content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
LIC HFL Exam Pattern 2019
LIC Housing Finance Ltd has released a notification to recruit for the post of Assistants, Associates and Assistant Manager. LIC is one of the largest organizations in India. LIC HFL is one of the subsidiaries of LIC whose main objective is to provide long-term loans to individuals for constructing flats/houses and other residential and commercial buildings. Go through the detailed LIC HFL Exam Pattern below to understand the exam before you decide to fill-up the form.
LIC HFL Exam Pattern 2018
- LIC HFL Application Form is available on its official website from 8th August to 26th August 2019.
- There are a total of 300 vacancies for the posts.
- The LIC HFL Admit Card will be available from September 09, 2019.
- LIC will conduct the LIC HFL exam in the month of October (tentatively).
- The LIC will select candidates on the basis of an Online Examination and Interview.
LIC HFL Exam Pattern
- Candidates have to clear the written exam to get selected for the interview and medical exam.
- There is 4 section in the written test- English Language, Logical Reasoning, Numerical Ability, and General Awareness.
- A total of 200 questions are there for 1 marks each, with the time duration of 120 minutes.
- The exam will be conducted separately for Assistant, Associate, and Assistant Manager.
- For every wrong answer, candidates have to give the penalty of 0.25 (1/4) marks from the correct answer.
- The language for the exam will be English only.
- There is no penalty, if the candidate leaves the question blank.
|Section||No. of Questions||Maximum Marks||Time Duration|
|English Language||50||50||35 Minutes|
|Logical Reasoning||50||50||35 Minutes|
|General Awareness||50||50||15 Minutes|
|Numerical Ability (for Assistant & Associate) Quantitative Aptitude (for Assistant Manager)||50||50||35 Minutes|
|Total||200||200||120 Minutes|
LIC HFL Interview Process
- LIC reserves the right to maintain the cut-off, section-wise as well as overall, according to the number of candidates in order to prepare the merit list.
- The selected candidates from the online written exam will be called for a personal interview.
- A combined score in both the rounds will be taken into consideration to make the final decision on the candidature.
- The decision of the company on the selection of a candidate will be final and will not change under any circumstances.
Medical Examination
After the final selection, a candidate will be called for a medical check-up and will be selected as a Assistants, Associates and Assistant Manager after he/she is found medically fit by the medical examiner.
Share your thoughts/queries here! | https://www.toprankers.com/exams/lic-hfl-exam-pattern/ |
Land Lines is an experiment that lets you explore Google Earth satellite images through gesture.
The project used machine learning and line detection algorithms to preprocess the images. Gesture matching happens on the phone’s browser in real time without the need for servers.
This project was a collaboration between the Google Data Arts Team and artist Zach Lieberman. | https://custom-logic.com/work/land_lines/ |
This is where you go for the somewhat longer and more comprehensive stories about other organizations using DbVisualizer and what they gain.
One of the large projects the National Center for Supercomputing Applications is involved in is TeraGrid, a distributed network of high-performance computers that is used for parallel computations to solve large-scale scientific problem. Michael Shapiro used DbVisualizer to reverse engineer and visualize a TeraGrid database that he assumed responsibility for in his role as Senior Systems Engineer at NCSA.
How do you figure out how complex databases are structured when you get the responsibility for extending functionality in systems that you didn’t originally design yourself? That was an important question for Michael Shapiro when he joined the TeraGrid project at the National Center for Supercomputing Applications (NCSA) some eight years ago. TeraGrid is a distributed supercomputing resource that combines the computational power of high-performance hardware spread over 11 sites all over the US, and Michael’s database keeps track of projects, individual usage and proposals for new projects to run on TeraGrid.
"I was given responsibility for the TeraGrid central database, and one challenge was to understand it so I could continue to develop it. One tool that I thought would help was one that could produce an ER diagram of the database. I looked around and found DbVisualizer. DbVisualizer enables me to reverse engineer to produce ER diagrams. It also has some other features like the Navigator that I can set up by just clicking that looked very useful," said Michael Shapiro, Senior Systems Engineer at NCSA.
The database that tracks all the science projects that run on TeraGrid is developed on Postgres. Usage information for all TeraGrid resources is reported by all the participating sites and entered into this central database. The database is hosted in San Diego, with development and maintenance at NCSA in Illinois.
"The ability to reverse engineer and visualize an existing database may appear to be a pretty narrow use for a tool, but it was important to me for initially exploring the database, as well as communicating the structure to other members of the teams involved in the project. I am convinced that there are similar scenarios in most large organizations that rely on complex databases. In fact, I think this is an area where even more functionality could be warranted," said Michael Shapiro.
Now that he is several years into the job, Michael Shapiro and the team he is on have put a significant mark on this database. DbVisualizer was important to understand the initial design that was done before he took over the responsibility for the further development of this database.
About NCSA
The National Center for Supercomputing Applications (NCSA), located at the University of Illinois at Urbana-Champaign, provides powerful computers and expert support that help thousands of scientists and engineers across the country improve our world.
With the computing power available at NCSA, researchers simulate how galaxies collide and merge, how proteins fold and how molecules move through the wall of a cell, how tornadoes and hurricanes form, and other complex natural and engineered phenomena.
NCSA was established in 1986 as one of the original sites of the National Science Foundation's Supercomputer Centers Program. For more than 20 years, NCSA has been a leader in deploying robust high-performance computing resources and in working with research communities to develop new computing and software technologies.
For more information: http://www.ncsa.illinois.edu
TeraGrid is a distributed, massively parallel supercomputing structure, combining resources at eleven partner sites to create an integrated, persistent computational resource.
Using high-performance network connections, the TeraGrid integrates high-performance computers, data resources and tools, and high-end experimental facilities across the US. Currently, TeraGrid resources include more than a petaflop of computing capability and more than 30 petabytes of online and archival data storage, with rapid access and retrieval over high-performance networks. Researchers can also access more than 100 discipline-specific databases. The TeraGrid is the world's largest, most comprehensive distributed cyberinfrastructure for open scientific research.
TeraGrid is coordinated through the Grid Infrastructure Group (GIG) at the University of Chicago in partnership with Indiana University, the Louisiana Optical Network Initiative, National Center for Supercomputing Applications, the National Institute for Computational Sciences, Oak Ridge National Laboratory, Pittsburgh Supercomputing Center, Purdue University, San Diego Supercomputer Center, Texas Advanced Computing Center, and University of Chicago/Argonne National Laboratory, and the National Center for Atmospheric Research. | https://www.dbvis.com/customers/case-studies/ncsa/ |
Health and wellbeing technology has been based on the World Health and fitness Company (WHO) as being the “control over well being science and technology for the main benefit of individuals and various other varieties”. The principal quest of WHO is to showcase international health insurance and improve the medical attention process through technological and economic actions. If you have any kind of inquiries relating to where and how you can make use of dementia, you could call us at the internet site. This will assist to further improve the day-to-day lives and health and fitness situation of all who make use of overall health technological innovation. WHO is a United Nations company that coordinates member state governments in health sciences.
A vital aspect of WHO’s jobs are wellness technologies assessment, which intends to look for the importance of researching, deployment, safe practices, maintenance, progression, safe-keeping and submission and regulatory activities for managing the risks linked to well being technology. The overall result of these kinds of things to do is calculated using financial potential risk and evaluation management techniques. Financial evaluation means cost success, home equity, safety and top quality and appropriateness. WHO uses this process to ascertain the budgetary impact newest technologies as well as watch adjustments in fees of present technology? The potential risks associated with particular technological innovation, whether it be preventable manageable, reversible or really expensive, is usually viewed as throughout the economical evaluation.
WHO undertaken a multidisciplinary course of action to formulate the worldwide strategy on overall health Modern technology Review? This process included pros from a number of segments, which includes monetary and interpersonal scientific disciplines, computer system science, modern technology, epidemiology, and promotion. This process was multidisciplinary, bearing in mind unique views with a focus on the full particular person. The multidisciplinary approach triggered 8 main locations, which were reviewed in detail inside of a article published by WHO as well as Planet Health Firm. They are engineering exploration, development and exchangeplan, values and development general public wellness, security, apply and security and assessment.
A large critique is a very crucial portion of the WHO’s function, specially when dealing with large difficulties like people created by health and wellbeing technologies assessment. This methodical review aspires to provide a seem and dependable photo on the technology’s added benefits and risks. This assists inside the identification of priorities for action, and finding gaps and needs. It also helps in presenting a solid grounds for motion with regard to global examination, sychronisation and checking. WHO’s efforts in working with the global well being challenge are therefore redirected at delivering a society-wide reaction to the condition by means of effective multidisciplinary methods and procedures.
WHO’s exercises in working with overall health modern technology concerns made several strides. The key upshot of check these guys out initiatives has become the adoption of superior modern technology and methods in health care supply, treatment and avoidance of diseases, and increasing tolerant care and attention and excellence of daily life. A significant hard work is focused on the maximization of latest information, with exploration and growth focusing more on using obtainable technological innovations on the easiest ways possible. A leading area for enhancement is with the region of affected individual safeness, specially in regard to unaccepted and dangerous systems. The boosting development to the application of electronic digital professional medical files has been a driver in this particular course of action.
In keeping with this, establishing cost-effective products and services has become a feature on the important achievements on the WHO. Other significant routines would be the rendering of programs to path and document final results, carry out charge operations, do examination and watching, look after communication and learning, and manage exploration and programmatic alliances among companies linked to overall health modern technology. Creating new products and services, and upgrading and assuring basic safety expectations is an additional crucial portion of worry. To have these reliable, effects and appropriate data is imperative to accomplish good cost and excellent-success. WHO features many technological assistance courses to further improve excellent and provide cost-effective professional services?
The whole process of wellness technologies examination establishes the strength of a new technological innovation therefore makes it possible for inexpensive using the resource. It calls for examining the result with the modern technology on man health, as well as its outcomes in the environment, to look for the effectiveness in the systems. An additional region for development is producing guidelines that street address the goals of your analysis and still provide for the cost-usefulness. A policy ought to set factors for prioritizing health and wellbeing needs. It has to also established very clear goals and timeframes for achieving the targets, revealing frequently on progress, and delivering good examples and reasons on what continues to be obtained up to now.
Health technologies assessment offers excellent opportunities for conclusion designers. Along with the appropriate analysis, some great benefits of the modern technological innovation can be realized, as well as consequences can be dealt with efficiently. The chance to acquire inexpensive plans also offers itself. Also, the ability to apply a better assistance shipment method is big. Helping to make knowledgeable judgements in the allocation and employ of hard to find tools is invariably additional worthwhile than producing rash choices depending on simple financial constraints.
If you loved this short article and you want to receive more information relating to dementia i implore you to visit our web site. | https://calcenstein.com/factors-why-health-and-wellbeing-technological-innovation-examination-is-important/ |
Was there design in prehistory? If by design we understand objects intentionally created for their function and appearance, then it certainly did exist.
Clothing design incorporates cut and adjustment of individual clothing objects. Like today, but at a slower pace, changes in habits and taste influenced textiles and clothing in prehistory. We do not know if prehistoric people were aware of these changes or which mechanisms that controlled them. Changes in style, design and technique are important indicators that can contribute to a characterisation of the prehistoric society. Evidence for clothing in different periods consists of archaeological textiles and skin, as well as various clothing accessories, such as metal, amber and bone ornaments.
The clothing evidence is unequally distributed in different periods of prehistoric Denmark. Only little information is available for the Stone Age while more abundant evidence exists for the Bronze and Early Iron Ages. In the Late Iron Age archaeological textiles are very fragmented, but in this period information on clothing can be supplemented with contemporary iconographic sources. | https://en.natmus.dk/historical-knowledge/denmark/prehistoric-period-until-1050-ad/what-did-they-wear/clothing-design/ |
The Higgs-like boson discovered in 2012 is looking more Higgs-like, scientists on experiments at the Large Hadron Collider said in presentations at the Rencontres de Moriond physics conference today.
On July 4, 2012, scientists first announced the discovery of a new particle that could be the Higgs boson. The Higgs boson is, or was, the last undiscovered particle in the Standard Model, a menu of the particles and forces that serve as the building blocks of the universe.
Final judgment of whether the new boson is the predicted Higgs particle will likely have to wait until sometime after the LHC resumes running at higher energies in 2015. But things look good so far for those rooting for a Standard Model Higgs. Continuing studies of the properties of the boson are beginning to exclude some scenarios that would strip the particle of its title.
“The evidence is accumulating just as it should if it is the Standard Model Higgs boson,” says Fermilab theorist Chris Quigg.
Once scientists discovered the new particle, they could begin checking on a whole collection of its predicted properties, such as how often it would decay into certain combinations of other particles. They’re getting closer to determining two properties called spin and parity.
The Standard Model Higgs boson must have 0 spin and even parity, written as 0+.
When a particle breaks down into lighter particles, the spin and parity of a particle affect the angles at which those lighter particles fly. Scientists from the ATLAS and CMS experiments studied a well-understood decay pattern of the Higgs-like particle: into a Z boson and a virtual Z boson, which then decay into two pairs of another type of particles, leptons. By studying the angles at which the decay products move away during this process, scientists can figure out the spin and parity of the particle.
If the Higgs-like particle did not have a spin-parity of 0+, it would be something other than the Standard Model Higgs boson. That would be an exciting prospect for physicists who would like a brand new mystery to solve. But, from what scientists have seen so far, the Higgs-like boson is behaving the way the Standard Model Higgs boson is supposed to behave.
With further analysis and data from higher-energy collisions, though, the Higgs-like particle will have many more chances to step off its expected path. LHC scientists will continue to give updates to their analyses at the Rencontres de Moriond meeting next week. | https://www.symmetrymagazine.org/article/march-2013/higgs-like-particle-still-looking-like-the-higgs |
- Categories:
Watch Dan Rather’s Indies First Event Recording Now
- By Emily Behnke
On Wednesday, December 2, Indies First spokesperson Dan Rather held a national event in honor of his bestselling collection of essays, What Unites Us: Reflections on Patriotism (Algonquin Books), in support of independent bookstores. A recording of the event is available to watch here.
Rather appeared with co-author Elliot Kirschner for a timely conversation about What Unites Us: Reflections on Patriotism and independent bookstores. They discussed challenges independent bookstores are facing now, the current political climate, and how books can unite the U.S.
During the event, Rather noted that it’s an extremely difficult time for the country as a whole. His most recent book aims to lay out how we can reach across deep ideological and political divides, and books, he said, are one of the more important tools for that.
Rather added that the phrase “what unites us,” in the context of his book, is a statement and not a question. The book aims to spark a conversation, not provide answers.
“What we’re trying to do is help the conversation move along,” he said. “I tried to list reminders in the book. The overwhelming majority of Americans believe in the rule of law. The overwhelming majority of Americans believe one person, one vote. But there are other things we think about less often…[such as] the importance of the arts and the importance of science.”
When discussing the value of knowledge, Kirschner said, independent bookstores play a huge role. “When you’re online and you start searching for something, it’s hard to wander. An algorithm makes suggestions for you based on what you’ve read already,” he said. “But knowledge is often stepping outside of your comfort zone. It’s wandering into the section of the bookstore you don’t normally go to.”
Kirschner added that knowledge can only go so far if it’s kept to oneself, saying, “The active sharing of knowledge, of suggesting and listening and learning from others, is what we hoped for this book.”
Additionally, Rather is hosting the #IndieBookstoreChallenge on Twitter, an event that encourages readers to help clear the shelves of What Unites Us at certain stores. So far, he has promoted Brazos Bookstore, Gramercy Books, McIntyre's Books, and more.
While supplies last, booksellers can also sign up to receive bookplates signed by Rather. Stores may request the number of bookplates corresponding to the number of books ordered, up to 12 bookplates per store. Book orders can be placed with Workman Publishing or a wholesaler. | https://www.bookweb.org/news/watch-dan-rathers-indies-first-event-recording-now-1624475 |
Social workers assist families in strengthening their connections and coping with challenging life events such as separation and divorce, sickness, and death. They steer families through the counseling process, assisting them in recognizing issues, deciding what they want to accomplish, and locating answers to the challenges they face.
How can a social worker help?
SOCIAL WORKERS PROVIDE A VARIETY OF SERVICES, INCLUDING:
- Counseling and evaluation services for individuals, families, and couples
- Psychotherapy
- Preparation for adoption
- Career and job advice as well as placement services
- Vocational evaluations and rehabilitation services
- Stress management
- Counselling for eating problems
- Counseling for people dealing with grief, loss, and trauma
What is social work with family?
Family social workers provide assistance to individuals and their families during challenging times and work to protect vulnerable persons, including children and adults, from coming into contact with potentially harmful situations.Their mission is to assist in making positive changes in the lives of other people.They are responsible for the maintenance of professional connections and serve as both advisers and champions.
What support can a social worker offer?
As a social worker, your job will be to help individuals discover answers and resolutions to the challenges they face.This might mean helping to safeguard vulnerable individuals from being harmed or abused, or it could mean assisting people in becoming independent and living on their own.You’ll interact with customers, their families and other people in their immediate environment, as well as various client categories, including the elderly.
What are the 10 roles of social worker?
- Transcript Dinneka R.
- An advocate, a counselor, a mediator, a researcher, an educator, a manager, a case manager, a facilitator, a community change agent, and a broker are some of the roles that social workers can play.
- ADVOCATE When playing the position of advocate, a social worker works toward the objective of empowering the client by advocating for the rights of people who are disempowered by society.
Why do families have a social worker?
Social workers provide assistance in a wide variety of areas, including mental health, relationship and parenting problems, family violence, gambling, substance abuse, and more. If you are encountering problems that you are unable to handle on your own, you might want to seek the assistance of a social worker.
What are the main duties of a social worker?
- Tasks Identify individuals and groups that are in need of assistance
- Determine the client’s goals by evaluating their requirements, situations, and skills, as well as any support networks they may have
- Assisting customers in adjusting to life upheavals and difficulties, such as sickness, divorce, or job loss
What does a family worker do?
Their job is to help children and their families cope with a wide range of challenges, including issues related to substance abuse and alcoholism, the presence of a parent who is incarcerated or hospitalized, the presence of a parent or child who has a disability or special educational needs (SEN), language barriers that make it difficult for them to access local and national services, and domestic violence.
How do social workers support children in care?
We will establish plans for your future along with you, your parents, and any other caregivers you have.spend time with you, assisting you with any issues or concerns you may have by providing guidance and support, and spending time with you.Attend all of the meetings that pertain to your care.I will pay attention to what you have to say and will assist you in communicating your perspectives during meetings as well as when choices and plans are being developed.
Why would social services get involved?
When a parent is displaying evident indications of an untreated mental illness or addiction to drugs or alcohol, and when children are clearly neglected – such as constantly being hungry, having bad hygiene, being transient, or frequently missing from school, social workers become involved.
How do social workers help communities?
The provision of social services and the practice of social work play a significant part in assisting members of society to enhance their quality of life via increased awareness and to maintain the community through the development of job possibilities through their own initiative.
How can social workers help poverty?
The provision of advocacy services, such as serving as mediators or actively interfering with social services organizations or government agencies, is one of the primary ways in which social workers assist low-income people. This is an essential component of the job that social workers do to alleviate poverty and improve the wellbeing of children. | https://www.bac2nyvt.org/en/how-do-social-workers-help-families.html |
The Talos Principle is a philosophical first-person puzzle game from Croteam, the creators of the legendary Serious Sam games, written by Tom Jubert (FTL, The Swapper) and Jonas Kyratzes (The Sea Will Claim Everything).
As if awakening from a deep sleep, you find yourself in a strange, contradictory world of ancient ruins and advanced technology. Tasked by your creator with solving a series of increasingly complex puzzles, you must decide whether to have faith or to ask the difficult questions: Who are you? What is your purpose? And what are you going to do about it?
The Talos Principle: Road to Gehenna follows the narrative of Uriel, Elohim’s messenger, as he explores a strange, hidden part of the simulation on a mission of mercy and redemption in an attempt to free the souls of the damned at all costs.
This substantial expansion consists of four episodes that take experienced players through some of the most advanced and challenging puzzles yet. The Talos Principle writers Tom Jubert and Jonas Kyratzes have returned to pen the expansion and show players an entirely different side of Elohim’s world through a journey to Gehenna filled with new characters and a new society with its own history and philosophy. | https://hddgames.cc/free-download-the-talos-principle-gold-edition-v554784-all-dlcs-bonus-content-fitgirl-repack/ |
Now that all of the AM’s collections and research teams have safely arrived back home, what next? ‘Lots’ is the answer!
Collecting specimens was only the beginning of the process; now the lab-based work has started. Two teams in particular, Marine Invertebrates and Malacology had a very productive trip to the island.
Five pallets loaded with collecting gear and drums of specimens have arrived back at the AM and now the hard work begins, sorting and identifying the preserved animals that were collected. Our teams were specifically targeting marine invertebrates to build on the AM’s research collection. While there have been a number of collecting trips to Lord Howe undertaken since our opening in 1827, the aim of this trip was to obtain specimens that are useful for molecular study. Most of the earlier collectors preserved specimens in formalin, and while this is the best preservative for later study of anatomical features for most invertebrates, this substance breaks up the animal’s DNA, which is an additional powerful tool to help determine whether it is a new or previously known species and how closely it is related to other species.
While some species can be identified quickly, others, particularly the smaller ones, may require many hours of careful microscope work or DNA sequencing, analyses of past published literature, and often the involvement of particular specialists to complete the identifications. We have been asked already what our major findings are, but at this stage, until the work is done, we won’t really know! What is known for sure is that every time marine collections are made, new species are discovered.
One particular focus of this trip was to collect tiny micromolluscs that are found in marine sediment and are sometimes not much bigger than a grain of sand. They simply can’t be seen with the naked eye. The sediment samples needed to be sorted with the aid of a microscope to find and photograph these molluscs.
There are always new things to discover. One of the island’s residents, Molly Ball (pictured) showed us a very special shell of an air-breathing mollusc called Melampus castaneus. Molly found this snail and with her vast shell knowledge realised it was not something she had seen before. She was right. Ian Hutton sent a picture to the Australian Museum for identification just prior to our trip. Snail ‘guru’, Ian Loch at the museum (and a regular island visitor) provided the identification. While this species is found elsewhere in the Pacific (and sometimes called the Coffee Bean Snail), it had never been recorded before from Lord Howe Island, so Molly has made this important contribution to science through her discovery.
Our goal following from this trip is to prepare a checklist of marine invertebrates from Lord Howe. This record will provide an important snapshot of what we know about the island fauna at this time in our history. Change, particularly climate change, is clearly already affecting the distributions of marine animals, but before we can understand what is really going on in marine environments, we need to have a good idea of what exists in particular locations in the first place. We hope our work will add to this understanding. Watch this space for further updates!
A daring Australian Museum expedition to Lord Howe Island has succeeded in its search for the rare and elusive Lord Howe Island Phasmid.
AM scientists have embarked on an expedition to benchmark native and introduced animal populations on the island that's 'frozen in time'.
On expedition on Lord Howe Island, AM scientists have made an unexpected discovery. | https://australianmuseum.net.au/blog/amri-news/the-excitement-continues-post-lord-howe-island-expedition/ |
Donald Shoup is Distinguished Research Professor from the University of California, Los Angeles, whose 2005 book, The High Cost of Free Parking, is one the most influential pieces of planning scholarship from the 21st century.
Explore Urban Planning Courses
Discover hundreds of courses, with new courses added weekly.
Our most popular courses
Featured Courses
Thousands have used Planetizen Courses
Browse All Courses
Designing the Megaregion
Current megaregion development is destabilizing the natural environment, causing gridlock on highways and congestion at airports, and making cities and suburbs separate and unequal. This course discusses how we can change these trends and invest in megaregions to improve planning and development outcomes developing and older areas.
History of City Planning 5: The City of Tomorrow
Learn why city planning is crucial to the urban future and why the success of future cities will depend on the extent to which they are sustainable, equitable, and how they use technology to serve citizens. Evaluate the key challenges facing cities in the future and, importantly, potential solutions for those challenges.
Incremental Code Reform: Enabling Better Places
The Congress for the New Urbanism’s Project for Code Reform streamlines the zoning code reform process by providing local governments with place-specific incremental zoning code changes that address the most problematic barriers first, build political will, and ultimately create more walkable, prosperous, and equitable places.
Defining Neighborhoods
This course reviews the varying definitions of neighborhoods and examines methods for defining a physical basis and tangible meaning to neighborhoods based on the location of neighborhood centers, boundaries, and spatial extents.
History of City Planning 3: Midcentury Modern (1940-1979)
Discover the impact of World War II and the Cold War in shaping city planning practices and how the tragic destruction and loss of life in World War II somehow created opportunities for planners to test new ideas.
Transportation Planning: Effects on the Environment, Health, and Social Justice
This course discusses the local and global impacts of transportation systems and the mitigation of those impacts. The course also identifies prospects for change, as achieved by technology, transportation management, and pricing.
Transportation Planning: The Role of Transportation Systems in Social and Economic Life
By the end of this course, you will have a strong understanding of the way in which transportation systems interact with society and the economy.
Urban Design for Planners 2: Getting Started with QGIS and SketchUp
Course instructor Emily Talen guides viewers through the process of transferring a shapefile of building outlines into SketchUp and processes of basic manipulation necessary to create a 3D model. Learn how to load data into QGIS, set the coordinate reference system, and change the graphic display of data layers.
Urban Design for Planners 1: Software Tools
Urban planners and urban designers are interested in building places that embody beauty and hope. In this course, Emily Talen, PhD, FAICP, presents free urban design software tools that can help urban planners and urban designers visualize changes in the built environment to support the overarching goal of creating better places. | https://courses.planetizen.com/courses?f%5B0%5D=%3A141&f%5B1%5D=closed_captioning%3A415&f%5B2%5D=credit%3A443&f%5B3%5D=popular%3A1&f%5B4%5D=topic%3A140&f%5B5%5D=topic%3A322&f%5B6%5D=topic%3A331&f%5B7%5D=topic%3A354&f%5B8%5D=topic%3A420&f%5B9%5D=topic%3A422&%3Bf%5B1%5D=topic%3A352&%3Bamp%3Bf%5B1%5D=software%3A338&%3Bamp%3Bf%5B2%5D=software%3A386&%3Bamp%3Bf%5B3%5D=software%3A408&%3Bamp%3Bf%5B4%5D=topic%3A305&%3Bamp%3Bkeywords= |
We’re looking for an enthusiastic Business Intelligence Analyst that is highly analytical, has keen attention to detail, exceptional problem-solving skills and enjoys financial modelling. Reporting to the Senior Manager, Pricing & Business Analytics this new role will be responsible for gathering and synthesizing available qualitative and quantitative information and highlighting relevant insights to support both strategic and tactical business decisions across Pollard Banknote’s operating companies.
What you will do
- Lead analytical initiatives, projects and deliverables as they relate to all aspects of the Lottery industry, including our growing emphasis on a variety of digital solutions.
- Create detailed written summaries and analytical models that utilize and list all assumptions.
- Respond to formal requests for proposals with a focus on analytics, financial modelling, pricing, and develop client-facing communication.
- Create, maintain, and monitor financial models and tools designed to measure operational performance.
- Work with key stakeholders to understand business opportunities and propose analytics-based solutions to business challenges, often working and collaborating closely with both team members within Business Development as well as other teams across the organization.
- Prepare, validate, and reconcile data from internal and external Lottery sources, including extraction of meaningful insights to aid in management’s decision-making processes.
- Perform scenario/sensitivity testing of competitor data and market intelligence, present findings to various stakeholders in both written and oral formats.
- Develop, edit, finalize and enhance reports, presentations, and other documents as requested, including proofreading and providing format and content review.
- Communicate with stakeholders at all levels of the organization to translate complex concepts into actionable insights.
- Monitor business performance and recommend analysis to support Business Development in an effort to be proactive for future projects.
Who you are
- A top performer who possesses excellent oral, written and interpersonal communication skills to effectively work autonomously and with the team, senior management, and external stakeholders in a fast-paced work environment.
- A highly adaptable, analytical and process-orientated individual with a keen eye for detail and accuracy.
- Someone who is exceptionally organized, self-motivated, and possesses strong time management skills.
What you will need
- Post-secondary degree or a commensurate amount of experience in at least one related field of study (i.e. accounting, financial analysis, statistics & math, economics,) and at least 5 years’ experience in Business Intelligence Analyst function.
- Able to work under tight deadlines both as a team player and autonomously.
- Highly analytical, self-motivated, results-driven with a passion for problem-solving and comfort with ambiguity.
- Highly proficient in Excel and other BI tools.
- Advanced MS Office skills inclusive of Word, PowerPoint, Outlook, Teams, and Adobe Acrobat.
- Strong communications skills across all levels of the business.
- Experience with creating business requirement documents through thorough analysis.
- Experience in a SharePoint environment is preferred but not required.
Pollard Banknote offers a challenging, team-oriented environment, competitive compensation, profit sharing program, company pension and opportunities for professional development. Interested candidates are encouraged to submit a cover letter outlining fit and salary expectations along with a résumé to:
[email protected]
Pollard Banknote Limited is an equal opportunity employer, committed to maintaining a diverse workforce. We thank all candidates that apply, however only those selected for an interview will be contacted. Employment is contingent upon a satisfactory response from a Criminal Record Search. | https://www.pollardbanknote.com/2021/04/28/business-intelligence-analyst/ |
Humanist Discussion Group, Vol. 18, No. 271.
Centre for Computing in the Humanities, King's College London
www.kcl.ac.uk/humanities/cch/humanist/
www.princeton.edu/humanist/
Submit to: humanist_at_princeton.edu
Date: Thu, 07 Oct 2004 07:22:06 +0100
From: Paul Bergen <icg_at_fas.harvard.edu>
Subject: Job Announcement in Humanities Computing from Harvard
University
Senior Specialist for Instructional Computing in the Humanities
More information:
http://jobs.harvard.edu/jobs/summ_req?in_post_id=23754
The Instructional Computing Group (ICG. See http://icg.fas.harvard.edu/) of
FAS Computer Services facilitates the integration of World Wide Web and
multimedia instructional resources into instruction across the curriculum
in Harvard's Faculty of Arts and Sciences. This position provides technical
and pedagogic leadership in helping faculty and course staff to integrate
electronic tools and materials into their teaching, with a particular
emphasis on support for the humanities disciplines. The position works
closely with faculty, teaching staff, and department administrators to
determine which existing instructional computing resources will meet their
pedagogical needs and/or to collaborate in the design and development of
new online resources where necessary. The positoin participates fully in
the activities of ICG's Instructional Design and Development team,
including design and implementation of training and support programs,
development of instructional design plans and usability studies, production
of online and print documentation for instructors and colleagues, training
and support for course staff who use ICG's Instructor's Toolkit to develop
course Web sites, development and integration of interactive online tools,
and promotion of ICG services and resources through presentations for
department and course-based groups.
A graduate degree in a humanities discipline is strongly preferred. Strong
candiadtes will have at least three years of Web programming and/or design
experience and significant experience teaching with technology and
developing Web-based instructional resources. Candiates shoud have a
demonstrated record of initiative in working with college-level faculty and
course staff to support instructional uses of technology in a humanities
field. Excellent knowledge of HTML, Perl, CGI, Flash, and other relevant
WWW technologies and programming experience is desired. Candidates should
be able to demonstrate knowledge of user interface design, usability and
accessibility standards. Outstanding written and oral communication and
presentation skills and strong skills in project design and work flow
management are required, as are excellent decision-making and
problem-solving skills and the ability to work in and lead teams. | https://dhhumanist.org/Archives/Virginia/v18/0272.html |
The United States has an extremely high rate of emergency room visits for cancer, stroke, and heart attack, and we know that it’s very expensive for doctors to treat these conditions.
While we have seen some dramatic progress in the fight against cancer in recent years, a new report from the Institute for Healthcare Improvement (IH) points to the fact that the U.S. has the third highest emergency room hospitalization rate in the world.
The National Emergency Medical Services Survey (NEMS) found that more than 1.4 million people were hospitalized in the U to treat illnesses in the hospital, and the number of such admissions increased by 535 percent between 2012 and 2017.
NEMS also revealed that emergency room spending increased by $6.4 billion in 2017, and by another $1.4 in 2018.
The report found that, overall, emergency room services in the United States were responsible for almost $5.5 trillion in total medical care expenses, with over a quarter of this spending going to emergency room treatment.
Emergency room visits are one of the top expenses for patients, as they often result in major medical bills.
While there are a number of factors that contribute to these costs, such as the number and types of procedures that patients are undergoing, the NEMS report shows that the most common reason for hospitalizations is because of a medical emergency, and many people who visit a hospital for a medical problem are not even aware of the condition that caused the emergency.
NEMA’s study, which examined data from more than 5,500 hospitals across the country, found that hospitals in the US spent over $11,000 per person per year on emergency room care.
In addition to the $1,000 in annual costs for each emergency room visit, hospitals spend $7.3 billion annually on medications, which includes many common prescription medications.
While these expenditures are not the most expensive of these medical expenses, they are certainly expensive when combined with the costs of treating the patient.
These costs have led some to suggest that hospitals should be able to charge for emergency room stays, even if it means they do not receive a cut.
While the IH study did not find that hospitals are charging for emergency rooms, it does highlight the fact in the country’s healthcare system that the costs are too high, and that the system should be overhauled.
The American Medical Association (AMA) has suggested that hospitals charge patients for emergency visits, which has led to increased criticism of the system and the health care system in general.
In the AMA report, it states that there is an “urgent need to address the chronic underfunding of emergency departments” and that “the American Medical Society recommends that all hospitals provide patients with reasonable, free, and timely access to emergency care, as well as adequate staffing and other assistance to ensure that they have access to treatment.”
In addition, the AMA also stated that “hospital billing must ensure that patients receive a fair and timely payment for their care, with minimal or no reimbursement for unnecessary services.”
In an effort to better understand how the American health care economy works, The Daily Show’s John Oliver addressed the issue of charging patients for hospital stays during an episode on Wednesday night.
Oliver suggested that charging patients would create an incentive for hospitals to charge patients less, which would result in an “economy collapse” and ultimately “death spiral.”
According to the AMA, the study revealed that over 3.6 million patients were hospitalized for emergency department care in 2017.
While Oliver does not mention the idea of charging for hospital visits in the segment, his comments are very clear: The American public has already seen that the American healthcare system is broken, and it’s time for healthcare providers to get their act together and start fixing it.
While it may seem counterintuitive to charge people for emergency care when it comes to the cost of hospitalization, there is no denying that there are serious health problems and problems that need to be fixed.
While some argue that patients should be charged for these medical costs, Oliver’s comments are a clear signal that the current system is not working.
The AMA, however, said that hospitals need to get better at using social media to communicate and promote health information and resources.
As Oliver said, “You can’t fix your broken healthcare system by getting rid of the people who are helping you.
You have to fix it by finding a way to work with people to make sure the system works.”
If you want to learn more about the issues facing the American economy, The Washington Post’s Mark Hosenball has a good write-up on the topic here.
The Daily Mail has a comprehensive piece on healthcare in America here.
You can find a list of the latest news about the healthcare industry here. | https://ayurvedakarmayoga.com/how-to-be-a-good-nurse-in-the-public-health-arena/ |
Baringo.
biodiversity
biodiversity protection
Boundaries
climate change
collaborative workshop
commercialization of land use
Communal land in rural Africa
Communal land reform in Namibia
communal land tenure
communal land tenure reforms
community conservancies
community-based conservation areas
community-based natural resource management
conservancies
Conservation
Conservation in Namibia
conservation landscape
conservation measures
Corona Virus
coronavirus pandemic
corporate social responsibility
Covid-19
Covid-19 in Africa
COVID-19 pandemic
COVID-19 vaccine
COVID-19 vaccine clinical trials
COVID-19’s effect on tourism
crisis and scarcity narratives
data analysis
data management
debates against structural forms of discrimination
demographic developments in Africa
Desert locust
Desert Locust invasion in Northeastern Africa
design thinking
destruction of ecosystems
Development
development corridors
development finance institutions (DFIs)
development research
development strategies
Digital connectivity
digital infrastructures
discrimination
Disruptions of value chains
East Africa
East Pokot
ecological balance
economic geography
economic impacts
ecosystems
effects of (mis)information
effects of COVID-19 on communal-based conservation and tourism
electricity generation
electrification in Kenya
environmental infrastructure
Environmental Policy
Export agriculture
extinction of species
Extreme flows
financialisation
financialization
food crisis
Food security
formulate visions for the future
Future Invasions
Futures
gender
geothermal development
Geothermal Energy
Geothermal future-making
Global Health Pandemic
global integration
global production
global production network
global production networks.
Global value chains
global warming
governance
grant is to promote female researchers
graphics
Green Futures
Green Growth
green space governance
growing demand for food
hierarchical structures in development research
hierarchies based on positionality in development research
hierarchy
horticultural smallholders in Kenya
horticulture export in Kenya
Horticulture in Kenya
how green spaces are planned
hunger crisis
inequalities and hierarchies
infectious diseases
infrastructural prosperity
infrastructure
infrastructure finance
Infrastructure Roads in Kenya
inorganic fertilizer
invasive plant species
investor–community relations
jour fixe
Kenya
Kilombero
Land Change Modeler
land distribution
Land in rural Africa
land rights
land rights in Namibia
land use and land cover change
large scale investments
large-scale projects
Locust in East Africa
Locust invasion in East Africa
loss of jobs
making future visions readable
market dominance
mechanisms and monetization of access to land
Megaproject
Mesquite (Prosopis juliflora)
migration
mobile information services
mobility
modeling capabilities
modern planning
modernists projects
Namibia’s elephant population
national development strategy
nature conservation
Nature Protection
new pandemic
North-South collaborations
North-South Global Partnerships
North-South research projects
Nutrition
open source computer applications
open-source tools
outbreak in Europe
Pan-Africanism
Parthenium weed (Parthenium hysterophorus)
pastoral communities
pastoral drylands
Pastoralism
pathogens
Planning in the Contemporary World
Plant physiology
political ecology
political ecology of green space governance
politics
Politics of aspiration
population growth
power
power asymmetries and inequalities
power structures
practices of future making
progressive masculinities
protests against police violence
radical change
rainforest species
rainforests
Renewable energy
research grant
research grants for female researchers
research on the COVID-19 pandemic
Roads
Romie Vonkie Nghitevelekwa
ruination
rural development
Rural Development in Kenya
Rural transformation
SAGCOT
Scenario analysis
Scientific North-South partnerships
Securing land rights
security of tenure
seeds and fertilizers
social-ecological system
Spatial Imaginaries
statistical software "R"
Strategic Coupling
structural discrimination
Sub-Saharan African countries
supply of farming implements
SWAT model
Tanzania
Tanzania's agriculture
Tanzania’s agrarian future
Tanzania’s fertilizer sector
temporalization of planning
The commodification of wildlife
tourism and agricultural sectors
tourism value chain
Transformation
transmission
trophy hunting
Uncertainty
urbanization
vaccine development
value chains
value to land
violence and conflict
Virologist
virus carriers
viruses
white colonial gaze
wildlife conservation
willingness to pay for a prospective COVID-19 vaccine
youth bulge
All
Administrator
Andrea Steinküller
Claudia Gebauer
Jan Koch
Julian Richlitz
Klagge
Liana Kindermann
Matian van Soest
Michael Witte
Steinkueller
Tracy Kariuki
April 16, 2021
Megaprojects—mega failures? The politics of aspiration
Megaprojects are returning to play a key role in the transformation of rural Africa, despite controversies over their outcome. While some view them as promising tools
[…]
Do you like it?
0
Read more
April 13, 2021
Livelihoods, land disputes, and anticipation in rural Kenya
This article examines how rural roads relate to differences in livelihood patterns, attitudes toward social change, and land disputes in Baringo, Kenya. Although their direct use
[…]
Do you like it?
0
Read more
April 7, 2021
Export horticulture and labour migration in Kenya
Based on a study of globalized export horticulture at Lake Naivasha, Kenya, this paper explores urban development at the intersections of foreign capital investments and translocal
[…]
Do you like it?
0
Read more
April 6, 2021
Female researcher’s grant 2021: Call for applications
The aim of the grant is to promote female researchers at all stages of their careers. Support is given to creative scientific ideas that fit the
[…]
Do you like it? | https://www.crc228.de/category/kenya/ |
We are in search of a Registered Nurse to render and promote cost effective, safe, quality patient care in accordance with hospital standards and policies.
The team member will further be responsible for assessing, planning, executing and supervising the implementation of care to meet patient needs.
A Registered Nurse is a role model in the delivery of evidence-based care.
This role will actively participate in Clinical Governance.
The team member will be responsible for direct and/or indirect nursing care of a patient or groups of patients.
The team member will perform nursing duties in accordance with the South African Nursing Council (SANC), Department of Health (DOH) and National Core standards.
Future Role Breakdown:
- Be active in preparing, controlling and replenishment of stock, of the recovery room and for the procedure list of the day.
- Support the patient on their arrival into the recovery unit.
- Monitor a patient’s physiological parameters.
- Provide appropriate treatment until the patient has recovered from the effects of the anaesthesia and/or surgery.
- Evaluate the care given during each phase.
- Contributes to the holistic care of patients.
- Effective communication with patients regarding their care.
- The promotion of health and wellbeing.
- Promote and maintain good public relations with patients, relatives and visitors.
- Provide and supervise the delivery of evidence-based nursing care.
- Ensure that all patients have an appropriate nursing care plan.
- Check that all equipment that may be required is at hand and ready to use.
- Check emergency resuscitation drugs and record.
- Compliance with documentation policy.
- Ensure that all documentation is maintained accurately and timeously reflecting recovery room procedures and care.
- Ongoing audit of health records to ensure compliance.
- Ensure all stock is well controlled and managed, charged and credited appropriately.
- Maintain a therapeutic, clean and safe environment that is free from medico-legal hazards.
- Maintain a safe working environment in accordance with the Machinery and Occupational Safety Act.
- Reports and acts upon potential/actual risks identified.
- Maintain patient privacy and confidentiality at all times.
- Assume responsibility for own personal and professional development.
- Assume responsibility for maintaining competence in CPR (BLS/ ACLS).
- Project a positive professional image
- Promotes and maintains good working and interpersonal relationships with management, colleagues and doctors.
- Mentoring and supervision of junior healthcare providers and support staff.
Registered Nurse – Recovery Job Vacancy at Stethoscope SA
Requirements
- Grade 12 or equivalent NQF level 4 qualification.
- Diploma in General Nursing.
- Current registration with South African Nursing Council (SANC)
- Minimum of 5 years as an experience as a Registered Nurse.
- Post-operative and surgical experience.
- Skilled in all basic nursing procedures as well as procedures specific to the operating theatre environment.
- Strong knowledge of surgical procedures and patient safety.
- Knowledge of Infection Control & Prevention.
- Problem-solving, analysis and judgement.
- Resilience.
- Analytical thinking, problem solving and judgement ability.
- Customer responsiveness.
- Effective Risk prevention management.
- Empathic and sensitive.
- Flexible and adaptable.
- Ability to communicate, be a skilled listener and a keen observer.
- Professional flexibility in working hours while supporting daily business hours. | https://www.sagewap.com/2022/07/job-opportunity-at-stethoscope-sa.html |
Farm of Hope International School (FOHIS) seeks reliable, trustworthy, and innovative teachers to join our model school. The teacher’s responsibilities include creating lesson plans and curricula focused on developing social, physical, intellectual, and emotional skills, assessing children’s individual needs, and communicating with parents as required. You should be able to create a nurturing, stimulating classroom where every child feels included. To be successful as a teacher, you should be a lifelong learner who inspires a love for learning in your students. Outstanding candidates are able to accept failure, learn from their mistakes, and embrace creativity and independence.
- Minimum Qualification: Degree
- Experience Level: Senior level
- Experience Length: 3 years
Job Description/Requirements
Responsibilities
- Observing, guiding, supervising, and assessing children while they learn in the classroom environment.
- Developing lesson plans, independent learning exercises, curricula, and methods that cater to the needs of the individual child
- Creating and maintaining a safe, clean, stimulating classroom where all children feel safe and valued.
- Establishing rapport and building relationships with students based on trust.
- Setting an excellent example for students and instilling good values in them like honesty, accountability, understanding, tolerance, respect, love, and kindness.
- Monitoring and assessing student progress and writing up reports.
- Ensuring classroom supplies and equipment are available and in working condition.
- Updating records on the school database and handling various other administrative tasks.
- Participating in school activities and accompanying students on field trips.
- Interviewing and assisting with the training of all new teachers.
Qualification and Requirements
- Bachelor’s degree in early childhood teaching, education, or a related discipline is recommended
- At least 3 - 5 years experience
- Completed training at an accredited Ghana Education Service (GES) teaching course.
- Additional courses or training in education would be advantageous.
- Passionate about alternative education.
- An ability to teach groups of children of varying ages, needs, and abilities.
- Patience and excellent observational, communication, and diagnostic skills.
- The ability to multitask, keep calm under pressure, and treat everyone with love and respect.
- Excellent planning and organisational skills.
- A lifelong learner who can be a good role model for children.
- The application deadline is December 8th, 2021
Salary: Competitive salary, commensurate with experience, and comprehensive benefits package. | https://www.jobberman.com.gh/listings/teacher-992z6w |
How to Help Students Troubleshoot Technology Problems
Teaching students the basics of solving problems with tablets and laptops can empower them when things go wrong.
Technology has been the best thing and the worst thing when it comes to making remote learning work. It’s been a lifeline for connecting with our students during the pandemic, but it also can be a big headache when glitches pop up.
Sometimes, it feels like troubleshooting problems with technology is a job of its own. Students may ask for assistance when things go wrong, and it helps to have a process or steps to guide them. It’s also important that we empower our students to solve technical problems independently. One resource that I love to share with students and colleagues is this Edpuzzle troubleshooting article.
When I was in the classroom as a middle school teacher of Intro to Computer Science and Principles of Information Technology, I would begin the year with the Code.org Problem Solving Process lesson. I would tell my students that before we touched the computers or created programs, it was important that they understand how to solve or debug technology since they would be using it on a daily basis. We would go through a series of activities the first two weeks of school so that they would feel comfortable with the process, and then I would help them practice the process whenever issues arose throughout the year.
The problem-solving process has four steps: define, prepare, try, and reflect. As a digital learning coach, I have been using these steps in a similar way as I help students and my colleagues find solutions to their technology problems. The case study below will take you through how your students can use this process. It will also provide insight that may help in your own classroom.
Case Study
Recently, I went through this process with a student who was having Chromebook issues. The student and I met through Google Meet. Clearly, her device was working, but she was unable to search for anything. I had never seen this problem. I was honest with the student that even though I didn’t have the answer, we would work to figure out something. We didn’t have a Chromebook to exchange out, so it was important to troubleshoot.
The first time we went through the cycle together, I asked the student to clear her cookies and restart the device. That didn’t resolve the issue. Then I got permission to go into her device remotely using Chrome Remote Desktop. I was able to take over the student’s device using this free software. Checking her settings and playing around with her search features didn’t solve anything. As we worked together, we took notes on what we were seeing.
Then I checked her Chrome extensions and discovered an extension that needed to be removed to solve the problem. The student said, “We spent all that time on one little extension.” I chuckled and said, “Yeah, but we got it.” Then the student said, “I learned a lot, though, and now I know what to do in the future.” I thanked her for her patience because I had learned right along with her. As educators, we may not have the answers to students’ questions about technology, but trying to solve them together will help our students learn how to do it, too.
The Problem-Solving Process
The first step is to define the problem. This will require many questions to be asked and answered about what’s occurring, especially if you seek help. When seeking help, the more details or visuals you can provide to the other person, the better. I have seen some teachers create videos using Screencastify, Loom, or Flipgrid to showcase what’s happening on their computers. This is a very good way to share information with someone who’s trying to help you.
The second step is to prepare, and the third step is to try to solve the problem. These steps require research and speaking to those you trust to help you troubleshoot. On my campus, I ask the teachers and students to always clear cookies and restart their devices as a habit. Clearing your cookies and restarting or updating your device will help avoid technical issues. Some Chrome extensions can create unexpected problems, so removing extensions that are not added by your technology department will help.
The last step is to reflect. It’s important to note what occurred should this happen again. Creating troubleshooting videos and/or guides to assist your school community is helpful. If someone on your campus is designated to do this, speak with them about how you can access these resources. Through my position, I encourage teachers to share the videos I create with their students and their student’s parents.
There will be times that you cycle through the process more than once until you find a solution, but it’s important you don’t give up. Asking for help is part of the preparation step. It’s important to reach out to colleagues and work together as everyone is learning how to troubleshoot technology together. | http://www.4education.org/2021/03/05/how-to-help-students-troubleshoot-technology-problems/ |
How much does a Enterprise Systems Administrator make in the United States?
Install, configure, and support an organization’s local area network (LAN), wide area network (WAN), and Internet systems or a segment of a network system. Monitor network to ensure network availability to all system users and may perform necessary maintenance to support network availability. May monitor and test Web site performance to ensure Web sites operate correctly and without interruption. May assist in network modeling, analysis, planning, and coordination between network and data communications hardware and software. May supervise computer user support specialists and computer network support specialists. May administer network security measures. Excludes “Information Security Analysts”(15-1122), “Computer User Support Specialists” (15-1151), and “Computer Network Support Specialists” (15-1152).
The average enterprise systems administrator salary in United States is $140,635 or an equivalent hourly rate of $68. In addition, they earn an average bonus of $8,101. Salary estimates based on salary survey data collected directly from employers and anonymous employees in United States.
An entry level enterprise systems administrator (1-3 years of experience) earns an average salary of $97,145. On the other end, a senior level enterprise systems administrator (8+ years of experience) earns an average salary of $175,262.
Enterprise Systems Administrator, the majority at 80% with bachelors.
Based on our compensation data, the estimated salary potential for Enterprise Systems Administrator will increase 16 % over 5 years. | https://www.salaryexpert.com/salary/job/enterprise-systems-administrator/united-states |
June 1, 2018
The National Safety Council has designated June as National Safety Month, so we want to make sure your ministry is doing everything it can to protect its people, property, and programs. Each week in June, we’ll tackle a different topic. Up this week: Emergency Preparedness.
Preparing your ministry for an emergency is more important than ever in today’s world. Consider whether your ministry has a plan for the following scenarios.
A Natural Disaster
First, prioritize which natural disaster presents the biggest threat to your church. Sitting on the eastern edge of tornado alley, Ohio is ripe for twister activity. The Ohio Committee for Severe Weather Awareness offers facts and safety tips that can help your ministry prepare for a potential twister. Next, ask local experts what to consider when constructing a natural disaster plan. Finally, decide what items to in your emergency inventory.
To assure your church’s preparedness, run through drills with staff and volunteers who will help guide people in case of an emergency, and keep a list of members designated to respond to an emergency.
Medical Emergency
Accidents or medical emergencies during church and ministry activities are not uncommon. Assembling a medical response team and establishing guidelines for dealing with these incidents can help ensure quick and consistent aid for the injured, and can reduce the risk of future legal problems for your church or ministry.
Brotherhood Mutual’s article “Creating a Medical Emergency Response Team” has more helpful information about how to prepare for a medical emergency.
A Violent Attack
Violent attacks at schools and churches are becoming increasingly common. Is your ministry prepared to respond should it become a target? If you don’t have one already, consider putting together a Safety and Security Team for your ministry. Then, equip them with the knowledge skills and practice they need to respond should a violent attack or other safety incident occur.
Brotherhood Mutual’s most recent issue of The Deacon’s Bench expands on this and other topics related to the security of your ministry.
We pray that your ministry never has to face any of these scenarios. By planning ahead, you can help your congregation prepare for the unknown. Check out the Safety and Security page on our website for more helpful resources for your ministry.
Recently, we learned about two major overseas incidents involving pastors on mission trips. The first incident involved a pastor being hit by a motorcycle while running. The second was a bus accident involving two pastors. The runner and one of the two bus passengers sustained extensive injuries.
Last month, the IRS announced that its initiating hundreds of church exams to test compliance with the Affordable Care Act (ACA). While many provisions only apply to churches with 50 or more full-time equivalent employees (FTEs), even smaller churches could potentially violate provisions applicable to health benefit plans with as few as 2 plan participants.
July 4th is synonymous with food, fun, and fireworks. If your church is planning an event this Independence Day, remember to keep a focus on safety, so that everyone can have fun.
National Insurance Awareness Day falls on June 28 this year to remind people everywhere that insurance is vital to their companies and ministries.
Do you use commercial vehicles that transport more than 15 passengers or carry cargo from one state to another as part of your ministry? If so, you are required to register with the Federal Motor Carrier Safety Administration (FMCSA) and obtain a USDOT number.
The Centers for Disease Control says 107 cases of measles have been reported in 21 states since January 1.
The National Safety Council has designated June as National Safety Month, so we want to make sure your ministry is doing everything it can to protect its people, property, and programs. Each week in June, we’ll tackle a different topic. Up this week: Emergency Preparedness.
There’s a new scam in town, and ministries and other organizations collecting donations are the primary target. If your ministry collects tithes or donations, you could be targeted by scammers practicing donation overpayment fraud.
Beloved evangelist Billy Graham was called to his heavenly home on Wednesday, February 21, 2018, at the age of 99.
For the first time in its 13 years of influenza monitoring, the U.S. Centers for Disease Control and Prevention is reporting that every state in the continental U.S. is seeing widespread flu activity. Get tips on how to keep your congregation healthy this flu season.
Snow skiing. Camping. Whitewater rafting. A youth group trip can give students an exciting diversion from their weekly routines, as well as an opportunity to strengthen healthy friendships. Off-site activities may challenge your students to step outside of their comfort zones a bit, but this can bring about a positive result.
If you are in the process of planning a mission trip for your church group, make sure to think carefully about insurance, safety, and security as you hammer out the details. Extra preparation could minimize headaches when your group arrives on the mission field.
Has your church or school ever been asked to loan one of your vans or buses to another? Before you decide to loan your ministry vehicles to another organization, seriously consider the potential risks associated with such a decision.
