content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
Achievement and Standards
In our last full inspection, Ofsted judged Denbigh to be outstanding and we continue to self-evaluate as an outstanding school. Denbigh is on a journey of maintaining excellence and transforming to world class.
We are immensely proud of the recognition and awards we receive that demonstrate the high expectations and standards held at Denbigh.
Examination Headlines
2020-2021
PLEASE NOTE: The 2020-2021 Results are not published in the Performance Measures.
2019-2020
PLEASE NOTE: The 2019-2020 Results are not published in the Performance Measures.
2018-2019
Pupils make exceptional progress by the end of Key Stage 4. Quality Assurance Review | September 2017
Find and compare schools in England - Denbigh High School (GOV.UK).
View our Examination Timetable.
View our Examination Policy.
View our Examinations Procedure for reviews of marking - centre assessed marks.
(GCSE controlled assessments and GCSE non-examination assessments).
Top Key Features of Denbigh High School
Highly effective systems and processes to support teaching, learning and leadership.
‘“There is a detailed and extensive programme of new staff and NQT induction, and a coaching/mentoring programme has more recently been established. There is a tailored approach to CPD, including, for example, a programme for colleagues aspiring to middle or senior leadership positions, which has led to progression opportunities for many staff.”
SSAT Transforming Practice Review 2019
A curriculum which successfully promotes achievement, inclusion and use of Technology for Learning.
“Learning in the classroom is enhanced by, not dominated by excellent use of technology and chromebooks.”
Opening Doors to Excellence 2019
‘Technology for Learning is embedded across all areas of the school. Both students and teachers have received national and international recognition for their innovative use of technology to support learning.’
Quality Assurance Review 2018
A very committed staff and a constant drive for improvement from leadership at all levels.
“The depth of engagement by staff in evidence informed practice, demonstrated though high quality teaching and learning journals was particularly impressive”.
SSAT Transforming Practice Review 2019
Outstanding teaching and subject knowledge.
“The Science and History departments have been awarded the subject mark from the PTI demonstrating enhanced subject knowledge. “Congratulations to you and your colleagues and thank you for sharing your inspiring creativity and innovation with colleagues across the country.”
Quality Assurance Review 2017
Excellent attitudes to learning and school.
‘There are excellent relationships between staff and pupils. Pupils have very positive attitudes to learning.’
Quality Assurance Review 2017
Strong school values and consistently high expectations and standards.
‘Students continue to make exceptional progress at Denbigh High School.’
Quality Assurance Review 2018
High achievement for almost all groups, especially those in receipt of pupil premium.
‘Pupils make exceptional progress by the end of Key Stage 4. Disadvantaged pupils also make exceptionally good progress.’
Quality Assurance Review 2017
National Recognition and Awards
Pupil Premium Awards 2017 | Secondary School Runner Up
Recognising the outstanding work the school does for children whose circumstances make them disadvantaged.
International School Award 2018-2021
Recognised for outstanding development of the international curriculum dimension in the curriculum.
Computing at School 2018-2019
Lead School within the network of teaching excellence in computer science.
SSAT Framework for Exceptional Education
In recognition of our transforming practice in; Climate for Learning, Professional Learning,
Leadership Through Moral Purpose, Principled Curriculum Design,Effective Leaning
Behaviours, Wellbeing and Variety of Teaching Approaches to support teaching and learning.
SSAT Leading Edge status 2019-2020
Leading edge is a national network for high-performing schools within a commitment to raising achievement through collaboration and innovation.
SSAT Educational Outcomes Award 2019
In recognition of being in KS4 Progress Band 1 of schools nationally.
360 Degree Safe
The 360 Degree Safe accreditation is given to schools who can demonstrate that they
have moved from a basic level provision for online safety to practice that is aspirational
and innovative.
The PTI Subject Leadership Mark, 2019 Science and 2020 History
Awarded for increasing challenge within the Science and History curriculum, for enthusing students with activities beyond the curriculum, for developing the staff’s own specialist subject knowledge and developing subject-based links outside the school.
Association for Physical Education Award Quality Mark - at the highest possible level of Distinction. This award illustrates that Denbigh has demonstrated outstanding commitment to improvement in Physical Education and Sport, and this is a real reflection of the hard work and dedication that the PE team puts in to providing the best sporting opportunities and learning experiences for our students.
School Games Platinum Mark Award | 2019-2020
The School Games Mark is a Government led award scheme launched in 2012, facilitated by the Youth Sport Trust to reward schools for their commitment to the development of competition across their school and into the community.
School Games Award | Autumn 2019/Spring 2020
Recognised for our support, commitment and engagement with the School Games programme during the Autumn and Spring Terms.
School Games Virtual Award | Summer 2020
Recognised by School Games for our support, commitment and engagement of virtual programmes during the Summer Term.
Wellbeing Award for Schools
Recognised by Optimus Education for ensuring that mental health and wellbeing sit at the
heart of school life.
UNESCO
Recognised by UNESCO as a worldwide Best Practice Case Study in the use of mobile technology to support engagement and raise attainment.
EdTech 50 School
Recognised as one of the top fifty schools in the country for effective use of technology.
EdTech Demonstrator School 2020
Denbigh was delighted to be announced by the Department for Education as one of their new EdTech Demonstrator schools. One of just 38 such schools across the country, Denbigh has received funding to support those schools who have introduced the use of Google Apps For Education during lockdown and now need advice and guidance to develop their own technology for learning strategies.
Apps For Good
For the past six years, students from Denbigh have taken part in the national Apps For Good competition, encouraging young people to become passionate about technology. | https://denbighhigh.luton.sch.uk/SchoolInformation/Achievement-and-Standards/ |
The impact of nursing home residents' characteristics on ratings of importance of autonomy preferences in daily care over time.
Nursing home (NH) residents' preferences for everyday living are the foundation for delivering individualized care. Yet, work has not examined the impact of demographic and clinical characteristics of NH residents on the stability of their preferences over time. This study examined the rate of change in reports of importance of 27 autonomy-related everyday preferences from the Preferences for Everyday Living Inventory over 3-months and the demographic and clinical characteristics associated with change for nursing home residents (N = 255). Descriptive frequencies and tests of mean difference were utilized to examine differences between individuals reporting change in importance over time compared to those that did not report change. Autonomy preferences in daily care remained stable over 3-months for the majority of residents. For residents that did report change on autonomy preferences, no systematic associations of demographic or clinical characteristics were found to be associated with change. Rather, change was associated with differential characteristics based on the preference. This study indicates that knowing a person's demographic or clinical characteristics in care will not uniformly inform a caretaker's understanding of the individual's reports of importance for autonomy related preferences over time. Future work should explore the role of care environment on change in preference ratings over time.
| |
Immunosorbents are useful in biochemical processes and applications, such as the isolation and purification of proteins, immunodiagnostics, and as sensors for detecting the presence of biochemical substances. Immunosorbents are capable of isolating and purifying both proteins and haptens present in complex mixtures at extremely low concentrations. [Generally, proteins are polymers formed from at least one hundred amino acid residues joined by amide linkages, and peptides are comprised of from two to ten amino acid residue joined through amide linkages; for the sake of simplicity, the term protein is used hereinafter to describe any molecule containing two or more amino acid residues joined through amide linkages. Haptens are non-proteinaceous molecules which have a sufficiently recognizable chemical structure that an antibody will have an avidity for the compound.]
Immunosorbents are generally made by immobilizing an antibody on a suitable support (also referred to as a substrate or matrix), such as a gel, membrane or other suitable chromatographic support material. Since antibodies have both high specificity and binding affinity for particular antigen or hapten molecules, immunosorbents are frequently used to separate and purify specific antigen or hapten molecules from dilute solutions thereof by interaction with immobilized antibodies on the immunosorbent matrix. Immunosorbents are also used in immunodiagnostics to assay quantities and types of proteins present in biological and biochemical samples. Of course, other uses of immunosorbents are known or will be apparent to those of skill in the art.
The total binding capacity of an immunosorbent is determined by the number of active antigen binding sites; unfortunately, only a small fraction of the antibodies immobilized on the matrix of currently available immunosorbents are "active" (i.e., able to bind to antigens). It is believed that interactions between the antigen binding site (antitope or F.sub.ab) on the antibody and the support interfere with the ability of the bound antibody to attract and bind antigens which can be bound when the antibodies are not bound.
Typical immunosorbents, having antibodies bound directly to a matrix, bind less than 30% of the theoretical capacity of antigen or hapten molecules based on a 1:2 stoichiometry of antibody to antigen. [In other words, less than 30% of the bound or immobilized antibodies are oriented so as to have an avidity for antigens having the same epitope as the antigens eluted therefrom]. This results in a great waste of bound antibody, and requires the use of much larger quantities of immunosorbent material to achieve good separation and purification of desired compounds.
According to Cuatrecasas, the use immunosorbents, (immunoadsorbents) for the purification of antibodies or antigens is related to affinity chromatography. See "Protein Purification By Affinity Chromatography," J. Bio. Chem, Vol. 245, No. 12, Jun. 25, 1970, pp. 3059-3065. Both technologies involve the separation of specific molecules or bioaffinants from solutions through attraction to and binding by specific molecular recognition sites on stationary bioaffinity ligands attached to a support. In the case of immunosorbents, generally, the bound ligand is an antibody, and the specific molecular recognition sight on the antibody is referred to as an antitope; antigens for which the antitope of the antibody has an avidity for are said to contain the epitope for the antibody antitope. In certain instances, it is possible to synthesize the epitope for a given antitope of an antibody. This is especially useful when the antigen is expensive, in short supply, or difficult to work with.
Cuatrecasas has attributed the limited success of immunosorbents in purifying antibodies and antigens on the lack of suitable solid supports for the attachment of ligands, and on the failure to fix these ligands at a sufficient distance from the matrix backbone. Therefore, it was proposed that bioaffinity matrices and immunosorbents be prepared with the ligand groups (antibodies), critical in the interaction with the macromolecule to be purified (antigen), sufficiently distant from the backbone of the solid matrix to minimize allosteric (steric) interference with affinity processes. Hence, a "spacer arm" was used to attach ligands to a solid support; the spacer arm maintains the bound or immobilized ligand at a sufficient distance from the solid matrix so as to minimize matrix effects on the binding ability of the bound ligand. However, the use of such spacer arms increases the cost and difficulty of producing bioaffinity matrices and immunosorbents.
Immobilization of an antibody on an immunosorbent matrix is usually achieved by interaction between the antibody and the matrix. Frequently, a matrix is activated so that the matrix readily binds to reactive amine functional groups in the protein chain forming the antibodies. Thus, the antibodies are bound to the matrix and immobilized.
For example, Goding discloses that reactive groups such as cyanogen bromide (CNBr), N-hydroxysuccinimide, carbonyldiimidazole, and toluene sulphonylchloride can be used to activate a matrix, and the activated matrix can then be used to immobilize antibodies through accessible primary amino groups on the protein chain forming the antibody. See Monoclonal Antibodies: Principles And Practice, Academic Press, New York (1983). Because amino groups can be present on various parts of the protein chain (or chains) forming the antibodies, the orientation of proteins immobilized in this way on activated matrices is thought to be random on the immunosorbent support matrix surface. Thus, a significant portion of the distribution of orientations of antibodies on the immunosorbent surface obtained by random amino-coupling chemistry can be expected to lower avidity and/or completely obstruct the antigen-combining sites. Thus, attempts to follow the suggestions of Cautrecasas, discussed above, by adding a "spacer arm" between an immunosorbent support matrix and a bound antibody have not been successful in increasing the activity of immunosorbents. It is believed that a significant portion of the bonds between the "spacer arms" and the bound antibodies interfere with the ability of the bound antibodies to attract and bind antigens.
For example, O'Shannessy et al, in "Specific Conjugation Reactions Of The Oligosaccharide Moieties Of Immunoglobulins," J. Appl. Biochem., 7, 347-355 (1985), discloses that immunoaffinity supports can also be prepared by coupling the carbohydrate moieties of certain antibodies to a matrix. For example, a polyclonal IgG (immunoglobulin) fraction of goat anti-human albumin was coupled to AAH (agarose adipic acid hydrazide). However, this method may not be generally useful for preparing immunosorbents, since certain antibodies, such as IgG, have low carbohydrate content. Further, it is believed that immunosorbents prepared by this method will suffer the same problem as immunosorbents prepared by other techniques, such as the loss of immunologic activity due to binding of antibody through or in close proximity to the antigen binding sites and the multiple orientations of the antibody molecules on the matrix.
It is also possible to immobilize antibodies on an immunosorbent support matrix through non-covalent bonding; for example, an immunosorbent support matrix of polystyrene will form noncovalent bonds between the long alkyl chains of isoleucine in proteins. The long non-polar alkyl chains readily associate with the non-polar environment of the plastic matrix and are attached to the polystyrene matrix due to low energy forces.
For further examples of the synthesis, variety and effectiveness of immunosorbents, their applications and for additional background, see: Comoglio, S., Massaglia, A., Rolleri, E. and Rosa, A. (1976) "Factors affecting the properties of insolubilized antibodies." Biochimica et Biophysica Acta, 420, 246-257. Cress, M. C. and Ngo, T. T. (1989) "Site Specific Immobilization of Immunoglobulins." Amer. Biotech. Lab., xx, 16-19. Eveleigh, J. W. and Levy, D. E. (1977) "Immunochemical characteristics and preparative application of agarose-based immunosorbents." J. Solid-Phase Biochem., 2(1), 45-77. Gersten, D. M. and Marchalonis, J. J. (1978) "A rapid, novel method for the solid-phase derivatization of IgG antibodies for immuno-affinity chromatography." J. Immunol. Meth., 24, 305-309. Tijssen, P. (1985) "Practice and Theory of Enzyme Immunoassays." Vol. 15, Elsevier, New York. Nose, M. and Wigzell, H. (1983) "Biological significance of carbohydrate chains on monoclonal antibodies." Proc. Natl. Acad. Sci., 80, 6632-6636. Sox, H. C. and Hood, L. (1970) "Attachment of carbohydrate to the variable region of myeloma immunoglobulin light chains." Proc. Natl. Acad. Sci., 66(3), 975-982. Wallic, S. C., Katat, E. A. and Morrison, S. L. (1988) "Glycosylation of a VH residue of a monoclonal antibody against (1-6) dextran increases its affinity for antigen." J. Exp. Med., 168, 10-99-1109. Schneider, C., Newman, R. A., Sutherland, D. R. Asser, U. and Greaves, M. F. (1982) "A one-step purification of membrane proteins using a high efficiency immunomatrix." J. Biol. Chem., 257 (18), 10766-10769. Akerstrostrom, B., Brodin, T., Reis, K. and Bjorck. L. (1985) "Protein G: a powerful tool for binding and detection of monoclonal and polyclonal antibodies." J. Immunol., 135, 2589-2592. O'Shannesy, D. J. and Quarles, R. H. (1987) J. Immunol. Methods, 99, 153. Babashak, J. V. and Philips, T. M. (1988) J. Chromatogr., 444, 22. Sato, H., Kidake, T. and Hori, M. (1987) "Leakage of immobilized IgG from therapeutic immunoadsorbents." Appl. Biochem. Biotech., 15, 145-158. Sterns, D. J., Kurosawa, S., Sims P. J., Esmon, N. L. and Esmon, C. T. (1988) "The interaction of a Ca.sup.2+ -dependent monoclonal antibody with the Protein C activation peptide region," J. Biol. Chem., 63(2), 826-832. Orthner, C. L., Madurawe, R. D., Velander, W. H., Drohan, W. N., Battey, F. D., Strickland, D. K. (1989) "Conformational changes in an Epitope Localized to the NH.sub.2 -terminal Region of Protein C." J. Biol. Chem. 264(310 18781-18788. Sakuragawa, N., Shimizu, J., Kondo, K., Kondo, S., Niwa, M. (1986) "Studies on the effect of PEG-modified urokinase on coagulation-fibrinolysis using beagles." Thrombosis Research, 41, 627. Berger, Jr., H. and Pizzo, S. V. (1988) "Preparation of polyethylene glycol-tissue plasminogen activator adducts that retain functional activity: characteristics and behavior in three animal species." Blood, 71, 1641-1647. All references discussed or mentioned above or hereafter are incorporated by reference as if reproduced in full below.
Thus, there is a need for immunosorbents with improved binding efficiency, such that a high percentage of the antibodies bound or immobilized on a support are capable of maintaining avidity sufficient to attract and bind with proteins or haptens which they are capable of binding with when not bound to a support (or otherwise complexed). There is also a need for an inexpensive process for preparing immunosorbents having improved binding efficiency. An immunosorbent with improved binding efficiency is defined hereinafter as any immunosorbent in which greater than 30% of bound antibodies or bound ligands are active; active is defined hereinafter as the ability of the specific molecular recognition site on a ligand or the ability of the antitope on an antibody to be able to attract and bind to compounds or antigens.
| |
Over half of Americans are still positive about the role religion can place in addressing today's problems.
A new Gallup poll has found that 57 per cent believe religion can answer all or most of today's problems.
Only a minority - 30 per cent - believe it is largely old fashioned or out of date.
However, the figures still reflect a decline over the last few decades in the number of Americans who believe religion is the answer.
In 1958, the vast majority - 82 per cent - believed in religion's ability to solve today's problems. In the last 14 years since 2000, the percentage of Americans who believe it can answer problems has dropped from 68 per cent to 57 per cent.
Meanwhile, the percentage who believe religion is old fashioned and out of date has risen in the same time period from 19 per cent in 2000 to 30 per cent today.
"The 82 per cent choosing the 'can answer today's problems' options in 1957 is in line with a number of other measures from that decade showing a high level of religiosity, including religious service attendance, importance of religion, and the percentage of Americans with a formal religious identity," Gallup said.
Unsurprisingly, the poll revealed a correlation between people's religiosity and their likelihood to see religion as important to solving problems.
Of those who attend church weekly, 84 per cent said religion can answer problems, compared to just 11 per cent who felt it was old fashioned and out of date.
Conversely, among those who said religion was not very important to them, only 11 per cent said it could answer problems, while 76 per cent said it was old fashioned and out of date. These figures were mirrored among people who described themselves as liberal - 36 per cent and 49 per cent respectively.
"Older Americans, women, those living in the South, and political conservatives are among the most religious groups in the US based on measures of church attendance and importance of religion," said Gallup.
"These groups, in turn, are also the most likely to say that religion can answer most or all of today's problems. Still, across almost all of the demographic and political categories in the table below, the percentage saying that religion can answer most or all of today's problems is higher than the percentage saying that it is out of date.
"The exception is liberals, comprising about 25 per cent of this sample, who are more likely to say religion is out of date than to say it can answer today's problems." | http://www.christiantoday.co.in/article/majority.of.americans.still.think.religion.is.answer.to.todays.problems/7951.htm |
This paper investigates the problem of image classification with limited or no annotations, but abundant unlabeled data. The setting exists in many tasks such as semi-supervised image classification, image clustering, and image retrieval. Unlike previous methods, which develop or learn sophisticated regularizers for classifiers, our method learns a new image representation by exploiting the distribution patterns of all available data for the task at hand. Particularly, a rich set of visual prototypes are sampled from all available data, and are taken as surrogate classes to train discriminative classifiers; images are projected via the classifiers; the projected values, similarities to the prototypes, are stacked to build the new feature vector. The training set is noisy. Hence, in the spirit of ensemble learning we create a set of such training sets which are all diverse, leading to diverse classifiers. The method is dubbed Ensemble Projection (EP). EP captures not only the characteristics of individual images, but also the relationships among images. It is conceptually simple and computationally efficient, yet effective and flexible. Experiments on eight standard datasets show that: (1) EP outperforms previous methods for semi-supervised image classification; (2) EP produces promising results for self-taught image classification, where unlabeled samples are a random collection of images rather than being from the same distribution as the labeled ones; and (3) EP improves over the original features for image clustering. The code of the method is available on the project page. | https://mlprior.com/articles/details/191905 |
The National Digital Stewardship Alliance detailed suggestions for the future of data preservation in its annual National Agenda for Digital Stewardship report, in conjunction with the Library of Congress.
Released Dec. 10, the report outlined key technological trends, gaps and opportunities for data preservation for professionals and policymakers.
“Effective digital stewardship is vital to the nation’s cultural heritage, scientific evidence base and the public records necessary for understanding and evaluating government actions,” according to the report.
Public libraries have been dealing with numerous challenges in preserving digital data in the 21st century. Growing financial pressures coupled with insufficient manpower and other problems have made preservation difficult.
“I see the biggest challenge in terms of resources and staff,” said Trevor Owens, a digital archivist with the national digital information infrastructure and preservation program at the Library of Congress. “Digital preservation is not a niche issue; increasingly, federal records, the entertainment industry, data and tools in the sciences and cultural resources written large are born digital. That is, there is almost no area of society that hasn’t been affected by the digital revolution. With this noted, the resources and staff need to ensure long-term access to this content are not being added to member organizations at the rate that the members organizations feel they need.”
The report suggested a number of ways to improve preservation despite these problems.
NADS urged libraries to specialize in one area of preservation expertise. Instead of requiring libraries to waste resources learning all types of preservation, each library should pick one area and rely on the others for preserving different media.
“It is key to identify preservation functions that could be outsourced versus the functions that each organization prefers to do or must do for itself,” the report stated.
Some of the bigger data challenges deal with which electronic media should be preserved. The proliferation of digital diaries, blogs, tweets and other platforms have led libraries to question is it all worth saving. The report suggests educating the public to save its electronic data long-term to circumvent this issue. Still, the Library of Congress is doing its best to keep these materials with its Internet archive and Twitter archive.
Keeping all of this data is a daunting obstacle as well. NADS wants libraries to share information about file obsolescence, meaning when files fall out of public favor or are replaced by newer, better technologies.
Standards and best practices can also mitigate problems for libraries by making information easy to share and accessible. NADS also recommended research into cost modeling and studies into questions about possible threats to information.
The National Digital Stewardship Alliance was created in 2010. It is a consortium of preservationists from libraries and universities across the country. | https://www.fedscoop.com/reading-tea-leaves-data-preservation/ |
CONTENT:
48% Acrylic, 26% Tactel®, 25% Nylon & 1% Spandex
FIT GUIDANCE:
Choose the same size of sock as your foot. If you have narrow feet (D or less) or are on the border between sizes you should go down a size
Cut barb with scissors to avoid damage to fabric
Pull sock on carefully to ensure fitted heel and toe box sit on the foot correctly
Smooth out any wrinkles between the layers to ensure a snug, smooth fit.
CARE:
Machine wash at 30 degrees. No tumble dry. | https://www.contactleft.co.uk/clothing-snugpak/1000-mile-socks/1000-mile-womens-snow-socks.html |
Techniques to genetically-edit human embryos should not be used until they are proved to be reliable and safe, an international commission said Thursday, in the wake of a scandal over gene-modified babies in China two years ago.
Experts from the commission of US National Academy of Medicine, US National Academy of Sciences, and Britain's Royal Society said heritable genome editing for medical purposes was "not yet ready" to be tried safely and effectively in human embryos.
The body was set up after Chinese biophysicist He Jiankui triggered an international scandal by claiming in 2018 that he was behind the world's first gene-edited babies using Crispr, a powerful new tool that acts as a kind of molecular "scissors".
Ignoring ethical and scientific norms, he created the twins Lula and Nana with alterations to their genomes meant to give them immunity to HIV.
He was sentenced to three years in prison for illegal medical practice by a Chinese court in December.
The case alarmed scientists worldwide, raising questions about bioethics and global oversight of scientific research, as well as reigniting fears about parents creating so-called "designer babies".
The commission said that the event made it clear that there was a risk "of ad hoc editing efforts that could cause significant harm to individuals".
"Moreover, given that heritable changes would be introduced that could be passed to subsequent generations, it was clear that careful consideration would need to be given to the specific applications of the editing technology," it said.
Heritable genome editing includes making alterations to the genetic material of human eggs, sperm, or any cells that lead to their development, including the cells of early embryos, the report said, adding that clinical use of this technology was either banned or not permitted in many countries.
This commission, made up of 18 experts from different disciplines, did not reject the principle of genetic modification in humans but aimed to provide a framework for countries considering the use of the technology.
It acknowledged that gene editing "could represent an important option for prospective parents with a known risk of transmitting a genetic disease to have a genetically-related child without that disease and its associated morbidity and mortality".
But in its recommendations it said that genome editing on embryos should not be used to create a pregnancy unless it has been "clearly established" that the changes can be reliably made without also making "undesired changes".
It said that criteria had not yet been met and called for further research and "extensive societal dialogue" before countries make the decision to allow heritable human genome editing.
"Should they ever be used, it is vitally important that these technologies are used for medically justified interventions, based on a rigorous understanding of how the pathogenic variant leads to disease," said commission co-chair Kay Davies, professor of genetics at the University of Oxford.
"More research is needed into the technology of genome editing in human embryos, to ensure that precise changes can be made without undesired off-target effects. International cooperation and open discussion of all aspects of genome editing will be essential."
The commission's report will feed into work by the World Health Organization, which has set up a committee for governance of both heritable and non-heritable human genome editing research and clinical uses. The WHO committee is expected to issue guidance later this year.
Is this the end of the Samsung Galaxy Note series as we know it? We discussed this on Orbital, our weekly technology podcast, which you can subscribe to via Apple Podcasts, Google Podcasts, or RSS, download the episode, or just hit the play button below.
For the latest tech news and reviews, follow Gadgets 360 on Twitter, Facebook, and Google News. For the latest videos on gadgets and tech, subscribe to our YouTube channel. | https://gadgets360.com/science/features/embryo-gene-editing-world-not-ready-say-experts-us-national-academy-of-medicine-sciences-royal-society-2290341 |
Tennessee Williams was one of the greatest and most well-known American playwrights of the twentieth century. In order to better understand A Streetcar Named Desire, it is important to know some facts about Tennessee Williams' personal life and background.
Growing up, Williams was not healthy; and because of that, he did not relate to other boys his age. His father was a drunk; he did not receive much love from his father (Baym, 2184). On the other hand, his mother loved him and protected him. Because of these factors, Williams had a well-developed "feminine side"; he later became an active homosexual (Baym, 2186).
Williams was very close to his sister. Unfortunately, Rose suffered mental problems and was taken away to a mental asylum. Much of the content within William's plays (most notably, A Streetcar Named Desire) was based off of his family and personal life (Baym, 2185). Williams suffered from alienation and loneliness.
Tennessee described desire as being "...rooted in a longing for companionship, [it is] a release from the loneliness that haunts every individual”.
Tennessee wrote numerous plays during his life; and of those the most well-known and recognized is his play entitled, A Streetcar Named Desire. This play was first performed in 1947 (Baym, 2185).
The late 1940’s were characterized by fear of government and of nuclear attacks. People felt alienated, they could no longer trust tradition, so they looked for new stability (Baym, 2084). For these reasons, the themes within A Streetcar Named Desire struck a chord with society.
A Streetcar Named Desire is more than entertainment. It includes numerous social conflict undertones which give it relevance, depth, and meaning. Williams wrote in a way so as to pull at the hearts of those in the audience.
Through the play, Tennessee Williams:
- Considers the effects of the conflict that occurs when society's perception of a person and the person's personal reality do not coincide.
- Considers the effects of the personal struggle that occurs when a person's reality does not coincide with their inner-fantasies.
- Sheds light on society’s victimization of females and considers the idea of female self-expression (which was still a new idea in William's time).
- Questions woman’s apparent lack of authority in a society dominated by men.
Brief Setting, Character, and Plot Overview
A Streetcar Named Desire has only one setting: a two story flat in New Orleans.
During the time period in which the play was set, New Orleans was transforming from the old "aristocratic" south to the new "industrialized" south.
The play had four main characters: Stella, Stanley, Blanche, and Mitch.
- Stella is Stanley's wife and Blanche's sister. Throughout the play, Stella is sympathetic towards Blanche. However, she never commits to act for Stella because that would require rebelling against Stanley's authority.
- Blanche is Stella's sister, the play describes her as, “… a demonic creature; the size of her feeling was too great for her to contain” (Tennessee Williams). The play centers around Blanche and her conflicts with identity and happiness. Blanche represented the "dying out" of the old south.
- Stanley is Stella's husband; a headstrong Polish man who believed that he was the “king” of his house and all that was in it. He represented the new south: a society dominated by men.
- Mitch, a friend of Stanley's, was more gentlemanly refined than Stanley. At one point in the play, he even considers marrying Blanche.
The plot unfolds as Blanche, with her poorly-disguised and unstable circumstances, vies with the headstrong and selfish Stanley for authority and acceptance.
Summary: The Antagonist Transforms into a Victim
In the beginning of the play...
When Blanche first arrives from Laurel Missouri, she immediately becomes the antagonist:
- She looks like a high bread women who wants to destroy her sisters marriage for her own personal gain.
- She seems to believed that she deserves special treatment.
- She seems illusive.
- Evidence points to the fact that she sold her family's estate, "Belle Reve", and squandered all the proceeds on fine clothes.
It is important to note that, in the beginning, we do not know Blanche's background. We do not know why she thinks the way she does. And most of all, we do not know that what seems to be true is, indeed, true.
As the play progresses...
Stanley develops his case against Blanche.
(Stanley speaking) “Open your eyes to this stuff! You think she got them out of a teacher’s pay?... Look at these feathers and furs” (Williams, A Streetcar…).
At the end of the play...
The "antagonist" turns into a victim. Stanley unemotionally sought Blanche’s destruction by gaining evidence of her past and using it against her. He was successful. In the end, Stanley went so far as to have Blanche sent off to a mental asylum.
The audience is allowed to share Blanche's view and past struggles. She begins to look something like a heroine. Without fighting back, Blanche succumbs to Stanley's authority. The audience experiences sadness. For the most part, the other characters did not display much emotion. Stella was deeply saddened; however, Blanche was forgotten. However, her story lives on in the minds of the audience.
“The lucidity of William’s representation appears in the impartial view of the combat between two antagonists and in a resolution that does not sentimentalize the victimization as ascension to a more glorious world” (Vlasopolos, 325).
The Social Conflict Between Appearance and Reality
Blanche had freedom of expression, but only at the inward disdain of the others. Stanley was a very blunt, rough, and authoritative. He was not not used to Blanche's personality, he disliked her because he felt that she threatened his authority.
Stanley (more so than the other characters) realizes that Blanche's outward appearance and personality were merely facades which she created in order to protect herself. Stanley attacked Blanche's weakest link: her reality. He sought to destroy Blanche by exposing her to the world.
(Stanley speaking) “Some men are took in by this Hollywood glamour stuff and some men are not” (Williams, A Streetcar…).
(Stanley speaking) “There isn’t no millionaire! And Mitch did not come back with roses… There isn’t a [explicit] thing but imagination!” (Williams, A Streetcar…).
As the play progresses, Stanley's scheme works. Stella and Mitch slowly gravitate away from Blanche. They judge Blanche and her past at face value; they focus only on discovering her past mistakes and flaws. They see that Blanche was immoral in her past relations with men and looked no further. Their dislike and mistrust of her grows. They did not see the pain, loneliness, struggle, unhappiness, and rejection that Blanche experienced.
Stanley, Mitch, and Stella did not see Blanche as she really was because they were blinded by the differences they found with Blanche. The judged her quickly, only caring to look at one side of the evidence. They did not want to see Blanche as a good person, they did not want to feel sorry for her. Therefore, they made her look as bad as possible.
The Personal Conflict Between Reality and Fantasy
Blanche is illusive because she does not accept her circumstances; she does not accept her reality. Therefore, she lives in a fantasy. However, in order to do that she hides her true self. The audience is allowed to see that Blanche longs for true acceptance, yet never finds it. She lives in the mistakes of her past, and desires a brighter future.
“Both Blanche’s drinking and her endless hot baths suggest that she is attempting to wash away her past and emerge through a sort of watery purgatory” (Spampinato, 294).
Blanche has a flawed view of happiness...
Blanche firmly believes that only men bring happiness, and therefore, she never goes out on her own to find happiness.
“I cannot be alone! Because- as you must have noticed –I’m- I’m not very well….” (Williams, A Streetcar…).
She wants to return to the happiness she had before her husband committed suicide (which occurred as the result of Blanche accusing him for being homosexual). Therefore, Blanche puts forth much effort in attempt to attract the attention of young men; for example, she never appears in the light in order to hide her actual age.
“BLANCHE- ‘How do I look?’ STELLA- ‘Lovely, Blanche’” (Williams, A Streetcar…).
“And disgust and self-hate result in her life of destructive lust for young men. Thus her loving desire becomes brutal desire, unloving desire. It becomes that sheer lust which is a kind of real death” (Spampinato, 295).
Blanche tried to adapt her external circumstances to her inward fantasies, and that backfires on her.
“Yes, I had many intimacies with strangers. After the death of Allan, intimacies with strangers were all I seemed able to fill my empty heart with… I think it was panic, just panic, that drove me from one to another, hunting for some protection” (Williams, A Streetcar…).
Like her sister Stella, Blanche believed that the only way to gain stability and happiness was through the attention, appreciation, and adoration of men. Blanche saw her possible marriage to Mitch (who was much more of a gentleman than Stanley) as the only guarantee for her survival. Blanche did not really love Mitch, who at first believed that Blanche was a legitimate woman. However, after hearing Stanley's accusations, he distanced himself from her.
Feminism: A Social Struggle
The culture of New Orleans commands Blanche to conform and submit; however, she refuses. She stands her ground, deciding not to give in to Stanley's authority. I noticed that, while Blanche did make a few mistakes in her past, Stanley was completely let off the hook for his savage behavior. For example, when Stanley beat Stella, Blanche’s reaction seemed to be the biggest problem. While Blanche punished herself for her mistakes, Stanley was only temporarily sorry for his own. While none stood in the way of Stanley's unfettered freedom of expression, Blanche was disdained for her impulsiveness and expressiveness.
During Blanche and Stella's time period, men were considered to be "higher" than women. Women gained their value from their relationship with a man. In many cases, women were treated as property, not people.
“Some of Blanche’s difficulties can be traced to the narrow roles open to females during that period. Although she is an educated woman who has worked as a teacher, Blanche is nonetheless constrained by the expectations of Southern society. She knows that she needs men to lean on and to protect her” (Spampinato, 291).
Whatever women believed or said often went unnoticed because they had to live under the complete authority of men. Blanche was different; she was outspoken and non-conforming to the demands that southern society put upon women.
During the play, Stella repeatedly submits to Stanley’s authority; she does not question it because it was a social and traditional norm. Stella believes that her rightful place in life was to be Stanley’s possession. In return for her submission, Stanley either uses her body or beats it, depending on how he happens to be feeling at the time. Blanche pleaded with Stella to leave her abusive relationship with Stanley; however, she was unwilling to do so even when she was being physically harmed. Her identity was found through Stanley.
“Stanley’s always smashed things. Why, on our wedding night, soon as we came in here, he snatched off one of my slippers and rushed about the place smashing light bulbs with it… But there are things that happen between a man and a woman in the dark, that sort of make everything else seem, unimportant” (Williams, A Streetcar…).
Blanche also wanted the admiration of men; however, she did not want a man like Stanley.
The conflict between Blanche and Stanley raises the question of the role of women in the realm of authority. For, as seen through the play, women cannot withstand the total authority of men.
I believe that Williams was affected by the harsh treatment of women in Southern society. He designed the play to show how the social structure of the South offered little protection for women. He exposed unfairness that often went unconsidered.
Blanche's Demise
As her fantasies cave in around her, Blanche becomes increasingly isolated. “As her position in her sister’s household becomes increasingly defined as that of an intruder. Both Mitch and Stella end up accepting Stanley’s version of Blanche” (Vlasopolos, 335).
“Mitch’s attempted rape of Blanche therefore comes as a shock. The action suggests how male views of female behavior were so idealized that if a man discovered any deviation from accepted norms of virginity and chastity, his reaction would be extreme… By rejecting Blanche and claiming that she is not the ideal woman he naively thought she was, Mitch draws attention to the discrepancy between how women really behaved and what type of behavior was publicly expected of them by society at large” (Spampinato, 287-88).
Blanche was unable to make an alliance with power. She lost her foothold, giving Stanley the chance to completely dominate.
“Throughout the play, Blanche’s displacement isolates her. Her confidence is undermined by a setting in which she is unsure of the social conventions, the successful manipulation of which is indispensable for gaining and maintaining authority” (Vlasopolos, 327).
Because Stanley had everyone on his side, he was able to arrange for a doctor to come for Blanche and take her away to a mental ward.
In the end, Stanley comes out victor because he acts within his place in society. And because Blanche fails to conform to her rightful place in society, she is ostracized.
Conclusion
I believe that Williams wrote A Streetcar Named Desire for several reasons:
- To highlight the oppressiveness of society.
- To promote tolerance and open-mindedness.
- To challenge society’s perception of the individual.
- To challenge the institution of absolute male authority in Southern society.
- To listen and speak for those alienated, victimized, and forgotten by society.
- To show how societies view of the individual, tradition, and the victim is flawed.
- To target the tension that comes when a person’s facade is lifted for the world to see.
Through Blanche, Williams tells the story of a woman who searched for happiness and stability, only to be turned away repeatedly. Blanche could not live with her circumstances; therefore, she carries on an fantasy-based lifestyle. Blanche’s retreat into fantasy saves her from the harshness of reality. However, as the play progresses, Blanche's lifestyle backfires. And by the end, she was an outcast from society.
In my opinion, Williams believed that everyone, in some way, is hiding something from society.
Part of the reason A Streetcar Named Desire was so popular was that its embedded themes coincided with the social themes prevalent during its time of release. Most people noticed the plight of women; however, society as a whole did nothing.
Tennessee wanted social change!
Literature Cited
Baym, Nina, eds. The Norton Anthology. Vol. E. New York: W. W. Norton, 2007. Print.
Spampinato, Lynn. “A Streetcar Named Desire.” Drama For Students. Ed. David Galens. Detroit: Gale, 1998. Print.
Vlasopolos, Anca. “Authorizing History: Victimization in ‘A Streetcar Named Desire’” Theatre Journal. New York: Johns Hopkins University Press, 1986. p. 322-38. Print.
Williams, Tennessee. A Streetcar Named Desire. 1947
Thank you very much for reading!!!
