content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
Take a Closer Look Here are a few questions to consider when analyzing the content of your focus text: Did I integrate the two works of literature well in my critical lens analysis.
A student should follow this roadmap not to get lost during the process of writing: Repeat the full name of the writer and other contributors. How Does It Look. The most important recommendation is to choose the right side.
You should try to write your own interpretation of the quote entirely in your own words. Interpret the quote, which should coincide with the rest of your paper and be a prevalent theme throughout. Look back at your notes from the lens text, and read the focus text again with the lens text in mind.
Critical lens essay What is a critical lens essay.
How is the character portrayed in the book. This is why it is essential to be aware of the dissimilarities between ordinary essays and critical lens essays, which is precisely what we want to teach you in this article.
In making the essay, the student should use at least two different pieces of literature and describe all the literary terms. Review how the two literary works you discussed approve or disprove the quote. In order to make a remarkable expository essay, it is a good idea to use contrast and comparison, examples, demonstrate cause and effect.
Here you should restate your interpretation of the quotes and also the literary terms used in the sources. Begins with the actual quote Next sentence is the interpretation of the quote — what does it mean. Some typical literary elements are: You should check the price, guarantees, refund policies, authors, and check how the customer service works.
Be sure to make what you have said meaningful. It is the conclusion that gives the critical lens essay its cohesion and its definitive flair.
The student must research, analyze, and interpret some book, poem, music, or film in this type of essays. One thing that must be always present in the critical lens essay is that the student should be able to make his or her own viewpoint on the subject, matter or topic, which has been written by him or her in the essay.
During this step, you need to determine the format of your paper. The author uses irony, conflict and setting to show how this quote is true. How to Write a Critical Lens Essay: Repeat the above steps for the second literary source and use the literary terms to support your position similar to the first paragraph.
Concentrate on presenting the lens in the first paragraphs. Take note of strong opinions, assumptions and justifications.
When drafting a critical lens essay, you need to carry out a rigorous investigation of the quote, while taking into consideration the specific context of the publication from which the statement was extracted. State and attribute the quote at the source of your critical lens.
Anne Frank is a great author — let her work be our example!. When it comes to writing a critical lens essay, it's true that you get the chance to view wisdom and literature through a critical lens. The thesis statement is the center point of any essay, so crafting a strong example takes work.
A critical lens essay use two pieces of literature and analyzes their portrayal of a given statement or quote. Aiming to persuade readers to accept his perception of critical lens and its application, a writer constructs his analysis using various examples from the texts.
A critical lens essay is required to have 3 body paragraphs, so each one must include their individual proofs and literary support. As a general breakdown, here is what the structure of a body paragraph looks like: Relevant topic sentence connecting your thesis and literary source.
Introduction More often, students have faced the challenge of effectively coming up with a critical lens essay. It is very common for high school and even How to Write a Critical Lens Essay.
September 29, by admin Basic Essay Writing Tips.
Conclusion. The final part is conclusion which involves asummary of all points discussed. Provide personal interpretation of the chosen critical lens essay quote – it will be the thesis statement! How to Write a Critical Lens Essay Step by Step.
The goal of this type of academic assignment is to research the chosen literary quote. A student must talk about. When dealing with a critical lens essay, you ought to avoid using the first person. The best way to go about it is to use the third person. | https://nijilevopu.izu-onsen-shoheiso.com/how-to-write-a-critical-lens-essay-conclusion-46104ft.html |
Stacy is a seasoned, senior executive with 20 plus years’ experience in law enforcement, public safety and security technology integration. He holds several patents for autonomous robots used in security applications. He is an expert in brand development, marketing, operations, and customer service. Stacy was named Government Technology Magazine’s Top 25 Doers, Dreamers & Drivers for his commitment to advancing law enforcement technology.
The Law Officer's Pocket Manual - Bloomberg BNA
This handy 4" x 6" spiral-bound manual offers examples showing how rules are...
In an emergency meeting yesterday, the members of the Colton Police Officers' Association (CPOA) overwhelmingly approved $1 million in financial concessions to the city "to head off potentially devastating cuts to the Police Department's number of sworn officers, as the city prepares to terminate 16 officers," the CPOA announced.
"Under plans being considered by the city council, 16 Colton police officers would lose their jobs in order to help balance the city's budget," according to Officer Greg Castillo, CPOA president. "This would negatively impact our city's public safety capabilities, which would hurt Colton in the long run. As a part of the Colton community, the CPOA decided to offer these concessions for the well-being of the city, its residents and business owners."
Members of the CPOA agreed to set up a two-tiered retirement system for new hires, forgo furlough hours the city currently owes officers, give back accrued sick and vacation time for each officer, enact early retirements, and waive the right for officers to receive monetary compensation for extra time accrued.
"It is always a difficult decision to give up money and benefits, but this decision was made to help protect Colton's police force and our city's public safety capabilities," according to Officer Rich Randolph, member of the CPOA and one of the 16 officers slated for termination. "The members of the CPOA are proud to serve Colton, and we hope the City Council ultimately decides to allow us to continue serving our community."
On Dec. 7, the Colton City Council will meet and may take up the budget issue as well as the fates of the police officers whose jobs are slated for elimination. | http://www.policemag.com/channel/patrol/news/2010/12/04/california-police-union-offers-concessions-to-city.aspx |
Direct molecular diagnosis of multiple endocrine neoplasia type 1.
Multiple endocrine neoplasia type 1 (MEN1) is an autosomal dominant syndrome characterized by the predisposition to develop both peptic ulcer disease and a wide variety of endocrine tumors usually in adolescence and adulthood. Specifically, hyperplasia and/or tumors (most often adenomas) of the parathyroid, pancreatic islet cells, anterior pituitary, and adrenal cortical glands are classically described in affected individuals who have MEN1 (1,2). MEN1 is a highly penetrant disorder whose onset is generally during adult life with the occurrence of at least one, but most often more than one, of the aforementioned tumors. The age-related penetrance of this disorder based on analysis in 63 unrelated kindreds is 7, 52, 87, 98, 99, and 100% by 10, 20, 30, 40, 50, and 60 yr, respectively (3). The disorder is estimated to occur in approx 1 in 30,000 to 1 in 50,000 individuals. Most cases are associated with a positive family history of the disorder, but new germline mutations have been identified in a small percentage of individuals having a negative family history of the disorder but classic features of MEN1 (3-7).
| |
UNC alumni give graduating seniors advice
The spring semester is coming to an end, for University of Northern Colorado students, no matter which situation they’re may be experiencing, the path can be hard to navigate. To gain some perspective on what to do and what not to do, The Mirror interviewed UNC alumni for their opinions on these transitions after looking back at their college experiences.
For students who are still in the process of earning their degrees, several alumni stressed the importance of branching out and making connections. According to the alumni, pursuing fraternities, sororities or other clubs on campus is not only a great way to network and prepare yourself for a future career, but it is also the perfect way to make lasting friendships and connections.
Kurt Hinkle, from the class of 1998, recalled fond memories from hanging out with friends he made on campus at local college hotspots like Roma’s, Bear’s Country Saloon and Fleetwood Grill, which is now known as Zoe’s Café.
Not only can the connections made in college turn into life-long friendships, but they can also provide the perfect opportunity for students to determine their future goals or career paths. UNC is comprised of a diverse student body and plenty of clubs and activities to appeal to each of the different types of students on campus, including the school newspaper.
“The Mirror was where my existing desire to work in journalism grew into a full-fledged passion,” said Heather Montgomery, from the class of 2005. “The Mirror was more than where I spent most of my time each week, it was my identity for four years and influenced my professional and personal life ever since graduation.”
Advertisement
Montgomery also said her involvement at The Mirror lead her to internships at the Denver Post and the Loveland Reporter-Herald while she was attending UNC.
Students who are returning to campus after this semester and are looking for ways to explore their interests can visit the UNC Office of Student Organizations website or contact their department advisor for a list of possible organizations to join on campus.
The alumni also shared opinions for students who are graduating after this spring semester. According to Hinkle, after his graduation in the spring of 1998, he stuck around Greeley to work on a book titled “Northern Light: The Complete History of the University of Northern Colorado Football Program,” before getting a job in the fall. Hinkle explained how he wasn’t stressed during his period of unemployment after graduation and actually took the time to pursue a project he enjoyed working on and spend time enjoying the summer with friends.
“We put in a lot of time in the early part of that summer and we went to a couple Rockies games and mostly just hung out in Greeley,” Hinkle said. “I really miss those days.” | |
My clinical work is in general internal medicine, and I currently practice at the University of Calgary, Canada. My proposed research agenda is to answer the following inter-related questions: (1) Are proven and evidence-based interventions applied appropriately to patients? (2) What are the major threats to healthcare delivery? (3) How can information technology be used to optimize evidence-based medical practice? To answer my questions, I will be evaluating computerized physician order entry (CPOE) systems with clinical decision support (CDS). These are powerful tools that have tremendous potential to improve decision-making, and to facilitate "best practice." I hope to understand how health information technology can be leveraged to optimize physician ordering behavior and the adoption of proven and effective medical therapies. | http://informaticstraining.hms.harvard.edu/people/alexander-leung |
MEDLINE is the National Library of Medicine's premier bibliographic database covering the fields of medicine, nursing, dentistry, veterinary medicine, the health care system, and the preclinical sciences. Search interfaces:
Cochrane: The Cochrane Collaboration is an international not-for-profit organisation. It produces and disseminates systematic reviews of healthcare interventions and promotes the search of evidence in the form of clinical trials and other studies of interventions.
Cochrane Reviews are systematic reviews of primary research in human health care and health policy, and are internationally recognised as the highest standard in evidence-based health care. They investigate the effects of interventions for prevention, treatment and rehabilitation. They also assess the accuracy of a diagnostic test for a given condition in a specific patient group and setting. They are published online in The Cochrane Library.
- Belgian Centre for Evidence-Based Medicine (CEBAM) is the Belgian branch of the Cochrane Collaboration
- Das Deutsche Cochrane Zentrum (DCZ) is the German branch of the Cochrane Collaboration
Cochrane Central register of Controlled Trials (CCTR) is a bibliographic database of definitive controlled trials. These controlled trials have been identified by the distinguished contributors to the Cochrane Collaboration.
Embase: Providing extensive and reliable coverage of peer-reviewed biomedical literature, along with deep indexing, power searching and sophisticated information management tools, with Embase you can be confident that all relevant, up-to-date, biomedical information from the research literature has been captured. With over 2,000 biomedical titles not currently offered by MEDLINE, Embase delivers comprehensive, authoritative, reliable coverage of the most relevant biomedical literature.
Europe PubMed Central (Europe PMC) is a unique, free, information resource for biomedical and health researchers.
Manual, Alternative and Natural Therapy Index System (MANTIS) addresses all areas of alternative medical literature. It has also become the largest index of peer reviewed articles for several disciplines including: chiropractic, osteopathy, homeopathy, and manual medicine.
MEDPILOT ist ein Service der Deutschen Zentralbibliothek für Medizin (ZB MED) und des Deutschen Instituts für Medizinische Dokumentation und Information (DIMDI). | https://www.comecollaboration.org/databases/overall-medical-databases/ |
Board Meetings: Bored No More
In my past two years as president and CEO, I have been blessed to work with the CHHSM Board of Directors as it grows and improves.
My role also calls me to serve on the United Church of Christ board, the National Benevolent Association board and the Interfaith Roundtable. I have seen all of these boards transform into even more vital, vibrant and high functioning groups than they were before.
The common theme for this change is the desire for these groups to do the work they are called to in new and innovative ways that embrace culture change when needed and embrace the old way of doing things when it makes sense to do so. No matter how good you think your governance structure is, be open to the changes and improvements that are the trademark of a dynamic board.
All of these boards excel at performing their fiduciary duties. A truly exceptional board does so with a clear understanding of the distinction between the respective roles of governance and management. Staying out of the weeds and focusing on a higher level of board oversight allows management to do their work and allows for a strong symbiosis between the two.
Of increasing importance is an intentional focus on the mission, vision and values of an organization; its clearly defined roles and responsibilities for board members; the development of volunteers into future board members; time for effective orientation and mentoring of new board members; pertinent and meaningful education sessions for board and staff; a sound committee structure with defined job descriptions, charters and annual workflow plans that includes regularly scheduled meetings outside of the full board meetings; and finally, time in board meetings for generative thinking where current strategies and new ideas can be explored and refined. All of these are best practices for sound governance and all of the boards I am involved with continue to improve in these areas.
Most importantly, truly exceptional boards work together with a strong sense of community, like a family. They like being together because they are operating in an environment of collegiality and friendship that fosters a strong feeling of trust and respect.
Exceptional boards get to that place by challenging each other in a safe space where all voices can be heard, in a gracious space. They get there by creating a culture where they can work hard but also have fun, participate in team-building experiences and find the time to get to know each other as individuals.
In essence, I suggest you embrace and foster culture change on your board. Be willing to take a step or two back on a regular basis so that you form not only an effective board, but a true community of servant leaders who share a common purpose – to be the best board possible. | https://www.chhsm.org/news/board-meetings-bored-no-more/ |
Doncaster Knights are edging ever closer to a full squad ahead of next season with the signing of Saracens Alex Brown.
The 22-year-old prop arrives at Castle Park from the Aviva Premiership club which he joined in July 2009.
And Brown, after impressing with appearances for Saracens Storm in the A League, made his debut in an Amlin Cup victory at Vicarage Road against Rovigo in October of that year.
Director of rugby Brett Davey believes the capture of the England U16, U18 and former Blackheath front rower will compliment the club's previous signings ahead of the new season.
And Davey thinks Brown's passion, together with the experience of older players like Stuart Corsar and Royce Burke-Flynn, will allow better opportunities in a game.
Davey said: "Alex is another player I have a lot of belief in, belief in his attitude not just his ability on the pitch.
"You look at what Alex can bring to a game and balance it with the likes of Stuart Corsar, Andy Brown and Royce Burke-Flynn and you have options during a game.
"While Stuart and Royce have a higher level of experience, Alex and Andy Brown bring an enthusiasm and determination that gives you a confidence in them." | https://www.skysports.com/rugby-union/news/12040/6949846/knights-swoop-for-brown |
Purpose of Position: The Business Unit IT Site Leader executes the plant strategy to achieve desired business results in alignment with the divisional IT strategy through appropriate allocation of IT resources and capabilities such that the business unit operates as “One IT” in support of Corning’s Values.
Responsibilities & Deliverables:
- Align IT business processes to global Corning business processes.
- Responsible for local business/plant engagement and IMS.
- Responsible for setting, tracking, and enforcing the IMS budget for the plant.
- Deliver projects on time, on scope, and on budget through project prioritization and effective resource management.
- Establish and maintain the appropriate levels of operational support against established metrics.
- Effectively support the IT shared service delivery model.
- Collaborate closely with the Division IT Manager to understand and implement programs that drive standardization across the division while ensuring plant business needs are met.
- Interact with customer base to function as the voice of the plant to the IT organization to ensure the type and level of services provided fully support achievement of plant business objectives.
- Interact with and educate plant customers in the development and implementation of required programs and processes.
- Establish and maintain a presence on the plant floor to maintain an ongoing pulse of the organization.
- Lead the organization in the application of performance excellence to improve services and quality to customers.
- Establish and drive plant IT project portfolio and manage its alignment to organizational objectives. • Participate on plant staff to appropriately integrate the IT organization and IT systems into the day- to- day operations of the plant. Work with plant staff to make team-based decisions that support the overall efficiency and effectiveness of the plant.
EDUCATION / EXPERIENCE:
- B.S. or M.S. in Computer Science, Computer Engineering, or Electrical Engineering; or equivalent experience.
- 5+ years demonstrated leadership abilities 5-10 years of experience in manufacturing or leading projects in the industry.
-
Required Skills:
- Strong leadership skills demonstrated through project management, supervisor experience, or team leadership.
- Strategic thinking. The ability to create, organize and execute a strategic plan in alignment with higher IT and plant business objectives.
- Ability/experience managing and forecasting financial budgets
- Conflict resolution, problem resolution and priority setting
- Communication and time management, able to deal with multiple priorities
- Demonstrated project management skills
Desired Skills:
- Technical background in an Engineering, Computer Science, and/or Computer Engineering. - Ability/experience in manufacturing
- Experience with Lean and/or Performance Excellence manufacturing techniques
- Ability to engage at all levels of the organization production associates, engineers, IT, managers, and executive leadership
- Ability to work collaboratively with individuals and teams utilizing skills of influence, persuasion, negotiation, and facilitation.
Travel: | https://corningjobs.corning.com/job/Newton-NC-28658/907243300/ |
The Environmental Research and Education Foundation (EREF) will host a Solid Waste Management Life-Cycle Assessment Workshop from 8:30 am – 5:00 pm on Friday, October 3, 2014 at 3301 Benson Drive (Renaissance Once Building), 1st Floor in Raleigh, North Carolina. Life-cycle assessment (LCA) is widely used to estimate the environmental and economic impacts associated with products, processes, and systems. Numerous tools and models have been developed to address the unique challenges associated with solid waste management (SWM) processes and systems. LCA is a unique and powerful tool for SWM and can answer questions such as:
- Is it better to compost, anaerobically digest, burn, or landfill food waste?
- What are the costs associated with:
- reducing environmental impacts from solid waste processes or systems?
- making certain SWM decisions (e.g. implementing WTE or recycling)
- What are the net environmental implications of recycling?
- What process(es) in the solid waste system lead to the most emissions?
This workshop will provide an introduction to LCA with a subsequent focus on SWM applications geared towards practitioners, consultants, policy makers, and researchers. Participants will:
- gain a basic understanding of what LCA is and how LCA is used in a variety of industries
- understand the essentials of how an LCA model is developed for evaluating SWM strategies (e.g., collection, recovery, waste-to-energy, landfill, composting and anaerobic digestion)
- gain an understanding of how LCA is used to evaluate multiple SWM strategies via a presentation of illustrative case studies
As part of this workshop, a demonstration of the Solid Waste Optimization Life-cycle Framework (SWOLF) will be provided. SWOLF is a multi-stage life-cycle optimization framework, developed at N.C. State University and supported by EREF and the National Science Foundation, that is capable of analyzing the economic and environmental impacts and trade-offs associated with SWM systems when considering future changes to waste generation, waste composition, and the energy system.
The cost to register for the EREF workshop is $75 for consultants/industry personnel, $25 for federal/state/local agencies/non-profits and $15 for academia and students. The workshop is sponsored by Smith Gardner, Inc. and Waste Industries. Additional sponsorship opportunities are available.
For more information or to register, visit www.erefdn.org. | https://wasteadvantagemag.com/eref-host-solid-waste-management-life-cycle-assessment-workshop/ |
Alex Hamilton recently displays a propeller damaged by rust, which he said was caused by wet conditions in the hangar.
A tenant at Frederick Municipal Airport is raising concerns about the condition of the hangars as he gets ready to move his plane to Hagerstown.
Frederick resident Alex Hamilton leases a hangar in the south section of the airport, where many pilots use tarps to keep rain from leaking through the roof onto their equipment.
His hangar is bare-bones, made of corrugated metal.
On a recent visit, he showed off a propeller that rusted because of wet conditions and pointed out holes where animals had made their way into neighboring hangars.
Airport commissioner Jon Harden said he was not aware of complaints about the hangars. But it is unclear how many users, if any, share Hamilton’s concerns because the airport does not keep records of complaints.
The airport has no formal complaint intake system, according to staff, but instead addresses each issue on a case-by-case basis.
Most often, staff receives and resolves complaints by phone, assistant manager Nick Sabo wrote in an email. Most of those are related to aircraft noise or aircraft believed to be flying too low.
“In almost every case we are able to explain the airport’s operations and what they likely saw or heard,” he wrote. “This settles the vast majority of complaints we receive.”
Harden said he would request that staff begin tracking complaints.
On the issue of the south hangars, manager Steve Johnson said staff responds to issues quickly.
“We have not received notice from a south hangar tenant about the condition of their facility that was not addressed in a timely manner,” Johnson wrote in an email.
The city of Frederick is responsible for maintaining the structural components of the hangars: the doors, door tracks, locks and so on, according to Johnson.
He added staff will sometimes go beyond those responsibilities and handle wildlife or uneven pavement problems.
But Hamilton said that much of the hangar maintenance is done by tenants. He painted lines on the area in front of his and poured concrete in a different hangar he previously rented.
He enjoys the active community at his local airport, but he recently signed a lease in Hagerstown, where his hangar would have drywall and electricity.
“This is a really cool little airport,” Hamilton said, adding that he would like to continue housing his plane there.
He spends about $230 each month on rent, he said. In Hagerstown, he would pay just a few dollars more each month for a hangar he considered nicer.
Storing his plane in a drier environment would likely reduce his maintenance costs, he said.
A pilot might spend $2,500 each year on maintenance, and Hamilton said he found he had to do more maintenance on his plane when it was parked in Frederick because of the moisture in the hangar.
Bob Zajko, a Frederick pilot, also keeps tarps up in his hangar to keep water out, but he said he is happy with it.
He would much rather have an inexpensive hangar than a new, expensive one.
“They’re actually built pretty well,” he said of the older hangars like his, built in the 1940s or 1950s.
“Most of them have dirt floors.”
Zajko did note, however, that he has had problems with his door sticking, and last winter, his plane got stuck outside the hangar because a puddle of water turned to ice.
There is a chance that the south hangars may be removed in the future, according to Johnson, but that would not be for many years. Zajko said he would like to see the hangars stay.
“It’s certainly better than parking the plane outside,” he said. | http://www.kathrynsreport.com/2015/04/pilot-concerned-about-hangar.html |
By a fortuitous accident of scheduling, Mahler fans in the area can drink in both of his heaven-reaching choral symphonies this week - No. 2, known as the Resurrection; and No. 8, nicknamed "Symphony of a Thousand." All signs point to memorable performances of each.
If Beethoven's Ninth is the most life-affirming of symphonies, Mahler's Second and Eighth are the most afterlife-affirming.
Mahler was invariably haunted by thoughts of death, as well as finely attuned to the light and darkness of this existence. His Second Symphony from 1894 encompasses the full range of his feelings. The work carries the listener through a fleshly and spiritual journey that includes a taste of apocalyptic horror and, in the sublime close, an assurance of ascension "into the light that no eye has ever reached."
Mahler's Eighth functions as something of a sequel since it dwells almost entirely in the beyond, a realm where we "hardly sense the fresh, new life" and are "dazzled by the new day." | http://articles.baltimoresun.com/2006-06-06/features/0606060225_1_baltimore-symphony-choral-arts-society-symphony-orchestra |
One problem with trying to gain an understanding of graphs is the mathematical foundation apparently required. While a really deep knowledge of graph theory does require long study, you can dip into this area. To do this, the amount of background needed is not so large.
Armed with some simple concepts, any programmer can start to use graph-processing algorithms.
In this article, I provide an introduction to the area of graphs with some simple Java code. However, it’s important not to think that graphs are very simple! Although a full understanding of the algorithmic complexities of graphs could take years to acquire, for most of us a detailed understanding isn’t necessary.
The nice thing about graphs is the way they can be used to model what are essentially infinitely data elements. A network can grow without bounds, so it’s difficult to model this on machines with finite resources.
Graph data structures provide a means of modelling such vast entities as national maps, large telecommunications networks, and so on. Once such entities have been modelled, it’s then possible to analyze them by using algorithms such as least cost routing.
It might come as a surprise to learn that some problems in graph theory remain unsolved to this day. (For more on this, reference is an excellent source.)
So graph theory can be seen as a very fertile area of investigation, and much academic research is aimed at solving key problems.
Let’s now get some basics out of the way—and then we’ll look at some applications of graph processing algorithms.
Graph theory is a vast area of computing with an impressive array of specialist domains and algorithms. Applications of graph theory include scheduling, maps, networks, program structure, and so on. | https://www.informit.com/articles/article.aspx?p=1155868&seqNum=2 |
Sweden’s National Rural Network has set up thematic working groups to improve and encourage the role of rural stakeholders in the delivery of rural development activity.
Projects & Practice
Developing an approach to risk assessment for RDPs in Ireland.
Poland’s RDP allocated a ‘lump sum’ funding package for LEADER Local Actions Groups to help them prepare their Local Development Strategies for the 2014-2020 period.
Setting up the first transnational LEADER region in Europe, thus allowing the elaboration of a common strategy between LAGs, and include provisions for more sound financial management of and implementation of TNC projects.
An initiative to promote young farmers participation entrepreneurship and innovation
for sustainable rural areas
An example on how the process of preparing a local development strategy was used for stakeholder consultation on key rural development issues.
A network that helps improve sustainability through farmer-led innovation. ‘Field labs’ and research grants provide farmers with skills, support and scientific backing to find solutions to the challenges which farmers face.
The Czech Republic’s RDP has introduced simplified administration systems that improve transparency and reduce risks of errors concerning eligibility.
Scotland’s RDP has adopted simplified administration systems that include a ‘two-tier’ application process for RDP grants. This was introduced to provide proportionate ‘fast-track’ procedures for projects requiring smaller amounts of RDP funding.
The Flemish NSU organised a series of Learning Networks for LEADER meetings focussing on specific topics, in order to support the exchange of information, invite topic experts and improve LEADER and CLLD implementation. | https://enrd.ec.europa.eu/projects-practice/_en?page=2&project_keywords_filter=19753&%3Bamp%3Bproject_country=All&%3Bamp%3Bfield_enrd_prj_measure_tid=All&%3Bamp%3Bfield_enrd_prj_focus_area_tid=All&%3Bamp%3Bf%5B0%5D=sm_enrd_eu_countries%3AUnited%20Kingdom&%3Bf%5B0%5D=im_field_enrd_prj_keywords%3A19757&f%5B0%5D=im_field_enrd_prj_keywords%3A20479&f%5B1%5D=im_field_enrd_prj_keywords%3A19739&f%5B2%5D=im_field_enrd_prj_keywords%3A20512&f%5B3%5D=im_field_enrd_prj_keywords%3A19743&f%5B4%5D=im_field_enrd_prj_keywords%3A20533&f%5B5%5D=im_field_enrd_prj_keywords%3A19758 |
Based on the sectors Oakley primarily invests in, and using industry best practice as well as deep sector experience, we have identified the ESG topics which are most often relevant to our investments.
This is our starting point when assessing ESG during due diligence, when engaging with our portfolio companies, and when defining our firm-wide ESG priorities.
The materiality of ESG themes is assessed based on the likelihood a risk or opportunity will be realised, and the financial, reputational, and regulatory impact it will have on the business and wider stakeholders.
Our responsible investment process
The Sustainability Team collaborates with the Investment Team and provides support to company management throughout this process.
Oakley has defined three portfolio-wide ESG priorities
1. Energy and climate change
2. Diversity, equality and inclusion
3. Cybersecurity and data protection
Our ESG universe
Oakley focuses on investing in technology, education and consumer businesses, as such we have very limited exposure to controversial sectors.
We would not consider investments in weapons, tobacco or pornography – these exposures are not a part of Oakley’s universe. Ultimately, our investment committee approves or excludes potential investments, and ensures it is aligned with the moral compass of Oakley. The committee members are briefed on the ESG profile of prospects and take this into account in their decision making.
As we took steps to formalise our ESG approach in 2020, one of the first things we did was develop and map out our ESG universe, to better understand where our sectors and operations sit on the ESG spectrum.
We recognise that ESG affects all business in different ways, and that there is great variety in how ESG topics will affect, and in turn, be managed, by individual companies.
Oakley does not invest in any extractive businesses or heavy industry, which appear to the right of the scale, where ESG topics have high relevance to these businesses. Nor are we passive, minority investors in very small businesses, where ESG may be a lesser consideration. Within all the areas and businesses that are open to investment, Oakley’s core sectors – technology, education, and consumer - tend to sit in the middle of the scale with regard to ESG relevance. Our investments tend to be asset light, especially in technology and education.
External engagement
Initiative Climat International
Oakley joined the Initiative Climat International (iCI) in August 2021. Supported by the UNPRI, the iCI is a collaborative network of UK and global private equity firms working together to tackle climate change within our industry.
Oakley is a member of the Regulatory Working Group, which seeks to help provide clarity and guidance to private equity firms on related climate regulations, such as the implementation of the Taskforce for Climate related Financial Disclosures (TCFD).
iCI members seek to foster collaboration and accelerate the private equity industry’s move towards a more sustainable future through the following three commitments:
- We recognise that climate change will have adverse effects on the global economy, which presents both risks and opportunities for investments.
- We will join forces to contribute to the objective of the Paris Agreement, to limit global warming to well-below 2 degrees Celsius and in pursuit of 1.5 degrees Celsius.
- We will actively engage with portfolio companies to reduce their greenhouse gas emissions, contributing to an overall improvement in sustainability performance.
Invest Europe
Oakley has long been a member of Invest Europe, the world’s largest association of private capital providers.
In 2021, Oakley joined the Responsible Investment Roundtable, a permanent forum dedicated to responsible investment and ESG within the private equity industry in Europe. In addition, Oakley joined the Sustainable Finance Disclosure Regulations (SFDR) Working Group, which aims to liaise with policy makers on the development of the regulation and help members understand how SFDR will impact their operations.
Oakley was also appointed to the Invest Europe Sustainable Finance Working Group; this group reports to the Invest Europe Board and is tasked with helping shape the organisation’s approach to sustainability.
Level20
Oakley has been an active member and sponsor of Level20, a not-for-profit organization dedicated to improving gender diversity in the European private equity industry.
Oakley is supportive of the organisation’s ambition for women to hold 20% of senior positions within our dynamic industry. Oakley works with Level20 on mentoring and development programs, events, and research.
Principles for Responsible Investment
We are committed to investing responsibly and have been a signatory to the United Nations sponsored Principles for Responsible Investment (PRI), and its Six Principles, since 2016.
The Principles, as outlined below, have been incorporated into Oakley’s business processes and practices.
- Incorporating ESG issues into investment analysis and decision-making processes;
- Being active owners and incorporating ESG issues into ownership policies and practices;
- Seeking appropriate disclosure on ESG issues by the entities in which investments are completed;
- Promoting acceptance and implementation of the principles within the investment industry;
- Working together to enhance effectiveness in implementing the!principles; and
- Reporting on our activities and progress towards implementing the principles.
Learn more about responsible investing in action at Oakley, with stories from across the firm and our portfolio companies. | https://www.oakleycapital.com/responsible-investing/our-approach/ |
Genetic engineering or genetic modification of corn refers to using molecular techniques or other similar techniques of biotechnology to add slight quantities of chromosomal material to the atomic structure and composition of corn, to protect it against infestation by pests, harm caused by herbicides or to increase its quality 4. In general, genetically modified corn is wired to resist herbicides and to produce its own insecticide. The trait in corn which tolerates herbicides is produced using tissue culture selection and a chemical called mutagen ethyl methanesulfonate 1. The trait in genetically modified corn that produces insecticide has a certain protein that is poisonous to some insect pests called Bt Toxin, hence the reason why genetically modified corn is also called Bt corn 3.
Many debates are still being held by environmental agencies, food and drug control institutions and other scientific research organizations and specialists on the viability of using genetically modified foods in general. The general opinion is that the safety standards should be considered before a genetic modification is made. This is by comparing the risks of such a modification to the opportunity cost of maintaining the unmodified version. Several measures should be taken to ensure that certain effects of genetically modified foods are under control, for instance the creation of super weeds through cross pollination between Bt corn and crop weeds can be averted by using control regions where farmers plant unmodified corn in fields next to the Bt corn or planting of sterile male Bt corn to prevent the spread of pollen to crop weeds.
Does America Need the Patient Protection and Affordable Care Act? | https://www.123helpme.com/benefits-and-risks-to-genetically-modified-corn-preview.asp?id=353080 |
The Civil Services Exam is considered the toughest exam in India. Union Public Service Commission conducts the exam in three stages- Prelims, Mains, and IAS interview. Geography is an important subject for all the stages of the IAS exam. If one prepares well for this subject they can increase their overall score substantially.
Major Straits of the world
A strait is a thin channel of a waterway that connects two large water bodies. The following are the main characteristics of a strait:
- Formed by natural processes
- Narrower than the seas it connects
- Navigable
List of Major Straits (UPSC Notes):- Download PDF Here
Major straits of the world are used by commercial shipping to travel from one sea or exclusive economic zone to another and they are of immense strategic and commercial importance. They also serve as a channel through which ocean currents pass modifying the climate of that area. Due to these reasons, they play an important role in physical and human geography.
This is an important topic in Geography for IAS Prelims, as proved by an analysis of previous years’ UPSC Question Papers. It is important to know the different straits of the world as there can be multiple questions asked about this topic, in the UPSC exam.
The following table lists the major straits in the world important for the UPSC IAS Prelims exam:
|Strait||Contiguous Landmass||Joining Seas/Water Bodies|
|Hormuz Strait||Iran and Oman||The Gulf of Oman and the Persian Gulf|
|Bab-el-Mandeb||Djibouti, Yemen, and Eritrea of the Somali Peninsula||The Gulf of Aden and the Red Sea|
|Ten Degree Channel||Car Nicobar Islands and Little Andaman||The Andaman Sea and the Bay of Bengal|
|Sunda Strait||Java island of Indonesia with its Sumatra island.||The Java Sea and the Indian Ocean|
|Florida Strait||Cuba and the USA||Gulf of Mexico and the Atlantic Ocean|
|Bering Strait||Asia from America||The Arctic Ocean and East Pacific ocean|
|Strait of Gibraltar||Spain and Morocco||The Atlantic Ocean and the Mediterranean Sea|
|Korea Strait||Japan and South Korea||The East China Sea and the Sea of Japan|
|Strait of Malacca||Malaysia and Sumatra||The Pacific Ocean to the east with the Indian Ocean to the west|
|Bonifacio Strait||Corsica island of France and Sardinia islands of Italy||The Tyrrhenian Sea and the Mediterranean Sea|
|Palk Strait||India and Sri Lanka||The Bay of Bengal in the northeast with the Palk Bay/Arabian Sea in the southwest|
|Bosphorus Strait||Divides Europe from Asia||The Black Sea to Sea of Marmara|
|Bass Strait||Tasmania island and mainland Australia||The Great Australian Bight and the Tasman Sea|
|Davis Strait||Between Greenland and Canada||The Baffin Bay and the Labrador Sea|
|Jamaica Channel||Jamaica and Hispaniola||The Caribbean Sea and North Atlantic|
|Hudson Strait||Baffin Island and Labrador peninsula||Hudson Bay and the Labrador Sea|
Straits have played an important role in human civilization since millennia. Empires have fallen whenever they failed to retain strategic control of the straits near their domain. Rich states have risen contiguous to these water bodies by taxing the traffic passing through them. They play an important role in economic and military matters to this day.
List of Major Straits (UPSC Notes):- Download PDF Here
This list of important straits can be used as notes for UPSC preparation. IAS aspirants should read more about each strait to be able to answer Geography MCQs for the Civil Services Exam.
Geography preparation for UPSC is a tough task as the syllabus is vast. Reading the NCERT books should be your first starting point. | https://byjus.com/free-ias-prep/upsc-ias-prelims-exam-major-straits-world/ |
Many different plants could be included in a rock garden. The usual design approach limits plant selection to low-growing varieties, but this is not a necessary constraint.
A brief study of the vegetation on a naturally occurring rocky landscape would help in designing a realistic rock garden for a residential landscape.
Some travel could be required to locate one or more good examples; this could be a pleasant weekend excursion with a clear purpose, especially if one knows where to find rocky landscapes. Ask around!
Once found, rocky landscapes might include one or more trees of various sizes, as well as shrubs and smaller plants. Clearly, proximity to rocks does not limit the size of plants.
The assumption that rock garden plants should be low-growing specimens probably relates to alpine gardens, which have inspired many rock gardens. Alpine gardens feature plants that grow naturally in high-altitude, mountainous areas, which typically have large stones and much gravel, low temperatures, low moisture, and poor soil nutrition. Plants that survive under such conditions might very well be small in overall size and low growing.
Developing an authentic alpine garden, however, involves reproducing the challenging conditions in which alpine plants are found. There are alpine varieties of some familiar garden varieties, e.g., Campanula, Dianthus, Geranium, Phlox, Primula, Ranunculus, Sedum, Sisyrinchium, Thyme. If such plants were to be grown in a moderate climate, in rich soil and with ample moisture, they would respond with more lush growth and greater size than they would in a true alpine garden.
Rock gardens should not be confused with alpine gardens. In fact, rocky landscapes can and do occur in a wide range of climates, with the only common characteristic being exposed rocks. So, in planting a rock garden, the gardener should first select plants that will thrive in the local environment. The Monterey Bay area's climate supports a wide range of choices.
The rock garden designer still might want to emphasize low growing plants to keep the vegetation in scale with the surrounding landscape and the rock garden itself, and to keep the rocks visible (they might have required a significant investment).
Another consideration is the relationship of the plants to each other. This perspective might lead to developing a plant community, i.e., a grouping of plants that grow together in nature. Other possibilities include a thematic approach, e.g., a white garden or an analogous or complementary color scheme. In our moderate local climate, the designer also might plan for year-round seasonal color, or for interesting contrasts of foliage or structure.
There are many possibilities, but the most successful and satisfying landscape plans always are based on a plan of some description, rather than a series of impulsive decisions.
Tom Karwin is a UC Master Gardener and vice president of the Friends of the UC Santa Cruz Arboretum. He gardens in Santa Cruz. Send feedback to [email protected]. Visit ongardening.com for more about plants for rock gardens, and info on garden coaching. | http://www.montereyherald.com/lifestyle/20140620/tom-karwin-on-gardening-think-small-and-tall-when-planning-rock-garden |
This distribution is a fairly often used distribution to it's ease of installation and support forums, it's fairly straight forward and easy to get
used to however as all distributions there is a slight learning curve, it's not exactly the same as windows although there are simliar desktops.
A Personal favorite of mine, this is a rolling release distribution which means you don't have to reinstall every year or so to make sure you're supported.
Their package management system (The way they manage updates) has a graphical interface for ease of installation and all in all is a fairly tidy distribution.
This distribution is probably one people go to for hardware out of the box support but not a great deal of security, it's based of ubuntu so has the ubuntu
package manager which makes updating and adding packages a breeze.
This is a fast, user-friendly desktop-oriented distribution based on Arch Linux, it's key features are intuitive installation, automatic hardware detection, | https://www.pheratech.com.au/blog/what-is-linux.php |
Gary B. Lamont, PhD.
Abstract
The detection and elimination of threats to cyber security is essential for system functionality, protection of valuable information, and preventing costly destruction of assets. This thesis presents a Mobile Multi-Agent Flow-Based IDS called MFIREv3 that provides network anomaly detection of intrusions and automated defense. This version of the MFIRE system includes the development and testing of a Multi-Objective Evolutionary Algorithm (MOEA) for feature selection that provides agents with the optimal set of features for classifying the state of the network. Feature selection provides separable data points for the selected attacks: Worm, Distributed Denial of Service, Man-in-the-Middle, Scan, and Trojan. This investigation develops three techniques of self-organization for multiple distributed agents in an intrusion detection system: Reputation, Stochastic, and Maximum Cover. These three movement models are tested for effectiveness in locating good agent vantage points within the network to classify the state of the network. MFIREv3 also introduces the design of defensive measures to limit the effects of network attacks. Defensive measures included in this research are rate-limiting and elimination of infected nodes. The results of this research provide an optimistic outlook for flow-based multi-agent systems for cyber security. The impact of this research illustrates how feature selection in cooperation with movement models for multi agent systems provides excellent attack detection and classification.
AFIT Designator
AFIT-ENG-13-M-43
DTIC Accession Number
ADA583795
Recommended Citation
Ryan, David A ., "A Multi Agent System for Flow-Based Intrusion Detection" (2013). Theses and Dissertations. 901. | https://scholar.afit.edu/etd/901/ |
Compounding this problem is that when large populations of algae die, their decay can further deplete the water’s oxygen. One common difficulty in lake management is controlling algae, which can become problematic in summer months in both small ponds and larger lakes. Algae and other aquatic plants provide food and oxygen for fish and other aquatic life. However, excess algae in a pond can interfere with fishing or swimming, and cause aesthetic problems such as mats of algae on the water surface and unpleasant odors.
It’s eaten after removing the inedible, fibrous, outer hull of the grains, but it is still considered a whole grain, unlike pearled barley. Once removed, it is called “dehulled barley,” but it has its bran and germ intact, which is where many of the nutrients can be found. Barley(Hordeum Vulgare L.) is a member of the grass family and one of the most popular types of cereal grains in the world.
Whats The Difference: Barley Vs Quinoa
Xu, B.; Long, Y.; Feng, X.; Zhu, X.; Sai, N.; Chirkova, L.; Betts, A.; Herrmann, J.; Edwards, E.J.; Okamoto, M.; et al. GABA signalling modulates stomatal opening to enhance plant water use efficiency and drought resilience. Hughes, J.; Hepworth, C.; Dutton, C.; Dunn, J.A.; Hunt, L.; Stephens, J.; Waugh, R.; Cameron, D.D.; Gray, J.E. Reducing stomatal density in barley improves drought tolerance without impacting on yield. Caine, R.S.; Yin, X.; Sloan, J.; Harrison, E.L.; Mohammed, U.; Fulton, T.; Biswal, A.K.; Dionora, J.; Chater, C.C.; Coe, R.A.; et al. Rice with reduced stomatal density conserves water and has improved drought tolerance under future climate conditions.
However, a failure to increase agricultural productivity in many Sub-Saharan countries has led to large increases in land used for cereal production. Most of our improvements in cereal production have arisen from improvements in yield. The average cereal yield has increased by 175 percent since 1961. Today, the world can produce almost three-times as much cereal from a given area of land as it did in 1961.
The sweetener has a unique flavor and a distinctive rich, dark color. Many stores sell the syrup for use in cooking and baking, and the substance is also used in the production of beer. Triticeae gluten-free oats may be a useful source of cereal fiber.
Comparing Oats, Barley And Wheat For Cattle Rations
This makes small grain species and variety selection important for expectations of forage production during the fall and spring. Furthermore, mostly, barley grow in temperate climates. It how long does it take for cbd oil to work is a component of healthy foods such as soups, stews, barley bread, barley flacks, etc. Moreover, it serves as a material for the fermentation of beer and some other distilled beverages.
Top 4 Grains Healthier Than Wheat
It’s about 200 gallons, and we have a 2600 gph pump feeding water to a rock stream that pours down into it from a mound about 3 feet above the pond. We added two barley sacks about 2-3 weeks ago, and haven’t really seen any improvement to speak of, as well as trying some liquid pond water clarifier . We also have a second filter box that has a pump to feed a couple of spitting fish and frogs. The pond is in the full sun, but it wasn’t this bad at the end of last summer being in the full sun all day. I drank a couple of Best Damn Root beers before I realized they were not gluten free.
Packed With Nutrients
Barley grass juice powder is often referred to as a nutritional powerhouse and for a very good reason. It’s not always easy to tell which grains are in a particular product, especially bread. For instance, a brown bread isn’t necessarily whole wheat — the color may come from added coloring. If you’re not sure something has whole grains, check the product label or the Nutrition Facts panel.
Aerate wort and pitch yeast from one-gallon starter. Rack to secondary and ferment for an additional 7 days. Mash for 15 minutes at 122° F followed by 45 minutes at 152° F.
Wheat Whiskey & Wheated Bourbon Explained
It contains the important B vitamins—thiamine, riboflavin, and niacin—but no vitamin C unless the grain is sprouted. The yellow pigments present in wheat consist chiefly of xantophyll, which does not give rise to vitamin A when ingested. Barley is especially good for those who try to lose weight and reduce hunger as it helps them feel full for longer.
I have been consuming barley grass powder without any problems. I can drink a glassful in one go when really thirsty, otherwise I tend to take a few sips at a time. Chris frequently mixes his daily dose into the how to get cbd oil in nc protein shakes he makes/buys after every work out at the gym. I like to mix mine with water and my daily collagen powder and add a splash of orange juice, just enough to take the edge off the grassy flavor.
This gives us the feeling of being satisfied and can help curb cravings and the tendency to overeat. Switching refined grains for whole grains is one way to startreversing diabetes naturally. Bulgur wheat, sometimes also called cracked wheat, is a lesser-known type of whole wheat product that is usually made from durum wheat grain . Compared to wheat grass, it is definitely a few notches more bitter. During juicing the cellulose that makes up most of the thick cell walls of barley grass is broken down to release the beneficial phytonutrients and make them easier for absorption by the human organism. Barley grass juice powder has a higher concentration of the beneficial nutrients and the indigestible cellulose is not present.
Basically, you take wheat kernels and subject them to a high-temperature heat treatment that breaks down the cellular structure of the grain. Also, another difference between barley and oats is that barley grows in spikes while oats grow in small florets. Thus, this is the basic difference between barley and oats. Barley and oats are two types of cereal grains used for human consumption and as fodder.
This group includes a wide variety of sugars and syrups. Syrups may be produced directly from sugar beet or cane, or extracted from corn or wheat starch. They may be pure glucose or a mixture of glucose and fructose . Or they may contain maltose, maltotriose and large dextrins. Kettle adjuncts are used in small amounts, typically less than 10 percent of the grain bill, although like cereal adjuncts they can be used in much higher amounts.
However, oats don’t contain gluten, rarely they are grown in same fields of wheat and barley, and these fields sometimes contaminate oats with gluten. Although, some people who have gluten intolerance disease or celiac disease may kratom powder vs extract have to exercise caution while eating oats. One cup of dry oats contains approximately 297 calories. Oats also play an important role in improving satiety , digestive, cardiovascular, diet quality, and general metabolic health.
Scotch barley — is a husked grain which has been roughly ground and can be used in soups, stews and casseroles. Barley is one healthy grain, however, which doesn’t get the attention it deserves. Hi Laxmi, Making vegetable cheelas are another option using these grains. I think your idea is brilliant and will help you include all kinds of healthy grains during the week. Semi-pearled barley is a compromise alternative, only a part of the bran layer gets removed. It is also important to remember that farro is a wheat product, and therefore, it contains gluten, a well-known allergen.
It has been colonizing fast, showing no real contamination, and when shaken it is breaking apart nicely. To have the same cost for feeding, oat needs to be $1.50 per bushel less expensive than barley to be a cost effective option. A by-product of the grain, used for animal feed and bedding. Barley straw is very prickly, as my memory of childhood games in a barn full of the stuff will attest, but happily eaten by equines, as is oat straw.
If nematodes are likely to be a problem, plant late in fall or during winter to avoid warm-season growth and incorporate early in spring in Zone 8 and warmer. Barley can be a host for a nematode species that adversely affects Thompson seedless grapes. LaRocca hasn’t had any moisture problems or grape-yield concerns from growing barley or other cover crops, even in the 40 percent of his upper vineyard that isn’t furrow-irrigated. “Once your vines are established, their root system is deeper and much more competitive than a typical cover crop’s root system,” he observes.
From pasta, crackers, bagels, bread, and cake, wheat usage as food is common amongst many people, irrespective of demography. Wheat has many benefits, and what determines what nutrient you will gain from wheat consumption is the type of wheat you consume. If you have a wheat allergy, celiac disease, or gluten intolerance or sensitivity, you should not consume gluten or flour tortillas. Generally, if you have any of these conditions, 100% corn tortillas are your best option, as they’re gluten-free. While oats are naturally gluten-free, they may be contaminated during production with wheat, barley or rye.
The U.S. Department of Agriculture recommends consuming 6 to 8 ounces of grains daily, providing energy in the form of carbohydrates. Of those, make 3 to 4 ounces whole grains — products made with the entire grain, not just the starchy endosperm — as they might aid in maintaining a healthy weight and lower risk of some chronic diseases. Barley and pasta both contribute to your overall grain intake and, in the case of whole-wheat pasta, offer similar nutritional benefits. Since ancient times, wheat was considered one of man’s essential crops and was the first known cereal grain to be cultivated.
Oats, with their high oil content, add a creaminess to beer. Wheat, rye and oats are all available as malted grains. These adjuncts should be used for specific flavor or quality contributions. Rice has a high gelatinization temperature and must be boiled prior to use.
Our data on agricultural yields across crop types and by country are much more extensive from 1960 onwards. The UN Food and Agricultural Organization publish yield estimates across a range of crop commodities by country over this period. The FAO report yield values as the national average for any given year; this is calculated by diving total crop output by the area of land used to grow a given crop . As a result, they’re higher in fiber, vitamins and minerals than refined grains, which contain only the endosperm of the wheat kernel. However, for those who have celiac disease, eating foods with gluten can trigger an immune response and cause damage to the cells of the small intestine . Carbs are broken down quickly into glucose in the bloodstream, which results in a sharp rise in blood sugar.
You’ll gain confidence in your cooking abilities, find new ways to save time and money when preparing meals, and discover recipes and tips. I currently just use the mill at Northern Brewer and I don’t think it’s adjustable. The smaller wheat size would likely explain the lower efficiency I saw (especially at 67% of the malt bill).
However, farro is more oblong and larger grain than barley. Farro is ancient whole-grain wheat that’s pretty similar to barley. It has a slightly chewy texture when cooked, so it can be used instead of barley in many recipes. Finally, fluff the barley using a fork to separate the grains. The cooked barley will have absorbed most of the water, but if there is some more left, let it sit for ten minutes until fully absorbed. If there’s plenty of water left, drain it in a strainer.
It is rich in sugars, carbohydrates, and dietary fiber, making the typical sweet taste more evident and pronounced. Wheat and barley are crops that can be used for further production of different food. For instance, wheat like durum is used to make spaghetti and macaroni, white wheat can be used to make pastry, and red wheat is used to make biscuits, cakes, and crackers. While barley, when it is processed, is a major ingredient in making beer, carpets, wheat baskets, and food for cattle breeding. Now, aside from the two types mentioned above, wheat can be categorized further based on the wheat color.
A 2003 study observed the effects of adding more barley to the diet of adult women and found that after four weeks, barley intake had beneficial effects on both lipid metabolism and bowel function. Pearled barley is more processed and refined, so it lacks some of the barley nutrition benefits described more below. Barley is available in a variety of forms, including pearled and hulled grains, grits, flakes and flour. It is actually one of the oldest consumed grains in the world. Use oats in most products, as well as millet, rice and buckwheat. According to the Journal of Nutrition, fewer than 10 percent of Americans get their daily recommended intake of fiber.
Your doctor might check for ANA (anti-nucleus antibodies) in your blood, they’re found in 5 in 10 people with NCGS . To build a transcriptomic profile of the specific genes expressed in a developing stomatal complex would serve as an excellent starting point for establishing the grass stomatal gene network. GWAS and QTL mapping may serve as additional methods for the identification of genes governing the stomatal lineage in grasses. An improved understanding of the molecular mechanisms governing grass stomatal development may provide novel genetic avenues for fine-tuning stomatal density characteristics. Direct targeting of genes with CRISPR-Cas9 technology will allow for effective production of reduced stomatal density varieties, in a timeframe exceedingly more rapid than a conventional breeding program.
Through a detailed examination of genetic pathways involved in stomatal development, it is clear that gene product interactions are highly dynamic. Recent genomic advances have led to the characterisation of the whole barley genome. As a result, quantitative trait loci have been identified for a variety of agronomic traits through genome-wide association analysis and population fine-mapping .
Chater, C.C.; Caine, R.S.; Fleming, A.J.; Gray, J.E. Origins and evolution of stomatal development. Li, H.; Yang, Y.; Wang, H.; Liu, S.; Jia, F.; Su, Y.; Li, S.; He, F.; Feng, C.; Niu, M.; et al. The receptor-like kinase ERECTA confers improved water-use efficiency and drought tolerance to poplar via modulating stomatal density. Naumann, G.; Alfieri, L.; Wyser, K.; Mentaschi, L.; Betts, R.A.; Carrao, H.; Spinoni, J.; Vogt, J.; Feyen, L. Global changes in drought conditions under different levels of warming.
People with this condition, and a few others, cannot tolerate the gluten proteins because their bodies reject them, causing illness and severe digestive issues. Many of the seasonal differences between winter and spring small grains are related to vernalization or the need to go through a cold winter period. In many cool-season plants including the winter small grains, this physiological process is necessary for stem elongation and heading. It occurs through the combination of cold temperatures coupled with short day-length. Using small grains as a dependable forage source will depend on several factors, including production potential, season of production, and winter hardiness.
PAN2 has roles in SMC asymmetric division by inducing function of PAN1 downstream, forming PCs and SCs . FLP acts to ensure appropriate orientation during symmetric division of GMCs into GdCs. FAMA and ICE1/2 activity is required for appropriate maturation of the stomatal complex. FAMA has additional roles in subsidiary cell formation. SCR and SHR operate in concert to regulate cell entry into the stomatal lineage, subsidiary cell formation, and stomatal complex maturation. EPF1 is predicted to negatively regulate ICE1 through a putative MAPK cascade; however, this requires experimental verification.