Completing a personal property inventory of your church or ministry could be one of the wisest activities you can pursue. If disaster strikes and you file an insurance claim, you may need an inventory highlighting damaged items.
Have you thought through potential dangers that may confront your ministry? Taking steps to consider and address these risks provides important protection from injuries, lawsuits, fires, and dozens of other hazards that may affect your ministry, especially your employees and those you serve.
Small businesses—including churches and related ministries—can once again pay premiums for their employees’ health insurance. Previously known as an Employer Payment Plan (EPP) or Health Reimbursement Account (HRA), these arrangements violated the Affordable Care Act (ACA). However, due to a recently passed law, ministries that are not part of a group health plan now have another option to help employees with health care costs.
Ministries beware: An email scheme, designed to coincide with tax season, asks payroll and human resource professionals to disclose employees’ personal information. Think you wouldn’t fall for such a scam? You might, if the email looks as if it came from someone in your ministry.
Under federal law, most ministers have dual tax status. Dual tax status means a minister is an employee of the church for federal income tax purposes, and self-employed for Social Security and Medicare taxes. Here’s what you need to know.
Lawsuits against churches and ministries are on the rise, making their board members especially vulnerable. Sometimes, courts have found directors and officers personally liable when their actions have resulted in financial damages.
Incorporation takes the weight of responsibility off the shoulders of individuals and instead, places it on the organization. In contrast, a court may find all members of an unincorporated church legally responsible for negligent or criminal actions committed by one church member. | https://www.americanchurchgroup-ohio.com/ministry-resources/blog/june-is-national-safety-month-week-one-emergency-preparedness/ |
How has the University of California contributed to the state's growth, health, economic mobility, and gender/ethnic equity over the past 150 years, and what is its role today?
2018 is the sesquicentennial of the University of California. To celebrate this milestone, UC Berkeley’s Center for Studies in Higher Education has partnered with the UC Office of the President to create the UC ClioMetric History Project, a massive data repository documenting the university system’s history. On this website, you’ll find interactive displays visualizing 150 years of UC’s students, faculty, courses, and budgets, along with comparative data for private California universities and both topic briefs and academic studies analyzing higher education in California.
For academics interested in pursuing similar research, you’ll also find extensive previously-unavailable databases describing university life, including more than 100 years of faculty directories, course descriptions, and budgetary records as well as decades of student registers. These records have been prepared for statistical analysis using fOCR, a new text-processing protocol described in our introductory paper.
Want to see California universities’ expansion of engineering in the 1950s and ’60s, or the similar rise of UC’s Ethnic Studies departments a decade later? Interested in the surprising number of female doctors being trained at UCSF in 1900, or the extraordinary geographic diversity of UC’s students in the first decades of the 20th century? Take a look at our newest interactive graphics below, or explore the site on your own!
If you want to read these or other UC-CHP studies, visit our Reports page!
We are collecting a comprehensive database of students, professors, courses, and budgets from UC and other California universities by digitizing directories, course catalogs, student transcripts, and other administrative documents--and we're making as much as possible publicly-available.
Using interactive dashboards and static diagrams, we are visualizing more than 100 years of UC students: from their home towns and demographic characteristics to their socioeconomic background, schooling choices (like course and major selection), and alumni outcomes.
Wondering how the long-run decline in state appropriations has effected UC students? Interested in UC's contributions to education and healthcare over the past century? Our data-driven analysis is meant to provide an assortment of windows into the UC's role as California's--and the country's--premier public university system.
Studies of higher education in the United States have long been limited by historical data availability and minimal centralized data collection, and many historical records are deprecated and nearing disposal. The University of California ClioMetric History Project (UC-CHP) extends prior analysis in two ways: (1) by digitizing thousands of volumes of historical registers and catalogs and extracting millions of individual administrative records, and (2) by coordinating with university Registrars and other offices to digitize hundreds of thousands of historical student transcripts, constructing a database of restricted student records for academic and institutional research.
The University of California’s sesquicentennial, 150 years after its founding in 1868, provides an additional catalyst to preserve, analyze, and publicize California universities’ long-run contribution to the state’s growth, health, economic mobility, and gender/ethnic equity.
The UC-CHP database currently includes directory records for all UC, Stanford, CalTech, and Mills College students (1893-1946), UC and Stanford faculty and courses (1900-2011), detailed annual UC budgets (1911-2012), and digitized student transcripts for UC San Francisco (1947-2017). Student transcript records are currently being digitized for UC Santa Cruz (1965-2017) and Berkeley (1951-2017).
The UC-CHP project is directed by Zach Bleemer, an economist and CSHE Research Associate at UC Berkeley, and is currently housed at UC Berkeley’s Center for Studies in Higher Education (with principal investigator John Douglass) in partnership with the UC Office of the President. | http://uccliometric.org/ |
|Warning!
|
At least some content in this article is derived from information featured in Harry Potter: Hogwarts Mystery. Spoilers will be present within the article.
- "Mimblewimble, which prevents your opponent from accurately casting their next spell."
- —Gilderoy Lockhart on the usefulness of a Tongue-Tying Curse in a duel[src]
The Tongue-Tying Curse (Mimblewimble), also known as the Tongue-Tying Spell, is a curse that ties the target's tongue in a knot, preventing them from making coherent speech. This feature also allows one to prevent the victim from speaking the incantations of spells correctly, and hence—like the Silencing Charm—it is useful in duelling (though can be overcome with more advanced magic). It is covered in the book Curses and Counter-Curses, authored by Professor Vindictus Viridian.
History
During the 1988–1989 school year at Hogwarts School of Witchcraft and Wizardry, Professor Patricia Rakepick taught this curse to her fifth year Defence Against the Dark Arts students.
In 1992, this spell was taught by Gilderoy Lockhart during the Duelling Club to help students to better defend themselves.
In 1997, Alastor Moody set up several curses to protect the Order of the Phoenix headquarters at 12 Grimmauld Place. One of these curses was this spell. It was so placed to prevent Severus Snape from revealing the area's location to Lord Voldemort, as the properties of the Fidelius Charm protecting the house made Snape a Secret-Keeper when Albus Dumbledore died. The curse was intended to both "keep him out and bind his tongue if he tried to talk about the place." It is unknown what would occur if Snape tried to write the location on paper, which would also have passed on the secret of the house's location.
Harry Potter, Ron Weasley, and Hermione Granger were affected by this curse when they sought refuge at 12 Grimmauld Place after fleeing Death Eaters in 1997. A sensation of cold air whooshed over them, causing their tongues to curl backwards, making it impossible for them to speak. Though their tongues soon unravelled again, Ron made retching noises and Hermione stammered for a while afterwards.
Known practitioners
Behind the scenes
- In Harry Potter and the Philosopher's Stone, when Rubeus Hagrid found out that Harry Potter had been told nothing of the wizarding world, he angrily rounded on the Dursleys, at which point Harry heard his Uncle Vernon whisper "something that sounded like 'Mimblewimble'".
- A similar spell is Langlock, a jinx invented by Severus Snape that glues the offender's tongue to the roof of their mouth. | https://harrypotter.fandom.com/wiki/Tongue-Tying_Curse?file=Tongue-tying-curse.png |
Banking Supervision published the Capital Adequacy Accord, also known as the Basel Accord, in 1988.
The Basel Accord defined the parameters of risk management and capital adequacy for Financial Service Providers.
With its new risk-sensitive framework, Basel II aimed to fill the gaps left uncovered by its predecessor.
Under the committee’s request, financial institutions would integrate Basel II in their operations by year-end 2018.
will be comply with Basel II regulations.
This white paper discusses the framework and impact of Basel II in financial organizations and highlights the role of an IT services provider in a successful Basel II implementation.
As a result, banking institutions and investment firms felt the need to improve their measures for security and risk management across their enterprise, which led to the Basel Accord being signed in 1988.
This resulted in an inflexible system and, ultimately, increased the risk for financial institutions.
management, efficient operations, and higher revenues to the banking community.
This spreading adoption indicates global acceptance in the near future as well as a precedent of accord implementation at banks across the world.
As a result, many countries have already started work on draft rules that would integrate Basel capital standards with their national capital regimes.
It will therefore undergo rigorous revisions before its framework is finally solidified for implementation.
It defines the current amount of capital and the minimum capital requirement allocated for risk-weighted assets.
The capital charge is equal to 8% of the asset value.
The results, attained by this process, are translated into estimates of a potential future loss, thereby defining the basis of minimum capital requirements.
Additional risk factors are standardized by supervisory rules set and monitored by regulating authorities.
It also allows banks to provide guarantees and credit derivatives on the risk of exposure.
The ranges of risks in both these methodologies are more diverse than in the standardized approach, resulting in greater risk sensitivity.
In fact, many major banks now allocate 20% of their internal capital to operational risk.
The capital charge is calculated as a fixed percentage of this parameter, defined as the ‘Alpha Factor’.
a percentage of capital charge, known as the ‘Beta Factor’, is defined for each business line.
The total capital charge for the bank is calculated as the sum total of all capital charges for individual business lines.
include an operational risk indicator, data indicating the probability of a loss event, and the losses incurred in the eventuality that these events took place.
This is done so that an assessment of the bank’s capital adequacy in relation to its risks can be made.
The supervising authority will also be responsible for reviewing operations and processes in trading, Internet banking and security processing.
This increased level of interaction enhances the level of transparency within the organization.
This, in turn, helps achieve higher returns with lower risks.
This strategy plays an important role in maintaining confidence in a financial institution.
These include the scope of application, composition of capital, risk exposure assessment and management processes, and capital adequacy.
Basel II is designed to overcome the drawbacks of the earlier accord and once achievement of its set targets is complete implementation by banks and financial organizations worldwide will be mandated.
a high possibility of the earlier accord being replaced by Basel II in the other countries also exists.
It will also apply to all the parent and subsidiary companies of banking groups.
Organizations will be required to adopt the implementation of the accord’s requirements to maintain consistency across the board.
Incorporating this accord will result in establishing a more competitive and safer banking system.
Many financial institutions that provide services such as credit cards and equities will allow for global rationalization and concentration of processing volume with third parties.
It will also affect the securitization of risk.
When implemented, Basel II will lead to a restructuring of costs and prices for all financial services.
It would increase unless the bank adopts the more sophisticated approaches for measuring credit and operational risks.
Basel II is also considered a key driver of IT spending by the financial industry.
Its comprehensive and vigorous architecture will ensure data integrity.
Since Basel II requires raw and enriched data from multiple systems, the scale and complexity of data becomes enormous.
Since operational risk is a new element in Basel II, the systems will have to design and develop their approaches to measure it in their organizations.
Ensuring accuracy and easy availability of information can enhance the performance levels of both real time and batch processes.
The secure and enhanced performance of these processes ultimately leads to higher returns with fewer losses.
In striving to meet these challenges, financial institutions rely heavily on IT service providers.
Selective outsourcing and the establishment of joint ventures with IT service providers help organizations reduce costs across the board.
They can enhance an organization’s financial status and eventually lead to greater flexibility.
This results in collective product offerings, a multi-channel service experience and improved distribution strategies.
This shifts the focus from the development of external e-channels to the creation of an eenabled organizational environment, while also establishing a platform for process improvement.
It aims to offer world-class services in all functional areas, such as consumer and corporate banking, card business solutions, and capital markets.
We also offer risk management models, creation of proper data models for risk compliance and the facilitation of enterprise data alignment.
Keeping these needs in mind, Patni also provides services for IT outsourcing and systems architecture while ensuring security and compliance with new regulations.
This team will also provide an interface between banks and implementation teams in India.
foreign international online and batch overnight systems were also supported.
This included gap analysis, impact assessment, enhancements to bridge the systems, and reengineering and scaling.
Patni provided expertise in all functional areas of the bank such as currency management and operational accounting, helping reduce the risks involved in the operation and establish various banking solutions for implementing Basel II successfully.
It also ensured security in banking transactions and provided interactive customer support to those who needed help in operating their accounts.
Basel II emphasizes more on banking components such as internal control and management, supervisory process, and the market discipline of financial institutions.
Financial institutions worldwide are expected to implement it by the end of 2018.
For this, common definitions and reporting structures will be implemented and information must be integrated to comply with the new Basel II standards.
IT service providers therefore not only provide a variety of services that help financial systems in implementing Basel II, but also empower financial institutes with a competitive advantage. | https://www.zido.gq/2018/02/basel-ii-implications-for-financial.html |
Story of friendship as prerequisite for healthy life
Story of friendship as prerequisite for healthy life.
January. 08, 2022 08:00.
by Ji-Hoon Lee [email protected].
You may have more than a thousand followers on social media but how many of them would you want to have a sweet talk with even for a brief time when you bump into them at the airport? Professor Robin Dunbar at Oxford University, the author of this book, argues that you may say 150 friends or so at the most. He suggests Dunbar’s number (150 individuals) to explain a notion that people have a cognitive limit to the number of friends with which they can maintain a relationship. He has studied monkeys, small wildebeests and wild goats as an ethologist and immersed himself in the topic of human evolution in sociality as an evolutionary anthropologist for 25 years.
Based on his research on how humans and animals have evolved, Professor Dunbar questions a social act of human individuals – making friends. According to him, it takes money and resources to make friends but they make little difference in increasing likelihood of survival with no obvious financial returns guaranteed. To some sense, connecting with friends runs against the perspective that all animals including humans seek to build an optimized environment for reproduction and survival. Nevertheless, people depend emotionally on their friends spending their time and money. Professor Dunbar goes through a wide range of studies published across the globe for the recent two decades to ponder upon “friends and friendship,” which may sound like a less scientific topic. His research concludes that those successful in making friends are superior species to the rest in that they live a longer and healthier life.
Those with no friends around them feel a sense of solitude as if they were left alone on the planet. The author focuses on risks arising from such a deep sense of loneliness because it can lead not only to mental illnesses such as depression but also to physical conditions. Those overwhelmed by a sense of solitude fail to get their immune system upgraded even after vaccinated, according to a study shared by the author. Teenagers are more likely to have higher inflammation levels and gain more weight if they are less social. Senior citizens are prone to high blood pressure when they live alone. In summary, humans have tried to forge and maintain relationships to the fullest of their ability to prevent themselves from being fragile mentally and physically.
If it is the case, you may think that humans may lead a healthier life than before as the globe is more wired than ever before to make it an easy job to make friends online. However, the author gives you a no. It may be an economically efficient act to be friends by following others and liking their posts with only a few clicks but it does not ensure all benefits that your true friends and friendships may give you. Humans can feel a sense of friendship and relieve a feeling of loneliness from the bottom of their hearts only when they spend sufficient time and effort on maintaining relationships with sincerity. The author emphasizes the significance of physical meetups with friends if you want to keep your relationships because all digital media do in social networking is merely slow down the process of drifting apart gradually.
You may have more than a thousand followers on social media but how many of them would you want to have a sweet talk with even for a brief time when you bump into them at the airport? Professor Robin Dunbar at Oxford University, the author of this book, argues that you may say 150 friends or so at the most. He suggests Dunbar’s number (150 individuals) to explain a notion that people have a cognitive limit to the number of friends with which they can maintain a relationship. He has studied monkeys, small wildebeests and wild goats as an ethologist and immersed himself in the topic of human evolution in sociality as an evolutionary anthropologist for 25 years.
Based on his research on how humans and animals have evolved, Professor Dunbar questions a social act of human individuals – making friends. According to him, it takes money and resources to make friends but they make little difference in increasing likelihood of survival with no obvious financial returns guaranteed. To some sense, connecting with friends runs against the perspective that all animals including humans seek to build an optimized environment for reproduction and survival. Nevertheless, people depend emotionally on their friends spending their time and money. Professor Dunbar goes through a wide range of studies published across the globe for the recent two decades to ponder upon “friends and friendship,” which may sound like a less scientific topic. His research concludes that those successful in making friends are superior species to the rest in that they live a longer and healthier life.
Those with no friends around them feel a sense of solitude as if they were left alone on the planet. The author focuses on risks arising from such a deep sense of loneliness because it can lead not only to mental illnesses such as depression but also to physical conditions. Those overwhelmed by a sense of solitude fail to get their immune system upgraded even after vaccinated, according to a study shared by the author. Teenagers are more likely to have higher inflammation levels and gain more weight if they are less social. Senior citizens are prone to high blood pressure when they live alone. In summary, humans have tried to forge and maintain relationships to the fullest of their ability to prevent themselves from being fragile mentally and physically.
If it is the case, you may think that humans may lead a healthier life than before as the globe is more wired than ever before to make it an easy job to make friends online. However, the author gives you a no. It may be an economically efficient act to be friends by following others and liking their posts with only a few clicks but it does not ensure all benefits that your true friends and friendships may give you. Humans can feel a sense of friendship and relieve a feeling of loneliness from the bottom of their hearts only when they spend sufficient time and effort on maintaining relationships with sincerity. The author emphasizes the significance of physical meetups with friends if you want to keep your relationships because all digital media do in social networking is merely slow down the process of drifting apart gradually. | |
All relevant data are within the paper and its Supporting Information files.
Introduction {#sec001}
============
In city drainage, conveying stormwater, wastewater discharge and other occasions, many water treatment parameters need to be determined according to the stage-discharge relationship \[[@pone.0151578.ref001]\]. Because the circular transmission pipeline is often in a state of partially-filled, the relationship is general determined based on Manning Equation \[[@pone.0151578.ref002], [@pone.0151578.ref003]\]. But more precise relationship requires knowledge of the cross-sectional velocity distribution. Knight et al. \[[@pone.0151578.ref004]--[@pone.0151578.ref006]\] found that the maximum velocity of partially-filled circular pipe occurs axially below the water surface by experimental research, and the velocity distribution near the water surface is mainly influenced by the secondary flows \[[@pone.0151578.ref007]\]. Using a stereoscopic particle image velocimetry system, Yoon et al.\[[@pone.0151578.ref008]\] measured the three-dimensional velocity distribution in partially-filled circular pipe, and the measurement results confirmed the above findings. These studies greatly improved the research of partially-filled pipe flow. However, according to literature search, relatively little work has been shown on the theoretical solutions of partially-filled circular pipe turbulent velocity distribution.
In recent years, based on Shannon entropy\[[@pone.0151578.ref009]\], the theory of entropy develops rapidly, and has been applied in many areas. Some well-studied generalized entropy, such as network entropy, graph entropy \[[@pone.0151578.ref010]--[@pone.0151578.ref013]\] and Tsallis entropy \[[@pone.0151578.ref014]\], can measure the complexity and robust of engineering, These research results provide a very good approach for the research of two-dimensional (2D) velocity distribution in partially-filled pipe flow. Assuming the cumulative distribution function (CDF) is the function of flow depth, Chiu \[[@pone.0151578.ref015]\] derived a 2D velocity distribution formula with Shannon entropy \[[@pone.0151578.ref009]\], which represented the observed data reasonably well in rectangular open channel, and the formula was employed in a series of studies in following years \[[@pone.0151578.ref016]--[@pone.0151578.ref022]\]. Yoon et al. \[[@pone.0151578.ref008]\] proved that the Chiu's method \[[@pone.0151578.ref015]\] is also suitable to partially-filled circular pipe flow through experimental study. However, because Chiu's method \[[@pone.0151578.ref015]\] used too many empirical parameters that have little physical meaning, its practical use is limited. In this paper, the principle of maximum entropy (POME) \[[@pone.0151578.ref023],[@pone.0151578.ref024]\] was used to analyze the flow velocity distribution. Based on POME, Luo and Singh \[[@pone.0151578.ref025]\] derived a 2D velocity distribution expression of rectangular open channels using the Tsallis entropy. Though the approach was either superior or comparable to Chui's method, the application was limited because of a large number of parameters used. Marini et al.\[[@pone.0151578.ref026]\] put forward a new 2D velocity distribution method of rectangular open channels with Shannon entropy, in which a new CFD was hypothesized, and the method shown advantage over Chiu's distribution. Cui and Singh \[[@pone.0151578.ref027]\] proposed another new method for deriving 2D velocity distribution with Tsallis entropy, and the approach can reasonably describe the velocity near the boundary. These methods were all used in rectangular open channels, but these research results proved that it is feasible to analyze the flow velocity distribution by using POME.
The objective of this study is to derive a 2D velocity distribution expression in partially-filled circular pipe based on the principle of maximum entropy, and interpreted the distribution parameters in terms of hydraulic characteristics. The 2D velocity distribution was tested using experimental data.
Methods {#sec002}
=======
Derivation of an entropy-based velocity distribution in partially-filled circular pipe includes (1) comparison and selection of entropy, (2) definition of the non-extensive Tsallis wavelet entropy, (3) probability distribution model based on POME, (4) hypothesizing CDF function in the 2D case, (5) 2D velocity distribution, (6) location of maximum velocity, (7) experimental measurement
Comparison and Selection of Entropy {#sec003}
-----------------------------------
For arbitrary uncertain systems, let *X* as a random variable to represent the system state features, and *p*~*i*~(*i* = 1,2,...,*N*) as its probability distribution function (PDF). Then, the Shannon entropy \[[@pone.0151578.ref009]\] of *X* is defined as $$S_{BG} = - k{\sum_{i = 1}^{W}{\lbrack p(i)\text{ln}\, p(i)}}\rbrack$$
In which *k* = Boltzmann constant, *W* = the total number of samples. Since the Shannon entropy is built on the basis of thermodynamic Boltzmann-Gibbs (B-G) entropy \[[@pone.0151578.ref009]\], and B-G entropy belongs to extensive entropy. Then, for two independent subsystems *A* and *B* of the system, the Shannon entropy has the following characteristics \[[@pone.0151578.ref028]\]: $$S_{BG}(A + B) = S_{BG}(A) + S_{BG}(B)$$
That is, Shannon entropy has additivity. In partially-filled circular pipe laminar flow, the total velocity information can be regard as the sum of the information contained in each part of fluid. However, in partially-filled pipe turbulent flow, existing secondary currents phenomenon, energy aliasing, and random interaction of the fluid motion etc, the total information of each part fluid is not completely equal to the measured signal. So the application of Shannon entropy is limited in turbulent flow.
Tsallis proposed a generalized form of entropy \[[@pone.0151578.ref014]\], which can be written in discrete form as $$S_{q} = k\frac{1 - {\sum_{i = 1}^{W}{p(i}})^{q}}{q - 1}\mspace{32mu} q \in R_{n}$$ where *q* = non-extensive parameter, used to describe the extensive degree of the system, *q* \< 1 and *q* \> 1 represent the super-extensive and sub-extensive characteristics of the system respectively\[[@pone.0151578.ref028],[@pone.0151578.ref029]\]. Then, for two independent subsystems *A* and *B* of the system, the Tsallis entropy has the following characteristic $$S_{q}(A + B) = S_{q}(A) + S_{q}(B) + (1 - q)S_{q}(A)S_{q}(B)$$
Different system can choose different non-extensive parameter to calculate the entropy. When *q* → 1, it's immediately verified that $$\underset{\text{q}\rightarrow 1}{\text{lim}}S_{q} = k\underset{q\rightarrow 1}{\text{lim}}\frac{1 - {\sum_{i = 1}^{W}{p(i}})^{q}}{q - 1} = - k{\sum_{i = 1}^{W}{p(i)\text{ln}\, p(i}})) = S_{BG}$$
The above analysis shows that the Tsallis entropy is the generalized form of Shannon entropy, which can describe the system with extensive and non-extensive properties. Therefore, the non-extensive Tsallis entropy was used to measure the velocity information in this study.
Non-extensive Tsallis Wavelet Entropy {#sec004}
-------------------------------------
Let *W*~*f*~ = {*d(n)*, *n* = 1,2,...,*N*} represent the set of discrete wavelet coefficients of flow velocity *v*(*t*), and *d* is the wavelet coefficients component, and *N* is the total sampling points. Defined a sliding data window inside wavelet coefficients set, in which *w*~*b*~ ∈ *N* is the window width, and *s* ∈ *N* is the sliding step, then the data window can be expressed as $$Y(m;w_{b},s) = \left\{ {d(n),n = 1 + ms,2 + ms,\ldots,w_{b} + ms} \right\}$$
Where *m* = 0,1,2,...,(*N* − *w*~*b*~)/ *s*. Assuming that $v_{k}(m) = {\sum_{i = 1}^{M_{w}}{v_{km}(i)}}$ is the sum of flow velocity within the data window *Y*, in which *M*~*w*~ is the wavelet coefficient scale, and $v_{km}(i) = {\sum_{n = 1 + ms}^{w_{\text{b}} + ms}{(d_{i}(n))}^{2}}$. Let *p*~*m*~(*i*) = *v*~*km*~(*i*)/*v*~*k*~(*m*), and the condition $\sum_{i = 1}^{M_{w}}{p_{m}(i) = 1}$. Then at the center of the data window, the non-extensive Tsallis wavelet entropy can be expressed as $$S_{ve}(m) = \frac{1 - {\sum_{i = 1}^{M_{w}}{(p_{m}(i))}^{q}}}{q - 1}\mspace{32mu} q \in R_{n}$$ where *q* represents non-extensive parameter, *R*~*n*~ is real number. Eq **[7](#pone.0151578.e010){ref-type="disp-formula"}** can be expressed in continuous form as $$S_{ve}(m) = \frac{1 - {\int_{v_{\text{min}}}^{v_{\text{max}}}{{\lbrack p_{m}(v)\rbrack}^{q}dv}}}{q - 1}\mspace{32mu} q \in R_{n}$$ where *v*~min~, *v*~max~ is the minimum and maximum value of velocity within the data window separately, and *p*~*m*~(*v*) is the PDF of velocity at any scale, and ∫*p*~*m*~(*v*)*dv* = 1. Because the flow velocity *v* is zero in pipe wall, the Tsallis wavelet entropy at the whole pipe cross section can be expressed as $$S_{ve} = \frac{1 - {\int_{0}^{v_{\text{max}}}{{\lbrack p(v)\rbrack}^{q}dv}}}{q - 1}\mspace{32mu} q \in R_{n}$$ where *v*~max~ is the maximum value of *v*(*t*) in pipe cross section, usually below the water surface. The format of [Eq 9](#pone.0151578.e012){ref-type="disp-formula"} is similar to Tsallis entropy, but [Eq 9](#pone.0151578.e012){ref-type="disp-formula"} is to calculate the wavelet coefficient entropy of flow velocity *v*(*t*), and the wavelet coefficient reflects the velocity distribution of the flow rate signal within the data window, so the Tsallis wavelet entropy reflects the velocity distribution on the cross section of the pipeline.
Probability Distribution Model based on the POME {#sec005}
------------------------------------------------
The information of partially-filled circular pipe flow characteristics should be obtained to apply the POME, and the velocity information can be obtained through the knowledge of fluid mechanics and observations. Chiu \[[@pone.0151578.ref015]\] and Barbé et al. \[[@pone.0151578.ref030]\] found that the velocity distribution can be derived only with mass conservation. Then the constraints of density function *p*(*v*) are expressed as \[[@pone.0151578.ref015],[@pone.0151578.ref025]--[@pone.0151578.ref027]\] $$\int_{0}^{v_{\text{max}}}{p(v)dv = 1}$$ $$\text{and}\mspace{9mu}{\int_{0}^{v_{\text{max}}}{vf(v)dv = \overline{v}}}$$ where $\overline{v}$ is the cross-sectional mean velocity. [Eq 10](#pone.0151578.e013){ref-type="disp-formula"} is the constraint of total probability, and the [Eq 11](#pone.0151578.e014){ref-type="disp-formula"} is the constraint of mass conservation. In order to derive *p*(*v*), the entropy *S*~*ve*~ must be maximized in accordance with the POME, subject to Eqs [10](#pone.0151578.e013){ref-type="disp-formula"} and [11](#pone.0151578.e014){ref-type="disp-formula"}. Then the lagrangian function *G* can be expressed as $$G = \frac{1}{q - 1}\lbrack 1 - {\int_{0}^{v_{\text{max}}}{f{(v)}^{q}dv}}\rbrack + \lambda_{1}\lbrack{\int_{0}^{v_{\text{max}}}{p(v)dv - 1}}\rbrack + \lambda_{2}\lbrack{\int_{0}^{v_{\text{max}}}{vp(v)dv - \overline{v}}}\rbrack$$ where *λ*~1~ and *λ*~2~ are Lagrange multipliers. Differentiating [Eq 12](#pone.0151578.e016){ref-type="disp-formula"} with respect to *p*(*v*), results in $$\frac{\partial G}{\partial p(v)} = \frac{\partial}{\partial p(v)}\left\{ {\frac{1}{q - 1}\lbrack 1 - {\int_{0}^{v_{\text{max}}}{p{(v)}^{q}dv}}\rbrack + \lambda_{1}\lbrack{\int_{0}^{v_{\text{max}}}{p(v)dv - 1}}\rbrack + \lambda_{2}\lbrack{\int_{0}^{v_{\text{max}}}{vp(v)dv - \overline{v}}}\rbrack} \right\}$$
In accordance with the POME, the derivative is zero, this meaning that ∂*G*/∂*p*(*v*) = 0, which results in the expression of *p*(*v*) as $$p(v) = \left\lbrack {\frac{1}{q}(1 - \lambda_{1} - \lambda_{2}v) + \lambda_{1} + \lambda_{2}v} \right\rbrack^{1/(q - 1)}$$
Substitution of [Eq 14](#pone.0151578.e018){ref-type="disp-formula"} in Eqs [10](#pone.0151578.e013){ref-type="disp-formula"} and [11](#pone.0151578.e014){ref-type="disp-formula"} gives the following equations about Lagrange multipliers *λ*~1~ and *λ*~2~ $$\left\lbrack {\frac{1}{q}(1 - \lambda_{1} - \lambda_{2}v_{\text{max}}) + \lambda_{1} + \lambda_{2}v_{\text{max}}} \right\rbrack^{q/(q - 1)} = \lambda_{2} + \left( {\frac{1}{q} - \frac{\lambda_{1}}{q} + \lambda_{1}} \right)^{q/(q - 1)}$$ $$\int_{0}^{v_{\text{max}}}{v\left\lbrack {\frac{1}{q}(1 - \lambda_{1} - \lambda_{2}v) + \lambda_{1} + \lambda_{2}v} \right\rbrack^{1/(q - 1)}dv = \overline{v}}$$
If the values of non-extensive parameter *q*, *v*~max~ and $\overline{v}$ were given, the value of Lagrange multiplier can obtained by solving Eqs [15](#pone.0151578.e019){ref-type="disp-formula"} and [16](#pone.0151578.e020){ref-type="disp-formula"}. But the solving process is complex, and there is no direct analytical solution.
The Cumulative Distribution Function {#sec006}
------------------------------------
The CDF was used to establish the relationship between the space domain and the entropy-based probability distribution function in this paper, so CDF must be able to reflect the geometry of the partially-filled circular pipeline and some important characteristics of velocity distribution. Then the CDF must have the following characteristics: (1) continuous and differentiable, (2) defined between 0 and 1, (3) its value on the pipe wall must be 0, and it reaches 1 at the position of *v*~max~, (4) in the vertical axis of the center line, the CDF is a monotonically increasing function from 0 to *v*~max~, and (5) the same as to any vertical axis of the pipe cross-section.
An idealized partially-filled circular pipeline channel is shown in [Fig 1](#pone.0151578.g001){ref-type="fig"}, in which *R* is the radius, and *H* is the water depth, and *h*(0 ≤ *h* \< *H*) is the distance from the position of *v*~max~ to the bottom of pipe. A rectangular coordinate system is set in this way such that the coordinate origin represents the bottom of the circular tube, and *x* presents the transverse distance from the centerline, and *y* presents the vertical depth from *x* axis upward positive, and (*x*, *y*) is a random point inside the pipe.
{#pone.0151578.g001}
A CDF should be based on available experimental data and similar relationship in the velocity distribution, so that suitable parameters appear in the final equation depending on *x*, *y* and *R*. The derivation of the CDF involves the following three steps.
The front three characteristics should be first considered. Because the velocity is assumed to zero at the boundary, the corresponding CDF also should be zero, and the simplest equation satisfying the properties(1), (2) and (3) as the parabolic equation $$F_{1}(v) = 1 - \left( \frac{x}{R} \right)^{2} - \left( {\frac{y}{R} - 1} \right)^{2}$$
At the position of maximum flow velocity, *y* = *h*, which is assumed to occur at the axis passing through the center of water surface, the corresponding CDF *F*~1~(*v*) = 1, then the CDF can be expressed as $$F_{1}(v) = \left\lbrack {1 - \left( {\frac{y}{h} - 1} \right)^{2L}} \right\rbrack^{K}\left\lbrack {1 - \left( \frac{x}{R} \right)^{D/H}} \right\rbrack$$ where *D* is the diameter of the pipeline, when *y* ≤ *h*, *L* = 1 and *K* = 1, while when *y* \> *h*, *L* = 2*h* / *H* and *K* = 2(*H* − *h*) / *H*.
Second, the fourth characteristic is considered. At the centerline of pipe cross-section, the CDF increased with the increasing of the flow velocity. So the CDF can be assumed as $$F_{2}(v) = 2y/R-{(y/R)}^{2}$$
Because the maximum flow velocity is assumed to occur on or below the water surface, that is to say, when CDF *F*~2~*(v)* = 1, the position of maximum velocity *y*~*v*max~ ≤ *H*, and the *y*~*v*max~ is not the same at different water depths. Then [Eq 19](#pone.0151578.e024){ref-type="disp-formula"} changes to $$F_{2}(v) = 4\left\lbrack {\left( {y/{2R}} \right)^{b} - \left( {y/{2R}} \right)^{2b}} \right\rbrack$$ where *b* is a adjustment factor related to water depth. At the position of maximum flow velocity, *y* = *h* and *F*~2~*(v)* = 1, so *b* can be expressed as $$b = \text{ln}2/\lbrack\text{ln}(2R) - \text{ln}\mspace{1mu} h\rbrack$$
Inserting the expression of *b* into [Eq 20](#pone.0151578.e025){ref-type="disp-formula"} gives $$F_{2}(v) = 4\left\lbrack {\left( \frac{y}{2R} \right)^{\frac{\text{ln}\ 2}{\text{ln}(2R) - \text{ln}\ h}} - \left( \frac{y}{2R} \right)^{\frac{2\text{ln}\ 2}{\text{ln}(2R) - \text{ln}\ h}}} \right\rbrack$$
Third, the fifth characteristic is considered. Because the pipe cross section is circular, at any vertical direction, the relative height should be adjusted to $$y^{\prime} = y - \left( {R - \sqrt{R^{2} - x^{2}}} \right)$$
Then the CDF *F*~1~(*v*) and *F*~2~(*v*) also have been changed as $$F_{1}(v) = \left\lbrack {1 - \left( {\frac{y^{\prime}}{h^{\prime}} - 1} \right)^{2L}} \right\rbrack^{K}\left\lbrack {1 - \left( \frac{x}{R} \right)^{D/H}} \right\rbrack$$ $$F_{2}(v) = 4\left\lbrack {\left( \frac{y^{\prime}}{2R} \right)^{\frac{\text{ln}\ 2}{\text{ln}(2R) - \text{ln}\ h^{\prime}}} - \left( \frac{y^{\prime}}{2R} \right)^{\frac{2\text{ln}\ 2}{\text{ln}(2R) - \text{ln}\ h^{\prime}}}} \right\rbrack$$ where *h*′ represents the vertical distance from maximum velocity to pipe bed in any vertical axis. Integrating [Eq 24](#pone.0151578.e029){ref-type="disp-formula"} and [Eq 25](#pone.0151578.e030){ref-type="disp-formula"}, the CDF of the velocity distribution of the partially-filled circular pipe flow can be expressed as $$F(v) = F_{1}(v)F_{2}(v) = 4\left\lbrack {1 - \left( {\frac{y^{\prime}}{h^{\prime}} - 1} \right)^{2L}} \right\rbrack^{K}\left\lbrack {1 - \left( \frac{x}{R} \right)^{D/H}} \right\rbrack\left\lbrack {\left( \frac{y^{\prime}}{2R} \right)^{s} - \left( \frac{y^{\prime}}{2R} \right)^{2s}} \right\rbrack$$ where *s* = ln 2/\[ln*(*2*R)* − ln *h*′\]
2D Velocity Distribution {#sec007}
------------------------
The next step is to compute velocity distribution with the CDF expressed by [Eq 26](#pone.0151578.e031){ref-type="disp-formula"}. Because *v* is the function of *x* and *y*, then *v* can be written as *v*(*x*, *y*), its PDF as *p*\[*v*(*x*, *y*)\], and the CDF as *F*\[*v*(*x*, *y*)\]. Referring to the method proposed by Cui and Singh \[[@pone.0151578.ref027]\], to deal with [Eq 14](#pone.0151578.e018){ref-type="disp-formula"} and [Eq 26](#pone.0151578.e031){ref-type="disp-formula"}, the expression of velocity distribution can be obtained as $$v = \frac{1}{\lambda_{2}}\left\{ {\left\lbrack {\lambda_{1}^{q/(q - 1)} + \frac{y^{\prime}\lambda_{2}F(v)}{y}\left( \frac{q}{q - 1} \right)^{q/(q - 1)}} \right\rbrack^{1 - 1/q} - \lambda_{1}} \right\}$$
[Eq 27](#pone.0151578.e032){ref-type="disp-formula"} is the 2D velocity distribution equation in partially-filled circular pipe based on the Tsallis wavelet entropy, and the details of derivation process are shown in Appendix. There exist two Lagrange multipliers *λ*~1~ and *λ*~2~ in [Eq 27](#pone.0151578.e032){ref-type="disp-formula"}, which are determined by Eqs [15](#pone.0151578.e019){ref-type="disp-formula"} and [16](#pone.0151578.e020){ref-type="disp-formula"}, respectively. But, by the above discussion, there is no direct analytical solution for *λ*~1~ and *λ*~2~. To avoid solving these two parameters, following Chiu \[[@pone.0151578.ref015]\], Cui and Singh \[[@pone.0151578.ref027]\], we define a dimensionless entropy parameter *M* by $$M = (q - 1)\lambda_{2}v_{\text{max}}/\lbrack 1 + (q-1)(\lambda_{1} + \lambda_{2}v_{\text{max}}\operatorname{)\rbrack}$$
At the point of maximum velocity, the CDF *F*(*v*) = 1, then the maximum velocity is obtained as $$v_{\text{max}} = \frac{1}{\lambda_{2}}\left\{ {\left\lbrack {\lambda_{1}^{q/(q - 1)} + \frac{y^{\prime}\lambda_{2}}{y}\left( \frac{q}{q - 1} \right)^{q/(q - 1)}} \right\rbrack^{1 - 1/q} - \lambda_{1}} \right\}$$
Substitution of Eqs [28](#pone.0151578.e033){ref-type="disp-formula"} and [29](#pone.0151578.e034){ref-type="disp-formula"} in [Eq 27](#pone.0151578.e032){ref-type="disp-formula"} gives the general expression of velocity distribution $$v = \left( {1 - \frac{1}{M}} \right)v_{\text{max}} + \frac{v_{\text{max}}}{M}\left\{ {\frac{y^{\prime}\left\lbrack {1 - {(1 - M)}^{q/(q - 1)}} \right\rbrack F(v)}{y} + {(1 - M)}^{q/(q - 1)}} \right\}^{1 - 1/q}$$
[Eq 30](#pone.0151578.e035){ref-type="disp-formula"} is the 2D velocity distribution in terms of *M*, *q*, *v*~max~ and 2D CDF. Then, for the cross section of the partially-filled circular pipe, the average velocity can be expressed as $$\overline{v} = \frac{Q}{S_{A}} = \frac{\int_{S_{A}}{vdS_{A}}}{S_{A}} = \frac{1}{S_{A}}{\int_{S_{A}}{\left( {1 - \frac{1}{M}} \right)v_{\text{max}} + \frac{v_{\text{max}}}{M}\left\{ {\frac{y^{\prime}\left\lbrack {1 - {(1 - M)}^{q/(q - 1)}} \right\rbrack F(v)}{y} + {(1 - M)}^{q/(q - 1)}} \right\}^{1 - \frac{1}{q}}}}dS_{A}$$ where *Q* is flow discharge; and *S*~*A*~ is flow cross section area.
Location of Maximum Velocity {#sec008}
----------------------------
In partially-filled circular pipe, the position of maximum velocity is beneath the free surface \[[@pone.0151578.ref008]\]. But its exact position was difficult to determine due to the secondary currents \[[@pone.0151578.ref031]\] in the central region \[[@pone.0151578.ref032]\]. The flow near the wall is significantly affected by the boundary shear and the shape of lateral portion wall. So the position of maximum velocity point is different in each vertical direction. According to the Newton inner friction law, the bed-shear stress is $$\tau = \mu\partial v/\partial y$$ where *μ* is the coefficient of kinetic viscosity. And according to the Darcy-Weisbach formula, we obtain $$\tau = \rho\lambda{\overline{v}}^{2}/8$$ where *λ* is Darcy friction factor, *ρ* is fluid density. Thus $${{\partial v}/{\partial y}} = {{\rho\lambda{\overline{v}}^{2}}/{8\mu}}$$
On the other hand, by [Eq 30](#pone.0151578.e035){ref-type="disp-formula"}, we get $$\begin{array}{l}
{\frac{\partial v}{\partial y} = v_{\text{max}}\frac{(q - 1)\lbrack 1 - {(1 - M)}^{q/{(q - 1)}}\rbrack}{Mq} \times \left\{ \frac{y^{\prime}\left\lbrack {1 - {(1 - M)}^{q/(q - 1)}} \right\rbrack F(v)}{y} \right.} \\
{\left. + {(1 - M)}^{\frac{q}{q - 1}} \right\}^{\frac{1}{q}} \times \left\lbrack {\frac{y^{\prime}F(v)}{y^{2}} + \frac{y^{\prime}}{y}\frac{\partial F(v)}{\partial y}} \right\rbrack} \\
\end{array}$$
Taking the partial derivatives of [Eq 26](#pone.0151578.e031){ref-type="disp-formula"} with respect to *y*, the expression of ∂*F*(*v*)/∂*y* is obtained $$\begin{array}{l}
{\frac{\partial F(v)}{\partial y} = - \frac{8(y^{\prime} - h')}{{(h^{\prime})}^{2}}\left\lbrack {1 - \left( \frac{x}{R} \right)^{D/H}} \right\rbrack\left\lbrack {\left( \frac{y^{\prime}}{2R} \right)^{s} - \left( \frac{y^{\prime}}{2R} \right)^{2s}} \right\rbrack} \\
{+ 4\left\lbrack {1 - \left( \frac{x}{R} \right)^{D/H}} \right\rbrack\left\lbrack {1 - \left( {\frac{y^{\prime}}{h^{\prime}} - 1} \right)^{2L}} \right\rbrack^{K}\left\lbrack {\frac{s}{2R}\left( \frac{y^{\prime}}{2R} \right)^{s - 1} - \frac{s}{R}\left( \frac{y^{\prime}}{2R} \right)^{2s - 1}} \right\rbrack} \\
\end{array}$$
Substituting [Eq 34](#pone.0151578.e039){ref-type="disp-formula"} in [Eq 35](#pone.0151578.e040){ref-type="disp-formula"}, one obtains $$\begin{array}{l}
{1 = \frac{8\mu v_{\text{max}}}{\rho\lambda Mq{\overline{v}}^{2}}(q - 1)\lbrack 1 - {(1 - M)}^{q/{(q - 1)}}\rbrack \times \left\{ \frac{y^{\prime}\left\lbrack {1 - {(1 - M)}^{q/(q - 1)}} \right\rbrack F(v)}{y} \right.} \\
{\left. + {(1 - M)}^{\frac{q}{q - 1}} \right\}^{\frac{1}{q}} \times \left\lbrack {\frac{y^{\prime}F(v)}{y^{2}} + \frac{y^{\prime}}{y}\frac{\partial F(v)}{\partial y}} \right\rbrack} \\
\end{array}$$
[Eq 37](#pone.0151578.e042){ref-type="disp-formula"} can be used to calculate the position of the maximum velocity in any vertical direction. For *x* = 0, *y* = *h*, [Eq 37](#pone.0151578.e042){ref-type="disp-formula"} is simplified as $$4\left\lbrack {\frac{s}{2R}\left( \frac{h}{2R} \right)^{s-1} - \frac{s}{R}\left( \frac{h}{2R} \right)^{2s-1}} \right\rbrack = \frac{M\rho q\lambda{\overline{v}}^{2}}{8\mu(q-1)v_{\text{max}}\left\lbrack {1 - {(1 - M)}^{q/{(q - 1)}}} \right\rbrack}$$
[Eq 38](#pone.0151578.e043){ref-type="disp-formula"} is the expression of the position of maximum flow velocity on the whole section. Where *λ* is the Darcy friction factor, which can be obtained by Colebrook Equation \[[@pone.0151578.ref033]\]. [Eq 38](#pone.0151578.e043){ref-type="disp-formula"} yields the depth of maximum velocity of the whole cross section.
Experimental Measurement {#sec009}
------------------------
The test equipment is shown in [Fig 2](#pone.0151578.g002){ref-type="fig"}. An accurate electromagnetic flow meter was adopted to measure the mean velocity of fluid, and a Laser Doppler Velocimetry (LDA) was adopted to measure the fluid velocity of single point. The diameter of the transparent acrylic test pipe is *l* = 0.024*m*, and the pipe wall thickness is *L* = 0.003*m*. The distance between the pipe inlet and the observation point is 20*l*, and the distance between the pipe outlet and the measuring point is 15*l*. The hydraulic slope of the test pipe is *S* = 0.0033, the pipe wall was hypothesized to be hydro-dynamically smooth, and the roughness coefficient is *n*~*rc*~ = 0.0085. The refractive index of light in acrylic pipe is *n*~*λ*~ = 1.56 given by instruction book. A laser light emitted form a 30mJ Nd:YAG laser to illuminate the test point, and the laser pulse period is 20*ns*. Some glass spheres of 40 *μm* diameter were injected in order to seed the flow. The glass particles were captured by the LDA.
{#pone.0151578.g002}
Since the light refractive index is different in acrylic pipe and water, there will be deviation between the measurement position of theoretical and actual. A circular measurement guide device was made, as shown in [Fig 3](#pone.0151578.g003){ref-type="fig"}, which the diameter is equal to the test pipe diameter. The measurement point marked on the device, and then LDA measured the velocity in accordance with the mark.
{#pone.0151578.g003}
The velocity distribution of different flow depths was measured. The flow depth *H* varies from 30% to 70% of *D*. The hydraulic radius *R*~*h*~ was determined from the flow area *S*~*A*~ and the wetted perimeter *χ* as $$S_{A} = D^{2}(\theta - \text{sin}\,\theta)/8$$ $$\chi = D\theta/\, 2$$ $$R_{h} = S_{A}/\chi = D(1 - \text{sin}\,\theta/\theta)/4$$ where *θ* is angle between pipe center and free surface.
Results and Discussion {#sec010}
======================
Experimental Results {#sec011}
--------------------
The 2D velocity distribution measured by the LDA system on the cross-sectional plane for 36.2%, 50% and 70% flow depth. Because the flow is turbulent, the position of *v*~max~ below the free surface, and its exact position is difficult to determine. So the central axis velocity distribution function was evaluated by applying a non-linear least-square fit. Then the location of maximum velocity *h* and velocity *v*~max~ can be obtained through the function according to the measured data, in which the velocity of each point was measured ten thousands times, and the average value is taken as the final result.
The values resulted from the least-squares fits are listed in [Table 1](#pone.0151578.t001){ref-type="table"}, for the sake of brevity, only 36.2%, 50% and 70% flow depths are listed. Where the Reynolds, Froude and Weber numbers are defined \[[@pone.0151578.ref008]\] as $\text{Re} = 4\overline{v}R_{h}/\upsilon$, $Fr = \overline{v}/{(gD_{m})}^{1/2}$ and $We = \rho{\overline{v}}^{2}R_{h}/\sigma$, respectively, and *υ* is the kinematic viscosity, *g* is the gravitational acceleration, *D*~*m*~ is the hydraulic depth defined as the wet area divided by the free surface width. *σ* is the surface tension. The present flows are turbulent.
10.1371/journal.pone.0151578.t001
###### Least-squares fits of velocity distribution function to measured data.
{#pone.0151578.t001g}
*H/D (%)* 36.2% 50% 70%
------------------------ -------- -------- --------
*H(mm)* 8.7 12 16.8
*R*~*h*~*(mm)* 4.8 6 7.1
*Re* 3465.9 5029.0 6673.7
*Fr* 0.2568 0.3039 0.3811
*We* 2.20 3.70 5.51
$\overline{v}$ *(m/s)* 0.1816 0.2108 0.2364
*v*~*max*~*(m/s)* 0.2727 0.297 0.3323
*h(mm)* 6.82 8.98 8.32
Obviously, both the mean and maximum velocities gradually increase with the flow depth for the given slope. But the height of maximum velocity is not fixed, the height at 50% depth is higher than 36.2% depth, and the height at 70% depth is lower than 50% depth.
Comparisons and Discussion {#sec012}
--------------------------
The mean velocity comparison of measured data and Manning formula are listed in [Table 2](#pone.0151578.t002){ref-type="table"}, and the locations of maximum velocity were also compared in this table.
10.1371/journal.pone.0151578.t002
###### Comparison of mean velocity and location of maximum velocity.
{#pone.0151578.t002g}
*H/D (%)* 36.2% 50% 70%
---------------------------------- -------- -------- --------
*H(mm)* 8.7 12 16.8
$\overline{v}$~*measure*~*(m/s)* 0.1820 0.2111 0.2362
$\overline{v}$~*manning*~*(m/s)* 0.1816 0.2108 0.2364
*h* ~*measure*~ *(mm)* 6.82 8.98 8.32
*h*~*estimate*~*(mm)* 6.85 9.02 8.36
The mean velocity measured by electromagnetic flow meter is very similar to the average velocity obtained from the Manning equation. The locations of maximum velocity estimated with [Eq 38](#pone.0151578.e043){ref-type="disp-formula"} are greater than the measured values, because the estimated values are obtained with hypothetical boundary conditions, and the measured values are obtained under the actual boundary conditions, but error between the two sets of data is very small.
The measured and estimated one-dimensional (1D) axial velocity profiles were compared in [Fig 4](#pone.0151578.g004){ref-type="fig"} for flow depths of 36.2%, 50% and 70%.
{#pone.0151578.g004}
According to [Fig 4](#pone.0151578.g004){ref-type="fig"}, the estimated data are better consistent with the measured data at different depth, and the maximum velocity occurring below the water surface gradually increase with the flow depth. But in the case of 70%D water depth, there is a big difference between the estimated value and the measured value near the water surface because the gradually contractively tube wall.
Three different vertical data series of 70% flow depth were also compared, as shown in [Fig 5](#pone.0151578.g005){ref-type="fig"}.
{#pone.0151578.g005}
In [Fig 5](#pone.0151578.g005){ref-type="fig"}, the vertical axis is the relative height from the bed. It is shown in [Fig 5](#pone.0151578.g005){ref-type="fig"} that the velocity increase to maximum and decrease to some value up to the free surface, and the maximum velocity decrease with the distance from the center due to the frictional force by the side wall. At different *x* coordinates, the estimated velocity profile is in good agreement with the measured velocity profile except near the water surface.
The contours of the 2D velocity distribution for the whole cross section are shown in [Fig 6(A) and Fig 6(B)](#pone.0151578.g006){ref-type="fig"}.
{#pone.0151578.g006}
From [Fig 6(A)](#pone.0151578.g006){ref-type="fig"}, in the proximity of the pipe wall, the flow velocity is smaller due to the friction force of the wall, and the flow velocity is increased with water depth. The farther distance from the tube wall is, the smaller gradient of the velocity is. At the region of pipe center, especially from the water surface to the maximum velocity position, the velocity gradient is less than the gradient from maximum velocity position to pipe wall.
Compare [Fig 6(A)](#pone.0151578.g006){ref-type="fig"} with [6(B)](#pone.0151578.g006){ref-type="fig"}, below the location of maximum velocity, the velocity distribution of measured value is similar to estimated value. But above the location of maximum velocity, especially near the water surface, the velocity distribution of estimated value is not good match to measured value, due to the flow velocity is mainly influenced by the secondary currents and gradually contractively tube wall. However, the overall trend of estimated velocity distribution contours same as the measured profile. Compared the two contours charts, the estimated values fit the measured values well on the whole.
Comparison with other Entropy-based Velocity Distributions {#sec013}
----------------------------------------------------------
With the same coordinate system and the same CDF, the profiles based on the proposed velocity distribution were compared with the profiles of Chiu's method, as [Fig 7](#pone.0151578.g007){ref-type="fig"} shows.
{#pone.0151578.g007}
In the central region, both Chiu's velocity distribution and Tsallis wavelet entropy-based distribution can reflect the measured velocity distribution. But more closer to the lateral wall, for example *x* = 6*mm*, Chiu's distribution did not capture most of the measured points. It is shown in [Table 3](#pone.0151578.t003){ref-type="table"} that the two distributions were in good agreement with measured values, with variance no higher than 0.0296*m*^*2*^*/s*^*2*^. The velocity distribution variance based on Tsallis wavelet entropy is larger in the middle region, and smaller near the pipe wall, but Chui's distribution is just the opposite.
10.1371/journal.pone.0151578.t003
###### Variance, in m^2^/s^2^, of Velocity Distribution for Different Methods.
{#pone.0151578.t003g}
*x*(mm) Tsallis wavelet entropy-based velocity Chiu's(1988) velocity
--------- ---------------------------------------- -----------------------
0 0.0248 0.0170
2 0.0223 0.0155
4 0.0124 0.0205
6 0.0173 0.0262
8 0.0170 0.0296
Conclusions {#sec014}
===========
This research has derived a new 2D velocity distribution based on the principle of maximum entropy for partially-filled circular pipe flow. The hypothesized CDF can reasonable describe the probability distribution of velocity. On the basis of this assumption, the estimated velocity value based on Tsallis wavelet entropy is very close to the experimental measured value. The estimation of parameters *M* and *q* are determined by mean velocity, maximum velocity and maximum velocity position at two different water depth. Compared with other entropy-based velocity distributions, the velocity distribution method proposed in this paper can reasonably describe the velocity distribution in most region expect near the water surface. Under same boundary conditions, the CDF of velocity distribution have a certain similarity for different hydraulic diameters, so the velocity distribution should also have a certain similarity. The assumption was already verified at 24mm and 50mm diameters pipe by experiments.