Comments
suren on April 22, 2019:
its very helpful sir
if u have any ideal about alienation about street car named desire
than send some
Leo on March 01, 2019:
Is Stanley a one dimensional character ?
bumhole united on November 19, 2018:
thanks this was almost helpful
Animesh das on January 27, 2018:
Thank you sir
It always leades to progress to all smart student's...
unknown on November 02, 2017:
it was amazing, really helped me with my essay. | https://owlcation.com/humanities/A-Streetcar-Named-Desire-by-Tennessee-Williams |
Insight is advancing research in Explainable AI (XAI) with the goal of equipping AI systems with explanations that are interpretable and trustworthy. We combine a mix of fundamental computational work on new XAI algorithms, interdisciplinary approaches involving cognitive science, and new methods applied to specific techniques and concrete applications. Some of our foundational work focuses on post hoc explanation by example, where we are exploring three different explanation strategies (factual, counterfactual, semi-factual) across different data-types (Kenny 2021)(Keane 2021). This work has been applied to explanation in decision-support systems for farmers, with Teagasc and Accenture, as part of the VistaMilk SFI Research Centre. It has also been applied to analytics support systems for running (Feely 2020). We have also worked on a novel approach to extract knowledge from a neural network through graph analysis (Horta 2021). The overall goal is to combine neural and cognitive learning and reasoning for more human-like AI systems. This work has attracted a new project with BrainCreators (Amsterdam, NL) and resulted in invited talks, interdisciplinary seminars and outreach, e.g., a podcast for AI Ireland, an art piece as part of the Insight Artist in Residency programme. Other interesting application areas which are currently being explored include financial forecasting models (Yang 2020) and news recommendation. The links between explanations in constraint programming and other fields of AI established by the Insight team will lead to further cross-disciplinary research (Gupta 2021).
Read Dr Alessandra Mileo’s explanation of her work in Silicon Republic. | https://www.insight-centre.org/research-excellence-series-explainable-ai/ |
Declaration by the High Representative on behalf of the European Union on the Middle East Quartet report
The European Union reiterates its firm commitment to the two-state solution and its existing policies, as set out in its successive Council conclusions, and its concern about the growing threats to that solution.
The European Union therefore welcomes the publication of the Middle East Quartet's report and endorses its recommendations as a contribution to creating the conditions for the two-state solution. The EU expresses concern at the trends on the ground and calls on the parties to swiftly engage with the Quartet and other relevant stakeholders and implement the recommendations in full. Such implementation would demonstrate a genuine commitment to a peaceful solution by rebuilding mutual trust and creating the conditions for direct and meaningful negotiations that resolve all final status issues. The EU stands ready to support the parties in this process. In this regard, it emphasises the importance of close coordination with the follow up to the Ministerial meeting on the Middle East peace initiative in Paris on 3 June 2016, with a view to an international conference as identified in its conclusions of 20 June. The EU also endorses the call for further dialogue on the basis of the Arab Peace Initiative and its vision for achieving a comprehensive peace.
The EU will continue to work with its Israeli and Palestinian counterparts, along with the Quartet and other stakeholders, in the region and beyond, in order to make progress towards a just and lasting peace based on a two-state solution. | https://www.un.org/unispal/document/auto-insert-202435/ |
FIELD OF THE INVENTION
BACKGROUND OF THE INVENTION
BRIEF SUMMARY
DETAILED DESCRIPTION
Various embodiments of the present invention relate generally to an apparatus and method for delivering pollen. More specifically, embodiments of the present invention provide an apparatus and method for delivering pollen to facilitate directed pollination.
For a variety of reasons, plant species may be intentionally bred. For example, in some applications plant species are intentionally bred to form hybrid plant species. In some applications, hybrid plants are bred to exhibit various desirable traits. Such traits may include, for example, improved yield characteristics, and improved agronomic quality, resistance to heat and drought, and resistance to disease and insect damage. In general, plants may be capable of self-pollination, cross-pollination, or both. Self-pollination describes pollination using pollen from one flower that is transferred to the same or another flower of the same plant. Cross-pollination describes pollination using pollen delivered from a flower of a different plant from a different family, line, or species.
Plants that have been self-pollinated and selected for many generations become homozygous at almost all gene loci and produce a uniform population of true breeding progeny. This could also include Doubled Haploid lines, completely homozygous individuals, produced within a single generation. A cross between two different homozygous lines produces a uniform population of hybrid plants that may be heterozygous for many gene loci. A cross of two plants each heterozygous at a number of gene loci will produce a population of heterogeneous plants that differ genetically and will not be uniform.
Zea mays
Maize (L.), often referred to as corn in the United States, can be bred by both self-pollination and cross-pollination techniques. Maize has separate male and female flowers on the same plant. The male flowers are located on the tassel and the female flowers are located on the ear. Natural pollination occurs in maize when grains of pollen from the tassel land on the silks that protrude from the tops of the ears.
The development of a hybrid maize variety in a maize seed production program may involve three steps: (1) the selection of plants from various germplasm pools for initial breeding crosses; (2) self-pollination of the selected plants from the breeding crosses for several generations to produce a series of inbred lines, which, individually breed true and are highly uniform or selected plants from completely homozygous doubled haploids generated from the breeding crosses; and (3) crossing a selected inbred line with selected inbred line to produce the hybrid progeny.
An important consequence of the homozygosity and homogeneity of the inbred lines is that the hybrid between a defined pair of inbreds may be reproduced indefinitely as long as the homogeneity of the inbred parents is maintained. Once the inbreds that create a superior hybrid have been identified, a continual supply of the hybrid seed can be produced using these inbred parents and the hybrid corn plants can then be generated from this hybrid seed supply.
Accordingly, development and production of maize seed may require controlled pollination at one or more steps, as described above.
In various embodiments the present invention provides apparatuses and methods for directed pollination of plants. In one embodiment an apparatus is provided for directed pollination of a maize plant, wherein the maize plant defines a tassel and an ear shoot. The apparatus comprises a rigid tube having a first end, a second end, and a channel defined therebetween, wherein the rigid tube is configured to receive the tassel of the maize plant proximate the first end, wherein the rigid tube is configured to interact with the ear shoot of the maize plant proximate the second end, and wherein the channel defines a path between the tassel and the ear shoot so as to enable transfer of pollen from the tassel to the ear shoot.
In another embodiment, the rigid tube is a telescoping rigid tube such that the overall length of the rigid tube is adjustable. In another embodiment, the second end defines a second end opening that is configured to receive the ear shoot of the maize plant. In another embodiment, the second end is configured to interact with a shoot bag such that pollen may transfer from the tassel to the ear shoot of the maize plant through the channel and shoot bag. In another embodiment, the first end is configured to interact with a tassel bag such that the tassel is received into the tassel bag. In another embodiment, the rigid tube defines an opening proximate the first end, and the opening is configured to receive the tassel therethrough. In another embodiment, the rigid tube is made from at least one of the following materials: PVC plastic, polycarbonate, polypropylene, plastic, cardboard, or a compostable material. In another embodiment, the path is enclosed so as to prevent unintended cross-pollination. In another embodiment, the channel is defined by a smooth surface to prevent obstruction of pollen transferring from the tassel to the ear shoot. Another embodiment further comprises a fan attached to the rigid tube such that the fan is fluidly connected to the channel, wherein the fan is configured to create air flow to transfer the pollen through the channel to the ear shoot.
In another embodiment a method if provided for directed pollination of a maize plant, wherein the maize plant comprises a tassel and an ear shoot. The method comprises providing a rigid tube having a first end, a second end, and a channel defined therebetween, and attaching the rigid tube to the maize plant such that the tassel is received proximate the first end and the ear shoot is positioned to interact with the channel proximate the second end such that the channel defines a path between the tassel and the ear shoot so as to enable transfer of pollen from the tassel to the ear shoot.
Another embodiment further comprises attaching a fan to the rigid tube such that the fan is fluidly connected to the channel, wherein the fan is configured to create air flow to transfer the pollen through the channel to the ear shoot. In another embodiment, the rigid tube is a telescoping rigid tube such that the overall length of the rigid tube is adjustable. In another embodiment, attaching the rigid tube comprises positioning the ear shoot within a second end opening of the rigid tube proximate the second end. Another embodiment further comprises attaching a shoot bag to the rigid tube proximate the second end such that the shoot bag interacts with the ear shoot and pollen transfers from the tassel to the ear shoot of the maize plant through the channel and the shoot bag. Another embodiment further comprises attaching a tassel bag to the rigid tube proximate the first end and receiving the tassel in the tassel bag. In another embodiment, attaching the rigid tube comprises inserting the tassel into an opening proximate the first end of the rigid tube. In another embodiment, the channel is rigid so as to define a smooth surface to prevent obstruction of pollen transferring from the tassel to the ear shoot. In another embodiment, attaching the rigid tube to the maize plant occurs at any time before flower emergence to later in flower development.
In another embodiment, an apparatus is provided for directed cross-pollination of a maize plant. The apparatus comprises a rigid tube having a first end, a second end, and a channel defined therebetween, wherein the rigid tube is configured to receive a tassel of a first maize plant proximate the first end, wherein the rigid tube is configured to interact with the ear shoot of a second maize plant proximate the second end, and wherein the channel defines a path between the tassel of the first maize plant and the ear shoot of the second maize plant so as to enable transfer of pollen from the tassel to the ear shoot.
In another embodiment, a method for directed cross-pollination of a maize plant is provided. The method comprises providing a rigid tube having a first end, a second end, and a channel defined therebetween, attaching the rigid tube to a first maize plant such that a tassel of the first maize plant is received proximate the first end; attaching the rigid tube to a second maize plant such that an ear shoot of the second maize plant is positioned to interact with the channel proximate the second end such that the channel defines a path between the tassel and the ear shoot so as to enable transfer of pollen from the tassel to the ear shoot.
In another embodiment, an apparatus for directed cross-pollination of a plant is provided. The apparatus comprises a rigid tube having a first end, a second end, and a channel defined therebetween, wherein the rigid tube is configured to receive a pollen source portion of a plant of a first species proximate the first end, wherein the rigid tube is configured to interact with a pollen receiving portion of a plant of a second species proximate the second end, and wherein the channel defines a path between the pollen source portion of the plant of the first species and the pollen receiving portion of the plant of the second species so as to enable transfer of pollen from the pollen source portion to the pollen receiving portion.
In another embodiment, a method for directed cross-pollination of a plant is provided. The method comprises providing a rigid tube having a first end, a second end, and a channel defined therebetween, attaching the rigid tube to a pollen source portion of a plant of a first species such that the pollen source portion of the plant of the first species is received proximate the first end; and attaching the rigid tube to a pollen receiving portion of a plant of a second species such that the pollen receiving portion of the plant of the second species is positioned to interact with the channel proximate the second end such that the channel defines a path between the pollen source portion and the pollen receiving portion so as to enable transfer of pollen from the pollen source portion to the pollen receiving portion.
The present invention now will be described more fully hereinafter with reference to the accompanying drawings, in which some, but not all embodiments of the invention are shown. Indeed, the invention may be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will satisfy applicable legal requirements. Like numbers refer to like elements throughout.
Directed pollination of plants, for example during self-pollination or cross-pollination, may involve manually collecting and delivering pollen. Manually collecting and delivering pollen is often tedious, time consuming, and very labor intensive. For example, a worker may manually collect pollen by knocking it from the tassel into a bag. Further, the worker may then manually sprinkle the pollen onto the silks of the maize plant which have been covered with a bag so as to prevent pollination with pollen other than the collected grains of pollen. Thus, collection of pollen and directed pollination using the collected pollen may involve many manual steps that may be conducted over the course of one or more days.
FIG. 1
FIG. 1
10
12
11
14
Accordingly, embodiments of the present invention provide an apparatus and method for delivering pollen for directed pollination of plants. In this regard, illustrates a maize plant having a tassel , stalk , and an ear shoot . It should be noted that while maize plants are shown in and referred to throughout this specification, embodiments of the present invention are also useful for pollination of other types of plants.
FIG. 2
20
20
26
22
24
20
26
25
22
25
25
28
22
20
illustrates an embodiment of a directed pollination apparatus configured for delivering grains of pollen in accordance with an example embodiment of the present invention. In the depicted embodiment, the directed pollination apparatus may comprise a hollow rigid tube having a first end (which may define a first end opening) and a second end (which may define a second end opening) and a channel defined therebetween. In the depicted embodiment, the directed pollination apparatus is constructed of PVC plastic, however in various other embodiments, the directed pollination apparatus may be made of a variety of materials, including, but not limited to, metal materials, other plastic materials including polycarbonate, polypropylene, cardboard materials, fully compostable materials, and/or any combination of these or other suitable materials. In the various embodiments the rigid tube includes an opening proximate the first end . The opening is configured to receive the tassel of a maize plant and, in some embodiments, part of the top portion of the maize plant. In the depicted embodiment, the opening has an elliptical shape, however in other embodiments the opening may have any other shape configured to receive the tassel of a maize plant. In some embodiments, a tassel bag support feature may be included proximate the first end of the directed pollination apparatus , and which may be configured to add structural strength to a tassel bag assembly.
FIG. 3
30
30
36
30
26
31
33
37
31
33
38
32
30
illustrates a directed pollination apparatus configured for delivering grains of pollen in accordance with another example embodiment of the present invention. In the depicted embodiment, the directed pollination apparatus comprises a telescoping hollow rigid tube . As will be explained in more detail below, a directed pollination apparatus with a telescoping rigid tube may be advantageous for use with plants where the distance between the male portion and the female portion varies across multiple plants. Although in various similar embodiments, a directed pollination apparatus having a telescoping rigid tube may have a variety of configurations, in the depicted embodiment the directed pollination apparatus includes a rigid tube having multiple sections (shown in the depicted embodiment as sections , ), one or more of which slides into one or more others at a junction area (shown in the depicted embodiment as area ). In such a manner, the overall length of the directed pollination apparatus may be adjustable. In the depicted embodiment, the upper section overlaps the lower section to avoid a gap at the interface that could make the apparatus vulnerable to contamination from foreign pollen. In some embodiments, a tassel bag support feature may also be included proximate a first end of the directed pollination apparatus .
FIG. 4
20
10
20
26
22
24
25
26
22
12
10
40
22
26
45
24
26
40
12
10
45
14
10
40
45
40
45
26
40
45
26
40
45
40
45
26
12
26
14
illustrates a directed pollination apparatus attached to a maize plant in accordance with an example embodiment of the present invention. In the depicted embodiment, the directed pollination apparatus comprises a hollow rigid tube having a first end and a second end and a channel defined therebetween. An opening is disposed in the rigid tube proximate the first end , which is configured to receive the tassel of the maize plant . In the depicted embodiment, a tassel bag is attached to the first end of the rigid tube , and a shoot bag is attached to the second end of the rigid tube . As will be explained in more detail below, the tassel bag of the depicted embodiment is configured to receive the tassel of the maize plant , and the shoot bag is configured to receive the ear shoot of the maize plant . In various embodiments, the tassel bag and the shoot bag may be made of one or more of a variety of materials configured to contain pollen grains and prevent cross-contamination. In such a manner, the tassel bag and shoot bag may be attached to the rigid tube so as to minimize or eliminate the escape of pollen grains. In various embodiments, this may include attaching the tassel bag and shoot bag to the rigid tube using a sealing material, which may include, but need not be limited to, adhesives, tapes, and/or heat or ultrasonic welds. In the depicted embodiment, the tassel bag and the shoot bag are constructed of a flexible material, which may be advantageous for plants having tassels and ear shoots with varying sizes; however, in other embodiments one or both of the tassel bag or shoot bag may be constructed of a rigid material. Such materials may include, but need not be limited to, metal materials, plastic materials (such as, for example, PVC or polycarbonate materials), cardboard materials, fully compostable materials, and/or any combination of these or other suitable materials. It should be noted that in other embodiments, a tassel bag need not be included as the rigid pipe itself, or a portion or extension thereof, may be configured to interact with the tassel . Likewise, in other embodiments a shoot bag need not be included as the rigid pipe itself, or a portion or extension thereof, may be configured to interact with the ear shoot .
FIG. 5
20
10
20
26
22
24
22
40
22
45
24
20
10
12
10
26
11
10
10
25
36
45
14
12
10
26
40
45
25
10
26
10
26
14
illustrates close-up view a directed pollination apparatus attached to a maize plant in accordance with an example embodiment of the present invention. The directed pollination apparatus comprises a hollow rigid tube having a first end , a second end , a channel defined therebetween, and an opening located proximate the first end . A tassel bag is attached to the first end and a shoot bag is attached to the second end . In practice, the directed pollination apparatus of the present invention is attached to a maize plant prior to the release of pollen from the tassel of the maize plant . In some embodiments, the rigid pipe may be separately secured to the stalk of the maize plant . In the depicted embodiment, the top portion of the maize plant is inserted into the opening of the rigid tube and the shoot bag is placed over the ear shoot . As such, the tassel of the maize plant is received by the rigid tube and extends into the tassel bag , and the ear shoot extends into the shoot bag . In the depicted embodiment, the opening is an elliptical opening, which allows the top portion of the maize plant to be more easily received by the rigid tube in the attached position. In such a manner, the top of the maize plant may extend upward without excessive bending. This also allows the rigid tube to be positioned so that it is in a relatively vertical position, thus providing an optimal path for the grains of pollen to reach the ear shoot .
FIG. 5
45
14
45
45
26
20
27
17
12
14
12
10
27
40
22
26
45
26
14
As shown in , the shoot bag may also be secured to a lower portion of the ear shoot so as to contain any falling pollen grains inside the shoot bag . This may be accomplished in a variety of ways, including, but not limited to, securing the shoot bag to the lower portion of the ear shoot using adhesives, tapes, wires, pipe cleaners, etc. In such a configuration, the rigid tube of the apparatus defines a path for the pollen grains (shown in the drawing, for simplicity, as a series of circles) to transfer from the tassel to the ear shoot once the tassel of the maize plant begins to shed pollen. In various embodiments the path is enclosed so as to prevent cross-pollination. For example, in the depicted embodiment the tassel bag is secured to the first end of the rigid tube , and the shoot bag is secured to the second end of the rigid tube and the lower portion of the ear shoot .
26
12
14
20
26
40
20
In various embodiments, the channel defined by the rigid tube may have a smooth surface in order to prevent obstruction of pollen grains transferring from the tassel to the ear shoot . In some embodiments, a portion of the directed pollination apparatus (such as, for example, one or more of the rigid tube , the tassel bag , or the shoot bag) may be electrically controlled (such as, for example, by grounding one or more of the components) so as to prevent the attraction of pollen grains to surfaces of the apparatus .
FIGS. 6A and 6B
FIG. 6A
FIG. 6B
30
36
10
10
12
12
14
14
30
36
32
34
35
32
40
32
45
34
36
31
32
30
12
14
10
12
14
10
30
10
36
36
14
30
10
36
36
14
10
A
B
As noted above, in some embodiments the directed pollination apparatus may be adjustable. illustrate a directed pollination apparatus having a telescoping rigid tube attached to two different maize plants ′,″, in which the distance between the respective tassels ′,″ and the ear shoots ′,″ are different. In the depicted embodiment, the directed pollination apparatus includes a hollow rigid tube having a first end , a second end , a channel defined therebetween, and an opening located proximate the first end . A tassel bag is attached to the first end and a shoot bag is attached to the second end . The rigid tube of the depicted embodiment includes multiple sections , , one of which slides into another. In such a manner, the overall length of the telescoping directed pollination apparatus may be adjustable. In the depicted embodiment, the distance between tassel ′ and ear shoot ′ in maize plant ′ is shorter than the distance between the tassel ″ and the ear shoot ″ in maize plant ″. Thus, for example, illustrates the directed pollination apparatus attached to a maize plant ′ wherein the length of the rigid tube has been adjusted to a length L. A such, this allows the rigid tube to be positioned so that it is in a relatively vertical position, thus providing an optimal path for the grains of pollen to reach the ear shoot ′. illustrates the directed pollination apparatus attached to the other maize plant ″ wherein the length of the rigid tube has been extended to a length L. As such, this allows the rigid tube to be positioned so that it is also in a relatively vertical position, thus providing an optimal path for the grains of pollen to reach the ear shoot ″ for this maize plant ″ as well.
FIG. 7
20
10
20
26
22
24
25
26
22
12
10
40
22
26
45
24
26
40
12
10
45
14
10
26
20
27
17
12
14
12
10
70
12
14
27
20
70
40
12
12
27
14
70
20
14
27
12
14
illustrates a directed pollination apparatus attached to a maize plant in accordance with another example embodiment of the present invention. In the depicted embodiment, the directed pollination apparatus comprises a hollow rigid tube having a first end and a second end and a channel defined therebetween. An opening is disposed in the rigid tube proximate the first end , which is configured to receive the tassel of the maize plant . In the depicted embodiment, a tassel bag is attached to the first end of the rigid tube , and a shoot bag is attached to the second end of the rigid tube . The tassel bag of the depicted embodiment is configured to receive the tassel of the maize plant , and the shoot bag is configured to receive the ear shoot of the maize plant . In such a manner, the rigid tube of the apparatus defines a path for the pollen grains (shown in the drawing, for simplicity, as a series of circles) to transfer from the tassel to the ear shoot once the tassel of the maize plant begins to shed pollen. The depicted embodiment also includes a fan , which, in some embodiments, may further aid in the transfer of pollen from the tassel to the ear shoot along the path . Although in other embodiments, the fan could be placed anywhere about the directed pollination apparatus , in the depicted embodiment the fan is positioned in the tassel bag , above the tassel , and generates a flow of air that travels past the tassel , along the path , toward the ear shoot . In the depicted embodiment, the fan may be powered via battery power, however in other embodiments the fan could have a variety of power sources, including, but not limited to, solar power (such as, for example, via a solar panel attached to the outside of the directed pollination apparatus), or an alternating current power source. In other embodiments, other devices may be used to aid in transferring pollen from the tassel to the ear shoot. For example, in another embodiment a negative pressure device could be placed in the apparatus proximate the ear shoot in order to aid in drawing pollen grains along the path from the tassel to the ear shoot .
20
30
FIGS. 2-7
Methods for directed pollination of a maize plant will now be described. While the description may generally describe operations conducted by embodiments of the apparatuses , illustrated in , it should be noted that this is for purposes of brevity only. In this regard, various other ones of the above-described apparatuses may be employed to conduct the methods that will be described below.
FIG. 8
FIG. 8
102
104
106
108
110
112
102
112
illustrates an example embodiment of a method for directed pollination of a maize plant. As illustrated, the method comprises providing an apparatus including a rigid tube having a first end, a second end, and a channel defined therebetween at step ; and attaching the rigid tube to a maize plant such that the tassel of the maize plant is received proximate the first end of the rigid tube and the ear shoot of the maize plant is positioned to interact with the channel proximate the second end of the rigid tube at step . The method may also comprise attaching a tassel bag to the rigid tube proximate the first end at step . The method may also comprise attaching a shoot bag to the rigid tube proximate a second end at step . The method may also comprise attaching a fan to the apparatus proximate the first end at step . The method may also comprise adjusting a length of the rigid tube at step . It should be noted that although shows steps - occurring in a particular order, the present invention contemplates one or more steps occurring in any order. In some embodiments, attaching the rigid tube to the maize plant occurs at any time before flower emergence to later in flower development.
FIG. 9
FIG. 9
10
10
10
26
12
10
26
40
14
10
45
26
a
b
a
a
a
b
b
In various embodiments, the apparatuses and methods of the preset invention may also be used for directed cross-pollination between plants of the same species and/or for hybridization across different species. For example, illustrates directed cross-pollination between two different maize plants and in accordance with another example embodiment of the present invention. As shown in the figure, a top portion of a first maize plant is inserted into an opening of the rigid tube such that the tassel of the first maize plant is received by a rigid tube and extends into a tassel bag . The ear shoot of a second maize plant is received into a shoot bag , which is connected to the other end of the tube . Applicant notes that is merely an example, and thus the various apparatuses and methods described herein may be applicable to cross-pollination between various plants of the same species.
FIG. 10
FIG. 10
10
26
12
10
26
40
54
50
45
26
illustrates cross-pollination across different species in accordance with another embodiment of the present invention. In particular, a top portion of a first maize plant is inserted into an opening of the rigid tube and the tassel of the first maize plant is received by the rigid tube and extends into a tassel bag . The pollen receiving portion of a plant of another species is then received by a shoot bag , which is connected to the other end of the tube . Applicant notes that is merely an example, and thus the various apparatuses and methods described herein may be applicable to cross-pollination between various plants of different species.
By employing the methods and/or the apparatuses disclosed herein, directed pollination of a plant, such as, for example, a maize plant, may be facilitated while minimizing the possibility of unintended cross-contamination. Many modifications and other embodiments of the invention set forth herein will come to mind to one skilled in the art to which these invention pertains having the benefit of the teachings presented in the foregoing descriptions and the associated drawings. Therefore, it is to be understood that the invention is not to be limited to the specific embodiments disclosed and that modifications and other embodiments are intended to be included within the scope of the appended claims. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWING(S)
Having thus described the invention in general terms, reference will now be made to the accompanying drawings, which are not necessarily drawn to scale, and wherein:
FIG. 1
illustrates a maize plant having a tassel, a stalk, and an ear shoot;
FIG. 2
illustrates a directed pollination apparatus configured for delivering grains of pollen in accordance with an example embodiment of the present invention;
FIG. 3
illustrates a telescoping directed pollination apparatus for delivering grains of pollen in accordance with another example embodiment of the present invention;
FIG. 4
illustrates a maize plant and a directed pollination apparatus configured for delivering grains of pollen in accordance with an example embodiment of the present invention;
FIG. 5
illustrates a close-up view of a maize plant and a directed pollination apparatus configured for delivering grains of pollen in accordance with an example embodiment of the present invention;
FIG. 6A
illustrates a maize plant and a telescoping directed pollination apparatus configured for delivering grains of pollen in accordance with an example embodiment of the present invention;
FIG. 6B
illustrates a maize plant and a telescoping directed pollination apparatus configured for delivering grains of pollen in accordance with another example embodiment of the present invention;
FIG. 7
illustrates a maize plant and a directed pollination apparatus configured for delivering grains of pollen in accordance with another example embodiment of the present invention;
FIG. 8
illustrates a method for delivering grains of pollen in accordance with another example embodiment of the present invention;
FIG. 9
illustrates directed cross-pollination between two different maize plants in accordance with another example embodiment of the present invention; and
FIG. 10
illustrates directed cross-pollination between species in accordance with another example embodiment of the present invention. | |
To overcome the current limitations, Empa researchers have fabricated graphene-like materials using a surface chemical route and clarified in detail the corresponding reaction pathway. The work has just been published in the scientific journal “Nature Chemistry“. The scientists combined empirical observations using scanning tunnelling microscopy with computer simulations.
The scanning tunnelling microscope images shows nanographene molecules and the two stabilised intermediate products on a copper surface. The molecular models show a nanographene (at the bottom right) as well as the two intermediate products (above and left). In reality the diameter of the molecule is approximately one nanometre. Photo: Empa
Computer-generated image shows details of one of the two intermediate products that the Empa researchers identified with the scanning tunnelling microscope. Photo: Empa
Electronic components are getting smaller and smaller, with microelectronic components gradually being replaced by nanoelectronic ones. On nanoscale dimensions, silicon, which is at the present stage the most commonly used material in semiconductor technology, reaches however a limit, preventing further miniaturization and technological progress. New electronic materials are therefore in great demand. Due to its outstanding electronic properties, graphene, a two-dimensional carbon network, is considered as a possible replacement. However, several obstacles must be overcome before graphene can be used in semiconductor technology. For instance, currently there is no easily applicable method for large-scale processing of graphene-like materials.
Empa researchers of the nanotech@surfaces Laboratory reported on a surface chemical route to fabricate small fragments of graphene, so-called nanographenes. Using a prototypical polyphenylene precursor, the researchers clarified, together with scientists at the Max Planck Institute for Polymer Research in Mainz (Germany) and the University of Zurich, how the reaction pathway runs in detail on a copper surface und how the building blocks can be transformed into planar nanographenes directly on the surface. The work has been published last Sunday in the scientific journal “Nature Chemistry” as an advanced online publication.
Successful partners: experiment and simulation
For their investigations the researchers combined empirical observations, in particular from scanning tunnelling microscopy with computer simulations. The simulations are used to determine whether a theoretically possible reaction step is energetically possible or not. The result: the reaction pathway consists of six steps with five intermediate products. Two of them are stabilised by the surface so that they can be stably imaged with the scanning tunnelling microscope. The reaction barriers connecting the different intermediates are lowered through a catalytic effect of the substrate.
To be capable of being integrated in electronic circuits, the graphene-like material must however be manufactured on semiconductor surfaces instead of metal ones. The researchers have simulated whether their approach could also work on these surfaces and the results are very promising, showing that surface-supported synthesis is a possible way to fabricate tailored nanographenes on a range of different substrates.
The three pillars of today’s science: theory, experiment, and simulation
Progress in today’s scientific research relies at the same time on theory, experiments, and to an increasing extent on computer simulations. These simulations are complementary to often complex lab experiments and make it possible to get further information that cannot be obtained with experimental methods alone. The combination of experiments and simulations as well as the deduced theories therefore allow for a more and more accurate explanation and precise prediction of natural phenomena.Literature reference
Beatrice Huber | idw
Further information:
http://www.empa.ch
Further reports about: > CHEMISTRY > Electronic Components > Silicon > computer simulation > electronic circuit > electronic material > electronic properties > graphene > graphene-like materials
From ancient fossils to future cars
21.10.2016 | University of California - Riverside
Study explains strength gap between graphene, carbon fiber
20.10.2016 | Rice University
Researchers from the Institute for Quantum Computing (IQC) at the University of Waterloo led the development of a new extensible wiring technique capable of controlling superconducting quantum bits, representing a significant step towards to the realization of a scalable quantum computer.
"The quantum socket is a wiring method that uses three-dimensional wires based on spring-loaded pins to address individual qubits," said Jeremy Béjanin, a PhD...
In a paper in Scientific Reports, a research team at Worcester Polytechnic Institute describes a novel light-activated phenomenon that could become the basis for applications as diverse as microscopic robotic grippers and more efficient solar cells.
A research team at Worcester Polytechnic Institute (WPI) has developed a revolutionary, light-activated semiconductor nanocomposite material that can be used...
By forcefully embedding two silicon atoms in a diamond matrix, Sandia researchers have demonstrated for the first time on a single chip all the components needed to create a quantum bridge to link quantum computers together.
"People have already built small quantum computers," says Sandia researcher Ryan Camacho. "Maybe the first useful one won't be a single giant quantum computer...
COMPAMED has become the leading international marketplace for suppliers of medical manufacturing. The trade fair, which takes place every November and is co-located to MEDICA in Dusseldorf, has been steadily growing over the past years and shows that medical technology remains a rapidly growing market.
In 2016, the joint pavilion by the IVAM Microtechnology Network, the Product Market “High-tech for Medical Devices”, will be located in Hall 8a again and will...
'Ferroelectric' materials can switch between different states of electrical polarization in response to an external electric field. This flexibility means they show promise for many applications, for example in electronic devices and computer memory. Current ferroelectric materials are highly valued for their thermal and chemical stability and rapid electro-mechanical responses, but creating a material that is scalable down to the tiny sizes needed for technologies like silicon-based semiconductors (Si-based CMOS) has proven challenging.
Now, Hiroshi Funakubo and co-workers at the Tokyo Institute of Technology, in collaboration with researchers across Japan, have conducted experiments to...
Anzeige
Anzeige
#IC2S2: When Social Science meets Computer Science - GESIS will host the IC2S2 conference 2017
14.10.2016 | Event News
Agricultural Trade Developments and Potentials in Central Asia and the South Caucasus
14.10.2016 | Event News
World Health Summit – Day Three: A Call to Action
12.10.2016 | Event News
Inflammation Triggers Unsustainable Immune Response to Chronic Viral Infection
24.10.2016 | Health and Medicine
Microbe hunters discover long-sought-after iron-munching microbe
24.10.2016 | Life Sciences
Seeking balanced networks: how neurons adjust their proteins during homeostatic scaling. | http://www.innovations-report.com/html/report/materials-science/empa-researchers-clarify-reaction-pathway-fabricate-165235.html |
In branched pathways, an intermediate in one pathway can enter multiple pathways leading to different final products. In this example, the amount of compound C flowing into each branch depends upon the relative amount and activity of enzymes E3 and E5. Metabolic Pathways Can Be Branched, Allowing Use of a Common Intermediate for Several Pathways The activity of each branch is controlled by feedback inhibition in which the final product of each branch inhibits the enzyme catalyzing the first committed step of that branch. The activity of E2 is also regulated so that in the event that C builds up, the activity of E2 can be decreased. Enzymes in Metabolic Pathways Can Also Be Positively Regulated + Stimulation of E2 will increase production of C and therefore flow will increase down both branches. Stimulation of E3 by an end product of the opposite branch can help keep flow through the to branches balanced.
Regulation of Enzymes in Metabolic Pathways Can Occur at Multiple Levels At the cellular level, enzyme activity can be controlled by: o the availability of substrate or by the amount of product o the availability of coenzymes and cofactors o changes in transcription of the gene encoding the enzymes, in translation of the mRNA, and in the rate of degradation of the enzyme o the binding of small molecules at sites other than the active site = allosteric regulation At the whole body level, enzyme activity is often regulated in response to changes in levels of hormones. Coenzymes Coenzymes are complex nonprotein organic molecules that participate in enzymatic catalysis by providing functional groups essential to catalysis. Each coenzyme is specific for a specific group of related enzymes that catalyze similar types of reactions. In general, coenzymes can be of two types: activation transfer coenzymes (activate and carry groups as they are transferred from substrate and product) and oxidationreduction coenzymes (carry electrons between substrate and product). Many coenzymes are derived from vitamins. Symptoms of vitamin deficiencies reflect the loss of specific enzyme activities that require the coenzyme. Examples of Coenzymes Mentioned in this Lecture
Carrier Molecule Group Carried in Activated Form Vitamin Source of Coenzyme ATP Phosphoryl NADH and NADPH Electrons Niacin FADH2 Electrons Riboflavin Coenzyme A
Acyl Pantothenate Coenzyme A Activates Acyl Groups for Further Metabolism Although they do not contain a phosphate group, thioesters also releases a large amount of energy upon hydrolysis. O H3C + H2O C S O G = -7.5 kcal/mol H3C +
C R R SH OH thioester In cells, acetyl- and acyl groups generated during metabolism are eventually oxidized via the Citric Acid (Krebs) Cycle. These groups are carried as thiol esters linked to Coenzyme A. Hydrolysis of the thioester bond linking the acetyl/acyl group to Coenzyme A releases a large amount of energy, making reactions involving acetyl-CoA hydrolysis essentially irreversible. O H3C O C
G = -7.5 kcal/mol S CoA acetyl-CoA H3C + C OH CoA SH Enzyme Names and What They Tell You The names of enzymes often tell you the kind of reaction carried out by an enzyme and the name of a substrate the enzyme acts upon. This can be invaluable for your learning of key reactions in metabolism. The list below is not exhaustive but contains many of the key classes of enzymes you will encounter in your studies. Kinases - catalyze the phosphorylation of a metabolite or a protein, most often using ATP as donor of the phosphate. Phosphorylations often activate compounds.
Phosphatases - catalyze hydrolytic removal of a phosphate group from a metabolite or a protein (also called dephosphorylation.) Dehydrogenases -catalyze redox reactions, generally using NAD+/NADH or FAD/FADH2. Synthase or synthetase - catalyzes the joining of two molecules to make a larger molecule. Transferase - transfer of a functional group from one molecule to another. Examples include transaminases (transfer amine groups) and phosphotransferases (transfer phosphate groups). Isomerase - converts one isomer to another. Isozymes Allow Similar Reactions to Be Differentially Regulated in Different Cell Types or Tissues Isozymes are enzymes that catalyze the same reaction but differ in amino acid sequence, and sometimes in structure. Isozymes of an enzyme are encoded by different (but often related) genes. The importance of isozymes lies in the fact that their kinetic parameters and regulation often differ. The particular isozyme expressed in a specific tissue is the one that is the best fit in regulatory properties and activity to the needs of that tissue. Differences in tissue expression mean that isozymes can be used as specific markers of cellular damage. Example: the 5 isozymes of lactate dehydrogenase (LDH) are concentrated in different tissues. Routinely used in the differentiation of myocardial infarction, liver disease and erythrocyte damage.
In some cases cancer cells express isozymes that are not normally found in welldifferentiated cells; one focus of cancer therapeutics research is use this to identify drugs that target these enzymes specifically, thereby killing cancer cells but not normal cells. Cellular Energetics Cellular Energetics The primary dietary fuels used by the human body are carbohydrates, fats, and to a lesser extent, proteins. Breakdown of these fuels (catabolism) releases energy as chemical bonds are broken. Some of this energy is captured in either of two forms: phosphoanhydride bonds (ADP ATP), or reducing equivalents (NAD+ NADH, NADP+ NADPH , or FAD+ FADH2). Overview of Cellular Energetics The primary dietary fuels used by the human body are carbohydrates, fats, and to a lesser extent, proteins. Breakdown of these fuels (catabolism) releases energy as chemical bonds are broken. Some of this energy is captured in either of two forms: phosphoanhydride bonds (ADP ATP), or reducing equivalents (NAD+ NADH, NADP+ NADPH, or FAD+
FADH2). NADH and FADH2 can be used to generate ATP via the electron transport chain. ATP, NADPH and FADH2 are used in anabolic reactions to synthesize complex molecules from simpler precursor molecules. In these reactions ATP ADP, NADPH NADP +, and FADH2 FAD+. Cellular Energetics: What is Special About ATP? When the phosphoanydride bond is broken, 7.3 kcal/mol of energy is released and can be used for cellular work. ] ] ATP contains 2 phosphoanhydride bonds. Each phosphoanhydride bond is a high energy bond in that a large amount of free energy is released when the bond is broken.
phosphoanhydride bonds ATP G = -7.3 kcal/mol ADP Cellular Energetics: ATP Can Be Made Via Transfer of Phosphate Groups Down a Free Energy Gradient Free Energy of Hydrolysis of Some Phosphorylated Compounds Compound Go (kcal/mol) Similarly, ATP can transfer phosphate to molecules with less negative G0; some of the energy in the newly-formed bond activates the molecule for additional reaction.
