content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
Working families in North Carolina symbolize our state’s greatest assets—the lifeblood of local economies, the engines of productivity, the attractive force that brings business to communities and delivers the promise of stability for families and communities. Our social contract provides that as long as you are willing to work, one can expect to achieve a basic standard of living. Yet for far too many hard working North Carolina families, this promise has not been fulfilled. The results of that failure extend far beyond dysfunction in our economy to frustration with our democracy.
One in five families do not earn enough to afford the basic needs of everyday life, let alone plan for their future or ensure their children can do better. In North Carolina, a family of two adults and two children must earn $53,968 a year in order to afford housing, food, child care, health care, transportation, taxes, and other necessities, according to the Budget & Tax Center’s 2016 Living Income Standard (LIS)—more than double the federal poverty threshold for a family of four.
When workers aren’t paid what it takes to meet their basic needs, they make decisions that undercut the strength of the economy, well-being of families and vitality of communities. When work doesn’t pay, workers take on multiple jobs, cut back on savings, fail to build their assets to weather economic downturns, turn to public programs to make up the difference in their household budget and reduce their investments in their own future productivity.
Families are pursuing various strategies to cope with the low-wage labor market.
- A growing number of workers have more than one full-time job.
- Some workers are choosing to live farther from their workplaces to save on housing costs, which often results in increased transportation costs.
- Others use family and social networks to secure child care and transportation at lower costs.
- In some cases, families postpone major expenses, such as needed car repairs; go without; or increase their debt load to finance unexpected expenses.
While these strategies can help a family get by on a monthly basis, they represent a significant strain on their well-being as well as a barrier to their economic security and mobility. Without focused attention on policies that create quality, well-paying jobs, the promise of work for such families will continue to fall short. And without strong income supports and investments in the skills and education of the current and future workforce, North Carolina’s low-wage workers will be continually thwarted in their efforts to advance to the middle class. | https://www.ncjustice.org/publications/living-income-standard-2016-1-in-5-families-cant-afford-the-basics-in-north-carolina/ |
Pythons are in the Superfamily Pythonidea in the order of Ophidia. Some distinguishing characteristics are usually the facial pits in Pythons which are used for picking up heat signatures of warm-blooded prey items that they feed upon. Boas typically lack these facial pits. Once again the links below will lead you to specific care articles that the Reptile Apartment Group has authored regarding this incredible species of snake. For further reading we have included a carousel of related books below the actual articles which we highly recommend as you can never have enough information. | http://reptileapartment.ca/feature-care-articles/articles-reptiles-and-the-reptile-industry/snakes/pythons.html |
Many iGen teens are “addicted” to their smartphones, unable to imagine a world without them. Many modern-day teens do homework with their phones in hand. Is this the most productive way work?
Objective: The objective of this study was to acquire qualitative data determining if restricting phone usage effects anxiety and productivity of high schoolers, especially when doing homework.
Method: This was a Double-Blind study I wrote and conducted. Students at a Bay Area private highschool students (N=34) in three science classes participated in this study. First they filled out a pre-survey asking about average time spent doing homework, phone usage restrictions, preconceptions about their phone habits etc. All students downloaded and ran an app called Moment to track screen-time, which apps were in used and number of phone pick-ups. Group A (n=10) put their phone in another room, group B (n=8) had their phone next to them on airplane mode and group C (n=14) had no change. None of the classes were allowed to use their phone from 4-10pm. All students were required to fill out a post-survey with Likert scales regarding anxiety, productivity, attachment, insights etc. Students then sent the research assistant a screenshot of the timeline of pickups and total time on their phone from the Moment app. All students were 10th-12th grades.
Conclusion: Productivity increased when phones were inaccessible to the students. In the pre-survey, the average student said they spent 3-5 hours on homework nightly. The post-survey revealed that 47% of students spent less than 3 hours doing homework during specified nights. In addition, anxiety levels rose when phone usage was restricted. In the initial study, on a Likert scale from 1-10 (1 being very anxious), the most common selection for anxiety when able to access a phone was 8 (24.2%). On the identical scale in the post-survey, asking about anxiety levels when the phone was inaccessible, the most common selection was a 5 (23.5%).
Why were you interested in this study?
I was interested in this study because as a teen, I experience and witness experiences where people cannot stand not being with their phone and get very anxious. I wanted to have some quantitative data that wasn’t just my assumptions. I personally know that I am much more productive when my phone is not near me and I wanted to see if this was the case for my peers. I also wanted to connect my Devices Divide campaign to my immediate high school community, those who need this awareness the most but may be the least likely to seek out research on the issue.
4-10pm or when they are doing homework.
Send Moment screenshot of timeline of pickups and total time on phone.
What is your phone usage habit when you do HW?
How satisfied are you with your phone usage habit when you do HW?
How many hours did you spend doing HW in last 24 hours?
How many hours did you successfully restrict phone usage?
What did you use your phone for?
Do you have screen restrictions normally at home?
How many hours do you typically spend doing HW?
-Average is in the 2-3 range.
Are we missing more social life by being on our phones than we are when we aren’t on social media?
Are there ways to make phones that don’t signal these same pathways?
Disclaimer: Although this study was conducted under the supervision of a qualified science staff, this is not peer-reviewed scientific evidence and should not be treated as such. | https://devicesdivide.org/2018/12/27/my-phone-usage-double-blind-study-on-teens-ages-15-17/ |
This year is the 125th year of Swami Vivekananda’s speech at Parliament of Religions, which we in Vivekananda Kendra celebrate as Universal Brotherhood Day. The welcome and adoration that was given to the speeches of Swami Vivekananda during the Parliament of Religions at Chicago made it clear that world is in need of the message of Bharat, but Bharat has to awaken to its sense of duty. The Parliament of Religions was organised as the part of the celebration of the 400th anniversary of the European discovery of America by Columbus. The purpose of the Parliament was to proclaim the Christianity as the ‘Only True Religion.’ The exclusive approach considers one’s religion as the only true religion. Once this exclusive approach is adopted then others’ religions are not tolerated. This intolerance impels the followers of exclusive religion to set out on large-scale conversion of others even by fraud and force.
Swami Vivekananda was aware that it is the exclusive approach of these Semitic religions like Christianity and Islam, which was responsible for so much bloodshed and human massacre in the human history.(For example 120 million native Americans were massacred by European Christians after Columbus discovered America. Or as described by Will Durant in the book “History of human Civilization” the bloodiest period in human history was the Muslim invasion period in India.) It is this exclusive approach which is the biggest obstacle in the realization of brotherhood of man. It is well-known that Swami Vivekananda addressed the audience as ‘Sisters and Brothers of America’ . It had an electrifying effect on them. It was not merely a form of address but behind those words was the great spiritual strength of India, which has always practiced the universal brotherhood in her long history of more than 5000 years. Taking pride in this fact Swami Vivekananda said, "I am proud to belong to a nation which has sheltered the persecuted and the refugees of all religions and all nations of the earth." Hindus could have this universal approach because they never claim that, 'the God I worship is the 'Only True God' But they say that there is ‘only God’. (that everything in this world is God alone) Everything is the expression of that One.
So we do not say that ours is the only true god and others are false gods we say for other's gods that ‘it is 'also' the form of God.’ Thus our approach is an inclusive approach, an 'also' approach. The exclusive approach says 'this only' whereas inclusive approach says 'this also'. It is because of this inclusive approach – 'also' approach that the Hindus never went destroying other religious faiths. To usher in Universal Brotherhood it is essential that all religions accept this inclusive –'also' approach.
The Hindus have this ‘also’ approach because they have the vision of Oneness for the whole existence. As Hindus view everything in the existence as the expression of the One, all the manifestations are revered, are accepted. There is then respect for the diversity. As everything is expression of the One, the human soul too is not seen as the sinner but as pure, immortal, complete, whole. This is the message that India has to give to the world.
For the first time to that audience which was used to the exclusive claims to religious truth, Swami Vivekananda gave the message, “Much has been said of the common ground of religious unity…. But if anyone here hopes that this unity will come by the triumph of any one of the religions and the destruction of others, to him I say, “Brother, yours is an impossible hope” ….If the Parliament of Religions has shown anything to the world it is this: It has proved to the world that holiness, purity, and charity are not the exclusive possessions of any church in the world, and that every system has produced men and women of the most exalted character. In the face of this evidence, if anybody dreams of the exclusive survival of his own religion and the destruction of others, I pity him from the bottom of my heart, and point out to him that upon the banner of every religion will soon be written, in spite of resistance, “Help and not fight” “Assimilation and not Destruction” “ Harmony and Peace and not dissension.”
For the first time to western audience, the message of universal Brotherhood and its proper understanding was given by Swami Vivekananda. Therefore, Mananeeya Eknathji - the Founder of Vivekananda Kendra -wanted this day to be celebrated as Universal Brotherhood Day. Homogenizing the humanity or bringing uniformity in the human society will not usher in Universal Brotherhood but it will only bring further dissentions and destruction. Integrating the various faiths and accepting, as ‘others’ faith also is good for them’ will bring in Universal Brotherhood. Homogenizing brings destruction of the identity and the traditional values in the society where as the integration or seeking harmony keeps the identity of the communities, intact and binds them in the bonds of Brotherhood. Therefore, on this day the message is also for those who are very exclusive in their approach and are undertaking the conversions by destroying the faiths and culture of various tribal and other communities.
Hindus by their philosophy and practice of inclusive approach are destined to give this message of Universal Brotherhood to the humanity. But in order to do that first Hindus will have to understand this unifying and integrating nature of their Dharma. In the Parliament of Religions Swami Vivekananda also gave us the unifying principles of Hinduism. As put very beautifully by Sister Nivedita, “Of the Swami’s address before the Parliament of Religions, it may be said that when he began to speak it was of “the religious ideas of the Hindus”, but when he ended Hinduism had been created.…These, then were the two mind-floods, two immense rivers of thought, as it were, Eastern and modern, of which the yellow-clad wanderer on the platform of the Parliament of Religions formed for a moment the point of confluence. The formulation of the common bases of Hinduism was the inevitable result of the shock of their contact, in a personality, so impersonal. For it was no experience of his own that rose to the lips of the swami Vivekananda there. He did not even take advantage of the occasion to tell the story of his master. Instead of either of these, it was the religious consciousness of India that spoke through him, the message of his whole people as determined by their whole past.” Thus on the Universal Brotherhood Day we have to study, absorb and highlight the message that Swami Vivekananda gave in the Parliament of Religions. Not just, the lecture given on the first day of the parliament, which is very well known, but the main lecture that he gave in the Parliament of Religions - “The Paper on Hinduism” needs to be studied. It is the study and application of this lecture, which will make us capable of giving the message of Universal Brotherhood Day to the world. | https://yb.vkendra.org/2018/08/universal-brotherhood-day.html |
Dear Friends,
I hope that you all are doing well today! I do not know about you guys, but I feel like the last few weeks have been quite a ride again, bringing clearly visible manifested changes to my life. Within the collective awakening process into the Golden Age of Aquarius we have been going thru a lot of transformation processes too, under the intense fire energies the Leo New Moons and the Lions Gate have provided. I am grateful for my connection with the angelic realms, having them by my side is helping me a lot. If you wish to take their advice as well,
Here are the Angelic Numbers most vivid right now:
Angel Number 717:
Allows us the joyful realization, that we have made the right decisions, taken the correct directions from our higher self and now are brought thru the angels guidance, on a brand new path full of possibilities and never known chances. This newly emerging opportunities will finally align us with the higher purpose and profound mission of our life on planet earth. The Angels and Archangels applaud the work we have done in the past, and bless us with the power of new beginnings right now! Keep listening closely to the guidance of the angelic realms and your spirit guides! Do so and all your further steps will simply unfold in front of your eyes, at the right time – in the right place! Ground yourself and stay centered in your being, there is nothing to do!
When you see people only as personalities, rather than souls with life missions to fulfill, you forever limit the growth and possibilities of what God has in store for another person.
Shannon L. Alder
Truth serves a great purpose for all that want to see. It will help uncover your life’s mission in order to reveal what your soul wants you to be.
Molly Friedenfeld
Your Spirit Guides and Angels will never let you down as you build a rapport with them. In the end, they may be the only ones who don’t let you down.
Linda Deir
Angel Number 1133:
Angel Number 1133 is a powerful message to give our fears, doubts and worries to the angels and the Ascended Masters so that they can be transmuted and healed on our behalf. It tells us, that we are fully prepared in every way to fulfill our soul mission and divine destiny, and to make a move forward on that path. It’s a sign to trust that the angels support us completely and surround us with love and protection at all times. The angels and universal energies are working for our highest good on the next directions!!
The Number 1133 is also an invitation to develop the courage we need, to fully express ourselves and live our life with enthusiasm and optimism. Living life with joy, passion and purpose will manifest our true desires. The angel’s blessings are with us!! Increase your spiritual development, your awareness and use your knowledge and wisdom to uplift others. In relationship to the energy right now, this number is helping us to develop more faith in our personal path, and to translate this faith into divine action. For the ones who are working with the Angelic Realms and the Archangels, it is also an invitation to trust even deeper in this divine partnership.
I am well aware of the fact that the human race has known about the existence of a universal energy related to life for many ages. However, the basic task of natural science consisted of making this energy usable. This is the sole difference between my work and all preceding knowledge.
Wilhelm Reich
Every time you play you have energy within you – universal energy. That’s the energy that keeps everything together – the planets, the galaxies. Everything.
Airto Moreira
Our greatest fear isn’t that we are inadequate. Our greatest fear is that we are powerful beyond measure. It is our light, not our darkness, that most frightens us.
Marianne Williams
Angel Number 2222:
Angel Number 2222 is a particularly powerful and intense number sequence, for caring the quadruple impact of the same number. In this moment of development on our wonderful planet, this completed, harmonious and especially balanced number, is a wake-up call to clearly act on the laws for a manifested brotherhood of man. Its a call for just behavior between human beings as well as all other realms of existence, and justice for the pain we have created in the past. The number combination 2222 is resonating with the number 8, a vibration of personal power and the wisdom we developed in applying our abilities in daily life. In the cross of life, the number sequence 2222 represents the center of our heart to each of the direction points, and back to our selves. The angels now encourage us in finding balance, unconditional love and respect for all beings, by experiencing all lines of this sacred geometry of life.
I have defended democracy, human rights, and brotherhood between peoples. And I’ll keep doing so for as long as I live.
Leyla Zana
Tolerance implies no lack of commitment to one’s own beliefs. Rather it condemns the oppression or persecution of others.
John F. Kennedy
I tried to discover, in the rumor of forests and waves, words that other men could not hear, and I pricked up my ears to listen to the revelation of their harmony.
Gustave Flaubert
Working hard for something we don’t care about is called stress: Working hard for something we love is called passion.
Simon Sinek
Dear ones, I wish you a wonderful time enjoying your growing connection with the guidance of the angelic realms. I hope you feel blessed about the outcome of all your choices right now, and well advised in listening closely and following the loving directions given!
Tons of Love and Angelic Blessings!
Edith. | https://eraoflight.com/2017/09/02/tuning-in-to-angelic-guidance/ |
Graham v. Florida
In May 2010 the Supreme Court of the United States ruled 6-3 that Graham’s sentence was unconstitutional, but 5-4 that the ruling applied to anyone else but Mr. Graham. The ruling applied only to teens sentenced to life without parole for NON-murder cases, despite petitioners’ attempts to have the court rule broadly that all JLWOP sentences were unconstitutional. The Supreme Court specifically stated in the ruling that life sentences for teen killers were fully constitutional.
We recognize that life without parole is a very serious sentence for ANY age offender and believe that it should be reserved for that proverbial worst of the worst offender. We are an organization of families of those KILLED by teens and do not have an organizational position on the specific sentencing of these offenders, as victim family positions vary widely. We are here in SUPPORT of those victims of any violent crime by a teen and are only concerned of the impact of this ruling on their lives. Some of our members do not believe life sentences are appropriate for any non-murder case, no matter the age of the offender. Some of our members support the death penalty for extremely aggravated crimes. Our views are diverse. We are united in our views on victims’ rights to be notified of and heard in all matters in their cases. See below for our specific analysis of this ruling.
Download the amicus brief that NOVJL submitted, along with other victims organizations nationally, to the United States Supreme Court in the Graham and Sullivan v. Florida cases. It summarizes the very serious concerns crime victims legal experts have about some of the arguments advanced by the attorneys for offenders Graham and Sullivan.
We are very grateful to the Southwestern Legal Foundation for their service to crime victims all over the nation in writing this brief for us.
We also highly commend the work of the National District Attorneys’ Association (NDAA) and recommend the reading their amicus brief to the Supreme Court on the Graham and Sullivan cases.
See some of the media coverage on the final ruling and read Supreme Court blogs on the case at SCOTUS Wiki information
The State of Florida issued the following statement after the ruling:
In response to the U.S. Supreme Court’s ruling today in the Graham v. Florida case, Florida Attorney General Bill McCollum issued the following statement: “Today, the United States Supreme Court declared unconstitutional life sentences without parole for juvenile offenders who have committed non-homicide crimes. The Court’s ruling does not prohibit stern sentences for juveniles who commit violent crimes, and I fully expect the offender in this case be resentenced to a very long term in prison. This ruling will have a significant impact on our state’s juvenile justice and corrections systems both going forward and for current inmates, and Florida will need to make provisions to address these issues. I will work closely with the Legislature to identify and implement solutions that can better protect Florida’s citizens, families and guests.”
NOVJL’s founder was present in the court for the oral argument, and we followed the case closely, though it did not apply to our cases, as we are all homicide victim family members. Read our press releases on the cases.
Our Analysis of the Graham ruling:
1. We are very gratified that the Supreme Court affirmed the constitutionality of Life Without Parole sentences (JLWOP) for some of the nation’s worst teen murderers. The plaintiffs in the Graham and Sullivan cases asked the Supreme Court to overturn all LWOP sentences nationally as unconstitutional, which the court declined to do. Given the stunningly large, well-funded, and often misguided effort on behalf of the juvenile offenders to propagandize about JLWOP sentences nationally, it is indeed a victory for public safety and victims’ rights that the vast majority of JLWOP cases nationally are still deemed fully constitutional.
2. Some members of NOVJL supported the court’s finding that JLWOP is unconstitutional for non-murder cases. Natural life is an extremely serious sentence, and it seems at least reasonable to argue that it may be too harsh of a sentence for an offender of any age, if they did not kill their victims. Given the diverse views of our members, we stand for a just and fair process that respects victims’ rights. The process must include victims’ voices in the public policy discussions about any such reforms. So our main concern is that the victims of these cases were heard in the process to decide it. Given what little we know about the 129 cases of non-murder JLWOP nationally, we do not know that victims’ rights to be notified of, and heard in, this process were followed. In fact the state of Florida shared with us the difficulties they were having finding victims of cases that were sometimes decades old.
We note that the Court strongly affirmed that teen offenders could still be given and serve long or life sentences, but that they must be given a chance at parole at some point. We will watch with interest as the 7 states that have JLWOP for non-murder battle out how to comply with this ruling. We are concerned that parole boards are entirely too politically appointed and error-prone, nationally. And we know how re-traumatizing the parole process is for victims. Moving from life without parole to life with parole sentences simply transfers the life sentence from offender to victim.
3. We are very concerned that the victims and their families of these few 129 non-murder cases sentenced to JLWOP in the 7 states that have JLWOP for non-murder, be notified of this ruling that these sentences are now found to be unconstitutional in this ruling. They must be supported and attention must be brought to their cases as they will now face re-sentencing and an agonizing and perhaps life long process of having to re-open these tragic episodes in their lives before parole boards. No dangerous offender should be released. Full restitution must be made to all their victims. And victims’ families must be immediately notified and fully supported to participate meaningfully in these re-traumatizing re-sentencing hearings granted them by the Supreme Court in the Graham ruling.
4. We are concerned in this ruling with the erosion of states’ rights to choose penalties for crimes committed in their borders and with the activist interpretation into the constitution of a prohibition in the 8th amendment that is not in there.
5. We are concerned with some of the reasoning that the Supreme Court majority used in their decision. For one, they actually cited the rarity of the sentence in defense of this ruling. What they are actually doing is punishing prosecutors, legislators, courts, and judges, as well as victims, for using the life sentence for extremely violent teens only very rarely. Judicious use of a serious sentence should be rewarded, not punished. This reasoning will not sit well with the public. The whole purpose of harsh sentences is that they should be reserved for those most rare and horrific of crimes.
Additionally, the Supreme Court majority cited international practices that are not at all legal or relevant when analyzing Constitutionality in the United States. We are a sovereign nation. There is broad concern in the American legal community that any Supreme Court ruling looks outside our nation to determine standards for our Constitution’s interpretation. The court also did not examine all the far more horrific treatment of juveniles that occur worldwide.
The real problem with the Graham ruling
Most amazingly, this is the first time in history that the 8th amendment prohibitions against cruel and unusual punishment, which have always only ever been applied to torture and the death penalty in three centuries of American jurisprudence, have been applied to mere incarceration. Incarceration in and of itself has never ever been viewed as cruel and unusual punishment. There is a legitimate and serious concern already being expressed by constitutional scholars and those concerned with the rule of law and public safety that this newly invented right “discovered” inside the 8th amendment that says nothing about youthful offenders or incarceration, will lead to a dangerous legal slippery slope in our criminal justice system.
The court could have solved most of the concerns raised in the Graham and Sullivan cases by a finding that PROPORTIONALITY reviews should be allowed in all such cases. Proportionality is a constitutional principle that says that the punishment must be proportional given all the facts relevant to the individual case, the crime, and the criminal. Basically, it means that the punishment should fit the crime.
Proportionality is also a phase of the sentencing process that is not considered if the sentence is mandatory. So in the cases where the JLWOP sentence was mandatory, those cases could have been granted a new sentencing hearing to review the principles of proportionality in their individual case.
Little Has Changed
Now that some years have passed since this ruling, we also note with interest that most of the offenders re-sentenced to date in Florida under the Graham ruling have been given terms of years for their serious crimes that are so long that they are still serving effective life sentences. Some have received sentences near 100 years in prison. We are not sure what benefit to these offenders all this effort has served – we await more analysis. However, we DO know that all this new legal wrangling for changes in their sentences has been significantly costly to the taxpayers, while at the same time providing no real net change in the actual prison time served by those offenders affected by the Graham ruling, as far as we can see.
We support reforms to the criminal justice system, for the most part, where needed, and we support sentencing reforms where there is a miscarriage of justice. We know that there are innocent people in prison, wrongfully convicted, and that there are offenders who are over-sentenced in relation to their actual culpability. We know this is wrong. In fact, we as an organization have shown far more sympathy and support for convicted inmates than the offender advocacy movement has shown to ANY murder victim family member of a teen killer.
Other fallacies in arguments made before the Court
Offender advocates have been lying about international law and standard, reporting frequently that the USA is the only nation in the world to incarcerate violent teens for life. This is not true. 11 countries, including Australia, do. And some do far worse – they allow children and teens to be sold into prostitution and slavery, and they allow torture and other horrible forms of mutilation to children. The U.S. record on treatment of juvenile offenders is actually a generally good one, giving more support and protections, and less incarceration time overall than other nations of the world.
Offender advocates argue we should comply with an international treaty that the USA has never been a signatory to – the International Treaty on the Rights of the Child. We cannot be held to be in violation of a treaty we never signed. And again, our human rights record is far better for treatment of juvenile offenders overall than many nations.
Lives in prison still allow offenders to have a life of potential meaning and contribution. They can mature, learn, offer service to others, and make restitution to their victims, all from their prison cells. Many states allow them to marry, some to have conjugal visits. Many offer advanced educational opportunities. They can write and publish books and art. They can be creative. They can mentor other troubled youth and offenders. They can be rehabilitated. They can worship. They can redeem themselves. And all these things, they should do. While serving their life sentences, they are getting far more opportunities than they ever gave their victims.
We hope that this ruling in the Graham case supporting LWOP for murderers, while rejecting the no-parole option for non-murder violent offenses, will help the nation’s policy makers to understand the difference between appropriately just sentences for the most heinous and violent murderers, and the lesser sentences called for with lesser serious offenses.
UPDATE on What Florida Did to Comply With the Graham Ruling
Read the full article on how the Florida legislature will be complying with the Graham ruling. Here are highlights of compliance legislation:
“Florida’s current laws, sections 985.556 through 985.57 of the Florida
Statutes, provide for the transfer of juvenile cases to adult court. Depending
on the circumstances surrounding the particular case, a variety of juvenile
offenses can be transferred to adult criminal court. Although certain offenses
require the transfer of the juvenile to adult court for trial and sentencing,
the transfer of many juvenile cases is discretionary.
Discretionary cases involving the transfer of a juvenile to adult court
largely depend on the age of the alleged offender, whether the offender has
previously been adjudicated or convicted of any offense, the number of offenses the juvenile has previously been charged with, and the type of offense that resulted in the most recent charges.
Under section 985.56 of the Florida Statutes, any child who is charged with
violating a state law that is punishable by death or life imprisonment must be
tried and sentenced as an adult. Additionally, juveniles are required to be
tried as an adult if they commit carjacking or auto theft offenses that resulted
in serious injury.
“Other penalties currently exist in Florida’s juvenile justice system that
are better alternatives to juvenile life sentences without parole. These
repercussions can include shorter jail or prison terms than if the juvenile
offender is sentenced as an adult, confinement in a Juvenile Detention Center,
confinement to house arrest, loss of a driver’s license, imposition of a curfew,
community service requirements, probation, payment of fines, and/or payment of restitution,” stated Morris, a juvenile justice attorney.
If SB 212 is passed, juvenile offenders that have been sentenced to life
imprisonment without parole would be allowed to a resentencing hearing to
determine if their sentence should be reduced.
In order to be granted a resentencing hearing, the juvenile offender must
meet the three preliminary requirements and also have served 25 years of
incarceration for the underlying offense. Additionally, the juvenile offender is
only eligible if they have not received any disciplinary reports while in prison
for at least three years before the scheduled resentencing hearing.
Resentencing is not mandatory if the juvenile offender is granted a hearing.
The court must also look at the following factors at the resentencing hearing to
determine whether or not to give the alleged offender a new sentence:
- The level of risk the juvenile offender imposes on society;
- The wishes of the victim or the opinions of the victim’s family;
- The level of the juvenile’s participation in the underlying offense and
if duress was involved in the commission of the offense;
- The juvenile offender’s sincere and sustained remorse for the criminal
offense;
- The juvenile’s age, maturity, and psychological development at the time
of the offense;
- Assistance to others or prevention of risk to others while in
prison;
- Completion of GED requirements or other educational, technical, work,
vocational or self-rehabilitation programs while in prison;
- The amount of sexual, physical, or emotional abuse imposed on the
juvenile before they committed the offense;
- The results of any mental health assessment, risk assessment or
evaluation of the juvenile offender;
- The facts and circumstances of the offense for which the life sentence
was imposed, including the severity of the offense; and/or
- Any other factor the sentencing court deems necessary.
If the court determines the juvenile is fit to re-enter society, the court
may issue an order modifying the sentence and place the offender on probation for a period of 5 years. If the juvenile offender violates the conditions of their program, the court may revoke the probation and impose any sentence that could have originally imposed and the juvenile will no longer be eligible for resentencing. However, if a juvenile is not initially permitted to resentencing, they are eligible for a resentencing hearing every seven years after the date of the denial.
The Florida House of Representatives has proposed a similar bill, House Bill
5, which is also currently pending before the legislature.”
Letter to the Editor Re: Graham v. Florida Supreme Court Case
When the Los Angeles Times writer David Savage wrote, and the Chicago Tribune published on 9-29-09 one column commenting on the Graham v. Florida ruling that contained errors in fact and reasoning, we posted the following on the on-line commentary section of their website;
“While we commend the high profile attention that the Chicago Tribune continues to give to this issue, Mr. Savage’s article missed some basic fact checks.
“First, the United States is NOT the only nation to sentence juveniles in rare and very violent crimes to long term or life sentences. It is one of 11, including Australia.
“Second, there are not 2500 JLWOP cases in the USA. This original estimate from a human rights group has since been discredited by an actual count done by the Heritage Foundation after talking to the nation’s Attorneys General. The number is more likely around 1300. The sentence remains extremely rare and used, with little exception, in the ‘worst of the worst’ cases.
“Finally, this one-sided article takes up the propaganda line of the defense attorneys for Sullivan and Graham, who are asking the Supreme Court in their briefs to break firm and long standing precedents. The 8th Amendment prohibitions against cruel and unusual punishment have never been applied to mere incarceration. And it is the pervue of states to define crimes and their associated punishments. To broach these principles legally could have potentially chaotic impact on the nation’s legal system. Regardless of what the Court decides on the Sullivan and Graham cases, we believe they should not rule broadly.
“Your article is supposed to be objective and researched. It clearly is not. It is impossible, not improbable and not unusual …. impossible, for Terrance Graham to be given a life without parole sentence for a robbery followed by a ‘home break in’. There is no law in Florida or anywhere in the United States that allows for such a penalty.
“You can check with Roy Black (Kennedy-Smith’s lawyer) in Florida or any of the criminal defense lawyers there, they will verify this.
“A review of the briefs in the case show that there was a lot more to the Graham crimes than you wrote.
“Graham’s first conviction was for an ‘armed burglary’ that included an ‘assault’ (threat to harm) or ‘battery’ (actual harm). He was given a one year sentence for this even though it carried a potential life sentence.
“Upon release his next crime was planned against a vulnerable family. The State of Florida brief reads:
‘A month shy of his eighteenth birthday, Graham led older accomplices in planning and then committing an armed robbery at the home of Carlos Rodriguez Lopez, a recent war refugee from Colombia who worked as a construction laborer and lived with his wife and stepson.’
“The crime was a home invasion robbery not a ‘home break in’ as your wrote. Three men forced their way into the Rodriguez-Lopez house with guns. They held guns to Mr. Rodriguez’ head and demanded money. They stayed in the house for half an hour before leaving.
“The person who planned this robbery and executed it was Mr. Graham.
“After this robbery the group attempted yet another armed robbery. In this robbery, one of Mr. Graham’s crime partners was shot. Graham fled from police after dropping his partner off at the hospital. He sped through residential streets at speeds up to 90 miles per hour.
“When he was apprehended, Graham confessed to engaging in other robberies as well.
“Contrary to what your article claims, Graham did not receive Life Without Parole following a one day hearing. There was a series of hearings to determine whether Graham had violated the conditions of his release on the original charges. His sentencing exposure for violating this conditions ranged from 66.75 months of incarceration up to a life sentence. He refused to admit guilt to any crime other than eluding the police, showed no remorse and received the maximum sentence. The judge cited his danger to society as the main motivating factor.
“Contrary to the implication in your article, ‘Incorrigible’ was not the legal basis for the sentence.
“It is certainly appropriate to debate the reasonableness of Mr. Graham’s sentence. In fact, the Supreme Court is entertaining just such a debate. However the public debate needs to be informed by facts. We rely upon the LA Times and reporters to be accurate and complete.
“I am sorry but your story reads like an advertisement for one side. Even the appellate briefs of Mr. Graham are more balanced. | https://teenkillers.org/courts-2/letter-editor-re-graham-case/ |
The Connecticut Dept of Education released the results of the 2016 Smarter Balanced Assessment (SBA) for English Language Arts (ELA) and Mathematics on Thursday, Aug. 18.
The percent of Greenwich Public Schools students who met or exceeded expectations in English Language Arts in grades 3-8 increased from 72.7% in 2015 to 76% in 2016.
The percent of students who met or exceeded expectations in Mathematics in grades 3-8 increased from 63.7% in 2015 to 66.3% in 2016.
The 2015 SBA results served as the baseline for this new standardized assessment. It is important to note that for the 2016 administration of the ELA assessment, the State eliminated the writing performance task. The State has calibrated the 2015 District scores to reflect an accurate comparison of the two administrations of the assessment. This data is not yet available for individual schools.
The State Department of Education replaced the 2015 SBA for grade 11 students with the Connecticut School Day SAT. The 2016 scores were released earlier this month. It is important to remember that the CT SAT is a redesigned SAT to align with the Common Core Standards. Also new for the March 2016 administration of the SAT is that all 11th grade students statewide were expected to participate, unlike previous years where participation was optional.
We were pleased with the high participation rate in the CT SAT for Greenwich High School. This speaks to the high level of commitment of the Greenwich High School’s educators and all students. Upon initial review, we can determine that Greenwich High School students exceeded the state average by 55 percentage points in English Language Arts (ELA) and 73 percentage points in mathematics.
The results of the Connecticut Mastery Test (CMT) in Science for grades 5 and 8, and the Connecticut Academic Performance Test (CAPT) in Science for grade 10 are not yet available. The District expects to receive the results once the State has completed its calibration of the data.
Having received the data on Thursday, Aug 18, Greenwich Schools administrators will next begin an in-depth review of the the standardized assessment data.
An initial focus will be to look at the differentials in the results between schools, subgroups of students, and the ELA and Math SBA assessments.
All administrators will review the current status of student learning as measured by the standardized assessments and instructional practices to identify successes to celebrate and amplify, and areas of focus to address through school and program improvement plans.
The Board of Education is scheduled to receive a comprehensive report on the standardized assessment results in November, with additional updates and a more detailed analysis communicated through scheduled monitoring reports for STEM and Humanities in March and April 2017. | https://greenwichfreepress.com/schools/standardized-tests-results-are-in-more-greenwich-students-in-grades-3-8-met-or-exceeded-expectations-70967/ |
Synthetic biology is a new field, but it’s targeting an old question: How did life begin?
The driver turned off the engine of his rumbling Russian- army troop carrier at the edge of a deep canyon carved by a stream of glacial meltwater. Our little research group–which included Stanford graduate students Jamie and Meaghan, postdocs Jan and Jake from the Carnegie Institution of Washington, and our guide, Vladimir–clambered down from the truck for a welcome stretch after a jarring five-hour drive from Petropavlovsk. Then we shouldered our packs and began to climb, crunching over packed snow and ice between house-size boulders. When we stopped for breath and looked back downhill, we could see the ash and lava flows from past eruptions eroded into hills and valleys, with scattered patches of low shrubs in sheltered areas far below. The jagged volcanic landscape of Kamchatka defined the horizon. Above us loomed our goal: the blasted peak of Mount Mutnowski, a volcano that had erupted just a few years before.
Two hours later and 2,000 feet higher, we peered over the edge of the crater. It was hard to grasp the chaos beneath us. There was nothing alive in this landscape of black and gray rock except our team of six. A small glacier on the other side was melting into the crater, and distant roaring sounds emanated from deep inside as steam rose into the blue sky. Earth, air, fire, and water, I thought–the ancient elements, brought together here in far eastern Russia, stirred by heat energy left over from the beginning of our planet’s history. Except for the glacier, this place seemed like a remnant from that time–a model of what Earth was like four billion years ago, before life began. We made our way down into the crater, at times wearing gas masks to protect our lungs against caustic gases.
My fieldwork in Kamchatka was supported by a NASA grant, and our main goal was to better understand geochemical conditions related to the origin of life on Earth and perhaps on Mars. Earlier publications in Russian-language journals had reported that organic compounds, including amino acids, were present in the boiling springs and vapors of volcanoes in Kamchatka. Everyone agrees that the origin of life required a source of organic compounds, but no one really knows what the primary source might have been. One possibility is that most of the compounds were produced by geochemical synthesis in volcanic regions early in Earth’s history, and it would be a real breakthrough if we could detect similar reactions in volcanoes today.
The second goal was basically to hedge my bet. What if we got all the way to Kamchatka and found no organic compounds? That would be embarrassing. For this reason I brought along a mixture of compounds similar to those we thought might have been available four billion years ago to kick-start life: four amino acids, a fatty acid, phosphate, glycerol, and the four bases of nucleic acid. We knew that under laboratory conditions, these components can react to produce more-complex compounds related to the molecular structures and functions characteristic of life. I proposed to add these to a volcanic pool to see what would happen. Most of my colleagues believe that this kind of experiment is a bit silly because the conditions are so uncontrolled, but I think of it as a reality check. We can get interesting reactions to work in a laboratory, but what if we are overlooking something that becomes apparent only when we try to simulate those reactions in a natural environment?
When I first began to hear the term astrobiology a few years ago, it sounded strangely discordant. And then another new discipline appeared that was even more of a stretch: synthetic biology. But this is how science progresses–by a kind of symbiosis between seemingly unrelated disciplines, in which traditional biology and chemistry become biochemistry, and biology and physics become biophysics. I began my career doing traditional biophysical studies on membranes, but now some of my research is funded by NASA’s astrobiology program, and many of our experiments could be described as synthetic biology: the application of engineering techniques to design or redesign biological functions and systems.
The field of synthetic biology is hot just now, because its methods are potentially very powerful. Synthetic biologists know enough about living systems to alter genetic programs in useful ways, the way expert computer programmers alter software. But what does such high-tech science have to do with volcanoes and the origin of life? Louis Pasteur once commented that chance favors the prepared mind; very often, even the most basic research produces an undreamed-of application. For example, one of the most powerful tools of molecular biology is the polymerase chain reaction (PCR), which is used to amplify DNA–that is, to make multiple copies of a given sequence. In PCR, cycles of heating and cooling combine with DNA synthesis by a polymerase, an enzyme that catalyzes the building of large molecules (polymers) from small molecules (monomers). Kary Mullis came up with the idea in 1983, first using a polymerase from ordinary E. coli bacteria, but a polymerase was needed that could survive near-boiling temperatures. In 1965–in completely unrelated research–Thomas Brock discovered a primitive bacterium, which he named Thermus aquaticus, living in the volcanic hot springs of Yellowstone National Park. This organism is the original source of the heat-resistant Taq polymerase now used in all commercial PCR devices.
If we follow Pasteur’s advice, we can increase the chances for more such serendipitous discoveries. In particular, we can prepare our minds by broadening the scope of synthetic biology to encompass studies of the origin of life. I will begin by describing nature’s version of synthetic biology; then I will show how our growing understanding of life’s molecular mechanisms suggests a way to reproduce the origin of life in the laboratory.
To take on the question of life’s origin, we need to have some idea of what Earth was like four billion years ago. There is good evidence that oceans were already present, predating life by several hundred million years. The oceans were salty, probably somewhat acidic, with volcanic land masses rising above sea level. Precipitation onto those islands produced freshwater ponds, so a marine environment is not the only one in which life could have begun. The atmosphere was a mixture of carbon dioxide and nitrogen, with little or no oxygen, and the average global temperature was 60 to 70 °C, much higher than today’s 15 °C. Thus the first forms of life probably resembled the thermophilic bacteria that inhabit hot springs today.
Less eloquently, what would be required for the evolution of life to begin? First of all, evolution works on populations, not single organisms, so we need to find a way to generate large numbers of molecular systems in the prebiotic environment. Furthermore, there must be great variation in their properties. The requirement of variation within a population means that the first life forms capable of evolution could not be random mixtures of replicating molecules unable to assemble into discrete entities; instead, they would be systems of interacting molecules encapsulated in something like a cell.
The systems would have to exhibit the two primary functions of life: growth and reproduction. Cells grow by taking in nutrients–simple molecules from the environment. They use energy to link those molecules into the polymers that we call proteins and nucleic acids. Reproduction requires a mechanism by which genetic information can be stored and then replicated, so that the information, in the form of genes, can be passed on. But the transfer of information is necessarily imperfect. A certain number of errors–mutations–must occur to produce variations in the population such as those that enabled primitive life to explore different niches and begin evolving toward the magnificent biosphere of today’s Earth.
We’re talking about forms of life much simpler than even the most primitive bacteria that exist now. Still, how could cells of any kind spontaneously appear out of random mixtures of simple organic molecules? The prospect is so mind-boggling that a few scientists state flatly that we will never understand how it came about. I’m more optimistic. But attempting to discover how life began is hard work, with no certainty that we will ever find answers. We need to formulate and test hypotheses, and be willing to venture into vast unexplored territory. I will briefly describe some of the milestones on this journey. As we acknowledge them, we can begin to assemble a logical cage that constrains speculation and guides us toward answers.
The four basic varieties of biomolecules are amino acids and proteins, carbohydrates, nucleic acids, and lipids. There is little doubt that similar–even identical–organic compounds were present in the prebiotic environment. That was the conclusion of Stanley Miller’s famous experiment in the early 1950s in which he exposed mixtures of ordinary gases to electrical discharges and observed the formation of amino acids. Since that time, virtually all the primary carbon compounds of life have been synthesized in prebiotic simulations.
The results of simulation studies were strongly supported when a remarkable meteorite fell to Earth near Murchison, Australia, in September 1969. It was clear that the meteorite contained organic material, because a strange smell emerged from the hot surfaces. Forty years later, when I grind Murchison samples in the lab, the same odor wafts up from the mortar–simultaneously dusty, oily, and sour. This is an ancient odor, older than Earth itself, preserved for five billion years in a comet or asteroid from which the original meteorite was derived.
There are thousands of organic compounds present in the Murchison meteorite and other carbonaceous meteorites that have been analyzed–confirming Miller’s experiment by showing that biologically relevant organic compounds are in fact produced by nonbiological processes. This makes it plausible that organic compounds were present on prebiotic Earth, either synthesized by geochemical processes or delivered as meteoritic and cometary infall more than four billion years ago.
The unit of all life today is the cell. My research background is in membrane biophysics, and I began my career by studying the lipid membranes that are the essential boundaries defining living cells. Twenty years ago, when I obtained a golf-ball-size stone from the Murchison meteorite, I wanted to see whether anything resembling lipids was present in the mix of meteoritic organics, perhaps shedding light on how life became cellular.
In earlier research I had often used a mixture of chloroform and methanol to extract lipids from a variety of biological materials, such as red blood cells, chloroplasts, mitochondria, and even egg yolks–the last being a rich source of a phospholipid called lecithin. And in 1975 I had spent a sabbatical leave in the lab of Alec Bangham, who discovered in the 1960s, working at a research institute near Cambridge, England, that lecithin could spontaneously self-assemble into membranous sacs, or vesicles, that have come to be called liposomes. I now employed the chloroform-methanol mixture to isolate compounds from samples of the Murchison stone, then used a chromatographic procedure to purify those that might be capable of self-assembly into membranes. The left panel in the figure on page 71 shows what happened when a few micrograms of the extract were dried on a microscope slide and exposed to water to simulate the cycles of wetting and drying that would have been frequent on the early Earth. The results were very exciting. Not only were lipidlike molecules present in the mix, but they readily self-assembled into cell-size vesicles.
When we analyzed the mixture of meteoritic organics, we found that some of the compounds were short-chain fatty acids, soaplike molecules that feature a tail of 9 to 13 carbon atoms. This meant that we no longer needed material from precious meteorites to carry out experiments; we could investigate the properties of the pure compounds purchased from chemical-supply companies. We began with decanoic acid, a 10-carbon fatty acid, and found that it readily produced vesicles similar to those produced by the meteorite extracts. The next question was whether such compartments could encapsulate larger molecules to produce protocells, which are defined as encapsulated systems of molecules–like RNA–that have the potential to act as catalysts and carriers of genetic information. This turns out to be so easy that it could be done for a high-school science fair. If the microscopic vesicles are mixed with large molecules like proteins or nucleic acids, then put through a dry-wet cycle, about half of the large molecules end up inside the vesicles. The glowing lipid vesicles shown in the right-hand panel of the micrograph are composed of decanoic acid surrounding DNA molecules.
The bottom line is that protocells are very easy to produce by simple self-assembly processes. It follows that such structures would also be expected to occur in a prebiotic setting.
All life today uses enzymes to catalyze the synthesis of polymers. And nearly all polymeric molecules of life, including proteins and nucleic acids, are synthesized from monomers that are chemically activated–that is, they gain the energy to undergo polymerization–through complex metabolic processes that extract the equivalent of a water molecule from each one. Ribosomes link activated amino acids through peptide bonds to produce proteins, and enzymes called polymerases catalyze the formation of ester bonds between activated nucleotides to produce nucleic acids.
Nothing nearly this complicated could have happened before life began, but a variety of simpler reactions can also produce interesting polymers. For instance, James Ferris, at Rensselaer Polytechnic Institute in New York, showed that a clay mineral called montmorillonite promotes the synthesis of polymeric RNA from activated nucleotides. The mineral surfaces adsorb and organize the nucleotides, which then zip up into polymers. Furthermore, once RNA molecules are formed, they can undergo a kind of limited replication process that does not require enzymes. Leslie Orgel and his associates at the Salk Institute demonstrated in the 1980s that chemically activated nucleotide monomers line up on synthetic RNA templates by Watson-Crick base pairing, as they do in the double helix of DNA, and then polymerize into a second strand of RNA.
The seminal observations of Orgel, Ferris, and others clearly suggested that something like RNA might have been the first polymer to be associated with life processes. Additional evidence was provided when Thomas Cech at the University of Colorado and Sidney Altman at Yale found that certain types of RNA had catalytic properties, a discovery for which they shared a Nobel Prize. Such RNA molecules, now referred to as ribozymes, can make and break specific chemical bonds within their own structure rather than depending on protein enzymes. The discovery of catalytic RNA led Nobel-winning chemist Walter Gilbert at Harvard to propose an “RNA World,” positing that life did not begin with the complex systems of DNA, RNA, and proteins that characterize all life today. Instead, RNA molecules could have served as catalysts as well as storing and transmitting genetic information. The RNA World concept dominates current thinking about the origin of life. Research groups led by Gerald Joyce at the Scripps Research Institute, David Bartel at the Whitehead Institute, and Peter Unrau at Simon Fraser University are attempting to incorporate RNA into a self-replicating system of molecules. Significantly, they often employ a technique in which evolutionary principles are used to select specific catalytic activities from mixtures containing trillions of different RNA molecules.
That brings us to the next milestone.
Older than earth!: When the author extracted certain molecules from a five-billion-year-old meteorite and let them get wet, they self-assembled into cell-like vesicles (left). He also found that decanoic acid, a fatty acid present in the meteorite, readily forms similar vesicles—ones capable of encapsulating DNA (glowing, right).
Can genetic information somehow emerge in random mixtures, essentially by chance? If the answer is no, then we’re in trouble, because those of us who work on the origin of life claim that this is exactly what happened four billion years ago, when the first forms of life emerged from a sterile mixture of minerals, atmospheric gases, and dilute solutions of organic compounds. To address that question, I will revisit a classic experiment that David Bartel and Jack Szostak published in 1993, while Bartel was a graduate student in Szostak’s lab. Their experiment is moderately complicated, but the result is so important that it is worth explaining here. The goal was to see if a completely random system of molecules could undergo evolutionary selection in such a way that molecules with catalytic properties could evolve. The first step was to synthesize trillions of different RNA molecules consisting of approximately 300 nucleotides, arranged in random sequences. Bartel and Szostak reasoned that buried in those trillions were a few ribozymes that happened to catalyze a ligation reaction, in which one strand of RNA is linked to a second strand. They developed a procedure that captured those rare molecules even if they only weakly catalyzed the reaction. Then they used enzymes to amplify them. The amplified sequences were put through another round of selection and amplification, and the process was repeated for 10 cycles.
The results were stunning. Increased catalytic activity began to appear after four cycles, and after 10 rounds the rate of catalysis was seven million times the uncatalyzed rate! It was even possible to watch the RNA evolve. Nucleic acids can be labeled with radioactive phosphate, then separated and visualized through a technique called gel electrophoresis. A mixture of RNA molecules is placed at the top of a gel and a voltage of several hundred volts is applied, which causes the molecules to migrate downward through the gel. Larger molecules don’t move very far, so they appear as bands near the top of the gel; smaller, faster-moving molecules form bands near the middle and bottom. At the start of the experiment, nothing could be seen in the gels, because the RNA molecules were all different. But after three cycles, distinct bands appeared, meaning that certain catalytic species were already being selected. With further cycling, other species appeared for a few cycles and then went extinct. After 10 cycles, two distinct RNA species survived, representing those RNA molecules that were most efficient in catalyzing the ligation reaction.
These results demonstrate a fundamental principle of evolution at the molecular level. At the start of the experiment, every molecule of RNA was different from all the rest, but then a selective hurdle was imposed in the form of a ligation reaction that allowed only certain molecules to survive and reproduce. The result was that specific catalytic molecules emerged by a process closely reflecting Darwinian natural selection. The conclusion: genetic information can in fact appear in random mixtures, as long as the mixtures begin with large numbers of polymers defined by a variety of nucleotide sequences from which specific sequences having a catalytic property can be selected and amplified. It seems reasonable to propose that similar selective processes could have occurred on the prebiotic Earth when the first forms of life self-assembled in a mixture of organic compounds and then began to evolve.
Most chemists learn to do their experiments in series, one per day. But experiments can also be done in parallel with a technique called combinatorial chemistry. This approach is particularly useful in the pharmaceutical industry, in which it is often necessary to experiment with large numbers of compounds in order to optimize a reaction or test a new drug. A robotic device loads hundreds or even thousands of small reaction chambers with the desired mixtures, each chamber containing a droplet that is slightly different from the rest. After the reaction is completed, the chambers are individually tested for activity.
In my lab, we perform a version of combinatorial chemistry when we prepare liposomes by adding water to a few milligrams of dry lipid in a flask. A milky suspension is produced that contains, not thousands, but trillions of individual microscopic vesicles in the size range of small bacteria–half a micrometer in diameter. If the vesicles are prepared in a solution containing small peptides and short nucleic acids such as RNA, each of the vesicles will contain a different set of components, so each represents a microscopic experiment. Now let’s think about the early Earth. Instead of milligrams of lipid in a flask, it would have had billions of tons of organic material assembling into enormous numbers of microscopic structures, and half a billion years to do the experiment.
The origin of life can be understood metaphorically as combinatorial chemistry on a global scale. A few of the microscopic experiments must have been successful, resulting in primitive cells capable of capturing energy and nutrients in order to grow by means of polymerization reactions. Evolution began when the cells filled a limited niche and competed for resources. At that point, natural selection took over, placing a premium on how efficiently a given cell could capture nutrients in order to grow. I imagine that once robust cellular life got under way, it expanded exponentially. Earth, seen from space, may even have blushed red or turned green for a while when photosynthetic bacteria filled the oceans.
Life began with little bags, the precursors of cells, enclosing small volumes of dirty water containing miscellaneous garbage. A random collection of molecules in a bag may occasionally contain catalysts that cause synthesis of other molecules that act as catalysts to synthesize other molecules, and so on. Very rarely a collection of molecules may arise that contains enough catalysts to reproduce the whole population as time goes on. The reproduction does not need to be precise. It is enough if the catalysts are maintained in a rough statistical fashion. The population of molecules in the bag is reproducing itself without any exact replication. While this is happening, the bag may be growing by accretion of fresh garbage from the outside, and the bag may occasionally be broken into two bags when it is thrown around by turbulent motions. The critical question is then, what is the probability that a daughter bag produced from the splitting of a bag with a self-reproducing population of molecules will itself contain a self-reproducing population? When this probability is greater than one half, a parent produces on the average more than one functional daughter, a divergent chain reaction can occur, the bags containing self-reproducing populations will multiply, and life of a sort has begun.
The life that begins in this way is the garbage-bag world. It is a world of little protocells that only metabolize and reproduce themselves statistically. The molecules that they contain do not replicate themselves exactly. Statistical reproduction is a good enough basis for natural selection. As soon as the garbage-bag world begins with crudely reproducing protocells, natural selection will operate to improve the quality of the catalysts and the accuracy of the reproduction. It would not be surprising if a million years of selection would produce protocells with many of the chemical refinements that we see in modern cells.
Theoretical concepts like the RNA World and Dyson’s garbage-bag world have inspired experimental approaches in which systems of molecules enclosed by membranes are sufficiently complex to have some of the properties of life. The ultimate goal is to assemble a cellular system that can use energy to grow through a process of catalyzed polymerization, replication of genetic information, and evolution. Several laboratories have initiated such studies, and there is reason to believe that the goal of artificial life may be achieved in the next decade. I will now recount a brief history of research on fabricating artificial cells.
Perhaps the first thing to understand is that assembling a system of molecules capable of reproducing is old news. More than 50 years ago, Heinz Fraenkel-Conrat and Robley Williams at Berkeley discovered that the tobacco mosaic virus could be separated into its coat protein and RNA. If the two components were mixed together, they reassembled into the infectious agent. More recently, in a remarkable display of modern molecular-biology methods, Jeronimo Cello, Aniko Paul, and Eckard Wimmer at the State University of New York at Stony Brook fabricated a functional polio-virus genome by stitching together hundreds of smaller fragments that were synthesized using chemical techniques. And two years ago Hamilton Smith and his colleagues at the J. Craig Venter Institute in Rockville, MD, managed to synthesize a complete genome of a small bacterial species called Mycoplasma genitalium. The uproar this caused is an indication of what will face the first claims that a living cell has been reassembled from its parts.
The synthesis of viral and bacterial genomes suggests that even more-challenging fabrications may be possible. We have known for years that spontaneous self-assembly processes can produce surprisingly complex systems of functional molecules. Efraim Racker, working at Cornell University, pioneered the effort to dissect and reconstitute mitochondrial membranes in the 1970s. Mitochondria are subcellular organelles that are present in most cells, and embedded in their membranes are enzymes that remove electrons from metabolic products derived from nutrients such as glucose. The process is called electron transport, because the electrons then pass through a chain of enzymes in the mitochondrial membrane and are delivered to oxygen. The electron transport is tightly coupled to a second transport process, in which positively charged protons derived from water are pumped outward, producing an electrical potential of approximately 0.2 volts across the membrane. This voltage provides the energy source for the synthesis of adenosine triphosphate (ATP), which transports chemical energy within cells and therefore drives most life processes. The universal mechanism by which ATP is synthesized, now referred to as chemiosmosis, was proposed in 1961 by Peter Mitchell, a remarkable British scientist who later carried out research in his home in Bodmin, Cornwall.
Racker and his students dissolved mitochondrial membranes with a detergent called deoxycholic acid. One of his first discoveries was that the membranes contained an enzyme that coupled ATP synthesis to electron transport. He referred to this as a coupling factor, but it is now called an ATP synthase. Racker also found that the detergent could be removed by dialysis–simply by placing the clear solution in a bag composed of a material resembling cellophane and letting it sit overnight in a dilute salt solution. The small detergent molecules leaked out of the bag, but larger molecules could not get through the porous material. The next day the solution was turbid, because membranous vesicles containing the original protein components had reassembled. The vesicles were fully capable of electron transport reactions and ATP synthesis. It was the first reconstitution of a very complex biological function.
At about the same time, Walther Stoeckenius at the University of California, San Francisco, became curious about the pigmented membranes of a bacterial species called Halobacterium halobium, which lives in extremely salty water. Stoeckenius and Dieter Oesterhelt were able to isolate the purple pigment–bacteriorhodopsin–and found that its function was to absorb light energy and use the energy to transport protons across the bacterial membrane. The energy of the proton gradient was then used to synthesize ATP. Racker and Stoeckenius, both members of the National Academy of Sciences, then initiated a rare collaboration between two senior scientists. They used Racker’s dialysis method to reconstitute a system of membranous vesicles containing only the proton pump of purple membranes and the ATP synthase of mitochondria. In 1974, they reported that the hybrid vesicles could use light as an energy source to synthesize ATP. Their paper added to the weight of evidence that finally confirmed chemiosmotic synthesis of ATP, for which Peter Mitchell was awarded the Nobel Prize in 1978.
The point of this brief history is that a surprisingly complex biological function can be reconstituted through self-assembly of dispersed components. Why not try to reconstitute a whole cell? If this turns out to be possible, perhaps it will help us untangle what we mean by “life” and even elucidate the major steps that led to the origin of cellular life.
Pier Luigi Luisi and his research associates in Zurich made the first attempt by encapsulating ribosomes in lipid vesicles in 1999, together with a synthetic form of RNA that told the ribosomes to incorporate the amino acid phenylalanine into a protein. A few short peptides were produced, but lipid bilayers are impermeable to amino acids, so synthesis was limited to those phenylalanines that happened to be inside the vesicles. Vincent Noireaux and Albert Libchaber at the Rockefeller University had a clever solution for the permeability problem: why not add a channel to the lipid bilayer of the vesicles? They reported in 2004 that they had succeeded in encapsulating a complete translation system isolated from E. coli, along with messenger RNA that directs ribosomal synthesis of green fluorescent protein (GFP) and of hemolysin, a protein that serves as a channel allowing externally added amino acids and ATP to enter the vesicles. The system worked for as long as four days, and at the end of the incubation period the vesicles glowed green from the accumulated GFP. Tetsuya Yomo and his research group at Osaka University have gone a step further with a similar encapsulated translation system in which the GFP gene is present in a strand of DNA. They refer to their system as a genetic cascade, because the GFP gene is transcribed into messenger RNA, which then directs synthesis of the protein.
These encapsulated translation systems exhibit a fundamental property of life: they use genetic information to synthesize a protein, but only a few specific proteins are produced, and everything else is left behind. To be truly alive, the protocells would need a DNA strand with genes for more than 200 different proteins and RNA species, including genes for a polymerase enzyme so that the DNA can be replicated. Enzymes that catalyze lipid synthesis must also be present, because the membrane boundary needs to grow. Transport proteins must be incorporated into the lipid bilayer; otherwise the vesicles have no access to external sources of nutrients and energy. A whole set of regulatory processes should also be in place, so that all this growth is coördinated. Finally, when the vesicles grow to approximately twice their original size, they need to divide into daughter cells that share the original genetic information.
It follows that even the simplest life today is astonishingly complex and could not have sprung into existence on the early Earth with a full complement of hundreds of genes. There must have been something simpler–a kind of scaffold life that was left behind in the evolutionary debris several billion years ago. Given all this, how likely is it that the ultimate promise of synthetic biology will be fulfilled–that an artificial version of a primitive living cell can be assembled? The best bet is probably a ribozyme that catalyzes its own complete synthesis from ATP, UTP, GTP, and CTP–the four nucleotide monomers of RNA–using genetic information encoded in its structure. If someone succeeds, we will have in hand the essential property that is lacking so far in artificial cell models: reproduction of the catalyst itself. Given such a ribozyme, we already know how to incorporate it into a system of lipid vesicles that can grow along with the ribozyme and allow nutrient nucleotides to enter the cell to support growth. The encapsulated ribozymes will have the capacity to evolve, as Bartel and Szostak demonstrated 15 years ago. In short, the system will be alive.
And then what happens? There will be headlines, of course; textbooks will be rewritten; and early in the morning someone will probably be awakened by a phone call from Stockholm. But after all the hullabaloo dies down; someone else will ask, “Well, so what?” That same question could have been asked when the double-helix structure of DNA was published in 1953. The magnitude of the discovery was not apparent until years later. I think that the first system of molecules capable of reproducing itself will also seem to be an academic exercise at first. But to put it in proper perspective, recall that food, antibiotics, oil, wood, methane, and hydrogen are produced by living cells resulting from more than three billion years of evolution. I think the next revolution in technology will begin when the synthetic functions of life can be performed by simplified versions of cells that are designed from blueprints rather than through evolution.
David Deamer is a research professor of biomolecular engineering at the University of California, Santa Cruz. He is currently writing a book on the origin of life, to be published by the University of California Press. | https://www.technologyreview.com/s/413108/first-life-and-next-life/ |
Roshi’s first album release with Aviary Bridge Records is an evolving and boundless project which explores various sectors of the electronic music scene. An album filled with contrasts, “Cold Summer” is indeed an apt description for the release. In the background, nostalgic summery vibes combine with gentle icy ambience. In the foreground, organic instruments gently play alongside aggressive synthesised basses. One of “Cold Summer”’s most notable characteristics is it’s spaciousness; this is an album that should be listened to on headphones for the full intended experience.
A multi-faceted album, genres intertwine freely in “Cold Summer”, giving light to a whole new kind of sound which is difficult to define. Distinct characteristics from multiple sub-genres can be clearly distinguished, and yet they merge seamlessly together to create something entirely new. Organic future garage percussion, trap influenced drums and the kind of textured, frozen string instruments that so often found in downtempo are just some of the ingredients that make up this beautifully creative endeavour. | https://www.aviarybridgerecords.com/blog/cold-summer-roshi |
The ‘Tartaruga’ project research group at the University of Madeira (UMa), is currently treating two sick females turtles in the hope that they can be returned to the wild. Although the group, which has been active since 1994, main objective is research and observation of sea turtles, they have issued a statement saying that they naturally assist any injured or distressed turtles brought to them, especially those who are rescued by the Maritime Police, GNR or by the Arrojamentos Network of the Autonomous Region of Madeira.
However, says Filipa Duarte, a Biology graduate who is studying for his Masters in Conservation Biology, there are two turtles currently being treated: these are a Humpback and a Caravel. Both have received veterinary help, but one will need further medical examinations and the project does not have the funds to pay for its treatment. They also state that they already owe €150 for the treatment of a third turtle they named ‘Maria Manuela,’ who has been returned to the wild. Maria Manuela was found with suspected pneumonia, unable to swim, dive and was blind in one eye. She was treated with antibiotics and released into the wild last November.
The sea around Madeira is a popular habitat for turtles and every year, through no fault of their own many are rescued having become old, sick or injured with many becoming entangled in cables and fishing lines. Unfortunately, the cables wrap round the creatures fins and as they struggle to loosen the bonds they in fact become tighter, cutting off blood supplies to the affected areas which leads to limb loss.
As funds are in short supply, the project as that if you are able to help in any way, please visit the UMa’s website http://ppl.pt/causas/tartaruga.
The turtle fundraising campaign started on the 15th of July and ends on the 3rd of August. | https://madeira-weekly.com/2020/07/22/turtle-project-seeks-financial-help/ |
A flurry of color moves through this painting of Japanese maple trees, inspired by a recent trip to Kyoto, Japan. The impressionistic brush strokes are loose and lively, creating a mosaic of color and texture across the canvas.
"Maple Dance" was created on 1-1/2" canvas, with the painting continued around the edges. The painting has been framed in a custom-made, gold floating frame.
ERIN HANSON is a life-long painter, beginning her study of oils as a young child. Her passion for natural beauty is seen in her work as she transforms vistas familiar and rare into stunning interpretations of bold color, playful rhythms and raw emotional impact. Her frequent forays into National Parks and other recesses of nature include backpacking expeditions, rock climbing, and photo safaris. Hanson's unique painting style has become known as Open Impressionism, with hundreds of collectors eagerly anticipating her work. As an iconic, driving force in the rebirth of contemporary impressionism, Hanson is quickly recognized as a prolific, modern master.
Subscribe to the weekly newsletter for insider artist updates! | https://www.erinhanson.com/p/Maple_Dance |
The Common Dolphin is the name given to up to three species of dolphin making up the genus Delphinus.
The most common of these dolphins are the Long Beaked Dolphin and the Short Beaked Dolphin. The third species (D. tropicalis, common name usually Arabian Common Dolphin), is characterized by an extremely long and thin beak and found in the Red Sea and Indian Ocean.
Common dolphins are also known by other names: Saddleback dolphin, White-bellied porpoise, Criss-cross dolphin, Hourglass dolphin and Cape dolphin. Despite its name the common dolphin is not the dolphin of popular imagination – that distinction belongs to the Bottlenose Dolphin, largely due to the television series’ Flipper’.
The common dolphin is widely distributed in temperate, sub-tropical and tropical waters throughout the world in a band roughly spanning 40 degrees south to 50 degrees north. Their preferred surface water temperature is 10 – 28 degrees Celsius. The sum population is unknown but numbers in the hundreds of thousands.
Characteristics of the Common Dolphin
Common dolphins have an hourglass pattern and tan or yellowish patch on each side which makes them easily recognisable, although they can sometimes be confused with Striped Dolphins. They have a dark cape ranging from black to brown with a v-shape under the dorsal fin. Their undersides are white with the occasional yellow streak and they have a white tail stock. Their flukes are dark on both sides and their dorsal fins range from curved to triangular and can be coloured black, greyish white or somewhere in-between. There are only subtle differences between the males and females which sometimes makes it difficult to tell them apart.
Common Dolphins have a streamlined body and a long slender beak. They have a single blowhole and their flippers are pointed. Common dolphins are fast active swimmers.
When they are born, common dolphins are about 80 centimetres long (32 inches). Common dolphins can grow to be between 1.7 and 2.4 metres (5 feet 9 inches – 8 feet) in length.
Little is known about how much common dolphins weigh at birth, however, as adults, they weigh between 70 and 110 kilograms (155 – 245 pounds).
Common Dolphin Behaviour
Common dolphins travel in groups of around 10 – 50 in number and frequently gather into schools containing 100 to 2000 individuals. Their school size depends upon the time of day and season. When they are frightened, they bunch tightly together. Common dolphins are fast swimmers and enjoy acrobatics. These schools are generally very active – groups often surface, jump and splash together. Typical behaviour includes breaching, tail-slapping, chin-slapping, bow-riding and porpoising.
Common Dolphins do short dives of 10 seconds to 2 minutes, although dives of 8 minutes have been recorded.
Common dolphins have been seen to mix with other cetaceans such as other dolphins in the Yellowfin tuna grounds of the eastern Pacific and also schools of Pilot Whales. An interesting theory suggests that dolphins ‘bow-riding’ on very large whales was how they began to bow-ride on boats.
Common Dolphins are found in many enclosed seas and are rarely seen in waters less than 180 metres deep. In some areas, common dolphins are present all year round but other populations migrate seasonally. Common Dolphins can be observed regularly around the Galapagos waters.
Common Dolphin Diet
The diet of the Common Dolphin mainly consists of fish and squid.
Common Dolphin Communication
Common Dolphins are highly vocal and can be heard above the surface.
Common Dolphin Reproduction
The gestation period for the female Common dolphin is about 11 months and the calving period is between 1 and 3 years. Common dolphins become sexually mature at 5 years and their life span varies between 20 to 25 years. These figures are subject to large variation across different populations.
Common Dolphin Predators
Some sharks (including tiger sharks, dusky sharks, and bull sharks) and orcas will prey upon dolphins. Dolphins are also often trapped in fishing nets.
Common Dolphin Conservation
Common dolphins face a mixture of threats due to human influence. Populations have been hunted off the coast of Peru for use as food and shark bait. In most other areas the dolphins have not been hunted directly. Several thousand individuals have been caught in industrial trawler nets throughout their range. Common dolphins were abundant in the western Mediterranean Sea until the 1960s but occurrences there have tailed off rapidly. The reasons are not well understood but are believed to be due to extensive human activity in the area. In the U.S. they are a protected species and sometimes are caught by accident in some trawler nets as bycatch, though despite this they are still quite common throughout their range. | https://animalcorner.org/animals/common-dolphin/ |
Democracy Quotes | Original and Famous Quotes for the International Day of Democracy
Every year, the 15th of September is observed by all member states of the United Nations as International Day of Democracy. The primary purpose of this international day is to advance the principles and values of democracy all over the world.
So in honor of this very important day of the year, we have prepared for you a fine list of original and famous democracy quotes. Use these profound quotes to celebrate this beautiful form of government known as democracy.
Famous Democracy Quotes
- Anti-intellectualism has been a constant thread winding its way through our political and cultural life, nurtured by the false notion that democracy means that ‘my ignorance is just as good as your knowledge’.
- Let us not seek to satisfy our thirst for freedom by drinking from the cup of bitterness and hatred.
- Man’s capacity for justice makes democracy possible, but man’s inclination to injustice makes democracy necessary.
- People shouldn’t be afraid of their government. Governments should be afraid of their people. Alan Moore
- As I would not be a slave, so I would not be a master. This expresses my idea of democracy. Abraham Lincoln
- Democracy is worth dying for, because it’s the most deeply honorable form of government ever devised by man. Ronald Reagan
- Democracy cannot succeed unless those who express their choice are prepared to choose wisely. The real safeguard of democracy, therefore, is education. Franklin D. Roosevelt
- When Jefferson and the Republicans rallied to the Union and to the existing Federalist organization, the fabric of traditional American democracy was almost completely woven. Herbert Croly
- Democracy must be built through open societies that share information. When there is information, there is enlightenment. When there is debate, there are solutions. When there is no sharing of power, no rule of law, no accountability, there is abuse, corruption, subjugation and indignation. Atifete Jahjaga
- If we put our trust in the common sense of common men and ‘with malice toward none and charity for all’ go forward on the great adventure of making political, economic, and social democracy a practical reality, we shall not fail. Henry A. Wallace
- Everybody now seems to be talking about democracy. I don’t understand this. As I think of it, democracy isn’t like a Sunday suit to be brought out and worn only for parades. It’s the kind of a life a decent man leads, it’s something to live for and to die for. Dalton Trumbo
- Freedom of expression — in particular, freedom of the press — guarantees popular participation in the decisions and actions of government, and popular participation is the essence of our democracy. Corazon Aquino
- It’s not unpatriotic to denounce an injustice committed on our behalf, perhaps it’s the most patriotic thing we can do.
- Democracy is a daring concept — a hope that we’ll be best governed if all of us participate in the act of government. It is meant to be a conversation, a place where the intelligence and local knowledge of the electorate sums together to arrive at actions that reflect the participation of the largest possible number of people. Brian Eno
- I don’t have any formula for ousting a dictator or building democracy. All I can suggest is to forget about yourself and just think of your people. It’s always the people who make things happen. Corazon Aquino
- Democracy is the only system capable of reflecting the humanist premise of equilibrium or balance. The key to its secret is the involvement of the citizen. John Ralston Saul
- Let us never forget that government is ourselves and not an alien power over us. The ultimate rulers of our democracy are not a President and senators and congressmen and government officials, but the voters of this country. Franklin D. Roosevelt
- Deliberation and debate is the way you stir the soul of our democracy. Jesse Jackson
- A great democracy has got to be progressive or it will soon cease to be great or a democracy. Theodore Roosevelt
- Democracy literally means the power of people. Democracy is not about politics, it is about the people. Tsakhiagiin Elbegdorj
- At the time of the Civil War, there were six democracies in the face of the planet. Today, there’s 120 and they’ve been inspired by the American exceptionalism. Robert Kennedy, Jr.
- The Revolution introduced me to art, and in turn, art introduced me to the Revolution!
- I believe that democracy is the best guarantor for peace and cooperation among nations. Atal Bihari Vajpayee
- Protest beyond the law is not a departure from democracy; it is absolutely essential to it.
- The genius of our ruling class is that it has kept a majority of the people from ever questioning the inequity of a system where most people drudge along paying heavy taxes for which they get nothing in return.
Original Democracy Quotes
- There can never be complete democracy without an absolutely free press.
- Finding her way to democracy remains the most important thing my country ever did for herself and her citizens.
- I love Democracy because it gives me the right to enjoy a better life on this planet.
- In countries where the principles of democracy are religiously upheld, governments are afraid of the people and not the other way round.
- Democracy the dictator’s worst nightmare!
- I cherish our democracy as much as I cherish my life.
- Despite being one of mankind’s greatest inventions, it’s sad how democracy is seldom included in the lists of the greatest inventions of all time.
- I’d rather live as a pauper in a democracy than live as a rich man in a dictatorship.
- The beauty of democracy is beyond description.
- The ordinary man who wants to understand the benefits of democracy should spend more time in an authoritarian state.
- Good things happen to nations that embrace democracy.
- Democracy is one of the few things that separate us from the animals in the wild.
- Free speech is the cornerstone of every democracy.
- In my eyes, the poorest nation on earth that practices democracy is richer than the richest nation that doesn’t.
- If democracy were a woman, she would be more beautiful than Marilyn Monroe.
- The lifeblood of democracy is a free and independent press.
- Democracy doesn’t need any makeup to look beautiful. Even in her ugliest form she is a hundred times more beautiful than dictatorship in her most beautiful form.
- Folks, if there’s one thing I have learned over the years, it is to never give up on democracy no matter how tempting giving up becomes.
- Every time I wake up from sleep, the first thing I do is thank my Creator for putting me in a country where democracy is alive.
- I am a firm believer in the fact that even the disadvantages of democracy are better than the advantages of dictatorship.
- I have tasted every form of government that exists in this world and have found out that none tastes as sweet as democracy.
- The stronger the principles of democracy are in a given country, the better the lives of its citizens.
- Democracy, thou art a priceless treasure to the human race.
- The rule of law is what is needed to make democracy flourish.
- Freedom is one of the priceless treasures of the universe. And since democracy guarantees a ton of freedom, I shall love it until my dying days.
- I am blessed because I live in a fully fledged democracy.
