content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
62 hours (17 weeks).
September 2012 - Present.
Upon successful completion of this course, students will be able to: recognize and apply elements of a single page and multiple page layout; tools, palettes and functions within a page layout program; set up a well organized, unified page design; Import vector and raster artwork into a page layout; and properly save/export the file for final output; apply various principles of design; apply type, font families and fonts styles to layouts; and utilize templates, layers and style sheets to multiple page designs.
This course is delivered in an instructor-monitored, distance learning format and consists of study guides, required texts, supplemental reading, essay assignments, quizzes, homework, observation, required interaction with an instructor, and 24-hour access to on-line support as needed. Topics include: InDesign, graphic design, color schemes, die cuts, balance, style sheets, brochure design, printing, digital media, and portfolios.
In the lower division baccalaureate/associate degree category, 4 semester hours in Graphic Design, Media Arts or Digital Design (12/15) (6/17 administrative review). | http://www.nationalccrs.org/design-alive/survey-graphic-design-2-mc-02 |
“a natural composer, a fresh voice and, from the evidence of his festival, a first-rate organizer with a broad range of musical interests” -Mark Swed, Los Angeles Times.
Matt McBane is a composer whose music ranges from visceral rhythms and complex grooves to delicate melodies and rich textures, freely and intuitively incorporating a wide array of influences including: minimalism, experimentalism, European classical music, art rock, jazz, film music, fiddle music and electronic music.
Matt is the violinist and composer for his Brooklyn-based band, Build, described by New York Magazine as a “rocking post-classical quintet which takes inspiration from minimalist chamber music, instrumental rock, modal jazz, and more.” Build’s two albums on New Amsterdam Records have been critically acclaimed and regularly played on radio stations across the country including NPR. Tonight’s concert will feature new music for the instruments of Build performed by LA-based musicians. | http://www.carlsbadmusicfestival.org/matt-mcbane-1 |
The Register of Chartered Security Professionals (RCSP) is to hold a dinner event at the House of Commons this March to celebrate the works of the RSCP and the standards the organisation promotes.
The dinner, supported by international risk and security specialist Pilgrims Group Limited, highlights the RCSP’s role as the recognised standard for security professionals, alongside other chartered professions, and will be hosted by Lord Carlile, CBE QC, Chairman of the Chartered Security Professionals Registration Authority.
The RCSP was set up in 2011 by The Security Institute and the Worshipful Company of Security Professionals to recognise and maintain the highest standards and proficiency for security practitioners. Professionals on the Register are entitled to use the post nominal CSyP after their names.
Pilgrims Director of Business Development, Peter Kaye, Chartered Security Professional (CSyP) and Fellow of the Security Institute (FSyI), was one of 12 senior security professionals asked to become assessors for the RCSP registration programme in 2011. Since then, over 50 professionals have been assessed and awarded CSyP status. “The work of the RCSP and the Security Institute is vital in achieving security industry standards equal to those of other chartered professions, such as accountancy or architecture,” says Kaye. “Although this is still a young body, the enthusiasm with which my fellow security professionals have embraced the CSyP status, with many more applicants in the pipeline, shows that the desire for exemplary standards in the security industry among its practitioners is strong.”
Pilgrims Managing Director, Bill Freear, adds: “It is a great privilege to be supporting the RCSP dinner at the House of Commons. The organisation reflects Pilgrims own aims to promote ‘gold level standards’ and I hope it will highlight to our legislators and officials the dedication this industry has to the highest levels of professionalism.”
| |
The two-volume Biomedical Engineering and Design Handbook, Second Edition offers unsurpassed coverage of the entire biomedical engineering field, including fundamental concepts, design and development processes, and applications. This landmark work contains contributions on a wide range of topics from nearly 80 leading experts at universities, medical centers, and commercial and law firms.
Volume 1 focuses on the basics of biomedical engineering, including biomedical systems analysis, biomechanics of the human body, biomaterials, and bioelectronics. Filled with more than 500 detailed illustrations, this superb volume provides the foundational knowledge required to understand the design and development of innovative devices, techniques, and treatments.
Volume 2 provides timely information on breakthrough developments in medical device design, diagnostic equipment design, surgery, rehabilitation engineering, prosthetics design, and clinical engineering. Filled with more than 400 detailed illustrations, this definitive volume examines cutting-edge design and development methods for innovative devices, techniques, and treatments.
Volume 1 covers: Modeling and Simulation of Biomedical SystemsBioheat TransferPhysical and Flow Properties of BloodRespiratory Mechanics and Gas ExchangeBiomechanics of the Respiratory MusclesBiomechanics of Human MovementBiomechanics of the Musculoskeletal SystemBiodynamicsBone MechanicsFinite Element AnalysisVibration, Mechanical Shock, and ImpactElectromyographyBiopolymersBiomedical Composites BioceramicsCardiovascular BiomaterialsDental MaterialsOrthopaedic BiomaterialsBiomaterials to Promote Tissue RegenerationBioelectricityBiomedical Signal AnalysisBiomedical Signal ProcessingIntelligent Systems and BioengineeringBioMEMS
Volume 2 covers: Medical Product DesignFDA Medical Device RequirementsCardiovascular DevicesDesign of Respiratory DevicesDesign of Artificial KidneysDesign of Controlled-Release Drug Delivery SystemsSterile Medical Device Package Development Design of Magnetic Resonance SystemsInstrumentation Design for Ultrasonic ImagingThe Principles of X-Ray Computed TomographyNuclear Medicine Imaging Instrumentation Breast Imaging SystemsSurgical Simulation TechnologiesComputer-Integrated Surgery and Medical RoboticsTechnology and DisabilitiesApplied Universal Design Design of Artificial Arms and Hands for Prosthetic Applications Design of Artificial Limbs for Lower Extremity AmputeesWear of Total Knee and Hip Joint ReplacementsHome Modification DesignIntelligent Assistive TechnologyRehabilitatorsRisk Management in HealthcareTechnology Planning for Healthcare InstitutionsHealthcare Facilities PlanningHealthcare Systems EngineeringEnclosed Habitat Life Support
|Book:||Biomedical Engineering & Design Handbook, Volumes I And Ii / Edition 2|
|Author:||Myer Kutz|
|ISBN:||0071498400|
|ISBN-13:||9780071498401|
|Binding:||Paper Back|
|Publishing Date:||2009-08-21|
|Publisher:||McGraw-Hill Companies, The|
|Language:||English|
|
Please Note -
|
* We sell only NEW book and do NOT sell old or used books.
* The book images and summary displayed may be of a different edition or binding of the same title.
* Book reviews are not added by BookAdda.
* Price can change due to reprinting, price change by publisher / distributor.
|
|
BookAdda (www.bookadda.com) is a premier online book store in selling books online across India at the most competitive prices. BookAdda sells fiction, business, non fiction, literature, AIEEE, medical, engineering, computer book, etc. The books are delivered across India FREE of cost. | http://www.bookadda.com/books/biomedical-engineering-design-handbook-volumes-myer-kutz-0071498400-9780071498401 |
“But where is the mosque I read about?” S. asked, just as we passed a big cross, which was also the spot designated as Počitelj on my map.
Next to a stand, selling strawberries, we climbed out of the car and marvelled at the old village of Počitelj. “This could be in the south of France” S. murmured (he must know as he lived there for quite some time).
“Strawberries from my garden 2 Euros/4 Mark” the man announced while carrying crates of strawberries from his car to his roadside stand. (The currency of Bosnia and Herzegovina is the Convertible Mark, which is pegged to the Euro, but everyone accepts Euros, shops at the official exchange rate, so there is no need to have Mark, nobody really wants to be payed in Mark). We pounced on the offer, it was a bargain compared to what we pay in Paris and even to what we paid in Split, Croatia. And the taste! These were real strawberries like no one grows them.
A Dutch couple started ogling the strawberries and I overheard that the price had been raised to 5 Mark.
We made our way up into the old village. At the centre of which was the mosque. It was initially built in 1563 and badly damaged in 1993 but restored in 2002. Along the fortified walls of the citadel, I had the occasion to learn many things about Počitelj and its history. It had been a strategic point within the Ottoman Empire.
Within the ruins of the curtain wall, the view was breathtaking. The colour of the water was in dreamy turquoise and far far away on the horizon, I could make out gigantic mountains raising into the sky. It was the last weekend of April, but it felt as if it was summer.
In summer, we would have snacked on fresh figs and pomegranates growing along the cobblestone footpaths in the village. But in April, the figs, already big, were far from ripe, and the pomegranates were in the early stages of their development, some dried fruits bore witness to the riches of the seemingly barren lands.
Her words were full of compliments. I did not understand a single one of them. She told us that our daughter’s hair was beautiful and that our son had beautiful eyes. She told her younger son, that this was a beautiful girl. She blessed our children. I understood no words, but I understood the meaning of what she said.
We had never planned on travelling to Bosnia, when one thinks of Bosnia, we tend to think of the Balkan war, of the Srebrenica genocide. Bosnia’s recent past might not be rosy, but it is a breathtaking place to visit. The people carry their hearts on their sleeve and welcome you with open arms. Most of the time their smiles are genuine and everything is done for you to feel at home.
We jumped into the car and drove for 20 minutes, to a Croatian Catholic village within Bosnia where we would later in the day attend a traditional Catholic wedding. If that isn’t a clash of cultures, then what is? (I should add the bride was Croatian Catholic from Bosnia and the groom was French).
I LOVE seeing the various cultures and the beauty of the land. Plus, your strawberries sounded yummy. Beautiful post. I hope you thoroughly enjoyed yourselves! | https://solveigwerner.com/2018/08/04/pocitelj/ |
Study on effective value chain management of public and private schools: empirical case study from South India
View/
Open
mba_perumal_p-k_2013.pdf (641.4Kb)
Author
Kumar Perumal, Praveen
Date
2013
Degree
MBA in Business Management
URI
http://hdl.handle.net/10788/1756
Publisher
Dublin Business School
Rights holder
http://esource.dbs.ie/copyright
Rights
Items in Esource are protected by copyright. Previously published items are made available in accordance with the copyright policy of the publisher/copyright holder.
Metadata
Show full item record
Abstract
This research will study the effective management of several attributes in value chain like resource utilization, quality of education, infrastructure, administration, marketing etc. It is a qualitative study and interviewing the management personnel’s like principals and correspondent of private and public schools in India will outline the competitive advantage of their schools through strategies in management system and also lack of management system within the organization. The literature review finds the advantage of private schools over public schools and will make this research more valuable by further conducting this cross study evaluation. This study will help the schools to identify their need and drawback of current management practice and also examines the competitive advantage of private schools over public schools. It also differentiates the system of practice within the management by analyzing the value chain of public and private schools. This research will outline the existing system of value chain in schools in Chennai (India) and will also provide information for future researchers who are interested in detailed analysis of competitive strategies in value chain management of schools. | https://esource.dbs.ie/handle/10788/1756 |
11 Dead Following Fire At School For Blind Children In Uganda
Parents have been left in mourning after a fire destroyed a dormitory at the Salama School for the Blind in Uganda, leaving 11 children dead.
Authorities are currently investigating what caused the fire that left 11 children dead at the Salama School for the Blind in Mukono, east of the Ugandan capital Kampala. It is believed that at least 27 children were sleeping in the affected dormitory when the fire started in the early hours of Tuesday morning.
Devastated family members have gathered at the site hoping for answers as to what happened to their loved ones.
Jennifer Nassozi, whose 6-year-old daughter was killed in the blaze, told the BBC: "I cannot describe the pain in my heart right now.
"Nassali was doing very well in school. She was such a jolly girl. "Every time we would come to school at the start of the term, her friends would come running to meet us saying, 'Nassali has come"'".
Dr Moses Keeya, who works at the local hospital that the injured children initially went to, said they "sustained mostly injuries on the arms, legs, and chest. One of them has a deep burn on the head."
Four other students at the school have been sent to Kiruddu National Hospital in Kampala while two others who only suffered minor injuries have been discharged and sent home.
Education Minister Joyce Kaduchu said: "All of us are really heartbroken. Our education system gives everyone an opportunity, regardless of what physical challenges one has.
"We have lost 11 children under very unfortunate circumstances."
Ms Kaduchu added that DNA tests would need to be carried out on the bodies of the deceased children in order to identify them. | https://www.donkeyjunk.com/post/salama-school-for-the-blind-uganda |
Preserve a butterfly specimen by relaxing, pinning and drying the specimen. Relaxing and drying are necessary to prevent the specimen from breaking or molding in the future.
www.reference.com/world-view/dead-butterflies-preserved-8b963c0ac597fd09
Although the technique and method of preservation varies depending on the life stage of the butterfly, preserving a butterfly typically involves placing the specimen in preservative fluids and then storing it in rubbing alcohol to keep its wings moist and relaxed. Pupae are generally first preserved
www.reference.com/article/butterflies-preserved-framing-3f0f3583b88fe69e
The proper method of preserving butterflies for framing varies depending on whether the insects are captured live or dead: most are frozen or placed in preservative chemicals or paper envelopes. Some techniques for preserving butterflies are more complex than others. The ideal method of preservation
www.reference.com/article/big-butterfly-b3fb3e3ba579801f
A butterfly's wingspan can range from a 1/2 inch to 1 foot in length from the tip of one wing to the tip of the other. The blue pygmy butterfly, which is native to California, is the smallest species, while the Queen Alexandra's birdwing is the largest.
www.reference.com/article/butterflies-ae324f7d8fd0682d
A butterfly is an insect that has four wings covered with tiny, colorful scales. It typically holds its wings erect when it is at rest. Butterflies have clubbed or dilated antennae and are usually active during the day.
www.reference.com/pets-animals/butterflies-live-f85233325804b746
Butterflies live all over the world, except in Antarctica and the harshest deserts. Many butterflies live in tropical climates like those found in Hawaii and Mexico.
www.reference.com/pets-animals/different-types-butterflies-c07115fa43011ec3
According to The Children's Butterfly Site, there are approximately 12,000 to 15,000 species of butterflies in the world, and scientists believe there are thousands of species that have not yet been found. According to The Butterfly Website, the most common butterfly is the Cabbage White while the r
www.reference.com/article/butterfly-move-866ac6a6c0f49e98
According to the San Diego Zoo, butterflies fly by moving their wings in a figure-eight motion. The wings of a butterfly are made of a thin layer of protein called "chitin." This is the same protein that makes up the butterfly's outer-body shell. Butterflies also have a complex system of veins that
www.reference.com/article/eats-butterflies-349be17371fa9c86
Lizards, snakes and toads are a few animals that eat butterflies, according to the TheButterflySite. Frogs eat butterflies as well, and monkeys and rats are two animals in the mammal category that consume butterflies. Humans also eat butterflies as a delicacy in Africa, Southeast Asia and Mexico. Bu
www.reference.com/article/butterflies-represent-fbdf21e477552cc4
Butterflies usually represent metamorphosis and good luck. In Christian art, they are often a symbol of resurrection. Large swarms of butterflies are a bad omen in Japanese culture, and individual butterflies are a good omen. | https://www.reference.com/web?q=preserved+butterflies+for+sale&qo=contentPageRelatedSearch&o=600605&l=dir&sga=1 |
Ms. Chairperson,
Excellencies,
Ladies and Gentlemen,
It is a pleasure to be here today. I am honoured to speak to you in my capacity as Secretary-General of the United Nations Conference on Sustainable Development (Rio+20).
I thank the Chairperson, Ambassador Harun (Malaysia) for inviting me.
Almost twenty years after Rio 1992, the obstacles to implementing sustainable development are daunting. The financial, food, and fuel crises and the effects of climate change make these obstacles even more apparent.
But we here are fortunate. Because we have the opportunity to help make sustainable development a reality.
Today, I will make some general observations about Rio+20 and green economies. I will also share some thoughts on relevant links between the work carried out by this Committee and the objective and themes of the Conference. Finally, I will close with information about Rio+20 preparations.
Let’s start with some general information on the Conference and green economies. What is the Conference supposed to accomplish?
The General Assembly resolution identified three objectives for Rio +20:
The two themes are: a green economy in the context of sustainable development and poverty eradication and the institutional framework for sustainable development.
In the first two Preparatory Committee meetings and the first informal Intersessional meeting, Member States expressed concerns regarding green economies.
They want to know what a green economy actually looks like. What are the implications for development prospects? For trade? And for the competitiveness of different countries?
We all know that a green economy will have to be built from the bottom up in each country. It will depend on national characteristics, endowments and priorities.
Countries will look to the UN system, however, for guidance on the kinds of policies they can adopt to move along a green development path.
So, one thing that member States are likely to want at Rio+20 is a “menu of policy options” for a green economy.
Some countries refer to a roadmap with milestones and indicators of progress at different levels – national, regional and international.
If green economy is to prove a useful concept to member States, it must help them accelerate progress towards sustainable development. A green economy should identify more synergies than trade-offs between environment and development. Ideally, it can help build dynamic new growth sectors around green technologies low-carbon energy and sustainable agriculture and fisheries.
Many of the activities involved in building green economies are relatively labor-intensive. Therefore, a green economy should offer employment options. It should also open up new export opportunities in green products and services.
This transition will mean structural changes. And this may be challenging. In particular, commodity exporters, especially but not only fossil fuel exporters, will feel an impact. Naturally, these countries are concerned about adapting to a new situation. They will need to develop new industries and help their populations adjust.
Green economy will force change. But change is constant. Countries must always be prepared to adapt to changes in market demand and changes in technology. Resilient and flexible economies successfully adapt.
The scale and speed of the changes may be bigger and faster than in past technological revolutions. If so, international cooperation will be even more important to ease the transition for those whose jobs and incomes might suffer.
Green economies are in everyone’s best interest. We have no choice if we are going to raise living standards and advance human development on a finite planet.
Therefore, the journey from Rio+20 will be a common journey. It will involve all of us taking a green economy path to sustainable development. On this path our economic activities don’t destroy the environment.
Being on a common journey means we must find new ways to cooperate in the international community. And as it is about the economy – a green economy, we must find new forms of economic cooperation.
Countries are asking what international institutions - such as those supporting trade and development assistance, including in the UN system - can do to facilitate an equitable transition to a green economy.
Ladies and Gentlemen,
We know how important trade has been to global economic growth over the past few decades. We know how central it is to some of the most dynamic economies in the world today. Among other benefits, trade has contributed to the most massive assault on poverty in human history.
Trade is what greases the wheels of the global economy. It raises welfare of both producers and consumers – through higher wages and lower prices. And it also facilitates the transfer of technology.
Much technology crosses borders embodied in machinery in wind turbines in solar panels in biofuels and hybrid vehicles. Without trade, these technologies would be much more expensive than they are. They would also be much less accessible.
The question we ask ourselves today is how to ensure that trade greases the wheels of a green economy. Right now, one concern is that a green economy might become an additional impediment in trade relations.
This is not necessary. We need an open multilateral trade regime with enhanced market access for developing countries. It is crucial both for accelerating their development and for ensuring the sustainability of that development.
The costs of green technologies, like renewable energy, are being driven down, in no small measure by large-scale production for a global market. Consider as for example - solar photovoltaic panels and wind turbines. Trade benefits suppliers of green technologies with a larger market. And it benefits buyers with lower prices.
Nevertheless, there will be structural changes in economies and this creates concerns. However, the process of economic development itself involves structural changes. It is inevitable.
Developing economies move from agricultural dependence towards growing industrial capacity. Then services become the predominant sector at high levels of development.
Some sectors grow, others shrink; jobs are created, jobs are destroyed. But incomes and living standards rise sustainably with overall productivity.
In the same way, a green economy transition will involve changes. The important thing is that those changes promote economic diversification. This will yield sustainable improvements in well-being for all, now as well as in the future.
What is clear is that an open and fair multilateral trade system is an integral part of an international sustainable development architecture. Discussions of how to promote a green economy need to continue within that framework.
Only by addressing the concerns of all countries can Rio+20 succeed in reaching agreement and producing a shared and actionable outcome.
You might recall that last October UN-DESA and UNCTAD organized an ad hoc expert group meeting on the green economy here in Geneva. It identified fundamental steps towards a feasible transition for industrialized economies:
This coming fall, another meeting focusing on trade and the green economy will be organized by UNCTAD in collaboration with my Department. The aim will be to assist countries in gaining further clarity on these issues.
Ladies and Gentlemen,
With less than one year to go, we are now firmly on the road to Rio+20. I hope the international community, including bodies such as this Committee, consider how the international trading system can assist countries who choose a green economy path.
Beyond the principles we already have, what else is there? What other agreements are needed? What trade-related instruments should we design and implement?
You know better than I do that the current WTO rules do not provide sufficient clarity. There is no multilateral consensus on what constitutes acceptable pra
ctice, for example, with respect to “green subsidies”.
Without guidance, it is likely that green-related disputes will be referred to the WTO’s dispute settlement mechanism. This could risk undercutting the multilateral trading system.
I hope that all of us – but especially those with trade expertise -- focus on these hard questions and make progress in answering them in coming months.
Now let me share a brief overview of preparations for Rio+20.
There are 333 days to go, and much will happen during this time.
National preparations are underway, including through the coordinated assistance of DESA and UNDP. These two organizations are assisting up to 60 developing countries prepare for the event.
Countries are also holding intersessional meetings:
Sub-regional consultations are under way, including three SIDS specific ones. These will culminate in five Regional Preparatory Meetings coordinated by the UN Regional Commissions. These will be organized in collaboration with the UN system and IFIs at the regional levels.
Later today, I will be meeting with the Principals of UN specialized agencies, funds and programmes, including Mr. Lamy. We are meeting as part of the ongoing inter-agency collaborative process I set up over a year ago (through the expanded membership of the Executive Committee on Economic and Social Affairs).
Furthermore, the Environment Management Group as well as the UN Development Group are contributing to preparations within their respective mandates. To establish synergies, I meet with the two co-chairs of those inter-agency mechanisms in a Troika format.
Currently the UN system is producing a study pertaining to strengthening the institutional framework for sustainable development (IFSD). The assessment is expected to contribute to the discussions of Member States and other stakeholders in preparation for Rio+20.
Major groups (as civil society is defined by Agenda 21) are also actively engaged in preparations. They include NGOs, businesses, farmers and others. These major groups are expected to forge coalitions and work with governments to advance sustainable development.
The next important deadline for all stakeholders is 1 November. By this date, we expect to receive all inputs to a compilation document that will form the basis for the “zero draft”.
Informal negotiations will start in January 2012. They will culminate in the last PrepCom meeting to be held in Rio the week prior to the Conference.
The next 333 days will move quickly. The United Nations counts on input from all of you to make the Rio+20 conference a success.
In 1992, the Earth Summit first identified linkages between trade, environment and development.
Let’s now, with our 20 years of experience, assess how trade can support the transition to green economies.
Thank you. | https://www.un.org/en/desa/briefing-wto-committee-trade-and-environment |
TECHNICAL FIELD
BACKGROUND
THE INVENTION
EXAMPLE
Preparation of Sodium DiphenylPhosphide
Preparation of Neomenthyldiphenylphosphine
This invention relates to an efficacious process for producing cycloalkyldiarylphosphines from triarylphosphines.
J. Org. Chem.
1974
Cycloalkyldiarylphosphines constitute a group of chemical products of considerable usefulness as ligands for making noble metal catalysts. Menthyldiphenylphosphine and neomenthyldiphenylphosphine are examples of ligands which impart to transition metal complexes the potential for diastereomeric interactions with unsaturated organic substrates, thus making asymmetric synthesis possible. Note in this connection, J. D. Morrison and W. F. Masler, , , Vol. 39, No. 2, pages 270-272. Neomenthyldiphenylphosphine is of particular importance for the preparation of noble metal catalysts useful in the synthesis of certain pharmaceuticals such as naproxen, ketoprofen, and ibuprofen.
J. Org. Chem.
1962,
A known method of generating tertiary phosphines with two aryl groups and a dissimilar third hydrocarbyl group involves coupling a lithium diaryl phosphide with a halohydrocarbon such as benzyl chloride in an ether such as tetrahydrofuran. See A. M. Aguiar, J. Beisler and A. Mills, , Vol. 27, pages 1001-1005. Because the reaction co-produces a reactive aryl lithium coproduct which can complicate synthesis procedures, the authors (Aguiar et al.) developed a method of selectively eliminating this coproduct. They accomplished this by adding to the reaction mass an equivalent amount of tert-butyl chloride to selectively react with the aryl lithium so that isobutylene, aromatic hydrocarbon and lithium chloride are formed. Nevertheless an extra reactant and a concurrent reaction were involved in this approach.
Another complicating factor in the reaction of lithium diaryl phosphide with a halohydrocarbon in tetrahydrofuran is that one or more components in the system tend to interact with the tetrahydrofuran whereby side reactions such as ring cleavage can occur under the conditions used. In addition, the reaction between lithium diaryl phosphide and menthyl chloride is slow and requires prolonged reaction periods, which in turn favors the opportunity for more adverse interaction with the cyclic ether solvent such as ring cleavage to occur.
1
2
3
1
2
3
a) reacting a triarylphosphine with metallic sodium or a mixture or alloy of sodium and potassium, in tetrahydrofuran or a liquid alkyl-substituted tetrahydrofuran, in proportions such that a solution of (1) sodium diarylphosphide or or a mixture of sodium diarylphosphide and potassium diarylphosphide, and (2) sodium arylate or, a mixture of sodium arylate and potassium arylate, is formed; and
1
2
3
b) reacting (3) at least a portion of the sodium diarylphosphide or mixture of sodium diarylphosphide and potassium diarylphosphide, while in solution along with at least a portion of the sodium arylate or mixture of sodium arylate and potassium arylate, with (4) at least one mono- or polyalkyl-substituted 1-chlorocycloalkane having a single 5- to 8-membered ring which is substituted in one of the ortho positions relative to the chloro-substituted carbon atom by a linear or branched alkyl group having up to about 12 carbon atoms, to form a phosphine of said formula RRRP.
The invention specifically provides a process of forming a phosphine of the formula RRRP, wherein R and R are the same or different aryl groups, wherein R is a mono- or polyalkyl-substituted cycloalkyl group having from 5 to 8 carbon atoms in the ring and having one of the ortho positions occupied by a linear or branched alkyl group having up to about 12 carbon atoms, which process comprises:
It has now been found that by reacting certain partially sterically-hindered chloro-substituted cycloalkanes (cycloalkyl chlorides) with sodium and/or potassium diarylphosphides, not only are useful cycloalkyldiarylphosphines produced, but in addition the chloro-substituted cycloalkane does not undergo any appreciable reaction with the coproduced aryl sodium and/or aryl potassium as it is formed. Moreover, the process of this invention makes it possible to avoid or at least to greatly reduce interaction with or cleavage of cyclic ether reaction media such as tetrahydrofuran. Thus this invention makes possible improvements both in yield and quality of the cycloalkyldiarylphosphine product.
1
2
3
⊕ ⊖
1
2
3
1
2
3
In one of its embodiments this invention provides a process of forming a phosphine of the formula RRRP, which process comprises reacting an alkali metal diarylphosphide of the formula MPRR with an alkyl-substituted monochlorocycloalkane of the formula RCl in a liquid ether reaction medium in which said phosphide is soluble such that said phosphine is formed, wherein R and R are the same or different aryl groups, wherein R is a mono- or polyalkyl-substituted cycloalkyl group having from 5 to 8 carbon atoms in the ring and where a linear or branched alkyl group of up to 12 carbon atoms is substituted on one of the ortho positions of the ring, and wherein M is a sodium or potassium atom, or a combination of sodium and potassium atoms. By "soluble" is meant that the reactant is capable of dissolving in the ether reaction medium at the reaction temperature being employed, at least to the extent necessary to enable the reaction to proceed at a reasonable reaction rate. The term does not imply that the reactant must be soluble in all proportions, but in general the greater its solubility in the ether reaction medium, the better.
Other embodiments and features of this invention will be still further apparent from the ensuing description and appended claims.
⊕⊖
1
2
1
2
The alkali metal diarylphosphide used in the process can be represented by the formula
MPRR
where R and R are the same or different aryl groups, which typically contain up to 24 carbon atoms each, and M is a sodium or potassium atom. The aryl groups may have a single ring or a plurality of rings, and include phenyl, 1-naphthyl, 2-naphthyl, 2-biphenylyl, 3-biphenylyl, 4-biphenylyl, acenaphthyl, phenanthryl, tetrahydronaphthyl, and like aromatic groups. The aryl groups can be substituted or unsubstituted, and when substituted can contain one or more substituents inert to the alkali metals, such as one or more: alkyl groups, alkenyl groups, hydrocarbyloxy groups, hydrocarbylthio groups, hydrocarbylcarbonyl groups, hydrocarbyloxyhydrocarbyl groups, dihydrocarbylamino groups, and heteroaromatic groups, and combinations of two or more of these. Preferably, the aryl groups are phenyl groups each of which is either unsubstituted or has up to 3 alkyl substituents having up to 4 carbon atoms each. Phosphides in which the two aryl groups are the same are preferred, and most preferred are sodium diphenylphosphide and potassium diphenylphosphide.
3
3
The alkyl-substituted monochlorocycloalkane, also known as an alkyl-substituted cycloalkyl chloride, can be represented by the formula
RCl
where R is a mono- or polyalkyl-substituted cycloalkyl group preferably having from 5 to 8 carbon atoms in the ring and where a linear or branched alkyl group of up to 12 carbon atoms is substituted on one of the ortho positions of the ring. In addition to this required ortho-alkyl substitution, the ring may contain other substituents which are innocuous in the sense that they will not impair or inhibit the desired reaction. While such additional substituents can be in any positions which do not unduly sterically hinder the chlorine atom, such substituents are preferably in the meta or para positions relative to the chlorine substitution. Examples of such innocuous substituents include alkyl groups, alkenyl groups, hydrocarbyloxy groups, hydrocarbylthio groups, hydrocarbylcarbonyl groups, hydrocarbyloxyhydrocarbyl groups, and heteroaromatic groups, dihydrocarbylamino groups, and combinations of two or more of these. Typically in the practice of this invention, this reactant will contain a total of up to 24 carbon atoms, and preferably up to 18 carbon atoms, in the molecule. As regards ring size, most preferably the ring is a 6-membered ring. The ortho-alkyl substituent is preferably a secondary alkyl group which most preferably contains up to 6 carbon atoms. A particularly preferred reactant is menthyl chloride.
Any ether reaction medium in which the sodium diarylphosphide and/or potassium diarylphosphide and the alkyl-substituted cycloalkyl monochloride reactants are soluble and that exists in the liquid state under the reaction conditions being used is suitable for use in the conduct of this reaction. The ethers may be monoethers or polyethers, they may be saturated or unsaturated, and they may be cyclic or acyclic, but in any case should be free of any functionality that would interfere with or inhibit the desired reaction. Examples of polyethers include 1,2-dimethoxyethane, diglyme, 1,4-dioxane, tetrahydrofurfuryl ethyl ether, tetrahydrofurfuryl n-butyl ether, and similar polyethers. Preferably, the ether is one or more saturated hydrocarbyl monoethers, or one or more a hydrocarbyl monoethers having at least one aromatic group in the molecule. Examples include dialkyl ethers, dicycloalkylethers, diaryl ethers, monoalkylmonoaryl ethers, monocycloalkylmonoaryl ethers, monoalkylmonocycloalkyl ethers, and saturated cyclic monoethers, or mixtures of any of these. Particularly preferred are tetrahydrofuran and alkyl-substituted tetrahydrofurans.
Other co-solvents or diluents may also be present in the reaction medium, such as one or more liquid paraffinic, cycloparaffinic and/or aromatic hydrocarbons. When utilized as co-solvents, preferred hydrocarbons are the liquid aromatic hydrocarbons such as benzene, toluene, xylenes, ethyl benzene, or tetrahydronaphthalene. The mixed reaction media should contain by volume, a major amount (>50%) of the ether(s) and a minor amount (<50%) of the co-solvent(s).
The conditions for the reaction between the sodium diarylphosphide and/or potassium diarylphosphide and the alkyl-substituted cycloalkyl monochloride need not be severe. Temperatures in the range of 40° and 120°C will normally suffice. A preferred range is from 60° to 100°C. The reaction is preferably performed at atmospheric pressure, although this is not essential. For example, if using an ether that has a boiling point below the reaction temperature selected for use, the reaction should be performed under super-atmospheric pressure sufficient to keep the ether in the liquid state. Likewise reduced pressure can be employed under suitable circumstances (e.g., use of a high boiling ether reaction medium.) With a tetrahydrofuran reaction medium, reflux temperatures at atmospheric pressure is a desirable way to conduct the reaction. Proportions are not critical, but usually will be relatively close to equimolar, e.g., from 0.8 to 1.5 mols of the alkyl-substituted cycloalkyl monochloride per mol of the sodium and/or potassium diarylphosphide. The reaction should be conducted under a dry inert atmosphere.
In one embodiment of this invention, the sodium diarylphosphide and/or potassium diarylphosphide reactant is formed by cleaving a triaryl phosphine with sodium or potassium or a mixture or alloy of sodium and potassium in a tetrahydrofuran or a liquid alkyl-substituted tetrahydrofuran reaction medium, and all or at least a portion of the resultant reaction mass and the partially sterically-hindered cycloalkyl chloride are mixed with each other and heated to cause formation of the cycloalkyldiarylphosphine. In this embodiment the two reactions are carried out sequentially preferably without replacing the reaction medium used in the initial triarylphosphine cleavage reaction. However, additional solvent may be added in the second reaction and, alternatively, the solvent used in the initial reaction can be replaced in whole or in part by fresh solvent for the second reaction, if desired. The temperature used in the initial triaryl phosphine cleavage reaction is typically below 100°C, and the reaction often can be conducted at the reflux temperature of the lower boiling ether solvents used. Thus with tetrahydrofuran and sodium, the initial cleavage reaction is preferably conducted at or near reflux temperatures of 65-68°C. When potassium is used in the triaryl phosphine cleavage reaction, lower temperatures are usually employed, such as ambient room temperatures (e.g., 20-25°C).
1
2
3
1
3
1
2
3
Thus this invention provides as one of its embodiments a two-stage process of forming a phosphine of the formula RRRP, wherein R and R are the same or different aryl groups, wherein R is a mono- or polyalkyl-substituted cycloalkyl group having from 5 to 8 carbon atoms in the ring and having one of the ortho positions occupied by a linear or branched alkyl group having up to 12 carbon atoms. This process comprises as the first stage reacting a triarylphosphine with metallic sodium or potassium. or a mixture or alloy thereof, in a liquid tetrahydrofuran or alkyl-substituted tetrahydrofuran reaction medium in which the phosphine is soluble, in proportions such that a solution of (1) sodium diarylphosphide or potassium diarylphosphide. or a mixture thereof, and (2) sodium arylate or potassium arylate, or a mixture thereof, is formed. In the second stage at least a portion of the sodium diarylphosphide or potassium diarylphosphide, or mixture thereof, while in solution along with at least a portion of the sodium arylate or potassium arylate, or mixture thereof, is reacted with at least one mono- or polyalkyl-substituted 1-chlorocycloalkane having a single 5- to 8-membered ring which is substituted in one of the ortho positions relative to the chloro-substituted carbon atom by a linear or branched alkyl group having up to 12 carbon atoms, to form a phosphine of the above formula RRRP.
As noted above, the ether reaction media used in the various embodiments of this invention are composed predominately of one or more ethers, that is, over 50% by volume is one or more ethers, and the balance, if any, is composed of one or more anhydrous liquid inert solvents such as ketones, esters, tertiary amines, and/or hydrocarbons. Of these, liquid hydrocarbons, especially saturated aliphatic hydrocarbons, saturated cycloaliphatic hydrocarbons, or aromatic hydrocarbons, or mixtures of such hydrocarbons are preferred. The most preferred co-solvents are the liquid aromatic hydrocarbons. As a general proposition, the higher the volume percentage of the ether(s) in the reaction medium, the better. Most preferably, therefore, substantially the entire reaction medium is composed of one or more ethers.
The following example is presented for the purposes of illustration and not limitation.
A solution of triphenylphosphine (20 grams, 0.0762 mol) in dry tetrahydrofuran (THF) (200 mL) is refluxed with freshly cut sodium (7 grams, 0.305 mol) under a nitrogen atmosphere for 15-20 hours. Sodium diphenylphosphide (NaDPP) is formed as a red solution which is decanted into the next reaction without further purification. In a reaction performed in this manner, the conversion to NaDPP was >97%.
The NaDPP solution is placed in a flame dried flask. To this is added 15.96 grams (0.0914 mol) of menthyl chloride, and the mixture is heated to reflux. After 40 hours at refluxing temperature, the reaction mass is cooled to room temperature and quenched with water. The organic layer is separated and distilled to remove the solvents. The crude product is then dissolved in refluxing anhydrous methanol and cooled to obtain neomenthyl diphenyl phosphine (NMDPP) as white crystals. In a run performed in this manner without optimization, the recovered yield of NMDPP was 60%.
Formulas are used herein for the purpose of clarification and to facilitate discussion. In this connection, it is to be understood and appreciated that the formula given for the alkali metal diarylphosphides, although depicted in ionic format, should not be construed as requiring ionization of the alkali metal diarylphosphides at any time during the conduct of the process. Rather, it is intended that the alkali metal diarylphosphides, and indeed the other specified reactants, are in whatever chemical form they assume or acquire when brought together in the solvent or reaction media and when under the conditions specified for the particular reaction. | |
What Is It Like Dating a Doctor?
Things to know before dating a doctor. So, you meet a doctor, you like each other, and you decide to go on a date. That’s great, right? You might even feel like you’ve hit the jackpot! Well, before you start jumping for joy, there are some things you should know about being in a relationship with a doctor. Like anyone else with a high-demand profession, there are some ups and downs when it comes to dating them.
In this article, you’ll learn what it’s like to date a doctor, male or female. However, these will be generalizations, because as you know, no two people are alike. There are hundreds of medical specialties and subspecialties. Not to mention, every personality is different.
What to Expect if You Decide to Date a Doctor
The purpose of this article isn’t to help you snag a doctor. It’s to help you know what you're getting yourself into—the good, the bad, the beautiful, and the ugly. Doctors have complex lives and sometimes deal with situations others cannot imagine. Let’s delve in!
1. Doctors are compassionate
Usually, someone becomes a doctor because they care about helping people. In medical school, they learn to be good listeners and communicators because that’s what it takes to be a good doctor. They realize that their patients care less about how many papers they’ve published and more about their compassion. It’s that empathy that also makes them great to be in a relationship with.
2. Doctors are busy bees
While some physicians work fairly normal hours, most work crazy long shifts — usually between 40 and 60 hours or more. If that’s not something you’re into, try to avoid doctors and specialists in these 10 fields:
- Urology;
- Neurological surgery;
- Obstetrics and gynecology;
- General surgery;
- Medical oncology;
- Pulmonary diseases;
- Thoracic surgery;
- Neonatal and perinatal medicine;
- Critical care internal medicine;
- Vascular surgery.
Before going on that second or third date, you might want to ask what their schedule looks like before taking things any further.
3. Doctors are stressed
Not all the time, but if they’ve just worked a 60-hour shift, don’t expect them to arrive at dinner lively and cheerful. Saving people and seeing death first-hand on a weekly or even daily basis takes a toll on people’s mental state.
That’s not to say your boyfriend or girlfriend will come home stressed every day, but there will be worse days than others. Expect to be there for them and have some patience. They may appear strong and indestructible, but behind that facade, they’re just as human as you!
4. Doctors don’t have time to plan
If you aren’t someone that likes to plan dinners, trips, and activities, you probably should avoid dating a doctor. They don’t have time for all that because they’re busy working long hours and worrying about their patients.
That’s not to say they care about their job more than you. However, it will always come first. But just because you don’t like planning now doesn’t mean you won’t come to enjoy it. Maybe just give it some time.
5. Doctors are exhausted
The physical part of their job certainly takes a toll, but it’s the emotional side that makes them so tired when they finally get home. Maybe you have the energy to hit the town and go out for a nice meal at a restaurant. But they might have been dreaming all day of a homecooked meal waiting for them when they get home.
Dating a doctor means you’re always paying attention and being aware of their schedule and feelings. And while you might be thinking that’s the same for all relationships, it’s much more extreme with doctors.
6. Doctors appreciate their free time
Between work and sleep, doctors don’t have much free time. But when they do, they take advantage of it. That means more weekend trips, date nights whenever possible, and time with family. In most cases, you won’t find a doctor that likes to lounge around the house. They’ll be ready to go and would love for you to tag along. In a way, every moment is sweeter with a doctor because they have to take advantage of those rare moments.
7. Doctors are in great shape
Some doctors don’t take care of themselves as much as they should. But for the most part, doctors take care of their bodies because they know the ins and outs of the body. Diet, sleep, nutrition—they know what it takes to live better and more healthily. They also understand that people judge them on their appearance. Wouldn’t you trust a doctor that takes care of themselves to take care of you?
The Bottom Line
Don’t expect everything to be sunshine and rainbows when dating a doctor. Like anything in life, you have to take the good with the bad. But there’s one thing for certain, you can do worse! They might be stressed, tired, and busy all the time, but they’re also compassionate people that like to be active and make those special moments together romantic. That doesn’t sound like such a bad thing!
Did you like this blog post? Stay tuned for more awesome content, updates, and new info.
FAQ
Are doctors hard to date?
No, but you should know a few things before dating one. First, they often have irregular hours. Second, they sometimes deal with difficult patients or emotionally charged situations. Finally, they may not have much time for leisure activities or hobbies outside work.
How do you flirt with a doctor?
The best way to flirt with a doctor is to be confident, funny, and respectful. Compliment their intelligence and professional achievements.
What is it like to marry a doctor?
Marrying a doctor can be very rewarding. Doctors are often highly respected in their communities and make great partners. They are also usually good with finances and can provide a comfortable lifestyle.
At what age do doctors get married?
There is no definitive answer, as doctors can marry at any age. However, it is worth noting that the average age of first marriage for doctors is 34. This is slightly older than the average for all Americans, 32.
Do doctors have emotional feelings for patients?
Yes, doctors can have emotional feelings for patients. It is not uncommon for doctors to develop strong bonds with their patients. However, they must remember to maintain a professional relationship and not let their emotions get in the way of providing quality care.
How do you attract doctors?
There is no one surefire way to attract doctors. However, being intelligent, successful, and respectful are always good qualities. | https://lovezoid.com/what-is-it-like-dating-a-doctor/ |
The following Topics and Sub-Topics are covered in this chapter and are available on MSVgo:
Introduction
Organic compounds are broadly classified into two categories, namely acyclic and cyclic compounds. The cyclic compounds are compounds that contain closed rings. E.g., benzene, phenolphthalein, cyclopropane, etc. Acyclic compounds are single-chain or branched-chain compounds where a linear branch arises from a root chain. These compounds are simple in stereochemistry, and some of the examples include- ethane, isobutene, acetic acid, and more.
Acetic acid is a common household name of a daily use compound. According to the nomenclature of organic compounds, it is called ethanoic acid. Those types of nomenclature of organic compounds are made by the IUPAC, which is the standard union of chemistry.
The IUPAC follows a standard rule for deriving the structure’s name by taking the compound structure, and those sets of rules are essential for finding the nomenclature of organic compounds. Bear in mind that the common name is not always the same as the IUPAC name of the compound. IUPAC rules for naming the only alkane are as follows.
- Longest chain rule
- The chain containing the longest branch is regarded as the parent chain and would be used for numbering..
- Sometimes you may find two or more chains with equal length. In that case you should choose the root chain as the one containing the maximum number of substituents in it.
- Lowest number rule
- You need to number the chains in such a way that the nearest point of branching should get the lowest number when counted from the end. The numbers are called the locants.
- Make sure that the sum of the locants is always minimum.
- Identify the substituents
- Give a number to each substituent on the chain.
- When you come across two substituents on the same locant, give them the same number.
- Make sure that the numbers and number of substituents should be the same.
- Write the name as a single word.
- Use hyphens to separate the substituents and groups and use commas to separate the numbers.
- Write in alphabetical order if two or more substituents are present.
- Use di, tri, tetra etc to represent the number of the same substituent in the structure.
- If you get across a locant position where two substituents are present equivalently from both ends, then you should opt for the alkyl group that comes first in the alphabetical order. It should get the lowest number.
Let’s look at the basic concepts of isomerism.
Any compound can have the same molecular formula yet behave differently in the presence of varied physical and chemical conditions. This property is known as isomerism and can be intuitively understood as you can change the positions of the elements/ compounds in the molecule’s organic structure. Hence it changes the properties.
In organic chemistry, reaction mechanisms refer to the all the constituent steps that comprise a reaction and which shed on all the relevant details including the movement of the electron, the formation of the bond, the energetics involved during the cleaving of the bond and eventually the the overall kinetics of the reactants and the products. Any reaction happens due to electrons’ movement and can be accounted for through the change in the system’s energy. Some basic mechanisms include:
- Nucleophilic substitution
- Electrophilic substitution
- Free radical movement
The organic reaction mechanism is an important topic that helps us understand the methods of purification of organic compounds. You will hear some of the frequently used purification processes such as sublimation, crystallisation, distillation, fractional distillation and many more in this organic chemistry topic. Organic compounds are treated with a mixture of different compounds to selectively favor any particular compound extraction.
Qualitative analysis analyzes the compound present in a given mixture. For example, if a compound is taken, the QA would be focused on finding the elements & the ions present in the given compound rather than studying how much they are present. Example:
Detection of Carbon and Hydrogen
- Test for Phosphorus
Na3PO4 + 3HNO3 → H3PO4 + 3NaNO3
H3PO4 + 12(NH4)2MoO4 + 21HNO3 → (NH4)3PO4.12MoO3 + 21NH4NO3 + 12H2O
Quantitative analysis focuses on finding out how much of the elements are present.
- What is the basic of organic chemistry?
“Organic” is generally associated with the word with organic foods and products. Still, in the sciences, organic chemistry is referred to as the study of carbon compounds. Organic chemistry emphasizes the structure, properties, and applications of various carbon-containing particles that make up imperative biological molecules such as proteins, enzymes, carbohydrates, lipids, nucleic acids, and vitamins.
- What are the basic principles of chemistry?
We can understand chemical bonds in terms of electron sharing and electron transfer between atoms. The resulting ions and molecules are the basis for every substance. Much of chemistry depends on the electronic structure of the atom’s outer valence shell.
- What are the steps to learn organic chemistry?
o To start, any topic answers the question of what, why, and how. For example, what is an aromatic compound? How aromatic compounds formed. Why aromatic compounds are aromatic.
o Then, read the chemical reaction and play with them like your friends.
o Repeat and write on the paper.
o Revise before sleeping.
o When you are in bed, memorize everything.
o Prepare notes and revise them in weekly periods.
o Start creating a chemical reaction.
o Write from one carbon and hydrogen.
- What are the 4 main organic compounds?
There are essentially 4 classes of molecules that make up the cells of living organisms.
1)Carbs; saccharides (sugars) and polysaccharides (complex carbs)
2)Lipids; fats and oils, cholesterol, and most other steroids are derivatives of cholesterol
3)Proteins; amino acids, polypeptides, and enzymes
4)Nucleic acids; DNA & RNAs.
- What are the three main categories of organic compounds?
The three main categories of organic compounds are carbohydrates & lipids, proteins, and nucleic acids.
Organic Chemistry: Some Basic Principles And Techniques marks the organic chemistry field’s starting in the NCERT chemistry book. From JEE and boards perspective, organic chemistry covers a major chunk of the chemistry syllabus. On MSVgo, you can check on some of the fundamental concepts in organic reaction mechanisms with NCERT examples. | https://stage-web.msvgo.com/cbse/ncert-solutions-class-11-chemistry-organic-chemistry-some-basic-principles-and-techniques |
Blane Klemek column: Minnesota: Home of many squirrels
When most of us think of squirrels, we probably think of tree squirrels. But the fact is that not all squirrels live in trees. Minnesota is home to a passel of different kinds of squirrels. From chipmunks and woodchucks (ground squirrels) to red squirrels and gray squirrels (tree squirrels), the chances are good that one or more species lives near you.
First, squirrels are rodents. A common characteristic shared by all rodents includes a single pair of incisors, both above and below. These incisors are ever-growing and the reason why rodents must constantly gnaw on wood and other objects. If they didn't chew, their incisors would become unusable. Gnawing helps hone the edges of their chisel-like teeth.
Secondly, squirrels belong to the family Sciuridae. Members of this family include flying squirrels and other tree squirrels, and ground squirrels such as Franklin's ground squirrels, chipmunks, and thirteen-lined ground squirrels. In all, Minnesota has 11 species of sciurids scampering below, on, and above ground.
Nonetheless, with all the squirrels and squirrel-like critters that we Minnesotans have the opportunity to observe, when one thinks of squirrels most would agree that what we think of are those bushy tailed, tree loving varieties that are notorious birdseed robbers.
Occurring throughout most of Minnesota, gray squirrels are one of our most common tree squirrels. Typically gray in color, the gray squirrel is sometimes black. I remember that the woodlands of my childhood in Otter Tail County were filled with large numbers of gray squirrels that included a surprising proportion of black squirrels. Though some people believe that a black squirrel is a different species of squirrel, black squirrels are simply black phases of gray squirrels.
Squirrels are intelligent, agile, and curious mammals. And for those of us who feed wild birds and have tried to devise ways to keep the furry critters out of our birdfeeders, they can also be downright maddening. I have watched gray squirrels and their larger cousins, fox squirrels, and the smaller yet feistier red squirrels, raid my feeders time and time again. A few winters ago I counted as many as 15 gray squirrels and one red squirrel - all at once - hogging the feeders and filling their bellies with my expensive black-oil sunflower seed.
Aside from the obvious differences between the two groups of squirrels - ground squirrels versus tree squirrels - the primary difference is that one group of squirrels hibernates while the other group does not. Species of ground squirrels, for example, such as woodchucks, chipmunks, and Franklin's and Richardson's ground squirrels, all retreat to burrows underground to hibernate.
Meanwhile, the tree squirrels - gray, red, fox, and Minnesota's two species of flying squirrels, the southern and northern flying squirrels - are active throughout the year. Generally, the only times that tree squirrels are inactive are during moments of rest and during severe weather (northern flying squirrels are known to huddle together in tree cavities or bird houses to keep warm, sometimes as many as a dozen or more individuals!). Otherwise, tree squirrels are constantly busy looking for food, hiding food, stealing food, or eating food.
Contrary to a bird lover's belief, squirrels (chipmunks included), eat more than just birdseed. In fact, they spend a lot more time in the woods searching for and eating natural foods than they do stuffing themselves full at our birdfeeders (though it's sometimes hard to believe when you watch squirrels putting on layers of fat because of your protein-rich sunflower seeds and suet treats).
As such, squirrels, in order to survive, depend on mushrooms, fungus, nuts, seeds of all kinds including from spruce and pine cones, fruits and flowers, buds and catkins, inner bark from trees and shrubs, leaves of all types, green grass and other broad-leaf greens, and will also lick with relish the oozing sweet sap that often drips from surface gashes or from holes drilled by yellow-bellied sapsuckers on maple and birch trees. Squirrels also eat insects, eggs, and, believe it or not, young birds.
In a story that I've written about before, I once observed this shocking behavior many years ago. When I was a boy on the farm, I was alerted to a loud ruckus coming from a pair of blue jays flying in the oak treetops next to our house. I watched the pair of jays chasing a red squirrel through the canopies of several large oak trees.
The birds were calling wildly as they tried in vain to get the squirrel to drop a young blue jay from its jaws. Evidently, the red squirrel had just raided the blue jays' nest, stole a chick, and escaped into a tree cavity with its prey. I've also witnessed chipmunks steal bluebird chicks from bird houses and I've seen evidence of Richardson ground squirrels and gray and red squirrels raiding ducks nests (on-the-ground nests and nests inside wood duck houses) to steal, eat, and cache the eggs.
Nevertheless, squirrels are indeed a fascinating group of mammals. Save for the nocturnal flying squirrel, most members of the squirrel family are daytime creatures and are usually very visible for us to watch as they go about their activities.
From the graceful leaps of tree squirrels high in the branches of trees, to docile chipmunks feeding and stuffing their cheeks on our porches, to the curious postures of woodchucks standing on lookout from safe vantages in the fields, squirrels of many types and many sizes are sure to delight as we get out and enjoy the great outdoors. | http://www.bemidjipioneer.com/content/blane-klemek-column-minnesota-home-many-squirrels |
Anthropologists note that many peoples have some great flood legend. In his book, Eternity in Their Hearts, Don Richardson tells about the Santal people of southern India. Nineteenth-century missionaries were amazed by a legend about a holy couple who escaped destruction when the god Thakur Jiu sent a great flood to destroy wicked humanity. This remarkable account suggests possible residual memory of Noah and the flood.
Genesis 6 is actually the culmination of a long spiral into sin that begins with Abel’s murder (Gen. 4). Next we find the arrogant and evil Lamech, who is far worse than Cain. By the time we get to Genesis 6, unspeakable evil is taking place. We don’t really know who the Nephilim were, but clearly normal society was breaking down and people’s actions were perverse with evil results.
The Flood is both judgment and promise. We often think of Noah as only an ark builder, but Peter calls him a “preacher of righteousness” (2 Peter 2:5). With a hammer in one hand, Noah was also urging repentance. But most people refused to listen and, for them, the Flood was judgment. But for Noah and his family, the Flood provided a fresh start. In the midst of corruption and vio- lence, Noah and his family alone obeyed God. Hebrews 11:7 says that Noah became “heir of the righteousness that comes by faith.”
After the Flood, Noah and his sons built an altar to the Lord (Gen. 8:20). Genesis 9 records the gracious covenant that God made with Noah and future humanity, promising that never again would the flood waters cover the earth. As a covenant sign, God set His rainbow in the clouds (v. 13). Despite humanity’s depravity, God still intended restoration and redemption for His creation.
The Flood is actually one of three cycles of sin and judgment, and each is followed by a display of God’s grace. After the death of Abel, Seth is born (Gen. 4:25). After the Flood, God starts over with Noah and his family. Tomorrow, we’ll see that after the Tower of Babel, God calls Abraham.
Like the days before the Flood, many still live as if judgment will never come. Jesus used the example of Noah’s day to point out that people would be unprepared for the Son of Man’s return (Matt. 24:37–39). | https://www.todayintheword.org/issues/2004/12/devotions/3/ |
The first edition of the Paris Peace Forum will bring together States, international organizations, local governments, non-governmental organizations (NGOs) and foundations, companies, experts, journalists, trade unions, religious groups and citizens who seek to develop multilateral solutions for today’s challenges. Debates will be held in five formats – conversation, lab, brainstorm, fishbowl and launch – and address a range of issues, including: financing and implementing the SDG; the Global Pact for the Environment; food security; inequalities; gender equality; innovation in energy; and international mobility.
The Forum is organized by an NGO founded in 2018 by the Körber Foundation, the Mo Ibrahim Foundation, the Institut français des relations internationales, the Institut Montaigne, Sciences Po and the French Ministry for European and Foreign Affairs. The Forum is expected to convene annually. | http://sdg.iisd.org/events/paris-peace-forum/ |
PROBLEM TO BE SOLVED: To provide a game machine wherein the frequency for a notification of information regarding a winning lottery can be varied, the content of the game can be varied, and the game can be made more interesting; a program for the game machine; and a computer readable recording medium on which the program for the game machine is recorded.
SOLUTION: The game machine (10) is equipped with a notification device (66), a notification lottery means (160), and a notification lottery probability changing means (120). In this case, the notification device (66) notifies the information regarding the winning lottery of a winning lottery means (110). The notification lottery means (160) performs the lottery whether or not the notification for the information regarding the winning lottery by the winning lottery means (110) is performed by the notification device (66). The notification lottery probability changing means (120) changes the notification lottery probability in response to a winning character of the notification lottery means (160).
COPYRIGHT: (C)2003,JPO | |
Journey to Yes 13-18
As more Scots who voted No to independence reconsider their decision, we follow their journey to Yes and self-determination for Scotland.
Journey to Yes #13 - Pensioner and former paratrooper
James is a pensioner and former paratrooper who lives in Old Meldrum, Aberdeenshire. James voted No to independence and leave in the EU referendum but has completely changed his views on both. James discusses his disillusion with the UK Govt and their inept handling of constitutional issues, a famous relation and deeply unimpressive Scottish Tories and Labour.
Journey to Yes #14 - Farming
Hilary and Carey are organic farmers in South Lanark who voted No in 2014 and are now passionate Yes and SNP supporters. They are amongst 67,000 people directly employed in Scottish agriculture. The sector manages 80% of Scotland’s land mass and a further 360,000 jobs (1 in 10 of all Scottish jobs) are dependent on agriculture. Scotland’s farming community are in the frontline of damage done by the Brexit result and Hilary and Carey now face the possibility of losing their livelihood.
Hilary and Carey believed the Better Together campaign’s promises about staying in EU and now see belief in ourselves and the country we want to be as the way forward. Increasingly angered by Labour and the Conservative Government’s mishandling of the Brexit vote and aftermath they see a bleak future for farming under Tories who do not understand or care about Scottish farming but will use Brexit as licence to return devolved powers back to Westminster - a plan cynically implemented and rubber-stamped by Ruth Davidson and David Mundell. Hilary and Carey discuss the potentially devastating impact of exiting the EU with no long term plan could have on farming and how Scotland must seize self-determination to prevent a new wave of clearances.
Journey to Yes #15 - Simon Pia
Simon Pia is a Journalist & Consultant, Lecturer and former spin doctor to Scottish Labour including former leader Wendy Alexander, Iain Gray MSP and Gordon Brown. Simon has always believed home-rule or federalism to be solution to Scotland’s democratic deficit.
Torn over the independence question, Simon feels the Yes campaign’s economic argument was not strong or honest enough to sway him and the majority. Brexit now makes any offer of federalism or economic threats from the UK Government redundant. Simon believes more unites Scotland’s progressive parties than divides and a grand coalition may be a possible way forward.
Journey to Yes #16 - Richard Murphy, Economy
Richard says Yes. Richard Murphy is a political economist, author, chartered accountant and one of the world's leading thinkers on tax and how it can change society. He advises the Trades Union Congress on economics and taxation, and a long-standing member of the Tax Justice Network. Richard is Professor of Practice in International Political Economy at City University.
Just 10 years ago it was difficult to take the idea of Scottish independence seriously. Now Richard sees leaving the UK as the only way for Scotland to reach its full economic and human potential. In this special extended episode Richard discusses the economic forces powering the Yes movement, dismantles the case for GERS and looks at the key issues of currency, investment and taxation that must be addressed to win the independence argument. The prize is a better Scotland.
Journey to Yes #17 - Professor A.C. Grayling
Professor A.C. Grayling is Master of the New College of the Humanities, and a Supernumerary Fellow of St Anne's College, Oxford. Anthony has written and edited over thirty books on philosophy and other subjects. Anthony is a leading campaigner for human rights and Vice President of the British Humanist Association.
Journey to Yes #18 - Chris
17 year old Chris Wilson is rising star in the Scottish Liberal Democrats, and Central Scotland Youth Officer for the party.
Chris's home town of Motherwell was devastated by the Conservative's deindustrialisation policies under Margaret Thatcher and John Major in the eighties and nineties. There has been lasting legacy on the town but this also inspired Chris to get involved in politics.
A promise of a more federal UK influenced Chris' decision to back No in 2014. The failure to deliver meaningful powers for Scotland and the Brexit vote convinced Chris that independence is now the only choice for Scotland. The Scottish Lib Dems now must resolve their support for the union and the EU. Chris believes the party is more divided over independence than appears and that, as the Tories' disastrous negotiations continue, support for Scottish self-determination and more autonomy from the UK party will grow. The Scottish Liberal Democrats can have a bright future in shaping Scotland as a successful independent nation on the global stage. | http://www.phantom-power-films.scot/journey-to-yes13-15.asp |
If you’ve heard the fairy tale of the princess and the pea, you know it’s about a very picky princess. She can feel a tiny pea under her bed, even though it’s under a stack of 20 mattresses and 20 poofy blankets. That’s how the prince knew she was a real princess. But what Bedtime Math fan Tanisha T. wants to know is, how many peas could we stuff into a whole mattress? We think the peas are used to being squashed, since they grow all jammed together inside a long, skinny green pod. They’re also really good for you: a serving of peas has more vitamin C than 2 apples. None of this sounds like good stuffing for a bed, by the way. But now that we know we can fit 3 peas per inch (see photo), let’s find out how many can fit under that prickly princess.
Wee ones: What shape is a pea?
Little kids: If you can fit 3 peas in a row, and then make 3 rows to fill a square inch, how many peas fit in that square? Bonus: If they came from just 2 pods, and each pod had at least 2 peas, how many ways could they have been split between the pods? (Don’t worry about the order of pods.)
Big kids: A cube that’s 1 inch wide in every direction can fit 3 layers of those 9-pea squares. How many peas fit in a cubic inch? Bonus: They say that British people eat 9,000 peas per year on average. If you ate 20 per day, would you be keeping up? (Hints if needed: A year has 365 days…and multiplying by 20 is like multiplying by 2 and then by 10.)
The sky’s the limit: If there are 3x3x3 peas in a cubic inch, and a mattress is 200 inches long, 50 inches wide, and 10 inches thick, how many peas can we fit after all?
Answers:
Wee ones: A circle, or in 3 dimensions, a “sphere.”
Little kids: 9 peas. Bonus: 3 ways: 2 and 7, 3 and 6, or 4 and 5.
Big kids: 27 peas. Bonus: Not quite: you would eat only 7,300 per year.
The sky’s the limit: 2,700,000 peas. The mattress has 200x50x10 cubic inches of space in it, or “volume,” which comes to 100,000 cubic inches. It can hold 27 peas in each of those little cubes, bringing us to almost 3 million peas!
And thank you Tanisha for this perfect-for-bedtime math question!
Laura Bilodeau Overdeck is founder and president of Bedtime Math Foundation. Her goal is to make math as playful for kids as it was for her when she was a child. Her mom had Laura baking before she could walk, and her dad had her using power tools at a very unsafe age, measuring lengths, widths and angles in the process. Armed with this early love of numbers, Laura went on to get a BA in astrophysics from Princeton University, and an MBA from the Wharton School of Business; she continues to star-gaze today. Laura’s other interests include her three lively children, chocolate, extreme vehicles, and Lego Mindstorms. | https://bedtimemath.org/fun-math-peas-in-a-mattress/ |
Slipknot’s Corey Taylor explained why it made sense for Tool to wait so long to release their music on streaming platforms.
The singer recently spoke to Rock Feed about what it’s like for artists to stream their music. Taylor discussed the difference in royalty pay in radio compared to on-demand media.
“We don’t have a problem with streaming,” the musician explained. “We don’t have a problem with people listening to our music. What we have a problem with is these streaming services basically treating it like we owe them.”
“There’s a reason that Tool waited as long as they did to put the stuff up on streaming services,” he insisted. “Because they knew they weren’t gonna be compensated for something that they worked their asses off for.”
Watch the interview below. | https://www.955klos.com/2019/08/20/corey-taylor-explains-why-tool-waited-to-stream-their-music/ |
The Coega Development Corporation (CDC) has begun work in clearing 54.62 hectares of land in Zone 1 of the Coega Industrial Development Zone (IDZ) in preparation for the biggest automotive investment in Africa in the last 40 years.
“We pride ourselves in our efficiency and high turnaround times when implementing complex and mega projects of this nature. Our modus operandi in placing the needs of investors first lies at the forefront of everything we do and has contributed significantly in the growth of the IDZ,” says Dr Ayanda Vilakazi, CDC unit head marketing & communications.
Progress on site has seen several milestones achieved in preparation for the handover of the site to BAIC for the construction of the 85000 sqm plant facility. Preparations for the BAIC factory are done in phases, with phase 1 comprising of Geotechnical investigations, Survey, Search & Rescue and lastly Bush Clearance.
“The CDC prides itself in ensuring that it creates a sustainable natural environment in the Coega IDZ. As part of our search and rescue programme the organisation rescued a total of 3485 Plant species from the BAIC site. Of the total, 903 plants were rehabilitated within the IDZ and 2582 plants were used in the landscaping of the new Zone 2 Customs Control Area (CCA) entrance,” says Andrea Shirley, CDC Environmental Project Manager.
Up to date, all the bush clearing activities have been completed having seen a sizeable number of SMME’s with specialized skills from the Eastern Cape benefiting from the bush clearing programme.
Small, Medium and Micro Enterprise Development
One of the CDC objectives as an enabling agent for championing of the socio-economic development in the Eastern Cape and the country at large is to empower and support SMMEs.
During the bush clearing phase at least six SMMEs based in the Eastern Cape benefitted on work worth R3 million.
“As part of our SMME programme, the CDC SMME Unit is tasked with the responsibility of unbundling packages of work for SMME’s. Up till this point, the CDC identified six SMME’s who benefited directly in the bush clearing phase,” says Lamla Fihla, acting SMME unit head.
The appointment of SMME’s follows the CDC normal procurement processes. The SMMEs that were identified through the procurement process are – Vukujonge Trading, AmanziEthu Trading, Infra Force Africa, Loppsy Trading, April & Son, and Tshintshiwe Trading. All these SMMEs managed to deliver the work within agreed time and budget.
“This project could have been implemented by a single large and well-established construction company but it was awarded to six SMMEs with the objective of sharing and spreading opportunities as much as possible to many organisations,” concludes Dr Vilakazi.
The BAIC site is now fully cleared and ready for construction. It is important that the BAIC investment positions the Eastern Cape as an automotive hub of SA and has the potential of deepening the component supply chain, job creation and economic development for the province. More than 10 500 employment opportunities would be created by this investment throughout the value chain. | http://mype.co.za/new/site-preparation-begins-for-for-r11-billion-automotive-manufacturing-plant-in-coega-idz/77852/2016/10 |
The revisions of the workbook and assignment set were completed by the start of Fall semester 1993. Methods of obtaining statistical information did not require change and therefore, remained the same. Each semester, the workbook is completed by 20+ classes of English 15 students. In October preliminary statistics were compiled at this time with three classes completing the assignment. In keeping with the issue statement, the number of questions asked about the assignment was reduced from 3.42 per student to 1.5 per student and the rejection frequency was lowered from around 90% to 74%. Although not measurable, an improvement in the attitudes of students, faculty and library staff involved in this project has also been noted.