In the future, we will continue to optimize the velocity distribution model of partially-filled, and reduce the precondition of solving the model. Also, we intend to employ the model to predict the velocity distribution in partially-filled electromagnetic flow meter. To do so, the influence of hydraulic slope, pipe wall friction and other facts on the velocity distribution must be considered in the model. Hence, this paper can be also seen as a preliminary study for working on the latter problem.
Appendix {#sec015}
========
In this appendix, the derivation of the velocity distribution function is presented. We start the derivation from the relation of velocity distribution function and CDF. Taking the partial derivatives of *F*(*v*) with respect to *x* and *y*, one obtains $$\frac{\partial F(v)}{\partial x} = p(v)\frac{\partial v}{\partial x} = \frac{\partial v}{\partial x}\left\lbrack {\frac{1}{q}(1 - \lambda_{1} - \lambda_{2}v) + \lambda_{1} + \lambda_{2}v} \right\rbrack^{1/(q - 1)}$$ $$\frac{\partial F(v)}{\partial y} = p(v)\frac{\partial v}{\partial y} = \frac{\partial v}{\partial y}\left\lbrack {\frac{1}{t}(1 - \lambda_{1} - \lambda_{2}v) + \lambda_{1} + \lambda_{2}v} \right\rbrack^{1/(q - 1)}$$
Now defining a new variable $$w = \left\lbrack {\frac{1}{q} + \frac{q - 1}{q}\left( {\lambda_{1} + \lambda_{2}v} \right)} \right\rbrack^{\frac{q}{q - 1}}$$
Taking the partial derivatives of *w* with respect to *x* and *y*, the following equations are obtains $$\frac{\partial w}{\partial x} = \lambda_{2}\left\lbrack {\frac{1}{q} + \frac{q - 1}{q}\left( {\lambda_{1} + \lambda_{2}v} \right)} \right\rbrack^{\frac{1}{q - 1}}.\frac{\partial v}{\partial x}$$ $$\frac{\partial w}{\partial y} = \lambda_{2}\left\lbrack {\frac{1}{q} + \frac{q - 1}{q}\left( {\lambda_{1} + \lambda_{2}v} \right)} \right\rbrack^{\frac{1}{q - 1}}.\frac{\partial v}{\partial y}$$
Substitution of Eqs [A4](#pone.0151578.e056){ref-type="disp-formula"} and [A5](#pone.0151578.e057){ref-type="disp-formula"} into Eqs [A1](#pone.0151578.e053){ref-type="disp-formula"} and [A2](#pone.0151578.e054){ref-type="disp-formula"} gives the following relationship between *F*(*v*) and *w* $${{\partial w}/{\partial x}} = \lambda_{2}{{\partial F(v)}/{\partial x}}$$ $${{\partial w}/{\partial y}} = \lambda_{2}{{\partial F(v)}/{\partial y}}$$
Eqs [A6](#pone.0151578.e058){ref-type="disp-formula"} and [A7](#pone.0151578.e059){ref-type="disp-formula"} can be integrated using the Leibniz rule $$\int_{(0,0)}^{(x,y)}{\frac{\partial w}{\partial x}dx + \frac{\partial w}{\partial y}dy = w(x,y) - w(0,0)}$$
Because the point (0,0) lie on the pipe wall, and *v*(*x*, *y*) at the point is zero, then [Eq A8](#pone.0151578.e060){ref-type="disp-formula"} becomes $$w(x,y)\mspace{2mu}-\mspace{2mu} w(0,0) = w(x,y) - \left\lbrack {\frac{1}{q} + \frac{q - 1}{q}\lambda_{1}} \right\rbrack^{\frac{q}{q - 1}}$$
The definite integral of the left part of [Eq A8](#pone.0151578.e060){ref-type="disp-formula"} is calculated at a generic point (*x*, *y*), which is identified by means of a polygonal curve that start from origin (0,0), pass through the point on the wall $(x,R - \sqrt{R^{2} - x^{2}})$, and ends at (*x*, *y*). The CDF is zero at pipe wall below water surface, and the CDF is constantly zero at point (0,0) to $(x,R - \sqrt{R^{2} - x^{2}})$, then $$\begin{array}{l}
{{\int_{(0,0)}^{(x,y)}{\frac{\partial w}{\partial x}dx + \frac{\partial w}{\partial y}dy =}}{\int_{(0,0)}^{(x,y)}{\lambda_{2}\frac{\partial F(v)}{\partial x}dx + \lambda_{2}\frac{\partial F(v)}{\partial y}dy}}} \\
{= {\int_{(0,0)}^{(x,R - \sqrt{R^{2} - x^{2}})}{\lambda_{2}\frac{\partial F(v)}{\partial x}dx + \lambda_{2}\frac{\partial F(v)}{\partial y}dy}} + {\int_{(x,R - \sqrt{R^{2} - x^{2}})}^{(x,y)}{\lambda_{2}\frac{\partial F(v)}{\partial x}dx + \lambda_{2}\frac{\partial F(v)}{\partial y}dy}}} \\
{= {\int_{R - \sqrt{R^{2} - x^{2}}}^{y}{\lambda_{2}\frac{\partial F(v)}{\partial x}dx + \lambda_{2}\frac{\partial F(v)}{\partial y}dy}} = \frac{\lambda_{2}y^{\prime}}{y}F(v)} \\
\end{array}$$
The right side of [Eq A10](#pone.0151578.e064){ref-type="disp-formula"} can be equated to the right side of [Eq A9](#pone.0151578.e061){ref-type="disp-formula"} to obtain $$w(x,y) = \frac{y^{\prime}\lambda_{2}}{y}F(v) + \left\lbrack {\frac{1}{q} + \frac{q - 1}{q}\lambda_{1}} \right\rbrack^{\frac{q}{q - 1}}$$
Substituting Eqs [23](#pone.0151578.e028){ref-type="disp-formula"} and [A3](#pone.0151578.e055){ref-type="disp-formula"} into [Eq A11](#pone.0151578.e065){ref-type="disp-formula"} gives the expression of velocity distribution $$v = \frac{1}{\lambda_{2}}\left\{ {\left\lbrack {\lambda_{1}^{q/(q - 1)} + \frac{y^{\prime}\lambda_{2}F(v)}{y}\left( \frac{q}{q - 1} \right)^{q/(q - 1)}} \right\rbrack^{1 - 1/q} - \lambda_{1}} \right\}$$
[Eq A12](#pone.0151578.e066){ref-type="disp-formula"} is the 2D velocity distribution equation in partially-filled circular pipes based on the Tsallis wavelet entropy.
Supporting Information {#sec016}
======================
###### Experimental Equipment.
The moving accuracy of 3D traversing mechanism is 0.01mm.
(TIF)
######
Click here for additional data file.
###### Schematic diagram of measurement reference point.
Taking the intersection point of fluid section and axial center line as the reference point. The determining of reference point must be carried out in waterless condition.
(TIF)
######
Click here for additional data file.
###### Schematic diagram of the measuring path.
Take 50% depth ratio for example.
(TIF)
######
Click here for additional data file.
###### Schematic diagram of the initial measurement point.
Take 50% depth ratio for example. (a) The position of initial measurement point. In actual fluid flow, the initial measurement point is not on the water surface. (b) The data distribution of the initial measurement point.
(TIF)
######
Click here for additional data file.
###### The distribution of experimental data of single point.
The velocity of each point was measured ten thousands times, and some unreasonable points were deleted according to the hydraulics knowledge, and then the average value is taken as the final result. In the figure, the symbols "-" only represent the direction.
(TIF)
######
Click here for additional data file.
###### The experimental data of first measurement point at the condition of 70% depth ratio.
(XLS)
######
Click here for additional data file.
###### The experimental data of two-dimensional velocity distribution at the condition of 70% depth ratio.
(XLS)
######
Click here for additional data file.
[^1]: **Competing Interests:**The authors have declared that no competing interests exist.
[^2]: Conceived and designed the experiments: YLJ BL. Performed the experiments: YLJ. Analyzed the data: YLJ BL JC. Contributed reagents/materials/analysis tools: YLJ BL JC. Wrote the paper: YLJ.
| |
Updated Thursday August 30, 2018 by NRSA.
The association will only recognize one team coach & one assistant coach, and during a game, only the coach & assistant can offer instruction.
Instruction during a game can only be given from the midline to the top of the penalty box.
No person is allowed on the field after a game has started. The exception would be an injury, and then only after the referee has stopped play.
All decisions by referees are final. No protests or appeals will be recognized.
Verbal or physical abuse of any referee, player, or coach will not be tolerated. Violations may be referred to the NRSA code of conduct committee for follow up.
Coaches will be held accountable for the conduct of their players, team parents, and supporters at the game. Kindly refer to the NRSA code of conduct form posted to the NRSA website.
Any complaints concerning coaches, referees, players, or parents, conduct must be made in writing to the association.
Unless otherwise directed by an NRSA official, all games that start late will still end at the normal scheduled time.
Practicing during inclement weather or extremely hot weather should be avoided.
All players must be notified by the coach as to what team they are assigned within 10 days after receiving roster.
Travel players will be as evenly distributed as possible on teams within the club league.
Coaches cannot trade players, or change game times.
Coaches must give every player a fair amount of playing time in each half regardless of players skill level or practice attendance. Playing time should be as fair as possible.
If a team is short players, the opposing team must either loan players or play the same number of players.
Players are not permitted to play wearing hard casts or splints, regardless of whether or not the cast or splint is wrapped. Soft athletic support braces are permitted.
Jewelry or any other decorative personal item may not be worn during practice or game.
Any player that was a substitute when the quarter ended must start the next quarter.
You can sub on any dead ball with referee awareness. For example: either teams throw in, goal kicks.
Play max 5 vs. 5 (including keepers). Before each game the 2 coaches agree as to how many you are playing that day. Can go as low as needed.
1 coach from each team may be on the field to guide the kids and provide up close instruction.
Throw ins: referee will blow the whistle for an illegal throw in but the player gets a re do. If it is illegal a second time, the ref will let it go.
Any player that was a substitute when the half ended must start the next half.
You can only sub on your own possession. For example: your own throw ins, goal kicks.
Play a max of 9 vs. 9 (including keepers). Coaches should have an “agreement” before each game to let each other know how many players they have and want to play with.
Referee will be calling off sides.
Throw ins: referee will call illegal throw ins and the player will lose possession.
Blatant fouling, cursing, or unnecessary roughness will result in 1 warning then removal from the game. This players team will play one player down the rest of the game.
Play max of 11 vs. 11 (including keepers). Coaches should have an “agreement” before each game to let each other know how many players they have and want to play with. | http://iirs.nrsa.org/site/ClientSite/article/1114132 |
Breaking News: Some Traders Think The Kroger Co. (KR) Will See A Decline
The Kroger Co. (KR), a Consumer Defensive Grocery Stores organization, saw its stock trade 30.77 common shares, a pullback compared to its 10-day trading volume of 9.57M. The Kroger Co. (KR) stock is quoted at $30.77, down -0.19 cents or -0.61% on the day. Based on this we can see some traders are either waiting on the sidelines to get involved or perhaps some are taking losses. Total Revenue for The Kroger Co. (KR) is $120.99B. Gross Profit is $27.02B and the EBITDA is $5.14B.
The Kroger Co. (KR) Technical Statistics:
The average 10-day trading volume of The Kroger Co. (KR) is 9.57M compared to 6.52M over the last 3 months which indicates a rise in trading activity. At the time of writing, The Kroger Co. (KR) has a 50-day moving average of $28.57 and a 200-day moving average of $26.78. These moving averages are popular technical figures that investors use to analyze price trends of The Kroger Co. (KR). Approximately 4.64% of the shares of the company are short sold from investors betting the shares might trade lower. The beta value of The Kroger Co. (KR) stock is 0.55, indicating its 4.40% to 2.82% more volatile than the overall market. Technically, KR’s short term support levels are around $28.67, $28.67 and $28.67 on the downside. Based on technical analysis, KR has short term rating of Neutral (0.15), Intermediate rating of Bullish (0.25) and the long-term rating of Bullish (0.38) giving it an overall rating of Bullish (0.26). KR is trading 49.57% off its 52 week low at $20.70 and -0.03% off its 52 week high of $30.97. Performance wise, KR stock has recently shown investors 7.69% a rise in a week, 14.75% a rise in a month and 11.61% a rise in the past quarter. More importantly, The Kroger Co. (KR) has shown a return of 6.80% since the first of the year.
RELATED POSTS
The Kroger Co. (KR) Key Data:
The Kroger Co. (KR) is a large-cap company with a market cap value of $24.634B. KR insiders hold roughly 5.70% of the shares. On Nov-12-19 Deutsche Bank Upgrade KR as Sell → Hold at $22 → $27. On Dec-06-19 Telsey Advisory Group Reiterated KR as Market Perform at $29 and on Dec-12-19 Evercore ISI Upgrade KR as In-line → Outperform. There are currently 754.99M shares in the float and 807.13M shares outstanding. There are 4.64% shares short in KRs float. The industry rank for The Kroger Co. (KR) is 169 out of 255 ranking it at the Bottom 34% .
The Kroger Co. (KR) Fundamentals Statistics:
KR last 2 years revenues have decreased from $121,162,000 to $120,846,000 showing a downtrend. Wall Street expects The Kroger Co. (KR) to report an EPS next Qtr profit of 0.55 and a profit of 6.52% next year. The growth rate on KR this year is 3.32 compared to an industry 1.60. KRs next year’s growth rate is 7.34 compared to an industry 5.30. The book value per share (mrq) is 11.12 and cash per share (mrq) is 0.68. Giving them a price/book (mrq) of 2.84 compared to an industry of 1.07 and KRs price/cash flow (mrfy) is 5.87 compared to an industry of 6.41. KR fundamental ratios shows an EPS growth vs. previous year 2.18 and EPS growth vs. previous quarter 0.56.
About The Kroger Co. (KR):
The Kroger Co. (KR), which operates in the thin-margin grocery industry, has been undergoing a complete makeover, not only with respect to products but also in terms of the way consumers prefer shopping grocery. The company is launching plant-based products as well as eyeing technological expansion. It acquired meal kit company Home Chef and partnered with British online grocery delivery firm Ocado that reinforces its position in the online ordering, automated fulfillment and home delivery space. It has also introduced grocery delivery service Kroger Ship and inked a deal with driverless car company Nuro.The Cincinnati, Ohio-based company operates 2,764 retail food stores under banners including Kroger, City Market, Dillons, Food 4 Less, Fred Meyer, Fry’s, Harris Teeter, Jay C, King Soopers, Mariano’s, Pick ‘n Save, QFC, Ralphs and Smith’s. Out of these, 2,270 are pharmacies and 1,537 are fuel centers. Further, it also manufactures and processes certain food products that are sold in its supermarkets.Kroger’s supermarket and multi-department stores operate under four formats combo stores (combination of food and drug stores), multi-department stores, marketplace stores, and price impact warehouses. The combo stores include natural food and organic sections, pharmacies, general merchandise, and pet centers, as well as offer perishables items such as fresh seafood and organic produce.The multi-department stores offer a collection of general merchandise products such as apparel, home fashion and furnishings, electronics, automotive products, toys, and fine jewelry. The marketplace stores include full-service grocery and pharmacy departments and a general merchandise area that includes outdoor living products, electronics, home goods, and toys.The combo stores, multi department stores, and marketplace stores also have fuel centers. The price impact warehouse offers grocery, health, and beauty care items.Additionally, the company operates 37 food production plants, mainly bakeries and dairies. These supply roughly 32% of Our Brands units and 43% of the grocery category Our Brands units sold in its supermarkets; the remaining Our Brands items are produced by other manufacturers.
Stock Watch 247
Stock Watch 247 is a leading provider and publisher of stock market news, initial public offering (IPO) news, new stock listings and stocks to watch, commentary, business news, financial news and content on the USA & World Markets. Stock Watch 247 is for information only and not investment advice. Please make sure to read our Disclaimer and Privacy Policy. We may be buying or selling any stock discussed at any time. | |
Hate crime could include an act of violence or hostility because of who you are or someone thinks you are. This can occur due to prejudice or hostility based upon your race or ethnicity, disability, religion, sexual orientation, gender identity or other characteristics. The law takes hate crime and hate incidents very seriously.
Hate crime can be committed against a person or property. A victim does not have to be a member of the group at which the hostility is targeted. In fact, anyone could be a victim of a hate crime. You can find more information on what is considered to be a hate crime on the Citizen’s Advice website.
You can report a hate crime directly to the police by visiting your local police station or by calling 101 or 999 if you feel you’re in immediate danger. When reporting, you should ask for the incident reference number, and this will help you in any further dealings with the police. If you don’t wish to report the incident, you can ask someone else (eg a friend or relative) to report on your behalf, or your local Citizen’s Advice Bureau.
Queen Mary now has a dedicated 24 hour helpline that provides independent and confidential reporting and support for anyone affected by hate incidents or hate crime who works or studies at the University. This includes victims of hate crime, witnesses to incidents that could be hate crimes or anyone who is a third party to an incident that could be a hate crime. The service is available to you wherever you are, whether on campus, at home, out shopping or on holiday. Wherever the incident has occurred, Stop Hate are there to offer help 24 hours a day.
Students:
You can report allegations of harassment, bullying, sexual violence, sexual harassment, hate crime and discrimination to the Appeals, Complaints and Conduct Office under the Code of Student Discipline. A Casework Officer from the Appeals, Complaints and Conduct Office will meet with you privately to discuss the issues that you have raised and will explain to you how your case will be handled, how to make your report and who to address your report to.
The Student Complaints Policy makes it clear that any student who submits a complaint in good faith will not suffer any detriment as a result of any action taken under the Student Complaints Policy.
Staff:
In the first instance, you should contact your Line Manager to report any allegation of harassment, assault, hate crime, bullying and discrimination. Where the Line Manager is the alleged perpetrator, staff should contact the designated HR person for their directorate/school/department.
Further information is available on the Dignity at Work and Study Procedure and on the Dignity at Work webpage. Information on how to raise concerns is available in the Dignity at Work and Study General Guidance. | https://www.qmul.ac.uk/zerotolerance/reporting-an-incident/reporting-a-hate-crime/ |
Friday, 13 April 2018
1. Government has been consistent in emphasizing the
critical contribution expected from the State Enterprises and Parastatal (SEP)
sector towards the revival of Zimbabwe’s economic fortunes and in this regard
has for some time been pursuing a programme of SEPs reform designed to enhance
performance, improve service-delivery and to bring more order, discipline and
rationality to the sector as a whole. This includes (i) promoting good
corporate governance in the SEPs sector, (ii) undertaking an overall Strategic
Portfolio Review, (iii) individual SEPs Performance Reviews and, (iv) conducting
Forensic Audits where the need arises in some SEPs.
2. The 24th November, 2017 Inaugural Statement and the more
recent State of the Nation Address delivered by His Excellency, the President,
Cde. E.D. Mnangagwa, together with the 2018 National Budget have served to
inject additional weight and greater urgency to this programme of reform, and
have underlined the need for Government to significantly accelerate development
of a SEPs Short and Medium Term Reform Framework (SEPs-SMTRF) that would guide
the implementation of the National SEPs Reform Framework.
3. This Framework has been developed by the arms of
Government mandated to oversee SEPs governance, performance and reform, namely
the Corporate Governance Unit (CGU) within the Office of the President and
Cabinet (OPC), the Ministry of Finance and Economic Development and the State
Enterprises Restructuring Agency (SERA) on the basis of a comprehensive
diagnostic analysis of the overall sector.
4. In order to facilitate this task and so as to lay a
sound, evidence-based foundation on which to conduct the analysis and to
develop effective reform strategies, the Office of the President and Cabinet
(OPC) issued Cabinet Circular No 19 of 2017, which directed Line Ministries to
produce detailed self-assessment and proposed turn-around strategies for all
SEPs under their respective purview.
5. Line Ministries have since responded to this directive,
providing relevant data which, in turn, has used to develop a memorandum
recommending State Enterprises Reforms. The Memorandum was considered by
Cabinet on the 10th of April 2018and came up with the following decisions:
Table A: State Enterprises and Parastatals whose Reform
Initiatives are already at various stages of Implementation
Name of Parastatal Decisions of Cabinet
1. Cold Storage Commission (CSC) Finalise consideration of
joint venture proposals by the Swiss and United Kingdom investors by 30th April
2018
2. Grain Marketing Board The Grain Marketing Board is
expected to complete work on delinking the Strategic Grain Reserve and the
GMB’s commercial operations.
The Grain Marketing Board will continue to manage the
Strategic Grain Reserve on behalf of Government.
All costs directly related to the management of the
Strategic Grain Reserve will be borne by Government.
The expenses will include storage costs which will be
provided for under the fiscus.
3. Agriculture and Rural Development Authority (ARDA)
Proceed on current trajectory with identified strategic partners.
4. Civil Aviation Authority of Zimbabwe (CAAZ) Promulgation
of the Civil Aviation Amendment Bill to provide for the unbundling of the
authority into a Regulatory and Airports Authority
5. National Railways of Zimbabwe (NRZ) Current
recapitalisation Programme to proceed
6. Zimbabwe Electricity Supply Authority (ZESA) A single
ZESA Board will be established to take charge of ZETDC, ZPC and ZESA
Enterprises.
The Boards of ZETDC, ZPC and ZESA Enterprises to be
dissolved.
The Board will be allowed to engage strategic partners
under ZPC operations where necessary.
The strategic and ZESA-specific activities of Powertel will
be incorporated under ZETDC whilst excess telecommunication capacity will be
included in the merger between Zarnet and Africom.
7. Zimbabwe National Road Administration (ZINARA) The
Zimbabwe National Road Authority will remain under the Ministry of Transport
and Infrastructure Development but with a focus on revenue collection and not
on technical road construction activities.
The Ministry is challenged to ensure that there is improved
transparency and accountability in the operation of ZINARA
8. Allied Timbers To seek strategic partner
9. Agribank To seek strategic partner
10. Small and Medium Enterprises Development Corporation
(SMEDCO) To be merged with Empower Bank and establish the Empowerment and
Development Bank that will have a unit focusing on small and medium scale
enterprises and Youth Development programmes.
A separate Women’s Bank to be established.
11. Forestry Commission To remain as a regulatory authority
12. ZISCO Steel Current efforts to resuscitate it to
proceed
Table B: State Enterprises Targeted for Liquidation
Name of Parastatal Decisions of Cabinet
1. National Glass Industries To be liquidated
2. Motira To be liquidated
3. Zimglass Given the world wide movement towards the
replacement of plastics with glass, National Glass is expected to urgently seek
a strategic partner as IDC retains its current shareholding in the company.
The identification of a strategic partner is urgent as the
company currently faces litigation that could lead todissolution or liquidation
4. Kingstons (Pvt) Ltd To sell/dispose of its assets but to
retain its two Radio Licences.
The Line Ministry should seek ways of maximising the
company’s interests in the radio licences Capital Radio and Nyaminyami FM
Table C: State Enterprises Targeted for Privatisation
Name of Parastatal Decisions of Cabinet
1. The National Handicrafts Centre No privatisation. To be
transferred to Ministry of Women Affairs, Gender and Community Development for
market promotion
2. Allied Insurance IDC should retain its current 10%
interest in Allied Insurance
3. Surface Investment To retain current shareholding at 10%
in the national interest
4. Zimbabwe Grain Bag To be privatised but IDC to retain a
percentage of the strategic bag company in the national interest
5. Ginhole Investments To be privatised
Table D: State Enterprises and Parastatals Targeted for
Partial privatisation through engagement of Strategic Partners and/or Listing
on the Zimbabwe Stock Exchange
Name of Parastatal Decisions of Cabinet
1. National Handling Services No privatisation
2. Petrotrade Government to retain majority shareholding in
the national interest
7. Road Motor Services (RMS) To be privatised in tandem
with NRZ Programme
8. Tel-One, Net-One and Telecel Partial privatisation
9. ZUPCO Partial privatisation
10. Willowvale Mazda Motor Industry Partial privatisation
11. Chemplex Corporation Partial privatisation through a
strategic partner that can ensure the provision of fertilizers to the country
at affordable prices.
12. Deven Engineering Partial privatisation
13. G & W Minerals Partial privatisation
6. Where partial privatisation is to take place, Government
will explore opportunities for using the Stock Exchange to promote involvement
and ownership by the public/population through share ownership schemes.
Table E: State Enterprises and Parastatals earmarked for
Mergers
Name of Parastatal Decisions of Cabinet
1. SMEDCO, Empower Bank and Women’s Microfinance Bank
SMEDCO and Empower Bank to be merged into Empowerment and Development Bank.
Women’s Microfinance to remain as a separate Bank.
2. Powertel, Zarnet and Africom Merge
3. Competition and Tariff Commission and National
Competitiveness Commission No merger. Competition and Tariff Commission remain
as it is. National Competitiveness Commission to become a Department in the
Line Ministry with the support of the private sector
6. Special Economic Zones Authority, the Zimbabwe
Investment Authority, Zimtrade and the Joint Venture Unit The Special Economic
Zone should be merged with the Zimbabwe Investment Authority, Zimtrade and the
Joint Venture Unit to establish a One Stop Shop for potential business
investors
Table F: State Enterprises and Parastatals to be Absorbed
as Ministerial Departments
Name of Parastatal Decisions of Cabinet
1. New Ziana To become a Department in the Ministry of
Information, Media and Broadcasting Services
2. National Indigenisation and Economic Empowerment Unit To
become a department in the Ministry of Industry, Commerce and Enterprise
Development
3. National Arts Council To remain as a regulatory
authority
4. National Library and Documentation Services To become a
Department in the Ministry of Primary and Secondary Education
5. National Liquor Licencing Authority To be returned to
the Ministry of Local Government, Public Works and National Housing as a
regulatory authority
6. Board of Censors To become a Department in the Ministry
of Home Affairs and Cultural Heritage
7. Lotteries and Gaming Board To become a Department in the
Ministry of Home Affairs and Cultural Heritage
7. Cabinet resolved that all Research Institutes will
remain as they are.
8. Detailed implementation modalities for each of the
Cabinet decisions willbe provided in the form of a Memorandum to Cabinet by each
respectiveLine Ministry, including indications, where relevant or necessary,
for theengagement of technical, financial or legal advisors in order to
facilitatethe reform or restructuring process agreed by Cabinet. | |
Hartland Community ChorusCo-Conductor and Music Director: Richard Waddell
The Hartland Community Chorus (HCC) was organized over 30 years ago as the chorus for the variety shows and primarily performed show tunes and other non-classical music. In the late 1990s, the focus of the HCC was expanded dramatically to include different types of music and to challenge the singers as they had not been in the past. Since that time, the Chorus has grown from a group of approximately 20 people to a committed group of about 50 singers. The annual holiday concerts have become one of the most popular programs in the area and we regularly feature music by classical composers, accompanied by professional or semi-professional instrumentalists. The Chorus often presents concerts in the spring featuring classical and other music. Members of the HCC regularly perform with other choral groups in the Upper Valley including The Handel Society, Springfield Community Chorus, Bel Canto Singers, Thetford Chamber Singers, Cantabile, and Full Circle.
Rehearsals for the holiday concerts begin in mid-September and occur every Tuesday evening in Damon Hall from 7:00-9:15 PM. The concerts each year are on a Saturday at 7:30 PM and Sunday at 2:00. There is no admission fee but we ask that people bring a non-perishable food item to donate to the Hartland Christmas Project.
Photos taken by Juliet Charney at Damon Hall, Dec.12, 2010.
Comments»
No comments yet — be the first. | https://choralartsuv.org/members/community-choruses/hartland-community-chorus/ |
A frightening black hole of judicial secrecy exists in Colorado. If not for an experienced investigative journalist given the time and resources to chase the story — not just a sound bite — it might never have come to light.
Most people wouldn’t even notice that a murder case was missing from the public court records, but The Denver Post’s David Migoya did. That set off his journalistic alarm bells. After nine months of research, his “Shrouded justice” stories revealed a widespread practice of case suppression that should terrify anyone who believes transparency is the most important check on government.
Judges suppressed thousands of criminal and civil cases removed in just the past few years. Typically, attorneys requested it, but sometimes judges acted on their own initiative. Once suppressed, only the lawyers and the parties to the case could find out anything about them, including when hearings would take place. The cases simply vanished from the public record.
“Someone could be arrested, charged, convicted and sentenced for a crime in Colorado without anyone outside of law enforcement ever knowing who, how, why or whether the process was fair,” Migoya concluded.
While judicial suppression is legal, it’s also mostly unregulated. Now that the State Supreme Court has ruled there is no presumption of access to judicial records, suppression is a very powerful tool to keep the public in the dark.
There are sometimes good reasons to suppress a case temporarily. For example, there might be an ongoing police investigation that could be compromised or victims’ families might be in danger during the trial. But there are bad reasons, too, such as protecting an elected official from embarrassment or simply to avoid media attention.
Suppressed cases aren’t to be confused with sealed cases, although Migoya found that even some prosecutors didn’t understand the difference. State laws and rules control when a judge may seal a case. Suppression lacks such clarity and is basically at the discretion of judges. Even after a conviction, a suppressed case might remain hidden for years or forever.
After Migoya’s story ran, The Denver Post became a forum for Coloradans to engage in a civic conversation about suppression.
Reader Bill Wright wrote, “The kind of secrecy implied in the article constitutes a serious threat to the credibility of Colorado’s system of justice.” He added, “While there are undoubtedly good reasons for sealing court records these should at least be generally noted in the public record and subject to regular review.”
Reader Mary Monogue wrote, “You’ve restored my faith in journalists. Your article is well-written and timely and just-ever-so wonderful.”
And during an AMA (Ask Me Anything) with Migoya, Twitter user @artistinaspen tweeted “Brilliant investigative reporting. This is quite frankly scary.”
At least one judicial district has already promised change. Prosecutors in Arapahoe, Douglas, Elbert and Lincoln counties — the 18th Judicial District under District Attorney George Brauchler — said they had no idea so many cases were suppressed and are implementing better review of when they request it.
Other prosecutors around the state should follow Brauchler’s lead. Better, lawmakers should intervene by passing clear rules for judicial suppression and for lifting suppression after resolution of a case.
Usually, the courts serve as the check and balance on the legislative branch by blocking unconstitutional laws. Checks and balances go both ways, though.
To send a letter to the editor about this article, submit online or check out our guidelines for how to submit by email or mail. | https://www.denverpost.com/2018/07/22/shrouded-justice-uncovers-court-secrecy-in-need-of-reform/ |
Richard Antoun documents and exemplifies the single most important institution for the propagation of Islam, the Friday congregational sermon delivered in the mosque by the Muslim preacher. In his analysis of various sermons collected in a Jordanian village and in Amman, the author vividly demonstrates the scope of the Islamic corpus (beliefs, ritual norms, and ethics), its flexibility with respect to current social issues and specific social structures, and its capacity for interpretation and manipulation.
Focusing on the pivotal role of preacher as "culture broker," Antoun compares the process of "the social organization of tradition" in rural Jordan with similar processes outside the Muslim world. He then highlights the experiential dimension of Islam. The sermons discussed range over such topics as family ethics, political attitudes, pilgrimage, education, magic, work, compassion, and individual salvation.
Originally published in 1989.
ThePrinceton Legacy Libraryuses the latest print-on-demand technology to again make available previously out-of-print books from the distinguished backlist of Princeton University Press. These paperback editions preserve the original texts of these important books while presenting them in durable paperback editions. The goal of the Princeton Legacy Library is to vastly increase access to the rich scholarly heritage found in the thousands of books published by Princeton University Press since its founding in 1905.
You do not have access to this
book
on JSTOR. Try logging in through your institution for access.
Log in to your personal account or through your institution.
This is a book about the Islamic sermon and the Muslim preacher, a book that explores the potentiality and diversity of the Muslim preaching tradition. It is also a book about the process by which religious beliefs, ritual norms, and ethics are transmitted selectively by knowledgeable religious specialists or culture brokers to the people of their communities. Such a study is as much concerned with the symbolic message of the sermon as it is with the articulation of that message with society, whether with kinship group, village community, State, or community of believers.
The aim of the study is threefold....
In modern times Robert Redfield, M. N. Srinivas, and McKim Marriot were the first to write analytically about the process of “the social organization of tradition.”¹ The social organization of tradition is the process of constant interchange of cultural materials necessarily involving choice and interpretation between the self-styled “learned” (but also so styled by the common people) men and women of a society and the great majority of people whom Redfield designated as “folk” in earlier works and “peasants” in later works.² This process usually involves some kind of accommodation between what the learned men (“literati” or “intelligensia” as Redfield...
Kufr al-Ma is an Arab village located in the denuded eastern foothills of the Jordan Valley. It is one of two hundred cereal-growing villages of the Ajlun district of northwestern Transjordan. Its population of two thousand is composed entirely of Sunni Muslims. Approaching the village along a dirt road from its eastern side, one sees that only a few ancient olive trees soften the unrelieved bleakness of the stone-strewn soil.¹ Nothing in the outer aspect of the village itself suggests that it differs from the hill settlements which surround it—neither its close-jammed, brown, clay-covered houses, its dusty paths, nor...
For Muslims the first and model preacher(khaṭīb)was the Prophet, Muhammad. Muhammad injected into this role a specific moral and sociopolitical content that had hitherto been absent since the Quran had been sent to provide guidance in the darkness of this world and to impel men to take action to propagate and fulfill its message. However, in Arabia before Islam a number of speaking roles existed: the poet(shā‘ir), the chief(sayyid)—who was often said to be the possessor of special spiritual gifts—and the soothsayer(kāhin), who delivered oracles in rhymed prose, blessed followers, cursed enemies, and...
The Islamic sermon is a rhetorical form, that is, an argument whose elements are linked images and symbols composed in such a way as to express an underlying message through the organizing metaphor of kinship. This chapter explores both the metaphor and the modes of articulation of that sermon within its social and cultural context. In the course of this exploration several questions will be examined: Is the Islamic sermon an example of formal speech? If so, does that formal speech, as Bloch (1975) argues, preclude the handling of specific issues? If not, what is the nature of the articulation...
Although the process of Islamization has proceeded in the Middle East for over 1300 years little is known about the process by which Islamic norms have been transmitted (or mistransmitted) to the vast bulk of the peasant population (fellahin).¹ Little is known about the content of these norms, the character of their transmitters—the Islamic preachers—or about the implications of these norms for social change and the transformation of the families, communities, and polities to whom they are addressed.
It may well be that the most significant change that has occurred in the Middle East since World War II...
The Pilgrimage to Mecca(ḥajj)is one of the five pillars of Islam.¹ Muslims commemorate it every year in their home communities irregardless of those who are going on the Hajj themselves. The preacher is a key figure in focusing the ethical, motivational, and social structural implications of the Pilgrimage in his Friday congregational sermons during the Pilgrimage season. As a focus of piety and ritual devotion by millions of Muslims on an annual basis, directly by participation and vicariously by celebration, the Hajj is also a rich focus for symbolic interpretation. This chapter will first document and illustrate that...
Unless one appreciates the inextricable religious quality of polity, history, and society for believing Muslims, one not only misses but also misconstrues the significance of events in the Muslim world at the end of the twentieth century. From a Muslim perspective the good life is the next life, and life in this world, though not devalued since it is part of God’s creation, is preparatory for the next. The community exists to bear witness to God in the darkness of this world, darkness compared to the light of the next.¹ Every mundane act of the community, therefore, as W. Cantwell...
Oh worshipers of God, oh ye who follow the path of the Messenger of God, on the morning after the night journey, the Messenger of God, may God bless and grant him salvation, said to Umm Hani, the daughter of his uncle, Abu Talib, while he was in her house after the night journey:“Oh Umm Hani, I prayed the last supper prayer with you in this valley, then I was taken[by God]to Jerusalem and I prayed there. Then I returned and prayed in your house the noon prayer.” Umm Hani said, “Don’t tell people what you’ve told...
Discussions of Islam in the modern world often use a number of phrases which presume to describe a phenomenon, a process, and a set of beliefs without defining the terms in a clear-cut fashion or noting their relationship with one another. The two most commonly used phrases are “fundamentalist Islam” (sometimes referred to as “militant Islam,” “neofundamentalism,” or “faith-driven politics”) and “Islamic revival” (otherwise referred to as “Islamic resurgence,” “renewal,” “awakening,” or reassertion”).¹ One term that has rarely been used in these discussions but is nevertheless familiar to students of Islam is “Islamization.” In the discussion that follows I shall...
Processing your request... | http://slave2.omega.jstor.org/stable/j.ctt7zvxt0 |
Getting a company to call you in for a job interview is one of the hardest parts of the job search. What happens if circumstances force you to consider rescheduling? Believe it or not, having to reschedule the interview does not automatically disqualify you from the running.
Reasons to Reschedule
There are several valid reasons for having to reschedule a job interview. Personal reasons such as a hospitalization, a death in the family or another unavoidable emergency understandably require your immediate and full attention. If you are traveling to another city to interview and your flight is canceled, that's another valid reason. If you are currently employed, sometimes commitments related to your current position may arise and prevent you from interviewing. Your own health issues may also present a very good reason to reschedule. If you come down with a severe cold or the flu, the interviewer is sure to appreciate you reaching out to make alternate arrangements.
Tardiness
One big reason you may have to reschedule the interview is if you are running extremely late. This is a delicate situation, as you should always do your best to make it to your original interview on time and well prepared. However, getting lost, stuck in traffic or caught in bad weather can all make you run seriously behind. Rescheduling a job interview at the last minute can be a deal-breaker for potential employers, especially if they are on a tight schedule or must make a hiring decision quickly. Understand the possible consequences of rescheduling, and apply your best judgment should this happen to you.
Rescheduling Etiquette
The moment you realize you need to reschedule a job interview, notify the interviewer immediately, preferably via email and phone. You want to give the interviewer as much advance notice as possible, to show him that you respect his time. You are not required to give him the full details if it is a personal situation, but convey the seriousness or urgency of the situation as well as your regrets. If you cannot call or don't get through and must leave a voice mail message or send an email, follow up to ensure the interviewer received the message. If the interviewer allows you to reschedule, follow up with a short note or email thanking him for accommodating you.
After the Interview
Being allowed to reschedule a job interview is not the end of the battle. Even if you had a good reason to postpone, you are now at a disadvantage compared to other candidates who made it to their interviews on time and with no drama. Therefore, your follow-up routine after the interview must be top-notch to keep you at the top of the interviewer's short list. Prepare a handwritten thank you note for the interviewer, thanking him for his time, consideration and accommodation to convey not only your professionalism and graciousness, but also your gratitude.
Rescheduling a job interview does not have to spell doom for your job search dreams. Interviewers are people too, and they know that life sometimes gets in the way of best-laid plans. If you have a valid reason for rescheduling and go about it with professionalism and tact, you can salvage your reputation, ace the job interview and still have a great shot at that dream job. | https://www.administrativejobs.com/articles/will-rescheduling-my-interview-look-bad--17239-article.html |
Communications officials from the Liberal Party of Quebec (PLQ), Quebec Solidere (QS), the Conservative Party of Quebec (PCQ) and the Parti Quebecois (PQ) emphasized the importance of being active online for a successful campaign. (Photo: The Canadian Press)
The campaign launch – scheduled for Sunday – will be the starting gun for five weeks of door-to-door press conferences and debates. But much of the battle to come will also be fought through likes, shares and comments on social media, as the battlefield becomes increasingly digital.
“It has become increasingly important over the last three or four electoral cycles, particularly in Quebec,” explains director of the Department of Political Science at Laval University and expert in political communication, Thierry Jason. “Since 2012, all major players have been present on all digital platforms, and obviously here we are talking about the web, all social media, networking platforms, photo and video sharing sites.”
Communications officials from the Liberal Party of Quebec (PLQ), Quebec Solidere (QS), the Conservative Party of Quebec (PCQ) and the Parti Quebecois (PQ) emphasized the importance of being active online for a successful campaign.
The coalition Avenir Quebec did not respond to requests from the Canadian press.
chameleon strategy
Although all parties appear on different sites, they “will reject content that matches the peculiarities of each of the platforms and according to the party’s strategy, according to the voters we want to speak to in priority, we will prioritize actions on certain platforms rather than others,” says Mr. Jason.
For example, according to data analyzed by the University of Quebec in Montreal, Professors Jean-Hugues Roy, Eric Duhemy and PCQ dominate Facebook, with a total of at least 59, 7% of all interactions recorded from May 1 to August 11 on Facebook pages. The five major parties and their leaders. By comparison, second in the race is outgoing Prime Minister François Legault and CAQ, with 15.6% of interactions.
According to PCQ Director of Communications, Maxime Hupé, this success is partly due to the fact that “Eric (Dohemy) has been livestreaming on Facebook every Tuesday at 7 p.m. for nearly a year now”, creating a habit and allowing direct communication with the audience. He also claims that his boss “found the right tone and the right words to ensure there was interaction in his positions.”
However, if you go to sites frequented by younger internet users, QS has the upper hand. On Instagram, during the same period, QS accounts and their spokespeople together generated 60.9% of interactions, followed by 26.6% for Mr. Legault and CAQ.
Julian Royal, social media strategist at QS, says it relies on “word of mouth” and “organic engagement” of content produced throughout the year. He cites videos of Gabriel Nadeau Dubois “showing how politics is going (…) or even issues that may have come under the news radar” and other Manon Massey having “live” discussions on Instagram with various Quebec personalities.
People who view and share this content “inevitably build a long-term relationship with us” and are already involved when an election is held.
The party’s head of communications and digital marketing, Maxime Roy, says efforts at PLQ are “based not on a single account, which is the party’s account, but on all candidates across Quebec” who coordinate to transmit ads. He sees social media as a complement to traditional media, making it possible to reach Quebecers who might not follow political news diligently.
On the PQ side, the Internet is “one of our best means of communicating with citizens, our attitudes and reactions and also the material that is most playful, presenting our candidates in the heat of the moment”, assures its Director of Communications, François Leroux.
Social networks also allow you to dig deeper than when you’re writing a column, for example, he says. When you have “a big show with a lot of material, with several points, sometimes it’s a lot easier to meet the citizens on social media, where they can spend their time” to fully understand the proposal.
custom message
But we must not forget that online data is the nerve of war, recalls Sherbrooke University lecturer and political and digital expert Emmanuel Schockett. He explains that these are “used to mobilize, target, and partially target voters who we will know may be more attentive, and who have an ear that may be better suited to the message” of his party.
Not only age or gender are checked, but also “where you live, your education level, your income” and even “items of preference, items shared” guessed through social media interactions. For example, admiring a meme that says poutine should be the national dish in Quebec could indicate that one is sensitive to identity issues.
When parties buy ads on social media, they can choose a target audience that “takes into account a wide range of socio-demographic characteristics around each person and allows us to target people who are most likely to” stick to our message for all of these reasons,” says PCQ’s Mr. Hupé.
“We want to join all voters, but a certain audience is definitely more attracted to a certain message, so social media is useful for reaching these people with our proposals for them,” adds Ms. Leroux of PQ.
But targeting is also a geographic issue, according to PLQ. In addition to being able to “join a voter on a particular topic,” it also allows a “candidate to express themselves as they drive” without flooding the wires with news of people living elsewhere, explains Mr. Roy.
The algorithm itself is unknown to the parties, because it is jealously guarded by the platforms.
in the street
Despite everything, both parties agree that nothing can replace direct face-to-face contact with citizens, and that Internet communication serves above all to facilitate work in the real world.
According to Mr. Roy, “certainly, the field campaign by the candidates is the most important thing to reach and exchange with the voter.”
“Activism on the ground is the heart of politics,” says Mr. Leroux. Social media is essential to a campaign these days, but it is one element among others.
At QS, “The web is an integral part of our mobilization strategy, not just a matter of advertising or just one-way communication, according to Mr. Royal. It is a way to connect with people to get them to engage” in the party, during elections or demonstrations.
“Interested people, who interact with our page, we want to communicate with them via email, and then we want them to register as members,” explains Mr. Hupé of PCQ. An official party membership allows the party to know its phone number and address. The party can then “use the information as a form of registration more broadly to see who is supporting us across the county,” he says. This also makes it possible to contact its members “so that we can ensure that they are out on pre-polling day and during the election”. | https://artinthemail.com/2022/08/30/elections-social-networks-will-be-at-the-heart-of-the-campaign-3/ |
What is Mindfulness? Mindfulness is the energy of being aware and awake to the present moment. It is the continuous practice of touching life deeply in each moment of everyday life.
To be mindful is to be truly alive, present and at one with those around you and with what you are doing.
~ Thich Nhat Hanh
One of the finest known and most respected Zen masters in the globe today, poet, and peace and human rights activist, Thich Nhat Hanh (named Thây by his students) has led an extraordinary life. Born in central Vietnam in 1926 he joined the monkshood at the age of sixteen. The Vietnam Fight confronted the monasteries with the question of whether to adhere to the contemplative life and remain meditating in the monasteries, or to support the villagers suffering under bombings and another devastation of the fight. Nhat Hanh was one of those who chose to do both, supporting to found the "engaged Buddhism" movement. His life has since been dedicated to the work of inner transformation for the benefit of individuals and society.
About Mindfulness Meditation :
Mindfulness is a modern movement, appropriated from ancient Buddhist roots. The practice of mindfulness involves being aware moment-to-moment, of one’s subjective conscious experience from a first-person perspective. When practicing mindfulness, one becomes aware of one’s "stream of consciousness". The skill of mindfulness can be gradually developed using meditational practices that are described in detail in the Buddhist tradition. The Five-Aggregate Model, an ancient feedback between mind and body, is a useful theoretical resource that should forum mindfulness interventions. The term "mindfulness" is derived from the Pali-term sati which is an essential element of Buddhist practice, including vipassana, satipatthana, and anapanasati.Mindfulness is also an attribute of consciousness long believed to promote well-being. Huge population-based research studies have indicated that the concept of mindfulness is strongly correlated with well-being and perceived health. Studies have also shown that rumination and worry contribute to mental illnesses such as depression and anxiety, and that mindfulness-based interventions are effective in the reduction of both rumination and worry.
Zen Master Thich Nhat Hanh is a global spiritual leader, poet and peace activist, revered throughout the globe for his potent teachings and bestselling writings on mindfulness and peace.
His key teaching is that, through mindfulness, we can learn to live happily in the present moment—the only idea to truly develop peace, both in one’s self and in the globe.
Thich Nhat Hanh has published over 100 titles on meditation, mindfulness and Engaged Buddhism, as well as poems, babes’s stories, and commentaries on ancient Buddhist texts. He has sold over three million ebooks in America alone, some of the finest-known contain Being Peace, Peace Is Each Step, The Miracle of Mindfulness, The Art of Power, Real Love and Anger.
Thich Nhat Hanh has been a pioneer in bringing Buddhism to the West, founding six monasteries and variety of practice centers in America and Europe, as well as over 1,000 local mindfulness practice communities, known as ‘sanghas’.
Thich Nhat Hanh, is a gentle, humble monk – the lad Martin Luther Boss named “An Apostle of peace and nonviolence.” The media has named him “The Father of Mindfulness,” “The Another Dalai Lama” and “The Zen Master Who Fills Stadiums.”
Learn more about Thích Nhất Hạnh at the following blogs:
Thich Nhat Hanh Foundation: Planting Seeds of Compassion
www.thichnhathanhfoundation.org/?gclid=COKYluK9rc4CFUE2gQodqa0GqQ
Plum Village: Mindfulness Practice Centre
plumvillage.org/about/thich-nhat-hanh/
Thích Nhất Hạnh: Twitter
twitter.com/thichnhathanh?ref_src=twsrc%5Egoogle%7Ctwcamp%5Eserp%7Ctwgr%5Eauthor
Thích Nhất Hạnh: Fb
www.fb.com/thichnhathanh/
Thích Nhất Hạnh: Amazon
www.amazon.com/Thich-Nhat-Hanh/e/B000AP5YRY
"I will cultivate openness, non-discrimination, and non-attachment to views in order to transform violence, fanaticism, and dogmatism in myself and in the globe."
- Excerpt from a Thích Nhất Hạnh Mindfulness Training
♡ GLOBAL WELL-BEING: May we all learn to live together in peace and harmony with every another, ourselves, the world and all that lives throughout time and zone :-)
#GlobalWellBeing
JUST USING THIS LINK to check out the "TRY AUDIBLE AND GET TWO FREE AUDIOBOOKS" offer from Amazon Gets you 30 DAYS OF MEMBERSHIP FREE, plus TWO FREE AUDIOBOOKS that are YOURS TO KEEP FREE FOREVER" And by JUST USING THIS LINK to check out the "TRY AUDIBLE AND GET TWO FREE AUDIOBOOKS" offer, you are HELPING TO SUPPORT THIS CHANNEL. So...THANK YOU VERY MUCH :-) ♡ https://www.amazon.com/Audible-Unpaid-Trial-Digital-Membership/dp/B00NB86OYE/?ref_=assoc_tag_ph_1485906643682&_encoding=UTF8&camp=1789&constructive=9325&linkCode=pf4&mark=globa0f5-20&linkId=5a5929afc989f33704fb6192059eded9
How to breath out..through mouth or nose?? And also do we need to inhale and exhale just we do in yoga or do we need to observe are normal breathing?
This is outstanding!! Thank you from my entire being Thich Nhat Hanh!
Chemtrail sunsets...
This brought such joy
This is pretty and life changing. Thank you so much for this 🙏
Thank you... I really appreciate mindfulness. 💜 With my mindfulness I've appreciated watching a bit of Master Sri Avinash recently. I've found his peace talks really heartwarming. 💓💛
Really enjoy your channel! Usually search something to calm our minds or create us feel a tiny more peaceful. Large love and respect. Hold up the nice work! Feel nonpaid to come over and check out some of our newest uploads.
So enjoyable :-D
We love you all .....from Australia.....
Search The Practice of Mindfulness Meditation ♡ A Guided Meditation Exercise with Thích Nhất Hạnh ♡ Global Well-Being song statistics with sub count live checker. | https://loopyt.com/the-practice-of-mindfulness-meditation-%E2%99%A1-a-guided-meditation-exercise-with-th%C3%ADch-nh%E1%BA%A5t-h%E1%BA%A1nh-%E2%99%A1-global-well-being |
Noted economist visiting Princeton to enhance study of Korea
Un-Chan Chung, a leading Korean economist and former president of Seoul National University, will spend this semester at Princeton to lend his expertise to the University's expanding focus on Korean studies.
Chung will be a visiting fellow at the Princeton Institute for International and Regional Studies (PIIRS). A professor of economics at Seoul National University for the last 30 years, he also has held senior positions in government commissions and private research institutions. He received his Ph.D. in economics from Princeton in 1978.
During his fellowship at Princeton, Chung will present a lecture on Korean economic growth on Monday, Sept. 22, and will serve as a commentator at a conference on "Vietnam and East Asia in a Globalized Context" planned for Thursday and Friday, Oct. 16-17.
"We invited Dr. Chung to join us because we recognized how valuable his presence would be in stimulating a deeper conversation on campus about the importance of Korean society: its literature, culture, political history and economic influence," said Katherine Newman, the director of PIIRS and the Malcolm Stevenson Forbes Class of 1941 Professor of Sociology and Public Affairs.
Chung served from 2002 to 2006 as president of Seoul National University, which is considered the country's leading higher education institution.
"I have always had a great longing to visit my alma mater to return what I received from my mentors and the fine education here," Chung said. "I am very eager to meet with my former professors in the Department of Economics and to discuss recent developments in economics, and I look forward to meeting as many professors, students and people in the Princeton community as possible."
His fellowship comes as Princeton has enhanced its attention to Korean studies by hiring two faculty members in the field, adding to the expertise of Gilbert Rozman, the Musgrave Professor of Sociology and a specialist in Korea as well as China and Japan. Joy Kim, an assistant professor of East Asian studies who joined the faculty in 2006, examines the cultural and social history of early modern Korea. Steven Chung, also an assistant professor of East Asian studies, joined the faculty last year and focuses on modern Korean cultural studies. The University's library collection in the field also has been strengthened through support from the Korea Foundation.
"Dr. Chung will be an invaluable resource on campus," said Sheldon Garon, the Dodge Professor of History and East Asian Studies. "As president of Seoul National University and an influential adviser to the government, Dr. Chung has been personally involved in many of the policies that have transformed South Korea's economy and society since the Asian financial crisis of 1997."
Chung's Sept. 22 lecture, titled "Uncertainty and Sustainable Economic Growth in Korea," will be delivered at 4:30 p.m. in 219 Burr Hall. It is the first in a series of three lectures to be given at the University this fall on the economic policies and political situations of Korea, hosted by PIIRS and the Program in East Asian Studies.
"This year marks the 60th anniversary of the inauguration of the government of the Republic of Korea, when Korea was reborn as a republic that pursues the modern values of democracy and capitalism," Chung said. "In East Asian countries, because 60 years complete one astrological cycle, the 60th birthday is deemed a very special occasion for celebration. It’s a befitting occasion to retrace the footsteps that South Korea has taken and to ponder on what lies ahead."
While at Princeton, Chung also will devote time to his ongoing research in macroeconomics, money and financial markets, specifically studying the nature and origin of the subprime mortgage markets, the American financial market crisis and the history of financial crisis in a global context. | https://www.princeton.edu/news/2008/09/17/noted-economist-visiting-princeton-enhance-study-korea |
It starts off with a few “just in case” trips to the bathroom, maybe before you sit down for a meeting at work, before you get into the car for a long ride, before the movie starts. Over time, it happens a little more; “I’m near the bathroom, I’ll just go in-case.” Eventually, it becomes more consistent, and your bladder begins to run the show. Before you know it, you’re feeling urinary urgency or peeing every hour, every 30 mins, every 20 mins; even though you just urinated not that long ago.
