,156.64091350826044) -- (48.02258318293303,156.63760470174464);
\draw[color3,line width=0.021056041464204332pt,line cap=round](119.28571428571429,157.71428571428572) -- (119.39099449303532,157.75639779721413);
\draw[color3,line width=0.021056041464204332pt,line cap=round](119.36972789115647,157.7332361516035) -- (119.39099449303532,157.75639779721413);
\draw[color3,line width=0.021056041464204332pt,line cap=round](119.35962099125366,157.75850340136057) -- (119.39099449303532,157.75639779721413);
\draw[color3,line width=0.04800777453838702pt,line cap=round](133.57142857142856,128.0) -- (133.8114674441205,128.09601554907678);
\draw[color3,line width=0.04800777453838702pt,line cap=round](133.76297959183674,128.04320699708455) -- (133.8114674441205,128.09601554907678);
\draw[color3,line width=0.04800777453838702pt,line cap=round](133.7399358600583,128.1008163265306) -- (133.8114674441205,128.09601554907678);
\draw[color3,line width=0.01504002961728209pt,line cap=round](155.0,158.2857142857143) -- (155.07520014808642,158.31579434494887);
\draw[color3,line width=0.01504002961728209pt,line cap=round](155.06000971817298,158.29925031236985) -- (155.07520014808642,158.31579434494887);
\draw[color3,line width=0.01504002961728209pt,line cap=round](155.05279050395666,158.3172983479106) -- (155.07520014808642,158.31579434494887);
\draw[color3,line width=0.03308806515803571pt,line cap=round](62.142857142857146,126.85714285714288) -- (62.308297468647325,126.92331898745894);
\draw[color3,line width=0.03308806515803571pt,line cap=round](62.27487852283771,126.8869221157851) -- (62.308297468647325,126.92331898745894);
\draw[color3,line width=0.03308806515803571pt,line cap=round](62.258996251561854,126.92662779397475) -- (62.308297468647325,126.92331898745894);
\draw[color3,line width=0.0004164931278627786pt,line cap=round](83.57142857142858,157.14285714285714) -- (83.5735110370679,157.14369012911288);
\draw[color3,line width=0.0004164931278627786pt,line cap=round](83.57309037900876,157.14323198667222) -- (83.5735110370679,157.14369012911288);
\draw[color3,line width=0.0004164931278627786pt,line cap=round](83.57289046230738,157.14373177842566) -- (83.5735110370679,157.14369012911288);
\draw[color3,line width=0.06485260770975058pt,line cap=round](90.71428571428571,67.42857142857143) -- (91.03854875283447,67.55827664399092);
\draw[color3,line width=0.06485260770975058pt,line cap=round](90.97304761904763,67.4869387755102) -- (91.03854875283447,67.55827664399092);
\draw[color3,line width=0.06485260770975058pt,line cap=round](90.94191836734694,67.5647619047619) -- (91.03854875283447,67.55827664399092);
\draw[color3,line width=0.0058956916099772985pt,line cap=round](97.85714285714286,127.42857142857143) -- (97.88662131519274,127.44036281179139);
\draw[color3,line width=0.0058956916099772985pt,line cap=round](97.88066666666667,127.4338775510204) -- (97.88662131519274,127.44036281179139);
\draw[color3,line width=0.0058956916099772985pt,line cap=round](97.87783673469387,127.44095238095238) -- (97.88662131519274,127.44036281179139);
\draw[color3,line width=0.026205747605164472pt,line cap=round](40.71428571428571,96.57142857142858) -- (40.845314452311534,96.6238400666389);
\draw[color3,line width=0.026205747605164472pt,line cap=round](40.818846647230316,96.59501374427323) -- (40.845314452311534,96.6238400666389);
\draw[color3,line width=0.026205747605164472pt,line cap=round](40.806267888379836,96.62646064139942) -- (40.845314452311534,96.6238400666389);
\draw[color3,line width=0.002915451895042445pt,line cap=round](147.85714285714286,98.28571428571429) -- (147.87172011661806,98.29154518950438);
\draw[color3,line width=0.002915451895042445pt,line cap=round](147.86877551020407,98.28833819241983) -- (147.87172011661806,98.29154518950438);
\draw[color3,line width=0.002915451895042445pt,line cap=round](147.86737609329444,98.29183673469389) -- (147.87172011661806,98.29154518950438);
\draw[color3,line width=0.001082882132444773pt,line cap=round](112.14285714285715,97.71428571428572) -- (112.14827155351938,97.71645147855062);
\draw[color3,line width=0.001082882132444773pt,line cap=round](112.14717784256561,97.71526030820493) -- (112.14827155351938,97.71645147855062);
\draw[color3,line width=0.001082882132444773pt,line cap=round](112.14665805914203,97.71655976676388) -- (112.14827155351938,97.71645147855062);
\draw[color3,line width=0.0007496876301541696pt,line cap=round](76.42857142857143,97.14285714285715) -- (76.42482299042067,97.14135776759684);
\draw[color3,line width=0.0007496876301541696pt,line cap=round](76.42558017492712,97.14218242399002) -- (76.42482299042067,97.14135776759684);
\draw[color3,line width=0.0007496876301541696pt,line cap=round](76.42594002498959,97.14128279883383) -- (76.42482299042067,97.14135776759684);
\draw[color3,line width=0.015088157712064522pt,line cap=round](126.42857142857143,68.0) -- (126.3531306400111,67.96982368457587);
\draw[color3,line width=0.015088157712064522pt,line cap=round](126.36836967930029,67.98642065805915) -- (126.3531306400111,67.96982368457587);
\draw[color3,line width=0.015088157712064522pt,line cap=round](126.37561199500209,67.96831486880465) -- (126.3531306400111,67.96982368457587);
\draw[color3,line width=0.16014623536489428pt,line cap=round](55.0,66.85714285714286) -- (54.19926882317553,66.53685038641306);
\draw[color3,line width=0.16014623536489428pt,line cap=round](54.36101652089407,66.71301124531445) -- (54.19926882317553,66.53685038641306);
\draw[color3,line width=0.16014623536489428pt,line cap=round](54.43788671386922,66.52083576287657) -- (54.19926882317553,66.53685038641306);
\draw[color3,line width=0.14267573696145114pt,line cap=round](40.71428571428571,110.85714285714286) -- (41.42766439909297,111.14249433106576);
\draw[color3,line width=0.14267573696145114pt,line cap=round](41.2835619047619,110.98555102040817) -- (41.42766439909297,111.14249433106576);
\draw[color3,line width=0.14267573696145114pt,line cap=round](41.21507755102041,111.15676190476191) -- (41.42766439909297,111.14249433106576);
\draw[color3,line width=0.042099125364431854pt,line cap=round](133.57142857142856,142.28571428571428) -- (133.78192419825072,142.36991253644314);
\draw[color3,line width=0.042099125364431854pt,line cap=round](133.73940408163264,142.32360349854227) -- (133.78192419825072,142.36991253644314);
\draw[color3,line width=0.042099125364431854pt,line cap=round](133.7191965014577,142.3741224489796) -- (133.78192419825072,142.36991253644314);
\draw[color3,line width=0.029015687907815776pt,line cap=round](62.142857142857146,141.1428571428571) -- (62.28793558239622,141.20088851867274);
\draw[color3,line width=0.029015687907815776pt,line cap=round](62.25862973760933,141.16897126197415) -- (62.28793558239622,141.20088851867274);
\draw[color3,line width=0.029015687907815776pt,line cap=round](62.244702207413575,141.20379008746352) -- (62.28793558239622,141.20088851867274);
\draw[color3,line width=0.005170068027210845pt,line cap=round](97.85714285714286,141.7142857142857) -- (97.88299319727892,141.72462585034012);
\draw[color3,line width=0.005170068027210845pt,line cap=round](97.87777142857144,141.7189387755102) -- (97.88299319727892,141.72462585034012);
\draw[color3,line width=0.005170068027210845pt,line cap=round](97.87528979591838,141.72514285714283) -- (97.88299319727892,141.72462585034012);
\draw[color3,line width=0.01587301587301359pt,line cap=round](147.85714285714286,112.57142857142857) -- (147.93650793650792,112.6031746031746);
\draw[color3,line width=0.01587301587301359pt,line cap=round](147.9204761904762,112.58571428571427) -- (147.93650793650792,112.6031746031746);
\draw[color3,line width=0.01587301587301359pt,line cap=round](147.91285714285712,112.6047619047619) -- (147.93650793650792,112.6031746031746);
\draw[color3,line width=0.0058956916099772464pt,line cap=round](112.14285714285715,112.0) -- (112.17233560090703,112.01179138321996);
\draw[color3,line width=0.0058956916099772464pt,line cap=round](112.16638095238096,112.00530612244899) -- (112.17233560090703,112.01179138321996);
\draw[color3,line width=0.0058956916099772464pt,line cap=round](112.16355102040816,112.01238095238097) -- (112.17233560090703,112.01179138321996);
\draw[color3,line width=0.004081632653061362pt,line cap=round](76.42857142857143,111.42857142857143) -- (76.40816326530613,111.42040816326531);
\draw[color3,line width=0.004081632653061362pt,line cap=round](76.41228571428572,111.42489795918367) -- (76.40816326530613,111.42040816326531);
\draw[color3,line width=0.004081632653061362pt,line cap=round](76.4142448979592,111.42) -- (76.40816326530613,111.42040816326531);
\draw[color3,line width=0.02494331065759637pt,line cap=round](90.71428571428571,81.71428571428572) -- (90.83900226757369,81.7641723356009);
\draw[color3,line width=0.02494331065759637pt,line cap=round](90.81380952380951,81.73673469387755) -- (90.83900226757369,81.7641723356009);
\draw[color3,line width=0.02494331065759637pt,line cap=round](90.80183673469386,81.76666666666667) -- (90.83900226757369,81.7641723356009);
\draw[color3,line width=0.005803137581563263pt,line cap=round](126.42857142857143,82.28571428571428) -- (126.39955574066362,82.27410801055116);
\draw[color3,line width=0.005803137581563263pt,line cap=round](126.405416909621,82.28049146189088) -- (126.39955574066362,82.27410801055116);
\draw[color3,line width=0.005803137581563263pt,line cap=round](126.40820241566014,82.273527696793) -- (126.39955574066362,82.27410801055116);
\draw[color3,line width=0.06159470590957476pt,line cap=round](55.0,81.14285714285715) -- (54.69202647045213,81.019667731038);
\draw[color3,line width=0.06159470590957476pt,line cap=round](54.75423712342079,81.08742190753854) -- (54.69202647045213,81.019667731038);
\draw[color3,line width=0.06159470590957476pt,line cap=round](54.783802582257394,81.01350826044704) -- (54.69202647045213,81.019667731038);
\draw[color3,line width=0.18926373270396585pt,line cap=round](40.71428571428571,125.14285714285715) -- (41.66060437780554,125.52138460826508);
\draw[color3,line width=0.18926373270396585pt,line cap=round](41.46944800777453,125.31319450229073) -- (41.66060437780554,125.52138460826508);
\draw[color3,line width=0.18926373270396585pt,line cap=round](41.378601416076634,125.54031098153548) -- (41.66060437780554,125.52138460826508);
\draw[color3,line width=0.018464528668610702pt,line cap=round](133.57142857142856,156.57142857142858) -- (133.66375121477162,156.60835762876582);
\draw[color3,line width=0.018464528668610702pt,line cap=round](133.6451020408163,156.58804664723033) -- (133.66375121477162,156.60835762876582);
\draw[color3,line width=0.018464528668610702pt,line cap=round](133.63623906705539,156.61020408163267) -- (133.66375121477162,156.60835762876582);
\draw[color3,line width=0.012726178906936381pt,line cap=round](62.142857142857146,155.42857142857142) -- (62.20648803739183,155.4540237863853);
\draw[color3,line width=0.012726178906936381pt,line cap=round](62.19363459669583,155.4400249895877) -- (62.20648803739183,155.4540237863853);
\draw[color3,line width=0.012726178906936381pt,line cap=round](62.18752603082049,155.455296404276) -- (62.20648803739183,155.4540237863853);
\draw[color3,line width=0.0022675736961450836pt,line cap=round](97.85714285714286,156.0) -- (97.86848072562358,156.0045351473923);
\draw[color3,line width=0.0022675736961450836pt,line cap=round](97.86619047619048,156.00204081632654) -- (97.86848072562358,156.0045351473923);
\draw[color3,line width=0.0022675736961450836pt,line cap=round](97.86510204081632,156.0047619047619) -- (97.86848072562358,156.0045351473923);
\draw[color3,line width=0.08602896941089365pt,line cap=round](105.0,66.28571428571428) -- (105.43014484705448,66.45777222453607);
\draw[color3,line width=0.08602896941089365pt,line cap=round](105.34325558794947,66.36314035818408) -- (105.43014484705448,66.45777222453607);
\draw[color3,line width=0.08602896941089365pt,line cap=round](105.30196168263225,66.46637512147716) -- (105.43014484705448,66.45777222453607);
\draw[color3,line width=0.021056041464201335pt,line cap=round](147.85714285714286,126.85714285714286) -- (147.96242306446388,126.89925494007126);
\draw[color3,line width=0.021056041464201335pt,line cap=round](147.94115646258504,126.87609329446065) -- (147.96242306446388,126.89925494007126);
\draw[color3,line width=0.021056041464201335pt,line cap=round](147.9310495626822,126.90136054421768) -- (147.96242306446388,126.89925494007126);
\draw[color3,line width=0.0078208154009902pt,line cap=round](112.14285714285715,126.28571428571429) -- (112.1819612198621,126.30135591651627);
\draw[color3,line width=0.0078208154009902pt,line cap=round](112.1740621963071,126.29275301957517) -- (112.1819612198621,126.30135591651627);
\draw[color3,line width=0.0078208154009902pt,line cap=round](112.17030820491463,126.30213799805637) -- (112.1819612198621,126.30135591651627);
\draw[color3,line width=0.005414410662224294pt,line cap=round](76.42857142857143,125.71428571428572) -- (76.40149937526031,125.70345689296127);
\draw[color3,line width=0.005414410662224294pt,line cap=round](76.40696793002915,125.70941274468973) -- (76.40149937526031,125.70345689296127);
\draw[color3,line width=0.005414410662224294pt,line cap=round](76.40956684714702,125.70291545189505) -- (76.40149937526031,125.70345689296127);
\draw[color3,line width=0.010079133694293987pt,line cap=round](55.0,95.42857142857144) -- (55.050395668471474,95.44872969596003);
\draw[color3,line width=0.010079133694293987pt,line cap=round](55.040215743440235,95.4376426488963) -- (55.050395668471474,95.44872969596003);
\draw[color3,line width=0.010079133694293987pt,line cap=round](55.03537775926697,95.44973760932946) -- (55.050395668471474,95.44872969596003);
\draw[color3,line width=0.0009496043315285797pt,line cap=round](126.42857142857143,96.57142857142857) -- (126.43331945022908,96.57332778009163);
\draw[color3,line width=0.0009496043315285797pt,line cap=round](126.43236034985424,96.57228321532695) -- (126.43331945022908,96.57332778009163);
\draw[color3,line width=0.0009496043315285797pt,line cap=round](126.4319045397751,96.57342274052478) -- (126.43331945022908,96.57332778009163);
\draw[color3,line width=0.004081632653061224pt,line cap=round](90.71428571428571,96.00000000000001) -- (90.6938775510204,95.99183673469389);
\draw[color3,line width=0.004081632653061224pt,line cap=round](90.698,95.99632653061225) -- (90.6938775510204,95.99183673469389);
\draw[color3,line width=0.004081632653061224pt,line cap=round](90.69995918367347,95.99142857142859) -- (90.6938775510204,95.99183673469389);
\draw[color3,line width=0.02620574760516452pt,line cap=round](69.28571428571429,65.71428571428571) -- (69.41674302374011,65.76669720949603);
\draw[color3,line width=0.02620574760516452pt,line cap=round](69.3902752186589,65.73787088713036) -- (69.41674302374011,65.76669720949603);
\draw[color3,line width=0.02620574760516452pt,line cap=round](69.37769645980842,65.76931778425654) -- (69.41674302374011,65.76669720949603);
\draw[color3,line width=0.006617613031606867pt,line cap=round](140.71428571428572,66.85714285714285) -- (140.68119764912768,66.84390763107963);
\draw[color3,line width=0.006617613031606867pt,line cap=round](140.6878814382896,66.8511870054144) -- (140.68119764912768,66.84390763107963);
\draw[color3,line width=0.006617613031606867pt,line cap=round](140.6910578925448,66.84324586977647) -- (140.68119764912768,66.84390763107963);
\draw[color3,line width=0.16596973483270844pt,line cap=round](40.71428571428571,139.4285714285714) -- (41.54413438844925,139.76051089823682);
\draw[color3,line width=0.16596973483270844pt,line cap=round](41.376504956268214,139.57794418992083) -- (41.54413438844925,139.76051089823682);
\draw[color3,line width=0.16596973483270844pt,line cap=round](41.29683948354852,139.77710787172006) -- (41.54413438844925,139.76051089823682);
\draw[color3,line width=0.05487528344671187pt,line cap=round](55.0,109.71428571428572) -- (55.27437641723356,109.82403628117915);
\draw[color3,line width=0.05487528344671187pt,line cap=round](55.21895238095238,109.76367346938777) -- (55.27437641723356,109.82403628117915);
\draw[color3,line width=0.05487528344671187pt,line cap=round](55.192612244897965,109.82952380952382) -- (55.27437641723356,109.82403628117915);
\draw[color3,line width=0.0184645286686057pt,line cap=round](147.85714285714286,141.14285714285714) -- (147.9494655004859,141.17978620019434);
\draw[color3,line width=0.0184645286686057pt,line cap=round](147.93081632653062,141.15947521865886) -- (147.9494655004859,141.17978620019434);
\draw[color3,line width=0.0184645286686057pt,line cap=round](147.9219533527697,141.1816326530612) -- (147.9494655004859,141.17978620019434);
\draw[color3,line width=0.006858253505483628pt,line cap=round](112.14285714285715,140.57142857142856) -- (112.17714841038458,140.58514507843952);
\draw[color3,line width=0.006858253505483628pt,line cap=round](112.17022157434404,140.5776009995835) -- (112.17714841038458,140.58514507843952);
\draw[color3,line width=0.006858253505483628pt,line cap=round](112.1669296126614,140.58583090379008) -- (112.17714841038458,140.58514507843952);
\draw[color3,line width=0.0047480216576429694pt,line cap=round](76.42857142857143,139.99999999999997) -- (76.40483132028322,139.9905039566847);
\draw[color3,line width=0.0047480216576429694pt,line cap=round](76.40962682215745,139.9957267805081) -- (76.40483132028322,139.9905039566847);
\draw[color3,line width=0.0047480216576429694pt,line cap=round](76.4119058725531,139.99002915451894) -- (76.40483132028322,139.9905039566847);
\draw[color3,line width=0.005170068027211003pt,line cap=round](126.42857142857143,110.85714285714285) -- (126.45442176870748,110.86748299319727);
\draw[color3,line width=0.005170068027211003pt,line cap=round](126.44919999999999,110.86179591836733) -- (126.45442176870748,110.86748299319727);
\draw[color3,line width=0.005170068027211003pt,line cap=round](126.44671836734693,110.868) -- (126.45442176870748,110.86748299319727);
\draw[color3,line width=0.033088065158035994pt,line cap=round](105.0,80.57142857142858) -- (105.16544032579019,80.63760470174465);
\draw[color3,line width=0.033088065158035994pt,line cap=round](105.13202137998056,80.6012078300708) -- (105.16544032579019,80.63760470174465);
\draw[color3,line width=0.033088065158035994pt,line cap=round](105.11613910870471,80.64091350826045) -- (105.16544032579019,80.63760470174465);
\draw[color3,line width=0.022222222222222223pt,line cap=round](90.71428571428571,110.28571428571429) -- (90.60317460317461,110.24126984126984);
\draw[color3,line width=0.022222222222222223pt,line cap=round](90.62561904761904,110.26571428571428) -- (90.60317460317461,110.24126984126984);
\draw[color3,line width=0.022222222222222223pt,line cap=round](90.63628571428572,110.23904761904761) -- (90.60317460317461,110.24126984126984);
\draw[color3,line width=0.01007913369429403pt,line cap=round](69.28571428571429,80.0) -- (69.33610995418576,80.02015826738858);
\draw[color3,line width=0.01007913369429403pt,line cap=round](69.32593002915452,80.00907122032486) -- (69.33610995418576,80.02015826738858);
\draw[color3,line width=0.01007913369429403pt,line cap=round](69.32109204498126,80.02116618075802) -- (69.33610995418576,80.02015826738858);
\draw[color3,line width=0.0025452357813876693pt,line cap=round](140.71428571428572,81.14285714285714) -- (140.70155953537878,81.13776667129437);
\draw[color3,line width=0.0025452357813876693pt,line cap=round](140.70413022351798,81.14056643065389) -- (140.70155953537878,81.13776667129437);
\draw[color3,line width=0.0025452357813876693pt,line cap=round](140.70535193669306,81.13751214771624) -- (140.70155953537878,81.13776667129437);
\draw[color3,line width=0.07279374334767942pt,line cap=round](40.71428571428571,153.7142857142857) -- (41.07825443102411,153.85987320098107);
\draw[color3,line width=0.07279374334767942pt,line cap=round](41.00473275024296,153.77980008329862) -- (41.07825443102411,153.85987320098107);
\draw[color3,line width=0.07279374334767942pt,line cap=round](40.96979175343606,153.86715257531583) -- (41.07825443102411,153.85987320098107);
\draw[color3,line width=0.14267573696145125pt,line cap=round](83.57142857142857,64.57142857142857) -- (84.28480725623582,64.85678004535147);
\draw[color3,line width=0.14267573696145125pt,line cap=round](84.14070476190476,64.69983673469387) -- (84.28480725623582,64.85678004535147);
\draw[color3,line width=0.14267573696145125pt,line cap=round](84.07222040816326,64.87104761904762) -- (84.28480725623582,64.85678004535147);
\draw[color3,line width=0.07279374334767898pt,line cap=round](55.0,124.00000000000001) -- (55.3639687167384,124.14558748669538);
\draw[color3,line width=0.07279374334767898pt,line cap=round](55.29044703595724,124.06551436901293) -- (55.3639687167384,124.14558748669538);
\draw[color3,line width=0.07279374334767898pt,line cap=round](55.25550603915036,124.15286686103013) -- (55.3639687167384,124.14558748669538);
\draw[color3,line width=0.008098477486226672pt,line cap=round](147.85714285714286,155.42857142857144) -- (147.897635244574,155.4447683835439);
\draw[color3,line width=0.008098477486226672pt,line cap=round](147.88945578231292,155.43586005830906) -- (147.897635244574,155.4447683835439);
\draw[color3,line width=0.008098477486226672pt,line cap=round](147.88556851311952,155.44557823129253) -- (147.897635244574,155.4447683835439);
\draw[color3,line width=0.003008005923457536pt,line cap=round](112.14285714285715,154.85714285714286) -- (112.15789717247443,154.86315886898979);
\draw[color3,line width=0.003008005923457536pt,line cap=round](112.15485908649174,154.85985006247398) -- (112.15789717247443,154.86315886898979);
\draw[color3,line width=0.003008005923457536pt,line cap=round](112.15341524364848,154.86345966958214) -- (112.15789717247443,154.86315886898979);
\draw[color3,line width=0.0020824656393173954pt,line cap=round](76.42857142857143,154.28571428571428) -- (76.41815910037485,154.28154935443564);
\draw[color3,line width=0.0020824656393173954pt,line cap=round](76.42026239067056,154.2838400666389) -- (76.41815910037485,154.28154935443564);
\draw[color3,line width=0.0020824656393173954pt,line cap=round](76.42126197417744,154.2813411078717) -- (76.41815910037485,154.28154935443564);
\draw[color3,line width=0.07544078856032202pt,line cap=round](119.28571428571428,65.14285714285714) -- (119.66291822851589,65.29373871997778);
\draw[color3,line width=0.07544078856032202pt,line cap=round](119.58672303206997,65.21075385256142) -- (119.66291822851589,65.29373871997778);
\draw[color3,line width=0.07544078856032202pt,line cap=round](119.55051145356101,65.30128279883382) -- (119.66291822851589,65.29373871997778);
\draw[color3,line width=0.006858253505484011pt,line cap=round](126.42857142857143,125.14285714285714) -- (126.46286269609885,125.15657364986811);
\draw[color3,line width=0.006858253505484011pt,line cap=round](126.45593586005832,125.14902957101208) -- (126.46286269609885,125.15657364986811);
\draw[color3,line width=0.006858253505484011pt,line cap=round](126.45264389837568,125.15725947521867) -- (126.46286269609885,125.15657364986811);
\draw[color3,line width=0.029478458049886618pt,line cap=round](90.71428571428571,124.57142857142858) -- (90.56689342403628,124.51247165532881);
\draw[color3,line width=0.029478458049886618pt,line cap=round](90.59666666666668,124.54489795918369) -- (90.56689342403628,124.51247165532881);
\draw[color3,line width=0.029478458049886618pt,line cap=round](90.61081632653061,124.50952380952381) -- (90.56689342403628,124.51247165532881);
\draw[color3,line width=0.0004164931278623883pt,line cap=round](140.71428571428572,95.42857142857143) -- (140.71636817992504,95.42940441482716);
\draw[color3,line width=0.0004164931278623883pt,line cap=round](140.7159475218659,95.42894627238651) -- (140.71636817992504,95.42940441482716);
\draw[color3,line width=0.0004164931278623883pt,line cap=round](140.71574760516452,95.42944606413995) -- (140.71636817992504,95.42940441482716);
\draw[color3,line width=0.0016493127863390661pt,line cap=round](69.28571428571429,94.28571428571429) -- (69.2774677217826,94.28241566014161);
\draw[color3,line width=0.0016493127863390661pt,line cap=round](69.2791335276968,94.28422990420657) -- (69.2774677217826,94.28241566014161);
\draw[color3,line width=0.0016493127863390661pt,line cap=round](69.27992519783423,94.28225072886298) -- (69.2774677217826,94.28241566014161);
\draw[color3,line width=0.005414410662224094pt,line cap=round](105.0,94.85714285714288) -- (104.97292794668888,94.84631403581842);
\draw[color3,line width=0.005414410662224094pt,line cap=round](104.97839650145774,94.85226988754687) -- (104.97292794668888,94.84631403581842);
\draw[color3,line width=0.005414410662224094pt,line cap=round](104.9809954185756,94.84577259475219) -- (104.97292794668888,94.84631403581842);
\draw[color3,line width=0.06383451339719529pt,line cap=round](55.0,138.28571428571425) -- (55.319172566985976,138.41338331250864);
\draw[color3,line width=0.06383451339719529pt,line cap=round](55.25469970845481,138.34316534777173) -- (55.319172566985976,138.41338331250864);
\draw[color3,line width=0.06383451339719529pt,line cap=round](55.22405914202416,138.41976676384837) -- (55.319172566985976,138.41338331250864);
\draw[color3,line width=0.006014160766347602pt,line cap=round](126.42857142857143,139.42857142857142) -- (126.45864223240316,139.44059975010413);
\draw[color3,line width=0.006014160766347602pt,line cap=round](126.45256793002916,139.43398417326114) -- (126.45864223240316,139.44059975010413);
\draw[color3,line width=0.006014160766347602pt,line cap=round](126.4496811328613,139.44120116618075) -- (126.45864223240316,139.44059975010413);
\draw[color3,line width=0.025850340136054407pt,line cap=round](90.71428571428571,138.85714285714283) -- (90.58503401360544,138.80544217687074);
\draw[color3,line width=0.025850340136054407pt,line cap=round](90.61114285714287,138.8338775510204) -- (90.58503401360544,138.80544217687074);
\draw[color3,line width=0.025850340136054407pt,line cap=round](90.62355102040816,138.80285714285714) -- (90.58503401360544,138.80544217687074);
\draw[color3,line width=0.05487528344671201pt,line cap=round](83.57142857142857,78.85714285714286) -- (83.84580498866214,78.96689342403629);
\draw[color3,line width=0.05487528344671201pt,line cap=round](83.79038095238096,78.90653061224491) -- (83.84580498866214,78.96689342403629);
\draw[color3,line width=0.05487528344671201pt,line cap=round](83.76404081632654,78.97238095238096) -- (83.84580498866214,78.96689342403629);
\draw[color3,line width=0.002267573696143308pt,line cap=round](140.71428571428572,109.71428571428571) -- (140.72562358276645,109.718820861678);
\draw[color3,line width=0.002267573696143308pt,line cap=round](140.72333333333333,109.71632653061224) -- (140.72562358276645,109.718820861678);
\draw[color3,line width=0.002267573696143308pt,line cap=round](140.7222448979592,109.71904761904761) -- (140.72562358276645,109.718820861678);
\draw[color3,line width=0.029015687907816175pt,line cap=round](119.28571428571428,79.42857142857143) -- (119.43079272525337,79.48660280438706);
\draw[color3,line width=0.029015687907816175pt,line cap=round](119.40148688046648,79.45468554768846) -- (119.43079272525337,79.48660280438706);
\draw[color3,line width=0.029015687907816175pt,line cap=round](119.38755935027072,79.48950437317785) -- (119.43079272525337,79.48660280438706);
\draw[color3,line width=0.008979591836734776pt,line cap=round](69.28571428571429,108.57142857142857) -- (69.24081632653062,108.5534693877551);
\draw[color3,line width=0.008979591836734776pt,line cap=round](69.24988571428572,108.5633469387755) -- (69.24081632653062,108.5534693877551);
\draw[color3,line width=0.008979591836734776pt,line cap=round](69.25419591836736,108.55257142857143) -- (69.24081632653062,108.5534693877551);
\draw[color3,line width=0.0294784580498867pt,line cap=round](105.0,109.14285714285715) -- (104.85260770975057,109.08390022675738);
\draw[color3,line width=0.0294784580498867pt,line cap=round](104.88238095238096,109.11632653061226) -- (104.85260770975057,109.08390022675738);
\draw[color3,line width=0.0294784580498867pt,line cap=round](104.89653061224489,109.08095238095238) -- (104.85260770975057,109.08390022675738);
\draw[color2,line width=3pt,line cap=round](30.0,160.0) -- (130.0,152.0);
\draw[color3,line width=0.18926373270396596pt,line cap=round](97.85714285714286,63.42857142857142) -- (98.8034615206627,63.80709889397935);
\draw[color3,line width=0.18926373270396596pt,line cap=round](98.61230515063168,63.59890878800499) -- (98.8034615206627,63.80709889397935);
\draw[color3,line width=0.18926373270396596pt,line cap=round](98.52145855893379,63.82602526724975) -- (98.8034615206627,63.80709889397935);
\draw[color3,line width=0.02799759359526086pt,line cap=round](55.0,152.57142857142856) -- (55.1399879679763,152.6274237586191);
\draw[color3,line width=0.02799759359526086pt,line cap=round](55.11171039844509,152.5966264056643) -- (55.1399879679763,152.6274237586191);
\draw[color3,line width=0.02799759359526086pt,line cap=round](55.09827155351936,152.63022351797864) -- (55.1399879679763,152.6274237586191);
\draw[color3,line width=0.0026377898098017796pt,line cap=round](126.42857142857143,153.71428571428572) -- (126.44176037762044,153.71956129390534);
\draw[color3,line width=0.0026377898098017796pt,line cap=round](126.43909620991253,153.71665972511457) -- (126.44176037762044,153.71956129390534);
\draw[color3,line width=0.0026377898098017796pt,line cap=round](126.43783007080383,153.71982507288632) -- (126.44176037762044,153.71956129390534);
\draw[color3,line width=0.011337868480725618pt,line cap=round](90.71428571428571,153.14285714285714) -- (90.65759637188208,153.1201814058957);
\draw[color3,line width=0.011337868480725618pt,line cap=round](90.6690476190476,153.1326530612245) -- (90.65759637188208,153.1201814058957);
\draw[color3,line width=0.011337868480725618pt,line cap=round](90.67448979591836,153.11904761904762) -- (90.65759637188208,153.1201814058957);
\draw[color3,line width=0.003008005923455087pt,line cap=round](140.71428571428572,124.0) -- (140.729325743903,124.00601601184691);
\draw[color3,line width=0.003008005923455087pt,line cap=round](140.7262876579203,124.00270720533112) -- (140.729325743903,124.00601601184691);
\draw[color3,line width=0.003008005923455087pt,line cap=round](140.72484381507707,124.00631681243925) -- (140.729325743903,124.00601601184691);
\draw[color3,line width=0.011911703456893092pt,line cap=round](69.28571428571429,122.85714285714286) -- (69.22615576842983,122.83331945022907);
\draw[color3,line width=0.011911703456893092pt,line cap=round](69.2381865889213,122.84642232403165) -- (69.22615576842983,122.83331945022907);
\draw[color3,line width=0.011911703456893092pt,line cap=round](69.24390420658061,122.83212827988338) -- (69.22615576842983,122.83331945022907);
\draw[color3,line width=0.03910407700495177pt,line cap=round](105.0,123.42857142857144) -- (104.80447961497525,123.35036327456153);
\draw[color3,line width=0.03910407700495177pt,line cap=round](104.84397473275024,123.39337775926698) -- (104.80447961497525,123.35036327456153);
\draw[color3,line width=0.03910407700495177pt,line cap=round](104.86274468971263,123.34645286686104) -- (104.80447961497525,123.35036327456153);
\draw[color3,line width=0.033088065158036285pt,line cap=round](133.57142857142858,63.99999999999999) -- (133.73686889721876,64.06617613031607);
\draw[color3,line width=0.033088065158036285pt,line cap=round](133.70344995140914,64.02977925864222) -- (133.73686889721876,64.06617613031607);
\draw[color3,line width=0.033088065158036285pt,line cap=round](133.68756768013327,64.06948493683187) -- (133.73686889721876,64.06617613031607);
\draw[color3,line width=0.008979591836734665pt,line cap=round](83.57142857142857,93.14285714285715) -- (83.5265306122449,93.12489795918368);
\draw[color3,line width=0.008979591836734665pt,line cap=round](83.5356,93.13477551020408) -- (83.5265306122449,93.12489795918368);
\draw[color3,line width=0.008979591836734665pt,line cap=round](83.53991020408164,93.12400000000001) -- (83.5265306122449,93.12489795918368);
\draw[color3,line width=0.004748021657642603pt,line cap=round](119.28571428571428,93.71428571428572) -- (119.26197417742607,93.70478967097043);
\draw[color3,line width=0.004748021657642603pt,line cap=round](119.2667696793003,93.71001249479383) -- (119.26197417742607,93.70478967097043);
\draw[color3,line width=0.004748021657642603pt,line cap=round](119.26904872969595,93.70431486880466) -- (119.26197417742607,93.70478967097043);
\draw[color3,line width=0.07279374334767925pt,line cap=round](97.85714285714286,77.71428571428572) -- (98.22111157388126,77.85987320098108);
\draw[color3,line width=0.07279374334767925pt,line cap=round](98.1475898931001,77.77980008329864) -- (98.22111157388126,77.85987320098108);
\draw[color3,line width=0.07279374334767925pt,line cap=round](98.11264889629322,77.86715257531584) -- (98.22111157388126,77.85987320098108);
\draw[color3,line width=0.0026377898097977312pt,line cap=round](140.71428571428572,138.28571428571428) -- (140.7274746633347,138.29098986533387);
\draw[color3,line width=0.0026377898097977312pt,line cap=round](140.7248104956268,138.2880882965431) -- (140.7274746633347,138.29098986533387);
\draw[color3,line width=0.0026377898097977312pt,line cap=round](140.72354435651812,138.29125364431485) -- (140.7274746633347,138.29098986533387);
\draw[color3,line width=0.01044564764681401pt,line cap=round](69.28571428571429,137.1428571428571) -- (69.23348604748023,137.1219658475635);
\draw[color3,line width=0.01044564764681401pt,line cap=round](69.24403615160351,137.133456059975) -- (69.23348604748023,137.1219658475635);
\draw[color3,line width=0.01044564764681401pt,line cap=round](69.24905006247398,137.1209212827988) -- (69.23348604748023,137.1219658475635);
\draw[color3,line width=0.0342912675274193pt,line cap=round](105.0,137.7142857142857) -- (104.8285436623629,137.64570317923085);
\draw[color3,line width=0.0342912675274193pt,line cap=round](104.86317784256559,137.683423573511) -- (104.8285436623629,137.64570317923085);
\draw[color3,line width=0.0342912675274193pt,line cap=round](104.87963765097876,137.64227405247811) -- (104.8285436623629,137.64570317923085);
\draw[color3,line width=0.04888888888888888pt,line cap=round](83.57142857142857,107.42857142857143) -- (83.32698412698413,107.33079365079365);
\draw[color3,line width=0.04888888888888888pt,line cap=round](83.37636190476191,107.38457142857142) -- (83.32698412698413,107.33079365079365);
\draw[color3,line width=0.04888888888888888pt,line cap=round](83.39982857142859,107.32590476190477) -- (83.32698412698413,107.33079365079365);
\draw[color3,line width=0.025850340136054296pt,line cap=round](119.28571428571428,108.0) -- (119.156462585034,107.94829931972788);
\draw[color3,line width=0.025850340136054296pt,line cap=round](119.1825714285714,107.97673469387755) -- (119.156462585034,107.94829931972788);
\draw[color3,line width=0.025850340136054296pt,line cap=round](119.19497959183673,107.94571428571427) -- (119.156462585034,107.94829931972788);
\draw[color3,line width=0.012726178906936733pt,line cap=round](133.57142857142858,78.28571428571429) -- (133.63505946596325,78.31116664352815);
\draw[color3,line width=0.012726178906936733pt,line cap=round](133.62220602526725,78.29716784673052) -- (133.63505946596325,78.31116664352815);
\draw[color3,line width=0.012726178906936733pt,line cap=round](133.61609745939194,78.31243926141885) -- (133.63505946596325,78.31116664352815);
\draw[color3,line width=0.1659697348327086pt,line cap=round](112.14285714285714,62.285714285714285) -- (112.97270581702068,62.6176537553797);
\draw[color3,line width=0.1659697348327086pt,line cap=round](112.80507638483965,62.435087047063725) -- (112.97270581702068,62.6176537553797);
\draw[color3,line width=0.1659697348327086pt,line cap=round](112.72541091211994,62.63425072886297) -- (112.97270581702068,62.6176537553797);
\draw[color3,line width=0.001156925355171231pt,line cap=round](140.71428571428572,152.57142857142858) -- (140.7200703410616,152.57374242213893);
\draw[color3,line width=0.001156925355171231pt,line cap=round](140.71890184645287,152.57246980424824) -- (140.7200703410616,152.57374242213893);
\draw[color3,line width=0.001156925355171231pt,line cap=round](140.7183465222824,152.57385811467444) -- (140.7200703410616,152.57374242213893);
\draw[color3,line width=0.00458142440649757pt,line cap=round](69.28571428571429,151.42857142857142) -- (69.2628071636818,151.41940857975843);
\draw[color3,line width=0.00458142440649757pt,line cap=round](69.26743440233237,151.42444814660556) -- (69.2628071636818,151.41940857975843);
\draw[color3,line width=0.00458142440649757pt,line cap=round](69.26963348604748,151.41895043731776) -- (69.2628071636818,151.41940857975843);
\draw[color3,line width=0.015040029617289386pt,line cap=round](105.0,152.0) -- (104.92479985191356,151.96991994076544);
\draw[color3,line width=0.015040029617289386pt,line cap=round](104.93999028182702,151.98646397334446) -- (104.92479985191356,151.96991994076544);
\draw[color3,line width=0.015040029617289386pt,line cap=round](104.94720949604331,151.9684159378037) -- (104.92479985191356,151.96991994076544);
\draw[color3,line width=0.0648526077097506pt,line cap=round](83.57142857142857,121.71428571428572) -- (83.24716553287982,121.58458049886622);
\draw[color3,line width=0.0648526077097506pt,line cap=round](83.31266666666666,121.65591836734694) -- (83.24716553287982,121.58458049886622);
\draw[color3,line width=0.0648526077097506pt,line cap=round](83.34379591836735,121.57809523809524) -- (83.24716553287982,121.58458049886622);
\draw[color3,line width=0.034291267527418894pt,line cap=round](119.28571428571428,122.28571428571429) -- (119.11425794807718,122.21713175065945);
\draw[color3,line width=0.034291267527418894pt,line cap=round](119.14889212827987,122.25485214493962) -- (119.11425794807718,122.21713175065945);
\draw[color3,line width=0.034291267527418894pt,line cap=round](119.16535193669304,122.21370262390671) -- (119.11425794807718,122.21713175065945);
\draw[color3,line width=0.011911703456892967pt,line cap=round](97.85714285714286,92.00000000000001) -- (97.7975843398584,91.97617659308622);
\draw[color3,line width=0.011911703456892967pt,line cap=round](97.80961516034986,91.9892794668888) -- (97.7975843398584,91.97617659308622);
\draw[color3,line width=0.011911703456892967pt,line cap=round](97.81533277800918,91.97498542274053) -- (97.7975843398584,91.97617659308622);
\draw[color3,line width=0.0020824656393177063pt,line cap=round](133.57142857142858,92.57142857142858) -- (133.561016243232,92.56726364014995);
\draw[color3,line width=0.0020824656393177063pt,line cap=round](133.5631195335277,92.5695543523532) -- (133.561016243232,92.56726364014995);
\draw[color3,line width=0.0020824656393177063pt,line cap=round](133.56411911703458,92.56705539358602) -- (133.561016243232,92.56726364014995);
\draw[color3,line width=0.06383451339719565pt,line cap=round](112.14285714285714,76.57142857142857) -- (112.46202970984312,76.69909759822296);
\draw[color3,line width=0.06383451339719565pt,line cap=round](112.39755685131196,76.62887963348604) -- (112.46202970984312,76.69909759822296);
\draw[color3,line width=0.06383451339719565pt,line cap=round](112.3669162848813,76.70548104956268) -- (112.46202970984312,76.69909759822296);
\draw[color3,line width=0.05687074829931971pt,line cap=round](83.57142857142857,135.99999999999997) -- (83.28707482993197,135.88625850340134);
\draw[color3,line width=0.05687074829931971pt,line cap=round](83.34451428571428,135.9488163265306) -- (83.28707482993197,135.88625850340134);
\draw[color3,line width=0.05687074829931971pt,line cap=round](83.37181224489795,135.88057142857141) -- (83.28707482993197,135.88625850340134);
\draw[color3,line width=0.030070803831736524pt,line cap=round](119.28571428571428,136.57142857142856) -- (119.13536026655561,136.5112869637651);
\draw[color3,line width=0.030070803831736524pt,line cap=round](119.16573177842567,136.54436484798) -- (119.13536026655561,136.5112869637651);
\draw[color3,line width=0.030070803831736524pt,line cap=round](119.18016576426488,136.5082798833819) -- (119.13536026655561,136.5112869637651);
\draw[color3,line width=0.0648526077097506pt,line cap=round](97.85714285714286,106.28571428571429) -- (97.53287981859411,106.15600907029479);
\draw[color3,line width=0.0648526077097506pt,line cap=round](97.59838095238095,106.22734693877551) -- (97.53287981859411,106.15600907029479);
\draw[color3,line width=0.0648526077097506pt,line cap=round](97.62951020408164,106.14952380952381) -- (97.53287981859411,106.15600907029479);
\draw[color3,line width=0.011337868480727027pt,line cap=round](133.57142857142858,106.85714285714286) -- (133.51473922902494,106.8344671201814);
\draw[color3,line width=0.011337868480727027pt,line cap=round](133.52619047619046,106.8469387755102) -- (133.51473922902494,106.8344671201814);
\draw[color3,line width=0.011337868480727027pt,line cap=round](133.53163265306122,106.83333333333333) -- (133.51473922902494,106.8344671201814);
\draw[color3,line width=0.024943310657596383pt,line cap=round](83.57142857142857,150.28571428571428) -- (83.44671201814059,150.2358276643991);
\draw[color3,line width=0.024943310657596383pt,line cap=round](83.47190476190477,150.26326530612246) -- (83.44671201814059,150.2358276643991);
\draw[color3,line width=0.024943310657596383pt,line cap=round](83.48387755102041,150.23333333333332) -- (83.44671201814059,150.2358276643991);
\draw[color3,line width=0.013188949049007059pt,line cap=round](119.28571428571428,150.85714285714286) -- (119.21976954046924,150.83076495904484);
\draw[color3,line width=0.013188949049007059pt,line cap=round](119.23309037900874,150.84527280299878) -- (119.21976954046924,150.83076495904484);
\draw[color3,line width=0.013188949049007059pt,line cap=round](119.23942107455225,150.82944606413994) -- (119.21976954046924,150.83076495904484);
\draw[color3,line width=0.07279374334767943pt,line cap=round](126.42857142857143,61.14285714285714) -- (126.79254014530983,61.288444629552494);
\draw[color3,line width=0.07279374334767943pt,line cap=round](126.71901846452867,61.20837151187005) -- (126.79254014530983,61.288444629552494);
\draw[color3,line width=0.07279374334767943pt,line cap=round](126.68407746772179,61.295724003887265) -- (126.79254014530983,61.288444629552494);
\draw[color3,line width=0.08602896941089373pt,line cap=round](97.85714285714286,120.57142857142858) -- (97.4269980100884,120.39937063260679);
\draw[color3,line width=0.08602896941089373pt,line cap=round](97.5138872691934,120.49400249895878) -- (97.4269980100884,120.39937063260679);
\draw[color3,line width=0.08602896941089373pt,line cap=round](97.55518117451062,120.3907677356657) -- (97.4269980100884,120.39937063260679);
\draw[color3,line width=0.015040029617291237pt,line cap=round](133.57142857142858,121.14285714285715) -- (133.49622842334213,121.11277708362256);
\draw[color3,line width=0.015040029617291237pt,line cap=round](133.51141885325558,121.12932111620158) -- (133.49622842334213,121.11277708362256);
\draw[color3,line width=0.015040029617291237pt,line cap=round](133.5186380674719,121.11127308066084) -- (133.49622842334213,121.11277708362256);
\draw[color3,line width=0.010445647646813761pt,line cap=round](112.14285714285714,90.85714285714286) -- (112.09062890462307,90.83625156184924);
\draw[color3,line width=0.010445647646813761pt,line cap=round](112.10117900874636,90.84774177426073) -- (112.09062890462307,90.83625156184924);
\draw[color3,line width=0.010445647646813761pt,line cap=round](112.10619291961683,90.83520699708455) -- (112.09062890462307,90.83625156184924);
\draw[color3,line width=0.0754407885603221pt,line cap=round](97.85714285714286,134.85714285714283) -- (97.47993891434125,134.7062612800222);
\draw[color3,line width=0.0754407885603221pt,line cap=round](97.55613411078717,134.78924614743855) -- (97.47993891434125,134.7062612800222);
\draw[color3,line width=0.0754407885603221pt,line cap=round](97.59234568929612,134.69871720116615) -- (97.47993891434125,134.7062612800222);
\draw[color3,line width=0.01318894904901032pt,line cap=round](133.57142857142858,135.42857142857142) -- (133.50548382618354,135.4021935304734);
\draw[color3,line width=0.01318894904901032pt,line cap=round](133.51880466472304,135.41670137442733) -- (133.50548382618354,135.4021935304734);
\draw[color3,line width=0.01318894904901032pt,line cap=round](133.52513536026655,135.4008746355685) -- (133.50548382618354,135.4021935304734);
\draw[color3,line width=0.056870748299319596pt,line cap=round](112.14285714285714,105.14285714285714) -- (111.85850340136054,105.0291156462585);
\draw[color3,line width=0.056870748299319596pt,line cap=round](111.91594285714285,105.09167346938776) -- (111.85850340136054,105.0291156462585);
\draw[color3,line width=0.056870748299319596pt,line cap=round](111.94324081632652,105.02342857142858) -- (111.85850340136054,105.0291156462585);
\draw[color3,line width=0.027997593595261147pt,line cap=round](126.42857142857143,75.42857142857143) -- (126.56855939654774,75.48456661576195);
\draw[color3,line width=0.027997593595261147pt,line cap=round](126.54028182701653,75.45376926280717) -- (126.56855939654774,75.48456661576195);
\draw[color3,line width=0.027997593595261147pt,line cap=round](126.5268429820908,75.48736637512148) -- (126.56855939654774,75.48456661576195);
\draw[color3,line width=0.03308806515803605pt,line cap=round](97.85714285714286,149.14285714285714) -- (97.69170253135269,149.0766810125411);
\draw[color3,line width=0.03308806515803605pt,line cap=round](97.72512147716232,149.11307788421493) -- (97.69170253135269,149.0766810125411);
\draw[color3,line width=0.03308806515803605pt,line cap=round](97.74100374843816,149.07337220602528) -- (97.69170253135269,149.0766810125411);
\draw[color3,line width=0.005784626775884306pt,line cap=round](133.57142857142858,149.71428571428572) -- (133.54250543754915,149.70271646073397);
\draw[color3,line width=0.005784626775884306pt,line cap=round](133.54834791059278,149.70907955018745) -- (133.54250543754915,149.70271646073397);
\draw[color3,line width=0.005784626775884306pt,line cap=round](133.55112453144523,149.70213799805637) -- (133.54250543754915,149.70271646073397);
\draw[color3,line width=0.07544078856032188pt,line cap=round](112.14285714285714,119.42857142857143) -- (111.76565320005552,119.27768985145079);
\draw[color3,line width=0.07544078856032188pt,line cap=round](111.84184839650145,119.36067471886714) -- (111.76565320005552,119.27768985145079);
\draw[color3,line width=0.07544078856032188pt,line cap=round](111.8780599750104,119.27014577259474) -- (111.76565320005552,119.27768985145079);
\draw[color3,line width=0.00458142440649779pt,line cap=round](126.42857142857143,89.71428571428572) -- (126.40566430653894,89.70512286547273);
\draw[color3,line width=0.00458142440649779pt,line cap=round](126.41029154518951,89.71016243231988) -- (126.40566430653894,89.70512286547273);
\draw[color3,line width=0.00458142440649779pt,line cap=round](126.41249062890462,89.70466472303208) -- (126.40566430653894,89.70512286547273);
\draw[color2,line width=3pt,line cap=round](130.0,52.0) -- (130.0,152.0);
\draw[color3,line width=0.06615576842982052pt,line cap=round](112.14285714285714,133.7142857142857) -- (111.81207830070804,133.58197417742608);
\draw[color3,line width=0.06615576842982052pt,line cap=round](111.87889562682217,133.65474552269887) -- (111.81207830070804,133.58197417742608);
\draw[color3,line width=0.06615576842982052pt,line cap=round](111.91065039566847,133.57535860058312) -- (111.81207830070804,133.58197417742608);
\draw[color3,line width=0.024943310657597324pt,line cap=round](126.42857142857143,104.0) -- (126.30385487528345,103.9501133786848);
\draw[color3,line width=0.024943310657597324pt,line cap=round](126.32904761904763,103.97755102040816) -- (126.30385487528345,103.9501133786848);
\draw[color3,line width=0.024943310657597324pt,line cap=round](126.34102040816327,103.94761904761904) -- (126.30385487528345,103.9501133786848);
\draw[color3,line width=0.02901568790781583pt,line cap=round](112.14285714285714,148.0) -- (111.99777870331806,147.94196862418437);
\draw[color3,line width=0.02901568790781583pt,line cap=round](112.02708454810495,147.97388588088296) -- (111.99777870331806,147.94196862418437);
\draw[color3,line width=0.02901568790781583pt,line cap=round](112.04101207830071,147.9390670553936) -- (111.99777870331806,147.94196862418437);
\draw[color3,line width=0.03308806515803751pt,line cap=round](126.42857142857143,118.28571428571429) -- (126.26313110278124,118.21953815539821);
\draw[color3,line width=0.03308806515803751pt,line cap=round](126.29655004859086,118.25593502707206) -- (126.26313110278124,118.21953815539821);
\draw[color3,line width=0.03308806515803751pt,line cap=round](126.31243231986673,118.21622934888241) -- (126.26313110278124,118.21953815539821);
\draw[color3,line width=0.029015687907818315pt,line cap=round](126.42857142857143,132.57142857142856) -- (126.28349298903234,132.51339719561292);
\draw[color3,line width=0.029015687907818315pt,line cap=round](126.31279883381923,132.54531445231152) -- (126.28349298903234,132.51339719561292);
\draw[color3,line width=0.029015687907818315pt,line cap=round](126.32672636401499,132.51049562682215) -- (126.28349298903234,132.51339719561292);
\draw[color3,line width=0.012726178906939754pt,line cap=round](126.42857142857143,146.85714285714286) -- (126.36494053403673,146.831690499329);
\draw[color3,line width=0.012726178906939754pt,line cap=round](126.37779397473274,146.8456892961266) -- (126.36494053403673,146.831690499329);
\draw[color3,line width=0.012726178906939754pt,line cap=round](126.38390254060808,146.8304178814383) -- (126.36494053403673,146.831690499329);
\end{tikzpicture} |
http://lions-wing.net/lessons/publish/tex-examples/examex.tex | lions-wing.net | CC-MAIN-2022-27 | text/x-tex | application/x-tex | crawl-data/CC-MAIN-2022-27/segments/1656103669266.42/warc/CC-MAIN-20220630062154-20220630092154-00265.warc.gz | 32,802,845 | 3,156 | \documentclass[12pt]{article}
\usepackage{amsmath,amssymb,amsfonts}
\pagestyle{plain}
\oddsidemargin 0cm
\textwidth 16cm
\topmargin -1cm
\parindent 0cm
\textheight 22cm
\parskip 3mm
\def\E{\mathbb{E}}
\def\bS{\mathbb{S}}
\def\R{\mathbb{R}}
\date{ }
\title{{University of Manchester Institute of Science and Technology}\\ \vspace*{2cm}
{\small UA351: Pure Topics II \hfill UA351}}
\author{\hspace*{-14cm}For candidates taking:\hfill \\DEGREE OF MMath\\
DEGREE OF BSc\\
FINAL EXAMINATION in HONOURS SCHOOL OF \\
PURE MATHEMATICS AND COMPUTATION\\ MATHEMATICS AND LANGUAGE STUDIES\\
MATHEMATICS\\ MATHEMATICS STATISTICS AND OPERATIONAL RESEARCH\\
MATHEAMATICS AND MANAGEMENT SCIENCES}
\begin{document}
\maketitle
\vspace*{3cm}
Date: ???????? \hfill Time: ????
\vspace*{3cm}
\begin{center}
{\large\bf Answer Three Questions}
\end{center}
\newpage
{\large\bf 1.}\\
{\large\bf (i)} Given that the set of all $3\times 3$ orthogonal
real matrices with determinant $+1$
forms a group $SO(3)$ under matrix multiplication, prove that $SO(3)$ has a
subgroup $R_Z$ consisting of rotations about the $z$-axis. Write down without proof
the definitions of two other subgroups, $R_X, \, R_Y,$ of $SO(3),$ corresponding
to rotations about the $x$-axis and $y$-axis respectively.
{\large\bf (ii)} Prove that the map
$$g:[0,2\pi]\times [-\pi/2,\pi/2]\rightarrow \E^3 :
(u,v) \mapsto (\cos v \cos u, \cos v\sin u, \sin v)$$ provides a parametrization
of the standard unit sphere $\bS^2.$
{\large\bf (iii)} Prove that $R_Z$ defines an action on the
standard unit sphere $\bS^2$ by the map $$\rho:R_Z\times \bS^2
\rightarrow \bS^2 : ([A_{ij}],[p_j]) \mapsto
[\sum_{k=1}^{k=3}A_{ik}p_k]$$ and find its orbits. Prove also that
this action is effective but neither free nor transitive.
{\large\bf (iv)} Find a parametric equation for the equator curve on $\bS^2$ in the form
$$e:[0,2\pi]\rightarrow \bS^2$$
and find the parameter value $t_0\in [0,2\pi]$ such that
$$e(t_0)=(\frac{1}{\sqrt 2},\frac{1}{\sqrt 2},0) = p, \ {\rm say}.$$
Find a parametric equation for the great circle $\gamma$ through $p$ and inclined at
angle $\pi/6$ to the equator, so that $\gamma(t_1)=p$ for some $t_1$ in the domain
of $\gamma$ and $\gamma'(t_1)$ makes an angle $\pi/6$ with $e'(t_0)$ at $p.$
What is the torsion of $\gamma?$
\newpage
{\large\bf 2.}\\
Let $\alpha :(a,b)\rightarrow \E^3$ be a regular curve with positive curvature $\kappa,$
torsion $\tau$ and a Frenet-Serret frame field $(T,N,B).$
Denote by $s:(a,b)\rightarrow \R$ the arc length function and suppose that
$\hat{\alpha} :(c,d)\rightarrow \E^3$ is a unit speed reparametrization of $\alpha.$
Denote by $\hat{\kappa}$ and
$\hat{\tau}$ the curvature and torsion respectively of $\hat{\alpha},$ and
by $(\hat{T},\hat{N},\hat{B})$ the Frenet-Serret frame field of $\hat{\alpha}.$
{\large\bf (i)} Write down without proof
the Frenet-Serret equations for $\hat{\alpha}$ and use the definitions
\begin{eqnarray*}
\kappa(t) &=& \hat{\kappa}(s(t)) \\
\tau(t) &=& \hat{\tau}(s(t)) \\
T(t) &=& \hat{T}(s(t)) \\
N(t) &=& \hat{N}(s(t)) \\
B(t) &=& \hat{B}(s(t))
\end{eqnarray*}
to obtain the Frenet-Serret equations for $\alpha.$
{\large\bf (ii)} Prove that $\alpha$ has acceleration
$$\alpha'' = s''T+(s')^2\kappa N$$
with curvature
$$\kappa = \frac{||\alpha' \times\alpha''||}{||\alpha'||^3}$$
and torsion
$$\tau = \frac{\alpha' \times\alpha''\cdot \alpha'''}{||\alpha'\times \alpha''||^2}.$$
{\large\bf (iii)} Find the curvature and torsion of the twisted cubic curve
$$\alpha: (0,1) \rightarrow \E^3 : t \mapsto (t,t^2,t^3).$$
\newpage
{\large\bf 3.} \\
Let $\Phi:M_1\rightarrow M_2$ be a local isometry between two
regular surfaces $M_1$ and $M_2$ in $\E^3$ with Gaussian curvatures
$K_1,K_2,$ respectively. A famous theorem of Gauss states
that then
$$K_1=K_2\circ\Phi.$$
Prove by counterexample that the converse is false by considering the funnel
surface $M_1$ with patch map
$$(u,v)\mapsto (v\cos u,v\sin u, \log v)$$
the helicoid $M_2$ with patch map
$$(u,v)\mapsto (v\cos u,v\sin u, u)$$
and the diffeomorphism
$$\Phi:M_1\rightarrow M_2:(v\cos u,v\sin u, \log v)\mapsto (v\cos u,v\sin u, u).$$
Do this by showing that this $M_1$ and $M_2$ have the same curvature at corresponding
points under $\Phi,$ but $\Phi$ is not an isometry.
You may use without proof the Weingarten result that the determinant of the shape
operator $S$ is given by
$$\det S = \frac{eg-f^2}{EG-F^2}$$
when the arc length formula is
$$ds^2=Edu^2+2Fdudv+Gdv^2$$
and, for a unit normal field $\hat{n}$ and a patch map $x,$ the second fundamental form
has components given by
$$e=\hat{n}\cdot x_{uu}, \ \ f=\hat{n}\cdot x_{uv}, \ \ g=\hat{n} \cdot x_{vv}.$$
\newpage
{\large\bf 4.}\\
{\large\bf (i)}
Draw a projection of an oriented trefoil knot $T,$ and number the overcrossings. From
your drawing, write down without proof
a matrix from which the Alexander polynomial ${\cal A}(T)$
may be found as the monic factor of a determinant. Find ${\cal A}(T).$
{\large\bf (ii)}
Take an identical pair of oriented trefoil knots and by joining them together
form an oriented sum knot, $R;$
take two more oriented trefoil knots, one the mirror image of
the other, and join them to form a different
summand oriented knot, $G;$ do this in such a way that $R$ and $G$ each have
a projection with six overcrossings. [In fact, one of your summands should be
the square knot and the other should be the granny knot.]
Find suitable
such projections, number the overcrossings and then compute for $R,G$ without proof
the Alexander polynomials ${\cal A}(R)$ and ${\cal A}(G).$
{\large\bf (iii)}
Write down an equation relating the three polynomials,
${\cal A}(T),$ ${\cal A}(R)$ and ${\cal A}(G).$
\end{document}
|
http://chadmusick.wdfiles.com/local--files/knots/k11a237c.tex | wdfiles.com | CC-MAIN-2019-51 | text/x-tex | application/x-tex | crawl-data/CC-MAIN-2019-51/segments/1575540482284.9/warc/CC-MAIN-20191205213531-20191206001531-00530.warc.gz | 27,429,233 | 1,059 | \documentclass{standalone}
\usepackage[paperwidth=\maxdimen,paperheight=\maxdimen]{geometry}
\usepackage{pgf,tikz}
\begin{document}
\begin{tikzpicture}[x=24pt, y=24pt, draw=white, double=black, line width=2.1pt]
\node (5) at (1, 0) {$5$};
\node (1) at (6, 0) {$1$};
\node (2) at (11, 0) {$2$};
\node (4) at (24, 0) {$4$};
\node (3) at (29, 0) {$3$};
\node (6) at (40, 0) {$6$};
\draw[double=white,draw=green] (2) -- (11, 9) -- (29, 9) -- (3);
\draw[double=white,draw=blue] (6) -- (40, -18) -- (2, -18) -- (2, 12) -- (38, 12) -- (38, -15) -- (6, -15) -- (1);
\draw[double=white,draw=red] (4) -- (24, -8) -- (10, -8) -- (10, 2) -- (5, 2) -- (5, -17) -- (39, -17) -- (39, 13) -- (0, 13) -- (0, 0) -- (5);
\draw[double=green] (3) -- (29, -5) -- (19, -5) -- (19, 11) -- (41, 11) -- (41, -16) -- (9, -16) -- (9, 1) -- (12, 1) -- (12, -13) -- (36, -13) -- (36, 7) -- (22, 7) -- (22, -2) -- (26, -2) -- (26, 3) -- (32, 3) -- (32, -9) -- (16, -9) -- (16, 6) -- (4, 6) -- (4, -1) -- (7, -1) -- (7, 4) -- (14, 4) -- (14, -11) -- (34, -11) -- (34, 5) -- (24, 5) -- (4);
\draw[double=blue] (5) -- (1, 8) -- (18, 8) -- (18, -6) -- (30, -6) -- (30, 1) -- (28, 1) -- (28, -4) -- (20, -4) -- (20, 10) -- (40, 10) -- (6);
\draw[double=red] (1) -- (6, 5) -- (15, 5) -- (15, -10) -- (33, -10) -- (33, 4) -- (25, 4) -- (25, -1) -- (23, -1) -- (23, 6) -- (35, 6) -- (35, -12) -- (13, -12) -- (13, 3) -- (8, 3) -- (8, -2) -- (3, -2) -- (3, 7) -- (17, 7) -- (17, -7) -- (31, -7) -- (31, 2) -- (27, 2) -- (27, -3) -- (21, -3) -- (21, 8) -- (37, 8) -- (37, -14) -- (11, -14) -- (2);
\end{tikzpicture}
\end{document} |
http://www.lpi.usra.edu/meetings/templates/latex2e.tex | usra.edu | CC-MAIN-2017-30 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2017-30/segments/1500549423769.10/warc/CC-MAIN-20170721102310-20170721122310-00602.warc.gz | 483,575,334 | 2,482 | \documentclass{article} % Do NOT delete this line
\usepackage{lpiabstr_2e} % Do NOT delete this line
\usepackage{times}
% This is the macro file to use with LaTeX version 2e. It is written to
% work with the accompanying style file lpiabstr_2e.sty.
% NOTE: The style file lpiabstr.sty requires access to the Times
% font package; if you do not have these fonts on your system, the
% template and style file will not work. The font package can be
% retrieved from any CTAN (Comprehensive TeX Archive Network) site;
% go to
%
% http://www.ctan.org/
%
% and click on "CTAN mirror" for a listing of the site nearest you.
\begin{document} % Do NOT delete this line
% Type your title in the argument below, using upper- and lower-case letters:
\title{Global Evolution of Solids in Viscous Protoplanetary Disks}
% Type your authors as shown in the example below, listing each author in
% a separate author argument, with affiliation given in the affiliation
% argument as needed:
\author{J. R. Dotson}
\affil{Lunar and Planetary Institute, Houston TX 77058-1113, USA,
([email protected])}
\author{D. Hilbert}
\author{S. L. Hokanson}
\author{L. Tanner}
\affil{Department of Astronomy, University of Houston-Clear Lake,
Houston TX 77058, USA}
\author{A. Wiles}
\author{S. Lee}
\affil{Geology Department, University of Illinois, Chicago IL 60637, USA}
% If your abstract is two pages long, type your running head in the argument
% below:
\runningtitle{GLOBAL EVOLUTION: J. R. Dotson et al.}
\titlemake % Sets the title, author information; do NOT delete
\begin{abstracttext}
This macro will format your abstract for the volume.
You will have retrieved this template file and the macro file lpiabstr\_2e.sty
from the meeting Web site. The macro file lpiabstr\_2e.sty can be placed
in the same directory as your abstract, or in any of the standard LaTeX
input directories. The macro file assumes that you are running LaTeX 2e;
if you are running LaTeX 2.09, you should use the 2.09 macros instead.
If your LaTeX system does not have a macro called ''times'' to configure
the use of PostScript Times Roman fonts, your system will complain that
it cannot find times.sty. Read the commented note found at the top of this
file for directions on where you can retrieve the Times Roman font package.
Insert the title of your abstract as the argument of the ``title'' macro,
just after the ``begin{document}'' macro. Insert all author names and
affiliation names in the ``author'' and ``affil'' commands. You should
list all the authors by institution, listing all the authors for the first
institution, then that institution, then all the authors for the second
institution, followed by the second institution, and so forth. If you
cannot group all the authors by affiliation, you will have to repeat
the affiliation for each separate occurrence. The example given in this
file shows the correct way to enter authors and affiliations (be sure to
remove all the samples when you prepare your abstract!).
If the abstract is more than one page, you will need a running head for the
second page, abbreviating the title and author list as in the sample.
Remember that the length of your abstract cannot exceed the length requirement
stated in the announcement text. If you
do not input the correct information for YOUR running head, the one used
in the sample will appear on the second page of your abstract.
You should then type your abstract between the command lines
``begin{abstracttext}'' and ``end{abstracttext}.'' Remember to remove
ALL the sample text that currently exists between these two lines.
After you run the LaTeX processor on your abstract, use dvips (or the dvi
processor on your system) to produce a PostScript output file. You will
submit the PostScript file (and NOT the LaTeX file) to the LPI. (However,
depending on which meeting your abstract is for, the LPI may request your
source files separately.)
You will notice that macros are not given for internal formatting (headings,
etc.). The macros and style file merely define the page dimensions, format
of title and author lines, two-column text format, and running head
placement. Formatting of tables, equations, headings, captions,
references, etc., are at your discretion. Keep in mind that your text
columns are only 3 inches (7.5 cm) wide, so plan the size of your tables,
equations, and figures accordingly.
\end{abstracttext}
\end{document}
|
https://www.authorea.com/users/346736/articles/472627/download_latex | authorea.com | CC-MAIN-2021-39 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2021-39/segments/1631780057225.57/warc/CC-MAIN-20210921161350-20210921191350-00337.warc.gz | 690,628,427 | 6,961 | \documentclass[10pt]{article}
\usepackage{fullpage}
\usepackage{setspace}
\usepackage{parskip}
\usepackage{titlesec}
\usepackage[section]{placeins}
\usepackage{xcolor}
\usepackage{breakcites}
\usepackage{lineno}
\usepackage{hyphenat}
\PassOptionsToPackage{hyphens}{url}
\usepackage[colorlinks = true,
linkcolor = blue,
urlcolor = blue,
citecolor = blue,
anchorcolor = blue]{hyperref}
\usepackage{etoolbox}
\makeatletter
\patchcmd\@combinedblfloats{\box\@outputbox}{\unvbox\@outputbox}{}{%
\errmessage{\noexpand\@combinedblfloats could not be patched}%
}%
\makeatother
\usepackage{natbib}
\renewenvironment{abstract}
{{\bfseries\noindent{\abstractname}\par\nobreak}\footnotesize}
{\bigskip}
\titlespacing{\section}{0pt}{*3}{*1}
\titlespacing{\subsection}{0pt}{*2}{*0.5}
\titlespacing{\subsubsection}{0pt}{*1.5}{0pt}
\usepackage{authblk}
\usepackage{graphicx}
\usepackage[space]{grffile}
\usepackage{latexsym}
\usepackage{textcomp}
\usepackage{longtable}
\usepackage{tabulary}
\usepackage{booktabs,array,multirow}
\usepackage{amsfonts,amsmath,amssymb}
\providecommand\citet{\cite}
\providecommand\citep{\cite}
\providecommand\citealt{\cite}
% You can conditionalize code for latexml or normal latex using this.
\newif\iflatexml\latexmlfalse
\providecommand{\tightlist}{\setlength{\itemsep}{0pt}\setlength{\parskip}{0pt}}%
\AtBeginDocument{\DeclareGraphicsExtensions{.pdf,.PDF,.eps,.EPS,.png,.PNG,.tif,.TIF,.jpg,.JPG,.jpeg,.JPEG}}
\usepackage[utf8]{inputenc}
\usepackage[ngerman,english]{babel}
\usepackage{float}
\begin{document}
\title{Vitamin B12 Malabsorption and Pseudo-Thrombotic Microangiopathy in an
Adolescent.}
\author[1]{Simone Chang}%
\author[2]{Mercia Gondim}%
\author[3]{Michael Angelo Huang}%
\affil[1]{University of Louisville School of Medicine}%
\affil[2]{Norton Children's Hospital}%
\affil[3]{University of Louisville}%
\vspace{-1em}
\date{\today}
\begingroup
\let\center\flushleft
\let\endcenter\endflushleft
\maketitle
\endgroup
\selectlanguage{english}
\begin{abstract}
Thrombotic microangiopathies (TMAs) are a group of rare disorders that
can be considered life threatening. The hallmark of this disease is a
microangiopathic hemolytic anemia with an associated thrombocytopenia
which could be congenital or acquired. Acquired vitamin B12 deficiency
is overlooked in developed countries but can mimic a TMA. We report the
case of 17-year-old male with malabsorption of vitamin B12 with
development of pseudo-TMA. When faced with a clinical presentation of a
TMA in a child or an adolescent patient, physicians must be aware of the
possibility of vitamin B12 deficiency especially in patients at risk for
malabsorption.%
\end{abstract}%
\sloppy
\textbf{Abstract}
Thrombotic microangiopathies (TMAs) are a group of rare disorders that
can be considered life threatening. The hallmark of this disease is a
microangiopathic hemolytic anemia with an associated thrombocytopenia
which could be congenital or acquired. Acquired vitamin B12 deficiency
is overlooked in developed countries but can mimic a TMA. We report the
case of 17-year-old male with malabsorption of vitamin B12 with
development of pseudo-TMA. When faced with a clinical presentation of a
TMA in a child or an adolescent patient, physicians must be aware of the
possibility of vitamin B12 deficiency especially in patients at risk for
malabsorption.
\textbf{Introduction}
Thrombotic microangiopathies (TMAs) are a group of rare disorders that
are characterized by microangiopathic hemolytic anemia and
thrombocytopenia with thrombosis of the microvasculature. This is often
associated with organ dysfunction and encompass congenital and acquired
etiologies{[}1{]}. Distinguishing between these disorders is important,
as many TMAs are life-threatening.
Acquired B12 deficiency is overlooked because of its rarity in developed
countries{[}2{]}. Hematologic manifestations of B12 deficiency can
include pancytopenia because of ineffective hematopoiesis. Defective red
blood cells (RBCs) undergo phagocytosis in the marrow and as a result
mimic an intravascular hemolytic process.
We describe the case of a 17- year-old male who had a history of
intestinal resection and celiac disease which lead to a pseudo -- TMA
through malabsorption of vitamin B12.
\textbf{Case Description}
A 17-year-old male with history of intestinal resection secondary to
gastroschisis at birth was referred to the emergency room for shortness
of breath, fatigue, and lightheadedness for a week. His history was
significant for celiac disease, iron and B12 deficiency with symptomatic
anemia in the past, requiring transfusions. It had been at least a year
since he had taken his last supplements and he had not adhered to a
gluten-free diet. He denied constitutional symptoms, fevers, bleeding,
or recurrent illnesses. His physical examination was significant for
weight below the third percentile, pallor, mildly icteric sclerae and
hepatosplenomegaly. He was alert and oriented with no noticeable
neurological deficits.
His complete blood count (CBC) was significant for pancytopenia with a
WBC: 2.42 x 10\^{}3/uL, Hb: 5.9 g/dL, MCV: 95.4 fL, Plt: 111 x
10\^{}3/uL and a reticulocytopenia of 0.6\%. Review of his peripheral
smear was significant for anisocytosis, microcytosis, poikilocytosis and
schistocytes. Routine chemistries were suggestive of hemolysis with an
elevated LDH of \textgreater{}50 000 U/L, an unconjugated
hyperbilirubinemia of 3.7 mg/dL and an undetectable haptoglobin. His
synthetic liver function was unremarkable with normal coagulation
studies despite a notable transaminitis. A liver ultrasound showed
diffuse echogenicity with likely fatty infiltration but no evidence of
portal hypertension. He had a negative direct coombs, iron studies were
unremarkable and a B12 \textless{}109 pg/mL. His renal function was also
unremarkable. He was transfused two units of packed red blood cells,
which allowed for stabilization of his hemoglobin and he was started on
oral iron and B12 supplementation.
The differential included a pancytopenia secondary to B12 deficiency
with a superimposed hemolytic process as well as concern for a malignant
bone marrow infiltrative process given his pancytopenia and
hepatomegaly. Paroxysmal nocturnal hemogobinuria testing was negative. A
bone marrow biopsy and aspirate displayed no changes consistent with
myelodysplasia or malignancy. There was evidence of erythroid
hyperplasia and megaloblastic maturation along with hypersegmented
neutrophils consistent with his B12 deficiency as shown in Fig. 1. His
liver biopsy showed non-alcoholic steatohepatitis attributed to his
uncontrolled celiac disease and the decision was made to convert his
oral B12 to an intramuscular formulation.
Repeat B12 and LDH were 525 pg/mL and 503 U/L respectively showing
resolution of his symptoms. Despite not being included in the initial
differential, a hemolytic anemia in the presence of a progressive
thrombocytopenia warrants the consideration of a TMA. However, given the
resolution of his symptoms with B12 supplementation the diagnosis of
pseudo-TMA secondary to B12 deficiency was made.
\textbf{Discussion}
B12 deficiency is the leading cause of megaloblastic anemia and in
developed countries is often overlooked. It is more common in the
elderly but the estimated prevalence is around 6\% in people younger
than 60 years in the United Kingdom and United States {[}2{]}. Causes of
severe of B12 deficiency generally involve disruption of some aspect of
the physiologic pathway for B12 absorption comprising intrinsic factor
and the cubam receptor in the terminal ileum {[}3{]}. In the reported
case, there are several factors that could have contributed to B12
deficiency, his history of intestinal resection and his uncontrolled
celiac disease. Despite not being frequently reported, B12 deficiency in
patients with celiac disease has a prevalence of between 8\% and 41\%
{[}4, 5{]}.
Hematologic manifestations consist of all blood elements being affected
by this ineffective megaloblastic hematopoiesis. Initially, the cell
content and size of RBC usually precede the onset of anemia. Nuclear
hypersegmentation of neutrophils is another common early manifestation.
Neutropenia and thrombocytopenia can infrequently follow as late
features with a resulting pancytopenia that can ultimately become severe
enough to mimic a severe aplastic anemia.
Hematopoietic precursor cells produced in the bone marrow are defective
in B12 deficiency. As a result, they undergo cell death in the marrow
and are phagocytosed before they can exit into the blood as
reticulocytes. This intramedullary hemolysis manifests itself with
increased markers of cell turnover such as LDH and markers of increased
hemoglobin breakdown such as indirect hyperbilirubinemia and decreased
or absent haptoglobin. As a means of compensating, erythropoietin levels
rise and the bone marrow becomes more hypercellular (as shown in Fig.
1), however the reticulocyte count fails to rise {[}6{]}.
In our case, his pancytopenia and reticulocytopenia were evident and
consistent with a megaloblastic picture. However, his LDH seemed to be
elevated out of proportion to the degree of hemolysis he experienced.
When compared to patients with thrombotic thrombocytopenic purpura
(TTP), No\selectlanguage{ngerman}ël et al showed that patients who had pseudo-TMA had
significantly higher LDH levels, platelet counts and lower reticulocyte
counts in the adult population {[}7{]}. Hyperhomocysteinemia has also
been implicated (not checked in our patient) in increasing the risk of
hemolysis in vitamin B12 in vitro in addition to causing endothelial
damage leading to intravascular hemolysis and RBC fragmentation {[}8{]}.
This combination of intramedullary and intravascular hemolysis could
potentially account for the degree of LDH elevation seen in this case.
There have been three other cases of reported pediatric pseudo- TMA
secondary to B12 in the literature {[}9-12{]}. These cases all occurred
because of decreased intake and our case highlights the need to follow
patients with malabsorptive syndromes. Because many of the cases were
initially thought to have thrombotic thrombocytopenic purpura (TTP),
they received plasma exchange with gradual improvement of their
symptoms. This improvement is thought to be due to B12 contained in the
infused plasma during the exchange{[}13{]}.
The PLASMIC score has served as prediction tool for severe ADAMTS13
deficiency{[}14{]} but has not been evaluated in differentiating TTP
from a pseudo-TMA. While it is well recognized as a helpful adjunct in
the adult population, few studies have looked at its utility in children
and adolescents. Linder et al showed retrospectively that the PLASMIC
score was able to accurately identify pediatric patients at highest risk
for severe ADAMTS13 deficiency with a sensitivity of 100\% and a
specificity of 78.1\% {[}15{]}. In evaluating the PLASMIC scores of
pediatric cases in the literature; 75\% of the patients with B12 induced
pseudo-TMA would have been placed in a low risk category (TABLE 1). This
may prove to be a helpful adjunct to physicians when faced with this
clinical presentation.
The treating team deduced that his initial pancytopenia had been
secondary to his B12 deficiency given his history. This case posed a
diagnostic challenge and highlights to pediatric hematologists this
unusual presentation of B12 induced TMA and that it should be considered
in the differential with a patient presenting with a TMA syndrome.
References
1. Kottke-Marchant, K., \emph{Diagnostic approach to microangiopathic
hemolytic disorders.} Int J Lab Hematol, 2017. \textbf{39 Suppl 1} : p.
69-75.
2. Hunt, A., D. Harrington, and S. Robinson, \emph{Vitamin B12
deficiency.} Bmj, 2014. \textbf{349} : p. g5226.
3. Green, R., \emph{Vitamin B(12) deficiency from the perspective of a
practicing hematologist.} Blood, 2017. \textbf{129} (19): p. 2603-2611.
4. Dahele, A. and S. Ghosh, \emph{Vitamin B12 deficiency in untreated
celiac disease.} Am J Gastroenterol, 2001. \textbf{96} (3): p. 745-50.
5. García-Manzanares, A. and A.J. Lucendo, \emph{Nutritional and dietary
aspects of celiac disease.} Nutr Clin Pract, 2011. \textbf{26} (2): p.
163-73.
6. Orkin, S.H., D.E. Fisher, and D. Ginsburg, \emph{Nathan and Oski's
hematology and oncology of infancy and childhood} . 2015, Philadelphia
(Pa.): Elsevier Saunders.
7. Noël, N., et al., \emph{Hemolysis and schistocytosis in the emergency
department: consider pseudothrombotic microangiopathy related to vitamin
B12 deficiency.} Qjm, 2013. \textbf{106} (11): p. 1017-22.
8. Ventura, P., et al., \emph{A role for homocysteine increase in
haemolysis of megaloblastic anaemias due to vitamin B(12) and folate
deficiency: results from an in vitro experience.} Biochim Biophys Acta,
2004. \textbf{1739} (1): p. 33-42.
9. Asano, T., et al., \emph{Neglect-induced pseudo-thrombotic
thrombocytopenic purpura due to vitamin B12 deficiency.} Pediatr Int,
2015. \textbf{57} (5): p. 988-90.
10. Delbet, J.D. and T. Ulinski, \emph{Thrombotic microangiopathy and
breastfeeding: where is the link? Answers.} Pediatr Nephrol,
2018.\textbf{33} (6): p. 987-989.
11. Delbet, J.D. and T. Ulinski, \emph{Thrombotic microangiopathy and
breastfeeding: where is the link? Questions.} Pediatr Nephrol,
2018.\textbf{33} (6): p. 985-986.
12. Dimond, A., J.N. George, and C. Hastings, \emph{Severe vitamin B-12
deficiency in a child mimicking thrombotic thrombocytopenic
purpura.}Pediatr Blood Cancer, 2009. \textbf{52} (3): p. 420-2.
13. Green, R., \emph{Anemias beyond B12 and iron deficiency: the buzz
about other B's, elementary, and nonelementary problems.} Hematology,
2012. \textbf{2012} (1): p. 492-498.
14. Bendapudi, P.K., et al., \emph{Derivation and external validation of
the PLASMIC score for rapid assessment of adults with thrombotic
microangiopathies: a cohort study.} Lancet Haematol, 2017.\textbf{4}
(4): p. e157-e164.
15. Linder, G.E., et al., \emph{Assessment of the Plasmic Score Utility
for Classification of Pediatric Thrombotic Microangiopathies.} Blood,
2019. \textbf{134} (Supplement\_1): p. 1075-1075.
Figure Legend
Table 1: WBC: white blood cell count, Hb: hemoglobin, MCV: mean
corpuscular volume, Plt: platelet count,
ANC: Absolute Neutrophil Count, Retic: reticulocyte count, LDH: lactate
dehydrogenase.
\textbf{Hosted file}
\verb`Table 1.docx` available at \url{https://authorea.com/users/346736/articles/472627-vitamin-b12-malabsorption-and-pseudo-thrombotic-microangiopathy-in-an-adolescent}\selectlanguage{english}
\begin{figure}[H]
\begin{center}
\includegraphics[width=0.70\columnwidth]{figures/Bone-marrow-aspirate-showing-erythroid-hyperplasia-and-megaloblastic-changes-of-nuclei/Bone-marrow-aspirate-showing-erythroid-hyperplasia-and-megaloblastic-changes-of-nuclei}
\end{center}
\end{figure}
\selectlanguage{english}
\FloatBarrier
\end{document}
|
https://sources.debian.org/data/main/s/sql-ledger/2.8.30-1/templates/Slovak-credit_note.tex | debian.org | CC-MAIN-2020-05 | text/x-tex | application/x-tex | crawl-data/CC-MAIN-2020-05/segments/1579250591431.4/warc/CC-MAIN-20200117234621-20200118022621-00052.warc.gz | 680,853,827 | 1,839 | \documentclass{scrartcl}
\usepackage[latin2]{inputenc}
\usepackage{tabularx}
\usepackage[top=2.7cm,bottom=-1cm,left=1.9cm,right=0.5cm]{geometry}
\usepackage{graphicx}
\setlength{\parindent}{0pt}
\begin{document}
\pagestyle{empty}
\fontfamily{cmss}\fontsize{10pt}{12pt}\selectfont
\parbox{\textwidth}{%
\parbox[b]{.42\textwidth}{%
<%company%>
<%address%>
}
\parbox[b]{.2\textwidth}{
\includegraphics[scale=0.3]{sql-ledger}
}\hfill
\begin{tabular}[b]{rr@{}}
Tel: & <%tel%>\\
Fax: & <%fax%>
\end{tabular}
\rule[1.5em]{\textwidth}{0.5pt}
}
\centerline{\textbf{S T O R N O} \hspace{0.3cm} \textbf{P O H L A D A V K A}}
\vspace*{0.5cm}
\parbox[t]{.5\textwidth}{
<%name%>
<%address1%>
<%address2%>
<%city%>
<%if state%>
\hspace{-1mm}, <%state%>
<%end state%>
<%zipcode%>
<%country%>
\vspace{0.3cm}
<%contact%>
\vspace{0.2cm}
<%if customerphone%>
Tel: <%customerphone%>
<%end customerphone%>
<%if customerfax%>
Fax: <%customerfax%>
<%end customerfax%>
<%email%>
<%if customertaxnumber%>
DIČ: <%customertaxnumber%>
<%end customertaxnumber%>
}
\hfill
\begin{tabular}[t]{ll}
\textbf{Faktúra} & <%invnumber%> \\
\textbf{Dátum} & <%invdate%> \\
\textbf{Splatnost} & <%duedate%> \\
<%if ponumber%>
\textbf{PO} & <%ponumber%> \\
<%end ponumber%>
<%if ordnumber%>
\textbf{Objednávka} & <%ordnumber%> \\
<%end ordnumber%>
\textbf{Osoba} & <%employee%> \\
\end{tabular}
\vspace{1cm}
\begin{tabularx}{\textwidth}[t]{@{}llrX@{\hspace{1cm}}l@{}}
<%foreach amount%>
<%accno%> & <%account%> & <%amount%> & <%description%> & <%projectnumber%> \\
<%end amount%>
\multicolumn{2}{r}{\textbf{Medzisúčet}} & <%subtotal%> & \\
<%foreach tax%>
\multicolumn{2}{r}{\textbf{<%taxdescription%> @ <%taxrate%> \%}} & <%tax%> & \\
<%end tax%>
\multicolumn{2}{r}{\textbf{Celkom}} & <%invtotal%> & \\
\end{tabularx}
\vspace{0.3cm}
<%text_amount%> ***** <%decimal%>/100 <%currency%>
<%if notes%>
\vspace{0.3cm}
<%notes%>
<%end notes%>
\vspace{0.3cm}
<%if paid_1%>
\begin{tabular}{@{}lllr@{}}
\multicolumn{4}{c}{\textbf{Platby}} \\
\hline
\textbf{Dátum} & & \textbf{Doklad} & \textbf{Hodnota} \\
<%end paid_1%>
<%foreach payment%>
<%paymentdate%> & <%paymentaccount%> & <%paymentsource%> & <%payment%> \\
<%end payment%>
<%if paid_1%>
\end{tabular}
<%end paid_1%>
\vspace{0.5cm}
<%foreach tax%>
\textbf{\scriptsize <%taxdescription%> DIČ <%taxnumber%>} \\
<%end tax%>
\end{document}
|
http://refbase.cvc.uab.es/search.php?sqlQuery=SELECT%20author%2C%20title%2C%20type%2C%20year%2C%20publication%2C%20abbrev_journal%2C%20volume%2C%20issue%2C%20pages%2C%20keywords%2C%20abstract%2C%20thesis%2C%20editor%2C%20publisher%2C%20place%2C%20abbrev_series_title%2C%20series_title%2C%20series_editor%2C%20series_volume%2C%20series_issue%2C%20edition%2C%20language%2C%20author_count%2C%20online_publication%2C%20online_citation%2C%20doi%2C%20serial%20FROM%20refs%20WHERE%20serial%20%3D%20958%20ORDER%20BY%20first_author%2C%20author_count%2C%20author%2C%20year%2C%20title&client=&formType=sqlSearch&submit=Cite&viewType=&showQuery=0&showLinks=1&showRows=15&rowOffset=&wrapResults=1&citeOrder=&citeStyle=APA&exportFormat=RIS&exportType=html&exportStylesheet=&citeType=LaTeX&headerMsg= | uab.es | CC-MAIN-2022-27 | application/x-latex | application/x-latex | crawl-data/CC-MAIN-2022-27/segments/1656103940327.51/warc/CC-MAIN-20220701095156-20220701125156-00278.warc.gz | 44,614,747 | 1,315 | %&LaTeX
\documentclass{article}
\usepackage[utf8]{inputenc}
\usepackage[T1]{fontenc}
\usepackage{textcomp}
\begin{document}
\begin{thebibliography}{1}
\bibitem{958} Joan Serrat, Ferran Diego, Felipe Lumbreras, Jose Manuel Alvarez, Antonio Lopez, \& C. Elvira. (2008). Dynamic Comparison of Headlights. \textit{Journal of Automobile Engineering}, \textit{222}(5), 643--656.
\end{thebibliography}
\end{document}
|
https://uubu.fr/tex/abrt-cli.tex | uubu.fr | CC-MAIN-2021-25 | text/x-tex | application/x-tex | crawl-data/CC-MAIN-2021-25/segments/1623488286726.71/warc/CC-MAIN-20210621151134-20210621181134-00463.warc.gz | 525,358,345 | 1,407 | \documentclass{report}
\usepackage[utf8]{inputenc}
\usepackage[T1]{fontenc}
\usepackage{textcomp}
\usepackage{geometry}
\geometry{top=15mm, bottom=15mm, left=1cm, right=1cm}
\usepackage[french]{babel}
\usepackage{pslatex}
\usepackage[colorlinks=true,urlcolor=black]{hyperref}
\usepackage{graphicx}
\usepackage{fancyhdr}
\pagestyle{fancy}
\renewcommand{\footrulewidth}{0.4pt}
\fancyfoot[L]{Uubu.fr}
\fancyfoot[R]{mar. mai 16 14:41:19 CEST 2017}
\lfoot{\Large \textit{Uubu.fr}}
\hypersetup{pdfinfo={
Title={abrt-cli},
Author={Sylvain Girod},
Creator={Bash script from uubu.fr's format version 1},
Producer={Bash script and PDFLaTeX},
Subject={Gérer les reports abrt},
CreationDate={D:20170516144119},
ModDate={D:20170516144119},
Keywords={reporting;reporting;crash reporting}
}}
\begin{document}
\begin{center}
{\Huge abrt-cli }
\end{center}
\vspace{1cm}
\begin{flushleft}
{\large Gérer les reports abrt}
\vspace{10mm}
\vspace{1cm}{\huge OPTIONS }
\
\begin{description} \normalsize
\item[\hspace{1mm} -a, --authenticate]{Active l'authentification PolKit pour pouvoir travailler avec les problèmes système}
\item[\hspace{1mm} -v, --verbose]{mode verbeux}
\item[\hspace{1mm} -b, --bare]{Affiche seulement un compteur de problèmes sans messages}
\item[\hspace{1mm} --detailed]{Affiche un rapport détaillé}
\item[\hspace{1mm} -n, --not-reported]{Liste seulement les problèmes non-reportés}
\item[\hspace{1mm} --size SIZE]{Largeur de texte en octet. Au delà, le texte est abrégé}
\item[\hspace{1mm} --since NUM]{Sélectionne seulement les problèmes détectés après la date donnée}
\item[\hspace{1mm} -u, --unsafe]{Ignore les vérifications de sécurité pour pouvoir afficher tous les problèmes}
\item[\hspace{1mm} --until NUM]{Sélectionne seulement les problèmes détectés avant la date donnée}
\end{description}
\end{flushleft}
\end{document}
|
https://dev.thep.lu.se/yat/log/tags/0.3.1/doc/Statistics.tex?format=changelog&rev=1486&limit=100&mode=stop_on_copy | lu.se | CC-MAIN-2022-21 | text/plain | application/x-tex | crawl-data/CC-MAIN-2022-21/segments/1652662588661.65/warc/CC-MAIN-20220525151311-20220525181311-00189.warc.gz | 268,229,508 | 853 | #
# ChangeLog for tags/0.3.1/doc/Statistics.tex
#
# Generated by Trac 1.2.3
# May 25, 2022, 7:14:07 PM
Sat, 28 Apr 2007 15:07:34 GMT Jari Häkkinen [847]
* tags/0.3.1 (copied)
Tagging release 0.3.1
Wed, 25 Apr 2007 06:25:09 GMT Jari Häkkinen [838]
* branches/0.3.1 (copied)
Bug fix branch for release 0.3
|
https://www.zentralblatt-math.org/matheduc/en/?id=21693&type=tex | zentralblatt-math.org | CC-MAIN-2019-43 | text/plain | application/x-tex | crawl-data/CC-MAIN-2019-43/segments/1570986710773.68/warc/CC-MAIN-20191020132840-20191020160340-00142.warc.gz | 1,152,386,671 | 1,422 | \input zb-basic
\input zb-matheduc
\iteman{ZMATH 2012f.00547}
\itemau{Paditz, Ludwig}
\itemti{The basics of set theory -- some new possibilities with ClassPad.}
\itemso{Paditz, Ludwig (ed.) et al., Proceedings of the 11th international conference of The Mathematics Education into the 21st Century Project -- MEC 21: On turning dreams into reality. Transformations and paradigm shifts in mathematics education, Grahamstown, South Africa, September 11--17, 2011. Grahamstown: The Mathematics Education into the 21st Century Project -- MEC 21 (ISBN 83-919465-0-9/pbk). 254-260 (2011).}
\itemab
Summary: Sets are one of the most fundamental concepts in mathematics but we can not calculate with set operations and set relations on the ClassPad. On the other hand we can write in the text mode with special symbols of the set theory in the ClassPad, e.g. $\in,\not\in,\cup,\cap,\setminus, \subset,\subseteq,\ne,\dots$ Thus some students of informatics tried to introduce the set theory in the operating system version 3.05 (published 2010). They followed two ways of solution: 1. Create a so called Add-In for ClassPad to calculate with sets of real numbers. 2. Create a Basic-program for ClassPad to calculate with finite sets of numbers or words.
\itemrv{~}
\itemcc{E65 U55 R25}
\itemut{set theory; computer programs; add-in; computer programming}
\itemli{}
\end |
http://itex.coastal.cheswick.com/itex_server/latex/pg/40067/40067.tex | cheswick.com | CC-MAIN-2017-17 | application/x-tex | null | crawl-data/CC-MAIN-2017-17/segments/1492917123102.83/warc/CC-MAIN-20170423031203-00454-ip-10-145-167-34.ec2.internal.warc.gz | 211,032,379 | 113,335 | \documentclass[12pt]{book}
\usepackage{parskip}
\usepackage[T1]{fontenc}
\usepackage[latin1]{inputenc}
%% \usepackage{mathptmx} % times roman
%%\usepackage{lucidabr} % lucida bright
\usepackage{pos} % generate iTeX page position data
\usepackage[pdftex,bookmarks=true,bookmarksopen=true,
bookmarksnumbered=true,bookmarksopenlevel=3,
colorlinks,urlcolor=blue,linkcolor=blue,
pdftitle={The Iron Boys on the Ore Boats},
pdfauthor={James R. Mears},
citecolor=blue]{hyperref}
\newcommand{\mdsh}[1]{\mbox{#1}\linebreak[1]}
\newcommand{\nodate}{\date{}}\nodate
\newcommand{\gutchapter}[1]{%
\cleardoublepage
\chapter{#1}
\markboth{The Iron Boys on the Ore Boats}{#1}
}
% \setcounter{chapter}{1}
\begin{document}
\pagenumbering{alph} % bogus, never shown, names don't collide with below
\title{The Iron Boys on the Ore Boats}
\author{James R. Mears}
\maketitle
\pagenumbering{roman}
\frontmatter
Project Gutenberg's The Iron Boys on the Ore Boats, by James R. Mears
This eBook is for the use of anyone anywhere at no cost and with
almost no restrictions whatsoever. You may copy it, give it away or
re-use it under the terms of the Project Gutenberg License included
with this eBook or online at www.gutenberg.org
Title: The Iron Boys on the Ore Boats
or, Roughing It on the Great Lakes
Author: James R. Mears
Release Date: June 23, 2012 [EBook \#40067]
Language: English
Character set encoding: ASCII
*** START OF THIS PROJECT GUTENBERG EBOOK THE IRON BOYS ON THE ORE BOATS ***
Produced by Dianna Adair, Stephen Hutcheson, Rod Crawford,
Dave Morgan and the Online Distributed Proofreading Team
at http://www.pgdp.net
The Iron Boys on the
Ore Boats
OR
Roughing It on the Great Lakes
By
JAMES R. MEARS
Author of The Iron Boys in the Mines, The Iron Boys as Foremen,
The Iron Boys in the Steel Mills, \textit{etc}.
Illustrated
PHILADELPHIA
HENRY ALTEMUS COMPANY
COPYRIGHT, 1913, BY
HOWARD E. ALTEMUS
Illustration: Both Boys Were Hurled Forward
CONTENTS
CHAPTER PAGE
I. TO THE INLAND SEAS 7
II. THE IRON BOYS AS CARGO 20
III. A SURPRISED SKIPPER 31
IV. THE BOYS STAND THE TEST 42
V. TROUBLE IN THE STOKE HOLE 54
VI. THE FIRST STEP UPWARD 63
VII. THE IRON BOYS ON DECK 70
VIII. THE CRASH IN THE FOG 82
IX. A TRAGEDY OF THE LAKES 93
X. TOSSED UP BY THE WAVES 104
XI. BY PLUCK ALONE 113
XII. ON THE ROAD TO CONNEAUT 122
XIII. IN THE GRIP OF A GIANT SHELL 129
XIV. STEVE SAVES THE CAPTAIN 135
XV. AT THE WHEEL 151
XVI. THROUGH THE ROCKY CUT 163
XVII. THE BLOW IN THE DARK 172
XVIII. VISITORS ON THE ``RICHMOND'' 181
XIX. IN THE GRIP OF THE WAVES 190
XX. AN EXCITING RESCUE 202
XXI. A NEW HAND AT THE WHEEL 210
XXII. LEADING A LIVELY CHASE 219
XXIII. THE WIRELESS MESSAGE 223
XXIV. CONCLUSION 245
The Iron Boys on the Ore Boats
CHAPTER I
This text was converted to LaTeX by means of \textbf{GutenMark} software (version Jul 12 2014).
The text has been further processed by software
in the iTeX project, by Bill Cheswick.
\cleardoublepage
\tableofcontents
\cleardoublepage
\mainmatter
\pagenumbering{arabic}
\gutchapter{TO THE INLAND SEAS}
``What are we to do?''
``The first duty of an inspector is to inspect, I should say,'' answered Steve Rush, with a soft laugh, in answer to his companion's question.
Bob Jarvis made a wry face.
``You think you are very smart this morning, seeing that you have been complimented by the president of the mining company,'' grumbled Jarvis. ``I don't know whether I like this new job or not. We were making pretty good money in the mines and we were bosses at that. Are we going to do any bossing when we get on the lakes?''
``I think not. We shall be ordinary seamen. Somebody else will do the bossing in this instance and we shall be the victims. Mr. Carrhart will tell us all about it in a minute. He is arranging for our work now. It will be a great change, and while we shall be working pretty hard we shall be adding to our store of knowledge, Bob. We are lucky to possess so fully the confidence of our superiors. Let's try to show that we are worthy of their confidence in our new places.''
``When do we start?''
``I don't know. Mr. Carrhart is looking that matter up now.''
The lads were sitting in the private office of the president of the mining company, whither they had been summoned from their work at the mines. Mr. Carrhart, the president, stepped briskly into the office at that juncture.
``Well, lads, I have arranged for your transportation.''
``May I ask on what ship we are to sail, sir?'' questioned Steve.
``The `Wanderer.' She is not one of our newest ships, but she is a staunch old vessel with about as many conveniences as are to be found on the newer and more modern boats. I sometimes think we are getting further away from what a ship should be---but then, I am not a sailor. I am not supposed to know anything about ships,'' laughed the president.
``When do we sail?''
``Some time to-night. The `Wanderer' is not yet in. She passed the Soo nearly forty hours ago and should dock some time this afternoon. She is coming up light this time, for a change.''
``How long does it take to load the ship with ore?'' asked Steve, his active mind already in search of knowledge along the line of their new calling.
``Eight hours or so.''
``That is quick time,'' nodded Jarvis.
``It strikes me as being a long time,'' remarked Rush.
``That is the point exactly,'' agreed Mr. Carrhart. ``If you boys can find a way to shorten the loading time you will have served your purpose well. That is exactly why we are sending you out on this inspecting tour---that is, it is one of the reasons. We want to know where we can save money and time in the shipment of ores to the furnaces.''
``But, sir, we know nothing about this branch of the business,'' protested Steve. ``Are there not others better qualified than ourselves?''
``They think they are,'' answered the president reflectively. ``We have tried them out. Most of them are wedded to old methods. What we want is new methods as well as new blood. Besides, you lads have expressed yourselves as being anxious to learn everything about the mining and steel business. I am taking you at your word. You are thoroughly posted on the mining end. I do not believe you could be much more so were you to spend three years more underground. The shipment of the ore is the next step. You have followed the ore down from the mines to the shipping point, here in Duluth. Now I am going to have you spend a few months on the Great Lakes.''
``That will be a fine experience, sir.''
``I think so.''
``Is the purpose of our going to sea on the lakes known, or is it not to be known to any one outside of ourselves?''
``Certainly not. The mission might fail of its purposes were such to be the case. To all intents and appearances, you two boys will be plain, everyday sailors. You will find many hardships in the life of a Great Lakes sailor, but then, if I know you, I do not believe you will mind these very much,'' added Mr. Carrhart, with an indulgent smile.
``We certainly shall not,'' answered Rush, with emphasis. ``The harder the work the better it seems to agree with me.''
``But not with me,'' retorted Jarvis.
The president laughed.
``That doesn't agree with what the reports show. For industry and attention to duty you are a close second to your friend Rush. I presume, Rush, that we shall be losing you one of these days?''
``What do you mean, sir?''
``You will wish to go on to the mills, eh?''
Steve thought briefly.
``Yes, sir; that is our ambition.''
``I thought so. You may depend upon me to use my influence to further your ambition, though I shall very much dislike to lose you.''
``You are very kind, sir.''
``What I hoped you would do was to remain with the mining end of our business, where one of these days you would rise to the grade of general superintendent. Perhaps after you have had your experiences at the other end of the line, you will decide to come back. If I am still president of the mining company you will be well taken care of, should you return.''
``Thank you, sir; perhaps we shall be back sooner than you think.''
``And now for the subject at issue. Here is a letter to the master of the `Wanderer,' Captain Simms, stating that you are to be taken on board his ship as seamen. He does not know that it is your first cruise, but I have an idea that he will learn the truth soon enough.''
There was a grim smile on the face of the president.
``You will find Captain Simms a gruff old seadog. He is one of our oldest and most trustworthy masters, and after you come to know him I am sure you will like him very much. You have a fairly clear idea of what is expected of you by the company. You boys are both keen and resourceful and I expect a great deal from you. I know that you will see all there is to be seen, and no doubt will see some things that have been overlooked by older heads than yours.''
``Have you any further directions to give before we leave you, sir?'' inquired Steve.
``None whatever. I wish you success, which I am sure you will have. You need not go to the ore docks until this evening, unless you wish to, as you probably will have some things to do in town.''
After bidding the president good-bye, the boys took their leave. It seemed only a few weeks since Steve Rush had first entered the office of the president of the mining company looking for a job. The same office boy with whom he had had trouble at the start of his career was on guard at the door, but Steve had grown away from him. Steve, who with his companion, Bob Jarvis, will be recognized at once as one of the Iron Boys, was tall for his age and muscular. His manner of life had done much for his physical well-being, and he was not the same boy who had fought his way into the president's office, the account of which is set forth in ``\textit{The} \textit{iron} \textit{boys} \textit{in} \textit{the} \textit{mines}.''
It was there that Steve Rush and Bob Jarvis first became friends, after they had met and fought a battle in a lonely drift in the Cousin Jack Iron Mine; it was there that both lads proved their heroism by saving the president and several other officials of the company, when the entire company was threatened with death from a burning bag of dynamite.
It was in the Cousin Jack Mine that Steve and his newly found friend saw the need of and invented a new tram railroad system, by which the mining company was saved many thousands of dollars a year.
Again in ``\textit{The} \textit{iron} \textit{boys} \textit{as} \textit{foremen},'' was told how the lads proved themselves by saving the powder magazine from blowing up while the mine was burning and the flames were creeping toward the deadly explosives. It will be recalled that it was mainly through the heroic efforts of the Iron Boys that the Red Rock Mine was saved from almost total destruction, and that through their further efforts many lives were undoubtedly saved. From then on they continued to distinguish themselves, playing a conspicuous part in the great strike, in the end exposing and unmasking a wicked and unscrupulous man who was leading the miners on to commit deeds of violence.
They were the same boys who were now starting out on a new career for the same company. In this instance the lads were to become sailors on the inland seas, known as the Great Lakes. The lads were taking up this new calling for the twofold purpose of learning still another branch of the great corporation's business and they fondly hoped their work would prove of importance to their employers.
The office of the president was located in Duluth, many miles from the Iron Range where the boys had been working for the last two years.
Their first act after leaving the offices was to make their way down to the water front to the ship canal, leading from the harbor out to Lake Superior. Steve pointed out the aeerial bridge to his companion. This was a car carried through the air suspended from a giant truss over the river, by which passengers were transferred across to Superior on the other side. Bob had never seen this wonder before and was deeply interested in it. To Steve Rush it was of particular interest, for he had acquired no slight knowledge of engineering during his experience in the mines up on the range.
Boats were moving in and out, huge lake freighters, ore boats and passenger ships, for the lake traffic was in full cry now. After strolling about for a time, Steve took his companion home with him, and the rest of the afternoon was spent with Steve's mother. Supper finished, the lads decided that they would get down to the ore docks, as the ship would likely be in by that time.
Darkness had set in when they reached the docks. These docks, as those who have had the misfortune to have to make their way over them are aware, consist of tiers upon tiers of trestle. Over the tops, high in the air, ore trains rumble in by day and by night, discharging their cargoes of red ore into huge hoppers, from which the ore is loaded into the boats, or Great Lakes ore carriers, as they are called.
Neither boy had ever been out on one of these trestles before, and the task looked to be rather formidable.
``How are we going to do it?'' demanded Bob, surveying the great structure apprehensively.
``I guess the only way will be to keep going until we get somewhere or fall off. I don't see the ship, but we shall see it when we get to the top of the trestle.''
Both boys narrowly missed being run down by an ore train as it was shunted out on the trestle. The lads were in a dangerous place, but they did not feel at all disturbed about it. Men were flitting about in the dim light of half a dozen electric globes distributed along the top of the trestle that loomed all of seventy-five feet above the water.
``There's a ship down there,'' cried Steve.
``Yes, and there's one on the other side,'' answered Bob. ``Why, there are ships at all of the docks along here. Are you sure we have hit the right dock?''
``I am not sure of anything, except that we are likely to break our necks if we don't look sharp,'' answered Rush, with a laugh. ``We will ask the first man we meet where the `Wanderer' is. There comes some one now.''
Rush hailed the man, a foreigner. The latter neither answered nor paid the slightest attention to the question put to him.
``Thank you,'' murmured Rush.
``Mighty sociable lot of men up here,'' jeered Bob. ``But then I suppose they have to keep their minds on their work or fall off the trestle. I prefer to work underground. In the mines, there's no danger of falling down.''
Ore was being shot down through the chutes into boats on each side of the great trestle. There was the roar as of a great cataract as the red dirt went hurtling down into the hold of the ships many feet below.
``Let's get down on one of the other levels, Steve. Then we'll drift over to the heading at the other end.''
``Anybody'd think you were down in a mine. These aren't levels; they are tiers. You remind me of one of our miners who came down here to Duluth. He went to a hotel, and in telling some of the boys about it, he said: 'We got in a swell cage with looking glasses all around the inside. The cage tender jerked us up to the sixteenth level. We went along this till we came to a crosscut; then they led us into a swell drift an' we struck the heading and sat down.' What do you think of that?''
``That sounds like a lumber-jack more than it does a miner. He must have had a sky parlor. I wonder what hotel he got into.''
Suddenly a great shouting was set up far below where the boys were standing, and further on toward the end of the trestle.
``Now what's the matter?'' wondered Steve. Two long blasts of a steamship's whistle sounded.
``There goes a ship. They're pulling out. I'll bet that's the `Wanderer,''' shouted Bob.
``If if is, she will pull out without us. No, it can't be the `Wanderer,' for she did not come in until after sundown and it is not possible that the ship could be loaded by this time. We'll simply have to find our way down through the trestle somewhere and locate our ship. If we knew which side the boat lay it would be easier for us. Can you see which boat is leaving, Bob?''
``I think it is a boat from one of the other piers. I don't see anything going away near us.''
``Suppose we move out toward the end. Then we shall be able to see where we are and what we are doing.''
``And fall off?''
``Certainly not. We will walk along by the side of the track. There is a railing here. No danger at all of falling.''
The boys had their suit cases in their hands. They carried little baggage, having been informed that there was no room on board for trunks or luggage. Besides, the lads needed few clothes outside of several suits of underwear.
As they stepped along, walking side by side, Steve pointed up at a bright star.
``I wonder if we had better lay our course by that one------Grab me, Bob---I'm falling!'' suddenly cried Steve Rush.
Jarvis stretched out a quick hand, fastening upon Steve's collar. But the movement threw Jarvis off his balance. He, too, toppled forward.
Rush had stepped into an open chute through which the red ore was roaring down into the hold of the ship seventy-five feet below them. Steve struggled valiantly to prevent himself from going in, and Bob tried his best to keep from going in after.
``Let go, Bob; you'll go in, too!''
The warning came too late. Steve shot out of sight, leaving a fragment of his coat collar in the hand of his companion. Then Bob went in, head first.
Neither lad uttered a cry. They were not of the crying kind, and even had they uttered a shout their voices would have been drowned in the roar of the ore thundering into the hold of the big ship awaiting it down in the slip.
\gutchapter{CHAPTER II}
\section*{\raggedright THE IRON BOYS AS CARGO}
\textit{Through} some fortunate twist of his body, Jarvis righted himself while
going through the big hopper into which the ore was shooting. He landed
feet first at the bottom of the hopper.
In the meantime Steve Rush, with a few seconds' start of his companion,
had gone on down through the hopper. He hit the long wooden ore chutes
that led down into the ship; he struck the chute with a heavy bump and
then went on at a speed that took his breath away. Steve was in a
sitting posture. Jarvis followed him at the same rate of speed, lying
flat on his back.
There was ore on all sides of them; in fact, they were riding on the
swift-moving ore; all about them was darkness, and even had there been
lights it is doubtful if the Iron Boys would have seen them, because of
the speed at which they were traveling.
Steve's mind was working with its usual rapidity. Had he known exactly
what awaited them below he might have been able to plan with more
certainty. He did reason, however, that they would probably have to pass
through a small opening when they reached the bottom of the chute. In
this he was wrong, though right across the chute where it entered the
ship was a heavy iron brace dividing the chute in half, which was placed
there to give the ship more rigidity.
``Lie flat!'' shouted Rush, with quick instinct, himself dropping on his
back. He did not know whether Bob were following him or not. Jarvis was,
but he was in no need of the admonition to lie flat. He was as flat as
it was possible for him to be and he could not have straightened up had
it been to save his life.
Jarvis was close enough, however, to hear the warning cry. He opened his
mouth to answer, getting it full of red ore as a result. The ore got
down in his throat, sending him into a paroxysm of choking, sneezing and
growling that was lost in the noise about him.
Suddenly Steve felt himself shooting through space. He realized, in that
instant, that he had left the chute. A few seconds more and he struck
heavily on his feet, bounded into the air, then plunged forward head
first.
The lad landed on his stomach, slipped down a conical pile of ore to the
bottom, his head striking the side of the ship, doubling him up and
leaving him stunned and unconscious.
Jarvis, who was not far behind him, went through very much the same
experience, save that he turned a somersault when he left the chute,
landing flat on his back on the pile of ore. His feet drove against the
side of the ship with the force of a battering-ram, backed by the full
weight of the lad's body. The effect was nearly the same as it had been
in the case of Rush. Bob was stunned. He, too, lay still, after curling
up against the vessel's side.
``Hey, what's that?'' a voice had shouted as the boys disappeared through
the hatches.
``What's what?''
``I thought I saw something besides ore go through the chute in number
seven hatch.''
``You're seeing things!''
``Maybe I am.''
``Close number seven hatch!'' shouted the second mate, and the two deck
hands, after the chute had been hoisted a little above the deck, slid
the heavy hatch cover into place. All the ore that was needed had gone
in through that hatch. The ship was nearly loaded. All that was now
required was a few car-loads at the ends to trim the ship properly,
after which she would be ready to sail.
Within the next ten minutes the rest of the ore had been shipped. With
loud crashings, interspersed with hoarse shouts, harshly-uttered
commands and an occasional toot of warning from the ship's whistle, the
hatch-covers were put in place and the ship made ready for her journey
down the Great Lakes.
There followed a moment of inactivity; then came a blast of the whistle
fully a minute in duration. It was the signal that the ship was about to
back out of her slip, warning all other craft to keep clear.
The propeller began to churn the waters of the harbor and the ore
carrier, with its cargo of ten thousand tons of iron ore, backed slowly
out into the stream.
Bob Jarvis rolled over until he was practically standing on his head and
shoulders. He toppled over on his back with a jolt that woke him up. The
lad gave a kick and some one grunted.
``Hey, there, take your foot out of my stomach, whoever you are. Is that
you, Bob?''
``I---I don't know. Hello, Steve, that you?''
``I guess it's both of us. Ugh! My mouth is so full of ore that I can
hard---hardly talk.''
``I've got a dark red taste in my own mouth. I've swallowed enough ore to
make a steel rail. Do you know where we are?''
``We have fallen into the hold of a ship, and we are lucky that we are
not dead.''
``Maybe we are and don't know it,'' jeered Jarvis, pulling himself up. He
tried to get to his feet, but the ore slipped from under him, leaving
him at the bottom against the side of the vessel again.
``Quit it!'' shouted Steve. ``Are you trying to bury me?''
The latter was on his feet too, brushing the dirt from mouth, eyes, nose
and ears. Bob had sent a quantity of it sliding down the chute.
``I can't help it. What's the matter with you? What do you think about
this business?''
``I don't think, I know. We are in a nice fix.''
``Think so?''
``I told you I didn't think,'' retorted Steve in a tone of slight
irritation.
``Glad you admit it.''
``We have been dumped into the hold of an ore vessel. I don't know
whether or not there is any way to get out, and it is sure that the
hatches will not be opened again until the vessel reaches her
destination.''
``How long will that be?''
``That depends upon where they are going. If they are bound for any of
the Lake Erie ports I should imagine it would take a week or more.''
Bob groaned.
``I'm going to yell.''
``Yell, if you can. I've too much ore in my mouth to make much of a
noise.''
Jarvis raised his voice in a shout. It did not seem to attract any
attention. The lad shouted again and again. By this time the ship was
trembling from stem to stern under the jar of the propeller that was
beating the water at many hundred revolutions a minute.
``Nobody on this ship, I guess,'' muttered Bob. ``Come, suggest something.
You've always got something to say,'' urged Jarvis.
``I was about to say that you might as well save your breath. No one can
hear us through the thick decks; in fact, I presume every one has turned
in except those on watch forward, and the engine room crews at the rear
end of the ship.''
``Then I am going to lie down and go to sleep,'' declared Jarvis.
``Don't do anything of the sort. The ore is likely to slide down and bury
you. The less disturbance we make here the better it will be for us.''
``Why didn't you think of that before we fell in? I suppose we are pretty
deep down in the ship, aren't we?''
``About as close to the bottom as we can get without drowning. We will
keep as quiet as possible until we can plan some way of helping
ourselves out of this predicament.''
Bob grunted unintelligibly. For some time after this the Iron Boys
leaned against the side of the ship, Steve trying to plan some way out
of the difficulty, Bob growling inwardly over the hard luck that had
befallen them.
All at once the ship gave a quick, sudden lurch. Jarvis lost his
balance, falling over on his face. The ore came down in a deluge,
covering him from head to feet before he had sufficient time to scramble
out of the way. Steve, bracing himself against the side of the ship,
stooped over and helped his companion to his feet.
``The old tub's going to tip over,'' gasped Jarvis. ``What's the matter
with her?''
``Nothing is wrong. We have gotten out of the ship canal and into the
open water of Lake Superior. There must be considerable sea. Don't you
hear the waves smashing against the sides of the ship?''
``It isn't what I hear, but what I feel,'' answered Bob faintly. ``I feel
queer. My head's spinning like a top. Is yours?''
``No; I can't say that it is. Are you getting seasick?''
``How do I know? I have never been seasick. How does it feel to be that
way?''
``I have heard that when people are seasick they don't care very much
whether they live or die.''
``Then---then---I wish I could die right here, if it would make me forget
that awful goneness under my belt. Ugh!''
Bob settled down against the side of the ship, moaning.
``Don't be a baby. Get up and be a man.''
``I---I don't want to be a man. I---I'd rather be a wooden image, then I
wouldn't care what happened. In case the ship went down I could float
and------''
Bob's words were lost in an anguished moan. Steve felt far from
comfortable, but he set his teeth and made a resolve not to give up.
``The sea is coming up, Bob,'' announced Rush after a long period of
silence.
``The---the sea------? It's my opinion that something else will be coming up
soon if things don't stop moving around the way---the way they are doing
now.''
Steve laughed.
``Remember, Bob, that we are not likely to get anything in our stomachs
for some days. Be careful.''
Bob groaned.
``If I ever get anything solid under my feet I'll take it out of you for
that! That's a mean trick to play on a fellow when he's in the shape I'm
in at this minute. How long do you suppose the noise outside will keep
up?''
``I don't know. Probably all the way down Superior.''
``And how far is that?''
``Let me see. I think Mr. Carrhart said the trip to the---the Soo took
thirty-six hours.''
``Help!'' muttered Jarvis faintly.
``Now, I want you to brace up. Come on, get up. If you don't I'll trounce
you and make you forget your troubles.''
``Yes, you can talk, but if you felt as badly as I do, you wouldn't spout
that way. You; couldn't without---without------''
``Perhaps I \textit{do} feel badly, but I may have the will power to fight it
out.''
Steve reached down and pulled Jarvis up beside him. The latter
protested, but it did him no good, for he was apparently unable to offer
any resistance. Rush threw an arm about his companion and began talking
about other subjects in order to divert Bob's mind from his sufferings,
for his was a real case of seasickness.
In the meantime the sea seemed to be rising, though as a matter of fact
there was little sea on. The short, sharp waves of the lake were moving
the big, flat-bottomed steamer almost as roughly as they would have
moved a little row boat, for the ore carriers are proverbial rollers.
After a time Jarvis began to feel easier, and the lads, lulled by the
motion of the ship, grew sleepy. Steve did not dare allow himself to go
to sleep. He knew, full well, that such a thing would be dangerous. A
lurch of the vessel might cover their heads with dirt and smother them
to death before they were able to extricate themselves. Then again, they
might be buried too deeply to dig their way out at all.
``Lean up against me, Bob. No need of our both standing here suffering
for sleep. If you get too heavy I'll let you drop; then I guess you will
wake up.''
Bob leaned heavily on his companion. He would have done so in a moment
more at any rate, for his eyelids seemed to weigh a ton. The lad was
asleep almost instantly. After a time Steve's eyelids also drooped. He
could hold them up no longer. Then he went to sleep, braced against the
wall of the hull, his companion sleeping soundly in his arms.
There could be but one result of this. They had been asleep but a few
moments before, in a lurch of the ship, Rush toppled over with Jarvis on
top of him, a ton or more of ore banked up about them.
``Get up! Get up!'' shouted Steve, as soon as he was able to get his mouth
free of the red ore.
Jarvis muttered, and Steve was obliged to push his companion off by
sheer force. The lad pinched and pounded himself, to awaken his dulled
senses thoroughly, then he began to punch Jarvis about with his clenched
fists.
``Leggo! Quit that, or I'll------''
Bob tried to strike Steve, but instead, he measured his length on the
ore pile.
``I'm trying to get you awake, and if you don't want to be roughly
handled you'd better pull yourself together,'' warned Steve.
``I'll get even with you for this one,'' growled Jarvis. ``What's the use
in trying to keep awake?''
``I've answered that question already. Besides, I am going to try to find
some way out of this hold.''
``You'll have a nice time doing it,'' growled Jarvis.
``I expect to have. But I know there must be some way. You keep close to
me.''
``What are you going to do?''
``Feel my way along the side of the ship to see if I can get hold of a
ladder or something that we can climb up.''
``I couldn't climb a step ladder without falling off, the way I feel
now,'' objected Jarvis.
\gutchapter{CHAPTER III}
\section*{\raggedright A SURPRISED SKIPPER}
``\textit{No} use!'' groaned Jarvis. ``There isn't a ghost of a chance of our
getting out of this until the old tub gets to some place or other. We're
done for, this time. I wish I had stayed in the mines, where I belong,
instead of following along after you. You can get into more trouble than
any other fellow I ever knew.''
``Never mind,'' laughed Steve. ``We're the Iron Boys. Why shouldn't we
travel as part of the iron ore cargo? The only thing that troubles me is
that we have lost our ship. The `Wanderer' will sail to-night with two
men short, and---but I care more about what Mr. Carrhart will think when
he hears that we missed our boat. He will think us a couple of stupid
boys, and he will be justified in so thinking.''
``I don't care what he thinks,'' growled Bob. ``What's bothering me now is
my stomach, and the thought of how I'm going to get out of this.''
Steve did not reply. An idea had occurred to him. Gathering up a handful
of soft ore he tossed it up over His head. Some of the stuff showered
down over Bob Jarvis, causing that young man to protest vigorously. A
large portion of the stuff, however, did not come down. Steve heard it
drop on metal, roll a little way then stop.
``Quit that, now,'' protested Jarvis. ``What on earth are you trying to do?
I can't appreciate a joke to-night.''
``This is not a joke,'' answered Steve, gathering up another handful. ``I
am saving your life.''
``Huh! Pleasant way you have of doing the trick.''
Several large chunks of ore were tossed up with the same result. They
did not roll back into the hold.
``I've got it, Bob,'' exulted the Iron Boy.
``You're wrong there. I got most of it myself.''
``Listen! There is a platform or passageway running along this side of
the ship above our heads. I suspected there must be something of the
sort, for surely they have to get into the hold occasionally------''
``Above our heads, you say, eh?''
``Yes.''
``Precious lot of good that will do us,'' grunted Bob.
``That depends upon whether or not you have any spunk left.''
``I guess I've got as much of that kind of stuff as you have. But I'm
sick---I'm a sick man, Steve Rush!''
``Forget it, and then you'll be a brave man. At all events I'll tell you
what I want you to do.''
``Go ahead. I can't be any worse off than I am.''
``I am going to brace myself here against the side, and I want you to
climb up to my shoulders. You ought not to have any difficulty in
standing on them, when once you get up, for you will have the side of
the hull to lean against.''
``Can't do it; can't do it at all. Why don't you do it yourself, instead
of trying to make me do so when you know how sick I am?''
``All right, if you want me to stand on your neck. I am offering you the
easiest part of the plan.''
``I guess you won't stand on my neck! All right; I'll be the goat. What
am I to do when I get up to where I can stand on \textit{your} neck?''
``Reach up for the platform. If you can get it, all you have to do is to
pull yourself up. Then, after you are once up you can, perhaps, reach
over and give me a hand.''
``Fine, fine!'' jeered Jarvis. ``I wish I could talk as easily as you. Why,
I'd hire out to spout in a political campaign and------''
``Don't waste breath. I am ready.''
Feeling his way in the darkness, Bob finally got hold of his companion.
It was not a difficult task for him, strong and athletic as he was, to
climb to Rush's shoulders. The difficulty was in staying on the
shoulders after he once got there.
Bob didn't stay long. He toppled over backwards with a quick roll of the
ship, landing high up on the ore pile, sliding down to the bottom,
protesting and growling at the boy who had been the cause of his
downfall.
``Do it yourself!'' Jarvis shouted after getting to his feet once more.
``Come on, now! You're all right.''
After a little urging Jarvis succeeded in reaching his chum's shoulders
once more.
``Now, be careful! I will try to hold you,'' said Steve grasping his
companion's ankles.
``I've got hold of it. I've got the platform. It's only a little above my
waist. Leggo my legs.''
Steve stepped out from under so suddenly that Jarvis was left dangling
in the air.
The latter was too busy in trying to pull himself up, to enable him to
make any retort. He scrambled to the passageway or platform, out of
breath and dizzy. For a few moments Bob lay flat on the support beneath
him, groaning.
``Don't be a tenderfoot. What's the matter?'' called Steve.
``Everything's the matter. I'm all shot to pieces---I'm all falling apart
inside------''
``Take your time. When you feel able give me a hand. Is there any railing
around the walk?''
``Yes; how did you know?''
``I just guessed it, that's all.''
``All right; come on.''
Bob leaned as far over as he could, without falling, and tried to reach
the upraised hands of his companion.
``Can't make it. You've got to grow a little first,'' Jarvis jeered.
``We are going to make it. I'm going to back up on the ore and take a
running jump. You stand by ready to catch me. Better twist your legs
about a railing post if there is such a thing handy.''
``I'm waiting for you. I hope you bump your nose until it bleeds.''
But Steve Rush did not bump his nose. He took a running jump, nearly
losing his foothold in starting. By a lucky chance he landed half way
up the side of the hold, right against Bob's hands. Bob grasped him
about the waist.
``Now, pull me up,'' commanded Rush.
``I can't. I'm a sick man, I tell you.''
``Fudge! Just hang on and I will do the rest, but for goodness' sake
don't let go and fall off.''
``Why should I let go? You don't think I am so anxious to get down there
as all that, do you?''
Steve climbed nimbly up the body of his companion until he found himself
able to reach the rail with one hand. It was then but the work of a
moment to pull himself up to the platform.
``There, now we're all right,'' exclaimed Rush triumphantly.
``No, we're all wrong. I tell you I'm a sick man,'' protested Jarvis.
``If I hear you say that again, I am likely to throw you off. You make me
sick.''
``Hope I do. Then you'll know how I feel.''
``This is better than I had hoped for,'' said Steve, not heeding his
friend's ill-natured remark. ``They've got to get up early in the morning
if they want to down the Iron Boys, I tell you,'' he chuckled.
``It strikes me that we downed ourselves pretty thoroughly. Well, are we
going to get out of here to-night?''
``We are going to make an effort to do so at once. Keep hold of the rail
and follow me. Look out where you step. We don't want to take any more
tumbles, or------''
``Oh, that's all right. I couldn't feel any worse if I fell off from a
house or the top of a mine shaft.''
The two moved along cautiously, Steve feeling his way with feet and
hands. They were going toward the stern of the ship, though they were
not aware of the fact. The passageway, constructed for the purpose of
getting about on the inside of the hull, was narrow, built of metal, but
without anything on it to bar their progress.
They made their way around the stern, which, inside the ship, was next
to the engine room. Rush felt the throb of the engines near him and knew
then that they were near the stern. They were separated from the engine
room by a bulkhead and there was no opening into the engine compartment
from the cargo-carrying part of the hull.
``We shall have to work our way to the other end,'' Steve said.
The boys, with Steve in the lead, continued their cautious creeping
around the ship until finally they had reached the forward end. Steve's
hands came in contact with a door.
``Oh, pshaw, it's locked,'' he cried. ``This is too bad.''
``Kick it in,'' suggested Bob, as the most practical way out of the
difficulty.
``I can't; it's locked.''
``And after all the trouble we have been put to!''
``At least, Bob, we have found a place where we shall be able to lie down
and go to sleep in safety. That is surely worth all the trouble we have
been put to, as you call it.''
``That's so. I hadn't thought of it in that light before. And I'm such a
sick------''
``You know what I told you.''
Jarvis did not complete what he was saying.
``Good night.''
Bob threw himself down on the hard floor and went to sleep. Steve
decided that this was the best thing they could do, so he, too, lay down
and was sound asleep at once. Neither lad awakened for hours. Steve
finally opened his eyes and yawned. A ray of light that had penetrated
between a thin joint between a hatch cover and its frame, hit his left
eye squarely.
``Wake up, Bob,'' he cried.
``Go 'way! Don't bother me. I'm having my beauty sleep.''
Steve sprang up, shaking the other boy roughly.
``It's daylight. Come on; we've got to make a break to get out of here
now, if we do it at all. I just heard some one tramping along the deck
overhead.''
Bob sat up rubbing his eyes sleepily. He would much have preferred to
sleep longer, but he knew full well that, if he tried it, Steve Rush
would fall upon him and make life miserable for him for the next few
minutes. So Jarvis got up, grumbling.
``Where does that door lead to?'' he demanded, pointing to a door that
Steve had not yet seen.
A faint light in the hold made it possible to see a short distance away.
Steve glanced at the door, then sprang toward it.
``Hurrah, it is unlocked!''
``And don't forget that I found it. I can see like an owl, even if I am
sick------''
Steve had jerked the door open, revealing a dark chamber. It proved to
be the chain and anchor room where odds and ends of the ship were
stored.
After a little groping about in this chamber, they came upon a
companion-way, up which they hurried. There they met with another door,
but this one too was unlocked. Rush opened it and stepped into the full
light of day.
For the moment the light blinded both. The boys stood there, rubbing
their eyes, blinking, and breathing in the fresh air of the lake.
``Great!'' exclaimed Steve.
The ship was rolling gently. They glanced about them, but there was no
land in sight. Everything was a sea of green, with white-capped combers
tracing long lines of white against the deep green.
``Beautiful, isn't it, old chap?''
``It might be, if there were some land in sight. Where's everybody?''
``I don't know, but we will find out.''
Smoke was rolling from the funnel of the steamer, a ribbon of white
steam from the exhaust pipe trailing off astern and losing itself in the
black smoke.
``This is a beautiful sight, even if we have lost our boat and gone to
sea on an unknown craft,'' exclaimed Rush, his eyes glistening.
``Pshaw!'' grunted Jarvis.
``I guess it is about time we looked up some one and found out whether we
are headed for the Soo, or------''
``Or the North Pole,'' added Jarvis.
``Well, who are you?'' demanded a gruff voice just behind the lads.
The Iron Boys wheeled sharply.
They found themselves facing a thick-set man, whose face, from exposure
to wind and sunshine, was almost fiery red. He was surveying the boys
from head to foot with a look of stern disapproval.
Steve and Bob, with their torn and soiled clothes, \textit{did} present a most
disreputable appearance. Their hair was unkempt and full of red ore,
while their linen, white and clean when they left home on the previous
day, now also partook of the color of the iron ore in which they had
wallowed for several hours.
``May I ask who you are, sir?'' questioned Steve politely.
``I am the captain of this ship, and, unless you answer my question
pretty lively, I'll have you ironed and thrown into the hold.''
``We have just come from there, sir,'' interrupted Bob.
``That is quite evident from your appearance. You are stowaways, eh?''
``No, sir; we got into the ship by accident, last night, and could not
get out. We tried to attract attention, but were unable to do so.''
``What were you doing around the ship?''
``We were to ship on the `Wanderer.' We lost our way on the docks and
fell into the hold of this ship. We had a hard time getting out, but
here we are, hoping to get to our ship as soon as we get to the next
stop.''
It was the captain's turn to look astonished.
\gutchapter{CHAPTER IV}
\section*{\raggedright THE BOYS STAND THE TEST}
``\textit{You} want to get on board the `Wanderer,' eh?''
``Yes, sir.''
``What for?''
``I have told you we were to ship on her---we were to work on board.''
``What were you to do on board?''
``We were to work at whatever we were set at.''
``Hm-m-m!'' mused the red-faced skipper. ``Had your breakfast?''
``No, sir; we have not had anything to eat since we ate luncheon
yesterday noon.''
``Hm-m-m-m. Come with me.''
The captain led the way aft over the decks, along a walk at the side of
the hatches, which the lads observed were snugly battened down. Their
conductor passed on by the engine house, clear to the stern of the
vessel, where he entered the door of the deck-house.
``Jake!'' he called sharply, poking his head into the room.
A white-capped, white-aproned man suddenly made his appearance.
``Vat iss?'' demanded the ship's cook.
``Give these boys some breakfast.''
Jake surveyed the boys critically before replying.
``\textit{Ja},'' he said, turning back into his kitchen.
``Sit down at the table. When you have finished eating come forward and I
will talk with you.''
``Thank you. Where shall we find you, sir?'' asked Rush.
``If I'm not in the wheel house I'll be somewhere else.''
``I hope you won't take it into your head to meet us in the hold,''
interjected Jarvis. ``We have had hold enough to hold us for the rest of
our lives.''
``Don't get smart, young man,'' snapped the master, turning and leaving
the room.
``I wouldn't get funny with the captain, were I in your place,'' warned
Steve. ``He evidently doesn't appreciate your jokes. Smell that
breakfast?''
``You bet I do, but smelling won't help much.''
Jake soon brought in a satisfying meal, to which the boys helped
themselves liberally. The cook stood about watching them questioningly
for a time, but, as the boys seemed too busy to open a conversation with
him, he turned back to his galley with a deep grunt of disapproval.
After having finished their meal the Iron Boys went out on deck, where
for a time they stood leaning over the rail looking down into the
foaming water slipping past the side of the ship.
``We had better be going forward, Bob,'' suggested Steve.
On the way forward they passed several deck hands at work. Some were
sweeping, others washing down the decks with a hose and a scrub brush.
``That's going to be our job, I guess,'' grinned Bob.
``Then, it's me for the mines, Steve Rush!''
Inquiring for the captain, they were told that he was in his cabin just
under the pilot-house. They hurried there, and, knocking, were told to
enter. The captain's quarters they found, to their surprise, to be
luxurious. There was an observation room extending across the ship, with
eight windows in front, looking out on the sea ahead of the ship. Off
from this observation room and to the rear of it were two handsome
bedrooms, furnished with brass bedsteads and hung with silk draperies.
Bob looked around for a mat on which to wipe his feet.
The captain, seated at a desk, turned around in his chair, surveying the
boys critically.
``You certainly are not very handsome to look at,'' was his comment,
uttered in a gruff tone.
``No, sir, not very,'' admitted Steve, flushing as he looked down at his
soiled clothes.
``Do we have to dress up on this ship?'' demanded Jarvis, with some heat.
``You will have to do one thing---preserve a respectful attitude toward
the commanding officer, and take orders without giving any back talk,''
replied the master, eyeing the boy sternly.
``We aren't working on this ship.''
``Perhaps you think you are not, but you are.''
``We are working, or going to work, on the `Wanderer,''' answered Bob.
``That is what I am saying. This is the `Wanderer.'''
``The 'Wanderer'?'' exclaimed the lads.
``Yes.''
``Then we did fall into luck, after all.''
``It looks that way, though you may change your minds before you've been
aboard long. Which of you is which?''
``I am Steve Rush. This is Bob Jarvis.''
``Glad to meet you, young gentlemen.''
They could not tell if the captain intended the words to be sarcastic,
or whether he meant to be polite to them. They were rather inclined to
the former opinion.
``When do we go to work?'' demanded Jarvis.
``Now; at once. We don't have any lazybones on board this ship. Are you
men strong?''
``Yes, sir; I think so,'' replied Steve, smiling.
``Can you shovel coal?''
``We can shovel anything that we are able to lift.''
``Very well, then; I'll put you in the stoke hole.''
``What kind of a hole is that?'' questioned Jarvis.
``That is the place where the black-faced gang shovel the fuel under the
boilers to make the ship move along.''
``Oh, you mean the firemen?''
``That's the scientific name. The common name is stoker. I'll send you
down to the chief engineer, and he will give you a trick. You'll have to
work like sixty, and if you don't you'll get off at the Soo and foot it
back home,'' continued the skipper gruffly.
If Steve were disappointed, or objected to the work that had been
assigned to them, he made no comment. Jarvis, however, made no secret of
his displeasure. He grumbled under his breath, despite the warning looks
directed at him by Steve Rush.
Captain Simms pushed a button, and a few minutes later a short man,
clean shaven, red of face like the captain, entered.
``This is Mr. Major, the first mate. He is next in rank to the master. He
will take you to the chief engineer for your assignment.''
``Where do we sleep?'' asked Jarvis.
``I had nearly forgotten that. You will show the boys their cabin, Mr.
Major.''
The first mate nodded. His was a surly face, and the lads did not
approve of him at first. However, upon gaining the deck the first mate
spoke to them in a tone that was kind and helpful.
``This is your first time out, isn't it, boys?'' he asked.
``Yes, sir,'' replied Steve.
``Well, you'll get along all right. Do your work well and you will find
that Captain Simms will take to you all right. You will have enough time
off to rest and sleep, though the work is pretty steady on the lakes.
You will find this is the case when we are in port, even more than when
on the move. The loading and unloading keeps all hands at their
stations. You have been in the mines, have you not?''
``Yes, sir.''
``We were foremen,'' interjected Bob.
The mate glanced at them in surprise.
``I should think you would have stayed there, then. The pay is better and
the hours more regular.''
``We wished to learn this end of the business,'' answered Steve somewhat
shortly.
A few minutes later they were introduced to Mr. Macrae, the chief
engineer, in whose department they were to begin their work on a lake
steamer. The chief was a man of few words, these words always to the
point. The mate explained to him the disposition Captain Simms wished
made of the boys.
``Ever fire any?'' demanded the chief.
Steve shook his head.
``Nothing more than a cook stove,'' spoke up Jarvis, with a twinkle in his
eyes, at which the chief's face threatened for a few seconds to relax
into a smile. Instead, it drew down harshly and his lips set more firmly
together.
``Humph! Nice couple to send me, and short-handed in the stoke hole, as
it is. Well, you'll fire all right, and you'll find it ain't no six-day
stove-firing, either.''
``When do we go on?'' asked Rush.
``I guess now is as good a time as any. Where's your jumpers?''
Steve glanced at his companion quizzically.
``Did we leave our bags down in the hold, Bob?''
``I guess that's where we left them, sure enough.''
The mate sent a deck hand for the bags of the boys, after which they
retired to the cabin set aside for them at the stern of the ship, and
began preparing for their new work. They went on duty at nine o'clock,
being told that they would take a six-hour trick, with a six-hour
lay-off, after which they would report for duty again.
The chief took the boys below, introduced them to the foreman of the
fire room, then stood about while the foreman instructed them in their
duties. These consisted in keeping the fire up under two boilers. They
were obliged to throw the coal in many feet under the boiler, which
required both skill and strength.
When the fire doors were closed, the heat was still stifling, but when
the doors were thrown open waves of white hot heat leaped out enveloping
the stokers. The first time that Jarvis essayed the feat he burned his
eyebrows off by getting too close to the door and facing it full.
Bob sprang back with a growl that was half howl. As soon as he could get
the door closed he ran to the water barrel, sticking his head clear
under. The stoke-room gang howled uproariously.
``A lubber, eh?'' laughed one of the stokers. ``You'll get all the hotness
you want before you get out of this hole. How about you, pretty boy?''
turning to address Steve.
``You look out for your own furnaces, old man; I'll attend to mine, and
if I get stuck I'll ask somebody who knows.''
The gang laughed at this, and the fellow whom Rush had answered so
sharply, glared angrily at the tall, slender lad who was throwing coal
into the white-hot mouth of the furnace. He was doing his work almost as
methodically as though he was used to it, save that his aim was not
quite as sure as in the case of the more experienced men.
After having watched the boys at work for a few minutes, Mr. Macrae
nodded to himself, then climbed up the ladders to the deck. He met the
master soon after.
``Get those boys to work?'' demanded Captain Simms.
``Yes.''
``Any good?''
``Pretty likely pair. They have the strength of yearling bulls. Where did
they come from? I didn't see them when we came out.''
``No, they came out of the hold,'' grinned Captain Simms.
``Out of the hold?''
``Yes; funny thing about that. They boarded the ship with a load of ore.''
The captain went on to explain how the boys came to be on board.
``Doesn't it strike you as peculiar that they are sent down here in this
way?''
``Not at all, Mac. They want to learn the business. Mr. Carrhart sent me
a line yesterday explaining the case. Said they were a fine pair, and he
wanted to see them get along.''
``Then why put them in the hole?''
``Don't you think that will try them out as quickly as anything else?''
said the captain.
``I guess that's right,'' admitted the chief engineer. ``And we need them
just now, too. I'm glad they are on board, even if they are green hands.
But young Rush is going to be a winner, and no mistake.''
``What's the matter with the other one?''
``Nothing, except that he is a little fresh at times.''
``So I already have observed. You will take that out of him, Mac.''
``I'll do that all right, or break his back in the trying. The stoke hole
isn't any place for weaklings, as you and I know.''
``Keep me posted. I want to know about them. If they make good maybe I'll
change them, giving them a berth on deck.''
``We'd better give them a good try-out first,'' advised the chief.
``Certainly.''
In the meantime the subjects of this discussion were toiling with might
and main far down below the water level. The ship seemed much steadier
down there, and there was scarcely any roll perceptible. Had it not been
for the terrific heat the youngsters would not have minded the work so
much. However, as the day drew on they began to feel the strain.
The gong, announcing the change of watch, sounded loud and startling.
They did not give it any heed, but kept right on shoveling.
``Well, are you fellows going to work right through the next trick?''
asked the foreman.
``Have we finished?'' questioned Bob innocently.
``Until nine o'clock to-night.''
The lads put down their shovels with a sigh of relief.
``Is there such a thing as a bath room that we can use?'' questioned Rush.
``What? Do you fellows ever wash?'' demanded the stoker who had had the
words with Steve earlier in the day.
``That depends upon the company we have been in,'' answered the lad
sharply. ``Did you tell me about the bath room, sir?''
The foreman could not repress a grin. He pointed up the companion
ladder.
``You will find one on the deck above this. First door to the right.''
``Thank you, sir.''
Steve began climbing up the ladder, followed by Bob and, a few rungs
behind, by the surly stoker who had sought to have fun with the Iron
Boys and had got the worst of the argument in each case.
Their first trick on board an ore carrier had been gotten through
successfully, but it was about the hardest six hours the lads remembered
ever having put in. They hurried out into the air before taking a bath.
Never had fresh air smelled so sweet as it did that day. The lads were
black, the coating of soot on their faces being streaked with
perspiration, and their clothes could have been no wetter had they just
come up from the sea.
``This is about the limit!'' laughed Bob Jarvis. ``Here I am, without any
eyebrows and half my beautiful locks burned away, all because you and I
have ambitions to get on in the world. Honestly, Steve, is it worth it?''
``You know it is, Bob Jarvis,'' answered the Iron Boy, gazing straight
into the inflamed, soot-framed eyes of his companion.
\gutchapter{CHAPTER V}
\section*{\raggedright TROUBLE IN THE STOKE HOLE}
``\textit{I'll} put you to sleep one of these fine days, young feller,'' greeted
the stoker with whom Steve had had the words. The boys had just turned
to go to their bath, Bob already having entered the deck house.
``Are you addressing me?'' demanded Steve coldly.
``I'm talking to you.''
``Forget it,'' said the lad, brushing past the soot-begrimed stoker and
hurrying in to his bath.
That was the beginning of it. Surely Steve had not tried to make an
enemy of the man, but he had done so just the same, and an enemy whom he
was to hear from ere many days had passed.
Meeting the first mate later in the day Steve asked who the man was.
``The name he gave on coming aboard was Smith. I don't know anything
about him. He has never sailed with us before, but I understand he knows
his business---that is, he is a good stoker and has been on ships before.
Why do you ask?''
``I wondered,'' answered Steve evasively.
``Has he been bothering you?''
``Oh, no; I am not very much bothered,'' answered the lad, with a smile.
The boys' cabin was on the starboard or right side of the ship. It was a
pleasant little room, commanding a view out over the water. There were
two berths in the cabin, a little desk and a couple of steamship
pictures, the door of the cabin opening out to the deck.
They felt very much at home in their new quarters, and after the first
good sleep there they were ready for anything that might be required of
them.
The new stokers took their evening trick, each determined to hold up his
end of the work with the rest of the men. And each did. Not a man in
that hot, fiery pit shoveled more coal on that watch, or shoveled it to
better advantage than did the Iron Boys.
The man Smith shoveled at the furnace door next to Steve Rush, and the
former lost no opportunity to hurl rough jokes and taunts at the Iron
Boy. These were, in most instances, greeted with howls of delight by the
other stokers, who seemed to take the keenest pleasure in seeing the two
boys humiliated.
Steve took it all good-naturedly, but Jarvis had to exercise great
self-restraint to keep himself in check. He could hardly resist taking
it out of the big bully.
Smith was tall and angular, his small, beady eyes setting more closely
together than was good to look upon. In addition to this there was a
slight slant to them, giving him almost the appearance of an Oriental.
Steve shrewdly came to the conclusion that Smith was a bad man, and
furthermore, the boy decided in his own mind that the man had a past,
for Rush was a keen observer, few things passing him unobserved.
All at once, Smith's shovel slipped, showering Steve with coal from head
to foot. The sharp edges of the chunks of coal cut the boy's head and
one cheek until the blood came.
Rush calmly brushed himself off, wiped the blood from his head and face
amid the jeers of the stokers. Then he turned to the grinning Smith.
``Did you do that on purpose?'' demanded the lad coolly.
``I reckon it was an accident, kid. What would you do if it wasn't?''
``I am not making any threats, but I hope it will not happen again.''
``He did it on purpose,'' volunteered Bob.
``Never mind, Bob; keep out of this. Mr. Smith had a dizzy spell and he
couldn't see where he was tossing the coal. He isn't wholly responsible
for what he is doing.''
Smith uttered a growl.
``You making sport of me?'' he demanded, in a surly tone.
``Oh, no; I couldn't think of that, because I don't see anything funny
about you. You are the most serious proposition I ever set eyes on.''
Smith was not grinning now. His face had drawn down into harsh, menacing
lines, his chin settling close to his chest, his eyes narrowing to mere
slits. Rush was watching him as the boy carelessly tossed a shovel of
coal into the furnace.
Smith drew a long breath, grabbed up his shovel and began firing once
more. The critical stage had been passed for the moment, but Rush knew
that sooner or later there would be a clash of some sort, and he knew,
too, that when it did come the tough stokers would side with their own
companion.
Nothing more of a serious nature occurred in that watch, though the boys
kept on the lookout for trouble.
It was in the early morning watch, however, when the ship's company was
sleeping, all save those who were on watch at the time, that there came
a renewal of the trouble---when the threatened disturbance came to a
head.
The boys had arranged that when the back of either was turned to the
stoker the other should keep his eyes open. This arrangement they had
carried out faithfully until four o'clock in the morning arrived. Day
was breaking, but the toilers down in the depths of the stoke hole could
not see the coming of the day. They would not have noticed it had they
been able to for the reasons that their minds were wholly absorbed with
other matters.
Suddenly a second shower of coal rained over Steve Rush from the shovel
of the man Smith.
Steve turned sharply, fixing his eyes on Jarvis. The latter nodded,
meaning that Smith had thrown the coal deliberately.
``That's the time you did it on purpose, Mister man,'' said Steve in his
usual calm voice.
``Well, supposing I did? What you going to do about it?''
``This!''
Whack!
The Iron Boy's fist smote the stoker a powerful blow in the face. Smith
toppled over against the hot boiler. Rush saw at once that the fellow
would be seriously burned. Leaping forward he dragged the man away,
dropping him on the coal heap.
For the moment the stokers were so amazed at the exhibition of strength
and skill on the part of Steve Rush that they could do no more than
gape and gaze.
The knocked-out stoker struggled to his feet. His eyes were bloodshot
and his face distorted with passion.
``I would suggest that we put off our dispute until we have nothing else
to do,'' suggested Steve. ``You mustn't forget that we are on duty now,
and the captain will discipline us if we have trouble here.''
With a bellow of rage, Smith rushed his young antagonist. The blow that
he got this time spun the fellow around, landing him on his face on the
coal heap. The blow had reached him before his own fists were fairly up
in position. Steve knew that what was to be done must be done quickly.
He loathed such fights, but he was among rough men. He had been among
rough men ever since he had started out in the mines, and it was a case
of fighting one's battles or going down with serious injuries, or
perhaps worse. Experience had told him that the quicker such affairs
were ended the better for all concerned, and that the man who landed the
first effective blow was more than likely to win the fight.
Steve usually did land first.
Bob was dancing about with glowing eyes.
``Please somebody hit \textit{me}!'' he begged. ``I've got to get into the row.
I've got to punch some of you wooden heads, or you'll never be
satisfied; neither will I.''
``Give them the coal. Bury them!'' roared a voice.
Smith leaped to his feet, and stretching out a hand threw open a furnace
door.
``I'll give the little fiend a toasting!'' he howled.
``No, no---the coal!'' protested the others.
The Iron Boys saw at once that matters had taken a more serious turn
than they had looked for. The lads slowly backed up against a bulk head,
their hands resting easily on their shovels.
``I would suggest that you men had better get to work,'' said Rush. ``The
steam will be going down in a minute or so, then you'll hear from the
chief engineer.''
He had hoped to call them back to their duty, and thus avoid what was
before them.
``The coal, the coal!''
With one accord the stokers thrust their shovels into the coal pile.
Ten shovels of hard coal were hurled at the Iron Boys with unerring aim
and at almost projectile speed.
``Down!'' shouted Rush.
Both lads dropped to the floor of the fire room, the black chunks of
coal passing harmlessly over their heads.
``Let 'em have another! Throw low!''
The stokers sent the next black volley straight out from their hips,
which should have reached the mark had the boys adopted their former
tactics.
``Dodge between!'' commanded Steve.
Jarvis obeyed instantly. In fact, in an emergency, he always looked to
his companion for orders.
When they saw that their second attempt had failed the stokers uttered a
yell of rage.
``Bat them over the head with your shovels!'' advised one.
But Rush had anticipated the suggestion. He was already leaping forward,
his shovel cutting the air. He brought its flat side against the side of
a stoker's head. The man toppled over, unconscious, and before the men
could recover from their surprise two more of their number had fallen
victims to the Iron Boy's shovel.
Bob had leaped into the fray by this time. He was swinging his own
shovel, uttering a shout each time it came in contact with a head.
``Give ground, Bob!'' shouted Rush. ``I'll fix them. Just watch out that
they don't land on you, or they'll cut your head off with those
sharp-edged things.''
``I'll hold them! Come on, you black ruffians!''
Steve had sprung to one side of the fire room, where he began tugging at
a wheel, from which he unrolled a long, dark object. One end of this he
quickly connected to a four-inch pipe, turned a shut-off and sprang out
into the middle of the fire room, carrying one end of the object in his
hands.
``Quick! Back off, Bob!''
Bob did so. He saw at once what Rush intended to do.
``Give it to them!'' he shouted.
\gutchapter{CHAPTER VI}
\section*{\raggedright THE FIRST STEP UPWARD}
\textit{The} Iron Boy held a three-inch fire hose in his hands. A powerful stream
leaped from the nozzle. The first man it hit was bowled over like a
nine-pin, the man uttering a choking yell as he went down.
Another leaped at Steve with upraised shovel. He shared the fate of his
companion. One after another of them went down under the force of the
stream from the fire hose.
It was a kind of warfare that none of those tough customers had ever
engaged in before. In a moment the men were yelling wildly, now and then
Bob Jarvis's voice raised above the hubbub in a howl of joy. The heat in
the fire room quickly turned the water to steam, a dense gray cloud
hanging over all, obscuring everything in the room. It was with
difficulty that the boy could make out the forms of his enemies.
The men were making desperate efforts to break through and escape by the
door, to which Rush had slowly backed. As soon as a man sprang forward
Steve would let him have the full force of the stream from the hose
squarely in the face. The stoker would be on his back instantly; then
Rush, would play the stream on the others, swinging the hose from side
to side to keep the crew back.
All the fight had been taken out of them, but the relentless stream
still played on and over them with terrific force.
``Quit! We've got enough!'' howled a voice.
``I can't hear,'' answered Steve, playing the hose from one end of the
cringing line to the other. ``I'm going to turn on the hot water soon, I
don't believe this cold water will take all the dirt off.''
``Skin them alive!'' jeered Jarvis.
There came an interruption. The howls of the men, having reached the
upper deck, had attracted the attention of the chief engineer. He had
come running down the companion ladder, believing something serious had
happened in the engine room. He was met by a cloud of steam.
``What's going on here? Have you blown out a tube?'' he shouted.
``No; I'm blowing off some rowdies, that's all. Bob, shut off the water.
The fun's all over.''
Macrae grasped Rush by the collar.
``What does this mean? I'll discharge you at the end of the cruise.''
``I am sorry, sir; but those men attacked us and we had to fight them the
best way we could. I thought a shower bath would do them more good than
anything else, and cool them off quicker.''
``Get to work there, you lazy lubbers. Your steam is twenty pounds below
the mark. I'll fine the lot of you. Rush, come up to the deck, I want to
talk with you.''
``I would suggest, sir, that you hear what the men have to say first.''
``How did this row start?'' demanded the chief engineer.
``He turned the hose on us, jest because he got a grouch on against us.''
``That's a lie!'' exclaimed Jarvis.
Mr. Macrae motioned for Steve to accompany him. The boy followed up to
the deck where the chief led the way to his office and cabin.
``Now, I'll listen to the story. You have done a very serious thing; you
have imperiled the safety of the ship and laid yourself liable to arrest
and ironing. What have you to say?''
``I acted purely in self defense. It was a case of defend yourself or get
my head knocked off. I chose the former. I am sorry I was the cause of
the steam going down, but we can put on more steam in a few minutes. I
couldn't do the same for my head.''
``Tell me exactly what occurred.''
Rush did so, omitting the name of the stoker who had been the real cause
of the uprising. Mr. Macrae listened with grave face until the story of
the trouble had been told.
``Who started it?''
``I would rather not say. I do not think he will start anything else very
soon. He got about all that was coming to him.''
``I should say he did. However, this is a matter that will have to be
laid before Captain Simms. Go back to the fire room. I will accompany
you and see that matters are straightened out.''
This the chief did.
``The next man who starts any disturbance here will be put in irons!''
said Mr. Macrae sternly. ``This applies to every one of you. I shall lay
the matter before the captain, as it is. He will act as he thinks best,
but it is my opinion that the whole gang of you ought to be thrown off
the ship at the first stop. You may be, at that.''
As soon as the captain rose, the chief told him the story of the battle
in the stoke hole.
``What, those two boys did up the whole crew of ten men down there?''
exclaimed the master.
``That's about what it amounted to.''
``Most remarkable thing I ever heard of! But I will guarantee they never
started the row.''
``No, I think not. Both boys refuse to say who did.''
``Good for them. I knew they had the right kind of stuff in them. Pity we
haven't got more like them.''
``What do you think best to do, sir?''
Captain Simms reflected for a moment.
``Being convinced that the stokers are wholly to blame, I shall fine each
of them a day's pay. You may so inform them.''
``And the two boys also?''
``No. Why should they be fined? You can't blame them for defending
themselves. What time do the boys come off watch?''
``Nine o'clock.''
``Tell them to report to me after they get fixed up.''
``Very good, sir.''
Captain Simms went to his cabin, where he related to the first mate the
story of the fire room row. Both officers laughed heartily.
``I would have given a month's wages to have seen that fuss,'' laughed the
mate. ``I guess the black-face gang has come to the conclusion that it
has picked up a couple of Tartars. Evidently it isn't the first time
those lads have been called upon to take care of themselves.''
Before the stoke hole watch knocked off the captain made it his business
to go below and look over the men. Every man save the Iron Boys wore a
sullen, revengeful look on his face. But this was not all. There was
blood on several of the faces, and the men's clothes and hair still bore
traces of the shower bath that Steve Rush had given them.
Neither lad paid any attention to the captain. They went on with their
work as steadily as though he were not present, or nothing out of the
ordinary had occurred.
The captain turned away rather hastily and left the compartment. He felt
that, if he remained a second longer, he would have to laugh. That would
not do at all. And laugh he did, after he had gotten far enough away
from the fire room to make wise such a proceeding.
``I'll get even with you for that!'' snarled Smith in Rush's ear, after
the departure of the master.
Steve made no reply.
``You'll wake up one of these fine mornings wetter than I was after you
turned the hose on me, you whelp!''
Smith drove his elbow into the Iron Boy's side with considerable force.
Rush slowly faced him.
``Look here, you loafer, I'll knock you down if you do that again. Or,
if you prefer it, I'll give you another bath. You are trying to pick a
fight with me. I am not looking for it, but if you insist I'll give you
what you want. Fight or stop!''
Smith glanced uneasily at the door leading from the fire room, muttered
something unintelligible to the others and began shoveling coal into his
furnace.
Shortly after that the watch ended. Steve hurried through his bath.
After putting on his clean clothes he called on the captain. The latter
looked over the slim, well set-up young lad quizzically.
``I didn't think it of you, Rush.''
Steve flushed painfully.
``You wish to see me, sir?''
``Yes. Be careful. In this instance let me say very frankly that I am
glad you cleaned out that lot. The only trouble is that you ought to
have thrown the whole gang overboard. We can't spare them, or I might
have done it myself before this. I'm going to take you two boys off the
stoke hole watch.''
``What do you wish us to do, sir?''
``I will promote you to the deck.''
\gutchapter{CHAPTER VII}
\section*{\raggedright THE IRON BOYS ON DECK}
\textit{The} lads began their work above decks on the following day. It was a
welcome relief to be out in the open air, with the wind blowing over
them, the soft odors of the inland seas mingling with the faint perfume
of the land drifting out from the unseen shores.
The first work of the Iron Boys was to remove the hatches that the sun
might penetrate the hold and dry out the ore, which had been put in very
damp. Ore in that condition did not handle easily, taking up time and
costing considerably more to handle than when dry. Steve pondered over
this all during his first forenoon's work. Here was something that ought
to be remedied. His fertile brain was at a loss to solve the problem. He
talked the matter over with Jarvis after luncheon, that day, and asked
his companion's opinion.
``That's easy,'' answered Bob promptly. ``Put a stove in.''
``Where?''
``In the ore pockets on the trestles.''
``That would be fine,'' grinned Steve. ``But you have given me an idea. I
will think it over. There is a point that it will pay us both to think
over very carefully. Have you seen anything of our friends from below
decks this morning?''
``No; I guess they must be sleeping.''
``Look out, Bob. We haven't heard the last from Smith. He is a vengeful
fellow and he will try to get even with us. I hope he doesn't ship with
us on the return trip.''
``I'll punch his head for him if he gets funny with me.''
``I don't like the man's looks at all. It is my opinion that he is a
desperate character.''
``Well, so are we, for that matter,'' replied Jarvis with a mirthless
grin.
``I am beginning to think so myself, old chap. It seems almost impossible
for us to keep out of trouble. I, for one, am going to stop it. Next
time any rough argument is started I'm going to run.''
Jarvis laughed uproariously.
``I think I see you doing it! Why, you wouldn't run if you saw a herd of
elephants charging you. No, sir---not Steve Rush!''
At about four o'clock in the afternoon the boys were ordered to assist
in replacing the hatches to make all snug for the night. The vessel was
slipping down Lake Huron, now, at an eleven-knot gait. There was a
gentle roll on the sea, but neither lad minded that. Neither would
suffer further from seasickness, they felt sure.
The hatches having been made secure there was nothing more to be done
for the rest of the afternoon. The lads were free to go where they
pleased and do as they pleased. They repaired to their cabin, where they
remained until supper time. They now ate with the ship's officers, the
stokers and oilers having a mess-room by themselves. The officers'
mess-room was a roomy apartment at the extreme stern of the ship, and
the food served there was excellent. The boys did not remember ever to
have had better.
Mr. Major, the first mate, occupied the lower end of the long table,
while the captain sat at the head. There was little conversation. The
principal business was eating, sailors having a habit of shoveling in
their food as fast as possible when it is placed before them.
The result was that Steve and Bob, being accustomed to eat slowly and
chew their food well, were not half through when the others rose from
the table.
``Going to eat all night?'' demanded the captain, with the suspicion of a
smile on his face.
``Oh, no,'' laughed Rush. ``Not quite so long as that, I hope.''
``How about you?'' questioned the master, nodding at Jarvis.
``Well,'' answered Bob reflectively, ``as nearly as I can figure it I am
about amidships between soup and pie. If I don't fall through the centre
hatch before I reach the pie end I'll be on deck about seven o'clock.''
The officers laughed heartily.
``Do we go on duty this evening, sir?'' questioned Rush.
``Certainly,'' replied the captain. ``You take your regular tricks just the
same. You two will take the forward watch at nine o'clock.''
They had never been on watch before, and did not know what their duties
were to be. So, after finishing their supper, they hunted up Mr. Major
and asked him to explain their duties to them. He told them that all
they had to do would be to watch out for lights ahead and either side of
the ship, ring the hours on the ship's bell just forward of the bridge,
at the same time glancing back at their own ship's running lights to see
if all were burning brightly. The mate told them how to report this,
giving them some other suggestions at the same time.
``This is fine,'' glowed Bob. ``We're going to walk the bridge at midnight,
aren't we?''
``Rush will have the bridge watch,'' explained Mr. Major. ``You will take
the deck just forward of and under the bridge. It is not hard work in
good weather, but it gets to be rather lonesome at times. I shall be on
duty in the pilot-house during your trick. If you are in doubt at any
time be sure to call out to me.''
Both promised that they would. It was with keen anticipation that the
lads made their way forward from their cabins a few minutes before nine
o'clock.
``Second watch changed,'' called the watch who was on the point of
retiring.
``Aye, aye,'' answered the officer in charge in the pilot-house. All was
dark in there so the men could see ahead, the windows of the captain's
cabin having the shades pulled tight so that not a single ray of light
could shine out ahead to blind the eyes of the lookouts.
``All clear ahead. Steamer heading up the lake off the starboard bow.''
``All right,'' answered Steve as he took his place at the rail of the
bridge. ``I guess she won't run into us.''
``Watch for that steamer's red light off to starboard,'' warned a
business-like voice from the blackness of the pilot-house.
``I will,'' replied Steve.
``Say, `aye, aye, sir.'''
``Aye, aye, sir.''
``That's right. We observe all the forms on board these ships just the
same as they do on the high seas.''
``What's all that talk about up there?'' called Bob Jarvis, from his post
in the bow on the deck below.
``You are to keep watch of that fellow off to starboard,'' answered Rush.
``Starboard? Let's see---that's the left side, isn't it?''
``No, the right.''
``Oh, I guess that's right.''
``Tell the watch below to 'tend to his business,'' warned the mate in the
pilot-house.
``Forward watch, knock off talking,'' called Steve.
``Don't get funny up there or I'll come up and straighten you out.''
``Bob,'' called Steve softly, ``the officer will be down there in a moment
if you don't stop your nonsense. This is business. Keep your eyes on the
water and call out whenever you see a light. I------''
``Ship, ho!'' sang out Jarvis suddenly, interrupting what Steve was
saying.
``Lower watch reports a ship, sir,'' sang out Steve.
``Where away?'' demanded the mate.
``Where away?'' repeated Steve.
``Oh, 'bout a mile off the right-hand side,'' answered the lower watch
nonchalantly.
``He means the vessel off to starboard, sir,'' Rush informed the officer
in charge.
``Has that wooden-head just discovered the ore carrier over there?''
``I guess so, sir.''
``Pshaw! You keep your eyes open.''
``He will be all right after he gets settled down to it, sir,'' said Steve
apologetically.
``We're likely to be sent to the bottom before that time, if we wait for
him to keep us out of trouble.''
The ship sailed on. Now and then Steve's keen eyes would sight a green
or red or a white light, and under the instruction of the mate he
quickly learned to determine the position of the boat from her lights,
enabling him to say instantly which way the other ship was traveling.
After a while the captain entered the pilot-house.
``Who's on the forward watch?'' he demanded.
``Rush on the bridge, Jarvis in the forward peak.''
``Keep a sharp lookout. They are new men.''
``Aye, aye, sir. Rush is all right. He has eyes like an owl at night.
Trust him for not letting anything------''
``Red light dead ahead,'' called Rush.
``What do you make of her?''
``Nothing more, sir.''
``That's one of the Wyckoff coal fleet,'' announced the captain, leaning
from the pilot-house window. ``She's headed for Shoal Island.''
``How in the name of all that's good does he know all that?'' muttered the
boy on the bridge. ``I can't see a thing but the red light, and that
means that her port beam is almost across our bow. I don't see anything
else.''
``I suppose you are wondering how I know that, eh?'' chuckled the captain,
nodding to the lad pacing the bridge just below him.
``Well, yes, sir; I was wondering,'' admitted Rush.
``Do you make out her white lights!''
``No, sir.''
``That's where I have you. There is a bank of fog or mist settling over
the lake. If you will raise your eyes a little to the right of the red
light you will make out two faint blurs------''
``I see them, sir.''
``Those are her masthead lights. I know the set of the masts of the
Wyckoff boats, that's all. So will you, after you have been at sea long
enough. It is all a matter of experience. I have been drilling up and
down these lakes for the past thirty years. I ought to know a few
things about them and the fellows who are navigating them. It's going to
storm.''
``Yes, sir,'' agreed the lad, but he did not see any signs of rain. The
stars were bright overhead and the moon was shining brightly. ``I see I
have a few things to learn about the weather,'' he muttered.
A few minutes later Steve discovered that the moon and the stars had
suddenly disappeared. The captain knew they would, for the wind had
veered to the southeast and he had seen the fog bank settling down since
the first moment he entered the pilot house. The rain started in shortly
afterwards in a thin drizzle.
``Hey, up there, it's getting wet down here!'' shouted Bob. ``Hand me down
an umbrella or something.''
``Keep a sharp lookout, lads,'' warned the captain. ``Remember we've got a
load of coal across our bows.''
``Aye, aye, sir,'' answered Steve. ``I think I can see quite a way ahead of
us.''
``That is a mistake. You can't see a ship's length ahead. Keep your eyes
open.''
``I will, sir.''
``Where is your raincoat?''
``I am afraid I have none. I never thought to bring one with me.''
``Tell your friend Jarvis to go to my cabin and ask the steward for two
coats.''
Steve did so, and a few minutes later the lads were well protected from
the storm, which was now upon them in full force. The rain was coming
down in blinding sheets by this time, beating into the faces of the Iron
Boys.
Suddenly Steve leaned over the edge of the bridge, shading his eyes with
his hand. Something that he thought he had observed in Bob's position
had attracted his attention. He gazed more keenly, then uttered a little
gasp. Jarvis was standing with his head down, facing away from the storm
toward the stern of the ship. He looked very comfortable and contented.
``Bob!''
Steve's tone was stern.
``Bob!''
``What do you want?''
``Turn around and be quick about it!'' Steve was speaking too low for the
officers in the pilot-house to hear. ``Don't you know that the safety of
the ship depends largely on our watchfulness at this minute, and------''
``Clang, clang, clang, clang, clang clang,'' interrupted the ship's clock
in the pilot-house.
Steve grasped the cord attached to the clapper of the big bell in front
of the bridge, giving it six steady jerks.
``Six bells, eleven o'clock. All lights are burning brightly, sir,'' Rush
called in the singsong voice of the sailor.
``Aye, aye,'' answered the deep voice of the mate from the darkness of the
pilot-house.
``Reduce speed to one-half,'' commanded the captain, in a low voice. He
usually gave his commands calmly, no matter how great the stress or
emergency. ``Do you see anything of that coal carrier, Rush?''
``No, sir; she must be some distance away from us by this time.''
``She ought to be, but she isn't.''
``May I ask how you know that, sir?''
``I get her smoke.''
``I don't make it out, sir.''
``Neither do I, by sight, but I see it through my nose. I smell it.''
``Well, doesn't that beat all!'' muttered Rush.
He bent every energy toward piercing the black bank ahead. For the first
time Steve Rush experienced a sense of uneasiness, and for the first
time he realized what the perils of the sea meant. Before, it had seemed
to him that, unless a ship were laboring in a great storm, there could
be little danger. Once a minute the siren far back in the darkness, near
the engine superstructure, would wail out a long, dismal blast which, a
moment later, was answered by the ship out there somewhere ahead. The
sound of the other boat's siren did not seem to Steve Rush to be getting
any nearer, but to the experienced ears of Captain Simms quite the
contrary was plain.
``Look steady, down there!'' he warned in a sharp tone which told Rush
there was something that he did not know about was likely to happen.
``Look sharp!'' he repeated to Bob Jarvis.
``I'm looking. I'm------''
Steve Rush's voice cut in quick and sharp, though there was little trace
of excitement in it.
``Sheer off! Ship dead ahead!''
``Hard a-port!'' commanded the captain, at the same time sounding a long
wailing blast on the siren.
A deafening crash followed almost upon the command.
\gutchapter{CHAPTER VIII}
\section*{\raggedright THE CRASH IN THE FOG}
\textit{Steve} was thrown flat on his face on the bridge, while Bob Jarvis
doubled up, wedged into the forepeak of the boat on the deck below.
``Full speed astern!'' roared the captain.
The chains of the pilot-house telegraph rattled ominously and the
propeller, nearly six hundred feet aft of the bridge, began whirling the
other way at tremendous speed.
``Hey! What---what---what's happened?'' shouted Bob Jarvis. ``Have we hit the
shore?''
``Close the water-tight bulkheads!'' commanded Captain Simms. The mate
threw over the electric switch that gave the signal for the closing of
all water-tight doors and bulkheads.
``Sound the general alarm!''
Gongs began to ring all over the ship.
``Order the engine and stoke room crews to stand by their tricks. I'll
give them warning in time in case we have been badly hit.''
The mate obeyed quickly and without a single lost motion. By this time
Steve had leaped to his feet. Ahead of him, it seemed almost on top of
them, loomed a great black hull. Lights shone dimly through the heavy
pall of fog. He understood without having to be told what had happened.
The ``Wanderer'' had come into collision with another ship, presumably the
same one whose lights the bridge watch had been watching off to
starboard earlier in the evening. Even in the excitement of the moment
Rush did not understand how this thing could have happened, if the other
boat had held to the courses she was on when he last saw the other boat.
``Make ready the lifeboats!'' commanded the captain of the ``Wanderer.''
Then, raising his megaphone to his lips, the master bellowed through it:
``Are you hard hit?''
``We have a hole punched in our side big enough for you to go through.
Stand by until we can find out whether we'll float or not.''
``Aye, aye, we'll stand by. We want to find out how much of a smash \textit{we}
have got. Mr. Major, get down there and examine the nose of our boat,
and see how much of a bang we got. It's lucky for us that we hit the
other craft in the position we did.''
The mate hurried down to where Bob was still on watch. Even after the
crash had come, and he had picked himself up, Jarvis stuck to his post,
though he believed the ship to be sinking. And, besides, Bob being
right at the point of the collision, so close in fact that woodwork from
the other boat showered over him in a perfect rain, got the full force
of it. He was bruised and battered, he had lost his hat and he was
greatly shaken up by the terrific impact.
The ``Wanderer'' had backed away to a safe distance, and the first mate
was now making an examination of her wound.
``We've broken our nose off,'' he called up to the bridge.
``Is she taking in any water?''
``Yes, sir; but I think the bulkhead will hold it so we won't go down.''
``Good! Ahoy, coal carrier there.''
``Aye, aye,'' came the reply from the deck of the stranger.
``Who are you?''
``The `James Macomber,' coal laden, bound for Shoal Island.''
``Well, I must say you are doing some fine steering. What are you doing
over here?''
``We got out of position in the fog.''
``I should say you did. How are you?''
``Listing badly to port and settling by the stern.''
``Better get your boats over while you have the time. Shall we put over a
boat?''
``No; we can manage to get away if she goes.''
``I tell you, you're going down! Get away while you've got the time.''
``All right; stand by.''
``Can I do anything, sir?'' asked Steve.
``Yes; go aft and take two men with you. Take the boat and cast off. Lay
well away from the ship and give me a hail, so I'll know where you are.
Stand by and, mind you, don't drift away and get lost. We'll never pick
you up in this fog if you do. Understand?''
``Yes, sir.''
``Order Jarvis up to the bridge.''
``Bob, come up here. The captain orders you to take the bridge.''
Steve ran down the ladder to the forward deck, then on down to the main
deck, where all hands not otherwise engaged had assembled. They were
leaning over the side peering into the darkness to see what had
happened. Steve was beset by questions. He explained briefly what had
happened, repeating the captain's orders for himself and two men to man
the life-boat and put off to pick up any one needing assistance.
The second mate, then in charge of the deck, assigned two strong oarsmen
to go with Rush. The latter was to be in charge of the boat, so the
captain had said, though Steve was dubious about his ability to fill
that office. Of course he was interested in boats, but he was much more
familiar with drifts and levels than he was with navigation of the
lakes.
``Man the boat,'' ordered the second mate.
The men took their places in the life-boat, which already had been
hauled up ready for launching, the Iron Boy taking his place in the
stern by the tiller.
``Are you ready?''
``All ready.''
``Cast off!'' came the hoarse command from the second mate.
Steve instinctively grasped the gunwales of the life-boat as the craft
dropped toward the water. He thought the boat had broken loose from the
davits and was falling into the sea, so swift was its descent. Yet he
might have known from the sound of the groaning, creaking block and
tackle that he and his companions were still safe.
The life-boat struck the water with a loud splash, rocking perilously as
Steve, still gripping the sides, stood in a crouching position ready to
jump should the boat tip over. Then the little craft righted itself,
though it lay rising and falling, rolling and tossing perilously on the
long lake swell. Rush had no idea that the water was so turbulent.
``Cast off!''
The two oarsmen quickly unhooked the blocks from the rings at the
extreme ends of the small boat.
``Are you ready?'' they asked.
``Yes,'' said Steve, though he was not certain whether he was ready or
not. His mind worked with its usual quickness, however. He knew that he
was expected to get off somewhere near the steamer ``Macomber.''
``Give way!'' he commanded.
The sailors pushed the life-boat away from the side of the ship with
their oars; then, placing the oars in the locks, fell to pulling
steadily. Steve turned the tiller the wrong way the first thing. The
nose of the life boat hit the hull of the ``Wanderer'' with such force as
to throw the three men to the bottom of their boat.
``Lubbers!'' bellowed the second mate from the deck of the ship. ``What are
you trying to do---run us down?''
Steve's face was burning with mortification. Fortunately the night was
too dark for any one to see this.
``What's the matter with you?'' demanded one of the oarsmen.
``I turned the tiller the wrong way,'' answered Rush truthfully. ``Pull
away.''
The men growled as they fell to their oars once more. A few swift
strokes and they were clear of their ship, Rush this time handling his
tiller with more skill than before. He tried the rudder cautiously and
found that it responded readily to the least movement of the tiller.
``Now I'm all right,'' he muttered. ``That is if I don't run something else
down.''
Swinging out in a wide circle the lad steered around the bow of the
``Wanderer,'' heading for the spot where he thought the distressed ship
lay.
``Lifeboat there!'' bellowed the captain through his megaphone.
``Aye, aye, sir.''
``Where you heading?''
``For the other ship.''
``No you're not. You're heading for the shore. Pull to port a little
more. There, that's better. Look where you are going, now.''
The captain's tone was stern and commanding. Steve leaned well forward,
peering into the thick fog ahead. He could not make out the other ship
as yet, though he could hear the shouting and the hoarsely uttered
commands on her deck. It was a scene such as he had never imagined
before, and it thrilled Steve Rush through and through. He felt that he
was ready for deeds of valor if he should only get the chance to perform
them.
``Steady, men,'' the boy warned. ``We must be near the other ship now. I
can hear their voices more plainly. It is curious we can't see their
lights, though.''
``That's because of the fog, cap'n,'' volunteered one of the sailors at
the oars.
``They're------''
``Look out! We're under the stern of the ship now!'' cried Rush, throwing
his tiller hard to port.
The life boat hit the stern of the ship, far down under her counter,
with a resounding crash. There followed the sound of breaking woodwork,
as the gunwale of the lifeboat crashed in. The little craft shipped a
heavy sea, drenching all hands.
The sailors had dropped their oars and were preparing to jump.
``Sit down!'' commanded the young skipper.
``We're sinking!''
``Well, if we are, let's get in a better place to do it. We don't want to
be floundering in the water under the stern of this sinking ship, do we?
Get to your oars and pull away!''
The Iron Boy's voice had assumed a tone of command. The men, recognizing
that he was not alarmed, bent themselves to their oars and pulled
quickly from their present dangerous position.
``Have we anything in the boat with which to bail it out?''
``No.''
``Then we will sit in the water. I guess we can't be much wetter than we
are.''
The men grumbled.
``Lay to, till I find out how badly we are injured.''
A brief examination of the side of the boat that had come in contact
with the ship, showed that the gunwale had been smashed in, but the gash
did not extend far enough down to place the little boat in great danger
unless perhaps the sea rose high enough to wash over the side. As yet
the lake was rolling lazily as is usually the case in a fog, for a
breeze would quickly dispel the heaviest bank of fog and drive it away.
``We're all right,'' decided the young coxswain. ``Pull around slowly.''
Standing up in the stern of the life-boat with the tiller between his
legs, Steve hailed the disabled ship.
``Ahoy, there!'' he called.
``Ahoy! Who are you?''
``Life-boat from the `Wanderer.' If you want any help, sing out.''
``We'll need it all right.''
``Are you sinking?''
``We don't know. We're settling some.''
``Got much water aboard?''
``More'n we need to drink. Come in closer, so we can get you if we need
to.''
``How about your own boats?''
``Life boat smashed in the collision. Ship's raft is safe. That'll carry
most of us, perhaps all of us, if necessary.''
``Better get it ready, then, in case anything happens,'' advised the lad,
who was rapidly becoming a seasoned sailor. ``Pull in a little closer,
boys, but look sharp because we may have to get out in a hurry, in case
anything happens over there.''
The boat drifted slowly in toward the injured ship. This time the little
craft had worked around abeam of the coaler, the latter's lights showing
dimly in the thick fog.
``Keep your siren going to warn off other ships, why don't you?'' shouted
Rush.
The suggestion was a good one. It was instantly acted upon by the master
of the ``Macomber.'' Then the ``Wanderer'' started her siren going, the
hoarse voices of the whistles sounding dull and unreal through the fog.
Steve grinned appreciatively.
``At least I have made one good suggestion,'' he muttered. ``There will be
no excuse for any other ship hereabouts running into us. That would be a
nice mess.''
Suddenly there arose a commotion on board the damaged coaler. The shouts
grew louder. The crash of a steel hatch falling into place could be
heard here and there. A loud splash sounded between the life-boat and
the ship.
``Somebody's overboard!'' cried Steve. ``Pull in!''
``Life-boat there!''
``Aye, aye!''
``We're sinking by the stern!''
``Pull in quick, lads!'' commanded Steve Rush.
\gutchapter{CHAPTER IX}
\section*{\raggedright A TRAGEDY OF THE LAKES}
\textit{There} followed a sound as though the wind were suddenly rising. The
sound grew to the roar of a gale.
Rush did not understand the meaning of it. He did understand, however,
that there was a man in the water near by, and that there was a human
life to save.
``Where are you?'' he called.
``Here! Be quick!''
Rush had the fellow by the collar, in short order, and with some
difficulty, hauled the man into the life-boat.
``The ship's going down. Get out of here!'' cried the rescued sailor.
``Pull out, boys!'' commanded Rush, grasping the tiller and swinging the
bow of his boat about.
``There she goes!'' shouted the sailor from the ``Macomber.''
The huge coaler's lights suddenly went out as the sea flooded her dynamo
room. The hatches began blowing off with loud explosions as the water
was forced up under them.
``What is it?'' cried Steve.
``The hatches.''
Boom!
``There goes the main bulkhead. It's all up with her now.''
Yells and cries rent the air. Men were leaping into the sea from the
doomed ship, and though the men in the life-boat could not see, they
could hear.
``I can't stand this!'' gritted the Iron Boy, jamming the tiller hard
over.
``What are you going to do?'' demanded one of the sailors.
``I'm going in there after those men,'' answered Steve Rush.
``It's sure death!''
``We'll go, just the same.''
``No we won't; we'll pull out of here like lightning.''
Steve grabbed up a boat hook.
``Pull, I tell you; pull for all you two are worth, or I'll knock your
heads off with this hook. Now---\textit{go}!''
The oarsmen pulled. They were used to obeying orders, and they realized
that the young coxswain of their craft was no weakling. He meant exactly
what he had said. Besides the men, after all, were as anxious to save
those of their own calling, now struggling in the water, as Steve could
possibly be.
The bow of the life-boat sent the water spurting into the air as the
craft cut through the sea. Another man was hauled aboard.
``Where's the rest of them?'' demanded Rush.
``The water's full of them,'' gasped the rescued sailor.
``Ahoy, there, men---swim this way if you can. We're waiting for you.
We'll------''
With a sickening roar that Steve Rush would never forget as long as he
lived, the ``Macomber'' dived stern first under the surface of the water.
Her engine and boiler rooms, being at the stern, were flooded instantly.
Then came a report as if the universe had been suddenly rent in twain,
an explosion that seemed to rend the air, the earth and the sea.
``The ship's blowing up!'' cried one of the men in the boat. He knew what
the sound meant. Steve did not, but he caught his breath sharply when he
heard the words.
``Pull out!''
Instead, the life-boat was lifted out. It seemed to rise right up into
the air, and when the Iron Boy at the helm sought to throw the rudder
over there was not water to push against---only thin air.
``Hang on! We're going over!'' shouted the boy.
Cries for help were heard on all sides of the life-boat now. But Steve
was powerless to aid the drowning ones. He was concerned with saving
himself and those with him just at this time.
The boat continued to go into the air; then, suddenly, it swung bottom
side up, spilling its human freight into the lake.
As the men of the life-boat fell into the water they were caught by the
suction of the sinking ship and borne struggling about in the great eddy
that swirled with the speed of a mill-race.
Steve fought valiantly to save himself by trying to swim out of the
whirlpool, but even his great strength was not equal to the task. He was
tossed to the centre of the eddy; then he felt himself being drawn
downward by some invisible force. Even then the Iron Boy did not lose
his presence of mind. He caught and held his breath as the waters were
closing over him.
Down and down shot the body of Steve Rush until he believed he must be
near the bottom of Lake Huron. Hours seemed to have been occupied in the
descent, whereas it had been a matter of seconds only. He had made no
resistance, calmly deciding to save his strength until action would
count for something.
Steve had no thought of giving up. While his heart was filled with a
great dread he was not excited, because he would not permit himself to
be.
``I'll die game, if I do die,'' he kept repeating to himself.
At last the pull from beneath seemed to be lessening a little. There was
not the same terrific force tugging at his feet. Steve kicked out and
the effort, he thought, raised him a little.
Thus encouraged he began kicking with all his strength, treading water
and working his hands as fast as he could. There could be no doubt about
it now. He was shooting toward the top at a good speed.
Suddenly he gave a great gasp as he felt the warm, damp air strike his
face. His lungs were almost at the bursting point, and he felt that he
could not have held his breath a second longer.
Steve lay over on the water, on his back, moving his hands listlessly to
help keep him afloat. Thus far he had had no thought of the ship to
which he belonged. He was too much exhausted to do more than lie still,
which he did, drawing in long, deep breaths of the fresh air. Nothing
had ever tasted so sweet to Steve Rush and he felt an overpowering
desire to go to sleep.
All at once he threw himself over on his stomach as the long, shrill
blast of a steamer's whistle smote his ears.
``It's the 'Wanderer'!'' he cried. ``And they must be miles away.''
The ship was not very far away. It was the blanket of fog that had
smothered the sound of the whistle and made it seem many miles off to
port of him.
Rush raised his voice and shouted. His voice, of course, carried for a
very short distance, for the same reason that had made the ship's
whistle sound a long way off. Again and again did he shout, but not a
response did he get, save the long wail of the siren. Not a light was to
be seen anywhere, nor were there any signs of the other men who had been
in the life-boat with him at the time it was lifted from the water and
turned bottom side up.
A great feeling of lonesomeness came over the Iron Boy when he realized
that he was far out in the lake alone. He, of course, did not know how
far they were from shore, but he believed it to be at least twenty
miles.
He reasoned that his ship would not sail away without him unless the
captain were reasonably certain that Steve had been drowned. The lad
decided to swim in the direction from which the whistle sound had come.
He had taken but a few strokes when he became entangled in a mass of
wreckage. At first he thought he was going to drown before he could
extricate himself, then he discovered that he could not if he tried.
Illustration: Steve Clung to the Door.
Pieces of floating wood were all about him, some of them the lad
recognized as part of a deck house. He fastened to a door that had been
split in half, probably by the explosion, and stretching out full length
upon it, lay still to rest. He was reasonably safe now, though, of
course, unless he were rescued very soon he would become chilled and
slip off into the sea.
The wind began to stir up out of the southwest a little. Steve took
courage from this.
``It will blow me toward the ship,'' he exclaimed. ``That is, if the ship
is where I think it is.''
He began paddling with might and main, steering with his feet as well as
he could, shifting his weight this side and that from time to time as a
swell threatened to upset him.
The siren blew several long blasts.
``That's queer,'' muttered Steve. ``She seems to be getting farther and
farther away from me all the time.''
The reason for this was that Rush was getting farther and farther away
from the ship. He was propelling himself along in the wrong direction.
As the fog began to race on ahead of him he took a look over the waters
that now showed white ridges as far as the eye could penetrate. Not a
light could he see, save one bright light dead ahead of him. The light
winked, went out, then suddenly appeared after a few seconds interval.
``There's the ship!'' he cried. ``But, oh, how far off it seems to be.''
What Steve could not understand, was that he did not see more than one
light. Both masthead lights, at least, should have shown. He decided
that the side light, the red and the green, were too low down for him to
catch a glance at over the tops of the rising waves.
``I'll swim for it anyway,'' he decided, settling to his work with all the
strength that was in him. It would be useless to waste breath in
calling, because those on the ship could not hear him at that great
distance.
Suddenly the wind abated, the fog rolled back over the lake, again
enveloping the swimmer in a dense black mantle. The sea was still
running with him, however, and would continue to do so for some time to
come, thus helping him along.
After a couple hours of paddling and drifting, during which Rush made
considerable headway, the lad realized that he was getting tired.
Further than this he was cold and chilled. The chills extended from his
head to his feet.
``This won't do,'' Steve cried, confusedly. ``If I get much colder I shall
fall off my ship and drown.''
He began paddling with renewed vigor, but, work as he would he seemed
unable to throw off the chill. He realized, too, that his body was
getting numb. The Iron Boy fought desperately, but the more he fought
the more drowsy did he become. His efforts grew less and less and his
progress slower.
Steve wrapped both arms about the door and with cheek pressed close to
it, resigned himself to what he thought would be a few minutes' rest.
His heavy eyelids closed slowly; his breathing grew regular, but faint
and his legs stretched out full length, being in the water up to his
knees.
Steve had given way to the languor that was creeping over him. He was
adrift and alone far out on the treacherous water of the great lake.
\gutchapter{CHAPTER X}
\section*{\raggedright TOSSED UP BY THE WAVES}
\textit{The} light that Steve Rush had seen, the winking, twinkling light came
from the lighthouse on North Point. The North Point light was a
revolving affair, which accounted for its vanishing and then reappearing
at stated intervals.
A few hours passed, though they were as seconds to the unconscious boy
on the slender raft. At last he began to feel a glow spreading over his
benumbed body. He moved a little, took a long breath then settled back
into his former stupor. But the warmth continued to spread. Steve felt a
sense of being on fire. After a while he realized that the support under
him was no longer moving, though he could hear the roar of the waves in
his ears. He found himself dimly wondering why they did not break over
him and drench him and chill him to the marrow.
Steve tried to raise one hand to his head, but the hand was pinioned so
that he could not move it. His curiosity was becoming aroused. Rush
opened his eyes. Before him and above him was a rocky, precipitous
coast. Then in a rush of understanding he realized that he was lying on
the rocky shore of the lake coast. Both hands were still under the door,
which accounted for his inability to raise one of them a few minutes
since.
The sun was beating down hotly, warming the Iron Boy's blood, sending it
more rapidly through his veins.
With a cry of thankfulness Steve Rush got unsteadily to his feet. He was
so stiff that he could hardly stand, though the numbness of a few hours
since was fast passing away.
``I have been carried to the shore and I'm saved!'' he shouted. ``This is
the most wonderful thing that ever has happened to me. But I wonder
where I am.''
It was early in the morning, that was certain. He judged the hour must
be about seven o'clock. His watch had stopped at midnight. Turning
quickly the lad glanced out over the green waters of the lake that
sparkled in the morning sunlight, a gentle ripple ruffling the surface.
Here and there a huge ore carrier was observed, working its way up or
down the lake. Far in the offing thin ribbons of gray smoke told where
other vessels were steaming along.
``I wonder if any of those ships is the 'Wanderer'?'' mused the Iron Boy.
``And I wonder something else, too---I wonder whether I am going to get
any breakfast or not. It is useless for me to try to signal a ship in
here. They probably would not come in even if they saw me, as I imagine
this is shoal water all around here. There must be some one living about
here somewhere. I'll start on a little exploring tour for breakfast.''
Steve turned away and began climbing up the rocks. This being his first
passage over the lakes, he was not at all familiar with the coast and
consequently had no idea where he was.
In the meantime the ship had sailed away. The ``Wanderer'' had lain to
until the first gray dawn of the morning. A few of the men had been
saved, including two of the sailors in the boat Steve had set out in.
All the others in that craft had been lost, as were the greater part of
the crew of the lost steamer. The men rescued from the life-boat were of
the opinion that Steve Rush had gone down with the others.
Bob Jarvis said not a word. His face was pale and drawn. He went about
his duties methodically, speaking to no one, but listening to every word
that was said about the tragedy.
After cutting wide circles for a full two hours the ``Wanderer'' was put
about on her interrupted course.
``South south-west one half,'' announced the skipper in a low tone.
The words meant to all who heard them, that he had abandoned the
search---that the missing men had been given up for lost. Their names
would be added to the list of fifty thousand souls who have lost their
lives on the Great Lakes during the last fifty years.
Captain Simms' face was grave. He had taken a great liking to Steve
Rush. He had lost, as he thought, three men, the first loss of life on a
ship commanded by him since he had been in the service of the company as
a sailing master.
``Mr. Major, you will report the accident and the loss of the men as soon
as we reach the St. Clair River,'' he said.
``Aye, aye, sir.''
Captain Simms left the pilot-house, from which point of vantage he had
been sweeping the waters of the lake with his glasses, and went down to
his own cabin to turn in for a few hours' sleep.
* * * * *
In the meantime the object of the thoughts of nearly every man on board,
Steve Rush, was climbing to the top of the rocks that lined the coast.
Reaching there he sought the highest point attainable and looked about
him.
``I am on an island!'' he exclaimed. ``From the looks of things I am the
only person here. Well, this \textit{is} cheerful, but it is much better than
being out yonder,'' he added with a gesture toward the rippling waters of
Lake Huron.
Rush decided to investigate his island the next thing he did. So he
climbed down to the beach again and began following the coast line. As
he went on he found traces indicating that some one had been there.
There were chicken bones and the charred embers of a recent fire in one
spot. Steve came to the conclusion that fishermen had been on the island
not long since. If this were so there were hopes that they or some of
their kind would visit the place again. Steve walked the greater part of
the day. On one side of the island he saw a large bay. Across a point of
what he judged to be the mainland, he could see another bay and beyond
that a cloud in the sky that looked like smoke.
``There must be a large town or a city over yonder, but I don't know what
it is. I do not even know whether I am in the United States or Canada.''
All day long the lad tramped. When night came he was hungry, stiff and
weak. Had it not been for his splendid constitution and great endurance
he would have given up long before that.
Just before dark he caught sight of a small sailboat slipping easily
along, headed, he thought, for the larger bay on beyond the narrow
point of land.
Steve hailed the craft. One man in the stern of the boat stood up and
gazed shoreward through a glass. Rush swung his arms and shouted that he
wanted to be taken off the island. The man in the stern calmly closed
his glasses and sat down, while the boat held steadily to her course.
Steve sat down, too. He was not so much discouraged as he was angry and
disgusted.
``Why couldn't he have sailed somewhere so I wouldn't have seen him,
instead of drifting by so tantalizingly near me?'' he cried.
There being no answer to the question, Rush began looking about for a
place to sleep. The best he could do was a spot just under a ledge of
rock. The boy went down to the beach and brought back his life raft, the
piece of a deck house door on which he had floated ashore. This he
carried up to his bedroom under the ledge and stood it against the
rocks.
``That will do very well, in the absence of something better,'' he decided
grinning as broadly as the drawn muscles of his face would permit him to
do.
Then Steve crawled under this rude shelter, drawing his coat as closely
about him as possible and went sound asleep.
Steve was exhausted bodily and mentally, and it was not to be wondered
at considering what he had gone through in the last twelve hours.
Besides this he had had nothing to eat since supper on the previous day.
The following morning Rush did not awaken until the sunlight warmed his
bedroom. He crawled out, rubbed his eyes and looked about him.
``Well, if it isn't morning! But maybe it's the next morning; maybe I
slept a day and a night.''
He had now lost all track of time. Steve sat down to think matters over
calmly. His position was a serious one and he understood that full well.
``If I remain here another day I shall be unable to get away,'' he mused.
``Then I shall in all probability starve to death. That won't do. I don't
propose to give up as long as I have any strength left in me, and I
guess I have a little, even after what I have passed through.''
Rush sat studying the narrow stretch of water separating him from the
slender neck of land that he had observed the day before.
``It can't be more than three miles across there. If I had had a good
meal this morning I believe I could swim across to the other shore. That
looks to me like the mainland. There is surely something on beyond
there several miles away. I wonder if I dare try to swim it?''
A little reflection convinced the lad that such an attempt could end but
one way---he would drown before he reached the neck of land.
His eyes roved about, after a while resting reflectively on the piece of
deck-house door that had served his purpose so well after the sinking of
the steamer. A look of new-found intelligence gradually grew in his
eyes.
``The very thing! Hurrah!'' he cried, springing up and dancing about,
forgetful for the moment, that he needed all the strength he had left.
``I swam on the door all night. Surely I can stand a few hours more on it
in the bright sunlight. Why didn't I think of it before?''
Rush lost no time in acting upon the suggestion that had come to him. He
grabbed up the cabin door and began staggering down the rocks with it.
The door was heavy and he was weak. Once he stumbled and fell. The door
went clattering down over the rocks, Steve bringing up in a heap some
distance above it.
``There, I'll bet it's broken. If it is I'm done for.''
But the door was not broken. It was tough enough to stand the hard usage
to which it had been subjected. Steve was after it with a shout as soon
as he saw that it had not been split.
After that he proceeded more carefully; within a few minutes he reached
the beach with his burden. There the lad paused to think over the best
way to go about his own rescue. He took off his coat slowly, folded and
placed it on the door, then removing his suspenders he tied the coat
fast to his raft.
``There, I think that's all I had better take off or I shall get chilled
again.''
After a final, sweeping glance at the sea, the lad shoved the raft, or
rather one end of it, into the water and sat down on the beach to rest
and gather courage for the great undertaking before him.
``It beats all what a man will do for the sake of a meal,'' he grinned. ``I
might stay on this island all summer, and have a pretty good time, were
it possible for me to get along without food. But, no; I've got to eat
or I'll die. Well, here goes.''
He shoved the door out into the water, pushing it along ahead of him
until the water was up to his shoulders. Rush then slid his body up on
the raft and began paddling with his hands and kicking his feet, pushing
himself along, heading around a curve of the island, for the extreme
narrow point of land jutting out into the lake.
\gutchapter{CHAPTER XI}
\section*{\raggedright BY PLUCK ALONE}
\textit{After} half an hour of steady paddling, Rush shoved his coat up for a
pillow and lay flat on the slender raft to rest himself. He was
breathing hard from his exertions; in fact, he was well nigh exhausted.
But the Iron Boy's pluck was of the same quality as ever. Nothing could
weaken that, no matter how dire his predicament.
``I could make better time swimming,'' he mused, raising his head a little
and gazing longingly at the shore that now seemed farther off than
before, ``if I only dared. I don't mean that; I do dare, but it would not
be prudent. I want to get to the mainland, and I think my present method
is the best one to get me there. Well, I must start the engines going
again,'' decided the lad, grinning at his own humor.
Had any one chanced to be looking in his direction from the shore, that
person probably would have thought he was gazing upon some strange
creature from the deep, for Steve was making the water foam all about
him. His head and the end of the board were all that were visible above
the surface. Once he paddled so fast as to cause him to lose his
balance. His raft turned turtle, landing Rush on his back in the water.
Laughing almost gleefully at his own misfortune, the lad, in a few swift
strokes, regained the door.
``That was just so much effort wasted,'' he remarked. ``I must remember
that I am not running a race. I ought to be in pretty good trim for one,
though; if I get through with this one I shall be fit for most any kind
of an old race that I come across.''
For the rest of the journey Steve made no attempt to spurt. He paddled
along steadily, making slow but sure progress toward the goal on which
his eyes were continually fixed.
The sun was at its zenith when, slipping from the board, he found solid
rock under his feet. Steve tried to shout, but he was too worn to raise
his voice. He clung to the door until it grounded with a grating sound
on the beach. Steve lay there for a few minutes. Then he staggered to
his feet, making his way up the beach a few feet from the water, there
to throw himself on the ground exhausted.
For nearly two hours he lay resting, having fallen into a deep sleep.
Then he awakened, sat up, resting his head in his hands for one last
little wink, the wink that was to give the lad the strength and courage
to take up his journey.
``Hello, what's the matter?''
Rush started up suddenly. He saw before him a boy somewhat younger than
himself, dressed in rough clothes. The boy was carrying part of a fish
net.
``Say, I'm glad to see you, and don't you forget it,'' exclaimed the Iron
Boy, striding forward and grasping the hand of the other lad, much to
the latter's astonishment. ``Who are you?''