The Library was the first department at Altoona to form a CQI Team and complete it in one year. | http://www.opia.psu.edu/database/teams/team0465 |
1. Field of the Invention
The present invention relates to fuel nozzles for gas turbine combustors and more specifically to fuel nozzles that utilize multiple fuel types and have the capability for steam injection to control emissions of oxides of nitrogen (NOx).
2. Description of Related Art
Land based gas turbine engines typically include at least one combustor for producing hot gases necessary to drive the turbine section of the engine. Each combustor contains at least one fuel nozzle for injecting fuel to mix with compressed air from the engine compressor and react to form the hot gases. Depending on engine operating requirements and environmental issues, the fuel nozzles can inject multiple fuel types, including gaseous fuel and liquid fuel. In recent years, reductions in emissions levels, especially with respect to NOx and carbon monoxide (CO), have been the main focus of equipment manufacturers, especially since the operation of these types of engines are regulated primarily by their emissions output.
A well-known means to minimize NOx formation in a combustor having a dual fuel nozzle involves injecting steam, from the fuel nozzle, into the combustion chamber. NOx formation in a combustor is a function of flame temperature, where higher flame temperatures create higher levels of NOx emissions. Steam injection reduces the overall flame temperature, thereby creating lower NOx levels. However, if the steam is not injected with a high enough pressure drop across the steam circuit or at too high of a velocity, flow mal-distributions can occur where some regions of a combustion system receive excessive amounts of steam and other areas not receiving enough steam, thereby resulting in high combustion dynamics. High levels of combustion dynamics have been known to significantly reduce hardware life.
Therefore, what is needed is a fuel nozzle capable of injecting liquid fuel, gaseous fuel, or both simultaneously, along with steam, where the flow of steam through the nozzle to the combustor is regulated to reduce undesirable combustion dynamics.
| |
In Mississippi, business disputes commonly occur over a variety of different matters. Most often, businesses can disagree on the terms of contracts and prior arrangements. Property matters and billing issues also frequently form the basis of disputes between businesses.
What to Do in a Business Dispute?
If you are involved in a business dispute in Petal, Mississippi you should first review any relevant documents, including past and current contracts. These documents may contain clauses that dictate how and where you should handle a dispute. However, the dispute may need to be taken to court if contracts do not have resolution clauses, or if there are no documents relevant to the dispute. Mississippi courts look to the individual cases in determining the best resolution. Where two parties have not agreed beforehand on how to handle a dispute, a particular set of legal principles is used instead. Each state has different business laws about dispute resolution and contract law. An attorney practicing in Petal can help you handle your dispute in accordance with the applicable Mississippi laws. Discussion with the other business about how to resolve the dispute may also proceed more smoothly under the direction of an attorney, avoiding the need to go to court.
Alternative Dispute Resolution
Disputes in contracts must often be resolved outside of court according to a dispute resolution clause. Methods of resolving a conflict outside of court are called Alternative Dispute Resolution or ADR. These methods include Mediation, Arbitration and Collaboration. All forms of ADR are designed to reach the same decision a court would have, without needing to actually go to court. They carry their own sets of procedures and protocols, and they often involve a neutral third party listening to both sides of a dispute and making a determination based on local law. In Petal, attorneys specialized in ADR can help if your business dispute is to be resolved out of court. | https://businessattorneys.legalmatch.com/MS/Petal/business-disputes.html |
TXTMENU is similar to the built-in MATLAB function MENU but has the following features to make using menus faster and more useful:
1. The menu is text-based in the command window so time isn't wasted generating a GUI menu and the user does not have to waste time with the mouse to click an option.
2. There can be a default choice, which is selected when there is no input (i.e. hitting return key without first typing a menu choice).
3. The menu is customizable both in appearance (content, layout, and color) and the type of choices available (e.g., a mixture of string and numeric options is possible).
Cite As
Sky Sartorius (2022). TXTMENU - Text-Based Menu for the Command Window (https://www.mathworks.com/matlabcentral/fileexchange/28285-txtmenu-text-based-menu-for-the-command-window), MATLAB Central File Exchange. Retrieved .
MATLAB Release Compatibility
Platform CompatibilityWindows macOS Linux
Categories
Tags
Acknowledgements
Inspired by: cprintf - display formatted colored text in Command Window
Inspired: Validated Input Function, MCD - My change directory, CORE: Conceptual Optimization of Rotorcraft Environment
Community Treasure Hunt
Find the treasures in MATLAB Central and discover how the community can help you!Start Hunting!
Discover Live Editor
Create scripts with code, output, and formatted text in a single executable document. | https://www.mathworks.com/matlabcentral/fileexchange/28285-txtmenu-text-based-menu-for-the-command-window |
Spectacular in bloom, Allamanda cathartica (Golden Trumpet) is an evergreen tropical shrubby climber boasting deep golden yellow trumpet flowers, 5 in. across (12 cm), over a long season. Blooming in succession for months throughout the summer to the first frost - all year in tropical conditions, the fragrant blossoms may be single or double. They may display white markings in the throat, and are produced in clusters. Opening from fuzzy brown buds, they shine against the handsome foliage of glossy, leathery, wavy-margined, bright green leaves, 4-6 in. long (10-15 cm), held in whorls along the stems. Grown as a vine or pruned into a bushy shrub, Allamanda blooms on new growth. Since Golden Trumpet does not twine nor have tendrils, if grown as a vine it must be trained onto a trellis or other support structure. It does not tolerate cold and needs heat for adequate growth and flowering. This tropical plant needs warm conditions with day temperatures of 70ºF (21ºC) or higher and night temperatures of 60-65ºF (15-18ºC). Providing quick, long-season color, Allamanda can be planted outdoors in the mildest climates. Elsewhere, it will happily reside in a container to be moved indoors in cold weather.
- Grows up to 10-20 ft. tall (300-600 cm) and 3-6 ft. wide (90-180 cm). Vigorous, Golden Trumpet can grow 20 ft. in a single season if summers are warm.
- A full sun or light shade lover, it is best grown in richly organic, fertile, moist, well-drained soils. Allamanda appreciates heat on its vines, but its roots benefit from a cooler environment.
- Water and fertilize regularly during the growing season. Keep organic mulch around the base of a plant and fertilize twice each month.
- Generally pest and disease free. Keep an eye out for scale, mealy bugs and leaf spot. Allamanda drops its leaves when it suffers water stress. Yellowing between leaf veins, or chlorosis, indicates a need for more organic matter in the soil.
- Remove seedpods to keep new growth and flowers coming. Prune in late winter, early spring to encourage a more compact habit and a copious blooming.
- Propagation by stem cuttings.
- All the parts of the plant are toxic and the latex can cause dermatitises and allergic reactions to particularly sensible persons.
- Native to Brazil.
Buy Allamanda cathartica (Golden Trumpet)
Requirements
|Hardiness||10
– 11
|
|Climate Zones||23, 24, H1, H2|
|Plant Type||Climbers, Shrubs|
|Exposure||Full Sun|
|Season of Interest||
Spring (Early,Mid,Late)
|
Summer (Early,Mid,Late)
Fall
Winter
|Height||10' – 20' (3m – 6m)|
|Spread||3' – 6' (90cm – 180cm)|
|Spacing||36" – 72" (90cm – 180cm)|
|Water Needs||Average|
|Maintenance||Average|
|Soil Type||Chalk, Clay, Loam, Sand|
|Soil pH||Acid, Alkaline, Neutral|
|Soil Drainage||Moist but Well-Drained|
|Characteristics||Fragrant, Showy, Evergreen|
|Attracts||Hummingbirds|
|Garden Uses||Arbors, Pergolas, Trellises, Patio and Containers|
Shutterstock
While every effort has been made to describe these plants accurately, please keep in mind that height, bloom time, and color may differ in various climates. The description of these plants has been written based on numerous outside resources. | https://www.gardenia.net/plant/allamanda-cathartica |
Stress – a concept that is today woven into the average working day of the vast majority of employees, regardless of their job positions and responsibilities. Although it represents a mechanism inherited from our distant ancestors for dealing with dangers, the dangers they faced and those that cause stress today have very few contact points. How many of us worry that stress might eat us alive, no metaphor? The stress we feel today is much different and, unfortunately, more consistent over time.
According to a recent survey conducted by the American Psychological Association (APA), more than one-third (36%) of employees feel that they are constantly under tension or stress during their working days, while 20% say that their average working day is saturated with stress to the level 8 or 9, on a scale of 10.
A Survival Mechanism Working Against Us?
“One of the differences between our ancestors and us is that we still, on the mental and emotional level, live as if the tiger that poses a danger to us is constantly present. This can cause our nervous system to be constantly on alert,” says Karen Sorters, a San Diego-based stress reduction expert.
Soters is not surprised that most employees feel stressed. She points out that the ubiquitous degree of uncertainty employees feel in their workplaces due to turbulent economic conditions exponentially increases the level of “stress”.
“Office” And “Field” Stress
When it comes to jobs, not every job carries the same level of stress. Many environmental factors are incomparable to each other – like a soldier protecting his base, a policeman chasing a thief, or a firefighter running into a burning building. In the list of the most stressful jobs in 2012 by “Jobs Rated”, all three listed professions have their place.
“Being in the military is physically and mentally demanding and can be extremely stressful, especially in combat,” said one professional soldier who withheld his real name to protect privacy. “Although military service is quite stressful, it has some good sides. We have guaranteed pay and health insurance, plus 30 days of paid vacation to help us deal with the stress of combat.”
Of course, stress is in the minds of those who experience it, which does not diminish its harmful effects and consequences. “Compared to soldiers, police officers, firefighters, there aren’t many jobs that are quite as stressful,” said Stratis Zervos, an award-winning photojournalist. “My job is not stressful on a daily basis. It can be an individual story, depending on the circumstances and whom you are taking photos of, but a large part of the job is not as stressful as other jobs are. It’s exciting and fun every day!”
Here are the top 20 most stressful jobs in the world:
1. Professional Soldier
There is an extensive list of duties a professional soldier undertakes in his workplace. From serving food in the canteen to fighting in the front lines to avoiding land mines, a soldier’s duties vary widely, and each carries a different level of responsibility and challenge. Taken as a whole, the professional soldier is the most stressful profession when you take into account the factors of exposure to danger, the expected level of mental and physical fitness, as well as the respect for strict hierarchy and other specifics of military life.
2. Doctor
Doctors’ profession requires “building” a defensive “wall” which necessarily includes indifference and cynicism because they face suffering, pain, and death daily. That is why many doctors have an unusual sense, which is a defense mechanism that the psyche has created to become resistant to stress and fear. The habit of hiding emotions and treating every situation calmly eventually becomes an obstacle to emotional commitment and the absence of the desire to share everyday worries, problems, and happiness with a partner. Doctors are used to always being physically and mentally ready to help others, but this also affects their private life.
Whether entering a burning building to save lives or controlling flaming elements on roads or other areas, firefighters often risk their own lives to save others. The high degree of real danger mixed with making life-important decisions places them in second place on the list of the most stressful jobs for 2012.
3. Teacher
Educators go through a training to control large groups of children, which is why they become very strict at home. The characteristics to observe in teachers are most often authoritarianism, conservatism, the tendency to monologue, and adherence to established forms. If a person works with children every day, all day, after some period of time he will start to treat adults and close people like children – he will give advice, feel the need to be prepared for everything, and always have to explain everything ten times.
4. Pilot
The pressure to which commercial flight pilots are exposed is not insignificant. Not only do they have to guarantee the safety of their passengers, but they also have to make sure that flights start and end on schedule, even when weather conditions threaten to sabotage the agenda. Frequent overtime hours and routes that often require transfers in various cities around the world lead not only to stress caused by the nature of the job, but frequent changes in time zones also contribute to this.
5. Military Commander
A military commander is a high-ranking position within the service of armed units. They command troops during military training, but also in combat. The complex and dangerous nature of their job, and the inevitability of making life-important decisions for their troops, make them one of the most stressful jobs in general. In addition, one should not ignore all the specific factors of military service, with additional, “leadership” stress: military commanders manage their troops and are responsible for their results.
6. Policeman
Police officers are obliged to provide citizens with the necessary protection against crime, and also participate in investigations of criminal activities. Their work is public, often full of crime prevention and education activities, as well as a quick response in case of serious accidents and dangers. They are a constant target of criminals, which makes this profession extremely stressful.
7. Lawyer
Only mentally strong people can do this job because being a lawyer involves a lot of daily pressure. Talking about problems is not common among lawyers, so they rarely seek help and support, which can lead to depression. A successful career as a lawyer requires a sharpened ability to foresee all negative consequences for the client, which is why they mostly begin to look at the world negatively and look for the bad in everything, so their psyche changes. In addition, lawyers are among the hardest-working professions, so they are often overtired and hide health problems.
8. Psychologist
People often decide to study psychology to discover how to deal with themselves. They analyze other people’s problems and try to find their roots. Psychologists become emotionally exhausted over time because they constantly need to listen and understand other people’s suffering and issues. Every professional in this field knows that the well-being of his client depends on his actions, and such great responsibility is very stressful and causes the fear of making a fatal mistake.
9. Architect
Architects are known as workaholics, who often joke about their appearance, which is often unsightly due to fatigue. Staying in the office until late, working even on days off, and lack of sleep often seriously damage their health. An architect’s friends are usually architects themselves because other people are generally not interested in them. They are under constant emotional tension, great responsibility, stress, frequent conflicts with clients, creative crises, and often delusions about their greatness end up driving them into depression very often.
10. Event Coordinator
The event coordinator is responsible for planning all activities and logistics related to the events he is in charge of. Although they can organize many events throughout the year, some can be once-in-a-lifetime opportunities for the people participating. Therefore, such events are usually closely followed by the public, and all the organizational abilities of the person in charge are under scrutiny.
11. PR Manager
Employees in executive public relations positions are responsible for creating and maintaining a positive image of companies, non-profits, and government agencies in the eyes of the public. They usually give presentations and speak in front of many people and media representatives. That is a highly competitive field, and the work involves very short deadlines, meaning that specialists of this type are often under a lot of long-term stress. Some men are obliged to communicate with potentially aggressive media representatives, especially after accidents or events closely followed by the public.
12. Executive Director (Senior)
CEOs’ profession requires formulating rules and strategies for their companies while also managing the processes that are part of the strategy. People often expect them to have comprehensive knowledge in many areas – simultaneously! Directors face decisions that can affect the entire company, meaning they can have (and do have) an impact on the lives of a large number of employees.
13. Photojournalist
Photojournalists record their stories through the lens of a camera. They often find themselves in dangerous situations to succeed in getting their stories, with some of these situations being fires and battlefields. External danger, tight deadlines, and the potential disobedience of technology are factors that make this job stressful.
14. Taxi Driver
Driving in a city that is overcrowded with vehicles, traffic jams and the chaos that comes with rush hour, the job of a taxi driver is quite far from the idea of it being a light job in which you only need to pick up passengers and drop them off at the desired location. Taxi drivers are the first target of many criminals and are paid minimally for their overtime work.
15. Freelancer
A very social person with strong self-discipline can become a successful freelancer – It’s a person who works on projects from home, creates his working hours, and can work on several jobs at once. But unstable and uncertain income and isolation from society while working all day at the computer can cause great insecurity. For freelancers, home is also an office, so there is no chance to separate private from the business. Undetermined working hours and constantly thinking about work hurt the psyche of a person, so it is important for freelancers to change the interior often and to relax emotionally.
16. Accountant
It is difficult for people who work in this business to separate their business life from their private life because they are constantly concentrating on numbers. Over time, years of monotonous work take their toll, they become very boring but pretentious. Accountants are obsessed with order – everything must be in its place and completed by a certain deadline. They plan the family budget very carefully, and the whole house must always be clean, which is why they become “grunts” who annoy the environment.
17. Bartender
Many people believe that serving drinks and hanging around at bars while being paid aren’t even actual jobs. But the reality is that it may be stressful due to the extra strain of inebriated clients insisting on being served first, being on your feet for long period, and to having commute home late at night.
18. IT Manager
Although many people appear to assume that IT professionals have it easy, managing all of the company’s IT operations may be very demanding, especially if there are any errors and the system as a whole fails. In this capacity, you’ll need to swiftly develop your leadership abilities and be able to think on your feet and come up with quick, effective answers – and this may be stressful, to say the least.
19. Social Worker
When the workday begins, social workers never know what challenges they may encounter. Depending on their field of employment, they might care for persons who are old, children or unwell, or have mental health difficulties. Long hours and late nights might be detrimental to their personal lives and health, but the thrill of changing someone’s life can make all the stress worthwhile.
20. 911 Dispatcher
Responding to 911 calls, as well as communicating with police and other emergency responders, is the responsibility of dispatchers. The work is stressful, and it requires cool composure to direct the caller through their next actions. Meanwhile, some calls may be upsetting.
Conclusion
Some jobs require handling delicate activities where even a small error might have serious repercussions. For instance, while a patrol officer’s job may appear straightforward at first appearance, poor calculation or judgment might increase the likelihood of a traffic accident. Other professions that entail delicate work and intense concentration include those of doctors, chemists, and accountants. This can make those positions unpleasant because they require a lot of mental effort.
It’s reasonable to argue that all these vocations have increased stress aspects, but their advantages significantly exceed the downsides. That being said, regardless of your line of work, you should get professional treatment if you are showing extreme indications of stress and are having problems with your mental health.
Some occupations are demanding because they call for challenging duties. For example, occupations like investing, law, and finance demand extensive hours of research and analysis of hard issues. Many of these positions also have stringent educational and training requirements. These tasks are particularly difficult since they require a lot of mental effort.
Although we can’t completely avoid stress, we can influence how we react to it. Stress is a fact of life. Avoid unhealthy coping strategies like turning to junk food or alcohol to quell anxiety. Exercise or engage in whatever activity makes you feel relaxed, such as doing a crossword puzzle or spending time with loved ones. If complaining to someone about your job makes you feel better, do it. The secret is to find peaceful things to partake in; look into artistic, social, or physical outlets. | https://careerstance.com/20-most-stressful-jobs-in-the-world/ |
Following the recent announcement that the Middlesex Championship has been amalgamated into the Middlesex County Cricket League (MCCL), which will now see all Saturday league cricket in Middlesex played under the same rules, in one newly restructured league system, the fixture list for the 2021 season has been released.
In the new MCCL structure there will be 23 different divisions, with, at the top of the pyramid, eight divisions in a top tier dedicated to club’s first eleven sides, then a second tier featuring a further six divisions of second eleven teams, with the leagues structure completed with a third tier comprising nine divisions of club’s third, fourth, fifth and even sixth elevens.
The top division has thrown up some intriguing opening day encounters, with the new season getting underway on Saturday 8th May 2021, with reigning champions Teddington taking on MCCL’s most successful club, eleven-time winners Ealing, whilst 2020 runners-up Richmond face last season’s bottom side Twickenham. 2019 champions North Middlesex travel to Brondesbury, whilst Crouch End host 2020 third place finishers Shepherds Bush and Finchley host Hampstead.
With no relegation or promotion in 2020, as a result of the Covid-19 shortened season, unbeaten Division Two champions Stanmore missed out on returning to the top-flight, however they’ll be keen to start well next summer against Wembley, whilst runners-up Harrow St. Mary’s kick off their campaign against Hornsey.
At the other end of the pyramid, the restructuring of the league has brought an array of new sides into the MCCL structure, with Actonians fifth eleven taking on Brondesbury fifths, Stoke Newington fourths taking on Friends United thirds, Highgate sixths up against Chiswick fifths and Winchmore Hill fifths hosting Winchmore Hill sixths in division seven of the third tier.
Chairman of the MCCL, Bob Baxter, commented:
“We are really looking forward to the newly structured MCCL getting underway next May, after all the disappointment of what has been a terrible year for the game and the country at large.
“To be welcoming so many new sides into the MCCL structure, for what promises to be the start of a new chapter for league cricket in Middlesex is really exciting, and whilst there are so many new clubs to get to know, I can’t wait to get around the county circuit over the season to meet the teams involved and welcome them to the league.
“With twenty three divisions, featuring sixth elevens from some clubs, there is clear evidence that the game is as strong as ever, and despite the difficulties of this summer the club network has come together and battled through it, and for that it should take enormous credit.
“My thanks go to everyone who has worked so hard to pull the new league structure together, and the announcement of the 2021 fixture schedule, combined with the increasingly encouraging news relating to Covid-19 vaccinations, gives me real hope and optimism that we can genuinely all start to look forward to a 2021 cricket season that represents something close to normality.
“We would welcome all cricket fans in the county to tune in to the MCCL Podcast, which brings you all the latest news from the MCCL, and features interviews with influential people within the county game, including Middlesex’s Head Coach, Stuart Law, in a recent edition.
“On the MCCL website you can listen in to the Podcast, including the latest edition which explains the newly formed MCCL structure and what we’ve all got to look forward to.
“We would also urge all cricket fans to get down to their local clubs to enjoy the action. There is so much cricket to enjoy around the county and it’s being played right on your doorsteps, so why not pop down, make yourself known and you’ll be sure to get a warm welcome. Who knows, you might even be convinced to dust off the old spikes and give the whites another outing.”
. | https://www.middlesexccc.com/news/2020/12/middlesex-county-cricket-league-publishes-2021-fixture-schedule |
Minnesota commemorates road workers killed on the job
The state of Minnesota commemorated the Minnesota Department of Transportation (MnDOT) workers who have been killed on the job in honor of Workers Memorial Day on April 28.
Workers Memorial Day began in 1970 as a way to recognize the men and women who have died doing their jobs. MnDOT in particular has recorded 34 fatalities among their employees since 1960, as well as 15 deaths of private contractors. Last year, the state authorities recorded 10 road fatalities and more than 1,600 traffic-crashes in Minnesota road work zones. Workers Memorial Day was originally established to remind workers to promote safety within the workplace at all times
Families are often left devastated when their loved ones suffer injuries or serious accidents in the workplace. If you or someone you know has been involved in such an accident, working with an attorney is a good way to help receive the compensation you need for recovery. Find out how a lawyer at Robert Wilson & Associates could work for you in Minnesota by calling (612) 334-3444. | https://www.wilsoninjurylaw.com/blog/2016/05/05/minnesota-commemorates-road-workers-killed-on-the-job/ |
Big Data in Computational Social Science and Humanities [electronic resource] / edited by Shu-Heng Chen
- Published:
- Cham : Springer International Publishing : Imprint: Springer, 2018.
- Physical Description:
- XIII, 388 pages 126 illustrations, 114 illustrations in color : online resource
- Additional Creators:
- Chen, Shu-Heng
SpringerLink (Online service)
- Access Online:
- ezaccess.libraries.psu.edu
- Series:
- Computational Social Sciences, 2509-9574
- Contents:
- Big Data in Computational Social Sciences and the Humanities: An Introduction -- Part I: Practice -- Application of Citizen Science and Volunteered Geographic Information (VGI): Tourism Development for Rural Communities -- Telling Stories Through R: Geo-temporal Mappings of Epigraphic -- Expressing Dynamic Maps through 17th-Century Taiwan Dutch Manuscripts -- Has Homo economicus Evolved into Homo sapiens from 1992 to 2014?: What Does Corpus Linguistics Say? -- Big Data and FinTech -- Health in Biodiversity-Related Conventions: Analysis of a Multiplex Terminological Network (1973-2016) -- How Does Linguistic Complexity in Shakespeare's Plays Relate to the Production History of a Commercial American Theatre? -- Language Communities, Corpora, and Cognition -- From Naive Expectation to Realistic Progress - Government Applications of Big Data to Public Opinions Mining -- Understanding "the User-Generated": The Construction of the "ABC model" and the Imagination of "Digital Humanities" -- Part II: Survey and Challenges -- Big Data Finance and Financial Markets -- Applications of Internet Methods in Psychology -- Spatial Humanities: An Integrated Approach to Spatiotemporal Research -- Cloud Computing in the Social Sciences and Humanities -- Analysis of Social Media Data: An Introduction to the Characteristics and Chronological Process Spatial Humanities -- Big Data and Research Opportunities Using HRAF Databases -- Computational History: From Big Data to Big Simulations -- A Posthumanist Reflection on the Digital Humanities and Social Sciences.
- Summary:
- This edited volume focuses on big data implications for computational social science and humanities from management to usage. The first part of the book covers geographic data, text corpus data, and social media data, and exemplifies their concrete applications in a wide range of fields including anthropology, economics, finance, geography, history, linguistics, political science, psychology, public health, and mass communications. The second part of the book provides a panoramic view of the development of big data in the fields of computational social sciences and humanities. The following questions are addressed: why is there a need for novel data governance for this new type of data?, why is big data important for social scientists?, and how will it revolutionize the way social scientists conduct research? With the advent of the information age and technologies such as Web 2.0, ubiquitous computing, wearable devices, and the Internet of Things, digital society has fundamentally changed what we now know as "data", the very use of this data, and what we now call "knowledge". Big data has become the standard in social sciences, and has made these sciences more computational. Big Data in Computational Social Science and Humanities will appeal to graduate students and researchers working in the many subfields of the social sciences and humanities.
- Subject(s):
- ISBN:
- 9783319954653
- Digital File Characteristics: | https://catalog.libraries.psu.edu/catalog/25364320 |
SANTA FE – Gov. Michelle Lujan Grisham on Friday signed legislation allowing the state Economic Development Department to invest in land, buildings and infrastructure that are not yet associated with a business expansion.
Senate Bill 118 amends the Local Economic Development Act (LEDA) to clarify the existing statute and define the roles of both the state and local governments.
“My pledge is to expand economic growth and opportunities to all corners of New Mexico, and this new measure will give rural areas and business leaders an important tool to create jobs in their own community,” Gov. Lujan Grisham said.
The legislation defines three types of projects in which the state may participate:
- Traditional LEDA projects that create economic base jobs;
- Retail projects for communities with less than 15,000 in population when the project does not substantially compete with existing business. This represents an increase from the prior population threshold of 10,000;
- Rural site infrastructure to create “shovel-ready” places for businesses, including roads, rail, water, wastewater, power, broadband and the like. The new infrastructure must be located on property owned by a local government.
The new rural infrastructure component will help rural communities overcome the lack of prepared buildings and sites that accelerate the time frame for business expansions, said Alicia J. Keyes, Economic Development Department cabinet secretary.
“We know rural communities have different challenges,” Keyes said. “This bill will give us more tools to better target and support rural communities. For the first time, we can help create shovel-ready sites and participate in a wider array of rural business projects.”
“This legislation gives rural New Mexico an opportunity to compete with urban markets by building infrastructure that creates prepared sites for new businesses, thereby bringing new jobs to rural areas of our state,” said Sen. George Muñoz, the bill’s sponsor.
The LEDA fund received an additional $15 million in separate legislation.
LEDA funds are commonly referred to as New Mexico’s “deal closing” fund because it has been critical in competing with other states for business development projects.
Senate Bill 118, the Local and Regional Economic Development Support Fund, passed the Senate 35-3 and House of Representatives 68-0. | https://www.governor.state.nm.us/2020/03/06/gov-lujan-grisham-signs-economic-development-bill/ |
BK Magazine BK Life
Posted by Jeevan Sivasubramaniam, Managing Director, Editorial, Berrett-Koehler Publishers Inc.
More than a decade of working with others who are suffering or in pain took its toll on Laura, just as it has taken its toll on anyone who has worked in the social service field for an extended period of time. How do you keep from internalizing all the pain and suffering when you are exposed to it daily? Laura finally figured it out, which is why you should read her book. In the meantime, here are Laura's ten words of advice (organized into three short mantras) to keep in mind to carry your soul through the journey ahead:
1. Be Conscious - A lack of consciousness, awareness, and presence accounts for much of the pain, struggle, and hardship the world currently faces. By remaining conscious of our speech, manner, and conduct at all times (or as frequently as we can...), we create positive social and environmental change. At the very least, we do less harm to ourselves or others and, at most, we contribute to the health and well being of others, ourselves, and our planet.
2. Sustain Yourself - We have an ethical obligation to sustain ourselves before we work to sustain others or the planet. Only through caring for ourselves - mind, body, spirit - are we going to have the energy and clarity to keep doing our best, day in and day out - for the long haul. If you don't have your own A game, you won't have it for others.
3. Contribute Wise to the World's Needs - Think about what the world needs right now, and then consider how your daily intentions relate to that need and merge the two. Ask yourself, "what do I want to get better at?" and then think of how that passion can bring benefit to the world. We can agree that the world doesn't need more contempt, cynicism, gossiping, addictions, or scapegoating. But intentionality, mindfulness, proactive awareness...now we're talking! So when we're able to notice our actions, we can gently ask ourselves, "Is what I'm doing right now what I want to be getting better at?" and if you're feeling inspired, follow it up with, "To what benefit for the world, is this action I'm taking?"
As Howard Thurman reminds us, "...Ask yourself what makes you come alive, and then go and do that. Because what the world needs is people who have come alive."
Any thoughts, feedback, or suggestions of your own? Chime in below. | https://changeagent.bkconnection.com/bkblog/jeevan-sivasubramaniam/ten-words-to-help-you-care-for-your-soul-and-those-of-others |
The US Treasury Department will ask the public for comments on digital assets, including their views on how regulations can tackle the illicit use of crypto.
In a document to be published Tuesday in the Federal Register, the US Treasury Department requested public comment on “digital asset-related illicit financing and national security risks, as well as the publicly released action plan to mitigate the risks” regarding President Joe. Biden executive order on crypto as of March. The department invited the public to comment on legal obligations imposed by the US government that were “no longer fit for purpose in relation to digital assets”, and to suggest alternative regulations to mitigate illicit financial risks. and address vulnerabilities.
“Illegal activities highlight the need for ongoing monitoring of the use of digital assets, the extent to which technological innovation can affect such activities, and exploring options to mitigate these risks through regulation, oversight, public-private involvement , surveillance and law enforcement,” the Treasury said.
In particular, the US Treasury Department asked for possible additional steps it could take related to addressing ransomware attacks, illicit financial risks from cryptocurrency mixers and DeFi, and how the government is pursuing money laundering and anti-money laundering policies. counter terrorist financing at the state and federal levels. The public has until November 3 to submit comments.
The request for public comment followed the White House releasing a regulatory framework for digital assets on Sept. 16. Many in the space, including crypto advocacy groups, criticized the administration for seemingly focusing on the illicit use of crypto rather than its potential benefits. As part of the framework’s requirements, the Treasury Department will create an “illegal financial risk assessment of decentralized finance” by February 2023.
The right regulation will drive technological innovation and preserve the fundamental value propositions of crypto freedom and empowerment, while putting the right guardrails in place for consumer protection and choice. (2/9)
— CZ Binance (@cz_binance) September 16, 2022
Related: Illegal crypto use as a percentage of total use has fallen: Report
Biden’s executive order also caused the Treasury Department and the Federal Reserve to examine policy goals and a US central bank digital currency, or CBDC. On September 17, the Office of Science and Technology Policy released a report on 18 different design choices for the possible implementation of a digital dollar in the United States. | https://www.thebharatexpressnews.com/us-treasury-plans-to-ask-public-if-crypto-related-regulation-is-no-longer-fit-for-purpose/ |
This application claims priority to GB Patent Application No. 1505777.1 filed Apr. 2, 2015, the entire content of which is hereby incorporated by reference.
TECHNICAL FIELD
The present disclosure relates to a data processing apparatus. More particularly it relates to a data processing apparatus which can perform multi-threaded data processing operations.
BACKGROUND
It is known to provide a data processing apparatus which has the capability to perform multi-threaded data processing, according to which multiple threads of software are handled by the data processing circuitry of the multi-threaded data processing apparatus. The data processing apparatus then switches between the threads according to a defined scheme in order to make forward progress in the data processing operations defined by the instructions in each thread. For example this may involve a time-division multiplexing approach, and may also involve context switching from a first thread to a second thread when the first thread is held up, for example whilst waiting for data requested by a load operation to return from memory. Another approach is simultaneous multithreading, where the processor decides on each cycle, from the set of instructions available from all threads, which threads to execute and can therefore execute instructions from the same thread simultaneously. There are various known techniques for handling multiple threads in a data processing apparatus with which one of ordinary skill in the art will be familiar. It is further known to provide various types of monitoring capability within a data processing apparatus which can gather event information relating to the data processing operations which the data processing circuitry of the data processing apparatus is carrying out.
SUMMARY
Viewed from a first aspect the present techniques provide apparatus for multi-threaded data processing circuitry to perform data processing operations for each thread of multiple threads; event handling circuitry to receive event information from the data processing circuitry indicative of an event which has occurred during the data processing operations; and visibility configuration storage to hold a set of visibility configuration values, each visibility configuration value associated with a thread of the multiple threads, wherein the event handling circuitry is responsive on receipt of the event information to adapt its use of the event information to restrict visibility of the event information for software of threads other than the thread which generated the event information when a visibility configuration value for the thread which generated the event information has a predetermined value.
Viewed from a second aspect the present techniques provide a method of multi-threaded data processing comprising the steps of: performing data processing operations for each thread of multiple threads; storing a set of visibility configuration values, each visibility configuration value associated with a thread of the multiple threads; receiving event information indicative of an event which has occurred during the data processing operations; and adapting usage of the event information to restrict visibility of the event information for software of threads other than the thread which generated the event information when a visibility configuration value for the thread which generated the event information has a predetermined value.
Viewed from a third aspect the present techniques provide an apparatus for multi-threaded data processing comprising the steps of performing data processing operations for each thread of multiple threads; storing a set of visibility configuration values, each visibility configuration value associated with a thread of the multiple threads; receiving event information indicative of an event which has occurred during the data processing operations; and adapting usage of the event information to restrict visibility of the event information for software of threads other than the thread which generated the event information when a visibility configuration value for the thread which generated the event information has a predetermined value.
Viewed from a fourth aspect the present techniques provide a computer readable storage medium storing in a non-transient form software which when executed on a computing device causes the computing device to carry out the method of the second aspect.
Viewed from a fifth aspect the present techniques provide software which when executed on a computing device causes the computing device to carry out the method of the second aspect.
BRIEF DESCRIPTION OF THE DRAWINGS
The present techniques will be described further, by way of example only, with reference to embodiments thereof as illustrated in the accompanying drawings, in which:
FIG. 1
schematically illustrates an apparatus for multi-threaded data processing in one embodiment;
FIGS. 2A, 2B and 2C
show different examples of the use of visibility configuration values to control the visibility of event counts between different threads being executed by a multi-threaded data processing apparatus in some embodiments;
FIGS. 3A, 3B, 3C and 3D
show four different types of visibility configuration values and example values thereof leading to different styles of event counting between the four threads being executed in some embodiments.
FIG. 4
schematically illustrates the reception of event information by event handling circuitry in one embodiment and its configuration to gather event count information on the basis of the received event information and visibility configuration values:
FIG. 5
is a flow diagram illustrating a sequence of steps which are taken when carrying out the method of one embodiment to determine if a particular counter should count events derived from event information;
FIG. 6A
schematically illustrates four execution levels (privilege levels) which are implemented in the apparatus of one embodiment; and
FIG. 6B
schematically illustrates the subdivision of an apparatus into a non-secure world and a secure world in one embodiment.
DESCRIPTION OF EMBODIMENTS
At least some embodiments provide an apparatus for multi-threaded data processing comprising data processing circuitry to perform data processing operations for each thread of multiple threads; event handling circuitry to receive event information from the data processing circuitry indicative of an event which has occurred during the data processing operations; and visibility configuration storage to hold a set of visibility configuration values, each visibility configuration value associated with a thread of the multiple threads, wherein the event handling circuitry is responsive on receipt of the event information to adapt its use of the event information to restrict visibility of the event information for software of threads other than the thread which generated the event information when a visibility configuration value for the thread which generated the event information has a predetermined value.
Event handling circuitry which receives event information from data processing circuitry in order to gather information with respect to the data processing operations of that data processing circuitry has been recognised by the present techniques to present a potential security vulnerability in the context of a multi-threaded data processing apparatus. For example, the multiple threads being executed by the data processing circuitry may be being run on different operating systems supported by the data processing apparatus for which it is desirable that event information originating in one operating system is not visible to the other operating system. One example of this is where one thread being executed in one operating system is carrying out data processing relating to data for which it is desired to provide protection, such as private keys in a cryptographic context or particular data content (e.g. personal data) which requires careful protection. Although the event information may only relate to events occurring during the data processing operations carried out for each thread which do not appear to have a security implication, such as cache misses, the present techniques recognise that even such simple hardware based information could in some ways jeopardise the desired security being maintained with respect to the thread carrying out the data processing operations on the data which is to be carefully protected.
The present techniques both recognise and address this problem by providing visibility configuration storage (for example, in the form of a system control register) which holds a set of visibility configuration values, each visibility configuration value associated with one of the threads of the multiple threads. If the visibility configuration value held for a given thread takes a particular (pre-determined) value indicating that the visibility of event information should be restricted, the event handling circuitry which receives the event information from the data processing circuitry related to the data processing operation which it is carrying out can then take steps to ensure that the visibility of event information related to the execution of that thread is restricted for the software of other threads than the thread which generated the event information. The thread which generated the event information, and in particular the data which it handles, is thus better protected. The restriction on the visibility of the event information may take a number of forms in different embodiments (as is detailed below), for example this restriction may be absolute, so that strictly only software of the thread which generated the event information has visibility of it, or it may be slightly more permissive in that software of some other threads, which are deemed to be trusted in association with the thread which generated the event information, are also allowed visibility of the event information.
In some embodiments, not only is visibility of the event information restricted for software of threads other than the thread which generated the event information (in dependence on the corresponding visibility configuration value) but also each visibility configuration value is not accessible to software of threads other than the corresponding thread. This provides a further level of protection for that corresponding thread, in that software of other threads not only can be prevented from seeing event information relating to that thread, but they can also be prevented from even knowing what the visibility configuration value held for that thread is, and certainly cannot modify it.
The event handling circuitry may take a variety of forms, but in some embodiments the event handling circuitry comprises at least one event counter. On the basis of the event information received from the data processing circuitry the at least one event counter can therefore accumulate a total count of the number of events of a particular predetermined kind which are determined to have occurred on the basis of that received event information.
Where the event handling circuitry comprises at least one event counter the number of event counters may vary, but in some embodiments the at least one event counter comprises an event counter for each thread of the multiple threads. Accordingly, a corresponding accumulated event count can be kept for each of the multiple threads.
Whilst each event counter could be configured only to count events for a single corresponding thread, in some embodiments the at least one event counter is configurable for multi-thread event counting and the at least one event counter counts events for more than one thread. Thus this multi-thread counting event counter may be configured in a range of ways for event counting, from only counting for a small subset of the multiple threads, through to event counting for all of the multiple threads being executed by a data processing circuitry. This is however subject to the additional constraint according to the present techniques that a thread being executed by the data processing circuitry which generates event information received by the event counter can be excluded from this multi-thread event counting configured event counter, by virtue of setting its corresponding visibility configuration value to the predetermined value, and in response to this the event handling circuitry does not allow event information from that thread to be registered as a count in the multi-thread event counting counter.
Thus, in some embodiments responsive to the at least one event counter performing multi-thread event counting the at least one event counter does not count events for the thread which generated the event information when a visibility configuration for the thread has the predetermined value.
The set of visibility configuration values held by the visibility configuration storage may take a variety of forms, but in some embodiments the visibility configuration storage is arranged to hold single bit configuration visibility configuration values. For example, a single bit visibility configuration value may be held by the visibility configuration storage for each thread of the multiple threads that are handled by the data processing circuitry. Thus, each thread can have its event information visibility for software of other threads defined by its own corresponding single bit configuration visibility value.
In some embodiments, the visibility configuration storage is arranged to hold multi-bit visibility configuration values, wherein the event handling circuitry is responsive on receipt of the event information to adapt its use of the event information such that visibility of the event information for software of each of the multiple threads other than the thread which generated the event information is defined by a corresponding bit of a multi-bit visibility configuration value stored for the thread which generated the event information. These multi-bit visibility configuration values held by the visibility configuration storage could take a range of forms, but in some embodiments a multi-bit visibility configuration value is held by the visibility configuration storage for each thread of the multiple threads. The multi-bit visibility configuration value held for each thread can thus define whether the event information generated by that thread is visible to software on each of the other multiple threads individually.
There may be groupings of threads (for example having a logical, security or other connection with one another), within which it is considered acceptable to share event information and in some embodiments the thread which generated the event information is comprised in a group of threads, and the event handling circuitry is responsive on receipt of the event information to adapt its use of the event information such that the event information is visible to software of threads in the group of threads and such that the event information is not visible to software of threads not comprised in the group of threads. Thus threads within the group have mutual event information visibility within the group and threads outside the group have no visibility of event information within the group.
In some embodiments the group of threads is defined by a group identifier, and the event handling circuitry is responsive on receipt of the event information to use the group identifier as the visibility configuration value. In other words, restriction of the visibility of the event information for software of threads other than the thread which generated the event information may be determined by the group identifier itself, which characterises the group of threads as a group.
In other embodiments a group visibility configuration value for the group of threads may be defined and in such embodiments the thread which generated the event information is comprised in a group of threads, and the visibility configuration value is given by a group visibility configuration value for the group of threads.
In some embodiments the event handling circuitry may impose a strict “generating thread only” visibility rule, wherein (when the visibility configuration value for the thread which generated the event information has the predetermined value) the only software which is allowed visibility of the event information is the thread which generated it, and in such embodiments the event handling circuitry is responsive on receipt of the event information to adapt its use of the event information such that the event information is not visible to software of threads other than the thread which generated the event information when the visibility configuration value for the thread which generated the event information has the predetermined value.
The multiple threads may be grouped together into at least one group of threads for which a visibility configuration value is defined for the group as a whole and thus in some embodiments at least one visibility configuration value corresponds to a group of threads of the multiple threads, and the event handling circuitry is responsive on receipt of the event information to adapt its use of the event information such that the event information is not visible to software of threads other than threads in the group of threads which includes the thread which generated the event information when the visibility configuration value for the group of threads including the thread which generated the event information has the predetermined value.
The grouping of threads in this manner may correspond to a range of different logical, security-based, or other chosen groupings, for example in some embodiments the group of threads may be defined to correspond to a given virtual machine identifier being used within the apparatus, where the data processing circuitry is capable of supporting multiple virtual machines which are each identified by such a virtual machine identifier. Where threads are defined to belong to the same virtual machine identifier grouping then they will have visibility of each others' event information.
In some embodiments the data processing circuitry is arranged to perform data processing operations for each thread of multiple threads at a selected execution level of multiple execution levels, wherein each visibility configuration value is not accessible to threads being executed at a lower execution level than the selected execution level. The multiple execution levels thus can be arranged as a privilege hierarchy, according to which higher execution levels have access to the visibility configuration values of lower execution levels but not vice versa.
Indeed in some embodiments each visibility configuration value is not accessible to software of threads being executed at a same execution level as the selected execution level. This may be made use of in particular at the lower end of the privilege hierarchy of execution levels, such that software of threads being executed at lower execution levels can only access their own visibility configuration value.
The multiple execution levels may take a variety of forms, but in some embodiments the multiple execution levels comprise multiple exception levels. In some embodiments the multiple execution levels comprise multiple security levels. Maintenance of the integrity of the privilege hierarchy, whatever particular form it takes, is thus supported by the present techniques in such embodiments.
Whatever form the execution levels may take, in some embodiments the apparatus is arranged to update the visibility configuration value when context switching between execution levels. This also helps to maintain the integrity of the privilege hierarchy when the apparatus context switches.
In some embodiments the data processing circuitry is arranged to perform the data processing operations in response to instructions and to select a subset of the instructions which it executes for profiling, the profiling being on the basis of event information generated for the subset of instructions, wherein the profiling comprises storing to a storage unit profiling data comprising the event information or further information derived from the event information, and wherein the data processing circuitry is arranged to prevent storage of the profiling data when the visibility configuration value for the thread which generated the event information has the predetermined value. The ability to perform profiling for a subset of instructions may thus be supported, whilst still protecting the thread which generated the event information (by setting the visibility configuration value to the predetermined value), since profiling data on the basis of the event information received (for the thread being protected) will not be stored to the storage unit. The manner in which storage of the profiling data is prevented may vary, for example it may comprise excluding instructions from the subset on the basis of the visibility configuration value. It may comprise steps being taken to prevent particular event information (or further information derived from the event information) from being stored as profiling data to the storage unit.
At least some embodiments provide a data processing system comprising the apparatus as set out in any of the above described embodiments and a storage unit.
At least some embodiments provide a method of multi-threaded data processing comprising the steps of performing data processing operations for each thread of multiple threads; storing a set of visibility configuration values, each visibility configuration value associated with a thread of the multiple threads; receiving event information indicative of an event which has occurred during the data processing operations; and adapting usage of the event information to restrict visibility of the event information for software of threads other than the thread which generated the event information when a visibility configuration value for the thread which generated the event information has a predetermined value.
At least some embodiments provide an apparatus for multi-threaded data processing comprising means for performing data processing operations for each thread of multiple threads; means for storing a set of visibility configuration values, each visibility configuration value associated with a thread of the multiple threads; means for receiving event information from the means for performing data processing operations indicative of an event which has occurred during the data processing operations; and means for adapting usage of the event information to restrict visibility of the event information for software of threads other than the thread which generated the event information when a visibility configuration value for the thread which generated the event information has a predetermined value.
At least some embodiments provide a computer readable storage medium storing in a non-transient form software which when executed on a computing device causes the computing device to carry out the above mentioned method.
At least some embodiments provide software which when executed on a computing device causes the computing device to carry out the above mentioned method.
FIG. 1
FIG. 1
10
12
22
20
12
12
12
20
10
10
22
12
schematically illustrates a multi-threaded data processing apparatus in one embodiment. This multi-threaded data processing apparatus has an overall configuration according to which its data processing circuitry performs data processing operations on the basis of data processing instructions. In the example of , the data processing circuitry is represented by the execution pipeline , for which a fetch/issue unit is provided to retrieve a sequence of data processing instructions from memory and to issue these appropriately into the execution pipeline , in a manner in which one of ordinary skill in the art will be familiar. Furthermore, the execution pipeline comprises a final writeback (WB) stage F which causes the result of the data processing operations to be written back to the memory , also in a manner in which ordinary skilled in the art will be familiar. The data processing apparatus is not only capable of executing a single thread of data processing instructions, but is configured as a multi-threaded data processing apparatus, such that multiple threads of data processing instructions can be concurrently handled by the data processing apparatus , and the fetch/issue unit is configured to administer the retrieval and issuance of the instructions for each of these respective multiple threads, and to appropriately issue a next data processing instruction into the execution pipeline for one of these threads. One of ordinary skill in the art will be familiar with the various ways in which a multi-threaded data processing apparatus can handle and switch between its multiple threads, and further detailed description of this aspect of the operation of the data processing apparatus is omitted here for brevity.
12
12
14
12
10
10
10
20
30
FIG. 1
As a data processing instruction progresses through the execution pipeline , the response of the execution pipeline stages (A-F) may result in event information being generated which is passed to the set of counters . There is no particular constraint here on the nature that this event information may take, and it may relate to any aspect of the operation of the execution pipeline , of the data processing apparatus , or indeed to an indication received by the data processing apparatus relating to a component of the wider data processing system (of which the data processing apparatus forms part, for example including the memory and the cache in the example of ).
FIG. 1
FIG. 1
FIGS. 4 and 5
FIG. 1
FIG. 4
FIGS. 2A-C
14
12
12
14
14
14
14
14
14
14
16
PE<m>
One manner in which the event information is used in the example of is by the provision of the set of counters in association with the execution pipeline . Event information indications are received from the execution pipeline by the counters , together with further attribute information associated therewith (for example an indication of the thread which caused the generation of that event information). The counters comprise a set of counter attribution circuitry A together with multiple individual counters B, which in the example of comprise 16 separate individual counters. On the basis of the event information and associated attributes received, the counter attributions can cause at least one of the individual counters B to increment its count. Further detail of the operation of the counter attribution circuitry A is given below with reference to . The particular manner in which the counter attribution circuitry A will operate is defined by the counter configuration unit , which in the example of takes the form of system control registers, and in accordance with the present techniques these can hold the illustrated values EVSEL<n>.MT, EVSEL<n>.SEL and PMCR.MTD the use of which will be described below with reference to . Central to the present techniques is the value MTD (a “visibility configuration value”) for each thread, the use of which will be described below with reference to . PMC refers to the Performance Monitoring unit event Counter and this is stored in the PMCR, which is the Performance Monitoring unit event Counter Register.
10
24
26
10
12
22
12
26
24
20
24
FIG. 1
PE<m>
A further aspect of the configuration of the data processing apparatus in is provided by the profiling selection circuitry and the profiling sample generation circuitry . In order to gather profiling information relating to the operation of the data processing apparatus, in particular with a regard to the manner in which particular instructions are handled by the data processing apparatus , the profiling selection circuitry monitors the instructions being retrieved from memory by the fetch/issue unit and has a configuration to cause selected instructions of those instructions to be tagged for profiling as they pass through the execution pipeline . The profiling sample generation circuitry , for the tagged instructions which have been selected for profiling by the profiling selection circuitry , generates profiling data which it then causes to be stored in memory for later analysis. In order to determine which instructions should be selected for profiling, the profiling selection circuitry also has access to the system control registers, and in accordance with the present techniques in particular the system control register holding the PMCR.MTD, the setting of this value for a particular thread n causing instructions of that thread be opted out of the profiling.
FIGS. 2A-2C
FIG. 1
FIGS. 2A-2C
FIG. 2A-C
14
10
0
3
0
2
3
give an overview of how a set of sixteen individual counters (such as the sixteen counters B in the multi-threaded data processing apparatus of ) may be configured to count events occurring within the multi-threaded processing system, in which four threads are being handled. As labelled in , these four (hardware) threads are represented by PE (processing element) -. As can also be seen in the examples of , threads PE - are running a platform operating system (“Platform OS”), whilst the thread PE is running a dedicated video decoder.
FIGS. 2A-2C
FIG. 2A
FIG. 2A
FIG. 2A
2
3
0
1
0
0
2
0
3
0
1
1
1
2
3
3
0
2
3
0
2
0
2
As can be seen in , each thread (PE) is allocated four counters. In the example shown in two of the counters allocated to each PE are configured for single-thread (ST) counting. These are labelled PMC and PMC . Conversely, various counters have been configured for multi-thread (MT) counting, namely: PMC and PMC for PE ; PMC for PE ; and PMC for PE . The unshaded counters (PMC and PMC for PE , and PMC for PE and PE ) are disabled. In the example of , the control bit MTD has been set for PE to be 1, whilst it has been set for PE - to be 0. This “opts out” PE (i.e. the thread executing the video decoder) from the multi-threaded view of the other threads (i.e. those executing the platform OS). Where this control bit is clear (i.e. zero) for PE -, the data processing operations of each of those threads is visible to the other MT threads in the current MT cluster (i.e. PE -). When the operating setup shown in is implemented by the data processing apparatus by providing one virtual machine (VM) for the platform OS and another for the video decoder, when the hypervisor of the system context switches between these VMs the control bit is updated by the hypervisor along with the state of the guest operating system, so that information from a more secure VM (i.e. the video decoder) can be hidden from the other virtual machine (i.e. the operating system).
FIG. 2A
0
2
3
3
3
0
2
Thus, in the example shown in , the counters configured as MT and allocated to any PE can be used to monitor (i.e. count) the platform OS events (in the figure diagonally hatched top left to bottom right), i.e. events attributable to PE -. PE is running a dedicated video decoder (in the figure diagonally hatched bottom left to top right) which the hypervisor has determined should be protected, and its operation hidden from the platform OS. Hence the control bit MTD has been set for this PE, such that the video decoder events, i.e. events attributable to PE , are visible to PE only, and so are never counted by the counters allocated to PE -. Accordingly, by this use of the MTD control bit for each processing element, multi-threaded event counting can be supported whilst maintaining the security required between the threads being executed.
FIG. 2B
FIG. 2A
FIG. 2B
FIG. 2A
0
2
3
0
2
0
2
3
3
shows a variation on the configuration of , in particular where a 2-bit control value (labelled in this example as MTG) is used to group the PEs together so that multi-threaded (MT) counting can occur amongst PEs which are allocated to the same group. In the example of , the MTG control value is a two-bit value and is set for the respective PEs such that PE - form one group (MTG=0b00), whilst PE forms its own “group” (MTG=0b01). The particular effect of this grouping with regard to the visibility of events attributable to PE - (compared to the example of ) is that events attributable to PE - are now no longer visible to PE . This is due to the fact that PE forms its own “group” (by being the only PE having the MTG value 0b01).
FIG. 2C
FIG. 2B
FIG. 2C
FIG. 2C
0
2
0
3
1
A similar result is produced by the alternative shown in , in which instead of the grouping of the PEs being provided by the setting of the MTG value of , in this is provided by reference to the VMID values, i.e. identifier values attributed to different virtual machines (VMs) which are provided in this multi-threaded processor. In the example of PEs - belong to VM (VMID=0x0), whilst PE belongs to VM (VMID=0x1).
FIGS. 3A-3D
FIG. 3A
0
0
1
1
2
3
0
1
2
2
3
3
show different examples of control values being used to configure the manner in which events occurring for a set of four PEs are counted on four counters respectively attributed to those four PEs. In the example of , the control bit MTD is clear () for PE and PE whilst it is set () for PE and PE . This has the effect that, and noting that all counters in this example are configured for multi-threaded (MT) counting, the counters allocated to any PE will count events from PE and PE , but events from PE are only counted by a counter allocated to PE and similarly events from PE are only counted on a counter allocated to PE .
FIG. 3B
FIG. 3B
FIG. 3B
0
1
0
2
3
1
0
0
1
0
1
2
3
2
3
In the example of , grouping of the PEs for the purpose of event counting and event counting visibility, is achieved with reference to the above-mentioned VMID values. As can be seen in , PE and PE belong to VMID , whilst PE and PE belong to VMID . As a result, and again bearing in mind that all counters in this example are configured for MT operation, a configuration is provided in which counts from PEs in a VMID group are only counted on counters attributed to that VMID group, and the resulting counts are then visible only to PEs within that VMID group. Thus, in the example shown in it can be seen that for VMID group counts of events from PE and PE are made on counters allocated to PE and PE (only), whilst events from PE and PE are counted (only) on counters allocated to PE and PE . There is no cross-counting between the two VMID groups.
FIG. 3C
FIG. 3B
FIG. 6
FIG. 3B
0
1
2
3
0
1
2
3
0
1
2
3
shows a variant on the embodiment of , again using the virtual machine identifier VMID, but in addition using an associated group control bit (VMTD) to further define the visibility of event counts between the two groups. In this example, PE and PE belong to a first virtual machine (VMID=0) and PE and PE belong to a second virtual machine (VMID=1) and correspondingly the value of VMTD set for PE and PE is 0 and the value of VMTD set for PE and PE is 1. As can be seen in , this has the effect, compared to the example of , that additionally events from PE and PE are counted on counters allocated to PE and PE .
FIG. 3D
FIG. 3D
FIG. 3D
0
1
2
2
3
2
3
3
0
Finally, shows an example in which the visibility of event counts between threads is controlled by a use of a mask value (MTMASK) stored for each thread. The MTMASK value stored for each thread is shown at the bottom of corresponding to the “count events on” column for the corresponding thread. The MTMASK values are shown in a little endian format with respect to the thread numbering and it can therefore be seen that no explicit value is stored for the thread itself (and the value is instead indicated in the figure by “x”, which is effectively treated as a set value of “1”). The effect of setting up these mask values with the bit patterns shown in is that events from PE and PE are counted on all counters, whilst events from PE are only counted on counters allocated to PE and PE . The counters for PE and PE count events for themselves and for each other, and in addition events from PE are counted on a counter allocated to PE .
FIG. 4
FIG. 1
FIG. 4
FIG. 1
FIG. 1
FIG. 1
14
14
50
14
52
50
54
56
52
58
60
54
16
56
56
52
56
56
56
56
52
56
52
52
58
60
PE<thread>
shows an example of how the counter circuitry of of is configured in one embodiment. Thus, in the counter attribution circuitry (A in ) is shown by reference , whilst an example counter (B in ) is shown by reference . The counter attribution circuitry comprises event selection circuitry (essentially a multiplexer) and attribution circuitry . The counter comprises an adder and a value storage attributed to this particular counter (label “n”). The event selection multiplexer is steered on the basis of the control value EVSEL<n>.SEL which it receives from the counter configuration unit ( in the example of ). Here “n” corresponds to the particular counter under consideration and thus the EVSEL<n>.SEL value selects one of the received events for the counter <n>. In the illustrated example (where the event selection multiplexer is shown receiving event information from 8 different sources) EVSEL<n>.SEL is a 3-bit selecting value, allowing the selection of one of the eight events. The selected event information (a single bit indicating that an event for which a count may be recorded has been observed) is passed to the attribution circuitry . The attribution circuitry will pass an event count signal for the thread to which a given counter is allocated (as indicated by the attribute value received with that information that event information) on to the event counter without further filtering. However, the attribution circuitry also receives a bit value MT of the EVSEL<n> value indicating whether counter n is currently configured for multi-thread counting. Thus, for event counts received that are attributed to a different thread, the attribution circuitry also determines if the counter is permitted accumulate this count value. If the event counter is configured for multi-thread counting then the attribution circuitry further determines if the MTD bit (given by PMCR.MTD) corresponding to the thread indicated by the attribute information received is set. If this value is set, then this indicates that the thread which generated this event information has been configured to be “opted out” of the multi-thread view of other threads and the attribution circuitry does not pass the indication of the event occurring on to any counter which is not allocated to that thread. However, if the MTD bit is not set for the thread which owns this event information then the attribution circuitry does pass the event (count) indication on to other event counters which are allocated to other threads (and are configured (by the setting of their MT bit) for multi-thread counting). An individual counter then adds (using its adder ) the indication of the event occurrence to its currently stored (in storage ) value for the number of counts seen by this counter for thread n.
FIG. 5
100
102
104
102
106
108
110
108
110
104
shows a flow diagram indicating a sequence of steps which are taken in one embodiment to determine if received event information and attributes should result in an incremented count for a particular counter. New event information and attributes (which may for example simply be a set bit indicating the occurrence of a particular event and an indication of the owning thread) are received at step . Then at step it is determined if the indicated attribution of the event information (i.e. the owning thread) correspond to the thread to which the particular counter under consideration is allocated. If it does, then the flow proceeds directly to step where this event is allowed to increment this counter (NB assuming this counter is currently enabled). If however at step it is determined that the event information corresponds to a thread not associated with this counter, then the flow proceeds to step where it is determined if the counter under consideration is currently configured for multi-threaded counting. If it is not, then the flow proceeds to step and the corresponding counter is not allowed to increment. If however this counter is configured for multi-thread counting then the flow proceeds to step where it is determined if the MTD bit is currently set for the thread indicated by the attribution information associated with this event indication. If this MTD bit is set then the flow also proceeds to step and the counter is not allowed to increment. If however at step it is found that the MTD bit is not set then the flow proceeds to step where the increment of the relevant counter is allowed (assuming that the counter is currently enabled).
FIG. 6A
FIG. 6A
FIG. 6A
FIG. 6A
FIG. 6A
FIG. 6B
150
152
154
156
158
160
162
150
0
152
1
0
3
154
160
150
152
160
164
154
160
0
1
162
162
As described above, some embodiments may make use of a virtual machine identifier (VMID) in place of, or in addition to, the control bit MTD and schematically illustrates the logical internal configuration of data processing apparatus supporting multiple virtual machines. Thus, schematically illustrates an embodiment in which a virtualised operating environment is provided. Two guest operating systems OS A and OS B are shown (but more may be supported, but are not illustrated here for clarity) under the control of which respective applications , , , are executed. Overall control of these guest operating systems and the applications they execute is maintained by a hypervisor which further maintains overall control of the virtualised operating environment and dictates what a particular virtual machine (i.e. guest operating system and the applications it is running) can see and interact with in the system. In the example shown in , guest operating system OS A and the applications which it runs represent a first virtual machine (VM) and the second guest operating system OS B and the applications which it runs can be considered to be a second virtual machine (VM). also schematically illustrates the fact that different components of the system shown operate at different “exception levels” (EL-), which essentially represent different levels of privilege within the system and correspond to the level of control and visibility of other components of the system that a given component has. Thus, a privilege hierarchy is supported with the applications - operating at the lowest level of that hierarchy, the guest operating systems and operating at a next higher level of that hierarchy, and the hypervisor operating at still higher level. Note also that in a further higher level of this privilege hierarchy is shown, namely the secure monitor , which operates at the highest level of privilege supported in the system in order to maintain strict control over the sub-division of the system into a “secure world” and a “non-secure world” to provide a reliable security division between trusted applications/operating systems which may handle security-sensitive data and other applications/operating systems to which such trust is not afforded. This is discussed below with reference to . With particular reference to the present techniques, a given PE (thread) which is executed in order to run one of the applications - will, as described above, have a particular value of a control bit set (which may be a dedicated control bit such as MTD stored in a system control register, or may be represented by the virtual machine identifier VMID (held by the system to identify virtual machines VM and VM), or any of the other variants thereon discussed above). The hypervisor is responsible for context switching between the virtual machines and thus when such a context switch is carried out and the state of one guest OS (and more generally virtual machine) is replaced by another, the hypervisor is also responsible for appropriately switching the relevant control bit (whether embodied as a single per-thread bit, or as a group bit, or as a mask value in accordance with the embodiments described above) such that the desired control over the visibility between threads is maintained. In particular, this ensures that event information (e.g. count values) for a more trusted (secure) virtual machine can be hidden from a less trusted virtual machine.
FIG. 6B
FIG. 6A
164
170
170
172
174
180
182
183
184
170
180
164
164
schematically illustrates the sub-division of the data processing system into the above-mentioned secure (S) and non-secure (NS) worlds. This may be implemented by the use of the TrustZone technology provided by ARM Limited of Cambridge, UK. Control of this sub-division and the transition between the secure and non-secure worlds is maintained by the secure monitor , which therefore itself forms part of the secure world , and in terms of the privilege hierarchy shown in operates at the highest level thereof. Also comprised within the secure world are any guest operating systems which are trusted to operate within this space, e.g. secure operating system , as well as at least one trusted application . The non-secure world comprises the non-secure platform operating system , the hypervisor , and at least one open application . Hence, the division of the system into a secure world and the non-secure world thus represents another example of a sub-division of the system into parts for which event information on one side may require restricting in terms of its visibility for components on the other side. As such, as part of the control which the secure monitor exerts over the system as a whole, it ensures that the visibility configuration value (i.e. control bit, group bit, VMID value, mask value etc.) used for a given thread executed within the secure world is set appropriately such that event information relating to the execution of that thread is not visible (if required) to software of threads operating in the non-secure world. Moreover, the secure monitor further ensures that these values held for threads operating in the secure world are not even visible to threads operating in the non-secure world.
Thus by way of overall summary, in an apparatus performing multi-threaded data processing event handling circuitry receives event information from the data processing circuitry indicative of an event which has occurred during the data processing operations. Visibility configuration storage holds a set of visibility configuration values, each visibility configuration value associated with a thread of the multiple threads and the event handling circuitry adapts its use of the event information to restrict visibility of the event information for software of threads other than the thread which generated the event information if a visibility configuration value for the thread which generated the event information has a predetermined value. This allows multi-threaded event monitoring to be supported, whilst protecting event information from a particular thread for which it is desired to limit its visibility to software of other threads.
In the present application, the words “configured to . . . ” and “arranged to” are used to mean that an element of an apparatus has a configuration able to carry out the defined operation. In this context, a “configuration” means an arrangement or manner of interconnection of hardware or software. For example, the apparatus may have dedicated hardware which provides the defined operation, or a processor or other processing device may be programmed to perform the function. “Configured to” or “arranged to” does not imply that the apparatus element needs to be changed in any way in order to provide the defined operation.
Although illustrative embodiments have been described in detail herein with reference to the accompanying drawings, it is to be understood that the invention is not limited to those precise embodiments, and that various changes, additions and modifications can be effected therein by one skilled in the art without departing from the scope and spirit of the invention as defined by the appended claims. For example, various combinations of the features of the dependent claims could be made with the features of the independent claims without departing from the scope of the present invention. | |
Strategic Horizons: The Information Battlefield of Live-Cast War
During most of history, only those unlucky enough to be on the battlefield or in a sacked city experienced war. To understand armed conflict, the broader public relied on official pronouncements, soldiers’ stories and mythical narratives -- none very reliable. With the spread of literacy and expansion of the popular press, this began to change. A new breed of journalists, war correspondents, followed armies to the very edge of battle. By the time of the American Civil War, stories from the front were often embellished with drawings and engravings. Photography, which had first been used to film military scenes in the Crimean War, made the human cost of battle real in a way that drawings could not -- Mathew Brady's October 1862 photographic exhibition, "The Dead of Antietam," was a landmark at the time and remains moving today.
The 20th century saw an expanded role for war correspondents in shaping public opinion. As photography improved and moving images were added, war became painfully more real to those back home. But it wasn’t until Vietnam, America's first televised war, that scenes of death and destruction were beamed nightly into American homes. To an unprecedented degree, journalists explicitly displayed war's brutality, undercutting public support for the conflict. America's Cold War enemies seized on these images to further tarnish the country’s image abroad. Following this, it took several decades for the U.S. military to again trust journalists enough to embed them with combat units. Even then, there were controls over the images and videos made public. The editors at media outlets still decided what to publish or air, but official pressure could be brought to bear if the pictures or videos endangered military forces or were inimical to national interests. This did not always stop them, but often it did. ... | https://www.worldpoliticsreview.com/articles/12583/strategic-horizons-the-information-battlefield-of-live-cast-war |
When reviewing Dan Jones’s The Plantagenets, I mentioned that although it’s a good book and well worth reading, Jones did not go into a lot of detail, but focused on the big picture and a handful of people and dramatic events. Those who enjoy getting into the nitty-gritty of archaeology, academic studies, and the like, though, will appreciate this book on medieval history, Emmet Scott’s Mohammed & Charlemagne Revisited.