As you can see, “just in case” trips to the bathroom can cause abnormal urgency and frequency. It is process that happens slowly over the course of time. Constantly peeing “just in case” will train your bladder to think it is full when it is not. The stretch receptors send signals to your brain at lower and lower thresholds, eventually creating the urge to urinate more frequently. You may not even realize you have a problem, or that it has become abnormal. “I have a small bladder” you might say. But is your bladder really suddenly smaller than the average person, or has its threshold changed? The best way to know what abnormal is, is to first learn what is normal. The average adult bladder capacity is about 600mL (20 oz) but a typical adult voids when the bladder fills to about 300-400mL (10-13oz). At this rate, with adequate hydration, the average adult should urinate between 5-8x per day or every 2-4 hours. It is not normal to wake up to urinate at night on a regular basis, unless you are 65 years or older and then it may be common to urinate 1x per night some nights. If you are urinating more frequently or have abnormally strong urgency, this is a sign that your bladder is not functioning optimally.
Next it is valuable to ask yourself, why are you going to the bathroom “just in case?” Is it just a habit, out of convenience, because of your work schedule, or because you are trying to “prevent” urinary leakage due to incontinence? Then you can challenge yourself to retrain your brain and bladder to communicate better, hopefully leading to less unnecessary trips to the bathroom. Re-training your body may include intentionally avoiding “just in case” trips to the bathroom, logging your bathroom habits to see what your schedule looks like, being adequately hydrated, and being mindful of urinary urgency. When you have an abnormally strong urge to urinate, remember: “mind over bladder.” It is helpful to remain calm, take deep breaths, walk slowly to the bathroom, refrain from unbuttoning your pants until you are next to the toilet, and slowly sit all the way down before voiding. It may be extremely difficult to slow down this process at first, but with practice, it can help reduce your urinary urgency. Other factors that can contribute to urinary urgency include your diet/fluid intake, the strength, flexibility and coordination of your core muscles.
If you are a “just in-caser,” know where all the good bathrooms are at along the 1-35 corridor, or catch yourself rushing to the bathroom more frequently because your bladder is running the show- you might consider seeing a pelvic floor physical therapist for conservative and effective treatment, management and prevention of bladder symptoms.
Allyson Loupe is a physical therapist at Lake Area Therapy Services in Moose Lake, Minn. She has a doctorate in Physical Therapy from St. Scholastica and specializes in women’s health and pelvic health PT. The best way to reach her is by calling Lake Area Therapy Services in Moose Lake at (218) 485-2020. | https://www.mlstargazette.com/opinion/columnists/movement-motivation-mind-over-bladder-the-case-against-just-in-case/article_25e63220-df43-11eb-b40c-afbcfd1b09b1.html |
NOTE: This is my first debate on this website but only SERIOUS debaters please who fully understand LD (Lincoln Douglas) style value-based debate.
It is because economic sanctions do not properly preserve justice, I urge an affirmation of today's resolution; "Resolved, Economic sanctions ought not be used to achieve foreign policy objectives." To clarify this round, I offer the following definitions:
Economic sanctions: the imposition of international economic boycotts and embargoes.
Achieve: to gain with effort.
Foreign Policy Objectives: the objectives of the diplomatic and economic policy of a nation or group of nations in its interactions with other nations.
My value for this debate will be justice, defined as rendering unto each their due. Each individual in a justified society ought to be ensured a fair way of living and a healthy life, and thus, my value criterion is preservation of life. It is a belief in the inherent value of each individual from which we derive a need for abolishing economic sanctions that do not provide for the preservation of life and the provision for the pursuit of individual happiness and ultimately do not respect life. Thus, when we undermine a respect for human life, it becomes increasingly likely that rights violations will run rampant and individuals will not be rendered their due.
The affirmative's first contention is that the people carrying out the sanctions should target elites, or individuals with the most power or money over simply embargoing a whole country, as elites are often the cause of the difficulty of achieving foreign policy objectives- not the nonviolent and noncombatant citizens of a country. As stated by The Council on Foreign Relations, "In the great majority of cases, sanctions should target elites, [while they have been targeting] the populace at large. Iraqis are not our enemy. Nor are Cubans. We can be imaginative in targeting elites. We can single out individuals and agencies that give offense or outrage. We can devise civil and criminal punishments so that their persons and property are at risk whenever they travel or do business in a civilized world. This reminds that economic sanctions are inherently bad as they don't target the problem and instead target the nation as a whole. To add, According to the BBC, "Economic sanctions have contributed to a spike in infant mortality rates, a fallen literacy rate, starvation and is best defined as genocide." Ultimately, economic sanctions do not uphold the preservation of life if so many of the innocent are killed and therefore cannot uphold justice. We need alternatives such as diplomacy, which I will later discuss, that better uphold preservation of life and better target the problem itself, namely the elites, not nation at large. The rationale behind using sanctions is also flawed when we consider that we have other ways to target the noncombatants as well, and not the populace, while still being effective.
The affirmative's second contention is that the facts show these economic sanctions simply do not work enough to justify use. There is a long list of failed sanctions, the US embargo against Cuba being one. According to The CATO Institute, "The objective of the U.S. policy toward Cuba is how best to undermine the Castro regime and hasten the island's day of liberation. For almost half a century, the U.S. government has tried to isolate Cuba economically. The embargo had a national security rationale before 1991, but all that changed with the fall of Soviet communism. More than a decade after losing billions in economic aid from its former sponsor, Cuba is poor and dysfunctional and poses NO threat to American or regional security." Another example of failure is Poland, which didn't democratize from sanctions, and instead only with from withdraw of the Brezhnev Doctrine. I could continuously quote times they haven't worked, which is 5% of the time, according to Robert Pape's reevaluation of HSE's findings. But these examples are showing that the reasoning behind implementing economic sanctions is flawed, as they simply do not achieve foreign policy objectives in the large majority of cases. They are, in fact, worse for the countries involved, and we cannot justify our actions, as they simply do not work. Cuba still poses no threat to the US's citizen's after or before this sanction and Castro is still leading a communist country. But this terrible situation could have been prevented if we had used a better alternative such as using diplomacy through the UN as a medium, which over the centuries has worked many times to justify its use according to The Official United Nations Website. Diplomacy prevents the need for these sanctions, and also gives us peaceful, nonviolent resolves to achieve foreign policy objective. Furthermore, it solves the problem much quicker and better preserves life for the world as a whole. (In the end, we can't justify sanctions as they kill and fail to preserve life and much more often than not, fail to achieve foreign policy objectives.)
The affirmative's third contention is that economic sanctions cut off trade-, which can lead to many unprecedented and unintended problems with multiple nations. Countries over thousands of years, have all required trade to ensure life is preserved by providing goods and the growth of their nations. But when we cut off the means of a country to trade, we severely cut down the lifeblood of the nation. This may be what we want with these economic sanctions, so you may wonder why this is so detrimental. It is because of the slippery slope precedent that follows this. If one country is embargoed, that obviously can hurt trade with other countries, so multiple countries suffer as a result, and economic sanctions backfire and hurt those that are not only innocent, but should not be involved with the sanctions. As stated by The Finance Market, "The importance of international trade cannot be ignored. It has contributed immensely to the all sided development of a nation. It has brought about political, social and economic upliftment of countries. International trade, in a majority of the countries have contributed significantly to the gross domestic product or the GDP. It has served as a platform for "globalization". This further illustrates that we cannot use economic sanctions as they would hurt trade, which is incredibly important for multiple nations, and the welfare of its citizens lives, as well as making sure their due is ensured. It doesn't just affect them; it affects the country's the nation trades with, and those around them. In the end, the sanction impacts more innocent than just the target nation, and we see these actions being unjustified as we would be limiting globalization on an unintended scale and in the end not achieve foreign policy objectives, and therefore we cannot further the human race's progression when items, ideas and information not being shared. (We then see that cutting off trade is an unjust action that has led to lack of preservation of life, as it cuts vital resources needed for nation to survive).
It is for these reasons I strongly urge an affirmative vote.
Economic Sanctions, from the Heritage Foundation: "any restriction imposed by one country (the sender) on international commerce with another country (the target) in order to persuade the target country's government to change a policy." Kofi Annan expands this definition to include "targeted sanctions which prevent the travel, or freeze the foreign bank accounts, of individuals or classes of individuals."
It is important to prefer this definition because it provides the most up-to-date view as to what sanctions are. The aff's definition is very much the 20th century model of the sanction, and I should not be bound to debate the policies of the past when we are debating what ought to happen in the future.
My value is Governmental Legitimacy. The resolution ultimately poses a question about state actors and their duty within the context of economic sanctions. Because a state actor must always act legitimately or reap physical and moral harm, this is the best value for this round. The criterion will be Preservation of Human Life, because as Dr. Robert Britt writes:
"A nation is only legitimate insofar as it recognizes the ultimate value of the human life. When faced with decisions in which a government must act and either choice can lead to the loss of human life, a government ought act to halt genocide and autocratic regime's stranglehold on populations, as loss of life in the act of freedom is ultimately valued more than that sacrificed through tacit consent"
C1: Sanctions Succeed
Economic sanctions are a remarkable took when wielded properly. Governments constantly refine them to become more streamlined and effective. The latest wave of smart sanctions exemplifies such an advance.
Salim al-Sanat Governor of the Bank of Indonesia provides an example, "The international community's sanction on banks that allow terrorist accounts forced other banks to take action to ensure that the accounts of terrorists were frozen and funds relocated to be inaccessible. Before the use of sanctions many banks were reluctant to freeze such accounts, but sanction[s] convinced [them] to [freeze] terror groups out of 900 million dollars in the Bank of Indonesia alone."
This analysis is furthered by empirical data. After applying 115 different sanction policies through a rigorous statistical calculation, Shagabutdinova and Berejikian (07) conlude that:
"[Smart] sanctions increase the probability of the best outcome by 23 percent for policy result. Similarly pure sanctions reduce the probability of the worst outcome for concession by 29 percent result."�� Their data further shows that these targeted sanctions have a failure rate of only 13%.
C2: Removing Sanctions Leaves the Only Recourse as War
Lauren et al. describe the system of international relations on three levels: negotiations, coercive diplomacy, and military action. A country's first recourse is negotiation. However, it is often the case in crisis situations that negotiations fail because of the incompatibility of viewpoints. When such events transpire, a country has two choices: place a sanction, or escalate to troop movement and warfare.
The use of sanctions only became prominent after WWII because of the multilateral nature of the global economy. Sanctions provided the world with an alternative methodology with which to pursue peace, and we finally moved beyond a black and white world of negotiations versus warfare. At the point that we cannot sanction, countries have two choices: send a strongly worded letter and watch atrocities unfold, or engage in full-out warfare.
Forced warfare is an incredibly blunt tool that relies on one country's ability to physically bludgeon another into submission. Both sides suffer great casualties, and one only has to look to history to see the immense human and financial cost of warfare.
Tacit consent to atrocities leads to just as destructive outcomes. Joseph Semelin writes "large-scale massacres cannot occur without genocidal states benefiting from the passiveness, of other states. Lack of intervention at the international level that leaves the way free for genocidal operators. When public opinion commits itself implicitly to the process of violence then the descent into massacre increases in probability. This can only be compensated for by the external intervention of an international public opinion."
---
Regarding the affirmative case, we see that all the offense is related to the economic sanctions of the past, and I will agree that sanctions have failed before. But we must remember that there is no single diplomatic tool that has a 100% success rate. In fact, by the aff arguments, we ought not go to war due to the human cost, leaving the only tool as negotiation!
Our values are fairly similar; a legitimate government is just, and justice creates a legitimate government. Thus, we should be looking at who impacts through the criterion of preservation of life more effectively
Let's take a moment and cross-apply my opponent's arguments historically. Before the 16th century, war was a horrible method of achieving objectives - it led to the huge massacre of civilians and mass lootings, stripping a country of its wealth. It was really only in the 16th century, when soldiers took the fighting out of the towns and cities and into neighboring fields, and accepted the difference between military and civilians that things became more humane.
Similarly, diplomacy was a complete failure until the 1815 Congress of Vienna, when nations finally understood the principle of compromise.
Sanctions have been around for less than a century, and are evolving at a much faster rate than either diplomacy or warfare - it would be a mistake for us to discard them.
You can look to my 2nd contention to see that without sanctions in the diplomatic toolbox, we can either stand by and let atrocities occur or go to war and harm civilians. When you affirm, you guarantee an increase in the number of innocent deaths by tying government hands.
You can turn the affirmative first contention - I can target governments and individuals with smart sanctions, and I will elaborate in the second rebuttal. Sanctions that cause increases in mortality were those placed on foods and medicines - mistakes the Neg does not have to repeat. Sure, old sanctions target the entire nation, but criticizing sanctions based on old sanctions is like criticizing medicine based on bleeding done in the 1700s.
Diplomacy is a wonderful tool and ought to be the first choice, but again, I can list hundreds of situations in which it has not worked. A choice few: Iraq, North Korea, the Khmer Rogue, and WWII. The list is even longer than the sanctions which have not succeeded. The fact is, diplomacy fails when countries are not open to making compromises. Sanctions can soften up a dictatorial regime or terrorist organizations to the point that diplomacy can work.
The Aff cites Cuba and Iraq as examples of failed sanctions, and I agree that sanctions did not achieve their objectives there. However, I am not bound to advocate that countries always use sanctions in every case, but that they retain the ability to use them.
The third contention is again dealing with comprehensive sanctions. This is not true of modern sanctions however. By freezing bank accounts and stopping the trade of luxury goods like iPods and sports cars, they can effectively hit the elites.
Finally, the 5% rate that the Affirmative offers is flawed - I unfortunately cannot cite the card this round due to space, but can post it in the comments section if desired.
I would like to start by thanking skookie for giving me the chance to dust off my old sanctions cases and get back into the debate mindset before nationals - I apologize for skimping on opening and closing courtesies last round, but my case and rebuttals ran right up to character limit.
This round will be somewhat of an anomaly; skookie is at a debate tournament and thus unable to post an argument this round. He posted about this in advance, so the above forfeit should not be counted against him when you attribute conduct points while voting. We will resume debate next round and conclude debate in Round 4. Neither of us will post any sort of arguments in Round 5. Basically, the debate will follow this map:
R1: Constructives
R2: Filler
R3: Rebuttals
R4: Closing
R5: Nothing
Because there are no arguments in this round and my arguments ran right up to the character limits last round, I will simply be sourcing my arguments from round one. Most of them were paraphrased from evidence whose qualifications I could not post previously. I have run this by skookie, and he is fine with it.
With that, four sources:
First, when I refer to "Lauren et al.", I am referring to the book 'Force and Statecraft', a study on international relations and diplomacy over time. See: http://www.us.oup.com... . The authors hold various history and international relationship professorships at various universities.
I stated that smart sanctions are a recent development, the result of the rapid evolutions of sanctions. I was referring to these two pieces of evidence.
Jeremy Torranz '06 (I'm trying to find the source article so I can provide credentials)
Economic sanctions have only been used in the past 60 years as a serious part of foreign policy. [O]nly in the past decade [have] economic sanctions begun integrating all that we have learned into a new generation of sanction protocolgranted that in the past economic sanctions have caused harm to innocent civilians, the economic sanctions levied in the current generation have shown little effect on innocent populations, while still having a high rate of success. To criticize economic sanctions due to failures in the 1960's-90's is much like criticizing medicine today for the practice of bleeding in the 1700's. We know now that food sanction ultimately lead to death, whereas financial and luxury good sanctions are effective at mobilizing the rich against the government in question with little harm to the population at large."
and
Professor Lopez from Syracuse University '07
"Sanctions techniques have become increasingly effective. This trend can be attributed to a number of mutually reinforcing realities. First, policymakers from the United States and the international community now recognize those factors in sanctions formulation and implementation that lead to success. Second, the development of "smart sanctions" provide greater versatility while limiting humanitarian damage. Third, the success of sanctions necessitates a coordinated strategy that balances sanctions and incentives as complementary tools designed to pressure and encourage delinquent states into changing their behavior."
Finally, regarding percentages:
John Hovi at the University of Oslo explains that
"Percentage statistics of the success rates of economic sanctions are highly misleading as the leading research on sanctions misconstrues the evidence by including sanctions that were meant to be symbolic or show the citizenry that the country is taking a stand against the evil of another government. When sanctions that were intended to merely take a stand and were levied with little expectation of success are removed from the formula, the percentage of success rises to over 52%, with an additional 30% being at least partially effective at reaching a foreign policy goal."
You'll notice that this 82% combined rate agrees well with Shagabutdinova and Berejikian's 13% failure rate.
Those were the three cards I was unable to cite in the previous round, and I hope that they've made the negative ground in this debate a bit clearer.
I haven't received word from skookie about the above forfeit, so I will reinforce some of the impacts I brought up in R1.
The entire negative case and rebuttal have been dropped, so those arguments can be extended through the flow. The analysis I provide in this round concerns links into the value criteria of preservation of life.
1) Aff link to VC of Preservation of Life
You can look at the analysis under my second contention, which shows you that affirming ultimately leads to the loss of far more life by limiting the diplomatic toolboxes of nations to war or diplomacy.
Semelin '07 showed that for dictators to commit genocides or massacres, they have to believe that they can get away with it. When countries are unable to go to war, they are forced to rely on just diplomacy. Let's face the facts - receiving an angry letter signed by the world really will not stop genocidal operators. It will only succeed if the nation in question is willing to open up and discuss the issue.
The Britt card under my criterion shows us that the best way for a nation to value life is to actively protect it, and affirming severely limits the capability of the world to do so. When the only active step a nation can take to stop dictatorial regimes is war we see a vast increase in deaths because war, ipso facto, involves governments sending soldiers into war, some of whom will die, and many of whom will cause collateral damage.
2) Sanctions will constantly self-correct
Lopez '07 provides the warrant, Shagabutdinova and Berejikian provide the model, and Hovi provides the empirics. Sanctions, much like any tactic, will always improve as nations learn exactly what factors make them successful and what factors contribute to failure. Over time we have learned that inconsistent application (Burma - we sanctioned a few mines and a pineapple juice company...) or targeting necessities (Iraq - food and medicine) are incredibly inefficient methods that can have tremendous human cost. We have also learned that sanctions of banks, luxuries, and travel can be incredibly effective at pressuring the elites.
Lopez tells us that we are constantly learning from our mistakes and successes. Shagabutdinova and Berejikian performed a logit-ordered regression to examine the correlation between the implementation of smart sanctions and and predict that they are far more effective than traditional sanctions. Hovi confirmed this correlation with an analysis of sanctions policies that have actually been implemented.
Thus, negating allows us to further hone our sanctions capabilities and increase our ability to preserve life.
Remember, the negative burden is to show that countries ought to have the ability to use sanctions, not that they are compelled to levy them at every given opportunity.
Just so you know, I have a debate tournament so I may or may not have to forfit this round, in which case could you possibly concede as we prviously planned (just a bit earlier-will debate into later round I guess), I'll leave a disclamer, and we can debate in later rides when I will have time this weekend?
"Percentage statistics of the success rates of economic sanctions are highly misleading as the leading research on sanctions misconstrues the evidence by including sanctions that were meant to be symbolic or show the citizenry that the country is taking a stand against the evil of another government. When sanctions that were intended to merely take a stand and were levied with little expectation of success are removed from the formula, the percentage of success rises to over 52%, with an additional 30% being at least partially effective at reaching a foreign policy goal."
If it is okay with you, I hadn't realized I set it to 5 rounds. If you don't mind conceding either 4 or 4 and 5 I will do exactly the same after leaving a disclamer (don't have too much extra time :) Thanks
| |
Knowledge of life and classification of living beings has reached such progress that is currently divided into five kingdoms or domains: Monera (which includes bacteria), Archaea (extremophiles), Protoctista (protozoa and algae), Fungi (fungus and yeasts), Animalia (animals metazoans) and Plantae (plants).
The kingdom or domain of the Plantae or plants are characterized by organisms with cells containing organelles, called chloroplasts with a photosensitive green pigment, chlorophyll and a metabolic system that allows them to produce their own organic matter and energy from the uptake of carbon dioxide, water and light.
With this they are able to produce energy, sugar molecules and release oxygen as a byproduct. They are therefore autotrophic organisms, because from these molecules changes can be made to use sugar as an energy source and thereby produce other compounds. That is why in ecology plants are defined as “primary producers”.
The first plants appeared about 416 million years ago during the Devonian; initially their shapes were similar to their ancestors the algae, and resulted in shapes similar to mosses; subsequently others appeared similar to ferns and then lead to the gymnosperms (such as conifers).
During the Cretaceous angiosperms or flowering plants appeared.
Throughout the whole chronology, plants have shown there an increasing complexity in their structures and likewise a lot has been extinct.
Plants have evolved into different forms of life: the great division is between the herbaceous and woody. Thus we have as life forms trees, shrubs, herbs, geophytes, rosettes, epiphytes, palm trees, climbers and parasitic plants.
The obvious component of biomes, of vegetation and landscapes, are plant communities with all visible forms of life that may harbor. Herbivores depend on plants and carnivores depend on herbivore populations. Finally, this whole chain also depends on human survival.
“Without the presence of plants we cannot conceive ecosystems and landscapes as they are today. Since plants are sessile, meaning they do not move; they form associations between them, communities and types of vegetation covering the continents in relation to different climates.”
Another important characteristic is that plants do not inhabit evenly on the planet and each species has its own distribution range.
So, there are widespread species and others of restricted distribution. Some are of more recent appearance and other are older. Some are relicts of acient large distributions.
Some regions of the world are of special interest, by its characteristic flora, and because they are ancient centers of origin for processes of plant domestication for different purposes such as food, textiles, ornamental, medicinal, etc.
A region, which for us is of special importance is Mesoamerica, which includes the southern part of Mexico. Of this, let us just remember that Mexico is the country that ranks fourth worldwide in biodiversity.
Here it is estimated to accommodate about 30 thousand species of plants (26495 species, data CONABIO) covering all possible forms of life. | https://www.landuum.com/en/plantae-and-fauna/__trashed-2/ |
The next IDRIM Conference will take place in Nice, France on October 16 -18, 2018.
The 2019 annual event for researchers and practitioners in integrated disaster risk management (IDRiM) will focus on the issues of “Knowledge-based Disaster Risk Management: Broadening the scope by « Smart Territories » for Sustainable and Resilient Cities and Organizations”.
The main themes of “Smart” are related to integrating the “knowledge society and knowledge economy, sustainable development, and social inclusion”, with complexity theory, such as, for example, the important role of interconnectivity of networks and feedback effects. How and when this connectivity becomes positive or negative is both a challenge for “hard” sciences (e.g. what are the formal methods that provide valid tools to assess the efficiency of networks, as in see graph theory) and “soft” sciences in the field of risk, resilience and disasters (e.g. participative and deliberative governance frameworks).
The denomination “Smart City” is commonly given to an urban area that incorporates information and communication technologies to enhance the quality and performance of services such as, for example, energy, transportation and utilities in order to reduce resource consumption, waste and overall costs. A Smart City could contribute to enhancing the quality of living for its citizens through smart technologies. The main focus is on physical networks connectivity.
A territory is an organization that includes a set of sub-component organizations. These organizations can be regions, cities, villages, hamlets… They can be companies (e.g. industries, pipelines). They can be physical entities or legal entities. They can be visible or invisible (e.g. social networks).
To understand how a territory can be “Smart”, we have to look both at the whole territorial organization and the interaction between these organizations at the broader level.
One of the distinctions made by geographers and regional scientists is that “Smart Territories” examine themes such as economic, social activity, and governance at different scales (large heterogeneous areas versus smaller, primarily urban, areas). Another aspect is the relationship between cities and their hinterlands.
The IDRiM2019 conference brings together researchers and scientists, regulators, risk and insurance, safety and security practitioners, media and NGOs to share expertise and practices on these two challenges:
- How to improve the common understanding of major extreme risks, man-made and natural disasters;
- How to foster individual, organizational and territorial abilities to manage and govern known and emerging risks and resiliencies.
The local organizers are CNRS-University of Nice (UMR ESPACE) and AFPCN (French Society for the Prevention of Natural Disasters) and their national/local partners.
The location of the conference was carefully selected. The Alpes-Cote-d’Azur region is exposed to several natural risks (e. g. flooding), industrial risks (e. g. industry, transport of dangerous goods) and societal risks (e. g. terrorism). It is also an attractive conference venue. | https://idrim2019.com/idrim-2019/ |
Since its launch in April 2018, NASA’s Transiting Exoplanet Survey Satellite (TESS) has found a number of extrasolar planets, including the so-called “missing link,” an exo-planet with three suns. However, a new study suggests that up to $200 million in a satellite may also have noticed that the ios 9.
The study, which was published in the Study Notes on the BAIT, noted that SHE was able to take multiple photos of the same location in space, which may be localization of the trans-Neptunian objects (also known as TNOs.
Since SHE has the ability to detect objects at about a 5 pixel displacement and for the Planet Nine, has an estimated volume of 19 < V < 24,” they reported, “that SHE may be in there.” the authors wrote in the study.
An artist illustration of the Planet, Nine of them, in a hypothetical world in which some scientists believe is hidden in the distant outer solar system.
(R. Hurt (IPAC)/Caltech)
EVIDENCE ON THE MYSTERIOUS PLANET OF NINE, CONTINUES TO BE FIT, MIGHT BE ‘THE SOLAR SYSTEM’S ‘MISSING LINK’
“What SHE’s doing is looking at the regions of the air, for months at a time,” the study’s lead author, a Harvard University astrophysicist Matt Holman, said in an interview with Fox News. “It is the search for exo-planets, and you can find those by looking at the paths of the host star.”
“And to do that, the collection of images one at a time, and it is available for all objects in our solar system,” Holman added. “The most important thing that I really don’t think that people realize is when you have a small telescope like TESS, you can combine images to find faint objects.”
SHE was in the room, so that it doesn’t have to deal with the Earth’s atmosphere getting in the way of the four cameras, as Holman pointed out to us. “It’s a stable platform.”
The researchers tested the idea that the TNOs can be found by using the predicted movement in the expected values of the distance and the trajectory of the movement. They used the software to three well known TNOs, Sedna, 2015 BP519 2015 BM518, and it was felt that it would work on any object with a near-infrared magnitude of about 21.
According to the SyFy Thread, Planet-9 has a near-ir magnitudes between 19 and 24, so that it is possible that SHE may have already been observed.
Holman noted that SHE has looked at the whole of the southern hemisphere, so the opportunity to “virtually 100 percent” of a Planet of 9 has already been mentioned, as it is in that part of the sky. “If it’s in the Northern Hemisphere, we’re not there just yet,” he added.
SHE was launched in April of 2018, it is replaced by the Kepler telescope, which started with a failure in the direction of the latter part of last year, and was finally retired in October of 2018, after the discovery of the 2,600 and more exo-planets, 18 of which are earth-like planets.
In September of 2018, SHE found the first extrasolar planet. Seven months later, in April of 2019, has found the first Earth-sized planet.
PLANET, 9 MAY IS NOT A PLANET, BUT IS, RATHER, A PRIMORDIAL BLACK HOLE,’ A SHOCKING STUDY SUGGESTS
It is the evidence of the Planet’s Nine?
A hypothetical planet is described as “the solar system’s ‘missing link’,” Planet of 9 (also known as Planet X, a) is a part of the lexicon for a number of years, mentioned for the first time in 2014. It was brought up again in 2016, when the Caltech astrophysicists Mike Brown as well as Konstantin Batygin first wrote about it.
THE HUNT IS ON FOR THE MYSTERIOUS PLANET-9
In October 2017, Batygin said that there were “five different lines of observational evidence” may point to the existence of the Planet is an ideal choice.
The five lines of evidence are:
– The six known objects in the Kuiper Belt, all of which have elliptical orbits which are pointing in the same direction.
The trajectories of the objects that are all tilted in the same way, to 30 degrees down.”
Computer simulations show that there is more to the objects tilted with respect to the solar plane.”
Planet Nine is responsible for the tilt of the planets in our solar system; the plane of the orbit of the planet is tilted approximately 6 degrees from the Sun at the equator.
A number of objects from the Kuiper Belt orbit in the direction opposite to that of the rest of the solar system.
“No other model that can explain some of the weirdness of this high-inclination orbits,” Batygin said at the time. “It turns out that the Planet is Nine, provides a natural way for their generation. These things have been turned out of the solar system’s plane with the help of Planet-9 and are then spread out to Neptune.”
In October 2017, when NASA released a statement saying that the Planet-9 is, perhaps, 20 times farther from the Sun than Neptune), going so far as to say, “it’s hard to imagine our solar system without a Planet 9 and up.”
Some researchers have suggested the mysterious planet may be hiding behind Neptune, and it can take up to 1,000 years old before it can actually be found.
Two of the studies were published in the March 2019 and is offered in support of its existence is, however, a separate study, which was published in September of 2019 as stated in the theoretical object is a giant planet hiding behind Neptune, but in place of the original black hole.
In a study published in the January 2019 at the latest, suggested that some of the smallest of the celestial bodies of our planetary system and is not affected by the yet-to-be-discovered planet, but the mysterious object deep in the echoes of the room. | http://hoholok.com/planet-9-may-already-have-been-found-a-study-suggests/ |
As part of our existence, dreams are often perceived as a natural thing. Whether we like it or not, the moment we close our eyes, there’s a good chance that we will be experiencing mental images in our heads.
From a psychological perspective, these mental images in the dream state are perceived as direct outcomes of our psyche. Depending on the contents stored in our psyche, we’ll have some dreams as a form of manifestation to us.
But from a Hinduist perspective, dreams mean much more than that. As such, in this article, we’ll be exploring the meaning and function of dreams and how they can lead us to the afterlife.
The Prelude – A Detour to the Psychological Approach
Before proceeding to how Hinduists view dreams, it is crucial for us to take into account the psychological perspective. By doing so, we’ll be able to properly move forward on our discussion on how dreams bear a unique value in all these key areas.
To begin with, the examination of dreams in the psychological arena started to gain popularity after Sigmund Freud. As one of his greatest contributions to psychology itself, Freud pointed out the existence of the preconscious, conscious, and unconscious mind.
With this theory, Freud argued that the value of dreams is most likely relevant in these key areas of one’s psyche. By experiencing contents from the unconscious mind, you will most likely see mental images during sleep, which seeks to spark thoughts in you.
And so, we ask – how should these images be interpreted then? From a Freudian perspective, these images in dreams are always interpreted in relation to his theory of psychosexual development. With the five stages of psychosexual development, dreams are formed as a reminder of how one needs to tend to some stages that were possibly overlooked.
However, taking on this approach seems to posit a limited viewpoint. To forcibly interpret dreams simply from this theory almost certainly boxes out other interpretations of dreams.
As such, his protégé Carl Gustav Jung decided to veer away from this theory. Instead, he created his different levels of the psyche, which would then become the fundamental basis of explaining dreams.
Following the model of Freud, Jung created the concepts of conscious, personal unconscious, and the collective unconscious. To begin with, the conscious realm talks about the things that we are aware of. Whether it recognizes the color of our shirt or understanding the meaning of justice, the conscious mind is able to comprehend such, signaling that we are currently thinking about it.
Moving forward, the personal unconscious is the part of the psyche where we store our repressed goals and thoughts. When we favor one notion of morality over the other, we naturally repress the one that’s rejected and is automatically stored in our personal unconscious.
Finally, the collective unconscious contains things that our psyche has developed over time. As a species, Jung theorized that our psyche develops with us, and that its contents are carried over to the succeeding generations. With the concept of jungian archetypes, Jung developed the idea that we all have a shared set of responses that help us fill in our roles as we move along.
With that, the contents of our dreams are often filled by elements that are found in one or all of these areas of the psyche. As such, apart from the slice of pizza that you’ve had for dinner, you will naturally dream of things such as your shadow archetype, or even universal symbols such as chakras, the mandala and the great mother archetype.
By understanding that our dream state is a convergence zone, these symbols are speaking to us as they tell us what we need to learn, do, or unravel in ourselves. By correctly interpreting the meaning of these symbols, it will be easier for us to arrive at the conclusion that explains our dreams.
With this detour, we now have a psychological context in interpreting our dreams. And whereas these dreams may have varying meanings and contexts, understanding them from the lens of Hinduism doesn’t necessarily have to go against the established theories of dreams in psychology. Instead, this mystical viewpoint can be viewed as a support to accurately understanding dream states.
The Hinduist Perspective on Dreams
Taking on a mystical approach, the Hinduist dream interpretation doesn’t only view such as a form of self-discovery. Whereas the psychological approach suggests that the vital importance of dreams rests in being able to know the deeper parts of the subconscious mind, Hinduism perceives it to be more than such.
In this case, Hinduism understands dreams as a both knowing the self while unraveling man’s ultimate destiny. With the existence of dreams, we are able to provide depth to our own lives as dreams itself will prove that there is more than what we see, feel, hear, and touch.
Instead, the Hinduist perspective establishes a strong connection between dreams and the existence of the Atman or the light of consciousness. Given the power of Atman, we are able to reconstruct things at the dream state. Despite them being surreal, dreams can contain a distorted approach to reality itself. In this case, this also means that during the dream state, we are able to transcend the bounds of the material and the physical.
As such, the dream state suggests that there lies a world beyond the physical one. Being a form of reconnection to the divine, dreams symbolizes the infinite potential that we can achieve.
But more importantly, dreams are also seen as a way to take in Karma. Since we know that Hinduism believes in the concept of Karma, dreams are indeed one way to remind us of what we need to do in this life.
For instance, if you keep on dreaming about bad things, then perhaps it is a signal that you need to constantly work on your Karma. As your soul is eternally trapped in the eternal cycle of life and death, you must be able to continually pay good Karma in order to escape such.
If dreams, then, can signify our good and bad Karma, what is its function in relation to our ultimate goal as human persons? In assessing the end-point of dreams, what it simply tells us is that we need to be aware of the divine.
Easily absorbed in our mundane concerns, there’s a good chance for us to forget that we need to do well in this life so that we’ll get closer to the source as we achieve even more perfection.
Like road signs, dreams tell you if you need to go straight, take a detour, or even stop. Although its signals are not as clear as road signs, its mere existence alone should be enough to convince you to labor in this lifetime.
By laboring, you are able to produce good Karma in your life. As such, even in the face of hardships, you’ll be able to carry on and push through with what you really want.
Thus, from a Hinduist perspective, understanding dreams shouldn’t simply revolve on knowing that there is a transcendental reality beyond us. Instead, dreams should be seen as an inspiration for us to labor and carry on our Karma.
The Hinduist Perspective on the Dreamless State
Whereas the previous section focused on how dreams can impact us, this third part will show the value of deep sleep in our lives. As such, the psychological approach often doesn’t talk about this state because it is often perceived as a state of nothingness.
Unlike when we dream, these flashing images and symbols can be interpreted based on our context and psychological make-up. But when we don’t dream of anything, there is nothing to talk about. Meaning, nothing exists in our dream, and thus, it is logically impossible to make sense out of it.
For instance, if I try to discuss to you how an Ichiran ramen tastes like, you might get an idea of it because there are things to be pointed out, explaining what I’m trying to convey.
With that, can there be any value to dreamless states?
For Hinduism, dreamless states are seen as the third and the highest form of consciousness. When we are in state of deep sleep, Hinduists believe that we are temporarily reconnected with the divine. Why so?
The dreamless state is understood to be a prelude to perfection. During the dreamless state, we desire nothing, we feel nothing, we hear nothing, we think of nothing at all. As such, this experience is often likened to when we finally reconnect with the Brahman.
To make things simpler, our current existence is seen as a drop from the ocean. As this drop travels across worlds, it experiences things. Like us, we meet new people, pursue a new career or passion, and give meaning to our own existence. However, when we finally reconnect with the ocean, all these things will eventually fade into nothingness.
As this drop becomes the ocean, it loses itself. It is not anymore the same. Similarly, when we finally reconnect with the Brahman, we also lose ourselves. Instead of bearing our own individuality, we become one with divinity and perfection itself.
With that, then the dreamless state is perceived as a temporary reconnection with the Brahman. By going into a deep sleep, we become well-rested the morning after since no feelings of joy or sadness have bothered us. Instead of being concerned with our mundane affairs, we become temporarily reconnected with the divine.
Yet similar to dreams, the dreamless state is also only an inspiration to push further. Instead of perceiving ourselves as ultimately connected to the Brahman, we revert back to the waking state, signifying that we must carry on with our journey onwards.
As such, that form of deep sleep where our consciousness isn’t concerned with anything at all can be a good starting point for us to continue building good Karma. By doing good deeds, we hope deep within us that we’ll someday be able to rest and become one with the One. When that time comes, we’ll be free from all sorts of desires and fears, punishment and joy, even morality and personal responsibility.
Final Word
In understanding the meaning of dreams, it would be very limited to view them only as interpretations of the self. Instead, seeing them from the lens of Hinduism gives us a better interpretation since it incorporates a sense of mysticism and self-realization.
With this view, we see dreams not only as things that bother or excite us during sleep. Instead, it gives us a sense of hope that things will eventually turn out fine as there is indeed an end goal for us.
The Individualogist Team is made up of archetype fanatics, individuation practitioners, and spirituality fans. Our humble group has banded together to deliver thought-provoking, life-changing, and growth-probing wisdom. | https://individualogist.com/what-is-the-hinduist-meaning-of-dreams |
The Hunger Project-Ethiopia and WeForest, a Belgian nonprofit, have formally launched a collaborative, community-led forest restoration and land rehabilitation program. The projects will begin in the Machakel district of the Amhara region in northwestern Ethiopia.
Environmental degradation is a crucial challenge in Ethiopia. According to the International Fund for Agricultural Development , Ethiopia loses 2 billion tons of fertile soil due to land degradation each year. The effects of climate change only compound these environmental challenges and make development interventions more difficult. In Machakel, land degradation is primarily caused by intensive agricultural practices, lack of awareness of sustainable land management practices and high rainfall. Currently, only 9% of the land is covered by forest.
To restore the land, The Hunger Project-Ethiopia and WeForest plan to work with community partners to plant 3 million trees. Staff members will work with local farmers and government officials to conduct an initial assessment to identify local plants used for food, animal forage, timber, firewood and other needs. After the seedlings are raised in tree nurseries, staff and community members will plant the seedlings across three phases, with a target of 1.2 million seedlings planted for 2017. In addition, communities will be trained in sustainable agricultural practices, from techniques to stop cattle from grazing on the growing forest to the production and promotion of ecological cooking stoves and bricks to replace timber for construction.
The dual goal of the reforestation project is to not only rehabilitate and protect the environment but also improve the livelihoods of local communities. Farmers can incorporate trees into their farming practices, adding a second income stream. Land restoration could improve agricultural yields and result in better nutrition and health outcomes for community members.
To celebrate the start of the program, The Hunger Project-Ethiopia invited community representatives, regional, zonal and woreda government representatives, and We-forest representatives to a launch event on March 7, 2017. Stakeholders shared their views and expressed support and commitment to the project, mobilizing the local community.
Learn More: | https://thp.org/news/hunger-project-ethiopia-weforest-partner-plant-3-million-trees/ |
‘Love your neighbour as yourself’ (Gospel of Mark Chapter 12 verse 31).
Intent
Design and Technology (D & T) is an inspiring, rigorous and practical subject. It encourages children to learn to think creatively to solve problems both as individuals and as part of a team. It enables each child to develop spiritually, morally, socially, culturally, physically and intellectually, the possibilities are endless. At St Katherine’s, we encourage children to use their creativity and imagination, to design and make products that solve real and relevant problems within a variety of contexts, considering their own and others’ needs, wants and values. They acquire a broad range of subject knowledge and draw on disciplines such as science, technology, art, literacy and mathematics. Children will also develop the life skills and knowledge associated with food, nutrition and cookery. They will have opportunities to reflect upon and evaluate past and present design technology, its uses and its effectiveness and are encouraged to become innovators and risk-takers.
Our children understand how design reflects and shapes our history, and contributes to the culture, creativity and wealth of our nation. It is important that we convey that the effects of design technology have a global impact on our environment and the people, plants and animals that inhabit our Earth. How designers and engineers tackle problems, develop designs, use their knowledge of materials and technology has consequences for generations to come.
Through a broad and balanced design and technology curriculum, children will learn from other cultures, respect diversity, co-operate with one another and appreciate what they have. We achieve this by providing a strong SMSC curriculum, with our curriculum ‘drivers’ (Spirituality, Diversity, Environment, Possibilities) and Christian Values (Friendship, Trust, Thankfulness, Hope, Wisdom, Love, Courage and Koinonia) placed at the heart of all that we do at St Katherine’s. It is paramount that design and technology is purposeful and relevant to all our children.
Implementation
The teaching of Design and Technology across St Katherine’s follows the National Curriculum and the use of The Chris Quigley Essentials Curriculum for Design and Technology to support planning. At St Katherine’s D & T forms an important part of the curriculum and is taught in all year groups through at least one project per term from each strand (Design & Make and Food & Nutrition). These are, taught as a block so that children’s learning is focused throughout each unit of work.
Key skills, knowledge and vocabulary for D.T is mapped across the school using the Essentials Curriculum to ensure progression between year groups. The aim is to help teachers to plan activities, which build on children's previous learning and to ensure an appropriate level of challenge.
Key Stage 1 & 2
Through a variety of creative and practical activities, we teach the knowledge, understanding and skills needed to engage in an iterative process of designing and making. The children work in a range of relevant contexts e.g. home, school, leisure, culture, enterprise, industry and the wider environment.
When designing and making, the children are taught to:
Design
- use research and develop design criteria to inform the design of innovative, functional, appealing products that are fit for purpose, aimed at particular individuals or groups
- generate, develop, model and communicate their ideas through discussion, annotated sketches, cross-sectional diagrams, prototypes, pattern pieces and computer-aided design
Make
- select from and use a wider range of tools and equipment to perform practical tasks (for example, cutting, shaping, joining and finishing) accurately
- select from and use a wider range of materials and components, including construction materials, textiles and ingredients, according to their functional properties and aesthetic qualities
Evaluate
- investigate and analyse a range of existing products
- evaluate their ideas and products against their own design criteria and consider the views of others to improve their work
- understand how key events and individuals in design and technology have helped shape the world
Technical knowledge
- apply their understanding of how to strengthen, stiffen and reinforce more complex structures
- understand and use mechanical systems in their products
- understand and use electrical systems in their products
- apply their understanding of computing to program, monitor and control their products
Early Years Foundation Stage (EYFS)
In our Nursery and Reception, we encourage the development of skills; knowledge and understanding that help children make sense of their world. The ‘Characteristics of Effective Learning’ and objectives set out in the EYFS Development Matters document underpin our curriculum from three to 5 years old. This learning forms the foundations for later work in design and technology. These early experiences include:
- asking questions about how things work and why
- using different media and materials to express their own ideas
- using what they have learnt about media and materials in original ways, thinking about form, function and purpose
- making plans and construct with a purpose in mind using a variety of resources
- developing skills to use simple tools and techniques appropriately, effectively and safely
- selecting appropriate resources for a product and adapt their work where necessary
- cooking and preparing food adhering to good health and hygiene routines
We provide our children with a range of experiences that encourage exploration, observation, problem-solving, critical thinking and discussion. These activities, indoors and outdoors, attract the children’s interest and curiosity.
Impact
The intended impact of the D & T curriculum at St Katherine’s is that the majority of children in each year group are working at or above the expected level for their age. Throughout the project, the class teacher will continuously assess the children and at the end make a judgement linked to set criteria.
In addition, it is intended that the children: | https://www.stkatherinesprimary.com/vision-statement-1/ |
Every person is liable for the acts committed by him and not for the acts done by others but in some cases or situations a person can be liable for the act committed by someone else. This is known as Vicarious Liability. So, for such acts to happen, there must be a specific kind of relationship between both the people and the act must be connected to that relationship. This is considered as an exception to the general rule that the person is liable for his acts only. Vicarious Liability is based on the principle of ‘qui facit per se per alium facit per se’ which means that he who does an act through another is deemed in law to do it himself.
ESSENTIALS – The essentials of Vicarious Liability are:
There must be a certain type of relation between the parties.
The wrongful act must be committed by another person.
`the wrongful act must happen during the course of employment.
RELATIONS – This liability can only take place when one party is socially superior to another party and therefore superior party shall be considered liable. Some examples of such relationships are:
Master and Servant
Owner and Independent Contractor
Partners in Partnership firm
Principal and Agent
Company and its Directors
REASONS –
The reason behind holding the master liable for the acts of servant are:
A servant is just an agent who is controlled and supervised by his employer. Therefore, it is assumed that servant works according to the direction of the master. So, the liability for the actions of the servant must be of the master.
The master always enjoys the profit derived from the efforts of the servant, so he must also bear the loss which is done by the servant nut only in the course of the employment.
It is a well stated fact that a master is more financial stable than servant. So, the master is more suitable to pay for the damages caused by the servant during the course of his employment.
SCOPE OF EMPLOYMENT –
The actions of the employees related to the term of his employment are considered as the scope of employment. The scope changes through the requirements of the job and the number of employers required. There are many situations where a worker is not considered under the scope of employment. These include:
Independent Contractor – An independent contractor is someone who do work for someone else. They provide goods and services under a written contract or verbal agreement. They do not work regularly but work as required.
Illegal Acts – Any illegal act is not under the scope of employment. Therefore, any harm caused by the illegal act is mostly not considered as the employer’s liability.
Vicarious liability deals with only those cases when one person is liable for the actions of another person. And also, the liable person must be superior to the other person. The course of employment is essential for Vicarious Liability.
Aishwarya Says:
I have always been against Glorifying Over Work and therefore, in the year 2021, I have decided to launch this campaign “Balancing Life”and talk about this wrong practice, that we have been following since last few years. I will be talking to and interviewing around 1 lakh people in the coming 2021 and publish their interview regarding their opinion on glamourising Over Work.
If you are interested in participating in the same, do let me know.
Do follow me on Facebook, Twitter Youtube and Instagram.
The copyright of this Article belongs exclusively to Ms. Aishwarya Sandeep. Reproduction of the same, without permission will amount to Copyright Infringement. Appropriate Legal Action under the Indian Laws will be taken.
If you would also like to contribute to my website, then do share your articles or poems at [email protected]
We also have a Facebook Group Restarter Moms for Mothers or Women who would like to rejoin their careers post a career break or women who are enterpreneurs. | https://aishwaryasandeep.com/2021/07/11/vicarious-liability-2/ |
COMPANY Management is committed to assuring the quality of services through a quality management system, quality review and open consultation with clients and other stakeholders.
Our quality objectives are focused to meet or exceed our customer requirements and expectations in a proactive, professional and cost effective manner and ensure that objectives are established at relevant functional levels to meet the needs of COMPANY.
This also includes all applicable legislative and other regulatory requirements.
To achieve this objective COMPANY will:
• Establish and maintain a Quality Management System in accordance with ISO 9001:2015
• Set objectives and targets to measure our performance and identify risks and opportunities for improvement
• Provide adequate resources to continually review and improve our business process
• Encourage all people to integrate quality management into the way we work and promote its application as a method for continual improvement within their area of responsibility
• Encourages environmental awareness for the services rendered towards the customers
• Actively seek performance feedback from our customers and address opportunities for improvement that are identified. COMPANY will make this policy available to all interested parties.
This policy will be reviewed annually by top management and where deemed necessary will be amended and re-issued. | http://sardelis-agency.gr/en/quality-policy-2/ |
Nature is on the move. As the impacts of climate change reveal themselves, species and ecosystems are moving in response. This poses a fundamental challenge to conservation organizations—how do you conserve something that won't stay still?
A new paper authored by a University of Tennessee, Knoxville, professor suggests that in order to cope, conservation organizations need to adapt like the organisms they seek to protect.
The paper, published in Frontiers in Ecology and the Environment, argues that conservation organizations need to be bolder in their adaptation efforts given the rate and extent of the ecological changes that are coming. The article can be found at http://bit.ly/1B7rclb
As the climate warms and other global changes progress, species move outside their historical ranges, new ecological communities form and ecosystems transition to new states. Moreover, scientists are predicting that these changes will accelerate in the future.
"If you are an organization that has focused on conserving particular species in a particular place, as many of today's conservation organizations are, then something has to give—either you need to change your business model or revisit your conservation priorities. And neither is going to be easy for some of these groups," said Paul Armsworth, lead author and associate professor of ecology and evolutionary biology.
The paper puts forward a number of new ideas for how conservation organizations might address the challenges they are facing. It also highlights stories of success.
For example, Scenic Hudson, an environmental and land conservation group in New York State, has updated the way it prioritizes parts of the landscape for protection to better incorporate a changing climate, especially the impacts of sea-level rise. To get out ahead of the issue, in 2008 the group hired an experienced conservation biologist, created a detailed plan for shifting its land conservation along the Hudson River and developed resources to help local communities along the waterway adapt to rising sea levels.
"Previously, we focused on conserving places that harbor the most important habitats and species today," said Sacha Spector, Scenic Hudson's director of conservation science.
"But then we looked at the projections for sea-level rise in our region. Continuing with business as usual would have left us quite literally under water. Now when prioritizing sites for protection, we also look to acquire areas upslope to open up the possibility for the habitats we are targeting to migrate as the climate changes."
Spector said the paper's suggestions were right on target.
"What the authors are saying certainly resonates with our experiences here in the Hudson Valley," he said. "For example, the authors appeal for conservation organizations to start evaluating over what time period their investments in habitat protection are likely to provide conservation benefits.
We must recognize that if you are in for the long term—as most conservation organizations expect to be—you are going to have to ensure that the investments you make today align with the conditions you expect for the future. This matches very closely with our new approach to protecting the Hudson's tidal habitats."
The paper was produced by a team of authors from universities, conservation nonprofits and relevant federal agencies.
Contact Information
Amy Blakely
865-974-9748
[email protected]
Amy Blakely | newswise
Further information:
http://www.utk.edu
Further reports about: > changing climate > conservation > conservation biologist > ecological > ecological communities > ecology and evolutionary biology > evolutionary biology > global changes > investments > rising sea levels > sea levels > sea-level rise
Successful calculation of human and natural influence on cloud formation
04.11.2016 | Goethe-Universität Frankfurt am Main
Invasive Insects Cost the World Billions Per Year
04.10.2016 | University of Adelaide
In recent years, lasers with ultrashort pulses (USP) down to the femtosecond range have become established on an industrial scale. They could advance some applications with the much-lauded “cold ablation” – if that meant they would then achieve more throughput. A new generation of process engineering that will address this issue in particular will be discussed at the “4th UKP Workshop – Ultrafast Laser Technology” in April 2017.
Even back in the 1990s, scientists were comparing materials processing with nanosecond, picosecond and femtosesecond pulses. The result was surprising:...
Have you ever wondered how you see the world? Vision is about photons of light, which are packets of energy, interacting with the atoms or molecules in what...
A multi-institutional research collaboration has created a novel approach for fabricating three-dimensional micro-optics through the shape-defined formation of porous silicon (PSi), with broad impacts in integrated optoelectronics, imaging, and photovoltaics.
Working with colleagues at Stanford and The Dow Chemical Company, researchers at the University of Illinois at Urbana-Champaign fabricated 3-D birefringent...
In experiments with magnetic atoms conducted at extremely low temperatures, scientists have demonstrated a unique phase of matter: The atoms form a new type of quantum liquid or quantum droplet state. These so called quantum droplets may preserve their form in absence of external confinement because of quantum effects. The joint team of experimental physicists from Innsbruck and theoretical physicists from Hannover report on their findings in the journal Physical Review X.
“Our Quantum droplets are in the gas phase but they still drop like a rock,” explains experimental physicist Francesca Ferlaino when talking about the...
The Max Planck Institute for Physics (MPP) is opening up a new research field. A workshop from November 21 - 22, 2016 will mark the start of activities for an innovative axion experiment. Axions are still only purely hypothetical particles. Their detection could solve two fundamental problems in particle physics: What dark matter consists of and why it has not yet been possible to directly observe a CP violation for the strong interaction.
The “MADMAX” project is the MPP’s commitment to axion research. Axions are so far only a theoretical prediction and are difficult to detect: on the one hand,... | http://www.innovations-report.com/html/reports/environment-sciences/conservation-organizations-need-to-keep-up-with-nature.html |
The fuel tank capacity of Ducati Multistrada V4 is 22 Liters.
|Rear Brake Diameter :||265 mm|
|Front Brake Diameter :||320 mm|
|Tail Light :||LED|
|Dry Weight :||218 kg|
|Fuel Capacity :||22 Liters|
|Ground Clearance :||220 mm|
|Wheelbase :||1567 mm|
|Kerb Weight :||243 Kg|
Get Answers from Experts & Owners
Thanks for reporting this. The reported answer will be shortly removed from Zigwheels &
will be sent for moderation. | https://www.zigwheels.com/newbikes/faqs/what-is-the-fuel-tank-capacity-of-ducati-multistrada-v4 |
Synonyms: UI style guides
UI guidelines are a tool, that provides consistent appearance of the product across the board or the entire product line. As a structure, it is a gallery of design elements, from bottoms to layout templates, and main product interactions.
Small pieces of code, referring font type or color, are often included in UI style guides, and named design tokens. | https://www.flowmapp.com/blog/glossary-term/ui-guidelines |
Russell completes 18-inch tyre test for Pirelli
Pirelli has completed its final two days of 18-inch Formula 1 tyre testing this year, with Mercedes and George Russell completing the 2019 programme in Abu Dhabi.
Williams race driver Russell, returning to the wheel for Mercedes after driving its 2019 car in the official post-season test last week, completed more than 200 laps over Sunday and Monday at the Yas Marina circuit.
Sunny weather allowed Russell to complete 100 and 118 laps on the two respective days as Pirelli's 2021 development testing came to an end for the year.
Pirelli tasked Renault, McLaren and Mercedes with its initial 18-inch wheel testing using mule cars.
Read Also:
Renault's Sergey Sirotkin completed 213 laps at French Grand Prix venue Paul Ricard during Pirelli's first test in September.
McLaren's Carlos Sainz and Lando Norris were the race drivers to test Pirelli's 18-inch tyres, when they tested at Paul Ricard last month, completing more than 100 laps between them.
The programme will increase to 25 test days in 2020, and comprise all 10 teams, before the definitive 2021 tyres are used in a three-day group test following the Abu Dhabi Grand Prix.