Phosphoenol pyruvate -14.0 Phosphocreatine -10.3 ATP (to ADP) -7.3 Glucose 1-phosphate -5.0 Glucose 6-phosphate -3.3 These phosphate transfer reactions are one reason that ATP is called the energy currency of the cell. The transfer
reactions are enzyme-catalyzed and are called substrate level phosphorylation reactions. Glycerol 3-phosphate -2.2 Free Energy Some phosphate-containing compounds release more than 7.3 kcal/mol upon phosphate hydrolysis; these groups can transfer a phosphate to ADP to make ATP. Cellular Energetics: Coupled Reactions - 1 In coupled reactions, energy released in one reaction is transferred to the components of an energy requiring reaction. Coupled reactions allow energetically unfavorable reactions to proceed. In living organisms, reactions are usually coupled in one of two ways. 1. ATP hydrolysis - Free energy liberated by ATP hydrolysis is harnessed to drive a second, energetically unfavorable reaction. The energy liberated by ATP hydrolysis must exceed the
energy required for the second reaction for coupling to be successful. Usually coupling is achieved by having the same enzyme catalyze ATP hydrolysis and the energetically unfavorable enzyme. This type of coupled reaction is written as: Cellular Energetics: Coupled Reactions - 2 2. Oxidation-Reduction (Redox) reactions - In redox reactions, a reduced (electron rich) molecule transfers electrons to an oxidized (electron poor) molecule. In the process the electron donor becomes oxidized and the electron recipient becomes reduced. This is a coupled reaction because oxidation of one molecule cannot happen without reduction of another molecule and because the energy (in the form of electrons) will eventually be used to do chemical work. Special electron carrier molecules (NAD = nicotine adenine dinucleotide, and FAD = flavin adenine dinucleotide, both derived from vitamins) are usually used in biological redox reactions. NAD+ NADH + H+ Reduced Substrate Oxidized Product (lost electrons relative to substrate)
Or FAD Reduced Substrate FADH2 Oxidized Product (lost electrons relative to substrate) In Aerobic Animals, Most ATP Is Produced Using Reducing Equivalents and An O2-dependent Electron Transport Chain NAD:H and FAD:H2 transfer their electrons to the electron transport chain (ETC) in mitochondria. The electrons provide the energy used to pump protons across the membrane to create a proton gradient. Ultimately the electrons are used to reduce O 2 to H2O. O2 is absolutely essential to keep the system going. The proton gradient drives ATP synthesis (using ADP and inorganic phosphate) by ATP synthase. Each NADH that enters the electron transport chain produces 2.5 ATP while each FADH2 produces 1.5 ATP. Note that as electrons are transferred from one protein
to another, protons are pumped out. The proton gradient drives a conformational change in ATP synthase that leads to ATP production. | https://smackslide.com/slide/guts-lecture-basic-principles-of-metabolism-lkbtme |
Essay on the game badminton which i like the most
Badminton is one of the most popular sports in the world and has been around for a very long time its popularity is spreading rapidly across the us in this paper i will discuss the history and origin of badminton, the rules, and facts that i found interesting in badminton. Essay on “my favourite game” complete essay for class 10, class 12 and graduation and other classes their best game the game which i like most is football . A brief history of badminton a badminton like game was known in ancient greece and egypt - a game called battledore and shuttlecock - in which two players hit a feathered shuttlecock back and forth with tiny rackets. Essay on a game of equality - king of the bingo game is a short story written by ralph ellison, first published in 1944 the key characters in the story are the game announcer, the king, and the dying woman, laura. Badminton is not like basketball or football, in terms of being able to just pick up a ball and go outside and throw a ball around or go to a court in the park, a real game of badminton can’t even be played outside because of the wind.
An essay on my favourite game “all works and no play make jack a dull boy” goes the famous saying i too enjoy playing all sorts of games-both indoors as well as outdoors among the indoor games, i enjoy playing carom and chess the most i also enjoy playing badminton and table tennis with my . Badminton rules and history essay sample the game of badminton was derived from the game of poona which was played in india centuries ago some english army officers stationed in india introduced the game to their homeland about the middle of the 19th century. My home is the most important place in my life i feel fully safe and secure in my homemy home is very beatiful when i return from school i feel great comfort at my homeits front look is my most familiar sight in my eyethere are four rooms, one kitchen, two bathrooms and one drawing room in my homefor me happiness starts from my home and ends at my homemy home is situated in durgapurit .
The information in this essay can be useful for writing an essay on topics like my favorite outdoor game, badminton, my favorite hobby etc we hope you guys can help us to translate the essay on my favorite sports in regional indian languages like hindi, marathi, gujrathi, punjabi, malayalam, tamil, kannada, urdu etc. Free essays on the game you like the most badminton get help with your writing 1 through 30. My favorite game badminton (essay sample) june 5, the shuttlecock that acts like the ball is made from goose feathers attached to a small piece of cork the .
Below is an essay on badminton from anti essays, your source for research papers, essays, and term paper examples there are a lot of sports that people can enjoy, for instance, tennis, soccer, basketball, and baseball. The game of tennis has been scored the same wince its beginnings the points are awarded in sets of 15 for each successful win each player starts at zero, known as love there are many stories for the origin of using love as zero, but the most widely accepted story is the french word oeuf, which means egg the shape of the egg is symbolic of zero. Below is an essay on the game i like most from anti essays, your source for research papers, essays, and term paper examples the game i like most/my favourite game there are various kinds of sports in our country. Its not surprising that like most countries soccer is the country's most popular sport they also brought over many other western sports like chess, volleyball, tennis, badminton and ping-pong vietnam is most known for it’s production of rice. Essay on game i like the most cricket for school kids and senior students,200,250,500 words, for class 1,2,3,4,5,6,7,8,9,10,11 and 12.
The subject i like best in school, we learn many subjects they are english, mathematics, science, chinese, and many other important subjects to get cheap . The physics of tennis essay 561 words | 3 pages the physics of tennis i introduction background: a friendly game of tennis is being played. Free essay on badminton available totally free at echeatcom, the largest free essay community an early version of this game in china used a shuttlecock but not .
Essay on the game badminton which i like the most
Essay on my favourite hobby badminton game for children short and long paragraph on my favourite game badminton the person i like the most is my best friend in . Badminton is a game that involves the use of a net, lightweight rackets, and a shuttlecock then use the right hand to hold on the grip like holding a knife make . Essay about favorite sport badminton (essay 2) i like 165 words essay for kids on my favorite game badminton is a game of skill a badminton player should. Essay on the game i like most badminton, results 1 - 30 the game i like most badminton essay 31 aug 2017 among those games, i enjoyed playing chess more than others if you pick an outdoor game, like cricket, football, badminton, rugby you.
- 100% free papers on best essay the game i like most badminton sample topics, paragraph introduction help, research & more class 1-12, high school & college.
- Among the indoor games, i enjoy playing carom and chess the most i also enjoy playing badminton and table tennis with my friends and cousins but the game i like the most is cricket.
- What is cricket how cricket discovered cricket is one of the most played games in the world people not only like cricket but they love it.
Compared to tennis, badminton players compete for half the time, but run twice as far and hit twice as many shots most who judge badminton know little about the game but, during the 1992 olympics, 11 billion people worldwide watched the badminton competition, most from asian countries where badminton players are held in high esteem. The game i like best - essay lawn tennis is expensive and i consider badminton as a ladies game the struggle of sticks in hockey leads to quarrel among boys i . Like many other sports, a variation of badminton can be traced back to the first century b the game of ti jian zi involved hitting or kicking a shuttlecock with your hands or feet. Badminton is a frantic, fierce and formidable sport it requires reflexes of lightning, fleetness of foot and strategic thinking rivalled by that of hannibal at trebia it is a game of skill and speed, and wrist actions to make divine brown blush. | http://xetermpapergmtp.safeschools.us/essay-on-the-game-badminton-which-i-like-the-most.html |
Citation: Rhoades, M.B., Parker, D.B., Auvermann, B., Cole, N.A., Perschbacher-Buser, Z., Deotte, R.E. 2005. Factors affecting emission measurements with surface isolation flux chambers. In: American Society of Agricultural Engineers Annual International Meeting Technical Papers, July 17-20, 2005, Tampa, Florida. Paper Number 054026. 2005 CDROM.
Interpretive Summary: There is increasing concern among agricultural producers, regulators, and the general public about the effects of agriculture on air quality. Among the potential pollutants of most concern are odors, dust, and ammonia. Unfortunately, it is very difficult and expensive to measure emissions of these pollutants; therefore, little information is available concerning emissions of these pollutants from agriculture. Livestock feeding operations are considered to be a major source of ammonia emissions. In the past, some scientists have used different types of flux chambers to estimate emissions. However, many of these chambers have not been adequately tested to determine the validity of values obtained using them. This experiment was conducted to evaluate the effects of several factors on estimated ammonia emissions from the surface of a feedlot or dairy. Three types/sizes of chambers were compared for North Carolina State, EPA, and West Texas A&M. The volume of air pulled through the chambers was varied from about 0.1 to > 1.0 turnovers per minute. Chambers were placed on areas that should have low ammonia emissions (dry areas without fresh feces or urine) and areas that should have high ammonia emissions. With low emissions, air flow rate did not affect calculated emissions, however, with higher emissions the calculated emission rate was directly proportional to the air flow rate through the chamber. Variations in emissions in locations within a pen were very large. These studies demonstrate that use of flux chambers are valid for treatment comparisons but emission rate measured using flux chambers will potentially greatly underestimate true emission rates because of effects on the microclimate within the chamber.
Technical Abstract: We conducted field experiments to evaluate how factors such as sweep air flow rate, time since urine deposition, and flux chamber footprint area affect ammonia fluxes from open-lot feedyard and dairy surfaces as measured using three different flux chamber designs. The chambers included a 26.5-cm diameter chamber (North Carolina State University design), a 49-cm diameter chamber (EPA-type design), and a 1.2 m x 2.4 m rectangular chamber (West Texas A&M University design). Clean sweep air collected upwind of the feedyard (<50 ppb NH3-N) was supplied to the chambers using a large compressed air tank, and ammonia concentrations were measured using a Thermo Environmental Instruments 17C chemiluminescence NH3 analyzer. Ammonia fluxes increased up to 10-fold between sweep airflow rates of 0.1 and 1.0 volumetric changes per minute. Ammonia fluxes from urine spots were highly dependent on the time since the urine was excreted. In one instance, the flux decreased at 57 ug/m2/min for every minute elapsed during the first two hours after excretion. Maximum fluxes and variability among individual flux measurements decreased with increasing flux chamber footprint area. A better knowledge of how these factors affect calculated emission rates will be beneficial to future development of emission factors for open-lot feedyards and dairies. | https://www.ars.usda.gov/research/publications/publication/?seqNo115=184213 |
In the Supreme Court you are permitted to call upon an expert witness to the stand to help prove a point in favor of your case. The Daubert Ruling is when the judge determines the validity of the witnesses that are considered experts by asking his/herself five questions.
1. Has the technique been tested?
2. Has it been subjected to peer review and/or publication?
3. What is its known or potential error rate?
4. Are standards controlling the technique in place and maintained?
5. Is it generally accepted in the relevant scientific community?
In the Williams brothers case the prosecution attorneys pleaded to have a Daubert Ruling for most of the evidence found during the crimes. They had to ask for it because most of the technology had changed and wasn't accepted in the scientific community at the time. If the judge had not granted them the right to show that evidence, then the Williams boys probably wouldn't have been convicted because most of the evidence was class evidence and not individual. But, because the attorneys did get the right to show the evidence, the Williams boys were convicted for all the crimes. | https://www.smore.com/z4n4 |
Milaidhoo Maldives Launches Unique Collaborative Art Project
Milaidhoo Island Maldives introduced a joint contemporary art project with Russian artist and fashion illustrator Alena Lavdovskaya. During the month of July, Alena resided on the island creating classic and digital art pieces that fuse Maldivian tradition and culture with modern art.
Born to an artist family in Tbilisi, Georgia, Alena is a renowned artist in the creative fashion world for her skilful illustrations. She has worked with some of the most renowned fashion houses and luxury brands such as Guerlain, Dior, Chanel, Lancome, Tiffany’s and Montblanc.
The collaborative art project focused on creating contemporary, island-inspired art pieces and presenting the Maldivian heritage to a broader audience. The created artworks will be displayed and auctioned later in the year, with the proceeds being donated to marine conservation efforts in the Maldives. | https://hoteliermaldives.com/milaidhoo-maldives-launches-unique-collaborative-art-project/ |
Chronic ankle sprain, also known as chronic ankle instability, occurs due to an inadequate treatment method during the acute ankle sprain phase. It is characterized by feeling “loose” in the ankle and recurrent ankle sprain. Patients often complain that they will twist their ankles every now and then.
There are two causes of chronic ankle sprains – loss of structural integrity and functional instability.
Loss of structural integrity occurs when there is significant injury or tear in the 3 lateral ankle ligaments – the anterior talofibular ligament, posterior talofibular ligament, or the calcaneofibular ligament.
Functional instability occurs when the ankle did not undergo proper rehabilitation. An acute ankle sprain causes proprioception, muscle coordination and postural control to be affected, and these are responsible for maintaining balance.
Signs and symptoms of chronic ankle sprain include:
Chronic ankle sprain treatment involves treating any injured ligaments and a process of ankle rehabilitation.
Treatment options include:
Your podiatrist will guide you through the proper recovery process and it is important to follow the advice carefully. | https://www.straitspodiatry.com/conditions/chronic-ankle-sprain/ |
The relationship between health and urban design are complex because of the multiple elements, which play different roles in the city system. Indeed, urban happiness, liveability and health are concepts, which in the last years are become always more present in the urban planning studies. Although many theories agree on the benefits that people derive from factors such as green place, quality public space, safe place, social connectedness and clean air, it is not easy to assume and demonstrate that these improve liveability, happiness and then health. Many cities are playing their attractiveness and competitiveness on these elements and current indexes report the ranking of cities which are the most happy, liveable or healthy on the basis of factors in continuous change. In this way is difficult to understand what are the real reasons of success of certain places or cities and what to do to make a city liveable. Although it does not exist a unique recipe, it is possible to identify a mix of ingredients – with the right proportions – which is capable if not of guaranteeing at least strongly contributing to the creation and success of a healthy place. Starting from these premises, aim of this work is to illustrate the more recent theories on healthy and happy places and the original Ecoliv@ble+ design method, carried out in the framework of a CNR research project. The method aims at: identifying sustainable urban health, liveability and happiness from the user’s point of view; identifying design interventions to enhance or create these factors. By way of example, the case study of Coal Harbour in Vancouver and relative observation complete the paper. | https://www.witpress.com/elibrary/wit-transactions-on-ecology-and-the-environment/217/36940 |
ERRATUM: Current version was revised on June 8, 2020.
DOI of Erratum: doi:10.5960/dzsm.2020.444
Summary
Background: In the rehabilitative setting, the use of senor technologies is gaining in importance, especially the use of marker- and contactless systems. Reliably detecting motion and error patterns isabsolute prerequisite for use in exercise therapy. In this study, an annotated algorithm for the skeletal model of the sensor Kinect 1.0 was compared with movement detection by a therapist.
Methods: 18 test subjects (male: 10, female: 8; age 68.3±5.9 years) performed 3 sets of hip abduction exercises with 10 repetitions using the rope pull. The assessment of the movement by an experienced therapist was coded and then directly compared to the Kinect 1.0 detection results. The diagnostic parameters sensitivity, specificity, false-positive rate, positive predictive value, and negative predictive value were calculated.
Results: There was 70% agreement over all error patterns. Sensitivity was between 51.6% (wrong plane) and 87.1% (hip rotated outside), and specificity was around 80%. The false-positive value rangedbetween 13% (wrong plane) and 22.7% (hip rotated outside). The positive predictive value for hip rotated outside was 74.3%. The negative predictive value ranged between 77.1% (upper body) and 92.7% (bent knee).
KEY WORDS: Motion Detection, Error Patterns, 3D-Depth Sensor, Rope Pull
Zusammenfassung
Problemstellung: Im rehabilitativen Umfeld gewinnt die Anwendung von Sensortechnologien, insbesondere der Einsatz marker- und kontaktloser Systeme, an Bedeutung. Die zuverlässige Bewegungserkennung, aber auch die Erkennung von Fehlerbildern während der Bewegung sind hierbei Grundvoraussetzungen. Daher war es Ziel der Studie, einen entwickelten Algorithmus zur Fehlerbilderkennung, welcher für das Skelettmodell der Kinect 1.0 annotiert wurde, mit der Bewegungserkennung eines erfahrenen Trainingstherapeuten zu vergleichen.
Methoden: 18 Probanden (männlich: 10, weiblich: 8; Alter 68,3±5,9 Jahre) führten die Übung Hüftabduktion in 3 Sätzen zu 10 Wiederholungen am Seilzug durch. Die Bewegungserkennung eines erfahrenen Therapeuten wurde durch Codes direkt mit der des Systems abgeglichen. Damit wurden die diagnostischen Parameter Sensitivität, Spezifität, falsch-positiver Wert sowie positiver und negativer Vorhersagewert ermittelt.
Ergebnisse: Es ergab sich über alle Fehlerbilder eine Übereinstimmung von über 70%. Die Sensitivität lag zwischen 51,6% (wrong plane) und 87,1% (hip rotated outside), die Spezifität um 80%. Der falsch-positive Wert betrug zwischen 13% (wrong plane) und 22,7% (hip rotated outside). Der positive Vorhersagewert ist für hip rotated outside 74,3%. Der negative Vorhersagewert liegt zwischen 77,1% (upper body) und 92,7% (bent knee).
Diskussion: Es werden nicht alle Fehlerbilder vom System erkannt, jedoch die richtige Bewegungsausführung als korrekt identifiziert. Letzteres ist hinsichtlich der Nutzerakzeptanz von Bedeutung. Bei den Fehlerbildern upper body und hip rotated outside ist davon auszugehen, dass die erkannten Fehler tatsächlich aufgetreten sind. Die Daten zeigen mit über 70% Übereinstimmung eine genügend zuverlässige Bewegungserkennung, sodass das Assistenzsystem in der Therapie als Unterstützung genutzt werden kann. Weitere Studien sollen den Einsatz des Systems in der klinischen Praxis aufgreifen, bspw. die Nutzerakzeptanz der Probanden oder die Umsetzbarkeit des Feedbacks.
SCHLÜSSELWÖRTER: Bewegungserkennung, Bewegungsmuster, 3D-Tiefensensor, Seilzug
Introduction
The use of sensor technologies for motion detection is increasingly gaining in importance in exercise therapy. Due to demographic changes, the number of elderly patients is constantly increasing. Furthermore, there is currently insufficient care regarding exercise therapy. The supervision of 12 to 15 patients makes it impossible for the therapist to correct and eliminates movement errors (13). This means that therapists can not meet the requirements to care for a maximum of 10 patients on the training area (5). Therefore, sensor systems and visual feedback will need to be the therapists' "third eye". This is relevant if many patients train at the same time, when the therapist cannot detect any motion error or give correction instructions. Patients can control and correct their movement through feedback generated by sensor technology. The use of sensors is only helpful if they identify movement similarly to an experienced therapist. 3D-depth sensors are often used due to their markerless and contactless motion detection. The advantages of these sensors compared with marker-based motion capture systems are their user friendly operation and low costs. For use in exercise therapy, marker-based systems are impracticable because attaching the markers is complex and requires skilled personnel. In a review, Verbrugghe et al. (19) showed the use of technical systems in rehabilitative exercise therapy. Kato et al. (10) carried out an investigation using a self-developed prototype consisting of a 3D-depth sensor and feedback system. They tested healthy and injured test subjects (brain injury). The 3D-depth sensor was used to detect the position of the test subjects. A vibrator was used for sensory feedback. For the training of the upper limbs and the balance target object were displayed that should be tracked. Patients needed more time to complete their first tasks. The time was shortened from the first to the last attempt. The balance task should also be completed in a shorter time. The angle values of the patients also approximated those of the healthy ones. The researchers considered the use of 3D-depth sensor in the system as useful.
Kato et al. (10), Wang et al. (20) and Fernandes-Baena et al. (7) found that the 3D-depth sensor is suitable for movement analysis in rehabilitative exercise therapy.
Wang et al. (20) and Fernandes-Baena et al. (7) carried out investigations to evaluate the 3D-depth sensor in comparison with marker-based motion capture systems. They tested motion detection in rehabilitative exercise therapy. Wang et al. (20) examined the motion detection accuracy of the 3D-depth sensor in the first and second generation with an optical marker-based motion capture system. For determination of joint localization of all three systems, 20 joint points were determined. These are the same in the three systems. 12 exercises were carried out for the test. The determination of the bone length showed for the 3D-depth sensor in first generation larger offsets and standard deviation, especially in the femur. The cause may be the offset of the hip joint. The sensor in second generation was robust against interference and showed an exact tracking of the position. With regard to the present study the information on offsets of the hip is of importance. Movements of the lower extremities are observed, so that shifts are also possible here. Furthermore in the present study Kinect 1.0 is used. Fernandes-Baena et al. (7) came to similar conclusions when comparing with the optical system. The results show a synchronicity in the signals of the 3D-depth sensor and the optical marker-based system within the movement patterns, so that the offsets for tested knee and hip movements were less than 10°. Furthermore, the position of the extremities to the sensor plays an important role. In extreme rotation, the leg is perpendicular to the Kinect sensor and there are errors when tracking hip or knee. For the rehabilitation of knee patients, a sensor system was developed which uses a 3D-depth sensor to record the movement, count the repetitions, and give feedback regarding movement quality. Technical assistance systems are often used in motor rehabilitation (2, 8). Feedback is generated for the user from the resulting measurement data.
In the study by Banala et al. (2), the movements were captured using force and pressure sensors, and Hirokawa & Matsumura (8) detected the foot position electronically. In addition, it has been proven that visual feedback from assistance systems improves the movement quality (1, 12, 18, 19).
Previous studies have tested the accuracy of movement detection in various technical systems and showed that markerless optical sensors can provide support (7, 20). So far known, the 3D-depth sensor has only been validated with other optical sensors.
This paper aims to compare the developed algorithm for error detection with the movement assessment of a therapist. For validation, important parameters of clinical studies were calculated. These are sensitivity, specificity, false-positive value, positive predictive value and negative predictive value. The contactless and markerless depth sensor Kinect 1.0 was used due to its user-friendly operation, which is essential in exercise therapy.
Methods
Sample
18 healthy subjects participated in the study (68.3±5.9 years) (Table 1). Before the study, all subjects were informed about the study design and purpose and then gave informed consent to their participation in writing. The inclusion criterion for participation in the study was the age between 50 and 80 years. Exclusion criteria were neurological health restrictions and pain during the movement to be performed. The examination standards corresponded to the Declaration of Helsinki.
Test
The test subjects were asked to perform the exercise hip abduction on a rope pull (Fig. 1), which is a therapeutically relevant exercise for strengthening the hip abductors (13). A cuff was attached above the ankle joint for resistance transmission. The resistor was then attached to the weight block of the rope pull and the subject stood at the side of the device. To become familiarized with the test procedure, each subject completed five repetitions without weight. The subjects should do a physiological hip abduction without specification of the abduction angle. Subsequently, subjects carried out three sets with 10 repetitions under load (10kg) (set pause 30 s).
Meanwhile, the 3D -RGB and depth sensor Kinect 1.0 (Microsoft Corporation, Remond, WA, 98052-7329, USA) in the assistance system recorded the movements. At the same time, an experienced training therapist observed the patient's movements. An evaluation sheet was used to record error images perceived by the therapist (more than five years clinical practise). The error images concentrated on flexed upper body (UB), wrong plane (WP), bent knee (BK), and hip rotated outside (HO) (Figure 1) and are based on an expert survey (13).
Equipment
The sensor was placed four meters from the front of the subject training on the rope hoist. The PC connected to the sensor processed the skeletal data to detect error patterns. Prior to the measurements, the assistance system was trained to detect the above error patterns using skeletal data from the sensor Kinect 1.0, machine learning methods, and Incremental Dynamic Time Warping (IDTW). Thus, the error patterns were automatically annotated to the assistance system by previously recorded example sequences of the correct and faulty exercise executions. By normalizing the skeletal data, it was possible to teach the system independently of the size and stature of a person (15).
The comparison of the subject's movements recorded by the assistance system and the evaluation by the algorithm took place according to the following rules: BK: measured knee angle <165°; UB: angle between shoulder center and left ankle, with pivot point hip center, <160°; WP: distance of right ankle to correct plane of motion >380 mm; HO: detection by foot position (Figure 1). On this basis, movements outside these limits were classified by a support vector machine (SVM) as error patterns. The error patterns recorded for each frame (time) were then filtered again to smooth the error patterns displayed to the user. For this purpose, a time window was created for each error pattern, which contains the detection results of the last 3 or 5 frames for each error pattern (15). This was only visualized if the system detected an error for the majority (majority of 3 frames are 2, majority of 5 frames are 3) of the elements contained in this time window.
Statistical Analysis
For the statistical analysis of the data, the correct classification rate was evaluated with the statistical software R (14). This indicates the number of correct predictions in relation to the total number of observations. The codes issued by the assistance system (e.g. 0; 1; 0; 0) were offset against the evaluation of the therapist, which was also available as a code (e.g. 0; 1; 0; 0). The sequence of digits corresponds to the order of the error pattern UB; WP; BK; HO. 0 means that no error was detected, 1 means that an error was present according to the evaluation. The difference between the assistance system and the therapist was calculated for each individual repetition of each test subject. The given numerical example then provides a difference code of 0; 0; 0; 0, i.e. system and therapist matched. If there were positive values (+1) in the difference codes, the system recognized an error that the therapist did not specify. Negative values (-1) were those values where the therapist indicated an error that the system did not recognize. Thus, the difference codes shown in Figure 2 were created, reflecting the occurrence and distribution of the error pattern. It was assumed that the therapist correctly judged the movements, so that the therapist's evaluation was used as a reference for the evaluation of the assistance system.
To determine the diagnostic parameters sensitivity, specificity, false-positive value, as well as the positive and negative predictive values, the cases of equal and unequal evaluation per error pattern were calculated on the basis of the code output using a four-field table (Table 2; equations 1-5).
In the present study, the parameters relating to error detection by the assistance system and the therapist are defined as follows (Equations see Table 5):
Sensitivity (SENS): The ability of the system to identify a error pattern as such (Equation 1)
Specificity (SPEC): The ability of the system to identify a correct movement as such (Equation 2)
False positive value (FPV): Error of the system to identify a correct movement as an error pattern (Equation 3)
Positive Predictive Value (PPV): The probability that an error pattern is actually present if it has been identified by the system (Equation 4).
Negative predictive value (NPV): The probability with which a correct movement actually exists if it has been identified by the system (Equation 5) (3, 4, 16).
SENS and PPV are therefore used as measures for predicting error patterns. SPEC and NPV, on the other hand, are measures for predicting correct motion.
To visualize the prediction accuracy of the assistance system, ROC curves (Receiver Operating Characteristic Curve) were generated for the individual error pattern. The area under the curve (AUC) represents the accuracy of the error statistics
Results
A total of 18 subjects completed the test task consisting of three sets of ten repetitions, so that 540 cases were included in the calculation. In 253 cases, the therapist and the system matched with respect to error pattern recognition. Counting statistics were used to determine 47 different difference codes, explained in the previous section, which occur at different frequencies (Figure 2). The values +1 and -1 resulted from cases of unequal evaluations between therapist and system. In 165 cases, the graphic shows a match in three error pattern, and one error pattern was evaluated differently. In 122 cases, the evaluations differed for more than one error pattern.
The cases of unequal evaluations were used as base values to determine the statistical parameters SENS, SPEC and FPV, as well as PPV and NPV (Table 3).
The agreement between therapist and system was more than 70% for all error patterns (UB: 74.6%, WP: 80.7%, BK: 81.5%, HO: 81.5%). These values were calculated on the basis of the frequencies of the individual error patterns within the individual repetitions.
SENS ranged from 51.6% (WP) to 87.1% (HO). SPEC was 80% (77.3% HO, 86.9% WP), and FPV assumed values between 13.0% (WP) and 22.7% (HO). NPV was highest for HO (74.3%) and lowest for WP (45.8%). NPV was between 77.1% (UB) and 92.7% (HO) (Table 4).
The ROC curves (Figure 3) show the accuracy of the test statistics for the determined error patterns, which is expressed by the AUC. Values close to the diagonal correspond to a random test result, since the hit rate and the false positive rate are close together. The AUC for the individual error patterns is between 0.693 (WP) and 0.822 (HO).
Discussion
Assistance systems to improve motion control must meet high standards with regard to the quality criteria to actually be beneficial in practice. The aim of the present study was to validate a markerless assistance system for motion analysis based on depth image information. Therefore, the algorithm developed for error pattern recognition was compared with the recognition skills of an experienced therapist. SENS, SPEC, FPV, as well as PPV and NPV were analyzed to be able to make statements on the accuracy of the system.
All error patterns evaluated showed an agreement between therapist and system of more than 70%. Therapist and system showed the lowest agreement for the evaluation of the error pattern UB, with 74.6%, and for the evaluation of the error pattern BK and HO the highest agreement, with 81.5%.
This means that the algorithm detected at least 70% of the movement errors detected by the therapist. The highest SENS was 87.1% (HO) and the highest SPEC was 86.9% (WP).
SENS describes the ability of the system to identify an error pattern as such. A middle SENS over all error patterns means a susceptibility to errors. However, with middle SENS the PPV increases and it describes that it can be assumed that the detected error patterns actually occurred.
In clinical tests, SENS indicates how many of the patients affected by a disease are actually identified as positive by the test. Determining SPEC is just as important. A test with a high SPEC identifies healthy individuals as healthy and is therefore negative. SPEC decreases if a test produces many FPVs. In addition, PPV reflects the probability that a disease is actually present when it is identified by the test. The NPV is therefore the probability with which a healthy person is actually identified as such by the test (4, 6, 16).
The SENS found in this study shows that not every error pattern indicated by the therapist was also detected by the algorithm. For the patient, this may mean that incorrect movement sequences may be automated, since the error was not considered necessary for correction, either by the system or by the patient themselves. As a result, muscle groups are trained that are not the primary focus of the therapy.
The analyzed SPEC shows that correct movements were mostly evaluated as correct. This plays a decisive role for motivation and user acceptance.
The FPV, which here lie between 13% and 22.7% (Table 4), indicate that in individual cases correct movements were detected as errors. Displaying a movement error despite correct execution may lead to uncertainty in the patient and reduce acceptance of technical aids.
High SENS values are associated with a greater susceptibility to errors, i.e. the more sensitive the system reacts the more errors are detected. A high SENS, such as the HO error pattern (87.1%) and a high PPV (74.3%), indicate that this error was detected as well by the system. This is confirmed by the AUC of the ROC curve, which was 0.822 for HO.
The parameters SENS and SPEC are based on the occurrence or non-occurrence of incorrect movements, which is determined in validation studies using reference standards (6). Such a reference measure is not available in this study. In summary, therefore, the tested assistance system can be used in practice to support movement control, but cannot replace a therapist.
In all error patterns the SPEC assumes that it has been correctly identified as correct. In the case of UB and HO the probability are the highest that the error pattern detected by the system occurred. Due to the care situations, it is advantageous to be able to use marker and contactless systems as support.
Markerless and contactless sensors have become established for use in therapy. They permit movements without impairments and do not require any additional assistance, as for example with the marker attachment of other motion capture systems. Therefore, the 3D-depth sensor Kinect 1.0 was used in this study.
In addition to the number of repetitions, the number of sets and the angle (ROM) of the movement, the error patterns that occur also provide important information for patients and therapists. For an assistance system to provide support, the execution of the movement and the errors must be reliably detected. This is the basic prerequisite for generating feedback to the user from the recorded movement. Hopper et al. (9), Kim et al. (11), Lösch et al. (12) have already been able to show positive effects by adhering to a visual target value in motion control. For example, bar graph tracking at Kim et al. (11) resulted in positive adjustments in stride length and walking speed. Visual feedback can assist the patient in movement execution and giving information, for example on amplitude and speed.
Until now, Kato et al. (10) and Verbruggheet al. (19) have described the reliable use of technical assistance systems in training therapy. Markerless systems have become established for motion detection. They result in fewer movement restrictions that can be caused by the placement of the sensors. Markerless systems can increase user-friendliness because they do not require complicated installation prior to use.
Further studies compared the motion detection accuracy of the markerless 3D-depth sensor in the first and second generation against marker-based motion capture systems. It is therefore known that the skeletal model of the 3D-depth sensor, in particular for the first generation, shows inaccuracies in skeletal recognition. Wang et al. (20) found deviations of about 200 mm in the localization of the hip joints. In addition, statistically significant differences were shown between the first and second generation of the sensors in the skeletal points SPINE, ROOT (trunk), HIP, ANK (ANKLE), and FOO (FOOT). Also at second generation, the foot and ankle joint positions are still approx. 100 mm from the base level. In addition, Fernandes-Baena et al. (8) describe that the positioning of the extremities to the sensor has a decisive influence on the accuracy of skeletal recognition. Xu & McGorry (21) found a significantly more accurate detection of the upper extremities compared to the lower extremities for the 3D-depth sensor in both generations. For example, the accuracy level for hand and arm was within 100 mm, while for hip and legs it was over 100 mm.
Previous studies as well as the present results show that a 100% error image recognition is currently not possible. The underlying skeletal model of the depth sensor is assumed to be the cause (7, 20, 21).
A more accurate skeletal model can help to increase the accuracy of error detection, which reliably determines the positions of the joints in three-dimensional space. For this purpose, a separate model must be developed and evaluated. Furthermore, it has to be investigated to what extent further feature vectors improve the error classification. The further development of the existing algorithm, which is based on a mean value filter, will contribute to improving filtering. This will make it possible to filter out any error detections.
Limitation and Conclusion
In the present study, the assistance system developed for the hip abduction exercise on the rope pull was tested for reliable error recognition. It is well known that other exercises with high therapeutic benefits also present problems due to several degrees of freedom in the execution of movement. Statements about the validity of error recognition in other exercises cannot currently be made.
The assessment of the movement by a therapist was used for validation. The therapist observed the movement for the occurrence of the error patterns upper body (UB), wrong plane (WP), bent knee (BK), and hip rotated outside (HO), which the system was trained to evaluate. In an expert survey these error patterns were reported as frequent errors. The therapist's assessment was then used as a reference. At this point, a professionally experienced therapist with more than five years practice was used for observation. The practical experience of the therapist can be considered sufficient and valid. For completely validation, it will be necessary in future studies to have the system tested by at least 3 therapists.
Technical assistance systems for motion control are becoming increasingly important in training therapy. In this study, error pattern recognition by an algorithm annotated to the sensor was compared with the error pattern recognition of a therapist for the first time. This resulted in an agreement of approx. 70%. The developed assistance system can thus be used as an objective instrument for motion control in clinical settings. In the long term, such a system could provide patients with visual feedback on movement and document the course of therapy.
Funding & Declaration
This study was funded by the European Social Fund (ESF).
Since this contribution included study on humans, the study plan was reviewed by the Ethics Commission of the TU Chemnitz, and the subjects agreed in writing to their participation in the study. The guidelines of the Declaration of Helsinki were observed.
Conflict of Interest
The authors have no conflict of interest.
References
- Validationof kinect-based telerehabilitation system with totalreplacement patients. Journal of Telemedicine. 2016; 22: 192-197.
- Robot assisted gaittraining with active leg exoskeleton (ALEX). IEEE Trans NeuralSyst Rehabil Eng. 2009; 17: 2-8.
- An introduction to medical statistics. 3. ed., (Nachdr.).Oxford: Oxford University Press; 2009. Oxford medicalpublications.
- Kurzgefasste Statistik für die klinischeForschung: Leitfaden für die verteilungsfreie Analyse kleinerStichproben; mit 91 Tabellen. 2., aktualisierte und bearb. Aufl.Heidelberg: Springer; 2003. Springer-Lehrbuch.
- MedizinischeTrainingstherapie - Durchführung-. [18th December 2018].
- Sensitivität, Spezifität, positiver und negativerVorhersagewert. Rehabilitation (Stuttg). 2005; 44: 44-49.
- BiomechanicalValidation of Upper-Body and Lower-Body Joint Movements ofKinect Motion Capture Data for Rehabilitation Treatments. In:2012 Fourth International Conference on Intelligent Networkingand Collaborative Systems: IEEE; 2012: 656-661.
- Biofeedback gait training system fortemporal and distance factors. Med Biol Eng Comput. 1989; 27:8-13.
- The influence ofvisual feedback on power during leg press on elite women fieldhockey players. Phys Ther Sport. 2003; 4: 182-186.
- Development andevaluation of a new telerehabilitation system based on VRtechnology using multisensory feedback for patients with stroke.J Phys Ther Sci. 2015; 27: 3185-3190.
- Effects ofVisual Feedback Distortion on Gait Adaptation: Comparisonof Implicit Visual Distortion Versus Conscious Modulation onRetention of Motor Learning. IEEE Trans Biomed Eng. 2015; 62:2244-2250.
- Visuelle Bewegungskontrolle geführter Kraftübungen bei jungenErwachsenen und Senioren. Ger J Exerc Sport Res. 2018; 48: 428-437.
- Einsatz und Bedeutung von Seilzügen in der MedizinischenTrainingstherapie am Beispiel Hüft-Totalendoprothese– eine Expertenperspektive. B & G. 2018; 34: 20-28.
- A language and environment for statisticalcomputing.: R Foundation for Statistical Computing. [18th December 2018].
- Motion Error Classificationfor Assisted Physical Therapy - A Novel Approach usingIncremental Dynamic Time Warping and NormalisedHierarchical Skeleton Joint Data. In: Proceedings of the 6thInternational Conference on Pattern Recognition Applicationsand Methods: SCITEPRESS - Science and TechnologyPublications; 2017: 281-288.
- Deskriptive Statistik. Konstanz: UVKVerl.-Ges; 2015. UTB; 3969. [18th December 2018].
- Persistence in visual feedbackcontrol by the elderly. Exp Brain Res. 1998; 119: 467-474.
- Augmented visual, auditory,haptic, and multimodal feedback in motor learning: a review.Psychon Bull Rev. 2013; 20: 21-53.
- Motion detection supportedexercise therapy in musculoskeletal disorders: A systematicreview. Eur J Phys Rehabil Med. 2018; 54: 591-604.
- Evaluation of Pose TrackingAccuracy in the First and Second Generations of MicrosoftKinect. International Conference on Healthcare Informatics(ICHI). 2015: 380-389.
- The validity of the first and second generationMicrosoft Kinect™ for identifying joint center locations duringstatic postures. Appl Ergon. 2015; 49: 47-54.
Technische Universität Chemnitz
Fakultät für Human- und Sozialwissenschaften, | https://www.germanjournalsportsmedicine.com/archiv/archiv-2019/issue-3/validation-of-an-assistance-system-for-motion-analysis/ |
I am a voracious reader. I read for pleasure and professional growth. I read titles that are suggested and titles that are convenient. I read magazines at doctors’ offices, browse them in line at the grocery store and read. I even read the backs of cereal boxes and junk mail. Really.
As a child, I had plenty of time to read and write until my literate heart was content. As I grew, it became harder to find the time to read for pleasure between work and school, but I still managed to make time. But then, I started teaching. And became a wife and a mother. And my reading life took a back seat. While it was for good reason, I missed it desperately. Reading was my form of self-care, my only hobby, my escape. And the lessons I learned from the words on the page made me a better person, a better wife and mother, a better educator. I wanted my reading life back and needed a way to figure out how to get it. I scoured the Internet for helpful tips and advice to make reading a priority in my life once again and came to a startling conclusion captured perfectly by Annie Dillard:
That hit me hard. I had quickly become a master at habits and routines that ensured my children were well cared for and my work got done. But not necessarily the routines that ensured for my own well-being and what I wanted most for myself.
It took a while for me to figure out daily routines that worked best for me to ensure I made time for daily reading and rejuvenation, but once I did, it made a drastic difference in my happiness, well-being, and even my practice as an educator. When I nourish my own reading and writing life, it becomes better. I learn lessons from characters that impact my own thinking. I learn new information that makes me happier and healthier. I explore new ideas and perspectives that I cannot experience on my own. And I gain new excitement for sharing my reading life with others, especially the teachers and students I work with.