Bulgur has provided nutrients to Indians for many years too, since it’s a base ingredient in many sweet and savory Indian recipes. Because whole grains provide important nutrients, antioxidants, and mediate insulin and glucose responses, they’re linked with lowering stress levels put on the body that can result in low immunity. The lower glycemic impact of bulgur wheat makes it beneficial over processed grains and sugar-laden products linked to conditions like diabetes, obesity and the risk of developing cancer. Whole grains are concentrated sources of fiber in the form of resistant starch and oligosaccharides. These are carbohydrates that escape digestion in the small intestine and are fermented in the gut, producing short-chain fatty acids .
The polished grains are also softer and take less time to cook, about 40 minutes. I just know that when I eat gluten I get migraines, depression and diahrea. Any time I have been accidentally been glutened in the past 2 years, I have a couple of really bad days.
It can be used as 5-10% of the grain bill for a rye “spicy” note. It is even stickier in the mash than wheat and should be handled accordingly. Maybe it works better in cooler zones – but I call it the miracle treatment.
In 2015, Nutrition Today published a comprehensive review of the evidence regarding the health benefits of different kinds of fiber. This paper concluded that psyllium is most effective in treating constipation, perhaps due to the fact that it does not ferment in the intestinal track. You can make more beer from two-row than from six-row malt; its lower enzyme content, lower protein, greater starch content, and thinner husk make it better suited to higher extract. This is less obvious at the homebrew scale and more a concern for large breweries. Barley grass is from the young shoots of the barley plant while wheat grass is from the young shoots of the wheat plant. FALCPA requires that all packaged foods regulated by the FDA must list “wheat” clearly on the ingredient label if it contains wheat.
Quinoa, on the other hand, cooks in about minutes, regardless of the variety chosen. So, if you are in rush, quinoa or pearled barley may be the best option. For most, gluten will not be a problem and is really only a factor when an individual has a health condition that may prevent them from consuming gluten such as celiac disease. The two main proteins in gluten are glutenin and gliadin. | https://mersinligil.com/2021/09/08/gluten-versus-fructans-in-wheat/ |
0001 This invention relates to processes for disinfesting citrus fruit such as grapefruit, oranges and lemons of insect pests such as the Mexican fruit fly. The processes of this invention comprise placing citrus fruit such as oranges, lemons or grapefruit infested with insect pests such as the Mexican fruit fly in a gaseous atmosphere that contains up to 0.05% oxygen by volume. The balance of the atmosphere comprises inert gases such as nitrogen or up to 20% carbon dioxide in combination with nitrogen. The citrus is held in such an atmosphere for a time in the range of about 15 to about 21 days and at a temperature in the range of about 14 C. to about 18 C. These processes are particularly useful in killing, at all life stages, Mexican fruit flies that have infested grapefruits with minimal adverse effect on desirable fruit qualities such as flavor, texture and odor.
0002 The following examples illustrate the advantages of the processes of this invention in the disinfestation of the Mexican fruit fly in grapefruit, particularly Ruby Red and Rio Red grapefruit varieties.
EXAMPLE 1
EXAMPLE 2
EXAMPLE 3
EXAMPLE 4
EXAMPLE 5
EXAMPLE
EXAMPLE 7
EXAMPLE 8
0003 Approximately 25 late third instar Mexican fruit fly larvae were placed into 72 paper cups containing fruit fly rearing diet. 24 media cups were placed into each of 3 plastic containers. The containers were placed into a 10 walk-in chamber and lines supplying either 20% carbon dioxide (balance nitrogen), 0.5% oxygen (balance nitrogen), or air were attached to the inflow of each container. A gas flow of approximately 100 ml/min was established through each container. Four media cups (100 larvae) were removed from each of the containers after 7 days of storage. The remaining 20 media cups (500 larvae) were removed from storage after 14 days. The mortality of the third instar larvae after 7 or 14 days of storage was evaluated by transferring the larvae from each media cup into a container containing vermiculite. The vermiculite inside each of the 72 vermiculite containers was sieved daily until all larvae had either died or pupated.
0004 More larvae died after storage in 0.5% oxygen (2% mortality after 7 days and 14% mortality after 14 days) than after storage in air (0% after 7 days, and 3.2% after 14 days. The actual atmosphere maintained inside the containers during storage ranged from 16 to 22% carbon dioxide and 0 to 2% oxygen. These results indicated that a low oxygen atmosphere was more lethal to the Mexican fruit fly than a moderately elevated carbon dioxide atmosphere.
0005 Eighteen Rio Red grapefruit were artificially infested with 25%, late third instar Mexican fruit fly larvae. The fruit were artificially infested by removing a plug of fruit tissue from one end of the fruit, and inserting 25 larvae into the hole. The fruit plug was then replaced and the cut fruit surface sealed with hot glue. Six infested grapefruit were placed into each of three plastic containers. These containers were placed inside a walk-in chamber at 10 C. and lines supplying either 20% carbon dioxide balance nitrogen), 0.5% oxygen (balance nitrogen), or air were attached to the inflow of each container. Three grapefruit were removed from each container after 14 days. The remaining three grapefruit inside each container were stored for an additional 7 days (total of 21 days). The mortality of the third instar Mexican fruit fly larvae inside each of the artificially infested grapefruit was measured after the grapefruit were removed from storage by retrieving the larvae from each grapefruit and placing them into a container containing vermiculite. The vermiculite inside each of the 18 vermiculite containers was sieved daily until all larvae had either died or pupated.
0006 More larvae died after storage in 0.5% oxygen (58% mortality after 14 days and 99% mortality after 21 days) or 20% carbon dioxide (41% mortality after 14 days and 70% mortality after 21 days) than after storage in air (15% mortality after 14 days and 47% mortality after 21 days). These result provided evidence that a low oxygen atmosphere was more lethal to the Mexican fruit fly than a moderately elevated carbon dioxide atmosphere.
0007 On the day of harvest approximately 2500, late third instar Mexican fruit fly larvae were artificially infested into 105 Ruby Red grapefruit. The fruit were artifically infested by removing a plug of fruit tissue from one end of the fruit, and inserting 25 larvae into the hole. The fruit plug was then replaced and the cut fruit surface sealed with hot glue. Fifteen infested fruit were place into each of seven 5-gallon buckets, and the buckets were stored overnight in a walk-in chamber at 10 C. The following morning, lines providing air 20%, 40% or 60% carbon dioxide (balance nitrogen); or 0.05%, 0.10%, or 0.15% oxygen (balance nitrogen) were attached to the inlet of each bucket and a gas flow of approximately 100 ml/min was established through each bucket. After the infested fruit were stored for 14 days, larval mortality was evaluated by retrieving the larvae from each grapefruit and placing them into a container containing vermiculite. A common vermiculite container was used for the 15 fruits within each of the 7 buckets. The vermiculite inside each of the 7 containers was sieved daily until all larvae had either died or pupated.
0008 About 350 larvae (15 grapefruit) were exposed to each of the 7 atmospheres. Larval mortality was higher when fruit were stored in a controlled atmosphere (68% mortality) than when fruit were stored in air (17% mortality). Storage in 40% or 60% carbon dioxide resulted in the highest levels of mortality (96% and 93% respectively). Larval mortality was similar (60%) after storage in 20% carbon dioxide, 0.15% or 0.05% oxygen, but lower (35%) after storage in 0.10% oxygen. The inconsistent mortality trend was the result of a failure to maintain the 0.10% oxygen atmosphere inside the bucket containing the infested grapefruit. The actual average percent oxygen level inside the 0.15% bucket was 0.03%. This explains why mortality was similar after storage in 0.15 and 0.05% oxygen.
0009 The relative mortality of 6 life stages of Mexican fruit fly (eggs, early first, late first, second, early third, and late third instars) were evaluated after each life stage was stored at 10 or 14 C. for 7, 14, or 21 days in 0.05% oxygen or air. Eggs were collected on plastic rings which were covered with paraffin paper. The paraffin was covered with a thin layer of soft, food gelatine in which laboratory reared, gravid female Mexican fruit flies oviposited. The rings were placed on top of screen cages for 6-7 hours. Eggs were washed from the gel with purified water (reverse osmosis treated), sometimes called R.O. water, and collected on a 80 sieve. The eggs were then rinsed into a beaker with R.O. water and stored in a refrigerator overnight. The following day, 200 eggs were dropped onto a 1 inch square piece of heavy, brown paper toweling with an eyedropper, and the toweling was placed into a 1 pint plastic cup containing approximately 1.5 inches of larval rearing diet. The plastic cups were stored in the rearing facility for 1, 3, 5, 7, or 10 days to allow hatching and development into each of the respective life stages.
0010 After reaching the appropriate life stage, 3 cups were placed into 25%, 5-gallon buckets. Approximately 0.5 inches of water was placed on the bottom of each bucket to prevent desiccation during storage. One bucket containing 3 containers was held in the rearing chamber for 13 days as a check. The other 24 buckets were placed into walk-in chamber at 10 or 14 C. (12 buckets each). Lines supplying either air (6 buckets) or 0.05% oxygen (6 buckets) were attached to the inflow of each bucket, and a gas flow of 100 ml/min was established. Two buckets (6 cups) from each atmosphere were removed from each walk-in chamber after 7, 14, or 21 days of storage. Upon removal, the cups were incubated for 20 days in the larval rearing room. The number of pupae formed after 20 days of storage in air at 80 F. was recorded. The experiment was replicated three times.
0011 Results showed that eggs and late third instar larvae were the most tolerant to storage in 0.05% oxygen at 14 C. and that storage for longer than 15 days at 14 C. or warmer would be the minimum requirements for quarantine security.
0012Rio Red grapefruit were harvested and placed inside a screened cage containing gravid female Mexican fruit flies for 24 (eggs) or 48 (third instar larvae) hours. Thirty infested fruit were retained as controls and stored under optimum rearing conditions to estimate the rate of infestation. The remaining fruit were placed inside 5-gallon buckets and stored in 0.05% oxygen at 12, 14, or 16 C. for 7, 10, 12, 14, 16, 18, or 21 days. After the fruit were stored for the required duration in 0.05% oxygen, they were transferred to air, cut in half and stored on sand for 2 days inside a sealed, screened container under optimum rearing conditions. Two days after the fruit were cut in half, all larvae and pupae are removed from the fruit and the sand, and stored in a plastic container on vermiculite. After 21 days, the number of pupae in each container was recorded. The pupae were held for an additional 7 days to evaluate for emergence.
0013 The mortality of eggs and late third instars increased as the storage temperature increased from 12 to 16 C. No survivors were encountered after storage in 0.05% oxygen at 16 C. for up to 21 days.
0014Rio Red grapefruit were harvested and stored unwaxed at 10 C. for 21 days in air 20%, 40%, or 60% carbon dioxide (balance nitrogen); or 0.05, 0.10, or 0.15% oxygen (balance nitrogen). Twenty fruit each were placed into 7 5-gallon buckets, and the buckets were stored overnight at 10 C. The following morning, lines providing air, 20%, 40% or 60% carbon dioxide (balance nitrogen); or 0.05, 0.10, or 0.15% oxygen (balance nitrogen) were attached to the inlet of each bucket and a flow of approximately 100 ml/min was established through each bucket. After 21 days of storage in 10 C., the grapefruit were transferred to storage at 21 C. and stored in air for an additional 4 days. Grapefruit market quality attributes (flavor, peel color, soluble solids concentration, titratable acidity, and appearance) were evaluated after one and four days of storage in air at 21 C.
0015 Storage at 10 C. for 21 days in 40% or 60% of carbon dioxide had a deleterious effect on grapefruit flavor, external appearance, and percent juice yield. Fruit stored in all three of the low oxygen atmospheres had similar market quality attributes as fruit stored in air. However, the actual level of oxygen fluctuated inside each of the low oxygen treatment buckets. Results from this experiment suggest that grapefruit will tolerate storage in low oxygen for up to 21 days at 10 C.
0016Rio Red grapefruit were harvested, washed, waxed, and dried, and then 20 fruit were placed into each of 15 5-gallon buckets. Five of the buckets were stored overnight at 10, 12, or 14 C., and five lines providing air, 0.05% oxygen with 20% carbon dioxide, 0.10% oxygen with 20% carbon dioxide, 0.05% oxygen, or 0.10% oxygen were attached to the inlet of each bucket. A gas flow of approximately 300 ml/min was established through each bucket. After 14 or 21 days of storage in 10, 12, or 14 C., the grapefruit were transferred to storage at 21 C. and stored in air for an additional 3 days. Grapefruit market quality attributes (fruit weight, decay, flavor, peel color, soluble solids concentration, titratable acidity, and appearance) were evaluated after three days of storage in air at 21 C. The entire test was replicated 3 times.
0017 Storage in 20% carbon dioxide resulted in lower flavor ratings. The higher the storage temperature and longer the storage duration, the more pronounced the off-flavor. Grapefruit stored in 0.05% oxygen at 14 C. for 21 days were not rated inferior to those stored in 0.05% oxygen at 10 C. for 14 days, although fruit stored in 0.05% oxygen were rated inferior in flavor to fruit stored in air.
0018Rio Red grapefruit were washed, waxed, and dried, and 15 fruit were placed into each of 6 5-gallon Buckets. Two buckets were stored overnight at 14, 16, or 18 C., and lines providing air or 0.05% oxygen were attached to the inlet of each bucket. A flow of approximately 300 ml/min was established through each bucket. After 14 or 21 days of storage in 14 , 16 , or 18 C., the grapefruit were transferred to 21 C. and stored in air for an additional 14 days. Grapefruit market quality attributes (fruit weight, decay, flavor, peel color, soluble solids concentration, titratable acidity, and appearance) were evaluated after 14 days of storage in air at 21 C. The entire experiment was replicated 3 times for early, mid, and late season fruit.
0019 Flavor ratings, external appearance ratings, and incidence of decay suggested that 18 C. for 21 days was the maximum temperature and storage duration in an atmosphere of 0.05% oxygen that could be tolerated by grapefruit. The flavor of grapefruit stored in 0.05% oxygen at 14, 16, or 18 C. was rated inferior to grapefruit stored in air. However this off-flavor became more pronounced as the temperature increased to 18 C. and the storage duration increased to 21 days. The external appearance of the grapefruit was similar or slightly enhanced by storage in 0.05% oxygen at 14 or 16 C., but started to decline after 21 days of storage in 18 C. Incidence of decay in grapefruit stored in 0.05% oxygen for 21 days and then in air at 21 C. for 14 days was slightly lower than grapefruit stored in air. | |
Ingredients:
1 can (10 3/4 oz.) Campbell's®
Condensed Cream of Mushroom Soup OR Campbell's® Condensed 98% Fat Free Cream
of Mushroom Soup
1/2 cup milk
1 tsp. soy sauce
Dash ground black pepper
4 cups cooked cut green beans
1 1/3 cups French's® French Fried Onions
Directions:
MIX soup, milk, soy, black pepper, beans and 2/3 cup onions in 1 1/2-qt. casserole.
BAKE at 350°F. for 25 min. or until hot.
STIR . Sprinkle with remaining onions. Bake 5 min.
TIP: Use 1 bag (16 to 20 oz.) frozen green beans, 2 pkg. (9 oz. each) frozen green beans, 2 cans (about 16 oz. each) green beans or about 1 1/2 lb. fresh green beans for this recipe.
For a change of pace, substitute 4 cups cooked broccoli flowerets for the green beans.
For a creative twist, stir in 1/2 cup shredded Cheddar cheese with soup. Omit soy sauce. Sprinkle with 1/4 cup additional Cheddar cheese when adding the remaining onions.
For a festive touch, stir in 1/4 cup chopped red pepper with soup.
For
a heartier mushroom flavor, substitute Campbell's® Condensed Golden Mushroom
Soup for Cream of Mushroom Soup. Omit soy sauce. Stir in 1/4 cup chopped red pepper
with green beans. | https://www.greenbeansnmore.com/print.php?f=recipe-b.html |
The book entitled "Data-Driven Fluid Mechanics: Combining First Principles and Machine Learning" will be edited by Cambridge University Press and is the result of a lecture series organized by the von Karman Institute for Fluid Dynamics and the Université Libre de Bruxelles.
This is the first textbook on Machine Learning for key fluid mechanics problems including analysis, modeling, control and closures. The Machine learning revolution is driving extensive economic and social transformations and its potential is now being discovered by the community of fluid mechanics researchers. The unprecedented amount of high-quality data provided by ever increasing experimental and numerical capabilities is driving this revolution. Machine Learning extracts knowledge from data without hinging on first principles and proposes a new paradigm to the applied scientist: reverse the natural flow of the scientific method and use data to discover, rather than validate, new hypotheses and models.
This new paradigm enlarges the available toolboxes of fluid dynamicists but challenges undergraduate students and practitioners alike in gathering the required knowhow from all the disciplines that are intersected by its methods. The purpose of this book is to provide a unified and pedagogical treatment of the machine learning tools that are now paving the way towards advanced methods for model order reduction, system identification, flow control, and data-driven turbulence models. Fluid Mechanics poses challenges and opportunities for machine learning tools by powerful first principles which can complement data-driven theories.
The proposed textbook is designed to complement undergraduate classes on datadriven science, applied mathematics, scientific computing, and fluid mechanics, as well as to serve as a reference for engineers and scientists working in these fields.
Why is a book needed?
Fluid Mechanics is historically a field of Big Data and hence offers a fertile ground to the data-driven paradigm, which has already provided insights in grand challenges such as turbulence control or turbulence modeling. As Machine Learning continuously augments or replaces more traditional methods, the demand for dedicated courses on the topic and qualified people has exponential grown in industry and academia alike. In aerospace and mechanical engineering programs, more and more prestigious universities are creating new chairs and opening new positions on machine learning for fluid dynamics. | https://www.datadrivenfluidmechanics.com/index.php/about |
Debate has escalated recently around perceptions of dwelling amenity and standards. Many commentators enter the discussion with preconceived notions about what constitutes an acceptable level of accommodation so as not to be considered as a ‘slum’. Australia – having the biggest houses anywhere in the world – has clearly demonstrated a penchant for size. Other communities, notably UK, Europe and Scandinavia, achieve highly desirable results on much smaller footprints.
There are numerous social benefits that may also be sheeted home to urban occupation in denser dwelling assemblies. People are more likely to have greater interest to participate in communal activities outside the home as opposed to being housebound and socially isolated. Lower mortgage costs, rates and utilities bills result in greater proportions of disposable income being available for entertainment, travel and other activities outside the home. Additionally, the likelihood of being closer to work, shops, services and entertainment delivers obvious benefits for available choices, time and cost involved in transport.
Household structures require accommodation options of great diversity to suit singles, couples, families – small and large – those wanting to be alone and those wishing to share. All ages, young, old and everything in between have vastly different needs and it must be accepted that it is highly unlikely that one dwelling will be suitable for a lifetime. Some look to house vast quantities of stuff accumulated over a lifetime of hoarding, while others have succeeded to successfully de-clutter.
Bedrooms are used in many different ways. Some inhabited by children, students, the infirmed or where part of a share house will be occupied for extended periods throughout the day. Others will be occupied by people who spend 99% of their time in the space with their eyes closed. A prescription of ‘one size fits all’ with respect to access to natural light is not going to meet the needs of all the diverse patterns of occupation. It is clearly unacceptable to make everyone have to buy accommodation that is not suited to and excessive to their needs.
As a starting point, unless there has been a serious shortcoming in the planning and building permit approval, all recently constructed existing buildings must have complied with minimum standards enshrined in our current regulations. In both planning and building regulation spheres those standards are put in place following exhaustive processes to assess and reflect community expectation of acceptable design outcomes.
If it is determined from time to time to review those standards then there are well entrenched pathways to discuss options and confirm acceptable revisions.
Given this understanding, it is unhelpful for those believing change is warranted to target any group in the delivery chain as causing any perceived shortcomings.
Developers are sophisticated enough to understand what level of end product will constitute a commercial success. They are constrained by the realities of risk management which means that access to construction funding is dependent on significant pre-sale commitment. Perceptions of poor quality will undoubtedly dent the reputations of those involved when attempting to embark on projects in the future. If purchasers are not happy enough with the product, either for their own use or as a rental product, they will not be built.
Design professionals are able to assert some influence over results, and have the ability to make the most of any project within the constraints set by clients and regulations. The complex discipline of building design involves a myriad of skills and experience to execute projects successfully. These are generally hard won through application and testing of theory throughout the professional lifetime of individual practitioners.
Purchasers have the immense power of being able to exercise choice and influence projects with their feet and wallets. A minor flaw in this avenue to quality control is that the general public are often not well enough informed to identify the important details that predicate quality. This shortcoming can be overcome by acknowledging it, leading to engagement of expert advice prior to making the largest financial decisions that most people will ever make.
Consultation between the BDAV and the State Government Architect during the term of Geoffrey London has been cordial and constructive. The clear understanding has been that the nation leading the building design profession’s registration system in Victoria has served us well, and arguably better than the arrangements in other states and territories. Building designers and architects undertake projects of scale, nature and complexity appropriate to their skill and experience. Incremental progress is then possible over time to undertake larger more complicated commissions. To venture too far outside the comfort zone is a risk that needs to be assessed in terms of threat to reputation and voiding of professional indemnity insurance. Accordingly we have a merit-based system which respects skill and experience, and not one inextricably tied to an academic qualification and application for registration which may have occurred many years ago.
It was, therefore, enormously disappointing to hear the outgoing State Government Architect’s presentation to the IMPA forum on 6th August 2014 where he referenced a NSW planning policy as an example of a potential way forward to improve the quality of built design. In espousing the virtues of the policy, he included that the involvement of architects in the process was ‘crucial’. This was completely contrary to any undertakings he had made in dialogue with the BDAV. The previously enunciated position was that the highest quality design on any type of project was possible from all suitably-experienced registered design practitioners in Victoria.
The result – which is assumed and seemingly endorsed by the outgoing Victorian State Government Architect – by the implementation of policy equivalent to similar provisions, is that we should end up with a utopian built environment filled with abundant examples of architectural excellence. Numerous recent visits to Sydney have provided opportunities to test this hypothesis, and I would have to conclude from observations that the results on the ground are far from conclusive.
A robust community debate around our positions on size, quality and affordability is welcomed. It will, however, only deliver beneficial results to our built environment and meet our future needs if entrenched personal, professional and industry self-interest is put aside. Recognition of diversity with respect to empirical measures and less tangible aspects of aesthetics must be given free rein to embrace every option required to suit the needs and desires of all in the community.
Tim Adams is a Fellow and Past President of the BDAV. He has more than 40 years of building design experience and is as a leader in the field of energy efficient house design. He runs F2 Design, which is dedicated to ensuring that high performance houses and integrated sustainability responses are delivered with no impact on housing affordability. | https://news.bdav.org.au/size-important-quality-possible-good-things-come-small-packages/ |
Heribert Watzke, the scientist credited with establishing the field of food material research, wants to remind people that our guts are more than just plumbing. In twenty minutes at MAD3, Watzke analyzes the constant, dynamic dialogue that takes place between our two brains: the big brain, in our head, which uses up 25 per cent of our energy and accounts for only 2 per cent of our body mass, and the one below, in our gut.
The chef of Faviken describes his singular restaurant in a remote part of Northern Sweden.
The ethnobotanist who was crucial to chef Marc Veyrat’s success shares his wisdom. | https://www.madfeed.co/video/entrails-the-hidden-side-of-cooking/ |
Huawei and IDC’s Banking Resilience Index Uncovers How FIs Responded to COVID-19by Fintechnews Singapore January 12, 2021
A new whitepaper by Huawei and the International Data Corporation (IDC) looks at how banks around the world have responded to the COVID-19 pandemic and identifies the way forward in the new normal.
In a report titled Banking Industry Rises up to the New Normal, the two organizations share results of the Banking Resilience Index, which aims to act as an indicator of banking operation and capability for recovery amid the pandemic.
The index quantifies the current status of banking by region in terms of six key measures, and shows the major regional differences. It evaluates each region’s performance and draws out best practices in the post-COVID-19 world.
Findings from the study reveal that China’s banking system is well equipped to adapt, weather and transform its operations to match the turmoil of 2020 when compared to North America, the rest of Asia Pacific (APAC), as well as Europe, the Middle East and Africa (EMEA).
According to the index, banks in China are leading the world in upgrading their banking channels amid COVID-19, excelling in providing fully digital customer journeys, integrated payment services, and more. This has been facilitated by the existing culture of mobile payments usage among customers.
Chinese banks are also leading in innovation acceleration, embracing new technologies including blockchain, distributed ledger technology (DLT), as well as 5G and the Internet-of-Things (IoT). The report notes that most banks in China already have some sort of blockchain or DLT project well underway, technologies that promise to improve processes and efficiencies.
North American banks, on the other hand, lead in communication reformat and efforts to enhance customer engagement using technology, as well as workflow reimagining, which includes components such as the adoption of digital processes, business agility and digital wealth management.
North America’s lead in the communications subcategory can be partly explained by banks’ significant investments into communications and customer engagements. Besides, call centers and related infrastructure to aid with remote banking in the US stand out for their level of sophistication which other regions have not yet reached.
Meanwhile, the EMEA region stands out for infrastructure overhaul, which comprises the adoption of cloud computing and high level of cybersecurity and internal controls. The report also mentions the establishment of clear and open regulation on tech usage in the European Union (EU) which has enabled the emergence of notable fintech firms and challenger banks including Monzo, Fidor and Starling.
COVID-19 accelerates banks’ digital transformation; calls for greater agility
The COVID-19 pandemic has had a significant impact on all economies and all industries. In the banking sector, incumbents have been forced to adopt cutting-edge technology and digital platforms to ensure business continuity, embracing remote working and rethinking customer journeys to address long-lasting behavioral changes.
COVID-19 has highlighted the need for greater agility and shifted banks’ focus on becoming digital innovators as customers around the world demand contactless, remote and fast services via mobile platforms.
As markets like China and others in APAC prepare to return to growth, the Huawei/IDC paper advises banks in these regions to begin placing their focus on future areas of the business which can deliver future results with targeted investments into key technologies.
In particular, cloud usage should be a key area of focus as the technology provides an underlying platform which can scale up other investments and technologies banks made previously.
This is also an opportune time for banks to upgrade their product experiences and engagement methods with customers, and roll out new intuitive products to attract customer, increase stickiness and capture growth in the recovery phase.
The urgency is even more pressing today as big techs and so-called super apps are gaining a foothold in financial services, leveraging their extensive userbase and IT expertise to provide affordable products and deliver seamless customer experiences.
Global technology leader Huawei has been providing a full range of IT and business services to financial organizations around the world, allowing them to reduce costs, increase agility, attract and retain customers, and ultimately, position themselves against emerging competitors.
The firm has served more than 1,600 financial customers worldwide, including 45 of the world’s top 100 banks. It has also established comprehensive strategic partnerships with over 20 large-scale banks, insurance companies, and securities companies around the world.
Huawei is now focused on expanding its engagement with the world’s leading financial organizations and establish an ecosystem that include partners, clients and developers to share experience and successes.
By the mid of 2020, this ecosystem counted more than 29,000 partners worldwide in the enterprise market, including over 22,000 sales partners, 1,400 solutions partners, 4,800 service partners, 1,200 talent alliance partners, and 80 investment & operation and financing partners.
For more information, please visit here. | https://fintechnews.sg/45398/innovation/huawei-and-idcs-banking-resilience-index-uncovers-how-fis-responded-to-covid-19/ |
The 2018 MLS season has been a Jekyll and Hyde existence for Orlando City. After a difficult start that saw a draw against D.C. United and a loss against Minnesota United, the team won six straight games. That streak has been immediately followed by a six-game league losing streak, one the team will be looking to break next weekend. The past 12 games have been quite eventful, including multiple positive and negative club records.
Starting with the fourth game of the season against the New York Red Bulls on March 31, the Lions rattled off six straight wins, including two on the road in Philadelphia and Colorado. The win streak is the longest the club has had since it entered MLS in 2015. Going back to the USL days, this was the third time the club had won six straight games, and matched the second highest win streak in club history.
The only longer stretch was in 2014 when the Lions went on an unbelievable run of 18 games unbeaten. After drawing their first two games, they went on their first six-game win streak. That was broken by a draw with the Rochester Rhinos in New York, but immediately followed by the club’s longest win streak to date of eight games.
Another positive club record came on April 21, when rookie Chris Mueller set an MLS club record for the quickest goal by scoring in the second minute against the San Jose Earthquakes. In the history of the club, only two other players have scored in the first minute, both during the USL days. Dom Dwyer, on loan from Sporting Kansas City, scored a first-minute goal on May 4, 2013 against Antigua Barracuda. Kevin Molino equaled that feat by scoring within a minute on Aug. 11 against the Seattle Sounders Reserves. Additionally, three players had also scored within two minutes of kickoff. Demar Stewart was the first to do it on May 22, 2011 against the Harrisburg City Islanders. Kieron Bernard followed suit a year later on July 6, 2012 against the Los Angeles Blues. The first Lion in MLS to score within two minutes was Kaká, who did so on April 17, 2016 with a penalty against the New England Revolution.
While the six-game win streak featured some positive club records to celebrate, the current six-game league losing streak has had some to lament. During the club’s USL era, the Lions had a remarkable record of never losing two league games in a row. In fact, the only time the team lost back-to-back games was in 2012 and 2013 when they lost the league game following their U.S. Open Cup exit. That hasn’t been the case in MLS. The struggles in MLS have included several losing streaks, some extended. Prior to this current streak, the Lions’ longest point drought was three, occurring once in 2015 and once in 2016. The first instance lasted from July 11-26, 2015. The second stretched from Sept. 11-24, 2016. The Lions have now doubled that previous record.
The last three games have been the most difficult to deal with for Orlando City fans, with the team losing by three goals in each game and conceding 11 in total. This is the first time the team has ever lost three straight games by three or more goals, and the 11 conceded is the second most in a three-game span. The Lions lost three straight in 2016 to the LA Galaxy, the Columbus Crew, and D.C. United by scores of 4-2, 4-1, and 4-1. That’s the closest the team has gotten to their most recent record, and still stands as the most goals conceded over a three-game period.
They did concede 11 goals in three games on one other occasion. In 2015, the team conceded five goals to New York City FC, two to the Columbus Crew, and four to Toronto FC. But that stretch did include a 5-2 win over the Crew.
For good or bad, the 2018 MLS season has been an eventful one for Orlando City. The Lions have endured an unforeseen run of games by following an impressive six-game winning streak with a six-game losing streak. Both of these streaks have rewritten the record books for the Lions. They’ll be hoping to avoid any further negative records by ending their current losing run when the Montreal Impact come to town next weekend. | https://www.themaneland.com/2018/6/16/17469626/orlando-citys-wild-record-setting-ride |
Ipieca promotes environmentally responsible operations across the oil, gas and alternative energy sector to advance protection of the natural environment, minimise and mitigate risks and impacts from operations and products, and support the energy transition.
Ipieca convenes industry and stakeholders to identify, develop and promote good practices in operations, joint ventures and the supply chain, covering a full spectrum of environmental issues including biodiversity and ecosystem services, water management, oil spill preparedness and response, nature positive, impact assessment and circular economy. Ipieca aims to facilitate good environmental practices and advance efficient use of natural resources across the energy transition as oil and gas remains an important part of the energy mix.
Since 1974, Ipieca has convened industry and stakeholders to work on a broad range of environmental topics associated with oil and gas operations.Read More
Ipieca works with the oil and gas industry to responsibly integrate the management of biodiversity and ecosystem services across the life cycle of oil and gas operations.Read More
Ipieca enables the oil and gas industry to proactively identify potential water risks and collectively manage water issues.Read more
Ipieca Water Working Group Chair Krish Ravishankar (Oxy) explains the importance of water and how we can manage this vital resource.
Hear Ipieca's insights from the second UN Ocean Conference which took place in Lisbon, Portugal, 27 June-1 July.
World Environment Day provides an opportunity to reflect and accelerate action towards a healthy planet for the prosperity of all. | https://www.ipieca.org/our-work/nature/ |
Thor ran his fingers along the petals of a delicate winter lily and marveled at the way the whole flower lit up at the touch. He’d never been to Utgard in winter. This half of the planet wouldn’t see a sunrise for months, so the only light to be had was what the planet itself could make. The Jotnar had never considered starting fires, no, not when their planet and mother was so generous.
Loki plucked the flower off of the stem and all four plants in the plot lit up in a wave. As Loki weaved the flower into his hair Thor watched juices pour out of the stem. It made him feel almost guilty, like a child who’d done something he shouldn’t have.
He turned to Loki and found the generous king offering him a hand to hold. Thor accepted it and they kept walking through to garden.
“I wanted to thank you again, Loki-king, for accepting my call for aid and offering my people a haven until we can find our own home.” Thor brought Loki’s hand up for a kiss and thought that Loki was so beautiful he should also glow when touched.
Loki hummed and stopped them in front of a tree laden with heavy fruit. “Will it take a long time, do you think?”
Thor shrugged. He’d never wanted to be king in the first place, and especially not like this, but Ragnarok had claimed his home anyway.
“Honestly, I’m not sure,” he said, “my father had colonies and I know we can find one, but without the Bifröst it may be…”
“Decades,” Loki finished.
Thor nodded. “I understand if it’s more than you agreed to, Loki.”
Loki smiled then, real and soft and sweet, and Thor felt his breath lock in his chest. Oh.
Their hands were still clasped together, squeezing each other tight. Loki’s other hand came up and cradled his face, directed him to look up into the boughs of the tree. Supple fruits with veins of gold on their purple skins beckoned him to take a bite.
“Jotunheim has room and riches enough for the Aesir, mighty Thunderer. Even if you never leave.” Loki’s voice wrapped around him and was carried on the wind that whipped past them. A promise.
Thor let his eyes fall back to Loki and felt something gentle and warm spreading through his chest and stomach. He’d only asked for refuge, and he had never expected to receive it. This was more than he could have hoped.
“My father had wanted to unite our realms, you know,” Thor whispered.
A light filled Loki’s eyes, made it seem like perhaps he did glow just the same as the rest of his beautiful home. “What do you want?”
Thor leaned in and kissed his fellow king, his ally, and perhaps something more. Loki kissed back and bit him gently, and Thor started thinking about how to best acclimate his people to this new world. | https://saltandlimes.home.blog/2018/12/02/cuddleslutloki-thor-ran-his-fingers-along-the/ |
An aircraft is typically subdivided into two or more compartments separated by structures, e.g., walls, bulkheads, floors, etc. During flight, these compartments are positively pressurized relative to the atmospheric pressure outside the aircraft. If an opening is created between one compartment and the exterior atmosphere, the pressure difference causes a sudden exodus of interior aircraft air. As air is rushing out the opening, an almost immediate propagation of the pressure difference causes the other compartments to also attempt to decompress.
To accommodate this chain reaction of pressure differences, it is often necessary to provide decompression panels between compartments to quickly equalize the pressure differential. A difference in pressure between compartments that is not relieved rapidly could lead to deformation of a separation structure and/or surrounding components. Known decompression panels have a sandwich type construction in which a pressure relief panel is released to fully reveal an opening through the separation structure. This allows air to quickly pass therethrough and quickly relieve the pressure difference. These types of decompression panels are sometimes referred to as full release blowout panels.
There are other aircraft requirements, however, that must be considered along with the requirement to allow air to pass between compartments during decompression. In particular, some aircraft compartments rely on oxygen suffocation to extinguish fires. This requires the separation structures to act as oxygen-tight fire barriers which do not allow fire or oxygen to pass through them. In such cases, it would be advantageous to use a pressure relief panel that could quickly allow pressure equalization between compartments during a rapid decompression event, but would otherwise resist the spread of fire between compartments. This present invention is directed to providing such a panel.
| |
the standard segment of the Financial Conduct Authority's Official List.
Trading in the Shares shall commence at 08.00 BST on 8th July 2019 on the
regulated market of the London Stock Exchange. IMC shall accordingly request
NEX Exchange that the Shares be withdrawn from trading on the NEX Exchange
Growth Market with effect from the close of that market on 5th July 2019, being
the business day immediately preceding Admission.
Eamon O'Brien,
Executive Chairman,
Dublin, 24th June 2019
This announcement has been made after due and careful consideration; the
Directors of IMC accept responsibility for the content.
REGULATORY ANNOUNCEMENT ENDS.
Enquiries:
IMC Exploration Group PLC
Eamon O' Brien: Tel. +353 87 618 3024
Keith, Bayley, Rogers & Co. Limited
Graham Atthill-Beck: Tel: +44 20 7464 4091/+44 750 643 4107/+971 50 856 9408
E-mail: Graham.Atthill-Beck@kbrl,co.uk
Stephen Clayson: Tel: +44 20 7464 4090
Brinsley Holman: Tel: +44 207 464 4098 | https://imcexploration.com/announcements/157-dj-imc-exploration-group-plc-admission-to-standard-segment-of-official-list |
The training duration is highly dependent on your individual pace of learning. However, most listeners will be able to compete the Specialization in 3 to 6 months.
What background knowledge is necessary?
The specialization requires that the learners should possess adequate discipline-specific knowledge, along with sufficient English language skills to successfully complete the specialization.
Do I need to take the courses in a specific order?
Yes, if you want to get the maximum benefit from the training, all the courses should be taken in the predetermined order.
What will I be able to do upon completing the Specialization?
Upon completing the Specialization, the learners will be able to write compelling research articles, persuasive grant proposals and convincing requests for funding, and effective technical reports. In addition, the learners will be able to demonstrate the acquired skills in preparing an effective poster for presenting research findings. | https://zh-tw.coursera.org/specializations/english-for-research-publication-purposes |
DOE funds 2 carbon utilization projects focused on algae producti
The U.S. Department of Energy’s Office of Fossil Energy on June 16 announced it will award $17 million to 11 advanced carbon utilization projects. Approximately $6 million of that funding will support algae projects.
The funding is being awarded under the DOE’s Carbon Utilization Program, which aims to reduce emissions and transform waste carbon streams into value-added products. The selected projects will develop and test technologies that can utilize carbon utilization.
Two algae projects were selected for funding.
The University of Kentucky research Foundation is being awarded nearly $3 million for its project, titled “NH4OH Looping with Membrane Absorber and Distributed Stripper for Enhanced Algae Growth.” The project seeks to develop an integrated CO2 capture and utilization technology for algae production. The technology will boost algae production by up to 50 percent by continuously supplying CO2 and ammonium in the appropriate growth ratio. The membrane absorber will be coupled with distributed, solar-energy powered strippers located near bioreactor modules for solvent regeneration.
The University of Maryland Center for Environmental Science is also being awarded $3 million for its project, titled “A Highly Efficient Microalgae-Based Carbon Sequestration System to Reduce CO2 Emissions from Power Plant Flue Gases.” The project plans to harness photosynthetic microalgae to maintain a high-pH and high –alkalinity culture to create a carbon-negative system for CO2 sequestration from power plant flue gases. The outcome of the project will be a scalable and deployable carbon-negative bioreactor system for CO2 capture from flue gases.
Additional information, including a full list of the 11 selected projects, is available on the DOE website. | |
Spatio-temporal ecology of sympatric felids on Borneo. Evidence for resource partitioning?
Hearn AJ., Cushman SA., Ross J., Goossens B., Hunter LTB., Macdonald DW.
Niche differentiation, the partitioning of resources along one or more axes of a species' niche hyper-volume, is widely recognised as an important mechanism for sympatric species to reduce interspecific competition and predation risk, and thus facilitate co-existence. Resource partitioning may be facilitated by behavioural differentiation along three main niche dimensions: habitat, food and time. In this study, we investigate the extent to which these mechanisms can explain the coexistence of an assemblage of five sympatric felids in Borneo. Using multi-scale logistic regression, we show that Bornean felids exhibit differences in both their broad and fine-scale habitat use. We calculate temporal activity patterns and overlap between these species, and present evidence for temporal separation within this felid guild. Lastly, we conducted an all-subsets logistic regression to predict the occurrence of each felid species as a function of the co-occurrence of a large number of other species and showed that Bornean felids co-occurred with a range of other species, some of which could be candidate prey. Our study reveals apparent resource partitioning within the Bornean felid assemblage, operating along all three niche dimension axes. These results provide new insights into the ecology of these species and the broader community in which they live and also provide important information for conservation planning for this guild of predators. | https://www.neuroscience.ox.ac.uk/publications/868024 |
The École nationale supérieure des Beaux-Arts, located across the Seine from the Musée du Louvre in the heart of Saint-Germain-des-Prés, is heir to the Académie Royale de Peinture et de Sculpture, founded in the 17th century by Louis XIV. History, long preserved state art collections and contemporary artistic creation come together in this institution, which occupies an essential place on the world stage of art and culture.
degrees: the first-cycle degree, upon successful completion of the three-year first cycle of study, and the Diplôme National Supérieur d’Arts Plastiques (DNSAP), after successful completion of two additional years called the second cycle. The École’s study program is aligned with the European Union system of first and second-cycle qualification, and the school defined its curricula according to the European Credit Transfer System (ECTS).
In 2009, five of the École’s technical skills studios — ceramics, forging, composite materials, mosaics and stonecutting-woodcutting — were opened together in a building leased to crafts, arts and technology companies in the center of the renowned antiques market district of Saint-Ouen, just outside Paris.
At the start of the academic year 2012-2013, the Programme La Seine will be superseded by a three-year doctoral-level program of Research through Artistic Practice.
In 2010-2011 ENSBA inaugurated a one-year post-graduate training program and scholarship for artists conducting an art or cultural project in an elementary or middle school (see Artistes Intervenant en Milieu Scolaire Program or AIMS, p. 132).
Beaux-Arts students benefit from a particularly active international exchange policy: the École has exchange agreements with more than 50 oreign art schools across the five continents, and each year several studio trips are organized in connection with original artistic projects related to specific partner schools (see p. 135). Nearly a fourth of Beaux-Arts students are of foreign nationality.
The Médiathèque, located on the first floor of the Palais des Études, offers students 45 000 directly accessible works as well as DVDs, video cassettes and electronic documents. The extremely varied documentary resources available to students are continually updated, providing students with an exceptional study environment (see p. 135).
The École offers a program of regularly scheduled cultural events embracing all artistic disciplines and dovetailing with life at the school. A full program of encounters, seminars, conferences, workshops, screenings and debates puts students in active contact with contemporary creation and art world issues (see p. 135).
The Beaux-Arts preserves a prestigious inheritance of books and iconographic and morphology collections linked to its history.
Many exhibitions are being held each year in various areas of the Beaux-Arts de Paris, intended not only for the general public but also to keep students closer to both contemporary art and art history evolutions. Works from the past and contemporary artists interventions coexist on the school site, thus fulfilling the École primary mission: the teaching of arts practices through assiduous study of art and great artists.
The halls of the Quai Malaquais, which are to be renamed Palais des Beaux-arts from Spring 2013 onwards, will host an exhibition programming of a vast historical spectrum, spanning from Renaissance to contemporary creation, showing the historic collections of the school but as well including students and recent graduates.
The chapel of the Petits Augustins, welcomes the presentation of outstanding artistic projects, in conjunction with external partners.
The Service de la communication and Service des expositions also accompany exhibition projects or interventions initiated by the workshops, often in collaboration with other institutions outside the school.
The École des Beaux-Arts Publications Office publishes approximately 20 works a year in various series — “Écrits d’artistes”, “D’art en questions”, “Catalogues d’exposition et guides”—and in the “Ateliers” series, which publishes works on École student studio exhibitions and travels.
Thanks to the missions and services that are the École’s vocation, and to its unique historical site, students enjoy and benefit from an exceptionally rich cultural and artistic environment. | https://www.beauxartsparis.fr/en/about-us/missions |
Purpose: The primary objective of this cross-sectional proposal is explore and predict the determinates of intent and behavior for women serving in the Army to conduct annual cervical cancer screening. A secondary objective is to explore the determinates of intent and behavior for women (under the age of 27 years old) serving in the Army to initiate and complete HPV vaccination. The goals of this research endeavor include: 1) to increase military healthcare providers (i.e., family nurse practitioners, community health nurses, physician assistants, and physicians) knowledge regarding Army women’s attitudes and normative beliefs regarding cervical cancer, cervical cancer screening, and HPV vaccination; 2) enable military healthcare providers to address risk reduction for cervical cancer for military members; and 3) build a foundation to develop and plan interventional programs to foster health promotion, disease prevention, and follow up behaviors prior to deployment in this unique population.
Sample: This endeavor will be accomplished by conducting a cross-sectional study of active duty female soldiers recruited at large military post on the east coast of the U.S.
Analysis: Utilizing logistic regression, and undergirded by the Theory of Reasoned Action
Methods: The strongest determinates of cervical cancer screening and HPV vaccination will be explored per the variables of interest; female soldier attitudes regarding cervical cancer and HPV, female soldier social norms for cervical cancer screening, and female soldiers intent for cervical cancer screening and HPV vaccination in the future. This study will also compare self- reported cervical exams and HPV vaccination with the participant’s electronic medical record to explore over reporting or misunderstanding of cervical cancer screening exams/HPV vaccination previously reported as limitation in research dependent on participant self-reporting only.
Implications for Military Nursing: Predicting the most influential factors on behavior could result in resources diverted from activities that are identified as having less of an impact on screening or vaccination for military women. With the knowledge generated, nurses can develop targeted intervention strategies to bolster healthcare seeking in this population. Further, delay in health seeking behaviors and those factors which influence delay may also be applied to other health related behaviors.
Final Report is available on NTRL: https://ntrl.ntis.gov/NTRL/dashboard/searchResults/titleDetail/PB2018100... | https://www.usuhs.edu/research/centers/tsnrp/research/funded-study/65500 |
Updated: July 30, 2021 3:30:53 pm
As the Central Board of Secondary Education (CBSE) today released the class 12 results, the Kendriya Vidyalaya and the CTSA schools recorded 100 per cent pass percentage. In 2020, their pass percentage was 98.62 per cent and 98.23 per cent respectively.
In government schools this year, the pass percentage jump has been profound.
CBSE Class 12th Result 2021 LIVE Updates: Big jump in pass percentage of govt aided schools
Independent and government aided schools saw the biggest leap in pass percentage, with 99.22 per cent as compared to 2020’s 88.22 per cent for independent schools and 99.48 per cent this year as compared to 91.56 per cent last year in government aided schools.
The pass percentage of JNV and government schools is 99.94 per cent and 99.72 per cent this year, compared to previous year’s 98.70 per cent and 94.94 per cent respectively.
CBSE Class 12th Result 2021: How to check marks
The overall pass percentage this year has been recorded at 99.37, nearly 10 per cent higher than 2020’s 88.8 per cent. As many as 65,184 students have not received their results today as their results are still being processed. CBSE will announce their result on August 5.
Apart from the websites — cbseresults.nic.in, cbse.gov.in — that will host the results, the government has also introduced the DigiLocker as a platform to check results.
📣 The Indian Express is now on Telegram. Click here to join our channel (@indianexpress) and stay updated with the latest headlines
For all the latest Education News, download Indian Express App.
-
- The Indian Express website has been rated GREEN for its credibility and trustworthiness by Newsguard, a global service that rates news sources for their journalistic standards. | https://indianexpress.com/article/education/cbse-class-12th-result-2021-kvs-ctsa-schools-record-100-pass-percentage-cbse-gov-in-7430219/ |
The ideas outlined in a recently published monograph titled “Addressing U.S.-China Strategic Distrust” appear to deserve a serious and sustained discussion by analysts and policy makers of Nepal planning for the next ten to twenty year timeframe.
Because, as the two authors of the paper Kenneth Lieberthal and Wang Jisi argue, the issue of mutual distrust of long-term intentions, or “strategic distrust”, “has become a central concern in US-China relations” and “the problem of lack of trust is becoming more serious”. We may infer that a strategically situated state such as Nepal is undoubtedly affected by the geo-political maneuverings of two of the world’s largest economies.
For the People’s Republic of China it is but natural and obviously desirable to seek a more broad-based engagement with Nepal with which it shares a land boundary of more than a thousand kilometers and historical relations spanning hundreds of years. But in the context of heightening strategic distrust with China, it is worthwhile to analyze in what manner the United States perceives progressively expanding Sino-Nepal relations. This question is especially germane in light of the recent ‘American Pivot to Asia’ and President Barak Obama’s affirmation that the US will play a key leadership role in Asia for decades to come. The question is also relevant in light of the position that the “type of China envisaged by current predominant American official thinking is one that will have a significant impact regionally and globally but will not target its increasing capabilities specially to diminish and disadvantage the United States.”
The authors of the monograph rightly note that there is no more important bilateral relationship in the world today than that between the United States and China, and “thus its future direction is of enormous importance to each country, the region, and the whole world..[and for] regional and global issues such as non-proliferation and climate change, active US-China cooperation or at least parallel actions makes issues more manageable; having the US and China work at cross purposes makes those issues more difficult, or even impossible, to manage.”
It is fair to ask in what way Nepal conceptualizes the future direction of Sino-US relations and what Nepal shall do to prevent these two states from working at cross-purposes and contradiction within its territory. Nepal can propose a number of different mechanisms to encourage collaboration between the United States and China as two of its key development partners. Doing so would not only help mitigate any potential negative consequences within Nepal arising out of distrust between these two states but would also ensure effective distribution of limited resources to a cash-strapped nation. Incidentally, in the case of Arica, discourse on US-China collaboration is already rather well enunciated.
Any perceptive observer would note that Nepal’s key global geostrategic function at this point of history is mainly related to two issues: that which is concerned with the extension of the Tibet railway into Nepalese territory and second, how that extension will facilitate the notion that Nepal is a corridor par excellence to build a meaningful and harmonious Nepal-China-India trilateral relationship that would hold enormous historical significance. Indeed, this “function” has the potential to deliver to Nepal an incredible opportunity to transform itself economically in line with the profound political changes witnessed in the last few years. How will the United States respond to these two issues, particularly in terms of whether it will encourage such developments or not in view of its preoccupations with Tibet?
The question assumes great relevance considering that the United States is still the paramount economic and military power in the world, to which it can be added that it was Nepal’s first bilateral aid donor in 1951 and has continued to provide hundreds of millions of dollars of assistance ever since. However, as many analysts have pointed out and indeed, as Wang Jisi explains in the monograph, “Beijing sees the lack of confidence and competence of the United States on the global stage..[and the] power gap between China and the US has narrowed considerably. ..It is now a question of how many years, rather than how many decades, before China replaces the United States as the largest economy in the world.” As the balance of power between the two most powerful countries in the world is undergoing readjustment, it is sensible for Nepal to contemplate ways in which it can bring the two together rather than drift apart to support its own development and promote regional growth and stability.
A 2006 Congressional Research Service Report for the United States Congress stated in a report that “American foreign policy interests in Nepal seek to prevent the collapse of Nepal which, should it become a failed state, could provide operational or support territory for terrorists.” A great deal has changed in the last six years and Nepal now appears poised to enter a period when it can shift its focus from political to economic transformation. A big part of that economic transformation is surely connected to the intensity with which Nepal pushes forward its under-utilized relationship with China and especially large cross-border infrastructure projects and ultimately, promotion of a Nepal-India-China trilateral relationship. The United States should support both these endeavors and likewise Nepal should seek to involve the US in meaningful and appropriate ways to advance these two critical agendas.
Firstly, Nepal should persuade the United States to use its considerable influence in multilateral and international organizations such as the UN and World Bank to help it seek a more global role for itself by strongly promoting development efforts geared at consolidating the trilateral relationship mentioned above and encouraging the construction of Nepal-China cross-border infrastructure projects that allow Nepal greater access via rail to the most populated country in the world and further afield to Southeast Asia, East Asia, Central Asia and so on. The US could greatly assist with this, for example, by taking the lead at the United Nations Economic and Social Commission for Asia and the Pacific (UNESCAP) by proposing that the current route map of the Trans-Asian Railway Network be updated to include a“proposed segment” linking Kathmandu to not only New Delhi but also Lhasa in the PRC.
(A glaring omission in this UNESCAP projection of the Trans-Asian Railway Network is the link between India, China and Nepal)
Secondly, as in the case of Africa where both the United States and China have separately helped African countries to improve their agricultural productivity and facilitation of access to markets but have recently been exploring the possibility of undertaking joint agricultural assistance projects, the same can be done in Nepal. As an example, the USAID’s concerns in agriculturally dependent Nepal which remains food deficit and its recognition that access to markets is also a critical problem, can be addressed by collaborating with Chinese highway and railway expansion projects across the Sino-Nepal border to address the shorter term issue in Nepal of food insecurity and the longer term concerns with expanding access in China for agricultural products from Nepal. For the United States such efforts would represent a very constructive depiction of its global role.
Finally, since “one central issue in the US-China distrust is about the perceived “power struggle” and “power competition” between the two states in the world, particularly in the Asia-Pacific region”, the authors of the monograph suggest that the US and China create “more comprehensive and effective mechanisms for them to discuss sensitive geostrategic issues in multilateral settings.” Future US support to the evolving India-China-Nepal trilateral relationship and particularly to a future railway linking the three countries, for instance, could possibly be discussed within the existing US-China-India trilateral dialogue. | http://niiss.org.np/index.php?option=com_content&view=article&id=22&Itemid=11 |
The minimum requirements vary according to the type of application and whether it should be filed with the NIPO or the EPO. Please contact us regarding your proposed application so that we can advise you on what applies for your case.