Previous article
Carey says F1 sponsors interest on a "steady rise" | https://www.motorsport.com/f1/news/russell-pirelli-tyre-test-abu-dhabi/4608537/ |
BACKGROUND
SUMMARY
DETAILED DESCRIPTION
Existing IT performance management tools enable detection of performance changes by thresholding on performance metrics. The tools detect the presence of a performance change when a performance metric passes a threshold. For example, a threshold can be set for each performance metric and an alarm is generated at the time samples when at least one of the performance metrics exceeds its threshold. In a specific example, an alarm can be generated when the response time for a web page exceeds a threshold of 3 seconds. Often, two thresholds including upper and lower thresholds are set, and an alarm is generated when a performance metric either exceeds the upper threshold or falls below the lower threshold.
The thresholds can be set either manually or automatically. Setting thresholds manually is challenging since, in a large-scale distributed service, typically hundreds to thousands of performance metrics exist, each with a potentially different characteristic. An alternative is automated threshold setting in which thresholds are based on the statistics such as means, standard deviations, or percentiles, and are computed using historical measurements of the metrics. For instance, the thresholds can be set at 5th and 95th percentiles of the historical measurements of a metric, or at three standard deviations above and below the average or mean of the historical measurements of a metric.
Detecting changes through thresholding is a poor approach due for several reasons. First, thresholds are misleading when the performance metric shows multiple behaviors due to cyclic variations, for example weekly or monthly variations. In such cases, a single set of thresholds, such as a single pair of upper and lower thresholds, is insufficient to capture the behavior and for basing detection decisions. Second, thresholding assumes that the impact of change is due only to the amount of the change and does not take into account the duration of the change, leading to false change detection alarms as well as missed change detections. Finally, thresholding does not provide a global view of the detected changes. For example, information regarding when the new performance metric behavior starts and ends is not clear, resulting in difficulty in determining accurate diagnosis and recovery decisions following the detection of a change.
Embodiments of systems, articles of manufacture, and associated computer-executed methods determine an optimum temporal segmentation for automated information technology (IT) management. A computer-executed method detects changes in a performance metric in an automated information technology (IT) management system comprising defining a plurality of temporal segments as sets of contiguous time samples wherein time samples within a segment are mutually more similar in terms of performance metric behavior than time samples in previous and subsequent segments, and discovering the segments using an information-theoretical approach. Detecting changes in the performance metric can further comprise associating cost with the segments that is lesser for homogeneous metric behavior and greater for heterogeneous metric behavior within a segment, and finding segmentation that minimizes the cost using dynamic programming. The segments can be discovered by discovering the number of segments, discovering starting and ending time samples for the segments, and discovering statistical character of the segments comprising mean vectors and covariance matrices.
Embodiments of systems, articles of manufacture, and associated operating methods enable optimum temporal segmentation for automated information technology (IT) management.
For large-scale distributed web services, changes in the performance metric behavior are indications of either service problems or cyclic performance behavior. In the case of service problems, detection of the changes, followed by the diagnosis and recovery of the problems, is highly useful to avoid loss of revenue for the service providers and reduced satisfaction of the service users. In the case of cyclic performance behavior, such as occurs because application throughputs for weekdays and weekends are often different, detection of the changes in the performance behavior is useful for capacity planning to use system resources efficiently. Both online detection, such as detection of anomalies in real time as metric measurements are acquired, and offline detection including detection of anomalies in the past measurements (in the past week or past month for understanding the service behavior, changes in the behavior, and any recurring problems) facilitate discovery and addressing service problems and capacity planning.
The impact of the change in the performance metric behavior is measured by both the amount of the change and the duration of the change. A small change in a performance metric, for instance, may have a significant impact on the service if its duration is long, while a large change in the metric that lasts for only a single time epoch can often be ignored as an outlier.
Detecting performance changes in IT environments are highly useful for discovering and recovering from service problems and for efficient capacity planning. Existing management tools include threshold-based detection tools which have many shortcomings including the need to set a threshold for each metric, the inability to take the duration of change into account, and the inability to account for cases when metrics exhibit cyclic performance behavior.
The illustrative systems, articles of manufacture, and associated operating methods enable an approach for detecting performance changes without thresholding, thereby addressing shortcomings of threshold-based techniques. The technique can use only a single parameter which is mathematically related to a definition of change in terms of change duration and amount. The illustrative techniques can determine how the single parameter is set based on the mathematical relation, possibly taking into consideration other information, such as actual data and simulations.
The illustrative systems, articles of manufacture, and associated operating methods enables a thresholdless approach to detecting performance changes in IT environments and avoids the shortcomings of the threshold-based techniques such as the need to set a threshold, high ratios of false alarms and missed detections, and addresses the case cyclic performance behavior. The technique can use only a single parameter which is mathematically related to the definition of change in terms of the change duration and amount.
The illustrative systems, articles of manufacture, and associated operating methods enable a thresholdless, segment-based approach to detecting changes in the performance metric behavior for large-scale distributed web services, where a segment is a set of contiguous time samples such that the time samples within the segment are more similar (in terms of their performance metric behavior) to one another than the time samples in the previous and next segments. The technique involves discovery of the changes, for example in the segments. Discovery implies finding the number of segments, the locations of the segments and the statistical character of the segments using information-theoretic and signal processing techniques. The technique can use a single parameter which is mathematically related to the definition of change in terms of the change duration and amount, and enables setting of the parameter.
FIGS. 1A
FIG. 1A
1
1
1
100
102
102
104
106
108
110
Referring to , B, C, and D, schematic block and pictorial diagrams illustrate embodiments of an automated information technology (IT) management system that optimizes temporal segmentation. As shown in , an illustrative automated information technology (IT) management system comprises a performance analyzer configured for detecting changes in a performance metric. The performance analyzer comprises multiple logic elements. One logic defines a plurality of temporal segments as sets of contiguous time samples wherein time samples within a segment are mutually more similar in terms of performance metric behavior than time samples in previous and subsequent segments. Another logic discovers the segments using an information-theoretical approach comprising discovering number of segments, discovering starting and ending time samples for the segments, and discovering statistical character of the segments comprising mean vectors and covariance matrices. Another logic associates cost with the segments that is lesser for homogeneous metric behavior and greater for heterogeneous metric behavior within a segment. A further logic finds segmentation that minimizes the cost using dynamic programming.
100
112
114
102
112
In some embodiments, the IT management system can further comprise a response tool that responds to detection of changes in the performance metric, and a server that executes the performance analyzer , and the response tool .
FIG. 1B
102
116
118
i,j
Referring to , an IT management system embodiment can include a performance analyzer further comprising a logic that collects performance metrics over time as a plurality of temporal segments including contiguous time samples wherein time samples within a segment are mutually more similar than time samples in previous and subsequent segments. Another logic element can determine a weighted cost of segmentation waccording to equation (1):
<math overflow="scroll"><mtable><mtr><mtd><mrow><mrow><msub><mi>w</mi><mrow><mi>i</mi><mo>,</mo><mi>j</mi></mrow></msub><mo>=</mo><mrow><mrow><munderover><mo>∑</mo><mrow><mi>t</mi><mo>=</mo><mi>i</mi></mrow><mi>j</mi></munderover><mo></mo><msup><mrow><mo>(</mo><mrow><msub><mi>X</mi><mi>t</mi></msub><mo>-</mo><msub><mi>μ</mi><mrow><mi>i</mi><mo>,</mo><mi>j</mi></mrow></msub></mrow><mo>)</mo></mrow><mn>2</mn></msup></mrow><mo>+</mo><mi>λ</mi></mrow></mrow><mo>;</mo></mrow></mtd><mtd><mrow><mo>(</mo><mn>1</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
t
i,j
i,j
120
wherein Xis a value of the performance metric, μis an average value of the performance metric between time samples i and j, and λ is a compactness parameter. A further logic element a logic that finds segmentation that minimizes the sum of segment weights wfor a specified value of λ using dynamic programming.
FIG. 1C
102
122
124
Referring to , an IT management system embodiment can include a performance analyzer further comprising a logic that defines an anomaly determined by a length m of an anomalous segment and deviation of the anomalous segment from normal behavior. A logic sets the compactness parameter λ according to the defined anomaly, and scales the compactness parameter λ by an estimate of data variance according to equation (2):
<math overflow="scroll"><mtable><mtr><mtd><mrow><mrow><mi>λ</mi><mo>=</mo><mfrac><msup><mrow><mi>m</mi><mo></mo><mrow><mo>(</mo><mrow><msub><mi>μ</mi><mi>n</mi></msub><mo>-</mo><msub><mi>μ</mi><mi>m</mi></msub></mrow><mo>)</mo></mrow></mrow><mn>2</mn></msup><mrow><mrow><mn>2</mn><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><mi>K</mi></mrow><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle></mrow></mfrac></mrow><mo>,</mo></mrow></mtd><mtd><mrow><mo>(</mo><mn>2</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
n
m
102
126
wherein a segment is a mixture of two distributions comprising a first distribution of mean μwith n time samples and a second distribution of mean μwith m time samples, and K is the estimate of data variance. The performance analyzer can further comprise a logic that estimates the data variance K by taking variance of data after excluding a selected lowest percentile and a selected highest percentile of data values.
FIG. 1D
102
128
128
130
S
S
S
S
S
Referring to , an IT management system embodiment can include a performance analyzer further comprising a logic that globally minimizes equation min{C+λ(Number of Segments)} using dynamic programming wherein Cis cost of segmentation S for a monotonic function of segment number. The logic comprises a logic that determines the contribution of a segment (i,j) to equation min{C+λ(Number of Segments)} according to equation (3), as follows:
<math overflow="scroll"><mtable><mtr><mtd><mrow><mrow><msub><mi>w</mi><mrow><mi>i</mi><mo>,</mo><mi>j</mi></mrow></msub><mo>=</mo><mrow><mrow><mfrac><mn>1</mn><mi>K</mi></mfrac><mo></mo><mrow><munderover><mo>∑</mo><mrow><mi>t</mi><mo>=</mo><mn>1</mn></mrow><mi>j</mi></munderover><mo></mo><msup><mrow><mo>(</mo><mrow><msub><mi>X</mi><mi>t</mi></msub><mo>-</mo><msub><mi>μ</mi><mrow><mi>i</mi><mo>,</mo><mi>j</mi></mrow></msub></mrow><mo>)</mo></mrow><mn>2</mn></msup></mrow></mrow><mo>+</mo><mi>λ</mi></mrow></mrow><mo>,</mo></mrow></mtd><mtd><mrow><mo>(</mo><mn>3</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
t
i,j
1
1,1
n
1≦k<n
k
k,n
n
1≦k<n
k
k,n
i,j
102
132
wherein Xis a value of the performance metric, μis an average value of the performance metric between time samples i and j, λ is a compactness parameter, and K is estimated data variance. The performance analyzer can further comprise a logic that determines segmentation that minimizes segment cost sum by setting n=1 and s=w, setting n=n+1, and setting s=mins+w, and setting k=argmin(s+w) for n<N for an ordered set of N samples with segment costs w.
FIG. 2
250
250
252
254
256
254
256
254
256
254
256
254
256
Referring to , a schematic block diagram depicts an embodiment of an article of manufacture implementing an automated information technology (IT) management system that optimizes temporal segmentation. The illustrative article of manufacture comprises a controller-usable medium having a computer readable program code embodied in a controller for detecting changes in a performance metric. The computer readable program code causes the controller to define a plurality of temporal segments as sets of contiguous time samples wherein time samples within a segment are mutually more similar in terms of performance metric behavior than time samples in previous and subsequent segments. The program code further causes the controller to discover the segments using an information-theoretical approach comprising discovering number of segments, discovering starting and ending time samples for the segments, and discovering statistical character of the segments comprising mean vectors and covariance matrices. The program code also causes the controller to associate cost with the segments that is lesser for homogeneous metric behavior and greater for heterogeneous metric behavior within a segment. The program code further causes the controller to find segmentation that minimizes the cost using dynamic programming.
FIGS. 3A through 3D
FIG. 3A
300
302
304
306
306
308
310
312
Referring to , flow charts illustrate one or more embodiments or aspects of a computer-executed method for determining optimum temporal segmentation for automated information technology (IT) management. depicts a computer-executed method for detecting changes in a performance metric in an automated information technology (IT) management system comprising defining a plurality of temporal segments as sets of contiguous time samples wherein time samples within a segment are mutually more similar in terms of performance metric behavior than time samples in previous and subsequent segments, and discovering the segments using an information-theoretical approach. The segments can be discovered by discovering the number of segments, discovering starting and ending time samples for the segments, and discovering statistical character of the segments comprising mean vectors and covariance matrices.
FIG. 3B
302
314
316
Referring to , detecting changes in the performance metric can further comprise associating cost with the segments that is lesser for homogeneous metric behavior and greater for heterogeneous metric behavior within a segment, and finding segmentation that minimizes the cost using dynamic programming.
FIG. 3C
320
322
Referring to , a computer-executed method for detecting changes in a performance metric can further comprise determining the cost as a sum over a plurality of time samples of a square of difference between a metric value of individual samples and an indicator of homogenous behavior.
In an example implementation, the indicator of homogenous behavior can be variance.
320
324
324
326
328
In some embodiments, the method can further comprise solving a Lagrangian minimization problem for a predetermined compactness parameter. The Lagrangian minimization problem can be solved by finding a segmentation that minimizes a sum of segment weights, and determining the sum of segment weights as a square of a difference between a quantity comprising the metric value of individual samples and the indicator of homogenous behavior, increased by the compactness parameter determined using dynamic programming.
For example, a segment can be formed for a condition that the ratio of a decrease in cost to an increase in segment number resulting from existence of the segment is larger than the compactness parameter.
FIG. 3D
330
332
334
Referring to , a computer-executed method for detecting changes in a performance metric can further comprise defining an anomaly based on a determination of length of an anomalous segment and deviation of the anomalous segment from normal behavior. The compactness parameter can be set based on the anomaly definition.
330
336
338
340
The method can further comprise determining an estimate of data variance by excluding data values in a selected lowest percentile and a selected highest percentile, and scaling within-segment variances by the estimate of data variance. The compactness parameter can be set data-independently based on length of scaled anomaly and deviation of the anomaly from normal behavior.
In some embodiments, the Lagrangian minimization can be solved to globally minimize over all possible segmentations and discover number, locations, and character of the segments.
The method can further comprise detecting changes in service conditions, and detecting changes in cyclic performance behavior.
FIGS. 4A through 4D
FIG. 4A
400
402
404
406
i,j
Referring to , flow charts illustrate one or more embodiments or aspects of a computer-executed method for determining optimum temporal segmentation for automated information technology (IT) management. depicts a computer-executed method for detecting changes in a performance metric in an automated information technology (IT) management system comprising collecting performance metrics over time as a plurality of temporal segments comprising contiguous time samples wherein time samples within a segment are mutually more similar than time samples in previous and subsequent segments. A weighted cost of segmentation wis determined according to equation (4) as follows:
<math overflow="scroll"><mtable><mtr><mtd><mrow><mrow><msub><mi>w</mi><mrow><mi>i</mi><mo>,</mo><mi>j</mi></mrow></msub><mo>=</mo><mrow><mrow><munderover><mo>∑</mo><mrow><mi>t</mi><mo>=</mo><mi>i</mi></mrow><mi>j</mi></munderover><mo></mo><msup><mrow><mo>(</mo><mrow><msub><mi>X</mi><mi>t</mi></msub><mo>-</mo><msub><mi>μ</mi><mrow><mi>i</mi><mo>,</mo><mi>j</mi></mrow></msub></mrow><mo>)</mo></mrow><mn>2</mn></msup></mrow><mo>+</mo><mi>λ</mi></mrow></mrow><mo>,</mo></mrow></mtd><mtd><mrow><mo>(</mo><mn>4</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
t
i,j
i,j
408
wherein Xis a value of the performance metric, μis an average value of the performance metric between time samples i and j, and λ is a compactness parameter. Segmentation is found that minimizes the sum of segment weights wfor a specified value of λ using dynamic programming.
FIG. 4B
410
412
414
i,j
i,j
Referring to , an embodiment of a method for detecting changes in a performance metric in an automated information technology (IT) management system can further comprise constraining the sum of segment weights wby entropy, and determining a weighted cost of segmentation waccording to equation (5):
<math overflow="scroll"><mtable><mtr><mtd><mrow><msub><mi>w</mi><mrow><mi>i</mi><mo>,</mo><mi>j</mi></mrow></msub><mo>=</mo><mrow><mrow><munderover><mo>∑</mo><mrow><mi>t</mi><mo>=</mo><mi>i</mi></mrow><mi>j</mi></munderover><mo></mo><msup><mrow><mo>(</mo><mrow><msub><mi>X</mi><mi>t</mi></msub><mo>-</mo><msub><mi>μ</mi><mrow><mi>i</mi><mo>,</mo><mi>j</mi></mrow></msub></mrow><mo>)</mo></mrow><mn>2</mn></msup></mrow><mo>+</mo><mrow><mrow><mi>λ</mi><mo></mo><mrow><mo>(</mo><mrow><mi>i</mi><mo>-</mo><mi>j</mi></mrow><mo>)</mo></mrow></mrow><mo>·</mo><mrow><mrow><mi>log</mi><mo></mo><mrow><mo>(</mo><mrow><mi>i</mi><mo>-</mo><mi>j</mi></mrow><mo>)</mo></mrow></mrow><mo>.</mo></mrow></mrow></mrow></mrow></mtd><mtd><mrow><mo>(</mo><mn>5</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
FIG. 4C
420
422
424
426
Referring to , a method for detecting changes in a performance metric can further comprise defining an anomaly determined by a length m of an anomalous segment and deviation of the anomalous segment from normal behavior, and setting the compactness parameter λ according to the defined anomaly. The compactness parameter λ can be scaled by an estimate of data variance according to equation (6):
<math overflow="scroll"><mtable><mtr><mtd><mrow><mrow><mi>λ</mi><mo>=</mo><mfrac><msup><mrow><mi>m</mi><mo></mo><mrow><mo>(</mo><mrow><msub><mi>μ</mi><mi>n</mi></msub><mo>-</mo><msub><mi>μ</mi><mi>m</mi></msub></mrow><mo>)</mo></mrow></mrow><mn>2</mn></msup><mrow><mrow><mn>2</mn><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><mi>K</mi></mrow><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle></mrow></mfrac></mrow><mo>,</mo></mrow></mtd><mtd><mrow><mo>(</mo><mn>6</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
n
m
428
wherein a segment is a mixture of two distributions comprising a first distribution of mean μwith n time samples and a second distribution of mean μwith m time samples, and K is the estimate of data variance. The data variance K can be estimated by taking variance of data after excluding a selected lowest percentile and a selected highest percentile of data values.
424
430
2
In an example implementation, the compactness parameter λ can be set based on anomaly length and anomaly deviation from normal behavior by analyzing the anomaly according to a formula ab/2 wherein a is anomaly length and b is distance of normal from abnormal normalized by normal variance K.
FIG. 4D
440
442
442
444
S
S
S
S
S
Referring to , a method for detecting changes in a performance metric can further comprise globally minimizing equation min{C+λ(Number of Segments)} using dynamic programming wherein Cis cost of segmentation S for a monotonic function of segment number. Global minimization can comprise determining contribution of a segment (i,j) to equation min{C+λ(Number of Segments)} according to equation (7), as follows:
<math overflow="scroll"><mtable><mtr><mtd><mrow><mrow><msub><mi>w</mi><mrow><mi>i</mi><mo>,</mo><mi>j</mi></mrow></msub><mo>=</mo><mrow><mrow><mfrac><mn>1</mn><mi>K</mi></mfrac><mo></mo><mrow><munderover><mo>∑</mo><mrow><mi>t</mi><mo>=</mo><mn>1</mn></mrow><mi>j</mi></munderover><mo></mo><msup><mrow><mo>(</mo><mrow><msub><mi>X</mi><mi>t</mi></msub><mo>-</mo><msub><mi>μ</mi><mrow><mi>i</mi><mo>,</mo><mi>j</mi></mrow></msub></mrow><mo>)</mo></mrow><mn>2</mn></msup></mrow></mrow><mo>+</mo><mi>λ</mi></mrow></mrow><mo>,</mo></mrow></mtd><mtd><mrow><mo>(</mo><mn>7</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
t
i,j
1
1,1
n
1≦k<n
k
k,n
1≦k<n
k
k,n
i,j
442
446
wherein Xis a value of the performance metric, μis an average value of the performance metric between time samples i and j, λ is a compactness parameter, and K is estimated data variance. Global minimization can further comprise determining segmentation that minimizes segment cost sum by setting n=1 and s=w; setting n=n+1 and s=mins+w; and setting kn=argmin(s+w) for n<N; for an ordered set of N samples with segment costs w.
The illustrative techniques can focus on the discovery of the changes or the segments, rather than determining which of the segments is anomalous. The segmentation problem can be viewed as an optimization problem. The optimization problem can be solved through dynamic programming.
The illustrative optimum temporal segmentation technique, performance metrics collected over time are viewed as comprising temporal segments, where a segment is a set of contiguous time samples such that the time samples within the segment are more similar (in terms of performance metric behavior) to one another than the time samples in the previous and next segments. An information-theoretic approach to discovering the segments is derived. Such information-theoretic approaches including discovering the number of segments, the time samples at when each segment starts and ends, and the statistical character of the segments such as mean vectors and covariance matrices, and others.
k
k
A segmentation S is defined with the starting time samples of the segments, where the index iis used to denote the start sample of the kth segment of the segmentation. Thus, each S is uniquely defined by a set of is. Each segmentation S is associated with a cost. Intuitively, the cost is selected to be small if the metric behavior within the segments of the segmentation is homogenous, and large if the behavior is highly heterogeneous. A technique for setting of the cost and use of dynamic programming to find segmentation which minimizes the cost are disclosed hereinafter.
S
Typically, the cost C, of segmentation S can be selected as a sum of segment variances, such as according to equation (8) as follows:
<math overflow="scroll"><mtable><mtr><mtd><mrow><mrow><msub><mi>C</mi><mi>S</mi></msub><mo>=</mo><mrow><munderover><mo>∑</mo><mrow><msub><mi>i</mi><mi>k</mi></msub><mo>∈</mo><mi>S</mi></mrow><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle></munderover><mo></mo><mrow><munderover><mo>∑</mo><mrow><mi>t</mi><mo>=</mo><msub><mi>i</mi><mi>k</mi></msub></mrow><mrow><msub><mi>i</mi><mi>k</mi></msub><mo>-</mo><mn>1</mn></mrow></munderover><mo></mo><msup><mrow><mo>(</mo><mrow><msub><mi>X</mi><mi>t</mi></msub><mo>-</mo><msub><mi>μ</mi><mrow><msub><mi>i</mi><mi>k</mi></msub><mo>,</mo><mrow><msub><mi>i</mi><mi>k</mi></msub><mo>-</mo><mn>1</mn></mrow></mrow></msub></mrow><mo>)</mo></mrow><mn>2</mn></msup></mrow></mrow></mrow><mo>;</mo></mrow></mtd><mtd><mrow><mo>(</mo><mn>8</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
t
i
k
,i
k
-1
k
k-1
where Xis the value of the metric, for example response time, throughput, CPU utilization, and the like, at time sample t, and μis the average metric value between time samples iand i. The variance is a reasonable choice since low variance is often a good indicator of homogenous behavior. However, the weight can be set to other measures of homogeneity as well.
The goal of segmentation is not only to find a set of homogeneous segments, but also to find a compact set of homogeneous segments. A compact representation is defined as a representation with as few segments as possible. Without the compactness criterion, segmentation is not meaningful since the segmentation that minimizes equation (8) is that for which each segment has only one time sample.
S
S
S
S
With introduction of the compactness constraint, the segmentation problem evolves into a minimization problem minCgiven the number of segments or some monotonic function of the number of segments. The minimization problem in can be posed as a Lagrangian problem of the form min{C+λ(Number of Segments)}.
The information-theoretic entropy of segment lengths can be used rather than the number of segments as a constraint since entropy of segment lengths increases each time a segment is broken into multiple segments.
The Lagrangian minimization problem is equivalent to finding the segmentation S that minimizes the sum of segment weights, where a segment weight is equal to equation (9):
<math overflow="scroll"><mtable><mtr><mtd><mrow><msub><mi>w</mi><mrow><mi>i</mi><mo>,</mo><mi>j</mi></mrow></msub><mo>=</mo><mrow><mrow><munderover><mo>∑</mo><mrow><mi>t</mi><mo>=</mo><mi>i</mi></mrow><mi>j</mi></munderover><mo></mo><msup><mrow><mo>(</mo><mrow><msub><mi>X</mi><mi>t</mi></msub><mo>-</mo><msub><mi>μ</mi><mrow><mi>i</mi><mo>,</mo><mi>j</mi></mrow></msub></mrow><mo>)</mo></mrow><mn>2</mn></msup></mrow><mo>+</mo><mrow><mi>λ</mi><mo>.</mo></mrow></mrow></mrow></mtd><mtd><mrow><mo>(</mo><mn>9</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
S
The relationship can be verified by adding equation (9) over all segments of a segmentation, leading to the term {C+λ(Number of Segments)}. In contrast, if entropy is used as a constraint the segment cost is given in equation (10):
<math overflow="scroll"><mtable><mtr><mtd><mrow><msub><mi>w</mi><mrow><mi>i</mi><mo>,</mo><mi>j</mi></mrow></msub><mo>=</mo><mrow><mrow><munderover><mo>∑</mo><mrow><mi>t</mi><mo>=</mo><mi>i</mi></mrow><mi>j</mi></munderover><mo></mo><msup><mrow><mo>(</mo><mrow><msub><mi>X</mi><mi>t</mi></msub><mo>-</mo><msub><mi>μ</mi><mrow><mi>i</mi><mo>,</mo><mi>j</mi></mrow></msub></mrow><mo>)</mo></mrow><mn>2</mn></msup></mrow><mo>+</mo><mrow><mrow><mi>λ</mi><mo></mo><mrow><mo>(</mo><mrow><mi>i</mi><mo>-</mo><mi>j</mi></mrow><mo>)</mo></mrow></mrow><mo>·</mo><mrow><mrow><mi>log</mi><mo></mo><mrow><mo>(</mo><mrow><mi>i</mi><mo>-</mo><mi>j</mi></mrow><mo>)</mo></mrow></mrow><mo>.</mo></mrow></mrow></mrow></mrow></mtd><mtd><mrow><mo>(</mo><mn>10</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
Dynamic programming can be used to find the segmentation that minimizes the sum of segment weights for a given value of λ, specifically the segmentation that solves the Lagrangian minimization problem for a given value of λ.
Thus, each segment is associated with a cost given that the value of the parameter λ. The value of parameter λ can be set based on an intuitive description of “anomaly” in performance metric behavior.
Based on the Lagrangian formulation, a relationship exists according to expression (11):
<math overflow="scroll"><mtable><mtr><mtd><mrow><mrow><mi>λ</mi><mo>≤</mo><mfrac><mrow><mi>Δ</mi><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><msub><mi>C</mi><mi>S</mi></msub></mrow><mrow><mi>Δ</mi><mo></mo><mstyle><mspace width="0.8em" height="0.8ex" /></mstyle><mo></mo><mi>Number</mi><mo></mo><mstyle><mspace width="0.8em" height="0.8ex" /></mstyle><mo></mo><mi>of</mi><mo></mo><mstyle><mspace width="0.8em" height="0.8ex" /></mstyle><mo></mo><mi>Segments</mi></mrow></mfrac></mrow><mo>,</mo></mrow></mtd><mtd><mrow><mo>(</mo><mn>11</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
S
such that a segment is formed if and only if the ratio of the decrease in the cost Cto the increase in the number of segments due to existence the formed segment is larger than λ.
S
n
m
Thus λ is determined based on the value (ΔC/ΔNumber of Segments) for the segmentation problem. Each time a new segment is formed the number of segments increases by 2, so that ΔG=2. To find the decrease in the cost each time a segment is formed, a segment can be considered as a mixture of two distributions including one distribution around a mean of μwith n time samples, and a second distribution about a mean of μwith m time samples. The mean μ of the segment is given by equation (12):
<math overflow="scroll"><mtable><mtr><mtd><mrow><mrow><mi>μ</mi><mo>=</mo><mfrac><mrow><mrow><msub><mi>μ</mi><mi>n</mi></msub><mo></mo><mi>n</mi></mrow><mo>+</mo><mrow><msub><mi>μ</mi><mi>m</mi></msub><mo></mo><mi>m</mi></mrow></mrow><mrow><mi>n</mi><mo>+</mo><mi>m</mi></mrow></mfrac></mrow><mo>,</mo></mrow></mtd><mtd><mrow><mo>(</mo><mn>12</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
and the cost of the segment can be represented as in equation (13):
<math overflow="scroll"><mtable><mtr><mtd><mtable><mtr><mtd><mrow><mi>D</mi><mo>=</mo><mi /><mo></mo><mrow><mrow><mi>n</mi><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><msubsup><mi>σ</mi><mi>n</mi><mn>2</mn></msubsup></mrow><mo>+</mo><mrow><mi>m</mi><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><msubsup><mi>σ</mi><mi>m</mi><mn>2</mn></msubsup></mrow><mo>+</mo><msup><mrow><mi>n</mi><mo></mo><mrow><mo>(</mo><mrow><msub><mi>μ</mi><mi>n</mi></msub><mo>-</mo><mi>μ</mi></mrow><mo>)</mo></mrow></mrow><mn>2</mn></msup><mo>+</mo><msup><mrow><mi>m</mi><mo></mo><mrow><mo>(</mo><mrow><msub><mi>μ</mi><mi>m</mi></msub><mo>-</mo><mi>μ</mi></mrow><mo>)</mo></mrow></mrow><mn>2</mn></msup></mrow></mrow></mtd></mtr><mtr><mtd><mrow><mo>=</mo><mi /><mo></mo><mrow><mrow><mi>n</mi><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><msubsup><mi>σ</mi><mi>n</mi><mn>2</mn></msubsup></mrow><mo>+</mo><mrow><mi>m</mi><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><msubsup><mi>σ</mi><mi>m</mi><mn>2</mn></msubsup></mrow><mo>+</mo><mrow><mfrac><mrow><mi>n</mi><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><msup><mi>m</mi><mn>2</mn></msup></mrow><msup><mrow><mo>(</mo><mrow><mi>n</mi><mo>+</mo><mi>m</mi></mrow><mo>)</mo></mrow><mn>2</mn></msup></mfrac><mo></mo><msup><mrow><mo>(</mo><mrow><msub><mi>μ</mi><mi>n</mi></msub><mo>-</mo><msub><mi>μ</mi><mi>m</mi></msub></mrow><mo>)</mo></mrow><mn>2</mn></msup></mrow><mo>+</mo></mrow></mrow></mtd></mtr><mtr><mtd><mrow><mi /><mo></mo><mrow><mfrac><msup><mi>mn</mi><mn>2</mn></msup><msup><mrow><mo>(</mo><mrow><mi>n</mi><mo>+</mo><mi>m</mi></mrow><mo>)</mo></mrow><mn>2</mn></msup></mfrac><mo></mo><mrow><msup><mrow><mo>(</mo><mrow><msub><mi>μ</mi><mi>n</mi></msub><mo>-</mo><msub><mi>μ</mi><mi>m</mi></msub></mrow><mo>)</mo></mrow><mn>2</mn></msup><mo>.</mo></mrow></mrow></mrow></mtd></mtr></mtable></mtd><mtd><mrow><mo>(</mo><mn>13</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
Following from equations (12) and (13) is equation (14) as follows:
<math overflow="scroll"><mtable><mtr><mtd><mtable><mtr><mtd><mrow><mrow><munder><mo>∑</mo><mi>n</mi></munder><mo></mo><msup><mrow><mo>(</mo><mrow><msub><mi>μ</mi><mi>n</mi></msub><mo>-</mo><mi>μ</mi></mrow><mo>)</mo></mrow><mn>2</mn></msup></mrow><mo>=</mo><mrow><munder><mo>∑</mo><mi>n</mi></munder><mo></mo><msup><mrow><mo>(</mo><mrow><mrow><mo>(</mo><mrow><msub><mi>x</mi><mi>m</mi></msub><mo>-</mo><msub><mi>μ</mi><mi>n</mi></msub></mrow><mo>)</mo></mrow><mo>+</mo><mrow><mo>(</mo><mrow><msub><mi>μ</mi><mi>n</mi></msub><mo>-</mo><mi>μ</mi></mrow><mo>)</mo></mrow></mrow><mo>)</mo></mrow><mn>2</mn></msup></mrow></mrow></mtd></mtr><mtr><mtd><mrow><mo>=</mo><mrow><mrow><mi>n</mi><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><msubsup><mi>σ</mi><mi>n</mi><mn>2</mn></msubsup></mrow><mo>+</mo><mrow><msup><mrow><mi>n</mi><mo></mo><mrow><mo>(</mo><mrow><msub><mi>μ</mi><mi>n</mi></msub><mo>-</mo><mi>μ</mi></mrow><mo>)</mo></mrow></mrow><mn>2</mn></msup><mo>.</mo></mrow></mrow></mrow></mtd></mtr></mtable></mtd><mtd><mrow><mo>(</mo><mn>14</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
n
m
2
2
Alternatively, each distribution can be by an associated segment and the cost would be nσ+mσ. Thus the additional cost ΔC due to modeling the two distributions with a single segment is given by expression (15):
<math overflow="scroll"><mtable><mtr><mtd><mtable><mtr><mtd><mrow><mrow><mi>Δ</mi><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><mi>C</mi></mrow><mo>=</mo><mrow><mrow><mfrac><mrow><mi>n</mi><mo></mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo></mo><msup><mi>m</mi><mn>2</mn></msup></mrow><msup><mrow><mo>(</mo><mrow><mi>n</mi><mo>+</mo><mi>m</mi></mrow><mo>)</mo></mrow><mn>2</mn></msup></mfrac><mo></mo><msup><mrow><mo>(</mo><mrow><msub><mi>μ</mi><mi>n</mi></msub><mo>-</mo><msub><mi>μ</mi><mi>m</mi></msub></mrow><mo>)</mo></mrow><mn>2</mn></msup></mrow><mo>+</mo><mrow><mfrac><msup><mi>mn</mi><mn>2</mn></msup><msup><mrow><mo>(</mo><mrow><mi>n</mi><mo>+</mo><mi>m</mi></mrow><mo>)</mo></mrow><mn>2</mn></msup></mfrac><mo></mo><msup><mrow><mo>(</mo><mrow><msub><mi>μ</mi><mi>n</mi></msub><mo>-</mo><msub><mi>μ</mi><mi>m</mi></msub></mrow><mo>)</mo></mrow><mn>2</mn></msup></mrow></mrow></mrow></mtd></mtr><mtr><mtd><mrow><mo>=</mo><mrow><mfrac><mi>mn</mi><mrow><mi>n</mi><mo>+</mo><mi>m</mi></mrow></mfrac><mo></mo><mrow><msup><mrow><mo>(</mo><mrow><msub><mi>μ</mi><mi>n</mi></msub><mo>-</mo><msub><mi>μ</mi><mi>m</mi></msub></mrow><mo>)</mo></mrow><mn>2</mn></msup><mo>.</mo></mrow></mrow></mrow></mtd></mtr></mtable></mtd><mtd><mrow><mo>(</mo><mn>15</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
C=m
n
m
2
Assuming n is much larger than m so that the anomalous segment length is much longer than the normal segment length, the expression simplifies to equation (16):
Δ(μ−μ), (16)
so that:
<math overflow="scroll"><mtable><mtr><mtd><mrow><mi>λ</mi><mo>≤</mo><mrow><mfrac><msup><mrow><mi>m</mi><mo></mo><mrow><mo>(</mo><mrow><msub><mi>μ</mi><mi>n</mi></msub><mo>-</mo><msub><mi>μ</mi><mi>m</mi></msub></mrow><mo>)</mo></mrow></mrow><mn>2</mn></msup><mn>2</mn></mfrac><mo>.</mo></mrow></mrow></mtd><mtd><mrow><mo>(</mo><mn>17</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
Thus, the value of λ can be set based on a definition of anomaly, determined by the length m of an anomalous segment and the deviation of the anomalous segment from normal behavior.
One problem with expression (17) is that λ varies with the scale of the metrics, a problem that is avoided by scaling all within segment variances by K, where K is an estimate of the data variance, to result in expression (18):
<math overflow="scroll"><mtable><mtr><mtd><mrow><mi>λ</mi><mo>≤</mo><mrow><mfrac><msup><mrow><mi>m</mi><mo></mo><mrow><mo>(</mo><mrow><msub><mi>μ</mi><mi>n</mi></msub><mo>-</mo><msub><mi>μ</mi><mi>m</mi></msub></mrow><mo>)</mo></mrow></mrow><mn>2</mn></msup><mrow><mn>2</mn><mo></mo><mi>K</mi></mrow></mfrac><mo>.</mo></mrow></mrow></mtd><mtd><mrow><mo>(</mo><mn>18</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
One technique for estimating value K is by taking the variance of the data after excluding the lowest 5 and the top 5 percent of the data values.
2
The resulting technique is data-independent and sets λ based on the length of anomaly and deviation of the anomaly from normal behavior. The formula is a·b/2, where a is the length of anomaly and b is the distance of the normal from the abnormal (the distance of means) normalized by the normal variance, K. A reasonable setting for λ is a value between approximately 20 and 50 for any data. For example, with a setting of 20 a segment is anomalous if lasting at least 10 samples and the b value is at least 2. Similarly a segment with the setting 20 is anomalous if lasting at least 20 samples and the b value is at least 1, and the like. The result is reasonable segmentation with a few possible occurrences of over-segmentation.
The segment weight for the segment (i, j) is a Lagrangian sum of two terms, one term that enforces homogeneity and a second term that enforces compactness. Two reasonable choices for the homogeneity term are (scaled) segment variance according to expression (19), and Gaussian-based distortion according to expression (20):
<math overflow="scroll"><mtable><mtr><mtd><mrow><mrow><mfrac><mn>1</mn><mi>K</mi></mfrac><mo></mo><mrow><munderover><mo>∑</mo><mrow><mi>t</mi><mo>=</mo><mi>i</mi></mrow><mi>j</mi></munderover><mo></mo><msup><mrow><mo>(</mo><mrow><msub><mi>X</mi><mi>t</mi></msub><mo>-</mo><msub><mi>μ</mi><mrow><mi>i</mi><mo>,</mo><mi>j</mi></mrow></msub></mrow><mo>)</mo></mrow><mn>2</mn></msup></mrow></mrow><mo>;</mo></mrow></mtd><mtd><mrow><mo>(</mo><mn>19</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
<math overflow="scroll"><mtable><mtr><mtd><mrow><mi>log</mi><mo></mo><mrow><munderover><mo>∑</mo><mrow><mi>t</mi><mo>=</mo><mi>i</mi></mrow><mi>j</mi></munderover><mo></mo><mrow><msup><mrow><mo>(</mo><mrow><msub><mi>X</mi><mi>t</mi></msub><mo>-</mo><msub><mi>μ</mi><mrow><mi>i</mi><mo>,</mo><mi>j</mi></mrow></msub></mrow><mo>)</mo></mrow><mn>2</mn></msup><mo>.</mo></mrow></mrow></mrow></mtd><mtd><mrow><mo>(</mo><mn>20</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
Gaussian-based distortion has an advantage over segment variance in that the Gaussian-based distortion is naturally scaled as a logarithm, since the difference of two logarithms is a ratio. Thus, a further scaling is superfluous. With segment variance, scaling is used as discussed hereinabove.
Suitable choices for the compactness term are the number of segments λ, and entropy of segments λ(I-j)·log(i-j).
An illustrative technique uses (scaled) segment variance and the number of segments as the weight terms, thus resulting in an intuitive approach to setting the value of the parameter λ.
S
S
S
S
Dynamic programming can be used to globally minimize expression min{C+λ(Number of Segments)} over all possible segmentations, and discover the number, the locations, and the character of the segments. The contribution of segment (i, j) to expression min{C+λ(Number of Segments)} with the inclusion of parameter K is given in equation (21) as follows:
<math overflow="scroll"><mtable><mtr><mtd><mrow><mrow><msub><mi>w</mi><mrow><mi>i</mi><mo>,</mo><mi>j</mi></mrow></msub><mo>=</mo><mrow><mrow><mfrac><mn>1</mn><mi>K</mi></mfrac><mo></mo><mrow><munderover><mo>∑</mo><mrow><mi>t</mi><mo>=</mo><mi>i</mi></mrow><mi>j</mi></munderover><mo></mo><msup><mrow><mo>(</mo><mrow><msub><mi>X</mi><mi>t</mi></msub><mo>-</mo><msub><mi>μ</mi><mrow><mi>i</mi><mo>,</mo><mi>j</mi></mrow></msub></mrow><mo>)</mo></mrow><mn>2</mn></msup></mrow></mrow><mo>+</mo><mi>λ</mi></mrow></mrow><mo>,</mo></mrow></mtd><mtd><mrow><mo>(</mo><mn>21</mn><mo>)</mo></mrow></mtd></mtr></mtable></math>
S
S
and the problem of minimizing expression min{C+λ} is equivalent to finding the segmentation that minimizes the sum of segment weights given in equation (21).
i,j
1
1,1
n
1≦k<n(s
k
k,n
n
1≦k<n
k
k,n
n
S
S
n
n
n
For an ordered set of N samples with segment costs w, the segmentation that minimizes the segment cost sum can be found by setting n=1 and setting sequal to w, setting n=N+1 and setting s=min+w) and k=argmin(s+w) for n<N, then stopping. In the illustrative technique, value sis the minimum of expression min{C+λ} over the first n samples. The optimum segmentation of the first n samples is the optimum segmentation of the first ksamples, which were found in step k, appended by the single segment that extends from sample kto sample n. Accordingly, the technique, which is a special case of dynamic programming, is used to find the optimum segmentation of the metric data.
In contrast to the dynamic programming technique depicted herein, time-series segmentation refers to the partitioning of a time-series into temporal segments, where each segment is summarized by one or a few values, such as the mean of the data points in the segment. Segmentation of time-series is relevant to many disciplines including change point detection, data mining, classification, and clustering. Dynamic programming, although also a time-series segmentation technique, is less common than three classical approaches to segmentation including sliding window, top-down, and bottom-up techniques. Each of the three sliding window, top-down, and bottom-up approaches seek to find a sub-optimal segmentation of the time-series by minimizing a cost function. The cost function can be, for instance, the average mean-squared error between the data points and the mean value of the segment containing the data points.
In the sliding window technique, a segment is grown until some error bound on the cost function is exceeded at which point a new segment starts. Each time the error bound is exceeded, a new segment starts and the process is repeated until the end of the time-series is reached.
In the top-down technique, the time-series is recursively partitioned until a stopping criterion such a pre-defined number of total segments or an average mean-squared error is reached. At each step of the recursion, each point of the time-series is tested to find the split point that minimizes the cost function.
The bottom-up technique starts with N segments, where N is the length of the time-series, and at each step combines the two segments that minimize the cost function.
All three approaches are sub-optimal in terms of minimizing the cost function. Specifically, at each step the approaches find the partition that minimizes the cost function only for that step and do not necessarily find the segmentation that minimizes the cost function. All three approaches have O(N) complexity, in which the total number of segments is assumed to be much smaller than N. The dynamic programming technique has a greater computational complexity (O(N2)) than the three classical approaches, but is optimum in terms of minimizing the cost function.
Terms “substantially”, “essentially”, or “approximately”, that may be used herein, relate to an industry-accepted tolerance to the corresponding term. Such an industry-accepted tolerance ranges from less than one percent to twenty percent and corresponds to, but is not limited to, functionality, values, process variations, sizes, operating speeds, and the like. The term “coupled”, as may be used herein, includes direct coupling and indirect coupling via another component, element, circuit, or module where, for indirect coupling, the intervening component, element, circuit, or module does not modify the information of a signal but may adjust its current level, voltage level, and/or power level. Inferred coupling, for example where one element is coupled to another element by inference, includes direct and indirect coupling between two elements in the same manner as “coupled”.
The illustrative block diagrams and flow charts depict process steps or blocks that may represent modules, segments, or portions of code that include one or more executable instructions for implementing specific logical functions or steps in the process. Although the particular examples illustrate specific process steps or acts, many alternative implementations are possible and commonly made by simple design choice. Acts and steps may be executed in different order from the specific description herein, based on considerations of function, purpose, conformance to standard, legacy structure, and the like.
While the present disclosure describes various embodiments, these embodiments are to be understood as illustrative and do not limit the claim scope. Many variations, modifications, additions and improvements of the described embodiments are possible. For example, those having ordinary skill in the art will readily implement the steps necessary to provide the structures and methods disclosed herein, and will understand that the process parameters, materials, and dimensions are given by way of example only. The parameters, materials, and dimensions can be varied to achieve the desired structure as well as modifications, which are within the scope of the claims. Variations and modifications of the embodiments disclosed herein may also be made while remaining within the scope of the following claims.
BRIEF DESCRIPTION OF THE DRAWINGS
Embodiments of the invention relating to both structure and method of operation may best be understood by referring to the following description and accompanying drawings:
FIGS. 1A
1
1
1
, B, C, and D are schematic block and pictorial diagrams showing embodiments of an automated information technology (IT) management system that optimizes temporal segmentation;
FIG. 2
is a schematic block diagram depicting an embodiment of an article of manufacture implementing an automated information technology (IT) management system that optimizes temporal segmentation;
FIGS. 3A through 3D
are flow charts illustrating one or more embodiments or aspects of a computer-executed method for determining optimum temporal segmentation for automated information technology (IT) management; and
FIGS. 4A through 4D
are flow charts showing one or more embodiments or aspects of a computer-executed method for determining optimum temporal segmentation for automated information technology (IT) management. | |
Press release of the company Airport Karlovy Vary s.r.o.
The ceremonial completing of the project "Modernization of the Airport Karlovy Vary - stage 3, 2nd part - Construction of the new terminal building"
The Karlovy Vary Airport has been owned by the Karlovy Vary Region for about 5 years. By completing the 3rd stage of its modernization the preparation and execution part of the basic airport infrastructure modernization has been finished with the total cost of about CZK 300 million. Over a half of this amount was contributed by the EU from their development funds and the Norwegian financial mechanisms as well. The Karlovy Vary Regioninvested about CZK 130 million and another investor was the company Airport Karlovy Vary s.r.o., as the airport's operator.
The first stage of the modernization was started on 1 November 2005 by reconstructing the runway to reach both the higher bearing capacity of its surface and the height adjustment of its eastern part. At the same time the second stage was in the progress, solving the modernization of the runway light protecting device. After completing these two modernization stages in 2006 it was made possible for the airport to accept modern airplanes for the short and middle routes such as Boeing 737 or Airbus 320 regarding the rising number of these airplanes' movements even under the worse weather conditions.
In May 2007 the third modernization stage was started. Its first part reacted to the need to meet the Schengen agreements valid for the airports adjustment in connection to the Czech Republic's joining the Schengen area, the second part reacted especially to the need to increase the check in comfort of the passengers and possibility to extend provided services, e.g. fast food for the public and extension of the commercial area for goods sale, or opening of the VIP and Business Rooms for the passengers. By executing this final and for the public visible modernization stage the standard level of both the space and quality was reached which is ecpected from the regional EU airports of similar importance.
Except of the period from 8 March to 28 May 2006, when the airport was closed, the particular modernization stages and parts were run under full working arrangements. Together with the running modernization the Airport's operator invested in its development nearly CZK 30 million, for example by completing the fencing, providing new devices for airplanes dispatching, modernizing the vehicles of the rescue and fire services, or by implementing the transport and security technologies within the new terminal equipment, etc. At the beginning of 2009 the Aiport's operator was granted the Aerodrome Operating Certificate by the Civil Aviation Office, which confirmed the realigment of the technical infrastructure and operating procedures with the international aviation standards.
During the first five years of the Karlovy Vary Region's ownership the number of the check in passengers grew nearly three times from 25,687 passengers in 2003 to 70,620 passengers in 2008 (data without transit passengers). In that period the number of flights to Moscow increased and a new sheduled flight to St Petersburg was started as well. At the same time there was a hopeful development in the offer of destinations within the sale of holidays in the Mediterranean in the summer season. However, the global economic crisis made the travel agencies axe the number of the offered destinations from five to only two (Rhodos, Antalya).
It is not possible to figure out the overall impact of the crisis upon the Airport' operating outputs yet, nevertheless currently it proves only by decreasing the growth rate in the number of passengers compared to the past.
It is necessary to see the now finished modernization of the airport's basic infrastructure as the essential part and condition of the following future development, whose 'keystone' has just been laid. The general relation between the region's economic prosperity and the succesfully run regional airport is obvious. The Airport Karlovy Vary has except of the inhabitants in the catchment area (1.6 million within 60 minutes) also a big potential especially in the incoming tourism, balneology, and golf sport.
To make the best of this potential by offering new destinations connecting Karlovy Vary to the world is the most important task for the airport's management in the nearest future after completing the airport's modernization. The basic conditions (satisfactory airport infrastructure) are created now and the first steps to this aim have been made by processing the analytic subdata and statistic data for the negotiation with the airlines and the travel agencies. The future key role for the success of the region as well as the airport will be in the mutual intensive cooperation between the airport, Karlovy Vary Region, big towns, hotels, travel agents and the incoming agencies.
Besides the above mentioned facts an extensive study of the Karlovy Vary Airport's development and efficiency was finished last year. Its fulfilment and execution would guarantee economic prosperity and regional development not only for the Karlovy Vary region in distant future. | https://www.airport-k-vary.cz/en/press-releases-archive/6-419-2-media_-the-ceremonial-completing-of-the-project-quotmodernization-of-the-airport-karlovy-vary---stage-3.-2nd-part---construction-of-the-new-terminal-buildingquot.html?com=1 |
Passengers struggle to reach their families from Srinagar airport
Passengers at the Srinagar International Airport were seen on Sunday desperately searching for taxis even as they remained apprehensive about their journey ahead in the valley which was under restrictions with communication lines snapped since August 5.
As people fly back to Kashmir in time for Eid-ul-Azha, reaching home from the airport is a struggle of its own.
Passengers at the Srinagar International Airport were seen on Sunday desperately searching for taxis even as they remained apprehensive about their journey ahead in the valley which was under restrictions with communication lines snapped since August 5.
While some buses were on standby, they were only ferrying passengers to the tourist reception centre at Dalgate.
Some people tried to negotiate and request the taxi drivers, but they refused to go to areas like Civil Lines area at Lal Chowk, located 14 km from the airport, and downtown city, complaining that on their return journey they were detained or harassed by security forces.
Hameeda Bano, who was arrived here in an Indigo flight along with her son and daughter, had to reach Bijbehara. Her pleas to cab drivers fell on deaf ears as no one was ready to travel to the town, which is nearly 65 km away in South Kashmir.
As one entered the city limits, concertina wires were spread across the main roads and policemen in jeeps could be seen asking people to remain indoors and shopkeepers to shut shops.
The usual gaiety seen on the eve of Eid seems to be missing as the valley has been paralysed since the Centre on August 5 revoked provisions of Article 370 which gave Jammu and Kashmir special status.
At the tourist reception centre at Dalgate, many people chose to walk towards their destinations along with their luggage as either the autos or taxis were charging exorbitant rates or they were not simply ready to travel to some areas.
Adah Bhat, who had to reach Nawab Bazar locality, six km from here, decided to walk the distances along with her luggage.
"We can't go to that place. We may be able to drop people there but on the return journey, we are either detained or harassed," alleged Sharik Ahmed, a taxi operator. | |
So says culture. We’re obsessed with relentless focus. We assume that if we encounter a difficult problem the best strategy is to chug red bull or drink coffee. Drugs including Adderall and Ritalin are prescribed to millions to improve focus. Taking a break is a faux pas, mind wandering even worse.
Yet, recent studies paint a different picture: distractions and mind wandering might be a key part in the creative process. Consider a forthcoming paper by Benjamin Baird and Jonathan Schooler to appear in Psychological Science. The scientists gathered forty-five undergraduate students and gave them an Alternative Uses Task, in which they had two minutes to list as many possible uses for common everyday objects. The students then took a twelve-minute break after being randomly divided into three conditions: sitting in a quiet room, performing a difficult short-term memory test, or partaking in a boring task intended to elicit mind wandering. Next, the undergrads returned to more creativity tests, including Alternative Uses Tasks they worked on previously.
How did the break affect the students’ creativity? Which groups came up with more possible uses? Jonah Lehrer reports:
Those students assigned to the boring task performed far better when asked to come up with additional uses for everyday items to which they had already been exposed. Given new items, all the groups did the same. Given repeated items, the daydreamers came up with forty-one percent more possibilities than students in the other conditions.
What does this mean? Schooler argues that it’s clear evidence that those twelve minutes of daydreaming allowed the subjects to invent additional possibilities, as their unconscious minds pondered new ways to make use of [common everyday objects].This is why the effect was limited to those items that the subjects had previously been asked about—the question needed to marinate in the mind, “incubating” in those subterranean parts of the brain we can barely control.
This brings me to a brand new study published in the Creativity Research Journal by a team of researchers from Sydney, Australia, led by Jason Gallate.
For the experiment, Gallate and his team gathered eighty first-year psychology students and, like Schooler and Baird, asked them to perform an Alternative Uses Task (in this case the students had to list as many uses for a piece of paper). The students had two minutes to complete the task. Once they finished, they had five minutes to solve 40 “conceptually simple but taxing arithmetic problems” as quickly and as accurately as possible. The purpose of this distractor task was to simulate an “incubation period,” or to test if their unconscious minds would generate more and novel solutions. Next, the students returned to Alternative Uses Task for two more minutes. In an added twist – and this key feature distinguished Gallate’s study from Schooler’s – participants were randomly allocated into two groups: the aware group was told that they would return to the Alternative Uses Task following the arithmetic task whereas the unaware group was not. Did this make a difference? And how much did the distractor task spur the student’s creativity?