I’ve come to learn we can mindfully plan for daily routines that invite reading and writing into our daily lives. And it all boils down to this: we must create daily habits and routines based on our own personalities and lifestyles. The first step to creating a personalized reading routine that is right for you is to ask yourself some questions:
- Are you a morning person or do you work best later into the night?
- Do you need longer stretches of time to get into a book or can you start reading on a whim?
- Can you hold yourself to your own schedule or do you need external accountability to keep going with a new habit?
- Do you prefer to read physical books or ebooks?
- Do you need total silence to read or do you read better with a bit of background noise?
- Do you love predictability or do you create new experiences?
Think about a reading routine that works best for you, try it out and revise as needed. Here are some possibilities:
- Get up ten minutes early each morning to read. You might read in bed without any distractions or start reading while your coffee brews.
- Go to bed early with a book in your hand. For some, reading in bed is the perfect way to wind down from a busy day.
- Make a reading lunch date. Pack your book in your lunch bag and choose to read instead of scroll your social media feed.
- Pair reading with driving and listen to an audiobook on your commute. Or, grab your device when you grab the leash and listen while you walk the family pet.
To learn more about Leading Literate Lives visit Heinemann.com.
Stephanie Affinito is an educator in the Department of Literacy Teaching and Learning at the University at Albany in New York. She has a deep love of literacy coaching and supporting teachers’ learning through technology. Stephanie creates spaces for authentic teacher learning that build expertise, spark professional curiosity and foster intentional reflection to re-imagine teaching and learning for students. She is the author of Literacy Coaching: Teaching and Learning with Digital Tools and Technology and Leading Literate Lives: Habits and Mindsets for Reimagining Classroom Practice. She presents regularly at state and national conferences on literacy coaching, teacher collaboration, and supporting teachers’ reading, writing, and learning through innovative technology.
You can connect with her online at stephanieaffinito.com and on Twitter at @AffinitoLit. | https://blog.heinemann.com/reconnecting-with-your-literate-life-creating-new-habits-routines |
We understand the ever changing landscape of airports and aviation law firsthand. Our team is led by a former in-house counsel for the Miami International Airport, who advised the airport in all of its operations and business dealings, including the planning of the complete redevelopment of the North Terminal. We represent regional, national and international airports and airport-related businesses, including airlines, cargo carriers, car rental companies, airport concessionaires, consultants, and construction and engineering firms along a broad spectrum of litigation, transactional, and regulatory matters.
Our lawyers have years of experience in airport finance, airline negotiations, airport concessions and land leasing and development. We have helped numerous firms win major airport concessions around the United States and have negotiated airline-airport use agreements, rental car facility agreements, fuel system lease agreements, management agreements, rental car lease and concession agreements, and other ground transportation agreements. We have also assisted airports in their non-aviation development deals, expansions, construction projects, labor agreements and First Amendment issues.
We are well positioned geographically to counsel major international airlines, as well as foreign passenger and cargo carriers, in deals and matters related to Latin America, including issues involving routes, airport expansion, public-private partnership (P3) transactions, and procurement. We also negotiate contracts and leases, shepherd matters through the Department of Transportation, and litigate cargo claims, employment disputes and contract disputes.
In particular, our team has a long history of successfully representing some of the region’s most high-profile complex P3 transactions and assisting municipalities and private entities in the planning, negotiating, drafting and execution of a project. We have the strategic vision and experience to advise government entities and officials with respect to structuring, analyzing alternatives, conducting one-on-one negotiations with bidders and bringing projects to fruition. Our leading roles in some of the most significant transactions include:
- Representing a major international airline in connection with the construction of a $1.5 billion airport expansion in partnership with Miami-Dade County and representing an international surface transportation vendor in connection with its contract to design and oversee the overhaul of Miami-Dade County’s Metro-rail and Metro-mover system.
- Counseling the Pensacola airport on a long-term ground lease and operating agreement for development of an on-airport hotel and mixed-use business facility.
- Representing the Miami Dade Expressway Authority in the development of the Miami Intermodal Center, which links the Tri-Rail, Metrorail, Car Rental Center and all ground transportation to Miami International Airport.
- Counseling on the redevelopment of a terminal at Hewanorra International Airport for St. Lucia Air and Sea Port Authority
We are well versed in aviation law, but we also have lawyers with real-world expertise in the aviation field. One of our trial attorneys is a former senior aircraft maintenance manager for Northwest Airlines with extensive experience managing maintenance operations with a large union work-force. He is also an experienced pilot holding a Commercial Multi-Engine Land with Instrument Privilege Certificate.
We help our clients successfully navigate the regulatory and governmental thicket to achieve their important business goals. We leverage lawyers across practice groups, including government affairs, litigation, public contracts and bid disputes, land use, labor, environmental, real estate, business transactions and public-private infrastructure development, which gives us unique legal and business insight.
RELATED BLOGS,
PUBLICATIONS,
NEWS & UPDATES
PUBLICATIONS, | https://www.wsh-law.com/practices/government/airports-and-aviation/ |
Apush foreign policy
How and for what reasons did united states foreign policy change between 1920 and 1941 ap united states history free-response questions form b . To united states foreign policy on two major issues during the period from 1789 -1825 -the term “isolationism “ does not adequately describe the reality of either united states foreign policy or america’s relationships with other nations during the period. Review of major milestones in us foreign policy concerning latin america topics include: the monroe doctrine, roosevelt corollary, dollar diplomacy, good ne. At the beginning of barack obama's presidency, he discussed his objective to have a nuclear free world and his plans to begin disarmament of the united states' weapons since then he has actually increased spend and increased work on military weapons my advice is that if you do not know it will .
A policy of non-participation in international economic and political relations nationalists extreme pride or devotion that people feel for their country or culture. America’s newest live-streaming reality show features the foreign-policy establishment fighting for its life against donald trump. Apush foreign policy change how and why did united states change it's foreign policy between 1920 and 1941 - download as word doc (doc / docx), pdf file (pdf), text file (txt) or read online. A policy of non-participation in international economic and political relations nationalists extreme pride or devotion that people felt for their country or culture.
Foreign & domestic policy of the 1960s: john f kennedy & lyndon b johnson brinksmanship” to a “flexible response” & “first strike” policy. Carter's foreign policy the election of democrat jimmy carter as president in 1976 brought a new emphasis, based on carter’s personal ideology, to us foreign policy. Foreign policy in the progressive era in the years leading up to its entry into world war i, america did its best to maintain its influence in asia through diplomacy while following an aggressive foreign policy in the western hemisphere. Kinds of foreign policy in the united states, congress declares war, and such restrictions can disadvantage the us in the realm of foreign policy, but some say that some presidents have gone too far in the past.
American foreign policy last week, we challenged you to try your hands at synthesizing the history of how wars impacted american society differently in the nineteenth and twentieth centuries. Apush chapter 27: key terms 1 the big sister policy (1880s) was a foreign policy of secretary of state james g blaine aimed at rallying latin american nations behind american leadership and opening latin american markets to yankee traders. Your total resource for advanced placement united states history review this website is the sole creation of adam norris and is not endorsed by the college board, ap, or any school district apushreviewcom. Apush truman domestic and foreign 13,458 views share like download truman-foreign policy nathan tengowski eisenhower domestic policy.
Apush foreign policy
Start studying apush foreign policy learn vocabulary, terms, and more with flashcards, games, and other study tools. Apush test countdown 2301 days since cst history apush powerpoints unit 12 1960's foreign policy 1960's foreign policy comments sign . George washington foreign policy page history last edited by mr hengsterman 5 months, 2 weeks ago laying the cornerstone of foreign policy [1793-1796].
- If you would like to download the powerpoint used in the video, click here: apush review, us foreign policy, china edition if you would like to download a fill-in-the-blank guide for the video, click here: apush review, foreign policy, china edition.
- Apush—kind seventies outline foreign policy issues during nixon's presidency a detente: shift in us policy toward communism 1 sec of state henry kissinger traveled to china and the soviet union for secret.
Korean war mao zedong leads chinese communism 1943 - 1976. Foreign policy • merely refers to, quotes, or briefly cites documents • contains little outside information or information that is inaccurate or irrelevant. Conflicts with foreign policy in the middle east have been conflicts since the 21st century and the two presidents’ administrations have developed more differences between conservative and liberal, allowing more changes in party loyalties based off ideologies. | http://rctermpaperqwxu.streetgeeks.us/apush-foreign-policy.html |
ABSTRACT—A new method of treating various textiles, for which sewing is unsuitable, is described. Using a mixture of polyvinyl acetate resins AYAA and AYAC as a heat-seal adhesive, the textile is mounted onto a supporting fabric. The preparation of the adhesive-coated support is carried out using a spray gun. The treatment of a badly deteriorated 19th century silk American flag is described in detail. Steps include flattening, heat-sealing to a support, and final mounting inside a protective enclosure. Two variations in the use of polyvinyl acetate resins as a heat-seal adhesive are given. These involve the mounting of a painted Chinese silk and a printed silk square by Matisse. The physical flexibility achieved by spray application, the excellent aging and handling qualities of the resins used, and the safety provided by the final mounting package are discussed.
There are certain textiles which for one reason or another, cannot be sewn, although, for those textiles which are physically strong enough, sewing is the least destructive and most easily reversible mounting technique. The fibers of many textiles are too deteriorated to take the strain put upon them by a sewing thread; the surfaces of some very smoothly finished textiles, usually silks, are too visually disturbed by sewing for this technique to be used. Various other methods have been devised for mounting textiles that cannot be sewn. Sandwiching textiles between a solid support and glass or Plexiglas is a common alternative, especially for pieces that do not require a great deal of manipulation during the mounting procedure. Methods of treatment which do not immobilize deteriorated textiles, including sewing between two layers of crepeline, do not provide adequate support.2
Various adhesives have been used to mount deteriorated textiles. Solvent adhesives3 (including aqueous ones) have some serious drawbacks both during and after treatment, which have been discussed elsewhere.4 Heat-seal adhesives offer many advantages, especially during the mounting process.5 One of these advantages is non-impregnation of the textile. This paper presents a heat-seal technique using a mixture of polyvinyl acetate resins that avoids many of the problems of earlier heat-seal procedures. Polyvinyl acetate resins retain greater solubility than the emulsions6 and, in the technique presented here, offer much greater flexibility of the mounted textile.
The general procedure described here was developed to treat a silk and cotton 34-star American flag measuring three by four feet and said to date from the 1860's. (The thirty-fourth state, Kansas, was admitted to the Union on January 1, 1861, and the thirty-fifth state, West Virginia, was admitted on June 20, 1863.) The flag was received tacked to a gold-colored cardboard laid over a piece of composition board and framed directly under glass. The silk of the stripes and field was extremely weak, brittle, and easily abraded, with many breaks. The stars were cut out of cotton and hand-sewn on either side of the field and were much stronger than the silk. There was extensive wrinkling and folding especially in the blue field, as shown in Figures 1 and 2. Because of the weakened condition of the fabrics and the smooth surface, the possibility of sewing was rejected. The flag clearly needed overall support to prevent further deterioration.
The tacks holding the flag to the cardboard were removed, and the cardboard was gently slid out from under the flag, leaving the flag on a piece of Kraft paper laid over Fome-cor. Threads to guide the blocking were stretched over the flag and secured to push-pins with rubber bands.7
The silk was blocked as follows: The fabric in the stripes was made more flexible by locally raising the humidity with a fine mist of water, and was then moved into position by careful manipulation. The red stripes were then further blocked and wrinkles taken out by ironing with a warm tacking iron through moist blotters. The white stripes, which were made from a more open-weave fabric, were too weak to withstand this procedure. The blue field was blocked as follows: One small area at a time (about two inches square or less) was relaxed with a fine water mist. Fragments were then unfolded and straightened with sable brushes and small spatulas. The area was then pressed under moist blotters and held flat with a square of Plexiglas and about one pound of weight. The blotters and weights were removed as each area was completely dry.
At the same time, a support fabric was prepared by stretching a length of silk crepeline net8 taut on a strainer. It was then sprayed from one side ten times over a period of two weeks with a ten percent solution of polyvinyl acetate resins (equal amounts of AYAA and AYAC) in toluene with a few drops of diacetone alcohol added to slow evaporation, sprayed at twenty-five pounds per square inch. The pressure was enough to assure that the fibers of the net were coated without the adhesive forming a continuous film between the threads.
[Since this treatment was carried out, we have changed this procedure slightly. We now dilute our 30% stock solutions (made in toluene) with ethanol and omit the diacetone alcohol. Spraying is done under the same conditions, but often no more than six times, depending on the weight of the textile.]
After several days of drying, the net was removed from the strainer and taped securely to glassine laid over a solid support. After the flag was transferred to the silk net and the threads were aligned as much as possible, the flag was attached to the net by ironing each area from the front with a warm tacking iron through glassine, as shown in Figures 3 and 4. The bond produced by the first application of minimal heat was weak enough so that the fragments could be removed by sliding a spatula under the fragment, and repositioning as necessary. After all the fragments were in place, the bond was strengthened by ironing with a larger tacking iron at a slightly higher temperature. At this stage, the iron was held for a longer time in each place. (This step could be carried out on a vacuum hot table, if one is available.)
The final mounting was prepared by covering a wooden strainer with a one hundred percent cotton fabric,9 adhered with a polyvinyl acetate emulsion. The same fabric was also stretched to the thread across the back of the strainer. Fabrics chosen to match the colors of the blue field and white stripes were laid over the mounting fabric in the proper positions, with the blue over the white. The flag on its supporting silk net was laid over the colored cotton. All layers were secured to the mounting fabric by sewing along the original seams with a fine needle and soft cotton embroidery floss. The excess silk net and the edges of the background fabrics were trimmed to the edges of the flag. (The combination of the heat-seal support with sewing means that, in the future, the flag can be transferred to a new mounting without the need for retreatment of the flag.)
A five-sided box made of ultra-violet filtering Plexiglas (Rohm & Haas UF-3) was fitted over the front of the strainer and secured with screws into the sides, as shown in Figure 5. Acid-free lining paper (Talas) was laid over the back of the mounting fabric as a dust filter. A piece of quarter-inch thick pegboard with strips of the mounting fabric covering the edges was secured over the back by screwing into the strainer. This protects the back of the textile while allowing some circulation of air.
Two smoothly finished textiles, a nineteenth-century Chinese painted silk fragment, and a printed silk square by Matisse were treated using a similar technique. For the Chinese silk, a piece of cotton fabric was stretched on a temporary strainer and sprayed in much the same way as the crepeline. When a closed-weave fabric is used instead of a net, the spraying is done from a greater distance to form a web of dry adhesive on the surface and avoid impregnating the support fabric. The textile was attached to the cotton using an iron, working through glassine. After attachment, the mounting fabric was transferred to the front of a final strainer, and framed under UF-3 Plexiglas with a conventional ragboard mat.
The Matisse textile is in the form of a conventional scarf with rolled and hand-sewn edges. A cotton fabric was sprayed with resins as above, but with a larger proportion of AYAC in the mixture to lower the softening point, and therefore the temperature required for mounting. At the same time, a permanent mounting strainer was prepared as for the flag, with a colored cotton fabric covering the strainer and stretched behind it. The adhesive-sprayed cotton was then stretched behind the colored fabric with the adhesive adjacent to the colored fabric.
The scarf was laid in position over the colored fabric, and a pencil mark was made on the front of the colored fabric just inside the rolled edge. The scarf was removed, and the mounting fabric and prepared cotton were sealed together with a tacking iron, around the border up to the pencil line. The colored fabric was cut at the line and the center portion was removed, exposing an area of resin-coated cotton just smaller than the dimensions of the scarf. The scarf was replaced in position and secured with heat. Since the rolled edges of the scarf overlap the colored fabric and were therefore not attached by the adhesive, they were sewn down through both layers of cotton with single strands of cotton embroidery floss. The form of the rolled edges is still clearly visible. The package was finished in the same way as the flag and is shown in Figure 6.
The method described above offers several advantages over previously described heat-seal mounting techniques. Polyvinyl acetate resin has been used by conservators for over forty years; its excellent aging and working properties are well known.10 Because it is available in several viscosity grades with different melting points, mixtures can be prepared with a wide range of softening points.11 The softening points of AYAC and AYAA are 89.6 and 150.8 degrees F. respectively. By changing the proportions of the mixture, and thereby the softening point, and by varying the application of heat, bonds of varying strengths can be obtained.
The actual exposure of the textile to heat is not severe. When using an equal mixture of AYAC and AYAA, on a silk embroidered textile being mounted to cotton, actual measurements were taken of the temperatures involved. The iron was set at around 140 degrees (measured with a surface temperature thermometer). Paper thermometers set at several places under the mounting fabric read between 110 and 120 degrees F. after the piece had been mounted. This compares favorably with the figure of 80 degrees C. (176 F.) given by Beecher for his heat-seal method using an internally plasticized vinyl acetate-vinyl caprate copolymer emulsion.12 The figure for the PVA heat-seal could be lowered further by changing the mixture.
Maximum flexibility combined with intimate overall support can be provided for extremely deteriorated textiles by using an adhesive-coated net. The use of a closed-weave fabric produces slightly less flexibility. The use of a sprayed rather than brushed or rolled layer of adhesive prevents the stiffening of the support fabric that would result if the threads were impregnated with resin. The resulting package, made up of the original and its support, retains all the qualities of a textile and can be mounted in a variety of traditional ways. Where complete immobilization is not necessary, the original plus support can be handled for display in the same way as the undeteriorated original.
Because the adhesive layer has very little gloss until ironed, it produces no visual disturbance in textiles with very open weave or sizeable voids. If the textile is mounted onto a fairly transparent net, general compensation can be carried out by laying a fabric of appropriate color under the net. If the textile is mounted onto an opaque fabric, the support itself can be colored appropriately.
If it becomes necessary to remove the textile from the support fabric, several alternative methods can be used. In the case of textiles which, like the Matisse scarf, are not deteriorated but have been heat-sealed for other reasons, the textile can simply be pulled away from the support, leaving no resin on the back of the textile. In other cases, toluene or other appropriate solvents can be sprayed onto the reverse of the support, and the support fabric can then be peeled away. If a hot table is available, heat can be used to reverse the mounting process.
The final mounting method used for the flag and the scarf was described in an article by the late Louisa Bellinger.13 It is excellent for textiles supported by either sewing or heat-seal adhesives. The textile is protected front and back from dust, mechanical damage, and ultraviolet light, without being completely sealed off from the outside environment. Constant tension is maintained throughout the treatment procedure, since the fabric supporting the textile does not have to be transferred to a second support for display. At the same time, the textile remains easily accessible for further treatment, cleaning of the Plexiglas, etc. The Plexiglas is automatically held away from the textile without additional liners or spacers being needed. If desired, a window can be made on the mounting fabric to allow viewing of the reverse of the textile. The whole package can also be inserted into a conventional frame.
We feel strongly that it is a conservator's responsibility to see the treatment of a textile through to a point where the textile is safe from careless handling. The proper mounting of a textile onto an auxiliary support, regardless of the method, cannot in itself insure the future safety of the original. If nothing remains to be done to permit display, then the textile is that much safer from framers, museum technicians, and other personnel who are often untrained in the special problems of textiles. The final mounting package we have described assures that this is the final result and provides the additional protection required for the preservation of the object.
This heat-seal technique, as all previously described heat-seal methods, is only suitable for thin textiles. Because there is attachment only to the back layer of fibers, with thicker textiles there would be a tendency for separation to occur at points of stress between adhered and unadhered fibers. This is especially true of multi-layered textiles such as Paracas embroideries. In some special cases, sewing can be combined with a heat-seal method.
While the use of sprayed polyvinyl acetate resins is not suitable for certain types of textiles, it is adaptable to a wide range of textile conservation problems and can be combined with sewing where appropriate. In the past, the spray gun generally has been used by paintings conservators. Like the vacuum hot table, which was developed for the treatment of paintings, but has been used successfully in the treatment of textiles,14 the spray gun may prove to be an extremely useful tool in textile conservation. It is very important for conservators in a particular specialty to familiarize themselves with the techniques and tools of other specialities, so that in the future they may have the widest possible range of treatment techniques at their disposal.
Partners, Appelbaum and Himmelstein, 444 Central Park West, New York, New York 10025. Ms. Appelbaum is also Assistant Conservator at the Brooklyn Museum.
Lehmann, Detlef, “Conservation of textiles at the West Berlin State Museums,” Studies in Conservation9 (1964), p. 19.
Those adhesives which are applied in a volatile solvent and set as the solvent evaporates.
Leene, J. E., ed., Textile Conservation, Butterworths, London (1972), pp. 144–151.
Berger, Gustav, “Formulating Adhesives for the Conservation of Paintings,” Conservation of Paintings and the Graphic Arts (Preprints of Contributions to the Lisbon Conference), I.I.C., London (1972), pp. 613–629. See especially figures 3 & 4 and accompanying legends.
Phelan, W. H., Baer, N. S., Indictor, N., “An Evaluation of adhesives for use in paper conservation,” Bulletin of the American Group of I.I.C.11 (1971), pp. 58–75.
Scott, K., “Conservation of a Paracas Mantle,” Bulletin of the American Group of I.I.C.10 (1970), note, p. 159.
In the future, we would probably substitute a polyester net very similar to crepeline, available from Talas.
All cotton fabrics were washed several times in hot water before use.
Gettens, R. J., “Polymerized Vinyl Acetate and related compounds in the restoration of objects of art,” Technical StudiesIV (1935), pp. 15–27.
Rabin, B., “A Poly (vinyl acetate) heat seal adhesive for lining,” Conservation of Paintings and the Graphic Arts (Preprints of Contributions to the Lisbon Conference), I.I.C., London (1972), pp. 631–633.
Beecher, E. R., “The Conservation of Textiles,” The Conservation of Cultural Property, p. 262, UNESCO, Paris (1968).
Bellinger, Louisa, “The Cleaning of textiles,” Delft Conference on the Conservation of Textiles, pp. 92–93, I.I.C., London (1964).
Scott, K., “New Treatment for an old textile problem,” Bulletin of the American Institute for ConservationXIV (1974), pp. 168–170. | https://cool.culturalheritage.org/jaic/articles/jaic17-01-005.html |
Description:
Social Allies are seeking a creative Social Media Marketing Manager to assist on the creation of social posts, strategies and campaigns. Candidates must have a flare for writing and great organisational skills. The ideal candidate for this role will be trained in Marketing, PR, English or a related field although other applicants will be considered.
You must:
- Be current across emerging trends and developments
- Be current across all new emerging technologies and social communities
- Have experience in Analytics & Reporting
- Have Experience in copywriting i.e writing for social media, blogs or ads
- Have great teamwork skills
- A keen eye for detail
- Have Time management and multi-tasking abilities
- Have Creativity skills and problem-solving aptitude
You will participate in the development of social media strategies and key programming throughout the year, including researching a range of subjects and industries; adapting tone of voice to a wide range of organisational identities. You will also pitch creative ideas and work collaboratively with team members to launch projects.
Salary: Competitive
Holidays: 24 + Bank Holidays
Interested in this role or want to find out more?
Please attach your CV and cover letter with the role you’d like to apply for in the subject line. | http://socialallies.com/careers-social-media-account-manager/ |
key factor is fuel usage or boiler efficiency. Boiler efficiency, in the simplest terms, represents the difference between the energy input and energy output. A typical boiler will consume many times the initial capital expense in fuel usage annually. Consequently, a difference of just a few percentage points in boiler efficiency between units can translate into substantial savings.
May 28, 2020 · The results of factor analysis and cluster analysis show that thermal efficiency, concentration of O 2 and CO 2 are the most significant factors that influence the performance of combi-boilers. Thermal efficiency is the proportion of heat effective heating circulating water to the heat released by gas combustion.
Jun 29, 2011 · Abstract: Thermal efficiency of coal-fired utility boiler is an important indicator used to measure economic operation of power plant. However, on-line calculation for thermal efficiency of boiler still have difficulties, which the coal quality are often changing and not well obtained real-time.
Thermal Power – JP PowerVentures. BPSCL was set up by the Aditya Birla Group to set up a coal fired Thermal Power Super critical boiler technology will achieve an unprecedented net efficiency This technology's higher steam temperatures and pressure parameters offer the technology boiler based project in Bara, Allahabad, Uttar Pradesh Features:.
U.S. Energy Information Administration | Analysis of Heat Rate Improvement Potential at Coal-Fired Power Plants 1 Introduction The thermal efficiency of electricity production is represented by the heat rate, which measures the
Condensing economizers increase the thermal efficiency of boilers by recovering sensible and latent heat from exhaust gas. These economizers are currently being used commercially for this purpose in a wide range of applications. Performance is dependent upon application-specific factors affecting the utility of recovered heat. With the addition of a condensing economizer boiler efficiency
CFD Analysis of the Pulverized Coal Combustion Processes in a 160 MWe Tangentially-Fired-Boiler of a Thermal Power Plant The strategic role of energy and the current concern with greenhouse effects, energetic and exergetic efficiency of fossil fuel combustion greatly enhance the importance of the
What is boiler thermal efficiency? The amount of heat that fuel is fed into the boiler, most of which is absorbed by the heating surface of the boiler, produces water vapor. This is the effective heat used. Another part of the heat is lost, and the percentage of the effective heat is the thermal efficiency.
The thermal and economic analysis of a 210 MWe coal-fired power plant was carried out to predict the coal consumption rate, overall thermal efficiency, mass flow rate of steam through boiler, and Net present value of thermal power plant for given plant load and redundancy of boiler feed pump and condensate extraction pump.
Aug 29, 2017 · As an illustration, the optimum value of air excess to the combustion of natural gas is 5 to 10%, liquid fuel at the rate of 5 to 20%, and 15 to 60% for coal combustion. Boiler Thermal Efficiency. Boiler thermal efficiency shows how the performance in terms of its function as a heat exchanger.
Dec 04, 2019 · Efficiency of a Coal Fired Boiler in a Typical Thermal This paper presents briefly on the boiler efficiency evaluation procedures by direct and indirect methods useful in thermal power plants. In the direct method consideration is given to the amount of heat utilized while evaluating the efficiency of the boiler, whereas, indirect method
What is the thermal efficiency of gas fired steam boilers 2018-12-25 Generally speaking, not only gas fired boiler, including oil fired boiler, WNS oil fired gas boiler and SZS oil fired gas boiler can achieve at least 95% thermal efficiency.
The energy analysis based on the thermal tests shows that the average thermal efficiency of 141 coal-fired industrial boilers in Liaoning province of China is 76.08% several limitations are yet to be overcome and energy efficiency improved compared to the previous decade.
Carbon dioxide emissions and coal-fired boiler combustion efficiency are closely linked. Note that a 1% increase in efficiency is equivalent to a 2% to 3% decrease in emissions. Source: IEA
2. Boilers Bureau of Energy Efficiency 31 The coal-feed hopper runs along the entire coal-feed end of the furnace. Acoal grate is used to control the rate at which coal is fed into the furnace, and to control the thickness of the coal bed and speed of the grate. Coal must be uniform in size, as large lumps will not burn out com-
Mar 13, 2020 · Using the same combustion gas analysers, most high efficiency boilers are about 90% gross efficient (10% of your money is wasted). Changing from a reasonable, old, room-sealed boiler to a new high efficiency boiler will save you about 10% - 15% of the money you spend on gas. Figures claiming savings of 30% or more seem not be be physics but magic.
Coal fired power generation is switching over to supercritical (SC) and ultra supercritical (USC) plants which operate with steam on higher temperature and above critical pressure to produce power output at higher thermal efficiency. Due to involvement of high heat resistant material, manufacturing cost of the components of
Thermal efficiency of boiler is defined as the percentage of heat input that is effectively utilised to generate steam. There are two methods of assessing boiler efficiency. 1)The Direct Method:Where the energy gain of the working fluid (water and steam) is compared with the energy content of the boiler fuel.
Bora MK, Nakkeeran S. Performance analysis from the efficiency estimation of coal fired boiler. International Journal of Advanced Research 2014, 2: 561-574. Power Plant Engineering, McGraw Hill
2019-12-4 · Not only the thermal efficiency of coal fired boilers, even the thermal efficiency of gas fired boilers and oil fired boilers, the thermal efficiency of waste heat boiler and biomass boiler, are high and low, which is largely due to technology, design, different materials of different manufacturers, But also has a great
steam from various stages of the turbines to preheat boiler feedwater prior to its entering the steam generator (boiler). The number of heaters considered in the performance analyses represents designs typically seen in commercial construction of U.S. power plants, and is a tradeoff between thermal efficiency and capital costs.
Mar 28, 2014 · Result of the analysis show that the efficiency of boiler depends on mass of coal burnt & type of combustion .This study is fulfilling the objective of analysis to find the boiler efficiency and heat losses in boiler for 27 MW thermal power plant of Birla Corporation Limited, Satna (M.P.) Keywords: Rankine Cycle, AFBC Boiler, Ash Handling
Elimination of Steam Side Scaling On Grade 91 Steel, Improving Efficiency, Reliability, and Flexibility of Existing Fossil Fired Power Plants — Applied Thermal Coatings (Chattanooga, TN) aims to significantly improve the reliability and efficiency of existing coal-fired power plants under flexible operating conditions by deploying a
The three main components of a thermal power plant are boiler, turbine and alternator. Hence, the overall thermal power plant efficiency depends on the efficiencies of these three components. The thermal efficiency is an indication of how well the plant is being operated as compared to the design characteristics. 2.1 Boiler Efficiency Calculation
“Analysis of Performance of Coal Fired Boiler in Thermal Power Plant” 1Sachin Yadav, 2P.S.Yadav 1,2Scope college of engineering, Bhopal Email: [email protected], [email protected] Abstract : The era after Second World War (1945-1973) was a period of cheap and abundant energy, especially oil.
Statistical modeling of an integrated boiler for coal . Valsalam et al. developed mathematical model for the 210 MW coal-fired boiler for which MPC controller was designed to control the steam from superheater. A general investigation on modeling, identification and control of the coal fired thermal power plants are provided by Sreepradha et al. .
thermodynamic analysis of Boiler & Turbine of coal fired thermal power plant. Energy analysis gives energy loss and first law efficiency, while the exergy analysis gives entropy generation irreversibility, percentage exergy loss and second law efficiency of boiler and turbine. It is seen that energy loss in boiler is about 61% of total input
The Losses method is used to calculate boiler efficiency. Each of the different Losses is calculated to determine the efficiency. Data Required. For a coal fired boiler to calculate these losses we require the following data. Higher Heating Value of coal on as Fired Basis HHV- kJ / kg. Proximate Analysis of Coal on as Fired basis which include
For pulverized coal-fired power plants, the long-term target for thermal efficiency is above 55% by using steam with maximum temperatures around 1073 K (800 °C) . The thermodynamic principles of coal-fired power plants (mainly steam cycles) have been described in many textbooks related to thermodynamics and power technologies , , [7
Dec 21, 2017 · In engineering applications, there are various types of boilers such as water tube boilers, fire tube boilers, packaged boiler, fluidized bed combustion boiler, pulverized fuel boiler and waste heat boilers. These boilers are used in different industries such as power plants, paper, and chemical. The present paper reports various problems (such as agglomeration, slagging, fouling, caustic
A coal-fired circulating fluidized bed (CFB) boiler for 600 MW power plant is designed to integrate with the supercritical CO 2 (S[sbnd]CO 2 ) power cycle in this study.
Jun 02, 2018 · The traditional calculation method of industrial boiler thermal efficiency needs to input many parameters, which leads to a lot of complicated calculations. It is not suitable to make an accurate judgement on the operating condition of an industrial boiler, especially a wood pellets-fired one.
As an example, using an average heat rate of 12 MJ/kWh for a 1000 MW, 80% availability coal-fired power plant using coal rated at 20 MJ/kg, the efficiency is 30% and the annual coal consumption will be 3,85 Mt. Increasing the efficiency to 35% drops the annual consumption to 3,6 Mt, an annual savings of 250 000 t of coal, which at R300/t
Jun 21, 2016 · The situation had barely improved three years later when an IEA study into coal-fired power plant design in China found that the global average efficiency of coal-fired power plants in operation was around 33%, significantly lower than the 45% possible using modern, ultra-supercritical technology. Progress is undoubtedly being made, however.
Boiler efficiency is mainly depended on the amount of losses in the system. In high capacity pulverized coal fired boilers the total losses account to about 12 to 14%. Roughly 50% of the losses are governed by fuel properties like hydrogen in fuel, moisture in fuel and ambient air conditions. The other 50% losses are carbon loss and dry gas loss.
3.2.6 Thermal efficiency of conventional power plants The boiler efficiency of modern pulverized fuel, hard coal-fired units is 94%–95% (LHV basis), reducing slightly to 90%–91% for lignite-fired units due to the higher moisture content.
Increasing the Efficiency of Existing Coal-Fired Power Plants Congressional Research Service Summary Coal has long been the major fossil fuel used to produce electricity. However, coal-fired electric power plants are one of the largest sources of air pollution in the United States, with greenhouse
Efficiency is a very important criterion in Boiler selection and Design. Efficiency figure depends upon the type of boiler as well as on the type of fuel and it’s constituents. For example, efficiency of a Bagasse fired boiler is about 70% where as that of oil fired boilers is about 85 %.
All units that use steam and hot water as heat source require boilers. ZOZEN has four series boiler products which can meet the requirements of all walks of life. Apart from considering the price, the customers also pay attention to the thermal efficiency of gas-fired boilers, coal-fired boilers, biomass-fired boilers and thermal oil heaters. | https://casamijhaeli.es/2Roa9zNn |
What are 4 risk factors for addiction?
Environmental factors that can contribute to someone’s risk for drug abuse and addiction include:
- Home and family. The home environment has an important impact on a person’s risk for drug abuse and addiction. …
- Availability of drugs. …
- Social and other stressors. …
- Peer influence. …
- School performance.
Is a slip the same as a relapse?
Some addiction professionals differentiate a slip and a relapse by looking at the client’s intention at the time. A slip is usually a single, unplanned use of drugs or alcohol. Relapse, on the other hand, is thought to happen when a recovery plan is completely dismissed.
What are three factors that increase a person’s risk for addiction?
Regardless of your upbringing or moral code, many factors can raise your risk of becoming addicted to alcohol and other drugs. Your genetics, environment, medical history, and age all play a role. Certain types of drugs, and methods of using them, are also more addictive than others.
What are 2 risk factors that can result in someone becoming addicted to drugs?
Certain factors can affect the likelihood and speed of developing an addiction:
- Family history of addiction. Drug addiction is more common in some families and likely involves genetic predisposition. …
- Mental health disorder. …
- Peer pressure. …
- Lack of family involvement. …
- Early use. …
- Taking a highly addictive drug.
How do you know if someone is Oding?
The following are signs of an overdose:
- Loss of consciousness.
- Unresponsive to outside stimulus.
- Awake, but unable to talk.
- Breathing is very slow and shallow, erratic, or has stopped.
- For lighter skinned people, the skin tone turns bluish purple, for darker skinned people, it turns grayish or ashen.
What should I do if I relapse?
What to Do Right After a Relapse
- Reaching out for help. Seeking support from family, friends, and other sober people can help you cope with a relapse. …
- Attending a self-help group. …
- Avoiding triggers. …
- Setting healthy boundaries. …
- Engaging in self-care. …
- Reflecting on the relapse. …
- Developing a relapse prevention plan.
What drug has the highest relapse rate?
Research shows that alcohol and opioids have the highest rates of relapse, with some studies indicating a relapse rate for alcohol as high as 80 percent during the first year after treatment. Similarly, some studies suggest a relapse rate for opioids as high as 80 to 95 percent during the first year after treatment.
Why do I keep wanting to relapse?
Stress. Stress tends to be the main reason that people keep relapsing. Chances are, you used drugs or alcohol in an effort to cope with the stress that you feel in everyday life. This can include issues at work, problems with relationships, or even adjusting back to life after treatment.
What is the main cause of addiction?
Environment: Exposure to addictive substances, social pressure, lack of social support, and poor coping skills can also contribute to the development of addictions. Frequency and duration of use: The more someone uses a substance the more likely they will become addicted to it.
Who is most at risk for substance abuse?
People who have experienced physical, emotional, or sexual abuse or trauma are more likely to develop a substance use disorder. So are people who witness family members, friends, or peers using drugs or alcohol excessively or in an addicted manner.
What makes someone more susceptible to addiction?
Environment, genetics, family background, personality traits, and even stress can all make someone more likely to try drugs or alcohol in the first place.
What do you do if someone overdoses?
The best thing to do is call 911. If someone is overdosing on opioids, administering naloxone can save their life. When an overdose is happening, make sure the person who is overdosing stops using drugs or alcohol immediately. Call 911 and follow the instructions the 911 operator gives you.
How does addiction develop?
Addiction develops when the urge to take a substance hijacks parts of the brain that reward behavior and provides benefits for the body. Substance-related disorders also impact the area of the brain responsible for emotions and decision-making.
What happens when someone takes too many pills?
Drug overdoses may be accidental or intentional. If you’ve taken more than the recommended amount of a drug or enough to have a harmful effect on your body’s functions, you have overdosed. An overdose can lead to serious medical complications, including death.
What do you do when someone overdoses?
How to Respond to an Overdose
- STEP 1: CALL FOR HELP (CALL 911) …
- STEP 2: CHECK FOR SIGNS OF OPIOID OVERDOSE. …
- STEP 3: SUPPORT THE PERSON’S BREATHING. …
- STEP 4: ADMINISTER NALOXONE (if you have access to it) …
- STEP 5: MONITOR THE PERSON’S RESPONSE. …
- Do’s and Don’ts in Responding to Opioid Overdose.
How many times does someone relapse?
Unfortunately relapse rates for individuals who enter recovery from a drug or alcohol addiction are quite high. Studies reflect that about 40-60% of individuals relapse within 30 days of leaving an inpatient drug and alcohol treatment center, and up to 85% relapse within the first year.
How long does it take to recover from a relapse?
The researchers concluded that most improvement in physical symptoms occured within two months of the relapse and was largely complete within six months. However, further recovery could occur up to 12 months after the relapse in a small number of people.
What is a mental relapse?
First, individuals may go through what’s called an emotional relapse. During this stage, the individual may experience anxiety and uncertainty about their newfound sobriety. Sometimes, people who are emotionally relapsing will struggle with moodiness and irritability, depression, loneliness, and other emotional issues.
How many times does the average person relapse?
Between 40% and 60% of addicts will inevitably relapse. This figure, however, does not represent every person who has completed treatment. It is important to understand the high probability of relapse and learn the proper tools to maintain sobriety.
What is relapse rate?
Relapse rate is a measure of the success or failure of a program that treats substance abuse or rehabilitates offenders. Many programs funded by social impact bonds (SIBs) are evaluated on their relapse rates.