``I'm Billy Trimmer. I am a fisherman---me and my father.''
``Do you live near here?'' asked Steve eagerly, with visions of a meal
before him.
``Nope. We live over yonder,'' pointing to the cloud of smoke that was now
much more plainly in evidence than before.
``Is that a town over there?''
``Yes.''
``What is the name of the town?''
``Alpena.''
``Oh! And what do you call that little island over yonder?''
``That one with the stones sticking up all over it like a porcupine's
back?''
``That describes it. Some of them are sticking into me yet.''
``That's Little Gull Island.''
``How far is it to Alpena?'' questioned Rush.
``'Bout ten miles.''
Steve uttered a long, low whistle.
``What's the easiest way to get there?''
``Hoof it. Ain't no other way.''
``That's too bad. Is there a house anywhere near here where I could buy
something to eat?''
``Nary a house. But you kin git all you want over to Alpena.''
``Thank you very much. I think I will be going.''
``Say, where'd you come from?''
``From the lake---out of the lake. I was drowned out there last night, or
pretty nearly drowned. A steamer went down and I was carried under------''
``A steamer?''
``Yes.''
``Which one?''
``The `Macomber,' I think it was. Coal laden and------''
``I must tell Pa,'' and the fisher boy was off on the run.
Steve gazed after the lad reflectively.
``I'd give a ten-dollar bill to anybody who would tell me how to run like
that now. Poor Bob, I'll bet he's eating his big heart out for sorrow
over my disappearance.'' Steve paused. ``They think I'm drowned, of
course, they do, and I ought to be. It must have been intended that I
should be, but somehow I didn't arrive on schedule time.''
Chuckling to himself, the lad started on toward the city, ten miles
away. He tried to make himself forget his weariness by whistling and
singing. Coming to some willow bushes, he cut the stiffest small branch
he could find, from which he trimmed the nubs, then started on, whipping
his legs with it.
This seemed to start the circulation, and at the same time to take his
mind from his own weariness. After a time the wet, swollen shoes began
to chafe his heels, and it was not very long before the skin had been
worn from both heels. Then a blister suddenly bobbed up on the ball of
the right foot.
The boy took off his shoes and tried to doctor the sore spots, but there
was nothing he could do save tear up his handkerchief and bind up the
affected parts.
``A boil on my nose, now, would just about complete my misfortune,'' Rush
grinned. ``I'm going to carry my shoes in my hands.''
This did not work very well, for Steve's feet were sore and the rocks
over which he was walking made his feet more tender than ever, so he put
the shoes on again. They had shrunk, of course, and the putting on was
attended with a great deal of pain. Steve Rush did not even grunt. He
drew them on almost roughly, stamped in them and jumped up and down.
``There, I guess that'll fix that blister, anyway. I wish I could jump on
the sore spots on my heels and cure them as easily.''
He started, and kept on without another stop until three o'clock in the
afternoon, when Rush halted for a drink of water at a little creek that
crossed his trail.
It was a sore and very much dilapidated young man who crawled into the
town just before supper time that evening. Realizing that his appearance
was far from prepossessing, Rush sought the back streets, following them
in so far as possible, keeping an eye out for a hotel that he thought
might be respectable.
He found such a place after some searching about, during which the
policemen he passed had eyed him suspiciously.
Steve entered the place, which proved to be a farmers' hotel, and asked
if he could get supper and lodging there. The man behind the desk eyed
the lad narrowly.
``You've made a mistake young fellow,'' said the clerk.
``How so?'' inquired Steve innocently.
``You should go out and see the hostler. Maybe he'll put you up. We don't
keep your kind in here.''
Several bystanders laughed at the boy's expense. But Rush never
flinched.
``Oh, I beg your pardon, sir; I thought I was in the stable. This must be
where you herd the other lower animals. I see they are all here.''
Before any one could recover his wits sufficiently to make a retort,
Steve had stepped out of the place.
Next the boy tried a restaurant. He got no further than the desk when he
was held up by the proprietor.
``Hold on; where are you going?''
``I wish something to eat,'' answered the boy politely.
``You're in the wrong place, and------''
``No, I am not. That's what the fellow told me the last place I called
at. They can't both be the wrong place, so this must be the right one.''
The proprietor of the place stepped out from behind his desk, laying a
firm hand on Steve Rush's shoulder. A peculiar glint shot into the eyes
of the Iron Boy, but he stood still.
``We can't serve you here. This is a gentlemen's restaurant. Perhaps you
will find something that will suit you down on the south side.''
``I have money, sir. I am willing to pay for what I get. I have been in a
shipwreck and am not very presentable------''
``I can't help it; you'll have to get out.''
``See here, sir, I shall not get out until I have had my supper. I have
had nothing to eat in twenty-four hours, and I'm hungry.''
``Go on, go on; don't raise any disturbance here.''
Steve walked over and laid a five-dollar bill on the desk.
``There's your money in advance. Give me the change after I have finished
my supper------''
``I said I couldn't serve you here. I------''
``Oh, yes you can, and what's more you're going to.''
``I'll call a policeman and have you put out.''
``Look here, Mister Man, unless I get some supper here quickly, I'll have
the law on you. You are keeping a public house, and you have no right to
turn me out.''
Steve didn't know whether he were right or not, but he took a long
chance. He saw at once that he had made a good point, so he pressed it
further.
``I am going to sit down at that table over there, and I shall expect to
be served at once.''
The proprietor's hand fell from the Iron Boy's shoulder as the latter
strode to the nearest table and seated himself. A waiter stepped up to
him asking what he would have, at the same time thrusting a bill of
fare on the table in front of the boy.
``I think I'll take about five dollars' worth of ham and eggs,'' answered
Rush without a trace of a smile on his face.
\gutchapter{CHAPTER XII}
\section*{\raggedright ON THE ROAD TO CONNEAUT}
\textit{Steve} had no further difficulty at the restaurant, though he noticed
that the proprietor of the place was watching him and scowling at him
all through the meal.
``I usually get what I go after,'' thought the boy. ``In this case it is
food.''
After paying his bill he hunted up a clothing store, where he fitted
himself out with a new suit, shirt, necktie, straw hat and a suit of
underwear, for everything that Steve had on was practically ruined.
This, with a pair of shoes purchased at another store, made him look
quite like his usual self.
Arrayed in his new suit Steve had no difficulty in getting into one of
the best hotels in the city. He left a call for six o'clock that he
might catch a train to Detroit, where he hoped to catch the ``Wanderer.''
He nearly missed the train next morning, because of his longing for a
cat nap. Arriving at Detroit he visited a newspaper office and inquired
if the ship had been sighted.
``Passed down during the night,'' was the discouraging answer.
``Where for?'' questioned the boy, as the ships usually got their
destination orders when they passed Detroit.
``Conneaut. See here, you are not one of the men who were on that ship
are you?'' questioned the newspaper man.
``Thank you, sir. I will be going. Can you tell me what time I can get a
train for Conneaut?'' answered Rush, avoiding the question.
Steve felt that he would be called upon to make a report of his share in
the disaster, and his good judgment told him that he should not make a
first statement to any one outside the company.
The next train out did not leave until late in the afternoon, so Rush
employed the time in going about the city. He visited all the places of
interest, getting his luncheon at a large hotel on the hill. The hotel
was named after a famous Indian Chief, but the prices asked for the
luncheon made Steve gasp.
``My wages would keep me here about three days,'' he muttered.
Later the lad boarded a train and hurried toward his destination. He did
not know whether he should find his ship in port or not, reasoning that
the craft would have to proceed under reduced speed the rest of the way
down on account of the smashed-in bow.
Shortly after dark the boy arrived. Inquiring his way to the ore docks,
he hurried down toward the inlet. This was a narrow canal, leading up
into the lower part of the town for some distance. Ships were packed in
the inlet, side to side, like sardines in a box. Most of them were lying
with anchor lights up; others with their running lights still lighted,
showing that they had just arrived in port. On either side of the inlet
loomed the dark trestles, from some of which the rattle and roar of
unloading machinery arose in a deafening chorus.
``This is about all a man's life is worth to face,'' decided Steve, as he
dodged a swiftly moving car that towered above him loaded with ore. Then
he narrowly missed being ground under a traveling crane that was in
operation unloading a ship.
``Can you tell me, sir, if the `Wanderer' has arrived?'' asked the boy of
a yard policeman who approached the lad to find out what he was doing
there.
``She's outside the harbor now. I heard her whistling for a tug a few
minutes ago. But we don't allow strangers in the yards here. It is too
dangerous.''
``I belong on the `Wanderer,''' explained Steve.
``Oh, you do, eh?''
``Yes.''
``Then what are you doing here?''
``Waiting for her.''
``When did you leave her?'' questioned the officer suspiciously.
``A couple of days ago, somewhere about the middle of Lake Huron. I went
down when the wreck occurred.''
The story of the wreck and the sinking of the coaler had by this time
been spread all over the country. The policeman gazed at the boy with
wondering eyes.
``You don't say?''
``Yes, sir.''
``Tell me about it.''
``I am sorry, but I think I had better say nothing until I have talked
with Captain Simms. Do you know where the `Wanderer' is going to berth?''
``See that pig there, just shifting her position?'' referring to a
whaleback, the latter style of boats being known to sailors on the lakes
as ``pigs,'' because of their pig-like bow.
``Yes.''
``The ship you want is coming into that berth. See, there's a crowd of
reporters waiting around there now to interview the captain.''
``I guess I'll keep out of their sight, then,'' laughed the lad.
Steve paced up and down the dock keeping well in the shadow, watching
the channel with eager eyes. He could hardly wait until the ship got in,
so anxious was he to relieve the anxiety of his companion, Bob Jarvis.
``There she comes,'' announced the policeman.
Steve shaded his eyes and gazed intently. Yes, sure enough it was the
``Wanderer.'' He could make out her broken nose now and the peculiar set
of her sticks. The lad had never before realized the size of the ship.
She seemed to loom up in the air higher than any of the buildings on the
opposite side of the inlet. All was dark on board her, no light save her
running lights showing; but up there in the darkened pilot-house Steve
knew, keen, cautious eyes were watching out for the safety of the boat
as well as for the safety of others in the harbor.
Rush heard the rasping sound of the bridge telegraph as the signal was
given to reverse. The spring-rope came whirling through the air and a
moment later the big hawser struck the water with a splash, being
quickly drawn to the dock by the dock hands.
All this was very interesting to Steve Rush, for it will be remembered
that he had never watched the docking of an ore boat before. The figure
of Mr. Major, the first mate, was faintly outlined at the rail, looking
down and giving orders to the men on the dock in a sharp, business-like
tone.
``Put out the ladder!'' the mate commanded.
The ladder came over the side, and was let down carefully until it
rested on the dock. Before any of those on board had an opportunity to
go over the side Steve had sprung to the ladder, up which he ran nimbly,
swinging over the rail to the deck of the ``Wanderer.''
``See here, young fellow, what do you want?'' demanded the mate. Then he
leaned forward, gazing keenly at the newcomer.
``Wha---what------''
``Steve!'' screamed Jarvis, rushing across the ship and throwing his arms
about young Rush. Jarvis was so overcome with emotion that for the
moment he found himself unable to utter another sound.
``Rush!'' cried the mate, fairly pulling the boy away from his companion
and wringing both Steve's hands. ``Why, why, we thought you went down
with the coaler.''
``I did. I guess I'm too tough to die. I surely have had plenty of
opportunity to do so.''
``Wait till I get through docking the ship, and then tell me all about
it.''
``I must see the captain first. Is he up in the house?''
``No; I think he just went down to his cabin.''
``Were any of our men lost?''
``Two of them. Jarvis here leaped overboard and saved four men from the
other ship, who were drowning while trying to swim out to us.''
``Good boy, Bob,'' said Steve as he patted his companion affectionately.
``You must tell me all about it when we get to our cabin, by and by. I
have had some experiences, too, some that will make you laugh.''
Others of the crew were pressing forward to shake the hand of the plucky
Iron Boy, for both boys were popular with all hands save the stoke-hole
crew.
``I must see the captain, Bob. I'll be back in a few minutes.''
Steve hurried up to the forward deck, rapped on the door and was bidden
to enter. Captain Simms looked, then blinked rapidly as his eyes fixed
themselves on the boy framed in the cabin doorway.
``Hello, is that you, Rush?''
``Yes, sir.''
``I thought there wasn't water enough in Huron to drown your kind.''
``No, sir.''
``Come in and sit down. I want to talk to you.''
\gutchapter{CHAPTER XIII}
\section*{\raggedright IN THE GRIP OF A GIANT SHELL}
\textit{Before} Captain Simms would permit the lad to leave him, he had to hear
the story of Steve's experiences. The story was frequently interrupted
by grunts of approval on the part of the skipper. The latter was not an
emotional man, as was evidenced by his greeting of Rush after the boy
had, as it were, risen from the lake.
Rush's story finished, he asked the captain to tell him all about what
had occurred after the accident.
``It isn't what did occur so much as what's going to happen,'' answered
the master gloomily.
``What do you mean, sir?''
``I shall lose my license.''
``What, and you not to blame? Impossible.''
``Yes, but how am I going to prove that I am blameless?''
``The authorities will believe what you say, will they not?''
``They have just as good a right to believe the captain of the other
boat. He will say it was my fault, and perhaps I shall say it was his
fault, and there you are. Both of us will lose out in the end. The other
skipper was saved and I am glad of it. It seems too bad that, after all
these years on the lakes without a blemish on my record, I have to be
knocked out at this time. My wife and little girl will be heart-broken.''
``Perhaps it will not be so bad as you think, sir. Of course, we are all
deeply grieved over the loss of life. That cannot now be helped. It is
our business to find out where the blame is and fix it there, no matter
whom it hits. I know one whom I am pretty sure it will not hit.''
Captain Simms squinted at the lad.
``Who?''
``Yourself.''
``Rush, you're a fine fellow. I like you,'' announced the skipper, with
something approaching enthusiasm in his voice as he stepped forward and
grasped the hands of his deck man in a grip of iron. Steve thought he
had a pretty good grip himself, but his own was as nothing compared with
that of the captain of the ``Wanderer.''
``I reported the accident from Detroit, and was ordered to proceed to
destination if able. I haven't heard anything from headquarters yet. I
shall hear something in the morning, as soon as our arrival here is
reported.''
``When do we unload?''
``They begin in about an hour.''
``Then I must get into some old clothes and get ready for work.''
``You need not go on duty to-night, unless you wish to.''
``I prefer it. You see, I have been idle for a couple of days and I shall
get out of practice,'' replied the boy, with a good-natured laugh.
``Idle! Humph! After swimming half way across Lake Huron, being drowned
into the bargain, walking almost across the state of Michigan, going
without food for twenty-four hours, not to speak of a few other little
things---then to talk about being idle. Go back and tell the cook to set
up the best on the ship. After you have had a good meal you may go to
work, if you wish. I suppose you'll not be satisfied unless you do. Go
on with you. Tell the first mate I want to see him.''
An hour later found Steve in his working clothes. The cranes for
unloading were just being moved into place when he reached the deck.
These were huge affairs, each provided with a giant scoop that gulped a
little mouthful of some fifty tons of ore every time its iron jaws were
opened.
There was a rattle and a bang as the hatch covers were being ripped off
and cast to the far side of the deck; men on the trestles were
shouting, whistles were blowing in the harbor, gasoline launches
conveying ship's officers to and from the other side of the inlet, were
exhausting with vicious explosions. Steve thought he had never seen such
confusion before, yet he knew full well that there was in reality no
confusion about it. Everything was being worked out in keeping with a
perfectly arranged system.
``Rush, you get down in the hold and take charge of the unloading,''
ordered the mate.
Steve hurried below. The hold was dimly lighted by an electric light at
either end. He did not know exactly what he was expected to do. The
great scoop dived down, swallowed a mouthful of ore and was out with it
like some huge monster, almost before Rush realized what was going on.
``Whew! That's going some!'' he exclaimed. ``There comes the thing again.
Hello, up there!'' cried the boy, with hands to mouth. ``Hadn't you better
take out some from the other end so as to unload the boat evenly?''
``Yes, that's what we've got you down there for, to watch things,''
shouted a voice from the deck. ``You're all right. Keep it up!''
``I don't know whether I am, or not,'' muttered the boy making his way
over the ore to the stern of the hold. ``This strikes me as being a
dangerous sort of spot.''
He watched the huge steel lips of the scoop as it felt about like the
lips of a horse gathering the oats from its manger, quickly grabbing up
its fifty tons of ore then leaping for the trestle some fifty feet
above, where it dropped its burden into cars waiting to transfer the ore
to the furnaces.
Load after load was scooped up. The rattle and the bang of the unloader
was deafening. It made the Iron Boy's ears ache.
``According to the speed at which we are unloading, now, we should be
finished in about four hours,'' he said. ``This is the most wonderful
mechanism I ever saw!''
There came a lull, during which the ship was moved further astern, in
order that the unloader might pick up ore from the forward part of the
hold. By the time this had been done, and the huge crane shifted to its
new position, nearly an hour had been lost.
The boy pondered over this for some time. It seemed to him like an
unnecessary loss of time.
``Why, so long as they have one crane at an unloading point, should they
not have more?'' he reflected. ``This is worth looking into.''
He thought he saw where a great improvement could be made, and he
decided to think it over when he had more time. Perhaps he could
suggest something to the officials that would be of use to them after
all.
Steve and his companion, while working as ordinary seamen, were drawing
the same fine salaries that they had received in the mines. Therefore
the boys felt it was their duty to earn the money being paid to them by
doing something worth while. They were getting three times as much as
was paid to the other men doing similar work.
As Rush was thinking all these things over the lights in the hold
suddenly went out, leaving the place in absolute darkness.
``Lights out!'' he shouted.
A rush of air fanned his cheek. He raised a hand to brush away some
object that seemed to be hovering over him. It was as if invisible hands
were groping in the dark, feeling for the Iron Boy's face to caress it.
Steve instinctively crouched down as low as he could on the ore. There
was little of it beneath him, the greater part having been removed by
the giant shell of the unloader.
Suddenly with a groan and many creakings the object whose presence he
had dimly felt now closed over him.
``The unloader!'' cried Steve. ``It's caught me! It's caught me!''
\gutchapter{CHAPTER XIV}
\section*{\raggedright STEVE SAVES THE CAPTAIN}
\textit{Fortunately} for Steve Rush the load scooped up by the unloader, chanced
to be a light one, only a few tons being in the scoop itself. That left
him head room so that he was not crushed against the upper side of the
giant shell. Still, his quarters were cramped and the sensation was, if
anything, more trying than had been that when he found himself alone in
the waters of Lake Huron.
``I'm done for this time, I guess. Hello, there! Stop the machine! I'm
caught!'' he shouted.
In the groaning and creaking of the great crane his cries for help were
unheard. Steve felt himself being borne swiftly through the air. Up, up
swung the great shell, swaying dizzily from side to side after it left
the deck of the ship. As it passed out of the hold Steve uttered a shout
louder than the others. He was not frightened, but, as was quite natural
under the circumstances, he wanted to get out of his unpleasant
predicament.
Bob Jarvis, who was at the rail, heard the cry. He divined the truth
instantly. Springing to an open hatch he leaned over, bellowing out the
name of his companion into the hold. There was no response. Bob did not
believe there would be.
``Stop it! Stop it!'' he shouted.
It is doubtful if the crane man heard, and if he did he failed to
understand, for the big shell kept on mounting to the top of the
trestle.
``What's the matter!'' demanded the mate. ``You're enough to raise the
dead.''
Jarvis did not stop to answer. He sprang for the side of the ship,
leaped over the rail, and, catching the sides of the ladder, shot down
to the pier without touching a single rung of the ladder. The instant
his feet touched the pier the lad darted off to the trestle. A cleat
ladder extended up the side of the trestle to the top. Bob ran up it
like a real sailor and rushed over the ties to the place where the train
was being loaded for the furnaces.
In the meantime, Steve Rush had been hoisted to the top. He knew what
was coming. The lad braced his feet and shoulders against opposite sides
of the scoop, hoping thereby to hold himself in place. He had forgotten
that the shell would open up at the proper moment in order to discharge
its load---would open up so wide that not even a fragment of anything
would be left within it.
Suddenly the great jaws of the shell opened with a crash and a bang.
There followed the roar of rushing iron ore as it dropped into the
waiting ore car on the track.
Rush dropped like a stone. He landed in the railroad car, half buried
under the ore, dazed and bleeding from the sharp pieces of ore that had
hit him on the head during his descent.
``Hey there, stop it, stop it!'' shouted Jarvis, running toward the spot
as the crane was swinging the scoop off toward the ship for another
load.
``Stop what?'' demanded the foreman of loading.
``You've dumped a man from that scoop! Which car was it?''
The foreman laughed easily.
``I guess you must be crazy.''
``Which car is it, I say? Answer me quick. He may be killed, or------''
``That's the car right there, the last one filled and------''
But Bob was bounding toward the place with desperate haste.
``Steve! Steve!''
``Ye-yes, I'm \textit{it} again,'' answered a muffled voice, dragging himself from
the ore, shaking the dirt from him.
``Look out for the shell! It'll be on you again before you know it,''
warned Jarvis. He had heard the creaking and groaning of the machinery,
sounds, which told him the big scoop was on its way upward again with
still another load of the red ore.
Rush staggered to the edge of the car.
``Jump!'' commanded Bob.
Steve did so, not knowing where he would land, but with perfect
confidence in his companion's presence of mind. No sooner had the lad
cleared the car than a load of ore was dumped on the spot where he had
been standing but a few seconds before.
Bob grunted as the heavy body of Steve Rush landed full in his arms,
causing the former to sit down heavily on the trestle with the dirt from
the dumping shell, showering over them.
``Good for you, Bob! You saved my life. Let's get out of this place.''
``I am perfectly agreeable to that. How do we get down?''
``There are two ways. One is to jump off and the other is to go down the
ladder. The latter is the way I'm going. Perhaps you prefer the other,
judging from your past performances as the horsemen would say. You have
made some pretty good records as it is.''
Bob made for the ladder, followed by Steve. When the two boys climbed
over the rail to the deck of the ship, the first mate gazed at them in
astonishment.
``I thought you were down in the hold, Rush.''
``So I was,'' laughed the boy.
``What did you come out for?''
``I couldn't help myself. I went up in the scoop, which caught me when
the lights went out down there. Something is the matter with your
electric arrangements down there, I guess.''
Mr. Major gasped.
``You don't mean you went up in that thing?''
``I guess I do.''
``He got dumped on an ore car,'' added Jarvis by way of explanation. ``And
he lives to tell the tale.''
``Get down in the hold. The ship is listing to port. They are taking too
much out on that side. Jarvis, you run back and tell the engineer to
have his electrician find out what is the matter with the lights in the
hold. Look out for yourself, Rush, this time. I am beginning to think
you are a hoodoo.''
``And I am beginning to hold the same opinion,'' answered the Iron Boy.
``If you keep on we won't be able to get a sailor to ship on the same
craft with you.''
``I don't know that I should blame them much for feeling that way.
Trouble is tied to my heels, but somehow I manage to get through on a
pinch,'' laughed the boy, hurrying for the stairway that led down into
the entrance to the ore hold.
The ship was fully unloaded at midnight. All hands were dirty, dusty and
tired when they started aft to wash up and get ready for bed.
``Where's that soogy barrel?'' yelled one of the deck hands, meaning the
receptacle holding hot water, well soaped, from which the men filled
their basins for washing.
``It's down in the engine room being steamed out. There's another one
down in the lazaret. We'll fetch it up and have it filled before those
lubbers down below get the old one ready.''
``We'll help,'' cried Steve. ``Come along, fellows. I guess the whole crew
ought to be able to get the barrel up without calling any of the dock
hands to help us.''
They started away, laughing, and the barrel was hoisted from the lazaret
or storeroom near the stern of the vessel, quickly filled from a
hot-water pipe and a good portion of the contents distributed among the
men.
In another hour all hands save the anchor watch were sound asleep, the
captain with the stoicism of the sailor, sleeping as soundly as the
rest, notwithstanding the fact that he might wake up in the morning
shorn of his command, a disgraced man.
Instead, on the following morning the ``Wanderer's'' master received a
message from Duluth ordering him to report immediately for a hearing. He
was instructed to bring with him certain men of his crew. There was no
time to be lost. Without waiting for breakfast the captain ordered Mr.
Major, the first mate, the Iron Boys and the wheelman on duty at the
time of the collision to make ready to accompany him to Duluth at once.
The message further stated that the ship would be taken to Duluth for
survey and repairs by a master who was then on the way to Conneaut.
The party got away within a few minutes, the second mate being left in
charge, and thirty minutes later they were on their way to the north.
The examination took place that evening immediately after the arrival of
the officers and men from the ``Wanderer.''
The examination was to be a strictly company examination, but the
government officers in charge of the licensing of pilots on the Great
Lakes were on hand to listen to the testimony and to decide whether
further investigations were necessary. Mr. Carrhart and the
superintendent of the line of steamships belonging to the company were
present to take an active part in the investigation.
Captain Simms was the first witness called. He gave his version of the
accident, explaining the position of the ship, the course it was sailing
on at the time and all other facts in his possession. The fact that he
was on duty at the time, and that the ship was sailing under reduced
speed, was a point in his favor, though it did not by any means serve to
relieve him of the responsibility for the accident.
``Who was on the bridge at the time of the accident?'' asked Mr. Carrhart.
``Stephen Rush. Jarvis was on watch in the forepeak.''
``We will hear Rush next,'' said Mr. Carrhart.
The Iron Boy was called in from an adjoining room, where the witnesses
had been placed. When a witness finished his testimony he was permitted
to sit down in the room and listen to the proceedings. This Captain
Simms did. Steve took his place in the witness chair.
``You were on the bridge watch on the night that the `Wanderer' collided
with the `Macomber,' were you not?'' asked the superintendent, who was
conducting the examination.
``Yes, sir.''
``State what occurred.''
Steve, in a clear, firm voice that carried conviction with it, related
briefly and tersely all that he knew of the collision. He omitted his
experience in drifting ashore, but a few questions from Mr. Carrhart
served to draw out that most interesting recital. All hands listened
attentively.
Each face, as the narrative proceeded, expressed silent admiration for
the wonderful pluck and endurance of the Iron Boy. But his hearers did
not feel surprised at what he had accomplished after they had studied
the firm set of the lips, the square-cut jaw and the clear, steady eyes.
``You had sighted the side lights of the `Macomber' some time before the
collision, had you not?''
``Yes, sir; about half an hour before the crash came, I should say,
roughly speaking.''
``What was the position of the two ships?''
``I don't know that I can explain it so that you would understand. I can
draw a diagram of it if you wish.''
``Do so.''
Rush quickly outlined the position of the two ships on a pad of paper
and handed it to his questioner.
``Do you know what the course of your ship was?''
``Not so that I could name it. I would know if I had a compass---I mean I
could point it out.''
The superintendent called for a compass card, which a clerk brought from
his office. Steve studied it a moment, turning the card around until he
had placed it in the desired position.
``This is where we were, up to the time the fog came down and we couldn't
see anything more,'' he said, placing a finger on a point on the card.
``But you were on the bridge. How could you know this?'' demanded the
questioner.
``I was watching the bridge compass, trying to learn something about it.
You see, this is my first experience on a ship and I was anxious to
learn all I could.''
``Then your course was south-south-west-one-half?''
``I don't know, sir. The little mark on the compass rim was on the point
that I have indicated, previous to the time the fog settled.''
Thus far the lad's testimony had corroborated all that the captain had
said.
``Have you had any talk with Captain Simms as to what you should testify
to?'' interrupted one of the government representatives.
``Certainly not, sir,'' answered the boy flushing. ``Captain Simms is not
that kind of man. He expects me to tell the truth, and that is what I am
trying to do.''
``We understand that, Rush,'' interposed Mr. Carrhart, soothingly. ``You
are giving us some valuable information. The gentlemen merely wish to
get at all of the facts.''
``Now, Mr. Rush, let me understand this clearly. You say that the course
was south-south-west-one-half just before the fog settled?''
``Yes, sir, if that is the course indicated by that point,'' again placing
his finger on the compass card.
``Am I to infer then that the course was changed after the fog came
down?''
``Yes, sir.''
``Ah!''
The spectators straightened up at this. Their faces were grave. An
important piece of evidence had been brought out. It might be against
Captain Simms, or it might be in his favor. All depended upon the boy's
further testimony.
``What was the course after the change?''
Steve again pointed to the card.
``We swung over to this point.''
The superintendent and the government representatives examined the point
indicated by Steve very carefully.
``South-south-west flat?''
``If that is it, yes sir.''
``Captain, you may answer where you are. Did you change your course as
indicated by Rush?''
``I did. The boy is right. He hasn't eyes in his head for nothing. He
sees more than any one else on my ship does.''
``Did you think what the reason for that change of course was?'' demanded
the superintendent, again turning to Steve.
``I thought it was to make sure that we should clear the other ship.''
``Yes; according to the position of both vessels, the `Macomber' had the
right of way,'' interjected the captain. ``I changed the course to clear
them, and I should have done so. I don't understand, yet, why I did
not.''
``Why did you not tell us of this in your testimony?''
``I did not think of it.''
``Even though it was in your favor?''
The captain nodded.
The captain of the lost ``Macomber'' was called in.
``What course was your ship steering when the collision occurred?'' he was
asked.
``I supposed it was the course as indicated on the report made by me.''
``You were in your cabin asleep?''
``Yes, sir.''
``Who was on duty in the pilot-house?''
``The mate and the wheelman.''
``They were lost?''
``They were.''
``You know of no reason why they should have changed their course so as
to throw your ship squarely in front of the 'Wanderer'?''
``No earthly reason.''
``They were thoroughly capable and experienced men?''
``Yes, so far as my observation went.''
``You admit that the course of your ship was changed, do you not?''
``If what the young man and Captain Simms say is true, our course must
have been changed. I cannot but think the mate must have lost his head,
or else failed to note the position of the compass while he was busy
peering ahead. That is probably the explanation, the wheelman forgetting
himself in looking ahead also. He knew there was a ship under their
bows; both knew it and they were naturally anxious.''
``You would not have mentioned this had not the young seaman Rush brought
it out?''
``I might not have, because I did not know it. It puts the matter in an
entirely new light.''
``You admit, then, that your vessel was in the wrong?'' interposed one of
the government officials.
``I am obliged to, granting that the statements we have heard are
correct, and I have no idea that they are not. While I am responsible
for the safety of my ship, I do not see how I can be held accountable
for the disaster. I did not know there was a fog and no word was brought
to me to that effect. A man must get sleep at some time, and what better
time than when the skies are fair and the sea is calm?''
The officials cleared the room, after which they went into executive
session with the government men. Their discussion lasted little more
than half an hour. The two captains were then sent for, the witnesses
being allowed to enter the room also.
``Captain Simms,'' announced the superintendent of the steamship line, ``we
find you free from all blame in this matter. You did all that you could.
You let your ship swing off sufficiently to have cleared the `Macomber';
you were under reduced speed, and you were at your post where you should
have been under the circumstances. Besides this, you and your crew did
heroic service in rescuing the men of the ill-fated ship. You lost two
of your own men in so doing and nearly lost a third. Especial credit is
due to Seaman Robert Jarvis, who bravely saved several lives at the risk
of losing his own. As for you, Captain,'' he added, addressing the master
of the ``Macomber,'' ``I am sorry to say that we shall have to lay you off
for sixty days. While you were not physically responsible for the loss
of your ship, you are morally responsible. Had you been at your post,
and had there been no errors of judgment on your part, you would have
been freed from blame. At the expiration of your suspension you will no
doubt be assigned to another ship. The government officials here concur
in both decisions. They agree that Captain Simms is wholly blameless for
the disaster.''
Captain Simms did not smile. His face was grave. He was sincerely sorry
for the other captain. He knew how easy it was for a man to lose his
place in the line through no immediate fault of his own. Simms himself
might have been in the position of the other man had it not been for one
keen, honest, observant boy.
``Gentlemen, I wish to say a word,'' announced Mr. Carrhart, rising. ``I
wish to say that this board owes a vote of thanks to Seaman Stephen
Rush.''
``We do,'' assented several voices at once.
``I know Mr. Rush and his friend Jarvis very well, and I have watched
their careers for the last two years. They always do well whatever is
set before them to do. Had it not been for Rush's very explicit
testimony---for his keen observation, we probably should not have gotten
at the facts, and a great injustice might have been done to Captain
Simms, though that would have been largely his own fault. Captain Simms,
you will proceed to Detroit in the morning and take charge of the
`Richmond,' our new steel, ore-carrying steamer, which is ready to go
into commission at once. I presume you will take these two young men
with you on the new boat?''
``I certainly shall if they will ship with me,'' answered Captain Simms
promptly. ``I wish I had some more men like them. Even half as good men
would do very well.''
The captain stepped across the room and grasped Steve by the hand.
``I owe this whole business to you, Rush, and you bet I won't forget
it!''
\gutchapter{CHAPTER XV}
\section*{\raggedright AT THE WHEEL}
``\textit{Isn't} she a beauty!'' said Steve admiringly, as, with Jarvis and Captain
Simms, he stood on the dock at the shipyards in Detroit, gazing up at
the new steamer, the finest ship of her kind plying the lakes.
``She is,'' agreed the master proudly, ``but I'm not forgetting that I
might not have had her if it hadn't been for you. Let's go aboard and
look her over.''
All hands climbed the ladder to the deck. Besides the usual two
deck-houses, fore and aft, there was another house just aft of the
forward house. This was the guest or passenger dining room where the
guests of the line would be served with their meals. After admiring this
the men went forward. The captain's quarters were handsomer than
anything the men ever had seen before.
``The only trouble with this outfit up here is that it's bigger and I'll
be lonesome up here,'' laughed the captain.
``We'll come up and visit you,'' returned Jarvis.
``I hope you will, at that,'' answered the skipper heartily. ``I don't
know of any men I would rather have in my cabin. I'll tell you what you
do. You both come in every evening when we are not otherwise engaged,
and I will teach you navigation.''
``Thank you very much, sir,'' replied Rush. ``That is exactly what I wish
to learn. Of course, I cannot learn it all while I am on the lakes, but
I shall be able to get a general idea of it.''
``You will learn it quickly enough. After you have been on these lakes
one season you'll know more about these waters than a whole lot of men
who have been drilling up and down here for the greater part of their
lives. We will go back and look over your quarters now.''
The room assigned to the boys was even more attractive than had been
their quarters on the old ship. The room was large and cosily furnished,
and the Iron Boys were delighted with it.
The next thing was the selection of a crew. Captain Simms, with the
authority of the officials of the line, decided to ship his old crew,
which was done as soon as the ``Wanderer'' reached Detroit on the
following day. The new ship was under orders to proceed to Duluth for a
cargo of ore.
The up trip was uneventful, the efforts of all hands being devoted to
shaking the new vessel down and getting acquainted with her. The
``Richmond'' proved herself to be all that was expected of her. She
handled easily and well.
During the three days' trip up the lakes, the boys began their study of
navigation. Their first work was to learn to box the compass; that is,
name every point on the compass. Steve, with his usual aptness,
committed the card to memory in one night. Bob was not very far behind
him. Then they took up the study of the theory of navigation, working
out positions by moon, stars and sun, all requiring more or less
mathematical proficiency. Rush proved himself an apt pupil, and he had
made a good start by the time they reached the ore docks in Duluth.
The lads found a few hours time in which to run home to see Steve's
mother, and at daylight on the following morning the ``Richmond'' backed
from her slip and turned her trim bow toward the waters of Lake Superior
once more.
``I am going to put you two men on the wheel,'' announced the master, on
the morning of the second day out.
``Steering the ship?'' questioned Jarvis.
``Yes. You will find it easy work, but you will have to pay strict
attention to business.''
The eyes of the Iron Boys glowed with pleasure. They took a trial watch
early that forenoon under the direction of the captain, who first
explained the operation of the wheel. Unlike the old style steering
wheels, this one was operated by crude petroleum instead of by ropes and
chains running over pulleys. Turning the wheel forced the oil through a
little half-inch pipe. The pressure thus obtained opened a valve in the
engine room and set the steam steering gear at work. The ship, by this
modern method, could be steered with a single finger.
``Wonderful, wonderful!'' exclaimed the boys, when they fully understood
the operation. Their knowledge of it was not complete until they had
made a journey back to the engine room to watch the steam steering gear
work there as the wheel was turned in the pilot-house.
Then there was another wonder that they were instructed in, the
electrical equipment of the ship. All the running lights were lighted by
electricity from the pilot-house. Then there were three methods of
blowing the whistle situated aft of the pilot-house. First, there was
the usual whistle cord; then there was a lever some two feet in length,
that pulled the wire attached to the whistle valve. But the most
remarkable of all was an electric button whistle. A pressure on this
blew the steam whistle. A long pressure blew a long blast and a quick
pressure a short blast.
``Electricity plays an important part in the world's affairs to-day,''
said Captain Simms, noting their keen interest. ``You see we have
wireless equipment, too.''
``Why isn't it working?''
``It will be when we get some one to operate it. I understand that the
line is going to ship an operator at the Soo. I don't know whether it is
a good thing or not. Too handy for the officials to say, 'Why did you do
that?' or `Why didn't you do this?' Well, it's always possible that the
thing won't work when you want it to. I guess we can see to that.''
The boys nodded. Steve was at the wheel. He soon got the knack of
keeping the vessel on her course, but found that watching the compass
card so steadily made his head ache. Still, it was fascinating work. The
helmsman sat on a high stool, both arms resting on the wheel between the
spokes, his eyes looking over the wheel and down into the binnacle. A
glance up showed miles of sea ahead with the gently rising and falling
bow of the ship in the foreground. There was a consciousness of power as
the helmsman gently turned the wheel this way or that. The great ship
obeyed his slightest pressure. Glancing back through the rear windows of
the pilot-house the stern of the ship swung in response to the turn of
the wheel with a crack-the-whip motion.
The skipper, noting Steve's glance at the swinging stern, nodded.
``That is what you must look out for when in close quarters. You see, you
are so far forward here that you can scarcely believe what a wide circle
that other end will make---I should say sweep. It doesn't necessarily cut
circles. In entering harbors you must measure your distance with your
eyes and know how far you can turn your wheel without having the stern
of the ship smash into a breakwater, or crash in the side of some other
vessel to the right or left of you.''
``There is much to learn. I can see that.''
``Sailing the lakes is done by instinct largely. If a man's cut out for
the business he makes a go of it. If he isn't, some dark night he misses
his way and lands on a hidden reef somewhere. Then, presto, he's out of
a job, and maybe worse.''
``When do we reach the Soo?'' interrupted Jarvis.
``This evening. Rush will be at the wheel about that time, and you had
better be up here, too, Jarvis. You can't become too familiar with the
ports and the lights. Do you know how to read buoys?''
``No, sir,'' answered the boys.
``It is very simple. When you are entering port red buoys, with even
numbers, are left to your right hand or starboard. Black buoys with odd
numbers are left to the left hand or port. That's the rule the world
over.''
``But,'' objected Jarvis, ``suppose it's night and you can't see the buoys.
What are you going to do then?''
The captain laughed heartily.
``Lights, my boy. Channels are lighted at night, so you can't go wrong;
but a good navigator will take his ship through any place without a
light to guide him. I want you boys to learn every one of the
ranges------''
``What is a range?'' interrupted Bob.
``Guide lights,'' spoke up Steve quickly. ``They are the lights on shore,
either lighthouses or buoys, to show you how to lay your course.''
``That is the idea,'' agreed Captain Simms. ``Let's hear you box the
compass while we are here alone, Jarvis.''
Bob went over, taking a look at the compass.
``Why do you do that?''
``I wanted to see whether we were at the north pole or the south pole.''
``I guess you would know it if you were---that is, you would be pretty
certain that you weren't navigating the Great Lakes. Go ahead now.''
Jarvis shut his eyes and began reading off the points of the compass,
making only one error in his reading.
``That is fine,'' announced the skipper. ``I'll guarantee there isn't a man
in the ship's crew, outside of the first mate, who can do it so well. Of
course, I am excepting Rush and myself. Rush does everything well.''
That night Steve took his regular trick at the wheel at eight o'clock.
Of course, Jarvis was there, too, as were the captain and the first
mate. They were nearing the Soo, as they could see from the lights.
``Let's see, you boys have not been through here, have you?''
``We were below decks the other time, sir.''
``Oh, yes, I remember. We will take the Canadian locks this time. The
Canadian locks are on the left and the American locks on the right, but
the latter are too short to hold a boat as long as this one, so we are
obliged to take the Canadian side.''
``Why do we have to lock through?'' questioned Jarvis.
``To get around the rapids, and for the further reason that Huron lies
lower than Superior. This is Whitefish Bay. The light that we have just
dropped to starboard is Whitefish Point Lighthouse. Rush, do you see
that red light yonder?''
``Yes, sir.''
``Point on it.''
``I can't see the bow of our boat so as to tell whether I am pointing on
the light or not.''
``I'll fix that.''
The captain pressed a button and a ray of dull, ghostly light appeared
just beyond and over the bow.
The lads uttered exclamations of amazement.
``What is it? How did you do it, sir?''
``That, lads, is a guide light on the end of the pole that answers for
the bowsprit. The light is there for the purpose of giving you a guide
to steer by in narrow places.''
Lights began to spring up ahead, until there was such a confusion of
them that neither boy could make anything out of them, but the steady
eyes of the captain picked out the lights that he wished to find without
the least difficulty.
``Do you hear the roar of the rapids in the St. Mary's River?''
``Yes; we hear them.''
``Those green lights way over yonder are on the American locks. Now port
your helm and steer for that white light standing high above the rest.
Are you on it?''
``On the mark, sir,'' answered Steve.
They continued on this course for ten or fifteen minutes, when the
captain ordered the wheelman to starboard his wheel. This threw the bow
to the left, sending the boat across the bay on a diagonal course.
``Why don't you go straight in?'' asked Jarvis.
``We should land high and dry on the rocks if we did,'' answered the
skipper, with a short laugh. ``Others have tried that very thing. The
hulls of some of their ships are down there under the water now.''
The boys began to realize that navigating the Great Lakes required a
great deal of skill and knowledge.
``There is a ship in the locks now,'' announced Captain Simms.
Both boys gazed into the night, but they could see no ship. The master
signaled the engine room to slow down, explaining, at the same time,
that they would have to drift in slowly and stop until the other boat
got out.
The channel began to narrow as the master directed the wheel this way
and that until they found themselves in a walled-in channel that led
directly to the locks themselves.
``Snub her!'' commanded the captain, leaning from the pilot-house window.
A ladder was shoved over the side of the moving ship, a man on either
side of it on deck pushing it along so that it might not be dragged.
Quick as a flash a sailor sprang on the ladder, and, grasping the side
pieces, shot down to the dock on that side, a distance of some twenty
feet. Following came others, all getting down in the same manner. It was
a dangerous thing to do and excited the wonder and admiration of the two
boys in the pilot-house.
``If I were to try that I would be in the water,'' laughed Rush. ``It is a
good thing for me that I am at the wheel, for I wouldn't be able to
resist trying that experiment.''
Hawsers were cast over from the deck, and these, the men who had gone
over the side, twisted about snubbing posts. At the same time the ship's
propeller began reversing slowly at a signal from the captain. The ship
came to an easy stop. The skill with which it had all been done, made a
deep impression on the Iron Boys.
A few moments later the gates of the locks opened and the other steamer
moved slowly out. So close did they pass the ``Richmond'' that some of the
men reached out and shook hands across the gulf, while the two captains
held a brief conversation. Then the ``Richmond'' let go her moorings and
moved slowly into the Canadian locks. The gates swung to behind them,
the water began rushing from the other end of the locks and the ship
rapidly settled until her decks were level with the dock beside which
she stood. The men who had gone over the side now stepped aboard and
hauled in the hawsers after them.
``Marvelous!'' breathed the Iron Boys.
``Slow speed ahead,'' commanded the skipper. ``We are now on the Huron
level. Here comes your relief. I hope you boys get a good night's
sleep.''
``Thank you, sir; good night,'' answered the lads, starting for their
cabin. It had been a most interesting evening for them.
\gutchapter{CHAPTER XVI}
\section*{\raggedright THROUGH THE ROCKY CUT}
FOUR long and two short blasts roared from the whistle of the
``Richmond.''
It was the private signal of Captain Simms. The ship was bearing down on
Port Huron and was at that moment at the mouth of the St. Clair River.
The skipper stepped to the door of the pilot-house with megaphone in
hand.
``This is where I live,'' he explained. ``My wife always comes out to see
me as we pass. See the light there, in that cottage on the river bank?
Well, that's where I live when I'm not steamboating. There she comes.''
Through the moonlight Steve saw a woman running down to the edge of the
water.
``How are you, John?'' called her pleasant voice through a megaphone.
``I'm well; how are the folks?''
``They're all well.''
``Any news?''
``Nothing except that Betty has six pretty white chickens and she's
terribly cross.''
``Put her in the soup,'' suggested the captain.
Just then a little white-robed figure appeared at an upper window of the
captain's home. In her hand the little one also held a megaphone. It
was the captain's twelve-year-old daughter, Marie, the apple of his eye.
``H-e-l-l-o P-Pa-pa-a-a,'' came the greeting in a childish treble.
``Hello, Marie!'' bellowed Bob Jarvis from the rail aft of the bridge.
``Who are you? I don't know your voice.''
``I'm Bob Jarvis, but you don't know me.''
``Hello, Bob. Yes, I do. My papa wrote to me about you. Where's Steve?''
There was a laugh that rippled from one end of the deck to the other.
``Never mind him; he is steering the ship. When are you coming out with
us? Come along and we'll have a lot of fun.''
``I don't know. When Papa says I may. When may I come, Papa? And you
haven't said a word to me yet. You'll be gone in a minute.''
``How could I? You haven't given me a chance to get a word in edgeways.
Port your helm a little,'' he added, in a lower voice to Rush.
``Port a little,'' answered Steve.
``When, Papa?''
``Perhaps the next trip. I will send you a letter from down the line.
Jennie, can you go back with us if I stop for you on the up trip?''
``I'll see. If I can do so I'll run up the red flag on the staff. If you
see that you may stop. If not, you will know we can't get away that
trip. I've got to attend to my early canning, you know.''
Captain Simms grumbled something outside the megaphone, that sounded
something like, ``Shoot the canning!''
``Good-bye,'' came two voices, sounding faint and far away on the soft
night air, one being a woman's voice, the other the thin, childish
treble of a little girl.
``Head on that bright light low down there,'' directed the skipper, with a
last lingering look back toward his home. ``That's the worst of this
business. A fellow gets about a five-minute look at his home and family,
once a month or so. I'd rather be sitting on my front porch to-night
than steering a ship through this rocky river.''
``Is that a light-house that I am steering for?''
``No; that's an inspector's cabin. Starboard some.''
``Starboard some,'' repeated the helmsman.
``All ships have to report as they go by. You will hear him call when we
get abreast. Those fellows never seem to sleep.''
``It must be a lonely life for a man out there.''
``It is, and------''
``Ship ahoy. What ship is that?'' bellowed the inspector through his
megaphone.
```Richmond' from Duluth with ore.''
``The what?''
``'Richmond'!'' roared Bob from the lower deck.
``I don't catch it.''
``Six o'clock,'' howled Jarvis with his hands to his mouth, at which there
was a loud laugh from the ship's company.
``Steamer `Richmond,''' shouted the captain. ``Why don't you open your
ears? Think we can stand here yelling like wild Indians all night?''
The inspector did not answer. From past experience he realized the
futility of an argument with a lake captain.
``This is the most dangerous navigating of any place on the lakes, Rush,''
said the skipper. ``The bottom of our ship is only three feet from the
bottom of the cut at this minute. Swerving six feet either to the right
or left out of our course would put us hard and fast on the rocks. We
should block the channel besides running the risk of breaking the ship's
back. Steady!''
``Steady, sir.''
``Remember, I am talking to the rudder. I keep that rudder in my mind
every second of the time. I can see its every movement. I don't know
there is such a thing as a steering wheel when I'm navigating like this.
Port a little.''
``Port a little, sir.''
``Now head for that range light up on the hill there. This cut, known as
Rock Cut, was built by the government at great expense. Hold your course
as you are until you round the bend in the cut there, then head on a red
light that you will see high up on the rocks. Get your funnel back there
in range with the white light on the hill you see to the left. You will
be exactly in the channel then. Keep in the middle. I have to go to my
cabin for a moment. I think I can trust you. Remember, the channel is
narrow and you must keep well within it.''
``I will, sir.''
Steve was left alone in the pilot-house. As he was steering by range
guides alone, now, he did not have to watch the compass. All the windows
of the pilot-house had been let down so that he had an unobstructed view
all around.
``I'm running the ship,'' breathed the lad. ``I don't know who's taking the
biggest chance, myself or the captain.''
Though the Iron Boy felt the responsibility of his position, he could
not help the little thrill of triumph that ran through him. He was far
up in the air with no one save the watch down in the forepeak near him.
The night was bright and glorious, the most peaceful scene he had ever
gazed upon. But Rush did not devote much thought to the peacefulness of
his surroundings. His mind was too thoroughly centred on his work.
The ``Richmond,'' sailed majestically around the bend in the cut, Steve
glancing back over the decks to see that his funnel was coming in line
with the range indicated by the captain. As Rush looked ahead through
the open pilot-house window again his heart fairly leaped into his
throat. Two eyes, one red the other green were blinking at him right in
his path dead ahead.
``It's a ship!'' he exclaimed. ``I don't dare pass it here. I don't know
whether there's room or not. What shall I do?''
The Iron Boy's quick mind solved the problem in a flash. Springing to
the pilot-house telegraph he swung the indicator over to the words,
``Half speed astern.''
The ship began to tremble under the impact of the reversing propeller.
Grasping the whistle lever Steve blew five short, sharp blasts, then
taking his place at the wheel he calmly kept the vessel in her course,
the other ship bearing down on him whistling as if the whistle lever had
been wired down.
The reversing of the propeller had not been lost on Captain Simms. He
knew instantly what it meant when he felt the trembling of the vessel.
Then came the danger signal---five sharp blasts on the whistle.
The captain was out of his cabin on the run taking the stairway to the
bridge three steps at a time. By this time Rush had thrown the telegraph
indicator over to ``full speed astern.'' He was watching the stern to see
that it did not swing out of the channel, then turning to see what the
vessel ahead of him was doing.
What had caused him to so suddenly reverse the propeller was not so much
the narrowness of the channel, but rather a light that was placed well
out from the shore line on his side. It was a white light, and, while he
did not understand the meaning of it, he knew that it had been placed
there as a warning to ships to keep well outside of it.
The other boat was coming to a stop also, but by the time Captain Simms
reached the pilot-house the bows of the two ships were so close together
that it seemed as though they might crash together. One swift,
comprehensive glance told the captain everything. He noted that his
vessel was reversing, that the pilot was keeping her in the channel and
that the other ship was coming to a stop.
Without a word to Steve he grasped his megaphone and sprang to the
window.
``Choke her down, you fools! Do you want to run us under?''
``Get out of the way yourself! Why didn't you blow your whistle? You saw
that buoy there. You have seen it for the last half hour. You knew you
ought to have given warning before you got into the cut here.''
``What does that buoy mean?'' demanded Captain Simms.
``A coal barge was sunk there this morning.''
The two vessels met with a heavy bump that set everything rattling on
board both ships, but the shock was not sufficiently severe to do any
damage to either.
``Back up, you fellows, unless you want us to push you out!'' commanded
Captain Simms.
In the meantime, after the shock, Steve had stepped to the telegraph and
swung the indicator to the word ``Stop!''
The two captains hurled language at each other for the next two minutes,
but the other skipper grew tired of it first. He gave the order to
reverse propeller. The up-bound boat began to retreat slowly.
``Slow speed ahead,'' commanded Captain Simms.
The master was leaning from the pilot-house window, megaphone in hand,
ready to roar at the other skipper at the first opportunity. But there
was no good excuse for him to do so. After backing down stream
sufficiently to make passing safe, Captain Simms gave his whistle lever
a jerk, sounding one sharp blast, meaning that he would meet and pass
the other vessel on its port side.
The ``Richmond'' slipped by at a little higher speed than was safe, her
sides scraping the paint off the other boat in spots.
``I ought to report you, you lubber!'' roared Captain Simms in passing.
``You ain't fit to command a mud scow. I've got a kid on this boat who's
a better captain, after half a cruise, than you'll be if you cruise all
your life.''
The captain jerked the telegraph indicator to ``three-quarter speed
ahead'' with such violence that it threatened to tear the indicator
chains from their hooks. Then he turned to Rush.
``Steve, much obliged,'' he said. ``That's the second time you saved the
ship. I owe you another one for that. Unless I am greatly mistaken,
you'll be trotting around with a master's license in your inside pocket
by the time you are twenty-one. Steady there.''
``Steady, sir,'' answered the boy at the wheel.
\gutchapter{CHAPTER XVII}
\section*{\raggedright THE BLOW IN THE DARK}
\textit{They} had passed out through Lake St. Clair as eight bells rang out.
Steve relinquished the wheel to the next watch and bidding good night to
the captain started back toward his quarters.
The lad made his way back over the deck, strolling slowly along,
enjoying the night and thinking over the events of the evening. As he
reached the after deck-house he halted, leaning against it looking
forward and watching the gentle rising and falling of the upper works
forward.
``It is almost fascinating enough to make one want to spend his life on
board a ship,'' mused the Iron Boy. ``Well, I must turn in. I------''
He did not finish what he was about to say. A crushing blow was dealt
him on the back of the head, coming from the deep shadows on the
starboard side of the after deck-house.
Steve staggered forward, then fell face downward on the steel deck of
the ``Richmond.''
Sailors found him there, half an hour later, unconscious. No one knew
what had happened. The captain was notified at once and he, after an
examination of the boy, decided that Steve had fallen against a steel
hatch and had given his head a severe bump. They worked over the lad for
nearly an hour before getting him back to consciousness. He had been put
to bed, and Bob was detailed to sit by and watch his companion, which he
did with solemn face. Steve fell into a deep sleep from which he did not
fully awaken until morning.
He was lame and sore from head to feet. Bob was asleep on the edge of
the berth and the ship was rolling heavily. Without waking his
companion, Rush got up after much effort, dressed himself, and,
supporting himself by keeping his hands on the woodwork, made his way
outside. Day was just breaking.
Steve leaned against the deck-house in the same position that he had
been occupying on the previous night when he was struck.
The captain, at that juncture, came along on his way to breakfast.
``Hello, Rush,'' he greeted, halting. ``How do you feel?''
``All knocked out.''
``That's too bad. Come in and have some breakfast. You will feel better
after that.''
``I do not think I want any breakfast, sir.''
``Pshaw! Come along. By the way, you had a nasty fall last night, didn't
you?''
``I should say I did.''
``How did you happen to slip?''
``I didn't slip, captain.''
``You didn't?''
``No, sir.''
``Then how did you happen to crack your head on a hatch cover?''
``How was I lying when you found me?''
``They said you were lying on your face.''
``If that was the case, I couldn't very well have bumped the back of my
head on a hatch cover, could I?''
``That had not occurred to me before. See here, didn't you lose your
balance or stumble and fall?''
``I fell, but it was through no fault of my own.''
``Will you tell me what did happen?'' questioned the captain with a
puzzled expression on his face.
``I think I was struck,'' answered Rush calmly.
``Knocked down?''
``Yes, sir.''
``Impossible! Who---what------?''
``I do not know any more about it than you do, sir. I was standing here
just as I am now, when I got a terrible blow on the back of my head. I
didn't know it was a blow then, but as I think it over I remember very
well. Everything grew dark about me. The next I knew I was in my cabin,
with you and Jarvis working over me.''
``What you are telling me is a very serious matter, Rush.''
``It was serious enough for me at the time.''
``Who was on the deck at the time?''
``No one, so far as I observed.''
``But, it would have been impossible for any one to approach close enough
to hit you, without your either hearing or seeing him.''
``It would seem so. Yet the fact remains that I was hit. It takes
considerable to knock me out, sir, but I got enough last night.''
``Do you suspect any one?''
``Not a person. I cannot understand it at all.''
``Well, you just keep your eyes open. If you find out who struck that
dastardly blow I'll deal severely with him. He won't be in condition to
strike any one else for some time to come.''
``I think I shall be able to take care of the man myself when I meet him
and know him,'' replied the lad, with a faint smile. ``I shall report for
duty on time this morning, so please do not put any one in my place.''
``Very well; perhaps it will do you good to be busy. Well, I'm going to
breakfast. Let me know if you get a line on this mystery.''
Steve did not answer. He stood leaning against the after deck-house,
thinking. Finally he turned with a sigh intending to go forward. As he
did so a man came out of the stokers' dining room and started to go
below. Rush halted sharply.
``Hello, Smith,'' he said. ``When did you come aboard the 'Richmond'?''
``When did you think I came aboard?''
``That's what I am asking you.''
``Mebby I'm a fish and swam out,'' answered the stoker. Smith was the man
with whom Steve had had the trouble on the first disastrous cruise.
``I shouldn't be surprised. You are equal to most anything that's out of
the ordinary. Where were you last night?''
``Stoking from six to twelve---eight bells. But------'' Smith checked
himself.
``So you came off at twelve, eh?''
``I did. But how's that your business?''
``Perhaps it may be my business. At least, I am going to make it my
business.''
``See here, young feller, be you trying to pick a row with me?''
``No; one doesn't have to pick a quarrel with you. You're always
quarreling. If I wanted to have a fight with you all I should have to do
would be to look at you and the fight would be on. I'm looking at you
now, Smith.''
The stoker uttered a half-suppressed growl of anger, started toward the
Iron Boy, then halted, opening and closing his fingers nervously.
``I'll---I'll------''
``Out with it. You will feel better after you have said it,'' urged Steve
in an encouraging voice.
``I'll break your blasted head for you------''
Smith made a jump for the Iron Boy.
Steve stepped lightly to one side, putting out his foot as the stoker
shot by him. Smith's head hit the edge of a hatch, then he sprawled
forward on the deck.
``So you're the fellow who gave me that blow in the dark last night, are
you?'' demanded the lad in a stern voice.
``I---I'll kill you for this!'' roared the stoker, raising a vengeful face
to the Iron Boy.
``You'll do it some dark night, then. You haven't the courage to face a
man in broad daylight and meet him man to man---no; I won't put it that
way, for you are no man. You're just a common tough, that's what you
are. Now get up and take your medicine, for you're going to get a
walloping that ought to last you longer than the hose bath did.''
Smith sprang to his feet and rushed at his young antagonist. He did not
reach Steve, however. The fellow suddenly received a blow under the ear
that sent him spinning and tumbling over among the hatches that extended
above the deck some two feet at their highest point.
But Steve had not delivered the blow. He had not even raised his hands,
though he was standing in position ready to meet the charge of the tough
stoker.
``Get up, you hound!'' roared Captain Simms.
It was he who had delivered the blow. He had emerged from the mess room
just in time to see the stoker's enraged face over Steve Rush's
shoulder. The captain understood instantly what Smith was about to do.
The skipper took two quick strides forward and his powerful fist smote
the other man a terrific blow.
The stoker leaped to his feet and went for the captain, now enraged
beyond all control. But he had reckoned without his man. The skipper
knocked the angry stoker down almost before the latter could raise his
fists.
``Never mind, Captain; I can take care of him,'' urged Steve.
``Stand back! This is my circus. What was he going to hit you for?''
``I was to blame. I goaded him into it. I------''
``Wait a minute. He hasn't got enough yet. He's coming for me.''
The captain suspended conversation long enough to give Smith a right and
left swing on either side of the head that sent the fellow to the deck
with all the fight knocked out of him, and which put him out of business
for the next ten minutes.
Captain Simms turned calmly to Rush.
``Now, what was it you were saying, my lad?''
Rush could not repress a smile.
``Nothing very much. You know Smith and myself had some trouble on the
last cruise?''
``Yes, I remember.''
``He never has gotten over being angry at me. He began saying
disagreeable things to me, and I suppose I helped the matter along by
tantalizing him. I was as much to blame as Smith was. But---but I'm sorry
you didn't let me give him what he was spoiling for.''
``He got it, that's all that is necessary,'' growled the master. ``See
here, Rush, he isn't the fellow who hit you last night, is he?'' demanded
the captain suddenly, shooting a quick, suspicious glance into the face
of the Iron Boy.
``I didn't see who hit me,'' answered Steve, truthfully even if somewhat
evasively.
``Call the first mate!''
Rush did so.
``Put that man in irons and keep him on bread and water until he is ready
to go to work and mind his own business. I've half a notion to turn him
over to the authorities for mutiny,'' said the skipper reflectively.
``Don't you think he has had punishment enough, sir?'' urged Steve.
``Yes, I suppose he has at that. Iron him, Major. It will do him good.''
The stoker woke up just as the steel bracelets were being snapped on his
wrists. Protesting and threatening, he was dragged to the lazaret, where
he was destined to remain for the next twenty-four hours in solitary
confinement, with nothing more substantial to live on than bread and
water.
\gutchapter{CHAPTER XVIII}
VISITORS \textit{on} \textit{the} ``\textit{Richmond}''
\textit{The} ugly stoker was liberated on the following day after having promised to behave himself in the future. But he held his head low when showing himself on deck, which was seldom. He never permitted his shifting eyes to meet those of Steve Rush, nor did Steve make any effort to address the man. The lad was confident, in his own mind, that Smith was the man who struck him that night by the after deck-house, but the drubbing that Captain Simms had given the fellow made Rush feel that they were now even.
On the way back the ship picked up Mrs. Simms and little Marie at Port Huron. The ``Richmond'' was on its way to South Chicago with a cargo of coal. This took them around into Lake Michigan, and many were the happy hours spent by the captain's little daughter and the Iron Boys. They played games on deck between watches, as though all three were children. Rush and Jarvis had constituted themselves the special guardians of the little girl, and she queened it over them, making them her willing subjects.
At South Chicago the ship was held up for a week because the company to which the coal was consigned was not ready to receive it. Steve considered this to be bad business policy on the part of the steamship people, and another memorandum went down in his book, to be considered in detail later on.
While at South Chicago the lads made frequent trips into the city, which they had never visited before. One afternoon they took the captain's wife and daughter to a matinee, then out to dinner at a fashionable restaurant.
It made a pleasant break in the lives of each of the four, and helped to cement the friendship between little Marie and her new-found friends.
At last the coal was unloaded. After filling the tanks with water ballast, the ``Richmond'' started away for the northward to take on another cargo of ore and once more to drill down the Great Lakes.
The water ballast did not draw the ship down to its load level, with the result that she rolled considerably.
``The glass is falling,'' announced the captain as the craft swung into Lake Superior two days later. ``I shouldn't be surprised if we had quite a jabble of a sea before night.''
``We don't care, do we?'' chirped Marie, to whom a rolling ship was a keen delight.
``Not as long as the dishes stay on the table,'' answered Bob, with a merry laugh. ``When are you going to bake that long-promised cake for me?''
``Just as soon as the cook will let me. He's always cooking something for the night watch when he isn't getting the regular meals. My, but that night watch must have an awful appetite!'' she chuckled.
``Yes, I've noticed that,'' agreed Bob. ``But you can't lay it to me. I've a feather-weight appetite. I didn't have any at all when I first went aboard an ore carrier. It beats all how quickly a fellow will lose all interest in life the first time out.''
The wind blew hard all the way up Superior, raising, as the captain had promised it would, ``quite a jabble of a sea.'' But the blow was nothing like a heavy gale. It was just a sea, a nasty, uncomfortable sea. The boys and Marie were in great good humor all the way up. Marie's mother was ill in her stateroom and the assistant cook had had an unexpected attack of seasickness.
``Nice crew of lubbers,'' growled the captain, when informed of the assistant cook's indisposition.
The ship reached Duluth at night and immediately was shunted into the slip at the ore docks for loading. After the hatches were down a huge crate was hoisted aboard with a crane. A section of the deck was opened up and the crate was let down into the lazaret. The crate was consigned to one of the company's officials in the East. No one paid any attention to the crate, and it is doubtful if any one save the captain and the first mate knew what the contents of the crate were.
Hatches were battened down and long before daylight the ``Richmond'' was on her way again. By this time the ``jabble'' had increased to a full gale. No other ship ventured out, but Captain Simms was not a skipper to be held back by the weather. He knew his ship was seaworthy and he knew full well how to handle her safely in any sea that the lakes could kick up. A full northwester was raging down from the hills and the glass was falling all the time. The ``glass'' is the sailor's name for barometer.
Steve took the wheel as they passed out, and he was obliged to give up the wheelman's stool because he could not keep it right side up under him. He dragged a platform over to the wheel. It was made for the purpose, having cross-cleats on it to enable the helmsman to keep his footing when the ship was cutting up capers.
``There,'' he announced, ``I'll stick here until the wheel comes off.''
Waves broke over the vessel continuously, striking the deck with reports like those of distant artillery. Superior was a dreary waste of gray and white. The air seemed full of the spume of the crested rollers, while the clouds were leaden and threatening.
``Look at the rainbow!'' cried Bob, pointing off to the westward.
``That ain't a rainbow you landlubber,'' jeered a companion.
``Well, if it isn't I never saw a rainbow.''
``No, it's a dog.''
``A what?''
``Sundog.''
``Bob, you certainly are a lubber,'' laughed Mr. Major. ``Didn't you ever see a sundog before?''
``Never. What are they for?''
``I don't know what they are for. I know what they do---they bring gales and storm and trouble all along the line. That's what the dogs do.''
``I think the other ships saw it before we did, for there doesn't seem to be another boat on the lake.''
``No; at least, the little fellows have taken to harbors along the coast. It wasn't the sundog, however, but the glass that warned them. You know the glass has been falling for the past twenty-four hours. We know what to expect when that happens, but we don't know what to expect when the storm strikes us. These lakes are the most treacherous bodies of water in the world. Twenty miles beyond here is the graveyard of Superior, where the hulls of more than fifty ships lie rotting on the bottom. Some of them went down in weather no worse than this. This is bad enough.''
Bob listened attentively.
``Do you ever get seasick in any of these storms?''
``Always,'' answered the first mate, in a matter of fact tone. ``If this keeps on you won't see me at mess to-day noon. You'll have to eat your dinner standing up, but not for me.''
The weather grew more tempestuous as the forenoon wore on. The scuppers were running rivers of green lake water and there was not a dry spot on the decks; even the upper works standing high in the air, were dripping with the spray that had been showered over them.
``Let her off three points,'' commanded the captain.
Almost instant relief from the incessant pounding was noticeable. The waves came aboard only occasionally, though the sea was running the same as before and the ship was rolling almost down to her rails.
``That is better,'' nodded Steve, his voice echoing in the silence of the pilot-house.
``Did it make you dizzy?'' smiled the skipper.
``No, sir. I got all over that after I fell in the hold that time. It isn't a comfortable feeling to have the floor rolling around beneath one's feet, but I am getting so that I do not mind it much. Is that a boat ahead of us there?''
``Yes,'' replied the captain, placing the glasses to his eyes. ``It's a pig, and she's having a pretty hard time of it. All you can see of her is a smother of foam in the place where the ship is. The smoke from her funnel seems to come right out of the lake.''
``Are those whalebacks safe, Captain?'' asked the pilot.
``Yes. I commanded one for two seasons. They are perfectly safe, so long as nothing happens to them.''
Steve laughed.
``That goes without saying.''
``But they are the wettest boats in the world, as you can judge by watching that fellow beating his way against the sea. They have a very thin skin and the least puncture will go through. Next thing you'll hear the hatches blowing off, and down she goes like a meteorite shot from above.''
``I don't believe I should care for them. I prefer to be high above water like this, rather than under it all the way down the lakes. If I wanted to travel on a submarine I'd ship on a real one.''
The gale was playing tunes on the braces, and the life-span running from the forward to the after deck-house was swaying back and forth. Steve gazed at it a moment then turned to the skipper.
``I never could see the use of those life-spans. If the ship goes down, I don't understand how a life-span from one end of the ship to the other, is going to help any.''
``They haven't been on long. A good many lives would have been saved if they had been. You see, the span is a rope on which travels a little swing just large enough to hold a man. Then there is a free rope running through a ring in the top of the swing by which to pull one's self along.''
``Yes, I have figured that out.''
``Then suppose that to-night, in the darkness, we were to miss our way. The compass might go bad, we might be driven out of our course and all that sort of thing, you know---and all of a sudden we might drive our bow full speed on one of those low-lying Apostle Islands!''
``Yes, sir.''
``The stern of the ship would sink low and there she would pound to pieces. That's where the men astern would find use for the life-span. By it they would be able to pull themselves to the bow of the boat and perhaps make their escape before the stern finally went down under water. They are a good thing, and you should see to it that the spans are always in working order. I have those on my ship examined every day. I------''
The captain was interrupted in what he was saying by a yell from the deck. The skipper took a quick look aft through the pilot-house windows, then sprang to the pilot-house telegraph.
``Full speed astern!'' crashed the message to the engine room.
\gutchapter{CHAPTER XIX}
\section*{\raggedright IN THE GRIP OF THE WAVES}
``\textit{Somebody} overboard!'' said the captain sharply.
``Who?'' demanded Steve, in an equally sharp tone as his relief took the
wheel from his hands.
``I don't know.''
Just then the figure of a man was seen to leap from the top of the after
deck-house into the raging sea.
Bob Jarvis had been clinging to a ladder that the chief engineer was
holding up against the whistle pipe, the valve of the whistle having
worked loose. The engineer had asked Bob to help him as a favor, which
the lad was glad to do, though that was not his department. It was a
ticklish position in which to work, and at any moment a lurch of the
ship might throw the ladder over and throw the Iron Boy into the sea. He
gave no heed to the danger of his position, for he was rapidly becoming
a true sailor.
Suddenly, as though some instinct had told him to do so, Bob turned his
head and glanced over the deck to the forward deck-house. As he did so
he uttered an exclamation. Little Marie had just descended the steps
from her father's quarters, and was already on the main deck. In her
arms she carried several parcels.
``Go back!'' roared Jarvis.
The words were driven back down his throat by the wind, and if the child
understood his gestures she did not heed them.
Bob groaned.
``Let me down, quick! The child is trying to get aft and she'll never
make it.''
With rare presence of mind, Jarvis gave the whistle lever five quick,
short jerks, sending forth as many blasts, the signal of danger.
Instantly some one shouted a sharp warning.
By this time the lad had slid down the ladder and was making for the
edge of the deck-house to drop down to the deck. He halted all of a
sudden. Bob tried to cry out, but the words would not come. He felt a
sickening sensation sweep over him, and a sudden dizziness took
possession of him.
A white-crested wave had risen up out of the sea right alongside of the
big steel ore carrier. For a moment it hung trembling over the ship like
an avenging monster. Then suddenly it swooped down. It reminded Jarvis
of a steam clam shell scooping up ore. He was thinking calmly now, and
he was planning what he should do an instant later.
The green scoop dipped, lifted the little Marie clear of the deck, then
raised her high above the steel hatch covers.
A faint cry floated back to where the Iron Boy was standing as the
captain's daughter was carried over the opposite side of the ship and
dropped into the sea.
A great shout escaped Bob Jarvis. Lifting himself to his toes he took a
long curving dive from the deck-house. He cleared the ship's rail with
plenty of room to spare, entering the water head first just at the base
of a huge swell.
In an almost incredibly short time his hatless head bobbed up on the
other side of the swell, leaving him struggling alone on the rough
waters. The ship had slipped quickly by. But already her propeller was
beating the water with all the force of the steam power behind it,
turned on full, in an effort to start the ship going astern.
Steve had rushed out on deck the instant he was relieved. Unmindful of
the seas that were again breaking over the deck as the ship shifted her
position, he dashed aft, drenched to the skin and battered this way and
that by the angry combers as they roared curling aboard.
A sailor ran panting up the stairs to the pilot-house.
``It's the little girl!'' cried the sailor. ``Your daughter's overboard
and Jarvis has gone after her. They'll both be drowned!''
``Port your helm a little,'' said the skipper in a calm, steady voice, as
he turned to the wheelman. ``Steady!''
Springing to the telephone he called up the after deck-house.
``Have boat Number 6 manned and swung out ready for launching. Have men
stand by with life-lines and rings ready to cast if we come up with
them. You stand by and watch out astern.''
The commands were delivered in quick, sharp accents, but there was no
trace of excitement either in the captain's tone or on his features. He
was every inch the commander, cool, calm, resourceful. Years of
commanding had taught him that to be a master of others one must first
be the master of himself and of his own emotions.
``Where are they? Do you see them?'' shouted Rush, as he dashed to the
after rail of the ship where a number of men were standing with pale,
frightened faces.
A hand pointed astern where, a second or so later, Steve caught sight of
the bobbing head of his companion.
``Has he got the child?'' Rush cried.
``Yes. Leastwise, he had a minute ago. It was a lucky chance. You see, he
jumped just in time and the girl was fairly swept into his arms.''
``It was not chance,'' retorted Steve. ``Bob knew what he was doing.''
Steve was pacing up and down the after deck, scarcely able to restrain
himself from leaping into the sea and going to his companion's
assistance. He knew, however, that the chances were that he would never
be able to reach the struggling figure off there. At any rate the ship,
which was now beating its way astern at a very fair rate of speed, would
get to the spot before he could possibly hope to do so, even if he were
able to make it at all.
Far up above the decks in the pilot-house with glasses to his eyes,
stood the skipper, calm, stern, alert, now and then giving a brief
command to the man at the wheel in a voice in which there was still no
hint of nervousness or excitement.
The first mate gazed at his commander in wonder. There were Iron Boys in
that ship's company and there was a master who was also iron.
``I think you had better go aft, Mr. Major,'' directed the skipper. ``Take
charge back there. We are going to have difficulty in getting them
aboard, even if they keep up until we get to them. The boy is making a
great fight of it.''
``Aye, aye, sir. Has he the girl still?''
``Yes. He is trying to keep her head above water until we get to him, but
I'm afraid she'll drown before we can help them.''
The first mate hurried from the pilot-house, starting aft at a run. He
began shouting out his orders before he reached the stern. He found
Steve Rush with coat and shoes off, poised on the rail of the plunging
stern, the water dashing over him as he clung with one hand to a
stanchion.
``You are not going to try to go over, Rush?'' he shouted.
``There's no need now,'' answered the boy, not for an instant taking his
eyes from the two figures off there in the water.
The ship was drawing near and it was observable that Jarvis was not
battling as strongly as he had before. They knew that he was becoming
exhausted from his desperate struggle with the great seas that were
sweeping him.
``Man boat Number 6 and put it over!'' commanded the mate.
``No use to do that,'' called Rush. ``It will not live. Better put over the
lines at the proper time.''
``No; it is the captain's orders to launch Number 6 boat. I want two
men.''
Nearly every man there stepped forward. They glanced at Rush. He was
still on the rail. He had made no effort to volunteer for the dangerous
service. They wondered at it, but they knew the boy's courage too well
to think for a moment that he had been deterred from offering to go out
in the life-boat through fear. There were those present who would have
resented such an imputation.
Steve cast a disapproving glance at the mate who was then superintending
the launching of the craft. The men who were to go out in it already had
taken their places in the boat, that had been provided with ropes, life
rings and life preservers.
At command the boat was swung out, the men standing up and steadying
their craft by pressing their oars against the sides of the ship itself.
``Careful that you do not fall out!'' warned Mr. Major. ``I will give the
command to let go. When I do so drop to your seats and out oars.''
``Aye, aye, sir.''
``Shut off!'' shouted Rush. ``You'll run them down!''
The mate made a signal to the captain, but the latter had timed the
progress of his vessel too well to need the signal. Already the
propeller had ceased revolving and the captain was giving his directions
to the wheelman so as to throw the stern to one side of the struggling
boy.
Captain Simms' plan was to drift down on Jarvis and the child, with the
sea. Perhaps it was not the best thing to do, but it was the quickest
and seconds were golden at that critical moment.
``Let go!'' roared the mate.
The life-boat struck the water with a splash. Instantly it was picked up
on the crest of a giant roller, lifted high in the air, and hurled
against the side of the ship with terrific force.
With a sickening crash the life-boat was crushed into splinters,
precipitating the crew into the rough sea.
Rush leaped from the rail to the deck. He had been ready to do so when
he saw what the mate proposed to do. He foresaw the end of the
life-boat, and perhaps of the men who were manning her, even before they
made a start to obey the orders of the mate.
Grasping a life ring to which a long line had been attached, Steve
hurled it over the side of the ship.
``Grab the line!'' he shouted to one of the men next to him. ``Watch out
and haul in when you get your man hooked.''
Another life ring dropped over the side of the ship and the line to this
Steve passed to another man. Both struggling sailors in the water
fastened to the life rings that had been dropped within easy reach of
them, thanks to the careful aim of the Iron Boy.
Steve saw that the two were reasonably safe; then, grabbing up another
ring, he sprang to the rail on the port side.
Bob Jarvis and the girl were drifting in, buffeted this way and that by
one huge wave after another. The girl's head was drooping over Bob's
left shoulder.
``Can you make it?'' bellowed Rush.
``I don't know.'' Bob's voice sounded far away.
Steve was watching him with keen, steady eyes. The lad felt sure that
they never would get aboard without at least serious injury.
``Kick the ship ahead a couple of turns!'' shouted Rush in a tone of
command.
The word was transmitted to the captain in the pilot-house by gestures.
The captain gave the signal, but not quite quickly enough to accomplish
what Rush had hoped for. He wanted the ship advanced a few feet so that
Jarvis and his burden would drift past the stern where they could be
pulled up without the danger of being crushed against the side of the
ship.
Before the propeller had made one complete revolution the stern of the
``Richmond'' was hit by a giant wave and then by another. The vessel it
seemed was literally lifted from the water and thrown to one side. That
was the side where Bob Jarvis was struggling to save himself and the
captain's daughter.
Illustration: Another Figure Dived from the Rail.
Bob saw what was going to happen. The plucky lad held the child off at
arm's length, as far away from the oncoming ship as possible, while with
the other hand he sought to break the force of the blow.
The side of the ship hit Jarvis a tremendous blow. The lad's arm doubled
under him and his head drooped forward on the water.
``He's killed!'' cried the watchers.
Splash!
Another figure had dived from the rail. It was Steve. His dive took him
right under Bob and his burden. Rush came up the other side and struck
out for the couple with long, powerful strokes.
\gutchapter{CHAPTER XX}
\section*{\raggedright AN EXCITING RESCUE}
\textit{With} him Rush had carried a life ring attached to the end of a rope, the
other end of the rope having been, with rare presence of mind, made fast
to the rail by him before leaping.
He reached his companion just as Bob's head drooped over and he lost
consciousness. Still, Jarvis kept his grip on the arm of the child. Rush
had to tear the girl's dress in order to wrench Jarvis's grip free of
her. In so doing Steve lost the life ring. It was carried away from him
in a twinkling. Now he had two persons on his hands with the seas
rolling over him almost mountain high, though the ship, being on the
windward side, protected them somewhat.
``Haul in and cast the ring!'' Steve managed to shout, just before he was
jammed choking under a heavy wave.
Rush threw himself on his back with his head toward the ship, one arm
under Marie and the other arm supporting Bob, who was making desperate
efforts to help himself, though unable to do much in that direction.
Then Rush began kicking himself slowly toward the vessel, which had
been shifted about and was once more drifting down on them.
``Cast your lines before you get close enough to hit us!'' Steve cried
when he could do so without getting a mouthful of water.
Unfortunately those on deck were not very good shots at this sort of
target work and their life rings went far wide of the mark. The ropes on
all but one of them slipped through the hands of the casters and dropped
into the sea.
``Lubbers!'' roared the captain from the pilot-house window.
Steve caught the third ring. Twisting the rope about the body of Marie
just under her arms, he tore the ring loose.
``Haul up, quick!'' he shouted, swimming along with the child after having
thrust the life ring over the head of Bob Jarvis. Steve held to the girl
so that she should not be thrown against the ship head first, which
would have seriously injured her at least, and perhaps killed her then
and there. Possibly the little girl was dead already. Rush did not know,
but he thought he had detected life when he first grasped her.
``Hurry, hurry!'' he cried.
The girl was hauled free of the water, and, limp and lifeless, she was
tenderly lifted over the rail. Captain Simms, after hurling some brief
directions at the man at the wheel, dashed from the pilot-house, down
the steps and along the deck to the stern, where Marie lay on the deck.
The father lost no time in getting at work on her.
``Save those boys if it costs the ship to do it!'' he roared. ``Major, use
your wits! Get them out, I tell you. I'll hold you personally
responsible for their rescue!''
``Rush is hit!'' shouted a voice excitedly.
Looking over they saw Steve striking out blindly to where Bob was
floating away helplessly on the sea. It was plain that Rush had been
stunned by being thrown against the side of the ship. Still, by sheer
pluck, he was keeping himself up and swimming, but with evident effort,
toward his companion. Bob was in a helpless condition and every second
the life ring was slipping up and threatening to bob out from under his
head. Were that to happen there was little chance that he would be
saved.
Steve tried to shout to them, but his voice would not come. He swallowed
enough water in these attempts to drown the ordinary person. His eyes
were so full of water and he was so dazed from the bump he had
sustained, that he could not make out where Jarvis was.
``Port! Port!'' roared a voice from the deck.
Steve caught the direction and veered a little to port.
``More port. Can you keep it up?''
Rush did not answer, for he was beyond answering. Only his wonderful
pluck and endurance were keeping him from throwing up his hands and
sinking under the surface.
With a final burst of speed he reached his companion. Steve threw out
one hand and fastened on the other Iron Boy. As he did so the ring
slipped from Jarvis's head and floated away.
Rush realized at once what had happened, and began upbraiding himself
for his carelessness. The knowledge seemed to give him new strength. His
body fairly leaped from the water as he took several powerful strokes
toward the drowning Bob.
``Wake up!'' cried Steve, shaking his companion roughly.
Jarvis mumbled in reply, and tried feebly to help himself, but he was
too weak and too full of water to accomplish anything.
Steve, by a great effort, twisted his companion about and began swimming
toward the ship with him.
Shouts and suggestions were hurled at him from the ship, but he did not
hear them. The Iron Boy was making the fight of his life. At last, after
mighty struggles, he managed to get near enough to the ``Richmond'' to
catch a line that was tossed to him. This he quickly made fast about
Jarvis's waist and waved a hand to indicate that the men above were to
haul away.
Steve lay over on his back on the water with a great sigh of relief as
the men began hauling the other boy toward the deck.
``Get a line over there to Rush!'' thundered the captain. ``Don't you see
the boy is drowning?''
But Steve missed every line that was tossed to him. He was making
powerful efforts to pull himself together sufficiently to save himself,
but he could not do so.
``Take care of the child, Major. Keep pumping the water out of her.
She'll be all right in a moment,'' cried the captain. ``Give me a line,
quick!''
Before the brave skipper could carry out his purpose of climbing over
the rail preparatory to dropping into the lake, another man swiftly
leaped to the rail and let himself drop feet first. He carried two lines
with him.
``It's Smith, the stoker!'' cried a chorus of voices.
It was indeed the stoker, the enemy of the Iron Boys, who had determined
to avenge himself on them for the insults he believed they had heaped
upon him.
What sudden revulsion of feeling led the stoker to risk his life to save
that of Steve Rush none ever knew, nor would he ever afterwards discuss
it. Smith was a powerful fellow, a man who feared nothing and besides,
he was a strong swimmer.
He pounced upon Rush as if he were about to do him bodily injury. It was
the work of but a moment to make fast the line about the boy's body.
``Get him up, and be quick!'' yelled the stoker.
A cheer rose from the deck; two men at this time were working over Bob,
while the captain, having returned to his daughter, was ministering to
her.
Steve was hauled aboard, where he settled down in a heap. The sailors
turned him face downward, and then some one happened to think of the
stoker. Smith was keeping himself from being jammed against the side of
the ship by holding both hands against the side of it and hurling angry
imprecations at those on deck who had apparently forgotten his
existence.
``Smi---Smith---Get him!'' muttered Steve.
``Put a ladder over the side! Lash it to the rail and give the man a line
with which to steady himself!'' commanded the captain. ``Come, come! Have
you all lost your senses?''
His orders were carried out with a snap, and a moment later the dripping
figure of Smith appeared above the level of the deck.
``You're a fine lot of lubbers,'' growled the stoker. ``You let a man go
overboard and then forget he's there. I ought to throw the bunch of you
overboard.''
``Take those boys to their cabins as soon as you get the water out of
them,'' ordered Captain Simms.
``No, no; I'm all right,'' protested Steve, pulling himself together and
staggering away from the men who were thumping him with their closed
fists, hoping in that way to bring him back to himself.
The stoker had betaken himself to the fire room to dry off. His face had
once more regained its surly, hang-dog expression, and he made rough
answers to the few questions that were put to him by his fellow-workers
in the stoke-hole.
At last the workers succeeded in shaking most of the water out of Bob
Jarvis. He had swallowed a lot of it and was so weak that he could not
stand.
At Steve's suggestion they carried Bob around on the lee side of the
after deck-house. The steward came running out with a bottle of brandy,
some of which he sought to pour down between the boy's blue lips.
Jarvis thrust the bottle aside, half angrily.
``None---none of that horrible stuff for me! I---I'd rather be full of Lake
Superior water and---and \textit{that's} the limit------''
Steve stooped over, and placing his hands under the other boy's arms,
lifted him to his feet.
``Brace up! You're all right now,'' encouraged Rush.
``Yes. I'm all right, \textit{only}------''
The sailors laughed at this; then they shouted, more from relief from
the strain under which they had been laboring than because of the humor
of Jarvis's reply.
``Want to go in and lie down now?'' questioned Steve, barely able to keep
his feet.
``No!''
``Then we'll walk and see if we can get our sea legs,'' proposed Steve,
slipping an arm about his companion's waist and starting slowly toward
the stern. The boys could hardly keep their feet, they were still so
weak. They staggered from one side of the passage to the other, but
their iron grit kept them up.
``How is little Marie?'' demanded Jarvis, suddenly turning to Rush.
``Come; we will go and see. We were forgetting our duty,'' muttered Steve,
starting for the cabin, where the little girl had been taken.
\gutchapter{CHAPTER XXI}
\section*{\raggedright A NEW HAND AT THE WHEEL}
\textit{Marie} had entirely recovered consciousness when the lads entered the
steward's cabin. But the child's face was chalky white, her lips
colorless and her eyes dull.
Captain Simms had sent for his wife, who, ill in her stateroom, had not
known of the exciting events that were taking place at the other end of
the ship. Mrs. Simms forgot all about her seasickness when summoned and
told what had happened.
Marie's eyes lighted up when they rested on the dripping forms of the
Iron Boys.
``Hello, kiddie,'' greeted Jarvis. ``How'd you like your swim?''
``Come and kiss me,'' answered the child simply.
Jarvis blushed, but braced himself. Then, stooping over, he gently
kissed the little one on the cheek.
``You, too, Steve,'' she nodded with compelling eyes.
Then Steve Rush kissed her, patted her cheek and straightened up to meet
the arms of the captain's wife.
``You saved her life,'' she murmured.
``I beg your pardon, Mrs. Simms; it's Bob Jarvis whom you should thank.
He's the real hero this time. I'm only a sort of assistant hero,'' said
Steve with a laugh.
The captain tried to speak, but something seemed to stick in his throat.
He gulped, swallowed, then grasping both boys by the shoulders thrust
them from the cabin.
``Get out! Get out you young rascals before I give you a sound thumping!''
he exploded, as the Iron Boys, laughing heartily, were ejected to the
deck.
``That's a fine way to show a fellow's appreciation,'' snorted Bob. ``Do
you know where that kiddie was going when she was swept overboard? I
mean, before she was swept over?''
``Coming aft?''
``Yes; she was coming aft. She was coming aft to make a cake for you and
me, that's what she was doing. She told me she was going to bake one for
us to-day and she had the stuff in her hands that she was going to put
into the cake. It's a shame,'' added Jarvis, his voice pitched a little
higher than usual.
``Yes, but not half so bad as if we hadn't saved her, old man. I'm proud
of you, Bob Jarvis.''
``You needn't be. I was the easiest kind of a mark. I would have drowned
if it hadn't been for you.''
``And both of us would undoubtedly have gone down had it not been for the
stoker, Smith. What do you make of that, Bob?''
Jarvis halted reflectively.
``I think,'' announced the lad wisely, ``that he was---was---what do you say
a fellow is suffering from when he goes dippy up here?'' tapping the top
of his head.
``Temporary aberration?''
``That's it. I wish I could think of things ready-made, the way you do.
Well, I believe he must have been suffering from that. He'll be wanting
to lick us again the minute he sets eyes on us.''
``Here he comes now. He's just come up from his watch. Oh, Smith!''
The stoker halted, then started on again. Steve grasped his arm. The
fellow shook the lad loose.
``See here, we want to talk to you.''
Smith halted reluctantly.
``I want to take back every unpleasant thing I have ever said to you. At
the same time I want to apologize for what I have done. I've been in the
wrong all the time, I guess. Will you shake hands?''
The stoker hesitated, shifted uneasily, all the time avoiding looking
into the eyes of the Iron Boys. Finally he thrust out a reluctant hand.
Steve grabbed it and Bob caught up the other. The stoker, muttering half
sullenly, broke away and ran into the deck-house, leaving the boys
standing outside looking at each other.
``Well, that beats anything I ever saw,'' growled Bob.
``Do you know,'' said Steve reflectively, ``I believe that fellow has been
a criminal of some sort. The way his eyes avoid yours, his shifty,
hang-dog manner, reminds me of certain other gentlemen whom I have seen.
However, after what he has done for us, it is not for you and me to try
to get him into any further trouble. He saved our lives and that's all
there is about it so far as we are concerned. I don't believe he will
try any more tricks on us. He is the man who hit me on deck here the
other night. I'm just as sure of it as I am that we are standing here
now. Captain Simms gave him an awful walloping. Maybe that's what beat
some sense into the fellow's head.''
All the rest of the day Marie remained in bed. The captain, who had gone
back to the pilot-house after carrying the child to his own quarters,
made frequent trips below to see how she was getting on. She was doing
so well that she wanted to get up and play.
The rest of the day passed without incident, though the gale, if
anything, grew worse. The air was filled with flying spray that reached
high up on the masts. The wireless operator picked up messages from
other ships that had sought safe harbor on the lee side of the islands
along the lake, but thus far there had been no reports of disasters. The
captain had warned the operator to be on the sharp lookout for appeals
for help. To the satisfaction of all no cries for help came.
The boys went about their duties, Rush taking another trick at the wheel
late in the afternoon, leaving it along toward eight bells, midnight.
Bob, in this instance, relieved him.
The night was starless and intensely dark and the hurling spray made
necessary a sharp lookout ahead. Two men were stationed on the bridge
and another in the forepeak to watch for lights, though the captain did
not look for many that night. He knew that at least all the timid
skippers, had scudded for calm water at the first signs of a big blow.
Believing that all was safe he went to bed, and the ship went rolling
and plunging, lurching and tumbling on her way, creaking and groaning as
though the effort caused her great pain.
Shortly before daylight, Bob fancying that he heard some one entering
the pilot-house, glanced at the open door on the lee side. At first he
saw nothing. Then all of a sudden a huge, shadowy form seemed to rise
from the floor at that point.
Bob gazed in amazement.
``What's that, Mr. Major?'' he asked sharply.
``Where?'' demanded the mate, leaning out and looking forward.
``There, there, at the door?''
``I don't see anything.''
``Neither do I, now, but I did a moment ago. I------''
Bob received a blow from a huge paw that tipped him over sideways,
tumbling him over.
``Help!'' yelled the boy, bolting for the door.
About this time the first mate, who had run around to the rear of the
steering wheel, got a blow on the side of the head that laid him low.
He, too, scrambled to his feet and dashed for the door, slamming it shut
after him.
``What's the trouble in there?'' shouted one of the bridge watch, poking
his head in at the window. He had heard some sort of disturbance in the
pilot-house, he thought, but the wind being so strong he was unable to
decide what the disturbance was about.
There was no answer to his question.
``I say------'' he shouted; then something happened to him.
A huge paw was stretched out through the forward pilot-house window. It
came down on the head of the watch with a whack, laying him flat on the
deck.
The second watch ran to where his companion had fallen.
``Here, here, what's the mat------''
The watch did not finish the sentence. A cuff on the ear, and a mighty
cuff at that, sent him clear to the end of the bridge, and had the
weather cloths not been in place he would undoubtedly have been knocked
through between the rails and into the sea.
Both men set up a wild yell of fear.
``It's some kind of animal!'' shouted Bob. ``Send for the captain. I'm
going back to the wheel.''
Summoning all his courage the lad opened the pilot-house door, peering
cautiously in.
He got a blow that knocked him over backwards and Bob Jarvis tumbled all
the way down the stairs to the main deck.
Captain Simms came rushing out of his cabin in his pajamas.
He had heard the running on the deck above him and surmising that
something had gone wrong, rushed out to the deck.
``What's wrong? What's wrong?'' he bellowed, casting a quick glance ahead,
almost expecting to see another ship bearing down upon them. ``I say,
what's happened?''
``Help!'' howled the distant voice of Bob Jarvis from the lower deck.
``Help, help!'' yelled the two men on the bridge watch in chorus.
``Captain!'' roared First Mate Major, bounding down the stairs to where
the captain was standing.
The skipper grabbed the mate by the arm and shook him violently.
``Here, here! What's wrong? Have all of you lubbers gone mad?''
``It---it's in the pilot-house!'' gasped the now thoroughly frightened
mate.
``What's in the pilot-house?'' demanded Captain Simms angrily.
``Nobody---I mean I don't know. It's a------''
But the skipper waited to hear no more. He rushed up the stairs, two
steps at a jump. Reaching the bridge deck he sprang for the door of the
pilot-house and jerked it open. As he did so his keen eyes caught sight
of a huge, shadowy figure at the wheel. The strange, uncouth shape was
twirling the wheel merrily, while the ship was diving this way and that
in a most unusual and erratic manner.
The figure at the wheel suddenly bolted forward, making a grab for
Captain Simms. Quite a portion of the skipper's pajamas were left in
the grip of the strange object, causing the captain to retire hastily,
slamming the door as he did so.
``It's the bear! The bear has escaped!'' he shouted.
``The bear?'' yelled several voices.
``Yes, the bear in that crate in the lazaret. We were taking it down for
Mr. Carrhart, to be shipped to a friend of his in Pittsburgh.''
``Wow!'' cried Jarvis, who had been creeping up the stairs. He turned and
bolted down again with all speed.
\gutchapter{CHAPTER XXII}
\section*{\raggedright LEADING A LIVELY CHASE}
``\textit{The} bear has escaped!'' shouted a voice down on the main deck.
``What bear?''
``The one that was in the lazaret.''
``Didn't know there was any bear there. You're kidding,'' answered the
doubting sailor.
``Go up and take a peep into the wheel-house, if you don't believe it.
You'll get a bang on the side of the head that will make your ears ring
eight bells for the rest of the night.''
``I---I guess I'll take your word for it.'' The sailor turned and ran for
the deck-house.
Steve Rush, aroused by the shouting, got up and poked his head from the
cabin window.
``Hey, what's happening?'' he called.
Jarvis was on his way back to tell his chum the news.
``Old Bruin has escaped.''
``Who's he?''
``An old party we had cooped in a crate in the lazar------''
``A bear?''
``You bet he's a bear. He waved a paw at me that knocked me clean out of
the pilot-house.''
``Wait, I'll be out in a minute.''
Steve hurried into his clothes, and a few minutes later was out on the
rolling deck. He could barely make out the lights of the forward
deck-house through the mist of spray that hung over the ship like a
cloud.
``Where is he?'' cried the Iron Boy.
``Up there in the house.''
``But who is steering the ship?''
``I guess the bear is. Nobody else up there except the captain, jumping
around the bridge-deck in his pajamas, mad as a hatter.''
Steve, deciding that he would like a closer look, hurried to the bridge.
There he found Captain Simms in a plight if anything more ludicrous than
had been painted by Bob Jarvis. Rush saw that the ship was reeling about
like a crazy sailor.
``Do something, somebody!'' roared the skipper.
``What would you suggest?'' questioned Steve, taking a peep through an
open window and narrowly missing getting his eyes scratched out as a
hairy paw reached through the window with a downward, raking sweep.
Captain Simms forgot his anger long enough to laugh at the agility with
which Rush leaped backward, falling over a steel cleat, coming up
grinning but very red of face.
``That's what the beast did to me, only he got too much of my clothes for
comfort,'' remarked the skipper.
It was Steve's turn to laugh, which he did uproariously.
``Maybe you think it's funny, but you wouldn't if you were in my place.
The next question is how are we going to get that beast from the iron
range out of the pilot-house?''
``I'll tell you,'' said Bob, who had followed his companion up to the
bridge. ``We'll coax him out with a chunk of fresh meat.''
``Will you hold the meat?'' answered the master sharply.
``No, thank you,'' laughed Jarvis.
``Your idea isn't half bad. I believe I will get a piece of meat and try
it,'' replied Rush reflectively.
``See here, young man. Not quite so fast. What do you propose to do with
the beast when you get him out?''
``I---I---hadn't thought of that,'' stammered Rush.
``I suppose you'd let him dance about the decks and run us all overboard,
eh? No, sir. He stays where he is. You keep watch of him while I go down
stairs and get some clothing on. This summer costume is a little too
airy for this kind of a night.''
The two boys watched the pilot-house from a safe distance while the
captain went below. Day was beginning to dawn, and by the faint light
they could see Mr. Bruin spinning the pilot-wheel this way and that. He
seemed as pleased as a child with a new toy. The compass card, with its
dim white spot showing the position of the ship, attracted his
attention. Brain scratched on the glass over the compass card and
getting no satisfaction from so doing, returned to the wheel.
Such steering probably never had been seen on the Great Lakes before.
All at once five shrill blasts sounded dead ahead.
``There comes a steamer!'' yelled Bob.
``We'll run it down!'' shouted Steve. ``Hey, Captain!''
The up-coming steamer knew that something was wrong and her deck officer
was sounding a danger signal. It looked as if a collision could not be
avoided. Steve ran around to the front of the pilot-house, and rang in
the signal ``full speed astern'' on the bridge telegraph. Then the
``Richmond'' did cut up. Bruin was still steering as fancy dictated, the
bow of the ship wobbling this way and that.
Illustration: A Huge Form Stood at the Wheel.
In the meantime the captain of the other steamer was trying his best to
get his craft out of the way of the wobbling ``Richmond.''
``Sheer off! Sheer off!'' bellowed the skipper of the up-boat. ``You'll cut
us in two.''
The boys thought so as well, but there was nothing they could do save
wait for results and trust to luck.
Bang!
The nose of the ``Richmond'' caught the other boat a glancing blow and
bounced off. The sides of the two ships bumped together, then the stern
of the ``Richmond'' side-swiped the stranger with a smash that sent
everything jingling on the two ships, while the skipper of the up-craft
was dancing up and down the deck of his vessel, heaping abuse upon
Captain Simms and his ``fool crew.''
``We must get that beast out, at all costs,'' raged the master of the
``Richmond.''
Just then Bruin leaned back from the window and against the whistle
lever. Instantly a roar, accompanied by a cloud of steam, burst from the
whistle at the after end of the boat. The roaring of the siren did not
cease. It kept right up and Mr. Bear glanced about uneasily as if
suspecting that the noise was directed against him.
About this time the chief engineer rushed to the deck.
``Stop that blowing. You'll blow all the steam out of the boilers!'' he
commanded, shouting up to the bridge.
``Suppose you come up and stop it yourself,'' suggested Jarvis, grinning
over the rail.
``We shall have to try that meat plan, I guess, boys,'' decided the
master. ``How shall we do it without playing the part of the meat?''
``I have a plan,'' answered Steve. ``Bob, if you will get a piece of meat I
will see what I can do in the meantime.''
Bob hurried aft for the fresh meat while Steve busied himself by
preparing a rope which he placed at the foot of the stairs on the lower
deck. By this time, Jarvis had returned with the meat, the captain
having watched the arrangement with nods of approval.
``Please have some men stationed under cover of the deck-house below us
and have a tarpaulin, one of the canvas hatch covers, handy, will you?''
asked Rush.
``Certainly. Jarvis tell the mate to do as Steve suggests. I will open
the door of the pilot-house when you are ready.''
In the meantime Bruin had left the whistle lever and lumbered to the
starboard window where he stood observing the preparations for his
capture. His nose was upraised sniffing the air, for he smelled the
fresh meat.
``Look out that he doesn't jump out of the window,'' warned Bob.
``I hardly think he will. It is quite a drop,'' answered Rush. ``Now,
Captain, if you will open the door, I think we are ready,'' he added,
taking the meat from the hands of his companion.
``You don't need me now, do you, Steve?''
``Well not just this minute,'' laughed Rush.
Bob ran up the rope ladder of the foremast, and from this point of
safety he grinned his enjoyment of the scene. Captain Simms threw open
the pilot-house door; then he also shinned up the ladder. The bear was
ambling toward Steve at a rapid gait. But the Iron Boy did not appear to
be at all frightened. He slid down the stairs to the forward deck,
waited until the bear was almost upon him, then dropped to the main or
lower deck.
Bruin was after him without loss of time. Reaching the lower deck, Steve
dropped the fresh meat in the big loop of rope that he had spread out on
the deck, and quickly darted behind a hatch.
The bear seized the meat with an ugly growl. Steve gave the rope, one
end of which was in his hands, a violent jerk and the next second the
bear was floundering about the deck, fighting, pawing and uttering
fierce growls, with the noose of Steve's rope drawn down tight over one
of the animal's fore-legs.
Steve took a twist around a stanchion.
``The tarpaulin!'' he shouted.
Not a man made a move to do the lad's bidding.
``Bob! Come down here. I want you! Quick!''
``I'm coming.''
Jarvis was down the ladder in short order.
``What shall we do now?''
``Grab hold of this canvas and help me throw it over the beast.''
``But he'll bite,'' protested Bob.
``He will if we do not get him secured pretty soon. Hurry, there!''
Each taking hold of a corner of the big, heavy canvas the lads
approached the big beast with caution.
``Now, he-o!''
They swung the tarpaulin back and forth to give it momentum, Bruin
stretching out quick paws in an effort to grab the canvas, at the same
time showing his teeth and uttering fierce growls.
``Let go!'' shouted Rush.
The canvas fell completely over the beast, the centre of the covering
dropping directly on his head. Mr. Bear began to claw and roar, but the
more he clawed the more entangled did he become.
The crew uttered a cheer.
``Hurry up, men! Give me a hand or he'll get away from us yet!''
Steve threw himself upon the writhing heap, with Jarvis a close second.
But no sooner had the boys landed on the canvas than they were tossed
off. Back they sprang, making plucky efforts to twist the canvas into
position where the animal could not throw it off.
By this time Captain Simms was down the ladders and stairs, making for
the writhing heap on the jump.
``Get in there, you lubbers!'' he roared.
The men obeyed his command, though they did so with reluctance.
``Fall on the heap!''
After a lively battle, consuming some twenty minutes, the escaped bear
was hopelessly entangled in the tarpaulin, the corners of which were
tied securely, thus imprisoning him beyond the possibility of his
getting out.
``The next question is, what are we going to do with him, now that we
have him?'' inquired the captain.
``Is his crate broken so that it cannot be fixed?'' asked Rush.
``No; it can be fixed up,'' interjected the chief engineer.
``Hurry up and attend to it, Macrae.''
In a few minutes the crate was ready. Steve engineered the following
efforts, as he had those that had gone before. The bear was dragged back
to the stern. There the men waited while Steve put another large chunk
of meat in the cage.
``All ready, men. Throw him down the stairs. Be sure that you get him
down, or he'll be after us and then we shall have our hands full,''
shouted Steve.
``It strikes me we already have,'' muttered the captain, gazing admiringly
at the efforts of the Iron Boy.
``You ought to join a menagerie,'' suggested Jarvis.
``All ready now,'' warned Steve.
``All ready,'' answered the men.
Steve cast a final look about, taking careful note of the knots which
were ready to be unfastened at the word.
``Let go!'' he shouted.
With a roar Mr. Bruin went rolling, bumping and scratching down the
stairs into the lazaret.
Steve crept down the stairs.
``Everyone stay back,'' he warned.
None needed the advice. None of the ship's company felt the least
inclination to climb into that dark hole where the angry bear was
floundering about.
``Throw on a light,'' called Rush.
A solitary light gleamed in the darkness of the lazaret. About that time
the bear smelled the fresh meat in the cage. With a grunt and a growl he
went in search of it, nosing here and there. At last he found it.
Steve, crouching on the stairway was watching the beast with keen eyes.
The bear entered the cage. With a bound Rush dropped to the floor of the
lazaret.
Bang! The door of the cage swung to, the padlock securing it, quickly
slipped through the staple and locked.
Mr. Bear was a prisoner.
``There, you may all come down now, children,'' called the Iron Boy.
``Is he in?'' demanded a voice at the head of the stairs.
``He is. Bruin is having the rest of his breakfast now.''
``Three cheers for Steve Rush,'' cried the captain, pulling off his cap.
``Hip-hip-hurrah!'' yelled the sailors. ``Hip-hip-hurrah! Hip-hip-hurrah!
T-i-g-e-r!'' added Bob Jarvis.
Steve came up from the lower deck, his face flushed with triumph.
``Well, we got him, didn't we?'' he demanded.
``You mean \textit{you} got him,'' answered the captain.
``We all got him.''
``It is my opinion,'' added the skipper, ``that you ought to be the captain
of this boat. You've got more horse sense than all the rest of us
together.''
\gutchapter{CHAPTER XXIII}
\section*{\raggedright THE WIRELESS MESSAGE}
\textit{For} the rest of that day the ship had a measure of quiet, just for a
change. The storm kept on with its former severity and there was more or
less discomfort. Meals had to be eaten standing up, and life lines had
been run along the deck to support the one who ventured along the decks
forward or aft. Marie was not allowed to leave her father's cabin again
while the storm lasted. Considerable time had been lost, owing to the
trouble caused by the bear, so the ship was put to full speed.
Of late the boys had taken the keenest sort of interest in the wireless
outfit with which the ship was equipped. They spent much of their
leisure time with the wireless operator. Steve had learned part of the
Morse alphabet and occasionally he tried to operate the key.
Two days later, as they were sitting in the wireless room, where the
operator, with feet on his desk, was telling them a story of a wreck
that he had been in on the Atlantic when he was operator on a liner, a
flash from the switchboard told them that they had picked up a wireless
from another ship or station.
The operator quickly adjusted the receiver over his head, listened a
moment then threw his key open. A few quick sentences were crashed
forth, the aerials above the deck of the ship snapping out the message
in sundry vicious cracklings.
Steve tried to catch the drift of what was being said, but it was too
fast for him. He could not hear what the operator was receiving, but
after a while the operator picked up his pencil and began writing
industriously.
Glancing over the man's shoulder Steve's eyes caught a few words that
caused him to lean forward with renewed interest. Then he sat back,
possessing himself in patience until the message should have been
finished.
``That's strange,'' said the operator, laying down his head piece.
``What is it?'' questioned Bob.
``Nothing much. It is just a message I picked up about some fellow that
the police want.''
``Well, it isn't I, that's sure,'' said Jarvis with a confident laugh.
``It is---but here, read it for yourself.''
Steve read the message out loud.
``'Wanted: One, Gus Collins, for complicity in a post-office robbery at
Elgin on the night of June third. Collins has been a sailor and is said
to be on one of the ships on the lakes. About five feet ten in height,
gray eyes, blonde hair. Has a peculiar stoop to his shoulders, and a
habit of peering up suspiciously, but not meeting the eyes of the person
he is talking to. Five hundred dollars reward offered for his capture by
the post-office department.'''
``I'd like to make that five hundred,'' laughed Jarvis.
Steve did not reply at once. His face was serious. He was thinking.
``Well, there is one thing certain, Mr. Gus Collins isn't on this ship,''
announced the operator, hanging up his headstall. ``Funny message to send
out. Skippers of these boats have something else to do besides hunting
down criminals for the post-office department.''
Rush nodded thoughtfully.
Somehow, the description of the man seemed to strike a familiar chord in
him. He could not help feeling that he had seen some one who in a
measure answered that description.
``Ever seen him, Bob?'' questioned the lad.
Jarvis shook his head.
``Wouldn't have recognized him if I had seen him. Say!''
``Well?''
``Maybe the bear is Collins in disguise.''
There was a laugh at this. Rush read the message over again.
``Shall I take it up to the captain?''
``Yes, if you will.''
Steve did so. Captain Simms read the alarm message through twice.
``Pshaw!'' he grunted. ``Let the government find its own criminals. It
doesn't hire me to be a policeman. How's the bear?''
``I haven't heard him complain any since we put him back,'' answered Steve
with a grin. ``How did he get out, do you think?''
``The cage tipped over in a roll of the ship. No more wild animal shows
on this ship. Are you going to try to earn that five hundred dollars?''
demanded the skipper, changing the subject abruptly.
``I had not thought of doing so. You do not think he is on your ship, do
you?''
``If he was you'd catch him, even if you had to bait him with raw beef.
Say, are you going to stay with me?''
``Why, I am not thinking of leaving, Captain Simms.''
``I don't mean now. Of course, you wouldn't leave me in the middle of the
season. You're too square for that. I mean at the end of the season?''
``Of course, we shall have to work during the winter. We can't afford to
lie around in idleness.''
``Yes, of course. But what about next season?''
``That is a long way off,'' smiled Rush.
``Will you come back with me next year?''
``I could not promise. Frankly, Captain, I wish I might stay with you. I
like the life and I should be happy to spend the rest of my days on the
water, were it not for one fact.''
``What is that?''
``There isn't much of a future to the lake business.''
Captain Simms nodded.
``Nothing beyond being a captain. That's the stone wall we butt against
sooner or later, if we are lucky enough to get that far. I don't blame
you, but I am sorry. I was in hopes you would stay with us another
season.''
``This season is young yet. Perhaps you may be glad to get rid of me
before the end of it,'' laughed Rush.
``No danger of that. But I am going to make it worth your while to stay,
you see if I don't. Tell the operator to send back word, to the man that
sent out this message, that we haven't got any safe crackers on board
the `Richmond.'''
``Very well, sir.''
Steve picked up the message and left the cabin. He walked thoughtfully
aft to his own state room, where he found Jarvis getting ready to go on
duty. Rush sat down to study the description of the much-wanted
criminal.
``I can't get it out of my mind that I know that man.'' he muttered. ``I
know I have seen him somewhere. But where? Pshaw! Why should I trouble
myself about the matter? I'm no policeman, and I don't want to earn any
money at the price of another man's liberty.''
``What's the matter---gone crazy?'' demanded Jarvis, eyeing his companion
suspiciously. ``They say it's a sure sign, when a fellow gets the habit
of talking to himself.''
Rush laughed heartily.
``Then both of us must be in the same boat, for I heard you mumbling to
yourself this very day.''
``When?''
``At the time the bear was chasing you.''
``Huh!''
``Bob, listen.''
Steve read out the message, slowly, giving emphasis to that part
describing the man wanted by the government.
``Think hard, now. Isn't there some one whom you have seen that answers
that description, the stooping shoulders, the peculiar way of glancing
up from under the half-closed eyelids------''
``Nobody but Smith.''
``Smith!'' Rush gazed at the other boy blankly.
``That's so; he does rather answer the description.''
``Of course he isn't the man.''
``Perhaps not.''
All the rest of the day Steve thought over the contents of that message
and the suggestion made by Jarvis. He did not see the stoker, however,
until the following morning, just as Steve was coming off duty.
``Morning, Smith,'' greeted the lad, bending a scrutinizing gaze on the
surly fireman.
``Morning,'' mumbled the other.
``By the way, old chap; were you ever in Elgin?''
Smith gave the lad a quick, sharp look.
``What are you getting at?''
``Do you know a man named Collins---Gus Collins?'' persisted the Iron Boy.
``Co---Co---Collins?''
``Yes, a fellow who was interested in cracking a post-office safe out in
Elgin------''
``It's a lie!'' exploded the stoker, straightening up suddenly, his face
flushing and his features working convulsively.
``Ah! Then you do know something about this man, Collins, eh?''
``Ye---no, I don't know anything about him. I've heard of him, that's
all. Now you let me alone, or------''
``Smith, you saved my life. I'm not such a cur as to forget that. I think
you have something to say to------''
``I ain't got anything to say to you.''
``Oh, yes, you have. Come with me to my cabin, where we can talk without
interruption. It may be worth your while.''
``I won't go!''
Smith raised a hand as if he would strike the boy whose finger-tips were
resting on the stoker's shoulder.
``You come with me!'' commanded Steve, placing a firmer grip on the
shoulder of the stoker. In that way, and without further resistance,
Steve led him to his own stateroom.
``Sit down! Now tell me all about it.''
The fireman's face was sullen and rebellious.
``There---there ain't nothing to tell,'' answered the man in a low,
half-angry voice.
``You are Gus Collins! I know you, now. I was sure I had seen the man
whose description was sent out by the police and the government
officials.''
The stoker's face went ghastly.
``Yes, I am. Now what are you going to do about it?'' he demanded, rising
to his full height, standing over Rush in a threatening attitude.
``I am going to talk with you for the present. I think I have a right to
do that, and see if there isn't something I can do for you after all you
have done for me. Sit down, Gus.''
With a bewildered look on his face, the stoker sank into the chair.
``Tell me the whole story, Gus,'' urged Rush gently. ``You need not be
afraid of me. I am your friend, no matter what you have done.''
For a full five minutes Collins did not speak. It was plain to the
keen-eyed boy before him that the man was battling with himself and was
trying to decide what his course of action should be.
``Did you have any part in the robbery of that post-office?'' urged Steve.
``\textit{No!}'' fairly shouted the stoker.
``Then you have nothing to fear.''
``Yes, I have, too. I've got everything to fear. I'm a bad man, and------''
``Perhaps you were, but you have wiped that all out by your heroic act
in------''
``Boy, I've served time in Joliet. I'm an ex-convict. I stole something
once when I didn't know what I was doing. They put me away for five
years for that little job. While I was in prison my temper got the best
of me one day, and I hurt a man, and------''
``You don't mean you------''
``No, I didn't kill him, but I was used worse than a little yellow dog
after that. What little good there was in me was beaten out of me,
and---never let your temper get the best of you, boy. It's an awful thing
to have a temper like mine.''
Steve nodded.
``Well, I got out. My time was up.''
``When was that?''
``This spring. I was dogged from the time I left the prison until one day
I managed to give them the slip, and------''
``You mean the police were following you?''
``Yes; spotting me.''
``What for?''
``To see that I didn't get into any mischief. The last time they saw me I
was in Elgin. I left on the six o'clock train, after throwing the
spotters off. That night the post-office there was cracked. I read about
it in the papers next day, and I knew they'd put it on me. I got clear
of the place as soon as possible, shipped up the lakes from Chicago;
then got in with this crowd. Now I'll be sent back to Joliet again.''
``Perhaps not; not if you are innocent.''
``I am as innocent as you are, Steve Rush. Help me, boy! Help me to get
away. They'll nail me this time, sure. They've got the line drawn on me
fair and square. They sent out that alarm you've got in your hands
there. Help me to get away in the small boat to-night and I'll make
shore and disappear. I'll fool them. I did you a good turn. Do a great
one for me, now!''
``Yes, Gus; I will do you a turn, but I won't help you to escape. That
would be a foolish thing to do. The police would get you sooner or
later, and your flight would be the very worst thing possible for you
when they did get you.''
``You won't help me?''
``No, not in that way.''
``How then?''
``I shall have to think it over, but if you are innocent, have no fears,
for you shall be freed of the accusation. I must talk with the
captain------''
Collins started to protest.
``No one else on board shall know of it except my friend, Jarvis, and he
is true-blue. When we have you freed I will see to it that you get a
berth on this or some other boat, for life, if you want it.''
Collins shook his head.
``No; they'll fire me when they find out I've done time. Nobody wants an
ex-convict. They drive a man to the dogs after once he's fallen------''
``Here's one man who won't drive you, Gus Collins. Here's one man who's
going to stand right back of you and see that you get fair play. Then
you're going to hold your head up and be a man with other men. You leave
it all to me, will you? Will you promise to do so?''
Collins eyed the bronzed, manly face before him, for a full moment; then
he stretched out an impulsive hand.
``Put it there, little pard! I'll stand up, even if I do time for it, if
it'll please you any. You're the pluckiest, the squarest bunch of muscle
that I've ever come up with!''
\gutchapter{CHAPTER XXIV}
\gutchapter{CONCLUSION}
STEVE RUSH had told the whole story to Captain Simms, to all of which the captain listened in deep interest.
``Well, what do you propose to do about it?'' questioned the skipper, with a quizzical smile.
``If you will give me a leave of absence, I think I should like to go back to Elgin with Collins and help to get him free,'' announced Steve.
``Don't monkey with fire. A crook's a crook, and------''
``This one \textit{will} be, if he is sent up again. I propose to get him out, even if it takes all the rest of the summer to do it.''
``All right. Go ahead, lad, but for goodness' sake wait until we get the bear out of this ship,'' laughed the captain.
The result was that as soon as the ``Richmond'' reached its destination on Lake Erie, Steve and the stoker, both dressed in their best, slipped ashore and took a train for Chicago. Early the next forenoon they presented themselves at the police station in the town where the robbery had occurred, Steve acting as spokesman and stating that Collins had heard he was wanted and had come to give himself up, prepared to prove his innocence.
Of course the stoker was locked up. The man was sullen once more, and when the iron doors clanged behind him he gave up all hope.
``They've got me! I was a fool!'' he muttered.
Shortly after that Steve visited him, and when the boy left the man Collins was in a better frame of mind. Rush got to work at once. He must find some one who would remember to have seen Gus leaving town. Suddenly an idea occurred to the boy. He visited the railroad station. From one official to another he traveled, asking questions and getting scant courtesy. Everyone's hand appeared to be against him when the owner learned the object of Rush's mission.
It was not until the next day that he found the man for whom he was looking. That was the conductor of the train on which Collins had taken passage when he left the town the evening of the robbery, and several hours before it occurred. He had obtained from Collins a description of the clothes the latter wore on that night, and where he sat in the train, establishing the fact that the man's soft hat, tipped up behind, was pulled well down over his face, and that he wore a red necktie.
Armed with this description, Steve visited the conductor at the latter's home. At first the conductor did not seem to remember, but when Steve mentioned the felt hat, the red necktie and the stoop of the man's shoulders in connection with the furtive glancing up from beneath the eyelids, the railroad man, slapped his thigh violently.
``Of course I remember him. I'd know him if I saw him. He had a scar on his right cheek------''
``That's the man,'' cut in Rush triumphantly. ``Come over to the station with me and identify him. You will prevent a grave injustice being done if you will assist me in this matter.''
The conductor readily picked out Gus Collins as the man whom he had seen on his train proceeding the robbery. A few days later the conductor was summoned before the Grand Jury, at Steve's instigation, where he repeated his story in detail. Steve gave evidence also as to what he knew about the man, repeating the interview he had had with the stoker on board the ship.
The result was that Gus Collins stepped from his cell a free man that evening. He said little, but he seemed unable to keep his eyes from the face of the boy who had saved him from prison. Collins knew that nothing could have saved him had it not been for the Iron Boy, but somehow he could not find it possible to express his thankfulness.
``We will go back to Duluth,'' said the lad. ``We shall not be able to catch the ship down this way I guess. Anyhow, a few days' layoff will not hurt us in the least.''
``What are you going to do with me now?'' demanded the fireman, finding his voice at last.
``I shall take good care of you. Forget all that's past. You are a man now, and you are going to be a man henceforth. Quit brooding over your troubles. You haven't any. They were all washed out of you in the lake the day you went in after me. I have something in mind for you that I think will please you.''
Reaching Duluth, Steve sought Mr Carrhart at once and to the president the lad told the whole story.
``What do you want, my lad---what do you wish me to do for your friend?'' asked the president kindly.
Rush told him in a few words. The result was that Mr. Carrhart gave the boy a letter to the superintendent, telling Steve to return for an interview after he had finished with the Collins' business.
It was a proud and happy Steve who sought out Gus Collins an hour later, at the hotel where the man and the boy were stopping.
``Well, what about it?'' demanded the stoker, without the least trace of hopefulness in his tone.
``You are to report for duty on the `Richmond' as soon as she gets in.''
``Oh!'' Collins' face brightened.
``Here's your appointment,'' added Steve, handing over a document with the imprint of the steamship company at its head.
Collins read it through, changed color then stared at Steve.
``Is this some kind of a joke you're playing on me?''
``It is no joke, Gus. You are appointed foreman of the stoke-room of the ore carrier `Richmond,' and you'll save more coal for the company than any other stoker who ever bossed a fire-room.''
Collins sat down heavily. The tears were blinding his eyes. Steve did not try to stop them. He realized that they marked the turning point in what had been a hard life, a life that had bidden fair to be wholly wrecked in the name of justice. But what Steve Rush in his unselfishness did not realize, was that he had saved a human soul.
The interview with Mr. Carrhart took place that afternoon.
``Yes, sir; I think I have a few suggestions to make,'' answered Steve in reply to a question from the president. ``But first I should like to ask some questions of you.''
``Proceed.''
Steve asked the average cost of operating the ships of the fleet per month; what the ships earned by carrying coal for other concerns on the return trips, together with a number of other shrewd and pointed questions. All of these Mr. Carrhart answered freely, knowing that the boy's reasons for asking them were in the interest of his investigations.
Rush made some rapid calculations on a pad on the president's desk.
``You have some two hundred ships in the line, I believe, sir?''
``Yes; two hundred and ten.''
``Would it be any saving if you could save an hour in the unloading of these ships---two hundred and ten hours, in other words, every time the whole fleet made a trip down the lakes?''
``Well, I should say it would.''
``That is easy.''
``Explain.''
``Simply put on an extra unloader for each dock, so that both may work at the same time.''
Mr. Carrhart considered. He, too, made some calculations.
``Yes, that is an excellent suggestion. It will mark a very great saving in the transportation cost. Candidly, the idea never occurred to me. You have earned your salary for one year at least,'' added the president with an indulgent smile. ``I felt sure you would dig up something of value to us, to say nothing of the value the experience would be to you.''
``I'm not through yet,'' laughed the Iron Boy. ``I'm going to show you how you can save something like thirty thousand dollars a year more on the carrying proposition.''
``Why, Rush, you amaze me. It cannot be possible, after figuring down all transportations the way the experts of this company have done and been doing for years.''
``The old saying is to the effect that figures never lie. Perhaps mine do. If so, you will be able to discover the untruth at once.''
``May I ask how you propose to work this great saving?'' asked the president good-naturedly.
``Send your boats back light.''
``Send them back light?''
``Yes, sir; in water ballast.''
``But, my boy, don't you understand that it will mean the loss of a lot of money to do that? The ships earn a great many thousands of dollars a year by carrying freight for pay on the return trips.''
``Yes, sir; I understand that. Their cargo is mostly coal, is it not?''
``It is.''
``For ports all along the Great Lakes?''
``Certainly.''
``And through carrying this coal your ships lose from a week to ten days and some times two weeks' on every round trip.''
``How do you know this?'' interrupted Mr. Carrhart.
``I have asked questions,'' smiled Steve. ``Call it a week's loss of time on each trip. Do you know what that means?''
``I begin to see,'' answered the president reflectively.
``It means that every time your fleet makes a round trip, carrying coal back with them, the company loses their services to the enormous total of two hundred and ten weeks, more than four years, Mr. Carrhart. If you will glance over these figures of mine you will observe that, by this method, the company is losing about the figure stated by me a few minutes ago, over and above what you get in freights for carrying the coal.''
The president made a few brief calculations. He went over his figures and Steve's several times, his forehead corrugated with deep wrinkles as he did so. At last Mr. Carrhart glanced up, gazing steadily at the slightly flushed face of the Iron Boy.
``Rush you are a very remarkable young man,'' he said. ``Of course, I knew that before, but what I did not know was that you had a head for finance, such as you have just demonstrated. This is really a most remarkable showing. I shall bring it before the board at the next meeting. There is no doubt about your suggestions being adopted. I think it will come in the nature of a revelation to the board. My boy, I am proud of you. I can't tell you how proud I am, especially so because I picked you out, feeling from the first that you would prove a winner.''
``Thank you, sir.''
``And, in this connection, I received a long letter from Captain Simms from Cleveland yesterday. He made certain suggestions regarding yourself and your friend Jarvis, which it gives me great pleasure to act upon. You have been appointed second mate of the steamer `Richmond'; Jarvis, first wheelman. You will be called upon to pass a government examination for a license, which you will take to-morrow morning. You will have no difficulty about it, if you are as good a navigator as Captain Simms says you are, and I have no doubt you are. If you remain on the lakes we'll be making a captain of you some of these days. However, I have an idea you do not intend to be a sailor.''
``No, sir, not permanently.''
* * * * *
And so Steve Rush began as a watch officer on the Great Lakes. He proved that the confidence of his superiors was not misplaced, and for the rest of the season he remained on the ``Richmond,'' distinguishing himself in many ways. Gus Collins, with his fresh start in life, had dropped his hang-dog expression. When he talked to a man, now, he looked that man squarely in the eye, and from the moment of his return to the ship he was a daily worshipper at the shrine of Steve Rush.
At the close of the season Steve found the foreman a place with a manufacturing firm, with the help of a letter from Captain Simms. Then, bidding good-bye to their friends, the lads gathered up their dunnage and went home for a few weeks' rest before taking up the new life that they had about decided upon. What happened to them in their new calling will be related in detail in a following volume entitled, ``THE IRON BOYS IN THE STEEL MILLS; Or, Beginning Anew in the Cinder Pits.'' In the great steel mills the boys were to work among the roaring furnaces, the swiftly moving cranes and the moulding mills, where the metal that they had helped to mine ran in rivers that turned into gold. There the boys were to be called upon to face death many times, and in many forms, as they toiled among the rough men of the mills and laughed at the thousand and one perils of their new life.
THE END.
* * * * *
Transcriber's Note
Obvious spelling and punctuation errors have been corrected, missing
words have been added.
The Advertisement of The Boys of Steel Series contains the numbering
as presented in the book.
Differing spellings used throughtout the book for:
\begin{quotation}
life boat, lifeboat and life-boat light-house, lighthouse layoff, lay-off hatch cover, hatch-cover\end{quotation}
are retained as used by the author
* * * * *
\gutchapter{HENRY ALTEMUS COMPANY'S}
\section*{\raggedright CATALOGUE OF}
The Best and Least Expensive
Books for Real Boys
and Girls
* * * * *
Really good and new stories for boys and girls are not plentiful. Many
stories, too, are so highly improbable as to bring a grin of derision to
the young reader's face before he has gone far. The name of ALTEMUS is a
distinctive brand on the cover of a book, always ensuring the buyer of
having a book that is up-to-date and fine throughout. No buyer of an
ALTEMUS book is ever disappointed.
Many are the claims made as to the inexpensiveness of books. Go into any
bookstore and ask for an Altemus book. Compare the price charged you for
Altemus books with the price demanded for other juvenile books. You will
at once discover that a given outlay of money will buy more of the
ALTEMUS books than of those published by other houses.
Every dealer in books carries the ALTEMUS books.
* * * * *
Sold by all booksellers or sent postpaid on receipt of price
Henry Altemus Company
507-513 Cherry Street, Philadelphia
The Motor Boat Club Series
By H. IRVING HANCOCK
The keynote of these books is manliness. The stories are wonderfully
entertaining, and they are at the same time sound and wholesome, No boy
will willingly lay down an unfinished book in this series.
1 THE MOTOR BOAT CLUB OF THE KENNEBEC; Or, The
Secret of Smugglers' Island.
2 THE MOTOR BOAT CLUB AT NANTUCKET; Or, The Mystery
of the Dunstan Heir.
3 THE MOTOR BOAT CLUB OFF LONG ISLAND; Or, A Daring
Marine Game at Racing Speed.
4 THE MOTOR BOAT CLUB AND THE WIRELESS; Or, The
Dot, Dash and Dare Cruise.
5 THE MOTOR BOAT CLUB IN FLORIDA; Or, Laying the
Ghost of Alligator Swamp.
6 THE MOTOR BOAT CLUB AT THE GOLDEN GATE; Or, A
Thrilling Capture in the Great Fog.
7 THE MOTOR BOAT CLUB ON THE GREAT LAKES; Or,
The Flying Dutchman of the Big Fresh Water.
Cloth, Illustrated Price, per Volume, 50c.
* * * * *
The Range and Grange Hustlers
By FRANK GEE PATCHIN
Have you any idea of the excitements, the glories of life on great
ranches in the West? Any bright boy will ``devour'' the books of this
series, once he has made a start with the first volume.
1 THE RANGE AND GRANGE HUSTLERS ON THE RANCH;
Or, The Boy Shepherds of the Great Divide.
2 THE RANGE AND GRANGE HUSTLERS' GREATEST
ROUND-UP; Or, Pitting Their Wits Against a Packers'
Combine.
3 THE RANGE AND GRANGE HUSTLERS ON THE PLAINS;
Or, Following the Steam Plows Across the Prairie.
4 THE RANGE AND GRANGE HUSTLERS AT CHICAGO;
Or, The Conspiracy of the Wheat Pit.
Cloth, Illustrated Price, per Volume, 50c.
Submarine Boys Series
By VICTOR G. DURHAM
These splendid books for boys and girls deal with life aboard submarine
torpedo boats, and with the adventures of the young crew, and possess,
in addition to the author's surpassing knack of storytelling, a great
educational value for all young readers.
1 THE SUBMARINE BOYS ON DUTY; Or, Life on a Diving
Torpedo Boat.
2 THE SUBMARINE BOYS' TRIAL TRIP; Or, ``Making Good''
as Young Experts.
3 THE SUBMARINE BOYS AND THE MIDDIES; Or, The
Prize Detail at Annapolis.
4 THE SUBMARINE BOYS AND THE SPIES; Or, Dodging
the Sharks of the Deep.
5 THE SUBMARINE BOYS' LIGHTNING CRUISE; Or, The
Young Kings of the Deep.
6 THE SUBMARINE BOYS FOR THE FLAG; Or, Deeding
Their Lives to Uncle Sam.
7 THE SUBMARINE BOYS AND THE SMUGGLERS; Or,
Breaking Up the New Jersey Customs Frauds.
Cloth, Illustrated Price, per Volume, 50c.
* * * * *
The Square Dollar Boys Series
By H. IRVING HANCOCK
The reading boy will be a voter within a few years; these books are
bound to make him think, and when he casts his vote he will do it more
intelligently for having read these volumes.
1 THE SQUARE DOLLAR BOYS WAKE UP; Or, Fighting the
Trolley Franchise Steal.
2 THE SQUARE DOLLAR BOYS SMASH THE RING; Or, In
the Lists Against the Crooked Land Deal.
Cloth, Illustrated Price, per Volume, 50c.
* * * * *
Ben Lightbody Series
By WALTER BENHAM
1 BEN LIGHTBODY, SPECIAL; Or, Seizing His First Chance
to Make Good.
2 BEN LIGHTBODY'S BIGGEST PUZZLE; Or, Running the
Double Ghost to Earth.
Cloth, Illustrated Price, per Volume, 50c.
Pony Rider Boys Series
By FRANK GEE PATCHIN
These tales may be aptly described as those of a new Cooper. In every
sense they belong to the best class of books for boys and girls.
1 THE PONY RIDER BOYS IN THE ROCKIES; Or, The Secret
of the Lost Claim.
2 THE PONY RIDER BOYS IN TEXAS; Or, The Veiled Riddle
of the Plains.
3 THE PONY RIDER BOYS IN MONTANA; Or, The Mystery
of the Old Custer Trail.
4 THE PONY RIDER BOYS IN THE OZARKS; Or, The Secret
of Ruby Mountain.
5 THE PONY RIDER BOYS IN THE ALKALI; Or, Finding a
Key to the Desert Maze.
6 THE PONY RIDER BOYS IN NEW MEXICO; Or, The End
of the Silver Trail.
7 THE PONY RIDER BOYS IN THE GRAND CANYON; Or,
The Mystery of Bright Angel Gulch.
Cloth, Illustrated Price, per Volume, 50c.
* * * * *
The Boys of Steel Series
By JAMES R. MEARS
The author has made of these volumes a series of romances with scenes
laid in the iron and steel world. Each book presents a vivid picture of
some phase of this great industry. The information given is exact and
truthful; above all, each story is full of adventure and fascination.
1 THE IRON BOYS IN THE MINES; Or, Starting at the Bottom
of the Shaft.
2 THE IRON BOYS AS FOREMEN; Or, Heading the Diamond
Drill Shift.
THE IRON BOYS ON THE ORE BOATS; Or, Roughing It on
the Great Lakes.
THE IRON BOYS IN THE STEEL MILLS; Or, Beginning
Anew in the Cinder Pits.
Cloth, Illustrated Price, per Volume, 50c.
West Point Series
By H. IRVING HANCOCK
The principal characters in these narratives are manly, young Americans
whose doings will inspire all boy readers.
1 DICK PRESCOTT'S FIRST YEAR AT WEST POINT; Or,
Two Chums in the Cadet Gray.
2 DICK PRESCOTT'S SECOND YEAR AT WEST POINT; Or,
Finding the Glory of the Soldier's Life.
3 DICK PRESCOTT'S THIRD YEAR AT WEST POINT; Or,
Standing Firm for Flag and Honor.
4 DICK PRESCOTT'S FOURTH YEAR AT WEST POINT; Or,
Ready to Drop the Gray for Shoulder Straps.
Cloth, Illustrated Price, per Volume, 50c.
* * * * *
Annapolis Series
By H. IRVING HANCOCK
The Spirit of the new Navy is delightfully and truthfully depicted in
these volumes.
1 DAVE DARRIN'S FIRST YEAR AT ANNAPOLIS; Or, Two
Plebe Midshipmen at the U. S. Naval Academy.
2 DAVE DARRIN'S SECOND YEAR AT ANNAPOLIS; Or,
Two Midshipmen as Naval Academy ``Youngsters.''
3 DAVE DARRIN'S THIRD YEAR AT ANNAPOLIS; Or, Leaders
of the Second Class Midshipmen.
4 DAVE DARRIN'S FOURTH YEAR AT ANNAPOLIS; Or,
Headed for Graduation and the Big Cruise.
Cloth, Illustrated Price, per Volume, 50c.
* * * * *
The Young Engineers Series
By H. IRVING HANCOCK
The heroes of these stories are known to readers of the High School Boys
Series. In this new series Tom Reade and Harry Hazelton prove worthy of
all the traditions of Dick \& Co.
1 THE YOUNG ENGINEERS IN COLORADO; Or, At Railroad
Building in Earnest.
2 THE YOUNG ENGINEERS IN ARIZONA; Or, Laying Tracks
on the ``Man-Killer'' Quicksand.
3 THE YOUNG ENGINEERS IN NEVADA; Or, Seeking Fortune
on the Turn of a Pick.
4 THE YOUNG ENGINEERS IN MEXICO; Or, Fighting the
Mine Swindlers.
Cloth, Illustrated Price, per Volume, 50c.
Boys of the Army Series
By H. IRVING HANCOCK
These books breathe the life and spirit of the United States Army of
to-day, and the life, just as it is, is described by a master pen.
1 UNCLE SAM'S BOYS IN THE RANKS; Or, Two Recruits in
the United States Army.
2 UNCLE SAM'S BOYS ON FIELD DUTY; Or, Winning Corporal's
Chevrons.
3 UNCLE SAM'S BOYS AS SERGEANTS; Or, Handling Their
First Real Commands.
4 UNCLE SAM'S BOYS IN THE PHILIPPINES; Or, Following
the Flag Against the Moros.
(\textit{Other volumes to follow rapidly.})
Cloth, Illustrated Price, per Volume, 50c.
* * * * *
Battleship Boys Series
By FRANK GEE PATCHIN
These stories throb with the life of young Americans on to-day's huge
drab Dreadnaughts.
1 THE BATTLESHIP BOYS AT SEA; Or, Two Apprentices in
Uncle Sam's Navy.
2 THE BATTLESHIP BOYS FIRST STEP UPWARD; Or,
Winning Their Grades as Petty Officers.
3 THE BATTLESHIP BOYS IN FOREIGN SERVICE; Or,
Earning New Ratings in European Seas.
4 THE BATTLESHIP BOYS IN THE TROPICS; Or, Upholding
the American Flag in a Honduras Revolution.
(\textit{Other volumes to follow rapidly.})
Cloth, Illustrated Price, per Volume, 50c.
* * * * *
The Meadow-Brook Girls Series
By JANET ALDRIDGE
Real live stories pulsing with the vibrant atmosphere of outdoor life.
1 THE MEADOW-BROOK GIRLS UNDER CANVAS; Or, Fun
and Frolic in the Summer Camp.
2 THE MEADOW-BROOK GIRLS ACROSS COUNTRY; Or,
The Young Pathfinders on a Summer Hike.
3 THE MEADOW-BROOK GIRLS AFLOAT; Or, The Stormy
Cruise of the Red Rover.
Cloth, Illustrated Price, per Volume, 50c.
* * * * *
High School Boys Series
By H. IRVING HANCOCK
In this series of bright, crisp books a new note has been struck.
Boys of every age under sixty will be interested in these fascinating
volumes.
1 THE HIGH SCHOOL FRESHMEN; Or, Dick \& Co.'s First
Year Pranks and Sports.
2 THE HIGH SCHOOL PITCHER; Or, Dick \& Co. on the
Gridley Diamond.
3 THE HIGH SCHOOL LEFT END; Or, Dick \& Co. Grilling on
the Football Gridiron.
4 THE HIGH SCHOOL CAPTAIN OF THE TEAM; Or, Dick \&
Co. Leading the Athletic Vanguard.
Cloth, Illustrated Price, per Volume, 50c.
* * * * *
Grammar School Boys Series
By H. IRVING HANCOCK
This series of stories, based on the actual doings of grammar school
boys, comes near to the heart of the average American boy.
1 THE GRAMMAR SCHOOL BOYS OF GRIDLEY; Or, Dick
\& Co. Start Things Moving.
2 THE GRAMMAR SCHOOL BOYS SNOWBOUND; Or, Dick
\& Co. at Winter Sports.
3 THE GRAMMAR SCHOOL BOYS IN THE WOODS; Or,
Dick \& Co. Trail Fun and Knowledge.
4 THE GRAMMAR SCHOOL BOYS IN SUMMER ATHLETICS;
Or, Dick \& Co. Make Their Fame Secure.
Cloth, Illustrated Price, per Volume, 50c.
* * * * *
High School Boys' Vacation Series
By H. IRVING HANCOCK
``Give us more Dick Prescott books!''
This has been the burden of the cry from young readers of the country
over. Almost numberless letters have been received by the publishers,
making this eager demand; for Dick Prescott, Dave Darrin, Tom Reade, and
the other members of Dick \& Co. are the most popular high school boys in
the land. Boys will alternately thrill and chuckle when reading these
splendid narratives.
1 THE HIGH SCHOOL BOYS' CANOE CLUB; Or, Dick \& Co.'s
Rivals on Lake Pleasant.
2 THE HIGH SCHOOL BOYS IN SUMMER CAMP; Or, The
Dick Prescott Six Training for the Gridley Eleven.
3 THE HIGH SCHOOL BOYS' FISHING TRIP; Or, Dick \& Co.
in the Wilderness.
4 THE HIGH SCHOOL BOYS' TRAINING HIKE; Or, Dick \&
Co. Making Themselves ``Hard as Nails.''
Cloth, Illustrated Price, per Volume, 50c.
* * * * *
The Circus Boys Series
By EDGAR B. P. DARLINGTON
Mr. Darlington's books breathe forth every phase of an intensely
interesting and exciting life.
1 THE CIRCUS BOYS ON THE FLYING RINGS; Or, Making
the Start in the Sawdust Life.
2 THE CIRCUS BOYS ACROSS THE CONTINENT; Or, Winning
New Laurels on the Tanbark.
3 THE CIRCUS BOYS IN DIXIE LAND; Or, Winning the
Plaudits of the Sunny South.
4 THE CIRCUS BOYS ON THE MISSISSIPPI; Or, Afloat with
the Big Show on the Big River.
Cloth, Illustrated Price, per Volume, 50c.
* * * * *
The High School Girls Series
By JESSIE GRAHAM FLOWER, A. M.
These breezy stories of the American High School Girl take the reader
fairly by storm.
1 GRACE HARLOWE'S PLEBE YEAR AT HIGH SCHOOL;
Or, The Merry Doings of the Oakdale Freshman Girls.
2 GRACE HARLOWE'S SOPHOMORE YEAR AT HIGH
SCHOOL; Or, The Record of the Girl Chums in Work and
Athletics.
3 GRACE HARLOWE'S JUNIOR YEAR AT HIGH SCHOOL;
Or, Fast Friends in the Sororities.
4 GRACE HARLOWE'S SENIOR YEAR AT HIGH SCHOOL;
Or, The Parting of the Ways.
Cloth, Illustrated Price, per Volume, 50c.
* * * * *
The Automobile Girls Series
By LAURA DENT CRANE
No girl's library---no family book-case can be considered at all complete
unless it contains these sparkling twentieth-century books.
1 THE AUTOMOBILE GIRLS AT NEWPORT; Or, Watching
the Summer Parade.
2 THE AUTOMOBILE GIRLS IN THE BERKSHIRES; Or,
The Ghost of Lost Man's Trail.
3 THE AUTOMOBILE GIRLS ALONG THE HUDSON; Or,
Fighting Fire in Sleepy Hollow.
4 THE AUTOMOBILE GIRLS AT CHICAGO; Or, Winning Out
Against Heavy Odds.
5 THE AUTOMOBILE GIRLS AT PALM BEACH; Or, Proving
Their Mettle Under Southern Skies.
Cloth, Illustrated Price, per Volume, 50c.
\gutchapter{End of Project Gutenberg's The Iron Boys on the Ore Boats, by James R. Mears}
*** END OF THIS PROJECT GUTENBERG EBOOK THE IRON BOYS ON THE ORE BOATS ***
***** This file should be named 40067.txt or 40067.zip ***** This and all associated files of various formats will be found in:
http://www.gutenberg.org/4/0/0/6/40067/
Produced by Dianna Adair, Stephen Hutcheson, Rod Crawford, Dave Morgan and the Online Distributed Proofreading Team at http://www.pgdp.net
Updated editions will replace the previous one---the old editions will be renamed.
Creating the works from public domain print editions means that no one owns a United States copyright in these works, so the Foundation (and you!) can copy and distribute it in the United States without permission and without paying copyright royalties. Special rules, set forth in the General Terms of Use part of this license, apply to copying and distributing Project Gutenberg-tm electronic works to protect the PROJECT GUTENBERG-tm concept and trademark. Project Gutenberg is a registered trademark, and may not be used if you charge for the eBooks, unless you receive specific permission. If you do not charge anything for copies of this eBook, complying with the rules is very easy. You may use this eBook for nearly any purpose such as creation of derivative works, reports, performances and research. They may be modified and printed and given away---you may do practically ANYTHING with public domain eBooks. Redistribution is subject to the trademark license, especially commercial redistribution.
*** START: FULL LICENSE ***
THE FULL PROJECT GUTENBERG LICENSE
PLEASE READ THIS BEFORE YOU DISTRIBUTE OR USE THIS WORK
To protect the Project Gutenberg-tm mission of promoting the free distribution of electronic works, by using or distributing this work (or any other work associated in any way with the phrase ``Project Gutenberg"), you agree to comply with all the terms of the Full Project Gutenberg-tm License available with this file or online at
www.gutenberg.org/license.
\gutchapter{Section 1. General Terms of Use and Redistributing Project Gutenberg-tm electronic works}
1.A. By reading or using any part of this Project Gutenberg-tm electronic work, you indicate that you have read, understand, agree to and accept all the terms of this license and intellectual property (trademark/copyright) agreement. If you do not agree to abide by all the terms of this agreement, you must cease using and return or destroy all copies of Project Gutenberg-tm electronic works in your possession. If you paid a fee for obtaining a copy of or access to a Project Gutenberg-tm electronic work and you do not agree to be bound by the terms of this agreement, you may obtain a refund from the person or entity to whom you paid the fee as set forth in paragraph 1.E.8.
1.B. ``Project Gutenberg'' is a registered trademark. It may only be used on or associated in any way with an electronic work by people who agree to be bound by the terms of this agreement. There are a few things that you can do with most Project Gutenberg-tm electronic works even without complying with the full terms of this agreement. See paragraph 1.C below. There are a lot of things you can do with Project Gutenberg-tm electronic works if you follow the terms of this agreement and help preserve free future access to Project Gutenberg-tm electronic works. See paragraph 1.E below.
1.C. The Project Gutenberg Literary Archive Foundation ("the Foundation'' or PGLAF), owns a compilation copyright in the collection of Project Gutenberg-tm electronic works. Nearly all the individual works in the collection are in the public domain in the United States. If an individual work is in the public domain in the United States and you are located in the United States, we do not claim a right to prevent you from copying, distributing, performing, displaying or creating derivative works based on the work as long as all references to Project Gutenberg are removed. Of course, we hope that you will support the Project Gutenberg-tm mission of promoting free access to electronic works by freely sharing Project Gutenberg-tm works in compliance with the terms of this agreement for keeping the Project Gutenberg-tm name associated with the work. You can easily comply with the terms of this agreement by keeping this work in the same format with its attached full Project Gutenberg-tm License when you share it without charge with others.
1.D. The copyright laws of the place where you are located also govern what you can do with this work. Copyright laws in most countries are in a constant state of change. If you are outside the United States, check the laws of your country in addition to the terms of this agreement before downloading, copying, displaying, performing, distributing or creating derivative works based on this work or any other Project Gutenberg-tm work. The Foundation makes no representations concerning the copyright status of any work in any country outside the United States.
1.E. Unless you have removed all references to Project Gutenberg:
1.E.1. The following sentence, with active links to, or other immediate access to, the full Project Gutenberg-tm License must appear prominently whenever any copy of a Project Gutenberg-tm work (any work on which the phrase ``Project Gutenberg'' appears, or with which the phrase ``Project Gutenberg'' is associated) is accessed, displayed, performed, viewed, copied or distributed:
This eBook is for the use of anyone anywhere at no cost and with almost no restrictions whatsoever. You may copy it, give it away or re-use it under the terms of the Project Gutenberg License included with this eBook or online at www.gutenberg.org
1.E.2. If an individual Project Gutenberg-tm electronic work is derived from the public domain (does not contain a notice indicating that it is posted with permission of the copyright holder), the work can be copied and distributed to anyone in the United States without paying any fees or charges. If you are redistributing or providing access to a work with the phrase ``Project Gutenberg'' associated with or appearing on the work, you must comply either with the requirements of paragraphs 1.E.1 through 1.E.7 or obtain permission for the use of the work and the Project Gutenberg-tm trademark as set forth in paragraphs 1.E.8 or 1.E.9.
1.E.3. If an individual Project Gutenberg-tm electronic work is posted with the permission of the copyright holder, your use and distribution must comply with both paragraphs 1.E.1 through 1.E.7 and any additional terms imposed by the copyright holder. Additional terms will be linked to the Project Gutenberg-tm License for all works posted with the permission of the copyright holder found at the beginning of this work.
1.E.4. Do not unlink or detach or remove the full Project Gutenberg-tm License terms from this work, or any files containing a part of this work or any other work associated with Project Gutenberg-tm.
1.E.5. Do not copy, display, perform, distribute or redistribute this electronic work, or any part of this electronic work, without prominently displaying the sentence set forth in paragraph 1.E.1 with active links or immediate access to the full terms of the Project Gutenberg-tm License.
1.E.6. You may convert to and distribute this work in any binary, compressed, marked up, nonproprietary or proprietary form, including any word processing or hypertext form. However, if you provide access to or distribute copies of a Project Gutenberg-tm work in a format other than ``Plain Vanilla ASCII'' or other format used in the official version posted on the official Project Gutenberg-tm web site (www.gutenberg.org), you must, at no additional cost, fee or expense to the user, provide a copy, a means of exporting a copy, or a means of obtaining a copy upon request, of the work in its original ``Plain Vanilla ASCII'' or other form. Any alternate format must include the full Project Gutenberg-tm License as specified in paragraph 1.E.1.
1.E.7. Do not charge a fee for access to, viewing, displaying, performing, copying or distributing any Project Gutenberg-tm works unless you comply with paragraph 1.E.8 or 1.E.9.
1.E.8. You may charge a reasonable fee for copies of or providing access to or distributing Project Gutenberg-tm electronic works provided that
- You pay a royalty fee of 20\%% of the gross profits you derive from
the use of Project Gutenberg-tm works calculated using the method
you already use to calculate your applicable taxes. The fee is
owed to the owner of the Project Gutenberg-tm trademark, but he
has agreed to donate royalties under this paragraph to the
Project Gutenberg Literary Archive Foundation. Royalty payments
must be paid within 60 days following each date on which you
prepare (or are legally required to prepare) your periodic tax
returns. Royalty payments should be clearly marked as such and
sent to the Project Gutenberg Literary Archive Foundation at the
address specified in Section 4, ``Information about donations to
the Project Gutenberg Literary Archive Foundation.''
- You provide a full refund of any money paid by a user who notifies
you in writing (or by e-mail) within 30 days of receipt that s/he
does not agree to the terms of the full Project Gutenberg-tm
License. You must require such a user to return or
destroy all copies of the works possessed in a physical medium
and discontinue all use of and all access to other copies of
Project Gutenberg-tm works.
- You provide, in accordance with paragraph 1.F.3, a full refund of any
money paid for a work or a replacement copy, if a defect in the
electronic work is discovered and reported to you within 90 days
of receipt of the work.
- You comply with all other terms of this agreement for free
distribution of Project Gutenberg-tm works.
1.E.9. If you wish to charge a fee or distribute a Project Gutenberg-tm electronic work or group of works on different terms than are set forth in this agreement, you must obtain permission in writing from both the Project Gutenberg Literary Archive Foundation and Michael Hart, the owner of the Project Gutenberg-tm trademark. Contact the Foundation as set forth in Section 3 below.
1.F.
1.F.1. Project Gutenberg volunteers and employees expend considerable effort to identify, do copyright research on, transcribe and proofread public domain works in creating the Project Gutenberg-tm collection. Despite these efforts, Project Gutenberg-tm electronic works, and the medium on which they may be stored, may contain ``Defects,'' such as, but not limited to, incomplete, inaccurate or corrupt data, transcription errors, a copyright or other intellectual property infringement, a defective or damaged disk or other medium, a computer virus, or computer codes that damage or cannot be read by your equipment.
1.F.2. LIMITED WARRANTY, DISCLAIMER OF DAMAGES --- Except for the ``Right of Replacement or Refund'' described in paragraph 1.F.3, the Project Gutenberg Literary Archive Foundation, the owner of the Project Gutenberg-tm trademark, and any other party distributing a Project Gutenberg-tm electronic work under this agreement, disclaim all liability to you for damages, costs and expenses, including legal fees. YOU AGREE THAT YOU HAVE NO REMEDIES FOR NEGLIGENCE, STRICT LIABILITY, BREACH OF WARRANTY OR BREACH OF CONTRACT EXCEPT THOSE PROVIDED IN PARAGRAPH 1.F.3. YOU AGREE THAT THE FOUNDATION, THE TRADEMARK OWNER, AND ANY DISTRIBUTOR UNDER THIS AGREEMENT WILL NOT BE LIABLE TO YOU FOR ACTUAL, DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE OR INCIDENTAL DAMAGES EVEN IF YOU GIVE NOTICE OF THE POSSIBILITY OF SUCH DAMAGE.
1.F.3. LIMITED RIGHT OF REPLACEMENT OR REFUND --- If you discover a defect in this electronic work within 90 days of receiving it, you can receive a refund of the money (if any) you paid for it by sending a written explanation to the person you received the work from. If you received the work on a physical medium, you must return the medium with your written explanation. The person or entity that provided you with the defective work may elect to provide a replacement copy in lieu of a refund. If you received the work electronically, the person or entity providing it to you may choose to give you a second opportunity to receive the work electronically in lieu of a refund. If the second copy is also defective, you may demand a refund in writing without further opportunities to fix the problem.
1.F.4. Except for the limited right of replacement or refund set forth in paragraph 1.F.3, this work is provided to you `AS-IS', WITH NO OTHER WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO WARRANTIES OF MERCHANTABILITY OR FITNESS FOR ANY PURPOSE.
1.F.5. Some states do not allow disclaimers of certain implied warranties or the exclusion or limitation of certain types of damages. If any disclaimer or limitation set forth in this agreement violates the law of the state applicable to this agreement, the agreement shall be interpreted to make the maximum disclaimer or limitation permitted by the applicable state law. The invalidity or unenforceability of any provision of this agreement shall not void the remaining provisions.
1.F.6. INDEMNITY --- You agree to indemnify and hold the Foundation, the trademark owner, any agent or employee of the Foundation, anyone providing copies of Project Gutenberg-tm electronic works in accordance with this agreement, and any volunteers associated with the production, promotion and distribution of Project Gutenberg-tm electronic works, harmless from all liability, costs and expenses, including legal fees, that arise directly or indirectly from any of the following which you do or cause to occur: (a) distribution of this or any Project Gutenberg-tm work, (b) alteration, modification, or additions or deletions to any Project Gutenberg-tm work, and (c) any Defect you cause.
\gutchapter{Section 2. Information about the Mission of Project Gutenberg-tm}
Project Gutenberg-tm is synonymous with the free distribution of electronic works in formats readable by the widest variety of computers including obsolete, old, middle-aged and new computers. It exists because of the efforts of hundreds of volunteers and donations from people in all walks of life.
Volunteers and financial support to provide volunteers with the assistance they need are critical to reaching Project Gutenberg-tm's goals and ensuring that the Project Gutenberg-tm collection will remain freely available for generations to come. In 2001, the Project Gutenberg Literary Archive Foundation was created to provide a secure and permanent future for Project Gutenberg-tm and future generations. To learn more about the Project Gutenberg Literary Archive Foundation and how your efforts and donations can help, see Sections 3 and 4 and the Foundation information page at www.gutenberg.org
\gutchapter{Section 3. Information about the Project Gutenberg Literary Archive Foundation}
The Project Gutenberg Literary Archive Foundation is a non profit 501(c)(3) educational corporation organized under the laws of the state of Mississippi and granted tax exempt status by the Internal Revenue Service. The Foundation's EIN or federal tax identification number is 64-6221541. Contributions to the Project Gutenberg Literary Archive Foundation are tax deductible to the full extent permitted by U.S. federal laws and your state's laws.
The Foundation's principal office is located at 4557 Melan Dr. S. Fairbanks, AK, 99712., but its volunteers and employees are scattered throughout numerous locations. Its business office is located at 809 North 1500 West, Salt Lake City, UT 84116, (801) 596-1887. Email contact links and up to date contact information can be found at the Foundation's web site and official page at www.gutenberg.org/contact
For additional contact information:
Dr. Gregory B. Newby
Chief Executive and Director
[email protected]
Section 4. Information about Donations to the Project Gutenberg
Literary Archive Foundation
Project Gutenberg-tm depends upon and cannot survive without wide spread public support and donations to carry out its mission of increasing the number of public domain and licensed works that can be freely distributed in machine readable form accessible by the widest array of equipment including outdated equipment. Many small donations (\$1 to \$5,000) are particularly important to maintaining tax exempt status with the IRS.
The Foundation is committed to complying with the laws regulating charities and charitable donations in all 50 states of the United States. Compliance requirements are not uniform and it takes a considerable effort, much paperwork and many fees to meet and keep up with these requirements. We do not solicit donations in locations where we have not received written confirmation of compliance. To SEND DONATIONS or determine the status of compliance for any particular state visit www.gutenberg.org/donate
While we cannot and do not solicit contributions from states where we have not met the solicitation requirements, we know of no prohibition against accepting unsolicited donations from donors in such states who approach us with offers to donate.
International donations are gratefully accepted, but we cannot make any statements concerning tax treatment of donations received from outside the United States. U.S. laws alone swamp our small staff.
Please check the Project Gutenberg Web pages for current donation methods and addresses. Donations are accepted in a number of other ways including checks, online payments and credit card donations. To donate, please visit: www.gutenberg.org/donate
Section 5. General Information About Project Gutenberg-tm electronic works.
Professor Michael S. Hart was the originator of the Project Gutenberg-tm concept of a library of electronic works that could be freely shared with anyone. For forty years, he produced and distributed Project Gutenberg-tm eBooks with only a loose network of volunteer support.
Project Gutenberg-tm eBooks are often created from several printed editions, all of which are confirmed as Public Domain in the U.S. unless a copyright notice is included. Thus, we do not necessarily keep eBooks in compliance with any particular paper edition.
Most people start at our Web site which has the main PG search facility:
www.gutenberg.org
This Web site includes information about Project Gutenberg-tm, including how to make donations to the Project Gutenberg Literary Archive Foundation, how to help produce our new eBooks, and how to subscribe to our email newsletter to hear about new eBooks.
\end{document}
|
https://www.maths.ox.ac.uk/system/files/legacy/2894/ociamthesismain.tex | ox.ac.uk | CC-MAIN-2019-51 | text/x-tex | application/x-tex | crawl-data/CC-MAIN-2019-51/segments/1575540497022.38/warc/CC-MAIN-20191207082632-20191207110632-00247.warc.gz | 776,820,755 | 1,577 | \documentclass[12pt]{ociamthesis} % default square logo
%\documentclass[12pt,beltcrest]{ociamthesis} % use old belt crest logo
%\documentclass[12pt,shieldcrest]{ociamthesis} % use older shield crest logo
%load any additional packages
\usepackage{amssymb}
%input macros (i.e. write your own macros file called mymacros.tex
%and uncomment the next line)
%\include{mymacros}
\title{Codimension-Two\\[1ex] %your thesis title,
Free Boundary Problems} %note \\[1ex] is a line break in the title
\author{Keith Gillow} %your name
\college{St Catherine's College} %your college
%\renewcommand{\submittedtext}{change the default text here if needed}
\degree{Doctor of Philosophy} %the degree
\degreedate{Trinity 1998} %the degree date
%end the preamble and start the document
\begin{document}
%this baselineskip gives sufficient line spacing for an examiner to easily
%markup the thesis with comments
\baselineskip=18pt plus1pt
%set the number of sectioning levels that get number and appear in the contents
\setcounter{secnumdepth}{3}
\setcounter{tocdepth}{3}
\maketitle % create a title page from the preamble info
\include{dedication} % include a dedication.tex file
\include{acknowledgements} % include an acknowledgements.tex file
\include{abstract} % include the abstract
\begin{romanpages} % start roman page numbering
\tableofcontents % generate and include a table of contents
\listoffigures % generate and include a list of figures
\end{romanpages} % end roman page numbering
%now include the files of latex for each of the chapters etc
\include{chapter1}
\include{chapter2}
\include{conclusions}
%now enable appendix numbering format and include any appendices
\appendix
\include{appendix1}
\include{appendix2}
%next line adds the Bibliography to the contents page
\addcontentsline{toc}{chapter}{Bibliography}
%uncomment next line to change bibliography name to references
%\renewcommand{\bibname}{References}
\bibliography{refs} %use a bibtex bibliography file refs.bib
\bibliographystyle{plain} %use the plain bibliography style
\end{document}
|
http://ctan.imsc.res.in/support/musixtex/doc/musixdoc/accidentals.tex | imsc.res.in | CC-MAIN-2022-49 | text/x-tex | application/x-tex | crawl-data/CC-MAIN-2022-49/segments/1669446710409.16/warc/CC-MAIN-20221127141808-20221127171808-00489.warc.gz | 11,844,982 | 1,984 | \chapter{Accidentals}
\vspace*{-3ex}
Accidentals can be introduced in two ways.
The first way, using explicit macros, consists for
example in coding \keyindex{fl}\pitchp~to put a \ital{flat} at the
pitch $p$, presumably right before a note at the same pitch. This is a
non-spacing command and will automatically place the accidental an
appropriate distance to the left of the anticipated note head.
Naturals, sharps, double flats and double sharps are coded \keyindex{na}\pitchp,
\keyindex{sh}\pitchp, \keyindex{dfl}\pitchp~and \keyindex{dsh}\pitchp~respectively.
The alternate macros \keyindex{lfl}, \keyindex{lna}, \keyindex{lsh},
\keyindex{ldfl} and \keyindex{ldsh}
place the same accidentals, but shifted one note head width
to the left. These can be used if a note head has been shifted to the left, or
to avoid collision with other accidentals
in a chord. If you want to shift an accidental by some other amount for
more precise positioning, you could use \keyindex{loffset} with the normal
accidental macro as the second parameter.
The second way of coding accidentals is to modify the parameter of a
note command. Just put the symbol
\verb|^| for a sharp, \verb|_| for a flat, \verb|=|~for a natural,
\verb|>| for a double sharp, or \verb|<| for a double
flat, right before the letter or number representing the pitch.
For example, \verb|\qb{^g}| yields a
$G\sharp$. This may be used effectively in collective coding, e.g.
\verb|\qu{ac^d}|.
There are two sizes of accidentals. By default they will be large unless there
is not enough space between notes, in which case they will be made small. Either
size can be forced locally by coding \keyindex{bigfl}, \keyindex{bigsh}, etc., or
\keyindex{smallfl}, \keyindex{smallsh}, etc. If you want all accidentals to
be large, then declare \keyindex{bigaccid} near the top of the input file. For
exclusively small ones use \keyindex{smallaccid}; \keyindex{varaccid} will restore
variable sizes.
For editorial purposes, small accidentals can be placed \ital{above} note
heads. This is done using \keyindex{uppersh}\pitchp, \keyindex{upperna}\pitchp, or
\keyindex{upperfl}\pitchp:
\begin{music}\nostartrule
\startextract
\NOtes\uppersh l\qa l\en
\NOtes\upperna m\qa m\en
\NOtes\upperfl l\qa l\en
\zendextract
\end{music}
\vspace*{-2ex}
It also possible to introduce \ital{\ixem{cautionary accidental}s},
i.e.,~small accidentals enclosed in parentheses. This is done by preceding
the name of the accidental keyword with ``\verb|c|''\label{cautionary}.
Available cautionary accidentals are \keyindex{csh}, \keyindex{cfl},
\keyindex{cna},
\keyindex{cdfl} and \keyindex{cdsh}, which give
\begin{music}\nostartrule
\startextract
\NOtes\csh g\qa g\en
\NOtes\cfl h\qa h\en
\NOtes\cna i\qa i\en
\NOtes\cdfl j\qa j\en
\NOtes\cdsh k\qa k\en
\zendextract
\end{music}
\vspace*{-2ex}
\noindent The distance between notes and accidentals is controlled by
\keyindex{accshift}\verb|=|\ital{any \TeX\ dimension}, where
positive values shift to the left and negative to right, with a
default of~\verb|0pt|.
For ``big'' cautionary accidentals, use, for example,
\verb|{|\keyindex{largenotesize}\verb|\csh|\pitchp\verb|}| or see Section~\ref{brapar}.
|
https://people.maths.bris.ac.uk/~matyd/GroupNames/401/C3sD68_sgps.tex | bris.ac.uk | CC-MAIN-2021-49 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2021-49/segments/1637964363405.77/warc/CC-MAIN-20211207170825-20211207200825-00095.warc.gz | 514,383,154 | 1,770 | \documentclass[11pt]{amsart}
\usepackage{amssymb,tikz}
\usetikzlibrary{positioning}
\usepackage[colorlinks=false,urlbordercolor=white]{hyperref}
\def\gn#1#2{{$\href{http://groupnames.org/\#?#1}{#2}$}}
\def\gn#1#2{$#2$} % comment this line out to get html links
\tikzset{sgplattice/.style={inner sep=1pt,norm/.style={red!50!blue},char/.style={blue!50!black},
lin/.style={black!50}},cnj/.style={black!50,yshift=-2.5pt,left=-1pt of #1,scale=0.5,fill=white}}
\begin{document}
\begin{tikzpicture}[scale=1.0,sgplattice]
\node[char] at (10.4,0) (1) {\gn{C1}{C_1}};
\node[char] at (6.25,1.22) (2) {\gn{C2}{C_2}};
\node at (2,1.22) (3) {\gn{C2}{C_2}};
\node at (18.8,1.22) (4) {\gn{C2}{C_2}};
\node[char] at (10.4,1.22) (5) {\gn{C3}{C_3}};
\node[char] at (14.5,1.22) (6) {\gn{C17}{C_{17}}};
\node at (7,3.32) (7) {\gn{C4}{C_4}};
\node at (4.75,3.32) (8) {\gn{C2^2}{C_2^2}};
\node at (16,3.32) (9) {\gn{C2^2}{C_2^2}};
\node[char] at (9.25,3.32) (10) {\gn{C6}{C_6}};
\node at (0.125,3.32) (11) {\gn{C6}{C_6}};
\node at (20.6,3.32) (12) {\gn{S3}{S_3}};
\node[char] at (13.8,3.32) (13) {\gn{C34}{C_{34}}};
\node at (2.38,3.32) (14) {\gn{D17}{D_{17}}};
\node at (18.4,3.32) (15) {\gn{D17}{D_{17}}};
\node[char] at (11.5,3.32) (16) {\gn{C51}{C_{51}}};
\node at (7,5.83) (17) {\gn{D4}{D_4}};
\node[char] at (9.25,5.83) (18) {\gn{Dic3}{{\rm Dic}_3}};
\node at (16,5.83) (19) {\gn{D6}{D_6}};
\node at (2.38,5.83) (20) {\gn{C2xC6}{C_2{\times}C_6}};
\node[char] at (4.75,5.83) (21) {\gn{D34}{D_{34}}};
\node at (13.8,5.83) (22) {\gn{C68}{C_{68}}};
\node at (18.4,5.83) (23) {\gn{D34}{D_{34}}};
\node[char] at (11.5,5.83) (24) {\gn{C102}{C_{102}}};
\node at (0.125,5.83) (25) {\gn{C3xD17}{C_3{\times}D_{17}}};
\node at (20.6,5.83) (26) {\gn{D51}{D_{51}}};
\node at (6.25,7.94) (27) {\gn{C3:D4}{C_3{\rtimes}D_4}};
\node at (14.5,7.94) (28) {\gn{D68}{D_{68}}};
\node[char] at (2,7.94) (29) {\gn{C6xD17}{C_6{\times}D_{17}}};
\node[char] at (18.8,7.94) (30) {\gn{D102}{D_{102}}};
\node[char] at (10.4,7.94) (31) {\gn{Dic3xC17}{{\rm Dic}_3{\times}C_{17}}};
\node[char] at (10.4,9.16) (32) {\gn{C3:D68}{C_3{\rtimes}D_{68}}};
\draw[lin] (1)--(2) (1)--(3) (1)--(4) (1)--(5) (1)--(6) (2)--(7) (2)--(8)
(3)--(8) (2)--(9) (4)--(9) (2)--(10) (5)--(10) (3)--(11) (5)--(11)
(4)--(12) (5)--(12) (2)--(13) (6)--(13) (3)--(14) (6)--(14) (4)--(15)
(6)--(15) (5)--(16) (6)--(16) (7)--(17) (8)--(17) (9)--(17) (7)--(18)
(10)--(18) (12)--(19) (9)--(19) (10)--(19) (8)--(20) (10)--(20) (11)--(20)
(13)--(21) (14)--(21) (8)--(21) (13)--(22) (7)--(22) (13)--(23) (15)--(23)
(9)--(23) (13)--(24) (16)--(24) (10)--(24) (14)--(25) (16)--(25) (11)--(25)
(12)--(26) (15)--(26) (16)--(26) (17)--(27) (18)--(27) (19)--(27) (20)--(27)
(23)--(28) (17)--(28) (21)--(28) (22)--(28) (24)--(29) (25)--(29) (20)--(29)
(21)--(29) (23)--(30) (24)--(30) (26)--(30) (19)--(30) (24)--(31) (18)--(31)
(22)--(31) (27)--(32) (28)--(32) (29)--(32) (30)--(32) (31)--(32);
\node[cnj=3] {34};
\node[cnj=4] {102};
\node[cnj=7] {3};
\node[cnj=8] {17};
\node[cnj=9] {51};
\node[cnj=11] {34};
\node[cnj=12] {34};
\node[cnj=14] {2};
\node[cnj=15] {6};
\node[cnj=17] {51};
\node[cnj=19] {17};
\node[cnj=20] {17};
\node[cnj=22] {3};
\node[cnj=23] {3};
\node[cnj=25] {2};
\node[cnj=26] {2};
\node[cnj=27] {17};
\node[cnj=28] {3};
\end{tikzpicture}
\end{document}
|
https://mirror.anarhija.net/lib.anarhija.net/mirror/p/pc/prole-cat-anarchism-and-confederate-flag-culture.tex | anarhija.net | CC-MAIN-2021-25 | application/octet-stream | application/x-tex | crawl-data/CC-MAIN-2021-25/segments/1623487633444.37/warc/CC-MAIN-20210617192319-20210617222319-00501.warc.gz | 364,803,537 | 5,644 | \documentclass[DIV=12,%
BCOR=0mm,%
headinclude=false,%
footinclude=false,open=any,%
fontsize=10pt,%
oneside,%
paper=a5]%
{scrbook}
\usepackage{fontspec}
\setmainfont[Script=Latin]{Alegreya}
\setsansfont[Script=Latin,Scale=MatchLowercase]{Alegreya Sans}
\setmonofont[Script=Latin,Scale=MatchLowercase]{Space Mono}
% global style
\pagestyle{plain}
\usepackage{microtype} % you need an *updated* texlive 2012, but harmless
\usepackage{graphicx}
\usepackage{alltt}
\usepackage{verbatim}
% http://tex.stackexchange.com/questions/3033/forcing-linebreaks-in-url
\PassOptionsToPackage{hyphens}{url}\usepackage[hyperfootnotes=false,hidelinks,breaklinks=true]{hyperref}
\usepackage{bookmark}
\usepackage[shortlabels]{enumitem}
\usepackage{tabularx}
\usepackage[normalem]{ulem}
\def\hsout{\bgroup \ULdepth=-.55ex \ULset}
% https://tex.stackexchange.com/questions/22410/strikethrough-in-section-title
% Unclear if \protect \hsout is needed. Doesn't looks so
\DeclareRobustCommand{\sout}[1]{\texorpdfstring{\hsout{#1}}{#1}}
\usepackage{wrapfig}
\usepackage{indentfirst}
% remove the numbering
\setcounter{secnumdepth}{-2}
% remove labels from the captions
\renewcommand*{\captionformat}{}
\renewcommand*{\figureformat}{}
\renewcommand*{\tableformat}{}
\KOMAoption{captions}{belowfigure,nooneline}
\addtokomafont{caption}{\centering}
\usepackage{polyglossia}
\setmainlanguage{english}
% footnote handling
\usepackage[fragile]{bigfoot}
\usepackage{perpage}
\DeclareNewFootnote{default}
\DeclareNewFootnote{B}
\MakeSorted{footnoteB}
\renewcommand*\thefootnoteB{(\arabic{footnoteB})}
\deffootnote[3em]{0em}{4em}{\textsuperscript{\thefootnotemark}~}
% avoid breakage on multiple <br><br> and avoid the next [] to be eaten
\newcommand*{\forcelinebreak}{\strut\\*{}}
\newcommand*{\hairline}{%
\bigskip%
\noindent \hrulefill%
\bigskip%
}
% reverse indentation for biblio and play
\newenvironment*{amusebiblio}{
\leftskip=\parindent
\parindent=-\parindent
\smallskip
\indent
}{\smallskip}
\newenvironment*{amuseplay}{
\leftskip=\parindent
\parindent=-\parindent
\smallskip
\indent
}{\smallskip}
\newcommand*{\Slash}{\slash\hspace{0pt}}
\addtokomafont{disposition}{\rmfamily}
\addtokomafont{descriptionlabel}{\rmfamily}
% forbid widows/orphans
\frenchspacing
\sloppy
\clubpenalty=10000
\widowpenalty=10000
% http://tex.stackexchange.com/questions/304802/how-not-to-hyphenate-the-last-word-of-a-paragraph
\finalhyphendemerits=10000
% given that we said footinclude=false, this should be safe
\setlength{\footskip}{2\baselineskip}
\title{Anarchism and Confederate-Flag Culture}
\date{}
\author{Prole Cat}
\subtitle{}
% https://groups.google.com/d/topic/comp.text.tex/6fYmcVMbSbQ/discussion
\hypersetup{%
pdfencoding=auto,
pdftitle={Anarchism and Confederate-Flag Culture},%
pdfauthor={Prole Cat},%
pdfsubject={},%
pdfkeywords={media; racism; United States}%
}
\begin{document}
\begin{titlepage}
\strut\vskip 2em
\begin{center}
{\usekomafont{title}{\huge Anarchism and Confederate-Flag Culture\par}}%
\vskip 1em
\vskip 2em
{\usekomafont{author}{Prole Cat\par}}%
\vskip 1.5em
\vfill
\strut\par
\end{center}
\end{titlepage}
\cleardoublepage
\tableofcontents
% start a new right-handed page
\cleardoublepage
\section{One Man’s Journey from Southern Heritage to Libertarian Socialism}
If you are someone who displays a Confederate flag out of overt racism, this text is not for you. In fact, we will fight you in the streets.
If, however, you are someone who insists that he is not racist, but you have at some point in your life displayed a Confederate Flag out of a general sense of rebellion against the government, the boss, parents, pompous Yankee liberals, or just against modern society in general, then this text is addressed to you. Especially, if you are a working class southerner who flies the Cross of St. Andrew as an in-your-face act of protest against the mass production of national “culture,” a McDonaldized product that has the effect of smothering and burying authentic local cultures that (some feel) are symbolized by the Confederate flag\dots{} especially, then, this brief sketch of one man’s odyssey from the glorification of southern heritage to an appreciation of anarchist ideas and values, may have something to say to you.
As a child I was raised by the school, television, church, and my parents, in roughly that order of importance. All of these authorities told me what it was appropriate for me to think, do and feel at any given moment. I was supposed to love and obey a God who never bothered to show his face to me, and in a similar vein I was supposed to love and obey a familial father who didn’t have time for me, either. Parents and teachers were to be respected, and for children who failed in that endeavor the “policeman would come and get you” (which proved to be all too true.)
But at least I had the television\dots{} Mr. TV was my buddy, my fellow sufferer in the face of all this authority. Mr. TV was the coolest kid on the block, the guy who knew his way around the social pit-falls of school, the ultimate arbiter of what was cool and what was, gasp, “lame” (can you imagine a crueler, more horrible expression?)
The problem was, it was all a bunch of lies, and I knew it. (Or at least, once I got old enough to think for myself, I knew it.) The meaning-of-it-all that the church offered meant, in fact, nothing at all. It was illogical, but served the purpose of telling me to be a good servant, because I would get my reward after I was dead from an invisible person in the sky. (I don’t think the unlikelihood of THAT little scenario requires too much commentary.) The school, with its sports programs and detention halls, which claimed to be opening my mind to the mysteries of the universe and the joys of great art, was in fact training to me to become a cog in the great corporate machine. And my parents were too much in the thrall of this corporate religion themselves, to do anything but reinforce it.
Even my best friend, the TV, turned against me. He begin to say that if I was born a white southerner, then I was to blame for all the racial ills of mankind. That’s right, I, little ole southern white boy, had done it all, from the Grecian slave societies of antiquity to the Boston busing riots, from the rape of Nanking to the Holocaust, all the racial ills of mankind could be laid at my doorstep. By this point in time the church (and my parents) had stuffed me so full of irrational guilt that I was inclined to believe it\dots{} but somehow, it just didn’t add up.
So I took a big horn from a bottle of (Kentucky) bourbon, hung a Confederate flag in the window, and told the world to kiss my ass. I was through apologizing for being born\dots{}
Here is the summary version: the American corporate titans that control the TV, newspapers, and grammar school textbooks have declared all things southern to be racist, and all things racist to be southern, in order to confuse the issue and evade their own responsibilities. They portray slavery as having been a purely southern institution, instead of as a single component of a universally oppressive white\Slash{}Anglo economic system (that happened to find its worst excesses in the cotton fields of the southern United States in the 1800’s).
By painting slavery and racism as a uniquely southern phenomenon, the CEO’s manage to divert attention from the racist legacy that remains. When they falsely imply that racism is uniquely southern, and then correctly add that the racial situation in the south now mirrors that of the rest of the country, they declare the problem solved. Implicitly this has the effect of encouraging such reactionary nonsense as charges of “reverse discrimination.”
In fact, nothing could be further from the truth. The problem of white supremacy in America is anything but resolved. In fact, police officers all over America target people of color for searches and beatings, while the nation’s jails, prisons and housing projects are littered with the dark-skinned human refuse of the ultimate soulless commodity system, the great American labor market. In the 1850’s most blacks were subject to whips and chains, but a small portion were relatively “free”. In modern society, most people of color are impoverished or imprisoned, while a similarly small portion are middle-class, or relatively “well-off”. Very little has changed, other than the means of the enslavement.
These facts are what the “racism is a southern thing” myth is intended to obscure. Blacks, Latinos, and to a lesser extent, working-class southern whites are all harmed by this myth. It is time to place the responsibility for American racism and poverty squarely where it belongs, at the doorstep of the business class, and at the foot of the American flag (and all other Anglo-nationalist flags) which provide the business class with aid and comfort.
So, burn your Confederate flag — give it a respectful ceremony if you must, but really, get rid of it — and join the anarchist movement as we set out to combat, defeat and replace the racist, classist, patriarchal society that bores us with political speeches, numbs us with television, scares us with the superstitions of religion, hypnotizes us with the banalities of commercial advertising, and threatens us with the state-religion of patriotism. We are the “rebels” of the modern corporate-techno-nightmare age, and our ultimate goal is to replace the businesses, government and churches with a society of free equals, in which all live at peace with nature and each other.
Join us as we set out to build a new world, a world in which every man, woman and, yes, child is viewed and treated as a valuable part of the great whole of larger humanity, instead of as a competitor for money, sex, and power. Join us as we set out to build a world based on sharing and mutual respect, where local idiosyncrasies (that are supportive of human dignity) are respected, even celebrated. Join us, and be proud of the human being that you are, the community in which you live, and the planet on which you stand.
Down with McDonalds, Wal-Mart, ADM and the rest of the corporations! Up with your neighbors, and yourself!
Prole Cat
September, in the year of our store, 2003
% begin final page
\clearpage
% new page for the colophon
\thispagestyle{empty}
\begin{center}
Library.Anarhija.Net
\bigskip
\includegraphics[width=0.25\textwidth]{logo-yu.pdf}
\bigskip
\end{center}
\strut
\vfill
\begin{center}
Prole Cat
Anarchism and Confederate-Flag Culture
\bigskip
Retrieved on 29 January 2011 from \href{http://news.infoshop.org/article.php?story=03/09/22/5995007}{news.infoshop.org}
\bigskip
\textbf{lib.anarhija.net}
\end{center}
% end final page with colophon
\end{document}
|
https://www.math.purdue.edu/~heinzer/preprints/qir39.tex | purdue.edu | CC-MAIN-2022-49 | text/x-tex | application/x-tex | crawl-data/CC-MAIN-2022-49/segments/1669446710972.37/warc/CC-MAIN-20221204104311-20221204134311-00028.warc.gz | 907,932,286 | 32,366 |
\documentclass{amsart}
\usepackage{amssymb,amscd}
\newtheorem{theorem}{Theorem}[section]
\newtheorem{lemma}[theorem]{Lemma}
\newtheorem{proposition}[theorem]{Proposition}
\newtheorem{corollary}[theorem]{Corollary}
\theoremstyle{definition}
\newtheorem{definition}[theorem]{Definition}
\newtheorem{example}[theorem]{Example}
\newtheorem{xca}[theorem]{Exercise}
\newtheorem{discussion}[theorem]{Discussion}
\newtheorem{remark}[theorem]{Remark}
\newtheorem{question}[theorem]{Questions}
\numberwithin{equation}{section}
\def\CC{{\mathcal C}}
\def\EE{{\mathcal E}}
\def\FF{{\mathcal F}}
\def\GG{{\mathcal G}}
\def\YY{{\mathcal Y}}
\def\XX{{\mathcal X}}
\def\ZZ{{\mathcal Z}}
\def\g{\gamma}
\def\d{\delta}
\def\q{{\bf q}}
\def\rk{\mathop{\rm rk}}
\def\Hom{\mathop{\rm Hom}\nolimits}
\def\Ext{\mathop{\rm Ext}\nolimits}
\def\Ass{{\rm Ass }}
\def\Im{\mathop{\rm Im}}
\def\End{\mathop{\rm End}\nolimits}
\def\Aut{\mathop{\rm Aut}\nolimits}
\def\Spec{\mathop{\rm Spec}}
\def\Max{\mathop{\rm Max}}
\def\Tor{\mathop{\rm Tor}\nolimits}
\def\Ker{\mathop{\rm Ker}}
\def\Coker{\mathop{\rm Coker}}
\def\Int{\mathop{\rm Int}}
\def\hgt{\mathop{\rm ht}}
% Absolute value notation
\newcommand{\abs}[1]{\lvert#1\rvert}
% Blank box placeholder for figures (to avoid requiring any
% particular graphics capabilities for printing this document).
\newcommand{\blankbox}[2]{%
\parbox{\columnwidth}{\centering
% Set fboxsep to 0 so that the actual size of the box will match the
% given measurements more closely.
\setlength{\fboxsep}{0pt}%
\fbox{\raisebox{0pt}[#2]{\hspace{#1}}}%
}%
}
\begin{document}
\baselineskip 16 pt
\title[Commutative Ideal Theory without Finiteness Conditions]{Commutative
Ideal Theory without Finiteness Conditions: Irreducibility in the
Quotient Field}
% Information for first author
\author{Laszlo Fuchs}
% Address of record for the research reported here
\address{Department of Mathematics, Tulane University, New
Orleans, Louisiana 70118}
\email{[email protected]}
% Information for second author
\author{William Heinzer}
\address{Department of Mathematics, Purdue University, West
Lafayette, Indiana 47907}
\email{[email protected]}
\author{Bruce Olberding}
\address{Department of Mathematical Sciences, New Mexico State University,
Las Cruces, New Mexico 88003-8001}
\email{[email protected]}
% General info
\subjclass{Primary 13A15, 13F05}
\date \today
%\dedicatory{This paper is dedicated to our authors.}
\keywords{irreducible ideal, completely irreducible ideal, injective
module, Pr\"ufer domain, $m$-canonical ideal.}
\begin{abstract} Let $R$ be an integral domain
and let $Q$ denote the quotient field of $R$. We investigate the
structure of $R$-submodules of $Q$ that are $Q$-irreducible, or
completely $Q$-irreducible. One of our goals is to describe the
integral domains that admit a completely $Q$-irreducible ideal, or
a nonzero $Q$-irreducible ideal. If $R$ has a nonzero finitely
generated $Q$-irreducible ideal, then $R$ is quasilocal. If $R$ is
integrally closed and admits a nonzero principal $Q$-irreducible
ideal, then $R$ is a valuation domain. If $R$ has an $m$-canonical
ideal and admits a completely $Q$-irreducible ideal, then $R$ is
quasilocal and all the completely $Q$-irreducible ideals of $R$ are
isomorphic. We consider the condition that every nonzero ideal of
$R$ is an irredundant intersection of completely $Q$-irreducible
submodules of $Q$ and present eleven conditions that are equivalent
to this. We classify the domains for which every nonzero ideal can
be represented uniquely as an irredundant intersection of completely
$Q$-irreducible submodules of $Q$. The domains with this property
are the Pr\"ufer domains that are almost semi-artinian, that is,
every proper homomorphic image has a nonzero socle. We characterize
the Pr\"ufer or Noetherian domains that possess a completely
$Q$-irreducible ideal or a nonzero $Q$-irreducible ideal.
\end{abstract}
\maketitle
%\def\u#1{\hbox{\math#1}}
\def\vZ{{\mathbb{Z}}}
\def\vQ{{\u Q}}
\def\vR{{\u R}}
\def\vC{{\u C}}
\def\vN{{\mathbb{N}}}
\def\nin{\noindent}
\def\cen{\centerline}
\def\a{{\alpha}}
\def\b{{\beta}}
\def\g{{\gamma}}
\def\G{{\Gamma}}
\def\e{{\eta}}
\def\m{{\mu}}
\def\n{{\nu}}
\def\h{{\chi}}
\def\k{{\kappa}}
\def\l{{\lambda}}
\def\L{{\Lambda}}
\def\f{{\phi}}
\def\r{{\rho}}
\def\s{{\sigma}}
\def\t{{\tau}}
\def\w{{\omega}}
\def\W{{\Omega}}
\def\z{{\zeta}}
\def\AA{{\mathcal{A}}}
\def\FF{{\mathcal{F}}}
\def\rk{\mathop{\rm rk}}
\def\Hom{\mathop{\rm Hom}\nolimits}
\def\Ext{\mathop{\rm Ext}\nolimits}
\def\Ass{{\rm Ass }}
\def\Im{\mathop{\rm Im}}
\def\fg{finitely generated}
\def\fp{finitely presented}
\def\cp{cyclically presented}
\def\fr{finite rank}
\def\tf{torsion-free}\def\vd{valuation domain}
\def\vr{valuation ring}
\def\vds{valuation domains}
\def\Dd{Dedekind domain}
\def\Dds{Dedekind domains}
\def\Pext{\mathop{\rm Pext}\nolimits}
\def\Bext{\mathop{\rm Bext}\nolimits}
\def\Arch{\mathop{\rm Arch}\nolimits}
\def\Pic{\mathop{\rm Pic}\nolimits}
\def\gen{\mathop{\rm gen}}
\def\rk{\mathop{\rm rk}}
\def\pd{\mathop{\rm p.d.}}
\def\End{\mathop{\rm End}\nolimits}
\def\Aut{\mathop{\rm Aut}\nolimits}
\def\Spec{\mathop{\rm Spec}}
\def\Max{\mathop{\rm Max}}
\def\Tor{\mathop{\rm Tor}\nolimits}
\def\Ker{\mathop{\rm Ker}}
\def\Coker{\mathop{\rm Coker}}
\def\Int{\mathop{\rm Int}}
\def\hgt{\mathop{\rm ht}}
\def\Pd{Pr\"ufer domain}
\def\Pds{Pr\"ufer domains}
\def\<{\langle}
\def\>{\rangle}
\long\def\alert#1{\smallskip{\hskip\parindent\vrule%
\vbox{\advance\hsize-2\parindent\hrule\smallskip\parindent.4\parindent%
\narrower\noindent#1\smallskip\hrule}\vrule\hfill}\smallskip}
\section{Introduction}
This article continues a study of commutative ideal theory in rings
without finiteness conditions begun in \cite{FHO}, \cite{FHO3},
\cite{FHO2} and \cite{HO}. In \cite{FHO} and \cite{FHO3} we examine
irreducible and completely irreducible ideals of commutative rings.
In the present article we investigate stronger versions of these two
notions of irreducibility for ideals of integral domains. In
particular, we consider irreducibility of an ideal of an integral
domain when it is viewed as a submodule of the quotient field of the
domain.
All rings in this paper are commutative and contain a multiplicative
identity. Our notation is as in \cite{FS}. Let $R$ be a ring and let
$C$ be an $R$-module. An $R$-submodule $A$ of $C$ is {\it
$C$-irreducible} if $A = B_1 \cap B_2$, where $B_1$ and $B_2$ are
$R$-submodules of $C$, implies that either $B_1 = A$ or $B_2 =A$. An
$R$-submodule $A$ of $C$ is {\it completely $C$-irreducible} (or
{\it completely irreducible} when the module $C$ is clear from
context) if $A = \bigcap_{i \in I}B_i$, where $\{B_i\}_{i \in I}$ is
a family of $R$-submodules of $C$, implies $A = B_i$ for some $i \in
I$.
In the case where the module $C$ is the ring $R$, an ideal $A$ of
$R$ is $R$-irreducible as a submodule of $R$ precisely if $A$ is
{\it irreducible} as an ideal in the conventional sense that $A$ is
not the intersection of two strictly larger ideals. It is
established by Fuchs in \cite[Theorem 1]{F} that a proper
irreducible ideal $A$ of the ring $R$ is a {\it primal ideal} in the
sense that the set of elements of $R$ that are non-prime to $A$ form
an ideal $P$ that is necessarily a prime ideal and is called the
{\it adjoint prime ideal} of $A$. One then says that $A$ is
$P$-primal. For such an ideal $A$, it is the case that $A =
A_{(P)}$, where $A_{(P)} = \bigcup_{x \in R \setminus P}(A:_Rx)$.
In Remark \ref{0.1} we record several general facts about completely
$C$-irreducible submodules. The straightforward proofs are omitted.
\begin{remark} \label{0.1}
For a proper submodule $A$ of $C$ the following are equivalent:
\begin{enumerate}
\item
$A$ is completely $C$-irreducible.
\item
There exists an element $x \in C \setminus A$ such that $x \in B$
for every submodule $B$ of $C$ that properly contains $A$.
\item
$C/A$ has a simple essential socle, that is, $C/A$ is a cocyclic
$R$-module.
\item
$C/A$ is subdirectly irreducible in the sense that in any
representation of $C/A$ as a subdirect product of $R$-modules, one
of the projections to a component is an isomorphism.
\end{enumerate}
\end{remark}
It is also straightforward to see that every submodule of a module
$C$ is an intersection of completely $C$-irreducible submodules of
$C$. Thus a nonzero module $C$ contains proper completely
$C$-irreducible submodules.
The main focus of our present study is the case where $R$ is an
integral domain and $C = Q$ is the quotient field of $R$.
(Throughout this paper $Q$ is understood to be the quotient field
of the integral domain $R$.) We are thus interested in
$Q$-irreducible and completely $Q$-irreducible submodules of $Q$. We
are particularly interested in determining conditions on an integral
domain $R$ in order that $R$ admit a completely $Q$-irreducible
ideal, or a nonzero $Q$-irreducible ideal. The zero ideal of $R$ is
always $Q$-irreducible, but if $R \ne Q$, the zero ideal of $R$ is
not completely $Q$-irreducible. In the case where $R$ admits
completely $Q$-irreducible ideals, or nonzero $Q$-irreducible
ideals, we are interested in describing the structure of such
ideals. Ideals with either of these properties are necessarily
primal ideals.
It is frequently the case that an integral domain $R$ may fail to
have any fractional ideals that are completely $Q$-irreducible, or
any nonzero ideals that are $Q$-irreducible. If $R = \mathbb Z$ is
the ring of integers, then every nonzero proper $Q$-irreducible
$R$-submodule of $Q$ is completely $Q$-irreducible and has the form
$p^n\mathbb Z_{p\mathbb Z}$, where $p$ is a prime integer and $n$ is
an integer. Thus for $R = \mathbb Z$ every nonzero proper
$Q$-irreducible $R$-submodule of $Q$ is a fractional ideal of a
valuation overring of $R$. Moreover, every nonzero fractional
$R$-ideal has a unique representation as an irredundant intersection
of infinitely many completely $Q$-irreducible $R$-submodules of $Q$.
It follows that $R$ has no nonzero fractional ideal that is
$Q$-irreducible.
In Section 2 we establish basic properties of irreducible submodules
of an $R$-module $C$ with special emphasis on the case where $C =
Q$. We prove in Theorem \ref{1.2} that if $R$ admits a nonzero
principal $Q$-irreducible fractional ideal, then $R$ is quasilocal,
and $R$ is integrally closed if and only if $R$ is a valuation
domain. In Theorem~\ref{qirreducible} we give several necessary
conditions for an integral domain to possess a nonzero
$Q$-irreducible ideal. If $A$ is a nonzero $Q$-irreducible ideal, we
prove that $\End(A)$ is quasilocal, and that $A$ is a primal ideal
of $\End(A)$ with adjoint prime the maximal ideal of $\End(A)$. If
the integral domain $R$ admits a nonzero finitely generated
$Q$-irreducible ideal, we prove that $R$ is quasilocal. Moreover,
every nonzero $Q$-irreducible ideal of a Noetherian domain is
completely $Q$-irreducible.
In Section 3 we review some relevant results and examples regarding
completely $Q$-irreducible fractional ideals. Over a quasilocal
domain, an $m$-canonical ideal (if it exists) is an example of a
completely $Q$-irreducible ideal. If $R$ has an $m$-canonical ideal
and admits a completely $Q$-irreducible ideal, we prove that $R$ is
quasilocal and all completely $Q$-irreducible ideals of $R$ are
isomorphic. We classify the Noetherian domains that admit a nonzero
$Q$-irreducible ideal.
In Proposition~\ref{3.3} of Section 4 we show that a proper
submodule $A$ of the quotient field $Q$ of a domain is an
irredundant intersection of $Q$-irreducible submodules if and only
if the injective hull of $Q/A$ is an interdirect sum of
indecomposable injectives.
In Section 5 we continue to examine irredundant intersections of
$Q$-irreducible submodules in $Q$. We draw on the literature to
give in Theorem~\ref{semi-artinian} eleven different module- and
ideal-theoretic conditions that are equivalent to the assertion that
every nonzero ideal of a domain is an irredundant intersection of
completely irreducible submodules of $Q$. We show in particular
that such a domain is locally almost perfect, and from this
observation we answer in the negative a question of Bazzoni and
Salce of whether every locally almost perfect domain $R$ has the
property that $Q/R$ is semi-artinian (Example~\ref{semi-artinian
example}). In Theorem~\ref{uniqueness} we classify the domains for
which every nonzero ideal can be represented {\it uniquely} as an
irredundant intersection of completely $Q$-irreducible submodules of
$Q$. The domains having this property have Krull dimension at most
one and are necessarily Pr\"ufer, that is, every nonzero finitely
generated ideal is invertible. They may be described precisely as
the Pr\"ufer domains $R$ that are almost semi-artinian, that is,
every proper homomorphic image of $R$ has a nonzero socle.
In light of Theorem~\ref{uniqueness} it is useful to describe the
completely irreducible submodules of the quotient field of a
Pr\"ufer domain. This is done in Theorem~\ref{Prufer case}. Also in
Section 6 we characterize the Pr\"ufer domains that possess a
completely $Q$-irreducible ideal, or a nonzero $Q$-irreducible
ideal. We prove that a Pr\"ufer domain $R$ that admits a nonzero
$Q$-irreducible ideal also admits a completely $Q$-irreducible
ideal, and this holds if and only if every proper $R$-submodule of
$Q$ is a fractional $R$-ideal.
In Section 7 we discuss several open questions, and in an appendix
we correct some errors in the article \cite{FHO2} that were pointed
out to us by Jung-Chen Liu and her student Zhi-Wei Ying. We are
grateful to them for showing us these mistakes.
\section{The structure of $Q$-irreducible ideals}
We begin with several general results.
\begin{proposition}\label{characterization}
Let $R$ be a ring and $C$ an $R$-module. The following statements are
equivalent for a proper $R$-submodule $A$ of $C$.
\begin{itemize}
\item[(i)]
$A$ is a completely $C$-irreducible $R$-submodule of $C$.
\item[(ii)] There
exists $x \in C \setminus A$ such that for all $y \in C \setminus A$
we have $x \in A+Ry$.
\item[(iii)] $A$ is $C$-irreducible and there exists a maximal ideal
$M$ of $R$ such that \newline $A \subset (A:_CM)$, where
$(A:_CM)=\{y \in C : yM \subseteq A\}$.
\end{itemize}
Furthermore, if $R$ is a domain, $A$ is torsionfree and $C$ is the
divisible hull of $A$, then statements (i)-(iii) are equivalent to:
\begin{itemize}
\item[(iv)] There is a maximal ideal $M$ of $R$ such that $A = AR_M$ and
$A$ is completely $C$-irreducible as an $R_M$-submodule of $C$.
\end{itemize}
\end{proposition}
\begin{proof}
(i) $\Rightarrow$ (ii) Let $A^*$ be the intersection of all
$R$-submodules of $C$ properly containing $A$. Then $A \subset
A^*$, and $A^*/A$ is a simple $R$-module. Hence $A^* = Rx + A$ for
some $x \in Q \setminus A$, and (ii) follows.
(ii) $\Rightarrow$ (iii) By (ii) there exists $x \in C \setminus
A$ such that $A^*:=A + Rx$ is contained in every $R$-submodule of
$C$ properly containing $A$. Hence $A^*/A$ is a simple $R$-module
and $A^*/A \cong R/M$ for some maximal ideal $M$ of $R$. Thus $A^*
\subseteq (A:_CM)$ so that $(A:_CM) \ne A$.
(iii) $\Rightarrow$ (i) Since $A$ is irreducible, $(A:_CM)/A \cong
R/M$ and every proper submodule containing $A$ contains $(A:_CM)$,
proving (i).
(i) $\Rightarrow$ (iv) Since $R$ is a domain and $A$ is
torsion-free, $A = \bigcap_{M \in \Max(R)}A_M$, where each $A_M$ is
identified with its image in $C = QA$. Because $A$ is completely
$C$-irreducible, $A = A_M$ for some maximal ideal $M$ of $R$. The
assumption that $A$ is completely $C$-irreducible as an $R$-module
clearly implies $A$ is completely $C$-irreducible as an
$R_M$-submodule of $C$.