Translating/Drafting the Application
Generally, we file and prosecute European applications in English, and Norwegian applications in Norwegian or English. If your application is in another language, we ask that you supply us with an English translation thereof.
Searches
Prior to filing a patent application, you may wish to have a search made in order to investigate the state of the art within the field of the invention to be patented. This is only relevant if the application is a first filing. We perform such searches in-house by staff that has work experience as examiner at the Norwegian Industrial Property Office. The cited documents will be included as prior art when drafting the patent application.
The time-frame for a search varies from several hours to several weeks, depending on the complexity of the search as well as the urgency.
Filing the Application
For correspondence to and from the NIPO, the EPO and other offices, we prefer to use the available secure internet portals. Where this is not possible, we use the accepted ways of correspondence.
Every filing is quality checked by another employee.
Examination & Patentability Requirements
All Norwegian and European patent applications are examined, and the patentability requirements are as follows:
Novelty:
The invention must be new in relation to what was public knowledge before the effective filing date of the application. The novelty requirement is absolute, including prior use anywhere in the world. An earlier patent application made public after the filing, constitutes a novelty bar. In order to avoid double patenting, a “reasonable technical difference” is however required to fulfil the novelty requirement.
Inventive step:
The invention must differ substantially from what was public knowledge before the filing date of the application. An earlier patent application made public after the filing, will not be considered in the test for inventive step. Generally, the problem-solution approach is applied.
Industrial applicability:
The invention must be industrially applicable, but the interpretation thereof is broad and includes agriculture, forestry, gardening and mining. Methods for surgical or therapeutic treatment or diagnostic methods, practiced on humans or animals, are not regarded as industrially applicable and are not patentable. In most cases, such inventions can be covered by Swiss-type claims.
Other exemptions from patentability include plant or animal varieties, discoveries, scientific theories, mathematical methods, aesthetic creations, schemes, rules or methods for performing mental acts, playing games or doing business, computer programs (not entirely exempt), presentations of information, and inventions for which the use will be contrary to public moral and order.
Office Actions
The first Office Action is issued after 6-8 months for first filings. In other cases, the time frame is more variable. Please contact us for details.
The first Office Action usually presents the result of the novelty search, comments regarding inventive step and industrial applicability, as well as formal deficiencies and requirements for maintaining the application.
Upon receiving an Office Action, we translate it if necessary, and forward it to our clients with our comments. Some clients request a full and thorough analysis including a defence strategy, while others prefer a mere translation of the Office Action. We welcome you to let us know your preference.
We will enclose the documents cited by the office, unless the documents are already known to the applicant from the International Search Report (ISR) or a parallel application.
Failure to file a timely response will result in the application being shelved, but reinstatement will be granted under certain conditions. Extensions of term may also be available. When we report the Office Action to you, we will inform you of the term for responding as well as of any possibilities for extension of term that may be available for your application.
Responding to Office Actions
We generally await your comments and instructions before preparing a response to an Office Action. If we do not hear from you, we will routinely send you a reminder one month before the deadline. Upon receiving your instructions, we prepare and duly file the response. If necessary, we will contact you before finalizing the response.
Extensions of reply terms may be available. We will, however, charge a fee for requesting, docketing and reporting about the new deadline. Therefore, please let us know if you would prefer to abandon the application by not responding to the Office Action.
If a deadline is not met, the application will be shelved. However, it can be reinstated if the response is filed and a reinstatement fee paid within four months.
Filing a Divisional Application
If the patent office considers that your application concerns several independent inventions, you will be asked to limit your application to one of the inventions and to cancel claims relating to the other invention(s) described in your application. In such a case, it is possible to file one or more divisional applications claiming protection for the other invention(s) contained in the original application.
A divisional application must be filed while the original application is still pending, i.e. it must be filed before a patent is issued on the original application. The description of a divisional application is normally identical to the description of the original application as filed, while the claims concern an invention that was not covered by the claims approved in the main application.
Filing a divisional application is often very costly, since it is necessary to pay accumulated annuities counting from the effective filing date of the original application.
Examination of divisional applications normally commences in a relatively timely fashion.
Grant of Patent
If the patent office finds that your invention is patentable, it will issue a Notice of Acceptance. It will then be necessary to pay an issue fee. In the case of European patent applications, it is also necessary to furnish a translation of the claims into the two other EPO languages. In the case of Norwegian patent applications filed in the English language, it will be necessary to furnish a translation of the claims into Norwegian.
Upon completion of these formalities, the patent office issues the patent document and sends it to us. We forward it to the client after having checked it.
Both Norway and the EPO have a post-grant opposition system, and the opposition period is nine months from the date of grant.
A Norwegian or European patent is valid for 20 years as of the effective filing date if annuities are duly paid. We keep track of the payment deadlines for you and notify you in due time.
We can assist you in budgeting for your IP cases handled by us.
Rejection & Appeals
Should your patent application be rejected, the decision can be appealed to the Board of Appeal. We will advise you in this connection, should the situation arise.
If the rejection of a Norwegian application is maintained, it can be brought before the court. The Norwegian court system consists of the District Court, the Appeals Court and the Supreme Court, but patent cases rarely reach the Supreme Court.
Our in-house attorneys-at-law have a broad experience in all matters concerning intellectual property, and are fully qualified to litigate your case in court. Many of our patent attorneys have solid experience as expert witnesses or judges in litigation.
Assignments, Changes of Name
We can assist you in recording all types of changes, such as transferral of rights, name and address changes or licences, at the NIPO or EPO for pending applications and patents.
In Norway, a recordal of such changes is not legally required, but it is advisable in order to avoid ownership disputes. More importantly, if a patent has been transferred to you but you have not recorded the transfer, you cannot be a party to court litigations concerning the patent, such as infringement or invalidity actions.
Other rules may apply in other jurisdictions. Please contact us for information on your particular case.
Duration & Annuities
Norwegian and European patents are valid for 20 years as of the effective filing date if annuities are duly paid. The annuities for the first three years must be paid in bulk within two years of the effective filing date of the application. Further annuities must be paid on an annual basis.
We keep a watch on all annuities due. Our standard routines include sending you a first annuity reminder three months before the annuity payment is due and a second reminder two months later (one month before the deadline), requesting your written confirmation that the annuities should be paid. For clients who so wish, we automatically pay all annuities unless we are specifically instructed not to pay.
If we receive no payment instructions from you before the deadline, the annuities will not be paid. However, the patent/patent application remains active if the fee and a penalty fee are paid within six months of the ordinary deadline. We will send you a penalty warning three months before the extended term expires. We also send such penalty warnings to the clients who have outsourced all annuities payments to companies such as CPA, Master Data, Patrafee or others.
For pharmaceuticals and plant protection products, it is possible to receive an extended protection of up to 5 years by applying for a Supplementary Protection Certificate (SPC).
Infringement
If a third party infringes your patent in Norway, we can ask this party to cease his/her activities or alternatively negotiate a license agreement or even sell the patent, should you so desire.
If no agreement is made, we can file an infringement case. Our in-house attorneys-at-law are fully qualified to litigate such cases, but when necessary due to the complexity or scope of the infringement, we draw on resources from other reputable Norwegian law firms qualified in IP law.
A party infringing a Norwegian patent is liable to pay compensation as of the day of the publication of the patent application or the day the party was aware of the application, whichever comes first. However, small companies are often “pardoned” for not keeping track of published applications, and in such cases, compensation is calculated as of grant.
Generally, compensations are fairly low. The compensation awarded for the period before grant will be comparable to a normal license fee. The compensation awarded for the period after grant may however be larger than the infringer’s profit.
A petition for an interlocutory injunction may be filed as soon as the patentee becomes aware of the infringement, but it is normally required that he posts a financial guarantee to compensate the alleged infringer should the court conclude that no infringement had taken place.
Invalidity Suits & Administrative Patent Restriction (Norway)
If you become aware of a patent after the expiration of the opposition period, it is possible to request administrative revocation.
Alternatively, an invalidity suit can be brought before Oslo District Court in order to contest it. The same must be done if the patent is maintained after you have exhausted all opposition opportunities within the NIPO. Our patent attorneys and attorneys-at-law can file and litigate such a claim on your behalf.
If the validity of your own patent is contested in court, we will help you defend the patent. In some situations the best defense against invalidation is to request an administrative patent restriction in order to limit the scope of your patent.
A transferral case can be filed should you feel that another party has unjustly patented an invention to which you hold ownership.
Licensing and Sales of Rights
Should you wish to license or sell your patent, we assist in drafting the necessary agreements, including licensing agreements and confidentially statements. We can also take care of the registration of a license agreement at the appropriate patent office, as well as other changes resulting from commercial IP transactions.
We also offer strategic advice in the process of buying, selling and licensing industrial rights.
Oppositions & Observations
Third-party observations may be filed at any time during the prosecution of an application. A copy of the observation will be forwarded to the applicant, and the observation will be recorded as a separate action. The examiner is obliged to consider the arguments and any cited documents in the observation.
The time-limit for filing an opposition against a granted patent is 9 months from issue of the patent, but may in some cases be extended to 3 years. The opposition proceedings will generally consist of two rounds of correspondence before the case is decided. It is possible to request oral proceedings. Decisions in opposition proceedings can be appealed to the Board of Appeal, and then to the courts.
If you are considering filing an observation or an opposition, please contact us for details.
Supplementary Protection Certificate (SPC) - Norway
A Supplementary Protection Certificate may be obtained for pharmaceuticals and plant protection products in Norway. The duration of the SPC is limited to the time between the filing of the patent application and the first marketing authorisation for the product given within the EEA, minus 5 years (a maximum of 5 years extension).
As of September 2017, it is possible to apply for a further 6 months extension for medicinal products suitable for children (“paediatric extension”).
An application for an SPC must be filed within 6 months from the date of the first marketing authorisation for the product in Norway, or alternatively from the day the Norwegian patent was granted, whichever is later.
We can file an SPC on your behalf. The following is required:
- The Applicant’s name and address, which must be identical to the recorded patent owner’s
- Number, title, expiration date and date of grant for the patent
- Information regarding the first marketing authorisation in Norway, as well as a copy of the approval letter from the Norwegian Medicines Agency or the Norwegian Food Safety Authority
- Country, number and date for the first marketing authorisation within the EEA (if other than the Norwegian), as well as a copy of the notification or a document proving that the authorisation has been given
- All information required for the PTO to check that the product is protected by the patent
- Payment of the application fee
If we did not handle the prosecution of the patent application, we will also require a Power of Attorney.
Surveillance
Knowing what your competitors are up to is a crucial part of working strategically with intellectual property. Our surveillance services will assist you in mapping their activities.
Firstly, we can place a watch on a specific patent application that you are aware of. As soon as the application is publicly available, at the latest 18 months from the priority or filing date, we will receive copies of all the correspondence in the case, and advise you on whether an observation should be filed.
Secondly, we can keep a watch on patents on a more general basis. This means that we will keep track of all patent applications and grants and inform you about those that are close to rights you have already established. This type of watch is normally linked to a certain technical field or one or more specific competitor(s). Again, we can assist you in filing an opposition or an observation. | https://oslopatent.no/en/patent/process/ |
A question about your search methods - an unexplored aspect of evolution?
Message boards : MilkyWay@home Science : A question about your search methods - an unexplored aspect of evolution?
I read through your presentation - it was interesting to see how different search methods compare.
I was wondering about something you didn't mention: in nature, evolution doesn't care if a mutation does no good or even if it harms the individual in some way, to a limited extent. This is especially important in group societies, where detrimental mutations won't necessarily harm the survival chances of the group.
2) the result of compensating for a detrimental change which is later (randomly) undone.
As far as I could tell from the slides, you do not allow detrimental mutations to happen - only ones that make no difference either way. Have you looked into whether allowing such mutations to propagate for a limited amount of generations could be helpful to the searches? | https://milkyway.cs.rpi.edu/milkyway/forum_thread.php?id=1219&postid=32670 |
Time and Work is the topic of Quantitative Aptitude. In each and every Sarkari exam, there will always be 3-4 questions asked on this topic.
Read the Time and Distance important maths formulas and equations to solve the questions easily and score more marks in your competitive exams.
In this post, you will get time and work formulas, shortcut tricks and tips to solve speed questions.
|Topic Name||Time and Distance Formulas|
|Total Formulas||7+|
|Language||English|
Time and Distance Formulas
We have uploaded all Time and Distance Formulas from all chapters.
Let’s read these 7 Time and Distance Formulas:
- Formula 1
- Formula 2
- Formula 3
- km/hr to m/sec conversion:
- m/sec to km/hr conversion:
- If the ratio of the speeds of A and B is a : b, then the ratio of the times taken by then to cover the same distance is
- Suppose a man covers a certain distance at x km/hr and an equal distance at y km/hr. Then, the average speed during the whole journey is
Thank you for reading Time and Distance Important Formulas. We hope these formulas will help you to solve Time and Distance related questions easily and in a speedy manner.
Maths Formulas:
- Time and Work Questions & Answers PDF with Solutions
- Time and Distance Questions & Answers With Solutions
- Class 5 to 6 Basic Maths Formulas PDF
- Maths Formulas for Class 10 PDF in Hindi
- Maths Formulas for IIT JEE Pdf [JEE Main + Advanced]
- Algebra Formulas PDF
- Trigonometry Formula Pdf
- 100+ Quantitative Aptitude Math Topic wise Books
Furthermore, if you have any questions regarding this topic then do comment below. | https://jobscaptain.com/time-and-distance-formulas/ |
School students have led major protests in recent months against climate change negligence and stood up to the complacency of passive politicians. CRIN has written a statement supporting the student strikes, along with a template students can use to challenge the threat of punishments for protesting.
Russia’s anti-LGBT law on trial
In our latest case study we examine several challenges to Russia's "gay propaganda" laws. Passed using the protection of children as an excuse to silence discussions about LGBT issues, these laws effectively deny freedom of expression and access to information on gender and sexual diversity.
What Lies Beneath: Silence
For the first edition of our new magazine series, What Lies Beneath explores the role silence plays in human rights. It identifies the role each of us can play in confronting the issues as it tackles them in open conversation, inviting people to think critically about the norms we live by.
And Beyond
Many more of us can play a positive role in advocating for a better world for children. We therefore want to open up discussions around children’s rights for all audiences, presenting and unfolding bold ideas on issues which—whether we know it or not—affect children and young people.
And Beyond is a creative project by CRIN, which looks at the world through stories, humour, artwork and our vision for the future.
What Lies Beneath
So many rights violations continue unabated worldwide largely owing to factors that lie in the shadows unchallenged. And children, just like all humans, are affected by these, if not more so because they are children.
A new magazine series, What Lies Beneath is a creative project intent on openly talking about such issues, which keep us from evolving as a species. It’s a conversation where the language is accessible, the content is provocative, and readers are encouraged to think critically about the world and its norms and to start their own conversations. | https://home.crin.org/ |
More Recipes:
Looking for an easy SloppyJoes recipe? Learn how to make SloppyJoes using healthy ingredients.
Submitted by gingkojulie
Makes 6 servings
This sweet and tangy recipe is wonderful served over french bread, rice or a baked potato for a quick healthy supper.
Recipe Ingredients for SloppyJoes
|1 1/2||pounds ground turkey|
|1||tsp vegetable oil|
|1||cup onion, chopped|
|15||ounce cut green beans|
|1||tbs brown sugar|
|2||tsps red wine vinegar or cider vinegar|
|2||tsps Worcestershire sauce|
|1 1/2||tsps garlic, minced|
|15||ounces tomato sauce|
|6||ounces tomato paste|
|1||salt and pepper to taste|
Recipe Directions for SloppyJoes
- Heat oil in a 12 inch non-stick skillet over medium heat. Peel and coarsely chop the onion, adding it to the skillet as you chop.
- Add the ground turkey (fresh or paritally defrosted) to the skillet and raise the heat to high. Cook, turning and breaking up the meat occasionally, until it is crumbled and browned, 5 minutes.
- Add the brown sugar, vinegar, Worcestershire and garlic then stir in the tomato sauce and tomato paste. Lower the heat to simmer and cook 5 minutes more, stirring until all of the tomato paste is thoroughly incorporated. Add the green beans and stir until warm. Season with salt and pepper to taste.
- Serve Sloppy Joes over base of choice (bread, rice, etc) and sprinkle with grated cheese if desired.
Main Dish
|Nutrition Facts|
|
|
Serving Size 309.0g
|
|
Amount Per Serving
|
|
Calories
352
Calories from Fat
144
|
|
% Daily Value*
|
|
Total Fat
16.0g
25%
|
|
Saturated Fat
4.1g
20%
|
|
Trans Fat
0.0g
|
|
Cholesterol
116mg
39%
|
|
Sodium
548mg
23%
|
|
Potassium
1011mg
29%
|
|
Total Carbohydrates
18.1g
6%
|
|
Dietary Fiber
5.0g
20%
|
|
Sugars
10.1g
|
|
Protein
34.7g
|
|
|
|
* Based on a 2000 calorie diet
Nutritional details are an estimate and should only be used as a guide for approximation.
Legend
Calorie Breakdown
Daily Values
Fat
Protein
Carbs
Alcohol
Other
Protein
Carbs
Alcohol
Other
Calorie Breakdown
Daily Values
Health Information
|Nutrition Grade
|
96% confidence
|
Good points
||
Bad points
|
Join Calorie Count - It's Easy and Free! | https://www.caloriecount.com/sloppyjoes-recipe-r367428 |
Conny Waters – AncientPages.com – New archaeological analysis into grave items and skeletal materials from the oldest grave subject within the Netherlands reveals that male-female roles 7,000 years in the past have been much less conventional than was thought. The analysis was carried out by a multidisciplinary group of researchers led by Archol, the Nationwide Museum of Antiquities and Leiden College.
A group of chemical analysts, bodily anthropologists and archaeologists studied the Elsloo grave subject (Municipality of Stein, Limburg). Dr. Luc Amkreutz, curator of prehistory on the Nationwide Museum of Antiquities and Professor by Particular Appointment of Public Archaeology at Leiden College, was intently concerned.
Female and male figurine. Credit score: Oriental Institute Museum / Sailko
The researchers examined the grave items and skeletal stays. They might decide the intercourse and age of a number of the deceased from the cremation stays. This enabled them to conclude that flint arrowheads and stone axes, that are historically attributed to males, are additionally continuously present in ladies’s graves within the Elsloo subject.
This casts new gentle on the standard concept that grave items, as private possessions, are consultant of the day by day life and intercourse of the deceased. They change into much less gender-specific than beforehand thought.
Objects not linked to intercourse or age
The graves of the aged, particularly these of ladies, have been richly furnished. There seems to be a sure standing related to age. There additionally appears to be a “burial custom” with particular grave items and rituals, which are sometimes associated to searching, meals preparation, woodworking and physique ornament. Most of the deceased have been sprinkled with purple ochre, for instance.
And virtually all the grave items had been intensively used, whatever the intercourse and age of the deceased. The products appear to be particular utensils that belonged to the deceased’s family and have been intentionally positioned within the grave. This offers a superb impression of the function of the residing, their selections and the rituals surrounding loss of life. The analysis reveals a transparent nuance within the roles of prehistoric males as hunters, herders, warriors and builders, and ladies as caregivers and potters.
Oldest recognized burial subject within the Netherlands
The Neolithic burial subject at Elsloo belonged to the Linear Pottery tradition, the primary farming communities within the Netherlands and enormous elements of Europe greater than 7,000 years in the past. The Elsloo burial subject is the oldest recognized burial subject within the Netherlands (circa 5100–4950 BC). It was excavated by the Cultural Heritage Company underneath the management of prehistorian Pieter Modderman (1959) and Leiden College (1966).
Credit score: Leiden College
The finds have since been within the care of the Nationwide Museum of Antiquities in Leiden. This analysis was carried out throughout the Cultural Heritage Company’s Information of Archaeology undertaking. A number of the finds from the burial subject can be on show for a yr from 24 June 2022 at Historiehuis van de Maasvallei in Elsloo. | https://digitalpulsepublishing.com/index.php/2022/07/05/male-feminine-roles-7000-years-in-the-past-had-been-much-less-conventional-than-beforehand-thought-new-research-reveals/ |
Diane L. Nieman is well known for her big heart, competitive spirit, and strong urge for adventure. No matter what the weather or season may be, you are likely to find Diane outdoors staying active, having fun, and working to protect and conserve the environment.
Since she was a kid, Diane Nieman has always been very fond of animals of all kinds. The phrase “she wouldn’t hurt a fly” holds very true with her. Diane Nieman has always made an extensive effort to care for and protect animals; helping turtles in the middle of the road, purchasing no-kill mouse traps, recycling and picking up trash in local parks, and supporting the World Wildlife Fund.
The World Wildlife Fund (WWF) is the leading wildlife conservation organization in the world, focusing on protecting the future of nature since 1961. Through partnerships and volunteer work WWF completes a variety of projects and conservation work in the following areas:
- Climate
- Food
- Forests
- Fresh Water
- Oceans
- Wildlife
The mission of the World Wildlife Fund is one that Diane Nieman holds near and dear to her heart. She strives to support and volunteer with WWF at every possible opportunity.
Outside of supporting the environment and its wildlife, Diane L. Nieman is a competitive snowboard racer with Nastar. For over 20 years she has competed in a number of races, earning recognition as a National Championship Qualifier on numerous occasions.
Even when not racing competitively, Diane Nieman enjoys getting out on the slopes with friends and family for pure fun, adventure, fitness, and recreation. She often skis and competes at the local Mount Holly Ski Resort as well as at many resorts in Wyoming. but would love to travel to other mountains and ski resorts across the United States and all around the world.
To learn more about Diane L. Nieman has her passions and hobbies, check out her about.me page at https://about.me/dnieman. | https://socialcareerbuilder.com/diane-l-nieman/ |
Multiple, prolonged actions of neuroendocrine bag cells on neurons in Aplysia. I. Effects on bursting pacemaker neurons.
1. The bag cells are a group of neuroendocrine cells located in the abdominal ganglion of Aplysia. Accumulated evidence suggests they synthesize and release egg-laying hormone (ELH), a peptide that induces egg laying. In this and the following paper (37) we describe five types of prolonged neural responses in cells of the isolated abdominal ganglion that are produced by stimulated bag cell activity. 2. Prolonged, 5- to 40-min bursts of spike activity were triggered in the normally silent bag cells by local stimulation of one of the bag cell clusters with brief, 0.6- to 2-strains of pulses. This local stimulation minimized the possible effects of the stimulus on other ganglion cells and initiated bag cell activity similar to what has been recorded in intact animals at the initiation of egg laying. 3. Following onset of triggered bag cell activity there is an increase in the amplitude of the bursting pacemaker potential in cell R15 that results in augmented bursting activity in this autoactive cell for up to 3 h. The increase begins in less than 1 min and reaches a maximim after 8--20 min. In two other bursting pacemaker cells, L3 and L6, there is a second type of response, slow inhibition, consisting of a smoothly graded hyperpolarization that begins in 5--14 s, reaches a peak value of 10--20 mV after 30 s, and results in a decrease in the spontaneous spike activity of these cells for 3 h or longer. Both types of responses are contingent on the occurrence of bag cell activity, they depend on prolonged bag cell activity for their normal expression, and they occur in the absence of the fast interactions characteristic of conventional synapses. 4. The results reveal at the level of intracellular recordings prolonged actions of peptide-secreting neuroendocrine cells on the central nervous system. The role of ELH as a putative mediator of one or more of these actions is discussed.
| |
15 Feb 2021
Ireland’s spectacular Killarney National Park has become a sister park to majestic Glacier National Park in Montana, USA.
Killarney National Park in scenic County Kerry has become the first Irish national park to join the USA’s Sister Parks Program having been paired with Glacier National Park in Montana.
The pairing will allow for the exchange of ideas about how best to manage the amenities in respect of key issues such as visitor numbers, controlling exotic and invasive species, working with local communities and ecological monitoring.
Killarney National Park is a stunning tapestry of mountains, woods, waterfalls and the world-famous lakes. It is home to the McGillycuddy’s Reeks – Ireland’s highest mountain range – as well as internationally important flora and fauna including native oak woods and red deer.
Within the park sits nineteenth-century Muckross House and Gardens, a great place to begin a visit to the national park and discover a little of the region’s history.
Killarney National Park is one of six national parks in Ireland. Five of them are located in the dramatic landscape of the island’s rugged west, while the sixth lies in the heart of Ireland’s Ancient East.
Connemara National Park, County Galway
In County Donegal in the north-west sits magnificent Glenveagh National Park. At its heart is tranquil Lough Veagh and the gorgeous Glenveagh Castle and gardens dotted with exotic and delicate plants from as far afield as Chile, Madeira and Tasmania.
For a walk on the wild side, Ballycroy National Park should be the destination. Located on the western seaboard in north-west County Mayo, it’s an unspoilt expanse of Atlantic blanket bog and mountainous terrain overlooked by the Nephin Beg mountain range, Ireland’s first designated wilderness area.
Connemara National Park encompasses the beauty of one of Ireland’s most loved landscapes. A mix of mountains, bogs, heaths, grasslands and forests in County Galway, the park encloses fascinating 4,000-year-old megalithic court tombs and is also known for its diversity of bird life.
The unique, lunar-like landscape of The Burren is the star of the Burren National Park in County Clare. The exposed limestone pavement is the dominant feature but there is an abundance and wide variety of flowers in the rock’s cracks and crannies and it is a favourite spot for hikers.
The sixth park is Wicklow National Park, to be found in the mountains in Ireland’s south-east. As well as stunning natural beauty, the park is the location of the extensive ruins of a monastic site at Glendalough. Dating from the sixth century, the site is known as one of the most magical in Ireland. | https://media.ireland.com/en-ie/news-releases/global/killarney-national-park-gets-american-big-sister.aspx |
Subject of the research was to which extent satellite-based broadband services could close the current gap in high-speed broadband. For the study, desk research and expert interviews as well as market surveys on retail offerings in 2015 and 2018 were conducted.
The results of the study show that broadband via satellite still is a high-priced niche product in 2018. Technical disadvantages such as high latency times, additional high installation costs for the end user and higher monthly prices in comparison to VDSL as well as lower bandwidths and/or data volumes continue to play a role in further penetration.
Technical developments such as LEO satellite constellations and reusable rockets of e.g. SpaceX could reduce the costs, capacity bottlenecks and latencies of satellite networks. Since no implementation projects for these new technologies have been fully completed until now, the advantages have not yet been proven in practice. In order to determine the future relevance of broadband services via satellite, the technological developments need an ongoing observation.
Diskussion Paper is available for download.
- Files: | https://www.wik.org/en/diskussionsbeitragsliste/detail-view-discussions?tx_ttnews%5BbackPid%5D=93&tx_ttnews%5Btt_news%5D=2223&cHash=b99ab8db070152d1d387fbbbf9e21c66 |
Jos Buttler Q&A
How do you approach setting targets for yourself?
I look at the calendar and pick out key moments and targets. For example, there’s a T20 world cup in October and November which will be my main goal. Then I build a process of how to work back from that point to really target being at my best.
Do you have a specific process for hitting these targets?
Accountability. I write down my targets and then I map out how I think I’m going to get there. I don’t make specific goals on number of runs scored or career milestones, I focus on the way I am technically performing. This is the most helpful thing I do to improve my game.
What do you consider when mentally preparing for training?
Firstly, I feel it’s important to set my goals and my training to be challenging but attainable if I work hard.
The mental element of the game of cricket is crucially important and I want my training push me to my limits mentally, so I can learn and grow from the experiences.
I underpin that by using mental visualisation techniques in preparation for training and use meditation as a tool around my programme to support progress.
What effect does this preparation have on your training?
It allows me to train in my best possible state for any session that I’m going to practice, be it cricket or strength work in the gym, or conditioning on a bike.
Having a strong mentality and mindset enables me to be flexible and adaptable for varied sessions, making sure I get the most out of the exercises that I’m going into.
How do you persevere through times where luck doesn’t seem to be on your side?
Luck will come and go, good times will come and go, but if I’m giving myself the best possible chance to perform, that’s how I’ll judge myself. My method is to make sure that I’m not taking any shortcuts or expecting to get the results without putting in the work.
Do you have any advice to give to other athletes on how to stick to their targets they set themselves?
Write things down, your targets, your work and your results. Personally, I’ve always found that a really useful method. Have those targets in a clear place so you can remind yourself exactly what they are each day. Also have a plan that challenges you but is achievable.
Ask yourself “How am I going to get there?”. Keep in mind that your plan can change as you work towards your targets, keep reviewing as you go along to make sure that you can adapt the plan as needed to help stick to those targets.
What does Better Never Stops mean to you?
For me it means that constant pursuit of excellence. My ambition is to fulfil my potential and become the best cricketer I can possibly be. To do that, better never stops. | https://au.castore.com/blogs/journal/jos-buttler-q-a |
KOTA KINABALU: More engagements are needed to restore Sabah and Sarawak’s desire for 35% of the parliamentary seats in the Dewan Rakyat, says Datuk Seri Dr Maximus Ongkili.
The Minister in the Prime Minister’s Department (Sabah and Sarawak Affairs) said the two states’ push for the matter was among the key issues discussed at the 5th Special Council on Malaysia Agreement 1963 (MKMA63) meeting in Putrajaya on Thursday (Sept 8).
In a statement, he added that the issue was deliberated and endorsed by the MKMA63.
“However, more engagements are required pertaining to the issue, especially among serving Borneo legislators and legal practitioners,” said Ongkili after the meeting chaired by Prime Minister Datuk Seri Ismail Sabri Yaakob.
The Kota Marudu MP said lawmakers from Sabah and Sarawak have demanded for a review on the number of parliamentary seats for both states.
“In 1963, Sabah had 16 seats, Sarawak 24 and Singapore 15, representing 35% from the overall 159 parliamentary seats, while the remaining 65% or 104 seats were Malaya’s. Malaya does not possess the two-thirds majority alone.
“So when Singapore left Malaysia in 1965, the seats belonging to Singapore should be given to Sabah and Sarawak, to meet the 35% representation,” he said.
Ongkili, who is also Parti Bersatu Sabah president, added that the proposed restoration of seats had been endorsed by Parliament’s Special Select Committee in 2012.
He said that the ultimate task was to convince the Election Commission but stressed that the issue should be pushed because it is another restoration in accordance with the MA63.
Based on the current calculation, of the 222 parliamentary seats, 166 or 75% were in Peninsular Malaysia while the remaining 25% or 56 seats were for the Borneo states, with Sarawak having 31 seats and Sabah 25.
On another matter, the Health Ministry disclosed that efforts are ongoing to beef up its services in Sabah and Sarawak.
Its minister Khairy Jamaluddin briefed the committee – consisting of Sabah Chief Minister Datuk Seri Hajiji Noor, Sarawak Premier Tan Sri Abang Johari Openg, senior federal and state ministers as well as officials – that both Sabah and Sarawak can expect additional doctors and nurses soon, as well as other medical facilities.
“Also on the pipeline are plans to repair dilapidated hospitals and clinics in both states, and to ensure there are sufficient numbers of specialists at all healthcare outlets,” Khairy said. | https://www.klweek.com/local/ongkili-more-discussions-needed-for-sabah-sarawaks-push-for-35-of-parliamentary-seats/ |
PHILADELPHIA -- The Republican Party platform, finalized Monday, pledges to clean up Superfund sites and brownfields, protect personal property rights, and rewrite the Endangered Species Act.
Support for proposals to open the Arctic National Wildlife Refuge to oil drilling and to build a permanent nuclear waste repository in Nevada were among several items that drew criticism not only from environmentalists, but by some Republican party members.
Delegates to the convention voted Monday to approve this final version of the party's official position on a variety of important campaign issues. The platform is almost identical to a draft released last week that closely follows the policies of presumptive Republican presidential candidate George W. Bush. Quotes by the current Texas governor are scattered throughout the platform, emphasizing the party’s unified backing of their presidential hopeful.
The largely conservative platform praises the progress of the past three decades in cleaning water and air, protecting endangered species, and restoring wetlands. It emphasizes partnerships with private citizens and companies, and promotes technological innovations to solve environmental problems.
"The way current laws have been implemented has often fostered costly litigation and discouraged personal innovation in environmental conservation," the document reads. "We need to get back on a common track, so that both the people and their government can jointly focus on the real problems at hand."
"We believe the government's main role should be to provide market based incentives to innovate and develop the new technologies for Americans to meet - and exceed - environmental standards," the platform continues. "We condemn the current administration's policy of resorting to confrontation first. Instead we should work cooperatively to ensure that our environmental policy meets the particular needs of geographic regions and localities. Environmental policy should focus on achieving results - cleaner air, water, and lands - not crafting bureaucratic processes. Where environmental standards are violated, the government should take consistent enforcement."
Touting Bush’s environmental record, the platform points to examples of environmental improvements in Texas during his administration. "Under Governor Bush, the number of brownfield sites restored to productive use climbed from zero to 451, not only improving the environment but restoring more than $200 million in property value to local tax rolls, most of it in poor communities," the platform says. Cleaning up brownfields, lightly polluted industrial sites, as well as highly polluted Superfund sites is a cornerstone of the Republican platform.
"We will replicate Governor Bush's success on the national level," the platform says. "We will use Superfund resources to actually clean up places where people live and labor, rather than waste it on costly litigation. The old approach of mandate, regulate, and litigate has sent potential developers away from brownfield neighborhoods. The result: no new businesses, no new jobs - only dirty and dangerous sites."
Protecting property rights has been an ongoing theme of Republican opposition to federal protections for wild lands, and the platform continues this message. "We link the security of private property to our environmental agenda for the best of reasons: Environmental stewardship has best advanced where property is privately held," the document says. "Conversely, the world's worst cases of environmental degradation have occurred in places where most property is under government control. For reasons both constitutional and environmental, therefore, we will safeguard private property rights by enforcing the Takings Clause of the Fifth Amendment and by providing just compensation whenever private property is needed to achieve a compelling public purpose." | https://www.wired.com/2000/08/gop-environment-positions-chided/ |
Public health officials are investigating reported incidents of increasing Cyclospora infections that appear to be linked with consumption of McDonald’s salads according to a recent statement offered up by the Iowa Department of Public Health. According to their recent findings on the ongoing matter, similar incidences have been reported by the Illinois Department of Public Health, meaning that this could be a widespread issue concerning the food sourcing on this particular menu item from the fast food franchise.
Illness related to Cyclospora infections can be quite serious, taking months to resolve in some cases even with proper medical treatment. Symptoms can include but are certainly not limited to: frequent and watery diarrhea, loss of weight and appetite, cramping and gas pain, nausea and vomiting, generalized fatigue and a low-grade fever.
The salads in question may have been the point of origin for an infectious outbreak that has made over 15 people in Iowa ill thus far, along with another 90 reported in Illinois according to Business Insider. Illinois public health officials had mentioned that fully one quarter of the patients being treated currently had eaten a McDonald’s salad just before getting sick. Health officials are, however, also investigating other potential causes.
“Although a link has been made to salads sold in McDonald’s restaurants in some Illinois cases, public health officials continue to investigate other sources,” said the director of the Illinois Department of Public Health, Nirav D. Shah. “If you ate a salad from McDonald’s since mid-May and developed diarrhea and fatigue, contact a health care provider about testing and treatment.”
McDonald’s is quite obviously concerned about the situation and has agreed to offer their full cooperation in investigating the matter, working with federal officials to determine what further steps may be necessary and to determine whether or not it was in fact their supply chain that is to blame. The fast food titan is currently co-operating particularly with the CDC and FDA according to CNN, in addition to taking some pre-emptive steps in the name of caution.
Some McDonald’s locations, particularly in affected areas, will be removing the salad from their menu options for a temporary period of time until investigations can produce more conclusive results according to an email sent out by the quick-service chain.
“Out of an abundance of caution, we decided to voluntarily stop selling salads at impacted restaurants until we can switch to another lettuce blend supplier. We are in the process of removing existing salad blend from identified restaurants and distribution centers – which includes approximately 3,000 of our U.S. restaurants primarily located in the Midwest.”
McDonald’s is not the only major brand being affected by alleged cyclospora parasite problems, with fruit and produce vendor Del Monte having recently been linked to an outbreak of the same illness – contamination having been linked to their packaged vegetable trays.
A newly developing rash of individuals falling ill in Texas is also being blamed on the parasite, though officials have no answer as to whether or not it actually can be conclusively said to be cyclospora as yet, and may, in fact, be something closer to common food poisoning. | https://www.inquisitr.com/4983896/mcdonalds-salads-linked-to-cyclospora-illnesses-per-iowa-illinois-departments-of-health/ |
Office HoursMonClosedTue7:30 am --4 pmWed7:30 am --4 pmThu7:30 am -- 4 pmFri7:30 am -- 4 pmSat7:30 am -- 4 pmSunClosedOur office opens from Tuesdays to Saturdays 7:30 am to 4 pm, will be closed on Memorial day, Independent day, Labor day, Thanksgiving day, Christmas and New year.
-
-
-
-
-
Recent Posts
- How To Help Dependence on Hydrocodone and Other Opioid Pain Medication With Acupuncture and TCM
- Chinese New Year 2023 Year of the Rabbit
- How to Treat Constipation With Acupuncture and TCM
- How to Treat Colitis With Acupuncture and TCM
- How to Treat Aphasia With Acupuncture and TCM (Scalp Acupuncture)
- How to Treat Bronchitis With Acupuncture and TCM
- How to Treat Anemia With Acupuncture and TCM
- How to Treat Acne With Acupuncture and TCM
- How to Treat Encephalitis With Acupuncture and TCM
- How to Treat Muscular Dystrophy With Acupuncture and TCM
- How to Treat Occipital Neuralgia With Acupuncture and TCM
- How to Treat Morton’s Neuroma With Acupuncture and TCM
-
- Sign up to receive news and updates and get my free report:“The Top 10 Reasons to Try Acupuncture”
-
December 2022 M T W T F S S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31
Latest Articles:
- • Tips to Manage Fall Allergy Season •
- • Fall’s Best Comfort Food •
- • 3 Tips to Keep Mentally Healthy in Fall •
Stress
How to Treat Acne With Acupuncture and TCM
By Xiaomei Cai, L.Ac., Ph.D. & Qineng Tan, L.Ac., Ph.D.
Acne breakout, pimples, blackheads? Painful cystic acne and acne scars can affect your confidence and even lead to depression. Acupuncture and TCM provide an alternative skin care option to treat hormonal acne and clear up blemishes.
What causes acne? Acne is a skin condition in which bumps on skin form when hair follicles become clogged with dirt and oil. Sebum, the natural oil produced by skin glands, builds up in the pores and causes blockages. Pimples may appear on the face or other parts of the body (back acne, chest acne, bumps on arms, pimples on scalp/scalp acne, etc.).
Acne is most common during the teenage years, but people of any age can experience skin breakouts. Acne is also influenced by fluctuations in hormones, reactions to cosmetics or foods, weather, and perhaps most commonly, stress.
Rosacea is another skin condition that typically causes redness, flushing, and visible blood vessels on the skin, but it can also cause red bumps to break out, similar to acne. This is known as “acne rosacea.”
Everyone gets a few pimples at some point in their lives. However, severe acne that causes scarring can have a serious impact on a person’s confidence in daily life, as well as being physically painful.
There are many types of products and acne medication available, both over the counter or with a prescription, including: benzoyl peroxide, retinol for acne cream, acne patch, and acne face wash.
Topical treatment for acne may clear blemishes on a skin-deep level. Acupuncture and other TCM skin treatments can help get rid of acne and other skin problems, like rosacea, by addressing the root causes: hormonal imbalances, inflammation, and stress.
Types of Acne
Acne blemishes can show up in different forms. The most commons types of acne include:
- Whiteheads – small, closed, white bumps that develop when a pore is clogged
- Blackheads – open bumps that are filled with oil and dead skin
- Red bumps on skin – papules are hard, red, inflamed bumps on skin
- Pustules – a papule that has a pus-filled tip
- Nodules – large, painful red bumps
- Fungal acne or bacterial acne – when red bumps are caused by bacteria or yeast clogging the follicles
- Acne rosacea – rosacea can cause acne-like breakouts in addition to red flushing
- Cysts or Cystic acne – large, painful, nodules that are deep down, under many layers of skin
Cystic acne is considered to be the most severe type of acne. The deep, inflamed cysts can get very big, last a long time, and leave permanent scars. Cystic acne may be genetic, as it tends to run in families.
Hormonal acne, which is also called “adult acne,” occurs because fluctuations in reproductive hormones like progesterone and estrogen and the stress hormone cortisol stimulate the overproduction of sebum. This kind of acne is most common among women in their 20s through their 40s.
Many women have breakouts that occur cyclically, coinciding with their PMS week or their period. Women may also experience pregnancy acne during the postpartum period. Women over 40 may have unexpected patches of pimples during perimenopause and menopause. Acne is also common among women with PCOS (polycystic ovarian syndrome).
Advanced Dermatology Acne Treatment
Dermatologists have tools that allow them to help remove pimples, known as acne extraction or blackhead extractions. Injections of corticosteroids can help reduce inflamed blemishes. Laser resurfacing can help minimize acne scarring.
A dermatologist can also provide acne medication. Cystic acne and hormonal acne will usually be treated with oral birth control pills to help manage hormone levels. Spironolactone is also sometimes prescribed; this is a diuretic, usually used to treat high blood pressure, that also has an effect on the hormones that control oil secretions.
Isotretinoin, also known as Accutane, is a medication used to treat severe acne, cystic acne, or nodules. Antibiotics are usually prescribed to help clear bacterial acne or fungal acne.
Many of these courses of treatment can cause unwanted side effects, and they do not get to the root cause of the hormone imbalance or internal toxicity.
TCM and acupuncture provide a way to get rid of acne that works from the inside out.
Can Acupuncture Help Acne?
According to TCM theory, skin problems reflect imbalances that originate deeper in the body. Heat and dampness are pathogenic forces that can take root in the organ systems. When heat “overflows” due to imbalances in the digestive or reproductive organs, the body tries to release some of the excess by allowing it to erupt out of the skin.
Acupuncture for acne can both help at the deeper, root level and on the surface of the skin.
We use meridian acupuncture points to target the internal organs that are creating toxic levels of heat or producing too much of some hormone. Then, we also use needles to stimulate the localized areas of the skin that are affected by the breakout and encourage healing.
Acupuncture treatment for acne will often focus on clearing heat from the stomach, intestines, liver, and lungs. This will help lead to fewer breakouts.
Acupuncture needles can be placed on the face where blemishes occur. The tiny “wounds” created by the very thin needles bring blood flow to the area and encourage the body’s repair and rebuilding mechanisms. The thin needles create a micro-trauma that brings blood flow to the area and encourages the body’s repair and rebuilding mechanisms to kick in. This is why acupuncture is also effective as an anti-aging treatment and a good alternative to botox injections.
One study showed a 94% effective rate for patients given 10 sessions of acupuncture for acne. A systematic review of acupuncture treatment for acne concluded that TCM offered an alternative with fewer side effects than conventional medical treatment.
TCM skin care for acne is highly individualized. An acupuncturist finds clues about which organ system is out of balance by observing the placement and appearance of recurrent breakouts, in addition to other symptoms related to digestion, hormone cycles, and emotional health. Cupping is another TCM treatment that can help draw out toxins and excess heat and improve circulation. Herbal supplements and dietary recommendations will be based on each person’s individual situation.
Top 3 Tips to Get Rid of Acne Naturally
Reducing stress is probably the most important thing you can do to help stop breakouts from happening. It is also generally advisable to avoid or limit spicy or greasy foods. Here are some of our best tips for clear skin.
- Start your day by drinking a cup of warm water with slices of lemon.
- Eat cooling foods and avoid foods that produce heat. Melons, mung beans, and radishes are top choices, along with lots of greens and purple-blue berries and plums.
- Try a homemade skin mask made from cooked, mashed dandelion greens. Apply for 20 minutes to get rid of blemishes and redness. Dandelion is a natural antibacterial and antifungal herb and is also good for the liver.
Acupuncture Near Me for Acne in West Los Angeles
Acne affects almost everyone at some point in their life. Breakouts can have a negative impact on your self-esteem, especially when we live in a culture that is so focused on appearances. The best acne treatment involves reduction of stress and inflammation, good nutrition, and restoring internal balance. At Art of Wellness we have over 30 years of experience helping patients heal skin conditions of all kinds.
*This article is for education from the perspective of Traditional Chinese Medicine only. The education provided by this article is not approved by FDA to diagnose, prevent, treat and cure human diseases. It should not stop you from consulting with your physician for your medical conditions. Traditional Chinese Medicine is based on Qi, which is an invisible force that usually cannot be observed by modern science. Because science focuses on testing ideas about the natural world with evidence obtained through observation, these aspects of acupuncture can’t be studied by science. Therefore acupuncture and Chinese herbs are often not supported by double-blind, randomized trials, and they are considered alternative medicine therapies in the United States.
How to Treat Encephalitis With Acupuncture and TCM
By Xiaomei Cai, L.Ac., Ph.D. & Qineng Tan, L.Ac., Ph.D.
Headache, sensitivity to light, stiff neck, short-term memory loss? These could be signs of encephalitis, or inflammation in the brain. Infectious encephalitis can happen due to an infection; autoimmune encephalitis (AIE) is a type of autoimmune disorder. Acupuncture and TCM offer an adjunct treatment for encephalitis recovery.
What is encephalitis? Encephalitis refers to a serious condition in which the tissues of the brain become inflamed. It can happen to anyone, but is more common among children and older people.
The symptoms of encephalitis are sometimes ignored, because headaches, neck pain, and “brain fog” are so common and may not seem that serious at first. However, in combination, these signs should not be taken lightly. Like meningitis (inflammation of the membrane surrounding the brain and spinal cord), encephalitis can cause serious complications if left untreated. Encephalitis needs to be caught early and treated in order for people to make a full recovery.
What causes encephalitis? Brain inflammation can be caused by the body’s immune response to an infection, or due to an autoimmune disorder, in which the body produces antibodies that attack the brain tissues.
Top 10 Causes of Encephalitis
Viral infections are the primary reason that people develop encephalitis. These could be viruses carried by insects, especially mosquitoes, which are then contracted by humans through bites. Other communicable viral infections that pass from person to person through bodily fluids or close contact can also cause infectious encephalitis.
Infections that can lead to encephalitis include:
- Mosquito-borne viruses such as: West Nile Virus, Eastern Equine encephalitis, Western Equine encephalitis, St. Louis encephalitis, LaCrosse encephalitis
- Tick-borne viruses
- Rabies virus – can be contracted through being bitten by an infected animal
- Polio virus
- Herpes Simplex, Type 1 and Type 2 (HPV1 and HPV2)
- Epstein-Barr virus (mono, mononucleosis)
- Varicella Oster virus (chicken pox, shingles)
- Measles (rubeola)
- German measles (rubella)
- Mumps
There have been cases of people developing encephalitis as a complication of a COVID-19 infection.
Some cases of encephalitis can be caused by bacterial or fungal infections, or by a parasite. It could also be caused by exposure to some sort of allergen or toxin in the environment.
People with weakened immune systems—for example, due to HIV/AIDs—or who take immunosuppressant medications are at a higher risk for developing encephalitis.
Immunotherapy used to treat certain kinds of cancer, such as melanoma, ovarian cancer or lung cancer, has been shown to cause encephalitis in some cases.
Some cases of autoimmune encephalitis, called Anti-NMDAR encephalitis, appear to be related to a certain kind of tumor called a teteroma. In women and young women, especially, this can be an ovarian tumor that produces the antibodies for NMDAR.
Symptoms of Encephalitis
A mild case of encephalitis might only cause some flu-like symptoms that clear up within a few weeks. These types of symptoms include:
- Headache
- Stiff neck, neck pain
- Muscle aches, joint pain
- Fever
- Fatigue, feeling tired and weak
- Sensitivity to light
More severe symptoms of encephalitis can affect both cognitive and motor function:
- Mental confusion, brain fog, difficulty concentrating
- Memory problems, short term memory loss
- Hallucinations
- Seizures
- Severe headache
- Trouble with coordination or balance
- Loss of sensations in parts of the body or face
- Loss of muscle control in parts of the body or face
- Problems with speaking or hearing
- Mood swings, changes in personality
Anti-NMDAR encephalitis (when there may be an ovarian tumor involved, especially) can cause symptoms like pro-domal headache, nausea, and fever, which may then progress to more severe complications, including involuntary movements or tremors, urinary incontinence, rapid heartbeat, and psychiatric symptoms like anxiety, paranoia, or mania.
In severe cases, encephalitis can cause loss of consciousness and even cause a person to go into a coma. It is very important to seek urgent medical attention if you experience any of these symptoms.
Treatment for Encephalitis
Blood tests can confirm whether a viral or bacterial infection is causing encephalitis. Imaging tests like an MRI or CT scan may show the inflammation in the brain. A spinal tap may show an imbalance in cerebral fluids, or an EEG may show unusual electrical impulses in the brain.
However, there are times when these tests will not show exactly what is causing the encephalitis. As with many autoimmune disorders, it can be hard to pinpoint a clear diagnosis for autoimmune encephalitis (AIE).
Medical treatment for encephalitis will depend on what type it is determined to be. Mild inflammation will usually be treated with over the counter anti-inflammatory medications. Antivirals or antibiotics will be prescribed if a specific infection is found to be the cause. Steroids will often be used to help reduce inflammation. In more serious cases, a person may require breathing assistance or anti-seizure medications.
In cases where the cause is believed to be an autoimmune response, immunotherapy is used to try to interfere with the antibodies that are attacking the brain tissues. Steroids will be usually used in combination with other treatments. Plasmapheresis, or plasma exchange, removes some of these antibodies from the blood. Intravenous immunoglobulin therapy introduces healthy antibodies to block the action of the malfunctioning antibodies.
In cases of anti-NMDAR encephalitis where a tumor is present, treatment will include the removal of the tumor in addition to immunotherapy. Patients with this type of encephalitis may also be prescribed antipsychotic drugs to relieve psychiatric symptoms.
Immunotherapy works for some patients, but not all. Many patients will be offered second-line treatments such as monoclonal antibodies or antimetabolites. In some cases, people may seem to recover from encephalitis for a while, and then have a relapse in which the inflammation flares up again.
Most people will need significant time and rehabilitation to help them make a full recovery from encephalitis. Some people will have long-lasting effects, such as memory problems, balance and coordination issues, speech problems, and emotional volatility.
Many of the pharmaceutical treatments available for encephalitis cause significant side effects and can even lead to more physical, emotional and mental health issues. Fortunately, acupuncture and other TCM modalities offer a way to reduce inflammation in the brain and help relieve encephalitis, as well as helping to offset any side effects from other medical interventions.
Can Acupuncture Help Encephalitis?
With acupuncture and Chinese herbs, we seek to treat the root cause and the various symptoms and complications of each condition according to recognizable patterns. This allows us to effectively treat some conditions, such as autoimmune diseases, neurological disorders, and inflammatory conditions that may not readily respond to conventional medicine.
In the TCM view, inflammation occurs because there is too much heat in the body. Yang energy provides the “fire” we need to keep the body warm and energetic. But, if there is an imbalance, and too much heat, this leads to conditions like fever, infections, and inflammation. So, we see pathogenic internal heat as contributing to encephalitis, in addition to outside pathogens like viruses or bacteria. To clear heat that is trapped or stagnant in the body, we will use specific herbs and cooling foods, along with acupuncture treatment and lifestyle changes to reduce physical and mental stress. TCM herbs can also be highly effective against bacterial and viral infections.
The motor control and cognitive problems that can result from encephalitis occur because the inflammation in the brain is affecting the functioning of the central nervous system. With acupuncture, we can help to reestablish connections and neural pathways.
Autoimmune disorders are still not well understood by Western medicine, but with acupuncture we can help to balance and regulate the immune system, so that it is not being inappropriately triggered. This is why acupuncture works well as an adjunct treatment for encephalitis and many other autoimmune disorders.
Acupuncture Near Me for Encephalitis in Los Angeles and West Los Angeles
It can be very difficult when you or someone you love is facing a serious illness and a long, difficult recovery. TCM offers a healthcare option that treats each person in a highly individualized and caring way. At Art of Wellness, we have over 30 years of experience helping people gain back their strength and mobility after suffering from conditions like encephalitis, meningitis, Lyme disease, Guillain Barré Syndrome, Myasthenia Gravis, and many others.
*This article is for education from the perspective of Traditional Chinese Medicine only. The education provided by this article is not approved by FDA to diagnose, prevent, treat and cure human diseases. It should not stop you from consulting with your physician for your medical conditions. Traditional Chinese Medicine is based on Qi, which is an invisible force that usually cannot be observed by modern science. Because science focuses on testing ideas about the natural world with evidence obtained through observation, these aspects of acupuncture can’t be studied by science. Therefore acupuncture and Chinese herbs are often not supported by double-blind, randomized trials, and they are considered alternative medicine therapies in the United States.
How to Treat Chronic Fatigue Syndrome With Acupuncture and TCM
By Xiaomei Cai, L.Ac., Ph.D. & Qineng Tan, L.Ac., Ph.D.