What is a high relapse rate?
However, it is important to remember that the overall rate of relapse associated with substance use disorders is high, at 40-60 percent.
What steps are you taking to avoid a relapse?
5 Rules of Relapse Prevention
- Avoid Triggering Situations. There are certain situations where drug and alcohol use is part of the culture. …
- Get Rid Of Toxic Friends. …
- Develop A Positive Support Network. …
- Stay In Therapy. …
- Take Medications As Needed.
How do I stop being addicted?
- Be accountable to someone. Find a sponsor at your local rehab center or even a close friend or family member can help keep you in line. …
- Exercise. …
- Break the habit. …
- Discover a new hobby. …
- Love yourself. …
- Write down the harmful effects your alcohol or drug addiction has. …
- Call for help – now.
What are the symptoms of substance abuse disorder?
Substance Use Disorders
- Bloodshot eyes and abnormally sized pupils.
- Sudden weight loss or weight gain.
- Deterioration of physical appearance.
- Unusual smells on breath, body, or clothing.
- Tremors, slurred speech, or impaired coordination.
Which teenager is at greatest risk for drug use?
Teens with family members who have problems with alcohol or other drugs are more likely to have serious substance use problems. Also, teens who feel that they are not connected to or valued by their parents are at greater risk. | https://answers.com.tn/what-are-4-risk-factors-for-addiction/ |
- This dissertation explores when and how multiparty mediation can help the prospects for peace in civil wars, considering when additional mediators are desirable and when they are not. While additional mediators can provide positive sources of leverage, they also increase the risk that forum-shopping, mixed messages, or free-riding will hinder the negotiations. I identify three characteristics of mediation efforts expected to improve mediation's chances of success. First, complementary efforts improve the mediation team's ability to respond to challenges at all phases of the resolution process, providing three important sources of leverage: contextual knowledge, economic/military resources, and staying power. Furthermore, complementary efforts reduce the risk of overcrowding by excluding mediators who do not bring a unique source of leverage to the table. Second, balanced mediation efforts include mediators biased toward both sides of the conflict. Each side has a mediator they trust to protect their interests at the negotiating table as well as to protect them if the other side reneges on the agreement. In this way, balanced mediation can help alleviate disputants' security concerns, improving the chances that negotiations are successful. Finally, coordination among the mediators should improve the chances of mediation success by maximizing the ability to take advantage of the additional resources and tools of another mediator while also minimizing the negative consequences of adding a new party to the negotiations. To evaluate these expectations, I employ statistical tests on a set of mediation attempts in civil wars between 1989 and 2005. In these analyses I consider three measures of mediation success: reaching an agreement, overcoming the difficult two-month period post-agreement, and producing a durable peace. In addition to these statistical analyses, I discuss two cases of multiparty mediation: Angola and Mozambique. These cases allow for a clearer look at the dynamics of complementary, balanced, and coordinated mediation during the conflict resolution process.
- Date of publication
- August 2015
- Subject
- DOI
- Identifier
- Resource type
- Rights statement
- In Copyright
- Advisor
-
- Bapat, Navin
-
- Cranmer, Skyler
-
- Beardsley, Kyle
-
- Crescenzi, Mark J. C.
-
- Gent, Stephen
- Degree
- Doctor of Philosophy
- Degree granting institution
- University of North Carolina at Chapel Hill Graduate School
- Graduation year
- 2015
- Language
- Publisher
- Place of publication
- Chapel Hill, NC
- Access
- There are no restrictions to this item.
- Parents:
This work has no parents. | https://cdr.lib.unc.edu/concern/dissertations/b5644s66d |
DALBILE YOUTH EMPOWERMENT INITIATIVE
The inclusive Local Economic Development program contributes to three results, stabilization and local Governance, inclusive and sustainable growth, and protection and graduation of the most vulnerable. It has six components and 12 projects. It is to contribute to stability in Somalia by extending state authority and services, promoting local reconciliation and peacebuilding, creating inclusive economic opportunities, and protecting the most vulnerable.
The priority target groups of this project are young people aged 15-25 years, as well as women. This action contributes to objective two of ILED, namely “revitalize and expand the local economy with a focus on livelihood enhancement, job creation, and broad-based inclusive growth, with a particular focus on opportunities for women and youth.” The program further states that “in order to foster stability and sustainable development, it is critical to promote social and economic inclusion and allow for greater participation in democratic governance of women and youth, as well as other excluded and less powerful groups.” The ILED program thus calls for a holistic approach to youth empowerment that focuses on employment and job creation but goes beyond narrow skills and entrepreneurship training by fostering an enabling environment for positive youth development that improves youth lives.
This action aims to build peace, mitigate radicalization, and contribute to Somalia’s stability by improving opportunities for youth to engage in peacebuilding, skills development, income generation, entrepreneurship, sports, and culture. The Specific objective is to ensure that youth have access to safe spaces where they can realize their full potential as productive and independent agents of positive change in Somalia. | https://dalbilehub.so/about-us/ |
If you teach yoga on a regular basis, there’s an excellent chance that you will end up with a pregnant mom in your class at some point. Whether you are teaching a beginner’s yoga class or a more advanced course, it’s bound to happen. Many first-time moms don’t know what classes and poses are appropriate for them. Even serious yoga practitioners may not be familiar with prenatal yoga, especially if this is their first pregnancy.
Knowing at least the basics of how to work with pregnant moms is an essential skill set for any yoga teacher. In most cases, the average 200-hour yoga teacher training course barely touches on prenatal yoga, if at all. Due to this lack of education, many well-meaning instructors are misinformed, or even completely uninformed, about what is and isn’t appropriate during each trimester of pregnancy.
So, what should every yoga teacher know about working with pregnant moms?
The first thing to ask any pregnant mom that attends your class is what their experience is with yoga. Have they been practicing yoga consistently and for how long? If they are a beginner, pregnancy is definitely not the best time to advance their practice and learn more difficult poses. Why not? Well, it all comes down to hormones.
Pregnancy hormones that encourage the pelvis to open up to prepare for childbirth are not restricted to only that function. Those same hormones cause other ligaments, veins, muscles, and joints to become more lax. That’s why many women experience things like heartburn, varicose veins, hemorrhoids, and indigestion during pregnancy.
That laxity in the joints could also lead to an overextension of the connective tissues in the hips, shoulders, knees, and pelvis during yoga practice, and possibly even lead to serious injury. A beginner should be extra cautious about hyperextending their joints. For example, they should be taught to bend their knees slightly during forward bends. A more advanced yogi should know how to adjust the poses to prevent injury, but a beginner will need more guidance from the instructor.
Although many pregnant moms will have greater flexibility because of these hormonal changes, they usually have tighter hamstrings for a couple of reasons.
First, it can be challenging to stretch the hamstrings when you have a pregnant belly in your way. Hamstrings are responsible for holding the body upright, so, as the stomach gets larger, the extra weight is thrown forward, and the hamstrings have to work harder to keep the body upright. For most prenatal students, the poses will need to be adjusted to prevent hamstring injury.
3) What about inversions, twists, and lying on the back or belly?
The safety of inversions and twists comes down to the experience and ability of the student. If the prenatal student is an experienced yogi who has been practicing inversions and twists for a long time, it’s perfectly fine for her to continue to do them throughout her entire pregnancy, as long as she is not experiencing any pain or discomfort. The same rule should apply for lying on the front or back; they can continue to do so as long as it’s not causing discomfort or pain.
However, the beginning student should not take this time to learn new poses they have not done before. All pregnant students must be encouraged to listen to their bodies and stop when they need to stop. If she feels light-headed or dizzy when she is on her back, that’s a sign that she should stop practicing prone positions until after the birth. Some women will experience this issue early on in their pregnancy, while others may never have the problem at all.
Most women will need to make some adjustments to the poses as they progress through their pregnancy. As the yoga instructor, it is a good idea to learn how they can modify forward bends by using a chair or widening the legs to accommodate the growing belly. For inversions, they may need to use the wall or a chair to help them keep their balance.
Deep twists, such as the Ardha Matsyendrasana that take the belly across the leg could cause cramping and should be avoided. On the other hand, open twists that twist the spine but leave the belly open can be encouraged. The belly should always be soft and round, never squished.
Certain poses, like downward dog and cat/cow, are excellent for opening up the hips. These poses will help to take pressure from the weight of the growing baby off the pelvic floor. Keep in mind that, as their belly grows, the student will need to modify downward dog to accommodate their growing body by using blocks under their hands and bending their knees.
4) Other poses that should be avoided or modified.
Prenatal students should avoid doing strenuous ab work. Boat pose, although technically a hip flexor pose, should be avoided because it could lead to a hernia. Table pose is ok and even encouraged because it will help to keep some tone to the abdominal muscles without causing strain.
Students who have been practicing backbends regularly before their pregnancy may continue to do so. However, they should not do a full bridge because it can overstretch the abdominal muscles and even tear the placenta.
Once week 20 is reached, lying on the back in Savasana can lead to a decrease in oxygen to the baby. Prenatal students should lay on their side rather than on their back once they get to this stage of pregnancy.
Many pregnant women do not realize that yoga and prenatal massage can go hand in hand for a more comfortable pregnancy. Encourage your pregnant students to seek out an experienced prenatal massage specialist, especially if they are having issues with extreme fatigue, sore muscles and joints, or poor circulation.
Studies have even shown that prenatal massage offers significant benefits during labor and delivery, including shorter deliveries, reduced need for pain medication and epidurals, and fewer incidents of cesarean births.
Some women will feel great throughout their entire pregnancy. Others may be miserable the whole time. There is no one size fits all practice that will suit every mom-to-be. Although there is no “typical” prenatal student, there are some specific things that are more common during each trimester.
It is common for the prenatal student to feel nauseous, tired, and dizzy during the first trimester. Observe them during transitions, especially when they are coming up from forward or backward bends. Encourage the student to go into child’s pose or take a break whenever they feel the need. Make sure they know to eat before class to keep their blood sugar regulated and recommend that they drink water and bring a snack for after the class. They should also be encouraged to take as many bathroom breaks as needed.
A lot of women feel fantastic during their second trimester. They will often have an abundance of energy, so this is the time to focus on stronger, more mindful, yet careful practice.
As the prenatal student approaches her due date in the third trimester, she will begin to feel more tired, heavy, and off balance. She will need to make more modifications to the poses at this point. During the last trimester, the pregnant student should avoid positions such as Cobra pose and Locust pose. Not only will they be very uncomfortable this far along, but they will also put too much strain on the student’s back. Seated Straddle pose and other seated forward folds are good alternatives.
As a yoga instructor, you are already aware of how beneficial breathing exercises are. During pregnancy, breathing exercises will help the mom-to-be release mental anxiety and reduce physical tension. Teaching your prenatal students breathing exercises that can also be practiced at home can be very helpful.
Learning the basics of prenatal yoga can make you a better yoga instructor overall because it will add a wide variety of pose modifications to your knowledge base. It will also allow you to teach students at various levels in one class. You will become more aware of the signs of discomfort and be able to offer each individual student advice that is best suited for their ability and experience level.
The most important thing is to encourage your prenatal students to listen to their own bodies and know when to stop. Encourage her to tell you what’s causing discomfort so that you can help her make adjustments. Teaching prenatal yoga requires extra compassion and care.
Teaching prenatal women yoga takes patience, specific knowledge, and an ability to ask questions. It doesn’t have to be difficult! But you do have to know a few things so that you’re comfortable, therefore allowing your prenatal students to be comfortable, too. | https://www.theyoganomads.com/teaching-prenatal-yoga-what-you-need-to-know/ |
Sort by:
Relevance
Date
291
results found
Neuroscience
eIF2α-mediated translational control regulates the persistence of cocaine-induced LTP in midbrain dopamine neurons
Andon N Placzek et al.
Building on previous work (Huang et al., 2016), we show that translational control by p-eIF2α is a defense mechanism that prevents persistent cocaine-induced synaptic synaptic potentiation underlying compulsive drug seeking.
Neuroscience
Spatiotemporal dynamics of multi-vesicular release is determined by heterogeneity of release sites within central synapses
Dario Maschi, Vitaly A Klyachko
Release site heterogeneity represents a previously unknown level of structural and functional organization within individual active zones in central synapses, which determines the spatiotemporal dynamics of multi-vesicular release.
Neuroscience
Synapse-specific opioid modulation of thalamo-cortico-striatal circuits
William T Birdsong et al.
By differentially modulating the two major excitatory inputs to the striatum, mu- and delta-opioid receptors regulate the balance between thalamic and cortical inputs to the striatum.
Biochemistry and Chemical Biology
Cell Biology
Regulating G protein-coupled receptors by topological inversion
Bray Denard et al.
Multiple biochemical assays show that the topology of CCR5 and possibly other GPCRs may be inverted by ceramide or other sphingolipids through the process of regulated alternative translocation.
Neuroscience
Bed nucleus of the stria terminalis regulates fear to unpredictable threat signals
Travis D Goode et al.
The bed nucleus of the stria terminalis (BNST) is required for the expression of defensive behavior to uncertain threats, a function that is central to pathological anxiety.
Neuroscience
Ventrolateral periaqueductal gray neurons prioritize threat probability over fear output
Kristina M Wright, Michael A McDannald
Single-unit activity in the ventrolateral periaqueductal gray, a brain region implicated in organizing fear output, is found to reflect threat probability, a more versatile threat signal.
Computational and Systems Biology
Neuroscience
Microsaccadic sampling of moving image information provides
Drosophila
hyperacute vision
Mikko Juusola et al.
New experiments and theory reveal how the ability to see image details depends upon photoreceptor function and eye movements, and how fruit flies (
Drosophila
) see spatial details beyond the optical limit of their compound eyes.
Neuroscience
Hippocampal neurogenesis enhancers promote forgetting of remote fear memory after hippocampal reactivation by retrieval
Rie Ishikawa et al.
Forgetting of remote fear memory is promoted by increased hippocampal neurogenesis only after hippocampal reactivation by long time memory retrieval.
Neuroscience
The sifting of visual information in the superior colliculus
Kyu Hyun Lee et al.
The superior colliculus reveals hallmarks of sophisticated visual computation, including selectivity, invariance, and stimulus-specific habituation to behaviorally relevant stimuli.
Neuroscience
Temporally specific engagement of distinct neuronal circuits regulating olfactory habituation in
Drosophila
Ourania Semelidou et al.
Habituation to brief olfactory stimulation is biphasic and mediated by distinct neuronal circuits where an initial latency phase is rapidly followed by stimulus devaluation signifying behavioral habituation in
Drosophila
.
Load more
Refine your results by: | https://elifesciences.org/search?for=desensitization&sort=relevance&order=ascending |
CROSS-REFERENCE TO RELATED APPLICATIONS
FIELD
BACKGROUND
DETAILED DESCRIPTION
This application claims priority to Chinese Patent Application No. 201710592247.0 filed on Jul. 19, 2017, the contents of which are incorporated by reference herein.
The subject matter herein generally relates to a prompting assembly for a toilet paper receptacle for prompting a user to replace the toilet paper.
Generally, when a toilet paper roll dispenses paper from a receptacle, a user cannot see how much toilet paper is left on the roll.
It will be appreciated that for simplicity and clarity of illustration, where appropriate, reference numerals have been repeated among the different figures to indicate corresponding or analogous elements. In addition, numerous specific details are set forth in order to provide a thorough understanding of the embodiments described herein. However, it will be understood by those of ordinary skill in the art that the embodiments described herein can be practiced without these specific details. In other instances, methods, procedures and components have not been described in detail so as not to obscure the related relevant feature being described. The drawings are not necessarily to scale and the proportions of certain parts may be exaggerated to better illustrate details and features. The description is not to be considered as limiting the scope of the embodiments described herein.
Several definitions that apply throughout this disclosure will now be presented.
The term “coupled” is defined as connected, whether directly or indirectly through intervening components, and is not necessarily limited to physical connections. The connection can be such that the objects are permanently connected or releasably connected.
FIG. 1
100
100
100
10
11
12
14
16
18
10
11
12
16
18
14
18
10
11
12
14
16
illustrates an embodiment of a prompting assembly . In at least one embodiment, the prompting assembly can be installed in a toilet paper receptacle for determining a usage status of a roll of toilet paper. The prompting assembly can include a communication unit , a storage , a sensor , a controller , a prompter , and a power unit . The communication unit , the storage , the sensor , the prompter , and the power unit are electrically coupled to the controller . The power unit supplies power to the communication unit , the storage , the sensor , the controller , and the prompter .
FIG. 1
FIG. 2
10
300
200
200
300
200
100
200
300
Referring to and , the communication unit is in communication with a user terminal through a control center . The control center can be a computer, a mobile phone, a gateway, a local server, or a cloud server, for example. The user terminal can be a mobile phone, a tablet computer, or any portable electronic device, for example. The control center is in communication with at least the prompting assembly . In other embodiments, the control center can also be in communication with a television, a refrigerator, a washing machine, light assemblies, or other home appliances to form a smart home system, and the smart home system can be controlled through the user terminal .
12
12
12
12
14
11
14
In at least one embodiment, the sensor is a gyroscope. The sensor can sense a quantity of rotations of a spindle of the toilet paper receptacle. As the toilet paper roll is spun to dispense toilet paper, the spindle rotates with the toilet paper roll. Thus, a quantity of rotations of the toilet paper roll is equal to the quantity of rotations sensed by the sensor . The sensor can obtain the quantity of rotations of the toilet paper roll from the quantity of rotations of the spindle, and send the quantity of rotations to the controller and the storage . The controller can compare a total number of rotations to a first preset value.
11
300
300
300
200
200
14
11
10
The storage can store a second preset value representing an initial number of rotations of the toilet paper roll. In at least one embodiment, a user can set the second preset value in the user terminal . In another embodiment, the user can use the user terminal to set the second preset value and/or the quantity of rotations according to a usage status of the toilet paper roll. In detail, the user terminal sends the second preset value and/or the quantity of rotations to the control center , and the control center sends the second preset value and/or the quantity of rotations to the controller and/or the storage through the communication unit .
14
12
14
10
16
300
14
14
14
10
200
200
300
200
300
10
300
14
10
300
300
10
14
11
The controller can calculate the total number of rotations of the toilet paper roll according to a total number of rotations of the spindle sensed by the sensor and compare the total number of rotations to the first preset value. The controller can control the communication unit and/or the prompter according to a result of comparison. When the user uses the user terminal to set the quantity of rotations according to actual use of the toilet paper roll, the controller can calculate the total number of rotations starting from the quantity of rotations set by the user. When the controller calculates that the total number of rotations is greater than the first preset value, the controller controls the communication unit to send a control command to the control center to control the control center to send a message to the user terminal . The first preset value is smaller than the second preset value. In at least one embodiment, the user can set the value of the first preset value. For example, the first preset value can be 90% of the second preset value. The message sent by the control center to the user terminal can at least include a warning that the toilet paper is not enough. In another embodiment, the communication unit can be in communication with the user terminal , the controller can control the communication unit to directly send the message to the user terminal , and the user terminal can directly send the second preset value and/or the quantity of rotations through the communication unit to the controller and/or the storage .
14
14
16
16
When the controller calculates that the total number of rotations is greater than the first preset value, the controller further can control the prompter to emit a signal to prompt the user to check the toilet paper roll. In at least one embodiment, the prompter is an LED, and the signal can be a light emitted by the LED.
18
100
The power unit can be a battery or a power plug that can plug into an external power source to provide power for the prompting assembly .
300
200
200
14
11
10
12
14
11
14
14
10
200
200
300
14
16
The user can use the user terminal to set and send the second preset value and/or the quantity of rotations according to actual usage of the toilet paper roll to the control center , and the control center can send the second preset value and/or the quantity of rotations to the controller and/or the storage through the communication unit . When the toilet paper is used, the sensor senses the quantity of rotations and sends the quantity of rotations to the controller and the storage . When the controller calculates that the total number of rotations is greater than the first preset value, the controller controls the communication unit to send the control command to the control center to control the control center to send the message to the user terminal . At the same time, the controller can control the prompter to emit the signal to prompt the user to check the toilet paper roll.
200
100
300
200
100
200
300
200
300
It should be understood that when the control center is in communication with a plurality of prompting assemblies and/or a plurality of smart home appliances as well as a plurality of user terminals , when the control center receives a control command from any of the prompting assemblies and/or any of the smart home appliances, the control center can be set to immediately send a message to the corresponding user terminal upon receiving a control command, or the control center can be set to periodically send messages to the corresponding user terminals according to the control commands.
100
100
In at least one embodiment, the prompting assembly can be received in a casing (not shown) to prevent water damage to the prompting assembly .
The embodiments shown and described above are only examples. Even though numerous characteristics and advantages of the present technology have been set forth in the foregoing description, together with details of the structure and function of the present disclosure, the disclosure is illustrative only, and changes may be made in the detail, including in matters of shape, size and arrangement of the parts within the principles of the present disclosure up to, and including, the full extent established by the broad general meaning of the terms used in the claims.
BRIEF DESCRIPTION OF THE DRAWINGS
Implementations of the present disclosure will now be described, by way of example only, with reference to the attached figures.
FIG. 1
is a diagram of components of an exemplary embodiment of a prompting assembly.
FIG. 2
FIG. 1
is a diagram of components of an exemplary embodiment of a smart home system using the prompting assembly of . | |
Publication Ethics promotes and encourages developing high quality scientific contents during publication process. PENSEE Publications endorses COPE and ICMJE guidelines to handle the submitted manuscript in case suspected for any duplication or substantial overlap.
All article published under PENSEE Publications follows standard Editorial Process to maintain quality scientific contents in all PENSEE journals. Editorial process involves strict measures to prevent plagiarism, redundancy of manuscripts, multiple submissions, fabrication and falsification of data.
Plagiarism
The author should develop his own contents while preparing any manuscript towards publication and should avoid plagiarizing the contents of other author’s paper without proper citation. If Manuscripts that are found to have been plagiarized from a manuscript by other authors, whether published or unpublished, will be considered as plagiarism.
Duplicate Submission
Authors should not submit the same manuscript, simultaneously to more than one journal to consider for peer review process. Manuscripts that are found to have been published elsewhere or to be under review elsewhere will be considered duplicate submission.
Duplicate Publication
Duplicate publication is the publication of a paper that shares the same hypotheses, data, discussion, and conclusions substantially with one already published, without clear, visible reference to the previous publication.
Citation Manipulation:
Citation manipulation is including excessive citations, in the submitted manuscript, that do not contribute to the scholarly content of the article and have been included solely for the purpose of increasing citations to a given author’s work, or to articles published in a particular journal.
Note: If any PENSEE journals article found violating the above mentioned policies during publication process, the following rules will be applicable to the author(s).
Rejection of the infringing manuscript : | http://penseeresearch.com/index.php/publication-ethics/ |
The aim of this study is to show complementary usage of logistic and correspondence analysis in a research subject to self-healing methodologies. Firstly, the number of the variables is reduced by logistic regression according to relationship between dependent and independent variables and then research carries on searching variables. The relationship among the behaviours of individuals and their demographic characteristics is modelled by logistic regression and shown graphically by correspondence analysis. In application, first of all, the effect of age, sex, marital status, education level, occupation and income level and present health condition, on appreciating self-health, is explained by a model. As a result of that model, it can be said that the effect of age, occupation and present health condition is reasonable. After analysing that model, the relationship between categorical variables (age, sex, occupation, preferred precautions, and worth of personal health) is shown graphically by multiple correspondence analysis.
Keywords
Logistic Regression, Correspondence Analysis, Self Healing
Share and Cite:
Conflicts of Interest
The authors declare no conflicts of interest.
References
Copyright © 2022 by authors and Scientific Research Publishing Inc.
This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License. | https://www.scirp.org/journal/paperinformation.aspx?paperid=52717 |
Are the Nexus-6 replicants in the movie Blade Runner really human? Why or why not?
Arguments for the humanity of replicants include their appearance, behaviors, ability to feel emotions and pain, instinct toward self-preservation, and acute sense of self-awareness. Arguments against their humanity include their origins, superhuman abilities, abnormally short life span, and questionable souls. While key human traits exist in replicants, key differentiators exist that set all humans and all replicants apart.
- print Print
- list Cite
Expert Answers
calendarEducator since 2017
write163 answers
starTop subjects are Literature, Business, and History
Arguments could be made on both sides as to whether or not the Nexus-6 replicants in Blade Runner were human. It largely depends on how one defines a human being. In fact, the entire thematic question behind Blade Runner is "What does it mean to be human?" In order to even posit a theory, first, it's essential to compare the pro and con arguments about what constitutes humanity.
Cons:
- Nexus-6 replicants were programmed to have a natural life span of no more than four years in order to prevent rebellion and the development of empathic abilities, while humans have far longer natural life spans.
- Replicants are endowed with superhuman strength, smarts, speed, dexterity, and agility, making them, by definition, something other than human.
- The question of whether replicants have souls —often a litmus test for humanity—is ambiguous at best and even plagues the thoughts of the replicants themselves.
- Human beings are often thought to be created by God, not by other human beings.
Pros:
- Replicants look, breathe, and act like humans. Moreover, they can reason and understand logic.
- Replicants feel complex emotions and pain.
- Replicants have a fear of dying and death, just as humans do, and will fight for their own survival.
- The fact that replicants can even ponder their own existence, humanity, and soulfulness is a sign of humanity: the ability to achieve self-awareness and self-consciousness (a la Descarte's "I think, therefore I am").
It's important to note that replicants are so physiologically similar to humans that only a Voight-Kampff test that measures nuanced nonverbal responses to emotionally charged questions can detect the difference between them.
However, therein lies the rub: that such a crucial test based on empathic and emotional response can identify a key difference between all replicants and all humans means that they are not the same. To wit, if one small part of a larger overall statement is false, then the entire statement is false. In this case, if a replicant has all the same human-defining attributes a human has except for one, then it is not a human but something altogether different.
Related Questions
- What are the scientific themes and ideas are explored in the movie Blade Runner?
- 1 Educator Answer
- What techniques are used in the movie Blade Runner the Director's Cut?
- 1 Educator Answer
- How can we examine the movie Blade Runner in the view of the postmodernism? | https://www.enotes.com/homework-help/are-the-nexus-6-replicants-in-the-movie-blade-2353162 |
TORONTO, Aug. 22, 2016 /CNW/ -Redknee Solutions Inc. ("Redknee" or the "Company") (TSX: RKN), a leading provider of real-time monetization and subscriber management software, today announced it has formed a special committee of independent members of the board of directors of the Company to consider various strategic and financing alternatives potentially available to the Company to enhance shareholder value, including a possible sale of the Company. As part of this process, the Company has engaged TD Securities Inc. as financial advisor.
While the Company has initiated this process, there is no certainty that any transaction or alternative will be undertaken or pursued. The Company has not set a definitive schedule to complete its evaluation and no decision on any particular transaction or alternative has been reached at this time. The Company does not intend to disclose ongoing developments with respect to this process, but in accordance with its continuous disclosure obligations, will disclose material developments if, as and when they occur.
Certain statements in this document may constitute "forward-looking" statements regarding Redknee and its business, which may include, but are not limited to any strategic alternatives potentially available to the Company. Forward-looking statements are provided for the purpose of providing information about management's current expectations and plans relating to the future. Persons reading this news release are cautioned that such information may not be appropriate for other purposes.
Forward-looking statements involve significant risks and uncertainties, should not be read as guarantees of future events or results, and will not necessarily be accurate indications of whether or not such events or results will be achieved. Actual events or results could differ materially from those contemplated in forward-looking statements as a result of risks and uncertainties relating to the ability to identify any strategic or financing alternatives that could increase shareholder value, including: the risk that the strategic review could result in additional demands on Redknee's resources, disruption of its ongoing business and diversion of management's attention from other business concerns; Redknee's inability to complete a transaction; disruptions resulting from any transaction, making it more difficult to maintain business relationships; and other factors discussed under the "Risk Factors" section of Redknee's most recently filed AIF which is available on SEDAR at www.sedar.com and on Redknee's web-site at www.redknee.com. Other unknown or unpredictable factors or underlying assumptions subsequently proving to be incorrect could cause actual events or results to differ materially from those in the forward-looking statements. Redknee does not undertake or accept any obligation or undertaking to release publicly any updates or revisions to any forward-looking statements to reflect any change in its expectations or any change in events, conditions or circumstances on which any such statement is based, except as required by law.
For further information: Redknee Solutions: David Charron, Chief Financial Officer, [email protected], +1 (905) 625-2943; Investor Relations: Lawrence Chamberlain, NATIONAL | Equicom, T: (416) 848-1457, [email protected]. | https://www.newswire.ca/news-releases/redknee-solutions-announces-formation-of-special-committee-to-review-strategic-alternatives-590890681.html?tc=eml_mycnw |
The federal National
Historic Preservation Act has served as a guide for many state, local,
and tribal historic preservation laws and ordinances. State, local,
and tribal governments have also developed policies that address archeological
resources located on their lands. The scope of non-federal laws and
policies tend to mirror federal historic preservation and archeological
resources laws and regulations (i.e., National Historical Preservation
Act; Archaeological Resources Protection Act; Secretary of the Interior's
Standards and Guidelines for Archeology and Historic Preservation).
However, non-federal entities, especially in the last decade, tend to
write more detail into their historic preservation and archeological
resource protection laws and policies than appears in a corresponding
federal law or policy.
In 1991, only about
a third of all U.S. states had issued laws, regulations, or policies
that addressed the management of archeological collections (Carnett
1991). By 1997, laws in 35 states mentioned curatorial issues and at
least 20 states had curation policies and guidelines. Most of these
curation policies closely follow 36 CFR 79. By 1999, 37 states had laws
that addressed archeological curation (State Historic Preservation Database;
see this section's Links page). These findings
suggest that states are increasingly concerned with the long-term management
of and access to state-owned collections.
A Recent Survey
Policies and guidelines
involving the collection of material remains during field survey, testing,
and mitigation (or data recovery) directly impact the nature of the
resulting collection, which then must be prepared and managed for the
long term. In 1998, the Army Corps of Engineers Mandatory Center of
Expertise for the Curation and Management of Archaeological Collections
(MCX-CMAC) contracted staff from the Illinois State Museum Society to
conduct a non-random survey on existing policies concerning field collecting,
collections preparation for curation (i.e., cataloging, labeling, and
packing), and long-term curation and use (Wiant and Loveless 1999).
Six groups were surveyed: State Historic Preservation Officers, State
Archeologists who are not associated with the SHPO, Tribal Historic
Preservation Officers, State Department of Transportation, University-based
Archeologists, and Archeological Consultants.
The survey results
on the policies of 53 State Historic Preservation Officers are revealing.
First, approximately one third of the SHPOs were not involved in field
work so did not have detailed policies on either field collecting or
management of the resulting collection. However, 83% had a field collecting
policy of which 91% were written. Four of the SHPOs with written field
collecting policies had different procedures for collecting prehistoric
versus historic material remains. On a related note, eight State Archeologists
were surveyed of which four had a written field collecting policy (two
developed their own; two used the policy of another agency). Of those
four, three had different field collecting procedures for prehistoric
versus historic material remains.
The SHPO policies
for collections preparation and long-term curation are also revealing.
First, only 40% of the SHPOs cataloged artifacts and 36% cataloged associated
records. Three quarters of those that cataloged artifacts had written
procedures, whereas just over 50% had written procedures for cataloging
documentation. Second, 42% of the SHPOs were involved in the curation
of objects and 43% in long-term curation of associated records, mostly
on a long-term basis. Only 59% of these, however, had written long-term
curation policies or, at a minimum, a mission statement on curation.
The eight State
Archeologists surveyed that are not part of a State Historic Preservation
Office were located in a museum or university. Five of the eight surveyed
cataloged both artifacts and documentation and all had written policies
or procedures for these activities. Interestingly, six of the eight
SAs had an electronic catalog of artifacts and documents. Seven of the
eight SAs curated artifacts and documents of which only one curated
for the short term. The one SA that did not curate was hampered because
the state did not have a central repository. Five of the seven that
curated had a written policy on the related activities. Unfortunately,
the survey report does not discuss whether the policies of each SA filled
gaps in the SHPO policies or were duplicate or conflicting policies.
Wiant and Loveless
(1999) also surveyed fourteen THPOs concerning specific policies on
field collecting, collections preparation, and long-term curation. Whereas
71% had a field collecting policy (one THPO tailored the policy to the
project), about half of these were written in 1998. More importantly,
50% of the THPOs strictly forbade collecting on tribal lands unless
artifacts might be destroyed. When collecting did occur, 50% of the
THPOs cataloged both artifacts and documents. Of those, 57% had written
procedures for cataloging. Four or 29% of the THPOs curated artifacts
and documents of which one did so on a project-by-project basis. Two
of the four had a written collections management policy.
The above discussion
is merely an overview of parts of the MCX-CMAC survey conducted by the
Illinois State Museum Society. There is considerably more useful information
in the document, some of which is presented in the next sub-section.
| |
Islamabad, October 15, 2012 (PPI-OT): Speakers at the Global Hand Washing Day (GHWD) 2012 event said that promoting safe sanitation and hygiene practices, particularly among children, is vital for overall health of the people. For, poor water, sanitation and hygiene (WASH) leads a plethora of heath diseases among people of all ages.
“This is particularly critical for the thousands of people affected by the current monsoon flood emergency, many of whom are children at heighted risk of contracting diseases like diarrhoea, pneumonia and other diseases,” said Jawed Ali Khan, director-general (Environment) at the Ministry of Climate Change.
Addressing participants of the marathon event held here at the Islamabad Model High School in G-8/sector and organised by the Ministry of Climate Change in collaboration with Unicef, Mobilink and Pakistan Institute for Environment Development Action Research (PIEDAR), he said that GHWD marked every year on October 15 is reminder of the fact that the WASH sector is important for sustainable socio-economic development.
The GHWD is observed this year across the world including Pakistan under the theme ‘Clean hands, Save Lives’. It echo and reinforces the call for improved hygiene practices. The guiding vision of GHWD is to build a broad-based culture of hand washing with water and soap. While most people wash their hands, very few wash their hands with soap at critical times, i.e., after using toilets, while cleaning a child and before handing food.
Jawed Ali Khan told the participants that the ministry of climate change in accordance with its national sanitation policy and national behavioural change communication strategy intends to promote hygiene practices in Pakistan, mainly in rural areas which are reeling under most of the [water-borne] disease burden.
Head of Pakistan Institute for Environment Development action Research (PIEDAR) Ayub Qutub said that children are, he maintained, highly vulnerable to the diseases caused by a lack of effective sanitation and poor hygiene. And, more than 5,000 children under the age of five die every day in the world because of diarrheal diseases, caused in part by unsafe water, lack of access to basic sanitation facilities and poor hygiene.
“However, by washing hands with soap families and communities can help cut the child morbidity rates from diarrheal diseases by almost 50 per cent”, he said.
Dr. Simone Klawitter, chief of Water, Sanitation and Hygiene (WASH) at the UNICEF in Pakistan, said that in Pakistan an estimated 10.8 per cent (116,103) children under five years die of diarrhoea yearly, translating to nearly 8 children deaths every one hour.
Quoting from a recent study, she said that there has been significant reduction in pneumonia related diseases by 50 per cent among children below five years.
Hygiene is particularly vital in an emergency such as a flood, but finding clean, safe running water can sometimes be difficult. Hand washing with soap and water after contact with faeces is one of t6he most important practices to promote as lifesaving intervention.
“Launching awareness raising programmes at, among others, community, school and mosque levels by engaging media can go a long way in helping promote culture of proper hand washing”, he emphasised.
Omar Manzur, Head of Corporate Communications at the Mobilink, said that corporate sector is playing its due part in socioeconomic uplift of the country and Mobilink is no way behind in supporting events like today’s. “Mobilink has remained actively engaged in helping flood, earth-quake-hit people and funding different local and international NGOs in Pakistan”, he said.
The first GWHD was celebrated on 15th October 2008 when the United Nations General Assembly designated the year 2008 as the International Year of Sanitation. The theme of hand washing with soap is focused on message to schoolchildren wash their hands with soap regularly.
Later, demonstrations of the proper hand washing were given by the schoolchildren and tables were performed by students of different schools through which they highlighted messages of practicing safe sanitation and hygiene.
For more information, Contact: | https://newsmakers.pk/promoting-safe-sanitation-particularly-among-children-is-vital-for-health-of-people-speakers/ |
The digital age is also a surveillance age. Today, computerized systems protect and manage our everyday life; the increasing number of surveillance cameras in public places, the computerized loyalty systems of the retail sector, geo-localized smart–phone applications, or smart traffic and navigation systems. Surveillance is nothing fundamentally new, and yet more and more questions are being asked: • Who monitors whom, and how and why? • How do surveillance techniques affect socio-spatial practices and relationships? • How do they shape the fabrics of our cities, our mobilities, the spaces of the everyday? • And what are the implications in terms of border control and the exercise of political power? Surveillance and Space responds to these modern questions by exploring the complex and varied interactions between ...
Chapter 9: Policy Mobilities and Exemplification in Surveillance Matters
Policy Mobilities and Exemplification in Surveillance Matters
Following on from the previous discussion, this chapter explores the interactions of scale that underpin contemporary surveillance projects. There are two interrelated lines of enquiry to highlight. Firstly, the chapter investigates the transnational circulation, sharing and appropriation of public–private surveillance knowledge and practices, with a view to understanding the ways in which these fuse together in particular sites and settings. This focus portrays local stakeholders in surveillance matters as being increasingly exposed to globalized networks of expertise and collaboration. Drawing upon the field of policy-mobility studies, it also points at the exemplification and imitation of specific surveillance solutions, which travel from place to place, thus producing increasingly standardized spaces of surveillance. ...
- Loading... | https://sk.sagepub.com/books/surveillance-and-space/i378.xml |
Blackhawk Archers of La Crosse Wisconsin, Inc embraces and promotes the sport of archery in all its forms; whether in competition or field and without bias toward the type of archery equipment used. While i pursuit of this goal we hold essential values of fellowship, family, and sportsmanship of all. We will conduct our business in a fair and ethical manner and will co-operate with any government, civic and/or archery associations with which the club may become affiliated.
Click here to register for membership!
Click here to register for the Field Shoot on June 23rd!
Click here to register for the July 14th 3D Shoot! | https://www.blackhawkarchers.com/ |
The rising phenomenon of hate speech in social media is alarming. Many politicians and citizens disrupt civil discourse with dividing polemics. It is rare to hear calm and respectful discussions about social cohesion in the public space. News reports often focus on exclusionary religious opinions. But religious actors have the potential to contribute positively to the public media space.
During these times of evolving technologies and methods of communication, churches are called to be active voices for justice, peace and hope, especially among the most marginalized communities. What are the antidotes to the current hostile environment in the media space? Religious advocates for dialogue, reconciliation and hope can offer a constructive way forward.
Join speakers from Europe, North America, and Latin America as they reflect on ways to address hate speech and offer hope speech in its place. Hear from a variety of perspectives about lessons learned during this time of pandemic and polarization.