- You can take away everything from my country, but not her democracy.
- Democracy is the only system of government I can gladly die for.
- They say too much of everything is bad. The only exception is too much democracy.
- Forever a believer in democracy.
- Democracy means the universe to me. I can therefore not settle for anything less than it.
- Democracy is hard at the beginning, confusing in the middle and sweet at the end.
You may also like: | https://www.birthdaywishes.expert/democracy-day-quotes/ |
Background The reach, effectiveness, adoption, implementation, and maintenance (RE-AIM) framework was developed to determine potential public health impact of interventions (i.e., programs, policy, and practice). The purpose of this systematic review was to determine (1) comparative results across accurately reported RE-AIM indicators, (2) relevant information when there remains under-reporting or misclassification of data across each dimension, (3) the degree to which authors intervened to improve outcomes related to each dimension, and (4) the number of articles reporting RE-AIM dimensions for a given study. Methods In April 2013, a systematic search of the RE-AIM framework was completed in PubMed, PSYCHInfo, EbscoHost, Web of Science, and Scopus. Evidence was analyzed until January 2015. Results Eighty-two interventions that included empirical data related to at least one of the RE-AIM dimensions were included in the review. Across these interventions, they reached a median sample size of 320 participants (M = 4894 ± 28,256). Summarizing the effectiveness indicators, we found that: the average participation rate was 45 % (±28 %), 89 % of the interventions reported positive changes in the primary outcome and 11 interventions reported broader outcomes (e.g., quality of life). As for individual-level maintenance, 11 % of studies showed effects ≥6 months post-program. Average setting and staff adoption rates were 75 % (±32 %) and 79 % (±28 %), respectively. Interventions reported being delivered as intended (82 % (±16 %)) and 22 % intervention reported adaptations to delivery. There were insufficient data to determine average maintenance at the organizational level. Data on costs associated with each dimension were infrequent and disparate: four studies reported costs of recruitment, two reported intervention costs per participant, and two reported adoption costs. Conclusions The RE-AIM framework has been employed in a variety of populations and settings for the planning, delivery, and evaluation of behavioral interventions. This review highlights inconsistencies in the degree to which authors reported each dimension in its entirety as well as inaccuracies in reporting indicators within each dimension. Further, there are few interventions that aim to improve outcomes related to reach, adoption, implementation, and maintenance. | https://vtechworks.lib.vt.edu/handle/10919/63990 |
Compared – Practical Plans In Literature Analysis
Literary evaluation is a proper vital evaluation and interpretation of literary type, topic texts, genres of literature, method, and use of fashion and content material Nov 19, 2018 A literary evaluation essay is writing, by which you study a piece of literature and understand links between small parts of texts and the entire work, and put it onto the paper. Writing a literature evaluation essay is probably probably the most difficult assignments. Nonetheless, to write Literary Analysis Thesis Statement Examples down an excellent Literature paper, it’s best to make considerably more. For instance, you should perceive the distinction between a analysis paper and an analytical essay, references and footnotes, and so on. In addition, do not forget that you will need to know methods to write interesting conclusions, eye-catching introductions, and many others.
It’s okay to have summary in your paper, but it absolutely should solely be summary that helps to help a degree of analysis. Barely than merely Literary Analysis Sample Examples Of Literary Analysis telling us what” occurred within the e-e book, poem, play and so forth., inform us why” it occurred and what it means.
In writing an analytical essay, your paragraphs will every have a essential topic that helps your thesis. If a blank page intimidates you, then begin with an overview, make notes on what examples and supporting analysis will go in each paragraph and then construct the paragraphs following your outline. You can start by writing one line for every paragraph and then going again and filling in additional information, the examples and research Sample Literary Analysis Essays, or you can begin with the primary most important paragraph and full one after the opposite start to end, together with the analysis and quotes as you draft. Either means, you’re most likely going to reread the entire thing several occasions, flesh issues out where the argument is incomplete or weak, and fiddle with sentences right here and there as you revise.
Fundamental Factors Of literature essay examples – The Best Routes
The hardest a part of making a readable essay lies within the pitfalls associated with the writing course of. Whereas it might seem simple for one to put in writing literary criticism, many notorious errors will be accomplished at this level. The quantity-one problem many individuals face while creating literary essays is connected with wording. Instead of providing a vital analysis that highlights why a particular event has happened, nearly all of writers deal Literary Analysis Sample with the what” aspect, simply restating the already known fact from a guide or novel. One of the best ways to get away with this mistake is to activate essential pondering and write constructive, non-obvious statements. Another factor you should by no means resort to is query the validity of your personal claims. Let’s face it: nobody goes to learn a literature essay wherein you utilize qualifiers like possibly”, most likely,” maybe” and so on. These will solely tarnish the quality of your evaluation.
Your introduction must identify the chosen work of literature, give its background information, and present your predominant idea briefly. It should Literary Analysis Paper counsel that it describes something attention-grabbing. Read extra about the services equipped by our essay writers.
All you want is to download a literary analysis example on an analogous topic, modify it to your calls for, write down the key points and follow the construction ap english literature and composition sample essays, when completing your personal essay. This can’t be taken for a fraud and can certainly offer you a route for the longer term paper.
With the help of skilled essay helper, you possibly can neglect about such discomfort as lack of time, improper abilities, no understanding of the subject Literary Essay Graphic Organizer, and extra. Rely on the highest educational assist with the time period paper, help writing an essay, and even such a severe undertaking as a dissertation.
Let’s take a look at some widespread essential evaluation essay matters to provide you an concept of simply how broad this essay format is. The very first thing to remember Examples Of A Literary Analysis is that your job is to not de-legitimize this author’s work. Your post is to serve the reader by exploring the work with them, opening up features that have been ignored or neglected.
Exploring Significant Details For essay sample
Should you’re pondering it’s a pity you were born in these instances as a result of no good books are written anymore, you might be mistaken. What we now think about large classics were not so scorching during their occasions either and that is Literary Analysis Essay the cycle of literature, to turn out to be worthwhile a certain time after the e book is released. So, if you want to go along with contemporary literature in your essay, here are some ideas. | https://www.amblive.com/compared-practical-plans-in-literature-analysis/ |
The literature related to people with borderline intellectual functioning (BIF) was systematically reviewed in order to summarize the present knowledge. Database searches yielded 1,726 citations, and 49 studies were included in the review. People with BIF face a variety of hardships in life, including neurocognitive, social, and mental health problems. When adults with BIF were compared with the general population, they held lower-skilled jobs and earned less money. Although some risk factors (e.g., low birth weight) and preventive factors (e.g., education) were reported, they were not specific to BIF. The review finds that, despite the obvious everyday problems, BIF is almost invisible in the field of research. More research, societal discussion, and flexible support systems are needed.
People with borderline intellectual functioning (BIF) have an IQ test score that is one to two standard deviations below average, in the range of 70 to 85. If normal distribution of intelligence is considered, 13.6% of the population fits into that category. Not all of the people who score in this IQ range have problems with adaptive behavior (conceptual, social, and practical skills), nor do they all need support, but this figure can be used as a guide. Despite the high percentage of people in this category, BIF is a rarely studied topic. When it is included in studies, the focus of the research is often on people with mild intellectual disability (MID) or a specific learning disability (SLD), and the BIF group is either combined with these or treated as a control group. There seem to be two traditions examining BIF: medical and pedagogical. Generally speaking, the medical tradition concentrates on BIF as a consequence of some medical condition, and the pedagogical tradition concentrates on the difficulties of teaching children with BIF. A research tradition focusing on BIF for its own sake, however, is lacking. There is also no unanimous term for the phenomenon of BIF, and it has had numerous names in the past. The names used in the literature include, for example, borderline mental retardation, slow learner, mild cognitive impairment, and general learning disability.
Historically, there has been interest in BIF in the intellectual disability (ID) community in the late 1960s and again in the late 1990s. In the 1960s, the American Association on Intellectual and Developmental Disabilities (AAIDD; formerly called the American Association on Mental Retardation) defined those with an IQ test score of 70 to 85 as eligible for classification as mentally retarded (Heber, 1959, 1961). The report by the President's Committee on Mental Retardation (PCMR), “The Six-Hour Retarded Child,” identified the group of children who were labeled as mentally retarded during school hours based solely on an IQ test score without regard to their adaptive behavior (President's Committee on Mental Retardation, 1969). Outside the academic setting, however, these children seemed to manage reasonably well. The report was also concerned with overrepresentation of ethnic groups and poverty among those children labeled as mentally retarded. In the early 1970s, the classification system around mental retardation was modified, and BIF was removed from the diagnostic category (Grossman, 1973). Three decades later, the PCMR revisited “The Six-Hour Retarded Child” in a report and book entitled The Forgotten Generation (President's Committee on Mental Retardation, 1999; Tymchuk, Lakin, & Lucasson, 2001). The general proposition of the report was that adults with mild cognitive limitations face challenges in every aspect of life—finances, employment, housing, well-being, and family—and that they become more vulnerable as the demands of society grow increasingly complex. This proposition was supported by Fujiura (2003) when he studied a group of Americans with mild intellectual impairments and found a sizable cohort of Americans who shared many support needs and social and economic vulnerabilities with those labeled as “mentally retarded.” This cohort was distinguishable from the general population of the United States as well as from those with SLDs.
Since 1973, BIF has not been included in any diagnostic category. The 11th edition of the AAIDD manual (Schalock et al., 2010) defines intellectual disability as being characterized by significant limitations (approximately 2 standard deviations below the mean) in both intellectual functioning and adaptive behavior. Even though BIF does not meet the diagnostic criteria of ID, the AAIDD manual recognizes it by describing individuals who fall slightly above the upper ceiling for a diagnosis of ID and often face challenges in society that are similar to those faced by persons with ID who have lower IQ scores. The manual calls for nonstigmatizing, accessible, and individualized support for these people. In the Diagnostic and Statistical Manual of Mental Disorders (5th ed.; DSM-5; American Psychiatric Association, 2013), BIF is recognized in a section labeled “other conditions that may be the focus of clinical attention.” The manual advises that differentiating BIF and mild ID requires careful assessment of intellectual and adaptive functions and their discrepancies. The manual defines intellectual disability as a disorder that includes both intellectual deficits (approximately 2 standard deviations below mean; IQ test score of 65–75) and adaptive functioning deficits. DSM-5 emphasizes the role of adaptive functioning. It advises that the levels of severity should be defined based on adaptive functioning and that clinical judgment should be used when interpreting the results of IQ tests. DSM-5 also points out that IQ test scores are approximations of conceptual functioning and that, for example, a person with an IQ test score above 70 may have severe problems in adaptive functioning. The DSM-5 and the AAIDD manuals emphasize the role of adaptive behavior. In the International Classification of Diseases (ICD-10; World Health Organization [WHO], 1992), mental retardation is described as a condition of arrested or incomplete development of the mind. It is characterized by impairment of the skills that contribute to intelligence (i.e., cognitive, language, motor, and social abilities). The role of IQ is emphasized when the manual describes the degrees of mental retardation that are estimated by standardized intelligence tests and that can be supplemented by assessing social adaption.
For the people with BIF, all the manuals imply the same difficulty: However severe a person's problems with adaptive behavior may be, people with BIF are not eligible to receive a diagnosis of ID and they cannot gain access to ID-related support and services because their IQ is “too high.” This is true if IQ is used as an eligibility criterion instead of needs-based access to support and services. People with BIF can also be left without appropriate support in school because they are not necessarily eligible for the special education services meant for students with SLDs. In the DSM-5, SLD is described as a “specific learning disorder” and in ICD-10 it is defined as “specific developmental disorders of scholastic skills.” Both definitions include the assumption that learning difficulties are not attributable to intellectual disabilities and that there is a discrepancy between performance in academic skills and the general level of intelligence.
The field now acknowledges, in research as well as in practice, the multiple social and functional problems as well as the lack of targeted support related to BIF. But despite this acknowledgement and the earlier interest in the topic, the research remains scant. There is still no unanimous name for the phenomenon and no norms to guide how to treat people with BIF. The purpose of the present study is, in addition to increasing knowledge about the problems and risk factors related to BIF, to examine the prevalent situation in light of current literature and to bring the topic up for societal and research discussion. First, we were interested in the general information on studies concerning BIF: publication and population details, the terms used, and the quality of the studies. Second, we wanted to know what difficulties people with BIF face across their life courses in comparison to those the general population faces. Third, we attempted to determine whether there were any risk or preventive factors visible in the studies.
Methods
In our study, we systematically collated empirical group evidence that fit prespecified eligibility criteria in order to answer research questions. We used explicit, systematic methods that were selected with a view to minimizing bias.
Eligibility Criteria
We originally planned to include studies if the participants in them had an IQ test score measuring 70 to 85. However, as only a few studies used this exact criterion (Table 1), we also included studies where most of the subjects in a BIF group met the criterion. No age limits for the participants were set. Group studies reporting results relevant to the study questions were included. Outcomes were considered relevant if they dealt with neuropsychological, social, mental health, independence, risk, or preventive issues.
Search Methods for Identification of Studies
In March 2012, we carried out our electronic database searches. The following databases were searched: ERIC (Educational Resources Information Center, 1960 to March 2012), ISI (Web of Science, 1945 to March 2012), MEDLINE (1950 to March 2012), and PsycINFO (1887 to March 2012). All searches were restricted to the English language. The search strategy used to search ISI was “Topic,” which searches the title, abstract, and key words of the records. This search was modified as necessary to search other databases (modifications available upon request from the first author). The search terms (combined with “or”) were as follows: borderline developmental disability, borderline intellectual functioning, borderline intellectual disability, borderline IQ, borderline learning disability, borderline mental retardation, minor intellectual disability, general learning disability, general learning disorder, gray-area children, marginal learners, slow learners, garden variety slow learners, and nonspecific learning disabilities.
In addition to these searches, we carried out two other searches in the same period. We noted the references of the studies included for review from the database searches and then conducted a manual search for the titles and abstracts in four journals (American Journal on Intellectual and Developmental Disabilities, Intellectual and Developmental Disabilities, Journal of Applied Research in Intellectual Disabilities, and Journal of Intellectual Disability Research) from the beginning of 2000 to March 2012. These journals were selected on the basis that they were the ones most commonly found in the reference lists of the studies that had already been included.
Study Selection Process
Citations identified through database searches were transferred to the reference management program RefWorks (www.refworks.com) and duplicate citations were removed. The titles and abstracts were examined and a study was excluded if the inclusion criteria were not met. The excluded records were coded into one of four categories: (a) “no IQ”: intelligence quotient was not determined in the study; (b) “wrong IQ”: intelligence quotient of most of the participants did not fall within the range of 70 to 85; (c) “not a group study”: only group studies were included in order to collate extensive information; and (d) “irrelevant results”: the results of the study were irrelevant to our study questions. If the criteria were fulfilled, or fulfillment was uncertain, the studies were included for full-text evaluation, and they were assessed for eligibility using the four categories previously described. If the reason for exclusion was “irrelevant results,” the study was marked on an extraction sheet (see “Methods for Handling Data”). The studies that fulfilled the inclusion criteria were included in the final sample for systematic review. At this point, the studies identified through additional searches were included in the sample. The study selection process was carried out by the first author (MP, a doctoral student). Reliability was confirmed by two reliability checks: random samples of 88 (7.3%) citations identified through database searches, and 10 full-text articles (5.8%) were coded by another author (VN, PhD). In both checks, the initial agreement between coders was 90% and a final consensus was reached by discussing the differences.
Methods for Handling Data
An extraction sheet was used for the studies that were excluded as irrelevant. The sheet covered author, publication year, population characteristics, aim, results and conclusions, and reasons for exclusion.
An inclusion sheet was used for the included studies to collect descriptive information. The following information was gathered: author, year, country, journal, number of participants (study/control groups), gender, age, term used, data collection year, how data was collected, IQ score and how it was measured, aims, hypotheses, main outcomes, and main conclusions.
The methodological quality of the included studies was evaluated using the criteria created by Dalemans, De Witte, Wade, and Van Den Heuvel (2008). They based their list on different criteria lists for nonrandomized studies (Downs & Black, 1998; Prins, Blanker, Bohnen, Thomas, & Bosch, 2002). The criteria list has later been used also by Verdonschot, de Witte, Reichrath, Buntinx, and Curfs (2009). The list consists of 15 items: six items describe aspects of informativity, four items describe external validity, and five items describe internal validity. Two authors (MP and VN) assessed the quality of all the studies independently, reaching initial agreement of 91% (Cohen's kappa 0.78). Final consensus was reached by discussing the differences.
Results
Figure 1 shows the study selection process. The database searches produced 1,726 citations. On the basis of the title and abstract evaluations, full texts of 203 studies were obtained, of which 45 were included in the final sample. Four studies were found by the additional searches, bringing the final number of studies to 49.
General Information on Studies
Publication and population details
Table 1 shows publication and population details of all 49 studies. Of these, 33 were published after 2000, 10 in the 1990s, 5 in the 1980s, and 1 in the 1970s. Thirty-nine percent took place in the United States. Other locations were the Netherlands (18%), United Kingdom (12%), Germany (8%), India (6%), Australia (4%), Canada (4%), and one study each from Italy, Norway, Finland, New Zealand, Sweden, and Iran. The sample sizes varied between 11 and 8,450 subjects (mean 667). The total of all subjects was 32,663. Of the studies, 48% focused on children, 23% on children and adolescents, 10% on adolescents, 12% on adults, and the rest spanned multiple age groups. In 26 studies, the majority of subjects was men; in only two studies was the majority composed of women.
Terms used
Of the original 16 terms included in the database searches, seven were used in the included studies: borderline intellectual disability (in seven studies), borderline intellectual functioning (15), borderline intelligence (eight), borderline IQ (six), borderline learning disability (one), borderline mental retardation (four), and slow learners (five).
Methodological quality of the studies
The methodological quality rating of the studies varied between five and 15 (maximum possible 15), with the mean being 10.9 (see Table 2). In general, informativity and internal validity were better than external validity.
Only 8.2% of the studies were conducted with general population samples. Subjects with BIF were often recruited from clinics or hospitals (30.6%), and from special schools or special education classes (30.6%; Table 1).
Neurocognitive Functioning
Academic and cognitive skills
Eighteen studies concentrated on the academic or cognitive skills of people with BIF. The studies, recruitment processes of the subjects, tests used, and outcomes are described in detail in Table 3. Limitations for generalization and comparison of results are set by the different subject recruitment processes among the studies. The place of recruitment varied between mainstream schools (six studies), special schools (nine), and clinics (three). In addition to below-average IQ, criteria for recruiting the subjects also included reading difficulties (in 3 studies), mathematical difficulties (1), and poor school performance (3). It is thus possible that participants with difficulties in academic achievement were overrepresented in the BIF samples. The methodological quality scores of the studies (Table 2) varied from 5 to 14 (mean 9.7). The number of subjects varied between 45 and 411 (mean 134).
An assessment of memory skills was included in eight studies (Alloway, 2010; Birch, 2003; Bonifacci & Snowling, 2008; Henry, 2001; Kortteinen, Närhi, & Ahonen, 2009; Maehler & Schuchardt, 2009; Schuchardt, Gebhardt, & Maehler, 2010; Swanson, 1994). Overall, children with BIF were outperformed by peers of the same age with average intelligence. Two exceptions were reported for visual memory by Henry (2001) and Kortteinen et al. (2009). They found no differences between the BIF group and the control groups. Henry also studied more complex memory functions, in which the performance was at the same level in both groups, although Henry believed a ceiling effect for the average control group was possible. In general, a deficit in memory functions of people with BIF seems clear. In 51 tasks, performance was poorer than that of average intelligence peers, and in only six tasks was performance at the same level for both groups.
Schuchardt et al. (2010) and Schuchardt, Maehler, and Hasselhorn (2011) studied whether the deficits in working memory functions reflect a developmental lag or a qualitative deviation from normal development by matching the mental ages of children with BIF with those of average intelligence. In the first study (2010), they reported that children with BIF show structural abnormalities in their phonological store, and developmental lags in their visuospatial and central executive subsystems. After the second study (2011), however, they concluded that, because the performance of children with BIF corresponded with that of a control group matched for mental age, the findings indicated a developmental lag. Hence, these children's working memory functions seemed to develop in line with their general intellectual abilities.
Alloway (2010) and Hartman, Houwen, Scherder, and Visscher (2010) studied the executive functions of children with BIF by comparing them with a control group of children of the same age. Hartman et al. (2010) studied planning skills, and Alloway examined shifting attention, cognitive inhibition, problem solving, planning, and response inhibition. Poorer results were detected systematically in all presented tasks. A few other studies also examined skills related to executive functions. Napora-Nulton (2003) studied processing speed in familiar and novel situations, and reported all reaction times as being slower in the BIF group than in the average children. In addition, Bonifacci and Snowling (2008) studied processing speed. Four reaction-time tests showed poorer performance (in speed and in accuracy) for children with BIF than for the children in the control group, as did the test of sustained attention. However, van der Meer and van der Meere (2004) reported impulse control skills of children with BIF as being similar to those of children in the control group with average intelligence.
The arithmetic skills of children with BIF were constantly observed to be poorer than those of the children in the average control group (Claypool, Marusiak, & Janzen, 2008; Kortteinen et al. 2009; MacMillan, Gresham, Bocian, & Lambros, 1998). The results for reading, spelling, and related skills were not as clear. MacMillan et al. (1998) found reading and spelling skills to be poor, as did Kortteinen et al., regarding their participants with BIF and reading disabilities (RD; 47% of their participants with BIF also had RD). However, the reading and spelling skills of the participants with BIF and no RD were at the level of average controls. Bonifacci and Snowling (2008) as well as Claypool et al. (2008) found reading skills to be better in the average control group. Although Atkinson (1984) did not compare the adults in his study directly with the average control group, the results indicate poor reading skills among the adults, because 17% were defined as semiliterate and 12% as nonreaders. Regarding the other skills related to reading and spelling that were studied, performance in most of the others tasks was poor (auditory processing, phonological and syntactic skills, and reading comprehension; Birch, 2003; Kortteinen et al., 2009). For participants with BIF and no RD, rapid naming performance was at the level of those in the average control group, but for those with BIF and RD, task outcomes were poorer (Birch, 2003; Kortteinen et al. 2009).
A study on acquiring abstract theories (Mähler, 2005) reported that students with BIF used theories that were more immature than the ones used by their peers of average intelligence. They preferred intentional mechanism as a relevant causal explanation (e.g., “If I wish my child to have blue eyes, she will have them.”) over more sophisticated mechanisms. Children with BIF were also found to use less advanced learning strategies than other children used. For example, they preferred an “isolation strategy” over a “global strategy”; that is, they focused on a single element of a task rather than on its global element (Swanson, 1994). Swanson also found that students with BIF benefit less from hints or clues than students in control groups do.
In their follow-up study, Fernell and Ek (2010) reported that pupils with BIF, assessed in Grade 4, received grades that were significantly lower when finishing compulsory school than those received by their peers with average intelligence.
Motor skills
Three studies (Hartman et al., 2010; Vuijk, Hartman, Scherder, & Visscher, 2010; Westendorp, Houwen, Hartman, & Visscher, 2011) reported on the motor skills of children with BIF. Vuijk et al. (2010) found that 40% of children with BIF showed no problems with motor skills, 17% showed borderline problems, and 43% showed definite motor problems when their performance was compared with the norms of the Movement Assessment Battery for Children. Both Hartman et al. and Westendorp et al. studied gross motor skills. They similarly found children with average intelligence outperforming students with BIF on both subscales. Westendorp et al. reported that, of the 12 skills studied, only three (hop, jump, throw) were at the same level of performance in the two groups.
Comparison of mild intellectual disability (MID) and specific learning disabilities (SLDs)
Some of the above studies also reported results for people with MID or SLDs. Six studies (see Table 3) compared subjects with MID and BIF, mainly covering areas of memory, motor, and academic functioning (Hartman, et al. 2010; Henry, 2001; MacMillan et al., 1998; Schuchardt et al., 2010; Vuijk et al., 2010; Westendorp et al., 2011). Out of 17 measured skills, the BIF group outperformed the MID group in 11 skills and was at the same level in six skills. The difference between groups was clear in memory and motor functioning, because the results mainly showed better performance among people with BIF than among those with MID. Five studies compared subjects with SLDs and BIF, covering areas of memory, executive functioning, and reading (Bonifacci & Snowling, 2008; Birch, 2003; Maehler & Schuchardt, 2009; Napora-Nulton, 2003; Swanson, 1994). The SLD group outperformed the BIF group in 10 out of 15 measured skills. In five measures, the performance of both groups was at the same level. Differences between groups were particularly clear regarding executive functioning because all the measures showed poorer performance among the BIF group.
Social Behavior
Social interaction
Studies concerning peer interaction showed more solitary play and less peer- or group-play behavior among children with BIF than among those in the average control groups (Guralnick & Groom, 1987; Roberts, Pratt, & Leach, 1991). Peers seem to have a great impact on behavior: When children with BIF were paired with same-age average control children, twice as much positive interaction was observed as when they were compared with pairs of two children with BIF (Guralnick & Groom, 1987).
Fenning, Baker, Baker, and Crnic (2007) found that mothers of children with BIF exhibited less positive and less sensitive parenting than the mothers of children in the groups with average or significantly below average intelligence (IQ test score < 70). These mothers were also the least likely to display a style of positive engagement. Although children with BIF did not behave more problematically than children with average intelligence in observational situations did, their mothers reported that they had more externalizing symptoms. According to the authors, the findings suggest that parental understanding of the problems of children with BIF is inadequate and is not on the same level as, for example, the parental understanding of a child with mental retardation. The authors concluded that children with BIF are at risk for poor parenting.
Social information processing seems to differ among children with BIF when they were compared with their peers. Embregts and van Nieuwenhuijzen (2009) and van Niuwenhuijzen, Vriens, Scheepmaker, Smit, and Porton (2011) studied children's responses to video vignettes describing demanding social situations. Both studies reported mainly more passive and/or aggressive and less assertive responses in various social situations (e.g., generating spontaneous responses to problems, evaluating social situations, choosing from different ways to behave) for children with BIF than for children in the control group.
McAlpine, Kendall, and Singh (1991) studied the recognition of facial expressions in children with normal intelligence, borderline intelligence, and intellectual disability (ID). They found that children with BIF recognized all facial expressions of emotion more frequently than their peers with ID did, but less frequently than their peers with average intelligence. Van Nieuwenhuijzen et al. (2011) studied facial expressions as well and found no difference between the groups in the recognition of sad, happy, and angry expressions. However, fear was less recognized by the children with BIF than by their peers.
Social participation
Seltzer et al. (2005) found no differences in the frequency of meeting friends and relatives between high school graduates with BIF and their average-intelligence siblings in adulthood. Additionally, no differences were found in the proportions of people who had the opportunity to turn to friends, parents, siblings, or children in times of trouble. The only difference between groups was observed in the number of organizations participated in, with the BIF group participating in fewer organizations than their siblings.
Antisocial behavior
Three studies showed the prevalence rates of BIF in different criminal populations: 30% among adults in pretrial detention (Crocker, Gote, Toupin, & St-Onge, 2007), 33% among juvenile criminal offenders (Schuster & Guggenheim, 1982), and 47% among incarcerated “hardcore” juveniles (Hollander & Turner, 1985). People with BIF seem to be overrepresented in populations of criminal offenders, because the presumed prevalence of BIF would be about 14%.
Douma, Dekker, Ruiter, Tick, and Koot (2007) studied antisocial and delinquent behaviors in 526 youths (aged 11 to 24 years) with BIF. Each type of behavior (mean to others, physical aggression, theft/arson, property destruction, authority avoidance) was exhibited by roughly 10–20% of youths. Of these, physical aggression, theft/arson, and property destruction were seen more in the BIF group (19%, 12%, and 13%, respectively) than in the general population group (13%, 6%, and 8%, respectively). Boys with BIF, but not girls, displayed antisocial behavior.
Among the children with poor school performance, the prevalence of behavioral disturbances was 94% for children with average intelligence and 86% for children with BIF (Thompson, Lampron, Johnson, & Eckstein, 1990).
Mental Health
Prevalence
The prevalence of mental health problems among people with BIF was reported in four studies (Chen, Lawlor, Duggan, Hardy, & Eaton, 2006; Dekker & Koot, 2003; Emerson, Einfeld, & Stancliffe, 2010; Hassiotis et al., 2008). Whether comparing already existing diagnoses (Chen et al., 2006) or symptoms of the mental health problems (Dekker & Koot, 2003; Emerson et al., 2010; Hassiotis et al., 2008), mental health problems were more prevalent among subjects with BIF than among the general population (Table 4). Although Dekker and Koot did not include a control group in their study, they concluded that the prevalence of most mental disorders among subjects with BIF exceeded the prevalence that was observed in the general population. Chen et al. found the current emotional problems of people with BIF to be at the same level as those with ID. Emerson et al. also reported a similar prevalence of emotional and conduct problems among children with BIF and with ID. In their study, children with ID had higher levels of hyperactivity and peer problems than the children with BIF did, but they also showed more prosocial behavior.
A different observation was made by Douma, Dekker, Verhulst, and Koot (2006) when they studied self-reports on mental health problems of youth with BIF. When they compared the emotional and behavioral problem scores on the Youth Self-Report Scale of youths with BIF with the scores of their average peers, they found that the youths with BIF did not differ.
Hassiotis, Tanzarella, Bebbington, and Cooper (2011) studied rates of suicidal behavior (thoughts and acts) among a large general population sample of people with BIF. When people with BIF were compared with the general population, the people with BIF were more likely to have attempted suicide or to have harmed themselves. However, these observations were likely not to be related specifically to BIF, because differences were no longer significant after controlling for income and age.
Mental health care
Hassiotis et al. (2008) found that individuals with BIF were proportionally less likely to receive treatment for mental health problems than the general population. When they did receive treatment, they were more likely to be treated with medication, and less likely to be treated with counseling. Dekker and Koot (2003) examined children and adolescents with BIF and found 27% of those with diagnoses receiving professional help. The study did not include a control group, but authors concluded the prevalence to be similar to rates found in the general population of the same age.
Employment and Marriage
The reliability of results of five studies dealing with employment and marriage were hampered by the small sample sizes (see Table 1) and the age of the studies, three of which were over 2 decades old. Recent figures on employment were available from only one study.
Employment
In the most recent study, Seltzer et al. (2005) studied 201 pairs of siblings, those with BIF and their siblings with average intelligence, at ages 35 and 52. The employment rates did not differ between the groups. However, occupational prestige at both ages and total earnings at age 52 were significantly lower in the BIF group. Subjects with BIF had also been employed longer at their current jobs than siblings with average intelligence. Kinge (1979) studied former pupils of classes for slow learners at age 30. He reported employment rates of 81% for men and 8% for women in the BIF group, and 94% for men and 41% for women in the average intelligence group. Of the married women, the proportion of housewives was 83% in the BIF group and 62% in the average intelligence group. Of the working men, the proportion working as unskilled workers was 50% in the BIF group and 19% in the average intelligence group. In regards to the occupational status of the subjects with BIF, 19% were low-income earners. These proportions were larger than among the subjects with average intelligence (6% of men and 33% of women). Kinge did not report statistical analysis on the differences between the groups. Atkinson (1984) studied former male pupils of a special school in their fifties and found 85% of them to be employed. Of them, 62% had held the same job for over 20 years and 70% worked unskilled or semiskilled jobs. Their average weekly wage was lower than that of the general population. Zetlin and Murtaugh (1990) reported an observation that differed from the above results when they followed adolescents with BIF before and after high school graduation. Although 80% of adolescents had held at least one job during a period of two years before graduation and one year after it, they had difficulty maintaining a job. They had held one to five jobs per person, with 1 month to 3 years being the longest time spent at one job. All jobs were unskilled or semiskilled.
Marriage
Seltzer et al. (2005) found that, at age 35, the rate of marriage was somewhat lower among subjects with BIF than it was among their siblings of average intelligence (89% vs. 94%, respectively). Fifteen years later, such a difference was not found. There were also no differences in the number of children and in the proportion of those married to their first spouse. In Kinge's study (1979), 92% of women with BIF were married, which did not differ from women with average intelligence. Atkinson (1984) found 70% of former male pupils with BIF to be married. Hassiotis et al. (2008) found 56% of people with BIF and 70% of people with average intelligence were living as couples. The difference was likely to be due to the BIF group having been considerably younger than the group with average intelligence.
Risk and Preventive Factors
The methodological quality of 11 studies dealing with risk or preventive factors varied greatly, with scores from 6 to 14 points (mean 11.0; see Table 2). The sample sizes also varied widely, from 11 to 1681 (mean 397; see Table 1).
Potential risk factors for BIF were identified from seven studies. Based on three studies, the risk of BIF somewhat increased with low birth weight (LBW). The prevalence of LBW in the adult BIF population was higher (24%) than in the average intelligence population (13%) in the study of hospital birth cohorts (Chen et al., 2006). The prevalence of BIF in the group of 3-year-old children with LBW was 19% (Ramey et al., 1992). Another study reported 13% of 6-year-old children with LBW as having BIF, which is the expected prevalence of BIF in the general population (Chaudhari, Bhalerao, Chitale, Pandit, & Nene, 1999). However, the same children were followed to age 12 and the prevalence of BIF was found to increase to 24% (Chaudhari, Otiv, Chitale, Pandit, & Hoge, 2004).
Within a group of 15 4-year-olds with BIF, poor family environment (including factors such as poverty, being a member of a minority ethnic group, or living with a single parent) were present in 80% of the cases (O'Brien, Rice, & Roy, 1996). A low level of education for the mother was present in 76% of adults with BIF, compared with 68% in the average intelligence population (Chen et al., 2006). Exposure to toxic metals was detected as a potential risk for BIF in randomly selected school children with BIF, of whom 36% presented elevated levels of lead and 17% elevated levels of cadmium in comparison to 7% and 6%, respectively, in the control groups (Marlowe, Errera, & Jacobs, 1983). Farhadifar et al. (2011) reported mother's illiteracy, a familial history of ID, and maternal drug use during pregnancy as being more common for children with BIF (78%, 25%, and 21%, respectively) than for children in the control groups with average intelligence (39%, 4%, and 7%, respectively).
It seems that early developmental delays are connected to BIF. O'Brien et al. (1996) reported 73% of children with BIF as having delayed mental or motor development, as compared with 42% in children in the control group. Because the prevalence in the control group was so high, very mild developmental delays must have been included in the study. Another study reported 58% of children with BIF to have either delayed walking or delayed talking. Furthermore, 62% of children with BIF showed some form of soft neurologic signs (Karande, Kanchan, & Kulkarni, 2008. The study did not include a control group.
Three preventive factors that seem to have a positive effect on the life of those with BIF were detected: education, social contacts, and personal qualities. The positive influence of education was reported in three studies comprising favorable school records (Atkinson, 1984), education beyond high school (Seltzer et al., 2009), and more years of education (Vaillant & Davis, 2000). The same studies also reported the positive effects of social contacts, including supportive parents (Atkinson, 1984), role models for achievement (Seltzer et al., 2009), and warm relationships (Vaillant & Davis, 2000). Two studies reported personal qualities, including flexibility to change with situational demands (Atkinson, 1984), and childhood competence (including ego strength, perseverance, and relationship skills; Vaillant & Davis, 2000). It is not clear, however, whether the personal qualities have caused the more successful life paths or vice versa.
Only two studies on interventions for people with BIF were identified. Early training with 3-year-old at-risk children showed a prevalence of BIF from 5% to 8%, compared with 19% for the control group without training (Ramey et al., 1992). Adolescents with BIF showed improvement in acquiring community skills through the method of combining specific written instructions with feedback (Cuvo, Davis, O'Reilly, & Mooney, 1992).
Discussion
The review shows that many people with BIF face major difficulties across their life courses. When they were compared with the general population, neuropsychological, social, and mental health problems were evident. Although employment rates were relatively high, wages were lower than average. Low birth weight, negative family environment, mothers with low education levels, and toxic metals can be seen as risk factors for BIF. Preventive factors included education, social connections, and some personal qualities.
The purpose of the review was to collect literature concerning BIF in order to increase knowledge about the problems related to BIF, to examine the prevailing situation in the field in the light of current literature, and to bring the topic up for discussion. Of the 1,726 original citations yielded from database searches, only 49 studies made it to the final sample of the review. This is an astonishingly low number considering the nearly 14% prevalence of people with an IQ score of 70 to 85. Fortunately, research interest seems to have grown in recent years. Since 2000, studies have been carried out in 14 different countries, with most of them occurring in the United States and the Netherlands. Age groups from 2 to 74 years were represented. Among those studied, males were more represented than females. The quality of the studies varied greatly.
In general, the information on BIF is fragmentary. Based on the review, cognitive and academic difficulties are clear. Of the 52 skills measured, the performance by people with BIF was at the level of their average intelligence peers in only seven of them. With the exception of memory, only a few studies in each area were found, and studies concerning many relevant cognitive functions (e.g., conceptual learning) were unavailable.
The difficulties in neurocognitive functioning were consistently reported in relation to same-age peers. It is only in the area of memory functions that people with BIF were compared with others with a similar mental age, and the conclusion was that memory functions were at the level of their general cognitive abilities (Schuchardt et al., 2010; Schuchardt et al., 2011). Using designs that utilize control groups with a similar mental age in other areas of neurocognitive functioning would provide important information on the similarities and differences between the development of subjects with BIF and typically developing children. The design might help to identify which aspect is differentiating subjects: a developmental lag or qualitatively different functioning. These kinds of studies are important for the sake of theoretical formulations and for intervention planning.
People with BIF seem to differ from the average population in terms of their social behavior. Differences were seen in play behavior, social information processing, recognition of emotions, social participation, and antisocial behavior. Children with BIF also seem to be at risk for poor parenting. In addition, subjects with BIF were found to be overrepresented in criminal samples. As compromised learning skills put children and adolescents with BIF at risk for poor school performance, they are at a higher risk for alienation or antisocial behavior than their peers.
The prevalence of mental health problems among people with BIF was repeatedly reported as being higher than in the general population. This finding is in line with several studies that have reported mental health problems as being more common among people with mild levels of ID (Koenen et al., 2009; Linna et al., 1999; Wallander, Dekker, & Koot, 2003). The results of one study on mental health contradicted the other reviewed studies. The study found self-reports of psychiatric symptoms in youths with BIF to be similar to those with average intelligence (Douma et al., 2006). The authors concluded that the results were in contrast to the commonly found higher rates of psychiatric symptoms in people with lower intelligence, but addressed that usually the results rely on parent or teacher reports, not on self-reports. However, of the other reviewed studies, Hassiotis et al. (2008; 2010) also used self-reports and, thus, the use of a self-report does not seem to be the sole reason for the results reported by Douma et al. Age differences between the adult subjects in the studies by Hassiotis et al. and the adolescent subjects in the study by Douma et al. might partly explain the difference, because it is possible that adolescents do not recognize their problems as readily as adults.
Four studies on employment consistently reported that people with BIF, when they were compared with the general population, held lower-skilled jobs, earned lower wages, and had longer careers in the same job. Although the adults studied had mostly found their places in the job market, adolescents struggled to find and keep a job. This difference may imply that the transition from adolescence to adulthood is problematic for young people with BIF. It may also reflect changes in the labor market, at least in Western societies. One possible assumption is that, as the requirements for education have increased and the number of lower-skilled jobs has decreased, it has become more difficult for young adults with compromised intellectual functioning and related poor educational attainment to find employment.
In general, the studies reported high employment rates for subjects with BIF. Kregel (2001) reported contrary unemployment rates of 70%–80% for individuals with mild cognitive limitations (IQ test score of 55–84). The rather encouraging high employment rates in the present review may prove too optimistic, because current studies with representative samples were unavailable. Two studies examined high school graduates (Seltzer et al., 2005; Zetlin & Murtaugh, 1990), and the samples in these studies are not likely to be representative of the whole population with BIF. Instead, they represent only those with strong scholastic aptitude. Two other studies were relatively old (Atkinson, 1984; Kinge, 1979), and it is questionable how well their results generalize to modern job markets. Kinge reported in 1979 that 92% of Norwegian women with BIF were housewives. This is likely not today's reality, at least not in Scandinavia, where equality in the job market has been established and being a housewife is no longer the norm.
The causes of BIF are unknown. There need not even be an actual cause, because BIF can be seen as part of the normal variation, with IQ being at the lower range of the normal distribution. The reported risk factors for BIF (low birth weight, mothers with low education, negative family environment), as well as those factors reported to protect people from adverse outcomes (education, social connections, and some personal qualities), were general and certainly not specific to people with BIF.
The results of studies of cognitive skills comparing BIF and MID or BIF and SLD show that BIF seems to fall somewhere between the two categories, because people with BIF mostly had a better performance level than those with MID and a worse level than those with SLD. It is possible that, due to the subject recruitment process, learning difficulties are overrepresented in BIF groups studied, which may affect the results. There are no comparisons between these three groups that consider the amount of support needed or received in real life. It can, however, be speculated that the BIF group is in a worse situation than the other two. Because the problems with BIF are not as visible as those in MID and not as specific as those in SLDs, they often go unrecognized and, consequently, no support is offered.
In general, the findings of the review showed that the performance level of people with BIF is typically worse than that of their average intelligence peers and better than that of people with MID. The relationship between these groups can be understood as one of being on different points of a continuum of intellectual abilities. However, social support and services do not form a similar continuum, but are delivered on a yes-or-no basis. In order to be eligible for services, certain criteria have to be fulfilled. The critical criterion in the area of compromised intellectual abilities is receiving a diagnosis of ID. If that criterion is met, services are readily provided, income (at least in Finland) is guaranteed with a pension, and expectations for excelling at school and in the labor market are lowered. For people with BIF who do not qualify for those services, the expectations for learning and independent living are similar to those of others, yet their lower intellectual abilities and related learning problems and less-than-optimal adaptive skills hamper their success in these areas. Social support lies behind cut-off lines, in this case behind a diagnosis of ID. Those just above the cut-off line do not have access to help and face high performance expectations.
The current literature shows that there is a large group of people that need support in multiple areas of life. The decision made a few decades ago to exclude borderline intellectual disability from ID diagnoses has had, and continues to have, a huge impact on the lives of people with BIF. The decision was affected by the possible stigma related to ID and concerns about overrepresentation of ethnic groups and poverty in the category of those with a mild level of ID. However good the intentions were, the decision excluded people with BIF from existing services and, since then, no official substitutive service has been introduced. For current policy makers, an important first step would be to acknowledge the existence of this group. The second step should be to decide what actions to take concerning services targeted at BIF. At the moment, there are no official positions regarding BIF or resources appointed for it. This gap leaves local officials to deal with the issue as best as they can and, in the worst case, people with BIF are left without any support. From a societal point of view, people with BIF are a large group of capable people who, when they are compared with the general population, struggle with many aspects of life. To enable the full inclusion and participation of persons with BIF in society, it is crucial to recognize the difficulties that lower-than-average intellectual abilities produce in, for example, vocational education and job training, and in developing services to accommodate these needs. With the right kind of timely support, people with BIF could find their place in society and labor markets.
Limitations of the Study
It is possible that some relevant studies were not included in the review due to the wide range of terms in the field used to describe the phenomenon. This possibility was minimized by searching through relevant journals and through the reference lists of the included studies.
BIF was defined solely on the basis of IQ test score, without taking into account other functional aspects. Although this definition is far from perfect, a systematic review would have been impossible to conduct without clear and globally used criteria.
Conclusions
Despite the obvious, everyday problems that people with BIF face, the issue seems to be almost invisible in the field of research. There is a need for longitudinal and population-based studies focusing on people with BIF. More research on the nature of BIF is needed (e.g., is it a qualitatively different functioning or a developmental lag that explains the differences between subjects?). The critical life periods to study are the transitions from compulsory school to secondary school and from secondary school to the labor market, because these are the points at which adolescents seem to struggle.
In addition, societal discussions of BIF are needed. People with BIF are left without official services in society because they often do not meet the criteria for special services. In reality, they often struggle with the demand to be “normal.” There is a major need for flexible support systems that are based on real needs.
Acknowledgments
This study was funded by the Finnish Slot Machine Association and Finnish Cultural Foundation, Häme Regional Fund. The authors wish to thank Heli Numminen and Hanna Kortteinen for their earlier work with the topic, Pekka Kuikka for his ideas concerning the topic, Tuuli Kiljala for her assistance in the acquisition of the articles, and Anneli Sintonen for her help with organizing the data.
References
Author notes
Minna Peltopuro, Timo Ahonen, and Jukka Kaartinen, University of Jyväskylä, Jyväskylä, Finland; Heikki Seppälä, FAIDD, Helsinki, Finland; and Vesa Närhi, University of Eastern Finland, Joensuu, Finland and Niilo Mäki Institute, Jyväskylä, Finland. | https://meridian.allenpress.com/idd/article/52/6/419/1920/Borderline-Intellectual-Functioning-A-Systematic |
COVID-19, caused by the SAARS-COV-2 virus, can affect any organs of the body during its acute infective stage and the lungs are one of the common and vulnerable organs that get affected. If severe pulmonary involvement is seen, then there are oxygen fluctuations as COVID-19 pneumonia can cause respiratory failure, acute respiratory distress syndrome (ARDS), sepsis, septic shock, thromboembolism (blood clots), and/ or multiorgan failure (MODS) which can affect the heart, liver or kidneys.
It was earlier thought that COVID-19 would just affect the elderly and individuals with comorbidities like diabetes, hypertension, obesity and kidney diseases, but with the second wave and the COVID-19 variants, we are now wiser and know that the clinical presentations and vulnerable populations would change.
Severity of COVID-19 on lungs and how fatal it can be
The SAARS-COV-2 virus is a coronavirus that enters into the human cells via the ACE II receptors like a lock and key and eventually multiplies to create more and more copies of itself. Initially in the first few days of the illness which is the viremia phase the disease behaves like any other viral infection with symptoms of cough/cold/loose stools/ fever/ loss of smell/ loss of taste etc. What is unique with this disease is the switch over to the inflammatory phase where our bodies immune system becomes hyperreactive and goes into the inflammatory and cytokine storm.
In the inflammatory phase, the markers like CRP, ferritin and D-dimer increase and this results in hypoxia (reduced oxygen). Oxygen supplement or ventilatory support is given based on the severity and one could need a nasal cannula, face mask, non-rebreathing face mask, high flow nasal cannula machine, non-invasive ventilator (NIV), mechanical ventilator and lastly an ECMO machine (heart-lung bypass). The lung damage is so severe at times that a few patients need a lung transplant.
Autopsy specimens show changes like – capillary congestion, cell necrosis, ACE II hyperplasia, oedema, hyaline and myofibroblast reactions, interalveolar fibrin deposits, and squamous cell metaplasia. All these changes along with microangiopathy contribute to the type I respiratory changes seen in COVID 19 pneumonia. Treatment options are then directed towards reducing or minimising the effect of these changes in the body.
Health Conditions and impact on vulnerability to lung complications
It has been noted that the lung damage of these patients worsens for a while and then improves with treatment and time. The rate of recovery of lung damage varies from person to person and is based on comorbidities and risk factors. Steroids and blood thinners are the mainstay to recovery and at times the medications go on way beyond hospitalisations.
On imaging, the lung X-ray and CT scan of the patient show patches which are similar to ‘interstitial lung diseases’ which are a result of lung damage and fibrosis or lung scarring. Almost 80 per cent of patients become asymptomatic from pulmonary symptoms like cough and breathlessness by day 20 of the illness. There are a few patients who continue to remain symptomatic with cough, breathlessness and fatigue and it becomes important to understand if these patients are developing lung scarring. Lung fibrosis is typically permanent damage of the lung, but what we are noticing is that most of our patients are showing reversal of these lung changes as time passes by. Antifibrotics have been used to prevent and reduce the rate of development of lung fibrosis.
There are conditions like PACS (post-acute COVID syndrome) and POTS (postural orthostatic tachycardia syndrome) which presents as easy fatiguability and palpitations and breathlessness. It is important to rule out such conditions and target treatment for the same rather than assuming that all symptoms are because of post COVID lungs.
Treatment of lung complications post covid recovery
The lung complications can be in the form of pulmonary fibrosis, persistent cough and inflammation, predisposition to blood clots, loss of muscle mass leading to severe deconditioning and easy fatiguability, nutritional derangements, diabetes and related complications.
Treatment options:
How can patients lessen the chance of lung damage after covid?
A healthy lifestyle and addressing all your pre-existing medical conditions are important. Getting vaccinated is a proven way to prevent severe forms of COVID-19 which need hospitalisation and ICU admission. Eating the right kind of food with adequate antioxidants have also proven effective in preventing lung infections. After diagnosis, close monitoring and follow up post-discharge will help you and your healthcare provider to make decisions. | https://www.biospectrumindia.com/views/17/19145/vulnerability-of-lung-infection-in-covid-recovered-patients.html |
Developing countries, emerging economies and countries in transition increasingly see foreign direct investment (FDI) as a source of economic development, modernization and employment generation, and have liberalized their FDI regimes to attract investment. The overall benefits of FDI for developing economies are well documented. Given the appropriate host-country policies and a basic level of development, a preponderance of studies show that FDI triggers technology spillovers, assists human capital formation, contributes to international trade integration, helps create a more competitive business environment and enhances enterprise development. All these contribute to higher economic growth. Beyond the initial macro-economic stimulus for actual investment, FDI influences growth by increasing total factor productivity and, more generally, the efficiency of resource use in the recipient economy. Technology transfers through FDI generate positive externalities in the host country. The benefits from FDI do not accrue automatically and evenly across countries and sectors. In order to reap the maximum benefits from FDI, there is a need to establish a transparent, broad and effective enabling policy environment for investment and to put in place appropriate framework for their implementation. Such an environment must provide incentives for innovations and improvement of skills and contribute towards improved competitiveness. Government has put in place a liberal, transparent and investor friendly FDI policy, wherein FDI up to 100 per cent is allowed under automatic route for most of the sectors/ activities, where the investor does not require any prior approval. | https://www.oboolo.com/politic-economic-administrative-sciences/general-economy/term-papers/foreign-direct-investment-india-602415.html |
This is a standard 1-1/2 inch hose coupling which is made of PVC. These couplings are made of the highest quality plastic resins and are designed for years or problem free use. Hose couplings connect vacuum hoses together, when needed. This unit is designed to connect two 1-1/2 inch pool vacuum hoses together to one large hose. | https://www.poolweb.com/1-5-hose-coupling |
Are You a Word Economist?
“Snakes on a Plane” was a most descriptive movie title. It left no doubt as to the premise of the movie. Whoever named that movie was a word economist.
Economy of words is an important trait of the effective presenter. Some words speakers use are unnecessary. To improve your next presentation, make every word count. What can we do to make our audiences “hang on” to every word we speak? Eliminate unnecessary words.
In most situations, don’t begin a story with, “Let me tell you a story to illustrate.” Just start the story with “Last week I was on my way to see a client…,” or “In 1912 Teddy Roosevelt was running for president when….” In addition, avoid previewing a joke or anecdote by saying, “Here is a funny story about.…” Simply start the story. Let the audience decide if it is funny.
Speakers often use unnecessary words when referring to visual aids. With the screen showing the slide for all to see, the speaker does not need to say, “Right here you will see…” Simply say, “This,” point to the slide, and share the information. “I don’t know if you can see this…” is even worse. You should know if the audience can see the visual by checking the screen or object from the most distant seat before you begin your speech.
Presentations should not include excuses. “I really did not have time to organize my thoughts as I wanted. However….” The audience will know soon enough if you have no structure! In the same category are these statements: “I did not have the time I needed to prepare for this program.” “I did not have a chance to check the latest data, but here is what I have available.” These are all unnecessary and can affect your credibility with the listeners. You are communicating that you did not care enough about the audience to prepare well.
Another sentence to omit is “Before I begin my presentation I want to say…” Your presentation begins the moment you start to speak. Make the opening words count. The same is true of “A couple of items I want to mention before I begin…” Your opening sentence should engage the audience. When you near the end of your presentation, avoid the phrase “Before I conclude…” Simply conclude. | https://sboyd.com/are-you-a-word-economist/ |
Not everyone can bring a hurting child into their home, but everyone can do something to help.
Safe Harbor creates a supportive community around foster/adoptive families to bring and coordinate services, support, and encouragement, vital to maintain placement stability and to create a Safe Harbor where hope & healing can occur.
WHAT WE DO
-
We connect with each family to determine their unique needs that are not currently being met.
-
Assess what are the biggest stressors and provide supportive services around those issues.
-
Work on strengthening current support systems or creating new ones if needed by connecting families to support groups, Parent night out and other community events that serve the foster adoptive community
HOW WE HELP
-
House Cleaning
-
Laundry Services
-
Meal Service
-
Monthly Date Night for Foster Resource Family’s
-
Mommy’s helper
WHO WE PROVIDE SERVICE TO
-
Our target population are children birth -8 yr. with foster care placement disruptions
-
We serve existing resource families
Call us:
916-304-3334
Find us:
3080 Auburn Folsom Road, Newcastle CA 95658
E-mail us : | https://www.safeharborca.com/community-services |
1. Do something that requires a decision and a follow-through.
Have you been putting off writing that letter to aunt Martha? is there a friend you’ve been meaning to call? Wash the car, tidy the garden or clean the house. You’ll gain confidence by setting goals (even small ones) and following through on them.
2. Enjoy something you do well.
Do you have any hobbies or sports that you enjoy playing? Some things like going swimming, painting or writing can hold your attention and get you into a state of ‘flow’. While you are in the flow you forget about everything else.
Afterwards, you’ll feel competent and capable. It’s a great way to boost your self-esteem. if you don’t have any particular hobbies or pastimes that you enjoy make an effort to try something you’ve always wanted to try.
Picture yourself doing it, and then give it a try! it doesn’t have to be something big - it can be as simple as joining a walking club.
You’ll find that you are more centered and happier if you do something that puts you in that flow at least once a week.
It’s been shown that low self-esteem develops hand-in-hand with individuals who put too much focus on themselves. you can gain confidence by doing something that focuses on someone else or even something else.
You’ll find that when you are in a situation where you are meeting new people, you immediately become less nervous when you focus on the person you are meeting.
At the end of the day, you’ve interacted with others and will notice that you feel much lighter.
Learning to become more relaxed is a great life enhancer. People who are more relaxed have fewer problems with their memories and are more likely to take the bumps in the road of life in stride.
The practice of meditation has gained popularity for this reason. you might want to look into Tai Chi, which involves physical relaxation techniques.
Whatever method you decide on, take relaxation seriously. The benefits are just too great to ignore. if you’ve never considered relaxation important, think of it this way: if you can attend to something that results in feeling good, how can you not gain confidence in your personal abilities?
5. Make a list of everything you’ve ever accomplished.
Think small. an accomplishment is an accomplishment! Some things you could put on your list: passed my driver’s test and got my license, scored a goal when I played hockey, managed to save enough money to go on a trip and so on.
These are just a few ideas you can use to gain confidence and boost your self-esteem. Use these ideas as a base point and add these things permanently in your life.
Keep in mind, people are not born with good self-esteem, most of us have to work at it. it develops from your thinking and the things you do daily to make yourself feel good. | https://www.zido.gq/2018/04/gain-confidence-and-boost-self-esteem.html |
Ticeric, D., 1991: Determination of optimum forest road network density by method of direct design. Calculations were made for four forest types (in Yugoslavia), viz: closed watersheds, forested slopes, forests on plateaux and hill forests.
Koger, J.; Laughlin, D.H., 1991: Determining optimum road length using linear programming techniques. A linear programming formulation was developed to determine the optimum length a single road should be extended into a tract of timber. Sensitivity analysis provided limits on the hourly cost of harvesting activities such as felling and bucking, l...
Hiraga, M., 1971: Studies on the forest road network with the use of electronic computer (1). A method of determining the optimum passing points and the density on the logging road. Discusses the problem of calculating the most economical road lay-out for a given logging operation in the light of the terrain, the distribution of the timber to be harvested and the estimated costs of primary extraction by cableway, tractor or o...
Tan, J., 2000: Application of dynamic programming to optimum location of a forest road. The optimum solution of locating a forest road network in a given forest area is still difficult to determine due to the complexity and the nature of the problem. Heuristic solutions are estimations of the optimum location but not the optimum one....
Bai Dan, 2004: Linear programming model of optimal design for branch network with water tower back of network. A linear programming method, which considers two types of loads: maximum and transfer load of network, is presented to develop an optimal design for branch network with water tower back of network based on the relation of hydraulic pressure and di...
Petrovic, L., 1961: Optimum density of the forest road network. A doctoral thesis, on the method of calculating optimum road density, with a 5-page English summary.
Chung, W.; Stueckelberger, J.; Aruga, K.; Cundy, T., W., 2008: Forest road network design using a trade-off analysis between skidding and road construction costs. Designing forest road networks in a large forest land is a challenging task because many feasible alternatives exist and need to be analyzed. To provide field managers with an analytical tool that can create and analyze alternative road networks,...
Dirsch, R.; Knoke, T., 2007: Financial analysis for the optimum stocking of timber by use of linear programming in forest planning. This paper tries to contribute towards developing forest management in Germany. It utilises linear programming (LP) in an optimisation algorithm which is already well established in the English literature. LP was employed to investigate the effect...
Cha DuSong; Cho KooHyun, 1994: Studies on the design of forest road network for mechanized yarding operations. (II.) Optimal road spacing and density. Estimations of costs for forest road construction and skidding (including cable methods) were made for harvesting in Chunchon-ku, Korea Republic.
Il' in, B.A., 1973: Determining the optimum density of the forest road network. Proposes a method of determining the optimum density of the road network in logging areas in the USSR. It is based on known methods of calculating optimum distances between branch roads and between spur roads [cf. FA 34, 1022], and on the inversel... | https://eurekamag.com/research/002/590/002590959.php |
In my HCI cognitive science class we’ve been studying visualization and how a given interface can enhance our mental processing power, bringing more of our wits to bear on a challenge. Here’s a look at comparing a few layers of data as reported by two very different nations.
Denmark vs. USA – Charitable giving related to income & life expectancy
I chose to compare the nations of Denmark and the United States, examining their respective records of charitable giving and comparing that to each nations’ income per person and their life expectancy. The data available ran from 1960 to 2008, and so it’s worth noting that the period studied spanned several wars with worldwide impact, numerous financial recessions and a gradual but accelerating trend of climate change.
The United States
The United States in 1960 was quite a charitable one, donating 0.54% of the gross national income (GNI) while only reporting $18,175 in income per person. We had a change of heart it would seem, as the % of GNI given to charity fell steadily for 37 years before finally ending at 0.18% of GNI in 2008.
During this period, while our incomes rose by $24k and our life expectancy by 8 years we gave 0.54% less to charities.
Denmark
Denmark in 1960 was a hard place, donating only 0.09% of their GNI while reporting only $11,569 in income per person. They seem to have buckled down and gotten industrious, as the % of GNI given to charity rose for 21 years to 1.03%, with a high of 1.06% before finally ending at 0.82% of GNI in 2008.
During this period, their incomes rose by $20k and their life expectancy by 6 years. In the end Danes increased their charitable giving by a staggering 0.97% over the period.
Reflections
An interesting measure to add to this comparison would be an index of reported happiness & contentment – does charity or income have a greater effect on happiness?
I would also have enjoyed seeing an overlay of world events across political, economic and climate scopes, relating those factors into the changes in life expectancy, income and charitable giving.
The animation was quite helpful, and illustrated the rate of change between compared parameters over the lengthy collection of data ranging over 48 years, clearly calling out the rapid rise of Denmark’s charity while the USA gave away less and less each year.
It’s purely correlative, but it appears that given the much larger percentage they gave to charity (from their noticeably lower income) the Danish were not overly burdened and lived to nearly the same age. Many factors could have been at play, but I’m given to lean towards the old adage that money CAN bring happiness as long as you spend it on others. | http://www.minotaurdesign.com/blog/2014/10/28/gapminder-data-analysis/ |
Born and raised in Chattanooga, Tennessee, Andy Berke served as the 10th District State Senator from 2007 to 2012 before becoming the 65th Mayor of Chattanooga in 2013. As Mayor, Andy Berke established Chattanooga's Innovation District and works to ensure digital equity through initiatives like Netbridge, which provides public school students access to access to high speed Internet at home for the lowest price permitted by state law, as well as the nationally-recognized program, Tech Goes Home. Andy Berke has made early childhood development a priority, establishing the first Office of Early Learning in Chattanooga City government and launching a Baby University to create more opportunities for children between the ages of 0 and 5 years old. Because of these initiatives as well as his focus on safer streets, growing middle class jobs, strengthening neighborhoods and more, Andy Berke was named 2015's Municipal Leader of the Year by American City & County Magazine.
By providing access to information, connecting people to businesses, and opening up new markets, the internet is changing the economy and supporting economic development. Yet nearly 30 percent of American households do not have Internet access, according to a recent report by the U.S. Census Bureau. Those Americans with no online connectivity are disproportionately old, black or Hispanic, poorly educated, and low income. In order for cities to remain competitive in the increasingly digital world, the internet must be accessible to all residents, not just those who live in digital gated communities.
Through a coordinated approach, Mayor Andy Berke is leading an initiative to connect more people to high speed broadband to unlock the potential of all Chattanoogans. In April 2015, Mayor Berke announced that the City’s municipally owned electric utility, EPB, would offer low-cost, ultra high speed broadband to low-income families. In addition to increasing access to the internet, the City partnered with a local nonprofit to offer classes around the community aimed at increasing online usage and digital literacy. Participants in the program receive guidance on how to submit a resume online, open an email account, and set good rules about internet usage for minors in their home. By connecting residents to the tools they need to be successful in the digital economy, Mayor Berke is helping expand opportunity throughout Chattanooga.
Currently the City of Chattanooga has very limited data made public to its citizens, hindering citizen engagement and trust in government.
Mayor Berke is working to release unprecedented amounts of public data in the city to spur civic innovation and economic growth. From interactive budgeting tools, to applications that show where road closures are -- open public data empowers the local development community to help solve difficult civic problems. Through a strong partnership with the Public Library, Chattanooga is also investing in an independent platform to host all community data (nonprofits, private businesses, community organizers)-- not just government. The Library will also be an independent advocate for high quality open data, which is invaluable for the long term future of government transparency in Chattanooga.
Government departments collect information on their services but rarely have enough time to analyze their data to ask meaningful questions that could lead to delivering services more effectively.
Mayor Andy Berke has proposed the “Citizen Data Scientist Challenge,” as a way to provide departments with meaningful information on how to improve their services by crowdsourcing the analysis of their data from everyday citizens and students. The challenge will help increase trust in government, by providing an opportunity for citizens to engage directly with local government and propose their own solutions for how government can be made more effective.
Cities often create solutions to solve a problem they have with providing a service to citizens without any thought or consideration to the end user, the citizen. This internal focus creates services that work for cities but not for citizens.
Empathy is key to citizen centered design and a muscle that must be exercised if cities want to develop city services that are responsive to their citizens needs. Mayor Andy Berke has proposed the creation of an Empathy school, which puts city and community leaders in the shoes of everyday citizens as they seek to attempt to access the same services and use the same systems. Through this understanding, city departments will be able to improve how their services meet the needs of the citizens they serve.
City codes are complex, confusing and often maintained by a private third party behind a paywall. How they are updated only adds to the confusion and makes it near impossible for anyone, other than a chosen few government employees, to understand the changes. As a result, there is often very little input from citizens when the code is changed and no way for a citizen track let alone suggest changes.
Mayor Andy Berke has developed Git City Codes, which moves the operating DNA of cities, their codes and ordinances, into the public light by opening up the code to general public and managing updates through Git. Git is a distributed revision control system often used for collaborative computer coding projects. This will allow citizens to access all city codes and provide more timely input on improvements.
Typically, government services are built after long, costly procurement processes that rarely ask users for input on their interactions with those services. Meanwhile citizens’ interactions with government are often perceived as cumbersome or inefficient. In order to increase trust in government, local agencies should place users at the center of service design in order to make government services more convenient and easily delivered to citizens.
Mayor Andy Berke has proposed a new way of approaching government services through his “Making Government Awesome” plan. By implementing a user-focused design in reimagining how government services are delivered and consumed, Mayor Berke is helping to improve how citizens interact with their local government. Through this approach, Berke has already been able to make the permitting process in Chattanooga easier for new businesses through a user-centric design process.
Citizens often don’t have access to the same data and information that city officials use to make their decisions and as a result it can often be confusing how decisions are made.
Mayor Andy Berke has proposed the “Radical Transparency” initiative in Chattanooga, that opens up the data and information that drives decision making within the city to the general public. Lots of cities have open data or transparency or performance management efforts, but rarely are they all connected. This effort leverages the efforts already in place to use data to drive continuous improvements through performance management and provides that same information to the public via the city’s open data portal. By allowing anyone to view and perform their own analysis on such data, Mayor Berke is helping to restore trust in local government.
In the past few years, Chattanooga has seen incredible economic growth, unemployment has been cut in half and wages have increased. Despite this growth, there are still neighborhoods in our city with double digit unemployment and low wages and incomes. There are many organizations doing great work to train, hire, and grow income for people in our city, but those efforts don’t always meet un/underemployed people where they are. In addition, many workforce partners are collaborating together but these collaborations were either in isolated groups or fell apart without a convener who could bring together all partners who were committed to action. The result was a duplication of effort, missed opportunities, and too many folks ready to work but with barriers left standing in their way.
The Workforce Development Working Group brings together employers, training providers, workforce funders, and employees to facilitate collaboration towards growing wages for un/underemployed adults, while ensuring businesses have the best talent from our neighborhoods. The group provides a formal space and procedure to foster collaborations of efforts that were already happening in isolation and launch new ideas. With meetings every other week and two Mayor’s Office staff facilitating, the group operates with few resources. Rather than focusing on systematic workforce development challenges, the group's purpose is to solve tangible programs and come up with ideas that can be launched quickly and improve upon. The results are a series of life-changing successes for Chattanoogans who are in most need, by meeting them where they are and delivering services more quickly and nimbly. One organization had a career coach bus, but when they took it to a neighborhood no one was showing up to use it. Connecting them with other groups has meant better promotion and that the bus is not taking people to community centers like the City’s Youth and Family Development Centers, where people in the neighborhood were used to going for help. | https://www.newdealleaders.org/leader_berke_andy |
The courier is responsible for obtaining customer samples under the direction of the lab director, client relations in the field, and upholding the image and culture of the laboratory in all client interactions. The courier is also responsible for accurate sampling in the field, recording data as required, maintaining Chain of Custody and returning all samples to the laboratory in a timely manner.
Educational requirements: High school diploma/GED or higher.
Follow all internal laboratory SOPs and state regulations while taking samples and driving to and from the laboratory/clients’ sampling site.
Interact in a professional manner with customers during sample collection and submission.
Strive to maximize driving route efficiency following lab directed routes were applicable.
Maintain detailed records of samples and transportation data.
Maintain sampling supply/equipment inventory as directed.
Complete vehicle operational logs and minor maintenance as needed.
Follow good documentation practices, data integrity principles, and safety behaviors in accordance with the lab Quality Assurance program.
Promote a professional company image through exemplary customer relationship skills and service.
Refer customer inquiries, routing or schedule change requests, and/or complaints to the Laboratory Director.
Ensure proper sample submission and chain of custody protocols are followed at all times.
Support other laboratory-based functions including sample intake/preparation, etc. if requested.
Previous long-distance driving / delivery experience is required, with 2 years preferred.
Must have a clean DMV driving record for at least the previous 5 years, and maintain clean driving record during the tenure of employment with the laboratory.
Ability to maintain a professional appearance in accordance with lab standards.
Ability to take direction well and the ability to see all tasks through correctly.
Skills: good communication skills, ability to use basic software applications including navigation software.
Abilities: Follows written and verbal instructions well; works effectively within collaborative team.
Strong attention to detail with excellent planning ability.
Sitting for long periods of time; may also be subject to bending, stooping, and lifting as needed. | https://redhired.com/us/job-vacancy-courier-driver-50aa7af801684bdd/ |
Applications are now open for the Rhinoceros and Tiger Conservation Fund under the U.S. Fish and Wildlife Service to work with others to conserve, protect and enhance fish, wildlife and plants and their habitats for the continuing benefit of the American people.
The International Affairs Program delivers on this mission through its financial assistance programs by supporting strategic projects that deliver measurable conservation results for priority species and their habitats around the world.
The U.S. Fish and Wildlife Service (Service) works closely with national governments, U.S. agencies, and a range of other partners to ensure a strategic, results-based approach to rhinoceros conservation in Africa and Asia.
Funding Information
Estimated Total Program Funding: $3,375,000
Award Ceiling: $500,000
Funding Restrictions
The Service will not fund the following items. These restrictions apply to all project related costs described in the project proposal, including any voluntary cost share identified.
- The purchase of firearms or ammunition;
- Gathering information by persons who conceal their true identity;
- Buying or purchasing of intelligence, evidence or information or paying informants;
- Law enforcement operations that, to arrest suspects, prompt them to carry out illegal activities (entrapment); and
- Any activity that would circumvent sanctions, laws or regulations of either the U.S. or the country of proposed activity.
The following cost elements are not allowable under this program:
- Publication of materials for distribution within the United States that are not related to the program
- Pre-award Costs – Expenses incurred before the specified dates of award period of performance (unless prior written approval is received.)
- Programs designed to advocate policy views or positions of foreign governments or views of a particular political faction
- Entertainment and/or alcoholic beverages
- Purchase of Land
- Direct support or the appearance of direct support for individual or single-party electoral campaigns
- Duplication of services immediately available through municipal, provincial, or national government.
Eligibility Criteria
Applicants can be:
- Multi-national secretariats;
- Foreign national and
- Local government agencies;
- Non-profit non-governmental organizations;
- For-profit organizations;
- Public and private institutions of higher education;
- U.S. territorial governments; and
- Tribes and Tribal organizations. | https://webvacancy.com/2021/04/17/rhinoceros-and-tiger-conservation-fund-in-africa/ |
ASTRACT - Biostatistics (BIOS) Shared Resource The principal objective of the Biostatistics (BIOS) SR Facility is to provide the highest level possible of quality statistical consultation services to UNC?s Lineberger Comprehensive Cancer Center (LCCC) members. BIOS provides Cancer Center members support for the design, conduct, analysis, and generation of manuscripts for their research. BIOS adds value to the LCCC through close collaboration with multiple center members providing invaluable expertise for their research. Areas of expertise in support of future use by LCCC members include clinical trials and other forms of clinical research, computational biology, genomics, genetics, cancer epidemiology, quality of life, outcomes, and other forms of population sciences research. BIOS also provides service and leadership on complex and multi-component applications such as SPORE and Program Project grants and investigator initiated trials. BIOS SR?s service and leadership on the Protocol Review, Data and Safety Monitoring Committees greatly benefits LCCC member research efforts. Highlights of statistical science that directly benefits LCCC member-related research include: a novel approach to unsupervised screening of genetic loci across RNA-seq cohorts, sampling helps understand organizational correlates of adolescent immunization, clinical trialists benefit from advances in statistical approaches in oncology drug development and efficient designs for phase II oncology trials with ordinal outcome, and statistical methods for high-throughput sequencing technology in DAE-seq (DNA after enrichment sequencing) data analysis improves results. In 2014, 10,775 hours of consultative and other biostatical services were utilized. Since 2010, the BIOS user group grew and diversified, particularly those members needing assistance with statistical methods for basic science/genomic, clinical/translational, and population sciences research. Requested CCSG funding is $288,650, representing 30% of projected operating costs. The BIOS SR plans to expand statistical areas of expertise to meet the expected and growing needs of Cancer Center members. | https://grantome.com/grant/NIH/P30-CA016086-44-8617 |
CROSS-REFERENCE TO RELATED APPLICATIONS
FIELD OF USE
This application is a continuation of co-pending application U.S. Ser. No. 16/735,782, filed on Jan. 7, 2020 and entitled “Providing Alerts Via A Color Changing Transaction Card,” the entirety of which is incorporated herein, by reference, in its entirety.
Aspects of the disclosure relate generally to transaction cards and more specifically to color changing transaction cards.