Chronic fatigue syndrome (CFS), also known as myalgic encephalitis (ME/CFS), is a condition marked by extreme fatigue that doesn’t get better, even with rest, and gets worse with physical and mental exertion. Chronic fatigue is not well understood by medical science, but acupuncture and Chinese medicine for chronic fatigue syndrome symptoms can be an effective treatment option.
People with chronic fatigue syndrome are always tired, even after getting a normal amount of sleep, and the condition persists for weeks, months, or years. Other chronic fatigue symptoms include body aches, cognitive problems, vision problems, and emotional or mental health problems, like depression and anxiety.
If a person feels tired all the time, with no medical explanation, for six months or more, and has several other chronic fatigue syndrome symptoms like dizziness, difficulty concentrating, headaches, or sensitivity to light, then they might be diagnosed with CFS, or myalgic encephalitis (ME CFS).
By definition, a syndrome is a collection of symptoms that often appear together in combination, for which the exact explanation is unknown. Chronic fatigue has been considered a syndrome for some time, but has more recently been given the designation of a “disease;” hence, the newer term “myalgic encephalitis,” which refers to muscle pain and inflammation of the brain and spinal cord.
Chronic fatigue syndrome symptoms can be very similar to those of fibromyalgia. People with fibromyalgia also experience severe fatigue, but the primary symptoms of fibromyalgia are musculoskeletal pain that comes and goes all over, especially in “tender points” around the major muscles and joints, along with swelling and inflammation. It is possible to have both ME/CFS and fibromyalgia.
Women are much more likely to have chronic fatigue than men. MECFS can begin to appear at any stage of life, but most usually develops in adulthood. It is estimated that up to 90% of people who have chronic fatigue go undiagnosed.
ME/CFS is a serious and disabling condition that can interfere with even the most basic daily activities. People with chronic fatigue may be able to participate in some events where they exert themselves mentally and/or physically, but afterwards, they will feel completely wiped out and have to take time to recover, often confined to bed. This is called post-exertional malaise (PEM).
Top 10 Chronic Fatigue Syndrome Symptoms
The most common ME/CFS symptoms include:
- Fatigue, tired all the time, weakness
- Sensitivity to light
- Trouble concentrating, hard to focus, memory problems, confusion
- Dizziness, especially when getting up from lying down
- Headaches
- Muscle aches, body ache, muscle weakness, joint pain
- Enlarged lymph nodes in neck or armpit area, sore throat
- Tired after exercise or mental exertion (post-exertional malaise)
- Depression, mood swings, moodiness
- Insomnia, sleep problems
Other signs of chronic fatigue syndrome may include: fever, abdominal pain, weight loss or weight gain, allergies, rash, rapid heart beat, and night sweats/hot flashes.
What Causes Chronic Fatigue?
The cause of ME/CFS is not known. Immune system dysfunction, the aftereffects of having a virus, and psychological factors have all been associated with the development of chronic fatigue.
Some people begin to have symptoms of chronic fatigue after having a viral infection, such as Epstein Barr, mononucleosis, or herpes.
While it does seem that some people who suffer from CFS also have immune system problems, chronic fatigue is not considered to be an autoimmune disorder in and of itself. As with other conditions like lupus or fibromyalgia, CFS sometimes appears after a person has gone through some sort of emotional trauma or physical injury.
Some people with chronic fatigue have hormone imbalances related to pituitary hormone, adrenal hormone, or hypothalamus hormones, but it is not understood how these might be related to their condition. Diabetes, anemia, or hypothyroidism can also create hormonal imbalances that can contribute to chronic fatigue.
In some cases, chronic fatigue could be due to a sleep disorder, such as sleep apnea or chronic insomnia. Long-standing mental health issues like depression, anxiety, or PTSD can interfere with sleep and hormone responses, contributing to the chronic fatigue syndrome symptoms.
Treatment for Chronic Fatigue Syndrome Symptoms
There is no clear treatment protocol within conventional Western medicine for ME/CFS. A doctor may diagnose myalgic encephalitis if they have ruled out other possibilities and then try to recommend medications or various types of therapy to help people deal with the symptoms of chronic fatigue.
Pain relievers or NSAIDs will often be the standard recommendation for handling ME/CFS related pain like headaches or muscles aches.
Doctors may prescribe antidepressants as a way of helping patients cope with depression and anxiety related to chronic fatigue. However, these medications can sometimes cause side effects that will exacerbate the chronic fatigue rather than helping it.
Some doctors have tried treating CFS with antiviral medications, corticosteroids, or thyroid hormone medications. None of the pharmacological interventions that have been used to treat chronic fatigue syndrome have proved to be very effective.
Thus, many patients with ME/CFS consider turning to alternative medicine or complementary therapies to relieve CFS symptoms. Acupuncture is now widely recognized as an alternative therapy for chronic fatigue.
Can Acupuncture and Chinese Medicine Help Chronic Fatigue Syndrome?
Traditional Chinese medicine is well suited to treatment for ME/CFS. Overall, TCM philosophy pays close attention to the subtle balance of energy, known as Qi, within the body as a whole, as well as within the various organ systems. By observing the specific symptoms each person experiences as part of chronic fatigue syndrome, we can pinpoint which organ systems are deficient and need strengthening.
Classic TCM patterns related to chronic fatigue diagnosis include:
- Spleen Qi deficiency
- Liver Qi stagnation
- Kidney deficiency
- Yin deficiency
- Heat toxicity
- Phlegm obstruction/dampness
Latent heat and dampness are sometimes the long-term effects of a viral infection or other illness, or a long period of emotional stress. These conditions originate from an external pathogenic factor, but then cause a series of imbalances which weaken the kidneys and other organs over time. Acupuncture treatment and herbs can help reduce inflammation and strengthen Qi.
A TCM doctor will choose acupuncture points and a combination of herbs that will help harmonize the affected systems. With herbs, we are able to get nutrients into the body beyond what you can do with foods alone. A balanced diet that cools heat and tonifies the organs will also be important for recovering strength and energy.
One controlled trial found that four weeks of acupuncture treatment led to improvements in CFS symptoms.
A systematic review of studies regarding acupuncture treatment for ME CFS showed a reduction in the severity of fatigue.
A study using acupuncture and moxibustion treatment for CFS showed a 90% effective rate, with half of the patients feeling that their CFS was “cured.”
Another study involving acupuncture and moxibustion found that the moxa treatment in particular became more and more effective as treatment sessions continued past the 10th treatment. Moxibustion was shown to have an effect on the vagus nerve, which controls the parasympathetic nervous system.
How long it takes to get results from acupuncture treatment for chronic fatigue will vary from person to person, depending on how long the person has been experiencing CFS, and how deeply the organ systems are affected. TCM treatment has a cumulative effect which strengthens over time and several sessions.
Acupuncture Near Me for Chronic Fatigue Syndrome (ME/CFS) in the Los Angeles Area
ME CFS is far more common than statistics show, because many people suffer in silence and invisibility. Now, many people are struggling with chronic fatigue after having COVID-19. TCM modalities like acupuncture, Chinese herbs, and moxibustion, can help relieve fatigue, depression, mental fogginess, poor sleep, and other symptoms of CFS. If you or someone you love has been feeling exhausted for months without improvement, it may be time to consider trying acupuncture for chronic fatigue.
*This article is for education from the perspective of Traditional Chinese Medicine only. The education provided by this article is not approved by FDA to diagnose, prevent, treat and cure human diseases. It should not stop you from consulting with your physician for your medical conditions. Traditional Chinese Medicine is based on Qi, which is an invisible force that usually cannot be observed by modern science. Because science focuses on testing ideas about the natural world with evidence obtained through observation, these aspects of acupuncture can’t be studied by science. Therefore acupuncture and Chinese herbs are often not supported by double-blind, randomized trials, and they are considered alternative medicine therapies in the United States.
How To Treat Claustrophobia Anxiety Disorder With Acupuncture and TCM
By Xiaomei Cai, L.Ac., Ph.D. & Qineng Tan, L.Ac., Ph.D.
Claustrophobia is a specific kind of anxiety disorder in which fear of being in an enclosed space can bring on symptoms similar to those of panic attacks. Claustrophobic feelings like being anxious, hyperventilating, sweating, shaking, and rapid heartbeat can be eased with acupuncture and TCM.
Claustrophobia is actually quite common; at least 10% of people report experiencing some claustrophobic feelings. Women report having a fear of confined spaces more often than men do. Phobias are sometimes rooted in a childhood experience, but they can arise in anyone, at any age, and are considered mental health issues or psychiatric disorders.
Phobias are distinct from regular fears because of their intensity and, to some extent, irrational nature. Phobias are unreasonable fears; feeling very afraid, to the point of physical and emotional distress, of something that isn’t really happening. Claustrophobia becomes a serious mental health problem if it interferes with a person’s daily life or relationships.
Sometimes claustrophobia can get in the way of a person getting help for other health problems. For example, it may cause them to avoid undergoing an MRI. Some people might fear visiting a doctor’s office, which often means facing elevators, public restrooms, and other small rooms without windows. Some women report feeling claustrophobic during pregnancy, as if they are “trapped” inside their own bodies.
Other common triggers of claustrophobia include: airplanes, trains, tunnels, small cars, revolving doors, or amusement park rides with restraints. Even thoughts of having to be trapped in one of these situations can be enough to bring on symptoms of claustrophobia. Signs of claustrophobia can be similar to those of a panic attack.
Top 10 Symptoms of Claustrophobia:
- Sweating
- Shaking or trembling
- Trouble breathing
- Rapid heartbeat, fast heart rate, high blood pressure
- Tight feeling in chest, chest pain
- Flushed face, feeling hot
- Dizziness, feeling lightheaded or faint
- Ringing in ears, tinnitus
- Butterflies in stomach feeling, nausea, queasy feeling
- Numbness or tingling in parts of the body
Other signs of anxiety due to claustrophobia could include: dry mouth, difficulty swallowing, choking, chills, confusion, or disorientation. In addition to physical symptoms of panic, claustrophobia may cause a person to cry, yell, or to be overwhelmed by a desire to get out of a situation because they feel that they are in serious danger, even if it seems irrational.
Cleithrophobia is another type of anxiety disorder that is sometimes confused with claustrophobia. Cleithrophobia specifically refers to the fear of being trapped or confined with no way to escape. Claustrophobia is a fear of the small space itself. These two phobias can exist together. Either one could cause serious anticipatory anxiety, for example, if a person has to have an MRI.
Cleithrophobia is related to other “winter phobias,” which may include “cabin fever,” which is a sense that one is stuck inside, or a fear of being literally trapped in the ice or snow. Many people feel an extra sense of sadness or dread during the winter months; this kind of depression is known as SAD (seasonal affective disorder).
Over time, repeated panic attacks or bouts of intense anxiety brought on by claustrophobia can create long-term stress that is harmful to overall physical and mental health. Acupuncture and TCM offer an adjunct or alternative treatment for claustrophobia which can help reduce symptoms and offset the effects of stress.
What Causes Claustrophobia?
Phobias can be triggered by some event or experience in which a person felt endangered and was traumatized, similar to PTSD (post-traumatic stress disorder). Like other mental health conditions, claustrophobia is influenced by brain chemistry. Imbalances in the neurotransmitters in the brain can cause some people to experience symptoms of anxiety or panic attacks even if nothing scary is really happening. Then, they may associate those physical and emotional feelings with a specific place or situation, which causes the anxiety to be triggered whenever they approach that place or even think of that situation.
People can perceive things differently. One research study suggested that people with claustrophobia may have a different perception of how near something, like a wall, is to them. In other words, they underestimate distances, or their sense of “personal space” is different from other people’s.
The amygdala is the part of the brain that processes incoming sensory information from the environment and signals the autonomous nervous system if it detects danger. This is essentially the neurological pathway of fear. Some research has suggested that people who experience panic disorders are more likely to have a smaller-than-average amygdala.
Treatment for Claustrophobia
To be diagnosed with claustrophobia, a person will need to explain to their doctor that they have been having these intense feelings for a while and that they are having a negative impact on their lives. This could mean that they go out of their way to avoid certain places or situations. A mental health professional will try to determine whether these fears are normal, or could be attributed to some other condition.
Some doctors may prescribe SSRIs like Zoloft or Lexapro, which influence serotonin levels in the brain, to help patients who are suffering from claustrophobia or anxiety. Often therapy is recommended to help patients learn to cope with their feelings. Cognitive behavioral therapy (CBT) and/or exposure therapy aim to retrain the mind and may help people learn to get used to being in a small space without feeling so anxious.
Psychiatric medications can have unwanted side effects and may create a sense of dependence. Some people will avoid therapy because it can be very confronting and become another source of fear.
Acupuncture and other TCM modalities, including herbs and movement techniques like Tai Chi, may offer an alternative solution for panic attacks due to claustrophobia, without side effects or having to work through the problem with uncomfortable talk therapy sessions.
Can Acupuncture Help Claustrophobia?
According to TCM, the organ systems closely associated with fear are those of the kidneys, liver, and heart. Kidney deficiency, in particular, can cause fear and mental disturbances. These types of mental disorders can also be related to imbalances in Yin and Yang energies, and blood deficiencies. An acupuncture practitioner’s approach to treatment for claustrophobia may, therefore, focus on strengthening and nourishing the kidneys, while soothing the liver and heart.
One study compared patients who knew they had claustrophobic feelings going into an MRI; some were treated with acupuncture based on TCM acupoints. Control groups patients were given sham acupuncture (not really the points that would correspond with TCM theory). They concluded that the real acupuncture treatment did offer a therapeutic effect for claustrophobia, with a 92% rate of effectiveness; meaning, the patients were able to remain calm during the MRI.
A case study of a woman who had experienced bouts of claustrophobic symptoms since her teenage years, including shortness of breath, trembling, sweating, and loss of motor control in her hands and feet. After six acupuncture treatment sessions, she reported much improvement: feeling calmer, no headaches, palpitations, or anxiety. Chinese herbs can also be used, in conjunction with acupuncture treatment, help a person overcome claustrophobia.
Acupressure Points for Claustrophobia
In between acupuncture sessions, you can use self-care acupressure to relieve claustrophobia.
Shen Men is a Master point, located in the valley of the upper part of the ear. This is a classic point to help feelings of anxiety.
Shoujie, which is located on the palm of the hand between the metacarpals of the fourth and fifth fingers, along the topmost crease, helps relieve palpitations and dizziness.
Acupuncture for Claustrophobia Near Me in Los Angeles Area
TCM is an excellent way for people to find relief from mental health issues of all kinds, including depression, anxiety, panic attacks, and phobias. We will do all we can to make sure that you are comfortable in one of our larger treatment rooms with a window, and to make your acupuncture treatment experience relaxing and pain-free. If you or someone you know is finding that the thought of enclosed spaces is creating anxiety in day-to-day life, please do not hesitate to try acupuncture for claustrophobia.
*This article is for education from the perspective of Traditional Chinese Medicine only. The education provided by this article is not approved by FDA to diagnose, prevent, treat and cure human diseases. It should not stop you from consulting with your physician for your medical conditions. Traditional Chinese Medicine is based on Qi, which is an invisible force that usually cannot be observed by modern science. Because science focuses on testing ideas about the natural world with evidence obtained through observation, these aspects of acupuncture can’t be studied by science. Therefore acupuncture and Chinese herbs are often not supported by double-blind, randomized trials, and they are considered alternative medicine therapies in the United States.
How to Treat Huntington’s Disease With Acupuncture and TCM
By Qineng Tan, L.Ac., Ph.D. and Xiaomei Cai, L.Ac., Ph.D.
Huntington’s disease is a rare genetic disorder that causes progressive neurodegenerative disease. A neurological disorder, Huntington’s causes damage to brain cells, which leads to physical symptoms like tremor, cognitive problems, and mental disorders, including feelings of depression.
Signs of Huntington’s disease (HD) can begin to show up at any time after age two, and in some cases, a child may develop juvenile Huntington’s disease. Most often, though, a person does not begin to have symptoms of Huntington’s disease until adulthood, usually when they are in their 30s or 40s. Huntington’s is a progressive disease in which symptoms become increasingly severe over time.
Medical science does not currently have a cure for Huntington’s, nor a treatment that will halt the progression of Huntington’s disease. Patients may receive treatment in the form of medications and physical therapy to help control physical symptoms like shaking hands and involuntary movements. They may also be prescribed psychiatric medications to try to help with depression and anxiety.
Acupuncture and TCM can be an effective adjunct and alternative treatment for Huntington’s disease, helping to protect and stimulate the nervous system. TCM can also help address mental health and emotional disorders, like depression, anxiety, and mood swings.
Huntington’s Disease Symptoms
People with Huntington’s disease may start off having a variety of mild symptoms. Over time, the symptoms may change, with some coming or going, and some getting worse. Signs of Huntington’s disease can be related to involuntary movements of the body, cognitive decline that affects a person’s thinking processes, and psychiatric disorders that cause emotional upset. Some of the most common symptoms of Huntington’s disease include:
- Uncontrollable movements: involuntary jerking of the limbs, or writhing, also known as chorea
- Stiff limbs, muscle stiffness, neck stiffness
- Tremor, shaky hands, difficulty holding things
- Slow or unusual eye movements
- Problems with balance or walking
- Difficulty swallowing
- Speech problems, slurred speech
- Having a hard time focusing on a a task
- Having a hard time finding the right words or processing information
- Getting completely caught up with a task or thought pattern
- Impulsive behavior or emotional outbursts
- Lack of awareness of how one is behaving or one’s own changing abilities
- Feelings of apathy, sadness, depression, suicidal ideation
- Manic behaviors or OCD (obsessive-compulsive disorder)
- Trouble sleeping, insomnia
- Extreme fatigue
- Weight loss
Symptoms of Huntington’s disease worsen gradually over time, until ultimately, a person will need assistance to move and eat.
What Are the 5 Stages of Huntington’s Disease?
Huntington’s is a progressive disorder of the brain that causes symptoms to increase in severity over the course of several years. The progression from experiencing mild symptoms to needing assistance due to disability could take 10 years, or a person might live another 30 years.
Sometimes you will hear doctors refer to 3 stages of Huntington’s Disease, or the following 5 stages:
- Preclinical Stage – during this time, a person with Huntington’s may begin to notice mood swings, irritability, and other emotional and cognitive issues beginning to develop, but they have not yet been diagnosed with Huntington’s.
- Early Stage – as physical symptoms like tremors and trouble with eating and sleeping begin to become more and more noticeable, a person will seek medical help and be diagnosed. At this point, they can still carry on with most normal activities without help.
- Middle Stage – during the middle stages of Huntington’s a person will begin to need assistance with things like driving and domestic tasks, as they may not be able to coordinate movements reliably or think through problems or take in new information.
- Late Stage – as Hungtington’s disease progresses further, a person may have memory loss, dementia, and changes in personality. They will likely be bedridden and need help with eating, possibly requiring a feeding tube because of trouble swallowing.
- End of Life Stage – there comes a point when a person with Huntington’s will need end of life care, either in a hospital or at home, when they will need to be as comfortable as possible. The most common cause of death with Huntington’s is pneumonia, which can happen when a person aspirates food particles into the lungs.
How is Huntington’s Disease Inherited?
Huntington’s disease is a type of autosomal dominant disorder, which means that a person only needs to inherit one dominant gene from one parent in order to inherit this disorder. If a person has HD, there is a 50% chance that they will pass it on to a child. If a child of a person with HD does not inherit the gene, and therefore does not have HD, then that means they will not pass it on to their children. It is rare, but possible, for a person to be born with a new mutation in the specific gene, and so does not actually inherit HD from a parent.
Because HD typically does not begin to show up until close to middle age, some people who know that they may have the genetic mutation will have genetic testing for Huntington’s disease. This test will tell most people whether or not they will begin to develop Huntington’s symptoms as they age. However, there is a “gray area,” in which a person may have some of the mutated sequencing in their genetic makeup, but not enough to necessarily lead to the development of the disease. These people can still pass on the mutation to their children, and they may have a less severe form of Huntington’s, and/or not develop symptoms until later in life.
Can Acupuncture Help Huntington’s Disease?
Scientific research has been demonstrating more and more that acupuncture can help with many conditions by maintaining the health and connectivity of brain cells and nerve cells. Cells are constantly going through processes of generation and degeneration. The stimulation of certain acupoints has been shown to have a positive effect on these processes, which can be beneficial for people with neurological disorders like HD and Parkinson’s.
Even though we know that Huntington’s and Parkinson’s are specifically related to protein production, we also know that disease is not merely about one small, isolated thing happening in the body. We must take the whole person into account. Stress and many other factors also play a role in how a disease affects each individual. Acupuncture can be a helpful modality that reduces stress in the body and facilitates regeneration and protection of cells.
With TCM, we are able to address the physical, mental, and emotional aspects of Huntington’s disease all at the same time.
Chinese herbs have traditionally been used to help symptoms such as tremors, stiff limbs, muscle weakness, and slow movements. While from the medical point of view these problems are related to the nervous system, in TCM theory we also see them as being related to deficiencies in the kidney Qi, and excess wind. Therefore, herbs that help strengthen the Kidneys and dispel wind may be used in different combinations to treat conditions like Huntington’s disease.
Acupuncture treatment has been shown to help reduce tremors and shaky hands. One study showed that Chinese herbal preparations were effective at helping to reduce involuntary movements. Another study showed that herbs helped with the normal production of proteins and brain cell function.
Neurological Treatment With Acupuncture
Acupuncture and TCM can help with many different kinds of neurodegenerative disorders, whether they are caused by genetics, autoimmune disease, or some other neurological problem.
Neurodegenerative diseases cause the degeneration and death of neurons, or brain cells that communicate with the nervous system. In that sense, Huntington’s disease bears some similarities to other neurodegenerative diseases like:
- Parkinson’s disease
- Alzheimer’s disease
- ALS (Lou Gehrig’s disease)
- Spinal muscular atrophy
- Essential Tremor
- Multiple Sclerosis (MS)
- Bell’s Palsy
- Guillain-Barre syndrome
Many of these conditions can be helped with acupuncture, which is known to help improve the health of the brain, nerves, spinal cord, and the electrical impulses that create connectivity and functionality in the movements of the musculoskeletal system. TCM modalities can also help to relieve stress, improve sleep, boost cognitive function, and regulate mood swings.
Acupuncture Near Me for Huntington’s Disease, Los Angeles Area
Huntington’s disease is a progressive illness, and it becomes harder and harder for a person with HD to communicate what they are feeling. People with Huntington’s may experience both physical and emotional pain. Patients with Huntington’s need a caring team of healthcare providers who can help treat the disease, but also help their emotional and mental health.
At Art of Wellness, we have over 30 years of experience helping people with neurodegenerative disorders feel more comfortable and live the fullest life possible.
*This article is for education from the perspective of Traditional Chinese Medicine only. The education provided by this article is not approved by FDA to diagnose, prevent, treat and cure human diseases. It should not stop you from consulting with your physician for your medical conditions. Traditional Chinese Medicine is based on Qi, which is an invisible force that usually cannot be observed by modern science. Because science focuses on testing ideas about the natural world with evidence obtained through observation, these aspects of acupuncture can’t be studied by science. Therefore acupuncture and Chinese herbs are often not supported by double-blind, randomized trials, and they are considered alternative medicine therapies in the United States. | https://myartofwellness.com/category/stress-2/ |
BACKGROUND
Field of Art
Description of the Related Art
The disclosure relates generally to methods of improving treatment for patients who use inhalers, and more specifically to determining a patient's causes of asthma-related rescue events.
Asthma remains a significant and costly public health problem. In the United States, more than 22 million people have the disease. Worldwide, the World Health Organization estimates the population with asthma may be 300 million, and predicts that it will rise to 400 million by 2025.
Despite the development of new medications, rates of hospitalizations and emergency room visits have not declined. Each year in the United States the disease causes approximately 2 million emergency department visits, 500,000 hospitalizations, and 5,000 deaths. In addition, asthma is responsible for an estimated 15 million missed days of school, and 12 million days of work. Total annual costs to US health insurers and employers are greater than $18 billion.
The majority of these exacerbations could be prevented with currently available treatments, however, only 1 in 5 asthmatics has the disease under control. Newly revised national guidelines urge doctors to more closely monitor whether treatment is controlling everyday symptoms and improving quality of life. An increasing number of physicians have begun to use periodic, written questionnaires (such as the Asthma Control Test) to monitor patients and their conditions. These instruments require patients to accurately recall and report the symptoms, frequency of symptoms, inhaler usage, and activity level and restriction over some period of time (usually two to four weeks). As a result, these questionnaires are subject to error introduced by biases (recall), different interpretations of symptoms, and behaviors (non-adherence), and only provide information at the time they are used.
SUMMARY
Generally, medicament devices such as inhalers allow patients to manage respiratory symptoms. Many respiratory disease patients, such as sufferers of asthma, COPD, and cystic fibrosis, have symptoms that are related to environmental triggers and factors such as air quality, weather, land use, and the like. A patient being aware of which environmental triggers and factors affect their symptoms allows the patient to better manage their symptoms and reduce the chances for needing emergency medical care. However, a particular patient or group of patients may have sensitivities to multiple triggers and factors. Knowing which of dozens, hundreds, or more triggers and factors a patient is sensitive to and monitoring those triggers and factors for use in managing symptoms is a complex task and not a reasonable task for many patients and providers to perform manually.
To address this, an asthma analytics system is described that is a unified platform for treating, monitoring, and managing rescue events resulting from asthma. The asthma analytics system tracks asthma rescue medication events by receiving event notifications from a sensor attached to a medicament device (e.g., inhaler) used by a patient who has authorized the asthma analytics system to help manage their asthma. The sensor, when attached to or incorporated in a metered dose inhaler or other medicament device, records the geographical location, time, and date of the rescue usage event, and communicates that information to the asthma analytics system. The asthma analytics system analyzes the received events (both the most recent and previously received events) and over time identifies triggers responsible for causing a patient's rescue usage events and information to guide and manage the triggers in the form of a notification to patients and the healthcare providers.
Triggers are identified using a combination of various potential triggers (also referred to as features), examples of which may include several types of triggers such as information based on a patient's medical history, a historical record of the patient's use of the rescue inhaler unit, the patient's current contextual data, and environmental conditions relating to atmospheric and weather conditions. The relations between these features and trigger identification is embodied in a system implementing a machine learned model and a statistical analysis model. The system is capable of receiving input trigger values for each potential trigger to provide a trigger identification analysis with accurate and medically relevant recommendations to mitigate the risk posed by the trigger.
By ingesting information about the timing, frequency, and location of the usage of the medication along with other contextually relevant feature information, the asthma analytics system helps prevent the occurrence of future asthma rescue usage events by suggesting applicable changes in behavior or environment in advance of any identified triggers. This facilitates better management of an asthma treatment by the patient and their health care provider, and improve recognition of specific locations that precipitate rescue events so that the patient may avoid or accommodate these locations in the future.
BRIEF DESCRIPTION OF DRAWINGS
FIG. 1
shows an asthma analytics system for monitoring accurate, real-time medicament device usage, performing analytics on that data, and providing asthma rescue event risk notifications, according to one embodiment.
FIG. 2
is a high-level block diagram illustrating an example of a computing device used in either as a client device, application server, and/or database server, according to one embodiment.
FIG. 3A
shows a dashboard of a client application that allows a user to interact with an asthma analytics system, according to one embodiment.
FIG. 3B
shows an example card displayed within the dashboard of the client application, according to one embodiment.
FIG. 4
is a flowchart for detecting a rescue medication event by an asthma analytics system, according to one embodiment.
FIG. 5
is a block diagram illustrating the modules within the data analysis module, according to one embodiment.
FIG. 6
is a flowchart for identifying triggers for individual patients, according to one embodiment.
FIG. 7
is a flowchart for aggregating patient data into a dataset, according to one embodiment.
FIG. 8
is a diagram illustrating the method for assigning binary labels to a trigger, according to one embodiment.
FIG. 9
is a diagram illustrating an exemplary aggregate dataset, according to one embodiment.
FIG. 10
is a diagram illustrating an exemplary sensitivity assessment for a trigger, according to one embodiment.
FIG. 11-12
shows example cards displayed to a client in response to identifying a trigger, according to one embodiment.
FIG. 13
shows an example card displayed to a client describing their potential risk of triggering event, according to one embodiment.
The figures depict various embodiments of the presented invention for purposes of illustration only. One skilled in the art will readily recognize from the following discussion that alternative embodiments of the structures and methods illustrated herein may be employed without departing from the principles described herein.
DETAILED DESCRIPTION
I. System Environment
FIG. 1
100
shows an asthma analytics system for monitoring accurate, real-time medicament device events, performing analytics on that data, and providing asthma rescue event risk notifications, according to one embodiment.
110
120
160
130
140
150
100
FIG. 1
The asthma analytics system includes client computing devices , a medicament device sensor , a medicament device , an application server , database server , and a network . Although illustrates only a single instance of most of the components of the asthma analytics system , in practice more than one of each component may be present, and additional or fewer components may be used.
I.A. Client Device and Application
110
100
150
111
100
130
112
100
111
160
120
160
100
130
110
The client devices , at the behest of their users, interact with the asthma analytics system via the network . For purposes of explanation and clarity it is useful to identify at least two different types of users. A patient is a user burdened with asthma who makes use of the asthma analytics system at least in part to obtain personalized asthma rescue event risk notifications provided by the server and asthma management notifications created by their health care provider . Such notifications can be provided in exchange for the user's permission to allow the asthma analytics system to monitor the patient's medicament device usage. As will be explained below, medication events are detected by a sensor associated with the medicament device and the user's client device , which in turn reports to the application server , which in turn can initiate a process to generate risk notifications which are provided to the user through the client device .
112
111
111
110
Another type of user is a healthcare provider who, again with the patient's express permission, also receives notifications regarding a patient's asthma management, as well as aggregated asthma community rescue event data and derived statistics regarding asthma events and other associated data. Other types of users are also contemplated, such as parents/guardians of patients who may also want to receive notifications in the event that their own client devices are distinct from that of their children.
110
110
100
150
150
110
100
120
120
FIG. 2
The client device is a computer system. An example physical implementation is described more completely below with respect to . The client device is configured to wirelessly communicate with the asthma analytics system via network . With network access, the client device transmits to system the user's geographical location and the time of a rescue medication event, as well as information describing the event as received from the associated medicament device sensor (referred to throughout as “sensor ”).
110
150
110
150
150
120
FIG. 1
Regarding user location and event times, the client device may determine the geographical location and time of a rescue event through use of information about the cellular or wireless network to which it is connected. For example, the current geographical location of the client device may be determined by directly querying the software stack providing the network connection. Alternatively, the geographical location information may be obtained by pinging an external web service (not shown in ) made accessible via network . The time of an event can be provided by the sensor as part of the event data or added to event data by querying an appropriate software routine available as part of the client device's native operating system.
130
110
100
110
115
112
111
111
115
111
112
111
In addition to communicating with the application server , client devices connected wirelessly to the asthma analytics system may also exchange information with other connected client devices . For example, through a client software application , a healthcare provider may receive a risk exacerbation notification describing a recent rescue event about a patient , then in response send a recommendation to the patient for post-asthma rescue event treatment. Similarly, through application patients may communicate with their health care providers and other patients .
115
110
115
112
111
100
111
112
115
115
110
FIG. 3
Application provides a user interface (herein referred to as a “dashboard”) that is displayed on a screen of the client device and allows a user to input commands to control the operation of the application . The dashboard is the mechanism by which healthcare providers and patients access the COPD analytics system . For example, the dashboard allows patients and providers to interact with each other, receive asthma rescue event risk notifications, exchange messages about treatment, provide and receive additional event and non-event data, and so on. Application may be coded as a web page, series of web pages, or content otherwise coded to render within an internet browser. Application may also be coded as a proprietary application configured to operate on the native operating system of the client device . The dashboard is more completely described below in conjunction with .
115
110
150
110
130
140
130
130
115
In addition to providing the dashboard, application may also perform some data processing on asthma rescue event data locally using the resources of client device before sending the processed data through the network . Event data sent through the network is received by the application server where it is analyzed and processed for storage and retrieval in conjunction with database server . The application server may direct retrieval and storage request to the database system as required by the client application .
110
120
120
110
120
110
120
110
120
110
The client device communicates with the sensor using a network adapter and either a wired or wireless communication protocol, an example of which is the Bluetooth Low Energy (BTLE) protocol. BTLE is a short-ranged, low-powered, protocol standard that transmits data wirelessly over radio links in short range wireless networks. After the sensor and client device have been paired with each other using a BTLE passkey, the sensor automatically synchronizes and communicate information relating to medicament device usage with the client device . If the sensor hasn't been paired with a client device prior to a rescue medication event, the information is stored locally until such a pairing occurs. Upon pairing, the sensor communicates any stored event records to the client device . In other implementations, other types of wireless connections are used (e.g., infrared or 802.11).
110
160
160
120
160
110
160
160
130
110
Although client devices and medicament devices are described above as being separate physical devices (such as smart phones and inhalers, respectively), in the future it is contemplated the medicament devices may include not only sensors integrated into a single housing with the device , but also aspects of the client device . For example, a medicament device may include an audiovisual interface including a display or other lighting elements as well as speakers for presenting visual audible information. In such an implementation the medicament device itself may present the contents of notifications provided by the server directly, in place of or in addition to presenting them through the client devices .
I.B. Medicament Device and Sensor
160
160
160
160
160
The medicament device is a medical device used to deliver medication to the lungs of a user experiencing constricted respiratory airflow. Medicament devices (e.g. inhalers) are typically portable and small enough to be carried by hand for ease of accessibility when treating respiratory attacks. In one embodiment, medicine is delivered in aerosol form through a medicament device such as a metered dose inhaler. Metered dose inhalers included a pressured propellant canister of aerosol medicine, a metering valve for delivering a regulated medicine dosage amount, and a plastic holder that holds the pressurized canister and also forms a mouthpiece for delivery of the medicine. In another embodiment, medicine is delivered in dry powder form through a medicament device such as a dry powder inhaler. Dry powder inhalers may have Cartesian ovular shaped bodies that house wheel and gear mechanisms enabling a user to index through a strip of dry powder medication. The bodies of dry powder inhalers also include a manifold and a mouthpiece to deliver dry powder to the user. Examples of controller medications that are dispensed by a controller medicament device include beclomethasone, budesonide, and fluticasone as well as combinations of those medications with a long-acting bronchodilator such as salmeterol or formoterol. Examples of rescue medications that are dispensed by a rescue medicament device include albuterol, salbutamol, levalbuterol, metaproterenol, and terbutaline.
160
160
160
120
160
Each patient may be associated with more than one medicament device . For example, the patient may have a rescue medicament device that dispenses rescue medication, and a controller medicament device that dispenses controller medication. Similarly, each patient may be associated with more than one sensor , each chosen to operate with one of the patient's medicament devices .
120
160
120
120
160
Generally, a sensor is a physical device that monitors the usage of the medicament dispenser . The sensor is either removably attachable to the medicament dispenser without impeding the operation of the medication dispenser, or the sensor is an integrated component that is a native part of the medicament dispenser as made available by its manufacturer.
120
110
The sensor includes its own network adapter (not shown) that communicates with the client device either through a wired connection, or more typically through a wireless radio frequency connection. In one embodiment, the network adapter is a Bluetooth Low Energy (BTLE) wireless transmitter, however in other embodiments other types of wireless communication may be used (e.g., infrared, 802.11).
120
130
120
130
110
120
110
130
130
110
130
The sensor may also be configured to communicate more directly with the application server . For example, if the network adapter of the sensor is configured to communicate via a wireless standard such as 802.11 or LTE, the adapter may exchange data with a wireless access point such as a wireless router, which may in turn communicate with the application server without necessarily involving the client device in every exchange of data. These two methods of communicating are not mutually exclusive, and the sensor may be configured to communicate with both the client device and the application server , for example using redundant transmission to ensure event data arrives at the application server or to provide information directly to the client device while the application server is determining what notification to provide in response to an event.
120
160
120
160
111
120
111
112
130
As introduced above, the sensor captures data about usage of the medicament device . Specifically, each sensor captures the time and geographical location of the rescue medication event, that is, usages of the rescue medicament device , by the patient . Each sensor transmits the event data in real-time or as soon as a network connection is achieved, automatically without input from the patient or health care provider . The medication event information is sent to the application server for use in analysis, generation of asthma rescue event notifications, and in aggregate analyses of event data across multiple patients.
120
160
120
110
130
120
To accomplish this goal, there are a number of different ways for the sensor to be constructed, and in part the construction will depend upon the construction of the medicament device itself . Generally, all sensors will include an onboard processor, persistent memory, and the network adapter mentioned above that together function to record, store, and report medication event information to the client device and/or server . Sensors may also include a clock for recording the time and date of events.
120
120
120
160
120
160
120
Regarding specific sensor constructions, traditional inhalers, such as mechanical dose counters, are not designed with sensors in mind, and thus the sensor may be constructed accordingly. Some implementations in this manner include mechanical, electrical, or optical sensors to detect movement of the device , priming of the device, activation of the device, inhalation by the user, etc. In contrast, modern inhalers, such as deflectable membrane dose counters, include electrical circuitry may report event information as an electrical data signal which a sensor is designed to receive and interpret, for example the medicament device itself may report movement, priming, and activation to the sensor .
120
160
More information regarding hardware and software components for the sensors and medicament devices , as well as the interaction between them to record rescue medication events can be found in U.S. patent application Ser. No. 12/348,424, filed Jan. 1, 2009, and International Application No. PCT/US2014/039014, filed May 21, 2014, both of which are incorporated by reference herein in their entirety.
I.C. Application Server
130
110
130
FIG. 2
The application server is a computer or network of computers. Although a simplified example is illustrated in , typically the application server will be a server class system that uses powerful processors, large memory, and faster network components compared to a typical computing system used, for example, as a client device . The server typically has large secondary storage, for example, using a RAID (redundant array of independent disks) array and/or by establishing a relationship with an independent content delivery network (CDN) contracted to store, exchange and transmit data such as the asthma notifications contemplated above. Additionally, the computing system includes an operating system, for example, a UNIX operating system, LINUX operating system, or a WINDOWS operating system. The operating system manages the hardware and software resources of the application server and also provides various services, for example, process management, input/output of data, management of peripheral devices, and so on. The operating system provides various functions for managing files stored on a device, for example, creating a new file, moving or copying files, transferring files to a remote system, and so on.
130
100
110
150
130
111
112
160
The application server includes a software architecture for supporting access and use asthma analytics system by many different client devices through network , and thus at a high level can be generally characterized as a cloud-based system. The application server generally provides a platform for patients and healthcare providers to report data recorded by the sensors associated with their medicament devices including both rescue medication and controller medication events, collaborate on asthma treatment plans, browse and obtain information relating to their condition and geographic location, and make use of a variety of other functions.
130
130
140
140
Generally, the application server is designed to handle a wide variety of data. The application server includes logical routines that perform a variety of functions including checking the validity of the incoming data, parsing and formatting the data if necessary, passing the processed data to a database server for storage, and confirming that the database server has been updated.
130
130
111
100
110
120
The application server stores and manages data at least in part on a patient by patient basis. Towards this end, the application server creates a patient profile for each user. The patient profile is a set of data that characterizes a patient of the asthma analytics system . The patient profile may include identify information about the patient such as age, gender, current rescue medication, current controller medication, notification preferences, a controller medication adherence plan, a patients relevant medical history, and a list of non-patient users authorized to access to the patient profile. The profile may further specify a device identifier, such as a unique media access control (MAC) address identifying the one or more client devices or sensors authorized to submit data (such as controller and rescue medication events) for the patient.
111
112
111
112
111
112
112
111
The profile may specify which different types of notifications are provided to patients and their personal healthcare providers , as well as the frequency with which notifications are provided. For example, a patient may authorize a healthcare provider to receive notifications indicating a rescue event. The patient may also authorize their healthcare provider be given access to their patient profile and rescue event history. If the healthcare provider is provided access to the patient profile of the patient , the healthcare provider may specify controller adherence or rescue medication plans. Medication plans may include a prescribed number of doses per day for controller medications.
130
112
112
The application server also creates profiles for health care providers . A health care provider profile may include identifying information about the health care provider , such as the office location, qualifications and certifications, and so on. The health care provider profile also includes information about their patient population. The provider profile may include access to all of the profiles of that provider's patients, as well as derived data from those profiles such as aggregate demographic information, rescue and controller medication event patterns, and so on. This data may be further subdivided according to any type of data stored in the patient profiles, such as by geographic area (e.g., neighborhood, city) over by time period (e.g., weekly, monthly, yearly).
130
110
120
130
131
111
112
The application server receives rescue medication event information from the client device or the sensor , triggering a variety of routines on the application server . In the example implementations described below, the data analysis module executes routines to access asthma event data as well as other data including a patient's profile, analyze the data, and output the results of its analysis to both patients and providers . This process is generally referred to as an asthma risk analysis. The asthma risk analysis may be performed at any point in time, in response to a rescue event, due to a relevant change in the patient's environment, and in response to any one of a number of triggering conditions discussed further below.
Other analyses are also possible. For example, a risk analysis may be performed on rescue and controller medication use for multiple patients to identify based on spatial/temporal clusters (or outbreaks) of medication use based on historically significant permutations from individual, geographic, clinical, epidemiologic, demographic, or spatial or temporal baselines or predicted or expected values. Other types of analyses may include daily/weekly adherence trends, adherence changes over time, adherence comparisons to other relevant populations (e.g., all patients, patients on a particular rescue medication or controller medication or combination thereof, identification of triggers (spatial, temporal, environmental), rescue use trends over time, and rescue use comparisons to other relevant populations.
130
111
112
111
112
131
Responsive to any analyses performed, the application server prepares and delivers push notifications to send to patients , authorized healthcare providers , and/or other users provided access to the patient's profile. Notifications can provide details about the timing, location, and affected patient(s) involved in a medication rescue event. Notifications may additionally comprise a distress or emergency signal that requests emergency assistance that are distributed to emergency assistance providers . Notifications may also include the results of the asthma risk analysis performed by the data analysis module . More information regarding the types of notifications that may be sent and the content they may contain is further described below.
In addition to providing push notifications in response to an asthma risk analysis, notifications may also be provided as pull notifications, at particular time intervals. Additionally, some notifications (whether push or pull) may be triggered not in response to an asthma risk analysis performed in response to a rescue medication event, but instead in response to a risk analysis performed in response to one of the underlying factors in the asthma risk analysis changing, such that an updated notification is warranted. For example, if weather conditions indicate that an increase in air pollution is occurring or is imminent, this may trigger the carrying out of asthma risk analyses for all patients located in the particular geographic area where the pollution is occurring.
150
115
Notifications are provided through the network to client applications in a data format specifically designed for use with the client applications, and additionally or alternatively may be provided as short message service (SMS) messages, emails, phone calls, or in other data formats communicated using other communication mediums.
I.D. Database Server
140
The database server stores patient and provider data related data such as profiles, medication events, patient medical history (e.g., electronic medical records). Patient and provider data is encrypted for security and is at least password protected and otherwise secured to meet all Health Insurance Portability and Accountability Act (HIPAA) requirements. Any analyses (e.g., asthma risk analyses) that incorporate data from multiple patients (e.g., aggregate rescue medication event data) and are provided to users is de-identified so that personally identifying information is removed to protect patient privacy.
140
140
130
140
130
140
130
FIG. 1
The database server also stores non-patient data used in asthma risk analyses. This data includes regional data about a number of geographic regions such as public spaces in residential or commercial zones where patients are physically located and may be exposed to pollutants. This data may specifically include or be processed to obtain a patient's proximity to green space (areas including concentrated numbers of trees and plants). One example of regional data includes georeferenced weather data, such as temperature, wind patterns, humidity, the air quality index, and so on. Another example is georeferenced pollution data, including particulate counts for various pollutants at an instance of time or measured empirically. The regional data includes information about the current weather conditions for the time and place of the rescue event such as temperature, humidity, air quality index. All of the items of data above may vary over time, and as such the data itself may be indexed by time, for example separate data points may be available by time of day (including by minute or hour), or over longer periods such as by day, week, month, or season. Although the database server is illustrated in as being an entity separate from the application server the database server may alternatively be a hardware component that is part of another server such as server , such that the database server is implemented as one or more persistent storage devices, with the software application layer for interfacing with the stored data in the database is a part of that other server .
140
140
140
140
140
140
140
The database server stores data according to defined database schemas. Typically, data storage schemas across different data sources vary significantly even when storing the same type of data including cloud application event logs and log metrics, due to implementation differences in the underlying database structure. The database server may also store different types of data such as structured data, unstructured data, or semi-structured data. Data in the database server may be associated with users, groups of users, and/or entities. The database server provides support for database queries in a query language (e.g., SQL for relational databases, JSON NoSQL databases, etc.) for specifying instructions to manage database objects represented by the database server , read information from the database server , or write to the database server .
FIGS. 6A-6D
FIGS. 6A-6D
130
140
140
131
With respect to the description of below, the contents of the databases described with respect to those figures may be stored in databases physically proximate to the application server and separate from database server as illustrated. Alternatively, those databases may be a part of database server , in contrast to the description of illustrating them as being within data analysis module . This and other variations thereupon are within the scope of this description.
I.E. Network
150
110
120
130
140
150
150
150
150
The network represents the various wired and wireless communication pathways between the client devices, the sensor , the application server , and the database server . Network uses standard Internet communications technologies and/or protocols. Thus, the network can include links using technologies such as Ethernet, IEEE 802.11, integrated services digital network (ISDN), asynchronous transfer mode (ATM), etc. Similarly, the networking protocols used on the network can include the transmission control protocol/Internet protocol (TCP/IP), the hypertext transport protocol (HTTP), the simple mail transfer protocol (SMTP), the file transfer protocol (FTP), etc. The data exchanged over the network can be represented using technologies and/or formats including the hypertext markup language (HTML), the extensible markup language (XML), etc. In addition, all or some links can be encrypted using conventional encryption technologies such as the secure sockets layer (SSL), Secure HTTP (HTTPS) and/or virtual private networks (VPNs). In another embodiment, the entities can use custom and/or dedicated data communications technologies instead of, or in addition to, the ones described above.
II. Example Computing Devices
FIG. 2
FIG. 1
200
110
130
140
210
205
210
215
220
225
230
235
210
211
212
215
205
210
215
is a high-level block diagram illustrating physical components of an example computer that may be used as part of a client device , application server , and/or database server from , according to one embodiment. Illustrated is a chipset coupled to at least one processor . Coupled to the chipset is volatile memory , a network adapter , an input/output (I/O) device(s) , a storage device representing a non-volatile memory, and a display . In one embodiment, the functionality of the chipset is provided by a memory controller and an I/O controller . In another embodiment, the memory is coupled directly to the processor instead of the chipset . In some embodiments, memory includes high-speed random access memory (RAM), such as DRAM, SRAM, DDR RAM or other random access solid state memory devices.
230
215
205
225
235
200
220
200
150
The storage device is any non-transitory computer-readable storage medium, such as a hard drive, compact disk read-only memory (CD-ROM), DVD, or a solid-state memory device. The memory holds instructions and data used by the processor . The I/O device may be a touch input surface (capacitive or otherwise), a mouse, track ball, or other type of pointing device, a keyboard, or another form of input device. The display displays images and other information from for the computer . The network adapter couples the computer to the network .
200
200
200
140
225
218
230
200
230
FIG. 2
As is known in the art, a computer can have different and/or other components than those shown in . In addition, the computer can lack certain illustrated components. In one embodiment, a computer acting as server may lack a dedicated I/O device , and/or display . Moreover, the storage device can be local and/or remote from the computer (such as embodied within a storage area network (SAN)), and, in one embodiment, the storage device is not a CD-ROM device or a DVD device.
110
130
140
110
130
130
130
140
Generally, the exact physical components used in a client device will vary in size, power requirements, and performance from those used in the application server and the database server . For example, client devices , which will often be home computers, tablet computers, laptop computers, or smart phones, will include relatively small storage capacities and processing power, but will include input devices and displays. These components are suitable for user input of data and receipt, display, and interaction with notifications provided by the application server . In contrast, the application server may include many physically separate, locally networked computers each having a significant amount of processing power for carrying out the asthma risk analyses introduced above. In one embodiment, the processing power of the application server provided by a service such as Amazon Web Services™. Also in contrast, the database server may include many, physically separate computers each having a significant amount of persistent storage capacity for storing the data associated with the application server.
200
230
215
205
As is known in the art, the computer is adapted to execute computer program modules for providing functionality described herein. A module can be implemented in hardware, firmware, and/or software. In one embodiment, program modules are stored on the storage device , loaded into the memory , and executed by the processor .
III. Dashboard
300
100
300
111
112
300
115
110
300
FIG. 3A
The dashboard, for example dashboard illustrated in , allows users to interact with the asthma analytics system . The dashboard provides a means to transfer information on a user-to-user (e.g., patient to provider ) or user-to-system/system-to-user basis. Dashboards are accessed through the client application on the client device and provide a mechanism for both patients and healthcare providers to monitor medication rescue events, exchange personalized patient healthcare information, and receive notifications such as asthma rescue event risk notifications. Patients may communicate with other health care providers and other patients through the dashboard , for example, to discuss and share information about asthma, medication usage, or asthma management. The ability to share asthma healthcare information may give patients or healthcare care providers experiencing a similar issue a way to share individual perspectives.
300
112
300
300
100
The dashboard also allows authorized health care providers to access a list of patients to view, annotate, update, interact with, and export information about asthma patient and community data and statistics in various demographics or geographic segments. Using the dashboard , healthcare providers are able to monitor patients individually or in aggregate, to receive and provide feedback on how their associated patient populations are responding to asthma management guidance. A healthcare provider who has access to individual or multiple patients has the ability to establish notification thresholds, set parameters for the notifications, and receive notifications when patients' event history matches certain conditions (e.g. rescue event). Additionally, the dashboard can receive and display regular reports of event patterns for specific demographic generated by the asthma analytics system .
300
310
310
110
300
305
The dashboard presents a variety of information including tabular data, graphical visualizations, and analyses to users through display “cards” . Display cards are conformably suited to smaller displays typical of portable client devices , for example mobile phones or tablets, and include “bite size” pieces of information that mimic the simplistic organizational style found in baseball cards. The dashboard may also include a system menu that allows users to navigate through different categories of healthcare information.
130
310
115
310
130
300
130
130
300
310
Notifications provided by the application server are related to the display cards . Generally, notifications include not only information to be presented to the user through the application , but also parameters for specifying which display card is to be used to display the contents of the notification. Any information pushed/pulled from the application server may be associated with one or more cards. For example, a notification can be pushed to the patient based on the outcome of an asthma risk analysis. The dashboard will process the notification and determine which card/s to use to present the information in the notification. Continuing the example, the recipient of the notification may make a request to pull data from the application server . The application server provides the requested data in another notification, and the dashboard then determines which display card to display the requested information.
310
315
310
315
310
a
b
FIG. 3B
To interact with information presented, some display cards include a input response area. For example, in the display card illustrated in , a patient may scroll up or down in the input response area to select a controller medication used to manage asthma or select the “next” to move to an additional display card .
300
310
The dashboard may provide a variety of different display cards , which may be organized into categories. An information card type includes cards that display data. Information cards may, for example, display medication rescue events, statistics, and maps including both patient data and community data. Information cards are further sub-categorized into event, trend, education, and alert display cards.
310
315
a
FIG. 3B
Event cards include data relating to rescue medication events, such as a list of historical medication rescue events for a specific patient, or patient rescue event data overlaid on a geographical map for a specific provider. For example, the display card illustrated in is an event card that highlights patients experiencing asthma rescue events in a particular geographic area. Another event card may display an example medication usage report including a map of the location of a rescue usage event, environmental conditions at the location, and an input response area for the recipient to add triggers for the rescue usage event. Another event trend card may display rescue device usage for the previous week including a total number of uses for the time period and a number of uses for each day.
A trend card includes statistical information presented using a graph or a chart designed for clear comprehension by the recipient. Examples of trend cards include plots of asthma rescue events over various time periods, time of day trends, days of week trends, and trigger trends.
315
An education card includes information meant to educate the recipient. Education cards provide general disease information and tips for patients to reduce their risk of rescue events. Some education cards may require an input response to allow recipients to specify whether the information provided is relevant or interesting for use in serving future cards.
Alert cards notify users of important information including informing a recipient that they are at risk for an event and/or that data has not been received from a device over a recent time period. Other alerts may include an alert that a setting on the client device is preventing data syncing (e.g. Blue tooth is turned off) or that a patient's asthma risk score has changed.
100
111
111
130
140
111
100
130
111
A survey card type solicits a user response by presenting yes/no, multiple choice, or open-ended questions for the user to respond to. For example, a healthcare provider or the asthma analytics system may send a survey card with an asthma-related questionnaire to a patient to determine a level of disease control for a specific patient. Additionally, a survey card may request the type of controller medication that the patient uses to treat asthma symptoms. Generally, survey cards provide the application server with data that may be missing from a patient's medical history or patient profile (as introduced above), and/or provide an update to potentially outdated information. One or more survey cards may be used to complete the patient enrollment process and create a patient profile for storage in database server . For example, when a patient initially enrolls in the asthma analytics system , a push notification will be triggered by the application server prompting the patient to create a patient profile.