The first thing Gallate et al found was that the distractor task did indeed improve performance on the Alternative Uses Task. This finding, according to Gallate, supports the “incubation effect,” or the idea that more and novel solutions are generated by the unconscious mind after the conscious mind has had a break. The English psychologist and sociologist Graham Wallas first outlined incubation periods as part of a larger theory of creativity nearly one hundred years ago. Famous anecdotal evidence throughout history from Archimedes to Arthur Fry suggests that incubation effects are universal and real. And according to Gallate, they are now being verified empirically: “Of the approximately 50 studies that focus on incubation effects, more than 75% have shown evidence of solutions occurring in at least one of the experimental conditions.”
The question is what causes incubation effects. Some deny incubation effects pointing to functional fixedness, which states that when we focus on a problem we tend to inhibit access to successful solutions. Another theory is known as neural fatigue, or the idea that the brain is exhaustible and during problem solving it runs out of energy; a break, therefore, replenishes its resources.
This returns us to Gallate’s twist. The purpose behind the aware and unaware groupswas to see if incubation effects can be attributed to nonconscious process. Gallate hypothesized that, “participants in the aware condition [would] have higher postbreak creativity scores than those in the unaware condition, as a result of differential activation of nonconscious processing.”
This is precisely what he found:
Participants in the aware condition produced significantly higher postbreak creativity scores than those in the unaware condition… Both aware and unaware participants performed identical tasks, so should have performed equivalently if recovery from specific neural fatigue was the cause of the incubation effect. That performance was better in the aware group supports nonconscious processing as a better explanation. Although the aware group was not consciously working on the problem, it is argued that their knowledge that they would return to the task activated nonconscious incubation of further solutions.
In addition, Gallate found that this effect was pronounced with people who scored higher on an initial test of creativity. This, he argues, helps explain why prodigiously creative people have a knack for spontaneously generating solutions to complex problems. This spontaneity is not the result of an innate talent or a gift from the muses, Gallate says, “but actually the result of the prodigiously creative person working on outstanding problems consistently at a level below consciousness awareness.”
Yet, when I’m stuck on an idea or experiencing a bout of writers block I immediately reach for my coffee mug and try to get in the “zone.” Why? Those Red Bull commercials might be to blame; or maybe it’s our deadline driven society in general. Whatever the reasons, the research outlined here suggests that daydreaming and distractions might contribute to the creative process by giving our unconscious minds a chance to mull over and “incubate” the problems our conscious mind can’t seem to crack.
I’m tempted to use these conclusions to rationalize my meme addiction, but let’s remember that daydreams and distractions per se never helped anyone – there’s a fine line between taking a break and being lazy (or maybe not). The more reasonable conclusion is that when you’re stuck don’t fear distraction and despite what your boss might think, let the mind wander. This, it turns out, is something creative people do really well. Thoreau might summarize it best: “We must walk consciously only part way toward our goal, and then leap in the dark to our success.”
• A special thank you to Jason for letting me interview him and pick his brain about his research. Thanks Jason! | https://bigthink.com/articles/why-you-shouldnt-focus-too-much/ |
The Chief Financial Officer (CFO) of a friendly manufacturing company had to resign.
He did not mess up his taxes. He did not miss a profitability goal. He was not hated by other executives for extravagant behaviors. Year after year, he just could not deliver a reliable cost forecast. His projections were not even consistently too low or too high; they were just consistently off the mark. This created an uncertainty about all the other things he did. He lost the board’s trust and eventually had to resign.
Why could the CFO not produce a reliable cost forecast?
He used averages for energy consumption.
When he needed to produce a cost forecast for electricity for the next quarter, he would first divide last year’s electricity consumption by production to find the average electricity consumption per unit of production. He would then take the next quarter’s production plan, multiply it by last year’s average and adjust it for the change in the utility tariff to arrive at a cost forecast. Surprisingly, he was off the mark all the time. What’s worse, he could not even explain why.
How can a CFO hit the mark on an energy cost forecast?
Simply said, utility consumption is not proportional to production. Average energy used per unit of production makes as much sense as average cost per same unit; energy, as an overall cost, is comprised of a fixed part and a variable part. Only the variable part changes with production level. The fixed cost does not change. This sounds obvious when we talk about material costs and overhead, but it’s somewhat murky when it comes to energy. While it’s easy to distinguish between the cost from the accounting department and the cost of materials, consumed kilowatt-hours all look the same.
The situation can be easily remedied through an energy consumption analysis in relation to production level and other affecting parameters, e.g., weather. Should the CFO have relied on such an analysis, his energy cost forecast would have been based on
Energy cost forecast = (Variable Energy per Unit * Unit Forecast + Energy “overhead”) * tariff
instead of
Energy cost forecast = (Total Average Energy per unit * Unit Forecast ) * tariff.
Where does this hurt business?
The difference between the Average Energy per Unit and Variable Energy per Unit at an industrial facility may reach as high as 40% depending on technology and production load. If the energy portion of the cost is 10%, this difference amounts to 4% in the energy cost forecast.
A pinch is more painful when it comes to deciding if the production of an additional order makes financial sense. All other costs are typically considered to be marginal, whereas energy still comes in as an average. Now we may be looking at a much higher cost difference, since many other costs are already covered by regular production. | https://www.greenq.ca/energy-cost-forecast-may-cause-cfo-to-resign/ |
What does it mean to be a sceptic, or a cosmopolitan? Who was it who first talked about atoms? Why is it sometimes good to be a cynic? Why do Plato and Aristotle still matter today? Ancient Greek Philosophy will give you a whirlwind tour of some of the major philosophers and major ideas in the Greek tradition. We’ll explore some of the ancient world’s strangest and most profound thinkers. And we’ll ask what relevance ancient Greek philosophy still has for us in the 21st Century.
The Theories of Sigmund Freud
This course is designed to introduce you to the life of Sigmund Freud and to explore a few of his most significant ideas and theories. As one of the most prominent theorists in the history of psychology, Freud pioneered the design and implementation of talk therapy as a method for treating mental illness. In this course, you will learn more about Freud the person, his background, his beliefs, and his legacy. In addition, this course will provide a detailed overview of Freud’s key theories on the unconscious, human development, and personality. We will also discuss psychoanalysis, the first...
The Philosophy of Happiness
What is happiness? How can we find a path to happier lives? Is there a single secret to happiness? Or does happiness mean different things to different people? For generations, questions about human happiness have preoccupied philosophers across the world. “The Philosophy of Happiness” looks at philosophers from Ancient China and Greece to the present day. It explores the varied approaches that philosophers have taken to thinking about what happiness means; looks at what some of the greatest minds in history have said about why happiness matters; and asks how we might be able to attain...
Mindful Capitalism: Driving Positive Change in Capitalism
Ready to embrace a new normal? A new normal where we could all be operating as change-makers to help reform capitalism for the better? Through this course, you'll discover why we should be caring about the world's most pressing issues today – inequalities and climate change. You'll also get a glimpse of what having a more mindful capitalism looks like – a system where financial profits align with societal value and environmental sustainability. Most importantly, you'll also discover how we could be change-makers – as consumers, as investors, and as talent. Indeed, no one is too small to...
Understanding Your Brain
This course will give a broad introduction to the fundamentals of neuroscience, covering just what exactly the brain is, what it’s made of, and how its individual components work together to orchestrate the astonishing range of feats we experience every day. We will begin by learning the grand anatomy of the brain, introducing each component part by part. Next, we will delve into the principles of neuronal communication, learning how information is transmitted in the form of electrical signals. We’ll then go on to explore how sensations from the outside world are experienced as perceptions...
Why Read Homer's "Odyssey"
Homer's "Odyssey" was composed over two and a half thousand years ago. Why should we bother to read it now? Because the "Odyssey" is about such perennial issues as self-discovery, exploration, nostalgia for one's home, becoming an adult, appetite for the unknown, testing oneself to the limit, and love of family. Not the least of the reasons for reading it at this time is the fact that it empowers women. It is also a fairytale brimful with one-eyed cannibals, witches, seductresses, and princesses. Odysseus' odyssey is consistently hindered and advanced by women. Discover how this work offers...
What is Wisdom: An Introduction to Philosophy
“Philosophy” literally means “the love of wisdom.” But what is wisdom? And what can philosophy tell us about how we might be able to live more wisely? This course will introduce some of the greatest philosophers, from both the East and West, and explore the practical implications of their ideas.
Masterpieces Of World Literature And Why They Matter
Throughout history and around the world, certain books have made such an impact on readers that they created a permanent place in literature. Often, these books illustrate elements of humanity that resonate with people, such as class struggle or finding oneself. Other times, what the book brings is so unique or groundbreaking that it serves as an example for the next generation of literature. This course will explore ten literary masterpieces from around the world and why they have earned a measure of importance.
Fundamentals of Economics
This course covers key fundamental topics in economics, which drives the world of business and affects people and nations around the globe. In just ten audio lessons, you’ll learn the basics of supply and demand, setting prices in business, Gross Domestic Product, government fiscal and monetary policy, inflation, and much more. After completion of the course, you will be equipped with enough knowledge to discuss a variety of economic issues in any setting, whether work-related or personal.
Vikings: History and Mindset
This course looks at the forces that made the Vikings, their adaptive responses to changing circumstances, and most of all, their successful mindset. It asks the hard questions: What got them started? What gave them their edge? How did they manage to terrorize Europe for three centuries, from Ireland to Ukraine? What tactics did successful kings use against them? Lessons follow the careers of famous Vikings, like Ivar the Boneless and Egil Skallagrímsson, and some not so famous, like Haesten, “the Vikings’ Viking.” Lessons also cover the Viking assaults on Ireland, England, Spain, Russia,... | https://listenable.io/web/courses/?category=general_knowledge |
Puzzled Pint is a social puzzle solving event which happens on the second Tuesday of every month. The Friday before each event, we post a location puzzle to this web site. The solution to that puzzle will lead you to a local pub/bar/restaurant in your city. Hints will be available here on the site, and you can also e-mail uswith questions.
On the night of the event, show up at the pub any time between 7PM and 10PM, and we'll have more puzzles for you to solve while you enjoy drinks and food. Most teams take between 30 minutes and 2 hours to solve a typical puzzle set. "Game Control" will be on hand to give hints and verify answers. | http://www.adventuredesigngroup.com/events/2015/3/10/puzzled-pint |
It’s that time of year again. School bells ringing, playgrounds filled with children, yellow school buses everywhere. It’s time for school to be back in session. Students are anxiously awaiting their first assignments from their teachers as the school year kicks into full swing. But, before the kids hit the books it’s important to have them organized and ready for school in general. Not only will this provide a better learning environment for the child but will also teach them the importance of organization. Here are a few tips to help your child get organized and ready for school.
Designate an area in your home for home work and studying to be completed. The area designated doesn’t have to be huge but it should be neat and tidy stocking only the essentials like paper, pens and pencils. The less clutter the better. The area could be a desk in their room or house, the kitchen table or a quiet corner some where in the home. Ideally the area should be well lit, quiet and uncluttered. It is also a good idea to specify a specific time for home work to be worked on. Getting into a scheduled routine will greatly increase the development of good study habits in your child and help them stay organized.
Having a good backpack or book bag is a back to school essential and a key way for your child to keep their things organized to and from school. The backpack or book bag doesn’t have to be anything fancy but should have one or two pockets for keeping things like pens, pencils and crayons contained. The bag should also have plenty of room for things such as school books and notebooks. It is a good idea to have your child clean out their backpack or book bag once a week or at least every two weeks to keep it uncluttered and organized and to prevent from any assignments being lost or misplaced.
Another key way to help your child stay organized for school is to have a good notebook binder. Depending on what grade your child is in will determine if you need just a simple one inch binder or a five subject notebook binder. Typically elementary students need just a one inch binder to get assignments to and from school but older students will need more sections for the different classes they are taking. Labeling the different sections and keeping the class work in separate sections will help keep your child organized and on top of their assignments. The notebook binder is the perfect organizing tool for keeping school communications and assigned class work and notes all in one convenient place.
Getting organized for school doesn’t have to be a daunting task. Helping your child get ready and organized for school will not only help them learn the importance of organization but will also impact their overall success throughout the school year. Teaching and maintaining good
organization is a skill that will become a life long asset as they grow and head off to college and the work place. | http://wh-magazine.com/primary-school/how-to-help-a-child-get-organized-for-school-2 |
Speaking before an elite audience in Washington in March 2000, then US President Bill Clinton summarized much of Western thinking on the internet when he hailed a new century in which “liberty will be spread by cell phone and cable modem.”
This would occur, Clinton said, despite the efforts of countries like China to fight the spread of information.
“Now there’s no question China has been trying to crack down on the internet,” Clinton said, his eyebrows arched as he neared the punchline. “Good luck! That’s sort of like trying to nail jello to the wall.”
In the decades since that speech, Clinton’s jello comment has become a something of a dark joke among internet freedom advocates, as China continued to build up the Great Firewall, the world’s most sophisticated system for controlling and surveilling the web.
A new report out this week shows that China is by far the most effective censor of the internet, and far from retreating, is exporting its model around the world.
Beijing has consistently defied all the confident predictions (including by people far more knowledgeable about the internet than Clinton) that this would be impossible. China’s censors have reigned in blogs, social media, and US search giants, and repeatedly defeated or stymied any attempts to undermine the Firewall, from virtual private networks (VPNs) to the dark web.
Sunday Yokubaitis, chief executive of VPN company Golden Frog, told CNN they have “witnessed a massive increase” in attempts to block their services in China.
“We used to see blocks roughly once every six weeks; they now try to block our service multiple times every day,” he said.
As I document in my book, “The Great Firewall of China: How to Build and Control an Alternative Version of the Internet,” Beijing’s model of the internet is now spreading beyond its borders, with China’s censors working actively with their counterparts in Russia, Uganda and a host of other countries to build up internet controls and crack down on online dissent.
A new report from Freedom House — a US government-funded NGO — supports this. During 2018, the authors found, “internet freedom declined for the eighth consecutive year.”
“A cohort of countries is moving toward digital authoritarianism by embracing the Chinese model of extensive censorship and automated surveillance systems,” Freedom House said.
China’s Foreign Ministry spokesman Lu Kang told a regular press conference Thursday that the report’s findings “are sheer fabrications.”
“They are unprofessional, irresponsible and made with ulterior motives,” Lu added.
Forlorn hope
During the early decades of the internet, many influential thinkers claimed the internet — by its very nature — would spread democracy and freedom of speech.
The combined forces of globalization and the web were, Thomas Friedman wrote in 2000, “acting like nutcrackers to open societies.”
But as writer Evgeny Morovoz has demonstrated, this assumption was often based on a willful misreading of the events of the Cold War, and the effectiveness of strategies like smuggling photocopiers and fax machines through the Iron Curtain and Radio Free Europe broadcasts.
“Viewing it through the prism of the Cold War, they endow the internet with nearly magical qualities; for them, it’s the ultimate cheat sheet that could help the West finally defeat its authoritarian adversaries,” Morozov writes. “In other words, let them tweet, and they will tweet their way to freedom. By this logic, authoritarianism becomes unsustainable once the barriers to the free flow of information are removed. If the Soviet Union couldn’t surprise a platoon of pamphleteers, how can China survive an army of bloggers?”
In fact, as the Freedom House report demonstrates, the internet is an excellent tool for social control, enabling surveillance and guiding of public opinion that would have been impossible in the past.
This has been further boosted by the ongoing panic in the US and other countries which have typically been the biggest proponents of internet freedom over fake news and alleged election interference online.
“Throughout (2018), authoritarians used claims of ‘fake news’ and data scandals as a pretext to move closer to the China,” the report said. “Governments in countries such as Egypt and Iran rewrote restrictive media laws to apply to social media users, jailed critics under measures designed to curb false news, and blocked foreign social media and communication services.”
Global model
Since the first virtual blocks were laid in the Great Firewall, China has acted as a potential model for online censorship, with everyone from Bono to US lawmaker Joe Lieberman citing Beijing’s policies in arguments for greater internet controls.
In recent years, however, especially since President Xi Jinping came to power, China has actively worked with foreign governments to help them build firewalls of their own, and lobby at the United Nations and other bodies to reduce protections for internet freedom worldwide.
This week, the UN’s International Telecommunication Union gathered for its quadrennial meeting in Dubai. In the past, the ITU has been a key body for China and other leading internet censors, particularly Russia, to push for changes to international regulations to legalize or enable their controls.
In 2015, China succeeded in expanding the ITU’s powers and those of national governments to set internet policy, though Chinese delegates failed to remove the terms “freedom of expression” and “democratic” from a key internet governance document.
While the meeting has only just got underway, most experts expect the issue of internet governance — the key argument over which boils down to whether only governments should be able to set global policy, or if civil society and industry should have a role as well — to dominate matters again in Dubai.
China’s position is that national governments have the ultimate right to control the internet within their borders, and that this covers foreign companies, citizens, and anyone who attempts to interfere by, for example, creating software to undermine the Great Firewall.
The doctrine of cyber sovereignty, as advocated by Xi Jinping, will be on full display next month at China’s own World Internet Conference in the southern Chinese river town of Wuzhen.
This year’s forum “will further enhance the establishment of an internet development outlook characterized by mutual trust and collective governance among countries worldwide,” according to Liu Liehong, deputy director of the Cyberspace Administration of China, the country’s top censor.
Worrying trend
As well as working to change international law and craft a model of internet control that can be easily adopted by other countries, Chinese officials and companies have also been actively engaged in the groundwork of building censorship networks overseas.
Golden Frog’s Yokubaitis said his company had seen Chinese-style tactics being adopted in Russia and the Middle East, adding that China is “exporting blocking technologies to countries with repressive regimes.”
The Freedom House report said that Beijing was taking steps to “propagate its model abroad” with large-scale trainings of foreign officials, providing censorship and surveillance technology, and pressuring international companies to comply with Chinese standards even when operating outside the country.
“These trends present an existential threat to the future of the open internet and prospects for greater democracy around the globe,” the report said.
It listed 57 countries, from European democracies to Central Asian autocracies, which had bought telecom infrastructure, AI surveillance tools, or attended or hosted trainings by Chinese censors and propaganda operatives. | https://www.kbzk.com/cnn-asia-pacific/2018/11/02/china-is-exporting-the-great-firewall-as-internet-freedom-declines-around-the-world/ |
A phrase that perhaps we are very familiar with. This idea of the agreement. Invitation, acceptance – contract.
But a contract to do what exactly?
It is certainly not a contract to spend 10 minutes together. We can so that at a bus stop. Nor is it a contract to do what you always do – with everyone – yet again.
Surely it is an agreement to create an individual dance together.
Whatever the limitations we find in each other – we are jointly contracted to create something unique and we should share with equal commitment to that venture. Perhaps we cannot yet create what we aspire to. But with patience, focus, and listening skills we can indeed create something.
This takes so much work – it is so far from easy – just look at this image of Joâo Alves dancing this weekend at La Baldosita Milonga.
He is working so hard. Not on showing his skills to the outside world – but instead on her, the music, and what they can create together. He did this all evening – dancing noticeably differently with each follower – adjusting so many things.
In my view followers listen more than most men – if they did not they would have no idea where to move. Leaders take a while to learn to listen to the woman’s body – they have a lot of other concerns of course – navigation, safety and what to lead next to name just a few. But perhaps this is an excuse.
What I am enjoying trying to learn now is how to focus on the art. On the work that we are creating. To listen to her and then to adjust totally what I lead and how I lead it – because this is her – and this is now – and that was her response.
Creation is not a science. In the context of social tango it is an artistic miracle. Great art always asks questions and people respond in their own individual way..
What I am finding is that within this context limitations actually become inspiring. In my view Picasso created some of his most powerful and engaging work with a charcoal stick and an ink pen.
Constraints help us to focus on the art itself and not on the froth of the possible. If we do not have an ultramarine blue to share then we must instead use what we have – and with care and respect create this kind of image and not that one.
Of course if we are accomplished – and I am certainly not – we would value the experience of dancing with someone equally experienced and talented. But for the rest of us we can derive great pleasure from creating the best art that we can in this moment – in this contract – with this person and to this music.
So perhaps look for someone to dance with who wants to create something individual, something transient and unrepeatable. Someone who listens to you – and above all then changes how they dance because of what they hear.
When you find them – sign that contract.
And smile. | http://www.nigelwdavies.com/2017/09/ |
We appreciate those of you who have given us grace as we start this new process of educating students. The first packets were intentionally not overly challenging for some students. Our goal was to provide some sense of normalcy and stability first. Hopefully, our teachers and staff have reached out to your children as we believe the connection between teacher and student is important. You will notice in next week’s packets we have included the choice of some advanced assignments. We are recommending that you pick an assignment from each column for each day or work up to the time recommended. As always, you can go beyond the recommendation with the enrichment activities listed on the website. The week of April 13th, you’ll see more technology-friendly assignments.
One of the tools available to our teachers, which may be used to provide instruction and some social interaction for our students during this time, is video technology. The ability to provide our students with an opportunity to see and interact with their teachers and fellow classmates is an important aspect of their education and allows them to feel some degree of normalcy during this unusual situation. Participation by your child in any virtual class is completely optional and will not be required, though we do encourage participation by all students. Participation in virtual classrooms will mean that your child will need to be appropriately dressed as if they were attending school and all school rules regarding student conduct will be in effect. You should also be aware of your child’s background surroundings when a class by video is in progress and try to reduce background noise and other items that might be a distraction to other students. If you choose not to utilize the video feature, your child could still participate by audio should you wish.
Clarification
This statement was included in March 30th email:
“Additionally, please do not ask teachers for additional work for your student. If you need additional work or resources please visit our Additional Elementary Enrichment Resources webpage.”
Clarification of this statement:
We are asking that you do not reach out to your teacher to ask for individualized lessons or projects for your student. You may reach out to your teacher for help on current assignments or suggestions of which of the enrichment activities on the website would be best for your child.
Social-Emotional Learning
An important part of education is the social-emotional learning that takes place between students and staff and amongst students. Unfortunately, our current situation makes this more challenging. Within the next few days, teachers will be reaching out to students to connect with them in a variety of ways. We know each family has unique circumstances and may not be able to connect with their teacher during certain times, using technology, etc. To accommodate these circumstances teachers may choose to connect in one or more of the following ways:
Please understand your student is not required to participate in video meetings or respond to emails, these are just opportunities to connect with teachers during the school closure.
Access to Devices and the Internet
On March 23, we asked you to answer a short survey regarding your student’s access to technology and the internet. Due to the responses in this survey, we have been hesitant to do as much work with technology. As we move to more technology-rich activities in our Choice Boards, please let your teacher know if you are unable to access the resources you need to complete these activities. The teacher will work with you to provide options for your student.
Posting to Social Media
It’s common practice to share our photos on social media sites. However, during a time of video learning, Spring Hill Schools request that parents not take or post pictures of students or teachers who may be meeting virtually as a class. Every family has different rules about posting photos of their children online. Thank you for respecting the privacy of our students and staff. | https://usd230.org/cms/One.aspx?portalId=56214&pageId=32211887 |
Displaying 31 - 40 of 548
This Guidance Note aims to provide actions to be considered for ensuring gender-based violence (GBV) service provision in the time of COVID-19 with its heightened risks.
This qualitative research explored the motivations and challenges of foster parents in Accra, Ghana.
The purpose of this manual is to provide guidance on how to collect and report data on children in formal alternative care in a standardised way, and to analyse, present, and make the data available for use.
The child protection in emergencies (CPiE) capacity gaps analysis (CGA) in the West and Central Africa (plus Mauritania) region, targeting CPiE practitioners with 3-5 years of professional experience, aimed to collect and provide information on (1) identified key CPiE capacity gaps and (2) existing and available capacity building initiatives.
This study reports findings from interviews with young adults with experience of kinship care in Ghana, about what lessons their kinship care experiences provided in their transition to adulthood.
The purpose of this study was to explore the experiences of young people with child protection meetings, in order to develop better ways to improve children’s participation in child protection in Ghana.
The aim of this study is to understand the complexity of child poverty in Ghana by investigating children's access to various goods and services crucial for their long-term development.
This report notes existing gaps and needs in social service provision and provides recommendations for specific actions to strengthen the social welfare workforce in Ghana.
This Practitioner Guidance Paper shares the different approaches taken by three Family for Every Child Members to mitigate this disruption: moving to online learning for unaccompanied minors with METAdrasi in Greece; using the radio to provide far-reaching lessons with FOST in Zimbabwe; and engaging parents in their children's education using a socially-distanced homework collection system with CAP Liberia.
This paper disentangles the effects of behavioral change promotion from cash transfers to poor households through an experiment embedded in a government program in Niger. | https://bettercarenetwork.org/regions-countries/africa/western-africa?field_document_type_target_id=All&page=3 |
This free event is part of Meridian University’s webinar series, “Integral Voices, Evolutionary Conversations on Culture and Consciousness.” The program will feature a video conversation and Q@A with Helen Palmer and Aftab Omer, PhD.
You may listen to the conversation live by webcast at 11 am – noon PDT, or to the recording at a later date.
It seems so natural to observe the patterns of our mind and to hear the self-reports of people who see the world differently. Yet that simple turn of attention that self-reflection requires marks a giant leap in the evolution of consciousness.
The first turn of attention lets us witness our personality structure as described in the nine Enneagram types. We can recognize thoughts as they appear and tell them to someone else. We can note our emotions as they arise and describe them to others. We also can learn to relax somatic contractions that govern our flow of life force. Self-reflection reveals the conditioned patterns of type.
In the language of science, self-reflection joins two different levels of consciousness – a conditioned level of embedded patterns in the neuropathways of our brain and a receptive state of mind that remains when cognitive/emotional dominance recedes.
In the vocabulary of practice, we relax attention to the patterns passing through our mind – “objects of attention” (thoughts, emotions and sensations that are structured according to Enneagram type). Yet the “pure consciousness” that notes those patterns as they arise makes prayer and meditation possible.
From the viewpoint of awakening, we can learn to witness our own psychological structure. We can recognize the “neuromarkers” of type such as doubt, judgment and flattery as they arise and before they become convincing. We can learn to relax emotional passions that drive reactive behavior, and voluntarily reduce somatic constrictions that signal inner distress.
These capacities of mind demonstrate next stages of development. For who but ourselves can choose to observe and relax the reactive patterns that drive us instead of letting them run?
Aftab Omer, PhD, is a sociologist, psychologist, futurist and the president of Meridian University. Raised in Pakistan, India, Hawaii and Turkey, he was educated at the universities of MIT, Harvard and Brandeis. His publications have addressed the topics of transformative learning, cultural leadership, generative entrepreneurship and the power of imagination. His work includes assisting organizations in tapping the creative potentials of conflict, diversity, and complexity. He is a Fellow of the International Futures Forum and the World Academy of Arts and Sciences. | https://www.enneagramworldwide.com/programs/enneagram-studies-psychological-studies-and-spiritual-states-of-mind/ |
All the heat that is transferred from the piping hot grill surface to the meat directly adjacent to it has to reach the center of the steak for it to be fully cooked through.
How often should you flip a steak on the grill?
“You should only touch your steak three times; once to put it in the pan, once to flip it, and once to take it out of the pan.” This oft repeated mantra is one of the most frequently peddled bits of advice for the novice steak (or burger) cook.
Should you flip steak on grill?
Don’t flip the steak more than once.
Put it in a hot pan, leave it alone until it starts to caramelize, and flip it only once. “You don’t need to keep flipping it every two minutes because then you’re removing the steak from the hot surface.
When should I turn my steak?
When grilling steaks, watch for the “bleed through”—small beads of liquid that rise to the surface of the meat. This signals when it’s time to turn the meat over.
At what temperature do you flip a steak?
Pulling the steak two-to-four degrees before it reaches its final cooking temperature is a good rule of thumb. This means pulling your steak at about 123 degrees for a rare steak, 128 degrees for medium rare, 138 degrees for medium, 148 degrees for medium well and 158 degrees for a well-done steak.
How do I grill the perfect steak?
Place the steaks on the grill and cook until golden brown and slightly charred, 4 to 5 minutes. Turn the steaks over and continue to grill 3 to 5 minutes for medium-rare (an internal temperature of 135 degrees F), 5 to 7 minutes for medium (140 degrees F) or 8 to 10 minutes for medium-well (150 degrees F).
How long do I cook a steak on each side?
Cook a 2cm-thick piece of steak for 2-3 minutes each side for rare, 4 minutes each side for medium, and 5-6 minutes each side for well-done. Turn the steak only once, otherwise it will dry out. Always use tongs to handle steak as they won’t pierce the meat, allowing the juices to escape.
How long do you cook a 1 inch thick steak for medium-rare?
If you like your steak medium-rare
For medium-rare, aim for an internal temperature of around 130 degrees. For a 1-inch thick steak, this should take about 7 minutes of cooking on each side. Let the meat rest for up to 10 minutes before serving.
How do you grill the perfect ribeye steak?
Directions
- Preheat a grill to high heat.
- Place rib-eye steaks on a large platter and season with rub on all sides. Transfer seasoned steaks to the hot grill, and cook for 4 to 6 minutes on each side for medium-rare, longer if desired. Remove steaks and let rest for 5 to 10 minutes before serving.
How long do you cook 1 inch steak?
SIRLOIN STRIP STEAKS, RIBEYE STEAKS & PORTERHOUSE STEAKS
|Thickness||Rare 110 to 120 F||Medium 130 to 140 F|
|1″||4 minutes EACH SIDE||6 minutes EACH SIDE|
|1.25″||4.5 minutes EACH SIDE||6.5 minutes EACH SIDE|
|1.5″||5 minutes EACH SIDE||7 minutes EACH SIDE|
|1.75″||5.5 minutes EACH SIDE||7.5 minutes EACH SIDE|
Do you turn a steak every minute?
frequent flipping cooks the meat more evenly, and also significantly faster: flip every minute instead of once or twice and the meat will be done in a third less time. … He advises that you flip the steak every minute or so to encourage a flavorful crust to develop even as it cooks the steak to tender perfection.
Do you cook steak on high heat on stove?
Season the steaks all over with the salt and pepper. Turn on your exhaust fan and heat a heavy pan (preferably cast iron or stainless steel) over medium-high heat until it’s VERY hot. … Continue to cook the steaks for another 3 to 4 minutes on the second side for rare to medium-rare.
Should you oil steak before grilling?
Season the Steak: Steaks don’t need much to make them great. Just before grilling, brush them lightly on both sides with olive oil and sprinkle with salt and pepper. If you want to get fancy, you can add spices like chili powder, paprika, or garlic powder to the rub.
Should you cook steak on low or high heat?
Obviously, you don’t want to burn your food or start a fire, but when you’re grilling a steak, it’s really important to use the highest heat you can generate. This is because high heat cooks faster and the less time your steak spends cooking, the more tender it will be.
How long do you reverse sear a steak?
Carefully flip the steaks over and sear about 1 ½ to 2 minutes. Use tongs to turn the steaks on their sides to cook and render remaining fat, about 2 minutes total. OPTIONAL: Add one tablespoon of the butter to the pan, melt and use a spoon to briefly baste the tops of the steaks.
What temp is medium well steak?
A “medium-well” steak with an internal temperature of 145 degrees, is really a pretty well-done steak closer to the edges of the meat with a slightly rare section in the center. | https://cassiskitchen.com/grill/how-do-you-know-when-to-flip-a-steak-on-a-grill.html |
The invention provides an interview method and device and a computer readable storage medium. The interview method comprises the following steps of: proposing a plurality of questions to candidates according to a plurality of competency required by recruitment posts; collecting answer texts of the questions answered by the candidates, and forming question-answer pairs by the answer texts and the question texts corresponding to the answer texts; segmenting the question text and the answer text of each question and answer pair to obtain a plurality of question sentences and a plurality of answer sentences of each question and answer pair; and performing information interaction, semantic reasoning and result classification on the plurality of question sentences and the plurality of answer sentences of each question and answer pair by using a pre-trained reasoning model to obtain a comprehensive scoring result of the candidate for the plurality of competency. | |
Q:
Does compiling a program in Visual Studio (Windows Forms, VB.NET) leave a MAC address in the executable?
I am not making an installer. It is just a form as a portable .exe file. Asking because it's generating links to an external Web API (not mine) that is an openload crawler. Although technically legal (streaming is also legal in my country) I still do not want to be linked to it in any way if it spreads further than my circle of friends. It's very useful if you're as lazy as me and hate ads/malware.
A:
It's impossible to give you a definitive answer to this. The short answer: it is unlikely that your MAC (or IP) address will be included in any executable you compile for the purpose you described, unless you intentionally included it.
In order to be more certain, you would have to do a code review of every dependency you have used in your project, which could be a pretty big job.
As pointed out by Z.T. in a comment to your question, though, one way to make it much less likely would be to compile your code in a virtual machine. Exactly how to do that is beyond the scope of an answer to this question; this guide should be adequate to get a virtual machine of Windows running under Windows.
| |
Covid vaccines given to more than 50,000 people in Wales
image captionThe Oxford vaccine rollout started in Wales earlier this week - those figures are not yet included
Latest figures show more than 14,000 people had their first dose of the Covid-19 jab in Wales in the past week.
It takes the numbers on the priority list to have got the Pfizer-BioNTech jab to 49,428 since the rollout started on 8 December.
The figures include people, such as NHS staff, who work in Wales but live over the border.
But they show Wales lagging behind England so far, with a smaller proportion getting a first dose.
The numbers do not include the first to receive the Oxford vaccine, which began to be given this week.
Public Health Wales says the real numbers are likely to be higher, with the figures a snapshot based on those vaccines so far recorded electronically.
They give a breakdown by health board and also show how many Welsh residents have been given their first dose.
But they do not give details of people in different priority categories.
How does Wales compare?
Figures for all the other UK nations are not expected until later on Thursday.
But we know the latest figure for England, where more than 1.1m people were given the first dose by 3 January, is around 1.97% of the population. NHS England has said 60% of doses have gone to people aged over 80.
The figure in Wales means that approximately only 1.56% have been vaccinated up to 3 January - fewer than other UK nations - and the gap appears to be growing compared to last week.
If vaccinations were being given at the same rate as in England, a further 13,000 people would have been given a dose.
Last week's figures showed around 1.7% of people in Scotland had been given the first dose and 1.6% in Northern Ireland. | |
Bloody conflict in Tigray, one of Ethiopia’s semi-autonomous, ethnically defined provinces in the north of the country, is fuelling support for secession from Ethiopia’s federal state.
Prime Minister Abiy Ahmed launched what he called a “law-and-order” operation against the regional government of Tigray, run by the Tigray People’s Liberation Front (TPLF), last November, in response to what he claimed was an “attack” by Tigray’s ruling party on an army compound.
It followed moves by the federal government to bypass the regional government after Tigray rejected Abiy’s decision to postpone elections due to the pandemic and went ahead with its own elections in September.
While Abiy declared at the end of November that he had defeated the TPLF, fighting has continued, with forces from Ethiopia’s Amhara region in the west—which have effectively annexed parts of Tigray to Amhara—and the Eritrean army in the east fighting alongside federal forces against the TPLF. With more than half of Ethiopia’s army based in Tigray, a legacy of the 20-year-long war with Eritrea, Abiy could not rely on the military’s support, to the extent that he sacked his army chief, head of intelligence and foreign minister days after the fighting began.
Aid workers and diplomats believe that thousands have died in the conflict. Villages have been shelled. More than two thirds of Tigray’s health facilities have been destroyed and there has been widespread looting of public and private property—including food stores and oxen for ploughing.
More than one million people have been displaced, with around 60,000 fleeing to Sudan. More than two thirds of Tigrayans, 4.5 million people, have been without electricity, communications and other essential services for more than four months and are in need of emergency food supplies. For three months, the federal government blocked all access to Tigray and imposed a news blackout of the conflict, shutting down telephone lines and the Internet.
Tigrayans fleeing the conflict, as well as aid agencies, have testified to massacres, the most terrible atrocities and sexual violence. Dominik Stillhart, operations manager at the International Committee of the Red Cross, said, “The violence against the civilian population, especially sexual violence… seems to be a feature of the conflict.”
Michelle Bachelet, the United Nations Human Rights Commissioner, warned of “blanket denials and finger-pointing” as evidence mounts of atrocities committed by all sides, including the Ethiopian National Defence Force, the Eritrean army, the TPLF and its supporters, as well as fighters from Amhara province.
The US, European Union (EU) and United Nations have condemned Eritrea’s presence in Tigray, with Brussels imposing sanctions. The incoming US Biden administration put pressure on the United Arab Emirates to halt its military operations in Yemen, leading to the decommissioning of its drone base in Assab that had been supporting Ethiopian forces against the TPLF. It has called for the withdrawal of Amhara forces from western Tigray, which Amhara lays claim to, a demand Abiy has rejected, dependent as he is on Amhara support both to regain control of Tigray and win the elections set for June.
After months of denying ongoing military operations in Tigray, reports of ethnic atrocities committed against civilians and the involvement of Eritrea’s military in the conflict, Abiy has finally conceded that Eritrean forces did cross into Tigray, claiming that “they feared an attack from the TPLF.” Members of Ethiopia’s interim government in Tigray have admitted that Eritrea controls a 100 kilometre strip of Ethiopian territory along the border, although Abiy said Eritrean President Isaias Afwerki had agreed to withdraw his forces from the region “as soon as Ethiopia’s army could control the trenches along the border.”
To evade responsibility for potential crimes against humanity, he sought to blame Eritrean forces for “atrocities… committed in Tigray region,” thereby antagonizing his ally Afwerki. Should Eritrea withdraw its troops from Tigray, Abiy would be unable to regain control of the region, as thousands of young Tigrayans are reportedly taking up arms.
The Tigrayan conflict has been brewing for some time. The TPLF, a nationalist movement founded in 1974, played a key role in defeating the Moscow-aligned government of Mengistu Haile Mariam in 1991. It became the dominant party in the Ethiopian People’s Revolutionary Democratic Front (EPRDF), a coalition of several militia groups and parties, under the leadership of Meles Zenawi, a Tigrayan, that imposed an authoritarian regime on Africa’s second most populous country of 112 million people.
As resentment grew against Tigrayan political and economic dominance—Tigrayans constitute just six percent of the population—politicians whipped up ethnic tensions in opposition to a unified struggle by the impoverished masses against the Ethiopian elites seeking to open the country to foreign investment. While Ethiopia saw more than a decade of rising growth rates, some of the highest in Africa that turned the country into the economic powerhouse of the region, little of this trickled down to the impoverished masses.
There were huge protests starting in 2014, precipitated by a central government land grab of historic Oromo lands that were handed over to overseas companies—often from the Gulf and China, for infrastructure and export-orientated agribusiness. Ethnic protests in Oromia and Amhara, who constitute about 35 percent and 27 percent of the population, saw thousands killed and tens of thousands arrested.
The ensuing political crisis forced the resignation in February 2018 of Prime Minister Hailemariam Desalegn, who took office after Meles’ death in 2012. He was succeeded by Abiy Ahmed, a former military intelligence officer and an Oromo with close links to Washington. He was welcomed at home and abroad as a “reformer,” receiving the Nobel Peace Prize for ending the 20-year-long war with Eritrea one year later. In November 2019, he disbanded the EPRDF, replacing it with the Prosperity Party (PP), which TPLF refused to join.
Abiy released tens of thousands of political prisoners, ended the internet blackout imposed by the previous government, lifted a ban on several political parties, some of which had been designated “terrorist” groups, paving the way for their leaders to return to Ethiopia. He introduced a raft of measures aimed at reducing the TPLF’s dominance, including retiring their military and government officials, instigating corruption charges against some members and announcing plans for the privatisation of swathes of the state-owned economy and liberalisation of the banks.
But Abiy’s promised new dawn was short lived. The military, enraged by the changes, mounted an abortive coup in 2019. Despite Abiy’s promise to end ethnic discrimination, ethnic violence increased, with 1.7 million internally displaced people living in camps. Viewed as collectively responsible for the crimes of the previous regime, some 100,000 Tigrayans were driven from their homes and were living in camps even before the conflict erupted last year. Land sales continued, under conditions where 80 percent of Ethiopians are dependent on the land for their subsistence and at least 25 percent of the population ekes out an existence on less than $2 a day.
Tigray is only one of the festering ethnic conflicts in a country that is a mosaic of ethnicities and languages. The Financial Times recently cited Abiy admitting that Ethiopia’s federal army was fighting a guerrilla war on at least eight separate fronts as unrest grows across Ethiopia.
Abiy also faces an increasingly fraught border dispute with neighbouring Sudan, which in December moved its forces into the long-contested border region of al-Fashaqa, the fertile agricultural triangle farmed by Ethiopians since the mid-1990s, that Khartoum claims as its own, prompting Addis Abba to redeploy troops to the border. The hostilities forced Ethiopia’s Amhara farmers to flee the region.
Abiy is also facing Egyptian and Sudanese opposition to Ethiopia’s Grand Ethiopian Renaissance Dam (GERD) and its plans to fill what is Africa’s largest reservoir on its own schedule that its neighbours fear could jeopardise their water supply in the event of a drought. The Blue Nile, whose source lies in Ethiopia, provides more than 80 percent of the Nile’s waters. With Ethiopia refusing to negotiate the timetable, there are fears that Egypt and/or Sudan may support the armed insurgencies in Benishangul-Gumuz and Oromia regions.
Under such conditions, the TPLF and other insurgent groups would seize the opportunity to resist the federal government in Addis Ababa, precipitating a wider civil war that threatens not just the survival of Abiy’s government but the stability of the entire region. | https://www12.wsws.org/en/articles/2021/04/13/afri-a13.html |
· As with non-shutdown maintenance, the single biggest factor that impacts shutdown management is the operating schedule. In a plant that operates from 8 a.m. to 5 p.m. five days a week or in a power-generating station that has seasons where individual units can be shut down for extended periods, shutdown scheduling is relatively easy.
· mill motors, etc.) Rotor have Commutators & carbon brushes always Excitation & control The speed of the A.C. motor is controlled by varying GE Energy Power Conversion Author : Muthukkumaran, S DocRef : File : Maintenance Schedule ...
· Visit ESPN to view the West ia Mountaineers team schedule for the current and previous seasons — Ryan Hawkins scored 19 points to lead four players in double figures ...
ii - Maintenance and Safety Manual 704-0212-211 VM Series Maintenance and Safety Manual The information in this document is subject to change without notice and does not represent a commitment on the part of Hurco Companies, Inc. (Hurco). The software
Visit ESPN to view the Los Angeles Lakers team schedule for the current and previous seasons — Stephen Curry scored 30 points, hitting five 3-pointers and adding a one-handed ...
Fundamentals of Ultrasonic Inspection* Revised by Leonard J. Bond, Iowa State University ULTRASONIC INSPECTION is a family of nondestructive methods in which beams of high-frequency mechanical waves are intro-duced into materials, using transducers, for
Visit ESPN to view the Kansas Jayhawks team schedule for the current and previous seasons — Jaiden Delaire tied his career high with 22 points, Harrison Ingram scored seven of ...
· Game between the Memphis Grizzlies and the Denver Nuggets on Fri January 21st 2022 at 7:00pm CST at Ball Arena Denver, CO. Watch the game on Bally Sports Southeast - Memphis or listen to the game ...
Process Audit and Preventive Maintenance impact to 5S applying lean principles and especially 5S. To understand how our research and development work is connected to increasing productivity and LEAN 5S, it''s important to know the principle of LEAN in its simplicity.
Mill Lubrication System 1. OBJECTIVES: To identify the definition and importance of a hydraulic lubrication system. To be familiarized with the lubricant and equipment used in the system. To understand the process and various design of Mill lubrication system. To identify some problems encountered by the system, and formulate some recommendation to help fix the problems.
· Routine Maintenance for Size Reduction Equipment Posted October 27, 2016 by Schutte Buffalo Replacing Hammer Mill Wear Parts Any machine that has moving or rotating parts requires routine maintenance to ensure that it performs at optimal capacity. This is ...
preventative maintenance schedule retsch – Gold Ore Crusher Ball Mill Grinder Plans. Logistics … installation guide en.pdf Focus GC PID Upgrade Kit for Trace GC Ultra, installation manual en.pdf Focus GC, Preventive Maintenance Schedule …»More detailed
· VMC Maintenance Schedule. Clean debris from the and Receiver areas. Clean debris from receiver pallet clamped switch. Grease the plunger. Clean the locating pins and bushings. Inspect the pallet wipers. Inspect the door for proper operation. Grease the door side guide rails. Clean the chips from the tool changer.
– The purpose of this paper is to review the literature on maintenance management and suggest possible gaps from ... is receiv ed. Main tenanc e sche duling is ther efore anot her challe ngin g ...
new vertical mills were planned from the outset, but other options would have been possible. For example, clinker could be ground in an existing ball mill and GBFS in a single vertical mill because the advantages are relatively higher for slag grinding than that of
McKay Road West Improvements Highway 400 to Reid Drive This transportation improvement project will support growth and development along McKay Rd in south-west Barrie. The project extends from east of Veteran''s Dr to the west of the future extension of Reid Dr. ...
The machine tool specialists at Absolute Machine Tools recommend the following daily maintenance schedule: Check those fluids. CNC machines require adequate fluid levels, such as lube and hydraulic fluid. Working daily with your machines will give you a good baseline for how quickly the fluids need to be replenished.
· Mill maintenance – 3 simple ways to keep your mill at its best With the grinding mill critical to a plant''s throughput, it pays to ensure mills receive the necessary care and maintenance. Too often mill maintenance is reactive, occurring due to a breakdown.
for operators to sche dule inspection and PM, and t o allocate the spare parts for maintenance, so as to maximize the availability of the wind farm and minimize the total operation
DOCTORAL THESIS Division of Operation and Maintenance Engineering Decision Support Models for the Maintenance and Design of Mill Liners Rajiv Dandotiya ISSN: 1402-1544 ISBN 978-91-7439-342-2 Luleå University of Technology 2011 Rajiv Dandotiya
WAR DEPARTMENT Washington 25, D. C., 19 April 1945 TM 9-867, Maintenance and Care of Hand Tools, is published for the information and guidance of all concerned. A.G. 300.7 (20 Nov43) 0.0. 461/60440 Raritan BY ORDER OF THE SECRETARY
Times and dates are subject to change. Visit BRAVES.C OM/SCHE DULE for updates. Please visit BRAVES.C OM/ALIST for ticket package information and BRAVES /MEMBER for current member benefits. BSSO BSSE ESPN FOX 2021 BRAVES
z Make sure that the brush-holders are properly adjusted at the correct angle. z Note if copper dust is present on the brush-holders or on the brush-holder arms. Sure signs of commutator wear. z Measure and compare the lengths of all brushes on the same brush
· Mori Seiki Maintenance Guide 1. REGULAR MAINTENANCE GUIDE DuraVertical 635 eco 1 2. IMPORTANCE OF INSPECTIONS 1. The key to long-lasting machine accuracy is to perform daily inspections and regular inspection by maintenance ...
Sche dule No. Brief Description of Goods Tentative Qty. (With unit) **Earnest Money Deposit (in Rs.) Remarks 1. AMC support for SAP Business One with HANA Database 03 Years Not Applicable (Bid security declaration as per Annexure C to be submitted) 2.
Ball Mill Maintenance & Installation Procedure
7 3-roller modular Loesche mill Type LM 28.3 D in Kosice, Slovakia, 1991 The modular structure of larger roller grinding mills enables uti-lisation of the same components in different mill sizes. Module components include grinding rollers, rocker arms, pedestals and
maintenance sche dule. Analysis of failure data is an important exercise in development and selection of maintenance strategy. Proper understanding ... | https://strefa-oxygen.pl/Mar-2021-37176.html |
a private distribution system (mains water which is privately distributed by a second party).
The supply may serve just one property or several properties through a network or pipes.
All private water supplies must be registered with the council, who maintain a public register.
All private water supplies can pose a potential threat to health unless they are properly protected and treated. Unlike main water supplies, many private supplies are not treated to remove contamination. You may not be able to tell whether your water is safe as contamination may not shown as smell, taste or colour of the water.
The Private Water Supplies Regulations 2009 came into force on 1st January 2010 and seek to further safeguard public health by ensuring that private water supplies are wholesome and safe to drink. The new regulations aim to protect health and they require quality standards similar to those of mains water supply. They require each supply to undergo a risk assessment. The 2009 Regulations have since been replaced by the Private Water Supply (England) Regulations 2016.
Risk assessment is a proactive approach identifying potential hazards to human health. The information analysed in the assessment will be recorded in a report specific to your private water supply. It allows action to be taken to manage risks through a multi-barrier approach, involving source protection, treatment of the source water and management of the distribution network to prevent contaminants entering the supply system. The regulations cover all private supplies, although those serving a single dwelling will only be risk assessed and sampled upon request of the owner or occupier.
The council will charge for this work, please see the charges table in the downloads section to the right.
The regulations require each supply (excluding single private domestic dwellings) to undergo a risk assessment every five years, to determine how regularly the supply needs to be tested and for which parameters (i.e. which types of bacteria, chemicals etc). This involves surveying the supply, from the source through to point-of-use, to identify factors that could lead to contamination of the supply. Factors influencing sampling requirements include the type of source (borehole, well etc), how well it is protected, the treatment methods in place, the number of people served by the supply and the intended use of the water.
Samples from private water supplies will normally be taken from a consumer tap and then sent for analysis at an approved laboratory. The sampling frequency and the extent of analysis needed will depend on the results of the risk assessment.
Larger supplies (using more than 10 m³ water per day and serving 50 or more persons) and those serving commercial premises are now required to undergo regular 'check monitoring', as well as more extensive 'audit monitoring' on a less frequent basis.
Small supplies (using less than 10 m³ water per day and serving less than 50 persons) are monitored at least once every five years and more frequently if shown to be necessary by the risk assessment.
Supplies serving only an individual domestic dwelling will only be risk assessed and tested at the request of the owner or occupier.
Any sample that fails to meet the prescribed concentrations laid out in the Private Water Supply Regulations must have an investigation to determine the reason for the failure and to identify what action is needed to improve the supply. This may mean further sampling being conducted at the source, holding tanks and/or other parts of the infrastructure to assist the investigation.
In the event of failure, where a supply is found to be 'unwholesome' or a 'risk to human health', a notice will be served either prohibiting or restricting the supply, as appropriate. The notice will be specific for each supply that has a failure of standards. This notice can be appealed in a magistrate's court and/or by appeal to the secretary of state, but the notice will remain in force until either it has been complied with or it is suspended by the courts/secretary of state.
In certain circumstances where a supply fails the water quality standard, but the failure is of a parameter which does not cause a risk to health, the council may grant an 'authorisation' to exceed the statutory limit. This authorisation would be for a temporary period, while measures are put in place to correct the problem.
The council will charge the costs of carrying out their duties under these regulations to those responsible for the supply. Where part of a shared supply is used by some commercial activity, e.g. bed and breakfast, pub, camp site, the charges may be divided between the commercial and non-commercial properties proportionally. A breakdown of the council's charges in respect of private water supplies is included in the downloads section to the right.
The commercial/large category includes any business that supplies water from a private water supply to the public for drinking, washing, food preparation, or where the water is used in a way that it is likely to enter the human food chain. This category includes B&B, holiday lets, pubs, food production premises. Also within this category are domestic private water supplies using more than 10 m³ water per day or supplying water to 50 or more persons.
Risk assessments can only be performed by the local authority or by persons the local authority has deemed competent. The local authority is responsible for ensuring sampling is completed according to legislation, therefore if you would like another company to take and analyse samples of your private water supply, the local authority will need to approve the sampling company and the parameters to be analysed, prior to samples being taken. The analysis must comply with the new legislation. The local authority will need to be sent the result certificates directly from the laboratory.
identify the legal duty and the responsibility of the water supplier.
On completion of your risk assessment we will explain how often the supply needs to be sampled, based on the risks identified. Every five years the risk assessment will be reviewed. You will receive the assessment report and a copy will be retained for 30 years at the council.
The Private Water Supplies Regulations impose a tighter legal duty for monitoring of your supply, and one of the functions of the risk assessment is to identify any parameter (i.e. types of bacteria, chemicals etc) which could pose a potential risk to human health. The parameters identified can then be monitored.
The risk assessment will typically take approximately two hours. Ideally the person responsible for the supply should be present so that the risk assessment can be conducted as quickly and efficiently as possible. During the risk assessment we will need access to the source of the supply i.e. borehole, well, or spring, any collection chambers, holding/storage tanks including header tanks which may be found in roof spaces, and finally the point of use of the supply.
Regulation 21 of the Private Water Supplies Regulations lays down the fees which the local authority can charge to re-cover the cost of conducting the risk assessment and monitoring programme. The council has set the charges for this financial year. Please see charges in the table above.
Single private dwelling No requirement - sampled at the request of he owner/occupier.
Small domestic supplies Once every 5 years or more frequently if the risk assessment identified a need.
Private distribution system Dependant on need, identified by risk assessment.
Large or commercial supplies To be determined by the volume of water supplied.
carry out risk assessment and monitoring if required under the Private Water Supply Regulations 2009.
notify you of any updates of legislation involving private water supplies and your responsibilities.
All parts of your supply should be routinely monitored and inspected to ensure that it is in good working order, and has not been interfered with or damaged. The supply needs to be appropriately protected throughout, from source to point-of-use. This should include a maintenance programme to clean the distribution system and storage tanks or header tanks, and to ensure all treatment works are working as they should according to manufacturer's guidelines.
Unless your supply serves a single domestic dwelling, your supply will be risk assessed and monitored by the council in the next five years. However, if you suspect that something is wrong with the supply or you would like to request a sample to be taken and analysed you can contact Environmental Protection to discuss your concerns and to arrange for any sampling to be carried out.
Further guidance on the Private Water Supplies (England) Regulations 2016 is available on the Drinking Water Inspectorate website at www.dwi.gov.uk.
If you have an enquiry regarding private water supplies, please telephone using the details specified on the right. | https://www.cravendc.gov.uk/environmental-health/private-water-supplies/ |
Around July 14 1970 Beverly, an agnostic, had a near-death experience in which she was taken into the heart of the universe, beyond time, to the source of truth and love, where all our deepest prayers are answered before asking. This happened when she suffered a fractured skull after a catastrophic motorcycle accident. There is another realm, so near you can almost touch it, which we inhabit even while alive, beyond time and space, where we are blessed beyond knowing and one with Spirit and all life.