BACKGROUND
When financial institutions wish to convey account information to a cardholder, the cardholder, oftentimes, engages with the financial institution through an app on their mobile device, a website, or telephonically. This engagement typically involves login procedures or entering account information to obtain balances or spending limits. The entire process is time-consuming and irritating. Moreover, attempts at conveying information via the transaction card itself often fall short. In this regard, transaction cards that convey information to a cardholder include a power source built-in to the transaction card. However, when a cardholder forgets to charge his/her transaction card, or the power source is simply drained, the information may not be displayed to the cardholder, thereby rendering the information sharing component of the transaction card moot.
Aspects described herein may address these and other problems, and generally improve the quality, efficiency, and speed of conveying account information to a cardholder in a way that does not require the cardholder to engage with a financial institution or a power source incorporated in the transaction card.
SUMMARY
The following presents a simplified summary of various aspects described herein. This summary is not an extensive overview, and is not intended to identify key or critical elements or to delineate the scope of the claims. The following summary merely presents some concepts in a simplified form as an introductory prelude to the more detailed description provided below. Corresponding apparatus, systems, and computer-readable media are also within the scope of the disclosure.
Methods and systems disclosed herein may communicate information, such as alerts and notifications, to a cardholder via a color-changing transaction card. In particular, the cardholder may configure one or more thresholds that establish when a transaction card may change colors. For instance, a transaction card may change colors at, or while approaching, a first threshold. The transaction card may change colors at, or while approaching, a second threshold. When the cardholder's balance goes below the thresholds, the transaction card may revert back to the lower threshold color or the original color of the transaction card.
In order to realize the color-changing transaction card, the present disclosure describes a plurality of embodiments. For example, a microparticle-based medium may be used to effectuate the color-change. In this regard, a microparticle-based medium may apply an electrical charge to change the color of the transaction. Further, the microparticle-based medium may not need a power source located on the transaction card to make, and maintain, the color change. In another example, one or more electrochemical cells may be used to realize the color change. Similar to the microparticle-based medium, the one or more electrochemical cells may not require power on the transaction card to effectuate, and maintain, the color change. In a final example, a liquid crystal field may be used to effectuate a temporary color change. Accordingly, using the techniques described herein a financial institution may convey information to a cardholder in a way that does not require the cardholder to digitally engage with the financial institution.
These features, along with many others, are discussed in greater detail below.
DESCRIPTION OF THE DRAWINGS
The present disclosure is described by way of example and not limited in the accompanying figures in which like reference numerals indicate similar elements and in which:
FIG. 1
shows an example of a system in which one or more aspects described herein may be implemented;
FIG. 2
shows an example of a computing device in accordance with one or more aspects of the disclosure;
FIG. 3
shows a color changing transaction card with a microparticle-based medium in accordance with one or more aspects of the disclosure;
FIG. 4
shows a microparticle-based medium according to one or more aspects of the disclosure;
FIG. 5
shows a color changing transaction card with an electrochemical cell in accordance with one or more aspects of the disclosure;
FIG. 6
shows an electrochemical cell according to one or more aspects of the disclosure;
FIG. 7
shows a color changing transaction card with a liquid crystal field in accordance with one or more aspects of the disclosure;
FIG. 8
shows a liquid crystal field according to one or more aspects of the disclosure; and
FIG. 9
shows a flow chart of a process for changing the color of a transaction card according to one or more aspects of the disclosure.
DETAILED DESCRIPTION
In the following description of the various embodiments, reference is made to the accompanying drawings, which form a part hereof, and in which is shown by way of illustration various embodiments in which aspects of the disclosure may be practiced. It is to be understood that other embodiments may be utilized and structural and functional modifications may be made without departing from the scope of the present disclosure. Aspects of the disclosure are capable of other embodiments and of being practiced or being carried out in various ways. In addition, it is to be understood that the phraseology and terminology used herein are for the purpose of description and should not be regarded as limiting. Rather, the phrases and terms used herein are to be given their broadest interpretation and meaning.
By way of introduction, aspects discussed herein may relate to methods and techniques for providing alerts and/or notifications via a color changing transaction card. Traditional color-changing transaction cards include a built-in power source. However, when a cardholder forgets to charge his/her transaction card, or the power source is simply drained, the transaction card will not change colors, rendering any alerts and/or notifications moot.
Methods and systems disclosed herein may communicate information, such as alerts and notifications, to a cardholder via a color-changing transaction card that may not require a built-in power source. The cardholder may configure, via a mobile app or a website, one or more thresholds that establish when a transaction card may change colors. For instance, a transaction card may change colors at, or while approaching, a first threshold. The transaction card may change colors at, or while approaching, a second threshold. When the cardholder's balance goes below the thresholds, the transaction card may revert back to the lower threshold color or the original color of the transaction card.
In order to realize the color-changing transaction card, the present disclosure describes a plurality of embodiments. For example, a microparticle-based medium may be used to effectuate the color-change. In this regard, a microparticle-based medium may apply an electrical charge to change the color of the transaction. Further, the microparticle-based medium may not need a power source located on the transaction card to make, and maintain, the color change. In another example, one or more electrochemical cells may be used to realize the color change. Similar to the microparticle-based medium, the one or more electrochemical cells may not require power on the transaction card to effectuate, and maintain, the color change. In a final example, a liquid crystal field may be used to effectuate a temporary color change. Accordingly, using the techniques described herein a financial institution may convey information to a cardholder in a way that does not require the cardholder to digitally engage with the financial institution.
FIG. 1
100
100
110
120
130
100
120
130
140
150
160
Oftentimes, there are several components at work when transacting using a transaction card, such as a debit card or a credit card. shows a system that illustrates several of the components that may be found when conducting a transaction with a transaction card. For example, system shows transaction card communicatively coupled to device and card reader . Additionally, system shows device and card reader communicatively coupled to server , which may include database , via network .
110
110
110
110
110
110
110
110
120
130
110
FIG. 2
Transaction card may be any suitable card configured to permit a cardholder to access funds in one or more of a cardholder's account. In this regard, transaction card may be a credit card, a charge card, a debit card, a prepaid card, a payment card, or the like. In some embodiments, transaction card may provide access to one or more types of accounts. For instance, transaction card may allow a cardholder to select from a credit card option and/or a debit card option. As will be discussed in greater detail with respect to , transaction card may be a chip-enabled card. In some embodiments, transaction card may include a magnetic strip, in addition to the chip. In further embodiments, transaction card may include near field communication (NFC) capabilities, short-range wireless communication capabilities (e.g., Bluetooth®), wireless communication capabilities (e.g., Wi-Fi), or any combination thereof. The NFC capabilities, short-range wireless communication capabilities, wireless communication capabilities may be referred to collectively as communication capabilities. These communication capabilities may permit transaction card to communicate with device and card reader . Additionally, transaction card may include a color-changing mechanism, which is discussed in greater detail below.
120
120
120
120
120
122
110
110
120
110
110
110
110
110
110
110
110
Device may be a mobile device, such as a cellular phone, a mobile phone, a smart phone, a tablet, a laptop, or the like. Alternatively, device may be any suitable internet-enabled device, such as a smart speaker, smart television, or the like. Device may be configured to provide a first cardholder with access to various applications and services. For example, device may provide the first cardholder with access to the Internet. Additionally, device may provide the first cardholder with one or more applications located thereon. The one or more applications may provide the first cardholder with a plurality of tools and access to a variety of services. In some embodiments, the one or more applications may include an application, such as a banking application or credit card application, that allows the first cardholder to set up spending alerts and notifications. The alerts and notifications may include push notifications, such as alert . Alternatively, or additionally, the alerts and notifications may include configuring a color-changing mechanism on transaction card . That is, the cardholder may configure the color-changing mechanism on transaction card to reflect the cardholder's account status. In some embodiments, the cardholder may define, via an application on device or by accessing his/her account via a website, a first threshold at which transaction card may change from a first color to a second color, and the cardholder may set a second threshold at which transaction card may change from the second color to a third color. In some embodiments, the color change may occur when the cardholder approaches the threshold values. For example, a cardholder may have a credit limit of $5000 and define the first threshold at $3000 and the second threshold at $4000. When the cardholder spends more than $3000 in a billing cycle (e.g. a month), transaction card may change from a first color, such as green, to a second color, such as yellow. Similarly, if the cardholder's spending exceeds $4000, transaction card may change from the second color (i.e. yellow) to a third color, such as red. When the cardholder posts a payment to his/her card, transaction card may revert to a previous color. For instance, if transaction card is the third color and the cardholder makes a payment that brings the cardholder's account below both thresholds, transaction card may change from the third color to the first color. If the payment only lowers the cardholder's account below the second threshold, transaction card may change from the third color to the second color.
110
110
In another example, the cardholder may configure the color-changing to alert the cardholder when the cardholder's balance goes below a certain amount, for example, when using a debit card. In this regard, the first threshold may be set at a $1000 and the second threshold at $500. Accordingly, when the cardholder's account goes below $1000, transaction card may change from the first color to the second color. When the cardholder's account is less than $500, the debit card may change from the second color to the third color. Similar to the discussion above, transaction card may change from the third color to the first color when the cardholder's account goes above both thresholds, for example, if the cardholder receives a direct deposit which brings his/her account above both thresholds.
It will be appreciated that the examples discussed above are merely illustrative. In some instances, the first, second, and third colors may be configurable by the cardholder. Additionally, the cardholder may be able to establish more, or fewer, thresholds.
In further examples, the cardholder may configure the color-changing component of the transaction card to provide security alerts. For instance, the transaction card may change color, for example, in response to one or more indicators of fraud being detected. The one or more indicators of fraud may be detected by the card issuer. Further, the one or more indicators of fraud may include, adding a new card holder, a phone number change, an email change, a password change, unusual spending activity, etc. The transaction card may change to a particular color to notify the cardholder of security alert. Alternatively, the color of the transaction card may be associated with the type of security alert. That is, the color of the transaction card may be indicative of the type of fraud indicator detected. For example, the transaction card may change to a first color to notify the cardholder of a change to their phone number and a second color to notify the cardholder of a change to their email address.
Along similar lines, the cardholder may configure the transaction card to change color in response to receiving a bill and/or invoice. In some examples, the color change may be indicative of overdue bills and/or invoices. In other examples, the color change may be indicative of upcoming payments, such as scheduled payments, automatic payments, and/or recurring payments. Additionally, or alternatively, the transaction card may be configured to change color, for example, after or in response to receiving a communication from the card issuer. In this regard, the color of the transaction card may indicate that the cardholder has a communication waiting for them. The cardholder may then log-in via a banking portal (e.g., via a mobile banking application or website) to access the communication.
In yet another example, the cardholder may configure the color-changing component of the transaction card to obfuscate personally identifiable information (PII). The cardholder may change the color of the transaction card to obfuscate the credit card number, the cardholder's name, a security code, and/or the expiration date of the transaction card. Additional examples may allow the cardholder to change the color of the transaction card for vanity purposes. Similarly, the cardholder may change the color of the transaction card to indicate that the card is no longer valid. The color may allow the cardholder to notify others that the card is no longer valid and has been disposed of. Additionally, or alternatively, the color of the transaction card may be changed to indicate that a hold has been put on the cardholder's account or to indicate that the card has been temporarily suspended. This may put vendors on notice that the transaction card is invalid, stolen, and/or a fake.
130
120
In some embodiments, the transaction card may change color in response to detecting that a terminal, such as card reader and/or device , has been tampered with. In this regard, the transaction card may attempt to verify and/or authenticate the terminal before transacting with it. If the verification and/or authentication fails, the transaction card may determine that the terminal has been tampered with and change colors to convey the tampering to the cardholder.
It will further be appreciated that the examples discussed above are merely illustrative, and the color-changing transaction card may be configured to convey additional information to the cardholder in a variety of ways.
130
110
130
130
130
140
160
130
110
120
130
110
120
Card reader may be any suitable card reader capable of reading data and/or information from transaction card . In this regard, card reader may be a chip-based reader, a magnetic-based reader, an EMV reader, or any combination thereof. Accordingly, card reader may include a display, a keypad, and a network interface. The display may be present information to the cardholder, such as the amount owed, the status of the transaction, and whether the transaction has been approved or denied. Keypad may allow a cardholder to input a PIN code, password, an amount for withdrawal, and the like. Network interface may be a wired connection, wireless connection, a short-range wireless connection, an NFC connection, or any combination thereof. Network interface may permit card reader to communicate with server , via network , for example, to authorize a transaction. Similarly, network interface may permit card reader to communicate with transaction card and/or device . In these instances, card reader may convey information related to the cardholder's account to transaction card and/or device .
140
142
140
150
140
140
Server may be any server capable of executing banking application . Additionally, server may be communicatively coupled to database . In this regard, first server may be a stand-alone server, a corporate server, or a server located in a server farm or cloud-computer environment. According to some examples, first server may be a virtual server hosted on hardware capable of supporting a plurality of virtual servers.
142
142
120
132
120
160
Banking application may be server-based software configured to provide cardholders with access to their account information and perform routing banking functions. In some embodiments, banking application may be the server-based software that corresponds to the client-based software executing on device . Additionally, or alternatively, banking application may provide cardholders access to their account information through a website accessed by device via network .
150
142
150
Database may be configured to store information on behalf of banking application . Banking information may include, but is not limited to, personal information, account information, and cardholder-preferences. Personal information may include a cardholder's name, address, phone number (i.e., mobile number, home number, business number, etc.), social security number, cardholder name, password, employment information, family information, and any other information that may be used to identify the first cardholder. Account information may include account balances, bill pay information, direct deposit information, wire transfer information, statements, and the like. Cardholder-preferences may define one or more spending thresholds, how cardholders receive notifications and alerts, spending notifications, and the like. Database may include, but is not limited to, relational databases, hierarchical databases, distributed databases, in-memory databases, flat file databases, XML databases, NoSQL databases, graph databases, and/or a combination thereof.
160
160
100
100
100
Network may include any type of network. In this regard, first network may include the Internet, a local area network (LAN), a wide area network (WAN), a wireless telecommunications network, and/or any other communication network or combination thereof. It will be appreciated that the network connections shown are illustrative and any means of establishing a communications link between the computers may be used. The existence of any of various network protocols such as TCP/IP, Ethernet, FTP, HTTP and the like, and of various wireless communication technologies such as GSM, CDMA, WiFi, and LTE, is presumed, and the various computing devices described herein may be configured to communicate using any of these network protocols or technologies. The data transferred to and from various computing devices in system may include secure and sensitive data, such as confidential documents, customer personally identifiable information, and account data. Therefore, it may be desirable to protect transmissions of such data using secure network protocols and encryption, and/or to protect the integrity of the data when stored on the various computing devices. For example, a file-based integration scheme or a service-based integration scheme may be utilized for transmitting data between the various computing devices. Data may be transmitted using various network communication protocols. Secure data transmission protocols and/or encryption may be used in file transfers to protect the integrity of the data, for example, File Transfer Protocol (FTP), Secure File Transfer Protocol (SFTP), and/or Pretty Good Privacy (PGP) encryption. In many embodiments, one or more web services may be implemented within the various computing devices. Web services may be accessed by authorized external devices and cardholders to support input, extraction, and manipulation of data between the various computing devices in the system . Web services built to support a personalized display system may be cross-domain and/or cross-platform, and may be built for enterprise use. Data may be transmitted using the Secure Sockets Layer (SSL) or Transport Layer Security (TLS) protocol to provide secure connections between the computing devices. Web services may be implemented using the WS-Security standard, providing for secure SOAP messages using XML encryption. Specialized hardware may be used to provide secure web services. For example, secure network appliances may include built-in features such as hardware-accelerated SSL and HTTPS, WS-Security, and/or firewalls. Such specialized hardware may be installed and configured in system in front of one or more computing devices such that any external devices may communicate directly with the specialized hardware.
FIG. 2
FIG. 2
200
200
203
200
205
207
209
211
213
215
223
203
205
207
215
209
211
213
215
223
200
Any of the devices and systems described herein may be implemented, in whole or in part, using one or more computing systems described with respect to . Turning now to , a computing device that may be used with one or more of the computational systems is described. The computing device may include a processor for controlling overall operation of the computing device and its associated components, including RAM , ROM , input/output device , accelerometer , global-position system antenna , memory , and/or communication interface . A data bus may interconnect processor(s) , RAM , ROM , memory , I/O device , accelerometer , global-position system receiver/antenna , memory , and/or communication interface . In some embodiments, computing device may represent, be incorporated in, and/or include various devices such as a desktop computer, a computer server, a mobile device, such as a laptop computer, a tablet computer, a smart phone, any other types of mobile computing devices, electronic terminals, transactional terminals, and the like, and/or any other type of data processing device.
209
200
209
Input/output (I/O) device may include a microphone, keypad, touch screen, and/or stylus through which a cardholder of the computing device may provide input, and may also include one or more of a speaker for providing audio output and a video display device for providing textual, audiovisual, and/or graphical output. In some embodiments, I/O device may include an image capture device.
215
203
200
215
200
217
219
221
215
215
215
205
207
203
Software may be stored within memory to provide instructions to processor allowing computing device to perform various actions. For example, memory may store software used by the computing device , such as an operating system , application programs , and/or an associated internal database . The various hardware memory units in memory may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules, or other data. Memory may include one or more physical persistent memory devices and/or one or more non-persistent memory devices. Memory may include, but is not limited to, random access memory (RAM) , read only memory (ROM) , electronically erasable programmable read only memory (EEPROM), flash memory or other memory technology, optical disk storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other medium that may be used to store the desired information and that may be accessed by processor .
211
200
211
200
200
200
200
Accelerometer may be a sensor configured to measure accelerating forces of computing device . Accelerometer may be an electromechanical device. Accelerometer may be used to measure the tilting motion and/or orientation computing device , movement of computing device , and/or vibrations of computing device . The acceleration forces may be transmitted to the processor to process the acceleration forces and determine the state of computing device .
213
200
213
213
GPS receiver/antenna may be configured to receive one or more signals from one or more global positioning satellites to determine a geographic location of computing device . The geographic location provided by GPS receiver/antenna may be used for navigation, tracking, and positioning applications. In this regard, the geographic may also include places and routes frequented by the first cardholder. In the context of a banking application, GPS receiver/antenna may be used to locate one or more banking locations.
223
223
Communication interface may include one or more transceivers, digital signal processors, and/or additional circuitry and software for communicating via any network, wired or wireless, using any protocol as described herein. Communication interface may also include near field communication (NFC) capabilities, short-range wireless communication capabilities (e.g., Bluetooth®), wireless communication capabilities (e.g., Wi-Fi), or any combination thereof.
203
203
200
215
200
203
217
221
203
203
215
221
205
FIG. 2
Processor may include a single central processing unit (CPU), which may be a single-core or multi-core processor, or may include multiple CPUs. Processor(s) and associated components may allow the computing device to execute a series of computer-readable instructions to perform some or all of the processes described herein. Although not shown in , various elements within memory or other components in computing device , may include one or more caches, for example, CPU caches used by the processor , page caches used by the operating system , disk caches of a hard drive, and/or database caches used to cache content from database . For embodiments including a CPU cache, the CPU cache may be used by one or more processors to reduce memory latency and access time. A processor may retrieve data from or write data to the CPU cache rather than reading/writing to memory , which may improve the speed of these operations. In some examples, a database cache may be created in which certain data from a database is cached in a separate smaller database in a memory separate from the database, such as in RAM or on a separate computing device. For instance, in a multi-tiered application, a database cache on an application server may reduce data retrieval and data manipulation time by not needing to communicate over a network with a back-end database server. These types of caches and others may be included in various embodiments, and may provide potential advantages in certain implementations of devices, systems, and methods described herein, such as faster response times and less dependence on network conditions when transmitting and receiving data.
200
Although various components of computing device are described separately, functionality of the various components may be combined and/or performed by a single component and/or multiple computing devices in communication without departing from the invention.
A transaction card may include a color-changing mechanism to provide one or more alerts to a cardholder. As discussed above, the alerts may indicate that the account has gone above a spending threshold set by the cardholder. Alternatively, the alerts may indicate when an account balance has gone below a certain amount, such as debit card transactions. The following embodiments described several techniques for effectuating the color changing mechanism.
Microparticle-Based Medium
FIG. 3
Color-changing transaction cards may include a power source built-in to the card to effectuate the color change. If, however, a cardholder forgets to charge his/her card or the power source is simply drained, the color change may not occur, thereby rendering the cardholder's alerts moot. In order to overcome the shortcomings of prior color-changing transaction cards, the present embodiment may provide a microparticle-based medium, such as those found in e ink and e paper applications, to effectuate a color change that may not require a power source located on the transaction card. shows a color changing transaction card with a microparticle-based medium in accordance with one or more aspects of the disclosure.
FIG. 3
110
110
110
310
320
330
Turning to , transaction card is shown. Transaction card may be of a standard size and made of a substrate, such as plastic, metal, etc. Transaction card may include chip , microparticle-based medium , and transceiver .
310
310
310
120
130
310
120
130
320
110
310
330
110
320
310
310
310
110
310
Chip may be a smart chip or integrated circuit. In this regard, chip may include a microprocessor and memory, such as read only memory (ROM) and random access memory (RAM). Additionally, chip may include one or more contact pads to receive voltage to power the transaction card and exchange signals with a terminal, such as device and/or card reader . In some instances, chip may apply a voltage and/or signal received from device and/or card reader to microparticle-based medium to change a color of transaction card . As will be explained in greater detail below, chip may activate individual microcapsules, or pixels, of microparticle-based medium to generate a color and/or image. In some embodiments, transaction card may include a separate interface (not show) to receive voltage to power the microparticle-based medium . Additionally, or alternatively, chip may be configured to execute one or more applications. The applications may allow chip to process payments, for example, using a payment application. In other examples, the applications may allow chip to perform cryptographic processing, authenticate transaction card , define risk management parameters (e.g., when the transaction may be conducted offline), digitally sign payment data, and verify the cardholder. In some embodiments, chip may be a dual interface chip that provides for contact and contact-less interfaces.
320
320
320
320
320
110
320
310
110
310
110
320
FIG. 4
Microparticle-based medium may be any display that realizes a contrast due to the electromigration of microparticles contained in one or more microcapsules located in microparticle-based medium . In this regard, the microparticles may be electrically charged or polarized particles. Further, instead of microparticles, each microcapsule may contain at least a first plurality of nanoparticles of a first pigment and a second plurality of nanoparticles of a second pigment. A relatively low power (i.e. 1-3V DC) may cause microparticles in one or more capsules of a microparticle-based medium to rearrange themselves to provide an image with high contrast and high reflectivity. In some embodiments, the microparticles may be black and white. That is, each microcapsule in microparticle-based medium may include a plurality of black microparticles and a plurality of white microparticles suspended in a transparent fluid, such as an oil. The black and white microparticles may be used to generate black-and-white or grayscale images to alert the cardholder. For example, the images may be akin to traffic signs, with a triangle cautioning the cardholder about crossing a first threshold and an octagon (e.g. stop sign) may be used to indicate the cardholder crossing a second threshold. In some embodiments, the microparticles may be a plurality of colors, such as those found in the CMYK or RGB color models. For instance, there may be four colors of microparticles: cyan, magenta, yellow, and a key color, such as black or white. These four colors may generate hundreds of other colors. Accordingly, microparticle-based medium may generate a plurality of colors to provide alerts and/or notifications to the cardholder. In operation, microparticle-based medium may generate the same color as transaction card . In some instances, microparticle-based medium may generate no color at all, such that the substrate (i.e. plastic or metal) may be presented. However, when a first threshold is met, microparticle-based medium may generate a first color, such as a cautionary color (i.e. yellow), and a second color, such as red, when a second threshold is met. While microparticle-based medium is shown as a part of transaction card , it will be appreciated that microparticle-based medium may comprise a substantial portion (i.e. ≥51%), or the entirety, of transaction card . The components of microparticle-based medium will be discussed in greater detail below with respect to .
420
440
310
120
130
In alternative embodiments, the plurality of microparticles may be magnetically charged. In these embodiments, first electrode layer and second electrode layer may be configured to generate a magnetic field that causes the plurality of microparticles to migrate. In this regard, a first magnetic field may cause the microcapsule to present the first plurality of microparticles and a second magnetic field may cause the microcapsule to present the second plurality of microparticles. The first magnetic field and the second magnetic field may be generated in response to a signal received from chip . Alternatively, or additionally, the first magnetic field and the second magnetic field may be generated from a terminal, such as device and/or card reader .
330
330
330
110
130
120
330
130
120
Transceiver may be configured to exchange signals with a terminal. In some embodiments, transceiver may include an antenna or other communication capabilities, such as NFC, Wi-Fi, and Bluetooth®. Transceiver may be configured to permit transaction card to communicate with card reader and/or device . In other embodiments, transceiver may comprise a short-range wireless transceiver configured to receive the voltage to power the transaction card and exchange signals with card reader and/or device .
320
310
FIG. 4
Microparticle-based medium may be preferred over traditional color-changing techniques because microparticle-based medium may effectuate a color change via a one-time voltage application, whereas traditional color-changing techniques may require a power source to be located on the transaction card. shows a microparticle-based medium according to one or more aspects of the disclosure.
FIG. 4
320
410
450
410
450
110
410
450
410
450
410
420
110
410
320
Turning to , microparticle-base display may be disposed between a first substrate layer and a second substrate layer . First substrate layer and second substrate layer may be the same material that transaction card is made of. For example, first substrate layer and second substrate layer may be plastic, metal, or an equivalent material used in the manufacture of transaction cards. Alternatively, first substrate layer and second substrate layer may be transparent films. In some embodiments, first substrate layer may be a transparent film and second substrate layer may be the same material used in the manufacture of transaction card . In these examples, first substrate layer may include a color filter overlay producing various shades and/or hues of the image or color generated by microparticle-base display .
320
420
440
430
420
440
420
420
440
440
442
444
430
442
444
446
448
442
444
442
420
444
440
FIG. 4
Microparticle-based medium may include a first electrode layer , a second electrode layer , and a plurality of microcapsules disposed between first electrode layer and second electrode layer . First electrode layer may comprise a transparent material. For example first electrode layer may comprise transparent conducting films, like indium tin oxide (ITO), fluorine doped tin oxide (FTO), doped zinc oxide, transparent conductive oxides (TCO), conductive polymers, metal grids, carbon nanotubes, graphene, nanowire meshes, ultra-thin metal films, or any equivalents. Second electrode layer may also comprise a transparent material, such as the transparent conducting films discussed above. Alternatively, second electrode layer may include an electrode pixel layer, which may define a plurality of contact pads or plates for each of the plurality of microcapsules. illustrates an example of a first contact pad and a first second contact pad for first microcapsule . An electrode pixel layer may provide a plurality of lead lines arranged in a grid pattern for more granular control for individual microcapsules. In this regard, the electrode pixel layer may generate one or more electrical fields that cause the microparticle-based medium to present one or more colors. For example, electrode pixel layer may cause a first color to be presented by a first microcapsule and a second color to be presented by a second microcapsule that may be adjacent to the first microcapsule. For example, first contact pad and second contact pad may generate a first electrical charge that generates the electrical field, which may cause the first microcapsule to present a first plurality of microparticles of a first pigment, while a third contact pad and a fourth contact pad may generate a second electrical field from a second electrical charge, different from the first electrical charge, that causes second microcapsule to present a second plurality of microparticles of a second pigment. In some embodiments, first contact pad and second contact pad may have different electrical charges, which may cause first microcapsule to present a combination of the first plurality of microparticles of the first pigment and the second plurality of microparticles of the second pigments. Accordingly, the electrode pixel layer may be used to generate various shades and hues of colors, as well as images. In some embodiments, first contact pad may be located in first electrode layer and second contact pad may be located in second electrode layer .
440
430
430
432
434
436
436
432
434
In order to generate the colors, one or more electrical charges may be applied to second electrode layer that causes the migration of microparticles contained in the microcapsules to rearrange. Microcapsule illustrates one example of the plurality of microcapsules described herein. In this regard, microcapsule may be made of a transparent material and include a first plurality of microparticles , a second plurality of microparticles , and a transparent fluid . Transparent fluid may be any suitable fluid that allows for the rearrangement and/or movement of first plurality of microparticles and second plurality of microparticles , such as a transparent oil or an electrolyte.
432
434
432
434
110
320
430
First plurality of microparticles may be a first pigment (i.e. color), while second plurality of microparticles may be a second pigment different from the first. Applying an electrical charge may cause the first plurality of microparticles and second plurality of microparticles to rearrange to produce a color or image. For example, a first electrical charge may cause the first plurality of microparticles of the first pigment to be displayed. Similarly, a second electrical charge may cause the second plurality of microparticles of the second pigment to be displayed. In some embodiments, a third electrical charge may cause a combination of the first plurality of microparticles and the second plurality of microparticles to be displayed. By applying various voltages and electrical charges to rearrange the microparticles, all, or a portion, of transaction card may appear as the color associated with the microparticles displayed via microparticle-based medium . As noted above, first microcapsule may include a third plurality of microparticles of a third pigment and a fourth plurality of microparticles of a fourth pigment. In these examples, the microparticles may be cyan, magenta, yellow, and white, which may be used to generate a plurality of colors and/or images.
120
130
110
110
110
110
As discussed above, using microparticle-based medium, such as those found in e ink and e paper applications, to effectuate a color change in a transaction card represents an improvement over traditional color changing transaction cards that require a power source. In this regard, applying a first voltage or electrical charge, such as one received from device and/or card reader , may change the color of transaction card . Transaction card may remain the color until transaction card receives a second voltage or electrical charge. Moreover, microparticle-based medium does not require a power sourced on transaction card to maintain the color. Thus, the color will not revert back to a previous color if the power source is drained or a cardholder forgets to charge the card.
Electrochemical Cell
FIG. 5
110
In some embodiments, a transaction card may include an electrochemical cell. In this regard, electrochemical cells may effectuate a quick color-change (i.e., ˜200 ms) using low voltage (i.e., ˜1-3V DC). Furthermore, little, or no, power may be required to maintain the color-change. This is known as memory effect. The present embodiment describes the use of an electrochemical cell to change a color on a transaction card. shows a color changing transaction card with an electrochromic cell in accordance with one or more aspects of the disclosure.
FIG. 5
110
110
510
520
530
540
110
Turning to , transaction card is shown. Transaction card may include chip , power source , electrochemical cell , and transceiver . As noted above, transaction card may be of a standard size and made of a substrate, such as plastic, metal, etc.
510
310
510
510
310
510
120
130
530
110
Chip may be similar to chip described above. In this regard, chip may be a smart chip or integrated circuit that includes a microprocessor and memory. Further, chip may include one or more contact pads to receive voltage to power the transaction card and exchange signals with a terminal Like chip , chip may apply a voltage and/or signal received from device and/or card reader to electrochemical cell to change a color of transaction card .
520
110
110
520
520
520
110
Power source may be a battery or some other portable power supply capable of providing power to transaction card . In some instances, transaction card may include a charging port (not shown) to receive a cable to supply power to recharge power source . In other embodiments, power source may include an inductive coil to recharge the power supply via electromagnetic induction. In still further embodiments, power source may include one or more solar cells configured to provide power to transaction card .
530
110
530
FIG. 6
Electrochemical cell may be any mechanism that generates a color in response to an electrical charge or current being applied thereto. As noted above, a relatively low power (i.e. 1-3V DC) may cause a chemical reaction that generates a color. In some embodiments, a plurality of electrochemical cells may be located on transaction card , with each electrochemical cell generating a different color. For example, a first electrochemical cell may generate a first color, a second electrochemical cell may generate a second color, and so on. The plurality of electrochemical cells may be used to provide different alerts and notifications to the cardholder. The details of electrochemical cell will be discussed in greater detail below with respect to .
330
530
110
120
130
530
530
120
130
Like transceiver , transceiver may be configured to receive a voltage to power transaction card and exchange signals with device and/or card reader . Transceiver may include an antenna or other communication capabilities, such as NFC, Wi-Fi, and Bluetooth®. In other embodiments, transceiver may comprise a short-range wireless transceiver configured to receive the voltage to power the transaction card and exchange signals with device and/or card reader .
530
530
FIG. 6
Electrochemical cell may be preferred over traditional color-changing techniques because electrochemical cell may effectuate a color change via a one-time voltage application and require little to no power to maintain the color change. shows an electrochemical cell according to one or more aspects of the disclosure.
FIG. 6
530
610
670
610
670
110
610
670
610
670
110
Turning to , electrochemical cell may be disposed between a first substrate layer and a second substrate layer . Like the substrate layers described above, first substrate layer and second substrate layer may be the same material as transaction card . Alternatively, first substrate layer and second substrate layer may be transparent films. In some embodiments, first substrate layer may be a transparent film and second substrate layer may be the same material used in the manufacture of transaction card .
530
620
630
620
660
650
640
630
620
650
660
530
680
620
640
660
680
510
510
680
620
660
630
650
640
620
660
3
Electrochemical cell may include a first electrode layer , a doped film on a surface of first electrode layer , a second electrode layer , an electrochromic film , and a conductive material disposed between doped film on first electrode layer and the electrochromic film on second electrode layer . Electrochemical cell may include a transistor , or switch, that may be closed to enable the flow of current from first electrode layer , through electrochromic material , to second electrode layer to effectuate the color change. In some embodiments, transistor may be communicatively coupled to chip . In this regard, chip may provide a signal that closes transistor to enable the flow of current from first electrode layer to second electrode layer . In alternative embodiments, doped film and electrochromic film may be eliminated, and conductive material may be replaced with an electrochromic material disposed between first electrode layer and second electrode layer . The electrochromic material may be tungsten oxide (WO), molybdenum oxide, a viologen (e.g. 4,4′-bipyridine), an electrochromic polymer (ECPs), a metal coordination complex (e.g. 2,2′-bipyridine), or any equivalent thereof.
620
660
660
620
660
First electrode layer may be made of a transparent material, such as a transparent conducting film. In some embodiments, second electrode layer may also comprise a transparent material. Alternatively, second electrode layer may include a material with a reflective coating. In some embodiments, first electrode layer and second electrode layer may be made of a thin film, such as polyethylene terephthalate (PET), that has been doped with a conductive metal, such as tin, fluorine, antimony, or an equivalent thereof.
620
630
640
660
650
650
640
680
620
630
640
650
660
110
In some embodiments, first electrode layer may include doped film on one surface, preferably the surface proximate to conductive material . Similarly, second electrode layer may include electrochromic film disposed on one surface. In alternative embodiments, second electrode layer may be made of a reflective material, or a material with a reflective coasting. Electrochromic film may be disposed on the surface proximate to conductive material . In some embodiments, the conductive material includes an electrolyte in liquid, gel, or solid form. In operation, transistor may close, enabling a current to flow from first electrode layer and doped film , through conductive material , and to electrochromic film and second electrode layer . In some embodiments, electrochromic cell may be capable of switching between a plurality of colors in response to different currents. For example, a first current, or electrical charge, may cause electrochromic cell to generate a first color, while a second current, or electrical charge, may cause electrochromic cell to generate a second color different from the first color. Alternatively, or additionally, a plurality of electrochromic cells may be disposed on transaction card . A first set of one or more of the plurality of electrochromic cells may be configured to generate a first color and, therefore, provide a first alert to the cardholder; while a second set of one or more of the plurality of electrochromic cells may be configured to generate a second color and, therefore, provide a second alert to the cardholder. Additional sets of electrochromic cells may be used to provide different colors and/or images and alerts to the cardholder.
An electrochemical cell to change the color of a transaction card as part of an alert to the cardholder represents an improvement over traditional color-changing transaction cards since the color change may be realized using a low voltage and the color change may remain in effect with little to no power. As noted above, traditional color-changing transaction cards require a power source to change and maintain a change in color. An electrochemical cell requires little power to change the color, and little to no power to maintain the color change. Thus, using an electrochemical cell to change the color of a transaction card to provide an alert to a cardholder will not revert back to a previous color if the power source is drained or when a cardholder forgets to charge the transaction card.
Liquid Crystal Field
110
110
FIG. 7
In alternative embodiments, transaction card may include a liquid crystal field. Liquid crystal fields may effectuate a temporary color-change to provide alerts and/or notifications to a cardholder. In the current embodiment, a transaction card with a liquid crystal field is described to provide a cardholder with an alert and/or notification. shows a color changing transaction card with a liquid crystal field in accordance with one or more aspects of the disclosure.
FIG. 7
110
110
710
720
730
740
110
Turning to , transaction card is shown. Transaction card may include chip , power source , liquid crystal field , and transceiver . As noted above, transaction card may be of a standard size and made of a substrate, such as plastic, metal, etc.
710
710
110
120
130
710
120
130
730
Chip may be similar to chips described above. In this regard, chip may include one or more contact pads to receive voltage to power transaction card and exchange signals with device and/or card reader . Further, chip may apply a voltage and/or signal, received from device and/or card reader , to liquid crystal field to generate an alert and/or notification. In this regard, the alert and/or notification may be a color, an image, a pattern, or any combination thereof.
720
720
110
110
720
720
720
110
Power source may be similar to the power source discussed above. In this regard, power source may include a battery or some other portable power supply capable of providing power to transaction card . Transaction card may include a charging port (not shown) to receive a cable to supply power to recharge power source . Alternatively, or additionally, power source may include an inductive coil to recharge the power supply via electromagnetic induction. Power source may include one or more solar cells configured to provide power to transaction card .
730
730
730
710
120
130
730
730
730
730
730
730
FIG. 8
Liquid crystal field may be any mechanism that manipulates a field of liquid crystals to generate a color, an image, a pattern, or an equivalent thereof. In this regard, liquid crystal field may provide a temporary alert and/or notification to a cardholder. For example, when power is applied to liquid crystal field , for example—in response to a signal received from chip , device , card reader , or any combination thereof, liquid crystal field may generate a color, image, pattern, or equivalent thereof that conveys the alert to the cardholder. When the power is removed, liquid crystal field may return to a passive state. The passive state may be one in which liquid crystal field does not display any color. In this regard, liquid crystal field may be transparent, allowing the card material to be viewed through liquid crystal field . The components of liquid crystal field will be discussed in greater detail below with respect to .
740
110
120
130
740
Similar to the transceivers described above, transceiver may be configured to receive a voltage to power transaction card and exchange signals with device and/or card reader . Accordingly, transceiver may include an antenna, a short-range wireless transceiver, or other communication capabilities, such as NFC, Wi-Fi, and Bluetooth®.
FIG. 8
730
810
860
810
810
730
860
110
860
860
860
850
850
Turning to , liquid crystal field may be disposed between a first substrate layer and a second substrate layer . First substrate layer may be a transparent film. In some embodiments, first substrate layer may be a polarizing filter film. For example, the polarizing filter film may include a vertical axis to polarize light as it enters liquid crystal field . Second substrate layer may be the same material as transaction card . Alternatively, second substrate layer may comprise a reflective surface. In further embodiments, second substrate layer may be a light source. Additionally, or alternatively, second substrate layer may have a polarizing film, such as film , disposed on a surface thereof. Film may be a polarizing filter film in the horizontal axis.
820
830
840
810
860
870
820
840
710
870
820
840
830
870
710
120
130
First electrode , liquid crystal , and second electrode may be located between first substrate layer and second substrate layer . Transistor may be communicatively coupled to first electrode , second electrode , and chip . In some embodiment, transistor may be a switch configured to allow the flow of current from first electrode to second electrode , which causes liquid crystal to realign to change a color or generate an image or pattern. Transistor may close, thereby allowing the current to flow between the electrodes, in response to a signal received from chip , device , card reader , or any combination thereof.
820
820
810
840
840
First electrode layer may be made of a transparent material, such as glass or a transparent conducting film. In some instances, first electrode layer includes a glass substrate and a doped film on a surface of the glass substrate. The other surface of the glass substrate may comprise first substrate layer . Similarly, second electrode layer may also comprise a transparent material. In some embodiments, second electrode layer may be made of glass and have a doped film located on a surface thereof.
Using a liquid crystal field to provide an alert and/or notification to a cardholder represents an improvement over traditional color-changing transaction cards. Liquid crystal fields may effectuate a temporary color-change to provide alerts and/or notifications to a cardholder. In the current embodiment, a transaction card with a liquid crystal field is described to provide a cardholder with an alert and/or notification.
110
120
130
900
900
FIG. 9
Given the embodiments discussed above, an exchange of signals may occur between transaction card and either device and/or card reader . shows a flow chart of a process for changing the color of a transaction card according to one or more aspects of the disclosure. Some or all of the steps of process may be performed using the transaction card and/or one or more computing devices described herein.
900
910
110
110
110
110
120
130
140
920
110
120
130
140
120
130
930
110
110
940
110
Process begins in block , with transaction card receiving a transaction decision. As noted above, transaction card may process payments, perform cryptographic processing, authenticate transaction card , define risk management parameters, digitally sign payment data, and verify the cardholder. While transaction card may perform several functions, the transaction decision may come from device , card reader , server , or any combination thereof. In some embodiments, the transaction decision may be an approval or a denial. In block , transaction card may also receive a command. The command may come from an application running on device , card reader , server , or any combination thereof. In some embodiments, the command may indicate that the cardholder has exceeded one or more of their thresholds. Accordingly, the command may prompt the transaction card to change one or more colors to provide a notification to the cardholder that the cardholder has exceeded one or more of the thresholds. Alternatively, the command may indicate that the cardholder has gone below one or more of their thresholds. In this instances, the command may prompt the transaction card to clear any alerts and/or notifications and have the card return to its manufactured color. In some embodiments, the command may include a voltage or power to effectuate the color change. The voltage, or power, may come from device , card reader , a power source located on the transaction card, or any combination thereof. In block , transaction card may apply the voltage to the color-changing mechanism. As discussed above, this may prompt all, or part, of transaction card to change from a first color to a second color in block . This color change may remain in effect until transaction card receives another command to change the color of the transaction card. Alternatively, the color change may have a temporary effect. For example, the color change may be a momentary change to alert and/or notify the cardholder, which eventually returns the transaction card to its manufactured color.
900
While the above-described process has been described as changing the color of a transaction card in response to a determination that one or more thresholds have been met or exceeded, it will be appreciated that process may be repeated each time that the cardholder crosses one or more thresholds, in either direction. Accordingly, the transaction card may be used to indicate when the cardholder has exceeded their spending limits and/or their account has gone below a certain amount. Alternatively, the transaction card may also be used to indicate when the cardholder's balance has gone below one or more thresholds or their account balance has gone above a designated amount.
By including a color-changing mechanism on a transaction card, a cardholder may have a better understanding of their spending habits and their account balances. Additionally, the techniques described herein may improve the communications that a cardholder has with their financial institution. Accordingly, a transaction card that is capable of providing one or more alerts via a color-changing mechanism located on the card may make the cardholder more fiscally responsible. Furthermore, having the capability of effectuating and maintaining the color change without a power supply built-in improves over existing designs that require a power supply and are incapable of providing alerts and/or notifications when the power supply is exhausted.
While the embodiments discussed above describe a color-changing transaction card, it will be appreciated that the embodiments, technologies, systems, and methods described herein may have applicability to other areas. For example, the color-changing techniques described herein may be implemented in a corporate identifier card (e.g., smart card). In this regard, different colors may be used to designate employees, contractors, and/or visitors. Furthermore, the color-changing corporate identifier card may be used to indicate when an employee has been terminated and the card is no longer valid. In another example, the color changing components described herein may be used on government issued IDs, such as a driver licenses and passports. The color changing techniques may be used to identify and label fraudulent government IDs. These examples should be interpreted as merely illustrative and one skilled in the art would recognize the general applicability of the techniques described herein.
One or more aspects discussed herein may be embodied in computer-usable or readable data and/or computer-executable instructions, such as in one or more program modules, executed by one or more computers or other devices as described herein. Generally, program modules include routines, programs, objects, components, data structures, and the like, that perform particular tasks or implement particular abstract data types when executed by a processor in a computer or other device. The modules may be written in a source code programming language that is subsequently compiled for execution, or may be written in a scripting language such as (but not limited to) HTML or XML. The computer executable instructions may be stored on a computer readable medium such as a hard disk, optical disk, removable storage media, solid-state memory, RAM, and the like. As will be appreciated by one of skill in the art, the functionality of the program modules may be combined or distributed as desired in various embodiments. In addition, the functionality may be embodied in whole or in part in firmware or hardware equivalents such as integrated circuits, field programmable gate arrays (FPGA), and the like. Particular data structures may be used to more effectively implement one or more aspects discussed herein, and such data structures are contemplated within the scope of computer executable instructions and computer-usable data described herein. Various aspects discussed herein may be embodied as a method, a computing device, a system, and/or a computer program product.
Although the present invention has been described in certain specific aspects, many additional modifications and variations would be apparent to those skilled in the art. In particular, any of the various processes described above may be performed in alternative sequences and/or in parallel (on different computing devices) in order to achieve similar results in a manner that is more appropriate to the requirements of a specific application. It is therefore to be understood that the present invention may be practiced otherwise than specifically described without departing from the scope and spirit of the present invention. Thus, embodiments of the present invention should be considered in all respects as illustrative and not restrictive. Accordingly, the scope of the invention should be determined not by the embodiments illustrated, but by the appended claims and their equivalents. | |
The series is intended as a forum for the publication of outstanding scholarly contributions that strive systematically to involve both lawyers and anthropologists in the study, thinking, and theorizing about the search for justice in contemporary societies. It seeks to give equal weight to anthropological scholarship on the functioning of non-state normative orders – often existing side-by-side with formal state law – and legal scholarship dealing with the pragmatics of practice in a wide variety of circumstances where different normative logics come into conflict with one another.
The series welcomes work that analyses not only the relevant legal sources, but also the ethnographic data that can help provide context and an empirical foundation in the search for concrete solutions. Studies that draw on the methods and conceptual frameworks of anthropology, while staying within the boundaries of the technical and doctrinal tools that the law makes available, are rare. The series offers a venue for nourishing such endeavours and provides the academic anchorage for anthropologists and legal scholars who are straddling the two disciplines to meet, exchange views, and further develop their ideas and analyses.
Redesigning Justice for Plural Societies Case Studies of Minority Accommodation from around the Globe
Normative Spaces and Legal Dynamics in Africa
By Katherine Luongo
April 17, 2023
This book analyzes how over the last two decades, immigration regimes in three, primary refugee-receiving states in the Global North – Canada, Australia, and the UK – have engaged with allegations about witchcraft-driven violence made by asylum seekers coming from Anglophone countries across the ...
Edited
By Katayoun Alidadi, Marie-Claire Foblets, Dominik Müller
September 30, 2022
This volume examines cases of accommodation and recognition of minority practices: cultural, religious, ethnic, linguistic or otherwise, under state law. The collection presents selected situations and experiences from a variety of regions and from different legal traditions around the world in ...
Edited
By Katrin Seidel, Hatem Elliesie
June 29, 2020
African legal realities reflect an intertwining of transnational, regional, and local normative frameworks, institutions, and practices that challenge the idea of the sovereign territorial state. This book analyses the novel constellations of governance actors and conditions under which they ...
By Kalindi Kokal
August 07, 2019
This book presents an ethnography of dispute processing by non-state forums and actors in rural India. As such it sheds light on a much neglected and contested topic. Arising in the context of recent legal and political debates that question the legitimacy of non-state actors engaged in dispute ...
Edited
By Marie-Claire Foblets, Michele Graziadei, Alison Renteln
November 22, 2017
This volume addresses the exercise of personal autonomy in contemporary situations of normative pluralism. In the Western liberal tradition, from a strictly legal and theoretical perspective the social individual has the right to exercise the autonomy of his or her will. In a context of legal ... | https://www.routledge.com/Law-and-Anthropology/book-series/LAWANTH |
Company Description Veolia Group aims to be the benchmark company for ecological transformation. With nearly 220,000 employees worldwide, the Group designs and provides game-changing solutions that are both useful and practical for water, waste and energy management. Through its three complementary business activities, Veolia helps to develop access to resources, preserve available resources and replenish them. In 2021, the Veolia group provided 79 million inhabitants with drinking water and 61 million with sanitation, produced nearly 48 million megawatt hours and recovered 48 million tons of waste. Veolia Environnement (Paris Euronext: VIE) achieved consolidated revenue of 28,508 billion euros in 2021.
www.veolia.com
Job Description Summary
Provides day-to-day monitoring and basic plant and pump/booster station operations, routine lab tests and basic corrective and preventative maintenance activities.
Primary Duties / Responsibilities
Operates equipment manually and through instrumentation panels, computer terminals, and programmable logic control units following process control procedures. Monitors and observes operating conditions, and records observations and data in shift log. Diagnoses basic operational problems and takes corrective action per procedure.
Performs routine CLAIR (cleaning, lubrication, adjustment, inspection, and minor repair) on machines and related equipment, which may include pumps, engines, generators, valves, gates, mixers, conveyors, blowers, dryers, and filter presses. Reports and documents results of work performed and enters into the appropriate database. Promptly reports any operational problems with machines or equipment to the Lead or Supervisor.
Collects water, wastewater, industrial waste, sludge, and residuals according to schedule. Performs field tests in order to pace chemical dosages for the process. Prepares chemical solutions, monitors supplies, and recommends reorder.
Performs routine lab tests and prepares reports per procedure.
Performs routine instrument calibration for portable meters, including, but not limited to, pH.
Learns to inspect pumps and mechanical troubleshooting to determine repairs needed. Dismantles equipment to gain access to and repairs defective parts using hand tools, power tools, and Re-assembles and tests equipment ensuring safe and efficient operating condition is restored.
Performs manual labor, including cleaning equipment, facilities, and grounds as required, and properly disposes of waste according to safety and environmental policies. Operates vehicles, mobile equipment, and material handling equipment for operational and maintenance purposes.
Qualifications Education / Experience / Background
High school or GED with the ability to read, write and comprehend English (operational, process, safety and quality instructions) and be able to carry out verbal and written instructions.
Six months to two years of experience in a related position with experience in a similar environment preferred.
Experience using power, and hand tools.
Knowledge / Skills / Abilities
Ability to perform basic mathematical calculations.
Some vocational training and mechanical aptitude preferred, with the ability to read, interpret and record data from meters, gauges, scales, panels, computer consoles, and other equipment.
Ability to learn to diagnose basic and routine process and mechanical problems and take remedial corrective action.
Must have basic computer skills.
Must consistently demonstrate the ability to learn and independently perform assigned duties and meet or exceed production and quality goals.
Must demonstrate the ability to work in a team environment and willingness to assume additional or new responsibilities readily.
Must be able to work Nights, Days, Weekends, and Holidays. 24/7 Operation.
Required Certification / Licenses / Training
Required Certifications will have on the job training (Illinois D- Drinking Water, K - Site Specific Wast Water, Forklift, etc.
Must possess a valid driver’s license and a safe driving record.
Employee Orientation, Departmental Operating Procedures, Safety, OSHA, and Quality Training.
Obtain and maintain minimum water / wastewater operator state certification.
Must become proficient in the care and use of all site specific, the facility required PPE (Personal Protection Equipment), including respirators, gas detectors, confined space equipment, etc.)
Works toward increasing skills in additional functional areas or in obtaining advanced skills / maintenance certifications.
May perform more advanced functions as part of training and development.
Physical Requirements / Work Environment
Spends 100% of the time in an operations environment. Typically spends 25 – 35% of time exposed to outdoor and sometimes inclement weather. Company service vehicles are used as required.
Travels 1 – 2 times per year for company provided training. May be required to travel up to five consecutive days. May serve rotational 24 hour emergency on-call.
May be exposed to possible operations hazards, including fumes, dust, toxic and caustic chemicals, noise, rotating machinery, high pressure and hot and cold temperatures, slippery surfaces, water, and electrical hazards.
Amount of time spent – Standing 25%, Walking 75% for as many as five miles per shift.
Requires close visual and hearing observation to detect non-conformance and machine malfunction.
Constantly uses hands to finger, handle or feel and frequently reaches with hands and arms.
Works in various positions; works on ladders, catwalks, and supports at heights of 50 feet above the ground; and works with hands extended above and below head and body up to 40 minutes using hand tools weighing up to 15 pounds. Must be able to lift and carry 50 pounds (occasionally 60 pounds) distances of 10 feet. Occasional stooping, bending or kneeling and entering confined spaces.
Additional Information VNA is committed to the principles of equal employment opportunity. VNA’s practices and employment decisions, including those regarding recruitment, hiring, assignment, promotion, compensation, benefits, training, discipline, and termination shall not be based on any person’s sex, race, color, religion, ancestry or national origin, age, disability, marital status, sexual orientation, pregnancy, veteran status, citizenship status or other protected group status as defined by applicable law.
VNA gives fair consideration to all qualified individuals and affords all employees and applicants opportunities for advancement according to their individual abilities without regard to membership in any applicable protected category. No opportunity for hire, advancement or any other condition of employment will be diminished through unlawful discriminatory practices. | https://www.employmentcrossing.com/job/id-48de983b84d3ee14f7eb7eca21cc3518 |
According to Literary Devices, “In literature, an archetype is a typical character, an action, or a situation that seems to represent universal patterns of human nature” (literarydevices). In the novel In the Time of the Butterflies by Julia Alvarez, the Archetypal Theory can be applied to characters and symbols in the
An archetype is an image, a descriptive detail, a plot pattern, or a type of character that occurs multiple times in myth, literature, religion, or folk lore. Archetypes often provoke emotion in the reader as they awaken an image, calling illogical responses into play. Many novels, legends, and myth are made up of archetypes which causes similarities in the plots of many novels. For example, the Helper God, the golden place, seasons and metamorphosis are archetypes that make up modern literature and they make up prominent themes found within the novels containing those archetypes. Like these archetypes, the magical weapon archetype, which has only one true owner able to use it to its fullest potential, also is a prominent theme within literature and film creating a large part in the theme.
These basic archetypes are the fundamentals of storytelling to this day no matter if it’s western modern society or eastern modern society or anything in between. For example in Harry potter, which is a western 21st century piece of work, you see these
Archetypes are found in many stories. An archetype is a recurrent symbol, behavior, and even term found in in literature. For example, in the story “Cinderella”, one can relate the helpful fairy godmother to other stories, such as “Sleeping Beauty” and “Pocahontas”. These common ideas are also shown in the story “Ashputtle”. This story was about a young girl whose mother dies and later in the story, her father remarries a woman who had two daughters who treats Ashputtle terribly.
1.5 Significance of the Study The study is conducted in order to identify and have a better understanding towards the stages of the Hero’s Journey when it is applied to the female protagonist, Cinder. At the same time, the Hero’s archetypes will be determined in Cinder through the Hero’s Journey. Female empowerment is vital as females are generally belittled. This study aims to give readers a whole new perspective on females also being capable to handle a male’s role. 1.6 Definition of Terms Archetype: Universal, archaic patterns and images that derive from the collective unconscious and are the psychic complement of instinct.
After 1930s a new type of young hero emerges in the literary world. This one “is more complex image of youth, an image quite frequently of disenchantment, or failure, or violent experience” ( Hassan 312). Previously, child archetype associated with innocence this time it changed and turned into a teenager that represents a different perspective. Thus 20th century society was represented to a new person that was neither a child nor an adult. He is called in several sources as a half man.
However, some people believe that abuse is discipline, but where is the line drawn? Abuse in the life of juveniles leaves a great impact on a child whether positive or negative. A child can be mistreated in various ways, though, the main focus for this paper is physically abuse. Physical abuse is the excessive and deliberate hitting on a child. Physical manhandle is damage coming about because of physical hostility.
Archetype Essay An archetype is the original pattern which are repeated over time. Two major archetypes are Character and Situational. The Character Archetype I chose was the White Goddess. The White Goddess is a good, beautiful maiden who is usually blonde. The White goddess is often very religious or intellectual values and may make an ideal marriage partner.
1. The concept of archetypes is shown only in symbolic forms that have been occurring constantly in the course of history. 2. These ideas come out
Ocean Vuong’s relationship with his father does not come across as a strong one. Vuong’s father was sent to jail when Vuong was just a child for domestic abuse. “... Don't worry. Your father is only your father until one of you forgets…” Vuong’s mother was always a big role model in his life. They moved from Vietnam to the United States, completely illiterate, poor, and working at a nail salon. | https://www.ipl.org/essay/Footnote-To-Youth-Analysis-PK23BN2FC4DR |
The gift-giving holidays are quickly approaching and I have gone several years without giving extended family any presents. Though this is mostly due to financial constraints, since as Artscrapers we don’t even have money for art much less presents for extended family, it is also due to my lack of discipline. I have promised presents in the form of artwork, but have never seemed to have the time to set aside to begin such projects. I want to change that this year and use the resources I do have to MAKE presents for my friends and family.
During this gift-giving saga of my life, you will see the brainstorming and planning, collecting and prepping, and project creation for each project. I am super excited to have you guys for accountability! I am also super excited to have you join me.
The people I love have interests ranging from classical to modern style art as well as interests from horses to Broadway plays. This is going to be quite a spread so get your thinking caps on and let’s get to planning!
Please feel free to join me on this journey of creating your own artwork for your family and friends in this time. Watching these posts over the next few months may help you hone your own skills of creating original artwork from beginning to end. You don’t have to follow my exact process. I tend to be very systematic in my planning and technique and many of you may feel constrained working that way. All the same, I hope you can take something to heart to assist you.
The caveat to all of this is that the whole process for me is not glamorous.
There are always lots of mistakes and many times I start over because I am not satisfied. I cannot gift something unless I feel like I would want to hang it on the wall myself and I know this is a serious hang-up.
During the process I always have to remember that these people love me and I am doing my very best work for them. Whether they choose to hang it up in the living room or not, I know that will never be a reflection of my worth to them. That being said, and I’m preaching to the choir here, don’t be scared to give a piece of artwork. You can always say, “This is precious because its one of my first”, which indeed is VERY precious.
I will not hide anything from you. The best way to learn to create is to create. Practice makes progress and progress is a beautiful timeline that you can look back on and be proud!
Be on the lookout for my next post where I will begin the first journey! | https://www.artscrapers.com/blog/2018/11/13/xa84tagfkywdohikm7nc9a53sif0dv |
"A third of British women risk doing severe harm to their unborn babies by binge drinking during pregnancy," the Mail Online reports. While a concerning statistic, the evidence behind the headline is perhaps not as clear-cut as the Mail would lead its readers to believe.
This story has been prompted by the publication of a study comparing just over 17,000 women's alcohol consumption before and during pregnancy in the UK, Ireland, Australia and New Zealand. It also looked at which groups of women were more likely to report drinking alcohol in pregnancy.
While the overall study population was large, an overlooked fact not made clear in the media was that the study only included data from 651 women from the UK. The study also collected this data over a relatively long time – between 2004 and 2011 – and drinking habits may have changed since then.
Out of these 651 women, a third reported binge drinking (defined as drinking six units or more in one sitting) in their first trimester. Reassuringly, in all countries surveyed, this figure dropped dramatically in the second trimester, to around just 1%.
This pattern could suggest that women may not have known they were pregnant at the time of binge drinking, and stopped once they found out. Whether pregnant or not, it is best to avoid binge drinking.
Current NICE recommendations are that women abstain from drinking alcohol in the first trimester of pregnancy, as it can increase the risk of miscarriage. It is also linked to premature birth, and drinking heavily through pregnancy can result in foetal alcohol syndrome.
If you are pregnant and having problems controlling your drinking, you should contact your GP for advice.
The study was carried out by researchers from Cork University Maternity Hospital and other hospitals and research centres in Ireland, the UK, Australia and New Zealand. The studies in the individual countries were funded by different governmental and charity and research bodies. For example, in the UK, funding was provided by the National Health Service (NHS), Biotechnology and Biological Sciences Research Council, University of Manchester Proof, Guy's and St Thomas’ Charity, Tommy's charity and Cerebra UK.
The study was published in the peer-reviewed BMJ Open. This is an open-access journal, so the study is free to read online or download as a PDF.
The UK media focuses on the UK results, but none appear to report that these figures come from just 651 women, and data was collected over a long time period (2004-2011). This is probably too small a sample size to confidently extrapolate it to current drinking habits among all pregnant women in the UK, as most of the headline writers have done.
Only The Guardian points out that the reported level of binge drinking dropped to around 1 in 100 women in the second trimester.
While not assessed in the study, this could suggest that the vast majority of women stopped binge drinking once they realised they were pregnant, to prevent harm to their baby.
The researchers do call for better ways to assess alcohol intake in pregnant women, to get a more reliable estimate of how many women do drink in pregnancy. For example, they suggest the possibility of a biological test, which would not require a woman to self-report consumption.
This was an analysis of data collected in both prospective and retrospective cohort studies. It aimed to identify how many women drank alcohol before and during pregnancy in multiple countries, and identify the characteristics of women who were more likely to drink in pregnancy.
This is a suitable approach to assessing this question. Prospective studies are more likely to be reliable, as they enrol people and then continue to assess their habits, as opposed to asking them about the (sometimes distant) past.
It is difficult to assess people’s alcohol consumption, as it relies on people being truthful and accurate about how much they drink. This may be even more difficult in pregnant women, as they may feel guilt or stigma associated with drinking alcohol in pregnancy, making them less likely to report it.
The researchers hoped that by looking at results collected in different ways from countries that are generally similar, they might get an idea of which methods of assessing alcohol consumption in pregnancy give the most consistent results.
In addition, estimates from different studies may be affected by different ways in which drinking was measured, meaning that estimates are not entirely comparable.
The researchers used data collected in three studies – two retrospective studies from Ireland and one international prospective study.
The Growing up in Ireland (GUI) study was a national survey of a sample of mothers of 10,953 infants aged six to nine months, carried out in 2008 and 2009. Interviews were carried out face-to-face by a trained researcher. They were asked if they drank during pregnancy and, if so, how much on average they drank per week (pints of beer or cider, glasses of wine, measures of spirits or alcopops) in each trimester.
The Pregnancy Risk Assessment Monitoring System Ireland (PRAMS Ireland) study surveyed a sample of 718 women who had given birth to a live baby and been discharged from Cork University Maternity Hospital in 2012. These women completed three postal surveys between two and nine months after the birth of their baby. The surveys included questions about whether they drank alcohol, how much (glasses or bottles) of different types of alcohol they drank and how often (occasions per week or month) in the three months before pregnancy, and in each trimester.
The international Screening for Pregnancy Endpoints (SCOPE) study included 8,531 healthy women who had their first baby from 2004 to 2011 in Ireland, the UK, Australia and New Zealand. The study did not include women who had multiple pregnancies (e.g. twins), or had various medical complications, such as being at high risk of pre-eclampsia, or who had a baby that was small for its gestational age or born pre-term. Research midwives interviewed the participants at 15 and 20 weeks into their pregnancy. They asked the women if they drank alcohol before pregnancy or earlier than 15 weeks, or were still drinking alcohol at the time of the interview. If they reported drinking at any of these points, they were asked how many units or "binges" per week they were drinking up to the time of interview. If they reported stopping drinking alcohol during the study, they were asked when they stopped.
The researchers compared results from the different studies. They defined one unit of alcohol as 8-10g of pure alcohol, which was equivalent to one glass of wine (about 100-125ml), one small glass of sherry, a single "nip" of spirits, or half a pint of regular-strength lager. A can or small bottle/glass of regular-strength beer (300-330ml, 4-5% alcohol) was equivalent to 1.5 units of alcohol, and a bottle of alcopop was equivalent to 2 units of alcohol. Alcohol intake was classified as occasional (1-2 units/week), low (3-7 units/week), moderate (8-14 units/week) or heavy (greater than 14 units/week). Binge drinking was considered to be consuming six or more units per occasion.
The studies also collected other information from the women, and the researchers looked at what characteristics were more common among women who reported drinking alcohol during pregnancy.
There was variation in the amount of alcohol the women reported consuming across the different countries and across groups of women with different characteristics.
When looking at Ireland, women in the SCOPE study reported the highest levels of drinking:
When looking across different countries within the SCOPE study:
When looking at the characteristics of those who drank:
The researchers concluded that: "alcohol use during pregnancy is prevalent and socially pervasive in the UK, Ireland, New Zealand and Australia". They suggest that this shows low adherence to guidelines recommending complete abstinence or only low consumption, and that new policies and interventions are needed to reduce women’s alcohol consumption both before and during pregnancy. They also note that research is needed to identify more reliable ways to assess alcohol consumption in pregnancy, so they can more accurately tell how many women do drink during pregnancy.
This study provides information on reported alcohol consumption among pregnant women in four different countries. The study’s strengths are the relatively large number of women assessed overall (over 17,000) and that at least some of the data was collected prospectively.
The studies collected data on alcohol consumption in different ways – for example, in face-to-face interviews or by post – and interviews were carried out by either midwives or researchers. They also used different questions about alcohol consumption. This may mean that results are not directly comparable across the studies. The researchers were interested in whether, despite these different methods, there would be similar results across the studies. For example, the fact that women who smoked were more likely to report drinking alcohol in pregnancy across the studies suggests that this is more likely to be a reliable finding.
The researchers note that:
It is difficult to assess people’s alcohol consumption, as it relies on people being truthful and accurate about how much they drink. This may be even more difficult in pregnant women, as they may feel guilt or stigma associated with drinking alcohol in pregnancy, making them less likely to report it.
Cultural differences and possible differences in guidance about alcohol consumption in pregnancy across the different countries may have influenced the results. The studies collected data across a wide time period, particularly the SCOPE study, which collected data from 2004 to 2011. Alcohol consumption may also have varied over this period.
Although the study was large overall, the number of women from some countries was small. For example, only 651 women from the UK were included, and 1,159 from Australia. Therefore, results may not be representative of the whole pregnant population in these countries.
The overall pattern of results is somewhat skewed, due to larger amount of data relating to women from Ireland and New Zealand.
Current UK NICE guidance recommends that women planning a pregnancy and pregnant women avoid drinking alcohol in the first three months (trimester) of pregnancy because it may increase risk of miscarriage.
If women choose to drink during pregnancy, they should drink no more than 1 to 2 UK units once or twice a week. NICE notes that there is still uncertainty regarding a safe level of alcohol consumption in pregnancy, but there is no evidence that this low level causes harm to the unborn baby.
Pregnant women should avoid getting drunk or binge drinking (drinking 5 standard drinks or 7.5 UK units on a single occasion), as this may harm the unborn baby. | https://www.nicswell.co.uk/health-news/reports-that-1-pregnant-woman-in-3-in-uk-binge-drink-unconfirmed |
FIELD
BACKGROUND
DETAILED DESCRIPTION
The subject matter herein generally relates to an access control device and an access control method.
A factory includes many restricted zones, and a visitor needs permission to enter into the restricted zones. Usually, an access control device includes an IC/ID card or a fingerprint for obtaining the access permission to enter into the restricted zones.
It will be appreciated that for simplicity and clarity of illustration, where appropriate, reference numerals have been repeated among the different figures to indicate corresponding or analogous elements. In addition, numerous specific details are set forth in order to provide a thorough understanding of the embodiments described herein. However, it will be understood by those of ordinary skill in the art that the embodiments described herein can be practiced without these specific details. In other instances, methods, procedures and components have not been described in detail so as not to obscure the related relevant feature being described. Also, the description is not to be considered as limiting the scope of the embodiments described herein. The drawings are not necessarily to scale and the proportions of certain parts may be exaggerated to better illustrate details and features of the present disclosure.
The term “comprising,” when utilized, means “including, but not necessarily limited to”; it specifically indicates open-ended inclusion or membership in the so-described combination, group, series and the like.
The present disclosure is described in relation to an access control device. The access control device includes a first electronic device and a second electronic device. The first electronic device includes a storing module and a processing module. The storing module stores information about a visitor and the processing module processes the information to generate an identification figure. The second electronic device includes an executing module, and the executing module determines an access permission about the visitor for entering into a restricted zone, according to the identification figure.
FIG. 1
100
100
10
20
30
illustrates an embodiment of an access control device . The access control device can include a first electronic device , a second electronic device and a third electronic device .
10
11
13
15
16
17
11
13
10
10
10
13
15
16
17
10
10
The first electronic device can include a communicating module , a storing module , a processing module , a setting module , and a tracking module . The communicating module is configured to connect a network to receive information about a visitor for the storing module . For example, when the first electronic device is operated by the visitor, the information can be input into the first electronic device via a display of the first electronic device . The information can include a name, a gender, an identification card number, a telephone number, a fingerprint, and other information used for distinguishing from other visitor information. The storing module is configured to store the information about the visitor. The processing module is configured to process the information about the visitor to generate an identification figure. The identification figure can be a barcode or an image. The setting module is configured to set a deadline of the identification figure. For example, the deadline of the identification figure is one day, so the identification figure can be valid only one day. The tracking module is configured to track the geographical location about the visitor to allow the first electronic device to detect the geographical location about the visitor. In at least one embodiment, the first electronic device is a terminal having a display, such as a personal computer.
20
21
23
21
15
23
21
20
20
23
20
The second electronic device can include a receiving module and an executing module . The receiving module is configured to receive the identification figure from the processing module for sending to the executing module . In at least one embodiment, the receiving module can be a camera of the second electronic device , and the second electronic device can store the identification figure via the camera taking a picture of the identification figure. The executing module can determine an access permission about the visitor according to the identification figure. In at least one embodiment, the second electronic device can be a portable device, such as a mobile phone or a tablet computer.
30
31
31
23
31
31
31
31
17
10
The third electronic device can include a scanning module . The scanning module is configured to scan the barcode of the identification figure to allow the executing module to execute access permissions about the visitor. For example, the scanning module scans the barcode, if the information about the visitor displayed by the scanning module is satisfied with an authorized information, the visitor is permitted to access a restricted zone; if the information about the visitor displayed by the scanning module is not satisfied with the authorized information, the visitor cannot be permitted to access the restricted zone. When the scanning module is scanning the barcode, the tracking module tracks the geographical location about the visitor to allow the first electronic device to know the geographical location about the visitor.
30
100
15
The third electronic device does not exist in the access control device . For example, the processing module can generate an image according to the information about the visitor, and when the image is used to be seen by a security guard, the security guard can determine whether the visitor is permitted to access the restricted zone. If the image has the authorized information, the visitor is permitted to access the restricted zone by the security guard; if the image does not have the authorized information, the visitor cannot be permitted to access the restricted zone by the security guard.
FIG. 2
FIG. 1
FIG. 2
200
200
200
200
200
201
Referring to , a flowchart is presented in accordance with an example embodiment which is being thus illustrated. The example method is provided by way of example, as there are a variety of ways to carry out the method. The method described below can be carried out using the configurations illustrated in , for example, and various elements of these figures are referenced in explaining example method . Each block shown in represents one or more processes, methods or subroutines, carried out in the exemplary method . Furthermore, the illustrated order of blocks is by example only and the order of the blocks can change according to the present disclosure. Additional blocks may be added or fewer blocks may be utilized, without departing from this disclosure. The exemplary method can begin at block .
201
11
13
10
10
10
At block , the communicating module receives information of a visitor for the storing module . For example, when the first electronic device is operated by the visitor, the information can be input into the first electronic device via a display of the first electronic device . The information can include a name, a gender, an identification card number, a telephone number, a fingerprint, and other information used for distinguishing other visitor information.
202
13
At block , the storing module stores the information about the visitor.
203
15
At block , the processing module processes the information about the visitor to generate an identification figure. The identification figure can be a barcode or an image.
204
23
31
30
At block , the executing module determines an access permission about the visitor according to the identification figure. For example, when the identification figure is a barcode, the scanning module of the third electronic device scans the barcode, and if the information about the visitor has authorized information, the visitor is permitted to access a restricted zone; if the information about the visitor does not have the authorized information, the visitor is not permitted to access the restricted zone. When the identification figure is an image, the security guard can determine whether the visitor is permitted to access the restricted zone. If the image has the authorized information, the visitor is permitted to access the restricted zone by the security guard; and if the image is does not have the authorized information, the visitor is not permitted to access the restricted zone by the security guard.
The embodiments shown and described above are only examples. Many details are often found in the art such as the other features of an access control device. Therefore, many such details are neither shown nor described. Even though numerous characteristics and advantages of the present technology have been set forth in the foregoing description, together with details of the structure and function of the present disclosure, the disclosure is illustrative only, and changes may be made in the detail, especially in matters of shape, size and arrangement of the parts within the principles of the present disclosure up to, and including the full extent established by the broad general meaning of the terms used in the claims. It will therefore be appreciated that the embodiments described above may be modified within the scope of the claims.
BRIEF DESCRIPTION OF THE DRAWINGS
Implementations of the present technology will now be described, by way of example only, with reference to the attached figures.
FIG. 1
is a block diagram of one embodiment of function modules of an access control device.