Jocelyn Fuller, Senior director of Strategic Communications, Evangelical Lutheran Church in America
Event languages: English, with simultaneous translation into Spanish, and Portuguese
No junk. Just the latest LWF news. | https://www.lutheranworld.org/content/hope-speech-not-hate-speech |
Sixteen artists stated that should they win Festival di Sanremo, they would compete at the Eurovision Song Contest 2020.
It has been confirmed that sixteen of the twenty four artists competing in the Campioni category of Festival di Sanremo, have agreed to participate in Eurovision. The disclosure comes as part of the rules of Festival di Sanremo to ensure that RAI is aware in advance of artists views on the competition.
The artists competing this year are:
Achille Lauro – Me ne frego (I don’t care)
Alberto Urso – Il sole ad est (The sun to the east)
Anastasio – Rosso di rabbia (Red with anger)
Bugo e Morgan – Sincero (Sincere)
Diodato – Fai rumore (Make noise)
Elettra Lamborghini – Musica e il resto scompare (Music and the rest disappears)
Elodie – Andromeda
Enrico Nigiotti – Baciami adesso (Kiss me now)
Francesco Gabbani – Viceversa (Vice versa)
Giordana Angi – Come mia madre (Like my mother)
Irene Grandi – Finalmente io (Finally I)
Junior Cally – No grazie (No thanks)
Le Vibrazioni – Dov’è (Where is it)
Levante – Tiki Bom Bom
Marco Masini – Il confronto (The comparison)
Michele Zarrillo – Nell’estasi o nel fango (In ecstasy or mud)
Paolo Jannacci – Voglio parlarti adesso (I want to talk to you now)
Piero Pelù – Gigante (Giant)
Pinguini Tattici Nucleari – Ringo Starr
Rancore – Eden
Raphael Gualazzi – Carioca
Riki – Lo sappiamo entrambi (We both know it)
Rita Pavone – Niente (Resilienza 74) (Nothing (Resilience 74))
Tosca – Ho amato tutto (I loved everything)
The rules of the competition state that all participants and their record companies must submit a form to RAI stating whether the artist will take part in the Eurovision Song Contest. All parties must inform RAI by the first night of the contest whether they wish to take part in Eurovision.
The rule means that the 2020 edition will not see a repeat of the winning artist contemplating whether they want to go to Eurovision after Sanremo has taken place. Mahmood took a number of days after winning the contest to decide whether he wished to represent Italy in Tel Aviv.
Source: Eurofestival Italia
Italy at the Eurovision Song Contest Italy debuted in the Eurovision Song Contest in 1956 and has participated a total of 42 times to date. Italy returned to the Eurovision Song Contest in 2011 having last participated in the contest in 1997, the country has withdrawn from the contest on a number of occasions in the past. Italy has won the contest twice, the first time being in 1964 and the latest being in 1990. Italy’s hosting of the contest in 1991 has been remembered as one of the most chaotic contests to date. Since their return in 2011 Italy has finished in the top 10 on seven occasions.
| |
Trump to enforce 'major' additional sanctions on Iran from Monday
As part of 'maximum pressure' campaign, the US has reinstated sanctions against Iran after exiting from the Iran nuclear deal last year.
US President Donald Trump on Saturday announced that 'major additional sanctions' will be imposed on Iran this Monday to stop the country from owning nuclear weapons. (Photo: File)
Washington: US President Donald Trump on Saturday announced that "major additional sanctions" will be imposed on Iran this Monday to stop the country from owning nuclear weapons.
While Trump made no mention of it, his latest decision comes at a time when the Iran-US relationship has further deteriorated after the Middle Eastern nation shot down a US military drone in the Gulf of Oman on Thursday.
"Iran cannot have nuclear weapons! Under the terrible Obama plan, they would have been on their way to nuclear in a short number of years, and existing verification is not acceptable. We are putting major additional sanctions on Iran on Monday. I look forward to the day that sanctions come off Iran, and they become a productive and prosperous nation again - The sooner the better!" he tweeted.
As part of a "maximum pressure" campaign, the United States has reinstated sanctions against Iran after exiting from the Iran nuclear deal last year.
The international community has called for restraint to be shown by the two nations following Thursday's incident. While Tehran claims that the "intruding American spy drone", RQ-4 Global Hawk, was downed after it violated Iranian airspace over the southern coastal province of Hormozgan, Washington has labelled it as an "unprovoked attack." The US claims that the drone was flying over international waters when it was attacked.
Trump has since claimed that he stopped retaliatory action against Iran, just 10 minutes before the strike on Thursday night.
Iran, on its part, has left no stone unturned to prove that the US drone was in its territorial waters to back its action.
"At 00:14 US drone took off from UAE in stealth mode & violated Iranian airspace. It was targeted at 04:05 at the coordinates (25deg59'43"N 57deg02'25"E) near Kouh-e Mobarak. We've retrieved sections of the US military drone in OUR territorial waters where it was shot down," the Iranian Foreign Minister Javad Zarif tweeted.
At 00:14 US drone took off from UAE in stealth mode & violated Iranian airspace. It was targeted at 04:05 at the coordinates (25°59'43"N 57°02'25"E) near Kouh-e Mobarak. | |
YOGA FOR PRACTITIONERS SEEKING TO BALANCE THEIR ACTIVE PRACTICE
Yin yoga is a great complement to any form of active (yang) yoga. Yin yoga works with deeper tissues of our ligaments, joints, fascia and bones. Typical class includes 10-12 passively held poses, these are usually floor poses. Yin poses have their active version which students know from hatha or other form of active yoga. The poses are held for 2-7 minutes. Being in the pose brings bitter sensation into body. Previous active yoga practice is important as the students must be able to understand the difference between discomfort caused by long hold of the pose and a possible pain which signals that the pose should not be held for longer or needs to be modified. Yin yoga works also with energetic bodies (meridians) and improves activity and well-being of internal organs.
The classes take place in Caveland in Karterados. If the weather permits we practice on outdoor terrace overlooking the local village and Aegean sea.
All the props and mats are provided.
BENEFITS
- Prevents degeneration of bones and loss of mobility in joints.
- Helps to maintain structural integrity of the spine.
- Detoxifies the body and hydrates joints.
- Balances elements and energies within the body.
- Improves function of internal organs by improving energy flows.
If you are interested to participate, get in touch with me over email or phone and book your space at the class.
Private classes and retreats available, too. | https://www.yoga-santorini.com/yin-yoga/ |
Why eDiscovery Software Fails to Uncover Material Information During Legal Data Reviews
Venio Systems launched its monthly #VenioVision webinar series on Tuesday, February 23, with “Why EDiscovery Software Fails To Uncover Material Information During Legal Data Reviews.” In the webinar, Abbye Needham, eDiscovery Services Manager, Bit-x-Bit, and Kat Crone, Director of Project Management, LSP Data Solutions, LLC, discussed the current pain points in review platforms and how these result in them failing review teams.
As Needham and Crone see it, the problems of review platforms fall into four main categories:
- Time Wasted in eDiscovery Reviews
- Higher eDiscovery Costs
- Increased Litigation Risks
- eDiscovery Review Quality Issues
Keep reading to learn the specifics on the eDiscovery software features that Needham and Crone identify as most problematic and some solutions to them. To see those solutions, watch the webinar video.
Time Wasted in eDiscovery Reviews
One of the main reasons that review platforms waste the time of the attorneys and project managers (PMs) using them is that they require redoing prior searches to get the right results. In most platforms, there’s not an easy way to identify where you currently are in a search or how many searches you’ve run, and there’s no easy way to look back on the searches you have completed. Instead, users are forced to constantly go back and tweak their search protocols, manually refining them until they get the necessary results. What the search functions in review need to be able to do is allow users to hone in on what went wrong with the initial search to determine why the results were inadequate for the task at hand.
In addition, many of the search tools require complicated syntax, and users have to spend valuable time manipulating that syntax to get the correct results. Even the user-interface can be too complicated for less technical users, with too many options and nuanced requirements that must be navigated and sifted through, just to achieve something close to the desired result.
What’s needed, Crone said, is a review process that is simpler and more consistent, with linear reviews, less complicated filtering, and intuitive search tools. PMs might require (and can navigate) more complex search parameters, but other attorneys on the case shouldn’t have to have a knowledge of what’s happening on the back end to perform an accurate search on a review platform.
Among the solutions Crone suggested:
- Search History Log: A search history log would be a great resource allowing users to see what searches have been run, what the results were, who created the search, etc. Using slide-out panels to determine parameters and focus areas would save valuable screen real estate. Users could simply access the Search History or Saved Searches, saving them the trouble of attempting to come up with the proper terms on their own, and such a log would offer a high-level view of the entire search process, preventing needless repeat searches to obtain the desired results.
- Dynamic Folders: An option to create auto-populated focus groups of documents based on certain search criteria (such as tags or terms) would keep the documents organized and allow users to easily see which searches are connected to which documents. Having Dynamic Folders, documents are continuously gathered throughout the review process and can be effectively used to share access with experts, witnesses, or higher level review teams over time.
- Intuitive Search Bars: Executing a search can be overwhelming for users, with too many tools available to know which ones will best complete the task. Having a simple, clear, intuitive search bar for quick searches that is the same across the entire eDiscovery platform would eliminate the steep learning curve that often comes with searching in review. For example, that easily allows users to change the scope of the search is a huge time saver.
- Quick Access to More Complex Options: PMs and higher level review team members will need access to more complex options. Having a clear, easy-to-understand menu button to access more advanced options simplifies the entire process for review attorneys, while providing the tools needed by team leads or PMs.
- Easy, Robust Data Filtering: Everyone would benefit from a clean, intuitive system where items only appear when they’re needed, where users could run an initial search, then refine that search as needed with a series of convenient, easy-to-understand pull-down filters that clearly show the number of hits. Such a system would save users the trouble of having to generate a complicated search for specifics, allowing them to refine as needed until the desired results were generated.
- Query Builder: What’s ultimately needed is a graphical interface for complex searching, one that is very functional and intuitive. Such an interface would include a series of simple categories of searches the user could choose from to build complex searches, along with search terms that intuitively offer options the user might not have considered to catch various word forms, synonyms, and misspellings. Again, drop-down lists of things like fields, custodians, and tags would make the search process easier and more streamlined, reducing the number of irrelevant hits.
Problems and solutions will vary depending on the user and their specific role and needs.
Higher eDiscovery Costs
Crone continued to describe how the time wasted by inadequate review platforms drives up costs. This is often the result of unintuitive designs that tend to:
- Be overly (and needlessly) complex
- Offer an overwhelming variety of choices
- Feature inflexible layouts and setup
- Increase the amount of training and support required
These unintuitive designs force users to waste valuable (and costly) time in finding the documents and fields that contain information relevant to the specific review or case type, which often requires additional training and/or hand-holding by PMs to navigate, which takes PMs off of higher level tasks and adds to the cost of review. What’s more, working in an environment like this that is complex and not user-friendly increases stress, all of which adds to the wasted time and increases costs.
What’s needed is an eDiscovery platform that allows PMs and users to develop their own customized environments that fit their needs for specific levels of users, types of cases, and the tasks being done.Such environments reduce costs because they allow users to see exactly what they need at any given point, perform reviews most efficiently, and not waste time in environments with redundant and/or irrelevant information and interfaces. As Crone said, nothing is worse than entering a platform only to realize that you’re tied to a layout that doesn’t fit your goals and needs.
Also needed are tools that perform specific review tasks. One example is a transcript viewer, with the ability to view transcripts within the eDiscovery software (and not as another add-on or external third-party application). In this example, a word wheel shows all instances of the desired word or phrase with references to specific page and line locations. The user can hover to either see the location or read a snippet of the text in which the word appears, or click to navigate to that location within the file. It’s another way to leverage all the case or investigation data that your organization has spent time and money collecting and ingesting into the eDiscovery software you’ve invested in.
Increased Litigation Risks
As Needham explained, if you don’t have the appropriate tool for the task you’re trying to perform, you run the risk of not finding the right documents. That becomes especially risky when you’re dealing with files containing personal identifiable information (PII), protected health information (PHI) or other confidential information, or if you’re reviewing financial documents with private data that can often be difficult to redact. This can lead to PII or business secrets being inadvertently shared Client embarrassment, and, eventually loss in business and injury to your company’s reputation can be devastating to recover from.
One solution to the problem is the ability to perform native Excel redactions, where the user is able to go into Excel and redact information from the native file itself within the eDiscovery platform. Excel files can get so large and complex that it’s almost impossible to see what one entire page looks like in a single view, which means robust Excel documents can take hours, days, or longer to redact. Further, creating those huge image files impacts the cost for storage and time for production as well. Having a built-in tool that supports native Excel redaction not only saves time, it significantly reduces risk when dealing with Excel documents — no longer will you run the risk of missing something important that was tucked away in a hidden tab, a hidden column, or a pile of jumbled numbers and figures. With native redaction built into the platform, critical information, you, and your clients are protected.
The ability to locate PII or PHI easily and effectively within a document also reduces risk. In this example, searches can be customized with the user’s own regular expressions (or patterns) and search templates using common or customized items can be built and saved, which saves time, increases productivity, and reduces risk. Also, the ability to not only locate PII or PHI, but to also automatically redact that information, adds to the level of security. And again, having this feature as part of a single tool and not as an add-on is what’s really needed. As Needham asked, “Can’t we just get a single tool that does everything we need? We don’t want to have to worry about, license, and manage other tools or add-ons.” Add-ons, she explained, increase risk because the data in question must be transferred from one tool to another, which can potentially reduce data parity and also takes extra time.
eDiscovery Review Quality Issues
Needham wrapped up by discussing quality issues that arise during reviews. If your eDiscovery platform isn’t performing as you need it to during reviews, quality can be impacted in several ways:
- Less accurate reviews: During review, it’s important that reviewers know how they are propagating the coding and how the elements interact with each other, so that documents are not coded incorrectly. Being able to clearly show this and giving reviewers clear options for propagation or copying coding is a must..
- Missing important information: When performing review tasks, it’s vital to have advanced (and easy-to-use) options, so reviewers don’t miss any important information.
- Inefficient use of resources: PMs and litigation teams also need to know how the documents are being coded by reviewers and that they are being accurately coded throughout the review process, so your team can avoid having to do excessive quality control or sampling on the back end to ensure a quality end product.
- Decreased defensibility: If your review platform doesn’t allow for correct redaction and financial data or PII is accidentally exposed, that becomes a huge issue for you, your company, and its clients.
- Worse strategy outcomes: If items are not identified correctly during review, then the litigation team will not have a clear picture of the evidence in order to develop the best strategies for handling the case and stories that need to be told at trial. This can be a very time-consuming and potentially costly misstep.
Here are a few solutions Needham recommends that would address the quality issues resulting from inadequate eDiscovery review platforms:
Self QC by reviewers: Reviewer accuracy is important. When working inside batches, it can be difficult to remember coding decisions already made, or something later in a batch may affect prior coding decisions. Being able to re-assign tags and having the option to go back-and-forth between documents improves quality and gives reviewers a better perspective over what they’re working on – not to mention less oversight and rework needed by PMs.
Consistency in searches: As mentioned previously, this would help limit the amount of time second-tier reviewers and PMs have to spend going into search results, cleaning up coding, etc. and also ensure greater quality results.
Easy sampling of content: It’s advantageous to have a way to sample everything that’s coded both early and often in the review process, which ensures that reviewers are all on track. When the process moves on to production, you’ll know it’s a quality production and that a quality review has been done. Catching issues early in the process, when it’s still easy to fix them, saves a great deal of time and increases quality.
What are the next steps?
Both Crone and Needham said eDiscovery practitioners leading review teams must think outside the box, demanding new tools that suit their specific needs and envisioning new uses for existing eDiscovery tools to increase their value to the organizations. For example, confirming forensic collection completeness and handling internal investigations are just two additional use cases mentioned for when you have the right eDiscovery platform. It’s important not to settle for outdated tool sets or what vendors are offering, but to demand that companies providing review platforms and eDiscoverysoftware deliver the necessary tools, such as those listed above, in a single user-friendly package, and not as add-ons or integrations.
Again, if you’d like to see a recording of the webinar where Crone and Needman discussed these points regarding eDiscovery review, click here.
Upcoming webinar
On March 16th, at 1 PM EST, Venio Systems will present a webinar spotlighting a major new eDiscovery product announcement. Venio continues to innovate and improve to help you modernize and optimize your eDiscovery workflows and strategies, and now we’re launching a major milestone in our journey to transform the way your teams handle eDiscovery and reduce the time and money spent on eDiscovery tasks. Register for our webinar and be among the first to find out. Click here. | https://www.veniosystems.com/why-ediscovery-software-fails-to-uncover-material-information-during-legal-data-reviews/ |
日本語
English
Sign up
Home
Researcher Search
Community Search
ITOYAMA Hiroshi
My portal
Neighbors
SAKAI Norisuke
2016/05
, updated
KUGO TAICHI
01/10
, updated
OHTA Nobuyoshi
01/01
, updated
Kazunobu Maruyoshi
05/21
, updated
NAKATSU Toshio
12/10
, updated
Takeshi Oota
09/27
, updated
more..
ITOYAMA Hiroshi
Last updated: Dec 23, 2018 at 17:26
Name
ITOYAMA Hiroshi
Affiliation
Osaka City University
Section
Graduate School of Science, Mathematics and Physics Course
Degree
Doctor of Philosophy, (BLANK)
Research Interests
theory of elementary particles(8)
,
unified theony of stringr(1)
,
integnable quantum field theony(1)
Research Areas
Physics /
Particle/Nuclear/Cosmic ray/Astro physics
/
Academic & Professional Experience
Plain Text
1985
-
1988
Research Associate, Fermi National Accelerator Laboratory
1988
-
1992
Research Associate, Institute for Theoretical Physics, SONY at Stony Brook
1992
-
2001
Associate Professor, Graduate School of Science, Osaka U, Osaka, JAPAN'
Education
Plain Text
-
1985
Physics, Graduate School of Arts and Sciences, Columbia University
-
1979
Faculty of Science, The University of Tokyo
Published Papers
Plain Text
1
2
3
4
>
From Kronecker to tableau pseudo-characters in tensor models
H. Itoyama, A. Mironov, A. Morozov
Aug 2018
We present a brief summary of the recent discovery of direct tensorial
analogue of characters. We distinguish three degrees of generalization: (1)
-number Kronecker characters made with the help of symmetric group
characters and inheriting most...
Discrete Painleve system and the double scaling limit of the matrix model for irregular conformal block and gauge theory
Hiroshi Itoyama, Takeshi Oota, Katsuya Yano
May 2018
We study the partition function of the matrix model of finite size that
realizes the irregular conformal block for the case of the
supersymmetric
gauge theory with
. This model has been obtained
in [arXiv:1008.1861 [he...
Cut and join operator ring in Aristotelian tensor model
H. Itoyama, A. Mironov, A. Morozov
Nucl.Phys. B932 (2018) 52-118 Oct 2017
[Refereed]
Recent advancement of rainbow tensor models based on their superintegrability
(manifesting itself as the existence of an explicit expression for a generic
Gaussian correlator) has allowed us to bypass the long-standing problem seen as
the lack of ...
Elliptic algebra, Frenkel-Kac construction and root of unity limit
Hiroshi Itoyama, Takeshi Oota, Reiji Yoshioka
May 2017
[Refereed]
We argue that the level-
elliptic algebra
is a dynamical symmetry realized as a part of
2d/5d correspondence where the Drinfeld currents are the screening currents to
the
-Virasoro/W block in the 2d side. Fo...
Ward identities and combinatorics of rainbow tensor models
H. Itoyama, A. Mironov, A. Morozov
JHEP 2017 (2017) 1 Apr 2017
[Refereed]
We discuss the notion of renormalization group (RG) completion of
non-Gaussian Lagrangians and its treatment within the framework of
Bogoliubov-Zimmermann theory in application to the matrix and tensor models.
With the example of the simplest non-...
Misc
Plain Text
Lattice Virasoro Algebra and Corner Transfer matrices in the Baxter Eight - Vertex Model. (共著)
Physical Review Letters 58,1395 1987
Supersymmetry Restoration in the Compactified 0(16) x 0(16)' Heterotic String Theory(共著)
Physics Letters B 186,129 1987
The Axial Anomaly at Finite Temperature(共著)
Nucleor Physics B 218,349 1983
Neutral Excitations and the Massless Limit of the Sine - Gordon/Massive - Thirring Theory(共著)
Physical Review Letters 65,2102 1990
Integrability and Virasoro Symmetry of the Noncrtical Baxter/Ising Model(共著)
Nuclear Physics B 320,541 1989
Supersymmetry Anomalies and Some Aspects of Renormalization(共著)
Nuclear Physics B 262,317 1985
Supersymmetry Anomalies : Further Result(共著)
Physics Letters B 168,78 1986
Noncritical Virasoro Algebra of d<1 Matrix Model and Quantized String Field(共著)
Physics Letters B 255,202 1991
W
1+∞
Type Constraints in Matrix Models at Finite N(共著)
Physics Letters B 262,233 1991
Multiparticle Superstring Tree Amplitudes(共著)
Nuclear Physics B 293,685 1987
The Vertex as a Bogoliubov Transformed Vacuum State in String Field Theory (共著)
Nuclear Physics B 313,116 1989
N=2 No Scale Supergravity (共著)
Nuclear Physics B 279,380 1987
Ground State Structure of Supersymmetric Yang-Mills Theory (共著)
Nucl. Phys. B 354,85 1991
Level Crossings, Spontaneous Parity Violation, High Tc Superconductivity Mechanisms and the Chiral Potts Chain (共著)
International Journal of Modern Physics B 4,995 1990
Integrable Superhieranchy of Discretized 2D Supergravity
Physics Letters B 299,64 1993
Fredholm Determinant Representation of Quantum Correlation Function for Sine-Gorden at Special Value of Coupling Constant (共著)
Modern Physics Letters 6(22) 1405-1411 1992
Universal and Nonperturbative Behavior in the One-Plaquette Model of Two-Dimensional String Theory (共著)
Nuclear Physics B 409,397 1993
Neutral Excitations and Others in the Sine-Gorden Theory (共著)
Progress of Theoretical Physics, Supplement 114,41 1993
Sine-Gorden Theory with Higher Spin N=2 Supersymmetry and the Massless Limit (共著)
Nuclear Physics B 419,632 1994
Neutral Excitation and the Massless limit of the Sine-Gordon / Massive Thirring Theory(共著)
Physical Review Letters 65(17) 2102-2105 1990
Universal Enveloping Algebras of Toda Field Theories and Light Cone Asymmetry Parameter(共著)
Nuclear Physics B 338 759 1990
Braiding Matrices of Conformal Blocks and Coset Models(共著)
International Journal of Modern Physics A 5(1) 211-222 1990
Symmetries of Generalized Toda System. | https://researchmap.jp/read0014411 |
The stay-home notice was part of the restrictions imposed under measures to control the spread of coronavirus through movements of people. Ramasamy's lawyer told the court that he had left his house to deliver the newspapers because he received a complaint and wanted to resolve the matter.
A Singapore court on Wednesday sentenced an Indian-origin newspaper vendor to two weeks of imprisonment for breaching his stay-home notice. Palanivelu Ramasamy, 48, pleaded guilty to one count of breaching his stay-home notice in order to deliver newspapers to 14 units across eight floors at Goldhill Plaza. The stay-home notice was part of the restrictions imposed under measures to control the spread of coronavirus through the movements of people.
Ramasamy's lawyer told the court that he had left his house to deliver the newspapers because he received a complaint and wanted to resolve the matter. However, the judge said Ramasamy's action was "out of a misplaced sense of duty" and asked the lawyer repeatedly if newspaper company Singapore Press Holdings (SPH) would have helped had he asked for assistance.
The court heard that Ramasamy had attended a wedding in India and returned to Singapore on March 21. He was issued a 14-day stay-home notice at the airport. However, on March 30 the ninth day of his stay-home notice Ramasamy left his apartment at Towner Road for about two hours and 15 minutes. The man, who has been a newspaper vendor with SPH since 1985, had been alerted to a complaint about a worker who had not delivered newspapers to his customers at Goldhill Plaza, said defense lawyer Aaron Lee of Allen & Gledhill, who acted pro bono in the case.
This was due to restrictions imposed by the management at Goldhill Plaza arising from the COVID-19 situation, said Lee. As Ramasamy's work was not allowed to go up to the office units, he left the newspapers near the mailbox on the ground level instead. Ramasamy has two workers under him and usually collects newspapers at 4 am and distributes them around the Thomson area in the suburb of Singapore, the court heard.
Instead of asking his workers to deliver the papers, Ramasamy left his flat on March 30 to personally deliver the newspapers. After that, he took a bus to reach home. Deputy Public Prosecutor Joshua Lim asked for at least two-week jail term for Ramasamy, stating that the government had been very clear about the policies behind stay-home notices, with the media including newspapers publicizing these widely. "He was irresponsible and selfish and subordinated public health rules," Lim said, noting that Ramasamy had gone to bus stops with high human traffic, students and worshippers at a temple, and visited 14 units.
For breaching his stay-home notice, Palanivelu could have been jailed for up to six months, fined up to SGD 10,000 or both. | |
Posted: March 3rd, 2017
Westin Watercrafts predetermined overhead rate for year 2011 is 200% of direct labor. Information on the company’s production activities during May 2011 are as follows.
a. Purchased raw materials on credit, $125,000.
b. Paid $84,000 cash for factory wages.
c. Paid $11,000 cash to a computer consultant to reprogram factory equipment.
d. Materials requisitions record use of the following materials for the month.
Job 136 $ 30,000
Job 137 20,000
Job 138 12,000
Job 139 14,000
Job 140 4,000
Total direct materials 80,000
Indirect materials 12,000
Total materials used $ 92,000
e. Time tickets record use of the following labor for the month.
Job 136 $ 8,000
Job 137 7,000
Job 138 25,000
Job 139 26,000
Job 140 2,000
Total direct labor 68,000
Indirect labor 16,000
Total $ 84,000
f. Applied overhead to Jobs 136, 138, and 139.
g. Transferred Jobs 136, 138, and 139 to Finished Goods.
h. Sold Jobs 136 and 138 on credit at a total price of $340,000.
i. The company incurred the following overhead costs during the month (credit Prepaid Insurance for expired factory insurance).
Depreciation of factory building $ 37,000
Depreciation of factory equipment 21,000
Expired factory insurance 7,000
Accrued property taxes payable 31,000
j. Applied overhead at month-end to the Goods in Process (Jobs 137 and 140), using the predetermined overhead rate of 200% of direct labor cost.
TASKS:
1) Prepare a job cost sheet for each job worked on during the month. Use the following simplified form.
Job No.——————–
Materials——————$
Labor———————–
Overhead—————–
Total cost—————–$
2) Prepare journal entries to record the events and transactions a through j.
3) Set up T-accounts for each of the following general ledger accounts, each of which started the month with a zero balance: Raw Materials Inventory, Goods in Process Inventory, Finished Goods Inventory, Factory Payroll, Factory Overhead, Cost of goods Sold. Then post the journal entries to these T- accounts and determine the balance of each account.
4) Prepare a report showing the total cost of each job in process and prove that the sum of their costs equals the Goods in Process Inventory account balance. Prepare similar reports for the Finished Goods Inventory and Cost of Goods Sold accounts.
Place an order in 3 easy steps. Takes less than 5 mins. | https://www.thecollegepapers.com/westin-watercrafts-predetermined-overhead-rate-year-2011-200-direct-labor-information-companys-production-activities-may-2011-follows/ |
There are an estimated 13,455,000 workers that are at risk for fatal and non-fatal injuries each year in the manufacturing industry. Many of these injuries are related to machinery that needs fixing or updating.
For a metal manufacturing company, having sharp-cutting machinery can mean the difference between clear cuts, satisfied customers, and sloppy work. If you are using the objects at home, having up-to-date machinery and tools is a matter of quality and safety. How can you tell if your machinery needs replacing?
Continue reading for 5 ways to recognize that your metal cutting machinery is out of date and what you can do to ensure the safety of those using it.
1. Regularly Inspect All Sharp Cutting Machinery
A manufacturing company is required to have regular safety inspections of all its equipment. This would include keeping track of how old the equipment is, how many hours it’s been in use, and what it’s been used for. All of these combine to give a general idea of how long a blade or piece of machinery can effectively cut.
For those self-employed or using sharp cutting services at home, establishing an inspection routine can help maintain high safety standards as you work.
2. Is it Broken or Dull?
When a machine stops running, you know that something in it needs fixing. It may be harder to tell with a bit or a blade. As part of inspections, check for chipped teeth, rounded edges, or bent metal.
All of these are the first signs you will have that a part needs replacing as soon as the first signs of deterioration show up.
3. Using Expired Equipment
Depending on the tools you are using, such as a saw blade, they may have an expiration date. Some metals and compounds break down over time. If you use one of these tools past the expiration you run the risk of having it break quickly.
Always check for an expiration date and stick to it if you are using equipment or tools that have one.
4. Not Working With the Latest Technology
The use of computer-based software combined with a metal manufacturer can turn out mass-produced services for a fraction of time and cost. CNC Machining Services is one example of a company that completes tasks with the use of pre-programmed machinery.
Using these types of computer programs to cut small or complex designs can also cut down on worker-related injuries.
5. Substituting Parts
Not having the right parts on hand when a blade breaks or a machine needs fixing can be frustrating. It is tempting to stick a similar part or give it a temporary fix until the right part comes in. However, losing work time for a broken machine is not a good reason to potentially put yourself or your employees in an unsafe situation.
Safety First
Now that you have a better understanding of how to tell if your sharp cutting machinery needs replacing, fixing, or a general update, make sure that you follow through. Staying safe is important, as is the time you are spending on your work or projects.
If you found this article helpful, there are more like it to read in our Business section. | https://writingtrend.com/5-signs-your-sharp-cutting-machinery-is-out-of-date/ |
Solutions are written by subject experts who are available 24/7. Questions are typically answered within 1 hour.*See Solution
Q: A: If you are told that a certain metal element has a simple cubic unit cell structure, what additio...
A: In a simple cubic structure, each atom contributes the equivalent of one-eighth of an atom to the un...
Q: why is the separation of mixtures into pure or relatively pure substances so important when perfomin...
A: In-order to perform a chemical analysis, separation of mixture into pure substances is important. Th...
Q: A substance, X, has the following properties. SpecificHeat Capacities Hvap 20. kJ/mol ...
A: The energy must be removed in order to convert 250 g of X from its gaseous state to solid is shown a...
Q: Determine the product of the following epoxide reaction in acidic conditions: CH:ОН H2SO4 (trace)
A: The product of the given epoxide reaction in acidic conditions is to be determined.
Q: How do you predict properties and name compounds
A: To predict properties and name of compound:The reaction of hydrogen with metals produces ionic metal...
Q: Barium metal (d = 3.51 g/cm³) has a body-centered cubic structure. Calculate the edge length of a un...
A: It is given that:Density of barium metal = 3.51 g/cm3
Q: What is the vapor pressure of an aqueous solution of a nonvolatile non electrolyte at 25oC that has...
A: The vapour pressure of an aqueous solution of a nonvolatile non electrolyte is calculated as,
Q: Ethanol has a heat of vaporization of 38.56kJ/mol38.56kJ/mol and a normal boiling point of 78.4 ∘C W...
A: Given,The heat of vaporization of ethanol, ∆Hvap = 38.56kJ/mol .The normal boiling point of ethanol,...
Q: At 25.0°C, a rate constant has the value 5.21 × 10-8 L mol-1 s-1. If the activation energy is 75.2 k...
A: Given:Temperature T1 = 25 oC = 298 K.Temperature T2 = 50 oC = 323 K.Activation energy=s 75.2 kJ/molR... | https://www.bartleby.com/questions-and-answers/a-100percent-706-pm-wed-jan-29-unanswered-1-attempt-left-due-on-jan-30-when-a-nonvolatile-solute-is-/70b92271-6459-4d54-89ab-77aca17e3a73 |
Why use us?
|
Reviews
|
PR
|
Contact us
Topic:
Purgatory
Ads by Google
Related Topics
Immaculate Conception
Eastern Orthodox Church
The Canon of Scripture
Papal primacy
Communion of Saints
Syriac Christianity
Christian eschatology
Papal infallibility
Heaven
Limbo
Eastern Orthodox
Sola scriptura
Catholicism
Syriac Orthodox Church
Mormonism and Christianity
Purgatory - Wikipedia, the free encyclopedia
Purgatory
commonly refers to a
doctrine
in the Roman Catholic Church, which posits that those who die in a state of
grace
undergo a purification in order to achieve the holiness necessary to enter
heaven
.
Hence central to the Catholic
doctrine
of
purgatory
is
prayer
for the dead.
Some
Eastern Orthodox
sources, including the
Ecumenical Patriarchate
, consider
Purgatory
to be among "inter-correlated theories, unwitnessed in the
Bible
or in the Ancient Church" that are not acceptable within
Orthodox
doctrine, and hold to a "condition of waiting" as a more apt description of the period after
death
for those not borne directly to
heaven
.
en.wikipedia.org /wiki/Purgatory
(2409 words)
Purgatory - LoveToKnow 1911
Thenceforth it became part of the theology of the Western Church, and was definitely affirmed at the councils of Lyons (1274), Florence (1439)(1439) and
Trent
.
Purgatory
, for example, is usually thought of as having some position in space, and as being distinct from
heaven
and
hell
; but any theory as to its exact latitude and longitude, such as underlies
Dante's
description, must be regarded as imaginative.
Most theologians since Thomas Aquinas and Bonaventura have taught that the
souls
in
purgatory
are tormented by material fire, but the Greeks have never accepted this opinion.
www.1911encyclopedia.org /Purgatory
(455 words)
CATHOLIC ENCYCLOPEDIA: Purgatory
Purgatory
(Lat., "purgare", to make clean, to purify) in accordance with Catholic teaching is a place or condition of temporal punishment for those who, departing this life in
God's
grace
, are, not entirely free from
venial
faults, or have not fully paid the satisfaction due to their transgressions.
In the Middle Ages, the
doctrine
of
purgatory
was rejected by the Albigenses, Waldenses, and Hussites.
It is the traditional faith of Catholics that the
souls
in
purgatory
are not separated from the Church, and that the love which is the bond of union between the Church's members should embrace those who have departed this life in
God's
grace
.
www.newadvent.org /cathen/12575a.htm
(4466 words)
Purgatory
Pope
John Paul II has recently informed the world that
Purgatory
is still there and he's made arrangements with the powers that may be to let us out early when we die.
Purgatory
is located close to
Hell
, but, unlike
Hell
, it has a two-way door.
The
Council of Trent
(1545-1563) declared the
Purgatory
swindle to be a matter of Catholic faith.
www.infidels.org /library/modern/john_murphy/purgatory.html
(548 words)
Purgatory
The advocates of a
purgatory
(and the necessity of
prayer
for the dead) say, in effect, that the redemption of Christ was incomplete.
Purgatory
is the final phase of Christ’s applying to us the purifying redemption that he accomplished for us by his
death
on the cross.
Purgatory
makes sense because there is a requirement that a
soul
not just be declared to be clean, but actually be clean, before a man may enter into eternal life.
www.catholic.com /library/Purgatory.asp
(2185 words)
Scripture Catholic - PURGATORY
Protestants
, in attempting to disprove the reality of
purgatory
, argue that Paul was only writing about rewarding good works, and not punishing
sins
(because punishing and purifying a man from
sins
would be admitting that there is a
purgatory
).
3:14,15,17 -
purgatory
thus reveals the state of righteousness (v.14), state of
venial
sin
(v.15) and the state of
mortal sin
(v.17), all of which are judged after
death
.
It is a matter that may be inquired into, and either ascertained or left doubtful, whether some believers shall pass through a kind of
purgatorial
fire, and in proportion as they have loved with more or less devotion the goods that perish, be less or more quickly delivered from it.
www.scripturecatholic.com /purgatory.html
(3284 words)
purgatory
Purgatory
then began the long, uphill
battle
of writing new material, as well as working on a stage show.
The EP was generating heavy local radio airplay, and
Purgatory
quickly found themselves in the middle of the Cleveland metal scene.
Purgatory
had survived a major obstacle, and their optimism about the release of the new album had returned.
www.geocities.com /twoonesix_bands/purgatory.html
(934 words)
rc11
Souls
in
purgatory
are assured of an eventual place in
heaven
, but they must make satisfaction for their
sins
first, the affliction of their
souls
purifies them.
Upon this
doctrine
of
purgatory
rests the Catholic practice of praying for the dead, saying
masses
for the dead, and of the
Pope's
granting
indulgences
for the sake of those in
purgatory
.
But nothing resembling the developed
doctrine
of
purgatory
and
indulgences
, etc. It is interesting that the
Orthodox
church does not hold to
purgatory
, a church that also claims the authority of the fathers and to rest its
doctrine
on the consensus of their teaching as an infallible authority.
www.faithtacoma.org /sermons/Romancath/RC11.html
(2833 words)
Purgatory - Barefoot in the wilderness
And the secondary issues of whether
Purgatory
happens at
death
or afterwards, whether its discomfort is instant or prolonged, and whether that discomfort arises from the experience itself or only our remembrance of it are truly secondary.
Catholic
purgatory
(I was raised with this tradition) is actually quite similar to Buddhist Bardo realms when you strip away all the corruption of the Church in demanding payment.
If we relate
Purgatory
with a purging and cleansing action from holy suffering—suffering that is united with Christ, accepted in humility by the inspiration of the Holy Spirit, then I think it becomes clearer, especially since St. Paul had a lot to say about suffering for Christ.
john.pettigrew.org.uk /blog/archive/2005/05/31/purgatory
(3468 words)
Purgatory is a place of mercy
In
Purgatory
this picture must be completed; everything that had been lost must be restored, so that nothing is wanting to the
soul’s
original splendor.
The
souls
in
Purgatory
are enveloped, as it were, in a thick shroud into which they have wound themselves, while living here on earth.
I behold many
souls
in
Purgatory
whose desire to become Saints was motivated by self-will and self-love, or who devoted themselves assiduously to the interior life in order to please their confessors and spiritual directors; whose only motive was not
God
, but their own
glorification
, their own egoism.
www.marys-touch.com /truth/purgatory.htm
(2441 words)
Purgatory
Purgatory
was a belief of the earliest Christians including
Church Fathers
such as Tertullian, Clement of Alexandria, Origen, Cyprian, Jerome, Ambrose, Augustine (between 200-500 A.D.)
Prayers
for the dead were inscribed on the tombs of the early Christians buried in Catacombs.
Purgatory
was not invented at the
Council of Trent
.
The notion of
Purgatory
is far from being an invention of the middle ages, it was a belief of the earliest Christians.
davidmacd.com /catholic/purgatory.htm
(4370 words)
EIPS - Purgatory and Indulgences
The
doctrine
of
purgatory
as taught by the Roman Catholic Church is nowhere to be found in the
Scriptures
.