Scott examines the question of what, exactly, terminated Classical, Roman civilisation. Though the fall of the Western Roman Empire is typically dated at 474, it’s not clear when Classical civilisation gave way to what we would recognise as Medieval Europe. The standard view has been that it was a slow decline into the Dark Ages brought about by the Barbarian invasions in the centuries leading up to 474 or so, but Scott defends and updates a theory put forward by Henri Pirenne in his 1937 book Mohammed & Charlemagne, that Classical Civilisation continued until it was quickly destroyed by the Moslem conquests in the early-mid Seventh Century.
Scott spends much of the book examining archaeological evidence that indicates that recognisably Roman architecture and lifestyles continued throughout most of what had been Roman lands up to the Moslem invasions of the Near East, North Africa, and Spain. Rather than destroying Latin culture, the Germanic barbarian invaders had apparently been largely absorbed into it. This is why, for example, Spanish, French, and other Romance languages have little trace of Germanic syntax, whereas English, from one of the few places where Classical civilisation was undone by invading barbarians, is a Germanic language.
Now, the Arabs are often credited with preserving much of Greek philosophy and learning, but Scott demonstrates that men in the so-called “Dark Ages” actually were familiar with the Classics. They were only lost in Europe after the Arab conquest of Egypt, which was the major source of papyrus that Western scribes used, and Arab piracy and slave-raiding made much of the Mediterranean effectively uninhabitable and inhospitable to trade. Scott writes, “even the short periods of official peace [from Arab wars of conquest] were disturbed by the ‘unofficial’ activities of privateers and slave-traders. For centuries, Muslim pirates based in North Africa made large parts of the Mediterranean shore-line uninhabitable, and it is estimated that between the sixteenth and nineteenth centuries alone they captured and enslaved something in excess of a million Europeans.”
As for the fate of the Classics in Moslem lands, Scott is not impressed by their supposed respect for learning. He points out that many of the scholars active in Moslem countries were not themselves Moslem, but Christians and Jews living under Moslem rule. Furthermore, while they did preserve and foster a good deal of science, they were only interested in fields with practical applications, like medicine or physics. Scott is very harsh in his judgement, writing, “the very fact that knowledge has to plead its usefulness in order to be permitted to survive at all speaks volumes in itself. Is not this an infallible mark of barbarism? And we should note that even the utilitarian learning which the earliest Caliphs fostered was soon to be snuffed out under the weight of an Islamic theocracy (promulgated by Al-Ghazali in the eleventh century) which regarded the very concept of scientific laws as an affront to Allah and an infringement of his freedom to act.”
Scott does a fine job presenting all of his evidence in an approachable manner, without ever dumbing-down or oversimplifying things for a popular audience. If you’ve any interest at all in this period of history, I’d highly recommend checking it out. | https://itsollkorrect.com/blog/2015/10/mohammed-charlemagne-revisited-75-books-xlvii/ |
It is no longer news that governors in Nigeria live very good life in and out of office. Apart from working their way up, while still in office, to become senators or ministers, these governors either coax or coerce their states Houses of Assembly to come up with legislations that make them enjoy pension for life.
So far, about 22 states have passed this law, making their ex-governors and their deputies lords after leaving office. These include Abia, Akwa Ibom, Bauchi, Bayelsa, Borno, Delta, Ebonyi, Edo, Gombe, Kaduna, Kano, Katsina, Kogi, Kwara, Imo, Lagos, Niger, Osun, Oyo, Rivers, Yobe, and Zamfara.
In Lagos State, for instance, which was the first to implement this legislation signed by former governor Bola Ahmed Tinubu in 2007, the legislation provides a lot of comfort and convenience for their ex-governors and their deputies.
A breakdown of the legislation titled ‘Public Office Holder (Payment of Pension) Law No 11 Official Gazette of 2007, shows that former governors in the state are entitled to a house each in preferred locations in Lagos and Abuja, the nation’s capital.
The law provides for six new cars every three years, 100 percent of the basic salary of the incumbent governor (N7.7million per annum), and free health care for the beneficiary and his family members.
Read Also : Gunmen Kidnap, Behead Anambra Ex-Lawmaker After Collecting N15M Ransom
Former governors in the state are also entitled to furniture allowance, 300 percent of annual basic salary (N23.3million); house maintenance allowance, 10 percent of annual basic salary (N778,296); utility allowance, 20 percent of annual basic salary (N1.5million), and car maintenance allowance,30 percent of the annual basic salary (N2.3million).
There is also an entertainment allowance which is 10 percent of the annual basic salary (N778,296); and a personal assistant who will earn 25 percent of the governor’s annual basic salary (N1.9million).
We are pained that, amid rising poverty, youth unemployment, inability of most states to pay N30,000 minimum wage, poor roads infrastructure, underdevelopment of rural areas, the states involved have continued to pamper and enrich their ex-governors to this disquieting level.
But there is good news. Some states have decided to stop this parasitic impact on lean state revenues. Lagos State is one, Imo is another. There are rumours of more states taking this cue mainly for reasons of declining state revenues and fading prospects of largesse to share from the federation account.
We are gladdened by the revelation that there are ex-governors with conscience who, ab initio, were not in support of such legislation. Babatunde Fashola, two-term governor of Lagos and Nigeria’s current minister for works and housing, is one of such ex-governors.
Fashola was quoted as saying that he was “morally conflicted” with the idea when it came up for discussion at their State Executive Council meeting where he declined to benefit from the privilege.
Read Also : Two Senators Defect to LP and NNPP
Though, “legalistically speaking” Fashola does not see anything immoral in the legislation which was passed by elected representatives of the people, we nonetheless commend his moral conscience and capacity to endure where he could enjoy.
That, for us, is patriotism and selflessness. It smacks of fellow-feeling and that is what we expect from public office holders, especially now that revenues are falling, economy is contracting and there is general outcry against unwieldy and bogus cost of governance at every level in the country.
Fashola says the real privilege and honour for people in government is the opportunity to serve and we cannot agree more. But it is worrisome that when some people find themselves in public office they see it as an opportunity to live large at the expense of the people they are elected to lead.
When the economist talks about opportunity cost, what he means is the real cost of the decisions or actions we take. He also means foregone alternative. The states that have legislated life pension for their ex-governors and deputies don’t seem to have thought such actions or decisions through.
In most of the states where this legislation is being implemented, it is not only that the new minimum wage of N30,000 for civil servants is not being implemented, but also that even the old minimum wage of N18,000 is being owed in several months. Yet these ex-governors, who are either senators or ministers, are being paid as and when due.
The salaries, cars, houses and furniture allowances given to these people who are enjoying similar opportunities in their new offices are enough to pay over 50 percent of the civil servants. The salaries the government owes them, their inability to pay their house rents, children’s school fees and other bills are the real cost of these needless pension which, in our opinion, is a locust attack on the people’s commonwealth.
While we commend both Lagos and Imo State governments for recognising this pension as a parasite in governments’ lean purse and taking the bold step to yank it off, we call on other states to do the same. The time to do that, especially as economic condition worsens, is today and now.
-Business Day
Watch a funny video below..
This is what @PeterObi forfeited as former governor. Tell me about your candidate again 🤷♂️ Peter is the best man for the job #PeterObi4President pic.twitter.com/emxnQR4pvj
— Udaego Oluwamade (@ekemor) June 21, 2022
I am sure most Nigerians ain’t aware of these barbaric and evil revelation about our so called democracy and politicians who claim to serve us.
Just imagine the first state to start this…lagos state by Bola Tinubu (six cars every 3 years for crying out loud). God bless Fashola for refusing this.
It may also interest you to know that Peter Obi of Anambra State also refused to accept life pension from the state.
Not surprised an impoverished state as Abia is among… Meaning, After spending 8 years as a governor, they get all the aforementioned and still retire to the senate and join that millions to that while there’s no basic amenities in their states and some pensioners die without getting their gratuity…. Tụfịakwa!! This is the major reason we need a president who would cut down to the barest minimum these humongous cost of governance not who would add it more.. | https://jkcyno.com/the-humongous-pension-allowances-for-ex-governors-deputies-video/ |
Washington–(ENEWSPF)–January 11, 2013. Statement of AFT President Randi Weingarten on this year’s Quality Counts report.
“This year’s Quality Counts rankings offer further proof that focusing on collaborative, evidence-based strategies; teaching over testing; and investing in rather than destabilizing public schools is essential to helping all children learn, grow and succeed in life. That’s what the top-ranked states—Maryland and Massachusetts—and the nations that lead the world in student achievement focus on, and it’s what we should be building on.
“These rankings also stand in sharp contrast to StudentsFirst rankings, which prioritized politics and ideology over improved teaching and learning—giving the top-ranked state of Maryland a D+ for failing to embrace the StudentsFirst agenda of testing, sanctioning teachers and divesting from public schools.
“The new report, ‘Quality Counts 2013: The Code of Conduct—Safety, Discipline, and School Climate,’ also makes clear that creating safe, nurturing learning environments is critical to ensuring that teachers can teach and students can learn. And it highlights the dangers of discriminatory discipline practices that disproportionately impact African-American and Latino students and students with disabilities—children cannot learn if they are not in the classroom. The report highlights that educators say they do not have the support of administrators and parents to effectively deal with disciplinary problems.
“Creating safe and nurturing learning environments requires a comprehensive and balanced approach, including interventions that have track records and buy-in from educators, administrators, parents, students and others in the community. Our experience in Cleveland offers one road map to improve safety, order and learning conditions for educators and students. Cleveland implemented a districtwide approach focused on a social and emotional learning program that helps elementary students understand, regulate and express emotions; student support teams for students who exhibit early warning signs, including a referral process to respond to student needs in a timely, coordinated, and effective manner; and planning centers, which replaced in-school suspension with a learning-focused approach that focuses on student needs, helps students learn self-discipline, and aligns with the student support teams and the social and emotional learning programs.
“Over the course of four years, the district reported improved teacher ratings of student attentiveness; improved student attendance; improved student behavior with reductions in disobedient and disruptive behavior, fighting, harassment and injuries; and reduced use of out-of-school suspensions as a disciplinary action. Investing in wraparound services and community schools is another effective solution to creating rich, supportive learning environments and improving neighborhoods.
“The AFT remains committed to confronting problems associated with out-of-school suspension, particularly its disproportionate effect on some students, and to building school environments that help all students succeed.”
Follow AFT President Randi Weingarten: http://twitter.com/rweingarten
# # # #
The AFT represents 1.5 million pre-K through 12th-grade teachers; paraprofessionals and other school-related personnel; higher education faculty and professional staff; federal, state and local government employees; nurses and healthcare workers; and early childhood educators.
Source: aft.org
Related Article: | https://enewspf.com/opinion/commentary/american-federation-of-teachers-statement-on-education-weeks-quality-counts-2013-report/ |
WASHINGTON—Comptroller of the Currency John C. Dugan said today that the OCC is committed to a process of Bank Secrecy Act and Anti-Money Laundering (BSA/AML) supervision and enforcement that is not only effective, but also measured and fair.
"The post–9/11 world is profoundly different in many ways from what it used to be, and that is certainly true in the BSA area," Comptroller Dugan said in a speech before a money laundering conference sponsored jointly by the American Bankers Association and the American Bar Association.
"Whether we like it or not, the traditional concerns of BSA, that, disrupting the money flow of the drug trade and other illicit activity, have been joined with concerns about combating the financing of terrorism," he said.
Mr. Dugan said that neither banks nor regulators could afford to adopt a casual approach to BSA compliance and offered a four-step approach for banks to meet their BSA/AML responsibilities:
- Establish a culture of compliance that begins at the very top and permeates all layers of the organization. It is absolutely necessary that a bank's commitment to BSA/AML compliance start at the board and senior management level, and run through all levels and departments of the institution.
- Know the institution's risks. While different approaches may be appropriate for different institutions, it should begin with a thorough and honest assessment of the bank's products, customers, and service area.
- Design and implement a BSA/AML compliance program that is commensurate with the bank's risks. This is the most critical element of an effective BSA/AML program and an area in which one size does not fit all.
- Pay attention to the examiners. Bankers should always feel free to ask questions, provide feedback, and even challenge an examiner's conclusion through appropriate channels. But when those avenues have been exhausted, and an examiner's criticisms have been reduced to some form of supervisory warning, failing to correct the problem will only result in stronger and more forceful supervisory action.
Mr. Dugan said that the OCC has embarked on a comprehensive review of its supervision to better understand where weaknesses existed, and how to improve them. Although the review is still underway, he described three initiatives that the OCC has already undertaken.
First, the OCC has developed methods for enhanced risk assessment of a bank's products, customers, and geographies. Second, the OCC is applying the new uniform examination procedures in all examinations. Third, the OCC has adopted improved processes to identify and correct deficiencies and weaknesses and to initiate enforcement actions when appropriate.
Mr. Dugan said that the fight against money laundering and terrorist financing "is a marathon, not a sprint, and there is no finish line." Bankers and regulators share in a common goal of better BSA/AML supervision and compliance and both are committed to work together to achieve that goal, he added.
"There will be more challenges along the way, and the road may be rocky at times," Mr. Dugan concluded. "But I believe that, through our collective efforts, we will achieve and sustain a level of BSA/AML compliance and supervision that better ensures our nation's financial institutions are not used as vehicles for money laundering, terrorist financing, or other illicit activity. And I believe that the banking industry, and the nation, will be better for it." | https://occ.treas.gov/news-issuances/news-releases/2005/nr-occ-2005-108.html |
(0) is a family of programming languages by David Madore defined in the 2017-08 blog entry Un peu de programmation transfinie.
Just like with the Amicus language, the goal of these languages is theoretical and educational. The languages are easy to describe and have just enough features to make writing programs in them easy, as long as you don't care about runtime performance at all.
Contents
Description of (0)
(0) has only one basic data type, ordinal numbers.
The language has user-defined named functions. Functions take any number of parameters, each an ordinal, the number of parameters for each function is fixed in the code. Functions return a single ordinal as the return value. Functions can also have additional mutable local variables whose value is also always an ordinal.
Built-in operations include loading or storing variables local to the function, calling named functions, natural number literals, ordinal addition, ordinal multiplication, all six ordered comparisons, and creating and decomposing ordered pairs. Pairs of ordinals are represented as ordinals too.
Recursive function calls are not permitted, functions can only call functions defined earlier in the source code. Control sequences include if-else conditionals, bounded size counting loops, and breaks and returns for jumping out of any number of nested loops or one function early. The counting loops count a loop variable on successive ordinals less than a bound given before you start of the loop, in increasing order. A copy of the loop variable is available during the loop, but assigning to the variable representing that doesn't modify how the loop executes. The loop variable is also available after the loop, keeping either the value when you broke out the loop, or the value of the loop bound if the loop run to completion. On loop iterations where the loop variable is a limit ordinal (an ordinal that isn't zero or a successor), at the start of the loop body, local variables of the function take the value of the limsup of the values of the same variable at the end of all previous iterations of that instance of the same loop. Similarly, when a loop runs to completion and its bound is a limit ordinal, the value of the local variables is the limsup of their values at the end of each loop iteration.
There is no IO, when running a program you're just assumed to run a top-level function with parameters and examine the return value.
Properties of (0)
(0) is a total language, that is, programs always have a well-defined return value for any argument, they never get into undefined states or loops that never end. (This is technically only true if you fix a evaluation order for side effects in expressions, which David's description technilcally doesn't specify, but it seems like the intention is a total language, he just didn't document all the details.)
If you restrict the inputs (arguments to the top level function) to natural numbers, then (0) can compute exactly the primitive recursive functions. In this case, the value of all expressions, local variables, and return values will always be a natural number during the execution of the program, and you don't need to use the limsup rule. The execution trace of the program will be finite in this case.
If you don't use such a restriction on the starting arguments, then (0) is uncomputable, and can in fact simulate any Turing machine, solve the halting problem for ordinary Turing machines, and do computations even more powerful than that.
Extensions
The article also defines a family of other languages that are extensions of (0).
(1)
(1) is like (0) but recursive function calls are allowed. This language is not total, because a function may never return if it gets into an infinite recursion.
If you use the restriction that the inputs are natural numbers, then (1) is Turing complete and no more powerful than that. In this case too, the language can't compute values other than natural numbers.
(2)
For certain ordinals λ that are called admissible ordinals, we define the language (2)λ as similar to (0) except that “unbounded loops” are allowed. An unbounded loop is similar to a bounded loop whose loop bound is λ, except that if the loop runs to completion, then the program is defined to never end (gives a bottom value). An ordinal λ is called admissible if and only if the language defined this way couldn't compute ordinals greater than or equal to λ.
(2)λ is not total.
It is interesting to examine (2)λ only when the inputs are restricted to less than λ. If you allow larger inputs, then (2)λ is as powerful as (0) with the same inputs, because it can compute a value greater than λ and simulate unbounded loops using that.
The simplest case is (2)ω. With inputs restricted to natural numbers, that language is Turing complete. It can only compute natural numbers, and unbounded loops work the same as while loops in ordinary programming languages.
For larger admissible λ, the (2)λ language is uncomputable.
(3)
(3)λ is similar to (2)λ, but allows recursive function calls.
The admissible ordinals turn out to be the same for (2) and (3), but this is hard to prove. (2)λ and (3)λ are equally powerful for any admissible λ, but this is also hard to prove.
with arrays
There's another version of each of the languages defined above that have arrays. Functions can declare array typed local variables. Array local variables are indexed by ordinals, and initially all array elements are zero. Expressions can load or store an element of an array variable with any expression as the index. Arrays have no size limit, they are extended to as far as the program accesses them. You cannot assign entire arrays, nor can you have arrays as arguments or return values. In limit ordinal steps of loops, each element of an array local variable gets its value by the same limsup rule as scalar variables.
When inputs are restricted to natural numbers only, (0) with arrays, (1) with arrays, (2)ω with arrays and (3)ω with arrays have exactly the same power as the same language without arrays. In this case, all values computed are natural numbers, and so all array indexes are too.
When inputs and λ are not restricted to natural numbers, then (0) with arrays, (1) with arrays, (2)λ with arrays and (3)λ with arrays still have exactly the same power as the same language without arrays, but in the case of (0) and (2) this is hard to prove.
History
Just like with Amicus, David didn't bother to name the programming languages. Maybe he thought he couldn't top the name “Юᓂ곧⎔”. The (0) is just a name distinguishing the language from its extended versions. But that name seemed sufficiently esoteric and seems to be yet unused, so I just didn't bother to invent a proper name. | https://esolangs.org/wiki/(0) |
CROSS REFERENCE TO CO-PENDING APPLICATIONS
BACKGROUND OF THE INVENTION
SUMMARY OF THE INVENTION
BRIEF DESCRIPTION OF THE DRAWINGS
DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS
U.S. Patent Application No. ______, filed ______, and entitled, “Cool ICE data Wizard”; U.S. Patent Application No. ______, filed ______, and entitled, “Cool ICE Column Profiling”; U.S. Patent Application No. ______, filed ______, and entitled, “Cool ICE OLEDB Consumer Interface”; and U.S. Patent Application No. ______, filed ______, and entitled, “Cool ICE State Management” are commonly assigned co-pending applications incorporated herein by reference.
1. Field of the Invention
The present invention generally relates to legacy data base management systems and more particularly relates to enhancements for providing access to such legacy data base management systems using a standardized object-based programming language.
2. Description of the Prior Art
Data base management systems are well known in the data processing art. Such commercial systems have been in general use for more than 20 years. One of the most successful data base management systems is available from Unisys Corporation and is called the Classic MAPPER® data base management system. The Classic MAPPER system can be reviewed using the Classic MAPPER User's Guide which may be obtained from Unisys Corporation.
The Classic MAPPER system, which runs on proprietary hardware also available from Unisys Corporation and on an industry compatible personal computer under a Windows Server operating system, provides a way for clients to partition data bases into structures called filing cabinets and drawers, as a way to offer a more tangible format. The BIS (Business Information System) data base manager utilizes various predefined high-level instructions whereby the data base user may manipulate the data base to generate human-readable data presentations called “reports”. The user is permitted to prepare lists of the various predefined high-level instructions into data base manager programs called “BIS Runs”:. Thus, users of the Classic MAPPER system may create, modify, and add to a given data base and also generate periodic and aperiodic reports using various BIS Runs.
However, with the Classic MAPPER system, as well as with similar proprietary data base management systems, the user must interface with the data base using a terminal coupled directly to the proprietary system and must access and manipulate the data using the BIS Run command language of Classic MAPPER. Ordinarily, that means that the user must either be co-located with the hardware which hosts the data base management system or must be coupled to that hardware through dedicated telephone, satellite, or other data links. Furthermore, the user usually needs to be schooled in the command language of Classic MAPPER (or other proprietary data base management system) to be capable of generating BIS Runs.
Since the advent of large scale, dedicated, proprietary data base management systems, the Internet or world wide web has come into being. Unlike closed proprietary data base management systems, the Internet has become a world wide bulletin board, permitting all to achieve nearly equal access using a wide variety of hardware, software, and communication protocols. Even though some standardization has developed, one of the important characteristics of the world wide web is its ability to constantly accept new and emerging techniques within a global framework. Many current users of the Internet have utilized several generations of hardware and software from a wide variety of suppliers from all over the world. It is not uncommon for current day young children to have ready access to the world wide web and to have substantial experience in data access using the Internet.
Thus, the major advantage of the Internet is its universality. Nearly anyone, anywhere can become a user. That means that virtually all persons are potentially Internet users without the need for specialized training and/or proprietary hardware and software. One can readily see that providing access to a proprietary data base management system, such as Classic MAPPER, through the Internet would yield an extremely inexpensive and universally available means for accessing the data which it contains and such access would be without the need for considerable specialized training.
There are two basic problems with permitting Internet access to a proprietary data base. The first is a matter of security. Because the Internet is basically a means to publish information, great care must be taken to avoid intentional or inadvertent access to certain data by unauthorized Internet users. In practice this is substantially complicated by the need to provide various levels of authorization to Internet users to take full advantage of the technique. For example, one might have a first level involving no special security features available to any Internet user. A second level might be for specific customers, whereas a third level might be authorized only for employees. One or more fourth levels of security might be available for officers or others having specialized data access needs.
Existing data base managers have security systems, of course. However, because of the physical security with a proprietary system, a certain degree of security is inherent in the limited access. On the other hand, access via the Internet is virtually unlimited which makes the security issue much more acute.
Current day security systems involving the world wide web involve the presentation of a user-id. Typically, this user-id either provides access or denies access in a binary fashion. To offer multiple levels of secure access using these techniques would be extraordinarily expensive and require the duplication of entire databases and or substantial portions thereof. In general, the advantages of utilizing the world wide web in this fashion to access a proprietary data base are directly dependent upon the accuracy and precision of the security system involved.
The second major problem is imposed by the Internet protocol itself. One of the characteristics of the Internet which makes it so universal is that any single transaction in HTML language combines a single transfer (or request) from a user coupled with a single response from the Internet server. In general, there is no means for linking multiple transfers (or requests) and multiple responses. In this manner, the Internet utilizes a transaction model which may be referred to as “stateless”. This limitation ensures that the Internet, its users, and its servers remain sufficiently independent during operation that no one entity or group of entities can unduly delay or “hang-up” the communications system or any of its major components. Each transmissions results in a termination of the transaction. Thus, there is no general purpose means to link data from one Internet transaction to another, even though in certain specialized applications limited amounts of data may be coupled using “cookies” or via attaching data to a specific HTML screen.
However, some of the most powerful data base management functions or services of necessity rely on coupling data from one transaction to another in dialog fashion. In fact this linking is of the essence of BIS Runs which assume change of state from one command language statement to the next. True statelessness from a first BIS command to the next or subsequent BIS command would preclude much of the power of Classic MAPPER (or any other modern data base management system) as a data base management tool and would eliminate data base management as we now know it.
A further feature of the “state-managed” legacy data base management systems is the opportunity to define, initialize, and execute stored procedures. These are essentially software programs scripted in the command language of the data base management system which may be defined and later initialized and executed upon a subsequent occasion. The very concept of this functionality is inconsistent with the stateless operation of the Internet.
As explained above, even though the legacy data base management system can be made to interface with users via the Internet or other available network arrangement, the user is still required to functionally interface using the unique command language of the legacy data base management system. Quite often, younger users are schooled only in standardized object-based command languages.
The present invention overcomes the disadvantages of the prior art by providing a method of and apparatus for utilizing the power of a full featured legacy data base management system by a user at a terminal coupled to the world wide web or Internet using a standardized object-based command language. In order to permit any such access, the present invention must first provide a user interface, called a gateway, which translates transaction data transferred from the user over the Internet in HTML format into a format from which data base management system commands and inputs may be generated. The gateway must also convert the data base management system responses and outputs into an HTML document for display on the user's Internet terminal. Thus, as a minimum, the gateway must make these format and protocol conversions. In the preferred embodiment, the gateway resides in the web server coupled to the user via the world wide web and coupled to proprietary data base management system.
To make access to a proprietary legacy data base by Internet users practical, a sophisticated security system is required to prevent intentional or inadvertent unauthorized access to the sensitive data of an organization. As discussed above, such a security system should provide multiple levels of access to accommodate a variety of authorized user categories. In the preferred embodiment of the present invention, rather than defining several levels of data classification, the different classes of users are managed by identifying a security profile as a portion of those service requests requiring access to secure data. Thus, the security profile accompanies the data/service to be accessed. The user simply need provide a user-id which correlates to the access permitted. This permits certain levels of data to be accessed by one or more of the several classes of user.
In the preferred mode of practicing the present invention, each user-id is correlated with a security profile. Upon preparation of the service request which provides Internet access to a given portion of the data base, the service request developer specifies which security profiles are permitted access to the data or a portion thereof. The service request developer can subsequently modify the accessibility of any security profile. The utility of the system is greatly enhanced by permitting the service request developer to provide access to predefined portions of the data, rather than being limited to permit or deny access to all of the data involved.
Whereas the gateway and the security system are the minimum necessary to permit the most rudimentary form of communication between the Internet terminal of the user and the proprietary data base management system, as explained above, the Internet is a “stateless” communication system; the addition of the gateway and the security system do not change this statelessness. To unleash the real power of the data base management system, the communication protocol between the data base and the user requires functional interaction between the various data transfers.
The present invention adds state management to this environment. Instead of considering each transfer from the Internet user coupled with the corresponding server response as an isolated transaction event as defined by the world wide web, one or more related service requests may be functionally associated in a service request sequence as defined by the data base management system into a dialog.
A repository is established to store the state of the service request sequence. As such, the repository can store intermediate requests and responses, as well as other data associated with the service request sequence. Thus, the repository buffers commands, data, and intermediate products utilized in formatting subsequent data base management service requests and in formatting subsequent HTML pages to be displayed to the user.
The transaction data in HTML format received by the server from the user, along with the state information stored in the repository, are processed by a service handler into a sequence of service requests in the command language of the data base management system. Sequencing and control of the data base management system is via an administration module.
Through the use of the repository to store the state of the service request sequence, the service handler to generate data base management command language, and the administration module, the world wide web user is capable of performing each and every data base management function available to any user, including a user from a proprietary terminal having a dedicated communication link which is co-located with the proprietary data base management system hardware and software. In addition, the data base management system user at the world wide web terminal is able to accomplish this in the HTML protocol, without extensive training concerning the command language of the data base management system.
In accordance with the preferred embodiment of the present invention, a new command, @SPI (stored procedure interface) is defined for the Business formation Server (BIS)/Cool ICE system. The new command has two primary modes of operation. First, the command provides the ability to execute a specified stored procedure and return the results. This includes the handling of rowsets, input variables, output variables, and input/output variables. Secondly, the command provides a method to query and return meta-data about stored procedures in a data base catalog. The meta-data will provide the available stored procedures as well as information about the parameters for the stored procedures.
Meta-data are data about data. It is a way of documenting data sets. The information contained in meta-data documents the creation of a data set and gives an idea of what the cartographic product to which it is attached was designed to do.
Rowsets are the central objects that enable DB (data base) components to expose and manipulate data in tabular form. A rowset object is a set of rows in which each row has columns of data. For example, providers present data, as well as meta-data, to consumers in the form of rowsets. Query processors present query results in the form of rowsets. The use of rowsets throughout data base systems makes it possible to aggregate components that consume or produce data through the same object.
Without the present invention, the user must write the C code and make the proper API (Application Program Interface) calls to execute the stored procedure as well as handle input, output, and input/output variables. This is a difficult process and requires in depth knowledge of the data base API interface, in addition to the pitfalls of having to develop application code (memory allocation, pointer manipulation, configuring enough variable space, handling input/output variables, etc.). In addition to writing the application code and submitting the proper stored procedure command, users previously had no real mechanism to manipulate any data that is retrieved from the data source.
The present invention provides users the ability to execute a specified stored procedure as well as handle rowsets, input variables, output variables, and input/output variables without having to develop the application code themselves. Developing the code is a very cumbersome process with a lot of room for errors. Furthermore, the developer must be very knowledgeable concerning the API interface in order to correctly make proper calls.
In accordance with the preferred mode of the present invention, the user can access the underlying MAPPER data manipulation capabilities in a JavaScript object-based programming environment. Therefore, programmers knowledgeable in the practices of standard programming languages such as JavaScript can readily apply those skills to utilize the data manipulation and other capabiliti4es derived from the underlying MAPPER engine. Each JavaScript represents a stored procedure of varying degrees of complexity that can be called from various development and application software within the DACS BISNET product suite. Previously, these MAPPER engine capabilities were available using the proprietary MAPPER run-script procedural language.
In the preferred implementation, the JavasScript parser and objects are integrated into the MAPPER engine to support JavaScript stored procedures. The integrated JavaScript parser interprets and executes JavaScript stored procedures, which utilize custom JavaScript objects. These custom capabilities in an object-based, paradigm for dataset manipulation and analysis purposes. Additional custom JavaScript objects are also provided to support the more complex MAPPER core engine “power” function analysis capabilities. JavaScript stored procedures are an alternative to MAPPER run-script, input and output arguments can be passed, and a resulting dataset can be returned to the caller.
Other objects of the present invention and many of the attendant advantages of the present invention will be readily appreciated as the same becomes better understood by reference to the following detailed description when considered in connection with the accompanying drawings, in which like reference numerals designate like parts throughout the figures thereof and wherein:
FIG. 1
is a pictographic view of the hardware of the preferred embodiment;
FIG. 2
is a pictorial diagram of the @SPI command process flow;
FIG. 3
is functional flow diagram for the @SPI command;
FIG. 4
is a schematic diagram showing the BIS and MRIM components;
FIG. 5
is a timing diagram showing the @SPI command execution sequence;
FIG. 6
is a flow chart of the c_spi_n( ) process flow;
FIG. 7
is a flow chart of the n_spi_cmd( ) process flow;
FIG. 8
is a timing diagram showing SPI processing in BIS;
FIG. 9
is a flow chart of the first portion of the n_spi_cmd( ) process flow;
FIG. 10
is a flow chart of the second portion of the n_spi_cmd( ) process flow;
FIG. 11
is a schematic diagram showing the SPI main packet structures;
FIG. 12
is a flow chart of the hdlr_cntl( ) process flow;
FIG. 13
is a flow chart of the SPI-PKT handling for OLEDB;
FIG. 14
is a flow chart of the HND-ODBC handler for SPI_PKT;
FIG. 15
is a detailed flow diagram showing integration of the MAPPER engine with the JavaScript procedures;
FIG. 16
is listing of the script for a typical function; and
FIG. 17
is a listing of the script for value-add power functions.
The present invention is described in accordance with several preferred embodiments which are to be viewed as illustrative without being limiting. These several preferred embodiments are based upon Series 2200 hardware and operating systems, the Classic MAPPER data base management system, and the BIS/Cool ICE software components, all available from Unisys Corporation. Also commercially available are industry standard personal computers operating in a Windows environment.
FIG. 1
10
12
12
12
16
14
is a pictorial diagram of hardware suite of the preferred embodiment of the present invention. The client interfaces with the system via Internet terminal . Preferably, Internet terminal is an industry compatible, personalized computer having a current version of the Windows operating system and suitable web browser, all being readily available commercial products. Internet terminal communicates over world wide web access using standardized HTML protocol, via Web Server .
20
22
14
18
14
14
12
16
14
The BIS/Cool ICE system is resident in Enterprise Server and accompanying storage subsystem , which is coupled to Web Server via WAN (Wide Area Network) . In the preferred mode, Web Server is owned and operated by the enterprise owning and controlling the proprietary legacy data base management system. Web Server functions as the Internet access provider for Internet terminal wherein world wide web access is typically a dial-up telephone line. This would ordinarily be the case if the shown client were an employee of the enterprise. On the other hand, web server may be a remote server site on the Internet if the shown client has a different Internet access provider. This would ordinarily occur if the shown client were a customer or guest.
18
20
24
26
20
24
In addition to being coupled to WAN , Enterprise Server , containing the BIS/Cool ICE system, is coupled to departmental server having departmental server storage facility . Additional departmental servers (not shown) may be sinilarly coupled. The enterprise data and enterprise data base management service functionality typically resides within enterprise server , departmental server , and any other departmental servers (not shown). Normal operation in accordance with the prior art would provide access to this data and data base management functionality.
12
18
14
In the preferred mode of the present invention, access to this data and data base management functionality is also provided to users (e.g., Internet terminal ) coupled to Intranet . As explained below in more detail, web server provides this access utilizing the BIS/Cool ICE system.
FIG. 2
is a functional diagram showing the major components of the @SPI (stored procedure interface) command process flow. This command is a part of the MRI (BIS Relational Interface) set of commands and combines many of the attributes of the previously existing @FCH (relational aggregate fetch) and @SQL (standard query language) commands. However, it is specifically targeted to executing stored procedures.
28
30
34
40
34
38
42
Command set represents the commands defined for processing by MRI. In addition to @SPI, @FCH, and @SQL, @LGN (log on), MRI recognizes @LGF (log off), @DDI (data definition information), @RAM (relational aggregate modify), @TRC (trace relational syntax), @MQL (submit SQL syntax to a BIS data base) as the remaining commands. DAC/BIS core Engine provides the basic logic for decode and execution of these commands. MRI has relational access to data via the data base management formats shown to external data bases . In addition, MRI can call upon remote MRI to make similar relational access of remote data bases .
30
32
36
32
36
BIS core engine executes commands utilizing meta-data library and BIS repository . Metadata library contains information about the data within the data base(s). BIS repository is utilized to store command language script and state information for use during command execution.
@SPI, c, d, lab, db, edsp?, action, wrap, vert ‘sp-syntax’, vpar1 . . . , vparN, typ1, . . . typN.
Fields c and d refer to the cabinet and drawer, respectively, which hold the result. The lab field contains a label to go to if the status in the vstat variable specifies other than normal completion. The required db field provides the data base name. The edsp? field specifies what is to be done with the result if an error occurs during execution.
The @SPI command has the following basic format:
The sub-field labeled action defines what action is to be performed. The options include execution, return of procedures lists, etc. The wrap sub-field indicates whether to truncate or wrap the results. The vert sub-field defines the format of the results. The name of the stored procedure is placed into the sp-syntax field. The vpar provides for up to 78 variables that correspond to stored procedure parameters. Finally, the typ field defines the type of each stored procedure parameter.
FIG. 3
44
54
56
is a high-level functional flow diagram for the @SPI command. The heart of the system is the BIS Relational Interface Module (MRIM) containing much of the logic for the preferred mode of the present invention. It is provided local data/commands from BIS and remote data/commands from Source Remote MRIM . Remote results are forwarded via Destination Remote MRIM .
44
48
50
52
58
BIS includes the BIS Command Interpreter and MOS API Interface which provide the @SPI command to Receiver . The packet is built by element for transfer to MRIM .
58
54
60
56
62
64
MRIM receives remote packets from Source Remote MRIM . The @SPI command packet is received by element , whether local or remote. Remote packets are forwarded via Destination Remote MRIM . Local packets are passed to element for parsing. Control is given to element for switching between retrieve commands and execute commands.
70
72
74
84
86
88
82
90
92
94
Request packets for retrieval are routed to element , , or depending upon whether it requests a list, parameter information, or column information, respectively. Upon the appropriate retrieval, elements , , and look for a retrieval error. If yes, control is given to element for setting the error information before exit. If not, control is given to element , , or for building of the result packet, before exit.
64
66
76
68
78
80
Element routes execution request packets to element for execution of the stored procedure. Element determines whether an error has occurred. If yes, element sets the error information before exit. If not, element builds the output results packet. Element returns the data before exit.
FIG. 4
96
106
108
110
100
102
104
116
118
120
122
124
126
128
112
114
130
98
is a detailed block diagram showing the major components of BIS and MRIM as utilized in accordance with the preferred mode of the present invention. BIS receives command packets as MAP-CMMN , MAP-CLLr , or others . Command List specifies which of the commands are valid and to be executed. These are @LGN (log on), @LGF (log off), @DDI (data definition information), @FCH (relational aggregate fetch), @ RAM (relational aggregate modify), @SQL (standard query language), and SPI (stored procedure interface). These commands are executed using RN-Exec , RN-MRI , and specialized elements , , , , , , and , whereas elements and handle @TRC (trace relational syntax) and information requests. Packets are prepared for all of the listed commands for transfer via interface to MRIM .
96
98
136
132
134
100
138
140
142
144
146
148
152
150
166
168
170
172
174
176
178
180
182
184
186
188
190
192
194
196
198
200
202
204
206
208
210
154
156
158
160
162
164
Interface from BIS to MRIM is handled by MRI-Main . The incoming packets are routed via MRIM_Rcvr and Proc_Req , as appropriate. Each of the listed commands (see list ) is assigned to the corresponding one of the request handlers , , , , , and . After unpacking, switch , controlled by element , routes the information to the appropriate one(s) of the command handlers , , , , , , , , , , and . Data base command access is via the appropriate one(s) of the data base interfaces , , , , , and to the specified one(s) of the available data bases , , , , , and . Internal utilities , , , , , and assist in this process as needed.
FIG. 5
212
214
226
216
228
216
218
230
is a timing diagram for the @SPI command execution sequence. The @SPI command is manually initiated at position . Execution begins and run execution is initiated at position . The switch command is advanced having the form “c_spi_n( )” to position . At that point, the command is parsed and the packets built at element and position . The information is forwarded as “n_spi_cmd)MRICOM*SPI_AUX)” to position , at which time element process the command and calls MRIM.
FIG. 4
FIG. 4
136
220
222
232
224
234
The command is transferred as “mrim_rcvr(auxpkt*)” to MRI-Main (see also , element ) at position . Reformatting to “proc_req(MRI_COMMON*auxpkt*) is found at position , whereat element issued the dispatch based upon the initial command. This is forwarded to position as “n_spi_cmd(auxpkt*MRI_COMMON*)”, where at element builds an SPI packet and passes control to the data base specific handler (see also ).
FIG. 6
FIG. 5
226
236
238
240
252
242
254
is a detailed flow chart of “c_spi_n( )” (see also element ). Entry is via element . The packet structures are defined at element . Element set the MRICOM packet information into the appropriate fields (see format ). The options and sp-syntax are obtained, options validated and packet information entered by element (see format ). An error exit is provided with the error designations shown for a finding of invalidity.
244
246
248
250
Element sets the SP parameters and provides an error exit and designation, if required. The packets are setup and processed at element . Element handles any errors present. Exit is via return .
FIG. 7
FIG. 5
216
218
256
258
260
145
262
284
264
286
is a detailed flow chart showing “n_spi_cmd( )” flow (see also , position to ). Entry is at element . Element clears the BIS status variables, and element checks if the packet space is sufficiently large. If not, error message MGM is generated. The packet size is determined by element (see also element ) and allocated by element (see also element ).
266
268
294
270
296
272
288
274
290
276
294
278
280
282
The packets are setup and initialized by element . Element transfers the spi information (see also element ). The variables are entered at element (see also element ). These variables are counted at element (see also element ). RIM is called at element with the packet formatted as shown by element . Element captures the output parameters (see also element ) providing an error exit as shown. The hard error return is via element . However, assuming a normal execution sequence, element releases the temporary memory assignment, and normal exit is via element .
FIG. 8
298
300
302
304
304
is a detailed timing diagram showing execution of @SPI within the BIS component. The process is initiated at position . The “c_spi_n( )” packet is transferred to the MRI run at position . At that point, the MRICOM and SPI_A packets are built. “extract_v(SINT, SINT, SINT)” is transferred to rn_subr at position . Next, “n_spi_cmd(MRICOM*, SPI_AUX)” is transferred to MAP-SPI at period . The “fun_vars( )” variables are also fetched for transfer at position .
304
310
304
306
From position “get_core(LINT, LINT, LINT, LINT)” is transferred to mapalloc at poisition for building of the SPI packet to be utilized by MRIM. In the interim, “i_buf_pkt(MRI_COMMON*o_but_struc*.MRICOM*” is transferred from position to position . Simultaneously, “p_outa_buffer(MRI_COMMON*0_buf_strucd*) is also transferred.
312
306
306
304
304
302
304
306
308
310
Element calls the MRIM process at position . The output buffer results are returned from position to position and from position to position , as shown. Transfers “run_aff_vbl_load(Sint, L08*SINT)”, “b_err_rpt(o_buf_struc*L08)”, and “rel_core(L08*.LINT, LINT)” are initiated at position . The error report is built between positions and , as needed. The temporary memory assignment is released at position .
FIG. 9
314
316
318
320
is a detailed flow diagram for the “n_spi_cmd( ) flow. Entry is via element . Element sets the aux pointer to the SPI_AUX structure. Various initialization tasks are performed by element . Element checks for supported data base corresponding to @SPI request. An error exit is provided if the request specifies a non-supported data base.
322
324
326
342
328
330
332
FIG. 10
The spi packet is built at element . Element performs the setting of various flags. Having initialized the process, element switches to the logic for processing the particular request. Defined are the S, P, C, and E options. If any of these are requested, control is given to element , which continues processing at . If none of these options are requested, the request is in error and control is given to element for capture of the error status. Element checks for “chk_kt_error( . . . )”. The parameters are retrieved from the spi packet at element .
334
336
338
340
Element builds the FINAL_LINE return status. The parameters are added to the output buffer at element . Element release the temporary memory assignment, and exit is via element ,
FIG. 10
FIG. 9
FIG. 9
344
354
364
372
374
376
378
380
382
is a detailed flow chart for the processing of valid SPI requests (see also ). As explained above, options S, P, C, and E are defined. Option S (list) is initiated at element . Element builds the SPI packet with the list command. A call is made to initiate the list schema at element . Element fills the DBS structure with the schema rowset information. The DBS rid col is initialized at element . Element sets up the dummy packet and forces the horizontal display. The header lines are built at element . If no error is found, element fetches the data and output lines. Exit is from element . Processing continues at connector “A” in .
346
356
366
Element initializes the P (i.e., parameter) option. The SPI packet is built with the parameter command at element . A call with the parameter schema is made at element . The remainder of the P option processing is similar to the S option processing.
350
358
368
The C (i.e., column information) option is initialized at element . Element builds the SPI packet with the column command. The call made at element involves the column schema. The remainder of the C option command processing is as discussed above.
352
360
362
370
384
Element initiates the E (execution) option processing. Because this option actually performs the execution of the stored procedure, it is somewhat different from the S, P, and C options which are associated with preparation for execution. The SPI packet is built with the execution command at element . Element adds the needed execution parameters. A call for the execution is made at element . The packet is filled and initialized as discussed above. Element sets up the dummy packet. The remainder of the processing is as discussed above.
FIG. 11
386
390
394
396
400
402
404
406
388
398
is a detailed view of the main SPI packet structures. Table shows the format of the auxiliary packet. This points to the MRI COMMON data structure shown as view . View shows the format of the SPI auxiliary packet, with view showing the format of the associated variables. The modified SPI packet is shown in view , with the main packet shown in view and the variables shown in view . Element shows the variable length of the packet. The corresponding data structures are shown in views and .
FIG. 12
408
410
412
414
is a detailed flow chart of the handler process. Entry is via element . The request is set active at element . Element switches on the command type. If not local, control is passed elsewhere for remote and/or error processing. If local, control is given to element for determination of the requested data base type. Defined for the preferred mode of the present invention, are ODBC and OLEDB. Any other designation results in error processing or switching to other capability.
416
418
420
422
424
ODBC requests are made through handler . Similarly, OLEDB requests are made via handler . Element provides for direct call of other data base handlers. Clearing of the active request is made at element , and exit is via element .
FIG. 13
FIG. 12
418
426
428
430
is a more detailed flow chart for OLEDB handler operation (see also , element . The handler is initiated at element . Normal setup is performed at element . Element switches on packet type. Again, list, parameter, column, and execution command packets are defined. Other command packets result in an error exit as shown.
432
434
442
444
436
438
Element performs the switching for the defined request types. The list schema is accessed by element . The rowset is fetched at element and exit is via element . The parameter schema is accessed by element , with further processing as previously discussed. Similarly element accesses the column schema, which is completed as discussed.
440
446
448
450
The execution parameters are bound by element . Element performs the actual execution. Error checking is performed by element . Exit is via .
FIG. 14
FIG. 12
416
452
454
456
458
is a more detailed flow chart of the ODBC handler (see also , element ). Entry is via element . Normal setup is accomplished by element . Element determines whether the requested command type is defined. As explained above, list, parameter, column, and execution commands are currently defined. An error exit is provided for any undefined command types. Packets containing defined command request types are switched by element .
460
468
476
462
470
478
Element sets up the variables for the API call for a list command request. Element fetches the rowset. Exit is via element . Variables for parameter command requests are set up by element . Element fetches the SQL rowset. Exit is via element .
464
472
480
466
474
482
Variables for the column API call are set up by element . Element fetches the corresponding rowset. Exit is via element . Element binds the SQL parameters for the execution command request. The actual execution is performed at element . Exit is via element .
FIG. 15
488
494
486
492
486
490
484
is a detailed flow diagram showing integration of JavaScript with the MAPPER engine. In accordance with the preferred mode of the present invention, procedures , scripted in JavaScript, are provided via pathway to MAPPER engine as JavaScript objects. The JavaScript parser assists in redefining this script as necessary via pathway . This JavaScript procedure is reduced to MAPPER core functions by MAPPER engine . These functions are transferred via pathway to MAPPER for execution as native MAPPER command language script.
FIG. 16
is a listing of the script involved in a typical function.
FIG. 17
is a listing of the script for value-add power functions.
Having thus described the preferred embodiments of the present invention, those of skill in the art will be readily able to adapt the teachings found herein to yet other embodiments within the scope of the claims hereto attached. | |
Tourist Routes started construction work for viewing platforms and more in 2015. First stage to be finished in 2017, last stage to finish in 2020 with spectacular and safe viewing platforms.
Hardangervidda National Park is the largest national park in Norway. This vast mountain...
An exciting experience centre for Norwegian nature, climate and environment with...
2.5 hours roundtrip through dramatic nature by coach. Starting in Eidfjord, stop at...
The Hauge Centre is beautifully situated on the quay by the fjord in Ulvik. You will get...
Regional museum for Hardanger, exhibiting Hardanger embroidery, traditional costumes and...
Idyllic listed hamlet with 30 buildings ranging from the Middle Ages to present-day. The...
Folgefonna National Park was established in 2005 and is one of 42 National Parks in...
The beautiful power station at the fjord is a monument of the hydropower adventure...
A visitor centre has been set up at a fullyoperational aquaculture unit, the first of its...
Kabuso has temporary exhibitions, concerts and other arrangements through the year. The...
Family friendly maritime museum emphasizing activities and open workshops. You...
Scenic roads for exploring Norway’s breathtaking landscapes - comprising selected...
One of the most popular waterfalls in Norway. The Steinsdalsfossen has a fall of 50 m...
Driving in Hardanger takes you to the waterfalls (“foss” in Norwegian). The most famous...
The Furebergfossen waterfall is situated along route 551 between Årsnes and Sunndal. The...
The church was built between 1200 and 1250, and is famous for its healing crucifix still... | https://en.hardangerfjord.com/highlights/voringsfossen-p1571743 |
Showing a dramatic increase in terrorism and the potential dynamics of the international system which becomes an important issue to be discussed is quite important. Terrorism is the democratization of the political dynamics and the level of political instability; however, it suggests that a systematic economic ties with dynamic handling, such as the level of income. The level of democratization of the country and political instability increased size seems to be decreasing with decreasing size of terrorist violence.
Terrorism today examining how the situation came to a global threat issue on the concept of terrorism in the debate so far raised in the basis of different approaches from each other ‘trouble of definition’ suggest. 9/11, 2001 attacks in the United States and world public opinion to the twin towers began a new era in the fight against terrorism. During this period, the state of the world aspire to act together against global terrorism, it has also brought with it the appropriate grounds to create their own global interests of the actors. When the post-2001 developments are assessed in the fight against terrorism, terrorist activities; cover the despotic administration was faced with the idea of making the state the legitimate grounds.
What is terrorism? In fact, the definition of terrorism is difficult as it is simple. If you made a subjective definition; it is very simple; it is very difficult in case of an objective definition, perhaps even impossible. Some of the more simple the national and state based on a result of which is the definition of which is difficult, especially on an international scale. More simple words, states easier when determining whether violence in terror of their own; the definition of terrorism in the context of international violence cannot be explicitly expressed. The definition of terrorism is the most obvious indication of the differences in the international community’s understanding of terrorism and have to 109 definitions 1936-1981 varied between. Today that number with the emergence of a new kind of terrorism, such as cyber-terrorism is certainly the increase. Many descriptions made about terrorism can be summarized as follows: The concept of violence and terrorism are acts of use of force. Terrorism is often political purposes. The aim of terror to frighten, to intimidate, to intimidate; the terrorist threat is one method.
The expectation of the terrorists, the result is mainly psychological envisaged. The aim of terrorism is not necessary to have a connection between the victims of terrorism. Purposeful, planned, systematic and organized terrorism action is a method of fighting terrorism strategy and tactics. Terrorism is an unusual action; accepted rules is contrary to law and morality; It is detached from human thought; As a result of terrorist acts, they are usually done on some claims and blackmail; force of terror, extortion, prints heavy head subjugation qualifications; The purpose of terrorism, their ads are doing propaganda. Terrorist organizations are confidential and covered underground organization. Terrorist actions are symbolic and carries a message for others; terror is arbitrary, it is non-personal prints haphazard nature of the heavy; the repetition of actions, and you will be prompted to last in a series of violent campaign to gain a qualification. Terrorism does not discriminate in terms of victims, and the majority of the victims, civilians who join the battle, rebel without unbiased leftovers, nothing to do with terrorists are not the priorities are innocent; terrorism, political purpose is to kill the guy. Terrorism is a crime.
In today’s world the main factor that separates the North and South, is thought oriented economy. At the root of global terrorism and economic, political, social and economic inequality that cause unbalanced globalization. Both countries both within and across countries make evident those who react negatively affected by the terrorist attacks of inequality caused by this imbalance should not be ignored can show through. In the identity problems of globalization, perhaps the most kick met with that the place where most of the Arabs’ causes in the Middle East being the tool of imperialism and globalization are a serious opposition to this exhibit. In these results, the pressure exerted by the western values against reactionary stance this way in some places connect to the authentic identity, mostly led to more religious approach.
In addition, one of the most effective weapons in the prevention of international terrorism is legal. States international law is an effective tool in preventing terrorism to the extent that they comply with international law. Government applications of international law alone, not hypothetical, it remains obvious as an abstract and meaningless concept. It is due to the lack of state administration, despite the fact that many international conventions on terrorism concluded terrorist acts are still pending. Its part in the fight against terrorism is international law. Age of renewing itself as a science is to take measures against new development contracts with various international law against all types of terrorism.
Rising dramatically terrorism attacks on a global scale and threaten the security of the international system more every day. With the end of the Cold War, unipolar structure that dominated in the 1990s, it was relatively stable in terms of the terrorist activities of the international system; but especially in the post-2001 period, it is seen that a dramatic increase in terrorism by some people. Reaching devastating poverty in regions where terrorism, such as non-democratic practices and economic and political instability also is at the forefront of political issues, it raises the economic and political dynamics of terrorism would be. However, examples of which reached alarming dimension of terrorism also marked characteristics exhibited by are the same economic and being valid for all countries are faced with the political circumstances of the terrorist attacks also gives signals, and cannot be reduced to a single flat-terrorist activities. In other words, it is questionable whether the economic and political dynamics of terrorism, which have a significant problem in the international system. the intensification of terrorist activity or triggering point in the empirical literature creates fertile ground for the detection of possible dynamic; income level, economic factors such as the level of human development and income distribution inequality; democratization level, form of government, political status and spatial factors such as geography and political factors such as political instability has come to the fore.
However, factors such as human and financial costs of terrorism with the dynamics of the population of the country are also analyzed as control variables. Terrorism likely political dynamics of political instability, the country with the kind of regime of fundamental rights and freedoms; in other words, it seems to be at the forefront of factors such as levels of democratization, and is a common opinion in question would bring peace for the democratization of international politics. Terrorism development level among prospective economic dynamics, it is observed that the distribution of income inequality and unemployment as the elements come to the fore.
Problem of terrorism, is one of the most controversial problems are not new, particularly in terms of maintenance on historical movements increased violence today. Closer inspection of the people historically the terrorist phenomenon dates back to the community, is seen as the first period when they started to take his life. However, to despite the historical reality on the concept of terrorism that so far it is not possible to say that everyone agreed made a general description. Therefore, the first issue of terrorism has been done in this regard should be possible to handle in a common axis. Today, all over the world, threaten at any moment to come out of everyday life which has become a global problem. In particular, developments in the aftermath of September 11 are interpreted as the most important indicator of the global dimension of terrorism reached a ghost. Recent terrorist attacks that occurred in New York, Istanbul, Madrid, London, Moscow, Baghdad, Jakarta and dozens of innocent people die innocent than many other parts of the world. Besides, at any moment as a potential terrorism threat in the form of probability is everywhere, ready to explode at the global level even pose a threat to humanity. In this regard, the level reached in need of terrorism, as well as reach if the threat to be taken seriously as a potential agent of state government is forced to produce immediate solutions.
Since cooperation cannot be achieved at the desired level in the international arena, in coming to a threatening position on global terrorism as in the past by some states today in view that support for use of terror against each other in connection with the ideological and strategic account has justified many examples. Especially during the Cold War struggle between the Soviet Union and the United States are examples of this. The phenomenon of terrorism as an instrument of certain states, as part of their ideological and strategic plan has been used in different purposes. Such an attitude to terrorism today as a result of reaching a global concern is donor level qualifications. Today, in the face of global threats as terrorism cases governments to take effective measures to scientists, politicians, the media and it seems inevitable to establish the joint perspectives of other related sectors.
Finally, the population of the country considered as an important control variable in the study of terrorism is also considered among the factors likely dynamics of terrorism. Terrorist attacks, to escape routes, the large population in the region can use to hide their financial operations and organization members. In this case, the fight against terrorism more difficult to increase the size of the high population of the terrorist attacks on the violence which has caused the effect is considered to be a factor.
As a result of political instability in countries where the line stage of the severity level of terrorism, the anti-democratic practices and is at the forefront of political and economic-based disorders such as poverty and shows that take place in a relatively problematic geography of these countries. However, when samples are taken into account all the countries, terrorism is political; it is difficult to avoid a qualitative generalization regarding the economic and spatial dynamics.
From 11 September 2001 to be taken important steps in the fight against international terrorism during the period together for quite a while and when terrorism, what violence is apparent is expected to get some goals will continue to be a global problem. The cause of terrorism to the fight against terrorism needs to be very well known. Considering that one of the causes of global terrorism and the global economic injustice and inequality of work needs to be done about it. Terror not made the necessary arrangements will continue to remain the world’s agenda for a long time and will be one of the determining powers.
There is no doubt emerge and development of terrorism, such causes and effects mentioned above, offers important clues to how the problems we are facing in terms of our understanding that arise. However, these measures are to be taken up is also important to understand the problem. Regardless of what measures will be taken, however, continue to exist as long as the causes that give rise to terrorism will continue the existence of this problem. In particular, we assume the political and social inequalities created by globalization will continue in the future, it looks more like a long time problem of terrorism will not fall off the agenda.
Aladağ, I. (n.d.). TERÖRLE MÜCADELEDE ULUSAL VE ULUSLARARASI HUKUK İHLALLERİ: BİR ÖRNEK “AB” .
Arsava, A. (2008). BM Güvenlik Konseyi’nin İnsan Haklarını Koruma Rolü ve Güvenlik Konseyi’nin Yetkilerinin Dayanağı ve Sınırları. Uluslararası Hukuk ve Politika , 1-15.
AYDIN, D. (2006 ). Terör Eylemlerinin Siyasal Suç Açısından Değerlendirilmesi. Uluslararası Hukuk ve Politika , 1-20 .
AYHAN, H. (2007). The Terror Concept and Approach of United Nations on Terrorism after 2001 in the Framework of Security Council and General Assembly . Journal of Security Strategies, 117-147.
Bal, İ. (2006 ). Terör, Terörizm ve Küresel Terörle Mücadelede Ulusal ve Bölgesel Deneyim. Ankara : Uşak Yayınları.
Bozkurt, E. (2007 ). Uluslararası Toplumun Paradoksu: Terörizm, İnsan Hakları, Güvenlik ve 11 Eylül Sonrası Meydana Gelen Değişimler. Ankara : Asil Yayın .
Cebeci, M. (2012). Defining the “New Terrorism”: Reconstruction of the Enemy in the Global Risk Society. Uluslararası İlişkiler Dergisi, 33-47.
Chossudovsky, M. (tarih yok). Amerika’nin Terörizme Karşı Savaşı . İstanbul : İmge Kitabevi Yayınları .
Cihan Aksan, J. B. (2013). Weapon of the Strong-Conservations US State Terrorism. Pluto Press.
Cox, M. (2002 ). American Power before and after 11 September. Blackwell Publishing.
DOĞAN, G. (2010 ). International Criminal Court and the Dilemma on Crimes of Terrorism: An Evaluation for the Resolution. Istanbul.
Drummond, D. (2005). Global Terrorism.
Hatice Topkaya, A. K. (2013 ). Terörün Finansmanı ile Yeni Dönemde Mücadele . Maliye Uzmanları , 64-77.
Jetter, M. (2014, September ). Terrorism and the Media. Germany .
Küçükcan, T. (2010). Terörün Sosyolojisi: Toplumsal Kökenleri Anlama İmkânı. Uluslararası İlişkiler Dergisi, 33-54.
Masters, Z. L. (2009). The İslamic State .
Orhan Gökçe, U. D. (2004). Terörün Görüntüleri ve Görüntülerin Terörü. Konya: Çizgi Kitabevi Yayınları.
Ovalı, Ş. (2006 ). AB’nin Terörizmle Mücadele Politikasındaki Dönüşüm: 11 Eylül ve Madrid Saldırılarının Etkileri . Ankara Avrupa Çalışmaları Dergisi , 77-102 .
Ozderen, I. B. (2010). Dünyadan Örneklerle Terörle Mücadele. Ankara: Karınca Yayınları.
ÖZTÜRK, M. Ç. (2012 ). The Only Thing We Have to Fear: Post 9/11 Institutionalization of In-security. Uluslararası İlişkiler Dergisi , 49-65.
Sezgin Kaya. (2005). INTERPOL, EUROPOL ve Uluslararası Terrorism. Güvenlik Stratejileri Dergisi, 31-49.
Triandafyllidou, A. (2015 ). European Muslims: Caught between Local Integration Challenges and Global Terrorism Discourses. Yugoslavia .
YILMAZ, E. S. (2013). Uluslararası Terör İncelemelerinde Güneydoğu Asya Bölgesi. Istanbul.
Sezgin Kaya, INTERPOL, EUROPOL ve Uluslararası Terrorism. Güvenlik Stratejileri Dergisi, 31-49. | https://www.ilimvemedeniyet.com/global-terrorism-terrorism-and-911-attacks.html |
Academic and personal behaviors: Practice in action
There are many ways to support the development of students’ academic and personal behaviors. Here are some examples of best practices in New York City schools.
Included Resources
This analytic study looks at lessons learned across the ten New York City schools that participated in the 2013-14 Academic and Personal Behaviors Pilot. Schools in this pilot focused on teacher growth mindset practices and their effect on student persistence.
Bronx Leadership Academy II staff developed a reflection tool for students to improve their own learning processes.
Coalition School for Social Change staff developed a rubric for students to assess their own efforts.
I.S. 229 Roland Patterson staff developed a teacher-student conference model for goal setting and follow through related to growth in writing skills.
P.S./I.S. 268 staff developed a reflection process and rubric for systematically assessing student growth.
Soundview Academy for Scholarship and Culture staff developed a system for assessing and giving feedback on key student behaviors and mindsets.
Flushing International High School staff developed a series of activities for students to reflect on off-site internships.
School for Classics: An Academy of Writers, Performers, and Thinkers staff developed a “desktop rubric” to support self-regulation and work habits.
This case study examines how the NYC Lab Middle School used self-reflection to support students build writing skills and and academic behaviors.
Frontline video examines a series of indicators in middle school that can predict how likely a student is to drop out of high school. | https://www.weteachnyc.org/resources/collection/academic-and-personal-behaviors-practice-action/ |
Rescripting Social Trauma: A Pilot Study Investigating Imagery Rescripting as an Adjunct to Cognitive Behaviour Therapy for Social Anxiety Disorder
ConclusionsTaken together, findings suggest that IR may be a valuable adjunct to GCBT for SAD, especially among patients with comorbid unipolar depression. However, further research including a follow up period is indicated.
Source: Cognitive Therapy and Research - Category: Psychiatry & Psychology Source Type: research
Related Links:
Online computer or therapist-guided cognitive behavioral therapy in university students with anxiety and/or depression: study protocol of a randomised controlled trial
Introduction Emerging adulthood is a phase in life that is associated with an increased risk to develop a variety of mental health disorders including anxiety and depression. However, less than 25% of university students receive professional help for their mental health reports. Internet-based cognitive behavioural therapy (iCBT) may entail useful interventions in a format that is attractive for university students. The aim of this study protocol is to test the effectiveness of a therapist-guided versus a computer-guided transdiagnostic iCBT programme with a main focus on anxiety and depression. Methods and analysis Unive...
Source: BMJ Open - Category: General Medicine Authors: Klein, A., Wolters, N. E., Bol, E. J. M., Koelen, J., de Koning, L., Roetink, S. S. M., van Blom, J. J., Pronk, T., van der Heijde, C., Salemink, E., Bolinski, F., Riper, H., Karyotaki, E., Cuijpers, P., Schneider, S., Rapee, R. M., Vonk, P., Wiers, R. W. Tags: Open access, Mental health Source Type: research
The effect of depression on treatment outcome in social anxiety disorder: an individual-level meta-analysis
Cogn Behav Ther. 2021 Oct 7:1-32. doi: 10.1080/16506073.2021.1966089. Online ahead of print.ABSTRACTSocial anxiety disorder (SAD) is highly comorbid with depression. In the present meta-analysis, we conducted the first individual-level examination of the association between pre-treatment depression and improvement in social anxiety symptoms during treatment. We identified eligible studies on cognitive behavior therapy (CBT) and pharmacotherapy for SAD and contacted authors to obtain individual-level data. We obtained these data from 41 studies, including 46 treatment conditions (n = 4,381). Our results showed that individu...
Source: Cognitive Behaviour Therapy - Category: Psychiatry & Psychology Authors: Naama Rozen Idan M Aderka Source Type: research
Body dysmorphic disorder: a treatment synthesis and consensus on behalf of the International College of Obsessive-Compulsive Spectrum Disorders and the Obsessive Compulsive and Related Disorders Network of the European College of Neuropsychopharmacology
Body dysmorphic disorder (BDD) is characterized by a preoccupation with a perceived appearance flaw or flaws that are not observable to others. BDD is associated with distress and impairment of functioning. Psychiatric comorbidities, including depression, social anxiety, and obsessive-compulsive disorder are common and impact treatment. Treatment should encompass psychoeducation, particularly addressing the dangers associated with cosmetic procedures, and may require high doses of selective serotonin reuptake inhibitors* (SSRI*) and protracted periods to establish full benefit. If there is an inadequate response to SSRIs, ...
Source: International Clinical Psychopharmacology - Category: Psychiatry Tags: Review Article Source Type: research
This article reviewed the development, progress, current status, and future direction of cognitive behaviour therapy (CBT) in Japan. First, the history of CBT in Japan was briefly reviewed, including a description of the development of two major societies and their respective journals: the Japanese Association for Behaviour Therapy (later renamed as the Japanese Association for Behavioural and Cognitive Therapies) and the Japanese Association for Cognitive Therapy. Second, we reported on the existing evidence relating to CBT in Japan, including randomised control trials for depression, social anxiety disorder, obsessive &n... | https://medworm.com/880474671/rescripting-social-trauma-a-pilot-study-investigating-imagery-rescripting-as-an-adjunct-to-cognitiv/ |
Fry in batter – cook fish straight from frozen according to package directions. … Cooking – if using thin fillets/steaks (maximum 3cm), the fish can be cooked from frozen. If thicker fillets/steaks are used, be sure to thaw before cooking.
Should frozen fish be thawed before frying?
According to the USDA, it’s perfectly fine to cook raw foods from frozen, but you’ll need to increase your cooking time by about 50% to fully cook them. … Never thaw seafood frozen at room temperature.but refrigerated overnight, according to the USDA.
How long do you cook breaded frozen fish?
Conventional oven
- UNCOOKED. KEEP FROZEN UNTIL READY TO COOK.
- Preheat the oven to 425°F.
- Arrange on a metal baking dish.
- Cook 25-28 minutes total* Turn after 15 minutes.