(iv) $\Rightarrow$ (iii) Since we have established the equivalence
of (i)-(iii), and since by assumption $A$ is a completely
irreducible $R_M$-submodule of $C$, we have by (iii) (applied to
the $R_M$-module $A$) that there exists $x \in (A :_C MR_M)
\setminus A$. Now since $A = A_M$, we have $A \ne (A:_C MR_M) =
(A:_C M)$. Thus it remains to observe that $A$ is $C$-irreducible.
Suppose $A = B \cap D$ for some
$R$-submodules $B$ and $D$ of $C$. Then $A = A_M = B_M \cap D_M$,
so since by assumption $A$ is irreducible as an $R_M$-submodule of
$C$, it must be that $A = B_M$ or $A = D_M$. Thus $B \subseteq A$
or $D \subseteq A$, proving that $A$ is irreducible.
\end{proof}
\begin{remark} \label{1.1}
Let $R$ be an integral domain that is properly contained in its
quotient field $Q$.
{\rm (i)} By Remark \ref{0.1}, every $R$-submodule of $Q$ is an
intersection of completely irreducible submodules of $Q$. In
particular, every ideal of $R$ is an intersection of completely
irreducible submodules of $Q$.
{\rm (ii)} A fractional ideal $A$ of $R$ is completely
$Q$-irreducible if and only if $A$ is not the intersection of
fractional $R$-ideals that properly contain $A$. If $A$ is a
fractional $R$-ideal and $A \ne Q$, then $A$ is completely
$Q$-irreducible if and only if there exists $x \in Q \setminus A$
such that $x$ is in every fractional ideal that properly contains
$A$.
{\rm (iii)} A maximal ideal $P$ of $R$ is completely $Q$-irreducible
if it is $Q$-irreducible. This is immediate from Proposition
\ref{characterization}, since $P \subsetneq R \subseteq (P:_QP)$.
\end{remark}
In Lemma \ref{2.2}, we establish several general facts about
$Q$-irreducible and completely $Q$-irreducible ideals.
\begin{lemma} \label{2.2} Let $A$ be a proper
ideal of the integral domain $R$. Then
{\rm (i)} $A$ is $Q$-irreducible if and only if for each nonzero $r
\in R$ the ideal $rA$ is irreducible.
{\rm (ii)} For a nonzero $q \in Q$, the fractional ideal $qA$ is
$Q$-irreducible if and only if $A$ is $Q$-irreducible. Therefore the
property of being $Q$-irreducible is an invariant of isomorphism
classes of fractional $R$-ideals.
{\rm (iii)} $A$ is $Q$-irreducible if and only if there is a
prime ideal $P$ of $R$ such that $A = AR_{P}$ and $A$ is a
$Q$-irreducible ideal of $R_P$. It then follows that $P$ is uniquely
determined by $A$ and $A$ is $P$-primal.
{\rm (iv)} For a nonzero $q \in Q$, the fractional ideal $qA$ is
completely $Q$-irreducible if and only if $A$ is completely
$Q$-irreducible. Therefore the property of being completely
$Q$-irreducible is an invariant of isomorphism classes of fractional
$R$-ideals.
{\rm (v)} If $A$ is completely $R$-irreducible and if for each
nonzero $r \in R$ the ideal $rA$ is irreducible, then $A$ is
completely $Q$-irreducible.
\label{ideal characterization}
\end{lemma}
\begin{proof} {\rm (i)} Assume $A$ is $Q$-irreducible
and $r$ is a nonzero element of $R$. If $rA = B \cap C$ for ideals
$B$ and $C$ of $R$, then $A = r^{-1}B \cap r^{-1}C$. Since $A$ is
$Q$-irreducible, either $A = r^{-1}B$ or $A = r^{-1}C$. Hence
either $rA = B$ or $rA = C$ and $rA$ is irreducible. Conversely,
assume $A$ is not $Q$-irreducible. Then there exist $R$-submodules
$B$ and $C$ of $Q$ that properly contain $A$ such that $A = B \cap
C$. We may assume that $B$ and $C$ are fractional ideals of $R$.
Then there exists a nonzero $r \in R$ such that $rB$ and $rC$ are
integral ideals of $R$. Moreover, $A = B \cap C$ implies $rA = rB
\cap rC$ and $A \subset B$ implies $rA \subset rB$ and similarly $A
\subset C$ implies $rA \subset rC$. Therefore $rA$ is reducible.
This completes the proof of {\rm (i)}.
Statements {\rm (ii)} and {\rm(iv)} are clear since $A = \bigcap_{i
\in I}B_i$ if and only if $qA = \bigcap_{i \in I}qB_i$ and
multiplication by $q$ (or by $q^{-1}$) preserves strict inclusion.
{\rm (iii)} Assume $A$ is $Q$-irreducible. Then $A$ is $P$-primal
for some prime ideal $P$ of $R$, so that $A = A_{(P)} = AR_P \cap
R$. Since $A$ is $Q$-irreducible, this forces $A = AR_P$. Clearly
then $A$ is $Q$-irreducible as an $R_P$-module since it is
$Q$-irreducible as an $R$-module. Conversely, suppose that $A =
AR_P$ and $A$ is $Q$-irreducible as an ideal of $R_P$. If $A = B
\cap C$ for some $R$-submodules $B$ and $C$ of $Q$, then $A = AR_P =
BR_P \cap CR_P$, and since $A$ is a $Q$-irreducible $R_P$-submodule
of $Q$, $A = BR_P$ or $A = CR_P$. Thus $B \subseteq A$ or $C
\subseteq A$, which completes the proof.
{\rm(v)} Since $A$ is completely $R$-irreducible, there exists an
element $x \in R \setminus A$ such that $x$ is in every ideal of $R$
that properly contains $A$. Let $A^* = A + xR$. If $A$ is not
completely $Q$-irreducible, then there exists an $R$-submodule $B$
of $Q$ that properly contains $A$ but does not contain $x$. Since
there are no ideals properly between $A$ and $A^*$, $A = A^* \cap B$
and this intersection is irredundant. We may assume that $B$ is a
fractional ideal of $A$. Then there exists a nonzero $r \in R$ such
that $rB$ is an integral ideal of $R$. Therefore $rA = rA^* \cap rB$
is an irredundant intersection. It follows that $rA$ is not
irreducible.
\end{proof}
\begin{remark} \label{2.44}
With regard to Lemma \ref{2.2} we have:
\begin{enumerate}
\item
If $A$ is a nonzero $Q$-irreducible ideal of $R$ and $P$ is as in
Lemma \ref{2.2}(iii), then $R_P \subseteq \End(A)$ and $rA = A$ for
each $r \in R \setminus P$. It follows that $A$ is contained in
every ideal of $R$ not contained in $P$. Thus if $P$ is a maximal
ideal of $R$ and $A$ is $P$-primary with $A = AR_P$, then $R$ is
quasilocal.
\item
It is also true that if $A$ and $B$ are isomorphic $R$-submodules of
$Q$, then $A$ is (completely) $Q$-irreducible if and only if $B$ is
(completely) $Q$-irreducible. For $A$ and $B$ are $R$-isomorphic if
and only if there exists $q \in Q$ such that $A = qB$.
\end{enumerate}
\end{remark}
\begin{theorem}\label{1.2}
If the integral domain $R$ has a nonzero principal fractional ideal
that is $Q$-irreducible, then $R$ is quasilocal and every principal
ideal of $R$ is $Q$-irreducible. If $R$ is integrally closed, then
\begin{itemize}
\item[(i)]
$R$ is $Q$-irreducible if and only if $R$ is a valuation domain, and
\item[(ii)]
$R$ is completely $Q$-irreducible if and only if $R$ is a valuation
domain with principal maximal ideal. \end{itemize}
\end{theorem}
\begin{proof}{\rm(i)} Lemma \ref{ideal characterization} implies
that $R$ has a nonzero principal fractional ideal that is
(completely) $Q$-irreducible if and only if every nonzero principal
fractional ideal of $R$ is (completely) $Q$-irreducible. Suppose $R$
has distinct maximal ideals $M$ and $N$. Then there exist $x \in M$
and $y \in N$ such that $x + y = 1$. It follows that $xyR = xR \cap
yR$ is an irredundant intersection. By Lemma~\ref{ideal
characterization}(i), $R$ is not $Q$-irreducible.
{\rm(ii)} Suppose that $R$ is integrally closed and $Q$-irreducible
but is not a valuation domain. Then there exists $x \in Q$ such
that neither $x$ nor $1/x$ is in $R$. Let ${\mathcal{F}}$ be the
set of valuation overrings of $R$ that contain $x$ and let
${\mathcal{G}}$ be the set of valuation overrings of $R$ that
contain $1/x$. Let $A = \bigcap_{V \in {\mathcal{F}}}V$ and $B =
\bigcap_{W \in {\mathcal{G}}}W$. Then $x \in A$ implies $R
\subsetneq A$ and $1/x \in B$ implies $R \subsetneq B$. Observe that
every valuation overring of $R$ is a member of at least one of the
sets ${\mathcal{F}}$ or ${\mathcal{G}}$. Since $R$ is integrally
closed, we have $R = A \cap B$, a contradiction to the assumption
that $R$ is $Q$-irreducible. Conversely, it is clear that if $R$ is
a valuation domain, then $R$ is integrally closed and
$Q$-irreducible.
{\rm(iii)} By (ii) we need only observe the well-known fact that a
valuation domain $R$ is completely $Q$-irreducible if and only if
the maximal ideal of $R$ is principal. (See for example \cite{Baz}.)
\end{proof}
\begin{remark} \label{2.4} There exist integral domains $R$
that are completely $Q$-irreducible and are not integrally closed.
If $R$ is a one-dimensional Gorenstein local domain, then $R$, and
every nonzero principal fractional ideal of $R$, is completely
$Q$-irreducible. Thus, for example, if $k$ is a field and $a$ and
$b$ are relatively prime positive integers, then the subring $R :=
k[[t^a, t^b]]$ of the formal power series ring $k[[t]]$ is
completely $Q$-irreducible.
\end{remark}
Theorem~\ref{1.2}(ii) characterizes among integrally closed domains
$R$ the ones that are valuation domains as precisely those $R$ that
are $Q$-irreducible. As a corollary to
Proposition~\ref{characterization}, we have the following additional
characterizations of the valuation property in terms of
$Q$-irreducibility.
\begin{corollary} \label{valuation criterion} The following are equivalent
for a domain $R$ with quotient field $Q$.
\begin{itemize}
\item[(i)] $R$ is a
valuation domain.
\item[(ii)] Every irreducible ideal is $Q$-irreducible.
\item[(iii)]
Every completely irreducible ideal is completely $Q$-irreducible.
\item[(iv)]
There exists a maximal ideal of $R$ that is $Q$-irreducible.
\item[(v)]
There exists a maximal ideal of $R$ that is completely
$Q$-irreducible.
\end{itemize}
\end{corollary}
\begin{proof} (i) $\Rightarrow$ (ii)
If $R$ is a valuation domain, then it is
easy to see that irreducible ideals are $Q$-irreducible since the
$R$-submodules of $Q$ are linearly ordered.
(ii) $\Rightarrow$ (iii) If $A$ is a completely irreducible ideal of
$R$, then there is a maximal ideal $M$ of $R$ such that $(A:_R M)
\ne A$. Thus $(A:_QM) \ne A$, and since $A$ is by (ii)
$Q$-irreducible, we have from Proposition~\ref{characterization}
(iii) that $A$ is $Q$-irreducible.
(iii) $\Rightarrow$ (iv) This is clear from the fact that maximal
ideals are completely irreducible.
(iv) $\Rightarrow$ (v) This follows from Remark \ref{1.1}(iii).
(v) $\Rightarrow$ (i) Let $M$ be a completely $Q$-irreducible
maximal ideal of $R$. For every nonzero $r \in R$, $rM$ is
completely irreducible by Proposition~\ref{ideal characterization}.
It is shown in Lemma 5.1 of \cite{FHO3} that this property
characterizes valuation domains, so the proof is complete.
\end{proof}
\begin{corollary} \label{prime corollary} Let $P$ be a prime ideal of a
domain $R$. Then $P$ is $Q$-irreducible if and only if $P = PR_P$
and $R_P$ is a valuation domain. Thus if $P$ is $Q$-irreducible,
then $R_P/P$ is the quotient field of $R/P$, and $R$ is a pullback
of $R/P$ and the valuation domain $R_P$. Moreover $P$ is completely
$Q$-irreducible as an ideal of $R_P$.
\end{corollary}
\begin{proof} Suppose that $P$ is $Q$-irreducible. By
Lemma~\ref{2.2}, $P=PR_P$ and $PR_P$ is a $Q$-irreducible ideal of
$R_P$. Hence, by Corollary~\ref{valuation criterion}, $R_P$ is a
valuation domain.
Conversely, assume $P = PR_P$ and $R_P$ is a valuation domain. By
Corollary~\ref{valuation criterion}, $P$ is a $Q$-irreducible ideal
of $R_P$. Hence, by Lemma~\ref{2.2}, $P$ is $Q$-irreducible. It
follows from Remark \ref{1.1}(iii) that $P = PR_P$ is a completely
$Q$-irreducible ideal of $R_P$.
\end{proof}
\begin{remark} With $P = PR_P$ as in Corollary \ref{prime
corollary}, if $R \ne R_P$, then $P$ as an ideal of $R$ is not
completely $Q$-irreducible. For Proposition \ref{characterization}
(iii) implies that a completely $Q$-irreducible prime ideal is a
maximal ideal, and by Remark \ref{2.44}(i), if $P$ is maximal and
$Q$-irreducible, then $R = R_P$. It can happen however that $P$ is
$Q$-irreducible and nonmaximal. This is the case, for example, if
$P$ is a nonmaximal prime of a valuation domain $R$.
\end{remark}
\begin{remark} Pullbacks arising as in Corollary~\ref{prime corollary}
have been well-studied; for a recent survey see \cite{GaH}. For
example, a consequence of our Corollary~\ref{prime corollary} and
Theorem 4.8 in \cite{GaH2} is that if a domain $R$ has a
$Q$-irreducible prime ideal $P$, then $R$ is coherent if and only if
$R/P$ is coherent.
\end{remark}
\begin{theorem} Assume that $A$ is a
nonzero $\, Q$-irreducible ideal of the integral domain $R$. Then
\begin{itemize}
\item[(i)] If $A$ is not principal, then $AA^{-1}$ is
contained in the Jacobson radical of $R$.
\item[(ii)] $\End(A)$ is a quasilocal integral domain.
\end{itemize}
Let $M$ denote the maximal ideal of $\End(A)$.
\begin{itemize}
\item[(iii)] $A$ is an $M$-primal ideal of $\End(A)$.
\item[(iv)] If $\,M$ is finitely generated as an ideal of $\End(A)$, then
$A$ is completely $Q$-irreducible as an ideal both of $R$ and of
$\End(A)$.
\item[(v)] If $A$ is a finitely generated ideal of $R$,
then $R$ is quasilocal and the maximal ideal of $R$ is the adjoint
prime of $A$.
\item[(vi)] If both $A$ and its adjoint prime are finitely
generated ideals, then $A$ is completely $Q$-irreducible.
\end{itemize}\label{qirreducible}
\end{theorem}
\begin{proof}
(i) Let $x \in A^{-1}$ and suppose that there is a maximal ideal
$N$ of $R$ not containing $xA$. Then there exists $y \in N$ such
that $xA + yR = R$. It follows that $xyA = xA \cap yR$. By
Lemma~\ref{ideal characterization}(ii), $xyA$ is irreducible.
Therefore either $xyA = xA$ or $xyA = yR$. If $xA = xyA$, then $xA
\subseteq yR \subseteq N$, a contradiction, while if $xyA = yR$,
then $xA = R$ and $A$ is principal. We conclude that every maximal
ideal of $R$ contains $xA$. Therefore $AA^{-1}$ is contained in
the Jacobson radical of $R$.
(ii) and (iii) Since $A$ is $Q$-irreducible as an ideal of $R$, it
is also $Q$-irreducible as an ideal of $\End(A)$. By
Lemma~\ref{ideal characterization}(iii), there is a prime ideal $M$
of $\End(A)$ such that $A = A\End(A)_M$. Thus $\End(A)_M \subseteq
\End(A)$, which implies that $M$ is the unique maximal ideal of
$\End(A)$. Also by Lemma~\ref{ideal characterization}(iii), $A$ is
$M$-primal.
(iv) Let $x_1,\ldots,x_n$ generate $M$. By
Lemma~\ref{characterization}(iii), to show that $A$ is completely
$Q$-irreducible it suffices to prove that $(A:_QM) \ne A$. Now
$(A:_QM) = x_1^{-1}A \cap \cdots \cap x_{n}^{-1}A$, so if $(A:_QM) =
A$, then the $Q$-irreduciblity of $A$ implies $x_i^{-1}A = A$ for
some $i$. In this case, $x_i^{-1} \in \End(A)$, which is impossible
since $x_i \in M$, the maximal ideal of $\End(A)$.
(v) By Lemma~\ref{ideal characterization}(ii), $A = AR_P$ for some
prime ideal $P$ of $R$. Thus $R_P \subseteq \End(A)$. But $A$ is
a finitely generated ideal of $R$ implies that $\End(A)$ is an
integral extension of $R$. This forces $R = R_P$, so that $P$ is
the unique maximal ideal of $R$.
(vi) By (v), $R$ is quasilocal with maximal ideal $M$, and $M$ is
the adjoint prime of $A$. As in the proof of (iv), we have $A
\subset (A:_QM)$. Therefore Lemma~\ref{characterization}(ii) implies
that $A$ is completely $Q$-irreducible.
\end{proof}
\begin{corollary} \label{Noetherian case} Every nonzero $Q$-irreducible
ideal over a Noetherian domain is completely $Q$-irreducible. If the
Noetherian domain $R$ admits a completely $Q$-irreducible ideal,
then $R$ is local and $\dim R \le 1$.
\end{corollary}
\begin{proof}
Suppose that $A$ is a nonzero $Q$-irreducible ideal of $R$. By
Theorem~\ref{qirreducible}(vi) $A$ is a completely $Q$-irreducible
ideal of $R$, and hence also of $\End(A)$. By
Theorem~\ref{qirreducible}(ii), $\End(A)$ is quasilocal. Since $R$
is Noetherian, $\End(A)$ is a finitely generated integral extension
of $R$. Therefore $R$ is local.
If $\dim R > 1$, then there exists a nonzero nonmaximal prime ideal
$P$ of $R$. Let $x \in P$ with $x \ne 0$. Then $xM$ is completely
irreducible by Lemma~\ref{ideal characterization}(iv). However, by
Corollary 1.4 in \cite{FHO3} a completely irreducible ideal of a
Noetherian local domain is primary for the maximal ideal,
contradicting $xM \subseteq P$. Therefore $\dim R \le 1$.
\end{proof}
\begin{corollary}
If the integral domain $R$ admits an invertible $Q$-irreducible
ideal, then every invertible ideal of $R$ is principal and
completely $Q$-irreducible.
\end{corollary}
\begin{proof} Suppose that $A$ is an invertible $Q$-irreducible ideal of $R$.
By Theorem~\ref{qirreducible}(i) $A$ is principal. Let $B$ be
an invertible ideal of $R$. Since $A$
is invertible, $A = (B:_Q:(B:_QA))$. Moreover, $(B:_Q A)$ is an
invertible, hence finitely generated, fractional ideal of $R$. Hence
there are elements $q_1,\ldots,q_k \in Q$ such that $A = (B:_Q
(q_1,\ldots,q_k)R) = q_1^{-1}B \cap \cdots \cap q_k^{-1}B$. Since
$A$ is $Q$-irreducible, there exists $i \in \{1,\ldots,k\}$ such
that $B = q_iA$. Hence $B$ is principal and $R$-isomorphic to $A$.
By Lemma~\ref{2.2}, $B$ is $Q$-irreducible.
\end{proof}
\begin{remark} Statement (ii) of Theorem~\ref{qirreducible} is true
also when $A$ is a completely irreducible submodule of $Q$. For by
Lemma~\ref{characterization}(iv) (with $A$ viewed as a completely
irreducible $\End(A)$-submodule of $Q$) there is a maximal ideal $M$
of $\End(A)$ such that $A = A_M$ This forces $\End(A)_M \subseteq
\End(A)$, so $\End(A)$ is quasilocal. \end{remark}
\section{Completely $Q$-irreducible and $m$-canonical ideals}
As noted in Remark~\ref{1.1} every ideal of a domain is the
intersection of completely irreducible submodules of the quotient
field. Thus for a given domain there exists an abundance of
completely irreducible submodules of $Q$. However, as we observe in
Section 1, a domain need not possess a completely $Q$-irreducible
ideal (see also Example~\ref{no canonical}).
In this section we examine the existence and structure of completely
$Q$-irreducible ideals. We also consider the class of
``$m$-canonical'' ideals. A nonzero fractional ideal $A$ of a
domain $R$ is an {\it $m$-canonical} fractional ideal if for all
nonzero ideals $B$ of $R$, $B = (A:_Q(A:_Q B))$. This terminology is
from \cite{BHLP} and \cite{HHP}. Different terminology is used in
\cite{Baz} and \cite{FS} to express the same concept. An ideal $A$
is, in our terminology, $m$-canonical if and only if, in the
terminology of \cite{Baz} and \cite{FS}, $R$ is an
``$A$-divisorial'' domain and $\End(A) = R$. Notice that the
property of being an $m$-canonical ideal is invariant with respect
to $R$-isomorphism for fractional ideals of $R$.
It follows from \cite[Lemma 4.1]{HHP} that an $m$-canonical ideal of
a quasilocal domain is completely $Q$-irreducible. A deeper result
is due to S. Bazzoni \cite{Baz}: {\it A fractional ideal $A$ of a
quasilocal domain $R$ is $m$-canonical if and only if $A$ is
completely $Q$-irreducible, $\End(A) =R$ and for all nonzero $r \in
R$, $A/rA$ satisfies the dual AB-$5^*$ of Grothendieck's AB-5.} (An
$R$-module $B$ satisfies AB-$5^*$ if for any submodule $C$ of $B$
and inverse system of submodules $\{B_i\}_{i \in I}$ of $B$, it is
the case that $\bigcap_{i \in I}(C + B_i) = C+\bigcap_{i \in
I}(B_i)$.)
As examples later in this section show, a domain need not possess an
$m$-canonical ideal. However if $R$ admits an $m$-canonical ideal,
then all completely $Q$-irreducible ideals of $R$ are isomorphic:
\begin{proposition}\label{criterion} Let $R$ be a domain that is not a field.
If $R$ has an $m$-canonical ideal $A$, then every completely
$Q$-irreducible ideal of $R$ is isomorphic to $A$. Consider the
following statements.
\begin{itemize}
\item[(i)] $R$ has an $m$-canonical ideal.
\item[(ii)] Any two completely
$Q$-irreducible ideals of $R$ are isomorphic.
\end{itemize}
Then $(i) \Rightarrow (ii)$. If every completely irreducible
proper submodule of $Q$ is a fractional ideal of $R$, then $(ii)
\Rightarrow (i)$.
\end{proposition}
\begin{proof} Suppose that $R$ has an $m$-canonical ideal $A$.
If $B$ is a nonzero ideal of $R$, then $B = \bigcap_{q}q^{-1}A$,
where $q$ ranges over all nonzero elements of $(A:_Q B)$. Thus if
$B$ is completely $Q$-irreducible, then $B = q^{-1}A$ for some $0
\ne q \in (A:_QB)$. Thus every proper completely $Q$-irreducible
ideal is isomorphic to $A$, and (i) $\Rightarrow$ (ii).
Assume that any two completely $Q$-irreducible ideals are
isomorphic and every completely $Q$-irreducible proper submodule of
$Q$ is a fractional ideal of $R$. Let $A$ be a completely
irreducible $R$-ideal. By Remark~\ref{0.1} every ideal of $R$ is an
intersection of completely $Q$-irreducible submodules of $Q$ and
therefore of completely $Q$-irreducible fractional ideals of $R$.
Thus every ideal of $R$ is an intersection of ideals isomorphic to
$A$; that is, for any ideal $B$, there exists a set $X \subseteq Q$
such that $B = \bigcap_{q \in X}qA$. It follows that $B =
(A:_Q(A:_QB))$. Hence $A$ is an $m$-canonical ideal.
\end{proof}
\begin{remark} An integral domain may have an $m$-canonical ideal,
but not admit a completely $Q$-irreducible fractional ideal. For
example, if $R$ is a Dedekind domain having more than one maximal
ideal, then $R$ admits an $m$-canonical ideal, but does not have any
completely $Q$-irreducible fractional ideals. Indeed, as we observe
in Proposition \ref{quasilocal}, if $R$ has an $m$-canonical ideal
and admits a completely $Q$-irreducible ideal, then $R$ is
quasilocal.
\end{remark}
\begin{proposition} \label{quasilocal}
If $R$ has an $m$-canonical ideal and a completely $Q$-irreducible
ideal, then $R$ is quasilocal.
\end{proposition}
\begin{proof} Let $A$ be a completely $Q$-irreducible ideal of $R$.
By Proposition \ref{criterion}, $A$ is an $m$-canonical ideal.
Therefore $R = \End(A)$. By Theorem \ref{qirreducible}, $\End(A)$ is
quasilocal. Therefore $R$ is quasilocal.
\end{proof}
\begin{remark} If $A$ is a proper $R$-submodule of $Q$, then $A$ is
contained in a completely irreducible proper submodule of $R$. Thus
if every completely irreducible proper submodule of $Q$ is a
fractional ideal of $R$, then every proper submodule of $Q$ is a
fractional ideal of $R$. The latter property holds for $R$ if and
only if there exists a valuation overring of $R$ which is a
fractional ideal of $R$ \cite[Theorem 79]{M2}.
\end{remark}
Routine arguments show that a nonzero fractional ideal of a
valuation domain is $m$-canonical if and only if it is completely
$Q$-irreducible. Also in the Noetherian case, the condition
AB-$5^*$ is redundant, as we note next. The following proposition
is essentially due in the case of Krull dimension 1 to Matlis
\cite{Mat} and in the general case with the assumption that $\End(A)
= R$ to Bazzoni \cite{Baz}. Bazzoni's proof shows that you can omit
in our context the assumption that $\End(A) = R$. We outline how to
do this in the proof. We also include a different proof of the step
(iv) $\Rightarrow$ (iii).
\begin{proposition} \label{Bazzoni} \label{same}
{\em (Bazzoni \cite[Theorem 3.2]{Baz}, Matlis \cite[Theorem
15.5]{Mat})} The following statements are equivalent for a nonzero
fractional ideal $A$ of a Noetherian local domain $(R,M)$ that is
not a field.
\begin{itemize}
\item[(i)] $Q/A$ is
an injective $R$-module.
\item[(ii)] $R$ has Krull dimension 1 and $(A:M)/A$ is a simple $R$-module.
\item[(iii)] $A$ is an $m$-canonical ideal.
\item[(iv)] $A$ is $Q$-irreducible.
\end{itemize}
\end{proposition}
\begin{proof}
(i) $\Rightarrow$ (ii) By Proposition 4.4 in \cite{Mati} a
Noetherian domain that admits an ideal of injective dimension 1
necessarily has Krull dimension 1. Thus $\dim(R) =1$, so we may
apply Theorem 15.5 in \cite{Mat} to obtain (ii).
(ii) $\Rightarrow$ (iii) This is contained in Theorem 15.5 of
\cite{Mat}.
(iii) $\Rightarrow$ (i) If $A$ is an $m$-canonical ideal, then
necessarily $\End(A) =R$, so Theorem 3.2 of \cite{Baz} applies.
(iii) $\Rightarrow$ (iv) An $m$-canonical ideal of a quasilocal
domain is completely $Q$-irreducible \cite[Lemma 4.1]{HHP}.
(iv) $\Rightarrow$ (iii) Suppose that $A$ is $Q$-irreducible. By
Corollary~\ref{Noetherian case} $\dim R = 1$ and $A$ is completely
$Q$-irreducible. By Theorem~\ref{qirreducible} $\End(A)$ is a
quasilocal domain. Since $R$ is Noetherian, $\End(A)$ is Noetherian.
Thus by Theorem 3.2 in \cite{Baz} $A$ is an $m$-canonical ideal of
$\End(A)$.
By \cite[Theorem 15.7]{Mat} a Noetherian local domain of Krull
dimension 1 has an $m$-canonical ideal if and only if the total
quotient ring of the completion of the domain is Gorenstein.
Therefore the total quotient ring of the completion of $\End(A)$ is
Gorenstein. Now $\End(A)$ is an overring of $R$ that is finitely
generated as a module over $R$. Hence there exists a nonzero $x \in
R$ such that $x\End(A) \subseteq R$. It follows that the total
quotient ring $T$ of the completion of $R$ coincides with the
completion of $\End(A)$. Thus $T$ is a Gorenstein ring, and by the
result cited above, $R$ has an $m$-canonical ideal, say $B$. By
Proposition~\ref{criterion} $B$ is isomorphic to $A$, so $A$ is an
$m$-canonical ideal of $R$.
\end{proof}
\begin{remark}
Let $R$ be a Noetherian domain of positive dimension. If $R$ admits
a nonzero $Q$-irreducible ideal, then $R$ is local and $\dim R = 1$.
Every proper $R$-submodule of $Q$ is a fractional $R$-ideal if and
only if the integral closure $\overline{R}$ of $R$ is local (so a
DVR) and is a finitely generated $R$-module. In this case every
proper $R$-submodule of $Q$ that is completely $Q$-irreducible is a
fractional $R$-ideal. There exist, however, other one-dimensional
Noetherian local domains $R$ that admit completely $Q$-irreducible
ideals. By Proposition \ref{same}, $R$ admits a completely
$Q$-irreducible ideal if and only if the total quotient ring of the
completion of $R$ is Gorenstein. In particular, this is true if $R$
is Gorenstein. There exist examples where $R$ is Gorenstein and
$\overline{R}$ is not local, or not a finitely generated $R$-module,
or both. For such an $R$, nonzero principal fractional ideals of
$R$ are completely $Q$-irreducible, and there also exist completely
$Q$-irreducible proper $R$-submodules of $Q$ that are not
fractional $R$-ideals.
\end{remark}
\begin{example} \label{no canonical} {\it A one-dimensional Noetherian
local domain need not possess a nonzero $Q$-irreducible ideal.} As
noted in the proof of Proposition~\ref{same} it suffices to exhibit
a Noetherian local domain $R$ of Krull dimension 1 such that the
total quotient ring of $R$ is not Gorenstein. Such examples can be
found in Proposition 3.1 of \cite{FR} and Theorem 1.26 and Corollary
1.27 of \cite{HRS}. A specific example, based on \cite{HRS} is
obtained as follows. Let $x, y, z$ be algebraically independent over
the field $k$ and let $R = k[x, y, z]_{(x, y, z)}$. Let $f, g \in
xk[[x]]$ be such that $x, f, g$ are algebraically independent over
$k$. Let $u = y - f$ and $v = z - g$. Then $P := (u, v)k[[x, y, z]]$
is a prime ideal of height 2 of the completion $\widehat R = k[[x,
y, z]]$ of $R$ having the property that $P \cap R = (0)$. If $\q$ is
a $P$-primary ideal of $\widehat R$, it follows from \cite[Theorem
1.26]{HRS} that $(\widehat R/\q) \cap k(x,y,z)$ is a one-dimensional
Noetherian local domain having $\widehat R/\q$ as its completion. If
we take $\q = P^2 = (u^2, uv, v^2)\widehat R$, then the total
quotient ring of $\widehat R/\q$ is not Gorenstein.
\end{example}
\begin{remark}
(i) It is an open question whether a completely $Q$-irreducible
ideal of a quasilocal integrally closed domain $R$ is an
$m$-canonical ideal if $\End(A) = R$ \cite[Question 5.5]{Baz}. The
answer is affirmative when $A = R$: this is Theorem 2.3 of
\cite{Baz}.
(ii) In \cite{Baz} Bazzoni relates the question in (i) to a 1968
question of Heinzer \cite{H}: If $R$ is a domain for which every
nonzero ideal is divisorial, is the integral closure of $R$ a
Pr\"ufer domain? To obtain that $R$ has a Pr\"ufer integral closure
the weaker requirement that $R$ be completely $Q$-irreducible is
not sufficient, as we note below in Example~\ref{gilmerhoffmann}.
(iii) Bazzoni constructs in Example 2.11 of \cite{Baz} an example of
a quasilocal domain $R$ such that $R$ is completely $Q$-irreducible
but not $m$-canonical. By Lemma~\ref{Bazzoni} and (i) such a
domain is neither Noetherian nor integrally closed.
\end{remark}
The $D+M$ construction provides a source of interesting examples of
completely $Q$-irreducible ideals. The following example is from
\cite[Remark 5.3]{HHP}, as strengthened in \cite{BHLP}. We recall
it here, since it is relevant to Example~\ref{gilmerhoffmann}.
\begin{example} \label{HHP example} {\rm Let $k \subset F$ be a proper
extension of fields and $V$ be a valuation domain (that is not a
field) of the form $V = F +M$, where $M$ is the maximal ideal of
$V$. Define $R = k +M$. Then $R$ is a quasilocal domain with
maximal ideal $M$. If $U$ is any $k$-subspace of $F$ of codimension
$1$, then the fractional ideal $A = U + M$ is a completely
$Q$-irreducible fractional ideal of $R$ since every $R$-submodule of
the quotient field $Q$ of $R$ that properly contains $A$ contains
also $V$.
It is proved in Theorem 3.2 of \cite{BHLP} that if $F$ is an
algebraic extension of $k$ with $[F:k]$ infinite, then there exist
codimension $1$ subspaces $U$ and $W$ of $F$ such that $U +M$ and
$W+M$ are non-isomorphic completely $Q$-irreducible fractional
ideals of $R$. Thus by Proposition~\ref{criterion} $R$ does not
possess an $m$-canonical ideal. Indeed, it is shown in Theorem 3.1
of \cite{BHLP} that $R$ has an $m$-canonical ideal if and only if
$[F:k]$ is finite. }
\end{example}
We shall see in Theorem~\ref{existence} that it is possible for a
domain $R$ to possess a completely $Q$-irreducible ideal $A$ and not
be quasilocal. It follows from this result that $\End(A)$ need not
equal $R$. However, in this situation, $R$ is not quasilocal. The
next example shows that even when $R$ is quasilocal, it is possible
for a completely $Q$-irreducible ideal to have an endomorphism ring
not equal to $R$.
Gilmer and Hoffmann in \cite{GH} establish the existence of an
integral domain $R$ that admits a unique minimal overring, but has
the property that the integral closure of $R$ is not Pr\"ufer. In
Example~\ref{gilmerhoffmann} we modify this example to establish the
existence of an integral domain $R$ that has infinitely many
distinct fractional overrings $R_t$, $t \in \mathbb N$, such that
each $R_t$ is completely $Q$-irreducible as a fractional ideal of
$R$. Since $R_t$ is a fractional overring of $R$, $\End(R_t) = R_t$.
We remark that Bazzoni in \cite[Section 4]{Baz} has abstracted and
greatly generalized the example of \cite{GH}.
\begin{example} \label{gilmerhoffmann} Let $K$ be a field and let
$L = K((X))$ be the quotient field of the formal power series ring
$K[[X]]$. Every nonzero element of $L$ has a unique expression as a
Laurent series $\sum_{n \ge k}a_nX^n$, where $k$ is an integer, the
$a_n \in K$ and $a_k \ne 0$. Let $Y$ be an indeterminate over $L$
and let $V = L[[Y]]$ denote the formal power series ring in $Y$ over
the field $L$. Thus $V$ is a rank-one discrete valuation domain
(DVR) of the form $L + M$, where $M = YL[[Y]]$ is the maximal ideal
of $V$. Let $R = K + M^2$. It is well-known and readily established
that $R$ is a one-dimensional quasilocal domain with maximal ideal
$M^2$. For $t$ a positive integer, let $W_t$ be the set of all
elements $f \in K((X))$ such that $f = 0$ or the coefficient of
$X^{-t}$ in the Laurent expansion of $f$ is $0$. Notice that $W_t$
is a $K$-subspace of $L$ and $L = W_t \oplus KX^{-t}$ as $K$ vector
spaces. Let $R_t = K + W_tY + M^2$. Then $R_t$ is an overring of $R$
and $Y^2R_t \subseteq M^2$, so $R_t$ is a fractional ideal of $R$.
We show that $R_t$ is completely $Q$ irreducible as a fractional
$R$-ideal by proving that $X^{-t}Y$ is in every fractional ideal of
$R$ that properly contains $R_t$. Let $f \in Q \setminus R_t$. Since
$Q = L((Y))$, there exists an integer $j$ such that $f = \sum_{n \ge
j}b_nY^n$, where each $b_n \in L$ and $b_j \ne 0$. Notice that $f
\not\in R_t$ implies $j \le 1$. Since $L = K((X))$, there exists an
integer $k$ such that $b_j = \sum_{n \ge k}a_nX^n$, where each $a_n
\in K$ and $a_k \ne 0$. Since $a_k$ is a unit of $R$, the fractional
ideal $R_t + Rf = R_t + a_k^{-1}f$, so we may assume that $a_k = 1$.
If $j < 0$, then $X^{-k-t}Y^{1-j} \in M^2 \subset R$ and
$X^{-k-t}Y^{1-j}f = X^{-t}Y + \alpha Y + \beta Y^2$, where $\alpha
\in K[[X]]$ and $\beta \in V = L[[Y]]$. Since $\alpha \in W_t$,
$\alpha Y + \beta Y^2 \in R_t$. Hence $X^{-t}Y \in R_t + Rf$ if $j <
0$. If $j = 0$ and $k \ne 0$, then $X^{-k-t}Y^{1-j} \in W_tY \subset
R_t$ and $X^{-k-t}Yf = X^{-t}Y + \alpha Y + \beta Y^2$, where
$\alpha Y + \beta Y^2 \in R_t$, so $X^{-t}Y \in R_t + Rf$ in this
case. If $j = 0$ and $k = 0$, replace $f$ by $f-1$ to obtain a
situation where $k
>0$ and $j \ge 0$. If $j = 1$, then $f \not\in R_t$ implies $b_1 \not\in
W_t$. Hence $b_1 = c + dX^{-t}$, where $c \in W_t$ and $0 \ne d \in
K$. Hence $f - cY = dX^{-t}Y + \alpha Y^2$, where $\alpha \in
L[[Y]]$. Therefore also in this case $X^{-t}Y \in R_t + Rf$. We
conclude that $R_t$ is completely $Q$-irreducible.
\end{example}
In Example~\ref{gilmerhoffmann} the completely $Q$-irreducible
fractional ideals that are constructed have endomorphism rings
integral over the base ring. In Example \ref{valuation example} we
exhibit a Noetherian local domain $R$ and a completely
$Q$-irreducible $R$-submodule $A$ of $Q$ such that $\End(A)$ is not
integral over $R$. We first give a partial characterization of when
valuation overrings are (completely) $Q$-irreducible.
\begin{theorem} \label{divisible} Let $V$ be a valuation overring of the
domain $R$. Then the following two statements hold for $V$.
\begin{itemize}
\item[(i)] If $V/R$ is a
divisible $R$-module, then $V$ is a $Q$-irreducible $R$-submodule of
$Q$. Moreover, $V$ has a principal maximal ideal if and only if $V$
is a completely $Q$-irreducible $R$-submodule of $Q$.
\item[(ii)] Suppose that $V$ is a DVR. Then $V$
is a completely $Q$-irreducible $R$-submodule of $Q$ if and only if
$V/R$ is a divisible $R$-module.
\end{itemize}
\end{theorem}
\begin{proof} (i) The assumption that $V/R$ is divisible implies that every
$R$-submodule of $Q$ containing $V$ is also a $V$-submodule of $Q$.
For if $x \not \in V$, then $1/x \in V$. Since $V/R$ is divisible,
$V = (1/x)V + R$. Thus $V + xR =xV$. Hence $V + xR$ is a
$V$-submodule of $Q$. This implies that any $R$-submodule of $Q$
containing $V$ is a $V$-module. Since $V$ is $Q$-irreducible as a
$V$-submodule of $Q$, it follows that $V$ is $Q$-irreducible as an
$R$-submodule of $Q$.
If the valuation domain $V$ has principal maximal ideal, then, by
Theorem~\ref{1.2}, $V$ is a completely $Q$-irreducible
$V$-submodule of $Q$. Therefore $V$ is a completely $Q$-irreducible
$R$-submodule of $Q$.
Conversely, if $V$ is a completely $Q$-irreducible $R$-submodule of
$Q$, then necessarily $V$ is a completely $Q$-irreducible
$V$-submodule of $Q$. By Corollary~\ref{valuation criterion} every
principal ideal of $V$ is $Q$-irreducible. Hence by
Theorem~\ref{1.2} $V$ has a principal maximal ideal.
(ii) Suppose that $V$ is a completely $Q$-irreducible $R$-submodule
of $Q$. Let $0 \ne x \in R$. We claim that $V = R + xV$. Consider
the ideal $C = (R+xV :_Q V)$ of $V$. Since $V$ is a DVR, $C$ is
isomorphic to $V$. Also, $C = \cap_{y \in V} y^{-1}(R+xV)$, so
since $C$ is completely $Q$-irreducible, $C$ is isomorphic to
$R+xV$. Thus $V$ and $R+xV$ are isomorphic as $R$-modules, and since
these two modules are rings, this forces $R+xV = V$, proving that
$V/R$ is divisible. The converse follows from (i).
\end{proof}
\begin{remark}\label{dvr} Let $V$ be a DVR overring of the integral domain $R$
and let $P$ be the center of $V$ on $R$. Necessary and sufficient
conditions in order that $V/R$ be a divisible $R$-module are that
(i) $PV$ is the maximal ideal of $V$, and (ii) the canonical
inclusion map of $R/P \hookrightarrow V/PV$ is an isomorphism. By
Theorem \ref{divisible}(ii), these conditions are also necessary and
sufficient in order that $V$ be completely $Q$-irreducible as an
$R$-submodule of $Q$.
\end{remark}
\begin{example} \label{valuation example}
Let $K$ be a field, and let $X$ and $Y$ be indeterminates for $K$.
Define $R = K[X,Y]_{(X,Y)}$.
We construct a valuation overring $V$ of $R$ such that $V$ is a
completely $Q$-irreducible $R$-submodule of $Q$. Let $g(X) \in
XK[[X]]$ be such that $X$ and $g(X)$ are algebraically independent
over $K$. Define a mapping $v$ on $K[X,Y] \setminus \{0\}$ by $v(\:
f(X,Y) \:) = $ smallest exponent of $X$ appearing in the power
series $f(X, g(X))$. Then $v$ extends to a rank-one discrete
valuation on $K(X,Y)$ centered on $(X,Y)R$ and having residue field
$K$. (More details regarding this construction can be found in
Chapter VI, Section 15, of \cite{ZS}.) Since the valuation ring $V$
of $v$ has maximal ideal $(X,Y)V$ and residue field $V/(X,Y)V = K$,
it follows that $V = R + (X,Y)^kV$ for all $k>0$. Since $V$ is a
DVR, $V = R+fV$ for every nonzero $f \in R$. Hence $V/R$ is a
divisible $R$-module. By Theorem~\ref{divisible}, $V$ is a
completely $Q$-irreducible $R$-submodule of $Q$.
\end{example}
\section{$Q$-irreducibility and injective modules}
Let $N$ be a submodule of the \tf\ $R$-module $M$. $N$ is said
to be an {\it RD-submodule} (relatively divisible) if $rN = N \cap
rM$ for all $r \in R$. An $R$-module $X$ is called {\it
RD-injective} if every homomorphism from an RD-submodule $N$ of any
$R$-module $M$ can be extended to a homomorphism $M \to X$. Every
$R$-module $M$ can be embedded as an RD-submodule in an RD-injective
module, and among such RD-injectives there is a minimal one, unique
up to isomorphisms over $M$, called the {\it RD-injective hull}
$\widehat M$ of $M$. If $M$ is torsion-free, then so are both
$\widehat M$ and $\widehat M/M$.
The $R$-topology of an $R$-module $M$ is defined by declaring the
submodules $rM$ for all $0 \ne r \in R$ as a subbase of open
neighborhoods of $0$. If $M$ is torsion-free, then it is Hausdorff
in the $R$-topology if and only if it is reduced (i.e. it has no
divisible submodules $\ne 0$). $M$ is $R$-complete if it is complete
(Hausdorff) in the $R$-topology. If $M$ is reduced torsion-free,
then it is an RD-submodule of its $R$-completion $\widetilde M$.
Observe that for a prime ideal $P$ the $R$-completion and
$R_P$-completion of $R_P$ are identical. The $R$-completion
$\widetilde M$ of a torsion-free $R$-module $M$ is an RD-submodule
of the RD-injective hull $\widehat M$ such that $\widehat
M/\widetilde M$ is reduced torsion-free.
\begin{lemma} For a proper $R$-submodule $A$ of $Q$ the
following conditions are equivalent:
{\rm (i)} $A$ is $Q$-irreducible;
{\rm (ii)} the injective hull $E(Q/A)$ of the $R$-module $Q/A$ is
indecomposable;
{\rm (iii)} the RD-injective hull $\widehat A$ of $A$ is
indecomposable.
\end{lemma}
\begin{proof} (i) $\Leftrightarrow$ (ii) An injective module is
indecomposable exactly if it is uniform.
(ii) $\Leftrightarrow$ (iii) This equivalence is a consequence of
Matlis' category equivalence between the category of $h$-divisible
torsion $R$-modules $T$ and the category of reduced $R$-complete
torsion-free $R$-modules $M$, given by the correspondences
$$ T \mapsto \Hom_R(Q/R, T) \quad {\rm and} \quad M \mapsto Q/R
\otimes_R M$$ which are inverse to each other. Under the category
equivalence, $Q/A$ and the $R$-completion $\widetilde A$ of $A$
correspond to each other, and so do the injective hull of $Q/A$ and
the RD-injective hull $\widehat A$ of $A$. As equivalence preserves
direct decompositions, the claim is evident.
\end {proof}
Let $I$ be an ideal of the ring $R$. It is well known that if
$E(R/I)$ is indecomposable, then $I$ is irreducible. Note that
$E(R/I)$ can also be written as $E(Q/A)$ for a $Q$-irreducible
$R$-submodule $A$ of $Q$. In fact, $E(R/I)$ is a summand of
$E(Q/I)$, so we can write: $E(Q/I) = E(R/I) \oplus E$ for an
injective $R$-module $E$. The kernel of the projection of $Q/I$ into
the first summand is of the form $A/I$ for a $Q$-irreducible
submodule $A$ of $Q$, and then $E(R/I) = E(Q/A)$.
Conversely, if $A$ is a $Q$-irreducible proper submodule of $Q$,
and $x \in Q \setminus A$, then the set $I = \{r \in R \ | \ rx \in
A\}$ is a primal ideal of $R$ such that $E(Q/A) = E(R/I)$. The
adjoint prime $P$ of the primal ideal $I$ may be called the {\it
prime associated to} $A$: this is uniquely determined by $A$, though
$I$ depends on the choice of $x$.
\begin{lemma} Every indecomposable injective $R$-module $E$
can be written as $E(Q/A)$ for a $Q$-irreducible $R$-submodule of
$A$ of $Q$. Moreover, there is a unique prime ideal $P$ of $R$ such
that $E(Q/A) \cong E(R/I)$ for a $P$-primal ideal $I$ of $R$, and
$P$ is a maximal ideal whenever $A$ is completely $Q$-irreducible.
\qed
\end{lemma}
We can add that $I$ can be replaced by $P$ if and only if $P$ is a
strong Bourbaki associated prime for $I$. Indeed, $E(R/I) = E(R/P)$
if and only if there are elements $r \in R \setminus I$ and $s \in R
\setminus P$ such that $(I:_Rr) = (P:_Rs)$. Since $(P:_Rs) = P$,
this is equivalent to $P = (I:_Rr)$, that is, $P$ is a strong
Bourbaki associated prime of $I$.
It is clear that every proper submodule of $Q$ is the intersection
of $Q$-irreducible submodules. This intersection is in general
redundant. A criterion for irredundancy is as follows.
\begin{proposition} \label{3.3} A proper submodule $A$ of $Q$ admits an
irredundant representation as an intersection of $Q$-irreducible
submodules if and only if $E(Q/A)$ is an interdirect sum of
indecomposable injectives.
\end{proposition}
\begin{proof} Suppose $A= \bigcap_{i \in I} A_i$ is an
irredundant intersection with $Q$-irreducible submodules $A_i$ of
$Q$. Setting $B_i = \bigcap_{j \in I, j \ne i} A_j$, it is clear
that the submodule generated by $B_i/A \ (i \in I)$ in $Q/A$ is
their direct sum. Hence $E(Q/A)$ contains the direct sum of the
injective hulls $E(Q/A_i) \cong E(B_i/A)$. As $Q/A$ embeds in the
direct product of the $Q/A_i$, $E(Q/A)$ embeds in the direct product
of the $E(Q/A_i)$. Thus $E(Q/A)$ is an interdirect sum of the
$E(Q/A_i)$ (these are evidently indecomposable).
Conversely, suppose $E(Q/A)$ is an interdirect sum of indecomposable
injectives $E_i \ (i \in I)$. Since $E_i$ is a uniform module, we
have $(Q/A) \cap E_i \ne 0$ for each $i \in I$. Clearly, $A_i$
(defined by $A_i/A = (Q/A) \cap \prod_{j \in I, j \ne i} E_j$) is a
submodule of $Q$, which is maximal disjoint from $E_i$, so
$Q$-irreducible. The intersection $A = \bigcap_{i \in I} A_i$ is
evidently irredundant.
\end{proof}
\section{Irredundant decompositions and semi-artinian modules}
In this section we examine domains for which every nonzero submodule
of $Q$ is an irredundant intersection of completely irreducible
submodules of $Q$. Such domains are closely related to the class of
almost perfect rings.
A ring $R$ is {\it perfect} if every $R$-module has a projective
cover; equivalently, (since our rings are assumed to be commutative)
$R$ satisfies the descending chain condition on principal ideals
\cite{Ba}. In their study \cite{BS1} of strongly flat covers of
modules, Bazzoni and Salce introduced the class of {\it almost
perfect domains}, consisting of those domains $R$ for which every
proper homomorphic image of $R$ is perfect. Every Noetherian domain
of Krull dimension 1 is almost perfect, but the class of almost
perfect domains includes also non-Noetherian non-integrally closed
domains-- see for example Section 3 of \cite{BS}.
There are a number of applications of perfect and almost perfect
domains in the literature, most of which are motivated by the rich
module theory for these classes of rings \cite{BS,BS1,EJ}. In this
section we emphasize different features of the module and ideal
theory of almost perfect domains, namely, the close connection with
irredundant decompositions into completely irreducible submodules.
If $R$ is a ring, then an $R$-module $A$ is (almost) {\it
semi-artinian} if every (proper) homomorphic image of $A$ has a
nonzero socle. In a semi-artinian module every irreducible
submodule is completely irreducible (see for example \cite[Lemma
2.4]{DC}), but this property does not characterize semi-artinian
modules \cite[Example 1.7]{FHO3}.
As indicated by Lemma~\ref{DC} below, the semi-artinian property is
both necessary and sufficient for irredundant decompositions into
completely irreducible submodules. Bazzoni and Salce note in
\cite{BS} that:
\begin{center}
$R$ almost perfect $\Rightarrow Q/R$ semi-artinian $\Rightarrow$ $R$
locally almost perfect.
\end{center}
They show also that $R$ is almost perfect if and only if $R$ is
$h$-local and every localization of $R$ at a maximal ideal is almost
perfect. In general, the first implication cannot be reversed
\cite[Example 2.1]{BS}. Smith asserts in \cite{Sm} that the
converse of the second implication is always true, but as noted in
\cite[p. 288]{BS} the proof is incorrect. Thus Bazzoni and Salce
raise the question in \cite[p. 288]{BS} of whether the converse is
always true; namely, if $R$ is locally almost perfect, is $Q/R$
necessarily semi-artinian?
We give an example in this section to show that the answer is
negative, and we characterize in Theorem~\ref{semi-artinian}(vi) and
(vii) precisely when a locally almost perfect domain $R$ has $Q/R$
semi-artinian. We collect also in this theorem a number of
different characterizations of domains $R$ for which $Q/R$ is
semi-artinian.
The following lemma is a special case of a lattice theoretic result
\cite[Theorem 4.1]{DC}. A number of other properties of irredundant
intersections of completely irreducible submodules of semi-artinian
modules can be deduced from this same article.
\begin{lemma} \label{DC} {\em (Dilworth-Crawley \cite{DC})} Let $R$ be a
ring and $A$ be an $R$-module. Then $A$ is (almost) semi-artinian
if and only if every (nonzero) submodule of $A$ is an irredundant
intersection of completely irreducible submodules of $A$.\qed
%
%\item[(ii)]
% $A$ is a distributive (almost) semi-artinian module if
%and only if every (nonzero) submodule of $A$ is a unique
%irredundant intersection of completely irreducible
%submodules of $A$.
%%
%
%\end{itemize}
\end{lemma}
% and
%statement (ii) follows from Theorem 6.1 and its second corollary in
%\cite{DC}.
In order to formulate (vii) of the next theorem, we recall that a
topological space $X$ is {\it scattered} if every nonempty subspace
of $X$ contains an isolated point.
\begin{theorem} \label{semi-artinian} The following
statements are equivalent for a domain $R$ with quotient field $Q$.
\begin{itemize}
\item[(i)] $Q/R$ is semi-artinian.
\item[(ii)] Every nonzero torsion module is semi-artinian.
\item[(iii)] $R$ is almost semi-artinian.
\item[(iv)] $Q$ is almost semi-artinian.
\item[(v)] For each nonzero proper ideal $A$ of $R$, there is
a maximal ideal that is a strong Bourbaki associated prime of $A$.
\item[(vi)] $R$ is locally almost perfect and for each nonzero
radical ideal $J$ of $R$, there is a maximal ideal of $R/J$ that is
principal.
\item[(vii)] $R$ is locally almost perfect and for each
nonzero radical ideal $J$ of $R$, $\Spec(R/J)$ is scattered.
\item[(viii)] For each torsion $R$-module $T$, every submodule
of $T$ is an irredundant intersection of completely irreducible
submodules of $T$.
\item[(ix)] For each torsion-free module $A$, every nonzero
submodule of $A$ is an irredundant intersection of completely
irreducible submodules of $QA$.
\item[(x)] Each nonzero submodule of $Q$ is an
irredundant intersection of completely irreducible submodules of
$Q$.
\item[(xi)] Each nonzero ideal of $R$ is an irredundant
intersection of completely irreducible submodules of $Q$.
\item[(xii)] Each nonzero ideal of $R$ is an irredundant
intersection of completely irreducible ideals.
\end{itemize}
\end{theorem}
\begin{proof} The equivalence of (i)-(iv) can be found in {\em
\cite[Theorem 4.4.1]{EJ}}. It follows then from Lemma~\ref{DC} that
(i) - (iv) are equivalent to (viii), (ix), (x) and (xii). The
equivalence of (vi) and (vii) is a consequence of Corollary 2.10 in
\cite{HO}. To complete the proof it is enough to show that (v) and
(vi) are equivalent to (i) and that (xi) is equivalent to (iii).
(i) $\Rightarrow$ (vi) Since $Q/R$ is semi-artinian, $R$ is locally
almost perfect. We have already established that (i) is equivalent
to (xii). That (xii) implies (vi) is a consequence of Corollary
2.10 of \cite{HO}.
(vi) $\Rightarrow$ (v) Suppose that $A$ is a proper nonzero ideal
of $R$. Since for every nonzero radical ideal $J$ of $R$, $R/J$ has
a maximal ideal of $R$ that is principal, every nonzero ideal of
$R$ has a Zariski-Samuel associated prime $M$ \cite[Theorem
2.8]{HO}; that is, $M = \sqrt{A:_Rx}$ for some $x \in R \setminus
A$. Since $R$ has Krull dimension $1$, $M$ is a maximal ideal of
$R$. By (vi) $R_M/(A_M:_{R_M} x)$ contains a simple $R_M$-module.
Thus there exists $y \in R \setminus (A_M:_{R_M}x)$ such that $MR_M
= (A_M:_{R_M}x):_{R_M}y = A_M:_{R_M}xy$. Since $A:_Rx \subseteq
A:_Rxy \subseteq M$ and $ \sqrt{A:_Rx} = M$, it follows that $M$ is
the only maximal ideal of $R$ containing $A:_Rxy$. Thus since
$A_M:_{R_M}xy = MR_M$, it is the case that $A:_Rxy = M$.
(v) $\Rightarrow$ (iii) If $A$ is a proper nonzero ideal of $R$ and
$M$ is a strong Bourbaki associated prime of $A$, then $A:_RM \ne
A$, so $R/A$ contains a simple $R$-module.
(iii) $\Rightarrow$ (xi) Since (iii) is equivalent to (x), it is
sufficient to note that (x) implies (xi).
(xi) $\Rightarrow$ (iii) Let $A$ be a proper nonzero ideal of $R$.
Then there exists a completely irreducible submodule $C$ of $Q$ such
that $A = C \cap D$ is an irredundant intersection for some
submodule $D$ of $Q$. Let $x \in D \setminus C$. Now $(C:_Q M)/C$
is the essential socle of $Q/C$, so if $y \in (C:_QM) \setminus C$,
then $y \in xR +C$. Thus $rx \in yR + C$ for some $r\in R$ such
that $rx \not \in C$. Consequently, $rxM \subseteq C$, and since $x
\in D$, it is the case that $rxM \subseteq A$ with $rx \not \in A$.
Thus $rx + A$ is a nonzero member of the socle of $R/A$. Statement
(iii) now follows.
\end{proof}
An integral domain $R$ is {\it almost Dedekind} if for each maximal
ideal $M$ of $R$, $R_M$ is a DVR. In \cite[Theorem 3.2]{O2} it is
shown that if $X$ is a Boolean (i.e. compact Hausdorff totally
disconnected) topological space, then there exists an almost
Dedekind domain $R$ with nonzero Jacobson radical such that
$\Max(R)$ is homeomorphic to $X$. Thus we obtain the following
corollary to Theorem~\ref{semi-artinian}(vii).
\begin{corollary} The following statements are equivalent for a
Boolean topological space $X$.
\begin{itemize}
\item[(i)] $X$ is a scattered space.
\item[(ii)] There exists a domain $R$ with nonzero Jacobson
radical such that $Q/R$ is semi-artinian and $\Max(R)$ is
homeomorphic to $X$. \qed
\end{itemize}
\end{corollary}
\begin{remark} In Example 2.1 of \cite{BS} an example is given of
a domain $R$ for which $Q/R$ is semi-artinian but $R$ is not almost
perfect. Using the corollary, we may obtain many such examples.
Indeed, let $X$ be an infinite Boolean scattered space. Then there
exists an almost Dedekind domain $R$ such that $\Max(R)$ is
homeomorphic to $X$ and $R$ is not a Dedekind domain. In
particular, $R$ is not $h$-local, since an $h$-local almost Dedekind
domain is Dedekind. Thus $Q/R$ is semi-artinian but $R$ is not
almost perfect.
\end{remark}
It is not difficult to exhibit infinite Boolean scattered spaces.
For example, let $X$ be a well-ordered set such that not every
element has an immediate successor. Then $X$ is a scattered space
with respect to the order topology on $X$, and the isolated points
of $X$ are precisely the smallest element of $X$ and the immediate
successors of elements in $X$ (see \cite[Example 17.3, p. 272]{Ko}).
In \cite{BS} Bazzoni and Salce raise the question of whether every
locally almost perfect domain $R$ has the property that $Q/R$ is
semi-artinian. Using Theorem~\ref{semi-artinian} we give an example
to show that this is not the case.
\begin{example} \label{semi-artinian example} Let $X$ be a Boolean space
that is not scattered (e.g. let $X$ be the Stone-\^Cech
compactification of the set of natural numbers with the discrete
topology). As noted above, there exists an almost Dedekind domain
$R$ such that $\Max(R)$ is homeomorphic to $X$ and $R$ has nonzero
Jacobson radical. Then $R$ is locally almost perfect but by
Theorem~\ref{semi-artinian}(vii) $Q/R$ is not semi-artinian.
\end{example}
In \cite{FHO} it is shown that every irreducible ideal of an almost
perfect domain is primary. A similar argument yields:
\begin{lemma}
\label{primary} If $R$ is a locally almost perfect domain, then
every proper irreducible ideal is primary. \end{lemma}
\begin{proof} Let $A$ be a nonzero
irreducible ideal. Then $A$ is primary if and only if any strictly
ascending chain of the form $A \subset A:_Rb_1 \subset A:_Rb_1b_2
\subset \cdots \subset A:_Rb_1b_2 \cdots b_n \subseteq \cdots$ for
$b_1,b_2,\ldots,b_n,\ldots \in R$ terminates \cite{F}. Suppose
there is an infinite such strictly ascending chain, and let $M$ be
a maximal ideal containing every residual $A:_Rb_1b_2 \cdots b_n$.
Since $R_M$ is an almost perfect domain, $R_M/A_M$ has the
descending chain condition for principal ideals. Thus there exists
$n>0$ such that $A_M:_Rb_1b_2 \cdots b_n = A_M:_Rb_1b_2 \cdots
b_{n+1}$. If $r \in A:_Rb_1b_2 \cdots b_{n+1}$, then there exists $x
\in R \setminus M$ such that $xr \in A:_Rb_1b_2 \ldots b_{n}$. An
irreducible ideal of a domain of Krull dimension 1 is contained in a
unique maximal ideal (see for example \cite[Lemma 2.7]{HO}), so
necessarily $A$ is $M$-primal. Thus $x$ is prime to $A$ and it
follows that $r \in A:_Rb_1b_2 \cdots b_n$. However, this forces
$A:_Rb_1b_2 \cdots b_n = A:_Rb_1b_2 \cdots b_{n+1}$, contrary to
assumption. Thus $A$ is primary.
\end{proof}
\begin{theorem} If $R$ is
an almost semi-artinian domain, then every ideal of $R$ is an
irredundant intersection of primary completely irreducible ideals.
\end{theorem}
\begin{proof} The theorem follows from Lemma~\ref{primary} and
Theorem~\ref{semi-artinian}(xii).
\end{proof}
We characterize next the domains $R$ for which every nonzero
submodule of $Q$ can be represented uniquely as an irredundant
intersection of completely $Q$-irreducible $R$-submodules.
An $R$-module $B$ is {\it distributive} if for all submodules
$A_1,A_2$ and $A_3$ of $B$, $(A_1 \cap A_2) + A_3 = (A_1 + A_3) \cap
(A_2 \cap A_3)$. The module $B$ is {\it uniserial} if its
submodules are linearly ordered by inclusion. An $R$-module is
distributive if and only if for all maximal ideals $M$ of $R$, $B_M$
is a uniserial $R_M$-module \cite{LS}.
\begin{lemma} Let $R$ be a ring and $B$ be an $R$-module. Let $\AA$ be
the set of all $R$-submodules of $B$ that are finite intersections
of completely irreducible submodules of $B$. Then the module $B$ is
distributive if and only if for each $A \in \AA$, the representation
of $A$ as an irredundant intersection of completely irreducible
submodules of $B$ is unique.
Furthermore, if a submodule $B$ of a distributive $R$-module can be
represented as a (possibly infinite) irredundant intersection of
irreducible submodules, then this representation is unique.
\label{distributive}\end{lemma}
\begin{proof} Suppose that each representation of $A \in \AA$ as an
irredundant intersection of completely $Q$-irreducible submodules of
$B$ is unique. Then this property holds also for the
$R_M$-submodules of $B_M$ for each maximal ideal $M$ of $R$. Thus
by the remark preceding the theorem, to prove that $B$ is
distributive it suffices to show that $B_M$ is a uniserial
$R_M$-module. Thus we may reduce to the case where $R$ is a
quasilocal domain with maximal ideal $M$ and show that $B$ is a
uniserial $R$-module. If $B$ is not uniserial, there exist
incomparable completely $B$-irreducible submodules $C_1$ and $C_2$
of $B$. Define $A = C_1 \cap C_2$, $C_1^*= C_1:_B M$ and $C_2^* =
C_2:_B M$. By Lemma~\ref{characterization}, $C_1 \subset C_1^*$ and
$C_2 \subset C_2^*$. Now there exist $x \in (C_1^* \cap C_2)
\setminus A$ and $y \in (C_1 \cap C_2^*) \setminus A$. (This
follows from the irreduciblity of the $C_i$ and the modularity of
the lattice of submodules of $Q$; see for example Noether
\cite[Hilfssatz II]{No}.) We have Soc $B/A = (A + xR + yR)/A$ is a
2-dimensional vector space over $R/M$ and $x+y \not \in C_1 \cup
C_3$. Let $C_3$ be an $R$-submodule of $B$ containing $A + (x+y)R$
that is maximal with respect to $x \not \in C_3$. Then $C_3$ is
completely $B$-irreducible, distinct from $C_1$ and $C_2$ and $A =
C_1 \cap C_3$. Yet $A \in \AA$, so this contradiction means that
the submodules of $B$ are comparable. The converse and the last
assertion follow from the fact that in a complete distributive
lattice, an irredundant meet decomposition into meet-irreducible
elements is unique \cite[pp. 5-6]{D} .
\end{proof}
\begin{theorem} \label{uniqueness}
The following are equivalent for a domain $R$ with quotient field
$Q$.
\begin{itemize}
% \item[(ii)]
%Every nonzero ideal of $R$ is an irredundant intersection $A = \bigcap_i
%M_i^{e_i}$ of powers of maximal ideals $M_i$ of $R$.
\item[(i)] Every
nonzero submodule of $Q$ can be represented uniquely as an
irredundant intersection of completely irreducible submodules of
$Q$.
\item[(ii)] Every nonzero ideal of $R$ can be represented uniquely as an
irredundant intersection of completely irreducible submodules of
$Q$.
\item[(iii)] Every nonzero
proper ideal of $R$ can be represented uniquely as an irredundant
intersection of completely irreducible ideals of $R$.
\item[(iv)]
$R$ is an almost Dedekind domain such that for each radical ideal $J$ of
$R$, $R/J$ has a finitely generated maximal ideal.
\item[(v)] $R$ is an almost semi-artinian Pr\"ufer domain.
\end{itemize} \end{theorem}
\begin{proof}
(i) $\Rightarrow$ (ii) This is clear.
(ii) $\Rightarrow$ (iii) This follows from
Theorem~\ref{semi-artinian} and Lemma~\ref{distributive}.
(iii) $\Leftrightarrow$ (iv) This is proved in \cite[Corollaries
2.10 and 3.9]{HO}.
(iv) $\Rightarrow$ (v) This follows from
Theorem~\ref{semi-artinian}.
(v) $\Rightarrow$ (i) Since $R$ is a Pr\"ufer domain, $Q$ is a
distributive $R$-module. Thus (i) is a consequence of
Theorem~\ref{semi-artinian} and Lemma~\ref{distributive}.
\end{proof}
\section{Pr\"ufer domains}
In light of Theorem~\ref{uniqueness} it is of interest to describe
the completely irreducible submodules of the quotient field of a
Pr\"ufer domain. We do this in Theorem~\ref{Prufer case}. We need
for the proof of this theorem a description of the completely
irreducible ideals of a Pr\"ufer domain. This is a special case of
Theorem 5.3 in \cite{FHO3}: {\it A proper ideal $A$ of a Pr\"ufer
domain is completely irreducible if and only if $A = MB_{(M)}$ for
some maximal ideal $M$ and nonzero principal ideal $B$ of $R$.}
\begin{lemma}\label{flat} Let $R$ be an integral domain and
let $A$ be a flat $R$-submodule of $Q$. If $A$ is $Q$-irreducible,
then $\End(A)$ is quasilocal and is $Q$-irreducible as an
$R$-submodule of $Q$. \end{lemma}
\begin{proof} Since $A$ is a flat $R$-submodule of $Q$, it is the case that
$A(B \cap C) = AB \cap AC$ for all $R$-submodules $B$ and $C$ of $Q$
\cite[I.2, Proposition 6]{B}.
Suppose now that $\End(A) = B \cap C$ for $R$-submodules
$B$ and $C$ of $Q$. Then $A = A\End(A) = A(B \cap C) = AB \cap AC$,
and since $A$ is $Q$-irreducible, $A = AB$ or $A = AC$. Thus $B
\subseteq \End(A)$ or $C \subseteq \End(A)$, so that $\End(A)$ is
$Q$-irreducible. Finally, if $\End(A)$ is not quasilocal, then
there exist two nonzero non-units $x,y \in \End(A)$ such that
$x\End(A) + y\End(A) = \End(A)$. Thus $xy\End(A) = x\End(A) \cap y
\End(A)$, so $\End(A) = y^{-1}\End(A) \cap x^{-1}\End(A)$. Since
$\End(A)$ is $Q$-irreducible, this forces $x$ or $y$ to be a unit, a
contradiction.
\end{proof}
\begin{theorem} \label{Prufer case} Let $R$ be a Pr\"ufer domain. Then
\begin{itemize}
\item[(i)] the $Q$-irreducible $R$-submodules of $Q$ are precisely the
$R$-submodules of $Q$ that are also $R_P$-submodules for some prime
ideal $P$, and
\item[(ii)] the completely
$Q$-irreducible proper $R$-submodules of $Q$ are precisely the
$R$-submodules of $Q$ that are isomorphic to $MR_M$ for some maximal
ideal $M$ of $R$.
\end{itemize}
Conversely, either of statements (i) and (ii) characterizes among
the class of domains those that are Pr\"ufer. \end{theorem}
\begin{proof}
(i) If $A$ is $Q$-irreducible submodule of $Q$, then by
Lemma~\ref{flat} $\End(A)$ is quasilocal. Since $R$ is a Pr\"ufer
domain, there is a prime ideal $P$ of $R$ such that $R_P = \End(A)$
and $A$ is an $R_P$-submodule of $Q$.
Conversely, if $P$ is a prime
ideal of $R$, $A$ is an $R_P$-submodule of $Q$ and $A = B \cap C$
for some $R$-submodules $B$ and $C$ of $Q$, then $A = BR_{P} \cap
CR_P$. Since $R_P$ is a valuation domain $A = BR_P$ or $A = CR_P$.
Thus $A = B$ or $A = C$ and $A$ is $Q$-irreducible.
(ii) Suppose that $R$ is a Pr\"ufer domain and let $A$ be a
completely $Q$-irreducible proper $R$-submodule of $Q$. Then by
Proposition~\ref{characterization}, $A = AR_M$ for some maximal
ideal $M$ of $R$ and $A$ is a completely $Q$-irreducible submodule
of $R_M$. Since $R_M$ is a valuation domain, there exists $q \in Q$
such that $qA \subseteq R_M$. Moreover, $qA$ is a completely
irreducible ideal of $R_M$, so by Lemma 5.1 of \cite{FHO3}, $qA =
xMR_M$ for some $x \in R_M$. Hence $A$ is isomorphic to $MR_M$.
On the other hand, if $A$ is an $R$-submodule of the form $xMR_M$
for some $x \in Q$, then $A$ is a completely irreducible fractional
ideal of the valuation domain $R_M$ \cite[Lemma 5.1]{FHO3}. Since
$R_M$ is a valuation domain, $A$ is a completely $Q$-irreducible of
$R_M$. Thus by Proposition~\ref{characterization}, $A$ is a
completely $Q$-irreducible $R$-submodule of $Q$.
It is easy to see that statement (i) characterizes Pr\"ufer domains.
For let $M$ is a maximal ideal of $R$, and observe that since by (i)
the ideals of $R_M$ are irreducible, they are linearly ordered.
Finally, suppose that each completely $Q$-irreducible proper
$R$-submodule of $Q$ is isomorphic for some maximal ideal $M$ to the
maximal ideal of $R_M$. Let $M$ be a maximal ideal of $R$. Then by
assumption $rMR_M$ is an irreducible ideal of $R_M$ for all $r \in
R$. By Lemma 5.1 of \cite{FHO3}, $R_M$ must be a valuation domain.
Thus $R$ is a Pr\"ufer domain since every localization of $R$ at a
maximal ideal is a valuation domain.
\end{proof}
In Theorem \ref{existence}, we describe the Pr\"ufer domains that
have a completely $Q$-irreducible ideal.
\begin{theorem} \label{existence}The following statements are
equivalent for a Pr\"ufer domain $R$.
\begin{itemize}
\item[(i)] There exists a completely $Q$-irreducible ideal of $R$.
\item[(ii)] There exists a nonzero $Q$-irreducible ideal of $R$.
\item[(iii)] There is a nonzero prime ideal contained in the
Jacobson radical of $R$.
\item[(iv)] Every proper $R$-submodule of $Q$ is a fractional ideal of $R$.
\end{itemize}
\end{theorem}
\begin{proof} (i) $\Rightarrow$ (ii) This is clear.
(ii) $\Rightarrow$ (iii) Suppose that $A$ is a $Q$-irreducible ideal
of $R$.
By Lemma~\ref{ideal
characterization}, $A = AR_P$ for some prime ideal of $R$. If $A$
is an invertible ideal of $R$, then by Theorem~\ref{qirreducible}
$P$ is the unique maximal ideal of $R$, so that statement (iii) is
clearly true. It remains to consider the case where $A$ is not
invertible. By Theorem~\ref{qirreducible}, if $x$ is a nonzero
element in $A^{-1}$, then $xA$ is contained in the Jacobson radical
of $R$. Since by Lemma~\ref{ideal characterization}(ii), $xA$ is
$Q$-irreducible we may assume without loss of generality that $A$
itself is contained in the Jacobson radical of $R$.
Now let $\{N_i\}$ be the set of maximal ideals of $R$. Since $AR_P$
is an ideal of $R$ and $A$ is contained in each $N_i$, it follows
that for each $i$, $AR_PR_{N_i} = AR_{N_i} \subset R_{N_i}$. Thus
there is prime ideal $P_i$ contained in $P$ and $N_i$ that contains
$A$ (the ideal $P_i$ can be chosen to be the contraction of the
maximal ideal of the ring $R_PR_{N_i}$ that contains $A$). Because
$R$ is a Pr\"ufer domain, the prime ideals contained in $P$ are
linearly ordered by inclusion. Thus if $Q = \bigcap_{i} P_i$, then
$Q$ is a nonzero prime ideal of $R$ (for it contains $A$) and $Q$ is
contained in every maximal ideal of $R$.
(iii) $\Rightarrow$ (i)
Let $P$ be a nonzero prime ideal of $R$ contained in the Jacobson
radical of $R$. Since $R$ is a Pr\"ufer domain, $P = PR_P$, so if
$0 \ne x$ is in $P$ it follows that $xR_M$ is contained in $P$. Thus
$xMR_M$ is contained in $P = PR_M$. Moreover by
Proposition~\ref{Prufer case} $xMR_M$ is a completely
$Q$-irreducible $R$-submodule of $Q$.
(iii) $\Rightarrow$ (iv) Statement (iv) is equivalent to the
assertion that there exists a valuation overring $V \subset Q$ of
$R$ such that $(R:_QV) \ne 0$ \cite[Theorem 79]{M2}. If $R$
satisfies (iii), then a nonzero prime ideal $P$ contained in the
Jacobson radical of $R$ has the property that $PR_P = P$. Thus
$V$ can be chosen to be $R_P$.
(iv) $\Rightarrow$ (ii) By the theorem of Matlis cited in (iii)
$\Rightarrow$ (iv), there exists a valuation ring $V$ with $(R:_QV)
\ne 0$. Thus since $R$ is a Pr\"ufer domain there is a prime ideal
$P$ with $V = R_P$ and $rR_P \subseteq R$ for some nonzero $r \in
R$. By Proposition~\ref{Prufer case}, $rR_P$ is a $Q$-irreducible
ideal of $R$.
\end{proof}
\begin{remark}
If $R$ is a Pr\"ufer domain with nonzero Jacobson radical ideal $J$,
then there exists a unique largest prime ideal $P$ contained in $J$.
If $M$ is a maximal ideal of $R$, then $PR_M = PR_P$ since $R_M$ is
a valuation domain. Thus $P = \bigcap_{M \in \Max(R)}PR_M = PR_P$.
It follows that $R_P/P$ is the quotient field of $R/P$. Using this
observation it is not hard to see that a Pr\"ufer domain $R$
satisfies the equivalent conditions of Theorem~\ref{existence} if
and only if $R$ occurs in a pullback diagram of the form
\begin{center} $\begin{CD} R @>>> D \\ @VVV \: @V{\alpha}VV \\ V
@>{\beta}>> K \end{CD}$
\end{center}
where
\begin{itemize}
\item[$\bullet$]
$\alpha$ is injective and $D$ is a Pr\"ufer domain such that the Jacobson
radical of $D$ does not contain a nonzero prime ideal,
\item[$\bullet$] $K$ is isomorphic to the quotient field of $D$,
and
\item[$\bullet$] $\beta$ is surjective with $V$ a valuation
domain.
\end{itemize}
Thus if $D$ is any Pr\"ufer domain with quotient field $Q$ and $X$
is an indeterminate for $Q$, then $D+XQ[[X]]$ is a Pr\"ufer domain
satisfying the equivalent conditions of Theorem~\ref{existence}.
\end{remark}
%\begin{proposition}
%Let $R$ be a Pr\"ufer domain. The following statements are equivalent for
%a
%completely $Q$-irreducible $R$-submodule $A$ of $Q$ with adjoint maximal
%ideal
%$M$.
%\begin{itemize}
%\item[(i)] $Q/A$ is an injective $R$-module.
%\item[(ii)] $R_M$ is an almost maximal valuation domain.
%\item[(iii)] $R$ is $A$-reflexive.
%\end{itemize}
%\end{proposition}
%\begin{proof} (i) $\Rightarrow$ (ii) Since $Q/A$ is injective, $Q/\End(A)$
%is
%also an injective $R$-module [reference needs to be inserted]. By
%Proposition~\ref{Prufer case}, $\End(A) = R_M$. Thus $Q/R_M$ is injective
%and
%since $R_M$ is a valuation domain, $R_M$ is almost maximal \cite{FS}.%
%(ii) $\Rightarrow$ (i) Since $R_M$ is an almost maximal valuation domain
%and
%$A$ is an $R_M$-module, $A$ has injective dimension one as a module over
%$R_M$-,
%hence over $R$.
%(i) $\Leftrightarrow$ (iii) (This follows from something in one of may
%papers--
%I need to look up the reference.)
%\end{proof}
\section{Questions}
We conclude with several questions that we have not been able to
resolve. Other questions touching on similar issues can be found in
\cite{BHLP}, \cite{Baz} and \cite{HHP}.
\begin{question}\label{2} What conditions on a domain $R$ guarantee
that any two completely $Q$-irreducible fractional ideals are
necessarily isomorphic?
\end{question}
Proposition~\ref{criterion} gives an answer to this question in the
case where every proper submodule of $Q$ is a fractional $R$-ideal.
By Theorem~\ref{Prufer case} if $R$ is a valuation domain, then all
completely $Q$-irreducible ideals of $R$ are isomorphic. If $R$ is a
Noetherian local domain, then by Propositions~\ref{criterion}
and~\ref{same} any two $Q$-irreducible ideals are isomorphic.
\begin{question} \label{3} What integral domains $R$ admit a completely
$Q$-irreducible ideal? a nonzero $Q$-irreducible ideal?
\end{question}
The Noetherian and Pr\"ufer cases of Question~\ref{3} are settled in
Proposition~\ref{same} and Theorem~\ref{existence}, respectively.
\begin{question} \label{33} If $R$ admits a nonzero $Q$-irreducible
ideal, does $R$ also admit a completely $Q$-irreducible ideal?
\end{question}
The answer to Question \ref{33} is yes if $R$ is Pr\"ufer or
Noetherian.
\begin{question} \label{4} If $A$ is a (completely)
irreducible submodule of the quotient field of a quasilocal domain
$R$, what can be said about $\End(A)$? For a completely
$Q$-irreducible ideal $A$ of a quasilocal domain $R$ does it follow
that $\End(A)$ is integral over $R$?
\end{question}
Theorem \ref{existence} along with the fact that if $A$ is
completely irreducible, then $\End(A)$ is quasilocal, shows that if
$R$ is not quasilocal, then $\End(A)$ need not be integral over $R$
even if $R$ is a Pr\"ufer domain.
Theorem~\ref{qirreducible}, Example~\ref{gilmerhoffmann} and
Example~\ref{valuation example} are relevant to Question~\ref{4}.
\begin{question}\label{5} If $R$ is a (Noetherian) domain, what are the
completely irreducible submodules of $Q$?
\end{question}
Theorem~\ref{Prufer case} answers Question~\ref{5} in the case where
$R$ is Pr\"ufer.
\begin{question} \label{6} If $A$ is a completely $Q$-irreducible
$R$-submodule of $Q$, when is $A$ a fractional ideal of $R$? of
$\End(A)$?
\end{question}
If $R$ is a valuation domain, then every proper submodule of $Q$ is
a fractional ideal of $R$. The case where $R$ is a one-dimensional
Noetherian domain is deeper, but has been resolved independently by
Bazzoni and Goeters. A consequence of Theorem 3.4 of \cite{Baz} is
that if $A$ is a completely $Q$-irreducible submodule of $Q$ such
that $\End(A)$ is Noetherian and has Krull dimension 1, then (by
Theorem~\ref{qirreducible}) $\End(A)$ is local and (by the cited
result of Bazzoni) $A$ is a fractional ideal of $\End(A)$. Indeed, a
more general result due to H. P. Goeters is true: If $A$ is a
submodule of the quotient field of a local Noetherian domain of
Krull dimension 1, then $A$ is a fractional ideal of $\End(A)$
\cite[Lemma 1]{Goe}. Recently, Goeters has extended this to all
quasilocal Matlis domains \cite{Goe2}.
\section{Appendix: Corrections to \cite{FHO2}}
In this appendix we correct several mistakes from our earlier paper
\cite{FHO2}. We include also a stronger version of Lemma 3.2 of
this paper. The main corrections concern Lemmas 2.1(iv) and 3.2 of
\cite{FHO2}. The notation and terminology of this appendix is that
of \cite{FHO2}.
The proof of statement (iv) of Lemma 2.1 of \cite{FHO2} is
incorrect. Statement (iv) should be modified in the following way:
\begin{itemize}
\item[(iv)] {\it For each nonzero nonmaximal prime ideal $P$ of $R$,
if $\{M_i\}$ is the collection of maximal ideals of $R$ not
containing $P$, then $R_P \subseteq (\bigcap_{i}R_{M_i})R_M$ for
each maximal ideal $M$ of $R$ containing $P$.}
\end{itemize}
{\noindent}Having changed statement (iv), we modify now the original
proofs of (iii) $\Rightarrow$ (iv) and (iv) $\Rightarrow$ (v) in
the following way. For (iii) $\Rightarrow$ (iv) we note that by
Theorem 3.2.6 of \cite{FHP} $\End(P) = R_P \cap (\bigcap_i R_{M_i})$
and $\End(P_M) = R_P$. Thus by (iii) $R_P = \End(P_M) = \End(P)_M =
R_P \cap (\bigcap_{i}R_{M_i})R_M$, and (iv) follows.
For the proof of (iv) $\Rightarrow$ (v), we have as in the original
proof that
$$
R_P = \End(A)_M =(\bigcap_{Q \in \XX_A} R_{Q})R_M \cap
(\bigcap_{N}R_N)R_M.
$$
We claim that $\bigcap_{Q \in \XX_A} R_{Q} \subseteq R_P$. If this
is not the case then since $R_M$ is a valuation domain it must be
that $R_P \subset (\bigcap_{Q \in \XX_A} R_{Q})R_M$ (proper
containment). Hence from the above representation of $\End(A)_M$ we
deduce that since $R_P$ is a valuation domain, $R_P =
(\bigcap_{N}R_N)R_M$. Thus $(\bigcap_{N}R_N)R_M \subset (\bigcap_{Q
\in \XX_A} R_{Q})R_M$. By (iv), $R_{Q'} \subseteq
(\bigcap_{N}R_N)R_M$ since no $N$ contains $Q'$. However $Q' \in
\XX_A$, so this implies $R_{Q'} \subset R_{Q'}R_M$, but since $M$
contains $Q'$, $R_{Q'}R_M = R_{Q'}$. This contradiction implies
that $\bigcap_{Q \in \XX_A}R_Q \subseteq R_P$, so every element $r
\in P$ is contained in some $Q \in \XX_A$. Consequently, no element
of $P$ is prime to $A$.
\medskip
Reference is made in the first paragraph of the proof of Lemma 3.3
of \cite{FHO3} to the original version of statement (iv). In
particular it is claimed that since $R$ has the separation property,
$P_iS $ is a maximal ideal of $S$. This can be justified now using
the following more general fact, which does not appear explicitly in
\cite{FHO2}:
\begin{lemma} A Pr\"ufer domain $R$ has the separation property if and
only if for each collection $\{P_i:i \in I\}$ of incomparable prime
ideals, the ideals $P_i$ extend to maximal ideals of
$S:=\bigcap_{i\in I} R_{P_i}$.
\end{lemma}
\begin{proof} If $R$ has the separation property, then for each $j \in I$,
$\End(P_j) = R_{P_j} \cap (\bigcap_{N}R_N)$ by Theorem 3.2.6 of
\cite{FHP}, where $N$ ranges over the maximal ideals of $R$ that do
not contain $P_j$. Thus $\End(P_j) \subseteq S$ since the $P_i$'s
are comaximal. By Lemma 2.1(ii) of \cite{FHO2} $P_j$ is a maximal
ideal of $\End(P_j)$, and since $R$ is a Pr\"ufer domain, either
$P_j$ extends to a maximal ideal $SP_j$ of $S$ or $SP_j = S$. The
latter case is impossible since $S \subseteq R_{P_j}$. Thus $SP_j$
is a maximal ideal of $S$. The converse follows from Theorem 3.2.6
of \cite{FHO} and Lemma 2.1(ii) of \cite{FHO2}.
\end{proof}
A second reference to the original version of Lemma 2.1(iv) is made
in the first paragraph of the proof of (i) $\Rightarrow$ (ii) of
Theorem 3.7. In this paragraph it is claimed that since $\End(A)_M
= R_P$, the elements of $P$ are not prime to $A$. Since (by Theorem
2.3 of \cite{FHO2}) $R$ has the separation property, this claim is
immediate from Lemma 2.1(v) and the original argument that appealed
to Lemma 2.1(iv) is unnecessary. \medskip
The argument in the third paragraph of the proof of Lemma 3.2 of
\cite{FHO2} is incorrect, but rather than patch this argument we
give below a stronger version of this lemma. It requires a slight
strengthening of Lemma 3.1 of \cite{FHO2}.
\begin{lemma}
\label{lemma 6.6} (cf. Lemma 3.1 of \cite{FHO2}) Let $A$ be an
ideal of a Pr\"ufer domain $R$. Suppose $Q$ is a prime ideal of $R$
that contains $A$, and $P$ is a prime ideal such that $\End(A)_Q =
R_P$. If $P \in \Ass(A)$, then $\End(A)_Q = \End(A_Q)$. \end{lemma}
\begin{proof} Since $P \in \Ass(A)$, $A_{(P)}$ is a primal ideal with
adjoint prime $P$, and it follows that $A_P$ is a $P_P$-primal
ideal. By \cite[Lemma 1.4]{FHO2}, $\End(A_P) = R_P$. Thus
$\End(A_P) = \End(A)_Q$, so $A\End(A_P) = A\End(A)_Q$ implies $A_P =
A_Q$. Consequently, $ \End(A_Q) = \End(A_P) = R_P =
\End(A)_Q$.\end{proof}
\begin{lemma}
\label{lemma 6.7} (cf. Lemma 3.2 of \cite{FHO2})
Let $R$ be a Pr\"ufer domain with field of
fractions $F$, let $X$ be an $R$-submodule of $F$, and let $M$ be a
maximal ideal of $R$. Then $\End(X)_M = R_P$ for some $P \in \Spec
R$ with $P \subseteq M$. Assume that $P$ is the union of prime
ideals $P_i$, where each $P_i$ is the radical of a finitely
generated ideal. Then $\End(X)_Q = \End(X_Q)$ for all prime ideals
$Q$ such that $P \subseteq Q \subseteq M$. \end{lemma}
\begin{proof} Since $R_M \subseteq \End(X)_M$ and $R_M$ is a
valuation domain, $\End(X)_M = R_P$ for some prime ideal $P
\subseteq M$. If $\End(X)_M = F$, then clearly $\End(X)_M =
\End(X_M)$, so we assume $\End(X)_M \ne F$ and thus $P \ne (0)$. Let
$Q$ be a prime ideal of $R$ such that $P \subseteq Q \subseteq M$.
Since $\End(X)_M = R_P$, we have $\End(X)_Q = R_P$. Now
$R_P = \End(X)_Q \subseteq \End(X_Q) \subseteq
\End(X_P)$, so to prove Lemma \ref{lemma 6.7}, it suffices to show
that $\End(X_P) \subseteq R_P$.
Let $S = \End(X)$. Now $PS \subseteq PR_P$, so $PS \ne S$. Since $S$ is
an overring of the Pr\"ufer domain $R$, $S$ is a flat extension of
$R$, so $PS$ is a prime ideal of $S$ and $S_{PS} = R_P$. Also,
$PS$ is the union of the prime ideals $P_iS$, and each $P_iS$ is
the radical of a finitely generated ideal of $S$.
Let $L$ be a prime ideal of $S$ such that $L \subseteq PS$ and such
that $L = \sqrt{I}$, where $I$ is a finitely generated ideal of $S$.
We prove there exists a nonzero $q \in F$ such that $qX_L$ is an
ideal of $S_L$ that is primary for $L_L$. The invertible ideal $I^2$
of $S$ is an intersection of principal fractional ideals of $S$.
Since $\End(X) = S$, each principal fractional ideal of $S$ is an
intersection of $S$-submodules of $F$ of the form $qX$, $q \in F$.
Since $I^2 \subseteq L$, $I^2$ is an intersection of ideals of $S$
of the form $L \cap qX$, where $q \in F$. Since $I^2 \subset I
\subseteq L$ (where $\subset$ denotes proper containment), there
exists $q \in F$ such that $I^2 \subseteq L \cap qX \subset L$.
Hence there exists a maximal ideal $N$ of $S$ with $L \subseteq N$
such that $I^2_N \subseteq L_N \cap qX_N \subset L_N$. Since $S_N$
is a valuation domain, the $S_N$-modules $qX_N$ and $L_N$ are
comparable and $I^2_N \subseteq L_N \cap qX_N \subset L_N$ implies
$I^2_N \subseteq qX_N \subset L_N$. Now $\sqrt{I^2} =\sqrt{I} = L$
and $I^2 \subseteq N$ implies $L \subseteq N$. Thus $I^2_L \subseteq
qX_L \subseteq L_L$, and we conclude that $\sqrt{qX_L} = L_L$.
We observe next that $X_P \ne F$. Since $P \ne 0$, there exists $i$
such that $P_i \ne 0$ and $L := P_iS \subseteq PS$, where $L =
\sqrt{I}$ for some finitely generated ideal $I$ of $S$. As we have
established in the paragraph above, there exists a nonzero $q \in F$
such that $qX_L$ is an ideal of $S_L$. Thus $qX_P \subseteq qX_L
\subseteq S_L$, so it is not possible that $X_P =F$.
Fix some member $L$ of the chain $\{P_iS\}$. Since $X_P \ne F$, $L
\subseteq PS$ and $R_P$ is a valuation domain, there exists a
nonzero element $s$ of $S$ such that $sX \subseteq L_L$. Since
$\End(X_P) = \End(sX_P)$ and we wish to show that $\End(X_P)
\subseteq R_P$ we may assume without loss of generality that $s =
1$; that is, we assume for the rest of the proof that $X \subseteq
L_{L}$. Define $A = X \cap S$. Then $A$ is an ideal of $S$.
Moreover $A$ is contained in $L$ since $A_{L} \subseteq X_L
\subseteq L_L$.
With the aim of applying Lemma~\ref{lemma 6.6}, we show that $PS \in
\Ass(A)$. For each $i$ define $L_i = P_iS$. It suffices to show
each $L_i$ with $L \subseteq L_i \subseteq PS$ is in $\Ass(A)$,
since this implies that $PS = \bigcup_{L_i \supseteq L}L_i$ is a
union of members of $\Ass(A)$. Let $i$ be such that $L \subseteq
L_i$. Since $L_i$ is the radical of a finitely generated ideal of
$S$, there exists (as we have established above) a nonzero $q \in
F$ such that $qX_{L_i}$ is an ideal of $S_{L_i}$ that is primary for
$(L_i)_{L_i}$. Now $A_{L_i} = X_{L_i} \cap S_{L_i}$. Since $S_{L_i}$
is a valuation domain, $A_{L_i} = X_{L_i}$ or $S_{L_i} \subseteq
X_{L_i}$. By assumption, $X \subseteq L_L$. Since $L \subseteq
L_i$, it follows that $X_{L_i} \subseteq L_{L}$, so it is impossible
that $S_{L_i} \subseteq X_{L_i}$. Thus $A_{L_i} = X_{L_i}$.
Consequently, $qX_{L_i} = qA_{L_i}$ and $qA_{L_i}$ is an ideal of
$S_{L_i}$ that is primary for $(L_i)_{L_i}$. Since $S_{L_i}$ is a
valuation domain, it follows that $qA_{L_i}= A_{L_i}:s$ for some $s
\in S$. Thus $(L_i)_{L_i} \in \Ass(A_{L_i})$, so $L_i \in
\Ass(A)$. This proves $PS \in \Ass(A)$.
Since $A =X \cap S$ is an ideal of $S$, $S \subseteq \End(A)$. For
each maximal ideal $N$ of $S$, either $A_N = X_N$ or $A_N = S_N$ It
follows that $\End(A) \subseteq \End(X) = S$, so $\End(A) = S$.
Thus $\End(A)_P = S_P = R_P$, and by Lemma~\ref{lemma 6.6},
$\End(A_P) = R_P$. (We have used here that $S_{SP} = R_P$.) Now
$A_P = X_P \cap S_P = X_P \cap R_P$. Since $R_P$ is a valuation
domain, $A_P = X_P$ or $R_P \subseteq X_P$. The latter case is
impossible since $X_P \subseteq X_L \subseteq L_L$. Thus
$A_P = X_P$. We conclude that End($X_{P}) =$ End($A_{P}) = R_P$.
\end{proof}
Finally we make two corrections to the proof of Lemma 3.3. The
third paragraph should read: {\it Define $A = JR_Q \cap R$. Then $AS
= JR_Q \cap S$ is $QS$-primary. In particular, $QS$ is the unique
minimal prime of $AS$ and $A \not\subseteq P_iS \cap R = P_i$ for
each $i \ge 1$.}
Also, in the fifth paragraph an exponent is incorrect: $x_i$ needs
to be chosen in $A_i \setminus (P_1 \cup \cdots \cup P_i \cup
A^{i+1})$. Then in the eighth paragraph, we have $x_{i+1}S_N
\subset x_{i}S_N$ since $x_i \in A^i \setminus A^{i+1}$ and
$A^{i+1}S_N \cap R = A^{i+1}R_Q \cap R = A^{i+1}$.
%\bibliographystyle{amsplain}
\begin{thebibliography}{FHP3}
\bibitem{BHLP} V. Barucci, E. Houston, T. Lucas and I. Papick,
$m$-canonical ideals in integral domains II, in {\it Ideal theoretic
methods in commutative algebra (Columbia, MO, 1999)}, 89-108,
Lecture Notes in Pure and Appl. Math., { 220}, Dekker, New York,
2001.
\bibitem{Ba} H. Bass, Finitistic dimension and a homological
generalizaton of semiprimary rings, Trans. Amer. Math. Soc. { 95}
(1960), 466-488.
\bibitem{Baz} S. Bazzoni, Divisorial domains, Forum Math. { 12} (2000),
397-419.
\bibitem{BS2} S. Bazzoni and L. Salce, Warfield domains, J. Algebra
185 (1996), 836-868.
\bibitem{BS} S. Bazzoni and L. Salce, Almost perfect domains,
Coll. Math. 95 (2003), 285-301.
\bibitem{BS1} S. Bazzoni and L. Salce, Strongly flat covers, J.
London Math. Soc. 66 (2002), 276-294.
\bibitem{B} N. Bourbaki, {\it Commutative Algebra},
Chapters 1 - 7, Springer-Verlag, 1989.
\bibitem{D} R. Dilworth, Aspects of distributivity, Algebra Universalis 18
(1984), 4-17.
\bibitem{DC} R. Dilworth and P. Crawley, Decomposition
theory for lattices without chain conditions, Trans. Amer. Math.
Soc. 96 (1960), 1-22.
\bibitem{EJ} E. Enochs and O. Jenda, {\it Relative homological
algebra}, de Gruyter Exp. Math. 30, de Gruyter, 2000.
\bibitem{FHP} M. Fontana, J. Huckaba and I.
Papick, {\it Pr\"ufer domains}, Marcel Dekker, 1998.
\bibitem{FR} D. Ferrand and M. Raynaud, Fibres formelles d'un anneau
local noeth\'{e}rian, Ann. Scient. \'{E}c. Norm. Sup. ${4^e}$
s\'{e}rie { 3} (1970), 295-311.
\bibitem {F1} L. Fuchs, A condition under which an irreducible ideal
is primary, Quart. J. Math. Oxford 19 (1948), 235-237.
\bibitem {F} L. Fuchs,
On primal ideals, Proc. Amer. Math. Soc. 1 (1950), 1-6.
\bibitem{FHO} L. Fuchs, W. Heinzer and B. Olberding,
Commutative ideal theory without finiteness conditions: primal
ideals, Trans. Amer. Math Soc., to appear.
\bibitem{FHO3} L. Fuchs, W. Heinzer and B. Olberding, Commutative ideal
theory with finiteness conditions: completely irreducible ideals,
Trans. Amer. Math. Soc., to appear.
\bibitem{FHO2} L. Fuchs, W. Heinzer and B. Olberding, Maximal prime divisors
in arithmetical rings, in {\it Rings, modules, algebras, and abelian
groups}, 189--203, Lecture Notes in Pure and Appl. Math., 236,
Dekker, New York, 2004..
%\bibitem{FM} L. Fuchs and E. Mosteig, Ideal theory in \Pds\
%| an unconventional approach, J. Algebra 252 (2002), 411-430.
\bibitem{FS} L. Fuchs and L. Salce, {\it Modules over non-Noetherian
Domains}, Math. Surveys 84 (2001).
\bibitem{GaH2} Coherentlike conditions in pullbacks, Michigan Math. J. 44
(1997), no. 1, 99-123.
\bibitem{GaH} S. Gabelli and E. Houston, Ideal theory in pullbacks,
in {\it Non-Noetherian commutative ring theory}, 199-227, Math.
Appl., 520, Kluwer Acad. Publ., Dordrecht, 2000.
\bibitem{GH} R. Gilmer and J. Hoffmann, The integral closure need
not be a Pr\"ufer domain, Mathematika { 21} (1974), 233-238.
\bibitem{Goe} H. P. Goeters, Noetherian stable domains,
J. Algebra { 202} (1998), no. 1, 343-356.
\bibitem{Goe2} H. P. Goeters, $A$-divisorial Matlis domains, to
appear.
\bibitem{H} W. Heinzer, Integral domains in which each nonzero ideal
is divisorial, Mathematika { 15} (1968), 164--170.
\bibitem{HHP} W. Heinzer, J. Huckaba and I. Papick, $m$-canonical
ideals in integral domains, Comm. in Algebra { 26} (1998),
3021-3043.
%\bibitem{HO} W. Heinzer and J. Ohm, Locally noetherian commutative
% rings, Trans. Amer. Math. Soc. {\bf 158} (1971), 273-284.
\bibitem{HO} W. Heinzer and B. Olberding, Unique irredundant intersections
of completely irreducible ideals, J. Algebra, to appear.
\bibitem{HRS} W. Heinzer, C. Rotthaus and J. Sally, Formal Fibers and
Birational Extensions, Nagoya Math. J. { 131} (1993), 1-38.
%\bibitem{Hu} I. C. Huang, A residue map and some applications to
%some one-dimensional rings, Proc. Amer. Math Soc. 123 (1995),
%2369-2375.
\bibitem{Ko} S. Koppelberg, {\it Handbook of Boolean algebras}, vol.
1., North Holland, 1989.
%\bibitem{LM} M. Larsen and P. McCarthy, Multiplicative Theory of Ideals,
%Academic Press, 1971.
\bibitem{LS} W. J. Lewis and T. S. Shores, Serial modules and endomorphism
rings, Duke Math J. 41 (1974), 889-909.
\bibitem{M} E. Matlis, Cotorsion modules, Memoires Amer. Math.
Soc. 49 (1964).
\bibitem{M2} E. Matlis, {\it Torsion-free modules}, The University of Chicago
Press, 1972.
\bibitem{Mat} E. Matlis, {\it 1-dimensional Cohen-Macaulay rings}, Lecture
Notes in Math. { 327}, Springer-Verlag, 1973.
\bibitem{Mati} E. Matlis, Ideals of injective dimension $1$,
Michigan Math. J. { 29} (1982), no. 3, 335-356.
%\bibitem{Ma} H. Matsumura, Commutative Ring Theory, Cambridge
%University Press, 1986.
\bibitem{No} {E. Noether,} Idealtheorie in Ringbereichen, Math. Ann. { 83}
(1921), 24-66.
%\bibitem{N} M. Nishi, On the ring of endomorphisms of an
%indecomposable injective module over a Pr\"ufer ring, Hiroshima
%Math. J. 2 (1972), 271-283.
%\bibitem{O} B. Olberding, Globalizing local properties of
%Pr\"ufer domains, J. Algebra (1998).
\bibitem{O2} B. Olberding, Factorization into radical ideals, Marcel
Dekker, to appear.
%\bibitem{OS} B. Olberding and S. Saydam, {\it Ultraproducts of
%commutative rings}, in {\it Commutative ring theory and applications
%(Fez, 2001)}, 369-386, Lecture Notes in Pure and Appl. Math., 231,
%Dekker, New York, 2003.
%\bibitem{OSh} B. Olberding and J. Shapiro, {\it Prime ideals in
%ultraproducts of commutative rings,} J. Algebra, to appear.
%\bibitem{OSS} B. Olberding, J. Shapiro and S. Saydam, {\it Completions,
%valuation and ultrapowers of
%Noetherian domains}, J. Pure and Appl. Algebra, to appear.
\bibitem{Sm} J. R. Smith, Localy domains with topologically
$T$-nilpotent radical, Pacific J. Math 30 (1969), 233-245.
\bibitem{ZS} O. Zariski and P. Samuel, {\it Commutative Algebra}, Vol. II,
Van Nostrand, Princeton, 1958.
\end{thebibliography}
\bigskip
\end{document}
\section*{Questions}
{\noindent}This section will eventually be deleted.
\begin{itemize}
\item[(1)]
Is a completely $Q$-irreducible ideal of a quasilocal integrally
closed domain an m-canonical ideal?
\item[(2)] Find conditions on $R$
in order that any two completely $Q$-irreducible fractional
$R$-ideals are necessarily isomorphic.
\item[(3)] What integral domains $R$ admit a completely $Q$-irreducible
fractional ideal?
\item[(4)] If $R$ is a quasilocal domain with completely $Q$-irreducible
ideal $A$, is $\End(A) = R$?
\item[(5)] If $R$ is a Noetherian domain, then is it possible to describe
all completely $Q$-irreducible submodules of the quotient field $Q$?
(Proposition~\ref{Prufer case} takes care of the Pr\"ufer case.)
\item[(6)] If $A$ is a completely $Q$-irreducible submodule of the quotient
field of a domain, is $A$ a fractional ideal over $\End(A)$? It is
easy to see that this is true for Pr\"ufer domains. I believe
Bazzoni shows that it is also true when $\End(A)$ is a Noetherian
domain.
\item[(7)] If $A$ is a completely $Q$-irreducible $R$-submodule of the
quotient field of a quasilocal domain $R$, what can be said about
$\End(A)$? I think at the very least it is true that $\End(A)M$ is
not equal to $\End(A)$, where $M$ is the maximal ideal of R. (This
is because $\Hom(M,A)$ can be viewed as a cover of $A$.) Must
$\End(A)$ be integral over $R$?
\item[(8)] Is it possible that an ideal of a non-Dedekind (local?)
Noetherian domain $R$ is an infinite irredundant intersection of
completely $Q$-irreducible submodules of the quotient field of $R$?
\item[(9)] Can it happen that every ideal of a Noetherian domain is an
irredundant intersection of completely $Q$-irreducible submodules of
the quotient field of R? (Is it intended here to be every nonzero
ideal? For a domain that is not a field, I believe $(0)$ is never an
irredundant intersection of completely $Q$-irreducible ideals. On
the other hand we are asserting that for $R = \mathbb Z$ this is
true. I bet it is true for all Dedekind domains.)
\item[(10)] If $R$ is a quasilocal domain and $A$ is an $R$-submodule of
$Q$, is it true that: $\End(A)$ is $A$-reflexive iff $Q/A$ is
injective and $A$ is completely $Q$-irreducible. (The terminology
is from Bazzoni and Salce and is also in \cite{FS}.)
\item[(11)] Are valuation overrings useful in constructing examples of
completely $Q$-irreducible submodules of $Q$ when the base ring $R$
is Noetherian? If $V$ is a DVR overring of a quasilocal domain $R$
(with maximal ideal $M$) that is completely $Q$-irreducible as an
$R$-submodule of $Q$, then I believe $V$ is centered on a maximal
ideal of $R$. Furthermore I believe $V/VM = R/M$ so that $V$ is
zero-dimensional. For $VM = Vm$ for some $m$ in $M$. Thus $[V:M] =
[V:VM] = V(1/m)$, so $[V:M] / V = V(1/m) / V = V / Vm.$ (By
$[V:M]$ I mean the submodule of $Q$ that is identified with
$Hom(M,V)$.) If $V$ is completely $Q$-irreducible, then $[V:M] / V$,
hence $V / Vm$, must be $R/M$. \end{itemize}
\end{document}
%End Document
\end{document}
Let $A$ be a fractional ideal of a domain $R$. Then $R$ is an {\it
$A$-reflexive domain} if and only if the canonical homomorphism $$G
\rightarrow \Hom_R(\Hom_R(G,A),A)$$ is an isomorphism for all
$\End(A)$-submodules $G$ of finite rank free $\End(A)$-modules. It
is a consequence of Theorem 5.3 in \cite{FS} that if $\End(A) = R$,
then $R$ is an $A$-reflexive domain if and only if $A$ is an
$m$-canonical ideal of $R$ and $Q/A$ is an injective $R$-module.
This raises the question of whether ``$m$-canonical'' can be
weakened to ``completely $Q$-irreducible'':
\begin{question} \label{7} If $R$ is a quasilocal domain and $A$ is an
$R$-submodule of $Q$, is it true that: $\End(A)$ is $A$-reflexive if
and only if $Q/A$ is injective and $A$ is completely
$Q$-irreducible.
\end{question}
By Lemma~\ref{Bazzoni} the answer to Question~\ref{7} is affirmative
if $R$ is Noetherian. Similarly, the answer is affirmative for
valuation domains since completely $Q$-irreducible ideals of these
domains are $m$-canonical.
\begin{proposition} If $R$ is a domain and $A$ is a fractional ideal of $R$,
then $A$ is a completely $Q$-irreducible fractional ideal of $R$ iff
$A$ is an completely $Q$-irreducible fractional ideal of $R_M$ for
some maximal ideal of $M$ of $R$. \end{proposition}
\begin{proof} It suffices to prove the claim when $A$ is an ideal of $R$.
This is because a fractional ideal $B$ of a ring $S$ is completely
$Q$-irreducible if and only if every fractional ideal isomorphic to
$B$ is completely $Q$-irreducible.
Suppose that $A$ is a completely $Q$-irreducible ideal of $R$. Then $A =
\cap AR_M$, where $M$ ranges over the maximal ideals of $R$, so
since $A$ is completely $Q$-irreducible, $A = AR_M$ for some maximal
ideal $M$ of $R$. Clearly $A$ is a completely $Q$-irreducible ideal
of $R_M$.
Conversely, suppose that $A$ is a completely $Q$-irreducible ideal of$R_M$
for some maximal ideal $M$. Since $A$ is a completely
$Q$-irreducible ideal of $R_M$, there exists $x \in (A : MR_M)
\setminus A$. Write $x = \frac{c}{b}$, where $c \in R$ and $b \in R
\setminus M$. Then if $c \in A$, since $A = AR_M$ it follows that
$x \in A$, contrary to the choice of the $x$. Thus $x \in (A:M)
\setminus A$, and to prove that $A$ is a completely $Q$-irreducible
ideal of $R$, it suffices to show that $x$ is in every fractional
ideal $J$ properly containing $A$. We show in fact that $x$ is in
$JR_N$ for all maximal ideals $N$ of $R$. By the choice of $x$, we
have that $x \in (A: MR_M)$, so since $A$ is a completely
$Q$-irreducible ideal of $R_M$, $(A : MR_M)$ is contained in $JR_M$.
(Note that $A$ is properly contained in $JR_M$, since otherwise $A =
AR_M = JR_M$, and $J \subseteq A$, contrary to assumption.) Finally
if $N$ is a maximal ideal of $R$ distinct from $M$, then since $x$
is in $(A:M)$, we have $xM \subseteq AR_N$, so $x \in AR_N \subseteq
JR_N$. This shows $x \in JR_N$ for every maximal ideal $N$ of $R$,
proving the claim.
\end{proof}
\begin{corollary} There exists a completely $Q$-irreducible ideal
of $R$ if and only if there is a maximal ideal $M$ of $R$ such that
$R_M$ has an absolutely irreducible ideal and $R_M$ is a fractional
ideal of $R$. \end{corollary}
(i) $\Rightarrow$ (iii) Suppose that $A$ is a completely
$Q$-irreducible ideal of $R$. Then $A = \bigcap_{M \in \Max(R)}
AR_M$, where $M$ ranges over the maximal ideals of $R$, so since $A$
is completely $Q$-irreducible, $A = AR_M$ for some maximal ideal $M$
of $R$. Clearly $A$ is a completely $Q$-irreducible ideal of $R_M$.
(iii) $\Rightarrow$ (i) Suppose that $A$ is a completely
$Q$-irreducible ideal of $R_M$ for some maximal ideal $M$. Since
$A$ is a completely $Q$-irreducible ideal of $R_M$, there exists $x
\in (A : MR_M) \setminus A$. Write $x = \frac{c}{b}$, where $c \in
R$ and $b \in R \setminus M$. Then if $c \in A$, since $A = AR_M$
it follows that $x \in A$, contrary to the choice of the $x$.
Thus $x \in (A:M) \setminus A$, and to prove that $A$ is an absolutely
irreducible ideal of $R$, it suffices to show that $x$ is in every
fractional ideal $J$ properly containing $A$. We show in fact that
$x$ is in $JR_N$ for all maximal ideals $N$ of $R$. By the choice
of $x$, we have that $x \in (A: MR_M)$, so since $A$ is a completely
$Q$-irreducible ideal of $R_M$, $(A : MR_M)$ is contained in $JR_M$.
(Note that $A$ is properly contained in $JR_M$, since otherwise $A =
AR_M = JR_M$, and $J \subseteq A$, contrary to assumption.) Finally
if $N$ is a maximal ideal of $R$ distinct from $M$, then since $x$
is in $(A:M)$, we have $xM \subseteq AR_N$, so $x \in AR_N \subseteq
JR_N$. This shows $x \in JR_N$ for every maximal ideal $N$ of $R$,
proving the claim. No virus found in this outgoing message. Checked
by AVG Anti-Virus. Version: 7.0.300 / Virus Database: 265.8.6 -
Release Date: 2/7/2005
|
https://www.utoledo.edu/nsm/mathstats/docs/exams/masters/S06msanal.tex | utoledo.edu | CC-MAIN-2022-33 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2022-33/segments/1659882572163.61/warc/CC-MAIN-20220815085006-20220815115006-00124.warc.gz | 911,899,453 | 3,601 | \documentclass[11pt]{amsart}
\usepackage{amssymb}
\newcommand{\R}{\mbox{$\Bbb R$}}
\newcommand{\C}{\mbox{$\Bbb C$}}
\newcommand{\N}{\mbox{$\Bbb N$}}
\voffset -1in \hoffset -.7in \textwidth 6in \textheight 10in
\pagestyle{empty}
\begin{document}
\begin{center}
Master of Science Comprehensive Analysis Exam Spring 2006
\end{center}
\bigskip
\begin{center}
Real and Complex Analysis
\end{center}
\bigskip
\begin{center}
{\bf To obtain full credit you must show all your work}\\
\end{center}
\vspace{.2in}
\begin{center}
Part 1. Real Analysis. 100\% will be obtained for \emph{complete} answers to four questions. Indicate clearly
which four questions you wish to be graded.
\end{center}
\vspace{.6in}
\noindent 1. (i) State the definition of convergence of a sequence of real numbers.\\
\noindent (ii) Prove that if $\lim_ {n \rightarrow \infty} a_n=a$
and $\lim_ {n \rightarrow \infty} b_n=b$, then
$\lim_ {n \rightarrow \infty} (a_n+b_n)=a+b$.\\
\noindent(iii) Prove that if $-1 < x < 1$, then $\lim_ {n
\rightarrow \infty} x^n=0.$
\vspace{.5in}
\noindent 2. (i) A sequence of real numbers $x_n$ is said to be
non-decreasing if $p > n$ implies that $x_p \geq x_n$.
Prove that a bounded non-decreasing sequence of real numbers is convergent.\\
\noindent (ii) Define a sequence $\{x_n\}$ by $x_1=\sqrt 2$ and
$x_{n+1}=\sqrt{(2 +\sqrt x_{n})}$ for $n=1,2,3,\cdots$. Prove that
$\{x_n\}$ is convergent and find the limit.
\vspace{.5in}
\noindent 3. (i) State the definition of continuity for a real-valued function whose domain is a subset of $\R$.\\
\noindent (ii) Prove that a real-valued function $f(x)$ whose domain is a subset of $\R$ is continuous at $x \in
X$ if for all sequences $\{x_n\}$ such
that $\lim_ {n \rightarrow \infty} x_n=x$ we have that $\lim_ {n \rightarrow \infty} f(x_n)=f(x)$.\\
\noindent (iii) Consider the function
\begin{equation}
f(x)= \begin{cases} x^2, &x \geq 0, \\
-x^2, &x < 0.\notag \end{cases}
\end{equation}
\noindent Discuss the existence and continuity of $f$ and its
first two derivatives at all points of $x \in \R$. Justify your
answers but you do not need to prove standard theorems.
%Prove from the definition in (i) that the function $f(x)=x^2$ is continuous at $x=2$.\\
\vspace{.5in}
\noindent 4. (i) State Rolle's Theorem.\\
\noindent (ii) Suppose that an $\R$-valued function $f(x)$ is differentiable at $x=a$ and $f(x) \leq f(a)$
for all $x$ in some open interval containing $a$. Prove that $f^{\prime}(a)=0.$\\
\noindent [Hint: It is sufficient to consider left hand and right hand limits].\\
\noindent (iii) Deduce Rolle's Theorem from (ii).\\
\newpage
\noindent 5. (i) Let $X$ be a non-empty subset and define a map
$d:X \times X \mapsto \R $ such that for all $x,y \in X$,
$d(x,y)=2$ if $x \neq y$ and for all $x \in X $, $d(x,x)=0$. Prove
in detail that $(X,d)$ is a metric space.
\bigskip
\noindent (ii) Prove that the sequence of points $x_n=\frac{n}{n+1}$, $n\in\N$ is a Cauchy sequence.\\
\noindent (iii) Let $(X,d)$ be a metric space and let $Y \subset X$ . Show that a subset $A \subset Y$ is open in
$Y$ if and only if there exists a subset $B$ open in $X$ such that $A=B \cap Y$.\\
\vspace{.5in}
\noindent 6. (i) Prove from the definition that the Riemann integral $\int^1_0 (2x+1)dx$ exists.\\
\noindent (ii) Decide whether the following series converge and justify your answers briefly:\\
$\sum^{\infty}_{n=0} (-1)^n \frac{1}{2n+1}$, $\sum^{\infty}_{n=1} \frac{2^n n!}{n^n}$,$\sum^{\infty}_{n=1} \frac{\ln n^2}{n}$. \\
\vspace{.5in}
\noindent 7. Suppose that $(X,d)$ is a complete metric space and
$T$ is a map from $X$ to itself such that for all $x,y \in X$
$d(T(x),T(y)) \leq k d(x,y)$ where $0 < k < 1$. Prove that there
is a unique $x_0 \in X$ such that $T(x_0)=x_0$.
\newpage
\begin{center}
\noindent Part 2. Complex Analysis. 100\% will be obtained for \emph{complete} answers to four questions. Indicate
clearly which four questions you wish to be graded.
\end{center}
\vspace{.3in}
\noindent 1. (i) Evaluate completely $(1+i)^{(1-i)}$.\\
\noindent (ii) Determine either from the definition or by means of the Cauchy-Riemann equations the points in
$\C$ where the function $f(z)=z\bar{z}$ is differentiable as a complex function.
\vspace{.4in}
\noindent 2. (i) Define $f(z)=e^{(\frac{1}{z})} \quad (z \neq
0), f(0)=0$. At what points is $f(z)$
differentiable as a complex function? Justify your answer.\\
\noindent (ii) The complex numbers $z_1,z_2$ and $z_3$ are the vertices of an isosceles right-angled triangle
with the right angle at $z_3$. Prove that $(z_1-z_3)^2=2(z_1-z_3)(z_2-z_3)$.
\vspace{.4in}
%\noindent 2 (i) Let $w=f(z)=u(x,y)+iv(x,y)$ be complex-analytic in some region $D$ of $\C$. Show that the pair
%$(u(x,y),v(x,y))$ satisfies the Cauchy-Riemann equations in $D$.
%\noindent (ii) Find a complex analytic function whose real part is\\
%\noindent (a) $x^3-3xy^2$.\\
%\noindent (b) $\exp(x)\cos(y)$.
\noindent 3. (i) Find a complex analytic function whose real part is $e^x(x\cos(y)-y\sin(y))$.\\
(ii) Show that the M\"obius transformation $T$ preserves the cross ratio: that is if $w_i=T(z_i) \quad (1 \leq i
\leq 4)$ then $\frac{(z_1-z_4)(z_2-z_3)}{(z_1-z_2)(z_3-z_4)}=\frac{(w_1-w_4)(w_2-w_3)}{(w_1-w_2)(w_3-w_4)}$.
\vspace{.4in}
%\noindent 3
%Complete the following statement: Suppose that $f(z)$ is complex-differentiable on the open disk of
%radius $R$ and center $z_0$ and that $0 < \ r < R$. Then $f(z)=\frac{1}{2\pi i} \int ...$. Hence or otherwise
%Evaluate by any valid method $\int_C \frac{dz}{(z-a)(z-b)}$ where $C$ denotes the unit circle centered the origin
%in the complex plane discussing the cases:\\
%depending on the values of $a$ and $b$
%\noindent (i) $|a|,|b| < 1$.\\
%\noindent (ii) $|a| < 1,|b| > 1$.\\
%\noindent (iii) $|a| ,|b| > 1$.\\
\noindent 4. Evaluate by any valid method:\\
(i) $\int^{2\pi}_0 \frac{dx}{a+\cos(x)}$.\\
(ii) By integrating $\frac{e^{iz}}{z}$ over a suitable contour evaluate $\int^{\infty}_0 \frac{\sin(x) dx}{x}$.\\
\vspace{.4in}
\noindent 5. (i) Let $f(z)=\frac{z^3+2z^2+4}{(z-1)^3}$. Find the
Laurent expansion for $f(z)$ about the singular
point $z=1$. For what values of $z$ is this expansion valid?\\
\noindent (ii) Let $C$ be a piecewise smooth closed contour in $\C$. Suppose that $f(z)$ is a analytic inside and
on $C$ and that $a$ and $b$ are distinct points inside $C$. Show that $\int_C \frac{f(z) dz}{(z-a)(z-b)}=
\frac{2\pi i}{a-b}(f(a)-f(b))$.\\
%Deduce Liouville's theorem: a bounded entire function is constant.\\
%\noindent [Hint: Use the assumption that $f(z)$ is bounded to estimate the left hand side and use the fact that a
%function is constant if its values at two arbitrary points are equal.]
\vspace{.4in}
\noindent 6. (i) Evaluate $\int_C
(2z^2+3z+5+\frac{(z^4+2z+1)}{(z-2)}+\frac{1}{(2z-1)})dz$ where $C$
is the unit
circle center at the origin in $\C$.\\
\noindent (ii) Compute the residues of the following functions at the points indicated:\\
$\frac{1}{z^2+1}$ at $z=i$, $\frac{1}{(z-\sin(z)}$ at $z=0$.
\vspace{.4in}
%\noindent 7 (i) $\int^{\infty}_{-\infty} \frac{ dx}{(1+x^2)^2}$.\\
\noindent 7. (i) Find a Mobius transformation that maps $1$, $2$ and $i$ to $i$,$\infty$ and $1$, respectively.\\
%\noindent 7 (i) State Rouche's Theorem relating the location of the roots of two polynomials with complex
%coefficients. Show that the roots of the equation $z^4+z+1=0$ lie between the circles $z=\frac{5}{4}$ and
%$z=\frac{2}{3}$.
\noindent (ii) Evaluate $\int_C \frac{(z^4+2z+1) dz}{(z-2)^4}$ where $C$ in any piecewise smooth closed contour
containing the point $z=2$.
\bigskip
\end{document}
|
https://is.jabok.cz/cv/cv?lang=en;uco=4048;zjazyk=cze;varianta=9;tiskproh=latex | jabok.cz | CC-MAIN-2023-14 | application/x-text | application/x-tex | crawl-data/CC-MAIN-2023-14/segments/1679296949642.35/warc/CC-MAIN-20230331113819-20230331143819-00160.warc.gz | 378,132,370 | 2,546 | \documentclass[12pt]{article}
\usepackage[latin2]{inputenc}
\usepackage[czech]{babel}
\newenvironment{ul}{\begin{itemize}}{\end{itemize}}
\newenvironment{ol}{\begin{enumerate}}{\end{enumerate}}
\begin{document}\noindent
\vspace{1.2cm}{\LARGE {\bfseries Jana Zajícová}}
\vspace{0.8cm} \noindent {\bfseries Současné pracoviště}
\begin{ul}
\item Vyšší odborná škola sociálně pedagogická a teologická Jabok\\
\noindent Salmovská 8\\
\noindent 120 00 Praha 2\\
\noindent
\end{ul} \noindent
{\bfseries Funkce}
\begin{ul}
\item učitelka
\end{ul} \noindent
{\bfseries Dřívější zaměstnání}
\begin{ul}
\item 2000 - 2003 vedoucí redaktorka Magazínu AD - Křesťanství a svět, Portál s.r.o.\\
\noindent
\item 1991 - 2000 redaktorka Magazínu AD - Křesťanství a svět, Portál s.r.o.\\
\noindent
\item 1982 - 1984 učitelka hudby v Lidové škole umění Praha 9 - Vysočany\\
\noindent
\item 1980 - 1982 učitelka hudby v Lidové škole umění Praha 6 - Břevnov\\
\noindent
\item 1977 - 1978 učitelka hudby v Lidové škole umění Praha 6 - Bubeneč\\
\noindent
\end{ul} \noindent
{\bfseries Vzdělání}
\begin{ul}
\item Vyšší odborné: Konzervatoř v Praze, obor hudební
\end{ul} \noindent
{\bfseries Kurzy a výcviky}
\begin{ul}
\item 2014 Výcvik pro práci s metodou Instrumentálního obohacování R. Feuersteina, Cogito - Centrum kognitivní edukace\\
\noindent
\item 2014 Práce s dětskou kresbou, poradenský psycholog Zdeněk Altman\\
\noindent
\item 2009 - 2014 Sebezkušenostní psychoterapeutický výcvik REMEDIUM II, Remedium Praha\\
\noindent
\item 2009 Muzikoterapeutický kurz Matěje Lipského: Muzikoterapie a životní cesta, Praha\\
\noindent
\item 2006 Kurz anglického jazyka, Lilian Bishop school, Londýn\\
\noindent
\item 2005 Muzikoterapeutický kurz Alfréda Moréna, Fokus Praha\\
\noindent
\item 1999 - 2000 Výcvik krizové intervence, SOS Centrum Diakonie Praha\\
\noindent
\item 1994 Kurz pro píšící novináře, Svobodná Evropa\\
\noindent
\item 1986 - 1990 Teologický kurz, bytové semináře Praha\\
\noindent
\end{ul} \noindent
{\bfseries Výuka na VOŠ Jabok}
\begin{ul}
\item Metody muzikoterapie pro výchovu a rozvoj\\
\noindent
\item Cílená muzikoterapie\\
\noindent
\item Diplomní seminář\\
\noindent
\item
\end{ul} \noindent
{\bfseries Výuka v kurzech dalšího vzdělávání}
\begin{ul}
\item Muzikoterapie pro celostní rozvoj osobnosti\\
\noindent
\item Komunikace ve skupině prostřednictvím hudby, pohybu a výtvarné činnosti\\
\noindent
\item
\end{ul} \noindent
{\bfseries Členství v orgánech a dobrovolnická činnost}
\begin{ul}
\item 2004 - 2006 členkou Školské rady Vyšší odborné školy publicistiky\\
\noindent
\item 1999 - 2000 telefonická krizová intervence na Lince důvěry SOS Diakonie\\
\noindent
\item 1990 - dosud: pastorační činnost, vedení katechezí a vyučování náboženství v Římskokatolické farnosti Praha 4 - Michle\\
\noindent
\item 1990 - 1996 vedení katechezí a vyučování náboženství v~ Římskokatolické farnosti Praha 4 - Spořilov\\
\noindent
\end{ul} \noindent
{\bfseries Publikační a přednášková činnost}
\begin{ul}
\item Zajícová, Jana. Bůh je tady. Vydání první. Praha: Portál, 2018. 72 stran. ISBN: 978-80-262-1405-2\\
\noindent
\item Zajícová Jana: Muzikoterapie v historii a současnosti. Přednáška pro Českou křesťanskou akademii Tachov 6. 10. 2010\\
\noindent
\item Zajícová, Jana. Recenze knihy V bezpečí a svoboden. Univerzum 1/2010\\
\noindent
\item Zajícová, Jana. Recenze sborníku Pastorální a etické výzvy v oblasti manželství, rodiny a sexuality. Univerzum 6/2009\\
\noindent
\item Zajícová, Jana. Medvědí náruč s ženskou duší. Teologie \& Společnost, Speciál 2005\\
\noindent
\item Zajícová, Jana. Jabok má pět P. Salesiánská rodina 1/2005\\
\noindent
\item Zajícová, Jana. Ádéčko v hodině pravdy. Katolický týdeník 7/2001\\
\noindent
\item Zajícová, Jana. Budou věřit naše děti? Katolický týdeník 11/2000\\
\noindent
\item Zajícová, Jana. Autorské články v Magazínu AD - Křesťanství a svět, Portál 1993 - 2003\\
\noindent
\end{ul} \noindent
{\bfseries Účast na konferencích a umělecká činnost}
\begin{ul}
\item 2016 - Mezinárodní konference kreativních terapií Space for art therapies\\
\noindent
\item 1987 - 1991 členkou a sólistkou komorního smyčcového orchestru Quatro Corde\\
\noindent
\item 1989 koncertní cesta Bulharsko\\
\noindent
\item 1988 koncertní cesta Velká Británie, Holandsko, Belgie\\
\noindent
\item 1987 koncertní cesta Švýcarsko, NSR\\
\noindent
\item 1986 Večer autorské poezie Jany Zajícové a Michala Vondráčka v~ přednesu Radovana Lukavského a Veroniky Žilkové, Vyšehradské probošství v Praze\\
\noindent
\end{ul} \noindent
\vspace{0.5cm} \noindent 15. 8. 2019
\vspace{0.5cm} \noindent \end{document}
|
https://www.andrew.cmu.edu/course/15-251/Assignments/assignment03/hw03.tex | cmu.edu | CC-MAIN-2022-40 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2022-40/segments/1664030335004.95/warc/CC-MAIN-20220927100008-20220927130008-00309.warc.gz | 678,807,942 | 4,116 | \documentclass[12pt]{exam}
\usepackage{amsmath}
\usepackage{amssymb}
\usepackage[left=1in, right=1in, top=1in, bottom=1in]{geometry}
\newcommand\Q[1]{\question{\large{\textbf{#1}}}}
\newcommand\modulo{\ \texttt{\%}\ }
\newcommand\lshift{\ \texttt{<<}\ }
\newcommand\rshift{\ \texttt{>>}\ }
\newcommand\cgeq{\ \texttt{>=}\ }
\newcommand{\answerbox}[1]{
\begin{framed}
\hspace{5.65in}
\vspace{#1}
\end{framed}}
\pagestyle{head}
\headrule \header{\textbf{15-251 Assignment 3}}{}{\textbf{Page
\thepage\ of \numpages}}
\pointsinmargin \printanswers
\setlength\answerlinelength{2in} \setlength\answerskip{0.3in}
\newcommand{\Z}{\mathbb{Z}}
\newcommand{\N}{\mathbb{N}}
\begin{document}
\addpoints
\begin{center}
\textbf{\large{15-251 : Great Theoretical Ideas In Computer Science
\\ \vspace{0.2in} Fall 2014
\\ \vspace{0.2in} Assignment 3
}}
\vspace{0.2in}
\large{Due: Thursday, Sep. 18, 2014 11:59 PM}
\end{center}
\vspace{0.5in}
\hbox to \textwidth{Name:\enspace\hrulefill}
\vspace{0.2in}
\hbox to \textwidth{Andrew ID:\enspace\hrulefill}
\vspace{0.2in}
% End title box
\vspace{0.5in}
\vspace*{1in}
\begin{center}
\gradetable[h][questions]
\end{center}
\begin{questions}
\setcounter{question}{-1}
\setcounter{numquestions}{-1}
\newpage\Q{Warmup}
\begin{parts}
\part{Suppose there are 170 CS majors, 80 ECE majors and 50 math majors in a class. Of these, 30 are
double majors in CS and ECE, 10 are double majors in ECE and math. If five students are triple
majors and there are 250 total students, how many of the students are double majors in CS and
math?}
\vspace{0.5in}
\part{How many ways can 6 pirates split 50 gold pieces if the first pirate needs at least 10 pieces, the
second needs at least 8, the third needs at least 6, the fourth needs at least 4, and the fifth needs
at least 2, and the sixth didn't really help with the plundering, so he can get any amount?
}
\vspace{0.5in}
\part{We have $n$ sandwiches to give out to some kittens. Each kitten is going to be assigned 2 sandwiches, and every sandwich can be assigned to multiple kittens. How many kittens do we need to in order to guarantee that there will be two kittens which are assigned the same 2 sandwiches?}
\vspace{0.5in}
\part{How many distinguishable ways are there to rearrange the letters in \\``OHMYGODIMONFIRE'' ?
}
\vspace{0.5in}
\part{Explain why \[\binom{3n}{3} = 3 \binom{n}{3} + 6 \binom{n}{2} n + n^3\] by counting in two ways. Come up with a set that both of these expressions count. (Hint: Start with the simpler side)}
\end{parts}
\newpage\Q{More Problems Than You Can Count}
\begin{parts}
\part[10] Klaas loves painting, and he wanted to include Peter in his hobby, so he challenged him to a painting game. Klaas will paint 29 points in the plane such that for any 3 points, at least two of them are at a distance less than one unit from each other. Then, if Peter could draw a unit circle around at least 15 of the points, he would win. If not, then Klaas wins. \\
Assuming that Klaas and Peter both play optimally, who will win this game? Prove your answer.
\begin{solution}
\end{solution}
\vspace{0.5 in}
\part[10] When you place an order at Razzy Fresh, you must choose either vanilla or chocolate frozen yogurt. Also, you must choose EXACTLY 2 toppings. There are 10 to choose from, 4 of which contain nuts, and 6 of which do not. An order consists of both a flavor and a choice of toppings.\\
Patrick decides to send his students on a field trip. There are 15,251 students, 7,625 or whom are female and 7,626 of whom are male. Every student will choose one of 250 Razzy locations in Pittsburgh to visit, with the restriction that the number of boys and girls in each Razzy store must differ by at most 1. In each restaurant, the students group into as many male/female couples as possible. Each couple will then place one order for the two of them to share. Since they want to feel special, every couple must choose a different order than all the other couples in their own restaurant. (If there is a single person left over, they can order whatever they want). \\
However, you are worried because every male student is allergic to nuts, and will die if they eat any. Patrick believes that there is a way for everyone to follow these rules and eat their frozen yogurt without anyone dying. Is he correct? Prove your answer.
\begin{solution}
\end{solution}
\end{parts}
\newpage\Q{Why Can't I Count All These Arrangements?}
\bigskip
\begin{parts}
\part[10] In lecture, we showed that the number of ways to divide 20 pieces of gold amongst 5 pirates is $\binom{24}{4}$ by counting all strings with $20$ G's and $4$ /'s. \\ \\
The following alternate method was suggested to count such strings: \\
Write down 20 G's. Each of the $4$ /'s can go to $21$ places, for a total of $21^4$ possibilities. The /'s are ``indistinguishable'', so their odering does not matter. Thus, we divide by $4!$ since we could have placed the $4$ /'s in any order. So the answer must be \[ \frac{21^4}{4!} \]
However, this is certainly not correct as it is not equivalent to our answer $\binom{24}{4}$, and in fact it is not even an integer! \\
Explain carefully and concisely what is wrong with this approach. In particular, does it overcount or undercount? Why?
\begin{solution}
\end{solution}
\vspace{0.5 in}
\part[15] David and Taehoon are making shishkebabs. Together, they have $b$ pieces of beef and $o$ pieces of onion, and
they will each get one shishkebab. A shishkebab is some non-empty sequence of pieces of onion and pieces of
beef, but neither person wants two pieces of beef next to each other. Also, they want to use up all of the pieces of beef and onion that they have. In how many ways can they create and choose their two shishkebabs? \\
For example, with $b=3, o=2$, there are 10 possible ways.
$(B, BOBO), (B, OBOB), (B, BOOB), (BO, BOB), (OB, BOB), \\
(BOB, BO), (BOB, OB), (BOBO, B), (OBOB, B), (BOOB, B)$
\begin{solution}
\end{solution}
\end{parts}
\newpage\Q{Counting Identities} \\
\begin{parts}
\part[15] Show that \\
\[\sum_{i=0}^{m}{ \binom{n-i}{m-i} \binom{k+i}{i}} = \binom{n+k+1}{m} \] \\
by making a combinatorial argument, i.e. counting in two ways. You should assume that $n \ge m$.
\begin{solution}
\end{solution}
\vspace{0.5 in}
\part[15] The binomial theorem \[(x+y)^n = \sum_{k=0}^{n} \binom{n}{k} x^ky^{n-k} \] can be related to many problems in combinatorics. Use the binomial theorem to prove the following identity. \\
\[ \sum_{i=k}^{n}{\binom{i}{k}\binom{n}{i}} = \binom{n}{k}2^{n-k} \]
\begin{solution}
\end{solution}
\end{parts}
\newpage\Q{Counting to 251}
\begin{parts}
\part[3] Andy has tennis balls labeled $1 \dots 251$ in a pile that he wants to break apart. At each step, he chooses a pile with at least $2$ balls in it and splits it into two non-empty piles, not necessarily of equal size. He repeats this process until all the piles are of size $1$. \\
How many steps will this process take? \\
\begin{solution}
\end{solution}
\part[12]
Prove that the number of ways for Andy to carry out the process from part (a) is
\[\binom{251}{2}\binom{250}{2}\binom{249}{2} \cdots \binom{2}{2} \]
For two ways to be considered identical, they must split the same set and create the same two subsets at every single step in the process.
\begin{solution}
\end{solution}
\vspace{0.5 in}
\part[10] Victor and Venkat are helping their students to form homework groups, so they have every student fill out a form listing all of the other students who they would be willing to work with. \\
There are 251 students in the class, and every student lists exactly 168 other students who they would be willing to work with. For any two students in the class, if student A puts student B on their list, then student B will also have student A on their list. \\
Show that there must be some group of 4 students who are all willing to work with one another.
\begin{solution}
\end{solution}
\end{parts}
\end{questions}
\end{document}
|
http://www.aips.nrao.edu/TEXT/PUBL/AIPSMEMO68.TEX | nrao.edu | CC-MAIN-2022-33 | application/x-tex | text/x-matlab | crawl-data/CC-MAIN-2022-33/segments/1659882572063.65/warc/CC-MAIN-20220814173832-20220814203832-00344.warc.gz | 49,975,380 | 6,118 | %-----------------------------------------------------------------------
%; Copyright (C) 1995
%; Associated Universities, Inc. Washington DC, USA.
%;
%; This program is free software; you can redistribute it and/or
%; modify it under the terms of the GNU General Public License as
%; published by the Free Software Foundation; either version 2 of
%; the License, or (at your option) any later version.
%;
%; This program is distributed in the hope that it will be useful,
%; but WITHOUT ANY WARRANTY; without even the implied warranty of
%; MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
%; GNU General Public License for more details.
%;
%; You should have received a copy of the GNU General Public
%; License along with this program; if not, write to the Free
%; Software Foundation, Inc., 675 Massachusetts Ave, Cambridge,
%; MA 02139, USA.
%;
%; Correspondence concerning AIPS should be addressed as follows:
%; Internet email: [email protected].
%; Postal address: AIPS Project Office
%; National Radio Astronomy Observatory
%; 520 Edgemont Road
%; Charlottesville, VA 22903-2475 USA
%-----------------------------------------------------------------------
% Summary of standard aips calibration process.
% last edited by glen langston
\documentstyle{article}
\newcommand{\lastedit}{{\it 91 April 04}}
\large
\parskip 3mm
\textwidth 6.5in
\linewidth 6.5in
\marginparsep 0in
\oddsidemargin 0in
\evensidemargin 0in
\topmargin -.5in
\headheight 0in
\headsep 0.25in
\textheight 9.25in
\headheight 0.25in
\pretolerance=10000
\parindent 0in
\newcommand{\beq}{\begin{equation}} % start equation
\newcommand{\eeq}{\end{equation}}
\newcommand{\uvdata}{{\it uv}-data~}
\newcommand{\beddes}{\begin{description} \leftmargin 2cm} % description list
\newcommand{\eeddes}{\end{description}} % description list
\newcommand{\backs}{$\backslash$}
\newcommand{\myitem}[1]{\item{\makebox[2cm][l]{\bf {#1}}}}
\newcommand{\mybitem}[1]{\item{\makebox[0.65cm][l]{\sc {#1}}}}
\newcommand{\AIPS}{{$\cal AIPS$~}}
\newcommand{\APEIN}[1]{{\normalsize \sc {#1}}}
\newcommand{\IF}{{\normalsize \sc IF}~}
\newcommand{\SN}{{\normalsize \sc SN}~}
\newcommand{\SU}{{\normalsize \sc SU}~}
\newcommand{\CL}{{\normalsize \sc CL}~}
\newcommand{\TCTES}{{\normalsize \sc 3C286}~}
\newcommand{\TCOTE}{{\normalsize \sc 3C138}~}
\newcommand{\normalstyle}{\baselineskip 7mm \parskip 1mm \large}
\newcommand{\tablestyle}{\baselineskip 4mm \parskip 0mm \normalsize }
\begin{document}
\pagestyle{myheadings}
\newcommand{\HEADING}{{\it \AIPS Calibration Summary} \hfill
\AIPS Memo Number 68 \hfill Page~~}
\markboth{\HEADING}{\HEADING}
\vskip -.5cm
\pretolerance 10000
\normalstyle
\listparindent 0cm
\labelsep 0cm
\centerline{\huge{\it Summary of \AIPS UV-data Calibration}}
\centerline{{\it From VLA Archive Tape to a UV FITS Tape}}
%\centerline{Glen Langston and Dean Schlemmer}
\centerline{\lastedit}
The Gentle User enters the Computer room with their VLA archive
tape containing a scientific breakthrough.
For the sake of demonstration, let's call the user's sources
\APEIN{source1} and \APEIN{source2}.
The interferometer phase is calibrated by observations of the
calibration sources \APEIN{cal1} and \APEIN{cal2}.
The flux density scale is calibrated by observing \TCTES.
Mount your tape on drive number {\it n}, log in and start \AIPS.
Example user input: \APEIN{AIPS NEW}. Mount the tape:
\APEIN{INTAP {\it n}; DENS=6250; MOUNT}.
\beddes
\myitem{PRTTP} Find out what is on the tape, get project number and
bands: \APEIN{TASK='PRTTP'; PRTLEV=-2; NFILES=0; INP;GO; WAIT; REWIND}.
\myitem{FILLM} Load your data from tape.
\APEIN{TASK='FILLM'; VLAOBS='?'; BAND=''; DOALL=1; NFILES={\it m}; INP;GO}.
FILLM will load your visibilities (UV data) into a large file
and create 6 \AIPS tables.
The tables have two letter names:
\tablestyle
\beddes
\mybitem{HI} Human readable history of things done to your data.
Use PRTHI to read it.
\mybitem{AN} Antenna location and polarization tables. Antenna
polarization calibration is placed here.
\mybitem{NX} Index into visibility file based source name and
observation time. Not modified by calibration.
\mybitem{SU} Source table contains the list of sources observed
and indexes into the frequency table. The flux densities of the
calibration sources are entered into this table.
\mybitem{FQ} Frequencies of observation and bandwidth with index
into visibility data. Not modified.
\mybitem{CL} Calibration table describing the antenna based gains.
Version 1 should never be modified. Ultimate goal of calibration
is to create a good version 2. Use PRTAB to read tables.
\eeddes
\normalstyle
\myitem{PRTAN} Print out the antenna locations (\APEIN{PRTLEV=0; TASK
'PRTAN'; INP; GO}) and choose a good Reference antenna
near the center of the array (\APEIN{REFANT=?}). Check the VLA
operater log to make sure the antenna was OK during the entire observation.
\myitem{LISTR} Lists your UV data in a variety of ways. Make a list
of your observations:
\APEIN{TASK='LISTR'; OPTYP='SCAN'; DOCRT=-1; CALCODE=''; SOUR=''; TIMER 0;
INP;GO}. NOTE: If you have observed in a such a way as to create more than one
\APEIN{FREQID}, you must run through the entire calibration procedure which
follows {\it ONCE FOR EACH} \APEIN{FREQID}. For new users, it is better at this
point to use \APEIN{UVCOP} to copy each \APEIN{FREQID} into separate files
and then calibrate each file separately.
\myitem{UVCOP} Skip this step if your data consists of only one
\APEIN{FREQID}. Copies different \APEIN{FREQID}s into separate files.
\APEIN{TAST='UVCOP'; FREQID=?; OUTNAME='?'; OUTDI=INDI
; INP; GO}. The
result will be a .\APEIN{UVCOP} file.
\myitem{SETJY} Sets the flux of your flux calibration source in the \SU
table:
\APEIN{TASK='SETJY'; SOUR='3C286',''; OPTYP='CALC'; INP;GO}.
\myitem{TASAV} As insurance, make a copy of all your tables:
\APEIN{TASK='TASAV'; CLRON; OUTDI=INDI; INP;GO}.
\myitem{CALIB} \APEIN{CALIB} is the heart of the \AIPS
calibration package.
Execute \APEIN{VLAPROCS}, an \AIPS ``runfile'', to create
procedures \APEIN{VLACALIB, VLACLCAL} and \APEIN{VLARESET} (\APEIN{RUN
VLAPROCS}). The procedure \APEIN{VLACALIB} runs \APEIN{CALIB}.
Set the UV and Antenna limits for \APEIN{3C286}.
For L, C and X band, 10\% and 10 degree errors are OK;
for other bands the limits are higher.
\tablestyle
\beddes
\mybitem{SN} Solution table contain antenna based gains corrections.
These \SN table results are latter placed in a \CL table by task
\APEIN{CLCAL}.
\eeddes
\normalstyle
\APEIN{TASK='VLACAL'; CALS='3C286',''; CALCODE='*';~REFANT=?;
UVRA=0; MINAMP=10; MINPH=10; INP; VLACAL}.
The task \APEIN{CALIB} lists antenna pairs which deviate
significantly from the solution.
\myitem{TVFLG} If you have lots of errors, then
carefully examine your data using \APEIN{TVFLG}. (See \AIPS Cookbook)~
If only a few antenna pairs are bad over a limited time range, use
\APEIN{UVFLG} to flag that antenna for the time from just after the previous
good \APEIN{cal} observation to before the next good \APEIN{cal} observation
and then run \APEIN{VLACAL} again.
\myitem{UVFLG} Flags bad UV-data. Skip this step if you have no bad data.
\APEIN{TASK='UVFLG'; ANTEN=?,0; BASELI=0; TIMER=?; FLAGV=1;
SOUR=''; OPCOD=''; INP;GO}.
If in doubt about any \uvdata, \APEIN{FLAG THEM!}
This will create a Flag Table (\APEIN{FG}). You want to use
\APEIN{FG} table version 1 for all tasks.
\tablestyle
\beddes
\mybitem{FG} A flag table marks bad data. FG tables contain
an index into the UV data based
on time range, antenna number, frequency and \IF number.
\eeddes
\normalstyle
\myitem{CALIB} Now calibrate the antenna gain based on the
rest of the cal sources.
Look in the Calibrator manual for UV limits; If there are limits,
\APEIN{VLACAL} must be run separately for these sources (i.e. enter \APEIN{
TGET VLACAL; CALS='?',''; ANTEN=?; BASELI=0; INP; VLACAL} for \APEIN{cal1}
and then again for \APEIN{cal2}). Otherwise:
\APEIN{TGET VLACAL; CALS='cal1','cal2',''; ANTENN=0; BASELI=0; INP; VLACAL}.
Flag bad baselines listed. Continue if only a few are listed, otherwise
run VLACAL again.
\myitem{GETJY} Sets the flux of phase calibration sources in the \SU table.
\APEIN{TASK 'GETJY'; SOUR='cal1','cal2',''; CALS='3C286','';
BIF=0; EIF=0; INP;GO}.
\myitem{TASAV} Good time to save your tables:
\APEIN{TGET='TASAV'; OUTDI=INDI; CLRON; INP;GO}.
\myitem{CLCAL} Calibrate the antenna gain and interpolates it into
a new \CL table.
Each execution of \APEIN{CLCAL} adds to
output \CL table version 2.
\APEIN{CLCAL} is run using the procedure \APEIN{VLACLCAL}.~
\APEIN{TASK='VLACLC'; SOUR='source1','cal1',''; CALS='cal1','';
OPCODE='CALI'; TIMER=0; INTERP='2PT'; INP; VLACLC}.
Run \APEIN{CLCAL} for the second source using the second calibrator:
\APEIN{TGET VLACLC; SOUR='source2','cal2',''; CALS='cal2',''; INP;
VLACLC}. Next, self-calibrate the flux calibrator: \APEIN{TGET VLACLC;
SOUR='3C286',''; CALS='3C286',''; INP; VLACLC}.~
\myitem{LISTR} Make a matrix listing of the Amplitude and RMS of
calibration sources with calibration applied:
\APEIN{TASK='LISTR'; OPTYP='MATX'; SOUR='cal1','cal2',''; DOCAL=1;
DOCRT=-1; DPARM=3,1,0; UVRA=0; ANTEN=0; BASELI=0; BIF=1; INP;GO}.~
Look for antenna pairs with wild RMSs and flag them with \APEIN{UVFLG}.
If only a few are bad, continue, else delete \CL table 2 and the \SN table
using \APEIN{VLARESET}. Then return to the first \APEIN{CALIB} step.
If the data look good, run \APEIN{LISTR} again for the remaining
\IF(s). \APEIN{TGET LISTR; BIF=2; INP;GO}
\myitem{UVPLT} Plots the \uvdata in a variety of ways. Make at Flux
versus Time plot first. Choose \APEIN{XINC} so the plot will have
approximately 1000 points (divide the number of visibilities by 1000 and
choose the closest prime number to that).
Set \APEIN{ANTEN=0; BASELI=0; TIMER=0}. Then:
\APEIN{TASK='UVPLT'; SOUR='source1','',''; XINC=13; BPARM(1)=11;
DOCAL=1; BIF=1; INP;GO}.~
Repeat \APEIN{UVPLT} with your calibrators also.
Look at the plots with \APEIN{QMSPL, TVPL} or \APEIN{TXPL} (for plotting
on the QMS, the TV, or the terminal, respectively).
Plot other \IF(s). Flag wild points using \APEIN{UVFND} and either
\APEIN{UVFLG} or \APEIN{CLIP}. Plot Flux versus baseline:
\APEIN{TGET UVPLT; BPARM=0; INP;GO}.
If the calibration failed because of a bad reference antenna or too much
noisy data, you may reset the parameters with: \APEIN{INP VLARESET; VLARESET}
This will bring you back to the first \APEIN{CALIB} step above.
\eeddes
Calibration is now complete for continuum, un-polarized observations.
Skip down to FITTP.
For polarization observations, the following steps are required.
For 21cm or longer wavelength observations, ionospheric Faraday
rotation corrections may be needed. See FARAD in the \AIPS cookbook.
\begin{figure}[h]
\vskip 4in
{\it \hskip 1.5in a) \hfill b) \hskip 1.5in}
{\bf Figure:}
{\it a)} Uncalibrated \uvdata and {\it b)}
calibrated \uvdata from an X-band snapshot of 3C286.
Default VLA gains are a tenth of the actual gains and
show significant scatter.
Only wild \uvdata points $\sim$50 \% greater than the average
can be detected before calibration.
\end{figure}
\clearpage
\centerline{\bf{POLARIZATION CALIBRATION}}
\beddes
\myitem{TASAV} As added insurance, save your tables again:
\APEIN{TGET TASAV; INP;GO}.
\myitem{LISTR} Examine the parallactic angles of your calibrator observations:
\APEIN{TASK='LISTR'; ANTEN=0; SOUR=''; CALCOD='*'; OPTYPE='GAIN'; DPARM=9,0;
INP; GO.}
\myitem{PCAL} Intrinsic antenna polarization calculation. This step
is only possible if you have observed calibration sources at many
parallactic angles. PCAL will only modify the \APEIN{AN} table.
\APEIN{TASK='PCAL'; CALS='cal1','cal2',''; BIF=1; EIF=2;
REFANT=?; INP;GO}
\myitem{TACOP} Make a copy of the last \APEIN{CL} table;
In case the \APEIN{CLOCR} fails, the original \APEIN{CL} table will be
preserved. \APEIN{TASK='TACOP'; OUTDI=INDI ; INEXT='CL'; INVER=2; NCOUNT=1;
OUTVER=3; INP; GO}. Use \APEIN{CL} table version 3 for all following steps.
\myitem{LISTR} Now determine the absolute linear
polarization angle. Make a matrix listing of the angle of \TCTES.
The observed angles
are different for each frequency and \IF.
\APEIN{TASK='LISTR'; SOUR='3C286',''; DOCAL=1; GAINUSE=3; BIF=1; DOPOL=1;
OPTYP='MATX';
INP; GO}.
Record the matrix average angle, $\phi_1$, for \IF 1.
Run LISTR again for \IF 2.
\APEIN{TASK='LISTR'; BIF=2; INP; GO}.
Record the matrix average angle, $\phi_2$, for \IF 2.
\myitem{CLCOR} Now apply the angle correction to CL table 3.
\APEIN{CLCOR} needs only to be run once, unless you make a mistake.
The phase correction is applied to the Left circularly polarized
signal. (The relative phase of L and R produces the
linear polarization angle)
The angle of linear polarization for \TCTES is $66^o$.
(For \TCOTE, $\phi=-24^o$.)
\APEIN{TASK='CLCOR'; STOKES='L'; SOUR=''; OPCOD='POLR'; BIF=1; EIF=2;
\mbox{GAINVER=3; CLCORPA=66-$\phi_1$,66-$\phi_2$,0;} INP; GO}.~
Run \APEIN{LISTR} again to check the phases.~
\APEIN{TGET LISTR; DOPOL=1; INP; GO}.~
Check the phases, if they are wrong run \APEIN{CLCOR} again.
\APEIN{TGET CLCOR; OPCOD='PHAS';
\mbox{CLCORPA=66-$\phi'_1$,66-$\phi'_2$,0;} INP;GO}~
\myitem{FITTP} Writes the output \uvdata to tape.
\APEIN{DISMOUNT} your archive; \APEIN{MOUNT} your output tape.
\APEIN{TASK='FITTP'; DOEOT=-1;BLOCK=10; OUTTAP=INTAP; INP;GO}.
\myitem{Mapping} See \AIPS cookbook for instructions on
using \APEIN{TASK='SPLIT'} to create a single source data set.
Next use your favorite Fourier Transform task
(i.e. \APEIN{MX} or \APEIN{HORUS}).
Automatic imaging and self-calibration is now possible using the \AIPS
procedure \APEIN {MAPIT}. See the \AIPS \APEIN {MAPIT} memo for more details.
\eeddes
Please send comments to Glen Langston or Dean Schlemmer, NRAO-Charlottesville.
E-mail addresses: [email protected], [email protected]
\end{document}
|
https://browse.dgit.debian.org/yosys.git/plain/manual/PRESENTATION_ExSyn.tex?id=816fe6bbe0ad90f7a696dd208dae6db8139dfd00 | debian.org | CC-MAIN-2021-49 | text/plain | application/x-tex | crawl-data/CC-MAIN-2021-49/segments/1637964358842.4/warc/CC-MAIN-20211129194957-20211129224957-00579.warc.gz | 229,707,958 | 5,508 |
\section{Yosys by example -- Synthesis}
\begin{frame}
\sectionpage
\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\subsection{Typical Phases of a Synthesis Flow}
\begin{frame}{\subsecname}
\begin{itemize}
\item Reading and elaborating the design
\item Higher-level synthesis and optimization
\begin{itemize}
\item Converting {\tt always}-blocks to logic and registers
\item Perform coarse-grain optimizations (resource sharing, const folding, ...)
\item Handling of memories and other coarse-grain blocks
\item Extracting and optimizing finite state machines
\end{itemize}
\item Convert remaining logic to bit-level logic functions
\item Perform optimizations on bit-level logic functions
\item Map bit-level logic gates and registers to cell library
\item Write results to output file
\end{itemize}
\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\subsection{Reading the design}
\begin{frame}[fragile]{\subsecname}
\begin{lstlisting}[xleftmargin=0.5cm, basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=ys]
read_verilog file1.v
read_verilog -I include_dir -D enable_foo -D WIDTH=12 file2.v
read_verilog -lib cell_library.v
verilog_defaults -add -I include_dir
read_verilog file3.v
read_verilog file4.v
verilog_defaults -clear
verilog_defaults -push
verilog_defaults -add -I include_dir
read_verilog file5.v
read_verilog file6.v
verilog_defaults -pop
\end{lstlisting}
\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\subsection{Design elaboration}
\begin{frame}[fragile]{\subsecname}
During design elaboration Yosys figures out how the modules are hierarchically
connected. It also re-runs the AST parts of the Verilog frontend to create
all needed variations of parametric modules.
\bigskip
\begin{lstlisting}[xleftmargin=0.5cm, basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=ys]
# simplest form. at least this version should be used after reading all input files
#
hierarchy
# recommended form. fails if parts of the design hierarchy are missing, removes
# everything that is unreachable from the top module, and marks the top module.
#
hierarchy -check -top top_module
\end{lstlisting}
\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\subsection{The {\tt proc} command}
\begin{frame}[fragile]{\subsecname}
The Verilog frontend converts {\tt always}-blocks to RTL netlists for the
expressions and ``processes'' for the control- and memory elements.
\medskip
The {\tt proc} command transforms this ``processes'' to netlists of RTL
multiplexer and register cells.
\medskip
The {\tt proc} command is actually a macro-command that calls the following
other commands:
\begin{lstlisting}[xleftmargin=0.5cm, basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=ys]
proc_clean # remove empty branches and processes
proc_rmdead # remove unreachable branches
proc_init # special handling of "initial" blocks
proc_arst # identify modeling of async resets
proc_mux # convert decision trees to multiplexer networks
proc_dff # extract registers from processes
proc_clean # if all went fine, this should remove all the processes
\end{lstlisting}
\medskip
Many commands can not operate on modules with ``processes'' in them. Usually
a call to {\tt proc} is the first command in the actual synthesis procedure
after design elaboration.
\end{frame}
\begin{frame}[fragile]{\subsecname{} -- Example 1/3}
\begin{columns}
\column[t]{5cm}
\lstinputlisting[basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=verilog]{PRESENTATION_ExSyn/proc_01.v}
\column[t]{5cm}
\lstinputlisting[basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=ys, frame=single]{PRESENTATION_ExSyn/proc_01.ys}
\end{columns}
\hfil\includegraphics[width=8cm,trim=0 0cm 0 0cm]{PRESENTATION_ExSyn/proc_01.pdf}
\end{frame}
\begin{frame}[t, fragile]{\subsecname{} -- Example 2/3}
\vbox to 0cm{\includegraphics[width=\linewidth,trim=0cm 0cm 0cm -2.5cm]{PRESENTATION_ExSyn/proc_02.pdf}\vss}
\vskip-1cm
\begin{columns}
\column[t]{5cm}
\lstinputlisting[basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=verilog]{PRESENTATION_ExSyn/proc_02.v}
\column[t]{5cm}
\lstinputlisting[basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=ys, frame=single]{PRESENTATION_ExSyn/proc_02.ys}
\end{columns}
\end{frame}
\begin{frame}[t, fragile]{\subsecname{} -- Example 3/3}
\vbox to 0cm{\includegraphics[width=\linewidth,trim=0cm 0cm 0cm -1.5cm]{PRESENTATION_ExSyn/proc_03.pdf}\vss}
\vskip-1cm
\begin{columns}
\column[t]{5cm}
\lstinputlisting[basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=ys, frame=single]{PRESENTATION_ExSyn/proc_03.ys}
\column[t]{5cm}
\lstinputlisting[basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=verilog]{PRESENTATION_ExSyn/proc_03.v}
\end{columns}
\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\subsection{The {\tt opt} command}
\begin{frame}[fragile]{\subsecname}
The {\tt opt} command implements a series of simple optimizations. It also
is a macro command that calls other commands:
\begin{lstlisting}[xleftmargin=0.5cm, basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=ys]
opt_const # const folding
opt_share -nomux # merging identical cells
do
opt_muxtree # remove never-active branches from multiplexer tree
opt_reduce # consolidate trees of boolean ops to reduce functions
opt_share # merging identical cells
opt_rmdff # remove/simplify registers with constant inputs
opt_clean # remove unused objects (cells, wires) from design
opt_const # const folding
while [changed design]
\end{lstlisting}
The command {\tt clean} can be used as alias for {\tt opt\_clean}. And {\tt ;;}
can be used as shortcut for {\tt clean}. For example:
\begin{lstlisting}[xleftmargin=0.5cm, basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=ys]
proc; opt; memory; opt_const;; fsm;;
\end{lstlisting}
\end{frame}
\begin{frame}[t, fragile]{\subsecname{} -- Example 1/4}
\vbox to 0cm{\includegraphics[width=\linewidth,trim=0cm 0cm 0cm -0.5cm]{PRESENTATION_ExSyn/opt_01.pdf}\vss}
\vskip-1cm
\begin{columns}
\column[t]{5cm}
\lstinputlisting[basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=ys, frame=single]{PRESENTATION_ExSyn/opt_01.ys}
\column[t]{5cm}
\lstinputlisting[basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=verilog]{PRESENTATION_ExSyn/opt_01.v}
\end{columns}
\end{frame}
\begin{frame}[t, fragile]{\subsecname{} -- Example 2/4}
\vbox to 0cm{\includegraphics[width=\linewidth,trim=0cm 0cm 0cm 0cm]{PRESENTATION_ExSyn/opt_02.pdf}\vss}
\vskip-1cm
\begin{columns}
\column[t]{5cm}
\lstinputlisting[basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=ys, frame=single]{PRESENTATION_ExSyn/opt_02.ys}
\column[t]{5cm}
\lstinputlisting[basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=verilog]{PRESENTATION_ExSyn/opt_02.v}
\end{columns}
\end{frame}
\begin{frame}[t, fragile]{\subsecname{} -- Example 3/4}
\vbox to 0cm{\includegraphics[width=\linewidth,trim=0cm 0cm 0cm -2cm]{PRESENTATION_ExSyn/opt_03.pdf}\vss}
\vskip-1cm
\begin{columns}
\column[t]{5cm}
\lstinputlisting[basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=ys, frame=single]{PRESENTATION_ExSyn/opt_03.ys}
\column[t]{5cm}
\lstinputlisting[basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=verilog]{PRESENTATION_ExSyn/opt_03.v}
\end{columns}
\end{frame}
\begin{frame}[t, fragile]{\subsecname{} -- Example 4/4}
\vbox to 0cm{\hskip6cm\includegraphics[width=6cm,trim=0cm 0cm 0cm -3cm]{PRESENTATION_ExSyn/opt_04.pdf}\vss}
\vskip-1cm
\begin{columns}
\column[t]{5cm}
\lstinputlisting[basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=verilog]{PRESENTATION_ExSyn/opt_04.v}
\column[t]{5cm}
\lstinputlisting[basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=ys, frame=single]{PRESENTATION_ExSyn/opt_04.ys}
\end{columns}
\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\subsection{When to use {\tt opt} or {\tt clean}}
\begin{frame}{\subsecname}
Usually it does not hurt to call {\tt opt} after each regular command in the
synthesis script. But it increases the synthesis time, so it is favourable
to only call {\tt opt} when an improvement can be archieved.
\bigskip
The designs in {\tt yosys-bigsim} are a good playground for experimenting with
the effects of calling {\tt opt} in various places of the flow.
\bigskip
It generally is a good idea to call {\tt opt} before inherently expensive
commands such as {\tt sat} or {\tt freduce}, as the possible gain is much
higher in this cases as the possible loss.
\bigskip
The {\tt clean} command on the other hand is very fast and many commands leave
a mess (dangling signal wires, etc). For example, most commands do not remove
any wires or cells. They just change the connections and depend on a later
call to clean to get rid of the now unused objects. So the occasional {\tt ;;}
is a good idea in every synthesis script.
\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\subsection{The {\tt memory} command}
\begin{frame}[fragile]{\subsecname}
In the RTL netlist, memory reads and writes are individual cells. This makes
consolidating the number of ports for a memory easier. The {\tt memory}
transforms memories to an implementation. Per default that is logic for address
decoders and registers. It also is a macro command that calls other commands:
\begin{lstlisting}[xleftmargin=0.5cm, basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=ys]
# this merges registers into the memory read- and write cells.
memory_dff
# this collects all read and write cells for a memory and transforms them
# into one multi-port memory cell.
memory_collect
# this takes the multi-port memory cell and transforms it to address decoder
# logic and registers. This step is skipped if "memory" is called with -nomap.
memory_map
\end{lstlisting}
\bigskip
Usually it is preferred to use architecture-specific RAM resources for memory.
For example:
\begin{lstlisting}[xleftmargin=0.5cm, basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=ys]
memory -nomap; techmap -map my_memory_map.v; memory_map
\end{lstlisting}
\end{frame}
\begin{frame}[t, fragile]{\subsecname{} -- Example 1/2}
\vbox to 0cm{\includegraphics[width=\linewidth,trim=0cm 0cm 0cm -6cm]{PRESENTATION_ExSyn/memory_01.pdf}\vss}
\vskip-1cm
\begin{columns}
\column[t]{5cm}
\lstinputlisting[basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=ys, frame=single]{PRESENTATION_ExSyn/memory_01.ys}
\column[t]{5cm}
\lstinputlisting[basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=verilog]{PRESENTATION_ExSyn/memory_01.v}
\end{columns}
\end{frame}
\begin{frame}[t, fragile]{\subsecname{} -- Example 2/2}
\vbox to 0cm{\hfill\includegraphics[width=7.5cm,trim=0cm 0cm 0cm -5cm]{PRESENTATION_ExSyn/memory_02.pdf}\vss}
\vskip-1cm
\begin{columns}
\column[t]{5cm}
\lstinputlisting[basicstyle=\ttfamily\fontsize{6pt}{8pt}\selectfont, language=verilog]{PRESENTATION_ExSyn/memory_02.v}
\column[t]{5cm}
\lstinputlisting[basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=ys, frame=single]{PRESENTATION_ExSyn/memory_02.ys}
\end{columns}
\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\subsection{The {\tt fsm} command}
\begin{frame}[fragile]{\subsecname{}}
The {\tt fsm} command identifies, extracts, optimizes (re-encodes), and
re-synthesizes finite state machines. It again is a macro that calls
a series of other commands:
\begin{lstlisting}[xleftmargin=0.5cm, basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=ys]
fsm_detect # unless got option -nodetect
fsm_extract
fsm_opt
clean
fsm_opt
fsm_expand # if got option -expand
clean # if got option -expand
fsm_opt # if got option -expand
fsm_recode # unless got option -norecode
fsm_info
fsm_export # if got option -export
fsm_map # unless got option -nomap
\end{lstlisting}
\end{frame}
\begin{frame}{\subsecname{} -- details}
Some details on the most importand commands from the {\tt fsm\_*} group:
\bigskip
The {\tt fsm\_detect} command identifies FSM state registers and marks them
with the {\tt (* fsm\_encoding = "auto" *)} attribute, if they do not have the
{\tt fsm\_encoding} set already. Mark registers with {\tt (* fsm\_encoding =
"none" *)} to disable FSM optimization for a register.
\bigskip
The {\tt fsm\_extract} command replaces the entire FSM (logic and state
registers) with a {\tt \$fsm} cell.
\bigskip
The commands {\tt fsm\_opt} and {\tt fsm\_recode} can be used to optimize the
FSM.
\bigskip
Finally the {\tt fsm\_map} command can be used to convert the (optimized) {\tt
\$fsm} cell back to logic and registers.
\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\subsection{The {\tt techmap} command}
\begin{frame}[t]{\subsecname}
\vbox to 0cm{\includegraphics[width=12cm,trim=-15cm 0cm 0cm -20cm]{PRESENTATION_ExSyn/techmap_01.pdf}\vss}
\vskip-0.8cm
The {\tt techmap} command replaces cells with implementations given as
verilog source. For example implementing a 32 bit adder using 16 bit adders:
\vbox to 0cm{
\vskip-0.3cm
\lstinputlisting[basicstyle=\ttfamily\fontsize{6pt}{7pt}\selectfont, language=verilog]{PRESENTATION_ExSyn/techmap_01_map.v}
}\vbox to 0cm{
\vskip-0.5cm
\lstinputlisting[xleftmargin=5cm, basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, frame=single, language=verilog]{PRESENTATION_ExSyn/techmap_01.v}
\lstinputlisting[xleftmargin=5cm, basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=ys, frame=single]{PRESENTATION_ExSyn/techmap_01.ys}
}
\end{frame}
\begin{frame}[t]{\subsecname{} -- stdcell mapping}
When {\tt techmap} is used without a map file, it uses a built-in map file
to map all RTL cell types to a generic library of built-in logic gates and registers.
\bigskip
\begin{block}{The built-in logic gate types are:}
{\tt \$\_NOT\_ \$\_AND\_ \$\_OR\_ \$\_XOR\_ \$\_MUX\_}
\end{block}
\bigskip
\begin{block}{The register types are:}
{\tt \$\_SR\_NN\_ \$\_SR\_NP\_ \$\_SR\_PN\_ \$\_SR\_PP\_ \\
\$\_DFF\_N\_ \$\_DFF\_P\_ \\
\$\_DFF\_NN0\_ \$\_DFF\_NN1\_ \$\_DFF\_NP0\_ \$\_DFF\_NP1\_ \\
\$\_DFF\_PN0\_ \$\_DFF\_PN1\_ \$\_DFF\_PP0\_ \$\_DFF\_PP1\_ \\
\$\_DFFSR\_NNN\_ \$\_DFFSR\_NNP\_ \$\_DFFSR\_NPN\_ \$\_DFFSR\_NPP\_ \\
\$\_DFFSR\_PNN\_ \$\_DFFSR\_PNP\_ \$\_DFFSR\_PPN\_ \$\_DFFSR\_PPP\_ \\
\$\_DLATCH\_N\_ \$\_DLATCH\_P\_}
\end{block}
\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\subsection{The {\tt abc} command}
\begin{frame}{\subsecname}
The {\tt abc} command provides an interface to ABC\footnote[frame]{\url{http://www.eecs.berkeley.edu/~alanmi/abc/}},
an open source tool for low-level logic synthesis.
\medskip
The {\tt abc} command processes a netlist of internal gate types and can perform:
\begin{itemize}
\item logic minimization (optimization)
\item mapping of logic to standard cell library (liberty format)
\item mapping of logic to k-LUTs (for FPGA synthesis)
\end{itemize}
\medskip
Optionally {\tt abc} can process registers from one clock domain and perform
sequential optimization (such as register balancing).
\medskip
ABC is also controlled using scripts. An ABC script can be specified to use
more advanced ABC features. It is also possible to write the design with
{\tt write\_blif} and load the output file into ABC outside of Yosys.
\end{frame}
\begin{frame}[fragile]{\subsecname{} -- Example}
\begin{columns}
\column[t]{5cm}
\lstinputlisting[basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=verilog]{PRESENTATION_ExSyn/abc_01.v}
\column[t]{5cm}
\lstinputlisting[basicstyle=\ttfamily\fontsize{8pt}{10pt}\selectfont, language=ys, frame=single]{PRESENTATION_ExSyn/abc_01.ys}
\end{columns}
\includegraphics[width=\linewidth,trim=0 0cm 0 0cm]{PRESENTATION_ExSyn/abc_01.pdf}
\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\subsection{Other special-purpose mapping commands}
\begin{frame}{\subsecname}
\begin{block}{\tt dfflibmap}
This command maps the internal register cell types to the register types
described in a liberty file.
\end{block}
\bigskip
\begin{block}{\tt hilomap}
Some architectures require special driver cells for driving a constant hi or lo
value. This command replaces simple constants with instances of such driver cells.
\end{block}
\bigskip
\begin{block}{\tt iopadmap}
Top-level input/outputs must usually be implemented using special I/O-pad cells.
This command inserts this cells to the design.
\end{block}
\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\subsection{Example Synthesis Script}
\begin{frame}[fragile]{\subsecname}
\begin{columns}
\column[t]{4cm}
\begin{lstlisting}[basicstyle=\ttfamily\fontsize{6pt}{7pt}\selectfont, language=ys]
# read and elaborate design
read_verilog cpu_top.v cpu_ctrl.v cpu_regs.v
read_verilog -D WITH_MULT cpu_alu.v
hierarchy -check -top cpu_top
# high-level synthesis
proc; opt; fsm;; memory -nomap; opt
# substitute block rams
techmap -map map_rams.v
# map remaining memories
memory_map
# low-level synthesis
techmap; opt; flatten;; abc -lut6
techmap -map map_xl_cells.v
# add clock buffers
select -set xl_clocks t:FDRE %x:+FDRE[C] t:FDRE %d
iopadmap -inpad BUFGP O:I @xl_clocks
# add io buffers
select -set xl_nonclocks w:* t:BUFGP %x:+BUFGP[I] %d
iopadmap -outpad OBUF I:O -inpad IBUF O:I @xl_nonclocks
# write synthesis results
write_edif synth.edif
\end{lstlisting}
\column[t]{6cm}
\vskip1cm
\begin{block}{Teaser / Outlook}
\small\parbox{6cm}{
The weird {\tt select} expressions at the end of this script are discussed in
the next part (Section 3, ``Advanced Synthesis'') of this presentation.}
\end{block}
\end{columns}
\end{frame}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\subsection{Summary}
\begin{frame}{\subsecname}
\begin{itemize}
\item Yosys provides commands for each phase of the synthesis.
\item Each command solves a (more or less) simple problem.
\item Complex commands are often only front-ends to simple commands.
\item {\tt proc; opt; fsm; opt; memory; opt; techmap; opt; abc;;}
\end{itemize}
\bigskip
\bigskip
\begin{center}
Questions?
\end{center}
\bigskip
\bigskip
\begin{center}
\url{http://www.clifford.at/yosys/}
\end{center}
\end{frame}
|
http://labtrop.ib.usp.br/doku.php?id=equipe:antigos:diogo_kawaguchi&do=export_latexit | usp.br | CC-MAIN-2022-05 | application/x-latex | application/x-latex | crawl-data/CC-MAIN-2022-05/segments/1642320304959.80/warc/CC-MAIN-20220126162115-20220126192115-00676.warc.gz | 40,121,910 | 1,512 | \documentclass[a4paper, oneside, 10pt]{article}
\usepackage[unicode]{hyperref}
\usepackage[utf8x]{inputenc}
\usepackage[english]{babel}
\date{\today}
\title{}
\author{}
\begin{document}
\subsection{\texorpdfstring{DIOGO KAWAGUCHI}{DIOGO KAWAGUCHI}}
\label{sec:diogo_kawaguchi}
Olá a todos!
Sou aluno do 6º (e último) ano do Instituto de Biociências da USP e atualmente estou fazendo um projeto de Conservação em Pesquisa em Biologia, baseado em dois estudos sobre \emph{Euterpe edulis} e utilizando-se para isto \textbf{matrizes de transição}.
Além disso, já trabalhei em empresa, na Natura Cosméticos, onde fiz parte de uma equipe de Tecnologia de Produção Vegetal, cujo trabalho principal era elaborar modelos de produção vegetal sustentáveis para suprir a demanda de fornecimento de Matéria prima para esta empresa.
Gostaria de deixar aqui uma frase de autoria própria:
,,A Vida torna-se mais fácil quando olhamos menos para fora e mais para dentro de nós mesmos. Tornamo-nos vencedores quando depois de tudo isto conseguimos voltar nossos olhos para o mundo."
\subsection{\texorpdfstring{Orientador}{Orientador}}
\label{sec:orientador}
Prof. Dr. Alexandre Adalardo de Oliveira
\end{document}
|
http://refbase.cidis.espol.edu.ec/search.php?sqlQuery=SELECT%20author%2C%20title%2C%20type%2C%20year%2C%20publication%2C%20abbrev_journal%2C%20volume%2C%20issue%2C%20pages%2C%20keywords%2C%20abstract%2C%20thesis%2C%20editor%2C%20publisher%2C%20place%2C%20abbrev_series_title%2C%20series_title%2C%20series_editor%2C%20series_volume%2C%20series_issue%2C%20edition%2C%20language%2C%20author_count%2C%20online_publication%2C%20online_citation%2C%20doi%2C%20serial%2C%20area%20FROM%20refs%20WHERE%20serial%20%3D%20158%20ORDER%20BY%20year%20DESC%2C%20first_author%2C%20author_count%2C%20author%2C%20title&client=&formType=sqlSearch&submit=Cite&viewType=&showQuery=0&showLinks=1&showRows=10&rowOffset=&wrapResults=1&citeOrder=year&citeStyle=APA&exportFormat=RIS&exportType=html&exportStylesheet=&citeType=LaTeX&headerMsg= | espol.edu.ec | CC-MAIN-2022-40 | application/x-latex | application/x-latex | crawl-data/CC-MAIN-2022-40/segments/1664030336921.76/warc/CC-MAIN-20221001195125-20221001225125-00639.warc.gz | 47,752,963 | 1,326 | %&LaTeX
\documentclass{article}
\usepackage[utf8]{inputenc}
\usepackage[T1]{fontenc}
\usepackage{textcomp}
\begin{document}
\section*{2021}
Santos, V., Sappa, A.D., Oliveira, M. \& de la Escalera, A. (2021). Editorial: Special Issue on Autonomous Driving and Driver Assistance Systems -- Some Main Trends. \textit{In Journal: Robotics and Autonomous Systems. (Vol. 144, Article number 103832)}, .
\end{document}
|
https://sea.theanarchistlibrary.org/library/325.tex | theanarchistlibrary.org | CC-MAIN-2021-31 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2021-31/segments/1627046156141.29/warc/CC-MAIN-20210805161906-20210805191906-00504.warc.gz | 511,768,667 | 5,555 | \documentclass[DIV=12,%
BCOR=0mm,%
headinclude=false,%
footinclude=false,open=any,%
fontsize=10pt,%
oneside,%
paper=210mm:11in]%
{scrbook}
\usepackage[noautomatic]{imakeidx}
\usepackage{microtype}
\usepackage{graphicx}
\usepackage{alltt}
\usepackage{verbatim}
\usepackage[shortlabels]{enumitem}
\usepackage{tabularx}
\usepackage[normalem]{ulem}
\def\hsout{\bgroup \ULdepth=-.55ex \ULset}
% https://tex.stackexchange.com/questions/22410/strikethrough-in-section-title
% Unclear if \protect \hsout is needed. Doesn't looks so
\DeclareRobustCommand{\sout}[1]{\texorpdfstring{\hsout{#1}}{#1}}
\usepackage{wrapfig}
% avoid breakage on multiple <br><br> and avoid the next [] to be eaten
\newcommand*{\forcelinebreak}{\strut\\*{}}
\newcommand*{\hairline}{%
\bigskip%
\noindent \hrulefill%
\bigskip%
}
% reverse indentation for biblio and play
\newenvironment*{amusebiblio}{
\leftskip=\parindent
\parindent=-\parindent
\smallskip
\indent
}{\smallskip}
\newenvironment*{amuseplay}{
\leftskip=\parindent
\parindent=-\parindent
\smallskip
\indent
}{\smallskip}
\newcommand*{\Slash}{\slash\hspace{0pt}}
% http://tex.stackexchange.com/questions/3033/forcing-linebreaks-in-url
\PassOptionsToPackage{hyphens}{url}\usepackage[hyperfootnotes=false,hidelinks,breaklinks=true]{hyperref}
\usepackage{bookmark}
\usepackage{fontspec}
\usepackage{polyglossia}
\setmainlanguage{bahasai}
\setmainfont{FreeSerif.otf}[Script=Latin,%
Ligatures=TeX,%
Path=/usr/share/fonts/opentype/freefont/,%
BoldFont=FreeSerifBold.otf,%
BoldItalicFont=FreeSerifBoldItalic.otf,%
ItalicFont=FreeSerifItalic.otf]
\setmonofont{cmuntt.ttf}[Script=Latin,%
Ligatures=TeX,%
Scale=MatchLowercase,%
Path=/usr/share/fonts/truetype/cmu/,%
BoldFont=cmuntb.ttf,%
BoldItalicFont=cmuntx.ttf,%
ItalicFont=cmunit.ttf]
\setsansfont{cmunss.ttf}[Script=Latin,%
Ligatures=TeX,%
Scale=MatchLowercase,%
Path=/usr/share/fonts/truetype/cmu/,%
BoldFont=cmunsx.ttf,%
BoldItalicFont=cmunso.ttf,%
ItalicFont=cmunsi.ttf]
\newfontfamily\bahasaifont{FreeSerif.otf}[Script=Latin,%
Ligatures=TeX,%
Path=/usr/share/fonts/opentype/freefont/,%
BoldFont=FreeSerifBold.otf,%
BoldItalicFont=FreeSerifBoldItalic.otf,%
ItalicFont=FreeSerifItalic.otf]
\renewcommand*{\partpagestyle}{empty}
% global style
\pagestyle{plain}
\usepackage{indentfirst}
% remove the numbering
\setcounter{secnumdepth}{-2}
% remove labels from the captions
\renewcommand*{\captionformat}{}
\renewcommand*{\figureformat}{}
\renewcommand*{\tableformat}{}
\KOMAoption{captions}{belowfigure,nooneline}
\addtokomafont{caption}{\centering}
\deffootnote[3em]{0em}{4em}{\textsuperscript{\thefootnotemark}~}
\addtokomafont{disposition}{\rmfamily}
\addtokomafont{descriptionlabel}{\rmfamily}
\frenchspacing
% avoid vertical glue
\raggedbottom
% this will generate overfull boxes, so we need to set a tolerance
% \pretolerance=1000
% pretolerance is what is accepted for a paragraph without
% hyphenation, so it makes sense to be strict here and let the user
% accept tweak the tolerance instead.
\tolerance=200
% Additional tolerance for bad paragraphs only
\setlength{\emergencystretch}{30pt}
% (try to) forbid widows/orphans
\clubpenalty=10000
\widowpenalty=10000
% given that we said footinclude=false, this should be safe
\setlength{\footskip}{2\baselineskip}
\title{Komunike dari Kolektif 325 Terhadap Serangan Represif Kontra-Informasi Internasional}
\date{29\Slash{}03\Slash{}2021}
\author{325 Collective}
\subtitle{}
% https://groups.google.com/d/topic/comp.text.tex/6fYmcVMbSbQ/discussion
\hypersetup{%
pdfencoding=auto,
pdftitle={Komunike dari Kolektif 325 Terhadap Serangan Represif Kontra-Informasi Internasional},%
pdfauthor={325 Collective},%
pdfsubject={},%
pdfkeywords={komunike; information; release; 325; repression}%
}
\begin{document}
\begin{titlepage}
\strut\vskip 2em
\begin{center}
{\usekomafont{title}{\huge Komunike dari Kolektif 325 Terhadap Serangan Represif Kontra-Informasi Internasional\par}}%
\vskip 1em
\vskip 2em
{\usekomafont{author}{325 Collective\par}}%
\vskip 1.5em
\vskip 3em
\includegraphics[keepaspectratio=true,height=0.5\textheight,width=1\textwidth]{3-5-325-1.jpg}
\vfill
{\usekomafont{date}{29\Slash{}03\Slash{}2021\par}}%
\end{center}
\end{titlepage}
\cleardoublepage
Pada 29 Maret 2021 pihak kepolisian Belanda menggerebek pusat penyimpanan data server nostate.net, menyita data server sebagai bagian investigasi atas tindakan kriminal ‘terorisme’. Nostate.net adalah kolektif yang menyediakan \emph{platform} situs gerakan internasional bagi kelompok untuk solidaritas tahanan, berbagai kampanye kolektif, situs anti-KTT, dan media tanding kontra-informasi internasional. Situs yang menggunakan nostate.net sebagai \emph{platform}, yang secara signifikan menjadi target serangan represifitas dari kepolisian Belanda diantaranya Anarchist Black Cross Berlin, Montreal Counter-Info, Northshore Counter-Info, Act For Freedom Now! (saat ini coba diaktifkan kembali noblogs.org \href{https://actforfree.noblogs.org}{\texttt{https://actforfree.noblogs.org}}) dan 325.
Kami sebagai kolektif sadar bahwasanya ini bukan hanya sekedar penyerangan oleh polisi Belanda, tetapi merupakan tindakan terkoordinasi dengan Unit Penanggulangan Terorisme Inggris karena sehubungan dengan serangan represif mereka yang baru-baru ini terhadap lingkaran anarkis di kawasan Inggris. Tidak hanya mereka mengancam diri kita sebgai individu, namun baru-baru ini mereka pun mengancam nostate.net, untuk munutup server. Bersamaan dengan tindakan ini, mereka menuntut informasi diberikannya identitas siapa pun yang terlibat dalam jaringan 325. Namun sejauh mana pihak kepolisian menyerang kami dan siapa pun yang mereka curigai membantu kami bukanlah hal yang baru dan mengejutkan bagi kami, kami telah melihat melalui sejarah, kekuatan negara secara massif akan merepresi siapa pun yang berani berdiri dan melawan mereka.
Serangan represif ini mestinya dilihat sebagai serangan terhadap semua orang dan tiap kontra-informasi di kalangan anarkis internasional. Dalam kondisi Covid-19 yang sedang berlangsung saat ini dibarengi dengan tindakan represif berbagai negara di seluruh dunia, tidak mengherankan bagi kami bahwa mereka bekerja sama di tingkat internasional, tindakan represif baru-baru ini terhadap kamerad anarkis Gabriel Pomba da Silva, melalui kerja sama Negara Spanyol, Italia, dan Portugis, ini merupakan contoh yang jelas. Ingatan kita kembali pada tindakan represi Indymedia di Jerman dan Yunani, serta belum lama ini terjadi penangkapan kawan-kawan yang terlibat di Culmine, Parole Armata dan Croce Nera Anarchica di Italia. Seiring berjalannya waktu, gerakan anarkis internasional telah memiliki mode komunikasi untuk orang-orang yang mengalami penyerangan melalui publikasi anarkis yang tak terhitung jumlahnya, kawan-kawan ditangkap dan publikasinya disensor, bahkan dihancurkan, seperti yang terjadi di masa lalu kepada Alfredo M.Bonnano’s ‘Armed Joy’ di Italia, serta Conspiracy of Cells of Fire’s ‘The Sun Still Rises’ di Yunani.
Tentunya bukan kebetulan bahwa serangan represif ini terjadi setelah publikasi ‘325 \#12 – \emph{Against the Fourth and Fifth Industrial Revolutions}’ baru-baru ini. Publikasi yang kami rasa menyerang inti dari apa yang distimulasi oleh negara dan kapitalisme, di masa lalu dan terlebih lagi sekarang, di balik kedok pandemi Covid-19, yang merupakan rencana pembungkaman, penyerangan serta perampasan segala hal yang dianggap menggangu. Serangan kepolisian untuk sementara mempengaruhi distribusi publikasi kami, baik secara online maupun fisik, namun itu tak akan bertahan lama dan gagal. Para teknokrat yang ingin membentuk dunia kita menjadi masyarakat penjara yang termiliterisasi dengan teknologi sedang diekspos, tidak hanya dari tiap individu tetapi juga serangan yang sudah berkembang secara internasional terhadap infrastruktur mereka. Inilah yang mereka takuti, bahwa ini bisa tumbuh dan inilah mengapa mereka mengejar dan menyerang kita. Dari apa yang kami ketahui, polisi yang mencoba memburu kami, mereka mengandalkan taktik penindasan lama mereka, mencoba membuat orang lain mengadu dan menutup informasi tandingan. Sejak ‘Operasi Rhone’ mereka bertujuan menyerang lingkaran anarkis di Bristol, mereka hanya menangkap satu orang yang terlibat dalam serangan, tetapi tidak ada yang bersangkutan dengan Federasi Anarkis Informal atau serangan anarkis lain yang tak terhitung jumlahnya.
Sudah terlalu lama senyap di pulau konformitas ini, sementara dunia di luar mulai terbakar lagi, bara api itu masih bercahaya dan kami merasakan kehangatannya. Lebih dari sebelumnya ada kebutuhan mutlak untuk koordinasi internasional antara tiap jaringan, untuk menyerang secara langsung mayat busuk ini, yang mencoba untuk membangkitkan dirinya sendiri, memenjarakan kita lebih jauh. Kontra-informasi adalah bagian integral dari koordinasi internasional, agar memungkinkan mereka yang ingin bertindak demi kebebasan di dunia ini untuk melihat sinyal keterlibatan dalam setiap bahasa dan cara yang memungkinkan, untuk berbicara dalam satu bahasa pemberontakan dan anarki. Harus ada re-energi dari jaringan kontra informasi internasional, agar sekali lagi menjadi ancaman internasional, setelah serangan represif yang berusaha mengisolasi anarkis dari satu sama lain, tidak hanya di seluruh dunia tetapi bahkan secara lokal. 325 Kolektif terus bergerak di jalur yang sudah kami lalui, bahkan sekarang kami melanjutkan proyek publikasi kami termasuk cetak ulang ‘325 \# 12’, edisi baru yang yang memperluas isu ‘Dark Nights’. Mereka tidak akan membungkam atau menghentikan kita dan kita akan mendapatkan milik kita
Tentang situs web, kami belum tahu apakah akan kembali, sangat jelas bagi kami bahwa jika kembali sebagai ‘325’, maka pihak berwenang akan segera menjadikannya target kembali. Ini juga berarti bahwa kami dapat membahayakan \emph{platform} mana pun di masa mendatang, serta menempatkan proyek kontra-informasi dan pergerakan lainnya dengan risiko ditutup seperti yang terjadi pada serangan represif baru-baru ini. Siapa yang tahu kemana semua ini akan terjadi? Apa yang kita tahu adalah bahwa kita jauh dari kata mundur, tidak ada satu langkah pun untuk mundur, dalam menghadapi musuh. Mungkin yang terbaik adalah kembali ke cara tradisional, bertatap muka langsung, berbicara secara nyata, serta berkonspirasi. Kami tidak mengatakan tidak akan kembali ke media situs, juga tidak memanifestasikan kembalinya sebagai proyek baru, hanya waktu yang akan memberi tahu.
\forcelinebreak
Untuk saat ini, solidaritas mutlak kami kepada nostate.net \& Bertindak untuk Kebebasan Sekarang! Bersama dengan semua proyek kontra-info lainnya.
TAK ADA YANG SELESAI, PERJUANGAN BERLANJUT!
325 Kolektif
% begin final page
\clearpage
% new page for the colophon
\thispagestyle{empty}
\begin{center}
\smallskip
Anti-Copyright
\bigskip
\includegraphics[width=0.25\textwidth]{/var/lib/amusewiki/repo/sea/site_files/sea_pdf_image.png}
\bigskip
\end{center}
\strut
\vfill
\begin{center}
325 Collective
Komunike dari Kolektif 325 Terhadap Serangan Represif Kontra-Informasi Internasional
29\Slash{}03\Slash{}2021
\bigskip
\href{https://palanghitamanarkis.noblogs.org/post/2021/04/15/komunike-dari-kolektif-325-terhadap-serangan-represif-kontra-informasi-internasional/}{\texttt{https://palanghitamanarkis.noblogs.org/post/2021/04/15/komunike-dari-kolektif-325-terhadap-serangan-represif-kontra-informasi-internasional/}}
Teks aslinya berjudul \href{https://325.nostate.net/\#Communique20210409-english}{\emph{Communique from 325 Collective on the Repressive Attack upon International Counter-Information}} dan diterjemahkan oleh Palang Hitam Indonesia (wa)
\bigskip
\textbf{sea.theanarchistlibrary.org}
\end{center}
% end final page with colophon
\end{document}
% No format ID passed.
|
http://ftp.ipv4.heanet.ie/pub/ctan.org/tex/graphics/mgltex/sample.tex | heanet.ie | CC-MAIN-2023-06 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2023-06/segments/1674764500215.91/warc/CC-MAIN-20230205032040-20230205062040-00752.warc.gz | 15,254,104 | 4,706 | \documentclass{article}
\usepackage[comments,3x,jpg]{mgltex}
\usepackage{hyperref}
\title{\mglTeX*{} usage sample}
\author{Diego Sejas Viscarra \and Alexey Balakin}
\date{\today}
\begin{mglsetupscript}
define gravity 9.81 # [m/s^2]
\end{mglsetupscript}
\begin{document}
\maketitle
\begin{abstract}
\noindent \mglTeX{} is a \LaTeX{} package that allows the creation of graphics directly from MGL scripts of the MathGL library (by Alexey Balakin) inside documents. The MGL code is extracted, executed (if shell escape is activated), and the resulting graphics are automatically included.
This document is intended as a sample of the capabilities of \mglTeX{}, as well as a brief introduction to the package, for those who want to start right away to use it, without diving into the a little bit more technical documentation.
\end{abstract}
\section{Basics on environments}
\begin{description}
\item[mgl] The easiest way to embed MGL code is the \verb|mgl| environment. It extracts its contents to a main script associated to the document.\footnote{Generally, the main script has the same name as the document being compiled. In order to rename it or create a new one, the \texttt{\textbackslash mglname} command can be used.} If shell escape is activated, \LaTeX{} will take care of calling \verb|mglconv| (the MathGL compiler) with the appropriate settings, and the resulting image will be automatically included.
For example, you could write:
\begin{verbatim}
\begin{figure}[!ht]
\centering
\begin{mgl}[width=0.95\textwidth,height=6cm]
call 'prepare1d'
subplot 2 1 0 '<_' : title 'Standard data plot'
box : axis : grid 'xy' ';k'
plot y ’rGb’
subplot 2 1 1 '<_' : title 'Region plot'
ranges -1 1 -1 1 : origin 0 0
new y1 200 'x^3-x' : new y2 200 'x'
axis : grid 'xy' 'W'
region y1 y2 'ry'
plot y1 '2k' : plot y2 '2k'
text -0.75 -0.35 '\i{A}_1' 'k' : text 0.75 0.25 '\i{A}_2' 'k'
\end{mgl}
caption{A simple plot created by \mglTeX's \texttt{mgl} environment}
\end{figure}
\end{verbatim}
This will produce the following image:
\begin{figure}[!ht]
\centering
\begin{mgl}[width=0.95\textwidth,height=5.5cm]
call 'prepare1d'
subplot 2 1 0 '<_' : title 'Standard data plot'
box : axis : grid 'xy' ';k'
plot y '2'
subplot 2 1 1 '<_' : title 'Region plot'
ranges -1 1 -1 1 : origin 0 0
new y1 200 'x^3-x' : new y2 200 'x'
axis 'AKDTVISO' : grid 'xy' ';W'
region y1 y2 'ry'
plot y1 '2k' : plot y2 '2k'
text -0.75 -0.35 '\i{A}_1' 'k' -2 : text 0.75 0.25 '\i{A}_2' 'k' -2
\end{mgl}
\caption{A simple plot create by \mglTeX's \texttt{mgl} environment}
\end{figure}
Two important aspects of \mglTeX{} can be noted from this example: First, the \verb|mgl| environment accepts the same optional argument as the \verb|\includegraphics| command from the \verb|graphicx| package. Actually, it also accepts other optional arguments, called \verb|gray| (to activate/deactivate gray-scale mode), \verb|mglscale| (to set the factor for scaling the image file), \verb|quality| (to set the quality of the image), \verb|variant| (to chose the variant of the arguments of MGL commands in the script), \verb|imgext| (to specify the extension of the resulting graphic file), and \verb|label| (to specify a name to save the image). Most of these options are available to every \mglTeX{} environment or command to create graphics.
The second aspect to be noted about the example is that this script calls a MGL function, \verb|prepare1d|, which hasn't been defined yet. \mglTeX{} provides the \verb|mglfunc| environment for this purpose (see below).
\item[mglfunc] This environment can be used in any part of the \LaTeX{} document; \mglTeX{} takes care of placing the corresponding code at the end of the main script, as has to be done in the MGL language.
For example, the function \verb|prepare1d| that is called in the script above is defined like this
\begin{verbatim}
\begin{mglfunc}{prepare1d}
new y 50 3
modify y '0.7*sin(2*pi*x)+0.5*cos(3*pi*x)+0.2*sin(pi*x)'
modify y 'sin(2*pi*x)' 1
modify y 'cos(2*pi*x)' 2
\end{mglfunc}
\end{verbatim}
\begin{mglfunc}{prepare1d}
new y 50 3
modify y '0.7*sin(2*pi*x)+0.5*cos(3*pi*x)+0.2*sin(pi*x)'
modify y 'sin(2*pi*x)' 1
modify y 'cos(2*pi*x)' 2
\end{mglfunc}
As you can see, only the body of the function has to be written. The number of arguments of the function can be passed to \verb|mglfunc| as optional argument, like in the code \verb|\begin{mglfunc}[3]{func_with_three_args}|.
\item[mgladdon] This environment just adds its contents to the main script, without producing any image. It is useful to load dynamic libraries, define constants, etc.
\item[mglcode] The \verb|mglcode| environment is similar to \verb|mgl|, but it creates its own script, whose name is passed as mandatory argument. The same optional arguments are accepted, except \verb|label| (for obvious reasons).
\begin{verbatim}
\begin{figure}[!ht]
\begin{mglcode}[height=5cm,width=8cm]{vectorial_flow}
new a 20 30 'sin(pi*x)*sin(pi*y)+cos(2*pi*x*y)'
new b 20 30 'cos(pi*x)*cos(pi*y)+cos(2*pi*x*y)'
subplot 1 1 0 '' : title 'Flow of vector field' : box
flow a b 'v'; value 20
\end{mglcode}
\end{figure}
\end{verbatim}
\begin{figure}[!ht]
\centering
\begin{mglcode}[height=5cm,width=8cm]{vectorial_flow}
new a 20 30 'sin(pi*x)*sin(pi*y)+cos(2*pi*x*y)'
new b 20 30 'cos(pi*x)*cos(pi*y)+cos(2*pi*x*y)'
subplot 1 1 0 '' : title 'Flow of a vector field' : box
flow a b '2v'; value 10
\end{mglcode}
\end{figure}
\item[mglscript] This environment just creates a script, whose name is specified as mandatory argument. It is useful, for example, to create MGL scripts which can later be post-processed by another package, like \verb|listings| or \verb|pygments|.