Rome teaches that
purgatory
is an intermediate place between
Heaven
and
Hell
where the
soul
spends an indeterminate length of
time
, depending on the gravity of unpardoned
sins
and the number of
indulgences
granted on the
soul's
behalf.
During the period of the early church the existence of
purgatory
was classified by several theologians as a required belief, but it was not until the councils of Lyon and Florence in the Middle Ages and the
Council of Trent
in the Reformation period that the teaching was authoritatively defined.
www.ianpaisley.org /article.asp?ArtKey=rome_purgatory
(689 words)
[No title]
Purgatory
is the name given to this final purification of the elect, which is entirely different from the punishment of the
damned
(
hell
).
The
doctrine
of
purgatory
has the unanimous support of the
Church Fathers
(early Christians) who addressed the matter, either in direct references to an intermediate state prior to
heaven
, or in reference to
prayers
for the dead.
Both
purgatory
and
prayers
for the dead were upheld by the major councils, beginning with the Council of Carthage in 394 A.D. to the
Council of Trent
in 1554 A.D. Evidence of
prayers
for the dead also appeared in inscriptions on the walls of Christian catacombs in the very early years of the Church.
www.geocities.com /Athens/Rhodes/3543/Purgator.htm
(2416 words)
Karl Keating
Purgatory
is a state of purification, where the
soul
which has fully repented of its
sins
, but which has not fully expiated them, has removed from itself the last elements of uncleanliness.
In Fundamentalism's scheme of things,
purgatory
would be superfluous, since cleansing before entering
heaven
would be unnecessary, on the notion that every
soul
is unclean and
God
ignores the uncleanliness by "covering" the
soul's
sinfulness.
Purgatory
makes sense only if there is a requirement that a
soul
not just be
to be clean, but actually
clean.
www.ewtn.com /library/ANSWERS/CATHFUND.htm
(2370 words)
Fr. Frank Sofie
Purgatory
, on the other hand, is temporary; it will cease to be after the last person is released.
Purgatory
is the state, after
death
, where
souls
who are not yet
perfected
in their love for
God
, are purified before admittance to the all holy
God
.
Purgatory
is not an anti-biblical
doctrine
; it is not unreasonable.
www.ewtn.com /library/ANSWERS/PURGBAS.htm
(2919 words)
Catholic Apologetics - Purgatory
The teaching of the Church on
Purgatory
is, when rightly understood and deeply lived, a glorious and consoling
doctrine
.
Actually
Purgatory
is something that was believed by early Church and the Apostles.
In three controversial Wednesday Audiences, the Holy Father pointed out that the essential characteristic of
heaven
,
hell
or
purgatory
is that they are states of being of the spirit (angel/demon) or human
soul
, rather than places, as commonly perceived and represented in human language.
saint-mike.org /Library/Apologetics/Purgatory.html
(1065 words)
The Souls in Purgatory (Catholic Youth Networking)
The
Souls
in
Purgatory
are part of the
Communion of Saints
(they are sometimes referred to as "The Church Suffering"), and we have the obligation as Catholics to pray for their speedy release from
Purgatory
.
So
Purgatory
is a state of purification, where the
soul
can be cleansed of all the
sins
and damage from
sin
which hinder it from reaching
Heaven
.
Part of the suffering of
Purgatory
, of course, is that the
souls
there can't see
God
, and they long with all their hearts to be with Him.
catholicyouth.freeservers.com /purgatory/index.htm
(922 words)
Purgatory?
The above decree declares
purgatory
will be believed by the Catholic, and it will be taught and preached as truth, but in-depth discussions as to the fine points and seeking proof from
scripture
is to be discouraged among the ignorant and unwashed laity.
Purgatory
is the machine that drives the sinner into the Church, and parts them from their
money
.
Purgatory
is a complete fraud, perpetrated on the ignorant and the vulnerable.
www.aloha.net /~mikesch/prgtory.htm
(3572 words)
C.A.R.M. Purgatory
According to Catholic
doctrine
,
purgatory
is not supposed to be a place of punishment, but of purification.
Which ever side of the argument you fall into, my goal here is to present a biblical argument that examines the
doctrine
in an attempt to determine if it is biblical or not.
Of course, the Catholic will say that as a
Protestant
, I come to the argument with the preconceived belief that (1)
Purgatory
is unbiblical, (2) that I am biased against it, and (3) that I have an agenda to accomplish.
www.carm.org /catholic/purgatory.htm
(577 words)
Purgatory
The suffering of
purgatory
is less a concept of physical pain than one of postponement of the "beatific vision."
Purgatory
will end with the Last Judgment at the close of the world.
The official Roman Catholic teaching on
purgatory
was defined at the councils of Lyon (1274) and Ferrara-Florence (1438-45) and reaffirmed at
Trent
(1545-63).
The teachings of the Roman Catholic and Greek
Orthodox
churches set forth a place of temporal punishment in the intermediate realm known as
purgatory
, in which it is held that all those who die at peace with the church but who are not
perfect
must undergo penal and purifying suffering.
www.mb-soft.com /believe/txo/purgat.htm
(439 words)
Purgatory
Purgatory
is not
Hell
minus a few torments and degrees Fahrenheit; it's not
Heaven
minus joy.
Purgatory
is simply the place where already saved
souls
are cleansed of the temporal effects of
sin
before they are allowed to see the holy face of Almighty
God
.
Nota bene:
Purgatory
is His way of ensuring that Revelation 21:27 is true and that nothing unclean will see
Heaven
.
www.fisheaters.com /purgatory.html
(2269 words)
Amazon.com: Purgatory: DVD: Uli Edel,Sam Shepard,Eric Roberts,Randy Quaid,Peter Stormare,Brad Rowe,Donnie Wahlberg,J.D. ...
(Site not responding. Last check: 2007-10-21)
The town is actually
Purgatory
, and the peaceful inhabitants are all famous dead outlaws and criminals such as Doc Holiday and Wild Bill Hickok who must redeem themselves before gaining admittance to Heaven...or screw up and go to
Hell
.
Purgatory
is a down-and-dirty Western with a twist The Twilight Zone's Rod Serling would have loved.
Purgatory
packs enough action for western enthusiasts, even though it may come off as too preachy for some, and while it wears thin towards the end, it still manages to be solid entertainment with an intriguing idea.
www.amazon.com /Purgatory-Uli-Edel/dp/B0007OY2OO
(1865 words)
Purgatory Golf
Purgatory
Golf Club is a resort quality golf course in Noblesville, Indiana, just north of Indianapolis.
When played from the front tees at only 4,400 yards,
Purgatory
is one of the shortest courses in Indiana.
When played from the back tees at over 7,700 yards,
Purgatory
is the longest golf course in Indiana.
www.purgatorygolf.com
(247 words)
CUF.org :: Catholics United for the Faith
RESPONSE:
Purgatory
is a
doctrine
of the Catholic Church.
Though the word
“purgatory”
is not found in the
Bible
, both the Old and New Testaments provide textual support of the
doctrine
.
They believe that, upon
death
, all who have been born again are covered in the mercy of
God
and allowed into
heaven
no matter the quality or quantity of their sinfulness.
www.cuf.org /Faithfacts/details_view.asp?ffID=120
(2611 words)
Try your search on:
Qwika
(all wikis)
About us
|
Why use us?
|
Reviews
|
Press
|
Contact us
Copyright © 2005-2007 www.factbites.com Usage implies agreement with
terms
. | http://www.factbites.com/topics/Purgatory |
Overlooking the sprawling tropical gardens and freeform swimming pool, Anarasa-Bara Robata Grill & Restaurant is one out of five dining venues found within the stylish Mövenpick Resort & Spa Jimbaran Bali. Open all day and brimming with urban style, the restaurant offers guests delectable dishes and comfort with ample seating areas. Guests can choose the shaded outside terrace or indoors in air-conditioned comfort, where live cooking stations accompany the dining experience. Anarasa-Bara Robata Grill & Restaurant caters to all palates and offers a wide selection of Asian delicacies, an à la carte menu and a dedicated children’s zone and menu. Always putting quality first, all dishes are made using ingredients sourced from the local neighbourhood to ensure freshness daily. | https://beautiful-bali.com/2021/06/02/anarasa-bara-robata-grill-restaurant/ |
All individuals and families facing homelessness in Fresno and Madera cities and counties will have access to safe, decent, affordable housing with the resources and supports necessary to sustain it.
We believe in community transformation and are deeply committed to our ten community values: stewardship, boundary crossing and collaboration, commitment to outcomes, art-of-the-possible thinking, fact-based decision making, truth telling, power parity, commitment to resolve conflict, asset-based approaches, and disclosure of conflict of interest. We know homelessness is a complex social problem, which does not lend itself to simple solutions. Yet we believe that great strides can be made toward ending homelessness by addressing housing issues, then ensuring that there are the resources and supports in place to sustain that housing. We do not have to end poverty in its entirety to end homelessness; however, our ability to end homelessness rests upon the degree to which we are able to wed the efforts of the homeless service delivery system to those of other mainstream programs and systems of care – programs and systems whose barriers have contributed to its growth. Only through comprehensive, cross-system strategies will we be able to fully assist people in accessing and sustaining affordable housing, achieve community integration and maintain economic stability.
This effort requires a collaborative approach. As this 10-year plan details, both the Fresno and Madera communities are ready to embrace the challenge of system change and integration necessary to prevent homelessness and end it for the hundreds of men, women, and children in shelter or on the streets each night who could and should have a home and a bed of their own.
The Fresno Madera Continuum of Care (FMCoC) Collaborative seeks to end the plight and growth of homeless in our community. The first step accomplished thus far, is clearly defining the problem. Annually, the FMCoC reviews its Strategic Plan to end homelessness. This 10-year plan will now serve as a cornerstone for the evaluation of achievement and goals achievement. The Strategic Plan will be developed with the accomplishment of the Core Tenets in mind. The plan will guide the way the homeless providers will structure services and interventions, and impact recommendations made by the FMCoC in support of federal and state funding for projects and programs.
The fundamental components of a continuum of care are to facilitate a coordinated, unduplicated and seamless service provision for our community’s homeless population. We are responsible for the Fresno & Madera regional 10-year plans to end homelessness, through: Homeless Prevention Activities, Outreach and assessment, Emergency housing, Transitional housing, Health & Mental Healthcare access, Supportive services and ensuring availability of supportive permanent & affordable housing.
The FMCoC critical activity (Annual Regional Point-In-Time Homeless count; Homeless Management Information System data collection; identification of our regional annual unmet need & service gaps identification) is the means to attain the ($6.5 million of annual) HUD Homeless Funding for the entire region. Our role is to ensure the efficient and effective connection of each specific regional homeless activity to fulfill the CoC overall goal to end homelessness.
The Fresno Madera Continuum of Care ensures that the Regional Ten Year Plans for ending homelessness are strategically approached and meet annual achievement benchmarks. A copy of the regional & area specific Ten Year Plans for Ending Homelessness, is availabile here.
If you have any questions regarding this website, services, locations, or any questions on homelessness, government policies, aid programs, local resources, or anything that we can help with, please contact us.
Please note: fields marked with a red asterisk (*) are required, and must be completed before the form can be submitted. | http://fresnomaderahomeless.org/Home/About |
Michigan’s Cancer Genomics Program provides information about hereditary cancer syndromes, such as Hereditary Breast and Ovarian Cancer and Lynch Syndrome. Resources for patients, patient advocates, health care providers, and professionals are available.
Keyword: BRCA
Family and Genetic Testing for Hereditary Cancer Syndromes Implications for Future
Guest PowerPoint presentation in August 2011 at the Michigan Cancer Genetics Alliance (MCGA) membership meeting.
MCGA/MCC Position Paper for Healthcare Providers
Currently being revised: This 2015 paper provided the position of the Michigan Cancer Genetics Alliance (MCGA) and the Michigan Cancer Consortium (MCC) on genetic testing and counseling for hereditary cancer predisposition syndromes. | https://migrc.org/keyword/brca/ |
PHILADELPHIA - Transportation Security Administration (TSA) officers stopped 57 handguns at Pennsylvania airport security checkpoints in 2020, a decrease from the 71 caught in 2020 during a year in which there was a dramatic drop of approximately 65 percent of passengers who flew last year due to the pandemic.
However, Philadelphia International Airport saw a marked increase in the number of guns caught at checkpoints in spite of the lower passenger volume. TSA officers detected 26 firearms at the airport checkpoints last year compared to 20 in 2019, approximately a 30 percent increase in the number of guns that travelers brought to the checkpoints in Philadelphia.
Nationwide, TSA officers detected 3,257 firearms on passengers or their carry-on bags at checkpoints last year, although the total number of passengers screened at airport checkpoints across the country fell by 500 million compared to 2019 due to the pandemic. The result was that twice as many firearms per million passengers screened were detected at checkpoints in 2020 compared to 2019. In 2020, TSA caught approximately 10 firearms per million passengers as compared to about 5 firearms per million passengers in 2019. Of the guns caught by TSA in 2020, about 83 percent were loaded. Firearms were caught at 234 airport checkpoints nationwide.
TSA firearms caught at TSA checkpoints in airports in Pennsylvania, 2017 to 2020
Airport
2017
2018
2019
2020
Philadelphia International Airport (PHL)
35
25
20
26
Pittsburgh International Airport (PIT)
32
34
35
21
Harrisburg International Airport (MDT)
6
6
7
4
Lehigh Valley International Airport (ABE)
4
7
1
3
Wilkes-Barre/Scranton International Airport (AVP)
1
1
4
1
Arnold Palmer Regional Airport (LBE)
2
2
3
1
Erie International Airport (ERI)
0
0
0
1
University Park Airport (UNV)
0
0
1
0
Totals
80
75
71
57
Travelers who bring firearms to the checkpoint are subject to criminal charges from law enforcement and civil penalties from TSA. Even if a traveler has a concealed weapon permit, firearms are not permitted to be carried onto an airplane. However, travelers with proper firearm permits can travel legally with their firearms in their checked bags if they follow a few simple guidelines.
Top 10 Airports with guns caught by TSA at checkpoints in 2020
Rank
Airport (Code)
Total
1
Hartsfield-Jackson Atlanta International Airport (ATL)
220
2
Dallas/Fort Worth International Airport (DFW)
176
3
Houston’s George Bush Intercontinental Airport (IAH)
126
4
Phoenix Sky Harbor International Airport (PHX)
124
5
Denver International Airport (DEN)
104
6
Nashville International Airport (BNA)
94
7
Fort Lauderdale-Hollywood International Airport (FLL)
87
8
Orlando International Airport (MCO)
79
9
Las Vegas McCarran International Airport (LAS)
72
10
Salt Lake City International Airport (SLC)
71
Firearm possession laws vary by state and locality. TSA advises travelers to familiarize themselves with state and local firearm laws for each point of travel prior to departure to ensure that they have the proper gun permits for the states that they are traveling to and from. Airlines may have additional requirements for traveling with firearms and ammunition so travelers should also contact the airline regarding firearm and ammunition carriage policies prior to arriving at the airport.
Passengers are permitted to travel with firearms in checked baggage if they are unloaded, packed in a hard-side case, locked, and packed separately from ammunition. Ammunition must be in its original box and can be packed inside the hard-side case, next to the firearm. Even if the box of ammunition is not full, the bullets must be in their original case. Then the case with the firearm should be brought to the airline check-in counter and the airline representative informed that the passenger wants to travel with the gun. Firearms are transported inside checked baggage and are placed in the belly of the aircraft so that nobody has access to them during the flight. TSA has details on how to properly travel with a firearm posted on its web site.
Individuals who bring weapons to a checkpoint are subject to federal civil penalties of up to $13,669. A typical first offense for carrying a handgun into a checkpoint is $4,100. The complete list of penalties is posted online.
National statistics: Firearms caught by TSA at checkpoints, 2008 to 2020
Year
Nationwide
2020
3,257
2019
4,432
2018
4,239
2017
3,957
2016
3,391
2015
2,653
2014
2,212
2013
1,813
2012
1,556
2011
1,320
2010
1,123
2009
976
2008
926
TSA officers continued their overall vigilance in protecting our nation’s transportation systems in 2020, in spite of the pandemic, including catching other prohibited items at the checkpoints.
Travelers can use the “What Can I Bring?” feature on the TSA website or on the free downloadable myTSA app. Travelers can also tweet or message “@AskTSA” if they have a travel question or are unsure if an item is allowed through security in a carry-on bag. Just snap a picture or send a question and get real-time assistance. | https://www.tsa.gov/news/press/releases/2021/01/26/tsa-continued-detect-firearms-pennsylvania-airports-2020 |
Speaking and listening is central to our Curriculum and is developed from EYFS throughout our school. We nurture children’s speaking and listening skills through a variety of approaches: exploratory play, storytime, hot-seating, philosophy sessions (P4C) and through collaborative learning across all subject areas.
We develop these skills so that our children are capable of expressing their own ideas clearly and confidently, in a safe and supportive environment, in all aspects and areas of their school life and into their future. | http://www.northealingprimary.org/speaking-listening/ |
The Cybersecurity and Infrastructure Security Agency (CISA) kicked off Infrastructure Security Month (ISM) on Monday, November 1. Like Cybersecurity Awareness Month, each week has a unique focus area, which all support a single monthly theme. This year the theme is Critical Infrastructure Security and Resilience: Build It In. This theme is meant to underscore the importance of building infrastructure with security and resilience in mind.
The United States has identified 16 sectors as critical infrastructure:
- Chemical
- Communications
- Commercial facilities
- Critical manufacturing
- Dams
- Defense industrial base
- Emergency services
- Energy
- Financial services
- Food and agriculture
- Government facilities
- Health care and public health
- Information technology
- Nuclear reactors materials and waste
- Transportation systems
- Water and wastewater systems
An infrastructure sector is considered ‘critical’ if the United States government has determined that the operations and services of that sector are vital to national security and public health. You can read more about this on the CISA infrastructure security page.
Week 1: Interconnected and interdependent critical infrastructure: Shared risk means building in shared responsibility
Because the critical functions within our society are so complex and interconnected, there’s no single area of expertise or ownership that can manage the complete risk. Many of the risks associated with critical infrastructure are geographically dispersed and managed by a variety of private and public entities. These entities will have to work together to create standards and protocols for mitigating risk and managing incident response. CISA Director Jen Easterly, Congressman John Katko, and private sector stakeholders are currently working on identifying which sectors need additional resources to help secure them from ransomware and other attacks. Meanwhile, hacking gangs are actively developing supply chain attack capabilities, and critical infrastructure sectors remain on high alert.
If you are interested in learning more about critical infrastructure security, you can find free training courses and other resources on the CISA website. For more on how you can participate in Infrastructure Security Month, visit the official site here.
Christine Barry is Senior Chief Blogger and Social Media Manager at Barracuda. Prior to joining Barracuda, Christine was a field engineer and project manager for K12 and SMB clients for over 15 years. She holds several technology and project management credentials, a Bachelor of Arts, and a Master of Business Administration. She is a graduate of the University of Michigan.
Connect with Christine on LinkedIn here. | https://blog.barracuda.com/2021/11/04/build-in-security-and-resilience-with-infrastructure-security-month/ |
- Wing it?
- Really take off
- Fly into the wild blue yonder
- Take to the skies
- Go up, up, up
- Hit the stratosphere
- What some prices and spirits do
- Zoom up
- Go into the wild blue yonder
- Rise rapidly
- Triple, quadruple or more
- What spirits can do
- Really go up
- What spirits may do
- Go through the roof
Longman Dictionary of Contemporary English
The Collaborative International Dictionary
Soar \Soar\, v. i. [imp. & p. p. Soared; p. pr. & vb. n. Soaring.] [F. s'essorer to soar, essorer to dry (by exposing to the air), fr. L. ex out + aura the air, a breeze; akin to Gr. ?????.]
-
To fly aloft, as a bird; to mount upward on wings, or as on wings.
--Chaucer.
When soars Gaul's vulture with his wings unfurled.
--Byron.
-
Fig.: To rise in thought, spirits, or imagination; to be exalted in mood.
Where the deep transported mind may soar.
--Milton.
Valor soars above What the world calls misfortune.
--Addison.
(A["e]ronautics) To fly by wind power; to glide indefinitely without loss of altitude.
Soar \Soar\, n. The act of soaring; upward flight.
This apparent soar of the hooded falcon.
--Coleridge.
Soar \Soar\, a. See 3d Sore. [Obs.]
Soar \Soar\, a. See Sore, reddish brown.
Soar falcon. (Zo["o]l.) See Sore falcon, under Sore.
Douglas Harper's Etymology Dictionary
Wiktionary
n. 1 The act of soaring. 2 An upward flight. vb. 1 to fly aloft with little effort, as a bird. 2 to mount upward on wings, or as on wings. 3 to remain aloft by means of a glider or other unpowered aircraft. 4 to rise, especially rapidly or unusually high. 5 (context figuratively English) To rise in thought, spirits, or imagination; to be exalted in mood.
WordNet
n. the act of rising upward into the air [syn: zoom]
v. rise rapidly; "the dollar soared against the yes" [syn: soar up, soar upwards, surge, zoom]
fly by means of a hang glider [syn: hang glide]
fly upwards or high in the sky
go or move upward; "The stock market soared after the cease-fire was announced"
fly a plane without an engine [syn: sailplane]
Wikipedia
Soar is a cognitive architecture, created by John Laird, Allen Newell, and Paul Rosenbloom at Carnegie Mellon University , now maintained by John Laird's research group at the University of Michigan. It is both a view of what cognition is and an implementation of that view through a computer programming architecture for artificial intelligence (AI). Since its beginnings in 1983 and its presentation in a paper in 1987, it has been widely used by AI researchers to model different aspects of human behavior.
Soar or SOAR may refer to:
- 160th Special Operations Aviation Regiment (Airborne), a US Army regiment
- The Special Operations Assault Rifle, primary assault rifle for the special forces unit of the Philippine National Police
- Soar (cognitive architecture), a symbolic cognitive architecture
- "Soar", a song by Christina Aguilera from the album Stripped (2002)
- Soar (album), the second album (released 1991) by the American band Samiam
- S.O.A.R., 2016 album by Devour The Day
- Safe operating area, typically used to describe power limitations of electronic components
- Southern Astrophysical Research Telescope, a modern 4.1-meter-aperture optical and near-infrared telescope located on Cerro Pachón, Chile
- Student orientation, also known as SOAR or Student Orientation And Registration
- Surgical Outcomes Analysis and Research, a research collaborative in the Beth Israel Deaconess Medical Center
- SOAR, air-space system under development for launch of satellites and suborbital space tourism from Swiss Space Systems company, Switzerland
- Soar, a fictional airline in Flight Simulator X
Soar is the second album from the American band Samiam released in 1991 on New Red Archives.
SOAR is a partially reusable air-launched spaceplane launch system designed to launch small satellites on a suborbital or orbital trajectory. The vehicle, derived from the Hermes spacecraft developed by the European Space Agency, is planned to be built, launched, and operated by Swiss Space Systems. The spaceplane will launch from an Airbus A300 aircraft named S3 Zero Gravity Airliner. Once at altitude, the spaceplane will separate from the aircraft and ignite an NK-39 engine developed by Russian Federal Space Agency. After fuel depletion at about 80 kilometers altitude, the plane will release its payload before gliding back and landing on Earth.
The launch vehicle will also have low Earth orbit capability when launched in conjunction with an expendable upper stage. Swiss Space Systems has contracted the Russian firm RKK Energia to develop the upper stage. With an upper stage, the spacecraft will be able to launch a 250 kilogram payload into orbit.
The spaceplane is currently targeted to have its first test launch by 2017. Swiss Space Systems claims that the spaceplane could cost about four times less than current suborbital launch costs.
Usage examples of "soar".
And immediately after her prayer breaks forth, soars upward in a shrill nasal falsetto, like a morning alarum when the hour for waking has come, the mechanical noise of a spring let go and running down.
The final visa approval had come through only the day before, the fifth of June, and just hours later Mondschein had boarded the Aero Alvarado flight that would take him in a single soaring supersonic arc nonstop from Zurich to his long-lost homeland on the west coast of South America.
When he looked back the way he had come he could see the Gull of Moray anchored not far off a tiny rind of beach that clung precariously to the foot of the soaring rocky cliffs where the mountains fell into the sea.
As he spoke he raised his arbalest to his shoulder and was about to pull the trigger, when a large gray stork flapped heavily into view skimming over the brow of the hill, and then soaring up into the air to pass the valley.
The nobleman commented briefly on these diverse kinds of love, but when he came to the love of God he began to soar, and I was greatly astonished to see Marcoline shedding tears, which she wiped away hastily as if to hide them from the sight of the worthy old man whom wine had made more theological than usual.
The full-court press, passes out of the double-team, the pick-and-roll, cutting off the passing lanes, a tip-in from a high-flying forward soaring from out of nowhere all constitute a coordination of intellect and athleticism, a harmony of mind and body.
Soaring over the Duomo, the Baptistry, and the Piazza della Signoria, which rose from the streets like minarets around a heavenly dome .
Grey-headed kingfisher, pied hornbill, black-capped oriole, a flock of superb starlings which were just that, blue-collared, red breasted, green in the wings, and, best of all, a bateleur eagle, cruising beneath a perfectly unblemished blue sky, not soaring, just moving steadily forwards without, apparently, moving its wings.
Then man burst his bidimensional limits, and invaded the third dimension, soaring with Montgolfier into the clouds, and sinking with a diving bell into the purple treasure-caves of the waters.
She turned down a corridor to her left, then ran lightly down several levels of stairs, her grace causing the Icarii birdman who soared past her to turn his head and watch for long moments until the Groundwalker woman disappeared into a corridor far below.
When the griffins wearily leveled out, heads bent down between their spread wings, ready to soar or sideslip if the thing came for them, the blueness leaped into a long flash of azure light, rushing in zigzags underneath them faster even than lightning, and disappeared into the distance behind.
With his sensitive nostrils it was not particularly difficult for Bozo to track the Yathoon and their beasts through the maze of the foothills which rose before the soaring rampart of the Black Mountains.
Soon the air was chili, but chill air must still lift over hills, over soaring heights, because of catabatic convection flow.
Dense macca-fat palms stood next to silk-cotton, or ceiba, trees that soared out of sight, their tops obscured by the midgrowth.
I wish to speak about, and I need not exhort you to master them, for the day is not far off when you, and each of you, will be soaring in outer space, with the welfare of this nation and indeed of all mankind depending upon how you perform. | https://findwords.info/term/soar |
Accent:
Landscape view? Pause before start?
Keyboard Shortcuts:
←Previous page
→Next page
spacePlay & Pause
About 'Bist Du Bei Mir'
|Artist:||Bach, Johann Sebastian (biography) (sheet music)|
|Born:||21 March 1685 , Eisenach|
|Died:||28 July 1750 , Leipzig|
|The Artist:||One of the greatest composers of all time. Bach wrote hundreds of pieces for organ, choir, as well as many other instruments. He spent most of his life as a church organist and a choir director. His music combines profound expression with clever musico-mathematical feats, like fugues and canons in which the same melody is played against itself in various ways.|
|Composed:||1722/5|
| Info:|
This very popular melody is believed to have been in fact composed by Gottfried Heinrich Stolzel (1690-1749). It appeared in Bachs Clavier-Buchlein fur Anna Magdalena Bach (BWV 508).
|Score Key:||Eb major (Sounding Pitch) (View more Eb major Music for Saxophone Quartet )|
|Time Signature:||3/4 (View more 3/4 Music)|
|Duration:||2:37|
|Tempo Marking:||Andante|
|Number of Pages:||2|
|Difficulty:||Intermediate Level: Recommended for Intermediate Level players|
|Instrument:||
|
|Style:||
Classical
(View more Classical Saxophone Quartet Music)
|
weddings (View more weddings Saxophone Quartet Music)
|Tags:|
|Copyright:||© Copyright 2000-2019 Red Balloon Technology Ltd (8notes.com) |
This file may be printed and performed freely, but should not be digitally copied, shared or reproduced without permission. | https://www.8notes.com/scores/21142.asp |
FIELD OF THE INVENTION
The present invention relates to an apparatus for the cooling, calibration and straightening of a plate-shaped synthetic-resin strand. More particularly, the invention relates to the processing of extruded flat strands of thermoplastic synthetic-resin material, e.g. of the type emerging from a broad-slot nozzle of an extruder head.
BACKGROUND OF THE INVENTION
It has already been proposed heretofore to provide, in association with extruder means for producing a relatively long flat (plate-shaped) synthetic-resin strand, a roller assembly comprising a plurality of pressing rollers in a roller stand through which the strand passes. The roller stand is generally stationary and the pressing or calibrating rollers are neither heated or cooled. As a result, the synthetic-resin strand undergoes warping, bulging and like deformation upon cooling or subsequent to cooling, this being especially the case when relatively thick and broad plates are to be produced, i.e. when the strand is relatively thick and wide.
OBJECTS OF THE INVENTION
It is the principal object of the present invention to provide an apparatus for the cooling, calibration and straightening of a plate- shaped synthetic-resin strand which is capable of ensuring temperature homogenization thereof and hence minimizes the warping or bulging to which the plates formed from the strand may be subject.
Another object of the invention is to provide an apparatus for the purposes described which is capable of producing synthetic-resin strands with minimal thickness variations and substantially complete freedom from distortion.
It is yet another object of the invention to provide an apparatus for the cooling, calibration and straightening of relatively wide and thick extruded synthetic-resin strands.
SUMMARY OF THE INVENTION
These objects and others which will become apparent hereinafter, are attained, in accordance with the present invention, in an apparatus for the cooling, calibration and straightening or a relatively broad and thick extruded thermoplastic synthetic-resin strand which comprises a set of rollers including rollers engaging opposite faces of the strand, between which the strand passes. According to the present invention, the individual press rollers have integrated therewith cooling and/or heating means such that the rollers are either cooled and/or heated to ensure a homogeneous temperature distribution over the surfaces of the rollers and within the strand engaged thereby.
Another essential feature of the invention resides in the fact that at least some of the rollers in engagement with the strand are shiftable back and forth parallel to the direction of advance thereof by a corresponding oscillating drive.
In a preferred embodiment of the invention, the spacing of nearest rollers of the set or assembly from each other is adjustable in the direction of advance of the strand through the assembly.
The pressing rollers of the present invention can be rotated by entrainment by the strand, i.e. can be entrained rollers, or can be driven. In the latter case, the rollers can be provided with controllable rotation drives individually or collectively.
When a highly intense cooling is to be effected, it has been found to be advantageous between neighboring pressing rollers to provide nozzles for directing a coolant onto the rollers or directly onto the strand between the rollers.
The apparatus has the advantage that a relatively thick and broad synthetic-resin strand can be treated easily and simply such that only minimum thickness tolerances will result or can be maintained and that the strand and the plates formed therefrom are completely free from any tendency to warp, bulge or otherwise distort because of internal stresses. The strands can have a thickness of 60 mm and more without difficulty.
BRIEF DESCRIPTION OF THE DRAWING
The above and other objects, features and advantages of the present invention will become more readily apparent from the following description, reference being made to the accompanying drawing in which:
FIG. 1 is a side-elevational view of an apparatus for the calibration and straightening of a plate-shaped synthetic-resin strand in accordance with the present invention, the parts of the apparatus being shown diagrammatically;
FIG. 2 is a detail-elevational view of a roller stand in the region II of FIG. 1, drawn to an enlarged scale but also illustrated diagrammatically;
FIG. 3 is a view similar to FIG. 2 but showing the reciprocating- roller assembly III of FIG. 1;
FIG. 4 is another view similar to FIGS. 2 and 3 but showing a further embodiment; and
FIG. 5 is a diagrammatic detail view illustrating aspects of the invention.
SPECIFIC DESCRIPTION
In the foregoing discussion and the description below, reference has been made to the calibration of plate-shaped synthetic- resin strands which emerge continuously from an extrusion press through, for example, a broad-slot nozzle or extrusion head (die). The term "calibration" is here used to refer to the establishment of a predetermined thickness of the strand.
The apparatus illustrated in the drawing for the calibration and straightening of a plate-shaped synthetic-resin strand 1 comprises an extrusion press 2 provided with a broad-slot nozzle, head or die 3 from which the plate-shaped thermoplastic strand 1 emerges in a plastically deformable state.
Downstream of the extruder 2, there is provided a cooling line 4 and a drawing device 5, the latter being formed with rollers 5a and 5b which engage opposite sides of the strand and draw the same in the direction of arrow B. The rollers 5a and 5b can be provided at the upstream end of a tunnel 5c in which the strand is cooled to room temperature and in which the strand can be cut to predetermined lengths to form slabs or plates.
Between the extrusion press 2 and the cooling path 4, there is provided a conveyor 6 which can be of the roller type, i.e. can be provided with a pair of upstream calibration rollers 6a establishing the initial thickness of the strand, and a roller table 6b upon which the strand is supported. In the region of the conveyor 6 the strand need not be self-supporting.
It should be noted further that the invention is not limited to apparatus in which the synthetic-resin strand 1 is displaced only horizontally. It is possible, therefore, to provide for a vertical withdrawal of the synthetic-resin strand 1 from the extruder head or die 3.
In any case, the synthetic-resin strand 1 should initially undergo tempering, i.e. controlled heat loss or heat gain, to ensure cooling of the strand with complete temperature homogenization throughout the latter.
In the system of the present invention, the cooling path 4 is provided with a plurality of stands 20, 21 which can be mounted on wheels 22, 23 to roll upon a floor or track 24 and permit the spacing of the stands 20 and 21 to be adjusted as required. Once the stands are positioned for a particular strand thickness and width, they can be held in place by locking devices not shown.
Each of the stands comprises an assembly of pressing rollers 7 which are integrated with cooling means and/or heating means to ensure tempering of the strand contacting the rollers to homogeneous temperature conditions. The pressing rollers are pressed against the strand from opposite sides as represented by the arrows 8.
In the stand 20 illustrated in greater detail in FIG. 2, the rollers 7 are disposed in pairs 25 which can be relatively adjusted with respect to one another by spindle assemblies 26 to vary the spacing s between the rollers of each pair. In this embodiment, the rollers are mounted in journal blocks 27 and can be either driven or entrained by the strand. In the roller stand 20, moreover, the rollers 7 are disposed directly opposite one another, i.e. the axes of the rollers of each pair lie in a respective vertical plane 28 perpendicular to the strand 1 and the direction of feed B thereof. A similar construction of the rollers 7 can be found in the roller stand 21 shown in FIG. 3.
However, as can be seen from FIG. 4, it is possible to modify the roller assemblies of each of these roller stands. For example, the initial pair of rollers 7 can be a pair 25 as previously described while the rollers downstream thereof are staggered horizontally and vertically to engage opposite faces of the strand in a zigzag or alternating manner. Each of the rollers 7 downstream of the pair 25, therefore, can be mounted between a pair of journal blocks 30 which have slots 31 within which the axes for shafts of these rollers can be vertically shifted.
The spacing A between pairs 25 of rollers 7 or between the individual rollers 7a and 7b of the assembly of FIG. 4, is adjustable in accordance with the present invention for different operating conditions, strand speeds and strand dimensions.
Downstream of the first stand 20, which can be fixed for a given cooling operation, the stand 21 is provided with means enabling reciprocation of its set of rollers 7 in a direction 10 parallel to the direction of advance of the strand 1. To this end, the rollers 7 are mounted upon a carriage 31 which is horizontally shiftable upon rails 32 of the stand 21, the carriage 31 being engaged by an arm 33 connected to a crank 34 of an oscillating drive 9 carried by the stand 21. The rollers 7 are here preferably entrained rollers when the carriage 31 is reciprocatable as described.
Between pairs of the rollers 7 or between the individual rollers thereof, air nozzles 11 can be provided to direct respective streams of air against the strand 1 and thereby further control the cooling operation.
With the apparatus described, it has been found to be possible to calibrate, cool and straighten relatively thick and wide synthetic- resin strands, which can be subsequently cut into thick slabs or plates, without the danger that the slabs or plates will warp or bulge because of internal stresses.
The oscillating movement of the rollers 7 shown in FIG. 3 has been found to give rise to an especially uniform thickness of the strand, even with extremely wide and thick plates, thereby minimizing the thickness tolerances and eliminating warping and bulging. A good surface finish is also applied to this strand and the plates produced therefrom.
In FIG. 5, I have shown various elements of the apparatus for a single roller 7 which are nevertheless applicable to all of the rollers in each of the stands described previously. For instance, the roller 7 may be provided with a tubular shaft 50 which can communicate with the interior of the roller which may be hollow so as to enable the roller 7 to be traversed by a heating or cooling stream. The shaft 50 is journaled in a path of bearing blocks 51 and 52 which can be vertically displaced by threaded spindles 53 and 54 in respective support blocks, one of which is shown at 55 and which are internally threaded. Thus the roller 7 can be displaced vertically (arrow C) relative to a support 56 for the rollers on each side of the strand.
Support 56 may be constituted as a rail assembly in which the internally threaded blocks 55 are horizontally displaceable (arrow D) by any conventional adjustment means for establishing the spacing A. Such means has been diagrammatically represented in FIG. 5 as the spindle 57.
The spindle 57 can form part of a turnbuckle assembly connecting the blocks 55 of adjacent or nearest-neighbor roller 7 on each side of the strand 1.
The shaft 50 can also be connected, e.g. via gearing 58 to a synchro motor 59, the motors of all of the rollers being energized through a conventional synchro controller 60 to drive the rollers at the desired adjustable speed if the rollers 7 are not to be of the entrained- rotation type.
The apparatus of the present invention can also include valves 61 and 62 for selectively feeding a heating fluid from a variable- temperature heating unit 63 or a coolant from a variable-temperature cooling unit 64 through the roller 7 thereby controlling the temperature of each roller so that the same can act as an integrated heating or cooling element in accordance with the principles enunciated above. | |
- Where can I get additional guidance?
E-Mail as a Record
- When are e-mail messages records?
-
You should treat e-mail messages the same way you treat paper correspondence. An e-mail message is a record if it documents the FAA mission or provides evidence of an FAA business transaction and if you or anyone else would need to retrieve the message to find out what had been done or to use it in other official actions.
- Do I have to manage incoming and outgoing e-mail as records?
-
Yes, you should apply the standard described above to both incoming and outgoing e-mail. The reason is that both sender and recipient of e-mail messages have the responsibility to document their activities and those of their organizations. Both the sender and the recipient have to determine whether a particular e-mail message is a necessary part of that documentation.
- Are e-mail systems reliable enough for transmitting official messages?
-
Yes, e-mail systems are highly reliable for transmitting messages. However, you should use e-mail for business only when you are reasonably sure that the message will not be altered after transmission. Consider the nature and sensitivity of the message, the technology involved, and the persons with whom you communicate when you decide to use e-mail for business.
- Can I use a non-FAA account to send or receive FAA e-mail?