- *FULLY COOK FISH TO AN INTERNAL TEMPERATURE OF 165°F OR ABOVE BEFORE SERVING.
Can you pan fry frozen fish?
If you are breading the fish, you can place it completely frozen in a pan and cover it with a thick layer of breadcrumbs and spices. Cook twice as long as you would fresh fish. …Frozen fish can take twice as long to cook as fresh fish, but you still save time by skipping the defrosting step.
Why you should never thaw frozen fish in vacuum packaging?
When vacuum-packed fish is not properly stored and thawed it has the potential to create a deadly toxin that can harm consumers. Fish is a known source of the bacterium Clostridium botulinum type E. This bacterium is a spore generator that can grow at temperatures above 38 F and without oxygen, such as vacuum packaging.
Can you cook frozen breaded fish in a deep fryer?
FRYING: PLACE THE FROZEN FILLETS IN BATTERY IN A OIL FOR APPROXIMATELY 6 TO 7 MINUTES OR UNTIL DONE. FOR BEST RESULTS, DO NOT OVERFILL THE FRYER BASKET OR OVERCOOK. DRAIN ON PAPER TOWEL AND SERVE.
How do you make frozen breaded fish taste better?
Add the vegetables and noodles after making sure the fish has been properly heated. The fish absorbs the marinade quickly, usually in less than 15 minutes. Best spices for cooking with fish: basil, thyme, tarragon, bay leaf, sage, oregano, paprika, ginger, chili powder, dill and fennel.
How do you know if breaded fish is cooked?
The best way to tell if your fish is cooked is to test it with a fork at an angle, at the thickest point, and gently turn. Fish will crumble easily when cooked and it will lose its translucent or raw appearance. A good rule of thumb is to cook the fish to an internal temperature of 140-145 degrees.
Should fish be rinsed before cooking?
Food safety experts (including us at USDA) it is not recommended to wash raw meat and poultry before cooking. Many bacteria are quite loosely attached and when you rinse these foods the bacteria spreads through your kitchen.
Can you cook frozen breaded fish?
Can you cook frozen fish? Yes! Now that I’ve figured out how to cook frozen fish, there’s a lot less freaking out parties trying to figure out dinner. Since learning this technique, I make sure I always have fillets or portions of fish in the freezer ready to go in the oven at any time.
Why should you remove fish from its packaging before thawing it?
By opening the package when thawing the vacuum-packed fish, oxygen is present and the spores will not produce the vegetative cells that produce the toxin. Listeria monocytogenes is a bacterium that can contaminate food. …Vacuum-packed fish is not commercially stable or shelf-stable and must be refrigerated.
What is the best way to thaw frozen fish?
Key points to remember
- Start with solidly frozen fish. Do not pre-thaw in the refrigerator.
- Do not remove the vacuum packaging before defrosting. Thawing “naked” fish under water makes it waterlogged.
- Use only cold tap water to thaw, as this minimizes the risk of bacterial growth.
- Use thawed fish immediately to ensure the best results!
Can you thaw frozen fish on the counter?
Don’t: Let your fish thaw on the counter Going from the freezer to room temperature can not only change the texture of your fish, but it can also lead to the growth of bacteria on your fish. | https://worthyrecipe.com/can-you-bread-and-fry-frozen-fish/ |
- Vibrant neighborhoods, numerous parks, renowned restaurants and a lively music & arts scene.
- Salary
- DOE commensurate with experience, education, and equity
- Closing date
- Jul 24, 2022
View more
- Position
- Physician-Scientist, Medical Oncologist, Oncologist / Hematologist, Faculty Member
- Category
- Breast, Clinical Research Oncology, Clinical Trials Research, Gastrointestinal, Genitourinary, Laboratory-Based Research, Medical Oncology, Multispecialty, Thoracic, Translational Research, Lung
- Hours
- Full Time
- Education
- MD, MD / PHD
Job Details
Several exciting opportunities have been created for experienced cancer researchers (M.D., Ph.D.; M.D.; Ph.D.) to join the Department of Cell, Developmental & Cancer Biology (CDCB), Division of Hematology & Medical Oncology in the Department of Medicine, and the Knight Cancer Institute, as an Assistant, Associate, or Full Professor, at Oregon Health & Science University in Portland, OR. Ideal candidates will have a successful basic research program investigating either tumor cell-intrinsic or – extrinsic mechanisms of cancer progression and/or response to therapy, with a translational focus in thoracic, breast, melanoma, or genitourinary malignancies or other solid tumors, and accomplishments commensurate with experience. Applications from creative, motivated and forward thinking individuals who work well in a collaborative fashion across disciplines, in the context of a highly dynamic environment, and with a passion for affecting changes to the outcome of cancer in humans are invited.
The successful candidate will be expected to develop an independent basic and highly translational research program that will achieve national and international recognition, and will be closely aligned to clinical research efforts in a manner that is prospectively designed to improve the clinical outcome for people with or at risk for cancer. Creative leaders who are also team players are sought.
The laboratory will reside in close proximity to other basic/translational scientists within the new Knight Cancer Research Building. This rich working environment will allow for access to a wide range of scientific equipment and collaborators. The candidate will be expected to seek both intramural and external funding. They will also take on occasional teaching assignments within the university, consistent with the education mission of the institution.
The duties of this position include:
- Scientific Project Oversight – Direct laboratory research projects, including identification of scientific problem, design of approach to address it, and identification, acquisition and management of resources to perform investigations. Assign personnel, track their progress, ensure maximum productivity, and foster supportive teamwork.
- Laboratory Research Project Management - Independently develop and manage a research program, inclusive of research experiments, determining the most suitable methods to be used. Interpret and perform complex data analysis on experimental results and determine whether they are consistent with goals.
- Scientific Writing and Grant Management - Prepare research findings for presentation at scientific meetings and conference and manuscripts for publication. Prepare research proposals for grant applications that are aligned with the mission of the Knight.
- Laboratory Organization and Compliance - Develop and implement procedures and systems to maximize the organization and efficiency within designated projects. Aid in the submission of specific protocols to the Institutional Review Board and other regulatory review boards, as appropriate.
- Collaborative Interactions - Develop, foster and maintain relationships with investigators in the Knight’s Prostate Cancer Program, partners in academia and in the pharmaceutical/biotechnology industries including relevant clinical researchers. Oversee the advancement of specific sponsored research agreement (SRA) funded projects and ensure that external partners receive regular project updates. Participate in occasional teaching assignments. | https://careercenter.asco.org/job/7614729/assistant-professor-associate-professor-professor-focus-in-solid-tumors/ |
We arrive in the desert during a sandstorm, with the world misty and white and blurred. Through the clouds of swirling sand, a lone oryx eerily appears, watches us intently, then vanishes, swallowed up by the landscape. "Did you see that?" someone asks. "Or did I imagine it?"
Deserts are always filled with so much emptiness, it's sometimes hard to know what's real and what isn't. The absence of every distraction that clutters modern life can be overwhelming; it's little wonder the human mind so often starts creating mirages to fill the space.
But this time, that oryx was real, and the storm, which has now left fresh dunes of soft sand piled waist-high against the walls of our lodge. This is the Namib, one of the earth's great deserts, as well as its oldest. Stretching 2000 kilometre along the Atlantic coast of the southern African country of Namibia, it pushes into Angola to the north, and South Africa to the south.
It is said to be around 80 million years old and is home to the world's last truly nomadic desert cultures, and to only the hardiest of wildlife. It's also a truly stunning place, a living breathing landscape that defies all expectations.
For some, it is a terrible beauty; one that can so easily wipe out footprints and bury signs of human habitation as casually as a sudden rise – or drop – in temperature, and a wind pulsing in from the ocean. For others, like me, it's exhilarating.
It's something about those great empty panoramas where the only landmark is the curvature of the earth. It's those clear night skies where the stars light up the world, and you're suddenly aware of your own blinding insignificance. And it's the simplicity of a world racheted down to a struggle for water and food, and the purity and honesty of a life stripped bare.
Singly, these all offer the peerless promise of adventure, wilderness and romance. Together, they add up to one of the most special of experiences. For deserts are magical, mystical places that never fail to surprise. Whether they're in Africa, the Middle East, Asia, South America, Australia or Antarctica – technically the driest desert on the planet with so little rain – they can be thrilling, mesmerising and inspiring, and each in a completely different way.
And while the earliest explorers returned home – if they were lucky – with terrifying tales of loneliness, hardship, thirst, hunger and often unfriendly locals, these days travellers can explore deserts, such as those below, each of which I have experienced, in great comfort, safety and wonder.
NAMIB DESERT, NAMIBIA
The Namib is truly the great-great-granddaddy of all deserts. Vast, mostly uninhabited and with scenery that ranges from stony plains ringed by towering mountains, to seas of rippling sand and some of the largest and most spectacular dunes in the world, it's a far greater treasure than all the diamonds that lie beneath.
At the pale pink and burnished ochre sand dunes of Sossusvlei, near the coast south west of the Namibian capital, Windhoek, our guide asks how much life we can see. We shake our heads: nothing. He frowns.
"You have to work harder in a desert to see the life going on everywhere," he says. "You look once and you see nothing. You look again and ..." He crouches down on a sand dune and levers up with his pen a tiny trapdoor of sand on the surface.
Then he digs down with his hands. A few minutes later, a spider as big as his hand leaps out of its hiding place towards us. He listens to our screams with ill-disguised satisfaction, then points out the tracks on the sand of that dancing white lady spider, as well as a golden mole, a dune lark, a Cape hare, a scorpion, a shovel-snouted lizard, a scaly-feathered finch, a desert mouse.
The dunes are lined up like an army of advancing soldiers. Some march purposefully forward, while some swirl elegantly towards the sky and others rise steeply from the plain. There's a trail of people walking up Dune 45, but we move on to the one called Big Daddy and set off along its ridgeline.
After an hour of plodding higher and higher, we start wondering how we'll get down again. The guide points casually down the sheer slope to our right. "You walk or run or roll down," he grins. We laugh, thinking he's joking. He's not. Gingerly holding hands, we end up walking down, sinking deeper into the sand with every step, sending a flood of sand before us down on to white salt and clay pan at its foot.
It's an experience repeated a few days later on a dune at another location, Serra Cafema, up north on the Angolan border. This time, we start trudging down the sheer face when we hear a plane fly over, and again and again. Except it's not a plane. The snarl of jet engines we thought we heard were simply the signature of the "roaring dunes": the hollow echoing bellow of sand rubbing over sand.
That sand is an absolute kaleidoscope of colour throughout the 81,000-square kilometre Namib. In parts, like along the Skeleton Coast to the north – where Mad Max: Fury Road, the fourth in the series, was recently filmed – it's bleached white, ghostly and pale. In others like around Damaraland further south, it's a pale, frosty pink. At other spots it's a deep burnished gold, while up at Etosha further east, the landscape is often a dazzling white and grey.
Invariably, those colours provide a wonderful backdrop to the wildlife all the way through, from the desert-adapted elephant, giraffe, oryx and ostrich to the wealth of birdlife, including flamingos, even seals where the desert sands meet the coast.
DON'T MISS The sand dunes at Sossusvlei; quad-biking across the mountains and dunes of Kunene; visiting the traditional cattle-dung huts of a Himba village in the middle of absolutely nowhere and wondering how on earth they manage to survive there.
ESSENTIALS Fly to Namibia with South African Airways from Perth to Johannesburg, and then connect to Windhoek. The Classic Safari Company has a range of itineraries to suit different interests and budgets. Phone 02 9327 0666; see classicsafaricompany.com.au; flysaa.com/au; namibiatourism.com.na.
The writer was a guest of The Classic Safari Company and South African Airways.
WADI RUM, JORDAN
I'm lost in a Lawrence of Arabia reverie as my camel glides across the rose sands of the glowing desert of Wadi Rum in southern Jordan, close to the border with Saudi Arabia. Craggy cliffs, or jebels, tower to either side of me, the plain sweeps majestically on in front and, on a second camel beside me, sits a dashing Bedouin tribesman, all flowing white robes, fluttering headdress and sparkling dagger tucked safely into his sash.
He holds up a hand, and I endeavour to pull up my camel. I wonder what's happening. Are we now close to the small cairn carved with a likeness of T.E. Lawrence that's a must for all visitors to this area? Has he seen danger ahead? Or is there yet another magnificent sight he wants to draw my attention to?
It's then I notice: he's on his mobile. While the desert is still pretty much as it was in Lawrence's day, nothing can stop progress marching on for the traditional inhabitants of this protected area, nicknamed The Valley of the Moon.
But it is often only convenience that's been introduced, with phone coverage, 4WDs to travel in, and the odd flushing toilet. They do barely interrupt the more traditional wonders – the banks of sand to scramble up, great rock formations to climb, caverns to explore, gorges to walk through, the camel transport and that beautiful pink tinge to the landscape to marvel over.
For a relatively compact desert, an hour and a half from Petra, the World Heritage archaeological site, there's a great deal to see, including petroglyphs and archaeological remains and there's also great trekking, along with the camel rides.
But perhaps the most fascinating time spent in Wadi Rum is the chance to commune with the Bedouin. They run a variety of desert camps, from large-scale formal accommodation to a series of boutique tents actually inside the 74,000-hectare protected area, with a shared bathroom a short stroll away across a dune.
Meals are each an event, with carpets spread over the communal tent floor, and everyone eating off silver trays laden with stews cooked in underground pits, soups, dips and meats. Often there'll also be singing and dancing and story-telling, usually outside, under the stars of the clear night sky.
"We're simple people," says my host and guide, Obeid Naser Al-Amamreh. "We like to talk and we like to laugh. This is our home, we know the spirits of this place. We'll never leave, but we like to show visitors how we live how we've always lived."
DON'T MISS camel riding across the Wadi Rum; listening to the night desert sounds from the simple tent; trying to remember the words of the Australian national anthem before an appreciative Bedouin audience.
ESSENTIALS Fly to Abu Dhabi on Etihad Airways from where there are daily connecting one-hour flights to the Jordanian capital Amman. Obeid Naser Al-Amamreh can pick up from Amman and also runs tours to Petra, the Dead Sea and Aqaba. Phone +962 795 840672; seewadirumtrips.net
SIMPSON DESERT, AUSTRALIA
I'm sitting on top of the tallest sand dune in the biggest sand dune desert in the world, looking out over a vista filled with long, perfectly parallel sand dunes – more than 1100 apparently – and I haven't had to leave Australia to experience it. We have a selection of some of the choicest deserts on the planet, and yet most of us leave travel in our own backyard till last.
I'm looking out at what looks like an endless ocean of fiery red waves, as the sun slowly slips down past the horizon. Simply stunning, and only a 40-minute drive from the Queensland outback town of Birdsville.
The 176,000-square kilometre Simpson is only Australia's fourth-biggest desert, yet it's certainly its most dramatic. Those burning red dunes are a desert-lover's delight, while there are few better events than pre-dinner drinks on one of the ridges of the 40-metre high Nappanerica Dune, or Big Red, watching a sunset. The Simpson crosses into Queensland, South Australia and the Northern Territory, and is steeped in the history of the country's first pioneers.
Going to see it is a joy for 4WD-ers, for those on one of the many tours available of central Australia, and for others who take the shortcut and fly into Birdsville. The town itself is a frontier oasis in the far south-western corner of Queensland, trembling on the edge of the Never-Never, where four of the most barren deserts on the globe all end – the Simpson, Sturts Stony Desert, the Tirari and the Strzelecki.
"It's a place of real extremes," says Nell Brook, who lives there with her husband, David, a third-generation cattleman from the area. "If you don't respect the desert, and don't value it, it will probably swallow you up. But we feel very blessed to live so close to nature, and to be able to appreciate its beauty."
DON'T MISS Drinks at the Big Red; driving The Outback Loop, which links the Birdsville Track and the Strzelecki Track with stops at the Birdsville Hotel and the old Innamincka Hotel; visiting the Dig Tree of the fateful Burke and Wills expedition
ESSENTIALS Most people who visit the Simpson drive in 4WDs as part of a big outback trek, but you can take an organised driving or plane tour, or fly from Brisbane to Birdsville via Rex. See rex.com.au; queensland.com
SAHARA, NORTH AFRICA
After six nights sleeping under the stars, and on the sands, of the Sahara, I was ready for a break. The next village, I was reliably informed, had a small inn. I was excited. It wasn't so much the prospect of a real bed; it was more the thought of a shower. The inn-keeper was welcoming and carefully presented me with an old Coca Cola bottle filled with water. I was bewildered – until I understood this was my allocation for washing for the next night and day.
That was over 30 years ago and these days the facilities tend to be a lot more sophisticated in the world's biggest desert. Covering a quarter of the African continent, it stretches from the Red Sea to the east and Atlantic to the west, from the High Atlas Mountains of the north down through Sudan to the south.
But still you treasure the smallest of joys. Catching sight of a group of Tuareg tribesmen dressed in vivid indigo-blue astride galloping white horses through the Ahaggar mountains of Algeria. Clambering up towering sand dunes. And spotting desert roses, the pink rosette clusters of crystals and sand.
Now, the best place to experience the Sahara is in Morocco, the traditional home of camel caravans setting off to traverse the sands. Just a one-day bus trip from Marrakesh, Merzouga is a great base for exploring Erg Chebbi, a wonderful array of sand dunes.
DON'T MISS An overnight desert excursion that gives you the chance to sleep under the stars; sitting around a fire admiring the clear night skies; climbing some of the dunes.
ESSENTIALS Emirates flies to Casablanca, and there are plenty of flights to Errachidia, just 120km from Merzouga, or book the trip via a company like The Classic Safari Company. See emirates.com
THAR DESERT, INDIA
After pushing your way through the teeming streets of Delhi, fighting off the touts to pay your respects to that monument to love and peace, the Taj Mahal, and battling the crowds in Rajasthan, the desert comes as blissful relief. Mind you, the 320,000sqkm Thar Desert, shared between India and Pakistan, with India having the lion's share, is quite unlike many of the other world's great deserts. For a start, it's the most densely populated desert on earth and, in parts, it's actually rather less a study in beautiful serenity, and rather more a scruffy, unkempt extension of its nearest cities.
My favourite desert entry point, for instance, is far from its most scenic. Just outside the "Golden City" of Jaisalmer, it's mostly thorn scrub but the magical part is looking back at the stunning fortress, now a UNESCO World Heritage Site, rising from the flat plains up the dizzying cliff face. Further in, however, it does become more picturesque, with sand dunes beginning and camels careening around to see them.
And if you happen to catch a desert festival – that's an exceptional time. A riot of colour, noise, rich fabrics, snake charmers and camels dressed up for the occasion. It's India at its mad best.
DON'T MISS Looking out for glimpses of the mysterious Tuareg; sundowners on the dunes; evenings of song from desert tribesmen.
ESSENTIALS Fly to New Delhi with Singapore and then either hire a private driver for a trip to Rajasthan, or book a complete itinerary through a company like The Classic Safari Company. See singaporeair.com
FIVE MORE DESERT-LOVERS
JON MUIR, ADVENTURER
Australian adventurer Muir was first person to walk across the continent of Australia without resupply or any external support. His films and books include Alone Across Australia.
"Deserts are so clean and pure and simple with sublimely big expanses of sky. They're extreme, with an otherworldly feel, but they have a subtle beauty and you have to be wide open internally to get the most out of each experience. I've travelled on foot through a lot of deserts, and finding water has always been really special, especially when you desperately need it! In the Tirari, Australia's driest desert in its worst drought, I was devastated to find an old waterhole dry. But then I looked up and saw water coming from a rock, and that was the most exquisite feeling of elation. The desert can have you in total dejection one moment and in utter joy the next. It's all about the extremes."
ANDREW JACKSON, VISUAL EFFECTS EXPERT
Jackson is the visual effects supervisor on Mad Max: Fury Road, the fourth in George Miller's series that was filmed in the Namib in 2012. The film is expected to release this May.
"The Namib Desert locations were amazing – dunes, rocky canyons and mountains – and all within two hours of our base in Swakopmund [Namibia's second city]. I fell in love with the desert landscape. We were almost disappointed when we saw plants as we loved how stark and bare it looked. I like the description 'the earth stripped bare'. It's as though the desert magnifies every experience and everything you encounter. The sand dunes are almost like creatures, too. They move around and change so much. It's a remarkable place."
RICK SMOLAN, PHOTOGRAPHER
National Geographic photographer Smolan travelled with Robyn Davidson on her epic 2700km desert camel trek, recently made into the movie Tracks. His latest photographic book is Inside Tracks.
"As an American, beauty was lush green rainforest. But I remember going into that desert and it was as if I'd been wearing sunglasses my whole life and I'd taken them off and everything was so clear and vibrant. The intensity of that light! Before, I'd seen the desert just as a backdrop to a gorgeous girl on an exotic trip. Then I realised it was full of life and colour and plants and beauty, with the topography changing every three miles. And in an Australian desert you have an hour or two of ghost-like twilight after the sun goes down that's mesmerising. I remember one night around a campfire with Robyn looking up and seeing 60 sets of eyes looking at us through the darkness. I thought I was hallucinating. But they were emus who'd appeared from nowhere."
ROLF DE HEER, FILM DIRECTOR
De Heer has spent a lot of time in Australian desert landscapes, making films such as The Tracker, Ten Canoes and Charlie's Country, which has just won the Film Critics Circle of Australia's Best Film and Best Director awards.
"There's always such a feeling of history in our deserts, a kind of evolutionary anthropological history. There's also an unspoiltness about the desert that thrills. It's edgy but generally embedded with great beauty. It's wondrous to see how Aboriginal people particularly have great skill in surviving in those deserts, something we don't have. I was recently taken up to Innamincki near where Burke and Wills perished. When you get there, you understand why that happened. My God! The intensity of their undertaking in such a harsh environment ... extraordinary!"
TIM COPE, ADVENTURER AND GUIDE
Australian Cope spends most of his life travelling, or writing books and making films. His latest book is about his three-and-a-half year trip by horse from Mongolia to Hungary, On the Trail of Genghis Khan, An Epic Journey Through the Land of the Nomads.
"Kazakhstan's Betpak Dala, which means 'starving steppe', is not the iconic desert we all think of but it is perhaps my favourite. High on a dry plateau of moonscape rock, salt lakes, and scant vegetation, it is a cold, arctic-type sea of ice and snow in the winter that plummets to -40 degrees and in the summer is rendered a waterless oven with no shade to speak of. And yet it is also a veritable garden to those few who have inhabited it over the centuries. Here, I came to understand that in a world of scarcity, of relative deprivation, the smallest things can mean the world. In a world of urban abundance, by comparison, the small things in life are rendered meaningless."
FIVE MORE GREAT DESERTS
ATACAMA, CHILE
Is one of the driest places on earth yet one of its most amazing sights are boiling geysers springing from the sand, and warm pools of spa water. It feels the strangest sensation to be bathing or even cooking an egg on the water there, but that adds to the bizarreness of the whole desert experience.
ARABIAN, MIDDLE EAST
One of the biggest stretches of sand in the world, the best countries to see it in are the United Arab Emirates and Oman. Choose your time carefully. In the summer the winds can make it like sitting in front of a hairdryer blasting sand into your face.
KALAHARI, BOTSWANA, NAMIBIA AND SOUTH AFRICA
Ranging from semi-arid land to sand to seasonal wetlands, this is the desert with perhaps the greatest concentration of wildlife, including lion, leopard, cheetah, antelope, ostrich and wild dogs, and a wide range of birdlife.
CHIHUAHUA, MEXICO AND THE US
This is possibly the desert we're all the most familiar with since so many TV series and movies are set here, either in the border region or in Mexico where filming is cheaper. Scrubby with lots of grasses and shrubs, it's the home of the magnificent Sierra Madre mountain range.
ANTARCTICA
Surprisingly, the continent containing the South Pole region is technically a desert since it receives the least amount of rainfall and, at almost twice the size of Australia, it could arguably be considered the world's biggest. It's a stunning sight, 98 per cent covered in ice, but choose your time to visit; its record temperature is -89C. | https://www.traveller.com.au/worlds-10-most-incredible-deserts-1lzvo6 |
Water Lily Pond 2
Fine art giclee print called Water Lily Pond 2 by the French Impressionist painter, Claude Monet (1840-1926). Monet's primary love was to paint outdoors - working quickly to capture the fleeting colours and tones of the landscape.
Monet returned to the theme of Water Lilies many times, in his effort to capture the variations of colour and tone caused by the fleeting, changing light of nature. See all our Monet pictures here
Available as a giclee print on paper or as a canvas print. Giclee prints display exceptional detail and vivid colour and are created using the finest digital printmaking technology available. Our stretched canvas prints are on archival canvas using archival inks - the finest prints available. | http://workart.co.za/monet/monet-water-lily-pond-2 |
An Overview Of The Undergraduate Dissertation Proposal Structure
Upon graduating from college, it is often preferred that students propose experimentation, whether this is a written, verbal or artistic application, of a chosen topic related to their field of study showcasing the level of knowledge and skillset the undergraduate has honed. This is known as an Undergraduate Dissertation Proposal or thesis.
Know Your Topic
While the technical aspect of formulating a proposal is imperative, it is mostly important that the undergrad selects a subject that suits their proficiencies and compliments their commitment to the project. However, the results of their examination should not solely benefit them, but a demographic or even a populace. The idea should offer a solution to a problem or propose further alternatives for an underdeveloped experiment.
Now that the student has chosen the topic in which to conjure supporting research for, there are a few pieces of documents that must be included in the proposal:
Introduction
- Title Page
- Abstract
- Outline
- Introduction
Think of this as a cover letter to a résumé. It should include the student’s name, date of submission, the topic, college name, and to whom the proposal is being presented.
Brief summary of how the student is prepared to address the issues of the subject
Table of Contents of the proposal
This is the most important part of the structure because summarizes the context of the project. Be sure to include the thesis statement and any research questions in this introduction.
Approach
- Processes
- Results & Plans
- Implications
- Bibliography
The student should explain how the research was concluded such as procedures, tools, or resources used.
Related to the trials, any errors, observations or discoveries made must be referenced to in the conclusion along with the next steps in which the student will take to test for new findings.
Are there any challenges the student might face when doing research? If so, what does he/she plan to do not to be setback by negative results?
To cite one’s studies provides a guideline to the scholar on which route to take based on the initial results and constitutes credibility of the student regardless of what the outcome may be.
Whether it is by choice or a prerequisite to graduate, any form of documentation being presented or submitted to a committee for approval must follow a set of guidelines that qualifies it as readable and exquisitely deliberated upon.
Looking for academic paper writer? Visit: My Paper Writer and get your papers written from scratch. | http://www.thaistudies.net/the-structure-of-an-undergraduate-dissertation-proposal |
DADAA recently launched a new exhibition space, the Side Gallery, with an exhibition by DADAA Fremantle studio artist Simon Marchment, Exodus Through Art. This exhibition presents a series of paintings which express the artist’s personal connection and experiences of place, both real and imagined.
You can visit the exhibition Monday – Friday, 10am–4pm until August 13.
The Side Gallery at DADAA Fremantle sits alongside the main gallery and will feature a program of exhibitions throughout the year. The gallery will promote new works by West Australian and Australian artists, with a focus on artists working within DADAA’s arts program, or artists with a lived experience of disability and/or a mental illness.
This space aims to create opportunities for first time exhibitors or artists wishing to showcase a body of work that they have had in development. Open to all mediums, works will be selected from artists through an open call for applications and an assessment panel.
We are currently taking applications for 2022. If you are interested in applying you can find out more here. | https://www.dadaa.org.au/tag/11/ |
Due to technical difficulties, we are not able to process Photo IDs until further notice.
Before coming to the Facilities & Studio Services office ( 51 McCaul St. 2nd Level) please call
(416) 977- 6000 Ext. 0 and we will notify you if our equipment is up and running.
Thank you for your understanding
Facilities & Studio Services
Summer Term Locker Rental starts Tuesday,May 15, 2018.
Omar Badrin, alumnus from the Interdisciplinary Master's in Art, Media and Design and the 2015 IAMD GradEx Medal Winner was awarded one of three Melissa Levin Emerging Artist (MLEA) Award, administered by the Textile Museum of Canada. The MLEA Awards helps emerging artists conduct self-directed activities such as art production, apprenticeships, residencies or research. The award is in memory and honour of Melissa Levin (1958-2015), an artist, mentor and teacher whose career as a textile and costume designer was synonymous with exuberant love of colour and pattern.
Omar's first commercial solo-show, "Lul!", is on now at Birch Contemporary Gallery until April 21, 2018. For more details: http://birchcontemporary.com/exhibition/new-works-5
More about Omar: http://www.omarbadrin.com
OCAD U’s Health & Wellness and Campus Life units, along with a number of student groups, will host Bell Let’s Talk Day in the lobby of 100 McCaul Street from 11 a.m. to 2 p.m. Pop over and say hi, have some hot chocolate, tea and treats, enjoy some giveaways, get some self-care tips, and join the conversation to help end the stigma of mental illness.
Two exhibitions created by OCAD University faculty and students have been included in the Toronto Design Offsite Festival Features, a juried selection of the ten shows not to be missed.
Hacking Black Futures
Date: January 17 to February 12, 2018
Location: Band Gallery and Cultural Centre
19 Brock Ave., Toronto, ON
This exhibition presents design speculations on Black-centric societies that are devoid of oppression, discrimination, and systemic racism. What do these societies look like? How do they function? How can these futures be achieved? Participants provide opportunities to explore these questions in an immersive and collaborative environment.
Works of design speculation across a variety of mediums are on display, including prototypes, videos, and interactive experiences. Co-curators, Andre Baynes and Chiedza Pasipanodya showcase the intergenerational talents of twenty OCAD University Black-identified designers/makers and partners.
The Hacking Black Futures exhibition aims to directly address the erasure of Black people in speculative design as well as represent the growing ownership of our own future narratives and practices of making.
Designing for Health, Wellness, Action and Destigmatization
Date: January 16 to 21, 2018
Location: OCAD U Great Hall
100 McCaul St., Toronto, ON
This exhibition by the Faculty of Design’s undergraduate and graduate Design for Health and Wellness students includes a ‘how to’ guide’ for pop-up supervised injection sites (SIS) in response to the urgent need to provide safe spaces for those risking overdose, alongside re-imagined Naloxone (opioid overdose antidote) kits for various public locations.
Another group of Design students created solutions for independent learning and play for students with cognitive and physical impairments. A shortlist of the most successful projects will be on display, several of which have been manufactured and donated to a special needs school. Design students gained empathy through observation and benefitted from feedback of the teachers and occupational therapists working with the children.
This research project is supported by St. Clements School and the OCAD U Research and Innovation office.
Festival Features is a shortlist of 10 events, exhibitions, and/or window installations selected by a jury. The criteria for selection is entirely up to each juror, while considering the calibre of the work or event program, and appeal to a general public and specialist audience. This year’s jurors are Anahita Azrahimi (Toronto Outdoor Art Exhibition), Nina Boccia (Design Exchange), and Brendan Cormier (Victoria and Albert Museum).
Visit the exhibition listing in the Festival Schedule to learn more about the exhibition.
All incoming Canada Post mail addressed to OCAD University will be held by Canada Post from Friday, December 22, 2017 to Tuesday, January 2, 2018. The final day for pickup of outgoing Canada Post mail from departments on campus is Friday, December 22rd between the hours of 8:30 AM and 2:00 PM. OCAD U Staff can still drop off Canada Post mail at Distribution Services, located at 100 McCaul, room 239 up until 4:00 PM.
Inter-University Transit System
For IUTS, Inter-University Transit system, service, CANPAR’s last day for pick up is Wednesday, December 20th. The last day for IUTS deliveries by CANPAR is Thursday, December 21st.
Couriered Packages
Distribution Services staff will continue to accept and deliver all other courier packages arriving on campus up to Friday, December 22nd at 2:00 PM. After 2:00 PM, Distribution Service staff will accept and hold all incoming courier packages in the Distribution Services area located at 100 McCaul, room 239.
Please communicate this information to your perspective vendors and insist that they inform their couriers not to leave packages and other deliverables on the loading dock after 3:00 PM on December 22, 2017. Regular service will resume on Wednesday, January 3, 2018 starting at 8:00 AM.
The 2016 Contemporary Art, Design and New Media Art Histories Conference welcomes submissions of academic papers, proposed workshops and panels, curatorial proposals, and artistic works, performances, and interventions from MA and PhD students and independent scholars.
Please submit proposals by Friday, November 20, 2015 to [email protected]. Accepted candidates will be notified by email.
Proposal/Abstract Deadline: Midnight on Friday, Nov 20, 2015
Final paper due: Midnight on Monday, Feb 1, 2015
Announcement of Acceptance: Thursday, December 10, 2015
What to submit: a 250 word abstract or proposal, a short biography, and, if needed, an url for up to five (5) images and/or five (5) minutes of video. Please submit texts as .doc or .pdf files.
#trending: mobilizing art and culture
OCAD U Contemporary Art, Design and New Media Art Histories Conference 2016
Exhibition Opening: Friday March 11, 2016
Conference Date: Saturday March 12, 2016
The influence of trends is undeniable in contemporary culture, but rarely are its implications fully fleshed out. How can a trend mobilize or call others to action? As scholarship in contemporary art, design and new media becomes increasingly focused on networked lives, the digital platforms through which we communicate, interact, and share information demand academic and social inquiry. This interdisciplinary conference looks to the topic of #trending in its myriad meanings as it produces and affects subjects and citizenship, social and political change, visual and material culture. We must consider the longevity, impact, and relevancy of cultural work and research as the implications of cultural trends, their makers, and media are nuanced and complex. Are trends disposable or lasting? How should scholarship respond to trends -- by defining them or following them? What can trends tell us in their sequencing, forecasting, and analysis?
Topics for discussion include, but are not limited to:
-alternate, sharing and DIY economies
-inclusive and locative mobilizations of populations, movements, and narratives
-trending as a form of political mediation
-artists as activists as artists
-viral visual culture & digital storytelling
-speculation in the art market
-the gentrification of social and artistic spaces
-grants and arts awards as trend indicators
-curating as trend-setting
-the affect and aesthetics of trends
-trends, history and the acceleration of culture, theory, criticism
-authorship, art practice and online multiplicity
-transmedia: podcasts, web series, etc.
-the platforms of trend-making: Instagram, twitter, Tumblr, etc.
-celebrities as artists/artists as celebrities
LINKS: | https://www2.ocadu.ca/keyword/trending |
The San Francisco Decorator Showcase highlights work from the Bay Area's top interior and landscaping design firms. See how this year's participants transformed a 9,000-square-foot Classical Revival home into a modern masterpiece.
The San Francisco Decorator Showcase highlights work from the Bay Area's top interior and landscaping design firms. Take a look at other spaces designed by this year's featured participants.
Got luxury? This palatial 50,000-square-foot home featured on HGTV's Million Dollar Rooms includes an in-home diner, a cinema, a Mayan-themed indoor swimming pool and an expansive garage filled with vintage Ferraris.
Vern Yip tours Frank Lloyd Wright's home for inspiration for Urban Oasis.
Tour the master bedroom with its many luxurious details and features. | https://www.hgtv.com/shows/15-most-amazing-homes |
This is a best prospect industry sector for this country. Includes a market overview and trade data.
In 2020, Poland produced 152,208 GWH from primary energy sources, relying heavily on coal and fossil fuels. Hard coal, accounted for 47% of primary energy production in 2020, followed by lignite (24.9 %), natural gas (9.1 %), crude oil (1.6%) and renewables (10.75 %). More than 6% of Poland’s energy was produced by industrial power plants.
Leading Sub-Sectors
Power Generation
|2019||2020|
|Gross Generation (TWh)||158.7||152.2|
|Thermal (hard coal & lignite)||75%||71.9|
|Thermal (gas)||7.6%||9.1|
|Hydro||9%||10.75|
|RenewabIe Industrial power plants le||7%||6.45|
The installed capacity of the Polish electric power system produced 49,238 MW in 2020, which was 5.2% more than was produced in 2019 (46,799 MW). Poland’s share of installed capacity for hard coal and lignite was stable at 63.4% (31,225 MW). Renewable Energy Sources (RES) accounted for more than 20% (10,229 MW) and constituted a 36.6% growth rate versus 2019 output. Poland’s natural gas capacity remained stable with a 5.65% share of total installed capacity (2,782 MW).
Source: Polish Power Grid Company PSE
Poland’s electricity production declined 3.8% to 157.7 TWh in 2020. Hard coal and lignite power production accounted for 70% of total electricity output of 109.9 TWh in 2020, a notable decline from 79.5% in 2018. Production from Renewable Energy Sources (RES) continues its spectacular growth, particularly in prosumer photovoltaics. Solar power plants generated a 176% increase (2 TWh) and Co-firing of biomass with coal increased by 20% (to 2.2 TWh), which was supported by generous subsidies and the high price of CO2 emission rights. Green power plants, such as biogas plants (up 10% to 1.2 TWh) and hydroelectric plants (up 8% to 2.1 TWh) also increased their production output. The frequent use of pumped-storage hydroelectric power plants, Poland’s largest energy storage facility, increased by 16% (0.8 TWh). This was mainly due to the increased share of variable energy sources (wind and photovoltaic), which the transmission system operator had to balance with stored energy.
In 2020, domestic electricity production declined to the lowest point in lowest in the past 6 years, which was a result of a substantial decline in coal power production. The high price of coal and carbon credits made electricity production out of coal uncompetitive, and there may have been demand reductions due to the COVID-19 pandemic, though data points supporting this are not available at this time. At the same time, electricity production based on natural gas and RES increased significantly. Renewable capacity and production of electric power from RES have grown consistently for the past several years, exceeding 16 TWh in 2020. Despite a 350% increase of photovoltaic installations and development of prosumer PV installations, Poland was unable to achieve the EU’s 2020 obligation to meet a 20% share from renewable sources in the final energy mix.
The importance of gas in the Polish energy mix continues to grow. Domestic production of this fuel has declined for several years, and demand has been replaced by imported gas. However, the progressive diversification of gas sources is clearly visible, mainly due to contracts for the purchase of LNG, mainly from Qatar and the United States. Imports from Russia account for less than 50% of Poland’s domestic gas supplies. Russian gas is scheduled to be completely phased out by the end of 2022. The decreasing trend in domestic hard coal exploitation, which has been visible for several years, continued in 2020 and accounted for a decline of 7.2 million tons, though the demand for thermal coal remains high. Imported coal accounts for almost 20% of Poland’s consumption because it is cheaper and of higher quality than Poland’s domestic coal resources. In 2020 Poland imported 12.82 million tons of hard coal, with the top suppliers being: Russia (9.5 million tons in 2020), Colombia, the United States and Kazakhstan.
Most Polish coal-fired power plants were built between 1960 and 1980, and now must be retired and replaced. Poland’s newest and the last coal-fired power plants are Kozienice (1,000 MW) and Opole (2x900 MW, Jaworzno (910 MW) and Turow (450 MW). Subsequent power plant investments in Dolna Odra (2 x 700 MW) and Ostroleka (750 MW) will utilize natural gas sources. Ostroleka is evidence of the transition from coal to gas, the plan was originally contracted as a coal facility, but the plants owners have committed significant capital to convert the half-finished project into a gas fired plant.
European Union Green Deal and FIT for 55 Package
The European Green Deal aims for a 55% reduction of greenhouse gas emissions by 2030 (compared to 1990 levels) and full climate neutrality by 2050. For the energy sector and the Polish economy, it provides a chance to modernize, innovate and progress, including increased opportunities for investment.
The EU budget for 2021-2027 provides $164.3 billion in subsidies and $40.3 billion in repayable aid for Poland (in current prices), thereby making Poland the biggest net EU fund beneficiary among all the member states. The Ministry of Development, Labor and Technology is currently finalizing a draft Partnership Agreement, i.e., the document specifying where Poland will invest its allocation of EU development funds. Poland will receive about €3.8 billion from the fund to mitigate the effects of energy transformation and moving away from coal, which will go mainly to the Silesia and Lesser Poland voivodships.
The Polish government estimates that the energy transformation requires about $250 billion. Adopted in February 2021, “The Energy Policy until 2040” (PEP2040) assumes that Poland will gradually reduce its use of coal, on which it is 70 percent reliant on. By 2030, Poland’s energy mix is to decrease to at least 56 percent reliance on coal. The share of renewable energy sources is to increase to no less than 23 percent by that time. According to an agreement which the government reached with coal miners, the last mine in Poland is scheduled to be closed in 2049.
Poland may receive nearly €13 billion from the new FIT for 55 fund. As part of the new climate package, the European Commission proposes to establish a new Social and Climate Fund. Its budget for 2025-2032 is expected to amount to €72.2 billion. Poland is to be the biggest beneficiary of the new instrument easing the costs of transformation. The new Social Fund for Climate Action aims to provide Member States with specific funding to help citizens finance investments in energy efficiency, new heating and cooling systems and cleaner mobility. The Social Fund for Climate Action would be financed from the EU budget with an amount equal to 25% of expected emissions trading revenues for fuels used in buildings and road transport. It will provide funding to Member States of €72.2 billion for the period 2025-2032, based on a targeted revision of the Multiannual Financial Framework. Thanks to the proposal to use equivalent funding from the Member States, the fund would mobilize €144.4 billion for a socially just transition, the Commission reads. In the years 2025-2032, Poland is expected to receive €12.7 billion from this fund, which constitutes 17.6% of the entire budget.
Civil Nuclear Energy
In 2009, Poland began developing its civil nuclear power program. Initially, the state-owned power company PGE-EJ1 envisioned construction of two nuclear power plants with a 3,000 MW output to be completed by 2035. The program has been delayed significantly due to government reforms. Construction of six nuclear power blocks with 6-9 GW of total capacity by 2043 is now being considered. The Ministry of Climate plans to launch operation of the first 1-1.6GW nuclear power reactor in 2033, with the remaining five reactors of the same design coming online every two years until the project is completed in 2043. Site characterization and environmental analysis were being performed by PGE-EJI’s successor company PEJ at selected sites in Zarnowiec and Lubiatowo-Kopalino and are expected to be completed at the end of 2021, and the reactor technology tender has yet to be announced. The Ministry estimates the cost of the nuclear power program at $40 billion and is looking for foreign technology provider to offer up to 49% of equity.
On July 1, 2021, Westinghouse Electric Company has announced the launch of front-end engineering and design (FEED) work under a grant from the United States Trade and Development Agency (USTDA) “to progress” the nuclear energy program in Poland. FEED is one of the key elements in the implementation of the Intergovernmental Agreement (IGA) between Poland and the USA to cooperate on the development of Poland’s civil nuclear power program signed in October 2020. This 30-year agreement, the first of its kind, represents an enduring energy bond between the United States and Poland. The Agreement provides that over the next 18 months, the United States and Poland will work together on a report delivering a design for implementing Poland’s nuclear power program, as well as potential financing arrangements. This will be the basis for U.S. long-term involvement and for the Polish government to take final decisions on accelerating the construction of nuclear power plants in the country.
The Polish government is considering conduiting research into High Temperature Gas Reactor (HTGR) technology in Poland. The plan is to create the special HTGR development center in cooperation with foreign partners who have experience with this technology. The first step would involve building a 10 MWt HTGR reactor in the National Center for Nuclear Research (NCBJ) facility for testing and licensing purposes, then developing commercial HTGR reactors that would provide heat for the chemical industry and energy for the electric grid in Poland.
Renewable energy
In 2008 all the EU member states agreed to reach at least a 15% share of renewable energy (RE) by 2020. Poland’s share at that time had not exceeded 8% and after 12 years the country did not achieve the set goal. By the end of 2020 only 10.75% of energy was produced from the renewable energy sources (RES). Poland’s RES capacity totaled 9,475 MW in 2020 and it grew by 367 MW throughout the year. Wind power accounted for 65% of this capacity, followed by biomass, hydro, photovoltaics and biogas. Photovoltaics experienced the largest growth in 2020, reaching 708 MW. Renewable energy laws strongly support prosumer activities, and individual producers of maximum 10kW power from the newly installed RES system are guaranteed tariffs for 15 years. For larger producers, the law introduced an auction system. Each year, the Ministry of Economy announces the amount of renewable energy it will need and announces the reference prices for each group. According to the assumptions of the National Plan for Energy and Climate for 2021-2030, the share of energy from renewable sources in the national mix will increase from 17.6% in 2025 to 21 percent in 2030. In 2016 Poland passed legislation knows as the 10H law, which functions as a de facto moratorium on new onshore wind investments by restricting zoning in all parts of the country. The government is currently considering loosening restrictions but the PEP 2040 plans for overall onshore production to remain at current levels of installed capacity.
As reported by Bloomberg Poland, Europe’s “coal heartland” is now the hottest market for green power. Poland plans to increase its renewable power capacity through the development of offshore wind farms. By 2027, Poland expects 6GW power capacity to be generated by offshore wind. Poland finalized its 2040 energy policy and looks to the world’s largest players in RE to help them develop the market.
Photovoltaics
Poland is working its way to the top of the European ranks in photovoltaics. In 2020, 2635 megawatts (MW) of solar power output were installed in Poland – more than three times the number installed in 2019 (823 MW). This elevated Poland’s PV market position in Europe, following only behind Spain (2.7 GW), the Netherlands (2.8 GW) and Germany (4.8 GW), and all signs point to increased growth. The Polish solar market is set to grow by 35% annually, and in 2024, the total PV capacity is expected to reach 8.3 GW. This scenario is forecast by the European PV industry association, SolarPower Europe, in its latest EU Market Outlook. The Polish solar boom is happening at every level, from smaller privately-owned rooftop PV systems and commercial rooftop systems, to large free-standing installations. According to the Polish Society for Photovoltaics (PV Poland), the number of registered small-scale systems (below 50 kW) with an average capacity of 6.5 kilowatts (kW) grew from 155,000 (992 MW) at the end of 2019 to 457,400 (3 GW) at the end of 2020. These small-scale systems accounts for 75% of total PV power installed in Poland. Several larger PV projects, with capacity of approximately 4 GW, have received preliminary grid connection permits.
In addition to the sharp drop in the cost of photovoltaics and growing environmental consciousness, the market is being driven by a whole raft of incentive programs (e.g., My Current - €230 million, Clean Air, Thermomodernization, etc.). An incentive program called Agroenergia with a budget of €50 million is specifically geared toward farmers and offers low-interest loans or direct subsidies for the construction of solar power systems between 50 kW and 1 MW.
The Polish government introduced strong regulatory support, and there are subsidies for PV systems for on-site consumption as well as for utility-scale facilities. The expansion of “balancing” programs, which is what the Polish call net metering, is an example of how small and medium enterprises support prosumers.
Solar power systems with less than 50 kW also benefit from a reduction (23% to 8%) of Value Added Tax (VAT), plus purchase and installation costs for PV systems can offset income and reduce personal income tax. Additionally, state-supported auctions are used to fund large-scale installations. One of the winners of a recent tender back was for an investment project to construct a 200 MW solar park in the Pomeranian Voivodeship.
Poland is starting to see some large solar projects that do not rely on subsidies, such as a 64 MW solar park which is being built in Witnica, close to the German border. The electricity generated there will be sold to a local cement factory through a multiannual power purchase agreement (PPA). In addition, a new factory producing battery cathode materials used in electric cars will be powered with 100-percent renewable electricity; a long-term supply contract has just been signed in Konin (Wielkopolska Voivodeship).
Increasingly, large companies are relying on solar power for self-consumption, for example, a leading manufacturer of metal furniture in Suwalki in northeastern Poland, which has recently started meeting its demand using a 2 MW roof-mounted and free-standing installation on the company premises.
Wind: Onshore and Offshore
Poland’s onshore wind generation capacity development was restricted in 2016, when President Duda signed a bill making it illegal to build turbines within 2km of other buildings or forests, ruling out 99 % of Poland’s land area. Due to these changes, the installed capacity in wind generation grew only by 0.8%. Since then, the government has made plans to revise parts of the bill that hindered wind energy development and created a number of investment disputes between Poland and international investors.
There are more than 1,200 installations in Poland using wind as a renewable energy source. Their installed capacity is over 5,900 MW, which is about 65% of installed capacity in all types of renewable energy installations working in Poland. Nearly 160 further wind installations are under construction, with total installed capacity of approximately 2,500 MW. The amount of energy produced from wind sources and introduced into the Polish power system is systematically increasing. In 2020, they produced14,174 GWh of energy against 13,903 GWh in 2019. Wind energy accounted for about 10% energy consumed in the country in 2020. According to the Polish Energy Regulatory Office, producers of wind and solar energy have been the primary beneficiaries of the auction support system for renewable energy production operating in Poland for more than five years. The results of the eight auctions decided in 2020 by the Energy Regulatory Office translated into nearly 54.5 TWh of capacity contracted for over $3.4 billion. And the increase in energy production from the auction system is an important mechanism to fulfill the renewable energy target assumed for Poland.
In order to meet 21% of RES in 2030, the Polish government is planning an extensive offshore wind farm development. The PEP Road Map 2040 provides for visible participation of offshore wind in Poland’s 2027 energy mix, meaning the first mature projects should appear even around 2024. In the 2040 prospectus, the strategic document sets a potential of 10.3 GW. A draft law on the promotion of electricity generation in offshore wind farms published in January this year provides for the first auctions to be conducted by the President of the Energy Regulatory Office in this sector as early as 2023. Companies controlled by the Polish State Treasury will have a dominant share in the development of offshore wind farms. Investments in offshore wind farms are carried out by companies such as the Polish Energy Group, PGE. By 2030, PGE and their Danish partner, Ørsted intend to erect wind farms with 2.5 GW on the Baltic Sea. Another state group, PKN Orlen, also has concessions for the construction of a 1.2 GW offshore wind farm and is in the process of searching for a business partner to carry out the planned projects. PEP 2040 predicts that 55.2 TWh of energy will be produced from wind only. The Polish Wind Energy Association (PSEW) estimates that the Polish energy system will require 1,000MW of newly installed wind energy capacity each year to comply with EU targets.
Transmission and Distribution Network
Poland’s electrical transmission network is in good technical shape and the average age of Polish transmission lines is less than 40 years. Expanding and upgrading of Poland’s electricity transmission network is a key element to meet its EU goals of increasing renewable energy sources, improving energy efficiency, and better integration into European transmission networks. In 2019 and 2020, all six transmission and distribution companies spent over $2 billion for investments, including $34 million for innovations. The Polish state-owned transmission system operator PSE spent $380 million for transmission grid development and modernization. From 2019 to 2027, PSE plans to spend $3.2 billion to expand and modernize the Polish grid, with $1.25 billion support taken from the EU Operational Program Infrastructure and Environment. PSE plans to introduce 8 GW of power from offshore wind farms into the system by 2027 and to prepare for construction of power lines for the nuclear power plant. PSE investment plans include building of about 4,300 km of new 400 kV lines and upgrade another 800 km of 400 kV, along with 1,400 km of new or upgraded 220 kV lines construction of nine new transformer stations and modernization of 23 existing stations. PSE has signed an agreement with Lithuanian transmission operator, Lit grid, to build Harmony Link, an undersea HVDC cable that would link Poland and Latvia and make Baltic states power system synchronized with European.
Investments undertaken by five system operators for distribution grid expansion, upgrade, automation and cyber security are also substantial. In 2019 alone, their total investment spending totaled nearly $ 1.6 billion, including $550 million spent by PGE, $450 million spent by Tauron, $300 million spent by Energa, $300 million by Enea and $50 million by Innogy. Thirty investment projects related to electricity transmission, and 188 projects in electric energy distribution with a combined value of $ 3.6 billion, have been co-financed by EU cohesion funds within the Infrastructure and Environment Program between 2014 and 2020.
Smart Grid
According to the draft of Poland’s Energy Law, Poland plans to install smart meters at 80% of end-users by 2026. Currently, smart meters are installed at 11% of end-users. The initial phase of installing smart meters in Poland took place between 2011-2015, but the process has since slowed. The reason behind this slowdown was a lack of applicable legislation that would obligate Distribution System Operators (DSOs) to implement Advanced Metering Infrastructure, and lack of regulator actions enhancing such activities. Introduction of capacity market in 2018 forced DSOs to install intelligent meters that enable remote data read-out. Among the five DSOs, Energa is the most advanced in Advanced Metering Infrastructure (AMI) implementation with installation of meters for 30% of their clients. Energa has invested $500 million in smart grid development by 2020. During next three years, Energa plans to introduce smart grid in their entire territory, which covers 25% of Poland’s area. The project worth $60 million is to modernize the low voltage grid using EU funds. Tauron has installed 350,000 intelligent meters in Wroclaw (Smart City Wroclaw), and Innogy 100,000 units in Warsaw. PGE, the largest DSO, has been performing project of 50,000 meters in Bialystok and Lodz. Enea signed contract for introducing intelligent grid in Szczecin and Swinoujscie in December 2019. PGE, Tauron and Enea have together conducted several tenders for purchasing of smart meters.
According to Poland’s calculations, the installation of smart meters for 80% of end-users by 2026 will cost $1.2 billion. EU Infrastructure and Environment funds will cover $300 million of the cost spent by DSOs for grid infrastructure development, smart grid development, intelligent meters, grid automatization and energy storage systems construction. The high and medium voltage distribution lines are primarily automated while low voltage systems, which are most common in Poland, still require automation updates.
Energy Efficiency
According to Poland’s Energy Policy by 2040, energy efficiency is one of three major energy priorities. A system of white certificates that award energy efficiency, investments, and expansion are an instrument for incentivizing energy efficiency in Poland. This system is required for the consumer utilities selling electricity to the end-user market. The system is available for all projects that meet specific criteria. To receive a white certificate, a company needs to send an energy efficiency audit to the Office of Energy Regulation. Energy efficiency audits are required for companies with more than 250 employees. EU funds dedicated to improving energy efficiency have allowed the energy market in Poland to grow over the last decade, advancing the thermo-modernization of buildings, street lighting, and industrial processes. The EU has allocated €6.8 billion to support the low carbon economy in Poland. This includes €3.8 billion available from the European Regional Development Fund and €3 billion from the Cohesion Fund, which includes the Environment and Infrastructure Program. The EU may also fund the production of electric energy, including co-generation, electricity transmission and distribution, including the smart grid; energy modernization of public buildings and housing; and increased energy efficiency in factories. Other financing dedicated to such projects include: The National Fund for Environmental Protection, made up of subsidies and preferential credits; EBRD; and EU PolSEEF, which includes preferential credits.
Energy Storage
In May 2021, Polish policymakers removed legal and regulatory barriers that prevented the development of the energy storage industry. The Polish Parliament adopted an amendment to national Energy Law concerning the treatment and definition of energy storage, with 443 members of parliament voting in favor of a bill, only three opposing it and no abstentions. The comprehensive regulations open the possibility of using energy storage facilities in various areas of the power system, the new rules cover electricity storage system licensing and eliminate tariff obligations, which were “double charging” energy storage systems connection to the grid.
The new rules incentivize energy storage by reducing the fee payable by owners and operators of energy storage assets for connecting to the grid. The new rules create an opportunity for Poland to create a broad energy storage industry, PSME’s president said, from the development of technologies and products to the creation of jobs.
State-owned public power company PGE has said that in targeting carbon neutrality by 2050 it is planning at least 800MW of energy storage deployments by 2030. According to figures quoted by PSME, the number of prosumers in Poland has increased from about 4,000 at the end of 2015 to more than 450,000 by the end of 2020.
The country will introduce auctions for hybrid renewable installations, such as facilities combining at least two renewable energy systems and an energy storage facility with a utilization factor of at least 60%. This year resources for small scale projects (1MW or less) totaling 5MW and larger installations totaling 15MW are expected to be tendered in a pilot auction.
Natural Gas
According to 2019 data, Poland relied on Russia for its gas supply, as Russia’s Gazprom controls 56% of the country’s gas consumption. The rest is covered by domestic production (23%), EU imports (15%), and LNG imports (6%). Poland seeks to become energy secure, as well as diversify its gas sources before its contract with Gazprom expires at the end of 2022. As such, Poland is in the process of building gas infrastructure to become more energy independent and meet growing consumption. Poland began this process with its first LNG terminal in Swinoujscie in 2015. Since then, Poland has also increased its imports of LNG from Qatar and the United States.
Poland’s LNG terminal in Swinoujscie is the first onshore regasification facility in the Baltic Sea region. This facility receives shipments from a Qatari supplier under a long-term contract, as well as a series of auxiliary deliveries secured via the spot market. In November 2017, PGNiG signed a five-year contract with Centrica LNG Co. This contract allows the deliveries of U.S. LNG from Cheniere Energy’s Sabine Pass LNG Terminal in Louisiana. In 2018, PGNiG signed other long-term contracts for U.S. LNG that include 20-years contracts with: Sempra for 2.7 BCM, Venture Global Calcasieu Pass LLC and Venture Global Plaquemines LNG LLC for together 2.7BCM and Cheniere Marketing International 1.95 BCM of degasified LNG yearly. Deliveries will start in 2022-2023. In 2018, the Polish government made the decision to increase the LNG terminal’s capacity by 50%, giving the terminal 7.5 BCM. The tender was announced in the beginning of 2019 and was recently concluded. From 2023, PGNiG will have at least 7.45 million tons of liquefied gas, which is more than 10 billion cubic meters of natural gas. Such quantities of LNG will strengthen the company’s position on the market for this fuel and will contribute to the increase of gas supply security of Poland.
PGNiG is currently in the process of building Baltic Pipeline which will to carry gas from Norway to Poland. This pipeline is scheduled to be operational by October 2022. The European Commission recognizes Baltic Pipeline Project as a ‘Project of Common Interest’ (PCI). The EU is providing support funding to Baltic Pipeline because it strengthens the European internal energy market by securing more affordable, secure, and sustainable energy sources. When completed, Baltic Pipeline will account for 43% of Poland’s gas consumption. Poland expects to receive another 37% via the expanded LNG terminal, which will receive imports from a variety of sources, including the U.S. In addition, the Polish government is planning to purchase of two Floating Storage Regasification Units (FSRU); the first will be located in the bay of Gdansk with plans for possible expansion. This investment will allow Poland to accept delivery of between 4.1 and 8.2 billion Nm3 of liquefied natural gas per year to Poland. In addition to transporting liquefied gas, the tanker would also enable reloading and bunkering (refueling) of LNG-powered vessels. | https://www.trade.gov/country-commercial-guides/poland-energy-sector |
People want to do work that matters, at companies that recognize what matters too. Being able to embrace core values at work is an important part of bringing meaning to what we do.
On average, employees whose work serves a social purpose are 13% more satisfied with their jobs. However, there’s long been a proverbial line in the sand when it comes to personal and professional values. Although that boundary has become increasingly blurred with remote work, the question still remains: do your core values belong at work?
Having core values at work doesn’t necessarily mean introducing often-divisive topics like religion and politics into conversations with coworkers. It does, however, mean incorporating the things that bring meaning to your life into the work you do.
Employees and leaders alike want to work for organizations that align with their own values, whether it be environmentalism, social justice, or mental health awareness (to name a few). There are many ways, both explicit and implicit, that core values at work can come into play.
Having social purpose at work enables employees to both do their jobs better and find more meaning in their work, improving overall happiness.
It can be difficult to check every box when it comes to core values at work. It’s not always the case that an employee finds a role with a company that matches all of their values. However, that doesn’t mean that they can’t find ways to bring purpose to their work.
Job purposing is a term used to describe how employees can engage in a social purpose during the regular work week. Having social purpose at work enables employees to do their jobs better and find more meaning in their work, improving overall happiness. According to research, employees who have a job purpose “likely have higher job satisfaction and performance, and they may even be happier and healthier”.
Core values are a set of fundamental beliefs, ideals or practices that inform how you conduct your life, both personally and professionally.
First, you must know what your core values are to determine how they impact your professional and personal life. Indeed’s definition of core values is “a set of fundamental beliefs, ideals, or practices that inform how you conduct your life, both personally and professionally”.
This means that employees should look for roles with organizations that they feel support their overall values. For example, if they’re an environmentalist, they may want to work for a company that has green initiatives. Core values at work can also include things such as creativity, honesty, and humility. Those values will likely inform the type of roles an employee will want, too. If they value creativity, they will want a role where they are able to express themselves and feel their unique voice is valued.
Organizations should also want to find people that match their core values at work. It’s important to hire people that add to the culture.
Related Reading: Hiring for Culture Add: Interview Questions to Ask
This doesn’t mean that you have to search for people whose values line up with every single one of your organizational values. However, as the Harvard Business Review writes: “Workers at every level of an organization can make coworker and customer interactions more human, meetings more meaningful, operations more inclusive, and marketing more charitable”.
Creating an environment where meaning and values are emphasized can mean a number of things, such as:
- Having policies and practices in place that reduce bias and discrimination.
- Supporting local businesses when possible, whether it’s ordering supplies from a local company or getting lunch for the office from the new donair shop down the road.
- Encourage employees who don’t speak up in meetings often to voice their opinions. Statistically, women and people of colour are disproportionately quieter in the workplace, by as much as 25%.
- Ensuring that any sort of “housekeeping tasks” that you may have are assigned fairly, since women report doing these tasks 20% more than “their white male counterparts, whether it’s literal housework (arranging for lunch or cleaning up after a meeting), administrative tasks (finding a place to meet or prepping a PowerPoint), emotional labor (‘He’s upset—can you fix it?’), or undervalued work (mentoring summer interns)”.
- Holding meetings at times that will work for everyone. Working parents, for example, may not be able to meet or be online after 5 o’clock.
HR and leaders have an important role to play in ensuring core values at work, by creating an inclusive workplace and allowing people the opportunity to express themselves and be heard. | https://risepeople.com/blog/core-values-at-work/ |
In her book, Braving the Wilderness, research professor, Brené Brown, recounts a story of women who lived in a village and would gather by the river often to wash their clothes together. These women all moved onto the latest technology – washing machines – and not long after the rates of depression in the village increased. It wasn’t the washing machines per se causing the depression, but the loss of connection, social interaction, the sense of belonging, and community that was a consequence of gathering by the river do the washing. Without this daily ritual these women were lonely.
Many of us can see ourselves in these women. The rates of depression and anxiety are increasing, our feelings of happiness are not. It’s hardly surprising. Humans are social beings, hard-wired for connection: we will seek it out in any way we can. Today, instead of regularly meeting friends and family by the river we engage with strangers via the internet, finding our “tribe” among people we do not know and very often do not have lasting relationships with. It is no coincidence that we are more divided than ever.
*************
One of the top 5 regrets of the dying is that they wished that they hadn’t worked so hard. Another is that they wished they’d been brave enough to pursue the life they’d really dreamed of, without worrying about what others thought; that they’d had the courage to do what truly made them happy. Which is ironic, really, because according to the 18th century economist and philosopher, Adam Smith, wealth is something that is “desired, not for the material satisfaction that it brings, but because it is desired by others”. People are getting to the end of their life regretting that they worked so hard – presumably to accumulate wealth so that others could envy it – wishing that instead they had pursued things that truly made them happy, regardless of what people thought. What a lesson we could learn from these people’s dying realisations.
It is reminiscent of the tale of the Fisherman and the Businessman. The Fisherman already lived a life that dreams are made of. He had time for fishing, his family and friends, rest, music and conviviality. The Businessman wanted him to abandon all of that to create an empire and spend all his best years growing that empire, so that eventually, in retirement, he could go back to living the life of his dreams. How many of us are caught up in that cycle, or more accurately, a system that perpetuates that cycle?
*************
Have many of us, especially those of us who live in ‘wealthy’ nations, forgotten what it means to be human? Have we, instead, become primarily ‘consumers’? Our days spent consuming advertising, social media feeds, plastic-packaged and processed food, novel experiences and date nights out, travel packages and red-hot deals, streaming services and the latest games, books, electronics and endless ‘stuff’ Everything and anything that the ‘market’ can provide.
Reducing our consumption is of course important for the health of the planet, but what if one way to do this is by becoming producers, or creators, ourselves? Rediscovering what our human-energy – an abundantly available energy we seem to be using increasingly less of – can achieve, something we once innately drew upon, now buried deep within us as fossil-fuelled energy overtook our lives. There’s a clear link here to actions that will mitigate climate change: walking, cycling, growing our own food, and other low-tech solutions such as repairing and fostering community that “encourage social connections … rather than fostering the hyper-individualism encouraged by resource-hungry digital devices.”
Beyond the obvious climate solutions, if we become creators of art and craft, gardens, music, songs and dance, poetry and writing, relationships and connection, and any myriad of things we humans can create, we may find that we no longer need to consume what the ‘market’ is offering. We can use our human energy and ingenuity to create genuine contentment and joy, not fill a void with momentarily pleasurable, but ultimately unsatisfying, “things”.
*************
It has been well documented that spending time in nature improves our mental wellbeing. It literally makes us happier. But it’s something we do very little of. Research shows that, on average, “North Americans spend over 93 percent of their waking hours indoors or in cars (and the other 7 percent is spent travelling between buildings and cars)”. Not only will we be happier if we spend more time in nature, but we will find ourselves more connected to this planet. We cannot truly respect and appreciate nature for all that she provides us unless we spend time in her. How can we value the trees merely for existing, when we haven’t watch them grow, and we don’t know which species they house? How can we care about species loss when we cannot name the species that live in our own community?
*************
We are not supposed to live like this, and it shows. We can see it in the deterioration of mental and physical health of people in so called ‘wealthy’ nations, and we can see it in the planetary-wide ecological crisis we face. What if, in trying to heal ourselves, we also begin to heal the planet? Because, in a wonderful turn of events, it turns out that what is good for us, is good for the planet too. | https://www.resilience.org/stories/2022-02-25/we-are-not-supposed-to-live-like-this/ |
Foster carers and foster children share their experiences of local authority foster care in Mid and West Wales.
*Please note, in some cases child actors have been used for the purpose of filming.
It was on a journey home from Carmarthen that we saw an advertisement by Carmarthenshire Council for people who were interested in supporting children by becoming foster carers. It was then that we began to think that perhaps this was the opportunity we were looking for, and therefore contacted the fostering team and after a brief chat we were invited to an information evening.