For example, the following won't produce any image, just a script:
\begin{verbatim}
\begin{mglscript}{Gaston_Neiza}
clf 'k'
attachlight on
subplot 1 1 0 '' : title 'Gaston\utf0x0027{}s Surface'
ranges -13 13 -40 40
new a 200 200 '-x+(2*0.84*cosh(0.4*x)*sinh(0.4*x))/(0.4*((sqrt(0.84)*cosh(0.4*x))^2+(0.4*sin(sqrt(0.84)*y))))+0.5*sin(pi/2*x)'
new b 200 200 '(2*sqrt(0.84)*cosh(0.45*x)*(-(sqrt(0.84)*sin(y)*cos(sqrt(0.84)*y))+cos(y)*sin(sqrt(0.84)*y)))/(0.4*((sqrt(0.84)*cosh(0.4*x))^2+2*(0.4*sin(sqrt(0.84)*x))^2))'
new c 200 200 '(2*sqrt(0.84)*cosh(0.45*x)*(-(sqrt(0.84)*cos(y)*cos(sqrt(0.84)*y))-sin(y)*sin(sqrt(0.84)*y)))/(0.4*((sqrt(0.84)*cosh(0.4*x))^2+2*(0.4*sin(sqrt(0.84)*x))^2))'
rotate 60 60
light on : light 0 1 1 0
xrange c : yrange b : zrange a : crange c
surf c b a '#'; meshnum 100
subplot 2 1 1 ''
title 'Neiza\utf0x0027{}s Rose'
ranges -13 13 -40 40
new a 700 700 '-x+(1.5*cos(x^2))/(0.4*((sqrt(0.84)*cosh(0.4*x))^2+(0.4*sin(sqrt(0.84)*y))))+0.5*cos(pi/2*x)'
new b 700 700 '(sqrt(0.5)*cos(0.25*x)*((sqrt(0.84)*sin(y)*cos(0.75*y))+cos(y)*sin(sqrt(0.84)*y)))/(0.4*((sqrt(0.84)*cosh(0.4*x))^2+2*(0.4*sin(sqrt(0.84)*x))^2))'
new c 700 700 '(sqrt(0.5)*cos(0.25*x)*((sqrt(0.84)*cos(y)*sin(0.75*y))-sin(y)*sin(sqrt(0.84)*y)))/(0.4*((sqrt(0.84)*cosh(0.4*x))^2+2*(0.4*sin(sqrt(0.84)*x))^2))'
rotate 75 130
light on : light 0 0 0 1 'w' 0.5 : light 1 -1 0 0 'r' 0.85 : light 2 -1 0 0 'w' 0.75
xrange c : yrange b : zrange a : crange c
surf c b a 'r'
\end{mglscript}
\end{verbatim}
\begin{mglscript}{Gaston_Neiza}
clf 'k'
attachlight on
subplot 2 1 0 ''
ranges -13 13 -40 40
new a 200 200 '-x+(2*0.84*cosh(0.4*x)*sinh(0.4*x))/(0.4*((sqrt(0.84)*cosh(0.4*x))^2+(0.4*sin(sqrt(0.84)*y))))+0.5*sin(pi/2*x)'
new b 200 200 '(2*sqrt(0.84)*cosh(0.45*x)*(-(sqrt(0.84)*sin(y)*cos(sqrt(0.84)*y))+cos(y)*sin(sqrt(0.84)*y)))/(0.4*((sqrt(0.84)*cosh(0.4*x))^2+2*(0.4*sin(sqrt(0.84)*x))^2))'
new c 200 200 '(2*sqrt(0.84)*cosh(0.45*x)*(-(sqrt(0.84)*cos(y)*cos(sqrt(0.84)*y))-sin(y)*sin(sqrt(0.84)*y)))/(0.4*((sqrt(0.84)*cosh(0.4*x))^2+2*(0.4*sin(sqrt(0.84)*x))^2))'
rotate 60 60
light on : light 0 1 1 0
xrange c : yrange b : zrange a : crange c
surf c b a '#'; meshnum 100
title 'Gaston\utf0x0027{}s Surface'
subplot 2 1 1 ''
title 'Neiza\utf0x0027{}s Rose'
ranges -13 13 -40 40
new a 700 700 '-x+(1.5*cos(x^2))/(0.4*((sqrt(0.84)*cosh(0.4*x))^2+(0.4*sin(sqrt(0.84)*y))))+0.5*cos(pi/2*x)'
new b 700 700 '(sqrt(0.5)*cos(0.25*x)*((sqrt(0.84)*sin(y)*cos(0.75*y))+cos(y)*sin(sqrt(0.84)*y)))/(0.4*((sqrt(0.84)*cosh(0.4*x))^2+2*(0.4*sin(sqrt(0.84)*x))^2))'
new c 700 700 '(sqrt(0.5)*cos(0.25*x)*((sqrt(0.84)*cos(y)*sin(0.75*y))-sin(y)*sin(sqrt(0.84)*y)))/(0.4*((sqrt(0.84)*cosh(0.4*x))^2+2*(0.4*sin(sqrt(0.84)*x))^2))'
rotate 75 130
light on : light 0 0 0 1 'w' 0.5 : light 1 -1 0 0 'r' 0.85 : light 2 -1 0 0 'w' 0.75
xrange c : yrange b : zrange a : crange c
surf c b a 'r'
\end{mglscript}
\item[mglblock] It writes its contents verbatim to a file, specified as mandatory argument, and to the \LaTeX{} document.
For example:
\begin{verbatim}
\begin{mglblock}{fractal}
list A [0,0,0,.16,0,0,.01] [.85,.04,-.04,.85,0,1.6,.85] [.2,-.26,.23,.22,0,1.6,.07] [-.15,.28,.26,.24,0,.44,.07]
ifs2d f A 100000
subplot 2 1 0 '<_' : title 'A fractal fern'
ranges f(0) f(1) : axis
plot f(0) f(1) 'G#o '; size 0.05
subplot 2 1 1 '<_' : title 'Bifurcation plot'
ranges 0 4 0 1 : axis
bifurcation 0.005 'x*y*(1-y)' 'R'
\end{mglblock}
\end{verbatim}
\begin{mglblock}{fractal}
list A [0,0,0,.16,0,0,.01] [.85,.04,-.04,.85,0,1.6,.85] [.2,-.26,.23,.22,0,1.6,.07] [-.15,.28,.26,.24,0,.44,.07]
ifs2d f A 100000
subplot 2 1 0 '<_' : title 'A fractal fern'
ranges f(0) f(1) : axis
plot f(0) f(1) 'G#o '; size 0.05
subplot 2 1 1 '<_' : title 'Bifurcation plot'
ranges 0 4 0 1 : axis
bifurcation 0.005 'x*y*(1-y)' 'R'
\end{mglblock}
As you can see, although this is a verbatim-like environment, very long lines of code are split to fit the paragraph. Each line of code is numbered, this can be disabled with the \verb|lineno| option, like \verb|\begin{mglblock}[lineno=false]{fractal}|.
\item[mglverbatim] This is like \verb|mglblock| environment, but it doesn't produce any script, just typesets the code to the \LaTeX{} document. It accepts the \verb|lineno| option, plus the \verb|label| option, in case you want to associate a name to the code.
\item[mglcomment] This environment is used to embed comments in the document. You can control whether the contents of this environment are displayed or not, using the \verb|comments| and \verb|nocomments| package options, or the \verb|\mglcomments{on}| and \verb|mglcomments{off}| commands.
An example of this would be:
\begin{verbatim}
\begin{mglcomments}
This comment will be shown because we used the "comments" package option for mglTeX
\end{mglcomments}
\end{verbatim}
\begin{mglcomment}
This comment will be shown because we used the "comments" package option for mglTeX
\end{mglcomment}
Once again, long lines are broke down to fit the paragraph.
\end{description}
\section{Basics on commands}
\begin{description}
\item[\textbackslash mglgraphics] This command takes the name of an external MGL script, compiles it, and includes the resulting image. It accespt the same optional arguments as the \verb|mgl| environment, except for \verb|label|, plus a \verb|path| option, which can be used to specify the location of the script. This is useful when you have a script outside of the \LaTeX{} document (sent by a colleague for example), but you don't want to transcript it to your document.
For example, in order to display the image of the script we created with \verb|mglscript| environment, we write:
\begin{verbatim}
\begin{figure}[!ht]
\centering
\mglgraphics[height=9cm,width=18cm]{Gaston_Neiza}
\caption{``Gaston's Surface'' and ``Neiza's Rose'' are named after Diego Sejas' parents}
\end{figure}
\end{verbatim}
\begin{figure}[!ht]
\centering
\mglgraphics[height=8cm,width=14cm]{Gaston_Neiza}
\caption{``Gaston's Surface'' and ``Neiza's Rose'' are named after Diego Sejas' parents}
\end{figure}
We could also could compile the script we created with the \verb|mglblock| environment:
\begin{verbatim}
\begin{figure}[!ht]
\centering
\mglgraphics[height=7cm,width=10cm]{fractal}
\caption{Examples of fractal behavior}
\end{figure}
\end{verbatim}
\begin{figure}[!ht]
\centering
\mglgraphics[height=7cm,width=10cm]{fractal}
\caption{Examples of fractal behavior}
\end{figure}
\item[\textbackslash mglinclude] This is equivalent to the \verb|mglblock| environment, but works for external scripts.
\item[\textbackslash mglplot] This command allows the fast creation of plots. It takes one mandatory argument, which is a block of MGL code to produce the plot. Accepts the same optional arguments as the \verb|mgl| environment, plus an additional one, \verb|setup|, that can be used to specify a block of code to append, defined inside a \verb|mglsetup| environment (see the example below).
The \verb|mglsetup| environment can be used if many plots will have the same settings (background color, etc.). Instead of writing the same code over and over again, it can be introduced in that environment, and used with the \verb|\mglplot| command.
An example of use of the \verb|mglsetup| environment and the \verb|\mglplot| command would be:
\begin{verbatim}
\begin{mglsetup}{3d}
clf 'W'
rotate 50 60
light on
box : axis : grid 'xyz' ';k'
\end{mglsetup}
\begin{figure}[!ht]
\centering
\mglplot[setup=3d,height=5cm,width=8cm]{fsurf 'cos(4*pi*hypot(x,y))*exp(-abs(x+y))'}
\end{figure}
\begin{figure}[!ht]
\centering
\mglplot[setup=3d,height=5cm,width=8cm]{fsurf 'sin(pi*(x+y))'}
\end{figure}
\end{verbatim}
\begin{mglsetup}{3d}
clf 'W'
rotate 50 60
light on : light 0 0 1 0 'w' 0.25
box : axis : grid 'xyz' ';k'
\end{mglsetup}
\begin{figure}[!ht]
\centering
\mglplot[setup=3d,height=5cm,width=8cm]{fsurf 'cos(4*pi*hypot(x,y))*exp(-abs(x+y))'}
\end{figure}
\begin{figure}[!ht]
\centering
\mglplot[setup=3d,height=5cm,width=8cm]{fsurf 'sin(pi*(x+y))'}
\end{figure}
\end{description}
There are more environments and commands defined by \mglTeX{}. The ones presented here are the most basic. More on this topic can be found in the documentation.
\end{document} |
https://authorea.com/users/389148/articles/503775/download_latex | authorea.com | CC-MAIN-2021-10 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2021-10/segments/1614178370752.61/warc/CC-MAIN-20210305091526-20210305121526-00253.warc.gz | 217,410,293 | 2,886 | \documentclass[10pt]{article}
\usepackage{fullpage}
\usepackage{setspace}
\usepackage{parskip}
\usepackage{titlesec}
\usepackage[section]{placeins}
\usepackage{xcolor}
\usepackage{breakcites}
\usepackage{lineno}
\usepackage{hyphenat}
\PassOptionsToPackage{hyphens}{url}
\usepackage[colorlinks = true,
linkcolor = blue,
urlcolor = blue,
citecolor = blue,
anchorcolor = blue]{hyperref}
\usepackage{etoolbox}
\makeatletter
\patchcmd\@combinedblfloats{\box\@outputbox}{\unvbox\@outputbox}{}{%
\errmessage{\noexpand\@combinedblfloats could not be patched}%
}%
\makeatother
\usepackage{natbib}
\renewenvironment{abstract}
{{\bfseries\noindent{\abstractname}\par\nobreak}\footnotesize}
{\bigskip}
\titlespacing{\section}{0pt}{*3}{*1}
\titlespacing{\subsection}{0pt}{*2}{*0.5}
\titlespacing{\subsubsection}{0pt}{*1.5}{0pt}
\usepackage{authblk}
\usepackage{graphicx}
\usepackage[space]{grffile}
\usepackage{latexsym}
\usepackage{textcomp}
\usepackage{longtable}
\usepackage{tabulary}
\usepackage{booktabs,array,multirow}
\usepackage{amsfonts,amsmath,amssymb}
\providecommand\citet{\cite}
\providecommand\citep{\cite}
\providecommand\citealt{\cite}
% You can conditionalize code for latexml or normal latex using this.
\newif\iflatexml\latexmlfalse
\providecommand{\tightlist}{\setlength{\itemsep}{0pt}\setlength{\parskip}{0pt}}%
\AtBeginDocument{\DeclareGraphicsExtensions{.pdf,.PDF,.eps,.EPS,.png,.PNG,.tif,.TIF,.jpg,.JPG,.jpeg,.JPEG}}
\usepackage[utf8]{inputenc}
\usepackage[english]{babel}
\usepackage{float}
\begin{document}
\title{Omega-3 polyunsaturated fatty acids supplementation improve clinical
symptoms in patients with covid-19: A randomized clinical trial}
\author[1]{Mohsen Sedighiyan}%
\author[1]{Hamed Abdollahi}%
\author[2]{Elmira Karimi}%
\author[1]{Mostafa Badeli}%
\author[1]{Reza Erfanian}%
\author[1]{Shima Raeesi}%
\author[1]{Rezvan Hashemi}%
\author[1]{Zahra Vahabi}%
\author[1]{Behzad Asanjarani}%
\author[1]{Mina ABDOLAHI}%
\affil[1]{Affiliation not available}%
\affil[2]{Tehran University of Medical Sciences}%
\vspace{-1em}
\date{\today}
\begingroup
\let\center\flushleft
\let\endcenter\endflushleft
\maketitle
\endgroup
\selectlanguage{english}
\begin{abstract}
Objective: We hypothesized that omega-3 fatty acids would be an
appropriate adjunct therapy for alleviating the inflammatory response
and clinical manifestation in hospitalized patients with covid-19
disease. Methods: This was a single-blind randomized controlled trial in
Amir-Alam hospital in Tehran. Thirty adult men and women diagnosed with
covid-19 were allocated to either control group (receiving
Hydroxychloroquine) or intervention group (receiving Hydroxychloroquine
plus 2 grams of DHA+EPA) for 2 weeks. Primary outcome of the
intervention including CRP, ESR as well as clinical symptoms including
body pain, fatigue, appetite and olfactory and secondary outcomes
including liver enzymes were determined at the baseline and after
omega-3 supplementation. Clinical signs were measured using
self-reported questionnaires. There were commercial kits for
determination of CRP and liver enzymes concentrations in the serum of
patients. For determination of ESR automated hematology analyzer was
applied. Results: In comparison to control group, patients receiving
omega-3 indicated favorable changes in all clinical symptoms except for
olfactory ((p\textless{}0.001 for body pain and fatigue, p= 0.03 for
appetite and p=0.21 for olfactory). Reducing effects of omega-3
supplementation compared to control group were also observed in the
levels of ESR and CRP after treatment (p\textless{}0.001 for CRP and
p=0.02 for ESR). However, no between group differences in the liver
enzymes serum concentrations were observed after supplementation
(p\textgreater{}0.05). Conclusion: Current observations are very
promising and indicate that supplementation with moderate dosages of
omega-3 fatty acids may be beneficial in the management of
inflammation-mediated clinical symptoms in covid-19 patients. Key words:
Covid-19, omega-3, inflammation, clinical symptoms%
\end{abstract}%
\sloppy
\textbf{Hosted file}
\verb`Manuscript.omega-3(1)-final.pdf` available at \url{https://authorea.com/users/389148/articles/503775-omega-3-polyunsaturated-fatty-acids-supplementation-improve-clinical-symptoms-in-patients-with-covid-19-a-randomized-clinical-trial}
\selectlanguage{english}
\FloatBarrier
\end{document}
|
https://theanarchistlibrary.org/library/willful-disobedience-wolfi-landstreicher-willful-disobedience-volume-5-number-3.tex | theanarchistlibrary.org | CC-MAIN-2021-17 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2021-17/segments/1618038879374.66/warc/CC-MAIN-20210419111510-20210419141510-00226.warc.gz | 663,044,181 | 22,710 | \documentclass[DIV=12,%
BCOR=10mm,%
headinclude=false,%
footinclude=false,open=any,%
fontsize=11pt,%
twoside,%
paper=210mm:11in]%
{scrbook}
\usepackage[noautomatic]{imakeidx}
\usepackage{microtype}
\usepackage{graphicx}
\usepackage{alltt}
\usepackage{verbatim}
\usepackage[shortlabels]{enumitem}
\usepackage{tabularx}
\usepackage[normalem]{ulem}
\def\hsout{\bgroup \ULdepth=-.55ex \ULset}
% https://tex.stackexchange.com/questions/22410/strikethrough-in-section-title
% Unclear if \protect \hsout is needed. Doesn't looks so
\DeclareRobustCommand{\sout}[1]{\texorpdfstring{\hsout{#1}}{#1}}
\usepackage{wrapfig}
% avoid breakage on multiple <br><br> and avoid the next [] to be eaten
\newcommand*{\forcelinebreak}{\strut\\*{}}
\newcommand*{\hairline}{%
\bigskip%
\noindent \hrulefill%
\bigskip%
}
% reverse indentation for biblio and play
\newenvironment*{amusebiblio}{
\leftskip=\parindent
\parindent=-\parindent
\smallskip
\indent
}{\smallskip}
\newenvironment*{amuseplay}{
\leftskip=\parindent
\parindent=-\parindent
\smallskip
\indent
}{\smallskip}
\newcommand*{\Slash}{\slash\hspace{0pt}}
% http://tex.stackexchange.com/questions/3033/forcing-linebreaks-in-url
\PassOptionsToPackage{hyphens}{url}\usepackage[hyperfootnotes=false,hidelinks,breaklinks=true]{hyperref}
\usepackage{bookmark}
\usepackage{fontspec}
\usepackage{polyglossia}
\setmainlanguage{english}
\setmainfont{LinLibertine_R.otf}[Script=Latin,%
Ligatures=TeX,%
Path=/usr/share/fonts/opentype/linux-libertine/,%
BoldFont=LinLibertine_RB.otf,%
BoldItalicFont=LinLibertine_RBI.otf,%
ItalicFont=LinLibertine_RI.otf]
\setmonofont{cmuntt.ttf}[Script=Latin,%
Ligatures=TeX,%
Scale=MatchLowercase,%
Path=/usr/share/fonts/truetype/cmu/,%
BoldFont=cmuntb.ttf,%
BoldItalicFont=cmuntx.ttf,%
ItalicFont=cmunit.ttf]
\setsansfont{cmunss.ttf}[Script=Latin,%
Ligatures=TeX,%
Scale=MatchLowercase,%
Path=/usr/share/fonts/truetype/cmu/,%
BoldFont=cmunsx.ttf,%
BoldItalicFont=cmunso.ttf,%
ItalicFont=cmunsi.ttf]
\newfontfamily\englishfont{LinLibertine_R.otf}[Script=Latin,%
Ligatures=TeX,%
Path=/usr/share/fonts/opentype/linux-libertine/,%
BoldFont=LinLibertine_RB.otf,%
BoldItalicFont=LinLibertine_RBI.otf,%
ItalicFont=LinLibertine_RI.otf]
\renewcommand*{\partpagestyle}{empty}
% global style
\pagestyle{plain}
\usepackage{indentfirst}
% remove the numbering
\setcounter{secnumdepth}{-2}
% remove labels from the captions
\renewcommand*{\captionformat}{}
\renewcommand*{\figureformat}{}
\renewcommand*{\tableformat}{}
\KOMAoption{captions}{belowfigure,nooneline}
\addtokomafont{caption}{\centering}
\deffootnote[3em]{0em}{4em}{\textsuperscript{\thefootnotemark}~}
\addtokomafont{disposition}{\rmfamily}
\addtokomafont{descriptionlabel}{\rmfamily}
\frenchspacing
% avoid vertical glue
\raggedbottom
% this will generate overfull boxes, so we need to set a tolerance
% \pretolerance=1000
% pretolerance is what is accepted for a paragraph without
% hyphenation, so it makes sense to be strict here and let the user
% accept tweak the tolerance instead.
\tolerance=200
% Additional tolerance for bad paragraphs only
\setlength{\emergencystretch}{30pt}
% (try to) forbid widows/orphans
\clubpenalty=10000
\widowpenalty=10000
% given that we said footinclude=false, this should be safe
\setlength{\footskip}{2\baselineskip}
\title{Willful Disobedience Volume 5, Number 3}
\date{Spring 2006}
\author{Willful Disobedience, Wolfi Landstreicher}
\subtitle{}
% https://groups.google.com/d/topic/comp.text.tex/6fYmcVMbSbQ/discussion
\hypersetup{%
pdfencoding=auto,
pdftitle={Willful Disobedience Volume 5, Number 3},%
pdfauthor={Willful Disobedience; Wolfi Landstreicher},%
pdfsubject={},%
pdfkeywords={Willful Disobedience; cities; wildness; play; language; Os Cangaceiros; daily life; joy}%
}
\begin{document}
\begin{titlepage}
\strut\vskip 2em
\begin{center}
{\usekomafont{title}{\huge Willful Disobedience Volume 5, Number 3\par}}%
\vskip 1em
\vskip 2em
{\usekomafont{author}{Willful Disobedience, Wolfi Landstreicher\par}}%
\vskip 1.5em
\vfill
{\usekomafont{date}{Spring 2006\par}}%
\end{center}
\end{titlepage}
\cleardoublepage
\tableofcontents
% start a new right-handed page
\cleardoublepage
\emph{\textbf{What is the point of asking questions if we are not free to answer?}}
\emph{\textbf{What is the point of answering if the questions are always false?}}
\section{Editor's Note}
After this issue, I will stop publishing \emph{Willful Disobedience} in order to work on a number of other projects. I have several translations in the works, as well as a few major writing projects. I am also working on compiling a selection of my writings from about 1995 to 2005 to put together as a book in order to better clarify the development of my ideas as well as the common threads that run through them. So for now I want to put my time and energy into these projects without having to think about publishing a semi-regular publication.
I originally intended to make this last issue a single long essay, an attempt to reflect on a number of problems and questions that I continually wrestle with, but that project has proven to be greater than I thought and is becoming a small book. So instead this last issue brings together a few essays, journal entries and translations that I feel are of some interest for sparking discussion and maybe provoking action.
\emph{Wolfi Landstreicher}
\section{The City: A Few Random Thoughts}
\emph{(The thoughts below are rather random meanderings provoked by reading a few books of urban analysis. Within the present world I have tended to find wild areas on the one hand and cities on the other as the environments that most stimulate my thoughts and imagination. At the same time I recognize that every city that we know of has been a monument to domination, commerce and alienation. In these meanderings, I consider what it is about cities that I find stimulating and raise questions about how these things might exist in a world without cities. This is} not \emph{a defense of cities)}
Ultimately I want to do away with the city. It represents the values of civilization which boil down to alienated and centralized power and wealth. Yet there are aspects of the city that I enjoy, particularly the opportunity for chance encounters with stimulating strangers. Where human beings do not congregate in large numbers, the opportunities for such encounters are much reduced or even disappear. But nowadays cities are built to serve the needs of capitalism and the state. And they have always served the interests of the ruling powers who had them built: priesthoods, military elites, those who stole the wealth and creative energy of others in order to set themselves up as rulers.
In her otherwise interesting book \emph{The Death and Life of Great American Cities}, Jane Jacobs forgets this aspect of the city, its role as symbol and tool of the ruling class. This is not so surprising since at a certain point cities become too large and chaotic for the rulers to keep them in hand. So Jane Jacobs tries to look at cities in terms of how they actually function as relationships among human beings and between the human being and this particular artificial environment. What I find most interesting in Jacobs’ book is her assessment that the city functions best as an environment for human life when it is diverse and vibrant with a wide variety of people and activities interweaving with each other. This parallels what comprises a healthy wild environment — it needs a wide variety of different life forms carrying out a variety of different activities that weave themselves together. The destruction of such diversity indicates a moribund situation.
Going back to the city as Jacobs conceives it, we see the need for an active street life. This is where the interweaving diversity manifests itself most clearly. According to Jacobs, for this to function most effectively, wide sidewalks where various activities could take place would have to combine with a mixture of different sorts of uses of space in the neighborhood. Consider, for example, how a café with outdoor tables on the sidewalk in a neighborhood that also included people’s homes and public spaces for other purposes could encourage regular interaction and discussion of experiences among those who live in the neighborhood. All in all, Jacobs considers a wide variety of different levels of relationship as necessary for making cities livable human environments.
Jacobs is wrong in considering the various suggestions of city planners that undermine this diversity and empty the streets to be well-intentioned mistakes. She is giving these well-paid servants of power too much credit. As I pointed out above, cities emerged with centralized power and wealth and have always been meant to serve the purposes of the rulers who hold these. As industrialism congregated greater and greater numbers of those in the exploited classes into cities, they began to turn the environment to their own purposes, and the ruling class had to take action to counter this. City planning as a recognized specialization can be traced back to Hausmann whose changes in Paris were intended to limit the possibility of insurrection by making it easier for the state’s troops to maneuver through the streets. This should make it clear that the aim of city planning has always been control in the ruling class’s interest. If, in times of “social peace”, vibrant and varying activity on the streets prevents the petty unpleasantness that might otherwise mar people’s daily lives, it also provides a network of relationships that can form the basis for self-organization among the poor and exploited in times of social unrest, with the potential of pushing that unrest in the direction of insurrection. In such situations, these networks of communication can be turned to such interesting purposes as keeping an eye out for the cops. It is in the interest of the ruling class to do all that it can to hinder the formation of such networks of communication. And the forms of city planning Jacobs describes and attacks in her book do precisely that.
The division of cities into zones for different purposes is a prime example. Downtown shopping areas, more specialized shopping areas for “bohemian” tastes, arts districts, residential areas, industrial areas, may not always have strict boundaries, but they still indicate the specialization of space in cities. This specialization affects the nature of foot traffic, allowing for greater social control and reducing the opportunities for stimulating chance encounters. When I live in New Orleans in 1991, many neighborhoods had not yet succumbed to this sort of specialization. If I occasionally encountered some less than pleasant realities, I also encountered a vibrant, active street life that offered a wide variety of interesting encounters and led to the discovery of some wonderful secrets about the city. Of course, New Orleans has changed drastically since then. And the devastation that Katrina caused has opened the door to building the city completely in the service of capital.
Portland, on the other hand, already has its divisions. It is not as bad as some places, but increasingly the only public spaces that exist are those dedicated to commerce in some form, and these are being more and more concentrated into malls, strips and other areas devoted almost exclusively to commercial interaction. So these become the areas of activity while residential sidewalks are mostly deserted. Thus, for the most part, public gathering is specifically attached to commodity consumption. Nonetheless, in some of the poorer neighborhoods, the streets are more active with playing children, adults hanging out on their porches, at bus stops, etc. But it is not the vital street life Jacobs describes from fifty years ago.
So the question arises, where will we find the networks of communication we will need in times of social unrest? This is particularly important now in the US where class reality is often hidden under racial tension. In a riot provoked by another cop killing another black person, how are black people on the street to know who their “white” accomplices are when day-to-day interaction is so minimal? This is not a minor problem.
In the context of industrial civilization, the desire for chance encounters with strangers is more readily fulfilled in cities than in any other human environment. But this comes about purely by accident due to the concentration of large numbers of people in these artificial environments for much less desirable reasons. (Cities have generally been formed for purposes of control and commerce — having military, religious and\Slash{}or economic origins.) Over the last several decades, city planners, obviously working in the interest of the ruling order, have been doing all they can to reduce the possibilities for such encounters, keeping them confined to locales where they are easily controlled and generally connected to commodity consumption — bars, cafes, malls, etc. These environments are becoming less and less conducive to such encounters due to imposed noise, surveillance and the unpleasantness of most modern urban architecture. This combines with the reification and commodification of social identities and relationships that has made it harder for people to reach out beyond their own cliques and subcultures and the underlying everyday fear of the other that has insinuated its way into our minds from a variety of media scare stories to transform modern cities into wastelands of overcrowded desolation.
There are people who are content to stick with their cliques or retreat to small town or rural provincialism with only the expected and known relationships. But this is often a recipe for stagnation. The desire for chance encounters is a reflection of a desire to be stimulated and challenged in new ways, to be provoked to explore the unknown, to act and think outside one’s usual habits. The people that we know too well, that we see and interact with regularly, rarely provide such stimulation. These known relationships are necessary for providing intimacy, comfort, trust, complicity, affinity and the support necessary for exploring the unknown. But it is the encounter with the unknown, the stranger, the encounter with \emph{difference}, that keeps life vibrant and lush.
But this brings up another way in which this society has been undermining the joy of chance encounters. The reification of social identities into defined categories, particularly in this age when mass media guarantees an increasing standardization of these identities, undermines the capacity for individuals to express their uniqueness. It is increasingly difficult for many people to break out of a character that is simply a collage of social identities to express anything deeper. So most “chance” encounters now have a ritualized style similar to the sorts of encounters this society imposes. This raises an immediately practical question: what can we do to break through these standardized rituals? Here the ideas of creating situations, \emph{detournement} and subversion take on a significant personal meaning in the context of daily life.
As cities are increasingly designed to enforce the suppression of these encounters, to be stagnant swamps of enslaved humanity capable only of serving the needs of the state and capital, it becomes urgent for everyone who loves these encounters, and particularly those of us who see the need to destroy civilization and, thus, cities to reflect on how we could maintain the possibility for such encounters, both now within (and outside of) increasingly sterilized, prison-like cities, and in the future in a world without cities. The purpose of such reflection is not to come up with the solution, the blueprint, the guarantee of an ideal future. Rather it is an area for exploration and experimentation.
In \emph{Letters of Insurgents}, Jan describes his dream of possibilities in a world without the economy or the state: “We’ll leave the clearing and walk through the forest to the neighboring village and we’ll think we’re dreaming, because the village won’t be there anymore; we’ll find thousands of people building a city like no city that’s ever been built and they’ll welcome us and ask us to help because they’ll all be our friends; there won’t be any policemen or prying old women because they’ll all be too busy building or making love. We’ll stay in our friends’ beautiful city as long as we want and not a minute longer; we’ll be as free as birds; we’ll roam across the entire country; we’ll visit streams and caverns and other cities, and in each city we’ll find only friends; they’ll all beg us to join them in what they’re doing and we won’t know where to turn first because every activity to which we’re invited will seem more gratifying than the rest.” Certainly, the capacity to freely roam will play a significant factor in the opening possibilities for chance encounters, as will experiments in creating different ways that human beings can be together, based upon the active creation of our desires.
1 also think of large festivals and gatherings that may last for weeks, based upon the sheer enjoyment of other people rather than on shared ideas — or shared subcultural style. It seems that in certain areas of the world, before permanent trading centers arose, temporary bazaars would be set up in recognized places for trade and other forms of human encounter. Although these bazaars originated in economic exchange, many other sorts of interactions could and did happen there. In addition, Native American powwows are an example of people coming together for larger scale interaction.
A writer who was once interesting (but who has sadly since become disgusting) suggested an area for exploration along these lines: “the importance of the time\Slash{}space of non-work, which, until the stage of the real domination of society was reached (i.e., before World War II), was one of encounters between individuals as opposed to simply one of recreation. The city represented the space in which the activities of reproducing the labor force were détourned into the streets, cafes, festivals (especially traveling carnivals), dances and music, expressing the existence of individuals who were both unique \emph{and} separated from their social relationships\dots{}”
Because I don’t have or desire a blueprint for what a decivilized, anarchic society might be like, I would not rule out the possibility of a different sort of large-scale, more permanent gathering of human beings. — something for which we have no words since such gatherings certainly wouldn’t be like any city that has ever existed, being free of all the economic, political, religious and military aims or constraints that have been the purpose behind every city since the beginning of civilization. The question of how any of this might manifest is an area for creative exploration and the practical application of imagination. There are numerous sources of inspiration: William Blake, the surrealists, the Diggers, various radical millenarian movements, Native American powwows and villages, the wide variety of festivals that have existed throughout human history. This is a realm for creative dreaming, for considering the broad spectrum of human possibilities and what we could create from it to realize our various and conflicting desires.
\section{On Wildness}
\emph{The question of human “wildness” demands serious reflection. If it is something that each of us must create, it is also something that can never be created once and for all, definitively. Like uniqueness, it is a concept that has no content in itself. We give it content by the ways we choose to create it, to live it in each moment, and this content changes with each moment. This is why wildness must always remain an unknown, why it cannot be a reduced to a set of skills or an adherence to instinct nor raised to an ideal to which we surrender ourselves. As soon as it becomes something definable, it has been domesticated and is obviously no longer wildness. Sanctified “wildness” (“Wild Nature” or the “Primal Being”), like all gods, is a domesticated beast. This domestication becomes obvious when this beast is used to judge, to determine right and wrong. Those whose “instincts” tell them what ideas are right or wrong, those whose “gut feelings” allow them to judge the choices and behaviors of others on a moral level, are domesticated creatures with domesticated “instincts” and feelings.}
\emph{Of course, when I bring out what is in the depths of my being, what has been repressed by this civilized society, I do not lose the capacity to make distinctions. But these distinctions are not based on any absolutes, on universal concepts of “right” and “wrong”. So I do not make these distinctions by casting absolute judgments, declaring, for example, that “I know in my heart this is wrong”. Rather I use my capacity to make distinctions for determining whether something is likely to enhance my existence, increasing my self-enjoyment or not. In this process, I don't merely rely on “instincts” or “gut-level feelings”. Rather I use all the tools I have at hand including my capacities to decide, to reason, to plan, to organize my activities, to consciously develop relationships with others with whom I can develop projects.}
\emph{But I have veered from my main intention which was to speak about “wildness”. As I said above, it is an unknown that has to be perpetually created and re-created. Since we have already been civilized and domesticated, it can only be of use to us as that which perpetually negates domestication and this capacity to negate resides precisely in its remaining an unknown, an empty concept which we perpetually fill with our desire to create our lives as our own as it confronts the world that has stolen our lives. Once reified into an ideal to which we must conform and from which we can cast judgments, it becomes a domesticator itself. Thus, its real use is as an iconoclasts hammer for smashing all reified concepts including that of “wildness” itself if that becomes necessary.}
\emph{Conceived as this indefinable, unknown concept whose content we create in every moment, wildness is nothing more nor less than a poetic way of describing the uniqueness of each of us. For like wildness, uniqueness is destroyed the moment it is defined. It too is an empty concept that we endlessly fill through our perpetual creative activity. And since “wildness” has begun to have more and more ideological constructions attached to it, perhaps it is better to simply speak of uniqueness as the tool through which each of us can negate the processes of domestication civilization has imposed upon us.}
\begin{center}
* * *
\end{center}
\textbf{Subversion is a game of wild, barbarous forces.}
\section{Play Fiercely! Our Lives Are at Stake: Anarchist Practice as a Game of Subversion}
When I first encountered anarchist ideas in the late 1970s and early 1980s, it was quite common to talk about play and the subversive game, thanks to the influence of the Situationist International and better aspects of the counterculture. There is a lot to be drawn from thinking of our practice on these terms. In particular, I think that looking at anarchist revolutionary practice as a subversive game is a fruitful way of understanding anarchist aims, principles and methodologies as a basis for developing our strategies and tactics.
The thing that has distinguished anarchism from other conceptions of radical transformation is that anarchists have generally considered their ideas to be something to live here and now as much as possible as well as goals to be realized on a global scale. While there have certainly been anarchists who have chosen to turn their perspective into mere politics, the idea of living anarchy immediately gives anarchism a scope that goes far beyond such meager visions, opening it to the whole of life.
This aspect of anarchism is what makes anarchist practice resemble a game. Let me explain. A game could be describes as an attempt to achieve a specific aim using only those means that fit certain conditions accepted by those involved for the enjoyment they find in following these conditions, even though they may lower efficiency. The aim of anarchist practice would be to achieve a world free of all domination, without state, economy or the myriad of institutions through which our current existence is defined. I cannot claim to know what the most efficient way to get there would be. From an anarchist point of view, there has not yet been a successful revolution, so we have no models for efficiency. But those who desire this end, not out of a sense of duty as a moral cause, but rather as a reflection on a grand scale of what they want immediately, for their own lives, petty calculations of efficiency in achieving this end are hardly a priority. I know that I would rather attempt to achieve this end in a way that gives me the immediate joy of beginning to take back my life here and now in defiance of the social order I aim to destroy.
Here is where anarchist “principles” - the “rules” of the game — come in. The refusal to choose masters, promote laws, go to the negotiating table with the enemy, etc. are based on the desire to make our lives our own here and now, to play this game in a way that gives us joy immediately. So we choose these “rules” not out of a sense of moral duty nor because they are the most efficient way for achieving our goals, but rather for the joy we get from living on these terms.
In this light, we can also understand why in the area in which compromise is most forcefully imposed on us — the realm of survival in a world based upon economic relationships, which always opposes the fullness of life — we will choose whatever methods are necessary to keep us alive (how else could we play this game). But we will do what necessity imposes on us in these situations (work, theft, scamming, etc.) as temporary measures for sustaining our capacity to steal back our lives and fight for the world we desire, maintaining our defiance in the face of this imposition. This is, in fact, one aspect of the subversive game in practice, twisting the impositions of this world against it.
Here, I feel it would be good to draw a distinction between the outlaw and the anarchist who is playing the game of subversion. Of course, every anarchist is to some extent an outlaw, since we all reject the idea that we should determine our activity on the basis of laws. But most outlaws are not playing the subversive game. Rather they are centered on the much more immediate game of outwitting the forces of order without seeking to destroy them. For the anarchist revolutionary outlaw, this immediate game is simply a small part of a much greater game. She is making a much bigger wager than that of the immediate “crime”. He is grasping his life now in order to use it to grasp the world.
So this game combines the goal of destroying the ruling order so that we can create a world free of all domination with the desire to grasp our lives here and now, creating them as far as possible on our own terms. This points to a methodology of practice, a series of means that reflect our immediate desire to live our lives on our own terms. This methodology can be summarized as follows: 1) direct action (acting on our own toward what we desire rather than delegating action to a representative); 2)autonomy (refusal to delegate decision-making to any organizational body; organization only as coordination of activities in specific projects and conflicts); 3) permanent conflict (ongoing battle toward our end without any compromise); 4) attack (no mediation, pacification or sacrifice; not limiting ourselves to mere defense or resistance, but aiming for the destruction of the enemy). This methodology reflects both the ultimate aim and the immediate desire of anarchist revolutionary practice.
But if we are to consider this practice as a game, it is necessary to understand what type of game this is. We are not dealing with a game in which two (or more) opponents are competing against each other in an effort to achieve the same goal. In such a game, there could be room for compromise and negotiation. On the contrary, the subversive game is a conflict between two absolutely opposed aims, the aim of dominating everything and the aim of putting an end to all domination. Ultimately, the only way this game could be won is through one side completely destroying the other. Thus, there is no place for compromise or negotiation, especially not for the anarchists who are clearly in a position of weakness where to “compromise” would, in fact, be to give up ground.
The aims, principles, methodology and understanding of the nature of the battle at hand describe the anarchist revolutionary game. As with any game, it is from this basis that we develop strategy and tactics. Without such a basis, talk of strategy and tactics is just so much babble. While tactics are something we can only talk about in the specific contexts of deciding what moves to make at specific points, it is possible to speak in a more general way about strategy.
Strategy is the question of how to go about reaching one’s goals. This requires an awareness of a certain factors. First of all what is the context in which one is trying to achieve these goals? What relationship do the goals have with the context? What means are available for achieving these goals? Who might act as accomplices in this endeavor? These questions take on an interesting twist for anarchists, because our goal (the eradication of all domination) is not just something we want for a distant future. Not being good christians, we aren't interested in sacrificing ourselves for future generations. Rather, we want to experience this goal immediately in our lives and in our battle against the ruling order. So we need to examine these questions in terms of this dual aspect of our goal. The question of context involves analyzing the broader global context, the nature of the ruling institutions, the broader tendencies that are developing and the potential points of weakness in the ruling order and the areas for potential rupture. It also involves examining the immediate context of our lives, our voluntary and involuntary relationships and encounters, the immediate terrains that we traverse, our immediate projects and so on. The relationship between what we are striving for and the general context of this social order is one of total conflict. Because we are striving not only to destroy domination, but also to live immediately against it, we are enemies of this order. This conflict is deeply ingrained in our daily lives, in the variety of activities that are imposed on us by the rule of survival over life. So this conflict is central to determining our strategy. Since part of our goal is to grasp our lives back here and now, our means need to embody this. In other words, any means that involves surrendering our grasp on our lives (such as voting) is already a failure. But this is where it becomes necessary to distinguish what activities constitute such a surrender (voting, litigation, petitioning, bargaining with the enemy) and which can be incorporated into the reappropriation of one’s life and the attack against institutions of domination (for example, a temporary job, certain sorts of scams, etc., that give one access to certain resources, information and skills that are of use in one’s subversive activity). And our accomplices could be anyone, regardless of whether they have a conscious anarchist critique or not, who uses means in their specific battles against what immediately dominates and oppresses them that correspond to our own — means through which they are actively grasping their lives and struggles as their own immediately. And our complicity would last only as long as they used such means, ending the moment that they give up their autonomy or begin to bargain with their rulers.
Having established this basis, here are a few areas for discussing strategy:
Survival vs. the fullness of life - Strategies for continually overturning the dominance of survival over our lives, for making our projects and desires determine how we deal with survival to the greatest extent possible - for example, when one needs to take a job, using it against the institution of work and the economy through theft, giving things away, sabotage, using it as a free school to pick up skills for one’s own projects, always seeing it as a temporary means to ends of one’s own and being prepared to quit as soon as one's desire requires it.
Solidarity - There are two distinct aspects to this. 1) There are many flare-ups of social conflict that partially reflect the desire to take back life and destroy domination and that use a methodology like that described above, but without a full conscious critique on the part of the participants. How do we connect our conscious, ongoing conflict with the ruling order to these flare-ups of conflict in a way that fits with our aims, “principles” and methodology? Since evangelism and “moral leadership” conflict with these “principles” by turning us into pawns of a cause that we are trying to promote, we need to think in terms of complicity and straightforwardness. 2) Then there are the times when the enemy grabs some of our comrades and accomplices and locks them up. There is a habit in these situations of falling into a framework of support\Slash{}social work\Slash{}charity. In terms of our aims and desires, I think this is a huge mistake. Without denying the necessity in building defense funds and keeping communication open, our primary question is how to turn this situation into a way for attacking the ruling order. The anti-prison activities of the French group \emph{Os Cangaceiros} give some food for thought here.
Small-scale, everyday ruptures - There are events that happen every day on a small scale that cause temporary breaks in the social routine. How can we use these subversively against this order, to expose the reality of this society and to open other possibilities? How can we create such ruptures in a way that undermines resignation and acceptance of normality?
Large scale ruptures — Disasters, riots, local and regional uprisings all cause ruptures that can reveal a great deal about the ruling order and that move people to self-activity, generosity and a temporary rejection of the moral order of this society. How can we take advantage of such situations in a timely manner? What can we do to help extend the awareness and the rejection of the moral order beyond the moment? How can we expose the various politicians and bureaucrats of rupture — political parties, union leaders, militants and activists - without coming across as another one of that parasitical bunch?
So there is a vast and challenging game before us, one that I believe could make our lives into something marvelous. It is a game we have to play fiercely, because in this game our lives are the stake. There are no guarantees, no sure-fire methods for winning. But for each of us, as individuals, there is one sure-fire way to lose. That is to give in, to resign oneself to what the ruling order imposes. Who's ready to play?
\section{Beyond Survival: Some Thoughts on Giving our Projects and the Enjoyment of our Lives Priority}
\begin{quote}
\emph{The search for joy is therefore an act of will, a firm refusal of the fixed conditions of capital and its values.—Alfredo M. Bonanno}
\end{quote}
Over the past few years, I have noticed that it has been becoming trickier to live my life and carry out my projects in the way that I desire while also managing to take care of my basic needs. And among my friends, I am one of the luckier ones. When I am strapped, I know that it will only last till the first of the next month. In fact, most of the people I know are struggling to get by, to pay the rent and bills, to take care of basic needs and have a bit of fun in the process.
This is no surprise. We all know that we live in a capitalist society, and in our daily lives the essence of that society manifests in the opposition between survival and the fullness of life. The process of alienation by which capitalism is maintained transforms the methods by which we meet our needs into tedious tasks stealing our lives away from us (or at best, as in my case, isolated scams that skim the excess off the state without in any way threatening it). In recent times, transformations in the functioning of capitalist social relationships along with a real deterioration in the economy have made precariousness the common experience of most of the exploited, Including ourselves. This has led to a situation in which a number of creative, intelligent people are being forced to eat away their time in search of the means to survive.
My own experience and the often even more nerve-racking experience of a number of close friends and comrades has been causing me to think a great deal about the need to develop ways of giving our lives in their potential fullness and our projects of revolt and enjoyment priority over survival. In other words, I’ve been asking myself, how do I and those with whom I share ideas, desires, life and enjoyment turn survival into a mere tool for creating our lives on our terms — obviously against the very logic of capitalism.
In confronting this question, for the most part, anarchists have continued to operate on a fragmented, atomized level. Scams, school, temporary jobs and so on are the ways we deal with survival. To some extent this is inevitable. We do live in this world, even if we also try to live against it. And the specific aspects of what we do to survive are less important than whether questions of survival continue to dominate our existence at the expense of enjoyment, revolt and the fullness of our lives and projects. And this is where I feel we need to make a serious effort to get beyond atomization and the fragmented ways of encountering life that this society imposes. I think it is worthwhile to look at experiences of people who have confronted this, whether from a specific revolutionary understanding or simply from a lust for life.
\subsection{North Beach, 1960}
In the introduction to Dancing in the Streets, Franklin Rosemont describes his experience in the bohemian culture of North Beach, San Francisco in 1960:
\begin{quote}
“Life in North Beach was the closest thing to marvelous anarchy it has ever been my pleasure to enjoy. Despite battles with landlords, harassment by tourists, and mounting police terror, the Beats and their allies — old time hoboes, jazz musicians, oyster pirates, prostitutes, drug addicts, winos, homosexuals, bums and other outcasts — maintained a vital community based on mutual aid, and in which \textbf{being different} was an asset rather than a liability. In this community made up of people of many different races and nationalities, the practice of equality and solidarity was second nature. Almost everyone was poor, but no one went hungry, and newcomers had no trouble finding places to stay. In North Beach, 1960, what mattered most was poetry, freedom, creativity and having a good time.”
\end{quote}
This brief description expresses more the general \emph{feeling} Franklin Rosemont had of his experience living North Beach at that time than how this reality worked itself out practically. But those of us who have experienced similar situations can imagine such details, and I feel that Rosemont’s evocative description brings out some significant points. In particular, the last sentence stands out: \emph{“}\emph{I}\emph{n North Beach, 1960, what mattered most was poetry, freedom, creativity and having a good time.”} In other words, among the people Rosemont hung out with in North Beach, their creative projects and the enjoyment of their lives were their active priorities, and so they simply did what was necessary to live these priorities, acting together to guarantee that the ground on which to build their creative projects would be there. In this case, most of the people involved were not revolutionaries or anarchists, but simply individuals who had no interest in fitting into the normal grind of existence in this society.
\subsection{Os Cangaceiros}
We are all familiar with the uprising that happened in France in 1968. One of the slogans that reflected the most radical elements of this revolt was “Never work, ever!”, and there were many who took this slogan to heart in the creation of their lives after the uprising was suppressed. One group is particularly outstanding in that their choices reflect a clear awareness that work wasn’t simply productive activity or the “job”, but rather was an entire system of social relationships. Thus, the refusal of work couldn’t simply mean work avoidance or the reduction of work to the bare minimum. It meant creating life in a different manner and attacking the system of social relationships that is work. This group, which came together in Nice in 1968, was made up of “delinquents” already familiar with the world of crime who discovered a revolutionary perspective in the days of insurgence in France. When they first came together to share their capacities and resources for creating life on their own terms, they called themselves the Gravediggers of the Old World. This informal group of comrades traveled first around southern France, making connections taking part in struggles and doing what was necessary to provide the basis for their lives. Throughout the 1970s and 1980s they traveled throughout Europe, participating in revolts, including those in Italy in the mid to late 1970s, in Poland in 1980, in England, France and Belgium in the early 1980s. A statement they made in 1980 indicates the spirit they brought to their revolt:
\begin{quote}
“If we loot banks, it is because we have recognized money as the central cause of all our unhappiness. If we smash windows, it’s not because life is dear, but because commodities prevent us from living at all costs. If we break machines, it is not because of a wish to protect work, but to attack wage slavery. If we attack the police bastards, it’s not to get them out of our faculties, but to get them out of our lives. The Spectacle wanted to make us appear dreadful. We intend to be much worse.”
\end{quote}
In pursuit of their ongoing project of revolt and the full enjoyment and experience of life, they used whatever means gave them greatest control over their own lives, means that were often illegal. They refused any sort of meagerness or pseudo-revolutionary asceticism, squatting, for example, in luxury buildings which they armored well against the police. Being of the underclass, they were able to easily develop networks of support that went beyond the limits of any radical connections they had. Their way of living inevitably brought them into conflict with the law and in time started to focus a greater amount of their energy into attacks against the judicial and prison systems. This was about the mid-1980s. At this point they began to call themselves \emph{Os Cangaceiros} (after a group of mystical outlaw insurgents who were active in Brazil at the beginning of the 20th century). They were active at this time in prison revolts, sabotage of prison construction, disruption of judicial activity, escapes and so on. Around 1990, they stole plans for the construction of new, advanced technology prisons, made thousands and thousands of copies of these plans and mailed them with analyses of the prison society to thousands of people. Unlike the previous example, these are people with a conscious revolutionary perspective, developed in the course of an uprising, who decided to go on living that perspective. This decision, rigorously embraced, moved them to discover the means for living their revolt, their projects and their pleasures on their own terms, defying the alienation imposed by capital.
\subsection{My Experience in the Early 1990s}
From the time I first encountered anarchist and revolutionary ideas, it was clear to me that they couldn’t simply be words tossed from one’s mouth into the air. They had to affect how one lived. Thus, my decision to embrace such ideas was a decision to wrestle with how I would live. At this point, I have been wrestling with this for more than twenty-seven years. At various times, I have found others with whom to share this ongoing battle to create my life on my terms. What we created, how consciously we created it and how far it went in expressing our desires and dreams varied, but at no time did I simply give up my pursuit of a life of revolt and joy. Perhaps the most outstanding period of my life happened in the early 1990s here in Portland. In certain ways, what I experienced with specific friends and the networks we developed is reminiscent of Rosemont’s description of North Beach in 1960. I moved to Portland at the end of 1991, where I met several people who were to be my closest companions and accomplices for the next few years, and a few of whom remain among my best friends to this day. While each of us had various ways of bringing in the money that we needed to get by, this aspect of our lives was always kept subordinate to our enjoyment, our revolt and our projects. Not everyone among our little group of friends was an anarchist, but everyone, at least for the time, had an irrepressible lust for life that couldn’t help but express itself in rebellious way in this society. Our life together involved endless adventures: theft, travels, small attacks against various manifestations of the world we hated, public playful disruptions of daily life. I remember one May Day in which we wandered around downtown Portland through the business district playing improvised noise on various instruments, handing out flyers inviting people to come join us for an afternoon picnic rather than going back to work. We had stolen a fairly good supply of food and beer — quite a bit more than we ourselves needed. We had a delightful time and received quite a positive response (from smiles to “thumbs-up” gestures to encouraging comments), but I don’t recall anyone else quite having the courage to take the afternoon off and join our picnic. Still we had a delightful time, and this event is reflective of the sort of life we chose to live together. Also these activities, a short-lived anarchist coffeehouse that we did in our house and our constant posting of poetic messages of revolt on telephone poles and other places helped us develop a network of connections that kept a fairly decent flow of all the material pleasures of life available. This network, which extended far outside specifically anarchist milieus, provided a good bit of the material basis for how we chose to live. If in North Beach, “what mattered most was poetry, freedom, creativity and having a good time”, for us it was rebellion, poetic living, creativity and having a good time. If some of us had a revolutionary perspective that was lacking in the North Beach scene Rosemont describes, at the same time we certainly did not have the clarity about our life projects that \emph{Os Cangaceiros} had. We had amazing utopian dreams, but did not really conceive of our lives as totalities for us to create against the totality of this society. Our visions lacked projectuality except in the broadest sense (and that only among the few of us who were anarchist), and this limited the extent of our projects. Nonetheless, at this time in my life I experienced in Portland something similar to what Rosemont experienced in North Beach, a kind of semi-conscious utopian practice against this world which made life a delight and created some of my closest friendships.
\subsection{And Us? Here? Now?}
What do these examples have to say to us? Certainly, there is no use in trying to imitate any of these examples. Our times, our circumstances, our needs and our capacities are our own. But there are specific lessons that can be drawn from these examples. First and foremost, in each of these instances, those involved chose to put their projects and the enjoyment of their lives before survival, rejecting the blackmail that capitalism imposes. This transforms the means used for acquiring basic necessities into nothing more than tools for constructing our lives and projects. This is the practical meaning of a reversal of perspective with regards to this world. In order to achieve the capacity to do this, in each instance people acted together developing networks of mutual aid and complicity. Of course, the North Beach scene, based mostly on a fairly loose bohemian affinity, faded as the Beat scene disintegrated and many of those involved moved into the mainstream in different ways. The situation that I lived in Portland also eventually disintegrated as some friends chose to drop into a more mainstream existence and the rest of us started exploring different ways toward our shared dreams of anarchy and the fullness of life. Although the last I heard of \emph{Os Cangaceiros} was in the early 1990s, it is possible that they are still living on these same terms — after all, they had been living this way, on their own terms, for over twenty years. Certainly there are other individuals in Europe who have come together for much the same purpose, continuing to develop their ways of living against the ruling order. I think that what distinguishes \emph{Os Cangaceiros} from the other situations is that they clearly recognized what they opposed as a totality of intertwining social relationships that had to be practically fought in its completeness and also clearly perceived their own lives as total projects to create in conscious rebellion against this world for the sheer joy and adventure of doing so.
And I think it is this perception of life not as a series of random, disconnected moments, but as a totality to be created on our own terms that provides the basis for turning the blackmail of this society on its head and subjugating survival to the fullness of life and revolt. Of course, we will be doing this in a context that on the global and the everyday life scale absolutely opposes this. But this only means we need to have that much more resoluteness in our decision to carry on this project. Here is where a conscious choice to act with specific others can be of great significance. With others whose aspirations, dreams and desires correspond with ours, possibilities expand exponentially. But only if we actually talk with each other about our dreams, our desires, our needs, the tools and skills we have to share, the projects we are trying to create. We are all aware that when we have a small project to do — say cooking a meal or building a cabin — it is necessary to consider the details of what we want to accomplish, figure out the tools and methods necessary to accomplish it, figure out the various hindrances that stand in our way and how to go about eradicating them. The same idea applies to the project of creating our lives as an unfragmented, total project against this society. And so, if we have some affinity in terms of our broader conceptions of a life free from the state and capital, in terms of our dreams and desires for self-created existence and in terms of the necessity for destroying the social reality that stands in the way of this, we need to talk about these dreams and desires, about the specific ideas for projects of revolt and enjoyment we have, about the tools and capabilities we have to share and teach other, about ways to develop informal networks of mutual aid so that no one among us is ever really forced to place survival above their projects or lives.
I know that these are particularly tough times for such defiance, that a number of us are just scraping by. But we are smart, strong, defiant individuals capable of great dreams and great enmity toward that which tries to steal our dreams. This is something we all have to remember. A habit has developed in anarchist circles of thinking of ourselves as weak, as damaged, as hurt. I think this stems from bringing too much of the language of disease, therapy and healing into our social analysis — but that is a question that would need to be gone into more thoroughly elsewhere. The point I want to make here is that we need to start from the assumption that we can accomplish the things we desire, from the smallest projects to the ultimate destruction of the social order we hate and the creation of our lives on our own terms. Starting from this assumption, we need to begin to assess the specific problems we face with the aim of overcoming them — recognizing that as long as this society continues to exist this will be an ongoing project.
So let’s discuss our dreams and our rebellious aspirations not on a purely abstract level, but in terms of how we can develop relationships of practical affinity, complicity and concrete solidarity in the project of creating total lives of revolt here and now. Those of us who are feeling the crunch of survival in particularly hard ways can share their dreams and their needs, and among us, we should be able to figure out ways to open possibilities for getting beyond this without falling into the usual limited atomized solutions.
If we remember that work is not simply the job but precisely the system of social relationships that forces us to give survival priority over life, joy, revolt and creativity, then it becomes clear that this reversal of perspective is a necessary basis for our revolt. The effort put into avoiding work without having an ongoing project of creating one’s life as a whole itself stinks of work \textasciitilde{} here too survival still has priority. But if we have a clear life project and the specific means we use to get money and other necessities imposed by this society are only temporary tools for moving that life project forward. This already breaks down the logic of survival and work even if sometimes these specific means are jobs. But such a project is built precisely out of our relationships with the world and with each other. The individuals in the situations described above were able to place their enjoyment, their lives and their projects above survival, because they made the decision to create their lives together on their own terms, and rejecting the fragmentation imposed by capitalism, this included figuring out how to meet basic needs together without being dominated by survival. We have a lot to offer each other. Let’s figure it out and find the ways to defy this blackmail together.
\subsection{A Few Questions to Consider}
How does each of us conceive of our lives? How do we want to live both on grand social terms and in our immediate lives? Where do our various visions coincide? Where do they differ? Where can they enhance each other? Where do they actually conflict?
How do we perceive revolution? Insurrection? Subversion? Destruction of the ruling order? Where do these ideas coincide and differ? Where can they enhance each other and where do they conflict?
What great and small projects do we imagine? What ones are we actually doing now? How can these intertwine? What tools, knowledge and capacities do we have to share to enhance these projects and better interweave them in mutuality?
What stands in the way, on an immediately daily life level, of creating our lives on our own terms, of accomplishing our projects? In other words, where does the blackmail of survival have us by the throats? What ideas do we have for overcoming this? What knowledge, skills or means might some of us have to share for overcoming this?
We need to consider that creating life on one’s own terms requires having the space and time for doing so, and capital does tend to dominate all space and time. So we need to ask as well, how do we take the space and time we need to carry out these projects of creating our lives on our terms and destroying the social order that stands in our way? How do we give priority to grasping whatever space and time we can for this purpose? What spaces and moments do we currently have access to and how can we expand them? How can we steal those spaces and times that survival in this society imposes on us and use for our own purposes, against this society?
\textbf{I don’t pretend to have answers, but this is a project I want to pursue, a game I want to play, because in any case my life is at stake, so I might as well try to wager it on my own terms. My hope is that others feel the same and that we can begin to explore what this means together.}
\begin{quote}
\emph{We, however, start from the beginning. We are poor, we have unlearned how to play. We have forgotten it, our hands have unlearned how to dabble.}
—Ernst Bloch
\end{quote}
\section{A Few Last Words About Words}
\emph{We have a tendency to overvalue words. We put so much time into producing them, as if they were the source of life itself}\emph{.} \emph{We believe that there are words and ways of using words that are inherent sources of oppression and spend vast amounts of time trying to suppress these words, impoverishing our language in the process. In the meantime, the real practices of oppression go on, often carefully using the correct words to hide the practical reality, At the same time, we think that if we find the right combination of words, this will spark rebellion. So we make flyer after flyer,} \emph{z}\emph{ine after zine, with an evangelistic zeal, forgetting our own lives, our own desire for freedom, joy and the intensity of existence. By giving words such great value, we forget our own purpose in using them. They become our masters. This becomes evident in the attempt to evangelize, where our words become means for winning others over to a position, assuming that when enough people believe the right thing, they will rise up. But have those who rise up for words, and not for their lives, really risen up at all or are they just embracing a new master? If my aim is to take back my life, to create my desire, my joy, my passion, then how can I tum my words into tools for a position? They would cease to be my own words. For me, words can only be} \emph{a tool (or toy) for expressing and communicating my desire, my project, my life; one of the many tools I use to find accomplices, to create m}\emph{y} \emph{enjoyment and express the intensity of my passions, the wildness of my dreams. But disconnected from life, from practice, they are empty. And any word in the service of a cause, any evangelistic word, any word intended to draw followers to a position, has been disconnected from life, separated from the immediate practice of freedom, and so is empty. Thus, in overvaluing words, we drain them of meaning, because their meaning comes precisely from our lives and our choices.}
% begin final page
\clearpage
% if we are on an odd page, add another one, otherwise when imposing
% the page would be odd on an even one.
\ifthispageodd{\strut\thispagestyle{empty}\clearpage}{}
% new page for the colophon
\thispagestyle{empty}
\begin{center}
The Anarchist Library
\smallskip
Anti-Copyright
\bigskip
\includegraphics[width=0.25\textwidth]{logo-en}
\bigskip
\end{center}
\strut
\vfill
\begin{center}
Willful Disobedience, Wolfi Landstreicher
Willful Disobedience Volume 5, Number 3
Spring 2006
\bigskip
Retrieved on 15 October 2018 from \href{https://archive.org/download/willful\_disobedience\_5.3/willful\_disobedience\_5.3.pdf}{archive.org}
\bigskip
\textbf{theanarchistlibrary.org}
\end{center}
% end final page with colophon
\end{document}
% No format ID passed.
|
https://tabularasa.anarhija.net/library/contributo-barbaro-it.tex | anarhija.net | CC-MAIN-2021-49 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2021-49/segments/1637964363290.39/warc/CC-MAIN-20211206042636-20211206072636-00518.warc.gz | 604,224,493 | 7,636 | \documentclass[DIV=12,%
BCOR=10mm,%
headinclude=false,%
footinclude=false,open=any,%
fontsize=11pt,%
twoside,%
paper=a4]%
{scrbook}
\usepackage{fontspec}
\setmainfont[Script=Latin]{Linux Libertine O}
\setsansfont[Script=Latin,Scale=MatchLowercase]{CMU Sans Serif}
\setmonofont[Script=Latin,Scale=MatchLowercase]{CMU Typewriter Text}
% global style
\pagestyle{plain}
\usepackage{microtype} % you need an *updated* texlive 2012, but harmless
\usepackage{graphicx}
\usepackage{alltt}
\usepackage{verbatim}
% http://tex.stackexchange.com/questions/3033/forcing-linebreaks-in-url
\PassOptionsToPackage{hyphens}{url}\usepackage[hyperfootnotes=false,hidelinks,breaklinks=true]{hyperref}
\usepackage{bookmark}
\usepackage[shortlabels]{enumitem}
\usepackage{tabularx}
\usepackage[normalem]{ulem}
\def\hsout{\bgroup \ULdepth=-.55ex \ULset}
% https://tex.stackexchange.com/questions/22410/strikethrough-in-section-title
% Unclear if \protect \hsout is needed. Doesn't looks so
\DeclareRobustCommand{\sout}[1]{\texorpdfstring{\hsout{#1}}{#1}}
\usepackage{wrapfig}
\usepackage{indentfirst}
% remove the numbering
\setcounter{secnumdepth}{-2}
% remove labels from the captions
\renewcommand*{\captionformat}{}
\renewcommand*{\figureformat}{}
\renewcommand*{\tableformat}{}
\KOMAoption{captions}{belowfigure,nooneline}
\addtokomafont{caption}{\centering}
\usepackage{polyglossia}
\setmainlanguage{italian}
% footnote handling
\usepackage[fragile]{bigfoot}
\usepackage{perpage}
\DeclareNewFootnote{default}
\DeclareNewFootnote{B}
\MakeSorted{footnoteB}
\renewcommand*\thefootnoteB{(\arabic{footnoteB})}
\deffootnote[3em]{0em}{4em}{\textsuperscript{\thefootnotemark}~}
% avoid breakage on multiple <br><br> and avoid the next [] to be eaten
\newcommand*{\forcelinebreak}{\strut\\*{}}
\newcommand*{\hairline}{%
\bigskip%
\noindent \hrulefill%
\bigskip%
}
% reverse indentation for biblio and play
\newenvironment*{amusebiblio}{
\leftskip=\parindent
\parindent=-\parindent
\smallskip
\indent
}{\smallskip}
\newenvironment*{amuseplay}{
\leftskip=\parindent
\parindent=-\parindent
\smallskip
\indent
}{\smallskip}
\newcommand*{\Slash}{\slash\hspace{0pt}}
\addtokomafont{disposition}{\rmfamily}
\addtokomafont{descriptionlabel}{\rmfamily}
% forbid widows/orphans
\frenchspacing
\sloppy
\clubpenalty=10000
\widowpenalty=10000
% http://tex.stackexchange.com/questions/304802/how-not-to-hyphenate-the-last-word-of-a-paragraph
\finalhyphendemerits=10000
% given that we said footinclude=false, this should be safe
\setlength{\footskip}{2\baselineskip}
\title{Contributo barbaro}
\date{}
\author{}
\subtitle{}
% https://groups.google.com/d/topic/comp.text.tex/6fYmcVMbSbQ/discussion
\hypersetup{%
pdfencoding=auto,
pdftitle={Contributo barbaro},%
pdfauthor={},%
pdfsubject={},%
pdfkeywords={antipolit}%
}
\begin{document}
\begin{titlepage}
\strut\vskip 2em
\begin{center}
{\usekomafont{title}{\huge Contributo barbaro\par}}%
\vskip 1em
\vskip 2em
\vskip 1.5em
\vfill
\strut\par
\end{center}
\end{titlepage}
\cleardoublepage
\tableofcontents
% start a new right-handed page
\cleardoublepage
Se proviamo a leggere la realtà che ci circonda ci accorgiamo che stiamo assistendo allo sviluppo di profonde trasformazioni dal punto di vista della gestione del potere politico ed economico. Tali cambiamenti si riflettono anche a livello sociale. È necessario confrontarsi con le trasformazioni in atto e tenerne conto in quelle che sono le nostre analisi e prospettive di attacco.
Il capitale non è in crisi, ma più ‘semplicemente’ le scelte finanziarie degli Stati hanno creato delle difficoltà nella tradizionale gestione del mercato e hanno prodotto, in generale, un peggioramento delle condizioni di vita dei consumatori cittadini. Le contraddizioni che il capitale ha sviluppato hanno contribuito a determinare in alcune zone delle occasioni di scontro, più o meno cruente e di lunga durata, fra i guardiani del potere e le sue strutture e quelle sacche di popolazione stanche di essere escluse dagli agi che il fasullo benessere delle società del consumo promettono.
Di fronte a ciò è naturale chiedersi che fare. Essere “qui ed ora” è infatti alla base del nostro desiderio di rottura violenta con ogni sistema di valori, con il capitale e le sue sfumature.
Nell’ambito di tali riflessioni e nella definizione di prospettive che possano orientarci nelle strade incerte ed inesplorate della rivolta crediamo sia necessario evitare di confrontarsi con la realtà con gli occhi insabbiati da quei facili entusiasmi che rischiano di far vedere insurrezioni ad ogni angolo, complici in ogni indignato, soggetti rivoluzionari in ogni sfruttato. Al tempo stesso crediamo sia altrettanto pericoloso rimanere ancorati ad una sorta di pessimismo realista che rischia di renderci immobili di fronte allo scorrere del tempo, di trasformarci in attendisti imprigionati in una logica di tipo determinista.
Ciò che riteniamo fondamentale è porsi in un’ottica di lucida osservazione che può consentirci di cogliere le trasformazioni in atto, individuare gli aspetti vulnerabili del nemico, per poter meglio valutare cosa e come attaccare.
In una condizione mentale e materiale in cui domina l’urgenza di esserci (e non di essere), cioè di definizione di un proprio ruolo all’interno di una possibile conflittualità diffusa, si rischia di perdere di vista la centralità della questione: la necessità di partire da sé, dalle proprie idee e prospettive anarchiche. Ecco dunque che in occasione di una rivolta spontanea il problema degli anarchici non è quello di cercare un ruolo tra altri ruoli, di trovare il modo per farsi accettare dagli altri, di risultare gradevoli o nascondere i propri veri desideri per catturare alleanze. Sarebbe semmai utile scegliere delle condizioni di attacco che impediscano un ritorno alla normalità, sperimentare l'agire che ci appartiene, trovare degli obiettivi che la spontaneità da sola può non essere in grado di trovare. Qualsiasi ipotesi insurrezionale è imprevedibile e indipendente da noi, ma come anarchici, in un’ottica di conflittualità permanente e di definizione di progetti insurrezionali possiamo certo dare un contributo fondamentale a quando accade. .
Il problema che bisognerebbe porsi, secondo noi, non è tanto come relazionarsi alle possibilità di rivolta per strada, di lotte territoriali e\Slash{}o specifiche che potrebbero radicalizzarsi e diffondersi, quanto come continuare ad agire e ad attaccare, in una dimensione pratica e teorica, alla luce delle trasformazioni in atto all’interno della società e dei meccanismi di dominio.
Analizzare le pratiche e i percorsi di lotta in relazione agli obiettivi è tappa fondamentale di un discorso volto ad individuare i limiti e le prospettive nella teoria e nella pratica della sovversione sociale. Per poter meglio toccare i diversi quesiti e proposte che intendiamo portare avanti in questa sede individuiamo in alcuni punti alcune delle argomentazioni che vorremmo portare all’attenzione dei compagni.
Crediamo sia urgente affrontare la questione delle modalità di comunicazione fra compagni. Il problema può essere affrontato distinguendo due aspetti, quello delle modalità con cui decidiamo di comunicare e quello del valore che riconosciamo agli strumenti che di volta in volta scegliamo di utilizzare. Nello specifico ci riferiamo all'uso della rete telematica e il modo con cui ci relazioniamo alla stessa. L'utilizzo da parte nostra degli strumenti, seppur in piccola parte, è un dato di fatto, ma questo non è di certo un elemento per il quale possiamo considerarli utili in caso di insurrezioni o strumento fondamentale nella definizione delle nostre prospettive o, addirittura, qualcosa di cui possiamo liberamente disporre.
I sistemi di comunicazione di tipo virtuale hanno avuto uno sviluppo incredibile all'interno delle società in cui viviamo negli ultimi vent'anni e permeano ogni giorno di più la realtà e il sistema di relazioni fra le persone. Non possiamo ignorare che tali sistemi siano lentamente entrati nelle nostre vite, condizionando inevitabilmente anche il nostro modo di rapportarci con gli altri, con ciò che ci circonda e con gli strumenti telematici stessi. Tutto ciò è accaduto nonostante ognuno di noi sia consapevole che l'irrealtà virtuale è funzionale al potere e ne è la forza.
Nell'ultimo decennio i metodi tradizionali con cui facevamo circolare le idee, come ad esempio giornali, volantini, manifesti, libri, si sono ridotti sensibilmente e la diffusione delle idee stesse è stata quasi totalmente delegata all'universo virtuale. È più che mai indispensabile tornare a rispolverare le vecchie forme di incontro e comunicazione fra compagni e sperimentarne di nuove, ma che siano soltanto nostre e non del nemico. Tornare ad incontrarsi e prendersi il tempo per farlo, cosa resa sempre più difficile dai ritmi imposti dalla vita moderna, ritmi che più o meno consapevolmente abbiamo fatto nostri.
Capita spesso di sentire qualcuno fare considerazioni sulla possibilità di sfruttare gli strumenti telematici in situazioni specifiche, ma trovarsi faccia a faccia con un uso pressoché quotidiano di internet, in particolare per lo scambio di informazioni e idee, ci ha mostrato quanto la realtà virtuale giunge a condizionare in modo negativo il modo di relazionarsi stesso. L'idea di un \emph{buon uso} della realtà virtuale in una prospettiva rivoluzionaria non ci convince, crediamo infatti che prendere in considerazione una tale possibilità comporterebbe scegliere delle vie che non danno alcuna garanzia perché funzionali al capitale e gestite dal potere. La telematica e lo sviluppo tecnologico devono semmai essere potenziali obiettivi d'attacco.
\section{Sabotare la produzione}
La macchina del capitale si alimenta grazie alle strutture di potere (burocrazie e istituzioni), meccanismi di repressione e di controllo (carceri, tribunali, forze militari e di polizia, sistemi di sorveglianza), al lavoro, al consenso, alla produzione. La critica radicale e le prospettive di attacco devono quindi svilupparsi su più livelli, da un punto di vista sia teorico che pratico. Nello specifico il sistema di produzione e consumo è ciò che lega ed incatena direttamente gli individui al capitale e alle sue sfumature. La creazione di falsi bisogni determina la sottomissione, più o meno consapevole, allo sfruttamento nel lavoro, alle logiche di colonialismo economico. La produzione di energia, i complessi industriali e di fabbrica più o meno delocalizzati, la diffusione della merce sono alla base del funzionamento di questo mondo.
Ed è proprio in questa direzione che bisogna agire, senza aspettare che quel muro di mercificazione, che si sta infiltrando in ogni aspetto dell'esistenza, ci crolli inesorabilmente addosso, mentre proviamo a scalfirlo mirando alla superficie e non alle fondamenta, seppellendo ogni possibilità di tentativo futuro di attacco. Acquisire, scambiare e diffondere informazioni, pratiche e teoriche, in merito al reperimento e all'utilizzo di strumenti e conoscenze è uno degli aspetti che crediamo sia indispensabile discutere e sviluppare.
Possiamo porci degli interrogativi su come agire e come attaccare, ma è altrettanto importante chiedersi contro cosa agire e quali gli obiettivi da individuare, puntando sull'iniziativa piuttosto che rinchiudersi in una logica di risposta. Ciò che ci circonda pullula di luoghi attraverso i quali il capitale prolifera. Luoghi che sono nati o mutati radicalmente negli ultimi decenni. Facciamo, brevemente, un esempio, col quale mettere facilmente in evidenza alcuni dei cambiamenti ai quali facciamo riferimento. Si pensi alla differenza che c'è fra degli archivi cartacei e i database. In passato il rogo di documentazione all'interno di un ufficio anagrafe, del lavoro, di un grosso complesso industriale poteva essere un'azione distruttiva concreta. Oggi no, le informazioni, i dati d'archivio vengono conservate nei database, in piccoli strumenti elettronici, scorrono lungo chilometri di cavi. Non è forse necessario tenerne conto? E non è forse palese che i cambiamenti che il nemico sono stati radicali e non si posso ignorare, ma è necessario approfondirli e conoscerli?
Non vogliamo in questa sede fare un elenco di quelli che possono essere possibili obiettivi di attacco, preferiamo lasciare ad ognuno la fantasia nella ricerca e la creatività nel definire le proprie prospettive di rivolta.
Un altro punto sul quale ci interessa puntare brevemente l'attenzione è la dimensione internazionale che credo debba assumere o tornare ad avere la prospettiva insurrezionale. Occasioni come questa consentono di vedersi, di discutere, di confrontarsi fra compagni provenienti da diversi posti, e devono costituire un punto di partenza per l'approfondimento di relazioni future, laddove nascano e si desideri approfondirle. Ma la possibilità di stringere rapporti individuali o fra diverse realtà non è l'obiettivo finale, ma un presupposto e un aspetto della dimensione internazionalista alla quale aspiriamo. Avere dei rapporti con i compagni che vivono all'estero o scambiarsi materiale e conoscenze da solo non basta, occorre anche che ognuno di noi sappia proiettarsi in un ottica di osservazione ed azione che superi i confini territoriali.
Per spiegarci meglio. Pensiamo a ciò che è accaduto in Grecia negli ultimi anni, l'insurrezione di dicembre, mille attacchi disseminati su tutto il territorio, conflittualità ripetuta con le forze dell'ordine e vari simboli e luoghi di potere, saccheggi nei supermercati e tante altre azioni che ci hanno scaldato il cuore e infuocato gli animi. Fuochi che però raramente sono traboccati dai nostri animi e hanno assunto una dimensione di concretezza.
Le ragioni sono diverse e differenti l'una dall'altra. Mancanza di contatti? Una realtà troppo lontana dalla nostra? Condizioni interne difficilmente decifrabili? Notizie sporadiche e spesso esclusivamente legate alle fonti di regime? Di certo sì, sono ragioni che probabilmente hanno pesato. Ma prima fra tutte, ad essere determinante, è stato il fatto che non eravamo, e non siamo, preparati e quindi incapaci di cogliere delle occasioni. Riuscire a portare fuori dai confini greci una conflittualità permanente e degli attacchi mirati, essere capaci di comprendere le contraddizioni che il capitale sta sviluppando un po' ovunque, essere in grado di contrattaccare avendo a disposizione informazioni e strumenti sviluppati in precedenza, avrebbe potuto fare la differenza. È anche riflettendo su questa occasione mancata, ma se ne potrebbero citare molte altre, che si può comprendere quanto sia necessario avere la capacità di volgere lo sguardo al di là delle cose che stanno nel breve raggio attorno ad ognuno di noi ed essere pronti, essere preparati.
Nell'urgenza di voler esserci, nella smania di partecipare alla possibilità del dilagare dell'indignazione si rischia di smarrirsi fra le provocazioni del capitale e le traiettorie di strade che non ci appartengono. Non abbiamo un mondo da salvare, né coscienze da conquistare, né verbi da diffondere. Seppur sia fondamentale una creatività che determini anche l'imprevedibilità, le prospettive e gli obiettivi non devono essere tirate fuori da un qualche magico cilindro, non ci si può svilire in una ossessiva ricerca di ruoli, numeri e presenze. È tuttavia importante l'esplorazione di nuovi sentieri di attacco, l'esplorazione di nuovi mezzi, strumenti e tecniche in relazione non solo agli obiettivi, ma ai contesti e alle forze disponibili.
Esistono infinite possibilità di intervento in senso critico e distruttivo rispetto alla realtà che ci circonda, e in tal senso riteniamo importante estendere e diversificare le pratiche di conflitto tentando di renderle, di volta in volta, riproducibili.
Palermo, 31 ottobre
% begin final page
\clearpage
% if we are on an odd page, add another one, otherwise when imposing
% the page would be odd on an even one.
\ifthispageodd{\strut\thispagestyle{empty}\clearpage}{}
% new page for the colophon
\thispagestyle{empty}
\begin{center}
\bigskip
\includegraphics[width=0.25\textwidth]{logo-atr}
\bigskip
\end{center}
\strut
\vfill
\begin{center}
Contributo barbaro
\bigskip
\bigskip
\textbf{tabularasa.anarhija.net}
\end{center}
% end final page with colophon
\end{document}
|
https://cr.yp.to/bib/1979/swanson-type.tex | yp.to | CC-MAIN-2020-16 | text/plain | application/x-tex | crawl-data/CC-MAIN-2020-16/segments/1585370494349.3/warc/CC-MAIN-20200329140021-20200329170021-00244.warc.gz | 421,980,246 | 635 | \bib{1979/swanson-type}
\yr 1979
\isbn 0--8218--0053--1
\mr 80i:00003
\by Ellen Swanson
\book Mathematics into type
\publ American Mathematical Society
\endref
|
http://dlmf.nist.gov/19.6.E6c.tex | nist.gov | CC-MAIN-2017-17 | application/x-tex | null | crawl-data/CC-MAIN-2017-17/segments/1492917122933.39/warc/CC-MAIN-20170423031202-00121-ip-10-145-167-34.ec2.internal.warc.gz | 98,998,522 | 618 | \[\mathop{\Pi\/}\nolimits\!\left(\alpha^{2},k\right)\to-\infty,\] |
https://derivationmap.net/static/9081138616_61220d0d8ce0277d4ce29b8afe072f2b.tex | derivationmap.net | CC-MAIN-2023-14 | text/x-tex | application/x-tex | crawl-data/CC-MAIN-2023-14/segments/1679296949701.56/warc/CC-MAIN-20230401063607-20230401093607-00560.warc.gz | 244,938,551 | 881 | \documentclass[12pt]{article}
\thispagestyle{empty}
\usepackage{amsmath}
\begin{document}
\huge{
$W_{\rm by\ system} = \frac{1}{2} m_1 v_{\rm final}^2$
}
\end{document}
|
http://dlmf.nist.gov/15.10.E29.tex | nist.gov | CC-MAIN-2017-22 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2017-22/segments/1495463607849.21/warc/CC-MAIN-20170524173007-20170524193007-00107.warc.gz | 93,504,080 | 713 | \[w_{1}(z)=e^{b\pi\mathrm{i}}\frac{\mathop{\Gamma\/}\nolimits\!\left(c\right)%
\mathop{\Gamma\/}\nolimits\!\left(a-c+1\right)}{\mathop{\Gamma\/}\nolimits\!%
\left(a+b-c+1\right)\mathop{\Gamma\/}\nolimits\!\left(c-b\right)}w_{3}(z)+e^{(%
b-c)\pi\mathrm{i}}\frac{\mathop{\Gamma\/}\nolimits\!\left(c\right)\mathop{%
\Gamma\/}\nolimits\!\left(a-c+1\right)}{\mathop{\Gamma\/}\nolimits\!\left(b%
\right)\mathop{\Gamma\/}\nolimits\!\left(a-b+1\right)}w_{5}(z),\] |
http://people.csail.mit.edu/jrennie/latex/named.sty | mit.edu | CC-MAIN-2023-14 | text/x-tex | text/x-matlab | crawl-data/CC-MAIN-2023-14/segments/1679296943698.79/warc/CC-MAIN-20230321131205-20230321161205-00761.warc.gz | 39,741,582 | 2,195 | %%%% named.sty
\typeout{Named Citation Style, version of 30 November 1994}
% This file implements citations for the ``named'' bibliography style.
% Place it in a file called named.sty in the TeX search path. (Placing it
% in the same directory as the LaTeX document should also work.)
% Prepared by Peter F. Patel-Schneider, with the assistance of several,
% since forgotten, LaTeX hackers.
% This style is NOT guaranteed to work. It is provided in the hope
% that it will make the preparation of papers easier.
%
% There are undoubtably bugs in this style. If you make bug fixes,
% improvements, etc. please let me know. My e-mail address is:
% [email protected]
% The preparation of this file was supported by Schlumberger Palo Alto
% Research and AT\&T Bell Laboratories.
% This file can be modified and used in other conferences as long
% as credit to the authors and supporting agencies is retained, this notice
% is not changed, and further modification or reuse is not restricted.
% The ``named'' bibliography style creates citations with labels like
% \citeauthoryear{author-info}{year}
% these labels are processed by the following commands:
% \cite{keylist}
% which produces citations with both author and year,
% enclosed in square brackets
% \shortcite{keylist}
% which produces citations with year only,
% enclosed in square brackets
% \citeauthor{key}
% which produces the author information only
% \citeyear{key}
% which produces the year information only
\def\leftcite{\@up[}\def\rightcite{\@up]}
\def\cite{\def\citeauthoryear##1##2{\def\@thisauthor{##1}%
\ifx \@lastauthor \@thisauthor \relax \else##1, \fi ##2}\@icite}
\def\shortcite{\def\citeauthoryear##1##2{##2}\@icite}
\def\citeauthor{\def\citeauthoryear##1##2{##1}\@nbcite}
\def\citeyear{\def\citeauthoryear##1##2{##2}\@nbcite}
% internal macro for citations with [] and with breaks between citations
% used in \cite and \shortcite
\def\@icite{\leavevmode\def\@citeseppen{-1000}%
\def\@cite##1##2{\leftcite\nobreak\hskip 0in{##1\if@tempswa , ##2\fi}\rightcite}%
\@ifnextchar [{\@tempswatrue\@citex}{\@tempswafalse\@citex[]}}
% internal macro for citations without [] and with no breaks
% used in \citeauthor and \citeyear
\def\@nbcite{\leavevmode\def\@citeseppen{1000}%
\def\@cite##1##2{{##1\if@tempswa , ##2\fi}}%
\@ifnextchar [{\@tempswatrue\@citex}{\@tempswafalse\@citex[]}}
% don't box citations, separate with ; and a space
% also, make the penalty between citations a parameter,
% it may be a good place to break
\def\@citex[#1]#2{%
\def\@lastauthor{}\def\@citea{}%
\@cite{\@for\@citeb:=#2\do
{\@citea\def\@citea{;\penalty\@citeseppen\ }%
\if@filesw\immediate\write\@auxout{\string\citation{\@citeb}}\fi
\@ifundefined{b@\@citeb}{\def\@thisauthor{}{\bf ?}\@warning
{Citation `\@citeb' on page \thepage \space undefined}}%
{\csname b@\@citeb\endcsname}\let\@lastauthor\@thisauthor}}{#1}}
% raise the brackets in bibliography labels
\def\@biblabel#1{\def\citeauthoryear##1##2{##1, ##2}\@up{[}#1\@up{]}\hfill}
\def\@up#1{\leavevmode\raise.2ex\hbox{#1}}
% Optional changes
%%%% use parentheses in the reference list and citations
%\def\leftcite{(}\def\rightcite{)}
%\def\@biblabel#1{\def\citeauthoryear##1##2{##1, ##2}(#1)\hfill}
%%%% no key in the reference list
%\def\@lbibitem[#1]#2{\item\if@filesw
% { \def\protect##1{\string ##1\space}\immediate
% \write\@auxout{\string\bibcite{#2}{#1}}}\fi\ignorespaces}
%\def\thebibliography#1{\section*{References\@mkboth
% {REFERENCES}{REFERENCES}}\list
% {}{\labelwidth 0pt\leftmargin\labelwidth \itemsep 0.5ex}
% \def\newblock{\hskip .11em plus .33em minus .07em}
% \sloppy\clubpenalty4000\widowpenalty4000
% \sfcode`\.=1000\relax}
|
https://cdsarc.u-strasbg.fr/ftp/vizier/ADASS13/O10-1.tex | u-strasbg.fr | CC-MAIN-2021-31 | text/x-tex | text/x-matlab | crawl-data/CC-MAIN-2021-31/segments/1627046154356.39/warc/CC-MAIN-20210802172339-20210802202339-00128.warc.gz | 178,076,459 | 9,203 | %APN3_PROCEEDINGS_FORM%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%
% TEMPLATE.TEX -- APN3 (2003) ASP Conference Proceedings template.
%
% Derived from ADASS VIII (98) ASP Conference Proceedings template
% Updated by N. Manset for ADASS IX (99), F. Primini for ADASS 2000,
% D.Bohlender for ADASS 2001, and H. Payne for ADASS XII and LaTeX2e.
%
% Use this template to create your proceedings paper in LaTeX format
% by following the instructions given below. Much of the input will
% be enclosed by braces (i.e., { }). The percent sign, "%", denotes
% the start of a comment; text after it will be ignored by LaTeX.
% You might also notice in some of the examples below the use of "\ "
% after a period; this prevents LaTeX from interpreting the period as
% the end of a sentence and putting extra space after it.
%
% You should check your paper by processing it with LaTeX. For
% details about how to run LaTeX as well as how to print out the User
% Guide, consult the README file. You should also consult the sample
% LaTeX papers, sample1.tex and sample2.tex, for examples of including
% figures, html links, special symbols, and other advanced features.
%
% If you do not have access to the LaTeX software or a laser printer
% at your site, you can still prepare your paper following the
% instructions in the User Guide. In such cases, the editors will
% process the file and make any necessary editorial adjustments.
%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%
\documentclass[11pt,twoside]{article} % Leave intact
\usepackage{adassconf}
% If you have the old LaTeX 2.09, and not the current LaTeX2e, comment
% out the \documentclass and \usepackage lines above and uncomment
% the following:
%\documentstyle[11pt,twoside,adassconf]{article}
\begin{document} % Leave intact
%-----------------------------------------------------------------------
% Paper ID Code
%-----------------------------------------------------------------------
% Enter the proper paper identification code. The ID code for your
% paper is the session number associated with your presentation as
% published in the official conference proceedings. You can
% find this number locating your abstract in the printed proceedings
% that you received at the meeting or on-line at the conference web
% site; the ID code is the letter/number sequence proceeding the title
% of your presentation.
%
% This will not appear in your paper; however, it allows different
% papers in the proceedings to cross-reference each other. Note that
% you should only have one \paperID, and it should not include a
% trailing period.
%
% EXAMPLE: \paperID{O4-1}
% EXAMPLE: \paperID{P7-7}
%
\paperID{O10-1}
%%%% ID=O10-1
%-----------------------------------------------------------------------
% Paper Title
%-----------------------------------------------------------------------
% Enter the title of the paper.
%
% EXAMPLE: \title{A Breakthrough in Astronomical Software Development}
%
% If your title is so long as to fill the page header when you print it,
% then please supply a short form as a \titlemark.
%
% EXAMPLE:
% \title{Rapid Development for Distributed Computing, with Implications
% for the Virtual Observatory}
% \titlemark{Rapid Development for Distributed Computing}
%
\title{Observer versus software engineer: The dawn of the armchair astronomers}
\titlemark{Observer versus software engineer}
%-----------------------------------------------------------------------
% Authors of Paper
%-----------------------------------------------------------------------
% Enter the authors followed by their affiliations. The \author and
% \affil commands may appear multiple times as necessary (see example
% below). List each author by giving the first name or initials first
% followed by the last name. Authors with the same affiliations
% should grouped together.
%
% EXAMPLE: \author{Raymond Plante, Doug Roberts,
% R.\ M.\ Crutcher\altaffilmark{1}}
% \affil{National Center for Supercomputing Applications,
% University of Illinois Urbana-Champaign, Urbana, IL
% 61801}
% \author{Tom Troland}
% \affil{University of Kentucky}
%
% \altaffiltext{1}{Astronomy Department, UIUC}
%
% In this example, the first three authors, "Plante", "Roberts", and
% "Crutcher" are affiliated with "NCSA". "Crutcher" has an alternate
% affiliation with the "Astronomy Department". The fourth author,
% "Troland", is affiliated with "University of Kentucky"
\author{Frossie Economou, Tim Jenness, Kynan Delorey, Brad Cavanagh, Shaun de Witt}
\affil{Joint Astronomy Centre, 660 N. A`oh\={o}k\={u} Place, University Park,
Hilo, Hawaii, 96720}
\author{Alasdair Allan}
\affil{School of Physics, University of Exeter, Exeter, EX4 5EN, UK}
%-----------------------------------------------------------------------
% Contact Information
%-----------------------------------------------------------------------
% This information will not appear in the paper but will be used by
% the editors in case you need to be contacted concerning your
% submission. Enter your name as the contact along with your email
% address.
%
% EXAMPLE: \contact{Dennis Crabtree}
% \email{[email protected]}
%
\contact{Frossie Economou}
\email{[email protected]}
%-----------------------------------------------------------------------
% Author Index Specification
%-----------------------------------------------------------------------
% Specify how each author name should appear in the author index. The
% \paindex{ } should be used to indicate the primary author, and the
% \aindex for all other co-authors. You MUST use the following
% syntax:
%
% SYNTAX: \aindex{Lastname, F. M.}
%
% where F is the first initial and M is the second initial (if
% used). This guarantees that authors that appear in multiple papers
% will appear only once in the author index.
%
% EXAMPLE: \paindex{Crabtree, D.}
% \aindex{Manset, N.}
% \aindex{Veillet, C.}
%
% NOTE: this information is also used to build the author list that
% appears in the table of contents. Authors will be listed in the order
% of the \paindex and \aindex commmands.
%
\paindex{Economou, F.}
\aindex{Jenness, T.}
\aindex{Delorey, K. K.}
\aindex{Cavanagh, B.}
\aindex{de Witt, S.} % Remove this line if there is only one author
\aindex{Allan, A.}
%-----------------------------------------------------------------------
% Author list for page header
%-----------------------------------------------------------------------
% Please supply a list of author last names for the page header. in
% one of these formats:
%
% EXAMPLES:
% \authormark{Lastname}
% \authormark{Lastname1 \& Lastname2}
% \authormark{Lastname1, Lastname2, ... \& LastnameN}
% \authormark{Lastname et al.}
%
% Use the "et al." form in the case of seven or more authors, or if
% the preferred form is too long to fit in the header.
\authormark{Economou, Jenness, Delorey, Cavanagh, de Witt \& Allan}
%-----------------------------------------------------------------------
% Subject Index keywords
%-----------------------------------------------------------------------
% Enter a comma separated list of up to 6 keywords describing your
% paper. These will NOT be printed as part of your paper; however,
% they will be used to generate the subject index for the proceedings.
% There is no standard list; however, you can consult the indices
% for past proceedings (http://adass.org/adass/proceedings/).
%
% EXAMPLE: \keywords{visualization, astronomy: radio, parallel
% computing, AIPS++, Galactic Center}
%
% In this example, the author noticed that "radio astronomy" appeared
% in the ADASS VII Index as "astronomy" being the major keyword and
% "radio" as the minor keyword. The colon is used to introduce another
% level into the index.
\keywords{flexible scheduling, pipelines, intelligent agents, Virtual Observatory, JCMT, UKIRT}
%-----------------------------------------------------------------------
% Abstract
%-----------------------------------------------------------------------
% Type abstract in the space below. Consult the User Guide and Latex
% Information file for a list of supported macros (e.g. for typesetting
% special symbols). Do not leave a blank line between \begin{abstract}
% and the start of your text.
\begin{abstract} % Leave intact
% Place the text of your abstract here - NO BLANK LINES
Traditional ground-based observatories have moved into a new era where the
dominant consumers for their data products are astronomers who no longer come
out to use the facility themselves. Using the JCMT and UKIRT as an example, we
discuss the wide variety of software systems that are necessary for
maintaining a high level of scientific involvement for the absentee
observer. These include cradle-to-grave flexible scheduling support, advanced
data reduction pipelines, VO integration and intelligent agent networks. Is
the observational astronomer becoming an endangered species, and does this
really matter?
\end{abstract}
%-----------------------------------------------------------------------
% Main Body
%-----------------------------------------------------------------------
% Place the text for the main body of the paper here. You should use
% the \section command to label the various sections; use of
% \subsection is optional. Significant words in section titles should
% be capitalized. Sections and subsections will be numbered
% automatically.
%
% EXAMPLE: \section{Introduction}
% ...
% \subsection{Our View of the World}
% ...
% \section{A New Approach}
%
% It is recommended that you look at the sample papers, sample1.tex
% and sample2.tex, for examples for formatting references, footnotes,
% figures, equations, html links, lists, and other special features.
\section{Software and the Observatory}
The Joint Astronomy Centre (JAC) operates two facilities, the
sub-millimetre James Clerk Maxwell Telescope (JCMT) and the United
Kingdom Infrared Telescope (UKIRT), both of which are now fully
flexibly scheduled to maximize prevalent weather conditions. In order
to operate efficiently and effectively in the absence of the PI on
behalf of which data is being taken, we have put in place a large
number of integrated software systems providing a ``cradle-to-grave''
approach the operation of the observatory (Economou et al.\ 2002;
Economou, Jenness \& Rees 2002).
The JAC flexible scheduling model (see e.g.\ Robson 2002) has two
major points of departure from that commonly practiced in other
facilities. First, we do not impose a deadline for submitting
observations; PIs are free to modify their programmes throughout the
semester in the light of incoming data. This model requires a seamless
flow of observation definitions data and information from the
observatory to the PI.
The second difference to other queue-scheduled operational models is
that we do not have the resources to have staff doing the
observations, as our funding was not increased after the switch from
classical scheduling to flexed observing. We therefore run a hybrid
model in which some PIs do come out to observe, but are required to do
projects ``off the queue'' as soon as weather departs from the
parameters allocated to their project. This means that we may have
observers that are quite inexperienced with the instrument in use, and
therefore need a system which allows observations to be done correctly
in such cases.
\begin{description}
\item[Observation Preparation]
Necessary for any kind of queue-scheduled system is an Observation
Preparation tool (also known as a ``Phase II'' tool) (Wright et al.\
2001; Folger et al.\ 2002). This allows the PI to fully specify their
observation completely, as to avoid any subsequent interpretation
error that would affect the quality of the data, since as mentioned
above the actual observer may not be too experienced. It is also
important for this information to be provided in a way that focuses
on scientific descriptions of the observation (e.g.\ use wavelength
ranges rather than filter names), as to allow a PI that may not be
intimately familiar with the facility to specify their observations in
an effective way.
\item[Dynamic Scheduling]
In order to make a timely response to the rapid changes seen in
mid-infrared and sub-millimetre conditions, we practice dynamic
scheduling; that is, we do not pre-generate night plans, but ask at
the end of each observing block what the best thing to do next is,
given the known weather and project parameters. The success of this
approach is, of course, also based on the ability of our facilities to
seamlessly transition from one instrument to another with little or no
overhead. In software terms, when the PI submits a project with the
Phase II tool our server splits it into individual observation blocks
that are stored in a database; a tool is provided to the observer to
enable them to query the database for what to do next.
\item[Automated Data Reduction]
Critical to the success of flexible scheduling are robust, automated
data reduction pipelines that produce high-quality reduced data at the
telescope to provide instant feedback to the observer and for
immediate dissemination to the absent PI. At the JAC facilities we use
ORAC-DR (Cavanagh et al.\ 2003; Currie 2004), which in its various
instances for each of our instruments provides advanced data products,
such as source catalogues (imaging) and fully extracted
flux-calibrated spectra (spectroscopy).
\item[Observation Management]
A whole suite of software systems is in use to manage information flow
about a project, allow data eavesdropping and access and automatically
generate highly detailed project status reports for both PIs and
staff. These are described in greater detail in Delorey et al.\
(2004), where a
simple diagram of the general software architecture can also be
found. Such systems are critical to keeping the large number of people
involved in the execution of projects informed, and also generate
valuable meta-data for any archive.
\item[Transients and Rapid Follow-up]
The presence of all the systems described above makes possible the use
of a number of automated time critical operational modes, such as the
publication of any discoveries of transient events (e.g.\ flares of variable
sources, minor planetary bodies) as well as rapid follow-up of
transient events discovered elsewhere (e.g.\ supernovae, $\gamma$-ray
bursters). Because our architecture is based entirely upon
machine-readable information and well-defined interfaces, we can
integrate into alert systems initially developed for robotic
telescopes, such as e-Star (Allan et al.\ 2004). An intelligent agent that
is monitoring a detection channel of say, a $\gamma$-ray burster, can
submit an observing block to our system for sub-millimetre follow-up
using an override priority code; next time the observer at the
telescope queries the system for an appropriate block they will find
this observation and execute it; ORAC-DR then reduces the data
and provide the information to another intelligent agent which takes
appropriate action (such as informing the PI or submitting additional
follow-up observations, such as spectroscopy, as appropriate).
\end{description}
\section{The Benefits}
There are many benefits to such complex integrated software systems
such as described above. Astronomers that have been awarded telescope
time benefit from the maximization of their chances of getting their
project completed that comes with flexible scheduling. They have to
give up very little for this advantage, since our operational mode
retains many of the advantages of classical scheduling, such as the
ability to constantly modify one's observing strategy, as well as
eavesdropping access to data as it is being taken. Staff members make
use of software systems that manage the bureaucracy of flexible
scheduling (such as time accounting and removal of exhausted
projects), thus freeing them to provide science-level support to
projects. Observers at the telescope can carry out observations for
others confident that the PIs are getting what they actually asked
for. Astronomers interested in transient events can obtain data
without the need of being in constant communication with various
facilities. Archive users end up being the beneficiaries of
significant quantities of meta-data that provide an audit trail for
the provenance and quality of their data. And last, but not least, the
facility gets to maximize its scientific output without increasing its
operational cost.
\section{Concerns}
While the wide variety of automated and autonomous software systems
are geared toward maximizing observing efficiency in present
facilities, there is a concern as to their long-term effects in the
community. These are largely speculative at this point; however we
believe we have seen signs of both recently. The problem is that with
the move toward automated and staffed observing, not to mention data
mining, there are fewer opportunities for the younger astronomers to
cut their teeth on the many challenges of observational astronomy by
coming out for practical experience at a data-taking facility.
The first reason for concern relates to the pool of astronomers from
which we draw our instrument builders. These are in every case highly
experienced users of our facilities who then moved on to
instrumentation labs. Their innovative designs are often based on
detailed understandings of current instrumentation and their
experience with first-hand data analysis in the wavelength of their
choice.
The second reason for concern addresses software development at
modestly funded facilities such as our own. Our ability to provide
comprehensive software suites to our users hinges on our ability to
hire staff experienced in both scientific data analysis and software
engineering. These individuals have a top-to-bottom understanding of
the products they develop, often fulfilling the often critical ``hero
programmer'' role (Lupton et al.\ 2001). In the absence of such people, much
larger teams containing both astronomers and industry programmers
under formal project management need to be formed. This is a model
that is out of reach for many world-class facilities that are subject
to stringent funding constraints.
We suspect that the trend of serving the astronomical community a
highly-processed data product from centralized archive facilities
will only grow in the future. In order to retain a pool of technical
expertise in the astronomical community, both in instrumentation and
software, we would like to see placement of post-graduate students at
observatories working in the more practical areas of observational
astronomy.
%-----------------------------------------------------------------------
% References
%-----------------------------------------------------------------------
% List your references below within the reference environment
% (i.e. between the \begin{references} and \end{references} tags).
% Each new reference should begin with a \reference command which sets
% up the proper indentation. Observe the following order when listing
% bibliographical information for each reference: author name(s),
% publication year, journal name, volume, and page number for
% articles. Note that many journal names are available as macros; see
% the User Guide listing "macro-ized" journals.
%
% EXAMPLE: \reference Hagiwara, K., \& Zeppenfeld, D.\ 1986,
% Nucl.Phys., 274, 1
% \reference H\'enon, M.\ 1961, Ann.d'Ap., 24, 369
% \reference King, I.\ R.\ 1966, \aj, 71, 276
% \reference King, I.\ R.\ 1975, in Dynamics of Stellar
% Systems, ed.\ A.\ Hayli (Dordrecht: Reidel), 99
% \reference Tody, D.\ 1998, \adassvii, 146
% \reference Zacharias, N.\ \& Zacharias, M.\ 2003,
% \adassxii, \paperref{P7.6}
%
% Note the following tricks used in the example above:
%
% o \& is used to format an ampersand symbol (&).
% o \'e puts an accent agu over the letter e. See the User Guide
% and the sample files for details on formatting special
% characters.
% o "\ " after a period prevents LaTeX from interpreting the period
% as an end of a sentence.
% o \aj is a macro that expands to "Astron. J." See the User Guide
% for a full list of journal macros
% o \adassvii is a macro that expands to the full title, editor,
% and publishing information for the ADASS VII conference
% proceedings. Such macros are defined for ADASS conferences I
% through XI.
% o When referencing a paper in the current volume, use the
% \adassxii and \paperref macros. The argument to \paperref is
% the paper ID code for the paper you are referencing. See the
% note in the "Paper ID Code" section above for details on how to
% determine the paper ID code for the paper you reference.
%
\begin{references}
\reference Allan, A., Naylor, T., Steele, I., Carter, D., Jenness, T.,
Economou, F.\ \& Adamson, A.\ J.\ 2004, \adassxiii, \paperref{O7-4}
\reference Cavanagh, B., Hirst, P., Jenness, T., Economou, F., Currie,
M.\ J., Todd, S.\ \& Ryder, S.\ D.\ 2003, \adassxii, 237
\reference Currie, M.\ J.\ 2004, \adassxiii, \paperref{P4-25}
\reference Delorey, K., Jenness, T., Cavanagh, B.\ \& Economou, F.\
2004, \adassxiii, \paperref{P9-10}
\reference Economou, F., Jenness, T.\ \& Rees, N.\ P.\ 2002, Proc.\
SPIE, 4844, 321
\reference Economou, F., Jenness, T., Tilanus, R.\ P.\ J., Hirst, P.,
Adamson, A.\ J., Rippa, M., Delorey, K.\ K.\ \& Isaak, K.\ G.\
2002, \adassxi, 488
\reference Folger, M., Bridger, A., Dent, B., Kelly, D.,
Adamson, A., Economou, F., Hirst, P.\ \& Jenness, T.\
2002, \adassxi, 453
\reference Lupton, R.\ H., Gunn, J.\ E., Ivezic, Z., Knapp, G.\ R.,
Kent, S.\ \& Yasuda, N.\ 2001, \adassx, 269
%\reference Rippa, M., Economou, F., Jenness, T., Hirst, P., Tilanus,
% R., Delorey, K.\ \& Adamson, A.\ 2002, \adassxi, 144
\reference Robson, I.\ 2002, Proc.\ SPIE, 4844, 86
\reference Wright, G.\ S.\ et al.\ 2001, \adassx, 137
\end{references}
% Do not place any material after the references section
\end{document} % Leave intact
|
http://dlmf.nist.gov/30.11.E8.tex | nist.gov | CC-MAIN-2014-10 | application/x-tex | null | crawl-data/CC-MAIN-2014-10/segments/1394024787620/warc/CC-MAIN-20140305130627-00052-ip-10-183-142-35.ec2.internal.warc.gz | 53,093,907 | 625 | \[\mathop{S^{{m(1)}}_{{n}}\/}\nolimits\!\left(z,\gamma\right)=K_{n}^{m}(\gamma)%
\mathop{\mathit{Ps}^{{m}}_{{n}}\/}\nolimits\!\left(z,\gamma^{2}\right),\] |
https://theanarchistlibrary.org/library/anonymous-the-next-eclipse.tex | theanarchistlibrary.org | CC-MAIN-2019-26 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2019-26/segments/1560627999838.27/warc/CC-MAIN-20190625132645-20190625154645-00250.warc.gz | 617,159,864 | 36,226 | \documentclass[DIV=12,%
BCOR=10mm,%
headinclude=false,%
footinclude=false,open=any,%
fontsize=11pt,%
twoside,%
paper=210mm:11in]%
{scrbook}
\usepackage{fontspec}
\usepackage{polyglossia}
\setmainfont{Linux Libertine O}
% these are not used but prevents XeTeX to barf
\setsansfont[Scale=MatchLowercase]{CMU Sans Serif}
\setmonofont[Scale=MatchLowercase]{CMU Typewriter Text}
\setmainlanguage{english}
% global style
\pagestyle{plain}
\usepackage{microtype} % you need an *updated* texlive 2012, but harmless
\usepackage{graphicx}
\usepackage{alltt}
\usepackage{verbatim}
% http://tex.stackexchange.com/questions/3033/forcing-linebreaks-in-url
\PassOptionsToPackage{hyphens}{url}\usepackage[hyperfootnotes=false,hidelinks,breaklinks=true]{hyperref}
\usepackage{bookmark}
% footnote handling
\usepackage[fragile]{bigfoot}
\usepackage{perpage}
\DeclareNewFootnote{default}
\DeclareNewFootnote{B}
\MakeSorted{footnoteB}
\renewcommand*\thefootnoteB{(\arabic{footnoteB})}
\deffootnote[3em]{0em}{4em}{\textsuperscript{\thefootnotemark}~}
% continuous numbering across the document. Defaults to resetting at chapter. Unclear
% \usepackage{chngcntr}
% \counterwithout{footnote}{chapter}
\usepackage[shortlabels]{enumitem}
\usepackage{tabularx}
\usepackage[normalem]{ulem}
\def\hsout{\bgroup \ULdepth=-.55ex \ULset}
% https://tex.stackexchange.com/questions/22410/strikethrough-in-section-title
% Unclear if \protect \hsout is needed. Doesn't looks so
\DeclareRobustCommand{\sout}[1]{\texorpdfstring{\hsout{#1}}{#1}}
\usepackage{wrapfig}
\usepackage{indentfirst}
% remove the numbering
\setcounter{secnumdepth}{-2}
% remove labels from the captions
\renewcommand*{\captionformat}{}
\renewcommand*{\figureformat}{}
\renewcommand*{\tableformat}{}
\KOMAoption{captions}{belowfigure,nooneline}
\addtokomafont{caption}{\centering}
% avoid breakage on multiple <br><br> and avoid the next [] to be eaten
\newcommand*{\forcelinebreak}{\strut\\*{}}
\newcommand*{\hairline}{%
\bigskip%
\noindent \hrulefill%
\bigskip%
}
% reverse indentation for biblio and play
\newenvironment*{amusebiblio}{
\leftskip=\parindent
\parindent=-\parindent
\smallskip
\indent
}{\smallskip}
\newenvironment*{amuseplay}{
\leftskip=\parindent
\parindent=-\parindent
\smallskip
\indent
}{\smallskip}
\newcommand*{\Slash}{\slash\hspace{0pt}}
\addtokomafont{disposition}{\rmfamily}
\addtokomafont{descriptionlabel}{\rmfamily}
% forbid widows/orphans
\frenchspacing
\sloppy
\clubpenalty=10000
\widowpenalty=10000
% http://tex.stackexchange.com/questions/304802/how-not-to-hyphenate-the-last-word-of-a-paragraph
\finalhyphendemerits=10000
% given that we said footinclude=false, this should be safe
\setlength{\footskip}{2\baselineskip}
\title{The Next Eclipse}
\date{2018}
\author{anonymous}
\subtitle{A Vision for Regional Autonomy}
% https://groups.google.com/d/topic/comp.text.tex/6fYmcVMbSbQ/discussion
\hypersetup{%
pdfencoding=auto,
pdftitle={The Next Eclipse},%
pdfauthor={anonymous},%
pdfsubject={A Vision for Regional Autonomy},%
pdfkeywords={rural; midwest}%
}
\begin{document}
\begin{titlepage}
\strut\vskip 2em
\begin{center}
{\usekomafont{title}{\huge The Next Eclipse\par}}%
\vskip 1em
{\usekomafont{subtitle}{A Vision for Regional Autonomy\par}}%
\vskip 2em
{\usekomafont{author}{anonymous\par}}%
\vskip 1.5em
\vfill
{\usekomafont{date}{2018\par}}%
\end{center}
\end{titlepage}
\cleardoublepage
\tableofcontents
% start a new right-handed page
\cleardoublepage
\chapter{An invitation and a challenge}
\emph{The Next Eclipse} is an invitation to shift our perspective on southern Illinois. Rather than seeing it as a dying region waiting for outside interests to save it, we propose that what makes it special is rooted in its status of being economically overlooked. A better future for this region will be built not by the wealthy or their politicians, and certainly not by more polluting industries, but by everyday people organizing ourselves to build a unique way of living and sustaining the life, history, and struggle of this region.
\emph{The Next Eclipse} is a challenge to build the capacity for regional autonomy in this time between the eclipses. By “autonomy,” we mean the possibility of a life outside the existing economic and political relations, the possibility of a dignified, free, and equal life here in southern Illinois.
\emph{The Next Eclipse}, finally, is a short book that has been passed hand to hand in southern Illinois, its intended audience, and shared over a far broader range. It has inspired others to think about their own regions in new ways, and there are rumors of similar projects in different places.
We are currently collecting stories from people who have lived and struggled in Little Egypt. We are interested in stories about a wide variety of topics: subsistence farming, labor struggles, struggles against racism; about fights for the forest; about what you cherish most about life in southern Illiniois. If you would like to share your stories with us, please visit our contact page by clicking here. ( https:\Slash{}\Slash{}thenexteclipse.wordpress.com\Slash{}contact\Slash{} )
\chapter{vol. 1: The Next Eclipse}
\section{Preface}
The following text was written in the weeks before a solar eclipse, the totality of which passed over southern Illinois on August 21th, 2017. In seven years, a second total solar eclipse will be visible from the same place. The two paths of these eclipses make an X across the so-called United States, intersecting in Makanda, IL.
\emph{The Next Eclipse} is the beginning of a vision for regional autonomy, and a challenge to southern Illinois to build the infrastructure for such autonomy in the time between the eclipses. It is an attempt to allow these astronomical events, reduced by local governments and businesses to nothing more than opportunities for tourism, to have some deeper significance for the inhabitants of the region.
It has been a pleasant surprise to find that the text has resonated with people in other places as well. Reading groups have formed in a handful of places around the country. We hope that the text inspires the reflections of others in their own regions, as we have been inspired by movements for autonomy around the world.
The night before the 2017 eclipse, a march led by musicians took the main strip in Carbondale, IL. A hundred or so people clapped in time and sang “Negra luna [Black moon],” a song from a musical tradition rooted in resistance to colonization. A banner at the front of the march declared “THIS EMPIRE, TOO, WILL BE ECLIPSED.”
Since that eclipse, it has become more and more clear that certainties are scarce regarding even the near future. None of us know what seven years’ time will bring. On the short list of certainties, things around which a life can be build, three things stand out:
First, it is certain that at 1:59 pm on April 8th, 2024, for 4 minutes and 9 seconds, southern Illinois will fall into darkness in a shadow cast by the moon.
Second, it is certain that we owe nothing to the institutions that prolong this empire, and that we owe everything to each other, to those working to retrieve the world from the ecocidal and biocidal clutches of the economy and its government.
Finally, it is certain that in the course of time, this empire, like all the others before it, will be eclipsed.
Nothing can prepare you for a total solar eclipse. It is worth stopping whatever else you are doing. It is worth traveling great distances for. And it is worth allowing it to take on significance in your life – not merely the dumb movements of rocks and gases, but a moment that reveals, that inspires, that ignites.
For life and joy; for freedom, equality, and dignity; for a patient, deep, and sensitive rebellion.
Carbondale, IL, February 2018
\section{1. What is an eclipse?}
In ancient Greek, éklipses meant “the abandonment,” “the downfall,” “a failing or forsaking,” or “the darkening of a heavenly body.”
Two of the most pronounced differences of the natural world – day and night – find themselves momentarily confused, reshuffled, paradoxically intertwined.
In those moments, all the ranks, badges, and hierarchies that bind the powers of the earth, are revealed for what they are: the stupid games of humans, who have forgotten their place in the mortal order of things. The eclipse reminds us, contrary to the meticulously structured optical illusion of this social system, that it is the sun and not money that breaths life into the inhabitants of earth.
The fact that the eclipse has been viewed by the ruling class of the area as a momentary economic manna from heaven only underlines their idiocy, their disconnection from the world.
The fact that we tie our fate to them, that we allow them to decide the fate of this beautiful region, only underlines ours.
What is an eclipse?
an abandonment of those dependencies which prevent our lives from flourishing;
a downfall of those powers that destroy us;
an honest recognition of what has failed and forsaken us;
a darkening of those entities who seek to decide our fate as if from the heavens;
What is an eclipse?
Let’s allow the eclipse to be an invitation to be present, together, before the challenges we face.
Perhaps \emph{to eclipse} is something we do. Perhaps an eclipse is something we become.
\Slash{}\Slash{}\Slash{}
This is a call. It is meant for those who hear it.
We’re not trying to argue. We are writing for those who have all the arguments and reasons they need. Consider this a flare shot into the momentary night of the totality:
for those who are looking,
for those who are sending out flares of their own,
for those who may have caught sight, through an accidental glance, and recognize a part of themselves in what they see.
For those who understand that we are living through the end of a civilization, and who want to build a new world within its empty shells, its ruins, its ashes, its wake.
For those who see that such a world will not come from the politicians or divine economic forces, but only from our own prolonged and committed efforts.
For those who have given up faith in all the mechanisms of “change,” and are ready to assume responsibility for their own future.
For those who understand that there is no hope on the horizon, unless we create it.
We offer no argument. We only want to state the obvious and point the direction that follows.
\section{2. What is obvious?}
We all know it is ending.
Trump is not an aberration. There will be no “return to normal.” The damage has been done. America is over.
For some of us, America – while flawed and incompletely realized – was inseparable from an inspiring vision of human progress. It is therefore not without some pain that we watch it become a parody of itself, its hallowed institutions transformed into reality television, its ideals turn into propaganda for the naïve, its most evil traditions of white supremacy, exploitation, and sexism once again resurgent.
For others of us, we say “good riddance” to a country whose founding values were inscribed in blood-red hypocrisy, and whose world-historical legacy is to have accelerated the genocidal and eco-cidal forces of capitalism.
But whether it is a moment of solemn acceptance or celebratory joy, the truth is obvious: America is over. The question now is whether we have the courage to go beyond it, or whether we will accept its zombie-like afterlife, marked by a blatant effort at total control over its population.
\Slash{}\Slash{}\Slash{}
At a more local level, we can see the writing on the wall: the economic fate of Carbondale is tied to the University, which is tied to state funding. State funding has revealed itself to be fundamentally unreliable. With Rauner, a process that has been underway for decades was merely accelerated to the point where it has become undeniably clear. The state cannot be depended on to care for the fate of this region.
To some, this has been clear for a long time. The university has been ravaged for decades by a rotating managerial class that has shown itself unable to chart a path that works for the university, let alone the region in which it is embedded.
A new Chancellor arrives, carefully projecting a gruffy masculinity designed to assure us that daddy is here, that someone is going to save the day, that he’s done it before. How many times will we fall for this? We know how these people operate: cut some things, build some things, send out applications to the next University. Progress on your C.V. is all that counts. The chaos of southern Illinois has been a ladder for too many administrative entrepreneurs.
The only plan that will ever count as “realistic” to that managerial class is to “streamline” the university. Liberal arts will be increasingly consolidated into fewer departments, and corporate money will be attracted to build the robots and drones that will displace workers, surveil everyday life, and wage war against anyone who challenges the power of corporations to turn the world into a giant open air prison. This is the only real growth industry of our time, hidden behind the innocuous banner of ‘tech.’ The university will be brought into the twenty-first century, a bit late, as a research\&development extension of the powerful.
In this context, many are looking for a way to jump-ship, to leave town and find some stable employment elsewhere. But there’s not enough room in the world’s gated communities for everyone. Instability and precarity are the present and future of this world. You can desperately try to save your own hide, but the odds are stacked against you. Another path must be created for those of us who understand that stability at the expense of others is an illusion, always threatened by the fear of those excluded others. Another path must be made for those who want to create the conditions for a good life – abundance, comradery, virtue, compassion – here where we call home.
Such a path cannot be found on the existing political or economic map. It is off the boring charts of liberal and conservative and libertarian and socialist. It is a road that must be made by walking.
There are some, in their own places, who have taken steps in this direction. Small experiments in resurrecting a sense of collective life, a concern for the fate of a whole community. A town of 3000 people in the hills of Spain, Marinaleda, has created an agricultural co-operative that is owned by and employs the whole town. They deliberately chose labor-intensive crops to make sure they could give everyone work. If you help build your house, its yours for 15 euro a month. There are no police, because there is no crime, because there is no poverty. The city is cleaned every few Sundays by its own people, who make a party of it. While the unemployment rate in Spain is approaching 50\%, and while the foreclosure crisis displaced hundreds of thousands, Marinaleda remains insulated from these market forces because it has built material and political autonomy at the local level.
There are other examples, each a unique attempt to forge a different world. The ZAD, or Zone to Defend: an autonomous zone the size of Carbondale and Makanda, composed of occupied farms and blocking the construction of an airport in the north of France. Two dozen small, interlinked communes inhabit the zone, building on it a world that is inconsistent with the airport and the world that demands it. A few times a year, tens of thousands of people flock there to express their support and show their commitment to defend the zone from eviction.
Rojava: in northern Syria, the Kurds took the civil war as an opportunity to launch a revolutionary project in democratic autonomy against capitalism, patriarchy, and the state. They created a form of government that is answerable to neighborhood assemblies and have shown themselves the most effective combatants against ISIS.
On every inhabited continent there are tiny worlds breaking off from global capitalism, sometimes quietly, sometimes accompanied by a fight. People building the possibility of a world beyond this imploding civilization.
Meanwhile, in Southern Illinois, people are placing their bets on an eclipse to provide a windfall of cash\dots{} for what? So they can continue the same course for a few more years, against all the winds of history that are desperately trying to blow us in another direction. Why couldn’t a dozen towns in Little Egypt go the direction of Marinaleda?
\Slash{}\Slash{}\Slash{}
There are some of us who feel ourselves to be inseparable from this region. Some others are scrambling to get out. In the latter group, many came for work, at the hospital, at the university. Some were raised here with the idea that their future is obviously elsewhere. No matter how many years we stay, many of us still think we are merely passing through. This is a local symptom of a wider phenomenon.
In the last few decades, the economy’s imperative to go where the money is has uprooted people from their places on a scale that is historically only paralleled by wars and colonization efforts. With that uprooting, we are sucked out of our networks of family and childhood friends, transformed into isolated individuals or nuclear family units, whose sole responsibility is to care for our small bubble. Nothing is worth struggling for in any particular place; if things get too hard, just move.
Of course, not everyone can. And not everyone will, even if they can. Two types of people are emerging: those who feel so connected to a place that they refuse to uproot themselves without a fight, and those who refuse themselves that contact with reality. The latter surf on the waves of a turbulent economy, thinking their work is more important than the ground they stand on to do it. Life is a highway and places are pit-stops.
The relation to every place as somewhere one is merely passing through is what prevents the kinds of struggles that are needed from emerging. It is what makes every particular place expendable.
Creating a future requires allowing ourselves to develop and take seriously our connection to a place. To recognize its fate as our own.
\Slash{}\Slash{}\Slash{}
On April 8th, 2024, a second eclipse will pass through Little Egypt. We can let these two eclipses be nothing more than an astronomical coincidence. We can let the movements of planetary bodies remain separate from the movements of our hearts, let their migration have no effect on our social life apart from being two opportunities to scam the tourists. We can do that.
But why? Aren’t we looking for something? Aren’t we waiting for something to reorient us, to trigger the transformation of life that is necessary to survive, let alone to thrive?
Let the next eclipse be ours. Let the first eclipse be a period, a hard stop that brings relief to the long winded speech of those who have told us this is the only life on offer, there is no alternative, you’d tear yourselves apart without us, and on and on. Period. Thank you for your thoughts, but now its time for some of our own. What can be accomplished in seven serious years, here in Little Egypt?
\textbf{Economic autonomy}. The ability to meet the needs of Little Egypt through growing and producing in Little Egypt. With it, the confidence that, were the global economy to collapse, we’d be alright – better maybe?
\textbf{A social safety-net from below.} The ability to provide care for those whose health and well-being the state has abandoned, or is always a law or two away from abandoning.
\textbf{Ecological restoration and defense}. The ability to not merely beg those who call themselves our leaders to stop fracking, but to physically prevent such a disastrous industry from poisoning our region.
\textbf{A sense of collective fate}. Forms of celebrating the forgotten history of resistance, of feeling ourselves as we really are: fragile links in a human story of struggle.
How far can seven years take us? Seven years from now, will we have squandered our lives working to pay off debts and rents to those who we feel, deep down, that we owe nothing?
There are no maps for where we must go. There is a direction, and a path to make by walking.
\section{3. Fragments of a Future}
Every block has a garden and a tool library. Houses are fixed up and owned through use and care. Contracts are for people who hate each other, and they still get written up from time to time, but shelter is not something you deprive even someone you hate. In the garden, the neighborhood watch meets twice a week to practice de-escalation techniques and nonviolent communication, and trains for situations when those don’t work. The strip is dotted with every variety of eatery, collectively run with locally grown food and some specialty items acquired through autonomous trade routes. We always have enough, but we don’t have everything all the time. The excitement around sharing something special returns to us.
\Slash{}\Slash{}\Slash{}
Its a shitty morning. Its the day of your twice-monthly shift for trash collection, because we still make trash for the time being. Your crew gets up early, because you all want it to be over by lunch time. As you roll up in the bio-diesel powered truck, someone gets the idea that turns the mood: death metal. You will blast death metal as you all toss cans of trash into the truck. Its perfect, as if the genre, invented decades ago, existed in a sort of limbo until it discovered its sole purpose as the soundtrack to a communal trash collection team. Those sleeping in along your route yell for you to turn it down, but whatever. When its their shift on trash duty, you promise yourself, you’ll let them get through it however they need to.
\Slash{}\Slash{}\Slash{}
There’s a bonfire again on the strip, this time for the Tomato Fertility Festival, which has moved out of clandestinity and into the open air of the town. The chant of TO-MA-TO echos throughout the neighborhoods, as marches start from various gardens led by children carrying baskets of the first tomato harvest. Gallons of the red fruit are poured into a cauldron over the fire and a sauce is cooked slowly amidst dancing, which is still more fun because its in the streets.
\Slash{}\Slash{}\Slash{}
You can’t get out of bed. You can’t stand the light. Nothing happened to you; there isn’t any reason. You just can’t see other people, hear their voices, feel their touch. All that you can do today is feel. And even though it feels like pain, you don’t mind it. It has messages for you, which you can hear if you have the time to listen. And you do now. You’re allowed to feel. No one judges you or shames you and you won’t get fired since there are no jobs. There’s always work to do, but work and life and fun and play are integrated, and none of those things are jobs. The work you are responsible for can wait, or someone else can pick up your slack for the time being. You are allowed to feel. You are encouraged to feel. You are free to feel. And there will be no penalties, no consequences for staying in bed all day, all night, and for however many days it takes for you to feel all the parts and moments of that feeling. When you emerge from the fog, you remember you were cared for, and your responsibilities were cared for, and you are refreshed.
\Slash{}\Slash{}\Slash{}
Hospitals are run as cooperatives. Specialist doctors and surgeons commit blocks of time toward patient care and participate in skill share, which trains other health care workers to the extent they can. Through the collective nurses have become household physicians, the family doctor. Cooperative Hospitals provide access to tests, medicine, and are hubs for emergency treatment when a nurse cannot be accessed. They serve the severely sick, those with ongoing, intense treatment plans, and are sterile environments for surgeries, but most ailments are treated in the home. Babies are born where mothers want them to be – at home, at a house run by midwives, in the hospitals. Notably, with a large-scale diet shift from processed foods to regionally grown and raised, organic meat and produce, in combination with the shift from jobs to collective work forces which have reduced anxiety and depression, the health of the general public has increased dramatically. When people are terminally ill, they are placed with their families and loved ones, provided end of life care with a nurse (there’s usually one in every communal unit), and are allowed to die in peace, however they desire. While we once required the need for death doulas — emotionally mature individuals who could guide the unfeeling through trauma— we now are able to take the time we need to mourn, to feel, and to celebrate the life of those who leave.
\Slash{}\Slash{}\Slash{}
A group of kids and adults are repairing a broken node on the solar powered mesh network that keeps the internet running, free from the infrastructure of the big telecom companies who still dominate in some places. A few trucks are moving the day’s harvest to neighborhood food hubs, where young kids load bags of produce onto bicycle trailers. You’ve had the longest day, you think, as you sip peach brandy on your porch. What did it start with? Death metal, right. And then there was the Yemeni festival for lunch, then someone asked if you would help mediate a conflict they were having over in the Arbor district – a fight about someone sucking up all the block’s electricity, which admittedly tested your patience. Then there was that walk with that someone to that persimmon tree, the one with the candy-tasting fruit the size of tomatoes that you had kept secret til today. Then the hour of canning while the old woman read aloud from One Hundred Years of Solitude. Then the cleaning out of the rainwater filter, a quick but messy job. Then the dinner you shared with the sunset. And now the brandy, and the sound of music growing down the block. But your friend is on their way over, and you plan to continue tonight the friendly debate you’ve been having for a decade, since even before life became the pleasant chaos that it is: what is happiness? Its a question that doesn’t get old.
\Slash{}\Slash{}\Slash{}
Across fires and under stars, we share stories of how silly we were. We have to look at it as silly, so as not to fall into a rage at the ideas and practices that our ancestors allowed to decimate so much beauty in the world.
“It turns out people like to create things, and like it even more when what they create is useful to others. This obvious fact about our being, so evident all around us, was obscured by the foggy lens of ‘the economy.’ They had actually convinced some of us that it was money and selfishness that made people work! Having never actually allowed people to live without scrambling for their basic necessities, the economists never actually got to observe free people undertaking free activity. As if humans before the economy were isolated misers, as if they weren’t born from and dependent on one another. As if our greatest joy wasn’t to be found in being the cause of joy to others!”
A child speaks up: “But what was ‘the economy’ you’re all always talking about?”
Old timers laugh: “We didn’t know either! That’s what was so crazy about it!”
A more serious voice rises: “When you were in it, it was hard to see it for what it was. When you were in it, it just looked like ‘the way the world worked’: you had to sell your time in exchange for some paper or numbers, in order to buy the ability to live and sell your time more. You got a weekend, a few holidays, some vacations if you were lucky, but otherwise your life was owned by the companies you sold it to. At the end there, it seemed like people turned themselves into little corporations, and forgot entirely what it meant to be free. Now, outside of it, we can see it more clearly: it was a way of controlling us, of governing us. Of keeping us ignorant of the fact that we didn’t need the companies and the governments who said we needed them.”
“But how did such a thing ever take hold of everyone in the first place?”
“That’s a very good question.” The fire crackles. “Let me tell you about our ancestor, Tecumseh.”
\Slash{}\Slash{}\Slash{}
Tecumseh was a Shawnee Indian chief, who led a rebellion against the colonizing forces of early America. In 1811, a year before the rebellion he fomented broke out, Tecumseh passed through southern Illinois during his ceaseless efforts to unite the tribes. He carried with him a bundle of sticks, demonstrating that while a single stick can be broken, a united bundle holds under pressure. This image was so powerful it was eventually taken up by his – and our – enemies, to signify their commitment to a united force of colonization and genocidal conquest.
After Tecumseh’s visit through southern Illinois, the New Madrid fault line let loose an earthquake that reportedly rang church bells as far as Boston. The most powerful active fault line in the North American continent, it slumbers, for now, in the southernmost parts of Little Egypt. The 1811 quake was taken as a sign of the justness of Tecumseh’s cause.
“But what was his cause?”
Well, as he put it:
* ‘No tribe has the right to sell land, even to each other, much less to strangers \dots{} Sell a country!? Why not sell the air, the great sea, as well as the earth? Didn’t the Great Spirit make them all for the use of his children?’
You see, the game the economists and the others who controlled us played was to tell us that people like Tecumseh were not our ancestors. That they were backward or savage or that their way of doing things would never work again. And so they gave new names to the genocide and the destruction of all the possibilities in the world. They called them ‘progress,’ and they taught us that we were better than all those folks who’d lived for so many thousands of years.
\Slash{}\Slash{}\Slash{}
\emph{We construct tiny utopian glimpses because they are potent exercises in unfreezing the imagination.} \textbf{For too long its been easier to imagine the end of the world than to imagine the end of capitalism}\emph{. Maybe the image of chaos that we are told lies beyond this tightly controlled society is just the ruling class’s view of what autonomy would mean: a world that could not be controlled from above. A world of free communities, unsubmissive to the rule of money.}
\section{4. Autonomy}
Autonomy. It’s a word that today has more of a direction and a practice than a meaning, per se. Around the globe, from the Zapatistas of southern Mexico, to the Kurds of northern Syria, to networks of communes throughout Europe and North America, autonomy is the dream taking shape.
We could define it as collective self-determination, the ability for the people of a place to chart their own future. To eclipse the power of financial, industrial, and political elites.
The obstacles to autonomy are twofold: on the one hand, a global economy that wraps people’s everyday lives in an international network of money exchanges, and on the other hand, the governments and their police whose job, at bottom, is to keep it that way.
Struggles for autonomy, then, involve both building and fighting. Building the means for regional production outside the existing economic order. Fighting for the right to organize our lives in ways are inevitably contrary to the laws of the state. Those laws, whatever their stated intention, have the fundamental purpose of keeping us dependent on the institutions that are destroying the earth and its various worlds. Reducing us to isolated individuals, whose sole course for freedom involves submission to the gambling ring called the economy.
Autonomy is about creating different freedoms. Creating different worlds. Creating the conditions to create ourselves, with all the potential dangers and joys that such a project entails.
\section{5. How?}
How would we do it? How would we eclipse their power?
a. Many of us are already doing it. Around the continent and around the region, networks of organic farms are self-organizing. Spaces are being taken over and filled with people and projects for the struggle. What is necessary is not some party or political organization that sucks us into the dying gasps of a system that, with Trump, has shown its true colors. We are already a party, partisans, of a world that is inconsistent with this one. Acknowledging this fact, deepening our cooperation, and extending our ambitions are our first tasks.
b. Start with desires, and build what is needed to fulfill them. None of us want a life reduced to blandness and scarcity. We want a luxurious life that can be shared with others, and we’re willing to work for it. A craft brewery or ice cream company that builds its own local production network can be a partisan project, building within the money economy a set of skills and resources that could just as easily be detached from it. Create something, share it, and link up with others.
c. Don’t try to do everything. Make friends who have the skills you don’t have to accomplish what you want. We need engineers, farmers, computer scientists, permaculture experts, listeners, singers, thieves, nurses, historians, visionaries, carpenters, plumbers, and a thousand other people who love the skills they’ve developed and want to share them. Make your skills available, and look at something you can’t do alone as an opportunity to meet someone new.
d. What passes for “political debate” today is a trap. Political discourse today is designed to pidgeon-hole us into pre-defined, easily manipulated categories. If you have a neighbor or a high school friend that is on opposite sides of the political spectrum, find a common practice or form of sharing material things that can create common ground for a relationship. Chart a course off the political spectrum with unpredictable friendships.
e. Build a culture of resistance. Non-cooperation with the police and the state, solidarity with those who resist. Turn out to demonstrations and make them true expressions of our collective capacity to transform life and the city, if even for a moment. Ask yourself how you can best contribute to creating or sustaining joyous chaos, a breakdown of the sad reign of normalcy, and make a plan with those you know.
f. Diversity is strength. Racial and class diversity, but also ideological, spiritual, age, and any other kinds. We want a world that values each of our perspectives and unique abilities to contribute, and this is an ethos that needs to be in the genetic code of our struggle. Keep in mind, the most effective tool of the powerful is division along racial, ethnic, or other lines. Within any identity, there is more difference than there is across its boundaries. The only lines that matter are ethical lines: how you are, not who you are; what you want, not where you come from.
g. Think ethically and strategically. Breaking out of the structures of this world is not something that will happen simply because it is a good idea. Good ideas lay buried in the brains of millions of dissidents. Similarly, rigid moral principles paralyze people from acting in a context where no action can be safe from a context of suffering. I type this on a computer, using electricity created from burning coal, which is warming the atmosphere and destroying the lungs of people around the globe. Morality creates guilt around these facts, which are beyond any of our control and therefore responsibility. Guilt paralyzes and brings out nastiness, resentment.
What is needed is a strategic ethics, which starts from what is practically possible in any given situation, and is oriented toward expanding those possibilities for the next moment.
Morality commands, whether it is from a church pulpit or a conscience. Ethics, in contrast, invites us to steer a course through the undesirable extreme consequences to grow more powerful in each unique situation.
For our broad situation, there are clear extremes we want to navigate between: on the one hand, we want to steer clear of what is normal, which is the destruction of the world at the hands of the economy. On the other hand, we don’t want to catalyze the outbreak of open civil war in a context where the state and right wing paramilitary forces can be deployed to crush everything we love. Veer too far from normal, without having built enough strength, and the reactionary forces will be shipping us off to the camps. Come too close to normal, and our projects will be captured in the economy and become a nightmare version of what we hope for, as has happened so many times before.
\section{6. Which Future Past?}
Fifty years ago, no one could have imagined the world we have now. Fifty years from now, the world will have transformed several times over in ways that we currently cannot imagine. This is beyond question. The only question is whether the terms of these changes will continue to be set by the interests of the wealthy and their political lackeys, or whether a new historical force will enter the equation.
Eclipses are useful to historians, because they allow the precise dating of events that otherwise may have been recorded unreliably. What will these eclipses mean to the future? A moment where the sublime movements of astronomical bodies was reduced to a marketing gimmick for a dying region? Or a moment when, however subtly, some otherwise inconsequential earthlings began seriously organizing to save themselves?
\chapter{vol. 2.1: Frozen in Place}
\section{Repairing Our Relation to Carbondale’s Rebellious History}
The following essay is a beginning to the second installment to \emph{The Next Eclipse,} the beginning of a longer, deeper project of repairing our relation to history. History, in order for us to have a relationship with it, must be local. But local history must be informed by an understanding of the broader political and economic transformations, of which the changes in a particular place are only an instance. The guiding existential hypothesis of this text is the following: if things feel meaningless, without sense or direction, it is because we have lost the capacity to understand the historical forces that control our present and shape our future. The aim, then, is to reconnect our existence with the historical forces that have shaped it, and to draw attention to what was lost along the way. This aim is \emph{strategic,} because it outlines our reality in terms of the power relations that define it.
\section{Introduction}
Southern Illinois University Carbondale is in crisis. The university is hemorrhaging students and the state has revealed itself to be an unreliable source of funds. Everyone agrees that something needs to change. Many have given up already: their applications are out, their houses are for sale, they are trying to find a way off a sinking ship.
There was a time when crises could be seen as moments of opportunity, moments when the problems with the existing social and economic system were revealed and genuine questions could be asked about new directions. Since the 1970s, however, a new form of thinking has become dominant, sometimes called “neoliberalism.” According to neoliberalism, \emph{there is no alternative} to the existing social system. The only possible world is a world where everything is evaluated according to one measure: that of the economy. Crises today, rather than an opportunity to reflect on new directions, are used as an opportunity to force more and more aspects of life into economic values. The only cure we are offered is more of the same poison.
Chancellor Montemagno’s plan is an exemplary case of this. Like so many other neoliberal gestures, it is an attempt to centralize power within the organization, and discipline it to make it attractive to capital investment. No values other than economic values count when it comes to attracting capital: drones that will surveil and kill, Homeland Security to deport our neighbors, police to lock people up, fossil fuels to continue the destruction of the conditions for human life on the planet? Anything, as long as its money. The only “solution” on offer for the institution is to more deeply collaborate with the institutions that are causing the problems.
But neoliberalism didn’t come out of nowhere: it emerged as a response to social movements that challenged the functioning of the American Empire to its core. It was a form of government that was developed to destroy the welfare state, build up the prison and policing system, and tame sites where rebellion had broken out during the 1960s and 1970s – among those sites, the University was one of the most powerful for generating a critique and opposition to capitalism and the wars that sustain it.
If we look closer at those social movements, we see that they were fighting against the same problems that we are concerned about today, and they were developing solutions that were based on principles that many of us hold today. Principles of egalitarianism, of autonomy, of community, and of ecological responsibility. We must rediscover and pick up the baton from those struggles, long repressed in our memory. Any proposed solutions that do not address the fundamental problems of our society – problems that have been evident for almost 50 years – will fail, and will continue us down a nightmare path of endless war, ecological catastrophe, and widespread immiseration.
The University can, and should, be a site where these problems are being faced head on. It should be a site where we develop the means to break free from the economy.
***
\section{CHAPTER 1: THE UNIVERSITY THAT SHOULDN’T HAVE HAPPENED, BUT DID}
Southern Illinois Normal College was opened in 1869, thirteen years after the first train stopped in the newly founded city of Carbondale. Carbondale had been founded by Daniel Brush, when he heard that there were plans for a railway to be constructed through the region. He hired a surveyor to determine what the most likely path of the railway would be, and planted Carbondale in that path so it could become the center of rail traffic for Little Egypt.
Little Egypt, the name for southern Illinois since the early days of European colonization, itself has always been a resource colony for business interests located in larger midwestern cities:
“In many ways Southern Illinois has a ‘colonial economy’, one controlled by outside financial interests. Outside interests have developed the regions mineral and timber resources, its shoe and work-clothing factories and the rail transport for such development. These companies have employed local labor, even recruited labor to come to the region to work, but have taken the profits from their operations elsewhere. To a degree, the corporate base of Chicago and St. Louis has been built on Southern Illinois labor and resources.” (Harper, 10)
This attitude of business interests toward the region, and the determination of southern Illinoisans, helped fuel massive and intense labor struggles throughout the 19th and early 20th centuries. For coal miners and their families, the fight for unionization was a life or death struggle, since non-unionized mines meant not just starvation wages, but lax safety protocol that time and again led to collapses or explosions that killed dozens of people at a time.
Throughout this era, Southern Illinois Normal College was a small teachers college a few thousand students at most. The city of Carbondale was the major connection with the rest of the world – which also meant the site from which the national guard would be deployed to beat up striking miners and protect scab laborers.
From the 1930s through the 50s, many mines began to close, leaving small towns throughout the region without any ability to participate in the money economy. Interestingly, the mine closures were not a result of coal running low, nor as a result of the ecological concerns that we have today. Rather, they were closed as a part of a global strategy to shift from coal to oil as the major industrial fuel source, a decision that was made specifically to break the power of the coal unions.
The coal unions played a decisive role in early 20th century labor struggles because they had the privileged ability to literally paralyze the economy. And they use this power to help striking workers around the country win basic labor rights. This power of coal workers was a vulnerability to industrial capitalists, who shifted their fuel to oil because it required less labor to both produce and distribute, and could be more easily rerouted around blockages posed by workers in any given area. The coal mines closing left the region, already “undeveloped” in capitalist terms, in a localized depression.
And this was the regional condition in which Southern Illinois Normal College would be transformed into a completely unlikely University, ten times its previous size. The fact that the region was viewed as backward and violent, combined with post world war 2 investment in higher education through the GI Bill, were seized upon by a man of some extraordinary talent: Delyte Morris.
Morris was appointed President of the new University in 1948, after a quick succession of unsuccessful Presidents. Morris had two big ideas that guided the remarkable growth of the University: first, to pitch the University to the State as a development project for a troubled region, and second, to draw upon alternative visions of higher education which were by no means well-established at the time.
Major research universities tend to be located in or near major cities. The idea that one could – or should – be built in what we would today call flyover country was unorthodox. But Delyte toured small towns throughout Little Egypt to pitch the idea of a “open university,” one that would be a resource for developing economic and cultural life throughout the whole region. His philosophy of education related to this: the University was not to prioritize inquiry and reflection detached from real life. Naturally, the classics of higher learning were to be on offer, but not the centerpiece. One of Delyte’s hires was Baker Brownell, a philosopher turned radical educator who developed regional educational programs for the University and author of the rhapsodic book \emph{The Other Illinois.} According to Brownell, in response to the stuffy, Ivory tower vision of education that privileges reason detached from experience,
Southern would reply, “Reason with a small r is the only useful kind of reason. The training in its method, its beauty, its triumphs, and its uses is surely important. But reason segregated from the community of men is sterile. Withdrawn from the experiences, the disasters, the problems, the delights of the human adventure it is cracked and futile. For these things are the crucible in which reason is created. Neither reason nor any other single function of our many-stranded life is the key to it all.” (241)
This unique philosophy of education is what gave rise to the first ecology program at touch of nature, a hodgepodge of classical academic and vocational training distributed throughout the region, as well as earlys teps toward racial integration and handicapped accessibility. But the program that most embodied this philosophy was the Division of Area Services, pioneered by Baker Brownell. This program sent out teams of academics and experts in various fields to conduct community inquiries and discussions about how to develop small impoverished towns in the area. The delegates from the University were not to impose their own ideas, but to listen to the needs and desires of the communities and figure out how to make their plans a reality.
Unfortunately, since many of those plans involved attracting outside capital in the form of factories, they were not able to be realized. But imagine for a moment if the task was to specifically develop the means for life that could allow for local production of basic needs – imagine if rather than the assumption that “development” meant “integration into the capitalist economy,” the aim instead was to help communities build their own autonomous infrastructure outside of it. If that path had been taken at the time, decades of poverty and all its attendant social problems could have been avoided.
But that’s not how it worked. Instead, the University did indeed become a center of capital investment in the region – the economic engine that we all know. And it did grow into an unlikely major research institution, responsive to the local region while attracting students and scholars from all over the world. And, in due time, the insistence on connecting reason with life came back to Delyte in a way that he couldn’t have expected, and ultimately led to his downfall.
***
\section{CHAPTER 2: REASON REBELS}
When reason is connected with life in a society that is hostile to life, reason leads to rebellion. This is what happened in universities across the country in the late 1960s, and SIU Carbondale saw some of the most intense outbreaks of a rebellious reason of anywhere else. In order to understand why the student movement was so intense, we should consider, among other things, the way SIU had encouraged students to think freely, outside the logics of the state and the economy. No single faculty member better embodied these values than Buckminster Fuller.
Fuller was a world renowned intellectual, hailed by some as the Leonardo Da Vinci of the 20th century. He was critical of both American capitalism and Russian state socialism, and argued that a political revolution was destined to fail. Instead, he encouraged his students and audiences the world over to initiate a design revolution: to redesign the conditions of life, to create \emph{livingry} instead of weaponry. Fuller would hold massive lectures, sometimes outdoors, speaking for hours on all subjects. His philosophy of education was a radical extension of Morris’s own vision of a university open to all:
“We should do away with the absolutely specious notion that everybody has to earn a living. It is a fact today that one in ten thousand of us can make a technological breakthrough capable of supporting all the rest. The youth of today are absolutely right in recognizing this nonsense of earning a living. We keep inventing jobs because of this false idea that everybody has to be employed at some kind of drudgery because, according to Malthusian Darwinian theory he must justify his right to exist. So we have inspectors of inspectors and people making instruments for inspectors to inspect inspectors. The true business of people should be to go back to school and think about whatever it was they were thinking about before somebody came along and told them they had to earn a living.”
Bucky and his ideas were a major influence on the counterculture of the sixties, his geodesic dome design springing up in communes around the country.
His ideas, and the wider counter-culture, was active on campus and around Carbondale. The aim of the counter-culture was not merely to do drugs and have long hair, as so many stereotypes today would lead us to believe. Actually, people were building organizations and forms of life that responded to their own needs, without asking for permission from those in power.
The Women’s Center, now an established non-profit, was begun by a group of women who saw a need for a home for those escaping domestic abuse. So they rented a house and created one. The Black Panther Party, whose Carbondale chapter began in 1968, created a free breakfast program for local children, a free medical clinic, and the first food co-op in Carbondale, which brought in weekly shipments of eggs, bacon, and vegetables from local farms. There was a health food store run by members of a commune located outside of town, a cheap dental clinic, endless music, radical newspapers, an LSD crisis-hotline, and even a drug testing collective that checked for toxic additives to recreational drugs coming into town. The drug testing collective was called “Synergy.”
On campus, students developed a Free School, open to anyone, where people could collectively pursue subjects oriented toward expanding their sense of joy and meaning. There were classes in Zen Buddhism, Yoga, philosophy, and skill shares in everything from building to “making love in the fields.”
And these expressions of the world people were trying to build – a world of local agricultural production, of sharing, of food for all, of a harm-reduction approach to drugs, of support for the most vulnerable in society and joy in one another’s presence – were connected with the struggle against the current system and its injustices. This was reason connected to life at its best: people freely coming together to creatively solve pressing problems in their communities, using the university’s resources – with or without permission – to improve the lives of everyday people.
In the late 60s, protests against racism and sexism on campus were building, as well as an anti-war movement that would eventually transform the course of the entire university. At bottom, the counter-culture students were rejecting not just the specific war in Vietnam, but an entire social system and economy that was premised upon war, racism, and destruction of the environment. And the strategy for taking on such a monstrous thing was the same as that of the coal miners 50 years earlier who fought, not merely for their own higher wages, but for the rights of working people everywhere: paralyze the functioning of everyday life that allowed the economy to operate. Also, just like in the coal miners struggles, arson, sabotage, and bombings were used to gum up the wheels of the system. In 1968, a bomb was placed in the Ag building – detonated in the middle of the night, so that no one would be injured. In 1969, Old Main was burnt to a crisp, presumably by student activists\Slash{}arsonists. Again, no one was hurt.
The focal point of the local anti-war movement was the Center for Vietnamese Studies, a research center funded by a million-dollar federal grant to advise and provide technical support for Vietnam when the war ended. Students had read about a similar center at the University of Michigan, in which it was revealed that there were CIA operatives working there. One of the faculty members associated with the CIA faction in Michigan, William Fischel, was hired for the center at SIU. This was the source of the allegation that the Center for Vietnamese Studies was a CIA front. Apart from that, it would have been opposed anyway as a symbol of colonial development in a country that America had been murdering people in daily. As one faculty member opposed to the Center put it, in reference to the center’s mission of post war “planning”: “you’ve planned enough already.”
The rebellion began after the Nixon administration expanded the war in Vietnam to Cambodia. Students marched, smashed some things, and about a hundred set up camp on the train lines, blocking train traffic through town. This action brought the Illinois national guard in – [the national guard which had been created in 1877 to beat up workers in a nationwide railroad strike, which had led to the first general strike in American history, which took place in St. Louis, where workers took control of the city for three days before being beaten and shot into submission by a small army raised by the ruling class (this ruling class victory was commemorated every year in the so-called “veiled prophet” parade, in which arms were displayed led by a Klan figure. The tradition continues to this day as an exclusive gala.)] When on May 4, 4 students at Kent State in Ohio were murdered by the national guard, students went on strike and took over the town.
Days of streetfighting ensued. Students, out of town rebels, and community members, took on the police and the national guard. Eight days of riots culminated in a march to the President’s house, which was smashed up. School was cancelled for the remainder of the semester, and all students received full credit for the classes they were enrolled in.
What needs to be understood is that this was not merely childish acting out or mere chaos: this was a rebellion that followed a conscious an coherent political strategy. In the face of a business that is exploiting and threatening the lives of its workers, the proper response is to strike for better conditions. In the face of a society is that is powering a war machine that is murdering people both at home and abroad, the proper response is to strike – to prevent that society from functioning.
This event spelled the end for Delyte Morris, who had already outstayed his welcome as far as members of the Board of Trustees were concerned. He was stripped of all his Presidential powers, and consigned to a marginal, symbolic role.
The irony is that the rebellion of May 1970 could be aptly described as the fruit of a philosophy of education that Morris endorsed in principle, but whose consequences he couldn’t see. To connect reason with life, in a society that produces horrors, is to invite reason to rebel. The students took risks – to their lives and livelihoods – based on their conviction that the world could be changed, their correct assessment that the official channels were not willing or able to change it, and their sense of justice that this change could not in good conscience be postponed. So they became what all great people become: historical actors, who recognize that \emph{now} is the only time to act in.
***
\section{CHAPTER 3: THE REACTION, OR, THE AGE OF DEPERSONALIZED AUTHORITY\Slash{}CONTROL}
[After the student rebellions from 1968 to 1970] the university’s development was sharply arrested\dots{} [T]o a large extent Southern Illinois University lost its momentum, its vision, its leader. It has been largely frozen in place since 1970. Its future became hostage to a frightened board of trustees, a restrictive state legislature, and false impressions created during the events of Morris’ downfall.” (Robert L. Harper, \emph{The University That Shouldn’t Have Happened, But Did!,} 4)
What could it mean for a university to be “frozen in place”? No doubt, things have happened, lives and careers have been led, time has passed and things have changed. And yet, this metaphor of being “frozen in place” somehow rings true: development has been stunted, the contradictions and tensions that a generation sought to resolve have been maintained by ever increasing levels of force and novel forms of control. The wrong things change, and the things that so many struggled to change remain the same.
In a sense, this is what the role of governing powers has always been: to freeze a society from developing beyond the need for them. In the 1920s, when the labor movement was at its most militant, the U.S. government pioneered a strategy of counter-revolution: use direct repression against organizers, associating them with foreign governments, killing them, deporting them. And then, to hamper the ability for communities to continue organizing, pass laws that allow the police the ability to raid and disrupt those communities. In the 1920s, this meant Prohibition of alcohol, which was used to target working class immigrant communities who were accused of being the most radical segments of the labor movement.
This drama played itself out in Williamson County, Illinois, with a catch: the police in Williamson County, at the time, were themselves “corrupt,” i.e., they tended to support the union over the federal government. As a result, the wealthy business interests of the county had to invite S. Glenn Young, a former federal agent and Klan organizer to lead a campaign of “cleaning up” Williamson county, targeting the immigrant labor movement under the veil of enforcing Prohibition. This led to the fracturing of the labor movement into bootlegging gangs, and waves of violence that recall the gang warfare under the War on Drugs today.
This strategy was how, in the wake of the first world war, the U.S. government managed to “freeze in place” the class relations that were intolerable to working people of that generation.
A similar strategy has been deployed nationally since the movements of the 1960s. This was famously admitted to by John Erlichman, the domestic policy advisor to Richard Nixon, after he was released from jail for his role in the Watergate scandal. In a 1994 interview with Harper’s Magazine, Erlichman said:
“You want to know what this was really all about?” he asked with the bluntness of a man who, after public disgrace and a stretch in federal prison, had little left to protect. “The Nixon campaign in 1968, and the Nixon White House after that, had two enemies: the antiwar left and black people. You understand what I’m saying? We knew we couldn’t make it illegal to be either against the war or black, but by getting the public to associate the hippies with marijuana and blacks with heroin, and then criminalizing both heavily, we could disrupt those communities. We could arrest their leaders, raid their homes, break up their meetings, and vilify them night after night on the evening news. Did we know we were lying about the drugs? Of course we did.”
This quote is a lens through which a whole, deliberately obfuscated, sequence of history becomes clear. But almost all instances in which it has been quoted focus solely on its meaning for race relations, its role in constructing a “colorblind racism” that persisted through the criminalization of black life. This is no doubt true, and significant. But what is left out of these interpretations is the fact that Erlichman points to \emph{two} enemies, the other of which is the “antiwar left.” Targeting Black radicals meant targeting urban areas for repressive restructuring, turning them into zones of police occupation. What did it mean, however, to target the anti-war left?
Simple: it meant targeting universities, turning them into sites that were adapted to the interests of capitalists. It meant “freezing them,” and freezing the capacity of thought to interrogate and intervene in the society more generally. It meant, as Ronald Reagan had proposed when running for Governor of California in 1968, creating a situation where students were more concerned about getting a job after school than about reflecting on the conditions of the society they were being asked to inherit and reproduce (Reagan’s plan to do this was to raise tuition). And it meant doing so in a way that was shielded from criticism of the movements that they were targeting, movements which had launched a devastating cultural critique of authoritarian power, just as the movements for Black freedom had launched a devastating moral critique of overt racism. For the latter, after key organizers were assassinated and organizations destroyed, a form of “colorblind racism” was invented that had the same effect of maintaining a racial caste system, but without overtly racial justification. Similarly, for the anti-war left, whose stronghold was universities across the country, a form of “politics-blind political repression” was created, as generations of students were burdened with debt in order to control the direction of their inquiries and action into avenues subdued by the economy.
At the national scale, this is partly how the “freezing” of social relations has been accomplished, and why we are left burdened with the same problems that the generation of the 1960s rebelled against, only in a different and more intensified form: racism, now in the form of the largest system of prison slavery in the history of the world; ecological devastation, now in the form of literal ecocide, or the destruction of habitable life on the planet; imperial wars, now in the form of endless global policing operations fought increasingly by people whose heroic warrior activity has been reduced to something barely distinguishable from playing video games.
Our task, then, is to repair our relation to this history, to the struggle for liberation from these conditions. Which means understanding, at a local level, the war that has been waged against us to maintain them.
**
So how did this happen \emph{here?}
Consistent with the wider FBI project of neutralizing the Black Panthers, in November of 1970 – the semester after the student rebellion – cops from Carbondale and other surrounding towns shot 778 bullets into the Black Panther house on the northeast corner of Washington St. and Allyn St. Shockingly, no one was killed, and, just as shockingly, a cease-fire was negotiated by members of the northeast community. Six Panthers – the Carbondale 6 – were arrested and none were convicted. But the legal battle lasted for a long time, and the attempted massacre by the Carbondale Police Department accomplished its presumed goal of neutralizing the organization’s activity.
The Black Panthers had been declared by FBI director J. Edgar Hoover to be the greatest threat to American democracy. The FBI’s counter-intelligence program, or COINTELPRO, engaged in assassinations, frame-ups, and misinformation campaigns to demonize and neutralize the group around the country. The Carbondale Police’s story that they had seen a “suspect” enter the Panther house on the night of the shoot-out is consistent with stories used to excuse assassinations around the country that destroyed the Panthers’ organization.
Apart from the Panthers, there were drug raids of high profile leftist activist houses, suspected at the time to be pretenses for repressing them. The house of Reverends Norman S. Bach and William E. Garrett, two of the many clergy involved in the anti-war movement, were raided on suspicion of marijuana possession. The Big Muddy Gazette interpreted this, at the time, as an act of repression, which is consistent with how we know the drug war was used. A chilling effect must have set in among public organizers: if you’re Black, the cops might shoot up your house; if you’re white, you may be publicly shamed and arrested on whatever charges can be cooked up. Step one of counter-revolution: target the organizers.
Next, there was the Horsely Commission, led by Senator Horsely to investigate the conditions that led to the student uprising. Initiated at the beginning of the semester after the riots, a few months before the Panther shootout, the commission blamed the uprising on an “international communist conspiracy,” and made the following recommendations to the University:
\begin{itemize}
\item\relax
introduction of student ID cards
\item\relax
that the administration be able to fire politically problematic professors, even if they are tenured.
\item\relax
Introduction of pornography legislation, presumably as an excuse to ban independent student newspapers
\item\relax
The banning of material “inciting violence,” presumably for the same reason
\item\relax
to cut off scholarship to students awaiting hearings for participation in the unrest.
\item\relax
Elimination of the difference between property destruction causing under \$150 in damages and damage in excess of that. In other words, punishment was not to be proportional to the economic damage, but rather the principle of property itself was what was to be protected, and any violation of it, no matter how economically small, was to be considered with equal seriousness.
\end{itemize}
Each of these recommendations, with the exception of the ability to fire “problematic” professors, may appear innocuous, or at least “reasonable.” They had to: there was a strong movement, and the measures taken to suppress it had to be careful not to trigger more resistance. In light of what has occurred – the construction of a hyper-controlled world, justified at each step with reasons that obscure its true aims – we can see these measures for what they are: excuses to expand the ability for police and administrators to intervene in and make trouble for the movements that had challenged their authority. Governments being what they are – organizations for maintaining hierarchical power – we should assume that the published recommendations of the Horsely Commission were only the visible surface of the policies that were being pursued.
The recommendation that the University fire problematic professors for political reasons was tested on Douglas Allen, a philosophy professor who was up for tenure. Allen had the support of his colleagues and department, but was denied tenure explicitly for his participation as a leader of the anti-war movement. The administration was sued by Allen and eventually had to offer him tenure. By that point, he had already found another position at the University of Maine, and did not return. Although they achieved the intended effect of rooting out a radical, it was clear that the method of overt political targeting would not stand up legally.
Another tactic for rooting out problematic professors and reshaping the university in the interest of the wealthy needed to be found. And, within a couple of years, it was: the tactic of the “budget-crisis.”
It has to be stressed that the first “budget crisis” that SIU experienced was a \emph{direct result} of the student rebellions. The Illinois Board of Higher Education was formed in response to the state’s sense that things had gotten out of hand down in Egypt, and they were no longer going to support Delyte’s dreams. They turned off the spigot, and demanded the university adapt.
In 1974, SIU President Derge fired 104 professors, a quarter of them tenured. The fired faculty were largely from departments of philosophy, history, english, sociology, and from the Division of Area Services, ending the latter program of community engagement. Adding insult to injury, Derge’s administration also tried to sue a number of the faculty that they were firing. The fired professors publicly declared that they saw this as a political purging of those departments that were most supportive of the anti-war movement. Derge denied this, and articulated for the first time what would be the standard justification for all university changes down to today. It wasn’t about politics, it was about budget cuts, failing to mention that those budget cuts themselves were about politics. In a statement that could have, and indeed has, come out of administrators from Derge to Montemagno, Derge said “decisions as to what departments should be cut were made according to enrollment trends.” This was the local application of a form of governance that would overtake the globe in the coming decades: political decisions imposed from above, justified not in political terms, but as necessary adaptations to the demands of “the economy.” This sleight of hand was first applied here as a repressive retaliation for a university that had brought thought together with life, and demanded that life change.
**
But the rebellious spirit of Carbondale and SIU didn’t die so easily. It continued for decades after the uprising, in a town in which the university administrations and the city government had become afraid of the students that were also their bread and butter. The city government and university administration have gone to quite extreme lengths to kill the rebellious energy of students and locals, only to find that it was this energy that kept the place alive. So they always look like idiots: destroying the conditions for collective joy, and yet begging people for “vibrancy” downtown. This was a vibrant town, but its vibrancy was connected to freedom, to the possibility of rebellion, to a counterculture. They have worked to police that out of existence, but also long for the flowers of the plants they have ripped out.
What were called the ‘riots’ were really just a ceremonial culmination of the life of the town, a moment of communion for the energies that had been released by the 60s, and denied their right to remake the world. From the party scene in the 80s that would shut down the strip on a weekly basis, to the Halloween riots that brought rebellious energy from all around the midwest. These events need to be understood, not simply as kids getting rowdy – though they are also that – but as the continuation of the rebellion launched in the 1960s, but within a new circumstance where the terrain of politics had shifted to undercut the possibility of this energy taking an explicitly political form. As a result, the measures of control, the process of policing existence, took a form that were similarly apolitical – as measures of crime reduction and safety.
Taking the strip was a collective gesture of transforming public space, of intervening in the order imposed by the police. Engaging in such acts, especially if connected with a party atmosphere, is what creates a genuine experience of community – the feeling of friends, neighbors, strangers, stepping outside of the roles and rules imposed upon them and creating their city on their own terms. It is ironic that today everyone is obsessed with “community,” but so few recognize how to build it: it comes from people having experiences together that are not pre-defined and constrained from above, from the moment when people engage with each other in recognition of their individual and collective capacity to shape their world and their futures. This is precisely what every act of government today is designed to destroy. The role of government, achieved through its police, its procedures, its regulations, its laws, is to \emph{lock all the exits} from the burning house that is this ecocidal\Slash{}prison society; to prevent the development of the very possibility of community life, and the sense of collective autonomy that it requires.
So it is worth stressing the extreme measures that were taken to destroy this spontaneous continuation of rebellious life. First, there were the riot police and their tear gas. Next, the city \emph{cancelled Halloween} for a few years in the 90s – an extraordinary step – blaming the riotous activity on “outside agitators.” After a few years they lifted the ban only to find they had not killed the spirit, and the town choked from tear gas for days. Thus began a decade and a half long ban on Halloween, a celebration that was in the process of becoming a midwestern Mardi Gras. Rather than recognizing this as a local culture in the making, the city government and reactionary forces clamped down for 15 years, finishing off the death of the public counter-culture. Now confined to basement shows, this culture, while it has nurtured musicians and a few rebels, suffers from the isolation it was forced into.
**
This has been the beginning of a sketch of a different history for Carbondale and SIU. It is not complete or authoritative: it is more of an invitation for others to speak up, to correct, to fill in the gaps, to value their own memory.
It is easy to see why people wouldn’t do so. The world appears to have changed into something unrecognizable, and it is hard to imagine how experiences 50, 30, even a decade ago feel relevant today. This too must be understood as a move a in a battle for control: the principle tool of American power is amnesia, the smothering of the possibility of collective memory. The story sketched here is an invitation for us to fight back, to recover a history that makes sense of where we are, to recognize that the official narrative is deaf and blind to all that is relevant for life, for our desires, and for the challenges we face. Reducing everything to the laws of economics and the government that imposes them, it systematically ignores that these laws, far from being natural, are tools for preventing the growth of an autonomous community power. Such a power was growing here in Carbondale, nourished and inspired by rebellion, by thousands of people recognizing that life as it was offered was intolerable, and who insisted that thought and life must be brought together against the forces that subject both to the superficial calculations of penny-counters, to the reign of the neurotic, the paranoid, their wealth and their police.
Our guiding thesis, hardly proven here, is this: we cannot understand the problems we face today – at the university, in Carbondale, or indeed nationally – unless we understand that the world we have was built to destroy the movements that sought to fundamentally change it. Here in Carbondale, that means that we need to remember that the roots of the long stretch of budget-crises have their origin in thinly veiled political repression, disciplining the university for producing students that were capable of asserting their power against a war machine. Unwilling to change, and now afraid of what young people were capable of, a process of “freezing” life began.
It is not, and never has been, money that makes the world go round. It is labor, love, friendship, desire. These forces must be mutilated and confined to money-relationships in order for the wealthy to stay in control. Today, here, the crisis is not really lack of money – that is only the crisis for those in power. The crisis for the rest of us is disconnection from our own sense of the world, disconnection from the power we have to build what we need and desire without the crutch of money and those who have it. We have a crisis of energy, and a crisis of struggle, a disconnection of our thought and our lives, a studied superficiality of our relationships, a paralyzing anxiety that holds us back from recognizing that all we need to chart a path out of this mess, and to repair our relationship to those who struggled before us, is here with us already.
1Fred Hampton, the 21 year-old revolutionary genius of Chicago, who had travelled to Carbondale and advised Reggie Brown to start the Panther chapter here, had been shot in his bed by Chicago Police. It was later learned that Chicago Police were working with the FBI and this was a targeted assassination, since the FBI was concerned Hampton could have been a “Messiah-figure,” linking struggles between black and poor white people. Indeed, this is exactly what he did with what would become the original “rainbow coalition,” in which the Panthers organized against the cops with displaced Appalachian white people, many of whom were racist and proudly wore their Confederate flags. This willingness to organize across the cultural\Slash{}color lines and against the state made Hampton in particular a target, and his brief life has been examined to an extent that other Panther chapters, like the one in Carbondale, have not.
\chapter{vol. 2.2: Introducing the Knights of the Flaming Circle}
During the 1920s, a nation-wide, secret organization called The Knights of the Flaming Circle took on the Ku Klux Klan in the streets. Little – far too little – is known about the organization. But we do know that there was a chapter in Williamson County.
This essay collects what little we do know about the “Red Knights,” and helps us to recognize that today’s antifascism is a part of a long, largely forgotten, tradition of giving no public forum to fascists.
\Slash{}
In late September 1923, a dynamite blast went off in the hills outside Steubenville, OH. Residents streamed out of their houses to see “white robed figures moving about in a strange ceremonial,” lit only by a gigantic, flaming circle.
Were these members of the Ku Klux Klan that had simply switched their flaming cross for a circle? Soon word spread through the town that, in fact, this was an anti-Klan group that was inaugurating its formation: The Knights of the Flaming Circle.
A month before, in Kane, Pennsylvania, a similar circle had burned, and the local paper, the Kane Republican, received an anonymous letter announcing the founding of the “Knights of the Burning Ring.” The letter stated: “Kane is selected as the starting point of a movement that will ring the earth with blazing justice to all. We are enemies of all clans or klans. We believe in liberty for every human being, black, white or yellow, regardless of race, religion or creed.” For reasons unknown, the “Burning Ring” name seems to have been subsequently dropped.
A short time after, a Klan parade in Steubenville, OH, a few hours away, led to a riot, during which “six or seven Klan cars were overturned by the Steubenville people. Flags were torn off the machines and their occupants were attacked with bricks and bottles and clubs and other flying objects.” The hillside dynamite blast and ceremony in Stuebenville followed the riot by about a month, announcing to western Ohio that there was more than just a raucous disruption of Klan demonstrations going on, but rather an organized effort.
A local dentist, Dr. W. F. McGuigan, claimed to be the founder of the Steubenville chapter of the Knights of the Flaming Circle and the Grand Supreme Monarch of the organization’s “central division,” stretching from Massachusetts to Illinois. A few days after the initial ceremony, McGuigan told reporters that “The Knights of the Flaming Circle is a non-sectarian society and its object is to combat religious, racial and political intolerance.” They wore no masks or hoods, but did wear white robes, embroidered with their official insignia: a red circle with the figure of the State of Liberty at the center.
But the very notion that there was an “organization” at all is disputed by one of the few oral histories that mentions the Flaming Circle. In an interview conducted in 1984 with Nicola Criscioni, of Youngstown, OH, Criscioni claims “there was no organization, it was the papers that dubbed them that, but it was no organization, just a thrown-together outfit\dots{}. What we did was we got a bunch of tires and put them around a circle and burned them, or bailed the hay and put them around a big circle and burned them. They burned the cross and we burned the circle. It was a hit-and-run outfit. There were no heads of anything\dots{} then when we heard that there was going to be a parade, by then we maybe put together a certain bunch and would try to disrupt it.”
This ambiguity – an organization with Klan-esque titles like Grand Supreme Monarch, or a rag-tag hit and run outfit with no meetings or dues – hints that this was a decentralized organization, one for which any group that wanted to take up the cause could do so on their own terms.
According to the 1923 A Dictionary of Secret and Other Societies, the Knights of the Flaming Circle “welcomes Catholics, Jews, and Negroes, but excludes Protestants. The members wear robes at the initiation ceremony, and each knight has a flaming circle over his heart, symbolic of the truth.” White protestants made up the base of the Klan, and were presumably excluded on that ground. According to the Klan, the Knights of the Flaming Circle were “a mob that proffered anarchism and sought to ruin the Republic.”
We have evidence that there were chapters of Knights of the Flaming Circle in Vermont, Pennsylvania, West Virginia, Ohio, Illinois, Iowa, and New Mexico. In the coming years, in various parts of the country, they used a diversity of rebellious tactics to confront the Klan. Many of those tactics are also practiced today by antifascists: pressure on meeting-halls to refuse to allow the Klan to meet there; publishing lists of Klan members, destroying the anonymity of the organization; organizing counter demonstrations to show mass opposition to the Klan and what it stood for; physically interrupting their parades and rallies; assaulting Klan members and damaging their property. In Youngstown, Criscioni recalls lining the road with roofing tacks before a Klan parade, popping their tires and getting some laughs at their expense.
They even, one could say, “trolled” the Klan. In addition to wearing illustrious garb of their own, sometimes white, sometimes red, they fought back with fire: in response to the Klan’s practice of burning crosses in front of the homes of immigrants and minorities, the Circlers’ would set tires alight on the yards of known Klansmen. It seems likely that McGuigan’s claim to be “Grand Supreme Monarch” was just another jab at the Invisible Empire’s ridiculous hierarchy.
But if indeed McGuigan was in some role of leadership in the midwest, he was certainly hard at work organizing. Numerous articles from the time repeat the Flaming Circle’s claims that they had organizers in every city in Ohio, and throughout Pennsylvania and West Virginia. And somehow, within a year, a chapter was formed in Williamson County, Illinois.
\Slash{}\Slash{}
Williamson County, known at the time as “Bloody Williamson,” had just been the site of one of the bloodiest labor battles in American history. The Herrin Massacre was the final major explosion of decades-long battles between coal-miners and mine-owners, and it had brought international infamy to the county. During the massacre, 19 scabs were killed by coal-miners. No one was convicted by a Williamson County jury.
A group of wealthy businessmen, interested in restoring the county’s reputation and affiliated with the Ku Klux Klan, hired a former Bureau of Investigations officer, S. Glenn Young, to lead their campaign. But the campaign wasn’t against the miner’s union. The Klan made the move characteristic of all fascist movements: it attempted to divide the working-class union movement along racial and national lines, targeting Italian-American immigrants.
Moreover, in a move that prefigured the War on Drugs, they targeted them not for political activity, but for violations of Prohibition. A “clean-up Williamson County” movement was underway, led by the Klan, which blamed the violence of a thirty year long class struggle between miners and mine-owners on immigrant communities in Herrin. S. Glenn Young’s raids targeted immigrants and anyone who opposed the Klan, ignoring the drinking of Protestants and flamboyantly ignoring the very laws he claimed to be enforcing. Eventually, Young even opened a “soft-drink parlour” of his own.
Prohibition, a constitutional amendment passed in 1919, didn’t go into effect until 1920 because it was well-known to be unenforceable by the American state-apparatus at the time. The Ku Klux Klan served as a para-military force, disproportionately targeting minority groups in the name of enforcing “law and order.” They defended their targeting of immigrants because of their unfamiliar culture and their supposed “predisposition to radicalism and anarchism”
And this might have gone well for them in Williamson County, IL, if they hadn’t encountered an unexpected adversary in the Knights of the Flaming Circle.
We don’t know how the Knights of the Flaming Circle made it to Williamson County. Perhaps word of the group travelled along lines of conspiratorial communication that the miner’s union had already established. If not, anyone reading \emph{The New York Times} would probably have encountered mention of the group in 1923. Perhaps Ora Thomas and E.E. Bowan, the rumored founders of the group in Herrin, decided they could take up the name without asking any permission from some Grand Supreme Monarch. That would have suited them.
The Flaming Circle in Williamson county was an alliance of miners, immigrants, bootleggers, and even law-enforcement who were none-too-happy to lock up their communities just because some new Prohibition law had been passed. The city of Herrin was almost completely integrated with the miner’s union, and what little wealth and safety miners knew at the time could be attributed only to the solidarity that union embodied. The union rightly saw the Klan as a threat, a ruling-class funded attempt to divide the strength of the working-class union along racial and ethnic lines, obscuring the actual conflict between the poor and the wealthy. For that reason, the UMWA issued a statement barring all Klan members from the union, and noting that the Klan’s efforts were aimed primarily at disrupting and dividing the power that working people had gained through Union organizing. It was later learned that S. Glenn Young, who was notoriously fast and loose with the facts about his own history, had worked as a scab-herder during the 1922 Railway Shopmen’s Strike – a feature of his past that he tried to conceal.
The Klan, under the leadership of S. Glenn Young, was so powerful in those years that it would have been very dangerous to make membership in the Circle known. Still, newspaper articles from the time attest that when the Klan would hold a parade, the next day you could be sure the Flaming Circle would, “neutralizing the effect of the Klan’s.”
But events did not remain at the level of competing parades for long. The first shooting occurred at an anti-Klan meeting, by pro-Klan police. While the first victim was recovering in the hospital, a constable, and member of the Klan, named Ceasar Cagle was shot and killed in retaliation. In response, the Klan laid siege to Herrin hospital, where Flaming Circle members were gathering with their wounded. The Klan fired into the hospital, and the Circlers’ that found themselves held up in there refusing to leave. The National Guard was called in. This was just the first round of what would be an all out war that would engulf Williamson and surrounding counties for the next year and a half.
The war came to an end when Ora Thomas entered a cigar shop at the Embassy Hotel in January of 1925, overhearing the familiar voice of S. Glenn Young threatening a young miner for spreading the story that Young had been a scab-herder prior to his becoming a Prohibition agent. Young had two men with him, and all three of them died in that cigar shop. As did Ora Thomas, the founder of Herrin’s Red Knights.
In the years after the Klan was defeated, many of these bootleggers would go on to engage in bloody battle with one another. Even the notorious Shelton and Birger gangs, who wreaked havoc throughout southern Illinois for the next decade, were momentarily allied in opposition to the Klan.
\Slash{}\Slash{}\Slash{}
The Knights of the Flaming Circle, whatever they were and whatever their shortcomings, are a sign that there has always been a counter-history to “America” on this continent, one full of people who, regardless of race, religion, or creed, have been quietly conspiring and jubilantly acting toward freedom for all. Today’s anti-fascists fall into a long tradition of those willing to risk everything to confront the racist forces who aim to re-create the “Founding Father’s” dream of a white ethno-state. That old American dream is recreated with new racist, nationalist lies in every generation that the wealthy feel their power threatened.
May we instead remember as our ancestors the brave people who fought to the death against the racist dreams of the wealthy, and against the stupid who accepted their lies.
% begin final page
\clearpage
% if we are on an odd page, add another one, otherwise when imposing
% the page would be odd on an even one.
\ifthispageodd{\strut\thispagestyle{empty}\clearpage}{}
% new page for the colophon
\thispagestyle{empty}
\begin{center}
The Anarchist Library
\smallskip
Anti-Copyright
\bigskip
\includegraphics[width=0.25\textwidth]{logo-en}
\bigskip
\end{center}
\strut
\vfill
\begin{center}
anonymous
The Next Eclipse
A Vision for Regional Autonomy
2018
\bigskip
Retrieved on July 25th, 2018 from https:\Slash{}\Slash{}thenexteclipse.wordpress.com\Slash{}
https:\Slash{}\Slash{}thenexteclipse.wordpress.com
\bigskip
\textbf{theanarchistlibrary.org}
\end{center}
% end final page with colophon
\end{document}
|
https://dlmf.nist.gov/9.8.E13.tex | nist.gov | CC-MAIN-2021-49 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2021-49/segments/1637964362969.51/warc/CC-MAIN-20211204094103-20211204124103-00639.warc.gz | 288,670,326 | 707 | \[M\left(x\right)N\left(x\right)\sin\left(\theta\left(x\right)-\phi\left(x\right%
)\right)=\pi^{-1},\] |
https://dlmf.nist.gov/4.21.E12.tex | nist.gov | CC-MAIN-2022-40 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2022-40/segments/1664030337244.17/warc/CC-MAIN-20221002021540-20221002051540-00224.warc.gz | 260,413,000 | 677 | \[{\sin}^{2}z+{\cos}^{2}z=1,\] |
https://mirror.las.iastate.edu/tex-archive/macros/latex/contrib/shipunov/doc/biokey-doc-en.tex | iastate.edu | CC-MAIN-2023-14 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2023-14/segments/1679296945289.9/warc/CC-MAIN-20230324211121-20230325001121-00270.warc.gz | 464,031,234 | 2,522 | \documentclass{article}
\usepackage[bookmarks=false,colorlinks=true,hypertexnames=false]{hyperref}
\usepackage{biokey}
\author{A.\,Shipunov\footnote{e-mail: \texttt{dactylorhiza at gmail}}}
\title{\texttt{biokey}, the package for precious and flexible identification keys}
\date{}
\begin{document}
\maketitle
This package can be used for creating biological identification keys. Different layouts are available.
\section{General usage}
This is the textual key:
\begin{verbatim}
1. It is an animal ... 2.
- It is a plant ... 3.
2. It is spiny ... Hedgehog
- It is not very spiny ... Swift
= It is not spiny at all ... Siskin
3(1). Lots of wood ... Spruce
- No wood ... Daisy
\end{verbatim}
The interpretation in suggested language is follows:
\bigskip\hrule
\begin{verbatim}
\begin{biokey}
\Z1. It is an animal \T 2.
\AN It is a plant \T 3.
\Z2. It is spiny \TT Hedgehog
\AN It is not very spiny \TT Swift
\AAN It is not spiny at all \TT Siskin
\ZZ3(1). Lots of wood \TT Spruce
\AN No wood \TT Daisy
\end{biokey}
\end{verbatim}
\hrule\bigskip
\begin{biokey}
\Z1. It is an animal \T 2.
\AN It is a plant \T 3.
\Z2. It is spiny \TT Hedgehog
\AN It is not very spiny \TT Swift
\AAN It is not spiny at all \TT Siskin
\ZZ3(1). Lots of wood \TT Spruce
\AN No wood \TT Daisy
\end{biokey}
\bigskip\hrule\bigskip
For aesthetics, I recommend that text before \verb|\T| should not end with dot (with the exception of abbreviations). \verb|\T| and \verb|\TT| are just the same thing, but second is better to designate names, and first is better for numbers. Sometimes, these two commands cannot format the paragraph without overfulls, in these (rare) cases I recommend the \verb|\TTTT| or ``old-style'' \verb|\TTT| which results are less precious but require less handwork.
\verb|\Z| and \verb|\ZZ| are different only for the second is used for backreferences, or for typical in serial zoological keys references for theses and antitheses. These two commands along with \verb|\AN|, \verb|\AAN|, and (not used in the example above) \verb|\AAAN| are used also for aesthetic hanging indentation.
Commands \verb|\N|, \verb|\NN| and \verb|\NNN| are for end-level objects (species, for example). They did not produce leading dots, but justify following object right, next with some space, or on next line, respectively.
Command \verb|\VT| is for hanging number references. There is also starred variant, \verb|\VT*|, where dot leader are also protruding outside right text margin.
By default, all \verb|\T|-like commands along with \verb|\N| and \verb|\NN| have the declaration \verb|\samepage| inside. One can redefine that via \verb|\SameDecl| hook. The most obvious redefinition is \verb|\relax|.
\verb|\SHRIFTZ| and \verb|\SHRIFTN| are two hooks which are defined by default as \verb|\relax| (do nothing), so one can redefine them to change the representation of these number and end-level objects, respectively. For example,
\verb|\renewcommand{\SGRIFTZ}{\textbf}|
will result in boldface theses numbers.
Several commands designed for commentaries after theses (or antitheses). \verb|\FK| put the text in footnote size, \verb|\KOM| imitate these, but without number, and \verb|\VPRAVO| aligned its contents to the right. \verb|\OTSTUP| is a hook for indentation of first two kinds of comments. By default it is 2\,em, but one can easily redefine it.
\section{``Automatic'' keys}
This sort of key can put numbers automatically. The example (needs two \LaTeX\ runs):
\bigskip\hrule
\begin{verbatim}
\begin{biokey}
\TE{ani} It is an animal \SS{spi}
\AN It is a plant \SS{pla}
\TE{spi} It is spiny \TT Hedgehog
\AN It is not very spiny \TT Swift
\AAN It is not spiny at all \TT Siskin
\SE{pla}{ani} Lots of wood \TT Spruce
\AN No wood \TT Daisy
\end{biokey}
\end{verbatim}
\hrule\bigskip
\begin{biokey}
\TE{ani} It is an animal \SS{spi}
\AN It is a plant \SS{pla}
\TE{spi} It is spiny \TT Hedgehog
\AN It is not very spiny \TT Swift
\AAN It is not spiny at all \TT Siskin
\SE{pla}{ani} Lots of wood \TT Spruce
\AN No wood \TT Daisy
\end{biokey}
\bigskip\hrule\bigskip
The biggest advantage of this type of key is that it is much easier to correct. It is possible to convert ``ordinary'' key to ``automatic'' key and further to HTML, with the help of \texttt{biokey2html} scripts (see documentation). See also how hyper-references working here.
\section{Indented keys}
And, finally, the different key layout---so-called indented keys:
\bigskip\hrule
\begin{verbatim}
\begin{biokey}
\Z A. It is an animal
\begin{LE}
\Z AA. It is more or less spiny
\begin{LE}[2]
\Z AAA. It is very spiny \TT Hedgehog
\Z BBB. It is not very spiny \TT Swift
\end{LE}
\Z BB. It is not spiny at all \TT Siskin
\end{LE}
\Z B. It is a plant
\begin{LE}
\Z CC. Lots of wood \TT Spruce
\Z DD. No wood \TT Daisy
\end{LE}
\end{biokey}
\end{verbatim}
\hrule\bigskip
\begin{biokey}
\Z A. It is an animal
\begin{LE}
\Z AA. It is more or less spiny
\begin{LE}[2]
\Z AAA. It is very spiny \TT Hedgehog
\Z BBB. It is not very spiny \TT Swift
\end{LE}
\Z BB. It is not spiny at all \TT Siskin
\end{LE}
\Z B. It is a plant
\begin{LE}
\Z CC. Lots of wood \TT Spruce
\Z DD. No wood \TT Daisy
\end{LE}
\end{biokey}
\bigskip\hrule\bigskip
It is more complicated then previous examples, so one may to consider \texttt{dichokey} package, but it is much less flexible.
\end{document} |
http://tph.tuwien.ac.at/~svozil/publ/2019-s.tex | tuwien.ac.at | CC-MAIN-2022-33 | text/x-tex | text/x-matlab | crawl-data/CC-MAIN-2022-33/segments/1659882572286.44/warc/CC-MAIN-20220816090541-20220816120541-00662.warc.gz | 48,940,819 | 14,917 | % This is samplepaper.tex, a sample chapter demonstrating the
% LLNCS macro package for Springer Computer Science proceedings;
% Version 2.20 of 2017/10/04
%
\documentclass[runningheads]{llncs}
%
\usepackage{graphicx}
% Used for displaying a sample figure. If possible, figure files should
% be included in EPS format.
%
% If you use the hyperref package, please uncomment the following line
% to display URLs in blue roman font according to Springer's eBook style:
% \renewcommand\UrlFont{\color{blue}\rmfamily}
\usepackage[dvipsnames]{xcolor}
%\usepackage{mathptmx}% http://ctan.org/pkg/mathptmx
\usepackage{amssymb,amsmath}
\usepackage{tikz}
\usetikzlibrary{calc}
\begin{document}
%
\title{Quantum advantage by relational queries about equivalence classes}
%
%\titlerunning{Abbreviated paper title}
% If the paper title is too long for the running head, you can set
% an abbreviated paper title here
%
\author{Karl Svozil\orcidID{0000-0001-6554-2802}}
%
\authorrunning{Karl Svozil}
% First names are abbreviated in the running head.
% If there are more than two authors, 'et al.' is used.
%
\institute{Institute for Theoretical Physics,
Vienna University of Technology,
Wiedner Hauptstrasse 8-10/136,
1040 Vienna, Austria \\
\email{[email protected]}\\
\url{http://tph.tuwien.ac.at/\textasciitilde{}svozil}
}
%
\maketitle % typeset the header of the contribution
%
\begin{abstract}
Relational quantum queries are sometimes capable to effectively decide between collections of mutually exclusive elementary cases without completely resolving and determining those individual instances. Thereby the set of mutually exclusive elementary cases is effectively partitioned into equivalence classes pertinent to the respective query. In the second part of the paper, we review recent progress in theoretical certifications (relative to the assumptions made) of quantum value indeterminacy as a means to build quantum oracles for randomness.
\keywords{quantum computation, partitioning of cases, quantum parallelism, hidden subgroup problem, quantum random number generators.}
\end{abstract}
%
%
%
%\documentclass[%
% reprint,
% twocolumn,
% %superscriptaddress,
% %groupedaddress,
% %unsortedaddress,
% %runinaddress,
% %frontmatterverbose,
% % preprint,
% showpacs,
% showkeys,
% preprintnumbers,
% %nofootinbib,
% %nobibnotes,
% %bibnotes,
% amsmath,amssymb,
% aps,
% % prl,
% pra,
% % prb,
% % rmp,
% %prstab,
% %prstper,
% longbibliography,
% %floatfix,
% %lengthcheck,%
% ]{revtex4-1}
%
%%\usepackage{cdmtcs-pdf}
%
%\usepackage[dvipsnames]{xcolor}
%
%\usepackage{mathptmx}% http://ctan.org/pkg/mathptmx
%
%\usepackage{amssymb,amsthm,amsmath}
%
%\usepackage{tikz}
%\usetikzlibrary{calc}
%
%\usepackage[breaklinks=true,colorlinks=true,anchorcolor=blue,citecolor=blue,filecolor=blue,menucolor=blue,pagecolor=blue,urlcolor=blue,linkcolor=blue]{hyperref}
%\usepackage{graphicx}% Include figure files
%\usepackage{url}
%
%\usepackage{xcolor}
%\usepackage{colortbl}
%
%
%\begin{document}
%
%\title{Quantum advantage by queries associated with equivalence classes rather than individual cases}
%
%\author{Karl Svozil}
%\email{[email protected]}
%\homepage{http://tph.tuwien.ac.at/~svozil}
%
%\affiliation{Institute for Theoretical Physics,
%Vienna University of Technology,
%Wiedner Hauptstrasse 8-10/136,
%1040 Vienna, Austria}
%
%
%
%\date{\today}
%
%\begin{abstract}
%Depending on the query quantum information theory is sometimes capable of effectively deciding between classes of mutually exclusive elementary cases without completely resolving and determining those individual instances forming the respective equivalence class. Thereby the set of mutually exclusive elementary cases is effectively partitioned into equivalence classes pertinent to the respective query. In the last part of the paper, we review recent progress in theoretical certifications (relative to the assumptions made) of quantum value indeterminacy as a means to build quantum oracles for randomness.
%\end{abstract}
%
%
%\maketitle
\section{Quantum (dis-)advantages}
Genuine quantum computations will be with us for a long time to come,
because the miniaturization of electronic circuits is pushing the processor physics into the coherent superposition/complementarity/entanglement/value-indefinite regime
(which has no sharp boundary just as the quantum--classical separation is fuzzy and means dependent).
Moore's law, insofar as it relates to classical ``paper and pencil''~\cite[p.~34]{Turing-Intelligent_Machinery} computation,
has reached its effective bottom ceiling approximately ten to five years ago; this is due to exhaustion of minimization
with respect to reasonably cooling, as well as by approaching the atomic scale.
Most recent performance increases are due to parallelization (if possible).
Alas, this upcoming kind of ``enforced'' quantum domain computing, imagined by Manin, Feynman, and others, still poses conceptual, theoretical and technological challenges.
Indeed, contemporary quantum information theory appears to be far from being fully comprehended, worked out and mature.
It is based on quantum mechanics, a theory whose semantics has been notoriously debated almost from its inception, while its syntax -- its formalism, and, in particular,
the rules of deriving predictions
-- are highly successful, accepted and relied upon.
Depending on temperament and metaphysical inclination, its proponents admit that nobody understands quantum mechanics~\cite{feynman-law,clauser-talkvie},
maintain that there is no issue whatsoever~\cite{Englert2013,fuchs-peres},
one should not bother too much~\cite{dirac,bell-a} about its meaning and foundations, and rather shut up and calculate~\cite{mermin-1989-shutup,mermin-2004-shutup}.
By transitivity or rather a reduction, quantum information theory inherits quantum mechanics'
apparent lack of consensus, as well as a certain degree of cognitive dissonance between applying the formalism while suffering from an absence of conceptual clarity~\cite{mermin-2019},
Strong hopes, claims and promises~\cite{Aaronson:2013:QCD:2487754,Dyakonov-2013,svozil-2016-quantum-hokus-pokus,Abbott-Calude-blog-2016-06-19,Dyakonov-2019,aaronson-Dyakonov} of quantum ``supremacy''~\cite{Wiesner-2017} are
accompanied by the pertinent question of what exactly, if at all, could make quantum information and computation outperform classical physical resources.
Surely many nonclassical quantum features present themselves as being useful or decisive in this respect; among them complementarity, coherence (aka parallelism), entanglement,
or value indeterminacy (aka contextuality).
But if and how exactly those features will contribute or enable future algorithmic advances still remains to be seen.
The situation is aggravated by the fact that, although the quantum formalism amounts to linear algebra and functional analysis,
some of its most important theorems are merely superficially absorbed by the community at large: take,
for example, Gleason's theorem~\cite{Gleason}, and extensions thereof~\cite{pitowsky:218,2015-AnalyticKS}.
Another example is Shor's factoring algorithm~\cite[Chapter~5]{nielsen-book10} whose presentations often suffer from the fact
that its full comprehension requires a nonsuperficial understanding of number theory,
analysis, as well as quantum mechanics; a condition seldom encountered in a single (wo)man.
Moreover, often one is confronted with confusing opinions: for instance, the claim that quantum computation is universal with respect to either unitary transformations
or first-order predicate calculus is sometimes confused with full Turing universality.
And the plethora of algorithms collected into a quantum algorithm zoo~\cite{jordan-zoo} is compounded by the quest of exactly why and how quantum algorithms may outperform classical ones.
Quantum advantages may be enumerated in four principal groups, reflecting potential non-classical quantum features:
\begin{itemize}
\item
quantum parallelism -- aka {\it coherent superposition} of classically mutually exclusive bit states,
associated with their simultaneous co-representation;
\item
quantum collectivism -- aka entanglement (involving possibly nonlocal correlations) in a multi-particle situation: information
is encoded only in {\it relational properties} among particles; individual particles have no definite property;
\item
quantum probabilities are vector-based (orthogonal projection operators), resulting in non-classical
expectation values rendering different (from classical value assignments) predictions;
\item
quantum complementarity: in general quantized systems forbid measurements of certain pairs of observables with arbitrary precision:
``you cannot eat a piece of the quantum cake \& have another one too;''
\item
quantum value indefiniteness: there cannot exist classical (true/false) value assignments on certain collections of (intertwining) quantum observables.
\end{itemize}
In what follows the first and the last feature -- parallelism and value indefiniteness -- will be discussed in more detail.
\section{Suitable partitioning of cases}
One quantum feature called ``quantum parallelism,''
which is often presented as a possible quantum resource not available classically,
is the capacity of $n$ quantum bits to encode $2^n$ classically
mutually exclusive distinct classical bit states at once, that is, simultaneously:
$
\vert \Psi \rangle = \sum_{i=0}^{2^n-1} \psi_i \vert i \rangle
$,
where the index $i$ runs through all $2^n$ possible combinations of $n$ classically mutually exclusive bit states $\{0,1\}$,
$\vert i \rangle $ are elements of an orthonormal basis in $2^n$-dimensional Hilbert space,
and $\psi_i$ represent probability amplitudes whose absolute squares sum up to $1$.
Quantum parallelism, often presented rather mystically,
may formally come about rather trivially: the alleged simultaneous quantum co-existence of classically mutually exclusive states is like
pretending that a vector in the plane may simultaneously point in both directions of the plane~\cite{Dyakonov-2019};
a sort of confusion between a vector and its components.
This seemingly absurd co-representability of contradicting classical states was the motivation for Schr\"odinger's cat paradox~\cite{schrodinger}.
Note also that, in order to maintain coherence throughout a quantum computation,
a {\em de facto} exponential overhead of ``physical stuff'' might be required.
This could well compensate or even outweigh the advantage; that is, the exponential simultaneous
co-representability of (coherent superpositions of) classical mutually exclusive cases of a computation.
The state
$
\vert \Psi \rangle
$
``carrying'' all these classical cases in parallel is not directly accessible or ``readable'' by any physical operational means.
And yet, it can be argued that its simultaneous representation of classically exclusive cases can be put to practical use indirectly if certain criteria are met:
\begin{itemize}
\item
first of all, there needs to be a quantum physical realizable grouping or partitioning of the
classical cases, associated with a particular query of interest; and
\item
second, this aforementioned query needs to be realizable by a quantum observable.
\end{itemize}
In that way, one may attain knowledge of a particular feature one is interested in; but,
unlike classical computation, (all) other features remain totally unspecified and unknown.
There is no ``free quantum lunch'' here, as a total specification of all observables would
require the same amount of quantum queries as with classical resources.
And yet, through coherent superposition (aka interference)
one might be able to ``scramble'' or re-encode the signal
in such a way that some features can be read off of it very efficiently --
indeed, with an exponential (in the number of bits) advantage over classical computations
which lack this form of rescrambling and re-encoding (through coherent superpositions).
However, it remains to be seen whether, say, classical analog computation with waveforms,
can produce similar advantages.
For the sake of a demonstration, the Deutsch algorithm~\cite[Chapter~2]{mermin-07} serves as a Rosetta stone of sorts
for a better understanding of the formalism and respective machinery at work in such cases.
It is based on the four possible binary functions $f_0, \ldots , f_3$ of a single bit $x \in \{0,1\}$:
the two constant functions $f_0(x)=1-f_3(x)=0$,
as well as the two nonconstant functions: the identity $f_1(x)=x$ and the not $f_3(x) = (x+1) \text{ mod } 2$, respectively.
Suppose that one is presented with a black box including in- and output interfaces,
realizing one of these classical functional cases, but it is unknown which one.
Suppose further that one is only interested in their parity; that is, whether or not the encoded black box function is a constant function of the argument.
Thereby, with respect to the corresponding equivalence relation of being ``(not) constant in the arguement''
the set of functions
$\{f_0, \ldots , f_3\}$
is partitioned into
$\{\{f_0,f_3\},\{f_1,f_2\}\}$.
A different way of looking at this relational encoding
is in terms of zero-knowledge proofs: thereby
nature is in the role of an agent
which is queried about a property/proposition, and issues a correct answer
without disclosing
all the details and the fine structure of the way this result is obtained.
Classically the only way of figuring this (``constant or not'') out
is to input the two bit-state cases, corresponding to two separate queries.
If the black box admits quantum states,
then the Deutsch algorithm presents a way to obtain the answer (``constant or not'')
directly in one query.
In order to do this one has to perform
three successive steps~\cite{svozil-2005-ko,2007-tkadlec-svozil-springer}:
\begin{itemize}
\item
first one needs to scramble the classical bits into a coherent superposition of the two classical bit states.
This can be done by a Hadamard transformation, or a quantum Fourier transformation;
\item
second, one has to transform the coherent superposition according to the binary function which is encoded in the box.
This has to be done while maintaining reversibility; that is, by taking ``enough'' auxiliary bits
to maintain bijectivity/permutation; even if the encoding function is many-to-one (eg, constant).
\item
third, one needs to unscramble this resulting state to produce a classical output signal which indicates the result of the query.
As all involved transformations need to be unitary and thus reversible
the latter task can again be achieved by an (inverse) Hadamard transformation, or an (inverse)
quantum Fourier transformation.
\end{itemize}
This structural pattern repeats itself in many quantum algorithms suggested so far.
It can be subsumed into the three- or rather fivefold framework:
``prepare a classical state; then
spread (the classical state into a coherent superposition of classical states)
---
transform (according to some functional form pertinent to the problem or query considered)
---
fold (into partitions of classical states which can be accessed via quantum queries and yield classical signals);
then detect that classical signal.''
Besides the (classical) pre- and post-processing of the data,
Shor's algorithm~\cite[Chapter~5]{nielsen-book10}
has a very similar structure in its quantum (order-finding) core:
It creates a superposition of classically mutually exclusive states $i$
{\it via} a generalized Hadamard transformation.
It then processes this coherent superposition of all $i$ by computing $x^i \text{ mod } n$,
for some (externally given) $x$ and $n$, the number to be factored.
And it finally ``folds back'' the expanded, processed state by applying an inverse quantum Fourier transform,
which then (with high probability) conveniently yields a piece of classical information (in one register) about the period or order; that is,
the least positive integer $k$ such that $x^k =1 (\text{mod } n)$ holds.
As far as Shor's factoring algorithm is concerned, everything else is computed classically.
Partitioning of states may be related to the hidden subgroup problem~\cite[Section~5.4.3]{nielsen-book10}:
thereby, a function maps from some group to a finite set and is
promised to be constant on cosets of the hidden subgroup.
If those cosets are identified with the transformations ``filtering'' and ``singling out''~\cite{DonSvo01,svozil-2002-statepart-prl,svozil-2003-garda,svozil-2005-ko}
the elements of a partition of states associated with the particular problem,
finding the hidden subgroup may yield an effective way of solving this problem (encoded by the state partition).
Whether or not this strategy to find ``quantum oracles'' corresponding to arbitrary partitions
of classical cases is quantum feasible remains to be seen. There appears to be an {\it ad hoc} counterexample,
as there is no speedup for generalized parity~\cite{Farhi-98}; at least with the means considered.