FIG. 2
FIG. 1
is a flowchart of one embodiment of an access control method using the access control device of . | |
The idea behind CAMMP
With CAMMP, students slip into the role of scientists and thus experience the basics of mathematical modeling on the basis of practical examples. In small teams, students solve challenging real-world problems using mathematical methods and computer simulations. They are supported by scientists.
Possible questions the students deal with come from different areas such as finance, aerospace, video game design, medical imaging and ecology. Mathematical tools such as numerical and mathematical modelling can be used to solve such complex real problems.
CAMMP makes it possible for mathematics and computer science enthusiastic students to go beyond theory to problem solving. Through this longer and more intensive examination of a problem, students gain an insight into the professional world of mathematicians, computer scientists and engineers.
Within the framework of CAMMP, different offers can be taken up by teachers together with students:
- CAMMP day: Computer-aided mathematical modeling, one-day, at KIT, Karlsruhe or RWTH Aachen
- CAMMP week: A whole week in a youth hostel on the subject of computer-aided mathematical modeling. | https://www.cammp.online/english/104.php |
October 30, Thursday, Myasnitskaya 24, building 3, room 424, 18.30.
Previous studies on the correlation between the academic mobility and research productivity and time management of the faculties show that the pattern of this link is ambiguous in different countries. Nevertheless, no attempts to explain these distinctions have been made. I suggest that this may be due to the discrepancy in academic systems of these countries. Based on this hypothesis, I compare the publication activity, time management and involvement in academic society of faculties with one-institution and several institution careers.in two countries with completely different academic systems. The data for the analysis is drawn from the international study «Changing Academic Profession». The evidence of multiple regression analysis show that the patterns of correlation between research productivity, time management and the type of academic's career are opposite for Russia and Germany. These results are in accordance with the initial hypothesis that the type of academic system of the country matters, but do not prove it. To test the hypothesis empirically a further research on reasons of such variation is needed. | https://cinst.hse.ru/en/news/143021667.html |
Author pages are created from data sourced from our academic publisher partnerships and public sources.
- Publications
- Influence
Exploring the role of flow experience, learning performance and potential behavior clusters in elementary students' game-based learning
- Ya-Hui Hsieh, Yi-Chun Lin, Huei-Tse Hou
- Psychology, Computer Science
- Interact. Learn. Environ.
- 2 January 2016
Well-designed game-based learning can provide students with an innovative environment that may enhance students' motivation and engagement in learning and thus improve their learning performance. Expand
TLDR
Evaluation of the Effect of Laser Acupuncture and Cupping with Ryodoraku and Visual Analog Scale on Low Back Pain
- M. Lin, Hung-Chien Wu, +4 authors Jih-Huah Wu
- Medicine
- Evidence-based complementary and alternative…
- 11 October 2012
The purpose of this study was to evaluate the effect of laser acupuncture (LA) and soft cupping on low back pain. In this study, the subjects were randomly assigned to two groups: active group (real… Expand
Exploring Elementary-School Students' Engagement Patterns in a Game-Based Learning Environment
- Ya-Hui Hsieh, Yi-Chun Lin, Huei-Tse Hou
- Computer Science, Psychology
- J. Educ. Technol. Soc.
- 1 April 2015
We studied the sequential behaviors of 34 students (17 male and 17 female) and considered issues of gender differences and sequential pattern similarities in engagement patterns grouped by gender. Expand
TLDR
The effect of moderator's facilitative strategies on online synchronous discussions
- Ya-Hui Hsieh, C. Tsai
- Psychology, Computer Science
- Comput. Hum. Behav. | https://www.semanticscholar.org/author/Ya-Hui-Hsieh/2106442 |
Share
The Art of Protest
Culture and Activism from the Civil Rights Movement to the Streets of Seattle
2005
•
Author:
T. V. Reed
A comprehensive introduction to the culture of progressive social movements in the United States
The first overview of social movements and the cultural forms that helped shape them, The Art of Protest shows the importance of these movements to American culture. In comparative accounts of movements beginning with the African American civil rights movement through the Internet-driven movement for global justice, T. V. Reed enriches our understanding of protest and its cultural expression.
Sophisticated yet very accessible, with a fluid writing style and well-organized chapters ranging from black civil rights to global justice. Succeeding on many levels, the book makes a measurable contribution to the literature of several areas of study, offers a well-informed and insightful introduction to students at every level, and tenders various ideas and tactics to add to an activist toolkit. Essential.
—
Choice
Tags
Imagine the civil rights movement without freedom songs or the politics of women’s movements without poetry. More difficult yet, imagine an America unaffected by the cultural expressions of the twentieth-century social movements that have shaped our nation. The first broad overview of social movements and the distinctive cultural forms that helped shape them, The Art of Protest shows the vital importance of these movements to American culture.
In comparative accounts of movements beginning with the African American civil rights movement of the 1950s and 1960s and running through the Internet-driven movement for global justice of the twenty-first century (“Will the revolution be cybercast?”), T. V. Reed enriches our understanding of protest and its cultural expression. Reed explores the street drama of the Black Panthers, the revolutionary murals of the Chicano movement, the American Indian Movement’s use of film and video, rock music and the struggles against famine and apartheid, ACT UP’s use of visual art in the campaign against AIDS, and the literature of environmental justice. Throughout, Reed employs the concept of culture in three interrelated ways: by examining social movements as sub- or countercultures; by looking at poetry, painting, music, murals, film, and fiction in and around social movements; and by considering the ways in which the cultural texts generated by resistance movements have reshaped the contours of the wider American culture.
The United States is a nation that began with a protest. Through the kaleidoscopic lens of artistic and cultural expression, Reed reveals how activism continues to remake our world.
A Web site for The Art of Protest is available at http://www.upress.umn.edu/artofprotest.
Awards
T. V. Reed is director of American studies and professor of English at Washington State University. He is the author of Fifteen Jugglers, Five Believers: Literary Politics and the Poetics of American Social Movements.
Sophisticated yet very accessible, with a fluid writing style and well-organized chapters ranging from black civil rights to global justice. Succeeding on many levels, the book makes a measurable contribution to the literature of several areas of study, offers a well-informed and insightful introduction to students at every level, and tenders various ideas and tactics to add to an activist toolkit. Essential.
—
Choice
An ambitious project that breathes some vitality back into the study of social movements at a time when we need to remember the lessons of the past and become much more active in the present. Highly recommended as a bird’s eye view into major social movements.
Freedom of Expression®Resistance and Repression in the Age of Intellectual Property
Winner of the American Library Association’s Oboler Award for best scholarship in the area of intellectual freedom
Cesar ChavezAutobiography of La Causa
The only authorized biography of Cesar Chavez—featuring three reflective essays new to this edition
Positively Main StreetBob Dylan’s Minnesota
In the late sixties, Toby Thompson enthusiastically took off for Hibbing, Minnesota, in search of Bob Dylan’s roots. With unprecedented access to Dylan’s English and music teachers, his high school girlfriend Echo Helstrom, and countless neighbors and relatives, Thompson discovers the real person behind the mythology Dylan created. This updated version includes an interview with the author, previously unpublished photographs, and a new preface by Thompson.
| |
When dealing with Party Wall Matters, I see many notices which are deficient and could very likely be deemed invalid if challenged in court, which could require the entire process to start over again. Many of these are prepared by the owners themselves, whilst others are prepared by surveyors who are possibly lacking knowledge of The Act.
There are different requirements for notices depending on what the proposed works are:
Line of Junction works
If an Owner wishes to build a new wall on the ‘Line of Junction’ (effectively the boundary line), they must serve written Notice to the Adjoining Owner(s), which “describes the intended wall”.
To adequately “describe” the wall, I would suggest it is necessary to state the height, length, thickness/width, and materials to be used (particularly the finishes that the Adjoining Owner will see), and whether the wall will form part of a building. It would be best practice to also state any intention to install foundation projecting onto the Adjoining Owner’s land.
Although it is not a requirement, it is a good idea to provide a plan showing the location (and therefore length of the proposed wall). The description might be provided with the use of annotated drawings, referred to in the written Notice.
Party Structure (Party Wall/Party Fence Wall) works
Where works are proposed to a Party Structure, the Owner must serve written Notice to the Adjoining Owner(s), which states “the name and address of the building owner”, “nature and particulars of the proposed work” and “the date on which the proposed work will begin”.
Again, although not required, the works might be best described using some annotated drawings, but be mindful that an Adjoining Owner might not be familiar with complex construction drawings, and a more simplified format might be appropriate, along with a basic description in the written Notice.
There is no requirement to refer to sub-sections of The Act, and a Notice that only states an intention “to carry out works under section 2(2)(f)” for example, with no further detail, does not adequately inform the Adjoining Owner of the “nature and particulars of the proposed work”.
If the proposed works include placing ‘special foundations’ (i.e. reinforced concrete foundations) on the Adjoining Owner’s land, the Notice must also provide details of these including “plans, sections and details of construction of the special foundations together with reasonable particulars of the loads to be carried thereby”. As is it only possible to install ‘special foundations’ with the Adjoining Owner’s consent, this is often avoided as part of the structural design process.
Adjacent Excavation works
When excavations (or piling works) are planned, within the requisite distances and depths of and Adjoining Owners building/structure, an Owner must serve written Notice to the Adjoining Owner(s) “indicating his proposals and stating whether he proposes to underpin or otherwise strengthen or safeguard the foundations of the building or structure of the adjoining owner.”
The Notice must be accompanied by plans and sections showing – the site and depth of any excavation, and the location of any proposed building or structure.
I have received numerous Notices for adjacent excavations which do not include any drawings and are therefore clearly deficient. If there is no proposal for strengthening/safeguarding the Adjoining Owner’s foundations, it is best to state why; usually due to the method of the works, or no apparent substantial risk.
Remember the purpose of the notice is to inform the Adjoining Owner of the proposed works. If they can’t clearly understand what is planned, it is highly unlikely they would be willing to consent and allow the works to proceed. A poorly prepared, or vague Notice is almost guaranteed to result in a dispute and require Surveyors to prepare an Award. A properly informed Adjoining Owner might well be happy to consent.
The best advice is when preparing Notices is – READ THE ACT! | https://www.andertongables.co.uk/2019/08/28/common-mistakes-ive-noticed-read-act/ |
Ensuing conversation covered following points re proposed declaration:
- (1)
- Geographical scope of statement or statements.
- (2)
- Countries participating in issuance.
- (3)
- Content of statement or statements.
- (4)
- Timing.
Re (1). Wright noted we had been thinking terms several types of statements re NE area, i.e., (a) some phraseology in NAT declaration2 to remove stigma of exclusivity, (b) statement on Iran and (c) statements on arms shipments and Near Eastern security or a combined statement covering both. He observed that any statement under (a) would probably be of such general character as not to conflict with more specific statements contemplated. He thought, however, that instead of making completely separate statements re Iran and the Arab states and Israel it might be desirable to think in terms of combining these statements and extending them to include appropriate references to Turkey and Greece. His thought was that by so doing it would be possible to make clear area security concept and thus put various subjects treated, especially arms shipments, in proper context. We said we had been thinking more in terms of separate statements directed to specific points but that we would take idea of generalization under advisement. Wright made clear that in absence some indication from Bevin he was putting this idea forward purely on informal and exploratory basis.
Re (2). Wright said that here again in absence reaction Bevin he could say nothing specific re French participation. If scope joint statement enlarged question French participation became even more problematical. British also referred here again to their special treaty commitments and trend of discussion was toward return to original US idea of separate statements conforming to extent possible to policies of countries making declaration. British indicated separate statements might remove some of their doubts re French participation.
Re (3). Reference was made to general area agreement reached re Iran (Secto 186, May 6)3 and to unresolved question re strengthening paragraph 3 of draft declaration. We told Wright reaction from both Department and field favored paragraphs 1 and 2 of draft declaration but found paragraph 3 insufficiently strong to achieve desired result. We again urged treatment third paragraph along lines D–3a (Deptel Tosec 93). Re Greece and Turkey it was consensus that such statement, if made, would merely be reaffirmation of previously announced policy.[Page 152]
Re (4). Wright said British felt strongly no statement on arms or NE security should be made until conclusion meetings Arab League Political Committee on Jordan question. He assumed, however, that this obstacle would probably be eliminated by conclusion of league meetings before end London conference. Re Iran, both sides saw difficulty including in general statement at end London conference in view their common feeling that statement on Iran in order carry desired weight should be linked with specification some definite line of action. No particular difficulty was foreseen from timing angle in inclusion Turkey and Greece if such action were in fact decided.Since this question now scheduled for discussion by Secretary with Bevin Wednesday any comments of Department should be expedited in order permit review with Secretary before Bevin meeting. | https://history.state.gov/historicaldocuments/frus1950v05/d67 |
In this section we offer you the themes we will frame our digital citizenship lessons around. Each of the themes focuses on fostering a positive digital community of learners at PAML!
Digital Footprint & Reputation: students will learn about balance with respect to their use of technology, as well as in their general lives.
Relationships & Communication: Students will learn the forms and norms of effective communication in an online context.
Information Literacy: Students learn to make informed choices about which search sites to use for different purposes. They also learn to use multiple search tools to get the best results.
Cyberbullying: Students will learn to assess people’s intentions and the impact of their words and actions, both positive and negative, in online environments.
Creative Credit & Copyright: Students reflect on the differences between taking inspiration from the creative work of others and appropriating that work without permission.
Self Image & Identity: Students explore what it means to be responsible and respectful to their offline and online communities as a step towards learning about the characteristics of good digital citizens.
Internet Safety: Students understand that they should stay safe online by choosing websites and online relationships that are good for them, and avoid sites and online relationships that are not appropriate for them. | http://paml7.weebly.com/digital-citizenship-lessons.html |
Projecting is something that a lot of us partake in, whether willingly or unwillingly. For anyone unaware, projecting is when we force our thoughts and emotions onto those arounds us, therefore it can be negative and positive. For the sake of this post, though, when I say projecting, I’m referring to the negative form of it, and it is somewhat problematic how many of us not only project, but further, do so unknowingly.
I am someone who projects. I’ve come to recognize this as I’ve gotten older (and somewhat wiser), and I can say with certainty that my projections, over the years, have triggered a lot of unnecessary arguments and conflicts with my family especially.
They say we are the hardest on the ones we love, so I would like to use this mantra as an excuse for my behaviour.
Say I’m doing a job on the farm, for example, and nothing is going my way. Things are breaking, I’m getting irritable, and the world seems like it’s ending, essentially. Say my dad comes over to where I’m working to check in and see how I’m doing. I snap on him and project my feelings of frustration and impatience onto him, he gets defensive and offended, I get even angrier, and the situation explodes.
See how projecting can do a tremendous amount of damage?
It is incredibly easy to project onto others when we’re pissy, but it isn’t all that difficult to stop ourselves before ripping someone a new asshole. Rather than producing verbal diarrhea and going off the deep end, it is far more advantageous, both for yourself and the other person involved, to take a deep breath, stop the personal emotions from pouring out, and think before you start spewing.
Projecting is a habit we develop over time, and it won’t be an instantaneous fix if it is something we wish to work on. But, with a little mindfulness, it doesn’t have to be overly difficult. | https://ontheedgeofeverything.com/2021/06/25/heres-why-we-need-to-stop-projecting/ |
FIELD OF THE DISCLOSURE
BACKGROUND
SUMMARY
DETAILED DESCRIPTION
The disclosure concerns a method and device for inspection by an inspector of the surface of a sheet moving in a sheet running direction.
In the production of coated or uncoated steel sheets, for example, in auto making and in packaging applications, the surface of the sheet, which can be an uncoated or coated surface of a steel sheet, is examined by means of a surface inspection system in order to detect surface defects for purposes of quality control. The surface of a sheet coming from a production or refining process and moving with a sheet speed is then illuminated with light sources and monitored with cameras in order to record an image of the surface of the sheet. Such surface control of (coated or uncoated) steel sheets regularly occurs right after completion of a production, refining or coating process before the sheet is wound into a coil.
Numerous camera-based automatic surface inspection systems are known from the prior art with which detection and documentation and classification of surface defects can be automated.
The surface of a sheet being examined in the known surface inspection systems is illuminated with light sources, and the illuminated surface is recorded by one or more cameras in the bright field and/or dark field. To observe the sheet surface in the dark field, the cameras are then arranged with reference to the illuminated surface of the sheet so that the radiation directed from the light sources onto the sheet surface and reflected from it is refracted outside the observation field of the camera, in which case the radiation reflected or scattered on the surface defects is refracted in the direction of the camera in its observation field. Surface defects in the otherwise dark camera image are made recognizable on this account as bright spots (dark field observation). During bright field observation of the sheet surface the radiation directed from the light sources onto the sheet surface and reflected from it are directed toward the camera. A defect-free surface then generates a bright image in the camera. If a defect appears on the surface, part of the radiation is diffracted and diffusely scattered and therefore does not appear in the camera image. A surface defect here is expressed as a dark spot in the otherwise bright camera image (bright field observation).
Devices are known from the prior art, for example DE 197 20 308 A, in which observation of the surface being inspected occurs both in bright field and in dark field observation. Separate cameras are provided for this purpose for observation of the bright field and dark field, which are arranged in the emergent angle or outside the emergent angle of the light beams with reference to the radiation reflected from the surface. The images recorded by the cameras arranged in the bright field and dark field can be combined to produce an inspection image. It is then possible to detect almost all types of possible surface defects.
Despite automatic defect detection of surface defects using the known camera-based surface inspection systems, however, it is generally necessary that an inspector check the defects detected by the surface inspection system in order to evaluate whether the detected defect is actually present or can be tolerated or whether it is necessary to cut out the defective area of the sheet in order to eliminate the defect. This is due to the fact that not all defects are reliably detectable even with automated surface detection systems that observe the sheet surface both in the bright field and in the dark field. Final consideration by an inspector often occurs for this reason. Illumination devices are known from the prior art for this purpose with which the surface of a sheet being investigated by an inspector is illuminated as uniformly as possible so that an inspector can inspect the sheet surface in the running sheet with the human eye and examine it for defects.
The illumination systems known from the prior art that are used for (additional) inspection of a sheet by an inspector, however, often exhibit unduly nonuniform illumination of the sheet surface, for which reason the inspector cannot detect defects present in the insufficiently illuminated areas of the sheet surface. The illumination systems known from the prior art also often lead to blinding of the inspector. Blinding of the inspector has the result that surface defects, especially in excessively illuminated areas of the sheet surface, can be overlooked by the inspector. Blinding of the inspector also leads to rapid fatigue. Further drawbacks in the known illumination systems for inspection of sheet surfaces by an inspector lie in the fact that the known illumination systems are only arranged on one side of the sheet being inspected and the inspector therefore can only observe one sheet side.
Starting from this, one aspect of the disclosure relates to a method and device for inspection of the surface of a moving sheet by an inspector, with which glare-free observation of both sides of the sheet, if possible, is permitted, in which the sheet surface is illuminated as uniformly as possible over the entire sheet width so that the inspector can detect all defects on the surface of the sheet.
Preferred embodiments of the method and device are also disclosed.
In the method according to the disclosure for inspection by an inspector of the surface of a sheet moving in a sheet running direction, the surface of the sheet is illuminated with at least a first and a second light source, the first light source emitting a light beam under a first incidence angle range onto a first surface area and the second light source emitting a light beam under a second incidence angle range onto a second surface area of the sheet surface, in which case the first and second light source are pulsed in alternation with a stipulated pulse frequency so that the surface of the sheet is illuminated in alternation with the pulse frequency in the first surface area and the second surface area. The first surface area illuminated by the first light source is then observed by the inspector via a mirror in the bright field and the second surface area illuminated by the second light source is observed by the inspector via a mirror in the dark field.
A first and at least a second light source are provided in the device according to the disclosure, the first light source illuminating the surface of the sheet under a first incidence angle range in a first surface area and the second light source illuminating the surface of the sheet under a second incidence angle range in a second surface area and the first and second light source being pulsed in alternation with a stipulated pulse frequency so that the surface of the sheet is illuminated in alternation with the pulse frequency in the first and second surface area. For observation of the first and second surface area by an inspector at least one mirror is provided in the device according to the disclosure, which is arranged at a stipulated distance from the surface of the sheet and via which the inspector can observe the first surface area illuminated by the first light source in the bright field and the second surface area illuminated by the second light source in the dark field.
α1
α2
Using the device according to the disclosure and in the method according to the disclosure, it is possible for the inspector to observe both the bright field and the dark field of the sheet surface illuminated by the two light sources. For this purpose, the first and the second light source are operated in stroboscope manner with the stipulated pulse frequency so that the sheet surface is illuminated in alternation with the pulse frequency in the bright field and dark field from the perspective of the inspector. The first surface area of the sheet surface illuminated by the first light source then represents the bright field from the perspective of the inspector and the second surface area illuminated by the second light source represents the dark field, i.e., the radiation reflected from the first light source on the sheet surface is directed toward the inspector and the radiation reflected from the second light source on the sheet surface is directed away from the inspector. The light emitted from the first and second light sources onto the sheet surface is then preferably directed obliquely onto the sheet surface and expediently has an emission direction with a component across (perpendicular to) the sheet running direction. The first incidence angle range (Δ) then preferably lies between 10° and 50° and the second incidence angle range (Δ) preferably lies between 60° and 90°.
The inspector then observes both the bright field and the dark field of the sheet surface via a mirror, the viewing direction of the inspector preferably being directed across the sheet running direction. This permits glare-free observation and enables the inspector to observe the sheet surface at a sufficiently safe distance from the running sheet. This is advantageous for safety reasons and for noise protection reasons. Observation of the bright field and dark field by the inspector via a mirror also permits simultaneous observation of both sides of the sheet. For this purpose, it is prescribed in a preferred embodiment of the device according to the disclosure and in a preferred practical example of the method according to the disclosure that an equivalent device according to the disclosure is arranged both on the bottom of the sheet and on the top of the sheet.
It is prescribed in a further preferred practical example of the method according to the disclosure and the device according to the disclosure that the first surface area (bright field) at least partially overlaps the second surface area (dark field). This makes it possible for the inspector to detect at least in the overlapping area both surface defects that are visible only in the bright field and surface defects that are visible only in the dark field. Reliable detection of all types of surface defects by the inspector is made possible on this account.
In a particularly preferred practical example of the disclosure, a third and optionally a fourth light source is provided that emits light under a third or a fourth incidence angle range onto the surface of the sheet. The third or the fourth surface area of the sheet surface illuminated by the third and the optionally fourth light source is then observed by the inspector via a mirror in the dark field. The light beam directed from the third and the optionally fourth light source onto the sheet surface is then directed obliquely onto the sheet surface and has a component of the radiation direction in or against the sheet running direction. The area of the sheet surface illuminated by the third and the optionally fourth light source is observed by the inspector via a mirror in the dark field, the viewing direction of the inspector being directed across the sheet running direction. The inspector therefore sees the surface area of the sheet illuminated by the third and the optionally fourth light source in “convergent light”. This makes it possible for the inspector to recognize both bright field and dark field defects as well as convergent light defects on the sheet surface. The third and the fourth surface area, which is illuminated in convergent light (i.e., in the direction of the sheet running direction) by the third and the fourth light source on the sheet surface preferably at least partially overlaps the first surface area (bright field) and/or the second surface area (dark field), which is illuminated by the first and second light source.
The third light source, just like the first and second light source, is then operated in stroboscope manner, i.e., pulsed with a stipulated pulse frequency. It is particularly preferred to operate the first, second and third light source in succession in stroboscope manner with a stipulated pulse frequency so that the first, the second and the third surface area of the sheet is illuminated in alternation with light. When a fourth light source is used, which, like the third light source, is arranged in the “convergent light” (i.e., with a component of the radiation direction in or against the sheet running direction), this is preferably operated in step with the third light source.
The pulse frequencies with which the light sources are operated then expediently lie in the range of 70 Hz to 400 Hz. This range of pulse frequency permits fatigue-free work of the inspector. Observation of the sheet surface by an inspector is very tiring, especially at frequencies below 70 Hz. The preferred upper limit of 400 Hz for pulse frequency is primarily related to the apparatus, since signal processing with ordinary instruments is hampered at higher frequencies. The pulse length of the light pulse emitted from the light sources in stroboscope manner then preferably lies in the range of 30 μs to 100 μs.
The mirror, via which the inspector observes the surface areas of the sheet illuminated by the light sources, is expediently arranged above and/or below the sheet at a stipulated distance from the sheet surface, in which a reflection surface of the mirror (especially the mirror surface) preferably encloses with the surface of the sheet an angle in the range of 30° to 60° and especially an angle of 45°. Comfortable observation of the sheet surface by the inspector is guaranteed by this arrangement of the mirror or mirrors above or below the sheet. The inspector can then conduct the observation while standing or sitting, in which case the sheet expediently runs either in a horizontal plane or in a vertical plane.
Each of the light sources, i.e., the first and the second light source, as well as the optionally present third light source or any additional light source, expediently includes a number of LED light strips with several light-emitting diodes (LEDs) arranged at a spacing from each other. Each of the light sources can then comprise several LED light strips that are arranged at a limited spacing next to or one behind the other. A flat light source is produced by this preferred arrangement of several LED light strips. The light sources combined in this way from a plurality of LED light strips then preferably run parallel to the sheet surface, i.e., the first, the second and the optionally present third light source as well as any additional light source are arranged with reference to the sheet surface so that the LED light strips lie in a plane running parallel to the sheet surface.
Homogeneous illumination of the sheet surface is made possible by this structure and arrangement of the light sources. The illumination intensity (light intensity) required for optional illumination of the sheet surface can also preferably be adapted by dimmability of the individual LED light strips of the different light sources. Adjustment of the illuminated area to the width of the sheet can also occur by switching on or switching off individual LED light strips of the different light sources. An unnecessary blinding effect through unduly high illumination intensity or light intensity of the employed light sources can also be avoided by the dimmability and by switching on or switching off individual LED light strips.
Blinding of the inspector by the light sources can also be avoided in a preferred practical example of the disclosure by the fact that each LED light strip of each light source is equipped with a shutter (aperture) with which a visual field of the inspector relative to the LEDs of the LED light strip is covered. The speed of the shutter is then expediently adjustable to the visual field dependent on the observation position of the inspector. This permits glare-free observation of the sheet surface by the inspector in different observation positions.
The device according to the disclosure and the method according to the disclosure can be used by an inspector to inspect the surface of the sheet moving at a stipulated sheet speed in a sheet running direction. The sheet, for example, can be an uncoated steel sheet (blackplate) or a coated steel sheet, like a zinc- or tin-plated steel sheet (tinplate). The sheet can also have on its surface an organic coating, for example, a paint layer or a polymer coating. The device according to the disclosure enables the inspector to detect surface defects on the surfaces of the sheet in the method according to the disclosure. If the inspector detects a defect, the running sheet can be stopped and the defective area in which the detected surface defect lies can be cut out from the sheet. The device according to the disclosure is then expediently arranged at the end of an installation for production or refining of the sheet and before a winding process for winding of the sheet into a coil.
The device according to the disclosure and the method according to the disclosure can then also be used in combination with a fully automatic surface inspection device, in which the device according to the disclosure is expediently arranged in the sheet running direction subsequent to the fully automatic surface inspection device. The device according to the disclosure and the method according to the disclosure then serve for additional inspection of the sheet surfaces, in addition to the fully automatic inspection by the surface inspection device. Certain surface defects cannot be detected fully or not precisely enough using the known automatic surface inspection devices in which cameras are used for imaging of the sheet surface. The device according to the disclosure and the method according to the disclosure enable an inspector to subject the defects detected by the fully automatic surface inspection device to further and especially more precise examination in order to decide whether the detected surface defect appears to require cutting out of the sheet area containing the defect.
FIGS. 1 to 4
10
10
The device depicted in for inspection of the surface of a sheet B moving at a stipulated sheet speed in a sheet running direction v, includes a device , ′ arranged on the sheet top o and on the sheet bottom u. Typical sheet speeds then lie in the range of 100 to 700 m/min. The sheet speed is then dependent on the speed with which the sheet is moved from a production or refining process, for example, a sheet coating installation.
10
10
1
1
2
2
5
5
4
4
1
1
10
10
2
2
5
5
4
10
4
4
10
4
FIG. 1
The devices , ′ depicted in in a view in the sheet running direction v, which are arranged on the sheet top o and the sheet bottom u of the sheet B, include a first light source , ′, a second light source , ′ and an additional light source , ′ as well as a mirror , ′. The first light source , ′ of each device , ′ is then arranged offset laterally next to as well as above or beneath the sheet B. The second light source , ′ is arranged above the sheet or under the sheet B at a distance to the corresponding sheet surface on the sheet top o or the sheet bottom u. The additional light source , ′ is again arranged laterally offset and above or beneath the sheet B. The mirror of the device arranged above the sheet B has a mirror surface arranged at a stipulated angle to the surface of the sheet B. The mirror surface of mirror encloses an angle in the range of preferably 30° to 60° and especially 45° with the plane of the sheet B (i.e., with the sheet surface). The mirror ′ arranged beneath the sheet B of the device ′ arranged on the sheet bottom u is correspondingly oriented relative to the surface of the sheet so that the mirror surface of mirror ′ encloses an angle in the range of 40° to 60° and especially 45° with the sheet surface.
1
1
2
2
5
5
1
2
5
1
2
5
10
1
1
2
2
5
5
4
4
4
10
4
10
The light sources , ′, , ′ and , ′ each emit light under a stipulated incidence angle range onto a surface of the sheet B, in which light sources , and of the device arranged above the sheet B emit light onto the sheet top o and the light sources ′, ′ and ′ of the device ′ arranged beneath the sheet B emit light onto the sheet bottom u. The sheet B illuminated by the light sources , ′, , ′ and , ′ is observed by the inspector I via mirrors , ′, in which mirror of the upper device permits observation of the sheet top o and mirror ′ of the lower device ′ permits observation of the sheet bottom u.
10
10
1
1
4
4
1
1
The light emitted from the first light source of the upper or lower device , ′ onto the sheet surfaces is observed by the inspector I in the bright field. The light emitted by the first light source , ′ and reflected on the corresponding sheet surface is deflected via mirror , ′ into the visual field S of inspector I, for which reason the inspector I observes the area of the sheet surface illuminated by the first light source , ′ in the bright field.
1
1
1
1
FIG. 2
FIG. 2
Illumination of the sheet surfaces by the first light source , ′ in the bright field H is shown in . As is apparent from , the first light source , ′ emits a light beam with a light cone stipulated by the employed light source under a stipulated first incidence angle α1 onto the sheet surfaces. The incidence angle α1 in the depicted example is α1=37°. A first incidence angle range Δα1=α1±Δ is defined by the incidence angle α1 and the beam angle range Δ of the light cone of the first light source. The beam angle range Δ of the employed light source then expediently lies between 10° and 20° and especially at Δ=15°.
2
2
5
5
2
2
5
5
4
4
2
2
5
5
2
2
5
5
FIG. 3
The dark field on the sheet surfaces generated by the second light source , ′ and the additional light source , ′ is shown in . The light beam directed from the second light source , ′ and the additional light source , ′ onto the sheet surfaces is back-reflected from the sheet surface and the corresponding mirror , ′ from the visual field S of the inspector I, for which reason the inspector I sees the surface areas of the sheet B illuminated by the second light source , ′ and the additional light source , ′ in the dark field D. Illumination of the sheet surfaces with the second light source , ′ and the initial light source , ′ therefore enables the inspector I to observe the surfaces of the sheet B on the sheet top o and the sheet bottom u in the dark field.
FIG. 3
2
2
2
2
2
2
5
5
2
2
5
5
As is apparent from , the second light source , ′ emits a light beam with a light cone stipulated by the employed light source under a stipulated second incidence angle α2 onto the sheet surfaces. The incidence angle α2 in the depicted example amounts to α2=90°−11°=79°. A second incidence angle range Δa=a±Δ is defined by the incidence angle α2 and the beam angle range Δ of the light cone of the second light source , ′. Accordingly, the additional light source , ′ emits a light beam with a light cone stipulated by the employed light source under a stipulated incidence angle α5 onto the sheet surfaces. The incidence angle α5 in the depicted example amounts to α5=26°. An incidence angle range Δα5=α5±Δ is defined by the incidence angle α5 and the beam angle range Δ. As in the first light source, the beam angle range Δ of light sources , ′ and , ′ then expediently lies between 10° and 20° and especially at Δ=15°.
1
1
2
2
5
5
30°≤α1≤45°
60°≤α2<90°
10°≤α5≤40°
The incidence angles α1, α2 and α5 of the first light source , ′, the second light source , ′ and the additional light source , ′ preferably lie in the following ranges:
1
1
2
2
5
5
1
1
2
2
5
5
1
1
2
2
5
5
The first light source , ′, the second light source , ′ and the additional light source , ′ are then operated in alternation in stroboscope manner with a stipulated pulse frequency f so that the surface of the sheet B is illuminated in alternation with the pulse frequency f by the first light source , ′ in the bright field (H) and by the second light source , ′ in the additional light source , ′ in the dark field (D). The inspector I can therefore observe both the bright field H and the dark field D of the sheet surfaces (in succession) with the pulse frequency f of the light sources. The pulse frequency f expediently lies in the range of 70 Hz to 400 Hz and preferably between 100 Hz and 300 Hz. The light pulses emitted from the light sources , ′, , ′ and , ′ expediently have a stipulated pulse length tin the range of 30 μs to 100 μs and preferably between 50 μs and 80 μs. Because of the high pulse frequency f and the limited pulse lengths t the inspector I can conduct both bright field and dark field observation almost simultaneously on the running sheet B. This enables the inspector I to detect different surface defects that can be observed either only in the bright field or only in the dark field.
1
1
2
2
5
5
For this purpose, it is expedient if the surface area (dark field D) illuminated by the first light source , ′ and the surface area (dark field D) illuminated by the second light source , ′ and (optionally) by the additional light source , ′ at least partially overlap on the corresponding sheet surface.
1
1
2
2
5
5
FIG. 1
Each of the light sources , ′, , ′ and , ′ depicted in emit light under a stipulated incidence angle range and a stipulated beam direction onto the surface of the sheet B, the beam direction of the light sources then having a component across the sheet running direction v (i.e., perpendicular to the sheet running direction v) and a component directed perpendicular to the sheet surface.
1
1
2
2
5
5
3
3
6
6
3
3
3
3
6
6
3
3
6
6
FIG. 1
FIG. 4
In addition to the light sources , ′, , ′ and , ′ apparent from , additional light sources can also preferably be provided in the device according to the disclosure, in order to uniformly illuminate the sheet surfaces as well as possible. As is apparent from , a third light source , ′ and a fourth light source , ′ can be arranged above and beneath the sheet B, in which the third light source , ′ emits light under a stipulated incidence angle range and a stipulated beam direction against the sheet running direction v onto the sheet surfaces. The incidence angle α3 of the third light source , ′ and the optional fourth light source , ′ in the depicted example amounts to α3=26° and preferably lies in the range of 10° to 40°. At a beam angle range Δ of the light cone of the third light source , ′ and the fourth light source , ′ a third incidence angle range Δα3=α3±Δ is defined.
3
3
6
6
3
3
6
6
3
3
6
6
The third light source , ′ emits light under the stipulated incidence angle range Δα3 in a beam direction directed in the sheet running direction v onto the sheet surfaces. The fourth light source , ′, on the other hand, emits light under the same incidence angle range Δα3 and in a beam direction directed against the sheet running direction v onto the sheet surfaces. The beam directions of the third light source , ′ and the fourth light source , ′ therefore contain a component directed in or against the sheet running direction v (as well as a component of the beam direction directed perpendicular to the sheet surface). The third light source , ′ and the fourth light source , ′ enable the inspector I to observe the surfaces on the sheet top o and the sheet bottom u in convergent light (i.e., with a beam direction having a component in or against the sheet running direction v). Because of this, additional surface defects can be observed that cannot be observed or only insufficiently observed in the bright field H or the dark field D.
1
1
2
2
5
5
3
3
6
6
3
3
6
6
3
3
6
6
Like the first, the second and the additional light sources , ′; , ′; , ′, the third light source , ′ and the fourth light source , ′ are also operated in alternation with the first and second light sources in stroboscope manner with a stipulated pulse frequency and pulse length so that the areas illuminated by the light sources can be observed in alternation by the inspector I in the pulse frequency. The third light source , ′ and the fourth light source , ′ are then operated in pulsed fashion in step, i.e., the third light source , ′ and the fourth light source , ′ are simultaneously in step or out of step.
7
2
1
2
7
7
8
7
8
FIGS. 5 and 6
FIG. 5
FIG. 7
The light sources used in the device according to the disclosure are preferably formed by several LED light strips arranged at a spacing next to and one after the other. In the second light source arranged above the sheet top o and the first light source ′ arranged beneath the sheet bottom u are shown in detail in a side view. The second light source depicted in includes five LED light strips running parallel to each other and arranged one behind the other in the depicted practical example. Each of these five LED light strips contains several light-emitting diodes (LEDs) arranged at a spacing in the longitudinal direction of the LED light strip . Such an LED light strip having a total of 12 LEDs is shown as an example in .
7
9
4
4
8
9
7
FIG. 6
FIG. 6
In order to avoid blinding of the inspector I, each LED light strip preferably has a shutter , which is arranged in the visual field S of the inspector so that the inspector I cannot look either directly or indirectly via the mirror , ′ into the light cone emitted by the LEDs . This is indicated in , where the edges of the visual field S of the inspector I are shown. As is apparent from , the shutters of the LED light strips cover the visual field S of the inspector I and in so doing prevent blinding of the inspector I. Glare-free and fatigue-free work of the inspector I is therefore permitted.
FIG. 1
7
7
3
3
6
6
It is apparent from that, by arranging the light sources in the form of several LED light strips arranged one behind the other or next to each other, light sources designed flat are provided. The LED light strips of the light sources then expediently run parallel to the sheet surface. The same also applies to the third light source , ′ and the fourth light source , ′. Through flat arrangement of the light sources a larger-area illumination of the sheet surfaces is made possible in the visual field S of the inspector I.
7
7
By switching on or switching off the individual LED light strips of the individual light sources, areas of the sheet surface can then be switched to bright or dark. It is also possible to adjust the illuminated area of the sheet surfaces to the width of the sheet B by switching on or switching off the individual LED light strips of the light sources.
The disclosure is not restricted to the depicted practical example. For example, it is not necessary to maintain the number and arrangement of light sources selected in the depicted practical example. It is sufficient according to the disclosure to merely illuminate the surface of the sheet B with a first and a second light source, in which the first light source illuminates a surface of the sheet in a bright field and the other light source illuminates the same surface of the sheet in a dark field, both light sources being operated in pulsed fashion in alternation with a stipulated pulse frequency so that the surface of the sheet is illuminated in alternation with the pulse frequency in the first surface area in the bright field and in the second surface area in the dark field of the observing inspector I.
4
4
It is also not essential according to the disclosure to arrange a device according to the disclosure both on the sheet top o and also the sheet bottom u. If the inspector I wishes to observe only one surface of the sheet B, for example, the sheet top o, it is sufficient if one device according to the disclosure is arranged only on the sheet top o. However, the disclosure makes possible simultaneous observation of both the surface on the sheet top o and on the sheet bottom u based on observation of the sheet surface by the inspector I via (at least) one mirror , ′.
BRIEF DESCRIPTION OF THE DRAWINGS
These and additional advantages and features of the disclosure are apparent from the following practical example described below with reference to the accompanying drawings. The practical example then merely serves to explain the disclosure and is not to be viewed as restrictive for the scope of protection of the disclosure defined in the claims. The drawings show:
FIG. 1
: Schematic view of a device for inspection of the surface of a sheet moving in a sheet running direction in a view in the sheet running direction;
FIG. 2
FIG. 1
: Depiction of the bright field generated by a first light source of the device of on the surface of the bottom of the sheet;
FIG. 3
FIG. 1
: Depiction of the dark field generated by a second light source and an additional light source of the device of on the top and bottom of the sheet;
FIG. 4
FIG. 1
: Schematic view of the device of in a view perpendicular to the sheet running direction;
FIG. 5
FIG. 1
: Detailed view of the second light source of the device of ;
FIG. 6
FIG. 1
: Detailed view of the first light source of the device of ;
FIG. 7
FIG. 1
: Schematic view of an LED light strip used in the device of to form the light sources. | |
Rooms of this category are equipped with a full range of amenities, including modern technical equipment.
For your comfort, all rooms are equipped with Askona Hotel beds and pillows filled with camel or sheep wool.
One-room apartment with a total area no less than 30 sq. m.
|
|
Room equipment:
|
||
|
Additional services included in the price:
|
||
|
We are free from smoking and therefore all rooms in hotel are non-smoking. | http://www.ramadarostov.com/en/rooms/nk1 |
The utility model relates to an apparatus changing static electricity into electric power, which can be applied to portable type electronic equipment and comprises a static electricity collecting unit and a voltage transforming circuit. The static electricity collecting unit is arranged inside the portable type electronic equipment and is connected to the casing thereof. The voltage transforming circuit is also arranged inside the portable type electronic equipment and is electrically coupled between the static electricity collecting unit and an electricity-charging management unit of the portable type electronic equipment. When the casing of the portable type electronic equipment gets in contact and frictions with some other object, static electricity is produced, which is then captured by the static electricity collecting unit before being converted by the voltage transforming circuit into electric power capable of being received by the electricity charging management unit to make the portable type electronic equipment recharged with electric power. The apparatus of the utility model is capable of converting static electricity into rechargeable electric power so that portable type electronic equipment with such an apparatus can get recharged even when there is no external electric source for electricity recharging. | |
A Nottinghamshire Sojourner embarks on Missionary Work into Deepest Derbyshire
On Tuesday 15th November 2016, Companion Steve Bradford (of the Nottinghamshire Sojourners) sailed for foreign climes to the Fairfield Chapter No 2224, in the Province of Derbyshire, where he delivered a PowerPoint Presentation entitled ‘The Five Regular Platonic Bodies’.
The presentation explains the Geometrical Theory that there are only Five Regular Solids possible: the Cube; Tetrahedron; Octahedron; Icosahedron and Dodecahedron – and when associated with Plato’s theory that the universe was formed from the four main elements of Air, Earth, Fire and Water, each of which he allocated to a Regular Solid and enclosed in the fifth, representing The Sphere of the universe.
The presentation then proceeded to consider the Five Regular Solids in relation to the Holy Royal Arch, and their layout in the Chapter.
The Fairfield Chapter was attended by 15 members and 2 visitors, who were all very impressed with an interesting and thought provoking lecture; several questions were posed by the Chapter during the lecture including: "What are their origins in the Royal Arch" and a question relating to the Platonic Institute in Florence.
At the excellent Festive Board that followed, there were some stimulating and lively debates regarding the presentation, rounding off a very pleasant evening. | http://www.nottinghamshiremasons.co.uk/holy-royal-arch/news/a-nottinghamshire-sojourner-embarks-on-missionary-work-into-deepest-derbyshire |
On Monday 11 March, the office of the National Data Guardian (NDG) convened at the Wellcome Trust in central London to celebrate the passing of the Health and Social Care (National Data Guardian) Act 2018. The act gave the role of the National Data Guardian a new status by putting it on a statutory footing. Tom Billins, Policy Analyst at Genetic Alliance UK, attended on behalf of Genetic Alliance UK.
The National Data Guardian, Dame Fiona Caldicott, is responsible for scrutinising and testing the safeguarding of health and social care data. Dame Fiona began her session by explaining that the new status of her role gives her the authority, credibility and independence necessary to ensure public trust in her and her office.
She went on to talk about the importance of public trust and listening to the public’s voice, stressing them as critical components of the NDG’s work. Feedback from the public makes it clear that they do trust the NHS and how it uses patient data, including for research, as long as they feel informed and consulted with.
to get the basics right and support organisations to understand their obligations.
Dame Fiona also emphasised the importance of safeguarding data while maximising its potential.
Professor Sir Jonathan Montgomery joined Dame Fiona in the next session by focusing on the importance of explaining what is being done with people’s data. Part of the challenge with explaining how data is used in healthcare is that the workings of the NHS are not well understood by the general public.
It was acknowledged by both Professor Montgomery and Dame Fiona that part of the process of engaging with and informing the public is to recognise that there are many perspectives and different levels of knowledge out there; some members of the public will know a lot more about a certain rare disease than many clinicians! It was noted that too many people in senior positions in the NHS think that informing the public is the same as engaging with them.
Asking a question from the audience, Vivienne Parry from Genomics England quoted findings from a recent Sciencewise dialogue which reported that the public are not resistant to private firms having access to patient data but are worried about those companies benefiting disproportionally from that data.
Ending her session, Dame Fiona said that her proudest achievement has been to convince ministers that the public can be engaged with effectively and that this has helped maintain public trust in the system.
Next up was Baroness Nicola Blackwood, Under Secretary of Health and Social Care. She explained that the sharing of patient data in an ethical manner for scientific progress isn’t a new thing and that established ethical standards need to be taken forward. Patient trust is vital to this. Both Dame Fiona’s work and the Information Commissioner’s Office’s ‘Your data matters’ campaign were cited as important contributions to increasing the public’s confidence in how their data is being used. Speaking on her personal experience of a diagnostic odyssey, Baroness Blackwood said she would like to see data sharing in the NHS advance, to avoid others having to go through the same thing.
Natalie Banner, of Understanding Patient Data, neatly summed up the day by stressing the need for simple language, for dynamic and evolving conversations, and for a shift towards a ‘how can we do this?’ attitude by bringing together a community of people to work towards a common goal. | https://www.geneticalliance.org.uk/news-event/passing-of-the-national-data-guardian-act-2018/ |
:
Severus Snape: Character Analysis Reboot v.3
View Single Post
#
42
December 3rd, 2010, 5:20 pm
snapegirl
Dr Mrs The Monarch
Join Date: 27th July 2005
Location: Spinner's End
Age: 42
Posts: 1,861
Re: Severus Snape: Character Analysis Reboot v.3
Quote:
Originally Posted by
giftedkid527
I find attempting to look at the situation from an objective standpoint often leads to the clearest perception of the true situation. While it's possible that Lily's death was a "wake up call" that turned him into a great person, I find that I fully disagree with the notion that a person can "snap" out of being a "bad" individual. Snape never fully leaves behind his lovely personality that so ingratiated himself with the marauders, and thus doesn't seem to have changed 100%. He also seems to have retained his vindictiveness, his loathing, his grudges, and his ability to hate, as well as his inability to render sound judgement upon a subject to whom his feelings are ill-intended. Does he not rule over a school that allows students to use the Cruciatus curse on its students? Now, while Snape himself, presumably, is not actually administering the curse, the fact that he allows it to happen is fairly, to coin a phrase, Unforgivable.
Imo, just because Snape didn't socialize with the Order or wasn't a "nice" teacher, that doesn't mean he didn't change 100% as you say. People do not have to be friendly, nice, or have a winning personality in order to do the right thing. And Snape did the right thing for the majority of his life.
I could also argue that Snape was never totally "bad", but joined the Death Eaters in a misguided attempt to gain acceptance. He picked the wrong path as a teenager. As a young adult he saw how horrible his choices were and started, from the moment he meets Dumbledore on the hilltop, to work for the Order.
Imo, it's safe to say that Snape had to tolerate certain things at Hogwarts while he was Headmaster. After all, he was placed there by Voldemort and the Carrows were teaching. If he seemed to protest the punishment too much, Voldemort would have gotten suspicious. I think he did the best he could given the circumstances. We see him punish Ginny, Luna, and Neville by making them go to Hagrid's. Imo, even going into the forest with Hagrid is much better then what the Carrows would have done.
Also the other teachers protected the students as best they could. It was a terrible time at Hogwarts, but I don't see how Snape could have prevented the Carrows and the punishments with out blowing his cover.
Quote:
Another thing... Severus allows Burbage to die in front of him, pleading for her life. Why does Severus allow this to happen, when he can stop it? Is it not because stopping it would lead to Severus' own death? Couldn't he run, grab her, and apparate out of there?
If he grabbed her and ran for it, how would he continue to work against Voldemort? He would have been killed, imo. Even if he gotten away with it, Voldemort would know Snape wasn't loyal to him. The Carrows would have gotten control of Hogwarts, Snape couldn't help Harry get the sword of Gryffindor, he couldn't take orders from Dumbledore's portrait. Snape being in Hogwarts and having Voldemort believe he's loyal is extremely important to Voldemort's downfall, imo. So I do not see a way for him to save Charity (whom I believe he didn't know was captured until he walked into the room) and retain his cover.
__________________
Discerning Snape Fan
Read_my_articles Now featuring my trip to the Wizarding World of HP
Last edited by snapegirl; December 3rd, 2010 at
5:27 pm
. | http://images.cosforums.com/showpost.php?s=2ba6f2f4e018303eecf5ebb389c85fe6&p=5662940&postcount=42 |
- You’ve both lost something you can’t regain.
- The relationship you rebuild will never be like it was.
- You must develop a secure functioning relationship.
- People want to get out of pain as fast as possible. You will want to cut corners.
- You will want to feel better at the expense of getting better.
- Pain is necessary to process and grow.
- If unfaithful partner has more power than the injured partner, it is upside down.
- For the betrayed partner
- Trauma symptoms
- Mood instability, nightmares, flashbacks, perseveration
- Preoccupation with past, present, and future
- Brain can’t do anything other than review history
- Must recalibrate your entire life
- Who am I? Who are you? Who were we?
- How can I trust you?
- You have all the power for a while.
- You need to hold fast to what needs to happen.
- Fear of losing your partner could sacrifice principles.
- You have a pass for a while when you behave poorly.
- The pass expires when unfaithful partner puts enough skin in the game.
- Nobody would blame you for wanting out of this relationship.
- For the unfaithful partner
- Shame and fear.
- Needs to be totally transparent. Don’t hold anything back.
- Any hint that you are not being transparent will fuel the questioning for more details.
- The longer you take to show up, the longer recovery will take.
- You fear that more disclosure will be the end of the relationship.
- You have no capital. No leverage. No power.
- You must accept partner reactivity for a while.
- You must buy back into the relationship.
- Trust is killed. You may never be fully trusted again.
- You will be the perpetrator and healer. Very difficult role.
- Villain needs to become the Hero.
- Loss brings regret. Do not avoid loss and pain. It will keep you motivated to grow.
- You will be in the doghouse for a while.
- It’s going to be very hard.
- Nobody would blame you for not wanting to pay the price.
State of the Betrayed Partner
|
|
Pre-betrayal beliefs
I matter to you.
I am safe with you.
You value me.
You meant our wedding vows.
You are honest with me.
You care about my feelings.
You will protect me.
You have goodwill toward me.
You consider our marriage bed exclusive –just between us.
|
|
Post-betrayal beliefs
I mean nothing to you.
You are dangerous to me.
I am scum to you.
Our vows meant nothing.
You are not trustworthy.
You couldn’t care less.
You will harm me.
You wish me evil.
I am not enough for you. Our sexual relationship is not special to you.
Action Required of the Unfaithful Partner
- Expect and respect the sensitivities and triggers of your spouse.
- Pursue your partner and be proactive about checking on their emotional status
- Need to develop ANTICIPATION and AWARENESS of triggers.
- Be fully transparent
- Seek to understand your partner’s pain
- Show remorse and not be defensive
- Be patient with your partner’s emotions and time needed to recover
- Increase ability to show sincere empathy and provide bold, heartfelt apologies.
- Never say things like:
- You should be over this by now
- Why can’t you move on?
- Oh brother! That again?
- Why do you keep browbeating me with this?
- What’s your problem? I said I was sorry!
- It’s over. Why can’t you accept that?
- Why can’t you just forgive and forget?
- You’re just bitter and vindictive.
- You’ve hurt me too, you know!
Linda McDonald, How to Help Your Spouse Heal From Your Affair
Radically Consider Your Partner
Betrayal happens when you don’t take into account another person who is relying on you. To rebuild trust requires a commitment to finding ways to radically consider your partner. When you radically consider your partner:
- Instead of escalating impatience, there’s growing patience.
- Instead of anger that goes nowhere, there’s real listening and a real sense of feeling seen and heard
- Instead of inflicting pain there’s an understanding of how to better meet each other’s needs.
- You can discover how to consider each other in ways they’ve never done before.
- You can feel you matter to each other more than ever.
- The unfaithful and the injured become intimate partners in this rebuilding of trust.
- When it’s all over, many people say that their relationship has never been stronger.
Mira Kirshenbaum, I Love You But I Don’t Trust You:
The Complete Guide to Restoring Trust in Your Relationship
The Complete Guide to Restoring Trust in Your Relationship
Steps to Moving On
- Recognition:
- The unfaithful partner develops and expresses a clear understanding of the betrayal and its consequences.
- Responsibility:
- The unfaithful partner takes full responsibility for decisions and choices related to the affair.
- Remorse:
- The unfaithful partner expresses genuine feelings of deep sadness, mourning, or even pain from the hurt they have caused.
- Restitution:
- The unfaithful partner engages in positive actions intended to reduce the hurt and related negative consequences from their actions.
- Reform:
- The unfaithful partner provides reassurance and a commitment to the betrayed partner by:
- Pledging not to hurt them in the same way again
- Addressing conditions that contributed to the betrayal
- Acting differently when confronted with similar situations in the future
- Release:
- The betrayed partner commits to a process of “letting go” or moving on, giving up the right to continue punishing their partner for the betrayal or demanding further restitution.
- Reconciliation:
- Both partners commit to rebuilding a relationship based on mutual trust and caring. | https://www.markreidmft.com/betrayal.html |
My summer road trip began in Mesa, AZ and went as far east as Niagara Falls, Ontario, CA. I’d heard about the beauty and power of Niagara Falls since I was a kid, but this was my first look. The center of the Niagara River marks the border between the US and Canada. It is overwhelming to see the volume of water cascading over the falls. All my years of living in a desert landscape makes the exposure to swift moving rivers, great lakes, and the accompanying bridging structures quite startling. Everywhere you look there is water moving, alongside the road you are traveling, and then surprise, the location you are seeking is across yet another bridge. It is difficult to imagine living around so much water, there is moisture in the air, plants grow in abundance, and trees are everywhere. The change in landscape was demonstrated so clearly in the two gardens I explored, one on each side of the Falls.
The Buffalo-Erie County Botanical Garden, NY, is home to the South Park Conservatory, a white castle of glass surrounded by a moat of green lawn during the summer. Built in 1894 by the American team of glasshouse architects Lord & Burnham, it was modeled after the Crystal Palace in England. It protects a collection of exotic plants, first gathered in the early 1900’s, from the frigid winter weather of this region.
This Victorian style conservatory was a point of pride for the parks of Buffalo when it opened. Fredrick L. Olmstead designed the park system and the conservatory was the crown jewel. Victorians believed in the physical benefits of walking through the conservatory to connect to the beauty of nature. The conservatory holds the perfection of nature under ideal growing conditions. This enormous glass house is divided into 12 collection houses showcasing plants from around the world.
Just imagine a freezing winter day in Buffalo, NY and you walk into a desert landscape, then you arrive in the tropics, wander into a rainforest, a cloud forest, and explore the everglades.
Not only can you change climates, but you see the beauty of our natural world while a blizzard of snow swirls outside. This crown jewel of a conservatory dissolves the borders between gardeners.
The palm house dome contains a collection of rare palms and tropical trees from Cuba, Australia, and a chocolate tree from South America. The desert room introduces cactus, agaves, and succulents from the African and American deserts to local visitors as strange to them as all the water in this region is to me.
The star of the tropical collection at the moment of my visit was Morty, a six-foot Corpse Flower, just beginning to bloom.
The following plants caught my attention.
Clock Vine from southern India
Beehive Ginger from Indonesia,
Pitcher plant ringed w/ color,
Golden Barrel cactus flowers,
Crossing the border into Canada I visited Niagara Botanical Garden in Ontario. The garden was lush with fresh spring green. The plant palate remarkably similar to the US side with elms, walnuts, and maple trees growing tall and round.
The garden is home to the “Niagara Parks School of Horticulture, an institution that provides unique practical training to horticulture students on the grounds of the Botanical Gardens.” (website) The 99 acres of gardens offers a long walk among a variety of plantings. Here the garden is outside with enormous trees. The iconic Maple trees were fully leafed out in multiple shades of green creating avenues of shade. Sugar, Silver, and Red maples are just a few of the familiar varieties I walked among. Then I discovered a Harlequin Maple (Acer platanoides) with a chartreuse leaf making a real show of color in the stand of trees.
The influence of English garden heritage appeared in formal gardens with yew hedges creating individual rooms planted with colorful annuals around each corner. A very large rose garden would be blooming in a few weeks, a rock garden landscaped with sedums and conifers and spring perennials are only some of the beautiful elements to be found. The conservatory here is a year-round butterfly haven.
I realized things grow very well here but when a garden intern explained the prairie garden before us had been growing only six weeks since it had been burned off from the winter debris, I was shocked at how much it was recovered. The prairie garden is designed by school alumni to illustrate responsible and sustainable species beneficial to pollinators and native butterflies.
I spent several wonderful hours exploring this glorious green place. Reluctantly leaving there were still flowers blooming every step of the way back to the parking lot with a mass planting of purple Alliums, golden yarrow, and a lavender lily. Oh Canada! what a beautiful place.
Both of these gardens were busy with visitors, many visiting from afar, but many locals were enjoying the fine weather and the beauty around them. In the Buffalo conservatory groups of school children were enthusiastically following the docents introducing them to the plants from around the world.
Gardens are the place everyone can see the variety, value, and beauty of the natural world. Gardeners know no boundaries in sharing the beauty of nature. | https://travelinggardener.com/looking-at-gardens-on-both-sides-now/ |
Tomorrow's Kyoto Cultural Heritage Platform is organizing a "Portraying Kyoto's Cultural Heritage" painting and drawing contest for primary school children. To commemorate the final meeting for the Celebration of the 40th Anniversary of the World Heritage Convention, this event will give children an opportunity to learn about the importance of the World Heritage sites in Kyoto and other cultural heritage (tangible and intangible), and of the necessity to transmit to the next generations.
The subject matter must be cultural heritage and sites (monuments, art works, local festivals etc.) in Kyoto and Otsu, including the sites composing the Historical Monuments of Ancient Kyoto that are World Heritage properties. Participants will be 1st to 6th year students from primary schools in Kyoto Prefecture or Otsu City and the submissions are to be collected and given to the organizer by the primary schools,the deadline for the submission of the artworks is on the 18th of September .
Several sketching sessions are organized in late July and August at the major Kyoto temples and shrines that are World Heritage sites; participation in such sessions is not mandatory. The application deadlines for the sessions are on 25th July and 1st of August. | https://whc.unesco.org/pg_friendly_print.cfm?cid=83&id=938 |
The Faculty is committed in providing high quality support to our PhD students and supervisors. In keeping with this, we have been working in collaboration with the Library, Student Academic Success and English Connect to develop a suite of offerings designed to facilitate and enhance the writing and communication skills of our PhD students.
The suite of available Student Academic Success (SAS) offerings are categorised below:
- Student Academic Success Programs
- Thesis/Publication Writing Group (semester long, with reserved places for referrals)
- Intensive Writing Course for Science Communication(semester long, with reserved places for referrals)
- Managing the literature review in STEMM (workshop)
- Managing Literature Overload and Developing Critical Thinking (workshop)
- One-on-One consultations
The suite of available MNHS-Library offerings are as follows:
- MNHS Library Workshops
- Systematically Searching the Grey Literature
- Maximise Your Citation Metrics and Research Discoverability
- Integrating Endnote & Covidence for Systematic Reviews
- Systematic Literature Searching Techniques
- Publishing strategies, open access and copyright
You may also register for the following programs run by English Connect:
- Starting in Australia Online
- Intercultural Engagement
- Building Strong Supervisor Relationships
Together these activities provide support to graduate research students with improving writing skills, engaging with and presenting research, and overall communication skills. We would particularly like to highlight two of the Student Academic Success programs above, which are semester-long activities and run in each semester, aimed at building and refining written communication skills especially targeted at thesis writing:
- Thesis/Publication Writing Group (run fortnightly)
- Intensive Writing Course for Science Communication (run weekly)
Importantly, these semester-long activities will include “reserved places” for PhD students who have been specifically referred by their supervisor/s as needing extra support (recommendation can also be via a panel milestone review recommendation). We strongly encourage supervisors to make note of this specialised service for current and future students. | https://www.monash.edu/medicine/research/grad-research/support/mnhs-communication-library |
The Statutory Superintendent of the Gbehlay Geh Statutory District in Nimba County, Daniel Bartua Bartuah, has urged ArcelorMittal Liberia to pump in more money into conservation and Biodiversity farming programs in the region.
According to the statutory superintendent, as much as the farmland (East Nimba Reserved Forest) in the clan has been demarcated by the government and partners, citizens in the area may experience hunger,
if land control and improved farming ideas are not introduced.
Daniel Bartuah appealed to the company to aid farming organizations and local NGOs working with farmers in the region to grow more food though on limited land space to keep the people in the areas surviving.
The statutory superintendent, however, appreciated Arcelor Mittal Liberia and RICCE for the agricultural Training offered the citizens to sharpen their farming skills.
The local leader appeal was made in Zorkpolay last Friday, when the Rural Integration Community Conservation Empowerment (RICCE) launched its conservation farming and Biodiversity program, in which its
sponsored farmers sold variety of crops at low cost.
Meanwhile, the Communication Department of AML expressed the hope that the leadership of the company will listen and do more than the citizen feel, adding that as much as locals continue to place more interest in
farming and self-sufficiency in food production, the company will continue to act parallel to their initiatives. | https://thenewdawnliberia.com/nimba-statutory-superintendent-recommends-to-arcelormittal/ |
.
Although public debates emphasize a weakening of work values and ethics over the last few decades, little attention has been paid to the transmission of work values between parents and children. It is still unclear what kind of parental behavior is critical and if culture influences the intergenerational transmission of work values. Based on socialization and value transmission theories, we explore the question by comparing three countries with different cultural characteristics: Czech Republic, Spain, and Turkey. We used data from the CUPESSE project collected from young adults aged 18 to 35 and their parents. Turkish young adults and parents reported higher levels of moral- and gender-based work values than their Spanish and Czech counterparts. Parent-child similarity in work values was the highest among the Turkish families and the lowest among the Czech families. Overall, we find that stronger moral and redistributive work values and weaker gender role-based work values are associated with high levels of parental warmth and autonomy granting and low levels of perceived psychological control. Results suggested that family climate, rather than specific paternal and maternal parenting behaviors, have more substantial effect on the value transmission. We discuss implications that consider the role of cultural orientation and gender roles.
Subject Keywords
Sociology and Political Science
,
General Social Sciences
URI
https://hdl.handle.net/11511/51026
Journal
ANNALS OF THE AMERICAN ACADEMY OF POLITICAL AND SOCIAL SCIENCE
DOI
https://doi.org/10.1177/0002716219830953
Collections
Department of Psychology, Article
METU IIS - Integrated Information Service
IT Support Service
You can transmit your request, problems about services
provided by METU Computer Center, and follow the process. | https://open.metu.edu.tr/handle/11511/51026 |
Aside from the human health,environmental, and technical issues associated with the oil spill in the Gulf, we have also now seen the consequences of both poor regulatory practices and inadequate industry safety practices. We have seen the President blame the blamers. We have seen the industry only halfheartedly at best accept its responsibilities. Not a day goes by that an elected official doesn’t demagogue the issue. The media tends to report on the latest sensationalist headline. This sideshow has done nothing to slow the flow of oil nor to prevent it from happening again. What is missing is any semblance of the facts from any independent reliable source.
The President appears to be headed toward appointing a Commission to examine the spill and make appropriate recommendations. While initially useful, this once and done solution is also subject to further politicization and obfuscation by all parties concerned. The transportation industry offers a better model — the National Transportation Safety Board (NTSB).
Congress should pass and the President should sign in short order legislation creating an independent agency with Commissioners appointed from both parties to oversee a professional staff to investigate energy accidents. The new agency should be patterned closely after the NTSB. In fact, the NTSB already has jurisdiction over pipeline incidents. This section could be transferred into the new energy board to serve as a model to build the investigative agency. Like NTSB, “Go Teams” would be created to be dispatched immediately to incidents. Like NTSB, a full investigation would commence at the time of the accident, hearings would be held, and a report would be issued. Safety directives would be issued and provided to the MMS to promulgate as regulations.
In many ways, this accident has parallels to many major aircraft accidents. Human error, equipment, maintenance practices, interaction among the team on the drilling rig and other factors must all be examined by independent experts. Just as the modern aviation industry is operating at the very edge of technology, today’s oil industry is as well. The NTSB has a proven record of investigating accidents, determining the cause, and making appropriate recommendations factually and with as little fanfare as possible. That should be the goal of the Deepwater Horizon investigation.
The ecological, economic, and energy policy stakes to this issue are high. A National Energy Safety Board could insure that facts and not fears, explanations and not embellishments, and answers not ad-hoc guesses result from the investigation. | https://blog.chron.com/barrelsandbtus/2010/05/the-administration-and-congress-should-immediately-create-a-national-energy-safety-board/ |
24-Hour Emergency No.
+86 573 88715877
Email:
[email protected]
Home
Products
Silt Curtain
Spill Response Kit
Oil Containment Booms
collapsible bund and stroage tank
Oil spill response equipments
Absorbents
sediment bag
Geotextile Tubes
Solar Thermal Plants
News
Certificate
About us
Pricing
Contact us
����
Home
>
News
>
Pinghu City Transportation Bureau launched inland waters ship pollution accident emergency drill
11/Oct/2021
The drill was held on the Pinghu Zhongrun Water Refueling Point segment of the Hangpingshen Line. It was simulated when an unloaded transport ship was passing through the segment, it occurred a machine failure,then the ship lost control, and collided with a refueling transport ship at a water refueling station. The oily sewage from the engine room of the ship contaminated local water bodies. They immediately set up water traffic control, rescue of out-of-control ships, pollution prevention and other exercises. In this drill, 6 maritime patrol boats were dispatched and more than 30 personnel participated in the drill. After receiving the alarm from the gas station, the water command center immediately activated the emergency plan, dispatched six maritime boats to control the traffic at the scene of the accident, rescued out-of-control ship, laid
oil booms
around the contaminated waters, threw
oil absorbent pads
for clearing the water surface and preventing further expansion of ship pollution accidents. | http://jxysiltcurtain.com/news/2021/1011/1160.html |
Of all the monuments on Earth, not one is as striking, magical, and mysterious as the Great Sphinx of Giza….
The countless mysteries and beauties of Asia have always attracted us, the Western people, with their exoticism. Another incredible landmark…
The ancient Egyptian pyramids’ story starts with the most humble beginnings in predynastic and early dynastic times. According to mainstream…
Ancient Egypt’s history of pyramids is nothing short of magical. Although many experts say that the pyramids of Egypt are…
The most famous pyramid on the surface of the planet is without a doubt the Great Pyramid of Giza. According…
The Great Pyramid of Giza is, without a reason of a doubt, one of the most studied ancient monuments on…
Of all the problems concerning the pyramids, their construction is the most puzzling. Even Roma writer Pliny, who condemned the…
The territory of today’s Peru is dotted with the two most important things for a tourist – breathtaking nature and…
When it comes to the impressive and famous monuments of ancient Egypt, Pyramids fascinate everyone even till the present day…. | https://curiosmos.com/?s=granite |
Do you ever find yourself running through all the things you have to do in your mind, wondering how on earth you are ever going to find time to get them done? Do you ever feel pressured trying to achieve what often seem like impossibly high standards (either your own or those of others)? Do you have days when you simply don’t feel motivated to do anything, either because you lack the energy required or you simply feel that nothing you do is meaningful?
If you answered “yes” to any of those questions then congratulations: you are probably no stranger to feelings of stress, anxiety or depression.
And you are not alone.
According to the recent survey carried out by Record Union, 73% of music makers have experienced negative emotions such as stress, anxiety and depression in relation to music creation.
If you are one of these 73, I feel you. I’ve been there too, and it sucks. These kinds of issues can at best just get you down. At worst, they can be truly debilitating and have a severe negative effect on the quality of life.
Luckily, mental health issues are something that have been destigmatized in recent years. Someone who lacks motivation due to depression is less likely to be seen as “lazy”, for example. And society has more patience and understanding for people who suffer from anxiety. Real efforts are being made within organizations to combat stress among co-workers.
We are getting better at understanding mental illness and its effects on those who suffer it.
And, we are getting better at understanding what tools are available to us to help reduce these conditions.
More and more studies are showing how effective mindfulness-based practices can be at reducing stress, anxiety and depression. Hundreds of universities are publishing research on the topic. There are even dedicated research centers at the University of Oxford and the University of Massachusetts Medical School.
Now, your honest answer please. If somebody says the word “Meditation” or “Mindfulness” to you, are you suddenly struck by an intense desire to run very far away from that person as fast as you can?
Yes, I know. Meditation is hard! And boring! And it can be surprisingly difficult to motivate yourself to do even a quick, 7-minute practice, whether it’s because you’re feeling down and every cell of your body screams NO when you even think about it, or whether your schedule is simply so busy you have no idea how you’ll fit in it.
Well, I have some good news for you, and some bad news.
OK, bad news first. If you want to de-stress and feel calmer and happier in your everyday life, you are going to have to slow down sometimes and get in touch with your inner world. There is no magic pill. We have to do the work.
The good news? As a music maker, your greatest talent could also be your greatest tool for doing that work in a way that is enjoyable for you!
I am a classically trained singer and sound therapist, and this article is about how to use your passion in your favor and develop a mindfulness routine for yourself that is based around sound.
Mindfulness, in fact, is simply to be with yourself and notice, without judgment, what arises in your mind and body.
It allows us to become more aware of our thoughts, of our emotions and those of others. Also, it helps us to get to know ourselves better, and helps us regulate uncontrolled reactions to external circumstances such as losing our temper or becoming excessively anxious. It even reduces activity in the amygdala, the part of the brain that is heavily involved in the switching on of the body’s stress response.
And the wonderful thing is that we can achieve very similar effects to those of meditation, simply by using sound!
Have you ever been dancing or doing a form of sport and felt yourself get completely into a state of “flow”, get completely out of the mind and “into the body”?
Getting our awareness out of the mind and into the body is an essential component of mindfulness because it is so much about being present. Learning to be self-aware from moment to moment is a big part of what helps us regulate our emotions and reactions in everyday life, thus reducing conditions such as stress, anxiety and depression.
And so, a big part of mindfulness is about getting ourselves into the body in a conscious way.
It’s why many mindfulness practices involve focusing on the breath and how it moves through the body, or doing a body scan to notice how different parts of the body feel.
However, a lot of people find such practices boring and/or difficult to focus on when they already feel stressed or anxious.
In my practice, I have found that sound, and in this case, specifically, the sound of the voice can be a wonderful tool. A lot of people report that using sound can be a much easier and more sustainable way to bring awareness into the body.
For some reason, the body responds so well to sound vibrations (ever been at a concert and felt the bass in your chest? Yeah, baby ;)) that for many of us, time goes much faster and we get out of the mind and into the body much more easily than with conventional meditation or mindfulness practices.
Feeling curious? Give it a try with this short practice!
All done? Congratulations! You have just completed a mindfulness practice! Even the busiest bees should have time to incorporate this short practice at some point during their day. Doing so daily can have a noticeable effect on stress and anxiety levels.
Does the term “altered state of consciousness” give you images of hippies and hallucinogens? Don’t worry, I’m not about to suggest you start munching on magic mushrooms and dance naked around campfires.
An altered state of consciousness is just any psychological state that differs from normal waking consciousness. At higher brainwave frequencies (beta or gamma), the brain is alert and ready for action. But the brain also needs to be able to go into lower frequencies (such as alpha and theta) in order to repair cells, recover from stress, restore nervous system function, and for memory recall, among other things.
It has been observed that during meditation or hypnosis, people go into an altered state of consciousness (usually alpha or theta frequencies).
According to Dietrich’s hierarchy of consciousness, this could be part of the reason why we notice such an improvement in ourselves and our lives when we incorporate a mindfulness routine. We practice not only reacting to external stimuli and being caught up inside our emotional experience but also observing those reactions and those emotions, giving us a kind of higher level of awareness.