Following the information evening, we attended a three day induction program on becoming a foster carer, and even though we were keen to move forward to become foster carers, we still had reservations about whether this was the right move for us.
However, on day three of this program we both felt that we could balance the responsibilities of being a foster carer with the responsibilities we had to our family and personal goals, by becoming respite carers.
What really impressed us was the support available, the structure of the team at Carmarthenshire Council and the enormous training available to you, once you were approved. Following a few months of interviews and references, we were ready to go to panel for approval and once we had gone through this process, we were registered to provide respite care.
As with all new situations, it’s not until you are put in the position where you have to put these new skills into practice do you begin to doubt your abilities, however, we had a great mentor we could contact for help as well as our supervising social worker and the added support of the out of hours team.
So, we then had our first placement, a mother and new born baby. We felt like new starters at any job, nervous, lacking confidence and wondering why we put ourselves through this stress, but you know what, it was ok. The mum and baby were lovely and all our nerves and worries disappeared and we began to enjoy ourselves. Yes, it was formal, but we both had interpersonal skills, a grasp of a common language and all wanted the best outcome.
And so our journey had begun, but it wasn’t all about caring for others, we became aware of our own shortfalls and so we started attending the extensive training we now had access too, and like I have always found, the more you get to know, the less you realised you knew. The training itself was excellent, but it also brought us into contact with other foster carers and that proved as important as the training, they shared their own experiences and gave me and Tracey valuable advice which we benefited from enormously.
Three years on, we have had the pleasure of caring for children of all age groups, backgrounds and more recently children with complex medical needs, in addition to having met many likeminded individuals who genuinely care about the welfare of children. We often reflect on our fostering journey and the people we have come into contact with and we never cease to be amazed how much pleasure and personal satisfaction we get from being foster carers.David and Tracey Willard from Mynyddcerrig have been providing respite foster care since 2015
My husband and I have been fostering for two years and our biggest regret is not having started sooner. There is always a demand for new foster parents, especially for teenagers and you could make a real difference to some child’s life.
Before I applied for fostering I worried about everything that you could possibly think of and then I worried some more, all the friends I talked to about it told me they thought I would be brilliant at it, my own children told me the same thing but still I worried that maybe I would not be good enough and that I would let some already traumatised child down. I was worrying about nothing…Yes I make mistakes and often feel I could have handled some situations better but there is always someone there to talk things through with, you are supported every step of the way.
There are challenges in fostering just like in any other undertaking but if you can maintain your sense of humour and be non-judgmental and consistent then these can be overcome and the rewards are enormous!!! No one can explain to you how good it feels to hear a child who is generally quiet and withdrawn laugh or the sense of pride you will feel when they get a good school report or simply say thank you and on top of all that you get to plan birthdays and Christmas and Easter and so many other things that are just pure FUN!!! | https://foster.midandwest.wales/could-you-foster/foster-videos/ |
The segment from Compton Ave, at the campus of Harris-Stowe State University to 20th Street, at Centene Stadium (the home of St. Louis CITY SC) is focused on a conceptual design of a public art project to remember, honor and celebrate the Mill Creek Valley neighborhood. This piece is being designed by artist Damon Davis with input from community and key stakeholders.
Learn more about this segment and how you can get involved.
northern connector
The segment from Fairground Park south to the Grand MetroLink Station and east to NGA (National Geospatial-Intelligence Agency) is driven by community engagement. We’re focusing on taking stock of existing conditions and partners, engaging one-on-one with stakeholders and community leaders and planning for future engagement, both now and when we can connect in real life again. Part of this section was awarded a $15 million federal grant and design will begin Summer 2022.
central connector
The segment from the Central West End MetroLink Station east toward the Grand MetroLink Station will continue with planning and design. Progress within this segment will be paced to coordinate with partners like the City Foundry and the Armory District projects and align our timelines as much as possible to be good stewards of your investments. Part of this segment received a $4 million federal grant and is in design now.
Learn more about this segment and share you input at monthly pop-up events at City Foundry STL through September 7.
Partner Connectors
Shown in blue, two partner connectors will be great ways for the project. The Tower Grove Connector (led by City of St. Louis and Greater St. Louis Inc) will go along Tower Grove Ave and Vandeventer Ave, eventually up Sarah St to connect to Brickline Greenway. And the 20th Street project, led by the City of St. Louis, will complete the initial loop on the east side of the project.
Project Updates
Central Connector Pop-Up Events at City Foundry STL
Come meet the Brickline Greenway team at in-person monthly pop-up events through September to learn about the project and share your thoughts about conceptual design plans for the greenway in the central corridor between the Cortex and Grand MetroLink stations.
Click the image above for dates & details.
Brickline Greenway northern segment is awarded $15 million in construction funds from U.S. DoT.
RAISE discretionary grant program (Rebuilding American Infrastructure with Sustainability and Equity) selected this St. Louis project for funding.
2021 Engagement Report
Great Rivers Greenway actively seeks input from everyone in the community, including local leaders, neighbors, technical experts, artists, philanthropists, residents, elected officials, and business owners.
In 2021, the engagement team participated in over 300 meetings and events to guide the design team’s recommendations and inform the community about the Brickline Greenway.
Meet the new Greenway
A three-month engagement process wrapped up on March 10, 2020 with the Great Rivers Greenway Board of Directors choosing a new name for the Chouteau Greenway.
KEY OUTCOMES OF BRICKLINE GREENWAY
EXCEPTIONAL EXPERIENCE
Create a regional gathering place where people can connect to St. Louis and each other.
CIVIC WELL-BEING
Strengthen trust and unite communities on a common ground that boosts civic pride by making the process accountable and inclusive.
CONNECTIVITY
Connect people to St. Louis’ neighborhoods, institutions, transit, jobs, destinations and public spaces.
ECONOMIC GROWTH
Create equitable opportunities for growth and inspire continued investment in places for people to live, work, play, and visit.
ENVIRONMENTAL LEADERSHIP
Become a model for excellence in ecology and engage communities in stewarding a healthy, urban environment.
HEALTHY LIFESTYLES
Encourage exploration, activity, exercise and alternative transportation to enhance physical and mental well-being for people of all ages and all abilities. | https://greatriversgreenway.org/brickline/project-process/ |
CROSS REFERENCE TO RELATED APPLICATIONS
BACKGROUND
BRIEF DESCRIPTION
DETAILED DESCRIPTION
This application claims the benefit of U.S. Provisional application Ser. No. 16/139,896, filed Sep. 24, 2018, the entire disclosure of which is incorporated herein by reference.
The subject matter disclosed herein relates to systems for performing quality inspections on objects, such as manufactured goods or aircraft.
Measurement devices are often used in the inspection of objects to determine in the object is in conformance with specifications. When objects are large, such as with commercial aircraft for example, these inspections may be difficult and time consuming. To assist in these inspections, sometimes non-contact three-dimensional (3D) coordinate measurement devices are used in the inspection process.
One type of 3D measurement device is a 3D laser scanner time-of-flight (TOF) coordinate measurement device. A 3D laser scanner of this type steers a beam of light to a non-cooperative target such as a diffusely scattering surface of an object (e.g. the surface of the aircraft). A distance meter in the device measures a distance to the object, and angular encoders measure the angles of rotation of two axles in the device. The measured distance and two angles enable a processor in the device to determine the 3D coordinates of the target.
To measure large objects, such as aircraft, the TOF laser scanner is moved to multiple locations about the aircraft, either manually or with an automated system. A scan is performed at each location and the multiple scans are registered together to form a single scan of the object. It should be appreciated that this process may take considerable time. Further, once the scanning is completed, the data needs to be analyzed and the locations of any anomalies determined. Since the analysis is performed apart from the object, the actual location on the object needs to then be identified manually. Another time consuming process.
Accordingly, while existing 3D scanners are suitable for their intended purposes, what is needed is a 3D scanner having certain features of embodiments of the present invention.
According to one embodiment, an inspection system for measuring an object is provided. The inspection system includes an entryway sized to receive the object. At least two non-contact coordinate measurement devices are positioned with a field of view being at least partially within or adjacent to the entryway, each of the at least two non-contact coordinate measurement devices being operable to measure 3D coordinates for a plurality of points on the object as one of the object or the entryway move from a first position to a final position. A pose measurement device is operable to determine the six-degree of freedom (6DOF) pose of the object. One or more processors are provided that are responsive to executable computer instructions for registering the 3D coordinates for the plurality of points from each of the at least two non-contact coordinate measurement devices based at least in part on the 6DOF pose of the object.
In addition to one or more of the features described herein, or as an alternative, further embodiments of the inspection system may include the pose measurement device having a speed measurement device operably to measure a speed of the object. In addition to one or more of the features described herein, or as an alternative, further embodiments of the inspection system may include the 6DOF pose being determined based on the measured speed and a time measurement.
In addition to one or more of the features described herein, or as an alternative, further embodiments of the inspection system may include the object being moved through the entryway from the first position to the final position. In addition to one or more of the features described herein, or as an alternative, further embodiments of the inspection system may include the entryway moving from the first position to the final position.
In addition to one or more of the features described herein, or as an alternative, further embodiments of the inspection system may include at least one projector operable to emit a visible light onto a surface of the object. In addition to one or more of the features described herein, or as an alternative, further embodiments of the inspection system may include the pose measurement device being further operable to determine the position and orientation of the object in the final position.
In addition to one or more of the features described herein, or as an alternative, further embodiments of the inspection system may include the one or more processors being further responsive to executable computer instructions for determining the location of an anomaly on the surface of the object based at least in part on the 3D coordinates of the plurality of points. In addition to one or more of the features described herein, or as an alternative, further embodiments of the inspection system may include the one or more processors being further responsive to executable computer instructions for causing the at least one projector to emit the visible light onto the object based on the determination of the location of the anomaly.
In addition to one or more of the features described herein, or as an alternative, further embodiments of the inspection system may include the pose measurement device being a mobile scanning device that includes a time-of-flight scanner, the mobile scanning device being operable to move from an initial position and follow a path under the object when the object is in the final position, the mobile scanning device being further operable to measure 3D coordinates of a second plurality of points on the object and an environment while on the path.
In addition to one or more of the features described herein, or as an alternative, further embodiments of the inspection system may include the determination of the position and orientation of the object being based on comparing the 3D coordinates of the second plurality of points with an electronic model of the environment in which the object is located. In addition to one or more of the features described herein, or as an alternative, further embodiments of the inspection system may include the pose measurement device having at least two 3D LIDAR devices positioned to measure 3D coordinates of points on the object.
In addition to one or more of the features described herein, or as an alternative, further embodiments of the inspection system may include the speed measurement device having a camera operable to acquire a plurality of images as the object moves from the first position to the final position. In addition to one or more of the features described herein, or as an alternative, further embodiments of the inspection system may include the one or more processors are further responsive to executable computer instructions for determining the speed of the object based at least in part on the plurality of images.
In addition to one or more of the features described herein, or as an alternative, further embodiments of the inspection system may include the determining the speed of the object based at least in part on a change in position of features on the object in the plurality of images. In addition to one or more of the features described herein, or as an alternative, further embodiments of the inspection system may include the at least two non-contact measurement devices being time-of-flight measurement devices.
In addition to one or more of the features described herein, or as an alternative, further embodiments of the inspection system may include the at least two time-of-flight measurement devices having a first time-of-flight measurement devices that is located beneath a surface upon which the object is moved from the first position to the final position. In addition to one or more of the features described herein, or as an alternative, further embodiments of the inspection system the surface including a gap and the first time-of-flight measurement device being positioned to project light through the gap.
In addition to one or more of the features described herein, or as an alternative, further embodiments of the inspection system include the object being an aircraft. In addition to one or more of the features described herein, or as an alternative, further embodiments of the inspection system include the entryway being defined by a first frame. In addition to one or more of the features described herein, or as an alternative, further embodiments of the inspection system include a second frame movably coupled to the first frame, each of the at least two non-contact coordinate measurement devices being coupled to a different portion of the second frame.
In addition to one or more of the features described herein, or as an alternative, further embodiments of the inspection system include the pose measurement device having a camera operably coupled to at least one of the at least two non-contact coordinate measurement devices. In addition to one or more of the features described herein, or as an alternative, further embodiments of the inspection system include the at least two non-contact coordinate measurement devices being area scanners.
These and other advantages and features will become more apparent from the following description taken in conjunction with the drawings.
The detailed description explains embodiments of the invention, together with advantages and features, by way of example with reference to the drawings.
Embodiments of the present disclosure relate to an inspection system that uses multiple three-dimensional (3D) scanners to determine 3D coordinates. Further embodiments relate to an inspection system that scans an object as the object is moved into the inspection system. Still further embodiments relate to an inspection system for an aircraft that scans the aircraft, locates anomalies, and indicates on the aircraft where the anomalies are located. Embodiments of the disclosure provide advantages in reducing the time and improving the accuracy of inspecting objects.
FIG. 1
20
22
20
Referring now to , an embodiment is shown of an inspection system for inspecting objects, such as an aircraft for example. It should be appreciated that while embodiments herein may refer to the object being inspected as being an aircraft, this is for exemplary purposes and the claims should not be so limited. In other embodiments, other objects may be inspected, such as but not limited to: automobiles, trucks, ships, helicopters, trains, space vehicles, pre-fabricated housing and the like. Further, as described in more detail herein, the inspection system may be used for inspecting smaller objects and integrated into an assembly line.
20
24
24
26
24
28
28
28
28
28
28
28
28
28
30
32
30
28
28
26
22
24
28
28
24
22
28
28
FIGS. 7-9
The inspection system includes an entryway . In the illustrated embodiment, the entryway is an opening in a building , such as an aircraft hangar for example. Adjacent the entryway is a plurality of 3D measurement devices, such as laser scanners A, B, C, D, E, F. In an embodiment, the laser scanners A-F are TOF laser scanners, such as the one described with respect to in . In an embodiment, one of the laser scanners F is located below the floor level and projects light through an opening in the floor . In an embodiment, the opening has a width of about 10 centimeters and the laser scanners A-F are operated in a helical mode where the mirror is rotated and the measurement head is fixed (non-rotating) in a position that is perpendicular to the entryway . The operation of the laser scanners A-F in helical mode projects the light in a plane that is substantially parallel to the entryway (approximately perpendicular to the direction of motion of the aircraft ). It should be appreciated that while the illustrated embodiment shows six laser scanners A-F, this is for exemplary purposes and the claims should not be so limited. In other embodiments, more or fewer laser scanners may be used.
20
34
36
34
22
24
34
34
30
24
34
26
22
34
22
24
34
24
28
28
In an embodiment, the system further includes one or more speed detection devices , . In the illustrated embodiment, the speed detection device is a camera, such as an RGB camera that is mounted above the space where the aircraft will travel after passing through the entryway . The camera is positioned such that the camera has a field view that includes a portion of the floor and the entryway . Since the camera position is static and the overall building does not change considerably over time, the background may be segmented out and obstacles identified by using the difference between consecutive frames or by applying a sliding window method. With the background segmented out and dynamic obstacles being identified frame by frame, the aircraft may be detected in the image due to the aircrafts dimension and shape. By calibrating the camera the speed of the aircraft may be estimated as well as the direction of the movement. In an embodiment, the direction is assumed to be perpendicular to the entryway . As discussed below, since the field of view of camera includes the entryway , the presence of a dynamic object may be used initiate operation of the laser scanners A-F.
36
22
36
36
34
In an embodiment, the speed detection devices is a laser range finder device. In this embodiment, a reflective target is attached to the aircraft , such as on the landing gear above the wheels. The range finder is placed to direct light onto the target and measure the distance on a periodic or aperiodic basis. These measurements may be used to estimate the speed of the aircraft. It should be appreciated that the range finder may provide more accurate speed measurements than a camera .
222
22
24
22
34
In an embodiment, infrared LEDs are mounted on the aircraft before the aircraft passes through the entryway . The LEDs allow more accurate tracking of the aircraft with the camera , which enables the registration of all the data obtained in helical mode.
20
38
38
40
26
40
38
40
38
In an embodiment, the system further includes a mobile scanning device . The mobile scanning device may include a docking station that is in a known fixed position within the building . The docking station may be used to recharge the mobile scanning device for example. Further, since the docking station is in a known fixed position, cumulative errors in the mapping and localization system of the mobile scanning device are reduced and the overall accuracy of the scan registration is improved.
38
38
38
28
22
38
22
22
38
28
28
22
26
FIG. 7
FIG. 9
FIG. 5
The mobile scanning device includes a laser scanning device, such as the one described with respect to -. In an embodiment, the mobile scanning device is the system described in commonly owned PCT Patent Publication WO2014/068406, the contents of which are incorporated by reference herein. In one embodiment, the mobile scanning device replaces the laser scanner F. In this embodiment, once the aircraft is in a final position (), the mobile scanning device moves under the aircraft to a plurality of locations to scan the underside of the aircraft . In order to register all scans performed by the mobile scanning device , with the scans acquired by the static laser scanners A-E, the characteristic shape of the aircraft (wings shape and nose) to register all the scans together and achieve a complete 3D model of the aircraft. In other embodiments, other features, such as calibration spheres for example, can be used for the point cloud registration. An advantage of this embodiment is that it can be used to find the pose aircraft within the building .
20
42
42
42
22
42
42
42
20
42
42
42
22
42
42
42
42
42
42
FIG. 10
The system further includes a plurality of projectors A, B, C that are fixed mounted in known locations above the final position of the aircraft . It should be appreciated that while the illustrated embodiment shows three projectors A, B, C, this is for exemplary purposes and the claims should not be so limited. In other embodiments, the system may include more or fewer projectors. The projectors A, B, C are configured to project a visible light onto a surface and trace the light into a pattern to indicate a location on the aircraft . In an embodiment, the projectors A, B, C are the laser projectors described with respect to . In an embodiment, the projectors A, B, C are the laser projector described in commonly owned U.S. Pat. No. 9,410,793, the contents of which are incorporated by reference herein.
FIGS. 2-6
FIG. 1
FIG. 3
FIG. 4
200
22
200
202
22
24
22
22
34
36
22
200
204
28
28
22
26
28
28
22
206
Referring now to , with continuing reference to , a method is shown for scanning an object, such as the aircraft , identifying anomalies on the surface of the object and providing an indication of the location of the anomaly on the object. The method begins in block where the aircraft is detected at the entryway . The aircraft may be movable under its own power, or be towed by another vehicle. The detection of the aircraft may be performed by the camera , the range finder , the infrared LEDs or a combination of the foregoing as described herein. Upon detecting the aircraft , the method proceeds to block where the laser scanners A-F are initiated. As the aircraft is moved further into the building , past the plane of light emitted by the laser scanners A-F (, ), 3D coordinates of points on the surface of the aircraft are acquired in block .
200
208
22
22
22
24
200
200
210
22
FIG. 5
FIG. 6
The method proceeds to block where the aircraft speed is measured. In an embodiment, the speed of the aircraft is continuously measured as the aircraft moves through the entryway to its final position (, ). In other words, while the method is illustrated as being a series of serial steps, one or more of the steps may be performed simultaneously, such as the measurement of the aircraft speed and the acquisition of 3D coordinates for example. The method then proceeds to block where the final position and pose of the aircraft is determined.
26
26
38
500
26
22
26
500
38
500
38
500
500
26
34
38
38
34
22
26
22
22
FIG. 5
In an embodiment, a scan of the building (e.g. empty) and a 3D model of the building is generated. Then, in an embodiment where the mobile scanning device is used project and receive light () to scan the bottom part of the plane, these scans of the underside of the aircraft may be registered with the 3D model of the building , which allows the pose of the aircraft in the building to be obtained. In an embodiment, the light may be a pattern of light that is projected onto the surface of the aircraft and an image of the pattern of light is acquired by a camera on the scanning device (e.g. a structured light scanner or a triangulation scanner). In another embodiment, the light is reflected off of the surface of the aircraft and received by the mobile scanning device , where the coordinates of the surface are based at least in part on the time of flight of the light (e.g. a time-of-flight scanner). In still another embodiment, the light is projected by a laser line probe. In an embodiment, to improve the overall accuracy of the 3D coordinate (point cloud) registration, plurality of calibration spheres may be mounted over the building ceiling and walls. In still another embodiment, the camera is used to track the position of the mobile scanning device while performing the different scans. The mobile scanning device may have a visual marker, to facilitate tracking by the camera . In still another embodiment, the pose of the aircraft in the building uses two 3D LIDARs mounted on both sides of the hangar to detect the aircraft position. Due to the aircraft dimension and shape, the pose of the aircraft may be identified and tracked by the data of the 3D LIDARs. An example of a suitable 3D LIDAR is the Velodyne Puck manufactured by Velodyne LiDAR of San Jose, Calif.
22
200
212
28
28
38
44
44
26
44
26
44
22
26
With the pose of the aircraft determined, the method proceeds to block where the scan data, from the laser scanners A-F, the mobile scanning device and the pose data is registered together using one or more computers . The computers may be positioned locally (e.g. in or near the building ) or be remotely connected via a network. In an embodiment, the computer is a distributed computing system (e.g. a cloud computing system) comprised of a plurality of nodes that may be remotely located from the building and from each other. In an embodiment, the computer includes one or more processors that are responsive to executable computer instructions for registering the data and determining the pose of the aircraft within the building .
22
22
With the point cloud data registered, the surfaces of the aircraft are analyzed to determine anomalies or deviations from an expected surface. In an embodiment, the registered point cloud data is compared to a model, such as a computer aided design (CAD) model. In another embodiment, the registered point cloud data is compared with a point cloud data of the aircraft that was acquired at an earlier point in time. In an embodiment, the anomalies or deviations may include dents, holes, cracks, and deformations for example. In an embodiment, the analysis of the aircraft may be performed using the methods described in commonly owned U.S. Patent Application Ser. No. 62/589,126 filed on Nov. 21, 2017 entitled “System for Surface Analysis and Method Thereof”, the contents of which are incorporated herein by reference.
200
214
42
42
42
600
22
42
42
42
26
22
42
42
42
FIG. 6
The method then proceeds to block where the anomalies or deviations are indicated to the operator. In the illustrated embodiment, the projectors A, B, C project a laser light () on to the aircraft at the location where the anomaly or defect is located. It should be appreciated that since the location of the projectors A, B, C are known within the building and the pose (e.g. position and orientation) of the aircraft is known, the projectors A, B, C can project an indicator light onto the surface of the aircraft where the defect is located. In an embodiment, the indicator may be a trace of a light pattern (e.g. a circle or a square) around the border of the determined anomaly or defect.
200
22
It should be appreciated that method provides advantages in decreasing the time for inspectors to inspect an object, such as aircraft , and locate the position of any defects on the object.
FIGS. 7-9
700
700
722
724
722
724
700
723
722
727
723
725
722
726
725
724
Referring now to , an embodiment is shown of a laser scanner . In this embodiment, the laser scanner has a measuring head and a base . The measuring head is mounted on the base such that the laser scanner may be rotated about a vertical axis . In one embodiment, the measuring head includes a gimbal point that is a center of rotation about the vertical axis and a horizontal axis . The measuring head has a rotary mirror , which may be rotated about the horizontal axis . The rotation about the vertical axis may be about the center of the base . The terms vertical axis and horizontal axis refer to the scanner in its normal upright position. It is possible to operate a 3D coordinate measurement device on its side or upside down, and so to avoid confusion, the terms azimuth axis and zenith axis may be substituted for the terms vertical axis and horizontal axis, respectively. The term pan axis or standing axis may also be used as an alternative to vertical axis.
722
728
730
730
730
730
728
726
732
734
726
736
730
732
726
722
725
723
The measuring head is further provided with an electromagnetic radiation emitter, such as light emitter , for example, that emits an emitted light beam . In one embodiment, the emitted light beam is a coherent light beam such as a laser beam. The laser beam may have a wavelength range of approximately 300 to 1600 nanometers, for example 790 nanometers, 905 nanometers, 1550 nm, or less than 400 nanometers. It should be appreciated that other electromagnetic radiation beams having greater or smaller wavelengths may also be used. The emitted light beam is amplitude or intensity modulated, for example, with a sinusoidal waveform or with a rectangular waveform. The emitted light beam is emitted by the light emitter onto a beam steering unit, such as mirror , where it is deflected to the environment. A reflected light beam is reflected from the environment by an object . The reflected or scattered light is intercepted by the rotary mirror and directed into a light receiver . The directions of the emitted light beam and the reflected light beam result from the angular positions of the rotary mirror and the measuring head about the axes , , respectively. These angular positions in turn depend on the corresponding rotary drives or motors.
728
736
38
738
700
734
700
Coupled to the light emitter and the light receiver is a controller . The controller determines, for a multitude of measuring points X, a corresponding number of distances d between the laser scanner and the points X on object . The distance to a particular point X is determined based at least in part on the speed of light in air through which electromagnetic radiation propagates from the device to the object point X. In one embodiment the phase shift of modulation in light emitted by the laser scanner and the point X is determined and evaluated to obtain a measured distance d.
air
The speed of light in air depends on the properties of the air such as the air temperature, barometric pressure, relative humidity, and concentration of carbon dioxide. Such air properties influence the index of refraction n of the air. The speed of light in air is equal to the speed of light in vacuum c divided by the index of refraction. In other words, c=c/n. A laser scanner of the type discussed herein is based on the time-of-flight (TOF) of the light in the air (the round-trip time for the light to travel from the device to the object and back to the device). Examples of TOF scanners include scanners that measure round trip time using the time interval between emitted and returning pulses (pulsed TOF scanners), scanners that modulate light sinusoidally and measure phase shift of the returning light (phase-based scanners), as well as many other types. A method of measuring distance based on the time-of-flight of light depends on the speed of light in air and is therefore easily distinguished from methods of measuring distance based on triangulation. Triangulation-based methods involve projecting light from a light source along a particular direction and then intercepting the light on a camera pixel along a particular direction. By knowing the distance between the camera and the projector and by matching a projected angle with a received angle, the method of triangulation enables the distance to the object to be determined based on one known length and two known angles of a triangle. The method of triangulation, therefore, does not directly depend on the speed of light in air.
700
726
725
722
723
727
724
In one mode of operation, the scanning of the volume around the laser scanner takes place by rotating the rotary mirror relatively quickly about axis while rotating the measuring head relatively slowly about axis , thereby moving the assembly in a spiral pattern. In an exemplary embodiment, the rotary mirror rotates at a maximum speed of 5820 revolutions per minute. For such a scan, the gimbal point defines the origin of the local stationary reference system. The base rests in this local stationary reference system.
727
700
736
In addition to measuring a distance d from the gimbal point to an object point X, the scanner may also collect gray-scale information related to the received optical power (equivalent to the term “brightness.”) The gray-scale value may be determined at least in part, for example, by integration of the bandpass-filtered and amplified signal in the light receiver over a measuring period attributed to the object point X.
722
740
700
740
741
700
741
The measuring head may include a display device integrated into the laser scanner . The display device may include a graphical touch screen , which allows the operator to set the parameters or initiate the operation of the laser scanner . For example, the screen may have a user interface that allows the operator to provide measurement instructions to the device, and the screen may also display measurement results.
700
742
722
700
742
742
744
746
748
746
748
724
750
752
746
748
700
750
752
750
752
746
748
700
The laser scanner includes a carrying structure that provides a frame for the measuring head and a platform for attaching the components of the laser scanner . In one embodiment, the carrying structure is made from a metal such as aluminum. The carrying structure includes a traverse member having a pair of walls , on opposing ends. The walls , are parallel to each other and extend in a direction opposite the base . Shells , are coupled to the walls , and cover the components of the laser scanner . In the exemplary embodiment, the shells , are made from a plastic material, such as polycarbonate or polyethylene for example. The shells , cooperate with the walls , to form a housing for the laser scanner .
750
752
746
748
754
756
750
752
754
756
750
752
754
756
758
744
724
758
754
756
744
750
752
754
756
754
756
746
748
754
756
742
746
748
750
754
On an end of the shells , opposite the walls , a pair of yokes , are arranged to partially cover the respective shells , . In the exemplary embodiment, the yokes , are made from a suitably durable material, such as aluminum for example, that assists in protecting the shells , during transport and operation. The yokes , each includes a first arm portion that is coupled, such as with a fastener for example, to the traverse adjacent the base . The arm portion for each yoke , extends from the traverse obliquely to an outer corner of the respective shell , . From the outer corner of the shell, the yokes , extend along the side edge of the shell to an opposite outer corner of the shell. Each yoke , further includes a second arm portion that extends obliquely to the walls ,. It should be appreciated that the yokes , may be coupled to the traverse , the walls , and the shells , at multiple locations.
744
760
46
48
760
742
760
744
726
726
730
744
760
736
736
736
760
727
760
738
In an embodiment, on top of the traverse , a prism is provided. The prism extends parallel to the walls , . In the exemplary embodiment, the prism is integrally formed as part of the carrying structure . In other embodiments, the prism is a separate component that is coupled to the traverse . When the mirror rotates, during each rotation the mirror directs the emitted light beam onto the traverse and the prism . Due to non-linearities in the electronic components, for example in the light receiver , the measured distances d may depend on signal strength, which may be measured in optical power entering the scanner or optical power entering optical detectors within the light receiver , for example. In an embodiment, a distance correction is stored in the scanner as a function (possibly a nonlinear function) of distance to a measured point and optical power (generally unscaled quantity of light power sometimes referred to as “brightness”) returned from the measured point and sent to an optical detector in the light receiver . Since the prism is at a known distance from the gimbal point , the measured optical power level of light reflected by the prism may be used to correct distance measurements for other measured points, thereby allowing for compensation to correct for the effects of environmental variables such as temperature. In the exemplary embodiment, the resulting correction of distance is performed by the controller .
724
742
722
723
22
23
In an embodiment, the base is coupled to a swivel assembly (not shown) such as that described in commonly owned U.S. Pat. No. 8,705,012 ('012), which is incorporated by reference herein. The swivel assembly is housed within the carrying structure and includes a motor that is configured to rotate the measuring head about the axis . In an embodiment, the angular/rotational position of the measuring head about the axis is measured by angular encoder.
766
766
766
An auxiliary image acquisition device may be a device that captures and measures a parameter associated with the scanned area or the scanned object and provides a signal representing the measured quantities over an image acquisition area. The auxiliary image acquisition device may be, but is not limited to, a pyrometer, a thermal imager, an ionizing radiation detector, or a millimeter-wave detector. In an embodiment, the auxiliary image acquisition device is a color camera.
712
712
722
730
732
728
716
718
717
728
726
726
736
734
718
717
728
718
718
712
723
726
725
In an embodiment, a central color camera (first image acquisition device) is located internally to the scanner and may have the same optical axis as the 3D scanner device. In this embodiment, the first image acquisition device is integrated into the measuring head and arranged to acquire images along the same optical pathway as emitted light beam and reflected light beam . In this embodiment, the light from the light emitter reflects off a fixed mirror and travels to dichroic beam-splitter that reflects the light from the light emitter onto the rotary mirror . In an embodiment, the mirror is rotated by a motor and the angular/rotational position of the mirror is measured by angular encoder . The dichroic beam-splitter allows light to pass through at wavelengths different than the wavelength of light . For example, the light emitter may be a near infrared laser light (for example, light at wavelengths of 780 nm or 1150 nm), with the dichroic beam-splitter configured to reflect the infrared laser light while allowing visible light (e.g., wavelengths of 400 to 700 nm) to transmit through. In other embodiments, the determination of whether the light passes through the beam-splitter or is reflected depends on the polarization of the light. The digital camera obtains 2D images of the scanned area to capture color data to add to the scanned image. In the case of a built-in color camera having an optical axis coincident with that of the 3D scanning device, the direction of the camera view may be easily obtained by simply adjusting the steering mechanisms of the scanner—for example, by adjusting the azimuth angle about the axis and by steering the mirror about the axis .
FIG. 10
1000
700
22
22
1000
1000
22
1000
1000
1020
1030
1020
1001
1001
1000
1001
1012
1012
1001
1001
1015
1000
1000
Referring now to , an embodiment is shown of a laser radar projector system . The system emits a light beam onto a surface of an object (e.g. aircraft ) in the environment. In some embodiments, the light beam is traced over a predetermined path at a rapid rate to generate a template or a light pattern on the surface of the object . The system is also operable to measure the distance from the system to the surface of object . In some embodiment, the system may also determine the three-dimensional coordinates of points on the surface. The laser radar projector system includes a projection subsystem and a feedback subsystem . The projection subsystem includes a light source , such as a laser light source that is operable to emit pulses of laser light at a rate of 50 kHz to 100 kHz. The light of laser source is used in both functions of the system : laser projection and non-contact 3D measurement by scanning and ranging. In an embodiment, the light source emits a light at a green wavelength of 532 nanometers and has a pulse duration of about 250-500 picoseconds. The light beam emitted from laser may have a diameter of about 0.4 to 1.0 millimeters. In an embodiment, the average output power of the laser is about 25 to 30 milliwatts that is adequate, after power losses in the system, to provide the average power of the output beam up to 5 milliwatts. Output laser beam average power of the system within 5 milliwatts corresponds to the Laser Safety Class 3R according to the International Standard IEC 60825-1. In another embodiment, the system could have an output average beam power within 1 milliwatt that corresponds to the Laser Safety Class 3R of International Standard IEC 60825-1.
1001
1012
1040
1040
1042
1012
1044
1042
1040
1043
1047
1040
1012
1044
1047
1047
1044
1045
1060
1064
1044
1042
1044
1042
22
1010
1044
1045
1064
The light source emits a pulsed light beam that strikes a beam splitter . The beam splitter reflects a reference light portion of the light beam towards an attenuator . In an embodiment, some of the light reflected by the beam splitter passes through a lens that focuses the light into the optical fiber . In the exemplary embodiment, the beam splitter reflects about 1% of the light towards the attenuator . In the exemplary embodiment, the beam splitter may be a Beam Sampler manufactured by THORLABS, INC. of Newton, N.J. The optical fiber is preferably a single mode type of fiber. A single mode fiber, for example, for a green light, has the fiber core about 4 micrometers in diameter. The light from the fiber travels through the attenuator , through an output fiber and is launched into the detector body via an opening . In the exemplary embodiment, the attenuator is a variable micro-electromechanical-system (MEMS) such as that manufactured by DICON FIBEROPTICS, INC. of Richmond, Calif. for example. It should be appreciated that other types of optical attenuators may also be used provided that they allow to reduce the optical power of the reference light , these attenuators include but are not limited to different kind of variable attenuators, such as loopback attenuators, liquid crystal variable attenuators, electro-optical and acousto-optical attenuators and alike. As will be discussed in more detail herein, the attenuator changes the optical power of the reference light to be similar or substantially equal to the optical power of the feedback light beam that is reflected from the surface of object . This provides advantages in maintaining a similar dynamic range of signals at the optical sensor between the reference light beam and the feedback light beam. As will be discussed in more detail herein, the output of the attenuator is a fiber optic cable that routes the reference light beam to an opening in the detector body that allows the light to strike an optical sensor.
1040
1003
1003
1015
22
1003
1003
1003
1046
1048
1046
1003
1048
1046
1046
1048
1050
1003
1050
The light that passes through the beam splitter is directed toward an acousto-optical modulator (AOM) . The AOM serves as a beam shutter and attenuator thus adjusting the power of the output beam directed toward the object . In an embodiment, the AOM works similar to that described by Xu, Jieping and Stroud, Robert, Acousto-optic Devices: principles, design and applications, John Willey & Sons, Inc., 1992, the contents of which are incorporated by reference herein. In an embodiment, the AOM is an AO Frequency Shifter Model 1205-1118 manufactured by ISOMET CORP. of Springfield, Va. USA. The AOM splits the incoming laser light beam into a first order beam and a zero-order beam . The intensity or optical power of the first order beam depends on a control signal transmitted from a controller to the AOM . Depending on a control signal, part of the incoming light is redirected from zero-order to the first order . Therefore, the intensity of the first order beam may be varied based on the control signal. In an embodiment, the zero-order beam is directed into a plate . In an embodiment, when no control signal is provided to the AOM , substantially all of the incoming light beam is being blocked by the plate .
1046
1002
1052
1002
1046
1002
1013
1052
1015
1015
22
1002
1015
1052
1002
1004
1004
1052
1016
1016
1011
1052
1014
1014
1054
1054
1015
1000
22
1054
1005
1006
1005
1006
1015
1054
1014
1054
1015
1004
FIG. 10
The first order beam further passes through a beam expander/collimator which outputs a light beam . The beam expander typically consists of two lenses (not shown in ) collimating the beam and expanding its diameter about 10 to 15 times. The output lens of the beam expander may be moved in the directions indicated by arrow to allow adjustment of the size and convergence of the beam (and, therefore, the beam ) thus focusing the output beam as a cone of light into a focused laser spot on the surface of the object . In an embodiment, the beam expander is coupled to a motor (not shown). This allows the signal light beam to be focused onto a desired focusing point as a cone. The light beam that is coming out of the beam expander is directed toward the beam splitter . The beam splitter reflects a portion of the light beam as light beam . The light beam strikes a beam dump and it dissipated. The remainder of the light beam passes through the beam splitter and proceeds as signal light beam . The signal light beam proceeds to steering system . The steering system directs the signal light beam from the system towards the object . In the exemplary embodiment, the steering system includes a first mirror and a second mirror . As discussed in more detail herein, the mirrors , each are coupled to a galvanometer that allows the selective changing of the angle of the mirror relative to the incoming light beam to allow the changing of the direction of the signal light beam . It should be appreciated that the use of mirrors with galvanometers is for exemplary purposes and the claims should not be so limited. In other embodiments, the steering system may include a rotating mirror that rotates about an axis that is substantially collinear with the optical axis of the light beam . In still other embodiments, the steering system includes a gimbal arrangement that is rotatable about a pair of orthogonal axes. In this arrangement, the signal light beam may be emitted directly from the beam splitter . In yet another embodiment the beam steering system may be based on electro-optical phase array.
1015
1000
22
1015
1000
1000
1000
1006
1005
1030
1004
1014
1004
1017
1007
1014
1017
1008
1009
1017
1056
1062
1060
1057
1058
1056
1062
1057
FIG. 10
In operation the signal light beam is emitted from the system converges into a cone and strikes the surface on the object . In this embodiment, the signal light beam is focused on a spot. Typically, the surface reflects the light diffusely, and the reflected light is directed widely back towards the system . It should be appreciated that a portion of this reflected light, referred to herein as the feedback light beam, is directed back towards the system . In the embodiment of , the feedback light beam enters the system via the mirrors , and into the optical feedback subsystem . The feedback light beam is transmitted towards the beam splitter along the same optical path as light beam . The feedback light beam is reflected off of the beam splitter as light beam towards mirror which decouples the feedback light beam from the shared path with light beam . The light beam further passes through a focusing lens and spatial filter . The feedback light beam then passes through a beam size lens before passing through an opening in the detector body and striking the optical sensor. In an embodiment, the optical sensor is a photomultiplier tube or a hybrid photo detector such as Model R10467U-40 or Model R11322U-40 high speed compact hybrid photo detector manufactured by HAMAMATSU PHOTONICS K.K. of Iwata City, Japan. In an embodiment, a neutral density filter is movable in the direction into or out of the optical path of feedback light beam between the beam size lens and the opening . In an embodiment, insertion of the neutral density filter into the optical path based on the brightness of the feedback light beam.
1008
1009
1011
1009
1008
1010
In an embodiment, the lens , spatial filter and beam dump cooperate to suppress undesired background light. In an embodiment, the background light suppression may be accomplished in the manner described in co-owned U.S. Pat. No. 8,582,087, the contents of which is incorporated herein by reference. In an embodiment, the spatial filter contains centrally located pinhole formed in a disk-shaped mask as described in the above reference '087 patent. Since the background light that goes through the lens is not collimated it is not concentrated on the pinhole but rather over an area of the mask. The arrangement of the pinhole and the mask thus substantially blocks the undesired background light from striking the optical sensor .
1045
1000
22
In an embodiment, the output of fiber optical cable emits the reference light beam towards a diffuser. The diffuser diffuses the incoming light and has been found, in combination with the imaging lens, to reduce speckle on the optical sensor effective area. It should be appreciated that since the reference light beam is on an angle relative to the surface of diffuser (and the optical axis of feedback light beam), the diffuser and lens redirect the reference light beam to allow the reference light beam to strike the optical sensor effective area. Thus, the reference light beam and feedback light beam both strike the same effective area of the detector. This provides advantages in reducing or eliminating signal errors that occurred in prior art systems that utilized separate and discrete optical sensors for the reference and feedback light beams. The system uses time-of-flight principles to determine the distance to the object based on the time difference between the reference light beam pulse and the feedback light beam pulse striking the optical sensor.
1040
1043
1044
1045
1000
It should be appreciated that in an embodiment, the reference light beam pulse may be eliminated, allowing the beam splitter , the lens , the attenuator , and the fiber optic cable to be removed from the system .
20
1100
1100
1102
1104
1106
1108
1110
FIG. 1
FIG. 11
FIG. 12
It should be appreciated that the inspection system illustrated in may also be applied to smaller objects. Referring now to and , an inspection system is shown that combines together scan data from multiple measurements devices acquired on a moving target. The system includes a frame comprised of a plurality of upright posts and cross members that define an open area having an entryway .
1100
1112
1112
1112
1112
1112
1112
1112
1112
1112
FIGS. 14A-14D
The system further includes a plurality of measurement devices A, B, C. In the illustrated embodiment, the measurement devices A, B, C are triangulation or area scanners, such as that described in commonly owned United States Patent Application 2017/0054965 or U.S. patent application Ser. No. 15/784,437, the contents of both of which are incorporated herein by reference. In an embodiment, the area scanners A, B, C are the scanner shown and described with respect to . As described in more detail below, in an embodiment, an area scanner emits a pattern of light from a projector onto a surface of an object and acquires a pair of images of the pattern on the surface. In at least some instances, the 3D coordinates of the elements of the pattern are able to be determined. In other embodiments, the area scanner may include two projectors and one camera.
1112
1112
1112
1114
1116
1118
1120
1116
1110
1114
1102
1122
1122
1122
1114
1122
1122
1122
1124
1114
1124
The area scanners A, B, C are mounted to a frame having a transverse member , a first post member and a second post member . The transverse member is generally parallel with the entryway . The frame is mounted to the frame by rails A, B, C. In an embodiment, the frame is slidable in operation along the rails A, B, C in a direction indicated by the arrow . The movement of the frame may be driven by one or more actuators, such as motors for example.
1122
1122
1122
1110
1110
1122
1122
1122
1108
1114
1122
1122
1122
1122
1122
1122
1122
1122
1122
1116
1118
1120
1122
1122
1122
1116
1118
1120
In operation, the area scanners A, B, C are positioned adjacent the entryway . As the object to be inspected is moved through the entryway the presence of the object will be detected by the area scanners A, B, C. In an embodiment, the object may be on a movable platform, such as a cart for example. Upon detection of the object, the three dimensional coordinates of the object are acquired. In an embodiment, the object is moved into the open area and the scanning of the object is performed by moving the frame and area scanners A, B, C along the rails A, B, C. In still another embodiment, each of the area scanners A, B, C are independently movable along the length of the respective member , , to which it is attached. It should be appreciated that the movement of the area scanners A, B, C along the members , , allows the field of view of the area scanner to be changed. This could provide advantages in obtaining 3D coordinates of surfaces on the object that may otherwise be hidden or in a shadow of the initial position of the area scanner.
1122
1122
1122
Once the scans are completed, the scan data, including the acquired 3D coordinates and the speed in which the object is moving are transferred to a computing device and the scans are registered as described herein. In an embodiment, the at least one of the area scanners A, B, C includes a camera, such as a color camera for example, that acquires images of the object as the scanning is performed. As described herein, by tracking features of the object, between successive frames, the speed that the object is moving can be determined. Once the scan data is registered, a comparison of the object to specifications (e.g. a CAD model) may be performed to identify surfaces or features that are out of specification.
1100
1104
1300
1302
1304
1306
1306
1308
1310
1312
1100
1300
1314
1316
1318
1320
1316
1318
1320
1322
1322
1322
1314
1324
1324
1324
1308
1312
1308
1304
1308
1322
1322
1322
1308
1304
1308
1322
1322
1322
1308
1312
1314
1322
1322
1322
1316
1318
1320
1326
1322
1322
1322
1308
1304
1300
It should be appreciated that the inspection system is arranged to have the object pass through the frame . In another embodiment, an inspection system is provided wherein a side opposite the entryway is not open, but rather includes one or more cross members . The cross member prevents the object and the movable platform from passing through the frame . Similar to the inspection system , the inspection system has a frame having a transverse member and a pair of vertical posts , . Mounted to the transverse member and posts , are area scanners A, B, C. The frame is movably mounted on rails A, B, C. In operation, the object is moved into the open space within the frame . As the object moves towards the entryway , the presence of the object is detected by the scanners A, B, C and 3D coordinates of the object are acquires as the object is moved through the entryway . The speed of the object may be determined by one or more cameras on the scanners A, B, C. The object is then brought to a stop within the frame and the frame is optionally moved to acquire additional 3D coordinates. In an embodiment, the scanners A, B, C are movable along the transverse member and the posts , to allow the field of view of the scanners A, B, C to be changed. Once the desired 3D coordinates have been acquired, the object is moved back through the entryway to exit the inspection system .
1122
1122
1122
1322
1322
1322
1400
1400
1405
1420
1430
1440
1422
1420
1432
1430
1442
1440
1450
1450
1450
FIGS. 14A-14D
FIGS. 14C, 14D
FIG. 14D
In an embodiment, the area scanners A, B, C and the area scanners A, B, C are the scanner shown in . In this embodiment, the area scanner is a triangulation scanner that includes a body , a projector , a first camera , and a second camera . In an embodiment, the projector optical axis of the projector , the first-camera optical axis of the first camera , and the second-camera optical axis of the second camera all lie on a common plane , as shown in . In some embodiments, an optical axis passes through a center of symmetry of an optical system, which might be a projector or a camera, for example. For example, an optical axis may pass through a center of curvature of lens surfaces or mirror surfaces in an optical system. The common plane , also referred to as a first plane , extends perpendicular into and out of the paper in .
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1408
In an embodiment, the body includes a bottom support structure , a top support structure , spacers , camera mounting plates , bottom mounts , dress cover , windows for the projector and cameras, Ethernet connectors , and GPIO connector . In addition, the body includes a front side and a back side . In an embodiment, the bottom support structure and the top support structure are flat plates made of carbon-fiber composite material. In an embodiment, the carbon-fiber composite material has a low coefficient of thermal expansion (CTE). In an embodiment, the spacers are made of aluminum and are sized to provide a common separation between the bottom support structure and the top support structure.
1420
1424
1426
1420
1425
1424
1425
1420
In an embodiment, the projector includes a projector body and a projector front surface . In an embodiment, the projector includes a light source that attaches to the projector body that includes a turning mirror and a diffractive optical element (DOE). The light source may be a laser, a superluminescent diode, or a partially coherent LED, for example. In an embodiment, the DOE produces an array of spots arranged in a regular pattern. In an embodiment, the projector emits light at a near infrared wavelength.
1430
1434
1436
1430
1420
In an embodiment, the first camera includes a first-camera body and a first-camera front surface . In an embodiment, the first camera includes a lens, a photosensitive array, and camera electronics. The first camera forms on the photosensitive array a first image of the uncoded spots projected onto an object by the projector . In an embodiment, the first camera responds to near infrared light.
1440
1444
1446
1440
1420
1402
1402
1405
1402
In an embodiment, the second camera includes a second-camera body and a second-camera front surface . In an embodiment, the second camera includes a lens, a photosensitive array, and camera electronics. The second camera forms a second image of the uncoded spots projected onto an object by the projector . In an embodiment, the second camera responds to light in the near infrared spectrum. In an embodiment, a processor is used to determine 3D coordinates of points on an object according to methods described herein below. The processor may be included inside the body or may be external to the body. In further embodiments, more than one processor is used. In still further embodiments, the processor may be remotely located from the triangulation scanner.
1430
1440
1310
In an embodiment, images from at least one of the cameras , are used to determine the speed that the object is moving. In an embodiment, the change in position of features on the object are determined between frames to determine the speed of the object. In another embodiment, LED lights on the mobile platform are tracked from frame to frame to determine the speed of the object.
It should be appreciated that while embodiments herein describe the object as moving through, or at least relative to, the entryway, this is for example purposes and the claims should not be so limited. In other embodiments, the object remains stationary and the entryway moves relative to the object from a first position to a final position. In an embodiment, the movement of the entryway may be determined using a position encoder in the linear axis.
Terms such as processor, controller, computer, DSP, FPGA are understood in this document to mean a computing device that may be located within an instrument, distributed in multiple elements throughout an instrument, or placed external to an instrument.
While the invention has been described in detail in connection with only a limited number of embodiments, it should be readily understood that the invention is not limited to such disclosed embodiments. Rather, the invention can be modified to incorporate any number of variations, alterations, substitutions or equivalent arrangements not heretofore described, but which are commensurate with the spirit and scope of the invention. Additionally, while various embodiments of the invention have been described, it is to be understood that aspects of the invention may include only some of the described embodiments. Accordingly, the invention is not to be seen as limited by the foregoing description, but is only limited by the scope of the appended claims.
BRIEF DESCRIPTION OF THE DRAWINGS
The subject matter, which is regarded as the invention, is particularly pointed out and distinctly claimed in the claims at the conclusion of the specification. The foregoing and other features, and advantages of the invention are apparent from the following detailed description taken in conjunction with the accompanying drawings in which:
FIG. 1
is a perspective view of an inspection system in accordance with an embodiment;
FIG. 2
FIG. 1
is a flow diagram of a method of inspecting large objects with the inspection system of ;
FIG. 3
FIG. 1
is a plan view of the inspection system of with an aircraft being inspected;
FIG. 4
FIG. 1
is an elevation view of the inspection system of with an aircraft being inspected;
FIG. 5
FIG. 3
is a plan view of the inspection system of with the aircraft with a final position or pose being determined;
FIG. 6
FIG. 5
is a plan view of the inspection system of with the anomalies being indicated on the aircraft;
FIG. 7
FIG. 1
is a perspective view of a laser scanner for use in the inspection system of in accordance with an embodiment;
FIG. 8
FIG. 7
is a side view of the laser scanner of illustrating a method of measurement according to an embodiment;
FIG. 9
FIG. 7
is a schematic illustration of the optical, mechanical, and electrical components of the laser scanner of according to an embodiment;
FIG. 10
FIG. 1
is a schematic illustration of a laser projector system for use in the inspection system of in accordance with an embodiment;
FIG. 11
is a perspective view of an inspection cell in accordance with another embodiment;
FIG. 12
FIG. 11
is a reverse perspective view of the inspection cell of
FIG. 13
is a perspective view of another inspection cell in accordance with an embodiment; and
FIG. 14A, 14B, 14C
FIG. 14D
FIG. 11
FIG. 13
and are various views of an area scanner used with the inspection cells of and . | |
Sounds crazy, right? World War III? Maybe. Since the year 70 of the common era, Judaism has lost its crown jewel: the Holy Temple in Jerusalem. To rebuild it would take something of a complete metal switch from western culture to Jewish culture, by which I mean a national realization that the Jewish people must rebuild themselves completely from the top down. As of this moment, the only thing stopping the state of Israel from actually rebuilding the Temple is lack of cultural and political will. Translated into a very simple term: fear.
According to a poll conducted over 8 years ago sponsored by the Dahaf Institute way back in 2002, an astonishing 53% of Israeli Jews said they would like to see the Temple rebuilt on the Temple Mount. The implications of the poll are that, culturally, the Jewish State may finally be molding itself to return to its spiritual roots and take big steps. A more recent poll has not been conducted, but my guess is that the number has risen to the 60% mark or higher.
The situation on the Temple Mount for Jews presently is nothing short of shocking. Jews are forbidden from Jewish Prayer on the mount, or from carrying on them any religious material like chai necklaces, mezuzah jewelry, or any star of David jewelry, or anything that symbolizes Jewish religion in order not to incense the Arabs. Even worse than that, archaeological treasures are being dumped from the mount in truckloads constantly, with thousands of years of Jewish heritage and Jewish history going to the dumps with it.
As recorded in I Kings, King Hiram of Lebanon sent cedars that King Solomon used to build the foundations of the First Temple. Those cedars, if actually sent, should be about 2,900 years old. There are enormous wooden pillars at the base of the Temple Mount that are simply lying there. Carbon dating has been done on them recently, confirming that they indeed are close to 3,000 years old. And they lay there. | https://blog.worldofjudaica.com/jewish-culture/jewish-temple-rebuilt/ |
Kanseil is a new folk metal band from Italy that has gained my respect with their beautiful demo. They come from Fregona, a municipality of the Province of Treviso in Veneto. It is located at the feet of Cansiglio, a plateau in the northern-Italian Prealps, from which the band took its name (Cansiglio = Canséi or Canséjo in Venetian language). Kanseil were formed in the end of 2010 and soon started playing at local gigs and events, either as a metal band or as an acoustic project. After some line-up changes they entered the studio and recorded their debut demo “Tzimbar Bint” on the end of 2012.
“Tzimbar Bint” is a five track demo with a total duration a little over 21 minutes. Except for a short intro, it contains 3 folk black metal tracks and one acoustic folk song. Kanseil play exactly the folk black metal style I like. Guitar riffs following traditional tunes, retaining their black metal roots, combined with acoustic guitars, natural sounding local traditional instruments and various vocal styles. Their production is very good for a demo album and they have a very natural sound, but of course they still need a lot of work. The band uses a wide range of traditional instruments, like pipes, kantele, mouth harp, thin whistles, low whistles and rauschpfeife. Some of these instruments are hand-made by the band members, something that reveals their love for folk music and explains their personal sound. Their music is influenced by central European and Celtic folk music, as well as from the Baltic scene and the result is very interesting. Their vocals vary from black metal screams to clean folk male vocals and narrations, according to each song’s demands and luckily they are very good in all of them, matching the quality of their compositions. The instrumental acoustic song “Dar Bald Hat Geheft Zo Reda (Il Bosco ha Iniziato a Parlare)” is an amazing piece in folk / neofolk style. Actually it’s so good that I am sure Kanseil could easily make a great album in this style exclusively. Not that I prefer it though, since their folk black metal songs are excellent too. They sing both in English and Italian and their lyrics are inspired by the beauty of local nature, history and legends.
Kanseil is a band that deserves the attention of folk metal fans and definitely of folk metal labels. Their demo includes over 20 minutes of excellent and variable folk black metal and their compositions are much better that many bands with official releases. “Tzimbar Bint” was released by the band in a limited number of CD-Rs, but you can listen to all of their songs in their official Facebook, YouTube and ReverbNation profiles. They are planning to release their debut full-length album in 2014 and I am really looking forward to it.
dimiarch
Rating: (9/10)
Links: | http://www.metalsoundscapes.com/archives/9165/kanseil-tzimbar-bint-demo |
135 Ill.2d 159 (1990)
552 N.E.2d 726
THE PEOPLE OF THE STATE OF ILLINOIS, Appellant,
v.
SANTIAGO SANDOVAL, Appellee.
No. 68286.
Supreme Court of Illinois.
Opinion filed January 17, 1990.
Rehearing denied April 9, 1990.
*160 *161 *162 Neil F. Hartigan, Attorney General, of Springfield, and Fred L. Foreman, State's Attorney, of Waukegan (Robert J. Ruiz, Solicitor General, Terence M. Madsen and Jack Donatelli, Assistant Attorneys General, of Chicago, and Kenneth R. Boyle, John X. Breslin and Nancy Rink Carter, all of the State's Attorneys Appellate Prosecutor, of Ottawa, of counsel), for the People.
Robert P. Will, Jr., of Will & Briscoe, of Waukegan, for appellee.
Appellate court judgment reversed; circuit court judgment affirmed.
JUSTICE CLARK delivered the opinion of the court:
At issue in this case is the admissibility of certain evidence about the sexual history of the complainant under *163 the State's rape shield statute (Ill. Rev. Stat. 1987, ch. 38, par. 115-7). Santiago Sandoval, appellee, was found guilty on two counts of criminal sexual assault (Ill. Rev. Stat. 1985, ch. 38, par. 12-13(a)(1)) and one count of battery (Ill. Rev. Stat. 1985, ch. 38, par. 12-3) and not guilty of aggravated criminal sexual assault (Ill. Rev. Stat. 1985, ch. 38, par. 12-14(a)(2)) and unlawful restraint (Ill. Rev. Stat. 1985, ch. 38, par. 10-3(a)) following a trial by jury in the Lake County circuit court. On appeal, the convictions were reversed and the cause was remanded for a new trial. (178 Ill. App.3d 669.) This court granted the State's petition for leave to appeal pursuant to our Rule 315(a) (107 Ill.2d R. 315(a)). Two questions are presented for review: (1) Is evidence of a victim's sexual relations with men other than defendant strictly precluded under the rape shield statute or may a victim waive the rule of evidence, thus allowing the evidence of prior sexual conduct? (2) Is evidence that a victim has not dated since the alleged attack properly excluded as collateral? For the reasons stated below, we reverse.
The incident which led to the indictment, euphemistically referred to as "date rape," occurred on January 1, 1987. Sandoval had a date on New Year's Eve with his 20-year-old former live-in girlfriend; following a separation begun when the complainant moved out of the apartment she shared with Sandoval, the two had begun seeing one another again and had plans to celebrate the new year together. Although Sandoval's and complainant's accounts of how the evening ended differed substantially, both indicate that repeated acts of anal intercourse followed by oral sex occurred. We will detail the events of the evening only as they are relevant for our analysis.
Sandoval testified that the events of New Year's Eve merely represented the same pattern which had occurred *164 throughout his prior tempestuous relationship with the complainant: a fight was followed by making love. Sandoval further testified that an argument began when, during their evening out, he learned from an acquaintance that the complainant allegedly had an affair with another man during their on-again/off-again separation. Although the evening seemed to be following the same old pattern of fighting followed by sex, he stopped the lovemaking (which he testified had been mutual and consensual to that point) because he could not continue, knowing that complainant had an affair during their separation. He ended the sexual encounter and told complainant to leave his house. Sandoval acknowledged that they had anal sex, a practice which, he testified, the two had engaged in on at least a dozen prior occasions and which was initiated by complainant on this occasion, followed by oral sex, which he also asserts was initiated by his partner. Sandoval argues that the present charges stem from the complainant's anger at being rejected after she had initiated sex between them; indeed, he testified at trial that as complainant left the apartment, she threatened him. Shortly thereafter, the police knocked at his door.
The complainant's testimony depicted a somewhat different conclusion to the evening. Complainant testified that Sandoval had become angry when he learned that she had been out with another man a week earlier. Rather than be left stranded at the bar in Wisconsin where they were when Sandoval learned about the evening out, complainant got into Sandoval's car as he was leaving. Sandoval then drove directly to his apartment. Leaving her coat in the car, the complainant followed Sandoval into the apartment where she attempted to talk with him about their relationship. She testified that he continued to get more upset and angry. She tried to leave, but Sandoval grabbed her arm; he told her, according *165 to her testimony, that he was going to have sex with her one last time. After a physical confrontation in the living room, Sandoval pushed complainant into the bedroom, where he hit her several times on the back of the head, told her he was going to make it hurt, and forced her into repeated acts of anal intercourse followed by oral sex. Complainant testified that she begged Sandoval not to engage in anal sex with her; although she testified that they had had anal sex on two prior occasions, she indicated that she had told Sandoval that she did not enjoy it and that it hurt. Finally, when complainant thought that she could escape without being caught, the complainant ran out of the apartment to an upstairs apartment where the resident allowed her to call the police. When she knocked on the neighbor's door she was wearing only undergarments and a skirt. She left behind her purse, her sweater, and some jewelry.
During the complainant's direct examination at trial, the following exchange occurred between the State's Attorney and the complainant:
"Q. Now, you had had anal sex with him before?
A. Yes.
Q. And on how many occasions had he had anal sex with you?
A. Twice.
Q. And do you recall at whose request that occurred?
A. [Sandoval's].
Q. Had you ever had anal sex in the past?
A. With others?
Q. Yes, with other people.
A. No."
No objection to this testimony was made by the defense counsel.
On cross-examination, the complainant again reiterated that she had not had anal intercourse with others. Defense counsel, in an attempt to impeach the complainant, *166 then asked "Okay. Now you know a fellow named ." The State's Attorney objected to the question, basing the objection on the preclusion of such testimony in the provisions of the rape shield statute. Although the trial court initially indicated that the defense could, in its case in chief, bring in testimony to impeach the complainant because the prosecution had "opened the door," the court later reversed that ruling. Having reviewed the rape shield statute, the court found that such testimony was excluded under the provisions of the statute. Out of the hearing of the jury, the court admonished both the defense counsel, for not objecting to the original question posed by the prosecution, and the prosecutor, for asking a question precluded by the statute. The court indicated to counsel, outside the presence of the jury, that the defense could not ignore the strictures of the rape shield statute by failing to object to inadmissible information and then attempt to premise its case on information precluded under the statute. Defense counsel, by offer of proof for the record and out of the hearing of the jury, indicated that a certain male individual would have testified that, when he dated the complainant, they had engaged in anal sex.
Following the court's denial of defense counsel's motion for mistrial and just prior to giving the jury instructions, the court, on defense counsel's motion, instructed the jury to disregard the complainant's testimony that she had not had anal sex with others. Rather than allow further inadmissible testimony to further taint the trial, the court struck the complainant's testimony.
The trial court also rejected defense counsel's attempts to impeach the complainant's testimony, elicited on cross-examination, that the incident with Sandoval had changed her relationship with men and that she had been unable to date since the occurrence. Defense counsel questioned complainant about her presence at a certain *167 bar, just a few days before the trial, with another gentleman. When the complainant denied being on a date, defense counsel indicated to the court that he wished to impeach with a witness who would testify that he saw the complainant, just a few days before the trial, at a local bar "hanging all over a gentleman friend of hers." The trial court refused to admit this evidence.
Sandoval appealed his conviction, arguing that the court's refusal to allow him to challenge the complainant's testimony denied him his constitutional right to confront and cross-examine the witness against him. The appellate court did not reach the constitutional issue on the impeachment testimony about past sexual experiences, however. Rather, it looked to the language of the statute and concluded that the rape shield statute did not preclude a complainant from testifying about her own past sexual activities, or lack thereof, with third parties. In essence, the appellate court found that the complainant's own waiver of the statute's protection precluded assertion of that protection as a shield against the defendant. As to the complainant's testimony that she had not dated, without citation to authority, the appellate court also reversed. The court reasoned that since the case "came down to an evaluation by the jury of the credibility of complainant and defendant" (178 Ill. App.3d at 677), the defendant's impeaching evidence was allowable as "relevant to the believability of [complainant's] accusations against defendant" (178 Ill. App.3d at 678).
For the reasons stated below, we reverse the judgment of the appellate court.
Prior to enactment of the rape shield statute in 1978 (Ill. Rev. Stat. 1987, ch. 35, par. 115-7), to a certain extent a victim's sexual history was admissible at trial when the affirmative defense of consent was alleged by the defendant. However, any testimony offered was *168 strictly limited by the courts to the victim's general reputation for immorality and unchastity (People v. Collins (1962), 25 Ill.2d 605, 611; see also People v. Ellison (1984), 123 Ill. App.3d 615, 624); specific acts of immorality or promiscuity were not admissible (Collins, 25 Ill.2d at 611; Ellison, 123 Ill. App.3d at 624). This court noted in Collins that, since lack of consent was an element of the complaint, "it is permissible, in order to show the probability of consent by the prosecutrix, that her general reputation for immorality and unchastity be shown. The underlying thought here is that it is more probable that an unchaste woman would assent to such an act than a virtuous woman * * *." (Collins, 25 Ill.2d at 611.) It has been averred that the premise of this rationale was based on the presumption that "[t]ruthfulness and chastity in women were thought to be virtues that were found only together. No `unchaste' woman was expected to be truthful." (Murphy, Rape Shield Statute Upheld by Illinois Appellate Court, 69 Ill. B.J. 110 (1980) (hereinafter cited as Murphy, Rape Shield Statute).) Support for acknowledgment of the prevalence of such a presumption is found in clear judicial statements: "`It is a matter of common knowledge that the bad character of a man for chastity does not even in the remotest degree affect his character for truth, when based upon that alone, while it does that of a woman.'" Murphy, Rape Shield Statute, at 110, quoting State v. Sibley (1895), 131 Mo. 519, 531-32, 33 S.W. 167, 171.
The rape shield statute departs dramatically from the courts' prior position. Effective January 4, 1978, the rape shield statute provides:
"a. In prosecutions for [rape or deviate] sexual assault * * *, the prior sexual activity or the reputation of the alleged victim is inadmissible except as evidence concerning the past sexual conduct of the alleged victim with the accused.
*169 b. No evidence admissible under this Section shall be introduced unless ruled admissible by the trial judge after an offer of proof has been made at a hearing to be held in camera in order to determine whether the defense has evidence to impeach the witness in the event that prior sexual activity with the defendant is denied. Such offer of proof shall include reasonably specific information as to the date, time and place of the past sexual conduct between the alleged victim and the defendant. Unless the court finds that reasonably specific information as to date, time or place, or some combination thereof, has been offered as to prior sexual activity with the defendant, counsel for the defendant shall be ordered to refrain from inquiring into prior sexual activity between the alleged victim and the defendant." Ill. Rev. Stat. 1987, ch. 38, par. 115-7.