\section{Quantum oracles for random numbers}
Let me, for the sake of presenting another quantum resource mentioned in the beginning, contemplate one example for which, relative to the assumptions made,
quantum ``computation'' outperforms
classical recursion theory: the generation of (allegedly) irreducibly indeterministic numbers; or sequences thereof~\cite{2014-nobit}.
A recent extension of the
Kochen-Specker theorem~\cite{2012-incomput-proofsCJ,PhysRevA.89.032109,2015-AnalyticKS}
allowing partial value assignments suggests the following algorithm:
Suppose one prepares a quantized system capable of three or more mutually exclusive outcomes,
formalized by Hilbert spaces of dimension three and higher, in an arbitrary pure state.
Then,
relative to certain reasonable assumptions (for value assignments and noncontextuality),
this system cannot be in any defined, determined property in any other direction of Hilbert state not
collinear or orthogonal to the vector associated with the prepared state~\cite{pitowsky:218,hru-pit-2003}:
the associated classical truth assignment cannot be a total function.
The proof by contradiction is constructive and involves a configuration of intertwining quantum contexts (aka orthonormal bases).
Figure~\ref{2019-s} depicts a particular configuration of quantum observables, as well as a particular one of their faithful orthogonal representations~\cite{lovasz-79}
in which the prepared and measured states are an angle
$
\text{arccos } \langle {\bf a}\vert {\bf b} \rangle =
\text{arccos} \left[
\begin{pmatrix}
1,0,0
\end{pmatrix} \frac{1}{2}
\begin{pmatrix}
\sqrt{2},1,1
\end{pmatrix}^\intercal
\right] = \frac{\pi}{4}$ apart~\cite[Table~1]{2015-AnalyticKS}.
\newif\iflabel \labeltrue
\begin{figure}[h]
\begin{center}
\begin{tikzpicture} [scale=0.3]
\labeltrue
\tikzstyle{every path}=[line width=1.5pt]
%\tikzstyle{c1}=[circle,fill,inner sep=4]
%\tikzstyle{c2}=[circle,fill,inner sep=2.7]
%\tikzstyle{c3}=[circle,fill,inner sep=1]
\tikzstyle{c1}=[circle,fill,inner sep=3]
\tikzstyle{c2}=[circle,fill,inner sep=2]
\tikzstyle{c3}=[circle,fill,inner sep=1]
\tikzstyle{s1}=[color=red,rectangle,minimum size=8,inner sep=6]
\tikzstyle{d1}=[draw=none,circle,minimum size=4]
\tikzstyle{e1}=[color=gray,rectangle,minimum size=8,inner sep=6]
% Define positions of all observables
\draw [color=orange] (4,0) coordinate[c1,fill,label=225:{\color{black} $\vert {\bf b} \rangle $}] (b) -- (13,0) coordinate[c1,fill,label={[label distance=-1]270:{\iflabel \footnotesize \color{black} $2$\fi}}] (2) -- (22,0) coordinate[c1,fill,label={[label distance=-1]315:{\iflabel \footnotesize \color{black} $3$\fi}}] (3);
\draw [color=blue] (3) -- (26,12) coordinate[c1,fill,pos=0.8,label={[label distance=-1]0:{\iflabel \footnotesize \color{black} ${21}$\fi}}] (21) coordinate[c1,fill,label={[label distance=-3]0:{\iflabel \footnotesize \color{black} ${23}$\fi}}] (23);
\draw [color=green] (23) -- (22,18.5) coordinate[c1,fill,pos=0.4,label={[label distance=-1]0:{\iflabel \footnotesize \color{black} ${29}$\fi}}] (29) coordinate[c1,fill,label={[label distance=-1]45:{\iflabel \footnotesize \color{black} $5$\fi}}] (5);
\draw [color=magenta] (5)-- (13,18.5)coordinate[c1,fill,label=90:{\color{black} $\vert {\bf a} \rangle $}] (a) -- (4,18.5) coordinate[c1,fill,label={[label distance=-1]135:{\iflabel \footnotesize \color{black} $4$\fi}}] (4);
\draw [color=CadetBlue] (4) -- (0,12) coordinate[c1,fill,pos=0.6,label={[label distance=-1]180:{\iflabel \footnotesize \color{black} ${10}$\fi}}] (10) coordinate[c1,fill,label={[label distance=-1]180:{\iflabel \footnotesize \color{black} $7$\fi}}] (7);
\draw [color=brown] (7) -- (b) coordinate[c1,fill,pos=0.2,label={[label distance=-1]180:{\iflabel \footnotesize \color{black} $6$\fi}}] (6);
\draw [color=gray] (a) -- (2) coordinate[c1,fill,pos=0.52,label={[label distance=-1, yshift=2]357.5:{\iflabel \footnotesize \color{black} $1$\fi}}] (1);
\draw [color=violet] (5) -- (22,6) coordinate[c1,fill,pos=0.4,label={[label distance=-1]0:{\iflabel \footnotesize \color{black} ${11}$\fi}}] (11) coordinate[c1,fill,label={[label distance=-1]0:{\iflabel \footnotesize \color{black} $9$\fi}}] (9);
\draw [color=Apricot] (9) -- (b) coordinate[c1,fill,pos=0.3,label={[label distance=-1]280:{\iflabel \footnotesize \color{black} $8$\fi}}] (8);
\draw [color=TealBlue] (4) -- (4,6) coordinate[c1,fill,pos=0.4,label={[label distance=-1]180:{\iflabel \footnotesize \color{black} ${28}$\fi}}] (28) coordinate[c1,fill,label={[label distance=-3]180:{\iflabel \footnotesize \color{black} ${22}$\fi}}] (22);
\draw [color=YellowGreen] (22) -- (3) coordinate[c1,fill,pos=0.2,label={[label distance=-1]260:{\iflabel \footnotesize \color{black} ${19}$\fi}}] (19);
\coordinate (25) at ([xshift=-4cm]1);
\coordinate (27) at ([xshift=4cm]1);
\draw [color=MidnightBlue] (22) -- (25) coordinate[c1,fill,pos=0.5,label={[label distance=-1]180:{\iflabel \footnotesize \color{black} ${24}$\fi}}] (24) coordinate[c1,fill,label={[label distance=-1]180:{\iflabel \footnotesize \color{black} ${25}$\fi}}] (25);
\draw [color=Mulberry] (25) -- (9) coordinate[c1,fill,pos=0.8,label={[label distance=-1]90:{\iflabel \footnotesize \color{black} ${35}$\fi}}] (35);
\draw [color=BrickRed] (7) -- (27) coordinate[c1,fill,pos=0.5,label={[label distance=-3]90:{\iflabel \footnotesize \color{black} ${34}$\fi}}] (34) coordinate[c1,fill,label={[label distance=-1]90:{\iflabel \footnotesize \color{black} ${27}$\fi}}] (27);
\draw [color=Emerald] (27) -- (23) coordinate[c1,fill,pos=0.25,label={[label distance=-1]320:{\iflabel \footnotesize \color{black} ${26}$\fi}}] (26);
\draw [color=BlueGreen] (10) -- (15.5,17.5) coordinate[c1,fill,pos=0.5,label={[label distance=-1]90:{\iflabel \footnotesize \color{black} ${12}$\fi}}] (12) coordinate[c1,fill,label={[label distance=-1,xshift=5]270:{\iflabel \footnotesize \color{black} ${13}$\fi}}] (13);
\draw [color=Tan] (13) -- (29) coordinate[c1,fill,pos=0.4,label={[label distance=-1]90:{\iflabel \footnotesize \color{black} ${31}$\fi}}] (31);
\draw [color=RawSienna] (28) -- (10.5,15) coordinate[c1,fill,pos=0.5,label={[label distance=-3, yshift=-3]160:{\iflabel \footnotesize \color{black} ${30}$\fi}}] (30) coordinate[c1,fill,label={[label distance=-5]45:{\iflabel \footnotesize \color{black} ${15}$\fi}}] (15);
\draw [color=SpringGreen] (15) -- (11) coordinate[c1,fill,pos=0.6,label={[label distance=-1]90:{\iflabel \footnotesize \color{black} ${14}$\fi}}] (14);
\draw [color=Salmon] (15) -- (1) coordinate[c1,fill,pos=0.2,label={[label distance=-1, yshift=2]180:{\iflabel \footnotesize \color{black} ${17}$\fi}}] (17);
\draw [color=Fuchsia] (1)-- (13) coordinate[c1,fill,pos=0.3,label={[label distance=-1]0:{\iflabel \footnotesize \color{black} ${16}$\fi}}] (16);
\draw [color=CornflowerBlue] (19) -- (16) coordinate[c1,fill,pos=0.3,label={[label distance=-1]180:{\iflabel \footnotesize \color{black} ${18}$\fi}}] (18);
\draw [color=pink] (16) -- (8) coordinate[c1,fill,pos=0.7,label={[label distance=-1]180:{\iflabel \footnotesize \color{black} ${32}$\fi}}] (32);
\draw [color=PineGreen] (6) -- (17) coordinate[c1,fill,pos=0.7,label={[label distance=-1, yshift=2]180:{\iflabel \footnotesize \color{black} ${33}$\fi}}] (33);
\draw [color=DarkOrchid] (17) -- (21) coordinate[c1,fill,pos=0.4,label={[label distance=-3]20:{\iflabel \footnotesize \color{black} ${20}$\fi}}] (20);
\draw [color=black] (25) -- (1) -- (27);
\draw (a) coordinate[c2,fill=gray];
\draw (b) coordinate[c2,fill=brown];
\draw (b) coordinate[c3,fill=Apricot];
\draw (4) coordinate[c2,fill=CadetBlue];
\draw (4) coordinate[c3,fill=TealBlue];
\draw (5) coordinate[c2,fill=magenta];
\draw (5) coordinate[c3,fill=violet];
\draw (7) coordinate[c2,BrickRed];
\draw (7) coordinate[c3,fill=brown];
\draw (23) coordinate[c2,fill=green];
\draw (23) coordinate[c3,fill=Emerald];
\draw (29) coordinate[c2,fill=Tan];
\draw (21) coordinate[c2,fill=DarkOrchid];
\draw (3) coordinate[c2,fill=blue];
\draw (3) coordinate[c3,fill=YellowGreen];
\draw (11) coordinate[c2,fill=SpringGreen];
\draw (9) coordinate[c2,fill=Apricot];
\draw (9) coordinate[c3,fill=Mulberry];
\draw (27) coordinate[c2,fill=Emerald];
\draw (27) coordinate[c3,fill=black];
\draw (13) coordinate[c2,fill=Tan];
\draw (13) coordinate[c3,fill=Fuchsia];
\draw (7) coordinate[c2,BrickRed];
\draw (7) coordinate[c3,fill=brown];
\draw (8) coordinate[c2,fill=pink];
\draw (19) coordinate[c2,fill=CornflowerBlue];
\draw (16) coordinate[c2,fill=CornflowerBlue];
\draw (16) coordinate[c3,fill=pink];
\draw (1) coordinate[c2,fill=Salmon];
\draw (1) coordinate[c3,fill=Fuchsia];
\draw (17) coordinate[c2,fill=PineGreen];
\draw (17) coordinate[c3,fill=DarkOrchid];
\draw (15) coordinate[c2,fill=SpringGreen];
\draw (15) coordinate[c3,fill=Salmon];
\draw (25) coordinate[c2,fill=Mulberry];
\draw (25) coordinate[c3,fill=black];
\draw (22) coordinate[c2,fill=YellowGreen];
\draw (22) coordinate[c3,fill=MidnightBlue];
\draw (28) coordinate[c2,fill=RawSienna];
\draw (10) coordinate[c2,fill=BlueGreen];
\draw (6) coordinate[c2,fill=PineGreen];
\draw (2) coordinate[c2,fill=gray];
\end{tikzpicture}
\end{center}
\caption{Greechie orthogonality diagram of a logic~\cite[Fig.~2, p.~102201-8]{2015-AnalyticKS}
realizable in $\mathbb{R}^3$
with the true--implies--value indefiniteness (neither true nor false) property on the atoms $\vert {\bf a} \rangle $ and $\vert {\bf b} \rangle $,
respectively.
The 8 classical value assignments require $\vert {\bf a} \rangle $ to be false.
Therefore, if one prepares the quantized system in state $\vert {\bf a} \rangle $,
the second state $\vert {\bf b} \rangle $ cannot have any consistent classical value assignment -- it must be value indeterminate/indefinite.
}
\label{2019-s}
\end{figure}
Whenever one approaches quantum indeterminacy from the empirical, inductive side,
one has to recognize that, without {\it a priori} assumptions, formal proofs of (in)computability,
and more so algorithmic incompressibility (aka randomness~\cite{ml:70})
are blocked by reduction to the halting problems and similar~\cite{svozil-2016-pu-book}.
The best one can do is to run
tests, such as Borel normality and other criteria, on finite sequences of random number generators~\cite{PhysRevA.82.022102,Abbott_2019}
which turn out to be consistent with the aforementioned value indefiniteness and
quantum indeterminacy.
\section{Afterthoughts on assumptions}
Let me, as a substitute for a final discussion, mention a {\it caveat}: as all results and certifications hold true relative to the assumptions made,
different assumptions and axioms may change the perceptual framework and results entirely.
One might, for instance, disapprove of the physical existence of states and observables beyond a single vector or context~\cite{svozil-2018-whycontexts,Auffeves-Grangier-2018}.
Thereby, the problem of measuring other contexts would be relegated to the general measurement problem of coherent superpositions~\cite{london-Bauer-1983}.
In this case, as von Neumann, Wigner and Everett have pointed out, by ``nesting'' the measurement objects and the measurement apparatus in larger and larger systems~\cite{everett-collw},
the assumption of the universal validity of the quantum state evolution would
result in mere epistemic randomness; very much like the randomness encountered in, and the second law of~\cite{Myrvold2011237}, classical statistical physics.
From that perspective, quantum randomness might turn out to be valid ``for all practical purposes''~\cite{bell-a} through interaction with a huge number of (uncontrollable) degrees of freedom
in the environment of a quantized system in a coherent state, ``squeezing'' out this coherence very much like a balloon losing gas~\cite{Zyczkowski-balloon}.
\section*{Acknowledgments}
I kindly acknowledge enlightening discussions with Cristian Calude about many of the subjects mentioned.
All misconceptions and errors are mine.
I declare that I have no conflict of interest.
%\begin{acknowledgments}
%I kindly acknowledge enlightening discussions with Cristian Calude on many of the subjects mentioned.
%All misconceptions and errors are mine.
%\end{acknowledgments}
%
% ---- Bibliography ----
%
% BibTeX users should specify bibliography style 'splncs04'.
% References will then be sorted and formatted in the correct style.
%
% \bibliographystyle{splncs04}
% \bibliography{svozil}
%
\begin{thebibliography}{10}
\providecommand{\url}[1]{\texttt{#1}}
\providecommand{\urlprefix}{URL }
\providecommand{\doi}[1]{https://doi.org/#1}
\bibitem{aaronson-Dyakonov}
Aaronson, S.: Happy new year! {M}y response to {M}. {I}. {D}yakonov (1999),
\url{http://www.scottaaronson.com/writings/bignumbers.html}, accessed March
16th, 2017
\bibitem{Aaronson:2013:QCD:2487754}
Aaronson, S.: Quantum Computing Since {D}emocritus. Cambridge University Press,
New York, NY, USA (2013). \doi{10.1017/CBO9780511979309},
\url{https://doi.org/10.1017/CBO9780511979309}
\bibitem{Abbott-Calude-blog-2016-06-19}
Abbott, A.A., Calude, C.S.: Limits of quantum computing: A sceptic's view,
\url{http://www.quantumforquants.org/quantum-computing/limits-of-quantum-computing/},
jun 19th, 2016, accessed June 19th, 2016
\bibitem{2012-incomput-proofsCJ}
Abbott, A.A., Calude, C.S., Conder, J., Svozil, K.: Strong {K}ochen-{S}pecker
theorem and incomputability of quantum randomness. Physical Review A
\textbf{86}, 062109 (Dec 2012). \doi{10.1103/PhysRevA.86.062109},
\url{https://doi.org/10.1103/PhysRevA.86.062109}
\bibitem{Abbott_2019}
Abbott, A.A., Calude, C.S., Dinneen, M.J., Huang, N.: Experimentally probing
the algorithmic randomness and incomputability of quantum randomness. Physica
Scripta \textbf{94}(4), 045103 (feb 2019). \doi{10.1088/1402-4896/aaf36a},
\url{https://doi.org/10.1088/1402-4896/aaf36a}
\bibitem{PhysRevA.89.032109}
Abbott, A.A., Calude, C.S., Svozil, K.: Value-indefinite observables are almost
everywhere. Physical Review A \textbf{89}, 032109 (Mar 2014).
\doi{10.1103/PhysRevA.89.032109},
\url{https://doi.org/10.1103/PhysRevA.89.032109}
\bibitem{2014-nobit}
Abbott, A.A., Calude, C.S., Svozil, K.: On the unpredictability of individual
quantum measurement outcomes. In: Beklemishev, L.D., Blass, A., Dershowitz,
N., Finkbeiner, B., Schulte, W. (eds.) Fields of Logic and Computation II,
Lecture Notes in Computer Science, vol.~9300, pp. 69--86. Springer, Cham,
Heidelberg, New York, Dordrecht, London (2015).
\doi{10.1007/978-3-319-23534-9\_4},
\url{https://doi.org/10.1007/978-3-319-23534-9\_4}
\bibitem{2015-AnalyticKS}
Abbott, A.A., Calude, C.S., Svozil, K.: A variant of the {K}ochen-{S}pecker
theorem localising value indefiniteness. Journal of Mathematical Physics
\textbf{56}(10), 102201 (2015). \doi{10.1063/1.4931658},
\url{https://doi.org/10.1063/1.4931658}
\bibitem{Auffeves-Grangier-2018}
Auff\'eves, A., Grangier, P.: Extracontextuality and extravalence in quantum
mechanics. Philosophical Transactions of the Royal Society {A}: Mathematical,
Physical and Engineering Sciences \textbf{376}(2123), 20170311 (2018).
\doi{10.1098/rsta.2017.0311}, \url{https://doi.org/10.1098/rsta.2017.0311}
\bibitem{bell-a}
Bell, J.S.: Against `measurement'. Physics World \textbf{3}, 33--41 (1990).
\doi{10.1088/2058-7058/3/8/26},
\url{https://doi.org/10.1088/2058-7058/3/8/26}
\bibitem{Zyczkowski-balloon}
Bengtsson, I., Zyczkowski, K.: Geometry of quantum states - addendum (2018),
\url{http://chaos.if.uj.edu.pl/\textasciitilde{}karol/decoh18.pdf}, accessed
on March 24th, 2019
\bibitem{PhysRevA.82.022102}
Calude, C.S., Dinneen, M.J., Dumitrescu, M., Svozil, K.: Experimental evidence
of quantum randomness incomputability. Phys. Rev. A \textbf{82}(2), 022102
(Aug 2010). \doi{10.1103/PhysRevA.82.022102},
\url{https://doi.org/10.1103/PhysRevA.82.022102}
\bibitem{clauser-talkvie}
Clauser, J.: Early history of {B}ell's theorem. In: Bertlmann, R., Zeilinger,
A. (eds.) Quantum (Un)speakables: {F}rom {B}ell to Quantum Information, pp.
61--96. Springer, Berlin (2002). \doi{10.1007/978-3-662-05032-3\_6},
\url{https://doi.org/10.1007/978-3-662-05032-3\_6}
\bibitem{dirac}
Dirac, P.A.M.: The Principles of Quantum Mechanics. Oxford University Press,
Oxford, fourth edn. (1930, 1958)
\bibitem{DonSvo01}
Donath, N., Svozil, K.: Finding a state among a complete set of orthogonal
ones. Physical Review A \textbf{65}, 044302 (2002).
\doi{10.1103/PhysRevA.65.044302},
\url{https://doi.org/10.1103/PhysRevA.65.044302}
\bibitem{Dyakonov-2013}
Dyakonov, M.I.: State of the Art and Prospects for Quantum Computing, chap.~20,
pp. 266--285. John Wiley \& Sons, Ltd (2013).
\doi{10.1002/9781118678107.ch20},
\url{https://doi.org/10.1002/9781118678107.ch20}
\bibitem{Dyakonov-2019}
Dyakonov, M.I.: When will we have a quantum computer? (2019),
\url{https://arxiv.org/abs/1903.10760}, talk at the conference ``Future
trends in microelectronics'', Sardinia (2018). To be published in a special
issue of Solid State Electronics
\bibitem{Englert2013}
Englert, B.G.: On quantum theory. The European Physical Journal D
\textbf{67}(11), 1--16 (2013). \doi{10.1140/epjd/e2013-40486-5},
\url{https://doi.org/10.1140/epjd/e2013-40486-5}
\bibitem{everett-collw}
{Everett III}, H.: The {E}verett interpretation of quantum mechanics: Collected
works 1955-1980 with commentary. Princeton University Press, Princeton, NJ
(2012), \url{http://press.princeton.edu/titles/9770.html}
\bibitem{Farhi-98}
Farhi, E., Goldstone, J., Gutmann, S., Sipser, M.: Limit on the speed of
quantum computation in determining parity. Physical Review Letters
\textbf{81}, 5442--5444 (1998). \doi{10.1103/PhysRevLett.81.5442},
\url{https://doi.org/10.1103/PhysRevLett.81.5442}
\bibitem{feynman-law}
Feynman, R.P.: The Character of Physical Law. MIT Press, Cambridge, MA (1965)
\bibitem{fuchs-peres}
Fuchs, C.A., Peres, A.: Quantum theory needs no `interpretation'. Physics Today
\textbf{53}(4), 70--71 (March 2000). \doi{10.1063/1.883004},
\url{https://doi.org/10.1063/1.883004}, further discussions of and reactions
to the article can be found in the September issue of Physics Today, {\it
53}, 11-14 (2000)
\bibitem{Gleason}
Gleason, A.M.: Measures on the closed subspaces of a {H}ilbert space. Journal
of Mathematics and Mechanics (now Indiana University Mathematics Journal)
\textbf{6}(4), 885--893 (1957). \doi{10.1512/iumj.1957.6.56050},
\url{https://doi.org/10.1512/iumj.1957.6.56050}
\bibitem{hru-pit-2003}
Hrushovski, E., Pitowsky, I.: Generalizations of {K}ochen and {S}pecker's
theorem and the effectiveness of {G}leason's theorem. Studies in History and
Philosophy of Science Part B: Studies in History and Philosophy of Modern
Physics \textbf{35}(2), 177--194 (2004). \doi{10.1016/j.shpsb.2003.10.002},
\url{https://doi.org/10.1016/j.shpsb.2003.10.002}
\bibitem{jordan-zoo}
Jordan, S.: Quantum algorithm zoo (2011-2019),
\url{http://quantumalgorithmzoo.org/}, accessed March 26, 2019
\bibitem{london-Bauer-1939}
London, F., Bauer, E.: La theorie de l'observation en m\'ecanique quantique;
{N}o.~775 of Actualit\'es scientifiques et industrielles: Expos\'es de
physique g\'en\'erale, publi\'es sous la direction de {P}aul {L}angevin.
Hermann, Paris (1939), english translation in~\cite{london-Bauer-1983}
\bibitem{london-Bauer-1983}
London, F., Bauer, E.: The theory of observation in quantum mechanics. In:
Quantum Theory and Measurement, pp. 217--259. Princeton University Press,
Princeton, NJ (1983), consolidated translation of French
original~\cite{london-Bauer-1939}
\bibitem{lovasz-79}
Lov\'asz, L.: On the {S}hannon capacity of a graph. IEEE Transactions on
Information Theory \textbf{25}(1), ~1--7 (January 1979).
\doi{10.1109/TIT.1979.1055985}
\bibitem{ml:70}
Martin-L{\"{o}}f, P.: On the notion of randomness. In: Kino, A., Myhill, J.,
Vesley, R.E. (eds.) Intuitionism and Proof Theory, p.~73. North-Holland,
Amsterdam and London (1970)
\bibitem{mermin-2004-shutup}
Mermin, D.N.: Could {F}eynman have said this? Physics Today \textbf{57},
10--11 (1989). \doi{10.1063/1.1768652},
\url{https://doi.org/10.1063/1.1768652}
\bibitem{mermin-1989-shutup}
Mermin, D.N.: What's wrong with this pillow? Physics Today \textbf{42}, 9--11
(1989). \doi{10.1063/1.2810963}, \url{https://doi.org/10.1063/1.2810963}
\bibitem{mermin-07}
Mermin, D.N.: Quantum Computer Science. Cambridge University Press, Cambridge
(2007). \doi{10.1017/CBO9780511813870},
\url{https://doi.org/10.1017/CBO9780511813870}
\bibitem{mermin-2019}
Mermin, D.N.: Making better sense of quantum mechanics (2019),
\url{https://arxiv.org/abs/1809.01639}
\bibitem{Myrvold2011237}
Myrvold, W.C.: Statistical mechanics and thermodynamics: A {M}axwellian view.
Studies in History and Philosophy of Science Part B: Studies in History and
Philosophy of Modern Physics \textbf{42}(4), 237--243 (2011).
\doi{10.1016/j.shpsb.2011.07.001},
\url{https://doi.org/10.1016/j.shpsb.2011.07.001}
\bibitem{nielsen-book10}
Nielsen, M.A., Chuang, I.L.: Quantum Computation and Quantum Information.
Cambridge University Press, Cambridge (2010). \doi{10.1017/CBO9780511976667},
\url{https://doi.org/10.1017/CBO9780511976667}, 10th Anniversary Edition
\bibitem{pitowsky:218}
Pitowsky, I.: Infinite and finite {G}leason's theorems and the logic of
indeterminacy. Journal of Mathematical Physics \textbf{39}(1), 218--228
(1998). \doi{10.1063/1.532334}, \url{https://doi.org/10.1063/1.532334}
\bibitem{schrodinger}
Schr{\"{o}}dinger, E.: {D}ie gegenw\"artige {S}ituation in der
{Q}uantenmechanik. Naturwissenschaften \textbf{23}, 807--812, 823--828,
844--849 (1935). \doi{10.1007/BF01491891, 10.1007/BF01491914,
10.1007/BF01491987}, \url{https://doi.org/10.1007/BF01491891,
https://doi.org/10.1007/BF01491914, https://doi.org/10.1007/BF01491987}
\bibitem{svozil-2002-statepart-prl}
Svozil, K.: Quantum information in base $n$ defined by state partitions.
Physical Review A \textbf{66}, 044306 (2002).
\doi{10.1103/PhysRevA.66.044306},
\url{https://doi.org/10.1103/PhysRevA.66.044306}
\bibitem{svozil-2003-garda}
Svozil, K.: Quantum information via state partitions and the context
translation principle. Journal of Modern Optics \textbf{51}, 811--819
(2004). \doi{10.1080/09500340410001664179},
\url{https://doi.org/10.1080/09500340410001664179}
\bibitem{svozil-2005-ko}
Svozil, K.: Characterization of quantum computable decision problems by state
discrimination. In: Adenier, G., Khrennikov, A., Nieuwenhuizen, T.M. (eds.)
Quantum Theory: Reconsideration of Foundations---3. vol.~810, pp. 271--279.
American Institute of Physics (2006). \doi{10.1063/1.2158729},
\url{https://doi.org/10.1063/1.2158729}
\bibitem{svozil-2016-quantum-hokus-pokus}
Svozil, K.: Quantum hocus-pocus. Ethics in Science and Environmental Politics
(ESEP) \textbf{16}(1), 25--30 (2016). \doi{10.3354/esep00171},
\url{https://doi.org/10.3354/esep00171}
\bibitem{svozil-2018-whycontexts}
Svozil, K.: New forms of quantum value indefiniteness suggest that incompatible
views on contexts are epistemic. Entropy \textbf{20}(6), 406(22) (2018).
\doi{10.3390/e20060406}, \url{https://doi.org/10.3390/e20060406}
\bibitem{svozil-2016-pu-book}
Svozil, K.: Physical [A]Causality. {D}eterminism, Randomness and Uncaused
Events. Springer, Cham, Berlin, Heidelberg, New York (2018).
\doi{10.1007/978-3-319-70815-7},
\url{https://doi.org/10.1007/978-3-319-70815-7}
\bibitem{2007-tkadlec-svozil-springer}
Svozil, K., Tkadlec, J.: On the solution of trivalent decision problems by
quantum state identification. Natural Computing \textbf{in print}, in print
(2009). \doi{10.1007/s11047-009-9112-5},
\url{https://doi.org/10.1007/s11047-009-9112-5}
\bibitem{Turing-Intelligent_Machinery}
Turing, A.M.: Intelligent machinery. In: Evans, C.R., Robertson, A.D.J. (eds.)
{C}ybernetics. {K}ey Papers, pp. 27--52. Butterworths, London (1968)
\bibitem{Wiesner-2017}
Wiesner, K.: The careless use of language in quantum information,
\url{https://arxiv.org/abs/1705.06768}
\end{thebibliography}
\end{document}
|
https://ctan.math.washington.edu/tex-archive/info/examples/Einfuehrung2/15-04-7.ltx | washington.edu | CC-MAIN-2022-27 | text/x-tex | text/x-matlab | crawl-data/CC-MAIN-2022-27/segments/1656104506762.79/warc/CC-MAIN-20220704232527-20220705022527-00461.warc.gz | 233,573,229 | 1,075 | %%
%% Ein Beispiel der DANTE-Edition
%%
%% 2. Auflage
%%
%% Beispiel 15-04-7 auf Seite 769.
%%
%% Copyright (C) 2016 Herbert Voss
%%
%% It may be distributed and/or modified under the conditions
%% of the LaTeX Project Public License, either version 1.3
%% of this license or (at your option) any later version.
%%
%% See http://www.latex-project.org/lppl.txt for details.
%%
%%
%% ====
% Show page(s) 1
%%
%%
\documentclass[]{exaarticle}
\pagestyle{empty}
\setlength\textwidth{121.16928pt}
\usepackage[T1]{fontenc}
%StartShownPreambleCommands
\usepackage{tikz}
%StopShownPreambleCommands
\begin{document}
\begin{tikzpicture}
\draw[step=.5cm,gray,very thin](-1.5,-1.5)grid (1.5,1.5);
\draw[->](-1.5,0)--(1.5,0); \draw[->](0,-1.5)--(0,1.5);
\draw(0,0) circle (1cm);
\end{tikzpicture}
\end{document}
|
https://www.edizionianarchismo.net/library/friedrich-nietzsche-ditirambi-di-dioniso.tex | edizionianarchismo.net | CC-MAIN-2022-21 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2022-21/segments/1652663016373.86/warc/CC-MAIN-20220528093113-20220528123113-00070.warc.gz | 864,902,594 | 13,954 | \documentclass[DIV=9,%
BCOR=0mm,%
headinclude=false,%
footinclude=false,open=any,%
fontsize=11pt,%
oneside,%
paper=a4]%
{scrbook}
\usepackage{fontspec}
\usepackage{polyglossia}
\setmainfont{Linux Libertine O}
% these are not used but prevents XeTeX to barf
\setsansfont[Scale=MatchLowercase]{CMU Sans Serif}
\setmonofont[Scale=MatchLowercase]{CMU Typewriter Text}
\setmainlanguage{italian}
% global style
\pagestyle{plain}
\usepackage{microtype} % you need an *updated* texlive 2012, but harmless
\usepackage{graphicx}
\usepackage{alltt}
\usepackage{verbatim}
% http://tex.stackexchange.com/questions/3033/forcing-linebreaks-in-url
\PassOptionsToPackage{hyphens}{url}\usepackage[hyperfootnotes=false,hidelinks,breaklinks=true]{hyperref}
\usepackage{bookmark}
% footnote handling
\usepackage[fragile]{bigfoot}
\usepackage{perpage}
\DeclareNewFootnote{default}
\DeclareNewFootnote{B}
\MakeSorted{footnoteB}
\renewcommand*\thefootnoteB{(\arabic{footnoteB})}
\deffootnote[3em]{0em}{4em}{\textsuperscript{\thefootnotemark}~}
% continuous numbering across the document. Defaults to resetting at chapter. Unclear
% \usepackage{chngcntr}
% \counterwithout{footnote}{chapter}
\usepackage[shortlabels]{enumitem}
\usepackage{tabularx}
\usepackage[normalem]{ulem}
\def\hsout{\bgroup \ULdepth=-.55ex \ULset}
% https://tex.stackexchange.com/questions/22410/strikethrough-in-section-title
% Unclear if \protect \hsout is needed. Doesn't looks so
\DeclareRobustCommand{\sout}[1]{\texorpdfstring{\hsout{#1}}{#1}}
\usepackage{wrapfig}
\usepackage{indentfirst}
% remove the numbering
\setcounter{secnumdepth}{-2}
% remove labels from the captions
\renewcommand*{\captionformat}{}
\renewcommand*{\figureformat}{}
\renewcommand*{\tableformat}{}
\KOMAoption{captions}{belowfigure,nooneline}
\addtokomafont{caption}{\centering}
% avoid breakage on multiple <br><br> and avoid the next [] to be eaten
\newcommand*{\forcelinebreak}{\strut\\*{}}
\newcommand*{\hairline}{%
\bigskip%
\noindent \hrulefill%
\bigskip%
}
% reverse indentation for biblio and play
\newenvironment*{amusebiblio}{
\leftskip=\parindent
\parindent=-\parindent
\smallskip
\indent
}{\smallskip}
\newenvironment*{amuseplay}{
\leftskip=\parindent
\parindent=-\parindent
\smallskip
\indent
}{\smallskip}
\newcommand*{\Slash}{\slash\hspace{0pt}}
\addtokomafont{disposition}{\rmfamily}
\addtokomafont{descriptionlabel}{\rmfamily}
% forbid widows/orphans
\frenchspacing
\sloppy
\clubpenalty=10000
\widowpenalty=10000
% http://tex.stackexchange.com/questions/304802/how-not-to-hyphenate-the-last-word-of-a-paragraph
\finalhyphendemerits=10000
% given that we said footinclude=false, this should be safe
\setlength{\footskip}{2\baselineskip}
\title{Ditirambi di Dioniso}
\date{}
\author{Friedrich Nietzsche}
\subtitle{}
% https://groups.google.com/d/topic/comp.text.tex/6fYmcVMbSbQ/discussion
\hypersetup{%
pdfencoding=auto,
pdftitle={Ditirambi di Dioniso},%
pdfauthor={Nietzsche, Friedrich},%
pdfsubject={},%
pdfkeywords={opuscoli}%
}
\begin{document}
\begin{titlepage}
\strut\vskip 2em
\begin{center}
{\usekomafont{title}{\huge Ditirambi di Dioniso\par}}%
\vskip 1em
\vskip 2em
{\usekomafont{author}{Friedrich Nietzsche\par}}%
\vskip 1.5em
\vskip 3em
\includegraphics[keepaspectratio=true,height=0.5\textheight,width=1\textwidth]{f-n-friedrich-nietzsche-ditirambi-di-dioniso-x-cover.jpg}
\vfill
\strut\par
\end{center}
\end{titlepage}
\cleardoublepage
\tableofcontents
% start a new right-handed page
\cleardoublepage
\section{Nota introduttiva}
Se non scritte al di là della soglia di non ritorno, queste poesie sono state riassettate e preparate per la stampa in piena crisi. Nietzsche scrive ormai biglietti e lettere che, ai più, sono sembrati privi di senso. Lo erano veramente? Non più di quanto appaia il tentativo realizzato nel consegnare agli assennati facitori di teorie, che ormai si era lasciato alla spalle, queste riflessioni poetiche, che tali sono, in linea con quanto aveva scritto di filosofico nella sua non lunga vita.
Il fatto è che qui agisce la logica del tutto e subito, la stessa che rendeva non solo “incomprensibili” le menadi, ma che sconvolgeva l’assetto ben ordinato del mondo apollineo il quale, fra l’altro, costringeva le donne a mantenersi all’interno delle regole della cosiddetta buona creanza. E siccome tutto ciò che esce dalle regole causa fastidio, deve essere ricondotto, a ogni costo, all’interno di una spiegazione logica plausibile.
Ecco, i ditirambi di Nietzsche non sono plausibili, sono un viaggio nell’inverosimile, nell’intuizione dell’immenso che sta “oltre”, al di là del muro di cinta, dove per i commensali del limitato e del conteggiato è indigestione.
Non ho letto mai, fra le centinaia di pagine sull’opera di Nietzsche che mi è piaciuto affrontare, un solo rigo degno di rispetto riguardo i ditirambi. Nessun filosofo ha mai ardito avventurarsi al di là dell’irreversibile, ogni buon uomo tiene alla propria incolumità.
Sarà lo stesso per i pochi lettori di questi libretto? Spero di no.
\bigskip
Trieste, 20 novembre 2011
\begin{flushright}
Alfredo M. Bonanno
\end{flushright}
\chapter{Soltanto stolto! Soltanto poeta!}
\begin{verse}
Nell’aria rischiarata,\forcelinebreak
quando già la consolazione della rugiada stilla\forcelinebreak
sopra la terra, invisibile e inudita\forcelinebreak
– poiché come tutti i dolci consolatori indossa\forcelinebreak
la confortatrice rugiada delicati calzari –\forcelinebreak
allora ricordi, ricordi, cuore ardente,\forcelinebreak
come fosti assetato, un tempo, come, stanco e riarso,\forcelinebreak
fosti assetato di lacrime celesti e gocce di rugiada,\forcelinebreak
mentre su gialli sentieri d’erba\forcelinebreak
tra neri alberi ti correvano intorno\forcelinebreak
malvagi sguardi serali del sole,\forcelinebreak
accecanti, ardenti, maligni sguardi del sole.
Il pretendente della verità tu? così schernivano\forcelinebreak
no! soltanto un poeta!\forcelinebreak
un astuto, rapace, strisciante animale\forcelinebreak
che deve mentire,\forcelinebreak
che sapendo, volendo, deve mentire,\forcelinebreak
bramoso di preda,\forcelinebreak
variamente mascherato,\forcelinebreak
maschera egli stesso,\forcelinebreak
egli stesso preda\forcelinebreak
\emph{questo} – il pretendente della verità?\dots{}\forcelinebreak
Soltanto stolto! Soltanto poeta!\forcelinebreak
Che parla in modo variopinto,\forcelinebreak
che dalle maschere di stolto parla confusamente,\forcelinebreak
arrampicandosi su menzogneri ponti di parole,\forcelinebreak
girovagando, strisciando\forcelinebreak
su arcobaleni di menzogne tra falsi cieli –\forcelinebreak
\emph{soltanto} stolto! \emph{soltanto} poeta!\dots{}
Questo – il pretendente della verità?\dots{}
Non quieto, rigido, piano, freddo,\forcelinebreak
divenuto immagine,\forcelinebreak
pilastro di dio,\forcelinebreak
non innalzato dinanzi ai templi,\forcelinebreak
un guardiano di dio:\forcelinebreak
no! ostile a simili statue di virtù,\forcelinebreak
più nelle selve che nei templi di casa,\forcelinebreak
colmo di una felina spavalderia\forcelinebreak
che salta oltre ogni finestra\forcelinebreak
hop! in ogni azzardo,\forcelinebreak
fiutando ogni foresta vergine,\forcelinebreak
tu che corresti nelle foreste vergini\forcelinebreak
tra variegati e arruffati animali da preda\forcelinebreak
empiamente sano e bello e variopinto,\forcelinebreak
con labbra vogliose,\forcelinebreak
beato di scherno, beato d’inferno, beato di brama di sangue,\forcelinebreak
predando, strisciando, \emph{mentendo} corresti\dots{}
Oppure simile all’aquila che a lungo,\forcelinebreak
a lungo immobile fissa gli abissi,\forcelinebreak
i suoi abissi\dots{}\forcelinebreak
– oh, come quaggiù essi\forcelinebreak
si inanellano in basso, in dentro,\forcelinebreak
in sempre più fonde profondità! –\forcelinebreak
Poi,\forcelinebreak
d’un tratto,\forcelinebreak
con volo diritto\forcelinebreak
e slancio improvviso\forcelinebreak
gettarsi su \emph{agnelli}\forcelinebreak
a precipizio,\forcelinebreak
affamato, bramoso di agnelli,\forcelinebreak
adirato con tutte le anime d’agnello\forcelinebreak
furiosamente adirato con tutto ciò che ha\forcelinebreak
sguardi virtuosi, di pecora, sguardi dal vello ricciuto,\forcelinebreak
ottusi, muniti della benevolenza del latte d’agnello\dots{}
Così\forcelinebreak
come di aquila, di pantera\forcelinebreak
sono le bramosie del poeta,\forcelinebreak
sono, dietro mille maschere,\forcelinebreak
le tue bramosie, tu stolto! tu poeta!\dots{}
Tu che vedesti l’uomo\forcelinebreak
come \emph{dio} e come \emph{pecora} –;\forcelinebreak
\emph{sbranare} il dio nell’uomo\forcelinebreak
come la pecora nell’uomo\forcelinebreak
e \emph{ridere} sbranando –\forcelinebreak
\emph{questa}, \emph{questa} è la tua beatitudine,\forcelinebreak
la beatitudine di una pantera e di un’aquila,\forcelinebreak
la beatitudine di un poeta e di uno stolto!\dots{}
Nell’aria rischiarata,\forcelinebreak
quando già la falce della luna\forcelinebreak
verde tra rossi di porpora\forcelinebreak
invidiosa s’insinua,\forcelinebreak
– avversa al giorno,\forcelinebreak
a ogni passo segretamente\forcelinebreak
falciando amache di rose,\forcelinebreak
fino a quando esse cadono,\forcelinebreak
pallide cadono verso la notte:
così io stesso caddi, una volta,\forcelinebreak
dalla mia follia di verità,\forcelinebreak
dalle mie bramosie del giorno,\forcelinebreak
stanco del giorno, sofferente per la luce,\forcelinebreak
– caddi in giù, verso la sera, verso l’ombra,\forcelinebreak
bruciato da una sola\forcelinebreak
verità e assetato\forcelinebreak
– ricordi ancora, ricordi, cuore ardente,\forcelinebreak
com’eri assetato allora? –\forcelinebreak
\emph{che io sia bandito}\forcelinebreak
\emph{da ogni verità}!\forcelinebreak
\emph{Soltanto} stolto! soltanto poeta!\dots{}
\end{verse}
\chapter{Tra figlie del deserto}
\begin{verse}
\emph{Il deserto cresce}: \emph{guai a colui che cela deserti}\dots{}
Ah!\forcelinebreak
Solenne!\forcelinebreak
un degno inizio!\forcelinebreak
africanamente solenne!\forcelinebreak
d’un leone degno\forcelinebreak
o di una morale scimmia urlatrice\dots{}\forcelinebreak
ma nulla per voi,\forcelinebreak
voi dilette amiche,\forcelinebreak
ai cui piedi è concesso\forcelinebreak
a me, a un Europeo sotto le palme,\forcelinebreak
di sedere. Sela.
Meraviglioso invero!\forcelinebreak
Qui siedo ora,\forcelinebreak
prossimo al deserto e già\forcelinebreak
nuovamente al deserto tanto lontano,\forcelinebreak
ma in nulla ancora desolato:\forcelinebreak
inghiottito infatti\forcelinebreak
da questa minuscola oasi\forcelinebreak
essa spalancò sbadigliando\forcelinebreak
la sua graziosa bocca,\forcelinebreak
la più odorosa tra le boccucce:\forcelinebreak
io vi caddi attraverso,\forcelinebreak
giù dentro – tra voi,\forcelinebreak
voi dilette amiche! Sela.
Salute, salute a quella balena,\forcelinebreak
se essa fece star comodo\forcelinebreak
il suo ospite! – intendete\forcelinebreak
la mia dotta allusione?\dots{}\forcelinebreak
Salute al suo ventre dunque,\forcelinebreak
se esso era\forcelinebreak
un leggiadro ventre di oasi\forcelinebreak
simile a questo: del che tuttavia dubito.\forcelinebreak
Dal momento che vengo dall’Europa\forcelinebreak
che è la più scettica tra tutte le sposine.\forcelinebreak
Voglia dio migliorarla!\forcelinebreak
Amen!
Qui siedo dunque,\forcelinebreak
In quest’oasi minuscola,\forcelinebreak
simile a un dattero,\forcelinebreak
bruno, zuccherato, gocciolante oro,\forcelinebreak
bramoso di una rotonda bocca di fanciulla,\forcelinebreak
ma più ancora di virginei, gelidi,\forcelinebreak
taglienti incisivi bianchi come neve:\forcelinebreak
dei quali infatti\forcelinebreak
è avido il cuore di tutti i datteri ardenti. Sela.
Simile, troppo simile\forcelinebreak
ai nominati frutti del sud\forcelinebreak
giaccio qui circondato\forcelinebreak
dai giochi e dalle danze di piccoli\forcelinebreak
scarabei alati,\forcelinebreak
e insieme da ancor più piccoli\forcelinebreak
più stolti e più malvagi\forcelinebreak
desideri e capricci, –\forcelinebreak
circondato da voi,\forcelinebreak
voi mute, voi presaghe\forcelinebreak
fanciulle-gatto\forcelinebreak
Dudù e Suleika\forcelinebreak
– \emph{racchiuso da una sfinge}, per imbottire\forcelinebreak
una parola di molti sentimenti\forcelinebreak
(– dio mi perdoni\forcelinebreak
questo peccato linguistico!\dots{})\forcelinebreak
– siedo qui, annusando l’aria migliore,\forcelinebreak
aria di paradiso, in verità,\forcelinebreak
aria chiara e leggera, striata d’oro,\forcelinebreak
l’aria più buona che mai\forcelinebreak
sia caduta dalla luna,\forcelinebreak
fu per caso\forcelinebreak
o avvenne per superbia?\forcelinebreak
raccontano gli antichi poeti.\forcelinebreak
Ma io scettico ne dubito,\forcelinebreak
dal momento che vengo\forcelinebreak
dall’Europa,\forcelinebreak
la più scettica tra tutte le sposine.\forcelinebreak
Voglia dio migliorarla!\forcelinebreak
Amen.
Respirando questa bellissima aria,\forcelinebreak
con nari rigonfie come calici,\forcelinebreak
senza futuro, senza ricordi,\forcelinebreak
così qui siedo,\forcelinebreak
voi dilette amiche,\forcelinebreak
e guardo la palma,\forcelinebreak
come essa simile a una danzatrice,\forcelinebreak
si pieghi e si fletta e si culli sull’anca\forcelinebreak
sì fa lo stesso se la si osserva a lungo\dots{}\forcelinebreak
simile a una danzatrice che, mi pare,\forcelinebreak
già troppo a lungo, pericolosamente a lungo,\forcelinebreak
sempre, sempre si erge su una gambetta sola?\forcelinebreak
– mi pare perciò che abbia dimenticato\forcelinebreak
l’altra gambetta?\forcelinebreak
Invano almeno\forcelinebreak
cercai il mancante\forcelinebreak
gioiello gemello\forcelinebreak
– cioè l’altra gambetta –\forcelinebreak
nelle sacre vicinanze\forcelinebreak
del suo leggiadrissimo, graziosissimo gonnellino\forcelinebreak
a ventaglio, svolazzante di lustrini.\forcelinebreak
Sì, se voi, mie belle amiche,\forcelinebreak
vorrete credermi fino in fondo\forcelinebreak
essa l’ha \emph{perduta}\dots{}\forcelinebreak
Uh! uh! uh! uh! uh!\forcelinebreak
È svanita,\forcelinebreak
per sempre svanita,\forcelinebreak
l’altra gambetta!\forcelinebreak
Oh, che peccato per quest’altra graziosa gambetta!\forcelinebreak
Dove – si troverà mai e languirà abbandonata,\forcelinebreak
questa solitaria gambetta?\forcelinebreak
Nel terrore forse\forcelinebreak
di un mostruoso, rabbioso, giallo\forcelinebreak
leone dalla bionda criniera? o addirittura\forcelinebreak
già rosicchiata, scarnificata –\forcelinebreak
miseramente ah! ah! scarnificata! Sela.
Oh non piangete,\forcelinebreak
teneri cuori!\forcelinebreak
Non piangete, voi\forcelinebreak
cuori di dattero! seni di latte!\forcelinebreak
voi sacchetti dal cuore\forcelinebreak
di liquirizia!\forcelinebreak
Sii uomo, Suleika! Coraggio! Coraggio!\forcelinebreak
Non piangere più\forcelinebreak
pallida Dudù!\forcelinebreak
– O non sarebbe\forcelinebreak
qui forse il caso di qualcosa di tonificante\forcelinebreak
di tonificante per il cuore?\forcelinebreak
una consacrata sentenza?\forcelinebreak
un solenne conforto?\dots{}
Ah!\forcelinebreak
Innalzati, dignità!\forcelinebreak
Soffia, soffia ancora\forcelinebreak
mantice della virtù!\forcelinebreak
Ah!\forcelinebreak
Ancora una volta ruggire,\forcelinebreak
moralmente ruggire,\forcelinebreak
ruggire da leone morale dinanzi alle figlie del deserto!.\forcelinebreak
– Poiché il latrato della virtù,\forcelinebreak
voi fanciulle dilette,\forcelinebreak
di ogni cosa\forcelinebreak
zelo da Europei, voracità da Europei!\forcelinebreak
E qui io resto già,\forcelinebreak
come Europeo,\forcelinebreak
non posso fare altrimenti, che dio m’aiuti!\forcelinebreak
Amen!
Il deserto cresce: guai a colui che cela deserti!\forcelinebreak
Pietra stride contro pietra, il deserto divora e strangola.\forcelinebreak
La mostruosa morte guarda rovente, bruna\forcelinebreak
e \emph{mastica}, – la sua vita è il suo masticare\dots{}\forcelinebreak
\emph{Uomo che la voluttà ha bruciato}, \emph{non dimenticare} –\forcelinebreak
\emph{tu sei la pietra}, \emph{il deserto}, \emph{sei la morte}\dots{}
\end{verse}
\chapter{Ultima volontà}
\begin{verse}
Morire così,\forcelinebreak
come un giorno lo vidi morire –,\forcelinebreak
l’amico, che saette e sguardi divinamente gettò\forcelinebreak
nella mia oscura giovinezza.\forcelinebreak
Sventato e profondo,\forcelinebreak
danzatore nella battaglia –,
tra guerrieri il più sereno,\forcelinebreak
tra vincitori il più arduo,\forcelinebreak
un destino ritto sul suo destino,\forcelinebreak
duro, riflessivo, pensieroso di ciò che sarà –:
tremante \emph{perché} aveva vinto,\forcelinebreak
esultante perché \emph{morendo} aveva vinto –:
ordinava, mentre moriva\forcelinebreak
e ordinò che si \emph{annientasse}\dots{}
Morire così,\forcelinebreak
come un giorno lo vidi morire:\forcelinebreak
vincendo, \emph{annientando}\dots{}
\end{verse}
\chapter{Tra uccelli predatori}
\begin{verse}
Chi volge in basso qui,\forcelinebreak
come presto\forcelinebreak
lo inghiotte l’abisso!\forcelinebreak
Ma tu, Zarathustra,\forcelinebreak
ami ancora l’abisso\forcelinebreak
fai come l’\emph{abete}?
Esso mette radici, dove\forcelinebreak
il dirupo stesso rabbrividendo\forcelinebreak
guarda il profondo –,\forcelinebreak
esita sopra precipizi\forcelinebreak
intorno ai quali tutto\forcelinebreak
volge verso il fondo:\forcelinebreak
tra l’impazienza\forcelinebreak
di selvaggia frana, di impetuoso ruscello\forcelinebreak
sopportando paziente, duro, silente,\forcelinebreak
solo\dots{}
\emph{Solo}!\forcelinebreak
Chi osò mai\forcelinebreak
essere ospite qui,\forcelinebreak
essere ospite \emph{tuo}?\dots{}\forcelinebreak
Forse un uccello predatore:\forcelinebreak
questi si aggrappa\forcelinebreak
volentieri ai capelli\forcelinebreak
di chi saldo pazienta,\forcelinebreak
maligno, con riso folle,\forcelinebreak
il riso di un uccello predatore\dots{}\forcelinebreak
\emph{Perché} così saldo?\forcelinebreak
– schernisce egli spietato:\forcelinebreak
bisogna avere ali, se si ama l’abisso\dots{}\forcelinebreak
non restare appesi\forcelinebreak
come te, impiccato! –
Oh Zarathustra,\forcelinebreak
crudelissimo Nimrod!\forcelinebreak
Poc’anzi ancora cacciatore di dio,\forcelinebreak
la rete che cattura ogni virtù,\forcelinebreak
la freccia del male!\forcelinebreak
Ora –\forcelinebreak
da te stesso catturato,\forcelinebreak
tua propria preda,\forcelinebreak
penetrato in te stesso\dots{}
Ora –\forcelinebreak
con te stesso solo,\forcelinebreak
duplice nel tuo sapere,\forcelinebreak
tra cento specchi\forcelinebreak
falso dinanzi a te stesso,\forcelinebreak
tra cento ricordi\forcelinebreak
incerto,\forcelinebreak
stanco di ogni ferita,\forcelinebreak
freddo per ogni gelo,\forcelinebreak
dalle tue stesse funi strangolato,\forcelinebreak
\emph{conoscitore di te stesso}!\forcelinebreak
\emph{carnefice di te stesso}!
Perché mai ti legasti\forcelinebreak
con la fune della tua saggezza?\forcelinebreak
Perché mai attirasti te stesso\forcelinebreak
nel paradiso del vecchio serpente?\forcelinebreak
Perché mai ti insinuasti strisciando\forcelinebreak
in \emph{te} – in \emph{te}?\dots{}
Ora un malato,\forcelinebreak
reso infermo dal veleno del serpente;\forcelinebreak
un prigioniero ora,\forcelinebreak
cui toccò in sorte il più duro destino:\forcelinebreak
che lavora curvo nel proprio pozzo,\forcelinebreak
vuoto in se stesso come una caverna\forcelinebreak
che scava in se stesso\forcelinebreak
maldestro,\forcelinebreak
rigido,\forcelinebreak
una salma –\forcelinebreak
sovrastato da cento gravami sovrastanti,\forcelinebreak
sovraccarico di te,\forcelinebreak
un \emph{sapiente}!\forcelinebreak
un \emph{conoscitore di se stesso}!\forcelinebreak
il \emph{sapiente} Zarathustra!\dots{}
Tu cercasti il carico più pesante:\forcelinebreak
e lì trovasti \emph{te} stesso –,\forcelinebreak
non ti libererai di te\dots{}
In agguato,\forcelinebreak
rannicchiato,\forcelinebreak
incapace di stare ritto in piedi!\forcelinebreak
Mi appari aggrovigliato alla tua tomba,\forcelinebreak
spirito \emph{deforme}!\dots{}\forcelinebreak
E poc’anzi così orgoglioso,\forcelinebreak
su tutti i trampoli del tuo orgoglio\forcelinebreak
poc’anzi l’anacoreta senza dio,\forcelinebreak
che il suo eremo divide con il diavolo,\forcelinebreak
il principe scarlatto di ogni superbia!\dots{}
Ora –\forcelinebreak
in mezzo a due nulla\forcelinebreak
rannicchiato,\forcelinebreak
un punto interrogativo,\forcelinebreak
uno stanco enigma –\forcelinebreak
un enigma da \emph{uccelli predatori}\dots{}
– essi di certo ti “risolveranno”,\forcelinebreak
già bramano la tua “risoluzione”,\forcelinebreak
svolazzano intorno a te, il loro enigma,\forcelinebreak
intorno a te, impiccato!\dots{}\forcelinebreak
Oh Zarathustra!\dots{}\forcelinebreak
\emph{Conoscitore di te stesso}!\dots{}\forcelinebreak
\emph{Carnefice di te stesso}!\dots{}
\end{verse}
\chapter{Il segnale di fuoco}
\begin{verse}
Qui, dove tra mari l’isola crebbe,\forcelinebreak
pietra sacrificale erta e svettante,\forcelinebreak
qui sotto nero cielo accende\forcelinebreak
Zarathustra i suoi fuochi d’altura,\forcelinebreak
segnali di fuoco per naviganti sperduti,\forcelinebreak
interrogativi per coloro che hanno risposte\dots{}
Questa fiamma dal ventre grigio chiaro\forcelinebreak
– in fredde lontananze guizza la sua brama,\forcelinebreak
verso sempre più pure altezze essa piega il collo –\forcelinebreak
un serpente che si erge ritto per l’impazienza:\forcelinebreak
questo segno io posi innanzi a me.
La mia anima stessa è questa fiamma,\forcelinebreak
insaziabile di nuove lontananze\forcelinebreak
divampa alto, alto il suo quieto fuoco.\forcelinebreak
Perché mai Zarathustra fuggì animali e uomini?\forcelinebreak
Perché d’un tratto sfuggì alla terra ferma?\forcelinebreak
\emph{Sei} solitudini già egli conosce –,\forcelinebreak
ma neanche il mare fu per lui abbastanza solitario,\forcelinebreak
l’isola lo lasciò salire, sul monte divenne fiamma,\forcelinebreak
cercando una settima solitudine\forcelinebreak
egli getta ora l’amo sopra il capo.
Sperduti naviganti! Macerie d’antichi astri!\forcelinebreak
Voi mari del futuro! Cieli insondati!\forcelinebreak
A tutti i solitari ora getto l’amo:\forcelinebreak
rispondete all’impazienza della fiamma,\forcelinebreak
prendete a me, pescatore su alti monti,\forcelinebreak
la mia settima, \emph{ultima} solitudine! –
\end{verse}
\chapter{Il sole declina}
\begin{verse}
Non più a lungo avrai sete\forcelinebreak
~~~~riarso cuore!\forcelinebreak
Una promessa è nell’aria,\forcelinebreak
soffia da bocche sconosciute a me\forcelinebreak
~~~~– la grande frescura viene\dots{}
Stava nel meriggio ardente su di me il mio sole:\forcelinebreak
siate i benvenuti, voi che venite\forcelinebreak
~~~~venti improvvisi\forcelinebreak
voi freschi spiriti pomeridiani!
Va l’aria estranea e pura.\forcelinebreak
Non mi sogguarda\forcelinebreak
~~~~con occhi obliqui\forcelinebreak
di seduttrice la notte?\dots{}\forcelinebreak
Stai forte, mio cuore ardito!\forcelinebreak
Non domandare: perché? –
Giorno della mia vita!\forcelinebreak
il sole declina.\forcelinebreak
Già sta dorata\forcelinebreak
~~~~la piatta marea.\forcelinebreak
Calda respira la rupe:\forcelinebreak
~~~~dormì forse qui nel meriggio\forcelinebreak
la felicità il suo sonno pomeridiano?\forcelinebreak
~~~~Tra verdi luci\forcelinebreak
il bruno abisso innalza ancora un gioco felice.
Giorno della mia vita!\forcelinebreak
Il sole declina!\forcelinebreak
Già arde il tuo occhio\forcelinebreak
~~~~spezzato in due,\forcelinebreak
già gocciano lacrime stillanti\forcelinebreak
~~~~della tua rugiada,\forcelinebreak
già scorre silenziosa su bianchi mari\forcelinebreak
la porpora del tuo amore,\forcelinebreak
la tua ultima, esitante beatitudine\dots{}
Serenità, dorata, vieni!\forcelinebreak
~~~~tu della morte\forcelinebreak
più segreto, più dolce assaggio!\forcelinebreak
– Corsi troppo veloce la mia strada?\forcelinebreak
Soltanto ora che il piede si stancò,\forcelinebreak
~~~~mi raggiunge ancora il tuo sguardo,\forcelinebreak
~~~~mi raggiunge ancora la tua \emph{felicità}.
Tutt’intorno soltanto onda e gioco.\forcelinebreak
~~~~Ciò che fu un tempo pesante\forcelinebreak
sprofondò in azzurro oblio,\forcelinebreak
inoperosa è ora la mia barca.\forcelinebreak
Tempesta e viaggio – come essa disimpara!\forcelinebreak
~~~~Annegò desiderio e speranza,\forcelinebreak
~~~~lisci giacciono anima e mare.\forcelinebreak
Settima solitudine!\forcelinebreak
~~~~Mai sentii a me\forcelinebreak
più vicina una dolce certezza,\forcelinebreak
più caldo lo sguardo del sole.\forcelinebreak
– Non arde ancora il ghiaccio della mia vetta?\forcelinebreak
~~~~Argentea, lieve, come un pesce\forcelinebreak
~~~~nuota ora al largo la mia barca\dots{}
\end{verse}
\chapter{Lamento di Arianna}
\begin{verse}
Chi mi riscalda, chi mi ama ancora?\forcelinebreak
~~~~Date mani ardenti,\forcelinebreak
~~~~date bracieri del cuore!\forcelinebreak
Già prostrata, colta da brividi,\forcelinebreak
una moribonda quasi, cui si scaldano i piedi,\forcelinebreak
scossa, ah!, da febbri sconosciute\forcelinebreak
tremante per freddi, gelidi dardi acuminati,\forcelinebreak
~~~~da te inseguita, pensiero!\forcelinebreak
Innominabile! Celato! Tremendo!\forcelinebreak
~~~~Tu cacciatore oltre le nubi!\forcelinebreak
Prostrata dai tuoi fulmini,\forcelinebreak
tu occhio beffardo, che dall’oscurità mi osservi!\forcelinebreak
~~~~Così io giaccio,\forcelinebreak
mi piego, mi dibatto, tormentata\forcelinebreak
da tutti gli eterni martiri,\forcelinebreak
~~~~colpita\forcelinebreak
da te, spietatissimo cacciatore,\forcelinebreak
sconosciuto – \emph{dio}\dots{}
Colpisci più in fondo!\forcelinebreak
Colpisci una volta ancora!\forcelinebreak
Trafiggi, infrangi questo cuore!\forcelinebreak
A che questa tortura\forcelinebreak
con frecce spuntate?\forcelinebreak
Perché guardi di nuovo\forcelinebreak
inappagato del tormento umano,\forcelinebreak
con maligni, divini occhi lampeggianti?\forcelinebreak
Non vuoi uccidere,\forcelinebreak
torturare solo, torturare?\forcelinebreak
A che – torturar\emph{mi},\forcelinebreak
un maligno dio sconosciuto?
Ah! Ah!\forcelinebreak
Ti avvicini furtivo\forcelinebreak
in questa mezzanotte?\dots{}\forcelinebreak
Che cosa vuoi?\forcelinebreak
Parla!\forcelinebreak
Tu mi premi, mi incalzi\forcelinebreak
ah! troppo da presso!\forcelinebreak
Mi ascolti respirare,\forcelinebreak
il tuo orecchio spia il mio cuore,\forcelinebreak
geloso!\forcelinebreak
~~~~– ma geloso di che?
Via! via!\forcelinebreak
perché la scala?\forcelinebreak
Vuoi entrare\forcelinebreak
\emph{nel} cuore, salire,\forcelinebreak
nei miei\forcelinebreak
più segreti pensieri?\forcelinebreak
Impudico! Sconosciuto! Ladro!\forcelinebreak
Cosa vorresti rubare?\forcelinebreak
Cosa vorresti ascoltare?\forcelinebreak
Che cosa estorcere,\forcelinebreak
torturatore!\forcelinebreak
Tu – dio carnefice!\forcelinebreak
O devo io, simile al cane,\forcelinebreak
rotolare dinanzi a te?\forcelinebreak
Abbandonata, esaltata fuori di me\forcelinebreak
per te amore – scodinzolare?
Invano!\forcelinebreak
Trafiggi ancora!\forcelinebreak
Crudelissima spina!\forcelinebreak
Non cane – solo tua preda sono,\forcelinebreak
crudelissimo cacciatore!\forcelinebreak
La tua più fiera prigioniera,\forcelinebreak
tu rapinatore oltre le nubi\dots{}\forcelinebreak
Parla infine!\forcelinebreak
Tu nascosto dal fulmine! Sconosciuto! parla!\forcelinebreak
Che cosa vuoi tu, bandito, da – \emph{me}?\dots{}
Come?\forcelinebreak
Prezzo del riscatto?\forcelinebreak
Quanto vuoi per il riscatto?\forcelinebreak
Chiedi molto – suggerisce il mio orgoglio!\forcelinebreak
e parla poco – suggerisce l’altro mio orgoglio!\forcelinebreak
Ah! Ah!\forcelinebreak
Me – vorresti? me?\forcelinebreak
me – tutta?\dots{}
Ah! Ah!\forcelinebreak
E mi tormenti, pazzo che non sei altro,\forcelinebreak
martirizzi il mio orgoglio?\forcelinebreak
~~~~Dammi \emph{amore} chi mi riscalda ancora?\forcelinebreak
~~~~chi mi ama ancora?\forcelinebreak
Da’ mani ardenti,\forcelinebreak
da’ bracieri del cuore,\forcelinebreak
da’ a me, la più sola,\forcelinebreak
cui ghiaccio, ah!, ghiaccio dalle sette forme\forcelinebreak
insegna a bramare nemici,\forcelinebreak
persino nemici,\forcelinebreak
datti a me, \emph{te},\forcelinebreak
crudelissimo nemico,\forcelinebreak
arrenditi! \dots{}
Via!\forcelinebreak
Anch’egli fuggi ora,\forcelinebreak
mio solo compagno,\forcelinebreak
mio grande nemico,\forcelinebreak
mio sconosciuto,\forcelinebreak
mio dio-carnefice!\dots{}\forcelinebreak
No!\forcelinebreak
ritorna\forcelinebreak
Con tutte le tue torture!\forcelinebreak
Le mie lacrime tutte\forcelinebreak
corrono verso te\forcelinebreak
e l’ultima fiamma del mio cuore\forcelinebreak
risplende per te.\forcelinebreak
Oh, ritorna,\forcelinebreak
mio dio sconosciuto! mio \emph{dolore}!\forcelinebreak
~~~~mia ultima felicità!\dots{}
(\emph{Un lampo}. \emph{Appare Dioniso in una bellezza smeraldina})
\emph{Dioniso}:
Sii saggia Arianna!\dots{}\forcelinebreak
Hai orecchie piccole, hai le mie orecchie:\forcelinebreak
poni in esse una saggia parola! –\forcelinebreak
Non ci si deve odiare, prima, se ci si vuole amare?\dots{}\forcelinebreak
\emph{Io sono il tuo labirinto}\dots{}
\end{verse}
\chapter{Gloria ed eternità}
\begin{verse}
Da quanto tempo già stai seduto\forcelinebreak
~~~~sul tuo destino avverso?\forcelinebreak
Fa’ attenzione! tu mi covi ancora\forcelinebreak
~~~~un uovo,\forcelinebreak
~~~~un uovo di basilisco\forcelinebreak
nel tuo lungo affanno.
Perché mai Zarathustra striscia lungo il monte? –
Diffidente, ulceroso, cupo,\forcelinebreak
a lungo in agguato –,\forcelinebreak
ma, d’improvviso, un lampo\forcelinebreak
chiaro, terribile, un colpo\forcelinebreak
contro il cielo dall’abisso:\forcelinebreak
– al monte stesso si scuotono\forcelinebreak
le viscere\dots{}
Dove odio e folgore\forcelinebreak
si unirono, una \emph{maledizione}\forcelinebreak
sui monti dimora adesso l’ira di Zarathustra,\forcelinebreak
come nube di tempesta striscia sulla sua strada.
Si rintani chi ha un’ultima coperta!\forcelinebreak
A letto, voi esseri delicati!\forcelinebreak
Rotolano i tuoni ora sulle volte,\forcelinebreak
trema ora tutto ciò che è trave e muro,\forcelinebreak
sussultano ora lampi e verità giallo-zolfo –\forcelinebreak
~~~~Zarathustra \emph{maledice}\dots{}
Questa moneta con cui\forcelinebreak
il mondo intero paga,\forcelinebreak
\emph{gloria} –,\forcelinebreak
afferro con i guanti questa moneta,\forcelinebreak
con schifo la calpesto \emph{sotto} di me.
\emph{Chi} vuole esser pagato?\forcelinebreak
Coloro che si possono comprare\dots{}\forcelinebreak
Chi è \emph{in vendita}, protende\forcelinebreak
grasse mani verso\forcelinebreak
questo comodo tintinnio di latta, gloria!
– \emph{Vuoi} tu comprarli?\forcelinebreak
tutti si possono comprare.\forcelinebreak
Ma offri molto!\forcelinebreak
fai tintinnare una borsa piena!\forcelinebreak
~~~~– li \emph{rinforzeresti}, altrimenti,\forcelinebreak
rinforzeresti altrimenti le loro \emph{virtù}\dots{}
Sono tutti virtuosi.\forcelinebreak
Gloria e virtù – si accordano.\forcelinebreak
Sin quando vivrà il mondo,\forcelinebreak
pagherà il cicaleccio della virtù\forcelinebreak
con lo strepitio della gloria –\forcelinebreak
il mondo vive di questo chiasso\dots{}\forcelinebreak
Dinanzi a tutti i virtuosi\forcelinebreak
~~~~voglio essere colpevole,\forcelinebreak
colpevole esser chiamato di ogni grande colpa!\forcelinebreak
Dinanzi a tutti i megafoni della gloria\forcelinebreak
la mia ambizione diventa verme –,\forcelinebreak
tra costoro mi prende il desiderio\forcelinebreak
di essere l’\emph{infimo}\dots{}
Questa moneta con cui\forcelinebreak
il mondo intero paga,\forcelinebreak
\emph{gloria} –,\forcelinebreak
afferro con i guanti questa moneta,\forcelinebreak
con schifo la calpesto sotto di me.
Silenzio! –\forcelinebreak
Di grandi cose – io \emph{vedo} cose grandi! –\forcelinebreak
bisogna tacere\forcelinebreak
o parlare con grandezza:\forcelinebreak
parla con grandezza, mia estasiata saggezza!
Io guardo in alto\forcelinebreak
lì scorrono mari di luce:\forcelinebreak
– oh notte, oh silenzio, oh strepito silenzioso come la morte!\dots{}\forcelinebreak
Io vedo un segno –,\forcelinebreak
dalle più remote lontananze\forcelinebreak
– cala verso di me lenta, scintillante una costellazione\dots{}
Supremo astro dell’essere!\forcelinebreak
Tavola di eterne immagini!\forcelinebreak
\emph{tu} vieni a me? –\forcelinebreak
Ciò che nessuno ha scorto,\forcelinebreak
la tua muta bellezza, –\forcelinebreak
come? non fugge essa dinanzi ai miei sguardi?
Stemma della necessità!\forcelinebreak
Tavola di eterne immagini!\forcelinebreak
– ma tu lo sai:\forcelinebreak
ciò che tutti odiano,\forcelinebreak
ciò che \emph{io} solo amo,\forcelinebreak
che tu sei \emph{eterno}!\forcelinebreak
che tu sei \emph{necessario}!\forcelinebreak
Il mio amore si accende in eterno\forcelinebreak
solo alla fiamma della necessità.
Stemma della necessità!\forcelinebreak
Supremo astro dell’essere!\forcelinebreak
– che nessun desiderio raggiunge,\forcelinebreak
che nessun no imbratta,\forcelinebreak
eterno sì dell’essere,\forcelinebreak
eternamente sono io il tuo sì:\forcelinebreak
\emph{perché io ti amo}, \emph{oh eternità}! –
\end{verse}
\chapter{Della povertà del più ricco}
\begin{verse}
Passarono dieci anni –\forcelinebreak
non una goccia mi giunse,\forcelinebreak
né vento umido, né rugiada d’amore\forcelinebreak
– una terra \emph{senza pioggia}\dots{}\forcelinebreak
Ora prego la mia saggezza\forcelinebreak
di non farsi avida in questa aridità:\forcelinebreak
trabocca, stilla tu stessa rugiada\forcelinebreak
sii tu stessa pioggia alla selva ingiallita!
Ordinai un tempo alle nubi\forcelinebreak
di andar via dai miei monti –\forcelinebreak
dissi un tempo «più luce, voi oscure!»\forcelinebreak
Oggi le attiro perché vengano:\forcelinebreak
fate buio intorno a me con le vostre mammelle!\forcelinebreak
– voglio mungervi\forcelinebreak
voi, mucche superne.\forcelinebreak
Riverso su questa terra\forcelinebreak
calda saggezza di latte,\forcelinebreak
dolce rugiada d’amore.
Via, via, voi verità\forcelinebreak
che oscure guardate!\forcelinebreak
Non voglio vedere sui miei monti\forcelinebreak
verità acerbe, impazienti.\forcelinebreak
Indorata dal sorriso\forcelinebreak
mi si avvicini oggi la verità,\forcelinebreak
addolcita dal sole, brunita dall’amore –\forcelinebreak
coglierò dall’albero solo una verità \emph{matura}.
Oggi tendo la mano\forcelinebreak
verso le chiome del caso,\forcelinebreak
saggio abbastanza per condurlo,\forcelinebreak
simile a un bimbo, e ingannarlo.\forcelinebreak
Oggi voglio essere ospitale\forcelinebreak
verso ciò che è sgradito,\forcelinebreak
con il destino stesso non voglio essere spinoso\forcelinebreak
– non è un riccio Zarathustra.
La mia anima,\forcelinebreak
con la sua lingua insaziabile,\forcelinebreak
ha già leccato ogni cosa buona e cattiva,\forcelinebreak
si è immersa in ogni profondità.\forcelinebreak
Ma sempre, simile al sughero,\forcelinebreak
essa torna a nuotare in superficie,\forcelinebreak
volteggia giocando come olio su mari bruni:\forcelinebreak
in virtù di questa anima mi si chiama beato.
Chi mi è padre, chi madre?\forcelinebreak
Mi è padre il principe abbondanza\forcelinebreak
e mi è madre il quieto ridere?\forcelinebreak
Non generò l’unione di costoro\forcelinebreak
me, animale enigmatico,\forcelinebreak
me, demone della luce,\forcelinebreak
me, dissipatore di tutta la saggezza, Zarathustra?
Malato, oggi di tenerezza,\forcelinebreak
un vento di disgelo,\forcelinebreak
siede in attesa Zarathustra, in attesa sui suoi monti, –\forcelinebreak
nella sua stessa linfa
teso dolce e cotto,\forcelinebreak
sotto la sua vetta\forcelinebreak
sotto il suo ghiaccio,\forcelinebreak
stanco e felice,\forcelinebreak
un creatore nel suo settimo giorno.
– Silenzio!\forcelinebreak
Una verità vaga sopra di me\forcelinebreak
come una nube –\forcelinebreak
con invisibili folgori mi coglie. Su\forcelinebreak
ampie, lente scalinate\forcelinebreak
sale la sua fortuna verso di me:\forcelinebreak
vieni, vieni, amata verità!
– Silenzio! –\forcelinebreak
È la \emph{mia} verità! –\forcelinebreak
Da occhi esitanti,\forcelinebreak
da vellutati brividi\forcelinebreak
il suo sguardo mi coglie,\forcelinebreak
ridente, malvagio, uno sguardo di fanciulla\dots{}\forcelinebreak
Essa indovinò il \emph{fondo} della mia felicità,\forcelinebreak
\emph{mi} indovinò – ah! che cosa trama? –\forcelinebreak
Sta un drago purpureo in agguato\forcelinebreak
nell’abisso del suo sguardo di fanciulla.
– Silenzio! Parla la mia verità! –
Guai a te, Zarathustra!\forcelinebreak
Hai l’aspetto di uno\forcelinebreak
che abbia inghiottito oro:\forcelinebreak
ti squarceranno il ventre!\dots{}\forcelinebreak
Sei troppo ricco,\forcelinebreak
corruttore di molti!\forcelinebreak
Troppi rendi invidiosi,\forcelinebreak
troppi poveri\dots{}\forcelinebreak
Su me pure getta ombra la tua luce –\forcelinebreak
rabbrividisco: va’ via, tu ricco,\forcelinebreak
va’, Zarathustra, via dal tuo sole!\dots{}
Vorresti donare, dare via la tua abbondanza,\forcelinebreak
ma sei tu stesso il più superfluo!\forcelinebreak
Sii saggio, ricco!\forcelinebreak
\emph{Dona via prima te stesso}, o Zarathustra!
Passarono dieci anni –\forcelinebreak
e non una goccia ti raggiunse?\forcelinebreak
né vento umido né rugiada d’amore?\forcelinebreak
Ma \emph{chi} dovrebbe amarti,\forcelinebreak
tu troppo ricco?\forcelinebreak
La tua fortuna inaridisce all’intorno,\forcelinebreak
rende poveri d’amore\forcelinebreak
– una terra \emph{senza pioggia}\dots{}
Nessuno più ti ringrazia.\forcelinebreak
Ma tu ringrazi chiunque\forcelinebreak
prenda da te:\forcelinebreak
da ciò ti riconosco,\forcelinebreak
tu troppo ricco,\forcelinebreak
\emph{il più povero} dei ricchi!
Tu ti sacrifichi, ti \emph{tormenta} la tua ricchezza –,\forcelinebreak
ti dedichi,\forcelinebreak
non ti risparmi, non ti ami:\forcelinebreak
tarde tormento sempre ti stringe,\forcelinebreak
il tormento di granai \emph{traboccanti}, di un cuore traboccante –\forcelinebreak
ma nessuno più ti ringrazia\dots{}
Devi farti \emph{più povero},\forcelinebreak
saggio insipiente!\forcelinebreak
se vuoi essere amato.\forcelinebreak
Solo chi soffre è amato,\forcelinebreak
solo a chi ha fame si dà amore:\forcelinebreak
\emph{Dona via prima te stesso}, o Zarathustra!
– Io sono la tua verità\dots{}
\end{verse}
% begin final page
\clearpage
% new page for the colophon
\thispagestyle{empty}
\begin{center}
\bigskip
\includegraphics[width=0.25\textwidth]{anarchismologo.pdf}
\bigskip
\end{center}
\strut
\vfill
\begin{center}
Friedrich Nietzsche
Ditirambi di Dioniso
\bigskip
Prima edizione: novembre 2013\forcelinebreak Opuscoli provvisori N. 50
\bigskip
\textbf{www.edizionianarchismo.net}
\end{center}
% end final page with colophon
\end{document}
|
http://ftp.twaren.net/Unix/TeX/CTAN/fonts/vicentino/kilfiger/testvic.tex | twaren.net | CC-MAIN-2023-06 | text/x-tex | application/x-tex | crawl-data/CC-MAIN-2023-06/segments/1674764500384.17/warc/CC-MAIN-20230207035749-20230207065749-00670.warc.gz | 13,221,683 | 887 | \documentclass{article}
\usepackage{vicent}
\begin{document}
\Large\raggedright
\textcursive{This is the `cursive' shape, \textbf{in Bold series}
The Quick Brown Fox Jumps Over The Lazy Dog.}
\textmodernscript{This is the `modern script' shape, \textbf{in Bold
series} The Quick Brown Fox Jumps Over The Lazy Dog.}
\texttwist{This is the `twist' shape \textbf{in Bold
series} The Quick Brown Fox Jumps Over The Lazy Dog.}
%example of using low level font selection to get a swash `r'
\raggedleft{\LARGE\fontfamily{vc}\fontshape{ui}\selectfont
James Kilfige\fontshape{its}\selectfont r }
\end{document}
|
https://www.zentralblatt-math.org/matheduc/en/?id=236&type=tex | zentralblatt-math.org | CC-MAIN-2019-26 | text/plain | application/x-tex | crawl-data/CC-MAIN-2019-26/segments/1560627999853.94/warc/CC-MAIN-20190625152739-20190625174739-00234.warc.gz | 1,004,010,083 | 1,334 | \input zb-basic
\input zb-matheduc
\iteman{ZMATH 2016f.01354}
\itemau{Ju, Mi-Kyung; Moon, Jong-Eun; Song, Ryoon-Jin}
\itemti{History of mathematics in Korean mathematics textbooks: implication for using ethnomathematics in culturally diverse school.}
\itemso{Int. J. Sci. Math. Educ. 14, No. 7, 1321-1338 (2016).}
\itemab
Summary: From a multicultural perspective, this research investigated to what extent Korean mathematics textbooks use history of mathematics. The results show even though educational use of history presented in Korean mathematics textbooks may provide a rich outlook, it does not encourage a fundamental change in the educational practice of school mathematics that has traditionally been entrenched in the Eurocentric narrative of mathematics. This suggests that the mathematics textbooks were not organized effectively to promote students' understanding of diversity. Based on the results, we discuss the implications for the development of mathematics textbook from multicultural perspectives.
\itemrv{~}
\itemcc{U20 D30 A30 C60}
\itemut{diversity; ethnomathematics; equity; history of mathematics; multicultural competence}
\itemli{doi:10.1007/s10763-015-9647-0}
\end |
https://www.hep.princeton.edu/~mcdonald/mumu/palmer/pr_88.tex | princeton.edu | CC-MAIN-2022-21 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2022-21/segments/1652662525507.54/warc/CC-MAIN-20220519042059-20220519072059-00641.warc.gz | 929,358,642 | 1,700 | \section{NEUTRINO RADIATION}
It has been shown\cite{ref41} that the surface radiation dose $D_B(Sv)$
at a time $t(s)$, in the plane of a bending magnet of field B(T), in
a circular collider with beam energy $E(TeV)$, average bending field
$<B(T)>$, at a depth $d(m)$ (assuming a spherical earth), with muon
current (of each sign) of $I\textrm{(muons/sec/sign)}$ is given by:
$$
D_B\ \approx\ 4.4\ 10^{-24}\ {I_\mu \ E^3\ t \over d}\ {<B> \over B}\ t
$$
and that the dose $D_S$ at a location on the surface, in line with a high
beta straight section of length $\ell$ is:
$$
D_S\ \approx\ 6.7\ 10^{-24}\ {I_\mu \ E^3\ t \over d}\ {\ell <B>}\ t
$$
The first formula has been confirmed by a Monte Carlo simulation using
the MARS code\cite{mokhovrad}.
In all cases it is assumed that the average divergence angles satisfy the
condition: $\sigma_\theta << {1\over \gamma}.$
This condition is not satisfied in the straight sections approaching the IP,
and these regions, despite their length, do not contribute a significant dose.
For the 3 TeV parameters given in Tb.~\ref{sum} (muon currents
$I=6\times 10^{20}\,\mu^-/yr,$ $<B>= 6\, T,$ $B= 10\, T,$ and taking the federal limit on off site
radiation Dose/year, $D_{Fed}$ to be 1 mSv/year (100 mrem/year), then the
dose $D_B$ per year (defined as $10^7$ s), in the plane of a bending dipole
is:
$$
D_B = 1.07 \ 10^{-5}\ \ (\textrm{Sv})\ \approx 1 \% \ D_{Fed}
$$
and for a straight section of length 0.6 m is:
$$
D_B = 9.7 \ 10^{-5}\ \ (\textrm{Sv})\ \approx 10 \% \ D_{Fed}
$$
which may be taken to be a reasonable limit.
Special care will be required in the lattice design to assure that no
field free region longer than this is present. But it may be noted that the
presence of a field of even 1 T over any length, is enough to reduce the dose to the 10
\% Federal limit standard. For machines above 3 TeV, the muon current would probably have to be reduced.
For lower energy machines, the requirements get rapidly easier: a 0.5
TeV machine at 500 m depth could have 130 m straight sections, or if at 100 m depth
25 m lengths, for the same surface dose. For a 100 GeV machine the doses are
negligible.
|
https://anorien.csc.warwick.ac.uk/CTAN/fonts/ps-type1/starfont/starfont.tex | warwick.ac.uk | CC-MAIN-2023-14 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2023-14/segments/1679296945368.6/warc/CC-MAIN-20230325161021-20230325191021-00530.warc.gz | 126,905,141 | 3,939 | \documentclass{article}
\usepackage{starfont}
\usepackage{url}
\usepackage{hyperref}
\newcommand{\showboth}[1]{\starfontsans #1 & \starfontserif #1}
\begin{document}
\title{The \texttt{starfont} package for \LaTeX, version 1.2}
\author{Matthew Skala\thanks{\url{mailto:[email protected]}}}
\date{29 September 2010}
\maketitle
\section{Introduction}
This package is designed to provide two fonts named StarFont Sans and
StarFont Serif in \LaTeX. These fonts contain a wide variety of glyphs
suitable for typesetting astrological documents. Astrological support in
previous \LaTeX\ packages is inadequate for a number of reasons that include
incomplete coverage of the popular glyph set, inconsistent style between
glyphs that need to work well when used together, simply ugly glyphs, wide
variation in widths of glyphs (which makes trouble in tables), no
availability in outline form to make well-behaved PDFs, and so on. These
glyphs aren't perfect either, but they are certainly the best ones I've
found for typesetting astrological material in \LaTeX.
Given the typical use of \LaTeX\ in the scientific community and the
relationship between the scientific community and astrology, it amuses me to
have \LaTeX\ used for astrology. It's also convenient because I write both
astrological and scientific documents and want to use the same tools for
both.
This is version 1.2 of the package, adding support for StarFont Serif and
changing the commentary on copying restrictions now that it's confirmed the
fonts are public domain. Version 1.1 dated from 29~June 2006; version 1.0
was never widely distributed but first existed around 2003 or 2004.
The fonts were designed, and distributed in TrueType form, by
Anthony~I.P. Owen. The packaging for TeX and LaTeX was done by Matthew
Skala. Both these authors have released their contributions to the public
domain. As such, the contents of this package are provided ``as is,'' with
no warranties. See the file \texttt{COPYING} for more information.
\section{Using \texttt{starfont}}
Install the fonts. Installing fonts is a black art; I have included, in the
\texttt{README} file, hints on where to put the files involved, but I do not
really understand how \LaTeX\ (and \TeX, and \texttt{dvips}, and so on)
finds font files and I cannot give meaningful instruction to others on it.
The fonts should end up installed with the names ``\texttt{fstr8x}'' for
StarFont Sans, and `\texttt{fsts8x}'' for StarFont Serif. The
\texttt{starfont} package defines NFSS families named ``\texttt{stf}'' and
`\texttt{sts}''. The general approach used imitates the way the
\texttt{marvosym} package works, and this package is to some degree
compatible with \texttt{marvosym}.
StarFont Sans is the default and recommended choice; I believe it mixes
better with other fonts typically used in \LaTeX\ documents. However, the
StarFont Serif version is also available via the \texttt{starfontserif}
package option. A corresponding \texttt{starfontsans} option will be
accepted for clarity but has no actual effect because the Sans version is
default anyway. These options have verbose names to make it easier for them
to inherit from a higher-level package like my \texttt{horoscop} package.
You can also switch between the two styles inside a document using the
\verb|\starfontsans| and \verb|\starfontserif| macros; each of these will
change the mode for any subsequent uses of the character macros below. Both
are shown in the sample tables below.
\subsection{Luminaries and traditional planets}
Here are the basics:
\begin{tabular}{llll|llll}
\verb|\Sun| & \showboth{\Sun} & Sun &
\verb|\Jupiter| & \showboth{\Jupiter} & Jupiter \\
\verb|\Moon| & \showboth{\Moon} & Moon &
\verb|\Saturn| & \showboth{\Saturn} & Saturn \\
\verb|\Mercury| & \showboth{\Mercury} & Mercury &
\verb|\Uranus| & \showboth{\Uranus} & Uranus \\
\verb|\Venus| & \showboth{\Venus} & Venus &
\verb|\Neptune| & \showboth{\Neptune} & Neptune \\
\verb|\Terra| & \showboth{\Terra} & Earth (planet) &
\verb|\Pluto| & \showboth{\Pluto} & Pluto \\
\verb|\Mars| & \showboth{\Mars} & Mars
\end{tabular}
The planet Earth is referred to as ``Terra'' in the command name to
prevent a collision with the glyph for the element Earth. Since the
element is much more commonly referred to in astrology than the
planet, it takes precedence for the more straightforward name. There
are also variants of some of these glyphs:
\begin{tabular}{llll|llll}
\verb|\varMoon| & \showboth{\varMoon} & Moon &
\verb|\varUranus| & \showboth{\varUranus} & Uranus \\
\verb|\varTerra| & \showboth{\varTerra} & Earth (planet) &
\verb|\varPluto| & \showboth{\varPluto} & Pluto
\end{tabular}
\subsection{Signs of the zodiac}
\begin{tabular}{llll|llll}
\verb|\Aries| & \showboth{\Aries} & Aries &
\verb|\Libra| & \showboth{\Libra} & Libra \\
\verb|\Taurus| & \showboth{\Taurus} & Taurus &
\verb|\Scorpio| & \showboth{\Scorpio} & Scorpio \\
\verb|\Gemini| & \showboth{\Gemini} & Gemini &
\verb|\Sagittarius| & \showboth{\Sagittarius} & Sagittarius \\
\verb|\Cancer| & \showboth{\Cancer} & Cancer &
\verb|\Capricorn| & \showboth{\Capricorn} & Capricorn \\
\verb|\Leo| & \showboth{\Leo} & Leo &
\verb|\Aquarius| & \showboth{\Aquarius} & Aquarius \\
\verb|\Virgo| & \showboth{\Virgo} & Virgo &
\verb|\Pisces| & \showboth{\Pisces} & Pisces
\end{tabular}
The command
\verb|\varCapricorn| produces ``\varCapricorn'' or
``\starfontserif\varCapricorn,'' a variant symbol for
Capricorn. This package also
provides a \verb|\Zodiac| command similar to the one in \texttt{marvosym}:
\verb|\Zodiac{1}|\ldots\verb|\Zodiac{12}| produce
\starfontsans\Zodiac{1}\ldots\Zodiac{12} or
\starfontserif\Zodiac{1}\ldots\Zodiac{12}.
\subsection{Asteroids}
\begin{tabular}{llll|llll}
\verb|\Ceres| & \showboth{\Ceres} & Ceres &
\verb|\Amor| & \showboth{\Amor} & Amor \\
\verb|\Pallas| & \showboth{\Pallas} & Pallas &
\verb|\Eros| & \showboth{\Eros} & Eros \\
\verb|\Juno| & \showboth{\Juno} & Juno &
\verb|\Hidalgo| & \showboth{\Hidalgo} & Hidalgo \\
\verb|\Vesta| & \showboth{\Vesta} & Vesta &
\verb|\Hygiea| & \showboth{\Hygiea} & Hygiea \\
\verb|\Chiron| & \showboth{\Chiron} & Chiron &
\verb|\Psyche| & \showboth{\Psyche} & Psyche \\
& & & & \verb|\Sappho| & \showboth{\Sappho} & Sappho
\end{tabular}
\subsection{Uranian hypothetical planets}
\begin{tabular}{llll|llll}
\verb|\Cupido| & \showboth{\Cupido} & Cupido &
\verb|\Apollon| & \showboth{\Apollon} & Apollon \\
\verb|\Hades| & \showboth{\Hades} & Hades &
\verb|\Admetos| & \showboth{\Admetos} & Admetos \\
\verb|\Zeus| & \showboth{\Zeus} & Zeus &
\verb|\Vulkanus| & \showboth{\Vulkanus} & Vulkanus \\
\verb|\Kronos| & \showboth{\Kronos} & Kronos &
\verb|\Poseidon| & \showboth{\Poseidon} & Poseidon
\end{tabular}
\subsection{Derived points}
\begin{tabular}{llll|llll}
\verb|\NorthNode| & \showboth{\NorthNode} & North~Node &
\verb|\SouthNode| & \showboth{\SouthNode} & Sout~Node \\
\verb|\Lilith| & \showboth{\Lilith} & Lilith &
\verb|\Fortune| & \showboth{\Fortune} & Fortune
\end{tabular}
\subsection{Aspects}
\begin{tabular}{llll|llll}
\verb|\Conjunction| & \showboth{\Conjunction} & Conjunction &
\verb|\Quincunx| & \showboth{\Quincunx} & Quincunx \\
\verb|\Opposition| & \showboth{\Opposition} & Opposition &
\verb|\Semisextile| & \showboth{\Semisextile} & Semisextile \\
\verb|\Trine| & \showboth{\Trine} & Trine &
\verb|\Semisquare| & \showboth{\Semisquare} & Semisquare \\
\verb|\Square| & \showboth{\Square} & Square &
\verb|\Sesquiquadrate| & \showboth{\Sesquiquadrate} & Sesquiquadrate \\
\verb|\Sextile| & \showboth{\Sextile} & Sextile
\end{tabular}
\subsection{Angles}
\begin{tabular}{llll|llll}
\verb|\ASC| & \showboth{\ASC} & Ascendant &
\verb|\DSC| & \showboth{\DSC} & Descendant \\
\verb|\MC| & \showboth{\MC} & Midheaven &
\verb|\IC| & \showboth{\IC} & Nadir \\
& & & (Medium C\oe li) & & & & (Imum C\oe li) \\
\verb|\Vertex| & \showboth{\Vertex} & Vertex &
\verb|\EastPoint| & \showboth{\EastPoint} & East Point
\end{tabular}
\subsection{Directions}
\begin{tabular}{llll|llll}
\verb|\Retrograde| & \showboth{\Retrograde} & Retrograde &
\verb|\Station| & \showboth{\Station} & Station \\
\verb|\Direct| & \showboth{\Direct} & Direct
\end{tabular}
\subsection{Elements}
\begin{tabular}{llll|llll}
\verb|\Fire| & \showboth{\Fire} & Fire &
\verb|\Earth| & \showboth{\Earth} & Earth (element) \\
\verb|\Air| & \showboth{\Air} & Air &
\verb|\Water| & \showboth{\Water} & Water
\end{tabular}
\subsection{Other symbols}
\begin{tabular}{llll|llll}
\verb|\Natal| & \showboth{\Natal} & Natal &
\verb|\Radix| & \showboth{\Radix} & Radix \\
\verb|\Pentagram| & \showboth{\Pentagram}
\end{tabular}
There are many other symbols in the font which I don't recognize,
including a bunch that are probably from Cosmobiology. It should be
possible to add them easily enough by following the examples in
\texttt{starfont.sty}. There is an encoding table (made by
\texttt{testfont.tex}) provided in the file \texttt{table.pdf}. I
would appreciate hearing from readers who know of good names for the
unknown symbols.
\end{document}
|
https://dlmf.nist.gov/2.10.E11.tex | nist.gov | CC-MAIN-2020-29 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2020-29/segments/1593657138718.61/warc/CC-MAIN-20200712113546-20200712143546-00185.warc.gz | 375,921,651 | 748 | \[S(\alpha,\beta,n)=\sum_{j=1}^{n-1}e^{ij\beta}j^{\alpha},\] |
http://www.mathematik.tu-dortmund.de/lsiii/cms/bibtex/40001043.tex | tu-dortmund.de | CC-MAIN-2023-14 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2023-14/segments/1679296949678.39/warc/CC-MAIN-20230331175950-20230331205950-00589.warc.gz | 78,858,977 | 923 | <br />
<b>Strict Standards</b>: Non-static method BibtexComponent::generateBibtex() should not be called statically, assuming $this from incompatible context in <b>/web/www/webdev1/nobackup/database/apache/wei/fomcms/apps/cms/controllers/cms_controller.php</b> on line <b>625</b><br />
@TECHREPORT{Reimer1976,
author = {Reimer, M.},
title = {Auswertungsalgorithmen bester numerischer Stabilit\"{a}t f\"{u}r Poynome},
year = {1976},
institution = {Fakult\"{a}t f\"{u}r Mathematik, TU Dortmund},
note = {Ergebnisberichte des Instituts f\"{u}r Angewandte Mathematik, Nummer 002},
}
|
http://barsamian.am/2de/TP1_Fete_maximum.tex | barsamian.am | CC-MAIN-2019-09 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2019-09/segments/1550247511174.69/warc/CC-MAIN-20190221213219-20190221235219-00254.warc.gz | 23,705,318 | 2,263 | \documentclass[a4paper,11pt]{article}
\setlength{\textwidth } {17cm}
\setlength{\textheight } {25cm}
\addtolength{\topmargin}{-2.50cm}
\setlength{\oddsidemargin} {-.81cm}
\setlength{\evensidemargin} {-0.01cm}
\usepackage[latin1]{inputenc}
\usepackage[french]{babel}
\usepackage{graphicx}
\usepackage{amsfonts, amsmath}
\pagestyle{empty}
\usepackage{eurosym}
\DeclareInputText{128}{\euro}% on assigne \EUR à €
\begin{document}
\newcommand{\hbra}{
\hbox to .998\textwidth{\vrule width 0.3mm height 1.8mm depth-0.3mm
\leaders\hrule height1.8mm depth-1.5mm\hfill
\vrule width 0.3mm height 1.8mm depth-0.3mm}}
\newcommand{\hket}{
\hbox to .998\textwidth{\vrule width0.3mm height1.5mm
\leaders\hrule height0.3mm\hfill
\vrule width0.3mm height1.5mm}}
\renewcommand{\labelitemi}{$\bullet$}
\renewcommand{\labelitemii}{$\diamond$}
\noindent Algorithmique : travail en groupe \hfill Lundi 20 février 2012\\
Voici un algorithme rédigé en français pour l'organisation de l'anniversaire de Sophie. Les phrases qui sont précédées de "//" sont des commentaires qui ne sont là que pour aider à la compréhension.
\begin{center}
\begin{minipage}{\textwidth}
\textbf{Une soirée d'anniversaire.}\\[-.8ex]
\begin{footnotesize}
\begin{tabular}{llll}
\multicolumn{4}{c}{\hbra}\\
\multicolumn{4}{l}{Variables :}\\
\multicolumn{4}{l}{$invites$ est un entier.}\\
\multicolumn{4}{l}{$cout$ est un entier.}\\
\multicolumn{4}{l}{$horaire$ est une heure.}\\
& & &\\
\multicolumn{4}{l}{Corps de l'algorithme :}\\
1 & \multicolumn{3}{l}{$invites$ {\bf prend la valeur} 3}\\
2 & \multicolumn{3}{l}{$cout$ {\bf prend la valeur} 200}\\
3 & \multicolumn{3}{l}{$horaire$ {\bf prend la valeur} $19^h30$}\\
4 & {\bf Si} & \multicolumn{2}{l}{$horaire \geq 19^h00$}\\
5 & & {\bf Alors} & $invites$ {\bf prend la valeur} $invites + 1$\\
6 & & & \textit{// Y. ne vient que si la fête commence après $19^h$.}\\
7 & & {\bf Sinon} & $cout$ {\bf prend la valeur} $cout + 50$\\
8 & & & \textit{// Il doit rapporter la boisson ; s'il ne vient pas, il faut l'acheter.}\\
9 & \multicolumn{3}{l}{{\bf Fin\_Bloc\_Si}}\\
10 & {\bf Si} & \multicolumn{2}{l}{$horaire \geq 19^h30$}\\
11 & & {\bf Alors} & $invites$ {\bf prend la valeur} $invites + 2$\\
12 & & & \textit{// J. \& A. ne viennent que si la fête commence après $19^h30$.}\\
13 & & {\bf Sinon} & $cout$ {\bf prend la valeur} $cout + 80$\\
14 & & & \textit{// Ils doivent rapporter le dessert ; s'ils ne viennent pas, il faut l'acheter.}\\
15 & \multicolumn{3}{l}{{\bf Fin\_Bloc\_Si}}\\
16 & {\bf Si} & \multicolumn{2}{l}{$horaire \geq 20^h00$}\\
17 & & {\bf Alors} & $invites$ {\bf prend la valeur} $invites + 2$\\
18 & & & \textit{// M. \& L. ne viennent que si la fête commence après $20^h$.}\\
19 & & {\bf Sinon} & $cout$ {\bf prend la valeur} $cout + 70$\\
20 & & & \textit{// Ils doivent rapporter l'entrée ; s'ils ne viennent pas, il faut l'acheter.}\\
21 & \multicolumn{3}{l}{{\bf Fin\_Bloc\_Si}}\\
22 & \multicolumn{3}{l}{{\bf Afficher le message} "Ce soir il y aura "}\\
23 & \multicolumn{3}{l}{{\bf Afficher la variable} $invites$}\\
24 & \multicolumn{3}{l}{{\bf Afficher le message} " invités à l'anniversaire de Sophie. La fête coûtera "}\\
25 & \multicolumn{3}{l}{{\bf Afficher la variable} $cout$}\\
26 & \multicolumn{3}{l}{{\bf Afficher le message} " €."}\\
\multicolumn{4}{c}{\hket}\\
\end{tabular}
\end{footnotesize}
\end{minipage}
\end{center}
\begin{enumerate}
\item Transcrire dans Algobox l'algorithme \og Une soirée d'anniversaire \fg. Qu'affiche le programme quand on le lance ?
\item Le tableau ci-après montre les valeurs des variables $invites$ et $cout$ au fil de l'algorithme. Il y a une nouvelle ligne à chaque fois qu'une de ces valeurs change. Ainsi, à la ligne 1, la valeur de la variable $invites$ est changée en 3 ; à la ligne 2, la valeur de la variable $cout$ est changée en 200. A la ligne 3, ces deux valeurs ne changent pas. Reproduire et terminer ce tableau. En déduire le nombre d'invités et le coût de la fête.
\begin{tabular}{|l|l|l|}
\hline
& $invites$ & $cout$\\
\hline
Ligne 1 & 3 & -\\
\hline
Ligne 2 & 3 & 200\\
\hline
... & ... & ...
\end{tabular}
\item Ecrire en français un algorithme avec trois variables : un nombre $a$, un nombre $b$ et un nombre $maximum$. Les nombres $a$ et $b$ sont donnés en entrée à l'algorithme (par ex. en Algobox avec "Lire variable"), et l'algorithme doit alors enregistrer dans la variable $maximum$ le maximum des deux nombres $a$ et $b$. Il doit enfin afficher le message "Le maximum des deux nombres est : " suivi de la valeur de la variable $maximum$.
\end{enumerate}
\end{document}
|
http://pcfm-ma.iecl.univ-lorraine.fr/communication-2.tex | univ-lorraine.fr | CC-MAIN-2018-43 | text/x-tex | text/x-matlab | crawl-data/CC-MAIN-2018-43/segments/1539583509690.35/warc/CC-MAIN-20181015184452-20181015205952-00103.warc.gz | 276,177,147 | 2,725 | %%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
% PRIERE DE NE RIEN MODIFIER CI-DESSOUS %
% JUSQU'A LA LIGNE "PRIERE DE NE RIEN MODIFIER CI-DESSUS" %
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\documentclass[10pt]{article}
\usepackage{graphicx} % pour d'eventuelles figures
\usepackage{epsfig} % (preferer graphicx, si possible)
\usepackage{amsmath} % AMSTEX
\usepackage{amsfonts}
\usepackage{xcolor}
\usepackage{fancyhdr}
\usepackage{fancybox}
\fancyput(0.00cm,2.00cm){ \Large{
\textcolor{gray!60}{
\textsc{Premier Congr\`es Franco-Marocain de Math\'ematiques Appliqu\'ees}
}}}
%
\setlength{\paperheight}{297mm}\setlength{\paperwidth}{210mm}
\setlength{\oddsidemargin}{10mm}\setlength{\evensidemargin}{10mm}
\setlength{\topmargin}{0mm}\setlength{\headheight}{10mm}\setlength{\headsep}{8mm}
\setlength{\textheight}{240mm}\setlength{\textwidth}{160mm}
\setlength{\marginparsep}{0mm}\setlength{\marginparwidth}{0mm}
\setlength{\footskip}{10mm}
\voffset -13mm\hoffset -10mm\parindent=0cm
\def\titre#1{\begin{center}{\Large{ \sf
#1}}\end{center}}
\def\orateur#1#2{\begin{center}{{\large{\sc
#1}}}, {#2}\end{center}}
\def\orateurAdr#1#2{\begin{center}{{\large{\it
#1}}}, {#2}\end{center}}
\def\auteur#1#2{\begin{center}{{\large{\sc
#1}}}, {#2}\end{center}}
\def\auteurAdr#1#2{\begin{center}{{\large{\it
#1}}}, {#2}\end{center}}
\def\auteurenbasdepage#1#2#3{\small{\bf #1}, \small{#2}\\ \small{\tt #3}\\ }
\def\motscles#1{%
\ifx#1\IsUndefined\relax\else\noindent{\normalsize{\bf Mots-cl\'es :}} #1\\ \fi}
\renewcommand{\refname}{\normalsize R\'ef\'erences}
%
\thispagestyle{empty}
\begin{document}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
% PRIERE DE NE RIEN MODIFIER CI-DESSUS %
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
%
% DANS TOUTE LA SUITE NOUS PRIONS LES AUTEURS DE BIEN VOULOIR UTILISER
% LA SYNTAXE TeX STRICTE POUR LES LETTRES ACCENTUEES.
% ON PEUT AU BESOIN LES REMPLACER APR\'ES LA FRAPPE DU DOCUMENT
% PAR LEUR \'EQUIVALENT TeX.
% DANS LE CAS CONTRAIRE LES LETTRES ACCENTU\'ES N'APPARA\^ITRONT PAS
% DANS LE DOCUMENT FINAL.
%
% ORATEUR ET CO-AUTEURS
%---------------------------------------------------------------
%
% LES AUTEURS SONT PRIES DE FOURNIR LES BONS ARGUMENTS AUX MACROS CI-DESSOUS :
% \Titre : Titre de la communication
% \NomOrateur : Pr\'enom(s) NOM de l'Orateur
% \AdresseCourteOrateur : Exemple : Universit\'e de Lorraine
% \AdresseLongueOrateur : Exemple : Universit\'e cadi Ayyad..
% \EmailOrateur : Adresse electronique
%
% ET DE MEME POUR LES EVENTUELS CO-AUTEURS :
% \NomAuteurI ...
% \AdresseCourteAuteurI ...
%---------------------------------------------------------------
% DEFINIR ICI LE TITRE DE VOTRE COMMUNICATION
%\def\Titre{Titre de la communication ici }
\def\Titre{Titre de la communication ici}
%
% DEFINIR ICI LES NOMS, ADRESSES, ... DE l'ORATEUR OU UNIQUE AUTEUR
%\def\NomOrateur{Pr\'enom NOM ici }
%\def\AdresseCourteOrateur{Adresse ici }
%\def\EmailOrateur{Email ici }
\def\NomOrateur{\underline{Pr\'enom NOM}}
\def\AdresseCourteOrateur{Adresse}
\def\EmailOrateur{Email }
%
% DEFINIR ICI LES NOMS, ADRESSES, ... DES EVENTUELS CO-AUTEURS
\def\NomAuteurI{Pr\'enom NOM de co-auteur}
\def\AdresseCourteAuteurI{Adresse de co-auteur}
\def\EmailAuteurI{Email de co-auteur}
%\def\NomAuteurI{En collaboration avec : Pr\'enom NOM ici }
%\def\AdresseCourteAuteurI{Adresse ici}
%\def\EmailAuteurI{Email ici}
%=== et ainsi de suite II, III, IV, V ... pour les suivants
%
%=== Liste des mots-cles separes par des virgules si besoin
% N'enlever le signe % que si necessaire
%\def\listmotcles{mot-cle-1, mot-cle-2, ...}
%
%
% DEBUT DE LA COMMUNICATION
%---------------------------------------------------------------
% NE PAS MODIFIER LA LIGNE SUIVANTE
% Le titre est a definir dans la macro \Titre (23 lignes plus haut)
\titre{\Titre}%
%---------------------------------------------------------------
% TITRE & AUTEUR(S)
% RETIRER LES SIGNES % SI NECESSAIRE ET PLACER DANS L'ORDRE SOUHAITE
% DANS LES LIGNES SUIVANTES NE MODIFIER QUE LES SIGNES COMMENTAIRES '%'
% Les noms, adresses, email de l'orateur et des co-auteurs sont a definir
% dans les macros \NomOrateur, \AdresseCourteOrateur etc. plus haut
%---------------------------------------------------------------
\orateur{\NomOrateur}{}
\orateurAdr{\AdresseCourteOrateur}{}
\orateurAdr{\EmailOrateur}{}
% NE PAS MODIFIER LES 4 LIGNES SUIVANTES sauf a retirer le signe commentaire '%'
\auteur{\NomAuteurI}{}
\auteurAdr{\AdresseCourteAuteurI}{}
\auteurAdr{\EmailAuteurI}{}
%\auteur{\NomAuteurII}{\AdresseCourteAuteurII}
%\auteur{\NomAuteurIII}{\AdresseCourteAuteurIII}
%\auteur{\NomAuteurIV}{\AdresseCourteAuteurIV}
%
\vspace*{1cm}
\noindent {\bf Abstract.}
In the present paper,
\vspace*{0.5cm}
\noindent {\bf Key words:}
%---------------------------------------------------------------
% TEXTE DE LA COMMUNICATION
%---------------------------------------------------------------
\setcounter{equation}{0}
\section{Introduction}
1) Motivation du probl\`eme ; \\
2) Historiques des r\'esultats connus\\ \\
Texte de la communication ici avec ses r\'ef\'erences
bibliographiques \'even\-tuelles \cite{ref1,ref2}.\\
\setcounter{equation}{0}
\section{Main Results}
%*******************************************************************
3) Le(s) nouveau(x) r\'esultat(s) ;\\
4) Des id\'ees de d\'emonstrations ; \\
\section{Conclusion}
...
%---------------------------------------------------------------
% REFERENCES BIBLIOGRAPHIQUES
%---------------------------------------------------------------
% NE PAS MODIFIER LES 2 LIGNES SUIVANTES
\bibliographystyle{plain}
\begin{thebibliography}{99}
\bibitem{ref1} {\sc Auteur}, {\sl Titre}, Editeur, ann\'ee.
\bibitem{ref2} {\sc Auteur}, {\sl Titre}, Revue, r\'ef\'erences, ann\'ee.
% NE PAS MODIFIER LA LIGNE SUIVANTE
\end{thebibliography}
\end{document}
|
http://wicky-math.fr.nf/pdf_2015/courssuites_1S.tex | fr.nf | CC-MAIN-2019-04 | text/x-tex | application/x-tex | crawl-data/CC-MAIN-2019-04/segments/1547583659654.11/warc/CC-MAIN-20190118005216-20190118031216-00537.warc.gz | 251,855,140 | 21,878 | \documentclass[4apaper,10pt,french]{article}
\linespread{1}
\newcommand{\ch}{Chapitre 2}
\newcommand{\Ch}{Les suites, en particulier les suites arithm\'etiques et g\'eom\'etriques}
\newcommand{\Cl}{1S}
\newcommand{\Annee}{2012-2013}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% Package
\input macrodwicky.tex
\geometry{hmargin=2cm,vmargin=2cm}
\setcounter{NumLecon}{2}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% Premiere page
\begin{document}
\ddwicky{separation.eps}{Ashgar Farhadi}{Une séparation} % Image + titre + Auteur
{Si les gens ne croient pas que les mathématiques sont simples, c’est seulement parce qu’ils ne réalisent pas combien la vie est compliquée !}{John Louis von Neumann} % Citation + Auteur
{Asghar Farhadi a fait ses études de théâtre, avec un diplôme du 1er cycle en arts dramatiques et une maîtrise de mise en scène théâtrale à l’Université de Téhéran et l’Université Tarbiat Modarres. Farhadi a tourné des courts métrages de 8 mm et 16 mm au Département de la société du cinéma de jeunesse d’Ispahan avant d’entamer l’écriture des pièces de théâtre et des scénarios pour la télévision iranienne, IRIB. Danse dans la poussière est son premier film réalisé, suivi par le film acclamé par les critiques, Les enfants de Belle Ville. Son troisième film, La Fête du feu obtient le Hugo d'or au Festival international du film de Chicago en 2006.
À propos d'Elly, pour lequel il reçoit l’Ours d'argent du meilleur réalisateur à Berlin en 2009, prend pour sujet le voyage d’un groupe d’Iraniens au bord de la mer Caspienne tournant à la catastrophe. En 2011, Farhadi revient à la Berlinale pour y présenter Une séparation. Le film gagne l'Ours d'or et les Prix d'interprétation féminine et masculine pour l'ensemble de la distribution. Puis il reçoit, en 2012, le Golden Globe, le César et l'Oscar du meilleur film étranger.
} % Présentation auteur
{0.25} % Ratio portrait
{0.3} % Ratio Image
{
\item Calculer les termes d'une suite générée par récurrence.
\item Construire et exploiter la représentation graphique d'une suite définie par récurrence
\item Algorithme
}
\TITRE{fibo.eps}{0.5} % Image 1ere page + ratio
%\begin{abstract}
\begin{Intro}{Au fil du temps}{
Vous allez dans ce chapitre, découvrir les suites, qui sont présentes dans bien des sciences, par exemple en biologie
des populations pour décrire le cycle de reproduction des lapins, en astronomie dans les loirs de répartition
des planètes, en physique dans la théorie des particules élémentaires, en informatique dans les algorithmes
et simulations (et via les ordinateurs, dans toutes nos activités numériques). Mais cette omniprésence n'est pas
un hasard, car tous ces domaines se servent d'équations mathématiques. Or les suites occupent une place de choix
en mathématiques depuis plus de 2000 ans.\\
Pourquoi un tel intêret, alors qu'il s'agit simplement de ranger une succession de nombres liés par un loi, comme
quand on énumère les jours du mois ? Parce que cette simplicité n'est qu'apparente : l'étrange n'est jamais loin.\\
Prenons par exemple la suite des \og puissances de un demi \fg : $1 ; \dfrac12 ; \dfrac14 ; \dfrac18 ; \dfrac1{16} ; \dots ; \dfrac1{2n} ; \dots$
et la série associée $1 + \dfrac12 + \dfrac14 + \dfrac18 + \dfrac1{16} + \dots + \dfrac1{2n} + \dots$ Si ces nombres
représentaient des tiges en bois mesurant chacune la moitié de la précédente (en commençant par 1 mètre), n'est-ce
pas étonnant que la longueur maximale qu'on puisse atteindre en les mettant bout à bout ne dépasse pas 2 mètres,
même avec une infinité de tiges ? Cela a stupéfait les savants qui l'ont découvert au $XVIII^e$ siècle.
Comment admettre que l'infini (le nombre de tiges) puisse être contenu dans le fini (2 mètres) ?
Il s'en est suivi de violentes disputes entre les pro-infini et les contre, qui n'ont fait que s'amplifier
jusqu'au $XX^e$ siècle. Bref, ce sont les suites qui ont introduit l'infini dans l'arithmétique et l'analyse ...\\
Mais si le $XVIII^e$ siècle est un tournant dans l'histoire des suites et de l'infini, leur origine remonte à Archimède
de Syracuse, le mathématicien grec du $III^e$ siècle avant JC. Archimède voulait résoudre une question qui n'avait rien
à voir avec l'infini, le problème de la quadrature du cercle, grande énigme des maths anciennes : étant donné un cercle,
comment construire une figure de même surface mais composée de carrés ou de triangles (figures que les Grecs savaient
bien mesurer). Tel était le but d'Archimède ... Mais à la place, il a découvert les suites et, sans le savoir,
il a mis les mathématiciens sur la voie de l'infini.\\
Comment cela s'est-il produit ? Archimède pensait que la bonne méthode pour \og quarrer \fg le cercle était
de l'encadrer entre deux figures faites de triangles, puis de faire converger la taille de ces triangles jusqu'à
les faire coïncider (comme si l'on cherchait à emprisonner un objet entre des murs qui se rapprochent). Archimède
choisit comme figures connues et quarrables pour coïncer le cercle, les polygones réguliers, faits de triangles
disposés en pétales de fleur, en commençant par l'hexagone (six côtés, six triangles équilatéraux) : il encadre le cercle
entre l'hexagone inscrit et l'hexagone circonscrit. Ensuite, il passe au dodécagone (12 côtés), puis il enchaîne
sur le polygone à 24 côtés, puis 48 et enfin 96. A chaque pas, les mesures se rapprochent, mais jamais elles
ne s'égalent ... Il obtient ainsi une suite illimitée de nombres
connus dont la limite est $2\pi$ et qui fournissent très rapidement une bonne approximation de $\pi$.\\
Las, Archimède ne résoudra jamais le problème de la quadrature du cercle, et pour cause. Les mathématiciens
du $XIX^e$ siècle démontreront qu'il n'a pas de solution, d'où l'expression \og C'est la quadrature du cercle ! \fg.
Mais Archimède a bel et bien inauguré l'histoire des suites, car dans sa méthode, il montre comment calculer
la surface du polygone $n$ en fonction de celui qui précède (le $n-1^{eme}$).
Le terme $u_n$ défini par le terme $u_{n-1}$, c'est bien là une suite, la première du genre, et qui peut être
prolongée autant que l'on veut ... jusque dans l'infini.\\
Plus tard, les suites furent formalisées par Cauchy, la maîtrise de cet outil a été grandement facilitée
par l'adoption de la notation indicielle au $XIX^e$ siècle qui consiste à noter chaque nombre d'une suite
par une même lettre affectée d'un indice. \newline
On doit à Péano la définition d'une suite numérique telle qu'elle est enseigné en première S.
}
\end{Intro}
\pagebreak
\section{Introduction}
\subsection{Introduction historique}
L'un des premiers travaux portant sur les suites de nombres semble provenir d’un certain Archimède (j’en entends déjà se dire d’ici : \og encore lui ! \fg, eh oui. . . ). Dans son traité La mesure du cercle,
pour trouver une valeur approchée de $\pi$, il inscrit dans un cercle de rayon $1$ un triangle équilatéral dont il calcule le périmètre. Puis en doublant le nombres de côtés, il calcule le périmètre d'un hexagone, puis celui d'un dodécagone et ainsi de suite, indéfiniment. Il obtient ainsi une suite illimitée de nombres connus dont la limite est $2\pi$ et qui fournissent très rapidement une bonne approximation de $\pi$.\newline
Plus tard, les suites furent formalisées par Cauchy, la maîtrise de cet outil a été grandement facilitée par l'adoption de la notation indicielle au $XIX^e$ siècle qui consiste à noter chaque nombre d'une suite par une même lettre affectée d'un indice. \newline
On doit à Péano la définition d'une suite numérique telle qu'elle est enseigné en première S.
\subsection{Introduction}
Il arrive que l'on demande, lors de tests psychotechniques par exemple, de compl\'eter "logiquement" une suite de nombres, comme par exemple:
$$1 , 2 , 4 , 8 , 16 , \dots\dots , \dots\dots , \dots\dots$$
$$1 , 4 , 9 , 16 , 25 , \dots\dots , \dots\dots , \dots\dots$$
$$-3 , 1 , 5 , 9 , \dots\dots , \dots\dots , \dots\dots$$
$$ \text{suite de Fibonacci} \qquad 0, 1, 1, 2, 3, 5, 8, 13 , \dots\dots , \dots\dots , \dots\dots$$
$$ \text{suite de Stern} \qquad 0, 1, 1, 2, 1, 3, 2, 3, 1, 4, 3, 5, 2, 5, 3, 4, , \dots\dots , \dots\dots , \dots\dots$$
En math\'ematiques, une \textbf{suite} $u$ est une \textbf{liste ordonn\'ee de nombres r\'eels}: les \'el\'ements de cette liste :
\begin{itemize}
\item Sont appel\'es \textbf{termes}
\item Sont rep\'er\'es par leur rang dans la liste
\end{itemize}
\begin{center}
Le $1^{er}$ terme de la suite $u$ est souvent not\'e $u_0$ (ou $u_1$),\\
Le $2^{\`eme}$ terme de la suite $u$ est souvent not\'e $u_1$ (ou $u_2$)\\
\dots \dots\dots\dots\dots \dots\dots\dots\dots \dots\dots\dots\dots \dots\dots \dots\dots\dots\dots\dots \\
\dots \dots\dots\dots\dots \dots\dots\dots\dots \dots\dots\dots\dots \dots\dots \dots\dots\dots\dots\dots \\
Le $n^{\`eme}$ terme de la suite $u$ est souvent not\'e $u_{n-1}$ (ou $u_{n}$)\\
\end{center}
Le terme pr\'ec\`edent $u_n$ est $u_{n-1}$, le suivant $u_{n+1}$.
On note $u=(u_n)_{n \in \N}$ pour signifier que le rang d'un terme de la suite $u$ est un entier naturel (sans "fin" de liste). On a donc:
\begin{center}
$\overbrace{u}^{\text{nom de la suite}}=\quad(\overbrace{u_0}^{\text{1\up{er} terme}};\overbrace{u_1}^{\text{2\up{nd} terme}};\hspace{.5cm}u_2\hspace{.5cm};\hspace{.5cm}\dots\hspace{.5cm};\hspace{.5cm}u_{n-1}\hspace{.5cm};\overbrace{u_n}^{\text{terme de rang $n$}};\hspace{.5cm}u_{n+1}\hspace{.5cm};\hspace{.5cm}\dots\hspace{.5cm})$
\end{center}
\Expl{En reprenant les exemples précédents :
\begin{itemize}
\item La première suite est la suite des puissances de $2$, on définit alors cette suite $u$ par :
$$ u_n=2^n$$
Une autre manière de définir cette suite est de remarquer que chaque terme est le double du précédent ; on peut alors définir cette suite par :
$$ \left\{ \begin{array}{l} u_0=1 \\ u_{n+1}=2\times u_n \end{array} \right.$$
\item La seconde suite est la suite des carrés des premiers entiers, ainsi :
$$ u_n=n^2$$
\item La troisième suite admet pour premier terme $-3$ et pour calculer le suivant on ajoute toujours $4$ :
$$ \left\{ \begin{array}{l} u_0=-3 \\ u_{n+1}= u_n +4 \end{array} \right.$$
On peut aussi la définir de la manière suivante :
$$ u_n=-3+4n$$
\item La suite de Fibonacci se définit par :
$$ \left\{ \begin{array}{l} u_0=0\\u_1=1\\ u_{n+2}= u_n +u_{n+1} \end{array} \right. $$
\item La suite de Stern se définit par :
\begin{center}
\includegraphics[scale=0.7]{stern.eps}
\\
Construction de la suite de Stern. La suite s'obtient en lisant chaque ligne successivement de gauche à droite. Les 1 de la colonne de droite sont à identifier avec les 1 de la colonne de gauche et ne sont pas pris en compte dans la liste des éléments de la suite.
\end{center}
$$\left\{ \begin{array}{l} u_0=0\\u_1=1\\ u_{2n}= u_n \\ u_{2n+1}=u_n+u_{n+1} \end{array} \right. $$
\end{itemize}}
\newpage
\section{Suites numériques}
\subsection{Définition}
\begin{defi}
Une suite numérique est une suite liste ordonnée de nombre réels. \\
Soit $p\in \N$. Une suite $u$ est en fait une fonction de $\N$ dans $\R$ définie à partir d'un certain entier $p$ . A chaque
entier $n\geq p$, la suite $u$ associe un réel $u (n )$, que l’on note $u_n$.\\
$u_n$ est appelé terme d’indice $n$ ou de rang $n$ de la suite.
$u_p$ est le premier terme, ou le terme initial de la suite. On note $(u_n )_{n\geq p}$ l’ensemble des termes de la
suite.
\end{defi}
\Exoi{Déterminer le rang à partir duquel la suite $u$ suivante est définie :
$$ u_n=\sqrt{n-4}$$}
\subsection{Mode de génération d'une suite numérique}
On distingue principalement deux manières de définir les suites : de manière explicite ou par récurrence. \\
\begin{defi}[Formule explicite]
Soit $p\in\N$. Une suite $(u_n)_{n\geq p}$ est définie de manière explicite lorsqu'il existe une fonction $f$
définie sur $[p ; +\infty[$ telle que :
\begin{center}
$\forall n \geq p$, on a $u_n=f(n)$
\end{center}
\end{defi}
\Expl{
On se donne $u_n=-2n+1$ pour $n \geqslant0$ \qquad (ici $u_n=f(n)$ avec $f$ d\'efinie sur $\R$ par $f(x)=-2x+1$.)\\
On a ainsi $u_0=-2 \times 0 +1 = 1$, $u_1=-2 \times 1 + 1 = -1$, $u_2 = -2\times 2 +1 = -3$,
$u_3 = -6+1 = -5$, $u_4=-8 +1 = -7$, \dots $u_{100}=-199\dots$, etc
}
\Rq{
On peut alors calculer chaque terme de la suite par rapport à son indice.
}
\begin{defi}[Par récurrence]
Soit $f$ une fonction définie sur un ensemble $I$ telle que si $x\in I$ alors $f(x)\in I$.\\
Soit $a$ un nombre réel de $I$ et $p \in \N$.\\
On peut alors définir une suite $u$ en posant :
$\left\{ \begin{array}{l} u_p=a \\ u_{n+1}=f(u_n)\quad \forall n \geq p \end{array} \right.$
\end{defi}
\Expl{
On se donne $\left\{ \begin{array}{l} u_0=1 \\ u_{n+1}=-2u_n+1 \end{array} \right.$
\qquad (ici $u_n=f(n)$ avec $f$ d\'efinie sur $\R$ par $f(x)=-2x+1$.)\\
On a ainsi $u_1=-2u_0+1=-2\times 1+1=-1$, $ u_2=-2u_1+1=-2\times(-1)+1=3$ , $u_3=-2u_2+1=-2\times 3+1=-5$,
etc
}
\Rqs{
\item En fait on se donne la valeur du premier terme et un procédé appelé \textbf{relation de récurrence} qui permet
de calculer un terme à partir du précédent.
\item On visualise ainsi facilement le lien logique entre les termes.
\item Dans l'exemple pr\'ec\'edent, pour calculer $u_{100}$, il faut conna\^itre $u_{99}$, et pour calculer $u_{99}$, il faut conna\^itre $u_{98}$, ainsi de suite \dots Il est alors pr\'ef\'erable d'exprimer $u_n$ en fonction de $n$ pour calculer $u_{100}$ directement.
}
\Cadre[Avec une calculatrice]{
\begin{tabular}{cc|cc}
\begin{minipage}[t]{7.5cm}
\begin{center}
\textbf{Avec une TI :}
\end{center}
Par défaut, la calculatrice est en mode fonction. Il faut passer en mode \textit{suite} en appuyant sur
\fbox{\textbf{Mode}} puis mettre \fbox{\texttt{Suite}} en surbrillance.\\
Pour entrer l'expression de la suite $(u_n)$, on procède désormais comme pour une fonction :
on appuie sur \fbox{$f(x)$} ce qui nous permet d'entrer le premier
indice, l'expression de la suite et éventuellement son premier terme. \\
\textit{Le $n$ s'obtient avec la touche \fbox{$x$, $t$, $\theta$, $n$} et le $u$ s'obtient
en appuyant sur \fbox{\textbf{2nde}} + \fbox{$7$} (on met l'indice entre parenthèses).}\\
On obtient le tableau de valeurs dans
\begin{center}
\fbox{\textbf{Table}}= \fbox{\textbf{2nde}} + \fbox{\textbf{Graphe}}.
\end{center}
\end{minipage}
&&&
\begin{minipage}[t]{7.5cm}
\begin{center}
\textbf{Avec une Casio :}
\end{center}
On choisit le mode \textit{suite} en sélectionnant le menu \fbox{\textbf{\texttt{Recur}}}.\\
On choisit ensuite le type de suite (explicite ou récurrente) grâce à la touche \fbox{\textbf{F3 : \texttt{Type}}}
puis la touche \fbox{\textbf{F1}} (explicite) ou \fbox{\textbf{F2}} (récurrente).\\
On entre ensuite l'expression de la suite et on appuie sur \fbox{\textbf{F5 : \texttt{SET}}}
pour paramétrer le tableau, notamment donner le premier indice et/ou premier terme si nécessaire.\\
\textit{Le $n$ s'obtient avec la touche \fbox{\textbf{F1 : $n$}} et le $a_n$ s'obtient
avec la touche \fbox{\textbf{F2 : $a_n$}}}\\
On peut alors afficher les valeurs de la table grâce à \fbox{\textbf{F6 : \texttt{TABL}}}
\end{minipage}
\\
\end{tabular}
}
\Exoi{Soit la suite $(v_n)_{\N}$ par
$\left\{ \begin{array}{l} v_0=2 \\ v_{n+1}=2v_n+3n\quad \forall n \in\N \end{array} \right.$.
\begin{enumerate}
\item Calculer $v_1$, $v_{2}$ et $v_{3}$.
\item Exprimer $v_{n}$, $v_{n-1}$, $v_{2n}$ et $v_{3n-1}$ en fonction du terme approprié de la suite $(v_n)$.
\end{enumerate}
}
\Exoi{Soit la suite $(u_n)_{\N}$ définie par $u_n= (-2)^n+3$ et la suite $(v_n)_{\N}$ par
$\left\{ \begin{array}{l} v_0=4 \\ v_{n+1}=-2v_n+9\quad \forall n \in\N \end{array} \right.$.
\begin{enumerate}
\item Pour chacune des suites $u$ et $v$ :
\begin{enumerate}
\item Déterminer les valeurs des trois premiers termes.
\item Vérifier à la calculatrice les réponses de la question précédente.
\end{enumerate}
\item Quelle conjecture peut-on émettre sur les suites $u$ et $v$ ? Démontrer cette conjecture.
\end{enumerate}
}
%\subsection{Représentation graphique}
%\subsubsection{Suites explicites}
%\begin{defi}
%On se place dans un repère $(O;\vec i, \vec j)$.
%La représentation graphique d'une suite définie explicitement $(u_n)$ est l'ensemble des points de
%coordonnées $(n;u_n)$
%\end{defi}
%
%\Expl{Soit $(u_n)$ la suite définie, pour $n\geq 1$, par $$u_n=\dfrac{1}{n} $$
%Sa représentation graphique est donc l'ensemble des points \textbf{isolés} de coordonnées $\left(1;1\right)$,
%$\left(2,\dfrac{1}{2}\right)$, $\left(3,\dfrac{1}{3}\right)$, $\left(4,\dfrac{1}{4}\right)$,
%$\left(5,\dfrac{1}{5}\right)$, etc$\dots$}
%\begin{center}
%\psset{xunit=2cm , yunit=3cm}
%\begin{pspicture*}(-1.1,-0.35)(5.35,1.2)
%\def\xmin{-1} \def\xmax{5.25} \def\ymin{-0.25} \def\ymax{1.2}
%\newrgbcolor{couleurcadre}{0.99 0.99 0.99}
%\psframe[linewidth=0.3pt,linecolor=couleurcadre](-1.1,-0.35)(5.35,1.2)
%\def\pshlabel#1{\psframebox*[framesep=1pt]{\small #1}}
%\def\psvlabel#1{\psframebox*[framesep=1pt]{\small #1}}
%\psclip{%
%\psframe[linestyle=none](\xmin,\ymin)(\xmax,\ymax)
%}
%\newrgbcolor{couleur1}{0.6549 0.6549 0}
%\newrgbcolor{couleur2}{0 0.3176 0.4745}
%\newrgbcolor{couleur3}{0.0941 0.647 0.0196}
%\psdot(1,1)
%\psdot(2,0.5)
%\psdot(3,0.33)
%\psdot(4,0.25)
%\psdot(5,0.2)
%\endpsclip
%\psaxes[labels=none,labelsep=1pt,Dx=1,Dy=1,Ox=0,Oy=0]{-}(0,0)(\xmin,\ymin)(\xmax,\ymax)
%\uput[dl](0,0){0}
%\pcline[linewidth=1pt]{->}(0,0)(1,0) \uput[d](0.5,0){\small $\vec i$}
%\pcline[linewidth=1pt]{->}(0,0)(0,1) \uput[l](0,0.5){\small $\vec j$}
%\end{pspicture*}
%\end{center}
%
%\Exoi{
%\begin{multicols}{2}
%Soit $f$ la fonction définie par sa courbe représentative $\mathscr C_f$ ci-contre et la suite $u$ de terme général $u_n=f(n)$.
%\begin{enumerate}
% \item Lire une valeur approchée des termes de $u_0$ à $u_5$.
%\item Que peut-on dire du comportement des premiers termes de $u$ ?
%\end{enumerate}
%\begin{center}
%%\scalebox{0.8} % Change this value to rescale the drawing.
%{
%\begin{pspicture}(-1,-0.50)(7.02,4.0)
%\psset{xunit=1.0cm,yunit=0.7cm}
%\psgrid[subgriddiv=0,gridlabels=0,gridcolor=lightgray](0,0)(-1,-1)(7,7)
%\psaxes[labelFontSize=\scriptstyle,xAxis=true,yAxis=true,Dx=1,Dy=1,ticksize=-2pt 0]{->}(0,0)(-1,-1)(7,7)
%\pscustom[linewidth=0.04]
%{
%\newpath
%\moveto(0,1)
%\curveto(0,1)(0.25,0.1)(0.5,1.)
%\curveto(0.6,1.7)(1,2)
%\curveto(1.1,2.1)(1.4,4.4)(1.5,4.5)
%\curveto(1.6,4.4)(1.7,4)(2,3.5)
%\curveto(2.5,2.75)(2.75,3.8)(3,4)
%\curveto(3.5,4.2)(3.7,4.3)(4,4.5)
%\curveto(4.5,4.2)(4.8,4.5)(5,5)
%\curveto(5.2,5.5)(5.5,6.5)(6,6)
%}
%\end{pspicture}
%}
%\end{center}
%\end{multicols}
%}
%
%
%
%
%\subsubsection{Suites récurrentes}
%
%\Exoi{
%On considère la fonction $f$ définie sur $[0;+\infty[$ par $f(x)=\sqrt{x}$.\\
%La suite $(u_n)$ est définie par $u_0=3$ et pour tout $n\geq 0$ on a $u_{n+1}=f(u_n)=\sqrt{u_n}$.\\
%\partieBac{Tracer les premiers termes sur l'axe des abscisses}
%\begin{enumerate}
% \item Tracer soigneusement la courbe $\mathscr C$ représentant $f$ et la droite $\Delta$ d'équation $y=x$ sur $[0;3]$
%dans un repère orthonormé avec pour unité 5 cm.
%\item \begin{enumerate}
% \item Placer $u_0$ sur l'axe des abscisses. Placer $u_1=f(u_0)$ sur l'axe des ordonnées.
% \item Placer le point $A_1$ de $\Delta$ d'ordonnée $u_1$. Quelle est son abscisse ?\\
%Placer alors $u_1$ sur l'axe des abscisses.
%\item Sachant que $u_2=f(u_1)$, expliquer comment construire $u_2$ sur l'axe des abscisses. Le construire.
%\end{enumerate}
%\item Construire ainsi, pas à pas, sur l'axe des abscisses, les premiers termes de la suite jusqu'à $u_5$.
% \item Comment se poursuivrait le tracé si on pouvait agrandir le graphique ?\\
% Emettre des conjectures sur le comportement de la suite $(u_n)$.
%%Quelles conjectures peut-on faire sur le sens de variation de $(u_n)$ et sur sa limite éventuelle ?
%\end{enumerate}
%\partieBac{ Influence du premier terme}
%\begin{enumerate}
% \item Sur votre calculatrice, afficher de même les premiers termes de la suite $(v_n)$ définie par $v_0=0.1$ et
%pour tout $n$, $v_{n+1}=f(v_n)$.\\
%\textit{Dans }\fbox{\textbf{Fenêtre}}, \textit{choisir $X$ et $Y$ entre 0 et 1.}
%\item Emettre des conjectures sur le comportement de la suite $(v_n)$.
%\end{enumerate}
%}
%
%
%Dans le cas d'une suite récurrente, on ne cherche pas en général à représenter graphiquement la suite
%comme pour les suites explicites (mais on pourrait très bien le faire). \\
%On préfère représenter ses premiers termes sur l'axe des abscisses en s'appuyant sur la représentation
%graphique de la fonction définissant la relation de récurrence. \\
%On obtient alors un diagramme \og en escalier \fg ou en \og en escargot \fg.
%%On peut alors faire des conjectures sur le sens de variation, etc.
%
%\Expl{On considère la suite $(u_n)$ définie pour $n\geq 0$ par $u_{n+1}=2 \sqrt{u_n}+2$ et $u_0=1$\newline
%On considère la fonction $f$ vérifiant $u_{n+1}=f(u_n)$ définie par $f : x\longmapsto 2 \sqrt{x}+2$.
%}
%\begin{multicols}{2}
%\begin{enumerate}
% \item On trace la courbe $\mathscr C_f$ représentative de $f$
% \item On place $u_0$ sur l'axe des abscisses et $u_1$, image de $u_0$ par $f$, sur l'axe des ordonnées
% \item Comme $u_2$ est l'image de $u_1$ par $f$, on veut avoir $u_1$ sur l'axe des abscisses.\\
%Pour cela, on utilise la droite $\Delta$ d'équation $y=x$, que l'on prendra soin de tracer.
%\item On reporte alors $u_1$ sur l'axe des abscisses, à l'aide de $\Delta$
%\item On place $u_2$ image de $u_1$ par $f$, puis on reporte $u_2$ sur l'axe des abscisses, etc.
%\end{enumerate}
%\begin{center}
%\psset{xunit=0.9cm , yunit=0.9cm}
%\begin{pspicture*}(-0.5,-0.6)(8.5,8.6)
%\def\xmin{0} \def\xmax{8} \def\ymin{0} \def\ymax{8}
%\newrgbcolor{couleurcadre}{0.99 0.99 0.99}
%\psframe[linewidth=0.3pt,linecolor=couleurcadre](-0.5,-0.6)(8.5,8.6)
%\def\pshlabel#1{\psframebox*[framesep=1pt]{\small #1}}
%\def\psvlabel#1{\psframebox*[framesep=1pt]{\small #1}}
%\psclip{%
%\psframe[linestyle=none](\xmin,\ymin)(\xmax,\ymax)
%}
%\newrgbcolor{couleur1}{0.6549 0.6549 0}
%\newrgbcolor{couleur2}{0 0.3176 0.4745}
%\newrgbcolor{couleur3}{0.0941 0.647 0.0196}
%%\psline[linewidth=0.8pt,linecolor=blue,linestyle=dotted]{-}(1,0)(1,4)
%\psline[linewidth=0.8pt,linecolor=blue,linestyle=dashed]{-}(1,0)(1,4)
%\psline[linewidth=0.8pt,linecolor=blue,linestyle=dotted]{-}(0,4)(4,4)
%\psline[linewidth=0.8pt,linecolor=blue,linestyle=dashed]{-}(1,4)(4,4)
%\psline[linewidth=0.8pt,linecolor=blue,linestyle=dotted]{-}(4,0)(4,6)
%\psline[linewidth=0.8pt,linecolor=blue,linestyle=dashed]{-}(4,4)(4,6)
%\psline[linewidth=0.8pt,linecolor=blue,linestyle=dashed]{-}(4,6)(6,6)
%\psline[linewidth=0.8pt,linecolor=blue,linestyle=dotted]{-}(0,6)(6,6)
%\psline[linewidth=0.8pt,linecolor=blue,linestyle=dashed]{-}(6,6)(6,6.89897)
%\psline[linewidth=0.8pt,linecolor=blue,linestyle=dotted]{-}(6,0)(6,6.89897)
%\psline[linewidth=0.8pt,linecolor=blue,linestyle=dashed]{-}(6,6.89897)(6.89897,6.89897)
%\psline[linewidth=0.8pt,linecolor=blue,linestyle=dashed]{-}(6.89897,6.89897)(6.89897,7.25318)
%\psline[linewidth=0.8pt,linecolor=blue,linestyle=dotted]{-}(0,6.89897)(6.89897,6.89897)
%\psline[linewidth=0.8pt,linecolor=blue,linestyle=dashed]{-}(6.89897,7.25318)(7.25318,7.25318)
%\psline[linewidth=0.8pt,linecolor=blue,linestyle=dotted]{-}(6.89897,0)(6.89897,7.25318)
%\psline[linewidth=0.8pt,linecolor=blue,linestyle=dotted]{-}(0,7.25318)(7.25318,7.25318)(7.25318,0)
%\def\F{2 x sqrt mul 2 add}
%\psplot[linecolor=gray,linewidth=0.5pt,linestyle=solid]{0}{8}{x}
%\psplot[linewidth=1.2pt,linecolor=red,linestyle=solid,plotpoints=1000]{0}{8}{\F}
%\uput[0](3,6.5){$\mathscr C_f$}
%\endpsclip
%\psaxes[labels=none,labelsep=1pt,Dx=1,Dy=1,Ox=0,Oy=0]{->}(0,0)(\xmin,\ymin)(\xmax,\ymax)
%\uput[dl](0,0){0}
%\pcline[linewidth=1pt]{->}(0,0)(1,0) \uput[d](0.5,0){\small $\vec i$}
%\pcline[linewidth=1pt]{->}(0,0)(0,1) \uput[l](0,0.5){\small $\vec j$}
%\uput[-90](1,0){\small $u_0$}
%\uput[180](0,4){\small $u_1$}
%\uput[-90](4,0){\small $u_1$}
%\uput[180](0,6){\small $u_2$}
%\uput[-90](6,0){\small $u_2$}
%\uput[180](0,6.89897){\small $u_3$}
%\uput[-90](6.89897,0){\small $u_3$}
%\uput[180](0,7.25318){\small $u_4$}
%\uput[-90](7.25318,0){\small $u_4$}
%\uput[ur](7.5,8){\small $\Delta$}
%\end{pspicture*}
%\end{center}
%\end{multicols}
%
%\Rq{Dans l'exemple précédent, on constate que les termes de la suite semblent augmenter et se rapprocher
% d'une valeur \og limite \fg : celle de l'abscisse du point d'intersection entre $\mathscr C_f$ et de $\Delta$. \\
%On dira que la suite est croissante et qu'elle \textit{converge} vers cette valeur $l$, appelée limite de la suite $(u_n)$.\\
%Pour la trouver, on résout l'équation $f(l)=l$ :
%$$f(l)=l \iff 2\sqrt{l}+2=l \iff 2\sqrt{l}=l-2 \iff 4l=l^2-4l+4 \quad\text{ et }\quad \left\{\begin{array}{l}
% l>0 \\ l-2>0
% \end{array}\right.
%\iff l^2 -8l+4=0\quad \text{ et } \quad l>2$$
%$\Delta = 64-4\times 1 \times 4 = 48$. \quad Donc $l_1=\dfrac{8+4\sqrt{3}}{2}=4+2\sqrt{3}$ et $l_2=4-2\sqrt{3}<2$.
%Donc $l=4+2\sqrt{3}$. \\
%On note $\lim\limits_{n \to + \infty} u_n = 4+2\sqrt{3}$
%}
%
%\Expl{On considère la suite $(u_n)$ définie pour $n\geq 0$ par $u_{n+1}=-\dfrac{2}{3} u_n-1$ et
%$u_0=7$\newline
%On considère la fonction $f$ vérifiant $u_{n+1}=f(u_n)$ définie par $f : x\longmapsto -\dfrac{2}{3}x-1$. \\
%On a représenté ci-dessous la représentation graphique $\mathscr C_f$ de $f$ et la droite $\Delta$ d'équation $y=x$,
%puis on a suivi les mêmes étapes que pour l'exemple précédent.}
%\begin{center}
%\psset{xunit=0.9cm , yunit=0.9cm}
%\begin{pspicture*}(-8.5,-6.6)(8.5,4.6)
%\def\xmin{-8} \def\xmax{8} \def\ymin{-6} \def\ymax{4}
%\newrgbcolor{couleurcadre}{0.99 0.99 0.99}
%\psframe[linewidth=0.3pt,linecolor=couleurcadre](-8.5,-6.6)(8.5,4.6)
%\def\pshlabel#1{\psframebox*[framesep=1pt]{\small #1}}
%\def\psvlabel#1{\psframebox*[framesep=1pt]{\small #1}}
%\psclip{%
%\psframe[linestyle=none](\xmin,\ymin)(\xmax,\ymax)
%}
%\newrgbcolor{couleur1}{0.6549 0.6549 0}
%\newrgbcolor{couleur2}{0 0.3176 0.4745}
%\newrgbcolor{couleur3}{0.0941 0.647 0.0196}
%\psline[linewidth=0.8pt,linecolor=blue,linestyle=dashed]{-}(7,0)(7,-5.66667)(-5.66667,-5.66667)
%(-5.66667,2.77777)(2.77777,2.77777)(2.77777,-2.85186)(-2.85186,-2.85186)(-2.85186,0.90123)(0.90123,0.90123)
%(0.90123,-1.60083)(-1.60083,-1.60083)(-1.60083,0.06721)(0.06721,0.06721)(0.06721,-1.04482)
%(-1.04482,-1.04482)(-1.04482,0)
%\def\F{0 2 x mul 3 div sub 1 sub}
%\psplot[linecolor=gray,linewidth=0.5pt,linestyle=solid]{-8}{8}{x}
%\psplot[linewidth=1.2pt,linecolor=red,linestyle=solid,plotpoints=1000]{-8}{8}{\F}
%\uput[0](4.2,-3.5){$\mathscr C_f$}
%\endpsclip
%\psaxes[labels=none,labelsep=1pt,Dx=1,Dy=1,Ox=0,Oy=0]{->}(0,0)(\xmin,\ymin)(\xmax,\ymax)
%\uput[dl](0,0){0}
%\pcline[linewidth=1pt]{->}(0,0)(1,0) \uput[d](0.5,0){\small $\vec i$}
%\pcline[linewidth=1pt]{->}(0,0)(0,1) \uput[l](0,0.5){\small $\vec j$}
%\uput[u](7,0){\small $u_0$}
%\uput[ul](0,-5.66667){\small $u_1$}
%\uput[dl](-5.66667,0){\small $u_1$}
%\uput[ul](0,2.77777){\small $u_2$}
%\uput[dr](2.77777,0){\small $u_2$}
%\uput[dr](0,-2.85186){\small $u_3$}
%\uput[dl](-2.85186,0){\small $u_3$}
%\uput[ul](0,0.90123){\small $u_4$}
%\uput[dr](0.90123,0){\small $u_4$}
%\uput[dl](0,-1.60083){\small $u_5$}
%\uput[u](-1.60083,0){\small $u_5$}
%\uput[dl](4.5,4){\small $\Delta$}
%%\uput[130](0,0.06721){\small $u_6$}
%%\uput[-30](0.06721,0){\small $u_6$}
%%\uput[130](0,-1.04482){\small $u_7$}
%%\uput[-30](-1.04482,0){\small $u_7$}
%\end{pspicture*}
%\end{center}
%
%\Rq{Contrairement à l'exemple précédent, les éléments de la suite ne semblent pas faire qu'augmenter ou diminuer. Cette
%suite n'est ni croissante, ni décroissante. Mais cette suite semblent également convergente vers l'abscisse $l$ du point d'intersection
%de $\mathscr C_f$ et $\Delta$.\\
%Pour trouver $l$, on résout $f(l)=l \iff -\dfrac23l-1=l \iff \dfrac53l=-1 \iff l=-\dfrac35$.
%}
%
%\Exoi{
%\begin{multicols}{2}
%On a tracé ci-contre la courbe représentative d'une fonction $g$ et la droite $\Delta : y=x$.\\
%On a représenté les quatre premiers termes de la suite $t$ définie par son terme initial $t_0$ et la relation
%$$t_{n+1}=g(t_n) \qquad \text{
%pour tout entier } n\geq 0$$
%Donner le terme initial $t_0$ et lire des valeurs approchées de $t_1$, $t_2$ et $t_3$.
%\begin{center}
% \newrgbcolor{ttttff}{0.2 0.2 1}
%\newrgbcolor{qqzzqq}{0 0.6 0}
%\psset{xunit=1.0cm,yunit=1.0cm}
%\begin{pspicture*}(-6,-1)(4,4)
%\psgrid[subgriddiv=0,gridlabels=0,gridcolor=lightgray](0,0)(-6,-1)(4,4)
%\psset{xunit=1.0cm,yunit=1.0cm,algebraic=true,dotstyle=o,dotsize=3pt 0,linewidth=0.8pt,arrowsize=3pt 2,arrowinset=0.25}
%\psaxes[labelFontSize=\scriptstyle,xAxis=true,yAxis=true,Dx=1,Dy=1,ticksize=-2pt 0,subticks=2]{->}(0,0)(-6,-1)(4,4)
%\psplot[linewidth=1.2pt,linecolor=red]{-6}{4}{(-0--1*x)/1}
%\psplot[linewidth=1.2pt,linecolor=ttttff,plotpoints=200]{-6.0}{4.0}{sqrt(x+6)}
%\psline[linewidth=1.2pt,linestyle=dashed,dash=1pt 1pt,linecolor=qqzzqq](-5,0)(-5,1)
%\psline[linewidth=1.2pt,linecolor=qqzzqq](-5,1)(1,1)
%\psline[linewidth=1.2pt,linecolor=qqzzqq](1,1)(1,2.65)
%\psline[linewidth=1.2pt,linecolor=qqzzqq](1,2.65)(2.65,2.65)
%\psline[linewidth=1.2pt,linecolor=qqzzqq](2.65,2.65)(2.65,2.94)
%\psline[linewidth=1.2pt,linecolor=qqzzqq](2.65,2.94)(2.94,2.94)
%\psline[linewidth=1.2pt,linestyle=dashed,dash=1pt 1pt,linecolor=qqzzqq](1,0)(1,1)
%\psline[linewidth=1.2pt,linestyle=dashed,dash=1pt 1pt,linecolor=qqzzqq](2.65,2.65)(2.65,0)
%\psline[linewidth=1.2pt,linestyle=dashed,dash=1pt 1pt,linecolor=qqzzqq](2.94,2.94)(2.94,0)
%\rput[bl](2,3.5){\red{$\Delta:y=x$}}
%\rput[bl](-5.64,1.13){\ttttff{$\mathscr C_g$}}
%\end{pspicture*}
%\end{center}
%\end{multicols}
%}
%
%\Cadre[Avec une calculatrice]{
%%\begin{tabular}{cc|cc}
%%\begin{minipage}[t]{10cm}
%\begin{center}
%\textbf{Avec une TI : }
%\end{center}
%Se mettre en Mode \fbox{\texttt{Suite}}.
%\begin{itemize}
% \item[$\blacktriangleright$] \textbf{Pour une suite explicite} :
% \begin{itemize}
% \item Mettre en surbrillance le Mode \fbox{\texttt{NonRelié}}
%afin que les points ne soient pas reliés entre eux.
%\item Rentrer la suite dans \fbox{$f(x)$} en précisant l'indice de départ.
%\item Dans \fbox{\textbf{Format} : 2nde + Zoom} mettre en surbrillance \fbox{\texttt{f(n)}}.\\
%\end{itemize}
%\item[$\blacktriangleright$] \textbf{Pour une suite récurrente} :
% \begin{itemize}
%\item Mettre en surbrillance le \textit{Mode} \fbox{\texttt{Relié}}.
%\item Rentrer la suite dans \fbox{$f(x)$} en précisant l'indice de départ, \texttt{u(n)} en fonction des termes précédents appropriés
%et le premier terme.
%\item Aller dans \fbox{\textbf{Format} : 2nde + Zoom} et mettre en surbrillance \fbox{\texttt{Esc}} (en escalier).\\
%\end{itemize}
%\end{itemize}
%Ensuite, appuyer sur \fbox{\textbf{Graphe}}, puis \fbox{\textbf{Trace}} et les flèches \fbox{$\rhd$} et \fbox{$\lhd$}
%pour voir les termes de la suite.\\
%Afin d'ajuster la fenêtre automatiquement, appuyer sur \fbox{\textbf{Zoom}} et choisir \fbox{\texttt{ZMinMax}}.\\
%%\end{minipage}
%%&&&
%%\begin{minipage}[t]{5cm}
%\begin{center}
%\textbf{Avec une Casio :}
%\end{center}
%Se mettre en \textit{Mode} \textit{suite}.\\
%Enregistrer la suite dans le bon \textit{Type}. \\
%Appuyer ensuite sur la touche \fbox{\textbf{F4 : \texttt{WEB}}}
%ou encore \fbox{\textbf{F6 : \texttt{TABL}}} + \fbox{\textbf{F6 : \texttt{G-PLT}}}.\\
%
%Afin d'ajuster la fenêtre automatiquement, appuyer sur \fbox{\textbf{F2 : \texttt{Zoom}}} et choisir \fbox{\texttt{AUTO}}.
%%\end{minipage}
%%\\
%%\end{tabular}
%}
%
%\Exoi{\begin{enumerate}
% \item Soit la suite $u$ définie sur $\N$ par $\left\{\begin{array}{l}
% u_0=-1 \\ u_{n+1}=\sqrt{2u_n+6}
% \end{array}\right.$\\
%Afficher sur votre calculatrice une représentation graphique de la suite $u$.
% \item Même question pour la suite $v$ définie sur $\N$ par $v_{n}=\sqrt{2n+6}$.
% \end{enumerate}
%}
%
%
%
%\section{Sens de variation d'une suite numérique}
%
%\subsection{Définition}
%
%\Exoi{Soient les suites $(u_n)$, $(v_n)$, $(w_n)$ et $(t_n)$ définies sur $\N$ par :
%$$u_n=2n+3 \qquad \qquad v_n=5 \times 0.8^n \qquad \qquad w_n=5 \times (-0.8)^n \qquad \text{ et } \qquad
%\left\{\begin{array}{l}
%t_0=4 \\ t_{n+1}= t_n-3
% \end{array}\right.
%$$
%Comparer pour tout $n\in\N$ les termes suivants :
%\begin{enumerate}
%\begin{multicols}{4}
% \item $u_{n+1}$ et $u_n$.
% \item $v_{n+1}$ et $v_n$.
% \item $w_{n+1}$ et $w_n$.
%\item $t_{n+1}$ et $t_n$.
%\end{multicols}
%\end{enumerate}
%}
%
%\begin{defi}Soit $(u_n)$ une suite de nombre réels. On dit que la suite $(u_n)$ est
%\begin{itemize}
%\item \textbf{croissante} (à partir du rang $p$) si et seulement $u_n\leq u_{n+1}$, $\forall n\geq p$.
%\item \textbf{décroissante} (à partir du rang $p$) si et seulement $u_n\geq u_{n+1}$, $\forall n\geq p$.
%\item \textbf{monotone} (à partir du rang $p$) si et seulement elle est croissante ou décroissante
%(à partir du rang $p$)
%\item \textbf{stationnaire} (à partir du rang $p$) si et seulement si $u_n=u_{n+1}$ pour tout entier
%$n\geq p$ (si la suite est définie à partir du rang $p$ alors on dit que la suite est \textbf{constante})
%\end{itemize}
%\end{defi}
%
%\Rq{
%%\item
%On définit la stricte croissance ou décroissance à l'aide des inégalités strictes suivantes :
%$$u_n<u_{n+1} \text{ ou } u_n>u_{n+1}$$
%%\item Les intervalles d'entiers sont souvent notés à l'aide de crochets doubles. Par exemple
%%$\text{\textlbrackdbl 2,5 \textrbrackdbl}=\{2;3;4;5\}$.
%%Si bien qu'on pourra écrire, par exemple, qu'une suite est croissante sur \textlbrackdbl $0,+\infty[$
%}
%\subsection{Méthode : Comment étudier le sens de variation d'une suite ?}
%
%\Cadre[Méthodes pour étudier les variations d'une suite]{
%\begin{itemize}
%\item[$\blacktriangleright$] On \'etudie g\'en\'eralement le signe de $u_{n+1}-u_n$ selon les valeurs de $n$.
%\item[$\blacktriangleright$] Si tous les termes de la suite $u$ sont \textbf{strictement positifs},
%on peut comparer le quotient $\dfrac{u_{n+1}}{u_n}$ avec 1.\\
%\textit{Ceci se révèle souvent pratique dans le cas où il y a des exposants $n$ dans l'expression de la suite.}
%\end{itemize}}
%
%
%
%\Expls{
%\begin{enumerate}
%\item Soit la suite $(u_n)_{n\in\N}$ est d\'efinie par $u_n=n^2+2$, alors on a
%$$u_{n+1}=(n+1)^2+2=n^2+2n+3$$
%Ainsi pour tout $n$ on a $u_{n+1}-u_n=2n+1 > 0$ pour tout $n>0$.\\
%Donc $u_{n+1} > u_n$ pour tout $n$ : la suite est donc strictement croissante sur $\N$.
%\item Soit $(v_n)_{n\in\N}$ d\'efinie par $v_n=2\times5^n$. \\
%On a $v_n>0$ pour tout entier naturel $n$ et $$v_{n+1}=2\times 5^{n+1}$$
%Ainsi pour tout $n$ on a $$\dfrac{v_{n+1}}{v_n}=\cfrac{5^{n+1}}{5^{n} }=5 >1$$
%Donc $v_{n+1}>v_n$ pour tout $n$ : la suite est donc strictement croissante sur \textlbrackdbl $0,+\infty[$
%\item Etudier de deux manières différentes le sens de variation de la suite $(w_n)_{n\geq 3}$ définie par $$ w_n=\dfrac{3n-1}{n+2}$$
% %\item On considère la suite $u$ définie par $u_n=2n+\sin n$\newline
%%Étudions, pour tout entier $n$, le signe de la différence de deux termes consécutifs :
%%$$ u_{n+1}-u_n=2(n+1)+\sin (n+1)-2n-\sin n=2+\sin (n+1) - \sin n$$
%%Or, $\forall x\in \R$ on a : $-1\leq \sin x \leq 1$, par conséquent :
%%$$ 2+\sin (n+1)-\sin n>0\Longleftrightarrow u_{n+1}>u_n$$
%%La suite $u$ est donc strictement croissante.
%\end{enumerate}
%}
%
%\begin{theo}On considère la suite $(u_n)_{n\geq p}$ définie \textbf{explicitement} par $u_n=f(n)$, avec $f$ définie sur
%l'intervalle $[p;+\infty[$.\newline
%Si la fonction $f$ est monotone (resp. strictement monotone) sur $[p;+\infty[$ alors la suite $(u_n)$ est monotone
% (resp. strictement monotone) et possède le même sens de variation que la fonction $f$
% \end{theo}
%
%\Rqs{
%\item On a déjà vu graphiquement que ce théorème était faux pour les suites définies par récurrence.
%\item La réciproque de ce théorème est fausse i.e que l'on peut trouver une suite croissante,
%par exemple, définie par une fonction non croissante, comme sur le dessin ci-dessous :
%\begin{center}
%\begin{pspicture}(-1,-0.50)(7,4.50)
%\psset{xunit=1.0cm,yunit=0.6cm}
%\psgrid[subgriddiv=0,gridlabels=0,gridcolor=lightgray](0,0)(-1,-1)(7,7)
%\psaxes[labelFontSize=\scriptstyle,xAxis=true,yAxis=true,Dx=1,Dy=1,ticksize=-2pt 0]{->}(0,0)(-1,-1)(7,7)
%\pscustom[linewidth=0.04]
%{
%\newpath
%\moveto(0,1)
%\curveto(0,1)(0.25,0.1)(0.5,1.)
%\curveto(0.6,1.7)(1,2)
%\curveto(1.1,2.1)(1.4,4.4)(1.5,4.5)
%\curveto(1.6,4.4)(1.7,4)(2,3.5)
%\curveto(2.5,2.75)(2.75,3.8)(3,4)
%\curveto(3.5,4.2)(3.7,4.3)(4,4.5)
%\curveto(4.5,4.2)(4.8,4.5)(5,5)
%\curveto(5.2,5.5)(5.5,6.5)(6,6)
%}
%\end{pspicture}
%\end{center}
%}
%
%\Dem{On a $p \leq n <n+1$ donc si $f$ est strictement croissante sur $[p;+\infty[$, on a par définition :
%$$f(n)<f(n+1)\Longleftrightarrow u_n<u_{n+1}$$
%Par conséquent, $(u_n)$ est strictement croissante.\\
%De la même manière, si $f$ est strictement décroissante sur $[p;+\infty[$, on a
%$$f(n)>f(n+1)\Longleftrightarrow u_n>u_{n+1}$$
%Par conséquent, $(u_n)$ est strictement décroissante.
%}
%
%\Expls{Etudier avec cette troisième méthode le sens de variation des suites $(u_n)_{n\in\N}$ et $(w_n)_{n\geq 3}$ définies
%dans l'exemple précédent.
%\begin{itemize}
% \item Soit $f : x \longmapsto x^2+2$ ; définie sur $[0 ; + \infty[$.\\
%$f$ est une fonction trinôme et sait qu'elle est strictement croissante sur $[0 ; + \infty[$.\\
%Donc $(u_n)$ est aussi strictement croissante sur $\N$.
%\item Soit $g:x\longmapsto \dfrac{3x-1}{x+2}$ ; définie sur $[3 ; +\infty[$.\\
%On a $g(x)=\dfrac{3x}{x+2}-\dfrac1{x+2}=3\dfrac1{1+\dfrac{2}{x}}+\left(-\dfrac1{x+2}\right)$.\\
%Or on a
%\begin{center}
% \begin{tikzpicture}
%\tkzTabInit[espcl=2]{$x$/0.5, Variations de $1+\dfrac2x$/1.5, Variations de $\dfrac1{1+\frac2x}$/1.5,
%Variations de $3\dfrac1{1+\frac2x}$/1.5}{$3$,$+\infty$}
%\tkzTabVar{+ /, -/ }
%%\tkzTabIma{}{4}{3}{$0$}
%\tkzTabVar{- / , +/ }
%\tkzTabVar{- / , +/ }
%\end{tikzpicture}
%et
% \begin{tikzpicture}
%\tkzTabInit[espcl=2]{$x$/0.5, Variations de $x+2$/1.5, Variations de $\dfrac1{x+2}$/1.5,
%Variations de $-\dfrac1{x+2}$/1.5}{$3$,$+\infty$}
%\tkzTabVar{- /, +/ }
%%\tkzTabIma{}{4}{3}{$0$}
%\tkzTabVar{+ / , -/ }
%\tkzTabVar{- /, +/ }
%\end{tikzpicture}
%\end{center}
%Or la somme de fonctions croissantes est croissante. Donc $g$ est croissante sur $[3 ; + \infty[$.
%On en conclut que $(w_n)_{n\geq 3}$ est aussi strictement croissante pour $n\geq 3$.
%\end{itemize}
%}
%
%
%\section{Notion de limite d'une suite numérique}
%
%\subsection{Etude d'un exemple}
%
%\Exoi{Soient les suites $(u_n)$, $(v_n)$ et $(w_n)$ définies sur $\N$ par :
%$$u_n=\dfrac1n \qquad \qquad v_n=n^2-3 \qquad \qquad w_n=(-1)^n$$
%\begin{enumerate}
% \item Etudier le sens de variation de chacune de ces suites.
% \item %Calculer pour chacune des suites les termes de rang $100$, $1000$, $10^6$ et $10^{6}+1$.\\
%Conjecturer graphiquement le \og comportement à l'infini \fg de ces suites.
%\item \begin{enumerate}
% \item Déterminer un entier $p$ tel que pour tout entier $n\geq p$, on ait $0 \leq u_n \leq 10^{-6}$.
%\item Peut-on faire de même en remplaçant $10^{-6}$ par n'importe quel réel $\varepsilon >0$ ?
% \end{enumerate}
%\item \begin{enumerate}
% \item Déterminer un entier $p'$ tel que pour tout entier $n\geq p'$, on ait $v_n \geq 10^{10}$.
%\item Peut-on faire de même en remplaçant $10^{10}$ par n'importe quel réel $M$ ?
% \end{enumerate}
%\end{enumerate}
%}
%\subsection{Suite convergente, suite divergente}
%
%
%
%
%\begin{defi}
%On dit qu'une suite \textbf{admet une limite réelle $\ell$} (ou \textbf{converge vers le réel $\ell$}) lorsque tous les termes de
%la suite $(u_n)$ sont aussi proches de $\ell$ que l'on veut à partir d'un certain rang.
%\\
%Autrement dit une suite converge vers le réel $\ell$ si tout intervalle du type $]\ell -\varepsilon; \ell +\varepsilon[$ (avec $\varepsilon>0$) contient tous les termes de la suite à partir d'un certain rang $N$.
%On note $\lim\limits_{n \to + \infty} u_n = \ell$.
%\end{defi}
%
%\Rq{Autrement dit, quelque soit le nombre $\varepsilon$ choisi (aussi petit que l'on veut),
%il existe un rang $N$ (dépendant de $\varepsilon$) à partir duquel
%tous les termes de la suite $(u_n)$ sont contenus dans l'intervalle $]\ell-\varepsilon ; \ell+ \varepsilon[ $).
%}
%\Expl{
%Graphiquement, cela se traduit ainsi :
%\begin{center}
%%\usepackage{pstricks,pst-plot,pst-text,pst-tree,pst-eps,pst-fill,pst-node,pst-math}
%\psset{xunit=0.7cm , yunit=10cm}
%\begin{pspicture*}(0,0.95)(25.1,1.8)
%\def\xmin{-1} \def\xmax{25} \def\ymin{1} \def\ymax{1.8}
%\newrgbcolor{couleurcadre}{0.99 0.99 0.99}
%\def\pshlabel#1{\psframebox*[framesep=1pt]{\small #1}}
%\def\psvlabel#1{\psframebox*[framesep=1pt]{\small #1}}
%\psclip{%
%\psframe[linestyle=none](\xmin,\ymin)(\xmax,\ymax)
%}
%\newrgbcolor{couleur1}{0.6549 0.6549 0}
%\newrgbcolor{couleur2}{0 0.3176 0.4745}
%\newrgbcolor{couleur3}{0.0941 0.647 0.0196}
%\def\F{1.5}
%\psplot[linecolor=blue,linestyle=solid,plotpoints=1000]{0}{25}{\F}
%\def\G{1.55}
%\psplot[linecolor=black,linestyle=solid,plotpoints=1000]{0}{25}{\G}
%\def\H{1.45}
%\psplot[linecolor=black,linestyle=solid,plotpoints=1000]{0}{25}{\H}
%\pscustom[fillstyle=hlines,hatchwidth=0.3pt,hatchsep=12pt,hatchcolor=gray,linestyle=solid]
%{
%\psplot{0}{25}{\G}
%\psplot{25}{0}{\H}
%}
%\psdot(1,1)
%\psdot(2,1.75)
%\psdot(3,1.33)
%\psdot(4,1.625)
%\psdot(5,1.4)
%\psdot(6,1.58)
%\psdot(7,1.42)
%\psdot(8,1.56)
%\psdot(9,1.44)
%\psdot(10,1.55)
%\psdot(11,1.45)
%\psdot(12,1.54)
%\psdot(13,1.46)
%\psdot(14,1.53)
%\psdot(15,1.47)
%\psdot(16,1.53125)
%\psdot(17,1.471)
%\psdot(18,1.527)
%\psdot(19,1.473)
%\psdot(20,1.525)
%\psdot(21,1.476)
%\psdot(22,1.522)
%\psdot(23,1.478)
%\psdot(24,1.52)
%\psdot(25,1.48)
%\psdot(26,1.519)
%\uput[ur](-0.7,1.48){$\ell$}
%\psline[linestyle=dashed,linecolor=black](10,0)(10,1.53)
%\psline[linecolor=black]{<->}(1,1.45)(1,1.5)
%\psline[linecolor=black]{<->}(1,1.5)(1,1.55)
%\uput[ul](1,1.5){$\varepsilon$}
%\uput[ul](1,1.45){$\varepsilon$}
%\uput[ur](10,1.3){$10$ est le rang à partir duquel tous les termes}
%\uput[ur](10,1.2){de la suite sont dans la bande hachurée dépaisseur choisie}
% \uput[ur](5,1.7){Illustration avec la suite définie pour tout $n\geq 1$ par $u_n=\dfrac{3n+(-1)^n}{2n}$ }
%\endpsclip
%\psaxes[labels=all,labelsep=1pt, Dx=1,Dy=0.2,Ox=0,Oy=1]{->}(0,1)(\xmax,\ymax)
%\end{pspicture*}
%\end{center}
%}
%\begin{itemize}
%\item Le graphique permet de conjecturer que la suite $(u_n)$ converge vers $\ell= \dfrac{3}{2}$
%\item Ici on a choisi $\varepsilon = 0.05$ et on a trouvé que pour $N=10$, tous les termes de la suite $(u_n)$
%étaient dans l'intervalle $]1.45; 1.55[$ pour $n\geq 10$.
%\item Si on avait choisi $\varepsilon = 0.1$, on aurait trouvé que pour $N=5$, tous les termes de la suite $(u_n)$
%étaient dans l'intervalle $]1.4; 1.6[$ pour $n\geq 5$.
%\item Si on avait choisi $\varepsilon = 0.04$, on aurait trouvé que pour $N=13$, tous les termes de la suite $(u_n)$
%étaient dans l'intervalle $]1.46; 1.54[$ pour $n\geq 13$.\\
%\end{itemize}
%
%
%\begin{defi}
%On dit qu'une suite est \textbf{divergente} si elle n'est pas convergente.\\
%C'est le cas des suites qui n'admettent pas de limite, et des suites qui sont
%aussi grandes que l'on veut, dans les positifs ou négatifs, à partir d'un certain rang.\\
%Dans ce dernier cas, on dit que la suite diverge vers $+ \infty$ ou $-\infty$ et on note $\lim\limits_{n \to +\infty} u_n = +\infty$ ou
%$\lim\limits_{n \to +\infty} u_n = -\infty$.
%\end{defi}
%
%\Expls{
%Conjecturer graphiquement les limites éventuelles des suites $(u_n)$, $(v_n)$, $(w_n)$ et $(t_n)$ définies sur $\N$ par :
%$$u_n=4n^2+5n-1 \qquad \qquad v_n=-\dfrac{1}{n+2}+1 \qquad \qquad w_n=-2n^2+2 \qquad \text{ et } \qquad
%t_n=\cos(n)+1$$
%%Déterminer par le calcul le rang à partir duquel : $u_n \geq 10^{6}$.
%}
%
%
%\subsection{Application : limites et algorithmes}
%
%\subsubsection{Une suite qui diverge vers $-\infty$}
%
%\Exoi{On considère la suite $u$ définie pour tout entier naturel $n$ par :
% $$\left\{ \begin{array}{l} u_0=1 \\ u_{n+1}=2u_n-2\end{array} \right.$$
% \begin{enumerate}
%\item A l'aide des droites $\mathscr D :y=x$ et $\mathscr D' :y=2x-2$ donnée ci-dessous, placer sur l'axe des abscisses les termes de $u_0$ à $u_3$.
%\item Conjecturer la limite de la suite $u$.
%\item Calculer les $4$ premiers termes de la suite $u$.
%\item \begin{center}
%\Algo{8cm}{
%\Entree{
%$u$ est un nombre réel.\\
%$p$ est un nombre entier naturel.\\
%$A$ est un nombre réel strictement positif.
%}
%{
%$u:=1$ et $p:=0$ \\
%Entrer $A$ \\
% \While{ $u>-A$ }
%{$u:=2u-2$ et $ p:=p+1$}
%Afficher $p$.
%}
%}
%\end{center}
%\begin{enumerate}
%\item Qu'affiche cet algorithme si l'utilisateur entre $A=30$ ?
%\item Qu'affiche cet algorithme si l'utilisateur entre $A=100$ ? s'il entre $A=10000$ ?
%\end{enumerate}
%\end{enumerate}
%}
%
%\begin{center}
%%\usepackage{pstricks,pst-plot,pst-text,pst-tree,pst-eps,pst-fill,pst-node,pst-math}
%\psset{xunit=1cm , yunit=1cm}
%\begin{pspicture*}(-1.1,-1.1)(11.1,11.1)
%\def\xmin{-1} \def\xmax{11} \def\ymin{-1} \def\ymax{11}
%%\psframe[linewidth=0.3pt,linecolor=gray](-1.1,-1.1)(11.1,11.1)
%\def\pshlabel#1{\psframebox*[framesep=1pt]{\small #1}}
%\def\psvlabel#1{\psframebox*[framesep=1pt]{\small #1}}
%\psclip{%
%\psframe[linestyle=none](\xmin,\ymin)(\xmax,\ymax)
%}
%\newrgbcolor{couleur1}{0.6549 0.6549 0}
%\newrgbcolor{couleur2}{0 0.3176 0.4745}
%\newrgbcolor{couleur3}{0.0941 0.647 0.0196}
%\psline[linewidth=0.8pt,linecolor=white,linestyle=solid]{-}(3,0)(3,4)
%%\psline[linewidth=0.8pt,linecolor=red,linestyle=dotted]{-}(3,0)(3,4)
%\psline[linewidth=0.8pt,linecolor=white,linestyle=solid]{-}(3,4)(0,4)
%%\psline[linewidth=0.8pt,linecolor=red,linestyle=dotted]{-}(3,4)(0,4)
%\psline[linewidth=0.8pt,linecolor=white,linestyle=solid]{-}(0,4)(4,4)
%%\psline[linewidth=0.8pt,linecolor=red,linestyle=dotted]{-}(0,4)(4,4)
%\psline[linewidth=0.8pt,linecolor=white,linestyle=solid]{-}(4,4)(4,0)
%%\psline[linewidth=0.8pt,linecolor=red,linestyle=dotted]{-}(4,4)(4,0)
%\def\F{2 x mul 2 sub}
%\psplot[linecolor=gray,linewidth=0.5pt,linestyle=solid]{-1}{11}{x}
%\psplot[linewidth=1.2pt,linecolor=blue,linestyle=solid,plotpoints=1000]{-1}{11}{\F}
%
%\endpsclip
%\psaxes[labels=none,labelsep=1pt,Dx=1,Dy=1,Ox=0,Oy=0]{-}(0,0)(\xmin,\ymin)(\xmax,\ymax)
%\uput[dl](0,0){ O}
%\pcline[linewidth=1pt]{->}(0,0)(1,0) \uput[d](0.5,0){ $\vec{\imath}$}
%\pcline[linewidth=1pt]{->}(0,0)(0,1) \uput[l](0,0.5){ $\vec{\jmath}$}
%\end{pspicture*}
%
%\end{center}
%\subsubsection{Une suite qui converge vers un réel $\ell$}
%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% Le cours
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% 0. Position du pb
%\Exoi{On considère la suite $u$ définie pour tout entier naturel $n$ par :
% $$u_n=2-\dfrac{1}{n+1}$$
% \begin{enumerate}
% \item Calculer les premiers termes de la suite, conjecturer son sens de variation et sa limite $\ell$.
% \item Montrer que $$ u_{n+1}-u_n=\dfrac{1}{n+1}$$
% \item En déduire que la suite est strictement croissante.
%\item On considère l'algorithme suivant :
% \begin{center}
%\Algo{8cm}{
%\Entree{
%$u$ est un nombre réel.\\
%$p$ est un nombre entier naturel.\\
%$\varepsilon$ est un nombre réel strictement positif.
%}
%{
%$u:=1$ et $p:=0$ \\
%Entrer $\varepsilon$ \\
% \While{ $u\notin \left]2-\varepsilon;2+\varepsilon\right[$ }
%{$p:=p+1$ et $ u:=2-\dfrac{1}{p+1}$}
%Afficher $p$.
%}
%}
%\end{center}
%\begin{enumerate}
%\item Qu'affiche cet algorithme si l'utilisateur entre $\varepsilon=0,3$ ?
%\item Qu'affiche cet algorithme si l'utilisateur entre $\varepsilon=0,1$ ? s'il entre $\varepsilon=0,01$ ?
%\item Soit $\varepsilon >0$. Déterminer le rang $p$ à partir duquel $$u_p\in \left]2-\varepsilon;2+\varepsilon\right[$$
%\item Conclure que :
%$$ \lim\limits_{n\to +\infty} u_n=2$$
%\end{enumerate}
%\end{enumerate}
%}
\pagebreak
\section{Suite Arithmétique}
\subsection{Découverte des suites arithmétiques au travers d'un exemple}
\Exoi{Dans le pays des merveilles d'Alice, le lapin blanc, depuis le temps, a fait des enfants (enfin des adolescents plutôt...). Du plus vieux au plus jeune : le lapin bleu, le lapin rouge, le lapin vert et le lapin noir. A l'adolescence chacun des 4 lapins a réclamé de l'argent de poche. Noter que les lapins du pays des merveilles sont adolescents de $0$ à $4$ ans, ils deviennent enfants par la suite et n'ont jamais été adultes.\\
Le lapin blanc a décidé de donner au lapin bleu dès sa naissance et jusqu'au jour de ses 4 ans des carottes de la manière suivante :
\begin{itemize}
\item $3$ carottes la première semaine ;
\item Chaque semaine deux carottes de plus que la semaine précédente.
\end{itemize}
\textit{On admet qu'au pays des merveilles chaque année est constituée d'exactement $52$ semaines et chaque mois de $4$ semaines. Remarquons que les lapins du pays des merveilles ont un treizième mois...}
\\
On note $u_0=3$ et $u_n$ le nombre de carottes reçues par le lapin bleu le jour où il fête ses $n$ semaines.
\begin{enumerate}
\item Exprimer $u_{n+1}$ en fonction de $u_n$ ; calculer $u_1$ ; $u_2$ et $u_3$. Combien de carottes le lapin bleu a-t-il reçu le premier mois ?
\item Proposer une formule donnant $u_n$ en fonction de $n$. Vérifier cette formule en recalculant $u_1$ ; $u_2$ et $u_3$.
\item Calculer le nombre de carottes reçues par le lapin bleu le jour de ses $1$ an, de ses $2$ ans, de ses $3$ ans et enfin le jour de ses $4$ ans.
\item Pour leur seule consommation personnelle les lapins du pays des merveilles ont besoin de $300$ carottes par semaine.
\begin{enumerate}
\item A partir de quel âge le lapin bleu peut-il se nourrir à satiété ?
\item Déterminer le nombre total de carottes que le lapin blanc a donné au lapin bleu au cours de son adolescence. On devra donc calculer :
$$ S=u_0+u_1+\dots+u_{207}=\sum_{i=0}^{i=207}u_i$$
\item Dès qu'il reçoit plus de $300$ carottes, le lapin bleu (fort économe) met toutes les autres de côté. \\
Déterminer le nombre de carottes économiser par le lapin bleu.
\item Grand amateur de montre, le lapin bleu décide de troquer ses carottes contre des montres au cours suivant, $1$ montre contre $540$ carottes.
Déterminer le nombre de montres que le lapin bleu a pu acquérir grâce aux carottes économisées.
\end{enumerate}
\end{enumerate}
}
\pagebreak
\subsection{Définition}
\begin{defi}
Une suite arithmétique est une suite de nombres dans laquelle chaque terme permet de déduire le suivant en lui ajoutant la même constante appelée raison.\\
Si on note $u$ une suite arithmétique de raison $r$ définie pour tout entier $n$ on a donc, pour tout entier naturel $n$ :
$$ u_{n+1}=u_n+r$$
\end{defi}
\Expl{La suite des entiers naturels pairs est une suite arithmétique de premier terme 0 et de raison 2}
\Rq{Si $u$ est suite arithmétique de raison $r$ alors pour tout $n$ on a :
$$ u_{n+1}=u_n+r\Longleftrightarrow u_{n+1}-u_n=r$$
Si la raison $r>0$ alors la suite arithmétique est strictement croissante, au contraire si $r<0$ la suite arithmétique est strictement décroissante. Dans le cas où $r=0$ il s'agit d'une suite constante.
}
\Exoi{Les suites suivantes sont-elles arithmétiques ? Dans le cas d'une réponse positive préciser leur raison et leur sens de variation.
\begin{multicols}{3}
\begin{enumerate}
\item $u_n=3n-2$
\item $u_n=n^2-3$
\item $u_n=-4n+1$
\end{enumerate}
\end{multicols}
}
\subsection{Expression explicite en fonction de $n$}
On considère une suite arithmétique $u$ de raison $r$ et de premier terme $u_0$, on a alors :
\begin{eqnarray*}
& & u_1=u_0+r\\
& \Longrightarrow & u_2=u_1+r=u_0+2r\\
& \Longrightarrow & u_3=u_2+r=u_0+3r\\
& \Longrightarrow & u_4=u_3+r =u_0+3r+r=u_0+4r\\
& \Longrightarrow & \dots\dots\dots\\
&\Longrightarrow & u_n=u_{n-1}+r=u_0+(n-1)r+r=u_0+nr
\end{eqnarray*}
\begin{prop}
Soit $(u_n)$ une suite arithmétique de raison $r$, alors $$u_n=u_0+nr$$
\end{prop}
\Exoi{$(u_n)$ est la suite arithmétique de premier terme $u_0=3$ et de raison $2$. \newline
Calculer $u_{2013}$}
\begin{theo}Soit $(u_n)$ une suite arithmétique de premier terme $u_0$ et de raison $r$, alors pour tous $p$ et $n$ de $\N$ :
$$ u_n=u_p+(n-p)r$$
\end{theo}
\Dem{D'après la propriété précédente on a pour tous $p$ et $n$ de $\N$ :
$$ u_p=u_0+pr \qquad \text{ et }\qquad u_n=u_0+nr$$
Par conséquent $$ u_n-u_p=u_0+nr-u_0-pr=(n-p)r\Longleftrightarrow u_n=u_p+(n-p)r$$}
\Exoi{Considérons une suite arithmétique $(v_n)$ telle que $v_{27}=6$ et $v_{39}=10$\newline
Calculer $v_7$ et $v_{74}$
}
\begin{theo}
On considère une suite $(u_n)$ définie par $u_n=an+b$ où $a$ et $b$ sont deux réels. \newline
$(u_n)$ est une suite arithmétique de raison $a$
\end{theo}
\Dem{Soit $n\in\N$, on a alors :
$$ u_{n+1}-u_n=a(n+1)+b-an-b=a$$}
\subsection{Somme de termes successifs}
\Rq{Soit $(u_n)$ une suite. La somme $u_1+u_2$ comporte deux termes, de même la somme $u_1+u_2+u_3$ en comporte $3$. De manière générale la somme $u_1+u_2+\dots u_p$ comporte $p$ termes. \newline
Combien en comporte la somme :$u_{14}+u_{15}+\dots +u_{25}$ ? On peut remarquer que cette somme s'écrit encore :
$$ u_{1+13}+u_{2+13}+\dots +u_{13+12} $$
Par conséquent elle comporte $12$ termes, i.e $25-14+1$ termes.}
\begin{prop}La somme $u_p+u_{p+1}+\dots+u_q$ comporte donc $q-p+1$ termes ($p$ et $q$ sont des nombres entiers tels que : $p<q$)
\end{prop}
\begin{prop}[Somme des $n$ premiers entiers]$$ 1+2+\dots+n-1+n=\dfrac{n(n+1)}{2}$$\end{prop}
\Dem{Notons $S=1+2+\dots+n-1+n$, on a $2S=1+2+\dots+n+1+2+\dots+n=(1+n)+(2+n-1)+(3+n-2)+\dots +(n-2+3)+(n-1+2)+(n+1)=n(n+1)$ donc $S=\dfrac{n(n+1)}{2}$}
\Expl{La somme des $100$ premiers entiers est donc :
$$ \dfrac{100\times 101}{2}=\dfrac{10100}{2}=5050$$}
\begin{theo}On considère une suite arithmétique $u$ et $S$ la somme des termes successifs (à partir de celui de rang $p$ jusqu'à celui de rang $n$) que l'on note :
$$ S=u_p+u_{p+1}+\dots+u_n=\sum_{i=p}^{i=n}u_i$$
On a alors :
$$S=\dfrac{(n-p+1)(u_p+u_d)}{2} $$
\end{theo}
\Dem{On a : $$ S=u_p+u_{p+1}+u_{p+2}\dots+u_{n-2}+u_{n-1}+u_n$$
En notant $r$ la raison on obtient :
$$ S=u_p+(u_p+r)+(u_p+2r)+\dots + (u_n-2r)+(u_n-r)+u_n$$
En inversant l'ordre des termes de cette somme, $S$ s'écrit aussi :
$$ S=u_n+(u_n-r)+(u_n-2r)+\dots+(u_p+2r)+(u_p+r)+u_p$$
Effectuons alors la somme, membre à membre terme à terme, des deux égalités précédentes :
$$ 2S=(u_p+u_n)+(u_p+r+u_n-r)+(u_p+2r+u_n-2r)+\dots+(u_n-2r+u_p+2r)+(u_n-r+u_p+r)+(u_n+u_p)$$
Cette somme comporte $n-p+1$ termes tous égaux à $u_p+u_n$, par conséquent :
$$ 2S=(n-p+1)(u_p+u_n)\Longleftrightarrow S=\dfrac{(n-p+1)(u_p+u_n)}{2} $$}
\Exoi{
\begin{enumerate}
\item Calculer la somme des $50$ premiers entiers impairs.
\item Calculer la somme des $50$ premiers entiers pairs en partant de $12$
\end{enumerate}}
\pagebreak
\Exoi{En reprenant le contexte de l'exercice introductif. La lapin blanc décide pour son second, le lapin rouge de donner dès sa naissance et jusqu'au jour de ses 4 ans des carottes de la manière suivante :
\begin{itemize}
\item $417$ carottes la première semaine ;
\item Chaque semaine deux carottes de moins que la semaine précédente.
\end{itemize}
On note $v$ la suite telle que $v_n$ vaut le nombre de carottes reçues par le lapin rouge le jour de sa $n-$ième semaine. Notons que $v_1=417$ et que $v_0$ n'existe pas.
\begin{enumerate}
\item Justifier que $v_n$ est une suite arithmétique ; préciser sa raison et son sens de variation.
\item Exprimer $v_n$ en fonction de $n$.
\item Calculer le nombre de carottes reçues par le lapin bleu le jour de ses $1$ an, de ses $2$ ans, de ses $3$ ans et enfin le jour de ses $4$ ans.
\begin{enumerate}
\item Jusqu'à quel âge le lapin bleu peut-il se nourrir à satiété ?
\item Déterminer le nombre total de carottes que le lapin blanc a donné au lapin rouge au cours de son adolescence. On devra donc calculer :
$$ S=v_1+v_2+\dots+v_{208}=\sum_{i=1}^{i=208}v_i$$
\item Dès qu'il reçoit plus de $300$ carottes, le lapin rouge (fort économe comme son frère) met toutes les autres de côté. \\
Déterminer le nombre de carottes économiser par le lapin rouge.
\item Grand amateur de montre, le lapin rouge décide de troquer ses carottes contre des montres mais l'inflation existe au pays des merveilles. Il faut $10\%$ de carottes supplémentaires pour obtenir une montre qu'au temps du lapin bleu.
Le lapin rouge est-il perdant par rapport à son frère ?
\end{enumerate}
\item Le lapin blanc constatant l'injustice subit par le lapin rouge décide d'utiliser une autre méthode pour les \og carottes de poches \fg{} du lapin suivant, le lapin vert. Il le rémunère de sa naissance et jusqu'au jour de ses 4 ans de la manière suivante :
\begin{itemize}
\item $1$ carotte la première semaine ;
\item Chaque semaine trois carottes de plus que la semaine précédente ;
\item $100$ carottes les $6$ derniers mois.
\end{itemize}
On note $w$ la suite telle que $w_0=1$ et $w_n$ désigne le nombre de carottes reçues par le lapin rouge le jour où il fête ses $n$ semaines.
\begin{enumerate}
\item La suite $w$ est-elle arithmétique ?
\item Plus précisément déterminer le rang jusqu'au quel $w$ se comporte comme une suite arithmétique.
\item Identique à ses frères le lapin rouge économise dès qu'il reçoit plus de $300$ carottes par semaine. Mais durant les $6$ derniers mois il mange un peu de ses économies de manière à manger $300$ carottes exactement par semaine. Sachant que le cours de la carotte a encore augmenté de $50\%$ déterminer le nombre de montre que le lapin rouge possèdera au moment de devenir enfant.
\end{enumerate}
\end{enumerate}
}
\pagebreak
\section{Suite Géométrique}
\subsection{Découverte des suites géométriques au travers d'un exemple}
\Exoi{Vient le tour du derrnier né du lapin blanc, le lapin noir. Détestant les habitudes le lapin blanc modifie une nouvelle fois le système des \og carottes de poches \fg{} et le lapin noir se voit proposer le système suivant :
\begin{itemize}
\item $3$ carottes la première semaine ;
\item Chaque semaine $3,5\%$ de carottes en plus de la semaine précédente (le lapin blanc donnera s'il le faut des morceaux de carottes...)
\end{itemize}
On note $t$ la suite telle que $t_n$ vaut le nombre de carottes reçues par le lapin rouge le jour de sa $n-$ième semaine. Notons que $t_1=3$ et que $t_0$ n'existe pas.
\begin{enumerate}
\item Calculer $t_1$ ; $t_2$ et $t_3$ puis exprimer $t_{n+1}$ en fonction de $t_n$. Combien de carottes le lapin noir a-t-il reçu le premier mois ?
\item Proposer une formule donnant $t_n$ en fonction de $n$. Vérifier cette formule en recalculant $t_1$ ; $t_2$ et $t_3$.
\item Calculer le nombre de carottes reçues par le lapin noir le jour de ses $1$ an, de ses $2$ ans, de ses $3$ ans et enfin le jour de ses $4$ ans.
\item Pour leur seule consommation personnelle les lapins du pays des merveilles ont besoin de $300$ carottes par semaine.
\begin{enumerate}
\item A partir de quel âge le lapin noir peut-il se nourrir à satiété ?
\item Déterminer le nombre total de carottes que le lapin blanc a donné au lapin noir au cours de son adolescence. On devra donc calculer :
$$ S=t_1+t_2+\dots+t_{208}=\sum_{i=1}^{i=208}t_i$$
\item Dès qu'il reçoit plus de $300$ carottes, le lapin noir (comme les autres) met toutes les autres de côté. \\
Déterminer le nombre de carottes économiser par le lapin noir.
\item Par rapport au lapin précédent, le cours de la carotte a encore augmenté de $10\%$.
Déterminer le nombre de montres que le lapin noir a pu acquérir grâce aux carottes économisées.
\end{enumerate}
\end{enumerate}
}
\subsection{Définition}
\begin{defi}Une suite \underline{g\'eom\'etrique} est une suite de nombres dans laquelle chaque terme permet de déduire le suivant par multiplication par un coefficient constant appelé raison. Ainsi, une suite géométrique $u$ de raison $q$ et de premier terme $a$ a la forme suivant :
$$ a\quad aq\qquad aq^2\qquad aq^3\qquad aq^4$$
La définition peut s'écrire sous la forme d'une relation de récurrence, c'est-à-dire que pour chaque entier naturel $n$ :
$$ u_{n+1}=q\times u_n$$
\end{defi}
\Expl{La suite des puissances de $2$ est une suite géométrique de raison $2$ : $u_{n+1}=2\times u_n$\\
Donner les premiers termes de la suite géométrique de premier terme $2$ et de raison $0,5$.}
\Exoi{\begin{enumerate}
\item Montrer que la suite $(u_n)$ définie par $u_n=\dfrac{2}{3^n}$ est géométrique
\item La suite $(v_n)$ est définie par $v_0=6$ et $v_{n+1}=3v_n+4$ pour tout $n\in\N$.\newline
On note $$w_n=v_n+2$$
Montrer que $(w_n)$ est une suite géométrique
\end{enumerate}}
\Exoi{Montrer que la suite $(u_n)$ définie, pour tout $n\in\N$ par $u_n=2\times (-1)^n$ est géométrique. On précisera sa raison.}
\subsection{Expression explicite en fonction de $n$}
\begin{theo}On considère une suite $(u_n)$ définie par $u_n=aq^n$ où $a$ et $q$ sont deux réels non nuls. \newline
$(u_n)$ est une suite géométrique de raison $q$\end{theo}
\Dem{Pour tout $n\in\N$ on a $u_{n+1}=aq^{n+1}=aq^n\times q=q u_n $. Par conséquent la suite est géométrique de raison $q$}
\begin{theo}Soit $(u_n)$ une suite géométrique de raison $q\neq 0$ et de premier terme $u_0$ alors $$u_n=u_0 \times q^n$$\end{theo}
\Dem{On peut raisonner de proche en proche. On a :
\begin{eqnarray*}
&& u_1=u_0q\\
&& u_2=u_1q=u_0q^2\\
&& u_3=u_2q=u_0q^3\\
&& \dots \\
&& u_{n-1}=u_{n-2}q=u_0q^{n-2}\\
&& u_n=u_{n-1}q=u_0q^{n-1}\\
\end{eqnarray*}
}
\Expl{Soit $(u_n)$ la suite géométrique de premier terme $u_0=2$ et de raison $3$. On a alors :
$$ u_n=2 \times 3^n$$
On peut, par exemple calculer directement $u_5=2\times 3^5=2\times 243=486$}
\begin{theo}$(u_n)$ est une suite géométrique de raison $q\neq 0$ alors quels que soient les entiers naturels $n$ et $p$ on a :
$$u_n=q^{n-p}\times u_p$$ \end{theo}
\Dem{D'après le théorème précédent, on a :
$$ u_n=u_0q^n \qquad \text{ et }\qquad u_p=u_0q^p$$
donc, puisque $q\neq 0$, $u_0= \dfrac{u_p}{q^p}$ ; d'où $u_n=\dfrac{u_p}{q^p}q^n=u_p\times q^{n-p}$ }
\Exoi{$(u_n)$ et $(v_n)$ sont deux suites géométriques. Déterminer $u_5$, $u_8$, $v_7$ et $v_{15}$ sachant que :
\begin{enumerate}
\item $u_0=6$ et $q=-\dfrac{1}{3}$
\item $v_5=1$ et $v_{10}=32$
\end{enumerate}}
\subsection{Somme de termes successifs}
On s'interesse à la somme des $n$ premiers termes de la suite géométrique de premier terme $1$ et de raison $q$, avec $q\neq 1$
\begin{prop}[Cas particulier $u_n=q^n$, avec $q\neq 1$]$$ 1+q+q^2+\dots+q^{n-2}+q^{n-1}=\dfrac{1-q^n}{1-q}$$\end{prop}
\Dem{Notons $S=1+q+q^2+\dots+q^{n-2}+q^{n-1}$, on a $qS=q+q^2+\dots+q^{n-2}+q^{n-1}+q^n$\newline
Par conséquent $$(1-q)S=S-qS=1-q^n\Longleftrightarrow S=\dfrac{1-q^n}{1-q}$$}
\Expl{La somme des $10$ premiers termes de cette suite géométrique lorsque $q=2$ est donc :
$$ \dfrac{1-2^{10}}{1-2}=1023$$}
\begin{theo}La somme des termes consécutifs, du terme de rang $p$ au terme de rang $n$, d'une suite géométrique de raison $q$ ($q\neq 1$) est égale à :
$$ u_p+u_{p+1}+\dots+u_n=u_p \dfrac{1-q^{n-p+1}}{1-q}$$
\end{theo}
\Dem{On calcule donc $S$, la somme des $n-p+1$ termes consécutifs, de premier terme $u_p$, d'une suite géométrique de raison $q$ où $q\neq 1$
$$ S=u_p+u_{p+1}+\dots+u_n=u_p+u_p\times q+u_p\times q^2+\dots +u_p\times q^{n-p+1-1}=u_p(1+q+q^2+\dots+q^{n-p+1-1})=u_p \dfrac{1-q^{n-p}}{1-q}$$
}
\Rq{Le cas $q=1$ est trivial, en notant le premier terme de la somme $a$ :
$$a+aq+aq^2+\dots +aq^{n-1}=a+a+\dots+a=na$$}
\Exoi{
Soit $(u_n)$ la suite géométrique de premier terme $u_0=\dfrac{1}{2}$ et de raison $q=\dfrac{3}{2}$. Calculer $S=u_4+u_5+\dots+u_{14}$}
\subsection{Convergence}
\begin{theo}Soit $(u_n)$ une suite définie par : $u_n=q^n$ alors :
\begin{itemize}
\item Si $q \in ]-1;1[$ la suite $(u_n)$ est convergente vers $0$
\item Si $q=1$ alors la suite $(u_n)$ est constante et donc convergente vers $1$, si $q=-1$ la suite diverge (elle vaut tantôt $1$ tantôt $-1$).
\item Si $q>1$ alors la suite $(u_n)$ est divergente (vers $+\infty$), enfin si $q<-1$ la suite diverge (un terme sur deux est négatif, l'autre est positif).
\end{itemize}
\end{theo}
Pour cette démonstration, nous n'étudierons que le cas où $q>0$, nous allons utiliser le résultat suivant \footnote{un résultat servant une démonstration est usuellement appelé Lemme}
\begin{lem}[Inégalité de Bernoulli]Pour tout réel $x$ positif et pour tout entier $n$, on a :$$(1+x)^n\geq 1+nx$$\end{lem}
\Dem[du lemme]{Notons $\mathscr P(n)$ la propriété $(1+x)^n\geq 1+nx$ est vraie\newline
$\mathscr P(0)$ et $\mathscr P(1)$ sont évidentes\newline
Montrons que $\mathscr P(n)\Longrightarrow \mathscr P(n+1)$.\newline
On suppose donc que $(1+x)^n\geq 1+nx$ et on souhaite montrer que : $(1+x)^{n+1}\geq 1+(n+1)x$\newline
On a alors, pour tout $x\geq0$ :
\begin{eqnarray*}
&& (1+x)^n\geq 1+nx \\
&\Longleftrightarrow & (1+x)^{n+1}\geq (1+nx)(1+x) \qquad \text{en multipliant membre à membre par }(1+x)>0\\
&\Longleftrightarrow & (1+x)^{n+1}\geq 1+nx+x+nx^2\\
& \Longleftrightarrow & (1+x)^{n+1}\geq 1+(n+1)x+nx^2 \\
& \Longleftrightarrow & (1+x)^{n+1}\geq 1+(n+1)x \qquad \text{puisque }nx^2\geq 0\\
\end{eqnarray*}
Résumons : On a donc $\mathscr P(0)$ mais aussi, $\forall n\in \N$, $\mathscr P(n)\Longrightarrow \mathscr P(n+1)$, par conséquent on a : pour tout réel $x$ positif et pour tout entier $n$, on a :$$(1+x)^n\geq 1+nx$$}
\Rq{Le type de raisonnement que l'on vient d'effectuer s'appelle le \underline{raisonnement par récurrence}, il sera étudié amplement en terminale.}
\Dem[du théorème]{
\begin{itemize}
\item $q>1$\newline
Posons $x=q-1$, on a alors $x>0$, et d'après l'inégalité de Bernoulli :
$$ q^n=(1+x)^n \geq 1+nx$$
Or, $\lim\limits_{n\to +\infty} 1+nx=+\infty$, par comparaison on en déduit : $$ \lim\limits_{n \to +\infty} q^n=+\infty$$
La suite $(u_n)$ diverge donc vers $+\infty$
\item $q\in [0;1[$\newline
Si $q=0$ le résultat est évident, sinon posons $q'=\dfrac{1}{q}$, dans ce cas $q' \in ]1;+\infty[$\newline
D'après le résultat précédent : $$ \lim\limits_{n \to +\infty} q'^n=+\infty$$
Par passage à l'inverse nous obtenons donc : $$ \lim\limits_{n \to +\infty} q^n=0$$
La suite $(u_n)$ converge donc vers $0$
\item $q=1$, le résultat est alors évident.