Example of survey cards may include a survey question asking whether a patient has made any emergency room visits as a result of asthma rescue events, information about the patient's controller medication, how many times the patient used their rescue medication to control an event, and what their controller medication daily schedule is. Survey cards may also ask about a patients asthma triggers, such as whether pollen is a trigger. Some survey cards may ask a patient to rate their general quality of life on 5-point Likert scale, to rate their quality of sleep, to rate their ability to be active over last 7 days, and so on. Other survey cards ask whether the patient feels better or worse than yesterday, whether the patient has had to go to emergency room or hospital in last 12 months for a rescue event and so on.
160
100
In some instances, patient behavior or sensor-reported event information that is inconsistent with existing patient information may trigger the sending of a survey card in order to resolve ambiguity as to the patient's circumstances. For example, if the patient is experiencing a greater-than-expected count of asthma events, the survey card may request information about the type of medication the patient has currently listed on their medicament device , in order to verify that the correct medication is being used. Another example includes if the reported information about controller medication use indicates that the patient is only using the controller medication one time per day but their adherence plan indicates they are supposed to be taking their controller medication twice per day, system could send a notification asking if the patient needs to change their adherence plan.
160
100
In some instances, patient behavior or sensor-reported event information that is inconsistent with existing patient information may trigger the sending of a survey card in order to resolve ambiguity as to the patient's circumstances. For example, if the patient is experiencing a greater-than-expected count of asthma events, the survey card may request information about the type of medication the patient has currently listed on their medicament device , in order to verify that the correct medication is being used. As another example, if the reported information about controller medication use indicates that the patient is only using the controller medication one time per day but their adherence plan indicates they are supposed to be taking their controller medication twice per day, system could send a notification asking if the patient needs to change their adherence plan.
300
Navigation cards represent actionable data or messages that, upon user interaction, may redirect the user to another screen or card that is part of the dashboard . For example, if a patient wants to share information or request specific medication plans for controller medications with a physician, a navigation card would be used to facilitate the sharing of information or enrollment in controller adherence plan. Additionally, navigation cards allow users to update information surrounding medication rescue events.
111
112
Adherence cards are designed to encourage a patient to continually use their controller medication on schedule over different periods of time. Adherence cards may indicate a “streak” or continuous run of on-time controller medication events, a better performance in aggregate even if not streak has been Additionally, a survey card may inquire as to the patient physical state in response to recording a significant number of rescue events within a threshold period of time of each other. Controller medication events may be represented as graphs to illustrate when the patient did and did not take their controller medication on time during various periods during the day, as prescribed by their health care provider . Cards may also detail a daily schedule for controller medication and an indicator for displaying whether the scheduled dose has been taken. For example, a red “X” may indicate the scheduled dose has not been taken, but a green check mark or a different symbol may indicate that the scheduled dose has been taken.
110
110
Setup cards guide recipients in associating sensors with client devices . Setup cards may guide pairing a sensor to a client device using Bluetooth, prompt the recipient to initiate the pairing process or prompt the user to select a sensor device for pairing, or notify the user that the sensor is paired.
315
c
In some embodiments, the dashboard may present a user interface. The user interface may illustrate a list of rescue events, responsive to the user's selection of the “View Timeline” input response area . The list displays rescue usage events over a time period and includes details such as date, time, number of puffs, and location. Recipients may edit rescue usage events and/or add additional details by selecting the edit interaction response areas. Some interfaces may present an event summary for a rescue usage event to the user. The event summary may be presented to the user in response to the user selecting the edit interaction response area of the user interface. From the dashboard, the user may also view and edit a medication list, detailing information such as medication type (rescue, controller, etc.), dosage schedule, and sensors.
IV. Event-Driven Asthma Risk Notifications
300
110
130
140
130
120
160
To receive asthma risk notifications, a patient interfaces with the dashboard to initialize a patient profile. Once the patient completes their patient profile, the client device transmits the patient profile for use b the application server and storage by the database server . Once a patient's patient profile is initialized, the application server may begin to receive rescue medication events detected by the sensor associated with the patient's medicament device . This initialization process for the patient profile is only performed once during the patient's first use of the medicament device.
111
130
415
Upon the sensor detecting a rescue usage event, the patient device collects and sends the rescue event data to the application server , where the event information is stored . In some embodiments, this detection and storage process is performed repeatedly at any detection of a rescue usage event. However, this frequency may differ from the frequency with which a risk analysis is performed.
FIG. 4
130
160
160
120
120
405
160
120
410
160
Referring now to , the application server generally receives a rescue event anytime the patient uses their rescue medicament dispenser to relieve asthma-related event symptoms. As an example of the process for capturing such an event for a particular device /sensor combination, at the start of symptoms, the sensor may detect whether a medication dispenser cover is opened. When the medication dispenser cover is opened, the sensor may detect an acceleration associated with a priming of the dispenser . For some types of medicament dispensers, the “priming” includes activating a mechanism to release a dose of a medication from a packaging. In other types of medicament dispensers, the “priming” includes a rapid shaking of a medication canister.
120
415
120
160
160
120
420
110
150
425
110
130
110
110
430
130
110
150
110
120
130
After the priming action is detected, the sensor is configured to store data associated with the rescue event in active memory of the sensor . The rescue event data may include information that describes the time and date of associated with the rescue event, the status or condition of the medicament device (e.g. battery level), the number of doses of medication remaining (before or after the event), self-test results, and physiological data of a patient being treated with the medicament device as measured by the sensor . As soon as the sensor establishes a network connection with either the client device or network , the sensor transmits any locally stored rescue event data to the client device or the application server . If the event data was transmitted to the client device first, the client device then transmits the rescue event data to the application server as soon as the client device establishes a network connection with the network . Depending upon the implementation, either the client device or sensor will add the geographic location where the event took place to the event data transmitted to the application server .
130
130
110
110
310
315
310
111
112
111
425
445
Upon receiving and storing the rescue usage event data, the application server may request further information from the patient describing the rescue usage event. To obtain the information, the application server generates a push notification, including the questions to be asked, to be sent to the patient's client device . The client device may present the push notification as a survey type card . The patient may respond to the request by providing inputs in response to the survey card . Alternatively, the patient may elect not to respond to the request. This is permissible, any gaps in information may be obtained through later push notifications, or upon entry by provider after a meeting with the patient . In one implementation, the failure to receive the additionally requested data in response to request does not hold up the remainder of the analysis described in steps -.
420
The information collected as part of the event or otherwise may identify , information pertaining to parameters that may have played a role in triggering the event, a location of the rescue event, a label (e.g., work, home, or school) for the location, a rating to signify the personal importance of the location to the patient, and whether the use was pre-emptive (e.g., medication taken prior to exercising) in addition to any other relevant information.
130
425
140
130
111
410
In addition to requesting additional event data, the application server accesses stored contextual data from the database server . Generally, contextual data refers data other than event data, which includes but is not limited to: to atmospheric conditions, weather conditions, air quality conditions, pollen data, patient data recorded from past rescue usage events, and any other considerations that are not directly detected by the medicament device at the time of the rescue usage event. By contrast, event data refers to any parameters related to the rescue event and reported by the medicament device, such as medication dosage, the time of the event, the location of the event, and relevant adherence data. Both forms of data may include temporally-current information as well as stored historical data. Accordingly, as part of obtaining the contextual data, the application server also accesses historical rescue usage event data for the patient . This historical data can include all of the data from any past controller or rescue medication event data from the patient's history over a variety of windows of time in the past, and each historical event may include all of the same items of information as was reported for this event along with any data collected upon follow up thereafter.
FIGS. 6 and 7
110
However, note that in the following description, such as in , in some instances contextual data and historical data are represented separately. Contextual data may be used to refer to geographic and regional information relevant to the current event or current location of the patient's client device , whereas historical data may be used to refer to geographic, regional, and event information from previous rescue usage events from the same or different patients.
IV.A Asthma Trigger Identification Overview
131
When considered individually, asthma rescue inhaler usage events provide little insight in to the specific causes of the rescue event, however these events include data that is useful in identifying correlations between rescue events. For example, if only a single rescue event is analyzed, the asthma event contextual environmental data may not conclusively indicate what specific conditions caused the rescue event. However, that single event does at least indicate that certain conditions were present during the event. When the contextual data for an individual event is considered in addition to the contextual data from several other related or similar events, the data analysis module may identify, with a high level of confidence, which triggers a patient is and is not sensitive to.
131
100
131
100
130
131
FIG. 5
In one embodiment, the process for determining triggers for a patient are carried out by the data analysis module of the analytic system introduced above. is a block diagram illustrating the logical components that carry out the functions of the data analysis module , according to one embodiment. The analytics system includes, on the application server , a data analysis module that analyses the variety of data collected by the system, introduced above and discussed further below, to identify triggers for patients at risk of experiencing rescue inhaler usage events. These trigger analyses are used to generate notifications that are specifically configured to be sent to a patient in a sufficiently timely manner to hopefully avoid or anticipate the occurrence of a respiratory event, such as an asthma or COPD event, which would necessitate usage of their rescue inhaler.
131
510
520
530
540
560
570
580
The logical architecture of the data analysis module comprises a primary patient data store , a secondary patient data store , a clustering module , a trigger splitting module , a model , a sensitivity module and a notification module . Functionality indicated as being performed by a particular module (or store) may be performed by other modules (or stores) instead.
131
131
510
520
150
150
510
520
The analysis of patient-specific triggers for rescue inhaler usage events by module is based on patient data for a population of patients, for example contextual data, demographic data, and clinical data. As described herein, the patient in question for whom the module is determining triggers is referred to as the “primary patient” and each other patient of a set of similar patients is referred to as a “secondary patient.” The primary patient data store includes contextual information describing every day that the patient has been associated with the rescue inhaler. The primary patient data also includes demographic and clinical data describing the medical condition of the primary patient and their medication regimen. Similarly, the secondary patient data store stores demographic, clinical data, and contextual data for the other patients of the set. The set of similar patients may be determined according to a number of methods. As one example, using the set of other patients may be determined by those patients who use a rescue inhaler connected over a same network (e.g., 3G cell phone tower router, local internet service provider, etc., thus grouping patients geographically. For example, if one hundred patients use rescue inhalers communicating with the network , the primary patient store stores data associated with one user (for whom triggers are being determined at that instant) and the secondary patient data store stores data associated with the remaining ninety-nine. Other methods may use other criteria, such as based on contextual data, demographic data, or clinical data, specific examples of which are provided below.
Primary patient data and secondary patient data generally include the same information, including contextual data, demographic data, and patient data.
510
120
160
120
110
160
2.5
10
Contextual data describes days during which one or more rescue events did occur and days during which no rescue usage events occurred. The primary patient data store may also include a record of the user's behavior over the first one month in which they are using the sensor with the medicament device . Contextual data includes, but is not limited to, air pollutant conditions (e.g., ozone molecules (o3), nitrogen dioxide molecules (no2), sulfur dioxide molecules (so2), particulate matter, 2.5 micrometers or less (PM), particulate matter, 10 micrometer or less (PM), air quality index) and weather condition (e.g., temperature, humidity, wind speed, wind direction, station pressure, and visibility). Each contextual condition also represents a potential trigger or a condition which contributes to or stimulates a rescue inhaler usage event. Generally, the contextual data may be gathered automatically based on device or other third party data reporting, manually provided by a patient and/or provider, or otherwise obtained. Rescue inhaler usage events and other contextual data may also be identified based on where the event temporally occurred while the sensor , client device , and/or medicament device were physically located within the boundary of a geographic region.
300
120
Demographic data describes each patient including, but not limited to the gender, age, and the base location of each user. The base location refers to a geographic region within which the patient spends a majority of their time, for example a home address or an office address. The size of the geographic region may range depending on the frequency of a patient's rescue inhaler usage and their level of risk, for example 500 feet areas, latitude/longitude coordinates, zip codes, city boundaries, etc. Demographic data may be entered manually by the patient through the GUI when setting up use of the sensor or provided to a healthcare provider for association with their system.
Patient data may also include clinical information, for example, the medication type, the prescription amount, the prescription data, the dosage of medication taken, and the adherence regimen comparing the frequency per day with which the patient takes the rescue medication to the frequency with which the prescription is instructed to take the rescue medication. Patient data is generally entered by the healthcare provider, but may also be entered by the patient manually.
560
Individual primary patients may be more susceptible to specific trigger conditions than other patients. As described herein, a trigger refers to a measurable quantity, for example an environmental condition, which independently or in combination with one or other triggers exacerbates a patient's condition thereby causing a rescue inhaler usage event. For example, under conditions with higher levels of humidity, one patient may be more at risk of an asthma rescue usage event than another patient. Accordingly, the model determines which, if any, triggers are relevant to each patient, as well as a relative risk of to the patient for each trigger.
510
520
550
550
During normal course, the data stores / receive data regarding rescue usage events as they occur and updates the data stores to reflect the contextual data associated with the recent current rescue usage events. The frequency with which a data store is updated with new rescue usage events may vary depending on a number of factors not limited to the patient's circumstances, their adherence regimen to a controller medication, environmental conditions, and so on. A patient's adherence to a prescribed controller medication regimen is a comparison between the frequency per day that the patient uses the controller inhaler unit and the frequency per day that the patient was instructed to use the controller inhaler unit and may be measured based on the usage of a controller inhaler unit.
530
510
520
560
120
160
131
For a given patient, the clustering module receives input from the primary patient data store (regarding that patient) and the secondary patient data store (regarding the other patients, as distinguished above) to generate an aggregate dataset to be inputted to the model . An aggregate dataset includes an aggregation of contextual data from each day that the user has been in possession of the rescue usage inhaler (e.g., the sensor and medicament device combination). For each of those days, the aggregate dataset includes a separate feature vector (together forming an array of feature vectors) describing the conditions for a set of trigger conditions and a label indicating whether or not at least one rescue event occurred. In one implementation, the feature vector has a fixed number of dimensions (or elements). In one embodiment, the number of elements is the number of the possible triggers considered by the data analysis module ). Each element stores a feature value (also referred to as a trigger value) for each trigger including measured value corresponding to that trigger during that day or based on the received rescue inhaler usage event. Often, these trigger values are numerical values such as integers, for example a temperature reading of 60° C., however in some embodiments they may also be floating point values or categorical values (e.g., is a given condition present or not present).
131
131
530
FIG. 9
In implementations in which sufficient primary patient data has been collected, the clustering module generates an aggregate dataset comprised solely of primary patient data, specifically feature vectors of data from primary patients. Sufficient primary patient data allows the data analysis module to identify the primary patient as sensitive or insensitive to each trigger condition with a high level of confidence based only on that patient's data. However, identifications made with a high level of confidence require large amounts of data which would require primary patients to have been using their rescue inhaler usage for an extended period of times, for example multiple months to years. Accordingly, to expedite the time required for the data analysis module to confidently identify trigger conditions for relatively new patients, the clustering module uses data (feature vectors) from secondary patients who are demographically, contextually, and clinically similar to the primary patient to supplement the aggregate dataset in order to make these determinations with higher confidence. Thus, in these instances aggregate datasets including data from both the primary patient and secondary patients. The aggregate dataset is further described below in reference to .
540
540
1
0
The trigger splitting module receives the aggregate dataset and reconfigures the feature vector for each day into a converted format. In one embodiment, the trigger values are assumed to be integers. In this embodiment, for each trigger value in the aggregate dataset, the trigger splitting module replaces a single trigger and corresponding integer trigger values with a set of similar triggers each corresponding to a different possible integer values for the trigger, each of these similar triggers having a binary label: a first label (e.g., ) indicating whether the trigger was present in that feature vector (e.g., for that day) and a second label (e.g., ) indicating the trigger was not present in that feature vector.
540
FIG. 8
Thus, whereas previously the feature vector had only a single entry for a trigger with a corresponding integer value (e.g., temperature, with the value being the temperature in Celsius), the converted format of the aggregate dataset has a number of triggers, one for each possible value of the unconverted trigger, with the value for each converted trigger indicating a binary value of whether the original value for that trigger for that day is greater or less than the integer value of that particular trigger. Continuing with the temperature example, the single temperature trigger would be replaced with a “temperature>10° C.” trigger, a “temperature>11° C.” trigger, a “temperature>12° C.” trigger, and so on, where the binary values for these triggers indicate the temperature on that day. The trigger splitting module will be further described in reference to .
560
560
In order to perform a trigger analysis to determine a relative risk score for each trigger, a model , receives the contextual data stored within the aggregate dataset as input to the model's function to determine a patient's relative risk for individual triggers of asthma, COPD, or other respiratory diseases. The model , for example a mathematical function or other more complex logical structure is trained using the contextual data from the primary patient and, if applicable, any secondary patients.
560
131
560
In one implementation, the model determines a baseline threshold based on the total number of usage events over a specified prior time period preceding either the current day during which the risk is being calculate (for either labeling during training or during model use), or more generally during a time period preceding the time of a current/most recent rescue usage event. The baseline (also referred to as the baseline threshold) describes a maximum number of rescue usage events that may be recorded in a single day for that day to still be labeled as a low risk day by the data analysis module . In alternate implementations, the model implements different techniques to generate the baseline threshold, for example an average of the number of rescue usage events per day.
560
The model identifies any feature vectors within the aggregate dataset, associated with either a primary or secondary patient, describing a day during which the number of recorded rescue usage events exceeded the baseline threshold. The identified days exceeding the baseline threshold may collectively be referred to as exacerbation days.
560
560
560
For each trigger, the model separates the exacerbation days into two groups based on the label assigned to the trigger value for that day (i.e., days during which the trigger was present and days during which the trigger was not present). For example, when evaluating the “temperature>15° C.” trigger, the model separates exacerbation days into days during which the temperature exceeded 15° C. and days during which the temperature was below 15° C. For each group of exacerbation days, the model determines a relative exacerbation by calculating the ratio of exacerbation days in the group to the total number of days included in the aggregate dataset. Thus, there are two relative exacerbations for each trigger, one when the trigger is present, and one when the trigger is not. In other embodiments, other calculations other than or in addition to a ratio calculation may be used to determine the relative exacerbation.
560
450
560
Using the relative exacerbations for the triggers, the model determines a relative risk score by determining the difference between the relative exacerbations for each of the two groups for that trigger. For example, if the relative exacerbation when a trigger is present is 10% and the relative exacerbation when the same trigger is not present is 10%, the model may determine a relative risk score of 0 indicating that the trigger does not pose a serious risk of rescue usage event to the primary patient. Alternatively, if the relative exacerbation when a trigger is present is 90%, and the relative exacerbation when the same trigger is not present is 10%, the model may determine a relative risk score of 1 or some other non-zero numerical value corresponding to the magnitude of the difference between the trigger-present and trigger-not-present group. The model and relative risk score calculation are further described in Section IV.C.
The exact manner in which the relative risk score for a trigger is determined may vary by implementation. In one embodiment, the relative exacerbation is a function of a difference between the relative exacerbations of the two different groups/labels. In this case, the larger the difference, the more indicative the condition associated with the trigger was responsible for the increased count of exacerbation days when the trigger was present.
570
570
570
750
The sensitivity module receives the relative risk score and a count of the days during which the trigger was present to perform a statistical analysis of the relative risk score. More specifically, the sensitivity module may determine the significance, confidence, and magnitude of the relative risk score based on a comparison to one or more confidence intervals. If the comparison to the confidence intervals indicates that the relative risk score exceeds a threshold confidence level, the sensitivity module labels the user as sensitive to the trigger. In implementations in which the relative risk score does not exceed a threshold confidence level, the sensitivity module labels the user as insensitive to the trigger.
In some implementations, the threshold confidence level may be adjusted depending on data such as the count of exacerbation days, the count of days including a rescue usage event, as well as primary patient data vs. secondary patient data. This helps ensure that the confidence level accounts for varying amounts of data that may be available to make the trigger labeling determination. In one embodiment, the threshold confidence level is set higher if there is comparatively more data available (either in general or for the primary patient specifically), and set lower if comparatively little data is available. The threshold confidence level may also be adjusted based on the contents of the data available, for example the value of the relative risk score, the number of rescue usage events in the presence or absence of the a trigger, etc.
131
580
300
110
110
Once a patient has been determined to be sensitive to a trigger by the data analysis module , the notification module generates a risk score notification including any one or more of the following: a list of labeled triggers, a list of triggers still being analyzed, information characterizing the trigger, the relative risk score and confidence interval of the trigger, and options that the patient may take to prevent the occurrence of another rescue usage event in the presence of the trigger. The notification may be in the form of a card delivered through the dashboard as discussed above to the client device . The notification may also be provided to the healthcare provider's client device .
FIG. 6
510
530
610
530
520
540
620
640
530
540
is a flowchart for identifying triggers for a primary patient by implementing the techniques described above, according to one embodiment. Starting with demographic and clinical information and contextual data received from the primary patient data store , the clustering module executes a clustering protocol to generate an aggregate dataset. The clustering module identifies secondary patients from the secondary patient data store sharing similarities with the primary patient and adds feature vectors describing their own contextual data on the same days as the feature vectors associated with the primary patient. The trigger splitting module executes a trigger splitting protocol to separate each trigger into a binary set of trigger conditions. The trigger splitting module receives the aggregate dataset from the clustering module and determines a range of all potential values for each triggers. The trigger splitting module identifies a critical value and bifurcates the range of potential values into two ranges, each of which is associated with a specific label describing the presence of the trigger.
560
630
570
560
640
580
650
The model receives the compressed aggregate dataset from the trigger splitting module and executes a trigger scoring protocol to computes a relative risk score for each trigger. The relative risk score is based on the number of days during which the trigger was present and at least one rescue usage event occurred, the number of days during which the trigger was not present and at least one rescue usage event occurred, and the total number of days for which a feature vector is stored within the aggregate dataset. The sensitivity module receives the relative risk score for each trigger from the model and executes a sensitivity scoring procedure to determine whether the relative risk score exceed a threshold confidence level. For triggers determined to exceed the threshold confidence level for the primary patient, the notification module notifies the user of the trigger and when the trigger is present with information or recommendations to address the trigger.
IV.B Generating an Aggregate Dataset
IV.B.1 Clustering Protocol
530
131
131
As described above, the clustering module identifies and includes contextual data describing secondary patients who share similarities with the primary patient in the aggregate dataset when insufficient primary patient data exists for the data analysis module to label a patient as sensitive to each of a set of triggers. The secondary patient data supplements the recorded primary patient data allowing the data analysis module to perform trigger analyses based on larger volume of data and with a greater amount of confidence in the results.
FIG. 7
FIG. 7
FIG. 6
705
510
530
131
is a flowchart for generating an aggregate dataset, according to one embodiment. illustrates an implementation of the clustering protocol previously described in reference to . The clustering module accesses historical rescue inhaler usage events, demographic information, and medication data for the primary patient. During the initialization of the patient profile of the primary patient, the primary patient data store receives and stores demographic data, for example the age and gender of the primary patient, the medication type taken by the patient, and the dosage of the medication taken by the patient. However, in order to accurately identify secondary patients who are similar to the primary patient, the clustering module also accounts for the behavior and usage of the rescue inhaler unit by the primary patient. The behavior of the primary patient may refer to the number of rescue usage events and the frequency of the rescue usage events over a given time period. In one implementation, the given time period is at least one month. Accordingly, the clustering module may not begin generating the aggregate data set until the one month has passed from the date at which the patient profile was initialized.
131
710
After accessing contextual data from the primary patient store, the clustering module identifies secondary patients with similar patient profiles (e.g., a similar frequency of rescue inhaler usage activity, demographic information, and medication data) to the primary patient. Depending on the primary patient, each factor of the demographic data may be weighted differently when identifying similar secondary patients. For example, the medication type may be weighted more heavily than the patient's gender, indicating that, in terms of their medication profiles, the medication type more heavily affects the similarity between two patients than their gender. In one implementation, the geographic distance between the location of the is weighted more heavily than other demographic data because users in the same locality are often exposed to the same environmental conditions. Users sensitive to triggers which rarely if ever occur in a geographical area may never exhibit symptoms of those triggers and therefore may lack the corresponding patient data to diagnose such triggers in the primary patient. Accordingly, users who are also sensitive to the same local triggers as the primary patient will manifest similar symptoms in their secondary patient data.
530
As described above, in some implementations, behavioral data describing the frequency with which a rescue usage event occurs may be characterized on a per day basis as a feature vector comprising integer values for each trigger recorded during that day. On days during which the trigger values fluctuated throughout the day, the feature vector may include an average of the different trigger values. In such implementations, the clustering module may weight individual trigger conditions more heavily than others. For example, if the wind speed trigger has already been determined to be an insignificant trigger to the primary patient, the clustering module may assign it a lower weight than the remaining trigger conditions and revise the aggregate dataset to include secondary patients who were also determined to be insensitive to the wind speed trigger.
530
530
510
550
510
550
530
530
530
510
530
550
530
530
520
In some implementations, the clustering module implements a nearest neighbor search to identify a group of secondary patients similar to the primary patient. The nearest neighbor search may identify a specific number of secondary patients, for example the k nearest neighbors, depending on the amount of patient data already recorded. If only a small amount of primary patient data has been recorded, for example two months' worth of data, the clustering module may identify a larger set of nearest neighbors compared to if three years' worth of primary patient data had been recorded. Accordingly, in some implementations, the composition of the aggregate dataset may be continuously updated as the primary patient data store receives current rescue usage event data . More specifically, as the primary patient data store is updated with current rescue usage event data and that data is received by the clustering module , the clustering module may remove secondary patient data related to the secondary patients who are least similar to the primary patient to optimize the amount of computer memory required to store the aggregate database. As a result, the clustering module may conduct a nearest neighbor search of the secondary store during each update of the primary patient data store . In implementations in which computer storage memory need not be optimized, the clustering module may add the current rescue usage event data to the aggregate dataset while maintaining all patient data already included in the aggregate dataset. Examples of k-nearest neighbor searches which may be implemented by the clustering module include, but are not limited to, latent class analysis, a KD-tree nearest neighbor search, or an alternate search technique. In one implementation, the clustering module identifies a set of the nearest neighbors from the secondary patient data store based on the similarity of their demographic information, the trigger values during each day, and the trigger values recorded during rescue usage events. In one implementation, trigger values inputted to the model are scaled such that the mean is 0 and the standard deviation is 1 and are weighted according to a combination of expert domain knowledge. The weights assigned to the various triggers are extrapolated from asthma risk predictive models. The weights are verified by randomly perturbing a subset of the weights, running the model, and comparing the information gained or lost when those weights are randomized. Weights that result in a loss of information (i.e., fewer triggers identified at a set of confidence levels, controlled for false discovery rates) are up weighted.
530
715
530
530
After identifying a set of secondary patients to be included in the aggregate dataset, the clustering module determines and assigns a weight representing the similarity of each secondary patient to the primary patient. The clustering module assigns weights based on the similarity of the secondary patients to the primary patient such that the most similar secondary patients are assigned the highest weights and the least similar patients are assigned the lowest weights. When assigning a weight to each secondary patient, the clustering module assigns the weight to each feature vector associated with the secondary patient and the feature value for each trigger condition in each feature vector. For example, a secondary patient highly similar to the primary patient may be assigned a weight of 0.9. The secondary patient may be associated with 90 days' worth of feature vectors stored within the aggregate dataset. When determining the relative risk score, each trigger value for each of the 90 feature vectors may be converted to a weighted trigger value, based on the assigned weight of 0.
530
560
In contrast to the weights assigned to the secondary patients, “initial weight” assigned to the feature vectors of the primary patient data (e.g., weight of value 1) is greater than the weights assigned to the secondary patient data (e.g., weights in the range of 0 to less than 1) such that primary patient data has a greater impact on the trigger identification than any one secondary patient. In some implementations, the weights assigned to feature vectors of both the primary patient and each secondary patient are correlated with the count of rescue inhaler usage events for the primary patient within the aggregate dataset. For example, if 30 days' worth of primary patient data are included within the aggregate dataset and only one rescue usage event was detected, the primary patient data may not provide significant insight as to which triggers the primary patient is sensitive too compared to a very similar secondary patient with 30 days' of patient data included in the aggregate dataset and 10 detected rescue usage events. Accordingly, the clustering module may decrease the weight assigned to the primary patient data and increase the weight assigned to the secondary patient data or maintain the weight assigned to the primary patient data and increase the weight assigned to the secondary patient data. The determination of the weights is further discussed in Section IV.C.1 with reference to training the model .
530
720
725
550
510
After identifying the set of nearest secondary patients and assigning a weight to each one, their associated feature vectors, and the clustering module compiles the data to generate an aggregate dataset describing contextual data from days during which primary patients and secondary patients have been in possession of a rescue usage inhaler. As described above, the clustering module may periodically update the aggregate dataset based on newly received current contextual event data stored within the primary patient data store .
530
510
530
530
In some implementations, the clustering module may dynamically adjust the weights assigned to both the primary patient and the secondary patient as the composition of the aggregate dataset updates. When the primary patient data store and receives current contextual event data, the clustering module incorporates that data thereby increasing the amount of primary patient data in the aggregate dataset. As the amount of primary patient data in the aggregate dataset resultantly increases, the clustering module may dynamically increase the weight assigned to the primary patient's feature vectors and decrease the weights assigned to feature vectors of the secondary patient to further emphasize the primary patient data in the trigger analysis. In the implementations described above in which the secondary patient data is periodically removed from the aggregate data store, the clustering module identifies and removes the secondary patient feature vectors assigned the lowest weights.
IV.B.2 Trigger Splitting Protocol
530
540
540
540
The aggregate dataset generated by the clustering module is processed by the trigger splitting module into a converted representation. Each trigger value of the aggregate dataset is replaced with a set of binary labels indicating whether or not the trigger was present, at various trigger values, during the day on which the feature vector was generated. For each trigger, the trigger splitting module identifies several similar triggers and bifurcates each similar trigger into a set of trigger conditions: one condition indicating that a feature was present on a given day and a second range indicating that the feature was not present on a given day. Any of the similar trigger values for which the trigger conditions is true area assigned a common label, for example a “1”, and any similar trigger values for which the trigger condition is false are assigned a common label, for example a “0”. As a result, each feature vector with a diverse array of feature values is processed into a an array of binary feature values. As described herein, a label of “1” is assigned to trigger values that are true under a trigger conditions and a label of “0” is assigned to trigger values that are false under a trigger condition. However, the trigger splitting module may implement any set of binary labels consistent with the description of the trigger splitting module .
540
540
540
540
540
Certain triggers may only have a binary range of trigger values, for example gender. For such triggers, the trigger condition is determined by selecting one value of the binary range and if the trigger value is the value selected for the trigger condition, the trigger splitting module assigns the trigger value a label of “1”. If the trigger value is not the value selected for the trigger condition, the trigger splitting module assigns the trigger value a label of “0”. Continuing from the gender example, a feature vector may be associated with a female patient. The trigger condition determined by the trigger splitting module may be one of the following: “Male?” or “Female?”. If the trigger splitting module selects “Female?” as the trigger condition, the trigger value for the female patient is assigned a label of “1.” Alternatively, if the trigger splitting module selects “Male?” as the trigger condition, the trigger value for the female patient is assigned a label of “0”.
540
540
540
540
540
Other triggers may have a larger range of at least three values, for example temperature. For such triggers, the trigger splitting module may identify a set of similar trigger values within the range of trigger values. In one implementation, each value within the range of trigger values is included in the similar set of trigger values. For example, the temperature trigger has a range of trigger values including every integer between 0° C. and 100° C. and the trigger splitting module includes each integer value in the set of similar trigger values (i.e., 0° C., 1° C., 2° C., 3° C. . . . 100° C.). In alternate implementations, the trigger splitting module includes ranges of trigger values in the set of similar trigger values rather than individual trigger values (e.g., 0-20° C., 21-40° C., 41-60° C., 61-80° C., 81-100° C.). For each patient and feature vector, the trigger splitting module compares the trigger value to each similar trigger value to determine which of the binary labels to assign to the similar trigger value. When a trigger value in a feature vector matches with a similar trigger value, the trigger splitting module may assign a label of “1” and when the trigger value does not match, the trigger splitting module may assign a label of “0”.
FIG. 8
FIG. 8
122
123
122
123
540
540
122
540
123
is a diagram illustrating the method for assigning binary labels to a similar trigger value for a trigger, according to one embodiment. illustrate two example labels assigned to two similar trigger values for a common trigger condition. The trigger splitting module identifies two consecutive days during which the rescue inhaler unit detected a rescue usage inhaler event-primary user-day and primary user-day . In the illustrated implementation, the trigger values for a temperature trigger are being evaluated and labeled. The feature vector describing the primary user-day indicates that a temperature value of 90° F. was recorded on that day and the and the feature vector describing primary-user day indicates that a temperature value of 70° F. was recorded on that day. The trigger splitting module identifies, from the set of similar trigger values, the similar trigger value of 85° F. and generates a trigger condition of “Temperature above 85° F.?” which defines any day with a temperature value above the 85° F. as indicative that the trigger was present during that day. Accordingly, the trigger splitting module assigns a label of “1” to the similar trigger value for primary user-day because a temperature of 95° F. is greater than the threshold temperature of 85° F. The trigger splitting module assigns a label of “0” to the similar trigger value for primary user-day because a temperature of 70° F. is less than the threshold temperature of 85° F.
540
122
123
In an alternate implementation (not shown) the trigger condition may be defined as “Temperature below 85° F.?” based on the average temperature recorded on days during which a rescue usage event was detected. In such an implementation, the trigger splitting module would instead assign a label of “0” to the temperature trigger value for the primary user-day and a label “1” to the temperature trigger value for the primary user-day .
IV.B.3 Example Aggregate Dataset
540
1
2
2
2
2
FIG. 9
FIG. 9
th
a
b
c
d
After being processed by the trigger-splitting module , the aggregate dataset comprises a number of feature vectors of binary labels, which may for convenience be organized by day and by patient. is a diagram illustrating an example visualization of the aggregate dataset. As illustrated, the aggregate dataset is a table of data wherein each row represents a feature vector for a specific day and a specific patient. The illustrated section of the aggregate dataset describes patient data recorded on May 25for patients (the primary patient), ., ., ., .(the secondary patients). The aggregate dataset comprises a larger number of days' worth of data and a large population of secondary patient such that the only illustrates a small sample of the data stored in the aggregate dataset. As described above, each secondary patient is assigned a weight indicating their level of similarity to the primary patient. In some implementations, the aggregate dataset may be organized by ranking the secondary patients based on the weights assigned to them, for example ascending or descending order.
FIG. 9
FIG. 9
131
131
The horizontal labels of the table includes trigger information, including the triggers (labeled at the top of the table in ), and example binary triggers and the associated value/condition assigned to that binary trigger (labeled at the bottom of the table in ). As described, above triggers include demographic data, for example gender and age, clinical data, for example medication amount and adherence, and contextual data, for example home location, temperature, humidity, station pressure, wind speed, concentration of nitrogen dioxide, concentration of ozone, concentration of sulfur dioxide, and measurements of particulate matter in the air. Implementations of the data analysis model may expand the amount of triggers analyzed to include additional data, for example clinical assessments of patients, patient symptoms, and the results of an Asthma Control test. The trigger conditions identified in the above descriptions are not meant to be limiting, but rather exemplary of the kinds of conditions which the data analysis module considers when evaluating trigger conditions. Trigger conditions assigned to trigger values associated with a non-binary range of values are represented as a comparison to a threshold value, for example “greater than” or “less than,” whereas trigger conditions assigned to trigger values associated with a binary range of values are described as “equal to one of the binary values.”
FIG. 9
For simplicity, illustrates a label assigned to only a single similar trigger value, however in practice the general aggregate dataset may comprise multiple labels each assigned based on the trigger conditions for a different similar trigger value. Returning to the temperature example described in Section IV.A, the aggregate dataset would include a label assigned to each similar value derived from the range of trigger values (i.e., a binary label assigned to the similar trigger values 0° C., 1° C., 2° C., 3° C. . . . 100° C.).
9
2
1
2
1
2
2
2
2
th
a
b
c
d
a
d
The relative weights assigned to the secondary patient are based on the levels of similarity to the triggers recorded for the primary patient. Referring back to FIG. , on May 25, patient .experienced the same trigger conditions as the primary patient for all triggers except for the measurement of ozone. Patient .experienced the same trigger conditions as the primary patient for all triggers with the exception of 6-gender, home location, temperature, measurement of nitrogen dioxide, and measurements of particulate matter 2.5 micrometers or less and particulate matter 10 micrometers or less. Patient .and .recorded different trigger conditions for 10 and 15 triggers, respectively. According the highest weight of 0.9 is assigned to secondary patient .most similar to the primary patient and the lowest weight of 0.1 is assigned to the secondary patient .least similar to the primary patient.
IV.C Relative Risk Determination
560
560
560
560
560
560
For each trigger included within the aggregate dataset, the model determines an aggregate dataset based on the contextual data for each patient within the aggregate dataset. In some implementations, the model is a mathematical function or another more complex logical structure. The model determines a baseline threshold describing a number of rescue usage events per day which would constitute a cause for alarm. For example, if the baseline threshold is determined to be two rescue usage events, days in which three or more rescue usage events occurred would be flagged as exacerbation days. The model analyzes the aggregate dataset to group each exacerbation day into a group of days in which a trigger was present and a group of days during which the trigger was not present (based on the trigger conditions described above). The model performs this separation individually for each trigger stored within aggregate dataset. For each of the separated groups, the model determines a relative exacerbation based on the ratio of exacerbation days in the group to the total number of days in the aggregate dataset and a relative risk by determining the change in relative exacerbations between the two groups. In some implementations, the model is sensitive to type I errors (i.e., false positives), but desensitized to type II errors (i.e., false negatives). In alternate implementations, the model may be sensitized to both type I and type II errors.
IV.C.1 Model Training
560
560
560
560
When inputting the trigger values of a trigger into the model , the model receives the weights describing the level of similarity between each secondary patient and the primary patient. In some implementations, the weights are received from an authorized provider. In alternate implementations, the weights may be determined by training the model . To compute and assign the weights to each feature vector associated with the secondary patient data, the model is trained using a training set an aggregate dataset of contextual data comprising contextual data for a test primary patient and a set of secondary patients. The training data set comprises one a set of known labels for the trigger identification (the labels indicating whether the patient was sensitive to each binary trigger) for a test primary patient and an aggregate dataset of primary and secondary patient data which may be used to determine the known labels. In some implementations, multiple training data sets may be implemented, each with their own set of known labels for the trigger identifications of a test primary and aggregate dataset. The known labels for the trigger identifications of the primary patient may be determined based on manual sensitivity tests performed by a physician on the test patient to physically test their responses to the triggers. For the simplicity of the training data set, in one implementation, labels assigned to the triggers are binary labels indicating “sensitive” or “insensitive.”
560
560
560
In implementations employing a training data set, the model may be trained by determining weights for each secondary patient feature vector that best represent the relationship between trigger values of each feature vector and the trigger identification labels of the test candidate. The model is trained using a function or another more complex logical structure. In one embodiment, the model is trained using a machine learning technique, examples of which include but are not limited to linear, logistic, and other forms of regression (e.g., elastic net), decision trees (e.g., random forest, gradient boosting), support vector machines, classifiers (e.g. Naïve Bayes classifier), and fuzzy matching.
560
Once the weight values are known and assigned to each secondary patient or feature vector, the model may be used by receiving the weights and the function specified by the model, and inputting feature values to generate a risk score. In one implementation, the weights determined during the training of the model may be assigned sequentially (i.e., in order of the most similar secondary patient to the least secondary patient), such that when implemented the sequentially corresponding secondary users of the same current aggregate dataset are assigned the same weights. For example, the weight determined for kth secondary user of the training dataset is assigned to the kth user of the aggregate dataset being presently analyzed.
IV.C.2 Threshold Determination
560
As introduced above, baseline thresholds are used both in training the model and the risk score calculation. The model calculates the baseline threshold based on the total number of usage events over a specific prior time period preceding either the current day during which the risk is being calculated (for either labeling during the training or during model use), or more generally during a time period preceding the time of a current/most recent rescue usage event.
In one example, the time period is a range bounded by the current day and seven days prior, In one example, the time period is a range bounded by the current day and seven days prior, exclusive (so, excluding the current day's data from consideration), however other time periods may be used. If there are not seven days' worth of data accumulated, for example due to a patient profile having recently been created or usage events not having been tracked during this time window, the baseline may instead be calculated based on the number of days for which data is available.
560
In one embodiment, the baseline risk threshold is set as a fraction (percentage) of the total number of usage events over the specified period, however in other embodiments, other functions of the total number of usage events may be used to determine the threshold. First, the total number of rescue usage events from a preceding seven day period may be summed and recorded, for example for a total of 30 events. Second the baseline threshold is determined as the number of events equal to a fraction of the total, for example 5% of the total or 1.5 events. To label a day as an exacerbation day, the model assigns a label if the number of rescue inhaler usage events in a given day is greater than the threshold, for example greater than 5% of the 30 events tallied over the last seven days. Otherwise, the day is assigned an alternate label indicating that the day did not qualify as an exacerbation day.
The setting of the threshold based on a fraction of the prior period's events, as opposed to a fixed number of events, allows for greater flexibility and variability in tailoring the threshold to the patient's or region's specific disease or regional state. For example, if the patient's rescue inhaler usage is elevated over a number of days, then having the threshold be dynamic in this manner allows better identification of whether the parameters are (or are not) exacerbating the patient's condition. In one embodiment, the baseline risk threshold is set to 5% rather than some higher threshold such as 14% (representing a 1 day average out of a 7 day history) to account for right tailed usage patterns with asymmetric distribution due to frequent 0's and to ensure high risk categorizations of days with usage events greater than a median day yet below the 7-day average.
IV.D Sensitivity Analysis for Triggers
570
To determine whether the relative risk score for a trigger indicates that a primary patient is sensitive to the trigger, the sensitivity module determines the significance and confidence of the relative risk score based on a comparison to one or more confidence intervals using statistical analysis techniques, for example a weighted sequential probability ratio test (SPRT). The sensitivity analysis module may implement any other analysis technique, including those used by the US Food and Drug Administration to monitor drugs for potential recalls due to adverse side effects not seen during clinical trials.
570
570
After determining that the number of number of exacerbation days exceeds when the trigger was present exceeds the baseline threshold of rescue usage events from a previous interval, the sensitivity module may implement statistical analysis techniques to determine if the increase in rescue usage is a result of the trigger condition. In one implementation, the sensitivity module uses, as inputs to a statistical model, for each a weighted normalization term based on a distance metric describing similarity the primary patient to each secondary patient, the relative risk score for the trigger, the baseline threshold, and the number of exacerbation days during which the trigger was present to determine a Weighted Log Likelihood Ratio (WLLR). The WLLR may be an aggregate function of the weighted normalization factors for each secondary patient in the aggregate dataset.
The distance metric describes a Euclidean distance between trigger values associated with the primary patient and the secondary patient. Similar to the description above in Section IV.C regarding weights assigned to secondary patient data, the weighted normalization term is inversely related to the distance metric, such that the closer the distance between the primary patient and the secondary patient, the higher the weight assigned.
570
570
The WLLR is then compared against two boundary conditions, or confidence intervals which are functions of the significance, or type I error rate, and the power, or type II error rate. When the WLLR violates the lower bound confidence interval, the sensitivity module concludes that the relative risk score for the trigger does not indicate that the patient is sensitive to the trigger. When the WLLR violates the upper bound confidence interval, the sensitivity module concludes that the relative risk score for the trigger does indicate that the patient sensitive to the trigger.
570
570
The sensitivity module may compare the WLLR to several sets of confidence intervals and determine a level of confidence in the sensitivity determination for the trigger. For example, if the WLLR exceeds an upper bound confidence interval associated with a low confidence level, but violates a lower bound confidence interval associated with a high confidence level, the sensitivity scoring module may abstain from determining the primary patient's sensitivity to the trigger until more data is available. However, a different WLLR which exceeded the upper bound confidence interval associated with the higher confidence level may be sufficient to identify the primary patient's sensitivity to the trigger.
570
570
FIG. 10
FIG. 10
In some implementations, the sensitivity scoring module may also be implemented to determine the level of risk an individual trigger poses to a patient on a given day. Once a patient has been identified as sensitive, insensitive, a degree of sensitive to a trigger, the sensitivity module may categorize ranges of trigger values with levels of sensitivity. is a diagram illustrating an exemplary sensitivity assessment for a trigger, according to one embodiment. As illustrated in , ranges of trigger values on either extreme may be designated as indicative of a high risk, while ranges near the middle may be designed as medium or low risk depending on the results of the SPRT discussed above.
IV.E Trigger Identification Notifications
580
The notification module generates a trigger identification notification including any one or more of: the identified trigger, remaining unidentified triggers, information characterizing the identified trigger, suggestions and recommendations for addressing the identified trigger or avoiding rescue usage events.
FIGS. 11-12
FIG. 11
FIG. 11
131
570
580
show example cards displayed to a patient in response to the identification of a trigger, according to one embodiment. describes an interface presenting the progress that the data analysis module has made in identifying a set of triggers for a primary patient and the severity of each trigger. In the illustrated implementation, triggers which have been identified are presented with a red “X” or a green check, where the X represents triggers to which the patient is not sensitive and the check represents triggers to which the patient is sensitive. The interface may also include a metric describing the confidence in the identification of the trigger, for example the amount row of dots. In , the row of colored dots may be assigned a color representing the sensitivity of the patient, for example the color red indicates that the patient is not sensitive and the color green indicates that patient is sensitive. As the sensitivity module increases the confidence level with which it identifies the trigger, the confidence metric, or row of dots, may be colored in further. Before the confidence in each trigger exceeds a threshold confidence, the trigger may be assigned an inconclusive icon, for example a question mark, indicating that the trigger has not yet been identified with a threshold level of confidence. Because of the dynamically changing confidence metric, the notification module may alert the user whenever progress is made, even in small frequent changes.
FIG. 12
580
describes interfaces presented to a patient in response to a trigger being identified. Notifications may be sent out in response to the identifications of triggers which the primary patient is sensitive to and insensitive to. The notifications include a description of the identified trigger, for example “PM2.5 are tiny particles in the air that reduce visibility and cause the air to appear hazy when levels are elevated.” In some implementations, the trigger notifications may describe medication regimens which the primary patient may use in the presence of a trigger condition or lifestyle recommendations for the patient to reduce their sensitivity to the trigger. In some implementations, the risk notification module delivers a notification to a user when the application is closed or when the client device is not being used. The notification may be stored on the client device until the primary patient has an opportunity to review the data.
FIG. 13
FIG. 13
580
shows an example card displayed to a client describing their potential risk of triggering event, according to one embodiment. illustrates an interface presenting a daily forecast of the potential a user will experience a rescue usage event given the current contextual conditions of the primary patient and their known triggers. For example, the primary patient viewing the interface, John, may be sensitive to two triggers: the measurement of particulate matter 2.5 micrometers or less and the measurement of ozone in the air. When those two conditions are measured to be low while the other conditions are held constant, the forecast may describe the conditions as fair. However, if the measurements of either trigger were to increase, the forecast may be updated to describe the conditions as poor. When the forecast recognizes poor or unfavorable conditions, the notification module may deliver a notification to the primary patient informing them and including instructions for how best to handle the change in conditions while maintaining their health.
580
The trigger notification may also be delivered in many other situations which depending upon the implementations, for example in response to a rescue usage event, or may be sent to the client device according to some other mechanism. The notification module may also generate risk notifications. For example, if a patient's or region's current contextual conditions worsen due to changes in patient parameters or environmental condition parameters an updated risk notification may be delivered to the user based on one or more previously identified triggers. Risk notifications may also be delivered at a user's request, for example due to a verbal request for local asthma conditions from a third party device (e.g., Google Home™ or Amazon Alexa™) or via other platforms.
110
Generally, trigger and risk notifications are delivered through the client device , however, in other embodiments, in the event of improved or worsened conditions, risk notifications may be delivered as an SMS notification, an email notification from an embeddable widget with local asthma conditions, or notifications from various IFTTT applets (https://ifttt.com/).
V. Benefits
111
112
130
112
The trigger identification notifications provided to patient , providers , and users more generally convey many benefits. Patients are informed of their causes of a respiratory related event in real time or near real time as rescue usage events occur and can take actions to address or avoid those triggers, for example by adding or altering their prescribed medication regimen (such as an adjustment of dosage or the introduction of antibiotics or systemic corticosteroids) or by avoiding geographic areas with adverse condition (e.g., air pollution concentrations). Because event data is automatically reported to the application server without the need for patient input, the accuracy and quality of the event data used to identify triggers is improved relative to manually-collected data by a health care provider or other entity, and thus accuracy of the conclusion for the risk for asthma rescue events is also improved.
130
Additionally, notifications provided by the application server provide patients with additional information about the identified trigger, solutions to address the trigger, and their personal risk of rescue usage events on a given day based on that trigger. Notifications further encourage the user to play an active role in the management of their respiratory disease, for example asthma or COPD.
Information describing a trigger analysis for a patient based on their contextual data allows patients suffering from respiratory diseases to make informed lifestyle choices regarding different geographical regions. For example, when searching for real estate, the ability to eliminate geographic regions with a high risk of one or more triggers allows a patients to make informed decisions to improve their health. Similarly, when traveling, prior knowledge of a risk for region allows patients to prepare the necessary precautions. As a result, a trigger analysis based on contextual data provides patients with anticipatory knowledge necessary for them to reduce their risk of respiratory events wherever their location may be.
VI. Additional Considerations
Although the discussion above focuses on asthma, all systems and processes described herein are equally applicable to chronic obstructive pulmonary disease (COPD) and chronic respiratory disease (CRD) generally, and consequently can also be used to assist in treatment of COPD and CRD, as well as asthma.
It is to be understood that the figures and descriptions of the present disclosure have been simplified to illustrate elements that are relevant for a clear understanding of the present disclosure, while eliminating, for the purpose of clarity, many other elements found in a typical system. Those of ordinary skill in the art may recognize that other elements and/or steps are desirable and/or required in implementing the present disclosure. However, because such elements and steps are well known in the art, and because they do not facilitate a better understanding of the present disclosure, a discussion of such elements and steps is not provided herein. The disclosure herein is directed to all such variations and modifications to such elements and methods known to those skilled in the art.
Some portions of above description describe the embodiments in terms of algorithms and symbolic representations of operations on information. These algorithmic descriptions and representations are commonly used by those skilled in the data processing arts to convey the substance of their work effectively to others skilled in the art. These operations, while described functionally, computationally, or logically, are understood to be implemented by computer programs or equivalent electrical circuits, microcode, or the like. Furthermore, it has also proven convenient at times, to refer to these arrangements of operations as modules, without loss of generality. The described operations and their associated modules may be embodied in software, firmware, hardware, or any combinations thereof.
As used herein any reference to “one embodiment” or “an embodiment” means that a particular element, feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment. The appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment.
As used herein, the terms “comprises,” “comprising,” “includes,” “including,” “has,” “having” or any other variation thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, article, or apparatus that comprises a list of elements is not necessarily limited to only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Further, unless expressly stated to the contrary, “or” refers to an inclusive or and not to an exclusive or. For example, a condition A or B is satisfied by any one of the following: A is true (or present) and B is false (or not present), A is false (or not present) and B is true (or present), and both A and B are true (or present).
In addition, use of the “a” or “an” are employed to describe elements and components of the embodiments herein. This is done merely for convenience and to give a general sense of the invention. This description should be read to include one or at least one and the singular also includes the plural unless it is obvious that it is meant otherwise.
While particular embodiments and applications have been illustrated and described, it is to be understood that the disclosed embodiments are not limited to the precise construction and components disclosed herein. Various modifications, changes and variations, which will be apparent to those skilled in the art, may be made in the arrangement, operation and details of the method and apparatus disclosed herein without departing from the spirit and scope defined in the appended claims. | |
Master Gland controls...