Our ability to be self-aware is precisely what distinguishes us from other life forms. Going into an altered state of consciousness gets us out of the “ordinary mind” and into another mode that can be much more successful at dealing with or healing from our problems. As Christa Smith, Psy.D. writes in an article for Psychology Today:
“Healing requires getting into non-ordinary modes of mind, such as mindfulness. These alternate modes are beyond words. Whatever transpires in these states of mind does so in a different language than that of thought. Maybe that’s why non-ordinary states can be so transformative, because they offer something that thinking never will.”
It is thought that through a process called auditory driving, sound vibrations can pull the brain into a lower brainwave frequency, effecting the same kind of altered state of consciousness as somebody who is meditating.
In a passive sound therapy session, an individual simply lies on a couch and is subjected to sounds played at low frequencies. Long notes without melody or rhythm are played in order to bring the brain into an altered state of consciousness.
And when people take part in a sound therapy treatment, we observe the same signs of altered states of consciousness that we do in experienced meditators or people under hypnosis (e.g. seeing complex imagery while eyes are closed, having a different perception of time and space, audio-visual synaesthesia, among others).
My clients report going into a deep state of relaxation during their session, and feeling lighter and more relaxed afterwards. Some report that being in such states can even bring on “Aha” moments about issues that they had seen no way out of before.
Most find that using sound is much more accessible than meditation, since it requires only lying down and listening to the sounds, rather than perfecting a meditation technique.
Listening to a recording is nothing like the real thing, but if you listen with good headphones you may experience an altered state of consciousness similar to hypnosis or meditation during the track.
One of the best things you can do for your mental health is to engage in regular mindfulness practice.
As a sound practitioner, I hear reports every day of people who find that harnessing the power of sound makes it easier for them to get out of the mind and into the body, and to get into a more meditative state of consciousness, both of which are the key elements to mindfulness.
I hope that you, as a musician, will give these tools a try as a way of using your passion in your favor and achieving a calmer, more grounded and more present you.
Kim Gajraj graduated from Oxford University in 2013 (French and Spanish), has a MSc in International Development and is a classically-trained singer (ABRSM grade 8). Kim has felt the transformative power of tools that help us be more present and self-aware in everyday life and has since dedicated herself to sharing these tools with others. She has completed training in trauma release, breathwork and the wheel of consent and is on the Therapeutic Sound Association (TSA) Register. She has also trained in tantric and emotional release practices. | https://blog.recordunion.com/the-wellness-starter-pack/de-stress-through-sound-using-music-for-mindfulness |
SPICER, J.
Edna Marie Leach is a seventy-year-old housewife and the mother of two children, Roy A. Leach and Mary E. Hoyt. Neither child resides with his parents. Roy lives in Akron and Mary in Phoenix, Arizona. Mrs. Leach has a number of brothers and sisters. Gifford Leach, her husband, is a retired laborer from B. F. Goodrich Company. Edna and Gifford reside in a modest home which they own as tenants in common. Mrs. Leach has no valuable assets other than three small insurance policies and two bank accounts. If Mrs. Leach were to die, Mr. Leach would be the beneficiary of the insurance proceeds, and the children would share the accounts. Most of all hospital and medical costs are covered by either Medicare or Goodrich.
Mrs. Leach was an energetic woman who enjoyed good health until two years ago. At that time, she developed a problem in her lower back, which became a marked weakness of most of the muscles of her lower extremities. This condition caused her to walk in a bent-over position. On June 11, 1980, she entered a hospital and her condition was diagnosed as amyotrophic lateral sclerosis, a progressively deteriorating, disabling disease of the nervous system.
Mrs. Leach was informed by her treating physician, Dr. Howard Shapiro, of the disease and that it would be terminal within three to five years. He further informed her she would be incapacitated. Mrs. Leach's condition deteriorated and she was admitted to Akron General Medical Center on July 27, 1980, in a stuporous condition with difficulty in breathing. After some improvement in the early hours of July 29th, Edna suffered a cardiac arrest. Cardio-pulmonary resuscitation was administered and Mrs. Leach's heartbeat was quickly restored. She was then placed on a life support system.
Mrs. Leach's condition is a continuing anxiety to her family. In addition, it constitutes an expense approximating $500 a day to her insurance company. Mr. Leach, observing his wife's condition, contacted Dr. Shapiro and requested that the use of the respirator be terminated. On October 13, 1980, Dr. Shapiro responded with a letter stating her condition to be "hopeless" and "her ultimate demise is only a matter of time," but he refused to end her life support. Dr. Shapiro further indicated that life support could only be terminated by court order.
Mr. Leach sought legal counsel. On the basis of Mrs. Leach's incompetency, Mr. Leach, by this court, was appointed her legal guardian. Mr. Leach and Mrs. Leach's two children then instituted this action for an order to discontinue life supports of Edna Marie Leach. Pursuant to that request, this court, after having appointed Elizabeth A. Reilly as guardian ad litem, ordered the matter set for evidentiary hearing. On November 4 and 5, 1980, an evidentiary hearing was held. Additional evidence was taken on December 2, 1980. A total of 17 witnesses testified. Much of the testimony was directed towards two areas: Mrs. Leach's desires in reference to being
"That's the one thing that terrifies me. I don't want to be put on life support systems. I don't want to live if I have to be a vegetable."
Robert Crawford, Mrs. Leach's pastor, testified that while he had not discussed life supports with her, he did say that nothing in the family's request "violates the tenets of her faith or of my church."
As to the prognosis of Mrs. Leach's future health, three neurologists testified: Dr. Howard Shapiro, Dr. Harvey Friedman and Dr. Richard J. Lederman. Dr. Shapiro was called by the guardian and Doctors Friedman and Lederman by the guardian ad litem. Each doctor is a specialist in treating the nervous system and brain diseases such as amyotrophic lateral sclerosis, and each has conducted a physical examination of Mrs. Leach. All three agreed that Mrs. Leach was not dead under any accepted medical standard. All three agreed that she suffered from amyotrophic lateral sclerosis, which is terminal, and that there is no known treatment for such a disease. All agreed that she suffered brain damage. Doctors Friedman and Lederman stated she has suffered irreversible brain damage. Dr. Friedman said:
"I think, unequivocally, she has suffered irreversible brain damage."
Dr. Lederman said:
"In my opinion, there can be no question that she has suffered extensive central nervous system or brain damage. By all the criteria that we have gathered over the years, this level of functioning would be considered almost certainly irreversible in its major degree."
When asked whether Mrs. Leach was cognitive, all agreed she was not, and that it was unlikely that she would ever
"Well, there is, of course, no—no one could ever say that it can't happen. However, I am unfamiliar with a single case in the medical literature of this degree of disfunction with this cause, and I am emphasizing that in a patient of this age."
All agreed that if taken off the respirator, she would die within minutes or hours, and continuing her on it served no medical goal other than sustaining her respiration. Finally, all agreed there is no known treatment to help Mrs. Leach.
FINDINGS OF FACT
From the testimony and exhibits presented, this court specifically finds the following:
(1) that Edna Marie Leach is suffering from amyotrophic lateral sclerosis, a terminal illness of the nervous system;
(2) that she has suffered irreversible brain damage;
(3) that she is in a permanent, chronic, vegetative state;
(4) that she is not now cognitive and, within a reasonable medical certainty, it is highly unlikely and remote that her cognitive powers will be restored;
(5) that there is no known treatment that can be administered with any expected success;
(6) that Edna Marie Leach, in her present physical condition, if competent, would elect not to be placed on or continued on life supports; and
(7) that Gifford Leach, Roy Leach, and Mary Hoyt's sole motive for bringing this action is to end their wife and mother's present vegetative condition.
CONCLUSIONS OF LAW
THE PROBLEM
When an individual is suffering from an incurable, terminal disease and is in a permanent vegetative state with no hope of regaining cognitive or sapient powers, may this court grant an order for discontinuation of a respirator sustaining what minimal life that remains? That, simply stated, is the problem and question this court must answer. This, of course, is a court of law, and it must be guided by the law of its jurisdiction.
However, Ohio has no law or precedent dealing with a matter similar to the one now faced by this court. There is no case law or statutory law within the court's jurisdiction to
When does death occur—when the heart ceases or brain function ends? While it is an interesting and important problem, it is one that does not appear to be answered in Ohio.
The problem before this court is not life or death. That question has already been decided. Edna Marie Leach is going to die. She is on the threshold of death, and man has, through a new medical technology, devised a way of holding her on that threshold. The basic question is how long will society require Mrs. Leach and others similarly situated to remain on the threshold of certain death suspended and sustained there by artificial life supports. Since, man, through his ingenuity, has created a new state of human existence—minimal human life sustained by man-made life supports—it must now devise and fashion rules and parameters for that existence. That is the business this court is faced with. It is not an easy question to answer. It deals with many of our most basic legal, medical and moral concepts. However, it is a question that must be answered.
While considerable law exists on the question of treatment, only five states have addressed the question as posed to this court, that is, treatment of the terminally ill, incompetent individual. In re Quinlan (1975), 137 N.J.Super. 227, 348 A.2d 801, modified and remanded (1976), 70 N.J. 10, 355 A.2d 647, certiorari denied sub nom. Garger v. New Jersey, 429 U.S. 922; Supt. of Belchertown State School v. Saikewicz (1977), 373 Mass. 728, 370 N.E.2d 417; Matter of Spring (Mass. 1980), 405 N.E.2d 115; Satz v. Perlmutter (Fla. App. 1978), 362 So.2d 160; Matter of Eichner (1980), 73 A.D.2d 431, 426 N.Y. Supp. 2d 517; Severns v. Wilmington Med. Ctr. (Del. Sup. Ct. Sept. 23, 1980), 49 U.S.L.W. 2262.
The first state, New Jersey, in the highly discussed In re Quinlan, supra, set the precedent by applying the constitutionally guaranteed right of privacy in allowing the removal of life supports. Since Quinlan, with slight variations, each court that has faced similar factual patterns as Quinlan, i.e., either withdrawing or withholding treatment, has followed its lead. Of the six cases cited, the one that is the closest in fact pattern to the case at bar is the New York decision, Matter of Eichner, supra.
In Eichner, an eighty-three-year-old Catholic Brother suffered cardiac arrest and was revived, only to be placed on life supports. The trial court found him to be in a permanent, chronic, vegetative state and granted the motion to have his respirator terminated. As part of its finding of fact, the court specifically found that if Brother Fox were competent, he would have requested that he not be put on a respirator.
On appeal, the New York Supreme Court, Appellate Division, Second Department, affirmed the lower court, and as in Quinlan, based its affirmance on the right of privacy. The court, in a lengthy opinion, began by citing its equitable powers (parens patriae) over mental incompetents.
The court then went on to discuss the constitutional questions. It found in Roe v. Wade (1973), 410 U.S. 113 and Doe v. Bolton (1973), 410 U.S. 179, the fundamental right of privacy over matters of personal integrity, including control over one's body. The court indicated that a terminally ill, but competent person, has the right to choose medical treatment. It said at (73 A.D. 2d) pages 458 to 459:
Further, the court said the right must be applied to incompetents as well as competents:
"We further conclude that by standards of logic, morality and medicine the terminally ill should be treated equally, whether competent or incompetent. * * *" Id., at page 464.
In the next step in its decisional process, the court used a balancing test as exemplified and required by Roe v. Wade, supra. Brother Fox's right of privacy was weighed against the state's interest in preserving his life. The court found under the law of New York and the specific facts involved in Brother Fox's situation that there was no "compelling state interest" sufficient to outweigh his right to decide medical treatment. Further, the court emphasized that the individual's right to decide treatment would attach only when the medical prognosis showed that individual to be terminally ill, in a permanent, vegetative state, with the possibility of regaining cognitive brain function extremely remote.
Finally, the court turned to examination of how Brother Fox's right could be exercised:
"* * * We cannot but emphasize that there must exist a mechanism to ascertain and to implement the patient's consent. To deny the exercise because the patient is unconscious is to deny the right. * * *" Id., at page 470.
The first mechanism the court settled on was by the expression of the individual himself (specific intent), either by a living will or by his oral expression, as exemplified by Brother Fox's statement as to life supports. If the incompetent has not expressed himself sufficiently, then the second mechanism would be made by the parens patriae concept of substitute judgment.
As has been stated, the foregoing outline of the Eichner decision is in line with other state court rulings dealing with either withholding or withdrawing life supports from terminally ill, incompetent individuals. Each court that has been faced with the question has used the same constitutional right
APPLICABLE OHIO LAW
The Constitutional right to privacy is paramount to a state interest unless that interest can be demonstrated to be compelling or outweighs the individual's Constitutional right. Griswold v. Connecticut (1965), 381 U.S. 479, 484; Eisenstadt v. Baird (1972), 405 U.S. 438, 453; Roe v. Wade, supra. That is the test that this court must apply under the particular facts of this case in determining if Ohio law can prevent the exercise of Edna Marie Leach's right to decide medical treatment. On one side of the scale, this court must place a constitutionally protected right; on the other, any potential interest, either societal or legal, that the state might wish to protect. What potential interest? Generally, four basic areas of interest have been identified: Preservation of life; protection of third parties; maintenance of the ethical integrity of the medical profession; and, prevention of suicide. Eichner, supra, at pages 465-467; Quinlan, supra.
Preservation of life: Does the state of Ohio benefit by preserving Edna Marie Leach's life in its present condition? This court can see no possible benefit to the state by briefly extending the minimal life of an incurably ill, seventy-year-old, semi-comatose woman. It can see a number of negative detriments to the state, Edna Marie Leach, and her family in attempting not to preserve life, but in attempting to momentarily delay death. The state's interest in preserving the life of Edna Marie Leach does not outweigh her right to decide her own medical treatment.
Protection of third parties: What third parties would suffer if Edna Marie Leach's respirator were to be terminated? Her husband and children have joined in asking this court for a discontinuation of life supports. A parade of friends and relatives have testified of their uneasiness with Mrs. Leach's
Maintenance of the ethical integrity of the medical profession: A lengthy discussion exists of modern medical practice and professional attitudes toward life supports in both Quinlan, supra (70 N.J.), at pages 42 to 51, and Eichner, supra, at page 463. In both cases, those courts could find no reason to imply that the withdrawal of any extraordinary life support system for the terminally ill in an irreversible, vegetative coma is inconsistent with the current state of medical ethics. This court was not presented with any evidence, nor is it aware of any peculiarity of the medical profession in Ohio, that would disturb that observation.
Prevention of suicide: Ohio has no penalties for suicide. However, criminal prosecution could be considered under any one of Ohio's murder or complicity statutes. R. C. 2903.01(A), 2903.11(A)(1), 2903.12(A), 2903.13(A), 2923.01(A), and 2923.02(A). Suicide requires a specific intent to die. Withdrawal of a respirator evinces only an intent to forego extraordinary measures, and allows the processes of nature to run their course. This court does not consider the facts of the case before it to present a realistic or prosecutable case of suicide. The court notes with interest the prosecutor's comment that there is no report of a case of this nature being brought to trial. The state's interest in preventing suicide does not exist in the case at bar. It is therefore outweighed by the incompetent, incurable individual's right to elect treatment.
On the basis of the above analysis, this court concludes that no state interest, either legal or societal, exists to the degree necessary to outweigh the Constitutional right of Edna Marie Leach, an incompetent suffering from a terminal illness, to choose medical treatment.
BURDEN OF PROOF
The guardian ad litem raises the question of the standard of proof to be used in weighing the evidence considered by this court. The guardian ad litem suggests the standard of beyond a reasonable doubt. Beyond a reasonable doubt is a burden reserved for criminal cases. Addington v. Texas (1979), 441 U.S. 418, 428. The burden normally used in a civil matter is preponderance of the evidence, Cincinnati H. & D. Ry. Co. v. Frye (1909), 80 Ohio St. 289, or in a limited number of civil cases, the higher standard of "clear and convincing," Merrick v. Ditzler (1915), 91 Ohio St. 256. There does not appear to be sufficient authoritative case law for the proposition that the criminal standard should be applied to civil cases, 21 Ohio Jurisprudence 2d, Evidence, Section 700. In Eichner, supra, at page 468, the court rejected reasonable doubt as its standard and said:
"* * * Under the circumstances present herein, by no stretch of the imagination can the State be deemed to be `taking life' in a manner analogous to the imposition of a death penalty in a criminal action. This judicial proceeding is not directed towards the imposition of a penalty for criminal activity but, rather, towards the furtherance of the best interests of the comatose and terminally ill patient. * * *"
The matter before this court is civil in nature (R. C. Chapter 2111), and this court can find little support for applying the criminal standard of beyond a reasonable doubt. However, because of the nature and importance of the issues involved, this court would be remiss if it did not adopt the highest possible civil standard of clear and convincing. Ayres v. Cook (1942), 140 Ohio St. 281; Flax v. Williams (1937), 25 Ohio Law Abs. 680. The burden of proof adopted by this court is clear and convincing.
In its brief, Akron General Medical Center appears to be requesting an even higher burden of proof—that all witnesses concur. The court rejects such a notion. This court knows of no rule of law, either criminal or civil, that requires a concurrence of witnesses in their testimony. To require such a rule would take the decision processes from the trier of facts and give it to any witness who, for whatever motive, wanted to prevent the relief sought. It is up to the trier of fact to weigh each witness' testimony and give whatever weight it deems proper. Mieritz v. Insurance Co. (1901), 8 O.N.P. 422.
CONCLUSIONS
The following are the conclusions of law of this court in the matter of Edna Marie Leach:
(1) The Constitution of the United States, as part of the right to privacy, guarantees to an incurably, terminally ill person, who is in a permanent, vegetative state, the right to decide future medical treatment.
(2) The facts of the case at bar do not demonstrate any compelling state interest paramount to or that outweighs the above right.
(3) The standard of proof required in cases of this nature is clear and convincing.
(4) Edna Marie Leach, being an incurably, terminally ill person, and in a permanent vegetative state, has the right of deciding medical treatment.
(5) As indicated in the Findings of Fact of this court, supra, Edna Marie Leach, if competent, would elect not to be placed on life supports.
(6) It is, therefore, the further finding of this court that the motion of her guardian, Gifford Leach, to terminate the respirator she presently is on, is well taken and should be granted.
ORDER
It is, therefore, the order of this court that Gifford H. Leach, Guardian of Edna Marie Leach, is empowered and authorized to direct a discontinuation of the respirator presently assisting Edna Marie Leach. However, the following conditions must be complied with prior to the act of discontinuation:
(1) A licensed physician and neurologist selected by the guardian must examine and then certify that Edna Marie Leach continues in a permanent vegetative state, and that there is no reasonable medical possibility that she will regain any sapient or cognitive function.
(2) A forty-eight hour notice of the examination must be given to the Summit County Coroner and Prosecutor. The Coroner's and Prosecutor's Office may have a witness or witnesses present at the examination.
(3) When the examination is complete, a forty-eight hour notice of the act of discontinuation must be given to the Summit County Coroner's and Prosecutor's Office. The Coroner's
It is the further order of this court, that if upon compliance with the above condition, the respirator is removed and death should occur, the cause of death shall be attributed to the natural causes which have contributed to Edna Marie Leach's illness. Such act of discontinuation shall not give rise to either civil or criminal liability on the part of any participant, guardian, physician, hospital or others.
The authorization extends only to the removal of the respirator and to no other life supports.
Judgment accordingly. | https://www.leagle.com/decision/19806968ohiomisc1169 |
A process called DNA methylation is linked to non-alcoholic fatty liver disease (NAFLD), research at The Translational Genomics Research Institute finds.
‘DNA methylation in four genes has been identified as the cause of non-alcoholic fatty liver disease (NAFLD) among obese patients.’
In one of the most exacting studies of its kind, TGen scientists found evidence that DNA methylation has a role in the initiation of NAFLD-related fibrosis.
Obesity and insulin resistance are associated with fat accumulation in the liver, and obesity is a significant risk factor for NAFLD. Using a City of Hope computer algorithm specifically designed for the task, researchers analyzed the biopsied liver tissues of 14 obese patients with advanced fibrosis or cirrhosis of the liver, and 15 obese patients with normal livers.
“Our findings showed statistically significant evidence for differential DNA methylation between fibrotic and normal tissue samples from obese individuals,” said Dr. Johanna DiStefano, a TGen Professor and head of the institute’s Diabetes and Fibrotic Disease Unit.
Importantly, the study zeroed in on four genes, AQP1, FGFR2, RBP5 and MGMT, that not only were methylated in this study, but also in three previous studies that were similar, but not specifically focused on advanced fibrosis in obese NAFLD patients.
“These genes could represent targets for new therapeutics,” said Dr. DiStefano, the study’s senior author, who plans to pursue a larger study that would validate the initial findings in this pilot inquiry. “These approaches are yielding new insights into the pathological mechanisms underlying the development of fibrosis and cirrhosis in NAFLD.”
Future studies will be needed to determine the extent to which DNA methylation patterns in the liver are represented in other metabolically relevant tissues. Such findings would be critical for the development of non-invasive biomarkers in the creation of an early-warning system for NAFLD, the study concludes. | https://healthadvice.site/genetic-causes-of-liver-disease-in-obesity-identified/ |
Yesterday, I responded to a code blue in one of the procedural areas of our hospital. The patient had severe hypoxemia due to flash pulmonary edema from combined systolic + diastolic heart failure and then had an IV dye load that tipped him over into pulmonary edema. He had a previous tracheostomy and still had a residual stoma that had not entirely closed. We put an endotracheal tube into the stoma until we could obtain a large enough tracheostomy tube to fit his tracheal diameter. Despite mechanical ventilation with 100% oxygen and a very high level of PEEP (positive end-expiratory pressure), his oxygen saturation stayed in the 70’s and 80’s for at least a half hour.
If that had happened to me, I would likely have severe anoxic brain injury. Yesterday, we had 4 patients in our ICU with severe anoxic brain damage that had been admitted after suffering cardiorespiratory arrests. But the patient who coded yesterday is waking up just fine this morning. So why do some patients get anoxic brain injury from prolonged hypoxemia and others seem to get by without any brain damage? I think it comes down to the wonders of 2,3-DPG.
2,3-diphosphoglycerate (2,3-DPG) is a chemical normally present in relatively small amounts in red blood cells. Its job is to change how oxygen binds to hemoglobin in order to make oxygen fall off of hemoglobin more easily so that when a red blood cell passes through vital organs (like the brain), more oxygen can be released by that red blood cell. Normally, a red blood cell will release about 25% of its oxygen as it passes through tissues; it then goes to the lungs and re-loads with oxygen. 2,3-DPG makes the red blood cell release more oxygen. This is particularly important in people who are traveling to high altitude (e.g., mountain climbers) and people who chronically are hypoxemic (e.g., patients with untreated sleep apnea). A normal person will have an oxygen saturation of nearly 100% as blood leaves the lungs; the red blood cells will release about 25% of its oxygen in the tissues so that the oxygen saturation is about 75% when that venous blood returns to the lungs. If you are at high altitude, your arterial blood’s oxygen saturation may only be 80% and if the red blood cells can only release oxygen down to a saturation of 75% as they pass through the tissues, then there isn’t much oxygen being released and the tissues can be starved for oxygen. 2,3-DPG allows the red blood cells to release oxygen down to a saturation that is much lower than 75%, say 60%, so that enough oxygen is being off-loaded into the tissues to keep them functioning normally. From a physiologic standpoint, we call this a “right shift of the oxyhemoglobin dissociation curve”.
One of my heroes is Lonnie Thompson. He is an OSU Professor of Earth Sciences. He is arguably one of the most renowned faculty members at the Ohio State University and his research involving high-altitude glacial ice core samples has led him to spend more time at extreme altitude than any other human in history. 2,3-DPG is one of the main reasons he can do it.
My patient yesterday most likely had non-human high levels of 2,3-DPG that allowed him to come through a period of prolonged hypoxemia unscathed. And that got me wondering. What if I could bottle 2,3-DPG and put it in a syringe? Who would I give it to? Here is who I would give an amp of 2,3-DPG if I could:
- Everyone in a cardiopulmonary arrest. I would change the ACLS algorithms to push 2,3-DPG even before giving epinephrine every time cardiopulmonary resuscitation was required.
- Patients with unstable angina. If a coronary artery was partially blocked, wouldn’t it be great if you could off-load every last oxygen molecule from the red blood cells that did get through to the myocardium?
- Jehovah’s Witnesses undergoing surgery. It is every surgeon nightmare who operates on a Jehovah’s Witness – that there will be unforeseen bleeding in a patient that you can’t give blood transfusions to. An infusion of 2,3-DPG would allow you to get more out of what little blood the patient has left.
- Patients in shock. Ultimately, shock is an imbalance between oxygen consumption and oxygen delivery. Currently, when a patient is in shock, we try to improve oxygen delivery by giving vasopressor medications to increase the blood pressure. I think we’d be far more successful if we could increase tissue oxygen delivery if we gave an IV infusion of 2,3-DPG.
- Mountain climbers. If everyone who climbs mountains had Lonnie Thompson-levels of 2,3-DPG, we wouldn’t have to worry about altitude sickness anymore.
It is going to take someone a lot smarter than me to figure out how to make 2,3-DPG into a marketable pharmaceutical. But for now, I’m just really glad that the patient yesterday had a lot more of it than a normal person. | https://hospitalmedicaldirector.com/23-dpg-is-a-wonderful-thing/ |
step 1: Preheat oven to 375 degrees F (190 degrees C).
step 2: Cut the filets into log shaped pieces, about 2 inches wide by 5 inches long, keeping the filet portions separate. Take 2 sheets of phyllo dough, placing one on top of the other, and brush lightly with melted butter, covering the one side completely.
step 3: Place a portion of salmon (6 ounces), on the edge, nearest you, of the phyllo dough. Sprinkle with salt and pepper to taste. Coat the portion of salmon with 1 tablespoon of Dijon mustard.
step 4: Fold the phyllo dough, nearest you, over the salmon and make one complete wrap. Take the sides of the dough and fold them towards the center, and continue rolling up the dough. Brush all sides with butter, covering completely and place on a cookie sheet. Repeat steps for remaining portions of salmon.
step 5: Bake in preheated oven for 20 minutes or until phyllo dough is golden brown. | https://cookingrecipes.onionsearchengine.com/page.php?title=Wrapped_Salmon_Recipe |
Please ensure you check the module availability box for each module outline, as not all modules will run in each academic year. Each module description relates to the year indicated in the module availability box. Please be aware that modules may change from year to year, and may be amended to take account of, for example: changing staff expertise, disciplinary developments, the requirements of external bodies and partners, and student feedback.
Department: Economics and Finance
ECON42015: Money and Banking
|Type||Tied||Level||4||Credits||15||Availability||Available in 2019/20|
|Tied to||L1K509|
|Tied to||L1T109 Economics|
|Tied to||L1T209 Public Economics|
|Tied to||L1T309 Experimental Economics|
|Tied to||L1T409 Environmental & Natural Resource Economics|
|Tied to||N3K609 Finance (International Banking and Finance)|
Prerequisites
- None
Corequisites
- EITHER Advanced Financial Theory (ECON41215) OR Advanced Macroeconomics (ECON44815 or ECON41715)
Excluded Combination of Modules
- None
Aims
- give students a sound knowledge of the transmission mechanism of monetary policy via traditional channels, the balance sheet channel, and the bank lending channel
- introduce students to various theories of firm and consumer behaviour under capital market imperfections
- give students an in-depth understanding of the ways in which economic analysis can be used to formulate models of financial decisions
- show students how these models can be tested
- show students how the outcomes of these tests contribute to the understanding of monetary and financial transmission mechanisms
Content
- Topic 1: Monetary policy transmission
- 1.1 Traditional channels of transmission of monetary policy
- 1.2 The credit channel
- 1.2.1 The balance sheet channel
- 1.2.2 The bank lending channel
- Topic 2: The financial system and the corporate sector
- 2.1 Capital market imperfections and investment decisions
- 2.1.1 The Q model approach
- 2.1.2 The Euler equation approach
- 2.1.3 The error correction specification approach and other approaches
- 2.2 Capital market imperfections and inventory accumulation decisions
- 2.2.1 The reduced form approach
- 2.2.2 The linear quadratic model approach
- 2.3 Capital market imperfections and other aspects of firm behaviour
- Topic 3: The financial system and the personal sector: capital market imperfections and consumption
Learning Outcomes
- ability to build on core macroeconomic understanding to explore monetary and financial economics
- detailed understanding of various topical issues in the field of monetary and financial economics
- comprehensive grasp of underpinnings of monetary policy analysis
- ability to apply core advanced economic theory and quantitative methods to applied topics in financial and monetary economics
- ability to identify appropriate economic models to analyse monetary and financial problems
- ability to apply advanced mathematical, statistical and graphical techniques in an appropriate manner
- ability to justify conclusions using economic arguments with appropriate rigour
- ability to show understanding of advanced analytical methods, both theory- and model- based
- ability to show understanding of relevant mathematical and statistical techniques
- ability to reason logically and work analytically
- ability to work with abstract concepts and in a context of generality
- ability to select and apply appropriate techniques to solve problems
- ability to understand the contexts in which problems are addressed
- ability to communicate effectively and clearly in written and oral formats
Modes of Teaching, Learning and Assessment and how these contribute to the learning outcomes of the module
- A combination of lectures, seminars and guided reading will contribute to achieving the aims and learning outcomes of this module. Summative assessment by written examination will test students' knowledge and understanding of the subject-matter and their ability to apply relevant problem-solving and analytical skills.
Teaching Methods and Contact Hours
|Activity||Number||Frequency||Duration||Total/Hours|
|Lectures||9||1 per week||2 hours||18|
|Seminars||4||1 per fortnight||1 hour||4|
|Preparation & Reading||126|
|Revision session||1||2 hours||2|
|Total||150|
Summative Assessment
|Component: Examination||Component Weighting: 100%|
|Element||Length / duration||Element Weighting||Resit Opportunity|
|Unseen Written Examination||2 hours||100%||Same|
Formative Assessment:
Work prepared by students for seminars, which will include answers to pre-assigned questions; there will also be discussion of pre-assigned readings.
■ Attendance at all activities marked with this symbol will be monitored. Students who fail to attend these activities, or to complete the summative or formative assessment specified above, will be subject to the procedures defined in the University's General Regulation V, and may be required to leave the University
If you have a question about Durham's modular degree programmes, please visit our User Guide. If you have a question about modular programmes that is not covered by the User Guide, or a query about the Postgraduate Module Handbook, please contact us using the Comments and Questions form below. | https://www.dur.ac.uk/postgraduate.modules/module_description/?year=2019&module_code=ECON42015 |
Welcome to Snack Sense
The HSE’s Leadership Team recently approved a new HSE policy for healthy vending of chilled soft drinks, confectionery and snacks across the health services. The policy aims to promote greater availability of healthy foods for those visiting and using HSE services, and for HSE employees. A nutritious and balanced diet is one of the central elements of healthy lifestyle and the new policy aims to promote this.
Under the Healthy Vending Policy, all vending machines will stock, as a minimum, 60% healthier options (Better Choice) and 40% other products (Other Choice). The policy also supports customers in making informed choices of foods, by ensuring that all vending machines carry mandatory calorie labelling. | http://www.snacksense.ie/ |
Thank you for trusting the National Exchange Hotel as a place you know and love to safely create lasting memories. As we return to business from our extensive renovation, our highest priority is the health and well-being of our family of guests, employees and our local community.
Please see below for updates on policies as well as actions taken to ensure your health and safety during your visit to the National Exchange Hotel . In addition to the plan, each operating department has its own customized set of procedures.
We have relied on the best available science on sanitization protocols to develop our plan. We will continue to refine and update as additional direction becomes available.
We thank you for your support of the National Exchange Hotel, a place that is near and dear to our heart, and many of yours.
In good health,
Ted Robinson
General Manager
OUR NUMBER ONE PRIORITY – EMPLOYEE & GUEST HEALTH
- Physical Distancing. Guests will be advised to practice physical distancing by standing at least six feet away from people outside of their immediate party. This includes while standing in any line or moving around the property. Restaurant dining, and other physical layouts have been arranged to ensure appropriate distancing.
- Masks: Required on property everywhere per mandate from State of California.
- Hand Sanitizer/wash stations. Hand sanitizers and wash stations will be placed at key contact areas for guests and employees.
- Sanitation: Constant sanitation of surfaces will be maintained by dedicated employees including doors, elevator buttons, table tops, chairs, bar tops, doorways and all other high-touch areas in the hotel.
- Signage. Health and hygiene signage will be placed throughout the National Exchange Hotel including reminders about social distancing and sanitation practices and policies. Signage will also be posted throughout the “back of the house” reminding employees of the proper way to wear masks and gloves, and handle and dispose of clean masks and use of gloves (based on advice from medical professionals).
- Guest & Employee Health Concerns. Our staff has been given clear instructions on how to respond swiftly and report any and all presumed illnesses. Employees are instructed to stay home if they any symptoms consistent with COVID-19 and/or if they do not feel well enough to work. All employees will receive COVID-19 training (safety and sanitation protocols).
- Personal Protective Equipment. Appropriate PPE will be worn by all employees based on their role and responsibilities.
GUEST ARRIVAL/DEPARTURE
- Guests will check in at the front desk behind plexiglass sneezeguard or at our contactless check-in desk located in the lobby .
- Check outs will be handled automatically, and a copy of the bill will be emailed to the guest.
- Guest Room Keys will be sanitized and provided in a single-use envelope.
HOUSEKEEPING
- Housekeeping will maintain minimized contact with guests while cleaning and will clean at a time agreed upon by guest if necessary.
- For the safety of both our guests and employees, there will not be daily housekeeping except by request.
- All current reusable collateral will be removed from rooms; critical information will be distributed to rooms for single use only or through the electronic tablet in each room.
- Extra pillows and blankets will be available upon request only.
- Every surface in guest rooms will be cleaned following strict sanitation guidelines.
- All guest amenities will be single-use only.
- Mini-bar selections will be stored at the front desk and available by request only.
RESTAURANT AND BARS
- QR code will be available at every table for viewing menus electronically with a smartphone. Paper menus will be available by request and will be single use only.
- Indoor dining is currently not available in Nevada County. Outdoor dining is available at socially distanced tables.
- Table and service stations will be sanitized between each seating. | https://thenationalexchangehotel.com/covid-19/ |
Responsibilities:
You will contribute to the development of the existing iOS app, as well as build from the ground up new apps which will complement the ecosystem.
You will get the chance to come up with great ideas to extract and deliver meaningful information to the Bitdefender Cloud.
You will work in an Agile Scrum environment, interacting with the Product Owner, Scrum Master, with UX designers, QA engineers and other developers.
You will have to continuously discover, evaluate and implement new ways to maximize the efficiency and accuracy of the technology.
Qualifications:
We’re looking for a creative-minded person who is passionate about technology. This will help you get up to speed fast with our ecosystem and successfully surpass challenges.
We’re looking for a person with initiative, who is eager to solve problems ranging from straightforward and well known to more complex and open-ended. All of the above with respect to the standards of quality, speed and stability Bitdefender proudly promotes.
Ideally, you should:
- have a strong logical and algorithmic thinking;
- be passionate about software and new technologies;
- be willing to learn and work with a team.
It would be a plus:
- if you showcased to us what previous projects / apps you have worked on so far;
- experience with Android SDK, JAVA;
- experience with web service integration (REST, JSON, XML).
Benefits:
We offer you an exciting work environment, benefits well scaled to your performance and lots of opportunities for professional growth. | https://stagiipebune.ro/stagii/ios-junior-software-developer/ |
Refer to the Moderator Analysis page for details on how to interpret.
If you entered a score in the ‘Moderator’ column of the Input sheet, then a weighted regression will be run with ‘Moderator’ as a predictor of the effect size of a study. In Meta-Essentials, it is not possible to run a multivariate regression analysis, so only one moderator can be assessed at a time. You can access the Moderator Analysis sheet by clicking on the regarding tab, as shown in Figure 14.
On the left of the sheet (displayed in Figure 15), the user can choose between a ‘fixed effect’ model and a ’random effects’ model. The user can also set the confidence level. As in other sheets, the random effects model is set as default. Also a table is provided with some essential statistics per study.
The most important result of this regression is the coefficient (B) of the slope (see red rectangle in Figure 16), which is an estimate of the association between the moderator and a study’s effect size. This is also visualized in the plot (also shown in Figure 16), where the effect sizes of the studies are plotted against their moderator values and a regression line through these points. Note that the size of the dots represents their relative weight. However, since in the example all studies receive about the same weight, the dot sizes appear to be equal.
The moderator analysis also provides an analysis of variance (ANOVA). The sums of squares depend on the choice between a fixed effect (Q) and random effects model (Q*). The sum of squares of the model (Q or Q*) can be used to test whether effect sizes vary with the moderator. I.e., to test whether the effect sizes are the same for different values of the moderator. | http://www.erim.eur.nl/research-facilities/meta-essentials/user-manual/work-with-the-workbooks/moderator-analysis-sheet/ |
The invention relates to an emitter device for an optical detection apparatus of a motor vehicle, which is configured in order to scan a surrounding region of the motor vehicle by means of a light beam, and which comprises a light source for emitting the light beam and a guiding unit, the guiding unit being configured in order to guide the light beam emitted onto the guiding unit by the light source into the surrounding region at different scanning angles. The invention furthermore relates to an optical detection apparatus for a motor vehicle, to a motor vehicle having at least one such optical detection apparatus and to a method.
In the present case, the interest is on optical detection apparatuses for motor vehicles, in particular on laser scanners. In this case, it is known to monitor a surrounding region of the motor vehicle by means of the optical detection apparatus. By means of the detection apparatus, objects in the surrounding region of the motor vehicle can be detected and information about the detected objects, for example a relative position of the objects with respect to the motor vehicle, can be provided to a driver assistance system of the motor vehicle. On the basis of this information, the driver assistance system may for example initiate measures to avoid a collision of the motor vehicle with the object, for example automatically brake the motor vehicle before the collision.
In laser scanners according to the prior art, a light beam, for example a laser beam, is conventionally emitted into the surrounding region by a light source of an emitter device of the laser scanner, for example of a laser diode, and the surrounding region is scanned by varying a scanning angle, or a scanning direction along which the light beam is guided. As soon as the light beam strikes an object in the surrounding region, at least a part of the light beam is reflected at the object back to the laser scanner. A receiver device of the laser scanner receives the reflected part of the light beam and, with the aid of a time of flight of the light beam or a time period between the emission of the light beam and the reception of the reflected part of the light beam, determines a distance of the object from the vehicle. With knowledge of the scanning angle during emission of the light beam, it is furthermore possible to determine an orientation or direction of the object with respect to the motor vehicle. The relative position of the object with respect to the motor vehicle can then be determined from the orientation and the distance.
In order to vary the scanning angle, the light beam is conventionally guided by a guiding unit of the emitter device. The guiding unit is in this case generally configured as a rotatable or tiltable mirror, which reflects the light beam in the different scanning directions, the scanning direction being adjusted by means of a tilt angle, or an orientation, of the tiltable mirror. An angle range in the surrounding region, within which the light beam is guided into the surrounding region, then forms a field of view of the emitter device. This field of view should ideally have a particularly large aperture angle and a particular setpoint shape. In order to increase the aperture angle, there is therefore conventionally an angle between the light beam striking the mirror and the light beam reflected by the mirror, i.e. the scanning direction. The effect of this can be that an actual shape of the field of view deviates from the setpoint shape of the field of view, i.e. the field of view of the emitter device is distorted. Although minor distortions can be compensated for on the software side by not using particular regions of the field of view, the optical detection apparatus according to the prior art has a low efficiency and high losses since these regions still continue to be illuminated by the light beam.
It is an object of the present invention to provide a solution to how an optical detection apparatus for a motor vehicle can be configured particularly efficiently and with low losses.
This object is achieved according to the invention by an emitter device, an optical detection apparatus, a motor vehicle and a method according to the respective independent patent claims. Advantageous embodiments of the invention are the subject matter of the dependent patent claims, the description and the figures.
According to one embodiment of an emitter device according to the invention for an optical detection apparatus of a motor vehicle, this emitter device is configured in order to scan a surrounding region of the motor vehicle by means of a light beam. The emitter device may comprise a light source for emitting the light beam and a guiding unit, the guiding unit being configured in order to guide the light beam emitted onto the guiding unit by the light source into the surrounding region at different scanning angles. In particular, the light source for emitting the light beam comprises at least two separately driveable emitter elements, which are configured in order to emit the light beam onto the guiding unit at angles of incidence corresponding to predetermined setpoint values of the scanning angle in order to generate a predetermined setpoint field of view of the emitter device.
Preferably, an emitter device according to the invention for an optical detection apparatus of a motor vehicle is configured in order to scan a surrounding region of the motor vehicle by means of a light beam. The emitter device comprises a light source for emitting the light beam and a guiding unit, the guiding unit being configured in order to guide the light beam emitted onto the guiding unit by the light source into the surrounding region at different scanning angles. The light source for emitting the light beam furthermore comprises at least two separately driveable emitter elements, which are configured in order to emit the light beam onto the guiding unit at angles of incidence corresponding to predetermined setpoint values of the scanning angle in order to generate a predetermined setpoint field of view of the emitter device.
By means of the optical detection apparatus, which is in particular configured as a Lidar system (Lidar—“Light Detection and Ranging”) or as a laser scanner, the surrounding region of the motor vehicle can be monitored, for example by detecting objects or obstacles for the motor vehicle in the surrounding region. To this end, the optical detection apparatus comprises the emitter device, which comprises the light source for generating the light beam, in particular a laser beam. The guiding unit guides the light beam in order to provide a scanning movement at the different scanning angles. This means that, in order to scan the surrounding region, the light beam is emitted successively, or sequentially, by the emitter device in different scanning directions. In other words, this means that the scanning angle at which the light beam is emitted into the surrounding region is varied stepwise. During a first measurement, or at a first measurement instant, the light beam is guided in a first scanning direction, during a subsequent second measurement, or at a subsequent second measurement instant, the light beam is guided in a second scanning direction, etc. By the guiding of the light beam at the different scanning angles, an angle range in the surrounding region of the motor vehicle is illuminated which forms the field of view of the emitter device, in particular the field of view of the optical detection apparatus. The scanning angle may in this case be specified as an angle by which the scanning direction deviates horizontally and/or vertically from a predetermined direction, for example a longitudinal direction of the motor vehicle. By means of the guiding unit, the light beam can in particular be guided horizontally and vertically, so that the surrounding region is scanned or swept in a grid fashion, i.e. in rows or in columns. The guiding unit may for example comprise a tiltable mirror, in particular a micromirror actuator, having a planar, flat reflective surface.
In order now to generate the predetermined setpoint field of view, which has a predetermined setpoint shape, for the various scanning angles setpoint values, i.e. setpoint scanning angles, are predetermined. Preferably, a plane of the setpoint field of view generated by means of the setpoint values for the scanning angle perpendicularly to a principal scanning direction of the emitter device is shaped rectangularly. The setpoint field of view extends starting from the emitter device along the principal scanning direction and has a pyramidal shape. This means that all planes parallel to a base face of the pyramid are configured rectangularly. In order to provide the setpoint values for the scanning angle, the light source comprises the at least two separately driveable emitter elements. The emitter elements may, for example, be configured as LEDs or laser diodes. The emitter elements may in this case respectively generate a light beam, or laser beam, the light beams being emitted in different directions as a function of the emitter element generating the light beam, and therefore striking the guiding unit at different angles of incidence. A first direction of the light beam onto the guiding unit is assigned a first angle of incidence, a second direction is assigned a second angle of incidence, etc. The scanning direction along which the guiding unit guides the light beam can be influenced by the angles of incidence.
The invention is based in this case on the discovery that, for example in the case of a guiding unit having a tiltable mirror comprising the flat reflective surface, the field of view of the emitter device may be distorted by the tiltable mirror, in particular by the angle between the conventionally fixed incidence direction onto the tiltable mirror and the scanning direction, since the actual values of the scanning angle which are provided by the planar surface do not correspond to the setpoint values. An actual shape of the field of view therefore deviates from the setpoint shape. Such a distorted actual shape may, for example, be formed by a fan-shaped plane of the field of view perpendicularly to the principal scanning direction. This distortion can be prevented or compensated for by the two separately driveable emitter elements, by the angle of incidence onto the guiding unit being adapted to the setpoint value to be generated for the scanning angle. In other words, the angle of incidence is selected in such a way that, after the guiding of the light beam, the latter is emitted at the respective setpoint value for the scanning angle.
By the light source with the separately driveable emitter elements, it is thus possible to ensure that the illuminated angle range can be fully utilized, and objects in this region can be detected securely and reliably. By means of the emitter device, a particularly efficient and low-loss optical detection apparatus for a motor vehicle can thus be produced.
Preferably, the emitter device comprises a control unit, which is configured in order to drive at least a first of the emitter elements to emit the light beam for setpoint values of the scanning angle from a first value range, and in order to drive at least a second of the emitter elements to emit the light beam for setpoint values of the scanning angle from a second value range. Each value range in this case comprises at least one setpoint value for the scanning angle. By the at least one currently active emitter element, the angle of incidence of the light beam onto the guiding unit can thus be influenced and a deviation between the setpoint value and the actual value of the guiding angle, induced by the tiltable mirror, can therefore already be at least reduced during emission of the light beam.
Preferably, the light source in this case comprises a matrix arrangement of separately driveable emitter elements. The light source thus comprises an array of emitter elements, for example laser diodes, which are for example arranged in rows or in columns on a carrier. Each emitter element is in this case, in particular, addressable by means of the row in which the emitter element is located and by means of the column in which the emitter element is located, and driveable in order to generate the light beam with the currently required angle of incidence.
In particular, each setpoint value for the scanning angle is assigned a particular number of emitter elements, which have a particular position in the matrix arrangement. This means that a plurality of emitter elements are driven in order to generate the light beam with the required angle of incidence. The respective emitter elements, which are driven in order to generate the angle of incidence corresponding to the current setpoint value for the scanning angle for the emission, are in this case in particular arranged adjacently, so that each setpoint value for the angle of incidence is assigned an active region, corresponding thereto, of the matrix arrangement. The active regions in this case have, in particular, an unequal arrangement of emitter elements. A drive strategy for the emitter elements, comprising a number and position, associated with the respective setpoint values for the scanning angle, of the emitter elements, may for example be predetermined and stored for the control unit. By the matrix arrangement with the separately, or individually, driveable emitter elements, the light beam having the angle of incidence corresponding to the current setpoint value for the scanning angle can be generated with a high accuracy.
In one refinement of the invention, the guiding unit comprises a tiltable mirror, which is configured in order to guide the light beam emitted by the respective emitter element at the setpoint value for the scanning angle which corresponds to the respective angle of incidence. The tiltable mirror is, in particular, configured as a micromirror actuator, or MEMS mirror (MEMS—Microelectromechanical System), which comprises a flat, planar reflective surface. The tiltable mirror is thus arranged in an optical path, or emission path, in such a way that the light beam emitted by the light source at a particular angle of incidence is reflected at the tiltable mirror into the surrounding region, and in this case is reflected into the surrounding region with the setpoint value, corresponding to the angle of incidence, for the scanning angle.
In this case, in particular, the angles of incidence of the light beam, which are provided by the emitter elements, are predetermined as a function of tilt angles of the tiltable mirror. In order to generate the scanning movement, the tiltable mirror is successively oriented along a different direction, by varying the tilt angle stepwise. This tiltable mirror reflects the light beam as a function of the current tilt angle, or of a current position of the tiltable mirror, conventionally along particular actual values for the scanning angle. In this case, particularly beyond a particular size of the setpoint values of the scanning angle, the actual value provided by the tiltable mirror may deviate from the setpoint value. Without compensation for this deviation, an actual field of view of the emitter device is obtained which is distorted relative to the setpoint field of view. This distortion may, however, advantageously be compensated for by means of the separately, or individually, driveable emitter elements, by the setpoint value for the scanning angle being adjusted by means of the angle of incidence of the light beam onto the tiltable mirror.
In particular, the tiltable mirror has a characteristic transfer function, by which a distortion of an actual field of view generated by the tiltable mirror with respect to the setpoint field of view is described as a function of the tilt angles of the tiltable mirror, wherein the emitter elements for providing the respective angle of incidence of the light beam are arranged in such a way that an inverse of the characteristic transfer function is provided by the angle of incidence. The distortion is in this case determined with the aid of a deviation of shapes of planes of the actual field of view and of the setpoint field of view perpendicularly to a principal scanning direction of the emitter device.
In order to determine the drive strategy, i.e. in order to determine which emitter element or which emitter elements per measurement is or are driven to emit the light beam, the transfer function of the tiltable mirror is initially determined. To this end, for example, the uncompensated actual field of view generated by the emitter device with only one emitter element may be recorded, or determined. In particular, in this case the shape of the plane of the actual field of view perpendicularly to the principal scanning direction of the emitter device is determined. The plane of the actual field of view generated by the tiltable mirror is conventionally fan-shaped, while conversely the plane of the setpoint field of view is rectangular. This relation between the shape of the setpoint field of view and the shape of the actual field of view may be described by means of the transfer function, which in particular is dependent on the tilt angles of the tiltable mirror. As the transfer function, in particular that function by which the setpoint shape of the field of view is converted into the actual shape of the field of view is thus determined. In other words, the setpoint shape of the field of view, to which the transfer function is applied, gives the actual shape of the field of view. With knowledge of the transfer function, the drive strategy may be determined in such a way that the transfer function is inverted by the respective angles of incidence and the distortion is consequently compensated for. The actual shape of the field of view, to which the inverse transfer function is applied, thus gives the setpoint shape of the field of view. By determination of the transfer function and of the inverse transfer function, the drive strategy for the light source can thus advantageously be adapted ideally to the tiltable mirror and the setpoint field of view can consequently be generated.
In one advantageous embodiment of the invention, the guiding unit additionally comprises a freeform mirror having a reflective freeform face for reflecting the light beam reflected by the tiltable mirror, the freeform mirror being configured in order to compensate for a deviation of an actual value for the scanning angle, generated by the tiltable mirror, from the setpoint value for the scanning angle. This means that, in addition to the tiltable mirror, the guiding unit comprises the freeform mirror, which in particular is arranged statically in the guiding unit. According to this embodiment, the guiding unit thus comprises the tiltable mirror and the freeform mirror, the light beam being emitted by the light source at the respective angle of incidence first onto the tiltable mirror. This tiltable mirror reflects the light beam as a function of the current tilt angle, or of a current position of the tiltable mirror, at particular actual values for the scanning angle, which may deviate from the setpoint values despite the adapted angles of incidence. This means that, for example, the deviation cannot be fully compensated for by the provision of the different angles of incidence.
This deviation, however, may advantageously be compensated for fully by means of the freeform mirror. The freeform mirror is in this case installed in a fixed manner, or statically, in the emitter device, i.e. nonrotatably or nontiltably, and comprises in particular at least two surface elements with different angles of inclination. One surface of the freeform mirror is in particular curved at least in regions. The freeform mirror may modify an orientation of the light beam for those actual values of the scanning angle which deviate from the associated setpoint values. The freeform mirror then reflects the light beam into the surrounding region. The freeform mirror may thus advantageously likewise contribute to undistorting the field of view of the emitter device. Provision of the freeform mirror is particularly advantageous when the field of view distorted by the tiltable mirror cannot be undistorted only by means of the drive strategy of the light source.
As an alternative or in addition, in order to provide the setpoint values for the scanning angle, the emitter device may additionally comprise a lens element having a freeform face for transmitting the light beam guided by the guiding unit into the surrounding region, the lens element being configured in order to compensate for a deviation of the actual value, generated by the guiding unit, from the setpoint value for the scanning angle. This means that the emitter device additionally comprises the lens element having the freeform face, i.e. a freeform lens, which is, arranged in an optical path between the guiding unit and the surrounding region. This means that, before emission into the surrounding region, the light beam reflected by the guiding unit passes through the lens element, which is optically transparent for the light beam reflected by the guiding unit. The lens element in this case comprises a freeform face, the surface elements of which have different angles of inclination and by which the orientation of the light beam, i.e. the scanning angle, can be adjusted. The freeform lens, the surface of which is in particular curved at least in regions, can modify the value of the scanning angle during transmission, if the actual value does not correspond to the setpoint value for the scanning angle. This may, for example, happen when the deviation between the actual values and the setpoint values cannot fully be compensated for by the drive strategy of the light source and/or by the freeform mirror. By means of the freeform lens, the field of view of the emitter device can thus likewise advantageously be undistorted.
In particular, angles of inclination of surface elements of the freeform face of the freeform mirror and/or of the lens element, corresponding to the setpoint values for the scanning angle, are predetermined, each setpoint value for the scanning angle being assigned a surface element for guiding the light beam at the respective setpoint value for the scanning angle. In the case of the freeform mirror, the angles of inclination of the surface elements are selected in such a way that the incident light beam is reflected at the respective setpoint scanning angle corresponding to the current measurement. This means that, in order to generate a particular setpoint value for the scanning angle, i.e. in order to guide the light beam along the predetermined setpoint scanning direction, the light beam is reflected at that surface element by whose angle of inclination the light beam can be guided in the corresponding setpoint scanning direction. In the case of the lens element, or of the freeform lens, each setpoint value for the scanning angle is assigned a surface element of the freeform face for transmitting the light beam at the respective setpoint value for the scanning angle. In other words, in order to provide a particular setpoint scanning angle, the light beam emitted by the light source is transmitted through the associated surface element. By the freeform face, it is thus likewise possible to ensure that the illuminated angle range can be fully utilized, and objects in this region can be detected securely and reliably.
The invention furthermore relates to an optical detection apparatus, in particular a laser scanner, for a motor vehicle, for monitoring a surrounding region of the motor vehicle, having an emitter device according to the invention, or one embodiment of the emitter device according to the invention, and a receiver device. The receiver device is configured in order to receive a part of the light beam, reflected at an object in the surrounding region, and in order to determine a distance of the object from the motor vehicle with the aid of a time period between the emission of the light beam and the reception of the reflected part of the light beam.
A motor vehicle according to the invention comprises at least one optical detection apparatus. The motor vehicle is, in particular, configured as a car. The distance, detected by the detection apparatus, of the object may, for example, be provided to a control device of a driver assistance system of the motor vehicle, which for example allows at least semiautonomous driving of the motor vehicle. For example, the motor vehicle may be braked automatically by the control device when it has been detected by the detection device that the distance of the object from the motor vehicle falls below a predetermined distance threshold value.
The invention furthermore relates to a method for generating a setpoint field of view for an emitter device of an optical detection apparatus of a motor vehicle. According to one embodiment of the method, a light source for emitting the light beam and a guiding unit are provided for the emitter device, a light beam emitted onto the guiding unit by the light source being able to be guided at different scanning angles by means of the guiding unit. In particular, at least two separately driveable emitter elements for emitting the light beam are provided for the light source, the emitter elements emitting the light beam onto the guiding unit at angles of incidence corresponding to predetermined setpoint values of the scanning angle in order to generate a predetermined setpoint field of view of the emitter device.
In the method, a light source for emitting the light beam and a guiding unit are preferably provided for the emitter device, a light beam emitted onto the guiding unit by the light source being guided along different scanning angles by means of the guiding unit. Furthermore, at least two separately driveable emitter elements for emitting the light beam are provided for the light source, the emitter elements emitting the light beam onto the guiding unit at angles of incidence corresponding to predetermined setpoint values of the scanning angle in order to generate a predetermined setpoint field of view of the emitter device.
In particular, the emitter device is manufactured with a guiding unit comprising a tiltable mirror and the freeform mirror. In order to determine a drive strategy which specifies those emitter elements that are driven per measurement in order to generate the setpoint field of view, a transfer function for the tiltable mirror is determined, which describes a deviation of a shape of an actual field of view of the emitter device from a shape of the setpoint field of view. The emitter elements, which can generate the light beam with the angle of incidence associated with the current setpoint value, are in this case driven in such a way that an inverse of the transfer function is provided by them.
The preferred embodiments presented above with reference to the emitter device according to the invention, and their advantages, apply correspondingly for the optical detection apparatus according to the invention, the motor vehicle according to the invention and for the method according to the invention.
In the figures, elements which are the same and functionally equivalent are provided with the same references.
FIG. 1
1
1
1
2
1
1
2
3
4
1
3
4
1
5
2
5
1
2
3
3
6
1
4
1
3
7
1
4
1
3
1
shows a motor vehicle according to the present invention. In the present case, the motor vehicle is configured as a car. The motor vehicle comprises a driver assistance system , which is configured in order to assist a driver of the motor vehicle during driving of the motor vehicle . The driver assistance system comprises at least one optical detection apparatus , which is configured in order to monitor a surrounding region of the motor vehicle . In particular, by means of the detection apparatus a distance and an orientation of an object O in the surrounding region of the motor vehicle can be recorded, and for example provided to a control device of the driver assistance system . The control device may, for example, automatically brake the motor vehicle for collision avoidance, if the distance of the object O falls below a predetermined threshold value. In the present case, the driver assistance system comprises two detection apparatuses , a first detection apparatus being arranged in a front region of the motor vehicle and being used to monitor the surrounding region in front of the motor vehicle , and a second detection apparatus being arranged in a rear region of the motor vehicle and being used to monitor the surrounding region behind the motor vehicle . Further detection apparatuses may also be provided, for example in side regions of the motor vehicle .
3
8
9
10
4
9
11
10
9
10
11
10
10
4
10
8
1
12
4
10
8
FIG. 1
The optical detection apparatus is in the present case configured as a laser scanner and comprises an emitter device as well as a receiver device . The emitter device emits a light beam into the surrounding region , and the receiver device receives a part , reflected at the object O, of the light beam . The receiver device may record the distance of the object O with the aid of a time of flight between the emission of the light beam and the reception of the reflected part of the light beam . The light beam is in this case emitted successively, or stepwise, at various scanning angles α. In this way, the surrounding region is scanned in a grid fashion by means of the light beam . According to , horizontal components of the scanning angle α are shown in a horizontal plane spanned by a longitudinal direction L of the vehicle and a transverse direction Q of the vehicle. The horizontal component of the scanning angle α and a vertical component (not shown here) of the scanning angle α in a plane spanned by the longitudinal direction L of the vehicle and a vertical direction of the vehicle are known to the emitter device , so that an orientation, or direction, of the object O relative to the motor vehicle is also known. An angle range in the surrounding region , which is illuminated by means of the light beam oriented in different scanning directions, forms a field of view of the emitter device .
FIG. 2
8
8
13
10
8
14
10
10
15
18
18
10
4
10
shows an emitter device ′ according to the prior art. The emitter device ′ comprises a light source ′, which is configured in order to emit the light beam . Furthermore, the emitter device ′ comprises a collimator which collimates the light beam . The collimated light beam is emitted onto a guiding unit ′ consisting of a tiltable mirror , which in this case is configured as a micromirror actuator, or MEMS mirror. The tiltable mirror is used in order to guide the light beam into the surrounding region at the different scanning angles α. In order to generate the field of view, which has a particularly large aperture angle, for example 150°, there is an angle difference β between an incidence direction of the light beam , which in this case is oriented along the z direction, and the scanning direction, which in this case is oriented along the y direction: the angle β is in this case for example 90°.
8
16
16
17
3
2
1
0
1
2
3
17
3
2
1
0
1
2
3
10
3
3
10
3
3
15
3
3
17
16
17
3
3
16
16
16
16
FIG. 3
FIG. 3
FIG. 4
The emitter device ′ according to the prior art results in an actual field of view ′ which is shown in . The actual field of view ′ has an actual shape P′ and in the present case is configured in a fan shape. In , illumination strips for various setpoint values −α, −α, −α, α, +α, +α, +α of the scanning angle α are in this case shown. Each illumination strip characterizes an actual value −α′, −α′, −α′, α′, +α′, +α′, +α′ of the scanning angle α, which corresponds to a column illuminated by the light beam on a target face (Target) at a respective measurement instant, each measurement instant being assigned a setpoint value −α to +α for the scanning angle α, at which the light beam is intended to be emitted at this measurement instant. Ideally, i.e. when the actual values −α′ to +α′ provided by the guiding unit ′ in fact correspond to the setpoint values −α to +α, the illumination strips are oriented perpendicularly, so that a setpoint field of view with a rectangular setpoint shape P (see ) is formed. However, it can be seen that particularly the outer illumination strips at the scanning angles −α and +α, which form edges of the field of view ′, are not oriented perpendicularly, so that the fan-shaped actual field of view ′ is distorted relative to the setpoint field of view . With an increasing scanning angle α, the distortion of the field of view ′ thus also increases.
FIG. 4
16
16
16
16
16
16
3
3
3
3
18
shows a relation between the setpoint shape P of the setpoint field of view and the actual shape P′ of the actual field of view ′. In this case, the actual shape P′ of the actual field of view ′ is coupled by means of a transfer function TF with the setpoint shape P of the setpoint field of view according to the formula P*TF=P′. The transfer function TF in this case describes the distortion of the actual field of view ′ with respect to the setpoint field of view , or the deviation of the actual values −α′ to +α′ of the scanning angle α from the setpoint values −α to +α of the scanning angle α, which is caused by the tiltable mirror .
16
16
8
3
8
13
13
13
13
13
10
10
13
13
15
1
2
1
2
3
3
10
1
2
3
3
3
3
15
3
3
FIG. 5
a,
b.
a,
b
a,
b
In order now to convert the actual field of view ′ into the setpoint field of view , an inverse transfer function RTF is determined, so that the formula P*(TF*RTF)=P, or P′*RTF=P, applies. In order to provide the inverse transfer function RTF, an emitter device as shown in is provided for the optical detection apparatus . The emitter device in this case has a light source , which comprises at least two emitter elements The emitter elements are for example laser diodes or LEDs, and can be driven separately, for example by a control unit S, to emit the light beam . The light beams emitted by the emitter elements in this case have different directions, so that they strike the guiding unit at different angles of incidence γ, γ. Each angle of incidence γ, γ is in this case assigned one of the setpoint values −α to +α for the scanning angle α, so that the guiding unit can reflect the light beam incident at the respective angle of incidence γ, γ at the associated setpoint values −α to +α for the scanning angle α, and can therefore compensate for the deviation between the actual values −α′ to +α′, generated by the guiding unit , of the scanning angle α and the setpoint values −α to +α of the scanning angle α.
8
19
15
18
20
10
13
18
10
19
19
10
20
21
19
20
10
4
1
16
16
1
2
10
13
13
21
21
21
20
22
22
23
23
23
19
24
24
22
22
24
24
3
3
21
21
20
10
3
3
24
24
19
10
3
3
24
24
10
21
21
21
23
22
22
24
24
21
21
23
23
21
23
22
22
24
24
21
21
23
23
18
3
3
a,
b.
a,
b
a,
b,
a,
b
a,
b.
a,
b,
a,
b
a,
b
a,
b
a,
b
a,
b.
a,
b,
a,
b
a,
a,
b
a,
b,
a,
b
a,
b,
a,
b
Furthermore, the emitter device in this case comprises a freeform mirror , which is arranged in the guiding unit in addition to the tiltable mirror , as well as a lens element . The light beam generated by the light source is initially emitted onto the tiltable mirror , which reflects the light beam onto the freeform mirror . The freeform mirror is configured in order to reflect the light beam onto the lens element , which comprises a freeform face . The freeform mirror and the lens element are configured in order to orientate the light beam into the surrounding region of the motor vehicle in such a way that a deviation between the setpoint field of view and the actual field of view ′ can be fully compensated for, if this deviation cannot be compensated for by the angles of incidence γ, γ of the light beam emitted by the respective emitter elements To this end, surface elements of the freeform face of the freeform lens have different angles of inclination or different inclination directions. Surface elements of a reflective freeform face of the freeform mirror also have different angles of inclination In this case, each angle of inclination may be assigned a setpoint value −α to +α for the scanning angle α, so that the respective surface element of the lens element transmits the light beam at the assigned setpoint values −α to +α for the scanning angle α and/or the respective surface element of the freeform mirror reflects the light beam at the assigned setpoint values −α to +α for the scanning angle α. The surface elements may thus modify a direction of the light beam incident on the respective surface element The freeform face , has the inverse transfer function RTF. In other words, the inverse transfer function RTF is produced by means of the angles of inclination of the surface elements b, of the freeform face , . The angles of inclination of the surface elements are determined as a function of the tilt angles of the tiltable mirror , and therefore as a function of the setpoint values −α to +α, respectively to be provided, of the scanning angle α.
FIG. 5
10
13
13
1
2
3
3
18
10
19
3
3
18
3
3
10
23
23
3
3
10
20
10
3
3
19
3
3
10
21
21
20
3
3
a,
b
a,
b
a,
b
According to , the light beam is thus initially emitted by at least one of the emitter elements at an angle of incidence γ, γ corresponding to the current setpoint value −α to +α for the scanning angle α onto the tiltable mirror , which reflects the light beam onto the freeform mirror . In the case of an existing deviation between the actual values −α′ to +α′ provided by the tiltable mirror and the setpoint values −α to +α of the scanning angle α, this may at least reduce the deviation by the light beam being reflected at that surface element which is assigned to the respective setpoint value −α to +α of the scanning angle α. The light beam is in this case reflected onto the lens element , which may modify the orientation of the light beam during transmission, if, as before, there is a deviation between the actual values −α′ to +α′ provided by the freeform mirror and the setpoint values −α to +α of the scanning angle α. To this end, the light beam is transmitted by that surface element of the freeform lens which corresponds to the current setpoint value −α to +α of the scanning angle α.
FIG. 6
3
3
25
8
9
26
25
4
3
1
20
21
10
8
25
20
4
11
4
10
4
9
25
25
27
28
29
3
1
shows an embodiment of the optical detection apparatus configured as a laser scanner. The optical detection apparatus comprises a housing , which encloses the emitter device and the receiver device . A front side of the housing , facing toward the surrounding region in the installed state of the optical detection apparatus on the motor vehicle , is in this case formed by the lens element with the freeform face . The light beam is thus in this case transmitted by the emitter device , arranged in an interior of the housing , through the freeform lens into the surrounding region and the part , reflected in the surrounding region , of the light beam is transmitted from the surrounding region to the receiver device arranged in the interior of the housing . The housing in this case furthermore comprises, in a side region , electrical connection elements as well as fastening elements for fastening the optical detection apparatus on the motor vehicle .
FIG. 7
FIG. 8
FIG. 8
13
13
13
30
30
13
13
32
33
31
13
33
32
34
35
13
13
33
32
13
13
13
13
10
13
13
10
13
13
36
10
13
13
37
36
3
3
3
3
13
13
10
a,
b
a,
b
a,
b
a,
b
a,
b
a,
b
a,
b
a,
b
a,
b
shows an embodiment of the light source , in which the emitter elements are arranged in a matrix arrangement . The matrix arrangement , in which the emitter elements are arranged in columns and rows , is arranged on a carrier of the light source . In , it can be seen that each row and each column is connected by means of a connecting element , for example a bond wire, to a contacting element , for example a solder pad, so that each emitter element can be addressed separately, or individually, by means of the respective row and the respective column in which the emitter element is located. The addressed emitter element then emits the light beam . In this case, driving can be carried out on a plurality of emitter elements to emit the light beam . In , it is shown that the emitter elements of a region emit the light beam , i.e. are active, whereas by contrast the emitter elements of a region are inactive. The region may, for example, be active whenever a particular setpoint value −α to +α of the scanning angle α or a setpoint value −α to +α of the scanning angle α is intended to be generated from a particular value range. A drive strategy, as to when which emitter elements are driven, or activated, to emit the light beam , may for example be predetermined as a function of the transfer function TF and stored for the control unit S.
Other features of the invention may be found in the claims, the figures and the description of the figures. The features and feature combinations mentioned above in the description, as well as the features and feature combinations mentioned below in the description of the figures and/or only shown in the figures may be used not only in the combination respectively indicated, but also in other combinations or separately, without departing from the scope of the invention. Therefore, embodiments of the invention which are not explicitly shown in the figures and explained, but derive and may be produced by separate feature combinations from the embodiments explained, are therefore also to be regarded as included and disclosed. Embodiments and feature combinations which consequently do not have all features of an originally formulated independent claim are also to be regarded as disclosed. Furthermore, embodiments and feature combinations, in particular through the embodiments explained above, which extend beyond or differ from the feature combinations explained in the back-references of the claims, are to be regarded as disclosed.
FIG. 1
shows a schematic representation of one embodiment of a motor vehicle according to the invention;
FIG. 2
shows a schematic representation of an emitter device of an optical detection apparatus according to the prior art;
FIG. 3
FIG. 2
shows a schematic representation of an actual field of view of the emitter device according to ;
FIG. 4
FIG. 3
shows a schematic representation of a relation between the actual field of view according to and a setpoint field of view;
FIG. 5
shows a schematic representation of one embodiment of an emitter device according to the invention for an optical detection apparatus;
FIG. 6
shows a schematic representation of one embodiment of an optical detection apparatus according to the invention;
FIG. 7
shows a schematic representation of one embodiment of a light source of the emitter device; and
FIG. 8
FIG. 7
shows a schematic representation of the light source according to during the emission of a light beam. | |
We previously reported that nonsteroidal anti-inflammatory drugs (NSAIDs) induced small intestinal damage through nucleotide-binding oligomerization domain-like receptor family pyrin domain-containing 3 (NLRP3) inflammasome-dependent interleukin-1β secretion in mice. Our further study demonstrated that colchicine, a therapeutic agent for gout, significantly suppressed NSAID-induced small intestinal damage by inhibiting NLRP3 inflammasome activation in mice. However, clinical efficacy of colchicine for NSAID-induced small intestinal damage has not been established.
We examined the clinical efficacy of colchicine in patients with NSAID-induced severe small intestinal damage as an animal-to-human translational research.
This is a single-center, single-arm, prospective pilot study. From February 2017 to March 2019, we performed video capsule endoscopy (VCE) to screen 10 patients who took NSAIDs continuously for more than 3 months, and 7 of those with severe small intestinal damage were enrolled. Participants were treated with oral colchicine 0.5 mg twice daily for 8 weeks and thereafter followed up with blood tests and VCE.
After 8 weeks of colchicine treatment, complete healing was achieved in 4 patients (57.1%), and the median number of small erosions decreased significantly from 7.0 (range, 5.0-10.5) to 0.0 (range, 0.0-2.3) (p = 0.031). One patient withdrew due to diarrhea, and 5 patients revealed slightly elevated liver enzymes during the study. No other adverse events including changes in blood tests and clinical symptoms were observed.
Colchicine treatment achieved a high rate of complete healing in patients with NSAID-induced severe small intestinal damage.
© 2020 S. Karger AG, Basel. | https://www.physiciansweekly.com/effects-of-colchicine-on-nsaid-induced-severe-small-intestinal-damage-a-pilot-study/ |
While many of the personal injury claims made by cyclists often involve an accident with a vehicle, pushbike riders are not solely at risk from motorists. A collision with a vehicle can be one of the most dangerous types of accident for a cyclist, though they should also take care around other cyclists.
The NSW Police Force restated the need for more care between riders after an accident left a cyclist lying injured on a motorway.
On Friday 3 July at approximately 6.20 a.m., a male cyclist collided with another pushbike rider while travelling eastbound on the M2 Motorway. The man is thought to have made contact with the bike in front of him and he fell onto a lane of the motorway.
Injured and unable to move out of the way of the early morning traffic, the 55-year-old man was assisted by a truck driver, who parked his vehicle to block oncoming vehicles and provided assistance until an ambulance arrived.
After being found to have suffered a concussion and lacerations to his head, arms and legs, the cyclist was taken to the Royal North Shore Hospital in a stable condition.
Police advise cyclists to take care
Following the incident, the NSW Police Force published a media release with information for cyclists on how to minimise the risk of accidents when out on a pushbike.
These tips included:
- Understanding that cyclists are allowed to ride two abreast on roads
- Being aware of the speed other cyclists can travel at and avoiding cutting them off
- Obeying the general rules of the road
- Giving clear hand signals
- Wearing bright, light or reflective clothing and using lights when cycling in the dark
Acting Assistant Commissioner Stuart Smith of the Traffic and Highway Patrol Command added that the risk of an accident cannot be removed entirely, and noted that cyclists are often prone to injury following a collision.
“This type of incident can happen at any time, and cyclists are more difficult to see than cars or trucks – especially at night, and they are more vulnerable to injury because they are less protected than car or truck occupants,” he explained.
What to do if you’ve been in a cycle accident
Although the police are not taking any further action with the aforementioned incident, the case outlines the level of vigilance that riders should have when cycling around New South Wales.