\end{itemize}}
\Exoi{$(u_n)$ est la suite géométrique de premier terme $u_0=3$ et de raison $ \dfrac{1}{2}$. On note $s_n$ la somme $u_0+u_1+u_2+\dots+u_n$
\begin{enumerate}
\item Exprimer $s_n$ en fonction de $n$
\item Calculer $\lim\limits_{n\to +\infty}s_n$
\end{enumerate} }
\pagebreak
\subsection{Application}
\Exoi{Un étudiant loue une chambre pour $3$ ans. On lui propose deux types de bails. \\
\underline{1$^\text{er}$ contrat} : Un loyer de $200\euro$ pour le premier mois puis une augmentation de $5\euro$ par mois jusqu'à la fin du bail.
\\
\underline{2$^\text{ème}$ contrat} : Un loyer de $200\euro$ pour le premier mois puis une augmentation de $2\%$ par mois jusqu'à la fin du bail\footnote{Un bail est un contrat de location}.
\begin{enumerate}
\item Calculer, pour chacun des deux contrats, le loyer du deuxième mois puis le loyer du troisième mois.
\item Calculer, pour chacun des deux contrats, le loyer du dernier mois, i.e le loyer du $36^\text{ème}$ mois.
\item Quel est le contrat globalement le plus avantageux pour un bail de $3$ ans ? (\textit{Justifier par des calculs})
\end{enumerate}
}
\Exoi{On considère la suite géométrique définie de la façon suivante :
$$ u_1=1\qquad \text{et}\qquad u_{n+1}=2u_n\qquad \forall n\geq 1$$
\begin{enumerate}
\item Calculer $u_2$ ; $u_3$ ; $u_4$.
\item Exprimer $u_n$ en fonction de $n$ ; en déduire $u_{64}$.
\item \textbf{La légende du jeu d'échec} :\textit{ Le roi demanda à l'inventeur du jeu d'échec de choisir lui-même sa récompense. Celui-ci répondit : \og place 1 grain de blé sur la première case de l'échiquier, deux grains sur la deuxième case, quatre sur la troisième case, et ainsi de suite jusqu'à la $64^\text{ième}$ case. Le roi sourit de la modestie de la demande.}
\\
Calculer une valeur approchée du nombre total de grains de blé que le roi devra placer sur l'échiquier.
\end{enumerate}
}
\Exoi{Les rayons cosmiques produisent continuellement dans l'atmosphère du carbone $14$, qui est un élément radioactif. Durant leur vie, les tissus animaux et végétaux contiennent la même proportion de carbone $14$ que l'atmosphère. Cette proportion de carbone $14$ décroît après la mort du tissu de $1,24\%$ en $100$ ans.
\begin{enumerate}
\item Déterminer les pourcentages de la proportion initiale de carbone $14$ contenu dans le tissu au bout de $1000$ ans, de $2000$ ans et de $10000$ ans.
\item Exprimer le pourcentage de la proportion initiale de carbone $14$ contenu dans le tissu au bout de $k\times 10^3$ années.
\item Un fossile ne contient plus que $10\%$ de ce qu'il devrait contenir en carbone $14$. Estimer son âge.
\end{enumerate}
}
\Exoi{Premières étapes de la construction du triangle de Sierpinski :
\begin{center}
\includegraphics[scale=1]{Sierpinski.eps}
\end{center}
\begin{enumerate}
\item On note $u$ la suite qui donne le nombre de triangle noir à l'étape $n$. Quelle est la nature de $u$ ; préciser ses éléments caractéristiques.
\item On note $v$ la suite qui donne la longueur d'un côté du triangle noir à l'étape $n$. Quelle est la nature de $v$ ; préciser ses éléments caractéristiques.
\item On note $w$ la suite qui donne l'aire d'un triangle noir à l'étape $n$. Quelle est la nature de $w$ ; préciser ses éléments caractéristiques.
\item On note $t$ la suite qui donne l'aire du domaine couvert par les triangles noirs à l'étape $n$. Quelle est la nature de $t$ ; préciser ses éléments caractéristiques.
\end{enumerate}
}
\pagebreak
\section{Suite Arithmético-géométrique}
\Exoi{Comme vous le savez tous, le Schblurb commun à aillette mouchetée est l’animal emblématique de la Syldavie. Aussi
paisible que les habitants de ce bucolique pays, le Schblurb se nourrit exclusivement des baies du bleurtschzrn, arbre
qui pousse en abondance dans les verts sous-bois syldaves.
\\
On suppose que la population $u$ lors de l'année $n$ de Schblrurbs suit la loi suivante :
$$ u_{n+1}=au_n+b$$
L’effectif des Schblurbs,
exprimé en millions d’individus, est approché pour l’année $n$ par un nombre réel $u_n$. Par
exemple, si pour l’année zéro il y a $300 000$ Schblurbs, on prendra $u_0= 0,3$.\\
Le but de l’exercice est d’étudier le comportement de la suite $u$ pour différentes valeurs de la population initiale $u_0$
et des paramètres $a$ et $b$.\\
On cherche à estimer la population de Schblurbs dans l'avenir lointain, par deux techniques différentes dont l'une utilise la suite auxiliaire suivante :\\
la suite $v$ est définie, pour $n\in\N$, par :
$$ v_n=u_n-\dfrac{b}{1-a}$$
\begin{enumerate}
\item \textbf{Cas 1} : $u_0=0,7$ ; $a=-0,2$ et $b=0,4$.
\begin{enumerate}
\item Calculer la population de Schblurbs présent aux années $1$ ; $2$ et $3$.
\item \begin{enumerate}
\item Préciser la fonction $f$ telle que $u_{n+1}=f(u_n)$.
\item A l'aide de la représentation graphique de la fonction $f$ et de la droite d'équation $y=x$ représenter les $5$ premiers termes de la suite $u$.
\item Que pouvez-vous conjecturer sur la limite de la suite $u$.
\item Déterminer cette limite par le calcul.
\end{enumerate}
\item Vérifier que, pour tout entier $n$, on a :
$$ v_{n}=u_n-\dfrac{1}{3}$$
\item Montrer que $v$ est une suite géométrique ; on précisera sa raison.
\item Exprimer $v_n$ en fonction de $n$.
\item En déduire que $$ u_n=\dfrac{11}{30}\times \left(-\dfrac{1}{5}\right)^n+\dfrac{1}{3}$$
\item En déduire la limite $\ell$ de la suite $u$.
\end{enumerate}
\item \textbf{Cas 2} : $u_0=0,7$ ; $a=1,5$ et $b=-0,2$.
\begin{enumerate}
\item Calculer la population de Schblurbs présent aux années $1$ ; $2$ et $3$.
\item \begin{enumerate}
\item Préciser la fonction $f$ telle que $u_{n+1}=f(u_n)$.
\item A l'aide de la représentation graphique de la fonction $f$ et de la droite d'équation $y=x$ représenter les $5$ premiers termes de la suite $u$.
\item Que pouvez-vous conjecturer sur la limite de la suite $u$.
\end{enumerate}
\item Vérifier que, pour tout entier $n$, on a :
$$ v_{n}=u_n-\dfrac{2}{5}$$
\item Montrer que $v$ est une suite géométrique ; on précisera sa raison.
\item Exprimer $v_n$ en fonction de $n$.
\item En déduire que $$ u_n=\dfrac{3}{10}\times \left(\dfrac{3}{2}\right)^n+\dfrac{2}{5}$$
\item En déduire la limite $\ell$ de la suite $u$.
\end{enumerate}
\item \textbf{Cas 3} : $u_0=0,3$ ; $a=1,5$ et $b=-0,2$.
\begin{enumerate}
\item Calculer la population de Schblurbs présent aux années $1$ ; $2$ et $3$.
\item \begin{enumerate}
\item Préciser la fonction $f$ telle que $u_{n+1}=f(u_n)$.
\item A l'aide de la représentation graphique de la fonction $f$ et de la droite d'équation $y=x$ représenter les $5$ premiers termes de la suite $u$.
\item Que pouvez-vous conjecturer sur la limite de la suite $u$.
\end{enumerate}
\item Vérifier que, pour tout entier $n$, on a :
$$ v_{n}=u_n-\dfrac{2}{5}$$
\item Montrer que $v$ est une suite géométrique ; on précisera sa raison.
\item Exprimer $v_n$ en fonction de $n$.
\item En déduire que $$ u_n=-\dfrac{1}{10}\times \left(\dfrac{3}{2}\right)^n+\dfrac{2}{5}$$
\item En déduire la limite $\ell$ de la suite $u$. Conclure.
\end{enumerate}
\item \textbf{Cas 4} : $u_0=0,3$ ; $a=-0,5$ et $b=7$.
\begin{enumerate}
\item Calculer la population de Schblurbs présent aux années $1$ ; $2$ et $3$.
\item \begin{enumerate}
\item Préciser la fonction $f$ telle que $u_{n+1}=f(u_n)$.
\item A l'aide de la représentation graphique de la fonction $f$ et de la droite d'équation $y=x$ représenter les $5$ premiers termes de la suite $u$.
\item Que pouvez-vous conjecturer sur la limite de la suite $u$.
\item Déterminer cette limite par le calcul.
\end{enumerate}
\item Vérifier que, pour tout entier $n$, on a :
$$ v_{n}=u_n-\dfrac{14}{3}$$
\item Montrer que $v$ est une suite géométrique ; on précisera sa raison.
\item Exprimer $v_n$ en fonction de $n$.
\item En déduire que $$ u_n=-\dfrac{131}{30}\times \left(-\dfrac{1}{2}\right)^n+\dfrac{14}{3}$$
\item En déduire la limite $\ell$ de la suite $u$. Conclure.
\end{enumerate}
\end{enumerate}
}
\epigraphe{La physique est bien trop dure pour les phycisiens}
{David Hilbert}
{mathématicien}
\end{document}
|
https://unilab.gbb60166.jp/math_ia/tex/ni032TikZansc.tex | gbb60166.jp | CC-MAIN-2023-14 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2023-14/segments/1679296949035.66/warc/CC-MAIN-20230329213541-20230330003541-00538.warc.gz | 678,544,970 | 4,289 | \documentclass[11pt,b4j,landscape,twocolumn,papersize]{jsarticle}
% furikana.sty http://xymtex.com/fujitas2/texlatex/index.html#tategumi
\usepackage{ascmac,bm,amssymb}
\usepackage[deluxe]{otf}
\usepackage[dvipdfmx]{graphicx,color}
%\usepackage{qrcode}
%\usepackage[dvipdfmx,pdfpagemode=FullScreen,setpagesize=false]{hyperref}
%\usepackage[dvipdfmx,pdfstartview={XYZ null null 1.75},setpagesize=false]{hyperref}
\usepackage{tikz}
%\usetikzlibrary{patterns}
%\usetikzlibrary{calc,intersections,through,angles,backgrounds,positioning}
%\AtBeginDvi{\special{pdf:pagesize width 364mm height 257mm}}
\textwidth=330truemm \textheight=226truemm \columnseprule=0pt
\topmargin=-24truemm \oddsidemargin=-8truemm
\newenvironment{nidan}{\begin{minipage}[t]{.225\textwidth}}{\end{minipage}}
%\def\nidangumi#1#2{\begin{nidan}{#1}\end{nidan}\quad%
%\begin{nidan}{#2}\end{nidan}}
\newcommand{\nidangumi}[2]{\begin{nidan}{#1}\end{nidan}\quad%
\begin{nidan}{#2}\end{nidan}}
% ■■■ 0より大きいときはdvipdfmxで印刷用PDFを作ることを想定(答えはプリント
% 下部に出力される)
% 0 のときはdvipdfmxでデジタル教材用PDFを作ることを想定(答えは問題の
% すぐ横に赤で出力され、後でOneNoteで黒く塗りつぶし)
\def\make_pdf_with_insatsu{1}
\everymath{\displaystyle}
\parindent=0zw \columnsep=3zw
\lineskiplimit=1ex \normallineskiplimit=\lineskiplimit
\lineskip=\lineskiplimit \normallineskip=\lineskiplimit
\newcounter{toi} \newcounter{subtoi}[toi]
\newcounter{subsubtoi}[subtoi]
\def\toi{\refstepcounter{toi}\par % 問
\makebox[2zw][r]{\Large\ajKaku{\value{toi}}\hspace{0.5zw}}%
\hangindent=2zw}
\def\subtoi{\refstepcounter{subtoi}\par % 小問
\makebox[3.4zw][r]{\ajKakko{\value{subtoi}}\hspace{1zw}}%
\hangindent=3.4zw}
\def\subsubtoi{\refstepcounter{subsubtoi}\par % 小小問
\makebox[4.2zw][r]{\ajMaru{\value{subtoi}}\hspace{1zw}}%
\hangindent=4.2zw}
\ifnum\make_pdf_with_insatsu>0
\def\kotae#1{\relax}
\else
\def\kotae#1{\hfill \textcolor{red}{\footnotesize\gtfamily\bfseries\(\boldsymbol{#1} \)}}
\fi
\newcommand{\Slash}[1]{\ooalign{\hfil\kern-0.2em/\hfil\crcr$#1$}}
\pagestyle{empty}
\makeatletter
\def\hooklen#1#2{\settowidth{\@tempdima}{\(#1\)}
%\advance\@tempdima by.3ex
% ↑ 数式モードで式の前後に入るスペースを制御したかったが、
% 難しいのでやめた。段々難解なコードになっているのでやめた方がよい?
\hbox to\@tempdima{\hfil \(#2\)\hfil}}
\makeatother
% ■ >0のときは「例?」「問?」の図形を表示する。
%そうでなければ表示しない(説明しながら書き込むことを想定している)
\def\DisplayToiFig{1}
\begin{document}
%
% ===========================以下本文===============================
%
\def\namae{%
{\Large\gtfamily\bfseries 数学I \quad 授業プリント \# 32}\hfill
年\hskip8ex 組\hskip8ex 号 \hskip5ex
\hfill
\underline{氏名\rule[-2ex]{0cm}{6ex}\hskip30ex}}
\namae
\vskip2ex
\def\arraystretch{1.5}
\def\mb#1{\makebox[3ex]{#1}}
\def\bbox{\raisebox{-1.5ex}{\framebox(7,7){}}}
\unitlength=1mm
\def\siki{y=2x^2+4x-1}
\toi \( \siki \) について次の表を完成させ,グラフをかきなさい。\kotae{5,-1,-3,-1,5}\\[1ex]
\def\arraystretch{1.5}
\def\mb#1{\makebox[3ex]{#1}}
\begin{tabular}[t]{|c||c|c|c|c|c|} \hline
$x$ & \mb{$-3$} & \mb{$-2$} & \mb{$-1$} & \mb{0} & \mb{1}
\\ \hline
\ifnum\DisplayToiFig>0
$y$ & \textcolor{red}{$5$} &
\textcolor{red}{$-1$} &
\textcolor{red}{$-3$} &
\textcolor{red}{$-1$} &
\textcolor{red}{$5$} \\ \hline
\else
$y$ & & & & & \\ \hline
\fi
\end{tabular}
\vskip-10ex
\mbox{}\hfill
\begin{tikzpicture}[scale=0.4, >=stealth, baseline=(current bounding box.north)]
\tiny
\draw[->](-5,0) -- (4,0);
\draw[->](0,-5) -- (0,7);
\foreach \x in {-4,...,3}{\foreach \y in {-4,...,6}{\fill (\x,\y) circle (2pt);}}
\draw(-0.4,-0.4) node {O};
\draw(4,-0.3) node {$x$};
\draw(-0.3,7) node {$y$};
%\draw(-0.3,1) node {$1$};
\draw(-0.3,5) node {$5$};
\ifnum\DisplayToiFig>0
\foreach \x in {-3,...,1}{%
\fill[red](\x,{2*(\x)^2+4*\x-1}) circle(4pt);
}
\draw[red,thick]({-1-sqrt(9/2)},6)
parabola bend (-1,-3) ({-1+sqrt(9/2)},6);
\fi
\end{tikzpicture}
\hspace*{2zw}\mbox{}
\vskip-10zh
{\gtfamily\bfseries 計算欄}
\nidangumi{$\bullet \quad x=-3$ のとき\\ \hspace*{2.8ex} \(\siki\)}
{$\bullet \quad x=-2$ のとき\\ \hspace*{2.8ex} \(\siki\)}
\vfill
\nidangumi{$\bullet \quad x=-1$ のとき\\ \hspace*{2.8ex} \(\siki\)}
{$\bullet \quad x=0$ のとき\\ \hspace*{2.8ex} \(\siki\)}
\vfill
\nidangumi{$\bullet \quad x=1$ のとき\\ \hspace*{2.8ex} \(\siki\)}
{}
\vfill
\ifnum\make_pdf_with_insatsu=0
\newpage
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\fi
\def\siki{y=x^2-4x+4}
\toi \( \siki \) について次の表を完成させ,グラフをかきなさい。\kotae{9,4,1,0,1,4}\\[1ex]
\def\arraystretch{1.5}
\def\mb#1{\makebox[3ex]{#1}}
\begin{tabular}[t]{|c||c|c|c|c|c|c|} \hline
$x$ & \mb{$-1$} & \mb{0} & \mb{1} & \mb{2} & \mb{3}
& \mb{4} \\ \hline
\ifnum\DisplayToiFig>0
$y$ & \textcolor{red}{$9$} &
\textcolor{red}{$4$} &
\textcolor{red}{$1$} &
\textcolor{red}{$0$} &
\textcolor{red}{$1$} &
\textcolor{red}{$4$} \\ \hline
\else
$y$ & & & & & & \\ \hline
\fi
\end{tabular}
\vskip-10ex
\mbox{}\hfill
\begin{tikzpicture}[scale=0.4, >=stealth, baseline=(current bounding box.north)]
\tiny
\draw[->](-3,0) -- (6,0);
\draw[->](0,-2) -- (0,11);
\foreach \x in {-2,...,5}{\foreach \y in {-1,...,10}{\fill (\x,\y) circle (2pt);}}
\draw(-0.4,-0.4) node {O};
\draw(6,-0.3) node {$x$};
\draw(-0.3,11) node {$y$};
%\draw(-0.3,1) node {$1$};
\draw(-0.3,5) node {$5$};
\draw(5,-0.3) node {$5$};
\ifnum\DisplayToiFig>0
\foreach \x in {-1,...,4}{%
\fill[red](\x,{(\x)^2-4*\x+4}) circle(4pt);
}
\draw[red,thick]({2-sqrt(10)},10)
parabola bend (2,0) ({2+sqrt(10)},10);
\fi
\end{tikzpicture}
\hspace*{2zw}\mbox{}
\vskip-10zh
{\gtfamily\bfseries 計算欄}
\nidangumi{$\bullet \quad x=-1$ のとき\\ \hspace*{2.8ex} \(\siki\)}
{$\bullet \quad x=0$ のとき\\ \hspace*{2.8ex} \(\siki\)}
\vfill
\nidangumi{$\bullet \quad x=1$ のとき\\ \hspace*{2.8ex} \(\siki\)}
{$\bullet \quad x=2$ のとき\\ \hspace*{2.8ex} \(\siki\)}
\vfill
\nidangumi{$\bullet \quad x=3$ のとき\\ \hspace*{2.8ex} \(\siki\)}
{$\bullet \quad x=4$ のとき\\ \hspace*{2.8ex} \(\siki\)}
\vfill
\ifnum\make_pdf_with_insatsu>0
\rotatebox{180}{{\normalsize\gtfamily\bfseries 数学プリント\#32}\scriptsize
{\normalsize\ajKaku{5}}~\( -6,-1,2,3,2,-1 \)\
{\normalsize\ajKaku{6}}~\( 11,6,3,2,3,6 \)\qquad
\( x=-1,(-1,-3)\quad
x=2,(2,0)\quad
x=1,(1,3)\quad
x=2,(2,4)\quad
x=1,(1,3)\quad
x=2,(2,2)\)
}
\fi
\newpage
%zzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzzz222222222222222
\def\siki{y=2x^2-4x+5}
\toi \( \siki \) について次の表を完成させ,グラフをかきなさい。\kotae{21,11,5,3,5,11}\\[1ex]
\def\arraystretch{1.5}
\def\mb#1{\makebox[3ex]{#1}}
\begin{tabular}[t]{|c||c|c|c|c|c|c|} \hline
$x$ & \mb{$-2$} & \mb{$-1$} & \mb{0} & \mb{1}
& \mb{2} & \mb{3} \\ \hline
\ifnum\DisplayToiFig>0
$y$ & \textcolor{red}{$21$} &
\textcolor{red}{$11$} &
\textcolor{red}{$5$} &
\textcolor{red}{$3$} &
\textcolor{red}{$5$} &
\textcolor{red}{$11$} \\ \hline
\else
$y$ & & & & & & \\ \hline
\fi
\end{tabular}
\vskip-10ex
\mbox{}\hfill
\begin{tikzpicture}[scale=0.3, >=stealth, baseline=(current bounding box.north)]
\tiny
\draw[->](-4,0) -- (4,0);
\draw[->](0,-3) -- (0,24);
\foreach \x in {-3,...,3}{\foreach \y in {-2,...,23}{\fill (\x,\y) circle (2pt);}}
\draw(-0.4,-0.4) node {O};
\draw(4,-0.3) node {$x$};
\draw(-0.3,24) node {$y$};
\foreach \x in {5,10,...,20}{\draw(-0.3,\x) node {$\x$};}
\ifnum\DisplayToiFig>0
\foreach \x in {-2,...,3}{%
\fill[red](\x,{2*(\x)^2-4*\x+5}) circle(4pt);
}
\draw[red,thick]({1-sqrt(10)},23)
parabola bend (1,3) (3.8,{2*(3.8)^2-4*3.8+5});
\fi
\end{tikzpicture}
\hspace*{2zw}\mbox{}
\vskip-20zh
{\gtfamily\bfseries 計算欄}
\nidangumi{$\bullet \quad x=-2$ のとき\\ \hspace*{2.8ex} \(\siki\)}
{$\bullet \quad x=-1$ のとき\\ \hspace*{2.8ex} \(\siki\)}
\vfill
\nidangumi{$\bullet \quad x=0$ のとき\\ \hspace*{2.8ex} \(\siki\)}
{$\bullet \quad x=1$ のとき\\ \hspace*{2.8ex} \(\siki\)}
\vfill
\nidangumi{$\bullet \quad x=2$ のとき\\ \hspace*{2.8ex} \(\siki\)}
{$\bullet \quad x=3$ のとき\\ \hspace*{2.8ex} \(\siki\)}
\vfill
\ifnum\make_pdf_with_insatsu=0
\newpage
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\fi
\def\siki{y=-3x^2+12x-8}
\toi \( \siki \) について次の表を完成させ,グラフをかきなさい。\kotae{-8,1,4,1,-8,-23}\\[1ex]
\def\arraystretch{1.5}
\def\mb#1{\makebox[3ex]{#1}}
\begin{tabular}[t]{|c||c|c|c|c|c|c|} \hline
$x$ & \mb{0} & \mb{1} & \mb{2} & \mb{3} & \mb{4}
& \mb{5} \\ \hline
\ifnum\DisplayToiFig>0
$y$ & \textcolor{red}{$-8$} &
\textcolor{red}{$1$} &
\textcolor{red}{$4$} &
\textcolor{red}{$1$} &
\textcolor{red}{$-8$} &
\textcolor{red}{$-23$} \\ \hline
\else
$y$ & & & & & & \\ \hline
\fi
\end{tabular}
\vskip-13ex
\mbox{}\hfill
\begin{tikzpicture}[scale=0.3, >=stealth, baseline=(current bounding box.north)]
\tiny
\draw[->](-2,0) -- (7,0);
\draw[->](0,-26) -- (0,6);
\foreach \x in {-1,...,6}{\foreach \y in {-25,...,5}{\fill (\x,\y) circle (2pt);}}
\draw(-0.4,-0.4) node {O};
\draw(7,-0.3) node {$x$};
\draw(-0.3,6) node {$y$};
\foreach \x in {-5,-10,...,-25}{\draw(-0.3,\x) node {$\x$};}
\draw(-0.3,5) node {$5$};
\draw(5,-0.3) node {$5$};
\ifnum\DisplayToiFig>0
\foreach \x in {0,...,5}{%
\fill[red](\x,{-3*(\x)^2+12*\x-8}) circle(4pt);
}
\draw[red,thick] (-1.1,{-3*(-1.1)^2+12*(-1.1)-8})
parabola bend (2,4) ({2+sqrt(29/3)},-25);
\fi
\end{tikzpicture}
\hspace*{2zw}\mbox{}
\vskip-25zh
{\gtfamily\bfseries 計算欄}
\nidangumi{$\bullet \quad x=0$ のとき\\ \hspace*{2.8ex} \(\siki\)}
{$\bullet \quad x=1$ のとき\\ \hspace*{2.8ex} \(\siki\)}
\vfill
\nidangumi{$\bullet \quad x=2$ のとき\\ \hspace*{2.8ex} \(\siki\)}
{$\bullet \quad x=3$ のとき\\ \hspace*{2.8ex} \(\siki\)}
\vfill
\nidangumi{$\bullet \quad x=4$ のとき\\ \hspace*{2.8ex} \(\siki\)}
{$\bullet \quad x=5$ のとき\\ \hspace*{2.8ex} \(\siki\)}
\vfill
\newpage
%3333333333333333333333333333333333333333333333333333333333333333333
\def\siki{y=-x^2+2x+2}
\toi \( \siki \) について次の表を完成させ,グラフをかきなさい。\kotae{-6,-1,2,3,2,-1}\\[1ex]
\def\arraystretch{1.5}
\def\mb#1{\makebox[3ex]{#1}}
\begin{tabular}[t]{|c||c|c|c|c|c|c|} \hline
$x$ & \mb{$-2$} & \mb{$-1$} & \mb{0} & \mb{1} & \mb{2}
& \mb{3} \\ \hline
\ifnum\DisplayToiFig>0
$y$ & \textcolor{red}{$-6$} &
\textcolor{red}{$-1$} &
\textcolor{red}{$2$} &
\textcolor{red}{$3$} &
\textcolor{red}{$2$} &
\textcolor{red}{$-1$} \\ \hline
\else
$y$ & & & & & & \\ \hline
\fi
\end{tabular}
\vskip-15ex
\mbox{}\hfill
\begin{tikzpicture}[scale=0.4, >=stealth, baseline=(current bounding box.north)]
\tiny
\draw[->](-3,0) -- (4,0);
\draw[->](0,-8) -- (0,6);
\foreach \x in {-2,...,3}{\foreach \y in {-7,...,5}{\fill (\x,\y) circle (2pt);}}
\draw(-0.4,-0.4) node {O};
\draw(4,-0.3) node {$x$};
\draw(-0.3,6) node {$y$};
%\foreach \x in {5,10,...,20}{\draw(-0.3,\x) node {$\x$};}
\draw(-0.3,5) node {$5$};
\draw(-0.3,-5) node {$-5$};
\ifnum\DisplayToiFig>0
\foreach \x in {-2,...,3}{%
\fill[red](\x,{-(\x)^2+2*\x+2}) circle(4pt);
}
\draw[red,thick] (-2.2,{-(-2.2)^2+2*(-2.2)+2})
parabola bend (1,3) (3.5,{-(3.5)^2+2*(3.5)+2});
\fi
\end{tikzpicture}
\hspace*{2zw}\mbox{}
\vskip-10zh
{\gtfamily\bfseries 計算欄}
\nidangumi{$\bullet \quad x=-2$ のとき\\ \hspace*{2.8ex} \(\siki\)}
{$\bullet \quad x=-1$ のとき\\ \hspace*{2.8ex} \(\siki\)}
\vfill
\nidangumi{$\bullet \quad x=0$ のとき\\ \hspace*{2.8ex} \(\siki\)}
{$\bullet \quad x=1$ のとき\\ \hspace*{2.8ex} \(\siki\)}
\vfill
\nidangumi{$\bullet \quad x=2$ のとき\\ \hspace*{2.8ex} \(\siki\)}
{$\bullet \quad x=3$ のとき\\ \hspace*{2.8ex} \(\siki\)}
\vfill
\ifnum\make_pdf_with_insatsu=0
\newpage
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\fi
\def\siki{y=x^2-4x+6}
\toi \( \siki \) について次の表を完成させ,グラフをかきなさい。\kotae{11,6,3,2,3,6}\\[1ex]
\def\arraystretch{1.5}
\def\mb#1{\makebox[3ex]{#1}}
\begin{tabular}[t]{|c||c|c|c|c|c|c|} \hline
$x$ & \mb{$-1$} & \mb{0} & \mb{1} & \mb{2} & \mb{3} & \mb{4}
\\ \hline
\ifnum\DisplayToiFig>0
$y$ & \textcolor{red}{$11$} &
\textcolor{red}{$6$} &
\textcolor{red}{$3$} &
\textcolor{red}{$2$} &
\textcolor{red}{$3$} &
\textcolor{red}{$6$} \\ \hline
\else
$y$ & & & & & & \\ \hline
\fi
\end{tabular}
\vskip-10ex
\mbox{}\hfill
\begin{tikzpicture}[scale=0.4, >=stealth, baseline=(current bounding box.north)]
\tiny
\draw[->](-2,0) -- (5,0);
\draw[->](0,-2) -- (0,12);
\foreach \x in {-1,...,4}{\foreach \y in {-1,...,11}{\fill (\x,\y) circle (2pt);}}
\draw(-0.4,-0.4) node {O};
\draw(5,-0.3) node {$x$};
\draw(-0.3,12) node {$y$};
\foreach \x in {5,10}{\draw(-0.3,\x) node {$\x$};}
%\draw(-0.3,5) node {$5$};
%\draw(-5,-0.3) node {$-5$};
\ifnum\DisplayToiFig>0
\foreach \x in {-1,...,4}{%
\fill[red](\x,{(\x)^2-4*\x+6}) circle(4pt);
}
\draw[red,thick](-1.1,{(-1.1)^2-4*(-1.1)+6})
parabola bend (2,2) (4.5,{(4.5)^2-4*4.5+6});
\fi
\end{tikzpicture}
\hspace*{2zw}\mbox{}
\vskip-10zh
{\gtfamily\bfseries 計算欄}
\nidangumi{$\bullet \quad x=-1$ のとき\\ \hspace*{2.8ex} \(\siki\)}
{$\bullet \quad x=0$ のとき\\ \hspace*{2.8ex} \(\siki\)}
\vfill
\nidangumi{$\bullet \quad x=1$ のとき\\ \hspace*{2.8ex} \(\siki\)}
{$\bullet \quad x=2$ のとき\\ \hspace*{2.8ex} \(\siki\)}
\vfill
\nidangumi{$\bullet \quad x=3$ のとき\\ \hspace*{2.8ex} \(\siki\)}
{$\bullet \quad x=4$ のとき\\ \hspace*{2.8ex} \(\siki\)}
\vfill
\ifnum\make_pdf_with_insatsu>0
\rotatebox{180}{{\normalsize\gtfamily\bfseries 数学プリント\#32}\scriptsize
{\normalsize\ajKaku{1}}~\( 5,-1,-3,-1,5 \)\
{\normalsize\ajKaku{2}}~\( 9,4,1,0,1,4 \)\
{\normalsize\ajKaku{3}}~\( 21,11,5,3,5,11 \)\
{\normalsize\ajKaku{4}}~\( -8,1,4,1,-8,-23 \)
}
\fi
\newpage
\unitlength=1mm
\( y=2x^2+4x-1 \) の軸と頂点を求めなさい(\ajKaku{1}の式です)
\kotae{x=-1,\quad (-1,-3)}
\begin{picture}(80,40)(0,0)
\put(35,32){\( {\ \bbox\ \over \bbox}=\bbox \)}
\put(54,29){\vector(0,-1){5}}
\put(50.5,19){\bbox}
\put(54,16){\vector(0,-1){5}}
\put(50.5,6){\bbox}
\put(60,26){プラス・マイナスを逆にする}
\put(60,13){2で割る}
\put(60,4){\gtfamily\bfseries この
値を\(\boldsymbol{y=2x^2+4x-1}\)に代入する}
\put(16,42){\line(0,-1){5}}
\put(16,37){\vector(1,0){19}}
\put(7.5,42){\line(0,-1){12}}
\put(7.5,30){\vector(1,0){27}}
\end{picture}
\( y=x^2-4x+4 \)の軸と頂点を求めなさい(\ajKaku{2}の式です)
\kotae{x=2,\quad (2,0)}
\unitlength=1mm
\begin{picture}(80,40)(0,0)
\put(35,32){\( {\ \bbox\ \over \bbox}=\bbox \)}
\put(54,29){\vector(0,-1){5}}
\put(50.5,19){\bbox}
\put(54,16){\vector(0,-1){5}}
\put(50.5,6){\bbox}
\put(60,26){プラス・マイナスを逆にする}
\put(60,13){2で割る}
\put(60,4){\gtfamily\bfseries この
値を\(\boldsymbol{y=x^2-4x+4}\)に代入する}
\put(15,42){\line(0,-1){5}}
\put(15,37){\vector(1,0){19}}
\put(6.5,42){\line(0,-1){12}}
\put(6.5,30){\vector(1,0){27}}
\end{picture}
\( y=2x^2-4x+5 \)の軸と頂点を求めなさい(\ajKaku{3}の式です)
\kotae{x=1,\quad (1,3)}
\unitlength=1mm
\begin{picture}(80,40)(0,0)
\put(35,32){\( {\ \bbox\ \over \bbox}=\bbox \)}
\put(54,29){\vector(0,-1){5}}
\put(50.5,19){\bbox}
\put(54,16){\vector(0,-1){5}}
\put(50.5,6){\bbox}
\put(60,4){\gtfamily\bfseries この
値を\(\boldsymbol{y=2x^2-4x+5}\)に代入する}
\put(15,42){\line(0,-1){5}}
\put(15,37){\vector(1,0){19}}
\put(7,42){\line(0,-1){12}}
\put(7,30){\vector(1,0){27}}
\end{picture}
\( y=-3x^2+12x-8 \)の軸と頂点を求めなさい(\ajKaku{4}の式です)
\kotae{x=2,\quad (2,4)}
\unitlength=1mm
\begin{picture}(80,40)(0,0)
\put(35,32){\( {\ \bbox\ \over \bbox}=\bbox \)}
\put(54,29){\vector(0,-1){5}}
\put(50.5,19){\bbox}
\put(54,16){\vector(0,-1){5}}
\put(50.5,6){\bbox}
\put(60,4){\gtfamily\bfseries この
値を\(\boldsymbol{y=-3x^2+12x-8}\)に代入する}
\put(20,42){\line(0,-1){5}}
\put(20,37){\vector(1,0){15}}
\put(8,42){\line(0,-1){12}}
\put(8,30){\vector(1,0){27}}
\end{picture}
\( y=-x^2+2x+2 \)の軸と頂点を求めなさい(\ajKaku{5}の式です)
\kotae{x=1,\quad (1,3)}
\bigskip
\( y=x^2-4x+6 \)の軸と頂点を求めなさい(\ajKaku{6}の式です)
\kotae{x=2,\quad (2,2)}
\vfill
\end{document}
|
https://anarhija.info/library/italia-germania-aggiornamenti-sul-processo-a-riccardo-imprigionato-ad-amburgo-05-10-it.tex | anarhija.info | CC-MAIN-2020-29 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2020-29/segments/1593655937797.57/warc/CC-MAIN-20200711192914-20200711222914-00082.warc.gz | 278,106,391 | 3,101 | \documentclass[DIV=12,%
BCOR=0mm,%
headinclude=false,%
footinclude=false,open=any,%
fontsize=10pt,%
oneside,%
paper=210mm:11in]%
{scrbook}
\usepackage{fontspec}
\usepackage{polyglossia}
\setmainfont{CMU Serif}
% these are not used but prevents XeTeX to barf
\setsansfont[Scale=MatchLowercase]{CMU Sans Serif}
\setmonofont[Scale=MatchLowercase]{CMU Typewriter Text}
\setmainlanguage{italian}
% global style
\pagestyle{plain}
\usepackage{microtype} % you need an *updated* texlive 2012, but harmless
\usepackage{graphicx}
\usepackage{alltt}
\usepackage{verbatim}
% http://tex.stackexchange.com/questions/3033/forcing-linebreaks-in-url
\PassOptionsToPackage{hyphens}{url}\usepackage[hyperfootnotes=false,hidelinks,breaklinks=true]{hyperref}
\usepackage{bookmark}
% footnote handling
\usepackage[fragile]{bigfoot}
\usepackage{perpage}
\DeclareNewFootnote{default}
\DeclareNewFootnote{B}
\MakeSorted{footnoteB}
\renewcommand*\thefootnoteB{(\arabic{footnoteB})}
\deffootnote[3em]{0em}{4em}{\textsuperscript{\thefootnotemark}~}
% continuous numbering across the document. Defaults to resetting at chapter. Unclear
% \usepackage{chngcntr}
% \counterwithout{footnote}{chapter}
\usepackage[shortlabels]{enumitem}
\usepackage{tabularx}
\usepackage[normalem]{ulem}
\def\hsout{\bgroup \ULdepth=-.55ex \ULset}
% https://tex.stackexchange.com/questions/22410/strikethrough-in-section-title
% Unclear if \protect \hsout is needed. Doesn't looks so
\DeclareRobustCommand{\sout}[1]{\texorpdfstring{\hsout{#1}}{#1}}
\usepackage{wrapfig}
\usepackage{indentfirst}
% remove the numbering
\setcounter{secnumdepth}{-2}
% remove labels from the captions
\renewcommand*{\captionformat}{}
\renewcommand*{\figureformat}{}
\renewcommand*{\tableformat}{}
\KOMAoption{captions}{belowfigure,nooneline}
\addtokomafont{caption}{\centering}
% avoid breakage on multiple <br><br> and avoid the next [] to be eaten
\newcommand*{\forcelinebreak}{\strut\\*{}}
\newcommand*{\hairline}{%
\bigskip%
\noindent \hrulefill%
\bigskip%
}
% reverse indentation for biblio and play
\newenvironment*{amusebiblio}{
\leftskip=\parindent
\parindent=-\parindent
\smallskip
\indent
}{\smallskip}
\newenvironment*{amuseplay}{
\leftskip=\parindent
\parindent=-\parindent
\smallskip
\indent
}{\smallskip}
\newcommand*{\Slash}{\slash\hspace{0pt}}
\addtokomafont{disposition}{\rmfamily}
\addtokomafont{descriptionlabel}{\rmfamily}
% forbid widows/orphans
\frenchspacing
\sloppy
\clubpenalty=10000
\widowpenalty=10000
% http://tex.stackexchange.com/questions/304802/how-not-to-hyphenate-the-last-word-of-a-paragraph
\finalhyphendemerits=10000
% given that we said footinclude=false, this should be safe
\setlength{\footskip}{2\baselineskip}
\title{Italia \Slash{} Germania: Aggiornamenti sul processo a Riccardo, imprigionato ad Amburgo (05\Slash{}10\Slash{}2017)}
\date{}
\author{}
\subtitle{}
% https://groups.google.com/d/topic/comp.text.tex/6fYmcVMbSbQ/discussion
\hypersetup{%
pdfencoding=auto,
pdftitle={Italia \Slash{} Germania: Aggiornamenti sul processo a Riccardo, imprigionato ad Amburgo (05\Slash{}10\Slash{}2017)},%
pdfauthor={},%
pdfsubject={},%
pdfkeywords={Italiano; Italija; Njemačka; zatvorenici; suđenje; Riccardo; G-20}%
}
\begin{document}
\begin{titlepage}
\strut\vskip 2em
\begin{center}
{\usekomafont{title}{\huge Italia \Slash{} Germania: Aggiornamenti sul processo a Riccardo, imprigionato ad Amburgo (05\Slash{}10\Slash{}2017)\par}}%
\vskip 1em
\vskip 2em
\vskip 1.5em
\vskip 3em
\includegraphics[keepaspectratio=true,height=0.5\textheight,width=1\textwidth]{i-g-italia-germania-aggiornamenti-sul-processo-a-r-1.jpg}
\vfill
\strut\par
\end{center}
\end{titlepage}
\cleardoublepage
Il processo che vedrà imputato \href{https://anarhija.info/category/topic/riccardo}{Riccardo} si terrà il 5 di ottobre alle h.9.00 presso il tribunale di Altona – Amburgo (Max Bauer Allee 91.)
Sarà a porte aperte ma non ci è ancora dato di sapere se avverrà la sentenza nello stesso giorno o se slitterà ad un’altra data. Dipende dall’iter processuale (in molti casi hanno sentenziato in un solo giorno anche perché gli imputati hanno confessato).
Sarà giudicato tramite il secondo grado di una corte che prevede pene dai due anni in su (in Germania le corti sono divise in 3 livelli in base alla pena richiesta, non è una corte speciale).
I capi di accusa formalizzati sono: interruzione della pace pubblica, attacco tramite assalto (che equivale a lesioni – concorso in Italia) e resistenza.
Per quanto riguarda la censura alla posta non ci sono stati blocchi sistematici ma qualche lettera viene bloccata (fin ora sono 3, diluite nel tempo: una cartolina, una lettera, una busta contenente giornali da Amburgo). Poi sono state bloccate buste contenenti materiale controinformativo e opuscoli.
\emph{Indirizzo}: \textbf{Riccardo Lupano – Jva Billwerder – Dweerlandweg 100 – 22113 Hamburg – Germany}
% begin final page
\clearpage
% new page for the colophon
\thispagestyle{empty}
\begin{center}
Anarhija.info
\strut
\end{center}
\strut
\vfill
\begin{center}
Italia \Slash{} Germania: Aggiornamenti sul processo a Riccardo, imprigionato ad Amburgo (05\Slash{}10\Slash{}2017)
\bigskip
via mail
\bigskip
\textbf{anarhija.info}
\end{center}
% end final page with colophon
\end{document}
|
http://jovens.ime.unicamp.br/sessoes-timetable.tex | unicamp.br | CC-MAIN-2021-10 | text/x-tex | application/x-tex | crawl-data/CC-MAIN-2021-10/segments/1614178362899.14/warc/CC-MAIN-20210301182445-20210301212445-00039.warc.gz | 47,752,623 | 1,146 |
\documentclass[a4paper]{article} %
\usepackage{graphicx,amssymb} %
\textwidth=15cm \hoffset=-1.2cm %
\textheight=25cm \voffset=-2cm %
\pagestyle{empty} %
\date{} %
\def\keywords#1{\begin{center}{\bf Keywords}\\{#1}\end{center}} %
\def\titulo#1{\title{#1}} %
\def\autores#1{\author{#1}} %
% Please, do not change any of the above lines
%#begin-user-packages
% HERE YOU CAN INCLUDE SOME LaTeX PACKAGES YOUR ABSTRACT NEEDS
% END OF THE SPACE FOR INCLUDING LaTeX PACKAGES
%#end-user-packages
%#begin-of-user-defined-commands
% HERE YOU CAN INCLUDE SOME CUSTOM LaTeX COMMANDS
% END OF THE SPACE FOR DEFINING LaTeX COMMANDS
%#end-of-user-defined-commands
\begin{document}
\thispagestyle{empty}
\noindent {\large \bf Programa\c c\~ao das palestras}\\
\noindent {\large \bf Sess\~ao especial:} Futebol.
\bigskip
\noindent {\bf Segunda-feira}\\
\noindent\begin{tabular}{ll}
14:00 - 14:30& Edson Arantes\\
14:30 - 15:00& T\'ulio Costa.\\
15:00 - 15:30& Nome (sem t\'itulo)\\
\end{tabular}
\bigskip
\noindent {\bf Ter\c ca-feira}\\
\noindent\begin{tabular}{ll}
14:00 - 14:30& Nome\\
14:30 - 15:00& Nome\\
15:00 - 15:30& Nome\\
\end{tabular}
\bigskip
\noindent {\bf Quarta-feira}\\
\noindent\begin{tabular}{ll}
14:00 - 14:30& Nome\\
14:30 - 15:00& Nome\\
15:00 - 15:30& Nome\\
\end{tabular}
\end{document}
|
https://www.zentralblatt-math.org/matheduc/en/?id=39598&type=tex | zentralblatt-math.org | CC-MAIN-2019-39 | text/plain | application/x-tex | crawl-data/CC-MAIN-2019-39/segments/1568514573289.83/warc/CC-MAIN-20190918131429-20190918153429-00545.warc.gz | 1,087,186,518 | 1,327 | \input zb-basic
\input zb-matheduc
\iteman{ZMATH 2009e.00193}
\itemau{Vollrath, Hans-Joachim}
\itemti{Towards an authentic teaching of mathematics: Hans-Georg Steiner's contribution to the reform of mathematics teaching.}
\itemso{ZDM, Int. J. Math. Educ. 39, No. 1-2, 39-50 (2007).}
\itemab
Summary: Hans-Georg Steiner was the ``motor of the reform'' of mathematics education in Germany. His main concern was to promote authentic teaching. His suggestions for teaching mathematical structures stimulated the process of reform, but were criticised as well. Two controversies are studied in this paper. The controversy with Detlef Laugwitz in 1965 was about the dichotomy ``axiomatics vs. constructiveness''. Another controversy with Alexander Wittenberg in 1964 was about the problem of ``elementary''. The following considerations can show the need for fundamental didactical analyses in mathematics education, as they were initiated by Hans-Georg Steiner.
\itemrv{~}
\itemcc{D30 A30}
\itemut{reform of mathematics education; axiomatics vs. constructiveness; didactical analyses; history of mathematics education}
\itemli{doi:10.1007/s11858-006-0013-0}
\end |
https://ctan.math.utah.edu/tex-archive/graphics/pgf/contrib/pgfornament-han/xiaoshan-sample.tex | utah.edu | CC-MAIN-2022-49 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2022-49/segments/1669446710237.57/warc/CC-MAIN-20221127105736-20221127135736-00463.warc.gz | 237,696,003 | 1,298 | % !TEX program = xelatex
\documentclass{ctexbeamer}
\usetheme{Xiaoshan}
\author{林莲枝}
\title{萧山Beamer主题}
\subtitle{\texttt{pgfornament-han}附录福利}
\begin{document}
\begin{frame}
\maketitle
\end{frame}
\section{简介}
\begin{frame}
\frametitle{其实是 Metropolis 主题的魔改}
\begin{itemize}
\item 改了颜色(用了 \texttt{cncolours.sty})
\item 加入 \texttt{pgfornament-han} 汉风纹样元素
\end{itemize}
\end{frame}
\begin{frame}
\frametitle{为什么叫「萧山」?}
\begin{itemize}
\item 以城市名字命名主题,是 Beamer 的一个传统
\item 作为\texttt{pgfornament-han}的实战尝试,用在了 \LaTeX{} Studio 工作室的一次直播活动的材料上
\item 直播在{\kaishu 杭州萧山区}进行
\end{itemize}
\end{frame}
\begin{frame}[standout]
作为强调的一个 standout 页面
\end{frame}
\section{充版面}
\begin{frame}[allowframebreaks]
\frametitle{各种 block}
\begin{block}{Metropolis 走极简风}
因此「萧山」主题也走极简风。
\end{block}
\begin{exampleblock}{Metropolis 走极简风}
因此「萧山」主题也走极简风。
\end{exampleblock}
\begin{alertblock}{Metropolis 走极简风}
因此「萧山」主题也走极简风。
\end{alertblock}
\begin{theorem}[Metropolis 走极简风]
因此「萧山」主题也走极简风。
\end{theorem}
\begin{proof}[Metropolis 走极简风]
因此「萧山」主题也走极简风。
\end{proof}
\end{frame}
\end{document}
|
https://www.zentralblatt-math.org/matheduc/en/?id=141656&type=tex | zentralblatt-math.org | CC-MAIN-2019-51 | text/plain | application/x-tex | crawl-data/CC-MAIN-2019-51/segments/1575540496492.8/warc/CC-MAIN-20191207055244-20191207083244-00012.warc.gz | 935,003,186 | 1,205 | \input zb-basic
\input zb-matheduc
\iteman{ZMATH 1985h.01579}
\itemau{Comte, M.L.; Gasser, E.; Guignard, N.; Hutin, R.; Leutenegger, F. (Service de la Recherche Pedagogique du Departement de l'Instruction Publique, Geneva (Switzerland).Groupe Mathematique)}
\itemti{Approaching mathematics at the age of 5 years. Annaeherung an die Mathematik mit 5 Jahren(Approcher la mathematique a cinq ans).}
\itemso{Mar 1983. 395 p. Ser. Title: Collection SRP. no. 26.}
\itemab
\itemrv{~}
\itemcc{F21 U11}
\itemut{Pre-School Education; Games; Numbers From 1 To 20; Spatial Ability; Social Learning; Topology; Set Theory; ; Elementarbereich; Spiel; Zahlenraum 1-20; Raumvorstellung; Soziales Lernen; Topologie; Mengenlehre}
\itemli{}
\end |
https://flamechallenge.authorea.com/users/496357/articles/580945/download_latex | authorea.com | CC-MAIN-2022-49 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2022-49/segments/1669446711162.52/warc/CC-MAIN-20221207121241-20221207151241-00472.warc.gz | 271,012,359 | 2,858 | \documentclass[10pt]{article}
\usepackage{fullpage}
\usepackage{setspace}
\usepackage{parskip}
\usepackage{titlesec}
\usepackage[section]{placeins}
\usepackage{xcolor}
\usepackage{breakcites}
\usepackage{lineno}
\usepackage{hyphenat}
\PassOptionsToPackage{hyphens}{url}
\usepackage[colorlinks = true,
linkcolor = blue,
urlcolor = blue,
citecolor = blue,
anchorcolor = blue]{hyperref}
\usepackage{etoolbox}
\makeatletter
\patchcmd\@combinedblfloats{\box\@outputbox}{\unvbox\@outputbox}{}{%
\errmessage{\noexpand\@combinedblfloats could not be patched}%
}%
\makeatother
\usepackage{natbib}
\renewenvironment{abstract}
{{\bfseries\noindent{\abstractname}\par\nobreak}\footnotesize}
{\bigskip}
\titlespacing{\section}{0pt}{*3}{*1}
\titlespacing{\subsection}{0pt}{*2}{*0.5}
\titlespacing{\subsubsection}{0pt}{*1.5}{0pt}
\usepackage{authblk}
\usepackage{graphicx}
\usepackage[space]{grffile}
\usepackage{latexsym}
\usepackage{textcomp}
\usepackage{longtable}
\usepackage{tabulary}
\usepackage{booktabs,array,multirow}
\usepackage{amsfonts,amsmath,amssymb}
\providecommand\citet{\cite}
\providecommand\citep{\cite}
\providecommand\citealt{\cite}
% You can conditionalize code for latexml or normal latex using this.
\newif\iflatexml\latexmlfalse
\providecommand{\tightlist}{\setlength{\itemsep}{0pt}\setlength{\parskip}{0pt}}%
\AtBeginDocument{\DeclareGraphicsExtensions{.pdf,.PDF,.eps,.EPS,.png,.PNG,.tif,.TIF,.jpg,.JPG,.jpeg,.JPEG}}
\usepackage[utf8]{inputenc}
\usepackage[english]{babel}
\usepackage{float}
\begin{document}
\title{Exposure to weak opioids and risk of gastrointestinal tract cancers: A
series of nested case-control studies.}
\author[1]{Martin Houston}%
\author[1]{Una McMenamin}%
\author[2]{Brian Johnston}%
\author[1]{Ronald McDowell}%
\author[3]{Carmel Hughes}%
\author[4]{Peter Murchie}%
\author[1]{C Cardwell}%
\affil[1]{Queen's University Belfast Centre for Public Health}%
\affil[2]{Royal Victoria Hospital}%
\affil[3]{Queen's University of Belfast School of Pharmacy}%
\affil[4]{University of Aberdeen Institute of Applied Health Sciences}%
\vspace{-1em}
\date{\today}
\begingroup
\let\center\flushleft
\let\endcenter\endflushleft
\maketitle
\endgroup
\selectlanguage{english}
\begin{abstract}
Background There is evidence gastrointestinal (GI) motility may play a
role in the development of GI cancers. Weak opioids (codeine and
dihydrocodeine) decrease GI motility, but their effect on GI cancer risk
has not been assessed. Aim To assess the association between weak
opioids and cancers of the GI tract. Methods A series of nested
case-control studies was conducted using Scottish general practice
records from the Primary Care Clinical Informatics Unit Research
database. Oesophageal (n=2,432), gastric (n=1,443), and colorectal
cancer (n=8,750) cases, diagnosed between 1999 and 2011, were identified
and matched with up to five controls. Weak opioid use was identified
from prescribing records. Odds ratios (OR) and 95\% confidence intervals
(CI) were calculated using conditional logistic regression, adjusting
for relevant comorbidities and medication use. Results There was no
association between weak opioids and colorectal cancer (adjusted
OR=0.96, CI 0.90, 1.02, p=0.15). There was an increased risk of
oesophageal (adjusted OR=1.16, CI 1.04, 1.29, p=0.01) and gastric cancer
(adjusted OR=1.26, CI 1.10, 1.45, p=0.001). The associations for
oesophageal cancer, but not gastric cancer, were attenuated when weak
opioid users were compared with users of another analgesic (adjusted
OR=1.03 CI 0.86, 1.22, p=0.76 and adjusted OR=1.29 CI 1.02, 1.64, p=0.04
respectively). Conclusion In this large population-based study, there
was no consistent evidence of an association between weak opioids and
oesophageal or colorectal cancer risk, but a small increased risk of
gastric cancer. Further investigation is required to determine whether
this association is causal or reflects residual confounding or
confounding by indication.%
\end{abstract}%
\sloppy
\textbf{Hosted file}
\verb`Weak opioids and GI cancer BJP.docx` available at \url{https://authorea.com/users/496357/articles/580945-exposure-to-weak-opioids-and-risk-of-gastrointestinal-tract-cancers-a-series-of-nested-case-control-studies}
\selectlanguage{english}
\FloatBarrier
\end{document}
|
https://www.dickimaw-books.com/gallery/acronym-lang.tex | dickimaw-books.com | CC-MAIN-2021-25 | application/x-tex | text/x-matlab | crawl-data/CC-MAIN-2021-25/segments/1623487610841.7/warc/CC-MAIN-20210613192529-20210613222529-00639.warc.gz | 641,426,950 | 1,302 | % arara: pdflatex
% arara: makeglossaries
% arara: pdflatex
\documentclass{article}
\usepackage[colorlinks]{hyperref}
\usepackage[nopostdot,% suppress dot after description
toc,% add glossary to table of contents
acronym,% create the "acronym" glossary
nomain% don't create the "main" glossary
]{glossaries}
\makeglossaries
% define an acronym style for the acronyms with a translation:
\newacronymstyle{acronymslang}%
{%
\GlsUseAcrEntryDispStyle{long-short}%
}
{%
\GlsUseAcrStyleDefs{short-long}%
\renewcommand*{\genacrfullformat}[2]{%
\glsentrylong{##1}##2\space
(\protect\firstacronymfont{\glsentryshort{##1}}%
\ifglshasfield{useri}{##1}%
{, English: \glsentryuseri{##1}}{})%
}%
\renewcommand*{\Genacrfullformat}[2]{%
\Glsentrylong{##1}##2\space
(\protect\firstacronymfont{\glsentryshort{##1}}%
\ifglshasfield{useri}{##1}%
{, English: \glsentryuseri{##1}}{})%
}%
\renewcommand*{\genplacrfullformat}[2]{%
\glsentrylongpl{##1}##2\space
(\protect\firstacronymfont{\glsentryshortpl{##1}}%
\ifglshasfield{useri}{##1}%
{, English: \glsentryuseri{##1}}{})%
}%
\renewcommand*{\Genplacrfullformat}[2]{%
\Glsentrylongpl{##1}##2\space
(\protect\firstacronymfont{\glsentryshortpl{##1}}%
\ifglshasfield{useri}{##1}%
{, English: \glsentryuseri{##1}}{})%
}%
}
\setacronymstyle{acronymslang}
\loadglsentries[acronym]{example-glossaries-acronyms-lang}
% glossary style for acronyms with a translation
\newglossarystyle{acronymslang}
{%
\setglossarystyle{long}%
\renewcommand*{\glsgroupskip}{}%
\renewcommand{\glossentry}[2]{%
\glsentryitem{##1}\glstarget{##1}{\glossentryname{##1}} &
\glossentrydesc{##1}\glspostdescription
\ifglshasfield{useri}{##1}{ (English: \glsentryuseri{##1})}{}%
\space ##2\tabularnewline
}%
}
\begin{document}
\section{Sample}
First use:
\forglsentries{\thislabel}{\gls{\thislabel}. }
Next use:
\forglsentries{\thislabel}{\gls{\thislabel}. }
\printglossary[type=acronym,style=acronymslang]
\end{document}
|
http://ftp.fi.debian.org/mirror/CTAN/documentation/visualtikz/Source/tkzchains.tex | debian.org | CC-MAIN-2022-40 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2022-40/segments/1664030335448.34/warc/CC-MAIN-20220930082656-20220930112656-00153.warc.gz | 16,027,932 | 2,564 | \SbSbSSCT{Création d'une chaine de n\oe euds}{Starting and Continuing a Chain}
\maboite{\BS{usetikzlibrary}\AC{chains}}
\label{lib-chains}
\begin{center}
\RRR{46-2}
\end{center}
\bigskip
\begin{tabular}{|l|} \hline
\BS{begin}\AC{tikzpicture}[\RDD{start chain}] \\
\BS{node} [\RDD{on chain}] \AC{A};\\
\BS{node} [\RDD{on chain}] \AC{B};\\
\BS{node} [\RDD{on chain}] \AC{C};\\
\BS{end}\AC{tikzpicture} \\ \hline
\begin{tikzpicture}[start chain]
\node [on chain] {A};
\node [on chain] {B};
\node [on chain] {C};
\end{tikzpicture}
\\ \hline
\end{tabular}
\bigskip
\begin{tabular}{|c|} \hline
\BS{begin}\AC{tikzpicture}[start chain, \RDD{node distance}= 0.5 cm]
\\ \hline
\begin{tikzpicture}[start chain, node distance= .5 cm]
\node [on chain] {A};
\node [on chain] {B};
\node [on chain] {C};
\end{tikzpicture}
\\ \hline
\end{tabular}
\bigskip
\begin{tabular}{|c|} \hline
\BS{begin}\AC{tikzpicture}[start chain=\rouge {going below} ]
\\ \hline
\begin{tikzpicture}[start chain=going below]
\node [on chain] {A};
\node [on chain] {B};
\node [on chain] {C};
\end{tikzpicture}
\\ \hline
\end{tabular}
\bigskip
\begin{tabular}{|c|} \hline
\BS{begin}\AC{tikzpicture}[start chain=\rouge {going left} ]
\\ \hline
\rule[0cm]{0pt}{.7cm}
\begin{tikzpicture}[start chain=going left]
\node [on chain] {A};
\node [on chain] {B};
\node [on chain] {C};
\end{tikzpicture}
\\ \hline
\end{tabular}
\bigskip
\begin{tabular}{|c|} \hline
\BS{begin}\AC{tikzpicture}[start chain, \rouge{every node/.style=draw} ]
\\ \hline
\rule[0cm]{0pt}{.7cm}
\begin{tikzpicture}[start chain, every node/.style=draw]
\node [on chain] {A};
\node [on chain] {B};
\node [on chain] {C};
\end{tikzpicture}
\\ \hline
\end{tabular}
\bigskip
\begin{tabular}{|c|c|}\hline
\begin{tikzpicture}[start chain=1 going right,
start chain=2 going left]
\node [draw,on chain=1] {A};
\node [draw,on chain=1] {B};
\node [draw,on chain=1] {C};
\node [draw,on chain=2] at (3,1) {0};
\node [draw,on chain=2] {1};
\node [draw,on chain=2] {2};
\node [draw,on chain=1] {D};
\end{tikzpicture}
&
\parbox{10cm}{
\BS{begin}\AC{tikzpicture}[\rouge{start chain=1} going right , \\
\blll{start chain=2} going left] \\
\BS{node} [draw,\rouge{on chain=1}] \AC{A}; \\
\BS{node} [draw,\rouge{on chain=1}] \AC{B}; \\
\BS{node}[draw,\rouge{on chain=1}] \AC{C}; \\
\BS{node} [draw,\blll{on chain=2}] at (3,1) \AC{0}; \\
\BS{node} [draw,\blll{on chain=2}] \AC{1}; \\
\BS{node} [draw,\blll{on chain=2}] \AC{2}; \\
\BS{node}[draw,\rouge{on chain=1}] \AC{D}; \\
\BS{end}\AC{tikzpicture}}
\\ \hline
\end{tabular}
\bigskip
\begin{tabular}{|c|c|} \hline
\rule[-2cm]{0pt}{4cm}
\begin{tikzpicture}[start chain=going right,baseline=-1.5cm]
\node [draw,on chain] {A};
\node [draw,on chain] {B};
\node [draw,continue chain=going below,on chain] {C};
\node [draw,on chain] {D};
\node [draw,continue chain=going right,on chain] {E};
\end{tikzpicture}
&
\parbox{11cm}{
\BS{begin}\AC{tikzpicture}[start chain going right]
\BS{node} [draw,on chain] \AC{A}; \\
\BS{node} [draw,on chain] \AC{B}; \\
\BS{node} [draw,\RDD{continue chain}=going below,on chain] \AC{C}; \\
\BS{node}[draw,on chain] \AC{D}; \\
\BS{node} [draw,\RDD{continue chain}=going right,on chain] \AC{E}; \\
\BS{end}\AC{tikzpicture}}
\\ \hline
\end{tabular}
\bigskip
\begin{tabular}{|c|c|} \hline
\begin{tikzpicture}[every node/.style=draw,baseline=-1.5cm]
{ [start chain=1]
\node [on chain] {A};
\node [on chain] {B};
\node [on chain] {C};
}
{ [start chain=2 going below]
\node [on chain=2] at (0.5,-.5) {0};
\node [on chain=2] {1};
\node [on chain=2] {2};
}
{ [continue chain=1]
\node [on chain] {D};
}
\end{tikzpicture}
&
\parbox{10cm}{
\BS{begin}\AC{tikzpicture}[start chain going right] \\
\{ [\RDD{start chain}=1] \\
\BS{node} [draw,on chain] \AC{A}; \\
\BS{node} [draw,on chain] \AC{B}; \\
\BS{node} [draw,on chain] \AC{C}; \\
\} \\
\{ [\RDD{start chain}=2] \\
\BS{node}[draw,on chain=2] \AC{0}; \\
\BS{node}[draw,on chain=2] \AC{1}; \\
\BS{node}[draw,on chain=2] \AC{2}; \\
\} \\
\{ [\RDD{continue chain}=1] \\
\BS{node} [draw,on chain] \AC{D}; \\
\} \\
\BS{end}\AC{tikzpicture}}
\\ \hline
\end{tabular}
\bigskip
\SbSbSSCT{N\oe uds sur la chaine}{Nodes on a Chain}
\begin{center}
\RRR{46-3}
\end{center}
\bigskip
\begin{tabular}{|c|c|} \hline
\begin{tikzpicture}[start chain=XXX placed {at=(\tikzchaincount*-30+90:1.5)},baseline=0pt]
\foreach \i in {1,...,12}
\node [on chain] {\i};
\draw (0,0) -- (XXX-10);
\draw (0,0) -- (XXX-2);
\end{tikzpicture}
&
\parbox{11cm}{
\BS{begin}\AC{tikzpicture}[start chain=\blll{XXX} \RDD{placed} \\ \AC{at=(\BSS{tikzchaincount}*-30+90:1.5)}] \\
\BS{foreach} \BS{i} in \AC{1,...,12} \\
\BS{node} [on chain] \AC{\BS{i}}; \\
\BS{draw }(0,0) -- \blll{(XXX-10)}; \\
\BS{draw }(0,0) -- \blll{(XXX-2)}; \\
\BS{end}\AC{tikzpicture}}
\\ \hline
\end{tabular}
\bigskip
\begin{tabular}{|c|c|} \hline
\begin{tikzpicture}[start chain,baseline=-1cm]
\node [draw,on chain] {A};
\node [draw,on chain] {B};
\node [draw,on chain=going below] {C};
\node [draw,on chain] {D};
\node [draw,on chain] {E};
\end{tikzpicture}
&
\parbox{11cm}{
\BS{begin}\AC{tikzpicture}[start chain] \\
\BS{node} [draw,on chain] \AC{A}; \\
\BS{node} [draw,on chain] \AC{B}; \\
\BS{node} [draw,on chain=\rouge{going below}] \AC{C}; \\
\BS{node} [draw,on chain] \AC{D}; \\
\BS{node} [draw,on chain] \AC{E}; \\
\BS{end}\AC{tikzpicture}}
\\ \hline
\end{tabular}
\bigskip
\begin{tabular}{|c|c|} \hline
\begin{tikzpicture}[start chain=going {at=(\tikzchainprevious),shift=(30:1)},baseline=1cm]
\node [draw,on chain] {A};
\node [draw,on chain] {B};
\node [draw,on chain] {C};
\node [draw,on chain] {D};
\end{tikzpicture}
&
\parbox{11cm}{
\BS{begin}\AC{tikzpicture}[start chain=going \\ \AC{at=(\BSS{tikzchainprevious},shift=(30:1)}] \\
\BS{node} [draw,on chain] \AC{A}; \\
\BS{node} [draw,on chain] \AC{B}; \\
\BS{node} [draw,on chain] \AC{C}; \\
\BS{node} [draw,on chain] \AC{D}; \\
\BS{end}\AC{tikzpicture}}
\\ \hline
\end{tabular}
\bigskip
\begin{tabular}{|c|c|} \hline
\begin{tikzpicture}[baseline=1cm]
\node[draw,red] (A) at (0,2) {A};
{ [start chain]
\node [draw,on chain] {B};
\node [draw,on chain] {C};
\chainin (A) [join];
\node [draw,on chain] {D};
\node [draw,on chain] {E};
}
\end{tikzpicture}
&
\parbox{11cm}{
\BS{begin}\AC{tikzpicture} \\
\BS{node} [draw,red] (A) at (0,2) \AC{A}; \\
\{ [start chain] \\
\BS{node} [draw,on chain] \AC{B}; \\
\BS{node} [draw,on chain] \AC{C}; \\
\BSS{chainin} (A) [join]; \\
\BS{node} [draw,on chain] \AC{D}; \\
\BS{node} [draw,on chain] \AC{E}; \\
\} \\
\BS{end}\AC{tikzpicture}}
\\ \hline
\end{tabular}
\bigskip
\begin{tabular}{|c|c|} \hline
\begin{tikzpicture}[baseline=-1cm]
\matrix [matrix of nodes,column sep=1cm,row sep=1cm,every node/.style=draw]
{
|(a) | A & |(b) | B & |(c) | C \\
|(d) | D & |(e) | E & |(f) | F \\
};
{ [start chain,every on chain/.style={join=by ->}]
\chainin (a);
\chainin (b);
\chainin (d);
\chainin (c);
\chainin (f);
\chainin (e);
}
\end{tikzpicture}
&
\parbox{11cm}{
\BS{begin}\AC{tikzpicture} \\
\BS{matrix} [matrix of nodes,column sep=5mm,row sep=5mm] ,every node/.style=draw \\
\{ \\
|(a) | A \& |(b) | B \& |(c) | C \BS{}\BS{} \\
|(d) | D \& |(e) | E \& |(f) | F \BS{}\BS{} \\
\}; \\
\{ [start chain,every on chain/.style=\AC{join=by ->}] \\
\BSS{chainin} (a);
\BSS{chainin}(b);
\BSS{chainin}(d); \\
\BSS{chainin} (c);
\BSS{chainin}(f);
\BSS{chainin}(e);
\}
\BS{end}\AC{tikzpicture}
}
\\ \hline
\end{tabular}
\bigskip
\SbSbSSCT{Jonction de n\oe uds}{Joining Nodes on a Chain}
\begin{center}
\RRR{46-4}
\end{center}
\bigskip
\begin{tabular}{|c|c|} \hline
\begin{tikzpicture}[start chain]
\node [draw,on chain] {A};
\node [draw,on chain,join] {B};
\node [draw,on chain] {C};
\node [draw,on chain,join] {D};
\end{tikzpicture}
&
\parbox{11cm}{
\BS{begin}\AC{tikzpicture}[start chain] \\
\BS{node} [draw,on chain] \AC{A}; \\
\BS{node} [draw,on chain,\RDD{join}] \AC{B}; \\
\BS{node} [draw,on chain] \AC{C}; \\
\BS{node} [draw,on chain,\RDD{join}] \AC{D}; \\
\BS{end}\AC{tikzpicture}}
\\ \hline
\end{tabular}
\bigskip
\begin{tabular}{|c|c|} \hline
\begin{tikzpicture}[start chain, every on chain/.style=join, every join/.style=->]
\node [draw,on chain] {A};
\node [draw,on chain] {B};
\node [draw,on chain] {C};
\node [draw,on chain] {D};
\end{tikzpicture}
&
\parbox{11cm}{
\BS{begin}\AC{tikzpicture}[start chain, \RDD{every on chain}/.style=join, \\ \RDD{every join}/.style=->] \\
\BS{node} [draw,on chain] \AC{A}; \\
\BS{node} [draw,on chain,\RDD{join}] \AC{B}; \\
\BS{node} [draw,on chain] \AC{C}; \\
\BS{node} [draw,on chain,\RDD{join}] \AC{D}; \\
\BS{end}\AC{tikzpicture}}
\\ \hline
\end{tabular}
\bigskip
\begin{tabular}{|c|c|} \hline
\begin{tikzpicture}[start chain,baseline=-1cm]
\node [draw,on chain] {A};
\node [draw,on chain] {B};
\node [draw,on chain] {C};
\node [draw,on chain=going below,join=with chain-2 ] {D};
\end{tikzpicture}
&
\parbox{11cm}{
\BS{begin}\AC{tikzpicture}[start chain] \\
\BS{node} [draw,on chain] \AC{A}; \\
\BS{node} [draw,on chain] \AC{B}; \\
\BS{node} [draw,on chain] \AC{C}; \\
\BS{node} [draw,on chain=going below,\rouge{join=with chain-2} ] \AC{D}; \\
\BS{end}\AC{tikzpicture}}
\\ \hline
\begin{tikzpicture}[start chain,baseline=-1cm]
\node [draw,on chain] {A};
\node [draw,on chain] {B};
\node [draw,on chain] {C};
\node [draw,on chain=going below,join=with chain-1 by {blue,<-}] {D};
\end{tikzpicture}
&
\parbox{12cm}{
\BS{begin}\AC{tikzpicture}[start chain] \\
\BS{node} [draw,on chain] \AC{A}; \\
\BS{node} [draw,on chain] \AC{B}; \\
\BS{node} [draw,on chain] \AC{C}; \\
\BS{node} [draw,on chain=going below,join=with chain-1 \rouge{ by \AC{blue,<-}} ] \AC{D}; \\
\BS{end}\AC{tikzpicture}}
\\ \hline
\end{tabular}
\bigskip
\SbSbSSCT{Branches}{Branches}
\begin{center}
\RRR{46-5}
\end{center}
\bigskip
\begin{tabular}{|c|c|} \hline
\begin{tikzpicture} [baseline=-2cm]
{ [start chain=XXX]
\node [draw,on chain] {A};
\node [draw,on chain] {B};
{ [start branch=YYY going below]
\node [draw,on chain] {1};
\node [draw,on chain] {2};
\node [draw,on chain] {3};
}
\node [draw,on chain,join=with XXX/YYY-end,join=with XXX/YYY-2 ] {C};
}
\end{tikzpicture}
&
\parbox{12cm}{
\BS{begin}\AC{tikzpicture}\\
\{ [start chain=\blll{XXX}] \\
\BS{node} [draw,on chain] \AC{A}; \\
\BS{node} [draw,on chain] \AC{B}; \\
\{ [\RDD{start branch}=\blll{YYY} going below] \\
\BS{node} [draw,on chain] \AC{1}; \\
\BS{node} [draw,on chain] \AC{2}; \\
\BS{node} [draw,on chain] \AC{3}; \\
\} \\
\BS{node} [ draw,on chain,join=with \blll{XXX/YYY}\rouge{-end}, \\ join=with \blll{XXX/YYY}\rouge{-2}] \AC{C}; \\
\} \\
\BS{end}\AC{tikzpicture} }
\\ \hline
\end{tabular}
\bigskip
\begin{tabular}{|c|} \hline
\BS{begin}\AC{tikzpicture}[ \RDD{node distance}=.2cm and 3cm]
\\ \hline
\begin{tikzpicture}[ node distance=.2cm and 3cm]
{ [start chain=XXX]
\node [on chain] {A};
\node [on chain] {B};
{ [start branch=YYY going below]
\node [on chain] {1};
\node [on chain] {2};
\node [on chain] {3};
}
\node [on chain,join=with XXX/YYY-end] {C};
}
\end{tikzpicture}
\\ \hline
\end{tabular}
\bigskip
\begin{tabular}{|c|c|} \hline
\begin{tikzpicture}[ node distance=2mm and 1cm,baseline=-2cm]
{ [start chain=XXX]
\node [draw,on chain] {A};
\node [draw,on chain] {B};
{ [start branch=YYY going below]
\node [draw,on chain] {1};
\node [draw,on chain] {2};
\node [draw,on chain] {3};
}
\node [draw,on chain,join=with XXX/YYY-end] {C};
{
[continue branch=YYY]
\node [draw,on chain] {4};
\node [draw,on chain] {5};
}
}
\end{tikzpicture}
&
\parbox{12cm}{
\BS{begin}\AC{tikzpicture}[ node distance=2mm and 1cm]\\
\{ [start chain=\blll{XXX}] \\
\BS{node} [draw,on chain] \AC{A}; \\
\BS{node} [draw,on chain] \AC{B}; \\
\{ [start branch=\blll{YYY} going below] \\
\BS{node} [draw,on chain] \AC{1}; \\
\BS{node} [draw,on chain] \AC{2}; \\
\BS{node} [draw,on chain] \AC{3}; \} \\
\BS{node} [draw,on chain,join=with \blll{XXX/YYY}-end] \AC{C}; \\
\{ [\RDD{continue branch}=\blll{YYY}]\\
\BS{node} [on chain] \AC{4}; \\
\BS{node} [on chain] \AC{5}; \} \\
\} \\
\BS{end}\AC{tikzpicture} }
\\ \hline
\end{tabular}
\bigskip
\begin{tabular}{|c|c|} \hline
\begin{tikzpicture}[node distance=2mm and 1cm, every node/.style=draw,baseline=-1cm]
{ [start chain]
\node [on chain] {1};
\node [on chain] {2};
{ [start branch=XXX going below] }
\node [on chain] {3};
{ [start branch=YYY going above] }
\node [on chain] {4};
{ [continue branch=XXX]
\node [on chain] {a};
\node [on chain] {b};
}{
[continue branch=YYY]
\node [on chain] {A};
\node [on chain] {B};
}
}
\end{tikzpicture}
&
\parbox{12cm}{
\BS{begin}\AC{tikzpicture}[node distance=2mm and 1cm, every node/.style=draw]\\
\{ [start chain] \\
\BS{node} [on chain] \AC{1}; \\
\BS{node} [on chain] \AC{2}; \\
\{ [\RDD{start branch}=\blll{XXX} going below] \} \\
\BS{node} [on chain] \AC{3}; \\
\{ [\RDD{start branch}=\blll{YYY} going above] \} \\
\BS{node} [on chain] \AC{4}; \\
\{ [\RDD{continue branch}=\blll{XXX} ] \\
\BS{node} [on chain] \AC{a}; \\
\BS{node} [on chain] \AC{b};\} \\
\{ [\RDD{continue branch}=\blll{YYY} ] \\
\BS{node} [on chain] \AC{A}; \\
\BS{node} [on chain] \AC{B}; \} }
\\ \hline
\end{tabular}
|
http://voodoo-circle.sourceforge.net/doc_for_developers/latex/c__func__arg_8cpp.tex | sourceforge.net | CC-MAIN-2018-05 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2018-05/segments/1516084891196.79/warc/CC-MAIN-20180122073932-20180122093932-00626.warc.gz | 378,664,144 | 938 | \hypertarget{c__func__arg_8cpp}{
\section{c\_\-func\_\-arg.cpp File Reference}
\label{c__func__arg_8cpp}\index{c\_\-func\_\-arg.cpp@{c\_\-func\_\-arg.cpp}}
}
Class 'c\_\-func\_\-arg'.
{\ttfamily \#include \char`\"{}../params.h\char`\"{}}\par
{\ttfamily \#include \char`\"{}../utils/memleak.h\char`\"{}}\par
{\ttfamily \#include \char`\"{}../utils/my\_\-assert.h\char`\"{}}\par
{\ttfamily \#include \char`\"{}../compat.h\char`\"{}}\par
{\ttfamily \#include \char`\"{}c\_\-func\_\-arg.h\char`\"{}}\par
{\ttfamily \#include \char`\"{}../utils/precomp.h\char`\"{}}\par
Include dependency graph for c\_\-func\_\-arg.cpp:
\nopagebreak
\begin{figure}[H]
\begin{center}
\leavevmode
\includegraphics[width=162pt]{c__func__arg_8cpp__incl}
\end{center}
\end{figure}
\subsection{Detailed Description}
Class 'c\_\-func\_\-arg'.
Definition in file \hyperlink{c__func__arg_8cpp_source}{c\_\-func\_\-arg.cpp}.
|
https://www.authorea.com/users/248886/articles/368879/download_latex | authorea.com | CC-MAIN-2020-45 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2020-45/segments/1603107893402.83/warc/CC-MAIN-20201027052750-20201027082750-00717.warc.gz | 613,108,651 | 3,158 | \documentclass[10pt]{article}
\usepackage{fullpage}
\usepackage{setspace}
\usepackage{parskip}
\usepackage{titlesec}
\usepackage[section]{placeins}
\usepackage{xcolor}
\usepackage{breakcites}
\usepackage{lineno}
\usepackage{hyphenat}
\PassOptionsToPackage{hyphens}{url}
\usepackage[colorlinks = true,
linkcolor = blue,
urlcolor = blue,
citecolor = blue,
anchorcolor = blue]{hyperref}
\usepackage{etoolbox}
\makeatletter
\patchcmd\@combinedblfloats{\box\@outputbox}{\unvbox\@outputbox}{}{%
\errmessage{\noexpand\@combinedblfloats could not be patched}%
}%
\makeatother
\usepackage{natbib}
\renewenvironment{abstract}
{{\bfseries\noindent{\abstractname}\par\nobreak}\footnotesize}
{\bigskip}
\titlespacing{\section}{0pt}{*3}{*1}
\titlespacing{\subsection}{0pt}{*2}{*0.5}
\titlespacing{\subsubsection}{0pt}{*1.5}{0pt}
\usepackage{authblk}
\usepackage{graphicx}
\usepackage[space]{grffile}
\usepackage{latexsym}
\usepackage{textcomp}
\usepackage{longtable}
\usepackage{tabulary}
\usepackage{booktabs,array,multirow}
\usepackage{amsfonts,amsmath,amssymb}
\providecommand\citet{\cite}
\providecommand\citep{\cite}
\providecommand\citealt{\cite}
% You can conditionalize code for latexml or normal latex using this.
\newif\iflatexml\latexmlfalse
\providecommand{\tightlist}{\setlength{\itemsep}{0pt}\setlength{\parskip}{0pt}}%
\AtBeginDocument{\DeclareGraphicsExtensions{.pdf,.PDF,.eps,.EPS,.png,.PNG,.tif,.TIF,.jpg,.JPG,.jpeg,.JPEG}}
\usepackage[utf8]{inputenc}
\usepackage[english]{babel}
\begin{document}
\title{Enjoy the Benefits of Nature Gardening~}
\author[1]{permaculturecourse}%
\affil[1]{Affiliation not available}%
\vspace{-1em}
\date{\today}
\begingroup
\let\center\flushleft
\let\endcenter\endflushleft
\maketitle
\endgroup
\sloppy
You should know that Permaculture is a technique of gardening which is
completely based on biological and ecological principles. It is a
natural technique of gardening which works along with nature to improve
the natural resources which exist to advantage growth of the plant,
along with decreasing the amount of physical labor required to get a
thriving garden simultaneously.
One of the most excellent parts of
\href{https://www.permaculturecourseonline.com/}{\textbf{Permaculture
Education Online}} gardening is that it can be directly adapted to and
rural, environment, urban and suburban areas, along with having the
skill of being any specific size. Box type gardens, together with window
boxes, to all other traditional techniques of gardening can utilize the
principles of \textbf{Permaculture Australia} in their landscape or
gardening practices.
\par\null
To perfectly fit in the process of \textbf{Permaculture Design Course
Online} in the practice of your gardening, you must have some kind of
knowledge of ecological systems, with complete type of theory, to make a
perfect and healthy environment. At the time, you are going to design a
\textbf{Online Permaculture Course} system, each and every element of it
have to be advantageous to the system, and even the connections between
these possible elements act to manage it. A well managed system with
positive associations of elements will get better the situation of the
land you are developing your crops on, get the most out of productivity,
and confirm that the land can be used for an indefinite period.
\par\null
To get this, recycling wastage of plant, animal, or some particular
activity of the
\href{https://www.permaculturecourseonline.com/}{\textbf{Online
Permaculture Design}} system to be utilized to benefit any other part of
the system same as nature does naturally. Studying the manner nature
works in a natural manner in your area is the best method to get the
information of how an ecosystem is formed. It is a completely natural
procedure that nutrients are refilled back again into the system in a
natural manner without the requirement to add them to the soil by
reproduction means. It is not just reasonable, it is even a technique of
preventing pollution.
\par\null
You should understand that diversity is a main part of permaculture, not
like modern agricultural practices which produce mass amount of one
crop. Permaculture completely depends on a lot of different animals and
crops to support each other. So in case any one species comes under
touch by a pest or predator, there is a wonderful possibility that
within the system there would be a natural technique in place to keep
secure it, or defend it earlier than the crop is spoiled. In latest
agriculture, in case a crop is attacked by any type of pest, the
complete crop can be lost.
\par\null
Carefully thinking on how we utilize our energy, resources, food,
non-material, material needs, and shelter, you would see it is very
feasible to get a lot more out of life by utilizing less. Permaculture
offers you the skill to be more creative, with less possible effort, and
simultaneously advantage from the atmosphere and ourselves nowadays and
for ages to come.
\selectlanguage{english}
\FloatBarrier
\end{document}
|
http://lhcbproject.web.cern.ch/lhcbproject/Publications/LHCbProjectPublic/Directory_LHCb-PAPER-2011-023/Table_1.tex | cern.ch | CC-MAIN-2019-47 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2019-47/segments/1573496668539.45/warc/CC-MAIN-20191114205415-20191114233415-00307.warc.gz | 94,084,999 | 909 |
\documentclass[border=5pt,multi=true]{standalone}
\usepackage{standalone}
\usepackage{ifthen}
\usepackage{amssymb}
\usepackage{amsfonts}
\usepackage{upgreek}
\usepackage{xspace}
\usepackage{color}
\usepackage{amsmath}
\usepackage{graphicx}
\usepackage{bm}
\usepackage{dcolumn}
\usepackage{mciteplus}
\begin{document}
\begin{ruledtabular}
\begin{tabular}{lc}
Source & Uncertainty \\
\colrule
Fiducial requirement & 0.01\% \\
Peaking background asymmetry & 0.04\% \\
Fit procedure & 0.08\% \\
Multiple candidates & 0.06\% \\
Kinematic binning & 0.02\% \\
\hline
Total & 0.11\% \\
\end{tabular}
\end{ruledtabular}
\end{document}
|
https://authorea.com/users/339139/articles/465391/download_latex | authorea.com | CC-MAIN-2020-40 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2020-40/segments/1600400198213.25/warc/CC-MAIN-20200920125718-20200920155718-00709.warc.gz | 299,255,603 | 11,321 | \documentclass[10pt]{article}
\usepackage{fullpage}
\usepackage{setspace}
\usepackage{parskip}
\usepackage{titlesec}
\usepackage[section]{placeins}
\usepackage{xcolor}
\usepackage{breakcites}
\usepackage{lineno}
\usepackage{hyphenat}
\PassOptionsToPackage{hyphens}{url}
\usepackage[colorlinks = true,
linkcolor = blue,
urlcolor = blue,
citecolor = blue,
anchorcolor = blue]{hyperref}
\usepackage{etoolbox}
\makeatletter
\patchcmd\@combinedblfloats{\box\@outputbox}{\unvbox\@outputbox}{}{%
\errmessage{\noexpand\@combinedblfloats could not be patched}%
}%
\makeatother
\usepackage{natbib}
\renewenvironment{abstract}
{{\bfseries\noindent{\abstractname}\par\nobreak}\footnotesize}
{\bigskip}
\titlespacing{\section}{0pt}{*3}{*1}
\titlespacing{\subsection}{0pt}{*2}{*0.5}
\titlespacing{\subsubsection}{0pt}{*1.5}{0pt}
\usepackage{authblk}
\usepackage{graphicx}
\usepackage[space]{grffile}
\usepackage{latexsym}
\usepackage{textcomp}
\usepackage{longtable}
\usepackage{tabulary}
\usepackage{booktabs,array,multirow}
\usepackage{amsfonts,amsmath,amssymb}
\providecommand\citet{\cite}
\providecommand\citep{\cite}
\providecommand\citealt{\cite}
% You can conditionalize code for latexml or normal latex using this.
\newif\iflatexml\latexmlfalse
\providecommand{\tightlist}{\setlength{\itemsep}{0pt}\setlength{\parskip}{0pt}}%
\AtBeginDocument{\DeclareGraphicsExtensions{.pdf,.PDF,.eps,.EPS,.png,.PNG,.tif,.TIF,.jpg,.JPG,.jpeg,.JPEG}}
\usepackage[utf8]{inputenc}
\usepackage[english]{babel}
\usepackage{float}
\begin{document}
\title{Meta-Analysis of mutual information applied in EBM diagnostics}
\author[1]{Athanasios Tsalatsanis}%
\author[2]{Iztok Hozo}%
\author[3]{Benjamin Djulbegovic}%
\affil[1]{University of South Florida}%
\affil[2]{Indiana University Northwest}%
\affil[3]{City of Hope National Medical Center}%
\vspace{-1em}
\date{\today}
\begingroup
\let\center\flushleft
\let\endcenter\endflushleft
\maketitle
\endgroup
\selectlanguage{english}
\begin{abstract}
Rationale Assessing the performance of diagnostic tests requires
evaluation of the amount of diagnostic uncertainty the test reduces
(i.e. 0\% - useless test, 100\% - perfect test). Statistical measures
currently dominating the evidence-based medicine (EBM) field and
particularly meta-analysis (e.g. sensitivity and specificity), cannot
explicitly measure this uncertainty reduction. Mutual information (MI),
an information theory statistic, is a more appropriate metric for
evaluating diagnostic tests as it explicitly quantifies uncertainty and,
therefore, facilitates natural interpretation of a test's value. In this
paper, we propose the use of MI as a single measure to express
diagnostic test performance and demonstrate how it can be used in
meta-analysis of diagnostic test studies. Methods We use two cases from
the literature to demonstrate the applicability of MI meta-analysis in
assessing diagnostic performance. These cases are: 1) Meta-analysis of
studies evaluating ultrasonography (US) to detect endometrial cancer and
2) meta-analysis of studies evaluating magnetic resonance angiography to
detect arterial stenosis. Results Results produced by the MI
meta-analyses are comparable to the results of meta-analyses based on
traditionally used statistical measures. However, the results of MI are
easier to understand as it relates directly to the extent of uncertainty
a diagnostic test can reduce. For example, a US test diagnosing
endometrial cancer is 40\% specific and 94\% sensitive. The combination
of these values is difficult to interpret and may lead to inappropriate
assessment (e.g. one could favour the test due to its high sensitivity,
ignoring its low specificity). In terms of MI however, the test reduces
diagnostic uncertainty by 10\%, which is marginal and thus the test is
clearly not very useful. Conclusions We have demonstrated the
suitability of MI in assessing the performance of diagnostic tests,
which can facilitate easier interpretation of the true utility of
diagnostic tests.%
\end{abstract}%
\sloppy
\textbf{Meta-Analysis of mutual information applied in EBM diagnostics}
Athanasios Tsalatsanis\textsuperscript{1}, Iztok
Hozo\textsuperscript{2}and Benjamin Djulbegovic\textsuperscript{3,4,5}
\textsuperscript{1}Department of Internal Medicine, University of South
Florida, Tampa, FL
\textsuperscript{2}Department of Mathematics, Indiana University
Northwest, Gary, IN
\textsuperscript{3} Department of Supportive Care Medicine, City of
Hope, 1500 East Duarte Rd, Duarte, CA
\textsuperscript{4}Department of Hematology, City of Hope, 1500 East
Duarte Rd, Duarte, CA;
\textsuperscript{5}Evidence-based Analytics \& Program for Comparative
Effectiveness Research and Evidence-based Medicine, 1500 East Duarte Rd,
Duarte, CA;
\textsuperscript{*}Corresponding author
Email addresses:
AT: [email protected]
IH: [email protected]
BD: [email protected]
\textbf{Abstract}
\textbf{Rationale}
Assessing the performance of diagnostic tests requires evaluation of the
amount of diagnostic uncertainty the test reduces (i.e. 0\% - useless
test, 100\% - perfect test). Statistical measures currently dominating
the evidence-based medicine (EBM) field and particularly meta-analysis
(e.g. sensitivity and specificity), cannot explicitly measure this
uncertainty reduction. Mutual information (MI), an information theory
statistic, is a more appropriate metric for evaluating diagnostic tests
as it explicitly quantifies uncertainty and, therefore, facilitates
natural interpretation of a test's value. In this paper, we propose the
use of MI as a single measure to express diagnostic test performance and
demonstrate how it can be used in meta-analysis of diagnostic test
studies.
\textbf{Methods}
We use two cases from the literature to demonstrate the applicability of
MI meta-analysis in assessing diagnostic performance. These cases are:
1) Meta-analysis of studies evaluating ultrasonography (US) to detect
endometrial cancer and 2) meta-analysis of studies evaluating magnetic
resonance angiography to detect arterial stenosis.
\textbf{Results}
Results produced by the MI meta-analyses are comparable to the results
of meta-analyses based on traditionally used statistical measures.
However, the results of MI are easier to understand as it relates
directly to the extent of uncertainty a diagnostic test can reduce. For
example, a US test diagnosing endometrial cancer is 40\% specific and
94\% sensitive. The combination of these values is difficult to
interpret and may lead to inappropriate assessment (e.g. one could
favour the test due to its high sensitivity, ignoring its low
specificity). In terms of MI however, the test reduces diagnostic
uncertainty by 10\%, which is marginal and thus the test is clearly not
very useful.
\textbf{Conclusions}
We have demonstrated the suitability of MI in assessing the performance
of diagnostic tests, which can facilitate easier interpretation of the
true utility of diagnostic tests.
\textbf{Introduction}
It is widely acknowledged that the purpose of diagnostic testing is to
reduce diagnostic uncertainty (e.g. by 0\%, if the test is useless , or
up to 100\%, when the test is perfect) \textsuperscript{1}. However, the
current metrics of diagnostic performance {[}i.e. sensitivity (S),
specificity (C), positive and negative likelihood ratios (LR+; LR-),
diagnostic odds ratio (DOR), and area under curve (AUC){]} cannot
provide a direct assessment of the amount by which diagnostic
uncertainty is reduced. Despite lacking this crucial clinical
usefulness, these ``traditional'' diagnostic metrics are widely used as
the preferred evidence-based medicine (EBM) diagnostic test
measures\textsuperscript{2,3}.
Meanwhile, there is a long tradition of quantifying diagnostic test
performance in the field of information theory \textsuperscript{4} .
Although, conceptually speaking, the problems associated with medical
diagnostic testing are similar to the problems faced in communication
and information theory, for some reasons the field of EBM diagnostics
has not embraced measures typically found in information theory.
One such measure, mutual information (MI) \textsuperscript{5}, used to
evaluate association between two random variables, is considered the
best metric to quantify diagnostic uncertainty and therefore test
performance. \textsuperscript{6} It has been used in a number of studies
in medicine to explain the relationship between test results and disease
states \textsuperscript{7-14}. Yet it has been surpassingly missing from
the EBM literature.
The most significant properties that establish MI as superior to
traditional measures of diagnostic performance can be summarized as
follows:
\begin{itemize}
\tightlist
\item
MI quantifies the average amount of information that can be obtained
about the value of a random variable (i.e. probability of disease
before the diagnostic test) provided the value of another random
variable is available (i.e. probability of disease after the
diagnostic test) \textsuperscript{15};
\item
MI quantifies the expected value of the amount of information a
diagnostic test provides about the disease state, i.e. it takes into
account all possible states that can be associated with the test
results weighted by the likelihood of disease \textsuperscript{16,17}.
This number is particularly useful when comparing different diagnostic
tests;
\item
MI summarizes test performance with a single meaningful number that
corresponds to the average amount of information obtained by the
diagnostic test and unlike the ROC it does not require a specified
diagnostic cut-off point (threshold). The larger the MI value is, the
greater the amount of diagnostic uncertainty reduced through the
diagnostic test;
\item
MI can be applied to situations in which different test results are
associated with different probabilities of
disease\textsuperscript{6,16};
\item
Unlike ROC and AUC, MI can be applied to a broad spectrum of testing
situations ranging from the simple binary case (two test results and
two disease states) to much more complicated situations in which a
large number of test results (or a continuum of test results) are
associated with multiple possible disease
states\textsuperscript{7-14};
\item
The maximal value of MI, formally referred to as channel capacity, can
be used to identify the range of disease prevalence at which a
diagnostic test is most useful;
\item
One way MI expresses information is in bits that range from 0 to
infinity. In the simplest, binary case, where we are concerned if
disease is present or not, the maximum number of bits is equal to
1\textsuperscript{6};
\item
Finally, the relative expression of MI indicates the percentage of
diagnostic information that can be reduced by a diagnostic test and it
can range from 0\% (a useless test) to 100\% (a perfect test).
\end{itemize}
In this paper, we promote the notion that MI is a better measure for
evaluation of diagnostic performance \textsuperscript{8}, both on
theoretical and practical grounds. We extent the current work by
explaining how MI can be meta-analyzed, and provide two illustrative
examples of diagnostic test meta-analysis using MI.
\textbf{Methods}
\textbf{Mutual information and diagnostic testing primer}
Assume that a test (T) is used to examine whether a disease (D) is
present in a group of \emph{N} patients. For a diagnostic test, the
values of specificity, sensitivity as well as the counts of true
positive (TP), true negative (TN), false positive (FP), and false
negative (FN) results depend on whether the test turns out to be
positive \(\left(T+\right)\), with probability \emph{t} , or
negative\(\left(T-\right)\), and whether the disease is
present\(\left(D+\right)\), with probability \emph{p} , or
absent\(\left(D-\right)\). To assist the reader, Table 1 summarizes the
calculations of specificity, sensitivity, TP, TN, FP, and FN. Unabridged
derivations are presented in the appendix.
The uncertainty of the state of disease \emph{prior} to performing the
diagnostic test is best expressed as entropy \textsuperscript{4,15,18}:
\(H\left(D\right)=-\left(p\operatorname{}p+\left(1-p\right)\operatorname{}\left(1-p\right)\right)\),
where \(p\) is the probability of disease. The uncertainty
due to the test is:
\begin{equation}
H\left(T\right)=-\left(\text{\ t}\operatorname{}t+\left(1-t\right)\operatorname{}\left(1-t\right)\right),\nonumber \\
\end{equation}
where \(t\) is the probability of disease estimated by the
diagnostic test T.
The MI is computed as:
\begin{equation}
I\left(D,T\right)=H\left(D\right)+H\left(T\right)-H\left(D,T\right).\nonumber \\
\end{equation}
where \(H\left(D,T\right)\) is the joint entropy of disease and diagnostic
test. MI can also be expressed in terms of the conditional entropy as
well as the conditional probabilities of every test/disease outcome
combination:
\begin{equation}
H\left(D\middle|T\right)=H\left(D,T\right)-H\left(T\right)\nonumber \\
\end{equation}
Hence, the mutual information is also defined as:
\begin{equation}
I\left(D,T\right)=H\left(D\right)-H\left(D\middle|T\right)\nonumber \\
\end{equation}
From the latter expression it is evident that MI explicitly describes
the amount of diagnostic uncertainty that can be reduced by the
diagnostic test. Clinically, it is particularly useful to express MI in
relative terms, as it can indicate explicitly the percentage of
diagnostic uncertainty a diagnostic test can reduce. Relative MI (RMI)
is defined as:
\begin{equation}
I_{R}\left(D,T\right)=\frac{I\left(D,T\right)}{H\left(D\right)}=1-\frac{H(D|T)}{H(D)}\nonumber \\
\end{equation}
The quantity \(\frac{H(D|T)}{H(D)}\), is the relative entropy associated
with the test result (i.e. the percentage of uncertainty reduced by the
test result).
\textbf{Interpretation of uncertainty reduction}
The amount of reduction of uncertainty defines the usefulness of a
diagnostic test. Ideally, it would be defined in decision analytic
context when the ``useful'' test is the one that affect our decisions
and its downstream consequences. This, however, require case-specific
decision modeling, which is not the focus of this paper. Alternatively,
usefulness of a test can be defined according to magnitude of reduction
of diagnostic uncertainty analogously to treatment effects as small,
moderate or large\textsuperscript{19}. Thus, we define small reduction
of diagnostic uncertainty if it is less than 10\%, moderate reduction
between 20-30\% and large reduction of diagnostic uncertainty if it
exceeds 40-50\%.
\textbf{Sensitivity and specificity}
As the majority of diagnostic studies express diagnostic performance
results in terms of sensitivity (\emph{S} ) and specificity (\emph{C} ),
we show how MI relates to these measures.
\begin{equation}
I\left(D,T\right)=H\left(D\right)+H\left(T\right)-H\left(D,T\right)=Sp\left(\log_{2}\left(\frac{S\left(\left(1-S\right)p+C\left(1-p\right)\right)}{\left(1-S\right)\left(Sp+\left(1-C\right)\left(1-p\right)\right)}\right)\right)+C\left(1-p\right)\left(\log_{2}\left(\frac{C\left(Sp+\left(1-C\right)\left(1-p\right)\right)}{\left(1-C\right)\left(\left(1-S\right)p+C\left(1-p\right)\right)}\right)\right)\ \ \ \ \ \ \ \ +p\log_{2}\left(\frac{\left(1-S\right)\left(Sp+\left(1-C\right)\left(1-p\right)\right)}{\left(1-C\right)\left(\left(1-S\right)p+C\left(1-p\right)\right)}\right)+\log_{2}\left(\frac{\left(1-C\right)}{\left(Sp+\left(1-C\right)\left(1-p\right)\right)}\right)\nonumber \\
\end{equation}
\textbf{Meta-Analysis of entropy and mutual information}
In most cases, decision-makers are not interested in evaluating the
performance of a diagnostic test in a single study. Instead, they would
like to know the totality of evidence generated in a series of studies
evaluating the particular test. In such cases, a meta-analysis of
summary statistics is employed.
Meta-analysis is initiated with the computation of a summary statistic
for each study \textsuperscript{20}. In our case, this summary statistic
is the value of MI associated with the diagnostic test under
investigation. The next step in meta-analysis is to compute the weighted
average of MI, where the weights used are typically the inverse of the
MI variance, which is related to sample size \textsuperscript{20}.
According to Roulston \textsuperscript{21}, the variance of the entropy
is given by
\begin{equation}
\text{Var}\left(H\left(D\right)\right)=\left[\left(\operatorname{}p+H\left(D\right)\right)^{2}+\left(\operatorname{}\left(1-p\right)+H\left(D\right)\right)^{2}\right]\cdot\frac{p\left(1-p\right)}{N}\ \nonumber \\
\end{equation}
which is valid for study sample size greater than 10.
Solving for the variance of MI we derive the expression:
\begin{equation}
{\text{Var}\left(I\left(D,T\right)\right)=\left(\operatorname{}\left(p_{11}+p_{12}\right)+\operatorname{}\left(p_{11}+p_{21}\right)-\operatorname{}p_{11}+I\left(D,T\right)\right)^{2}\left(\frac{p_{11}\left(1-p_{11}\right)}{N}\right)\backslash n}{+\left(\operatorname{}\left(p_{11}+p_{12}\right)+\operatorname{}\left(p_{12}+p_{22}\right)-\operatorname{}p_{12}+I\left(D,T\right)\right)^{2}\left(\frac{p_{12}\left(1-p_{12}\right)}{N}\right)\backslash n}{+\left(\operatorname{}\left(p_{21}+p_{22}\right)+\operatorname{}\left(p_{11}+p_{21}\right)-\operatorname{}p_{21}+I\left(D,T\right)\right)^{2}\left(\frac{p_{21}\left(1-p_{21}\right)}{N}\right)\backslash n}{+\left(\operatorname{}\left(p_{21}+p_{22}\right)+\operatorname{}\left(p_{12}+p_{22}\right)-\operatorname{}p_{22}+I\left(D,T\right)\right)^{2}\left(\frac{p_{22}\left(1-p_{22}\right)}{N}\right)}\nonumber \\
\end{equation}
See, table 1 for definitions of \(p_{11},\ p_{12},\ p_{21},\)
and\(p_{22}\). Unabridged derivations are presented in the
appendix. Numerical examples of these derivations are shown in Table 2.
\textbf{Results}
We present the application of MI meta-analysis based on two cases
previously published in literature.
Case 1. Detection of endometrial cancer using endovaginal
ultrasonography (US).
For this case, we used data presented in Deeks \textsuperscript{22},
originally published in Smith-Bindman et al \textsuperscript{23}. The
dataset is the result of a systematic review process on 35 papers
presenting the diagnostic performance of endovaginal US in the detection
of endometrial cancer. Evidence synthesis tables on test sensitivity and
specificity are provided in Deeks \textsuperscript{22}.
Figure 1 displays the meta-analytic summary plots based on US studies.
It includes the summary ROC curve, individual study estimate, and
summary point estimate of the ``traditional'' measures of performance of
endovaginal US in the detection of endometrial cancer. It is difficult
to interpret, how ``good'' the test is, and in particular how much
uncertainty the test reduced in each study where US was evaluated. For
example, a US test diagnosing endometrial cancer is 40\% specific and
94\% sensitive. The combination of these values is difficult to
interpret and may lead to inappropriate assessment (e.g. one could
favour the test due to its high sensitivity, ignoring its low
specificity). In terms of MI however, the test reduces diagnostic
uncertainty by 10\%, which is marginal and thus the test is clearly not
very useful.
Figure 2 demonstrates meta-analysis of MI. We can clearly see that the
US results provided only 0.05 (0.04 to 0.07) bits of information
(recall, that the maximum amount information in the binary diagnostic
case is 1). Although this gives us an estimate about overall diagnostic
performance of US for diagnosis of endometrial cancer, what we really
want to know is the amount of diagnostic uncertainty the US can possibly
reduce (on scale 0 to 100\%). This can be expressed by calculating RMI.
Figure 3a shows the performance of US expressed in terms of RMI. The
information presented is much clearer: a decision-maker has much better
understanding on how much diagnostic uncertainty was reduced in each
study. The pooled estimate of the reduction in diagnostic uncertainty is
13\% for pre-test probability of disease 14\%. That is, US can reduce
the uncertainty related to \emph{endometrial cancer} by 13\%. Figure 3b
presents the sample size of each study.
Case 2: Contrast-enhanced magnetic resonance angiography (MRA) for
arterial stenosis disease
In this case, we use meta-analysis data from the study of Menke and
Larsen\textsuperscript{24} summarizing evidence about how well MRA
detects arterial stenosis. A total of 32 studies were included in the
analysis.
Figure 4 depicts the meta-analytic summary plots. It includes the
summary ROC curve, individual study estimate, and summary point estimate
of the ``traditional'' measures of performance of MRA in diagnosis of
arterial stenosis. As with figure 1, the interpretation of traditional
statistics in terms of test performance is difficult. For example, an
MRA test diagnosing arterial stenosis is 96\% specific and 78\%
sensitive. The combination of these values is difficult to interpret and
may lead to inappropriate assessment. In terms of MI however, the test
reduces diagnostic uncertainty by 49\%, which indicates a clearly useful
test.
Figure 5, demonstrates the meta-analysis of MI, in which it is shown
that the information content of MRA in diagnosis of arterial stenosis is
0.53 (CI: 0.48, 0.57).
Figure 6 depicts the RMI for reported by each study as well as the pool
estimate, which is approximately 67\% for pre-test probability of
disease 25\%. That is, the MRA reduces uncertainty related to arterial
stenosis by 67\%.
\textbf{Discussion}
Many authors have outlined a number of problems with the use of
``traditional'' measures of diagnostic
performance\textsuperscript{6,16,25-27}. These problems relate to the
biases that plague studies evaluating diagnostic studies, and to the
metrics themselves \textsuperscript{28}. In this paper, we focus on the
latter. In particular, we focus on the measurement of diagnostic
accuracy as opposed to the impact of diagnostic tests on health
outcomes, which depends on consideration of down-stream effects of
testing such as the choice of treatment and will not be considered here.
With regards to diagnostic accuracy, it has been
argued\textsuperscript{6,8,29,30} that utilization of information
theory, and particularly MI, has theoretical and practical advantages
over the traditional measures at assessing the performance of a
diagnostic test. Notably, MI and RMI can be used to explicitly quantify
the amount of diagnostic uncertainty a test reduces. Such a direct
measure can easily be used to evaluate test performance not only by
trained researchers but also by any EBM literate practitioner. Here, we
summarized the MI advantages over traditional measures and demonstrated
how MI can be meta-analyzed using two cases from the literature.
The MI meta-analysis results presented in both cases show the
superiority of MI and RMI over other metrics in conveying arguably the
most useful clinical indicators of diagnostic test performance, namely
the amount of diagnostic uncertainty reduced by the test. Clearly,
consideration of other ethical and personal dilemmas is also involved in
the administration of a diagnostic test. However, for the EBM community
and the evidence synthesis practitioners , reduction of uncertainty is
of outmost importance. In terms of derivation, MI is easily computed and
meta-analyzed. In addition, although we have not emphasized it here, MI
has particular advantages over other metrics when it comes to analysis
of tests with continuous measurements such as PSA, blood pressure etc.
Analysis of such tests with traditional metrics requires dichotomization
of the test results discarding useful information \textsuperscript{31}.
On the other hand, MI can be computed both for discrete and continuous
variables \textsuperscript{32}.
One limitation of MI is its reliance on prevalence, which even though
represents theoretical advantages it introduces heterogeneity in
meta-analysis. To solve this problem, we propose meta-analyzing RMI
instead of MI, but at this time we know of no derivation of standard
error for RMI. Further development in the field of research synthesis of
diagnostic test performance may lie in the opportunity to develop robust
meta-analytic techniques for RMI.
In summary, we believe that MI is the most meaningful measure for both
decision makers and EMB researchers as it provides intuitive, easy to
understand metrics that quantify diagnostic tests information content.
We therefore, argue that the field of evidence-based diagnostics should
adopt MI as its most useful metric.
References
1. Sox HC, Blatt MA, Higgins MC, Marton MC. Medical Decision Making.
Boston: Butterworths; 1988.
2. Leeflang MM, Deeks JJ, Takwoingi Y, Macaskill P. Cochrane diagnostic
test accuracy reviews. Syst Rev 2013;2:82.
3. Leeflang MM, Deeks JJ, Gatsonis C, Bossuyt PM, Cochrane Diagnostic
Test Accuracy Working G. Systematic reviews of diagnostic test accuracy.
Ann Intern Med 2008;149:889-97.
4. Shannon CE, Waever W. The mathematical theory of communication.
Urbana: The University of Illinois Press; 1962.
5. Shannon C. A mathematical theory of communication, bell System
technical Journal 27: 379-423 and 623--656. Mathematical Reviews
(MathSciNet): MR10, 133e 1948.
6. Benish WA. Intuitive and axiomatic arguments for quantifying
diagnostic test performance in units of information. Methods Inf Med
2009;48:552-7.
7. Somoza E, Mossman D. Comparing and optimizing diagnostic tests: an
information-theoretical approach. Med Decis Making 1992;12:179-88.
8. Benish W. Mutual information as an index of diagnostic test
performance. Methods of information in medicine 2003;42:260-4.
9. Mossman D, Somoza E. Diagnostic tests and information theory. J
Neuropsychiatry Clin Neurosci 1992;4:95-8.
10. Somoza E, Soutullo-Esperon L, Mossman D. Evaluation and optimization
of diagnostic tests using receiver operating characteristic analysis and
information theory. International journal of bio-medical computing
1989;24:153-89.
11. Benish W. The use of information graphs to evaluate and compare
diagnostic tests. Methods of information in medicine 2002;41:114-8.
12. Nelson GW, O'Brien SJ. Using mutual information to measure the
impact of multiple genetic factors on AIDS. JAIDS Journal of Acquired
Immune Deficiency Syndromes 2006;42:347-54.
13. Meyer CR, Boes JL, Kim B, et al. Demonstration of accuracy and
clinical versatility of mutual information for automatic multimodality
image fusion using affine and thin-plate spline warped geometric
deformations. Medical image analysis 1997;1:195-206.
14. Diamond GA, Hirsch M, Forrester JS, et al. Application of
information theory to clinical diagnostic testing. The
electrocardiographic stress test. Circulation 1981;63:915-21.
15. Cover TM, Thomas JA. Elements of information theory: John Wiley \&
Sons; 2012.
16. Hughes G. Application of Information Theory to Epidemiology:
American Phytopathological Society; 2012.
17. Hughes G, McRoberts N. The structure of diagnostic information.
Australasian Plant Pathology 2014:1-20.
18. Djulbegovic B, Hozo I, Abdomerovic I, Hozo S. Diagnostic entropy as
a function of therapeutic benefit/risk ratio. Med Hyoptheses
1995;45:503-9.
19. Djulbegovic B, Glasziou P, Chalmers I. The importance of randomised
vs non-randomised trials. The Lancet 2019;394:634-5.
20. Deeks JJ, Altman DG, Bradburn MJ. Statistical methods for examining
heterogeneity and combining results from several studies in
meta-analysis. Systematic Reviews in Health Care: Meta-Analysis in
Context, Second Edition 2001:285-312.
21. Roulston MS. Estimating the errors on measured entropy and mutual
information. Physica D: Nonlinear Phenomena 1999;125:285-94.
22. Deeks JJ. Systematic reviews in health care: Systematic reviews of
evaluations of diagnostic and screening tests. BMJ 2001;323:157-62.
23. Smith-Bindman R, Kerlikowske K, Feldstein VA, et al. Endovaginal
ultrasound to exclude endometrial cancer and other endometrial
abnormalities. JAMA 1998;280:1510-7.
24. Menke J, Larsen J. Meta-analysis: Accuracy of contrast-enhanced
magnetic resonance angiography for assessing steno-occlusions in
peripheral arterial disease. Ann Intern Med 2010;153:325-34.
25. Knottnerus JA. The evidence base of clinical diagnosis. London: BMJ
Books; 2002.
26. Hilden J. The area under the ROC curve and its competitors. Med
Decis Making 1991;11:95-101.
27. Lee WC, Hsiao CK. Alternative summary indices for the receiver
operating characteristic curve. Epidemiology 1996;7:605-11.
28. Bossuyt PM, Reitsma JB, Bruns DE, et al. The STARD Statement for
reporting of studies of diagnostic accuracy: explanation and
elaboration. Clin Chem 2003;49:7-18.
29. Benish WA. Relative entropy as a measure of diagnostic information.
Medical decision making 1999;19:202-6.
30. Wu Y, Alagoz O, Ayvaci MU, et al. A comprehensive methodology for
determining the most informative mammographic features. Journal of
digital imaging 2013;26:941-7.
31. Shapiro DE. The interpretation of diagnostic tests. Stat Methods Med
Res 1999;8:113-34.
32. Ross BC. Mutual Information between Discrete and Continuous Data
Sets. PloS one 2014;9:e87357.
Appendix - Unabridged derivations of MI, RMI and Var(MI)
Entropy is expressed as:
\begin{equation}
H\left(D\right)=-\left(P(D+)\operatorname{}{P(D+)}+\left(1-P(D+)\right)\operatorname{}\left(1-P(D+)\right)\right)\nonumber \\
\end{equation}
The uncertainty due to the diagnostic test is:
\begin{equation}
H\left(T\right)=-\left(\ P(D+|T+)\operatorname{}{P(D+|T+)}+\left(1-P(D+|T+)\right)\operatorname{}\left(1-P(D+|T+)\right)\right)\nonumber \\
\end{equation}
The mutual information is computed as:
\begin{equation}
I\left(D,T\right)=H\left(D\right)+H\left(T\right)-H\left(D,T\right)=H\left(D\right)-H\left(D\middle|T\right)\nonumber \\
\end{equation}
The relative mutual information is computed as:
\begin{equation}
I_{R}\left(D,T\right)=\frac{I\left(D,T\right)}{H\left(D\right)}=1-\frac{H(D|T)}{H(D)}\nonumber \\
\end{equation}
In terms of sensitivity and specificity, mutual information is derived
as:
\begin{equation}
I\left(D,T\right)=H\left(D\right)+H\left(T\right)-H\left(D,T\right)=P\left(T+\middle|D+\right)P(D+)\left(\log_{2}\left(\frac{P\left(T+\middle|D+\right)\left(\left(1-P\left(T+\middle|D+\right)\right)P\left(D+\right)+P\left(T-\middle|D-\right)\left(1-P\left(D+\right)\right)\right)}{\left(1-P\left(T+\middle|D+\right)\right)\left(P\left(T+\middle|D+\right)P\left(D+\right)+\left(1-P\left(T-\middle|D-\right)\right)\left(1-P\left(D+\right)\right)\right)}\right)\right)+P\left(T-\middle|D-\right)\left(1-P(D+)\right)\ \left(\log_{2}\left(\frac{P(T-|D-)\left(P(T+|D+)P(D+)+\left(1-P(T-|D-)\right)\left(1-P(D+)\right)\right)}{\left(1-P(T-|D-)\right)\left(\left(1-P(T+|D+)\right)P(D+)+P(T-|D-)\left(1-P(D+)\right)\right)}\right)\right)\ \ \ \ \ \ \ \ +P(D+)\log_{2}\left(\frac{\left(1-P(T+|D+)\right)\left(P(T+|D+)P(D+)+\left(1-P(T-|D-)\right)\left(1-P(D+)\right)\right)}{\left(1-P(T-|D-)\right)\left(\left(1-P(T+|D+)\right)P(D+)+P(T-|D-)\left(1-P(D+)\right)\right)}\right)+\log_{2}\left(\frac{\left(1-P(T-|D-)\right)}{\left(P(T+|D+)P(D+)+\left(1-P(T-|D-)\right)\left(1-P(D+)\right)\right)}\right)\nonumber \\
\end{equation}
The variance of mutual information is computed as:
\begin{equation}
\text{Var}\left(H\left(D\right)\right)=\left[\left(\operatorname{}{P(D+)}+H\left(D\right)\right)^{2}+\left(\operatorname{}\left(1-P(D+)\right)+H\left(D\right)\right)^{2}\right]\frac{P(D+)\left(1-P(D+)\right)}{N}\nonumber \\
\end{equation}
and:
\begin{equation}
{\text{Var}\left(I\left(D,T\right)\right)=\left(\operatorname{}\left(P\left(T+\middle|D+\right)P(D+)+\left(1-P\left(T+\middle|D+\right)\right)P(D+)\right)+\operatorname{}\left(P\left(T+\middle|D+\right)P(D+)+(1-P\left(T-\middle|D-\right))(1-P\left(D+\right))\right)-\operatorname{}{(P\left(T+\middle|D+\right)P\left(D+\right))}+I\left(D,T\right)\right)^{2}\left(\frac{P\left(T+\middle|D+\right)P(D+)\left(1-P\left(T+\middle|D+\right)P(D+)\right)}{N}\right)\backslash n}{+\left(\operatorname{}\left(P\left(T+\middle|D+\right)P(D+)+\left(1-P\left(T+\middle|D+\right)\right)P(D+)\right)+\operatorname{}\left(\left(1-P\left(T+\middle|D+\right)\right)P\left(D+\right)+P\left(T-\middle|D-\right)(1-P\left(D+\right))\right)-\operatorname{}{(\left(1-P\left(T+\middle|D+\right)\right)P\left(D+\right))}+I\left(D,T\right)\right)^{2}\left(\frac{\left(1-P\left(T+\middle|D+\right)\right)P(D+)\left(1-\left(1-P\left(T+\middle|D+\right)\right)P(D+)\right)}{N}\right)\backslash n}{+\left(\operatorname{}\left((1-P\left(T-\middle|D-\right))(1-P\left(D+\right))+P\left(T-\middle|D-\right)(1-P\left(D+\right))\right)+\operatorname{}\left(P\left(T+\middle|D+\right)P(D+)+(1-P\left(T-\middle|D-\right))(1-P\left(D+\right))\right)-\operatorname{}{((1-P\left(T-\middle|D-\right))(1-P\left(D+\right)))}+I\left(D,T\right)\right)^{2}\left(\frac{(1-P\left(T-\middle|D-\right))(1-P\left(D+\right))\left(1-(1-P\left(T-\middle|D-\right))(1-P\left(D+\right))\right)}{N}\right)\backslash n}{+\left(\operatorname{}\left((1-P\left(T-\middle|D-\right))(1-P\left(D+\right))+P\left(T-\middle|D-\right)(1-P\left(D+\right))\right)+\operatorname{}\left(\left(1-P\left(T+\middle|D+\right)\right)P(D+)+P\left(T-\middle|D-\right)(1-P\left(D+\right))\right)-\operatorname{}{(P\left(T-\middle|D-\right)\left(1-P\left(D+\right)\right))}+I\left(D,T\right)\right)^{2}\left(\frac{P\left(T-\middle|D-\right)(1-P\left(D+\right))\left(1-P\left(T-\middle|D-\right)(1-P\left(D+\right))\right)}{N}\right)}\nonumber \\
\end{equation}\selectlanguage{english}
\begin{figure}[H]
\begin{center}
\includegraphics[width=0.70\columnwidth]{figures/Figure-1/Figure-1}
\end{center}
\end{figure}\selectlanguage{english}
\begin{figure}[H]
\begin{center}
\includegraphics[width=0.70\columnwidth]{figures/Figure-2/Figure-2}
\end{center}
\end{figure}\selectlanguage{english}
\begin{figure}[H]
\begin{center}
\includegraphics[width=0.70\columnwidth]{figures/Figure-3a/Figure-3a}
\end{center}
\end{figure}\selectlanguage{english}
\begin{figure}[H]
\begin{center}
\includegraphics[width=0.70\columnwidth]{figures/Figure-3b/Figure-3b}
\end{center}
\end{figure}\selectlanguage{english}
\begin{figure}[H]
\begin{center}
\includegraphics[width=0.70\columnwidth]{figures/Figure-4/Figure-4}
\end{center}
\end{figure}\selectlanguage{english}
\begin{figure}[H]
\begin{center}
\includegraphics[width=0.70\columnwidth]{figures/Figure-5/Figure-5}
\end{center}
\end{figure}\selectlanguage{english}
\begin{figure}[H]
\begin{center}
\includegraphics[width=0.70\columnwidth]{figures/Figure-6/Figure-6}
\end{center}
\end{figure}
\textbf{Hosted file}
\verb`Table 1.docx` available at \url{https://authorea.com/users/339139/articles/465391-meta-analysis-of-mutual-information-applied-in-ebm-diagnostics}
\textbf{Hosted file}
\verb`Table 2.docx` available at \url{https://authorea.com/users/339139/articles/465391-meta-analysis-of-mutual-information-applied-in-ebm-diagnostics}
\selectlanguage{english}
\FloatBarrier
\end{document}
|
http://arxmliv.kwarc.info/sty/pb-diagram.sty.ltxml | kwarc.info | CC-MAIN-2019-09 | text/x-tex | application/x-tex | crawl-data/CC-MAIN-2019-09/segments/1550249569386.95/warc/CC-MAIN-20190224003630-20190224025630-00263.warc.gz | 18,086,717 | 784 | # -*- CPERL -*-
# /=======================================================\ #
# | pb-diagram.sty - Implementation for LaTeXML | #
# | | #
# |=======================================================| #
# | Part of LaTeXML : http://dlmf.nist.gov/LaTeXML/ | #
# | Copyright (c) 2006 arXMLiv group | #
# | Released under the GNU Public License | #
# \=======================================================/ #
package LaTeXML::Package::Pool;
use strict;
use LaTeXML::Package;
#**********************************************************************
1;
|
http://dlmf.nist.gov/27.14.E7.tex | nist.gov | CC-MAIN-2016-22 | application/x-tex | null | crawl-data/CC-MAIN-2016-22/segments/1464053252010.41/warc/CC-MAIN-20160524012732-00226-ip-10-185-217-139.ec2.internal.warc.gz | 81,706,969 | 628 | \[n\mathop{p\/}\nolimits\!\left(n\right)=\sum_{k=1}^{n}\mathop{\sigma_{1}\/}%
\nolimits\!\left(n\right)\mathop{p\/}\nolimits\!\left(n-k\right),\] |
https://dlmf.nist.gov/13.7.E4.tex | nist.gov | CC-MAIN-2018-17 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2018-17/segments/1524125944851.23/warc/CC-MAIN-20180421012725-20180421032725-00245.warc.gz | 596,454,610 | 749 | \[U\left(a,b,z\right)=z^{-a}\sum_{s=0}^{n-1}\frac{{\left(a\right)_{s}}{\left(a-b%
+1\right)_{s}}}{s!}(-z)^{-s}+\varepsilon_{n}(z),\] |
https://is.muni.cz/zivotopisy/cv?lang=en;uco=9402;zjazyk=eng;varianta=1;tiskproh=latex_rich | muni.cz | CC-MAIN-2021-04 | application/x-text | application/x-tex | crawl-data/CC-MAIN-2021-04/segments/1610703533863.67/warc/CC-MAIN-20210123032629-20210123062629-00467.warc.gz | 378,042,112 | 6,001 | \documentclass[12pt,a4paper]{artikel1}
\usepackage{fancyheadings}
\usepackage{palatino}
\newenvironment{ul}{\begin{itemize}}{\end{itemize}}
\newenvironment{ol}{\begin{enumerate}}{\end{enumerate}}
\newenvironment{vitae}[2]{\begingroup\cleardoublepage\thispagestyle{plain}\pagestyle{fancy}#1\def\cvname{#2}}%
{\newpage\endgroup}
\lhead{}
\rhead{\cvname}
\chead{}
\cfoot{}
\lfoot{}
\rfoot{\thepage}
\newcommand\nadpis{\section*}
\newcommand\podnadpis{\subsection*}
\newcommand\suv[1]{`#1'}
\newcommand\duv[1]{``#1\textquotedblright}
\parindent 0pt
\clubpenalty10000 \widowpenalty 10000 \exhyphenpenalty10000
\begin{document}
\begin{vitae}{\british}{Assoc. Prof. Mgr. Radová}
\nadpis{Curriculum vit\ae}
\vspace{0.8cm}
\podnadpis{\textbf{Name, first names, scientific degrees} }
\begin{ul}
\item Assoc. Prof. Mgr. Radová, Irena, Ph.D;
\item married, two children
\end{ul}
\podnadpis{\textbf{Department/Faculty/University} }
\begin{ul}
\item Department of Classical Studies\\
Faculty of Arts of Masaryk University (= FF MU)\\
A. Nováka 1\\
660 88 Brno
\end{ul}
\podnadpis{\textbf{Function, current position} }
\begin{ul}
\item Associate professor\\
since 2004 head of the Department of Classical Studies\\
\end{ul}
\podnadpis{\textbf{Education and academic qualifications} }
\begin{ul}
\item 2010 \quad Associate professor in Classical Philology (Masaryk University);
\item 2003 \quad PhD. in Classical Philology (Masaryk University);
\item 2000 \quad Mgr. in Ancient Greek Language and Literature (Masaryk University);
\item 1989 \quad Mgr. in Latin Language and Literature ? German Language and Literature (Masaryk University).
\end{ul}
\podnadpis{\textbf{Professional experience} }
\begin{ul}
\item 1999 \quad Department of Classical Studies FF MU
\end{ul}
\podnadpis{\textbf{Teaching activities} }
\begin{ul}
\item Proseminar and Seminar of Ancient Greek literature;
\item History of the Classical Literature;
\item Reading Herodotus;
\item Reading Xenophon;
\item Reading The New Testament;
\item Classical Mythology;
\item Classical Metrics
\item Ancient Topics in Movies
\end{ul}
\podnadpis{\textbf{Research activities} }
\begin{ul}
\item 2007?2011 Centre for the Interdisciplinary Research of Ancient Languages and Older Stages of Modern Languages (MSM 0021622435) (project team member);
\item 2006?2008 Research Project ? together with D. Bartoňková (Grant Agency of Academy of Sciences of Czech Republic, GAAV IAA901640603): Ancient Scriptural Records of the History of Our Territory;
\item 2005?2007: Research Project (Grant Agency of CR, n. 405/05/P134): Scholia on Apollonius Rhodius: Methodology of Ancient Scientific Approach to a Literary Work (principal investigator);
\item 2005 \quad Project of Ministry of Education of CR (n. 2954/2005/F5/a): New Approach to Classical Metrics (principal investigator).
\end{ul}
\podnadpis{\textbf{Professional stays abroad} }
\begin{ul}
\item 1993--1994 \quad University of Vienna;
\item 2000--2001 \quad The Aristotle University of Thessaloniki;
\item 2003 \quad Ruprecht Karls University Heidelberg;
\item 2003, 2005 Istituto Universitario Orientale.
\end{ul}
\podnadpis{\textbf{Other academic activities, research projects, grants} }
\begin{ul}
\item since 2004 (with breaks in 2007 and 2010/2011 for maternity leave) head of the Department of Classics;
\item in 2006--2014 (with breaks in 2007 and 2010/2011 for maternity leave) vice--dean of the Faculty of Arts.
\item
\end{ul}
\podnadpis{\textbf{Non--university activities} }
\begin{ul}
\item Member of the Society for Modern Greek Studies;
\item Memebr of the Society for Classical Studies;
\item 2018-- \quad Honorary member of the ???????? ???????? ??????????? ??????????? (National Society of Greek Authors)
\item
\end{ul}
\podnadpis{\textbf{Major publications}}
\begin{ul}
\item RADOVÁ, Irena, Juraj FRANEK and Tomáš JENIŠ. \textit{Tomáš Špidlík. Z pokladnice otců. Patristická čítanka na každý den. Přeloženo z řeckých, latinských a francouzských textů (Tomáš Špidlík. Patristic breviary : Ancient wisdom for today's world. Translated from Greek, Latin and French texts)\/}. Vydání první. Olomouc: nakladatelství Centra Aletti Refugium Velehrad--Roma, 2019. 461 pp. Dílo Tomáše Špidlíka; XXV. ISBN 978--80--7412--333--7. info
\item RADOVÁ, Irena. Médeia jako protagonistka uprchlické krize (Medea as the Protagonist of a Refugee Crisis). In BUZÁSSYOVÁ, Ľudmila; JURÍKOVÁ, Erika; GRUSKOVÁ, Jana. \textit{Ideológia v premenách času v pamiatkach gréckej a latinskej tradície\/}. Bratislava: Univerzita Komenského v Bratislave, 2018. p. 66--74. ISBN 978--80--223--4626--9. info
\item RADOVÁ, Irena. Hera and Juno in the Argonautica. \textit{Acta antiqua Academiae scientiarum Hungaricae\/}. Akademiai Kiado, 2017, vol. 57, 2--3, p. 207--214. ISSN 0044--5975. doi:10.1556/068.2017.57.2--3.6. info
\item RADOVÁ, Irena. The Argonauts as Dysfunctional Indo--European Heroes? In \textit{Emotional Trauma in Greek and Roman Culture : Representations and Reactions, European Cultural Center of Delphi (ECCD), June 23?25, 2016, Delphi, Greece\/}. 2016. URL info
\item RADOVÁ, Irena. Médeia jako protagonistka uprchlické krize (Medea in a refugee crisis). In \textit{Ideológia v premenách času v pamiatkach gréckej a latinskej tradície: Medzinárodná konferencia pri príležitosti sedemdesiatin profesora Daniela Škovieru; 18.?19. novembra 2016, FiF UK Bratislava\/}. 2016. info
\item RADOVÁ, Irena. \textit{Valerius Flaccus. Argonautica\/}. 1. vyd. Praha: Arista, Baset, 2015. 408 pp. Antická knihovna ; sv. 84. ISBN 978--80--86410--72--2. info
\item RADOVÁ, Irena and Katarina PETROVIĆOVÁ. \textit{Laetae segetes IV\/}. 2014. info
\item RADOVÁ, Irena. Médeia na prahu novověku ? dvě případové studie (Medea on the Threshold of Modern Times ? Two Case Studies). \textit{Historica Olomucensia\/}. Olomouc: Univerzita Palackého v Olomouci, 2014, vol. 34, Supplementum I, p. 305--313. ISSN 1803--9561. info
\item RADOVÁ, Irena and Holman PETR. \textit{Otokar Březina / Ottocarus Březina. Básnické spisy / Opera poetica. Latinis litteris expressit Iohannes Šprincl (Otokar Březina / Ottocarus Březina. Poetry / Opera poetica. Latin transl. Jan Šprincl)\/}. Červený Kostelec: Pavel Mervart, 2013. 467 pp. ISBN 978--80--7465--083--3. info
\item RADOVÁ, Irena. Mytologie a antická rodina ve vzájemném vztahu (Classical mythology and family interrelated). In Frýdek, Miroslav a kol. \textit{Právní, náboženské a politické aspekty starověké římské rodiny\/}. Vyd. 1. Ostrava: Key Publishing, 2012. p. 6--12. Právo. ISBN 978--80--7418--157--3. info
\item RADOVÁ, Irena. The influence of antiquity on Czech--written literature of the 19th and 20th centuries. In Aleksejeva, Brigita; Lams, Ojars; Rumniece, Ilze. \textit{Hellenic Dimension : Materials of the Riga 3rd International Conference of Hellenic Studies\/}. Riga: University of Latvia, 2012. p. 203--209. ISBN 978--9984--45--469--6. info
\item RADOVÁ, Irena. \textit{Altgriechische Scholien. Ein typologischer Versuch (Ancient Greek Scholia. A typological Attempt)\/}. Prag: Koniasch Latin Press, 2011. 216 pp. Laborinthus. ISBN 978--80--86791--58--6. info
\item RADOVÁ, Irena. Sprachwissenschaftliche Disziplinen in den altgriechischen Scholien (Linguistics in the Ancient Greek Scholia). In \textit{Early European Languages in the Eyes of Modern Linguistics\/}. 2009. ISBN 978--80--210--4944--4. info
\item PETROVIĆOVÁ, Katarina and Irena RADOVÁ. \textit{Graeco--Latina Brunensia. Erant in quadam civitate... Na počest Daši Bartoňkové. (Graeco--Latina Brunensia. Erant in quadam civitate... To Honour of Daša Bartoňková.)\/}. 1st ed. Brno: Masarykova univerzita, 2009. 412 pp. ISBN 978--80--210--5000--6. info
\item RADOVÁ, Irena. Vzdělávání v řecko--římském Egyptě na základě školních papyrů (Education in the Graeco--Roman Egypt on the Basis of the School Papyri). In \textit{Latina v církevním a světském školství\/}. Praha: Filosofický ústav Akademie věd České republiky, v.v.i. ? Kabinet pro klasická studia, 2009. p. 7--20, 19 pp. ISBN 978--80--254--4080--3. info
\item RADOVÁ, Irena. Sprachwissenschaftliche Disziplinen in den altgriechischen Scholien (The Linguistic Disciplines in the Ancient Greek Scholia). In \textit{Early European Languages in the Eyes of Modern Linguistics\/}. 1. vyd. Brno: Masarykova univerzita, 2009. p. 253--256, 8 pp. ISBN 978--80--210--4944--4. info
\item RADOVÁ, Irena and Nina JAŠKOVÁ. Výběrová bibliografie Daši Bartoňkové (Selective Bibliography of Daša Bartoňková). \textit{Graeco--Latina Brunensia\/}. Brno: Masarykova univerzita, 2009, vol. 2009, No 14, p. 5--9. ISSN 1803--7402. info
\item RADOVÁ, Irena. Mythology in the scholia to Apollonius Rhodius. In \textit{The 8th International Conference on Greek Research\/}. 2009. info
\item RADOVÁ, Irena. \textit{(ed.). Laetae segetes iterum (Laetae segetes iterum)\/}. Brno: Masarykova univerzita, 2008. 448 pp. ISBN 978--80--210--4775--4. info
\item RADOVÁ, Irena. Bibliografie (Bibliography). In CONTE, G. B. \textit{Dějiny římské literatury\/}. Praha: Koniasch Latin Press, 2008. p. 682--704. Druhé, revidované a doplněné vydání. ISBN 978--80--86791--57--9. info
\item BARTOŇKOVÁ, Daša, Petr KYLOUŠEK, Irena RADOVÁ and Helena SEKAVOVÁ. \textit{(transl.) Luciano Canfora: Gaius Iulius Caesar. Demokratický diktátor. Praha: Vyšehrad, 2007, 448s. ISBN 978--80--7021--901--0. ((transl.) Luciano Canfora: Gaius Iulius Caesar. Democratic Dictator. Praha: Vyšehrad, 2007, 448s. ISBN 978--80--7021--901--0.)\/}. Praha: Vyšehrad, 2007. 448 pp. ISBN 978--80--7021--901--0. info
\item RADOVÁ, Irena. Racionalistický výklad mýtů (Rationalistic interpretation of myths). In \textit{Vademecum Graeco--Latinum Brunense\/}. Brno: Masarykova univezita, 2006. p. 49--55. ISBN 80--210--3969--8. info
\item PFAFFEL, Wilhelm, Katarina PETROVIĆOVÁ and Irena RADOVÁ. \textit{Armilla -- Interaktive Übungssoftware (Armilla -- interactive tutorial software)\/}. 1st ed. Bamberg: C. C. Büchner, 2006. ISBN 3--7661--9592--1. info
\item RADOVÁ, Irena. Plautus redivivus. In EDD: KRMÍČKOVÁ, Helena, Anna PUMPROVÁ, Dana RŮŽIČKOVÁ and Libor ŠVANDA. \textit{Querite primum regnum Dei\/}. Brno: Filozofická fakulta MU; Matice moravská, 2006. p. 161--167. ISBN 80--86488--35--7. info
\item NECHUTOVÁ, Jana and Irena (edd.) RADOVÁ. \textit{Laetae segetes\/}. 1st ed. Brno: Masarykova univerzita, 2006. 196 pp. Laetae segetes I. ISBN 80--210--4069--6. info
\item RADOVÁ, Irena. Argonauti na cestách časem (The Argonauts Travelling through the Times). In ED. KEPARTOVÁ, Jana. \textit{Antika? Zajděte do kina, přečtěte román...\/} Praha: Nakladatelství Lidové noviny, 2006. p. 11--22. ISBN 80--7106--850--0. info
\item RADOVÁ, Irena. Einige Aspekte des Abenteuers auf Lemnos in griechischer und römischer Auffassung (Some Aspects of the Lemnos--adventure in the Greek and Roman Conception). \textit{Graecolatina Pragensia (Acta Universitatis Carolinae, Philologica)\/}. Praha: Univerzita Karlova, 2006, vol. 2006, No 20, p. 163--168. ISSN 0567--8269. info
\item RADOVÁ, Radová. Jana Nechutová (ed.), Druhý život antického mýtu, Brno 2004\duv{. \textit{Iliteratura\/}. 2005. ISSN 1214--309X. URL info
\item BEDNAŘÍKOVÁ, Jarmila and Irena RADOVÁ. \textit{Besedy o demokracii v minulosti a dnes (The talking about the democracy in antiquity and today)\/}. Lubor Kysučan. 2005. info
\item RADOVÁ, Irena, Jana NECHUTOVÁ and Katarina PETROVIĆOVÁ. \textit{Laetae segetes\/}. 2005. info
\item RADOVÁ, Irena. \textit{Palaifatos: O neuvěřitelných příbězích (Palaifatos: Unbelievable Tales)\/}. Praha: Koniasch Latin Press, 2005. 96 pp. Koniaschova knihovna klasiků, sv. 1. ISBN 80--86791--30--0. info
\item RADOVÁ, Irena and Jiří K. KROUPA. Slovníček řeckých a latinských pojmů (Vocabulary of greek and latin terms). In \textit{Luciano Canfora. Dějiny řecké literatury.\/} Druhé vydání. Praha: Koniasch Latin Press, 2004. p. 863--871. Dějiny evropských literatur, 2. ISBN 80--86791--10--6. info
\item RADOVÁ, Irena. \textit{Dobrodružství Argonautů: Řecko versus Řím (Adventure of Argonauts: Greece versus Rome)\/}. Praha: Koniasch Latin Press, 2004. 159 pp. Primitiae, 1. sv. ISBN 80--86791--15--7. info
\item RADOVÁ, Irena. Imitatio des Valerius Flaccus (Imitatio of Valerius Flaccus). \textit{Sborník prací Filozofické fakulty brněnské univerzity, řada klasická N, Graeco--Latina Brunensia\/}. Brno: Masarykova univerzita v Brně, 2003, vol. 8, No 1, p. 39--45, 6 pp. ISSN 1211--6335. info
\item RADOVÁ, Irena and Jiří K. KROUPA. Slovníček řeckých a latinských pojmů (Vocabulary of greek and latin terms). In \textit{Dějiny řecké literatury\/}. Praha: Koniasch Latin Press, 2001. p. 855--863. Dějiny evropských literatur, 2. ISBN 80--85917--69--6. info
\item RADOVÁ, Irena. Literarische Vorbilder von Valerius Flaccus (Literary inspiration of Vlaerius Flaccus). In \textit{SPFFBU\/}. 6--7. Brno: Masarykova Univerzita, 2001. p. 263--267. info
\item RADOVÁ, Irena. Nepoetická poezie? (Non--poetic poetry?). In \textit{Vademecum Graeco--Latinum Brunense\/}. Brno: Ústav klasických studií FF MU, 2001. p. 63--71. info
\item RADOVÁ, Irena. Non omnis mortuus est. \textit{Universitas\/}. Brno: Masarykova Univerzita, 2001, vol. 2001, No 4, p. 36--37. ISSN 1211--3384. info
\item RADOVÁ, Irena. Literární vzory Valeria Flakka (Literary Inspiration of Valerius Flaccus). In \textit{Philosophia 2000: }Klasická studia na prahu nového milénia"\/}. Ed. T. Klůsová. Litomyšl: Muzeum antického sochařství a architektury FF UK, 2000. p. 57--59. info
\end{ul}
\vspace{0.5cm} 2018/02/07
\vspace{0.5cm} \end{vitae}
\end{document}
|
https://people.maths.bris.ac.uk/~matyd/GroupNames/480/C48sD5_sgps.tex | bris.ac.uk | CC-MAIN-2021-43 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2021-43/segments/1634323587963.12/warc/CC-MAIN-20211026231833-20211027021833-00252.warc.gz | 591,337,862 | 2,231 | \documentclass[11pt]{amsart}
\usepackage{amssymb,tikz}
\usetikzlibrary{positioning}
\usepackage[colorlinks=false,urlbordercolor=white]{hyperref}
\def\gn#1#2{{$\href{http://groupnames.org/\#?#1}{#2}$}}
\def\gn#1#2{$#2$} % comment this line out to get html links
\tikzset{sgplattice/.style={inner sep=1pt,norm/.style={red!50!blue},char/.style={blue!50!black},
lin/.style={black!50}},cnj/.style={black!50,yshift=-2.5pt,left=-1pt of #1,scale=0.5,fill=white}}
\begin{document}
\begin{tikzpicture}[scale=1.0,sgplattice]
\node[char] at (12.9,0) (1) {\gn{C1}{C_1}};
\node[char] at (21.9,1.09) (2) {\gn{C2}{C_2}};
\node at (3.88,1.09) (3) {\gn{C2}{C_2}};
\node[char] at (9.88,1.09) (4) {\gn{C3}{C_3}};
\node[char] at (15.9,1.09) (5) {\gn{C5}{C_5}};
\node[char] at (17.9,2.93) (6) {\gn{C4}{C_4}};
\node at (4.5,2.93) (7) {\gn{C2^2}{C_2^2}};
\node at (24.5,2.93) (8) {\gn{C4}{C_4}};
\node[char] at (14.5,2.93) (9) {\gn{C6}{C_6}};
\node at (7.88,2.93) (10) {\gn{S3}{S_3}};
\node[char] at (21.2,2.93) (11) {\gn{C10}{C_{10}}};
\node at (1.25,2.93) (12) {\gn{D5}{D_5}};
\node[char] at (11.2,2.93) (13) {\gn{C15}{C_{15}}};
\node[char] at (10.4,5.36) (14) {\gn{C8}{C_8}};
\node at (5.38,5.36) (15) {\gn{D4}{D_4}};
\node at (20.4,5.36) (16) {\gn{Q8}{Q_8}};
\node[char] at (15.4,5.36) (17) {\gn{C12}{C_{12}}};
\node at (7.88,5.36) (18) {\gn{D6}{D_6}};
\node at (25.4,5.36) (19) {\gn{Dic3}{{\rm Dic}_3}};
\node[char] at (17.9,5.36) (20) {\gn{C20}{C_{20}}};
\node at (22.9,5.36) (21) {\gn{Dic5}{{\rm Dic}_5}};
\node at (2.88,5.36) (22) {\gn{D10}{D_{10}}};
\node[char] at (12.9,5.36) (23) {\gn{C30}{C_{30}}};
\node at (0.375,5.36) (24) {\gn{D15}{D_{15}}};
\node[char] at (9.38,8.08) (25) {\gn{C16}{C_{16}}};
\node at (18.6,8.08) (26) {\gn{Q16}{Q_{16}}};
\node at (7.12,8.08) (27) {\gn{D8}{D_8}};
\node[char] at (16.4,8.08) (28) {\gn{C24}{C_{24}}};
\node at (4.75,8.08) (29) {\gn{D12}{D_{12}}};
\node at (21,8.08) (30) {\gn{Dic6}{{\rm Dic}_6}};
\node[char] at (11.8,8.08) (31) {\gn{C40}{C_{40}}};
\node at (2.5,8.08) (32) {\gn{D20}{D_{20}}};
\node at (23.2,8.08) (33) {\gn{Dic10}{{\rm Dic}_{10}}};
\node[char] at (14,8.08) (34) {\gn{C60}{C_{60}}};
\node at (25.6,8.08) (35) {\gn{Dic15}{{\rm Dic}_{15}}};
\node at (0.125,8.08) (36) {\gn{D30}{D_{30}}};
\node at (8.75,10.7) (37) {\gn{SD32}{{\rm SD}_{32}}};
\node[char] at (17,10.7) (38) {\gn{C48}{C_{48}}};
\node at (19.8,10.7) (39) {\gn{Dic12}{{\rm Dic}_{12}}};
\node at (6,10.7) (40) {\gn{D24}{D_{24}}};
\node[char] at (11.5,10.7) (41) {\gn{C80}{C_{80}}};
\node at (22.4,10.7) (42) {\gn{Dic20}{{\rm Dic}_{20}}};
\node at (3.38,10.7) (43) {\gn{D40}{D_{40}}};
\node[char] at (14.2,10.7) (44) {\gn{C120}{C_{120}}};
\node at (0.625,10.7) (45) {\gn{D60}{D_{60}}};
\node at (25.1,10.7) (46) {\gn{Dic30}{{\rm Dic}_{30}}};
\node at (17.9,12.8) (47) {\gn{C48:C2}{C_{48}{\rtimes}C_2}};
\node at (7.88,12.8) (48) {\gn{C16:D5}{C_{16}{\rtimes}D_5}};
\node[char] at (2.88,12.8) (49) {\gn{D120}{D_{120}}};
\node[char] at (22.9,12.8) (50) {\gn{Dic60}{{\rm Dic}_{60}}};
\node[char] at (12.9,12.8) (51) {\gn{C240}{C_{240}}};
\node[char] at (12.9,14.1) (52) {\gn{C48:D5}{C_{48}{\rtimes}D_5}};
\draw[lin] (1)--(2) (1)--(3) (1)--(4) (1)--(5) (2)--(6) (2)--(7) (3)--(7)
(2)--(8) (2)--(9) (4)--(9) (3)--(10) (4)--(10) (2)--(11) (5)--(11)
(3)--(12) (5)--(12) (4)--(13) (5)--(13) (6)--(14) (6)--(15) (7)--(15)
(6)--(16) (8)--(16) (6)--(17) (9)--(17) (7)--(18) (9)--(18) (10)--(18)
(8)--(19) (9)--(19) (6)--(20) (11)--(20) (8)--(21) (11)--(21) (12)--(22)
(7)--(22) (11)--(22) (13)--(23) (9)--(23) (11)--(23) (12)--(24) (13)--(24)
(10)--(24) (14)--(25) (14)--(26) (16)--(26) (14)--(27) (15)--(27) (14)--(28)
(17)--(28) (15)--(29) (17)--(29) (18)--(29) (16)--(30) (17)--(30) (19)--(30)
(14)--(31) (20)--(31) (15)--(32) (20)--(32) (22)--(32) (16)--(33) (20)--(33)
(21)--(33) (23)--(34) (17)--(34) (20)--(34) (23)--(35) (19)--(35) (21)--(35)
(23)--(36) (24)--(36) (18)--(36) (22)--(36) (25)--(37) (26)--(37) (27)--(37)
(25)--(38) (28)--(38) (26)--(39) (28)--(39) (30)--(39) (27)--(40) (28)--(40)
(29)--(40) (25)--(41) (31)--(41) (26)--(42) (31)--(42) (33)--(42) (27)--(43)
(31)--(43) (32)--(43) (34)--(44) (28)--(44) (31)--(44) (34)--(45) (36)--(45)
(29)--(45) (32)--(45) (34)--(46) (35)--(46) (30)--(46) (33)--(46) (37)--(47)
(38)--(47) (39)--(47) (40)--(47) (37)--(48) (41)--(48) (42)--(48) (43)--(48)
(45)--(49) (40)--(49) (43)--(49) (44)--(49) (46)--(50) (39)--(50) (42)--(50)
(44)--(50) (38)--(51) (41)--(51) (44)--(51) (47)--(52) (48)--(52) (49)--(52)
(50)--(52) (51)--(52);
\node[cnj=3] {120};
\node[cnj=7] {60};
\node[cnj=8] {60};
\node[cnj=10] {40};
\node[cnj=12] {24};
\node[cnj=15] {30};
\node[cnj=16] {30};
\node[cnj=18] {20};
\node[cnj=19] {20};
\node[cnj=21] {12};
\node[cnj=22] {12};
\node[cnj=24] {8};
\node[cnj=26] {15};
\node[cnj=27] {15};
\node[cnj=29] {10};
\node[cnj=30] {10};
\node[cnj=32] {6};
\node[cnj=33] {6};
\node[cnj=35] {4};
\node[cnj=36] {4};
\node[cnj=37] {15};
\node[cnj=39] {5};
\node[cnj=40] {5};
\node[cnj=42] {3};
\node[cnj=43] {3};
\node[cnj=45] {2};
\node[cnj=46] {2};
\node[cnj=47] {5};
\node[cnj=48] {3};
\end{tikzpicture}
\end{document}
|
http://porocila.imfm.si/2017/mat/clani/dolinarfe.tex | imfm.si | CC-MAIN-2023-14 | text/x-tex | application/x-tex | crawl-data/CC-MAIN-2023-14/segments/1679296948756.99/warc/CC-MAIN-20230328011555-20230328041555-00725.warc.gz | 36,936,168 | 2,306 | \clan {Gregor Dolinar}
%--------------------------------------------------------
% A. objavljene znanstvene monografije
%--------------------------------------------------------
%\begin{skupina}{A}
%\disertacija
% {NASLOV}
% {UNIVERZA}
% {FAKULTETA}
% {ODDELEK}
% {KRAJ} {DRZAVA} {LETO}
%\magisterij
% {NASLOV}
% {UNIVERZA}
% {FAKULTETA}
% {ODDELEK}
% {KRAJ} {DRZAVA} {LETO}
%\monografija
% {AVTORJI}
% {NASLOV}
% {ZALOZBA}
% {KRAJ} {DRZAVA} {LETO}
%\end{skupina}
% Ni podatkov za to sekcijo
%--------------------------------------------------------
% B. raziskovalni clanki sprejeti v objavo v znanstvenih
% revijah in v zbornikih konferenc
%--------------------------------------------------------
\begin{skupina}{B}
%\sprejetoRevija
% {AVTORJI}
% {NASLOV}
% {REVIJA}
%\sprejetoZbornik
% {AVTORJI}
% {NASLOV}
% {KONFERENCA}
% {KRAJ} {DRZAVA} {MESEC} {LETO}
\sprejetoRevija
{\crta, B.~Kuzma, J.~Marovt}
{A note on commutativity preserving maps on $M_{n}(\mathbb{R})$}
{Oper.\ Matrices}
\sprejetoRevija
{\crta, B.~Kuzma, N.~Stopar}
{Characterization of orthomaps on the Cayley plane}
{Aequationes Math.}
\end{skupina}
% Ni podatkov za to sekcijo
%--------------------------------------------------------
% C. raziskovalni clanki objavljeni v znanstvenih revijah
% in v zbornikih konferenc
%--------------------------------------------------------
%\begin{skupina}{C}
%\objavljenoRevija
% {AVTORJI}
% {NASLOV}
% {REVIJA} {LETNIK} {LETO} {STEVILKA} {STRANI}
%\objavljenoZbornik
% {AVTORJI}
% {NASLOV}
% {KONFERENCA}
% {KRAJ} {DRZAVA} {MESEC} {LETO}
% {ZBORNIK} {STRANI}
%\end{skupina}
\begin{skupina}{C}
\objavljenoRevija
% 1.01: {\bf 1}. CRUZ, Henrique F. da, DOLINAR, Gregor, FERNANDES, Ros\'{a}rio, KUZMA, Bojan. Maximal doubly stochastic matrix centralizers. {\it Linear Algebra Appl.}, 2017, vol. 532, str. 387-396. $[$COBISS.SI-ID 18079577$]$\\
{H.~F.~Da Cruz, \crta, R.~Fernandes, B.~Kuzma}
{Maximal doubly stochastic matrix centralizers}
{Linear Algebra Appl.} {532} {2017} {} {387--396}
\objavljenoRevija
{\crta, B.~Kuzma, J.~Marovt}
{Lie product preserving maps on $M_{n}(\mathbb{F})$}
{Filomat} {31} {2017} {16} {53{3}5--534{4}}
\end{skupina}
%--------------------------------------------------------
% D. urednistvo v znanstvenih revijah in zbornikih
% znanstvenih konferenc
%--------------------------------------------------------
%\begin{skupina}{D}
%\urednikRevija
% {OPIS}
% {REVIJA}
%\urednikZbornik
% {OPIS}
% {KONFERENCA}
% {KRAJ} {DRZAVA} {MESEC} {LETO}
%\end{skupina}
\begin{skupina}{D}
\urednikRevija
{\v{C}lan uredni\v{s}kega odbora}
{Mathematica Slovaca}
\urednikRevija
{\v{C}lan uredni\v{s}kega odbora}
{Matematika i Informatika}
\end{skupina}
%--------------------------------------------------------
% E. organizacija mednarodnih in domacih znanstvenih
% srecanj
%--------------------------------------------------------
%\begin{skupina}{E}
%\organizacija
% {OPIS}
% {KONFERENCA}
% {KRAJ} {DRZAVA} {MESEC} {LETO}
%\end{skupina}
% Ni podatkov za to sekcijo
%--------------------------------------------------------
% F. vabljena predavanja na tujih ustanovah in
% mednarodnih konferencah
%--------------------------------------------------------
%\begin{skupina}{F}
%\predavanjeUstanova
% {NASLOV}
% {OPIS}
% {USTANOVA}
% {KRAJ} {DRZAVA} {MESEC} {LETO}
%\predavanjeKonferenca
% {NASLOV}
% {OPIS}
% {KONFERENCA}
% {KRAJ} {DRZAVA} {MESEC} {LETO}
%\end{skupina}
% Ni podatkov za to sekcijo
%--------------------------------------------------------
% G. aktivne udelezbe na mednarodnih in domacih
% konferencah
%--------------------------------------------------------
%\begin{skupina}{G}
%\konferenca
% {NASLOV}
% {KONFERENCA}
% {KRAJ} {DRZAVA} {MESEC} {LETO}
%\end{skupina}
\begin{skupina}{G}
\konferenca
% 3.15: {\bf 2}. Preservers Everywhere, Bolyai Institute, University of Szeged, Szeged, Hungary, 19-23 June 2017, DOLINAR, Gregor{\it . Maximal doubly stochastic matrix centralizers : Szeged, 20. 6. 2017}. $[$COBISS.SI-ID 18053721$]$\\
{Maximal doubly stochastic matrix centralizers}
{Preservers Everywhere}
{Szeged} {Madžarska} {junij} {2017}
\end{skupina}
%--------------------------------------------------------
% H. strokovni clanki
%--------------------------------------------------------
%\begin{skupina}{H}
%\clanekRevija
% {AVTORJI}
% {NASLOV}
% {REVIJA} {LETNIK} {LETO} {STEVILKA} {STRANI}
%\clanekZbornik
% {AVTORJI}
% {NASLOV}
% {KONFERENCA}
% {KRAJ} {DRZAVA} {MESEC} {LETO}
% {ZBORNIK} {STRANI}
%\end{skupina}
% Ni podatkov za to sekcijo
%--------------------------------------------------------
% I. razno
%--------------------------------------------------------
%\begin{skupina}{I}
%\razno
% {OPIS}
%\end{skupina}
%\begin{skupina}{I}
%POZOR: Bibliografija2017.tex > 2017\mat\clani\dolinarfe.tex 1781/203: Stevilo neopredeljenih zadetkov: 3
%\razno
% Ured: {\bf 3}. {\it Matematika i informatika}. Dolinar, Gregor (\v{c}lan uredni\v{s}kega sveta 2012-). Sofija: Ministerstvo na obrazovanieto i naukata: Nacionalno izdatelstvo za obrazovanie i nauka Az Buki, 1994-. ISSN 1310-2230. $[$COBISS.SI-ID 16290137$]$\\
%\razno
% Ured: %list {\bf 4}. {\it Mathematica slovaca}. Dolinar, Gregor (\v{c}lan uredni\v{s}kega odbora 2011-). Bratislava: Mathematical Institute of the Slovac Academy of Sciences, 1976-. ISSN 0139-9918. $[$COBISS.SI-ID 27357184$]$\\
%\razno
% Rece: {\bf 5}. OBLAK, Polona{\it . Matematika}. 2. izd. Ljubljana: Zalo\v{z}ba FRI, cop. 2017. 175 str., ilustr. ISBN 978-961-6209-93-9. $[$COBISS.SI-ID 290485504$]$\\
%\end{skupina}
%--------------------------------------------------------
% tuji gosti
%--------------------------------------------------------
%\begin{seznam}
%\gost {IME} {TRAJANJE} {USTANOVA} {KRAJ} {DRZAVA} {MESEC} {LETO} {POVABILO}
%\end{seznam}
%--------------------------------------------------------
% gostovanja
%--------------------------------------------------------
%\begin{seznam}
%\gostovanje {IME} {TRAJANJE} {USTANOVA} {KRAJ} {DRZAVA} {MESEC} {LETO}
%\end{seznam}
|
http://cs.ru.nl/~freek/talks/leiden.tex | ru.nl | CC-MAIN-2020-50 | text/x-tex | application/x-tex | crawl-data/CC-MAIN-2020-50/segments/1606141672314.55/warc/CC-MAIN-20201201074047-20201201104047-00457.warc.gz | 28,890,609 | 6,864 | \documentclass[a4]{seminar}
\usepackage{advi}
\usepackage{advi-graphicx}
\usepackage{color}
\usepackage{amssymb}
\slideframe{none}
\definecolor{slideblue}{rgb}{0,0,.5}
\definecolor{slidegreen}{rgb}{0,.4,0}
\definecolor{slidered}{rgb}{1,0,0}
\definecolor{slidegray}{rgb}{.5,.5,.5}
\newpagestyle{fw}{}{\hfil\textcolor{slideblue}{\sf\thepage}\qquad\qquad}
\slidepagestyle{fw}
\newcommand{\sectiontitle}[1]{\centerline{\textcolor{slideblue}{\textbf{#1}}}
\par\medskip}
\newcommand{\slidetitle}[1]{{\textcolor{slideblue}{#1}}\par
\vspace{-1.2em}{\color{slideblue}\rule{\linewidth}{0.04em}}}
\newcommand{\dashskip}{\strut\enskip{ }}
\newcommand{\exclspace}{\hspace{.45pt}}
\begin{document}\sf
\renewcommand{\sliderightmargin}{0mm}
\renewcommand{\slideleftmargin}{20mm}
\renewcommand{\slidebottommargin}{6mm}
\setcounter{slide}{-1}
\begin{slide}
\slidetitle{\Large formal mathematics}
Freek Wiedijk \\
Nijmegen University
Leiden University \\
2002-10-10, 16:00
\end{slide}
\begin{slide}
\sectiontitle{proof checking}
\slidetitle{the best of two worlds}
a wonderful computer game\exclspace!
\adviwait
proof checking is like
\begin{itemize}
\item[$\bullet$]
\textbf{programming} \\ but no bugs, and not as trivial\exclspace!
\item[$\bullet$]
\textbf{doing mathematics} \\ but completely transparent, and the computer helps\exclspace!
\end{itemize}
\adviwait
(currently closer to programming than to doing mathematics)
\vfill
\end{slide}
\begin{slide}
\slidetitle{proof checking $\;\leftrightarrow\;$ mathematical assistants}
computer can help with:
\begin{itemize}
\item[$\bullet$]
the discovery of mathematics
\item[\advirecord{reg1}{$\bullet$}]
\advirecord{reg2}{the registration of mathematics}
\adviplay{reg1}\adviplay{reg2}
\end{itemize}
\adviwait
\adviplay[slidered]{reg1}\adviplay[slidered]{reg2}
here only interested in the formalization of already existing mathematics
\medskip
\adviwait
\textbf{analogy}
\begin{center}
\begin{tabular}{rcl}
mathematician & $\leftrightarrow$ & proof checker \\
\advirecord{h1a}{violin player}\advirecord{h2a}{\llap{music composer}} & $\leftrightarrow$ & \advirecord{h1b}{\rlap{hifi sound technician}}\advirecord{h2b}{violin player}
\adviplay{h1a}\adviplay{h1b}
\adviwait
\adviplay[white]{h1a}\adviplay[white]{h1b}
\adviplay{h2a}\adviplay{h2b}
\end{tabular}
\end{center}
\vfill
\end{slide}
\begin{slide}
\slidetitle{what does proof checking buy me as a mathematician?}
currently:
\begin{itemize}
\item[$\bullet$]
\textbf{nothing} \\
the gains are not worth the effort yet
\end{itemize}
\adviwait
in the (near? far?) future:
\begin{itemize}
\item[$\bullet$]
\textbf{correctness} \\
certainty that lemmas are correct \\
\adviwait
certainty that a paper is correct when submitted \\
(the referees won't need to judge correctness anymore,
but only originality and relevance)
\adviwait
\item[$\bullet$]
\textbf{clarity} \\
no need to ask the author of a text for clarification \\
everything is there\exclspace!
\end{itemize}
\vspace{-2em}
\vfill
\end{slide}
\begin{slide}
\slidetitle{philosophy of reliability I:
the de Bruijn principle}
worry about own mistakes $\;\to\;$ worry about bugs in the checker?
\adviwait
analogous to compiler bugs in programming: \\
software problems are hardly ever caused by compiler bugs
\medskip
\adviwait
\textbf{de Bruijn principle} \\
check mathematics using a \textbf{small} checker
\medskip
\adviwait
two approaches:
\begin{itemize}
\item[$\bullet$]
small `proof kernel' that everything has to go through \\
(many current systems)
\adviwait
\item[$\bullet$]
export in a format that can be checked by a small separate checker \\
example: the Ivy program for the Otter prover
\end{itemize}
\vfill
\end{slide}
\begin{slide}
\slidetitle{philosophy of reliability II:
are we doing what we think we are doing?}
proofs are checked, but definitions can be `wrong'
definitions often are adapted for formalization \\
how to know that they still define the intended notions?
\medskip
\adviwait
\textbf{example} \\
definition of a planar graph in the four color theorem formalization: \\
no mention of the topology of the plane\exclspace!
\medskip
\adviwait
Trybulec: \textcolor{slidegreen}{definitions are a debt, theorems pay them back} \\
trust comes from the theory that is proved about the definitions
\vfill
\end{slide}
\begin{slide}
\slidetitle{the state of the art: mathematics that already has been formalized}
examples of formalized theorems:
\begin{quote}
$\bullet$ fundamental theorem of calculus \\
$\bullet$ fundamental theorem of algebra \\
$\bullet$ Taylor's theorem \\
$\bullet$ Hahn-Banach theorem \\
$\bullet$ Urysohn's lemma \\
$\bullet$ Stone's theorem (paracompactness of metrizable spaces) \\
$\bullet$ Stone's theorem (representations of boolean algebras) \\
$\bullet$ G\"odel's first incompleteness theorem \\
$\bullet$ reducibility of the configurations for the four color theorem \\
$\bullet$ correctness of Buchberger's algorithm \\
$\bullet$ fundamental theorem of Galois theory
\end{quote}
\adviwait
full translation (half finished) of a book on continuous lattices
\vspace{-2em}
\vfill
\end{slide}
\begin{slide}
\slidetitle{how difficult is it?}
formalizing mathematics: trivial or undoable?
\medskip
\adviwait
some metrics: \\
de Bruijn factor = ratio between formalization and informal text
\begin{quote}
currently: \textbf{4 times as big}
\end{quote}
\medskip
\adviwait
time needed to formalize a page from a textbook
\begin{quote}
currently: \textbf{1 week}
\end{quote}
(estimate: `all undergraduate math' will take 140 man-year)
\vfill
\end{slide}
\begin{slide}
\slidetitle{automation $\;\leftrightarrow\;$ human control}
\hbox to 0pt{\hskip\hsize{\vbox to 0pt{\vskip-.27cm\hbox to 0pt{\hss\includegraphics[0,0][100,136]{iceberg.jpg}}\vss}}\hss}%
mathematical reasoning is like an iceberg
\vspace{.29cm}
\hspace{1.8cm} \phantom{un}conscious part of reasoning $\longrightarrow$
\vspace{.12cm}
\hspace{1.8cm} unconscious part of reasoning $\longrightarrow$
\vspace{.85cm}
\adviwait
\textcolor{slidered}{the story of the formalizations of the \\ fundamental theorem of algebra}
\medskip
\adviwait
too much automation \\
`lost in proof space':
user doesn't understand the proof anymore \\
$\to\;$ formalizing becomes much harder
\adviwait
automation should focus on the unconscious part of the reasoning \\
automation should \textbf{not} amaze the user
\vspace{-2em}
\vfill
\end{slide}
\begin{slide}
\slidetitle{can the computer prove things that human mathematicians cannot?}
EQP, 1996:
\begin{center}
\textcolor{slidegreen}{all Robbins algebras are Boolean}
\end{center}
\adviwait
the computer is:
\begin{itemize}
\item[$\bullet$]
strong in combinatorial search through many cases
\item[$\bullet$]
weak in goal oriented proof \\
surprisingly trivial steps can't be proved automatically yet
\end{itemize}
\medskip
\adviwait
Shankar: focus on decision procedures instead of proof search \\
(decision procedure $=$ algorithm to answer a specific class of questions)
\begin{itemize}
\item[$\bullet$]
general purpose proof search doesn't work well
\item[$\bullet$]
domain specific proof generation is very useful
\end{itemize}
\vspace{-2em}
\vfill
\end{slide}
\begin{slide}
\sectiontitle{three systems}
\slidetitle{\textbf{Coq}}
Huet \& Coquand, Paulin \\
INRIA, France \\
1984--today
implemented in the ocaml dialect of ML \\
advantages:
\begin{itemize}
\item[$\bullet$]
popular for mathematics
\item[$\bullet$]
powerful logic
\end{itemize}
\medskip
\adviwait
prehistoric precursor: Automath
\vfill
\end{slide}
\begin{slide}
\slidetitle{propositions as types, proofs as objects}
Coq's logic: type theory
\adviwait
types with objects $\;\leftrightarrow\;$ propositions with proofs \\
`Curry-Howard isomorphism'
proofs become first class objects \\
\adviwait
$\to\;$ proofs can be used as function arguments
\medskip
division modeled as a ternary function
$$\mbox{\it div\/}(x,y,\mbox{`proof that $y\ne 0$'})$$
\adviwait
with this kind of division it is impossible to write $1/0$ \\
(no `proof object' for the third argument)
\vfill
\end{slide}
%\begin{slide}
%\slidetitle{reflection}
%logic is the mathematics of reasoning \\
%$\to\;$ logic is mathematics too
%
%possible to formalize logic \textbf{inside} a formal system
%\medskip
%\adviwait
%
%useful `trick' to implement provers (decision procedures) for Coq \\
%possible to prove provers correct \\
%generated proofs don't need to be checked anymore
%\medskip
%\adviwait
%
%`the two level approach'
%\begin{itemize}
%\item[$\bullet$]
%expressions representing mathematical objects
%\item[$\bullet$]
%expressions representing terms representing mathematical objects
%\end{itemize}
%(possibility to distinguish between `$(x + y)^2$' and `$x^2 + 2xy + y^2$')
%\vfill
%\end{slide}
\begin{slide}
\slidetitle{\textbf{HOL Light}}
recent reimplementation of the HOL system
Gordon, Harrison \& Slind \\
Cambridge, UK \\
1985--1995--today
implemented in the ocaml dialect of ML \\
advantages:
\begin{itemize}
\item[$\bullet$]
simple and elegant
\item[$\bullet$]
strong automation
\end{itemize}
\medskip
\adviwait
prehistoric precursor: LCF
\vfill
\end{slide}
\begin{slide}
\slidetitle{the de Bruijn principle in action}
HOL Light proof kernel: \\
285 lines of ML code = 8 pages of source text \\
possible to really understand this
\medskip
\adviwait
\begin{quote}
\begin{verbatim}
type hol_type = Tyvar of string
| Tyapp of string * hol_type list;;
\end{verbatim}
\begin{verbatim}
type term = Var of string * hol_type
| Const of string * hol_type
| Comb of term * term
| Abs of term * term;;
\end{verbatim}
\begin{verbatim}
type thm = Sequent of (term list * term);;
\end{verbatim}
\end{quote}
\medskip
\adviwait
10 primitive proof rules + 3 axioms
\vfill
\end{slide}
\begin{slide}
\slidetitle{taking mathematical objects in your hands}
HOL proofs = programs in the ML programming language
variables hold `mathematical objects' and `proved theorems' \\
(really: variables hold \textbf{terms} describing mathematical objects)
\begin{quote}
\verb|#|\adviwait\textcolor{slidered}{\tt let s = `\char`{x | x * x = \&2\char`}`;;} \\
\verb/s : term = `{x | x * x = &2}`/ \\
\verb|#|\adviwait\textcolor{slidered}{\tt let t = prove(`?x. x * x = \&2`,} \\
\textcolor{slidered}{\tt\ \ EXISTS\char`_TAC `sqrt(\&2)` THEN REWRITE\char`_TAC} \\
\textcolor{slidered}{\tt\ \ [GSYM POW\char`_2; SQRT\char`_POW2] THEN ARITH\char`_TAC);;} \\
\verb/t : thm = |- ?x. x * x = &2/ \\
\verb|#|
\end{quote}
\adviwait
programming with mathematical objects instead of integers and reals
\vfill
\end{slide}
\begin{slide}
\slidetitle{\textbf{Mizar}}
Trybulec \& Bylinski \\
Bialystok, Poland \\
1973--1989--today
implemented in the Delphi dialect of Pascal \\
advantages:
\begin{itemize}
\item[$\bullet$]
mathematics oriented
\item[$\bullet$]
large library
\end{itemize}
\medskip
\adviwait
prehistoric precursor: Mizar
\vfill
\end{slide}
\begin{slide}
\slidetitle{readable proofs}
Mizar proofs can be read as text
\begin{quote}
\begin{verbatim}
per cases; suppose ex x st not P[x];
then consider a such that A1: not P[a];
take a; assume P[a]; hence thesis by A1;
suppose A2: for x holds P[x];
consider a; take a; thus thesis by A2;
\end{verbatim}
\end{quote}
\medskip
\adviwait
proofs in most other systems are unreadable `code'
\begin{quote}
\begin{verbatim}
ASM_CASES_TAC `?x:A. ~P x` THEN
RULE_ASSUM_TAC (REWRITE_RULE[NOT_EXISTS_THM]) THENL
[POP_ASSUM (X_CHOOSE_TAC `a:A`); ALL_TAC] THEN
EXISTS_TAC `a:A` THEN ASM_REWRITE_TAC[]
\end{verbatim}
\end{quote}
\vfill
\end{slide}
\begin{slide}
\slidetitle{taking ZFC seriously}
\rlap{Bourbaki:}\phantom{de Bruijn: }ZFC = foundations in theory \\
\phantom{de Bruijn: }ZFC = foundations in practice\advirecord{?}{\rlap{?}}\advirecord{!}{\exclspace!}\adviplay{?}
\medskip
de Bruijn: ZFC doesn't match mathematical practice \\
what is the meaning of the ${}\cap{}$ of a triangle and a number?
\medskip
\adviwait
\adviplay[white]{?}\adviplay{!}
Mizar shows: Bourbaki propaganda is true \\
\textbf{it is practical to formalize real mathematics on a ZFC foundation}
\adviwait
\medskip
\begin{quote}
\begin{tabular}{lcr}
Mizar axioms (ZFC + inaccessibles) &$\to$& 28 lines \\
Mizar library &$\to$& 1,400,000 lines
\end{tabular}
\end{quote}
\medskip
(everything in the Mizar library is fully proved from the axioms)
\vfill
\end{slide}
\begin{slide}
\sectiontitle{an example in Mizar}
\slidetitle{Pythagorean triples}
a solution of
$$a^2 + b^2 = c^2$$
with no common divisors always has the form
$$a = m^2 - n^2 \qquad b = 2mn \qquad c = m^2 + n^2\medskip$$
\adviwait
\textbf{examples}
$$\begin{array}{ccrcrcr}
m = 2 \qquad n = 1 & \quad\to\quad & 3^2 & + & 4^2 & = & 5^2 \\
m = 3 \qquad n = 2 & \to & 5^2 & + & 12^2 & = & 13^2 \\
m = 4 \qquad n = 1 & \to & 15^2 & + & 8^2 & = & 17^2 \\
m = 4 \qquad n = 3 & \to & 7^2 & + & 24^2 & = & 25^2
\end{array}$$
\vspace{-2em}
\vfill
\end{slide}
\begin{slide}
\slidetitle{formal proof sketch}
\begin{flushleft}
\verb|reserve a,b,c,m,n for Nat;|
\end{flushleft}
\begin{flushleft}
\verb|let a,b,c; assume a^2 + b^2 = c^2;|\\
\verb|assume a,b are_relative_prime;|\\
\adviwait
\verb|then a is odd or b is odd;|\adviwait\verb| assume a is odd;|
\adviwait
\end{flushleft}
\begin{flushleft}
\verb|ex m,n st a = m^2 - n^2 & b = 2*m*n & c = m^2 + n^2|\\
\verb|proof|\\
\adviwait
\verb| b is even; c is odd;|\\
\adviwait
\verb|X: (c + a)/2,(c - a)/2 are_relative_prime;|\\
\adviwait
\verb| ((c + a)/2)*((c - a)/2) = (c^2 - a^2)/4 .= (b/2)^2;|\\
\verb| then ((c + a)/2)*((c - a)/2) is square;|\\
\adviwait
\verb| then (c + a)/2 is square & (c - a)/2 is square by X;|\\
\verb| consider m,n such that m^2 = (c + a)/2 & n^2 = (c - a)/2;|
\verb| take m,n;|\\
\end{flushleft}
\vspace{-2em}
\vfill
\end{slide}
\begin{slide}
\slidetitle{formal proof sketch (continued)}
\begin{flushleft}
\begin{color}{slidegray}
\verb| consider m,n such that m^2 = (c + a)/2 & n^2 = (c - a)/2;|\\
\verb| take m,n;|\\
\end{color}
\verb| thus a = (c + a)/2 - (c - a)/2 .= m^2 - n^2;|\\
\verb| b^2 = (c + a)*(c - a) .= 4*m^2*n^2 .= (2*m*n)^2;|\\
\verb| hence b = 2*m*n;|\\
\verb| thus c = (c + a)/2 + (c - a)/2 .= m^2 + n^2;|\\
\verb|end;|
\end{flushleft}
\adviwait
%\medskip
syntactically correct Mizar \\
semantically correct Mizar \\
too high level: Mizar cannot check the correctness
\adviwait
\begin{itemize}
\item[$\bullet$]
steps are too big for Mizar
\item[$\bullet$]
links between steps are missing
\end{itemize}
\vspace{-2em}
\vfill
\end{slide}
\begin{slide}
\slidetitle{a fragment of the full proof}
\begin{flushleft}
\advirecord{x1}{\tt\ then}\\
\advirecord{x2}{\tt X: (c + a)/2,(c - a)/2 are\char`_relative\char`_prime}\advirecord{x3}{\tt\ by Lm3}\advirecord{x4}{;}\\
\advirecord{x5}{\tt\ ((c + a)/2)*((c - a)/2) =}\advirecord{x6}{\tt\ ((c + a)*(c - a))/(2*2)}\\
\advirecord{x7}{\ \ \ by }\advirecord{x7a}{REAL\char`_1:35}\\
\advirecord{x8}{\ \ .= }\advirecord{x9}{\tt (c\^{}2 - a\^{}2)/4}\advirecord{x10}{\tt\ by }\advirecord{x10a}{SQUARE\char`_1:67}\\
\advirecord{x11}{\tt\ \ .= (b\^{}2)/(2*2)}\advirecord{x12}{\tt\ by H1,}\advirecord{x12a}{INT\char`_1:3}\\
\advirecord{x13}{\tt\ \ .= (b\^{}2)/(2\^{}2)}\advirecord{x14}{\tt\ by }\advirecord{x14a}{SQUARE\char`_1:def 3}\\
\advirecord{x15}{\tt\ \ .= (b/2)\^{}2}\advirecord{x16}{\tt\ by }\advirecord{x16a}{SQUARE\char`_1:69}\advirecord{x17}{\tt;}\\
\advirecord{x18}{\tt\ then ((c + a)/2)*((c - a)/2) is square}\advirecord{x19}{\tt\ by A1,Def1}\advirecord{x20}{\tt ;}\\
\advirecord{x21}{\tt\ then (c + a)/2 is square \& (c - a)/2 is square by X}\advirecord{x22}{\tt ,Lm4}\advirecord{x23}{\tt ;}\\
\advirecord{x24}{\tt\ then (ex m st m\^{}2 = (c + a)/2) \&}\\
\advirecord{x25}{\tt\ \ (ex n st n\^{}2 = (c - a)/2)}\advirecord{x26}{\tt\ by Def1}\advirecord{x27}{\tt ;}\\
\advirecord{x28}{\tt\ then }\advirecord{x29}{\tt consider m,n such that}\\
\advirecord{x30}{\tt A9:}\advirecord{x31}{\tt\ m\^{}2 = (c + a)/2 \& n\^{}2 = (c - a)/2;}
\end{flushleft}
\adviplay{x2}
\adviplay{x4}
\adviplay{x5}
\adviplay{x9}
\adviplay{x15}
\adviplay{x17}
\adviplay{x18}
\adviplay{x20}
\adviplay{x21}
\adviplay{x23}
\adviplay{x29}
\adviplay{x31}
\adviwait
\adviplay[slidered]{x6}
\adviplay[slidered]{x8}
\adviplay[slidered]{x11}
\adviplay[slidered]{x13}
\adviplay[slidered]{x24}
\adviplay[slidered]{x25}
\adviplay[slidered]{x27}
\adviwait
\adviplay[slidered]{x1}
\adviplay[slidered]{x3}
\adviplay[slidered]{x7}
\adviplay[slidered]{x7a}
\adviplay[slidered]{x10}
\adviplay[slidered]{x10a}
\adviplay[slidered]{x12}
\adviplay[slidered]{x12a}
\adviplay[slidered]{x14}
\adviplay[slidered]{x14a}
\adviplay[slidered]{x16}
\adviplay[slidered]{x16a}
\adviplay[slidered]{x19}
\adviplay[slidered]{x22}
\adviplay[slidered]{x26}
\adviplay[slidered]{x28}
\adviplay[slidered]{x30}
\adviwait
\adviplay{x6}
\adviplay{x8}
\adviplay{x11}
\adviplay{x13}
\adviplay{x24}
\adviplay{x25}
\adviplay{x27}
\adviplay{x1}
\adviplay{x3}
\adviplay{x7}
\adviplay{x7a}
\adviplay{x10}
\adviplay{x10a}
\adviplay{x12}
\adviplay{x12a}
\adviplay{x14}
\adviplay{x14a}
\adviplay{x16}
\adviplay{x16a}
\adviplay{x19}
\adviplay{x22}
\adviplay{x26}
\adviplay{x28}
\adviplay{x30}
\adviwait
\adviplay[slidered]{x7a}
\adviplay[slidered]{x10a}
\adviplay[slidered]{x12a}
\adviplay[slidered]{x14a}
\adviplay[slidered]{x16a}
\vspace{-2em}
\vfill
\end{slide}
\begin{slide}
\slidetitle{formal mathematics can talk about `higher' objects}
claim: \textbf{any} mathematics can be formalized
not only about basic objects like numbers and numeric functions \\
objects can be abstract and `large'
\medskip
\adviwait
example: Yoneda lemma
\begin{quote}
\verb|definition let A be |\advirecord{y1}{\tt Category}\adviplay{y1}\verb|;|\\
\verb| func Yoneda(A) ->|\\
\verb| |\advirecord{y2}{\tt Contravariant\char`_Functor}\adviplay{y2}\verb| of A,Functors(A,EnsHom(A))|\\
\verb| means|\\
\verb| for f being Morphism of A holds|\\
\verb/ it.f = [[<|cod f,?>,<|dom f,?>],<|f,?>];/\\
\verb|end;|
\end{quote}
\medskip
\adviwait
\adviplay[slidered]{y1}\adviplay[slidered]{y2}
\adviwait
observation: abstract math is easier to formalize than basic math
\vspace{-2em}
\vfill
\end{slide}
\begin{slide}
\sectiontitle{conclusion}
\slidetitle{isn't this all just engineering?}
this talk: the user's point of view
\medskip
\adviwait
\textbf{research topics}
\begin{itemize}
\item[$\bullet$]
the theory of logical foundations
logics: paradoxes, consistency, conservativity \\
\adviwait
type systems: confluence, termination, subject reduction
\adviwait
\item[$\bullet$]
the theory of proof search
\adviwait
\item[$\bullet$]
the theory of decision procedures
interaction between decision procedures \\
\adviwait
moving the decision procedures \textbf{inside} the logic: reflection
\end{itemize}
\medskip
\adviwait
but: `just engineering' is also important to get a usable system
\vspace{-2em}
\vfill
\end{slide}
\begin{slide}
\slidetitle{it might not be for you yet, but it's serious\exclspace!}
\begin{itemize}
\item[$\bullet$]
not yet practical
\item[$\bullet$]
interesting developments
\item[$\bullet$]
it might change the (mathematical) world
\end{itemize}
\bigskip
\adviwait
\begin{itemize}
\item[$\bullet$]
ancient Greeks: invention of proof
\item[$\bullet$]
nineteenth century: invention of rigor
\item[$\bullet$]
\textbf{today?}
\end{itemize}
\vfill
\end{slide}
\end{document}
|
http://lupinia.us/personal/radio/deregulation.tex | lupinia.us | CC-MAIN-2020-34 | application/x-tex | text/x-matlab | crawl-data/CC-MAIN-2020-34/segments/1596439738380.22/warc/CC-MAIN-20200809013812-20200809043812-00273.warc.gz | 72,750,485 | 3,338 | % Django HTML to LaTeX conversion
% By Natasha L.
% www.lupinia.net | github.com/lupinia
\documentclass[11pt,letterpaper]{article}
\usepackage[letterpaper,top=0.5in, bottom=0.75in, left=0.5in, right=0.5in]{geometry}
\usepackage{tgpagella}
\usepackage[T1]{fontenc}
\usepackage[bookmarks=true,bookmarksnumbered=true,colorlinks=true,linkcolor=magenta,urlcolor=blue]{hyperref}
\parskip 3pt
\begin{document}
\title{\Huge Deregulation and Commercial Radio}
\author{By Natasha L. - \url{www.lupinia.net}}
\date{Posted: June 24, 2005}
\maketitle
In America, the commercial radio industry has undergone a major reformation in recent years. What was once a diverse mass communications medium with hundreds of small, locally-owned business is now almost exclusively controlled by just a few major corporations. Why the sudden change? The Telecommunications Act of 1996. This piece of legislation essentially removed government regulation from the equation, allowing a single company to own hundreds of radio stations across the nation, placing the interests of big business above the welfare of consumers.
When radio communications technology was first discovered, it became evident very quickly that a single regulatory body was needed to manage radio spectrum bandwidth nationwide. Early on, corporations wanted to control this increasingly important natural resource, but the government gave the scepter of regulatory power to a new agency of the bureaucracy, the Federal Communications Commission. Its mission was, and still is, to manage the spectrum of available radio frequencies, and to prevent overlaps from occurring.
Once founded, the FCC assigned blocks of frequencies for various uses, including commercial, amateur radio, government, and military. Licenses to use the commercial bands were then sold at auctions, and each license assigned the buyer a callsign for identification (four digits for commercial broadcast radio), a frequency range to operate in, an acceptable transmitter location, and a maximum power output. Using this information, a broadcast radio company could then set up shop in the location on the license they purchased, and start broadcasting to the general public.
The commercial spectrum users filled their allocated band space, and started lobbying hard to get more. The FCC recently decided to assign an unused block of government frequencies to the commercial users, and sold those licenses at a special auction that generated \$20 billion in revenue. However, the new buyers complained that due to the stringent regulations on their industry, they were having difficulty getting set up. So, the corporate lobbyists for media and communications industries drafted the TCA, and it was pushed through Congress and voted on before a single congressman had a chance to read the bill. President Clinton signed the bill into law in 1996, and with that simple flick of a pen, the consumer protection regulations that had been in place for decades were tossed out of existence.
After winning this keystone victory in Congress, the media companies started the time-tested method of buying their competitors rather than trying to compete with them. Soon, a company called Clear Channel had acquired over 1,200 radio stations nationwide, roughly 60\% of the US’s commercial broadcast radio market. Combined with the other three radio giants of the US, over 90\% of US broadcast radio is owned by major media corporations, effectively wiping out any local-level competition and creating a corporate monopoly on radio entertainment.
As proven by history, monopolies never work for the good of the consumer. And, true to form, this monopoly on content is not benefiting anyone except Clear Channel and its ilk. These companies choose the type of content to air based not on what their listeners want to hear, but instead, based solely on what they deem to be the most profitable. A perfect example of this is the radio station Y100 (WPLY), based in Philadelphia, PA. This popular station was known far beyond the Delaware Valley area for its charismatic DJs, impeccable playlist selections, and community outreach activities for over 12 years. Then, without warning, the parent company abruptly shut down the station in its current form, and replaced it with a rap/urban station. Their reasoning for this was greater profitability from their advertisers, and higher listener numbers based on the demographics of the area. There was no input from the listeners of the original 100.3MHz station, just a marketing analysis and some new contracts with advertisers. This is not the way this industry should be run.
The Telecommunications Act of 1996 has had far-reaching detrimental implications in the radio communications industry. What was once a diverse market dominated by scores of small businesses is now controlled by a small number of large corporations, and consumers are being deprived of choices in entertainment. Deregulation laws like the TCA serve no one except the corporations, and they consistently harm the consumers who are meant to be protected by organizations like the FCC. Laws like the TCA, and the monopolies created by deregulation, need to be shut down to prevent further harm to our nation’s communications media, and to protect a squandered natural resource such as the radio spectrum.
\begin{center}
\line(1,0){250}
\end{center}
\section*{About the Author, and Contact Information}
Natasha L. is a web application developer, and avid photographer and writer, living in the DC metro area. Visit \url{www.lupinia.net} to learn more. Contact information, including an email form and links to other websites, can be found at \url{www.lupinia.net/contact}.
\copyright 2005 by Natasha L., and is free for distribution, but may not be modified or used for monetary gain. Original version and further downloads available at \url{http://www.lupinia.net/personal/radio/deregulation.htm}
\end{document} |
https://melusine.eu.org/syracuse/B/BaseCollege/Quatrieme/pythagore/applications/exo64.tex?enregistrement=ok | eu.org | CC-MAIN-2022-33 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2022-33/segments/1659882572198.93/warc/CC-MAIN-20220815175725-20220815205725-00372.warc.gz | 360,851,576 | 972 | %@Dif:2
{\em L'unité de longueur est le centimètre.}
Soit $ABC$ un triangle rectangle en $B$ tel que $AB=6$ et $BC=8$.
\begin{myenumerate}
\item Quel est le nom de l'hypoténuse de ce triangle ?
\item Calcule la longueur $AC$ en détaillant la démarche.
\item Trace le triangle $ABC$.
\end{myenumerate}
%@Commentaire: Exercice détaillé d'application directe. \`A faire rapidement après la leçon. |
http://kleine.mat.uniroma3.it/e/04-150.latex.mime | uniroma3.it | CC-MAIN-2019-13 | application/x-latex | message/rfc822 | crawl-data/CC-MAIN-2019-13/segments/1552912201455.20/warc/CC-MAIN-20190318152343-20190318174343-00314.warc.gz | 121,449,347 | 45,318 | Content-Type: multipart/mixed; boundary="-------------0405122338440"
This is a multi-part message in MIME format.
---------------0405122338440
Content-Type: text/plain; name="04-150.comments"
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="04-150.comments"
38 pages
---------------0405122338440
Content-Type: text/plain; name="04-150.keywords"
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment; filename="04-150.keywords"
Superselection, Operator algebra, constraint, compact group action,
Hilbert system, quantum field theory, Doplicher-Roberts duality
---------------0405122338440
Content-Type: application/x-tex; name="baumg20.tex"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline; filename="baumg20.tex"
%
% LATEX - File `Superselection in the presence of Constraints'
%
%
%
\documentclass[11pt]{article}
\usepackage[english]{babel}
\usepackage{latexsym}
\sloppy
%\renewcommand{\baselinestretch}{1.5}
\addtolength\topmargin{-2cm}
\addtolength\textheight{5cm}
\mathsurround=3pt
\addtolength\oddsidemargin{-2cm}
\addtolength\evensidemargin{-2cm}
\addtolength\textwidth{3.5cm}
%\addtolength\topmargin{-2cm}
%\addtolength\textheight{5cm}
%\marginparwidth 4cm
%\marginparpush 6pt
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
% Special commands for this file %
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\makeatletter
\def\@begintheorem#1#2{\trivlist%
\item[\hskip \labelsep{\sffamily\bfseries #2\ #1}]\itshape}
\newtheorem{teo}{Theorem}[section]
\newtheorem{defi}[teo]{Definition}
\newtheorem{cor}[teo]{Corollary}
\newtheorem{lem}[teo]{Lemma}
\newtheorem{pro}[teo]{Proposition}
\newtheorem{_rem}[teo]{Remark}
\newtheorem{_eje}[teo]{Example}
\newtheorem{claim}[teo]{Claim}
\newenvironment{rem}{\def\@begintheorem##1##2{\trivlist%
\item[\hskip\labelsep{\sffamily\bfseries ##2\ ##1}]}\begin{_rem}}{\end{_rem}}
\newenvironment{eje}{\def\@begintheorem##1##2{\trivlist%
\item[\hskip\labelsep{\sffamily\bfseries ##2\ ##1}]}\begin{_eje}}{\end{_eje}}
\makeatother
\newenvironment{beweis}{{\em Proof:}}{\hfill $\rule{2mm}{2mm}$
\vspace{3mm}
}
\DeclareMathAlphabet{\Ma}{U}{msa}{m}{n}
\DeclareMathAlphabet{\Mb}{U}{msb}{m}{n}
\DeclareMathAlphabet{\Meuf}{U}{euf}{m}{n}
\def\z#1{\Mb{#1}}
\def\got#1{\Meuf{#1}}
\DeclareSymbolFont{ASMa}{U}{msa}{m}{n}
\DeclareSymbolFont{ASMb}{U}{msb}{m}{n}
\DeclareMathSymbol{\hrist}{\mathord}{ASMa}{"16}
\DeclareMathSymbol{\varkappa}{\mathalpha}{ASMb}{"7B}
\DeclareMathSymbol{\CrPr}{\mathord}{ASMb}{"6F}
\newfont{\EinsFont}{cmr7 scaled 1070}
\def\EINS{{\mathchoice{% -> displaystyle
\mbox{\unitlength1cm\begin{picture}(.25,.2)\put(0,0){$1$}%
\put(0.105,0){{\mbox{\fontfamily{cmr}\upshape\small l}}}\end{picture}}}{%
% -> textstyle
\mbox{\unitlength1cm\begin{picture}(.25,.2)\put(0,0){$1$}%
\put(0.105,0){{\mbox{\fontfamily{cmr}\upshape\small l}}}\end{picture}}}{%
%-> scriptstyle
\mbox{\unitlength1cm\begin{picture}(.18,.15)\put(0,0){$\scriptstyle 1$}%
\put(0.07,0){{\mbox{\fontfamily{cmr}\upshape\EinsFont l}}}\end{picture}}}{%
%-> scriptscriptstyle
\mbox{\unitlength1cm\begin{picture}(.18,.15)\put(0,0){$\scriptstyle 1$}%
\put(0.07,0){{\mbox{\fontfamily{cmr}\upshape\EinsFont l}}}\end{picture}}}}}
\def\restriction{{\mathchoice{%diplaystyle
\mbox{\unitlength1cm\begin{picture}(.2,.4)%
\bezier{5}(.07,.3)(.1,.27)(.13,.24)%
\put(.07,.35){\line(0,-1){.5}}\end{picture}}}{%textstyle
\mbox{\unitlength1cm\begin{picture}(.2,.4)%
\bezier{5}(.07,.3)(.1,.27)(.13,.24)%
\put(.07,.35){\line(0,-1){.5}}\end{picture}}}{%scriptstyle
\hrist}{\hrist}}}
% \def\al #1.{\boldsymbol{\mathcal #1}}
\def\al #1.{{\mathcal{#1}}}
\def\ot #1.{{\got{#1}}}
% \def\CCR{\overline{\Delta({\got X},\,\sigma)}}
\def\CCR{\overline{\Delta({\got X},\,B)}}
\def\CCRy{\overline{\Delta({\got Y},\,B)}}
\def\ccr #1,#2.{\overline{\Delta(#1,\,#2)}}
\def\frak{\got}
\def\wp{\got S}
\def\b #1.{{\bf #1}}
\def\cross#1.{\mathrel{\mathop{\times}\limits_{#1}}}
\def\B{\Theta} % The revolutionary Theta notation.
\def\C{\Mb{C}}
\def\N{\Mb{N}}
\def\P{\Mb{P}}
\def\R{\Mb{R}}
\def\Z{\Mb{Z}}
\def\T{\Mb{T}}
\def\ff{\widehat{f}}
\def\fh{\widehat{h}}
\def\fk{\widehat{k}}
\def\ww{\widehat{\omega}}
\def\wh{\widehat}
\def\wt{\widetilde}
\def\ilim{\mathop{{\rm lim}}\limits_{\longrightarrow}}
\def\cross #1.{\mathrel{\raise 3pt\hbox{$\mathop\times\limits_{#1}$}}}
\def\set #1,#2.{\left\{\,#1\;\bigm|\;#2\,\right\}}
\def\b #1.{{\bf #1}}
\def\ker{{\rm Ker}\,}
\def\aut{{\rm Aut}\,}
\def\out{{\rm Out}\,}
\def\ob{{\rm Ob}\,}
\def\endo{{\rm End}\,}
\def\spec{{\rm spec}\;}
\def\mor{{\rm Mor}\,}
\def\Ad{{\rm Ad}\,}
\def\ad{{\rm ad}\,}
\def\tr{{\rm Tr}\,}
\def\autx{{\rm Aut}_\xi}
\def\ol #1.{\overline{#1}}
\def\rn#1.{\romannumeral{#1}}
\def\chop{\hfill\break}
\def\rest{\restriction}
\def\un{\EINS}
\def\spa{{\rm span}}
\def\csp{\hbox{\rm clo-span}}
\def\clo{{\rm clo}}
\def\s #1.{_{\smash{\lower2pt\hbox{\mathsurround=0pt $\scriptstyle #1$}}\mathsurround=3pt}}
\def\bra #1,#2.{{\left\langle #1,\,#2\right\rangle_{\al A.}}}
\def\XC{\marginpar{$\longleftarrow$~{\footnotesize\bf Change}}}
\def\XP#1!{\renewcommand{\baselinestretch}{.7}\marginpar{{\footnotesize #1}\hfil}
\renewcommand{\baselinestretch}{1.5}}
\def\XB{\marginpar{
{\footnotesize\bf Change~starts-----}\lower 11pt\hbox{\mathsurround=0pt$
\!\!\displaystyle{
\Bigg\downarrow}$\mathsurround=3pt}}}
\def\XE{\marginpar{{\footnotesize\bf Change~ends-----}\raise 10pt\hbox{\mathsurround=0pt$
\!\!\displaystyle{
\Bigg\downarrow}$\mathsurround=3pt}}}
\def\HS{{\{\al F.,\,\al G.\}}}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
% End of the special commands %
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\title{\bf Superselection in the presence of constraints.}
\author{
{\sc Hellmut Baumgaertel} \\
{\footnotesize
Mathematical Institute, University of Potsdam,} \\
{\footnotesize
Am Neuen Palais 10, Postfach 601~553,} \\
{\footnotesize
D--14415 Potsdam, Germany.} \\
{\footnotesize
E-mail: [email protected]} \\
{\footnotesize FAX: +49-331-977-1299} \\[1mm]
\and
{\sc Hendrik Grundling} \\[1mm]
{\footnotesize Department of Mathematics,} \\
{\footnotesize University of New South Wales,} \\
{\footnotesize Sydney, NSW 2052, Australia.} \\
{\footnotesize [email protected]} \\
{\footnotesize FAX: +61-2-93857123}}
\date{RUNNING TITLE: Superselection and Constraints.}
\begin{document}
\maketitle
\begin{abstract}
For systems which contain both
superselection structure and constraints, we study compatibility
between constraining and superselection. Specifically, we start with a
generalisation of Doplicher-Roberts superselection theory
to the case of nontrivial centre, and a set of Dirac quantum constraints
and find conditions under which the superselection structures will
survive constraining in some form. This involves an analysis
of the restriction and factorisation of superselection structures.
We develop an example for this theory, modelled on interacting QED.
\end{abstract}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\section{Introduction}
In heuristic quantum field theory, there are many examples of systems
which contain global charges (hence superselection structure) as well
as a local gauge symmetry (hence constraints). Most of these systems cannot
currently be written in a consistent mathematical framework, due to
the presence of interactions. Nevertheless, the mathematical structure
of superselection by itself has been properly developed
(cf.~\cite{DR, Bg, BW}),
as well as the
mathematical structure of quantum constraints \cite{Grundling85, Lledo,
lands}, hence one can at
least abstractly consider systems which contain both.
This will be the focus of our investigations in this paper.
We will address the natural intertwining questions for the
two structures, as well as compatibility issues.
There is a choice in how the problem of superselection with
constraints is posed mathematically. We will be guided by the most
important physics example in this class, which is that of
a quantized local gauge field, acting on a fermion field.