The constitutionality of the rape shield statute has been addressed on several occasions by the appellate court (see People v. Buford (1982), 110 Ill. App.3d 46; People v. Bachman (1981), 92 Ill. App.3d 419; People v. Cornes (1980), 80 Ill. App.3d 166), though it has not been addressed by this court. We note that in the case before us, the appellate court did not address the constitutionality of the statute; rather, it reached its decision based on statutory construction. (178 Ill. App.3d at 677.) Noting that a court of review will not decide constitutional questions when the matter can be disposed of on other grounds (178 Ill. App.3d at 677, citing People v. Fleming (1971), 50 Ill.2d 141, 144), the appellate court looked to the "factors which prompted the rule" and determined that the rule "does not preclude an exception for admission of the impeaching evidence offered by defendant in this case." (178 Ill. App.3d at 674.) Having determined that the proffered evidence was relevant because the case rested on the complainant's credibility, the court concluded:
*170 "Where the evidence is relevant and is introduced, not to harass the witness but only in a defensive response to the alleged victim's own initiative, the statute does not preclude an exception to the general protective umbrella it places over victims of sexual assault. Once a complainant decides to address her own past sexual conduct, or lack of it, she relinquishes the statutory protection and risks a challenge to the truthfulness of her version of that conduct." 178 Ill. App.3d at 676.
We do not find the appellate court's construction of the statute persuasive. The language of the statute, quoted in its entirety above, is concise and precise. Resort to legislative history the factors which prompted the rule is necessary only when the statute is vague or ambiguous and clarification of the underlying intent is needed to assist interpretation of the language. (People v. Boykin (1983), 94 Ill.2d 138, 141.) The rape shield statute is neither vague nor ambiguous. We note that the statute does not limit its proscription to a defendant's attempts to introduce evidence of the victim's prior sexual encounters; the statute says quite simply that "the prior sexual activity * * * is inadmissible." (Ill. Rev. Stat. 1987, ch. 38, par. 115-7(a).) The words of limitation which follow do not indicate that only the defendant is prohibited from introducing such evidence; the exception addresses only the "past sexual conduct of the alleged victim with the accused." Ill. Rev. Stat. 1987, ch. 38, par. 115-7(a).
The clear and unambiguous language of the statute has been noted by the appellate court in several cases. The court in People v. Cornes (1980), 80 Ill. App.3d 166, 175, noted:
"A reading of the * * * statute reveals that the legislature clearly and unequivocally abrogated the old Illinois rule permitting reputation evidence of the complainant's chastity and immorality as it pertained to the issue of consent. [Citation.] The express language of the rape shield *171 law precludes the admission of evidence of prior sexual activity and reputation of the complainant except when it concerns the past sexual conduct of complainant with the defendant."
Cornes involved a defendant who was precluded from putting on testimony about the complainant's abortion and about her reputation for chastity, information which the defendant asserted was necessary to show the closeness of his relationship with the complainant. The court noted that under either the old Illinois common law or the current statute, the defendant could not put into evidence specific acts of the complainant or her general moral reputation. Cornes, 80 Ill. App.3d at 173-75.
A similar result was reached in People v. Ellison (1984), 123 Ill. App.3d 615. In construing the language of the statute, the court noted that "it is clear the prior sexual activity or the reputation of the alleged victim is inadmissible except as evidence concerning the prior sexual conduct of the alleged victim with the accused." Ellison, 123 Ill. App.3d at 623.
We find the statutory analysis of the appellate court in Cornes and Ellison persuasive. The language of the statute is clear and unambiguous; it leaves no room for introduction of reputation or specific-act evidence from any party in the action.
We note that even were we to find that the language of the statute is vague or ambiguous, a review of the legislative history supports a construction which prohibits anyone from introducing evidence of the victim's sexual history unless it relates to the relationship between the victim and the accused.
The first draft of House Bill 760 allowed admission of evidence relating to the victim's general reputation for chastity. The Governor amendatorily vetoed the act, stating in a letter to the House of Representatives that "neither the victim's prior sexual activity nor her reputation *172 should ever be inquired into in a rape case unless she was previously involved with the alleged rapist." (Emphasis added.) (Letter from Governor James Thompson to the Illinois House of Representatives (Oct. 24, 1977), reprinted in J. Ill. H.R., No. 4, 80th Ill. Gen. Assem. 6404 (1977), as quoted in Comment, The Illinois Rape Shield Statute: Privacy At Any Cost?, 15 J. Marshall L. Rev. 157, 164 (1982).) The present form of the statute, incorporating the Governor's amendments, was adopted by the House overwhelmingly. (See 80th Ill. Gen. Assem., House Proceedings, November 3, 1977, at 59 (motion to concur in amendatory veto on House Bill 760).) The Senate concurred. (See 80th Ill. Gen. Assem., Senate Proceedings, November 22, 1977, at 10 (motion to accept the specific recommendations of the Governor as to House Bill 760); see also People v. Ellison (1984), 123 Ill. App.3d 615, 623-24 (discussing the legislative history of House Bill 760); Comment, The Illinois Rape Shield Statute, 15 J. Marshall L. Rev. at 162-64 (same).) The statute in its present form precludes admission of evidence of the sexual history of the victim unless it relates to sexual conduct with the defendant.
Having found that the statutory language clearly precludes the admission of prior sexual acts of the victim, we turn now to consider defendant's constitutional attack on the statute. Sandoval asserts that the rape shield statute unconstitutionally denied him the right to confront the witness against him when the trial court excluded the testimony of a proffered witness. This witness would have testified that he had at one time dated the complainant and that they had engaged in anal sex which at times was initiated by the complainant. The testimony was essential, Sandoval argues, to rebut the complainant's testimony on direct examination that she had not had anal sex with others prior to her involvement with Sandoval. Sandoval further asserts that admission *173 of the proffered impeachment testimony is controlled by Davis v. Alaska (1974), 415 U.S. 308, 39 L.Ed.2d 347, 94 S.Ct. 1105.
The Illinois Constitution provides: "In criminal prosecutions, the accused shall have the right * * * to meet the witnesses face to face * * *." (Ill. Const. 1970, art. I, § 8.) The United States Constitution, with provisions applicable to the States under the fourteenth amendment, similarly provides: "In all criminal prosecutions, the accused shall enjoy the right * * * to be confronted with the witnesses against him." U.S. Const., amend. VI.
It is well accepted that "a primary interest secured by [the confrontation clause] is the right of cross-examination." (Douglas v. Alabama (1965), 380 U.S. 415, 418, 13 L.Ed.2d 934, 937, 85 S.Ct. 1074, 1076.) The extent or scope of this primary interest, the right of cross-examination, was reviewed by the Supreme Court in Davis v. Alaska (1974), 415 U.S. 308, 39 L.Ed.2d 347, 94 S.Ct. 1105. At issue in Davis was the right of the defendant to question an adverse witness about his juvenile adjudication for burglary resulting in a probation. The defendant theorized that because the witness was on probation when the stolen property was found near his home, he would have been prone to make a quick (and perhaps erroneous) identification of suspects seen near his home in order to assure that police attention would not center on himself. The trial court granted the prosecutor's motion for a protective order, however, under an Alaska statute which precluded the defendant from asking about the witness' juvenile record. The order further prevented the defendant from rebutting the witness' assertion during cross-examination that he had never been questioned by law enforcement officers before, clearly an untruthful statement in light of his prior record. The Supreme Court, in holding that the defendant had been denied *174 his right under the confrontation clause to cross-examine, noted:
"Cross-examination is the principal means by which the believability of a witness and the truth of his testimony are tested. Subject always to the broad discretion of a trial judge to preclude repetitive and unduly harassing interrogation, the cross-examiner is not only permitted to delve into the witness' story to test the witness' perceptions and memory, but the cross-examiner has traditionally been allowed to impeach, i.e., discredit, the witness. One way of discrediting the witness is to introduce evidence of a prior criminal conviction of that witness. By so doing the cross-examiner intends to afford the jury a basis to infer that the witness' character is such that he would be less likely than the average trustworthy citizen to be truthful in his testimony. The introduction of evidence of a prior crime is thus a general attack on the credibility of the witness. A more particular attack on the witness' credibility is effected by means of cross-examination directed toward revealing possible biases, prejudices, or ulterior motives of the witness as they may relate directly to issues or personalities in the case at hand. The partiality of a witness is subject to exploration at trial, and is `always relevant as discrediting the witness and affecting the weight of his testimony.' [Citation.] We have recognized that the exposure of a witness' motivation in testifying is a proper and important function of the constitutionally protected right of cross-examination. [Citation.]" 415 U.S. at 316, 39 L.Ed.2d at 353-54, 94 S.Ct. at 1110.
We have quoted from Davis at some length to highlight the types of situations in which the Supreme Court has indicated that the right of confrontation through cross-examination guaranteed under the constitutions supersedes a statutory right granted a witness or a policy of the State. With the Davis decision, the Court does not present the defense with a blanket invitation to attack a witness. Rather, Davis limits such an attack to *175 situations where the confrontation is both relevant and based on a showing of bias, prejudice or motive. Thus, Davis stands for the proposition that not even a statute can be used to shelter a witness whose motive, prejudice or bias may affect testimony before the court. The emphasis of Davis was not to create an exception to the statutory protection, but to prevent the statute from creating an exception to the well-settled and accepted admissibility of the motive, bias or prejudice of a particular witness.
The Court in Davis evaluated the constitutional right of the defendant based on a defendant's opportunity to present the theory of his case. The defendant merely attempted to show, in Davis, the possible motive or bias of the witness who might have reason to offset suspicion from himself, because of his own past record, by hastily identifying suspects. Had this theory been before the trial court, the resulting verdict may have been different. (415 U.S. at 319, 39 L.Ed.2d at 355, 94 S.Ct. at 1111-12.) The Supreme Court protected the defendant's right to fully explore a theory of defense before the jury or the court which would be making the decision. 415 U.S. at 318, 39 L.Ed. at 354-55, 94 S.Ct. at 1111.
Sandoval's reliance on Davis is misplaced. The case before this court, although also analyzing a statute which ultimately served to prevent certain information about an individual from being considered by the jury, presents a quite different scenario. Sandoval's theory at trial was that the woman scorned (complainant) was out to even the score. The jury heard Sandoval's testimony wherein he indicated that the complainant initiated the sexual encounter, that after a time of having sex the defendant decided that the relationship would not work, that he then told complainant to leave, and that this charge of rape is a retaliation for rejection. We fail to see, and Sandoval has not explained, what impact complainant's *176 prior sexual encounters with a third party would have on this theory. Properly rejected is the old theory that a woman's sexual morality bears a direct relationship to her truthfulness; therefore, no correlation can be made as was made in Davis between a witness' prior record and the witness' credibility (the general attack on the witness' credibility). Nor do we perceive how the proffered testimony would reveal the witness' bias, prejudice or motive to testify falsely in charging the defendant (particular attack on the witness' credibility). Even were the proffered testimony true, the fact that complainant had engaged in anal sex in a prior relationship has no bearing on the present sexual assault charge merely because the information is also about a sexual practice.
The activities under scrutiny by a trial court in a case alleging sexual assault must relate to the exchange between the complainant and the person accused, that is, whether the sexual attentions were forced upon another without consent. (See Ill. Rev. Stat. 1987, ch. 38, par. 12-13.) Here it appears from our review of the record that the accused is attempting to do precisely what the rape shield statute was enacted to prevent: to divert the jury's attention from the accusation against him (forcing the complainant to perform sexual acts, acts which defense counsel stressed might offend the sensibilities of some) by offering testimony that would indicate that this complainant had not only initiated similar sexual acts in the past with the defendant, but had also initiated such acts with others.
Sandoval's rationale, moreover, places undue emphasis on the particular type of sexual act or method of the act rather than on the force and dominance of one over another with the use of sex. An emphasis that complainant had engaged in anal sex with others would only serve to accentuate the particular type of sexual contact rather than the use of force to accomplish contact. To *177 emphasize a particular type of sexual contact is to emphasize form over substance, triggering the "sensibilities" of the jurors rather than encouraging a fact-based decisional process.
This case does not present a situation in which the jury was presented with what the defendant alleges is a completely unbelievable portrait of the complainant which is only rebuttable with introduction of the proffered testimony. We note that the fact that complainant was sexually experienced would have been evident to the jury, for it was clear from the testimony that she was a 20-year-old mother of a two-year-old child. Additionally, both complainant and defendant testified that they had lived together for several months in a sexual relationship and that they had engaged in anal sex on a number of occasions. That the number of times differed was a matter that went to credibility. We find that any concern over a number is entirely misplaced, for complainant's possible acquiescence became a question for the jury when complainant testified that she had engaged in anal sex with defendant on more than one prior occasion. Moreover, we note that it is not the role of this court to judge "specific actions" (i.e., anal sex or oral sex) based on whether those particular acts, in and of themselves, offend our sensibilities; rather, we must determine whether the basic elements of the offense charged have been proven (here, the elements are whether sexual penetration was accomplished through use of force or threat of force). Information about the complainant's prior sexual practices does not have any bearing on the charge levied against Sandoval by the complainant.
The appellate court has long recognized that under the rape shield statute the complainant's prior sexual activities are irrelevant to a sexual assault charge unless those activities involved the complainant and the accused. Indeed, the rape shield statute has survived constitutional *178 review in the appellate court against attack similar to that now under consideration. The court in People v. Cornes noted:
"Defendant's right of confrontation necessarily includes the right to cross-examine witnesses, but that right does not extend to matters which are irrelevant and have little or no probative value. Complainant's past sexual conduct has no bearing on whether she has consented to sexual relations with defendant. The legislature recognized this fact and chose to exclude evidence of complainant's reputation for chastity as well as specific acts of sexual conduct with third persons in cases of rape and sexual deviate assault. * * * The legislature was acting well within its powers in enacting reasonable legislation intended to eliminate the cruel and abusive treatment of the victim at trial by precluding the admission of prejudicial and irrelevant material and to promote the lawful administration of the criminal justice system." 80 Ill. App.3d at 175-76.
In People v. Buford (1982), 110 Ill. App.3d 46, the court specifically addressed the defendant's right of confrontation in light of Davis v. Alaska and rejected the defendant's allegation that he was not allowed to confront the witness.
The trial court's application of the rape shield statute in Buford prevented the defendant from showing that the complainant had previously been convicted of solicitation for prostitution in 1972. (110 Ill. App.3d at 50.) Defendant contended that because the complainant was currently on Federal probation for a 1978 mail fraud charge, she had a motive to fabricate her testimony in order to prevent an inference that she was working as a prostitute, thereby protecting her probation. (110 Ill. App.3d at 50.) The defendant testified that he had known the complainant since 1972 when he met her in an area of Chicago frequented by prostitutes. Since that time he had paid her weekly to have sex. Complainant *179 testified on both direct and cross-examination that she did not know the defendant and had never seen him before the night of the attack. (110 Ill. App.3d at 49, 52.) This testimony was refuted by defense witnesses during the defendant's case in chief. On cross-examination complainant denied that she frequented an area where prostitutes were known to congregate. (110 Ill. App.3d at 52.) The defendant argued that acknowledgment or testimony indicating that the complainant had been convicted of solicitation in 1972 would affect her probation; therefore she had to fabricate the charge of sexual assault. The court noted that the 1972 conviction had no present relevance to the 1978 probation and that, additionally, defense counsel had opportunity to cross-examine the complainant and to present the defendant's testimony about the relationship between the parties before it concluded:
"In Davis, the [C]ourt noted that the defense was confronted with a situation in which the jury simply could not be made aware of the defendant's theory of the case. In the instant case, the defense presented its theory of the case at length. * * * `Complainant's past sexual conduct has no bearing on whether she has consented to sexual relations with defendant.' [Citation.]" 110 Ill. App.3d at 52.
The appellate court again reviewed the statute under a constitutional attack which asserted that the rape shield statute "abrogat[ed] * * * [defendant's] sixth amendment right to present a full and fair defense" in People v. Ellison (1984), 123 Ill. App.3d 615, 622. The defendant in Ellison based one of his arguments on appeal on the trial court's preclusion of evidence concerning the victim's "sexual experience or reputation for sexual activity." (123 Ill. App.3d at 625.) The appellate court rejected defendant's argument that Davis v. Alaska was dispositive, relying on the Supreme Court's *180 citation in Davis to Chambers v. Mississippi (1973), 410 U.S. 284, 35 L.Ed.2d 297, 93 S.Ct. 1038, and noted that the Court "held that the constitution requires that the competing interests of the defendant's right of confrontation and the State's public policy for enacting the rule be closely examined and a balance struck." (Ellison, 123 Ill. App.3d at 626.) The Ellison court further noted that:
"The State policy underlying the rape shield statute * * * is to prevent the defendant from harassing and humiliating the prosecutrix at trial with evidence of either her reputation for chastity or specific acts of sexual conduct with persons other than the defendant, since such evidence has no bearing on whether she consented to sexual relations with the defendant. Further, exclusion of such evidence keeps the jury's attention focused only on issues relevant to the controversy at hand. Last, but not necessarily least, the exclusion promotes effective law enforcement because victims can report crimes of rape and deviate sexual assault without fear of having the intimate details of their past sexual activity brought before the public." (123 Ill. App.3d at 626.)
Although the defendant argued that the proffered testimony was crucial to his defense because "the case * * * `boiled down to the word of the prosecutrix against [his]'" (123 Ill. App.3d at 626-27), the court concluded that the defendant's need for the excluded evidence was not clearly shown.
Sandoval argues that this case, like Ellison, boils down to the jury's determination of the credibility of the parties and he was denied the opportunity to confront the witness with what he alleges was a lie. He also argues that, unlike Ellison, this case centers on complainant's testimony on direct examination, rather than on testimony elicited under cross-examination.
We note, however, that the testimony which Sandoval wished to introduce, as was also the case in Ellison, was *181 not relevant to the matter being tried. The testimony would have added no information which could have helped the jury decide whether or not the complainant had been forced to have sex with the defendant on this occasion. Sandoval was not prevented from presenting his theory of the case. Indeed, he testified that fighting and making love was a pattern that he and complainant repeated often; he testified that anal sex was often initiated by the complainant and that they had engaged in this type of sex on at least a dozen occasions; he testified, and it was corroborated by testimony from defendant's brother, that the complainant had physically hit the defendant on a prior occasion when she was angry and then falsely accused the defendant of striking her; Sandoval also testified that complainant threatened him when she left the apartment. See Buford, 110 Ill. App.3d at 52 (where the court held that limitation on cross-examination did not infringe defendant's right of confrontation where the defendant had opportunity to present his theory of the case).
Even if this court were to assume that the complainant was not truthful when she testified that she had not had anal sex with others, we would not be required to reverse the verdict of the jury based on a denial of defendant's right of confrontation. Impeachment of a witness is restricted to relevant matters; a witness may not be impeached on collateral or irrelevant matters. People v. Collins (1985), 106 Ill.2d 237, 269; People v. Columbo (1983), 118 Ill. App.3d 882, 966.
People v. Columbo is helpful in analyzing this situation. In Columbo, a murder trial, a prosecution witness was called who had been involved in a sexual relationship with the co-defendant, Frank DeLuca. During this relationship, DeLuca had taken photographs of the witness performing "unnatural sexual acts with other men, a woman and a dog." (118 Ill. App.3d at 963.) When the *182 relationship ended, DeLuca told the witness that he had burned the pictures; the pictures were not burned, however, and ended up in the possession of defense counsel prior to the trial. Following the State's motion in limine to preclude the defendant from cross-examining the witness about these pornographic photographs, the court carefully delineated the scope of any questions regarding the photographs. At trial, the witness specifically denied ever participating in certain sexual acts with a woman and with a dog statements which defendant could prove were lies by showing particular photographs or by further cross-examining the witness. The trial court denied defendant's efforts to impeach the witness. The appellate court upheld the trial court, noting that the particular sexual acts were unrelated to the material issue of homicide and that a witness may not be impeached on a collateral matter. (118 Ill. App.3d at 966-67.) The court further noted that the defendant had ample opportunity to show that the witness' decision to testify may have been based on efforts at retaliation for not returning the photographs, that is, the witness may have been biased. 118 Ill. App.3d at 967.
Both the legislature and the courts have found that a complainant's prior sexual history is irrelevant in a trial for sexual assault. Since prior sexual history is irrelevant, as in Columbo, the witness may not be impeached on irrelevant or collateral matters. See also People v. Schott (1976), 39 Ill. App.3d 266, 272-73 (where the court upheld the trial court's denial of defendants' efforts to impeach a witness by offering the testimony of another person to show that a State witness' testimony on direct examination was false when he testified that he had gone to a particular farm to buy a gun (and not drugs as defendants alleged); defendants were on trial for robbery of a victim they claimed to have gone to see in order to buy drugs and they asserted that it was necessary *183 to impeach the witness to verify that the victim did indeed sell drugs).
Sandoval further argues that impeachment testimony was necessary because the complainant's statement that she had not engaged in this particular type of sex before would have given greater weight to her statement that she did not consent to the sexual encounter, that in fact she begged Sandoval not to do it because that kind of sexual encounter hurt. Complainant's assertion could have been rebutted by testimony that she had engaged in this particular type of sex on numerous occasions with another. Whether the complainant had participated in this particular sexual practice 2 times or 20 times has no bearing, however, on whether a particular instance of sex was consented to or was painful. (See Ill. Rev. Stat. 1987, ch. 38, par. 12-13(a)(1).) Nor, we note, is it an element of the statute that the assault be painful. Mere absence of pain during or even enjoyment of particular sexual practices with certain individuals does not equate to absence of pain or enjoyment of the particular practice in all circumstances; nor, we note, does it have any bearing on the issue of consent. An act performed with gentleness on one occasion may be quite different than that same act performed with anger, hostility, or vehemence. Thus, even had complainant initiated anal intercourse with others in the past, we fail to see its relevance to the charges levied against Sandoval.
The supreme court of Michigan was faced with the task of determining the constitutional application of its rape shield statute in People v. Hackett (1984), 421 Mich. 338, 365 N.W.2d 120. Hackett is a consolidated case presenting two distinct factual backgrounds. In each instance, the court held that introduction of evidence about the sexual history of the complainant was inadmissible.
*184 The first of the consolidated cases involved a defendant who "sought to introduce specific instances of the complainant's prior homosexual conduct with prisoners of the same race as defendant to circumvent the inference that it would be improbable that a white male prisoner would consent to sodomy by a black male prisoner." (421 Mich. at 351, 365 N.W.2d at 126.) In upholding the trial court's exclusion of the proffered testimony, the court noted:
"Like prostitution, the fact that a person is a homosexual, standing alone, has little or no logical relevance between the excluded prior sexual acts evidence and the issues of consent or credibility. Thus, to the extent defendant sought to introduce evidence as to complainant's reputation as a homosexual or to specific acts of homosexuality for the purpose of bolstering his defense of consent, we find such evidence is irrelevant." (421 Mich. at 353, 365 N.W.2d at 126-27.)
The court indicated that "there is no logical nexus between a complainant's reputation for unchastity, whether it involves heterosexual or homosexual activity, and the character trait for truthfulness or untruthfulness." 421 Mich. at 352, 365 N.W.2d at 126.
In the second of the consolidated cases the defendant sought to introduce evidence of the complainant's reputation for unchastity, a specific instance of prior sexual conduct, and a statement made by the complainant about her unhappy marital situation. The court noted that the right to confrontation "requires only that the defendant be permitted to introduce relevant and admissible evidence." (421 Mich. at 354, 365 N.W.2d at 127.) Neither reputation evidence nor evidence of a specific instance of conduct with a third party has any relevance to the issue of complainant's consent with the defendant. Although the court recognized that certain "extraordinary circumstances" (421 Mich. at 355, 365 N.W.2d at 128) could *185 make such information relevant, it concluded that the case before it did not present such a situation.
The Michigan Supreme Court described those "extraordinary circumstances," those instances in which it indicated that information about the prior sexual history of a complainant could be relevant and necessary to preserve a defendant's constitutional right to confrontation. The court noted:
"For example, where the defendant proffers evidence of a complainant's prior sexual conduct for the narrow purpose of showing the complaining witness' bias, this would almost always be material and should be admitted. [Citations.] Moreover in certain circumstances, evidence of a complainant's sexual conduct may also be probative of a complainant's ulterior motive for making a false charge. [Citations.] Additionally, the defendant should be permitted to show that the complainant has made false accusations of rape in the past." (421 Mich. at 348, 365 N.W.2d at 124-25.)
In a footnote, the court also noted the "extraordinary circumstances" accepted by a Federal court as examples of circumstances which would enhance the probative value of the proffered evidence:
"`evidence [which] is explanative of a physical fact which is in evidence at trial, such as the presence of semen, pregnancy, or a victim's physical condition indicating intercourse, or where the evidence tends to establish bias, prejudice, or ulterior motive surrounding the charge of rape. Sexual history might also be relevant where the victim has engaged in a prior pattern of behavior clearly similar to the conduct immediately in issue.'" 421 Mich. at 355 n. 4, 365 N.W.2d at 128 n. 4, quoting United States v. Kasto (8th Cir.1978), 584 F.2d 268, 271 n. 2.
The Federal case cited by the Michigan court is similar to another Federal case which Sandoval argues is dispositive of the issue before this court. In United States ex rel. Fuller v. Attorney General (N.D. Ill. 1984), 589 F. *186 Supp. 206, aff'd mem. (7th Cir.1985), 762 F.2d 1016, the court noted the same "circumstances" quoted above which list times when more extensive cross-examination may occur or testimony be introduced. Sandoval emphasizes before this court the exception which would admit evidence where the victim has engaged in a "prior pattern of behavior," presumably, though not specifically articulated, on the assumption that a pattern of engaging in anal sex fits the exception. We are not prepared to conclude that testimony from another man that the complainant and he had engaged in anal sex fits the "prior pattern" exception, for to do so would require us to determine that the particular practice was so unusual, so outside the norm, that it had distinctive characteristics which make it the complainant's modus operandi. Even scholars and practitioners who advocate a change in the rape shield statutes discuss and describe this exception for "pattern of behavior" as similar to cases where pattern evidence is admitted because it shows the individual's unique "signature." (See generally Galvin, Shielding Rape Victims in the State and Federal Courts: A Proposal for the Second Decade, 70 Minn. L. Rev. 763, 830-48 (1986); Tanford & Bocchino, Rape Victim Shield Laws and the Sixth Amendment, 128 U. Pa. L. Rev. 544, 586-89 (1980).) The mere fact that the complainant had engaged in anal sex with another partner at some time in the past is not such a distinctive act as to make it probative or relevant to the charges against Sandoval.
Cases from other States which have allowed proffered testimony that at first blush appears to bring a complainant's sexual history to the fore are not dispositive of the situation before us. The cases are but manifestations of the exceptions already noted by the cases discussed above. The cases allowed testimony to show the possibility that another had caused a pregnancy (Shockley v. State (Tenn. 1978), 585 S.W.2d 645); to show *187 the complainant's possible motive to falsely accuse the defendant (State v. Jalo (1976), 27 Or. App. 845, 557 P.2d 1359; see also Olden v. Kentucky (1988), 488 U.S. ___, 102 L.Ed.2d 513, 109 S.Ct. 480 (State's rape shield law did not bar testimony that complainant and third party were living together when that testimony was relevant to the accused's theory (complainant's motive to lie) of the case that complainant consented to the sexual encounter with the accused, but alleged rape rather than jeopardize her relationship with the third party who saw her get out of the accused's car and who happened to also be a State's witness in the case against accused)); to show that the complainant had filed false charges of rape in the past (Smith v. State (1989), 259 Ga. 135, 377 S.E.2d 158; Stewart v. State (Ind. 1988), 531 N.E.2d 1146); and to show the sexual activities of the complainant prior to the alleged rape where such activities might explain physical injuries (State v. LaClair (1981), 121 N.H. 743, 433 A.2d 1326).
Though not cited by Sandoval, our review uncovered one case which does not fit neatly into the noted exceptions. State v. Williams (1986), 21 Ohio St.3d 33, 487 N.E.2d 560, however, is not dispositive of the situation now before this court. Williams involved the court's review of a complainant's testimony on direct examination that she did not consent to sex with the defendant. The defendant testified at a pretrial hearing that he had numerous prior sexual encounters with the complainant, that she was a prostitute and he was her pimp. At trial the complainant testified that she did not consent to sex with defendant because she never consented to sex with men since she is a lesbian. The trial court denied defense attempts to have a witness testify as to his prior sexual relations with the victim and to admit testimony as to the victim's reputation as a prostitute. The Ohio Supreme Court noted that, since a key factor in the case *188 was consent, although the victim's credibility would be impeached with admission of testimony relating the accused's relationship with her or her reputation as a prostitute, the "proffered evidence has a more important purpose, which is to negate the implied establishment of an element of the crime charged. For this reason, the probative value of the testimony outweighs any interest the state has in exclusion." (21 Ohio St.3d at 36, 487 N.E.2d at 563.) The court found that the rape shield law as applied violated the defendant's right of confrontation.
At the core of the Williams case was the issue of consent based on complainant's claim that she never consented to sex with men. This claim, if believed by the jury, would bolster complainant's assertion that she therefore did not consent with defendant on this occasion. In the case before us, Sandoval and the complainant acknowledged that they had engaged in sex on prior occasions. Moreover, both acknowledged that they had engaged in anal sex on prior occasions, although their testimony indicated differing attitudes about the practice. Unlike Williams, the issue in this case was whether there was consent to engage in sex on this given occasion with Sandoval, not whether there was consent to engage in a particular variation of sexual contact. Complainant did not deny engaging in anal sex with the defendant on prior occasions, nor did she deny having a sexual relationship with the defendant. Whatever particular sexual practices she engaged in with other men, such testimony would not impact testimony about her actions with the defendant. Williams is therefore not helpful to Sandoval's case.
Nor do we find reliance on United States Supreme Court decisions dispositive in this case. In Walder v. United States (1954), 347 U.S. 62, 98 L.Ed. 503, 74 S.Ct. 354, the Court addressed the application and scope *189 of the doctrine of Weeks v. United States (1914), 232 U.S. 383, 58 L.Ed. 652, 34 S.Ct. 341. Weeks precluded the prosecution from utilizing evidence procured in violation of the fourth amendment to secure a conviction. (Walder, 347 U.S. at 64-65, 98 L.Ed. at 507, 74 S.Ct. at 356.) Walder involved a defendant's appeal from a conviction for transactions in narcotics in 1952. The defendant had also been indicted for similar offenses in 1950; the 1950 case was dismissed when the court ruled that the evidence a heroin capsule was inadmissible because of an unlawful search and seizure. At trial on the 1952 indictment, the defendant testified that he had never purchased, sold or possessed illegal narcotics. The prosecution then questioned him about the heroin capsule taken from his home in 1950; the defendant denied that any narcotics were taken from him at that time. In upholding the trial court's admission of extrinsic evidence to impeach the defendant's contention, the Court noted:
"It is one thing to say that the Government cannot make an affirmative use of evidence unlawfully obtained. It is quite another to say that the defendant can turn the illegal method by which evidence in the Government's possession was obtained to his own advantage, and provide himself with a shield against contradiction of his untruths." (347 U.S. at 65, 98 L.Ed. at 507, 74 S.Ct. at 356.)
The Court reasoned that "of his own accord, the defendant went beyond a mere denial of complicity in the crimes of which he was charged and made the sweeping claim that he had never dealt in or possessed any narcotics" before noting that "there is hardly justification for letting the defendant affirmatively resort to perjurious testimony in reliance on the Government's disability to challenge his credibility." 347 U.S. at 65, 98 L.Ed. at 507, 74 S.Ct. at 356.
*190 Use of the prior inadmissible evidence in Walder was specifically limited by the trial court as being "solely for the purpose of impeaching the defendant's credibility." (347 U.S. at 64, 98 L.Ed. at 506, 74 S.Ct. at 355.) In the case before us, however, the defendant had ample opportunity to challenge the credibility of the complainant without resort to additional extrinsic evidence, evidence which courts and the legislature have labelled highly prejudicial. Sandoval and others testified as to the relationship that Sandoval had with the complainant; testimony was offered by Sandoval's brother which supported the allegation that the complainant had at times been the aggressor in their relationship and had falsely accused Sandoval in the past of abusive treatment; testimony further alleged that Sandoval and complainant had often engaged in anal sex. Unlike the situation in Walder, in which the only means the prosecution had to challenge the credibility of the defendant was by the use of the prior evidence, the credibility of the complainant in the case before us was clearly before the jury for review. No further attack merely on an issue of credibility was necessary.
Harris v. New York (1971), 401 U.S. 222, 28 L.Ed.2d 1, 91 S.Ct. 643, relied on by Sandoval, is similarly inapposite. Harris involved use of a prior statement made by the defendant, inadmissible in the prosecution's case in chief under Miranda v. Arizona (1966), 384 U.S. 436, 16 L.Ed.2d 694, 86 S.Ct. 1602, to impeach the credibility of the defendant when he denied on the witness stand making a sale of heroin to an undercover policeman. The Court noted that it "does not follow from Miranda that evidence inadmissible against an accused in the prosecution's case in chief is barred for all purposes, provided of course that the trustworthiness of the evidence satisfies legal standards." (Harris, 401 U.S. at 224, 28 L.Ed.2d at 4, 91 S.Ct. at 645.) The proviso *191 noted by the Court was elaborated upon in its concluding statements: "The shield provided by Miranda cannot be perverted into a license to use perjury by way of a defense, free from the risk of confrontation with prior inconsistent utterances." (401 U.S. at 226, 28 L.Ed.2d at 5, 91 S.Ct. at 646.) Impeachment was based on utilization of a prior inconsistent statement by a defendant who was privileged to testify in his own defense, though he was not required to do so. Thus, the waiver of the general principle of exclusion of statements taken in violation of Miranda was not based on any deficiency or constitutional problem with Miranda, but because the defendant chose to take the stand and make statements inconsistent with prior statements on matters that were relevant and probative.
In the case before us, even if we were to assume that the complainant lied when she denied having anal sex with others, we fail to see how Harris applies; though not specifically relevant to the charges, it was clear that complainant had sex with others in the past, that the complainant had made no prior statements about her sexual history with parties other than the defendant, nor was the information relevant or probative of any fact in issue other than to attack the complainant's credibility.
In summary, although various Supreme Court cases have limited application of rules or statutes which preclude use of certain evidence, in each case the Court was recognizing the preeminence of longstanding rules of evidence: in Davis, that bias, motive or prejudice could be shown; in Walder, that defendant's prior "crimes" could be used to impeach when he chose to testify; in Harris, that prior inconsistent statements are admissible to impeach.
Although we certainly recognize that there may be certain situations in which the preclusion of the rape shield statute may not apply because of the defendant's *192 greater constitutional right to confrontation, we need not specifically adopt the rationale of our sister State courts since we conclude that we are not here confronted with an applicable situation demanding emphasis of the right of confrontation over the preclusion of the rape shield statute.
The trial court did not err in excluding the proffered testimony of someone who would testify that he had anal sex with the complainant. The complainant's original statement that she had not had anal sex with others was clearly inadmissible under the rape shield statute, as already noted. Such error would not have been cured, however, by further compounding the problem with admission of more evidence precluded by the statute. We are not required to remand this case for a new trial, however, because, the trial judge, prior to submission of the case to the jury, properly instructed the jury to disregard the complainant's statement that she had not had anal sex with others before her relationship with Sandoval.
As the State has noted, judicial admonishments to juries are routine; indeed, it is "the almost invariable assumption of the law that jurors follow their instructions." (Richardson v. Marsh (1987), 481 U.S. 200, 206, 95 L.Ed.2d 176, 185, 107 S.Ct. 1702, 1707; see also Watkins v. Sowders (1981), 449 U.S. 341, 66 L.Ed.2d 549, 101 S.Ct. 654 (jury instructed not to consider erroneously admitted eyewitness identification evidence); Harris v. New York (1971), 410 U.S. 222, 28 L.Ed.2d 1, 91 S.Ct. 643 (jury instructed to consider statement for impeachment but to disregard as substantive evidence of guilt); Walder v. United States (1954), 347 U.S. 62, 98 L.Ed. 503, 74 S.Ct. 354 (same).) Although the Supreme Court has recognized an exception to the general assumption that a jury follows instructions in Bruton v. United States (1968), 391 U.S. 123, 20 L.Ed. *193 2d 476, 88 S.Ct. 1620, the Court in Richardson noted that Bruton only "recognized a narrow exception" (Richardson, 481 U.S. at 207, 95 L.Ed.2d at 185, 107 S.Ct. at 1707).
In Bruton, co-defendants were tried together; a nontestifying co-defendant's confession which expressly implicated the second defendant presented a situation "in which the risk that the jury will not, or cannot, follow instructions is so great, and the consequences of failure so vital to the defendant, that the practical and human limitations of the jury system cannot be ignored." (Bruton, 391 U.S. at 135, 20 L.Ed.2d at 485, 88 S.Ct. at 1627.) This case does not present a situation which would require this court to conclude that the jury did not or could not follow instructions.
Furthermore, even were we to conclude that it was error to exclude the rebuttal testimony if the complainant's statements were utilized by the jury in reaching a decision, we would not find error here. The jury was properly admonished to ignore the complainant's statement.
We also note that People v. Sales (1986), 151 Ill. App.3d 226, which remanded a case for a new trial, addressed the issue of the prosecution's elicitation of statements from the complainant about her sexual history and is not inapposite. In Sales, the complainant, when questioned by the prosecution, testified that she had not had sexual relations with anyone in the 10 days prior to the attack and that prior to the attack she had never had sexual relations with anyone. The appellate court noted that "[e]liciting this testimony was clearly prohibited under the Illinois rape shield statute." (151 Ill. App.3d at 231.) Sales supports an analysis prohibiting any reference to a complainant's sexual history or reputation but does not require that Sandoval receive a new trial. Unlike Sales, where the jury utilized the complainant's *194 testimony in reaching its decision, the jury in Sandoval's case was clearly and unequivocally instructed to ignore the complainant's testimony. As we noted above, errors corrected by the court with instructions to the jury do not require a reversal.
The second issue for review involves the trial court's refusal to allow testimony that the complainant had been seen out with a man just prior to the beginning of the trial. Sandoval argues this testimony was necessary to rebut complainant's testimony, first elicited during cross-examination, that she has not been able to date since the incident with the defendant.
This court has long noted that the latitude allowed on cross-examination and rebuttal is a matter within the sound discretion of the trial court; a reviewing court will not interfere unless there has been a clear abuse of discretion resulting in a manifest prejudice to the defendant. People v. Collins (1985), 106 Ill.2d 237, 269; People v. Peter (1973), 55 Ill.2d 443, 451-52.
Upon review of the record, we find no abuse of discretion resulting in prejudice to the defendant. What the complainant has done since the incident which resulted in the charges against the defendant has no relevance in a determination of the defendant's guilt or innocence. It is well accepted that a cross-examiner may not impeach the witness on a collateral matter; the answer must be accepted. (Collins, 106 Ill.2d at 269.) Whether or not a matter is collateral may be determined by asking the question: Could the matter be introduced for any purpose other than to contradict? (Collins, 106 Ill.2d at 269.) The question before the jury was whether the defendant forced the complainant to have anal and oral sex against her will. The subsequent effect on her life, that is, whether or not she was dating, could be offered for no other purpose than to contradict a statement of the complainant. It would present the jury with no additional *195 information about the charges against the defendant. Absent an abuse of discretion, a reviewing court should not interfere with the trial judge's ruling. Collins, 106 Ill.2d at 269-70.
For the reasons stated above, we reverse the judgment of the appellate court and affirm the judgment of the circuit court.
Appellate court judgment reversed; circuit court judgment affirmed.
JUSTICE MILLER, specially concurring:
I concur in the court's judgment affirming the defendant's convictions. I would decide the case on grounds narrower than those relied on by the majority, however, and for that reason I write separately.
At the defendant's trial, the prosecutor asked the complaining witness on direct examination whether she had previously engaged in anal sexual relations with persons other than the defendant. The witness said that she had not. When defense counsel made inquiry on cross-examination to establish a foundation for later impeachment, the trial judge indicated that a foundation was not necessary and that he would allow the impeachment. The trial judge later reconsidered that ruling, however, and barred defense counsel from introducing, during the defendant's case in chief, testimony from a witness who would have contradicted the complainant's assertion. Before the jury began its deliberations, the judge struck the complainant's brief statement regarding her prior sexual conduct with persons other than the defendant and specifically admonished the jurors to disregard that evidence. The State concedes that the complaining witness' testimony was improper.
It is apparent that defense counsel's remedy was to object to the evidence, rather than attempt to impeach it. The "rape shield statute" (Ill. Rev. Stat. 1987, ch. 38, *196 par. 115-7), applicable in prosecutions for aggravated and unaggravated offenses of criminal sexual assault and criminal sexual abuse, bars the introduction of evidence concerning a victim's prior sexual conduct with persons other than the accused. The statute expresses the judgment that such evidence is irrelevant, and the statute thus removes a potential disincentive to the prosecution of those offenses. The statute does not purport to establish an evidentiary privilege, which a witness may elect to assert or waive, but is instead phrased as a general prohibition, applicable to both the prosecution and the defense. It is therefore something of a fiction to say, as the appellate court did in the proceedings below, that the complainant in this case waived the protection of the statute by her testimony. (See, e.g., 178 Ill. App.3d at 675 ("In the present case, however, the victim, by her own action at trial, rendered her past sexual activities relevant and thus admissible").) The statutory bar on such evidence is not eliminated simply because prohibited testimony already has been introduced through the complaining witness.
Although defense counsel did not make a contemporaneous objection to the prosecutor's improper question, the trial judge subsequently granted the defendant appropriate relief. At the close of evidence, the trial judge struck the complainant's testimony concerning her prior sexual conduct with others and instructed the jurors to disregard her statement. I agree with the majority's ultimate conclusion that the trial judge's actions were sufficient to cure any error occurring in the introduction of the evidence. In light of that result, it is appropriate to question the usefulness of the majority's detailed discussion of two additional issues, the defendant's confrontation right, and the circumstances under which evidence of prior sexual conduct would ever be admissible, and I do not join those portions of the opinion. Indeed, the *197 court appears to recognize the hypothetical nature of its treatment of those issues when it declares, "Furthermore, even were we to conclude that it was error to exclude the rebuttal testimony if the complainant's statements were utilized by the jury in reaching a decision, we would not find error here. The jury was properly admonished to ignore the complainant's statement." 135 Ill.2d at 193.
With respect to the second question raised on appeal, I agree with the court's conclusion that the complaining witness' social activity subsequent to the offenses charged here was a collateral matter, and that the impeaching testimony proffered by defense counsel was properly excluded on that basis. Finally, I note that in the appellate court the defendant raised an issue concerning his sentence, which that court did not address in light of its decision granting the defendant a new trial. In the appellee's brief filed before this court, defense counsel correctly observes that the appellate court did not reach the sentencing issue. Counsel has not, however, made an alternative request for relief in the event we affirm the defendant's convictions: counsel neither presents the sentencing issue as grounds for cross-relief, nor asks that the cause be remanded to the appellate court for consideration of the question. Accordingly, one may conclude that the issue has been abandoned.
| |
Ontario’s schools will likely reopen in September.
The faulty logic of school closures has been further undermined by the vaccines.
tap here to see other videos from our team.
With the vast majority of the elderly — and others most vulnerable to the virus — now vaccinated, the threat posed has been much reduced.
How schools will open and how long they’ll stay open are much more uncertain.
These two questions are linked, but not necessarily in the way that people expect.
If Ontario opens schools with many precautions, schools will almost certainly close again once case numbers inevitably rise.
For precautions, such as requiring children to wear masks, lead the public to mistakenly conclude that schools are an important driver of Covid spread.
Research about Covid risk perceptions has shown that people have a very hard time understanding the risks posed by the virus.
People vastly overestimate the hospitalization and mortality risks and vastly underestimate the impact of age on these risks (the mortality risk posed by an infection with the virus is more than a thousand times higher for older people than it is for young people.)
The excess Covid fears are understandable. Since March 2020 it has been difficult to find information about the actual risks posed by the virus.
The media’s reluctance to grapple with this issue is evident in the fact that the leading newspapers first wrote about excess Covid fears only this spring, many months after the studies covered in those articles were published in July and December of 2020.
Therefore, before enacting Covid policies, we must think through how those policies will influence the beliefs of the public.
Ontarians often wonder why British Columbia was able to keep its schools open last school year despite never mandating masks on young children, while Ontario mandated masks on children as young as kindergarteners and still ended up with shuttered schools.
The answer is hidden in the question itself.
Because BC never mandated masks for all school children, there was less unfounded fear about schools among the public, hence there was less demand for school closures.
In Ontario, all children were forced to wear masks in schools–most inexplicably also outside. Ontarians mistakenly learned to associate children and schools with significant Covid spread. This made school closures all too easy politically. The assault on the rights of Ontario’s children was baked in before the school year even started.
Finland, my other home country, was able to keep its primary schools open last school year without even recommending masks for under 12-year olds, despite significant Covid spread in the Helsinki capital region.
When the public is not conditioned to think of children as mere disease vectors, there is little demand for school closures.
When Finland’s prime minister pressured Helsinki’s schools to be closed, the city’s mayor was able to rise to the defense of children. “Madam Prime Minister, stop blaming children and young people for this” the mayor intoned without fear of retribution from the public who understood that schools are not an important driver of Covid spread.
When talk about masking young children arose in Helsinki during the Spring wave, Finland’s leading pediatricians quickly shot down this idea by writing in the country’s main newspaper that “There is no scientific basis for a mask recommendation for primary school children.” They also drew attention to the harms that masking causes to children’s social development.
The best school reopening plan for Ontario is thus very simple. Open the door. Let them learn.
Ontario must reject ineffective, unnecessary, and disruptive precautions such as mandatory masking, physical distancing and mass testing, which foment unfounded Covid fears about schools among the public, and thus only beget more school closures. Ontario’s children must get a fully normal school year. | https://torontosun.com/opinion/columnists/packalen-unmask-children-to-keep-schools-open/wcm/e81ad7c3-fd89-4d6f-854d-cbfed8edd236/amp/ |
HR Decision Making is one of the four required course areas for students in the Master of Human Resource Management Program. Students are required to take the following two courses in this area to receive their MHRM degree.
HR Decision Making: Financial Decisions
The course prepares students to assess the business implications of basic financial statements (income statement, balance sheet, cash flow statement) and to participate in the financial analysis of business strategy. Particular attention is paid to topics where finance and HR intersect (cost benefit analysis of HR initiatives, selection of financial measures to serve as bonus drivers, alternative models for valuing employee stock options, financial and accounting aspects of pensions and other post retirement benefits).
HR Decision Making: Data-Based Decisions
This course addresses research design methodology and addresses basic statistics through regression analysis. It will enable students to compile and analyze data that can be used in developing, implementing, and measuring the outcome of HR strategy. | https://smlr.rutgers.edu/content/hr-decision-making |
Osborne plea to EU over tax evasion
Chancellor George Osborne has called on the European Union to "take the fight" to tax evaders and avoiders.
He urged fellow finance ministers at talks in Brussels to back growing moves for global co-operation in tracking down vast amounts in unpaid taxes.
The issue is top of the agenda at an EU summit later this month and at a G8 summit Prime Minister David Cameron is hosting in Northern Ireland in June.
The plan is to set a global standard for "multilateral automatic information exchange" - something currently hampered by banking secrecy and corporate confidentiality in some countries.
Last month the UK announced an agreement with France, Germany, Italy and Spain to develop a pilot project for cross-border tax information exchange, but the UK insists a system to increase transparency and extend country-by-country reporting by companies on where they pay tax can only be effected if it is worldwide.
Arriving at the latest round of talks on the issue, Mr Osborne said: "Today there is an opportunity for Europe to take the fight to those who want to evade or avoid taxes. There is a real opportunity for European countries to give their backing to new global standards that Britain has been pushing for at organisations like the G8 and G7."
Mr Osborne also called for final agreement on Europe's own savings tax directive which, if approved, would open up information exchange within the EU. Until last month a deal was blocked by years of resistance from Luxembourg, where banking secrecy is traditionally a badge of honour, and remains held up by continued opposition in Austria.
Mr Osborne said: "I also think there's an opportunity today to conclude the talks on the savings directive which has been stuck in the European system for years, allowing people to avoid taxes that are legitimately owed.
"Let's get that agreed, let's show that European countries have the will to collect the taxes that are due. I think that, at an economic time like this, it is right that everyone makes their fair contribution and this is our opportunity to do that."
If the EU directive can be agreed, it would give Brussels more leverage in its efforts to end banking secrecy in neighbouring countries such as Switzerland, Monaco and Andorra as part of a wider global standard on exchanging tax information. | http://www.express.co.uk/news/uk/399530/Osborne-plea-to-EU-over-tax-evasion |
Rx drug information, pharmaceutical research, clinical trials, news, and more
Author(s): Wasiak J(1), Mahar PD, McGuinness SK, Spinks A, Danilla S, Cleland H, Tan HB.
Affiliation(s): Author information:
(1)Department of Orthopaedic Surgery, The Epworth Hospital, 89 Bridge Rd,
Richmond, Australia, 3121.
Publication date & source: 2014, Cochrane Database Syst Rev. , 10:CD005622
BACKGROUND: This is an update of the review on "Lidocaine for pain relief in burn
injured patients" first published in Issue 3, 2007, and first updated in 2012.
Pain is a major issue for people with many different types of wounds, in
particular those people with burn injuries. Prompt, aggressive use of opioid
analgesics such as morphine has been suggested as critical to avert the cycle of
pain and anxiety, but adverse effects are encountered. It has been proposed that
newer agents such as lidocaine could be effective in reducing pain and
alleviating the escalating opioid dosage requirements in people with burn injury.
OBJECTIVES: To assess the safety and effectiveness of intravenous lidocaine as a
means of pain relief versus no therapy, placebo, other drugs, or a combination of
these therapies in people with burn injury.
SEARCH METHODS: For this third update, we searched the Cochrane Central Register
of Controlled Trials (Issue 11, 2013), and Ovid MEDLINE, MEDLINE in Process and
Ovid EMBASE (up to December 2013).
SELECTION CRITERIA: We included randomised controlled trials (RCTs) and
controlled clinical trials (CCTs), published and unpublished, which assessed the
efficacy of intravenous lidocaine in varying doses as a single-agent therapy with
no therapy, placebo, other analgesics (such as opioids), lidocaine plus another
drug, or a combination of these therapies as a means of pain relief in people
with burn injury.
DATA COLLECTION AND ANALYSIS: Two review authors independently abstracted data
and assessed the risk of bias of the studies identified.
MAIN RESULTS: In this 2014 update, we found no new studies. The one small
randomised double-blind placebo-controlled cross-over trial found in 2012, which
included only 45 participants and compared intravenous lidocaine against placebo
as a means of pain relief in people with burns still remains central to this
review. We assessed this study as being at a high risk of bias due to its small
size (fewer than 50 participants per treatment arm). Subjective pain ratings, as
measured by the verbal rating scale, increased during procedures for both
treatment arms; however, the increase was less in the lidocaine treatment group.
There were no significant clinical or statistical differences regarding the
effects of lidocaine and placebo on opioid requests and consumption, anxiety or
level of satisfaction during a wound care procedure, but the small included study
provided insufficient data to draw any conclusions.
AUTHORS' CONCLUSIONS: As current clinical evidence is based on only one RCT as
well as case series and reports, intravenous lidocaine must be considered a
pharmacological agent under investigation in burns care, the effectiveness of
which is yet to be determined with further well-designed and conducted clinical
trials. | http://www.druglib.com/abstract/wa/wasiak-j1_cochrane-database-syst-rev_20140000.html |
pdf: The phenomenon of literature
With the beginning of Euromaidan and with aggravation of the situation artists, especially writers, began to respond with the available to them ways – word, colour, music… This reaction in the best way demonstrated the essence of the art – it is not separated from life, but it is in direct interaction with him. The artist does not live in a castle of ivory. He is in here, on the barricades in the street. In art not just individual emotions are reflected. Here emotions of society caused by historical, critical events are hidden.
The Literature of Maidan is a poetry and prose anthologies, essays, novels, stories, running commentary and even publications for children of all skill levels and quality. It is necessary to mention the texts written long before the Maidan, but actualized in a new way. They are texts written by Taras Shevchenko, Ivan Franko, Vasyl Symonenko, Vasyl Stus that were actively quoted and recited on Maidan (everyone remembers Sergiy Nihoyan’s video where the he is reciting an excerpt from «Caucasus» written by Taras Shevchenko).
In a short time a new phenomenon “The Literature of Maidan” has developed its own characteristics, among other publications and layers of modern literary process. It is interesting that among all genres a poetry was the very first. It is brief in form and conveys the main emotions and ideas concisely. Prose also developed gradually. Naturally that first authors began to turn to a short prose. A short novel as a genre with tense plot, the concentration of thoughts and feelings conveys emotions and stories of real people in the best way. Anthology of short prose of Мaidan was published the very first. The Plot includes a variety of stories: searching of own place as a way to help others, death of the heroes, beating journalists, life on the Maidan etc. First Maidan’s novels have appeared during the six months – a year after the events of the Maidan.
One of the important features of this stratum of literature is its attention to the time and space of events. In Maidan’s time we all lived in another, unusual for us rhythm. It was hard to abandon from the news. Every event had its Weight, every records in social networks, every name. Authors who wrote at that time had to keep the sequence of events very clearly. They actually played the role of reporters. Chronological principle was the main one to combine anthologies. Often in the preface and afterword to them it was indicated a short list of the main events of Maidan. It is worth to mention, publications devoted to the comments from social networks.
Some changes can be traced in the poetics of the texts. Here the accent is made not on the form but on the content. Sophisticated metaphors are almost absent. All artistic means are simple. In the first place is the issue of what it is said in the text, but not how.
Metric of poetry was also changed. Most of them are rhymed, rare – vers libre. Often the images used in the texts also differ by its tradition. We find appeals to Ukrainian traditions, historical events and even intertexts to canonical works of national literature. Such images we often find in the texts of authors-beginners. They subconsciously turned to the canonical texts of culture that unite the Ukrainians as a nation. It explains the imitation of Shevchenko – central images and ideas of his work. These rhythms and images are genetically embedded in us.
Certainly, the whole layer written about Maidan has a different quality. Here we find the anthology, containing writers-beginners and the writers with well-known name under one roof . That is why characteristics and trends of the writing will be different, but the both type of the texts have common features. Moreover they are displayed most clearly in the texts of middle level, because here literature becomes a tool to express the experience of ordinary people. As to my mind one of the main causes of appearing the Literature of Maidan was the desire to record everything they had seen and understood this experience. | https://aesthetic-potential.com/about/essays/the-phenomenon-of-literature-of-from-maidan/ |
EDUCATION : Samaldas College at Bhavnagar, Gujarat,
University College London
University College London
The word Mahatma means great soul. This name was not given Gandhi at birth by his parents, but many years later by the Indian people when they discovered they had a Mahatma in their midst. He was a greatest human being the 20th century has seen.
Early years
Mohandas Karamchand Gandhi was born on October 2, 1869, in Porbandar, India, a seacoast town in the Kathiawar Peninsula north of Bombay, India. His wealthy family was from one of the higher castes (Indian social classes). He was the fourth child of Karamchand Gandhi, prime minister to the raja (ruler) of three small city-states, and Purtlibai, his fourth wife. Gandhi described his mother as a deeply religious woman who attended temple (a place for religious worship) service daily. Mohandas was a small, quiet boy who disliked sports and was only an average student. At the age of thirteen he did not even know in advance that he was to marry Kasturbai, a girl his own age. The childhood ambition of Mohandas was to study medicine, but as this was considered beneath his caste, his father persuaded him to study law instead. After his marriage Mohandas finished high school and tutored his wife.
In September 1888 Gandhi went to England to study. Before leaving India, he promised his mother he would try not to eat meat. He was an even stricter vegetarian while away than he had been at home. In England he studied law but never completely adjusted to the English way of life. He became a lawyer in 1891 and sailed for Bombay. He attempted unsuccessfully to practice law in Rajkot and Bombay, then for a brief period served as lawyer for the prince of Porbandar. | https://www.sundaynice.com/2013/02/67mahatma-gandhi-early-life.html |
Energy bills are dominating the news as a result of soaring wholesale gas prices. In response, some have called for the removal of green levies as a way to alleviate the strain on households. However, new analysis from Carbon Brief has found that energy bills are nearly £2.5 billion higher than they would have been if certain climate policies had been pushed through – such as allowing new onshore wind to be built in England and keeping the zero-carbon homes standard.
But why are gas prices having such a huge impact on the UK energy market and how can investing in clean technologies help lower prices?
HOW THE ENERGY MARKET WORKS
Energy suppliers in the UK buy the electricity they sell in bulk from the wholesale market. The reason that gas has such an impact on electricity bills is because we still use it to generate a third of our electricity. Suppliers and generators trade electricity in half-hourly auctions, with the National Grid responsible for matching supply and demand by accepting bids or offers depending on whether they need to increase or reduce electricity generation. Bids are stacked in order of the least expensive generators to provide the power until the demand is met.
As gas is one of the more expensive ways to generate power, and is quite flexible in the amount it generates, gas plant tends to the be the last plant in the auction and therefore set the price.
Source: Make UK (2021) Closing the Gap p.20
Since last year, we’ve seen a worldwide shortage of gas supplies, which in turn has caused wholesale gas prices to rise to unprecedented levels. Alongside a shortage in supply, there’s been a perfect storm of issues – a combination of extreme weather, demand growth unexpectedly high post Covid and a lack of storage capacity, particularly in the UK.
Now we’re seeing soaring wholesale gas prices have a ripple effect on electricity prices, with suppliers having to increase consumer bills. The UK energy regulator – Ofgem – has increased the energy price cap, with more changes expected in the coming month.
HOW CAN WE CURB RISING PRICES?
While there have been calls to cut green levies, new data is showing the positive impact these programmes are having. In fact, the government’s Contract for Difference (CfD) scheme – which aims to support renewable growth by providing generators with a stable, pre-agreed price for 15 years – recorded positive returns at the end of last year. Wholesale electricity prices were so high in July to September 2021 that they surpassed CfD strike prices, and the payments reversed direction for the first time, returning £39.2 million in funds.
While this proves that renewables helps curb energy price rises, in the longer term it can be argued that the market should be able to run without the need for CfDs, especially as they are unlikely to cater for smaller, sub 5 MW projects.
There are other business models which support the renewable growth needed to end our reliance on gas in the UK. This includes corporate power purchase agreements, which allow businesses to purchase electricity directly from an energy generator at a fixed price, and direct wire arrangements. A direct wire arrangement is when a clean energy project – for example, a wind turbine or rooftop solar PV array – is built within the commercial premises, with the host business directly consuming the clean energy it generates.
Alongside alternative business models, we also need to see substantial growth in the UK’s storage capacity, which will help balance out the variability of natural resources such as sun and wind. In December, we commissioned our first battery project near Milton Keynes, a 5MW site that is delivering 1.49 hours of electricity to the national and local electricity grid, while we also have a 20MW site in Bristol that will be commissioned later this year. Electricity storage, be it battery, pumped storage or dammed hydro provide sustainable solutions to balance demand and supply, further reducing our reliance on gas.
The UKs electricity demand is projected to increase by almost 40% by 2035 as heating and transport transitions from fossil fuels to electricity. This creates an opportunity to deliver 60 to 80GW of renewable electricity generation.
The benefits of investing in clean technologies are vast, not least because renewables are much faster to deploy than the alternatives. For example, in the two years (2016 and 2017) spent moving soil and laying the foundations at Hinkley Point C, enough new renewable capacity was commissioned to deliver power equivalent to the nuclear site’s total planned generation (22GWh annually) which is due to commence generation in 2026.
Ultimately, the way to avoid energy price shocks in future is to keep supporting the roll-out of clean technologies and implement stronger policies on energy efficiency, reducing the amount of energy we need. In doing so, we not only reduce consumer bills but build a solid path towards net zero. | https://www.thriverenewables.co.uk/latest-news/blog/energy-prices-explained-how-clean-technologies-can-help-reduce-bills/ |
After scoring a total of 24 runs in its first three non-league games, and celebrating a no-hitter by Chloe Pendergast ’13, the softball team continues to prepare for its upcoming Mission League season, in an attempt to seize the maximum potential of its offense and pitching, while improving its teamwork and communication.
After two run-away wins against Immaculate Heart and Kennedy on the back of its offensive production and consistent pitching, the softball team fell to Oaks Christian in a 5-3 loss.
The loss put the Wolverines’ focus toward some flaws and some areas to tighten up in anticipation for the Mission League.
“We had a few miscommunications on the field that can easily be resolved as we get more game experiences,” pitcher Madeline Kaplan ’14 said. “I think it is really important to learn from these losses in pre-season games so that we don’t make the same mistakes in league games.”
Jessica Johnston ’14 has six hits in her first nine at bats, leading the team with a .667 batting average and four total runs.
Johnston was in centerfield during the loss to Oaks Christian.
“In the last game against Oaks Christian, the error made was lack of communication between players. It’s really important to know who is calling for the ball,” Johnston said. “I feel that overall we just weren’t focused during the game which allowed them to get ahead.
“Since most of the girls play on travel ball or club teams, the coaches mainly work on refining our skills. Both offensively and defensively, the coaches work individually with each girl to pinpoint any weaknesses and strengthen them,” Johnston said. | https://hwchronicle.com/10256/uncategorized/softball-pursues-mission-league-title/ |
You should now be able to change the “Width” and “Height” values in the “Pixel Dimensions” box. By the way, the change to the “Resample Image” setting is sticky. That means it’ll still be set that way every time you open Photoshop Elements unless you decide to uncheck the box at some time in the future.... Now that you know the length of your screen horizontally in inches (in this case 11.25″) and the number of pixels horizontally (always first number in pixel dimension so in this case 1440) to determine your screen PPI or pixels per inch.
Here, I've lowered the resolution from 300 pixels/inch all the way down to 30 pixels/inch. With so few pixels being crammed into an inch of paper, the print size has increased to a whopping 150.3 inches x 100 inches. But even with this very low resolution value, the size of the image in memory remains unchanged at 38.7M:... One twip is 1/1440 inch or 17.639 µm when derived from the PostScript point at 72 to the inch, and 1/1445.4 inch or 17.573 µm based on the printer’s point at 72.27 to the inch. In digital imaging, a pixel (short for a pic ture el ement) is a physical point in a raster image, or the smallest, addressable element in a display device.
Pixels per inch, a measurement of pixel density, depends on the resolution of a document or device. The average PPI is about 72 dots per inch. The input resolution can be measured by pixels per inch (PPI), and a good photograph usually requires 300 DPI. PPI and DPI can be used in reference to how to clean stainless steel appliances home remedies E.g. DPI = 200, so 1.5 inches will be 250 pixels, so you can resize your image from 480 to 250 by 250 pixels. But in fact, most online forms will be happy with anything that has the right aspect ratio, in this case square. Uploading an image of 480 by 480 should work fine, although I suppose some primitive websites won't do the automatic conversion and resizing.
Now that you know the length of your screen horizontally in inches (in this case 11.25″) and the number of pixels horizontally (always first number in pixel dimension so in this case 1440) to determine your screen PPI or pixels per inch. how to change review in amazon You should now be able to change the “Width” and “Height” values in the “Pixel Dimensions” box. By the way, the change to the “Resample Image” setting is sticky. That means it’ll still be set that way every time you open Photoshop Elements unless you decide to uncheck the box at some time in the future.
The inch [in] to pixel (X) conversion table and conversion steps are also listed. Also, explore tools to convert inch or pixel (X) to other typography units or learn more about typography conversions.
3/04/2006 · Best Answer: You cannot convert from pixel to centimeter. A pixel is a relative, virtual unit of measurement that expands and contracts according to how many points are drawn on one screen.
E.g. DPI = 200, so 1.5 inches will be 250 pixels, so you can resize your image from 480 to 250 by 250 pixels. But in fact, most online forms will be happy with anything that has the right aspect ratio, in this case square. Uploading an image of 480 by 480 should work fine, although I suppose some primitive websites won't do the automatic conversion and resizing. | http://tomatosherpa.com/ontario/how-to-change-from-inches-to-pixels-in-photoshop.php |
By Ken Ferris
LONDON (Reuters) – Leading sponsors of football’s world governing body have demanded independent oversight of FIFA’s reform process in an open letter published on Tuesday ahead of a key meeting to finalise proposed reforms at the scandal-plagued organisation.
The companies — Anheuser-Busch InBev NV, Adidas, The Coca-Cola Company, McDonald’s Corp and Visa Inc. — aimed their letter at FIFA’s executive committee, which meets this week.
FIFA’s reform committee chairman Francois Carrard will put its recommendations to the executive committee on Wednesday and Thursday and they will be publicly presented afterwards.
Last month the reform committee published its “preliminary recommendations” which suggested an age limit of 74 for all leading officials, but only mentioned term-limits for the president, who would be restricted to three mandates.
The final list of proposed reforms will be put to FIFA’s 209 member associations at an emergency Congress in February.
FIFA is facing unprecedented pressure to overhaul its governance and improve transparency following the May indictment by U.S. authorities of 14 football officials and sports marketing executives on corruption-related charges.
Many of those indicted by U.S. authorities had served on FIFA’s executive committee or other FIFA panels.
“We are aware of the positive work that the reform committee has been doing on governance reform but we still believe any reforms should be subject to independent oversight,” the sponsors’ letter, published on www.coca-colacompany.com, said.
“It has also become clear to us that such independent oversight needs to run long-term through the implementation and evolution of the reform process.
“We encourage you to become champions of this independent oversight as it will only enhance FIFA’s credibility.”
Domenico Scala, who heads FIFA’s audit and compliance committee, has produced an extensive package of proposed reforms that he has made public and given to the executive committee.
They include 12-year term limits for elected FIFA officials from the president down, full disclosure of the financial compensation of the president, general secretary and executive committee members, and more detailed integrity checks on members of committees.
The sponsors’ letter added: “We urge you (the executive committee members) to embrace positive changes and recognise that this is just one step towards creating a credible future for FIFA.”
The companies also said transparency, accountability, respect for human rights, integrity, leadership and gender equality were crucial to the future of FIFA.
“Reforms can set the proper framework for these characteristics, but a cultural change is also needed,” the letter added. “The culture change has to begin within FIFA and filter through to the Confederations and FIFA’s Football Associations.”
The FIFA crisis escalated in October when its president Sepp Blatter and UEFA chief Michel Platini, who had been favourite to succeed him, were banned for 90 days by FIFA’s ethics committee pending a full investigation into a two million Swiss francs ($1.95 million) payment from FIFA to Platini in 2011.