Cyclists in the state are not required to hold a licence or registration, so a pedestrian or other rider injured by cyclist will have to pay for their own medical fees and the subsequent costs associated with any downtime/illness.
This is contrary to cyclists or pedestrians who are injured by a motorist, with injury compensation supported by the motor vehicle accidents act and experienced injury lawyer across the state.
To learn more, speak to an expert at a PK Simpson office near you, or call (02) 9299 1424.
“A CYCLIST in her 30s is in a critical condition after a collision with a ute at the bottom of a steep road.” #Sydney
— PK Simpson InjuryLaw (@PK_SimpsonAU) November 15, 2017
Frequently Asked Questions
A: In a carpark, anyone driving in the lanes has the right of way, so if you’re the one pulling out of the car space and hit another motor vehicle, you are likely to be the majority at fault in the accident. However, since both cars are moving, both drivers might hold some responsibility. But if you hit a parked car, you are likely at fault.
A: The length of time you have to make your claim depends on the jurisdiction.
For instance:
- TPD claims – these may be commenced up to 10 years after you’ve stopped work. TPD claims are very technical and you may have more than one TPD claim.
- Car accident claims – A personal injury claim form should be filled in and sent to your CTP insurer as early as possible, but must be no later than six months from the date of your accident. HOWEVER, out of time claims may be made. New NSW CTP laws have made it difficult for injured people and many law firms still do not understand how to run new claims under these laws – so call us at PK Simpson Sydney as soon as possible.
- Workers compensation claims – You should contact a lawyer within six months of the accident. But remember, out of time claims can be handled by PK Simpson Sydney. We can help you get the treatment required to build your claim.
- Slip ‘n’ fall/occupiers liability claims – Your claim must be lodged usually within three years of the date of your accident.
Medical Negligence – within three years of the date of when the cause of action was discoverable to our client OR 12 years from the time of the act or omission which caused the injury through negligence. | https://www.pksimpson.com.au/cyclist-accidents-and-other-riders/ |
New Delhi:
The Central Council of Secondary Education (CBSE) will conduct from today the examinations of the board of directors of the first trimester of class 10. The major exam of trimester 1 will start at 11:30 a.m. and students will have to arrive at their respective examination center 30 minutes before the exam time. The exam for trimester 1 will continue until 1:00 p.m. Students will need to bring their term 1 CBSE admission card into the examination room.
advised: Best course after 10th class (Arts / Sciences / Commerce): Download the list for free!
As per the CBSE Term 1 date sheet, the CBSE will be leading the Social Science article today, followed by the Science article on December 2. The Home Science article will take place on December 3, followed by Standard and Basic Mathematics, which will take place on December 4.
The computer applications exam is scheduled for December 8, followed by the Hindi – A course and the Hindi – B course. The final exam will be in English (language and literature) on December 11.
CBSE Term 1 Board exams: Details to be completed on the OMR sheet
The CBSE exam for trimester 1 will be based on multiple choice questions (MCQ).
The CBSE will be hosting board exams on OMR sheets for the first time. The board has already published the sample OMR sheet and explained how students are to complete the OMR sheets.
Students will need to darken the correct option using only a black or blue tip pen. The use of pencil is not allowed during exams.
Students will also be asked to fill in the correct answer in the box given before the circles and the answer filled in the box will be considered the final answer. | https://pclunwen.com/cbse-term-1-exam-for-class-10-major-documents-starts-today/ |
Metallum Resources Inc. Completes Detailed Geophysical Program on M-18 Gold and Silver Property. Trenching and Sampling Program to Commence 9/26/2011 4:00:34 PM - Market Wire TORONTO, ONTARIO, Sep 26, 2011 (MARKETWIRE via COMTEX News Network) --
Metallum Resources Inc. (TSX VENTURE: MRV) ("Metallum" or "Company") announces that is has completed a detailed geophysical program covering, and extending beyond, the known gold/silver mineralization exposed for approximately 1.2 kilometres ("km.") of strike and 0.5 km. of width on surface at its M-18 gold/silver property in Chubut province, Argentina. The objective of the geophysical program was to assist in defining additional strike length, width, and depth to this mineralized zone. Gold and silver occurs disseminated within a low sulphidation system of quartz veining and quartz stockwork.
Quantec Geoscience (Mendoza, Argentina) completed approximately 58.8 line km. of gradient Induced Polarization ("IP") and ground magnetics with supporting coverage using pole-dipole IP. The original planned geophysical program called for approximately 42 line km. of survey (see Metallum's press release of August 11, 2011), however, open-ended anomalies identified after completion of the original planned program required additional work to properly investigate these anomalies along strike.
Geophysical coverage extended approximately 1.4 km. and 500 m respectively along strike in each direction beyond the exposed gold/silver mineralization as well as approximately 800 m in each direction beyond the exposed width of the mineralized zone. The survey coverage included evaluation of a large untested zone of argillic alteration occurring within a few hundred metres of the known gold/silver mineralization.
Results from the geophysical survey showed that the known exposed zone of gold/silver mineralization is clearly identified on the gradient and pole-dipole IP chargeability and resistivity at depth and along strike. Furthermore, IP anomalies related to this mineralized zone extend beyond the exposed rock beneath the cover of gravels, indicating that the gold/silver mineralization is potentially continuing along strike. In addition to this, the large zone of argillic alteration shows a strong chargeability/low resistivity anomaly extending for approximately 2 km in strike and 600 m in width. Depth extent to this zone continues beyond the 250 m investigation depth of the IP detectability.
View IP gradient chargeability map: http://metallumresourcesinc.com/Projects/Argentina/Survey/.
As well, the ground magnetics survey supports some of the structural features identified by the gradient IP and has also identified a strong magnetic feature on the east end of the survey area which will be investigated by geological work and/or drilling.
Metallum also reports that the geological program comprising an extensive campaign of geological mapping, detailed channel sampling, and approximately 8 km. of trenching with channel sampling is planned to commence during October, 2011. The objective of the program is to expose additional strike and width to the 1.2 km strike and 0.5 km width of the known gold/silver mineralization, which is covered by a thin veneer of gravels at its perimeter and remains open in all directions. As well, the geological work will evaluate the large zone of argillic alteration (mentioned above) in context with the strong IP chargeability/low resistivity response identified from the geophysical survey.
Results compiled from both the geophysical program and planned geological/sampling programs will identify primary targets for a Phase 1 drilling campaign planned for Q-4, 2011.
Metallum's President and CEO, Greg Lipton, states that "Metallum is excited by the results from the geophysical program. The known zone of gold/silver mineralization clearly shows strike extension beneath the gravels as well as at depth. In addition, the strong IP chargeability/low resistivity anomaly covering the large, untested zone of argillic alteration is indicative of mineralization continuing at depth. Also, additional, highly anomalous geophysical targets have been identified elsewhere on the property. Metallum now looks forward to the detailed channel sampling and trenching program that is about to begin on the property to add another dimension for target development for the Company's drilling program." | https://investorshub.advfn.com/Metallum-Resources-Inc-TSX-MRV-22303/ |
A 0.300-kg of ice is initially at temperature of −8.0 °C. How much heat is required to melt three-quarters the mass of the ice only?
-
Chemistry
If the specific heat capacity of ice is 2.10 J/(g.°C), how much heat is required to heat 530 g of ice from -45.0°C to -15.0°C? 1.) 33.400 kj 2.) 32595 J 3.) 33.4 kj 4.) 33000 J I was out sick when we learned this please help
-
Physics Science
How many kilocalories of heat are required to melt 20.0 kg of ice at 0°C? Okay so the given is m=20.0kg Ti=0°C HeatFusionIce=80 kcal/kg
-
physics
In 1986 a gargantuan iceberg broke away from the Ross Ice Shelf in Antarctica. It was approximately a rectangle 160 km long, 45.0 km wide, and 250 m thick. (a) What is the mass of this iceberg, given that the density of ice is 917
-
Chemistry
How much heat is required to melt 75.5g of ice at -25 degrees Celcius, and convert it to steam at 105 Celcius
-
physics
If you drop a piece of ice on a hard surface, the energy of impact will melt some of the ice. The higher it drops, the more ice will melt upon impact.Find the height from which a block of ice should ideally be dropped to
-
Science
Determine the amount of heat required to melt 150g of ice at 0°c [specific latent heat of fusion of water is 336KJ/Kg
-
science
what is the heat in joules required to melt 25 grams of ice?
-
physics
How long would it take a 1 200 W heater to melt 1.00 kg of ice at -12.0°C, assuming all the energy from the heater is absorbed by the ice? (Assume the specific heat of the ice is 2 090 J/kg · °C and the latent heat of fusion of
-
physics
An open container holds ice of mass 0.540 kg at a temperature of -18.7 c The mass of the container can be ignored. Heat is supplied to the container at the constant rate of 790 J/minute. The specific heat of ice to is 2100 J/kg .
-
physics
The formation of condensation on a glass of ice water causes the ice to melt faster than it would otherwise. If 7.40 g of condensation forms on a glass containing water and 210 g of ice, how many grams will melt as a result?
You can view more similar questions or ask a new question. | https://www.jiskha.com/questions/1472709/how-much-heat-is-required-to-melt-110g-of-ice-at-45-c |
BACKGROUND OF THE INVENTION
1. Field of the Invention
The present invention relates to a combination bookmark eyeglass case in which a bookmark strap fits around and through a book, with one end of the strap permanently fastened to one end of an eyeglass case and the other end of the strap releasably attached to another end of the eyeglass case.
2. The Prior Art
The Gonot, Jr. U.S. Pat. No. 4,162,800 discloses the combination of an elastic bookmark and a holder for writing instruments which permits the bookmark to be attached to a variety of different books, and which will also releasably hold a writing instrument. The bookmark consists of a loop of elastic material which may be either seamless or it may be joined together with a seam.
This reference, however, fails to show an eyeglass case in combination with the bookmark, whereby it would be possible to adjust the length of the bookmark very substantially. In addition, Gonot does not suggest that the use of a holder could also function as part of the adjustable attachment means.
The Jacobsen U.S. Pat. No. 4,732,107 shows a removable page marker for a book.
The Grodsky U.S. Pat. No. 2,300,216 shows a combination bookmark and pencil holder which merely rests in between the pages of the book and does not actually fold completely around and encase the book.
The Larson Design U.S. Pat. No. 325,929 shows a design for a combination bookmark and pencil holder which is similar to Grodsky as discussed above.
SUMMARY OF THE INVENTION
It is an object of the present invention to provide a bookmark in combination with an eyeglass case, wherein the bookmark and the eyeglass case also function as part of an adjustable fastener combination.
The above object is accomplished in accordance with the present invention by providing a bookmark and eyeglass case combination comprising an eyeglass case having an open end and a closed end, with a top side extending between the open end and the closed end, and with a bottom side extending between the open end and the closed end. There is an eyeglass case attachment means on the eyeglass case for releasably attaching the eyeglass case to a bookmark. Also, there is a bookmark having a first end and a second end, with a top surface extending between the first end and the second end, and with a bottom surface extending between the first end and the second end. There is a bookmark attachment means on the bookmark for releasably attaching the bookmark to the eyeglass case attachment means, and there is a means for releasably or permanently fastening the first end of the bookmark to an end of the eyeglass case.
The present invention is directed to a bookmark strap that fits around and through a book and has one end that is releasably or permanently connected to an eyeglass case. At the end of the eyeglass case is a releasable attachment means such as a VELCRO® patch (i.e., hook and loop type fastener) or a snap. At the other end of the bookmark strap are various VELCRO® patches or snaps that are aligned in tandem with each other in such a way that when the VELCRO® hook, or the snap on the eyeglass case is brought into contact with the wrapped around strap of the bookmark, it is possible to adjust the overall length of the bookmark based upon the particular VELCRO® patch or snap to which the VELCRO. RTM. is meshed or the snap is connected.
Hence, it is possible to adjust the overall circular length of the bookmark to accommodate books of various dimensions, lengths and thicknesses, depending on the number of pages necessary to encompass. In other words, when the bookmark is placed around the outside of the book after the reader has stopped reading, the length of the bookmark is adjustable so that when it is wrapped around the front of the book and comes into contact with the eyeglass case to mesh with the corresponding VELCRO® hook or snap, the eyeglass case will always be snugly resting and held conveniently in place on the outside top cover of the book.
BRIEF DESCRIPTION OF THE DRAWINGS
Other objects and features of the present invention will become apparent from the following detailed description considered in connection with the accompanying drawings which disclose several embodiments of the present invention. It should be understood, however, that the drawings are designed for the purpose of illustration only and not as a definition of the limits of the invention.
In the drawings, wherein similar reference characters denote similar elements throughout the several views:
FIG. 1 is a top view of the combination of the present invention showing the top side of the eyeglass case and the top surface of the bookmark having bookmark attachment means thereon;
FIG. 2 is a bottom view of the combination of FIG. 1 showing the bottom side of the eyeglass case having attachment means thereon and the bottom surface of the bookmark;
FIG. 3 shows a perspective view of the eyeglass case held in place on the outside top cover of a book by the bookmark strap; and
FIG. 4 shows a single bookmark attachment means.
DETAILED DESCRIPTION OF PREFERRED EMBODIMENTS
Turning now in detail to the drawings, FIGS. 1 and 2 show a bookmark and eyeglass case combination 10 including an eyeglass case 12 having an open end 14 and a closed end 16, with a length x extending from open end 14 to closed end 16 and a width w whereby length x is greater than width w, with a top side 18 (FIG. 1) extending between the open end 14 and the closed end 16, and with a bottom side 20 (FIG. 2) extending between the open end 14 and the closed end 16. An eyeglass case attachment means 22 is located on the eyeglass case 12 at the closed end 16 for releasably attaching the eyeglass case to a bookmark 24. The eyeglass case is usually made by known construction and can be composed of a thermoplastic material such as polyvinyl chloride, or of a composite laminate of several different plastic materials bonded together. A pair of eyeglasses (not shown) may be inserted into, or withdrawn from, the open end 14 of the case 12.
The bookmark 24 has a first end 26 and a second end 28, with a top surface 30 extending between the first end 26 and the second end 28, and with a bottom surface 32 extending between the first end 26 and the second end 28. The bookmark is usually made by known construction and is usually composed of a thermoplastic material such as polyvinyl chloride, or of a composite laminate of several different plastic materials bonded together.
A bookmark attachment means 38 is located on the second end 28 of the bookmark for releasably attaching the bookmark 24 to the eyeglass case attachment means 22. Fastener means 36 may releasably or permanently fasten the first end 26 of the bookmark 24 to the open end or the closed end of the eyeglass case 12. Preferably, the bookmark first end 26 is fastened to the bottom side 20 at the open end 14 of the eyeglass case 12.
In one embodiment, the eyeglass case attachment means 22 is located on the bottom side 20 of the eyeglass case 12 adjacent to the closed end 16 of the eyeglass case. The bookmark attachment means 38 is located on the top surface 30 of the bookmark 24 adjacent to the second end 28 of the bookmark.
In a further embodiment, the eyeglass case attachment means and the bookmark attachment means could be transposed in location. Thus, the eyeglass case attachment means 22 could be located on the bookmark at end 28, where the bookmark attachment means 38 is now positioned, as shown in FIG. 1. Then the bookmark attachment means 40, 42 and 44 could be transposed and relocated onto the eyeglass case at end 16, where the eyeglass case attachment means 22 is now positioned, as shown in FIG. 2.
The fastening means 36 can releasably fasten or can permanently fasten the first end 26 of the bookmark to the open end 14 of the eyeglass case 12. As shown in FIG. 2, means 36 preferably is made of any known type of permanent fastener, such as stitching with thread, staples, brackets or clips. In another embodiment, this fastener at end 26 can be snaps 50 for releasibly fastening the first end 26 of the bookmark to open end 14 of the eyeglass case.
In a further embodiment, the eyeglass case attachment means 22 and the bookmark attachment means 38 are the two component parts of a VELCRO® hook-and-loop type of fastener, which are preferably shaped as circular patches. As shown in FIG. 1, the bookmark attachment means 38 includes a series of linearly aligned attachment elements 40, 42 and 44 including a first attachment element 40 adjacent to the second end 28 of the bookmark 24 and a last attachment element 44 farthest removed from the second end 28 of the bookmark and closest to the first end 26 of the bookmark. Intermediate attachment element 42 is located between the first and the last attachment elements. Preferably, each element 40, 42 or 44 is a VELCRO® circular patch.
In another embodiment, means 22 and means 38 can be the two component parts of a matingly engageable pair of snaps (not shown).
In a further embodiment, the bookmark attachment means 38a, shown in FIG. 4, is a simple VELCRO® patch having a width equal to the diameter of circular patch 40 and having a length equal to the total distance between patch 40 and patch 44 measured as the distance between length L minus length 1, plus the diameter of one of the patches 40, 42 or 44.
According to the present invention, when the combination bookmark eyeglass case 10 is placed around the outside of a book 50, as shown in FIG. 3, bookmark 24 encircles a plurality of pages 52 in addition to the outside top cover 54 of the book, such that eyeglass case 12 snugly rests on the encircled cover 54 and bookmark 24 encloses the plurality of pages of the book parallel to the bottom side 20 of the eyeglass case.
According to the present invention, the combination 10 bookmark and eyeglass case has a maximum circumferential length L and has a minimum circumferential length 1. Thus, whenever the first attachment element 40 of the bookmark attachment means 38 is releasably attached to the eyeglass case attachment means 22, then this combination 10 has a maximum circumferential length L. This maximum circumferential length will be produced by folding the bookmark second end 28 along the circular path (A) illustrated in FIG. 1.
Hence, whenever the last attachment element 44 of the bookmark attachment means 38 is releasably attached to the eyeglass case attachment mean 22, then this combination 10 has a minimum circumferential length 1. This minimum circumferential length 1 will be produced by folding the bookmark second end 28 along the circular path (B) illustrated in FIG. 1. Thus, by adjusting the circumferential length, it is possible to adjust the combination bookmark and eyeglass case to encompass different sized books, or to surround different numbers of pages being marked within the same book.
In a further embodiment, the combination 10 also has an intermediate circumferential length, based upon attaching the intermediate attachment element 42 to the eyeglass case attachment means 22.
These features enable the bookmark eyeglass case together to have the advantages that they can function as an adjustable fastener combination, in addition to being a bookmark and a housing for a book reader's pair of glasses.
While several embodiments of the present invention have been shown and described, it is to be understood that many changes and modifications may be made thereunto without departing from the spirit and scope of the invention as defined in the appended claims. | |
School Violence Lowers Test Scores, Not Grades
WASHINGTON, DC, November 6, 2013 — It’s hard to go a day without seeing news of violence in some form occurring in schools around the country, and Chicago is often cited as a city where crime rates in schools are particularly high. In a new study in the current issue of Sociology of Education, Brown University sociologist Julia Burdick-Will looked at the effect such violence has on school achievement among Chicago high school students. She found that while violent crime has a negative impact on standardized test scores, it doesn’t have the same effect on grades.
“It seems obvious that having fights in schools is not a good thing for achievement, but it’s a really difficult thing to show,” said Burdick-Will, a post-doctoral research associate in the Population Studies and Training Center at Brown University, whose study is titled “School Violent Crime and Academic Achievement in Chicago.”
Employing detailed crime data from the Chicago Police Department, administrative records from Chicago Public Schools, and school climate surveys conducted by the Consortium on Chicago School Research from 2002 to 2010, Burdick-Will compared fluctuations in year-to-year violent crime rates with changes in both student standardized test scores and annual grade point averages.
She found that violent crime in schools adversely affects reading and math scores on standardized tests, but has no influence on GPAs.
Burdick-Will said the results suggest that violent crime rates affect the amount of material learned by the entire student body, but not the study skills or effort of individual students. GPAs, she points out, not only reflect learning, but also student behavior and standing within the classroom. Test scores are a more objective measure of content knowledge and performance on a given day.
“So you would expect that if what’s really going on is students are distracted and not learning as much and also not able to perform as well on the day of the test that it would affect their test scores,” Burdick-Will said. “But it wouldn’t necessarily affect how much homework they’ve turned in over the course of the year. You’re still going to have that kid who is really eager; he or she is just not going to know as much.”
The study also reveals that students’ perceptions of safety go relatively unchanged, even in years when violent crime rates are low. One explanation may be that the research only looks at reported crimes that involved police intervention. There could be many more incidents, such as shoving in the hallway and verbal altercations, that go unreported but still have an effect on students’ sense of well-being.
While annual violent crime rates generally fluctuated significantly at individual schools during the eight-year study period, Burdick-Will found that the average violent crime rate for all high schools in the district combined changed very little over the study period. The paper also notes that a few high schools each year accounted for the large majority of violent crimes in the whole district.
Burdick-Will thinks her research demonstrates the need for policy changes that consider education and crime rates together and take into account the “collateral damage” that crime and violence have on multiple sectors of society.
“In an age of increasing school accountability and shrinking public budgets, it is important to understand how policies that on the surface only affect one social sphere, such as policing strategies, have larger
consequences for other social institutions, including schools, in ways that have lasting impacts on individual life chances and national levels of inequality,” Burdick-Will said.
###
About the American Sociological Association and the Sociology of Education
The American Sociological Association (www.asanet.org), founded in 1905, is a non-profit membership association dedicated to serving sociologists in their work, advancing sociology as a science and profession, and promoting the contributions to and use of sociology by society. Sociology of Education is a quarterly, peer-reviewed journal of the ASA.
The research article described above is available by request for members of the media. For a copy of the full study, contact Daniel Fowler, ASA’s Media Relations and Public Affairs Officer, at (202) 527-7885 or [email protected].
For more information about the study, members of the media can also contact Courtney Coelho, News Officer, Brown University’s Office of Media Relations, at (401) 863-7287 or [email protected].
| |
Reviewed By:
Martin E. Liebling, M.D., FACP
Mark Oren, M.D., FACP
Summary
Traditionally performed in physician offices and laboratories, blood tests are useful tools for uncovering disorders in the human body. They detect abnormally high or low levels of substances that may indicate a variety of diseases, including cancer.
Blood tests may be ordered during diagnosis to rule out other diseases and disorders. Although they are used to help detect cancer, additional tests are usually necessary to verify the diagnosis. They may also be used to determine a person’s risk of developing cancer, or to screen for cancer before signs and symptoms develop.
In people with cancer, blood tests may be used to monitor the progression of the disease, and the effectiveness of treatment. They may also be helpful in detecting recurrent cancer (cancer that has returned after treatment). In many medical facilities, blood is drawn by a phlebotomist, who is a medical laboratory assistant specially trained in collecting and handling blood.
Depending on the amount of blood required for the test, blood can be drawn from a vein puncture (venipuncture), artery puncture (arterial puncture) or skin puncture. Obtaining a blood sample only takes a few minutes and most patients find them to be almost painless. Some blood tests may require fasting or other preparation. However, for most blood tests, there is very little preparation beforehand, and people can generally return to their usual daily activities following testing.
About blood tests
A blood test uses a sample of blood to detect and measure various factors in the blood. It is important to measure these factors because abnormally high or low levels may affect normal body function. The presence or absence of certain elements in the blood also may be an indication of a medical problem.
Blood tests serve a number of purposes related to the diagnosis and monitoring of cancer. These purposes include:
- To determine a person’s risk of developing cancer
- To screen for cancer before signs and symptoms develop
- To help diagnose cancer
- To rule out other diseases during diagnosis
- To monitor the progression of the disease
- To monitor the effectiveness of a patient’s cancer treatment
- To detect cancer-related complications
- To detect the spread of the disease to other areas of the body (metastasis)
- To help detect recurrence or remission
The blood tests ordered to detect and monitor cancer are used to uncover an abnormality in the body. The detected abnormality is usually nonspecific, meaning that it may indicate a variety of possible diseases, including cancer. Although blood tests may help detect cancer, additional tests are usually necessary to verify the diagnosis.
Samples of blood may be taken in one of three ways:
- Vein puncture (venipuncture). A needle is inserted directly into a vein to draw blood into one or more tubes. Blood is usually drawn from a vein in the inner arm, opposite the elbow.
- Skin puncture. Used when only a small amount of blood is needed to perform the desired blood test. The skin of the finger, earlobe or heel (in infants) is jabbed with a needle or lancet to produce a drop of blood that is then collected for testing.
- Artery puncture (arterial puncture). Used only when the blood test needs to be performed on a sample of oxygen-rich blood traveling from the heart to the body via the arteries. Blood is usually drawn from an artery in the side of a wrist.
Blood tests can be performed on different parts of the blood, including:
- Whole blood (blood that has not been separated into its many components)
- Blood plasma (the liquid part of the blood)
- Blood serum (plasma that has had the clotting agent removed)
- Blood cells (the individual red blood cells, white blood cells and platelets)
Types and differences of blood tests
Hundreds of blood tests are performed every day in hospitals, laboratories and in people’s homes. In general, there are four main types of blood tests:
- Hematology tests
- Biochemistry tests
- Microbiology tests
- Serology tests
Hematology tests examine the blood to identify:
- The types and number of blood cells that are present (e.g., red blood cells, white blood cells and platelets)
- The appearance of the cells, especially their maturity
- The ability of the blood to form a blood clot and the speed at which clotting occurs
Biochemistry tests measure the levels of normally occurring chemicals and biochemicals in the blood, both individually and in relation to other chemicals. These measurements are compared to normal ranges and are used to determine whether blood biochemicals are in a proper and healthy balance. Biochemicals and other substances that may be studied include:
- Sodium and other blood electrolytes
- Cholesterol and other fats
- Enzymes
- Vitamins and minerals
- Hormones
- Blood gases
- Prescription drugs
- Recreational drugs
- Alcohol
- Sugar, calcium and many other elements
Biochemical tests precisely measure these substances and can also be used to indicate how well some organs and organ systems are functioning. For instance, when cancer spreads to the liver, it may affect the organ’s enzyme production. As a result, measuring the amount of certain enzymes in the bloodstream can indirectly reflect the progression of the disease and its effect on the liver. Kidney, bone and lung function, among others, can also be reflected in the blood.
Microbiology tests examine blood for the presence of infectious microscopic organisms such as bacteria, fungi, parasites and viruses, although most laboratories use serology tests for viruses.
Microbiology tests include:
- Smears, in which a small amount of blood is placed on a glass slide for examination under a microscope. Sometimes the blood smear is stained with special dyes before examination.
- Blood cultures, in which a small amount of blood is placed in a nutrient broth, incubated for days or weeks and then examined for growth of disease-causing bacteria.
Serology tests (tests performed on blood serum) can detect the presence of antibodies that are produced by plasma cells to attack microscopic organisms. They are frequently used to detect viral diseases. Most hospital laboratories do not have the equipment or specially trained personnel necessary to isolate the viruses themselves, so serology tests are performed instead to identify the infecting organism by studying the antibodies produced against it.
Common blood tests for cancer
Blood tests commonly used to detect and monitor cancer include:
- Complete blood count (CBC). This test measures the number of red blood cells, white blood cells and platelets in a person’s blood as well as the amount of hemoglobin in the red blood cells and a number of other factors. A CBC is one of the most common blood tests ordered among the general population. In cancer patients, it may be used during treatment to determine if chemotherapy or radiation therapy is negatively affecting cell production in the bone marrow. In addition, a CBC can help detect diseases such as leukemia or multiple myeloma, and cancer-related complications including anemia. It may also be used to detect cancer that has metatasized (spread) to bone marrow.
- Tumor marker tests. These tests detect substances produced by cancer cells. They may be used to help diagnose certain cancers or determine the primary site of a suspected cancer. For example, the presence of a high level of the tumor marker CA-125 strongly suggests ovarian cancer, although it is not absolutely specific. Tumor marker tests are also used to plan cancer therapy and to monitor the effectiveness of treatment.
Following treatment, the tests may be used to detect recurrent cancer or to monitor the spread of the disease. Blood tests for levels of the tumor marker CA-15-3 can detect breast cancer recurrence before the patient displays any symptoms. In men, levels of prostate specific antigen (PSA) may be measured to detect prostate cancer in men without signs or symptoms of the disease.
- Blood chemistry tests. These tests measure the levels of specific chemicals in the blood. An abnormally high or low level of a substance may be a sign of disease in the organ or tissue that produces it. The presence or absence of certain elements also may indicate a medical condition. The tests are used to monitor changes in liver or kidney function caused by cancer or treatment with certain chemotherapy drugs. The tests may also be ordered to determine whether treatment is required to correct abnormally low or high levels of certain minerals.
- Enzyme tests. These tests measure levels of enzymes (proteins required for chemical reactions to take place in cells) in a blood and/or urine sample. Enzyme tests may be ordered to measure the amount of enzyme released by the liver. An abnormal amount of an enzyme may indicate that cancer has spread to the liver.
- Electrolyte panel. An electrolyte panel is a group of blood tests that measure electrolyte (minerals that help regulate a variety of body functions) levels to assess the general functioning of the patient’s organ systems. Electrolytes that are often measured include potassium, chloride and sodium, although there are many others. These tests may be ordered to monitor the effects of treatment.
- Genetic tests. These tests analyze human DNA, RNA, chromosomes, proteins and certain metabolites. They may be used to detect inherited genetic abnormalities and to help predict a person’s risk of developing cancer. For example, women who come from a family with a history of breast cancer may choose to have genetic testing for the BRCA1 and BRCA2 gene mutations. Tests for the p16 gene mutation help predict the risk of melanoma for patients with a family history of the disease. Many cancer research studies focus on identifying genes associated with specific cancers or that indicate which tumors will respond to specific types of therapy.
- Sedimentation rate (or sed rate). This test measures the rate at which red blood cells (erythrocytes) separate from the liquid part of blood (plasma) and fall to the bottom of a test tube, forming sediment. Also known as erythrocyte sedimentation rate, sed rates are generally used as a screening tool when assessing for disease, or to monitor the progress of chronic diseases such as Hodgkin’s lymphoma and other cancers.
- Alpha-fetoprotein test. This tumor marker test measures the levels of alpha-fetoprotein (AFP) in the blood. Normally present in high amounts in the blood of fetuses, AFP is a protein that usually disappears shortly after birth. When detected in the blood of adults, it may suggest liver cancer, testicular cancer or certain types of ovarian cancer. Following treatment for these cancers, AFP levels may be monitored to determine if the cancer is returning. AFP tests may also be used to detect early tumors in people at high risk for developing cancer.
- Coomb’s test. Also known as an antiglobulin test, this test examines a sample of blood under a microscope to determine if antibodies are on the surface of red blood cells. When antibodies bind to red blood cells, they can destroy them. The test may be ordered during the staging of certain cancers, including chronic lymphocytic leukemiaand to help in the classification of anemias (low red blood cell counts).
Before and during the blood test
Preparation for blood tests varies according to the requirements of each specific test. In most cases, minimal preparation is necessary. The patient may need to reduce or stop certain medications and vitamins at some point prior to the test. Additionally, food intake and exercise may be temporarily restricted or suspended. Alcohol and caffeine should be avoided prior to some blood tests.
On the day of the test, the procedure will be explained and patients will have the opportunity to ask questions. The medical professional will also ask questions about the patient’s medical history before the test, to determine if the patient is taking any medications that will interfere with the test’s accuracy or has any history of clotting problems.
In many laboratories and medical facilities, blood is drawn by a phlebotomist who is a medical laboratory assistant specially trained in collecting and handling blood.
Drawing blood for a blood test is an easy and virtually painless process for most people. If the test only requires a drop or two of blood, then a simple prick of the finger, earlobe or heel (in the case of a baby) can provide enough blood for testing.
A sterile, sharp lancetis used to prick the skin. The technician will then gently squeeze the puncture area to produce drops of blood that are collected in tiny glass tubes. Light pressure and sterile gauze are then applied to the puncture site to stop the bleeding. A bandage is usually not necessary.
If a substantial amount of blood is needed, it is usually drawn from a vein in a process called venipuncture. During venipuncture, a needle is inserted into a vein – usually at the end of the elbow or on the back of the hand. The site may be changed if the professional is unable to draw blood from the chosen vein.
The area around the puncture site is cleaned with rubbing alcohol and a wide elastic band or piece of latex tubing may be placed around the upper arm to slightly increase pressure in the vein. One end of a sterile double-ended needle that has been attached to an open-ended syringe (which contains an empty test tube) is inserted into the vein. Because the test tube contains a partial vacuum, blood flows directly from the vein through the double-ended needle and into the test tube.
The precise amount of blood to be drawn is determined by the type and number of tests scheduled. It is usually around 7 cubic milliliters per tube. The technician may change test tubes once or twice during a venipuncture to either allow for more blood to be collected or to change the type of tube being used. Tubes are marked with different color tops that indicate the way in which the collected blood will be preserved:
- A lavender top indicates that the tube contains an anticoagulant, which prevents the collected blood from clotting.
- A red top indicates that the tube contains no anticoagulants, allowing plasma and the blood cells to form a blood clot.
- A gray top indicates that the tube contains a preservative, which keeps glucose from breaking down in the tube.
After the necessary amount of blood is drawn, the needle is withdrawn and a small cotton ball or pad is applied with light pressure over the puncture site. After several minutes, the cotton will be discarded or replaced, and a small bandage will be placed on the puncture wound, if necessary. The entire process takes less than 10 minutes.
Despite the precautions taken to avoid bruising and soreness, they may occur. Typically, this is not a cause for great concern. To minimize soreness, patients may immediately apply a warm compress to the puncture site and repeat the application every three hours until the discoloration or pain subsides.
If blood must be taken from an artery instead of a vein, it is usually drawn from a very small artery located on the inside or the top side of the wrist.
After the blood test
Following the withdrawal of blood in a physician’s office or laboratory, patients may resume medications and food intake according to their physician’s instructions. Immediately after the blood sample is taken, the test tubes are labeled with the date, the patient’s name and any other necessary information. In some places, such as in a medical oncology office, the blood test analysis may be completed on-site. Otherwise, the blood sample is sent to a laboratory for analysis. The length of time in which the results are returned depends upon the urgency and type of blood test. Based on the test results, additional blood tests may be ordered.
Test results are always evaluated in relation to the “normal range” for that test. The range of values considered to be normal is the range of test results from the blood of normal, active healthy people. When someone has cancer or another disease or condition, blood test results may be higher or lower than normal – or “outside of the normal range.” A physician who sees that a blood test is outside of normal range may order repeat tests to verify results or additional tests to determine the underlying causes behind the abnormality.
Normal ranges for some tests may vary slightly between laboratories, especially with facilities that use machines to perform blood tests and those who perform blood test analyses by hand. Frequently, results of a patient’s blood test analyses are compared to another “known” blood sample taken from a healthy individual that is run at the same time and is designated as the “normal control.” When the “normal control” sample falls within the normal range, or reaches a specific “known” measurement, the laboratory results confirm that the blood test has been carried out accurately.
Although blood tests are very useful in the diagnosis and classification of cancer, additional tests are usually needed as well. In order to diagnose cancer, a physician must almost always perform a biopsy – a procedure in which a small sample of tissue is collected and examined under a microscope. In addition, urine tests and imaging tests (e.g., x-rays, CAT scan) may also be used to diagnose and classify the cancer.
Potential risks with a blood test
There are very few risks or side effects reported with blood tests. Occasionally, bruising is reported at the venipuncture site. This can be minimized by keeping direct pressure on the spot for several minutes after the needle has been removed. Greater care must be taken to prevent bleeding after an arterial blood sample because there is greater pressure in an artery. In rare situations, the vein used to obtain the sample may become inflamed. Applying warm compresses to the spot several times a day can help reduce the swelling.
People with bleeding disorders or who are taking anticoagulants (including aspirin) may have problems with continued bleeding. Those who experience these side effects should consult with their physician.
When drawing blood, only sterilized, single-use needles are used by the healthcare professional. In addition, they are trained in standard precautions to eliminate any risk of infection for themselves or their patients. In almost all instances, the technician wears disposable gloves when drawing or handling blood. Infections from nonsterile conditions are rare with blood tests.
Questions for your doctor about blood tests
Preparing questions in advance can help patients have more meaningful discussions with their physicians regarding their conditions. Patients may wish to ask their doctor the following questions about blood tests:
- What type of blood test do I need?
- What do you hope to learn from my blood test?
- Can the blood test diagnose a specific condition?
- Does my blood test require any special preparation?
- What are the risks associated with this blood test?
- Where should I have the blood test done?
- How much blood will they need?
- When can I expect to receive the results and from whom?
- Will I need to repeat the blood test in the future?
- What tests might I need after the blood test? | https://healthlinerx.org/cancer-blood-tests/ |
According to Dr. Daniel Goleman, author of Emotional Intelligence, many psychologists would argue that EQ (Emotional Intelligence Quotient) trumps IQ as a more holistic measure of the scope of human intelligence (Goleman).
IQ is a quantitative measure of a person’s ability to learn and understand factual information. It can be useful in tracking intellectual development, as it is often calculated considering a person’s chronological age. People with a high IQ tend to do well in school have high academic achievements (Cherry). For a long time, IQ was considered one of the main predictors of success.
It is turning out, however, that IQ is not all that it’s cracked up to be. It is measured in isolation from real life, where the emotions play a significant role in most outcomes. A person’s cognitive function and ability to make sound decisions can be severely compromised if they are feeling stressed, anxious, or rushed (Thompson).
But, if a person is able to stay calm and alert using emotional control, they can function at their full capacity. Their circuits are free from worries and they can think clearly, learn quickly, and come up with creative insight.
Emotional intelligence is the future of intelligence quotients. It is a qualitative measure of a person’s ability to understand emotions and use cognitive skills. People with a high EQ tend to have a good understanding of their own emotions and those of others which gives them a high capacity for reasoning and relating to other people.
People with high EI also harbor a developed sense of self-discipline. This enables them to be poised negotiators and leaders. Studies show that emotional intelligence can affect the bottom line and effectiveness at work. EI competencies also outweigh both IQ and experience in top performers (Stone).
A forty year follow-up study of 80 Ph. D. graduates from Berkley showed that social and emotional abilities were four times better than IQ for predicting professional success (Feist). Emotional intelligence is not the opposite of intelligence, but rather an ability to combine the use of facts and feelings (Jensen).
THE IMPORTANCE OF EI TODAY
In today’s digital age, it can be easy to assume that success is determined by how well you navigate technology or how many accolades you’ve received. As we’ve discussed, however, emotional intelligence has a big role to play as well.
Clear and effective communication is very important for garnering success in almost any industry. There is less visual feedback from the people we communicate with electronically, so success requires finesse. Choosing to have just a few extra minutes of face time with a client dedicated to understanding their needs and yours, and how they relate to each other, can make the difference between doing business together or not.
IMPROVING EI
Exercises of emotional control and awareness can be helpful for people of all ages in helping to reach their full potential. There are several methods for improving EI.
- Make a marked effort to reduce stress with calming thoughts or rituals. This can be as simple as taking a deep breath. Being calm can prevent unnecessary reactiveness.
- Work on developing an awareness of one’s internal moment-to-moment emotional state can be useful as well. Try writing down your feelings and a quick note about their causes in a journal for a few days and see if you recognize any patterns in the experiencing of negative emotions.
- It’s important to remember that non-verbal communication such as body language and facial expressions can be used to communicate just as much, or in some cases, more than words.
- Maintain a sense of humor and try to lighten up in difficult situations. If you feel yourself becoming overwhelmed with frustration. Take a deep breath and acknowledge that negative emotions are not problem-solvers. If anything, they prevent you from finding a solution.
- Emotional intelligence is also very important for maintaining harmony in one’s personal life. Part of EI is learning to see conflicts from the other person’s point of view. You’ll grow your emotional intelligence every time you take the initiative to forgive or resolve a conflict in a positive way (Stone).
Though there is a lot to be said for IQ, it seems that a high IQ does not go far without the help of a well-developed emotional intelligence. Many people with a high IQ assume they are reaching their potential for success because of their smarts. What they don’t realize is how much better they could be doing if they spent time developing the EI as well.
No matter what your goals are in life, everyone can benefit from practicing and developing their emotional intelligence.
Sources
1. Goleman, D. (n.d.). Emotional Intelligence.
2. Cherry, Kendra. “IQ or EQ: Which One Is More Important?” About.com Psychology. N.p., n.d. Web. 09 Mar. 2014. .
3. Thompson, H. (2010). The Stress Effect. Why smart leaders make dumb decisions. Jossey Bass.
4. Stone, Carol, ed. “Emotional Intelligence: EQ vs. IQ.” Bard Value Analysis & Standardization (2009): n. pag. C. R. Bard, Inc. Web. 4 Mar. 2014.
5. Feist, G.J. and Barron, F. (1996). Emotional intelligence and academic intelligence in career and life success. Paper presented at the Annual Convention of the American Psychological Society, San Francisco, June.
6. Jensen, K. (2012). Intelligence is overrated: What you really need to succeed. Forbes. | https://inpathybulletin.com/the-importance-of-emotional-intelligence-in-the-age-of-information/ |
The Italian island of Stromboli has long attracted residents and visitors thanks to its mild climate, fertile soils, and picturesque views. But there’s a sinister side to Stromboli—the steep flanks of its active volcano periodically slough off, creating landslides that tumble into the sea and trigger tsunamis. Now, geoscientists and archaeologists have shown that one of these events in the 14th century was likely responsible for the rapid abandonment of the island. An enormous, deadly marine storm reported in Naples in 1343 was also probably due to the same tsunami waves, the researchers proposed. These findings suggest that southern Italy is at a higher risk of tsunamis than previously known.
Below 1 meter, we immediately found something that was completely different.
Mauro Rosi, a volcanologist at the University of Pisa in Italy, and his colleagues excavated three trenches in the northeastern part of Stromboli to look for signs of ancient tsunamis. Working between 170 and 250 meters from the present-day shoreline, the researchers didn’t have to dig long before their machinery revealed something other than normal soil. “Below 1 meter, we immediately found something that was completely different,” said Rosi. Three clearly defined layers of pebbles and black sand emerged, “closely resembling what you see when you go to the beach,” said Rosi. This material, the researchers surmised, had been swept inland by tsunami waves.
To calculate approximately when these tsunamis occurred, the researchers used carbon-14 dating to age date charcoal fragments buried directly below the tsunami deposits. Rosi and his colleagues estimated that the three tsunamis inundated Stromboli between the 14th and 16th centuries. Focusing on the oldest and largest tsunami, the team found that no large, contemporaneous earthquakes were noted in historical records. The lack of a seismic event, paired with lava records showing a collapse of the volcano’s Sciara del Fuoco (Stream of Fire) lava feature around 1350, pointed to the tsunami waves being triggered by the collapse of the flanks of the volcano, the researchers concluded.
Rosi and colleagues also used archaeological evidence to show that the tile roof of a medieval church in northeastern Stromboli had collapsed right around the same time. The scientists also found three graves hastily dug in the collapsed tiles that contained human remains. Landslide-induced shaking might have irreparably damaged the church and killed people, the team proposed.
This research sheds new light on the persisting hazard of landslide-generated tsunamis in the Tyrrhenian Sea.
Further evidence of this tsunami might also be in literature. In November 1343, the writer Francesco Petrarca recorded a sea storm that pummeled the harbor of Naples, destroyed boats, and killed hundreds of people. It’s entirely conceivable that a tsunami originating on Stromboli could have swept 200 kilometers north and rolled up the shoreline of the Italian mainland, Rosi and his collaborators concluded. Communities in southern Italy may be “exposed to a much higher tsunami hazard than previously thought,” the researchers wrote last month in Scientific Reports.
This research “sheds new light on the persisting hazard of landslide-generated tsunamis in the Tyrrhenian Sea,” said Max Engel, a geomorphologist at the University of Cologne in Germany not involved in the research.
Citation: Kornei, K. (2019), Ancient tsunami tied to volcanic flank collapse in Italy, Eos, 100, https://doi.org/10.1029/2019EO116083. Published on 11 February 2019. | https://eos.org/articles/ancient-tsunami-tied-to-volcanic-flank-collapse-in-italy?utm_source=rss&utm_medium=rss&utm_content=ancient-tsunami-tied-to-volcanic-flank-collapse-in-italy |
The Twisted Network Framework Abstract. Twisted is a framework for writing asynchronous, event-driven networked programs in Python -- both clients and... Introduction. Python lends itself to writing frameworks. Python has a simple class model, which facilitates inheritance. Complementing Python.. Python Networking Programming Python plays an essential role in network programming. The standard library of Python has full support for network protocols, encoding, and decoding of data and other networking concepts, and it is simpler to write network programs in Python than that of C++ Python Networking Projects Python Networking Projects offers unlimited opening for students and research academicians to attain the majestic future with a dream of profession. Today, we nearly served 5000+ students and research scholars by our highly advanced Python Networking Projects That code only defines classes and methods, so it won't do anything when you run it with the python command. You'll need to import it as a library, something like this: import btpeer peer = BTPeer(...) peer.addpeer(...) (You'll need to fill in the parameters to the methods (where I've written) appropriately. PyTorch is a fast and flexible neural network framework with an imperative paradigm. It builds neural networks on a tape-based autograd system and provides tensor computation with strong GPU..
Python.NET. Python.NET (pythonnet) is a package that gives Python programmers nearly seamless integration with the .NET 4.0+ Common Language Runtime (CLR) on Windows and Mono runtime on Linux and OSX. Python.NET provides a powerful application scripting tool for .NET developers. Using this package you can script .NET applications or build entire applications in Python, using .NET services and components written in any language that targets the CLR (C#, VB.NET, F#, C++/CLI) Frameworks of Python Some of the most famous web frameworks of python are as below: 1) Django One of the most widely used python frameworks is a high-level framework that encourages clean and efficient design. the various development works possible with Django are Tornado is a Python web framework and asynchronous networking library. Tornado uses the non-blocking network I/O, and hence is capable of scaling to tens of thousands of open connections. This trait makes it ideal for long polling, WebSockets, and other applications that require a long-lived connection to each user Flask is a massively popular web framework for Python. With over 50k stars on GitHub, it is the most widely used and well-adapted framework for building web applications using Python. Over the years, Flask has added a lot of feature updates, which makes it almost as good as a full stack framework Home » Network Automation » Python Network Automation. Python Network Automation Scripts Examples . In this post I will cover in detail some Python scripts for Cisco network engineers that I use on nearly a daily basis. For each example that needs connectivity I will be using a basic topology of 20 x CSR routers
Python implementation of a peer-to-peer decentralized network. This project provides a basic and simple peer-to-peer decentralized network classes (framework) to build your own network. Basic functionality of the nodes and the connection to and from these nodes has been implemented. Application specific functionality is up to you to implement. Web2py, developed by Massimo De Pierro, is a cross-platform web application framework written in Python programming language. It is an open source and free-to-use Python web framework, released in September 2007. It enables users to create dynamic web content in Python Networking modules (tornado.ioloop, tornado.iostream, etc.) Asynchronous servers and clients All in all, I really have the feeling that FastAPI is going to race ahead as the top async framework for Python. Conclusion. A lot is going on in the Python async landscape these days. New frameworks are popping up, old ones are being rewritten, and libraries are being evolved to match async. Tornado is a Python web framework and asynchronous networking library, originally developed at FriendFeed. By using non-blocking network I/O, Tornado can scale to tens of thousands of open..
In a network environment, Nornir lets you keep track of your device inventory and run tasks against all devices handling data. Skip to content. Cisco Blogs / Developer / Exploring Nornir, the Python Automation Framework. May 30, 2018 8 Comments. Developer Exploring Nornir, the Python Automation Framework. Stuart Clark. This blog contributed by Patrick Ogenstad. Patrick works at Conscia Netsafe. Python Test Framework for Automated Testing of Network Protocols This article will provide the best approach towards building realistic automation frameworks for network enabled devices, based on higher level abstraction philosophy. A test automation framework provides an execution environment for the automation of test scripts. These frameworks can be utilized in a widespread manner. In this paper, we discuss the most popular neural network frameworks and libraries that can be utilized for natural language processing (NLP) in the Python programming language. We also look a Pore-network Modeling Framework in Python¶ OpenPNM is an open source project to provide a ready-made framework for performing pore network simulations of transport in porous materials. Citing¶ If you use OpenPNM in your work, please include the following citation: Citation. Gostick J, Aghighi M, Hinebaugh J, Tranter T, Hoeh MA, Day H, Spellacy B, Sharqawy MH, Bazylak A, Burns A, Lehnert W. Frameworks of Python. Some of the most famous web frameworks of python are as below: 1) Django. One of the most widely used python frameworks is a high-level framework that encourages clean and efficient design. the various development works possible with Django are, 1) Creating and deploying RESTapi. 2) web application deployment
Popular Python frameworks 2021. Listed below are the top Python frameworks that a web development company and developers should choose in 2021 for enhancing website performance and time-to-market.. 1. Django. Django, a free and open-source Python framework, enables developers to develop complex code and apps quickly May 05, 2018. Nornir is a new automation framework written in Python and intended to be consumed directly from Python. You could describe it as the automation framework for Pythonistas. This might strike you as something wonderful, or it could trigger your spider-sense About IVRE IVRE is an open-source framework for network recon. It relies on open-source well-known tools (Nmap, Masscan, ZGrab2, ZDNS and Zeek (Bro)) to gather data (network intelligence), stores it in a database (MongoDB is the recommended backend), and provides tools to analyze it.It includes a Web interface aimed at analyzing Nmap scan results (since it relies on a database, it can be much. Additional Python Testing Framework. So far we have reviewed the most popular Python Testing Framework. There are few more names on this list which might become popular in the future. #7) Behave. Behave is referred to as BDD (Behavior Driven Development) test framework that is also used for Black box testing. Behave uses the natural language.
Robot Framework (RF) Robot Framework (RF) is an open source test automation framework for acceptance testing, acceptance test-driven development (ATDD) and robotic process automation (RPA). Its core is implemented in Python, but can also run on Jython (Java implementation of Python) and IronPython (Python for .NET framework). To run it you will need to install Python version 2.7.14 or higher NeuroLab is a simple and powerful Neural Network Library for Python. This library contains based neural networks, train algorithms and flexible framework to create and explore other networks. It supports neural network types such as single layer perceptron, multilayer feedforward perceptron, competing layer (Kohonen Layer), Elman Recurrent.
NetworkX ist eine freie Python-Bibliothek auf dem Gebiet der Graphentheorie und Netzwerke.Aufgrund der Verwendung einer reinen Python-Datenstruktur ist NetworkX ein recht effizientes, sehr skalierbares, hochportables Framework für die Analyse von sozialen und anderen Netzwerken.. Eigenschaften. Klassen für gerichtete und ungerichtete Graphen. A Powerful, Flexible, and Intuitive Framework for Neural Networks. Get Started; Learn More; Important Chainer is under the maintenance phase. Read the blog. Bridge the gap between algorithms and implementations of deep learning . Powerful. Chainer supports CUDA computation. It only requires a few lines of code to leverage a GPU. It also runs on multiple GPUs with little effort. Flexible. 2. Keras Python. A minimalist, modular, Neural Network library, Keras uses Theano or TensorFlow as a backend. It makes it easy and faster to experiment and implement ideas into results Full-Stack Python Frameworks Django. Django is the most popular full-stack framework for Python. It has a well-deserved reputation for being highly productive when building complex web apps. Dubbed the web framework for perfectionists with deadlines, its focus is rapid development with well-documented options for common cases. Django has been around for more than a decade (first release in. Twisted Network Programming Essentials Abe Fettig . 0596100329, O'Reilly, 236 pages (October 2005) . Task-oriented look at Twisted, a Python-based network application framework. Table of contents and sample chapter
. Sign-up here. About Me: My name is Kirk Byers. I am a CCIE (emeritus) in routing and switching and have extensive Python experience. I am the creator of the Netmiko Python library and also one of the core maintainers of the NAPALM project. I run various courses teaching Python, Nornir, and Ansible to network engineers. About Me: My name is. Scapy is a powerful interactive packet manipulation program. It is able to forge or decode packets of a wide number of protocols, send them on the wire, capture them, match requests and replies, and much more. It can easily handle most classical tasks like scanning, tracerouting, probing, unit tests, attacks or network discovery (it can replace. modAL - a modular active learning framework for Python3. Sparkit-learn - PySpark + Scikit-learn = Sparkit-learn. mlpack - a scalable C++ machine learning library (Python bindings) dlib - A toolkit for making real world machine learning and data analysis applications in C++ (Python bindings) MLxtend - extension and helper modules for Python's. 10-PyGUI. The Python GUI Project, aka PyGUI framework, is a simple API for developers to create user interfaces using native elements for Python applications. As a lightweight API, not a lot of code is needed between the app and the target platform, making it far more efficient than many of the other frameworks on this list Artificial Neural Network with Python using Keras library. May 10, 2021. June 1, 2020 by Dibyendu Deb. Artificial Neural Network (ANN) as its name suggests it mimics the neural network of our brain hence it is artificial. The human brain has a highly complicated network of nerve cells to carry the sensation to its designated section of the brain
This Python 2/3 package is an amalgamation of peer-to-peer communication functionality from Dispersy and Tribler, developed over the last 13 years by students and employees of the Delft University of Technology. The IPv8 library allows you to easily create network overlays on which to build your own applications Twisted, a networking framework for Python; VPython, the Python programming language plus a 3D graphics module called Visual; Embedded as a scripting language. Python is, or can be used as the scripting language in these notable software products: Abaqus (Finite Element Software) ADvantage Framework ; Amarok; ArcGIS, a prominent GIS platform, allows extensive modelling using Python; Autodesk. IVRE - A Python network recon framework, based on Nmap, Bro & p0f. IVRE (Instrument de veille sur les réseaux extérieurs) or DRUNK (Dynamic Recon of UNKnown networks) is a network recon framework, including two modules for passive recon (one p0f -based and one Bro -based) and one module for active recon (mostly Nmap -based, with a bit of ZMap )
TensorFlow is an end-to-end open source platform for machine learning. It has a comprehensive, flexible ecosystem of tools, libraries and community resources that lets researchers push the state-of-the-art in ML and developers easily build and deploy ML powered applications Arbeiten mit Python in Visual Studio unter Windows. 06/05/2019; 6 Minuten Lesedauer; J; o; In diesem Artikel. Python ist eine beliebte Programmiersprache, die zuverlässig, flexibel, leicht zu erlernen und für alle Betriebssysteme kostenlos ist und sowohl von einer starken Entwicklercommunity als auch vielen kostenlosen Bibliotheken unterstützt wird ML.NET has been designed as an extensible platform so that you can consume other popular ML frameworks (TensorFlow, ONNX, Infer.NET, and more) and have access to even more machine learning scenarios, like image classification, object detection, and more. Data sourced from Machine Learning at Microsoft with ML.NET paper. Results for sentiment analysis, using ~900 MB of an Amazon review dataset. Sanic is a Python 3.6+ web server and web framework designed to go fast. It provides a way to get a highly performant HTTP server up and running fast, while also making it easy to build, expand, and eventually scale. Sanic aspires to be as simple as possible while delivering the performance that you require
This Robot framework tutorial will help you run your first Selenium testing script with Python. Further, we will look into running automation scripts for more complex scenarios using Robot and Selenium. Selenium would be used to implement automated browser testing using keyword driven testing with Robot in Python Haben die &ldquo allerdings Vorkenntnisse in Webentwicklung mit Python und Django Framework, sollte der Anfang gekürzt werden. Eine Inhouse-Bildungsmaßnahme lohnt sich bei mehr als 3 Seminarteilnehmern. Die Inhouse-Schulungen zum Thema Webentwicklung mit Python und Django Framework finden bisweilen in der Nähe von Bremen, Dortmund, Wuppertal, Frankfurt, Hannover, Hamburg, Essen, Düsseldorf. Python GUI Framework encourages us to learn more about Python programming. XML documents, network, databases, and GUI. A key feature of PySide is its API compatibility with PyQt4, so if you wish to migrate to PySide then the process will be hassle-free. Conclusion. These are some of the widely used and best Python GUI frameworks available. These frameworks help developers create GUI. Python AI: Starting to Build Your First Neural Network. The first step in building a neural network is generating an output from input data. You'll do that by creating a weighted sum of the variables. The first thing you'll need to do is represent the inputs with Python and NumPy
The recording of the network programmability streamwhich occurred on 2018/07/01On this stream we had the first look at Nornir - Python automation framework w.. .net-basedIronPython and Java-basedJython.Robot Framework uses Keyword style to write test cases. It provides easily understandable HTML reports and screenshots. The Robot framework has a rich API ecosystem that allows smooth integration with third-party tools. It is very well-documented. It follows a keyword-based, data-driven, and Behaviour. It's is a fairly well known python unit test framework, and can run doctests, unittests, and no boilerplate tests. It is a good candidate for a go-to test framework. I think a smart developer should get familiar doctest, unittest, pytest, and nose. Then decide if one of those makes the most sense for them, or if they want to keep looking for features only found in other frameworks. We will discuss another automation framework written in Python, Ansible, in Chapter 4, The Python Automation Framework - Ansible Basics, and Chapter 5, The Python Automation Framework - Beyond Basics. I wanted to introduce the framework in this chapter as a way to demonstrate another way to automate devices with low-level interaction. However, if you are just starting out on the automation.
Twisted Python, a framework for asynchronous network programming. Scientific and Numeric. Python is widely used in scientific and numeric computing: SciPy is a collection of packages for mathematics, science, and engineering. Pandas is a data analysis and modeling library. IPython is a powerful interactive shell that features easy editing and recording of a work session, and supports. Python Web Frameworks. This report surveys 30 Python web frameworks that have more than 1,000 monthly downloads and provides a deeper look into six of the most widely used. This is the full ebook Python Web Frameworks, by Carlos De La Guardia. A downloadable edition of this ebook is also available GLES2 Python framework for NUI 19 July 2011 - Mathieu Virbel RMLL 2011 in Strasbourg, France Lightning talk about Kivy 22 June 2011 - Mathieu Virbel Europython 2011 in Florence, Italia Get the kivy.org source code. Contact us. The Nornir Python automation framework is written in Python and designed to be used for network automation tasks. It is much faster and gives you more flexibility than it's friend Ansible. Ansible, which is also written in Python is currently the most popular network automation tool in use today but it does have some limitations which Nornir. Flask is a popular web development framework for Python. We just published a course on the freeCodeCamp.org YouTube channel that will help you learn Flask by building your own e-commerce platform with its own robust authentication system. The course was developed by Jim from JimShapedCoding. Jim has made man
This Robot framework tutorial will help you run your first Selenium testing script with Python. Further, we will look into running automation scripts for more complex scenarios using Robot and Selenium. Selenium would be used to implement automated browser testing using keyword driven testing with Robot in Python Bottle framework is an MVC kind framework that contains Models, Views, and Controllers. In our project, we can see various Python files under the Models folder and Views folder. We have some controller files also. Routes.py is the main controller file and it will control the routing part of our application. If you look at the requirements.txt. Downloads for building and running applications with .NET Framework 4.8 . Get web installer, offline installer, and language pack downloads for .NET Framework subtest - python test framework example. Hat Python etwas wie Capybara/Gurke? (5) Ruby hat diese großartige Abstraktionsschicht auf Selenium namens Capybara, die Sie für Funktions-, Akzeptanz- und Integrationstests verwenden können. Es gibt auch eine andere Bibliothek namens Cucumber, die einen Schritt weiter geht und Sie Tests auf Englisch.
Python And Flask Framework Complete Course For Beginners | Udemy. Preview this course. Current price $14.99. Original Price $94.99. Discount 84% off. Add to cart. Buy now gpg --verify Python-3.6.2.tgz.asc Note that you must use the name of the signature file, and you should use the one that's appropriate to the download you're verifying. (These instructions are geared to GnuPG and Unix command-line users.) Other Useful Items. Looking for 3rd party Python modules? The Package Index has many of them Django's template language is designed to strike a balance between power and ease. It's designed to feel comfortable and easy-to-learn to those used to working with HTML, like designers and front-end developers. But it is also flexible and highly extensible, allowing developers to augment the template language as needed. Read more The python framework helps in automating the testing process, which results in reducing the cost associated with manual testing and making the testing process quicker and more efficient. Test Automation Frameworks supports test cases by designing the scripts for testing, including methodology and create possibilities for testing iterations to make the ultimate process well structured. Test. | https://blaguekluc.com/artificial-neural-network/pb651628dw9h |
BACKGROUND OF THE INVENTION
SUMMARY OF THE INVENTION
BRIEF DESCRIPTION OF THE DRAWINGS
DESCRIPTION OF THE PREFERRED EMBODIMENTS
(A) Encryption parameter coincidence control
(1) COUNT-C
(2) BEARER, LENGTH
(3) DIRECTION
(4) CK
(B) Overall sequence
This invention relates to a wireless communication system and encryption control method to perform encryption of data in the wireless circuits of a wireless network, and in particular relates to a wireless communication system and encryption control method for performance of encryption processing between an originating mobile terminal and a terminating mobile terminal, and not in a wireless network control device (Radio Network Controller, RNC) when the originating mobile terminal (UE) and terminating mobile terminal (UE) are in the same network.
Specifications for wireless communication systems employing the W-CDMA method have been established by the 3GPP (3rd Generation Partnership Project), and actual services are now being initiated within Japan as well as elsewhere. Fig. 12 summarizes the configuration of a wireless communication system, comprising an upper-level network (Core Network, CN) 1, wireless network control devices (Radio Network Controller, RNC) 2, 3, wireless base stations (NodeB) 4a through 4c and 5a through 5c, and mobile equipment (User Equipment, UE) 6. The network comprising the RNCs in the CN and the plurality of NodeBs under the RNCs is called a UTRAN (UMTS Terrestrial Radio Access Network). A MSC (Mobile Switching Center) 1a which performs call connection control, service control, position control and similar for user equipment, exists in the core network 1. A UE and NodeB are connected by a Uu interface, and the physical bearer is wireless (wireless interval). An Iub interface, Iu interface, and Iur interface are connected between a NodeB and RNC, RNC and CN, and RNC and RNC, respectively, and the physical bearer is wired (wired interval). The direction of data flow from the CN to the UE is defined as the downlink (DL) direction, and the opposite direction, from the UE to the CN, is the uplink (UL) direction.
W-CDMA Mobile Communication System
In order to prevent illicit interception by third parties in the above network, encryption is applied to user data between a UE and the UTRAN, to control information, and to TMSI (Temporary Mobile Subscriber Identity) information, which is a temporary user identifier, and similar. For example, in a 3GPP system the KASUMI algorithm is adopted to apply encryption to information. Fig. 13 explains a specific method of applying encryption; this is an example of an uplink (UL) in which encryption is applied to data in the UE transmission portion, and the data is decrypted in the receiving portion of the RNC (see for example Keiji Tachikawa, , Maruzen, June 25 2001, pp. 156-157, Figs. 3-60, Tables 3-18).
An encryption processing portion CPH is configured similarly in the UE and UTRAN, and comprises an encryption code generation block 7 which uses encryption parameters to generate an encryption code (keystream block) KSB, and a computation portion 8 which computes the exclusive logical sum of the encryption code and the data for processing DT. The encryption parameters necessary for encryption code generation are COUNT-C, BEARER, DIRECTION, LENGTH and CK, as shown in Fig. 14; using these encryption parameters, the encryption code KSB is generated according to the f8 algorithm (defined by 3GPP). The same encryption parameters are used by the UE and UTRAN, and only COUNT-C changes according to conditions; the other parameters have fixed values. COUNT-C is a 32-bit counter value; BEARER is a 5-bit bearer identifier; DIRECTION is a single bit indicating the transmission direction (UL or DL); CK is a 128-bit secret key (encryption key); and LENGTH is the bit length of data to be ciphered. Counters are provided in both the UE and UTRAN, and count clock signals with the same period.
The encryption processing portion CPH on the transmission side performs ciphering of data by computing, in bit units, the exclusive logical sum of the encryption code KSB and the data portion (unciphered MAC SDU) DT which is to be encrypted, and transmits the ciphered data (ciphered MAC SDU) CDT. The encryption processing portion CPH on the receiving side deciphers the data by computing, in bit units, the exclusive logical sum of the encryption code KSB and the received ciphered data (ciphered MAC SDU) CDT, and outputs the deciphered data (unciphered MAC SDU) DT.
In the 3GPP system, of the encryption parameters, the count value COUNT-C of the counters comprises a long-period sequence number SN (=HFN) and a short-period sequence number SN (=MAC CFN). Fig. 15 explains the COUNT-C parameter, comprising a 24-bit long-period sequence number SN (=HFN) and an 8-bit short-period sequence number SN (=CFN); the long-period sequence number HFN is incremented (increased) upon each cycle of the short-period sequence number CFN. However, incrementing is performed after the encryption activation time, described below, is set.
Fig. 16 explains a simple encryption execution sequence for the DTCH of a CS (circuit switched service) call between a UE and the UTRAN (for example, an RNC); (1) due to the CS call, an RRC connection setup sequence between the UE and UTRAN is executed, and a signaling connection (DCCH) is established (S1), and (2) then, a UE-UTRAN wireless bearer setup sequence (DTCH setup sequence) is executed, to set up a voice call connection (S2). Here DTCH is an individual traffic channel for data transmission/reception (dedicated traffic channel), and DCCH is an individual control channel for control information transmission/reception (dedicated control channel).
As explained in Fig. 15, the COUNT-C parameter for CS calls uses an 8-bit CFN (Connection Frame Number) has the short-period sequence number. The CFN takes values from 0 to 255, and is incremented in 10 ms cycles. This short-period sequence number CFN and the long-period sequence number HFN are controlled so as to be the same values in the UE and UTRAN.
With respect to UL (uplink) encryption, in the second half of the wireless bearer setup sequence (DTCH setup sequence) S2 of Fig. 16, UTRAN sends a Radio Bearer Setup message to the UE. The Radio Bearer Setup message comprises 1) ciphering mode info, specifying an encryption algorithm and similar, and 2) activation time, BEARER, and LENGTH, indicating the encryption initiation point (time of initiation of encryption). In the example of Fig. 16, the activation time is CFN=12. Consequently when the short-period sequence number CFN of the COUNT-C parameter in the UE and UTRAN becomes 12, thereafter encryption processing synchronized between the UE and UTRAN can be begun. Further, each time the short-period sequence number CFN overflows (exceeds 255), the long-period sequence numbers HFN in the UE and UTRAN are both incremented, so that the COUNT-C parameter has the same value in UE and UTRAN, and correct synchronized encryption processing can be continued. Processing is similar for the DL (downlink) direction; information is passed in the radio bearer setup, and the DL encryption timing is set to the activation time to begin encryption processing.
In current 3GPP systems, in order to prevent the interception of data during wireless communication, transmission data is encrypted between the originating-side UE and RNC, and between the terminating-side UE and RNC. That is, the originating-side UE encrypts the data and sends the data to the originating RNC; the originating-side RNC decrypts the data and transmits the data to the receiving-side RNC; the terminating-side RNC again encrypts the data and transmits the data to the terminating-side UE; and the terminating-side terminal decrypts the data.
The reason for decryption by the originating-side RNC is that the encryption parameters used by the originating-side UE and RNC and the encryption parameters used by the terminating-side UE and RNC are different, so that if the originating-side RNC does not decrypt the data, decryption on the terminating side becomes impossible. As another reason, because a fixed terminal has no decryption functions, if the data is not decrypted by the originating-side RNC, a fixed terminal, upon receiving encrypted data, cannot perform decryption.
From the above, even when an originating terminal and a terminating terminal of the prior art exist in the same network (for example, when associated with an area managed by the same RNC, or when associated with an area managed by the same MSC), processing to encrypt/decrypt user data must be performed four times, resulting in an increased burden on the RNCs and a decrease in the number of channels (the number of users) which can be accommodated.
Fig. 17A explains encryption/decryption processing when an originating-side terminal (UE) and terminating-side terminal (UE) are both under the same RNC; the originating-side UE 6 uses the encryption parameters A to encrypt the data and transmits the data to the RNC 2 via the node (base station BTS) 4b, and the RNC 2 uses the encryption parameters A with the originating-side UE 6 to perform decryption. After this, the RNC 2 uses the encryption parameters B with the terminating-side UE 6' to encrypt the data and transmits the data to the terminating-side UE 6' via the base station BTS 4c, and the terminating-side UE 6' performs decryption using the encryption parameters B.
Fig. 17B explains encryption/decryption processing when the originating-side UE and terminating-side UE are both under the same MSC; the originating-side UE 6 uses the encryption parameters A to encrypt the data and transmits the data to the RNC 2 via the base station BTS 4b, and the RNC 2 uses the encryption parameters A with the originating-side UE 6 to perform decryption and transmits the data to the terminating-side RNC 3. The terminating-side RNC 3 uses the encryption parameters B with the terminating-side UE 6' to encrypt the received data and transmits the data to the terminating-side UE 6' via the base station BTS 5c, and the terminating-side UE 6' uses the encryption parameters B to perform decryption.
As described above, even in communication over the same network, encryption/decryption processing of user data must be performed four times, and moreover RNCs perform encryption/decryption processing two out of these four times, so that the burden on the RNCs is increased and the number of channels (number of users) which can be accommodated is decreased. If user data is sent over different networks, RNCs must perform encryption/decryption processing; but if communication is between two UEs over the same network, there should be no need for intermediate equipment to perform encryption/decryption processing.
This invention was devised in light of these problems, and has as an object elimination of the need for an RNC to perform encryption/decryption processing when the originating terminal and terminating terminal are both in the same network.
Another object of this invention is the ability for the originating terminal and terminating terminal to each perform encryption/decryption processing of user data one time each, for a total of two times, when both the originating terminal and the terminating terminal are in the same network, so that the burden on RNCs can be alleviated and the number of channels (number of users) accommodated can be increased.
In this invention, the above objects are achieved by an encryption control method in a wireless communication system in which encryption parameters are used to encrypt data in wireless communication, and the encryption parameters are used to perform decryption.
A first encryption control method has a step of judging whether the originating mobile terminal and terminating mobile terminal exist in the same network; a step, if they exist in the same network, of passing data through the network-side equipment without performing encryption/decryption processing; and a step of performing encryption/decryption processing only at the originating mobile terminal and the terminating mobile terminal.
A second encryption control method has a step of making encryption parameters in the originating mobile terminal identical with the encryption parameters in the terminating mobile terminal; a step of having the originating mobile terminal perform data encryption processing using the encryption parameters; and a step of having the terminating mobile terminal perform decryption processing of the received data using the encryption parameters.
A third encryption control method has a step of judging whether the originating mobile terminal and terminating mobile terminal exist in the same network; and a step, if they exist in the same network, of decrypting the encryption performed by the above originating mobile terminal, not in a network-side device, but in the terminating mobile terminal.
In this invention, the above objects are achieved by a wireless communication system in which encryption parameters are used in wireless communication to encrypt data, and the encryption parameters are used to decrypt the data. This wireless communication system comprises control devices in a core network to judge whether an originating mobile terminal and terminating mobile terminal exist in the same network; wireless network control devices to pass data through, without performing encryption/decryption processing, when the originating mobile terminal and terminating mobile terminal exist in the same network; an originating mobile terminal which uses the encryption parameters to perform encryption processing of transmission data and which transmits the encrypted data; and a terminating mobile terminal which uses the encryption parameters to perform decryption of received data. Further, the wireless communication system comprises means for making the encryption parameters in the originating mobile terminal identical with the encryption parameters in the terminating mobile terminal.
In the above wireless communication system, when the originating mobile terminal and the terminating mobile terminal exist in the same network, the above control device of the core network generates an encryption key which is an encryption parameter and transmits the encryption key to the wireless network control devices on the originating side and on the terminating side; the originating-side and terminating-side wireless network control devices receive the encryption key and transmit the key to the originating mobile terminal and to the terminating mobile terminal respectively, so that the encryption parameters of the originating mobile terminal are identical with the encryption parameters of the terminating mobile terminal. When the originating mobile terminal and terminating mobile terminal exist in the same network, the originating-side and terminating-side wireless network control devices pass through data without performing decryption or encryption.
In this invention, the above objects are achieved by means of network control devices in a wireless communication system in which, upon wireless communication, encryption parameters are used to encrypt data, and the encryption parameters are used to decrypt the data. A network control device of this invention comprises means for judging whether an originating mobile terminal and a terminating mobile terminal exist in the same network; means for making the encryption parameters in the originating mobile terminal identical with the encryption parameters in the terminating mobile terminal, when the originating mobile terminal and the terminating mobile terminal exist in the same network; and means for passing data through without performing encryption/decryption processing, when the originating mobile terminal and the terminating mobile terminal exist in the same network.