It has a Gauss law constraint
(implementing the local gauge transformations) as well as
a set of global charges (leading to superselection).
The architecture of the paper is as follows, in Sect.~2 we give a
brief summary of the superselection theory which we intend to use here.
We include recent results concerning the case of an observable algebra
with nontrivial centre (cf.~\cite{BL}), and some new results on
the field algebra.
In Sect.~3 we give a summary of quantum constraints, and
in Sect.~4 we collect our main results. The proofs for these
are in Sect.~6, and in Sect.~5 we present an example.
\section{Fundamentals of superselection}
In this section we summarize the structures from superselection
theory which we need. For proofs, we refer to the literature
if possible.
The superselection problem in algebraic quantum field theory,
as stated by the
Doplicher--Haag--Roberts~(DHR) selection criterion,
led to a profound body of work, culminating in
the general Doplicher--Roberts~(DR) duality theory for compact groups.
The DHR criterion selects a distinguished class of ``admissible''
representations of a quasilocal algebra $\al A.$ of observables,
where the centre
is trivial, i.e.
$Z(\al A.)=\C\un,$
or even
$\al A.$
is assumed to be simple.
This
corresponds to the selection of a DR--category
$\al T.$
of ``admissible'' endomorphisms
of $\al A.\,.$
Furthermore, from this endomorphism category
$\al T.$
the
DR--analysis constructs a C*--algebra $\al F.\supset\al A.$
together with a compact group action
$\alpha:\al G.\ni g\to\alpha_{g}\in\aut\al F.$
such that
\begin{itemize}
\item{}
$\al A.$ is the fixed point algebra of this action,
\item{}
$\al T.$ coincides with the category of all ``canonical
endomorphisms" of $\al A.$ (cf. Subsection~\ref{CanEnd}).
\end{itemize}
$\al F.$
is called a Hilbert extension of $\al A.$ in \cite{BW}.
Physically, $\al F.$ is identified as a field algebra and
$\al G.$ with a global gauge group of the system.
$\{\al F.,\alpha_{\al G.}\}$
is uniquely determined by
$\al T.$
up to
$\al A.$-module isomorphisms. Conversely,
$\{\al F.,\alpha_{\al G.}\}$
determines uniquely its category of all canonical endomorphisms.
Therefore one can state the equivalence of the ``selection
principle", given by
$\al T.$
and the ``symmetry principle", given by
$\al G.\,$. This duality is one of the crucial theorems of the
Doplicher-Roberts theory.
In contrast to the original theory of Doplicher and Roberts, we allow
here a nontrivial centre for $\al A..$ The reason for this is that when there
are constraints present, the system contains nonphysical information, so
there is no physical reason why $\al A.$ should be simple.
Only after eliminating the constraints should one require the
final observable algebra to be simple, hence having trivial centre.
Now a duality theorem for a C*--algebra with nontrivial centre has been
proven recently~\cite{BL, B2}, establishing a bijection between
distinguished
categories
of endomorphisms of
$\al A.$
and Hilbert extensions of $\al A.$ satisfying some additional conditions,
of which the most important
is: ${\al A.'\cap\al F.=Z(\al A.)}$
(i.e. the relative commutant is assumed to be minimal).
This will be properly explained below. This condition has already been
used by Mack and Schomerus~\cite{MS} as a ``new principle".
\subsection{Basic properties of Hilbert systems}
Below $\al F.$ will always denote a unital C*--algebra.
A Hilbert space $\al H.\subset
\al F.$ is called {\bf algebraic} if the scalar product $\langle\cdot,\cdot
\rangle$ of $\al H.$ is given by
$\langle A,B\rangle\un := A^{\ast}B$ for $A,\; B\in\al H.\,.$ Henceforth
we consider only finite-dimensional algebraic Hilbert spaces. The
support
$\hbox{supp}\,\al H.$
of $\al H.$ is defined by
$\hbox{supp}\,\al H.:=\sum_{j=1}^{d}\Phi_j\Phi_{j}^{\ast}$
where $\{\Phi_j\,\big|\,
j=1,\ldots,\,d\}$ is any orthonormal basis of $\al H..$
{\it Unless otherwise specified, we assume below that
each algebraic Hilbert space $\al H.$ considered,
satisfies ${\rm supp}\,\al H.
=\un.$}
We also fix a compact
C*-dynamical system
$\{\al F.,\al G.,\alpha\}$,
i.e.
$\al G.$
is a compact group and
$\alpha:\al G.\ni g\to\alpha_{g}\in\aut\al F.$
is a pointwise norm-continuous morphism.
For $\gamma\in\wh{\al G.}$
(the dual of $\al G.$) its {\bf spectral projection}
$\Pi_{\gamma}\in\al L.(\al F.)$
is defined by
\begin{eqnarray*}
\Pi_\gamma(F)&:=&\int_{\al G.}\ol\chi_\gamma(g).\,\alpha_{g}(F)\,dg
\quad\hbox{for all}\quad F\in\al F., \\[1mm]
\hbox{where:}\quad\qquad
\chi_\gamma(g)&:=&\dim\gamma\cdot\tr\pi(g),\quad\pi\in\gamma\,
\end{eqnarray*}
and its {\bf spectral subspace} $\Pi_\gamma\al F.$ satisfies
$\Pi_\gamma\al F.=\csp\{\al L.\subset\al F.\}$ where $\al L.$
runs through all invariant subspaces of $\al F.$
which transform under $\alpha\s{\al G.}.$ according to $\gamma$
(cf.~\cite{ES}).
Define the {\bf spectrum} of
$\alpha_{\al G.}$ by
\[
\spec\alpha_{\al G.}:=\set \gamma\in\wh{\al G.}, \Pi_\gamma\not=0.
\]
Our central object of study is:
\begin{defi}
The C*-dynamical system
$\{\al F.,\al G.,\alpha\}$
is called a {\bf Hilbert system} if
for each $\gamma\in\wh{\al G.}$
there is an algebraic Hilbert space
$\al H._\gamma\subset\al F.,$
such that
$\alpha_{\al G.}$
acts invariantly on
$\al H._\gamma,$
and the unitary representation
$\al G.\rest\al H._\gamma$
is in the equivalence class
$\gamma\in\wh{\al G.}$.
\end{defi}
\begin{rem}
Note that for a Hilbert system $\{\al F.,\al G.,\alpha\}$
we have necessarily that the algebraic Hilbert spaces
satisfy $\al H._\gamma\subset\Pi_\gamma\al F.$ for all $\gamma,$
and hence that $\spec\alpha\s{\al G.}.=\wh{\al G.}$ i.e.
the spectrum is {\it full}.
The morphism
$\alpha:\al G.\to \hbox{Aut}\,\al F.$
is necessarily faithful. So, since
$\al G.$
is compact and
$\hbox{Aut}\,\al F.$
is Hausdorff w.r.t. the topology of pointwise norm-convergence,
$\alpha$
is a homeomorphism of
$\al G.$
onto its image. Thus
$\al G.$
and
$\alpha_{\al G.}$
are isomorphic as topological groups.
\end{rem}
We are mainly interested in Hilbert systems whose fixed point
algebras coincide such that they appear as extensions of it.
\begin{defi}
A Hilbert system
$\{\al F.,\al G.,\alpha\}$
is called a {\bf Hilbert
extension} of a C*--algebra $\al A.\subset\al F.$ if $\al A.$ is the
fixed point algebra of ${\al G.}.$
Two Hilbert extensions
$\{\al F._i,\,\al G.\,,\alpha^{i}\},\;i=1,\,2$
of $\al A.$
(w.r.t. the same group $\al G.$)
are called
$\al A.\hbox{\bf--module isomorphic}$
if there is an isomorphism
$\tau:\al F._1\to\al F._2$
such that
$\tau(A)=A$
for
$A\in\al A.,$
and
$\tau$
intertwines the group actions, i.e.
$\tau\circ\alpha^{1}_g=\alpha^{2}_g\circ\tau.$
\end{defi}
\begin{rem}
\begin{itemize}
\item[(i)]
Group automorphisms of
$\al G.$
lead to $\al A.$-module isomorphic Hilbert extensions of
$\al A.$,
i.e. if
$\{\al F.,\al G.,\alpha\}$
is a Hilbert extension of
$\al A.$
and
$\xi$
an automorphism of
$\al G.$,
then the Hilbert extensions
$\{\al F.,\al G.,\alpha\}$
and
$\{\al F.,\al G.,\alpha\circ\xi\}$
are $\al A.$-module isomorphic.
So the Hilbert system
$\{\al F.,\al G.,\alpha\}$
depends, up to $\al A.$-module isomorphisms, only on
$\alpha_{\al G.}$,
which is isomorphic to
$\al G.$.
In other words, up to $\al A.$-module isomorphism we may identify
$\al G.$
and
$\alpha_{\al G.}\subset\aut\al F.$
neglecting the action
$\alpha$
which has no relevance from this point of view. Therefore in the
following, unless it is otherwise specified, we use the notation
$\{\al F.,\al G.\}$
for a Hilbert extension of
$\al A.$,
where
$\al G.\subset\aut\al F.$.
\item[(ii)]
As mentioned above, examples of
Hilbert systems arise in DHR--superselection theory
cf.~\cite{BW, Bg}.
There are also constructions by means of
tensor products
of Cuntz algebras
(cf.~\cite{DR2}). In these examples the
relative commutant
of the fixed point algebra
$\al A.$,
hence also its center,
is trivial. Another
construction for
$\al G.=\T$,
by means of the loop group
$C^{\infty}(S^{1},\,\T)$
is in \cite{BC}, and for this
$Z(\al A.)$
is nontrivial.
\end{itemize}
\end{rem}
\begin{rem}
\label{remark1}
A Hilbert system $\{\al F.,\,\al G.\}$ is a highly structured object;-
we list some important facts and properties (for details, consult
~\cite{Bg,BW}):
\begin{itemize}
\item[(i)]
The spectral projections
satisfy:
\begin{eqnarray*}
\Pi_{\gamma_1}\Pi_{\gamma_2} &=&
\Pi_{\gamma_2}\Pi_{\gamma_1}=\delta\s\gamma_1\gamma_2.\Pi_{\gamma_1} \\[1mm]
\|\Pi_\gamma\| &\leq& d(\gamma)^{3/2}\;,
\qquad d(\gamma):=\dim(\al H._\gamma)\;, \\[1mm]
\Pi_\gamma\al F. &=& \spa(\al AH._\gamma)\;, % \\[1mm]
\quad \Pi_{\iota}\al F.=\al A.\;,
\end{eqnarray*}
where
$\iota\in\wh{\al G.}$
denotes the trivial representation of $\al G..$
\item[(ii)]
Each $F\in\al F.$ is uniquely determined by its projections
$\Pi_\gamma F,$ $\gamma\in\wh{\al G.},$ i.e. $F=0$
iff $\Pi_\gamma F =0$ for all $\gamma\in\wh{\al G.},$
cf.~Corollary~2.6 of \cite {B2}.
\item[(iii)]
A useful
*-subalgebra of
$\al F.$ is
\[
\al F._{\rm fin}:= \set F\in\al F.,\Pi_\gamma F\not=0\quad\hbox{for
only finitely many $\gamma\in\wh{\al G.}$}.
\]
which is dense in $\al F.$ w.r.t. the C*--norm (cf.~\cite{S}).
\item[(iv)]
In $\al F.$ there is an $\al A.\hbox{--scalar product}$ given by
${\langle F,\, G\rangle_{\al A.}:=\Pi_\iota FG^*},$ w.r.t. which
the spectral projections are symmetric, i.e.
$\bra\Pi_\gamma F,G.=\bra F,\Pi_\gamma G.$
for all $F,\; G\in\al F.,$ $\gamma\in\wh{\al G.}$.
Using the $\al A.$-scalar product one can define a norm on
$\al F.,$
called the $\al A.\hbox{-norm}$
\[
\vert F\vert_{\al A.}:=\Vert\langle F,F\rangle\s{\al A.}.\Vert^{1/2},\quad
F\in \al F..
\]
Note that
$\vert F\vert_{\al A.}\leq \Vert F\Vert$
and that
$\al F.$
in general is not closed w.r.t. the $\al A.$-norm.
Then
for each $F\in\al F.$ we have that
$F=\sum_{\gamma\in\wh{\al G.}}\Pi_\gamma F$
where the sum on the right hand side is convergent w.r.t. the
$\al A.\hbox{--norm}$ but not necessarily w.r.t. the C*--norm $\|\cdot\|\,.$
We also have Parseval's equation:
$\langle F,F\rangle_{\al A.}
=\sum_{\gamma\in\wh{\al G.}}\langle\Pi_\gamma F,\Pi_\gamma F\rangle_{\al A.}
\;,$ cf. Proposition~2.5 in \cite{B2}.
Moreover
$\big|\Pi_\gamma\big|_{\al A.}=1$
for all $\gamma\in\wh{\al G.}$,
where $\vert\cdot\vert_{\al A.}$
denotes the operator norm of $\Pi_\gamma$ w.r.t. the norm
$\vert\cdot\vert_{\al A.}$ in $\al F.$.
\item[(v)]
Generally for a Hilbert system, the assignment $\gamma\to\al H._\gamma$
is not unique.
If
$U\in \al A.$
is unitary then also
$U\al H._\gamma\subset\Pi_{\gamma}\al F.$
is an $\al G.$-invariant algebraic Hilbert space carrying the representation
$\gamma\in\wh{\al G.}.$ Each
$\al G.$-invariant algebraic
Hilbert space
$\al K.$
which carries the representation
$\gamma\,$
is of this form, i.e. there is a unitary
$V\in\al A.$
such that
$\al K.=V\al H._{\gamma}.$
For a general $\al G.\hbox{--invariant}$
algebraic Hilbert space $\al H.\subset\al F.,$
we may have that $\al G.\rest\al H.$ is not irreducible,
i.e. it need not be of the form $\al K.=V\al H._{\gamma}.$
Below we will consider further conditions on the Hilbert system
to control the structure of these.
\item[(vi)]
Given two $\al G.\hbox{--invariant}$
algebraic Hilbert spaces
$\al H.,\al K.\subset\al F.,$
then
$\spa(\al H.\cdot\al K.)$
is also a $\al G.\hbox{--invariant}$
algebraic Hilbert space
which we will
briefly denote by $\al H.\cdot\al K..$
It is a realization of the tensor product
$\al H.\otimes\al K.$
within
$\al F.$
and
carries the tensor product of the representations of $\al G.$
carried by $\al H.$ and $\al K.$ in the obvious way.
\item[(vii)]
Let
$\al H.,\al K.$ be two $\al G.\hbox{--invariant}$
algebraic Hilbert spaces,
but not necessarily of support 1. Then there
is a natural isometric embedding
$\al J.:\al L.(\al H.,\al K.)\to\al F.$
given by
\[
\al J.(T):=\sum_{j,k}
t_{j,k}\Psi_{j}\Phi^{\ast}_{k},\quad t_{j,k}\in \C,
\quad T\in\al L.(\al H.,\al K.)
\]
where
$\{\Phi_{k}\}_{k},\{\Psi_{j}\}_{j}$
are orthonormal bases of
$\al H.$ and $\al K.$ respectively, and where
\[
T(\Phi_{k})=\sum_{j}t_{j,k}\Psi_{j},
\]
i.e.
$(t_{j,k})$
is the matrix of $T$ w.r.t. these orthonormal bases. One has
\[
T(\Phi)=\al J.(T)\cdot\Phi,\quad \Phi\in\al H..
\]
This implies: if
$T_{j}\in\al L.(\al H._{j},\al K._{j}),j=1,2,$
hence
$T_{1}\otimes T_{2}\in\al L.(\al H._{1}\al H._{2},\al K._{1}\al K._{2}),$
then
${\al J.(T_{1}\otimes T_{2})\Phi_{1}\Phi_{2}}=\al J.(T_{1})\Phi_{1}\al J.(T_{2})\Phi_{2}$
for
$\Phi_{j}\in\al H._{j}$.
Moreover
$\al J.(T)\in\al A.$
iff
$T\in\al L._{\al G.}(\al H.,\al K.),$
where
$\al L._{\al G.}(\al H.,\al K.)$
denotes the linear subspace of
$\al L.(\al H.,\al K.)$
consisting of all intertwining operators of the representations
of
$\al G.$
on
$\al H.$ and $\al K.$ (cf. p. 222 ~\cite{BW}).
\end{itemize}
\end{rem}
\subsection{The category of $\al G.$-invariant algebraic
Hilbert spaces}
The $\al G.$-invariant algebraic Hilbert spaces
$\al H.$
of
$\{\al F.,\al G.\}$
form the objects of a category
$\al T._{\al G.}$
associated to
$\{\al F.,\al G.\}$
whose arrows are given by the elements of
$(\al H.,\,\al K.):=\al J.(\al L._{\al G.}(\al H.,\al K.))\subset\al A.$.
It is already large enough to carry all tensor products of the representations of
$\al G.$ on its objects by Remark~\ref{remark1}(vi)
(though not necessarily subrepresentations and direct sums).
First, let us state
some
of its rich structure (cf.~\cite{BW,DR2}):
\begin{pro}
\label{perm&conj}
For $\{\al F.,\al G.\}$ the category $\al T._{\al G.}$
is a {\bf tensor C*-category}, i.e. the arrow spaces $(\al H.,\,\al K.)$
are Banach spaces such that \chop
$\bullet$ w.r.t. composition of arrows $R,\, S$ we have
$\|R\circ S\|\leq\|R\|\|S\|,$\chop
$\bullet$ there is an antilinear involutive contravariant functor
$*:\al T._{\al G.}\to\al T._{\al G.}$ such that
$\|R^*\circ R\|=\|R\|^2$ for all arrows $R$ with the same range and domain
(here the functor $*$ is given by the involution in $\al F.)$\chop
$\bullet$ There is an associative product $\cdot$ on $\ob\al T._{\al G.}$
and an identity object $1\in\ob\al T._{\al G.}$ (i.e. $1\cdot\al H.=\al H.
=\al H.\cdot 1)$ and there is an associative bilinear product $\times$
of the arrows, such that if $R\in(\al H.,\al K.)$ and
$R'\in(\al H.',\al K.')$ then $R\times R'\in(\al H.\cdot\al H.',\,
\al K.\cdot\al K.').$ Moreover we require that for $R,\;R'$ as above:
\begin{equation}
1_\iota\times R=R\times 1_\iota=R\;,\quad (R\times R')^*=R^*\times R'^*\,,
\end{equation}
where $1_\iota\in(1,1)$ is the identity arrow, as well as the interchange law
\[
(S\circ R)\times (S'\circ R')=(S\times S')\circ (R\times R')\,,
\]
whenever the left hand side is defined.\chop
Here in $\al T._{\al G.},$ the product $\cdot$ is given by the product
of $\al F.,$
the identity object is
$1:=\C\un$ and the product
$\times$ is defined by
\[
R\times R':= \al J.(T\otimes T'),
\]
for
$R=\al J.(T),\,R'=\al J.(T'),$ where $T\in\al L._{\al G.}(\al H.,\al K.),\,
T'\in\al L._{\al G.}(\al H.',\al K.').$
Note that
$(1,1)=(\C\un,\C\un)=\C\un$,
i.e.
$1_{\iota}=\un.$
\end{pro}
$\al T._{\al G.}$ has additional important structures
(permutation and conjugation), which we will consider below in
Subsection~\ref{PermConj}.
We need to examine conditions to require of $\{\al F.,\,
\al G.\}$ to ensure that $\al T._{\al G.}$
carries subrepresentations and direct sums.
\begin{defi}
Let $\al H.,\,\al K.\in\ob\al T._{\al G.},$ and define
$\al H.<\al K.$
to mean that there is an orthoprojection
$E$
on
$\al K.$
such that
$E\al K.$
is invariant w.r.t.
$\al G.$
and the representation
$\al G.\rest\al H.$
is unitarily equivalent to
$\al G.\rest E\al K..$
Call $\al H.$ a {\bf subobject} of $\al K.\,.$
\end{defi}
It is easy to see that $<$ is a partial order.
Note that
$\al H.<\al K.$
iff there is an isometry
$V\in\al L._{\al G.}(\al H.,\al K.)$
such that
$VV^{\ast}=:E$
is a projection of
$\al K.$,
i.e.
$V\al H.=E\al K..$
Then
$\al J.(V)\in\al A.$
and
$E\al K.=\al J.(V)\cdot\al H..$
If
$E\in\al L._{\al G.}(\al K.)$
is an orthoprojection
$0<E<\un,$
i.e.
$E$
is a reducing projection for the representation of
$\al G.$
on
$\al K.$,
then the question arises whether there is an object
$\al H.$
such that the representations on
$\al H.$
and
$E\al K.$
are unitarily equivalent. This suggests the concept of {\it
closedness} of
$\al T._{\al G.}$
w.r.t. subobjects.
\begin{defi}
The category
$\al T._{\al G.}$
is {\bf closed w.r.t. subobjects} if to each
$\al K.\in\hbox{Ob}\,\al T._{\al G.}$
and to each nontrivial orthoprojection
$E\in\al L._{\al G.}(\al K.)$
there is an isometry
$\wh{V}\in\al A.$
with
$\wh{V}\wh{V}^{\ast}=\al J.(E).$
In this case
$\al H.:=\wh{V}^{\ast}\cdot\al K.$
is a subobject
$\al H.<\al K.$
assigned to
$E$,
where
$\wh{V}=\al J.(V)$ for some isometry $V\in\al L._{\al G.}(\al H.,\al K.)$
with $VV^*=E.$
\end{defi}
Next, we consider when an object of $\al T._{\al G.}$ carries
the direct sum of the representations of two other objects.
If
$V,W\in\al A.$
are isometries with
$VV^{\ast}+WW^{\ast}=\un$
and
$\al H.,\al K.\in\hbox{Ob}\,\al T._{\al G.}$
then
we call the algebraic Hilbert space
$V\al H.+W\al K.$
of support 1 a {\bf direct sum} of
$\al H.$ and $\al K.$.
It is $\al G.$-invariant and carries the direct sum of the
representations on
$\al H.$ and $\al K.$
but in general depends on the choice of isometries $V,\;W.$
We define
\begin{defi}
\begin{itemize}
\item[(i)]
The category
$\al T._{\al G.}$
is {\bf closed w.r.t. direct sums} if to each
$\al H._{1},\al H._{2}\in\ob\,\al T._{\al G.}$
there is an object
$\al K.\in\ob\,\al T._{\al G.}$
and there are isometries
$V_{1},V_{2}\in\al A.$
with
$V_{1}V_{1}^{\ast}+V_{2}V_{2}^{\ast}=\un$
such that
$\al K.=V_{1}\al H._{1}+V_{2}\al H._{2}$
(then
$V_{1}\in(\al H._{1},\al K.)$
and
$V_{2}\in(\al H._{2},\al K.)$
follow).
\item[(ii)]
A C*-algebra
$\al A.$
satisfies {\bf Property B} if there are isometries
$V_{1},V_{2}\in\al A.$
such that
$V_{1}V_{1}^{\ast}+V_{2}V_{2}^{\ast}=\un.$
A Hilbert system
$\{\al F.,\al G.\}$
is said to satisfy {\bf Property B} if its fixed point algebra
$\al A.:=\Pi_{\iota}\al F.$
satisfies Property B.
\end{itemize}
\end{defi}
\begin{rem}
For a Hilbert system
$\{\al F.,\al G.\}$ we have:
\begin{itemize}
\item[(i)] It
satisfies Property B iff
$\al T._{\al G.}$
is closed w.r.t. direct sums.
\item[(ii)]
For nonabelian
$\al G.,$
the category $\al T._{\al G.}$ is closed w.r.t. subobjects iff
it is closed w.r.t. direct sums iff it has Property B
cf.~Prop.~3.5 of~\cite{B2}.
\item[(iii)]
In the case that
$\al G.$
is abelian, the theory simplifies.
This is because we already have Pontryagin's duality theorem,
hence it is not necessary to consider closure under
subobjects and direct sums to obtain a duality theory.
\end{itemize}
\end{rem}
\subsection{The category of canonical endomorphisms}
\label{CanEnd}
The main aim of DR--theory is to obtain an intrinsic structure on $\al A.$
from which we can reconstruct the Hilbert system $\HS$ in an essentially unique
way. Here we want to transport the rich structure of $\al T._{\al G.}$ to $\al A.\,.$
\begin{defi}
To each $\al G.\hbox{--invariant}$ algebraic Hilbert space $\al H.\subset
\al F.$
there is assigned a corresponding
{\bf inner endomorphism} $\rho\s{\al H.}.\in\endo\al F.$ given by
\[
\rho\s{\al H.}.(F):=\sum_{j=1}^{d(\al H.)}\Phi_jF\Phi_j^*\;,
\]
where $\{\Phi_j\,\big|\,j=1,\ldots,\,d(\al H.)\}$ is any orthonormal basis of
$\al H..$ Note that $\rho\s{\al H.}.$ preserves $\al A.\,.$
A {\bf canonical endomorphism} is the restriction of an inner endomorphism
to $\al A.,$ i.e. it is of the form
$\rho_{\al H.}\rest\al A.\in\mbox{End}\,\al A.\,.$
\end{defi}
\begin{rem}
\label{remark2}
\begin{itemize}
\item[(i)]
The definition of the canonical endomorphisms
uses
$\al F.$
explicitly. The question arises whether the
canonical
endomorphisms can be
characterised by intrinsic properties
within
$\al A.$.
This interplay between the
$\rho_{\al H.}$
and the
$\rho_{\al H.}\rest\al A.$
plays an essential role in the DR-theory.
Below, we omit
the restriction symbol and regard the
$\rho_{\al H.}$
also as endomorphisms of
$\al A.$.
\item[(ii)]
If the emphasis is only on the representation
$\gamma$
and not on its corresponding algebraic Hilbert space
$\al H._{\gamma},$
we will write
$\rho_{\gamma}$
instead of
$\rho_{\al H._{\gamma}}$.
\item[(iii)]
Note that $\Phi A=\rho\s{\al H.}.(A)\Phi$ for all
$\Phi\in\al H.$ and $A\in\al A..$
\item[(iv)]
Note that the identity endomorphism $\iota$ is assigned to
$\al H.=\C\un,$
i.e. $\rho\s{\C\un}.:=\iota.$
\item[(v)]
Let
$\al H.,\al K.$
be as before, then
$\rho\s{\al H.}.\circ\rho\s{\al K.}.=\rho\s{\al H.\cdot\al K.}..$
\item[(vi)]
The map $\rho$ from $\ob\al T._{\al G.}$ to the canonical endomorphisms
is in general not injective. In fact we have:
if $\al H.,\al K.\in\ob\al T._{\al G.},$
then
$\rho_{\al H.}\rest\al A.=\rho_{\al K.}\rest\al A.$
iff
$\Psi^{\ast}\Phi\in\al A.'\cap\al F.$
for all
$\Phi\in\al H.,\Psi\in\al K.\,,$
cf. Prop.~3.9 in \cite{B2}.
\end{itemize}
\end{rem}
\begin{defi}
Define $\al T.$ to be the category with objects the
canonical endomorphisms, and arrows the intertwiner spaces, where the
{\bf intertwiner space} of canonical endomorphisms
$\sigma,\;\tau\in\endo\al A.$
is:
\[
(\sigma,\,\tau):=\set X\in\al A.,X\sigma(A)=\tau(A)X\quad\hbox{for all}
\;{A\in\al A.}.\;.
\]
and this is a complex Banach space.
For $A\in(\sigma,\sigma'),$ $B\in(\tau,\tau'),$ we define
${A\times B}:=A\sigma(B)\in{(\sigma\tau,\,\sigma'\tau')\,.}$
We will say that $\sigma,\;\tau\in\endo\al A.$ are
{\bf mutually disjoint} if ${(\sigma,\,\tau)}=\{0\}$ when
$\sigma\not=\tau.$
\end{defi}
\begin{rem}
\label{remark3}
\begin{itemize}
\item[(i)]
We have
$(\iota,\,\iota)=Z(\al A.):=$ centre of $\al A..$
\item[(ii)]
The composition of two canonical endomorphisms (which corresponds to
products of the generating Hilbert spaces, see Remark 2.13 (v), i.e. to
tensor products of representations) satisfies the correct compatibility conditions
with the product $\times$ of intertwiners
to ensure that $\al T.$ is a C*-tensor category cf. Prop.~\ref{perm&conj} and
\cite{DR}.
The identity object is $\iota.$
\item[(iii)] Recall the isometry
$\al J.:\al L.\s{\al G.}.(\al H.,\al K.)
\longrightarrow \al A.$ encountered in Remark~\ref{remark1}(vii).
We claim that
its image is in fact contained in ${\left(\rho\s{\al H.}.,\,
\rho\s{\al K.}.\right)}.$ To see this, let $\Phi\in\al H.,\;
A\in\al A.$
and
$T\in\al L._{\al G.}(\al H.,\al K.).$
Then
\[
\al J.(T)\rho\s{\al H.}.(A)\Phi=\al J.(T)\Phi\cdot A=
T(\Phi)\cdot A=\rho\s{\al K.}.(A)T(\Phi)=
\rho\s{\al K.}.(A)\al J.(T)\cdot\Phi
\]
hence
\[
\al J.(T)\rho\s{\al H.}.(A)=\rho\s{\al K.}.(A)\al J.(T)
\]
i.e. $\al J.(T)\in {\left(\rho\s{\al H.}.,\,
\rho\s{\al K.}.\right)}$
or
\begin{equation}
\label{nonful}
(\al H.,\,\al K.)=
\al J.(\al L._{\al G.}(\al H.,\al K.))\subseteq
(\rho_{\al H.},\,\rho_{\al K.}).
\end{equation}
In general, the inclusion is proper.
Note that for
$R\in(\al H.,\al K.),\; R'\in(\al H.',\al K.')$
we have
$\al J.(R\otimes R')=R\rho_{\al H.}(R'),$
i.e.
$\times$
restricted to the
$(\al H.,\al K.)'s$
coincides with the definition of
$\times$
in Proposition~\ref{perm&conj} of the category
$\al T._{\al G.}.$
\end{itemize}
\end{rem}
Next we would like to define the concepts of subobject and direct sums
on $\ob\al T.$ compatibly with those on $\ob\al T._{\al G.}$
under the morphism $\rho.$ Recall that $\al H.<\al K.$ iff we have an isometry
$V\in\al L.\s{\al G.}.(\al H.,\,\al K.)$ and a projection $E\in
\al L.\s{\al G.}.(\al K.)$
with $V\al H.=E\al K.=\al J.(E)\cdot\al K.=\al J.(V)\cdot\al H..$
Then by (\ref{nonful}) we get that
$\al J.(V)\in
(\rho_{\al H.},\rho_{\al K.})$
and
$\al J.(E)\in
(\rho_{\al K.},\rho_{\al K.}).$
Note that if $\al L.=V\al H.+W\al K.$
for isometries
$V,\,W\in\al A.$ with $VV^*+WW^*=\un,$ then
$V\in(\rho\s{\al H.}.,\rho\s{\al L.}.)$ and $W\in(\rho\s{\al K.}.,
\rho\s{\al L.}.).$
\begin{defi}
\begin{itemize}
\item[(i)]
$\tau\in\ob\al T.$ is a {\bf subobject}
of $\sigma\in\ob\al T.,$
denoted ${\tau<\sigma,}$ if
there
is an isometry
$V\in (\tau,\sigma)$.
In this case
$\tau(\cdot)=V^{\ast}\sigma(\cdot)V$
and
$VV^{\ast}=:E\in (\sigma,\sigma)$
follow.
\item[(ii)]
$\lambda\in\ob\,\al T.$
is a {\bf direct sum} of
$\sigma,\tau\in\ob\,\al T.,$
if there are isometries
$V\in(\sigma,\lambda),\,W\in(\tau,\lambda)$
with
$VV^{\ast}+WW^{\ast}=\un$
such that
\[
\lambda(\cdot)=V\sigma(\cdot)V^{\ast}+W\tau(\cdot)W^{\ast}.
\]
\end{itemize}
\end{defi}
\begin{rem}
\label{Tsubobj}
\begin{itemize}
\item[(i)]
The subobject relation
$\tau<\sigma$
is again a partial order, because
$\tau<\sigma$
and
$\sigma<\mu$
imply the existence of isometries
$V\in (\tau,\sigma),\,W\in (\sigma,\mu)$.
Then
$WV\in (\tau,\mu)$
is also an isometry, i.e.
$\tau<\mu$.
\item[(ii)]
A direct sum as defined above
is only unique up to unitary equivalence, i.e. if
$\lambda,\,\lambda'$
are direct sums of $\sigma,\tau\in\ob\,\al T.,$ then there is a unitary
$U\in(\lambda,\lambda').$
\item[(iii)]
We have
$\rho\s{V\al H.+W\al K.}.(\cdot)=V\rho_{\al H.}(\cdot)V^{\ast}+
W\rho_{\al K.}(\cdot)W^{\ast}$
where
the isometries $V,\,W\in\al A.$ satisfy $VV^*+WW^*=\un\,.$
Also, if $\al H.<\al K.,$ then
$\tau:=\rho_{\al H.}<\rho_{\al K.}=:\sigma.$
However, this does not mean that the partial order
$\tau<\sigma$
can be {\it defined} by
$\al H.<\al K.$
because
the transitivity can be violated for some choices of $\al H.,\,\al K.$
cf. Remark~\ref{remark2}(vi).
\end{itemize}
\end{rem}
The closedness of
$\al T.$
w.r.t. direct sums is defined by the closedness of
$\al T._{\al G.}$
w.r.t. direct sums.
The closedness w.r.t. subobjects for
$\al T.$
is defined by the closedness w.r.t. subobjects for
$\al T._{\al G.}$
in the following sense: If
\begin{equation}
\label{endoH}
\lambda=\rho_{\al H.}\in\ob\al T.
\end{equation}
is given then for all
$\al H.$
satisfying (\ref{endoH}) and to each nontrivial
projection
$E\in\al J.(\al L._{\al G.}(\al H.))$
there is an isometry
$V\in\al A.$
with
$VV^{\ast}=E.$
Then
\begin{pro}
If
$\{\al F.,\al G.\}$ is nonabelian and
satisfies Property B then
$\al T.$
is closed w.r.t. direct sums and subobjects.
\end{pro}
\subsection{Connection between $\al T._{\al G.}$ and $\al T.$
and further structures.}
\label{PermConj}
In the following we assume that
$\{\al F.,\al G.\}$
satisfies Property B.
There is a very important relation between the two categories $\al T._{\al G.}$
and $\al T.,$ obtained as follows. The two assignments
$\rho:\hbox{Ob}\,\al T._{\al G.}\to\al T.$
(by
$\al H.\to\rho_{\al H.})$
and
$\al J.:\al L._{\al G.}((\al H.,\al K.))\to(\rho_{\al H.},\rho_{\al K.})$
combine into a faithful categorial morphism from
$\al T._{\al G.}$
to
$\al T.$
which is compatible with direct sums and subobjects (cf. Remark~\ref{Tsubobj}(iii)) but
is not full in general, i.e. the inclusion in Equation~(\ref{nonful})
is improper for some
$\al H.$
and
$\al K.$.
If
$\al A.'\cap\al F.=\C\un,$
then this categorial morphism becomes an isomorphism, cf. Prop. 3.12 in \cite{B2}.
The category $\al T._{\al G.}$
has the following additional structures
(\cite{BW,DR2}):
\begin{pro}
\label{perm&conj2}
For $\{\al F.,\al G.\}$ the category $\al T._{\al G.}$
satisfies:
\begin{itemize}
\item[(1)] it has a {\bf permutation structure}, i.e. a map
$\epsilon$ from
$\ob\al T._{\al G.}\times\ob\al T._{\al G.}$
into the arrows such that
\begin{itemize}
\item[(i)]
$\epsilon(\al H.,\al K.)\in (\al H.\al K.,\al K.\al H.)$
is a unitary.
\item[(ii)]
$\epsilon(\al H.,\al K.)\epsilon(\al K.,\al H.)=\un$.
\item[(iii)]
$\epsilon(1,\,\al H.)=\epsilon(\al H.,1)=\un$.
\item[(iv)]
$\epsilon(\al H.\al K.,\al L.)=\epsilon(\al H.,\al L.)\rho_{\al H.}(\epsilon
(\al K.,\al L.))$.
\item[(v)]
$\epsilon(\al H.',\al K.')A\times B=B\times A\epsilon(\al H.,\al
K.)$\quad for all $A\in (\al H.,\al H.'),\,B\in (\al K.,\al K.')$.
\end{itemize}
For $\al T._{\al G.}$ the permutation structure is
given by
\[
\epsilon(\al H.,\al K.):=\al J.(\Theta(\al H.,\al K.))
=\sum_{j,k}\Psi_{j}\Phi_{k}\Psi_{j}^{\ast}\Phi_{k}^{\ast}
\]
where $\Theta$ is the flip operator
$\al H.\otimes\al K.\rightarrow\al K.\otimes\al H.,$
and where
$\{\Phi_{k}\}_{k},\,\{\Psi_{j}\}_{j}$
are orthonormal bases of
$\al H.$ and $\al K.$, respectively.
\item[(2)] It has a {\bf conjugation structure}
i.e. for each
$\al H.\in\ob\al T._{\al G.}$
there is a conjugated object
$\overline{\al H.}\in\ob\al T._{\al G.}$,
carrying the conjugated representation of
$\al G.$
and there are conjugate arrows
$R_{\al H.}\in(1,\overline{\al H.}\al H.),$
$S_{\al H.}=\epsilon(\overline{\al H.},\al H.)R_{\al H.}$
such that
\[
S_{\al H.}^{\ast}\rho\s{\al H.}.(R_{\al H.})=\un,\quad
R_{\al H.}^{\ast}\rho\s{\overline{\al H.}}.(S_{\al H.})=\un.
\]
For $\al T._{\al G.}$ we have
$R_{\al H.}:=\sum_{j}\overline{\Psi}_{j}\Psi_{j}$,
where
$\{\overline{\Psi}_{j}\}_{j}$
is an orthonormal basis of
$\overline{\al H.}$.
If
$\al H.$
carries the representation
$\oplus_{j}\gamma_{j},\,\gamma_{j}\in\wh{\al G.},$
then
$\overline{\al H.}$
is given by a direct sum of
$\al H._{\overline{\gamma_{j}}},$
where
$\overline{\gamma_{j}}\in\wh{\al G.}$
represents the conjugated representation of
$\gamma_{j}.$
\end{itemize}
\end{pro}
\begin{rem}
Using the categorial morphism from
$\al T._{\al G.}$
to
$\al T.$
we equip
$\al T.$
with the image permutation and conjugation structures of those on
$\al T._{\al G.}$.
Note that for the image permutation structure in
$\al T.,$
property (v) need not hold for {\it all} arrows (cf. Remark~\ref{remark3}(iii)).
\end{rem}
For the next definition, observe
first that from the operations defined for an abstract tensor category
(cf. Prop.~\ref{perm&conj}), we can define isometries and projections in
its arrow spaces, i.e. an arrow $V\in(\lambda,\tau)$ is an isometry if
$V^*\circ V=1_\lambda,$ and an arrow $E\in(\lambda,\lambda)$
is a projection if $E=E^*=E\circ E\,.$
\begin{defi}
An {\bf (abstract) DR-category} is an
(abstract) tensor C*-category $\al C.$
with $(1,1)=\C\un$ which has a permutation and a conjugation structure,
and has direct sums
and subobjects, i.e. to all objects $\lambda,\sigma$ there is an object $\tau$
and isometries $V\in(\lambda,\tau),\,W\in(\sigma,\tau)$
such that $VV^{\ast}+WW^{\ast}=1_{\tau}$,
and to each nontrivial projection $E\in(\lambda,\lambda)$ there is an object
$\sigma$ and an isometry $V\in(\sigma,\lambda)$
such that $E=VV^{\ast}.$
\end{defi}
If the Hilbert system $\HS$ satisfies Property B then $\al T._{\al G.}$
is an example of a DR-category, but not necessarily $\al T.$
(since property (v) in Prop.~\ref{perm&conj2} need not hold for all arrows).
However, if additionally
$\al A.'\cap\al F.=\C\un$
holds then also
$\al T.$
is a DR-category.
\subsection{Duality Theorems}
Unless otherwise specified, in the following we assume Property
B for $\HS$ when
$\al G.$
is nonabelian.
The DR-theorem
produces
a bijection between pairs
\[
\{\al A.,\al T.\} \quad\hbox{and}\quad \HS\,,
\]
where $\al T.$ is a DR-category of unital endomorphisms of the
unital C*-algebra $\al A.$ with $Z(\al A.)=\C\un,$ and
$\HS$ is a Hilbert extension of $\al A.$ having trivial relative
commutant, i.e.~$\al A.'\cap\al F.=\C\un$ (see
\cite{DR,DR5,B3}).
The DR-theorem says that in the case of
Hilbert extensions of $\al A.$
with trivial relative commutant, the category $\al T. $
of all canonical endomorphisms can indeed be characterized
intrinsically by their abstract algebraic properties
as endomorphisms of $\al A.$
and a corresponding bijection can be established.
In this subsection we want to state how to obtain such a bijection
for C*-algebras $\al A.$ with nontrivial center
$\al Z.\supset\C\un.$
A first problem is that the category $\al T._\al G.$ and
$\al T.$ {\em need not} be isomorphic anymore, cf. Remark~\ref{remark3}(iv)
and Remark~\ref{remark2}(vi), since now we have
\[
\C\un\not=\al Z.\subseteq\al A.'\cap\al F.\,.
\]
We will investigate in the following the class
of Hilbert extensions $\HS$ with compact group $\al G.$
and where the relative commutant satisfies the following
{\em minimality} condition
\begin{defi}
A Hilbert system
$\{\al F.,\al G.\}$
is called {\bf minimal} if the condition
\begin{equation}
\label{CZ}
\al A.'\cap\al F.=Z(\al A.)\;.
\end{equation}
is satisfied.
\end{defi}
Then we have cf. Prop.~4.3 of \cite{B2}:
\begin{pro}
\label{disjZ}
Let
$\HS$
be a given Hilbert system. Then
$\al A.'\cap\al F.=Z(\al A.)$ iff
$(\rho_{\gamma},\rho_{\gamma'})=\{0\}$
for
$\gamma\neq\gamma'$,
i.e. iff the set
$\{\rho_{\gamma}\;\big|\;\gamma\in\wh{\al G.}\}$
is mutually disjoint.
\end{pro}
Observe that in any Hilbert system,
for each $\tau\in
\ob\al T.$ the space ${\got h}_\tau:=
\al H._\tau Z(\al A.),$ (where $\al H._\tau $
is a $\al G.\hbox{--invariant}$ algebraic Hilbert space)
is a $\al G.\hbox{--invariant}$ right Hilbert
$Z(\al A.)\hbox{--module}$ i.e. there is a nondegenerate inner product taking
its values in $Z(\al A.)$
and it is $\langle A,B\rangle=A^*B\,.$
Now we have cf. {Prop. 3.1 \cite{BL2}}:
\begin{pro}
\label{prop0}
Let $\HS$ be a given minimal Hilbert system,
then the correspondence ${\tau\leftrightarrow{\got h}_\tau}$
is a bijection. Thus ${\got h}_\tau=
\al H._\tau Z(\al A.)$ is independent of the choice of
$\al H._\tau,$ providing that $\tau=\rho\s{\al H._\tau}..$
This bijection satisfies the conditions
\begin{eqnarray*}
\sigma\circ\tau &\longleftrightarrow&
{\got h}_\sigma\cdot{\got h}_\tau \\[1mm]
\lambda=(\Ad V)\circ\sigma+(\Ad W)\circ\tau
&\longleftrightarrow&
{\got h}\s\lambda.=V{\got h}_\sigma+W{\got h}_\tau\;.
\end{eqnarray*}
\end{pro}
Thus for minimal Hilbert systems, the
$Z(\al A.)\hbox{--modules}$ ${\got h}_\tau$
are uniquely determined by their
canonical endomorphisms $\tau,$ even though the choice of
$\al H._{\tau}$ is not unique. We are now interested in those
choices of $\al H._{\tau}$ which are compatible with products:
\begin{defi}
A Hilbert system
$\HS$
is called {\bf regular} if there is an assignment
$\sigma\rightarrow\al H._{\sigma}$
from
$\ob\,\al T.$
to
$\al G.$-invariant algebraic Hilbert spaces in
$\al F.$
such that
\begin{itemize}
\item[(i)] $\sigma=\rho\s{\al H._\sigma}.,$
i.e. $\sigma$ is the canonical endomorphism of $\al H._\sigma,$
\item[(ii)] $\sigma\circ\tau\to\al H._\sigma\cdot\al H._\tau\;.$
\end{itemize}
\end{defi}
In a minimal Hilbert system regularity means that there is a
``representing" Hilbert space
$\al H._{\tau}\subset{\got h}_{\tau}$
for each $\tau$ with
${\got h}_{\tau}=\al H._{\tau}Z(\al A.)$
such that the compatibility relation (ii) holds.
If a Hilbert system is minimal and
$Z(\al A.)=\C\un$
then it is necessarily regular.
Thus a class of examples which are trivially minimal and regular,
is provided by DHR--superselection theory.
A nontrivial example of a minimal and regular Hilbert system is constructed in \cite{B2}.
Then we obtain, cf. Theorem 4.9 of \cite{B2}:
\begin{teo}
\label{Teo1}
Let $\HS$ be a minimal and regular Hilbert system, then:
$\al T.$ contains a C*--subcategory $\al T._\C$ with
the same objects, $\ob\al T._\C=\ob\al T.,$ and arrows
$(\sigma,\,\tau)_\C:=(\al H._\sigma,\al H._\tau)=
\al J.\big(\al L.\s{\al G.}.(\al H._\sigma,\al H._\tau)\big)\subset(\sigma,\tau)$
such that:
\begin{itemize}
\item[P.1]
$\quad\al T._{\C}$ is a DR-category (in particular $(\iota,\iota)_{\C}
=\C\un)$.
\item[P.2.]
$\quad(\sigma,\tau)=(\sigma,\tau)\s\C.\sigma(Z(\al A.))
=\tau(Z(\al A.))(\sigma,\tau)\s\C.\sigma(Z(\al A.))\;.$
\end{itemize}
\end{teo}
\begin{rem}
\begin{itemize}
\item[(i)]
The conditions P.1-P.2 imply that each basis of
$(\sigma,\tau)_{\C}$
is simultaneously a module basis of
$(\sigma,\tau)$
modulo
$\sigma(\al Z.(\al A.))$
as a right module,
i.e. the module
$(\sigma,\tau)$
is free.
\item[(ii)]
We will call the DR-subcategory $\al T._\C$ in Theorem~\ref{Teo1}
{\bf admissible}.
If ``minimality" is omitted
from the hypotheses of
Theorem~\ref{Teo1}, then property P.1 remains valid, but not
P.2. In this case $\al T._\C$ is a DR-subcategory only.
A construction of an example with admissible
subcategory can be found in \cite{B2}.
\end{itemize}
\end{rem}
The converse of Theorem~\ref{Teo1} is also true, and states the main duality result
cf.~\cite{BL}:
\begin{teo}
\label{Teo2}
Let $\al T.$ be a C*--tensor category of unital endomorphisms
of $\al A.$
and let $\al T.\s\C.$
be an admissible (DR-)subcategory.
Then there is a minimal and regular Hilbert
extension $\HS$ of $\al A.$
such that $\al T.$ is isomorphic
to the category of all canonical endomorphisms of $\HS.$
Moreover, if $\al T.\s\C.,\;\al T.'_\C$ are two admissible subcategories of
$\al T.,$
then the corresponding Hilbert
extensions are $\al A.\hbox{--module}$ isomorphic iff $\al T.\s\C.$
is {\bf equivalent} to $\al T.'_\C$ i.e. iff there is a map
$V$ from $\ob\al T.$ to the arrows such that:
\begin{eqnarray*}
V_{\lambda}&\in& (\lambda,\lambda),\quad
V_{\lambda} \quad\hbox{is unitary, and}\quad V_{\lambda\circ\sigma}=V_{\lambda}\times
V_{\sigma}, \\[1mm]
(\lambda,\sigma)_{\C}'&=&V_{\sigma}(\lambda,\sigma)_{\C}V_{\lambda}^{\ast}
\subset (\lambda,\sigma)
\end{eqnarray*}
and we have the following compatibility relations for the corresponding permutators
$\epsilon,\,\epsilon'$ and conjugates $R_\lambda,\,R'_\lambda:$
\begin{eqnarray*}
\epsilon'(\lambda,\sigma)
&=&(V_\sigma\times V_{\lambda})\cdot\epsilon(\lambda,\sigma)\cdot(V_\lambda\times
V_\sigma)^{\ast} \\[1mm]
R'_\lambda&=&V_{\ol\lambda.\circ
\lambda}R_\lambda,\qquad S'_\lambda
=\epsilon'(\lambda,\ol\lambda.)R'_\lambda.
\end{eqnarray*}
\end{teo}
Thus, in minimal and regular Hilbert systems there
is an intrinsic characterization of the category of all
canonical endomorphisms in terms of
$\al A.$
only. Moreover,
up to $\al A.\hbox{--module}$ isomorphisms, there is a bijection
between minimal and regular Hilbert extensions
and C*-tensor categories $\al T.$ of unital endomorphisms of $\al A.$
with admissible subcategories.
Note that Theorem~\ref{Teo2} is a generalization of the
DR-theorem for
the case of nontrivial centre
$Z(\al A.)\supset\C\un,$ i.e. it contains the case of the DR-theorem, in that if
$Z(\al A.)=\C\un$
then $\al T.$
itself is admissible (hence a DR-category) and the corresponding
Hilbert extensions have trivial relative commutant.
\subsection{Hilbert systems with abelian groups}
\label{abelianHS}
If
$\al G.$
is abelian the preceding structure simplifies radically. Specifically,
$\wh{\al G.}$
is a discrete abelian group (the character group),
each $\al H._\gamma,\,\gamma\in\wh{\al G.}$ is one--dimensional with a generating
unitary $U_\gamma,$ hence the canonical endomorphisms
$\rho_{\al H._{\gamma}}$
(denoted by
$\rho_{\gamma},)$
are in fact automorphisms,
necessarily outer on $\al A..$
Since
$\rho_{\gamma_{1}}\circ\rho_{\gamma_{2}}=\rho_{\gamma_{1}\gamma_{2}}$
in this case the set
$\Gamma$
of all canonical endomorphisms
$\rho_{\al H._{\gamma}}$
is a group with the property
$\wh{\al G.}\cong\Gamma/\hbox{int}\,\al A..$
Hence it is not necessary to consider
direct sums, i.e. Property B for
$\al A.$
can be dropped.
In the case
$Z(\al A.)=\C\un$
the permutators $\epsilon$ (restricted to
$\wh{\al G.}\times\wh{\al G.}$)
are elements of the second cohomology group
$H^{2}(\wh{\al G.})$
and
\[
U_{\gamma_{1}}\cdot U_{\gamma_{2}}=\omega(\gamma_{1},\gamma_{2})
U_{\gamma_{1}\circ\gamma_{2}},
\]
where
\[
\epsilon(\gamma_{1},\gamma_{2})=\frac{\omega(\gamma_{1},\gamma_{2})}
{\omega(\gamma_{2},\gamma_{1})}
\]
and $\omega$ is a corresponding 2-cocycle. The field algebra $\al F.$
is just the $\omega\hbox{--twisted}$ discrete crossed product
of $\al A.$ with $\wh{\al G.}$
(see e.g. p.86 ff.~\cite{Bg} for details).
For the case
$Z(\al A.)\supset\C\un$
see ~\cite{BL3} (though the minimal case is not mentioned there).
\section{Kinematics for Quantum Constraints.}
\label{TProcedure}
In this section we give a brief summary of the method of imposing quantum
constraints, developed by Grundling and Hurst \cite{Grundling85,Grundling88b,
Lledo}. There are quite a number of diverse quantum
constraint methods available in the literature at various levels of
rigour (cf.~\cite{lands}). The one we use here is the most congenial from
the point of view of C*--algebraic methods.
Our starting point is:
\begin{defi}
A {\bf quantum system with constraints} is a
pair $(\al B.,\;\al C.)$ where the {\bf system algebra}
$\al B.$ is a unital {\rm C*}--algebra containing
the {\bf constraint set} $\al C.=\al C.^*.$ A
{\bf constraint condition} on $(\al B.,\,\al C.)$ consists of
the selection of the physical
state space by:
\[
{\got S}_D:=\Big\{ \omega\in{\got S}({\al B.})\mid\pi_\omega(C)
\Omega_\omega=0\quad {\forall}\, C\in {\al C.}\Big\}\,,
\]
where ${\got S}({\al B.})$ denotes the state space of $\al B.$,
and $(\pi_\omega,\al H._\omega,\Omega_\omega)$ denotes the
GNS--data of $\omega$. The elements of ${\got S}_D$ are called
{\bf Dirac states}.
The case of {\bf unitary constraints} means
that $\al C.=\al U.-\EINS$, $\;\al U.\subset\al B._u$, and
for this we will
also use the notation $(\al B.,\,\al U.)$.
\end{defi}
The assumption is that all physical information is contained in the
pair $(\al B.,{\got S}_D)$.
Examples of constraint theories as defined here,
have been worked out in detail
for various forms of electromagnetism~cf.~\cite{Grundling85, Grundling88c,
Lledo}.
For the case of unitary constraints we have the following equivalent
characterizations of the Dirac states
(cf.~\cite[Theorem~2.19~(ii)]{Grundling85}):
\begin{eqnarray}
\label{DiracU1}{\got S}_{{D}}&=&\Big\{ \omega\in{\got S}({\al B.})\mid
\omega(U)=1 \quad {\forall}\, U\in {\al U.}\Big\} \\[1mm]
\label{DiracU2} &=&\Big\{ \omega\in{\got S}({\al B.})\mid
\omega(FU)=\omega(F)=\omega(UF) \quad {\forall}\,
F\in\al B.,\; U\in {\al U.}\Big\}.
\end{eqnarray}
Moreover, the set $\{\alpha_U:= {\rm Ad}(U)\mid U\in\al U.\}$ of
automorphisms of $\al B.$ leaves every Dirac state invariant,
i.e.~we have $\omega\circ\alpha_U=\omega$ for all
$\omega\in {\got S}_{{D}}$, $U\in{\al U.}$.
For a general constraint set $\al C.$, observe that we have:
\begin{eqnarray*}
{\got S}_D &=& \Big\{ \omega\in{\got S}({\al B.})\mid\omega(C^*C)=0
\quad {\forall}\, C\in\al C.\Big\} \\[1mm]
&=& \Big\{ \omega\in{\got S}({\al B.})\mid \al C.\subseteq
N_\omega\Big\}\kern2mm=\kern2mm\al N.^\perp\cap{\got S}(\al B.)\;.
\end{eqnarray*}
Here $N_\omega:=\{F\in\al B.\mid\omega(F^*F)=0\}$ is the left kernel of
$\omega$ and
$\al N.:=\cap\; \{N_{\omega}\mid\omega\in{\got S}_D \}$,
and $\al N.^\perp$ denotes the annihilator of $\al N.$
in the dual of $\al B.$.
Now $\al N.=\csp(\al BC.)$
because every closed
left ideal is the intersection of the left kernels which contains it
(cf.~3.13.5 in \cite{bPedersen89}).
Thus $\al N.$ is the left ideal generated by $\al C.$.
Since $\al C.$ is selfadjoint and contained in
$\al N.$ we conclude
\[
\al C.\subset {\rm C}^*(\al C.)\subset
\al N.\cap\al N.^*=\csp(\al BC.)\,\cap\,\csp(\al CB.)\;,
\]
where ${\rm C}^*(\cdot)$
denotes the C*--algebra in $\al B.$ generated by its argument.
Then we have (cf. \cite{Lledo}):
\begin{teo}
\label{Teo.3.1}
For the Dirac states we have:
\begin{itemize}
\item[{\rm (i)}] ${\got S}_{{D}}\neq\emptyset\;$ iff
$\;\EINS\not\in {\rm C}^*(\al C.)$ iff
$\;\EINS\not\in \al N.\cap\al N.^*=:\al D.$.
\item[{\rm (ii)}] $\omega\in {\got S}_D\;$ iff
$\; \pi_{\omega}({\al D.})\Omega_{\omega}=0$.
\item[{\rm (iii)}] An extreme Dirac state is pure.
\end{itemize}
\end{teo}
We will call a constraint set $\al C.$ {\bf first class} if
$\EINS\not\in {\rm C}^*(\al C.)$, and this is the nontriviality
assumption which we henceforth make \cite[Section~3]{Grundling88a}.
Now define
\[
{\al O.} := \{ F\in {\al B.}\mid [F,\, D]:= FD-DF \in {\al D.}\quad
{\forall}\, D\in{\al D.}\}.
\]
Then ${\al O.}$ is the C$^*$--algebraic analogue of Dirac's observables
(the weak commutant of the constraints) \cite{bDirac64}.
Then (cf. \cite{Lledo}):
\begin{teo}
\label{Teo.2.2}
With the preceding notation we have:
\begin{itemize}
\item[{\rm(i)}] $\al D.=\al N.\cap \al N.^*$ is the unique maximal
{\rm C}$^*$--algebra in $\, \cap\; \{ {\rm Ker}\,\omega\mid \omega\in
{\got S}_{{D}} \}$. Moreover $\al D.$ is a hereditary
{\rm C}$^*$--subalgebra of $\al B.$.
\item[{\rm(ii)}] ${\al O.} = {M}_{\al B.}({\al D.})
:=\{ F\in{\cal B}\mid FD\in{\cal D}\ni DF\quad\forall\, D\in{\cal D}\}$,
i.e.~it is the relative multiplier algebra of ${\al D.}$ in ${\al B.}$.
\item[{\rm(iii)}] $\al O.=\{F\in\al B.\mid\; [F,\,\al C.]\subset\al D.\},$
hence $\al C.'\cap\al B.\subseteq\al O.\;.$
\item[{\rm(iv)}] $\al D.=\csp(\al OC.)=\csp(\al CO.)$.
\item[{\rm(v)}] For the case of unitary constraints, i.e.
$\al C.=\al U.-\EINS$, we have
$\al U.\subset\al O.$ and $\al O.={\{F\in\al B.\mid\alpha_U(F)-F\in\al D.
\quad\forall\; U\in\al U.\}}$
where $\alpha_U:={\rm Ad}\,U$.
\end{itemize}
\end{teo}
Thus $\al D.$ is a closed two-sided ideal of $\al O.$ and it
is proper when ${\got S}_D\not=\emptyset$ (which we assume here
by $\EINS\not\in {\rm C}^*(\al C.)$).
Since the traditional observables are $\al C.'\cap\al B.,$
by (iii) we see that these are in $\al O.\,.$ In general
$\al O.$ can be much larger than $\al C.'\cap\al B..$
Define the {\it maximal {\rm C}$^*$--algebra of physical observables} as
\[
{\al R.}:={\al O.}/{\al D.}.
\]
The factoring procedure is the actual step of imposing constraints.
This method of constructing $\al R.$ from $(\al B.,\,\al C.)$
is called the {\bf T--procedure}
in \cite{Grundling85}, and it defines a map $T$ from first class
constraint pairs $(\al B.,\,\al C.)$ to unital C*--algebras by
${T(\al B.,\,\al C.)}:=\al R.=\al O./\al D..$
We require that after the T--procedure all physical
information is contained in the pair $({\al R.}\kern.4mm ,{\got S}
({\al R.}))$, where ${\got S}({\al R.})$ denotes the set of
states on $\al R.$. Now, it is possible that $\al R.$ may not be simple
\cite[Section~2]{Grundling85}, and this would not be acceptable for a
physical algebra. So, using physical arguments, one would in practice
choose a C$^*$--subalgebra $\al O._c\subset \al O.$ containing
the traditional observables $\al C.'$ such that
\[
\al R._c :=\al O._c / (\al D.\cap\al O._c )\subset \al R.\,,
\]
is simple. The following result justifies the choice of $\al R.$ as the
algebra of physical observables (cf. Theorem 2.20 in \cite{Grundling85}):
\begin{teo}
\label{Teo.2.6}
There exists a ${\sl w}^*\hbox{--continuous}$ isometric bijection
between the Dirac states on ${\al O.}$ and the states on ${\al R.}$.
\end{teo}
Insofar as the physics is
now specified by $\al R.,$ this suggests that we
call two constraint sets equivalent if they produce the same $\al R..$
More precisely two constraint sets $\al C._1\subset\al B.\supset\al C._2$
are called {\bf equivalent}, denoted $\al C._1\sim\al C._2,$
if they select the same set of Dirac states, cf.~\cite{Lledo}.
In fact
\[
\al C._1\sim\al C._2\quad\hbox{iff}\quad
\csp(\al BC._1)=\csp(\al BC._2)\quad\hbox{iff}\quad\al D._1=\al D._2\;.
\]
The hereditary property of $\al D.$ can be further analyzed,
and we list the main points (the proofs are
in Appendix~A of \cite{Lledo}).
Denote by $\pi_u$ the universal representation of $\al B.$ on the
universal Hilbert space $\al H._u$ \cite[Section~3.7]{bPedersen89}.
$\al B.''$ is the strong closure of $\pi_u(\al B.)$ and since $\pi_u$
is faithful we make the usual identification of $\al B.$
with a subalgebra of $\al B.''$, i.e.~generally omit explicit
indication of $\pi_u$. If $\omega\in{\got S}(\al B.)$, we will
use the same symbol for the unique extension of $\omega$ from $\al B.$ to
$\al B.''$.
\begin{teo}
\label{Teo.2.7}
For a constrained system $(\al B.,\al C.)$ there exists a
projection
$P\in\al B.''$ such that
\begin{itemize}
\item[{\rm (i)}] $\al N.=\al B.''\,P\cap \al B.$,
\item[{\rm (ii)}] $\al D.=P\,\al B.''\,P \cap \al B.$
\item[{\rm (iii)}] ${\got S}_D=\{\omega\in{\got S}(\al B.)\mid\omega(P)=0\}$
\item[{\rm(iv)}] $\al O.=\{ A\in\al B. \mid PA(\EINS-P)=0=
(\EINS-P)AP \}=P'\cap \al B.\;.$
\end{itemize}
\end{teo}
A projection satisfying the conditions of Theorem~\ref{Teo.2.7}
is called {\em open} in
\cite{bPedersen89}.
What this theorem means, is that with respect to
the decomposition
\[
\al H._u=P\,\al H._u\oplus (\EINS-P)\,\al H._u
\]
we may rewrite
\begin{eqnarray*}
\al D.&=& \Big\{ F\in\al B.\;\Big|\; F=
{\left(\kern-1.5mm\begin{array}{cc}
D \kern-1.6mm & 0 \\ 0 \kern-1.6mm & 0
\end{array} \kern-1.5mm\right)},\;
D\in P\al B.P \Big\}\;\;{\rm and} \\
\al O.&=& \Big\{ F\in\al B.\;\Big|\; F=
{\left(\kern-1.5mm\begin{array}{cc}
A \kern-1.6mm & 0 \\ 0 \kern-1.6mm & B
\end{array} \kern-1.5mm\right)},\;
A\in P\al B.P,\; B\in(\EINS-P)\al B.(\EINS-P) \Big\}\,.
\end{eqnarray*}
It is clear that in general $\al O.$ can be much greater than the
traditional observables $\al C.'\cap\al B.$. Next we show how to identify the
final algebra of physical observables $\al R.$ with a subalgebra of
$\al B.''$.
\begin{teo}
\label{Teo.2.11}
For $P$ as above we have:
\[
\al R.\cong\Big\{ F\in\al B.\;\Big|\; F=
\left(\kern-1.5mm\begin{array}{cc}
0 \kern-1.6mm & 0 \\ 0 \kern-1.6mm & A
\end{array} \kern-1.5mm\right) \Big\}=
(\EINS-P)\,(P'\cap\al B.) \subset \al B.''.
\]
\end{teo}
Below we will need to consider a constraint system
contained in a larger algebra,
specifically, $\al C.\subset\al A.\subset\al F.$ where $\al C.$ is
a first--class constraint set, and $\al A.,\;\al F.$ are unital
C*--algebras.
Now there are
two constrained systems to consider;- $(\al A.,\,\al C.)$
and $(\al F.,\,\al C.).$ The first one produces the algebras
$\al D.\subset\al O.\subseteq\al A.,$ and the second produces
$\al D.\s{\al F.}.\subset\al O.\s{\al F.}.\subseteq\al F..$
where as usual,
\begin{eqnarray*}
\al N.&=& \csp(\al AC.),\qquad \al D.=\al N.\cap\al N.^*,\qquad
\al O.=M\s{\al A.}.(\al D.)
\qquad\hbox{and} \\
\al N.\s{\al F.}.&=&\csp(\al FC.),\qquad
\al D.\s{\al F.}.=\al N.\s{\al F.}.\cap
\al N.^*\s{\al F.}.,\qquad
\al O.\s{\al F.}.=M\s{\al F.}.(\al D.\s{\al F.}.).
\end{eqnarray*}
Then we have (cf. Theorem~3.2 of \cite{Grundling88b}):
\begin{teo}
\label{Teo.2.12}
Given as above $\al C.\subset\al A.\subset\al F.$
then
\[ \al N.\s{\al F.}.\cap\al A.=\al N.,\qquad
\al D.\s{\al F.}.\cap\al A.=\al D.,\qquad
\qquad\hbox{and}\qquad
\al O.\s{\al F.}.\cap\al A.=\al O.\;.
\]
Hence $\al R.=\al O./\al D.=(\al O.\s{\al F.}.\cap\al A.)\big/
(\al D.\s{\al F.}.\cap\al A.)\;.$
\end{teo}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\section{Superselection with constraints.}
Next we would like to consider systems containing
both constraints and superselection.
There is a choice in how to define this problem mathematically,
so let us consider the physical background.
Perhaps the most important
example, is that of a local gauge theory.
It usually has a set of global charges (leading to superselection)
as well as a Gauss law constraint (implementing the local gauge symmetry),
and possibly also other constraints
associated with the field equation.
Only if the gauge group is abelian will the Gauss law constraint commute with
the global charge, since the Gauss law constraint
takes its values in the Lie algebra of the gauge group.
Thus, for nonabelian local gauge theories
we do not expect the constraints to be
in the algebra of gauge invariant
observables $\al A.$ of the superselection
theory of the global charge.
This problem is however not as serious as it looks.
The reason is that whilst the global gauge group does not preserve
the individual Gauss law constraints, it does preserve the set of these,
hence it also preserves the set of Dirac states selected by them.
Thus we can replace the original constraint set by an equivalent constraint
(i.e. selecting the same set
of Dirac states)
which is invariant under the global gauge group.
Such an equivalent constraint
is given by the projection in Theorem~\ref{Teo.2.7}.
It comes at the cost of slightly enlarging the system algebra $\al B.,$
since $P$ is in the universal Von Neumann algebra of $\al B.$.
We can avoid this cost if $\csp(\al C.)$
is separable, since then there is an equivalent constraint in
$\al B.$ itself, cf.~Theorem~3.4 of~\cite{Lledo}.
We therefore will assume below that the constraints are in
in $\al A..$
This will include the situation where
there are two or more local gauge symmetries
which mutually commute (e.g. isospin and electromagnetism),
in which case the Gauss law constraint
of one symmetry will commute with the global charges
of the other.
We can also easily find constraints which are independent of the
gauge symmetries, e.g. restriction to a submanifold,
or enforcing a dynamical law.
Let now $(\al A.,\,\al C.)$ be
a first--class constraint system, hence we have the associated
algebras $\al D.\subset\al O.\subseteq\al A.,$ and $\al R.=\al O./\al D..$
In addition, let
$\al A.$ have a superselection structure
i.e. there is a given Hilbert extension $\HS$ of $\al A..$
Thus the category
$\al T.$
of canonical endomorphisms of
$\al A.$
defines a selection criterion of unital endomorphisms of
$\al A..$
In the case that the Hilbert extension is minimal and regular,
the superselection structure of
$\al T.$
is given within
$\al A.$
without any reference to the Hilbert extension.
Then the following natural questions arise:
\begin{itemize}
\item[(1)] what compatibility conditions should be satisfied in order
to pass the superselection structure through $T,$ thus obtaining
a superselection structure on $T(\al A.,\,\al C.)=\al R.?$
\item[(2)] what is the relation between $T(\al A.,\,\al C.)$
and $T(\al F.,\,\al C.)$ where $\al F.$ is the field algebra generated from
$\al T.?$
\end{itemize}
An inverse question also arises, i.e.
\begin{itemize}
\item[(3)] if $\al R.$ has a superselection structure, what is the
weakest structure one can expect on $\al A.$ which would produce
this superselection structure on $\al R.$ via $T?$
(One should call this a {\it weak} superselection structure.)
\end{itemize}
To address (1) and (2), recall that the map $T$ consists of a restriction
(of $\al A.$ to $\al O.)$ followed by a factoring
($\al O.\to\al O./\al D.$). So, we first work out the compatibility
conditions involved with restrictions and factoring maps.
Since $\al C.\subset\al A.\subset\al F.\,,$ there are
two constrained systems to consider;- $(\al A.,\,\al C.)$
and $(\al F.,\,\al C.).$ The first one produces the algebras
$\al D.\subset\al O.\subseteq\al A.,$ and the second produces
$\al D.\s{\al F.}.\subset\al O.\s{\al F.}.\subseteq\al F.$
(cf. Theorem~\ref{Teo.2.12}).
Now since $\al C.\subset\al A.,$ the $\al G.\hbox{--invariant}$ part
of $\al F.,$ it follows that $\al G.$ preserves the set of Dirac states,
hence $\al G.$
preserves both
$\al D._{\al F.}$
and
$\al O._{\al F.}$,
i.e.
$g\al D._{\al F.}=\al D._{\al F.}$
and
$g\al O._{\al F.}=\al O._{\al F.}$
for all
$g\in\al G.$.
We denote the restriction of
$\al G.$
to
$\al O._{\al F.}$
by
$\beta_{g}:={g}\rest\al O._{\al F.}.$
The homomorphism
$\beta:\al G.\ni g\rightarrow \beta_{g}\in\aut\,\al
O._{\al F.}$
is not necessarily injective but
$\beta$
is again
pointwise norm-continuous, hence
$\al G./\al K.$
is compact where
$\al K.:=\ker\beta.$
The isomorphism
$\tilde{\beta}:\al G./\al K.\to
\beta_{\al G.}$ by
$\tilde{\beta}(g\al K.):=\beta_{g}$
is also a topological one (cf.~p.58~\cite{HR}).
Note that
$\wh{(\al G./\al K.)}=\{\gamma\in\wh{\al G.}\,\bigm|\,\gamma(k)=1\quad
\hbox{for all}\;k\in\al K.\}\supseteq\spec\,\beta_{\al G.}\,.$
The spectral projections
$\Pi^{\beta}_{\gamma}$
of
$\beta\s{\al G.}.$
are given by the restriction to
$\al O._{\al F.}$
of the spectral projections
$\Pi_{\gamma}$
of
$\al G.$,
i.e.
$\Pi^{\beta}_{\gamma}X=\Pi_{\gamma}X$
for
$X\in\al O._{\al F.}.$
We now have the:
\begin{itemize}
\item[(I)]
Restriction problem.
Find conditions to
guarantee that
the C*--dynamical system
$\{\al O._{\al F.},\al G.,\beta\}$
is a Hilbert system
$\{\al O._{\al F.},\beta_{\al G.}\}$.
Thus we have to find conditions to ensure there are algebraic
Hilbert spaces in
$\Pi^{\beta}_{\gamma}\al O._{\al F.}$
for
$\gamma\in\wh{(\al G./\al K.)}$.
(Note that this is stronger than what we need;-
we only need a Hilbert system on $\al R.\s{\al F.}.$ after factoring
out by $\al D.\s{\al F.}..)$
\item[(II)]
Factoring problem.
Find conditions to guarantee that under the map
$\al O.\s{\al F.}.\to\al R.\s{\al F.}.:={\al O.\s{\al F.}.\big/
\al D.\s{\al F.}.}$ the factoring through of the action of $\al G.$
to $\al R.\s{\al F.}.$
is a Hilbert system corresponding to a DR--category.
This is of course a special case of the general
problem for homomorphic images of Hilbert systems
under factoring by invariant ideals.
The reason why we require $Z(\al A.)=\C\un$ for $\al R.\s{\al F.}.$
is because after implementing constraints, the final physical algebra
should be simple.
\end{itemize}
Below we list our major results;- since some proofs are lengthy,
we defer these to Section~\ref{Proofs} to preserve the main flow of ideas.
\subsection{Restricting a superselection structure.}
\label{restrict}
We consider now for the system above the restriction problem (I),
i.e. we are given a Hilbert extension $\HS$ of $\al A.,$ containing
constraints $\al C.\subset\al A.,$ and we need to examine
when
$\{\al O._{\al F.},\,\beta\s{\al G.}.\}$
is a Hilbert system.
\def\of{\al O.\s{\al F.}.}
\def\df{\al D.\s{\al F.}.}
\def\rf{\al R.\s{\al F.}.}
\begin{teo}
\label{Teo.4.1}
\begin{itemize}
\item[(i)] $\{\al O._{\al F.},\al G.,\beta\}$
has fixed point algebra $\al O..$ Moreover, $Z(\al A.)\subseteq
Z(\al O.).$
\item[(ii)]
For any $\al G.$-invariant
algebraic Hilbert space $\al H._\gamma\subset\Pi_\gamma\al F.$
we have either
$\al H._\gamma\cap\of=\{0\},$
or $\al H._\gamma\subset\of\,.$
In the latter case we have
$\gamma\in
\wh{\al G./\al K.}$
where $\al K.=\ker\beta\,,$
and
\[
\al H._\gamma\subset\Pi_{\gamma}\of=\csp(\al O.\al H._{\gamma}).
\]
\item[(iii)]
Let $\sigma\in\ob\al T.,$ with $\al H._\sigma\subset\al F.$
a $\al G.$-invariant algebraic Hilbert
space such that
$\sigma=\rho\s{\al H._\sigma}..$
If $\al H._\sigma\subset\of,$
then $\sigma(\al D.)\subseteq\al D.$ and $\sigma(\al O.)\subseteq\al O..$
Thus $\sigma$ restricts to $\al O.,$ $\sigma\rest\al O.\in\endo
\al O..$
\end{itemize}
\end{teo}
The central condition for
$\{\of,\al G.,\beta\}$
to be a Hilbert system
$\{\of,\beta_{\al G.}\}$
w.r.t. the factor group
$\al G./\al K.$
is
$\al H._{\gamma}\subset\of$,
i.e.
$\al H._{\gamma}\subset\Pi_{\gamma}^{\beta}\of$
for all
$\gamma\in\wh{\al G./\al K.}$.
Next, we develop an internal criterion on $\al A.$ to guarantee that
a given
$\al H.\in\ob\al T._{\al G.}$
is contained in
$\of$.
\begin{teo}
\label{Teo.4.2}
\begin{itemize}
\item[(i)]
Given the Hilbert extension $\HS$ of the constrained system
$\al C.\subset\al A.$ assumed here, we have for
any $\al G.\hbox{--invariant}$ algebraic Hilbert space $\al H.$
that
\begin{eqnarray*}
\al H.\subset\of\qquad &\hbox{iff}&\qquad
\al D.\sim\rho\s{\al H.}.(\al D.)\\[1mm]
&\hbox{i.e.}&\qquad
\al D.=\csp\big(\al A.\rho\s{\al H.}.(\al D.)\big)\,\cap
\,\csp\big(\rho\s{\al H.}.(\al D.)\al A.\big)\,.
\end{eqnarray*}
\item[(ii)]
For all $\sigma,\;\tau\in\ob\al T.$
with $\al H._\sigma,\al H._\tau\subset\of$ we have
\[
(\sigma,\,\tau)\s{\al A.}.\subseteq\big(\sigma\rest\al O.,\,\tau
\rest\al O.\big)\s{\al O.}.\;.
\]
\end{itemize}
\end{teo}
Observe
that $\al D.\sim\rho\s{\al H.}.(\al D.)$ implies that
$\rho\s{\al H.}.(\al D.)\subseteq\al D..$
\begin{cor}
\label{cor4.1}
We have that $\{\of,\al G./\al K.,\tilde{\beta}\}$ is a Hilbert
system
$\{\of,\beta_{\al G.}\}$
w.r.t.
$\al G./\al K.$ iff
$\al D.\sim\rho_\gamma(\al D.)$
holds for all
$\gamma\in\wh{\al G./\al K.}.$
In particular, if
$\al D.\sim\rho_{\gamma}(\al D.)$
holds for all
$\gamma\in\wh{\al G.}$
then
$\al G./\al K.\cong\al G.$
i.e. $\al K.$ is trivial.
\end{cor}
Whilst the condition $\al D.\sim\rho\s\gamma.(\al D.)$
is exact for
$\al H._\gamma\subset\of,$ it may not be in practice
that easy to verify.
We therefore consider alternative conditions which will
allow the main structures involved with Hilbert extensions
to survive the restriction of
$\HS$ to $\{\of,\,\beta\s{\al G.}.\}.$
Recalling the definition of subobjects, introduce the notation
$E\simeq \un({\rm mod}\,\al A.)$
for a projection $E\in\al A.$ to mean that
there is an isometry $V\in\al A.,$ $V^*V=\un$ such that
$VV^*=E$ (i.e. Murray--Von Neumann equivalence of $E$ and $\un).$
\begin{defi}
We say the constraint set $\al C.\subset\al A.$ is an
{\bf E--constraint set} if for each projection $E\in\al O.$
such that $E\simeq \un({\rm mod}\,\al A.),$ we have
that $E\simeq \un({\rm mod}\,\al O.).$
\end{defi}
The E-constraint condition will ensure the
survival of decomposition relations of restrictable canonical
endomorphisms:
\begin{pro}
\label{pro.4.7}
Let
$\HS$ be a Hilbert system and let
$\al C.\subset\al O.$ be an E--constraint set,
$\sigma\in\ob\al T.$
and
$\al H._\sigma\subset\of$
a
$\al G.$-invariant
algebraic Hilbert space. Then
\begin{itemize}
\item[(i)] to each decomposition
\[
\sigma(\cdot)=\sum_jV_j\rho\s\gamma_j.(\cdot)
V_j^*\;,\qquad V_j\in(\rho\s\gamma_j.,\,\sigma)\s{
\al A.}.\;,
\]
where $\gamma_j\in\wh{\al G.}$ and $V_j\in\al A.$ are isometries,
there corresponds a decomposition on
$\al O.,$ i.e.
there are
$\al G.$-invariant
algebraic Hilbert spaces
$\al K._j\subset\of,$
which carry the representation $\gamma_j$ and
with canonical endomorphisms $\tau_j
:=\rho_{\al K._{j}}\rest\al O.\in\endo\al O.$
such that
on $\al O.:$
\[
\sigma(\cdot)=\sum_jW_j\tau_j(\cdot)
W_j^*\;,\qquad W_j\in(\tau_j,\,\sigma)\s{
\al O.}.\;,
\]
where $W_j\in\al O.$ are isometries.
\item[(ii)]
Let
$\{\al F.,\al G.\}$
in addition satisfies Property B and let
$\tau<\sigma\in\al T.$ in the sense of $\al A.,$
i.e. there is an isometry $V\in{(\tau,\,\sigma)\s{\al A.}.},$
and let $\al H._\sigma\subset\of.$
Then
there is a corresponding Hilbert space
$\al H._\tau\subset \of$ i.e.
$\tau\rest\al O.<\sigma\rest\al O.\in\endo\al O.$
also in the sense of $\al O..$
\end{itemize}
\end{pro}
\begin{teo}
\label{tensrep}
Let
the Hilbert system
$\HS$
satisfy Property B
where $\al G.$ is a group
with a distinguished
irreducible representation $\gamma_0\in\wh{\al G.}$
such that every irreducible representation of $\al G.$
is contained in a tensor representation of $\gamma_0.$
Let $\al C.\subset\al A.$ be an E--constraint set
then
$\al H.\s\gamma_0.\subset\of$ implies that
$\{\of,\beta\s{\al G.}.\}$ is a Hilbert system.
\end {teo}
\begin{beweis}
This follows from Proposition~\ref{pro.4.7}, by making use of the
obvious fact that $\al H._\tau\subset\of\supset\al H._\sigma$
implies that $\al H._\tau\cdot\al H._\sigma\subset\of$
for $\sigma,\;\tau\in\ob\al T.\,.$
\end{beweis}
If the group
$\al G.$
is isomorphic to $U(N)$ then it
satisfies the condition of Theorem~\ref{tensrep}.
The property of being an E--constraint set can be
characterized in terms of the open projection
$P\in\al A.''$ corresponding to the
constraints (cf. Theorem~\ref{Teo.2.7}).
Observe that if there is an $E\in\al O.$
with $E\simeq\un({\rm mod}\,\al A.),$
then the set of isometries
\[
\al V._E:=\set V\in\al A., VV^*=E,\quad V^*V=\un.
\]
is nonempty. We have:
\begin{pro}
Let $E\in\al O.$
with $E\simeq\un({\rm mod}\,\al A.),$ then $\al V._E\cap\al O.\not=
\emptyset$ iff for each $V\in\al V._E$ there is a
\[
U\in \al U._E:=\set U\in\al A., U^*U=E=UU^*.
\]
such that $VPV^*=UPU^*.$
\end{pro}
\subsection{Morphisms of general Hilbert systems.}
\label{morphsec}
Recall that the second step in the enforcement of constraints, is
the factoring $\of\to\rf:=\of/\df.$ We now consider
problem {(II)}, the factoring problem, first in a general
context. Consider a morphism of
C*--algebras $\xi:\al F.\to\al L.=\xi(\al F.).$
This specifies the subgroup of
automorphisms
\[
\autx\al F.:=\set\alpha\in\aut\al F.,\alpha(\ker\xi)\subseteq
\ker\xi.
\]
and a homomorphism $\autx\al F.\to\aut\al L.$ by
$\alpha\to\alpha^\xi$ where $\alpha^\xi(\xi(F)):=
\xi(\alpha(F))$ for all $F\in\al F..$
Henceforth let $\HS$ be a Hilbert system with Property B
and ${\al G.}\subset\autx\al F..$
Our task will be to find the best conditions to
ensure that $\{\al L.,\,\al G.^{\xi}\}$
is a Hilbert system associated with a category
described in Theorem~\ref{Teo1}.
We will denote the spectral projections
of $\al G.$ (resp. $\al G.^\xi)$ by $\Pi_\gamma$
(resp. $\Pi^\xi_\gamma).$
(Recall that in the context of the T--procedure, we have that
$\al G.$ preserves $\df$ due to the invariance of the constraints
under $\al G..$ So the current analysis applies).
\begin{teo}
\label{Teo.4.3}
Given a Hilbert system $\HS$
and a unital
morphism $\xi:\al F.\to\al L.=\xi(\al F.),$
such that ${\al G.}\subset\autx\al F.,$ then
we have:
\begin{itemize}
\item[(i)] $\{\al L.,\,\al G.^\xi\}$ is a Hilbert system
and $\al G.\cong\al G.^{\xi}.$
\item[(ii)] If $\al H._\gamma\subset\Pi_\gamma\al F.$
is an invariant algebraic Hilbert space
for $\al G.,$
then so is $\xi(\al H._\gamma)\subset\Pi^\xi_\gamma\al L.$
for $\al G.^\xi.$
\item[(iii)] Let $\al N._\gamma$ be any
orthonormal basis for $\xi(\al H._\gamma),$
then $\bigcup\set\al N._\gamma,\gamma\in\wh{\al G.}.$ is a
left module basis of $\xi(\al F._{\rm fin})$ w.r.t.
$\xi(\al A.),$ i.e. the ``essential part'' of $\xi$
is its action on $\al A..$
\item[(iv)] The fixed point algebra of $\al L.$
w.r.t.
$\al G.^{\xi}$
is exactly $\xi(\al A.),$ and
$\xi(\al F._{\rm fin})=\al L._{\rm fin}\;.$
\item[(v)] If $\HS$ has Property B, so does
$\{\al L.,\,\al G.^\xi\}.$
\end{itemize}
\end{teo}
Thus corresponding to the two Hilbert systems
$\HS$ and $\{\al L.,\al G.^{\xi}\}$
we now have the two categories $\al T.$ and
$\al T.^\xi$ respectively. Moreover:
\begin{cor}
\label{Cor.4.9}
Under the conditions of Theorem~\ref{Teo.4.3} we have that
\begin{itemize}
\item[(i)]
for any canonical endomorphism $\lambda\in\ob\al T.,$
\[
\lambda(\ker\xi\cap\al A.)\subseteq\ker\xi\cap\al A.\;.
\]
Hence there is a well--defined map
$\ob\al T.\ni\lambda\to\lambda^\xi\in\ob\al T.^\xi,$
given by $\lambda^\xi(\xi(A)):=\xi(\lambda(A))$ for all
$A\in\al A..$
\item[(ii)] the map $\ob\al T.\ni\lambda\to\lambda^\xi\in\ob\al T.^\xi$
is compatible with products, direct sums and subobjects.
It also preserves unitary equivalence.
\end{itemize}
\end{cor}
We have that $\big(\ob\al T.\big)^\xi\subseteq\ob\al T.^\xi,$
and we now claim that up to unitary equivalence, we have in fact
equality:
\begin{teo}
\label{Teo.4.4}
Under the conditions of Theorem~\ref{Teo.4.3} we have that
\begin{itemize}
\item[(i)]
if $\sigma\in\ob\al T.^\xi,$ then there is always a
$\lambda\in\ob\al T.$ such that $\lambda^\xi$ is unitarily
equivalent to $\sigma,$ i.e. each unitary equivalence class in
$\ob\al T.^\xi$ contains at least one element of the form
$\lambda^\xi.$
\item[(ii)]
the map $\ob\al T.\ni\lambda\to\lambda^\xi\in\ob\al T.^\xi$
produces an isomorphism between the sets of unitary equivalence
classes of $\ob\al T.$ and $\ob\al T.^\xi$ which
is compatible with products direct sums and subobjects.
\end{itemize}
\end{teo}
The relation between the arrows of the two categories
is however less direct:
\begin{lem}
\label{arrow1}
Under the conditions of Theorem~\ref{Teo.4.3} we have
\[
\xi\big((\sigma,\,\tau)_{\al A.}\big)\subseteq
\big(\sigma^\xi,\,\tau^\xi\big)\s{\xi(\al A.)}.\;.
\]
\end{lem}
Next we show that $\ker\xi$ is uniquely
determined by $\ker\xi\cap\al F._{\rm fin}.$
\begin{pro}
\label{Prop.4.12}
Under the conditions of Theorem~\ref{Teo.4.3} we have that
\begin{itemize}
\item[(i)]
$\ker\xi\cap\al F._{\rm fin}=
{\rm Span}\set(\ker\xi\cap\al A.)\al H._\gamma,
\gamma\in\wh{\al G.}.\;,$
\item[(ii)]
$\ker\xi=\clo\s{\vert\cdot\vert_{\al A.}}.
(\ker\xi\cap\al F._{\rm fin})
\cap\al F.\;.$
\end{itemize}
\end{pro}
Thus $\ker\xi$ is in fact uniquely determined by $\ker\xi\cap\al A.,$
as is already suggested by Theorem~\ref{Teo.4.3}(iii).
Since $\al F.$ is in general not complete w.r.t. $|\cdot|_{\al A.},$
the intersection with $\al F.$ in \ref{Prop.4.12}(ii) is necessary.
Theorem~\ref{Teo.4.3} suggests that we consider the following
subcategory
of
$\al T.^{\xi}$.
\begin{defi}
\label{CatXT}
The subcategory
$\xi(\al T.)$
of
$\al T.^{\xi}$
is defined by the objects
\[
\ob\xi(\al T.):=(\ob\al T.)^{\xi}
\]
and the arrows
\[
(\sigma^{\xi},\tau^{\xi})_{\xi(\al A.)}^{(0)}:=
\xi((\sigma,\tau)_{\al A.}).
\]
\end{defi}
By Theorem~\ref{Teo.4.4} the sets of all unitary
equivalence classes of
$\hbox{Ob}\,\xi(\al T.)$
and
$\hbox{Ob}\,\al T.^{\xi}$
coincide, each equivalence class of
$\hbox{Ob}\,\xi(\al T.)$
is a subset of the corresponding equivalence class of
$\hbox{Ob}\,\al T.^{\xi}$,
but in general these equivalence classes are much larger.
Lemma~\ref{arrow1} says that the arrow sets
$(\sigma^{\xi},\tau^{\xi})_{\xi(\al A.)}$
of the objects of
$\hbox{Ob}\,\xi(\al T.)$
considered as objects of
$\hbox{Ob}\,\al T.^{\xi}$
are in general larger than the corresponding arrow sets in
$\xi(\al T.)$.
The reason is that an element
$X=\xi(Y),\,Y\in\al A.,$
belongs to
$(\sigma^{\xi},\tau^{\xi})_{\xi(\al A.)}$
iff
$Y\sigma(A)-\tau(A)Y\in\ker\,\xi$
for all
$A\in\al A.$.
The arrow sets coincide only if this relation already implies
$Y\sigma(A)-\tau(A)Y=0.$
\subsection{Morphisms of minimal and regular Hilbert systems }
Recall now that by Theorems \ref{Teo1} and \ref{Teo2} we have an
equivalence between
minimal and regular Hilbert systems
with Property B
and the endomorphism
category $\al T.$ with an admissible
subcategory $\al T._\C.$
We called a subcategory $\al T._\C$
{\it admissible} if it satisfies conditions P.1--P.2 in Theorem~\ref{Teo1}.
As in the last subsection, we consider a unital morphism
$\xi:\al F.\to\al L.=\xi(\al F.),$ and recall by Proposition~\ref{Prop.4.12}
that $\xi$ is determined by its action on $\al A..$
Now whilst it is obvious that $\xi(Z(\al A.))\subseteq Z(\xi(\al A.)),$
we require below the stronger condition:
\begin{equation}
\label{ZZ}
\xi(Z(\al A.))=Z(\xi(\al A.))\;.
\end{equation}
When $\xi(\al A.)$ is a simple C*--algebra (as we require for
the final observables after a T--procedure), the condition~(\ref{ZZ})
will be satisfied.
\begin{teo}
\label{Teo.4.13}
Given a minimal and regular Hilbert system $\HS$
with Property B,
and a unital morphism $\xi:\al F.\to\al L.=\xi(\al F.)$
such that ${\al G.}\subset\autx\al F.$ and condition~(\ref{ZZ})
holds, then:
\begin{itemize}
\item[(i)] there is a DR- subcategory
$\al T.^\xi_\C$ of $\xi(\al T.)$,
\item[(ii)] property P.2 is satisfied for $\al T.^\xi_\C$
iff
$\xi(\al A.)'\cap\xi(\al F.)=\xi(Z(\al A.)).$
In this case the subcategory $\al T.^\xi_\C$
is admissible.
\item[(iii)] If $\xi(\al A.)'\cap\xi(\al F.)=\xi(Z(\al A.)),$
then
\[
\big(\sigma^\xi,\,\tau^\xi\big)\s{\xi(\al A.)}.
= \xi\big((\sigma,\,\tau)\s{\al A.}.\big)
\]
for all $\sigma,\;\tau\in\ob\al T.,$ where we made use of the notation
and result in Corollary~\ref{Cor.4.9}.
\item[(iv)] In this case choose
$\al H._{\gamma}\in\ob\al T._{\al G.}\,.$
Then
\[
\al M.^{\xi}:=\set{\rho\s{\xi(\al H._{\gamma})}.},{\gamma\in\wh{\al G.}}.
\subset\ob\xi(\al T.)
\]
is a complete system of (irreducible) and mutually disjoint
objects of
$\ob\xi(\al T.).$
\end{itemize}
\end{teo}
\subsection{The inverse problem.}
\begin{teo}
\label{Teo.4.14}
Let $\al A.$ be a unital C*--algebra with Property B, and let $\al T.$ be
a C*-tensor
category of
unital endomorphisms of
$\al A.$ .
Let
$\al T.$ have an
admissible subcategory
$\al T._{\C}$
whose arrow spaces are denoted by
$(\sigma,\tau)_{\C}$.
Furthermore, let $\xi$
be a unital morphism of $\al A.$ such that
\begin{itemize}
\item[(i)]
$\xi(Z(\al A.))=Z(\xi(\al A.)),$
\item[(ii)]
$\lambda(\ker\xi)\subseteq\ker\xi$ for all $\lambda\in\ob\al T..$
Thus we can define endomorphisms $\lambda^\xi\in\endo\xi(\al A.)$ by
$\lambda^\xi\big(\xi(A)\big):=\xi\big(\lambda(A)\big)$ for all $A\in\al A.$
and a category
$\xi(\al T.)$
with objects
\begin{equation}
\label{Obxi}
\ob\,\xi(\al T.):=\set{\lambda^\xi},{\lambda\in\ob\,\al T.}.
\end{equation}
and arrows
$(\sigma^{\xi},\tau^{\xi})_{\xi(\al A.)}$,
which is closed w.r.t. direct sums and products.
\item[(iii)]
$\xi\big((\sigma,\,\tau)_{\al A.}\big)=
\big(\sigma^\xi,\,\tau^\xi\big)\s{\xi(\al A.)}.$ for all
$\sigma,\;\tau\in\ob\al T..$
\end{itemize}
Then there is a subcategory
$\al T.^{\xi}_{\C}$
of
$\xi(\al T.)$
with
$\ob\al T.^{\xi}_{\C}=\ob\xi(\al T.)$
which is admissible for
$\xi(\al T.).$
Thus by Theorem \ref{Teo2} there are Hilbert
extensions $\al F.$ and $\al F.^\xi$
corresponding to $\al T.$ and $\xi(\al T.)$ repectively.
Moreover, the Hilbert extension $\al F.^\xi$ of $\xi(\al A.)$ can be chosen
in such a way that it is the homomorphic image of $\al F.$ under
a morphism which is an extension of $\xi.$
That is, $\al F.^\xi=\wt\xi(\al F.)$ where $\wt\xi$ is a morphism
of $\al F.$ such that $\wt\xi(A)=\xi(A)$ for all $A\in\al A..$
\end{teo}
\begin{rem}
A posteriori, the set of objects $\ob\xi(\al T.)$ defined in (\ref{Obxi})
could be enlarged by filling up the unitary equivalence classes of
each $\lambda^\xi$ by {\it all} $\tau$ with
$\tau=\Ad V\circ\xi(\lambda),$ where $V\in\xi(\al A.)$ is unitary.
This corresponds to the objects of the category
$\al T.^\xi$
of Definition~\ref{CatXT}
In this case we also have to add additional arrows, so if
$\tau_i=\Ad V_i\circ\xi(\lambda_i),$ $i=1,2,$ then we also need
\[
(\tau_1,\,\tau_2)\s{\xi(\al A.)}.:=
V_2\big(\tau_1^\xi,\,\tau_2^\xi\big)\s{\xi(\al A.)}.V_1^{-1}\;.
\]
However, for the application of Theorem~\ref{Teo2} this is not
necessary.
\end{rem}
\subsection{Superselection structures left after constraining.}
Recall that the enforcement of constraints by T--procedure produces a
final physical algebra $\al R..$ This algebra is usually assumed to be simple;-
if it is not, then the physics is not fully defined,
and one should extend the constraint
set $\al C.\subset\al A.$ to make $\al R.$ simple (the choice of the extension
needs to be physically motivated).
In the previous subsections we examined which conditions need to be satisfied
by a Hilbert extension ${\{\al F.,\,\al G.\}}$ of $\al A.$ for its structure
to pass through the two parts of the T--procedure.
Here we combine these to produce conditions on the initial system which will
ensure that we obtain a Hilbert extension of $\al R..$
We will also examine when this final Hilbert extension is regular
(and this produces then a DR--category via simplicity of $\al R.).$
\begin{teo}
\label{HExR}
Let ${\{\al F.,\,\al G.\}}$ be a Hilbert extension of $\al A.,$ and let
$\al C.\subset\al A.$ be a first-class constraint set such that
$\al D.\sim\rho_\gamma(\al D.)$
holds for all
$\gamma\in\wh{\al G./\al K.}.$
Then ${\{\al R.\s{\al F.}.,
\,\beta\s{\al G.}.\}}$
is a Hilbert extension of $\al R.,$ where $\al R.\s{\al F.}.
=\xi(\al O.\s{\al F.}.),$
and $\xi$ is the factor map $\al O.\s{\al F.}.
\to \al O.\s{\al F.}.\big/\al D.\s{\al F.}..$
\end{teo}
\begin{beweis}
By Corollary~\ref{cor4.1} it follows from the hypotheses that
${\{\al O.\s{\al F.}.,\,\beta\s{\al G.}.\}}$
is a Hilbert extension of $\al O..$
Since the constraint set $\al C.\subset\al A.$ is $\al G.\hbox{--invariant,}$
we have that $\alpha(\al D.\s{\al F.}.)=\al D.\s{\al F.}.$
for all $\alpha\in\beta\s{\al G.}.\subset\aut\al O.\s{\al F.}.,$
i.e. $\beta\s{\al G.}.\subset\autx\al O.\s{\al F.}..$ (Recall the discussion
in the introductory part of Section~4).
Thus by Theorem~\ref{Teo.4.3} it follows that
$(\beta\s{\al G.}.)^\xi\cong\beta\s{\al G.}.,$ and that
\[
\left\{\xi\big(\al O.\s{\al F.}.),\,(\beta\s{\al G.}.)^\xi\right\}
=\left\{\al R.\s{\al F.}.,\,\beta\s{\al G.}.\right\}
\]
is a Hilbert extension of $\al R.=\xi(\al O.).$
\end{beweis}
Next, we would like to examine when a
Hilbert extension as in Theorem~\ref{HExR}
will produce a
minimal and regular Hilbert extension of $\al R.$
(with Property B).
First recall the requirement for a Hilbert system
$\{\al F.,\,\al G.\}$ to be regular:
there is an
assignment $\sigma\to\al H._\sigma$ from $\ob\al T.$ to
$\al G.$-invariant algebraic Hilbert spaces
in $\al F.$ such that
\begin{itemize}
\item[(i)] $\sigma=\rho\s{\al H._\sigma}.,$
i.e. $\sigma$ is the canonical endomorphism of $\al H._\sigma,$
\item[(ii)] $\sigma\circ\tau\to\al H._\sigma\cdot\al H._\tau\;,$
\end{itemize}
that is, the assignment is compatible with products.
We now want to check whether this property also survives the
map $T:\{\al F.,\,\al G.\}\longrightarrow
{\{\al R.\s{\al F.}.,\,\beta\s{\al G.}.\}}. $
\begin{pro}
\label{Tsat}
Let $\al T.$
satisfy regularity. Let
$\al D.\sim\rho_\gamma(\al D.)$
for all
$\gamma\in\wh{\al G./\al K.},$ then
${\{\al R.\s{\al F.}.,\,\beta\s{\al G.}.\}}$
satisfies regularity, i.e.
there is an
assignment $\sigma\to\al H._\sigma$
such that
\begin{itemize}
\item[(i)] $\sigma=\rho\s{\al H._\sigma}.,$
i.e. $\sigma$ is the canonical endomorphism of $\al H._\sigma,$
\item[(ii)] $\sigma\circ\tau\to\al H._\sigma\cdot\al H._\tau\;.$
\end{itemize}
\end{pro}
\begin{beweis}
Given the assignment $\sigma\to\al H._\sigma$ in $\al F.,$
then whenever $\sigma=\rho_{\gamma},$ $\gamma\in\wh{\beta\s{\al G.}.}$
we have
\[
\sigma\to\al H._\sigma\subset\al O.\s{\al F.}.\longrightarrow
\al R.\s{\al F.}.
\]
where the last map is $\xi,$ so the assignment which we take for
this proposition is $\sigma\to\xi(\al H._\sigma).$
Then (i) and (ii) are automatic.
\end{beweis}
Second, we consider Property B.
\begin{pro}
Let
$\{\al F.,\al G.\}$ satisfy Property B, let $\al G.$ be nonabelian and
$\al C.\subset\al A.$
be an E-constraint set. If
$\al D.\sim\rho_{\gamma}(\al D.)$
for all
$\gamma\in \wh{(\al G./\al K.)},$
then
$\{\al O._{\al F.},\beta_{\al G.}\}$
satisfies Property B.
\end{pro}
\begin{beweis}
First
$\{\al O._{\al F.},\beta_{\al G.}\}$
is a Hilbert extension of
$\al O.$
w.r.t.
$\al G./\al K.$
because of Corollary~\ref{cor4.1}. Choose an
$\al G.\hbox{-invariant}$ Hilbert space
$\al H.\subset\al O._{\al F.}\subset\al F.$
which is not irreducible, i.e. there is
a projection
$E\in\al J.(\al L._{\al G.}(\al H.)),\,0<E<\un.$
Then one has
$E\in (\rho_{\al H.},\rho_{\al H.})_{\al A.}\subset
(\rho_{\al H.}\rest\al O.,\rho_{\al H.}\rest\al O.)_{\al O.}\subset\al O.$
by Theorem~\ref{Teo.4.2}(ii).
By Property B we get closure under subobjects, so there is a
$V\in\al A.,\,V^{\ast}V=\un,\,VV^{\ast}=E.$
In other words,
$E\cong\un(\hbox{mod}\,\al A.).$
Similarly we obtain
$\un-E\cong\un(\hbox{mod}\,\al A.).$
Since
$\al C.$
is an E-constraint set and $E\in\al O.$ we get that
$E\cong\un(\hbox{mod}\,\al O.)$
and
$\un-E\cong\un(\hbox{mod}\,\al O.)$
and this is the assertion.
\end{beweis}
Finally, we need to consider whether the requirement
\[
\al A.'\cap\al F.=Z(\al A.)
\]
passes through the T-procedure.
In full generality, this is a very hard
problem, because both stages of the T-procedure can eliminate or create
elements of $\al A.'.$
In fact, since $\al A.'\cap\al F.\subset\al D.'\cap\al F.\subset
\al O.\s{\al F.}.$ and $Z(\al A.)\subset Z(\al O.),$
we can only deduce from $\al A.'\cap\al F.=Z(\al A.)$
that $\xi(\al A.'\cap\al F.)=\xi(Z(\al A.)).$
On the other hand,
$\al R.'\cap\al R.\s{\al F.}.=Z(\al R.)$ iff
\[
A\in\al O.\s{\al F.}.\quad\hbox{and}\quad [A,\,\al O.]
\subset\al D.\s{\al F.}.\quad\hbox{implies}\quad
A\in \al O.+\al D.\s{\al F.}.\,
\]
which can be true in general for more
elements than those in $\xi(\al A.'\cap\al F.).$
We do have from Theorem~\ref{Teo.4.2} and Proposition~\ref{disjZ}
the following condition:
\begin{pro}
Let
$\HS$
be a minimal Hilbert extension of
$\al A.,$ and let $\al C.\subset\al A.$ be
a first-class constraint set such that
$\al D.\sim\rho_\gamma(\al D.)$
holds for all
$\gamma\in\wh{\al G./\al K.}.$
If the disjointness of
canonical endomorphisms survives the restriction to
$\al O.$
then the Hilbert system
$\{\of,\beta_{\al G.}\}$
is minimal, i.e.
$\al O.'\cap\of=\al Z.(\al O.)$.
\end{pro}
\section{Example}
It is difficult to produce interesting worked examples
in the current state of the theory. The problem is that in almost all
theories of physical significance, the canonical endomorphisms
$\rho_\gamma$ are not known explicitly, and so one cannot
check the compatibility conditions with the constraints
explicitly (cf. Corollary~\ref{cor4.1}).
Here we give an example which is extracted from QED, so it may have
some physical interest. It consists of a fermion in an Abelian gauge
potential. Since the global gauge group $\al G.$
is abelian, the superselection theory simplifies radically.
However, we have explicit endomorphisms $\rho_\gamma$ and can check the
compatibility conditions with the constraints.
Nevertheless, even at this simple level, it is not possible to verify all the
conditions of regularity. We will not treat the issue of dynamics.
\subsection{Constraint structure of QED}
We start with a discussion of the set--up of QED
in order to motivate our subsequent example.
The starting point for QED, is a fermion field $\psi$ in $\R^4$ satisfying
the free CARs, and a $U(1)\hbox{--gauge}$ potential $A$ in $\R^4$ satisfying
free CCRs, and initially these are assumed to commute. So the
appropriate C*-algebraic framework at this initial level is
\[
\al B.:={\rm CAR}(\al H.)\otimes{\rm CCR}(S,\,B)
\]
where $\al H.=L^2(\R^4,\,\C^4),$ $S=\al S.(\R^4,\,\R^4)\big/\ker B,$
and $B$ denotes the symplectic form for QEM, coming from the
Jordan--Wigner distribution, cf. Sect~5 of \cite{Lledo}.
(Note that the tensor product $\al B.$
is unique because ${\rm CAR}(\al H.)$ is a nuclear algebra.)
There is a global charge $Q$ acting on ${\rm CAR}(\al H.)$
and there are constraints in the heuristic theory:
\begin{eqnarray*}
{A_\mu}^{,\,\mu}(x)&:=&0 \quad\qquad\hbox{(Lorentz condition)} \\[1mm]
\hbox{and}\quad\qquad
\Box A_\mu&:=&j_\mu \quad\qquad\hbox{(Maxwell equation)}
\end{eqnarray*}
where $j_\mu:=-e\wt\psi\gamma_\mu\psi$ is the electron current,
and we denote $\wt\psi:=\psi^*\gamma_0.$
The Lorentz condition has been treated in the C*--algebra context
(cf.~\cite{Lledo}) and it needs special treatment, e.g. indefinite metric
or nonregular states, but it is not very interesting for us, since it
only affects the electromagnetic field ${\rm CCR}(S,\,B),$ hence
is independent of the charge $Q.$
The Maxwell equation is more interesting, since it involves both
factors of $\al B.$ and it expresses the interaction between the
two fields. It is however very difficult to enforce in the
C*--algebra context (and ultimately leads to the
conclusion that $\al B.$ is too
small an algebra to do this in). Naively, it seems that we can
easily realise both sides of the Maxwell equation in
the present C*--setting:
smear the left-hand side over $\al S.(\R^4,\,\R^4)$
\[
\int\Box A_\mu(x)\,f^\mu(x)\,dx=\int A_\mu\Box f^\mu dx
=A(\Box f)
\]
then this is realised in ${\rm CCR}(S,\,B)$ through the identification
of the generating Weyl unitaries $\delta_h$ with
the heuristic $\exp iA(h)$ where $h=\Box f.$
If we smear the right-hand side
of the Maxwell equation:
\[
j(f)=-e\int\wt\psi(x)\gamma_\mu\psi(x)f^\mu(x)\, dx\;,
\]
then $j(f)$ generates a Bogoliubov transformation $T_f$ on
$L^2(\R^4,\,\C^4)$ by:
\begin{eqnarray*}
\Ad\big(\exp ij(f)\big)\psi(g)&:=&\left(\exp i\ad j(f)\right)\big(\psi(g)\big)\\[1mm]
&=&\psi(T_fg)=:\alpha\s T_f.(\psi(g))
\end{eqnarray*}
where $\alpha\s T_f.$ is its associated automorphism on
${\rm CAR}(\al H.)$
(we will calculate $T_f$ explicitly in a simplified setting below).
Let $G\subset\aut\al B.$ be the discrete group generated in
$\aut\al B.$ by
\[
\set\beta_f:=\alpha\s T_f.\otimes\iota, f\in{\al S.(\R^4,\,\R^4)}.
\]
and let $\nu$ denote its action on $\al B..$ Define the crossed product
\[
\al E.:=G\cross\nu.\al B.={\rm C}^*\set{\al B.,\,U_g},
U^*_g=U_g^{-1},\; \nu_g=\Ad U_g,\; U_gU_h=U_{gh},\;g,h\in G.
\]
then we identify the heuristic objects $\exp ij(f)$ with the implementing
unitaries $U\s\beta_f..$ So each side of the Maxwell equation has a C*--realisation,
and we only need to decide how to impose the constraint equation.
Heuristically, the Maxwell equations are imposed as state conditions:
$A(\Box f)\phi = j(f)\phi$ for vectors $\phi$ in the representing
Hilbert (or Krein) space.
If we take instead the stronger condition
$A(\Box f)^n\phi = j(f)^n\phi$ for $n\in\N,$ then we can rewrite
the constraint conditions in the form ${e^{iA(\Box f)}\phi}=
{e^{ij(f)}\phi}.$ This suggests that we choose constraint
unitaries $V_f:=U\s -\beta_f.\cdot\delta\s\Box f.$ in $\al E.$
and thus select our Dirac states $\omega$ on $\al E.$
by
\[
\omega(V_f)=1\qquad\forall\; f\in {\al S.(\R^4,\,\R^4)}.
\]
As one expects from the interaction, this program encounters problems:
\begin{itemize}
\item[(1)] We always have that $\Box f\in\ker B,$ hence $\Box f$
corresponds to zero in $S$ (since we factor out by $\ker B).$
This can be remedied by changing $S$ to ${\al S.(\R^4,\,\R^4)},$
in which case $(S,\,B)$ is a degenerate symplectic space.
This problem is connected to the fact that the heuristic smearing
formula
\[
A(f)=\int_{C_+}\left(a_\mu(\b p.)\wh{f}^\mu(p)
+a_\mu^+(\b p.)\bar{\wh{f}}^\mu(p)\right){d^3p\over p_0}
\]
cannot be correct for the interacting theory, since it implies that
$A(\Box f)=0\,,$ in contradiction with the Maxwell equation.
\item[(2)]
Interaction mixes the fermions and bosons, so it is unrealistic to expect that
the interacting fermion and boson fields will commute (as in the tensor
product structure
of $\al B.).$ Even worse, perturbation theory suggests that
the interacting fields need not be canonical, so the
assumption of the CCR and CAR relations
for the interacting bosons and fermions is problematic.
\end{itemize}
\subsection{Model for the interacting Maxwell constraint}
Inspired by the observations above, we now propose an example
which is a simplified version of the Maxwell constraint.
Heuristically, we want to impose a constraint of the form
\[
a^*(x)\,a(x)=LA(x)
\]
where $a(x)$ is a fermion field on $\R^4,$ $A$ is a boson field
and $L$ is a linear differential operator on $\al S.(\R^4).$
To realise this, together with a superselection structure
in a suitable C*--algebra setting, we present our construction
in six steps.\chop\medskip
STEP 1.\chop
\medskip\noindent
For the fermion field, let $\al H.=L^2(\R^4)$ and define ${\rm CAR}(
\al H.)$ in Araki's self-dual form (cf.~\cite{Ar}) as follows.
On $\al K.:=\al H.\oplus\al H.$ define an antiunitary involution
$\Gamma$ by $\Gamma(h_1\oplus h_2):=\ol h._2\oplus\ol h._1\;.$
Then ${\rm CAR}(\al H.)$ is the unique simple C*--algebra with
generators $\set\Phi(k),k\in{\al K.}.$ such that
$k\to\Phi(k)$ is antilinear, $\Phi(k)^*=\Phi(\Gamma k)\,,$
and
\[
\left\{\Phi(k_1),\,\Phi(k_2)^*\right\}=(k_1,\,k_2)\un\;,\qquad
k_i\in\al K.\;.
\]
The correspondence with the heuristic creators and annihilators
of fermions is given by $\Phi(h_1\oplus h_2)=a(h_1)+a^*(\ol h._2)\;,$
where
\[
a(h)=\int a(x)\,\ol h(x).\,d^4x\;,\qquad
a^*(h)=\int a^*(x)\, h(x)\, d^4x\;.
\]
\noindent STEP 2.\chop\medskip\noindent
For the boson field, let $S=\al S.(\R^4,\R),$
and let $K:S\to L^2(M,\mu)$ be a linear map, where $(M,\mu)$ is
a fixed measure space. Define a symplectic form on $S$ by
$B(f,g):={\rm Im}(Kf,\,Kg),$ where $(\cdot,\cdot)$ is the
inner product of $L^2(M,\mu).$ Note that $B$ is degenerate
if $\ker K$ is nonzero.
Define then ${\rm CCR}(S,\,B)=C^*\set\delta_f,f\in S.$
where the $\delta_f$ are unitaries satisfying the Weyl relations:
\[
\delta_f\cdot\delta_g=\delta\s f+g.\exp[iB(f,g)/2]
\]
i.e. ${\rm CCR}(S,\,B)$ is the $\sigma\hbox{--twisted}$
discrete group algebra of $S$ w.r.t. the two--cocycle
$\sigma(f,g):=\exp[iB(f,g)/2]\,.$
\chop\medskip
STEP 3.\chop
\medskip\noindent
To combine the bosons and fermions in one C*--algebra, we want to
allow for the possibility that they may not commute with each other,
hence we will not take the tensor algebra
${\rm CAR}(\al H.)\otimes{\rm CCR}(S,\,B)\,.$
However, we don't know what form their commutators should take,
so we start with the free C*--algebra $\al E.$
generated by ${\rm CAR}(\al H.)$ and ${\rm CCR}(S,\,B)\,.$
The free C*--algebra $\al E.$ seems to be big enough
to allow for possible interactions, but it is also likely to contain
redundant elements.
To be explicit, let $\al L.$ be the linear space spanned by
all monomials of the form $A_0B_0A_1B_1\cdots A_nB_n$ where
$A_i\in{\rm CAR}(\al H.)$ and $B_i\in{\rm CCR}(S,\,B)\,.$
Note that $\al L.$ is an algebra w.r.t. concatenation.
Factor out by the ideal generated by $\un\s{\rm CAR}.-
\un\s{\rm CCR}.$ and replace concatenation by multiplication
for any two elements in a monomial which are in the same
algebra (either ${\rm CAR}$ or ${\rm CCR}$) after the
factorisation.
Note that this will now produce all
possible monomials of elements in ${\rm CAR}(\al H.)$ and
${\rm CCR}(S,\,B)$ - just consider those monomials
in $\al L.$ with $A_0$ or $B_n$ the identity to obtain
all other monomials.
Now the resultant algebra $\al N.$ is a *--algebra with the involution
given by
\[
(A_0B_0\cdots A_nB_n)^*=B_n^*A_n^*\cdots B_0^*A_0^*\;.
\]
Form the enveloping C*--algebra $\al E.$ of $\al N.,$ i.e.
let
\[
\al I._0:=\bigcap\set\ker\pi,\pi\in
\hbox{Hilbert space representations of $\al N.$}.
\]
and set $\al E.:=\ol{\al N.\big/\al I._0}.$ where the closure
is w.r.t. the enveloping C*--norm, i.e.
\[
\|A\|:=\sup\set\|\pi(A)\|,\pi\in
\hbox{Hilbert space representations of $\al N.$}.\;.
\]
That $\al E.$ is nontrivial, follows from the fact that any
tensor product representation of ${\rm CAR}(\al H.)\otimes{\rm CCR}(S,\,B)$
defines a Hilbert space representation of $\al N.,$ hence it
follows that $\al E.$ is nonzero and that ${\rm CAR}(\al H.)$
and ${\rm CCR}(S,\,B)$ are faithfully embedded in $\al E.$
(as the images under the factorisation maps of the original
generating algebras in the construction).
Note that we have a surjective homomorphism $\zeta:\al E.\to
{{\rm CAR}(\al H.)\otimes{\rm CCR}(S,\,B)}$
given by
\[
\zeta(A_0B_0\cdots A_n B_n):= (A_0\cdots A_n)\otimes(B_0\cdots B_n)\;,
\quad A_i\in {\rm CAR}(\al H.),\; B_i\in{\rm CCR}(S,\,B)\,.
\]
Clearly the ideal $\al I._T$ of $\al E.$ generated by
the commutators $\big[{\rm CAR}(\al H.),\,{\rm CCR}(S,\,B)\big]$
is in $\ker\zeta.$ Since $\al E.$ probably contains redundant
elements, we do not require it to be simple.
$\zeta$ will be important in proofs below.
\chop\medskip
STEP 4.\chop
\medskip\noindent
Next, we would like to model in the curent C*--setting, the
global and local heuristic charges:
\[
Q=\int a^*(x)\,a(x)\,d^4x\,,\qquad
Q(f)=\int a^*(x)\,a(x)\,f(x)\,d^4x\,,\quad
f\in\al S.(\R^4,\R)\;.
\]
Let us calculate the Bogoliubov transformations which they induce:
\begin{eqnarray*}
&&\big[Q(f),\Phi(h_1\oplus h_2)\big] \\[1mm]
&=& \int\int\left[a^*(x)a(x)f(x),\,a(y)\ol h_1(y).+
a^*(y)\ol h_2(y).\right]\,d^4x\,d^4y \\[1mm]
&=& \int\int f(x)\bigg\{\Big(a^*(x)a(x)a(y)-a(y)a^*(x)a(x)\Big)
\ol h_1(y).\\[1mm]
&&\qquad+\Big(a^*(x)a(x)a^*(y)- a^*(y)a^*(x)a(x)\Big)\ol h_2(y).
\bigg\}d^4x\,d^4y \\[1mm]
&=& \int\int f(x)\bigg\{-\big\{a^*(x),\,a(y)\big\}a(x)\,\ol h_1(y).\\[1mm]
&&\quad \left(a^*(x)\big(\delta(x-y)-a^*(y)a(x)\big)
-a^*(y)a^*(x)a(x)\right)\ol h_2(y).\bigg\}\,d^4x\,d^4y\\[1mm]
&=&\int\int f(x)\bigg\{-\delta(x-y)\ol h_1(y).a(x) +
\delta(x-y)a^*(x)\ol h_2(y).\bigg\}\,d^4x\,d^4y\\[1mm]
&=& -a(\ol f.\cdot h_1)+a^*(f\cdot\ol h_2.)\\[1mm]
&=&\Phi(-\ol f.\cdot h_1\oplus\ol f.\cdot h_2)
=\Phi\big(f(-h_1\oplus h_2)\big)
\end{eqnarray*}
since $f$ is real. For the global charge $Q,$ just put
$f=1$ in the last calculation. Thus
\begin{eqnarray*}
\big(\ad Q(f)\big)^n\big(\Phi(h_1\oplus h_2)\big)
&=&\Phi\left(f^n\cdot\big((-1)^nh_1\oplus h_2\big)\right)\qquad
\hbox{hence:}\\[1mm]
\left(\Ad\big(\exp\,iQ(f)\big)\right)\left(\Phi(h_1\oplus h_2)\right)
&=& \Big(\exp\,i\,\ad Q(f)\Big)\left(\Phi(h_1\oplus h_2)\right)\\[1mm]
&=& \sum_{n=0}^\infty{\big(i\,\ad\,Q(f)\big)^n\over n!}
\left(\Phi(h_1\oplus h_2)\right)\\[1mm]
&=& \sum_{n=0}^\infty{i^n\over n!}\,\Phi\Big(f^n\big((-1)^n
h_1\oplus h_2\big)\Big)\\[1mm]
&=& \Phi\big(e^{-if}h_1\oplus e^{if}h_2\big)=:\Phi\big(T_f(h_1\oplus h_2)
\big)\;.
\end{eqnarray*}
Now $T_f$ is unitary on $\al K.,$ and satisfies ${[T_f,\,\Gamma]}=0$
hence it is a Bogoliubov transformation (cf.~p43 in \cite{Ar}), and
so we can define automorphisms on
${\rm CAR}(\al H.)$ by
\[
\wt\gamma_f\big(\Phi(k)\big):=\Phi(T_fk)\;.
\]
It is clear that $T_fT_g=T_{f+g}\,,$ hence that
$\wt\gamma:\al S.(\R^4)+\R\to\aut({\rm CAR}(\al H.))$
is a homomorphism.
We extend these automorphisms to maps $\gamma_f$ on $\al E.$ by setting
\[
\gamma_f\restriction {\rm CAR}(\al H.) =\wt\gamma_f\;,\qquad
\hbox{and}\qquad
\gamma_f\restriction {\rm CCR}(S,B) = \iota
\]
where $\iota$ is the identity map.
The only relations between ${\rm CAR}(\al H.)$ and
${\rm CCR}(S,B)$ in the free construction of $\al E.,$ is
$\un\s{\rm CAR}.=\un\s{\rm CCR}.,$ so since the definition of
$\gamma_f$ preserves this relation, it will extend to a well-defined
map on the free *--algebra $\al N..$
In fact, since $\gamma_f$ replaces ${\rm CAR}(\al H.)$
by an isomorphic one in a free construction, it will be
an automorphism on $\al N.,$
and so will define an automorphism on the enveloping algebra $\al E..$
Let $G$ denote the Abelian group generated in
$\aut\al E.$ by $\set\gamma_f,f\in{\al S.}(\R^4)\cup\R.$
and equip it with the discrete topology.
Denote its action by $\beta:G\to\aut\al E.,$ and define the algebra
\[
\al A.:=G\cross\beta.\al E.\;,
\]
then we identify the implementing unitaries $U_{\gamma_f}\in\al A.$ of
$\gamma_f\in\aut\al E.$ with the heuristic objects
$\exp iQ(f),$ $f\in {\al S.}(\R^4)\cup\R$ (in the case that
$f=t\in\R,$ we denote $Q(t)=tQ).$
Now $\gamma$ is a surjective homomorphism $\gamma:{\al S.(\R^4)+\R}
\to G$ and from the definitions above, it is clear that its kernel
is $2\pi\Z\subset\R,$ hence the discrete group $G$ is isomorphic to
$\al S.(\R^4)\times\T.$ Of course $\T$ will be our global gauge
group below.
\chop\medskip
STEP 5.\chop
\medskip\noindent
Next, we would like to realize in $\al E.$ the heuristic constraints
\[
Q(f)^n\psi=A(Lf)^n\psi\qquad\forall\;f\in{\al S.}(\R^4),\;\;
n\in\N
\]
where $L:S\to\ker K\subseteq\ker B$ is a given linear map.
First write the heuristic constraints in bounded form:
\[
e^{iQ(f)}\psi=e^{iA(Lf)}\psi\;,\quad\hbox{i.e.}\quad
e^{-iA(Lf)}e^{iQ(f)}\psi=\psi\;.
\]
So, given the identifications with heuristic objects above,
we define our constraint unitaries to be:
\[
\al U.:=\set\delta\s-Lf.\cdot U_{\gamma_f}=:V_f,f\in{\al S.}(\R^4,\R).
\subset\al A.\;.
\]
\begin{pro}
\label{FCU}
$\al U.$ is first--class.
\end{pro}
The proof is in the next section.
The heuristic constraint conditions now correspond to the
application of the T--procedure to $\al U..$
\chop\medskip
STEP 6.\chop
\medskip\noindent
Now we will specify the superselection structure associated with
the global charge $Q$ using
the fact that $Q$ must take integer values on
the vacuum state. Recall that the global gauge transformations
$\gamma\s t.\,,$ $t\in\R$ are implemented by the unitaries
$U\s\gamma_t.\in \al A.$ which we identify with the heuristic objects
$\exp itQ$ (cf. Step 3). For the superselection sectors
we need to find cyclic representations ${(\pi,\,\Omega)}$
such that
\[
\pi(U\s\gamma_t.)\Omega=e^{itn}\Omega\qquad\forall\;t\in\R
\]
and some $n\in\Z$ (the heuristic corresponding conditions
are $Q\Omega=n\Omega).$
We recognise these as constraint conditions for Dirac states
of the constraint unitaries:
\[
\al V._n:=\set V_t^{(n)}:=e^{-itn}U\s\gamma_t.,t\in\R.\;.
\]
Denote the sets of these Dirac states by
\[
{\got S}_D^{(n)}:=\set\omega\in{\got S}(\al A.),
\omega(V_t^{(n)})=1\quad\forall\;t\in\R.\,.
\]
These folia of states will be our superselection sectors.
\begin{lem}
\label{SectDisj}
With notation as above, we have:
\begin{itemize}
\item[(i)]
${\got S}_D^{(n)}\cap{\got S}_D^{(m)}=\emptyset$ if $n\not=m\;,$
\item[(ii)]
${\got S}_D^{(0)}\not=\emptyset\;.$
\end{itemize}
\end{lem}
\begin{beweis} (i)
If there is an $\omega\in{\got S}_D^{(n)}\cap{\got S}_D^{(m)}$
for $n\not=m,$ then
\begin{eqnarray*}
\omega\big(e^{-itn}U\s\gamma_t.\big)&=& 1\; =\;\omega\big(e^{-itm}U\s\gamma_t.\big) \\[1mm]
\hbox{so:}\qquad\omega\big(U\s\gamma_t.\big) &=& e^{itn}=e^{itm}\qquad\forall\;t
\end{eqnarray*}
which contradicts $n\not=m.$\chop
(ii) In the proof of Lemma~\ref{FCU} we constructed a state
$\omega_3\in{\got S}(\al A.)$ satisfying $\omega_3(U_g)=1$
for all $g\in G.$ If we take $g=\gamma\s t.,$ then this implies
that $\omega_3\in{\got S}_D^{(0)}.$
\end{beweis}
To connect with the usual machinery for superselection used above,
we need to exhibit the canonical endomorphisms (automorphisms in
the abelian case). We construct an action $\rho:\Z\to\aut\al A.$
such that its dual action on $\al A.^*$ satisfies
$\rho^*_k({\got S}_D^{(n)})={\got S}_D^{(n+k)}.$
\begin{defi}
\label{RhDf}
For each $k\in\Z$ define a *-automorphism $\rho_k$ of $\al A.$ by:
\begin{eqnarray*}
\rho_k(A)=A\quad\forall\;A\in\al E.;\qquad
\rho_k(U\s\gamma_t.)=e^{itk}U\s\gamma_t.\quad\forall\,t\in\R;\\[1mm]
\rho_k(U\s\gamma_f.)=U\s\gamma_f.\quad\forall\;f\in\al S.(\R^4)\,.
\end{eqnarray*}
\end{defi}
\begin{lem}
\label{RkWD}
$\rho_k$ is well--defined, and $\rho_k\in\aut\al A.\,.$
\end{lem}
The proof is in the next section.
Recall that for any $\alpha\in\aut\al A.$ we define its dual
$\alpha^*:\al A.^*\to\al A.^*$ by $\alpha^*(f):=f\circ\alpha$
for all functionals $f\in\al A.^*.$
\begin{pro}
With notation as above, we have $\rho^*_k({\got S}_D^{(n)})
={\got S}_D^{(n+k)}$ and ${\got S}_D^{(n)}\not=\emptyset$
for all $n\in\Z\;.$
\end{pro}
\begin{beweis}
Let $\omega\in\rho^*_k\big({\got S}_D^{(n)}\big),$
i.e. $\omega=\omega_n\circ\rho_k$ for some $\omega_n\in{\got S}_D^{(n)}.$
Thus
\[
\omega\left(e^{-it(n+k)}U_{\gamma\s t.}\right)
=\omega_n\left(e^{-it(n+k)}\rho_k\big(U_{\gamma\s t.}\big)\right)
=\omega_n\left(e^{-itn}U_{\gamma\s t.}\right) =1
\]
i.e. $\omega\in{\got S}_D^{(n+k)}\,.$
Conversely, for any $\omega\in{\got S}_D^{(n+k)}$ there is an
$\omega_n\in{\got S}_D^{(n)}$ for which
$\omega=\omega_n\circ\rho_k$ and it is obviously
$\omega_n=\omega\circ\rho_{-k}\,.$
Thus $\rho^*_k({\got S}_D^{(n)})
={\got S}_D^{(n+k)}.$
Since we have that ${\got S}_D^{(0)}\not=\emptyset,$
it is now immediate that ${\got S}_D^{(n)}=\rho^*_k({\got S}_D^{(0)})
\not=\emptyset\;.$
\end{beweis}
Recall from our earlier discussions that the canonical automorphisms
(Abelian case) must necessarily be outer on $\al A..$
\begin{pro}
\label{RhOut}
With notation as above, $\rho_k\in\out\al A.$ if $k\not=0\;.$
\end{pro}
The proof of this is long, and is in the next section.
From the action $\rho:\Z\to{\rm Out}\,\al A.$ we construct a
Hilbert extension (cf. Subsection~\ref{abelianHS}). First set
\[
\Lambda:=\set\Ad U\circ\rho_k,{U\in\al A.\;\hbox{unitary,}\;k\in\Z}.
\]
so $\Z\cong\Lambda\big/{\rm Inn}\,\al A.\;.$
So the class of $k\in \Z$ in $\Lambda\big/{\rm Inn}\,\al A.$
is $\chi\s k.:=\set\Ad U\circ\rho_k,{U\in\al A._u}.\,.$
Take the monomorphic section $\chi\s k.\to k,$
then it has a trivial cocycle $\sigma(n,\,m)=1$ for all $n,\,m\in\Z\,.$
Define $\al F.:=\Z\cross\rho.\al A.,$ then it has the dense *--algebra
\[
\al F._0:=\set\sum_{n\in F}A_nU^n,{A_n\in\al A.\,,\;
F\subset\Z\;\hbox{finite}}.
\]
where $U\in\al F.$ is the unitary
which implements $\rho_1,$ i.e. $\rho_1=\Ad U\restriction\al A.\,.$
Fix $t\in\T=\wh\Z$ and define an action
$\alpha:\T\to\aut\al F.$ by
\[
\alpha_t\left(\sum_{n\in F}A_nU^n\right)
:=\sum_{n\in F}A_nt^nU^n\qquad\hbox{on $\al F._0\;.$}
\]
Then the fixed point algebra of $\alpha$ is $\al A.\,.$
We verify the compatibility
condition in Corollary~\ref{cor4.1}:
\begin{pro}
$\rho_k(\al D.)\sim\al D.$ for all $k\in\Z\,.$
\end{pro}
\begin{beweis}
The constraint unitaries from which we define $\al D.$ are
$V_f:=\delta\s-Lf.\cdot U_{\gamma_f}\,,$ $f\in\al S.(\R^4)\,.$
By definition~(\ref{RhDf}) we have $\rho_k\restriction\al E.
=\iota\,,$ hence $\rho_k(\delta_{-Lf})=\delta_{-Lf}\,.$
Also $\rho_k(U_{\gamma\s f.}) = U_{\gamma\s f.}$
for all $f\in\al S.(\R^4)\,,$ hence
$\rho_k(V_f)=V_f$ for all $f\in\al S.(\R^4)\,.$
Thus $\rho_k$ preserves the Dirac states ${\got S}_D$
and hence $\rho_k(\al D.)=\al D.$ for all $k\in\Z\,.$
\end{beweis}
It remains to show that this Hilbert system is regular
and minimal.
However, at this stage we do not have a proof because little is known
about the ideal $\al I._0$ factored out in Step~3.
\section{Proofs}
\label{Proofs}
\subsection*{Proof of Theorem~\ref{Teo.4.1}}
{\bf (i)}
We have that
$\beta_g:=g\rest\of.$
The pointwise norm-continuity of
$\beta_{\al G.}$
follows from the pointwise norm-convergence topology of $\al G..$
So $\{\of,\al G.,\beta\}$ is a C*--dynamical system. Since
$\al A.$
is the fixed point algebra of
$\al G.$,
the fixed point algebra of
$\beta\s{\al G.}.$ is $\of\cap\al A..$
By Theorem~\ref{Teo.2.12} we have that
$\of\cap\al A.= \al O..$\chop
If $A\in Z(\al A.),$ then ${[A,\al C.]}=0,$ hence $A\in\al O.$
by Theorem~\ref{Teo.2.2}(iii), and from this it follows that
$Z(\al A.)\subseteq Z(\al O.).$ \chop
{\bf (ii)}
Now let
$\al H._{\gamma}\subset\Pi_{\gamma}\al F.$.
If there is a unit vector $\Phi\in\al H._\gamma\cap\of,$
then by invariance of $\al H._\gamma\cap\of$ under $\al G.,$
we also have $\al H._\gamma\cap\of\supset\spa(\al G.\Phi)
=\al H._\gamma,$ where the last equality follows from
irreducibility of the action of $\al G.$ on $\al H._\gamma.$
Thus $\al H._\gamma\cap\of \not=\{0\}$ implies that
$\al H._\gamma\subset\of,$
hence
$\al H._\gamma\subset\Pi_\gamma\of.$
To prove that
$\Pi_{\gamma}\of=\hbox{clo-span}\,(\al O.\al H._{\gamma})$
we follow the proof of Lemma 10.1.3 in ~\cite{BW}. First, since
$\al O.=\Pi_\iota\of$,
it follows that
$\al O.\al H._\gamma\subseteq\Pi_\gamma\of$
by Remark~\ref{remark1}(v).
By Evans and Sund~\cite{ES},
$\Pi_\gamma\of$ is the closed span of all the $\al G.\hbox{--invariant}$
subspaces $\al E.\subset\of$ such that
$\beta_\al G.$
acts on $\al E.$ as an element of $\gamma\in\wh{\al G./\al K.}.$
So for the reverse inclusion,
$\Pi_{\gamma}\of\subseteq\csp\{\al OH._\gamma\},$
it suffices
to show that $\spa\{\al OH._\gamma\}$ contains all
$\al G.\hbox{--invariant}$
subspaces
$\al E.\subset\of$
such that $\al G.$
acts on $\al E.$ as an element of $\gamma.$
Let $\{\Psi_1,\ldots,\,\Psi_d\},$ $d={\rm dim}\,\gamma$
be a basis of such an $\al E.$ under which the matrix representation
of the action of $\al G.$ is an element of $\gamma,$ i.e.
\[
g\Psi_i=\sum_j\lambda_{ji}(g)\,\Psi_j
\]
where the matrix $(\lambda_{ji}(g))$ is a unitary matrix representation
of $\al G.$ of the type $\gamma.$
Choose an orthonormal basis $\{\Phi_1,\ldots,\,\Phi_d\}$ of $\al H._\gamma$
which also transforms under $\al G.$ according to $(\lambda_{ji}(g)).$
Consider now the element $A:=\sum\limits_j\Psi_j\Phi^*_j\in\of.$ Then
\begin{eqnarray*}
g(A)&=&\sum_jg\left(\Psi_j\Phi^*_j\right)=
\sum_{i,\,k}\Big(\sum_j\lambda_{ij}(g)\,\ol\lambda_{kj}(g).\Big)
\Psi_i\Phi^*_k \\[1mm]
&=& \sum_{i,\,k}\delta_{ik}\Psi_i\Phi^*_k =\sum_j\Psi_j\Phi^*_j=A \,.
\end{eqnarray*}
Thus $A\in\al O.,$ and hence all $\Psi_i=A\Phi_i\in\al OH._\gamma$
i.e. $\al E.\subset\spa(\al OH._\gamma).$
\chop
{\bf (iii)}
Let $\al H._\sigma$ have an orthonormal basis $\{\Phi_1,\ldots\Phi_d\}$
hence $\rho_\sigma(F)=\sum\limits_{j=1}^d\Phi_jF\Phi_j^*$ for $F\in\al F.,$
$\rho_\sigma\rest\al A.=\sigma.$
Since $\{\Phi_j\}\subset\of=M(\df)$ it is clear that $\rho_\sigma$
preserves both $\df$ and $\of.$ Since $\rho_\sigma$ also preserves $\al A.,$
it preserves $\al D.=\df\cap\al A.$ and $\al O.=\of\cap\al A.,$
where these equalities come from Theorem~\ref{Teo.2.12}.
\subsection*{Proof of Theorem~\ref{Teo.4.2}}
\def\rh{\rho\s{\al H.}.}
{\bf (i)}
Let $\al H.\subset\of$ have an orthonormal basis $\{\Phi_j\}.$
By the same proof as for Theorem~\ref{Teo.4.1}(iii) we have that
$\rh(\al D.)\subseteq\al D..$ \chop
Since $\of$ is a *--algebra and the relative multiplier algebra of
$\df\supset\al D.,$ we have that
\begin{eqnarray*}
[\Phi^*_j,\, D]&\in &\df\quad\hbox{for all}\;D\in\al D.,\;j. \\[1mm]
\hbox{Thus:}\qquad
\Phi_j[\Phi^*_j,\, D]&\in &\Phi_j\df=\rh(\df)\Phi_j
\subset\csp(\rh(\df)\al F.) \\[1mm]
\hbox{i.e.}\qquad
D-\rh(D)&=&\sum_j\left(\Phi_j\Phi^*_jD-\Phi_jD\Phi_j^*\right)
\in\csp(\rh(\df)\al F.\,.) \\[1mm]
\hbox{So}\qquad
D&\in &\csp(\rh(\df)\al F.)\quad\hbox{for all}\; D\in\al D.\,.
\end{eqnarray*}
Thus we have shown that $\al D.\subset\csp(\rh(\df)\al F.),$
and now we would like to show that
${\csp(\rh(\df)\al F.)}={\csp(\rh(\al D.)\al F.)}.$
We have that
\[
\csp(\al CF.)=\csp(\al DF.)=\csp(\df\al F.),
\]
so if we apply $\rh$ to both sides of the last equation, multiply by
$\al F.$ on the right and take closed span, we get:
\begin{eqnarray*}
\csp\big(\rh(\al D.)\rh(\al F.)\al F.\big) &=&
\csp\big(\rh(\df)\rh(\al F.)\al F.\big) \\[1mm]
\hbox{i.e.}\qquad
{\csp(\rh(\df)\al F.)} &=&
\csp(\rh(\al D.)\al F.)\;. \\[1mm]
\hbox{Thus:}\qquad\al D. \subset \csp(\rh(\al D.)\al F.) & &\quad
\hbox{and since $\al D.$ is a *--algebra in $\al A.,$} \\[1mm]
\al D.\; \subseteq \;\csp(\rh(\al D.)\al F.)\!&\cap&\!
\csp(\al F.\rh(\al D.))\cap\al A. \\[1mm]
&\subseteq &\csp(\al DF.)\cap\csp(\al FD.)\cap\al A.=\al D.
\end{eqnarray*}
where we used $\df\cap\al A.=\al D..$ Thus
\[
\al D.=\csp(\rh(\al D.)\al F.)\cap\csp(\al F.\rh(\al D.))\cap\al A.
=\csp(\rh(\al D.)\al A.)\cap\csp(\al A.\rh(\al D.))
\]
which also follows from Theorem~\ref{Teo.2.12}, treating
$\rh(\al D.)\subseteq\al D.$ as a second constraint set.
Thus $\al D.\sim\rh(\al D.)$ in $\al A..$
For the converse, let $\al D.\sim\rh(\al D.)$ and take
$\Phi\in\al H..$ From the equation $\Phi D=\rh(D)\Phi$ for all
$D\in\al D.,$ we conclude that
\[
\Phi\cdot\csp(\al DF.) \subset \csp(\rh(\al D.)\al F.)=\csp(\al DF.)
\]
using $\al D.\sim\rh(\al D.).$
Since we have trivially that
$\Phi\cdot\csp(\al FD.)\subset\csp(\al FD.),$ it follows that
\[
\Phi\df=\Phi\left(\csp(\al FD.)\cap\csp(\al DF.)\right)
\subset\df
\]
so $\Phi$ is in the left multiplier of $\df.$
We also have that
\[
\csp(\al FD.)\Phi=\csp(\al F.\rh(\al D.))\Phi=\csp(\al F.\Phi\al D.)
\subseteq\csp(\al FD.)\;.
\]
Since trivially $\csp(\al DF.)\Phi\subseteq\csp(\al DF.),$ it
follows that
\[
\df\Phi=\left(\csp(\al FD.)\cap\csp(\al DF.)\right)\Phi
\subset\df
\]
and hence $\Phi$ is in the relative multiplier algebra
of $\df,$ i.e. $\Phi\in\of$ by Theorem~\ref{Teo.2.2}(ii).\chop
{\bf (ii)}
Let $\al H._\sigma\subset\of\supset\al H._\tau,$
hence by (i) $\al D.\sim\sigma(\al D.)\sim\tau(\al D.).$
First let $X\in (\sigma,\,\tau)_{\al A.}\cap\al O.,$ i.e.
$X\in\al O.$ and $X\sigma(A)=\tau(A)X$ for all $A\in\al A..$
By letting $A$ range over only $\al O.\subset\al A.,$
we immediately get that $X\in{(\sigma\rest\al O.,\,\tau\rest\al O.)_{\al O.},}$
making use of Theorem 4.1(iii).
Therefore,
it suffices to prove that
${(\sigma,\,\tau)_{\al A.}}\subset\al O..$
Let $X\in{(\sigma,\,\tau)_{\al A.}},$ i.e.
$X\in\al A.$ and
$X\sigma(A)=\tau(A)X$ for all $A\in\al A..$ Thus
\begin{eqnarray*}
X\cdot\csp(\al DA.)&=& X\cdot\csp(\sigma(\al D.)\al A.)
=\csp(X\sigma(\al D.)\al A.) \\[1mm]
&\subseteq&
\csp(\tau(\al D.)X\al A.) \subseteq
\csp(\tau(\al D.)\al A.)=\csp(\al DA.)\;.
\end{eqnarray*}
Since we have trivially that
$X\cdot\csp(\al AD.)\subseteq\csp(\al AD.),$
it follows that
\[
X\al D.\subseteq\csp(\al AD.)\cap\csp(\al DA.)=\al D.\,,
\]
i.e. $X$ is in the left multiplier of $\al D..$
Likewise:
\begin{eqnarray*}
\csp(\al AD.)\cdot X &=& \csp(\al A.\tau(\al D.))\cdot X
=\csp(\al A.\tau(\al D.)X) \\[1mm]
&\subseteq&
\csp(\al A.X\sigma(\al D.))\subseteq\csp(\al A.\sigma(\al D.)) \\[1mm]
&=& \csp(\al AD.)\,.
\end{eqnarray*}
Since trivially $\csp(\al DA.)\cdot X\subseteq\csp(\al DA.),$
we have:
\[
\al D.\cdot X\subseteq\csp(\al AD.)\cap\csp(\al DA.)=\al D.\,,
\]
and hence $X$ is in the relative multiplier of $\al D.,$
i.e. $X\in\al O..$
\subsection*{Proof of Proposition~\ref{pro.4.7}}
(i) According to the decomposition
\[
\sigma(\cdot)=\sum_{j}V_{j}\rho_{\gamma_{j}}(\cdot)V_{j}^{\ast},\quad
V_{j}\in (\rho_{\gamma_{j}},\sigma)_{\al A.}
\]
we have
$\al H._{\sigma}=\sum_{j}V_{j}\al K.'_{j}$
where
$\rho_{\gamma_{j}}=\rho_{\al K.'_{j}}$
and
the
$\al K._{j}'$
are irreducible w.r.t.
$\al G.$
carrying the representation
$\gamma_j\in\wh{\al G.}.$
Moreover
$\hbox{supp}\,\al K.'_{j}=1.$
Put
$E_{j}:=V_{j}V_{j}^{\ast}.$
Then
$\sum_{j}E_{j}=1.$
Since
$V_{j}\al K.'_{j}\subset\al H._{\sigma}\subset\of$
it follows that
\[
E_{j}=\hbox{supp}\,V_{j}\al K.'_{j}\in\al O.
\]
for all $j$. Therefore, by assumption, there are isometries
$W_{j}\in\al O.$
with
$E_{j}=W_{j}W_{j}^{\ast}.$
Now we put
\[
\al K._{j}:=W_{j}^{\ast}V_{j}\al K.'_{j}\subset\of.
\]
Then
$\al K._{j}$
is an algebraic Hilbert space with
$\hbox{supp}\,\al K._{j}=1$,
carrying the representation
$\gamma_{j}$
and we have
$V_{j}\al K.'_{j}=W_{j}\al K._{j}$.
Hence
$\al H._{\sigma}=\sum_{j}W_{j}\al K._{j}$
and
\[
\sigma(\cdot)=\sum_{j}W_{j}\rho_{\al K._{j}}(\cdot)W_{j}^{\ast},\quad
W_{j}\in (\rho_{\al K._{j}},\sigma)_{\al O.}
\]
follows.
(ii) This follows from (i) using the existence
of subobjects.
\subsection*{Proof of Theorem~\ref{Teo.4.3}}
Let
$\al H.\subset\al F.$
be an arbitrary algebraic Hilbert space.
Then
$\xi(\al H.)\subset\al L.$
is also an algebraic Hilbert space.
with support 1.
To see this, let
$\{\Phi_{j}\}_{j}$
be an orthonormal basis of
$\al H.$,
i.e.
$\Phi_{j}^{\ast}\Phi_{k}=\delta_{j,k}1$
and
$\sum_{j}\Phi_{j}\Phi_{j}^{\ast}=1$
then the same relations are true for the system
$\{\xi(\Phi_{j})\}_{j}.$
In particular $\xi$ is
injective on $\al H..$
Moreover, if
$\al H.$
is $\al G.$-invariant and
${g}(\Phi_{j})=\sum_{k}u_{k,j}(g)\Phi_{k}$
then
${g}^{\xi}\big(\xi(\Phi_{j})\big)=\sum_{k}u_{k,j}(g)\xi(\Phi_{k}),$
i.e.
$\xi(\al H.)$
carries the same representation as
$\al H..$
In particular, if
$\al H._{\gamma}$
carries
$\gamma$,
i.e.
$\al H._{\gamma}\subset\Pi_{\gamma}\al F.$
then
$\xi(\al H._{\gamma})\subset\Pi_{\gamma}^{\xi}\al L.$.
This proves (ii) and (i).\chop
Let
$\al N._{\gamma}$ be an orthonormal basis for
$\xi(\al H._\gamma),$ then by the first part
it is the image under $\xi$ of an
orthonormal basis $\{\Phi_{\gamma,j}\}_{j}$ of $\al H._\gamma.$
Let $F=
\sum A_{\gamma,j}\Phi_{\gamma,j}\in\al F._{\rm fin}$
such that
$\xi(F)=0=\sum\xi(A_{\gamma,j})\xi(\Phi_{\gamma,j}).$
By applying $\al G.^\xi$ to this equality, and using
the relation
$g^\xi(\xi(\Phi_{\gamma,j}))=\sum\limits_{k}u_{k,j}(g)\xi(\Phi_{\gamma,k})$
we get
$\sum\limits_{\gamma,j,k}u_{k,j}^{\gamma}(g)\xi(A_{\gamma,j})\xi
(\Phi_{\gamma,k})=0$ for all $g\in\al G..$
Now the orthogonality relations for the matrix elements of the
irreducible representations of
$\al G.$
imply
$\xi(A_{\gamma,j})\xi(\Phi_{\gamma,k})=0$
for all
$\gamma\in\wh{\al G.},j,k$.
Hence
$\xi(A_{\gamma,j})=0$
follows. This proves (iii). From
$\xi\circ\Pi_{\gamma}=\Pi_{\gamma}^{\xi}\circ\xi$
(iv) follows.\chop
For (v) observe that the homomorphic images of isometries $V_i\in\al A.$
with $V_1V_1^*+V_2V_2^*=\un$ produces a pair of isometries in
$\xi(\al A.)$ satisfying the same relation. So Property B for $\al A.$
implies Property B for $\xi(\al A.)\,.$
\subsection*{Proof of Corollary~\ref{Cor.4.9}}
(i) Let $\lambda$ be generated by $\al H.$, i.e. let
$\lambda=\rho_{\al H.}$
such that
$\lambda(A)=\sum_{j}\Phi_{j}A\Phi_{j}^{\ast}$
where
$\{\Phi_{j}\}_{j}$
is an orthonormal basis of
$\al H.$.
Then
$\xi(\lambda(A))=\sum_{j}\xi(\Phi_{j})\xi(A)\xi(\Phi_{j})^{\ast}$
and
$\xi(A)=0$
implies
$\xi(\lambda(A))=0.$
Furthermore,
$\lambda^{\xi}(\xi(A))=\rho_{\xi(\al H.)}(\xi(A)).$\chop
(ii)$\lambda(\cdot)=\sum_{j}W_{j}\lambda_{j}(\cdot)W_{j}^{\ast}$
implies
$\lambda^{\xi}(\cdot)=\sum_{j}\xi(W_{j})\lambda_{j}^{\xi}(\cdot)\xi(W_{j})^{\ast}$
and
$(\lambda\circ\sigma)^{\xi}=\lambda^{\xi}\circ\sigma^{\xi}.$
Further, if
$\sigma(\cdot)=V^{\ast}\lambda(\cdot)V$
where
$V\in (\sigma,\lambda)$,
i.e.
$V\sigma(\cdot)=\lambda(\cdot)V$
then
$\xi(V)\sigma^{\xi}(\cdot)=\lambda^{\xi}(\cdot)\xi(V)$
and
$\sigma^{\xi}(\cdot)=\xi(V)^{\ast}\lambda^{\xi}(\cdot)\xi(V).$
In particular, if
$\lambda\cong\sigma$
then
$\lambda^{\xi}\cong\sigma^{\xi}.$
\subsection*{Proof of Theorem~\ref{Teo.4.4}}
(i) Let
$\sigma\in\hbox{Ob}\,\al T.^{\xi}$.
Then there is a $\al G.$-invariant algebraic Hilbert space
$\al H.\subset\al L.$
such that
$\sigma (X)=\sum_{j}\Psi_{j}X\Psi_{j}^{\ast},\;X\in\xi(\al A.),$
where
$\{\Psi_{j}\}_{j}$
denotes an orthonormal basis of
$\al H.$.
On the other hand, there is a corresponding $\al G.$-invariant
Hilbert space
$\al K.\subset\al F.$
such that
$\al H.$
and
$\al K.$
carry unitarily equivalent representations of
$\al G.$.
In
$\al K.$
we choose an orthonormal basis
$\{\Phi_{j}\}_{j}$
such that the representation matrix of
$\al G.$
in
$\al H.$
w.r.t.
$\{\Psi_{j}\}_{j}$
coincides with that in
$\al K.$
w.r.t.
$\{\Phi_{j}\}_{j}.$
Then
$\xi(\al K.)$
transforms under
$\al G.$
w.r.t.
$\{\xi(\Phi_{j})\}_{j}$
with the same representation matrix. Now we put
\[
V:=\sum_{j}\Psi_{j}\xi(\Phi_{j})^{\ast}\in\al L..
\]
Obviously, $V$ is unitary and
${g}^{\xi}(V)=V$
for all
$g\in\al G.$,
i.e.
$V\in\xi(\al A.)$.
Then
$V\xi(\Phi_{j})=\Psi_{j}$
or
$\al H.=V\xi(\al K.)$
and
$\sigma=\hbox{Ad}\,V\circ\rho_{\al K.}^{\xi}.$
(ii) According to Corollary~\ref{Cor.4.9} and
$(\hbox{Ob}\,\al T.)^{\xi}\subseteq\hbox{Ob}\,\al T.^{\xi}$
the image
$\al C.^{\xi}$
of an equivalence class
$\al C.\subset\hbox{Ob}\,\al T.$
is contained in a unique equivalence class of
$\hbox{Ob}\,\al T.^{\xi}$.
But (i) says that every equivalence class
$\al E.$
of
$\hbox{Ob}\,\al T.^{\xi}$
is an image
$\al E.=\al C.^{\xi}$.
\subsection*{Proof of Lemma~\ref{arrow1}}
Let $A\in(\sigma,\,\tau)_{\al A.},$ then
it follows immediately from
$A\sigma(B)=\tau(B)A,\;B\in\al A.$
that
$\xi(A)\sigma^{\xi}(\xi(B))=\tau^{\xi}(\xi(B))\xi(A)$
for all $B\in\al A..$ Recall that $\xi(\al A.)$
is the fixed point algebra of $\al G.^\xi.$
\subsection*{Proof of Proposition~\ref{Prop.4.12}}
(i) This is obvious because the union
$\bigcup_{\gamma}\al N._{\gamma}$
of orthonormal bases
$\al N._{\gamma}$
of
$\al H._{\gamma}$
is an $\al A.$-left module basis of
$\al F._{\rm fin}$.
\noindent
(ii)
By a straightforward calculation one obtains for all $F\in\al F.$ that:
\[
\langle\xi(F),\xi(F)\rangle_{\xi(\al A.)}=
\xi(\langle F,F\rangle_{\al A.})
\]
and
\[
\vert\xi(F)\vert_{\xi(\al A.)}=\Vert\xi(\langle F,F\rangle_{\al A.})
\Vert^{1/2}\leq\Vert\langle F,F\rangle_{\al A.}\Vert^{1/2}
=\vert F\vert_{\al A.},
\]
i.e.
$\xi$
is continuous w.r.t. the norm
$\vert\cdot\vert_{\al A.}.$
Now let
$F\in\clo\s{\vert\cdot\vert_{\al A.}}.(\ker\xi\cap
\al F._{\rm fin}),$ hence there is a sequence $\{F_n\}\subset
\ker\xi\cap\al F._{\rm fin}$ such that
$\vert F_{n}-F\vert_{\al A.}\to 0.$
Then
$\xi(F)=0$
follows. Conversely, let
$F\in\ker\xi$.
Recall
$\xi\circ\Pi_{\gamma}=\Pi_{\gamma}^{\xi}\circ\xi$
which implies
$\Pi_{\gamma}F\in\ker\xi$.
Now, according to Remark~\ref{remark1}~(iv) we have
$F=\sum_{\gamma}\Pi_{\gamma}F$
w.r.t. the
$\vert\cdot\vert_{\al A.}$-norm convergence. This implies
\[
F\in\hbox{clo}_{\vert\cdot\vert_{\al A.}}(\ker\xi\cap
\al F._{\rm fin}).
\]
\subsection*{Proof of Theorem~\ref{Teo.4.13}}
(i) Since $\HS$ is minimal and regular, there exists an
assignment
$\sigma\to\al H._{\sigma}$
such that
an admissible (DR-)subcategory
$\al T._{\C}$
can be defined by
\[
(\sigma,\tau)_{\al A.,\C}:=(\al H._{\sigma},\al H._{\tau}),
\]
cf. Theorem~\ref{Teo1}. Now we use the morphism $\xi$ to define a
corresponding subcategory
$\al T.^{\xi}_{\C}$
for
$\xi(\al T.)$.
Recall
$\hbox{Ob}\,\xi(\al T.)=(\hbox{Ob}\,\al T.)^{\xi}\subset\hbox{Ob}\,
\al T.^{\xi}.$
We put
\[
\hbox{Ob}\,\al T.^{\xi}_{\C}:=\hbox{Ob}\,\xi(\al T.).
\]
Let
$\lambda,\sigma\in\hbox{Ob}\,\al T.$.
Then
$\lambda^{\xi},\sigma^{\xi}\in\hbox{Ob}\,\xi(\al T.)$
and the arrows are defined by
\[
(\sigma^{\xi},\tau^{\xi})_{\xi(\al A.),\C}:=
\xi((\sigma,\tau)_{\al A.,\C})=(\xi(\al H._{\sigma}),\xi(\al H._{\tau})).
\]
Then
\[
(\iota^{\xi},\iota^{\xi})_{\xi(\al A.),\C}
=\xi((\iota,\iota)_{\al A.,\C})=\xi(\C\un)=\C\xi(\un).
\]
It is straightforward to show that
$\al T.^{\xi}_{\C}$
has direct sums and subobjects (in the latter case note that if
$F$ is a nontrivial projection from
$(\sigma^{\xi},\sigma^{\xi})_{\xi(\al A.),\C}$
then there is a nontrivial projection
$E\in (\sigma,\sigma)_{\al A.,\C}$
such that
$F=\xi(E)$
because the ($\al G.$-invariant) matrix
$\{p_{j,k}\}_{j,k}$
of $F$ w.r.t.
$\{\xi(\Phi_{\sigma,j})\}_{j}$,
where the
$\Phi_{\sigma,j}$
form an orthonormal basis of
$\al H._{\sigma}$,
can be used to define a corresponding $E$ in
$(\sigma,\sigma)_{\al A.,\C}$.
Furthermore, the permutation and conjugation structures of
$\al T._{\C}$
survive the morphism $\xi$.
Thus
$\al T.^{\xi}_{\C}$
is a DR-category. We use the notation
$\al T.^{\xi}_{\C}=\xi(\al T._{\C}).$
(This result means: The Hilbert system
$\{\xi(\al F.),\al G.\}$
is regular.)
(ii) First let
$\xi(\al A.)'\cap\xi(\al F.)=\xi(Z(\al A.)).$
Then, according to Theorem~\ref{Teo1}, property P.2 can be fulfilled by
an appropriate subcategory of the form described before. Second,
let property P.2 be satisfied. Then
$\xi(\al T._{\C})$
is an admissible (DR-)subcategory of
$\xi(\al T.)$.
Therefore, according to Theorem~\ref{Teo2} there is a corresponding
minimal and regular Hilbert extension
$\tilde{\al F.}$
of
$\xi(\al A.).$
The uniqueness part of Theorem~\ref{Teo2} gives that
$\tilde{\al F.}$
and
$\xi(\al F.)$
are $\al A.$-module isomorphic, hence
$\xi(\al A.)'\cap\xi(\al F.)=Z(\xi(\al A.))$
is also true.
(iii) The inclusion
$\supseteq$
is obvious (see Lemma~\ref{arrow1}). The assertion is
\begin{equation}
\label{inclusion}
(\sigma^{\xi},\tau^{\xi})_{\xi(\al A.)}\subseteq\xi((\sigma,\tau)_{\al A.}).
\end{equation}
First we prove this inclusion for the admissible subcategory, i.e. we assert
\[
(\sigma^{\xi},\tau^{\xi})_{\xi(\al A.),\C}\subseteq
\xi((\sigma,\tau)_{\al A.}).
\]
This is obvious by
\[
(\sigma^{\xi},\tau^{\xi})_{\xi(\al A.),\C}=
\xi((\sigma,\tau)_{\C})\subset\xi((\sigma,\tau)_{\al A.}).
\]
Second, recall that
$\xi((\sigma,\tau)_{\al A.
})$
is a right module w.r.t.
$\sigma^{\xi}(\xi(Z(\al A.)))$
and a left module w.r.t.
$\tau^{\xi}(\xi(Z(\al A.)))$.
On the other hand,
$(\sigma^{\xi},\tau^{\xi})_{\xi(\al A.)}$
is a right module w.r.t.
$\sigma^{\xi}(Z(\xi(\al A.)))$
and a left module w.r.t.
$\tau^{\xi}(Z(\xi(\al A.))).$
Further, according to P.2.
$(\sigma^{\xi},\tau^{\xi})_{\xi(\al A.),\C}$
is a generating subset for this module. Since, by assumption,
$Z(\xi(\al A.))$
and
$\xi(Z(\al A.))$
coincide, the inclusion~(\ref{inclusion}) follows.
(iv) This follows directly from
$\xi(\al A.)'\cap\xi(\al F.)=Z(\xi(\al A.))$
and the fact that the unitary equivalence classes of
$\al T.^{\xi}$
and
$\xi(\al T.)$
coincide.
\subsection*{Proof of Theorem~\ref{Teo.4.14}}
Since
$\al T._{\C}$
is an admissible (DR-)subcategory of
$\al T.$
we can apply Theorem\ref{Teo2}, i.e. there is a corresponding minimal
and regular Hilbert extension
$\HS$
of
$\al A.$.
Therefore the arrows of the category
$\al T._{\C}$
are given by
\begin{equation}
\label{arrowAdm}
(\sigma,\tau)_{\al A.,\C}=(\al H._{\sigma},\al H._{\tau}),
\end{equation}
where the Hilbert spaces
$\al H._{\sigma},\al H._{\tau}$
generate the endomorphisms
$\sigma,\tau$ respectively.
Now it is not hard to show that the morphism
$\xi$
can be extended to a morphism of
$\al F.$
by putting
\begin{equation}
\label{MorAdm}
\xi(\Phi_{\lambda,j}):=\Phi_{\lambda,j}
\end{equation}
where
$\lambda$
runs through a complete system of irreducible and mutually
disjoint endomorphisms and
$\{\Phi_{\lambda,j}\}$
denotes an orthonormal basis of the Hilbert space
$\al H._{\lambda}$
which generates
$\lambda$
(recall and use Proposition~\ref{Prop.4.12}). This morphism satisfies the
assumptions of Theorem~\ref{Teo.4.3}. The corresponding Hilbert system is
denoted by
$\{\al F.^{\xi},\al G.\}$
(recall that
$\al G.^{\xi}\cong\al G.$).
Equations
(\ref{arrowAdm}) and (\ref{MorAdm}) imply
\[
\sigma^{\xi}(\xi(\al A.))=\sum_{j}\Phi_{\lambda,j}\xi(A)\Phi_{\lambda,j}^{\ast}
\qquad\hbox{and}\qquad
\xi((\sigma,\tau)_{\al A.,\C})=(\sigma,\tau)_{\al A.,\C}.
\]
By assumption (iii) we have
$\xi((\sigma,\tau)_{\al A.}=(\sigma^{\xi},\tau^{\xi})_{\xi(\al A.)}$.
Since
$(\sigma,\tau)_{\al A.,\C}\subset(\sigma,\tau)_{\al A.}$
we have
$\xi((\sigma,\tau)_{\al A.,\C})\subset(\sigma^{\xi},\tau^{\xi})_
{\xi(\al A.)}.$
Therefore the subcategory
$\al T._{\C}^{\xi}$
of
$\xi(\al T.)$
defined by
\[
(\sigma^{\xi},\tau^{\xi})_{\xi(\al A.),\C}:=\xi((\sigma,\tau)_
{\al A.,\C}=(\sigma,\tau)_{\al A.,\C}
\]
is a DR-category.
Now we prove property P.2 for
$\al T._{\C}^{\xi}$.
We have to show
\[
\sigma^{\xi}(Z(\xi(\al A.)))(\lambda^{\xi},\sigma^{\xi})_{\xi(\al A.),\C}
\lambda^{\xi}(Z(\xi(\al A.)))=(\lambda^{\xi},\sigma^{\xi})_{\xi(\al A.)}.
\]
The left hand side equals
\[
\sigma^{\xi}\xi(Z(\al A.))(\lambda^{\xi},\sigma^{\xi})_{\xi(\al A.),\C}
\lambda^{\xi}(\xi(Z(\al A.)))=
\xi(\sigma(Z(\al A.)))(\lambda^{\xi},\sigma^{\xi})_{\xi(\al A.),\C}
\xi(\lambda(Z(\al A.)))=
\]
\[
\xi(\sigma(Z(\al A.)))\xi((\lambda,\sigma)_{\al A.,\C})\xi(\lambda(Z(\al A.)))=
\xi(\sigma(Z(\al A.))(\lambda,\sigma)_{\al A.,\C}\lambda(Z(\al A.)))=
\xi((\lambda,\sigma)_{\al A.})
\]
and this coincides, by assumption, with the right hand side.
Now we can apply Theorem~\ref{Teo2} to obtain a further Hilbert extension
$\{\tilde{\al F.}^{\xi},\al G.^{\xi}\}$
where again
$\al G.^{\xi}\cong\al G.$.
Using the uniqueness part of Theorem~\ref{Teo2} we obtain that both
Hilbert extensions are
$\xi(\al A.)$-module isomorphic.
\subsection*{Proof of Proposition~\ref{FCU}}
It suffices to show that there is one Dirac state,
i.e. a state $\omega\in{\got S}(\al A.)$ with
$\omega(\al U.)=1\;.$
Recall the homomorphism $\zeta:\al E.\to{\rm CAR}(\al H.)
\otimes{\rm CCR}(S,B)\;.$
Let $\omega_0\in{\got S}({\rm CAR}(\al H.))$ be that
quasi--free state which is zero on any normal--ordered
monomial of $a(f)$ and $a^*(h)$ of degree greater or equal
to 1. Then $\omega_0$ is invariant w.r.t. $\wt\gamma_f$
for all $f\in\al S.(\R^4)\cup\R.$
Moreover, since $L(S)\subset\ker B,$ there is a state
$\omega_1\in {\got S}({\rm CCR}(S,B))$ such that
$\omega_1(\delta\s Lf.)=1$ for all $f\in S.$
Then $\omega_2:=\omega_0\otimes\omega_1\in
{\got S}\big({\rm CAR}(\al H.)\otimes{\rm CCR}(S,B)\big)$
is a $\wt\gamma\s f.\otimes\iota\hbox{--invariant}$ state on
${\rm CAR}(\al H.)\otimes{\rm CCR}(S,B)$ such that
$\omega_2(\un\otimes\delta\s Lf.)=1$ for all $f\in S.$
From this we define a state on $\al E.$ by
$\wt\omega_2:=\omega_2\circ\zeta$ and since
$\zeta\circ\beta\s\gamma_f.=\wt\gamma\s f.\otimes\iota,$
it follows that $\wt\omega_2$ is
$\beta\s G.\hbox{--invariant}$ on $\al E..$
Thus $\wt\omega_2$ extends to a state $\omega_3$
on $\al A.=G\cross\beta.\al E.$ by
$\omega_3(U_g)=1$ for all $g\in G,$
where $U_g$ denotes the unitary implementer for $\beta_g.$
So $\omega_3\in{\got S}(\al A.)$ is a Dirac state w.r.t.
the unitaries $U_G\cup\delta\s LS..$
Since the maximal set of constraint unitaries for
a Dirac state is a group, it follows that for the products
$V_f=\delta\s-Lf.\cdot U_{\gamma_f}$ we have
$\omega_3(V_f)=1$ for all $f,$ i.e. $\omega_3$
is a Dirac state w.r.t. $\al U.,$ hence $\al U.$ is first--class.
\subsection*{Proof of Lemma~\ref{RkWD}}
Note that $\rho_k$ on the unitary implementers $\rho_k:U_G\to\al A.$
is a faithful group homomorphism. This is because it is the pointwise product of the
identity map $\iota$ with the character $\chi_k:U_G\to\C$ given by
$\chi\s k.\big(U\s\gamma_{f+t}.\big):=e^{itk},$ $t\in\R,$ $f\in\al S.(\R^4).$
Furthermore:
$\al A.=C^*\big(\rho_k(U_G)\cup\al E.\big).$
Thus the pair ${\{\rho_k(U_G),\;\al E.\}}$ is also a covariant system
for the action $\beta:G\to\aut\al E.$ (cf. Step~3), hence by the universal
property of cross--products (cf.~\cite{PR}) there is a *-homomorphism
$\theta:\al A.\to\al A.$ such that $\theta(A)=A$ for $A\in\al A.,$ and
$\theta(U_g)=\rho_k(U_g)\equiv\hbox{implementing unitary of the second system}.$
Then $\theta$ coincides with the definition of
$\rho_k$ on the generating elements, so it follows that $\rho_k$
extends uniquely to a homomorphism. Since it is clear that $\rho_k$
is bijective (its inverse is $\rho_{-k})$ it follows that
$\rho_k$ is an automorphism of $\al A..$
\subsection*{Proof of Proposition~\ref{RhOut}}
Proof by contradiction. Let $k\not=0$ and assume $\rho_k\in{\rm Inn}\,\al A.,$
i.e. $\rho_k=\Ad V$ for some unitary $V\in\al A.\,.$
Recall the homomorphism
\[
\zeta:\al E.\to
{\rm CAR}(\al H.)\otimes{\rm CCR}(S,\,B)
\]
encountered in Step 3. Since $(S,\,B)$ is degenerate, $\zeta(\al E.)$
is not simple which will be inconvenient in the proof below. Choose
therefore a maximal ideal $\al I.$ of ${\rm CCR}(S,\,B)$
(necessarily associated with a character of the centre
$Z\big({\rm CCR}(S,\,B)\big)),$ and let
\[
\eta:{\rm CAR}(\al H.)\otimes{\rm CCR}(S,\,B)\to
{\rm CAR}(\al H.)\otimes{\rm CCR}(S,\,B)\big/\al I.
\]
be the factorisation by the ideal $\un\otimes\al I.\,.$
Then the composition
\[
\xi:=\eta\circ\zeta :\al E.\to{\rm CAR}(\al H.)\otimes{\rm CCR}(S,\,B)\big/\al I.
\]
is a homomorphism of which the image is a simple algebra.\chop
Now the action $\beta:G\to\aut\al E.$ (Step 4) only affects
${\rm CAR}(\al H.)$ in $\al E.,$ so preserves the ideal generated
by the commutators ${[{\rm CAR}(\al H.),\,{\rm CCR}(S,\,B)]}$
in $\al E.$ as well as the ideal $\un\otimes\al I.\,.$
Thus each $\beta_g$ can be taken through the homomorphism $\xi$
to define an action
$\beta^\xi:G\to{\aut\big({\rm CAR}(\al H.)\otimes{\rm CCR}(S,\,B)\big/\al I.\big)}$
and it is just $\beta^\xi\s\gamma_f.=\wt\gamma\s f.\otimes \iota\,.$
Thus we can extend $\xi$ from $\al E.$ to $\al A.=
{G\cross\beta.\al E.}$ to get a surjective homomorphism
\[
\xi:\al A.\to G\cross\beta^\xi.\left({\rm CAR}(\al H.)\otimes{\rm CCR}(S,\,B)\big/\al I.\right)\;.
\]
Now $\rho_k\in\aut\al A.$ only affects $U_G,$ leaving $\al E.$ invariant, hence it
preserves $\ker\xi\subset\al A..$ Thus $\rho_k$ can be factored through $\xi$
to obtain the automorphisms $\rho^\xi_k\in\aut\xi(\al A.)$ by
\begin{equation}
\label{XVinn}
\rho^\xi_k\big(\xi(A)\big):= \xi\big(\rho_k(A)\big)\quad\forall\;A\in\al A.\,,\qquad
\hbox{and so}\qquad \rho^\xi_k=\Ad\xi(V)\;.
\end{equation}
Recall now that each element of the discrete crossed product
$\xi(\al A.)= {G\cross\beta^\xi.\xi(\al E.)}$
(with $\xi(\al E.)={\rm CAR}(\al H.)\otimes{\rm CCR}(S,\,B)\big/\al I.)$
can be written as a C*-norm convergent series $\sum\limits_{n=1}^\infty B_nU\s g_n.$
where $B_n\in\xi(\al E.)$ and $g_n\in G,$ (with $g_n$ distinct for different $n)$
and that the unitaries $U_G$
form a left $\xi(\al E.)\hbox{--module}$ basis.
In particular, for the implementing unitaries $\xi(V)$ of $\rho^\xi_k$ we have a
series $\xi(V)=\sum\limits_{n=1}^\infty B_nU\s g_n.\,,$ $B_n\in\xi(\al E.)\backslash 0.$
Since $\rho_k\restriction\al E.=\iota\,,$ it follows from equation~(\ref{XVinn})
that $\xi(V)A=A\xi(V)$ for all $A\in\xi(\al E.)\,,$ i.e.
\begin{eqnarray*}
A\xi(V)&=& \sum_{n=1}^\infty AB_nU\s g_n. \\[1mm]
&=&\xi(V)A=\sum_{n=1}^\infty B_nU\s g_n.A
=\sum_{n=1}^\infty B_n\beta^\xi\s g_n.(A)U\s g_n.
\end{eqnarray*}
for all $A\in\xi(\al E.)\,.$ So by the basis property of $U_G$ we have
\begin{equation}
\label{BnIntertw}
AB_n=B_n\beta^\xi\s g_n.(A)\quad\forall\;A\in\xi(\al E.)=
{\rm CAR}(\al H.)\otimes{\rm CCR}(S,\,B)\big/\al I.\,.
\end{equation}
Since $\beta^\xi\s g_n.\restriction{\rm CCR}(S,\,B)\big/\al I.
=\iota,$ this implies that
$B_n\in\left({\rm CCR}(S,\,B)\big/\al I.\right)'.$
From the fact that ${\rm CCR}(S,\,B)\big/\al I.$
is simple (hence has trivial centre)
this means that $B_n\in{\rm CAR}(\al H.)\otimes\un,$
and hence equation~(\ref{BnIntertw}) claims that $B_n$
is a nonzero intertwiner between $\iota$ and
$\beta^\xi\s g_n.$ in ${\rm CAR}(\al H.).$
We next prove that $B_n$ is invertible, in which case
$\beta^\xi\s g_n.$ becomes inner on ${\rm CAR}(\al H.).$
Let $\pi:{\rm CAR}(\al H.)\to\al B.(\al L.)$ be any faithful irreducible
representation of ${\rm CAR}(\al H.)$ on a Hilbert space $\al L.$
e.g. the Fock representation), and let $\psi\in\ker\pi(B_n)\,.$
Then by (\ref{BnIntertw})
\[
\pi(B_nA)\psi=\pi(\beta\s g_n^{-1}.(A))\,\pi(B_n)\psi=0\qquad
\forall\;A\in{\rm CAR}(\al H.)\;.
\]
Thus $\pi({\rm CAR}(\al H.))\psi\subseteq\ker\pi(B_n)\,.$
However, in an irreducible representation every nonzero vector is cyclic,
so either $\psi=0$ or $\pi(B_n)=0,$ and the latter case is excluded
by $B_n\not=0,$ $\pi$ faithful. Thus $\psi=0,$ i.e. we've shown that
$\ker\pi(B_n)=\{0\}\,.$ Moreover by equation~(\ref{BnIntertw}) we have
\[
\pi(A)\pi(B_n)\varphi=\pi(B_n)\pi(\beta\s g_n.(A))\varphi
\quad\forall\;\varphi\in\al L.\backslash 0\,,\;A\in{\rm CAR}(\al H.)
\]
hence $\pi\big({\rm CAR}(\al H.)\big)\big(\pi(B_n)\varphi\big)
\subseteq{\rm Ran}\,\pi(B_n)$ for all $\varphi\in\al L.\backslash 0\,.$
Now $\pi(B_n)\varphi\not=0$ (by $\ker\pi(B_n)=\{0\})$ and so by Dixmier
2.8.4~\cite{Di} we have that
$\pi\big({\rm CAR}(\al H.)\big)\big(\pi(B_n)\varphi\big)=\al L.$
(no closure is necessary). Thus ${\rm Ran}\,\pi(B_n)=\al L.,$
i.e. $\pi(B_n)$ is invertible, and so since $\pi$ is faithful
(hence preserves the spectrum of an element) it follows that
$B_n$ is also invertible in ${\rm CAR}(\al H.).$
Using the fact that $B_n$ is invertible, equation~(\ref{BnIntertw})
becomes $\beta\s g_n.(A)=B_n^{-1}AB_n$ for all $A\in{\rm CAR}(\al H.)\,.$
Since $\beta\s g_n.$ is a *-homomorphism, this implies that
$B_n^{-1}A^*B_n=B_n^*A^*(B_n^{-1})^*,$ i.e.
$B_nB_n^*A^*=A^*B_nB_n^*$ for all $A\in{\rm CAR}(\al H.)\,,$
and since ${\rm CAR}(\al H.)$ has trivial centre, this means
$B_nB_n^*\in\C\un\,.$
Put $B_nB_n^*=:t_n$ (necessarily $t_n>0)$ then
$U_n:=B_n\big/\sqrt{t_n}$ satisfies
$U_nU_n^*=\un.$ By substituting $A$ by $\beta\s g_n^{-1}.(A)$
in (\ref{BnIntertw}) we also obtain $B_n^*B_n\in\C\un$ by the above
argument, then using $t_n=\|B_nB_n^*\|=\|B_n\|^2=\|B_n^*B_n\|=B_n^*B_n$
we get also $U_n^*U_n=\un\,.$
Thus
\[
\beta\s g_n.(A) =B_n^{-1}AB_n=\left({B_n\over\sqrt{t_n}}\right)^{-1}
A\left({B_n\over\sqrt{t_n}}\right)=U_n^*AU_n
\]
for $A\in {\rm CAR}(\al H.)\,,$ i.e. $\beta\s g_n.$ is inner on
${\rm CAR}(\al H.)\,.$
Recall however, that on ${\rm CAR}(\al H.)$ $\beta\s g_n.$ is just
an automorphism $\wt\gamma\s f_n.$ for some $f_n\in\al S.(\R^4)+\R,$
coming from a Bogoliubov transformation:
$\wt\gamma\s f_n.\big(\Phi(k)\big):=\Phi(T_{f_n}k)$ (cf. Step 4).
So for $\beta\s g_n.$ to be inner on ${\rm CAR}(\al H.),$
this means that either of $I\pm T_{f_n}$ must be trace--class
(cf. Theorem~4.1, p48 of Araki~\cite{Ar} or Theorem~4.1.4 in
\cite{PlR}).
However
\[
T_{f_n}(h_1\oplus h_2):=e^{-if_n}h_1\oplus e^{if_n}h_2\quad\forall\;
h_i\in\al H.=L^2(\R^4)\,.
\]
Now for any $f_n$ such that $T_{f_n}\not=I\,,$ it is clear
that the multiplication operators on $L^2(\R^4)$ by
$(I\pm e^{\pm if_n})$ cannot be trace--class.
This contradicts our finding that $\beta\s g_n.$ is inner
if $g_n\not=e,$ hence only $g_n=e$ is possible in the series
$\xi(V)=\sum\limits_{n=1}^\infty B_nU\s g_n.$ i.e.
$\xi(V)= B\cdot U_e\,,$ $B\in\xi(\al E.)\backslash 0\,.$
But in this case equation~(\ref{BnIntertw}) becomes $AB=BA$
for all $A\in\xi(\al E.)$ and so since $\xi(\al E.)$ is simple,
$B\in\C\un\,.$ This however implies that
$\iota=\Ad\xi(V)=\rho^\xi_k$ which cannot be because
$\rho_k(U\s\gamma_t.)=e^{ikt}U\s\gamma_t.$ factors unchanged through $\xi.$
From this contradiction, it follows that our initial assumption
$\rho_k\in {\rm Inn}\,\al A.$ is false.
\providecommand{\bysame}{\leavevmode\hbox to3em{\hrulefill}\thinspace}
\begin{thebibliography}{10}
\bibitem{Ar}
Araki, H.: Bogoliubov automorphisms and Fock representations of
canonical anticommutation relations. Contemp. Math. {\bf 62}, 23--141 (1987)
\bibitem{Bg}
Baumgaertel, H.: Operatoralgebraic methods in quantum field theory.
Akademie Verlag, Berlin 1995.
\bibitem{BL} Baumgaertel, H., Lled\'o, F.:
An application of the DR-duality theory for compact groups to endomorphism
categories of C*-algebras with nontrivial center.
Mathematical physics in mathematics and physics (Siena, 2000), 1--10,
Fields Inst. Commun., {\bf 30}, Amer. Math. Soc., Providence, RI, 2001
\chop Also at http://lanl.arXiv.org/abs/math/?0012037
\bibitem{BL2} Baumgaertel, H., Lled\'o, F.:
Superselection structures for C*--algebras with nontrivial centre.
Rev. Math. Phys. {\bf 9}, 785--819 (1997)
\bibitem{BW}
Baumgaertel, H., Wollenberg: Causal nets of operator algebras, Akademie Verlag,
Berlin 1992
\bibitem{DR}
Doplicher, S., Roberts, J.: A new duality of compact groups, Invent. Math.
{\bf 98}, 157--218 (1989)\chop
Doplicher, S., Roberts, J.: Why there is a field algebra
with a compact gauge group describing the superselection
structure in particle physics.
Comm. Math. Phys. {\bf 131}, no. 1, 51--107 (1990)
\bibitem{DR2}
Doplicher, S., Roberts, J.: Compact group actions on C*--algebras. J. Op. Th.
{\bf 19}, 283--305 (1988)
\bibitem{ES}
Evans, D., Sund, T.: Spectral subspaces for compact actions. Rep. Math. Phys.
{\bf 17}, 299-308 (1980)
\bibitem{PR}
Packer, J., Raeburn, I:
Twisted crossed products of C*-algebras.
Math. Proc. Cambridge Philos. Soc. {\bf 106},
293--311 (1989)
\bibitem{Grundling88b}
Grundling, H.: Systems with outer constraints. Gupta--Bleuler
electromagnetism as an algebraic field theory. Commun. Math. Phys.
\textbf{114}, 69--91 (1988)
\bibitem{Grundling97}
\bysame: A group algebra for inductive limit groups. Continuity problems
of the canonical commutation relations. Acta Applicandae Mathematicae
\textbf{46}, 107--145 (1997)
\bibitem{Grundling85}
Grundling, H., Hurst, C.A.: Algebraic quantization of systems with a
gauge degeneracy. Commun. Math. Phys. \textbf{98}, 369--390 (1985)
\bibitem{Grundling88c}
\bysame: A note on regular states and supplementary conditions. Lett.
Math. Phys. \textbf{15}, 205--212 (1988) [Errata: ibid. {\bf 17},
173--174 (1989)]
\bibitem{Grundling88a}
\bysame: The quantum theory of second class constraints: Kinematics.
Commun. Math. Phys. \textbf{119}, 75--93 (1988) [Erratum: ibid. {\bf
122}, 527--529 (1989)]
\bibitem{Lledo}
Grundling, H., Lled\'o, F.: Local quantum constraints.
Rev. Math. Phys.\textbf{12}, 1159--1218 (2000)
\bibitem{bDirac64}
Dirac, P.A.M.: Lectures on Quantum Mechanics. Belfer Graduate School of
Science: Yeshiva University 1964
\bibitem{bPedersen89}
Pedersen, G.K.: {\rm C}$^*$--Algebras and their Automorphism Groups.
London: Academic Press 1989
\bibitem{lands}
Landsman, N.P.: Rieffel induction as generalised quantum Marsden--Weinstein
reduction. J. Geom. Phys. \textbf{15}, 285--319 (1995)\chop
Grundling, H., Hurst, C.A.: Constrained dynamics for quantum mechanics I.
J. Math. Phys. \textbf{39}, 3091--3119 (1998)\chop
M. Henneaux, C. Teitelboim: Quantization of Gauge Systems.
Princeton University Press, Princeton 1992\chop
Giulini, D., Marolf, D.: On the generality of refined algebraic
quantization. Class. Quant. Grav. \textbf{16}, 2479--2488 (1999)\chop
Klauder, J., Ann. Physics \textbf{254}, 419--453 (1997)\chop
Faddeev, L., Jackiw, R.: Hamiltonian reduction of unconstrained and constrained systems.
Phys. Rev. Lett. \textbf{60}, 1692 (1988)\chop
Landsman, N.P., Wiedemann, U.: Massless particles, electromagnetism and
Rieffel induction. Rev. Math. Phys. \textbf{7}, 923--958 (1995)
\bibitem{MS}
Mack, G., Schomerus, V.: Conformal Field Algebras with Quantum Symmetry
from the Theory of Superselection Sectors,
Commun. Math. Phys. \textbf{134}, 139-196 (1990)
\bibitem{S}
Shiga, K.: Representations of a compact group on a Banach space,
J. Math. Soc. Japan \textbf{7}, 224-248 (1955)
\bibitem{BC}
Baumgaertel, H., Carey, A.: Hilbert C*-systems for actions of
the circle group,
Rep. on Math. Phys. \textbf{47}, 349-361 (2001)
\bibitem{BL3}
Baumgaertel, H., Lled\'o, F.: Dual group actions on C*-algebras
and their description by Hilbert extensions,
Math. Nachr. \textbf{239-240}, 11-47 (2002)
\bibitem{HR}
Hewitt, E., Ross, A.K.: Abstract Harmonic Analysis I,
Springer Verlag Berlin 1963
\bibitem{HR2}
Hewitt, E., Ross, A.K.: Abstract Harmonic Analysis II,
Springer Verlag Berlin 1970
\bibitem{B2}
Baumgaertel, H., Lled\'o, F.: Duality of compact groups and
Hilbert C*-systems for C*-algebras
with a nontrivial center. (To be published)\chop
http://xxx.lanl.gov/abs/math.OA/0311170
\bibitem{Cu}
Cuntz, J.: Simple C*-algebras generated by isometries,
Commun. Math. Phys. \textbf{57}, 173-185 (1977)
\bibitem{DR5}
Doplicher, S., Roberts, J.: Endomorphisms of C*-algebras,
tensor products and duality for compact groups,
Ann.Math. \textbf{130}, 75-119 (1989)
\bibitem{B3}
Baumgaertel, H.: A modified approach to the Doplicher/Roberts
theorem on the construction of the field algebra and the
symmetry group in superselection theory,
Rev.Math.Phys. \textbf{9}, 279-313 (1997)
\bibitem{PlR}
Plymen, R.J., Robinson, P.L.: Spinors in Hilbert space,
Cambridge University Press (1994)
\bibitem{Di}
Dixmier, J.: C*-algebras,
North Holland Publishing Company, Amsterdam - New York - Oxford 1977
\bibitem{LR}
Longo, R. and Roberts, J.E.: A theory of dimension,
K-theory \textbf{11}, 103-159 (1997)
\end{thebibliography}
\end{document}
---------------0405122338440--
|
http://parnaseo.uv.es/RefBase/search.php?sqlQuery=SELECT%20author%2C%20title%2C%20type%2C%20year%2C%20publication%2C%20abbrev_journal%2C%20volume%2C%20issue%2C%20pages%2C%20keywords%2C%20abstract%2C%20thesis%2C%20editor%2C%20publisher%2C%20place%2C%20abbrev_series_title%2C%20series_title%2C%20series_editor%2C%20series_volume%2C%20series_issue%2C%20edition%2C%20language%2C%20author_count%2C%20online_publication%2C%20online_citation%2C%20doi%2C%20serial%2C%20area%20FROM%20refs%20WHERE%20serial%20%3D%201154%20ORDER%20BY%20first_author%2C%20author_count%2C%20author%2C%20year%2C%20title&client=&formType=sqlSearch&submit=Cite&viewType=&showQuery=0&showLinks=1&showRows=25&rowOffset=&wrapResults=1&citeOrder=&citeStyle=PARNASEO&exportFormat=RIS&exportType=html&exportStylesheet=&citeType=LaTeX&headerMsg= | uv.es | CC-MAIN-2019-51 | application/x-latex | application/x-latex | crawl-data/CC-MAIN-2019-51/segments/1575540518882.71/warc/CC-MAIN-20191209121316-20191209145316-00156.warc.gz | 104,551,603 | 1,261 | %&LaTeX
\documentclass{article}
\usepackage[latin1]{inputenc}
\usepackage[T1]{fontenc}
\usepackage{textcomp}
\begin{document}
\begin{thebibliography}{1}
\bibitem{CaroValverde2004} Caro Valverde, M. T. (2004). \textit{Teor{\'\i}a de la pasi{\'o}n literaria: {\textquotedblleft}al hilo{\textquotedblright} de {\textquotedblleft}La Celestina{\textquotedblright}}. Murcia: Universidad de Murcia.
\end{thebibliography}
\end{document}
|
http://porocila.imfm.si/2006/mat/clani/turnsek.tex | imfm.si | CC-MAIN-2023-14 | text/x-tex | application/x-tex | crawl-data/CC-MAIN-2023-14/segments/1679296943695.23/warc/CC-MAIN-20230321095704-20230321125704-00667.warc.gz | 37,722,955 | 2,385 | \clan {Aleksej Turn\v{s}ek}
%--------------------------------------------------------
% B. raziskovalni clanki sprejeti v objavo v znanstvenih
% revijah in v zbornikih konferenc
%--------------------------------------------------------
\begin{skupina}{B}
\sprejetoRevija
{A.~Blanco, \crta}
{On the converse of Anderson's theorem}
{Linear Algebra Appl.}
\sprejetoRevija
{}
{On mappings approximately preserving orthogonality}
{J.\ Math.\ Anal.\ Appl.}
\end{skupina}
%--------------------------------------------------------
% C. raziskovalni clanki objavljeni v znanstvenih revijah
% in v zbornikih konferenc
%--------------------------------------------------------
\begin{skupina}{C}
\objavljenoRevija
% 1.01: {\bf 1}. BLANCO, Ariel, TURN\v{S}EK, Aleksej. On maps that preserve orthogonality in
%normed spaces. {\it Proc. R. Soc. Edinb., Sect. A, Math.}, 2006, vol. 136, no. 4,
%str. 709-716. http://www.ingentaconnect.com/content/rse/proca/2006/00000136/00000004.
%$[$COBISS.SI-ID 14182745$]$\\
{A.~Blanco, \crta}
{On maps that preserve orthogonality in normed spaces}
{Proc.\ Roy.\ Soc.\ Edinburgh Sect.\ A} {136} {2006} {4} {709--716}
\end{skupina}
% Ni podatkov za to sekcijo
%--------------------------------------------------------
% I. razno
%--------------------------------------------------------
%\begin{skupina}{I}
%\razno
% {OPIS}
%\end{skupina}
%\begin{skupina}{I}
%POZOR: bibliografije.tex > 2006\mat\clani\turnsek.tex 6031/192: Stevilo neopredeljenih zadetkov: 7
%\razno
% 1.19: {\bf 2}. TURN\v{S}EK, Aleksej. Duggal, B.P.; Harte, Robin E.: Range-kernel orthogonality and range closure of an elementary operator. (English). - $[$J$]$ Monatsh. Math. 143, No.3, 179-187 (2004). $[$ISSN 0026-9255; ISSN 1436-5081$]$. {\it Zentralblatt MATH database}. $[$Online ed.$]$, 2006, zbl 1083.47029. http://www.emis.de/ZMATH/. $[$COBISS.SI-ID 13980505$]$\\
%\razno
% 1.19: %list {\bf 3}. TURN\v{S}EK, Aleksej. Furuta, Takayuki; Giga, Mariko: Order preserving inequalities and related operator functions. (English). - $[$J$]$ Arch. Inequal. Appl. 2, No.1, 113-122 (2004). $[$ISSN 1542-6149$]$. {\it Zentralblatt MATH database}. $[$Online ed.$]$, 2006, zbl 1083.47508. http://www.emis.de/ZMATH/. $[$COBISS.SI-ID 13980761$]$\\
%\razno
% 1.19: %list {\bf 4}. TURN\v{S}EK, Aleksej. Arlinskij, Yury; Tsekanovskij, Eduard: Constant J-unitary factor and operator-valued transfer functions. (English). - $[$J$]$ Discrete Contin. Dyn. Syst. 2003, Suppl. Vol., 48-56 (2003). $[$ISSN 1078-0947; ISSN 1553-5231$]$. {\it Zentralblatt MATH database}. $[$Online ed.$]$, 2006, zbl pre02046166. http://www.emis.de/ZMATH/. $[$COBISS.SI-ID 13979737$]$\\
%\razno
% 1.19: %list {\bf 5}. TURN\v{S}EK, Aleksej. Bourin, Jean-Christophe: Convexity or concavity inequalities for Hermitian operators. (English). - $[$J$]$ Math. Inequal. Appl. 7, No.4, 607-620 (2004). $[$ISSN 1331-4343$]$. {\it Zentralblatt MATH database}. $[$Online ed.$]$, 2006, zbl pre02152410. http://www.emis.de/ZMATH/. $[$COBISS.SI-ID 13979993$]$\\
%\razno
% 1.19: %list {\bf 6}. TURN\v{S}EK, Aleksej. Stochel, Jan: Logarithmic concavity, unitarity and selfadjointness. (English). - $[$CA$]$ Jarosz, Krzysztof (ed.) et al., Topological algebras, their applications,and related topics. Proceedings of the conference to celebrate the 70th birthday of Professor Wieslaw Zelazko, Bedlewo, Poland, May 11-17, 2003. Warsaw: Polish Academy of Sciences, Institute of Mathematics. Banach Center Publications 67, 335-348 (2005). {\it Zentralblatt MATH database}. $[$Online ed.$]$, 2006, zbl pre02176448. http://www.emis.de/ZMATH/. $[$COBISS.SI-ID 13981273$]$\\
%\razno
% 1.19: %list {\bf 7}. TURN\v{S}EK, Aleksej. Petersson, Henrik: PDE-preserving properties. (English). - $[$J$]$ J. Korean Math. Soc. 42, No.3, 573-597 (2005). $[$ISSN 0304-9914$]$. {\it Zentralblatt MATH database}. $[$Online ed.$]$, 2006, zbl pre02186590. http://www.emis.de/ZMATH/. $[$COBISS.SI-ID 13981017$]$\\
%\razno
% 2.03: {\bf 8}. TURN\v{S}EK, Aleksej{\it . Tehni\v{s}ka matematika}. $[$1. izd.$]$. Ljubljana: Fakulteta za strojni\v{s}tvo, 2006. 255 str., graf. prikazi. ISBN 961-6536-02-8. $[$COBISS.SI-ID 224253440$]$\\
%\end{skupina}
%--------------------------------------------------------
% tuji gosti
%--------------------------------------------------------
%\begin{seznam}
%\gost {IME} {TRAJANJE} {USTANOVA} {KRAJ} {DRZAVA} {MESEC} {LETO} {POVABILO}
%\end{seznam}
%--------------------------------------------------------
% gostovanja
%--------------------------------------------------------
%\begin{seznam}
%\gostovanje {Aleksej Turnšek} {1 mesec} {Quenn's University} {Belfast} {Sev. Irska} {januar} {2006}
%\end{seznam}
|
https://share.cocalc.com/share/d3562b16810a1d032909c07a70235ff58809b992/latex-tests/test-concordance.tex?viewer=download | cocalc.com | CC-MAIN-2020-10 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2020-10/segments/1581875146809.98/warc/CC-MAIN-20200227191150-20200227221150-00462.warc.gz | 537,276,427 | 1,006 | \Sconcordance{concordance:test.tex:test.rnw:%
1 16 1 50 0 4 1 4 0 4 1 21 0 5 1 7 0 8 1 8 0 7 1 7 0 6 1 4 0 5 1 8 %
0 4 1 6 0 80 1 6 0 24 1 6 0 24 1 6 0 8 1}
|
https://smlnj-gforge.cs.uchicago.edu/scm/viewvc.php/*checkout*/trunk/doc/report/grammar-defs.tex?revision=97&root=diderot&pathrev=105 | uchicago.edu | CC-MAIN-2021-25 | text/x-tex | application/postscript | crawl-data/CC-MAIN-2021-25/segments/1623487610841.7/warc/CC-MAIN-20210613192529-20210613222529-00285.warc.gz | 469,755,106 | 2,100 | %!TEX root = report.tex
%
% Macros for the various rules of the Diderot grammar. We collect the
% grammer into these macros to ensure consistency between the collected
% syntax and the body of the text.