- Autonomic nervous system
- Coordinates between nervous system and endocrine system
- Body temperature (measured by blood flowing through)
- Hunger/ thirst/ satiety
- Internal cardian clock- superciesmatic nucleus/ body clock
3 of 17
Brain Stem
- Superior to but continues with the spinal cord
- Represents a group of anatomical components: (from top) Midbrain ---> Pons ---> Medulla Oblongata
4 of 17
Medulla Oblongata
- Begins at inferior border of the pons an extends to the foramen magnum
- Contains all ascending and descending tracts extending between the spinal cord and cerebrum
- Contains nuclei which are regulators for various vital body functions
- Has two external bulges call the pyramids, formed by the largest motor tracts in the body
- Axons on the left pyramid cross to the right side and vice versa (desussation of pyramids)- left side of the brain controls the right side of the body
Functional centres
- Cardiovascular: Rate and force of heartbeat and diameter of blood vessels
- Respiratory Rhythmicity Centre: Rate and rhythm of breathing
- Vomiting, Coughing and Sneezing
- Nuclei associate with 5 of 12 cranial nerves originate here
5 of 17
Pons
- Directly above medulla, anterior to cerebellum
- Bridge connecting spinal cord with brain and parts of the brain with eachother
- Inhalation. exhalation
- Pontine respiratory group, normally inactive during quiet breathing- group of neurons act as an off switch to terminate medullary inspiratory activity
6 of 17
Midbrain
- Extends from pons to diencephalon
- Cerebral aqueduct passes through midbrain connecting 3rd ventricle above with 4th ventricle below
Nuclei
- Substantia nigra: Controls subconscious muscle activity, releases dopamine, loss of these neurons is associated with Parkinson's disease
- Raphe: Releases serotonin
- Locus coeruleus: Releases noradrenaline
- Pedunculopontine: Releases acetyl choline
7 of 17
Reticular Formation
- Organisation only found in the cerebral cortex
- Netlike arrangement of neuronal cell bodies and small bundles of myelinated axons in brain stem
Reticular Activating System
- Ascening portion
- Consists of sensory acons that project to the cerebral cortex
- Maintains consciousness
- Inactivation results in sleep
- Anasthetics effect this area
- Prevents sensory overload
8 of 17
Cerebellum
- Develops very late and is maluble at young age explaining why aquisation of language is easier
- 2nd largest part in the brain
- Inferior to cerebrum, posterior to brainstem
- Main neuron= Purkinje Neuron
- Involved in unconscious motor coordination
- Cognition and emotion
- Target for alcohol
- Autism, ataxia
9 of 17
The Diffuse Modulatory Systems of the Brain
Systems
- Serotonergic Raphe Nuclei
- Dopaminergic Substatia Nigra Ventral Tegmental Area
- Noradrenergic Locus Coeruleus
- Cholinergergic Basal Forebrain and Brain Stem Complexes
Common Principles of Systems
- Small set of neurons at core
- Arise from brain stem
- One neurone influences many others
- Synapses release transmitter molecules into extracellular fluid
10 of 17
Serotonin 1
- Originates from collections of nuclei (the main one being the dorsal raphe) in the raphe (brainstem)
- Axons innervate almost entire brain to release serotonin, acting on serotonergic receptors
- Depression, anxiety, sleep disorders, pain
- One chemical but multiple receptors---> chemical has many different functions
Serotonin Receptor Classes
- 13 receptors divided into 7 classes which are divided into sub classes
- All G-protein coupled receptors (GPCRs) apart from 5HT3 which is an ionoprotic receptor
11 of 17
Serotonin 2
Drugs acting on 5HT receptors
- Clozapine, Resperidone, Olanzapine: agonists at 5HT2A receptors (D2 receptors), used to treat psychosis
- Sumatriptan and other triptans: agonists of 5HT1D, used to treat migraines
- Buspirone, Gepirone: partial agonist at 5HT1A, used to treat generalised anxiety disorder (GAD)
- Odansetron, Granisetron: agonists of 5HT3, used as antiemetics
Drugs acting on 5HT transporters (SERT)
- Fenfuramine: reversible transport of 5HT into synapse---> more 5HT in the synapse meaning there is more 5HT to act on receptors, used to treat obesity
- SSRIs (selective serotonin reuptake inhibitors) e.g. Fluoxetine: block 5HT transporter meaning there is more in the synapse, used to treat depression
12 of 17
Dopamine 1
Nuclei
- Ventral tegmental area: motivation, cognition, reward
- Substantia nigra: voluntary movement
- Hypothalamus: breast milk
Effect of Dopamine depends on the brain region
Disorders
- Parkinson's
- Schizophrenia
- Addiction
- Hormonal disorders
13 of 17
Dopamine 2
Classification
- 5 receptors, all G protein coupled receptors GRCRs
- Functionally classified: D1 family (D1 + D5) and D2 family (D2,3,4)
- Neuronal excitation/ inhibition depends on G proteins they are coupled to
Drugs
- L-Dopa: converts to Da when it enters the CNS increasing dopamine levels, used to treat parkinson's
- Bromocriptine: D2 agonist, sometimes used to treat parkinson's but mainly used in the treatment of hyperprolactineamia (unnecessary production of breast milk)
- Haloperidol: D2 agonist, used to treat schizophrenia
- Clozapine: D4 agonist (also blocks 5HT), used to treat schizophrenia)
- Cocain: inhibits dopamine (and noradrenaline) transporters preventing removal, therefore there is more dopamine in the synapse
- Amphetamine: increases DA release
- Modafinil and Methylphenidate (Ritaline): increases DA in the synapse, resulting in increased wakefullness and concentration, used to treat narcolepsy and ADHD
- MDMA (Ecstasy): increased dopamine, serotonin and noradrenaline
14 of 17
Noradrenaline 1
- Main nucleus: locus coeruleus (LC)
- Axons of LC innervate almost the whole brain to release noradrenaline
- Focus, attention
Disease
- Impaired conition/ memory---> alzheimers
- Mood disorders---> depression
- Attentional disorders---> ADHD
Classification
- Alpha 1 (A,B, D) and 2 (A,B,C)
- All metabotropic coupled to different G-proteins
15 of 17
Noradrenaline 2
Na transmission in the CNS: | https://getrevising.co.uk/revision-cards/functional-anatomy-3 |
Are rows bad for rotator cuff?
The quick answer is that rowing exercises are typically good for the shoulder because they increase strength around the shoulder blade, which helps stabilize the shoulder. It is important to keep the elbows down near your side when performing rows to avoid pinching the rotator cuff.
What part of the body does upright rows work?
An upright row is an effective exercise to build strength in the shoulders and upper back. It’s a pull exercise, meaning you’ll be pulling the weight toward you and targeting your posterior chain, or the muscles on the backside of your body.
Do upright rows work rear delts?
But also surprising is the fact that the wide-grip upright row also increased muscle activity of the rear (posterior) deltoid head. So use the upright row in this manner for better development of both the middle and rear delts, as well as the traps.
Do rows work rotator cuff?
Together, these muscles are known as the rotator cuff. … Pressing (such as the bench press and overhead press) and pulling movements (such as pull-ups and rows) all work this function of the rotator cuff.
What muscles do bent over rows work?
What muscles do bent-over rows work?
- Latissumus dorsi (run down the sides of your back)
- Rhomboids (upper and mid-back)
- Trapezius (upper back)
- Biceps.
Can you do upright rows safely?
The upright row is one of the most harmful exercises you can expose your shoulders to. … Every time you raise the weight, a small tendon in your shoulder gets pinched (known as impingement) by the bones in the shoulder. This may not hurt immediately; it may not even hurt for a long, long time.
Do upright rows work your forearms?
It helps rotate your forearm in order to pull the bar down. During an upright row, it works to flex the elbow so that you can pull the weights upward.
What happens if you don’t fix a torn rotator cuff?
Without any treatment—either rest and rehabilitation or surgery—rotator cuff disorders may get worse. Over time, you may have more pain. You may lose range of motion and strength in your shoulder, making it harder to do your daily activities.
What should you not do with a rotator cuff injury?
Avoid sleeping on your side with your arm stretched overhead. Try not to lie on your shoulder while you sleep. Don’t smoke as it decreases blood flow to the rotator cuff. Avoid activities with repetitive overhead arm action.
How do you strengthen rotator cuff?
Rotator cuff exercises
- Lie flat on the back, extend the arms and legs, and engage the abdominal muscles.
- Reach one arm toward the ceiling, lifting it until the shoulder blade comes off the floor.
- Hold for 5 seconds.
- Return arm to the floor.
- Repeat on the other side. | https://supercoolbeaches.com/watersports/best-answer-are-upright-rows-necessary.html |
Loading Data...
Year : 2018
Value in US$ Mill
Value in US$
Order by value
Order by share %
India's position as an importing country with respect to SENEGAL in 2018
Value in US $ Mill
Sr No.
Product
Total Exports
India's Import
Share %age
1
GROUND-NUT, NOT ROASTED OR OTHERWISE COOKED, WHETHER OR NOT SHELLED OR BROKEN-IN SHELLED WHETHER OR NOT BROKEN(120242)
54.90
0.00
0.00
2
Guavas, Mangoes & Mangosteens, fresh/dried(080450)
33.80
0.00
0.00
3
Beans (Vigna spp., Phaseolus spp.), shelled/unshelled, fresh/chilled(070820)
33.69
0.00
0.00
4
Soups & broths & preps. therefor(210410)
29.64
0.00
0.00
5
OTHER LEGUMINOUS VEGETABLES, SHELLED OR UNSHELLED, FRESH OR CHILLED(070999)
23.77
0.00
0.00
6
Tomatoes, fresh/chilled(070200)
22.44
0.00
0.00
7
Melons (excl. watermelons), fresh(080719)
17.23
0.00
0.00
8
Watermelons, fresh(080711)
9.56
0.00
0.00
9
Onions & shallots, fresh/chilled(070310)
8.23
0.00
0.00
10
Sweet potatoes(071420)
4.47
0.00
0.00
Page Total
237.74
0.00
Page
1
2
3
4
5
6
7
8
9
10
of 10
Record 1 to 10 of 99
- Page Size -
10
25
50
100
All
Source : UN Comtrade
More information related to this country...
Information about the Country
Production of Fresh Produce
Exports to World
Imports from World
Import Tariffs
Import Regulation Standards
Export from India
Market Reports
Importer Directory
Trade Leads
Offer/Submit New Lead
View Buy Leads
View Sell Leads
Directory's
Exporters Directory
Service Providers
Logistics
APEDA Agri Exchange
Latest Sell Offers
Latest Buy Offers
Exports from India
International Trade
India Production
International Production
Import Traffic
News & Analysis
Market News
Latest Market Reports
MEIS/Drawbacks
News Archive
View Newsletter Online
Follow Us
Contact
Agricultural & Processed Food Products Export Development Authority
(Ministry of Commerce & Industry, | http://agriexchange.apeda.gov.in/countrysearchnew/india_standing.aspx?ctryid=02353&ctryn=SENEGAL&menuid=10 |
If you’re planning to lose weight and get fit, the first thing that you would have to set right is your diet. Limiting your calorie intake is not only the easiest, but also the best way to reduce your body fat percentage. But then, the question is, how does one go about doing that?
The answer is quite simple – by being in a caloric deficit. You are said to be in a caloric deficit when the amount of calories that you consume is lower than your maintenance calories. Wondering what maintenance calories are and how to calculate it? Continue reading to find out.
What are maintenance calories?
The total number of calories that you need to consume each day to remain at the weight that you’re currently in is what is termed as maintenance calories. Maintenance calories are something that’s very specific to a person and tends to vary depending on factors such as age, weight, gender, and activity levels.
This is precisely why it is extremely important to calculate the maintenance calories that are applicable to you. Read on to find out how you can do it easily within just a few minutes.
How to calculate your maintenance calories?
Although you can use a maintenance calories calculator to do it, knowing the logic behind the calculation is essential. Especially since it can help you understand how the tool works. Here’s the process flow for calculating your maintenance calories.
- Multiply your weight (in kilograms) by 1.0 if you’re a male and by 0.9 if you’re a female.
- Multiply the figure that you got in step 1 by 24.
- Again, multiply the figure in step 2 by the lean factor applicable to you. Check out the table below for the lean factors.
- Multiply the figure that you got in step 3 by the activity modifier. The activity modifiers are given below.
- That’s it! The resulting figure is your maintenance calories.
Lean Factor
|Body Fat Percentage||Lean Factor for Males||Lean Factor for Females|
|10 – 14%||1.0||1.0|
|15 – 20%||0.95||1.0|
|21 – 28%||0.90||0.95|
|Over 28%||0.85||0.95|
Activity Modifier
|Your Daily Activity Levels||Activity Modifier|
|Very Light||1.3|
|Light||1.55|
|Moderate||1.65|
|Heavy||1.80|
|Very Heavy||2.00|
Here’s an example that can help you understand how a typical maintenance calories calculation would work.
Say you’re a very active female weighing around 65 kilograms with a body fat percentage of around 18%. This is what your maintenance calories would be.
65 kilograms x 0.9 x 24 x 1.0 x 2.00 = 2,808 calories.
What this effectively means is that you would have to consume roughly around 2,808 calories to stay at the weight that you’re currently in.
Conclusion
So, now that you know how to calculate your maintenance calories, all that you need to do to lose weight is ensure that you consume lower than what your maintenance calories are. You could enlist the help of an online food calorie calculator to determine just how many calories your food contains.
Now, even when you’re fit as a fiddle, tragedy can strike you at any time in the form of a medical emergency or an ailment. Therefore, it is important to protect yourself financially from such incidents. And health insurance is the perfect way to do that. You can compare multiple plans to see which one fits your requirements the best before committing to a purchase as well. | https://barbaraiweins.com/how-to-calculate-your-maintenance-calories/ |
The purpose of this study was to investigate the relationship between expressive and receptive language, phonological, and verbal working memory proficiencies in the preschool years and eventual recovery from or persistence in stuttering. Participants included 40 children who stutter (CWS). At ages 3-5 years, participants were administered the Test of Auditory Comprehension of Language, 3rd edition (TACL-3), the Structured Photographic Expressive Language Test, 3rd edition (SPELT-3), Bankson-Bernthal Test of Phonology--Consonant Inventory subtest (BBTOP--CI), Test of Auditory Perceptual Skills--Revised (TAPS--R) auditory number memory and auditory word memory subtests, and the Dollaghan & Campbell Nonword Repetition Test (NRT). Stuttering behaviors were tracked in subsequent years, forming groups of children whose stuttering eventually persisted (CWS-Per; n=18) or recovered (CWS-Rec; n=22). Proficiency scores in morphosyntactic skills, consonant production, verbal working memory for known words, and phonological working memory for novel sequences obtained at 3-5 years of age were analyzed according to these groups. Results indicated that the major linguistic proficiency indices of eventual recovery or persistence of stuttering were related to phonological processing. Specifically, compared to CWS-Rec, CWS-Per were less proficient in measures of consonant production and repetition of novel phonological sequences. In contrast, receptive and expressive language proficiencies, as well as verbal working memory abilities, were quite similar for the two groups, though lower scores in expressive language abilities for CWS-Per neared statistical significance. These findings strongly suggest that phonological abilities in the preschool years should be taken into account as part of a comprehensive assessment for risk of the development of chronic stuttering.
Recommended Citation
Spencer, Caroline E., "Preschool Language and Phonological Proficiencies in Predicting Stuttering Recovery or Persistence" (2013). Open Access Theses. 60. | https://docs.lib.purdue.edu/open_access_theses/60/ |
We are looking for a Talent Acquisition Specialist to handle the entire recruitment process in our new R&D center in Sofia, Bulgaria. You’ll be part of a freshly created HR team in our new engineering office, that’s responsible for the full software development life cycle, from conception to deployment. To be successful in this role, you should be able to develop long-term recruiting strategies and nurture trusting relationships with potential hires.
What You'll do:
- Coordinating with hiring managers to identify staffing needs and determine selection criteria
- Proactive sourcing of passive candidates thru LinkedIn, Facebook, and other social platforms and professional networks
- Assessing candidate information, including resumes and contact details, using our internal Applicant Tracking System
- Helping Hiring Managers design job descriptions and interview questions that reflect each position’s requirements
- Organizing and conducting interviews, providing feedback both to the candidates and the hiring managers
- Taking part in the onboarding process, developing and following HR processes and procedures
- Identifying qualified candidates according to relevant job criteria, using databases, networking, and internet recruiting resources
- Coordinating and attending career fairs and technical conferences
- Developing collaborative relationships with universities, career centers and other organizations
- Explores different recruitment practices and support their implementation within the organization
- Taking active part in company events and marketing campaigns
- Expanding the company’s pipeline of candidates and networks
- Working closely with hiring managers and HR team in order to establish an effective recruitment strategy
- Forecasting quarterly and annual hiring needs by department
What we are looking for:
- Proven work experience as a Talent Acquisition Specialist or similar role in a product development company
- Familiarity with social media, resume databases and professional networks (e.g. Stack Overflow, LinkedIn, etc.)
- Hands-on experience with full-cycle recruiting using various interview techniques and evaluation methods
- Knowledge of Applicant Tracking Systems (ATSs)
- Excellent verbal and written communication skills
- A keen understanding of the differences between various roles within organizations
We’re Via, and we build technology that changes the way the world moves. Our guiding principle is simple: we know that the future of transportation is safe, dynamic, shared public mobility — the kind that reduces carbon emissions across congested cities, complements existing transit infrastructure, and provides everyone with accessible, efficient, and affordable ways of getting around. Through intelligently designed operating systems and sophisticated routing algorithms, we build localized and customizable solutions for each and every one of our global partners (100 and counting, last we checked…)
Long story short: we’re very proud to be championing the transportation evolution of cities around the world and modernizing mobility. Ready to join the ride?
Via offers above market compensation packages and benefits, including equity, health insurance, and relocation assistance.
Via is an equal opportunity employer.
! Via cares about your health and safety and takes prevention and control measures to limit the transmission of COVID-19. In this regard we are temporarily transitioning to an entirely virtual hiring process and we have also implemented an effective work-from-home policy across all of our offices.
*In regard to GDPR 2016/679 you hereby give your consent the personal data included in your CV/Resume/Motivational letter to be processed for the purposes of the recruitment and hiring process in the company. | https://boards.greenhouse.io/via/jobs/5063802002 |
Industry-Science Connections in Agriculture: Do public science collaborations and knowledge flows contribute to firm-level agricultural research productivity?
Prior research identifies a direct positive link between the stock of public scientific knowledge and agricultural productivity; however, an indirect contribution to agricultural productivity is also possible when this stock facilitates private sector invention. This study examines how “connectedness” between the stock of public scientific knowledge and private firms influences firm-level research productivity. Bibliographic information identifies the nature and degree to which firms use public agricultural science through citations and collaborations on scientific papers. Fixed effects models show that greater citations and collaborations with university researchers are associated with greater agricultural research productivity.
If you experience problems downloading a file, check if you have the proper application to view it first. In case of further problems read the IDEAS help page. Note that these files are not on the IDEAS site. Please be patient as the files may be large.
|Length:|
|Date of creation:||27 Apr 2011|
|Handle:||RePEc:ags:aaea11:103211|
|Contact details of provider:|| Postal: 555 East Wells Street, Suite 1100, Milwaukee, Wisconsin 53202|
Phone: (414) 918-3190
Fax: (414) 276-3349
Web page: http://www.aaea.org
Email:
More information through EDIRC
References listed on IDEAS
Please report citation or reference errors to , or , if you are the registered author of the cited work, log in to your RePEc Author Service profile, click on "citations" and make appropriate adjustments.:
- Schimmelpfennig, David E. & Heisey, Paul W., 2009. "U.S. Public Agricultural Research: Changes in Funding Sources and Shifts in Emphasis, 1980-2005," Economic Information Bulletin 58314, United States Department of Agriculture, Economic Research Service.
This item is not listed on Wikipedia, on a reading list or among the top items on IDEAS.
When requesting a correction, please mention this item's handle: RePEc:ags:aaea11:103211. See general information about how to correct material in RePEc.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: (AgEcon Search)
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
If references are entirely missing, you can add them using this form.
If the full references list an item that is present in RePEc, but the system did not link to it, you can help with this form.
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your profile, as there may be some citations waiting for confirmation.
Please note that corrections may take a couple of weeks to filter through the various RePEc services. | https://ideas.repec.org/p/ags/aaea11/103211.html |
Why Racial Disparities Are Alive And Well In Healthcare
It was 1999 when the Federal government first acknowledged our nation had a problem with race and health care. That year, Congress tasked the Institute of Medicine to study the matter, and the resulting report was not good. Minorities were in poor health and receiving inferior care, the report said. They were less likely to receive bypass surgery, kidney transplants and dialysis. If they had diabetes, they were more likely to undergo amputations, meaning their disease had been poorly controlled. And there was a lot more where that came from.
The IOM report was a call to action. In subsequent years, lawmakers crafted policies and established goals for improvement. Federal and state governments and numerous foundations set aside billions to fund projects. Health services researchers expanded their efforts to study the problem.
Twelve years later, we have something to show for the effort. Steep declines in the prevalence of cigarette smoking among African Americans have narrowed the gap in lung cancer death rates between them and whites, for example. Inner city kids have better food choices at school. The 3-decade rise in obesity rates, steepest among minorities, has leveled off.
Nevertheless, racial disparities persist across the widest possible range of health services and disease states in our country. The overall death rate from cancer is 24% higher for African-Americans than white people. The racial gap in colorectal cancer mortality has widened since the 1980s. African Americans with diabetes experienced declines in recommended foot, eye, and blood glucose testing between 2002-2007.
Why is this problem so hard to solve?
The reason is that the problem is exceedingly complex. Hundreds of factors contribute to racial disparities in health care. Progress on just a few of them is therefore unlikely to move the needle much (which isn’t to say we shouldn’t try!). The key contributing factors are these:
Identifying Target Populations-Studies of racial disparities in health care rely fundamentally on tools that classify people by race. These tools are notoriously imprecise. Most of them classify all people whose family immigrated from a country that was once considered part of the Spanish empire as “Hispanic,” for example. This means people of Panamanian, Mexican and Venezuelan descent are grouped together (to name but 3 countries).
The resulting “Hispanic population” in studies of health disparities is actually a polyglot of culturally-driven lifestyle choices, tendencies to seek care from physicians, and dozens more behaviors that impact health. This heterogeneity severely undermines the value of information obtained from the studies.
The Genetics Don’t Work: The genes responsible for phenotypic traits that forensic pathologists and anthropologists use to study race aren’t the same ones that govern how sodium-potassium ATP pumps work (and how they impact hypertension risk, for example). They have nothing to do with the genes that govern the body’s tendencies to store fat and establish a basal metabolic rate (and how they impact obesity risk). In fact race is largely a red herring in the search for genetic links to cardiovascular disease, cancer and other conditions that kill US minorities disproportionately .
Teasing-Out Environmental Factors-There are so many! A list of environmental causes of racial disparities in stroke mortality for example, might begin with culturally-driven preferences for certain foods or body types, cigarette smoking, exercise and so on. It might include personal income, educational levels, local availability of fast food restaurants, preventive services and safe places to exercise, and access to health insurance. And it probably also needs to include many causes we don’t yet appreciate. Just this week for example, scientists showed that African Americans suffering strokes tend to call friends first–not 911–a behavior that delays onset of lifesaving treatment. We don’t know what we don’t know about the universe of environmental factors that impact health. That is a serious problem.
Attribution for Poor Outcomes: Scientists have long struggled to determine whether observed disparities are caused by poor care or simply the result of caring for sicker people. The best available severity adjustment tools are no better than fairly good at helping scientists assess burden of illness in a population. To the extent these tools are imprecise, scientists can’t solve the ‘apples to apples’ problem in population-based health research.
Exploring hypotheses about poor care is equally problematic. Racial disparities could be traced to providers themselves, or to a lack of resources at their disposal. Any correlations involving providers could be caused by poor cultural sensitivity on their part (a bad thing), or their desire to develop care plans that reflect the preferences of their patients (presumably a good thing).
The Hundred Years’ War
Twelve years into our war on racial disparities in health care, we can celebrate several narrow, yet significant victories. In addition, we now better understand the factors that drive racial disparities, and this will create a foundation for additional success going forward.
Architects of the Affordable Care Act hope their law will turn out to be our nation’s greatest step forward in solving the problem of racial disparities in health care. But the law is under political siege and its very constitutionality has been questioned in the courts. As well, many deficit reduction plans threaten funding for the law.
In the best of cases, the ACA will be fully implemented in 2019, by which time our nation will be 20-years into our war on racial disparities in health care. The guess here is that we will be struggling with the problem for the better part of this century. | https://getbetterhealth.com/why-racial-disparities-are-alive-and-well-in-healthcare/ |
An example of a coordinated police effort.
Gang crime and violence are becoming significant issues throughout Yuba and Sutter Counties. The Yuba City Police Department is participating in a collaborative effort through the Yuba-Sutter Anti-Gang Enforcement Unit (YSAGE), which facilitates the implementation of successful community strategies designed to address the growing gang challenge.
The mission of YSAGE is to reduce gang violence in Yuba and Sutter Counties through proactive enforcement efforts, intelligence gathering, and improved communication.
The collaborative allows the pooling of resources so that we can saturate the region two or more times per month with 30-40 officers and the specific aim of targeted gang enforcement and conducting associated investigative follow-up. This concept is now spreading to additional counties in Northern California, with a Yuba City Police Department gang investigators serving as the elected coordinator of the wider-area cooperative.
Increase enforcement efforts of serious and violent crime, and enhance the sense of public safety.
Learn more about gang behavior and gang crime. Collect data and details including gang member names, most likely hangouts, high-risk neighborhoods, etc…
Identifying issues to be addressed. Learn more in order to address gang behavior and gang crime.
Communicate with the team to identify existing and ongoing efforts and programs, key strategic issues, and areas for which action plans and community implementation are desired.
Network to create a delivery system and measures to track ongoing efforts. Coordinate with others for purposes of prevention, intervention, and enforcement in both counties. Create a circle of support. Coordinate efforts with groups and individuals already working on gang-related issues.
Here are some common warning signs of gang involvement. Parents should look for multiple signs to indicate possible gang involvement because some of these indicators alone, such as clothes or musical preferences are also common among youth not involved in gangs. Parents are encouraged to familiarize themselves with local gang symbols, seek help early and consider contacting school personnel, local law enforcement, faith leaders, and community organizations for additional assistance.
Exhibits negative changes in behavior such as:
Talk with your child about the dangers and consequences of gang involvement. Let your child know that you don’t want to see him or her hurt or arrested. Explain to your child that he or she should NOT: | https://www.yubacity.net/city_hall/departments/police_department/who_we_are/special_units/y_s_a_g_e_-_anti_gang |
Java Full Stack Developer (Angular)
The role: We are hiring a Java Full Stack (Angular) developer for a 6 month contract opportunity in Gauteng.
Please make sure you are willing to work in a contract position before applying below.
Skills and experience: Required qualification:
- Registration Certificate
- Degree or diploma related to ICT
Preferred rating:
- Programming skills and in-depth knowledge of the following aspects:
- Angular 7+ (with TypeScript) and higher
- Java
- HTML5
- CSS
- REST / SOAP / AJAX
- jQuery
- Bootstrap
- Typing
Experience required:
- Web developer with a minimum of 5 years development experience
- Test-driven development (being able to write test cases own units) – Integration with other systems (Web services, DB, MQ, etc.)
- Proven work experience in web development and web-based user interfaces.
- A solid understanding of how web applications work, including security, session management, and best development practices.
Key responsibilities: Duties / responsibilities:
- Write well-designed, verifiable, and efficient code using software development best practices
- Create the user interface / website design using standard HTML / CSS practices and the framework provided
- Integrate data from various services and background databases
- Create and maintain software documentation
- Cooperate in development using various technologies, for example, Angular (typescript) 7 and higher, typed bootstrap with Angular and Java. | https://benri.tech/java-full-stack-developer-angular/ |
Dr. Vincent Havrilko is an Air Force civilian serving the 366th Logistics Readiness Squadron, 366th Mission Support Group, 366th Fighter Wing, Air Combat Command at Mountain Home AFB in Idaho. He served for 22 years in the Air Force, retiring as a Master Sergeant.
Dr. Havrilko completed a Ph.D. in Business Administration at Trident, as well as degrees at the master’s and bachelor’s levels. He is one of only nine alumni to have earned a degree at each program level from Trident. His education at Trident University significantly developed his critical decision making capabilities, confidence, and patience.
Dr. Havrilko expresses gratitude to the extremely support and understanding faculty and staff at Trident University. He would like to extend special thanks to the following people for their outstanding support and encouragement:
Dr. Qin Sun, Dr. Indira Guzman, Dr. Atefeh Yazdanparast, Dr. Heidi Sato, Dr. Joshua Shackman, Dr. Stephen Pollard, and Dr. Stephen Fitzgerald. | https://www.trident.edu/students-and-alumni/alumni/alumni-profiles/vincent-havrilko/ |
Apply now!
Application deadline 3 April 2017
The online application is a two-part process.
Apply on these websites:
www.khm.lu.se/en/studies/application www.universityadmissions.se
Contact
[email protected]
Programme Administrator: Laura Hatfield
Address
http://www.khm.lu.se
Malmö Art Academy
Box 4035
SE – 203 11 Malmö
Sweden
Malmö Art Academy is an internationally renowned fine arts programme at Lund University, Scandinavia's largest comprehensive university. The Academy is a state-financed school of fine arts with 74 students offering a three-year Bachelor of Fine Arts (BFA) programme and a two-year Master of Fine Arts (MFA) programme. In addition, it offers a two-year MFA programme in Critical Studies and a Doctorate Programme in Fine Arts.
Master's programme in Fine Arts: Critical & Pedagogical Studies
Full-time, 120 ECTS credits
Malmö Art Academy, Lund University, Sweden
Teaching language: English
Application deadline: 3 April 2017
Malmö Art Academy invites applicants for Critical & Pedagogical Studies, an international post-graduate study programme leading to a Master of Fine Arts degree, working across borders between art theory, practice and pedagogy. It brings together students with a BFA as well as many students who have previously completed a studio based MFA. The programme seeks to encourage applied thinking within the artistic field, investigating how we might both produce and discuss art, as well as how pedagogical strategies can be seen as artistic models in art practice and as teaching.
This is a pioneering programme that seeks to examine the ways in which critical theory and pedagogy inform artistic practice. Theory will be viewed as practice, and practice will be theorised. Key issues and topics of discussion are pedagogical strategies such as artists teaching artists and the artist's role in mediating to a public, combined with critical thinking on artistic production, with an openness to learn and experiment. The curriculum is in constant development and is well suited for artists working from a hybrid or expanded practice. The students and programme facilitators work together to form the programme structure through group dialogue and a critical examination of the content as it suits the participants' areas of interest, while responding to relevant topics of the day. This normally takes the form of intensive seminars and workshops led by visiting lecturers, the professors at Malmö Art Academy and the facilitators of Critical & Pedagogical Studies. Our focus is on how artists discuss, produce, educate and communicate, as we aim to encourage students to be critical of how educational structures operate, both within the programme itself and in relation to an educational practice.
Focus is on the development of the student's own projects through group critiques and individual tutorials. In the final year of the programme students participate in a work placement where they apply theoretical knowledge to a practical teaching application within an art school, museum or relevant institution. The final work towards completion of the degree is developed to bridge theory and practice through individual exam projects and a written thesis. Malmö Art Academy provides the participants with a collective workspace, and the participants may use all premises at the Academy, including the library and workshops. The facilitators of the programme have also negotiated strong relationships with local arts organizations that are keen to collaborate with our group and to support student initiatives.
As the programme enrolls a small group of up to nine students per year, participants receive individual attention and guidance on their projects. The programme usually entails at least one study trip. Past study trips have been to London, Gothenburg, Graz, Scotland and Italy.
The international profile is an important feature of the Academy. It is accentuated by the close proximity to Denmark and mainland Europe, as well as by student exchanges with art academies in other countries. The Academy also benefits from the rich and internationally orientated art life in the region, which has many art galleries, museums and other institutions. Guest lectures from visiting artists and theorists as well as various forms of collaborative projects are continuously offered at the Academy.
Previous visiting artists, curators and critics, include: Gertrud Sandqvist, Sarat Maharaj, Learning Site, Lisa Le Feuvre, Maria Fusco, Kristina Lee Podesva, Katrine Hjelde, Andrea Ray, Apolonija Šušteršič, Marion von Osten, Marc Herbst/Journal of Aesthetics & Protest, Frans Jacobi, Joachim Koester, Jürgen Bock, What, How & For Whom/WHW, BFAMFAPhD, Neil Mulholland, Felicity Allen, Alanna Lockward & Jeannette Ehlers, among others.
For more information please contact:
Programme Director: Maj Hasager: [email protected]
Programme Administrator: Laura Hatfield: [email protected]
The online application is a two-part process. Apply on these websites:
www.khm.lu.se/en/studies/application
www.universityadmissions.se
Tuition Fees: | https://www.e-artnow.org/announcement-archive/archive/2017/3/article/ACTION/12721/ |
In this episode, the first episode of Season 2, co-hosts Carl Ayers, Tijana Ibrahimovic and William S. Gooch, filling in for Cicily Daniels, examine several fashion news alerts. There is a discussion of Beyonce and Jay z’s new campaign with Tiffany & Co., tennis champion Naomi Osaka’s collaboration with Levi, and the new photography exhibit of street/fashion photographer Bill Cunningham.
Special guest in this episode includes acclaimed fashion designer Byron Lars who talked about his fall 2021 collection and the rebranding of his company. Tijana Ibrahimovic spoke with associate editor Tessa Swantek about her article “NYFW and The MET Gala Meet to Change the American Fashion Cultural Narrative” which examines the new direction of New York Fashion Week and the upcoming Met Gala.
Lastly, there was a lively discussion with editor-in-chief William S. Gooch with Carl Ayers about Carl’s wonderful fall 2021 trends’ article. “Fashion Reverie Talks” is excited to be back for Season 2 with a new production team, new graphics, new music and some new, exciting things to come. Stay tuned!! | https://fashionreverie.com/?p=33030 |
by Iris Rodriguez
The idea of sending a message in a bottle has been around since 310 B.C. The Greek philosopher Theophrastus used to plop sealed bottles in the sea to prove that the Mediterranean was formed by the inflowing Atlantic. In the 16th century, Queen Elizabeth I of England believed that some bottles might contain secret messages sent home by British spies or fleet. As a result, she appointed an “Uncorker of Ocean Bottles”; making it a capital crime for anyone else to open one.
Today the idea of message in a bottle is more of fun romantic notion, thanks to literature and Hollywood movies. Show some love with this heart shaped glass bottle containing a custom stamped message, on a ribbon, using StazOn ink. Embellish the bottle with StazOn Studio Glaze and other adornments.
Skill: Intermediate
Time: 1 Hour
Directions
Step 1
Begin by selecting a heart shaped bottle. I found this wonderful bottle at my local craft store. Working on glass can be a little tricky. For instance, getting some things to stick, getting an even texture (e.g. brush strokes) and color. It helps to prime the glass. For this project the glass is primed with on GlazOn. It is added to the glass; and in between the StazOn Studio Glaze layers. The Studio Glaze is a pigment ink medium. Start by brushing the GlazeOn onto the bottle. Brush using a crosshatch pattern; create X patterns without washing the brush. By doing a crosshatch pattern, allows you build up the GlazeOn evenly and eliminates brushstrokes. Brush on a section at a time. Let the glass dry completely. This product dries fast. Wash your brush in water right away. Dry the brush before using with the GlazeOn again. If you have water, it will active the GlazeOn or Studio Glaze and you will remove any medium you may have on the glass and get uneven surface.
Step 2
Squeeze out a small drop of the St. Valentine Studio Glaze on your grey craft mat. Using an Inkblusher sponge on the StazOn Studio Glaze, sponge one section at a time. Only place a few drops of the Studio Glaze at a time, then sponge. To increase color intensity, keep adding layers. Sponge one layer at a time, and allow each layer to completely dry. Brush on a thin layer of the GlazeOn in a crosshatch pattern. Ensure your brush is dry. Allow this layer to completely dry.
Step 3
Sponge on the Jet Black StazOn Studio Glaze on the sides and bottom of the heart. This adds dimension and interest. Allow the layer to completely dry. Brush on a thin layer of the GlazeOn in a crosshatch pattern. Ensure that the brush is dry. Allow this layer to completely dry.
Step 4
Squeeze a few drops of the Shimmer IrRESISTible Pico Embellisher, then sponge. This gives the bottle a slight shimmer. If not adding the Shimmer brush on a final layer of GlazeOn. Allow the layer to completely dry.
Step 5
The bottle is complete at this point. For added measure, once all layers have dried, seal the glass with a final sealer to protect the beautiful finish. Brush on a thin layer of Indoor water based Polyurethane. Any brand will do. Polyurethane is great for sealing art work on just about any surface. It comes in matte, satin, and gloss. It has a nice strong, but soft finish (does not have that plastic feel, looks natural.
Step 6
Stamp the message on the ribbon. This can be done while you wait for the products to dry on the glass. First a little about ribbons. Recommend using a Grosgrain ribbon. I tried stamping on satin and polyester ribbons, but the ink bled. The Grosgrain ribbon performed better due to its design; it’s heavy and tightly woven. This type of ribbon is widely available and comes in many colors and widths. Choose a size that will fit your alphabet stamps. I liked the one inch ribbon; it filled up the glass nicely and it fit my larger alphabet stamps as well.
This sounds silly to even say it, but before you begin to stamp your message, write it out on a piece of paper. There is something about concentrating on the stamping that makes you miss a letter here and there, if you’re not careful. You don’t want to send the wrong message (pun intended, lol!). Stamp the message while the ribbon is on the roll, you don’t know exactly how much ribbon your will need. Cut the ribbon after you finish stamping the message; leave a little extra ribbon at the end of the message.Singe the end of the ribbon with a cigarette lighter or it will unravel over time. The ribbon is flammable; singe by quickly running a cigarette lighter across the edge.
Step 7
Using heavy clear glue, adhere the ribbon to the center of the cork. Glue about ¼ inch of the ribbon.
Step 8
Allow the glue to dry. Use a piece of piece of tape or place something light on the cork to hold it in place while the glue dries.
Step 9
Place the cork and ribbon in the bottle and embellish. | https://imaginecraftsblog.com/2019/01/07/learn-how-to-color-glass-for-a-valentines-gift/?shared=email&msg=fail |
You are here: Home › News › Thieves have been stealing new appliances from newly built homes on Auckland's North Shore.
Thieves have been stealing new appliances from newly built homes on Auckland's North Shore.
Thieves have been stealing new appliances from newly built homes which can’t be locked up on Auckland’s North Shore. House construction on Auckland’s North Shore may be on the rise, but it’s also creating a boom in associated thefts. Thieves have been targeted appliances, tools and materials at the new house sites, North Shore Area Commander Inspector Shanan Gray says. In one case a kitchen appliance package was stolen from a home which was nearly finished but couldn’t be locked up. “Thieves will take any opportunity you can give them, there’s nothing more frustrating for a tradesman to have the things they use to make a living pinched from them,” Insp Gray said. He advised home owners and project managers to delay bringing appliances, hot water cylinders and other valuables into homes until they’re secure. Statistics New Zealand figures released on Thursday showed new dwelling consents were up 38 per cent in Auckland from 2012, and the total value of building work consented nationally was up 20 per cent to $12.1 billion.
Comments Off on Thieves have been stealing new appliances from newly built homes on Auckland's North Shore.
I have a job as a Manager, am I eligible under the Skilled Migrant Category?
Can I afford an Inner City Executive Apartment in New Zealand? | https://queencitylaw.co.nz/thieves-from-newly-built-homes-aucklands-north-shore/ |
The CIMPA school « Probabilistic and statistical modeling in epidemiology and environment » will take place at the University of Fianarantsoa from May 10 to 19, 2021.
Introductory courses
Course 1: On the study of markov processes and extensions (Solym MANOU-ABI)
The purpose of this course is to introduce basics notions of stochastic modeling. The main mathematical objects are continuous time stochastic processes. Firstly, we will study the discrete-time Markov chains, the Poisson process and some examples in population dynamics. We will also present the continuous-time Markov chains, namely the poisson process, and more generally Markov jump processes. Finally we will consider diffusion processes. The course will be accompanied by a practical session work in order to illustrate the concepts covered. This course will allow the participants to better understand the advanced courses: Course 4 and Course 5.
Course 2 : Introduction to statistical analysis of spatial data (Amir ABOUBACAR)
In several areas, when we want to study a random phenomenon, we notice that it occurs somewhere. With the development of technological tools, it is easy to record observations in a database, the coordinates of the places where these random phenomena occur. Thus, most of the databases studied have a spatial component. The purpose of the course is to ask ourselves what can we do with this spatial data. The geographic location of a random event is an important explanatory variable in many fields such as econometrics, epidemiology, environment, agronomy, road and air safety, meteorology, image processing. It is therefore essential to include this information as much as possible in the statistical models. This course is an introduction to spatial data analysis. We will learn what types of statistical problems arise with spatial data and the basic techniques for dealing with them. We will see how to use lots of points on a map to bring out useful information and make predictions on the evolution of phenomena. After a general review of spatial statistics as a whole, as well as the usual methods of description and representation of spatial data, we will focus on a point analysis. More specifically, we will learn to recognize and test different types of spatial models.
⁃ Stationary process and notion of covariance
⁃ Spatial dependence and notion of variogram
⁃ Spatial prediction by kriging
⁃ Analysis and estimation of a variogram (if possible)
⁃ Validation of a variogram model (if possible)
Course 3 : Introduction to R Software and simulation methods (Angelo RAHERINIRINA)
In this course, we will introduce the R software:
creation of vectors, matrix, lists, data bases, writing a function, programming with R; and a presentation of some classical simulation methods. This course will allow participants to acquire a solid foundation of preliminary notions of simulation in order to perform practical sessions of courses 6 and 7.
Advanced Courses
Course 4 : Stochastic and deterministic models of epidemics (Etienne PARDOUX)
The most widely used deterministic models for epidemic modeling are the limits of the law of a large number of stochastic Markov models. However, these are not very realistic, as they assume that durations of infection follow exponential laws. In this course, we will present non-Markovian stochastic models, their limit law of large numbers, as well as the study of fluctuations around this law of large numbers. We will use simulations to compare the different models.
Course 5 : Piecewise deterministic Markov processes: modeling and simulation (Benoîte De Saporta)
When a phenomenon is too complex to modeled by a deterministic dynamic system of reasonable dimension, one can use systems which include several regimes. Each complex regime is controlled and the system is allowed to switch from one regime to another at random and at random times. These hybrid stochastic systems form the class of piecewise deterministic Markov processes (PDMP). They have many advantages, such as a flexible and easily interpretable parametric form, and are the subject of many recent developments related to their simulation and optimization.
Course 6 : Statistics and image processing (Mame Diarra FALL)
Nowadays, image processes are omnipresent in our daily life, whether static (pictures) or dynamic (videos). More and more fields (environment, agriculture, medicine, risk management and prevention etc.) are using image process as an information tool. However, the relevant information is not always directly accessible in the raw images produced by the sensors and specific treatments must be applied. Statistical methods can be used for image processing, both for improving the visual quality (denoising, deflashing etc.) and for extracting information. In this course, we are interested on the methodology and application of statistical models to image processing to young researchers and PhD students. The course will be accompanied by practical sessions works with R in order to illustrate the concepts covered.
Course 7 : Statistics of extremes and applications to the environment (Gwladys TOULEMONDE and Jean-Noël BACRO)
The course offers an introduction to the theory of univariate and multivariate extreme values.
When we try to assess a dike height with only a very low probability of being exceeded or
when we are interested in the maximum rainfall height expected on average once every hundred years,
only the Distribution tails of the variables or vectors considered are informative.
To make the desired extrapolation and estimate extreme quantiles, conventional statistical approaches
based on the characterization of behavior on average are not suitable. The theory of extreme values offers
the mathematical concepts and the statistical tools allowing to approach these problems in a relevant way.
The laws of the maxima of random variables or vectors or the crossing of high thresholds and their
properties are presented. These concepts introduced will be implemented using the R software:
program implementations and case studies (risk study, etc.). Finally we will place ourselves in a spatial framework
and present tools and models adapted to extremes.
Reference :
Beirlant, J., Goegebeur, Y., Segers, J. et Teugels, J. (2004) : Statistics of extremes: Theory and Applications Coles, S. G. (2001) : Introduction to statistical modelling of extreme value. Springer. de Haan, L., Ferreira, A. (2006) : Extreme value theory : an introduction. Springer
Course 8 : Modeling of insect pest dynamics (Bedreddine AINSEBA)
We aim to introduce mathematical models for the study and understanding of the population dynamics of insect pests in their ecosystem. The mathematical tools of interest are systems of partial differential equations which describe the numerical variations over time of the population as a function of the stages of development, the sex of individuals and environmental conditions. Food resources, temperature, humidity and predation are the main environmental factors explaining the fluctuations in the number of individuals over time. The differences in development that exist in the cohorts are also modeled to refine the model’s predictions. In this course we will cover the following sessions:
- Session 1 (1h): Using degree days to predict the dates of emergence of insects + 30 minutes of practical work. | http://www.cimpa2021-madagascar.fr/index.php/program/ |
In Nome, onlookers welcomed the first racers off the Iditarod trail on Monday – but not for the iconic sled dog race, these racers had wheels.
Jay Petervary, of Victor Idaho, and Jeff Oatley of Fairbanks, were the first to cross the burled arch in Nome on Monday night. But not for the race you might think.
running, skiing or cycling across the finish line.
Cyclist John Lackey of Anchorage reached the half-way point in McGrath just 1 day, 18 hours, and 32 minutes into the race – a time four hours faster than the leading dog team on record.
Indeed, Oately and Petervary ran into more than their share of winter after the halfway point. Petervary says the *real* weather kicked in just as the pair was leaving Tokotna.
After a grueling 15 days, 6 hours, and 29 minutes on the trail. Oately andPetervary pedaled under the burled arches just seconds apart – so perfectly in sync that even their fans couldn’t spot the winner.
When pressed about who actually won, Oately points to his friend and competitor.
“Nah. It was — everyone who comes underneath this arch actually wins in the end,” Petervary said.
Petervary adds that, much like with the 1000 mile sled dog race, arrival in Nome is never guaranteed. Since the Invitational started in 2000, only 52 individuals have ever made it across the finish line – 34 of them on bikes.
Sharing a hug – and a toast – over their two-wheeled sleds, the two cyclists have little difficulty pin-pointing their favorite moment on the trail.
“This was pretty cool,” Petervary said. | https://www.alaskapublic.org/2015/03/17/iditabike-racers-reach-nome/ |
Isezaki Jun is one of the most renowned masters of bizen pottery, a traditional craft that emerged nearly a thousand years ago in the Inbe district of Bizen, Okayama Prefecture. His exquisite work as a potter has earned him the coveted title of “living national treasure,” bestowed by Japan’s Agency for Cultural Affairs.
Pottery workshops equipped with the kilns needed to produce the bizen style first appeared in the twelfth century, near the end of the Heian period (794–1185). Various utensils and containers were made in these workshops and the ones produced in the Momoyama period, in the second half of the sixteenth century, were highly prized—as they are today—by proponents of the wabisabi aesthetic, particularly for use in tea ceremonies and other traditions.
The appeal of bizen pottery lies in its tasteful, earthen feel. The pottery is never glazed and no designs are painted on the finished pieces. Each piece spends around two weeks in the kiln, and the color changes that take place during the firing process lie at the heart of the art form.
The clay used has a low resistance to heat and contracts a great deal so that sudden and extreme shifts in temperature can easily result in damage. This is why the firing process is stretched out over such a long period of time, gradually raising the temperature level.
The Element of Unpredictability
“The pottery slowly interacts with the blazing fire,” Isezaki points out. “Many unanticipated changes can occur inside the kiln, there are many changes that you cannot anticipate so there is a very deep and wide variety of expressions that can appear. That is not to say that everything is left to chance, however, as he goes on to explain:
“The placement of the pieces inside the kiln is of crucial importance for bizen pottery. You need to work out how the flames will fire through the chamber and calculate where the ash is likely to fall. Putting the clay works into the kiln is like putting your creation in god’s hands. Sometimes a beauty emerges that couldn’t have been created by someone on their own. It’s a combination of the craftsman’s careful design and the randomness introduced by the firing process. When these two factors align, a truly satisfying bizen creation can emerge.”
The entire process—from putting the clay works into the kiln to taking them out again as finished products—takes around a month. Isezaki does this twice a year and says that, even after all this time, he is still nervous with anticipation when the day comes to remove the pottery from the kiln.
A Marriage of Creativity and Tradition
Isezaki is the fifth person to be designated as a living national treasure for work with bizen pottery.(*1) His unique characteristic is his modern take on this traditional craft. He has brought back the traditional kind of kiln used in the middle ages—a kiln that is dug into a hillside like a tunnel. For the past hundred years or so it has been more common to instead use a “climbing kiln,” built on the top of the slope, which makes it possible to produce a large amount of pottery with a consistent quality. In order to bring back the earlier type of kiln, Isezaki thoroughly researched the history and spent time learning from great artists like Isamu Noguchi (1904–88) and Ikeda Masuo (1934–97).
He continues to break new ground in his craft, with creations ranging from traditional tea ceremony implements to larger objects and installations. The bold, new forms that he creates year in and year out have captured the attention of artists in Japan and around the world. But his own creativity is rooted in the traditions of bizen pottery, as he explains:
“It was through many years of hard work that my predecessors pioneered the methods of bizen pottery used today. They managed, through that struggle, to overcome the weaknesses inherent to clay. This tradition built up over the years is essential. I believe that it is precisely through tradition that we can discover new possibilities for bizen pottery.”
Isezaki continues to seek to new ways to express himself in this artistic medium, thereby passing on to the next generation a legacy that they can build upon.
(*1) ^ The four other living national treasures are Kaneshige Tōyō (1896–1967), Fujiwara Kei (1899–1983), Yamamoto Tōshū (1906–94), and Fujiwara Yū (1932–2001). | https://www.nippon.com/en/images/i00018/ |
The Oxford Internet Institute is a leading centre for research into the impact of digital technologies on the health and well-being. Applications are invited from highly qualified individuals for the position of Postdoctoral Researcher to collaborate with Professor Andrew Przybylski (Associate Professor and Director of Research) on the longer-term global impact of emergent technology on the wellbeing of children and adolescents.
The position is suited to candidates who hold or are near completion, of a PhD/DPhil in a relevant field.
The position requires someone with the ability to identify and analyse relevant large-scale social, epidemiological, and technological datasets, review the literature, and publish results in collaboration with Professor Przybylski. The primary tasks will be to undertake quantitative research with specific emphasis on wrangling and analysing data to test foundational questions relating to the relationship between technology availability and adoption.
Excellent writing, presentation abilities, and analytical skills are required. A record of publications in international peer-reviewed journals and the proven ability to collaborate across disciplines and obtain research funding, both commensurate with the stage of the candidate's academic career is sought. An established track record producing transparent, replicable, and reproducible research is highly desirable.
The position is available immediately fixed-term until 30 September 2022, with possibility of renewal thereafter, subject to funding availability.
To apply for this role and for further details please click on the link below.
Only applications received before 12.00 midday on 25 October 2019 will be considered. Interviews for those shortlisted are currently planned to take place on 13 November 2019. | https://my.corehr.com/pls/uoxrecruit/erq_jobspec_version_4.display_form?p_company=10&p_internal_external=E&p_display_in_irish=N&p_process_type=&p_applicant_no=&p_form_profile_detail=&p_display_apply_ind=Y&p_refresh_search=Y&p_recruitment_id=142874 |
The New Hampshire Supreme Court recently held in the case of Michelle Hemenway v. Edmund J. Hemenway, Jr. that a New Hampshire court may issue protective orders against an out of state defendant, even when the defendant committed acts from another state. This case affirms the right of the plaintiff to seek domestic violence protective orders in New Hampshire where he or she resides or is sheltered.
As background to the case, the parties resided in Florida until 2008 when Michelle moved to NH with the parties children. Michelle filed for, and subsequently received a restraining order in the Derry Family Division, pursuant to RSA 173-B. She alleged that in 2008 Edmund became verbally abusive and threatened her and her children both in Massachusetts and in Florida.
Edmund filed a special appearance contesting the jurisdiction of the family division to enter final protective orders against him. He argued on appeal that the court lacked both subject matter and personal jurisdiction over him because the underlying acts occurred in Florida and Massachusetts, not New Hampshire.
Subject Matter Jurisdiction
The court ruled that subject matter jurisdiction had been statutorily granted to the family division and that there was no territorial limitation in the statute (as there is with criminal threatening, etc in the criminal code) that would have prevented Michelle from bringing the petition where she either permanently or temporarily resides. “The fundamental logic of that statutory provision is unassailable: a victim of domestic abuse who seeks a place of refuge must be able to engage the protections of the law of the jurisdiction in which she is sheltered.”
Personal Jurisdiction
The court found that the only acts Michelle relied on in her petition occurred outside of New Hampshire. Therefore, Michelle had “failed to demonstrate facts sufficient to establish personal jurisdiction over the defendant.” However, the court held that since the protective order did not impose affirmative obligations on Edmund, instead only issuing orders protecting Michelle, personal jurisdiction is not required.
The court recognized the principles of two landmark United States Supreme Court cases to explain the relationship between the courts and the residents of their states. Both Pennoyer v. Neff and Williams v. North Carolina provide that even if an offending party does not reside in the victim’s state, that state’s courts are not prevented from issuing orders relative to the status (whether marital status as in the above two cases or safety status as in this case) of its inhabitants.
To require such a ruling would leave a domestic violence petitioner with two untenable choices: 1) return to the state where the abuse occurred; or, 2) “wait for the abuser to follow the victim to New Hampshire and, in the event of a new incident of abuse, seek an order from a New Hampshire court.” These two choices are clearly at odds with the purpose of RSA 173-B and New Hampshire’s interest in protecting the victims of domestic violence.