In this invention, the above objects are achieved by means of mobile terminals in a wireless communication system in which, upon wireless communication, encryption parameters are used to encrypt data, and the encryption parameters are used to decrypt the data. The mobile terminals of this invention comprise means, upon call termination, when the mobile terminal exists in the same network as the originating mobile terminal, for making the encryption parameters identical with the encryption parameters of the originating mobile terminal; means for using the encryption parameters to generate an encryption code and for using the encryption code to decrypt data; and means for performing normal decryption when the originating mobile terminal and the terminating mobile terminal do not exist in the same network.
By means of this invention, when an originating mobile terminal and a terminating mobile terminal exist in the same network, network-side devices pass data through without performing encryption/decryption processing, and encryption/decryption __ processing is performed only by the originating mobile terminal and by the terminating mobile terminal, so that the RNCs need not perform encryption/decryption processing, the burden on the RNCs is alleviated and the number of channels (number of users) accommodated can be increased.
Other features and advantages of the present invention will be apparent from the following description, taken in conjunction with the accompanying drawings.
Fig. 1 is a block diagram of a wireless communication system in a case in which an originating mobile terminal and a terminating mobile terminal exist in the same network;
Fig. 2 is a sequence for making an encryption parameter COUNT-C on the originating mobile terminal identical with that on the terminating mobile terminal;
Fig. 3 is a setup sequence for the encryption parameters BEARER and LENGTH;
Fig. 4 is a sequence for making a CK value on the originating side identical with that on the terminating side;
Fig. 5 is another sequence for making a CK value on the originating side identical with that on the terminating side;
Fig. 6 explains the overall sequence;
Fig. 7 explains another overall sequence;
Fig. 8 explains UE, RNC, and MSC encryption control;
Fig. 9 shows the processing flow of the originating-side RNC;
Fig. 10 shows the processing flow of the terminating-side RNC;
Fig. 11 shows the processing flow of the terminating mobile terminal (UE);
Fig. 12 shows in summary the configuration of a wireless communication system;
Fig. 13 explains a specific encryption method;
Fig. 14 explains encryption parameters;
Fig. 15 explains the COUNT-C parameter;
Fig. 16 shows a simple encryption execution sequence for DTCH in a CS (Circuit-switched Service) call between a UE and UTRAN (e.g. RNC); and,
Fig. 17 explains encryption/decryption processing in a case in which an originating terminal (UE) and terminating terminal (UE) both exist within the same network.
Fig. 1 is a block diagram of a wireless communication system in a case in which an originating mobile terminal and a terminating mobile terminal exist in the same network; (A) is the case in which the originating mobile terminal (UE) 11 and terminating mobile terminal (UE) 21 exist in an area managed by the RNC 31, and (B) is the case in which the originating mobile terminal 11 and terminating mobile terminal 21 exist in an area managed by the MSC 41.
The MSC 41 makes reference the destination telephone number comprised by the setup message input from the originating mobile terminal 11 at the time of call origination and the location table holding telephone numbers of mobile terminals being managed, and investigates whether the terminating mobile terminal 21 exists within the same network as the originating mobile terminal 11. If the originating mobile terminal 11 and terminating mobile terminal 21 exist in a same network and, as shown in (A), they are managed by the same RNC 31, the MSC 41 notifies the RNC 31 of this fact, and the RNC 31 makes the encryption parameters of the originating mobile terminal 11 identical with those of the terminating mobile terminal 21. The originating mobile terminal 11 uses the encryption parameters to perform encryption of the transmission data, which is input to the RNC 31 via the base station BTS 51. The RNC 31 transmits the received information unmodified, without performing decryption, to the terminating mobile terminal 21 via the terminating-side base station BTS 52. The terminating mobile terminal 21 uses the same encryption parameters as the encryption parameters of the originating mobile terminal to perform decryption of the received data. When data is transmitted from the UE 21 to the UE 11 also, encryption control similar to that described above is performed.
On the other hand, when the originating mobile terminal 11 and terminating mobile terminal 21 exist in the same network and are being managed by the same MSC 41 as shown in (B), the MSC 41 notifies the RNCs 31, 32 on the originating and terminating sides of this fact, and cooperates with the RNCs 31, 32 to make the encryption parameters of the originating mobile terminal 11 identical with those of the terminating mobile terminal 21. The originating mobile terminal 11 uses the encryption parameters to perform encryption processing of transmission data, and inputs the encrypted data to the originating-side RNC 31 via the base station BTS 51. The originating-side RNC 31 does not perform encryption processing (decryption), but passes through the received data without modification, transmitting the data to the terminating-side RNC 32. The terminating-side RNC 32 also does not perform encryption processing, but passes through the received data without modification, transmitting the data to the terminating mobile terminal 21 via the terminating-side base station BTS 52. The terminating mobile terminal 21 uses the same encryption parameters as the encryption parameters of the originating mobile terminal to perform decryption processing of the received data. During data transmission from the UE 21 to the UE 11 also, encryption control similar to that described above is performed.
By this means, when the originating mobile terminal 11 and the terminating mobile terminal 21 exist in the same network, the RNCs 31, 32 pass data through without performing encryption processing, and encryption processing need only be performed by the mobile terminals 11, 21, so that the burden on the RNCs 31, 32 is alleviated, and the number of channels (number of users) which can be accommodated can be increased.
The encryption mechanism in a 3GPP system uses encryption parameters such as those shown in Fig. 14. As explained in Fig. 1, if the originating mobile terminal (UE) 11 and terminating mobile terminal (UE) 21 use the same encryption parameters, normal decryption and communication are possible on the data receiving side without encryption/decryption processing by RNCs. Hence in this invention, the encryption parameters of the originating mobile terminal (UE) 11 the encryption parameters of the terminating mobile terminal (UE) 21 are made identical with each other, so that encryption/decryption processing by the RNCs 31, 32 is not necessary.
Below, the method for making the encryption parameters of the mobile terminal (UE) 11 identical with those of the mobile terminal(UE) 21 is explained.
As explained in Fig. 15, COUNT-C comprises a long-period SN (HFN) and short-period SN (CFN). If encryption/decryption processing is not performed by the RNCs 31, 32, but is performed only by the UEs 11, 21, then the two UEs must both use the same value of COUNT-C. The method used to synchronize COUNT-C is explained below.
As shown in Fig. 2, the UEs 11, 21 notify the RNCs 31, 32 of the long-period HFNs through RRC Connection Setup Complete. Also, the RNCs 31, 32 notify the UEs 11, 21 (or, the UEs notify the RNCs) of the activation time (CFN), indicating the point of encryption initiation, in the Radio Bearer Setup (Complete) message.
The originating-side RNC 31 notifies the terminating-side RNC 32 of the value of COUNT-C (=C1=HFN+CFN) used on the originating side in the RNSAP (Radio Network Subsystem Application Part) message. The terminating-side RNC 32 computes the difference ΔC between the COUNT-C value (=C2) set on the terminating side and C1 (=C1-C2), and notifies the terminating-side UE 21 of this value in an RRC message. On receiving this message, the UE 21 adds this difference ΔC to the COUNT-C value to be set on the terminating side (=C2), and takes the addition result C2+ΔC (=C1) to be the value of the encryption parameter COUNT-C. As a result, the terminating-side UE 21 uses the same value of COUNT-C as the originating-side UE 11, so that encryption/decryption processing can be executed.
The terminating-side RNC 32 notifies the terminating-side UE 21 of the COUNT-C value (=C1) received from the originating-side RNC 31 without modification, and the terminating-side UE 21 can perform processing with C2=C1.
BEARER takes a value according to the service (voice, packet, or similar); for current setup methods, the same bearer is used on both the originating and terminating sides. Because the same service type setup is performed on both the originating and the terminating sides, the same value for LENGTH is similarly used on the originating and on the terminating sides. As shown in Fig. 3, the DCCH parameters (BEARER, LENGTH, activation time) are set by the RNC 31 in a security mode command message to the UE 11, and the DTCH parameters (BEARER, LENGTH, activation time) are set by the RNC 31 in a Radio Bearer Setup message to the UE 11. In the drawing, the originating-side RNC 31 sets the parameters (BEARER, LENGTH, activation time) in the originating-side UE 11; the terminating-side RNC 32 similarly sets the parameters (BEARER, LENGTH, activation time) in the terminating-side UE 21.
DIRECTION indicates either the uplink or downlink direction, and again, the same value must be used on the originating and terminating sides. When performing encryption as shown in Fig. 1, the user data sent as an uplink by the UE 11 on one side is recognized as downlink data by the other UE 21, so that it may be necessary for the terminating-side UE 21 receiving the data to invert the uplink/downlink value for the received data. That is,__ when the terminating terminal 21 performs decryption, the direction should be inverted so that the DIRECTION parameter of the UE 21 is identical with that of the UE 11.
The encryption key CK (Confidential Key) is generated according to a prescribed algorithm using KSI. KSI is an encryption key held in each mobile terminal UE.
As shown in Fig. 3, after establishment of an RRC connection, the UE 11 sends an initial L3 message to the MSC 41, and the MSC computes CK according to a prescribed algorithm using the parameter KSI comprised by this message; the RNC 31 is notified of this CK by a security mode command message. The UE 11 also computes CK using the same algorithm, so that the UE 11 and RNC 31 have the same value of CK. The drawing shows a case in which CK is set in the originating-side RNC 31, but CK can also be set in the terminating-side RNC 32, so that the UE 21 and RNC 32 have the same value of CK.
The CK value held by both the UE 21 and RNC 32 differs from the CK value held by both the UE 11 and RNC 31. If the originating-side UE 11 and terminating-side UE 21 do not exist in the same network, these CK values are used in independent encryption/decryption processing on the originating side and on the terminating side. However, if the originating-side UE 11 and the terminating-side UE 21 exist in the same network, the CK value on the originating side and the CK value on the terminating side must be made identical each other.
Fig. 4 is a sequence making a CK value on the originating side identical with a CK value on the terminating side.
At the time of call origination, the MSC 41 investigates whether the originating mobile terminal (UE) 11 and the terminating mobile terminal (UE) 21 exist in the same network (M-M telephone call judgment), by referencing the destination telephone number comprised by the SETUP message input from the originating mobile terminal 11. If it is judged that the originating mobile terminal 11 and terminating mobile terminal 21 exist in the same network, if for example both mobile terminals are under management of the same MSC 41 as shown in (B) of Fig. 1, the MSC 41 creates a new KSI value for a M-M telephone call, and notifies the RNCs 31, 32 on the originating and terminating sides that the call is an M-M telephone call and provides the newly created KSI value.
The RNCs 31, 32 on the originating and terminating sides, upon receiving this notification, both set encryption/decryption to off (do not perform encryption/decryption processing), and notify the originating mobile terminal 11 and terminating mobile terminal 21 of the newly received KSI value. The originating mobile terminal 11 and terminating mobile terminal 21 use the received KSI value to generate a CK value according to the same CK generation algorithm. By this means, the CK values of the originating mobile terminal 11 and terminating mobile terminal 21 are made identical with each other.
Fig. 5 is another sequence for making a CK value on the originating side identical with a CK value on the terminating side.
The MSC 41 investigates whether the terminating mobile terminal 21 and the originating mobile terminal 11 exist in the same network, by referring to the destination telephone number comprised by the SETUP message input from the originating mobile terminal 11 (M-M telephone call judgment). If the originating mobile terminal 11 and terminating mobile terminal 21 exist in the same network, and if for example both are managed by the same MSC 41 as shown in (B) of Fig. 1, the MSC 41 notifies the originating-side RNC 31 of the fact that the call is an M-M telephone call.
The originating-side RNC 31, on receiving this notification, sets encryption/decryption to off (no encryption/decryption processing is performed), creates the KSI for the M-M telephone call, and notifies the terminating-side RNC 32 of the M-M telephone call and provides the newly created KSI, as well as notifying the originating mobile terminal 11 of the new KSI.
The terminating-side RNC 32, upon receiving this notification, sets encryption/decryption to off (no encryption/decryption processing is performed), and notifies the terminating mobile terminal 21 of the newly created KSI.
The originating mobile terminal 11 and terminating mobile terminal 21 generate a CK value using the new received KSI according to the same CK generation algorithm. By this means, the CK values of the originating mobile terminal 11 and of the terminating mobile terminal 21 are made identical with each other.
Fig. 6 explains the overall sequence. The CK values are assumed to be generated according to Fig. 4.
When a call is originated by the originating mobile terminal (UE) 11, the RRC connection setup sequence between the UE 11 and RNC 31 is executed, a signaling connection (DCCH) is established, and the UE 11 notifies the RNC 31 of the long-period HFN through RRC Connection Setup Complete.
Then, the bearer setup sequence (DTCH sequence) between the UE 11 and RNC 31 is executed. In this sequence, the UE 11 sends an initial L3 message to the MSC 41, the MSC computes the CK value using the KSI parameter comprised by this message according to a prescribed algorithm, and this CK value is sent to the RNC 31 in a security mode command message. The UE 11 also computes the CK value using the same algorithm, so that the UE 11 and RNC 31 hold the same CK value. Then, the RNC 31 sets DCCH parameters (BEARER, LENGTH, activation time) in the UE 11 through a security mode command message.
When DTCH parameter setup is completed, the UE 11 sends a SETUP message to the MSC 41, and the MSC 41 references the destination telephone number comprised by the SETUP message and sends a paging message to the terminating-side RNC 32, upon which the RNC 32 performs paging. As a result of this paging, the terminating mobile terminal (UE) 21 executes an RRC connection setup sequence with the RNC 32, establishes a signaling connection (DCCH), and notifies the RNC 32 of the long-period HFN through RRC Connection Setup Complete.
Next, the bearer setup sequence (DTCH sequence) between the UE 21 and RNC 32 is executed. In this sequence, the UE 21 sends an initial L3 message to the MSC 41, and the MSC 41 uses the KSI parameter comprised by the message to compute the CK value according to a prescribed algorithm, and sends the CK value to the RNC 32 through a security mode command message. The UE 21 also uses the same algorithm to compute the CK value, so that the UE 21 and RNC 32 hold the same CK value. Then, the RNC 32 sets DCCH parameters (BEARER, LENGTH, activation time) in the UE 21 through a security mode command message.
When DTCH parameter setup is completed, the MSC 41 sends a SETUP message to the UE 21. Also, the MSC 41 analyzes the SETUP message received from the UE 11, and investigates whether the terminating mobile terminal (UE) 21 and originating mobile terminal (UE) 11 exist in the same network (M-M telephone call judgment). If the UEs 11, 21 exist in the same network (if for example both are managed by the same MSC 41 as in (B) of Fig. 1), the MSC 41 creates a new KSI for the M-M telephone call, and notifies the RNCs 31, 32 on the originating side and terminating side of the M-M telephone call, providing the newly created KSI.
Upon receiving this notification, the originating-side and terminating-side RNCs 31, 32 both set encryption/decryption to off (no encryption/decryption processing is performed), and notify the UEs 11, 21 of the new KSI value. The UEs 11, 21 each use the new received KSI value to generate a CK value according to the same CK generation algorithm. By this means, the CK values of the UEs 11, 21 become idential.
Then, the originating-side and terminating-side RNCs 31, 32 set the DTCH parameters (BEARER, LENGTH, activation time) in the UEs 11, 21 through Radio Bearer Setup messages. Following this, the originating-side RNC 31 notifies the terminating-side RNC 32 of the COUNT-C value (=C1=HFN+CFN) used on the originating side in an RNSAP (Radio Network Subsystem Application Part) message. The terminating-side RNC 32 computes the difference ΔC (=C1-C2) between the COUNT-C value to be set on the terminating side (=C2) and C1, and notifies the terminating-side UE 21 of this value in an RRC message. Upon receiving this message, the UE 21 adds this difference ΔC to the COUNT-C value to be set on the terminating side (=C2), and takes the addition result, C2+ΔC (=C1), as the COUNT-C encryption parameter.
Through the above sequence, the DTCH encryption parameters in the originating mobile terminal (UE) 11 are made identical with those in the terminating mobile terminal (UE) 21. Thereafter, the UE 11 uses the encryption parameters to generate an encryption code, encrypts transmission data using this encryption code, and transmits the encrypted data. On the other hand, the UE 21 uses these encryption parameters to generate the same encryption code, and uses this encryption code to decrypt received data.
Fig. 7 explains another overall sequence, in a case in which CK values are made identical in accordance with Fig. 5.
Fig. 8 explains encryption control of the UEs, RNCs and MSCs, and shows control related to the originating side; the configuration on the receiving side is similar.
The M-M telephone call judgment portion 41a of the MSC 41 analyzes the SETUP message and judges that the call is an M-M telephone call, and sends the judgment result to the new KSI generation portion 41b and to the encryption control portion 31a of the RNC 31. In the case of an M-M telephone call, the new KSI generation portion 41b generates a new KSI, and sends this to the encryption control portion 31a of the RNC 31.
The encryption control portions 11a and 31a of the UE 11 and RNC 31 respectively acquire or generate encryption parameters according to the sequence of Fig. 6, and input the encryption parameters to the encryption code generation portions 11b, 31b; in addition, in the case of an M-M telephone call the encryption control portion 31a sets encryption/decryption to off, but if other than an M-M telephone call, sets encryption/decryption to on.
The encryption code generation portion 11b of the originating mobile terminal (UE) 11 uses the encryption parameters to generate an encryption code, and the encryption processing portion 11c uses this encryption code to encrypt transmission data, and transmits the data. The encryption code generation portion 31b of the RNC 31 uses the encryption parameters to generate an encryption code, which is input to the encryption/decryption processing portion 31d, and the receiving portion 31c receives data from the UE 11 and inputs the data to the encryption/decryption processing portion 31d. If the call is not an M-M telephone call (encryption/decryption set to on), the encryption/decryption processing portion 31d uses the encryption code to decrypt the encrypted received data, and transmits the data to the transmission portion 31e. If however the call is an M-M telephone call (encryption/decryption set to off), the encryption/decryption processing portion 31d transmits the received data without modification to the transmission portion 31e, without performing decryption.
Although not shown, if the call is not an M-M telephone call (encryption/decryption set to on), the receiving-side RNC uses the encryption code to perform decryption of the received data and transmits the data to the terminating mobile terminal (UE), whereas if the call is an M-M telephone call (encryption/decryption set to off), the received data is transmitted without modification to the terminating mobile terminal (UE), without performing decryption. The terminating mobile terminal (UE) uses the encryption parameters to generate an encryption code, and uses this encryption code to decrypt the received data, which is output.
Fig. 9 shows the processing flow of the originating-side RNC 31.
All encryption parameters are acquired or generated according to the sequence of Fig. 6 (step 101). A judgment is then made as to whether the call is an M-M telephone call and a new KSI has been received from the MSC 41 (step 102); if not an M-M call, encryption/decryption is set to on (step 103), and then the encryption parameters are used to generate an encryption code, and this encryption code is used to decrypt received data, and the data received from the originating mobile terminal 11 is transmitted (step 104). On the other hand, if in step 102 the call is judged to be an M-M telephone call, encryption/decryption is set to off (step 105). The KSI received from the MSC 41 is transmitted to the originating mobile terminal (UE) 11 (step 106), and thereafter the count C1 encryption parameter is transmitted to the terminating-side RNC 32 (step 107). Thereafter, data received from the originating mobile terminal 11 is transmitted without modification, and without performing decryption (step 104).
Fig. 10 shows the processing flow of the terminating-side RNC 32.
Encryption parameters are acquired or generated according to the sequence of Fig. 6 (step 201). Then, a judgment is made as to whether the call is an M-M telephone call and a new KSI has been received from the MSC 41 (step 202); if not an M-M telephone call, encryption/decryption is set to on (step 203), and then the encryption parameters are used to generate an encryption code, the encryption code is used to encrypt the received data, and the data is transmitted to the terminating mobile terminal (UE) 21 (step 204).
On the other hand, if in step 202 it is judged that the call is an M-M telephone call, encryption/decryption is set to off (step 205). The KSI received from the MSC 41 is transmitted to the terminating mobile terminal (UE) 21 (step 206), and the count C1 encryption parameter is received from the originating-side RNC 31 (step 207). Then, the terminating-side RNC 32 computes the difference ΔC (=C1-C2) between the value of COUNT-C which is to be set on the terminating side (=C2) and the received value C1 (step 208), and sends this difference in an RRC message to the terminating-side UE 21 (step 209). The UE 21 adds this difference ΔC to COUNT-C (=C2), and takes the addition result C2+ΔC (=C1) to be the encryption parameter COUNT-C.
Subsequently, the terminating-side RNC 32 transmits data received from the originating-side RNC 31 without modification, and without performing encryption (step 204).
Fig. 11 shows the processing flow of the terminating mobile terminal (UE) 21.
Encryption parameters are acquired or generated according to the sequence of Fig. 6 (step 301).
Then a judgment is made as to whether the call is an M-M telephone call and whether a new KSI has been received from the RNC 32 (step 302); if not an M-M telephone call, normal decryption processing is executed (step 303).
If on the other hand the call is an M-M telephone call, a CK value is generated based on the new KSI received (step 304). Also, the received difference ΔC is added to COUNT-C (=C2), and the addition result C2+ΔC (=C1) is taken to be the COUNT-C encryption parameter (step 305). Further, the DIRECTION encryption parameter is inverted ("downlink" is inverted to "uplink") (step 306). Through the above processing, the,eencryptionparameters are the same in the originating mobile terminal 11 and in the terminating mobile terminal 21.
Then, the terminating mobile terminal 21 uses these encryption parameters to generate an encryption code (step 307), and this encryption code is used to decrypt received data, which is output (step 308).
By means of the above invention, if an originating mobile terminal and a terminating mobile terminal exist in the same network, data is passed through without performing encryption/decryption processing in network-side devices (RNCs or similar), and with encryption/decryption processing performed only in the originating-side and terminating-side mobile terminals. Hence there is no longer a need for RNCs to perform encryption/decryption processing, so that the burden on RNCs is alleviated, and the number of channels (number of users) which can be accommodated can be increased.
As many apparently widely different embodiments of the present invention can be made without departing from the spirit and scope thereof, it is to be understood that the invention is not limited to the specific embodiments thereof except as defined in the appended claims. | |
When you come to Unity of Palm Harbor, you notice we have an abundance of green leaves. Relax into your chair and rest your eyes. Imagine yourself walking through our shaded woodland, taking a deep breath, and relaxing into your stroll on the path around the property.
The leaves above, shelter you from the heat of the day. As you walk deeper into the woods, you feel the mild breeze on your arms. You look up and see the leaves welcoming you, waving in the breeze. A peaceful feeling overcomes you, so you close your eyes for a moment. You breathe in the oxygenated air, that the leaves have exhaled for you. Your worries disappear. You feel safe here because the thought of God is all around you.
The color green is everywhere. Green symbolizes growth and the life that engulfs you. Green means the action to go, to do, or to be. Each leaf is taking the action to be, what it is becoming. Each leaf grows, as it reaches out for the nourishment of light. Pick up a leaf, and place it in the palm of your hand. It is a ‘plan,’ in action. Do you see the veins in the leaf? Each vein is a pathway that leads to the coming of the full bloom, an image of its wholeness. Each vein represents a decision you’ve made, to expend your energy, on the path that led you, to where you are today. Are we not the bloom of a divine idea?
Each leaf symbolizes a divine thought. Listen to these Green Leaf Thoughts that we know to be true. ‘Spiritual light gives me the guidance I need,’ ‘Old ways of thinking and feeling, may no longer serve me.’ ‘My spiritual gifts keep me free from habits that limit my growth.’ ‘Each cell of life functions according to its divine pattern.’ ‘When people follow their hearts, they express their highest potential.’
These leaves of Unity have the potential to heal, but there is one leaf that is missing- the one that is right for you. What is that Green Leaf Thought, you know is true? In the Silence, state that divine idea that can take you by the hand, to your pathway home.
The leaves that send their messages from above, guide you to grow in spiritual understanding and see the actions you need to take. Your Green Leaf Thoughts inspire you to affirm: ‘I am always free.’ ‘I yield to my light and joy.’ ‘I yield to the natural processes of my growth.’ ‘I radiate a brilliance that causes others to grow.’ ‘I am awakened to the Presence within.’
Let us now awaken our bodies, and return our consciousness to this time and place. Under the leaves of Unity, we are inspiring examples of our Green Leaf Thoughts. And so it is. | https://unityofpalmharbor.org/green-leaf-thoughts/ |
This invention relates to generally to prosthesis for continuous internal peritoneal dialysis and a continuous method of carrying out peritoneal dialysis. More specifically, this invention relates to artificial kidneys, and more specifically to artificial kidneys implantable within a person""s body with the intent that the patient be free from dialysis and transplantation. The artificial kidneys of this invention employ the normal operation of the person""s body (i.e., breathing cycle of the person) to cause the flow of fluid within the prosthesis for the removal of toxic substances or other fluids from the person""s body. For the treatment of edema states that are refractory to treatment with diuretics the dialysate can be a selected hypertonic solution for removing excess fluids; principally water.
The dialysis art is a highly developed one; providing a variety of teachings for dialyzing a patient.
In accordance with a related dialysis procedure (e.g., hemodialysis) for purifying blood in a patient experiencing kidney failure, the contaminated blood is directed from a blood vessel of the patient""s arm through a dialyzing membrane located extracorporeally of the body, in which the blood gives up its impurities to the dialyzing fluid. The purified blood is then directed back into the patient""s body through another blood vessel. A representative disclosure of a system for use in purifying arterial blood and providing a venous return is disclosed in U.S. Pat. No. 3,579,441, issued to Brown.
The dialysis art also suggests the use of related peritoneal dialysis systems, wherein a dialysate is introduced directly into the abdomen of the patient and functions to receive impurities from the blood at the abdominal capillaries, and then is mechanically removed from the body. Representative peritoneal dialysis systems of this type are disclosed in U.S. Pat. Nos. 4,681,564 (Landreneau); 4,655,762 (Rogers); 4,586,920 (Peabody) and 4,437,856 (Valli).
All of the related art systems known to applicants suffer from one or more disadvantages. For example, a number of prior art systems require that the patient be connected, e.g., xe2x80x9chooked-upxe2x80x9d, to a dialysis machine. This renders the patient immobile during treatment, is expensive to administer, and subjects the patient to a high risk of infection, and even death. Patients are protein restricted, because protein yields toxic degradation products (e.g., nitrogenous wastes) largely responsible for uremia, the state of being in kidney failure. Toxic levels of potassium may also result from the treatment. Moreover, chronic contact of the peritoneum with hypertonic dialysate solutions often creates chronic peritonitis, which is a painful, dangerous condition that interferes with the peritoneal dialysis process.
The absorption of dialysate into the bloodstream interferes with the peritoneum dialysate""s ability to do its job of pulling in fluids. Therefore, peritoneal dialysis relies physiologically on the fact that the dialysis fluid in the abdominal cavity is more viscous or thicker than blood. In other words, the dialysis fluid has a higher osmolality or chemical potential than the bloodstream. This difference in potential causes water and other molecules known to those skilled in the art to diffuse into the abdomen via the semi-permeable membranes of the peritoneum and mesenteric parietes which line the abdominal cavity.
Additionally, all previous modes of dialysis have been essentially intermittent, rather than continuous; resulting in a variety of disturbances to the body""s equilibrium. Patients become either over-hydrated or under-hydrated due to the intermittent process of adding and removing fluids. The systems can not maintain proper blood volume and chemical balance beyond the few hours following the treatment. The treatments sap the patient""s energy and sense of well-being, making the patient look and feel chronically ill, and critically affecting the patient""s lifestyle, happiness and longevity.
With respect to transplantation, the high cost and risks are well known. A match for the patient must be found, which may take years. If a kidney is found, and the patient is still strong enough to receive it, then there is no guarantee that the kidney will be accepted. The patient""s immune system may recognize a kidney transplanted from another as foreign matter and act to combat and reject this perceived invasion. Anti-rejection medication, such as azathioprine, cyclosporine and steroids help to prevent rejection. However, anti-rejection medicines have a large number of side effects. If rejection occurs, treatment is available to possibly reverse the episode, but at the cost of more medication and side effects. With kidney transplantation, about one third of the patients do very well, about one third remain chronically ill, and about one third of the patients die within five years.
A need clearly exists for an artificial kidney, or prosthesis, that is lower in cost than existing systems, that can be utilized with a minimum of risk to the patient, that provides greater freedom of movement for the patient and that allows for the continuous formation of urine as in a normal functioning kidney. Therefore, it would be beneficial to provide a continuous internal peritoneal dialysis prosthesis and method. It would also be beneficial to provide a continuous internal peritoneal dialysis prosthesis and method which employs the normal breathing pattern of the patient to affect the dialysis operation, which is simple in operation and requires relatively few moving parts.
To applicant""s knowledge, prior to this invention, there has been no artificial kidney that is implantable in the body to provide any of the functions normally provided by a healthy kidney. It is to such artificial kidneys that the present invention is directed.
The above and other objects of this invention are achieved, in whole or in part, by a continuous internal peritoneal dialysis prosthesis and method employing an abdominal sac including a dialysate therein, said abdominal sac being adapted to be retained in the abdominal region of a person""s body for receiving unconcentrated urine through the walls of the sac without permitting dialysate to exit from the sac through the walls. The abdominal sac communicates the unconcentrated urine through a section of the patient""s bowel via a conduit that extends through the section of bowel. A region of the conduit within the section of the patient""s bowel includes apertures therein for communicating the unconcentrated urine in the conduit with walls of the section of bowel; thereby employing the natural function of the bowel to concentrate the urine. The prosthesis also includes a connector that is adopted for directing concentrated urine from the bowel to the urinary bladder.
In one preferred prosthesis of this invention, the conduit includes a first conduit section and a second conduit section. The first section communicates the abdominal sac with a pouch adopted to be placed in the thoracic region of the patient""s body. The second conduit section communicates with the pouch and extends through the section of the patient""s bowel. The second conduit section includes apertures for controlling the rate of flow of unconcentrated urine through the bowel so as to provide adequate time for the bowel to provide its required urine concentrating function, and to direct said concentrated urine to the urinary bladder for ultimate excretion by the body.
In the most preferred embodiment of this invention, the distal end of the second conduit communicates with the dialysis sac.
In the most preferred embodiment of this invention, the connecting means to the urinary bladder includes the right ureter connecting the bowel to the urinary bladder and most preferably, the connecting means is through the appendix or cecum.
The continuous internal peritoneal dialysis method of this invention includes the steps of providing an abdominal sac in the peritoneal region of a patient, said sac including a dialysate therein and a wall adopted for permitting unconcentrated urine to pass therethrough into the dialysate in the sac while preventing the escape of dialysate from the sac; directing the unconcentrated urine therein out of the abdominal sac and through a section of a patient""s bowel in which the urine is concentrated, and then directing the concentrated urine into the urinary bladder for subsequent excretion from the human body in a conventional, or normal manner.
In accordance with the preferred method of this invention, a portion of the urine that is not concentrated within the bowel is caused to flow back to the abdominal sac.
In the most preferred method of this invention, the step of directing the unconcentrated urine through the section of bowel is carried out by first directing the unconcentrated urine into a thoracic pouch located in the thoracic region of a patient, the abdominal sac and thoracic pouch being flexible.
Most preferably, the process employs the normal breathing activity of the patient to continuously direct the unconcentrated urine from the abdominal sac to the thoracic pouch and then through the section of bowel.
In another preferred embodiment, a prosthesis for continuous internal peritoneal dialysis comprises a thoracic pouch and first and second conduits. The first conduit communications unconcentrated urine and dialysate from the abdominal region of a patient""s body through the patient""s diaphragm to the thoracic region of the body. The thoracic pouch is adapted to be retained in the thoracic region of the patient""s body, and communicates with the first conduit to receive the unconcentrated urine and dialysate from the abdominal region. The second conduit extends from the thoracic pouch through the patient""s diaphragm and a section of the patient""s bowel. The second conduit communicates the unconcentrated urine and dialysate from the thoracic pouch with walls of the section of the bowel for concentrating the urine within the section of bowel. The section of bowel includes an exit port for directing the concentrated urine from the section of bowel to the urinary bladder of the patient.
In another preferred embodiment, an abdominal sac for internal peritoneal dialysis includes a semi-permeable membrane wall and is arranged for having a dialysate therein. The sac is adapted to be retained in the abdominal region of a patient""s body for receiving unconcentrated urine through the semi-permeable membrane wall without permitting the diaysate to exit from the abdominal sac through the wall. The dialysate asserts a chemical potential to draw in the unconcentrated urine by osmotic pressure through the semi-permeable membrane wall. The sac includes an extension expanding into a section of the patient""s bowel. The extension includes the semi-permeable membrane wall for permitting the received unconcentrated urine to exit into the section of bowel for concentrating the urine. The section of bowel includes an exit port for directing the concentrated urine from the section of bowel into the urinary bladder of the patient.
Further scope of applicability of the present invention will become apparent from the description given hereinafter. However, it should be understood that the detailed description and specific examples, while indicating preferred embodiments of the invention, are given by way of illustration only, since the invention will become apparent to those skilled in the art from this detailed description.
| |
Lysosomal adaptation is a cellular physiological process in which the number and function of lysosomes are regulated at the transcriptional and post-transcriptional levels in response to extracellular and/or intracellular cues or lysosomal damage. Imiquimod (IMQ), a synthetic toll-like receptor 7 ligand with hydrophobic and weak basic properties, exhibits both antitumor and antiviral activity against various skin malignancies as a clinical treatment. Interestingly, IMQ has been suggested to be highly concentrated in the lysosomes of plasmacytoid dendritic cells, indicating that IMQ could modulate lysosome function after sequestration in the lysosome. In this study, we found that IMQ not only induced lysosomal membrane permeabilization and dysfunction but also increased lysosome biogenesis to achieve lysosomal adaptation in cancer cells. IMQ-induced ROS production but not lysosomal sequestration of IMQ was the major cause of lysosomal adaptation. Moreover, IMQ-induced lysosomal adaptation occurred through lysosomal calcium ion release and activation of the calcineurin/TFEB axis to promote lysosome biogenesis. Finally, depletion of TFEB sensitized skin cancer cells to IMQ-induced apoptosis in vitro and in vivo. In summary, a disruption of lysosomal adaptation might represent a therapeutic strategy for synergistically enhancing the cytotoxicity of IMQ in skin cancer cells. | https://researchoutput.ncku.edu.tw/en/publications/imiquimod-accelerated-antitumor-response-by-targeting-lysosome-ad |
Founded in 2004, Indigo Engineering Group, LLC is a woman-owned, full service engineering, architecture and construction management firm specializing in green and sustainable innovative solutions. Clients are offered a variety of services including: energy efficiency engineering, green-focused mechanical, electrical, and plumbing engineering design; architecture; geotechnical engineering; environmental engineering; construction services and land development support. Indigo was founded on the principles of green and sustainable engineering. Indigo’s commitment to offering modern engineering design and consulting services makes it an emerging leader in the architecture and engineering sciences. Indigo provides its clients with engineering services that incorporate the latest developments in “green” and sustainable designs while maximizing financial returns, functionality, and comfort. Indigo clients include developers, architects, engineers, and federal and city governments. | https://www.greenforall.org/indigo_engineering_group_llc |
We saw many cases of sustainable architecture in 2020, including offices, libraries, houses, pavilions and schools. Whether they adopt new technologies or opt for traditional solutions, the results are always aesthetically pleasing, and it all keeps down the impact of the building industry on our planet.
04-06-2020
The new library in Half Moon Bay, California, designed by Noll & Tam Architects is a highly sustainable project with LEED Platinum certification. It has received many recognitions, including the American Institute of Architects (AIA) and American Library Association (ALA) 2019 AIA/ALA Library Building Award, and the AIA San Francisco Sustainable Community Infrastructure Award.
latest news
30-12-2022 - News
ACDF Architecture designs a glass house to rediscover the connection with nature
30-12-2022 - Blog
Graham Baba Architects designs the new Ballard Food Bank
29-12-2022 - Design&Trends
Ceramics: Souraya Haddad’s enchanted table
29-12-2022 - Blog
External Reference presents Escaleras y Mirador Vela
29-12-2022 - News
Luigi Scarpato restaurant and club house Agritur Le Scuderie della Tenuta in Caiazzo
28-12-2022 - Projects
Studio Vincent-Space Encounters: BD house in Bergen, the Netherlands
28-12-2022 - Blog
Natural beauty: the art of Carla Daturi
28-12-2022 - News
Berger+Parkkinen Architekten designs The Chapel in Styria, Austria
27-12-2022 - Blog
Lollipop Street, public space in Shanghai by 100architects
Floornature is an international design and architecture portal with a focus on contemporary architecture, exclusive interviews with great masters of international architecture and the most interesting new developments in the world of architecture. | https://www.floornature.com/tag/noll-&-tam-architects/ |
Apple has doubled their market cap (from $400 billion to over $800 billion) in just 5 years and startups like Uber and Spotify have become billion dollar companies in a matter of years. What do these companies all have in common? They realized that it was the experience, not the features that set themselves apart from the competition. In particular, these experiences were built from insights gained by having a deep understanding of the people who use their products and services. These companies succeeded in spite of not being the first to enter the market nor having the lowest cost product/services.
While product strategists are now catching on to the importance of making user experience part of their product/service strategy, they have struggled to find the right approach let alone find the justification needed to convince management to change their approach from a feature and roadmap centric one. Management often sees user experience as just another talking point competitors pay lip service which have ill-defined benefits at best.
Effective UX strategy does not require much time, money or participants to get the insights you need to design the cutting edge experience. Indeed the field of UX strategy is littered with tools that when applied in the right circumstances can provide insights needed to drive product/service strategy. This blog will discuss in layman’s terms, all aspects of user experience strategy and innovation allowing you to put your finger on the user's pulse to build engaging product experience.
One final note: user experience is a team sport. I’ll be looking to you, the community to provide your feedback on this discussion. What are your thoughts on what has been covered? Are there any approaches that have proven effective in solving an experience problem?
Cheers,
James
Featured Posts
Recent Posts
Archive
Search By Tags
I'm busy working on my blog posts. Watch this space! | https://www.j2simpso.com/single-post/2018/04/22/Introducing-UX-Strategy |
My name is Sherene Charles and I am a fully qualified individual and couple’s therapist for CBT and Counselling Kent. I am Senior Accredited with ‘The National Counselling Society’ (NCS) and the’ Infant Loss Foundation’. Alongside being a member of the ‘British Association for Counselling and Psychotherapy’ (BACP).
I practice an ‘integrative approach’ to therapy. That’s because I take the view that no single approach that can treat each person in all situations. Therefore, my counselling techniques are tailored to suit your individual needs and personal circumstances.
In addition to providing therapy, I also offer supervision to other therapists. Which means I ensure they are fully supported so they feel competent and able to work to the best of their ability.
Counselling is a journey that you and I can embark on together. You can choose the destination i.e developing and increasing your self-esteem. Overcoming anxiety, improving your relationships, processing and coming to terms with your past. Or improving your mental wellbeing. My role is to facilitate you in navigating your journey.
How my counselling online works
I like to think that I am a warm, understanding and compassionate individual. Along with gentle challenge, empathy and compassion, I will provide a safe and secure setting to enable you the courage to examine your past, which might have contributed to any issues you may be facing currently.
At the start of our first session I will explain how the therapy will work. There will also be an opportunity for you to ask any questions that you might have. During our first session I will gather some basic information from you, discover your reasons for having therapy and explore what you would like to achieve. Sometimes people are unsure of what they would like to achieve from therapy; if this is the case, we can discuss what would be helpful to you.
Through me gaining an understanding of your goals it will enable me to establish what your needs are and the best way for me to support you. It is also an opportunity for you to gain a sense of my approach and to see if you feel comfortable enough to work with me and whether I am the right counsellor for you to work with. You are not tied to coming back.
Moving you forward
Once you establish what your goal is through therapy, I will accompany you on your journey towards your chosen destination. I will provide you with support through the process, to identify the most suitable and appropriate route, to highlight potential obstacles along the way and inform you of all possible diversions, to ensure we travel at a comfortable speed and reach your chosen destination as quickly and safely as possible.
Laughter during our sessions is of great benefit. Because it is like medicine – but without the side effects. Therefore, where appropriate, humour will be a key ingredient during our sessions. Gently encouraging you to face any deep fears and helping you explore your hopes and goals for the future.
I will gain great satisfaction and fulfilment in supporting you as take steps to move forward more positively – in whichever way they choose.
Ethical Standards
I subscribe to and work within the BACP ethical framework. I also undertake regular professional development and supervision as well as having professional indemnity insurance. | https://www.cbtandcounsellingkent.co.uk/therapists/sherene-charles-counselling-online/ |
Revised. Amendments from Version 1
==================================
The title was changed to better reflect the content of the article and meet the comments of reviewers Dr. Sturmberg and Dr. Delva. The language of the paper was submittted to a native English speaking person and changed accordingly. The \"Methods\" and \"Result\" parts were partly rewritten for clarification, the explanation of the Meikirch model and the part on „health as a complex adaptive system" supplemented for more precision. Gender-neutral usage of \"patient\" and \"physician\" were applied wherever possible. Some abbreviations in box 1 were eliminated. Figure 2 was redrawn to eliminate the term \"attractor\" because the authors felt that it is not essential for the explanation of a general model of a complex adaptive system in the context of this paper.
Introduction
============
Individuals consult their physicians when they feel something is out of order, e.g. when they experience pain, fatigue or some other disorder. Physicians then examine them and specifically look for pathological changes. After such an investigation they make a provisional diagnosis and explore their patients further or treat them according to what has been discovered. This approach and type of thinking goes back to the pathologist Rudolf Virchow who, in 1858, used 20 lectures to describe "cellular pathology", a characterization of different diseases ^[@ref-1]^. Although the foundations of medicine have evolved since then, the general principles of medical practice have remained the same. Only over the past 20 years has complexity science gradually entered into medicine ^[@ref-2],\ [@ref-3]^. This has become particularly important for the interpretation of health and disease as different states of a complex adaptive system (CAS). The Meikirch model is a new definition of health that exhibits all the features of a CAS ^[@ref-4]^. For such systems the concepts based on Virchow's pathology ideas are no longer adaquate. An understanding of health and disease now requires appreciation of complexity science which introduces a new dimension for diagnosing and treating patients. It includes the potential of improving health in a way that was hitherto practiced only exceptionally. The purpose of this paper is to summarize the relevant features of the Meikirch model and to spell out in detail how the model and complexity science may be applied for a better understanding of a patient's disease and its treatment.
The Meikirch model: definition of health and disease
====================================================
The Meikirch model is based on five components ( [Box 1](#B1){ref-type="other"}) and 10 complex interactions ( [Figure 1](#f1){ref-type="fig"}). This framework allows us to define health and disease as a complex adaptive system ( [Box 2](#B2){ref-type="other"}). [Figure 1](#f1){ref-type="fig"} depicts the five components from *a* to *e*. The interactions are exhibited as double-edged arrows from *1 -- 10*. A short explanation of the five components and their interactions is presented below. The complete description of the model with its scientific background is given in the previous publications ^[@ref-4],\ [@ref-5]^.
Box 1.Meikirch model: The five interacting components of health ^[@ref-4],\ [@ref-5]^**a.** Life\'s demands**b.** Biologically given potential (BGP)**c.** Personally acquired potential (PAP)**d.** Social determinants**e.** Environmental determinants
{#f1}
Box 2.Wording of the Meikirch model i.e. the definition of health and disease ^[@ref-4],\ [@ref-5]^**1.** Health is a dynamic state of wellbeing emergent from conducive interactions between an individual\'s potentials, life\'s demands, and social and environmental determinants.**2.** Health results throughout the life course when an individual\'s potentials and social and environmental determinants suffice to respond satisfactorily to the demands of life. Life\'s demands can be physiological, psychosocial, and environmental, and vary across individuals and contexts, but in every case unsatisfactory responses lead to disease.
Each human being must fullfil the demands of his or her ***life situation*** ^[@ref-6]^. Physiological, psychosocial and environmental demands vary with time and circumstances. *Physiological demands* are related to the homeokinetic balance of nutrients, energy and water necessary for maintaining bodily functions including procreation (examples are work, pregnancy, childbirth and brain function). *Psychosocial demands* are the individual´s exposure and response to social conditions needed to succeed in social integration and mental, personal and spiritual development. Expectations and roles related to work, family and society as a whole combine with personal aspirations, values and lifestyle in changing settings and contexts. This also includes peace with the fact that every human being must die. *Environmental demands* include the availability of and immediate or latent threats from living conditions (e.g., water, nutrients, climate, radioactivity, pollutants, carcinogens, workplace conditions).
The potential of an individual to meet the demands of life is partly biological e.g. a gift of nature - ***biologically given potential (BGP)***, and partly acquired during life - ***personally acquired potential (PAP).*** At birth the BGP is based on the genetic equipment, epigenetic regulation and quality of the pregnancy. The BGP diminishes throughout life and is zero at the time of death. During the lifetime the BGP may be threatened or damaged by socioeconomic disadvantages, diseases, injuries and/or defects. The PAP results from the entirety of physiological, mental, spiritual and social resources acquired during the lifetime. It may continue to grow when a person cares for it. Social and environmental conditions also influence the growth of the PAP by providing or withholding determinants of health.
***Social determinants of health*** strongly interact with the demands of life and the potentials of the individual ^[@ref-4]^. Equity and equality, social concerns, working conditions, autonomy and social participation affect health and longevity ^[@ref-7],\ [@ref-8]^ and are also major determinants. Likewise, ***environmental determinants of health*** are factors in living and working conditions that affect each person. They may sometimes be of global significance like natural resources, catastrophes, population growth and climate change ^[@ref-9],\ [@ref-10]^.
Based on these five components and their interactions with each other the Meikirch model represents a new definition of health and disease as shown in [Box 2](#B2){ref-type="other"}. Possible individual and public health care outcomes as a result of a hypothetical implementation of the Meikirch model have been discussed elsewhere and suggestions for clinical and health systems research have been made ^[@ref-5]^.
Health as a Complex Adaptive System (CAS)
=========================================
A complex adaptive system is an entity with a more or less permeable boundary between it and its nearby environment ( [Figure 2](#f2){ref-type="fig"}) ^[@ref-11]^. It can take up material and energy from the environment (input), release end products (output, e.g. entropy) and do work. Within the system there are many different parts called agents. In [Figure 2](#f2){ref-type="fig"} they are symbolized as circles. They continuously and autonomously interact with each other in a nonlinear manner, contributing to the product, the so-called emergence of the CAS. The term emergence indicates a new and often unpredictable quality which is more than the sum of the functions of each part. A CAS always functions as a whole. A CAS is equipped with a learning and bonus arrangement for the interactions among its agents. This gives it the possibility to adapt to changes in the environment, i.e. to learn. If for some reason this adaptation functions poorly, the CAS suffers. If it does not function at all the CAS becomes chaotic, goes into a crisis or vanishes. Repeated minor critical disturbances may lead to the so-called butterfly effect ^[@ref-2]^. This effect refers to the image of a butterfly that flaps its wings in South America and induces a hurricane in Texas. Examples of medical conditions where a similar mechanism may lead from minor incidents to major consequences are ventricular fibrillation, epileptic seizures, tantrum, and psychotic states. Every CAS has evolved from a prior condition and autonomously progresses toward an unforeseeable future state. A CAS may be part of a larger CAS or be composed of many CASs. Such structures are called nested CASs.
{#f2}
In the Meikirch model the five components (a--e) including their subcomponents are regarded as agents ( [Figure 1](#f1){ref-type="fig"}). Interacting with each other they spontaneously arrange themselves in such a way that the evolving emergence, i.e. the state of health, is the result of the functioning of the system as a whole. In each case a specific working-arrangement is in operation, but it is not necessarily the best solution for the system. Energy flow in humans has been called vitality, drive, or sense of purpose. This indicates that energy flow may be material and immaterial, e.g. based on a desire to be loved, on a pursuit of values, or on living for a spiritual purpose. Investigation of the material and immaterial double nature of human energy flow may help toward a better understanding of a person´s health.
An entire life is an evolutionary process. Biologically human life originates with the fertilization of an oocyte. This then passes through the stages of embryo and foetus to the maturity needed for birth. At some time during intrauterine life the personality of the individual is created. At least, physicians and midwifes say that in a new-born it is clearly recognizable. From then on the complete Meikirch model is fully operational throughout all the life course phases of each person. Thus evolution from birth to death demonstrates clearly how many adaptive processes occur as part of the different complex interactions described by the model. While the two potentials evolve, the demands of life, the social, and the environmental determinants also vary. Within these limiting and supporting contexts individuals follow an autonomously chosen course of life. Under such conditions it is not surprizing that some adaptations may not be fully successful for some period of time or permanently. Challenging examples are malnutrition, infectious diseases, love deprivation, sexual maturation, pregnancy, genetic defects, professional stress, the raising of children, physical involution, aging, etc. Such changes may lead the health of an individual as a system into a state of crisis. If it is minor, the two potentials may still manage the demands of life and the difficulties may resolve spontaneously after some time. Such situations may represent illnesses, but are not considered as disease or pathological. They may, though, evolve into a chronic state that draws energy from the person and thereby may explain, for instance, insomnia, chronic fatigue, or somatoform symptoms. If the defect becomes more severe it may lead to a disease that requires more medical attention. In the Meikirch model the term "disease" implies that for some reason one or several adaptation processes are not successful enough to empower the two potentials to satisfy the demands of life.
Methods
=======
To allow for future research, hypothetical consequences of the Meikirch model and of the properties of CASs have been explored with the purpose of better understanding the state of health of patients, particularly in primary care. According to the Meikirch model, health of a healthy individual or of a patient is considered to be a nested CAS, composed of grouped CASs and being embedded in higher CASs. For the analysis of various conditions, the significance of each of the five components and of each interaction within the Meikirch model were visualized. In addition, possibilities of supporting favourable evolutions of the respective CAS and its meaning for the whole person (nested CAS) were analysed. In this process, the deduction (from observation to theory) and induction (from theory to observation) cycles were repeated until coherent results were achieved.
Results
=======
Categories of illness and disease
---------------------------------
Disturbances in health and healing follow a pattern that can be described by four categories: **1.** Minor maladaptations lead either immediately or with varying delays to discomfort (illness) or to signs of a disease. Examples for the former are minor acute infections or tension headaches, and for the latter, overweight, type 2 diabetes, or arterial hypertension.**2.** A more severe disturbance of the system leads it into a crisis, i.e. it becomes "chaotic". Such states may be corrected spontaneously, for example, or by behavioural changes, or by interacting with a physician or healer, by medications, or by medical or surgical interventions. Thereafter there may not be an immediate complete recovery to health. The full adaptive evolution may take time and further interventions, i.e., convalescence or rehabilitation, may be needed. These phenomena may lead to complete healing or to healing with remaining defects.**3.** If a CAS is disturbed continuously for a prolonged time, the CAS may not be able to satisfactorily respond to the demands of life. This represents a chronic disease or invalidity. If the condition is progressive and serious, it may lead to death. Examples are rheumatic or degenerative diseases and different types of neoplasms.**4.** Considering a disturbed state of health as a maladapted CAS implies that patients cannot simply be healed by the actions of a competent physician. Healing is much rather the result of a process of self-reorganization, enabling the two potentials to again satisfactorily fulfil the demands of life. The task of physicians and other health professionals therefore consists in being competent advisors and fellow human beings that assist the patient in realizing the necessary evolution himself.
Assessment of a patient´s health
--------------------------------
It always is appropriate to examine patients with an ordinary medical history and physical examination to which all indicated laboratory tests and imaging procedures are added. Simultaneously it may be purposeful to perform an analysis of the patients´ health as a CAS. In this case the five components and the ten complex interactions of the Meikirch model are assessed by an extended history as exemplified in [Box 3](#B3){ref-type="other"}. This process assures that all possibly important aspects are evaluated. A thorough analysis will give patients a new way to look at their health and how they had conducted their lives. They will discover aspects they did not think about before, and this may be of therapeutic value. At the same time the physician may start to interpret the patients´ history and findings in a new way. This may discover further possibilities for helping a patient to autonomously evolve to a new state which hopefully comes closer to health.
Box 3.Assessment of a patient's health by taking a history focussing on all aspects of the Meikirch modelIn addition to the five components and the ten complex interactions the energy flow and other patterns of the model also need to be investigated. The questions enumerated are just examples that have to be adapted and complemented further as needed for each patient's specific problems.**Questions related to the components of the model (a--e):a)** What specifically are the demands of life to which the patient has to respond?**b)** How does the patient perceive the evolution of his or her physical health?**c)** How does the patient feel about him- or herself? Can he or she manage themselves? Does he or she invest in the future?**d)** How is the patient integrated into family, household, friends, society and government?**e)** In which type of natural environment does the patient live?**Questions about the interactions (1--10)1.** How does the physical body of the patient (past and current) interact with the demands of life?**2.** How does the patient deal with his or her physical, psychological and spiritual demands of life?**3.** How does the patient interact with him- or herself, especially with the body? Does he or she invest in it?**4.** How does the patient interact with family, household, friends, and government etc.?**5.** How does the physical body of the patient interact with the society (past, present, future)?**6.** How does the society influence the demands of life?**7.** What tis the attitude of the patient toward his natural environment?**8.** Which are the past, present and future interactions of the natural environment with the patient's physical body?**9.** How does the natural environment modify the patient's demands of life?**10.** How does the society interact with his or her natural environment?**Questions about vitality, motivation and purpose in life**What is the source of the patient's vitality? Is it spontaneous or rather focused on objectives or purposes? Which occasions induce which type of vigour? What is his or her purpose in life?How is the patient's physical, intellectual, and emotional vitality? How much is hedonistic and how much eudaimonic?What does the patient do with his or her vitality? Is it used mostly in family, profession, or hobbies?What is the energy flow between the patient and the physician like?**Questions about temporal patterns**When did the patient feel completely healthy the last time? When and how did he or she loose health or wellbeing?What were the manifestations of the crisis?How was the time course of the disease up to now? Which factors induced aggravation and which brought about improvements? Which changes within or outside the patient induced which type of changes?What is the explanation of the patient for the current state of health and for the failure to improve it? What does the patient need in order to surmount the present crisis?What are the future plans of the patient? How much sense of purpose do they evoke?
Treatment
---------
Obviously, for all medically diagnosed conditions treatments are to be prescribed as indicated. Yet, in medicine, indications generally leave considerable room for judgements. Thus the findings collected by assessing all the components and interactions of the Meikirch model must be considered and integrated as far as possible. A CAS cannot be manipulated to health. It must be assisted as it reorganizes itself autonomously to a new state, in order to better fulfil the demands of life and hence better health and well-being. The role of the physician, therefore, is to accompany the patient during the process he goes through. Some advice, assistance, or therapeutic intervention may be helpful, but only the patients are in a position to create their new future state for themselves. By analysing their condition as a CAS together with their physician including all components and all interactions of the model they presumably receive many new ideas that they can use to emerge into a healthier state in the future. For example, they may want to make up their mind whether or not they will accept all the conditions that have determined their life in the past. In this respect, a discussion with their physician of alternatives with their consequences may be useful. For many patients it might be constructive to deal with the energy flow in their system, e.g. to speak about the purpose of their lives.
The process of reorientation based on the Meikirch model takes time. During this period it may help the patient if they find in their pysician a trustworthy human beeing with whom they can discuss all sorts of alternatives. Ultimately though, patients have to create their own future. It will encourage them if they feel understood, trusted and accompanied by an experienced person with a sincere interest in their wellbeing.
When is attention to the Meikirch model and the principles of a CAS indicated?
------------------------------------------------------------------------------
In primary care, such as general internal medicine and general practice, there are many patients who come for consultations because they feel ill. Yet, on examination no clear pathology is found. Thus far such complaints have been explained as functional and often were regarded by physicians as unimportant. Patients then received drugs that may be symptomatically beneficial or placebos or, more often than not, harmful or nocebos. Instead of acting with benign neglect, the Meikirch model offers a true and positive alternative approach. In many cases it will help the patients to understand their problems, to readjust their potentials and to advance their readaptation to the demands of life. Thereby patients may again come closer to a state of health and wellbeing.
Discussion
==========
At the present time the Meikirch model is a hypothesis grounded on a theoretical and conceptual framework. Yet, up till now much of health care has not been concerned with an understanding of the *nature* of health; it used instead an intuitive notion of wellbeing which did not lead to new insights. In contrast, a rational understanding of health - as given by the Meikirch model - offers innovative opportunities. Today this model is better founded on scientific evidence than other definitions of health. Its ultimate validity, however, will be documented only by using and evaluating it in practice. This must be done with due consideration to the special features of the model. Much further research is urgently needed.
For the past 150 years medicine has been working with methods derived from Newtonian natural science and obviously has achieved major advances. They are based, however, predominantly on materialism and neglect the social and spiritual features of human nature. In addition, until recently medicine has not considered systems theory. It appears that these two aspects offer new opportunities for health care to become even more effective. Systems thinking implies that science based on Newton must be complemented by complexity science. Particularly for the purpose of health care a phenomenological, narrative, and evolutionary holism must be added to analytical reductionism ^[@ref-11]^. Poorly functioning parts are not simply corrected by appropriate drugs or surgical operations. Instead considerations of the evolution of the patient's health to its present state, earlier successes in self-management and failures in the handling of his present crises can be evaluated. Here, Antonovsky's sense of coherence and meaningfulness also may be very helpful ^[@ref-12]^. The necessary changes a patient has to realize must not come top-down from the physician, but rather bottom-up, originating in the patients themselves, e.g., via new insights. For this purpose mutually trusting patient-physician interactions are critical for a successful future: the physician must believe in the patient's abilities to evolve to a new state and must accompany and support him with loving wisdom in this endeavour.
When speaking with older and experienced general practitioners, and when reading about how they managed their difficult patients, it becomes evident, that they knew their patients from the past quite well. In many difficult situations they often had to accompany rather than to treat them. Such patients remained very loyal because they understood what their doctor had contributed to their health. At the same time physicians realized that they had nothing more to offer than their personal support as a professional human being. The Meikirch model offers now a rational approach to such difficult cases and it is hoped that the five components and the ten complex interactions will lead to new opportunities for patients to move toward better health. At the first glance the described system's approach to patient care is similar to what Michael Balint intended with his groups ^[@ref-13]^. He was a psychiatrist and pursued the purpose of "Training General Practitioners in Psychotherapy" to better understand and respond to the needs of their difficult patients. In contrast, the systems theory approach focusses on a new look at a patient's possible unresolved evolutionary steps, analyses the biological given and personally acquired potentials and offers him an opportunity to progress further in his personal biography. More research is needed to validate the promises and limitations of this methodology.
The Meikirch model distinguishes two types of very different potentials with which the demands of life must be met, the biologically given potential (BGP) and the personally acquired potential (PAP). The latter is the resource that continuously pilots the adjustment to new life situations. It is the locus of executive functions ^[@ref-14]^. For this purpose it interacts with all components of the system. The PAP is the seat of memory, visions, fantasy, reasoning, attentional control and inhibitory control, and problem solving. Its sustained evolution toward more and more wisdom is critical for the maintenance of health. The PAP can learn to compensate in part for losses of the BGP. This leads to an interesting aspect of the relationship between the two potentials. It may be compared to rider and horse. If the rider wants that his horse serves him well he has to take good care of his horse. It appears that the neglect of the PAP in modern medicine is well perceived by patients and they have turned to complementary or alternative medicine. In fact, much of the success of homeopathy and other methods might be explained by the physician/patient interaction with its effects on the complex adaptive system that expresses the patient's health. This mechanism may be relevant also for much of the success of other complementary or alternative treatments. It is our opinion, however, that it will be better to work with the CAS in a planned and scientifically justifiable manner based on the Meikirch model than to apply unproven methods. The model would also serve as an excellent framework for a proper practice of evidence based medicine as defined by David L. Sackett: "Evidence-based medicine (EBM) requires the integration of the best research evidence with our clinical expertise and our patient's unique values and circumstances ^[@ref-15]^." This applies also to the newly evolving holistic clinical approach "Integrative Medicine and Health" that "reaffirms the importance of the relationship between practitioner and patient, focuses on the whole person, is informed by evidence, and makes use of all appropriate therapeutic and lifestyle approaches, healthcare professionals and disciplines to achieve optimal health" ^[@ref-16]^.
When looking at health as a lifelong and complex evolutionary process, it is not surprising that crises do occur frequently. Throughout human life there are several major and many minor evolutionary steps to be taken. End of breastfeeding, beginning of school, puberty, professional formation and advancement, partnership, family, menopause, and involution of old age are some of the more demanding processes. Today they must be overcome in a society that offers insufficient respect for the personality of each individual. Lack of a motivating purpose in life and insufficient social support have become almost normal. Economic exploitation, power plays, isolation, social neglect and even wars weigh heavy on the demands of life. A culture that is really concerned with the health and wellbeing of its individuals needs to strongly support lifelong human development by investing in life-affirming compassion and truth ^[@ref-5]^. The Meikirch model provides a framework for how this could be achieved.
10.5256/f1000research.10370.r16661
Referee response for version 2
Delva
Dianne
1
Referee
Department of Family Medicine, Faculty of Medicine, University of Ottawa, Ottawa, ON, Canada
**Competing interests:**No competing interests were disclosed.
28
9
2016
Version 2
I would like to thank the authors for their explanations and revisions of the paper: Applying a complex adaptive system\'s understanding of health to primary care.
It is very clear, provides much food for thought in thinking about health and disease in people as complex adaptive systems. The paper provides a framework for considering the variability in how patients adapt to various conditions. It also centers the responses on the patient and their "Healing is much rather the result of a process of self-reorganization, enabling the two potentials to again satisfactorily fulfil the demands of life." And helps the physician to know that compassion, humanism, creativity and willingness to stand by are legitimate roles.
I have read this submission. I believe that I have an appropriate level of expertise to confirm that it is of an acceptable scientific standard.
10.5256/f1000research.9730.r15463
Referee response for version 1
5
8
2016
Version 1
This is an article describing the confluence of two theories, the model of health as defined by the authors in the Meikirch model which appears to be a model developed and published by the authors, and complex adaptive systems. The authors propose this as a method to better help patients adapt and aim towards improved health.
**Strengths:**
The authors have developed a theory and are proposing this explicit theory can better support patient care. Primary care is known for its complexity and uncertainty. Thus the system is a good framework for thinking about a holistic approach to patient care and to the variability of adaptation based on the components. The categories of illness and disease would be helpful for learners to understand that not all illness has a desired resolution. The comments on complex adaptive systems as a way of understanding health in individuals and society is useful in reminding us that linear models often ignore the unintended consequences of change.
**Suggestions:**
As a family physician, I found the paper both interesting and difficult to follow. In general the language is clear with minor errors. I am not an expert on complex adaptive systems but agree with the comment regarding the use of some terms as detracting from the premise of the article.
My main suggestion would be to expand the methods section. It is not clear to me who was involved in the process, how this was carried out. I wonder if this would be better as a theoretical proposal rather than a scientific study. The examples chosen seem to be the opinions of the authors and have not been tested. Some are quite vague and would require fuller explanation.
I also agree that comparing this theory to others might be useful. McWhinney is referenced and as a leader in Family Medicine in Canada, the four principles of family medicine and a model we use to teach residents for patient-centered care helps us to provide care in family medicine that is not likely to be enhanced by the model. The four principles are:
The family physician is a skilled clinician.Family medicine is a community-based discipline.The family physician is a resource to a defined practice population.The patient-physician relationship is central to the role of the family physician. It may be that the authors are specialists and thus are less familiar with general/family practice. The idea that "Physicians then examine them and specifically look for pathological changes." is not the premise for family medicine in Canada. The four principles address the environment and social determinants of health in situating the patient in the community and family in which they live. The idea of accompanying the patient resides in the value of continuity of care and the patient-physician relationship. Knowing the patient's values and past helps to tailor the approach to support the patient in the direction they wish to go. The skilled clinician is a critical thinker who can deal with uncertainty and as a resource to the practice population advocates for the system to better serve the population.
In Canada we teach a model of interviewing that includes the traditional history focused on disease interwoven with the IFFE model. These include the patient's ideas of what is wrong with them, their fears, how their function is affected and their expectations from the physician/system. These questions are essential to the patient-centered approach and situate the consultation clearly with the patient as the CAS.
In particular, I find the suggestions for taking a history based on the model cumbersome and clearly the language would be challenging for patients. It is also not clear to me how these questions are related to the CAS.
The treatment approach mirrors the patient-centered approach taken in family medicine. We know that patients often do not fill prescriptions and asking patients what might work for them or what they are comfortable with, helps one to support a treatment approach that is right for the particular patient. Being aware that a patient does not have the resources to access a particular treatment is essential to a collaborative effort for care.
Some of the examples either require more explanation or less linear thinking. The idea that *in utero* does not include the environment overlooks the social determinants of health of the mother and their effect on the *in utero* environment.
I have been involved in a number of Balint groups and recall reading Michael Balint's book. The statement "He was psychiatrist and pursued the purpose to train general practitioners in psychotherapy." does not reflect my experience. My understanding was he focused on Difficult Clinician-patient relationships to help general practitioners interact and "accompany" our patients more effectively. The groups were meant to support physicians in their own context. I did not see this as training in psychotherapy.
**Minor suggestions**
"Examples of medical conditions are ventricular fibrillation, epileptic seizures, tantrum, or psychotic states." This statement needs further explanation. It is not logical from the discussion if we think of health in a holistic manner.
There may be cultural differences in writing and I appreciate English may not be the first language of the authors; however I find it a poor reflection to refer to all patients and physicians as male.
I have read this submission. I believe that I have an appropriate level of expertise to confirm that it is of an acceptable scientific standard, however I have significant reservations, as outlined above.
Hahn
Eckhart G.
Univeristy Hospital Erlangen, Germany
**Competing interests:**No competing interests were disclosed.
19
9
2016
**Response to the comments by Dr. Dianne Delva**
We as authors appreciate the care Dr. Delva has devoted to our paper. It has helped us significantly to improve the manuscript and make it readable for family physicians. Also, we are happy that she recognizes the overall strengths of our contribution. We understand that she appreciated the value of thinking in terms of health and disease as complex adaptive systems (CAS) to embrace uncertainty and a holistic approach to patient care. In order to respond to her concerns with some aspects of our manuscript we would offer the following point by point response. We will also indicate where we have made changes and corrections of the manuscript. From Dr. Delva´s critical comments as a family physician we have come to the conclusion that the original title does not completely reflect the content of the paper and may be misinterpreted. We do not intend to challenge any of the established models as applied to family medicine. We rather intended to explore the possible results of applying the principles of complex adaptive system´s thinking in primary patient care, possibly extending the present practice. Therefore, to avoid any misunderstanding, we have changed the title of the paper into "Applying a complex adaptive system´s understanding of health to primary care". This was also suggested in the review of Dr. Sturmberg (accessible under <http://f1000research.com/articles/5-1672/v1>).Interestingly, Dr. Delva refers to Dr. I. R. McWhinney, who had developed four principles for family medicine. He certainly is an important person for the principles of family medicine. These principles refer to the physician as a skilled clinician, to family medicine as a community based discipline, to family physicians as resource to a defined population, and view the patient-physician interaction as central. Interestingly these four postulates are also part of the Meikirch model. Also the proposals of the so called Wonca-tree are included in the model. The Meikirch Model is wider than the specific concepts for family medicine and therefore might in the future serve as an extended basis on which the others stand: this is what we suggest to explore.We agree with Dr. Delva that the physician must value the continuity of care and be competent to deal with uncertainty. We, as proposed in the Meikirch model, have a different view how the patient should be supported, derived from the thinking of health and disease as a complex adaptive system. As a CAS, the patient´s situation evolves independently and autonomously, often against his or her will. The support in our opinion has the purpose to help the patient to move to his new state that results in a more satisfactory emergence. Often the route to this new state is not the "direction the patient wants to go", but the direction to which the patient has to submit himself. That is why he needs the physicians support.On page 4, an effort has been made to further clarify what a CAS means and what it may contribute to the primary care of patients. In figure 2 the term "attractor" was removed because it is not essential to understand the principle of a CAS.On pages 5 and 6, the method section has been expanded as suggested by Dr. Delva. Both authors have contributed to the development and description of hypothetical consequences of the Meikirch model to stimulate future research. One of the authors (EGH) is trained in and practiced general internal medicine (and gastroenterology) and is familiar with Robert Nikolaus Braun´s conceptual frame of family medicine which is prevalent in German speaking countries.In a participatory and integrative approach to the patient, the inclusion of the patient´s ideas, fears, functions and expectations (IFFE model) is indeed essential for any primary encounter between patient and physician. It is also part of the Meikirch model, as can be seen in box 3 on page 6. Dr. Delva finds it cumbersome to take a history based on the Meikirch model and states that it is not clear to her how the questions in box 3 are related to the CAS. Obviously this table contains examples, is not exclusive and must be adjusted to the patient's specific problems. The purpose of box 3 is to give the physician a tool to make sure that the history he took covers the whole Meikirch model, i.e. is complete in this sense. The questions suggested in box 3, derived from the Meikirch model with its complex interactions, will also be the basis for describing the patient as a CAS. The Meikirch model is in itself based on complex adaptive systems thinking. Dr. Delva, is right in suggesting to use plain language in real life communication with patients.In order to clarify the issue of the situation in utero we believe that the direct environment of a fetus is the uterus of the mother. The environmental and social determinants of the mother have nonetheless an indirect effect on the child´s development in utero as has been pointed out in a previous description of the Meikirch model.Dr. Delva refers to her understanding of Balint groups. We have taken the information given in our paper directly from an original publication by Michael Balint (1896--1970) in the Br Med 1954 (see reference 13). Balint groups may have developed in a direction not intended by Balint himself, and we agree that the term psychotherapy is not well defined and can be understood in many ways in Balint´s original paper. The case reports included in this paper describe complex psychodynamic situations. We have changed our text on page 9 to stay as close to Balint´s original paper as possible.The butterfly effect used as a metaphore on page 4 is now described in more detail to assure a better understanding of our mentioning of ventricular fibrillation, epileptic seizures, tantrum or psychotic states. These conditions, because of their dramatic appearance, are exclusively meant as an illustration of the butterfly effect.Wherever the gender-neutral terms "patient" or "physician" were used in our text we have now avoided to use them in a gender-specific context by either omitting "he" or "she" or using the plural, including in the abstract. Fink, W. & Kamenski, G. Wien Med Wochenschr (2009) 159: 173. doi:10.1007/s10354-009-0666-8
Bircher J, Hahn EG: Understanding the nature of health: New perspectives for medicine and public health.
Improved wellbeing at lower costs \[version 1; referees: 2 approved\]. *F1000Res.* 2016;5:167. 27134730
10.12688/f1000research.7849.1 4837984. See page 4 „personally aquired potential".
10.5256/f1000research.9730.r15187
Referee response for version 1
Sturmberg
Joachim P
1
Referee
Department of General Practice, University of Newcastle, Wamberal, NSW, Australia
**Competing interests:**No competing interests were disclosed.
25
7
2016
Version 1
This paper is an extension of the authors' previous paper in this journal and stimulates long overdue debate. My previous comments ^[@rep-ref-15187-1]^ principally also apply to this paper.
Two additional points:
The paper's title "Health as a Complex Adaptive System: a new dimension of patient care in internal medicine and general practice" only loosely reflects the content of the paper, I would think that a title similar to "Applying a complex adaptive system's understanding of health to clinical care" would be stronger and more appropriate. Offering clinicians alternative ways of practicing is certainly most welcome.The paper - implicitly - wrestles to come to terms with the notions of health in relation to the "non-health" terms of illness and disease ^[@rep-ref-15187-2]^ . Even definable pathology is not objective as many studies have shown significant disagreement between experienced clinicians looking at the same "example of disease". Highlighting the definitional problems and distinctions is especially important for primary care physicians as many people present with unspecific symptoms rather than a "specific diagnosis" ^[@rep-ref-15187-3]^. Diagnoses are socially constructed ^[@rep-ref-15187-4]^ and have become a "tyranny for clinicians" ^[@rep-ref-15187-5]^ . From a complexity perspective thinking about patients' complaints as "conditions" or "states of being" clearly fosters more creative approaches to patient care and the emergence of more satisfactory outcomes.
I have read this submission. I believe that I have an appropriate level of expertise to confirm that it is of an acceptable scientific standard.
[^1]: Both authors contributed to drafting the work, were involved in the revision of the draft manuscript and have agreed to the final content.