Swiss public prosecutors are also investigating alleged irregularities in decisions to award the 2018 World Cup to Russia and the 2022 tournament to Qatar, both taken at a vote in Zurich in December 2010. | https://www.essentiallysports.com/fifa-sponsors-want-independent-oversight-of-reform-process/ |
Ancient india was a fairly flat land, with a bit of mountains on the top side. It had one river, and one ocean.
The river had 2 annual floods, which brought silt and mud into the valley, making the land a prime location for farming in ancient times.Inside of the indus area, was the Indus civilization. It was on the fertile plains. It was one of the oldest civilizations,with religious practices starting at 5500 BCE. Decline for this city started in 1800 BCE, but reasons for this decline were unknown.
Ancient india also had a problem with monsoons. Most of the year, india was very dry, dust would blow. But in one part of the year, which started at around may, the weather suddenly got very humid and muggy. The civilizations civilians knew what was happening, and were waiting for it to come. It would suddenly rain. Bringing buckets apon buckets of water.
But this also caused the indian ocean to rise, and cause terrible floods.These floods would kill civilians and destroy buildings. You would think this would change people’s thoughts about living there, but it made for great farmland, and kept people coming.The Climate depends on the season. It could be Hot and dry, hot and wet, or cool and dry. The hot and wet season was the season for monsoons, which brought lots of rain that is well needed. But it is also very damaging to the people and the buildings.
Sebastian-The indian subcontinent is a large land mass that extends into the indian ocean Just north for the subcontinent is himalaya mountain rage that stands today.In the North west the Indus river where explorers have unearth much of the ancient civilisation.Today the Subcontinent is home to several countries including india, Pakistan, Bangladesh, Sri Lanka, Bhutan and Nepal.The Subcontinent is divided into three main parts. The northern plain, the dry deccan plateau, and the coastal plains witch land on the sides of the deccan. The northern mountain ranges served as borders for the civilization, and made contact with other civilisations difficultMIgrants and invaders used narrow valley to travel through the range.
The northern plains are a fertile region south of the himalayas that prospered from the the rivers that fed its agriculture.The Deccan is a leveled plateau toward the center of india. The area did not receive much water causing the area to be sparsely populated.
The coastal plain are separated from the plateau, and its seasonal rains provide plentiful water for farmers. | https://walktocurecancer.org/ancient-made-for-great-farmland-and-kept-people-coming-the/ |
[Effect of sirolimus on erythropoiesis of K562 cell line and patients with pure red cell aplasia in vitro].
Objective: To understand the effect of sirolimus on the erythropoiesis of K562 cell line and bone marrow cells from pure red cell aplasia (PRCA) patients and normal controls. Methods: Different concentrations (10, 100, 1 000 nmol/L) of sirolimus were added to the K562 cell line or bone marrow cells from PRCA patients or normal controls and cultured 14 days for BFU-E formation. Meanwhile, sirolimus was also added to the serum treated PRCA bone marrow cells to cultivate for the same priod of time. Results: Neither K562 cells, bone marrow cells from PRCA patients or normal controls showed any difference when sirolimus was added to the culture system for BFU-E. However, BFU-E formation decreased after serum was added in PRCA patients (76.40±22.48 vs 136.33±12.58, t=-4.329, P=0.001) and this suppression of BFU-E was partly corrected by 1 000 nmol/L sirolimus treatment (97.14±15.83 vs 76.40±22.48, P=0.038). Conclusions: Sirolimus may modulate the suppression of erythropoiesis by serum instead of directly stimulate the growth of red blood cells in PRCA patients.
| |
The effectiveness and equity of governance processes critically determine both the extent to which ecosystems contribute to human well being and the long-term prospects for successful conservation of nature. Securing rights and sharing power and responsibilities through strengthened natural resource governance benefits both people and biodiversity. Thus, governance is a necessary foundation for a just world that values and conserves nature and contributes to the achievement of global sustainable development goals. The Natural Resource Governance Framework NRGF is an IUCN initiative created for the purpose of providing a robust, inclusive, and credible approach to assessing and strengthening natural resource governance, at multiple levels and in diverse contexts. Please refer to the side bar to the right of this page for further resources including the current NRGF strategy, NRGF design documents, conceptual papers and reports of regional activities.
This book, based on lectures on natural and environmental resource economics, offers a nontechnical exposition of the modern theory of sustainability in the presence of resource scarcity. The approach throughout is primarily conceptual and theoretical, though empirical estimation and results are sometimes noted. Mathematics, ranging from elementary calculus to more formal dynamic optimization, is used, especially in the early chapters on the optimal management of exhaustible and renewable resources, but results are always given an economic interpretation. Diagrams and numerical examples are also used extensively. The first chapter introduces the classical economists as the first resource economists, in their discussion of the implications of a limited natural resource base agricultural land for the evolution of the wider economy.
Current students, please follow this link to submit your dissertation. Country of origin labeling: A theoretical and empirical analysis of market effects in the U. Nyiwul, Resource Economics.
PDF format. A version of the first Powerpoint has been uploaded to SlideShare from where it can be embedded in web sites, reaching more than three thousand views. Handbook for a module on the economic interaction between the environment and development. A five-side primer introducing key concepts from the mainstream and from ecological economics, extracted from a forthcoming book.
Environmental economics is a sub-field of economics concerned with environmental issues. It has become a widely studied subject due to growing environmental concerns in the twenty-first century. Environmental economics "undertakes theoretical or empirical studies of the economic effects of national or local environmental policies around the world Particular issues include the costs and benefits of alternative environmental policies to deal with air pollution , water quality, toxic substances, solid waste, and global warming.
Our MSc programmes in Economics will give you the opportunity to equip yourself with the necessary skills and knowledge to pursue a career in economics and related disciplines. The programme consists of a set of core and elective modules, culminating in a practice- based business project or a research-based dissertation.
Сьюзан бросила быстрый взгляд на Хейла, но тот был всецело поглощен своим компьютером. Затаив дыхание, Сьюзан дважды щелкнула по конверту. - Северная Дакота, - прошептала она еле слышно.
Я уверена, что они смогут сказать. Нуматака тоже был уверен, что компания это сделает. В эпоху цифровой связи понятие неприкосновенности частной жизни ушло в прошлое. Записывается. Телефонные компании могут сообщить, кто вам звонил и как долго вы говорили. - Сделайте это, - приказал. - И тут же доложите .
Халохот - тот, что слева, - пояснил Смит. - Он мертв? - спросил директор. - Да, сэр. Фонтейн понимал, что сейчас не время для объяснении.
Наверху включились огнетушители. ТРАНСТЕКСТ стонал. Выли сирены. Вращающиеся огни напоминали вертолеты, идущие на посадку в густом тумане.
Я же объяснил тебе, что он зашифрован. Сьюзан, в свою очередь, удивил ответ шефа.
Environmental & natural resource economics / Tom Tietenberg, Lynne Lewis. ebezpieczni.org$file/ebezpieczni.orgCirce A. 18.03.2021 at 06:11
Learning about the role of natural resources allows for the development of more sustainable methods to manage resources and make sure that they are maintained for future generations. | https://ebezpieczni.org/and-pdf/172-environmental-and-natural-resource-economics-pdf-285-657.php |
The mornings and afternoons seem to have gotten dramatically cooler over the past couple of weeks and, if you can believe it, today is the first day of Fall! One of the great benefits of keeping a nature journal is the ability to track seasonal changes over time by looking at plant and animal life in a specific location. The branch of science that studies these changes is called phenology.
Phenology uses seasonal indicators such as when plants are in bloom, if certain colors are present in a landscape, what animals are most active, and many other indicators to track long term changes. Often, these changes are looked at through the lens of how climate change is affecting an area. As many of us know, climate change is a significant consideration when thinking about the future of our planet and learning how we can better serve the natural world around us by reducing our carbon footprints.
One of the great ways to keep a record of the phenology of an area is to track seasonal changes in our nature journals! Below are some prompts taken from Clare Walker Leslie’s The Nature Connection and Keeping a Nature Journal by Clare Walker Leslie and Charles E. Roth. All activities can be done throughout the year, not only in September!
It can be helpful to divide your journal page into sections to encourage you to focus on one thing at a time. What colors are you seeing? What sounds are you hearing? What are you observing that indicates it may be September?
2. Create a Nature Quest!
Based on what you know about the Fall and September, create your very own scavenger hunt to guide you through a walk! You can create a checklist, add observations and make notes about what you are seeing. Try to go on a Nature Quest a couple of times throughout the month to see if any of your observations change.
3. Start People Watching!
All of these prompts can be done during any month or any season. Keeping track of changes throughout year helps us to become better naturalists and hone in our observation skills. Knowing what to expect during different times of the year can help us be more tuned in to anything unusual or out of the ordinary happening during the seasons. As always, nature journals are for our thoughts, questions and observations and it is completely up to you to decide how you would like to format and record information. Until next week, happy journaling!
|
|
Author
NRT's dedicated staff are responsible for the content of the NatureTalk blog. Questions? For more information on any blog post, please contact us at any time. | https://www.nrtofeaston.org/naturetalk-blog/nature-journal-notes4867382 |
TECHNICAL FIELD
The present invention relates to the field of ranging, and in particular, to a ranging method for a lidar system, and a lidar system.
BACKGROUND
As a high-precision active three-dimensional imaging sensor, a lidar has the characteristics of high resolution and high immunity against environmental interference. The lidar calculates a distance by measuring the time of flight of a laser pulse in space. Generally, a rotary lidar emits a laser from an optical window. The lidar emits lasers in different vertical directions while rotating, so as to obtain three-dimensional distance information. The ranging performance of the lidar largely depends on the energy level of the laser pulse. In addition, the lidar needs to meet the Class 1 level defined by the laser product safety standard IEC60825-1, that is, safety for human eyes. A laser energy threshold corresponding to safety for human eyes is related to the number of laser pulses received by human eyes per unit time. When the number of laser pulses received by human eyes per unit time is relatively large, the single-pulse energy threshold of the laser is relatively low. In view of the restriction, the existing solutions include: (1) using an auxiliary light source; (2) controlling temporally adjacent pulses to be separated in space.
The method of using an auxiliary light source includes: using an auxiliary light source that is different in wavelength from the ranging light source (for example, the ranging light source is in an infrared waveband and the auxiliary light source is in a visible light waveband) and emits light in the same direction as the ranging light source, to enable human eyes to actively avoid the ranging light source; or using an auxiliary light source that does not emit light in the same direction as the ranging light source (for example, emits light around the ranging light source) for early warning and detection. However, the foregoing methods increase the complexity of the system structure.
The method of controlling temporally adjacent pulses to be separated in space is mostly applicable to a single-pulse lidar. However, to cope with interference, existing lidars need to emit a pulse sequence every time. Therefore, the foregoing manners cannot effectively resolve the issue regarding safety for human eyes.
SUMMARY
An objective of the present invention is to provide a ranging method for a lidar system, and a lidar system. Without increasing the complexity of the system structure, the lidar satisfies safety requirements for human eyes while improving the single-pulse energy threshold of the ranging pulse, thereby ensuring telemetering performance and achieving low implementation costs.
emitting a first pulse having a first energy;
receiving an echo signal corresponding to the first pulse;
determining, according to the echo signal, whether a preset distance has an obstacle; and
emitting a second pulse having a second energy in an emission direction of the first pulse corresponding to the determined echo signal when no obstacle is determined within the preset distance, the second energy being greater than the first energy, and not emitting the second pulse in the emission direction of the first pulse corresponding to the determined echo signal when an obstacle is determined within the preset distance.
The present invention discloses a ranging method for a lidar system, including:
calculating a time difference between a receiving time of the echo signal and an emitting time of the corresponding first pulse; and
determining whether the time difference is greater than a first preset time difference, where
an obstacle within the preset distance is determined when the time difference is greater than the first preset time difference, and an obstacle within the preset distance is not determined when the time difference is less than or equal to the first preset time difference.
Optionally, the determining, according to the echo signal, whether a preset distance has an obstacle includes:
Optionally, when the second pulse is not emitted in the emission direction of the first pulse corresponding to the determined echo signal, the second pulse is not emitted in another direction within a range of a predetermined angle that deviates from the emission direction of the first pulse corresponding to the determined echo signal.
Optionally, the first pulse is a first single pulse or a first pulse sequence, and the second pulse is a second single pulse or a second pulse sequence.
Optionally, when the first pulse is the first single pulse, energy of the first single pulse is the first energy; when the first pulse is the first pulse sequence, a sum of energy of all single pulses in the first pulse sequence is the first energy;
when the second pulse is the second single pulse, energy of the second single pulse is the second energy; and when the second pulse is the second pulse sequence, a sum of energy of all single pulses in the second pulse sequence is the second energy.
when the first pulse is the first pulse sequence, and the second pulse is the second pulse sequence, the sum of the energy of all the single pulses in the first pulse sequence is less than or equal to the threshold of laser safety for human eyes, and the sum of the energy of all the single pulses in the second pulse sequence is greater than the sum of the energy of all the single pulses in the first pulse sequence;
when the first pulse is the first single pulse, and the second pulse is the second pulse sequence, the energy of the first single pulse is less than or equal to the threshold of laser safety for human eyes, and the sum of the energy of all the single pulses in the second pulse sequence is greater than the energy of the first single pulse; and
when the first pulse is the first pulse sequence, and the second pulse is the second single pulse, the sum of the energy of all the single pulses in the first pulse sequence is less than or equal to the threshold of laser safety for human eyes, and the energy of the second single pulse is greater than the sum of the energy of all the single pulses in the first pulse sequence.
Optionally, when the first pulse is the first single pulse, and the second pulse is the second single pulse, the energy of the first single pulse is less than or equal to a threshold of laser safety for human eyes, and the energy of the second single pulse is greater than the energy of the first single pulse;
the control unit is configured to control the emitting unit to emit a first pulse having a first energy;
the receiving unit is configured to receive an echo signal corresponding to the first pulse;
the signal processing unit is configured to determine, according to the echo signal, whether a preset distance has an obstacle; and
when the signal processing unit determines that the preset distance has no obstacle, the control unit controls the emitting unit to emit a second pulse having a second energy in an emission direction of the first pulse corresponding to the determined echo signal, the second energy being greater than the first energy, and when the signal processing unit determines that the preset distance has an obstacle, the control unit controls the emitting unit not to emit the second pulse in the emission direction of the first pulse corresponding to the determined echo signal.
The present invention discloses a lidar system, including an emitting unit, a receiving unit, a signal processing unit, and a control unit, where
calculating a time difference between a receiving time of the echo signal and an emitting time of the corresponding first pulse; and
determining whether the time difference is greater than a first preset time difference, where
an obstacle within the preset distance is determined when the time difference is greater than the first preset time difference, and an obstacle within the preset distance is not determined when the time difference is less than or equal to the first preset time difference.
Optionally, the signal processing unit determines, according to the echo signal, whether a preset distance has an obstacle includes:
Optionally, when the control unit controls the emitting unit not to emit the second pulse in the emission direction of the first pulse corresponding to the determined echo signal, the control unit controls the emitting unit not to emit the second pulse in another direction within a range of a predetermined angle that deviates from the emission direction of the first pulse corresponding to the determined echo signal.
Optionally, the first pulse is a first single pulse or a first pulse sequence, and the second pulse is a second single pulse or a second pulse sequence.
Optionally, when the first pulse is the first single pulse, energy of the first single pulse is the first energy; when the first pulse is the first pulse sequence, a sum of energy of all single pulses in the first pulse sequence is the first energy;
when the second pulse is the second single pulse, energy of the second single pulse is the second energy; and when the second pulse is the second pulse sequence, a sum of energy of all single pulses in the second pulse sequence is the second energy.
when the first pulse is the first pulse sequence, and the second pulse is the second pulse sequence, the sum of the energy of all the single pulses in the first pulse sequence is less than or equal to the threshold of laser safety for human eyes, and the sum of the energy of all the single pulses in the second pulse sequence is greater than the sum of the energy of all the single pulses in the first pulse sequence;
when the first pulse is the first single pulse, and the second pulse is the second pulse sequence, the energy of the first single pulse is less than or equal to the threshold of laser safety for human eyes, and the sum of the energy of all the single pulses in the second pulse sequence is greater than the energy of the first single pulse; and
when the first pulse is the first pulse sequence, and the second pulse is the second single pulse, the sum of the energy of all the single pulses in the first pulse sequence is less than or equal to the threshold of laser safety for human eyes, and the energy of the second single pulse is greater than the sum of the energy of all the single pulses in the first pulse sequence.
Optionally, when the first pulse is the first single pulse, and the second pulse is the second single pulse, the energy of the first single pulse is less than or equal to a threshold of laser safety for human eyes, and the energy of the second single pulse is greater than the energy of the first single pulse;
Compared with the prior art, main differences and effects of the present invention are as follows.
A lidar system first emits one or more first pulses having relatively low energies, receives one or more echo signals corresponding to the one or more first pulses, and determines, according to the one or more echo signals, whether a preset distance has an obstacle. According to certain standards of laser safety for human eyes, a threshold of lidar safety for human eyes is generally impacted by a relatively short distance. Therefore, a second pulse having a relatively high energy is emitted in an emission direction of the first pulse corresponding to the determined echo signal when no obstacle is determined within the preset distance, and the second pulse is not emitted in the emission direction of the first pulse corresponding to the determined echo signal when an obstacle is determined within the preset distance. Therefore, there is no need to use an auxiliary light source in the lidar system, and the complexity of the system structure is not increased. The energy of the first pulse is relatively low, which satisfies safety requirements for human eyes. The energy of the second pulse is relatively high, which increases a single-pulse energy threshold of a ranging pulse, thereby ensuring telemetering performance, and achieving low implementation costs of ranging of the lidar system.
The lidar system may calculate a time difference between a receiving time of each echo signal and an emitting time of a corresponding first pulse, and determine whether the time difference is greater than a first preset time difference, to determine whether the preset distance has an obstacle. Therefore, it can be easily determined with a high accuracy whether the preset distance has an obstacle.
When the second pulse is not emitted in the emission direction of the first pulse corresponding to the determined echo signal, the lidar system does not emit the second pulse in one or more directions within a range of a predetermined angle that deviate from the emission direction of the first pulse corresponding to the determined echo signal. Therefore, when the obstacle is a person, the lidar system can avoid the angular section corresponding to human eyes to further ensure safety for human eyes.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1
illustrates a flowchart of a ranging method for a lidar system according to a first embodiment of the present invention;
FIG. 2
illustrates a schematic diagram of determining whether a preset distance has an obstacle according to a first embodiment of the present invention;
FIG. 3
illustrates a schematic diagram illustrating a case in which a second pulse is not emitted in one or more directions within a range of a predetermined angle that deviate from an emission direction of a first pulse corresponding to a determined echo signal according to a first embodiment of the present invention;
FIG. 4
illustrates a schematic diagram of a first pulse and a second pulse according to a first embodiment of the present invention; and
FIG. 5
illustrates a functional diagram of a lidar system according to a second embodiment of the present invention.
DETAILED DESCRIPTION
To make the objectives and technical solutions of the embodiments of the present invention more apparent, the following disclosures clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings associated with the embodiments of the present invention. Apparently, the described embodiments are some but not all of the embodiments of the present invention. All other embodiments that may be obtained by a person of ordinary skill in the art based on the embodiments of the present invention without creative efforts shall fall within the protection scope of the present invention.
FIG. 1
A first embodiment of the present invention relates to a ranging method for a lidar system. illustrates a flowchart of a ranging method for a lidar system according to a first embodiment of the present invention.
FIG. 1
Step 102: Emit a first pulse having a first energy.
Step 104: Receive an echo signal corresponding to the first pulse.
Step 106: Determine, according to the echo signal, whether a preset distance has an obstacle.
Step 108: Emit a second pulse having a second energy in an emission direction of the first pulse corresponding to the determined echo signal when no obstacle is determined within the preset distance, the second energy being greater than the first energy, and not emit the second pulse in the emission direction of the first pulse corresponding to the determined echo signal when an obstacle is determined within the preset distance.
Specifically, as shown in , the ranging method for a lidar system includes the following steps:
The lidar system can emit a laser pulse within a specific angle range. For example, a horizontal field of view of the lidar system may be 360°, and a vertical field of view of the lidar system may be 40° (for example, from -25° to +15°). It may be understood that the horizontal field of view and the vertical field of view of the lidar system may be adjusted according to actual requirements, which is not limited herein.
The lidar system may emit one or more first pulses having first energies in one or more directions, and each first pulse having the first energy corresponds to a direction of a vertical field of view. For example, when rotating to 45° in a horizontal direction, the lidar system can sequentially emit the first pulses having the first energies (that is, emit only one first pulse having the first energy at a time) along a range of the vertical field of view (from -25° to +15°). In another example, when rotating to 45° in a horizontal direction, the lidar system may simultaneously emit a plurality of first pulses having the first energies, for example, four first pulses, along a range of the vertical field of view (from -25° to +15°). Directions of vertical field of views of the four first pulses having the first energies should be separated as much as possible to reduce a possibility that the four first pulses are simultaneously received by eyes. Certainly, the lidar system may alternatively emit one or more first pulses having the first energies within a partial range of the vertical field of view (for example, from -5° to +5°). It may be understood that emission directions and the number of the first pulses may be adjusted according to actual requirements, which is not limited herein.
For example, the lidar system emits four first pulses having the first energies at 45° in a horizontal direction and -25° to +15° in a vertical direction, receives four echo signals corresponding to the four first pulses, and respectively determines, according to the four echo signals, whether the preset distance has an obstacle. If it is respectively determined, according to two of the echo signals, that the preset distance has no obstacle, second pulses having second energies are emitted in emission directions of the first pulses corresponding to the two determined echo signals. The second energy is greater than the first energy. If it is respectively determined, according to the remaining two echo signals, that the preset distance has an obstacle, the second pulses are not emitted in emission directions of the first pulses corresponding to the two determined echo signals.
The lidar system first emits one or more first pulses having relatively low energies, receives one or more echo signals corresponding to the one or more first pulses, and determines, according to the one or more echo signals, whether the preset distance has an obstacle. Because the power of the laser entering pupils of the eyes attenuates with a distance, according to certain standards of laser safety for human eyes, a threshold of laser safety for human eyes is generally impacted by a relatively short distance. Therefore, when no obstacle is determined within a preset relatively short distance, a second pulse having a relatively high energy is emitted in an emission direction of the first pulse corresponding to the determined echo signal, and when an obstacle is determined within the preset relatively short distance, the second pulse is not emitted in the emission direction of the first pulse corresponding to the determined echo signal. Therefore, there is no need to use an auxiliary light source in the lidar system, and the complexity of the system structure is not increased. The energy of the first pulse is relatively low, which satisfies safety requirements for human eyes. The energy of the second pulse is relatively high, which increases a single-pulse energy threshold of a ranging pulse, thereby ensuring telemetering performance, and achieving low implementation costs of ranging of the lidar system.
FIG. 2
illustrates a schematic diagram of determining whether a preset distance has an obstacle according to a first embodiment of the present invention.
FIG. 2
FIG. 2
FIG. 2
Specifically, as shown in , the lidar system may be disposed on a vehicle, for example, disposed at a top position of the vehicle. A horizontal field of view of the lidar system may be 360°. The lidar system may optionally be disposed around a body of the vehicle. A dashed line in indicates the preset distance. The preset distance may be determined according to factors such as the magnitude of the energy of the first pulse, the spot size, and a threshold of laser safety for human eyes. For example, the preset distance may be 1.5 m, and the dashed line in is 1.5 m from a center of the lidar system.
For example, the lidar system may simultaneously emit two first pulses having the first energies in different vertical angle directions, receive two echo signals corresponding to the two first pulses, and respectively determine, according to the two echo signals, whether the preset distance has an obstacle. If no obstacle is determined within 1.5 m according to one of the echo signals, a second pulse having the second energy is emitted in an emission direction of the first pulse corresponding to the determined echo signal. The second energy is greater than the first energy. If no obstacle is determined within 1.5 m according to the other echo signal, the second pulse is not emitted in an emission direction of the first pulse corresponding to the determined echo signal.
calculating a time difference between a receiving time of the echo signal and an emitting time of the corresponding first pulse; and
determining whether the time difference is greater than a first preset time difference, where
an obstacle within the preset distance is determined when the time difference is greater than the first preset time difference, and an obstacle within the preset distance is not determined when the time difference is less than or equal to the first preset time difference.
The determining, according to the echo signal, whether a preset distance has an obstacle includes:
∗
The first preset time difference may be calculated according to a time-of-flight method Δt=2d/c, where Δt is the first preset time difference, d is the preset distance, and c is a speed of light. For example, if the preset distance is 1.5 m, the first preset time difference is 10 ns, so that it is determined, according to one or more echo signals, whether the preset distance has an obstacle. It may be understood that the first preset time difference may be jointly determined according to a time of flight and a delay of the lidar system.
For example, the lidar system may simultaneously emit two first pulses having the first energies in different vertical angle directions, receive two echo signals corresponding to the two first pulses, and calculate a time difference between a receiving time of each echo signal and an emitting time of a corresponding first pulse. If a time difference between a receiving time of one of the echo signals and an emitting time of a corresponding first pulse is greater than 10 ns, no obstacle is determined within the preset distance (for example, 1.5 m), and a second pulse having the second energy is emitted in an emission direction of the first pulse corresponding to the determined echo signal. The second energy is greater than the first energy. If a time difference between a receiving time of the other echo signal and an emitting time of a corresponding first pulse is less than or equal to 10 ns, an obstacle is determined within the preset distance (for example, 1.5 m), and a second pulse is not emitted in an emission direction of the first pulse corresponding to the determined echo signal.
The lidar system may calculate a time difference between a receiving time of each echo signal and an emitting time of a corresponding first pulse, and determine whether the time difference is greater than a first preset time difference, to determine whether the preset distance has an obstacle. Therefore, it can be easily determined with a high accuracy whether the preset distance has an obstacle.
FIG. 3
illustrates a schematic diagram illustrating a case in which a second pulse is not emitted in one or more directions within a range of a predetermined angle that deviate from an emission direction of a first pulse corresponding to a determined echo signal according to a first embodiment of the present invention.
FIG. 3
Specifically, as shown in , an arrow direction is the emission direction of the first pulse corresponding to the determined echo signal. When the second pulse is not emitted in the emission direction of the first pulse, the second pulse is not emitted in one or more directions within a range of a predetermined angle A that deviate from the emission direction of the first pulse. Therefore, a cone may be formed by using a light source of the lidar system as a vertex, the emission direction of the first pulse as a cone axis, and the predetermined angle A as a cone half-angle, so that the second pulse is not emitted in one or more directions within the cone.
When the second pulse is not emitted in emission directions of a plurality of first pulses, the second pulse is not emitted in one or more directions within ranges of predetermined angles A that deviate from the emission directions of the plurality of first pulses. Therefore, a plurality of cones may be formed by using a light source of the lidar system as a vertex, the emission directions of the plurality of first pulses as cone axes, and the predetermined angles A as cone half-angles, so that the second pulse is not emitted in one or more directions within the plurality of cones.
The one or more directions within the cone may be in the same vertical plane as the emission direction of the first pulse. It may be understood that the one or more directions within the cone may be adjusted according to actual requirements, which is not limited herein. For example, the second pulse is not emitted in all directions within the cone.
The predetermined angle A may be a value such as 0.1° indicating a horizontal or vertical angular resolution. It may be understood that the predetermined angle A may be adjusted according to actual requirements, which is not limited herein.
For example, the emission direction of the first pulse corresponding to the determined echo signal is 45° in a horizontal direction and 0° in a vertical direction. When the second pulse is not emitted in the direction, the second pulse is not emitted in one or more directions that are 45° in a horizontal direction and within a range of -0.1° to +0.1° in a vertical direction.
For example, emission directions of three first pulses corresponding to determined echo signals are respectively 45° in a horizontal direction and 0° in a vertical direction, 45° in a horizontal direction and -10° in a vertical direction, and 45° in a horizontal direction and +10° in a vertical direction. When the second pulse is not emitted in the three directions, the second pulse is not emitted in one or more directions that are at 45° in a horizontal direction and within a range of -0.1° to +0.1° in a vertical direction, 45° in a horizontal direction and within a range of -10.1° to -9.9° in a vertical direction, and 45° in a horizontal direction and within a range of +9.9° to +10.1° in a vertical direction.
When the second pulse is not emitted in the emission direction of the first pulse corresponding to the determined echo signal, the lidar system does not emit the second pulse in one or more directions within a range of a predetermined angle that deviate from the emission direction of the first pulse corresponding to the determined echo signal. Therefore, when the obstacle is a person, the lidar system can avoid the angular section corresponding to human eyes to further ensure safety for human eyes.
FIG. 4
illustrates a schematic diagram of a first pulse and a second pulse according to a first embodiment of the present invention.
The first pulse may be a first single pulse or a first pulse sequence, and the second pulse may be a second single pulse or a second pulse sequence.
When the first pulse is the first single pulse, energy of the first single pulse is the first energy; when the first pulse is the first pulse sequence, a sum of energy of all single pulses in the first pulse sequence is the first energy;
when the second pulse is the second single pulse, energy of the second single pulse is the second energy; and when the second pulse is the second pulse sequence, a sum of energy of all single pulses in the second pulse sequence is the second energy.
When the first pulse is the first single pulse, and the second pulse is the second single pulse, the energy of the first single pulse is less than or equal to a threshold of laser safety for human eyes, and the energy of the second single pulse is greater than the energy of the first single pulse.
When the first pulse is the first pulse sequence, and the second pulse is the second pulse sequence, the sum of the energy of all the single pulses in the first pulse sequence is less than or equal to the threshold of laser safety for human eyes, and the sum of the energy of all the single pulses in the second pulse sequence is greater than the sum of the energy of all the single pulses in the first pulse sequence.
When the first pulse is the first single pulse, and the second pulse is the second pulse sequence, the energy of the first single pulse is less than or equal to the threshold of laser safety for human eyes, and the sum of the energy of all the single pulses in the second pulse sequence is greater than the energy of the first single pulse.
When the first pulse is the first pulse sequence, and the second pulse is the second single pulse, the sum of the energy of all the single pulses in the first pulse sequence is less than or equal to the threshold of laser safety for human eyes, and the energy of the second single pulse is greater than the sum of the energy of all the single pulses in the first pulse sequence.
A pulse sequence may include two or more single pulses. It may be understood that the number of single pulses in the pulse sequence may be adjusted according to actual requirements, which is not limited herein.
FIG. 4
Specifically, as shown in the upper part of , the first pulse is the first single pulse, the second pulse is the second single pulse, the energy of the first single pulse is the first energy, the energy of the second single pulse is the second energy, the first energy is less than or equal to a threshold of laser safety for human eyes, and the second energy is greater than the first energy. For example, the second energy may be more than 10 times the first energy. It may be understood that a ratio of the second energy to the first energy may be adjusted according to actual requirements, which is not limited herein.
A time difference between an emitting time of the first single pulse and an emitting time of the second single pulse is a second preset time difference t1. The second preset time difference t1 is greater than or equal to the first preset time difference. For example, the second preset time difference t1 may be determined according to the first preset time difference and a signal processing speed of the lidar system.
FIG. 4
Specifically, as shown in the lower part of , the first pulse is the first pulse sequence, the second pulse is the second pulse sequence, the sum of the energy of all the single pulses in the first pulse sequence is the first energy, the sum of the energy of all the single pulses in the second pulse sequence is the second energy, the first energy is less than or equal to a threshold of laser safety for human eyes, and the second energy is greater than the first energy. For example, the second energy may be more than 10 times the first energy. It may be understood that a ratio of the second energy to the first energy may be adjusted according to actual requirements, which is not limited herein.
Energies of the single pulses in the first pulse sequence may be the same or may be different, and energies of the single pulses in the second pulse sequence may be the same or may be different.
A time difference between an emitting time of the last single pulse in the first pulse sequence and an emitting time of the first single pulse in the second pulse sequence is a second preset time difference t1. The second preset time difference t1 is greater than or equal to the first preset time difference. For example, the second preset time difference t1 may be determined according to the first preset time difference and a signal processing speed of the lidar system.
A time interval t2 between the single pulses in the first pulse sequence may be the same as or may be different from a time interval t3 between the single pulses in the second pulse sequence.
Specifically, not shown in the figure, the first pulse is the first single pulse, the second pulse is the second pulse sequence, the energy of the first single pulse is the first energy, the sum of the energy of all the single pulses in the second pulse sequence is the second energy, the first energy is less than or equal to a threshold of laser safety for human eyes, and the second energy is greater than the first energy. For example, the second energy may be more than 10 times the first energy. It may be understood that a ratio of the second energy to the first energy may be adjusted according to actual requirements, which is not limited herein.
Energies of the single pulses in the second pulse sequence may be the same or may be different.
Specifically, not shown in the figure, the first pulse is the first pulse sequence, the second pulse is the second single pulse, the sum of the energy of all the single pulses in the first pulse sequence is the first energy, the energy of the second single pulse is the second energy, the first energy is less than or equal to a threshold of laser safety for human eyes, and the second energy is greater than the first energy. For example, the second energy may be more than 10 times the first energy. It may be understood that a ratio of the second energy to the first energy may be adjusted according to actual requirements, which is not limited herein.
Energies of the single pulses in the first pulse sequence may be the same or may be different.
FIG. 5
A second embodiment of the present invention relates to a lidar system. illustrates a functional diagram of a lidar system according to a second embodiment of the present invention.
FIG. 5
Specifically, as shown in , the lidar system includes an emitting unit, a receiving unit, a signal processing unit, and a control unit.
The control unit is configured to control the emitting unit to emit a first pulse having a first energy.
The receiving unit is configured to receive an echo signal corresponding to the first pulse.
The signal processing unit is configured to determine, according to the echo signal, whether a preset distance has an obstacle.
When the signal processing unit determines that the preset distance has no obstacle, the control unit controls the emitting unit to emit a second pulse having a second energy in an emission direction of the first pulse corresponding to the determined echo signal, the second energy being greater than the first energy, and when the signal processing unit determines that the preset distance has an obstacle, the control unit controls the emitting unit not to emit the second pulse in the emission direction of the first pulse corresponding to the determined echo signal.
calculating a time difference between a receiving time of the echo signal and an emitting time of the corresponding first pulse; and
determining whether the time difference is greater than a first preset time difference, where
an obstacle within the preset distance is determined when the time difference is greater than the first preset time difference, and an obstacle within the preset distance is determined when the time difference is less than or equal to the first preset time difference.
That the signal processing unit determines, according to the echo signal, whether a preset distance has an obstacle includes:
When the control unit controls the emitting unit not to emit the second pulse in the emission direction of the first pulse corresponding to the determined echo signal, the control unit controls the emitting unit not to emit the second pulse in another direction within a range of a predetermined angle that deviates from the emission direction of the first pulse corresponding to the determined echo signal.
The first pulse is a first single pulse or a first pulse sequence, and the second pulse is a second single pulse or a second pulse sequence.
When the first pulse is the first single pulse, energy of the first single pulse is the first energy; when the first pulse is the first pulse sequence, a sum of energy of all single pulses in the first pulse sequence is the first energy;
when the second pulse is the second single pulse, energy of the second single pulse is the second energy; and when the second pulse is the second pulse sequence, a sum of energy of all single pulses in the second pulse sequence is the second energy.
When the first pulse is the first single pulse, and the second pulse is the second single pulse, the energy of the first single pulse is less than or equal to a threshold of laser safety for human eyes, and the energy of the second single pulse is greater than the energy of the first single pulse.
When the first pulse is the first pulse sequence, and the second pulse is the second pulse sequence, the sum of the energy of all the single pulses in the first pulse sequence is less than or equal to the threshold of laser safety for human eyes, and the sum of the energy of all the single pulses in the second pulse sequence is greater than the sum of the energy of all the single pulses in the first pulse sequence.
When the first pulse is the first single pulse, and the second pulse is the second pulse sequence, the energy of the first single pulse is less than or equal to the threshold of laser safety for human eyes, and the sum of the energy of all the single pulses in the second pulse sequence is greater than the energy of the first single pulse.
When the first pulse is the first pulse sequence, and the second pulse is the second single pulse, the sum of the energy of all the single pulses in the first pulse sequence is less than or equal to the threshold of laser safety for human eyes, and the energy of the second single pulse is greater than the sum of the energy of all the single pulses in the first pulse sequence.
The first embodiment is a method embodiment corresponding to this embodiment, and this embodiment can be implemented in cooperation with the first embodiment. Related technical details mentioned in the first embodiment are still valid in this embodiment, and in order to reduce repetition, details are not described herein again. Correspondingly, related technical details mentioned in this embodiment may also be applied to the first embodiment.
It should be noted that, all method embodiments of the present invention may be implemented by using software, hardware, firmware, and the like. Regardless of whether the present invention is implemented by using software, hardware, or firmware, instruction codes may be stored in any type of computer-accessible memory (for example, a permanent or modifiable medium, a volatile or nonvolatile medium, a solid state or non-solid medium, or a fixed or replaceable medium). Similarly, the memory may be, for example, a programmable array logic (PAL), a random access memory (RAM), a programmable read-only memory (PROM), a read-only memory (ROM), an electrically erasable PROM (EEPROM), a disc, an optical disc, or a digital versatile disc (DVD).
It should be noted that, the units/modules provided in the device embodiments of the present invention are all logic units/modules. Physically, a logical unit may be a physical unit, or may be a part of a physical unit, or may be implemented by using a combination of a plurality of physical units. The physical embodiments of the logical units are not the most important, and a combination of the functions implemented by the logical units is the key to resolving the technical problems proposed in the present invention. In addition, to highlight the creative parts of the present invention, units not closely related to resolving the technical problems proposed in the present invention are not introduced in the device embodiments of the present invention, but this does not mean that no other units exist in the device embodiments.
It should be noted that, relational terms such as first and second in the claims and the specification of this patent are merely used to distinguish one entity or operation from another entity or operation rather than necessarily requiring or implying any such practical relationship or order between these entities or operations. Furthermore, terms "comprise", "include" or any other variants are intended to encompass non-exclusive inclusion, such that a process, a method, an article, or a device including a series of elements not only include those elements, but also includes other elements not listed explicitly or includes intrinsic elements for the process, the method, the article, or the device. Without any further limitation, an element defined by the phrase "comprising one" does not exclude existence of other same elements in the process, the method, the article, or the device that includes the elements.
Although the present invention has been illustrated and described with reference to some preferred embodiments of the present invention, those of ordinary skill in the art should understand that various changes may be made in forms and details without departing from the spirit and the scope of the present invention. | |
FINAL SALE: This item cannot be returned or exchanged.
-
Product DetailsCan't go wrong with a crisp white button-up. Made of a sustainable blend of TENCEL™ modal and cotton, this classic shirt has pockets on the chest.
- Regular fit.
- Body length from high point of shoulder: 26 1/2".
- Do Well: TENCEL™ modal fibers are derived from sustainable wood sources in a closed-loop process.
- Cotton/TENCEL™ modal.
- Machine wash.
- Import. | https://www.madewell.com/classic-button-up-shirt-MA674.html |
When you lose a loved one through death or face any other life-altering tragedy, you need more than just comfort to get through the pain. And it’s the same kind of help you can offer friends who suffer.
First, you need support. What’s the difference between comfort and support? People supply comfort when they share your emotional pain. People supply support when they help in practical ways. Life doesn’t stop after a tragedy, but the emotional burden you are carrying often saps your energy. You and others in your family probably need help for a while just getting normal tasks done. You need help from people committed to obeying Galatians 6:2, “Carry each other’s burdens, and in this way you will fulfill the law of Christ” (NIV).
You might be shocked at the idea of admitting you need help. You might not want to bother others for things you normally do for yourself. Resist the temptation to ignore or push away the support others offer. God put Galatians 6:2 in the Bible because he knows there are times you need the support of others. This is such a time. Let other people do things for you, and be grateful for their help.
So what if you need something and nobody steps up to offer help? Ask for it. There’s nothing wrong with telling a trusted friend, a youth leader, or your minister about your need and asking for help.
Second, you need encouragement. You receive encouragement when someone does something thoughtful to lift your spirits. Be thankful when people ask how you are doing-or when you receive flowers, cards, letters, or e-mail. Again-if you don’t get the encouragement you need, ask for it.
After a loss it takes time to move through the stages of grief, so you will need a heap of comfort, support, and encouragement for a while. Don’t expect that you will be ready to dive back into life as usual right away. Let your friends and family care for you as long as you need it.
REFLECT: If you aren’t suffering the pain of losing a loved one, keep alert to friends who are. How can you share comfort, support, and encouragement with them?
PRAY: Ask God today to prepare you to share with people around you who suffer from the pain of personal tragedy.
Publisher
Josh McDowell MinistryView Website
Please register for a free account to view this content
We hope you have enjoyed the 10 discipleship resources you have read in the last 30 days.
You have exceeded your 10 piece content limit.
Create a free account today to keep fueling your spiritual journey! | https://www.idisciple.org/post/help-to-make-it-through |
By Reagan McSwain
The need for Indigenous people to have access to healthy and affordable food will be front and center at a conference in Toronto this weekend.
“Generally store-bought food [in remote or northern Indigenous communities] is very high-cost and traditional foods are difficult to access,” Diana Bronson, Executive Director of Food Secure Canada, said.
A panel of Indigenous leaders from across the country took part in a Thursday evening event called Decolonizing the Table.
Dawn Morrison, Director of the Working Group on Indigenous Food Sovereignty, spoke of the “Fourth World reality in which we live in a first world country like Canada.”
Food Secure Canada, which advocates for access to affordable food for all Canadians, has been joined by other groups working with the Trudeau Government on implementing a national food policy, the meeting heard.
“At this time in Canada’s history, we cannot try to fix our food system without tackling the legacy of colonialism and Residential Schools and acknowledging the urgency of Indigenous food sovereignty,” said Joseph LeBlanc, a Food Secure board member.
Over the weekend, participants will be able to explore many different food-security related segments.
In fact, the event hosts more than 50 sessions with experts helping build skills.
Topics include; Agriculture, Climate Change, Food Justice, Food Policy, Food Security, Global Food System, School Fund, Local Food Economies and Northern and Indigenous.
“We have many suggested policy reforms,” said Bronson. “The most urgent policy reforms are focusing on a national student nutrition program.”
“We need to see support for the next generation of farmers,” who called for a recognition of Indigenous and northern food sovereignty,” Bronson said.
“We are very confident that we are going to be moving in that direction.”
Trudeau has requested Minister of Agriculture Lawrence MacAuley to “develop a food policy that promotes healthy living and safe food by putting more healthy, high-quality food produced by Canadian ranchers and farmers, on the tables of families across the country,” the prime minister’s office said in a statement. | https://humbernews.ca/2016/10/need-for-affordable-food-focus-of-weekend-gathering/ |
If you are using the Chrome browser on a Windows or Mac machine, only extensions will appear in the Chrome web store.
In order to install Fluency Tutor for Google, go to fluency.texthelp.com and allow permissions.
You can also use the old Chrome store link to install Fluency Tutor for Google and share with your colleagues.
Can multiple teachers share the same student? | https://support.texthelp.com/help/fluency-tutor-for-google-is-not-showing-up-in-the-chrome-store |
Why is Seinfeld So Hard to Translate?
In the '90s, Seinfeld was one of the most popular sitcoms in America, averaging 38 million viewers per episode in its final season. But abroad, the self-proclaimed "show about nothing" never gained more than a cult following. Though international broadcasters were quick to pick up the show, hoping for an easy hit in their own countries, viewership abroad didn't come close to hitting the same numbers as it did in America.
So, what's the deal with translating Seinfeld? In an interview with The Verge, Sabine Sebastian, the German translator of Seinfeld—herself a Seinfeld fanatic—explains a few of the many challenges she faced bringing the show to a German audience. Essentially, these boiled down to linguistic and cultural differences. More than many American shows, Seinfeld relied on word-based humor: not only was it full of difficult-to-translate puns and euphemisms, but even the sounds of words or the specific cadence of an actor's speech were part of the humor. It wasn't just the wordplay that was difficult to translate, but the delivery of the lines, the way Jerry, for example, spit out the word "Newman."
Sebastian describes struggling particularly with one episode, in which Jerry's girlfriend's name rhymes with "a part of the female anatomy." Jerry, who can't remember the woman's name, spends the entire episode throwing out guesses like "Bovary" and "Aretha," before finally discovering her real name: "Dolores."
Since the German version of the show was dubbed, Sebastian also had to make sure the translations lined up with the actors' lip movements. Since Seinfeld is such a dialogue heavy show, the translation process for one 22-minute episode could take longer than that of an entire action movie.
Cultural differences were a big issue, too. Sebastian's editor wasn't too happy with some of the German references in Seinfeld: an episode where George is mistaken for a neo-Nazi, or references to concentration camps, for instance, didn't go over well. | https://www.mentalfloss.com/article/67874/why-seinfeld-so-hard-translate |
They say that man is a creature of two worlds, the world of the living and the world of the dreaming. In the world of the living, we are all simply people, people roaming the planet doing jobs, paying bills and living our lives. In the world of dreams, we are all writers and musicians who create art, write masterful stories of fantasy and though we may be victims of nightmares at times, we are still able to express ourselves and enjoy ourselves with a kind of child-like freedom never to be found in the waking.
But while these two words are great, each in their own right, neither is the greatest of all. For while reality finds it's beauty in practical things and dreams in unabashed freedom there is a third word, an in-between world if you will, that has found a way to master the beauty of both.
This in-between world exists neither in sleeping nor waking but in the giant chasm between the two worlds. As we humans drift aimlessly through the night we are caught, even if only briefly, in this wonderful space. It's the only place where the two worlds touch, the only place where you can talk your problems over with a unicorn, practice your dance moves with a dragon or discuss how your friends treat you with a Cyclops.
It's the only place where ideas flow as free as water, where the limit to the answers one can grasp is limited only by the reaches of one's imagination and it's the only place where man is still sober enough to remember his problems, but still drunk enough off of the wine of dreams to answer them with super-human creativity.
It is truly the most perfect place imaginable. But it is never a place you can go to. Because unlike dreams or reality, it is not a destination, but rather a corridor. We are nothing but passengers through this strange land. All we can do is look out the windows of our carriage and watch as the two words collide and their fringes mingle to become a patchwork quilt made up of the fibers of both our worlds.
That is why we never spend more than a few precious moments here, a few moments as we go from awake to asleep at night and back again in the morning. If we as mortals set foot in this land, we would taint it like we have our others. This land is pure and pristine still and any nightmares or troubles occurring here are reflections we bring with us from our trips beyond, not a problem with the land itself.
So as I fall asleep tonight, I fall asleep neither for the comfort of dreaming or the thrill of awaking the next morning, but rather for the few precious moments in between. I know that without those moments the ideas I cherish and the creativity I so need would never be mine.
Much like the air we breathe or wood to a fire, these few precious moments are what fuel me and propel me forward. Without them I would stall and die, but with too many of them I would rocket into oblivion, pushed far beyond the edges of insanity, and never be heard from again.
That is a risk I will never take my friends, not in a thousand years of questioning nor a million years of answering. So no matter how much I love my trip through this place. I could never slow my trip through it; to do so would be fatal. Fatal to my mind, fatal to my body and fatal to my soul.
Because you and I dear reader are mortals, and this world was not made for us. It is our corridor, our passageway and nothing more. If you respect that it will yield you many great things. If you don't, it may kill you.
It's really that simple my friends. | https://ravensrants.com/in-between-world/ |
I would like to sing an improvised vocalise on "ah" moving from one emotional state to another. The notes will change and the emotions will change, but the vowel, the "ah" will stay the same. As you listen, try and identify the emotions I'm expressing. *vocalise* I wasn't speaking words, but I was moving through a range of emotions with power and nuance. Singing is a complex practice, and for me has become a spiritual discipline to understand and train my emotions. Emotions are core muscle activities--exercises of the body, head to pelvis. Each emotion has a core posture, like a yoga pose or a dance pose for the core, and so as I move from one emotion to another, I move from one core posture to another, like an inner dance, so I can tango well with the world.
When you talk to me, you may be able to see, hear, and then accurately identify my emotional state. Oh that's anger, that's joy, that's sad. This reading of core postures happens in daily life and it happens when I sing for an audience. I invite an audience to move emotionally with me. When I sing, I efficiently breathe in and exhale with a spaciousness and control to express a wide range of emotions powerfully but also gracefully without losing authenticity. Singing has taught me that all emotions are on the table to be expressed, which means that all emotions are legitimate. Even the "bad" ones like anger can be beautiful and can feel amazing. How? How can anger feel good? I feel a pain, inhale, and exercise it out...moving the breath.
*demonstrate*
Well, what good does that do? Expressing anger can prevent muscle tension. Let's say I feel pain. Pain is a head to pelvis activity. If I touch a hot stove for example, the experience is out here, but the core responds reflexively with intense inner contraction. Holding the breath while in pain can make the pain worse. I feel the pain in the core, I hold my breath which creates more pain. So I breathe in, feeling the pain, and exhale, feeling the muscles contract and release, exercising out the inner activity. That can be good depending on the situation. Sometimes it's better to relax into the pain. Say if the situation could be dangerous, it's good to be able to feel the hit, relax through it and then think quick to figure out a good response. Breathe through the pain until it dissipates. Both are legitimate depending on the situation. Expressing the pain or relaxing into it. When we exhale it out and express it, the muscles can release through movement and also communicate our inner experience to other people with a power that says, "That hurt! This is how much it hurt. No more." And then...going deeper, anger also says "I am a body! And this body hurts right now."
Now I get more into spirituality. It is my perspective that I am a body. In my work, body philosophy, I have reclaimed the word "spirituality" as body practice. Spiritus means to breathe. And so for me, an exhalation of anger is spiritual. An exhalation of joy is spiritual. A peaceful breath without thought is spiritual. It's all breath experience that I train with a vocal art to eventually develop an agility of emotional movement which I exercise to maintain, sustain, communicate myself as a body.
My perspective that I am a body can conflict with other spiritualities...and I want to talk specifically about belief systems that say our essence is a spirit or soul or energy--a peaceful, blissful thing--that can exist after death and so is not subject to the pains of mortality. In my view, these kinds of spiritualities train a person to be peaceful by advocating for a hierarchy of emotions, with positive ones on top and negative ones on bottom. If I think the essence of me is peaceful and that essence will live forever, it's tempting to make my spiritual practice an effort to be in a peaceful state as much as possible.
Well, what's wrong with that?
It's kinda privileged.
There are many oppressed people in the world. Bodies in pain. Climate change is going be oppressing all of humanity in the near-ish future. It's a prediction of death, and when I think about it, I feel an inner pain, which is appropriate. The thought should be felt as pain in the body. And with that pain, there are options: relax into it, or exercise it out. Both can be helpful to figure out solutions to climate change, but first we have to think about it and feel the threat of it in the body.
Similarly people who are oppressed feel pain in their bodies and in order to empathize accurately, we have to feel pain in ours. How does that work? Ok. Example. We all feel pain. Let's say I have a friend and my friend is in pain, they may express it to me to exercise it out and communicate their inner experience. I hear it and contract inwardly mimicking their pain. This is a good way to exercise empathy, but it requires that I feel unpleasant sensations inside my core. Now a person in pain could not express it all. They could potentially relax it or stay tense inside. That might keep me more comfortable but ignorant of what they are experiencing. But it's not up to me to tell a person in pain how to move through their pain. In other words it's not cool to say to a person something like "Don't be so angry, You're making me uncomfortable." You've probably heard of this. It's called tone policing. Asking people in pain to tone down their anger because it makes me uncomfortable. But I want to take this a little further and bring in spirituality. Sometimes, the justification for the tone policing can be spiritual. Something to the effect of: "I am a peaceful being, my spirit essence is peaceful, and your anger is interrupting my spiritual practice. In other words, "Don't be a body. Be more spiritual. Inside, your true essence is a peaceful spirit. Embrace your true essence, and it will make everything better"....
I'm going to give a name to this: spiritual gaslighting. We can do it to ourselves. I'm supposed to be a peaceful, blissful being and this body experience is ruining it. Bad body. And we can do it to other people. I am supposed to be a peaceful, blissful being and you not managing your pain is affecting my spiritual path. Bad body. As someone who thinks that I am a body, for me, spiritual gaslighting is everywhere. On the deepest levels, people don't want to be bodies. We imagine ourselves as something other than a body and create a hierarchy of emotions and behaviors that diminish the expressions that would definitely prove that we are bodies--anger, vulnerability, sadness--then sometimes we culturally engage in competitions to see who can be the most bodyless, the most peaceful. This game, I would argue, maintains class, racial, economic divisions. In other words, when people value a hierarchy of emotions--"positive emotions" like warm peaceful love on top, and "negative emotions" like anger on bottom--it becomes easy to take a spiritual high road and look down on people who are continuously pushed into expressions of anger to defend themselves, protect themselves, and create change. Privileged people can declare peace/love etc...more of the time, NOT because they are spiritually superior, but because they are not being beaten down all the time because of race, gender, socioeconomic status and so on.
Solutions!
Be a body YEAH! Be a body in all its beautiful, difficult, joyful, tragic glory. How do we do that? I would like to propose a model that values exploring the self as a body...that values emotional agility so we can plan well for ourselves and others as bodies. Where we make space for others to express their experiences as bodies. And learn to listen to and appreciate the entire palette of emotional expression.
I've boiled it down to three disciplines to cultivate as part of a spiritual practice. The three disciplines are: Art---Analysis---Healer It makes a little trinity for you ex-Catholics out there, all three disciplines supporting each other.
I'll describe how this works for me, but this is just my personal model. I imagine many variations of this model for practicing a body spirituality that could be supported within a larger community.
#1. Art, and for me, the vocal arts. The vocal arts have become a spiritual discipline for me through this opera thing, and that's my preference, but there are many styles of singing, and also acting and oration techniques train the breath and voice into emotional agility too. So it's ok if you can't carry a tune, there are many vocal arts out there with rich centuries old technique for how to breathe, how to express a diverse range of emotions, and there is already a huge repertoire of music, theater, oration that can be taken out of the professional context and used as spiritual meditations to explore and train different emotions. I sing this aria as a meditation on lament and sadness. I speak this monologue to explore anger. I improvise a wordless vocalise on ah to explore my "yes." I improvise a wordless vocalise on ah to explore my "no." It's like becoming an emotion athlete or an emotion dancer. I learn to move through a range of emotional states. I've also learned to become aware of subtle thought movement as well as how to relax peacefully into breath without thought. Vocal arts. Awesome. But, I don't think the vocal arts are enough to be a complete spiritual practice on their own, which leads me to:
#2. Analysis. Perhaps this is a familiar discipline to many of you. Gathering information for multilayered comprehension of an issue or idea. My particular intellectual focus is body philosophy, which I created. It is understanding emotions, mind, consciousness and the spiritual experience all as body processes where the core muscles are active in shaping those experiences. I also study a variety of current issues to keep myself up to date on what's going on. Being able to exercise disciplined analysis gives me a framework for making informed decisions about how to exercise my emotional palette, how to empathize and respond to others with an understanding of the issues they face, and how to plan well for myself and for other bodies. But, I still don't think Arts and Analysis are quite enough for a complete spiritual practice, which leads me to number 3.
#3. Cultivating a healing discipline to heal myself and heal other. This gets me in touch with my needs, limits, and vulnerabilities. My healing discipline is massage and the emotional work that comes with it. Healing work grounds me to care for my body and care for other bodies. It creates emotional connection and cultivates in me the ability to empathize, care, and plan for other bodies to maintain health. Ok, why do I need all three? Why not just do one?
Well, I'll just speak for myself and my own experience, and hopefully you'll be able to relate. If I'm just a singer in this culture, an opera singer in my case, I am often asked to participate in art work that I don't want to participate in. The opera stories are often patriarchal. The characters I am suited for are the ingenue, the coquettish girl. It's not me and I get frustrated that there are so many women who are amazing singers and they have to play roles where they don't have much power or depth, or in the more dramatic roles, they get murdered or raped or treated really badly. Meh. I don't want to participate in it. There are other stories out there that are more modern, but the industry is still very set in its ways. Same with religious institutions. As an opera singer I'm generally expected to sing religious music, the content of which, I don't agree with. As just a opera singer at this time in history, I am a vessel for the storytelling mostly of men through a patriarchal lens. And this is still true for many classical actors as well. Generally all the professional industries around the vocal arts are still patriarchal. So, it's been helpful for me to take the technique and repertoire out of its context and make it my own, or write my own. But in order to make it my own, I needed to do a lot of reflection and analysis.
Which brings me back to #2 analysis, the second part of my model. Similar to how I don't want to be just an opera singer, I also don't just want to be an intellectual. Why? If I'm just an intellectual in this culture, I feel an expectation to be emotionless as if reason and emotion don't belong to the same club. There is a concept of the mind I've noticed in our intellectual spaces...that the mind/brain is a calculating place and the body is generally a machine to taxi the mind around. I disagree with this conceptualization... In case you you didn't catch this already, I think humans are bodies, with all the fleshy emotional goodness and pains that come with it. So that's why the combo of Arts and Analysis are important to my spiritual practice. Arts cultivate a discipline of emotion. Analysis cultivates a discipline of thought. So we are not disembodied analysts. We are not unfeeling machines. We are bodies. With needs. With limits. We can be soft and vulnerable. Which brings me to the third part of the model. Working as a healer. I heal myself and heal others. Healing work gets us in touch with our limits, our fragilities, and vulnerabilities as bodies. But if I'm just a healer in this culture, I am often expected to be someone who brings people from a state of injury back into health so that they can continue to participate in an unhealthy system. We need new systems. In order to create new systems, I try to be a healer who makes an effort to intellectually analyze the systems causing so much injury, with the voice training and confidence to make myself heard.
So that's why I advocate for all three together. ---Arts, Analysis, Healer--They all support each other. It's a revolutionary model. And it's been working for me. It diversifies my income. I feel it's a good way forward especially as our economy changes from a materialistic, resource consuming economy to an economy that values human skills to care for each other as bodies. It's time to build new systems to provide care for bodies supported by philosophical and spiritual conceptualizations that humans are bodies.
I'll finish with some questions for reflection. What kinds of arts would you like to explore and cultivate in yourself? Is there something you want to heal in yourself? Is there a way you would enjoy giving healing work to others? What kind of group work would be exciting and fulfilling? How do you imagine bodies supporting each other, creating new systems, creating new ecomomies that care for humans as bodies? | https://www.madelinemcneill.com/post/a-spirituality-of-emotional-agility |
Here’s where to find and search for books on explosions in Fortnite.
We’re three weeks away from the end of Fortnite chapter 2 season 7. An insider has posted some leaks on Reddit which include confirmation of a live event to conclude this season. According to the insider, there will be a countdown timer that’ll appear on September 3rd.
Until then, we still have weekly challenges to complete. There are no Alien Artifacts, but the Epic and Legendary quests will continue to release on Wednesday and Thursday at least for this week. We’ll know if there will be further challenges before the season ends when the v17.50 update releases next week on Tuesday.
The week 12 legendary challenges go live today at 3 PM BST. One of them requires players to search for books on explosions. Here are the locations of the books on explosions in Fortnite chapter 2 season 7.
Books on Explosions in Fortnite Locations
In order to complete this challenge, players will need to search for two books on explosions. You can find these books on Explosions in Steamy Stacks, Dirty Docks, and Catty Corner.
You can find a book in the large building towards the west side of Steamy Stacks. Here’s the location marked on the season 7 map:
It’ll be located on the bottom floor at the entrance by closet to the reboot can. The other book in Steamy Stacks can be found in the orange building marked as “3”. Enter through the door next to the reboot can and the book will be on the floor to the left.
At Dirty Docks, you can search for books of explosions on the northwest side by the metal fence. It’ll be in front of blue bin. Here’s an in-game image: | https://fortniteinsider.com/fortnite-search-for-books-on-explosions-locations/ |
EU naming Caribbean “tax havens” meets with stern response from Sir Ronald Sanders
In naming 30 countries as the “top tax havens in the world“, the European Union (EU) appears to “playing dice” with the reputations of countries, 12 of which are Commonwealth independent small states in the Caribbean, the Pacific and the Indian Ocean.
An examination of how Antigua and Barbuda, the Bahamas, Barbados, Belize, Grenada, St Vincent and the Grenadines and St Kitts-Nevis were listed reveals that in all cases 10 European countries were mainly responsible for naming them.
But, very little business is done between these 7 Caribbean countries and the 10 European nations, namely Bulgaria, Croatia, Estonia, Greece, Italy, Latvia, Lithuania, Poland, Portugal and Spain.
If the seven independent Caribbean countries named above were seriously deficient in the application of international standards of tax good governance (transparency, exchange of information, and fair tax competition), this would have been known to Britain with whom these countries conduct more business than any other European nation. Yet, neither Britain nor Germany are among the EU countries who identified them.
It may well be that the named countries in the Caribbean, Pacific and the Indian Ocean do not have Tax Information Exchange Agreements with the 10 European Union nations, but they do have such agreements in place with major EU nations. Why then was there not more information sharing between the EU countries before the list was issued in the name of the EU as a whole?
Small Commonwealth states should act together to object to their listing by the EU and to question the criteria by which the 10 European nations with which they least do business identified them as tax havens. | https://www.bajanreporter.com/2015/06/eu-naming-caribbean-tax-havens-meets-with-stern-response-from-sir-ronald-sanders/ |
Many doctors/physicians consider Sleep apnea a disorder where you experience abnormal breathing patterns while sleeping. People with the condition experience multiple pauses in their breath during their sleep. The temporary pauses in breathing result in low-quality sleep and thus affect your oxygen flow and lead to deadly health consequences, including heart attacks, cardiomyopathy, obesity, stroke, hypertension, arrhythmias, and heart failure.
In La Puente, California, sleep apnea is a common sleeping disorder to many people. It affects either children or adults of both sexes, although many cases are reported on men. Due to the disorder's potential health impacts, people need to know what sleep apnea is, the causes, symptoms, types, and possible treatment options. Also, it’s good you discuss with your bed partner and report any signs of the disorder to your doctor.
The Meaning of Sleep Apnea?
Sleep apnea is considered a disorder where your breathing system interferes while sleeping, especially at nighttime. Many people with sleep apnea experience pause in their breathing pattern as they sleep. In many cases, the situation occurs at night. If the condition is left untreated, it might result in several health issues. Also, sleep apnea might result in motor vehicle accidents and work-related accidents.
What are the Forms of Sleep Apnea
Sleep apnea occurs in two primary forms, as discussed below:
Obstructive Apnea
The condition occurs as a recurring episode, partial or complete airway blockage as you sleep. The chest and diaphragm muscles work hard during the Apneic episode since the pressure increases to open your airway. Thus the impact will result in reduced oxygen flow to the essential organs and attract heart problems.
Central Sleep Apnea
Under this condition, your airway is unblocked. Thus, the brain fails to signal to breathe due to instability in your respiratory system. The condition relates to the central nervous system. Speak with your physician to determine the type of sleep apnea you suffer.
Common Victims of Sleep Apnea
Around 25% of men suffer from sleep apnea, while around 10% of women suffer the condition. The sickness affects any person without leaving out children and babies and people above 50. Certain clinical features and physical traits are also common in people suffering from obstructive sleep apnea. They include a large neck, structural abnormalities, and excessive weight that reduce your upper airways' diameter like nasal obstruction, enlarged tonsil, small jaw which has an overbite, and a low hanging soft palate.
What are the Causes of Sleep Apnea?
The blockage of your airway causes obstructive apnea. The condition occurs mainly when the tissues in the rear of your throat collapse while you are sleeping. Doctors observe central sleep apnea in patients suffering central nervous system dysfunction like stroke. Also, they may discover the condition in people with neuromuscular disease, including amyotrophic lateral sclerosis. Also, the condition is common in people suffering from heart failure or heart, lungs, and kidney issues. The following are the common causes of sleep apnea:
- Sex
- Weight
- Older age
- Anatomical differences
- Smoking
- Neck circumference
- Obesity
- Use of sedatives like alcohol
- Family history
- Sleeping on your back
- Cigarette smoking
Signs and Symptoms of Sleep Apnea
Many sleep apnea symptoms are recognized first by your bed partner. Many of the patients don’t have sleep complaints. You want to inform your health care provider when you see or experience any of the following symptoms and signs:
- Snoring
- Fatigue or daytime sleepiness
- Choking
- Frequent nighttime awakenings or restlessness during nighttime
- Night sweats
- Cognitive impairment like trouble when concentrating, irritability, or forgetfulness
- Dry mouth
- Mood disturbance(anxiety or depression)
- Headache
- Bedwetting
- Sexual dysfunction
- Frequent urination at nighttime
Many patients with central sleep apnea usually report many cases of insomnia or recurrent awakenings, although they also experience gasping or choking sensation after waking. The symptoms in minors/children are not common, and they include:
- Bad/Poor performance at school
- Daytime swallowing difficulties and mouth breathing
- Sleepiness or sluggishness, usually witnessed through laziness while in the classroom
- During inhaling, their rib cage moves inwards
- Excess sweating, especially during nighttime
- Unusual sleeping locations like sleeping on knees or hands or hyper-extended neck.
- Behavioral and learning disorders
Diagnosing Sleep Apnea
Your physician/doctor will first observe your symptoms before they begin a sleep apnea diagnosis. They will first do the following:
- Ask you whether you take any medication like opioids that might affect your sleep.
- Look for any reasonable causes of sleep apnea.
- Ask you whether you have recently traveled to regions with an altitude above 6,000 feet. The locations tend to have low levels of oxygen, which might attract symptoms of the disease.
After asking you the above questions, your doctor will use various things to help determine whether you have sleep apnea disorder. They will do the following:
Medical History
The doctor will consider the information you provide to look for the symptoms and signs of the disorder. They will even review the history of your family members to determine whether you are at risk of suffering the same disorder. They will even decide whether or not you have any complications resulting from undiagnosed sleep apnea, including high blood pressure, type 2 diabetes, and atrial fibrillation.