%
\newcommand{\ProgramRULES}{
\begin{Rules}{Program}
\RHS{\LISTONE{\nt{Declaration}}}
\end{Rules}}
\newcommand{\DeclarationRULES}{
\begin{Rules}{Declaration}
\RHS{\nt{InputDecl}}
\RHS{\nt{VarDecl}}
\RHS{\nt{ActorDecl}}
\RHS{\nt{CoordinationDecl}}
\end{Rules}}
\newcommand{\InputDeclRULES}{
\begin{Rules}{InputDecl}
\RHS{\kw{input} \nt{Type} \term{Id} \OPTGRP{\kw{=} \nt{Expr}} \kw{;}}
\end{Rules}}
\newcommand{\ActorDeclRULES}{
\begin{Rules}{ActorDecl}
\RHS{\kw{actor} \term{Id} \kw{(} \nt{Params} \kw{)} \kw{\{} \LISTGRP{\nt{VarDecl}} \LISTONEGRP{\nt{ActorMethod}} \kw{\}}}
\end{Rules}}
\newcommand{\ParamsRULES}{
\begin{Rules}{Params}
\RHS{\OPTGRP{\nt{Param} \LISTGRP{\kw{,} \nt{Param}}}}
\end{Rules}}
\newcommand{\ParamRULES}{
\begin{Rules}{Param}
\RHS{\nt{Type} \term{Id}}
\end{Rules}}
\newcommand{\ActorMethodRULES}{
\begin{Rules}{ActorMethod}
\RHS{\term{Id} \nt{Block}}
\end{Rules}}
\newcommand{\BlockRULES}{
\begin{Rules}{Block}
\RHS{\kw{\{} \LISTGRP{\nt{Stmt}} \kw{\}}}
\end{Rules}}
\newcommand{\StmtRULES}{
\begin{Rules}{Stmt}
\RHS{\nt{Block}}
\RHS{\nt{VarDecl}}
\RHS{\kw{stabilize} \kw{;}}
\RHS{\kw{die} \kw{;}}
\RHS{\kw{new} \term{Id} \kw{(} \nt{Arguments} \kw{)} \kw{;}}
\RHS{\term{Id} \kw{=} \nt{Expr} \kw{;}}
\RHS{\kw{if} \kw{(} \nt{Expr} \kw{)} \nt{Stmt} \kw{else} \nt{Stmt}}
\RHS{\kw{if} \kw{(} \nt{Expr} \kw{)} \nt{Stmt}}
\end{Rules}}
\newcommand{\VarDeclRULES}{
\begin{Rules}{VarDecl}
\RHS{\nt{Type} \term{Id} \kw{=} \nt{Expr} \kw{;}}
\end{Rules}}
\newcommand{\TypeRULES}{
\begin{Rules}{Type}
\RHS{\kw{image} \kw{(} \nt{Dimension} \kw{)} \nt{Dimensions}}
\RHS{\kw{field} \kw{\#} \nt{Dimension} \kw{(} \nt{Dimension} \kw{)} \nt{Dimensions}}
\RHS{\kw{kernel} \kw{\#} \nt{Dimension}}
\RHS{\nt{ValueType} \LISTGRP{\kw{[} \nt{Dimension} \kw{]}}}
\end{Rules}}
\newcommand{\CoordinationDeclRULES}{
\begin{Rules}{CoordinationDecl}
\RHS{\kw{initially} \nt{\GRP{\nt{Array} $\;|\;$ \nt{Collection}}} \kw{;}}
\end{Rules}}
\newcommand{\ArrayRULES}{
\begin{Rules}{Array}
\RHS{\kw{[} \nt{Create} \kw{|} \nt{Iterations} \kw{]}}
\end{Rules}}
\newcommand{\CollectionRULES}{
\begin{Rules}{Collection}
\RHS{\kw{\{} \nt{Create} \kw{|} \nt{Iterations} \kw{]}}
\end{Rules}}
\newcommand{\CreateRULES}{
\begin{Rules}{Create}
\RHS{\term{Id} \kw{(} \nt{Arguments} \kw{)}}
\end{Rules}}
\newcommand{\IterationsRULES}{
\begin{Rules}{Iterations}
\RHS{\nt{Iteration} \LISTONEGRP{\kw{,} \nt{Iteration}}}
\end{Rules}}
\newcommand{\IterationRULES}{
\begin{Rules}{Iteration}
\RHS{\term{Id} \kw{in} \nt{Expr} \kw{..} \nt{Expr}}
\end{Rules}}
\newcommand{\ExprRULES}{
\begin{Rules}{Expr}
\RHS{\nt{AndExpr} \LISTGRP{\kw{||} \nt{AndExpr}}}
\end{Rules}}
\newcommand{\AndExprRULES}{
\begin{Rules}{AndExpr}
\RHS{\nt{CmpExpr} \LISTGRP{\kw{\&\&} \nt{CmpExpr}}}
\end{Rules}}
\newcommand{\CmpExprRULES}{
\begin{Rules}{AddExprCmpExpr}
\RHS{\nt{AddExpr} \LISTGRP{\nt{CmpOp} \nt{AddExpr}}}
\end{Rules}}
\newcommand{\AddExprRULES}{
\begin{Rules}{AddExpr}
\RHS{\nt{MulExpr} \LISTGRP{\nt{AddOp} \nt{MulExpr}}}
\end{Rules}}
\newcommand{\MulExprRULES}{
\begin{Rules}{MulExpr}
\RHS{\nt{PrefixExpr} \LISTGRP{\nt{MulOp} \nt{PrefixExpr}}}
\end{Rules}}
\newcommand{\PrefixExprRULES}{
\begin{Rules}{PrefixExpr}
\RHS{\nt{SelExpr}}
\RHS{\kw{-} \nt{PrefixExpr}}
\RHS{\kw{!} \nt{PrefixExpr}}
\RHS{\kw{D} \nt{PrefixExpr}}
\end{Rules}}
\newcommand{\SelExprRULES}{
\begin{Rules}{SelExpr}
\RHS{\nt{AtomExp} \LISTGRP{\kw{@} \nt{AtomExp} $\;|\;$ \kw{[} \nt{Expr} \kw{]}}}
\end{Rules}}
\newcommand{\AtomExpRULES}{
\begin{Rules}{AtomExp}
\RHS{\term{Id} \OPTGRP{\kw{(} \nt{Arguments} \kw{)}}}
\RHS{\nt{ValueType} \kw{(} \nt{Arguments} \kw{)}}
\RHS{\term{Int}}
\RHS{\term{Float}}
\RHS{\term{String}}
\RHS{\kw{(} \nt{Expr} \LISTGRP{\kw{,} \nt{Expr}} \kw{)}}
\RHS{\kw{$|$} \nt{Expr} \kw{$|$}}
\end{Rules}}
\newcommand{\ArgumentsRULES}{
\begin{Rules}{Arguments}
\RHS{\OPTGRP{\nt{Expr} \LISTGRP{\kw{,} \nt{Expr}}}}
\end{Rules}}
\newcommand{\CmpOpRULES}{
\begin{Rules}{CmpOp}
\RHS{\kw{<}}
\RHS{\kw{<=}}
\RHS{\kw{==}}
\RHS{\kw{!=}}
\RHS{\kw{>=}}
\RHS{\kw{>}}
\end{Rules}}
\newcommand{\AddOpRULES}{
\begin{Rules}{AddOp}
\RHS{\kw{+}}
\RHS{\kw{-}}
\end{Rules}}
\newcommand{\MulOpRULES}{
\begin{Rules}{MulOp}
\RHS{\kw{*}}
\RHS{\kw{/}}
\end{Rules}}
\newcommand{\ValueTypeRULES}{
\begin{Rules}{ValueType}
\RHS{\kw{tensor} \nt{Dimensions}}
\RHS{\kw{vec2}}
\RHS{\kw{vec3}}
\RHS{\kw{vec4}}
\RHS{\kw{bool}}
\RHS{\kw{int}}
\RHS{\kw{real}}
\RHS{\kw{string}}
\end{Rules}}
\newcommand{\DimensionsRULES}{
\begin{Rules}{Dimensions}
\RHS{\kw{[} \OPTGRP{\nt{Dimension} \LISTGRP{\kw{,} \nt{Dimension}}} \kw{]}}
\end{Rules}}
\newcommand{\DimensionRULES}{
\begin{Rules}{Dimension}
\RHS{\term{Int}}
\end{Rules}}
<script type="text/javascript">//<![CDATA[
function toggle_ffErrors() {
var errorsblock = document.getElementById("ffErrorsBlock");
var errorsgroup = document.getElementById("ffErrors");
if (errorsblock.style.display == "none") {
errorsblock.style.display = "block";
errorsgroup.style.right = "10px";
} else {
errorsblock.style.display = "none";
errorsgroup.style.right = "300px";
}
}
//]]></script>
<div id="ffErrors">
<a href="javascript:toggle_ffErrors();">Click to toggle</a>
<div id="ffErrorsBlock">
<div class="error">does not end with </html> tag</div>
<div class="error">does not end with </body> tag</div>
<div class="info">The output has ended thus: Rules}}
\newcommand{\DimensionRULES}{
\begin{Rules}{Dimension}
\RHS{\term{Int}}
\end{Rules}}</div>
</div></div>
</body></html>
|
http://porocila.imfm.si/2019/mat/clani/orel.tex | imfm.si | CC-MAIN-2020-29 | text/x-tex | application/x-tex | crawl-data/CC-MAIN-2020-29/segments/1593655880665.3/warc/CC-MAIN-20200714114524-20200714144524-00547.warc.gz | 87,591,855 | 2,063 | \clan {Marko Orel}
%--------------------------------------------------------
% A. objavljene znanstvene monografije
%--------------------------------------------------------
%\begin{skupina}{A}
%\disertacija
% {NASLOV}
% {UNIVERZA}
% {FAKULTETA}
% {ODDELEK}
% {KRAJ} {DRZAVA} {LETO}
%\magisterij
% {NASLOV}
% {UNIVERZA}
% {FAKULTETA}
% {ODDELEK}
% {KRAJ} {DRZAVA} {LETO}
%\monografija
% {AVTORJI}
% {NASLOV}
% {ZALOZBA}
% {KRAJ} {DRZAVA} {LETO}
%\end{skupina}
% Ni podatkov za to sekcijo
%--------------------------------------------------------
% B. raziskovalni clanki sprejeti v objavo v znanstvenih
% revijah in v zbornikih konferenc
%--------------------------------------------------------
%\begin{skupina}{B}
%\sprejetoRevija
% {AVTORJI}
% {NASLOV}
% {REVIJA}
%\sprejetoZbornik
% {AVTORJI}
% {NASLOV}
% {KONFERENCA}
% {KRAJ} {DRZAVA} {MESEC} {LETO}
%\end{skupina}
% Ni podatkov za to sekcijo
%--------------------------------------------------------
% C. raziskovalni clanki objavljeni v znanstvenih revijah
% in v zbornikih konferenc
%--------------------------------------------------------
%\begin{skupina}{C}
%\objavljenoRevija
% {AVTORJI}
% {NASLOV}
% {REVIJA} {LETNIK} {LETO} {STEVILKA} {STRANI}
%\objavljenoZbornik
% {AVTORJI}
% {NASLOV}
% {KONFERENCA}
% {KRAJ} {DRZAVA} {MESEC} {LETO}
% {ZBORNIK} {STRANI}
%\end{skupina}
\begin{skupina}{C}
\objavljenoRevija
% 1. M.~Orel. Nonstandard rank-one nonincreasing maps on symmetric matrices. Linear Multilinear Algebra. 2019, vol. 67, iss. 2, str. 391-432. ISSN 0308-1087. https://doi.org/10.1080/03081087.2017.1419456, DOI: 10.1080/03081087.2017.1419456. [COBISS.SI-ID 1540253892]
{}
{Nonstandard rank-one nonincreasing maps on symmetric matrices}
{Linear Multilinear Algebra} {67} {2019} {} {391--432}
\end{skupina}
% Ni podatkov za to sekcijo
%--------------------------------------------------------
% D. urednistvo v znanstvenih revijah in zbornikih
% znanstvenih konferenc
%--------------------------------------------------------
%\begin{skupina}{D}
%\urednikRevija
% {OPIS}
% {REVIJA}
%\urednikZbornik
% {OPIS}
% {KONFERENCA}
% {KRAJ} {DRZAVA} {MESEC} {LETO}
%\end{skupina}
% Ni podatkov za to sekcijo
%--------------------------------------------------------
% E. organizacija mednarodnih in domacih znanstvenih
% srecanj
%--------------------------------------------------------
%\begin{skupina}{E}
%\organizacija
% {OPIS}
% {KONFERENCA}
% {KRAJ} {DRZAVA} {MESEC} {LETO}
%\end{skupina}
% Ni podatkov za to sekcijo
%--------------------------------------------------------
% F. vabljena predavanja na tujih ustanovah in
% mednarodnih konferencah
%--------------------------------------------------------
%\begin{skupina}{F}
%\predavanjeUstanova
% {NASLOV}
% {OPIS}
% {USTANOVA}
% {KRAJ} {DRZAVA} {MESEC} {LETO}
%\predavanjeKonferenca
% {NASLOV}
% {OPIS}
% {KONFERENCA}
% {KRAJ} {DRZAVA} {MESEC} {LETO}
%\end{skupina}
% Ni podatkov za to sekcijo
%--------------------------------------------------------
% G. aktivne udelezbe na mednarodnih in domacih
% konferencah
%--------------------------------------------------------
%\begin{skupina}{G}
%\konferenca
% {NASLOV}
% {KONFERENCA}
% {KRAJ} {DRZAVA} {MESEC} {LETO}
%\end{skupina}
\begin{skupina}{G}
\konferenca
% 3. M.~Orel. On some connections between finite geometry, graph theory, and matrix theory. V: Finite geometry workshop 2019 : January 31 - February 3, 2019 University of Szeged, Szeged, Hungary. Szeged: University of Szeged, 2019. Str. 29. [COBISS.SI-ID 1541257924]
{On some connections between finite geometry, graph theory, and matrix theory}
{Finite geometry workshop}
{Szeged} {Madžarska} {februar} {2019}
\konferenca
% 2. M.~Orel. Rank-one nonincreasing maps on symmetric matrices over small fields. V: Book of Abstracts. Preserver Weekend in Szeged, 12-14 April 2019 - Bolyai Institute, University of Szeged. Szeged: Bolyai Institute, 2019. Str. 12. https://users.renyi.hu/~titkos/Abstracts.pdf. [COBISS.SI-ID 1541247428]
{Rank-one nonincreasing maps on symmetric matrices over small fields}
{Preserver Weekend in Szeged}
{} {Madžarska} {april} {2019}
\end{skupina}
% Ni podatkov za to sekcijo
%--------------------------------------------------------
% H. strokovni clanki
%--------------------------------------------------------
%\begin{skupina}{H}
%\clanekRevija
% {AVTORJI}
% {NASLOV}
% {REVIJA} {LETNIK} {LETO} {STEVILKA} {STRANI}
%\clanekZbornik
% {AVTORJI}
% {NASLOV}
% {KONFERENCA}
% {KRAJ} {DRZAVA} {MESEC} {LETO}
% {ZBORNIK} {STRANI}
%\end{skupina}
% Ni podatkov za to sekcijo
%--------------------------------------------------------
% I. razno
%--------------------------------------------------------
%\begin{skupina}{I}
%\razno
% {OPIS}
% \end{skupina}
\begin{skupina}{I}
\razno
% 1.19 Recenzija, prikaz knjige, kritika
% 4. M.~Orel. Ahmia, Moussa(DZ-UJ-M); Belbachir, Hac\`{e}ne(DZ-BOUMM-RCL) p,q-analogue of a linear transformation preserving log-convexity. (English summary) Indian J. Pure Appl. Math. 49 (2018), no. 3, 549-557. MathSciNet. mr3854452. ISSN 2167-5163. http://www.ams.org/mathscinet. [COBISS.SI-ID 1541309124]
{Ena recenzija za MathSciNet}
\end{skupina}
% Ni podatkov za to sekcijo
%--------------------------------------------------------
% tuji gosti
%--------------------------------------------------------
%\begin{seznam}
%\gost {IME} {TRAJANJE} {USTANOVA} {KRAJ} {DRZAVA} {MESEC} {LETO} {POVABILO}
%\end{seznam}
%--------------------------------------------------------
% gostovanja
%--------------------------------------------------------
%\begin{seznam}
%\gostovanje {IME} {TRAJANJE} {USTANOVA} {KRAJ} {DRZAVA} {MESEC} {LETO}
%\end{seznam}
|
https://www.coaps.fsu.edu/bibliography/search.php?sqlQuery=SELECT%20author%2C%20title%2C%20type%2C%20year%2C%20publication%2C%20abbrev_journal%2C%20volume%2C%20issue%2C%20pages%2C%20keywords%2C%20abstract%2C%20thesis%2C%20editor%2C%20publisher%2C%20place%2C%20abbrev_series_title%2C%20series_title%2C%20series_editor%2C%20series_volume%2C%20series_issue%2C%20edition%2C%20language%2C%20author_count%2C%20online_publication%2C%20online_citation%2C%20doi%2C%20serial%2C%20area%20FROM%20refs%20WHERE%20serial%20%3D%20526%20ORDER%20BY%20first_author%2C%20author_count%2C%20author%2C%20year%2C%20title&client=&formType=sqlSearch&submit=Cite&viewType=&showQuery=0&showLinks=1&showRows=10&rowOffset=&wrapResults=1&citeOrder=&citeStyle=APA&exportFormat=RIS&exportType=html&exportStylesheet=&citeType=LaTeX&headerMsg= | fsu.edu | CC-MAIN-2022-40 | application/x-latex | application/x-latex | crawl-data/CC-MAIN-2022-40/segments/1664030337404.30/warc/CC-MAIN-20221003070342-20221003100342-00599.warc.gz | 717,355,281 | 1,419 | %&LaTeX
\documentclass{article}
\usepackage[latin1]{inputenc}
\usepackage[T1]{fontenc}
\usepackage{textcomp}
\begin{document}
\begin{thebibliography}{1}
\bibitem{Meyers+Basu1999} Meyers, S. D., \& Basu, S. (1999). Eddies in the eastern Gulf of Alaska from TOPEX/POSEIDON altimetry. \textit{J. Geophys. Res.}, \textit{104}(C6), 13333--13343.
\end{thebibliography}
\end{document}
|
http://www.jp.netbsd.org/gallery/advocacy/sschumacher/netbsd-a5-flyer-en.tex | netbsd.org | CC-MAIN-2020-24 | application/x-tex | text/x-matlab | crawl-data/CC-MAIN-2020-24/segments/1590347409337.38/warc/CC-MAIN-20200530133926-20200530163926-00353.warc.gz | 182,434,308 | 3,730 | % $Id: netbsd-a5-flyer-en.tex,v 1.3 2016/01/27 12:52:03 sevan Exp $
% written by Stefan Schumacher, <stefan [at] net-tex.de>, 2006-01-08
% Do not remove my copyright notice!
\documentclass[9pt,a5paper]{article}
\usepackage[pdftex]{graphicx}
\usepackage{multicol}
\usepackage[UKenglish]{babel}
\usepackage[nofancy]{rcsinfo}
\usepackage{kopf}
% set the margins
\usepackage{geometry}
\geometry{margin=10mm}
% pretty-print CVS tags for footer
\setlength{\parindent}{0pt}
% mySection
\newcommand{\mySection}[1]{\begin{center}\large{\sffamily\bfseries #1}\end{center}}
% begin
\begin{document}
\pagestyle{empty}
\KopfAFuenf[13]{Introducing NetBSD}
%
% Body
\begin{multicols}{2}
\mySection{What is the NetBSD Project?}
The NetBSD Project gives you a complete Unix-like operating
system that is up to today's Open Source and security
standards, supporting industry-standard APIs, communication protocols,
and a huge variety of hardware platforms. NetBSD is suited to a wide
range of applications, from servers and workstations to PDAs and
embedded systems.
NetBSD is often chosen to control newly developed hardware and to
drive such products as network computers, single-board computers,
internet appliances, firewalls, printers, copiers and even web-cams.
NetBSD is used in network development all over the
world. ISPs use NetBSD because of the wide spectrum of network
possibilities, and enthusiasts choose NetBSD for its excellent hardware
support.
\mySection{Why is NetBSD so special?}
Since NetBSD was founded in 1993 as a successor of the BSD-line, it has always been at the forefront
of Open Source operating system development. NetBSD has been the
complete foundation or reference for other projects. Many of NetBSD's
advantages are not found in any other open source operating system.
\begin{itemize}\itemsep-1ex
\item NetBSD offers support for 55 different hardware platforms and 17 CPU
architectures. And even more will follow.
\item POSIX threads implementation based on Scheduler Activations
\item Cross compiling of the kernel and userland supported by the
standard toolchain - build NetBSD almost anywhere, out of the box!
\item Kernel events notification framework provides a stateful and efficient
event notification, including socket, file, directory, fifo, pipe, tty
and device changes
\item Many security-specific features, including Verified Exec and the
systrace framework are implemented in the base system.
\item Complete source, including the history of the development,
available via anonymous CVS, rsync and CVSweb
\item Support for various network technologies including ATM, HIPPI, FDDI,
HSSI, IEEE 802.11, Token-Ring, ARCnet and Ethernet (up to 10Gbps!)
\item NetBSD was the first open source operating system to support USB, USB2,
and PCMCIA audio.
% \item Many subsystems are described in detail in published articles.
\end{itemize}
\mySection{Use Your Favorite Tools and Applications}
NetBSD contains all the features you would expect in an open source
operating system today, including X11, tools for firewalls, and software
RAID. With NetBSD's package tools you can install more than 5500 freely
available software packages easily.
% NetBSD's {\it binary compatibility} feature lets you run applications
% compiled for other operating systems (for the same CPU architecture). This
% includes most applications for Linux, Solaris, SCO, FreeBSD, BSD/OS,
% OSF/1, and Ultrix; and some for Darwin and IRIX. In fact, testing has
% shown NetBSD runs the Sun JDK/JRE for Linux as well as Linux itself does.
\mySection{Ideal for Embedded Environments}
NetBSD is designed to minimize the effort needed to make it run on new
hardware. As a result, you are able to concentrate on the development of
the hardware.
NetBSD is particularly well suited to embedded environments. It supports
many lower-power CPUs, such as ARM, MIPS, PowerPC, Xscale, and Hitachi SH
3/4/5. By removing optional components, NetBSD can be trimmed down to fit
comfortably on very small systems. And of course tools are available to do
cross-development. Both the toolchain and compilers support
cross-compiling. Cross-compiling the kernel and the whole operating system
is easily possible, as is cross-building whole distribution sets.
Make the decision---joining many Fortune 100 and Fortune 500 companies---to
use NetBSD, the world's most portable operating system, for your
product.
\mySection{Security for Paranoids}
With integrated firewall tools and tools that can be easily installed from
our software archives---including IPsec, Kerberos 5, SSH, SSL, and
encryption tools such as PGP---you have access to a modern security system.
NetBSD enforces non-executable mappings on many platforms. Stack and heap
mappings are non-executable by default, making exploitation of potential
buffer overflows harder. NetBSD also supports PROT\_EXEC permission via
mmap(2) for all platforms where the hardware differentiates execute access
from data access.
In the public forums related to Security issues, such as the Bugtraq
mailing list, NetBSD has always had fewer known security problems than the
alternative solutions. One more reason security consultants
choose NetBSD!
\mySection{Help is only an e-mail away!}
In case of trouble you can find fast and unbureaucratic help through
our mailing lists and the bug-tracking system. For more professional help,
you'll find many consultants listed at our website.
There is no phone support but your questions will be answered
without wasting time listening to music while on hold.
\mySection{Don't miss the connection}
NetBSD has been growing since March 1993, longer than any other
alternative solutions in the field of open source, and is today stronger
than ever. We won't disappear and leave you alone or stop supporting
your platform. You can put your mind at ease knowing that the future
development of your OS is in the hands of capable experts.
\end{multicols}
\mySection{Where do I get NetBSD?}
\begin{itemize}\itemsep-1ex
\item WWW: {\tt http://www.NetBSD.org/}
\item FTP: {\tt ftp://ftp.NetBSD.org/pub/NetBSD/}
\item CVS: {\tt [email protected]:/cvsroot}
\item CD/DVD: {\tt http://www.NetBSD.org/Sites/cdroms.html}
\end{itemize}
%
% Footer
%
\rcsInfo $Id: netbsd-a5-flyer-en.tex,v 1.3 2016/01/27 12:52:03 sevan Exp $
\scriptsize
\rcsInfoRevision\ \rcsInfoYear-\rcsInfoMonth-\rcsInfoDay. All rights
reserved.
Created by Stefan Schumacher \texttt{<[email protected]>}
% Do not remove my copyright notice!
%
\end{document}
|
http://hendrikmaryns.name/Wiskunde/Funksileer/bronbestanden/toets%202%20havo%20a%202013.tex | hendrikmaryns.name | CC-MAIN-2018-51 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2018-51/segments/1544376831334.97/warc/CC-MAIN-20181219045716-20181219071716-00605.warc.gz | 136,784,906 | 2,062 | \documentclass[dutch,headinclude=false,footinclude=false,headsepline]{scrartcl}
% schreefloze lettertiepes voor tekst en wiskunde, moet voor fontspec, of hoe
% anders oproepen?
\usepackage{cmbright}
\usepackage{fontspec}
% oplossing voor °. Deze beter niet als superskript gebruiken volgens Context
% gurus, bovendien bevat cmbright het Unicode-symbool niet.
\DeclareMathSymbol{°}{\mathbin}{symbols}{"0E}
% standaartpakketten
\usepackage{fixltx2e}
\usepackage{babel}
% standaart voor wiskunde
\usepackage{amsmath}
% komma als desimaalscheiding
\usepackage{icomma}
% headers
\usepackage{scrpage2}
\pagestyle{scrheadings}
\ihead{Klas 11 havo EM}
\chead{\textbf{\Large Toets functieleer}}
\ohead{2013-03-12}
\ifoot{}
\cfoot{}
\ofoot{}
\usepackage{enumitem}
\newcommand{\preitem}[1]{\makebox[0pt]{\makebox[7.5em][l]{\scriptsize #1p}}\ignorespaces}
\begin{document}
\noindent Deze toets bestaat uit 15 opgaven. Voor elk onderdeel is
aangegeven hoeveel punten kunnen worden behaald. Er zijn maximaal 46 punten te
behalen. Antwoorden moeten altijd zijn voorzien van een \emph{berekening,
toelichting of argumentatie}.
\vspace{1ex}
\hrule
\section*{Felicitatiekaarten}
Een fabrikant van felicitatiekaarten weet uit ervaring dat het aantal per week verkochte kaarten $q$ omgekeerd evenredig is met de prijs $p$ in euro’s.
Bij een prijs van € 1,90 verkoopt hij wekelijks 8500 kaarten.
\begin{enumerate}[resume]
\item \preitem{3} Stel de formule op van de weekverkoop $q$ bij een prijs van $p$ euro.
\item \preitem{1} Bereken de weekverkoop bij een prijs van € 2,50.
\item \preitem{2} Bereken welke prijs bij een weekverkoop van 4750 kaarten hoort.
\item \preitem{3} Onderzoek bij welke prijs per kaart de fabrikant wekelijks meer dan 12000 kaarten verkoopt.
\end{enumerate}
\section*{Verbindingsteller}
Het aantal verbindingen die gemaakt zijn met een internetsite waarop allerlei goederen te koop worden aangeboden is voor een doordeweekse dag te benaderen door het model \[N=0,02t^5-1,225t^4+22,5t^3-84t^2-646t+5000.\]
Hierin is $t$ het tijdstip van de dag in uren met $t = 0$ om 0.00 uur en $N$ het aantal verbindingen.
\begin{enumerate}[resume]
\item \preitem{5} Schets de grafiek van $N$. Welke \texttt{Xmin}, \texttt{Xmax}, \texttt{Ymin} en \texttt{Ymax} heb je genomen?
\item \preitem{2} Hoeveel verbindingen zijn er om half een ’s middags?
\item \preitem{2} Bereken het differentiequotiënt op $[1, 3]$.
\item \preitem{2} Bereken de gemiddelde toename van $N$ tussen 8 uur en 12 uur.
\item \preitem{4} Hoe laat is het aantal verbindingen het grootst? Hoeveel verbindingen zijn er dan?
\item \preitem{4} Er zijn 6000 verbindingen. Hoe laat kan het zijn?
\end{enumerate}
\section*{Supersize me}
\begin{enumerate}[resume]
\item \preitem{18} Maak de examenopgave ‘Supersize me’ van 2012, eerste tijdvak.\label{laatste}
\end{enumerate}
\end{document}
|
https://www.zentralblatt-math.org/matheduc/en/?id=134482&type=tex | zentralblatt-math.org | CC-MAIN-2019-47 | text/plain | application/x-tex | crawl-data/CC-MAIN-2019-47/segments/1573496671053.31/warc/CC-MAIN-20191121231600-20191122015600-00537.warc.gz | 1,044,506,150 | 1,108 | \input zb-basic
\input zb-matheduc
\iteman{ZMATH 1987a.02821}
\itemau{Steinberg, G.}
\itemti{Curvature of a graph - a teaching proposal for the upper secondary. Die Kruemmung von Funktionsgraphen - Unterrichtsvorschlaege fuer Leistungs- und Grundkurse.}
\itemso{Didakt. Math. (1985) v. 13(3) p. 222-236. [ISSN 0343-5334]}
\itemab
\itemrv{~}
\itemcc{I54}
\itemut{Graph of A Function; Curve Sketching; Upper Secondary (Gymnasium); Curve Theory; Lesson Plans; Kruemmung; ; Schaubild; Kurvendiskussion; Gymnasiale Oberstufe; Kurventheorie; Unterrichtsentwurf; Kruemmung}
\itemli{}
\end |
https://www.pharmascope.org/index.php/ijrps/article/download/2841/6129 | pharmascope.org | CC-MAIN-2021-39 | text/x-tex | application/x-tex | crawl-data/CC-MAIN-2021-39/segments/1631780057388.12/warc/CC-MAIN-20210922193630-20210922223630-00583.warc.gz | 952,068,359 | 10,575 | \documentclass[twocolumn,twoside]{article}
\makeatletter\if@twocolumn\PassOptionsToPackage{switch}{lineno}\else\fi\makeatother
\usepackage{amsfonts,amssymb,amsbsy,latexsym,amsmath,tabulary,graphicx,times,xcolor}
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
% Following additional macros are required to function some
% functions which are not available in the class used.
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\usepackage{url,multirow,morefloats,floatflt,cancel,tfrupee}
\makeatletter
\AtBeginDocument{\@ifpackageloaded{textcomp}{}{\usepackage{textcomp}}}
\makeatother
\usepackage{colortbl}
\usepackage{xcolor}
\usepackage{pifont}
\usepackage[nointegrals]{wasysym}
\urlstyle{rm}
\makeatletter
%%%For Table column width calculation.
\def\mcWidth#1{\csname TY@F#1\endcsname+\tabcolsep}
%%Hacking center and right align for table
\def\cAlignHack{\rightskip\@flushglue\leftskip\@flushglue\parindent\z@\parfillskip\z@skip}
\def\rAlignHack{\rightskip\z@skip\leftskip\@flushglue \parindent\z@\parfillskip\z@skip}
%Etal definition in references
\@ifundefined{etal}{\def\etal{\textit{et~al}}}{}
%\if@twocolumn\usepackage{dblfloatfix}\fi
\usepackage{ifxetex}
\ifxetex\else\if@twocolumn\@ifpackageloaded{stfloats}{}{\usepackage{dblfloatfix}}\fi\fi
\AtBeginDocument{
\expandafter\ifx\csname eqalign\endcsname\relax
\def\eqalign#1{\null\vcenter{\def\\{\cr}\openup\jot\m@th
\ialign{\strut$\displaystyle{##}$\hfil&$\displaystyle{{}##}$\hfil
\crcr#1\crcr}}\,}
\fi
}
%For fixing hardfail when unicode letters appear inside table with endfloat
\AtBeginDocument{%
\@ifpackageloaded{endfloat}%
{\renewcommand\efloat@iwrite[1]{\immediate\expandafter\protected@write\csname efloat@post#1\endcsname{}}}{\newif\ifefloat@tables}%
}%
\def\BreakURLText#1{\@tfor\brk@tempa:=#1\do{\brk@tempa\hskip0pt}}
\let\lt=<
\let\gt=>
\def\processVert{\ifmmode|\else\textbar\fi}
\let\processvert\processVert
\@ifundefined{subparagraph}{
\def\subparagraph{\@startsection{paragraph}{5}{2\parindent}{0ex plus 0.1ex minus 0.1ex}%
{0ex}{\normalfont\small\itshape}}%
}{}
% These are now gobbled, so won't appear in the PDF.
\newcommand\role[1]{\unskip}
\newcommand\aucollab[1]{\unskip}
\@ifundefined{tsGraphicsScaleX}{\gdef\tsGraphicsScaleX{1}}{}
\@ifundefined{tsGraphicsScaleY}{\gdef\tsGraphicsScaleY{.9}}{}
% To automatically resize figures to fit inside the text area
\def\checkGraphicsWidth{\ifdim\Gin@nat@width>\linewidth
\tsGraphicsScaleX\linewidth\else\Gin@nat@width\fi}
\def\checkGraphicsHeight{\ifdim\Gin@nat@height>.9\textheight
\tsGraphicsScaleY\textheight\else\Gin@nat@height\fi}
\def\fixFloatSize#1{}%\@ifundefined{processdelayedfloats}{\setbox0=\hbox{\includegraphics{#1}}\ifnum\wd0<\columnwidth\relax\renewenvironment{figure*}{\begin{figure}}{\end{figure}}\fi}{}}
\let\ts@includegraphics\includegraphics
\def\inlinegraphic[#1]#2{{\edef\@tempa{#1}\edef\baseline@shift{\ifx\@tempa\@empty0\else#1\fi}\edef\tempZ{\the\numexpr(\numexpr(\baseline@shift*\f@size/100))}\protect\raisebox{\tempZ pt}{\ts@includegraphics{#2}}}}
%\renewcommand{\includegraphics}[1]{\ts@includegraphics[width=\checkGraphicsWidth]{#1}}
\AtBeginDocument{\def\includegraphics{\@ifnextchar[{\ts@includegraphics}{\ts@includegraphics[width=\checkGraphicsWidth,height=\checkGraphicsHeight,keepaspectratio]}}}
\DeclareMathAlphabet{\mathpzc}{OT1}{pzc}{m}{it}
\def\URL#1#2{\@ifundefined{href}{#2}{\href{#1}{#2}}}
%%For url break
\def\UrlOrds{\do\*\do\-\do\~\do\'\do\"\do\-}%
\g@addto@macro{\UrlBreaks}{\UrlOrds}
\edef\fntEncoding{\f@encoding}
\def\EUoneEnc{EU1}
\makeatother
\def\floatpagefraction{0.8}
\def\dblfloatpagefraction{0.8}
\def\style#1#2{#2}
\def\xxxguillemotleft{\fontencoding{T1}\selectfont\guillemotleft}
\def\xxxguillemotright{\fontencoding{T1}\selectfont\guillemotright}
\newif\ifmultipleabstract\multipleabstractfalse%
\newenvironment{typesetAbstractGroup}{}{}%
%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%
\usepackage[authoryear]{natbib}
\newif\ifnokeywords\nokeywordsfalse
\makeatletter\input{size10-pointfive.clo}\makeatother%
\definecolor{kwdboxcolor}{RGB}{242,242,242}
\usepackage[hidelinks,colorlinks=true,allcolors=blue]{hyperref}
\linespread{1}
\def\floatpagefraction{0.8}
\usepackage[paperheight=11.69in,paperwidth=8.26in,top=1in,bottom=1in,left=1in,right=.75in,headsep=24pt]{geometry}
\usepackage{multirow-custom}
\makeatletter
\def\hlinewd#1{%
\noalign{\ifnum0=`}\fi\hrule \@height #1%
\futurelet\reserved@a\@xhline}
\def\tbltoprule{\hlinewd{1pt}\\[-14pt]}
\def\tblbottomrule{\noalign{\vspace*{6pt}}\hline\noalign{\vspace*{2pt}}}
\def\tblmidrule{\hline\noalign{\vspace*{2pt}}}
\let\@articleType\@empty
\let\@journalDoi\@empty
\let\@journalVolume\@empty
\let\@journalIssue\@empty
\let\@crossMarkLink\@empty
\let\@receivedDate\@empty
\let\@acceptedDate\@empty
\let\@revisedDate\@empty
\let\@copyrightYear\@empty
\let\@firstPage\@empty
\def\articleType#1{\gdef\@articleType{#1}}
\def\journalDoi#1{\gdef\@journalDoi{#1}}
\def\crossMarkLink#1{\gdef\@crossMarkLink{#1}}
\def\receivedDate#1{\gdef\@receivedDate{#1}}
\def\acceptedDate#1{\gdef\@acceptedDate{#1}}
\def\revisedDate#1{\gdef\@revisedDate{#1}}
\def\copyrightYear#1{\gdef\@copyrightYear{#1}}
\def\journalVolume#1{\gdef\@journalVolume{#1}}
\def\journalIssue#1{\gdef\@journalIssue{#1}}
\def\firstPage#1{\gdef\@firstPage{#1}}
\def\author#1{%
\gdef\@author{%
\hskip-\dimexpr(\tabcolsep)\hskip5pt%
\parbox{\dimexpr\textwidth-1pt}%
{\fontsize{11}{13}\selectfont\raggedright #1}%
}%
}
\usepackage{pharmascope-abs}
\usepackage{caption}
\usepackage{lastpage}
\usepackage{fancyhdr}
\usepackage[noindentafter,explicit]{titlesec}
\usepackage{fontspec}
\setmainfont[%
BoldFont=cambriab.otf,%
ItalicFont=CAMBRIAI.otf,%
BoldItalicFont=CAMBRIAZ.otf]{Cambria.otf}
\lefthyphenmin = 3
\def\title#1{%
\gdef\@title{%
\vspace*{-40pt}%
\ifx\@articleType\@empty\else{\fontsize{10}{12}\scshape\selectfont\hspace{8pt}\@articleType\hfill\mbox{}\par\vspace{2pt}}\fi%
\minipage{\linewidth}
\hrulefill\\[-0.7pt]%
\mbox{~}\hspace{5pt}\parbox{.1\linewidth}{\includegraphics[width=75pt,height=50pt]{ijrps_logo.png}}\hfill
\fcolorbox{kwdboxcolor}{kwdboxcolor}{\parbox{.792\linewidth}{%
\begin{center}\fontsize{17}{17}\selectfont\scshape\vskip-7pt International Journal of Research in Pharmaceutical Sciences\hfill\end{center}%
\vspace*{-10pt}\hspace*{4pt}{\fontsize{8}{9}\selectfont Published by JK Welfare \& Pharmascope Foundation\hfill Journal Home Page: \href{http://www.pharmascope.org/ijrps}{\color{blue}\underline{\smash{www.pharmascope.org/ijrps}}}}\hspace*{4pt}\mbox{}}}%
\par\vspace*{-1pt}\rule{\linewidth}{1.3pt}%
\endminipage%
\par\vspace*{9.2pt}\parbox{.98\linewidth}{\linespread{.9}\raggedright\fontsize{14}{17}\selectfont #1}%
\vspace*{-8pt}%
}
}
\setlength{\parindent}{0pt}
\setlength{\parskip}{0.4pc plus 1pt minus 1pt}
\def\abbrvJournalTitle{Int. J. Res. Pharm. Sci.}
\fancypagestyle{headings}{%
\renewcommand{\headrulewidth}{0pt}%
\renewcommand{\footrulewidth}{0.3pt}
\fancyhf{}%
\fancyhead[R]{%
\fontsize{9.12}{11}\selectfont\RunningAuthor,\ \abbrvJournalTitle,\ \ifx\@journalVolume\@empty X\else\@journalVolume\fi%
\ifx\@journalIssue\@empty\else(\@journalIssue)\fi%
,\ \ifx\@firstPage\@empty 1\else\@firstPage\fi-\pageref*{LastPage}%
}%
\fancyfoot[LO,RE]{\fontsize{9.12}{11}\selectfont\textcopyright\ International Journal of Research in Pharmaceutical Sciences}%
\fancyfoot[RO,LE]{\fontsize{9.12}{11}\selectfont\thepage}
}\pagestyle{headings}
\fancypagestyle{plain}{%
\renewcommand{\headrulewidth}{0pt}%
\renewcommand{\footrulewidth}{0.3pt}%
\fancyhf{}%
\fancyhead[R]{%
\fontsize{9.12}{11}\selectfont\RunningAuthor,\ \abbrvJournalTitle,\ \ifx\@journalVolume\@empty X\else\@journalVolume\fi%
\ifx\@journalIssue\@empty\else(\@journalIssue)\fi%
,\ \ifx\@firstPage\@empty 1\else\@firstPage\fi-\pageref*{LastPage}%
}%
\fancyfoot[LO,RE]{\fontsize{9.12}{11}\selectfont\textcopyright\ International Journal of Research in Pharmaceutical Sciences}%
\fancyfoot[RO,LE]{\fontsize{9.12}{11}\selectfont\thepage}
\ifx\@firstPage\@empty\else\setcounter{page}{\@firstPage}\fi
}
\def\NormalBaseline{\def\baselinestretch{1.1}}
\usepackage{textcase}
\setcounter{secnumdepth}{0}
\titleformat{\section}[block]{\bfseries\boldmath\NormalBaseline\filright\fontsize{10.5}{13}\selectfont}
{\thesection}
{6pt}
{\MakeTextUppercase{#1}}
[]
\titleformat{\subsection}[block]{\bfseries\boldmath\NormalBaseline\filright\fontsize{10.5}{12}\selectfont}
{\thesubsection}
{6pt}
{#1}
[]
\titleformat{\subsubsection}[block]{\NormalBaseline\filright\fontsize{10.5}{12}\selectfont}
{\thesubsubsection}
{6pt}
{#1}
[]
\titleformat{\paragraph}[block]{\NormalBaseline\filright\fontsize{10.5}{10}\selectfont}
{\theparagraph}
{6pt}
{#1}
[]
\titleformat{\subparagraph}[block]{\NormalBaseline\filright\fontsize{10.5}{12}\selectfont}
{\thesubparagraph}
{6pt}
{#1}
[]
\titlespacing{\section}{0pt}{.5\baselineskip}{.5\baselineskip}
\titlespacing{\subsection}{0pt}{.5\baselineskip}{.5\baselineskip}
\titlespacing{\subsubsection}{0pt}{.5\baselineskip}{.5\baselineskip}
\titlespacing{\paragraph}{0pt}{.5\baselineskip}{.5\baselineskip}
\titlespacing{\subparagraph}{0pt}{.5\baselineskip}{.5\baselineskip}
\captionsetup[figure]{skip=1.4pt,font=bf,labelsep=colon,justification=raggedright,singlelinecheck=false}
\captionsetup[table]{skip=1.4pt,font=bf,labelsep=colon,justification=raggedright,singlelinecheck=false}
\def\bibyear#1{#1}
%\def\bibjtitle#1{#1} %%Publisher request
\def\bibauand{}
\setlength\bibsep{3pt}
\setlength\bibhang{8pt}
\makeatother
\date{}
\usepackage{float}
\begin{document}
\def\RunningAuthor{Abilasha R}
\firstPage{526}
\articleType{Original Article}
\receivedDate{20 Jun 2020}
\acceptedDate{05 Aug 2020}
\revisedDate{18 Jul 2020}
\journalVolume{2020, 11 (SPL)}
\journalIssue{1}
\journalDoi{ijrps.v11iSPL1.2841}
\copyrightYear{2020}
\def\authorCount{2}
\def\affCount{1}
\def\journalTitle{International Journal of Research in Pharmaceutical Sciences}
\title{General awareness about Covid-19 and the role of Convalescent plasma therapy in the treatment of Covid -19 among post graduate dental students - A KAP Survey}
\author{Deepa~Viswasini~R,
Abilasha~R\textsuperscript{*}~\\[5pt]{Department of Oral Pathology, Saveetha Dental College and Hospitals, Saveetha Institute of Medical and Technical Sciences, Saveetha University, Chennai-600077 Tamil Nadu, India}}
\begin{abstract}
COVID-19, caused by SARS Cov2 virus is a global pandemic and a threat to the world population and economy. It can manifest with a broad spectrum of clinical symptoms ranging from asymptomatic cases to pneumonia or even fatality. One of the treatments suggested is convalescent plasma therapy. The study aims at assessing the general awareness about Covid-19 and knowledge about the role of Convalescent plasma therapy for treatment of Covid -19 among post graduate dental students. The survey was conducted among postgraduate dental students through an online survey tool using google forms. The survey was conducted online among postgraduate dental students on the go with 19 and convalescent plasma therapy.A total of 103 participant were included in the study. The responses were collected, tabulated and analysed using SPSS software. The knowledge regarding covid -19 and the awareness about the usefulness of convalescent plasma was variable. Around 90\% of the participants were aware of the effectiveness of convalescent plasma therapy. Advance training, proper PPE and training on handling the patients with any infectious disease should be dealt with in detail for reducing the spread from dental clinics and dentists.
\end{abstract}\def\keywordstitle{Keywords}
\begin{keywords}COVID 19,\newline pathogenesis,\newline convalescent plasma therapy,\newline undergraduate dental students
\end{keywords}
\twocolumn[ \maketitle {\printKwdAbsBox}]
\makeatletter\textsuperscript{*}Corresponding Author\par Name:\ Abilasha~R~\\ Phone:\ ~\\ Email:\ [email protected]
\par\vspace*{-11pt}\hrulefill\par{\fontsize{12}{14}\selectfont ISSN: 0975-7538}\par%
\textsc{DOI:}\ \href{https://doi.org/10.26452/\@journalDoi}{\textcolor{blue}{\underline{\smash{https://doi.org/10.26452/\@journalDoi}}}}\par%
\vspace*{-11pt}\hrulefill\\{\fontsize{9.12}{10.12}\selectfont Production and Hosted by}\par{\fontsize{12}{14}\selectfont Pharmascope.org}\par%
\vspace*{-7pt}{\fontsize{9.12}{10.12}\selectfont\textcopyright\ \@copyrightYear\ $|$ All rights reserved.}\par%
\vspace*{-11pt}\rule{\linewidth}{1.2pt}
\makeatother
\section{Introduction}
COVID-19 has been caused by the novel coronavirus SARS-CoV 2. The ICTV (international committee of the taxonomy of virus) has labelled SARS CoV 2, which has an outbreak from Wuhan, China, from January 2020 \unskip~\citep{843100:19919524}. It was similar to a different pathogen named SARS Cov (2003) and MERS CoV (Middle East Respiratory Syndrome corona virus 2015) \unskip~\citep{843100:19919523}, \unskip~\citep{843100:19919526}. Corona virus belongs to the corona family beta Corona virus family with a size of 65 to 125 nm in diameter. This has led to severe respiratory problems and is at high risk of spreading to the common public; the scenario in India on COVID-19 is better than other tablet affected countries due to the precautionary measures \unskip~\citep{843100:19919524}, \unskip~\citep{843100:19919507}. Medical researchers have done a lot of studies to attend vaccination for this single-stranded RNA containing virus \unskip~\citep{843100:19919530}. Passive immunisation therapy has been used since 1890 to treat infectious disease \unskip~\citep{843100:19919506}, \unskip~\citep{843100:19919530}. Plasma transfusion is a way to administer neutralising antibodies in patients with the specified clinical disease to reduce symptoms and mortality \unskip~\citep{843100:19919515}. This has increased attention to reduce large-scale epidemic disease. In SARS and severe influenza, convalescent plasma therapy was recommended as the production of endogenous IgM and IgG Antibodies peaks at 2 to 4 weeks after transfusion respectively \unskip~\citep{843100:19919521}, \unskip~\citep{843100:19919532}. This led to a recommendation of convalescent plasma therapy for Covid 19 but has to be administered as early as possible. Convalescent plasma therapy as a classic adaptive Therapy which was used for the treatment of SARS, MERS, H1 N1 pandemic, which gave a satisfactory and efficient result. There has been little evidence of the contribution of viral disease in the pathogenesis of pulp stones.\unskip~\citep{843100:19919505} The main aim of
\bgroup
\fixFloatSize{images/25211c1f-4e37-435c-bab9-34c0e9c2a493-upicture1.png}
\begin{figure}[!htbp]
\centering \makeatletter\IfFileExists{images/25211c1f-4e37-435c-bab9-34c0e9c2a493-upicture1.png}{\includegraphics{images/25211c1f-4e37-435c-bab9-34c0e9c2a493-upicture1.png}}{}
\makeatother
\caption{\boldmath {Percentage of participants who agree that COVID 19 is caused by SARS- CoV-2 virus. }}
\label{f-738b2702b8a1}
\end{figure}
\egroup
\bgroup
\fixFloatSize{images/f8e7702f-a090-40b9-a231-991e9a5ffcd6-upicture2.png}
\begin{figure}[!htbp]
\centering \makeatletter\IfFileExists{images/f8e7702f-a090-40b9-a231-991e9a5ffcd6-upicture2.png}{\includegraphics{images/f8e7702f-a090-40b9-a231-991e9a5ffcd6-upicture2.png}}{}
\makeatother
\caption{\boldmath {Percentage of responses of various symptoms of COVID 19. }}
\label{f-044308f6fb42}
\end{figure}
\egroup
\bgroup
\fixFloatSize{images/ed037fde-9ca9-45a1-927e-c681ce737fd2-upicture3.png}
\begin{figure}[!htbp]
\centering \makeatletter\IfFileExists{images/ed037fde-9ca9-45a1-927e-c681ce737fd2-upicture3.png}{\includegraphics{images/ed037fde-9ca9-45a1-927e-c681ce737fd2-upicture3.png}}{}
\makeatother
\caption{\boldmath {The association of symptoms of COVID 19 and the participants aware of COVID 19. }}
\label{f-eedc83bd1336}
\end{figure}
\egroup
\bgroup
\fixFloatSize{images/ec5d3e92-038a-42b2-b564-2be485987daa-upicture4.png}
\begin{figure}[!htbp]
\centering \makeatletter\IfFileExists{images/ec5d3e92-038a-42b2-b564-2be485987daa-upicture4.png}{\includegraphics{images/ec5d3e92-038a-42b2-b564-2be485987daa-upicture4.png}}{}
\makeatother
\caption{\boldmath {The response of participants on the incubation period of coronavirus. }}
\label{f-137ed389a9be}
\end{figure}
\egroup
\bgroup
\fixFloatSize{images/8c2fd604-b941-4590-b6fa-3275e7678224-upicture5.png}
\begin{figure}[!htbp]
\centering \makeatletter\IfFileExists{images/8c2fd604-b941-4590-b6fa-3275e7678224-upicture5.png}{\includegraphics{images/8c2fd604-b941-4590-b6fa-3275e7678224-upicture5.png}}{}
\makeatother
\caption{\boldmath {Distribution of responses for groups who are highly prone to COVID 19. }}
\label{f-0fd243c62b6c}
\end{figure}
\egroup
\bgroup
\fixFloatSize{images/33836e78-e357-466b-9936-ad9d0ad8a868-upicture6.png}
\begin{figure}[!htbp]
\centering \makeatletter\IfFileExists{images/33836e78-e357-466b-9936-ad9d0ad8a868-upicture6.png}{\includegraphics{images/33836e78-e357-466b-9936-ad9d0ad8a868-upicture6.png}}{}
\makeatother
\caption{\boldmath {The percentage of participants who were aware about convalescent plasma therapy. }}
\label{f-4a1e3e1bc46f}
\end{figure}
\egroup
\bgroup
\fixFloatSize{images/cfbe1ea1-5709-488e-87ab-c8c480867474-upicture7.png}
\begin{figure}[!htbp]
\centering \makeatletter\IfFileExists{images/cfbe1ea1-5709-488e-87ab-c8c480867474-upicture7.png}{\includegraphics{images/cfbe1ea1-5709-488e-87ab-c8c480867474-upicture7.png}}{}
\makeatother
\caption{\boldmath {Frequency distribution of responses for the various pandemic diseases that are treated by convalescent plasma therapy. }}
\label{f-a011464f30ca}
\end{figure}
\egroup
\bgroup
\fixFloatSize{images/0ad9e0e8-5478-4911-bbef-2bd62a0e9e30-upicture8.png}
\begin{figure}[!htbp]
\centering \makeatletter\IfFileExists{images/0ad9e0e8-5478-4911-bbef-2bd62a0e9e30-upicture8.png}{\includegraphics{images/0ad9e0e8-5478-4911-bbef-2bd62a0e9e30-upicture8.png}}{}
\makeatother
\caption{\boldmath {The response of participants who agree that convalescent plasma therapy could be a vaccine for covid19. }}
\label{f-eb72dc309959}
\end{figure}
\egroup
\bgroup
\fixFloatSize{images/51f5ef4e-54b3-4521-8550-dfcd0d8924e6-upicture9.png}
\begin{figure}[!htbp]
\centering \makeatletter\IfFileExists{images/51f5ef4e-54b3-4521-8550-dfcd0d8924e6-upicture9.png}{\includegraphics{images/51f5ef4e-54b3-4521-8550-dfcd0d8924e6-upicture9.png}}{}
\makeatother
\caption{\boldmath {The responses for the various groups who are ideal for convalescent plasma therapy. }}
\label{f-29cbf1dc6e81}
\end{figure}
\egroup
\bgroup
\fixFloatSize{images/8fc446dd-30d7-41c5-adec-329368212141-upicture10.png}
\begin{figure}[!htbp]
\centering \makeatletter\IfFileExists{images/8fc446dd-30d7-41c5-adec-329368212141-upicture10.png}{\includegraphics{images/8fc446dd-30d7-41c5-adec-329368212141-upicture10.png}}{}
\makeatother
\caption{\boldmath {The responses for the suitable group of patients to donate blood for convalescent plasmatherapy. }}
\label{f-de1804593788}
\end{figure}
\egroup
\bgroup
\fixFloatSize{images/538dfb0b-7d6c-421e-b1c9-41cd2b278e07-upicture11.png}
\begin{figure}[!htbp]
\centering \makeatletter\IfFileExists{images/538dfb0b-7d6c-421e-b1c9-41cd2b278e07-upicture11.png}{\includegraphics{images/538dfb0b-7d6c-421e-b1c9-41cd2b278e07-upicture11.png}}{}
\makeatother
\caption{\boldmath {The responses X axis represents the participants aware of convalescent plasma therapy and Y axis represents the response of the suitable people to donate blood for convalescent plasma therapy. }}
\label{f-74e427c59d19}
\end{figure}
\egroup
\bgroup
\fixFloatSize{images/d4c9d8ba-afc8-48e7-9268-cec8878fa90e-upicture12.png}
\begin{figure}[!htbp]
\centering \makeatletter\IfFileExists{images/d4c9d8ba-afc8-48e7-9268-cec8878fa90e-upicture12.png}{\includegraphics{images/d4c9d8ba-afc8-48e7-9268-cec8878fa90e-upicture12.png}}{}
\makeatother
\caption{\boldmath {The percentage of participants who are willing to treat the patients with history of Covid-19. }}
\label{f-f76f57b6000c}
\end{figure}
\egroup
\bgroup
\fixFloatSize{images/c5f1d842-c0e8-4926-9a65-8f7cd33ac80c-upicture13.png}
\begin{figure}[!htbp]
\centering \makeatletter\IfFileExists{images/c5f1d842-c0e8-4926-9a65-8f7cd33ac80c-upicture13.png}{\includegraphics{images/c5f1d842-c0e8-4926-9a65-8f7cd33ac80c-upicture13.png}}{}
\makeatother
\caption{\boldmath {Frequency distribution of willingness of post kinds of treatment for patients with the history of COVID 19. }}
\label{f-76adbcbc91f6}
\end{figure}
\egroup
\bgroup
\fixFloatSize{images/896fb625-0983-42c0-be73-3fbd2d63966a-upicture14.png}
\begin{figure}[!htbp]
\centering \makeatletter\IfFileExists{images/896fb625-0983-42c0-be73-3fbd2d63966a-upicture14.png}{\includegraphics{images/896fb625-0983-42c0-be73-3fbd2d63966a-upicture14.png}}{}
\makeatother
\caption{\boldmath {X axis represents the participants willing to treat and Y axis represents the type of treatment done. }}
\label{f-a43dcf98703f}
\end{figure}
\egroup
Figure~\ref{f-738b2702b8a1}, X axis represents whether the respondents agreed or disagreed, Y axis represents the number of responses. 98.1\% of the participants accepted that COVID-19 was caused by SARS-COV to virus and 1.9\% disagreed.
Figure~\ref{f-044308f6fb42}, 67.0\% of the participants felt that the symptoms of COVID was a combination of fever, Cough and shortness of breath.
Figure~\ref{f-eedc83bd1336}, X axis represents the symptoms of Covid 19 and y axis represents the participants aware that COVID 19 were caused by SARS-CoV-2virus. The Pearson Chi Square test shows p value is 0.730. (p value{\textgreater}0.05). Hence, it is statistically not significant.
Figure~\ref{f-137ed389a9be} shows, 1-14 days- 55.3 \% and 1 to 12.5 days 35.9 \%
Figure~\ref{f-0fd243c62b6c} shows, 61.2\% agreed that elderly individuals, immuno-compromised individuals, people with systemic illness are at high risk, 19.4 \% strongly felt that only elderly individuals are at higher risk.
Figure~\ref{f-4a1e3e1bc46f} represents, 90.3\% of participants are aware of convalescent plasma therapy.
Figure~\ref{f-a011464f30ca} depicts, CP therapy was suggested that treatment of SARS be 49.5\%, MERS by 14.6 \% and SARS, MERS and H1 N1 by 34\%
Figure~\ref{f-eb72dc309959} shows, 94.2\% of the participants suggested convalescent plasma therapy to be used as a vaccine prior to the incidence COVID 19.
Figure~\ref{f-29cbf1dc6e81} shows, 78.6\% of participants accepted that severe cases of COVID-19 are the ideal people to receive convalescent plasma therapy whereas only 20.4 \% accepted it to be in the initial face of COVID-19
Figure~\ref{f-de1804593788} shows, 74.8\% by those recovered from COVID-19, 22.3\% by healthy person withno viral history and 2.9 \% by healthy persons with viral history.
Figure~\ref{f-74e427c59d19} depicts, The Pearson Chi Square test shows p value is 0.491 (p value{\textgreater}0.05). Hence, it is statistically not significant.
Figure~\ref{f-f76f57b6000c} shows, 95.1\% are willing to treat the patients with Covid or history of Covid 19 when provided with PPE.
Figure~\ref{f-76adbcbc91f6} represents, 47.6\% of postgraduate were willing to provide only palliative treatment, 13.6 \% were ready to do emergency treatment.
Figure~\ref{f-a43dcf98703f} shows, The Pearson Chi Square test shows p value is 0.212 (p value{\textgreater}0.05). Hence, it is statistically not significant.
The study aims at assessing the general awareness about Covid-19 and the effective role of Convalescent plasma therapy in Covid-19 treatment among post graduate dental students.
\section{Materials and Methods}
A KAP survey was conducted online among Postgraduate dental students on the pathogenesis and convalescent plasma therapy for COVID-19. A total of 15 questions were included in the study. All the questions framed were close-ended, and the question was conducted online. The survey was conducted to analyse the cause of COVID-19, symptoms, incubation time, recovery time and The people at higher risk.10 questions were based on the above mentioned. The rest ten questions were based on convalescent plasma therapy, its application, suitable people to receive and donate blood and the attitude and practice towards the patients with a history of COVID-19 for dental treatment. The dependent variables used in the study are awareness knowledge attitude and perception and convalescent plasma therapy and COVID-19, and the independent variables are pathogenesis, convalescent plasma therapy. The data were analysed using SPSS software. The statistical test used to be percentage analysis, mean and standard deviation.
\section{Results and Discussion}
Pneumonia associated with severe acute respiratory syndrome Coronavirus 2SARS-COV-two named coronavirus disease 2019 (covid19) By WHO emerged in December 2019 from Wuhan, China. As this epidemic spread within three months WHO categorised it as a pandemic in March 2020. Even though the positive cases and the mortality are being increased day by day, no approved specific anti-viral agent is targeting the novel virus such as remdesivir, lopinavir, and ritonavir is an understudy for determining the efficacy and safety \unskip~\citep{843100:19919521}, \unskip~\citep{843100:19919517}, \unskip~\citep{843100:19919533},\unskip~\citep{843100:19919529}.\textit{\space }
Convalescent plasma therapy as a standard adaptive immune therapy that has been applied for the prevention and treatment of other infectious diseases for more than one century. [for the past decade's CP therapy has been successfully used for the treatment of say RS, MARS, H1 N1 2009 pandemic with satisfactory efficacy and safety \unskip~\citep{843100:19919516}, \unskip~\citep{843100:19919513}. Since the virology and clinical characteristics shared similarly among SARS, MERS, H1N1 and COVID-19, CP has been proposed as a treatment option for COVID-19 \unskip~\citep{843100:19919525}. Kai Duan et al. has suggested that the first endpoint for COVID-19 as safety for convalescent plasma transfusion and the second endpoint being the improvement of clinical symptoms and laboratory parameters within three days after CP transfusion. The exact pathogenesis of COVID-19 is under study, and there are several kinds of research on it. Other parameters like increased lymphocyte count, decrease C-reactive protein has been proved due to convalescent plasma therapy, thereby increasing the likelihood of individuals to recover. There was a radiological examination done which revealed that there are varying degrees of absorption in lesions within seven days \unskip~\citep{843100:19919525}.
A survey was conducted among postgraduate dental students, where 103 Participated in the study. The survey was conducted online, and 15 questions were included. In the study, 98.1\% of the participants accepted that SARS-COV caused COVID-19 to the virus and 1.9\% disagreed with that(Figure~\ref{f-738b2702b8a1}). There are several studies on the symptoms of COVID- 19 \unskip~\citep{843100:19919517} describing the primary symptoms be cough and fever \unskip~\citep{843100:19919518}, \unskip~\citep{843100:19919525}, other symptoms of SARS, MERS, Covid 19 being myalgia, fatigue, dyspnea and anorexia \unskip~\citep{843100:19919717}, \unskip~\citep{843100:19919522}, \unskip~\citep{843100:19919524}. In our study, we observed that 67.0\% of the participants felt that the symptoms of COVID were a combination of fever, cough and shortness of breath. (Figure~\ref{f-044308f6fb42}). Association of symptoms of COVID 19 and the participants aware of COVID 19 where the p-value is 0.730. (p value{\textgreater}0.05) which is statistically not significant (Figure~\ref{f-eedc83bd1336}).
The incubation period of COVID-19 was suggested to be 1-14 days by 55.3 \%and 1 to 12.5 days by 35.9 \%(Figure~\ref{f-137ed389a9be}).In the study, 61.2 percentage agreed that elderly individuals, immuno compromised individuals, people with the systemic illness are at high risk, 19.4\% strongly felt that only elderly individuals are at higher risk(Figure~\ref{f-0fd243c62b6c} ). The recovery period suggested by 51.6 \% with 3 to 6 weeks, whereas 38.8\% agreed that the recovery period was two weeks. We observe that 90.3\% of the participants were aware of convalescent plasma therapy, and correlation was done. (Figure~\ref{f-4a1e3e1bc46f}).
In the present study, 90.3 \% of participants are aware of convalescent plasma therapy. There are several studies on convalescent plasma therapy on SARS, MERS, H1N1. In our research, CP was suggested that treatment of SARS by 49.5\%, MERS by 14.6 \% and SARS, MERS and H1 N1 by 34\%(Figure~\ref{f-a011464f30ca}). This revealed that dentists are aware of the management of pandemic disease with the help of convalescent plasma therapy.
In the present study, 94.2\% of the participants suggested convalescent plasma therapy be used as a vaccine before the incidence COVID 19(Figure~\ref{f-eb72dc309959}). Few authors conducted a study on convalescent plasma therapy and found that early stage of the disease is the ideal time for convalescent plasma therapy for most effective results \unskip~\citep{843100:19919521}. In our study, we observed that 78.6 \%of participants accepted that severe cases of COVID-19 are the ideal people to receive convalescent plasma therapy. In contrast, only 20.4 \% accepted it to be in the first face of COVID-19(Figure~\ref{f-29cbf1dc6e81}). The suitable people to donate blood for convalescent plasma therapy according to our responses were - 74.8\% by those recovered from COVID 19, 22.3\% by a healthy person with no viral history and 2.9 \% by healthy persons with viral history(Figure~\ref{f-de1804593788}). Association between participants who were aware of convalescent plasma therapy and the ideal people to donate blood for convalescent plasma therapy shows p-value is 0.491 (p value{\textgreater}0.05)which is statistically not significant(Figure~\ref{f-74e427c59d19}).
The mean time for the onset of symptoms to receive convalescent plasma therapy was reported to be 16.5 days by \unskip~\citep{843100:19919513}. In our study, we observe that the mean time was agreed to be 16.5 days by 52.4 \% and ten days by 36.9\%. 95.1\% of, the participants were willing to treat the patients during Covid 19 pandemic even though they were aware that dentists are the most vulnerable and are at higher risk of covid 19.
Among the 103 participants, 95.1 \% are willing to treat the patients with Covid or history of Covid 19 when provided with PPE(Figure~\ref{f-f76f57b6000c}), and 96.1\% do agree that dentists are at higher risk of transmission of COVID-19. In the study 47.6\% of postgraduate were willing to provide only palliative treatment, 13.6 \% were ready to do an emergency treatment like surgical or endodontic treatment, 11.7 \% were prepared for providing oral prophylaxis including scaling and curettage and 27.2\% were prepared to do all the dental procedures(Figure~\ref{f-76adbcbc91f6}). Association of responses of the dentist willing to treat patients with a history of COVID 19 and various treatments are done where the p-value is 0.212 (p value{\textgreater}0.05) which is statistically not significant(Figure~\ref{f-a43dcf98703f}). Previously, different research was done by our team on awareness \unskip~\citep{843100:19919520}, molecular diagnostic studies \unskip~\citep{843100:19919512}, \unskip~\citep{843100:19919510}, \unskip~\citep{843100:19919509}, \unskip~\citep{843100:19919527}, \unskip~\citep{843100:19919528}, immunohistochemical studies \unskip~\citep{843100:19919514}, \unskip~\citep{843100:19919533}, histological assessment \unskip~\citep{843100:19919531}, \unskip~\citep{843100:19919508}, \unskip~\citep{843100:19919519}, case report \unskip~\citep{843100:19919505}, \unskip~\citep{843100:19919511}, \unskip~\citep{843100:19919516} and systematic review \unskip~\citep{843100:19919512}, on advances in pathology to know the pathogenesis and the prognosis. Advance training, proper PPE and training on handling the patients with any infectious disease should be dealt with in detail for reducing the spread from dental clinics and dentists.
\section{Conclusions}
In this study, we found that postgraduate dental students have a varied knowledge of COVID-19, and most of them suggested that plasmatherapy is beneficial. Despite the spread and severity of COVID-19, most of them are willing to treat patients by providing palliative treatment by limiting the spread from dental clinics or hospitals.
\section*{Acknowledgement}We thank the management and students of Saveetha Dental college for their timely support.
\textbf{Conflict of Interest}
Nil.
\textbf{Funding Support}
Nil.
\bibliographystyle{pharmascope_apa-custom}
\bibliography{\jobname}
\end{document}
|
https://www2.math.upenn.edu/~kazdan/425S15/hw/hw4.tex | upenn.edu | CC-MAIN-2022-21 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2022-21/segments/1652662647086.91/warc/CC-MAIN-20220527112418-20220527142418-00233.warc.gz | 1,238,752,079 | 3,687 | \documentclass[11pt]{article}
%Options: draft shows overfull lines, reqno-leqno puts eq numbers on right/left
%\documentclass[11pt,draft, reqno,a4paper,psamsfonts]{amsart}
\usepackage{amsmath,amssymb}
\usepackage{graphicx} % replaces epsfig
\newcommand{\comments}[1]{} % to insert a comment
\usepackage{hyperref} % for a URL
% *** CHANGE DIMENSIONS ***
\voffset=-0.3truein % LaTeX has too much space at page top
\addtolength{\textheight}{0.3truein}
\addtolength{\textheight}{\topmargin}
\addtolength{\topmargin}{-\topmargin}
\textwidth 6.0in % LaTeX article default 360pt=4.98''
\oddsidemargin 0pt % \oddsidemargin .35in % default is 21.0 pt
\evensidemargin 0pt % \evensidemargin .35in % default is 59.0 pt
%\parindent=20pt
% *** MACROS ***
\newcommand{\Cal}{\mathcal} % Calligraphic - caps only
\newcommand{\mbf}{\mathbf} % math bold
\newcommand{\R}{\mathbb{R}}
\newcommand{\C}{\mathbb{C}}
\newcommand{\Q}{\mathbb{Q}}
\newcommand{\N}{\mathbb{N}}
\newcommand{\abs}[1]{\lvert #1 \rvert} % absolute value
\newcommand{\norm}[1]{\lVert #1 \rVert} % norm
\newcommand{\ip}[2]{\langle #1,\, #2\rangle} % ip = inner product
\newcommand{\sstrut}{\rule[-3pt]{0pt}{15pt}}
% ======================================
% The remainder of this preface is for sets of problems and their parts.
\newcounter{numb}
\newcounter{bean}
\newenvironment{problems}{\begin{list}{\arabic{numb}.}{\usecounter{numb}
\setlength{\leftmargin}{20pt}
\setlength{\labelwidth}{15pt}
\setlength{\labelsep}{5pt}
\setlength{\itemsep}{ 15.0pt plus 2.5pt minus 1.0pt}
}}{\end{list}}
%The next environment is for the parts a), b), ... of a problem.
\newenvironment{parts}{\begin{list}{\alph{bean}) }{\usecounter{bean}
\setlength{\leftmargin}{20pt}
\setlength{\labelwidth}{15pt}
\setlength{\labelsep}{5pt}
\setlength{\topsep}{0pt}
\setlength{\partopsep}{0pt}
}}{\end{list}}
% ======================================
%==================== END PREAMBLE ==============
\begin{document}
%\pagestyle{empty}
\parindent=0pt
\vspace*{-50pt}
{\bf Math 425, Spring 2015\hfill Jerry L. Kazdan}
\medskip
\begin{center}
{\large\bf Problem Set 4}
\end{center}
{\sc Due:} Thurs. Feb.~12 in class. [Late papers will be accepted until 1:00 PM Friday.]
\bigskip
{\bf \large This week}. Please read all of Chapter 3 and Chapter 4 in the Strauss text.
\bigskip
\begin{problems}
\item{} [One goal of this problem is to understand ``periodic boundary conditions''. See Part (e) below.]\\
Say a function $u(t)$ satisfies the differential equation
\begin{equation}\label{odeH}
u'' +b(t)u' +c(t)u=0
\end{equation}
on the interval $[0,\,A]$ and that the coefficients
$b(t)$ and $c(t)$ are both bounded, say $\abs{b(t)}\le M$ and
$\abs{c(t)}\le M$ (if the coefficients are continuous, this is always
true for some $M$).
\begin{parts}
\item Define $E(t):=\frac{1}{2}(u'^2 +u^2)$. Show that for some constant
$\gamma$ (depending on $M$) we have $E'(t)\le \gamma E(t)$. [{\sc
Suggestion:} use the simple inequality $2xy\le x^2+y^2$.]
\item Show that $E(t)\le e^{\gamma t}E(0)$ for all $t\in[0,\,A]$.
[{\sc Hint: } First use the previous part to show that
$(e^{-\gamma t}E(t))' \le 0$].
\item In particular, if $u(0)=0$ and $u'(0)=0$, show that
$E(t)=0$ and hence $u(t)=0$ for all $t\in [0,\,A]$. In other words, if
$u'' +b(t)u' +c(t)u=0$ on the interval $[0,\,A]$ and that the functions
$b(t)$ and $c(t)$ are both bounded, and if $u(0)=0$ and $u'(0)=0$,
then the only possibility is that $u(t)\equiv 0$ for all $t\ge 0$.
\item Use this to prove the {\it uniqueness theorem\,}: if $v(t)$ and
$w(t)$ both satisfy equation
\begin{equation}\label{odeI}
u'' +b(t)u' +c(t)u=f(t)
\end{equation}
and have the same initial conditions, $v(0)=w(0)$ and $v'(0)=w'(0)$,
then $v(t)\equiv w(t)$ in the interval $[0,\,A]$.
\item Assume the coefficients $b(t)$, $c(t)$, and $f(t)$ in equation
\eqref{odeI} are periodic with period $P$, that is, $b(t+P)=b(t)$
etc.\ for all real $t$. If $\phi(t)$ is a solution of equation
\eqref{odeI} that satisfies the \emph{periodic boundary conditions}
\begin{equation}\label{periodic}
\phi(P)=\phi(0)\quad \text{and}\quad \phi'(P)=\phi'(0),
\end{equation}
show that $\phi(t)$ is periodic with period $P$: $\phi(t+P)=\phi(t)$
for all $t\ge 0$. Thus, the periodic boundary conditions
\eqref{periodic} do imply the desired periodicity of the solution
\end{parts}
\item Let $C$ be a circle of radius $1$ and let $u(\theta,t)$ be the
temperature at a point $\theta,$ at time $t$. To make this
well-defined, we need that $u(\theta + 2\pi)=u(\theta)$. Say
$u(\theta,t)$ satisfies the heat equation $u_t=u_{\theta\theta}$. Let
$$
E(t) = \frac{1}{2}\int_{-\pi}^\pi u^2(\theta,t)\,d\theta.
$$
\begin{parts}
\item Show that $E'(t)\le 0$.
\item If the initial temperature $u(\theta, 0)=0$, show that
$u(\theta,t)=0$ for all $t\ge 0$.
\end{parts}
\item Let $u(x,t)$ be the temperature at time $t$ at the point $x$, $-L\le x \le L$. Assume it satisfies the heat equation $u_t =u_{xx}$ for $ 0<t<\infty$
with the boundary condition $u(-L,t)=u(L,t)=0$ and initial condition
$u(x, 0) = f(x)$.
\begin{parts}
\item Show that \ $\displaystyle E(t):=\frac{1}{2}\int_{-L}^L u^2(x,t)
\,dx$ \ is a decreasing function of $t$.
\item Use this to prove uniqueness for the heat equation with these
specified initial and boundary conditions $u(-L,t)=f(t)$,
$u(L,t)=g(t)$.
\item If $u(x, 0) = \varphi(x)$ is an even function of $x$, and
$u(-L,t)=u(L,t)$ show that the temperature $u(x,t)$ at later times is
also an even function of $x$.
\end{parts}
\item Find a formula for the solution of
$$
u_{xx} + u_{xt} - 20u_{tt} = 0\qquad\text{with}\qquad
u(x,0)=\varphi(x) \text{\ \ and\ \ } u_t(x,0)=\psi(x).
$$
Your result should be something like equation (8) on page 36 of the
text.
\item {}[{\sc The dulcimer}, P.\ 38 \#5] Solve the wave equation
$u_{tt} = c^2 u_{xx}$ with initial conditions $u(x, 0) = 0$ and
$u_t(x,0) = g(x)$, where $g(x) = 1$ if $|x| < a$ and $g(x) = 0$ for
$|x| \ge a$. This corresponds to hitting the string with a hammer of
width $2a$. Draw sketches of snapshots of the string (i.e., plot $u$
versus $x$) for $t = \frac{1}{2} a/c$, $t = a/c$, $t = \frac{3}{2}
a/c$, $t = 2a/c$ and $t = \frac{5}{2} a/c$. [{\sc Remark: } This is
very similar to p.\ 38 \#3].
\item Solve the wave equation $u_{tt}=c^2u_{xx}$ for the semi-infinite string $x\ge 0$ with the initial and boundary conditions
$$
u(x,0) = 3 - \sin x,\quad u_t(x,0) = 0,\quad
u(0,t) = 3-t^2.
$$
\item p.\ 60 \#1
\item p.\ 60 \#4
\item {} [p.\ 66 \#1] Find an explicit formula for the solution of the
wave equation \ $u_{tt} = u_{xx}$ \ on the half-line $0<x<\infty$ with
initial conditions $u(x,0)=\varphi(x)$, \ $u_t(x,0)=\psi(x)$ and the
homogeneous Neumann boundary condition $u_x(0,t)=0$.
\item p.\ 66 \#3
\comments{
\item Let $u(x,t)$ be a solution of the inhomogeneous wave equation
$u_{tt} - c^2u_{xx} = \sin\pi x$ for $0<x<1$, $t>0$ with the boundary
$conditions $u(0,t)=0$ and $u(1,t)=0$.
\begin{parts}
\item Find the solution if $u(x,0)=0$ and $u_t(x,0)=0$.
\item Find the solution if $u(x,0)=x(1-x)$ and $u_t(x,0)=0$.
\end{parts}
\item p.\ 71 \#2
}
\end{problems}
\comments{
\vskip 20pt
\begin{center}{\large \bf Bonus Problem}
[Please give this directly to Professor Kazdan]
\end{center}
\begin{problems}
\item [B-1] Strauss P. 41 \#6
\end{problems}
}
\medskip
[Last revised: \today]
\end{document}
|
https://gapil.gnulinux.it/gitweb/?p=gapil.git;a=blob_plain;f=fileadv.tex;hb=81ff87c3e2a6ecd3e33867798cba0d27576f44d0 | gnulinux.it | CC-MAIN-2022-27 | text/x-tex | application/x-tex | crawl-data/CC-MAIN-2022-27/segments/1656104692018.96/warc/CC-MAIN-20220707124050-20220707154050-00534.warc.gz | 322,913,768 | 4,579 | \chapter{La gestione avanzata dei file}
\label{cha:file_advanced}
In questo capitolo affronteremo le tematiche relative alla gestione avanzata
dei file, che non sono state trattate in \capref{cha:file_unix_interface},
dove ci si è limitati ad una panoramica delle funzioni base. In particolare
tratteremo delle funzioni di input/output avanzato e del \textit{file
locking}.
\section{Le funzioni di I/O avanzato}
\label{sec:file_advanced_io}
In questa sezione esamineremo le funzioni che permettono una gestione più
sofisticata dell'I/O su file, a partire da quelle che permettono di gestire
l'accesso contemporaneo a più file, per concludere con la gestione dell'I/O
mappato in memoria.
\subsection{La modalità di I/O \textsl{non-bloccante}}
\label{sec:file_noblocking}
Abbiamo visto in \secref{sec:sig_gen_beha}, affrontando la suddivisione fra
\textit{fast} e \textit{slow} system call, che in certi casi le funzioni di
I/O possono bloccarsi indefinitamente.\footnote{si ricordi però che questo può
accadere solo per le pipe, i socket ed alcuni file di dispositivo; sui file
normali le funzioni di lettura e scrittura ritornano sempre subito.} Ad
esempio le operazioni di lettura possono bloccarsi quando non ci sono dati
disponibili sul descrittore su cui si sta operando.
Questo comportamento causa uno dei problemi più comuni che ci si trova ad
affrontare nelle operazioni di I/O, che è quello che si verifica quando si
devono eseguire operazioni che possono bloccarsi su più file descriptor:
mentre si è bloccati su uno di questi file su di un'altro potrebbero essere
presenti dei dati, così che nel migliore dei casi si avrebbe una lettura
ritardata inutilmente, e nel peggiore si potrebbe addirittura arrivare ad un
deadlock.
Abbiamo già accennato in \secref{sec:file_open} che però è possibile prevenire
questo tipo di comportamento aprendo un file in modalità
\textsl{non-bloccante}, attraverso l'uso del flag \macro{O\_NONBLOCK} nella
chiamata di \func{open}. In questo caso le funzioni di input/output che
altrimenti si sarebbero bloccate ritornano immediatamente, restituendo
l'errore \macro{EAGAIN}.
L'utilizzo di questa modalità di I/O permette di risolvere il problema
controllando a turno i vari file descriptor, in un ciclo in cui si ripete
l'accesso fintanto che esso non viene garantito. Ovviamente questa tecnica,
detta \textit{polling}, è estremamente inefficiente: si tiene costantemente
impiegata la CPU solo per eseguire in continuazione delle system call che
nella gran parte dei casi falliranno. Per evitare questo, come vedremo in
\secref{sec:file_multiplexing}, è stata introdotta una nuova interfaccia di
programmazione, che comporta comunque l'uso della modalità di I/O non
bloccante.
\subsection{Le funzioni \func{poll} e \func{select}}
\label{sec:file_multiplexing}
Per superare il problema di dover usare il \textit{polling} controllare la
disponibilità di accesso ad un file aperto in modalità non bloccante, sia BSD
che SysV hanno introdotto delle nuove funzioni in grado di sospendere
l'esecuzione di un processo fino a che l'accesso diventi possibile; il primo
ad introdurre questa nuova interfaccia, chiamata usualmente \textit{I/O
multiplexing}, è stato BSD, con l'introduzione della funzione \func{select},
il cui prototipo è:
\begin{prototype}{sys/select.h}
{int select(int n, fd\_set *readfds, fd\_set *writefds, fd\_set *exceptfds,
struct timeval *timeout)}
Attende che un certo insieme di file descriptor cambi stato.
\bodydesc{La funzione restituisce il numero di file descriptor, anche nullo,
che hanno cambiato stato in caso di successo e -1 in caso di errore, nel
qual caso \var{errno} viene settata ai valori:
\begin{errlist}
\item[\macro{EBADF}] Si è specificato un file descriptor sbagliato in uno
degeli insiemi.
\item[\macro{EINTR}] La funzione è stata interrotta da un segnale.
\item[\macro{EINVAL}] Si è specificato per \param{n} un valore negativo.
\end{errlist}
ed inoltre \macro{ENOMEM}.
}
\end{prototype}
La funzione mette il processo in stato di \textit{sleep} (vedi
\tabref{tab:proc_proc_states}) fintanto che non viene rilevate dell'attività
sull'insieme dei file descriptor specificati (\param{readfds},
\param{writefds} e \param{exceptfds}), per un tempo massimo specificato da
\param{timeout}.
Per specificare quali file descriptor si intende selezionare, la funzione usa
un particolare oggetto, il \textit{file descriptor set}, identificato dal tipo
\type{fd\_set}, che serve ad identificare un insieme di file descriptor, in
maniera analoga a come un \textit{signal set} (vedi \secref{sec:sig_sigset})
identifica un insieme di segnali. Per la manipolazione di questi \textit{file
descriptor set} si possono usare delle opportune macro di preprocessore:
\begin{functions}
\headdecl{sys/select.h}
\funcdecl{FD\_ZERO(fd\_set *set)}
Inizializza l'insieme (vuoto).
\funcdecl{FD\_SET(int fd, fd\_set *set)}
Inserisce il file descriptor \param{fd} nell'insieme.
\funcdecl{FD\_CLR(int fd, fd\_set *set)}
Rimuove il file descriptor \param{fd} nell'insieme.
\funcdecl{FD\_ISSET(int fd, fd\_set *set)}
Controlla se il file descriptor \param{fd} è nell'insieme.
\end{functions}
In genere un \textit{file descriptor set} può contenere fino ad un massimo di
\macro{FD\_SETSIZE} file descriptor. Questo a seconda del sistema può essere
il limite del numero massimo di file aperti\footnote{ad esempio in Linux, fino
alla serie 2.0.x, c'era un limite di 256 file per processo.}, ma quando,
come nelle versioni più recenti del kernel, questo limite non c'è un massimo,
esso indica le dimensioni in munero di bit utilizzabili per l'insieme.
La funzione richiede di specificare tre insiemi distinti di file descriptor;
il primo, \param{readfds}, verrà osservato per rilevare la disponibilità di
input in lettura, il secondo, \param{writefds} per verificare la possibilità
di scrivere ed il terzo, \param{exceptfds}, per verificare l'esistenza di
eccezioni. I corrispondenti valori dei \textit{file descriptor set} saranno
modificati di conseguenza per mostrare quale dei file descriptor ha cambiato
stato.
Come accennato l'interfaccia di \func{select} è una estensione aggiunta BSD, e
poi entrata a far parte di POSIX; allo stesso tempo System V aveva introdotto
una interfaccia alternativa, basata sulla funzione \func{poll}, il cui
prototipo è:
\begin{prototype}{sys/poll.h}
{int poll(struct pollfd *ufds, unsigned int nfds, int timeout)}
La funzione attente un cambiamento di stato per uno dei file descriptor
specificati da \param{ufds}.
\bodydesc{La funzione restituisce il numero di file descriptor con attività in
caso di successo, o 0 se c'è stato un timeout; in caso di errore viene
restituito -1 ed \var{errno} viene settata ai valori:
.}
\end{prototype}
\subsection{L'I/O asincrono}
\label{sec:file_asyncronous_io}
Una modalità alternativa all'uso dell'I/O non bloccante è quella di fare
ricorso all'I/O asincrono. Abbiamo accennato in \secref{sec:file_open} che è
possibile, attraverso l'uso del flag \macro{O\_ASYNC}, aprire un file in
modalità asincrona, così come è possibile settare questo flag attraverso l'uso
di \func{fcntl}.
In tal caso il sistema genera un segnale \macro{SIGIO} tutte le volte che sono
presenti dei dati in input su un file aperto in questa modalità. Uno dei
problemi che si presentavano con le prime implementazioni di questa modalità
di I/O è che essa poteva essere usata in maniera semplice aprendo un solo file
per processo, dato che altrimenti si sarebbe dovuto provvedere ad effettuare
una serie di controlli su tutti i file aperti per distinguere a quale fosse
dovuto l'emissione del segnale.
Tutto questo adesso può essere evitato facendo ricorso alle informazioni
restituite al manipolatore del segnale attraverso la struttura
\var{siginfo\_t} (vedi \figref{fig:sig_siginfo_t}), il cui campo \var{si\_fd}
riporta il file descriptor che ha generato il segnale.
\subsection{File mappati in memoria}
\label{sec:file_memory_map}
\subsection{I/O multiplo}
\label{sec:file_multiple_io}
\section{Il file locking}
\label{sec:file_locking}
In \secref{sec:file_sharing} abbiamo preso in esame le mosalità in cui un
sistema unix-like gestisce la condivisione dei file da parte di processi
diversi. In quell'occasione si è visto come, con l'eccezione dei file aperti
in \textit{append mode}, quando più processi scrivono contemporaneamente sullo
stesso file non è possibile determinare la sequenza in cui essi opereranno.
Questo causa la possibilità di race condition\index{race condition}; in
generale le situazioni più comuni sono due: l'interazione fra un processo che
scrive e altri che leggono, in cui questi ultimi possono leggere informazioni
scritte solo in maniera parziale o incompleta; o quella in cui diversi
processi scrivono, mescolando in maniera imprevedebile il loro output sul
file.
In tutti questi casi il \textit{file locking} è la tecnica che permette di
evitare le race condition, attraverso una serie di funzioni che permettono di
bloccare l'accesso al file da parte di altri processi, così da evitare le
sovrapposizioni, e garantire la atomicità delle operazioni di scrittura.
\subsection{L'\textit{advisory locking}}
\label{sec:file_record_locking}
La prima modalità di file locking che è stata implementata nei sistemi
unix-like è quella che viene usualmente chiamata \textit{advisory locking}, in
quanto è il processo, e non il sistema, che si incarica di verificare se
esiste una condizione di blocco per l'accesso ai file.
\subsection{Il \textit{mandatory locking}}
\label{sec:file_mand_locking}
Il \textit{mandatory locking} è una opzione introdotta inizialmente in SVr4,
%%% Local Variables:
%%% mode: latex
%%% TeX-master: "gapil"
%%% End:
|
https://git.lysator.liu.se/ceder/ceder-1616-generations-topgit/-/raw/187743c492201f0919ab24d765798de58b1e6118/doc/lyskomd.texi | liu.se | CC-MAIN-2021-49 | text/plain | application/x-tex | crawl-data/CC-MAIN-2021-49/segments/1637964358323.91/warc/CC-MAIN-20211127223710-20211128013710-00193.warc.gz | 360,789,636 | 32,852 | \input texinfo
@c $Id: lyskomd.texi,v 1.70 2003/08/14 23:06:43 ceder Exp $
@c %**start of header
@setfilename lyskomd.info
@include version.texi
@settitle lyskomd @value{VERSION} Reference Manual
@setchapternewpage odd
@c %**end of header
@iftex
@parindent 0pt
@begin tex
\global\def\BB#1{\b{#1}}
\global\def\II#1{\i{#1}}
@end tex
@end iftex
@ifinfo
@macro BB {text}
'\text\'
@end macro
@macro II {text}
/\text\/
@end macro
@end ifinfo
@ifinfo
This is the reference manual for the lyskomd LysKOM server version
@value{VERSION}.
Copyright @copyright{} 1995-2002 Lysator ACS.
Permission is granted to make and distribute verbatim copies of this
specification provided the copyright notice and this permission notice
are preserved on all copies.
@end ifinfo
@dircategory LysKOM
@direntry
* lyskomd: (lyskomd). lyskomd reference manual.
@end direntry
@titlepage
@sp 10
@title lyskomd Reference Manual
@sp 2
@subtitle Server version @value{VERSION}
@sp 2
@author by the lyskomd developers
@page
@vskip 0pt plus 1filll
Copyright @copyright{} 1995-2002 Lysator ACS
Permission is granted to make and distribute verbatim copies of this document
provided the copyright notice and this permission notice are preserved on all
copies.
Modified versions of this document may be redistributed with the added
condition that all modifications not cleared with the LysKOM development group
are clearly marked and that the entire modified work be redistributed under the
same conditions as the original.
Permission is granted to copy and distribute translations of this manual into
another language under the same conditions as for modified versions.
@end titlepage
@ifinfo
@node Top
@top lyskomd
lyskomd is a server for the LysKOM conferencing system. This info file
documents version @value{VERSION} of lyskomd.
@menu
* Copying:: lyskomd is free software.
* Overview:: Overview of LysKOM.
* Installation:: How to install lyskomd.
* Configuration:: How to configure lyskomd.
* Running lyskomd:: How to run lyskomd.
* Invoking updateLysKOM:: How to run updateLysKOM.
* Invoking komrunning:: How to run komrunning.
* Administration:: Administering a LysKOM server.
* Bugs:: Known bugs in lyskomd.
* DBCK Reference:: Checking and repairing the database.
* splitkomdb:: How to backup the database.
* Hacking:: Notes for server developers.
* lyskomd Database Specification::
@end menu
@end ifinfo
@node Copying
@chapter Copying
lyskomd is free software. It is distributed under the Gnu General Public
License version 2. The file COPYING in the top level of the distribution
contains the text of the license.
@node Overview
@chapter Overview
LysKOM is a conferencing system@footnote{Or in modern terms, enabling
technology for Computer-Supported Cooperative Work (CSCW).}. Similar
systems were QZ-KOM and PortaCOM@footnote{Also known as ``PottaKOM'' and
``BortaKOM''.}. The LysKOM system is copyrighted by Lysator Academic
Computing Society and distributed under conditions of the GNU General Public
License version 2. LysKOM and its documentation is provided ``as is'' without
warranty of any kind.
This reference manual documents version @value{VERSION} of the lyskomd
LysKOM server. The lyskomd server is the work of several people. The main
contributors have been
Per Cederqvist @email{ceder@@lysator.liu.se},
Inge Wallin @email{inge@@lysator.liu.se},
Thomas Bellman @email{bellman@@lysator.liu.se},
David Byers @email{byers@@lysator.liu.se} and
Peter Eriksson @email{pen@@lysator.liu.se}.
@section History
In 1990, Per Cederqvist @email{ceder@@lysator.liu.se} and Peter Eriksson
@email{pen@@lysator.liu.se} and a few other persons started to write the
server. It was operational in the summer of 1990, even though the
members of Lysator discovered a thing called MUD. We started using RCS
on 20 May 1991. The first release was made on 16 Sept 1991. Around that
time we switched from RCS to CVS to handle our source code.
@node Installation
@chapter Installation
Instructions for compiling and installing lyskomd are in the files
@file{README} and @file{INSTALL}, located in the top level of the
lyskomd distribution. Installation should be straightforward on most
platforms.
@node Configuration
@chapter Configuration
There are two configuration files for lyskomd. One defines the server
options and the other defines aux-item types @ref{(protocol-a)The
Aux-Item List,The Aux-Item List}.
@menu
* Server Configuration File:: The server configuration file.
* Aux-Item Definition File:: The aux-item definition file.
@end menu
@node Server Configuration File
@section Server Configuration File
The server reads its configuration from a configuration file. The
default configuration file is @file{/usr/lyskom/etc/config}. The
location of the configuration file can be changed at run-time by
supplying an argument to lyskomd.
The configuration file is line oriented. Each line consists of a
parameter name followed by a colon, and the value of the parameter.
Empty lines and lines whose first non-blank character is a @samp{#} are
ignored.
@menu
* Parameter Types:: Types of configuration parameters.
* Parameters:: Valid configuration parameters.
@end menu
@node Parameter Types
@subsection Parameter Types
Every parameter has a type. The standard types are:
@table @code
@item bool
The parameter can be true or false. Legal values are @code{on},
@code{true}, @code{yes} and @code{1} for true and @code{off},
@code{false}, @code{no} and @code{0} for false.
@item locale-name
The parameter is a locale name. The value must be a legal locale name of
the system where lyskomd is running.
@item path
The parameter is a path name. The value must be a legal path on the
system where lyskomd is running. Most paths you can specify can be
either absolute paths (if they begin with a @samp{/}) or paths relative
to the installation prefix which is specified at compile time and can
be overridden by the @code{Prefix:} parameter in the configuration file.
@item portname
The parameter is a TCP/IP port. It can be a symbolic port name
(traditionally looked up in @file{/etc/services}) or a port number.
@item int
The parameter is a number of some sort. It can be a conference number,
text number or perhaps something else.
@item double
The parameter is a floating point number. Any syntax that the C
function @code{strtod} accepts is OK. Examples of truly portable
values: @samp{1} or @samp{1.3}.
@item timeval
The parameter is a time period. It consists of a floating point
number (in the same format as for parameters of type @code{double}),
optionally followed by optional whitespace and a suffix. If no suffix
is specified, it defaults to the suffix mentioned in the description
of the parameter.
Valid suffixes includes:
@itemize
@item seconds
@item second
@item sec
@item s
@item minutes
@item minute
@item min
@item hours
@item hour
@item h
@item days
@item day
@item d
@item milliseconds
@item millisecond
@item m
@item microseconds
@item microsecond
@item u
@end itemize
@end table
A few parameters have ad-hoc types, that are used for a single
parameter. They are documented in the description of that parameter.
@node Parameters
@subsection Parameters
@table @code
@item Max conferences: @var{int}
The maximum number of conferences possible in the server. This number
must be larger than the number of conferences in the database. This
parameter is required. There is no default.
@item Max texts: @var{int}
The maximum number of texts possible in the server. This number
must be larger than the number of texts in the database. This
parameter is required. There is no default.
@item Locale: @var{string}
Use @var{string} as the locale to run in. This parameter is only
available om systems which support the @code{setlocale} call. If this
parameter is not set, no call to @code{setlocale} will be made. The
default is unset.
@item Force ISO 8859-1: @var{bool}
This option is provided for those with dysfunctional computers that
cannot handle @code{setlocale} properly. If this is set, lyskomd will
handle texts according to the ISO 8859-1 (latin1) alphabet. Default
is off.
@item Prefix: @var{path}
Specify the installation prefix. All relative filenames that the
server uses are interpreted relative to this directory. The default
value of this parameter is set at compile time. The default at
compile time is @file{/usr/lyskom}.
@item Send async: @var{bool}
Do not send any non-requested messages. This disables the sending of
messages about events in the server to all connections. Use of this
parameter is not recommended. Default is on.
@item Client host: @var{hostname}
Specify which IP number the server should use when listening for new
clients. @var{hostname} may be a FQDN (such as
@samp{kom.lysator.liu.se}) or an IP number (such as @samp{10.0.0.1}).
Default is to bind @code{INADDR_ANY}, which means that the server will
listen to all IP numbers of the computer it is running on.
@item Client port: @var{portname}
Listen for new clients on port @var{portname}. The default is 4894, which
is what all clients expect. Do not change this parameter without really
good reason.
@item Presentation of conferences: @var{int}
The number of the conference where presentations should be sent.
Defaults to 1. This option is ignored in lyskomd 1.9 and later. Set this
using dbck or the @ref{(protocol-a)set-info,set-info}.
@item Presentation of persons: @var{int}
The number of the conference where presentations should be sent.
Defaults to 2. This option is ignored in lyskomd 1.9 and later. Set this
using dbck or the @ref{(protocol-a)set-info,set-info}.
@item Motd-conference: @var{int}
The number of the conference where "message-of-the-day" messages should
be sent. Defaults to 3. This option is ignored in lyskomd 1.9 and later.
Set this using dbck or the @ref{(protocol-a)set-info,set-info}.
@item News-conference: @var{int}
The number of the conference where news of interest to the readers of
this LysKOM server should be written. This is typically a conference
with very low traffic which everyone shoule be a member of. Clients
should offer new users to join it. Defaults to 4. This option is ignored
in lyskomd 1.9 and later. Set this using dbck or the
@ref{(protocol-a)set-info,set-info}.
@item Message of the day: @var{int}
Default message-of-the-day of this server. The text will be shown
automatically by conforming LysKOM clients when a user logs on. This
option is ignored in lyskomd 1.9 and later. Set this using dbck or the
@ref{(protocol-a)set-info,set-info}.
@item Garb: @var{bool}
Should the database be automatically purged of old texts? The default
is on.
@item Never save: @var{bool}
Completely disables saving the database. Do not set this to @code{true}
unless you really know what you're doing. The default is @code{false}.
@item Log accesses: @var{path}
This parameter can only be set if the server has been compiled with
@code{LOGACCESSES} defined. It will save a trace of all activity in the
database to a file, for later use in simulations et c. Compiling with
@code{LOGACCESSES} slows the server down quite a lot, so it is normally
not defined.
@item Data file: @var{path}
The path relative to the installation prefix@footnote{The installation
prefix can be specified at compile time, and overridden by the
@code{Prefix:} parameter.} where part of the database is kept. The
default is @file{db/lyskomd-data}.
@item Backup file: @var{path}
The path relative to the installation prefix where a backup of the
database is kept. This file will always contain a complete database, but
it may be a little out-of-date. Default is @file{db/lyskomd-backup}.
@item Backup file 2: @var{path}
The path relative to the installation prefix where a previous generation
of the backup of the database is kept. This file may be needed if an
error in the backup file is detected during the creation of the data
file. Default is @file{db/lyskomd-backup-prev}.
@item Lock file: @var{path}
Name of the lock file that ensures that @code{dbck} and @code{lyskomd}
never attempt to modify the database at the same time. It should always
reside in the same directory as the @samp{Data file}. Default is
@file{db/lyskomd-lock}.
@item Text file: @var{path}
The path relative to the installation prefix where the actual texts in
the database are kept. Default is @file{db/lyskomd-texts}.
@item Text backup file: @var{path}
When @code{dbck} is run with the @samp{-g} option (@ref{Invoking
dbck}, it will store the previous contents of the text file in the
file specified by this option. The path is relative to the
installation prefix. This file is never used by @code{lyskomd}
itself. Default is @file{db/lyskomd-texts-backup}.
@item Backup export directory: @var{path}
When @code{splitkomdb} is run, it will create a copy of the database
in this directory. The copy will be split in a way that helps to keep
incremental backups of that directory small. @xref{splitkomdb}. The
path is relative to the directory specified by @code{Prefix:}. This
directory is never used by @code{lyskomd} itself. Default is
@file{exportdb}.
@item Number file: @var{path}
@itemx Number temp file: @var{path}
Name of the file where the first unused conference and text numbers
are stored. This file contains a single line. It is rewritten each
time a new conference or text is created, to ensure that numbers are
never reused even if the server later crashes before it has time to
save the database. The information is first written to @code{Number
temp file:}, and then renamed to @code{Number file:}. The path is
relative to the installation prefix. Default is @file{db/number.txt}
and @file{db/number.tmp}, respectively. Both files must reside on the
same partition.
@item Log file: @var{path}
The path relative to the installation prefix where log messages from
lyskomd are written. Default is @file{etc/server-log}.
@item Log statistics: @var{path}
Whenever lyskomd receives a SIGUSR1 it will append a timestamp and
a count of how many different atomic calls have been made in this file.
The path is relative to the installation prefix. Default is
@file{etc/lyskomd-log}.
@item Pid file: @var{path}
When lyskomd is up and running it will write its pid in this file. The
path is relative to the installation prefix. This file is used so the
@code{updateLysKOM} script can easily find out what pid the LysKOM
server has. Default is @file{etc/pid}.
This file should be removed when the computer reboots, before
@code{komrunning} or @code{updateLysKOM} is run.
@item Memory usage file: @var{path}
When lyskomd exits normally it appends some info on its usage of memory
to this file. The path is relative to the installation prefix. Almost
any memory leak bugs should be detectable by looking in this file.
Default is @file{etc/memory-usage}.
@item Aux-item definition file: @var{path}
This file defines which aux-items the server should support and how it
should handle them. You will find the details in
@xref{Aux-Item Definition File}.
The path is relative to the installation prefix. Default is
@file{etc/aux-items.conf}.
This file is re-read if a @samp{SIGWINCH} singal is sent to the server.
@item Core directory: @var{path}
The Directory where core dumps are written. This path is relative to the
installation prefix. Default is @file{cores}.
@item Connection status file: @var{path}
@itemx Connection status temp file: @var{path}
Where to store a status file that contains information about all
connections. The status is written to the temp file and atomically
renamed to the status file.
The path is relative to the installation prefix. Defaults are
@file{etc/connections.txt} and @file{etc/connections.tmp}. Both files
must reside on the same file system. @xref{Files}, for information
about the file format.
@item Status file: @var{path}
This file is created by @code{komrunning} to indicate that lyskomd
should currently not be running. When this file exists
@code{updateLysKOM} will send it a @samp{SIGTERM} signal, so that it
saves the database and dies. Default is @file{etc/status}.
@item Nologin file: @var{path}
If this file exists, the server will not allow any connections at all.
Default is @file{/etc/nologin}.
@item Garb busy postponement: @var{timeval}
The garb only runs while the server is idle. This determines how
often the garb will check if the server is idle. Default is @code{20
milliseconds}.
@item Garb timeout: @var{timeval}
How long to sleep when the server is garbage-collecting texts, but has
nothing else important to do. Default is @code{100 milliseconds}.
@item Sync timeout: @var{timeval}
How long to sleep when lyskomd is saving its database.
Defaults to @code{0 milliseconds}.
@item Permissive sync: @var{bool}
Turning this option on lets any session sync the LysKOM database.
Turning it off restricts the operation to LysKOM administrators. Default
is off.
@item Garb interval: @var{timeval}
How long to wait between each garb sweep. Defaults to @code{1440
minutes}, which means that 24 hours will pass between each garb sweep.
@item Sync interval: @var{timeval}
How long to wait between syncs. The current version of lyskomd keeps
changes to the database in memory until they are synced to disk. This
parameter specifies how long the server waits before attempting to
dump the database. The default is @code{5 minutes}.
@item Sync retry interval: @var{timeval}
If anything goes wrong while trying to dump the data base (such as if
the disk is full), lyskomd will wait for this long before trying
again. Default is @code{1 minute}.
@item Saved items per call: @var{int}
When the server is saving the database, it does so in the background.
It serves one call from a client, saves a few items to the new database
file, serves another call, et c. This parameter sets the number of
items (texts, conferences, persons) that are saved after each call.
Default is @code{5}.
@item Penalty per call: @var{int}
Penalty points given to a client once a call is completed. This
affects the scheduling. Default is @code{10}.
@item Penalty per read: @var{int}
Penalty points given to a client each time a @code{read(2)} is
performed on the socket connected to the client. This affects the
scheduling. Default is @code{1}.
@item Max penalty: @var{int}
Once a client receives this many penalty points, the server will stop
reading from the socket connected to the client. (Once the server
becomes idle, all penalty points will be aged, so the server will soon
start reading from it again.) Default is @code{100}.
@item Low penalty: @var{int}
Once the penalty points for a client is reduced below this setting,
the server will start reading from the client again. This should be
lower than @code{Max penalty}. Default is @code{20}.
@item Default priority: @var{int}
@itemx Max priority: @var{int}
The default and max scheduling priority of a client. Both values must
currently be set to @code{0}, which is the default.
@item Default weight: @var{int}
@itemx Max weight: @var{int}
The default and max scheduling weight for a client. Defaults to
@code{20} and @code{100}.
@item Connect timeout: @var{timeval}
If the client doesn't send the initial handshake (such as
@samp{A27Hceder@@stanly.lysator.liu.se}) within this time period, the
client will be disconnected.
Default is @code{30 seconds}.
@item Login timeout: @var{timeval}
@itemx Active timeout: @var{timeval}
If nothing is sent to the client for this long, the client will be
disconnected. Both asynchronous messages and replies to requests from
the clients will reset the timer. The @samp{Login timout:} value is
used while nobody is logged in on the session.
Default is @code{30 minutes} and @code{11.5 days}, respectively.
@item Max client data length: @var{int}
The maxiumum allowed length for client name and version data. The
default is @code{60}.
@item Max conference name length: @var{int}
The maximum length of conference names. The default is @code{60}.
@item Max password length: @var{int}
Only the first eight characters of the password are currently
significant, even if this number is much larger. The default is
@code{128}.
@item Max what am I doing length: @var{int}
The maximum length of the string permitted in the protocol A call
@ref{(protocol-a)change-what-i-am-doing, change-what-i-am-doing}. The
default is 60.
@item Max username length: @var{int}
The maximum length permitted for user names. Default is 128.
@item Max text length: @var{int}
The maximum length allowed for a text. The default is 131072 characters.
@item Max aux_item length: @var{int}
The maximum length allowed for a single aux-item. The default is 16384
characters.
@item Max broadcast length: @var{int}
The maximum length allowed for broadcast messges. The default is 1024
characters.
@item Max regexp length: @var{int}
The maximum length allowed for regexps in various calls. The default is
1024 characters.
@item Statistic name length: @var{int}
The maximum lenght allowed for the name of a measured statistics. The
default is 64 characters.
@item Max marks per person: @var{int}
The maximum number of marks a person is allowed to have. The default is
2048.
@item Max marks per text: @var{int}
The maximum number of marks a text can have. The default is 1024.
@item Max recipients per text: @var{int}
The maximum number of recipients of a text. The default is 512.
@item Max comments per text: @var{int}
The maximum number of comments a text can have. The default is 128.
@item Max footnotes per text: @var{int}
The maximum number of footnotes a text can have. The default is 32.
@item Max links per text: @var{int}
The maximum number of misc info items that can be added to a text.
@item Max mark_as_read chunks: @var{int}
@c FIXME: What is this?
@item Max super_conf loop: @var{int}
@c FIXME: What is this?
@item Max accept_async len: @var{int}
Maximum length of list accepted in the accept_async call. Default is
128.
@item Max aux_items deleted per call: @var{int}
Maximum number of aux_items that can be deleted in one call. Default is
128.
@item Max aux_items added per call: @var{int}
Maximum number of aux_items that can be added at once. Default is 128.
@item Max read_ranges per call: @var{int}
Maximum number of read_ranges that can sent in a single request.
Default is 512.
@item Default garb nice: @var{int}
Each conference has a lifetime for texts written in it. The lifetime is
counted in days, and can be set for each conference by the administrator
of the conference. This is the default value assigned to new
conferences. Default is 77 days.
@item Default keep commented nice: @var{int}
A text will not be removed if it has comments newer than a certain
number of days. This number can be set for each conference. This
parameter specifies the default value for that number of days. The
default is 77.
@item Max client message size
The maximum number of bytes that is read or written in a single system
call. Defaults to 8176. (Attempts to set it to a larger value will
currently only affect the input.)
@item Max client transmit queue messages: @var{int}
@itemx Max client transmit queue bytes: @var{int}
Max number of pending data blocks (or total number of bytes) in the
reply queue to a client. If there is ever more than this many data
blocks in the queue the client will be disconnected. Each atomic
question typically generates two data blocks. Default is 50 and
100000, respectively.
@item Stale timeout: @var{timeval}
If the transmit queue of a client is full for this long, without the
server being able to send anything to the client, the client will be
disconnected. Default is 60 minutes.
@item Max simultaneous client replies: @var{int}
This is a performance tuning parameter of little real interest. Default
is 10.
@item Open files: @var{int}
Try to persuade the operating system to allow lyskomd to have this many
open file descriptors simultaneously. Each client that is connected to
the server occupies one file descriptor, and lyskomd needs several file
descriptors for internal purposes. Default is to not use this parameter.
@item Use DNS: @var{bool}
The IP address of a client is looked up using DNS when it connects.
Unfortunately, this lookup blocks the entire server, and it can take
several minutes. You can disable DNS lookup with this parameter.
Default is on.
@item DNS log threshold: @var{double}
If the @samp{Use DNS:} parameter is true, the server will measure the
time each DNS lookup takes. If the time exceeds the specified
threshold, an entry will be made in the log. The value is specified
in seconds. The default value is 1.5 seconds. If your libc supports
it, you can enter @code{+inf} to disable logging.
@item Anyone can create new persons: @var{bool}
If this is set, anyone can create a new person, even if he lacks
special bits for doing so. Default is on.
@item Anyone can create new conferences: @var{bool}
If this is set, anyone can create a new conferences, even if he lacks
special bits for doing so. Default is on.
@item Allow creation of persons before login: @var{bool}
If this is set, persons can connect the the server and create a new
person without logging in. This is how new users register in open
environments. If this option is off, then new persons can only be
created by existing users. The default is on.
@item Default change name capability: @var{bool}
If this is set, new users are created with the ability to change their
own name. Default is on.
@item Ident-authentication: @var{policy}
Decide how strictly the server should use the IDENT protocol.
The policy can take any of three values:
@table @asis
@item @code{off} or @code{never}
Do not use the IDENT protocol.
@item @code{on} or @code{try}
Use it, but allow logins even if the lookup fails.
@item @code{require} or @code{required}
Disallow connections if the server cannot find a IDENT login name.
@end table
@item Log login: @var{bool}
Should logins be logged to the log file? Default value is off.
@item Cache conference limit: @var{int}
How many conference statuses the server cache should hold in main
memory. Default is 20. This parameter should be set to at least the
number of expected simultaneous logins.
@item Cache person limit: @var{int}
How many person statuses the server cache should hold in main
memory. Default is 20. This parameter should be set to at least the
number of expected simultaneous logins.
@item Cache text_stat limit: @var{int}
How many text statuses the server cache should hold in main
memory. The default is 20. This parameter should be increased on busy
servers.
@item Echo: @var{string}
Write @var{string} in the log when the config file is read.
@item Jubel: @var{pers_no} @var{text_no}
@itemx Jubel: public @var{pers_no} @var{text_no}
States that @var{pers_no} is not allowed to create text number
@var{text_no}. Default is unset. This parameter may be used multiple
times. The form with the string @code{public} means that the text must
have a public conference as recipient.
@item Jubel: @var{pers_no} @var{dividend} @var{remainder}
@item Jubel: public @var{pers_no} @var{dividend} @var{remainder}
States that @var{pers_no} is not allowed to create any text number
@var{T} which meets the condition @var{T} % @var{dividend} == @var{remainder}.
Default is unset. This parameter may be used multiple
times. The form with the string @code{public} means that the text must
have a public conference as recipient.
@item Add members by invitation: @var{bool}
If this is set, then adding others as members to a conference sets the
invitation bit of the membership. If this is off, the membership bit is
set to whatever the caller specifies. The default is on.
@item Allow secret memberships: @var{bool}
If this is set, then memberships may be secret. Otherwise any attempt
to create a secret membership or change an existing membership to a
secret membership will fail. The default is on.
@item Allow reinvitations: @var{bool}
If this is set, then it is possible to set the invitation bit of a
membership even after it has been cleared. If it is not set, then the
invitation bit of a conference type can only be set when the
membership is created. It can be cleared at any time. The default is
off.
@item lyskomd path: @var{path}
Path to the @code{lyskomd} binary. This is used by @code{updateLysKOM}
to find the right program to run. Defaults to @file{bin/lyskomd}.
@item savecore path: @var{path}
Path to the @code{savecore} program. If a file named @file{core} exists
in the directory specified with @code{Core directory} when
@code{updateLysKOM} is about to start @code{lyskomd}, this program will
be called first. It could, for instance, move the core file so that it
is available for later debugging.
@item Normal shutdown time: @var{int}
In a normal setup, @code{updateLysKOM} will be run from @code{cron} once
every ten minutes or so. If it detects that it has taken @code{lyskomd}
more than @var{int} minutes to shut down it will print a warning
message.
@item Mail after downtime: @var{int}
@itemx Mail until downtime: @var{int}
If @code{lyskomd} has been down for X minutes, where @code{Mail after
downtime} <= X < @code{Mail until downtime}, @code{updateLysKOM} will
send a mail message to the mail address found on the first line of the
status file. Actually, it is the age of the status file (named with
@code{Status file}) that is measured.
@end table
@node Aux-Item Definition File
@section Aux-Item Definition File
The default aux-item definition file should not be changed unless it is
really necessary. The need to change the definitions will probably only
arise at installations used for client or server development.
The location of the aux-item definition file is specified by the
@code{Aux-item definition file} option in the server configuration
file. The default location is @file{/usr/lyskom/etc/aux-items.conf}.
@subsection Syntax of the Aux-Item Definition File
The aux-item definition file contains a sequence of aux-item
definitions. Each definition specifies one type of predefined aux-item:
its number, name, and properties. Empty lines and all characters from a
# character to the end of the line are ignored.
Each entry has the following format:
@example
tag : name (target, target, ... )
@{
field = value;
field = value;
...
@}
@end example
@var{tag} is an integer, the aux-item's tag. If a tag is defined more than
once, the last definition is used.
The @var{target}s specify what kind of objects aux-items with tag @var{tag}
can be added to. Valid targets are:
@table @code
@item any
Aux-items with the specified tag can be added to any object in the
database. This is shorthand for @code{text,conference,letterbox,server}.
@item text
Aux-items with the specified tag can be added to texts.
@item conference
Aux-items with the specified tag can be added to conferences that are
@emph{not} letterboxes.
@item letterbox
Aux-items with the specified tag can be added to conferences that are
letterboxes.
@item server
Aux-items with the specified tag can be added to the server itself.
@end table
It is legal to add one of the keywords @code{create} or @code{modify}
before any target except @code{server}. If @code{create} is specified,
aux-items with the specified tag can only be added when an object is
being created. They cannot be added later. If @code{modify} is
specified, aux-items with the specified tag can only be added after an
object has been created. They cannot be added when the object is being
created.
Each @var{field}/@var{value} pair specifies a property of aux-items with the
specified tag. Most values are boolean or trillian. Legal values for
either type are @code{true} and @code{false}. Boolean values have
reasonable defaults; trillian values can be unset.
@table @code
@item author-only
Boolean, default false. When true, only the author of a text or
supervisor of a conference can create items with this tag.
@item supervisor-only
Boolean, default false. When true, only the supervisors of the author or
letterbox can create items with this tag. In all likelihood, the
implementation of this flag is screwed up in version 2.0 of lyskomd.
@item system-only
Boolean, default false. When true, only the server can initiate creation
of items with this tag. This is normally used for items that are created
automatically in response to events in the system.
@item permanent
Boolean, default false. When true, aux-items with this tag cannot be
deleted once they have been created. (They will be deleted
automatically when the object they are assigned to is deleted.)
@item unique
Boolean, default false. When true, there can only be one non-deleted
item with this tag per creator.
@item unique-data
Boolean, default false. When true, there can only be one non-deleted
item with this tag that contains the same data (regardless of who
creates the item).
@item owner-delete
Boolean, default false. When true, the owner of the object that this
aux-item is attached to can always delete the aux-item. For a text,
the owner is defined as the supervisor(s) of the author of the text.
For a conference, the owner is defined as the supervisor(s) of the
conference.
@item inherit-limit
Integer, default 0. The maximum number of times items with this tag can
be inherited, plus one. Zero means an unlimited number of times, one
means no times, 2 means once and so forth. This number overrides the
inherit-limit set by the client only if that number is higher than this
one.
@item inherit
Trillian. When set, the inherit bit on new items with this tag is forced
to the specified value.
@item secret
Trillian. When set, the secret bit on new items with this tag is forced
to the specified value.
@item hide-creator
Trillian. When set, the hide-creator bit on new items with this tag is
forced to the specified value.
@item dont-garb
Trillian. When set, the dont-garb bit on new items will be forced to the
specified value.
@item reserved-2
@item reserved-3
@item reserved-4
Trillian. When set, these flags force the values of the three reserved
bits in the aux-item flags field. These should only be used by lyskomd
developers, and then only very carefully.
@item validate
String or function, default none. When set to a string, this specifies a
regexp that must match the data field in newly created items with this
tag. If the regexp fails to match, then the item will not be created.
The syntax for strings is essentially the same as the syntax used in C
files. When set to a function, this specified a built-in validation
function to call.
The following validator functions are currently implemented:
@table @code
@item existing-readable-text
Creation is only allowed if the item contains the number of an existing
text that the item creator has permission to read.
@end table
@end table
There are a few fields which specify actions the server is to take when
something happens to aux-items with the specified tag. Each of these
values is a function specification, the name of a trigger function
defined in lyskomd. The syntax for functions is the name followed by
an empty pair of parens. It is not possible to pass arguments to the
functions yet.
@table @code
@item add-trigger
Function to call when an item with the specified tag is added to an
object.
@item delete-trigger
Function to call when an item with the specified tag is scheduled for
deletion.
@item undelete-trigger
Function to call when an item with the specified tag scheduled for
deletion is unscheduled. It should undo the effects of the delete
trigger.
@end table
The following trigger functions are currently defined:
@table @code
@item mark-text
Increase the mark count for the text the item refers to. The item must
contain the number of a text. This trigger should be combined with the
existing-readable-text validation function.
@item unmark-text
Decrease the mark count for the text the item refers to. The item must
contain the number of a text. This trigger should be combined with the
existing-readable-text validation function.
@item link-faq
Create a faq-for-conf item linked to a faq-text item. This trigger is
used exclusively for faq-text items. The item must contain the number of
a text. This trigger must be combined with the existing-readable-text
validation function.
@end table
@node Running lyskomd
@chapter Running lyskomd
This section explains how to run lyskomd, the files it uses and how it
can be controlled while running.
@menu
* Invoking lyskomd:: How to run lyskomd.
* Signals:: How to control lyskomd with Unix signals.
* Files:: Files used by lyskomd.
@end menu
@node Invoking lyskomd
@section Invoking lyskomd
@example
lyskomd [-f] [-d] [@var{config-file}]
@end example
The option @samp{-d} adds one to the debug level. The amount of output
on stderr/to the log file is increased for each time the option is
specified on the command line.
Using one @samp{-d} makes the process print a `>' for every timeout, a
message for every person that is connecting or disconnecting and a
message for every successful or unsuccessful communication to the
process.
The option @samp{-f} tells lyskomd to stay in forground mode, and not
run in the background as a daemon. The output that is normally
written to the log file is instead sent to stderr.
The optional @var{config-file} argument can be used to specify the server
configuration file. @xref{Server Configuration File}.
@node Signals
@section Signals
It is possible to control some aspects of lyskomd using Unix signals.
The following signals have special meaning to the server:
@table @samp
@item SIGTERM
@itemx SIGHUP
@itemx SIGINT
Logs out all sessions, saves the database and exits normally. Use
@samp{SIGTERM}; the other signals currently have the same
functionality, but that may be changed in the future.
@item SIGQUIT
Saves the database and dump core. (This should only be used for
debugging purposes.)
@item SIGUSR1
Print statistics about how often different commands have been used
since the process started.
@item SIGUSR2
Forks a child that immediately dumps core. The main process just waits
until the child is done and then continues.
@item SIGWINCH
Re-read the aux-item definition file.
@end table
@node Files
@section Files Used by lyskomd
All file names can be changed in the server configuration file.
@xref{Parameters}.
@table @file
@item /usr/lyskom
Default value of the @code{Prefix} parameter. The default of this value
is set at compile time, but it can be changed in the server
configuration file. @xref{Parameters}.
@item @var{prefix}/db/lyskomd-data
Half of the database: all status information.
@item @var{prefix}/db/lyskomd-texts
The other half of the database: the actual texts.
@item @var{prefix}/db/lyskomd-backup
A backup copy of @file{lyskomd-data}. Never, ever delete this file
unless you know what you are doing, or you may lose the entire data
base. Most of the time this is the only complete database file!
@item @var{prefix}/db/number.txt
Information about the highest used text- and conference numbers. In
case of a crash, some objects may be lost. This file ensures that
even if that happens, their numbers will not be reused.
@item @var{prefix}/etc/pid
File with the pid of the lyskom-process.
@item @var{prefix}/etc/memory-usage
On normal exit, @code{lyskomd} will append some statistics to this file.
It can be used for detecting memory leaks.
@item @var{prefix}/etc/aux-items.conf
This file contains definitions of the aux-items that the server should
support. It is read by @code{lyskomd} at startup.
@item @var{prefix}/etc/connections.txt
A list of all currently connected clients, maintained by the server.
The data about each client is collected on a single line:
@itemize @bullet
@item The file descriptor
@item The session number
@item @samp{1} if the handshake is OK, the reverse DNS has completed,
and the IDENT lookup has completed. @samp{0} otherwise.
@item The IP address of the client
@item The port number of the client
@end itemize
In the following example, we see that file descriptor 437 is used by
session 330978, and the connection is from 130.236.254.83:3156.
@example
437 330978 130.236.254.83 3156
@end example
@item /etc/nologin
If this file exists, lyskomd will not allow anyone to connect to the
server. This path can be set with the @code{Nologin file} parameter in
the server configuration file.
@end table
@node Invoking updateLysKOM
@chapter Invoking updateLysKOM
@example
updateLysKOM [-c @var{config-file}] [ -v ] [ -V ]
@end example
@code{updateLysKOM} determines if @code{lyskomd} should be running. It
can start or stop @code{lyskomd} if needed. It uses the same
configuration file as @code{lyskomd} (@pxref{Server Configuration
File}). You can use @samp{-c @var{config-file}} to override the
compiled-in default. Note, however, that this option is not passed
along to @code{lyskomd} if @code{updateLysKOM} starts it, so the option
should be used with extreme caution.
@samp{-v} and @samp{-V} causes @code{updateLysKOM} to report its version
number and exit.
@code{updateLysKOM} is normally run from @code{cron};
@pxref{Administration}.
@node Invoking komrunning
@chapter Invoking komrunning
@example
komrunning [-c config-file] [start | stop]
komrunning -v | -V
@end example
@code{komrunning}, when invoked with no arguments, reports whether
@code{lyskomd} is currently running or not, and whether it should be
running or not. @samp{komrunning start} attempts to start
@code{lyskomd}. @samp{komrunning stop} attempts to stop @code{lyskomd},
and it will not return until the server has saved its database and
exited.
@code{komrunning} uses the same configuration file as @code{lyskomd}
(@pxref{Server Configuration File}). You can use @samp{-c
@var{config-file}} to override the compiled-in default. Note, however,
that this option is not passed along to @code{updateLysKOM} if
@code{komrunning} invokes it, so the option should be used with extreme
caution.
The @code{komrunning} can be installed in @file{/etc/init.d/}. Be
careful, however, to ensure that the pid file is removed earlier during
the boot sequence.
@samp{-v} and @samp{-V} causes @code{komrunning} to report its version
number and exit.
@node Administration
@chapter Administration
The first thing you will have to do is to follow the instructions in the
files @file{INSTALL} and @file{README}. This will set up the LysKOM
system with a database containing a few necessary conferences and one
person - the administrator.
Once the LysKOM system is running, there is not much you will have to do
to keep it that way. One thing to remember is that the current release
of the server has an incomplete handling of garbage collection of the
database. The database is split into two files, the information file and
the text file. Newly written texts are concatenated to the text file and
old texts are never removed. The information file contains information
about conferences, users and where in the text file the texts are. This
file is properly garbage collected, but not the text file.
There is a program called @code{dbck} (Data Base Check) which is used
to check the consistency of the LysKOM database. This program can also
be used to shrink the text file. To do this, just type @samp{dbck
-g}. @xref{DBCK Reference}. When @code{dbck} is to be run on the
database, the LysKOM server @emph{must} be stopped, or unrepairable
damage may result. See below for a description on how to stop the
server.
There is a program called @code{updateLysKOM} which is used to ensure
continuous operation. This program should be run with certain intervals,
for instance from @code{cron}. If the LysKOM server has died for some
reason, @code{updateLysKOM} restarts it. If the server is still running
properly, @code{updateLysKOM} sends a signal (@samp{SIGUSR1}) to it,
which causes the server to write some statistics to a file named
@file{etc/lyskomd-log} in the lyskom directory.
Taking the server down cleanly can be done in two ways: through the use
of the LysKOM protocol on a socket, preferably through the use of a
suitable client, or by sending the signal @samp{SIGTERM} to it. This will
cause the server to save the database and close all client
connections. It will also create a file named @file{etc/memory-usage} in
which the memory usage of the server is reported.
To prevent @code{updateLysKOM} from restarting a server, create a file
named @file{/usr/lyskom/etc/status}. The file should contain a valid
mail address on the first line. @code{updateLysKOM} will not restart the
server as long as that file exists. In addition, if the file is between
1 and 2 hours old (configurable) an email will be sent to the mail
address found in the file. If the file is older than that, an error
message will be printed on stderr and @code{updateLysKOM} will exit with
a non-zero exit status. cron is expected to deliver the error message to
an operator.
The shell script @code{komrunning} can be used to start and stop the
LysKOM server. With no arguments, it will report the status.
@example
komrunning stop
@end example
will (attempt to) shut down the server, creating the file
@file{/usr/lyskom/etc/status}. If the user running @code{komrunning}
doesn't have permission to send signals to @code{lyskomd} the actual
shutdown will be delayed until the next time that @code{updateLysKOM} is
run.
@example
komrunning start
@end example
will restart the server. The actual starting of the server will be done
by @code{updateLysKOM} the next time it is run. @code{komrunning} only
removes the @file{/usr/lyskom/etc/status} file.
@node Bugs
@chapter Known Bugs
@itemize @bullet
@item lyskomd should re-read the config file when a @samp{SIGHUP} is
received.
@item The security policy is vague and the implementation is frayed at
the edges.
@item The choice of asynchronous messages is not very good.
@item The server uses too much memory.
@end itemize
@c ======================================================================
@c ======================================================================
@c == ==
@c == DBCK REFERENCE ==
@c == ==
@c ======================================================================
@c ======================================================================
@node DBCK Reference
@chapter DBCK Reference
dbck is a program that can is used for minor database maintenance tasks
and for repairing a corrupt lyskomd database.
@menu
* DBCK Overview:: Overview of dbck.
* Invoking dbck:: How to run dbck.
* DBCK Notes:: Notes about running dbck.
* DBCK Files:: Files used by dbck.
* DBCK Bugs:: Known bugs in dbck.
@end menu
@node DBCK Overview
@section Overview
The dbck program is used for minor maintenance of the LysKOM database
and for repairing corrupt databases. In brief it performs the following
functions:
@itemize @bullet
@item Compact the text file to remove deleted texts.
@item Repair inconsistent membership information.
@item Repair invalid recipients
@item Repair inconsistent comment links
@item Correct invalid local text numbers
@item Correct invalid text maps
@item Set special conferences
@item Convert between database formats
@end itemize
@node Invoking dbck
@section Invoking dbck
The functionality of dbck is controlled through command-line switches.
These are documented below.
If @code{dbck} is invoked without any options it will read the database
and report on its integrity. No files will be modified.
@menu
* General Options:: Controlling the overall behavior of dbck.
* Database Repair Options:: Repairing errors in the LysKOM database.
* Format Conversion Options:: Converting the database file to a new format.
* Database Maintenance Options:: Options for database maintenance.
* Reporting Options:: Options controlling status reports.
@end menu
@node General Options
@subsection General Options
These options control the general behavior of lyskomd.
@table @asis
@item @samp{-h} or @samp{--help}
Give a usage message (which includes the version number and the
compiled-in default location of the config file) and exit immediately.
@item @samp{-v} or @samp{--verbose}
Verbose mode. Report not only errors but the status of the database.
@item @samp{-F} or @samp{--force-output}
This option forces dbck to write the database file. Normally @code{dbck}
will only write a new database file if changes have been made for some
other reason. If you want to simply convert a database from one version
to another, you will probably have to give this option.
@end table
@node Database Repair Options
@subsection Database Repair Options
The following options control database repair.
@table @asis
@item @samp{-i} or @samp{--interactive}
Run interactively. If any inconsistency is found, a remedial cure will
be suggested and the user must confirm the correction.
@item @samp{-r} or @samp{--auto-repair}
Repair simple errors without asking.
@item @samp{-c} or @samp{--set-change-name}
Consider it an error if the @code{change-name} capability of a person is
not set. Due to a bug that capability was never set for newly created
persons in release 1.6.1 of lyskomd. This option can be used to repair
the damage.
@end table
@node Format Conversion Options
@subsection Format Conversion Options
dbck can be used to conver the LysKOM database from one storage format
to another. This is necessary only when moving the database to a new
server version.
@table @asis
@item @samp{-F} or @samp{--force-output}
This option forces dbck to write the database file. Normally @code{dbck}
will only write a new database file if changes have been made for some
other reason. If you want to simply convert a database from one version
to another, you will probably have to give this option.
@item @samp{-o} or @samp{--output-version}
This option is used to set the output version of the database. This
option will normally be used in conjunction with the @samp{-F} option.
Version 1.9 of @code{lyskomd} requires database version 1; version 2.0
requires database version 2. Versions of @code{lyskomd} prior to 1.9
requires database version 0. Note that information is irrevocably lost
when converting from a higher to a lower database version. This options
requires an argument: the output format version.
@end table
@node Database Maintenance Options
@subsection Database Update Options
dbck can be used to update certain aspects of the database that either
were impossible to update in early versions of protocol A or that are
inconvenient in all protocol versions.
@table @asis
@item @samp{-g} or @samp{--compact-text-mass}
Do garbage collection on the texts part of the database. This removes
all unreferenced texts from the database.
@item @samp{-P} or @samp{--clear-password}
Clear the password of a specified user. This option is silently ignored
if the user does not exist. This option requires an argument: the ID of
the person whose password is to be cleared.
@item @samp{-G} or @samp{--grant-all}
Grant all privileges to the specified user. This option is silently
ignored if the user does not exist. This option requires an argument:
the ID of the person who is to be granted all privileges.
@item @samp{--pers-pres-conf}
Set the person presentation conference of the server to the specified
conference. Since version 1.9 of lyskomd the @code{set-info} call can be
used to do this.
@item @samp{--conf-pres-conf}
Set the conference presentation conference of the server to the specified
conference. Since version 1.9 of lyskomd the @code{set-info} call can be
used to do this.
@item @samp{--motd-conf}
Set the message-of-the-day conference of the server to the specified
conference. Since version 1.9 of lyskomd the @code{set-info} call can be
used to do this.
@item @samp{--kom-news-conf}
Set the news-about-lyskom conference of the server to the specified
conference. Since version 1.9 of lyskomd the @code{set-info} call can be
used to do this.
@item @samp{--motd-of-kom}
Set the message of the day of the server to the specified text. Since
version 1.9 of lyskomd the @code{set-info} call can be used to do this.
@end table
@node Reporting Options
@subsection Reporting Options
These options control reporting of information about the database.
@table @asis
@item @samp{-s} or @samp{--print-statistics}
Gather statistics about the lengths of texts. A table containing the
frequence of all lengths that are currently present is printed.
@item @samp{-t} or @samp{--list-text-no}
Print ``Checking @var{text-no}'' for every text that examined.
@b{Warning:} This produces lots of output.
@end table
@node DBCK Notes
@section Notes for DBCK
The messages ``Conference @var{conf-no} has a bad Text-list. Starts with
0'' and ``Person @var{pers-no} has created @var{num} conferences, not
@var{num} (as said in person-stat).'' are normal. If you get them when
you specify the @samp{-g} option, let @code{dbck} repair them and run
@samp{dbck -g} again.
@node DBCK Files
@section Files Used by dbck
dbck uses the same files as @code{lyskomd} (@xref{(lyskomd)}.)
All file names can be changed in the server configuration file.
@xref{(lyskomd)Parameters}.
@table @file
@item /usr/lyskom
Default value of @code{Prefix:}. The default of this value is set at compile
time, but it can be changed in the server configuration file.
@xref{(lyskomd)Parameters}.
@item @var{prefix}/db/lyskomd-data
Half of the database: all status information.
@item @var{prefix}/db/lyskomd-texts
The other half of the database: the actual texts.
@item @var{prefix}/db/lyskomd-backup
A backup copy of @file{lyskomd-data}. Never, ever delete this file
unless you know what you are doing, or you may lose the entire data
base. Most of the time this is the only complete database file!
@end table
@node DBCK Bugs
@section Known Bugs
@itemize @bullet
@item Should have an unlock database option.
@item Does not check that the data file and text file are consistent.
@end itemize
@c ======================================================================
@c ======================================================================
@c == ==
@c == SPLITKOMDB REFERENCE ==
@c == ==
@c ======================================================================
@c ======================================================================
@node splitkomdb
@chapter Backups with splitkomdb
The files created by @code{lyskomd} can become huge. They are more
or less constantly modified, so if you do incremental backups the
entire @code{lyskomd} database will be saved each time you perform a
backup. The @code{splitkomdb} program improves the situation.
@menu
* splitkomdb basics:: How splitkomdb works.
* Invoking splitkomdb:: splitkomdb reference.
* splitkomdb example:: A typical setup of splitkomdb.
* splitkomdb restore:: How to restore the database.
@end menu
@ifnottex
@node splitkomdb basics
@section splitkomdb theory of operation
@end ifnottex
The @code{splitkomdb} program attempts to split the current database
in several files, some of which will not be modified the next time you
run @code{splitkomdb}. An incremental backup will thus only have to
save some of the files created by @code{splitkomdb}.
@code{splitkomdb} can be run while @code{lyskomd} is running. It will
use the last completely saved snapshot, and make a copy of it in the
directory specified by the @code{Backup export directory:} parameter
(default: @file{/usr/lyskom/exportdb/}).
There are two recommended ways to make backups of a @code{lyskomd}
database:
@itemize @bullet
@item Run @code{splitkomdb} before each backup, and instruct the backup
program to backup @file{/usr/lyskom/exportdb}, but ignore
@file{/usr/lyskom/db}. Run @samp{splitkomdb -f} before each full
backup.
@item Backup all the files in @file{/usr/lyskom/db}.
@end itemize
The first alternative needs more disk for the copy in
@file{/usr/lyskom/exportdb} and is slightly more complex to set up;
the second alternative saves the entire database each time you make a
backup.
@node Invoking splitkomdb
@section Invoking splitkomdb
@example
splitkomdb [-c config-file] [-f]
splitkomdb -v | -V
@end example
@code{splitkomdb} creates a splitted copy of the most recent database
snapshot in the directory specified by the @code{Backup export
directory:} parameter.
If @samp{-v} or @samp{-V} is specified, @code{splitkomdb} prints its
version number and exits.
The @samp{-f} option is a hint to @code{splitkomdb} that the next
backup will be a full backup. When this option is used,
@code{splitkomdb} might rewrite all the output files in a way so that
future invocations of @code{splitkomdb} will create a little
incremental data as possible.
The optional @var{config-file} argument can be used to specify the server
configuration file. @xref{Server Configuration File}.
@node splitkomdb example
@section Typical splitkomdb setup
A typical way to run @code{splitkomdb} is from @code{cron}. A
@file{crontab} entry might look like this:
@example
50 2 26 * * /sw/lyskom/bin/splitkomdb -f
10 3 * * * /sw/lyskom/bin/splitkomdb
@end example
This entry assumes that backups are started at 03:30. It gives
@code{splitkomdb} 20 minutes to run. (That should be enough for most
sites, but please check what is appropriate for your site.)
Full backups are run on the 26th of each month. On those days, at
02:50, @samp{splitkomdb -f} is run.
@node splitkomdb restore
@section Restoring the database from splitkomdb
The splitted format of the database is currently very simple:
@table @file
@item exportdb/lyskomd-texts-base.backup
This file contains the first part of @code{Text file:} (default:
@file{db/lyskomd-texts}). This file is created when the @samp{-f}
option is given to @code{splitkomdb}.
@item lyskomd-texts-tail.backup
This file contains the rest of @code{Text file:}. It is always
recreated when @code{splitkomdb} is run.
@item lyskomd-data.backup
This file contains a copy of @code{Data file:} (default:
@file{db/lyskomd-data}). If @code{Data file:} file wasn't clean
when @code{splitkomdb} was run, @code{Backup file:} (default:
@file{db/lyskomd-backup}) will be copied instead.
@end table
This means that it is easy to restore the database from the splitted
database. If you use the default paths, all you have to do is run
these commands:
@example
$ cd /usr/lyskom/exportdb
$ cat lyskomd-texts-base.backup \
> lyskomd-texts-tail.backup \
> > ../db/lyskomd-texts
$ cp lyskomd-data.backup ../db/lyskomd-data
@end example
Future versions of @code{splitkomdb} may use a different format. It
may even evolve into something so complex that you need a program to
recreate the database. Always check the current documentation for
information on how to restore the database.
@c ======================================================================
@c ======================================================================
@c == ==
@c == LYSKOMD HACKING GUIDE ==
@c == ==
@c ======================================================================
@c ======================================================================
@node Hacking
@chapter Hacking lyskomd
@menu
* The Database::
* Adding Configuration Parameters:: How to add configuration options.
* Adding Asynchronous Messages:: Adding protocol A messages.
* Adding a New Protocol Request:: Adding protocol A calls.
* Adding New Input Types::
* Adding New Result Types::
* Modifying Output Types::
* Adding Aux-Item Types:: Adding predefined aux item types.
* Modifying Stored Types:: Modifying types stored in the DB.
* Notes:: Mixed notes.
* Debugging and Testing:: How to test and debug the server.
* local-to-global:: The Local_to_global structure.
@end menu
@node The Database
@section The Database
@c FIXME: ramkomd är död! Länge leve LysKOM!
@c FIXME:
@c FIXME: Jag har tillsammans med Inge kommit på ett sätt att dels få ner
@c FIXME: väntetiden i samband med syncningar till <1 sekund, dels få ner
@c FIXME: storleken på serverprocessen till mer rimliga nivåer. Denna lösning
@c FIXME: lider dock av det stora problemet att den kräver dubbelt så mycket
@c FIXME: diskutrymme som den egentligen behöver. Det gör även ramkomd, så det
@c FIXME: är ingen försämring i det avseendet. Dock är detta bara en temporär
@c FIXME: lösning i väntan på ldb.
@c FIXME:
@c FIXME: Varför spara allt på en gång? Varför inte spara en liten del av filen
@c FIXME: i taget, och utföra några atomiska anrop mellan varje liten
@c FIXME: delsynkning? Ungefär så tänkte jag när jag kom på följande schema för
@c FIXME: hur man kan göra det hela bättre än det är nu.
@c FIXME:
@c FIXME: Den databas som ligger på fil är en ögonblickbild (snapshot) av det
@c FIXME: som finns i LysKOM. Så är det i ramkomd; så blir det i diskomd.
@c FIXME: (Bättre namn, någon? lyskomd tycker jag är reserverat för den version
@c FIXME: som har en riktig cache&ldb.) I ramkomd skrivs allt ut på disk
@c FIXME: samtidigt. I diskomd minns man bara vad som skall sparas, och sparar
@c FIXME: bara en bit i taget.
@c FIXME:
@c FIXME: I ramkomd finns allt inne i ram-minnet (i teorin. I praktiken är det
@c FIXME: mesta utswappat - något som märks varje gång det är dags att synca!).
@c FIXME: I diskomd ligger det mesta på disk. I minnet finns dels det som har
@c FIXME: använts nyligen, dels det som är ändrat och ännu ej syncat. Diskomd
@c FIXME: har alltid minst en, ofta två, databasfiler öppna:
@c FIXME:
@c FIXME: Fil A Senaste kompletta fil.
@c FIXME: Fil B Fil under uppbyggnad.
@c FIXME FIXME: Fil Z Näst senast kompletta fil
@c FIXME FIXME: (den här gick att kopiera en gång i
@c FIXME FIXME: tiden, även om A inte går att kopiera
@c FIXME FIXME: just nu.)
@c FIXME:
@c FIXME: (Dessutom textmassefilen, precis som ramkomd nuförtiden.)
@c FIXME:
@c FIXME: Så till detaljerna:
@c FIXME:
@c FIXME: Det finns tre typer av objekt som berörs av den här ändringen:
@c FIXME: Text_stat, Person och Conference. Jag använder Person som ett exempel
@c FIXME: nedan.
@c FIXME:
@c FIXME: I ram-cache.c finns en array
@c FIXME:
@c FIXME: Person *pers_arr[ MAX_CONF ];
@c FIXME:
@c FIXME: Den byts mot
@c FIXME:
@c FIXME: Cache_node *pers_arr[ MAX_CONF ];
@c FIXME:
@c FIXME: typedef struct cache_node @{
@c FIXME: Bool exists;
@c FIXME: Bool exists_b;
@c FIXME: Bool dirty; /* Är *ptr modifierad? */
@c FIXME: void *snap_shot;
@c FIXME: void *ptr;
@c FIXME: off_t pos;
@c FIXME: off_t pos_b;
@c FIXME: struct cache_node *lru_link;
@c FIXME: int lock_cnt;
@c FIXME: @} Cache_node;
@c FIXME:
@c FIXME:
@c FIXME:
@c FIXME: UPPSTART
@c FIXME:
@c FIXME: När servern startas scannar den igenom datafilen (fil A) och fyller i
@c FIXME: fältet exists till TRUE/FALSE och pos till att peka på början av det
@c FIXME: ställe i filen där data ligger. Övriga fält sätts till FALSE/NULL/0.
@c FIXME:
@c FIXME:
@c FIXME:
@c FIXME: CACHE_GET_PERSON
@c FIXME:
@c FIXME: När ovanliggande rutiner vill läsa en person händer följande:
@c FIXME:
@c FIXME: !exists Returnera NULL
@c FIXME: ptr != NULL Lägg noden först i lru_link. Returnera ptr.
@c FIXME: snap_shot != NULL Kopiera snap_shot till ptr. Lägg noden först i
@c FIXME: lru_link. Returnera ptr.
@c FIXME: annars Läs in från fil A, sätt ptr till den inlästa
@c FIXME: structen, lägg noden först i lru_link,
@c FIXME: returnera ptr.
@c FIXME:
@c FIXME:
@c FIXME: MARK_PERSON_AS_CHANGED
@c FIXME:
@c FIXME: När något har ändrats sätts dirty-flaggan till TRUE.
@c FIXME:
@c FIXME:
@c FIXME: CREATE_PERSON
@c FIXME:
@c FIXME: Sätt exists=TRUE, dirty=TRUE, ptr och lru.
@c FIXME:
@c FIXME:
@c FIXME: DELETE_PERSON
@c FIXME:
@c FIXME: Sätt exists=FALSE. ptr=NULL. Troligtvis error om lock_cnt != 0.
@c FIXME:
@c FIXME:
@c FIXME:
@c FIXME: THROW-OUT
@c FIXME:
@c FIXME: För att inte diskomd ska bli för stor slängs saker ut ur cachen.
@c FIXME: Algoritm: tag första elementet i lru_list. Om dirty==FALSE och
@c FIXME: ptr!=NULL och lock_cnt==0 så frigör ptr. Upprepa tills antalet noder
@c FIXME: med ptr!=NULL och dirty==FALSE är mindre än antalet "rena"
@c FIXME: element man vill ha inne i minnet. (Smutsiga element slängs
@c FIXME: aldrig ut.)
@c FIXME:
@c FIXME:
@c FIXME: LOCK_PERSON
@c FIXME:
@c FIXME: Öka lock_cnt.
@c FIXME:
@c FIXME:
@c FIXME: UNLOCK_PERSON
@c FIXME:
@c FIXME: Minska lock_cnt.
@c FIXME:
@c FIXME:
@c FIXME: PRE-SYNC
@c FIXME:
@c FIXME: Utsparningen till fil sker i tre steg. Först sveper man över alla
@c FIXME: Cache_noder. För alla som har dirty=TRUE gör man följande:
@c FIXME:
@c FIXME: if ( lock_cnt == 0 ) @{
@c FIXME: snap_shot = ptr; (Pekartilldelning, ej kopiering.)
@c FIXME: ptr = NULL;
@c FIXME: Ta bort ptr ur lru-kedjan.
@c FIXME: @} else @{
@c FIXME: snap_shot = copy(ptr);
@c FIXME: @}
@c FIXME:
@c FIXME: dirty = FALSE;
@c FIXME:
@c FIXME: För _alla_ noder görs dessutom följande:
@c FIXME:
@c FIXME: b_exists==exists;
@c FIXME:
@c FIXME:
@c FIXME: SYNC
@c FIXME:
@c FIXME: Steg två utförs en liten bit i taget. Till exempel så skulle
@c FIXME: man kunna spara en person efter varje atomiskt anrop, eller så.
@c FIXME:
@c FIXME: b_exists==FALSE? Sätt pos_b. Skriv "@@\n" till fil B.
@c FIXME: Är snap_shot != NULL? Sätt pos_b. Skriv ut innehållet i snap_shot
@c FIXME: till fil B.
@c FIXME: dirty==FALSE && ptr!=NULL Skriv ut innehållet i ptr till fil B.
@c FIXME: annars: Kopiera från fil A till fil B. (Eftersom man
@c FIXME: vet både var blocket börjar och slutar kan
@c FIXME: man kopiera blocket utan att bry sig om vad
@c FIXME: som står i det -> väldigt lite CPU går åt).
@c FIXME:
@c FIXME:
@c FIXME:
@c FIXME:
@c FIXME: POST-SYNC
@c FIXME:
@c FIXME: När alla Person:er har hanterats som i SYNC ovan är det dags för det
@c FIXME: tredje steget. Då går man igenom alla Cache_node:er och gör följande:
@c FIXME:
@c FIXME: pos = pos_b;
@c FIXME: file_b = FALSE;
@c FIXME: free(snap_shot);
@c FIXME: snap_shot = NULL;
@c FIXME:
@c FIXME: Fil B som man förut hade öppen för skrivning öppnar man i stället för
@c FIXME: läsning som fil A.
@c FIXME:
@c FIXME:
@c FIXME:
@c FIXME:
@c FIXME: ANMÄRKNINGAR
@c FIXME:
@c FIXME: Innehållet i snap_shot är alltid "smutsigt" jämfört med innehållet i
@c FIXME: fil A. Det som snap_shot pekar på finns aldrig med i lru-kedjan.
@c FIXME:
@node Adding Configuration Parameters
@section Adding Configuration Parameters
Make sure that you really understand what you want to configure. Think
it over again. Find a good, descriptive name for it.
Decide what values the parameter can be set to. Integers? Booleans?
Document the parameter in @file{lyskomd.texi}.
Add a field to @code{struct kom_par} in @file{param.h}.
Add it to @code{parameters[]} in @file{server-config.c}. See
@file{conf-file.h} and maybe @file{conf-file.c} for information on this
structure.
Make sure that the parameter is used instead of any previous hard-coded
value. Make sure that @code{dbck} can cope with it.
@node Adding Asynchronous Messages
@section Adding Asynchronous Messages
@table @asis
@item @file{async.h}
Add the message in @code{enum async @{ @}}. Make sure that
@code{ay_dummy_last} is one more than any other message. If the message
is to be sent by default, which is @emph{not} recommended, place its number
into @code{ASYNC_DEFAULT_MESSAGES}.
@item @file{prot-a-send-async.c}
@itemx @file{prot-a-send-async.h}
Write a function that sends the message. This function is responsible
for writing the message to a particular connection and for ensuring that
the message is not sent to clients who do not want it. Make sure that
the second argument to @code{async_header} really is the number of
elements being sent. Arrays count as two elements: the item count and
the elements.
@item @file{send-async.c}
@itemx @file{send-async.h}
Write a function that sends the message to appropriate clients. This
function is responsible for checking that async messages should be sent
at all, for each client check if it allowed to see the message and
ensure that the protocol specified by the connection is appropriate. The
send function should either take a @code{struct connection *} as an
argument and send the message to that connection, or loop over all
connections. Most send functions take a connection pointer; the looping
is dealt with elsewhere.
@item @file{session.c}
Add a case label for the @code{enum} in the large @code{switch}
statement.
@item Make sure that the message is sent in appropriate places.
@item @file{testsuite/lyskomd.0/03.exp}
A few tests will fail. Fix them.
@item Document the message type in @file{Protocol-A.texi}.
@item Write test cases for the new async message.
@end table
@menu
* Function Templates for prot-a-send-async.c::
* Function Templates for send-async.c::
@end menu
@node Function Templates for prot-a-send-async.c
@subsection Function Templates for prot-a-send-async.c
This is what a typical function in @file{prot-a-send-async.c} should
look like. This function is responsible for checking that the client is
accepting the message and writing the message itself to the connection.
@example
void
prot_a_async_@var{something}(Connection *cptr,
@var{parameters})
@{
ASYNC_CHECK_ACCEPT(cptr, ay_@var{something});
async_header(cptr, @var{num_tokens}, ay_@var{something});
/* Output the body of the message */
async_trailer(cptr);
@}
@end example
@node Function Templates for send-async.c
@subsection Function Templates for send-async.h
This is what a typical function in @file{send-async.c} should look like.
This function is responsible for sending the message to all connections
that are appropriate, not sending it if the server is not supposed to
send messages at all, and for checking that the protocol specified by
the client is one the server knows.
@example
void async_@var{something}( @var{parameters} )
@{
Connection *cptr;
Session_no i = 0;
if (!param.send_async_messages)
return;
while ((i = traverse_connections(i)) != 0)
@{
cptr = get_conn_by_number(i);
switch(cptr->protocol)
@{
case 0:
/* No protocol specified yet */
break;
case 'A':
/* Check that connection is logged on. We might
want to check other things here too, such as
if the connection is allowed to see the message */
if (handshake_ok(cptr, 0))
prot_a_async_@var{something}(cptr, @var{parameters});
break;
default:
restart_kom("async_@var{something}(): bad protocol.\n");
break;
@}
@}
@}
@end example
Template for a function that sends to a single connection:
@example
void async_@var{something}(struct connection *cptr,
@var{parameters})
@{
if (!param.send_async_messages)
return;
switch(cptr->protocol)
@{
case 0:
/* No protocol specified yet */
break;
case 'A':
/* Check that connection is logged on. We might
want to check other things here too, such as
if the connection is allowed to see the message */
if (handshake_ok(cptr))
prot_a_async_@var{something}(cptr, @var{parameters});
break;
default:
restart_kom("async_@var{something}(): bad protocol.\n");
break;
@}
@}
@end example
@node Adding a New Protocol Request
@section Adding a New Protocol Request
Before doing anything, think again. Make sure that the protocol request
is needed, is in line with the rest of the protocol, behaves the way
people want it to, and that everyone involved agrees that it is a good
idea.
@enumerate
@item Document the request in @file{Protocol-A.texi}
@item Declare the function in @file{include/services.h}
@item Declare the function @emph{last} in @file{server/fncdef.txt}. It
should be given a call number one higher than the currently existing
highest contiguous call number.
@item If the function takes an input parameter of a new type, changes
need to be made in several places. @xref{Adding New Input Types}.
@item If the function takes too many parameters of type @code{num},
@code{string} or @code{c_string}, the definition of @code{Connection} in
@file{server/connection.h} has to be changed.
@item If the function has an output parameter of a new type, changes
need to be made in several plaves. @xref{Adding New Result Types}.
@item Write the function in a suitable place in the server directory.
@item Write tests for the new function in
@file{server/testsuite/lyskomd.0}. Write one file for testing the
functionality. Write tests in @file{01.exp} (behavior when the client is
not logged on) and @file{03.exp} (normal behavior.)
@item Run the testsuite to make sure nothing old has been broken.
@end enumerate
Every request handler should call the @code{CHK_CONNECTION} macro before
doing anything else. This ensures that the @code{active_connection}
variable is non-NULL. The only time when this might not be the case is
if the request handler is not called in response to a client request.
This should never happen, but might if someone gets careless.
If your function should not be available before the user is logged in,
call the CHK_LOGIN macro after doing @code{CHK_CONNECTION}.
Take care returning errors to the client. Previous versions of
@samp{lyskomd} leaked secret information through error returns. For
example, the following code leaks information:
@example
Success service(Conf_no conf_no, Text_no text_no)
@{
Conference *conf_stat;
Text_stat *text_stat;
CHK_CONNECTION(FAILURE);
CHK_LOGIN(FAILURE);
GET_C_STAT(conf_stat, conf_no, FAILURE);
GET_T_STAT(text_stat, text_no, FAILURE);
if (!has_access(conf_no, active_connection, read_protected))
@{
err_stat = conf_no;
kom_errno = KOM_UNDEF_CONF;
return FAILURE;
@}
if (!text_read_access(active_connection, text_no, text_stat))
@{
err_stat = text_no;
kom_errno = KOM_NO_SUCH_TEXT;
return FAILURE;
@}
/* Permissions checked. Do the deed. */
return OK;
@}
@end example
This request can be used to gain precise information on which
conferences and texts exist in the system. If an unprivileged user makes
a request for any conference and readable text, and the user receives a
@samp{KOM_NO_SUCH_TEXT} error, the user can deduce that the conference
exists, but is secret. If the user makes a request for a conference
known to be secret and a text known not to be readable (either secret or
deleted), and the user receives a @samp{KOM_UNDEF_CONF} error, the user
can deduce that the text does exist.
To avoid traps like these, do permission checks for objects immediately
after attempting to get them from the database.
See also:
@itemize @bullet
@item @ref{Adding New Input Types}
@item @ref{Adding New Result Types}
@item @ref{Modifying Output Types}
@end itemize
@node Adding New Input Types
@section Adding New Input Types
Changes need to be made in the following files:
@table @file
@item Protocol-A.texi
Document the new type.
@item server/call-switch.awk
The new type has to be added to the cascaded ifs that translate the type
name to code that points to the appropriate field in a
@code{Connection} structure.
@item server/prot-a-parse-arg-c.awk
The new type has to be added to the cascaded ifs that create the
argument list parser.
@item server/connections.h
The definition of @code{Connection} must be extended with a field where
the parse value can be stored. Don't even think about trying to reuse an
existing field. It's more trouble than it's worth.
@item server/connection.c
Free the contents of the field in @code{free_parsed}.
@item server/prot-a.c
Free the contents of the field in @code{prot_a_destruct}.
@item server/internal-connections.c
Initialize the contents of the field in @code{init_connection}.
@item server/testsuite/lyskomd.0/29.exp
Add test cases for disconnecting in the middle of the data type. This
is important both for singletons and lists.
@end table
@node Adding New Result Types
@section Adding New Result Types
Changes need to be made in the following files:
@table @file
@item Protocol-A.texi
Document the new type.
@item server/prot-a.c
Add a line in the @code{prot_a_reply} switch that calls the correct
output function.
@item server/connections.h
Add the type in @code{enum res_type} and @code{union result_holder}.
@item server/prot-a-output.c
@itemx server/prot-a-output.h
Write a function that outputs the new type
to a connection. Use the existing functions as templates.
@end table
@node Modifying Output Types
@section Modifying Output Types
When you modify an existing type you have to rename the old version of
the type since it will still be used in existing calls. The convention
has previously been to rename @var{Something} to
@var{Something}@samp{_old}, but the preferred method is to append an
underscore and the protocol version in which the current version of the
type was introduced. For example, if the type @samp{Gazonk} was
introduced in protocol version 11, and a new version is to be introduced
in protocol version 15, the current @samp{Gazonk} structure is renamed
to @samp{Gazonk_11}.
This is to avoid names like @samp{Something_older},
@samp{Something_oldest} and @samp{Something_Truly_Ancient}.
Changes need to be made to the following files:
@table @file
@item Protocol-A.texi
Document the new type in the appropriate section. Rename the existing
type in the type documentation and in all calls that return it. Be
thorough!
@item fncdef.txt
Rewrite all calls that use the modified type so they use the old version
of the type.
@item prot-a.c
Modify the current line in @code{prot_a_reply} for the existing version
of the type, and add a new line for the new version of the type.
@item connections.h
Modify the existing entry in @code{enum res_type} and @code{union
result_holder}, if necessary. This should only be necessary if the
server uses both a new and old type internally, which is not
recommended. Add new entries for the new version of the type.
@item prot-a-output.h
@itemx prot-a-output.c
Rename the existing output routing according to the new name of the
type. Write a new output routine for the new version of the type.
@item memory.c
If there are functions for the type in @code{memory.c}, make sure that
your new type is initialized, cleared and copied in an appropriate
manner.
@end table
If the type you modify is stored in the database, make sure it gets
saved properly. @xref{Modifying Stored Types}.
@node Adding Aux-Item Types
@section Adding Aux-Item Types
@enumerate
@item Document the new type in Protocol-A.texi
@item Write a definition of the new type in
@file{run-support/aux-items.conf}.
@item Some tests in at least
@file{server/testsuite/lyskomd.0/01.exp},
@file{server/testsuite/lyskomd.0/03.exp} and
@file{server/testsuite/lyskomd.0/18.exp} will fail when new predefined
aux-items are added. Fix the tests.
@item Write test cases for the new aux-item. If the aux item can be
set on a letterbox, do so in @file{server/testsuite/lyskomd.0/03.exp}
where the comment containing @samp{AUXITEM} says to do so. More
complex aux-items should have more tests written for them.
@file{server/testsuite/lyskomd.0/20.exp} might provide some
inspiration.
@item If the new type requires add, delete or undelete triggers that do
not already exist, declare the trigger functions in @file{aux-items.c}
and add them to the @code{aux_item_triggers} array in the same file.
@item If the new type is so complex that is cannot be fully defined in
@file{aux-items.conf}, then add it to the @code{compiled_aux_items}
array in @file{aux-items.c}. Note that this functionality has not been
tested until someone actually adds one of these beasts, so watch your
step.
@end enumerate
@node Modifying Stored Types
@section Modifying Stored Types
If you want to modify an existing type that is stored in the database,
think again. Can the job be done with aux-items instead? Is it really
necessary?
Be very, very careful when doing this. You have to make sure that the
type as sent in old calls and async messages is not changed in any way.
You have to make sure that the type can be stored to and read from the
database.
@enumerate
@item Document the changes in Protocol-A.texi if the change is visible
in the protocol.
@item Bump the database version number by one for the next release of
the server.
@item Write a function in @file{ram-output.c} to output the new format.
Update all old functions in @file{ram-output.c} that are database
version dependent so that they can deal with the new database format.
@item Write a function in @file{ram-parse.c} to read the new format.
Update all old functions in @file{ram-parse.c} that are database version
dependent so that they can deal with the new database format.
@item Set the default database format in @file{ram-parse.c} and
@file{ram-output.c}. The variables to change are @code{input_format} and
@file{output_format}, respectively.
@item Don't forget to update the functions in @file{memory.c}
@end enumerate
@menu
* Template for ram-output.c::
* Template for ram-parse.c::
@end menu
@node Template for ram-output.c
@subsection Template for ram-output.c
For types that can be output in several different formats, use the
following templates for them. You have to be able to output in all
formats, or @code{dbck} will be unable to convert between formats.
@example
static void
foutput_@var{something}_0(FILE *fp, @var{something} *o)
@{
/* Output version 0 of @var{something} */
@}
static void
foutput_@var{something}_1(FILE *fp, @var{something} *o)
@{
/* Output version 1 of @var{something} */
@}
static void
foutput_@var{something}_2(FILE *fp, @var{something} *o)
@{
/* Output version 2 of @var{something} */
@}
void foutput_@var{something}(FILE *fp, @var{something} *o)
@{
switch(output_format)
@{
case 0:
foutput_@var{something}_0(fp, info);
break;
case 1:
foutput_@var{something}_1(fp, info);
break;
case 2:
foutput_@var{something}_2(fp, info);
break;
default:
restart_kom("unknown database format: %d", output_format);
break;
@}
@}
@end example
Note that if two versions are the same, only write one function. For
example, if version 0 and version 1 are the same, only write an
@code{foutput_@var{something}_0} function and call it from both case 0
and case 1.
@node Template for ram-parse.c
@subsection Template for ram-parse.c
@example
static Success
fparse_@var{something}_0(FILE *fp, @var{something} *o)
@{
/* Parse version 0 */
return OK;
@}
static Success
fparse_@var{something}_1(FILE *fp, @var{something} *o)
@{
/* Parse verson 1 */
return OK;
@}
static Success
fparse_@var{something}_2(FILE *fp, @var{something} *o)
@{
/* Parse verson 2 */
return OK;
@}
extern Success
fparse_@var{something}(FILE *fp, @var{something} *o)
@{
if ( fparse_long_errors != 0 )
@{
log("fparse_@var{something}(): fparse_long_errors == %d on entry."
" Reset.\n",
fparse_long_errors);
fparse_long_errors = 0;
@}
switch (input_format)
@{
case 0:
return fparse_@var{something}_0(fp, o);
break;
case 1:
return fparse_@var{something}_1(fp, o);
break;
case 2:
return fparse_@var{something}_2(fp, o);
break;
default:
restart_kom("unknown input format: %d\n", input_format);
return FAILURE;
break;
@}
@}
@end example
Note that if two versions are the same, only write one function. For
example, if version 0 and version 1 are the same, only write an
@code{fparse_@var{something}_0} function and call it from both case 0
and case 1.
@node Notes
@section Hacking Notes
@menu
* Parsing Bit Fields:: How to parse bit fields properly.
* Membership Notes:: How members and memberships are handled.
* Linking Pairs of Aux Items:: How to link pairs of aux items.
* Notes for fncdef.txt:: Format of the fncdef.txt file.
* Traversing Connections:: How to traverse connections in lyskomd.
@end menu
@node Parsing Bit Fields
@subsection Parsing Bit Fields
The parser for a bit field parameter type should be very tolerant of the
length of the token. Anything from a single bit and up should be
permitted. The parser should use default values for bits that are not
provided and ignore extra bits.
Here is a model function:
@example
void
prot_a_parse_bitfield(Connection *client,
Bitfield *res)
@{
String token;
String_size len;
token = prot_a_get_token(client);
len = s_strlen(token);
if (len <= 0)
longjmp(parse_env, ISC_PROTOCOL_ERR);
init_bitfield(res);
switch (len = s_strlen(token))
@{
default:
case 8: res->bit_8 = token.string[7];
case 7: res->bit_7 = token.string[6];
case 6: res->bit_6 = token.string[5];
case 5: res->bit_5 = token.string[4];
case 4: res->bit_4 = token.string[3];
case 3: res->bit_3 = token.string[2];
case 2: res->bit_2 = token.string[1];
case 1: res->bit_1 = token.string[0];
@}
@}
@end example
The function gets the token, checks the sanity of the length, then
initialized the result to its default values. Then it does a switch on
all token lengths that are equal to or smaller than the number of bits
the server knows about. The fall-through ensures that all bits in the
token are read.
@node Membership Notes
@subsection Membership Notes
The @code{position} field in the membership is @emph{not} stored. It has
to be set every time a membership is requested for transmission to the
client.
@node Linking Pairs of Aux Items
@subsection Linking Pairs of Aux Items
Sometimes two aux items need to work in tandem. The first instance of
this was the FAQ and FAQ-for-conference items. The FAQ item contains the
text number of a text that is a FAQ for a conference. The
FAQ-for-conference item contains the conference for which a text is a
FAQ. This is needed so that deletion of the text properly removes the
aux-item on the conf (plus, it's nice to be able to see that a text is a
FAQ.)
The @code{linked_item} field in the Aux_item structure is for linking
items. The linking must be managed through the use of triggers. This
field is not visible in the protocol. It is saved in the database. It is
not possible to have more than one link per item.
Please remember the following points.
@itemize @bullet
@item The target of a link should have a link back. All links need to go
both ways.
@item In the add trigger for one end, create the other end of the link
and set the @code{linked_item} field in both items. Don't forget to mark
the objects at both ends as changed.
@item Deletion and undeletion of the other side of the link will be
managed automatically. You don't need delete and undelete triggers
simply to destroy the other side of a link.
@item Don't kill the server because one end is missing. It is possible
for the administrator to remove an item manually. Log a message and
continue working.
@end itemize
@node Notes for fncdef.txt
@subsection Notes for fncdef.txt
The fncdef.txt file is used to define the RPC functions. Each line
consists of the call number, the return type of the call, the parameters
and the output types of the call.
Some examples:
@example
10 number create_conf_old c_string (param.conf_name_len) conf_type
12 success lookup_name c_string (param.conf_name_len) : conf_list
@end example
The first line defines a call named @code{create_conf_old} that takes
two arguments, a string that can only be as long as
@code{param.conf_name_len} and a @code{conf_type}. It returns a number
to the client. If the service call returns -1, the server will return an
error. The @code{create_conf_old} call has RPC number 10.
The second line defines a call named @code{lookup_name} that takes a
string argument that can be no longer than @code{param.conf_name_len},
and returns a @code{conf_list}. The service call returns a
@code{Success}. If it does not return @code{OK}, the server will return
an error. The @code{lookup_name} call has RPC number 12.
@subsubsection Scripts That Use fncdef.txt
The following scripts operate on @file{fncdef.txt}. If you make
modifications to the format of @file{fncdef.txt}, you have to update
these scripts.
@table @file
@item call-switch.awk
Generates @file{call-switch.incl}, which is included by
@file{connections.c}
@item com-h.awk
Generates @file{com.h}, which is included by several files.
@item fnc-def-init.awk
Generates @file{fnc-def-init.incl}, which is included by
@file{connections.c}.
@item prot-a-is-legal-fnc.awk
Generates @file{prot-a-is-legal-fnc.incl}, which is included by
@file{prot-a.c}
@item prot-a-parse-arg-c.awk
@itemx prot-a-parse-arg-h.awk
Generates @file{prot-a-parse-arg.c} and @file{prot-a-parse-arg.h}.
@end table
@node Traversing Connections
@subsection Traversing Connections
Since session 0 is interpreted as the currently active session by
get_conn_by_number it is important to be careful when traversing
sessions. Code like this does not work since it will do one iteration
through the loop with @code{sess} set to zero. This formerly caused
@code{get_conn_by_number} to return @code{NULL}, but now causes it to
return the session pointer for the current session.
@example
for (sess = 0; (sess = traverse_connections(sess)) != 0; )
@{
cptr = get_conn_by_number(sess);
...
@}
@end example
The canonical traversal code looks like this:
@example
Session_no session = 0;
while ((session = traverse_connections(session)) != 0)
@{
cptr = get_conn_by_number(session);
if (handshake_ok(cptr, 0)) /* can sometimes be skipped */
@{
...
@}
@}
@end example
This code has @code{session} set to a session number before ever
entering the loop.
@node Debugging and Testing
@section Debugging and Testing
We're slowly adding support for debugging and testing lyskomd properly.
@menu
* The Test Suite:: The lyskomd regression test suite.
* Configuration Options:: Debugging options for the configure script.
* Coverage Testing:: How to do coverage testing with gcov.
* Debug Calls:: Special protocol A calls for testing.
@end menu
@node The Test Suite
@subsection The Test Suite
The lyskomd test suite is in src/server/testsuite. Please extend this
with additional test cases every time you make modifications to the
server. Run the test suite often to make sure that your changes did not
break anything.
The file config/prot-a.exp contains some support for protocol A. Don't
use these functions in test cases. Use them to set up the inital
database and for things that have to be done, such as logins and enabling
privileges, but that don't need to be tested. Also, don't count on all
the code in prot-a.exp to be fully functional. Add new functions to this
file as you see fit.
The basic structure of a test case is the following:
@example
source "config/prot-a.exp"
read_versions
lyskomd_start
client_start 0
talk_to client 0
kom_connect "DejaGnu test suite"
@i{The test cases}
talk_to client 0
kom_logout
kom_login 5 [holl "gazonk"] 0
kom_enable 255
send "9999 44 0\n"
simple_expect "=9999"
client_death 0
lyskomd_death
@end example
Use the existing test cases as templates.
@node Configuration Options
@subsection Configuration Options
There are several testing and debugging-related configuration options
for lyskomd. Some of them also apply to libisc.
@table @samp
@item --with-purify
Build lyskomd with Purify. This currently does not work.
@item --with-efence
Build lyskomd with Electric Fence for checking buffer overruns. This
option does work.
@item --with-checker
Build lyskomd with Gnu Checker for checking memory accesses, leaks, file
descriptors and all kinds of stuff. As of Checker version 0.99.6, Gnu
Checker cannot deal with lyskomd. Once built, and this requires
modifications to Checker (at least on Linux) it reports spurious errors.
Still, the option is here for those who want to try it out.
@item --with-gcov
Build lyskomd with instrumentation for @code{gcov}. You have to use this
option if you want to run @code{gcov} on lyskomd. For @code{gcov} to be
effective, you should turn off optimization as well.
@item --with-traced-allocations
There is some builtin support for detecting memory leaks in lyskomd.
Whenever the server exits normally it reports how much memory it still
uses to @file{etc/memory-usage}. The count should always be 0.
If there is a leak you can use this option to trace it down. See
@file{src/server/ram-smalloc.c} for more information. You need gdb and
a lot of time to use this option.
@item --with-optimization=@var{value}
Build lyskomd with the specified level of optimization. Use either
numeric values to select the level of optimization, or say
@samp{--with-optimization=no} or @samp{--without-optimization} to turn
optimization off.
@end table
@node Coverage Testing
@subsection Coverage Testing
When you write new code, make sure that it is completely covered by the
test suite. Run the lyskomd configure script with the
@samp{--with-gcov}, @samp{--with-debug-calls} and
@samp{--without-optimization} flags to instrument the server for
coverage testing with gcov.
If you run configure without the @samp{--without-optimization} option,
the server will be compiled with optimizations on. This is fine, but the
coverage data from gcov isn't completely reliable since parts of the
program may have been optimized out of existance.
Recompile everything, then run the test suite. Next do @samp{gcov -f
@var{filename}} to compute coverage information for the file @var{filename}.
The resulting file @var{filename}@samp{.gcov} shows which lines have been
executed, and which haven't been run. Try to get 100% coverage.
@node Debug Calls
@subsection Debug Calls
Run the configure script with @samp{--with-debug-calls} to compile in
support for debugging calls in the server. These calls are strictly for
making testing easier (or possible.) They are not official, and they may
change at any time.
@menu
* memory-info:: Get information from malloc (1000)
* set-marks:: Set the number of marks on a text (1001)
* backdate-text:: Change the creation date of a text (1002)
@end menu
@node memory-info
@subsubsection memory-info (DEBUG) Experimential
@findex memory-info
@example
memory-info [1000] ( )
-> (( arena : INT32;
ordblks : INT32;
smblks : INT32;
hblks : INT32;
hblkhd : INT32;
usmblks : INT32;
fsmblks : INT32;
uordblks : INT32;
fordblks : INT32;
keepcost : INT32; ));
@end example
This call returns the data returned by @code{mallinfo} in the server.
See the man page for @code{mallinfo} for explanations of the fields.
@node set-marks
@subsubsection set-marks (DEBUG) Experimental
@findex set-marks
@example
set-marks [1001] (( text-no : Text_no;
no-of-marks : INT32; ))
-> ( );
@end example
Set the number of marks on text @code{text-no} to @code{no-of-marks},
regardless of how many marks it really has. This call is useful for
forcing the database into a state where the number of marks is incorrect
in some way.
@node backdate-text
@subsubsection backdate-text (DEBUG) Experimental
@findex backdate-text
@example
backdate-text [1002] (( text-no : Text_no;
seconds : INT32; ))
-> ( );
@end example
Backdate a text in the server. Change the creation date of text
@code{text-no} so it appears to have been created @code{seconds} earlier
than it was actually created. This can be used to test the garbage
collector.
@node local-to-global
@section The local-to-global structure
The data structure that stores the mapping from local to global text
numbers is currently one of the more advanced structures used by
lyskomd.
@ignore
@c FIXME: Translate this
@subsection Background
The
Det sätt som textnummer läggs till har ett antal egenskaper:
- Texter läggs hela tiden på bakifrån, aldrig i mitten eller i
början.
- Numren på de lokala textnumren är konsekutiva, dvs inga hål
finns. Sådana hål kan dock uppstå (och uppstår!) när texter tas
bort.
Lösning
=======
Det första man ser när man analyserar innehållet i en mapp, är att det
finns långa avsnitt av idel nollor, och långa avsnitt där det inte
finns några nollor alls, eller åtminstone väldigt få. Detta antyder
alltså att man bör ha en adaptiv datastruktur som anpassar sig till
det lokala förhållanden. Vi föreslår alltså följande.
Mappen lagras i block (små arrayer). Det finns två sorters block:
1. Glesa block. Glesa block består egentligen av två block. I det
ena blocket ligger nycklar (Local_text_no) och i det andra blocket
ligger data (Text_no). Inom ett block använder man binärsökning i det
ena blocket för att hitta just den Local_text_no man är ute efter.
2. Täta block. Täta block består av ett enda block som innehåller
data (Text_no). Man vet vilket lokalt textnummer det första entryt
svarar mot. Det kan finnas enstaka lokala nummer i ett tätt block som
inte finns -- då innehåller data 0.
Blockstorleken är fixerad till t ex 100 entries. (Det verkar som om
man tjänar nästan exakt samma antal bytes oavsett om man väljer
blockstorlek 50 eller 1000). Ett fullt tätt block innehåller alltid
exakt 100 lokala textnummer. Ett fullt glest block innehåller alltid
100 existerande globala textnummer. (Ett glest block tar dubbelt så
mycket plats som ett tätt block, eftersom ett glest block ju
egentligen består av både ett nyckelblock och ett värdeblock).
För att hålla reda på sina block har man en array av block_info:
typedef struct block_info {
int first_free;
int zeroes;
Local_text_no start;
Local_text_no * key_block;
Text_no * value_block;
} L2g_block_info;
Om key_block == NULL så är det ett tätt block.
first_free
Fältet first_free visar var i blocket som man kan fylla på med
fler värden. Det är 100 för fulla block. För block som inte är
fulla pekar det ut det entry i value_block som nästa värde ska
hamna i. Det gäller t ex det sista blocket, som fylls på allt
eftersom nya inlägg skickas till mötet eller block där texter har
tagits bort.
zeroes
Fältet zeroes används bara för täta block, och räknar antalet
nollor i blocket. Om zeroes blir större än 50% av blockstorleken
gör man om blocket till ett glest block. Fältet zeroes är en
optimering som troligtvis underlättar ihopslagning av block. Det
är möjligt att den inte behövs.
start
Fältet start innehåller numret på det första lokala textnumret i
blocket.
key_block
Fältet key_block är en pekare till blocket med Local_text_no, dvs
nycklarna i blocket. Detta fält är NULL om detta är ett tätt
block.
value_block
Fältet value_block är en pekare till blocket med Text_no, dvs
värdena i blocket.
Förutom detta behövs en struct per möte som håller reda på arrayen med
block:
typedef struct local_to_global {
int num_blocks;
int block_size;
L2g_block_info * blocks;
} Local_to_global;
@end ignore
@c ======================================================================
@c ======================================================================
@c == ==
@c == LYSKOMD DATABASE FORMAT ==
@c == ==
@c ======================================================================
@c ======================================================================
@ifinfo
@node lyskomd Database Specification
@chapter lyskomd Database Specification
This document specifies the format of the lyskomd database files. The
specification is currently incomplete. Only the structure, not the
actual data records are documented.
@menu
* Version 0:: Database used with early versions of lyskomd.
* Version 1:: Database used with lyskomd 1.9.0.
* Version 2:: Database used with lyskomd 2.0.0.
@end menu
@end ifinfo
@node Version 0
@section Data File Version 0
Version 0 was used by lyskomd versions up to 1.8.
@example
database : header @II{NL}
next-free-num @II{NL}
confs
persons
next-text-num @II{NL}
texts
;
header : @BB{CLEAN}
| @BB{DIRTY}
;
next-free-num : @II{INTEGER}
;
confs : confs conf
| @II{empty}
;
conf : empty-record
| @BB{+} conf-record @II{NL}
;
persons : persons person
| @II{empty}
;
person : empty-record
| @BB{+} person-record @II{NL}
;
next-text-num : @II{INTEGER}
;
texts : texts text
| @II{empty}
;
text : empty-record
| @BB{+} text-record @BB{NL}
;
empty-record : @BB{@@} @BB{NL}
;
@end example
The number of person and conference records is exactly one less than
@II{next-free-num}. The number of text records is exactly one less than
@II{next-text-num}.
Records are stored sequentially. Conference number 18 is the 18th
conference record in the file. This implies that deleted records must be
stored as @II{empty-record} records.
@II{next-text-num} is the number of the highest text. There are exactly
one less than
this number of text records in the database.
@II{next-free-num} is the number of the highest conference. There are
exactly one less than this number of both person and conference
records. This implies that if conference N is not a letterbox, then
person record N will be an @II{empty-record}.
If the header says ``CLEAN'', the database file is complete. If the
header says ``DIRTY'', the server has not finished writing it
completely.
@node Version 1
@section Data File Version 1
Version 1 was used by lyskomd version 1.9.
@example
database : header @BB{NL} @BB{records}
;
header : @BB{CLEAN:00001}
| @BB{DIRTY:00001}
;
records : records record
| @II{empty}
;
record : next-free-num
| next-text-num
| conference
| person
| info
| text
| deleted
;
next-free-num : @BB{#C} @II{INTEGER}
;
next-text-num : @BB{#P} @II{INTEGER}
;
conference : @BB{C} @II{integer} conf-record @BB{NL}
| @BB{P} @II{integer} person-record @BB{NL}
| @BB{T} @II{integer} text-record @BB{NL}
| @BB{I} info-record @BB{NL}
;
deleted : @BB{-C} @II{integer} @BB{NL}
| @BB{-P} @II{integer} @BB{NL}
| @BB{-T} @II{integer} @BB{NL}
;
@end example
The integer in the conference, text and person records is the ID of the
record. This implies that records can be in any order.
The @II{next-free-num} record is used to store the next available ID for
conferences in the system. There may be several of these records in the
database.
The @II{next-text-num} record is used to store the next available ID for
texts in the system. There may be several of these records in the
database.
A conference or text must have a number lower than the closest
@II{next-free-num} or @II{next-text-num} preceding it.
The deletion records are used to indicate that an object found earlier
in the database has been deleted. The implementation of these in lyskomd
1.9 does not work, and they are not used. The @II{-C} record indicates
deletion of a conference. The @II{-P} record indicates deletion of a
person. The @II{-T} record indicates deletion of a text. The integer
in the deletion record is the ID of the object being deleted.
@node Version 2
@section Data File Version 2
Version 2 is used by lyskomd version 2.0.
The structure of the data file is similar to version 1. The header has
been extended with a timestamp contaning the time when the database file
was saved. This timestamp consists of twenty characters, the number of
seconds since 00:00:00 GMT January 1, 1970 (a Unix @code{time_t}.)
@example
database : header @BB{NL} @BB{records}
;
header : @BB{CLEAN:00001} @BB{NL} timestamp @BB{NL}
| @BB{DIRTY:00001} @BB{NL} timestamp @BB{NL}
;
timestamp : digit digit digit digit digit
digit digit digit digit digit
digit digit digit digit digit
digit digit digit digit digit
;
;
digit : @BB{0} | @BB{1} | @BB{2} | @BB{3} | @BB{4}
| @BB{5} | @BB{6} | @BB{7} | @BB{8} | @BB{9}
;
@end example
Furthermore several data types have been changed to accommodate
additions introduced in version 10 of protocol A. The @II{server-info},
@II{conf-record} and @II{text-record} include information about
aux-items (highest-aux-no and aux-item-list.) The @II{conf-record}
contains the expire field added to the conf-stat structure. The
@II{conf-record} and @II{person-record} records use the new
local-to-global structure for storing maps.
@contents
@bye
|
https://authorea.com/users/300596/articles/430295/download_latex | authorea.com | CC-MAIN-2021-17 | application/x-tex | application/x-tex | crawl-data/CC-MAIN-2021-17/segments/1618038879305.68/warc/CC-MAIN-20210419080654-20210419110654-00575.warc.gz | 232,821,685 | 2,457 | \documentclass[10pt]{article}
\usepackage{fullpage}
\usepackage{setspace}
\usepackage{parskip}
\usepackage{titlesec}
\usepackage[section]{placeins}
\usepackage{xcolor}
\usepackage{breakcites}
\usepackage{lineno}
\usepackage{hyphenat}
\PassOptionsToPackage{hyphens}{url}
\usepackage[colorlinks = true,
linkcolor = blue,
urlcolor = blue,
citecolor = blue,
anchorcolor = blue]{hyperref}
\usepackage{etoolbox}
\makeatletter
\patchcmd\@combinedblfloats{\box\@outputbox}{\unvbox\@outputbox}{}{%
\errmessage{\noexpand\@combinedblfloats could not be patched}%
}%
\makeatother
\usepackage{natbib}
\renewenvironment{abstract}
{{\bfseries\noindent{\abstractname}\par\nobreak}\footnotesize}
{\bigskip}
\titlespacing{\section}{0pt}{*3}{*1}
\titlespacing{\subsection}{0pt}{*2}{*0.5}
\titlespacing{\subsubsection}{0pt}{*1.5}{0pt}
\usepackage{authblk}
\usepackage{graphicx}
\usepackage[space]{grffile}
\usepackage{latexsym}
\usepackage{textcomp}
\usepackage{longtable}
\usepackage{tabulary}
\usepackage{booktabs,array,multirow}
\usepackage{amsfonts,amsmath,amssymb}
\providecommand\citet{\cite}
\providecommand\citep{\cite}
\providecommand\citealt{\cite}
% You can conditionalize code for latexml or normal latex using this.
\newif\iflatexml\latexmlfalse
\providecommand{\tightlist}{\setlength{\itemsep}{0pt}\setlength{\parskip}{0pt}}%
\AtBeginDocument{\DeclareGraphicsExtensions{.pdf,.PDF,.eps,.EPS,.png,.PNG,.tif,.TIF,.jpg,.JPG,.jpeg,.JPEG}}
\usepackage[utf8]{inputenc}
\usepackage[english]{babel}
\usepackage{CJKutf8}
\usepackage{float}
\begin{document}
\title{The functions of Spirulina powder on the enhanced anaerobic degradation
of quinoline and indole}
\author[1]{Jingxin Shi}%
\author[2]{Chunyan Xu}%
\author[2]{ Hongjun Han}%
\affil[1]{Harbin Institute of Technology}%
\affil[2]{Harbin Institute of Technology State Key Laboratory of Urban Water Resource and Environment}%
\vspace{-1em}
\date{\today}
\begingroup
\let\center\flushleft
\let\endcenter\endflushleft
\maketitle
\endgroup
\selectlanguage{english}
\begin{abstract}
Large amount of algae has been significantly increased due to
eutrophication of water bodies. However, algae is rich in bio-active
compounds, such as vitamins, proteins, polysaccharides, unsaturated
fatty acids, nucleic acids, minerals and pigments. In the study,
spirulina was proved to be an novel and appropriate co-metabolic
substance in enhancing the anaerobic degradation of quinoline and
indole. When the dosage of Spirulina powder was 1.0 mg/L, reactor showed
the highest degradation efficiency, with ratios of 99.77\% and 99.57\%,
respectively. Further, the addition of Spirulina powder led to the
increase of MLSS, MLVSS, proteins, and polysaccharides concentration of
sludge. Finally, the addition of Spirulina powder resulted in the
decrease of Acinetobacter and the enrichment of Aminicenantes,
Levilinea, and Longilinea. The reactor with Spirulina powder had richer
and more diverse archaea community.%
\end{abstract}%
\sloppy
\textbf{Hosted file}
\verb`Manuscript - \begin{CJK}{UTF8}{gbsn}副本.\end{CJK}\selectlanguage{english}doc` available at \url{https://authorea.com/users/300596/articles/430295-the-functions-of-spirulina-powder-on-the-enhanced-anaerobic-degradation-of-quinoline-and-indole}
\textbf{Hosted file}
\verb`Figures.doc` available at \url{https://authorea.com/users/300596/articles/430295-the-functions-of-spirulina-powder-on-the-enhanced-anaerobic-degradation-of-quinoline-and-indole}
\selectlanguage{english}
\FloatBarrier
\end{document}
|
https://is.jabok.cz/zivotopisy/cv?lang=cs;uco=4050;zjazyk=cze;varianta=8;tiskproh=latex_rich | jabok.cz | CC-MAIN-2022-33 | application/x-text | application/x-tex | crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00409.warc.gz | 309,143,242 | 5,596 | \documentclass[12pt,a4paper]{artikel1}
\usepackage{fancyheadings}
\usepackage{palatino}
\usepackage[latin2]{inputenc}
\usepackage[T1]{fontenc}
\newenvironment{ul}{\begin{itemize}}{\end{itemize}}
\newenvironment{ol}{\begin{enumerate}}{\end{enumerate}}
\newenvironment{vitae}[2]{\begingroup\cleardoublepage\thispagestyle{plain}\pagestyle{fancy}#1\def\cvname{#2}}%
{\newpage\endgroup}
\lhead{}
\rhead{\cvname}
\chead{}
\cfoot{}
\lfoot{}
\rfoot{\thepage}
\newcommand\nadpis{\section*}
\newcommand\podnadpis{\subsection*}
\newcommand\suv[1]{\quotesinglbase #1\textquoteright }
\newcommand\duv[1]{\quotedblbase #1\textquotedblright }
\parindent 0pt
\clubpenalty10000 \widowpenalty 10000 \exhyphenpenalty10000
\begin{document}
\begin{vitae}{\czech}{Michal Pařízek
narozen v roce 1979}
\nadpis{Profesní životopis}
\vspace{0.8cm}
\podnadpis{\textbf{Osobní údaje} }
\begin{ul}
\item Michal Pařízek\\
narozen v roce 1979, původem z Dobrušky, nyní z Prahy\\
manžel a otec\\
ORCID ID: 0000--0001--6959--8416
\end{ul}
\podnadpis{\textbf{Současné pracoviště} }
\begin{ul}
\item Jabok -- Vyšší odborná škola sociálně pedagogická a teologická\\
Salmovská 8\\
120 00 Praha 2\\
Katedra pedagogiky a psychologie (vedoucí katedry)\\
\item Vyučované předměty: Zážitková pedagogika, Volnočasová pedagogika, Metody pohybových a herních aktivit, Metody práce s pohybem a tělesností, Kurz plavání, Seznamovací kurz, Lyžařský kurz, vybraná témata v předmětu Sociální pedagogika, The World Around Us -- Understanding the Context, Current Social Issues from the Global Perspective, Zkušenostně reflektivní přístupy v pedagogice\\
\end{ul}
\podnadpis{\textbf{Vzdělání} }
\begin{ul}
\item 2014 -- 2022 \quad Pedagogická fakulta MU v Brně\\
Doktorské kombinované studium Pedagogiky se zaměřením na Sociální pedagogiku\\
Výzkumné téma: Celostní vzdělávání sociálních pedagogů na terciární úrovni\\
https://is.muni.cz/th/sjuv2/Celostni\_vzdelavani\_socialnich\_pedagogu\_na\_terciarni\_urovni\_--\_Michal\_Parizek.pdf \\
\item 2002 \quad ? 2008 Evangelická teologická fakulta UK v Praze -- Institut ekumenických studií\\
Bakalářský obor Teologie křesťanských tradic\\
Bakalářská práce na téma: Tělo a tělesnost u Oliviera Clémenta, Louis--Marie Chauveta a Jürgena Moltmanna\\
https://dspace.cuni.cz/bitstream/handle/20.500.11956/16719/130093957.pdf?sequence=1\&isAllowed=y \\
\item 1999 \quad ? 2005 Fakulta tělesné výchovy a sportu UK v Praze\\
Magisterský obor Učitelství pro SŠ, obor Tělesná výchova ? Anglický jazyk (na PedF UK)\\
Diplomová práce na téma: Sport a prožitek skrze sport ve vztahu ke křesťanství\\
https://knihovna.jabok.cuni.cz/eg/opac/record/12304?locg=102;detail\_record\_view=0;facet=author%7Cpersonal%5BPa%C5%99%C3%ADzek%2C%20Michal%5D;query=author%3AMichal%20Pa%C5%99%C3%ADzek\\
\item 1998 \quad ? 1999 Midkent College, Maidstone, Anglie\\
Studium anglického jazyka zakončené zkouškou Cambridge Proficiency (CPE)\\
\item 1997 \quad ? 1998 Falkirk College, Stirling Centre, Stirling, Skotsko (nyní Forth Valley College)\\
Studium anglického jazyka zakončené zkouškami Cambridge First Certificate (FCE) a Scottish Qualification Authority SQA ? ESOL 3\\
\item 1993 \quad ? 1997 Střední průmyslová škola elektrotechnická v Dobrušce\\
obor Automatizace (Maturita v červnu 1997)\\
\end{ul}
\podnadpis{\textbf{Přednáškové a studijní pobyty} }
\begin{ul}
\item Kratší přenáškové pobyty:
\item 2015, 2017, 2019, 2021 VIVES University of Applied Sciences, Kortrijk, Belgie
\item 2014 \quad Complutense University, Madrid, Španělsko\\
\item 2013 \quad Thomas More University of Applied Sciences, Antverpy, Belgie
\item 2012 \quad Artevelde University of Applied Sciences, Gent, Belgie \\
\\
\item Kratší studijní pobyty:
\item 2018 \quad Studijní cesta do Švýcarska (Lucern, Curych, Biel/Bienne) v rámci projektu \duv{Škola jako místo, kde se vzdělává i žije} -- zaměřeno na práci s mladými lidmi a místními komunitami metodou sociálně kulturní animace\\
\item 2015 \quad Spiritualita -- Zážitková vědecká škola 2015, organizováno FTK UP (projekt VIPPA2)\\
\item 2012 \quad Grangemockler Camphill, Irsko -- Projekt \duv{Metody sociální práce s multiproblémovými rodinami}\\
\item 2011 \quad Sofie, Bulharsko -- \duv{Global Education in non--formal youth work} \\
\item 2011 \quad Benediktbeuern, Německo -- Projekt \duv{Využití zážitkové pedagogiky v sociální práci} \\
\item 2010 \quad Berlín, Německo -- Projekt \duv{Metody sociální práce s mládeží ohroženou sociálním vyloučením}\\
\item 2006 \quad Durham, Anglie -- \duv{Living Theology}\\
\item 2002 \quad Londýn + Oxford, Anglie -- University of Surrey, Roehampton a Oxford University v rámci International Youth Trust of Saint Pierre de Thaon (za KAJL, PedF UK)\\
\item
\end{ul}
\podnadpis{\textbf{Vzdělávání v kurzech a seminářích} }
\begin{ul}
\item 2021 \quad MOOC -- LEARNx: Deep Learning through Transformative Pedagogy (edX -- The University of Queensland -- UQx \& microsoftedu)
\item 2021 \quad Konference místně zakotveného učení (SEVER)\\
\item 2020 \quad MOOC -- Social Pedagogy Across Europe (Coursera -- Universitat Aut?noma de Barcelona)\\
\item 2020 \quad MOOC -- The Science of Well--Being (Coursera -- Yale University)\\
\item 2019 \quad Formativní hodnocení + Formative Assessment (IVOV)\\
\item 2018 \quad Principy nezraňující komunikace ve škole (Varianty)\\
\item 2016 \quad Svět v otázkách: Globální rozvojové vzdělávání prostřednictvím Filosofie pro děti a Velké otázky o světě prostřednictvím Filosofie pro děti 2 (Varianty)\\
\item 2016 \quad Cílená zpětná vazba aneb Jak pracovat se zážitkem ve skupině (Varianty)
\item 2014 \quad Rekvalifikační kurz Metoda zážitkové pedagogiky (Prázdninová škola Lipnice, akreditováno MŠMT)\\
\item 2010 \quad MEKKA -- metodický kurz zážitkové pedagogiky (Prázdninová škola Lipnice)\\
\item
\end{ul}
\podnadpis{\textbf{Publikační a přednášková činnost} }
\begin{ul}
\item 2021 \quad PAŘÍZEK, Michal. Principles of holistic education applied to the Teacher Education Model for the 21st Century in Singapore. Sociální pedagogika / Social Education. 2021, 9(2), 9--22. ISSN 18058825. Dostupné z: doi:10.7441/soced.2021.09.02.01\\
\item 2019 \quad Martin Buber \& Holistic Education in Relation to Wellbeing (SDG 3) -- přednáška a Setting the right goals in everyday routine of a social worker/social pedagogue -- workshop\\
Předneseno k zastřešujícímu tématu Sustainable Development Goals v průběhu International and Intercultural Week na VIVES University of Applied Sciences v Kortrijku, Belgie -- staff mobility, Erasmus+
\item 2019 \quad SoFarEDU -- základní informace o projektu\\
Předneseno na: Malá konference o využití zahrady v terapeutickém kontextu (Jabok)\\
\item 2018 \quad Holistic Approaches towards Physical Movement and Sport Education\\
Předneseno na 7th Czech Philosophy of Sport Conference v Olomouci (FTK UP)\\
\item 2018 \quad Principy celostního vzdělávání v procesu odborné i osobnostní přípravy pedagogů volného času\\
Předneseno na konferenci ČPdS v Opavě -- Profesní rozvoj pedagogických pracovníků a pracovníků ve školství\\
\item 2017 \quad Being a Good Steward (přednáška) a The World, Our Responsibility (návazný workshop, založený na principech zážitkové pedagogiky)\\
Předneseno k zastřešujícímu tématu Human Rights v průběhu International--Intercultural Week na VIVES University College v Kortijku, Belgie
\item 2016 \quad Experience and Holistic Education\\
Předneseno na 5th Czech Philosophy of Sport Conference v Olomouci (FTK UP)
\item 2016 \quad Výkon a--nebo radost z pohybu?\\
Předneseno na 12. konferenci o výchově a volném čase se zaměřením na zájmové činnosti v Českých Budějovicích (organizace: PdF JU, ČPdS, AVPVČ)
\item 2016 \quad Holistic Education -- A Gateway to Full and Responsible Citizenship?\\
Předneseno k zastřešujícímu tématu Migration v průběhu International--Intercultural Week na VIVES University of Applied Sciences v Kortijku, Belgie
\item 2016 \quad Vybrané aspekty celostního vzdělávání ve světě -- Podněty pro vzdělávání a osobnostní růst pedagogů v České republice \\
Předneseno na konferenci ČPdS v Ostravě -- Perspektivy výchovy a vzdělávání v podmínkách současného světa
\item 2015 \quad Možnosti přesahů a setkání s nevyslovitelným na adaptačních kurzech\\
Předneseno na 11. konferenci AVPVČ O výchově a volném čase v Hradci Králové\\
\item 2014 \quad English for Social Services\\
Učebnice anglického jazyka především pro potřeby studentů VOŠ Jabok a ETF UK, ISBN 978--80--904681--2--2\\
člen editorského týmu\\
\item 2013 \quad Význam prožívání vlastního těla při utváření identity mladých lidí\\
Publikováno: Teologie a sociální práce -- dvacet let dialogu (ISBN:978--80--904681--1--5)\\
\item 2010 \quad Tělo jako symbol dneška\\
Publikováno ve sborníku z konference (ISBN: 78--80--7290--428--0) Symbol ve výchově, umění a sportu (na PedF UK)\\
\item 2007 \quad Hodnoty ve sportu (Olympijské, filosofické, křesťanské nebo konzumní?)\\
Publikováno ve sborníku z konference (ISBN 80--7290--272--5) Hodnoty ve výchově, umění a sportu (na PedF UK)\\
\item 2005 \quad Křesťanské denominace a sport\\
Předneseno v rámci mezinárodní konference Mladí evropané ve vědě (na FTVS UK, publikováno ve sborníku z konference ISBN 80--86317--41--2)\\
\item 2005 \quad Křesťanství a prožitek ve sportu\\
Předneseno v rámci mezinárodní konference Prožitek a dobrodružství prožívání (na FTVS UK)\\
\end{ul}
\podnadpis{\textbf{Zapojení v projektech} }
\begin{ul}
\item SoFarTEAM -- Social Work in Farming ? Teaching material about client groups and their involvement in social farming -- ERASMUS+\\
\item Inovace VOV -- tvorba kurzů v Moodle\\
Sociální pedagogika III\\
Metody práce s pohybem a tělesností\\
\item Inovace VOV -- tvorba MOOC\\
Zážitková pedagogika -- po registraci do Moodle Jabok (zdarma) dostupné zde: https://moodle.jabok.cuni.cz/course/view.php?id=183\\
Metody herních a pohybových aktivit -- po registraci do Moodle Jabok (zdarma) dostupné zde: https://moodle.jabok.cuni.cz/course/view.php?id=184\\
\item SoFarEDU -- Social Farming in Higher Education https://sofaredu.eu/\\
Aktivní participace v mezinárodním projektu -- ERASMUS+ grantový program Evropské Unie, grant no. 2017--1--DE01--KA203--003583\\
Společně s E. Hudcovou editor \duv{Pedagogical Guide} -- dostupné zde:https://sofaredu.eu/wp--content/uploads/2020/02/Pedagogical--guide--1.pdf\\
Společně s R. Evans, M. Nobelmann, C. Schneider a S. Wagner \duv{Online Guide} Tips and tricks for teaching social farming online -- dostupné zde: https://sofaredu.eu/wp--content/uploads/2020/08/Tips--and--tricks--for--teaching--social--farming--online.pdf
\item
\end{ul}
\podnadpis{\textbf{Členství v (akademických) organizacích} }
\begin{ul}
\item Asociace vzdělavatelů pedagogů volného času\\
Od 1.1.2016 člen výkonného výboru\\
\item Česká pedagogická společnost\\
člen sekce zaměřené na pedagogiku volného času\\
\item Člen redakční rady časopisu Gymnasion -- https://gymnasion.org/\\
\item
\end{ul}
\podnadpis{\textbf{Licence a další aktivity} }
\begin{ul}
\item Instruktor lyžování\\
\item Instruktor snowboardingu\\
\item Dobrovolník v organizaci Statek Vlčkovice o.p.s. a dříve i Bodaj o.s.
\end{ul}
\vspace{0.5cm} 11. 7. 2022
\vspace{0.5cm} \end{vitae}
\end{document}
|
http://porocila.imfm.si/2005/mat/clani/saksida.tex | imfm.si | CC-MAIN-2023-14 | text/x-tex | application/x-tex | crawl-data/CC-MAIN-2023-14/segments/1679296945183.40/warc/CC-MAIN-20230323194025-20230323224025-00206.warc.gz | 48,510,922 | 1,277 | \clan {Pavle Saksida} % 7.5.
%--------------------------------------------------------
% C. raziskovalni clanki objavljeni v znanstvenih revijah
% in v zbornikih konferenc
%--------------------------------------------------------
\begin{skupina}{C}
\objavljenoRevija
% 1.01: {\bf 1}. SAKSIDA, Pavle. Maxwell-Bloch equations, C Neumann system and
% Kaluza-Klein theory. {\it J. phys. A}, 2005, vol. 38, no. 48, str. 10321-10344.
% http://www.iop.org/EJ/toc/0305-4470/38/48. $[$COBISS.SI-ID 13802073$]$\\
{}
{Maxwell-Bloch equations, C Neumann system and Kaluza-Klein theory}
{J.\ Phys.\ A} {38} {2005} {48} {10321--1034{4}}
\end{skupina}
%--------------------------------------------------------
% I. razno
%--------------------------------------------------------
%\begin{skupina}{I}
%\razno
% {OPIS}
%\end{skupina}
%\begin{skupina}{I}
%POZOR: bibliografije.tex > 2005\mat\clani\saksida.tex 5956/192: Stevilo neopredeljenih zadetkov: 2
%\razno
% Ured: {\bf 2}. {\it Obzornik za matematiko in fiziko}. Saksida, Pavle (podro\v{c}ni urednik 2004-). Ljubljana: Dru\v{s}tvo matematikov, fizikov in astronomov Slovenije, 1951-. ISSN 0473-7466. $[$COBISS.SI-ID 753412$]$\\
%\razno
% Ment: {\bf 3}. KOMLANC, Tanja{\it . Hiperboli\v{c}na ravnina : diplomsko delo}. Ljubljana: $[$T. Komlanc$]$, 2005. 44 f., graf. prikazi. http://www.matknjiz.si/diplome/uni/p/2005/11000-591.pdf. $[$COBISS.SI-ID 13638233$]$\\
%\end{skupina}
|