The new video DVD, Understanding Veterans’ Near-Death Experiences, is NOW ON SALE on the IANDS website (($24.95 IANDS members, $29.95 non-members). Service members who have had an NDE should be assisted by medical personnel or chaplains trained to deal with those who have experienced NDEs* Helps relieve Veterans’ anxieties
Injured soldiers having had Near Death Experiences (NDEs) awaken in the hospital traumatized, in pain and often confused and very emotional about experiences they do not understand. Recalling vivid memories of being out of their bodies and visiting transcendent realms. They seek answers to their many questions, hoping for comfort and support. When their questions go unanswered or are casually dismissed, they withdraw emotionally and do not discuss their NDE further, leaving them in an emotional limbo.
However, because of lack of training, that care is often not available, and the impact of this crucial gap of care can be great. It is traumatizing, exacerbating the effects of already devastating injuries, as well as PTSD, and magnifying feelings of confusion, fear, isolation and hopeless despair. Veterans may carry these feelings for a lifetime. This new IANDS-sponsored Veterans’ NDE Training Video provides answers.
Bring a vet, your questions, suggestions, and concerns. The second part of this meeting will be an open forum.
Nelson Abreu, BSEE, PE is a Portuguese-American electrical engineer, innovation expert and consciousness author, educator and technologist based in Los Angeles. He lectures at the International Academy of Consciousness and is a member of the International Consciousness Research Laboratories (ICRL) consortium.
He has contributed to several books and publications, the latest of which is Ordinary People, Extraordinary Experiences. Nelson is a co-founder of design, technology, and well-being startup Neumascape Studio, where he co-creates consciousness technologies.
He began experiencing and studying transformative phenomena like out-of-body experiences (OBEs) in 1998. He has developed techniques and technologies to facilitate such states and presented at conferences and workshops in the Americas, Europe, Asia, and Australia.
About the Book
“Ordinary People, Extraordinary Experiences”
Ordinary People, Extraordinary Experiences is an exploration of psi phenomena through real accounts and testimonies of everyday people.
This book includes a collection of real-life stories of people who have had transformative experiences, like telepathy and out-of-body experiences.
They suggest that such experiences happen spontaneously to people from all walks of life. Some also demonstrate that some of these extraordinary phenomena can be facilitated by training or optimal conditions.
It becomes evident that such abilities could have a significant impact on our personal and collective spiritual development.
Utilizing a more objective perspective, this collection of extraordinary narratives provides guideposts and opens important doors in the ever-expanding study of consciousness
__________________________________________________
San Diego IANDS exists for people in the San Diego County and surrounding area who have had a near-death and/or related experiences or who have personal or professional interest in such experiences. The group provides a forum in which to discuss such experiences and their meaning and integration into subsequent life.
Dr. Kason has five published books, her most recent, Touched by the Light: Exploring Spiritually Transformative Experiences, (2019), in which she shares the conclusions from her 40 years of STE research with about 100 case stories, including the stories of her own 5 NDEs. It is a guide to help NDE and STE Experiencers, as well as their family, friends, and counselors.
Dr. Yvonne Kason MD, MEd, CCFP, FCFP, is the current President of IANDS, the International Association for Near-Death Studies, and an author, public speaker, and media resource. A pioneer in the field of spirituality in health-care, she is a retired family physician and transpersonal psychotherapist who previously taught at the University of Toronto. Dr. Kason is an internationally renowned medical expert on Near-Death Experiences (NDEs) and other Spiritually Transformative Experiences (STEs), who has had five Near-Death Experiences and multiple STEs herself. Propelled by a powerful kundalini awakening in 1976 and an NDE in a 1979 airplane crash, she began to research NDEs and other spiritual experiences. In 1990 she became the first Canadian medical doctor to specialize her medical practice in the research and counseling of patients with NDEs and other STEs. Dr., Kason first coined the phrase “Spiritually Transformative Experiences” in 1994, a term which is now the industry standard. Spiritually Transformative Experiences include Near-Death Experiences, Mystical Experiences, Kundalini Awakening, Psychic Experiences, and Inspired Creativity.
Spirit Is Real
Life is bigger and more beautiful than we imagine. More fascinating, too. The current mainstream view of reality that we see on the TV and even in most movies, is of a world where we must struggle to survive. What if there was a magical component to life, right at the edge of our awareness?
Most of us were raised to treat death as a gloomy and morbid matter. And, we are raised to out-compete the other students, to become to the top our classes, and #1 on the sports field. For pride and fun, sure; but underneath, for a sense of scarcity: there are a limited number of jobs, success, and abundance in the world, and we’d better make sure not to be one of the unlucky ones that falls behind.
Life becomes about competition, and mostly not the friendly kind. You see how most people live in this fear. This stress and anxiety. Homelessness could be a missed paycheck or two away. A large fraction of society on anti-anxiety and antidepressant medications.
Near death experiencer (NDEr) Anita Moorjani talks about this fear. And that she learned in her NDE that life is meant to be lived with joy and self-empowerment. This all comes from remembering and becoming aware of the world of Spirit all around us. We don’t die; NDErs show us this. Mediums communicate accurate and very touching and deep messages from our loved ones in Spirit.
We are spiritual beings in these temporary human bodies. And we are meant to shine in love and cooperation.
I feel that the world needs to awaken to and remember this fact more than anything right now: Spirit is real, and knowing this changes everything. Yes, we are still living in this world, but moreso “not of it,” as the wisdom goes. Life is really not about scarcity and fearful competition. We are all one, and near death experiencers learn this firsthand. Spirit is real, and we can and ideally should apply this and live it. For the happiest and most fulfilling time on Earth.
Bio:
Ned Matinnia is a seeker who, from a young age, longed to know why things are they way they are. How things work. Is there a purpose or reason for life, beyond just existing? He has studied the world’s major religions, but he really found the answers he was looking for when he discovered near death experiences. Mediums too.
As a former atheistically-leaning agnostic in his teenage years, and a lover of science, it was natural that he would be led to think that there is no purpose for life, and that we are purely and evolutionary random accident.
What near-death experiences and mediums, and other healers, have shown him is that there definitely is a reason for being here on Earth, and that we chose to come here. We signed our soul contracts. Often with wide latitude in certain areas, but contracts nonetheless.
The learning, wisdom, and awakening that real spiritual experiences give humanity is one of his deepest passions. He is a budding medium himself, with a day job in computers; another one of his major interests.
His Facebook group Near Death Experiences (Return from Death), has 40,000 members.. He has worked on the IANDS Board and helped with several recent conferences.
Stay at Home! Stay Safe! The Om Center (and all other religious sites) is closed by Governor’s Orders.
,
Beverly Brodsky, will be replacing Ivanhoe Chaput on August 1, close to the 50th anniversary of my NDE, which moved my center from my head to my heart. It helped me heal from Stage 3B breast cancer this year.
About Colette Dupont:
Colette Dupont is an Energy Healer who combines Pranic Healing and Shamanic techniques in her treatments. She also communicates with Spirit through EVP (electronic voice phenomena) and posts the transcriptions and audible recordings on her website, Pranicspark.com.
Colette heard voices, received messages and knew things that were going to happen from an early age. She rarely shared this with anyone, but simply made use of it. Often she would get information to do something for someone and just followed the nudge of Spirit.
After the passing of a close relative she asked for proof of life after death and received it in a Spiritually Transformative Experience which she will share in the presentation along with the history, current information and directions on how to communicate with your loved ones in Spirit via electronic voice recording on your laptop or smartphone.
Electronic Voice Phenomena (EVP)
Learn what is happening in the world of Electronic Voice Phenomena and how you can use technology to speak across worlds.
Electronic Voice Phenomena- Can We Really Speak to Other Worlds and the deceased?
Hear the history of Electronic Voice Phenomena and the amazing things that are going on in the field of communication with other worlds. Much information has been gleaned from EVP recordings through the years and today the ability to communicate with your deceased loved ones through your laptop or smartphone.
Ellen Whealton – 10/3/2020
Connecting to Your Higher Self
with music, Imagery & Crystal Bowls (via Zoom)
Ellen Whealton is an NDEr, light worker, transpersonal and music therapist, healer, workshop presenter, and educator who uses numerous modality such as music, sound bowls, Essential Oils, and meditation in her practice. She had her NDE after being kicked in the head by a horse. During that tme she experienced tremendous impactful, spiritual lessons and was drawn back to her body by music.
Join Zoom Meeting 1;30- 4:00 PST
https://us02web.zoom.us/j/7378458285?pwd=MmFrMlRlaWxQcXcrUXExVDBCcC9kdz09
Meeting ID: 737 845 8285
Password: 616881
The meeting is free but we request a donation of $5 to $10 to keep our group growing.
Kelvin Chin is Executive Director & Founder of the “Turning Within” Meditation and Overcoming the Fear of Death Foundations. He is an internationally-recognized meditation teacher with clients in 44 countries, featured in Business Insider, Newsweek, Kaiser Health News, and has taught meditation at West Point and in the U.S. Army, including on the DMZ in Korea. Kelvin is the author of the best-selling Overcoming the Fear of Death: Through Each of the 4 Main Belief Systems — a nonreligious approach to the 4 Beliefs that underlie all cultural beliefs. He has had many experiences “piercing the veil” over the past 50 years, and his past life memories reach back 6,000 years.
Kelvin was the featured speaker on opening night at the 2019 IANDS conference in King of Prussia, PA and at the 2020 IANDS Virtual Conference. He has spoken at the Commonwealth Club in San Francisco, Yale, Dartmouth, and healthcare firms, Voice of Our Angels, Helping Parents Heal, East-West Bookshop, IANDS-Maui, and IANDS-Santa Barbara.
He is a graduate of Dartmouth, Yale and Boston College Law, and has lived in 7 countries. Kelvin lived in San Diego for 4 years in the early 1990’s, and currently lives in Los Angeles.
“The 12 Afterlife Principles”
Kelvin will discuss “The 12 Afterlife Principles” — the underlying principles that operate on the Other Side, consistently and universally.
They are based on his personal Afterlife experiences and insights over the past 50 years — his 1972 NDE and his ADC’s since 1986 with others in the Afterlife (spiritual leaders, angels, archangels, dead loved ones). What happens to us after we die, what choices do we have in the Afterlife, Free Will, soul contracts, what part of us is eternal? Kelvin will explain how understanding these principles can help us deepen our inner peace, so we can live life more fully now.
Contact Info: | https://sandiegoiands.org/calendar/action~agenda/page_offset~-1/request_format~json/ |
Apr 30, 2017
An amazing course .Very crisp and clear. Thank you Dr.Inez for making learning so much easier and fun.Examples gave a better understanding.I'm sure I'll be able to apply it in my research. Thank you.
Jul 02, 2017
Amazing course to refresh the statistical knowledge especially if you wish you take up Lean Six Sigma career path. It gave me enough time and chance to prepare and learn. It is a must for everyone.
創建者 Priyank K•
Jun 23, 2017
My reason of taking this course was to brush up minitab skills, which I haven't used much in last 1.5 years but I consider is very important tfor data driven decision making. I also wanted to perform same statistical analysis using R because I wanted to enhance my r programming skills also. But I realized that'll be too much time consuming exercise, so, didn't do that. Overall good experience, good examples used to demonstrate concept as well as minitab's application. Thanks to the professor and her team involved.
創建者 Janire V•
Nov 07, 2017
I think it is a good course introductory course for introducing Data Analytics. The explanations are very clear, as well as the examples selected. It gives a general overview of the main methodologies to perform depending on the kind of data we have. Minitab instructions are a big plus, as a software simple but powerful to perform this analysis and understand the results. Thank you and congratulations for the course.
創建者 Brijesh T•
Apr 16, 2017
The course is structured and easy to understand with a lot of practice exercises. However, I use Minitab on a MacBook and there are differences in the layout and location of functions. I struggled to find certain functions; even googling did not help. I would suggest you incorporate instructions for Mac users to use software tools. Overall, the course is very informative and definitely adds value.
創建者 Siddhant M•
Apr 28, 2017
This course certainly gives a good idea of Data Analytics for a Six Sigma Project. However, for a beginner like me, I think one has to do extensive reading of different analytical technique such as 2 T test, ANOVA etc, as I found this course doesn't cover the theoretical aspects. Still, it is a nice course to start with and I am looking forward to further courses from the team.
創建者 Konstantina S•
Jan 20, 2020
The course is useful to learn how to distinguish your data, recognize their characteristics, and choose the the analysis that will give you the most information.
Minitab is for sure a very useful platform for statistical analysis, way faster and more compact analysis from excel, with easier visualization tools.
I would recommend the course for beginners.
創建者 Laxman P•
Apr 26, 2018
The course is really great for those who would like to have basic understanding of the lean six sigma and the different phases of the same. The course content will also help to take data driven decision for process improvement. Further, one will understand the capabilities of Minitab and what different methods could be used during data driven decision.
創建者 Amr M E•
Nov 04, 2017
Great job !!! Dr/ Inez . i want to mention only about 2 lecturers where you choose some options in mini-tab, when practicing found that you have chosen another options to display data.
Eventually, you made me happy about this course. you have a great charisma that make the information reach easily to brain. .
please prepare another course. Thank you
創建者 stephane l•
Jul 23, 2017
Great course with good pedagogical content. The way statistical principles are explained is accessible. As an engineer, I would have appreciated to have some formulas to support the statistical definitions and explanations. I guess not giving the formulas was an editorial choice but I think the info would be valuable. At least as an appendix maybe.
創建者 Arun V•
Nov 15, 2019
Significant topics in statistics and Data analytics have been covered in this course and it is a good reckon er. However, the correlation of the course with Lean Six Sigma is not very tight. The delivery of the instructor does get monotonous at times.
創建者 José M M F•
Nov 01, 2019
I used R as software Tool.
In the past I used to use Minitab (great tool for engineers in production plants), however the potential of R, let reanalyze immediately and audit the process and the conclutions
創建者 Ieva A•
Jun 07, 2017
Very informative and examples are easily understood. The only problem was that I have Mac and didn't have an opportunity to use Minitab, which was 1/4 of the whole course. All in all - I recommend it !
創建者 Xianjing L•
Sep 01, 2019
Excellent course content and examples. I wish there are more modules to discuss Pareto analysis and some other function. Highly recommended for lean six sigma practitioners!
創建者 STYLIANOS V•
Jun 16, 2017
Very nice, informative, introductory course. Could include more mathematics though, in order to get some idea about the underlying principles of the methods presented.
創建者 Alex A•
Nov 19, 2018
Great course, I would like to see more information on why the answer is wrong in the quiz sections. There could also be more problem sets for practice.
創建者 Mahak m•
Jan 19, 2019
This is very useful course for student who has studied stats as major subject and wants to start career in industry for data processing. Thank you
創建者 Banglet J V Y•
Mar 31, 2019
Très bonne méthodologie pour enseigner commer faire des analyses statistiques.
Very good methodology to teach how to do statistical analysis.
創建者 Piyush B•
Aug 27, 2017
Concept of logistics Regression and Chi Square should be explained in more depth. Also multi variate regression should also be included.
創建者 Diana C Z B•
Jun 25, 2017
Recomendado, afianzo mis conocimientos en Minitab y Lean Six Sigma. Además de la fácil compresión de los temas y comodidad en el acceso.
創建者 Surojit G•
Mar 31, 2019
Good course. Can be improved by adding more details on when to use a certain test and explain the stat results throughly
創建者 Varun D•
Sep 16, 2018
More study assignments can be provided for practice so that we can improve with those case studies
創建者 Islam H M•
Sep 08, 2019
I've really enjoyed this course, and I'm to deep lean six sigma and data analytics using minitab
創建者 Rick C d S F•
May 25, 2017
Excellent Course! Give to us a complete understanding about Lean Six Sigma and their techniques. | https://zh-tw.coursera.org/learn/data-analytics-for-lean-six-sigma/reviews?page=15 |
Exposure to suicide and suicidality in Korea: differential effects across men and women?
Little is known about whether exposure to suicide within close social networks is associated with the suicidality in exposed individuals, and potential gender differences regarding this association. This study examines the effect of exposure to suicide on the suicidality in exposed individuals. The data were drawn from the 2009 Korean General Social Survey, a nationally representative interview survey. Suicidality was measured by the suicidality module in the Mini International Neuropsychiatric Interview (MINI), with exposure to suicide being determined by asking about the experience of a failed or completed suicide attempt by a closely related person. Exposure to the suicide of someone close was significantly associated with higher suicidality in exposed individuals. While the effect of a failed attempt became non-significant after controlling for psychological factors, that of exposure to a completed act of suicide remained significant. A subsample analysis by gender indicated a significant gender difference: with control for demographic and psychological factors, exposure to a completed suicide had a significant effect on the suicidality of females only. The effect of exposure to a failed attempt became non-significant both in males and females after controlling for other factors. Findings suggest the necessity of screening for prior exposure to suicide in suicide risk assessment and the need for gender-tailored suicide-prevention strategies.
| |
VHAP (virtual hemispherical amplitude panning) is a method developed to create an elevated phantom source on a virtual upper-hemisphere with only four ear-height loudspeakers. This engineering brief introduces a new VST plug-in for VHAP and evaluates the performance of the binaural rendering of VHAP with a simple but effective distance control method. Listening test results indicate that the binaural mode achieves the externalisation of elevated phantom images in various degrees of perceived distance. VHAP is considered to be a cost-efficient and effective method for 3D panning in virtual reality applications as well as in horizontal loudspeaker reproduction. The plugin is available for free download at www.hud.ac.uk/apl/.
|Original language||English|
|Title of host publication||146th Audio Engineering Society International Convention 2019, Proceedings|
|Publisher||Audio Engineering Society|
|Pages||743-747|
|Number of pages||5|
|ISBN (Print)||9781510886681, 9781942220268|
|Publication status||Published - 10 Mar 2019|
|Event||146th Audio Engineering Society International Convention - The Convention Center, Dublin, Ireland|
Duration: 20 Mar 2019 → 23 Mar 2019
Conference number: 146
http://www.aes.org/events/146/ (Link to Convention Website)
Conference
|Conference||146th Audio Engineering Society International Convention|
|Abbreviated title||AES|
|Country||Ireland|
|City||Dublin|
|Period||20/03/19 → 23/03/19|
|Internet address|
Fingerprint Dive into the research topics of 'Binaural Rendering of Virtual Elevation using the VHAP Plugin'. Together they form a unique fingerprint. | https://pure.hud.ac.uk/en/publications/binaural-rendering-of-virtual-elevation-using-the-vhap-plugin |
I am learning about analysis of covariance and have encountered seemingly conflicting information regarding the assumption that the predictor variable and covariate should be independent. This article says ANCOVA can be used to adjust for baseline imbalance in a randomized controlled trial, however doesn’t this suggest that the predictor variable and covariate are not independent? Is the difference here that the imbalance was not caused by analysing “naturalling occuring groups” but instead by random assignment?
This is actually a very deep subject but a fair simplification is to see that you don’t use ANCOVA for a randomized study to adjust for imbalance. You use it to account for outcome heterogeneity within a treatment group.
maybe youre confusing terminology? you mean outcome?
At first I thought I may have, but after re-reading the article, I don’t think so:
" Some use change scores to take account of chance imbalances at baseline between the treatment groups. However, analysing change does not control for baseline imbalance because of regression to the mean: baseline values are negatively correlated with change because patients with low scores at baseline generally improve more than those with high scores. A better approach is to use analysis of covariance (ANCOVA), which, despite its name, is a regression method."
“If, by chance, baseline scores are worse in the treatment group, the treatment effect will be underestimated by a follow up score analysis and overestimated by looking at change scores (because of regression to the mean). By contrast, analysis of covariance gives the same answer whether or not there is baseline imbalance.”
From these two excerpts it seems that the baseline score is treated as the covariate and the group assignment is the predictor variable?
it seems they dont use “predictor” in that article and, very roughly speaking, with RCT and biostats youll more often hear covariate, and with epidem and risk modelling it will be predictor. It would be quite presumptuous if a drug company referred to treatment assignment as a predictor. I only mention this because what you described sounded like Multicollinearity - Wikipedia. To answer your Q, I’d read the relevant section in stephen senn’s book, i believe a 3rd edition is out soon. | https://discourse.datamethods.org/t/using-ancova-when-groups-differ-on-the-covariate/4302 |
A person suffering from a lightning injury will experience an electric shock and/or a burn due to the lightning strike. Lightning burns may cause mild to severe damage from minor burns to major damages in the internal organs of the body. When a lightning strike causes death in a person, it is called electrocution.
Disclaimer: Remember to seek medical attention with any serious electrical injuries. The material posted on this page for managing lightning injuries is for information purposes only. Learn more by taking St Mark James first aid and CPR training.
Classification
There are three main types of lightning injuries:
- Direct lightning strike. The lightning bolt will directly hit the person without hitting anything else around him. A direct lightning strike will therefore cause the most severe type of lightning injury.
- Side flash. Unlike a direct lightning strike, the lightning bolt with first hit another object before striking the person.
- Ground current. The lightning bold will strike an object after which, the electrical current would pass through the ground towards the victim of the lightning strike.
Causes
Lightning injuries are caused due to the electric current coming from the lightning strike. The voltage may vary from 103 million to 2 billion volts, with a current as high as 300,000 amps.
Lightning travels over the outer region of the body, unlike general electricity that travels inwards. A lightning strike may also cause a respiratory or cardiac arrest in the victim, but only rarely damages internal organs of the body.
Symptoms
Signs and symptoms of lightning injuries include
- Burns
- Muscle aches
- Headache
- Loss of hearing
- Loss of memory – short term memory loss
- Confusion
- Limb pain such as arm pain and/or leg pain
- Unilateral arm numbness
- Unilateral leg numbness
- Unilateral hand numbness
- Unilateral arm weakness
- Unilateral leg weakness
- Unilateral hand weakness
- Fatigue and generalized weakness
- Temporary vision loss
Warning signs
Seek emergency medical help if any of the following problems occur prior to the lightning injury:
- Breathing difficulty
- Chest pain
- Shock
- Loss of hearing or loss of vision
- Fainting
- Weakness of the arm (unilateral)
- Weakness of the leg (unilateral)
- Weakness of the hand (unilateral(
- Numbness and tingling
- Arm pain
- Leg pain
- Neck pain
- Weakness and/or fatigue
- Heart palpitations
- Inability to walk or having difficulty walking
Complications
Complications associated with lightning injuries include:
- Cardiac arrest – heart stops beating
- Cardiac arrhythmia
- Internal bleeding
- Fractures
- Ruptured eardrum
- Nerve damage
- Thermal burns
- Rhabdomyolysis
- Chronic pain
- Seizures
- Behavioural changes
- Depression
- Confusion
Treatment
Call 911 immediately and follow the steps given below until help arrives:
1. Safety first! Approach the victim only when it is safe for you
- If you suspect that you may be in danger due to ongoing lightening strikes, wait until it is safe for you to go towards the person or move to a safer zone, if possible
2. Begin CPR, if it is safe to touch the victim
- Make sure the body has not retained the electric charge
- Check the ABCs: Airway, Breathing and Circulation. Clear the airway for any obstructions
- Check the casualty’s breathing and pulse. If the casualty is not breathing and/or does not have a pulse, begin CPR immediately
- Avoid removing the burnt clothes, unless it is necessary to do so
3. Treat shock
- Allow the victim to lie down on the ground with his trunk higher than his head. Prop the legs up and keep them supported for circulation
Learn More
To learn more about managing a lightning emergency and providing first aid enrol in a St Mark James course (more information here) with one of our credible and convenient providers. | https://standardfirstaidtraining.ca/managing-a-lightning-injury/ |
Animal Medical Center of Estes Park
The Animal Medical Center of Estes Park is a small animal veterinary practice with a home town feel. Located in beautiful Estes Park, Colorado - the gateway to Rocky Mountain National Park - our veterinarians and staff maintain a friendly, courteous and professional atmosphere to provide outstanding medical care for your pet.
Our Mission
It is the mission of the Animal Medical Center of Estes Park, PC to be committed to excellence by providing the highest quality veterinary care to our patients, through a harmonious environment and a professional manner.
Our Vision
The Animal Medical Center of Estes Park, PC will be highly regarded for setting the standard of excellence and quality in animal health. Our patients and their owners will be treated with respect, dignity and empathy.
Core Values
- Caring: Compassionate and outstanding customer service is our commitment to you.
- Communication: We will communicate among staff members and clients in a timely, efficient manner that is vital to our ability to provide consistent care, and emphasizes our team approach to the practice of excellent veterinary medicine.
- Excellence: We will settle for nothing less than doing our best in all circumstances.
- Expertise: We will strive to keep updated in the field of veterinary medicine and provide competent staff, excellent equipment and technology that is efficient and timely for our client’s health care needs.
- Integrity: We are committed to honest and ethical services and will always act in the best interest of our patients and their owners. Integrity is the foundation of our practice. | http://amcestes.vetstreet.com/our_staff.html |
The reference run or baseline serves as a reference point for ex-ante impact analysis with CAPRI. It reflects the most probable development in agricultural markets from global to regional scale for 8-10 year time horizon, at the current legislation. It integrates agricultural market projections from other insitutions as FAPRI, FAO and DG-AGRI. Unique for CAPRI are regional resolution below the national level for EU27 at the level of NUTS 2 regions, and the Bayesian methodology applied.
The supply and market module are calibrated to results of the reference run.
In opposite to many other reference run approaches, CAPRI employs a Bayesian estimation framework to define a mutually consistent set of projection values for activity levels, yields, production, feed and processing demand, human consumption, trade etc. Basically, all major equations from the supply and market modules are defined as in an optimization framework which maximizes the joint posterior density for given a priori distribution of the different elements.
Methodology
|
|
The a priori distributions are derived from two different sources. For all elements, long terms are projected. Using "no change" as the zero hypothesis, a weighted average between the base year value and the trend estimate is calculated, using R squared as weight for the trend estimate.
The resulting independent projections are then corrected by the relative effect of implementing already decided upon changes in agricultural policies in the base year - so-called "policy shifts". These effects are derived from a simulation with the full modelling system. The resulting estimates along with the estimation error of the trend deliver a priori distributions for all items in the estimation framework.
In a first step, the estimation is solved for these trend support, indepedently for each country. Afterwards, results are aggregated to EU. The projections of other instutions are then added, and replace where available the supports based on trends. If the projections are only reporting values for the EU and not for individual countries, the country results from the first steps are used to distributed the EU estimate. The standard errors for the there projections, especially for those provided by DG-AGRI, is set rather narrow, ensuring that the values are recovered as long as they do not violate the consistency restrictions.
The estimation is then repeated in a second step based on the updated supports. The country results are then taken is given, and broken down in a similar framework to NUTS 2 level, and from there to farm type groups.
Quality control
Due to the NUTS 2 resolution with its 250 regions, and the high number of activities, outputs and inputs covered by the CAPRI modelling system, the references comprises several Mio numbers. Therefore, aggregates over activities (single cereals aggregated to all cereals) and products, and over countries to EU15, EU10 etc. are defined and reported in tables accessible via the Graphical user interface. Those tables compare systematically the different inputs (trend estimate, policy shift, estimation results from the different steps).
Nevertheless, checking results for plausibility remains a challenge. An interested comparison of the methdology between the reference run exercise for the OECD/FAO AGLINK-COSIMA model with an estimated input of 20 person months and the CAPRI reference run with an estimated inputs of about 2 person months is reported by Adenauer 2008.
More information
Witzke H.P. and Adenaeuer M.: | https://www.capri-model.org/dokuwiki/doku.php?id=capri:concept:refrun&rev=1302511057 |
The utility model discloses an adjusting device for a rolling angle of a TBM (Tunnel Boring Machine) tackle, and relates to the technical field of TBM tackles. Comprising a bracket, a TBM tackle is connected to the bracket, the bracket comprises two first supports arranged in parallel, the first supports make contact with the tunnel wall, a plurality of second supports are connected between the two first supports, four oil cylinders are fixedly connected to the lower portion of the bracket and are embedded hydraulic cylinders, and the tops of the oil cylinders are fixedly connected with the first supports; wear-resisting plates are arranged at the bottoms of the oil cylinders, and the four oil cylinders are located at the four corners of the bracket respectively; the front end and the tail end of the bracket are each fixedly connected with a traction piece, and the trailer drags the bracket to move forwards through the traction pieces so as to drive the TBM tackle to move forwards. According to the utility model, the deflection amount of the rolling angle can be adjusted by adjusting the expansion and contraction amount of the oil cylinder, the requirement on adjusting precision is met, multiple adjustment and repeated adjustment can be realized, the workload and the adjusting difficulty of manually adjusting the rolling angle are greatly reduced, the adjusting precision is high, and the adjusting process is safe, simple, convenient and quick. | |
Against Simplicity and Cognitive Individualism by Nathaniel T. Wilcox * Abstract Neuroeconomics illustrates our deepening descent into the details of individual cognition. This descent is guided by the implicit assumption that "individual human" is the important "agent" of neoclassical economics. I argue here that this assumption is neither obviously correct, nor of primary importance to human economies. In particular I suggest that the main genius of the human species lies with its ability to distribute cognition across individuals, and to incrementally accumulate physical and social cognitive artifacts that largely obviate the innate biological limitations of individuals. If this is largely why our economies grow, then we should be much more interested in distributed cognition in human groups, and correspondingly less interested in individual cognition. We should also be much more interested in the cultural accumulation of cognitive artifacts: computational devices and media, social structures and economic institutions. * Nathaniel T. Wilcox is Professor of Economics at the University of Houston. His research interests are economic, political and cognitive science, experimental methods and applied econometrics. 2 Experimental and behavioral economics and, by association, neuroeconomics overwhelmingly involve this kind of experiment: Simple choices for individuals to make, perhaps in the context of a simple social interaction such as a two-person game. Importantly, each subject's access to other subjects is tightly circumscribed. In individual choice experiments, such access is simply forbidden for statistical reasons, and in game experiments it is closely regulated for both game-theoretic and statistical reasons. The hunch seems to be (1) that individual minds are the centrally important informationprocessing units of economic science, and (2) that simple decision problems and simple games usefully characterize the actual decision problems and actual games that govern the important economic phenomena, such as growth and inequality. For example, McCabe (2008, this volume) singles out trust and reciprocity as enablers of economic growth, and perhaps they are. We are invited to view experiments about simple trust games between two individuals (and what happens within the individual skulls involved in such games) as crucially relevant to economic growth. Let me illustrate an alternative hunch. I rather suspect that economic growth is overwhelmingly due to the cultural accumulation of external cognitive artifacts, including social distributions of information processing, which implement external information representations and algorithms. This accumulation increasingly exploits the performance strengths of individual cognition (e.g. hand-eye coordination, fast pattern recognition) and increasingly avoids its weaknesses (e.g. algebra, emotional interference). It increasingly distributes information processing across group members in highly structured ways, aided by external cognitive artifacts, and lessens the importance of individual brains to economically important information-processing tasks. I also suspect this accumulation is not mostly the product of individual learning, but is rather mostly the product of social learning processes that operate across contemporaneous social space and (especially) across generations of social groups confronting related tasks. This story of economic growth is of the increasing marginality of individual brains and the growing centrality of socially distributed cognition. I think this is a plausible alternative hunch about cognitive science's primary relevance to economic growth. I will call the viewpoint I am criticizing "cognitive individualism." It powerfully shapes and constrains theory, research questions and empirical inquiry. Importantly for 3 this volume, it unsurprisingly draws researchers and resources ever deeper into the study of individual cognition. In an intellectual milieu guided by cognitive individualism, the emergence of neuroeconomics (and the strong support it gets from many distinguished scholars) was inevitable. To be clear, neuroeconomics is not my target here; it is just one particularly vivid manifestation of my true target. I suspect that many decision and discovery processes that govern the most important economic phenomena involve a high degree of social and/or computational complexity. This is notoriously true of many dynamic decision problems and their solution algorithms: I suspect that a substantial part of inequality is due to differential success (across dynastic families) at intergenerational innovation and transmission of good heuristics for dealing with life-cycle decisions. Related considerations apply to technological progress and hence growth. I simply don't believe I have this nifty laptop or this swell alphabet merely (or even mostly) because of individual cognitive solutions to simple tasks or games. Rich, external cognitive artifacts like these were accumulated by increment and innovation across years and indeed millennia. I suspect the informationprocessing units responsible for these increments and innovations were usually groups of people and rarely individual brains (notwithstanding our seeming need to render scientific and technological history in terms of individual heroes). That is, I suspect our accumulation of cognitive artifacts (that transform our tasks and shape distributed cognition) is overwhelmingly the product of social learning processes. And so I suspect that most of the experimental and theoretical work on individual learning, with or without brain scans, has limited relevance to this accumulated cognition, and hence limited relevance to economic growth. Or at least, so goes an alternative hunch. To put some formal structure on this alternative hunch, I begin by (tentatively) viewing the relationship between neoclassical economics and cognitive science from the perspective of Marr (1982). Marr divides understanding of an information processor into three levels. At the top level, we have a rational model of a processor-a description of what a processor ought to compute, and an argument as to why it should compute that. Marr calls this the "computational theory" or CT of the processor. Addition is a CT of a cash register; a Nash equilibrium strategy is a CT of a game player (given certain wellknown assumptions about other players); and so on. The next level of understanding is 4 "algorithm and representation" or A&R. Here we find representations of inputs and outputs, and the algorithms that convert the former into the latter, such that the output approximates the CT's specified output in some satisfactory way-robustly, efficiently, accurately or with some tradeoff amongst these. Usually, a great variety of A&Rs can approximate the specified output of any CT. We might (with some abuse) call the A&R "software." Finally there is the bottom level of "physical implementation" or PI: What's the actual physical "machine" or "hardware" in which the A&R will "run?" Vacuum tubes, silicon, neurons or Tinker Toys?-Again, many PIs can "run" any given A&R. From a Marrian perspective, neoclassical economics is CT without any specification of A&R or PI: It is the hunch that the outputs specified by decision and game theory-the neoclassical CTs-are, to an empirically fruitful approximation, the observed behavior of economic processors under almost all conditions. 1 Marr thought that CT was centrally important for understanding processors, and some philosophers such as Dennett (1987) seem sympathetic to that view (with caveats). This is why the title of Gul and Pesendorfer's (2008) spirited defense of neoclassical economics, "The Case for Mindless Economics," makes me wince. That title just invites distracting name-calling like "behaviorist" and "Skinnerian" for no good reason. With a title like "The Case for Algorithm-, Representationand Machine-Free Economics," Gul and Pesendorfer would pretend to know and care about cognitive science in a respectable Marrian sense. Marr's three-level view puts neuroeconomics in danger of appearing a sideshow about PI (hardware) which, in Marr's view, is frequently a distraction from the really important issues that largely revolve around an A&R's performance relative to CT's specifications. Philosophically, the notion of "multiple realizability" of the mental in the physical also suggests that hardware is a distraction: The important essence of the mental may not be usefully reduced to any particular machine (Fodor 1975; Putnam 1988). McCabe's quick and early attempt to dismiss the software/hardware question attests to 1 Marr considered situations where "constraints" (within a CT's "why argument") define a unique desired mapping between inputs and outputs. Marr's "constraints" conceptually correspond to decision-theoretic axioms: Both show that a certain desired mapping between input and output exists (while saying nothing about how that might be computed) and has certain properties. But decision theoretic axioms are typically weaker: They do not define a unique mapping (e.g. risk attitude and/or belief diversity within the structure of subjective expected utility or SEU). We might therefore wish to distinguish between strong CTs (like Marr's example of stereopsis) and weaker CTs (such as SEU). The typically weaker form of economic CTs is a nontrivial complication of a Marrian view of neoclassical theory. 5 the danger. Neuroeconomics answers: We accept Marr's distinctions and views in general, but we suspect that the individual human nervous system PI is in fact an especially strong constraint on the kinds of A&R that will "run" in it. Some neuroscientists go even further, arguing to dispense with CT and dissolve the distinction between A&R and PI in their special case: They say that while it is a cogent distinction in general, it is practically useless in the case of biological nervous systems. This line of thinking has its own philosophical heroes (e.g. Churchland 1981), and usually goes along with some stories about evolution (McCabe hints at these without development). Not all neuroeconomists want to dispense with CT: For instance, Glimcher (2003) seems quite sympathetic with Marr's view that rigorous cognitive science cannot proceed without a relevant CT. Philosophers such as Fodor (2000) have attacked both the notion that biological hardware is crucially special, and the relevance of adaptationist stories concerning that hardware's structure. I find evolutionary talk inherently seductive, but I try to keep Gould and Lewontin (1979) in mind when considering ex post just-so stories about "adaptations." Yet in spite of these difficulties, I'll grant neuroeconomists the specialness of the biological hardware. It matters little to my subsequent argument. Since introducing Marr above, I've said nothing explicit about which processor is the centrally important processor of economic science-what we call an agent at the level of economic CTs. Fudenberg and Levine's (2006) "dual self" model of impatience and small-stakes risk aversion is just a recent example of theoretical fission of individuals into multiple noncooperative agents, a move endorsed by some philosophers (Ross 2005). Fissions of the agency of firms (into managers versus owners) and households (into spouse versus spouse) similarly create new noncooperative games between new smaller agents-an older and well-established move, as Camerer (2008) points out. What all of these moves have in common is fission of agency. Might it also be useful to explore some fusions of agency? Edwin Hutchins is a cognitive anthropologist known to some as the "father of modern cognitive ethnography," and a contemporary developer of theories of socially distributed cognition. Hutchins enormously influenced philosophers of mind such as Clark (1997). In his book Cognition in the Wild, Hutchins (1995) argues that the founding metaphor of cognitive psychology-that individual cognition is like a computer-was always flawed. 6 Hutchins instead suggests that it is socio-cultural symbol manipulation systems (cognition distributed across groups of humans, in interaction with external cognitive artifacts and both natural and artificial environments) that are really like a computer. Hutchins (1995, p. 50) begins gently and craftily, pointing out that "Marr intended his framework to be applied to the cognitive processes that take place inside an individual, but there is no reason, in principle, to confine it to such a narrow conception of cognition." To elaborate "Hutchins' hunch," individual brains are not the machines that matter the most in social science. The important machines of social science are social groups with special artifacts, communicating with one another both now and across time and even across generational time. In these larger machines, individual brains are not the machines of interest: Instead, individuals (brain and body) are just one type of cog in larger socially distributed cognitive machines. We might think of the usual path of cognitive-cultural history (and economic growth) as the successive accumulation and modification of external cognitive artifacts: external representations of information, external physical devices and external patterns of information flow and aggregation. These are to some extent social A&R, but also additional types of cogs in larger socially distributed machines. Cognitive-cultural change may tend to (1) increasingly exploit strengths of human cogs and avoid their weaknesses, (2) make human cogs interchangeable and redundant where possible, and (3) increase the robustness of the bigger social machines to their errors, weaknesses, and arrivals and departures. Now let us return to the neuroeconomists' attempted dismissal of the Marrian suspicion that hardware is a sideshow. From the viewpoint of Hutchins' hunch, I answer: While I sympathize with your desire to know a source of the relative strengths and weaknesses of one part (the brain) of the human cogs, this knowledge might not be very important for explaining (say) economic growth, or wealth, poverty and inequality. You are looking at just one part (brain, not body) of what may be a relatively inconsequential cog. Put differently, you may be mistaken about what the most important processor is, how flexible it is, and how biologically determined it is. In recounting the evolution of Western navigation artifacts, Hutchins (1995, pp. 155) notes that 7 "...the existence of such a wide variety of specialized tools and techniques is evidence of a good deal of cultural elaboration directed toward avoiding algebraic reasoning and arithmetic...The kinds of cognitive tasks that people face in the wild cannot be inferred from the [CT of navigation] alone. The specific implementations of the task determine the kinds of cognitive processes that the performer will have to organize in order to do the task. The implementations are, in turn, part of a cultural process that tends to collect [external artifacts embodying specialized A&R] that permit tasks to be performed by means of simple cognitive processes." To Hutchins, social hardware (in the form of both human cogs and external cognitive artifacts) does matter in the short run, but in the long run the hardware of distributed cognition isn't even given: It is culturally evolved to sidestep limits of human cogs and exploit their strengths. Both the software and hardware of distributed cognition are, as Hutchins says, "artificial through and through." Neural biology isn't social cognitive destiny. From the viewpoint of Hutchins' hunch, doing rigorous Marrian cognitive science is overwhelmingly easier in social machines than in brains. I cannot put this better than Hutchins (1995, pp. 128-129): The basic computations of navigation could be characterized at the computational, representational/algorithmic, and implementational levels entirely in terms of observable representations. On this view of cognitive systems, communication among the actors is seen as a process internal to the cognitive system. Computational media, such as diagrams and charts, are seen as representations internal to the system, and the computations carried out upon them are more processes internal to the system. Because the cognitive activity is distributed across a social network, many of these internal processes and internal communications are directly observable. If a cognitive psychologist could get inside a human mind, he or she would want to look at the nature of the representations of knowledge, the nature and kind of communication among processes, and the organization of the informationprocessing apparatus. We might imagine, in such a fantasy, that at some level of detail underlying processes (the mechanics of synaptic junctions, for instance) would still be obscured. But if we could directly examine the transformations of knowledge representations we might not care about the layers that remain invisible. Any cognitive psychologist would be happy enough to be able to look directly at the content of the cognitive system. With systems of socially distributed cognition we can step inside the cognitive system, and while some underlying processes (inside people's heads) remain obscured, a great deal of the internal organization and operation of the system is directly observable. On this view, it might be possible to go quite far with a cognitive science that is neither mentalistic (remaining agnostic on the issue of representations "in the head") nor behavioristic (remaining committed 8 to the analysis of information processing and the transformation of representations "inside the cognitive system") [all emphasis in original]. Neuroscience does not "look directly at the content" of any information representation in any brain as concrete, observable, rich and obvious as a ship's fix and projected bearing on a navigation chart, or a family's current and projected asset position as represented in its own external financial accounts and plans. As near as I can make out, they haven't yet agreed exactly where, or even how, the content of nouns like "ship" are physically represented in a brain (Martin and Caramazza 2003). Hutchins is, I think, still correct in spirit after thirteen years: What is still a fantastic voyage for neuroscience has long been feasible for social scientists examining distributed cognition systems. We can now (with the right ethnographic skills) literally step into these and directly observe just about every theoretically central entity of rigorous Marrian cognitive science. For these reasons, I believe it may be fruitful to move away from studying what individuals do with simple decision problems and games, and toward studying distributed cognition in groups that confront complex problems and games. I now view my past work on social learning about hard economic problems (Ballinger, Palumbo and Wilcox 2003) as my initial steps in that direction. Ballinger and I continue to study the evolution of advice (about hard economic problems) across generations of subjects. Advice is, after all, a relatively simple cultural-cognitive artifact, and one whose evolution we can follow over workable experimental timescales. Schotter and Sopher (2003) share similar interests with us. Though it is rare relative to all work, some experimental economists have been contrasting the behavior of individuals and groups. So far, though, these groups are overwhelmingly either unstructured groups or "symmetric committees" in which all group members have equal access to information, cognitive artifacts and each other, and all have equal sway in decision making (e.g. majority or unanimity rule). This is not distributed cognition in Hutchins' interesting sense (though such groups may be an interesting control treatment when studying distributed cognition, and such groups may have, on occasion, endogenously created their own truly distributed cognition). Most distributed cognition in real groups has asymmetric and hierarchical structural features 9 that divide tasks into subtasks, restrict data availability and information flows, and vest final decision making in only a subset of group members. 2 Asymmetry and hierarchy are consequential features of distributed cognition. When viewed from the perspective of its place in distributed cognition, we discover that some shopworn normative failings of individual cognition may be social virtues in correctly structured groups. Hutchins (1995, p. 240) shows how "...some ways of organizing people around thinking tasks will lead to an exacerbation of the maladaptive aspects of [confirmation bias], whereas other forms of organization will actually make an adaptive virtue on the group level of what appears to be an individual vice." Hutchins' simulation studies of networks of individual interpreters suggest that it is just those social networks with lots of symmetric linkage of individuals (e.g. symmetric face-to-face committees) that would exacerbate confirmation bias. We might want to look closely at some real economic groups (e.g. extended families, parts of firms and/or public bureaucracies) to identify some typical structures of distributed economic cognition: Those might be good candidate structures for study. Symmetric committees are probably quite rare in distributed economic cognition-and with good reason, given Hutchins' arguments. Told that I could select only one tool from a neighboring discipline, it would be ethnography, not medical imaging. A simple and false choice, I hear you cry: It excludes a large middle of more complex alternatives you actually have, and also ignores a rich division of cognitive labor across researchers and disciplines. Fair enough. But if that cry was yours, then have some sympathy for individuals in typical experiments: They too are confronted with simple and false choices that exclude many middles (and extremes) they'd actually face in the field; and they too are sealed off from advisors, artifacts and other distributed cognitive resources they'd have in the field. The situated character of individual cognition in the field is one reason Harrison and List (2004) advocate more field experiments. Understanding situated individual cognition is almost definitionally crucial to understanding distributed cognition systems. But Hutchins' hunch that the 2 Cox and Hayne (2005) do have a small ex post asymmetry in groups that are bidding in common value auctions-group members with different signals of value; but all group members are still ex ante symmetric, and group members all seemed to immediately share their information with one another. I have in mind very different experiments, in which multiple types of information (and not simply multiple draws from a univariate distribution of a decision-relevant random variable) must be processed and then combined to reach a decision. 10 theoretical entities of classical cognitive psychology are better applied to distributed cognition than individual cognition is quite a bit beyond that. I'm well aware that the ideas set out above will raise many hackles. To spare others the effort, I'll hurl the epithet "group selectionist" at myself, since I seem to advocate the fusion of individual persons into a larger agent. I'll also admit that I'm personally not all that interested in dealing with "crucial foundational problems" about groups. For instance, subjects seem to effortlessly overcome the pull of many bad equilibria when they can talk, observe and gossip the way they actually do in the real world (Duffy and Feltovich 2006). Yes, it is an interesting question why that is so: I hope for good answers and look forward to reading them with deep interest. No, the serious study of distributed economic cognition does not need to, and should not, wait for good answers to that question. So don't bug me with the predictable question: "But what about the (insert favorite game-theoretic puzzle) problem you are obviously ignoring in this group?" One person's-even one paper's-foundational problem is another's distracting detail. More seriously and sympathetically: Economic theorists have already added important insights to a full understanding of distributed cognition, and I hope this continues. By now it is banal that economic institutions are important external cognitive artifacts that mediate specific kinds of distributed cognition at many scales: Philosophers of mind such as Clark (1997) are now getting this. At the smallest scales, within groups, smooth distributed cognition might very well be aided and abetted by specifically economic institutional gizmos that help solve problems of coordination, shirking, trust and so forth. Yes, of course-good thinking. But distributed cognition is not merely the solution of those economic problems: Solving them is no guarantee that distributed cognitive systems will increment and innovate their own hardware and software so as to grow an economy. More generally, distributed cognition systems, and economic mechanisms, are almost necessarily interdependent. I view neoclassical economic theory as a necessary part of a complete and rigorous cognitive science but, unlike Gul and Pesendorfer (2008), I think neoclassical economic theory just doesn't address certain important economic issues-genuinely cognitive ones below the level of computational theory. And I'm beginning to doubt that the most important kinds of economic cognition occur solely in machines that only reveal their secrets to medical devices. That is a 11 criticism of our general obsession with individual cognition, and neuroeconomics is just one manifestation of that. Acknowledgments In very different ways, Daniel Friedman, Glenn W. Harrison, John S. Hutchinson, Anne Jaap Jacobson, Tamar Kugler, David K. Phillips and my father John T. Wilcox have all helped me with this work. The usual disclaimer applies with special force: No opinion or mistake here should be ascribed to any of these people. References Ballinger, P., Palumbo, M. and Wilcox, N. (2003). Precautionary Saving and Social Learning Across Generations: An Experiment. Economic Journal 113, 920-947. Camerer, C. (2008). The Case for Mindful Economics. In A. Caplin and A. Schotter, eds., Foundations of Positive and Normative Economics. New York: Oxford University Press. Churchland, P. (1981). Eliminative Materialism and the Propositional Attitudes. Journal of Philosophy 78, 67-90. Clark, A. (1997). Being There: Putting Brain, Body and World Together Again. Cambridge, MA: MIT Press. Cox, J. C. and Hayne, S. C. (2005). Barking Up The Right Tree: Are Small Groups Rational Agents? Experimental Economics 9, 209-222. Dennett, D. (1987). The Intentional Stance. Cambridge, MA: MIT Press. Duffy, J. and N. Feltovich. (2006). Words, Deeds, and Lies: Strategic Behavior in Games with Multiple Signals. Review of Economic Studies 73, 669-688. Fodor, J. (1975). The Language of Thought. New York: Thomas Cromwell. Fodor, J. (2000). The Mind Doesn't Work That Way. Cambridge, MA: MIT Press. Fudenberg, D. and Levine, D. K. (2006). A Dual Self Model of Impulse Control. American Economic Review 96: 1449-1476. Glimcher, P. (2003). Decisions, Uncertainty, and the Brain: The Science of Neuroeconomics. Cambridge, MA: MIT Press. 12 Gould, S. J. and Lewontin, R. C. (1979). The Spandrels of San Marco and the Panglossian Paradigm: A Critique of the Adaptationist Programme. Proceedings of the Royal Society of London. Series B, Biological Sciences 205, 581-598. Gul, F. and Pesendorfer, W. (2008). The Case for Mindless Economics. In A. Caplin and A. Schotter, eds., Foundations of Positive and Normative Economics. New York: Oxford University Press. Harrison, G. and List, J. (2004). Field Experiments. Journal of Economic Literature 42, 1013-1059. Hutchins, E. (1995). Cognition in the Wild. Cambridge, MA: MIT Press. Marr, D. (1982). Vision. Cambridge, MA: MIT Press. Martin, A. and Caramazza, A. (2003). Neuropsychological and Neuroimaging Perspectives on Conceptual Knowledge: An Introduction. Cognitive Neuropsychology 20, 195–212. McCabe, K. (2008). Neuroeconomics and the Economic Sciences. Economics and Philosophy [this volume, volume number and pages to be determined]. Putnam, H. (1988). Representation and Reality. Cambridge, MA: MIT Press. Ross, D. (2005). Economic Theory and Cognitive Science: Microexplanation. Cambridge, MA: MIT Press. Schotter, A. and Sopher, B. (2003). Social Learning and Coordination Conventions in intergenerational games: An experimental study. Journal of Political Economy 111, 498-529.
| |
Other Abstract Moving target imaging (MTI) plays an important role in practical applications. How to capture dynamic images of the targets with high qualities has become a hot point of research in the field of MTI. In order to improve the reconstruction quality, a new MTI model based on compressed sensing (CS) is proposed here, by using a sampling protocol of the row-scanning together with a motion measurement matrix constructed by us. It is proved by the simulation and the experimental results that a relatively high quality can be achieved through this approach. Furthermore, an evaluation criterion of reconstructed image is introduced to analyze the relationship between the imaging quality and the moving speed of the target. By contrast, the performance of our algorithm is much better than that of traditional CS algorithm under the same moving speed condition. As a result, it is suggested that our imaging method may have a great application prospect in the earth observation of unmanned aerial vehicles, video monitoring in the product line and other fields. © 2017 Chinese Physical Society.
GB/T 7714 王盼盼,姚旭日,刘雪峰,等. 基于行扫描测量的运动目标压缩成像[J]. 物理学报,2017,66(1). | http://ir.nssc.ac.cn/handle/122/5728 |
WaveDNA Interviews Madeleine from Sonic Bloom
I’ve used Liquid Rhythm to achieve more variation within my beats in some of the songs and probably will continue to do so.
1) Describe your experience with Liquid Rhythm in one or two sentences.
I love using Liquid Rhythm for creating broken beat variations. It’s great for adding all those little humanized hi-hats, breaks, and other drum fills that would otherwise require lots of editing.
2) Who are you, where are you from? Labels? Affiliations?
I’m Madeleine Bloom, an electronic musician, producer, vocalist and multi-instrumentalist from Berlin, Germany. I release on my own label Quixotica Records. I’ve opened for Grammy winner Imogen Heap and my music has received praise from renowned producers like Guy Sigsworth and Rupert Hine. I’m part of female:pressure, a database and loose collective of female electronic artists.
3) What are your favourite genres of music to produce?
Well, I’ve been told that my own music is genre-defying although you could call it electronica or leftfield pop. I don’t think in terms of genre when I’m working on music, but rather what story I want to tell and what emotions to convey. I’m not sure if this answers your question but there it is.
4) Which instruments do you play?
The first instrument I learned was classical guitar which I started at the age of 6. As a teenager I added bass, drums, and keyboards while playing in bands. Piano lessons soon followed since I always wanted to learn to play the piano. I also play array mbira, vibraphone and an array of other instruments, not necessarily well though.
5) When did you first start producing music?
I got started as a teenager. Back then I was just ping-pong recording on tapes with a bad mic to capture my ideas. We also did 4-track tape recordings with the different bands I was involved with. At university I then studied Media Design and Electroacoustic Music, had access to a sound lab with Samplitude and later also Pro Tools HD. That’s when I switched to DAWs.
6) Mac or PC?
First PC, then both, now only Mac for a couple of years already. I’m still on 10.6.8 though.
7) DAW/DAW’s? Hardware? Plugins?
Ableton Live 9 and Logic 9. Mostly the former these days though.. Various analogue synths. My favourites are Moogs. Instruments include Rhodes Fifty Four, array mbira, vibraphone, Epiphone Les Paul Birdseye and more. Mostly Max for Live devices.
8) Describe your process for beginning a song; do you start with a drum rhythm or a melody?