[^2]: **Competing interests:**No competing interests were disclosed.
| |
Human factors approach in oil and gas industry is still an emerging science compared to other industries, where most human factors publications focus their application in the design stage. However, human factors methods can be applied at any stage; contributing to bridging the gap between "work imagined" and "work done" concepts. This paper aims to provide an alternative approach in Service Company's complex activity for hazard identification and risk assessment.
A commonly utilized tool, Human Reliability Assessment (HRA), includes human factors in a risk assessment process, however, this method is time consuming and not easily adopted without extensive effort spent on training and operationalization. The approach proposed by the authors represents a simplified method focusing on key factors from Human Error Assessment & Reduction Technique (HEART), relevant to the nature of the Service Company's Operations. This is integrated into our existing qualitative risk assessment to recalculate the overall risk of a certain task. The process and the template for risk assessment is modified to include sections for human factors.
Ongoing field rollout tests show positive indications in regard to improved error capturing for error producing conditions during the task that'll be consolidated by end of Q1-2018 after field test completion. Modified risk assessment approach will reshape the standard risk assessment practices, moving the focus to and targeting the inherent unreliability of the task as a result of error producing conditions caused by unavoidable human interactions within complex systems. This method will include a matrix for measuring operators’ understanding of the potentially existing risk through a dedicated questionnaire. This matrix measures improvements in the overall understanding of risk involved from the front line employees’ prospective. Expected benefits also include further improvements for risk assessment training and competency by the company. The hypothesis is that by introducing key human performance factors to the risk assessment will help build awareness of human factors and their relationship to the probability of an existing risk. Utilizing an already effective system – risk assessment – to introduce human factors methods will help avoid the complexity associated with its implementation and still get the benefit of key elements of a well-established method.
This approach compares a standard risk assessment to one with integrated human factors. This comparison allows for assessing the gap between "work imagined" and "work done" practices, and for feedback from front-line employees as end-users of company procedures. This paper provides insights on how human factors can impact the level of risk and outlines the control measures targeted at such factors that can be missed if a standard risk assessment is applied. | https://onepetro.org/conference-paper/SPE-190577-MS |
FIELD OF THE INVENTION
PRIOR ART
DISCLOSURE OF THE INVENTION
The present invention relates to a process for separating technetium from a nitric solution of technetium through electrolysis.
4
met
2
2
More particularly, the invention relates to the separation of Technetium-99 having the chemical formula TcO—, also called Tc(VII), or pertechnetate, from a nitric solution through electrodeposition of metal technetium, corresponding to Tc(0) also called Tc, and of TcO, HO, corresponding to Tc(IV).
Nitric solutions of technetium are for example solutions derived from the reprocessing of irradiated nuclear fuel, and more generally from the processing of radioactive waste. Also, with the process of the invention, it is possible to reduce the &bgr; activity of these nitric solutions.
This process of separation may be followed by a vitrifying process to stock the technetium extracted from these solutions.
106
134
137
144
154
125
The process of the invention finds application for example in the separation of technetium-99, from solutions derived from the counter-flow liquid-liquid “PUREX” extraction process for reprocessing irradiated nuclear fuel. This process uses a solution of concentrated nitric acid as extraction solution, and the technetium-99 collecting in this solution may reach concentrations of 150 to 200 mg/l, for nitric concentrations which may be as high as 3.5 to 4.5 mol/l. This extraction solution may also, in trace form, contain other elements derived from nuclear combustion such as Ru, Cs, Cs, Ce, Eui, Sb.
Table 1 below shows one example of the analysis results of the different chemical species present in an extraction solution of the “PUREX” process.
<PTEXT><PDAT>TABLE I</PDAT></PTEXT>
<PTEXT><PDAT>Analysis of a nitric solution derived from a</PDAT></PTEXT>
<PTEXT><PDAT>&ldquo;PUREX&rdquo; process</PDAT></PTEXT>
<PTEXT><PDAT>Component</PDAT></PTEXT>
<PTEXT><PDAT>Unit</PDAT></PTEXT>
<PTEXT><PDAT>Value</PDAT></PTEXT>
<PTEXT><PDAT>HNO</PDAT><HIL><SB><PDAT>3</PDAT></SB></HIL></PTEXT>
<PTEXT><PDAT>mol/l</PDAT></PTEXT>
<PTEXT><PDAT>3.5-4.5</PDAT></PTEXT>
<PTEXT><PDAT>Technetium (VII)</PDAT></PTEXT>
<PTEXT><PDAT>mg/l</PDAT></PTEXT>
<PTEXT><PDAT>150-200</PDAT></PTEXT>
<PTEXT><PDAT>Ruthenium-106</PDAT></PTEXT>
<PTEXT><PDAT>&mgr;Ci/l</PDAT></PTEXT>
<PTEXT><PDAT>50</PDAT></PTEXT>
<PTEXT><PDAT>Antimony-125</PDAT></PTEXT>
<PTEXT><PDAT>&mgr;Ci/l</PDAT></PTEXT>
<PTEXT><PDAT>2.5</PDAT></PTEXT>
<PTEXT><PDAT>Caesium-134*</PDAT></PTEXT>
<PTEXT><PDAT>&mgr;Ci/l</PDAT></PTEXT>
<PTEXT><PDAT>40</PDAT></PTEXT>
<PTEXT><PDAT>Caesium-137</PDAT></PTEXT>
<PTEXT><PDAT>&mgr;Ci/l</PDAT></PTEXT>
<PTEXT><PDAT>50</PDAT></PTEXT>
<PTEXT><PDAT>Cerium-144</PDAT></PTEXT>
<PTEXT><PDAT>&mgr;Ci/l</PDAT></PTEXT>
<PTEXT><PDAT>40</PDAT></PTEXT>
<PTEXT><PDAT>Europium-154</PDAT></PTEXT>
<PTEXT><PDAT>&mgr;Ci/l</PDAT></PTEXT>
<PTEXT><PDAT>5</PDAT></PTEXT>
The technetium contained in these solutions cannot be collected by an evaporation process of the aqueous phase since such process would lead to loss of the most of the technetium in the form of volatile
4
−
Technetium-99 in solution, through its ionic structure, has the properties of an electrolyte, that is to say that under the effect of an electric field in an electrolytic cell, it will migrate towards the cathode on which it will be reduced. The chemical reaction equations (1) and (2) below illustrate an electrolysis of an aqueous solution of technetium-99 or TcO:
&lt;PTEXT&gt;&lt;PDAT&gt;TcO&lt;/PDAT&gt;&lt;HIL&gt;&lt;SB&gt;&lt;PDAT&gt;4&lt;/PDAT&gt;&lt;/SB&gt;&lt;/HIL&gt;&lt;HIL&gt;&lt;SP&gt;&lt;PDAT&gt;&minus;&lt;/PDAT&gt;&lt;/SP&gt;&lt;/HIL&gt;&lt;PDAT&gt;&plus;8H&lt;/PDAT&gt;&lt;HIL&gt;&lt;SP&gt;&lt;PDAT&gt;&plus;&lt;/PDAT&gt;&lt;/SP&gt;&lt;/HIL&gt;&lt;PDAT&gt;&plus;4e&lt;/PDAT&gt;&lt;HIL&gt;&lt;SP&gt;&lt;PDAT&gt;&minus;&lt;/PDAT&gt;&lt;/SP&gt;&lt;/HIL&gt;&lt;PDAT&gt;&rarr;Tc&lt;/PDAT&gt;&lt;HIL&gt;&lt;SP&gt;&lt;PDAT&gt;3&plus;&lt;/PDAT&gt;&lt;/SP&gt;&lt;/HIL&gt;&lt;PDAT&gt;&plus;4H&lt;/PDAT&gt;&lt;HIL&gt;&lt;SB&gt;&lt;PDAT&gt;2&lt;/PDAT&gt;&lt;/SB&gt;&lt;/HIL&gt;&lt;PDAT&gt;O Tc&lt;/PDAT&gt;&lt;HIL&gt;&lt;SP&gt;&lt;PDAT&gt;3&plus;&lt;/PDAT&gt;&lt;/SP&gt;&lt;/HIL&gt;&lt;PDAT&gt;&plus;3e&lt;/PDAT&gt;&lt;HIL&gt;&lt;SP&gt;&lt;PDAT&gt;&minus;&lt;/PDAT&gt;&lt;/SP&gt;&lt;/HIL&gt;&lt;PDAT&gt;&rarr;Tc&lt;/PDAT&gt;&lt;HIL&gt;&lt;SB&gt;&lt;PDAT&gt;met&lt;/PDAT&gt;&lt;/SB&gt;&lt;/HIL&gt;&lt;PDAT&gt;&emsp;&emsp;(1)&lt;/PDAT&gt;&lt;/PTEXT&gt;
&lt;PTEXT&gt;&lt;PDAT&gt;TcO&lt;/PDAT&gt;&lt;HIL&gt;&lt;SB&gt;&lt;PDAT&gt;4&lt;/PDAT&gt;&lt;/SB&gt;&lt;/HIL&gt;&lt;HIL&gt;&lt;SP&gt;&lt;PDAT&gt;&minus;&lt;/PDAT&gt;&lt;/SP&gt;&lt;/HIL&gt;&lt;PDAT&gt;&plus;8H&lt;/PDAT&gt;&lt;HIL&gt;&lt;SP&gt;&lt;PDAT&gt;&plus;&lt;/PDAT&gt;&lt;/SP&gt;&lt;/HIL&gt;&lt;PDAT&gt;&plus;3e&lt;/PDAT&gt;&lt;HIL&gt;&lt;SP&gt;&lt;PDAT&gt;31 &lt;/PDAT&gt;&lt;/SP&gt;&lt;/HIL&gt;&lt;PDAT&gt;&rarr;Tc&lt;/PDAT&gt;&lt;HIL&gt;&lt;SP&gt;&lt;PDAT&gt;4&plus;&lt;/PDAT&gt;&lt;/SP&gt;&lt;/HIL&gt;&lt;PDAT&gt;&plus;4H&lt;/PDAT&gt;&lt;HIL&gt;&lt;SB&gt;&lt;PDAT&gt;2&lt;/PDAT&gt;&lt;/SB&gt;&lt;/HIL&gt;&lt;PDAT&gt;O Tc&lt;/PDAT&gt;&lt;HIL&gt;&lt;SP&gt;&lt;PDAT&gt;4&plus;&lt;/PDAT&gt;&lt;/SP&gt;&lt;/HIL&gt;&lt;PDAT&gt;&plus;40H&lt;/PDAT&gt;&lt;HIL&gt;&lt;SP&gt;&lt;PDAT&gt;&minus;&lt;/PDAT&gt;&lt;/SP&gt;&lt;/HIL&gt;&lt;HIL&gt;&lt;SB&gt;&lt;PDAT&gt;cathodic&lt;/PDAT&gt;&lt;/SB&gt;&lt;/HIL&gt;&lt;PDAT&gt;&rarr;Tc&lt;/PDAT&gt;&lt;HIL&gt;&lt;SB&gt;&lt;PDAT&gt;2&lt;/PDAT&gt;&lt;/SB&gt;&lt;/HIL&gt;&lt;PDAT&gt;, 2H&lt;/PDAT&gt;&lt;HIL&gt;&lt;SB&gt;&lt;PDAT&gt;2&lt;/PDAT&gt;&lt;/SB&gt;&lt;/HIL&gt;&lt;PDAT&gt;O&emsp;&emsp;(2)&lt;/PDAT&gt;&lt;/PTEXT&gt;
met
2
2
These equations (1) and (2) show that, in theory, a deposit of a mixture forms on the cathode, or a mixed deposit of metal Tc represented as Tcin equation (I), and of TcO, 2HO according to equation (2).
Two types of yield may be calculated to assess this electrolysis:
met
2
2
a chemical electrolysis yield defined as the ratio between the quantity in mg of technetium Tcand/or TcO, 2HO, deposited on the cathode, and the quantity in mg of technetium-99 present in the solution before electrolysis;
a faradic electrolysis yield defined as the ratio between the number of coulombs passed through the electrolytic cell and the quantity of Tc deposited on the cathode surface.
met
2
2
met
The two preceding reaction equations (1) and (2) show that the quantity of Tcand TcO, 2HO deposited on the cathode, and therefore the chemical electrolysis yield, relates firstly to the technetium concentration at the start of electrolysis and, secondly, to the pH of the aqueous solution of technetium. When the technetium concentration increases, the chemical and faradic yields of metal Tc increase, and when the pH increases the chemical and faradic yields of Tcare reduced.
2
The technetium concentration and pH of the electrolyte solution also have an influence on the stability of the chemical forms of technetium with reduced (II) and (IV) valences in respect of the hydrolysis reaction. Any variation in the Tc concentration of the solution does not alter the chemical and faradic yields of electrodeposition. On the other hand, when the pH of the solution increases, the hydrolysed chemical forms Tc (III, IV), including TcO(OH) and TcO(OH), increase in concentration leading to a reduction in the chemical yield of the process.
2
2
Also, in respect of pH, it has been shown that when the H+ ion concentration of the electrolysis solution is higher than 0.1 M, that is to say when the pH of this solution is less than 1, the electrodeposition of TcO, 2HO is greatly reduced owing to its extensive solubility in an acid medium.
Also, the electrodeposition of metal Tc in an aqueous solution on the cathode modifies the electrochemical properties of the latter, in particular it may cause a reduction in the hydrogen overvoltage, that is to say an increase in the rate of electrochemical decomposition of the water molecules, leading to a rise in the pH of the solution.
+
2
Hydrogen overvoltage being defined as the difference between the thermodynamic value of the potential of the H/H(E=O) couple and the value of the potential over and above which the formation of hydrogen is effective is a real system. The hydrogen overvoltage value characterises the rate of electrochemical decomposition of water during the electrolysis of aqueous solutions.
A decrease in the hydrogen overvoltage, that is to say an acceleration in the electrochemical decomposition of water, can be seen during electrolysis accompanied by the formation of the cathode deposit of a metal.
Such electrochemical modification may cause a fast hydrolysis reaction of the electrodeposited species.
Document U.S. Pat. No. 3,374,157 describes a process for the electrodeposition of metal technetium on a metal substrate to prepare a source of technetium-99.
Electrodeposition of metal technetium is conducted using 150 ml of a sulphuric acid solution containing technetium-99 in the form of ammonium pertechnetate, and a completing agent stabilizing the pertechnetate ions. The complexing agents described are oxalic acid, citric acid, tartaric acid, glutaric acid, malonic acid, succinic acid and their ammonium salts. These complexing agents are intended to increase the chemical yield of metal Tc formation. The pH of this solution lies between 1 and 2 and the metal technetium is electrodeposited on a metal substrate such as copper, nickel, aluminium, silver, gold, stainless steel and platinum.
2
2
One of the drawbacks of this process is that the complexing agent stabilzing the pertechnetate ions slows down the rate of hydrolysis of the Tc(III) and Tc (IV) ions and at the same time moves the electrodeposition potential of the technetium towards negative values thereby causing a drop in the faradic yield of the technetium and an increase in TcO, 2HO in the deposit on the metal substrate.
Further, this document describes a quantitative electrodeposition of metal Tc on a metal substrate, but does not describe the separation of technetium-99 from a nitric solution.
In a nitric solution, the presence of nitrate ions complicates the electrochemical reduction mechanism of technetium-99.
The reaction equations (3), (4), (5) and (6) below illustrate the different possible electrochemical reactions during the electrolysis of an electrolyte solution containing technetium-99 in the presence of nitrate ions:
&lt;PTEXT&gt;&lt;PDAT&gt;NO&lt;/PDAT&gt;&lt;HIL&gt;&lt;SB&gt;&lt;PDAT&gt;3&lt;/PDAT&gt;&lt;/SB&gt;&lt;/HIL&gt;&lt;HIL&gt;&lt;SP&gt;&lt;PDAT&gt;&minus;&lt;/PDAT&gt;&lt;/SP&gt;&lt;/HIL&gt;&lt;PDAT&gt;&plus;3H&lt;/PDAT&gt;&lt;HIL&gt;&lt;SP&gt;&lt;PDAT&gt;&plus;&lt;/PDAT&gt;&lt;/SP&gt;&lt;/HIL&gt;&lt;PDAT&gt;&plus;2e&lt;/PDAT&gt;&lt;HIL&gt;&lt;SP&gt;&lt;PDAT&gt;&minus;&lt;/PDAT&gt;&lt;/SP&gt;&lt;/HIL&gt;&lt;PDAT&gt;&rarr;HNO&lt;/PDAT&gt;&lt;HIL&gt;&lt;SB&gt;&lt;PDAT&gt;2&lt;/PDAT&gt;&lt;/SB&gt;&lt;/HIL&gt;&lt;PDAT&gt;&plus;H&lt;/PDAT&gt;&lt;HIL&gt;&lt;SB&gt;&lt;PDAT&gt;2&lt;/PDAT&gt;&lt;/SB&gt;&lt;/HIL&gt;&lt;PDAT&gt;O&emsp;&emsp;(3)&lt;/PDAT&gt;&lt;/PTEXT&gt;
&lt;PTEXT&gt;&lt;PDAT&gt;Tc(III)&plus;NO&lt;/PDAT&gt;&lt;HIL&gt;&lt;SB&gt;&lt;PDAT&gt;2&lt;/PDAT&gt;&lt;/SB&gt;&lt;/HIL&gt;&lt;HIL&gt;&lt;SP&gt;&lt;PDAT&gt;&minus;&lt;/PDAT&gt;&lt;/SP&gt;&lt;/HIL&gt;&lt;PDAT&gt;&plus;2H&lt;/PDAT&gt;&lt;HIL&gt;&lt;SP&gt;&lt;PDAT&gt;&plus;&lt;/PDAT&gt;&lt;/SP&gt;&lt;/HIL&gt;&lt;PDAT&gt;&rarr;Tc(IV)&plus;NO&plus;H&lt;/PDAT&gt;&lt;HIL&gt;&lt;SB&gt;&lt;PDAT&gt;2&lt;/PDAT&gt;&lt;/SB&gt;&lt;/HIL&gt;&lt;PDAT&gt;O&emsp;&emsp;(4)&lt;/PDAT&gt;&lt;/PTEXT&gt;
&lt;PTEXT&gt;&lt;PDAT&gt;Tc(IV)&plus;NO&lt;/PDAT&gt;&lt;HIL&gt;&lt;SB&gt;&lt;PDAT&gt;2&lt;/PDAT&gt;&lt;/SB&gt;&lt;/HIL&gt;&lt;HIL&gt;&lt;SP&gt;&lt;PDAT&gt;&minus;&lt;/PDAT&gt;&lt;/SP&gt;&lt;/HIL&gt;&lt;PDAT&gt;&plus;2H&lt;/PDAT&gt;&lt;HIL&gt;&lt;SP&gt;&lt;PDAT&gt;&plus;&lt;/PDAT&gt;&lt;/SP&gt;&lt;/HIL&gt;&lt;PDAT&gt;&rarr;Tc(V)&plus;NO&plus;H&lt;/PDAT&gt;&lt;HIL&gt;&lt;SB&gt;&lt;PDAT&gt;2&lt;/PDAT&gt;&lt;/SB&gt;&lt;/HIL&gt;&lt;PDAT&gt;O&emsp;&emsp;(5)&lt;/PDAT&gt;&lt;/PTEXT&gt;
&lt;PTEXT&gt;&lt;PDAT&gt;Tc(III)&plus;NO&lt;/PDAT&gt;&lt;HIL&gt;&lt;SB&gt;&lt;PDAT&gt;3&lt;/PDAT&gt;&lt;/SB&gt;&lt;/HIL&gt;&lt;HIL&gt;&lt;SP&gt;&lt;PDAT&gt;&minus;&lt;/PDAT&gt;&lt;/SP&gt;&lt;/HIL&gt;&lt;PDAT&gt;&plus;2H&lt;/PDAT&gt;&lt;HIL&gt;&lt;SP&gt;&lt;PDAT&gt;&plus;&lt;/PDAT&gt;&lt;/SP&gt;&lt;/HIL&gt;&lt;PDAT&gt;&rarr;Tc(VII)&plus;NO&lt;/PDAT&gt;&lt;HIL&gt;&lt;SB&gt;&lt;PDAT&gt;2&lt;/PDAT&gt;&lt;/SB&gt;&lt;/HIL&gt;&lt;HIL&gt;&lt;SP&gt;&lt;PDAT&gt;&minus;&lt;/PDAT&gt;&lt;/SP&gt;&lt;/HIL&gt;&lt;PDAT&gt;&plus;H&lt;/PDAT&gt;&lt;HIL&gt;&lt;SB&gt;&lt;PDAT&gt;2&lt;/PDAT&gt;&lt;/SB&gt;&lt;/HIL&gt;&lt;PDAT&gt;O&emsp;&emsp;(6)&lt;/PDAT&gt;&lt;/PTEXT&gt;
2
The reaction equation (3) illustrates a cathodic reduction of the nitrate ions in nitrous acid HNOat the time of electrolysis.
Reaction equations (4) and (5) illustrate an oxidation of the Tc(II) and Tc(IV) ions by nitrous acid with the formation of Tc(IV) and Tc(V) ions respectively.
3
−
Reaction equation (6) illustrates a slow reaction between the Tc(III) ions and the NO ions leading to an additional formation of nitrous acid in the electrolysis solution.
2
2
The increase in the nitrous acid concentration during electrolysis facilitates the occurrence of reactions (4) to (6) and increases the solubility of TcO, 2HO, that is to say of Tc(IV), and the formation of hydrogen.
2
2
2
Also, the chemical reactions illustrated by reaction equations (3) to (6) show a decrease in the pH of the electrolysis solution. This drop in pH leads to the hydrolysis of the Tc(III) and Tc(IV) ions and the formation of electrochemically inactive species, such as TcO(OH), (TcO(OH))or TcO(OH), causing a drop in the electrodeposition yield of technetium.
−3
2
2
2
1
The document by B. G. Brodda, H. Lammertz, E. Merz-Radiochemica Acta, 1984 v.37, pp.213 to 216 describes an electrolytic reduction test of technetium-99 in a 0.1 M nitric medium. The electrolysis solution used contains 7×10M Tc(VII). The electrolytic cell comprises a platinum anode and a zirconium cathode. The current density used is 40 A/m. A black amorphous precipitate identified as TcO, HO was formed on the cathode. This document forms the preamble for claim of the present invention.
The purpose of the present invention is precisely to provide a method for separating techentium-99 from a nitric solution of technetium consisting of submitting the nitric solution to electrolysis to electrodeposit the technetium on a cathode, said process also comprising the following stages:
removal of the nitrates from the nitric solution of technetium to obtain a solution a) of technetium comprising little or no nitrates,
adjusting the pH of technetium solution a) to a pH of approximately 5.5 to 7.5 to obtain a solution b) of technetium, and
separating the technetium from solution b) through cathodic electrodeposition of said technetium by electrolysis.
The nitric solution of techentium-99 may for example have a nitrate concentration of approximately 3.5 to 4.5 mol/l and a technetium concentration of 150 to 200 mg/l. This solution may, for example, be derived from the reprocessing of irradiated nuclear fuel using the “PUREX” process.
The removal of the nitrates from the nitric solution of technetium, hereinafter called denitration, may be conducted with formic acid or formaldehyde in the presence of a catalyst.
This removal may be conducted using formaldehyde, oxalic acid, methanol, sugar etc. and in general with organic compounds containing one or more of the groups chosen from the group comprising —OH, —COH and/or —COOH, possibly in the presence of a catalyst.
2
The catalyst used may be a catalyst comprising platinum, for example a 1% Pt/SiOcatalyst.
During denitration, the technetium remains at valence (VII), the rate of the reaction of the technetium on formic acid being very slow, and the technetium ions with lowered valences which appear in the solution are reoxidized by the nitrous acid which is an intermediate product of denitration.
th
−4
2
One example of denitration of a solution with formic acid is described for example in document A.V. Ananiev, NRC4, 4International Conference on Nuclear and Radiochemistry, vol. II, St. Malo, France, Sept. 96. In this document denitration is conducted in thermostat-controlled glass reactor with a reflux. One portion of 1% Pt/SiOcatalyst (weight %) is poured into this reactor with the nitric solution to be denitrified, the concentration of this nitric solution being known. Concentrated formic acid is then added to the reactor in stoichiometric quantity, or higher, to the quantity of nitrates present in the solution to be denitrified. The nitric solution, catalyst and formic acid mixture is subjected to nitrogen bubble stirring and brought to a temperature of approximately 60 to 80° C. for approximately 90 minutes. A solution is obtained in which the nitrates cannot be detected by potentiometry, that is to say their concentration is less than 10mol/l.
According to the process of the invention, the formic acid is preferably added in excess in relation to the nitrate ions of the nitric solution of technetium. The removal of the nitrates from this nitric solution is then followed by adjustment of the excess formic acid before the adjustment of the pH, consisting of removing this excess for example by evaporation of the formic acid.
In this way a technetium solution is obtained called solution a) which is virtually free of nitrates.
Denitration of the nitric solution of technetium-99 provides a low, stationary concentration of nitrous acid during electrolysis.
The foregoing solution a) is then submitted to adjustment of its pH to a pH of approximately 5.5 to 7.5, preferably a pH of approximately 6 to 7.4, to obtain a solution b) of technetium. This adjustment is conducted using a reagent chosen in relation to the restraints connected with the process downstream from technetium separation for its storage.
For example, the application of alkaline metal hydroxides for pH adjustment is not possible if the technetium separation process is to be followed by a vitrifying process as their presence in the waste disturbs vitrification.
3
4
3
4
2
According to the process of the invention, this adjustment is preferably conducted using the base (CH)NOH. This (CH)NOH base (tetramethylammonium) was chosen since the compounds of technetium-99 coupled with tetraalkylammonium cations with longer (—CH—) chains have insufficient solubility in aqueous solutions.
Preferably, the reagent for pH adjustment is used in solid form to avoid an increase in solution volume.
The pH adjustment of the technetium solution, according to the process of the invention, appeared to be essential as the electrodeposition yield of technetium proved to be highly sensitive to this parameter, and the best yields were obtained in solutions with a pH of approximately 5.5 to 7.5. Also, little or no electrodeposition of technetium was observed during electrolysis of a formiate solution with a pH of less than 2.
2
2
Further, the pH adjustment of the solution led to reducing the solubility of TcO,2HO electrodeposited during electrolysis and therefore to increasing the electrodeposition yield of technetium.
With the process of the invention it was possible to show that the formiate ions from the denitration of the nitric solution of technetium stabilize the Tc(III) and Tc(IV) complexes, and that the tetramethylammonium ions used to adjust the pH of the denitrified solution increase the solubility of these complexes in an aqueous solution.
Denitration and pH adjustment, in accordance with the process of the invention, may lead to the formation of a tetramethylammonium formiate solution containing the technetium to be separated. In this case, the tetramethylammonium formiate concentration guaranteeing an excess of complexing ions in relation to the technetium in order to avoid hydrolysis of Tc(III) and Tc(IV) is preferably 1 M.
The following stage is the separation stage of the technetium from solution b) through cathodic electrodeposition of said technetium by electrolysis of said solution b) in an electrolytic cell.
According to the process of the invention, the electrolytic cell comprises at least one anode compartment and at least one cathode compartment.
According to the process of the invention, solution b) of technetium is placed in the cathode compartment of the electrolytic cell, and in the anode compartment of this electrolytic cell a solution is added that is compatible for electrolysis.
4
2
4
The compatible solution for electrolysis may for example be a solution of HClO, HSOor a solution of nitric acid, preferably a solution of nitric acid. Nitric acid was chosen to simplify the reprocessing of waste derived from the process of the present invention.
−
2
The anode and cathode compartments are preferably separated by a membrane impregnated with a cation exchanger in order to avoid the flow of technetium ions with valences (III) and (IV) from the cathode compartment(s) towards the anode compartment(s), and of HCOOions from the anode compartment(s) towards the cathode compartment(s), followed by their reoxidation into Tc(VII) and COrespectively. Indeed such reoxidation would lead to a marked decrease in the chemical yield of the electrodeposition of technetium.
The membrane impregnated with a cation exchanger may be any membrane of . . . type having cation exchanger properties, preferably the membrane used is a “Nafion 417” (registered trademark) membrane. This membrane was chosen in accordance with a study into the electrical and mechanical characteristics of different membranes described in document Aldrichimica Acta 1986, vol. 19, p.76.
+
The cation exchanger membrane also allows a stationary flow of H ions to be created from the anode compartment(s) towards the cathode compartment(s) thereby maintaining the constant acidity of the solution in the cathode compartment.
Also, owing to the separation of the anode and cathode compartments b a cation exchanger membrane, the compatible solution contained in the anode compartment(s) may be used, without being changed, for ten to fifteen consecutive electrodeposition tests.
The anode and cathode compartments of the electrolytic cell comprise at least one anode and at least one cathode respectively.
3
The anode may be made in platinum or graphite. Preferably, the anode is a platinum anode. If the anode is in graphite, for an electrolysis time of more than 1 hour, the drop in potential on the interface between the graphite and the compatible 1 M HNOsolution must not exceed 600 mV. Should this drop in potential exceed 600 mV, mechanical degradation of the anode may be observed through the formation of fine graphite powder contaminating the anode compartment.
The cathode may be in graphite, graphite having two important electrochemical characteristics:
the first characteristic is that the hydrogen overvoltage on a graphite electrode is high, that is to say in the region of −560 mV/SHE, allowing high faradic Tc yields to be obtained,
met
2
2
the second characteristic is the large specific surface area of graphite. The electrodeposition of Tcand/or TcO,2HO on the cathode modifies the surface area of the latter, leading to a problem of decrease in hydrogen overvoltage. With graphite it is possible to remedy this problem and to maintain constant hydrogen overvoltage.
The choice of a graphite cathode having a large specific surface area therefore allows high faradic electrodeposition yields to be maintained for a longer time period and consequently to avoid the hydrolysis of Tc to lower valences in the precathode layer. The precathode layer being the layer in which the electrochemical reactions take place, that is to say the transfer of electrons from the cathode to the species which are reduced in the aqueous phase.
−1
−1
According to the process of the invention, the ratio of the surface area S of the cathode over volume V of the electrolysis solution in the cathode compartment may be less than 0.5 cm, preferably from 0.2 to 0.5 cm−1, further preferably from 0.25 to 0.49 cm. When this S.V ratio decreases, the faradic chemical yield and the rate of electrodeposition also decrease.
−1
This S/V ratio may be greater than 0.5 cm, and the increase in this ratio may increase the efficiency of technetium electrodeposition.
According to the process of the invention, the electrolytic cell may also comprise a standard electrode to measure the potential of the anode and/or cathode. This standard electrode is preferably a hydrogen electrode also called SHE. With this electrode placed for example in the cathode compartment, it is possible to measure the potential of the cathode during electrolysis.
met
2
2
Electrolysis of solution b) is conducted by the passing of a direct current between the anode and the cathode. The passing of a continuous current leads to the electrodeposition of technetium in the form of Tcand/or TcO, 2HO according to the chemical reaction equations (1) and (2) previously described.
According to the process of the invention, the cathode potential is maintained constant throughout electrolysis, preferably between 0.56 V to −1.36 V in relation to SHE. A constant cathode potential during electrolysis allows the electrodeposition process to be conducted at galvanostatic rate. Using a cathode potential of −0.56 V/SHE to −1.36 V/SHE increases the chemical yield of technetium electrodeposition and accelerates technetium electrodeposition. A reduction in cathode potential to values lower than approximately −1.36 V/SHE does not increase the technetium electrodeposition yield.
2
According to the invention, the cathode potential range of −1.16 to −1.36 V/SHE corresponding to current densities of 30 to 50 A/cmrespectively, gives a chemical yield of technetium electrodeposition that is greater than 95%.
3
With the process of the invention, it is possible to obtain a chemical yield of technetium electrodeposition that is greater than 95% for an electrolysis time of two hours using a nitric solution containing 4.2 mol/l of HNOand 220 mg/l of technetium.
mrt
2
2
The technetium is electrodeposited in the form of Tcand/or TcO, 2HO on the cathode, and may be collected for example by immersing the cathode in a boiling hydrogen peroxide solution.
+
2
2
2
In the text of the present patent, the lowered valences of Tc are the oxidation sates +III and +IV. These valences are little stable in aqueous solutions. Their chemical state in solution has been little investigated. It is assumed that in a neutral medium, that is to say at a pH of between 5.0 and 8.0, the following species of Tc(IV) may co-exist.: TCO(OH), TcO(OH)and the polymerized hydroxide (TcO(OH)). The concentration of the different chemical forms is defined by the total Tc concentration of and pH value. The addition to this system of complexing ions, for example formiate ions, leads to more complex hydrolysis reaction mechanisms. Exact data on the composition of Tc(IV, III) ions in an aqueous solution in the presence of formiate ions are not to be found in the technical and scientific literature.
Other characteristics and advantages of the invention will be more clearly seen on reading the following examples which are given for illustration purposes and are non-restrictive, with reference to the appended drawings in which:
FIG. 1
is a diagram of an electrolytic cell for the electrodeposition of technetium according to the process of the invention,
FIG. 2
−1
3
shows the electrodeposition kinetics of technetium in relation to the cathode potential, expressed as a weight percentage of technetium electrodeposited on the cathode in relation to electrolysis time in minutes for two different S/V ratios, S being the surface area of the electrolytic cell cathode in cmand V being the volume of the electrolyte solution in the cathode compartment in cm.
EXAMPLE 1
Separation of Technetium from a Nitric Solution of Technetium Derived from a “PUREX” Extraction Process
EXAMPLES 2 TO 11
EXAMPLE 12
EXAMPLE 13
EXAMPLE 14
Cathodic Electrodeposition of Technetium from a Nitric Solution of Technetium using the Process of the Prior Art Described in Document U.S. Pat. No. 3,374,157
3
This example uses a nitric solution of technetium containing 4.2 mol/l of HNOand 220 mg/l of technetium-99 or Tc(VII).
a) Denitration stage
3
2
10 ml of this nitric solution are treated with pure formic acid HCOOH in a concentration ratio of [HCOOH]/[HNO]=1.5 in the presence of a 1% Pt/SiOplatinum catalyst.
2
6
The 1% Pt/SiO2 catalyst is prepared by soaking silica gel in a solution of HPtClfollowed by the reduction of the platinum with hydrazine.
2
Denitration is conducted in a thermostat-controlled glass reactor with a reflux. The 1% Pt/SiOcatalyst is poured into the reactor with the nitric solution to a solid (catalyst)/liquid (nitric solution) volume ratio of 0.125.
The concentrated formic acid is then added to the reactor and the reactor contents are mixed by means of gaseous nitrogen bubbles at a temperature of 70° C. for approximately 90 minutes to obtain solution a).
3
Potentiometric analysis of solution a) reveals that it contains no trace of HNO. Also the Tc(VII) concentration is not modified through this denitration.
b) adjustment of the pH of solution a)
The pH adjustment of solution a) is made by adding to this solution 18.8 g of tetramethylammonium hydroxide, in solid form to obtain a mixture.
This mixture is stirred until complete dissolution of the tetramethylammonium hydroxide and the pH may be adjusted more precisely to 7.32 through the addition of a few drops of a molar solution of tetramethylammonium hydroxide to obtain solution b).
c) separation of technetium
The separation of technetium from this solution b) is mad through cathodic electrodeposition of said technetium by electrolysis of solution b) in an electrolytic cell.
1
1
3
5
A diagram of the elctrolytic cell used in this example is given in FIG. . Said electrolytic cell comprises a cathode compartment and two anode compartments .
9
13
19
6
1
The cathode compartment contains a graphite cathode , a standard electrode in saturated calomel and a magnetic stirring bar for solution b). Solution b) is referenced in this FIG. .
11
The anode compartments each comprise an anode in platinum.
3
5
7
Cathode compartment is separated from anode compartments by cation exchange membranes of “Nafion 417” type (registered trademark).
3
5
15
16
17
11
9
13
Cathode compartment and anode compartments are closed with lids fitted with gas inlet openings and gas outlet openings for the elimination of the oxygen dissolved in the elextrolyte and for additional stirring during electrolysis, and with passageways for anodes , cathode and standard electrode in saturated calomel.
3
−1
The solution b) obtained previously is poured into cathode compartment . The S/V ratio is 0.5 cm, S being the surface area of the cathode and V being the volume of solution b).
5
4
4
3
Anode compartments are filled with an electrolyte solution compatible for electrolysis with solution b). Solution is a 1 mol/l solution of nitric acid HNO.
2
Electrolysis was conducted by passing a direct current between the anodes and the cathode such as to maintain a constant cathode potential of −1.36 V/SHE during electrolysis, corresponding to a current density of 40 A/m.
The yield of electrodeposited technetium is calculated by measuring the decrease in activity &bgr; of solution b) in the cathode compartment, using liquid scintillation analysis.
cat
met
2
2
−1
In this example, for a pH value of solution b) in the cathode compartment of 7.32, an initial technetium-99 concentration of 2.2 mg/10 ml before electrolysis, a cathode potential Eof −1.36 V/SHE, and a S/V ratio of 0.5 cm, the quantity of technetium in Tcand TcO, 2HO form that is electrodeposited on the cathode after 90 minutes is 2.116 mg, corresponding to a yield of 96.2%.
The quantity of technetium remaining in solution b) after electrolysis is 0.083 mg, a quantity of 0.005 g of technetium having passed into the anode compartment during electrolysis.
The results of this example are grouped under table 2 below.
cat
In these examples we studied the effect of the variation in Tc(VII) technetium concentration of solution b) at the start of electrolysis on the yield of technetium electrodeposited on the cathode; the effect of the variation in pH of solution b) at the start of electrolysis on the yield of technetium electrodeposited on the cathode; and the effect of the variation in cathode potential in relation to the standard hydrogen electrode, E/SHE, on the yield of technetium electrodeposited on the cathode.
cat
These examples are conducted in the same manner as in example 1, varying at least one of the above-mentioned parameters: the Tc(VII) concentration from 0.25 to 2.5 mg/10 ml of solution b), the pH value from 5.5 to 7.5 and the cathode potential E/SHE from −0.96 to −1.36 V/SHE.
The results of examples 2 to 11 are grouped under table 2 below.
cat
These examples show that yields of technetium electrodeposition higher than 95% can be obtained after electrolysis of denitrified solutions of technetium with technetium(VII) concentrations ranging from 250 mg/l (i.e. 2.50 mg/10 ml in the electrolytic cell), with a pH adjusted to approximately 5.5 to 7.5 and with a constant cathode potential Eranging from −1.36 to −1.16 V/SHE.
Also, the accumulation of Tc in the anode compartment in these examples did not exceed 65 mg/l.
Additional measurements to those described in these examples, of the yield of technetium electrodeposition in relation to electrolyte pH (solution b)) showed that in acid solutions with a pH of less than 1.5 to 3.5, the yield did not exceed 14 to 18% respectively for an electrolysis time of two hours.
Maximum yields were measured with pH values of between 5.5 and 7.5, more precisely between 6.0 and 7.4.
Over and above pH=8, a black precipitate appears in the electrolysis solution of the cathode compartment during electrolysis reducing the yield of electrodeposited technetium.
When the concentration of technetium in solution b) before electrolysis is higher than 5 mg/10 ml, a black precipitate also appears in the electrolysis solution of the cathode compartment during electrolysis.
−1
This example illustrates the effect of the variation in the ratio between cathode surface area S and volume V of solution b)in the cathode compartment on the chemical yield of technetium electrodeposited on the cathode. Electrolysis solution b) contains 2.17 mg of technetium (VII) for a volume of 10 ml, it is adjusted to a pH of 7.37 and the potential applied to the cathode is −0.96 V/SHE. The S/V ratio is 0.25 cm.
The results of this example 12 are given in table 2 below, together with the results of examples 1 to 11 previously described.
<PTEXT><PDAT>TABLE 2</PDAT></PTEXT>
<PTEXT><PDAT>After 90 minutes&apos; electrolysis</PDAT></PTEXT>
<PTEXT><PDAT>Tc found in</PDAT></PTEXT>
<PTEXT><PDAT>Tc on</PDAT></PTEXT>
<PTEXT><PDAT>Tc remaining</PDAT></PTEXT>
<PTEXT><PDAT>compatible</PDAT></PTEXT>
<PTEXT><PDAT>Tc yield,</PDAT></PTEXT>
<PTEXT><PDAT>Example</PDAT></PTEXT>
<PTEXT><PDAT>Initial Tc</PDAT></PTEXT>
<PTEXT><PDAT>E</PDAT><HIL><SB><PDAT>cath</PDAT></SB></HIL></PTEXT>
<PTEXT><PDAT>cathode</PDAT></PTEXT>
<PTEXT><PDAT>in solution.</PDAT></PTEXT>
<PTEXT><PDAT>HNO</PDAT><HIL><SB><PDAT>3</PDAT></SB></HIL></PTEXT>
<PTEXT><PDAT>% electro-</PDAT></PTEXT>
<PTEXT><PDAT>n&deg;</PDAT></PTEXT>
<PTEXT><PDAT>pH</PDAT></PTEXT>
<PTEXT><PDAT>(mg/10 ml)</PDAT></PTEXT>
<PTEXT><PDAT>V/SHE</PDAT></PTEXT>
<PTEXT><PDAT>(mg)</PDAT></PTEXT>
<PTEXT><PDAT>b) (mg)</PDAT></PTEXT>
<PTEXT><PDAT>solution (mg)</PDAT></PTEXT>
<PTEXT><PDAT>deposited</PDAT></PTEXT>
<PTEXT><PDAT>1</PDAT></PTEXT>
<PTEXT><PDAT>7.32</PDAT></PTEXT>
<PTEXT><PDAT>2.20</PDAT></PTEXT>
<PTEXT><PDAT>&minus;1.36</PDAT></PTEXT>
<PTEXT><PDAT>2.116</PDAT></PTEXT>
<PTEXT><PDAT>0.083</PDAT></PTEXT>
<PTEXT><PDAT>0.005</PDAT></PTEXT>
<PTEXT><PDAT>96.2</PDAT></PTEXT>
<PTEXT><PDAT>2</PDAT></PTEXT>
<PTEXT><PDAT>7.32</PDAT></PTEXT>
<PTEXT><PDAT>2.19</PDAT></PTEXT>
<PTEXT><PDAT>&minus;1.16</PDAT></PTEXT>
<PTEXT><PDAT>1.995</PDAT></PTEXT>
<PTEXT><PDAT>0.192</PDAT></PTEXT>
<PTEXT><PDAT>0.003</PDAT></PTEXT>
<PTEXT><PDAT>91.2</PDAT></PTEXT>
<PTEXT><PDAT>3</PDAT></PTEXT>
<PTEXT><PDAT>7.35</PDAT></PTEXT>
<PTEXT><PDAT>2.15</PDAT></PTEXT>
<PTEXT><PDAT>&minus;0.96</PDAT></PTEXT>
<PTEXT><PDAT>1.816</PDAT></PTEXT>
<PTEXT><PDAT>0.333</PDAT></PTEXT>
<PTEXT><PDAT>0.007</PDAT></PTEXT>
<PTEXT><PDAT>84.5</PDAT></PTEXT>
<PTEXT><PDAT>4</PDAT></PTEXT>
<PTEXT><PDAT>6.46</PDAT></PTEXT>
<PTEXT><PDAT>2.21</PDAT></PTEXT>
<PTEXT><PDAT>&minus;0.96</PDAT></PTEXT>
<PTEXT><PDAT>1.728</PDAT></PTEXT>
<PTEXT><PDAT>0.482</PDAT></PTEXT>
<PTEXT><PDAT>0.008</PDAT></PTEXT>
<PTEXT><PDAT>78.2</PDAT></PTEXT>
<PTEXT><PDAT>5</PDAT></PTEXT>
<PTEXT><PDAT>5.39</PDAT></PTEXT>
<PTEXT><PDAT>2.19</PDAT></PTEXT>
<PTEXT><PDAT>&minus;0.96</PDAT></PTEXT>
<PTEXT><PDAT>1.660</PDAT></PTEXT>
<PTEXT><PDAT>0.528</PDAT></PTEXT>
<PTEXT><PDAT>0.004</PDAT></PTEXT>
<PTEXT><PDAT>75.8</PDAT></PTEXT>
<PTEXT><PDAT>6</PDAT></PTEXT>
<PTEXT><PDAT>3.95</PDAT></PTEXT>
<PTEXT><PDAT>2.15</PDAT></PTEXT>
<PTEXT><PDAT>&minus;0.96</PDAT></PTEXT>
<PTEXT><PDAT>1.234</PDAT></PTEXT>
<PTEXT><PDAT>0.916</PDAT></PTEXT>
<PTEXT><PDAT>0.009</PDAT></PTEXT>
<PTEXT><PDAT>57.4</PDAT></PTEXT>
<PTEXT><PDAT>7</PDAT></PTEXT>
<PTEXT><PDAT>2.96</PDAT></PTEXT>
<PTEXT><PDAT>2.20</PDAT></PTEXT>
<PTEXT><PDAT>&minus;1.36</PDAT></PTEXT>
<PTEXT><PDAT>0.530</PDAT></PTEXT>
<PTEXT><PDAT>1.670</PDAT></PTEXT>
<PTEXT><PDAT>0.005</PDAT></PTEXT>
<PTEXT><PDAT>24.1</PDAT></PTEXT>
<PTEXT><PDAT>8</PDAT></PTEXT>
<PTEXT><PDAT>7.32</PDAT></PTEXT>
<PTEXT><PDAT>5.04</PDAT></PTEXT>
<PTEXT><PDAT>&minus;1.36</PDAT></PTEXT>
<PTEXT><PDAT>4.96&ensp;</PDAT></PTEXT>
<PTEXT><PDAT>0.080</PDAT></PTEXT>
<PTEXT><PDAT>0.004</PDAT></PTEXT>
<PTEXT><PDAT>98.4</PDAT></PTEXT>
<PTEXT><PDAT>9</PDAT></PTEXT>
<PTEXT><PDAT>7.30</PDAT></PTEXT>
<PTEXT><PDAT>1.07</PDAT></PTEXT>
<PTEXT><PDAT>&minus;1.36</PDAT></PTEXT>
<PTEXT><PDAT>1.023</PDAT></PTEXT>
<PTEXT><PDAT>0.041</PDAT></PTEXT>
<PTEXT><PDAT>0.002</PDAT></PTEXT>
<PTEXT><PDAT>95.6</PDAT></PTEXT>
<PTEXT><PDAT>10&ensp;</PDAT></PTEXT>
<PTEXT><PDAT>7.32</PDAT></PTEXT>
<PTEXT><PDAT>0.48</PDAT></PTEXT>
<PTEXT><PDAT>&minus;1.36</PDAT></PTEXT>
<PTEXT><PDAT>0.451</PDAT></PTEXT>
<PTEXT><PDAT>0.029</PDAT></PTEXT>
<PTEXT><PDAT>0.007</PDAT></PTEXT>
<PTEXT><PDAT>93.9</PDAT></PTEXT>
<PTEXT><PDAT>11&ensp;</PDAT></PTEXT>
<PTEXT><PDAT>7.36</PDAT></PTEXT>
<PTEXT><PDAT>0.27</PDAT></PTEXT>
<PTEXT><PDAT>&minus;1.36</PDAT></PTEXT>
<PTEXT><PDAT>0.247</PDAT></PTEXT>
<PTEXT><PDAT>0.024</PDAT></PTEXT>
<PTEXT><PDAT>0.004</PDAT></PTEXT>
<PTEXT><PDAT>91.7</PDAT></PTEXT>
<PTEXT><PDAT>12*</PDAT></PTEXT>
<PTEXT><PDAT>7.37</PDAT></PTEXT>
<PTEXT><PDAT>2.17</PDAT></PTEXT>
<PTEXT><PDAT>&minus;0.96</PDAT></PTEXT>
<PTEXT><PDAT>1.720</PDAT></PTEXT>
<PTEXT><PDAT>0.449</PDAT></PTEXT>
<PTEXT><PDAT>0.002</PDAT></PTEXT>
<PTEXT><PDAT>79.3</PDAT></PTEXT>
<PTEXT><FOO ID="FOO-00001"><PTEXT><PDAT>*&minus;S</PDAT><HIL><SB><PDAT>cath</PDAT></SB></HIL><PDAT>/V</PDAT><HIL><SB><PDAT>cath </PDAT></SB></HIL><PDAT>&equals; 0.25 cm</PDAT><HIL><SP><PDAT>&minus;1</PDAT></SP></HIL></PTEXT></FOO></PTEXT>
Example 12 well illustrates the importance of the S/V ratio on the yield of technetium electrodeposited on the cathode. When S/V decreases, the electrodeposition yield also decreases.
cat
This example is a study into the kinetics of technetium electrodeposition on the cathode in relation to cathode potential E, measured in relation to the standard hydrogen electrode of V. The cathode potential is varied from −0.56 V/SHE to −1.36 V/SHE.
−1
−1
The kinetics of technetium electrodeposition is studied for a ratio S/V=0.25 cmand a ratio S/V=0.50 cm.
The solution b) used in this example contains 2 mg of technetium per 10 ml of solution b), and its pH is adjusted to 7.37.
FIG. 2
1
2
−1
−1
illustrates the results of this example, the kinetics curve () for the ratio S/V=0.50 cm, and the kinetics curve () for the ratio S/V=0.25 cm. These curves represent the quantity in weight percentage of technetium electrodeposited in relation to time in minutes.
1
2
Kinetics curves () and () show that moving the cathode potential within −0.56 V/SHE to −1.36 V/SHE increases and accelerates the yield of the process. Maximum electrodeposition yield is obtained with a cathode potential of −1.36 V/SHE for an electrolysis time of 90 minutes. This yield is 96.2±3.1%.
The lowering in cathode potential to values of less than −1.36 V/SHE does not lead to increasing the electrodeposition yield, but causes detachment of the electrodeposited Tc from the cathode. Indeed when the cathode potential is reduced to values below −1.36 V/SHE, gaseous hydrogen is released on the surface of this cathode and disperses the electrodeposited Tc in the cathode compartment solution in the form of fine black particles thereby reducing the chemical yield of electrolysis.
1
2
cat
−1
−1
Kinetics curves () and () clearly show that after 90 minutes' electrolysis, with a cathode potential Eof −1.36 V/SHE an electrodeposition yield of technetium that is greater than 90% is obtained with a S/V ratio of 0.5 cm, whereas with a S/V ratio of 0.25 cm, under the same conditions, this yield remains at approximately 80%.
−6
−5
4
2
4
The solution used in this example is a solution containing 10to 10mol/l of Tc(VII), 1 mol/l of (NH)SOand 0.1 mol/l of oxalic acid. This solution leads to the recovery of 85 to 90% of technetium on the cathode after 8 hours of electrolysis with a cathode potential of −1.36 V/SHE. | |
Animal behavior is often learned or passed down through social interactions with other individuals. However, sometimes these socially transmitted behaviors increase exploitation of human resources, which may threaten human safety and economic livelihood (Schakner et al., 2016). Schakner et al. (2016) examined a case study where California sea lions (Zalophus californianus) discovered salmonids that had migrated up the Columbia River to the fish ladders located at the Bonneville Dam. Sea lions began foraging at the dam and increased the mortality of the Columbia River’s salmon and steelhead runs, 13 of which are listed under the Endangered Species Act (Schakner et al., 2016). The mouth of the Columbia River is home to tens of thousands migratory male California sea lions, however, the number of individuals foraging at the Bonneville dam began to sharply increase in 2002. This rapid increase in foraging was attributed to social learning and, in order to protect the endangered salmonids at the Dam, a culling program was established in 2008.Social transmission of behaviors often mimic spread of diseases in a population. Schakner et al. (2016) aimed to use models from disease ecology to estimate the social transmissibility of dam-foraging behavior, explain how social transmission can be modeled similarly to diseases and to finally examine how effective and whether culling was necessary. The benefits of early intervention are well known in infectious disease ecology and the social transmission of dam-foraging behavior in Californian sea lions supported this claim. The results showed that an earlier start to culling would have led to less overall foragers (Schakner et al., 2016). Similarly, if culling started prior to 2005, then fewer individuals would have to be removed than the current numbers. These results together mean that an immediate implementation of a culling program during the 2002 period of sharp increase in foraging behavior could have reduced the negative extent of social transmission and recruitment to the Bonneville Dam (Schakner et al., 2016). This also highlights the need for early culling efforts from a conservation and management aspect to minimize the total number of animals removed.
The authors hope that the Bonneville Dam case study could serve as an example what should be done in similar situations. They provided a novel synthesis of disease ecology models in social transmission and spread of behaviors in wildlife. Animal behaviors can rapidly spread through a population like an infectious disease. Social transmission of behaviors, like infectious diseases, can be managed through early intervention to reduce their spread and reach through a population.
Works cited
Schakner, Zachary A, Michael G Buhnerkempe, Mathew J Tennis, Robert J Stansell, Bjorn K van der Leeuw, James O Lloyd-Smith, and Daniel T Blumstein. 2016. “Epidemiological models to control the spread of information in marine mammals.” Proc. R. Soc. B. | https://sharkresearch.earth.miami.edu/novel-use-of-epidemiological-models-to-control-the-spread-of-unwanted-behaviors-in-marine-mammals/ |
Leadership enables your child to have a positive impact on others. Our leadership course is built around a sustained exploration of communication and empathy as concepts – two key skills when encouraging, supporting and motivating a group to achieve a shared goal.
Resilience
Resilience is a vital element in any child’s development. A resilient child truly believes that anything is possible if they put their mind to it. Our resilience course centres around building up a ‘growth mindset’ – allowing children to embrace new experiences with positivity and confidence.
Collaboration
Collaboration allows your child to thrive when they are working in a team. Our courses focus on strong collaborative principles whilst building your child’s confidence in articulating their own thoughts.
Creative Problem Solving
Solving problems is a massive part of everyday life for children and adults alike. Our courses focus on the importance of independent thought through a mixture of play-based problems and scenarios.
Growth Mindset
Growth mindset is an outlook that will empower your child to believe that they can get better at anything they put their mind to. Our courses focus on the everyday application of this way of thinking – allowing your child to understand the importance of mindset when it comes to how we choose to view and respond to different situations.
Confidence
Having confidence in yourself is crucial to reaching your potential. Our range of courses helps to develop children’s inner confidence. We help children believe in themselves and their ideas, allowing them to feel positive and assert themselves in any situation. | https://www.rolemodels.me/skills/ |
When security researcher, Brian Wallace was on the trail of some hackers who had snatched a California university's housing files, he stumbled upon a threat much bigger than he realized. Cyberattacker's had opened a pathway into the networks running the United States power grid.
Clues found by Wallace pointed to Iranian hackers. As it turns out, they had already taken passwords and engineering drawings of over a dozen power plants. If the hackers were skilled enough, they could have used these things to knock out electricity flowing to millions of homes.
Knowing this, why does information like this never find its way into the media. According to the Associated Press, information about the government's response to these hacks is protected and sometimes classified.
Read more about these attacks on the next page. | https://www.truthandaction.org/iranians-hack-us-power-grid/ |
English language proficiency as an indicator of academic performance at a tertiary institution.
- Authors: Stephen, D.C. , Welman, J.C. , Jordaan, W.J.
- Date: 2004
- Subjects: English language proficiency , Academic success
- Type: Article
- Identifier: uj:5682 , http://hdl.handle.net/10210/2927
- Description: The aim of this investigation was to ascertain the impact of English language proficiency on academic success of first-year black and Indian students in human resources management at a tertiary institution. Students enrolled for the period between 1996 and 2002 were included in the study. Statistical tests of differences between means were conducted. Significantly, the Indian group exhibited superior English language proficiency levels, compared to their black counterparts. The hypothesis that English language proficiency is associated with academic success appears to be substantially correct.
- Full Text:
Work status as a predictor of academic performance in the field of distance higher education.
- Authors: Welman, J.C.
- Date: 2003
- Subjects: Academic success , Work status , CHAID analysis
- Type: Article
- Identifier: uj:6525 , http://hdl.handle.net/10210/2724
- Description: This article reports on the academic success of 13 590 Technikon SA students and the importance of their "work status" (employed/unemployed) in light of the co-operative education philosophy of technikons. The data was collected by means of the students’ registration records, and analysed using a CHAID-analysis. The results indicated that the variable "work status" features second last on the list of nine successful variables for predicting academic performance. Generally, it would appear that the employment practice for technikon students is not as important a requirement for academic success as the co-operative education philosophy would like it to be.
- Full Text:
The interrelationship between the work experience of distance education students, job satisfaction, and academic achievement.
- Authors: Welman, J.C. , Basson, P.A.
- Date: 1995
- Subjects: Practical experience , Organizational behaviour , Distance education students , Work experience , Job satisfaction , Academic achievement
- Type: Article
- Identifier: uj:6526 , http://hdl.handle.net/10210/2725
- Description: In terms of the cooperative education strategy of technikons, students are expected to do subject-relevant work in the industry/commerce to gain practical experience. The degree of subject-relevant work performed by 166 distance education students, and how this is related to their academic performance, was investigated. It was found that in contrast to older Afrikaans- and English-speaking male students, it was mainly students who speak a black language who do not gain subject-relevant work experience, have minimal job satisfaction and do not earn high marks in the third-year subject (Organizational Behaviour). It is suggested that the State integrate the issues of work provision, education and training for the success of cooperative education in South Africa.
- Full Text: | https://ujcontent.uj.ac.za/vital/access/manager/Repository?view=list&f0=sm_creator%3A%22Welman%2C+J.C.%22&sort=ss_dateNormalized+desc%2Csort_ss_title+asc |
The Validation GenerationOctober 29, 2011
Neil Strauss wrote a great piece for the Wall Street Journal in July, The Insidious Evils of ‘Like’ Culture. You’ll want to read the whole thing, but we can start with this:
“Like” culture is antithetical to the concept of self-esteem, which a healthy individual should be developing from the inside out rather than from the outside in. Instead, we are shaped by our stats, which include not just “likes” but the number of comments generated in response to what we write and the number of friends or followers we have.
We are the Validation Generation. Facebook, Twitter, Instagram, Tumblr, Dribbble and endless other sites are powered by intoxicating feedback loops. We don’t lack for confidence, but it’s a shallow confidence built on the shifting sands of social approval, a temporary high. The pursuit of ego gratification is addictive, but unsatisfying. I know this from experience, from counting comments and checking my site traffic over the years to comparing Twitter followers.
Anyone remember Technorati? When blogging first became a thing, Technorati ranked the most popular blogs. People would mention being in the Top 100 in their bios and fight feverishly to retain their place.
The latest example of this is Klout, a service that attempts to measure your online influence and assign it a score. If you want a revealing look at where the search for validation leads, read their post on recent changes to their ranking algorithm. Then grab a bottle of your favorite beverage and dive into the comments, many like this one:
My score dropped about 16 points overnight. If that’s because of a new algorithm, then fine. However, it does not make any sense whatsoever that my score now shows a steady decline in the past 30 days when it was showing a steady or improving score the past 30 days with the old scoring system. A little disheartening to know I have worked very hard to tweet engaging, relevant content at least once per hour throughout the day and force myself to use Google+ and Facebook to improve my score.
Some of this is the simple fact that if you assign a score to anything, a group of people will become obsessed with raising it. But at the heart of the Validation Generation is the question of how we view what we create.
Anytime you create something (and I’m including everything from tweets, posts, and photos to the work we do), there are two ways to look at the result: what you think about what you created and what everyone else thinks about it. What I see more and more is that what everyone else thinks is determining what we think, and that isn’t healthy.
Feedback and compliments are a wonderful thing, even when they’re as effortless as a Twitter retweet or tapping a heart next to an Instagram photo. It’s just that the two things have to remain distinct from one another. If you love what you wrote, the lack of a response or even a negative response shouldn’t change that. If the photo makes you smile, it doesn’t matter if it makes anyone else smile.
Approval from others shouldn’t determine how you feel about what you created.
I aspire to such a blissful state, but it’s completely unnatural for me. Like an alcoholic who avoids tempting situations, I’ve found it best to not even open the door. This site has no stats, Google Analytics, Disqus comments, or FeedBurner counts. There are no Like buttons or +1 icons.
None of this means that those things are bad in themselves or that I’m not interested in what you think. Hit me up on Twitter or send me an email (brianbailey at gmail) — I’d love to hear from you.
It’s only about answering the question that’s hung over me for the past few years:
Is it possible to write and create for no other reason than I have something to say? | http://brianbailey.me/the-validation-generation |
6 Interlocking Stories. 6 Acclaimed Directors. One Groundbreaking Masterpiece. Acclaimed screenwriters including David Goyer (Batman Begins), Josh Olson (A History of Violence) and Alan Burnett (Batman The Animated Series) join forces with revered animation filmmakers on six spellbinding chapters chronicling Batman’s transition from novice crimefighter to Dark Knight. These globe-spanning adventures pit Batman against the fearsome Scarecrow, the freakish Killer Croc and the unerring marksman Deadshot. Using an arsenal of high-tech gadgetry from Wayne Industries, Batman’s ethical boundaries exist only where he chooses to place them, leaving some fearful of his power. The sharp storytelling, complemented by stylish art from some of the world’s most visionary animators, masterfully depicts the blurred lines of Batman as man, myth and legend.
Additional information
DirectorsYasuhiro Aoki
Shoujirou Nishimi
Futoshi Higashide
Hiroshi Morioka
Toshiyuki Kubooka
StudioWarner Bros. | https://www.microsoft.com/en-us/p/batman-gotham-knight/8d6kgwzl5s2h |
Caspar David Friedrich (1774-1840) was a German painter of the Romantic period, an era in which a growing disillusionment for industrialization and materialism turned people toward the search for a deeper sense of spirituality and greater connections with nature. Like his contemporary JMW Turner, Friedrich sought sublimity, but took a different path to reach it; while Turner aimed at astonishing through horror, Friedrich sought to engender spiritual contemplation, to draw man into the great mystery of existence, through misty, bleak, vast-seeming allegorical landscapes. In his paintings, man is often little more than a modest shadow within the swaths of forest or sea and sky.
As art scholar Elizabeth Prettejohn has noted, Friedrich’s paintings often make use of the Rückenfigur — a human figure, often in the foreground, seen from behind, contemplating the view. Because the Rückenfigur is faceless, anonymous, the viewer is encouraged to project him- or herself into that role. This not only strengthens the contemplative experience; it is also intended to suggest that the scene is not a representation of objective reality, but a version of it portrayed through a subjective lens. Thus there is an existential element in Friedrich’s paintings, which suggest that nature is not inherently emotive or meaningful; it becomes so through man’s efforts to discover meaning.
Friedrich believed that “the artist should paint not only what he sees before him, but also what he sees within him.” A deep sense of loneliness and a preoccupation with death are prolific in Friedrich’s art and, by implication, were within Friedrich as well. Yet Friedrich seems to have found beauty and spiritual substance in these thoughts, and his paintings serve as gentle reminders that the loneliness of human existence and the ever-looming presence of Death don’t have to be received with misery or terror, but can in fact lead to peace and enlightenment.
For more information about Caspar David Friedrich and his work, visit Caspar David Friedrich: The Complete Works. | http://heidicparton.com/friedrich/ |
More COVID-19 latest articles…..
COVID-19 Diagnosis
- Assessing a novel, lab-free, point-of-care test for SARS-CoV-2 (CovidNudge): a diagnostic accuracy study.Access to rapid diagnosis is key to the control and management of severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2). Laboratory RT-PCR testing is the current standard of care […]
- Delay in Cancer Screening and Diagnosis During the COVID-19 Pandemic: What Is the Cost?During the height of the coronavirus disease 2019(COVID-19) pandemic, many health care facilities needed to focus on screening for and treating patients with known or suspected COVID-19. This […]
- Association of subjective olfactory dysfunction and 12-item odor identification testing in ambulatory COVID-19 patients.Acute loss of smell and taste are well-recognized symptoms of coronavirus disease 2019 (COVID-19), yet the correlation between self-reported and psychophysical olfactory function remains unclear. Understanding the reliability […]
- N-terminally truncated nucleocapsid protein of SARS-CoV-2 as a better serological marker than whole nucleocapsid protein in evaluating the immunogenicity of inactive SARS-CoV-2.The coronavirus disease 2019 pandemic caused by severe acute respiratory syndrome-coronavirus 2 (SARS-CoV-2) had led to a serious public health crisis, and no specific treatments or vaccines are […]
- Venous thromboembolism in critically ill patients affected by ARDS related to COVID-19 in Northern-West Italy.Coronavirus disease 2019 (COVID-19) is an emerging infectious disease that was first reported in Wuhan, China, and has subsequently spread worldwide. An association between increased venous thromboembolism in […]
- SGEM#299: Learning to test for COVID19.In late 2019 and early 2020, the COVID-19 virus swept the world, creating a pandemic the likes of which the world hadn’t experienced since the influenza pandemic of […]
COVID-19 Guidelines
- The overlooked chamber in coronavirus disease 2019.Coronavirus disease 2019 (COVID-19) causes a pandemic around the globe. Debilitating and even deadly complications have occurred to the millions. A recent study reported 31% of right ventricular […]
- Identification of destabilizing SNPs in SARS-CoV2-ACE2 protein and spike glycoprotein: implications for virus entry mechanisms.COVID-19 an outbreak of a novel corona virus originating from Wuhan, China in December 2019 has now spread across the entire world and has been declared a pandemic […]
- A contemporary look at COVID-19 medications: available and potentially effective drugs.There have been significant changes to the management of COVID-19 in recent months, including protocols and guidelines designed to prevent, diagnose, and treat the Novel Coronavirus (COVID-19). Several […]
- COVID-19 and health literacy: the yell of a silent epidemic amidst the pandemic.The emergence of a new form of Coronavirus (SARS-CoV-2) exposed weaknesses of health services in several countries, with overcrowding of hospitals, and lack of supplies and professionals in […]
- Ethical dilemmas in COVID-19 times: how to decide who lives and who dies?The respiratory disease caused by the coronavirus SARS-CoV-2 (COVID-19) is a pandemic that produces a large number of simultaneous patients with severe symptoms and in need of special […]
- Rationale and design of the “Tocilizumab in patients with moderate to severe COVID-19: an open-label multicentre randomized controlled” trial (TOCIBRAS).Pro-inflammatory markers play a significant role in the disease severity of patients with COVID-19. Thus, anti-inflammatory therapies are attractive agents for potentially combating the uncontrolled inflammatory cascade in […]
More on COVID-19 guidelines…..
COVID-19 Mortality
- SARS-CoV-2 organising pneumonia: ‘Has there been a widespread failure to identify and treat this prevalent condition in COVID-19?’Reviews of COVID-19 CT imaging along with postmortem lung biopsies and autopsies indicate that the majority of patients with COVID-19 pulmonary involvement have secondary organising pneumonia (OP) or […]
- Nutraceuticals as immune-stimulating therapy to fight COVID-19. Combination of elements to improve the efficacy.COVID-19 pandemic has underlined that unknown viral infections, which jump from animals to humans, can be extremely dangerous. In case of new viruses as SARS-CoV2, available drugs can […]
- The Perfect Storm: COVID-19 Health Disparities in US Blacks.Coronavirus disease 2019 (COVID-19) accounts for over 180,000 deaths in the USA. Although COVID-19 affects all racial ethnicities, non-Hispanic Blacks have the highest mortality rates. Evidence continues to […]
- Advances in SARS-CoV-2: a systematic review.In December 2019, Severe Acute Respiratory Syndrome Coronavirus-2 (SARS-CoV-2) infection broke out in Wuhan, China. However, we still lack a comprehensive understanding of this emerging virus. In this […]
- Could ferritin level be an indicator of COVID-19 disease mortality?While the number of COVID-19 cases is increasing day by day, there is limited information known about the hematological and laboratory findings of the disease. We aimed to […]
- Suicide Attempt as the Presenting Symptom in a Patient with COVID-19: A Case Report from the United States.Coronavirus disease 2019 (COVID-19) has attained a pandemic status and is associated with a high morbidity and mortality. Social isolation, fear of ostracization, and illness itself and limited […]
COVID-19 Primary Care
- A reflection on the impact of COVID-19 on primary care in the United Kingdom.The COVID-19 pandemic has presented both challenges and opportunities for those working in health and social care in the United Kingdom (UK). With much focus on secondary and […]
- New Coronavirus: (Re)thinking the care process in Primary Health and Nursing.to reflect on the challenges and power of the nursing care process in Primary Health Care in the face of the New Coronavirus, COVID-19, in the Brazilian scenario.reflective […]
- SARS-CoV-2 Infections and Impact of the COVID-19 Pandemic in Pregnancy and Breastfeeding: Results from an Observational Study in Primary Care in Belgium.COVID-19 also affects pregnant and breastfeeding women. Hence, clinicians and policymakers require reliable evidence on COVID-19 epidemiology and consequences in this population. We aimed to assess the susceptibility […]
- A Bottom-Up Approach Addressing Patient Care and Differential Diagnosis Amidst the Covid-19 Response.Patient care often refers to the broad spectrum of care, prevention, and treatment that a provider delivers, while the point of a differential diagnosis is to make a […]
- Evaluation of endoscopy requests in the resumption of activity during the SARS-CoV-2 pandemic: denial of nonindicated requests and prioritization of accepted requests.the global SARS-CoV-2 pandemic forced the closure of endoscopy units. Before resuming endoscopic activity, we designed a protocol to evaluate gastroscopies and colonoscopies cancelled during the pandemic, denying […]
- Atypical presentation of COVID-19 in hospitalised older adults.It is increasingly recognised that older patients may not present with typical symptoms of COVID-19.This study aims to evaluate the incidence, characteristics and clinical outcome of older adults […]
More on COVID-19 primary care….. | https://clinowl.com/covid-19-latest/ |
Its name comes from the Greek word for scorching. Measurement. Sirius A and B. NASA / ESA / G. Bacon (STScI) The brightest star in the sky is Sirius, also known as the “Dog Star” or, more officially, Alpha Canis Majoris, for its position in the constellation Canis Major.
It is believed to be 100 times as massive as our Sun, and 10,000,000 times as bright! But looking at it away from our Earthly vantage point, R136a1 is about 10 million more luminous than our Sun. The Sun is the brightest star as viewed from Earth. 1. Tags: Gamma Ray Burst, Quasar, Sun, Universe It lies about 165,000 light years from Earth and has a visual magnitude of 12.77. On a stellar scale, it's really quite average — about half of the known stars are larger; half are smaller.
Quasar is the brightest object in the known universe. Distance: 8.6 Light Years 2. The brightest star other than a supernova (in absolute terms) is more difficult to say; it might be LBV 1806-20, but some astronomers now think that star is actually two stars.
Thanks to its pretty reddish color, it's been given the nickname "Herschel's Garnet Star" in honor of Sir William Herschel, who observed it in 1783, and is also known by the Arabic name Erakis.
Answer: The largest known star (in terms of mass and brightness) is called the Pistol Star. The following is the list of the 10 brightest stars in the known Universe.
Astronomers have detected the brightest known exploding star in the Universe. These are the areas directly around a black hole where stars, gas and light are being pulled inwards.
Most of the brighter naked eye stars are at distances of a few tens to hundreds on light years from Earth. It is estimated that some quasars emit more light than 100 galaxies. The Sun’s close proximity to Earth is why it looks like the brightest thing in our sky. The brightest star known to be a single star is the so-called "Pistol Star" located in the Pistol Nebula in Sagittarius.
Follow the three belt stars 20 degrees southeast to the brightest star in the sky.
Here the maximum visible magnitudes above the second brightest star, Sirius (−1.46), are as follows. That isn't the question either, the brightest star known in the universe is R136a1, a blue hyper-giant which is not only the most massive star known, at 265 solar masses, but the brightest. Aside from gamma-ray bursts, the other brightest objects in the universe are quasars. The list is dominated by hot blue stars which produce the majority of their energy output in … The Pistol Star is the brightest known star in the universe. Sirius A Your fist at arm's length covers about 10 degrees of sky, so it's about two fist-widths down. These are stars with more than 100 times the mass of the Sun. Venus, also known as the ‘morning star’ and the ‘evening star’ is one of the planets closest to Earth and is also one of the brightest objects in space and can also be seen at midday, despite the Sun is at its brightest. | https://fourarcstudio.com/page.php?id=6a0ebb-what-is-the-brightest-star-in-the-known-universe |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.