Crusco Law Office, PLLC Law Clerk Dan McLaughlin contributed to this post. | https://www.nhfamilylawblog.com/2010/03/articles/domestic-violence/hemenway-personal-jurisdiction-is-not-required-for-nh-court-to-issue-domestic-violence-protective-orders/ |
ships where I felt disconnected even though I was spending a lot of time with my partner. Somehow, I felt misunderstood. There is an important difference between feeling lonely and being alone. We can spend a whole weekend alone without feeling disconnected or lonely, if we made the conscious choice to spend time by ourself. If you feel lonely, it is an unpleasant feeling of being disconnected.
“Try to break out of this habit and be more attentive for the people surrounding you, opening yourself up for connection.”
All students probably feel lonely at some point during their study. Especially, international students struggle with loneliness since they have left their home and are disconnected from their country. They have to build a completely new social network while at the same time having to adjust to the new environment. You can read more about this in one of the previous blogs ‘Going Abroad’. A research conducted in Australia clearly demonstrates what is happening in Groningen as well. 200 Australian international students were intensively interviewed about their feelings of loneliness (Sawir, Marginson, Deumert, Nyland & Ramia 2008). The researchers categorized three different ‘types’ of loneliness the students were experiencing. Personal loneliness is experienced when students feel (geographically) disconnected from their families. Social loneliness is experienced by the loss of their network in their home country. Another important aspect is cultural loneliness. This arises from the loss of their natural cultural environment and the inability to communicate in their native language.
Feeling connected in the world of social media
Sherry Turkle made a good point in her talk ‘connected but alone’ stating that social media is powerful in creating connection but at the same time can hinder connection. Imagine a time when you got a text from someone that lighted up your day. A few words on your screen make you feel more connected to that person. At the same time, while waiting for the bus, surrounded by people staring at their phones, it is impossible to connect with these people. As a teacher, I see the default mode of many students to take their phones when the break starts after the first half of a lecture. Try to break out of this habit and be more attentive for the people surrounding you, opening yourself up for connection. If someone asks for directions start a short conversation instead of just telling the way. If someone is having a confused look while staring at the bus schedule, offer to help. This openness for contact fosters connection with people in your daily life.
“Maybe that person inspires you or you inspire that person.”
How to strengthen connection
Start to think about how connected you feel with different people in your surroundings. With whom do you feel connected within your family? Within your group of friends? Within your studies? Do you feel connected with a stranger? Who is that? This could for example be that neighbor with whom you are exchanging smiles when stepping into your building but have never talked to. Write down the persons you feel connected to.
In a next step, challenge yourself to answer the question why you feel connected to that person. Is it because you think you share similar emotions, have gone through similar experiences or because you share the same passion? Maybe that person inspires you or you inspire that person. After answering these questions, you focus on how you could strengthen these connections in the upcoming week? This could be by calling that friend you would like to have a coffee with or by starting a conversation with that neighbor you have not talked to yet. Just a little thing to strengthen the bond and feel more connected. If you feel lonely, prioritize connections and prioritize relationships. This does mean being brave and stepping out of your comfort zone. Small things can be enough like asking a friend for a coffee date. Opening up and sharing about yourself can help strengthen connections. You could also think about joining a sports team or doing some voluntary work. Try to switch the focus from things you cannot control at that moment (feeling lonely) to things you can control (prioritize connection, taking action).
If you recognize yourself in this blog and would like some guidance, don’t hesitate to contact us.
References:
-
Sawir, E., Marginson, S., Deumert, A., Nyland, C., & Ramia, G. (2008). Loneliness and international students: An Australian study. Journal of studies in international education, 12(2), 148-180.
Inspiration was taken from: | https://wakeupstudent.nl/being-lonely-without-being-alone-english/ |
Relocating with children can present a unique set of challenges. While adults have resources that help them process the impact of the transition, children have difficulty managing the changes which effects them academically, socially, and emotionally. As a result, parents may want to carefully consider potential effects that moving schools can have on their kids, and the ways in which they can prepare them for the best possible experience.
The impact a school transfer has on a child depends on different factors, such as the age of the youth in question. The younger the student, the easier a move may be. However the older child will remember the experience and learn more from it.
Once children have begun to attend school, school relocation will mean separating them from their friends. Students may struggle as they attempt to make new friends in a new environment or different culture. This may make students feel sad, confused, or even angry at their parents for making the change. Parents should sit down with their children before the move and discuss the reasons behind it and prepare them for what they can expect. It is important that parents convey their enthusiasm for the move and take leadership in setting a positive tone. Children tend to adopt their family’s opinion of the relocation.
Starting at an entirely different school also has the potential to impact children’s academic performance. If children worry about being behind in class, parents can explain that it is certainly not their fault. Schools teach different subjects in different sequences. Parents can promise their kids that they will do all they can to help them catch up to their peers.
To avoid these and other possible issues, parents will want to carefully select among the best schools for kids. The priority in the school transfer process is finding schools that best fit your child’s needs and personality. Maybe this is a good opportunity to leave a lackluster school situation and find those things that were missing in you student’s present school. How can you best match your child’s current curriculum with schools in your new community? If expect to return to your original community which schools have a course of study that will make the return move as smooth as possible? Plan forward strategically. Ask about feeder patterns. Make sure that the school you select now is aligned with other well-regarded programs in subsequent educational stages.
Finally, remember that children are resilient. They will learn adaptability and benefit from experiencing life in different corner of the world. With your thoughtful planning and encouragement, moving schools can be a positive experience. | https://www.schoolsearchsolutions.com/services/finding-schools-for-relocating-families/ |
High dimensional phenomena are ubiquitous in modern applications, such as in telecommunications, genomics, and imaging. The mathematical and algorithmic analyses underlying these models involve deep tools from asymptotic geometric analysis, random matrices, and combinatorics. In particular, random matrix theory (RMT) appears as a central concept at the heart of mathematical and computational challenges.
Compressed Sensing is a recent framework that enables approximation and exact reconstruction of sparse signals from incomplete measurements. It is strongly related to other problems of different fields such as approximation theory (diameter of sections), high dimensional geometry (neighborliness and asymptotic geometry of convex bodies), harmonic analysis (trigonometric diameter and selection of characters) and random matrices (behavior of the largest and smallest singular values).
The behavior of large wireless networks depends on a large number of non observable parameters that are modeled as realizations of entries of certain large random matrices whose probability distributions are assumed to be known, at least up to certain parameters. Certain performance metrics, to be optimized, can be interpreted as functionals of the eigenvalues of large random matrices, and can, therefore, be approximated by deterministic terms that can be more or less evaluated. This potentially allows to develop new efficient and possibly decentralized optimization algorithms for large wireless networks.
The application of large random matrices to statistics is even more recent, dealing with the estimation of the eigenvalues of a population covariance matrix from the sample covariance matrix when the sample size is of the same order of magnitude as the number of variables. Many connections between large random matrices and statistical problems remain to be explored both from practical and methodological point of views.
Scientific program of the Bézout Labex
In Compressed sensing, the main property that should satisfy a matrix A to be a good decoder for sparse signals from incomplete measurements is called the Restricted Isometric Property (RIP). But very few matrices are known to satisfy this property. One of the Bézout Labex’s objectives is to address a constructive approach to solve this problem, like using a clear algorithmic description of the matrix that satisfies this property.
Large random matrix theory (RMT) is now recognized as a useful tool for the analysis of large wireless telecommunication networks. Although RMT tools have yet been used in several contexts, a lot of work remains to be done in this field.
Several classical statistical methodologies developed in the context of multivariate time series appear to be relevant when the number of observations is much larger than the dimension of observations. However, large dimension time series can be met in applicative contexts such as large sensor networks, large wireless networks, finance… Generally, the number available of observations is limited, and can be of the same order of magnitude than the dimension of the series. In this context, it is necessary to develop new practical estimation schemes as well as relevant large sample analysis technics in which the number of observations and their dimension converge towards infinity at the same rate. Although this framework appears important, it has not been addressed extensively in the past years. The Labex proposes to develop methodologies based on large random matrix theory, and to study large dimension «information plus noise model» in which the observation is a noisy version of a «useful signal». Important generic problems such as detection of the useful signal, or the estimation of parameters depending on its statistics (e.g. functionals of the eigenvalues/eigenvectors of its covariance matrix) will be addressed. Applications to statistical signal processing and wireless communications will be developed. Preliminary results have been obtained in the context of the ANR projet Sesame (conSitent EStimation and Large random MatricEs, end in December 2011).
Valorization of results, transfer, and expertise
Industrial collaborations on the theme of large random matrices have already been developed. This concerns, in particular, companies in the area of mobile communications for doctoral funding (CIFRE contracts), research projects in cognitive radio-communications as the DEMAIN ANR Telecom project, and to some extent, the European Fifth Framework Programme (FP5) ANTIUM. The Bézout Labex plans to continue the development of these results in the field of wireless communications in two directions.
The first applicative framework will be the optimisation of ressources of a network, which requires the maximisation of metrics that can be either highly complex or simply non computable, as dependent on random data with known statistics but non observable. In some contexts, these performance indicators may converge towards deterministic terms both simple to calculate and to optimize.
The second issue is related to cognitive radio in which mobile terminals may in the future, after analysis of their local electromagnetic environment, choose the bandwidth that best suits their needs. For this, the terminal will, without having much prior information, evaluate the quality of service it can obtain in each band, and then get an idea of nuisances that its presence will produce. This environment is rich in statistical problems in which large random matrices appear naturally. This is due to the random nature of propagation channels and to the growing numbers of users of mobile networks. | http://bezout.univ-paris-est.fr/high-dimensional-phenomena/ |
Movie BIOS!
Sam Tibi- See director BIO
Native of France, Sam Tibi is a young film director and editor based in London.
Sam has always been amazed by the immersive power of Cinema, obsessed by how it can built bridges between minds.
In 2014, he graduated with honours from the University of the Arts London in Film Production.
Sam has since been working on a wide range of film projects including short films, music videos, making-of and promo videos. These experiences honed both his technical filmmaking and team-working skills.
Sam praises the work of filmmakers who successfully use their originality and creativity to connect audiences with their characters' story. To name a few:
Charlie Kaufman (Adaptation), Michel Gondry (Eternal Sunshine of the Spotless Mind), Gaspar Noe (Enter the Void) and Ron Fricke (Samsara). | https://www.wildsoundfestival.com/sam_tibi.html |
No person in the United States shall, on the ground of race, color, or national origin, be excluded from participation in, be denied the benefits of, or be subjected to discrimination under any program or activity receiving Federal Financial assistance.
Heartspring has in place a Title VI Complaint Procedure, which outlines a process from local disposition of Title VI complaints and is consistent with guidelines found in Chapter III of the Federal Transit Administration Circular 4702.1B, dated October 1, 2012. If you believe that Heartspring's federally funded programs have discriminated your civil rights on the basis of race, color, or national origin you may file a written complaint by following the procedure outlined below:
1. Submission of Complaint.
Any person who feels that he or she, individually or as a member of any class of persons, on the basis of race, color, or national origin has been excluded from or denied the benefits of, or subjected to discrimination caused by Heartspring, may file a written complaint with the Director of Equity, Engagement and Student Safety (EESS). A complaint form is available for download here and is available in hard copy at the offices of Heartspring. Upon request, Heartspring will mail the complaint form. Such complaints must be filed within 180 calendar days after the date the discrimination occurred.
Note: Assistance in the preparation of any complaints will be provided to a person or persons upon request and as appropriate. If information is needed in another language, then contact Mary Huber at 316.634.8806.
Complaints should be mailed to or submitted by hand to:
Heartspring
8700 East 29th Street North
Wichita, KS 67226
Attn: Director of Equity, Engagement and Student Safety
2. Referral to Review Officer
Upon receipt of the complaint, the Director of EESS at Heartspring, shall appoint one or more staff review officers, as appropriate, to evaluate and investigate the complaint. If necessary, the Complainant shall meet with the staff review officer(s) to further explain his or her complaint. The staff review officer(s) shall complete their review no later than 45 calendar days after the date the agency received the complaint. If more time is required, the Director of EESS shall notify the Complainant of the estimated time frame for completing the review. Upon completion of the review, the staff review officer(s) shall make a recommendation regarding the merit of the complaint and whether remedial actions are available to provide redress. Additionally, the staff review officer(s) may recommend improvements to Heartspring's processes relative to Title VI, as appropriate. The staff review officer(s) shall forward their recommendations to the Director of EESS for concurrence. If the Director of EESS concurs, he or she shall issue the Heartspring's written response to the Complainant. This final report should include a summary of the investigation, all findings with recommendations, corrective measures where appropriate.
Note: Upon receipt of a complaint, Heartspring shall forward a copy of this complaint and the resulting written response to the appropriate KDOT and FTA Region 9 contacts.
3. Request for Reconsideration
If the Complainant disagrees with the Director of EESS's response, he or she may request reconsideration by submitting the request, in writing, to the President and CEO within 10 calendar days after receipt of the Director of EESS's response. The request for reconsideration shall be sufficiently detailed to contain any items the Complainant feels were not fully understood by the Director of EESS. The President and CEO will notify the Complainant of his or her decision in writing either to accept or reject the request for reconsideration within 10 calendar days. In cases where the President and CEO agrees to reconsider, the matter shall be returned to the staff review officer(s) to reevaluate in accordance with paragraph 2 above.
4. Appeal
If the request for reconsideration is denied, the Complainant may appeal the President and CEO's response by submitting a written appeal to Heartspring Board of Directors no later than 10 calendar days after receipt of the President and CEO's written decision rejecting reconsideration. The Heartspring Board of Directors will then make a determination to either request re-evaluation by the staff review officer(s) or forward the complaint to KDOT for further investigation.
5. Submission of Complaint to the Kansas Department of Transportation
If the Complainant is dissatisfied with the Heartspring's resolution of the complaint, he or she may also submit a written complaint within 180 days after the alleged date of the discrimination to the State of Kansas Department of Transportation for further investigation.
KDOT Office of Contract Compliance
Eisenhower State Office Building
700 Southwest Harrison Street
3rd Floor West
Topeka, KS 66603
Heartspring’s Transit Public Participation Plan Outline
1. Brief description of provider's activities and services
Heartspring is a residential/school facility and has been providing transportation to Heartspring students ages from 7 to 21 for over 30 years. We provide rides only to Heartspring students within Sedgwick County for various educational purposes including shopping, entertainment activities, church services, employment, to and from school, medical appointments, Special Olympics and other various outings.
2. Brief description of activities that would warrant public participation, (i.e. fare changes, changes to service hours, route adjustments, service area changes).
Heartspring does not charge its students for any transportation services. There are no fixed routes. We are a demand-response system. All rides are limited to Heartspring students and subject to each student needs.
3. Brief description of the proactive public participation strategies would be used.
Heartspring is a private not-for-profit residential/school serving students with multiple disabilities. We do not offer our transportation services to the general public. However, should another CTD 9 agency request the use of a vehicle from our transportation fleet, Heartspring does allow the use of our fleet vehicles.
4. Brief description of outreach methods to engage minority and Limited English Proficiency (LEP) individuals, (i.e. translation of public meeting materials, providing translation services if the requested, targeted media messages in low income neighborhoods of service area, work with existing, work with existing neighborhood and advocacy organizations).
All of Heartspring students are transported with their para-educator or Heartspring medical staff. Many Heartspring students are non-verbal and use an alternative communication device such as a picture book or a voice output device. All Heartspring staff assisting a student on the Heartspring transportation system are trained in communicating with their student if an alternative communication device is used.
5. Brief description of the desired outcomes of the agency's public participation efforts.
Heartspring does not provide public transportation. Heartspring transportation fleet is for the sole purpose of providing services to the students we serve.
6. Brief summary of recent outreach efforts over the past three years.
Heartspring does not provide public transportation. Heartspring transportation fleet is for the sole purpose of providing services to the students we serve. If a CTD 9 agency requests the use of a vehicle from our transportation fleet, Heartspring does allow the use of our fleet vehicles.
Notifying the Public of Rights under Title VI
HEARTSPRING
Operates its programs and services without regard to race, color, and national origin in accordance with Title VI of the Civil Rights Act. Any person who believes she or he has been aggrieved by Any unlawful discriminatory practice under Title VI may file a Complaint with Heartspring.
For more information on the Heartspring civil rights program, and the procedures to file a complaint, contact 316.634.8700; email Mary Huber; or visit our administrative office at 8700 E. 29th St. N., Wichita, KS 67226
For more information, visit www.heartspring.org
A complainant may file a complaint directly with the Federal Transit Administration by filing a complaint with the Office of Civil Rights, Attention: Title VI Program Coordinator, East Building, 5th Floor - TCR, 1200 New Jersey Ave SE, Washington, DC 20590
Limited English Proficiency Plan
Introduction
On August 11, 2000, President Bill Clinton issued Executive Order 13166 "Improving Access to Services for Persons with Limited English Proficiency," (65 FR 50121). The intent of this Executive Order is to improve access to federally conducted and federally assisted programs and activities for persons who are limited in their English proficiency. The purpose of developing an LEP plan, as a recipient of federal funds, is to identify the extent of LEP individuals in the region and identify ways that the transit agency can reduce and/or eliminate the barriers to LEP individuals. The starting point for developing this plan is to perform a four factor analysis to determine the individualized needs of the region. After these needs are identified, the transit agency should develop a language assistance plan addressing the mix of services that will be provided.
Four Factor Analysis
Heartspring is a school that provides special education services to students who are severely disabled.Most Heartspring students are on the autism spectrum and many are considered to be severely disabled.
Using 2007 - 2011 American Community Survey data for Sedgwick County it has been determined that there is no group of LEP individuals that "speak English less than very well" that meet the 5% requirement. The most relevant LEP group is the Spanish Creole speaking individuals. This group makes up 4% of the total population. There are many different groups of LEP individuals in Sedgwick County, but none of these groups meet the 5% criteria. Considering no LEP group meets the 5% requirement, our agency is not required to translate vital documents.
Table Depicting membership of Committee, Councils, Broken Down by Race
|Body||Caucasian||Latino||African American||Asian American||Native American||Other|
|Population within service area, (Sedgwick County)||69.5%||13.4%||9.5%||4.2%||1.4%||2.0%|
|Agency Board of Directors||93%||0%||0%||0%||7%||0%|
|Agency Staff||60%||7%||25%||2%||2%||4%|
|Heartspring Students||73%||8%||11%||6%||1%||1%|
(1) Identify number of or proportion of LEP individuals that can utilize the service provided by Heartspring.
The first population group is the citizens of Sedgwick County, Kansas. At no time does the transit system pick up students within Sedgwick County. All rides are generated from the Heartspring campus. About 70% of our students are non-verbal, they do not have the ability to speak and they require an alternative communication device. All students require assistance when riding in the Heartspring transit system and every staff person providing such assistance has been trained to use the alternative communication device with the student to communicate.
The second population group is the Heartspring Board of Trustees and these individuals never ride our transit system. The third population group is the Heartspring staff and that group is 100% proficient in English. This population rides the transit system only to assist the student in riding on the system and to assist the student in all functions when the destination has been reached. The final population group is the Heartspring students, and our verbal students are 100% English proficient.
(2) Identify the frequency in which LEP individuals come in contact with the service:
The Heartspring system does not interface with any LEP individuals.
(3) Identify the importance of the service to the LEP community:
The Heartspring system has no effect on the lives in Sedgwick County. Our transit services always starts and ends on the Heartspring campus. The system provides transportation only to Heartspring students and staff who are assisting students.
(4) Identify the resources available and the respective costs of these resources:
If the Heartspring system were to make contact with an LEP individual, we would utilize a picture book like one used by our students to communicate with that LEP individual. The picture book is a book of pictures that the student uses to communicate their needs and desires to other students, to staff, and to the general public.
Limited English Proficiency Plan
Utilizing the information gathered from the Four Factor Analysis, the following plan is developed in order to provide the necessary assistance to LEP persons.
Identified LEP individuals
The Heartspring transit system does not interface with the general public of Sedgwick County. The system is uses exclusively for Heartspring students and all rides start and end on the Heartspring campus. Therefore no written translation is required.
Language Assistance Measures
All Heartspring staff that work with students are taught how to use the alternative communication device that a student may use. Many of these systems as based on pictures and our staff could utilize a student's system to communicate to an LEP individual.
Training Staff
Heartspring staff is trained on the various communication devices our students use. There would be no additional training required for staff to use these systems to communicate with a LEP individual.
Providing Notice
LEP plan will be posted at www.heartspring.org website. LEP plan will be provided to any person or agency requesting a copy. The person of contact in regards to the LEP plan is Mary Huber and can be reached via e-mail at Mary Huber or by contacting via telephone at 316.634.8700. If a complaint is to be filed by an LEP individual, please utilize the Title VI Complaint Procedures.
Monitoring and Updating LEP Plan
Heartspring will update the LEP plan according to the Title VI update schedule which is every three years. The plan will also be updated anytime changes in the demographics of the agencies service area are deemed significant in regards to LEP persons. | https://www.heartspring.org/school/transit-civil-rights-plan |
TIps for Healthy Eating
In addition to cleaning up your eating habits to improve brain health, there are some foods deemed as “superfoods” for your brain. Just as spinach gave Popeye strong muscles, here are a few top superfoods that can give you brain power.
READ MORE
In our last post we talked about resolving to take charge of your health so that you can transform your life. A big part of improving your health is what you put into your body. You’ve no doubt heard the expressions: “you are what you eat” and “garbage in, garbage out.” You can’t eat fast food and junk food every day and expect to stay healthy and feel your best. It just doesn’t work that way. What can healthy eating do for you? Here are some of the amazing benefits […]READ MORE
| |
How do aquaporins facilitate the passage of water?
1 Answer
Aquaporins are membrane proteins that serve as channels in the transfer of water, and in some cases, small solutes across the cell membrane. The channels are so selective that water passes through them, and acid does not.
They are found in bacteria, plants, and animals.
In mammalian cells, more than 10 forms have been identified so far.
AQP0 is abundant in the lens of the eye.
AQP2 is expressed in the kidney collecting ducts, where it is under the control of antidiuretic hormone (ADH).
Mutations of AQP2 result in diabetes insipidus.
AQP3 is present in the kidney collecting ducts, epidermis, urinary, respiratory, and digestive tracts.
AQP4 is present in the brain astrocytes, eye, ear, skeletal muscle, stomach parietal cells, and kidney collecting ducts.
AQP5 is in the secretory cells such as salivary, lacrimal, and sweat glands.
The diverse and characteristic distribution of aquaporins in the body suggests their important and specific roles in each organ. | https://socratic.org/questions/how-do-aquaporins-facilitate-the-passage-of-water-1 |
From the telephone to email to intranets to enterprise social networks, businesses have long worked to apply the latest technologies in the hopes of improving efficiency and productivity. Despite the effort, it appears many companies are currently missing the mark. In fact, according to a recent Global Engagement Survey conducted by Oracle, 56 percent of employees reported not having access to the latest technology needed to do their jobs well.
In a TechRepublic article issued earlier this week, Gretchen Alarcon, group vice president of HCM product strategy at Oracle, summarized the survey findings by saying, “What we found is employees want the same modern digital technology that they are accustomed to at home in the workplace, accessible leadership, and a strong company culture that aligns with their personal values — often trumping monetary compensation. These factors are all influencing the degree employees feel engaged and committed to a company.”
So why the disconnect between employee preferences and the actual tech tools made available? For starters, IT teams are presented with the complex challenge of implementing and maintaining security amidst constant technology changes. This can lead to a fear of evolving too quickly without the appropriate protocol in place to keep the organization protected. When thinking specifically about offering access to mobile devices, applications, cloud storage and other tech tools employees want, it’s important to take a step back to evaluate employee needs, craft a comprehensive strategy that provides direction on how the organization will address each aspect of mobility, and develop an onboarding process supported by written policies and procedures that clearly communicate expectations of employees in every department at every level.
There’s no denying that interaction and collaboration among employees is the lifeblood of most businesses. Data consistently shows that effective collaboration and strong employee engagement can result in dramatic positive business consequences, from small efficiency increases to the innovation of entirely new solutions. The question becomes, how can your organization develop a long-term strategy that will continually engage employees through the inevitable changes, innovations and disruptions in the marketplace?
At this juncture, many companies find themselves at a fork in the road: to support and manage a bring-your-own-device (BYOD) environment or to retain control of enterprise mobility through corporate-provided devices only. While the choice may be difficult, the outcome of that choice could mean the difference between a heightened level of employee engagement and a disconnected, disgruntled workforce. Though it may require changes in IT attitudes, it is possible to deploy and manage a BYOD strategy without compromising on critical security and control principles. In fact, BYOD could be a cost-effective way to address employee engagement both now and in the future. Contact our team to discuss how to get started leveraging BYOD in your business today. | https://techorchard.com/tech-tools-creating-employee-engagement/ |
Berlin court reverses ban on use of EncroChat evidence in criminal trials
Public prosecutors in Berlin have been told they can use messages intercepted by French police during a sophisticated hacking operation into the EncroChat encrypted phone network in German courts.
The Superior Court in Berlin this week overturned a ruling by the Berlin Regional Court that found millions of text messages gathered by French and Dutch police in a hacking operation against EncroChat users could not be used legally in evidence.
The Berlin public prosecutor announced the verdict on Twitter: “Our complaint was successful.” The court confirmed the usability of “EncroChat in accordance with the higher court case law in Germany”.
French and Dutch investigators obtained millions of supposedly secure messages from EncroChat phone users between April and June 2020 after being granted a court order to place a data interception device on an EncroChat server which was uploaded to tens of thousands of handsets.
This week’s ruling comes two months after a judgment restricting the use of EncroChat messages by a Berlin court.
The case concerns a 31-year-old accused of drug dealing, but has wider implications for the admissibility of EncroChat evidence in legal proceedings.
The public prosecutor confirmed it had re-issued an arrest warrant against the individual, who has been living with his family for the past two months following release from custody. Prosecutors said the individual was a flight risk.
Since July, according to German press reports, more than 550 prosecutions against 135 suspects have been initiated on the basis of EncroChat data in Berlin.
Courts in the UK, France and Holland face similar legal challenges over the admissibility of EncroChat evidence. At least 20 defendants are understood to have made complaints to the UK’s Investigatory Powers Tribunal, which is expected to make rulings next year. Other legal challenges are being considered in crown courts.
The question of admissibility of EncroChat evidence in Germany is due to be addressed by the German Supreme Court, which is considering a number of EncroChat-related cases. A verdict is not expected until spring 2022.
Speaking after this week’s verdict, Christian Lödden, a criminal defence lawyer familiar with the case, said the Berlin Superior Court’s verdict was weak and poorly reasoned, given Germany’s strict privacy laws.
Last year, he said the state approved 21 phone taps using malware across the whole of Germany, tiny in comparison to the 3,350 EncroChat phones in Germany that were hacked by the French Gendarmerie’s computer crime unit, C3N.
“The hurdles to get warrants for tapping phones, for going into phones and reading messages, are really high in Germany. You need concrete suspicions, named people and strong criminal violations. You cannot do it for every offence,” he said.
Lödden said every regional court in Germany had at least one EncroChat case and that judges in the country were dealing with the cases in different ways.
“At the end of the day, the Supreme Court will find a final decision for this legal question. Is it admissible? Is it not?”
The case will now be sent back to the Berlin Regional Court where it will be it will be heard by a new set of judges.
EncroChat prosecutions are moving slowly in Germany, said Lödden.
First court to halt EncroChat trial
The Berlin Regional Court became the first court in Germany to halt a trial based on evidence from the EncroChat encrypted phone network, which was harvested through a novel hacking operation led by French police last year in collaboration with the Dutch.
The court found on 1 July 2021 that even if the interception operation against EncroChat handsets is legal under French law, use of the data from EncroChat data gathered on German territory was in breach of German law.
The hacking operation by French Gendarmerie placed more than 30,000 phone users in 122 countries under surveillance, whether there was evidence of individual criminality or not, the court then found.
“The Regional Court considers the surveillance of 30,000 EncroChat users to be incompatible with the principle of proportionality in the strict sense. This means that the measures were unlawful,” the court ruled in a 22-page judgment.
Decision overruled
That decision has now been overturned by the Superior Court in Berlin.
It found that although investigative measures carried out by the French did not appear to meet the requirements of German law, that did not prohibit German courts from using the knowledge and information gained by the French.
German law allows surveillance to be carried out against an individual to recover specific information only where there is clear suspicion of crime by the individual under surveillance.
But evidence gathered by the French could be used as an “accidental discovery” to bring prosecutions against German EncroChat users, the court found.
“The fact that there was no qualified suspicion…at the time of the [surveillance measures]…does not prevent the use of the knowledge once gained,” it said.
German courts were not entitled to question actions initiated by other EU member states that are legal under their own law, provided the evidence is not based on a German request for mutual assistance, the court said.
To do so would undermine the “mutual trust” between member states.
The fact that the investigative measures carried out by the French did not seem to meet the requirements of German law for monitoring telecommunications and internet traffic did not prevent the knowledge gained being used in Germany, the court said.
Use of EncroChat provides grounds for suspicion
In its July decision, the Berlin Regional Court found that the mere use of an encrypted phone, even one with a high level of encryption, was not an indication of criminality.
The German Federal Government is actively encouraging the use of cryptography, through the Federal Government digital agenda, and has been reluctant to oblige telecoms and internet companies to implement “backdoors” to allow government to access private data, the judge said.
The mere possession of an EncroChat phone did not provide grounds for surveillance, in much the same way that possession of crowbars or bolt-cutters does not provide sufficient grounds for a search warrant.
But in the latest ruling, the Berlin Superior Court found that the way EncroChat devices were sold and their high cost, coupled with other findings from French investigators, did provide grounds for suspicion.
In 2017 and 2018, French police seized EncroChat phones during seven independent investigations, including five investigations into drug offences, the theft of luxury vehicles and other crimes.
The EncroChat website advertised the phones as offering “guaranteed anonymity, a personalised Android platform, a double operating system, the very latest technology, automatic deletion of messages” and hardware encryption.
The company lacked an official headquarters and had no identified staff. It did not sell phones on its website but EncroChat phones were available on eBay at a cost of €1,600 for a six-month contract.
A “guide” sent to an Australian EncroChat phone dealer obtained during the hacking operation advised resellers to stay undercover from the police, to accept payments for the phones using cryptocurrencies where possible and to avoid attracting attention.
French investigators took a forensic image of one of the EncroChat servers in December 2018 and were able to decrypt encrypted notes made by users of the phone, which were stored on the server.
The information recovered suggested that some users were involved in illegal activities. One user’s note, for example, likely showed his involvement in drug trafficking and his ability to launder money in Paris through Morocco.
Mother country behind human rights
“When considering the admissibility of the use of evidence, in addition to the considerable risk to the public’s health, the threat posed by the organised crime structures promoted and financed through illegal drug trade must also be taken into account,” said the Berlin Superior Court.
The verdict also found that the failure to use intercept material from France would violate the sense of justice of German citizens.
“The failure to use legally obtained information about such serious crimes by the authorities of the Republic of France – a founding member of the European Union and one of the mother countries behind human rights – would “significantly violate the general sense of justice of the law-abiding population”, it said.
The court accepted that the French authorities had an obligation to inform the German authorities that they were conducting surveillance on the telecoms traffic of individuals on German territory.
But a failure by France to notify Germany does not prohibit the exploitation of surveillance material.
“The German authorities have made it clear through their further conduct that they do not object to the investigative measures,” the court said. “It can be assumed that the German authorities would have consented to the surveillance of the accused if they had been informed.”
German procedural rules do not contain a general prohibition on exploitation of unlawfully obtained evidence but allow the evidence to be weighed by the court, the court said.
The data obtained does not, as far as can be seen, affect any core information relating to an individual’s private life.
Spontaneous transmission
The court found that the German authorities were not involved in the operations led by the French investigative authorities.
“Rather the data obtained were initially spontaneously transmitted to the German police without prior consultation,” it said.
Germany had not – at the time it received the data in April – submitted a request for mutual legal assistance to obtain the information from France, according to the court verdict.
It was only two months after the hacking operation began, on 2 June, that German prosecutors submitted a European Investigation Order to the French, formally requesting the right to use the intercepted data from EncroChat.
It has emerged in evidence in other court cases in Germany, however, that German prosecutors attended a meeting at the European Union agency for criminal justice cooperation Eurojust at the Hague, to discuss the exploitation of hacked data from EncroChat as early in March 2020 – before the hacking operation commenced.
This has raised questions over whether Germany was simply a passive recipient of the data obtained by the French, as prosecutors suggest.
Decision was ‘political’
Lödden said that, with an election for a new chancellor taking place next month, the Superior Court decision was partly political.
The Berlin higher court’s verdict that EncroChat evidence could not be used led to criticism in the press, he said. | https://technonewshub.com/berlin-court-reverses-ban-on-use-of-encrochat-evidence-in-criminal-trials/ |
A cacophony of lines and colours greets you – shapes and lines swirl like scattered haystacks, a roiling, bubbling profusion of imagery billowing from the picture frame. Figures appear, spliced with patterns and objects, at once obscured and yet thrown in relief. Women in black crop tops and chunky boots stand, hand on hip, while elsewhere, goats spin in a remorseless vortex. Birds, flowers and pinstripes vie for attention in a strange, otherworldly panorama that can only be described as hysterical.
In this new body of work, the paintings will feature ambiguous figures set against multiple layers of paint. In working with plastic sheeting instead of canvas, Jenkins subverts traditional notions of painting, imbuing a seemingly innocuous and worthless material with the same attention normally given to more traditional media. She works in a series of quick, almost violent, movements, on which she then imposes figures, or alternatively starts by painting the image on itself. As soon as the paint dries she starts to deconstruct it by tearing strips off, before adding more layers and repeating the process until a multi-layered image exists. This results in images featuring dizzying swirls of pattern and colour suggestive of any number of hinterlands to the scene, to be imposed by the viewer him- or herself. Faces and features are not entirely clear: these are anonymous figures set against an anonymous backdrop. The palette is vivid: these are images that command the viewer’s attention and demand to dominate the space they are in.
“Within my own paintings, mannerisms, gestures and marks are repeated, removed and reinstated in an attempt to affirm, escalate, destabilize and analyse the hysterical tendencies that surface, manifest and embed themselves at the site of each and every painting anew,” says Jenkins. “Research generates language, language generates imagery and imagery defies the laws of language and is rendered hysterical.” There is even a sense of menace in the background, unsettling the viewer as presenting as many questions as answers.
In Transplastic, Jenkins is interested in the progression of painting over the centuries as a patriarchal expression, with a remit of how painters – men and women – explore this and make the language their own. “I draw my inspiration from other painters and a lot of the people I admire at the moment just happen to be female,” she says. “I am trying to locate potential differences in the way painters paint.” These differences are important, she believes, and the aesthetic they produce in turn highlights the differing contexts they work in. | http://www.cabin-gallery.com/tina-jenkins-exhibition-may-2015 |
In February 2020 the first programme management meeting was held for each of the districts we are working with in the Eastern Region. These meetings are an important part of the teacher training project as they provide an opportunity to reflect on and assess the level of implementation and impact of the project so far.
The meetings were led and facilitated by the various district/metropolitan education directorates and were chaired by District Directors or their representatives. Present at the meetings were the district implementation teams (comprising of the Deputy Directors for Supervision, Training officers, Kindergarten Coordinators), circuit supporters (formerly, circuit supervisors), representatives from the district/municipal coordinating council, representatives from the Parent Teacher Association, teacher and head teacher representatives, staff from the two Colleges of Education and Sabre Education team members.
Discussions focused mainly on sharing the successes, challenges and lessons learnt in each district.
Some of the success shared included that the directorates have been providing more teaching and learning resources to the teachers and teachers have also improved their skills in making their own resources using low cost and recycled materials from their communities, meaning they can offer a wide variety of activities for the children. The play-based approach has offered teachers a deeper understanding of the new standard based curriculum and they are now more confident in delivering this in their classrooms.
In addition, the children are developing and improving their literacy skills (reading, speaking and understanding) and teachers are also demonstrating improved attitudes towards their work. The transformation taking place in the schools has attracted teachers from schools that are not yet part of the project and these teachers have been adopting and practicing ideas they have seen in the Sabre supported schools.
James Adam Sagoe, Head Teacher, A.M.E Zion Basic, Nsawam Adoagyiri Municipal
I am grateful for the selection of my school as part of this project in its first phase. Sabre’s project has changed my perceptions of kindergarten. When I took over as a head teacher, I spent much on the basic school and thought once the kindergarten had furniture, that they would need no further spending. But Sabre’s intervention rekindled the fact that kindergarten is the foundation to any form of education. I have come to love the kindergarten and have even relocated my office to be close to them. Now I spend more of the capitation grant on kindergarten than the upper classes to support the provision of materials for making teaching and learning resources. For the first time, I am giving their wall a nice painting with lots of rich kindergarten appropriate materials for their resources in the classroom.
Joyce Andoh, Head Teacher at Tinkong Presby Basic, Akuapem North
During our first training, we were taught how to organise a kindergarten specific Parent Teacher Association meeting, so we did that by inviting the parents, showing them around and explaining the new approach in kindergarten. They were so happy that now my enrollment has risen to 60 children because they went out and informed other parents whose children were not with us to bring their children to my school because they perceive it as a model and modern school. With the teaching now play based and the classrooms well arranged with teaching and learning resources, parents are encouraged to even bring their children from other schools.
Ruth Woode, District Coordinating Director, Nsawam Adoagyiri Municipal
We wish to have some seminar or something to bring us in, and we would also apply the knowledge and tools at the children’s level so that those of us who are not teachers but expected to reach out to children can do so appropriately for our Sunday schools. I hope to sit in the training next time to see how I can use this tool to promote religious studies in our schools.
Nicholas Kweku Darko, Deputy Director of Finance, Akuapem North
When the new curriculum was introduced, I had the opportunity to visit 26 districts to monitor the activities of teachers on the delivery on the new curriculum. This gave me a lot of insight as to how teachers present activities in their classrooms. But I had an opportunity to interact with Sabre Education before going to do those assignments for the ministry of education. I must say with confidence that, we in Akuapem North and Okere districts are blessed to have Sabre Education with us. Some major core competence of the new standard based curriculum includes innovation and creativity and as teachers, these competencies must be fixed to achieve curriculum objectives. Sabre Education is helping in this regard, making sure that teachers make very good use of the innovation and creativity aspects of the new curriculum and that is good for us and we must take this seriously.
Challenges were also discussed and included that the child centered pedagogy is new in the districts and since teachers were newly introduced to this approach, their output levels may be low and they may find it challenging.
The pedagogy requires that children are enrolled at the appropriate age but teachers with high enrolment and older or under aged children in their classrooms find it difficult to manage all the activities, especially those classrooms with only one teacher. Some classrooms lack appropriate furniture which hinders free flow of lessons and activities. and directorates also stated they they would have liked to have more training days.
One challenge which was common to all the directorates was the presence of non-early childhood teachers and non-qualified teachers in the form of attendants in the classrooms. This makes it difficult for attendants to understand the pedagogy and therefore compromises their ability to facilitate the children.
The meeting concluded with future plans being presented by the directorates outlining how they are going to solve some of the challenges confronting them.
This project is funded with UK aid from the British people and Echidna Giving. | http://sabre.education/eastern-region-programme-management-meeting/ |
Manifestations of Tuberous Sclerosis Complex: The Experience of a Provincial Clinic.
Tuberous sclerosis complex (TSC) is a neurocutaneous disorder with a wide spectrum of manifestations. Recent consensus recommendations stress the importance of multidisciplinary management of children with TSC. The objective of this study was to examine the manifestations of TSC at a large referral centre to determine the care needs of this population. A retrospective, systematic chart review was performed of children with TSC managed at British Columbia Children's Hospital. Patients were identified through epilepsy and clinical neurophysiology databases. The study population comprised 81 patients, born between 1987 and 2014, who were a median of 10 years (range, 0.2-23.2) at most recent follow-up. Epilepsy occurred in 91% of patients, including 32% with a history of infantile spasms. Nineteen patients underwent epilepsy surgery, nine (47%) of whom were seizure-free at most recent follow-up. Overall, 61% of epilepsy patients had been seizure-free for at least 1 year at the time of last follow-up. Neuropsychiatric disorders were diagnosed in 49% of children, with autism (25%), attention deficit hyperactivity order (19%) and anxiety (16%) being the most common. Cardiac rhabdomyomata occurred in 35% of children and renal angiomyolipomas were seen in 43%. A total of 91% had skin manifestations. This study outlines the multisystem manifestations of TSC, observed through a large pediatric referral center. Epilepsy and neuropsychiatric disorders are the major source of morbidity in this age group and provide many challenges to the treating clinician. Because a subset of the study population is still quite young, the prevalence of neuropsychiatric disorders is likely underestimated.
| |
Solar cells convert sunlight into electricity. These electronic devices have been traditionally fabricated using silicon (Si) as a light-absorbing, semiconducting material in a relatively expensive production process. To make solar cells more economically viable, solar cell device architectures have been developed that can inexpensively make use of thin-film, light-absorbing semiconductor materials such as copper-indium-gallium-sulfo-di-selenide, Cu(In,Ga)(S,Se)2, also termed CI(G)S(S). This class of solar cells typically have an absorber layer sandwiched between an electrode layer and a junction partner layer. The electrode layer is often Mo, while the junction partner is often CdS. A transparent conductive oxide (TCO) such as zinc oxide (ZnOx) is formed on the junction partner layer is typically used as a transparent electrode. CIS-based solar cells have been demonstrated to have power conversion efficiencies exceeding 19%.
A central challenge in efficiently constructing a CIGS-based solar cell is that the components of the CIGS layer must be within a narrow stoichiometric ratio in order for the resulting cell to be highly efficient. Achieving precise stoichiometric composition over relatively larger substrate areas is however difficult using traditional vacuum-based deposition processes. For example, it is difficult to deposit compounds and/or alloys containing more than one element by sputtering or evaporation. Both techniques rely on deposition approaches that are limited to line-of-sight and limited-area sources, tending to result in poor surface coverage. Line-of-sight trajectories and limited-area sources can result non-uniform three-dimensional distribution of nanoparticles in all three dimensions and/or poor film-thickness uniformity over large areas. These non-uniformities can occur over the nano-meso, and/or macroscopic scales. Such non-uniformity also alters the local stoichiometric ratios of the absorber layer, decreasing the potential power conversion efficiency of the complete device.
Alternative approaches to vacuum-based deposition techniques such as sputtering and evaporation have been developed. In particular, production of solar cells on flexible substrates using semiconductor printing technologies provides a highly cost-efficient alternative to conventional vacuum-deposited solar cells. For example, T. Arita and coworkers [20th IEEE PV Specialists Conference, 1988, page 1650] described a screen printing technique that involved mixing and milling pure Cu, In and Se powders in the compositional ratio of 1:1:2 and forming a screen printable paste, screen printing the paste on a substrate, and sintering this film to form the compound layer. They reported that although they had started with elemental Cu, In and Se powders, after the milling step the paste contained the CuInSe2 phase. However, solar cells fabricated on the sintered layers had very low efficiencies because the structural and electronic quality of these absorbers were poor.
Screen-printed CuInSe2 deposited in a thin-film was also reported by A. Vervaet et al. [9th European Communities PV Solar Energy Conference, 1989, page 480], where a CuInSe2 powder was used along with Se powder to prepare a screen printable paste. Layers formed by screen printing were sintered at high temperature. A difficulty in this approach was finding an appropriate fluxing agent for dense CuInSe2 film formation. Solar cells made in this manner also had poor conversion efficiencies.
U.S. Pat. No. 5,985,691 issued to B. M. Basol et al describes another particle-based method to form a Group IB-IIIA-VIA compound film. The described method includes the steps of preparing a source material, depositing the source material on a base to form a precursor, and heating the precursor to form a film. In that method the source material includes Group IB-IIIA containing particles having at least one Group IB-IIIA phase, with Group IB-IIIA constituents present at greater than about 50 molar percent of the Group IB elements and greater than about 50 molar percent of the Group IIIA elements in the source material. The powder is milled to reduce its particle size and then used in the preparation of an ink which is deposited on the substrate in the form of a precursor layer. The precursor layer is then exposed to an atmosphere containing Group VIA vapors at elevated temperatures to convert the film into the compound. The precursor films deposited using this technique were porous and they yielded porous CuInSe2 layers with small-grain regions as reported by G. Norsworthy et al. [Solar Energy Materials and Solar Cells, 2000, vol. 60, page 127]. Porous solar cell absorbers yield unstable devices because of the large internal surface area within the device, and small grains limit the conversion efficiency of solar cells. Another key limitation of this method was the inability to effectively incorporate gallium into the material. The properly-distributed presence of gallium in a CIS film serves to potentially broaden the bandgap of the semiconductor material, thereby increasing the open circuit voltage of the solar cell, and to promote the adhesion of the CIGS layer to a (Mo) electrode, providing a back surface electric field which can improve the collection of carriers. The absence of gallium decreases the potential power conversion efficiency of the solar cell. In practice, while gallium oxide particles can easily be produced, it is very difficult to reduce gallium oxide, even at relatively high temperatures, and in the absence of reduction, gallium oxide cannot be effectively used as a precursor material for gallium in the final film. Accordingly, in addition to poor stability, solar cells made using the approach of Basol et al. had sub-optimal power conversion efficiency.
Eberspacher and Pauls in U.S. Pat. No. 6,821,559 describe a process for making phase-stabilized precursors in the form of fine particles, such as sub-micron multinary metal particles, and multi-phase mixed-metal particles comprising at least one metal oxide. The preparation of particulate materials was described using a range of methods including laser pyrolysis, atmospheric arc evaporation, solution precipitation, chemical vapor reactions, aerosol pyrolysis, vapor condensation, and laser ablation. In particular, aerosol pyrolysis was used to synthesize mixed-metal particulates comprising metal oxides formed as substantially solid and spherical particulates. These particulate precursor materials were then deposited onto large-area substrates in thin layers using any of a variety of techniques including slurry spraying methods such as pneumatic spraying with a pressurized gas nozzle, hydraulic spraying with a pressurized slurry expelled through an orifice, and ultrasonic spraying with a rapidly vibrating atomization surface. A disadvantage of solar cell devices comprised of thin-film absorber layers formed in this manner was the poor reproducibility of the resulting device performance, and the porous form of the absorber layer, which tends to result in poor device stability.
Bulent Basol in U.S. Published Patent application number 20040219730 describes a process of forming a compound film including formulating a nano-powder material with a controlled overall composition and having particles of one solid solution. The nano-powder material is deposited on a substrate to form a layer on the substrate, and this layer is reacted in at least one suitable atmosphere to form the compound. According to one preferred embodiment of that process, the compound film has a Cu/(In+Ga) compositional range of 0.7-1.0 and a Ga/(In+Ga) compositional range of 0.05-0.3. Due to the improved process window made available by the phase space of a solid solution, the use of nanoparticles comprised of a solid solution may improve the repeatability and the overall yield of the thin-film deposition and solar cell production process. However, a means to incorporate additional Ga beyond that possible through a solid-solution (containing either Cu+Ga or In+Ga) restricts the potential performance of a device constructed by this method. In particular, since the presence of additional gallium in the light absorbing film serves both to broaden the bandgap of the semiconductor material and to increase the open circuit voltage of the solar cell, a lack of additional gallium in the light-absorbing thin film tends to decrease the potential power conversion efficiency of solar cells created in this manner. Using the solid-solution approach, Gallium can be incorporated into the metallic dispersion in non-oxide form—but only with up to approximately 18 relative atomic percent (Subramanian, P. R. and Laughlin, D. E., in Binary Alloy Phase Diagrams, 2nd Edition, edited by Massalski, T. B. 1990. ASM international, Materials Park, Ohio, pp 1410-1412; Hansen, M., Constitution of Binary Alloys. 1958. 2nd Edition, McGraw Hill, pp. 582-584.). However, efficient CIGS solar cells benefit from achieving a gallium ratio of up to 25 relative atomic percent. Furthermore, it would be simpler to directly work with elemental metallic nanoparticles rather than solid-solution metallic nanoparticles in that the elements can be optimized individually and they are more readily available in elemental form. However, no technique was known in the prior art to create gallium nanoparticle powders sufficient and adequate for semiconductor applications, in part because gallium is molten at room temperature and therefore does not lend itself to common techniques for creating nanoparticles in the form of powders that are then dispersed in solution (as commonly done with the other elements). As a result, it was not possible in the prior art to directly incorporate gallium (or incorporate gallium in a high percentage) into the metallic dispersion used to print the CIG precursor of a CIGS solar cell.
Thus, there is a need in the art for a method of forming a material comprised of gallium-containing CIGS precursor materials, where the precursor materials can be reproducibly, uniformly, and densely applied over large substrate areas to form a thin-film CIGS solar cell, and where the gallium is directly included in an elemental form.
| |
Diagnosis of "ADD or ADHD"
Junk Science by Dr Tim O’Shea
How “ADD/ADHD” became a “disease”
Attention Deficit Disorder, according to the American Psychiatry Association, hereinafter noted as the APA, is a recent disease that supposedly afflicts almost 5 million Americans, mostly young boys.
ADD is generally characterized by hyperactivity, with tendencies toward fidgeting, loud outbursts, learning disabilities, and generally unruly behaviour. It is perhaps the only disease in American history which may be legally diagnosed by people with no medical credentials whatsoever, including teachers, school counsellors, aides, principals, coaches, even parents.
No lab tests, blood tests, microscope studies, or definitive diagnostic tests exist for ADD. No consistent genetic basis or organic neurological lesions, or any verifiable physical changes have ever been identified as causative of ADD.
The Diagnostic and Statistical Manual (DSM) was first published by the APA in 1952. The DSM is a catalogue of mental disorders. Each disorder has a list of symptoms under it. A patient may be "diagnosed" as having a particular mental disorder if enough of the listed symptoms are present.
Al Parides, MD, a psychiatrist, states that the DSM is not scientific at all, but a masterpiece of political manoeuvring, in which the normal problems of life are turned into psychiatric conditions. (Wiseman, p 357)
Snap Diagnosis
The DSM is the only way that ADD is diagnosed. Here's how it's done:
In the DSM, ADD has nine symptoms listed under it. If a child has any six of them, in the opinion of the doctor (or the teacher!) that child may be diagnosed as having ADD. That's it! Funny thing is, it seems like most of these entries on the list are not symptoms of a mental disorder, but just symptoms of being a kid:
- Often fidgets with hands or feet or squirms in seat
- Often leaves seat in classroom or in other situations in which remaining seated is expected
- Often runs about or climbs excessively in situations in which it is inappropriate
- Often has difficulty playing or engaging in leisure activities quietly
- Is often 'on the go' or often acts as if driven "by a motor"
- Often talks excessively
- Often blurts out answers before questions have been completed
- Often has difficulty awaiting turn
- Often interrupts or intrudes on others
Sound like anyone you've ever known? Some may ask if there are any kids who would not fit six of these criteria.
The readers should understand that this is the only "diagnostic testing" that exists for determining ADD.
Six out of nine. No lab test, no blood tests, no physical examination whatsoever, no standardized batteries of written or verbal psychological testing. Just these nine.
And unlike any other disease in history, the diagnosis may be made by anyone in authority, with no medical credentials or training whatsoever: the school nurse, school counsellor, a teacher, the principal, a coach...
Many patients are often labelled ADD after a 15-minute interview with a paediatrician, who has no training in mental disorders at all.
Ref: Tim O'Shea - “ADD: A Designer Disease.”
Site Overview
Simple navigation to the pages on this website: | http://childrensrights.co.za/junk_science.html |
In the sub-tropical city centre of Shenzhen, the Shenzhen College of International Education (SCIE) by Atelier Li Xiaodong is designed to accommodate over 2000 students and 200 teachers. With a site area of approximately 20,000 m2 and a required floor area of over 100,000 m2, a plot ratio approaching almost five posed a great challenge for the architects in terms of providing enough sports facilities within the tight campus while at the same time allowing for cross-ventilation and an open feeling.
Due to space constraints, the sports program was divided into sixteen different units which are incorporated into the building complex on a variety of different levels, adding flexibility, playfulness, interaction, efficiency and a unique experience across the campus. Sky gardens, in both living quarters and educational buildings, are distributed throughout to provide breathing corners.
Rather than presenting itself as an isolated ivory tower, the architects explain that the complex is open and interactive with the city. With no solid walls, there is a feeling of blurred edges throughout.
Further to this, most programs are lifted on a podium, giving more open air space for activities while at the same time creating a natural retreat in the school. A vertical green system is introduced to provide sun shading and a close relationship with the natural environment.
Ultimately, the design results in an accommodating place that unifies the program and people in an organic manner. | https://archello.com/news/atelier-li-xiaodong-completes-the-open-and-interactive-shenzhen-college-of-international-education-scie |
1 – Preamble
The purpose of this privacy and personal data protection policy is to inform you about :
The data processed in the context of applications for a job offer or an unsolicited application may meet a few specific conditions and therefore are the subject of a specific article below.
2 – How VIAPOST takes into account the protection of personal data ?