That really depends on what inspires me in that particular moment. It could be a beat, a melody I sing, chords or melodies I play on an instrument, a bass line on an analogue synth or an everyday sound I mangle. I don’t actually have one way of beginning a song because I don’t like routines much. I want to avoid doing the same thing over and over. Often I lay down some sort of skeleton, the bare bones of the idea in Ableton Live without worrying about the sound quality. Then later I flesh things out, add lots of details and variations and replace any MIDI instruments I’ve used with real instruments or build my own.
9) How do you use Liquid Rhythm when producing in the studio?
Generally I record the basic beats on Ableton Push by simply drumming out the rhythm and copy or record them into the Arrangement View. Then if I want a song to have tricky, elaborate or broken beats (which is often the case) I use the Max for Live MIDI effect of Liquid Rhythm to add the details. I used to copy the beats over from the arrangement into the Session View to do this, but now that Liquid Rhythm works on clips in the Arrangement View of Live, I do it in place.
10) How did you get into creating music production instructional videos?
I worked as an Ableton tech support for a couple of years and realised that I was good at explaining how things in music production are done and enjoyed it. As it is, my own music doesn’t quite pay the bills and in my work as a tech support I could see what users struggled with. So now I offer video courses for Ableton Live and Push on Sonic Bloom, as well as free video tutorials. I also offer one-to-one online lessons so that no matter where someone lives, if they get stuck with a problem to do with Ableton Live, music production or composition, I can help them via Skype.
11) Creatively speaking, what kind of advice would you give to someone who is just starting out and looking to get into making electronic music?
Even though you don’t have to learn an instrument anymore to make music, I’d recommend to get some basic piano or keyboard lessons. You not only become faster in getting your ideas out of your head and into a DAW, but you also learn about music theory and composition. If you’re fine with using computers, read the manual and possibly take a course, you’ll be able to put together a decent enough track quite quickly in the DAW of your choice. Other than that, keep exploring new things, keep learning, have fun and don’t be afraid to make mistakes.
12) What projects are you currently involved with? Any involve Liquid Rhythm?
The only project besides teaching as well as mixing and mastering that I have time for is my own music. I’m currently working on my next album. It’s about halfway done. And yes, I’ve used Liquid Rhythm to achieve more variation within my beats in some of the songs and probably will continue to do so.
13) What do you want to see in music production software in the future?
I’m quite happy with my current options in regards to music production. Things are so much easier than, say, 10 years ago, and equipment has become cheaper. I do, however, have quite a few ideas about what I’m missing for my electronic live performances. I do live looping with both acoustic sources (voice, instruments) as well as MIDI instruments. A kind of modern one-woman-band. To recreate my songs live, I need to remember and do heaps of things at a specific time. I’d like things to be more intuitive, like playing an instrument. So far, it requires a lot of MIDI programming and workarounds to allow for a creative flow while going beyond knob twiddling and mixing.
Preview of Madeleine Bloom’s unreleased song “Tipping Point.”
Check out how Madeleine uses Liquid Rhythm: | https://www.wavedna.com/wavedna-interviews-madeleine-from-sonic-bloom/ |
Ailt WebPage HTM HTML to TXT Converter is a useful and time-saving software designed to convert Webpage, HTML, HTM files to Text TXT documents. User-friendly interface allows you to use very easily without any learning curve. Merely need a few clicks. | https://www.rocketdownload.com/query.php?q=best+html+xaml+converter |
By UUSC Staff on October 1, 2019
As the world continues to wake up to the reality of the climate crisis and the threats it poses to humanity and the planet, UUSC joined thousands of activists, civil society leaders, and government officials at the UN Climate Action Summit in New York City last week. We listened to the wisdom of youth and indigenous leaders, strategized with allies, amplified community voices, and shared about our work on climate justice.
From the youth-led Climate Strike rally in Battery Park that drew tens of thousands of protesters, to the panel “Climate Defenders: Indigenous Climate Leadership in North America” that UUSC co-sponsored alongside the National Resources Defense Council and Land Is Life, it was a powerful week of discussion and action.
Four UUSC staff, along with one of our partners from Louisiana, Patricia Ferguson-Bohnee, from the Point-au-Chien Tribe, played an active role in several key events. Here are some highlights from the week.
Convenings of Indigenous Leadership and Youth
Some of the events at the Climate Summit were devoted to preparing for COP 25, the 25th Conference of Parties (COP) under the United Nations Framework Convention on Climate Change (UNFCCC) to be held in Santiago, Chile, December 2-13. During the summit, a gathering of indigenous leaders discussed key issues that they will bring to COP 25, including the importance of preserving biodiversity and traditional knowledge, and free and informed consent about government plans involving them and their ancestral lands. A major takeaway, that we strive to uphold and honor in UUSC’s work with frontline communities, is that indigenous peoples must be consulted before plans are implemented and that the right of indigenous peoples to self-determine their movement is centered in how we shape our support.
“Climate Defenders” Panel: Powerful Female Voices
The “Climate Defenders” panel that UUSC co-sponsored was a highlight of our presence at the Climate Summit. Everyone in the audience, both in New York, and watching online from around the world, were moved by the powerful testimony from the four female panelists and a moderator from indigenous groups all across North America, including our partner, Patty Ferguson-Bohnee, Director of the Indian Legal Clinic at Sandra Day O’Connor College of Law at Arizona State University, and member of the Pointe-au-Chien Tribe in Louisiana. If you didn’t catch it live, you should watch the recording.
The panel was introduced by Ta’Kaiya Blaney, a young indigenous activist and singer, who discussed how indigenous people are defending their ancestral land from exploitation, destruction, and imperialism, and emphasized how the voices from the front lines need to be uplifted in these kind of meetings. She sang a song in tribute to the indigenous women on the panel, and those who have been killed and gone missing as a result of the invasion of their land.
We encourage anyone interested in climate justice, and particularly the often-overlooked voices of indigenous women, to listen to the full panel recording and hear their powerful words.
Toward Climate Justice for All
As we work hand in hand with Indigenous communities around the world, we are continually learning from them and challenging ourselves to be better allies. UUSC is proud to continue our work with indigenous communities, the youth, and mobilizing people from all walks of life to combat the climate crisis and come together toward climate justice solutions for all.
Photo Credit: UUSC
***
About UUSC: Guided by the belief that all people have inherent worth and dignity, UUSC advances human rights globally by partnering with affected communities who are confronting injustice, mobilizing to challenge oppressive systems, and inspiring and sustaining spiritually grounded activism for justice. We invite you to join us in this journey toward realizing a better future! | https://www.uusc.org/following-the-lead-of-youth-and-indigenous-peoples-at-the-2019-un-climate-action-summit/ |
A crew from Colorado Parks and Wildlife cruised around Thunderbird Lake on Monday scooping up hundreds of bright orange koi that were discovered in the lake earlier this year.
An electric current stunned the fish first, making them easy catching. Each pass of the net delivered anywhere from one to a dozen fish into waiting buckets.
Parks and Wildlife officials believe there are roughly 1,500 koi living in Thunderbird Lake, a man-made water body in Admiral Burke Park in Frasier Meadows in southeast Boulder.
As a non-native species, koi have the potential to upset the ecological balance of the lake, Parks and Wildlife spokeswoman Jennifer Churchill said. In particular, koi eat zooplankton, which could contribute to overgrowth of algae. That’s already been a problem at the lake as water levels have fallen in recent years.
Exotic species also can out-compete native fish species, Churchill said. Parks and Wildlife stocks the lake with several fish species, including bluegill, bass and catfish.
“We’re trying to balance an entire aquatic ecosystem,” Churchill said, from algae and zooplankton to top predator fish and birds. “When we have a situation like this where koi are dumped into a waterway, it can unbalance the system.”
Wildlife officials assume the koi were put into the lake by people disposing of pet or ornamental fish. They originally thought there were a only few hundred fish, but further study showed there are more than a thousand.
Thunderbird Lake does have an outlet to other waterways, leaving open the potential for the koi to spread if they are not removed.
Koi, a colorful fish often used by hobbyists to stock outdoor ponds, are an ongoing problem for wildlife officials. In the 1990s, Parks and Wildlife removed 17 dump trucks full of koi from Arbor Lake in Arvada, Churchill said.
Lisa Pedersen, CEO of the Humane Society of Boulder County, said exotic fish stores and Craigslist can be good resources for finding homes for unwanted fish. While the Humane Society is focused on dogs and cats and cannot actually take fish, workers there can help fish owners find people who can help.
Don and Janette Lenschow, who live in the nearby Keewaydin neighborhood, watched the wildlife crew work Monday and recalled how the water in the lake once was clear and children used to watch catfish swim in schools near the shore.
“I’m not surprised,” Lenschow said of the koi. “We know that carp tend to be everywhere. It’s a good thing that they’re trying to restore it.”
Neighbors have lobbied the city to also the water at the lake to previous levels, but city parks officials believe they can stabilize the lake without continuing to pump millions of gallons of potable water into it, as they have since 2009.
The electric current that passed through the water does not kill the fish. The wildlife crew tossed back bass and catfish caught in their nets, but they were far fewer than the koi.
Churchill said it will be hard to know if they’ve gotten all the koi. Another analysis of the lake will be done after Monday’s harvest.
The koi will be delivered to the Birds of Prey Foundation in Broomfield as food for recovering raptors.
“They are going to benefit wildlife in the end,” Churchill said.
Contact Camera Staff Writer Erica Meltzer at 303-473-1355 or [email protected]. | https://www.dailycamera.com/2012/11/19/wildlife-officials-zap-scoop-up-hundreds-of-koi-fish-from-boulders-thunderbird-lake/ |
On January 2, 2023, the NovAtel File Transfer Protocol (FTP) server used for distributing Waypoint data will be decommissioned and replaced by a Secure File Transfer Protocol (SFTP) server. This decision to deprecate FTP is to maintain security of our data and services and is consistent with best practices followed by many other organizations.
The replacement SFTP server will be accessible and supported as of the upcoming maintenance release version of 8.90, expected in Spring 2022, to provide customers and integrators with time to manage this transition.
Products Affected:
Any version of Inertial Explorer, Inertial Explorer Xpress, GrafNav / GrafNet, GrafNav Static, SDK, and the TerraStar-NRT service.
Waypoint uses the NovAtel FTP server for hosting the following information:
Currently, Waypoint software accesses this information from the FTP server within the application. After January 2, 2023, software versions prior to the upcoming maintenance release of 8.90 will no longer be able to access this information.
Users may update or upgrade to the latest version of Waypoint software. Support for SFTP will be included in the upcoming maintenance release version of 8.90 and later. If already using the latest release of version 8.90 prior to January 2, 2023, no action is required.
Please contact [email protected] with any questions. | https://novatel.com/support/bulletins-alerts-release-notices/waypoint-migration-from-ftp-to-sftp-server |
Select Format To Download
Select Format To Download
Franz Kafka’s Metamorphosis was a seminal work in modern literature which toyed with reality and perception. The novella begins with a Central European salesman named Gregor Samsa awaking in bed. His first realization is that he has transformed into a giant cockroach. Gregor becomes quickly and oddly accustomed to his new state and transitions into reflections about the dreariness of his life as a traveling salesman.
The Metamorphosis is highly regarded as one of the most widely read and influential works of twentieth-century fiction. Kafka’s work is so influential and powerful because it is a representation of the struggle of modern day man.
Write a reviewYour Name:
Your Review: Note: HTML is not translated!
Rating: Bad Good
Enter the code in the box below: | http://freebook.in/books-in-epub/metamorphosis |
Before you ride your Polaris Sportsman XP 1000 S, perform the pre-ride inspection as described in your Owner's Manual. Read, understand and follow all of the instructions, warnings and safety precautions in the Owner's Manual and on all product labels. Failure to follow these instructions, warnings and safety precautions could result in serious injury or death.
During your pre-ride inspection, do the following:
1. Visually inspect the vehicle, looking for debris, leaks and worn components that may impair the vehicle’s operation.
2. Pay particular attention to the radiator area for the accumulation of debris, which can cause the engine to overheat, and clean any debris that is found.
3. Check the condition of the tires, looking for any sign of punctures or damage, and inspect the tread depth.
4. Check the tire pressures and verify they are set to specification. All tires should be 10 psi (69 kPa).
5. Inspect the front and rear suspension for leaks, debris and damage.
6. Inspect the brake pads and rotors, looking for corrosion, nicks and burrs.
7. Lift up on the rear seat latch and pull the seat back to remove.
8. Then inspect the engine and PVT intake systems for blockage or debris and clean as needed. Caution: DO NOT spray water directly into the intake system, as this can result in water intrusion to the engine.
9. Reinstall the seat and verify it is properly secured.
10. Next, inspect the fluid levels. Ensure the vehicle is on a level surface before inspecting fluid levels.
- Inspect the front brake reservoir on the left handlebar for proper fluid level.
- Unlatch and open the front storage compartment. Turn the quarter-turn latches inside and remove the storage bin. Then inspect the rear brake reservoir and add fluid as needed. Tip: Use a flashlight to illuminate the brake fluid reservoirs.
- Also inspect the coolant level in the overflow bottle. Add coolant as needed. Caution: Escaping steam can cause burns. Never remove the pressure cap while the engine is warm or hot. Always allow the engine to cool completely before removing the pressure cap.
- Reinstall the storage bin by engaging the two tabs on the front and turning the quarter turn latches. Before closing the storage compartment, ensure the seal is fully seated.
11. Next, inspect the engine oil level. The dipstick is located on the left side of the vehicle.
- Ensure the oil level is checked on a cold engine. A hot engine will appear overfilled.
- Wipe the area around the oil dipstick with a clean shop towel.
- Turn the oil dipstick counterclockwise to remove and wipe with a clean shop towel.
- Reinstall the oil dipstick until it is fully seated. The dipstick must be screwed in completely to ensure an accurate measurement.
- Remove the oil dipstick again to inspect the oil level. Caution: Operating with insufficient engine oil will cause accelerated wear. Always maintain the oil level in the safe range.
- Add oil as needed. Do not overfill. Caution: Using a non-recommended engine oil may cause serious engine damage. Always use the recommended engine oil and never substitute or mix engine oil brands.
12. Turn the key on and inspect fuel level.
13. Then verify proper operation of the headlights, taillight and brake lights.
14. Check the steering for smooth operation from full left to full right
15. Verify proper brake and throttle pedal movement, taking note of any binding or sticking.
16. Set the parking brake and ensure the vehicle does not roll.
17. Start the engine and verify the low oil pressure light is not illuminated.
18. Stop the engine with the stop and run switch and verify it does not restart.
For more information, see your authorized Polaris Dealer. Find a dealer near you with the Dealer Locator.
Maintenance tips, procedures and specifications can be found in your Owner's Manual.
To find diagrams and replacement part numbers, use the online parts catalog. | https://atv.polaris.com/fr-ca/self-help/article/KA-01832/ |
Citation: Fitzgerald, G.J., Pinter Jr, P.J., Hunsaker, D.J., Clarke, T.R. 2004. Shadow fraction in spectral mixture analysis of a cotton canopy. In Wel Gao and David R. Shaw (eds.) Proceedings of SPIE - The International Society for Optical Engfineering, Remote Sensing and Modeling of Ecosystems for Sustainability, August 2-4, 2004, Denver, Colorado, 5544:20-34. Interpretive Summary: Remotely-sensed images of agricultural fields can provide a diverse array of information about the components in a field, including plant health, soil, stressed plants, and shadows. Spectral mixture analysis is an advanced image processing method that can determine the type and amount of each component within each pixel of an image. The method is generally used to analyze hyperspectral imagery, which is composed of dozens to hundreds of wavebands from which spectra can be extracted. Spectral mixture analysis compares the actual pixel spectra with a reference library of spectra of 'pure' components and determines the fraction of components contained in each pixel. Shadows often confound analysis of imagery, and this approach allows their estimation and separates them from the components of interest, such as plants and soil. In this study, different types of shadows were identified to improve the ability of hyperspectral imagery to estimate the four crop factors, percent cover, crop height, leaf greenness, and leaf chlorophyll. This approach has the potential to map various crop factors simultaneously for use in variable rate application of inputs and as inputs to crop models, allowing them to be extended spatially across a field.
Technical Abstract: Hyperspectral imagery is capable of providing detailed spectral reflectance information of agricultural fields for potential use in site-specific management operations. Analysis of these data are complicated by the large number of spectral bands, the many different components or endmembers (e.g. plant and soil), and the presence of shadows. Unlike simple unmixing approaches which compute the fraction of a fixed number of components, multiple endmember spectral mixture analysis (MESMA) also determines which components are present in each pixel. This study compared whether using different shadow endmembers (EM) in a 4-EM model (sunlit green leaf, sunlit soil, shadowed leaf, shadowed soil) would improve estimates of scene components compared to a 3-EM model (sunlit green leaf, sunlit soil, photometric shade). Results revealed that correlations with percent cover and height were improved when shadow or shade endmembers were included for both models compared to the green leaf fraction alone. The 3-EM model was superior for developing a direct relationship for estimating cover and height but was not able to estimate SPAD or chlorophyll a. The 4-EM model showed the best results for SPAD and chlorophyll a, with r2 values of 0.84 and 0.77, respectively. | https://www.ars.usda.gov/research/publications/publication/?seqNo115=166984 |
What is the medical terminology for blind spot of eye?
2 Answers
Optic disc / punctum caecum.
Explanation:
Blind spot is also known as optic disc. It's a point where optic nerve enters the eye ball and the corresponding region of retina contains no pigment cells as a result no image is formed at that point.
It's name is optic disc because at its entry point optic nerve causes a bit cupping of the eye ball.This degree of cupping is fixed as more cupping indicates increased CSF pressure in brain which leads to papilloedema, which can be seen by an ophthalmologist using fundoscopy (fundus is the posterior part of eye ball).
punctum caecum is the word used.
Explanation:
A blind spot is a place where there are not photo receptor cells, meaning you cannot detect light and therefore 'see' there.
This relates some what to field of view, such as for us, due to where our eyes are situated, our blind spot is anything past the back of the corners of your eyes and behind you.
Animals such as hoofed animals or fowl, which are most commonly animals which are preyed on, have their eyes situated on the sides of their head, giving them a much better range of view, and a range of view which extends slightly behind them, allowing them to see any approaching predators from any angle.
However, due to this, most of these creatures have no 3D vision or depth of field, and more often than not, only one of their eyes can see what they're looking at and produces a '2D image'.
However, this depth of field is quite necessary usually when you'd rather see what is around you whilst your head is in the grass eating whatever is your fancy.
Animals which have eyes situated 'pointing' out of the front of their skulls are usually predators, or have another meaningful use to them. This therefore produces a 3D image in a certain zone in front of them, this field of view helps them in hunting, as it allows them to do the internal calculations of their pounce, jump, etc. So they get to their destination, whether that be on the next branch of fruit for a black-and-white colobus monkey or the unsuspecting prey of a serval cat.
There is however animals who also break out of this field of view, such as the Chameleon.
Chameleons have almost no blind spot, apart from where their independent eyes at the time are not looking, and uses their eyes to seek out prey, mates and to watch for predators.
When they find food however, they line both of their eyes up, unsurprisingly for the 3D depth of view it produces for them, which is necessary for the hopefully accurate hit of their tongue on their target prey.
Animals such as Eagles and Falcons (most bird of prey though these in particularly), have a zone where they can also produce a magnified image, which helps in searching for prey, as well as tracking them when stooping/attacking.
Hopefully this helps, and the extra info. | https://socratic.org/questions/5a60726911ef6b752e3545dc#537366 |
Dom DeLuise was an American actor, voice actor, comedian and filmmaker who starred in such films as 1966's The Glass Bottom Boat, 1974's Blazing Saddles, 1978's The End and 1981's The Cannonball Run. As a voice actor, he lent his voice to numerous animated film characters such as Tiger in 1986's An American Tail and its sequels and Itchy Itchiford in 1989's All Dogs Go to Heaven.
Family Life
He was married to actress Carol Arthur from 1965 until his death in 2009. The marriage produced three children: Peter, David and Michael DeLuise, all of whom became actors.
Trivia
He was an accomplished chef, who published a number of cookbooks.
He along with all three of his sons and wife appeared in the 1979 film Hot Stuff.
He received his star on the Hollywood Walk of Fame in 1985.
Dom DeLuise Rank
Dom DeLuise's Popularity
Dom DeLuise was a famous American actor and comedian, who was born on August 1, 1933. As a person born on this date, Dom DeLuise is listed in our database as the 28th most popular celebrity for the day (August 1) and the 31st most popular for the year (1933).
People born on August 1 fall under the Zodiac sign of Leo, the Lion. Dom DeLuise is the 1024th most popular Leo.
Aside from information specific to Dom DeLuise's birthday, Dom DeLuise is the 6473rd most famous American and ranks 101st in famous people born in Brooklyn, New York, U.S.
In general, Dom DeLuise ranks as the 10397th most popular famous person, and the 1428th most popular actor of all time. “The Famous Birthdays” catalogs over 25,000 famous people, everyone, from actors to actresses to singers to tiktok stars, from serial killers to chefs to scientists to youtubers and more. If you're curious to see who was born on your birthday, you can use our database to find out who, what, where, when and why. You can search by birthday, birthplace, claim to fame or any other information by typing in the search box, or simply browse our site by selecting the month, the day, the horoscope, or any other clickable option.
Learn about famous persons' keys to fame, discover interesting trivia and find out where they rank on several types of charts. Use it as fun information for a birthday party or a game at another type of celebration. Start a scrapbook of everyone born on your birthday or give a gift of a scrapbook of everyone born on a loved one's birthday. Take a look at the currently trending celebrities, the most popular birthdays for a specific day or jump to a random or recently added celebrity's page if you're not looking for anything specific. | https://www.thefamousbirthdays.com/people/dom-deluise |
Buddhism originated in India in the 6th century BC. It consists of the teachings of the Buddha, Gautama Siddhartha. Of the main branches of Buddhism, it is the Mahayana or “Greater Vehicle” Buddhism which found its way to Japan.
Buddhism was imported to Japan via China and Korea in the form of a present from the friendly Korean kingdom of Kudara (Paikche) in the 6th century. While Buddhism was welcomed by the ruling nobles as Japan’s new state religion, it did not initially spread among the common people due to its complex theories. There were a few initial conflicts with Shinto, Japan’s native religion, but the two religions were soon able to co-exist and even complement each other.
During the Nara Period, the great monasteries in the capital Nara, such as Todaiji, gained strong political influence and were one of the reasons for the government to move the capital to Nagaoka in 784 and then to Kyoto in 794. Nevertheless, the problem of politically ambitious and militant monasteries remained an issue for the governments over many centuries of Japanese history.
Nara’s Todaiji
During the early Heian Period, two Buddhist sects were introduced from China: the Tendai sect in 805 by Saicho and the Shingon sect in 806 by Kukai. More sects later branched off the Tendai sect. Among these, the most important ones are mentioned below:
In 1175, the Jodo sect (Pure Land sect) was founded by Honen. It found followers among all different social classes since its theories were simple and based on the principle that everybody can achieve salvation by strongly believing in the Buddha Amida. In 1224, the Jodo-Shin sect (True Pure Land sect) was founded by Shinran, one of Honen’s pupils, with even further simplified teachings. The Jodo sects continue to have millions of followers today.
In 1191, the Zen sect was introduced from China. Its complicated theories were popular particularly among the members of the military class. According to Zen teachings, one can achieve self enlightenment through meditation and discipline.
The Nichiren sect, was founded by Nichiren in 1253. The sect was exceptional due to its intolerant stance towards other Buddhist sects. Nichiren Buddhism still has many millions of followers today, and several “new religions” are based on Nichiren’s teachings.
Ryoanj’s famous rock garden, one of Japan’s most popular Zen gardens
Oda Nobunaga and Toyotomi Hideyoshi fought the militant Buddhist monasteries at the end of the 16th century and practically extinguished Buddhist influence on the political sector. Buddhist institutions were attacked again in the early years of the Meiji Period, when the new government favored Shinto as the state religion and tried to separate and emancipate it from Buddhism.
Nowadays about 90 million people consider themselves Buddhists in Japan. However, the religion does not directly affect the everyday life of the average Japanese very strongly. Funerals are usually carried out in a Buddhist way, and many households keep a small house altar in order to pay respect to their ancestors. | https://amuletsforum.com/2021/01/13/buddhism-5/ |
I often remind pupils and friends that the piano repertoire is an extraordinary treasury, and one which after several lifetimes of exploration would still yield up new gems and discoveries.
As if to prove the point, when I returned from a recent break in Moniaive I was surprised and delighted to see – among the packages awaiting me back at home – a splendid hardbound volume of piano music by Christian Gottlob Neefe (1748-1798), submitted for possible review by distributer Universal Edition on behalf of publisher Edition Dohr Köln.
Neefe’s name might be recognised by some as the composer of a charming Menuetto featured in ABRSM Grade 1 piano a few years ago.
But those who search the more distant recesses of their memories may recall mentioning him in their school-day essays about Beethoven; Neefe was young Ludwig’s principal piano teacher in Bonn.
As such, Neefe’s own compositions surely played a significant role in the latter’s music education, and thus attract peculiar interest. To what extent does his music inform Beethoven’s – and stand as a precursor to it?
Furthermore, as Beethoven’s piano teacher, Neefe himself joins the pianist lineage of those many of us who have traced our teaching line back to Liszt, Beethoven and beyond. This again adds personal resonance, however vague, in discovering his music. | https://pianodao.com/tag/oliver-drechsel/ |
Jesus Christ died on the cross to save us from our sins and to open the gates of heaven. He carried His cross to Golgotha to complete an agonizing death so that He could give the entire world salvation. Every day we must do things that we struggle with. Sometimes we must help others, even though it is not seen as the popular thing to do. In history, there have always been people who have taken Jesus’ teachings and put them to use in their own lives—people who “take up their cross” and help the Lord’s people spread a pro-life mentality and help give value to human life.
Jesus came to Earth as a divine human to spread the will of God and to give us teachings on how to live amongst each other. In Luke 9:23, Jesus said, “If anyone wishes to come after me, he must deny himself and take up his cross daily and follow me.” During Jesus’ time it was unpopular to follow the teachings of certain prophets. Jesus was not popular due to the scrutiny by Jewish leaders of the time. When Jesus told people to follow Him, there was a risk to people who did. Knowing that they could be killed for following Jesus but doing so anyway is an act of taking up their cross. Some people, after the days of Jesus, have continued His works and helped protect and serve their fellow man. By “taking up their cross,” many people have risen above others, showing courage, charity, and passion for helping their fellow man. One of these people is Hugh O’Flaherty.
Hugh O’Flaherty was born on February 28, 1898, in Ireland. As a young boy, he lived on a golf course and was a steward there. He became very good at golf and in his later teen years he had a scratch handicap and a scholarship to a teacher training college. Instead of taking the scholarship, O’Flaherty enrolled at Mungret College. This was a Jesuit school that was meant to help prepare young men for the adventures of life as a priest. Most of the student body at the school was aged 14 to 18. Eventually he was posted in Rome to finish his studies. He earned doctorates in divinity, canon law, and philosophy. He was ordained in 1925. He was never posted in a diocese. Instead, he began to work for the Holy See. He then went on to be a Vatican diplomat for countries such as Egypt, Haiti, Santo Domingo, and Czechoslovakia. In 1934, he was made a papal chamberlain and was given the title of monsignor. This allowed him to work in the Holy Office.
While he was working in the Holy Office of Rome, World War II began. As the war continued, O’Flaherty visited multiple prisoner of war camps in the then-fascist country of Italy. He did this to try to find missing soldiers so he could announce on Radio Vatican that the missing soldiers had been found. This would help the families immensely and give them peace of mind. In 1943, Benito Mussolini was removed from power by the Italian king, Victor Emanuel III. When this occurred, thousands of Allied prisoners of war were released from their prison camps. As the Germans began to recover and reoccupy Italy, the Allied men began to be in danger of recapture. Those who had met O’Flaherty during his visits to the camps headed for Rome and begged him for his help. Without permission from his superiors, O’Flaherty went straight to work helping the freed Allied prisoners of war. He didn’t stop there. He also began to help Italian Jews as well. To be able to organize an operation of this size, he had many different people of different backgrounds help him. Priests, POWs, and countrymen all stood together to help protect the innocent human beings who could’ve been smashed by the Nazi Regime. O’ Flaherty and his colleges saved over 4,000 Jews and escaped POWs. They hid all these people in flats, farms, and even convents. The Germans became furious with his actions and tried to assassinate him multiple times. Even in the face of danger, Hugh O’Flaherty still helped protect the lives of the innocent.
Hugh O’Flaherty used his life to help protect the lives of others. He helped save thousands of Jews and escaped allied prisoners. Despite the attempts on his life, he continued to do his work and save the lives of the innocent. He even continued his work in disguise, so he wouldn’t be killed when he had business to attend to outside of the Vatican. The amount of bravery and courage that he had is certainly something for modern Catholics and people of the pro-life movement to look up to. Hugh O’Flaherty is someone whom everyone should strive to be like. He stuck his neck out for those who were in trouble. If he had not acted, a lot of these men and women would have died. O’Flaherty chose to “take up his cross,” and, because of his actions, he made the world a better place.
Hugh O’Flaherty was an example of a man who took up his cross and made a difference in the world by putting his life on the line to save the innocent lives of others. Without his selfless actions, the thousands of people whom he saved probably would not have survived the second world war. Jesus suffered and sacrificed His life to save the lives of the entire world. O’Flaherty put his life on the line to save thousands of innocent lives. He followed the teachings of Jesus nearly without flaw. He is a perfect example of how we should give up our normal lives to help those in need. Even taking small amounts of time from our lives to help the less fortunate is denying ourselves and taking up our cross. Even though this may seem like a small act of charity, in the long run it will benefit the community in more ways than you can imagine.
© 2018 Garrett Petruskie. Published with permission. | https://cultureoflifestudies.com/2018-essay-contest/category-2-10th-12th-grade-honorable-mention-garrett-petruskie/ |
How do you write a killer audition monologue? Good question. In Monologue Writing 101 I’ve broken it down for you into 10 Elements of a Great Audition Monologue. In truth, there are so many different things that make any piece of writing unique, effective, gripping, funny, moving, engaging, etc. that one could write volumes on the subject. However, I'm guessing for many of you, you have a class assignment or an audition coming up soon. Plus, as one slightly well-known playwright once said: "brevity is the soul of wit."
The 10 Elements were created as a way to boil down lessons in playwriting learned over the course of several years -- and several volumes of books on the subject -- into a short essential list. I taught these 10 Elements to students as part of the nationally recognized Joanne Woodward Apprentice Program at the Westport Country Playhouse. The material they wrote using these Elements was consistently surprising, entertaining, and enjoyable. I owe a great deal to my mentors playwright Milan Stitt and director/novelist Kathleen George in helping to shape my thinking on these elements. I am pleased to pass these on to you and I hope you, in turn, will pass them on.
Element #1: Your character must have a strong want. Think about the times you have become the most aggressive, upset, or combative. Most likely, if you felt this strongly, it was related to something you wanted or cared about very much. A character in a play or a monologue needs to want something badly. Without a strong want there is no drama – or comedy for that matter. Often the character needs to get something from the person they’re delivering the monologue to. They may need to unburden themselves by revealing a secret. Or they may need to get themselves charged up to do something difficult. They might speak a monologue to build courage, strength, or bravery for a task ahead. Or they may want to speak in order to change the way someone feels about them. Or if the monologue has an internal struggle – they may be speaking in order to change the way they feel about themselves. Whatever it is your character wants, we need to hear that want clearly behind the words they’re speaking.
Element #2: The monologue must have high stakes. Meaning, there is something important or significant at stake for your character. If the character doesn’t get what they want, what will be the consequence? Perhaps they’ll lose social standing, lose a friend, lose their self respect. Maybe they’ll lose their faith, or lose their once chance to prove their love to someone? Stakes give the monologue dramatic tension. Without stakes, a monologue is a walk in the park, its unimportant. There has to be something at stake for the character, so that if they fail to achieve their goal in the monologue, there will be significant negative consequences for them—either in a tangible or emotional form. A tangible stake might be, if the character fails to get what he or she wants they’ll lose the relationship with the person they’re delivering the monologue to. This clearly has emotional stakes as well—they’ll feel terrible, lonely, etc. A purely emotional stake might be that if the character fails to get what he or she is pursuing, they’ll lose their self respect, lose their nerve, lose their faith, etc. So you see, high stakes are important. When working on developing your monologue, ask yourself: what is at stake for this character?
Element #3: Variety of Tactics/Persuasive Moves. A great monologue has a character use a variety of tactics to achieve their want. A character might try to flatter the person they’re talking to as a tactic in order to make them more receptive to hearing them out. If flattery doesn’t work, or isn’t working by itself, they might switch gears and try the tactic of intimidating the person. Intimidation isn’t working; or it hasn’t clinched the deal? Perhaps they try enticing whomever is listening to them with something they know the other person wants. An enticement can be promising or even giving the person hearing the monologue something tangible, but more often emotional, that is of significant value to them. For instance, a father trying to get his daughter to change her behavior may show her affection as a tactic. This might be a particularly effective tactic if the father knows his daughter values his affection highly because it’s a rare commodity coming from him. In the end, a monologue is about persuasion. It’s about making the right “persuasive moves,” which are designed to work with the person who is hearing the monologue. And it’s about having the character use a variety of persuasive techniques to achieve that. Think of tactics like a dance—a dance is boring if it repeats a few steps over and over—it becomes interesting with variety. The more inventive you are in giving your character persuasive moves to make, the more interested in that character the audience will be. And the tactics you employ don’t only have to be geared outwardly toward the person whom the character is speaking to. If the monologue has an internal struggle going on, where the character is trying to convince themselves of something, then ask yourself: What must the character do to persuade themselves to take an action they know they need to, or to face something difficult, or to change something about themselves? The possibilities – and tactics – are limitless.
Element #4: Hook Opening. A good journalist, novelist, magazine writer always needs a hook—a killer first line that pulls the reader in and makes them want to read the next line, and then the next, and the next. Similarly, a monologue with a strong hook should peak the audience’s attention (of course the rest of the monologue has to pay-off the excitement and expectations it sets up). There are a number of different kind of hooks. A hook can be a headline, which encapsulates the story the monologist is about to launch into—it lets us know what happened, but now we want to know how it happened and the monologue that ensues answers that question for us. Another hook is the “Thesis” or “Argument” hook. The first line sets up an argument—something the character believes, wants their listener to believe, or wants themselves to believe—and the rest of the monologue serves to prove that this opening statement is in fact true. Yet another hook is the Relationship Dynamics hook. This is a first line or opening statement that quickly sets up a dramatically charged relationship between the monologist and whomever they’re addressing.
Element # 5. Button Closing. When your monologue ends, you don’t want the audience to wonder, is he/she done? Is this a dramatic pause? You want your ending to be clear. Like a gymnast nailing their landing, a “button” is a line that gives an actor a clear end-point to work with. A “button” can bring the thoughts expressed in the monologue to a conclusion. Often it is the moment when a character finally accepts something, finally overcomes an obstacle, finally figures something out, or comes to a decision point. What is a decision point? The moment when a character is ready to take – or is taking before our eyes – a decisive action. Think of a monologue like a mini-play. The arc of the monologue should build to this final line. If the monologue’s hook opening brings a question into the audiences mind, the button close should answer it.
Element #6. Include detail that engages the senses! What should a monologue make us do? Empathize! If the audience isn’t feeling what the character is feeling, if they aren’t going through something with the character, the monologue has not achieved its purpose. One of the most effective ways to engage your audience is to engage their senses. We all share a common five senses, and using them to describe something that happened to us brings our audience right into the experience with us. For instance, using sensory details can communicate to an audience how a character is feeling without the writer having to label the emotion. If someone tells us that when so-and-so approached them, their heart began to race, for instance, we know they’re excited or scared (depending on the context) without them having to spell-out for us what emotion they were feeling. Can you write an effective monologue that engages empathy without sight, sound, touch, taste, smell? Sure, but it would be a lot more difficult. Talking about ideas, situations and feelings without linking them to sensory experience may work when connecting with people in real life, but it generally tends to be less effective for stage and screen. Writing that taps into our senses holds incredible power to move us.
Element #7. Character overcomes internal obstacle(s). Some of the most interesting monologues feature internal struggles. Shakespeare is filled with soliloquies that do this; the cannon of modern drama contains a number of examples we can draw on as well. Watching a character conquer their own self-doubts in the course of a speech or soliloquy will hold an audience’s attention. For an actor, internal-struggle pieces provide a terrific one-person showcase. The actor playing this material is given an opportunity to show themselves in a state of weakness and turmoil from which they are able to emerge stronger, even changed, as they overcome the internal obstacles/doubts/fears that stand in their way. Good writing is complex and layered—a monologue can have a character grappling with both internal and external forces simultaneously.
Element #8. Balance Past and Present Action. So many monologues get stuck in the past, recounting stories that don't connect with the here and now. A great monologue connects with the present even when it discusses the past. We can feel the current relationship between the monologist and the person hearing it. Often we can see the monologist adjusting what they say based on how their listener is reacting. And we can feel that the character wants something, is seeking to gain something (be it tangible or emotional) from whomever or whatever they're addressing. Keep in mind, while the monologist is often addressing another person, they can also be addressing a part of themselves, an idea, a force, etc. So, as you write a monologue that has your character recount a story, think of how they are using it as a tactic to accomplish something with whomever or whatever they’re speaking to now. Your character might recall a story to prove a point to their listener. To hurt their listener, your character might bring up a memory they know is painful for them. To make peace and reconnect with someone, a character might talk about a time when they were friends. Here are a few examples of how a character can use past events to deal with their own internal obstacles: A character may recount a painful memory—something that is holding them back—in order to heal. To fight sadness in the moment, a character may recall a happier time. To fight weakness in the moment, a character may recall a story that illustrates their strength. Walk the tightrope between past and present action well and you'll be on your way to a strong monologue.
Element #9. Discovery! We don’t want to see a character do something they’ve done a million times in the same way they’ve always done it. For example, a door-to-door salesman calling on someone and giving their rehearsed speech is boring. But, take that same door-to-door salesman and have them realize during their rehearsed speech that what they really want is to leave sales and sing opera. That's another matter entirely. A monologue is dramatic when the monologist doesn't know exactly what they’re going to say until they say it. We are seeing them figure things out, right now, in the moment, as they speak. We are seeing them make decisions about how they are going to proceed with every sentence. Often we are seeing a character come to a realization, a personal discovery, or a new or more complete understanding of something for the first time. We do not want to know where the monologue is going to end when it starts. The element of surprise, of discovery, of unexpected directions, twists and turns makes for an entertaining journey.
Element #10. Exercise restraint to build dramatic/comedic tension. A character trying hard not to cry is much more interesting than one all-out-bawling for two minutes straight. Most of us try to avoid displaying strong, overwhelming emotion. A good monologue shows that struggle to keep strong emotions under-wraps. That’s not to say you can’t have a character have intense emotional outbursts, only reserve those expressions for key moments—perhaps the climax of your monologue. Have your character work, just as a real person would, to keep powerful emotions bubbling up just under the surface under control. Watching a person about to explode, about to be overwhelmed with emotion, but exercising will power and holding back is interesting. It builds expectation—are they going to lose it? Are they going to maintain their cool exterior? What a character doesn’t say, or doesn’t do—what they might be on the verge of doing—tells a story that contains inherent dramatic tension.
While skimming this tutorial fast when you’re in a rush will definitely help you get a decent monologue done on deadline, not everyone strikes gold their first time putting pen to paper. So don’t get frustrated if your first go of it isn’t the monologue of your dreams. If you are patient with yourself as you work through these 10 Elements and apply them in your writing you will see results.
If you’re serious about writing great audition material, I recommend coming back to these 10 Elements over time to get the most out of them. If you put in the investment of time and energy to learn and absorb each of the elements here, and if you read lots of monologues to see how these elements are used, you’ll have the tools to write great audition material consistently. You’ll begin to gain insights into what makes a monologue work and why many fall flat.
As you read and study monologues for the 10 Elements, you’ll find that some monologues contain several of the elements discussed here, while others may only feature one or two of them. Start by tracking which elements each monologue you encounter is using. Ask yourself some basic questions. Are the elements you identified in the monologue used effectively by the author? Why or why not? How are they used? Having specific examples of each of the Elements is the key to building a depth of understanding. Keep a list of the monologues that use the elements effectively. Build your list and keep good notes. Which elements recur again and again? Which ones do you encounter less frequently? Use this knowledge to imagine your own truly unique piece; one that will stand out from everything else out there. The more you understand how the monologues you admire use these elements, the easier it will be to write killer audition material on a consistent basis yourself.
*Copyright to this article, Monologue Writing 101: 10 Elements of Great Audition Monologues, is held by its author Gabriel Davis. For permission to use the article in whole or part, to publish online, reprint, or use as teaching material, please contact me. | https://www.monologuegenie.com/monologue-writing-101.html |
Innovators have until the end of the month to apply for funding to develop solutions to support health and social care workers to overcome the challenges posed by antimicrobial resistance.
antibiotics
The Academic Health Science Network for the North East and North Cumbria (AHSN NENC), in partnership with NHS England and NHS Improvement, is offering funding and expert support to innovators with solutions which can help prevent infections and reduce antimicrobial resistance (AMR).
The AHSN NENC is calling on innovators from all sectors to submit potential solutions by Friday 31 January. The solutions could range from small processes through to new technology or devices, which address five key challenges of AMR:
Training and education – both for health workers as well as the general public
Diagnostic tests including at point of care across the pathway that meet national and international standards
Encouraging responsible antibiotic prescribing
Encouraging adequate hydration
Surveillance programme and improved data systems
Dr Sharon Saint Lamont, head of antimicrobial resistance at NHS England and NHS Improvement, said: “The NHS Long Term Plan is clear we need to reduce antimicrobial resistance to ensure that in future years we are still able to perform surgery safely and treat infections effectively."
Solutions that do not fit within the five challenges will also be considered. Other examples could include solutions around hand hygiene, environmental cleaning, decontamination of surgical instruments, equipment and other medical devices.
Applications are welcomed from innovators from all areas, whether businesses, individuals, universities, NHS teams or charities – who are interested in forming collaborations to develop solutions to the challenges posed by AMR. The solutions can be new innovations or existing technologies which can be applied to a different setting.
Christine Jordan, Health Network North manager – an AHSN NENC initiative, said: “The threat of AMR is a very real problem which needs to be tackled now. This challenge seeks to facilitate swift progress on cross-sector collaborative projects that benefit patients by improving health outcomes and efficiencies, as well as accelerating the adoption of evidence-based innovation.
“It’s a big challenge but we’re confident that the solutions we need to make a real difference in the fight against AMR are out there – whether these are already developed innovations or ideas with potential. The AHSN NENC and our Innovation Pathway partners will provide expert support to the successful applicants to develop these solutions.”
After the closing date, applications will be reviewed and those shortlisted will be invited to present to a panel of industry experts.
Join the EPM Community for FREE today!
EPM Magazine is the essential information source for professionals involved in the formulation, development, manufacturing and supply of drugs and medicines in the pharmaceutical and biopharmaceutical industry. | |
NANDI TAKES LEAD TO LEVERAGE ON DISRUPTIVE AGRICULTURAL TECHNOLOGIES
The County Government of Nandi on Monday presided over the signing of a Memorandum of Understanding (MOU) between dairy cooperative societies and Digicow as the county moves towards digitization of Agriculture extension services to enhance service delivery.
The MoU was signed between DigiCow and three cooperative societies present namely Kabiyet Dairies, Tanykina Dairies and Nandi Dairies Cooperative Union. Others to follow include, Lelchego Dairies, Lessos Dairies, Tinderet Dairies and Adlai Mooi Dairies.
This is a follow up of the formal launch and partnership between 16 counties across the country and the 14 innovators identified through the “Scaling up Disruptive Digital Technologies in Kenya Agriculture” event that was held in April 2019. The event culminated in the identification of 14 most promising digital technology innovators in agriculture who were then awarded membership to the One Million Farmer Platform.
Digicow is one of the 14 Disruptive Agricultural Technologies cohort that was identified and awarded membership to the one million farmer platform. On 9th December 2019, during the launch of the Platform, Nandi Governor H.E Stephen Sang signed an agreement between the County Government of Nandi and DigiCow.
The one million farmer’s platform is an initiative aimed at ensuring up to one million small scale farmers in Kenya can utilize digital solutions to increase their productivity and profitability. Nandi County is looking forward to having over 100,000 farmers in Nandi on the platform by the end of the project.
The initiative is organized around four themes namely: access to productivity services, financial services, markets and data driven applications.
While witnessing the session, CECM Agriculture and Cooperative Development, Dr. Kiplimo Araap Lagat noted that DigiCow will go a long way to ease dairy farmers’ links up and access to extension services.
He asked the cooperatives’ management present to attach value to the technology and mobilize farmers to embrace it as a solution to their pulling of resources.
Dr. Lagat also assured them of the continued support of the county government in leveraging resources available under the National Agricultural & Inclusive Growth Project (NARIGP) and county resources towards investments that will benefit farmers.
On his part, Chief Officer ICT & e-Government Mr. Jonathan Misoi revealed government’s vision to have a data driven policy formulation in not only Agriculture but also in all other departments. It is cognizant to this that he says the County Government through his department has set up a Data/Call centre to gather accurate information key in prudent decision making.
He further hinted a possible synchronization and integration of DigiCow App and already acquired Digi-Farm platform set to be rolled out later this month. “The Government is in talks with Safaricom and DigiCow among other digital solution cohorts to ensure we plug in all Distruptive Agricultural Technologies into our system and have all services offered from one platform” added Misoi.
He challenged farmers to embrace and leverage on technology to increase their productivity and move to the next level.
The county government was also represented by Mr Wilson Lelei, the Chief Officer Agriculture and Dr Benadatte Tiony, The Chief Officer Cooperative Development among other technical staff. | https://nandicounty.go.ke/news/nandi-takes-lead-to-leverage-on-disruptive-digital-agricultural-technologies/ |
Project Jayapur is a boutique residential development in Bhubaneswar, Orissa.
The project Objective is to establish the Client’s brand positioning as a reliable developer of highest quality, with a successful absorption within Bhubaneswar’s competitive premium real estate market.
By creating a mix of products, both residential and commercial, the project significantly de-risks the promoter from market dynamics of any single segment, while by doing a project of a high-quality, high-finish, they ensure the project’s sales efficiency.
The development is flexible between areas allocated to commercial, residential and serviced apartments. | http://acrossbeyond.com/index.php/projects/open_project_details/4/JAYAPUR |
Giving evidence to the Scottish Parliament’s Referendum (Scotland) Bill Committee on the draft section 30 Order this morning, I was struck by the number of questions from the Committee about the precise legal effects of the Memorandum of Agreement between the UK and Scottish Government and of the section 30 Order, assuming that it is enacted. These questions covered both the binding nature of the Memorandum of Agreement (as distinct from the section 30 Order), discussed in a previous post on this blog by Christine Bell, and the issue of what it is that the Agreement and Order actually empower the Scottish Parliament and the Scottish Ministers to do. In the latter respect, two particular issues were raised, one concerning the seeking of legal advice from the Scottish Law Officers, and the other the entitlement of civil servants in the Scottish Government to investigate various subjects which are currently reserved to the UK Government and Parliament, but which might be transferred to the Scottish institutions in the event of independence (or further devolution). The question about legal advice appears to have been prompted by Nicola Sturgeon’s claim that the Scottish Government had not been in a position to seek specific legal advice on EU membership before the Edinburgh Agreement was signed. Although it is not clear that she was suggesting that the Edinburgh Agreement had made a difference to the Scottish Government’s legal powers (rather, that it provided a more concrete context for seeking legal advice), insofar as her statement is open to that interpretation, it is perhaps worth clarifying the legal position.
The answers to these questions about the legal effects of the Edinburgh Agreement are complicated by several factors, including: 1) the need to distinguish between the legal effects of the Memorandum of Agreement and the section 30 Order; and 2) the disputed nature of the Scottish Parliament/Government’s powers prior to the enactment of the section 30 Order. As regards the former, as Christine Bell explained, it is highly unlikely that the Memorandum of Agreement (as distinct from the section 30 Order) is legally binding. It could possibly have some legal effects, either because (and I think this is implausible) it is regarded as creating legally enforceable legitimate expectations or (more plausibly) as an aid to interpretation of the section 30 Order. However, any such legal effects would be in the nature of constraints upon the powers of the Scottish Parliament and Government; the Memorandum of Agreement does not, by itself, confer any legal powers on the devolved institutions. The section 30 Order, by contrast, is a power-conferring measure (it confers powers to hold a legally-valid referendum), but such powers are not conferred until the Order is actually made – i.e., once it has been agreed by both Houses of the UK Parliament and by the Scottish Parliament, and has received the assent of Her Majesty in Council. That is not expected to occur until February. So any argument that the signing of the Edinburgh Agreement made a difference to the powers of the Scottish Government and Parliament is simply wrong.
As regards the legal effects of the section 30 Order (if and when it comes into force), the second complication concerns whether the Order is understood as merely confirming (or clarifying) the Scottish Parliament’s powers to hold a referendum on independence, or whether it is in fact the source of those powers. For the sake of argument, I will assume that it is the latter. What difference, then, will the passing of the section 30 Order make to the powers of Scottish Parliament/Government (the latter is the more important here) to do things in connection with or in preparation for the prospect of independence?
Expressly, of course, the section 30 Order provides for the holding of a referendum on the question of independence for Scotland (subject to certain limitations – see my earlier post for discussion). It is, however, important to realise that bodies exercising statutory powers have implied powers as well as express powers. The doctrine of implied powers expands the powers of statutory bodies by permitting them to do things which are reasonably incidental to their express powers. ‘Reasonably incidental’ means that they have powers to do things which are conducive towards or facilitative of the exercise of their express powers; it does not mean that they have powers to do things which are merely related to the subject matter of their express powers. In relation to the section 30 Order, therefore, this means that the Scottish Government and Parliament will have implied powers to do things which facilitate the holding of a referendum. It is less clear whether this will include powers to prepare for independence – the doctrine of implied powers can be applied generously or restrictively. However, it is certainly arguable that a responsible government promoting a referendum on independence has a duty to make clear to voters the implications of a yes vote, and hence that it has the implied powers necessary for it to fulfil that advisory obligation.
In any case, though, the doctrine of implied powers is not the only potential legal basis for the taking of legal or civil service advice on the implications of independence. The Scottish Government is a statutory body, but not every power that it exercises has a specific statutory basis; the Scottish Ministers are Ministers of the Crown and, as such, they exercise powers deriving from the royal prerogative insofar as they relate to devolved matters. The royal prerogative is of particular significance as a source of power in relation to what one might term ‘machinery of government’ issues – including the roles of the civil service and the Law Officers of the Crown.
As far as the civil service is concerned, one of their key functions is to advise on, and to prepare for, potential changes in the law. This occurs routinely whenever new legislation is being contemplated, and more comprehensively prior to general elections in anticipation of a possible change in government. Although devolved prerogative powers are subject to the same limitations as to subject matter as all other Scottish Government powers, it would, nevertheless, be an unreasonable and unworkable limitation on the advisory role of the civil service to say that it is limited to issues which are currently devolved. Given that the devolved/reserved boundary is both complex and fluid (it can be changed by section 30 Orders), it would be ludicrous to suggest that every time a civil servant thinks about a reserved matter on government time, or even when she writes it down as advice to Ministers, then the Scottish Government has acted ultra vires. No government could work like that, and this reinforces the argument for saying that the question of what does or does not ‘relate to’ reserved matters in s.29(2)(b) of the Scotland Act 1998 cannot be interpreted strictly literally. At least some judges, thankfully, seem to agree. As Lord Walker put it in Martin v HMA UKSC 10 (albeit in relation to a different issue), the devolved institutions should not have to invoke Westminster and Whitehall’s help “to do no more than dot the i’s and cross the t’s” in securing legally valid outcomes. Accordingly, irrespective of any argument based on the effect of the section 30 Order, it must be legally possible for the Scottish Ministers and their advisers to discuss issues which relate to reserved matters, just as it is possible for the Scottish Parliament to debate reserved matters, although they cannot cross the line from discussion (or the facilitation of discussion) to taking acts or making decisions with more concrete implications.
If this line of argument is correct in relation to civil service advice, it must surely apply even more strongly to the taking of legal advice. A Government which is subject to legal limits on the scope of its powers (as are all governments in the United Kingdom) must have power to seek legal advice in order to discover what its legal powers are, as well as to seek advice on the legal implications of actions it might be contemplating. To act in such a way is not to breach the rule of law, but to show respect for it, and it would be illogical to suggest otherwise.
What, though, of the situation post-referendum (assuming a yes vote) when the Scottish Government moves from talking about independence to taking active steps to bring it about, via negotiations with the UK Government and relevant international bodies? Again, I think the general argument can be made that, if it is accepted that the devolved institutions have a legitimate role to play in decisions about Scotland’s constitutional future (and everyone seems to accept – and the Scotland Act, though the section 30 Order procedure, expressly confirms – that they do), then they must, implicitly, have the legal powers necessary to enable them to play that role. However, as Christine Bell argued, at this point the question of legality becomes rather beside the point. If what we are contemplating is a break with the current legal order, and the establishment of an independent state, then absence of a strict legal pedigree within the current legal order cannot and will not be allowed to stand in the way. | https://www.scottishconstitutionalfutures.org/OpinionandAnalysis/ViewBlogPost/tabid/1767/articleType/ArticleView/articleId/468/Aileen-McHarg-The-Legal-Effects-of-the-Edinburgh-Agreement--Again.aspx |
Spilled Milk Magazine is an online literary magazine for fiction and nonfiction, poetry, art and photography. We are eager to publish work that surprises us—that disregards boundaries and borders. Spilled Milk strives to be a home from unheard voices.
Tips From the Editor
The work that we like pushes the boundaries of our expectations and takes us into a mental place that we have never imagined, yet feel as though it were written specifically for us. We’ve noticed in our brief time of running this magazine that many authors don’t push their work as far as they could. In that, they have the beginnings or inklings of something very adventurous and innovative but then shield away from the precipice. We encourage writers submitting to us to hang out in those weird rooms they’re drawn to and keep digging. | https://www.pw.org/literary_magazines/spilled_milk_magazine |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.