Physical Examination
The doctor might conduct a physical examination to determine whether you have sleep apnea disorder. They will look for conditions that might place you at risk of sleep apnea, including large tonsils, obesity, and large neck circumference. Also, they may look for the structure and size of your jaw and the position. Again, the doctors will look at your heart, lungs, and even neurological system to determine whether you have any disorder-related.
Sleep Studies
Another common procedure to diagnose sleep apnea is through conducting a sleep study. The doctor may consider you to undergo sleep studies at home or in a unique facility. The test does the following:
- Identifying any occasion while you are sleeping which relate to symptoms of sleep apnea disorder
- Find the high or low level of activity in your muscle which manages your breathing
- Examining blood oxygen level as you sleep
- Watching your brain and heart action as you rest
The Treatment Options for Sleep Apnea
There are various treatment options available for both central and obstructive sleep apnea. Also, you may use lifestyle changes to reduce sleep disorders. The following are the sleep disorders:
Continuous Positive Airflow Pressure Therapy(CPAP)
Apart from seeking lifestyle changes to reduce sleep apnea, you also need to seek treatment for the condition. One of the common types of treatment options for the condition includes continuous positive airflow pressure therapy. The CPAP device involves a machine using an airtight and hose nosepiece or a mask to provide a steady airflow in your airway as you sleep. The pressure in the machine will help keep the airway open and prevent any pauses in your breathing.
Many patients find it difficult to sleep with the CPAP tool. However, they adjust after some time and start sleeping comfortably with them. As a patient with the CPAP device, you will first experience immediate symptoms relief, boost your mental health and even physical energy. Thus use the CPAP devices.
Recently the CPAP technology has significantly advanced and improved and even come up with new CPAP machines which are quieter, lighter, and comfortable for the patients. Thus if they have been frustrating to you in the past, you want to give yourself a second chance and use the new CPAP devices.
It might take some time before you become used to the devices. You will even miss sleeping the old way. However, you might do several things to ensure you quickly adjust to the CPAP devices. The following tips will help you adapt rapidly to the CPAP devices:
- Ensure you properly fix your mask
- Ensure you choose a CPAP device that comes with an inbuilt humidifier
- Reset the device when airflow wakes you
- Ensure you keep the machine clean
What are the Other Air Pressure Breathing Devices
Apart from the CPAP devices, the doctors may suggest you use other sleep treatment apnea to treat the condition. The devices include:
Adaptive servo-ventilation(ASV): The devices are extensively used to treat central apnea and sometimes obstructive apnea. They store details about your breathing pattern. Also, they will automatically prevent pauses in your breathing while you are asleep.
The EPAP: The Expiratory positive airway pressure devices fix over your nostrils and help keep your airway open. They are smaller than the CPAP devices. The EPAP devices highly benefit patients with mild obstructive apnea.
Bilevel Positive Airway Pressure(CPAP or BiPAP); The devices are applied by the patients unable to familiarize themselves with the CPAP. Also, they are good for patients suffering central apnea and require assistance when they have a weak breathing system. The devices automatically adjust the pressure as you sleep and provide much pressure once you breathe in and less pressure when you breathe out. Lastly, the devices will also deliver breath when your mask discovers you haven’t had one for the last seconds.
Oral Appliance Therapy
Another increasing treatment option for sleep apnea is an oral appliance. However, the treatment option isn’t effective like CPAP devices. But they’re a good method when you cannot tolerate CPAP devices since they are more comfortable. Your doctor may choose an oral appliance treatment from various appliances approved to treat sleep apnea. Many appliances are acrylic devices and fit in your mouth more as an athletic mouthguard. Also, they may suit around the chin and head and adjust the location of the lower jaw.
The common oral appliance treatment option for sleep apnea includes Mandibular advancement tools/devices. These are tools or devices used by doctors to treat patients suffering from obstructive apnea. Professional experts can make oral mandibular or dental appliances devices to help prevent your tongue from closing your throat or even advance your lower jaw. A dentist or sleep specialist will jointly determine whether you are the right candidate for the procedure. However, oral appliances come with side effects, including saliva build-up, soreness, damages to the lower jaw, mouth, or teeth. The side effects will be more common when the devices are poorly fixed.
Medical Surgery
Your doctor may use surgical procedures to treat obstructive apnea. The common surgical procedures done include outpatient procedures. Surgeries are recommended for patients with malformed or excessive tissues obstructing airflow through your throat or nose, like enlarged tonsils, smaller lower jaws, and deviated nasal septum. The doctors will order for the surgery when sleep apnea doesn't respond to conservative measures. The common type of surgeries used to treat sleep apnea include:
Tonsillectomy; It’s a procedure aimed at removing the tonsillar tissue at the back of your throat. It's the leading source of obstruction among children suffering from sleep apnea.
Somnoplasty; This is an invasive procedure that applies radiofrequency energy and reduces your soft tissues in the upper airway.
Maxillary/mandibular advancement surgery; is a surgical correction of throat obstructions or facial abnormalities, which are the leading cause of obstructive apnea.
Uvulopalatopharyngoplasty is a medical treatment procedure conducted to remove the soft tissues on the back of the throat and increase the airway's width at the throat opening.
Sleep Apnea Implants
Among the newest modes of treating sleep apnea is inserting a pacemaker system to stimulate muscles and keep your airway open for you to breathe during the nighttime. The FDA has approved the newest implant to treat obstructive apnea. Although the technology is expensive and new, many recent studies have suggested treating patients with sleep apnea.
Lifestyle Treatment for Sleep Apnea
When you suffer a mild case of sleep apnea, changing your lifestyle could be a good method to reduce the condition. However, the doctor will guide you on where to start. Even when undergoing medical treatment, lifestyle changes are crucial in reducing central and obstructive sleep apnea and improving your sleep.
Losing Weight
When you suffer from sleep apnea disorder and are overweight, losing significant weight will highly benefit you. However, this is not a total cure to the condition, but it will reduce the breathing episodes you encounter, decrease your daytime sleepiness and even reduce your blood pressure.
Sleeping on Your Side
When you have sleep apnea, the worst thing you want to do is sleep on your back because it will cause your tongue, jaw, or any other soft tissue to drop towards the throat and thus narrow the airway. Also, avoid sleeping on your stomach since lying your face down or even twisting your head will obstruct breathing. However, by sleeping on your side, you will keep your airway open. If you find it hard to sleep on your side, you may consider placing a pillow on your bed.
Engage in Exercises
Your regular exercise may reduce your sleeping episodes even when it doesn’t lead to reduced weight. Also, it will give you energy and keep you alert during the daytime. Resistance training, yoga, or aerobic exercise are all good for strengthening airway muscles and improving your breathing,
Avoid Anti-Anxiety Medication, Alcohol, and Other Sedatives
You want to avoid alcohol intake and anti-anxiety medications before you go to bed since they tend to relax the muscles on your throat and hinder your breathing. They include (e.g., Valium, Ativan, Klonopin, Xanax), antihistamines (like Claritin and Benadryl), opiates (e.g., Percocet, Vicodin, codeine, morphine), and sleeping pills.
Sleep Apnea in Children
Many children suffer from obstructive sleep apnea. However, you might not easily detect the condition in children. Apart from experiencing snoring, many children with the condition will also experience the following:
- Adjusting strange sleeping positions
- Exhibiting daytime sleepiness
- Suffering from bedwetting
- Declining grades or developing behavioral problems
- Pausing breathing as they sleep, gasp or snort.
Sleep Apnea Complications
If you leave an untreated sleep apnea, it will attract severe medical conditions, which include the following:
Daytime Fatigue
Many patients with sleep apnea report incidents of repeatedly waking up. Thus you find it challenging to have healthy and regular sleep. Therefore the condition will result in daytime crankiness and sleepiness. When you experience daytime fatigue, you will more likely fall asleep at your workplace or school, and you may even be involved in accidents.
Liver Complications
Sleep apnea disorder may cause you to encounter abnormal results on your liver function tests. In many cases, your liver will show symptoms or signs of scarring.
Issues with Surgery and Medication
Sleep apnea, especially obstructive one, will cause the patient's encounter problems with certain drugs and surgeries since they will more likely have breathing issues.
Heart Problems or High Blood Pressure
When you experience a sudden drop in your blood oxygen level as you sleep, your blood pressure may stress the cardiovascular system. For instance, obstructive apnea may put you at risk of strokes, abnormal heartbeats, and heart attacks.
Contact a La Puente Dentist Near Me
When you leave sleep apnea untreated, it might result in significant consequences, as discussed above. Thus you want to report any signs and symptoms of the disorder to your health care provider. Don’t wait until the situation worsens. At La Puente Advanced Dentistry, our medical experts are ready to help you. We will ensure you receive the proper medication you deserve. Thus call us immediately if you notice any symptoms of the disorder at 626-626-7075 and talk with one of our medical experts. We have helped countless patients seeking sleep apnea medication in La Puente, California. | https://www.thelapuentedentist.com/services/general-dentistry/sleep-apnea |
1. Diapause is considered an important adaptation for survival of winter; however, insects often enter diapause long before its onset. Thus, diapausing insects must also be able to survive these prewinter conditions which warm temperatures could make quite energetically taxing despite relative inactivity.
2. We tested for both immediate and delayed fitness effects of prewinter conditions in diapausing Pieris napi butterfly pupae, experimentally exposing them to different prewinter treatments in a factorial design. We placed diapausing pupae at one of three temperatures (15, 20, 25 °C) for 1 to 16 weeks, followed by the same standardized winter for all individuals.
3. We monitored survival at multiple points during the experiment, including after winter, as well as their change in mass. For a subset of individuals, we also made repeated metabolic measurements.
4. We found substantial weight loss during prewinter warm periods, greater during longer prewinter treatments at higher temperatures. This weight loss was associated with elevated metabolic rates at higher temperatures which increased over the duration of the prewinter treatment.
5. Although we found little prewinter mortality associated with these conditions, mortality was much greater post-winter for individuals in long, warm prewinter treatments and the dry mass of adults that did survive these conditions was lower, highlighting the need to understand chronic or delayed effects of stress on fitness.
6. Ultimately, we found substantial fitness consequences of prewinter conditions for a diapausing insect. Given that climate change will make these prewinter periods both longer and more intense, it will be important to understand how dormant organisms tolerate or reduce the length of these dormant, inactive periods.
Methods
The main data set also contains information from two additional groups, a second population of Pieris napi from Stockholm and Pieris rapae from Kronängen (the same site as the studied Pieris napi population); however, larval rearing of these populations went very poorly so initial sample sizes were much smaller and extremely few individuals survived the experiment. Thus, data from these other groups have not been analyzed.
As a side effect of how random, balanced assignment of pupae to treatments was performed, there are also a substantial number of blank cells associated with ID numbers to which a pupa was never actually assigned. These can be removed before analysis.
See methods in associated paper for more details.
Usage Notes
See readme files for more information about each file. .exp files from Sable Systems expdata can be made available upon request.
PrewinterDiapauseIndividual
Main data file with survival and mass change data from the full experiment
PrewinterDiapauseMetabolismMeasurements
File with data from the repeated metabolism measurements on a subset of treatments in the main experiment. Available as both .xlsx and .csv
PrewinterDiapauseManuScript
R script for producing the statistics and figures from the manuscript. | https://datadryad.org:443/stash/dataset/doi:10.5061/dryad.kd51c5b7m |
Natural phenomena often cause more admiration than man-made. Whatever a person does, everyone will admire the mountains, hurricanes and tsunamis. Admiration, horror and awe. All this is natural, in relation to such majestic and dangerous phenomena. Interest can also be caused by more mundane moments, many would not refuse to find out how fog is formed and whether this natural phenomenon should be feared.
Fight with nature
Man fights with nature throughout his existence. Civilization contrasts itself with chaotic primordial power:
- People tend to love orderliness and constancy.
- From primitive times, it was nature, in all its manifestations, that most of all “spoiled life” for man.
- Struggling with the environment, the first settlers colonized new lands and asserted their power.
- Every year, agrarians engage in a deadly race with nature. Its meaning was to get the largest possible harvest in a short time and feed all who need it.
- Even in ancient times, physicians were faced with the problems of mass epidemics. Their sources were microorganisms, the same elements of wildlife.
Today, people, although quite distanced themselves from nature, conquering it in many areas of their activities, but still, mankind is largely dependent on it. And one cannot yet say that no “sudden turn” performed by Mother Nature will be able to erase our civilization and any memories of it.
Where does the fog come from?
Fog, oddly enough, fog is taken from the air. To do this, depending on the terrain, you will need:
- The presence of a large number of industrial enterprises and automobile transport.
- Special weather conditions.
- Bodies of water, preferably rivers and lakes.
Caused by the influence of exhaust gases and plant emissions, fog is commonly called smog, and it is characteristic of industrial centers. If about 150 years ago he was most often met in England, today the "palm" has moved to South America and China. It just so happened that Europe and the USA are trying to take their production out as far as possible so as not to “enjoy” the smog and other possible consequences.
Weather changes and the presence of water bodies affect the amount of evaporated moisture, which leads to the formation of fog. This variety is less dangerous for people, it practically does not cause exacerbation of chronic bronchitis and new attacks of bronchial asthma. But visibility is still decreasing.
How does the fog appear?
To understand the formation of fog, you need to remember air mass movement:
- Air moves not only horizontally, but also vertically.
- There are two types of masses - cold and heated air.
- Obeying the laws of physics, warm air rises higher, while cold air, on the contrary, descends closer to the surface.
- During such a movement, condensation occurs - evaporation and fixation of microscopic droplets of water in the air.
- Best of all, they are fixed on dust particles, so in industrial areas even ordinary fog occurs earlier. What can I say about smog.
Colossal volumes of air are constantly moving, the laws of physics also apply without change. But fog is a rare phenomenon, sometimes it is forgotten for months. And the secret is simple for maximum effect, a maximum level of humidity is required. In a dry climate, such phenomena occur only at very low temperatures, extremely low.
So that any fog is based on the movement of warm and cold air, contact and a kind of “conflict” between these two environments, ending with the evaporation of moisture into the environment.
How to make fog at home?
Fog can also be created artificially. The question is only in scope and objectives:
A remotely resembling effect is suitable to surprise friends.
One of the special effects to provide a beautiful picture.
The creation process itself can be demonstrated, it will only foster interest.
It is necessary to create the most accurate copy of the natural event, using special machines.
No one will blame if something does not work out or if it does not work out exactly as it should.
They will carefully look at the effect, look for flaws.
At home you will need:
- An empty bottle, preferably a liter. One third filled with hot water.
- A drop of vodka to be added to the water.
- Ice tongs and, in fact, a piece of ice. It will need to be kept at the very neck.
That's the whole simple scheme. Of course, it will not be possible to achieve a thick and long fog, but even such a result will surprise guests. For the same purpose, you can get a special machine, which on the basis of the same principles will produce fog on an industrial scale. But this is an expensive option and bulky equipment. For those who are not looking for easy ways.
The formation of fog in stages
There is nothing secret in the formation of fog, physicists have uncovered the secret of this natural phenomenon centuries ago. This is how atmospheric fog:
- In the atmosphere there is a constant circulation of air.
- Warm and cold masses move, replacing each other.
- During movement, condensation and evaporation of moisture occur.
- Water can also evaporate from the surface of water sources if the ambient temperature is slightly lower than the temperature of the water.
- The droplets are fixed on some surface and remain in the air for some time.
- Delay is observed for several hours, as a rule. At this time, the surface is covered with light haze and visibility is significantly reduced.
Fog can be a test for those who suffer from chronic lung diseases. Most often, problems arise with smog. Reduced visibility increases the risk of accidents, so motorists need to either be extremely careful or limit their stay at the wheel of a vehicle for a couple of hours.
You can live your whole life without knowing how fog is formed. The main thing is to know what hidden dangers this completely innocent, as it might seem at first glance, natural phenomenon can carry in itself.
Manual method
The longest, but at the same time the most effective way is to do everything manually. To do this, we will have to complete the following steps.
- Open any image in Photoshop and do not hesitate for a second to create a new empty layer.
- Make sure your primary color is black. If not, then press D (it will reset all colors to default). Next, take the “Fill” tool and fill the empty layer with black.
- Now go to the menu "Filter" - "Rendering" - "Clouds". As you can see, our picture was closed with some strange clouds. Naturally, we do not need this.
- Next, we simply set the layer's blending mode (naturally where the clouds are) to the “Screen”. This will allow us to remove all the black colors of this layer, leaving only a fog. But it still turned out to be too thick and white, so we will reduce the opacity of the percent to 45 for this case, and there already see for yourself.
- And now let's make sure that the further the fog is from the water, the weaker it is. To do this, create a layer mask on our haze layer.
- Now we select the Gradient tool and see that its color is from black to white. If so, then now we will need to draw this gradient from top to bottom, as shown in the figure below. Thanks to the layer mask, the smoke that is at the top will become almost invisible, and the one that is closer to the water will be thicker.
In principle, this method can be completed. But do not rush to close the article, as below I have two more simple ways for you.
This method can be called a method for lazy people. There is practically nothing to do here, except to download the finished texture with a tyman.
You can type something like “fog png” in any search engine and many different variations of fog on a transparent background will appear in the pictures. Take whichever you like more or several at once. Well, if you do not want to bother, then for you I have prepared such a picture right here.
Then upload our freshly downloaded image directly to Photoshop and put it on top of the layer with our original image. Since the picture is translucent, you will see the fog effect right away. And again, if it seems to you that it is too thick, then just reduce the opacity, and if on the contrary it is too dim, then duplicate.
Well, another way, which can also be called a way for the lazy. Here is a set of brushes with fog, you can download them from here. And now you just need to load the brushes into Photoshop.
Well, then I think that you already understand what needs to be done next. Right. Choose a fog brush, set a suitable size, do not forget to choose a suitable color, for example light gray. Now brush a couple of times over the empty new layer and voila. Congratulations! You just managed to draw a fog! And again, don't forget about opacity. If necessary, reduce it.
Here I showed you three ways and all of them quite qualitatively reproduce this weather phenomenon. But in fact, you can use several at once and combine them, as it will look even cooler. For example, you can create all this according to the first or second method, and then use a brush to go through some places to make it look more realistic.
Well, if you want to know Photoshop from A to Z, then I recommend that you watch this cool video course. All lessons are structured, there is no excess water, and most importantly, everything is told in human language and on real examples.
Well, on this fun note, I am completing my article today, I hope you liked it. Waiting for you again on my blog. Good luck to you. Bye Bye! | http://za.bornpottytrained.com/862-how-can-you-easily-and-quickly-make-fog-in-photoshop.html |
You are viewing this course for 2021-22 entry.
Key details
- A Levels AAB
Other entry requirements
- UCAS code F350
- 3 years / Full-time
- Accredited
- Find out the course fee
-
Course description
This course focuses on the application of physics to clinical medicine. You'll gain a broad and fundamental understanding of physics while developing particular expertise in medical applications.
You'll learn about the human body, its anatomy, physiology and biochemistry, exploring its performance as a physical machine. Other topics include the physics of the senses.
You'll also study diagnostic and therapeutic applications like the ECG, radiation physics, X-ray technology, ultrasound and magnetic resonance imaging.
Medical physics modules are taught by the Department of Cardiovascular Science. Your learning will have strong roots in the NHS, where the department provides day-to-day clinical services.
If you want to study physics, but don't meet the entry requirements to go straight into the first year, our Physics with a Foundation Year could be for you. After successfully completing the one-year programme, you'll progress onto the first year of your chosen degree.
Accredited by the Institute of Physics (IOP) for the purpose of fully meeting the educational requirement for Chartered Physicist.
Modules
The modules listed below are examples from the last academic year. There may be some changes before you start your course. For the very latest module information, check with the department directly.
Choose a year to see modules for a level of study:
UCAS code: F350
Years: 2021
Core modules:
- Motion and Heat
-
This module introduces and applies the key concepts of motion and heat: force, equations of motion, phase space, determinism and free will, symmetry and conservation laws, waves and oscillations, coherence and classical frequency-time uncertainty, the laws of thermodynamics, thermal equilibrium, entropy and the arrow of time. You will learn how physics problems relate to these fundamental concepts, and how those concepts are used to construct solutions. You will apply the key concepts to design experiments to test scientific hypotheses. You will develop your data analysis and communication skills and to use different sources of information in your learning. You will work independently and as part of a group, developing a wide variety of study skills that will prepare you for the rest of your degree programme.25 credits
- Physics of Living Systems 2
-
The aim is to introduce biomechanical descriptions of the human body. We look at its structure and its performance as a physical machine. The structural characteristics of human bones and tissue are investigated, together with the mechanical functions of the skeleton and musculature. Simple fluid dynamic characteristics of the body are introduced, including descriptions of blood-flow in the arteries and veins and air-flow in the lungs.10 credits
- Fields and Quanta
-
This module introduces the key concepts of fields and quanta: electric and magnetic fields, the behaviour of electric charges and currents, vectors and densities, potentials, quantum states and their evolution, the probabilistic nature of fundamental physical law, and the breakdown of classical physics. This module will teach you how physics problems relate to these fundamental concepts, and how those concepts are used to construct solutions.25 credits
- Introduction to Electric and Electronic Circuits
-
This module introduces the concepts and analytical tools for predicting the behaviour of combinations of passive circuit elements, resistance, capacitance and inductance driven by ideal voltage and/or current sources which may be ac or dc sources. The ideas involved are important not only from the point of view of modelling real electronic circuits but also because many complicated processes in biology, medicine and mechanical engineering are themselves modelled by electric circuits. The passive ideas are extended to active electronic components; diodes, transistors and operational amplifiers and the circuits in which these devices are used. Transformers, magnetics and dc motors are also covered.20 credits
- Mathematics for Physicists and Astronomers
-
This module provides the necessary level 1 mathematics for students taking physics and/or astronomy degrees. The following topics will be covered: basic algebra (functions, coordinate systems, algebraic manipulation etc), Taylor and binomial series, common functions of one variable, differentiation and integration techniques, basic complex numbers, first and second order differential equations, vector calculus, properties and applications of matrices and elementary probability theory.30 credits
Optional modules:
- Introduction to Astrophysics
-
One of four half-modules forming the Level-1 Astronomy course, PHY104 aims to equip students with a basic understanding of the important physical concepts and techniques involved in astronomy with an emphasis on how fundamental results can be derived from fairly simple observations. The course consists of four sections: (i) Basic Concepts, Fluxes, Temperatures and Magnitudes; (ii) Astronomical Spectroscopy; (iii) Gravitational Astrophysics. Parts (i),(ii) and (iii) each comprise some six lectures. The lectures are supported by problem classes and laboratory work.10 credits
- The Solar System
-
One of four half-modules forming the Level-1 Astronomy course, PHY106 has five main sections. (i) provides a brief survey of the characteristics, composition and origin of the various planets, their satellites, the asteroids and comets and the motions and interactions of these bodies; (ii) discusses the internal structures of the planets, the Moon and other major bodies; (iii) is concerned with their surfaces and the processes that shape them, impacts, erosion, plate tectonics etc.; (iv) discusses planetary atmospheres and ionospheres, their origins and why they differ from one planet to another; (v) is concerned with planetary magnetism and its origins.10 credits
- Our Evolving Universe
-
The course provides a general overview of astronomy suitable for those with no previous experience of the subject. The principal topics covered are (1) how we deduce useful physical parameters from observed quantities, (2) the structure and evolution of stars, (3) the structure of the Milky Way, and the classification, structure and evolution of galaxies in general, (4) an introduction to cosmology and (5) extrasolar plantets and an introduction to astrobiology. All topics are treated in a descriptive manner with minimal mathematics.10 credits
- Frontiers of Physics
-
This pair of 10-credit modules aims to introduce research-inspired material into the level 1 physics curriculum. Each module includes three short courses on research-based topics taught by an academic who is actively involved in the research. The individual courses will be regularly reviewed to ensure that the material is up to date and includes current areas of investigation. The module aims to show that cutting-edge physics research is often underpinned by basic concepts covered in A level and 1st year physics courses.10 credits
- The Physics of Sustainable Energy
-
The module will cover the physics of sustainable energy. It includes discussions framed by the book `Sustainable Energy without the Hot Air' by D MacKay and will cover current energy requirements and what energy could potentially be provided by the various forms of renewable energy. The course will commence with a discussion of the basic physics of energy, power and work and the conversion of energy from one form to another. We examine in detail the history of global energy useage and how we produce and use energy in the UK. We will then explore the impacts that this energy use has on the biosphere and climate and the public perception of such processes. The course will then focus on the energy contenet of objects and processes we take for granted and will then move on to means by which we can produce energy using renewable technologies, such as wind, wave, solar, biofuels etc. We will also examine nuclear (fusion and fission) energy and will discuss their principles and practical implementation. Finally, we will consider solutions to our energy needs, including transportation, energy conservation, carbon capture and geoengineering.10 credits
Core modules:
- Tissue Structure and Function
-
This course introduces students to the tissues of the human body. The principal tissues that make up the body will be described including the cells, proteins and other extracellular components that make up the tissue. The structure of the tissue will be discussed in detail, in particular how it relates to its specific function in a healthy human body. Basic anatomy - how tissues combine to create organs and where each organ can be found in the human body will be studied. Practical classes on human anatomy and histology will be used to demonstrate tissue structure. Finally, how tissue damage causes loss of function will be considered. This course should enable students to understand enough about human tissues so that they can progress to understanding how engineering techniques are used to support, monitor and repair damaged human tissues.10 credits
- Aspects of Medical Imaging and Technology
-
This module provides an introduction to medical technology, with a particular bias towards ionising and non-ionising electromagnetic radiation and its diagnostic role in medicine. The module begins with the generation and behaviour of electromagnetic waves and the breadth of technological application across the electomagnetic spectrum. This extends from magnetic resonance imaging at low energies to high energy photons in X-ray systems. The importance of radiation in diagnosis is acknowledged by discussion of imaging theory and primary imaging modalities, such as planar radiography and CT. The therapeutic role is examined by a brief consideration of radiotherapy.10 credits
- Special Relativity & Subatomic Physics
-
Special relativity is a key foundation of modern physics, particularly in the contexts of particle physics and astrophysics where E = mc2 and relativistic speeds are crucial concepts. In this module, the fundamental principles of special relativity will be explained, emphasising the energy-momentum four-vector and its applications to particle collisions and decays. Applications to nuclear physics include nuclear mass & binding energy, radioactive decay, and nuclear reactions. We will also cover the structure of the nucleus (liquid drop and shell model) and, building on first year quantum physics, the concept of isospin, ending with an introduction to the quark model.10 credits
- Biomedical Instrumentation
-
This unit provides an overview of important topics in biomedical instrumentation. The module is designed around the measurement needs in hospital-based critical care monitoring and in particular how the instrumentation engineer can help the clinician to answer a specific but vital question: is tissue oxygen delivery adequate? This central clinical scenario is used as the basis upon which to describe a number of key topics in transducer design and signal processing. Key topics in electrocardiography and signal processing are illustrated via 2 hands-on lab sessions, whose continual assessment forms 10% of the overall module mark.10 credits
- Classical and Quantum Physics
-
This module provides a foundation for advanced studies in physics by developing integrated skills and knowledge associated with the core topics of physics. These topics include quantum mechanics, classical physics, optics, thermal physics, electromagnetism and the properties of matter. Key mathematical methods are taught alongside the physics topics. Laboratory and computing skills are applied to the topics to reinforce key concepts, develop investigative, experimental and group working skills and develop a wide range of approaches to solving problems. The module also helps students place their physics knowledge and skills in a global context by providing opportunities to apply these attributes to external facing problems. These opportunities support the development of transferable skills such as group working, project management and information literacy.70 credits
- Physics with Labview
-
The module will teach Labview software, and allow students to experiment with instrumentation and basic electronics. These skills will be useful in further years of study, particularly with regard to the Level 3 and 4 projects. These skills are also useful in future employment in both academic and industrial science and engineering where being able to develop laboratory instrumentation to solve experimental problems will be highly desirable.10 credits
Core modules:
- Clinical Engineering and Computational Mechanics
-
The complexity of the geometry and boundary conditions of structures within the body are such that the physical governing equations rarely have closed-form analytical solutions. This module describes some of the numerical techniques that can be used to explore physical systems, with illustrations from biomechanics, biofliuid mechanics, disease treatment and imaging processes. The primary technique that will be used is the finite element method, and the fundamental concepts behind this powerful technique will be described. The lectures will be supported by laboratory sessions in whch the student will apply commercial codes to investigate problems in the medical sphere.10 credits
- Particle Physics
-
This Level 3 Physics half module introduces students to the exciting field of modern particle physics. It provides the mathematical tools of relativistic kinematics, enabling them to study interactions and decays and evaluate scattering form factors. Particles are classified as fermions - the constituents of matter (quarks and leptons) - or as bosons, the propagators of field. The four fundamental interactions are outlined. Three are studied in detail: Feynman diagrams are introduced to describe higher order quantum electrodynamics; weak interactions are discussed from beta decay to high energy electroweak unification; strong interactions, binding quarks into hadrons, are presented with the experimental evidence for colour. The role symmetry plays in the allowed particles and their interactions is emphasised.10 credits
- Atomic and Laser Physics
-
This module covers the physics of atoms and lasers at an intermediate level. The course begins with the solution of the Schrodinger equation for the hydrogen atom and the atomic wave functions that emerge from it. It then covers atomic selection rules, spectral fine structure and the effects of external fields. The spectra of selected multi-electron atoms are described. The basic operation of the laser is then covered by introducing the concepts of stimulated emission and population inversion. The course concludes with a description of common lasers and their applications.10 credits
- Solid State Physics
-
This is the final core solid state physics module. It covers the classification of solids into the three types - conductors, semiconductors and insulators, the free electron model, the origin of electronic band structure, the fundamental properties of conductors and semiconductors, carrier statistics, experimental techniques used to study carriers in a solid, the classification and physics of the principal types of magnetism.10 credits
- Modelling and Simulation of Natural Systems
-
This unit will provide a practical introduction to techniques used for modelling and simulating dynamic natural systems. Many natural systems can be modelled appropriately using differential equations, or individual based methods. In this unit, students will explore and understand both modelling approaches. They will gain knowledge of the assumptions underlying these models, their limitations, and how they are derived. Students will learn how to use MATLAB to simulate and explore the dynamics of computational models, using a variety of examples drawn from both natural systems. Students should be aware that there are limited places available on this course.10 credits
- Nuclear Physics
-
This half-module Level 3 Physics course aims to cover the general properties of nuclei, to examine the characteristics of the nuclear force, to introduce the principal models of the nucleus, to discuss radioactivity and interactions with matter, to study nuclear reactions, in particular fission, fusion and the bomb, and to develop problem solving skills in all these areas. The motivation is that nuclear processes play a fundamental role in the physical world, in the origin of the universe, in the creation of the chemical elements, as the energy source of the stars and in the basic constituents of matter - plus the best of all motives - curiosity.10 credits
- Medical Physics Research Project
-
The aim of the medical physics project is to provide an opportunity for students to develop and apply their skills to a research problem. A range of projects are offered across the spectrum of physics and engineering applications, and many will address current medical or clinical needs. Students are encouraged to work in groups of two or three to develop team skills. In addition to creation of written reports, students will conclude the project with a viva involving formal presentation to graduate staff in the city hospitals.20 credits
- Problem Solving and Advanced Skills in Physics
-
This half-module seeks to provide insight and support to the Level 3 Physics programme as a whole. Lectures and tutorials will build upon previous skills developed involving data analysis and errors, information retrieval and scientific writing. Problem classes are directed to impart a broad, coherent and critical grasp of the fundamentals of Physics. Students are encouraged to attempt unfamiliar problems, extract the essentials, and so obtain quick, rough but sound solutions. The module involves group work and is assessed by means of class tests and written examinations. The latter are designed to test basic concepts of Physics and the ability to apply them to unrehearsed situations.10 credits
Optional modules - one from:
- Physics Level 3 Project 1
-
The aim of this half module is to provide an opportunity for students to exercise and develop their skills and ability to undertake independent, albeit closely supervised, research in physics. A very wide selection of projects is provided, often arising from current research in the Department. Many are practical, others are essentially theoretical or interpretative or require the development of computer programmes designed to simulate a variety of physical phenomena. Most projects are collaborative and encourage students to work in pairs. Assessment is based on individual written reports and oral examinations. These provide exercise in presentational skills.10 credits
- Physics Level 3 Project 2
-
The aim of this half module is to provide an opportunity for students to exercise and develop their skills and ability to undertake independent, albeit closely supervised, research in physics. A very wide selection of projects is provided, often arising from current research in the Department. Many are practical, others are essentially theoretical or interpretative or require the development of computer programmes designed to simulate a variety of physical phenomena. Most projects are collaborative and encourage students to work in pairs. Assessment is based on individual written reports and oral examinations. These provide exercise in presentational skills.10 credits
Optional modules - two from:
- Programming in Python
-
Teaching computer programming is a core aspect to our degree courses and is required by our accreditation body, the Institute of Physics. Python is a widely-available programming language that can be used to design powerful computer programmes suitable for scientific applications. In addition, Python is flexible, robust and is relatively easy to learn compared to other contemporary programming language. Python is also used widely in the computing industry and in research. The aim of this module is to teach the key elements of Python programming to enable students to design programs to perform tasks ranging from computational and numerical physics to data analysis and visualisation.10 credits
- Dark Matter and the Universe
-
Dark matter, though still unidentified and not yet directly detected, is established as a major constituent of the universe according to modern cosmology. In this course, we will review the astrophysical and cosmological evidence for the existence of dark matter, critically assess the various candidates that have been put forward, and discuss direct detection methods for the two most popular candidates¿WIMPs and axions. The course has a multidisciplinary flavour combining work in astronomy, particle physics, solid state physics, detector technology and philosophy, encouraging development of skills in all these.10 credits
- The Physics of Soft Condensed Matter
-
Soft condensed matter is a generic name for a class of materials that play a crucial role in technology as well as providing fascinating and timely scientific problems. These complex materials are typified by polymers, gels and colloidal dispersions, whose properties often seem intermediate between ordinary liquids and solids. Familiar examples from everyday life include plastics, soaps and detergents, foodstuffs, and indeed the material from which living organisms are constructed. Only relatively recently has it been realised that despite the complexity of these materials elegant and simple physical principles often underlie their behaviour; this course provides an introduction to these principles.10 credits
- Nuclear Astrophysics
-
The aims of this Level 3 Astronomy module are:1) To examine the evidence for the present distribution of the chemical elements in the Universe.2) To study the various nuclear processes that have led to the evolution of these elemental abundances.3) To discuss the possible astrophysical sites where these elements are produced.10 credits
- Statistical Physics
-
Statistical Physics is the derivation of the thermal properties of matter using the under-lying microscopic Hamiltonians. The aims of this course are to introduce the techniques of Statistical Mechanics, and to use them to describe a wide variety of phenomena from physics, chemistry and astronomy.10 credits
- Physics in an Enterprise Culture
-
This is a seminar and workshop based course with a high level of student centred learning. The unit will introduce students to the methods and skills associated with the research/business management, planning, costing, intellectual property issues, patenting and marketing. It will broaden students understanding of the mechanics of project planning and research commercialisation. The course is divided into two main themes: Theme 1: Research proposal. Here, students have to make a reasoned case for a new and original piece of research. Students will form part of a series of small 'panel-meetings' to assess the strengths and weaknesses of work submitted by other students on the course. Theme 2: Business proposal. Here, students are expected to propose a new technological design, product, invention or service, and pitch the idea to a group of 'experts'.10 credits
- Further Quantum Mechanics
-
This module builds on the quantum mechanics learned in the perquisites PHY250 and PHY251. The Heisenberg matrix formulation of the theory is developed from the Schrodinger wave picture. Approximately methods (perturbation theory and variational method) are derived and applied. Methods for solving time dependent problems are developed. Problems involving magnetic fields and spin are treated. Many particle wavefunctions for fermions and bosons are introduced.10 credits
- Semiconductor Physics and Technology
-
This module builds on the core solid state physics modules to provide an introduction to semiconductor electronic and opto-electronic devices and modern developments in crystal growth to produce low dimensional semiconductor structures (quantum wells, wires and dots). Band structure engineering, the main physical properties and a number of applications of low dimensional semiconductor structures are covered.10 credits
The content of our courses is reviewed annually to make sure it's up-to-date and relevant. Individual modules are occasionally updated or withdrawn. This is in response to discoveries through our world-leading research; funding changes; professional accreditation requirements; student or employer feedback; outcomes of reviews; and variations in staff or student numbers. In the event of any change we'll consult and inform students in good time and take reasonable steps to minimise disruption. We are no longer offering unrestricted module choice. If your course included unrestricted modules, your department will provide a list of modules from their own and other subject areas that you can choose from.
Learning and assessment
Learning
You'll learn through lectures, small group tutorials, programming classes, practical sessions in the lab and research projects.
Entry requirements
With Access Sheffield, you could qualify for additional consideration or an alternative offer - find out if you're eligible
The A Level entry requirements for this course are:
AAB
including Maths and Physics
The A Level entry requirements for this course are:
ABB
including Maths and Physics
A Levels + additional qualifications | ABB, including Maths and Physics + B in a relevant EPQ ABB, including Maths and Physics + B in a relevant EPQ
International Baccalaureate | 34, 6,5 in Higher Level Maths and Physics 33 with 5 in Higher Level Maths and Physics
BTEC | Not accepted Not accepted
Scottish Highers + 2 Advanced Highers | AAABB + AB in Maths and Physics AABBB + AB in Maths and Physics
Welsh Baccalaureate + 2 A Levels | B + AA in Maths and Physics B + AB in Maths and Physics
Access to HE Diploma | 60 credits overall in Science with Distinctions in 36 Level 3 credits (all in Mathematics and Physics), and Merits in 9 level 3 credits 60 credits overall in Science with Distinctions in 30 Level 3 credits (all in Mathematics and Physics), and Merits in 15 level 3 credits
Mature students - explore other routes for mature students
You must demonstrate that your English is good enough for you to successfully complete your course. For this course we require: GCSE English Language at grade 4/C; IELTS grade of 6.5 with a minimum of 6.0 in each component; or an alternative acceptable English language qualification
Equivalent English language qualifications
-
Students must have passed the practical element of any science A Level taken.
We also accept a range of other UK qualifications and other EU/international qualifications.
If you have any questions about entry requirements, please contact the department.
Department of Physics and Astronomy
Is time travel possible?
Are there habitable planets in other star systems?
Can we make a quantum computer?
Our courses explore the laws of the universe from subatomic particles to stars and galaxies. You'll join a community of researchers and students looking for answers to some of the biggest questions in the universe.
All our undergraduates get hands-on experience working alongside staff on real research projects. We host numerous general and specialist seminars by physicists from around the world.
The Department of Physics and Astronomy is based in the Hicks Building, which is next door to the Students' Union, and just down the road from the library facilities at the Information Commons and the Diamond. The School of Mathematics and Statistics is also based here.
Facilities
Our students are trained in newly refurbished teaching laboratories and can access a range of specialist technologies, from the telescopes on our roof to our state-of-the-art Quantum Information Laboratory.
In their final year, MPhys students are based in a specialist research laboratory where scientists are studying technologies such as 2D materials, photovoltaic devices and advanced microscopy tools.Department of Physics and Astronomy
Why choose Sheffield?
The University of Sheffield
A Top 100 university 2021
QS World University Rankings
Top 10% of all UK universities
Research Excellence Framework 2014
No 1 Students' Union in the UK
Whatuni Student Choice Awards 2019, 2018, 2017
Department of Physics and Astronomy
Research Excellence Framework 2014
National Student Survey 2019
Graduate careers
Department of Physics and Astronomy
They are making an impact in many areas of society. Some are following careers in aerospace, telecommunications, teaching, defence and energy research. Others are achieving success in computing, accountancy and consultancy.
Organisations employing our graduates include Ernst & Young, BAE Systems, Rolls-Royce, Toshiba, Museum of Science and Industry, Thales and the Home Office. Many of our graduates continue to PhD research and become research scientists in academia or industry.
Further information
MPhys or BSc?
Our BSc courses focus on core knowledge and skills. The MPhys courses have an additional element of research work experience and more opportunity to study topics in greater depth. If you plan to follow a career as a research scientist, an MPhys degree would be most appropriate.
A built-in insurance offer
If you firmly accept as your first choice an offer for our MPhys courses, but your A Level grades are AAB, you're guaranteed a place on the BSc.
Fees and funding
Fees
Additional costs
The annual fee for your course includes a number of items in addition to your tuition. If an item or activity is classed as a compulsory element for your course, it will normally be included in your tuition fee. There are also other costs which you may need to consider.
Funding your study
Depending on your circumstances, you may qualify for a bursary, scholarship or loan to help fund your study and enhance your learning experience.
Use our Student Funding Calculator to work out what you’re eligible for.
Additional funding
Visit us
University open days
There are four open days every year, usually in June, July, September and October. You can talk to staff and students, tour the campus and see inside the accommodation.
Taster days
At various times in the year we run online taster sessions to help Year 12 students experience what it is like to study at the University of Sheffield.
Applicant days
If you've received an offer to study with us, we'll invite you to one of our applicant days, which take place between November and April. These applicant days have a strong department focus and give you the chance to really explore student life here, even if you've visited us before.
Campus tours
Campus tours run regularly throughout the year, at 1pm every Monday, Wednesday and Friday.
Apply for this course
Make sure you've done everything you need to do before you apply.
How to apply When you're ready to apply, see the UCAS website:
www.ucas.com
Contact us
Telephone: +44 114 222 4362
Email: [email protected]
The awarding body for this course is the University of Sheffield. | https://www.sheffield.ac.uk/undergraduate/courses/2021/physics-medical-physics-bsc |
For the first time, the government of Nepal in May issued the whitepaper on power development with the objective of increasing electricity supply to gear up overall development of hydropower through integrated hydro policy. The government target includes generation of 3000 MW of power in three years, 5000 MW in five years and 15,000 MW in ten years. In ten years, the government has targeted to produce 10,000 MW for domestic consumption and 5000 MW for export. This commitment is in line with the spirit of Sustainable Development Goals (SDG) of United Nations on affordable and clean energy. SDGs are a universal call to action to end poverty and protect the planet by ensuring that all people enjoy peace and prosperity. Out of the 17 goals to be fulfilled by 2030, the seventh goal, also known as SDG-7, is related to ‘affordable and clean energy’.
The UN has emphasized in ensuring universal access to affordable electricity by 2030 which calls for investing in clean energy sources like hydropower and solar. The SDG-7 aims to close the energy access gap and “ensure access to affordable, reliable, sustainable and modern energy for all” through national action and international cooperation.
The UN has clearly pointed out that country’s ownership is fundamental along with policy innovation for meeting the goals. Thus, the unveiling of this whitepaper along with the commitment to bring an integrated hydro policy has definitely put the investment in hydropower project into a spotlight. This commitment is mainly zeroed in on attracting investors from Nepal and abroad. Projects which were in limbo or agonizingly slow are expected to take off.
While access to electricity in the urban areas has reached around 97 percent, the supply of electricity is inadequate. We must note that the supply has been more reliable since last year after Nepal Electricity Authority successfully addressed irregularities in power distribution. Yet, around 20 percent of country’s population still has no access to electrification. Only five percent of the rural population has access to electricity from the national grid. Even in the areas where electricity is available, large number of people continues to rely on other sources like firewood and LPG for cooking purposes. Large amount of fossil fuels are also consumed in industrial sectors and vehicles.
Slow progress
Electricity in Nepal is mainly produced through hydropower and other sources such as solar and wind energy in particular contribute negligible share. The journey of hydropower development in Nepal dates back to 1911, when the construction of Pharping Hydroelectricity station started. However, even after more than a century, hydroelectricity capacity is confined to just a little above 1000 MW. Owing to the slow pace of development, most of the transmission line projects have not been completed on time. Without the proper planning and development of transmission line, it is almost impossible to achieve the target.
As we are moving forward toward meeting 90 percent target on average, it is equally important to make sure that the electricity will be used for purposes like cooking and commuting among others.
After several decades of political turmoil, Nepal finally has a political stability following the recently held general elections. The constitution of Nepal has also adopted a policy of harnessing water resources with domestic investment with equal focus on promoting foreign investment. The government’s commitment in the form of whitepaper is definitely an applauding task. But there is more to this problem than the government’s commitment. The hydropower sector had received a special attention during the First Five Year Plan (1956-60) as well. In spite of this, Nepalis continue to struggle for proper supply and access to electricity. Low generation of electricity in winter because of the decreased water level is a challenge to overcome.
Challenge to overcome
The timely completion of ongoing hydropower project is another challenge. Because of the hindrance of the locals or by negligence of contractor, projects are not being completed within the stipulated time. We are yet to build enough transmission lines, which are required to transmit power to substation. Hydropower experts are worried about imbalance between generation and transmission expansion plans and the fact that the existing transmission lines are being overloaded.
Investors have often blamed the lengthy procedure to acquire license and approval during the development and construction of the projects as the reasons for this. The current policy on hydropower is often criticized for having many gaps because of which the private sector and international investors are unwilling to make investment in Nepal. Besides, inadequate supply of infrastructure including shortage of construction materials has also caused delay in many projects. So what should be done?
Way forward
Despite these challenges, conducive environment has been created for developers in the recent times. The government’s plan is ambitious but can be materialized with a strong coordination among the developers and the government.
We must begin by ensuring proper coordination between concerned ministries, modernizing and expanding distribution system and updating existing policies on a regular basis.
Allocating Rs 83 billion for Ministry of Energy can be fruitful in meeting the goals as stated in the whitepaper in terms of developing and expanding hydropower projects. One door policy can certainly attract potential foreign investors who have often complained about complex procedures within bureaucracy to obtain the license and to execute the project plan.
The government also needs to work on fast-track measures to construct transmission lines while enhancing the capacity of the substations. Then we will be able to set up electricity transmission and realize phase-wise development of domestic and cross-border transmission lines as stated in the white paper.
The whitepaper will undoubtedly have a positive impact on power generation and supply and attract the attention of international investors. But issuing whitepaper alone won’t be enough. We need to do adequate homework to reduce the cost of production of hydropower so that the goal of “affordable energy” can be achieved.
Meanwhile, it is imperative to launch extensive consultations with stakeholders and immediately enact integrated policy for hydropower development. | https://myrepublica.nagariknetwork.com/news/path-to-power/ |
My project blends Burkean theory with Indigenous rhetoric to argue that the counter- story of Awake proposes an ecology of transcendence to make sense of human-nature relationships. I wanted to analyze Awake A Dream From Standing Rock. The documentary is explicitly about Indigenous peoples. This documentary tells the story of the peaceful protests and resistance led by Native people at the Standing Rock Sioux Reservation or Lakota Tribe in North Dakota. The activists were protecting the water otherwise known as water protectors/warriors from the construction of the Dakota Access Pipeline (DAPL). The assembly of DAPL is intended to carry perforated oil through independent (indigenous) land and go under the Missouri River. However, the problem is, the Missouri River is used as a water source for the Lakota Tribe (Standing Rock) and 18 million other people living in the United States. The documentary includes interviews with protestors and follows the controversy surrounding the pipeline. Moreover, this project operates under environmental rhetoric because of the symbols and frames used to speak about the environment. I link Burkean terminology to Indigenous concepts to gain a better understanding of how we come to know and care about the environment through our symbolic choices, terministic screens, and representations of human-nature relationships. I argue that the documentary invites viewers to feel eco-guilt, to environmental loss and pollution, but offers an ecology of transcendence as a route to redemption. In my analysis I focused on two different metaphors that were pervasive and important rhetorical features: the metaphors of war and the dream. In examining these metaphors, I pay attention to how the film selects and deflects aspects of Western and Indigenous ideologies to promote new understandings for the audience.
Keywords
Burkean theory; Indigenous rhetoric; Ecology of transcendence
Disciplines
Communication | Environmental Health and Protection | Environmental Law
File Format
File Size
615 KB
Degree Grantor
University of Nevada, Las Vegas
Language
English
Repository Citation
Kahn, Alyssa, "Environmental Rhetoric and an Ecology of Transcendence: A Rhetorical Criticism of Awake, A Dream From Standing Rock" (2021). UNLV Theses, Dissertations, Professional Papers, and Capstones. 4250. | https://digitalscholarship.unlv.edu/thesesdissertations/4250/ |
As many students, parents and guardians are aware, over these last few weeks, many threats have been made against a number of schools within the Waterloo Region District School Board and across the province. These threats have been issued by persons leaving behind inappropriate messages in a variety of school locations and on social media. These threats have been used to inspire a feeling of unease and fear. The unfortunate decision by individuals to deliberately harass and intimidate others is an abuse of social media and an erosion of personal safety and trust.
We want to reassure you that the security of the students and staff is the top priority of all schools, each and every day. Waterloo Region District School Board and Waterloo Regional Police Service are working together to investigate these threats and keep our schools safe, caring and inclusive spaces to learn and work. All schools in the Waterloo Region District School Board are aware of these threats and are taking them into account as they go through their daily routines, including monitoring access to their sites and following security and emergency response protocols to safeguard our school communities.
At this time, we have no reason to believe that any of these threats are credible. However, we will continue to work together and monitor individual situations as they arise. No matter the intention, we take any intimidation or threat of violence seriously and the authors of these threats need to understand that they will be held accountable.
Our students have the right to learn in a safe environment without fear. Students are encouraged to speak with a trusted adult including a teacher, Educational Assistants, Child and Youth Worker, school administration or a school Guidance Counsellor regarding their concerns.
We would ask that parents, guardians and caregivers have a conversation with their child(ren) to discuss the impact of these actions on their school community and the anxiety this creates for others. Students should be reminded that inappropriate behaviour will not be taken lightly and a school disciplinary and criminal response will be taken.
If parents, guardians or students become aware of a threat, they should contact the police and inform their school principal immediately. You can also report information related to these threats to Crime Stoppers anonymously at 1-800-222-8477.
Please be assured that every precaution is being taken to ensure the safety of students and staff. We thank you for your continued diligence and support. | https://jam.wrdsb.ca/2018/04/09/important-message-on-the-recent-threats-in-our-school-communities/ |
A major review of health and safety regulation by Professor Ragnar Löfstedt was published on Monday 28 November 2011 on the same day as the Government’s response.
The full report runs to over 129 pages, and so the most significant highlights have been summarised below which are likely to be of greatest interest to our clients:
Changes to Regulations: Löfstedt has suggested a small number of unnecessary regulations be scrapped, and changes made to several others, including such areas as clarifying how often PAT testing should be undertaken, and removing the need for HSE approval of first aid training organisations. Lighthouse will of course keep you fully up to date on any such legislation updates.
Exemption for the Self-employed: from health and safety law if their work activities pose no threat to others. This represents a major advance in cutting red tape, (although it is still unclear how those exempted will be able to identify themselves as such.)
The Health and Safety Executive to gain powers: to direct local authority health and safety inspection and enforcement, and to become the “Primary Authority” for multi-site national organisations. This will help ensure that inspections are targeted towards the riskiest activities and also that a fair and consistent approach to enforcement is maintained across the UK. However, it remains to be seen whether there will be a fundamental shift in power from local authorities to the HSE.
Reviewing the Approved Codes of Practice: which Löfstedt suggests are too complex and ambiguous. The first phase of this is to be completed by the HSE in June 2012.
Sensible civil procedure and liability rules: Professor Löfstedt found that taken as a whole the health and safety regulations were appropriate. However, two of his recommendations are being taken up by the Government as a priority. Firstly, the Review suggests that the standard disclosure lists found in the Pre-Action Protocols are being interpreted in an overly restrictive fashion by firms and advisors, encouraging a bureaucratic approach to health and safety documentation which is unwarranted. Löfstedt wants the original intention – to encourage the sharing of information – to be clarified and restated to ensure that firms are not encouraged to believe that the absence of documentation is in itself a ground for liability. Secondly, Löfstedt recommends that each regulation should be reviewed to ensure that any strict liability rules are there because they are required as a minimum by European law, and replacing them by the more proportionate “reasonable practicability” test when European law does not dictate no-fault liability.
On the whole businesses client will no doubt be pleased with the outcome. And there should be more good news to come in the New Year with the publication of the results of the Red Tape Challenge, in which the internet was used as a tool for the public to brainstorm ways to cut unnecessary regulation. | https://www.lighthouseriskservices.com/2011/12/major-health-safety-review-cutting-red-tape/ |
President Mnangagwa says farmers should embrace new farming technologies to improve productivity and reduce the country's dependence on imports.
He said this yesterday after touring Radzim Agri-Power company at Bluffhill Industrial Park in Harare.
Formed in 1996, the firm supplies farming implements.
President Mnangagwa, a farmer of repute, said he strives to embrace technology in his operations.
"As a farmer I want to embrace technology for the betterment of production," he said.
"For example, as a farmer I continuously interrogate the latest technology in agriculture to mechanise and modernise our agriculture. Our farmers at every level, the small (scale) farmer, the medium (scale) farmer and the commercial farmer, the big farmer; we should not be content with how we entered agriculture, we must continuously seek to improve productivity on our land."
The President said Zimbabwe should not be importing food given its rich soils.
"We can never improve the size of our land but what we can improve is the production on the piece of land that we have and that can only be done by embracing science and technology.
"This is the way to go. Zimbabwe is primarily an agricultural economy. It is from the soil where we get our living, our food comes from the soil. We should be happy and grateful that Zimbabwe has abundant agricultural land and it's a shame that we should be importing food when we are endowed with such rich and fertile land in this country," he said.
The President called on Government and the private sector to work together to improve productivity on farms in light of the menacing climate change.
"We cannot control climate change but there are methods of mitigating climate change and that is by building dams across the country so that we increase productivity even in times of droughts.
"It is necessary that both as Government and the private sector we put our act together.
"There's no 'them and us', it should always be 'us together', to develop, to improve the lives of our people," he said.
President Mnangagwa said agricultural production was a prerequisite for the growth of industry in the country.
AllAfrica publishes around 700 reports a day from more than 140 news organizations and over 500 other institutions and individuals, representing a diversity of positions on every topic. We publish news and views ranging from vigorous opponents of governments to government publications and spokespersons. Publishers named above each report are responsible for their own content, which AllAfrica does not have the legal right to edit or correct.
AllAfrica is a voice of, by and about Africa - aggregating, producing and distributing 700 news and information items daily from over 140 African news organizations and our own reporters to an African and global public. We operate from Cape Town, Dakar, Abuja, Monrovia, Nairobi and Washington DC. | |
When you’re a writer, you may well occasionally feel guilty. In our driven society, it’s not unusual to feel like this if you’re doing anything that isn’t “work” but is vaguely important to you. So how do you cope with it? Here are five common writing “guilts” and how to manage them.
1) Spending too much time on writing
Whatever stage you’re at, writing takes time. Research is pretty much endless, then there’s the time it takes to build characters, outline your story, edit, edit and edit – and we all know you can’t invent extra hours in the day. Taking time to write can often make you feel like you’re neglecting other things in life – family, friends, housework, “life” admin, other hobbies. Really it’s something you (and those around you) have to accept. Creating a writing schedule can be a way of helping you balance everything.Or perhaps it might be useful to hack your brain into writing mode.
2) Spending too little time on writing
It’s a running joke in writing circles that a large part of being a writer involves talking about writing way more than, you know, doing it. Sometimes (often times) life gets in the way, especially if you’re not writing full-time. And all writers have creative ups and downs. Whether you need to write every day is up for debate, but writing just for the sake of it could have a negative impact on your relationship with it. Again a schedule may help, but there are times you just have to make peace with the fact you can’t write and enjoy it when you can.
3) Not being published/not selling enough
For some, simply writing is enough. For others finishing a book is their big accomplishment. And for others still, they want to get published. All these types of people are writers. Whether thousands of people read your work or you just read it to your cat (kudos if you do because they’re harsh critics), it doesn’t matter. It’s amazing to have your work published, but you’re not a failure if you haven’t. Similarly, should you sell five copies or five million, you’re no less or more of a writer. Comparing yourself to others is always a recipe for disappointment. Focus on yourself and your work.
4) Putting your writing above your job
There’s nothing wrong with being into your work or the company you work for, but it’s not going to be the case for everyone. Some people work to because money helps to, you know, survive, but overall, they put their writing above their job. And that’s okay.
5) Enjoying writing during tough times
The world has been a bit more chaotic than normal recently. It can be hard to write when your mind is so caught up with what’s going on (and that’s fine – see point two). But equally what we love can be our salvation in dark times. It can be an outlet, an escape. We may find ourselves writing more and finding joy in it – and then feeling guilty when we do. But no matter what, the world need your words. You may write about what’s happening and use your voice to highlight injustice. Or you may help people to escape. Whatever you do, trust me, it’s worth it. | https://wordlander.com/2021/07/18/how-to-manage-writers-guilt/ |
Marsha P. Johnson
This article is a part of the Black Monuments Project, which imagines a world that celebrates Black heroes in 54 U.S. states and territories.
The recent controversy surrounding Marsha P. Johnson’s story — specifically the Netflix documentary that attempts to tell it, and the allegations leveled by transgender filmmaker Reina Gossett that it was based on her uncredited research — is an unfortunate development that nevertheless seems appropriate to such a tumultuous and passionate a life.
Johnson, born in 1945 in Elizabeth, New Jersey, did little halfway. She was a proud, black transgender rights activist at a time when most of America lacked both the vocabulary and empathy to presume such rights were worth their investment (sadly, this hasn’t changed much). She was among the first to confront police during the Stonewall rebellion of 1969, which is remembered as perhaps the defining catalyst of the gay liberation movement.
Johnson poured into her work and community, which earned her the love and admiration of much of the Greenwich Village neighborhood she called home. People referred to her as “mayor of Christopher Street.” To much of the mainstream today, she remains a little-known hero of the LGBTQ rights struggle, a black woman whose deeply intersectional outlook on organizing seems that much further ahead of its time considering how revolutionary today’s black activism movements’ investment in black LGBTQ rights seem.
Black Lives Matter, with its largely queer and female leadership apparatus, owes a major debt to Johnson and her politics. The gay liberation movement, both past and present, owes arguably an even bigger one. At a time when transgender women of color are being murdered at alarming rates, and the very existence and validity of trans identity remains up for debate to a large segment of the U.S. population, it can feel like we today are still scurrying to catch up to where Johnson had been all along.
It’s rare that a person correctly presages future activist zeitgeists and priorities as presciently as Johnson did. So, for this and a host of other reasons too numerous to list here, Mic’s Black Monuments Project honors her. | https://www.mic.com/articles/186667 |
Tune into the healing music of Bengaluru-based 'Blushing Satellite', an Indian band whose music is based on the transformative healing of sound. Sound vibrations contain the geometric code structuring reality and the fabric of our being. Everything manifest from pure consciousness crystallises into existence through vibration. It is not surprising sound vibrations affect us to the core of our being.
This band maintains music is a form of therapy through cymatics (see my previous posts on this topic). Vocalist Ramanan Chandramouli says, "We create music and perform to tune the listener's attention inward, to slow down the thought process and bring the agitated mind to calm and restful state. This is where all healing happens." As John Stuart Reid states, "It is worth remembering that Pythagorus of Somas...also believed that music could be used as medicine and contributes greatly to health, if used in an appropriate manner...by using music in the place of medicine."
Music therapy is already used widely as a clinical discipline but John Stuart Reid is conducting research to validate the hypothesis that individual frequencies within sound can support healing in the body. He is currently investigating whether music can lengthen the life of human blood cells.
Insights from my art
12/28/2016
Every image I create is imbued with symbolism - sacred geometry of shapes and patterns, light and colours, flowers, animals, Gods & Goddesses… All are visual expressions of the science manifesting reality. Images for connecting into with your Mind to enhance your experience of reality. To see more in my abstract and conceptual art look beyond the surface images and think of them as a 'thought forms' to blend into and work with.
I often post one of my pieces with a short interpretation and insight for that day. As examples here are a couple that I posted on my facebook page in December 2016. Enjoy!
Infinity and Emotions
Emotions colour our lives. Every time you are triggered by events in your life to feel blue (sadness), see red (anger, hate), feel green (with envy).... they happen to reflect back and show you the inner work you need to do along the Spiral path towards the inner, central Self where unconditional Joy is experienced.
Look at the subtle images within the paintings, which were not created intentionally. For example I see a swan at the centre. Swans symbolise grace, the awakening power of the inner Self, balance, inner beauty and the 'rising glory' of a new day.
Unfurling Potential
As 2017 approaches here is a thought for the new year. Allow your potential to unfurl to reveal you in all your splendour. Awaken your senses, exeperience the colours of life and learn from them. | http://www.karenlfrench.com/blog/category/emotions |
As the five accessibility standards are introduced, there will be new requirements and deadlines for affected organizations to remove barriers.
Accessible Employment
The Accessibility Standard for Employment is the second standard under The Accessibility for Manitobans Act (AMA).
- To ensure the safety of employees with disabilities, all employers in the public, private and non-profit sectors must comply with the workplace emergency requirements by May 1, 2020.
For all other accessible employment requirements:
- Manitoba government will demonstrate leadership by complying within one year: May 1, 2020.
- Public sector organizations have two years to comply: May 1, 2021.
- Private sector, non-profit organizations and small municipalities have three years to comply: May 1, 2022.
Accessible Customer Service
The Accessibility Standard for Customer Service is the first accessibility standard enacted under the AMA. Learn more about the Accessibility Standard in Customer Service.
Compliance deadlines are:
- The Manitoba Government had one year to comply: November 1, 2016
- The public sector had two years to comply: November 1, 2017
-
Private, small municipalities and non-profit organizations had to comply within three years: November 1, 2018
Accessibility Plans are an additional requirement set out by the AMA. The aim is for public sector organizations* to provide leadership in identifying and addressing all types of accessibility barriers. These plans must be updated every two years. Learn more about Accessibility Plans.
Compliance deadlines are:
- December 31st, 2016 for larger public sector organizations**
- December 31st, 2017 for smaller public sector organizations***
* The AMA applies the definition of public sector organizations used by Manitoba’s Financial Administration Act:"any board, commission, association, agency or similar body, whether incorporated or unincorporated, all the members of which, or all the members of the board of management, board of directors or governing board of which, are appointed by an Act of the Legislature or by the Lieutenant Governor in Council".
** Larger public sector organizations include the Manitoba government, universities and colleges, school divisions, Crown corporations, regional health authorities and Manitoba’s 10 largest municipalities: Brandon, Dauphin, Flin Flon, Morden, Portage la Prairie, Selkirk, Steinbach, Thompson, Winkler and Winnipeg.
***Smaller public sector organizations are all other municipalities and agencies, boards and commissions. | http://www.accessibilitymb.ca/compliance-and-deadlines.html |
Diagnosing & Treating Spinal Schwannomas
A doctor will begin with a thorough history of the patient and physical exam. If a doctor believes a spinal tumor may be present, the following tests may be ordered:
X-Rays
An x-ray can show which area of the spine has been affected.
Computerized Tomography
Computerized tomography (CT) is a noninvasive procedure that uses x-rays to produce a three-dimensional image of the spine. A CT shows more detail than an X-ray, and can identify the bones in greater detail, and show the nerves, spinal cord, and any possible damage to them.
Magnetic Resonance Imaging (MRI)
An MRI uses magnetic fields and radio-frequency waves to create an image of the spine and can reveal fine details of the spine, including tumors, nerves, and other details. An MRI scan can show details in the spine that can’t normally be seen on an x-ray. Sometimes a contrast agent is injected into a vein in the hand or arm during the test, which highlights certain tissues and structures to make details even clearer.
Treatment Options
Many schwannomas can be removed with minimally invasive surgically. However, this is dependent upon the age, overall physical health of the patient, and the size and location of the tumor. In the vast majority of spinal schwannomas, the tumors can be entirely removed without causing neurological problems.
Some treatment options include:
Surgery
Removal of the schwannoma via surgery may be the best option to not only remove the growth but also relieve pressure on the spine and nerves that it is causing. Surgery often occurs in conjunction with radiation therapy. (See Surgery for Spinal Schwannomas.)
Stereotactic Radiosurgery (SRS):
Neurological surgeons can use stereotactic radiosurgery (highly targeted radiation beams from multiple angles) to treat schwannomas in cases where surgery or complete surgical resection is not an option.
Monitoring
Sometimes the schwannoma has no symptoms, and is discovered when being seen for another condition. If the tumor has been deemed non-cancerous, is not growing, or posing any threat to surrounding nerves or tissue, or if the patient is older and surgery is a risk, then monitoring may be the treatment of choice.
We’ve Got Your Back
For more information about our treatment options, contact our office today. | https://comprehensivespine.weillcornell.org/conditions-we-treat/spinal-schwannomas/diagnosing-and-treating-spinal-schwannomas/ |
Adherence is important for an exercise program's efficacy. This study aims at investigating whether the COVID-19 lockdown had different consequences on the adherence to an exercise program specifically designed for women with postmenopausal osteoporosis when administered as individual home training (IHT) or gym group training (GGT). At the start of the lockdown, which imposed the temporary closure of any gym activities, GGT participants were invited to continue to exercise at home. IHT participants continued to exercise at home as usual. Adherence was recorded via logs and measured as the percentage of exercise sessions actually performed out of the total number of scheduled sessions in three 1-month periods: one before (PRE) and two after (M1 and M2) the beginning of lockdown. Before lockdown, IHT (66.8% ± 26.6) and GGT (76.3% ± 26.6) adherence were similar. During lockdown, IHT participation increased (M1: 81.5% ± 31.0; M2: 88.0% ± 28.3), while that of GGT showed no statistical differences (M1: 79.4% ± 34.2; M2: 80.6% ± 36.4). Exercise protocols based on supervised gym practice must consider the possibility of disruptive events, which could cause a sudden interruption of gym activity and include educational initiatives to instruct participants to exercise effectively and safely without a trainer's direct supervision. | https://pure.ulster.ac.uk/en/publications/effects-of-covid-19-lockdown-on-adherence-to-individual-2-home-or |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.