VIAPOST, data controller, undertakes to take into account the protection of your personal data and your privacy. To this end, and to ensure the security of your data and guarantee the respect and proper exercise of your rights, VIAPOST implements measures to ensure the protection and confidentiality of your personal data. These data are considered confidential data and are treated as such.
3 – What data is collected and how is it ?
VIAPOST undertakes to collect only the data strictly necessary.
The personal data collected can be identification data (last name, first name, postal, electronic, telephone contact details) via the “Contact” section, job offers or the “spontaneous application” section, or navigation data collected by means of cookies.
4 – Legal basis for data processing
The processing of this personal data is based on obtaining your consent or on the legitimate interest of VIAPOST, while respecting your interests, freedoms and fundamental rights.
5 – Purpose of data processing
We collect this data to respond to your requests for information, manage applications for job offers or unsolicited applications, facilitate the use of the site, manage and administer it.
6 – Who has access to your data ?
These data are likely to be transmitted :
7 – How long is the data kept ?
The data collected is kept:
> For three days from the request for requests for information;
> For three years from the first connection, with regard to the use, management and administration of the Site;
> With regard to applications for job offers or unsolicited applications, the retention period is specified in Article 9 below.
However, you can withdraw your consent at any time by sending a request to the addresses indicated in article 10 below.
8 – Can your data be transferred outside of the European Union ?
VIAPOST carries out all the processing of your personal data in the territory of the European Union (EU). Where applicable, in the event that data were to be transferred outside the European Union, all appropriate guarantees would be taken in order to secure the processing of the data, in particular through the implementation of standard contractual clauses from the European Commission.
9 - Personal data of candidates for a job offer issued by VIAPOST or a company of the VIAPOST group or in the event of spontaneous application
Personal data communicated in response to a job offer issued by VIAPOST or a company of the VIAPOST group, whether on the site www.viapost.fr or on a site hosting job offers, or by sending a spontaneous application to VIAPOST, will only be processed or used insofar as this is necessary to contact the candidate and ensure the proper processing of his application. The personal data collected will be kept for a maximum of two years from the last contact with the candidate, unless the latter objects, in which case the personal data will be deleted upon rejection of his application.
Access to the candidate's personal data is strictly limited to VIAPOST employees authorized to process them by reason of their duties, or to third parties linked to VIAPOST by contract, for the performance of tasks strictly necessary for the processing of the application, without that the authorization of the candidate is necessary. It is specified that, in the context of the performance of their services, third parties have only limited access to the data and are obliged to use them in accordance with the provisions of the regulations on the personal data protection.
10 – What are your rights over your personal data ?
In accordance with the regulations on the personal data protection, you have the right to access, rectify, erase, oppose and limit processing. You can also request portability of the data provided. These rights can be exercised by indicating your name, first name and postal address, by email to [email protected], or by postal mail to VIAPOST - DPO delegate - 67 avenue de Fontainebleau - 94270 LE KREMLIN-BICETRE - FRANCE.
As part of the La Poste Group's personal data protection policy, it is also possible to contact the Data Protection Officer - LA POSTE - 9 rue du Colonel Pierre Avia - 75015 PARIS - FRANCE.
In the event of any difficulty relating to the management of his personal data, you can file a complaint with the National Commission for Informatics and Liberties (CNIL).
1 – What is a cookie ?
When connecting to the site, cookies may be temporarily stored in memory or on users' hard drives.
A cookie is a text file, placed and / or read during the consultation of a website, the purpose of which is to collect information facilitating access to the site and navigation on it.
The cookie is placed by the internet browser (Internet Explorer, Google Chrome, Safari, Firefox, etc.) on a dedicated space on the hard drive of the user's terminal.
2 – Who places a cookie ?
Cookies are placed by VIAPOST or its technical service providers on the site, and are used for its own needs. Viapost is therefore controller. Other cookies are issued and used by VIAPOST partners or third-party companies for purposes determined by these third parties ; the latter are controllers. VIAPOST will be considered as co-controller when it authorizes the placement of third-party cookies on its site for purposes defined jointly with its partners or third-party companies. However, VIAPOST cannot be responsible for subsequent processing carried out by the partner or the third-party company, involving the processing of personal data, for which the said third party remains controller.
VIAPOST uses :
Targeted advertising cookies may also be set by our partners, who may use these cookies to build a profile of your interests and deliver relevant advertising to you on other websites..
4 – Categories of cookies used on the site
|
|
Editor
|
|
Cookie name
|
|
Cookie lifetime
|
|
Category
|
|
Viapost
|
|
PHPSESSID
|
|
Session
|
|
Strictly necessary
|
|
Viapost
|
|
device_view
|
|
30 days
|
|
Functionality
|
|
Google Analytics
|
|
_ga
|
|
1 day
|
|
Performance
|
|
Google Analytics
|
|
_gid
|
|
1 day
|
|
Performance
|
|
Google Analytics
|
|
_gat_gtag
|
|
Session
|
|
Targeted advertising
|
|
Editor
|
|
Cookie name
|
|
Cookie lifetime
|
|
Category
|
|
doubleclick.net
|
|
test_cookie
|
|
Session
|
|
Targeted advertising
|
|
youtube.com
|
|
CONSENT
|
|
24 month
|
|
Targeted advertising
|
|
youtube.com
|
|
VISITOR_INFO1_LIVE
|
|
180 days
|
|
Targeted advertising
|
|
youtube.com
|
|
YSC
|
|
Session
|
|
Targeted advertising
5 – Retention period of the user's choice
The acceptance or rejection of cookies is, regardless of the type of cookies concerned, kept for 6 months.
The user's consent will be requested again at the end of this period by displaying the information banner.
6 – Scope of user consent
The consent applies to the site www.viapost.fr. The preferences expressed concerning the management of cookies are taken into account as long as the address www.viapost.fr appears in the navigation bar. If, during navigation, you are redirected to another site (www.123palette.fr for example), this site will ask you for your preferences for the management of its own cookies.
7 – Management of the choice of cookies
You can manage the implementation of cookies :
A - By using the cookie management platform, without affecting your access to the functionalities of the site. Your choices can be changed at any time.
B - By configuring your internet browser :
FIREFOX :
INTERNET EXPLORER / EDGE :
GOOGLE CHROME :
SAFARI : | https://www.viapost.eu/company/personal-data-protection |
Utah State University (USU or Utah State) is a public land-grant research university in Logan, Utah
The Latest Bing News on:
Utah State University Research
- University of Utah offering weekly COVID-19 tests to families of students and employees — with or without symptoms
The University of Utah is offering free, weekly asymptomatic testing for COVID-19 to family and household members of its students, faculty and staff. The testing effort aims to stem the spread of the ...
- Audio-Gathering Research Project will Improve Inclusion in Engineering Education
Researchers from Utah State University's College of Engineering are working to develop more energy-efficient artificial intelligence hardware, thanks to a grant from the National Science Foundation.
- Utah colleges, universities ranked among best in the nation in new report
If you are looking to attend one of the best national universities but want to stay in Utah, you are in luck – three of Utah’s universities have been ...
- Utah vaccinations jump after encouragement from Mormon leaders, dip due to 'conspiracy theories'
Utah's vaccination rate spiked after the Church of Latter-day Saints issued a strong statement encouraging vaccinations, then decreased in the weeks that followed.
- Weber State wants to preserve Great Salt Lake during record decline
As Utah continues facing an unprecedented drought, one Utah university is hoping to better understand and preserve the shrinking Great Salt Lake. Weber State University ...
The Latest Google Headlines on:
Utah State University Research
The Latest Bing News on:
Utah State University Discovery
- 500-Million-Year-Old “Worm-Like” Fossil Represents Rare Discovery of Ancient Animal in North America
Scientists at the University of Missouri are using an ancient find to unlock new clues surrounding the diversity of species following the Cambrian explosion. Many scientists consider the “Cambrian exp ...
- Pittsburg’s “Paint The Town Red” annual tradition returns
The city of Pittsburg is “red” once again as an annual tradition makes its return. “Paint The Town Red” made its in-person return after going ...
- 500-million-year-old fossil represents rare discovery of ancient animal in North America
Many scientists consider the "Cambrian explosion"—which occurred about 530–540 million years ago—as the first major appearance of many of the world's animal groups in the fossil record. Like adding ...
- Ultra-Light Aluminum Eyed for Applications in Electronics, Medicine, Spaceflight
Utah State University (USU) chemist Alexander Boldyrev and his team used computational modeling to restructure the common household metal at the molecular level, which in theory produces an ...
- Disappeared ducky, ramen rewards, Dorothy Parker: News from around our 50 states
Utah State University, which leases the site from the ... be willing to excavate the site if the tribe wanted. The recent discovery of children’s remains buried at the site of what was once ... | https://innovationtoronto.com/2020/06/utah-state-university/ |
World Inequality Report 2022: Relevance
- GS 2: Bilateral, regional and global groupings and agreements involving India and/or affecting India’s interests.
World Inequality Report 2022: Context
- According to the World Inequality Report 2022 recently released by Paris-based World Inequality Lab, India is among the most unequal countries of the world.
- Note: It is different from World Inequality Report 2022 published by Oxfam International.
World Inequality Report 2022: India
- The top 10% of Indian population earns 20 times more than the lower 50% of the population.
- While the top 10% and top 1% hold respectively 57% and 22% of total national income, the share of the bottom 50% has gone down to 13%.
- India stands out as a poor and very unequal country, with an affluent elite.
World Inequality Report 2022: World
- The richest 10% of the global population currently takes 52% of global income, whereas the poorest half of the population earns 8% of it.
- While the poorest half of the global population possesses just 2% of the total wealth, the richest 10% of the global population own 76% of all wealth.
- Though inequality has increased within most countries, it has declined between countries over the past two decades.
- MENA (Middle East and North Africa) is the most unequal region in the world, while Europe has the lowest inequality levels.
- The gap between the incomes of the top 10% and the bottom 50% of the people within countries has almost doubled.
Private wealth
- Emerging economies like China and India has experienced faster increase in private wealth than wealthy countries.
- China, despite being a communist country, has had the largest increase in private wealth in recent decades.
- In India, however, the private wealth has increased from 290% in 1980 to 560% in 2020.
Nation becoming richer, government becoming poorer
- In the last 40 years, countries have become richer while their governments have become poor. It means that the increase in national wealth is largely due to private wealth.
- The share of wealth held by public sector is close to zero or negative in rich countries, which signifies that all the wealth is in private hands.
- COVID-19 has only worsened the situation as the governments across the world has borrowed 10-20% of GDP from private sector.
- The global billionaire wealth increased by more than 50% between 2019 and 2021.
Also Read: | https://www.adda247.com/upsc-exam/world-inequality-report-2022-2/ |
The Council of Europe, temple of human rights
To fully understand this very little known institution, we need to go back to the end of the 1940s. A time when, Europe was economically, morally, politically and humanly destroyed following the worst war of its history. Contemporaries of this period had but one slogan “never again”. The unity of the European continent (which would later be “reduced” in the occidental part after the 1948 Czechoslovak coup d’état) became thus an emblem of reconstruction, in terms of the protection of fundamental human rights such as the right to life, democracy or the ban on torture.
The creation of the Council of Europe, by the 1949 Treaty of London, was the synthesis of federalist and intergovernmental logic. The unity of Europe was to be forged therefore by other means (for instance, the European Coal and Steel Community, and then the European Economic Area would take the reins in the quest for a supranational Europe). The protection of human rights and of democracy was therefore the only essential prerogative of the Council of Europe, founded by ten countries (France, Italy, the UK, the Republic of Ireland, the three Benelux countries and the three continental Scandinavian countries). The very first European organisation in history then adopted in November 1950 the Convention which safeguards human rights and fundamental freedoms and entered into force in 1953. This foundational text of human rights, written barely two years after the UN universal declaration of human rights, fitted into a global dynamic favouring peace, however at that same time the cold war started to begin with the conflict in Korea. The European Court of Human Rights (ECHR) was established in 1959 to assure a thorough application of the Convention. The latter has since evolved with the addition of protocols and today has five principal sections with 59 articles.
As a sign of its success, the ten founding members of the Council of Europe were progressively joined by the entirety of the democratic countries of Western Europe (Finland was the last non communist country to join, in May 1989). After the fall of the Berlin wall, membership to the Council of Europe (helped by the Venice Commission) was the very first step for the ex-USSR countries and people’s democracies towards a European integration, long before the EU and NATO. The organisation based in Strasbourg, France, counts today 47 members, covering the European continent in the large sense of the term (with the notable exception of Belarus).
The Council of Europe was therefore created around the binding protection of human rights. Just as for the EU, its administrative and political institutions ensure its successful functioning. At the top, there is the secretary general who is endowed with vast powers within the institution; the incumbent is Norwegian Thorbjørn Jagland. He assists the two principal mechanisms of the COE; the Council of Ministers (responsible for implementing the arrests made by the ECHR, amongst other things) and the Parliamentary Assembly (of which the 324 members must promote human rights but do not have the power to vote binding texts). The commissioner of human rights (currently the Latvian-American Nils Muižnieks) works independently within the Council of Europe, and also aims to promote such rights in the 47 member countries.
Despite its longevity and its successful expansions, the Council of Europe isn’t exempt from criticism. For instance, it seems incapable of fighting against authoritarian deviations of certain members such as Russia or Turkey, despite publishing numerous reports (the Council of Europe’s specialty). The Russian members of the Assembly no longer sit there since 2014, a sign of profound tensions between Strasbourg and Moscow.
The European Union, guarantor of economic freedoms (but not only)
Contrary to the Council of Europe, the ECSC and then the EEC (which became the EU in 1993) has always had essentially an economic significance (although not necessarily without an idealistic political aspect). The European Court of Justice of the European Union, created in 1952, affirmed the primacy of community law; stemming from national rights and economic freedoms within the framework of a common market (becoming later the single market). The freedom of movement of goods, workers, citizens, services and capital is a cardinal value of substantive law of the EU.
However, the economic freedoms extolled by the EU are not in total opposition with other fundamental freedoms. The proof is in article 6 of the EU treaty “The Union shall respect fundamental rights, as guaranteed by the European Convention for the protection of Human Rights and Fundamental Freedoms signed in Rome on 4 November 1950 and as they result from the constitutional traditions common to the Member States, as general principles of Community law”. The famous “rule of reason” is also applied in order to limit freedom of movement in case of a risk of life or health, amongst others. The member states and citizens can refer to the Court of Justice of the European Union if they deem that their rights have been abused by European institutions or by other states.
The social domain has been the forgotten industry of the EU, the traditions in this domain being very different from one country to another. The charter of fundamental rights of the EU was however signed during the 2000 Treaty of Nice. This text gathers together the civil and social rights which European citizens enjoy, spread out in six chapters and 54 articles. This charter was made binding by the Treaty of Lisbon in 2007. The Fundamental Rights Agency, based in Vienna, is for its part, dedicated to the fight against racism and xenophobia.
What is the relationship between the Court of Justice of the European Union and the European Court of Human Rights?
Despite being two distinct organisations; the Council of Europe and the European Union have forged ties, notably concerning the protection of human rights and fundamental freedoms. During the Treaty of Lisbon, the EU officially adhered to the European Convention of Human Rights and Fundamental Freedoms, which implies the Court of Justice of the European Union’s “acknowledgment” of the European Court of Human Right’s authority.
However, the Court of Justice of the European Union is very reluctant to recognise the de jure authority of the European Court of Human Right’s authority. Is this really necessary? The dialogue between the two courts is rich (what we also call “the dialogue of the European judges”) and beneficial for democracy despite a risk of divergent interpretations on fundamental rights.
The dialogue is necessary in any case, since all of the members of the EU are equally members of the Council of Europe. The ECHR could be taken advantage of for questions relating to the respect of fundamental rights in the framework of an application of European law. Tensions could, however, rise if the Court of Justice of the European Union had to acknowledge the formal authority of the European Court of Human Rights. | https://www.kuriereuropejski.org/which-protection-of-fundamental-rights-in-europe-council-of-europe-vs?lang=fr |
Corporate governance is the set of processes, customs, policies, laws and institutions affecting the way a corporation is directed, administered or controlled. Corporate governance also includes the relationships among the many players involved (the stakeholders) and the goals for which the corporation is governed. The principal players are the shareholders, management and the board of directors. Other stakeholders include employees, suppliers, customers, banks and other lenders, regulators, the environment and the community at large.
Corporate governance is a multi-faceted subject. An important theme of corporate governance deals with issues of accountability and fiduciary duty, essentially advocating the implementation of guidelines and mechanisms to ensure good behaviour and protect shareholders. Another key focus is the economic efficiency view, through which the corporate governance system should aim to optimize economic results, with a strong emphasis on shareholders welfare. There are yet other sides to the corporate governance subject, such as the stakeholder view, which calls for more attention and accountability to players other than the shareholders (e.g.: the employees or the environment).
Recently there has been considerable interest in the corporate governance practices of modern corporations, particularly since the high-profile collapses of large US firms such as Enron Corporation and Worldcom.
Definition Edit
The term corporate governance has come to mean two things.
- the processes by which companies are directed and controlled.
- a field in economics, which studies the many issues arising from the separation of ownership and control.
Relevant rules include applicable laws of the land as well as internal rules of a corporation. Relationships include those between all related parties, the most important of which are the owners, managers, directors of the board, regulatory authorities and to a lesser extent employees and the community at large. Systems and processes deal with matters such as delegation of authority.
The corporate governance structure spells out the rules and procedures for making decisions on corporate affairs. It also provides the structure through which the company objectives are set, as well as the means of attaining and monitoring the performance of those objectives.
Corporate governance is used to monitor whether outcomes are in accordance with plans and to motivate the organization to be more fully informed in order to maintain or alter organizational activity. Corporate governance is the mechanism by which individuals are motivated to align their actual behaviors with the overall participants.
In 'A Board Culture of Corporate Governance' business author Gabrielle O'Donovan defines corporate governance as 'an internal system encompassing policies, processes and people, which serves the needs of shareholders and other stakeholders, by directing and controlling management activities with good business savvy, objectivity and integrity. Sound corporate governance is reliant on external marketplace commitment and legislation, plus a healthy board culture which safeguards policies and processes'.
O'Donovan goes on to say that 'the perceived quality of a company's corporate governance can influence its share price as well as the cost of raising capital. Quality is determined by the financial markets, legislation and other external market forces plus the international organisational environment; how policies and processes are implemented and how people are led. External forces are, to a large extent, outside the circle of control of any board. The internal environment is quite a different matter, and offers companies the opportunity to differentiate from competitors through their board culture. To date, too much of corporate governance debate has centred on legislative policy, to deter fraudulent activities and transparency policy which misleads executives to treat the symptoms and not the cause.'
History Edit
In the 19th century, state corporation law enhanced the rights of corporate boards to govern without unanimous consent of shareholders in exchange for statutory benefits like appraisal rights, in order to make corporate governance more efficient. Since that time, and because most large publicly traded corporations in America are incorporated under corporate administration friendly Delaware law, and because America's wealth has been increasingly securitized into various corporate entities and institutions, the rights of individual owners and shareholders have become increasingly derivative and dissipated. The concerns of shareholders over administration pay and stock losses periodically has led to more frequent calls for Corporate Governance reforms.
In the 20th century in the immediate aftermath of the Wall Street Crash of 1929 legal scholars such as Adolf Augustus Berle, Edwin Dodd, and Gardiner C. Means pondered on the changing role of the modern corporation in society. Berle and Means' monograph "The Modern Corporation and Private Property" (1932, Macmillan) continues to have a profound influence on the conception of corporate governance in scholarly debates today.
From the Chicago school of economics, Ronald Coase's "Nature of the Firm" (1937) introduced the notion of transaction costs into the understanding of why firms are founded and how they continue to behave. Fifty years later, Eugene Fama and Michael Jensen's "The Separation of Ownership and Control" (1983, Journal of Law and Economics) firmly established agency theory as a way of understanding corporate governance: the firm is seen as a series of contracts. Agency theory's dominance was highlighted in a 1989 article by Kathleen Eisenhardt (Academy of Management Review).
American expansion after World War II through the emergence of multinational corporations saw the establishment of the managerial class. Accordingly, the following Harvard Business School management professors published influential monographs studying their prominence: Myles Mace (entrepreneurship), Alfred D. Chandler, Jr. (business history), Jay Lorsch (organizational behavior) and Elizabeth MacIver (organizational behavior). According to Lorsch and MacIver "many large corporations have dominant control over business affairs without sufficient accountability or monitoring by their board of directors."
Current preoccupation with corporate governance can be pinpointed at two events: The East Asian Crisis of 1997 saw the economies of Thailand, Indonesia, South Korea, Malaysia and The Philippines severely affected by the exit of foreign capital after property assets collapsed. The lack of corporate governance mechanisms in these countries highlighted the weaknesses of the institutions in their economies. The second event was the American corporate crises of 2001-2002 which saw the collapse of two big corporations: Enron and WorldCom, and the ensuing scandals and collapses in other corporations such as Arthur Andersen, Global Crossing and Tyco.
Role of Institutional InvestorsEdit
Many years ago, worldwide, buyers and sellers of corporation stocks were individual investors, such as wealthy businessmen. Over time, markets have become more institutionalized; buyers and sellers are largely institutions (e.g., pension funds, insurance companies, mutual funds, hedge funds, investor groups, and banks). The rise of the institutional investor has brought with it some increase of professional diligence which has tended to improve regulation of the stock market (but not necessarily in the interest of the small investor or even of the naïve institutions, of which there are many). Note that this process occurred simultaneously with the direct growth of individuals investing in the market (for example individuals have twice as much money in mutual funds as they do in bank accounts). However this growth occurred primarily in individuals turning over their funds to professionals to manage, such as in mutual funds. In this way, the majority of investment now is described as "institutional investment" even though the vast majority of the funds are for the benefit of individual investors.
Unfortunately, there has been a concurrent lapse in the oversight of large corporations, which are now almost all owned by large institutions. The Board of Directors of large corporations used to be chosen by the principal shareholders, who usually had an emotional as well as monetary investment in the company (think Ford), and the Board diligently kept an eye on the company and its principal executives (they usually hired and fired the President, or Chief executive officer— CEO). Nowadays, if the owning institutions don't like what the President/CEO is doing and they feel that firing him will be costly (think "golden handshake") and/or time consuming, they will simply sell out their interest. Also, nowadays, the Board is mostly chosen by the President/CEO, and may be made up primarily of his cronies (or, at least, officers of the corporation, who owe their jobs to him, or fellow CEOs from other corporations). Since the (institutional) shareholders rarely object, the President/CEO generally takes the Chairman of the Board position for himself (which makes it much more difficult for the institutional owners to "fire" him). Finally, the largest pools of invested money (such as the mutual fund 'Vanguard 500', or the largest investment management firm for corporations, State Street Corp.) are designed simply to invest in a very large number of companies with sufficient liquidity, based on the idea that this strategy will largely eliminate individual company or financial risk and, therefore, these investors have even less interest in what a particular company is doing.
Since the marked rise in the use of Internet transactions in the 1990s, both individual and professional stock investors around the world have emerged as a potential new kind of major (short term) force in the ownership of corporations and in the markets: the casual participant. Even as the purchase of individual shares in any one corporation by individual investors diminishes, the sale of derivatives (e.g., exchange-traded funds (ETFs), Stock market index options , etc.) has soared. So, the interests of most investors are now increasingly rarely tied to the fortunes of individual corporations.
But, the ownership of stocks in markets around the world varies; for example, the majority of the shares in the Japanese market are held by financial companies and industrial corporations (there is a large amount of cross-holding among Japanese keiretsu corporations and within S. Korean chaebol 'groups') , whereas stock in the USA or the UK and Europe are much more broadly owned, often still by large individual investors.
In the latter half of the 1990s, during the Asian financial crisis, a lot of the attention fell upon the corporate governance systems of the developing world, which tend to be heavily into cronyism and nepotism.
In the first half of the 1990s, the issue of corporate governance in the U.S. received considerable press attention due to the wave of (belated?) CEO dismissals (e.g.: IBM, Kodak, Honeywell) by their boards. CALPERS led a wave of institutional shareholder activism (something only very rarely seen before), as a way of ensuring that corporate value would not be destroyed by the now traditionally cozy relationships between the CEO and the board of directors. In the early 2000s, the massive bankruptcies (and criminal malfeasance) of Enron and Worldcom, as well as lesser corporate debacles, such as Adelphia Communications, AOL, Arthur Andersen, Global Crossing, Tyco, and, more recently, Freddie Mac and led to increased shareholder and governmental interest in corporate governance, culminating in the passage of the Sarbanes-Oxley Act of 2002. Since then, the stock market has greatly recovered, and shareholder zeal has waned accordingly.
Parties to corporate governance Edit
Parties involved in corporate governance include the regulatory body (e.g. the Chief Executive Officer, the board of directors, management and shareholders). Other stakeholders who take part include suppliers, employees, creditors, customers and the community at large.
In corporations, the shareholder delegates decision rights to the manager to act in the principal's best interests. This separation of ownership from control implies a loss of effective control by shareholders over managerial decisions. Partly as a result of this separation between the two parties, a system of corporate governance controls is implemented to assist in aligning the incentives of managers with those of shareholders. With the significant increase in equity holdings of investors, there has been an opportunity for a reversal of the separation of ownership and control problems because ownership is not so diffuse.
A board of directors often plays a key role in corporate governance. It is their responsibility to endorse the organisation's strategy, develop directional policy, appoint, supervise and remunerate senior executives and to ensure accountability of the organisation to its owners and authorities.
All parties to corporate governance have an interest, whether direct or indirect, in the effective performance of the organisation. Directors, workers and management receive salaries, benefits and reputation, while shareholders receive capital return. Customers receive goods and services; suppliers receive compensation for their goods or services. In return these individuals provide value in the form of natural, human, social and other forms of capital.
A key factor in an individual's decision to participate in an organisation e.g. through providing financial capital and trust that they will receive a fair share of the organisational returns. If some parties are receiving more than their fair return then participants may choose to not continue participating leading to organisational collapse.
Principles Edit
Key elements of good corporate governance principles include honesty, trust and integrity, openness, performance orientation, responsibility and accountability, mutual respect, and commitment to the organisation.
Of importance is how directors and management develop a model of governance that aligns the values of the corporate participants and then evaluate this model periodically for its effectiveness. In particular, senior executives should conduct themselves honestly and ethically, especially concerning actual or apparent conflicts of interest, and disclosure in financial reports.
Commonly accepted principles of corporate governance include:
- Rights and equitable treatment of shareholders: Organisations should respect the rights of shareholders and help shareholders to exercise those rights. They can help shareholders exercise their rights by effectively communicating information that is understandable and accessible and encouraging shareholders to participate in general meetings.
- Interests of other stakeholders: Organisations should recognise that they have legal and other obligations to all legitimate stakeholders.
- Role and responsibilities of the board: The board needs a range of skills and understanding to be able to deal with various business issues and have the ability to review and challenge management performance. It needs to be of sufficient size and have an appropriate level of commitment to fulfill its responsibilities and duties. There are issues about the appropriate mix of executive and non-executive directors. The key roles of chairperson and CEO should not be held by the same person.
- Integrity and ethical behaviour: Organisations should develop a code of conduct for their directors and executives that promotes ethical and responsible decision making. It is important to understand, though, that systemic reliance on integrity and ethics is bound to eventual failure. Because of this, many organizations establish Compliance and Ethics Programs to minimize the risk that the firm steps outside of ethical and legal boundaries.
- Disclosure and transparency: Organisations should clarify and make publicly known the roles and responsibilities of board and management to provide shareholders with a level of accountability. They should also implement procedures to independently verify and safeguard the integrity of the company's financial reporting. Disclosure of material matters concerning the organisation should be timely and balanced to ensure that all investors have access to clear, factual information.
Issues involving corporate governance principles include:
- oversight of the preparation of the entity's financial statements
- internal controls and the independence of the entity's auditors
- review of the compensation arrangements for the chief executive officer and other senior executives
- the way in which individuals are nominated for positions on the board
- the resources made available to directors in carrying out their duties
- oversight and management of risk
- dividend policy
Mechanisms and controls Edit
Corporate governance mechanisms and controls are designed to reduce the inefficiencies that arise from moral hazard and adverse selection. For example, to monitor managers' behaviour, an independent third party (the auditor) attests the accuracy of information provided by management to investors. An ideal control system should regulate both motivation and ability.
Internal corporate governance controls Edit
Internal corporate governance controls monitor activities and then take corrective action to accomplish organisational goals. Examples include:
- Monitoring by the board of directors: The board of directors, with its legal authority to hire, fire and compensate top management, safeguards invested capital. Regular board meetings allow potential problems to be identified, discussed and avoided. Whilst non-executive directors are thought to be more independent, they may not always result in more effective corporate governance and may not increase performance. Different board structures are optimal for different firms. Moreover, the ability of the board to monitor the firm's executives is a function of its access to information. Executive directors possess superior knowledge of the decision-making process and therefore evaluate top management on the basis of the quality of its decisions that lead to financial performance outcomes, ex ante. It could be argued, therefore, that executive directors look beyond the financial criteria.
- Remuneration: Performance-based remuneration is designed to relate some proportion of salary to individual performance. It may be in the form of cash or non-cash payments such as shares and share options, superannuation or other benefits. Such incentive schemes, however, are reactive in the sense that they provide no mechanism for preventing mistakes or opportunistic behaviour, and can elicit myopic behaviour.
External corporate governance controls Edit
External corporate governance controls encompass the controls external stakeholders exercise over the organisation. Examples include:
- debt covenants
- external auditors
- government regulations
- media pressure
- takeovers
- competition
- managerial labour market
- telephone tapping
Systemic problems of corporate governance Edit
- Supply of accounting information: Financial accounts form a crucial link in enabling providers of finance to monitor directors. Imperfections in the financial reporting process will cause imperfections in the effectiveness of corporate governance. This should, ideally, be corrected by the working of the external auditing process.
- Demand for information: A barrier to shareholders using good information is the cost of processing it, especially to a small shareholder. The traditional answer to this problem is the efficient market hypothesis (in finance, the efficient market hypothesis (EMH) asserts that financial markets are efficient), which suggests that the shareholder will free ride on the judgements of larger professional investors.
- Monitoring costs: In order to influence the directors, the shareholders must combine with others to form a significant voting group which can pose a real threat of carrying resolutions or appointing directors at a general meeting.
Role of the accountant Edit
Financial reporting is a crucial element necessary for the corporate governance system to function effectively. Accountants and auditors are the primary providers of information to capital market participants. The directors of the company should be entitled to expect that management prepare the financial information in compliance with statutory and ethical obligations, and rely on auditors' competence.
Current accounting practice allows a degree of choice of method in determining the method of measurement, criteria for recognition, and even the definition of the accounting entity. The exercise of this choice to improve apparent performance (popularly known as creative accounting) imposes extra information costs on users. In the extreme, it can involve non-disclosure of information.
One area of concern is whether the accounting firm acts as both independent auditor and management consultant to the firm they are auditing. This may result in a conflict of interest which places the integrity of financial reports in doubt due to client pressure to appease management. The power of the corporate client to initiate and terminate management consulting services and, more fundamentally, to select and dismiss accounting firms contradicts the concept of an independent auditor. Changes enacted in the United States in the form of the Sarbanes-Oxley Act (in response to the Enron situation as noted below) prohibit accounting firms from providing both auditing and management consulting services.
The Enron collapse is an example of misleading financial reporting. Enron concealed huge losses by creating illusions that a third party was contractually obliged to pay the amount of any losses. However, the third party was an entity in which Enron had a substantial economic stake. In discussions of accounting practices with Arthur Andersen, the partner in charge of auditing, views inevitably led to the client prevailing.
However, good financial reporting is not a sufficient condition for the effectiveness of corporate governance if users don't process it, or if the informed user is unable to exercise a monitoring role due to high costs (see Systemic problems of corporate governance above).
Regulation Edit
See regulation.
Self-regulation Edit
Rules versus principles Edit
Rules are typically thought to be simpler to follow than principles, demarcating a clear line between acceptable and unacceptable behaviour. Rules also reduce discretion on the part of individual managers or auditors.
In practice rules can be more complex than principles. They may be ill-equipped to deal with new types of transactions not covered by the code. Moreover, even if clear rules are followed, one can still find a way to circumvent their underlying purpose - this is harder to achieve if one is bound by a broader principle.
Enforcement Edit
Enforcement can affect the overall credibility of a regulatory system. They both deter bad actors and level the competitive playing field. Nevertheless, greater enforcement is not always better, for taken too far it can dampen valuable risk-taking. In practice, however, this is largely a theoretical, as opposed to a real, risk.
Corporate governance models around the world Edit
Anglo-American ModelEdit
There are many different models of corporate governance around the world. These differ according to the variety of capitalism in which they are embedded. The liberal model that is common in Anglo-American countries tends to give priority to the interests of shareholders. The coordinated model that one finds in Continental Europe and Japan also recognizes the interests of workers, managers, suppliers, customers, and the community. Both models have distinct competitive advantages, but in different ways. The liberal model of corporate governance encourages radical innovation and cost competition, whereas the coordinated model of corporate governance facilitates incremental innovation and quality competition.
In the United States, a corporation is governed by a board of directors, which has the power to choose an executive officer, usually known as the chief executive officer. The CEO has broad power to manage the corporation on a daily basis, but needs to get board approval for certain major actions, such as hiring his/her immediate subordinates, raising money, acquiring another company, major capital expansions, or other expensive projects. Other duties of the board may include policy setting, decision making, monitoring management's performance, or corporate control.
The board of directors is nominally selected by and responsible to the shareholders, but the bylaws of many companies make it difficult for all but the largest shareholders to have any influence over the makeup of the board; normally, individual shareholders are not offered a choice of board nominees among which to choose, but are merely asked to rubberstamp the nominees of the sitting board. Perverse incentives have pervaded many corporate boards in the developed world, with board members beholden to the chief executive whose actions they are intended to oversee. Frequently, members of the boards of directors are CEOs of other corporations, which some see as a conflict of interest.
Non Anglo-American ModelEdit
In East Asian countries, family-owned companies dominate. A study by Claessens, Djankov and Lang (2000) investigated the top 15 families in East Asian countries and found that they dominated listed corporate assets. In countries such as Pakistan, Indonesia and the Philippines, the top 15 families controlled over 50% of publicly owned corporations through a system of family cross-holdings, thus dominating the capital markets. Family-owned companies also dominate the Latin model of corporate governance, that is companies in Italy, Spain, France (to a certain extent), Brazil, Argentina, Mexico and other countries in South America.
Codes and guidelines Edit
Corporate governance principles and codes have been developed in different countries and issued from stock exchanges, corporations, institutional investors, or associations (institutes) of directors and managers with the support of governments and international organizations. As a rule, compliance with these governance recommendations is not mandated by law, although the codes linked to stock exchange listing requirements may have a coercive effect.
For example, companies quoted on the London and Toronto Stock Exchanges formally need not follow the recommendations of their respective national codes. However, they must disclose whether they follow the recommendations in those documents and, where not, they should provide explanations concerning divergent practices. Such disclosure requirements exert a significant pressure on listed companies for compliance.
In the United States, companies are primarily regulated by the state in which they incorporate though they are also regulated by the federal government and, if they are public, by their stock exchange. The highest number of companies are incorporated in Delaware, including more than half of the Fortune 500. This is due to Delaware's generally business-friendly corporate legal environment and the existence of a state court dedicated solely to business issues (Delaware Court of Chancery).
Most states' corporate law generally follow the American Bar Association's Model Business Corporation Act. While Delaware does not follow the Act, it still considers its provisions and several prominent Delaware justices, including former Delaware Supreme Court Chief Justice E. Norman Veasey, participate on ABA committees.
One issue that has been raised since the Disney decision in 2005 is the degree to which companies manage their governance responsibilities; in other words, do they merely try to supersede the legal threshold, or should they create governance guidelines that ascend to the level of best practice. For example, the guidelines issued by associations of directors (see Section 3 above), corporate managers and individual companies tend to be wholly voluntary. For example, The GM Board Guidelines reflect the company’s efforts to improve its own governance capacity. Such documents, however, may have a wider multiplying effect prompting other companies to adopt similar documents and standards of best practice.
One of the most influential guidelines has been the 1999 OECD Principles of Corporate Governance. This was revised in 2004. The OECD remains a proponent of corporate governance principles throughout the world.
The World Business Council for Sustainable Development WBCSD has also done substantial work on corporate governance, particularly on accountability and reporting, and in 2004 created an Issue Management Tool: Strategic challenges for business in the use of corporate responsibility codes, standards, and frameworks.This document aims to provide general information, a "snap-shot" of the landscape and a perspective from a think-tank/professional association on a few key codes, standards and frameworks relevant to the sustainability agenda.
Corporate governance and firm performance Edit
In its 'Global Investor Opinion Survey' of over 200 institutional investors first undertaken in 2000 and updated in 2002, McKinsey found that 80% of the respondents would pay a premium for well-governed companies. They defined a well-governed company as one that had mostly out-side directors, who had no management ties, undertook formal evaluation of its directors, and was responsive to investors' requests for information on governance issues. The size of the premium varied by market, from 11% for Canadian companies to around 40% for companies where the regulatory backdrop was least certain (those in Morocco, Egypt and Russia).
Other studies have linked broad perceptions of the quality of companies to superior share price performance. In a study of five year cumulative returns of Fortune Magazine's survey of 'most admired firms', Antunovich et al found that those "most admired" had an average return of 125%, whilst the 'least admired' firms returned 80%. In a separate study Business Week enlisted institutional investors and 'experts' to assist in differentiating between boards with good and bad governance and found that companies with the highest rankings had the highest financial returns.
On the other hand, research into the relationship between specific corporate governance controls and firm performance has been mixed and often weak. The following examples are illustrative.
Board composition Edit
Some researchers have found support for the relationship between frequency of meetings and profitability. Others have found a negative relationship between the proportion of external directors and firm performance, while others found no relationship between external board membership and performance. In a recent paper Bagahat and Black found that companies with more independent boards do not perform better than other companies. It is unlikely that board composition has a direct impact on firm performance.
Remuneration/Compensation Edit
The results of previous research on the relationship between firm performance and executive compensation have failed to find consistent and significant relationships between executives' remuneration and firm performance. Low average levels of pay-performance alignment do not necessarily imply that this form of governance control is inefficient. Not all firms experience the same levels of agency conflict, and external and internal monitoring devices may be more effective for some than for others.
Some researchers have found that the largest CEO performance incentives came from ownership of the firm's shares, while other researchers found that the relationship between share ownership and firm performance was dependent on the level of ownership. The results suggest that increases in ownership above 20% cause management to become more entrenched, and less interested in the welfare of their shareholders.
Some argue that firm performance is positively associated with share option plans and that these plans direct managers' energies and extend their decision horizons toward the long-term, rather than the short-term, performance of the company. However, that point of view came under substantial criticism circa 2005-2006 in the wake of various security scandals including mutual fund timing episodes and, in particular, the backdating of option grants as documented by University of Iowa academician Erik Lie and reported by James Blander and Charles Forelle of the Wall Street Journal.
Even before the negative influence on public opinion caused by the 2006 backdating scandal, use of options faced various criticisms. A particularly forceful and long running argument concerned the interaction of executive options with corporate stock repurchase programs. Numerous authorities (including U.S. Federal Reserve Board economist Weisbenner) determined options may be employed in concert with stock buybacks in a manner contrary to shareholder interests. These authors argued that, in part, corporate stock buybacks for U.S. Standard & Poors 500 companies surged to a $500 billion annual rate in late 2006 because of the impact of options. A compendium of academic works on the option/buyback issue is included in the study Scandalby author M. Gumport issued in 2006.
A combination of accounting changes and governance issues led options to become a less popular means of remuneration as 2006 progressed, and various alternative implementations of buybacks surfaced to challenge the dominance of "open market" cash buybacks as the preferred means of implementing a share repurchase plan.
Attention to corporate governance Edit
Corporate governance issues are receiving greater attention in both developed and developing countries as a result of the increasing recognition that a firm’s corporate governance affects both its economic performance and its ability to access long-term, low-cost investment capital. In response to calls by OECD ministers, a revised version of its "Principles of Corporate Governance" was produced in 2004.
Numerous high-profile cases of corporate governance failure have focused the minds of governments, companies and the general public on the threat posed to the integrity of financial markets, although it is not clear that any system will or should prevent business failures, or that it is possible to provide a guarantee against fraud.
Corporate Governance concerns have been widely studied. For the United States, an analysis of these concerns has been published by the New York Society of Securities Analysts in their 2003 Corporate Governance Handbook. What constitutes good and bad corporate governance is an on-going debate in politics, civil society, and academia. For an international survey of the scientific literature see Becht, Bolton and Roell 2002.
The OECD publishes an annual paper on corporate governance. First issued in 1999, this paper has provided the framework for regional corporate governance roundtables in cooperation with the World Bank around the world. It has been endorsed as one of the Financial Stability Forum's 12 key standards, and form the basis for the World Bank's Review of Observance of Standards and Codes.
See alsoEdit
- Agency Theory
- Basel II
- Business ethics
- Corporate behaviour
- Corporate benefit
- Corporate crime
- Compliance and Ethics Programs
- Corporate Law Economic Reform Program
- Cadbury Report
- Corporate Social Responsibility
- Corporation
- Foreign Corrupt Practices Act
- Institutional fund management
- Golden Parachute
- Governance
- King I
- King II
- Legal origins theory
- Risk management
- Sarbanes-Oxley Act
- Stakeholder theory
- Takeovers and poison pills
ReferencesEdit
- ↑ Corporate Governance International Journal, "A Board Culture of Corporate Governance, Vol 6 Issue 3 (2003)
- ↑ Bhagat & Black, "The Uncertain Relationship Between Board Composition and Firm Performance", 54 Business Lawyer 921 (1999)
- ↑ Theyrule.net
- ↑ The Disney Decision of 2005 and the precedent it sets for corporate governance and fiduciary responsibility, Kuckreja, Akin Gump, Aug 2005
- ↑ OECD Principles of Corporate Governance
- Becht, Marco, Patrick Bolton, Ailsa Röell, "Corporate Governance and Control" (October 2002; updated August 2004). ECGI - Finance Working Paper No. 02/2002.
- Brickley, James A., William S. Klug and Jerold L. Zimmerman, Managerial Economics & Organizational Architecture, ISBN 0-07-282809-9
- Cadbury, Sir Adrian, "The Code of Best Practice", Report of the Committee on the Financial Aspects of Corporate Governance, Gee and Co Ltd, 1992. Available online from
- Cadbury, Sir Adrian, "Corporate Governance : Brussels", Instituut voor Bestuurders, Brussels, 1996.
- Claessens, Stijn, Djankov, Simeon & Lang, Larry H.P. (2000) The Separation of Ownership and Control in East Asian Corporations, Journal of Financial Economics, 58: 81-112
- Clarke, Thomas (ed.) (2004) "Theories of Corporate Governance: The Philosophical Foundations of Corporate Governance," London and New York: Routledge, ISBN 0-415-32307-X
- Clarke, Thomas (ed.) (2004) "Critical Perspectives on Business and Management: 5 Volume Series on Corporate Governance - Genesis, Anglo-American, European, Asian and Contemporary Corporate Governance" London and New York: Routledge, ISBN 0-415-32910-8
- Clarke, Thomas & dela Rama, Marie (eds.) (2006) "Corporate Governance and Globalization" London and Thousand Oaks, CA: SAGE, ISBN 1-4129-2899-0
- Colley, J., Doyle, J., Logan, G., Stettinius, W., What is Corporate Governance ? (McGraw-Hill, December 2004) ISBN 0-07-144448-3
- Easterbrook, Frank H. and Daniel R. Fischel, The Economic Structure of Corporate Law, ISBN 0-674-23539-8
- Erturk, Ismail, Froud, Julie, Johal, Sukhdev and Williams, Karel (2004) Corporate Governance and Disappointment Review of International Political Economy, 11 (4): 677-713.
- Garrett, Allison, "Themes and Variations: The Convergence of Corporate Governance Practices in Major World Markets," 32 Denv. J. Int’l L. & Pol’y 147 (2004).
- Holton, Glyn A (2006). Investor Suffrage Movement, Financial Analysits Journal, 62 (6), 15–20.
- Monks, Robert A.G. and Minow, Nell, Corporate Governance (Blackwell 2004) ISBN 1-4051-1698-6
- Monks, Robert A.G. and Minow, Nell, Power and Accountability (HarperBusiness 1991), full text available online
- New York Society of Securities Analysts, 2003, Corporate Governance Handbook,
- OECD (1999, 2004) Principles of Corporate Governance Paris: OECD)
- Özekmekçi, Abdullah, Mert (2004) "The Correlation between Corporate Governance and Public Relations", Istanbul Bilgi University.
- Whittington, G. "Corporate Governance and the Regulation of Financial Reporting", Accounting and Business Research, Vol. 2, 1993, Corporate Governance Special Issue, pp. 311-319. | https://psychology.wikia.org/wiki/Corporate_governance |
Warning:
more...
Fetching bibliography...
Generate a file for use with external citation management software.
A meta-analysis was performed on 68 studies to examine the effect of preoperative instruction on postoperative outcomes. The 68 studies represented 2,413 experimental subjects and 1,605 control group subjects and yielded 423 individual effect sizes. The 423 individual effect sizes had a mean effect size of 0.44 and a variance of 2.43. The mean effect size indicated that, in terms of postoperative outcomes, an average patient who received preoperative instruction was at the 66th percentile of a similar group of patients who did not receive preoperative instruction. The accompanying large variance indicated this finding was not consistent across subject-studies. Substantive characteristics of subject-studies used to categorize effect size were: type of content, method of organization, type of presentation, level of patients' fear/anxiety, and types of outcomes measured. All categories analyzed had positive effect sizes. Within categories of content, psychological and mixed forms of content produced the lowest variances. Categories of organization and presentation did not produce data to demonstrate a clear difference in the levels analyzed. Categories of patient fear/anxiety indicated that the greatest effects were achieved with patients who had high levels of fear/anxiety, followed by moderate levels and low levels. The most consistent results were found with moderate levels of fear/anxiety. When categorized by types of outcomes measured, all effect sizes remained positive. The variances accompanying each effect size remained relatively substantial at all levels of aggregation, with small variances found only at the greatest level of specificity.(ABSTRACT TRUNCATED AT 250 WORDS).
National Center for
Biotechnology Information, | https://www.ncbi.nlm.nih.gov/pubmed/3638606?dopt=Abstract |
The object, called WD 1856 b, is about seven times larger than the white dwarf. Based on the object’s size, astronomers think it’s a giant gaseous planet, which future observations and research may confirm. They also estimate it’s no more than 14 times Jupiter’s mass. The potential world circles the white dwarf every 34 hours, over 60 times faster than Mercury orbits our Sun.
The system may have looked very different prior to 6 billion years ago, though. When a Sun-like star runs out of fuel, it swells up to hundreds to thousands of times its original size, forming a cooler red giant star. Eventually it ejects its outer layers of gas, losing up to 80% of its mass. The remaining hot core becomes a white dwarf. Any nearby objects are engulfed and incinerated during this process, which in this system would have included WD 1856 b in its current orbit. Astronomers estimate the possible planet must have originated at least 50 times farther away.
The team suggests several scenarios that could have nudged WD 1856 b onto an elliptical path around the white dwarf. This trajectory would have become more circular over time as the star’s gravity stretched the object, creating enormous tides that dissipated its orbital energy. | https://nasaviz.gsfc.nasa.gov/13708 |
“Solomon Shark Hunters” (08/14/14) – Hazen joins elite fishermen in the Solomon Islands. While the island may seem like paradise, surviving out here is tough. Hazen builds a canoe to navigate in open waters.
Learning to fish in dangerous waters, Hazen works with the villagers to capture fish with a small mountain of vines used to encircle prey. Averting a run-in with one of the ocean’s most treacherous snakes, Hazen is aware of the dangers lurking in the deep. After many days, Hazen brings back shark meat for the villagers.
When it comes to enduring dense Amazonian jungle or the unrelenting Kalahari Desert sun, it isn’t modern technology but ancient know-how that can mean the critical difference between life and death. Reading a single, broken blade of grass … echoing a subtle animal call – these are tribal survival skills refined over centuries and mastered over a lifetime. In places where survival depends on bonding with a majestic golden eagle or interpreting the movements of constantly shifting sea ice, it’s time to leave domesticated life behind to Survive the Tribe.
National Geographic Channel’s “Survive the Tribe” tracks wilderness guide and survival instructor Hazen Audel as he journeys to some of the world’s most remote and inhospitable places, immersing himself into local cultures to learn survival skills that have kept tribal people alive against the odds for thousands of years. He has 10 days to study each tribe’s skills before taking on the toughest tribal challenges that will force him to the very limit. In order to survive, Audel must rely on natural instinct, ancient wisdom and a high tolerance for drinking cow’s blood.
Along the way, Audel experiences first hand the incredible perseverance, rugged beauty and amazing fortitude that only come from living on the edge. In Survive the Tribe, he must build shelters, construct weapons and forge metal using the skills imparted to him from tribal elders before joining traditional hunts that have been an integral part of the tribes’ survival for generations.
“Survive the Tribe” is produced for National Geographic Channel (NGC) by Icon Films. For Icon Films, executive producers are Harry Marshall and Laura Marshall, and the series producer is Nicholas White. For NGC, executive producers are Kevin Mohs and Carolyn Payne; vice president of production and development is Noel Siegel; and executive vice president, programming and strategy is Heather Moran. | http://tvimpulse.com/survive-the-tribe-episode-guide-hazen-lives-on-remote-south-pacific-island=17361 |
Category activation effects in judgment and behaviour: the moderating role of perceived comparability.
Previous research on category activation effects demonstrates that extreme exemplar priming can lead to contrast effects as well as assimilation effects in target judgments. Two experiments extended this line of research by investigating the moderating role of perceived comparability, that is, the extent to which the exemplar and target are believed to belong to the same category and thus can be compared. In both experiments, participants judged the speed of a person displayed on a picture following priming with animals exemplifying either extreme speed ('cheetah') or extreme slowness ('turtle'). In addition, in the second experiment a behavioural measure was included. In the first experiment individual differences concerning the perceived comparability between animals and humans were assessed. In the second experiment perceived comparability was experimentally varied. Results showed that the direction of category activation effects (i.e. assimilation versus contrast) depended on the extent to which the prime and target categories were seen as comparable. Contrast effects on both judgments and behaviour emerged when the prime and the target category were perceived as comparable. However, assimilation effects on judgment and behaviour ensued when the prime and target category were not perceived as comparable.
| |
Troop Support Campaign of Learning logo. Courtesy of DLA Troop Support Graphics.
Change management is something the senior leaders within the Defense Logistics Agency and its Major Subordinate Commands are used to dealing with – such as finding efficiencies through strategic goals that include stronger partnerships, improved processes and harnessing new technologies to sustain warfighters.
But what if an entire workforce understood the need for process improvement and change management? What if they could embrace the opportunities and challenges posed to their sustainment mission?
Enter DLA Troop Support’s Campaign of Learning.
Launched by DLA Troop Support Commander Army Brig. Gen. Mark Simerly in September 2018, the CoL consists of readings and events focused on military, technology and industry advancements that have the potential to affect the future sustainment environment.
“In order to be ready to meet future demands we have a responsibility to think clearly about the future of sustainment… a responsibility to ensure that we are not only great today, but that we can achieve an enduring greatness,” Simerly said.
To that end, Troop Support leaders developed “leaning demands,” or key questions the campaign focuses on, to help guide critical thinking while employees examined changing military, industry and sustainment landscapes as well as new technological advancements, Simerly said.
Those questions include:
Key challenges and conditions of the future sustainment environment
How these challenges and conditions influence Troop Support supply chain solutions
How to clarify sustainment challenges for broad understanding and application
What current processes can be refined to enable synchronization and integration of sustainment capabilities across all domains
What capabilities must be developed to sustain joint combat arms capabilities for the near-, mid-, and far-term
Industrial Hardware Director Air Force Col. Adrian “A.C.” Crowley embraced the campaign, supporting a recommendation from IH Technical and Quality Division Chief Jose Pereira to host a “bottom-up driven” event featuring a speaker from University of Virginia’s Darden School of Business in November 2018.
Crowley said the CoL isn’t just a great way to look at challenges and opportunities for Troop Support, but also a way for employees with ideas like the November presentation to bring value to the organization, and in turn feel valued for their contribution to its future.
“I love that the CoL is empowering,” Crowley said. “Having a conversation with an experienced, ‘outside’ speaker like [Martin Bollinger] helps the workforce see that change is real and it effects our mission. But having one of our own employees see the value in a presentation like that, and then, under the auspices of the CoL, have an avenue and the leadership support to bring that knowledge to employees at Troop Support – it’s amazing.”
Dan Keenaghan, Troop Support Process Compliance Director, also saw an opportunity to further the campaign through exploration into the potential of blockchain technology. | https://www.dla.mil/AboutDLA/News/NewsArticleView/Article/1740113/troop-support-campaign-of-learning-fosters-future-sustainment/ |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.