-
No, do not use any outside e-mail system to conduct official Agency business. If, during an emergency, you use a non-FAA e-mail system, you are responsible for ensuring that any e-mail records and attachments are saved in your office�s recordkeeping system.
- Are instant messages (IM) records?
-
Yes, in certain circumstances. They are similar to e-mail messages; that is, if the messages are needed to substantiate your work, you must treat them the same way you would any e-mail record. You need to capture the text of the message, as well as who the message is to/from and the date and time. Also, due to the informal and sometimes cryptic nature of IM, it may be necessary to transcribe or capture the message in another format much as you would for a telephone conversation or other verbal communication if it is needed to document your activities. And finally, it is important to be careful if you use a non-FAA IM product to communicate with external users because it could result in unauthorized disclosure of information. See also: NARA's Frequently asked questions about Instant Messaging.
- How can e-mail be an official record if it is not signed?
-
A signature does not make something a record. Many types of records, such as manuals, reports, photographs, and maps, do not contain signatures, but they can still be records.
- If an e-mail record is sent to several recipients, which copy is the official record?
-
It depends. Different copies of the same message may be records. If you take any official action related to a message, and if the message is needed for adequate and complete documentation of the action, the message would be a record in your office, regardless of whether copies are retained elsewhere. If the record is in your office's official files, then your copy is not a record and you may delete it. If you receive a message only for information and do not take action related to it, your copy would not be a record.
- If I'm working on draft material, is it sufficient for me to save just my last draft?
-
In some cases the last draft may be sufficient, and in other cases not. Follow your Program Office's policy concerning what drafts you must keep. This policy should be available in the form of recordkeeping requirements for the type of work you are doing. The question of drafts is discussed at length in "Procedures for Managing Agency Records."
- Do these guidelines apply to FAA contractors?
-
Yes, these guidelines apply to FAA contractors and other agents, as well as FAA employees. Contract terms should ensure that contractor systems satisfy legal requirements for creating and maintaining adequate and complete records of FAA transactions when those transactions are carried out by contractors.
Retaining the Complete E-Mail Message
- Are there special requirements for retaining e-mail messages as records?
-
The basic requirements that apply to all records apply to e-mail records as well. However, there are some specific requirements for records made or received through e-mail. You should make sure that:
- the e-mail record includes transmission data that identifies the sender and the recipient(s) and the date and time the message was sent and/or received;
- when e-mail is sent to a distribution list, information identifying all parties on the list is retained for as long as the message is retained; and
- if the e-mail system uses codes, or aliases to identify senders or recipients, a record of their real names is kept for as long as any record containing only the codes or aliases. For example, if you are communicating with someone via the Internet (e.g., a grantee or researcher), and their e-mail address does not indicate who they are (e.g., the address is JerryR@...) then a record must be kept of who they are. This might be done simply by always including their full name in the body of the message.
- Why is it necessary to keep the transmission data about the sender, receiver, date and time of the e-mail?
-
You should treat e-mail messages the same way you treat paper correspondence. You would not delete the names of the sender and addressee, the date, or a time stamp from a letter on paper. The data identifying the sender and recipient(s), the time and date the message was sent, and, on the recipient(s) copy, the time and date it was received are equally essential elements that constitute a complete e-mail record.
- I'm using a distribution list for my message. How can I print the names of all the people on the list?
-
Once you have determined the message is a record and needs to be printed for the file, use the "Print" feature and print the message.
- What about attachments to an e-mail message? Do I have to keep them as well?
-
Yes, you do. If a message qualifies as part of the documentation of your activities, you need to make sure that related items that provide context for the message are maintained as well. This includes attachments. You would keep them under the same conditions that you would if they were paper attachments to a paper memo or incoming letter.
- If my outgoing message is a record, should I ask for a return receipt to make sure that the person I sent it to got it?
-
It is not necessary to ask for a return receipt or read receipt in e-mail any more than it is necessary in hard copy. We don't send all letters certified mail. If it is important to document for the record the time that a message was opened, then that receipt must be retained along with the message for as long as the message is retained. You also need to have some means of linking the receipt to the message so it is clear what outgoing message the receipt documents.
- Do I need to retain both the original message and the reply?
-
The requirement is to create and maintain an understandable record documenting activities. Some replies to e-mail messages contain enough information from the original message that they can stand on their own, but most do not. The simplest way to ensure understandability of e-mail messages that will become part of the record is to incorporate the original message in any reply and maintain them as a unit. If e-mail is sent back and forth and the most recent message has the entire sequence of messages, you need to keep only the final message (including the previous messages and replies) as long as it also contains attachments and other data such as the sender, receivers, date, and time, that are necessary for a complete record.
Maintenance and Retention of E-Mail Messages
- How long do I need to keep e-mail records?
-
Retain e-mail records in accordance with your office's file plan and the FAA records schedules. The exact length of time will vary depending on the activity that the message documents. Retentions range from thirty days to permanent.
- What if the message does not qualify as a record?
-
Delete e-mail that is not a record when no longer of use.
- Where do I keep e-mail records?
-
You must store e-mail records in an approved recordkeeping system. This system may be either paper or electronic. You may maintain them in your organization's paper filing system or electronically using FAA's electronic systems. In either case, the recordkeeping system must:
- logically relate or group records in accordance with your office's file plan;
- ensure the records are accessible to authorized persons throughout their life;
- support retention of the records for as long as required;
- facilitate destruction of records on schedule; and
- enable transfer of those records which will not be destroyed to the National Archives.
- Can I keep the records in the e-mail system?
-
No. Once you determine that an e-mail message is an official record, you should ensure that it is kept in an approved file system that satisfies the requirements for recordkeeping set out in points 1 to 5 above. You may, of course, retain your personal copy in your personal e-mail, but you must ensure that the record is placed in an approved file system.
-
The one exception to this is for e-mail records that are "transitory" (i.e., documents of short-term interest which have no documentary or evidential value) and have an approved retention of 180 days or less. You may maintain a transitory record in the e-mail system until it's retention has expired, as long as your organization has not established other recordkeeping requirements or procedures for those transitory records.
- Can e-mail records be kept on backup tapes or disks?
No, backups created to facilitate restoration of a system or file in case of accidental or unintentional loss are generally ill-suited for recordkeeping purposes.
- Do I need to retain both an electronic and hard copy for the same e-mail message?
No, if you retain the entire record in either form, and it is properly filed in an approved file system, you do not need to retain both electronic and hard copies.
Access to E-Mail Messages
- Does FOIA apply to e-mail messages?
-
Yes, e-mail is subject to the FOIA, and its release is subject to the same FOIA exemptions that apply to other Agency records.
- What do I do about e-mail messages that contain sensitive information, such as classified, proprietary or Privacy Act information?
-
If you receive e-mail containing sensitive information, apply the same standards and precautions to the e-mail containing sensitive information as you would to the same information in any other medium. However, you should not use the e-mail system to transmit messages that contain confidential business information, information covered by the Privacy Act, or other sensitive information. At the time of this writing, e-mail systems are not considered as secure or private as the U.S. Postal Service, and don't have the same legal protections.
Where can I get additional guidance?
Contact your Records Management Officer (RMO) for more information.
If you have policy questions about e-mail as a record, you should contact your RMO.
You can find additional guidance in the following publications: | https://www.faa.gov/about/initiatives/records/faq/email/ |
It is impossible to consider Open Licensing options without looking closely at Creative Commons. They are widely used in licensing scholarly papers and books, and are flexible enough to cover a wide range of works, such as photographs, music and even software. Among the advantages of Creative Commons licences are:
- Easily recognisable symbols to show which licence has been applied
- Each licence is explained briefly on the Creative Commons website but is also backed up by a full licence document which is likely to be recognised by a court of law.
- Licences are updated and supported by the Creative Commons organisation.
The CC BY Licence (attribution licence)
The premise with all CC licences is that authors choose them because they want to make their work available for reuse with minimum formality or restrictions. The simplest and most generous Creative Commons licence is the CC BY or attribution licence.
The requirements are: Correct attribution of author (or authors) and title, reference to and a link to the licence and a link to the original source (where reasonably practicable). There are no restrictions on commercial reuse or derivative versions. The work can be used in a mash-up, translated into other languages for example or recreated in a different medium. You must however indicate where changes have been made.
It may seem that the author (generally the original copyright owner) is giving up a great deal of control by applying a CC BY licence to their work and the licence is certainly broad. On the other hand:
- The author retains ownership of copyright. In traditional journal and book publishing the author is often asked to assign their copyright, leaving them with no control over the reuse of their paper. The author of a CC licensed work may go on to reuse it as they wish
- The attribution requirement ensures that the author is recognised as such and credited using the wording of their choice.
- Using the CC BY licence does more to maximise the possibilities for reusing the work than the more restrictive alternatives. That has advantages if you want your work to be as widely known as possible.
Other CC licences
The other licences offer more restrictive options for authors who are concerned about some possible reuses of their work.
- The CC BY-NC Licence can be used by authors who don’t want their work to be used for commercial purposes, although they wish to encourage its reuse in a non-commercial environment.
- The CC BY-ND Licence provides an alternative for authors who want their work to be reproduced only in its original form, not reworked, simplified, translated etc.
- The CC BY-SA or “Share alike” licence stipulates that if their work is used to create a further derivative work, then if the new work is made available to the public, it must be made available under the same licence, CC BY-SA. This would appeal to those authors who see this as a way of furthering open access by ensuring any works which build upon their original work are similarly licensed for reuse. It can be compared to the “Copy left” licences which are commonly used to licence open source software.
The restrictive elements NC, ND, and SA can be combined in the most restrictive Creative Commons licences, such as CC BY-NC-ND to offer alternatives for those with multiple concerns who nevertheless wish to encourage reuse of their work and make it available in an open access environment.
Choosing a CC Licence for your work
Deciding which of the licences to choose may not be entirely a matter of personal choice. If your research is being funded by an external organisation, the funder may specify which licence should be used when publishing the outcomes of that research. It is important to look closely at the terms of your funding agreement and the funder’s policies to ensure you are compliant. There is more information and links to funders’ policies on UCL’s open access webpages.
The more restrictive CC licences may provide an answer if for example you are concerned about your work being reused for profit, but the boundaries of “commercial” and “non-commercial” may not be obvious on every occasion. Similarly, people may hesitate over what is or is not a “derivative work.” You may be discouraging reuse unnecessarily.
Although one of the pluses of Creative Commons licences is the author’s clear retention of copyright, an important point to bear in mind is that you can’t retract a CC licence once offered. You can certainly take the work down from your website but you cannot prevent anyone reusing your work under the relevant licence once it has been made available under the licence. Failure to appreciate that has resulted in at least one court case concerned with reuse of an image.
The CC0 Licence
This is an alternative to the CC BY licence. The CC0 licence makes it clear that the licensed work can be reused without any attribution. It is sometimes described as placing your work in the “public domain,” comparable to works which are out of copyright. Using the term “licence” is a little misleading. It is not so much a licence to reuse a work, more a way of removing any copyright restrictions in your own work. This can be appropriate for datasets where the researchers wish to maximise the possibility of reusing their data, unhindered by copyright. For example, it may be thought that the attribution requirement of the CC BY licence would inhibit text and data exercises because it would be difficult to fulfil while carrying out Text and Data Mining (TDM).
Reusing CC licensed material
The CC licences are quite flexible. For example, there is usually more than one acceptable way of incorporating the attribution information. Although CC licensed works are available for reuse, it is important to bear in mind that you must make a reasonable effort to comply with the licence terms. Otherwise, you may be pursued by the copyright owner. One should take as much care as when reusing any other copyright-protected material. | https://blogs.ucl.ac.uk/open-access/2021/10/28/ |
You will be responsible for the crewing of the multiple live events, ensuring gallery crews are prepped, prepared and clear on the requirements of the live productions being broadcast. As one of the key communicators within the department you are responsible for ensuring that all relevant contributors have the latest information, and everyone is fully informed on the day’s live events.
This role will require weekend and evening work, but predominantly standard office hours will apply. Flexibility is key and from time to time there may be a requirement to work on location internationally.
Responsibilities
- Book, roster and schedule freelance crews.
- Assist production managers with finding required crew ensuring the right person is hired for the role.
- Manage Booking Coordinators daily duties, ensuring constant high standard of work and efficient and effective time management.
- Create supportive documentation for clients, production teams regarding crew availability.
- Liaise with clients, third party production companies and internal production teams to ensure the highest level of support is supplied from booking through to live delivery
- Support client’s requirements during the production process, ensuring resources and editorial aspirations are achievable.
- Work alongside Engineering, Technical and Audio Supervisors to ensure that live events set up and testing requirements are covered.
- Create, review and provide monthly budgeting feedback on production spend.
- Track Freelancers expenses and report actuals monthly to the Facility Production Manager and production clients
- Maintain a healthy and happy pool of freelancers.
- Contribute to the development of training plans to deliver staff and freelancer training requirements as necessary
- Identify key development opportunities for improved workflows, and enhanced reporting.
- Promote sharing of best practice and process change opportunities to support an efficient and effective department. | https://stemwomenevents.com/job/44879676/14/production-bookings-supervisor |
"Time Limit - The Human Auction Begins" is the 395th episode of the One Piece anime.
Short Summary
The human auction finally begins, and it is only then that the Straw Hats discovered that their mermaid friend is being sold off at Grove 1. After rendezvousing there (save for Zoro, Luffy, Brook, Usopp, and Robin), their initial plan to extract Camie is thwarted upon learning that the World Government and the Celestial Dragon are involved in the slave trade, so Nami decides that they'll buy Camie back in the auction itself. Meanwhile, the rest of the Archipelago receives news that the World Government is going to execute the captured Portgas D. Ace, a move that could provoke a war with Whitebeard.
Long Summary
At the Marine Headquarters, a soldier reports to Vice Admiral Garp that Silvers Rayleigh is one of the slaves to be auction off at Sabaody Archipelago, making him burst into laughter. Garp says that he will handle the situation himself and orders him and his subordinate not to mention the matter to anyone else. Although the soldier is not very sure of the information, Garp is certain that it really is Rayleigh, and cautions against going up the Dark King unprepared. At the Human Auctioning House, Disco starts the auctions. The first slave is sold for 600 thousand belly. Disco seems to be in conspiracy with some of the bidders in the audience, jacking up the price. Sanji is shown the market price for the different type of slaves, which angers him. The rest of the Rosy Life Riders are still desperately searching for news concerning Camie. Usopp talks to the man who caught the giant slave and finds out that a mermaid has been brought to the auction house. They inform the rest that the kidnapper is Peterman and tells them about Camie's current location. With this, the riders head towards the auction house.
Zoro is surrounded by pirates with their swords drawn, wondering where is Grove 1. A pirate attempts to attack but is frightened by Zoro’s glare, dropping his sword and pointing him in the right direction instead. Duval inquires about the information of the auction and reassures Sanji, saying that a mermaid would be the main attraction and Camie would definitely be saved for last. Sanji is frustrated at their speed but Duval claims that he has been heading for Grove 1 from the beginning and therefore, would be the first to arrive as he is their leader. However, Chopper arrives just before them and Sanji hits Duval. Franky arrives to see some of his crewmates demanding for the return of Camie from the staffs but they refuse. Franky wants to break her out and prepares to attack the house. However, he is stopped by Hatchan as there are Celestial Dragons inside. There is also the matter of the exploding collar that is on Camie. Chopper stops Sanji from attacking the staff while Nami resolves to get Camie back through their system. They enter the house and Heat brings their arrival to Eustass Kid’s attention, who notes that Luffy is not present. The Straw Hat Pirates glare angrily as the auction proceeds. Nami calculates that they should have 200 million worth of treasure onboard and Hatchan says that it should be sufficient but he does not have the means to repay them. Nami states that to get their friend back, money is not an issue and the rest of the crew agrees.
Around the island, newspapers are being distributed to the inhabitants, who are alarmed at the breaking news. X Drake informs his crew that Fire Fist Ace is about to be executed, shocking them all. He states that there is going to be a war, as Whitebeard would surely retaliate against the World Government. The remaining Straw Hats head towards the auction house, while Camie is approached by the staff of the auction house.
Characters in Order of Appearance
- Monkey D. Garp
- Disco
- Silvers Rayleigh
- Camie
- Lacuba
- Pascia
- Byron
- Rosward
- Trafalgar Law
- Eustass Kid
- Motobaro
- Duval
- Sanji
- Nami
- Nico Robin
- Franky
- Tony Tony Chopper
- Brook
- Monkey D. Luffy
- Usopp
- Pappag
- Roronoa Zoro
- Hatchan
- Devil Dias (flashback)
- Killer
- Wire
- Heat
- Scratchmen Apoo
- Jewelry Bonney
- Urouge
- Capone Bege
- Basil Hawkins
- X Drake
- Portgas D. Ace
- Edward Newgate
Anime Notes
- This is the first episode to use Share the World as the opening. | https://onepiece.fandom.com/wiki/Episode_395 |
The World Yoga Alliance has set a widely-accepted international standard for Yoga Teacher Training (YTT) programs which includes a minimum of 150 contact hours across basic areas such as Techniques, Teaching methodology, Asana Alignments & Anatomy, Philosophy (Including lifestyle and ethics),
ReviewsWrite review
Teachers
-
Master Dharm Ji
Core Subject: Hatha Vinyasa
Guru Dharm has yoga teaching experience more than 17 years. He has a Ph.D. in “Human Consciousness and Yogic Science” from GKV University, Haridwar (India). He is also pursuing the master degree in “Human Consciousness and Yogic Science”.
Location
This yoga teacher training will take place in Chiang Rai, Thailand. It is the farthest north of Thailand, 785 kilometers from Bangkok and borders Myanmar in the north and Laos in the east. Chiang Rai is a fascinating province filled with cultural and natural wonders.
Therapy and teaching practicum. Here is how we implement these teaching areas in our training.
Practice of traditional Hatha yoga asanas
- Surya Namaskar and Chandra Namaskar (sun and moon salutations)
- Bhujanga Namaskar series (cobra salutation)
- Basic, intermediate, and advanced Hatha yoga asana sequence includes about 88 positions
- Yoga for beginners: basic preparatory joint movements to warm up and prevent injuries
- Yoga class sequence for therapy
- Sanskrit names of all asanas (positions)
Pranayama, 'control of the prana science'
- Swara yoga introduction (Swara Vigyana)
- Nadi shodana pranayama (alternate nostril breathing)
- Anulom Vilom pranayama
- Kapalbhati pranayama (cleansing breaths)
- Bhramari pranayama (humming bee breath)
- Yogic (conscious) breathing technics
- Discussion on bad breathing habits and correction technics
- Ujjayi Svasa (victorious breath)
Mantras chanting: building awareness with divine vibrations.
- Gayatri mantra
- Guru mantra
- Seed mantra for chakras: relaxation, purification, and activation
- 5-element mantra
- Surya Namaskar mantra
Tri Bandhas (yogic locks)
- Moola Bandha
- Uddiyana Bandha
- Jalandhara Bandha (throat lock)
- Maha Bandha (the great lock)
- 3 Granthis
Theory of traditional yoga systems
- Yoga introduction
- History of original yoga and lineage
- History of Hatha yoga and lineage
- Functions of 7 chakras (energy centers)
- Pranayama science technics and 5 prana
- Original Ashtanga yoga by Patanjali
- Introduction to Vedas, Upanishads, Bhagavad Gita, Yoga Sutras, Ayurveda, and the Hatha yoga tradition
- Yoga Hand Mudras
Meditation technics
- Kundalini and chakra meditation
- Walking meditation
- Dynamic meditation
- 5 prana meditation
- Observation and awareness technics
- Yoga Nidra relaxation technics
Yoga teaching principles
- Characteristics of a good teacher
- Lesson planning
- Principles of demonstration and observation
- Classroom safety
- Assisting, modifications, correcting, instructing
- Finding your own teaching style
- Ethical guidelines for yoga teachers
- Student teaching practicing and observing
- Assisting in classes taught by others
- Basic healthy yogic lifestyle
Anatomy and physiology
- Anatomy of pelvic bone and Muscles the foundation of the body on yogasana (hip bone and yoga)
- Anatomy of shoulder bone / muscles and yogasana
- Psychic Physiology of yoga: Ida, Pingala, Sushumna (Nadi)
Course exam details
- First paper: yoga theoretical exam
- Second paper: oral exam
- Third paper: asana practical
Daily schedule:
- 07:00 AM - 7:30 AM Meditation & Mantra Practice (Spiritual Growth)
- 07:30 AM - 10:00 AM Yoga Practice of Asana, Pranayama, Nauli & many techniques
- 10:00 AM - 1:00 PM Brunch & Free time
- 1:00 PM - 02:30 PM Yoga Theory Class
- 03:00 PM - 03:30 PM Yoga techniques & Therapy discussion
- 03:30 PM - 05:30 PM Yoga Techniques and Practicums (Alignment)
- 06:00 PM - 06:30 PM Dinner
- 07:00 PM - 08:00 PM Kirtan and Transformational Experiences
Tuesdays and Thursdays :
- 8:00 PM - 10:00 PM Self Study Time (Yoga theory and homework)
- 09:00 PM Silence begins and held until end of breakfast next morning
- 10:00 PM Lights out
* Sunday will be a day off.
During this yoga teacher training, you will stay at Adinath Yoga Ashram. Adinath Yoga Ashram is an on-going project with a lot size of 5 acres. Embraced by exquisite farmlands, soothing lakes, and stunning hills as the backdrop, Adinath ashram offers a shared room which is having two bedroom.
We select organic raw, then cook in Thai and Indian Style. You can enjoy every meal in the yoga ashram according to the healthy yogic diet.
Adinath Yoga Ashram provides only vegetarian food. You can have your fresh and clean meal every day with the yoga family.
If you are a beginner in yoga and want to know all authentic yoga, you are invited to this 200-hour yoga teacher training in Chiang Rai.
This is based on Hatha and original Patanjali style (mindfulness) programs including the practical and theoretical part. It is designed to make you a confident and effective yoga teacher.
- Many activities here such as hiking, cycling, strawberry farm, Keang Doi Cafe (country side style), Night Market, Walking street Chiang Rai, and more
- Friendly staffs
- Accommodation still local style but comfortable
- Delicious vegetarian food
- WYA 200 Hour certificated
Adinath Yoga Ashram
We are an Indian Yoga Ashram, located in a beautiful region of Chiang Rai in Thailand. Surrounded by nature and many activities around.Certified and Registered with World Yoga Alliance. You are welcome to join our Hatha Vinyasa yoga sessions, therapy Yoga Teacher Training Course or simply enjoy your holidays at our beautiful retreat center. | https://www.retreatkula.com/adinath-yoga-ashram/200-hour-hatha-yoga-teacher-training-program-in-thailand |
The Client wanted to create the solution ready for production ASAP, but due to a lack of resources it was challenging. To overcome the challenge the Intetics team was engaged. During the cooperation process, a lot of performance issues were solved and architectural improvements were implemented.
Industries
- Agriculture
- Automotive and Manufacturing
- Digital Workforce
- Education and eLearning
- Energy, Oil & Gas
- Finance, Payments and POS
- GIS and Geospatial
- Healthcare and Life Sciences
- Hi-Tech and Software Platforms
- Insurance
- Media and Publishing
- Real Estate and Construction
- Retail and eCommerce
- Travel, Transportation and Logistics
- Communications and Networks
Download Case Study
This site is protected by reCAPTCHA
To get the full version, please fill out the form with your contact details for registration: | https://intetics.com/industries-category/real-estate-and-construction/ |
BACKGROUND: Data suggest that delays in discharges from inpatient units affect hospital throughput and contribute to emergency department crowding. Lean/Six Sigma (LSS) has been shown to improve inefficiencies in other industries. There are no published data on what impact LSS can have on advancing and sustaining earlier patient discharges. OBJECTIVE: Determine the impact LSS has on advancing times of placement of discharge order and patient discharge compared to control. Secondary outcomes were length of stay (LOS) and readmission rates. DESIGN: Prospective quality study with concurrent controls. SETTING: Academic medical center. PATIENTS: Hospitalized pediatric patients compared to remainder of the children's hospital services. INTERVENTIONS: Staff reallocation, creation of standard workflow, multidisciplinary predischarge planning, and creation of a discharge checklist. MEASUREMENTS: Median time of discharge order entry and median time of actual patient discharge, proportion of patients discharged before noon and 2 pm, and LOS and readmission rates. RESULTS: The median time of order entry was 10:45 compared to 14:05, and the median time of discharge was 14:15 compared to 15:48. The LOS and the readmission rates remained the same in both cohorts. The control group had faster baseline discharge order entry and patient discharge, but discharge performance did not improve, despite a significantly lower average daily census. CONCLUSIONS: We determined that Lean approaches can have an immediate and sustained impact on advancing patient discharges, with no negative affect on LOS or readmission rates. Our intervention generated consistent results independent of personnel during the busiest months of the year at a tertiary care children's hospital. | https://pennstate.pure.elsevier.com/en/publications/redesigning-an-inpatient-pediatric-service-using-lean-to-improve- |
JACKSON, Miss. (AP) — Officials approved plans Friday to spend $627 million on 44 projects meant to aid recovery from the 2010 oil spill in the Gulf of Mexico, but environmentalists are fuming that $58 million will go to an Alabama beachfront hotel they say will hurt rather than help the Gulf.
BP PLC provided $1 billion in 2011 as a coastal restoration down payment following the Deepwater Horizon spill. The money is meant to restore the environment or improve public access to the Gulf.
Trustees, including the five Gulf states and four federal agencies, had to reach consensus on the plan. Two earlier phases totaling $71 million were already approved, and BP will likely have to pay more after environmental fines are levied.
The single biggest sum, $318 million, will go to restore land and marsh on four barrier islands off Louisiana's rapidly eroding coast: Chenier Ronquille, North Breton Island, Shell Island and Whiskey Island.
"When we rebuild barrier islands like North Breton, we're also strengthening coastal resilience, making a smart long-term investment in the face of climate change and increasingly frequent storms," U.S. Interior Secretary Sally Jewell said in a written statement. Jewell toured the island last year.
There's also a $65 million series of "living shorelines" projects in Alabama, Florida and Mississippi aimed at reducing erosion, creating oyster reefs and restoring marshes. The largest of those is a $50 million, 6-mile breakwater of stone and oyster shell in Mississippi's Heron Bay.
Environmentalists remain unhappy about Alabama's plans to spend $85.5 million at its Gulf State Park in Gulf Shores. Some of that money will help restore 50 acres of dunes at the park. But $58 million will go toward replacing a beachfront hotel that was destroyed by 2004's Hurricane Ivan and building a conference center. State officials have long sought such a development to encourage more convention business.
The trustees, in their final report, rejected claims that the state park hotel would hurt the environment, saying construction would be confined to the disturbed area where the former hotel stood. They wrote that the "project represents a significant step toward replacing the substantial recreational services lost during the oil spill." They also asserted it would not need a separate environmental impact statement, despite concerns that its construction might harm endangered beach mice and sea turtles.
Jordan Macha, a policy analyst for the New Orleans-based Gulf Restoration Network, said the environmental group is considering options to further oppose the hotel.
"We are disappointed," she said. "We don't think they fully addressed all the environmental concerns we have raised numerous times."
An Alabama official did not respond to requests for comment Friday.
Like Alabama, Florida is spending most of its money on enhancing recreation. Ashley Williams, a spokeswoman for the Florida Department of Environmental Protection, called it appropriate.
"All the projects have to have a nexus to the spill," she said. "Florida's greatest impact was lost human use."
About $300 million of BP's $1 billion remains, raising questions about whether more projects will be approved before BP and the federal government agree how much the company must pay for environmental and recreational damage. The Natural Resource Damage Assessment process is separate from Clean Water Act fines, but agreements on both could be reached in a comprehensive settlement.
The $18.6 million in projects approved Friday are the first for Texas, even though each state has $100 million to spend.
"My sense is that we will have an additional phase or phases of early restoration and all of the trustees remain committed to spending all of the $1 billion," said Tom Harvey, a spokesman for the Texas Parks & Wildlife Department.
Follow Jeff Amy at http://twitter.com/jeffamy. Copyright 2014* Associated Press. All rights reserved. This material may not be published, broadcast, rewritten, or redistributed. | http://www.tlgnewspaper.com/627m-in-gulf-oil-spill-recovery-projects-approved |
Come see an exhibition on how to express science creatively outside of the Facility for Rare Isotope Beams (FRIB). We created groups of collaborations with individuals of different fields. Through this program, artist/scientist teams (or individuals) created a piece of artwork that expresses a concept in science and have the chance to display their artwork in the community in Fall 2019. The theme of the MSU SciComm 2019 Science-Art Exhibition is "Life".
From 2:00 pm-4:30 pm the 2019 MSU SciComm Live Science-Art Show at the Wharton Center will be live streamed in the FRIB Auditorium. Seats will be first come first serve. Priority seats will be given to MSU SciComm members.
To become a member you can contact [email protected] or Venmo @MSUSciComm. | https://www.msuscicomm.org/events/msu-science-art-exhibition |
Although Final Cut Pro is designed to work with the Soundtrack software for major sound editing, Apple’s video editing software can easily handle minor sound edits. While noise reduction and the like are the realm of Soundtrack, level adjustments, time trims and such can be dealt with in the Final Cut Pro Timeline. Read on to learn edit soundtracks in Final Cut Pro.
Instructions
1. Drag the sound file from the asset list in the top left corner of the screen onto the Timeline.
2. Select the “Razor Blade Tool” from the buttons to the right of the Timeline to trim sound files. Play the sound file in the Timeline and stop the “Scrollhead” (yellow triangle and line showing the frame being played on the Timeline) at the place for cutting by pressing the space bar.
3. Adjust the Scrollhead to the exact frame to cut by using the arrow keys. Bring the cursor (shaped like a single-edged razor blade) to the Scrollhead’s line, and click to cut. Select the pointer (arrow at the top of the buttons on the right side of the Timeline), and use it to select and delete the trimmed portions of the file.
4. Move the sound file to the correct position in the same way video clips are moved.
5. Adjust the sound level by double clicking the sound file in the Timeline. The sound file will be shown on the Viewer window, and the level can be adjusted by changing the value of the decibel measurement (which usually starts at 0dB) in the measurement window at the top of the Viewer window.
6. Add audio transitions to fade from one sound file to another.
7. Render the project to apply audio edits. Save the project often. | http://video-editing.zz.vc/edit-soundtracks-in-final-cut-pro/ |
[Ben Bartlett] recently got engaged, and the proposal had a unique bit of help in the form of a 3D-printed hexagonal mirror array, whose mirrors are angled just right to spell out a message with the reflections. A small test is shown above projecting a heart, but the real deal was a bigger version reflecting the message “MARRY ME?” into sand at sunset. Who could say no to something like that? Luckily for all of us, [Ben] shared all the details of what went into designing and building such a thoughtful and fascinating device.
Essentially, the array of mirrors works a bit like a projector. Each individual reflection can be can be thought of as a pixel, and the projected position of each can be modified by the precise angle of each mirror. With the help of some Python code, [Ben] calculated the exact angles needed to spell out “MARRY ME?” and generated the necessary 3D model. A smaller-scale test (shown in the header image above) was successful, and after that it was just a matter of printing the array and gluing on some mirrors.
Of course, that’s the short version. In practice there were quite a few troublesome issues that demonstrated the value of using early tests to discover hidden problems. For one thing, mirror angle and alignment is crucial, which meant that anything that could affect the shape of the array was a potential problem. Glue that expands or otherwise changes shape as it dries or cures could slightly change a mirror’s angle, so cyanoacrylate (CA) glue was preferred. However, the tiniest bit of CA glue will mess up a mirror’s surface in a hurry, so care was needed during assembly.
Another gotcha was when [Ben] suddenly realized, twenty hours into printing the final assembly, that the message needed to be reversed! As designed, the array he was printing would project “?EM YRRAM” and this wasn’t caught during testing because the test pattern (a heart) was symmetrical. Fortunately there was time to correct the error and start again, but it was close. [Ben]’s code has an optional visualization function, which was invaluable for verifying that things would actually turn out as expected. As it happens, the project took right up to the last minute to complete and there wasn’t quite time to check everything 100% before the big moment, but it all turned out alright. What’s life without a little mystery and danger, anyway?
The pictures are great, but you won’t regret taking the time to read through the project page (don’t miss the annotated Python code) because [Ben] goes into just the right level of detail. The end result looks fantastic, and makes an excellent keepsake with a charming story. | https://aws.rekinh.com/hexagonal-mirror-array-hides-hidden-message/ |
Majors in Africana Studies use a variety of approaches to explore and better understand the experiences of African, African American, Afro-Latin, Afro-Caribbean and Afro-European populations in a global context. This interdisciplinary major employs analytical tools from fields such as sociology, psychology, literature, anthropology, politics and history to explore important social issues facing people of African descent, from continental Africa and throughout the African Diasporas.
Official high school transcripts, Common Application School Report, Letter of recommendation, The Common Application including writing prompts and information specific to UC, Test scores: ACT, SAT, IELTS, TOEFL. | https://www.gotouniversity.com/programs/bachelors/united-states-of-america/ethnic-studies/african-studies/university-of-cincinnati/ba-africana-studies |
SIMILAR ARTICLES & IDEAS:
When we do something out of force, even though we don’t want to do it, it creates stress, and feels uncomfortable and difficult.
When we procrastinate, we feel guilty becau...
Most of us believe that we have to feel in the mood to do something: we should be excited and concentrated and the activity should be easy, fun, comfortable.
That results in running from the things that feel hard, overwhelming, uncomfortable.
When you feel overwhelmed by the mountain piled tasks you have to do, the first thing to do is to make sure you organize the tasks according to their urgency level.
Remember to reorgani...
How you perceive your task list is how your brain will respond to your perception. If you see your task list as overwhelming and scattered your brain is going to allow itself to think that it is like that
However, if you shift your perception and think of it as something you're doing because it is important to you or because you want to take the time to cultivate your self, hobbies, or anything in your task list, the brain will allow itself to rewire and adjust to that perception.
Providing full focus towards your tasks will energize you to finish right away and the pile of tasks will decrease one by one. If you notice the urge to do something else, breath and let go of the thought of doing something else, and focus back to the task on hand.
Give yourself time to adjust and get your focus on. Once you see the progress you're making, you'll be thanking yourself.
When we are not interested to take action, and we're feeling no motivation to do a certain a task, it means we are not connected to some possibility in our lives. If we get clear on that possib...
After you've identified and committed to your possibility, it’s important to bring structure into your daily schedule.
This can take many forms:
Connecting to possibility and creating a daily structure are important steps , but then you have to actually put it into action. This step is crucial.
Take on the hard tasks, in small chunks. Check things off your list, while feeling the meaning and possibility you’re creating. | https://deepstash.com/idea/64501/steps-to-be-less-annoyed-by-others |
Originally released for PC back in 2016, The Way’s Kickstarter success was fuelled by an affection for iconic puzzle-platformers Another World and Flashback. Those Delphine Software games appeared on multiple platforms in the early '90s and drew attention with cinematic narratives and a distinctive art style. Following an...
About The Game
The Way Remastered tells a story about a member of a space explorer’s team who lost his beloved and cannot accept her death. During one of his expeditions, he discovers ancient writings that testify the existence of a method for obtaining eternal life. Hoping to get his beloved back, he decides to return to the alien planet. However, the planet hides many secrets and dangers that he must face.
A story-based puzzle-platformer with stunning graphics and a soundtrack made by Panu Talus.
- Immerse yourself in the amazingly detailed world of 200 screens filled with alien flora and fauna
- Feel the rush of adrenaline as you experience challenging gameplay in this retro-style adventure
- Uncover the mysteries surrounding the planet and learn the story through beautiful visuals and an atmospheric soundtrack
- Gain new abilities to help you get around the planet and solve mind-bending puzzles.
Main additions to the remastered version: | https://www.nintendolife.com/games/switch-eshop/way_remastered |
What happens if the settlor expresses clear intent to amend her trust, but fails to sign the written amendment before she passes? This scenario recurs with some frequency and estate planners should bear in mind that, depending on the language of the governing instrument and the circumstances, non-execution affirmation of the amendment may be sufficient. If that occurs, the Trustee will have a duty to administer the trust as amended and commonly will petition the Court to declare the oral amendment effective.
Both the MA and NH Trust Codes provide that a revocable trust may be amended by complying with an amendment method set forth in the trust and any other “method manifesting clear and convincing evidence of the settlor’s intent” with the qualification in NH that the trust must “not expressly prohibit… [such other] methods.” M.G.L. c. 203E § 602 (c)(2); RSA 564-B:6-602(c)(2). While trust instruments commonly prescribe amendment methods, such as delivery of a writing signed by the settlor to the trustee, they less often prohibit other amendment means, raising the prospect of potential amendments by such means.
We confronted this situation in The Judith E. Tierno Revocable Trust of 2003. While a hospital patient, Tierno, who was both the settlor and co-trustee, advised her fellow trustee that she wished to amend her trust to disinherit nephews and a niece. This trustee then advised counsel who went to the hospital and confirmed with Tierno the amendment instructions. Unfortunately, when counsel returned with the draft documents, Tierno was not able to participate in meaningful discussions and ultimately passed before they could be signed.
On behalf of the now sole trustee, who was quite familiar with Tierno’s intent, we petitioned the Probate Court to declare the oral amendment valid. The would-be disinherited relatives moved to dismiss, arguing in part that the following trust provision set forth the exclusive amendment method:
This trust agreement, and any amendments hereto, shall be effective when executed by the Grantor, notwithstanding that the signature of the Trustee is provided for, the Trustee’s signature being intended to denote the acceptance of the Trustee to serve in that capacity only
The relatives argued that the trust thus contemplated and required an amendment “executed by the Grantor.” In opposition, we argued that the above language was not exclusive and, therefore, the trust could be amended by other means per the UTC.
In an Order dated March 21, 2013, the Probate Court (Weaver, J.) agreed with our position, denying the Motion to Dismiss:
Section 6-602(c) of the Uniform Trust Code as adopted in New Hampshire allows the amendment of a trust “by any method manifesting clear and convincing evidence of the settlor’s intent if the terms of the trust do no . . . expressly prohibit methods other than methods provided in the terms of the trust.” Given this language, the statute contemplates that a trust may be amended in any number of ways so long as those methods are not expressly prohibited by the trust and there is clear and convincing evidence that the settlor intended to amend the trust.
The case law in this area, although limited, supports this conclusion. In the case of In re Wendland-Reinter Trust, 677 N.W.2d 117 (Neb 2004), the Court noted that the modern trend in trust cases is to allow an amendment to a trust by any method so long as the amendment is established by clear and convincing evidence as the intent of the settlor, unless the trust provides an exclusive method for amendment. See id. at 701-02 citing Restatement (Third) of Trusts § 63(3) at 443, Unif. Trust Code § 602(c)(2)(B).
Here, the Trust does not contain language stating that the only way it may be amended is by a writing signed by the settlor. In section 16 of the Second Amendment and Restatement of the Trust, the language reserves to the settlor the right to amend the trust by filing notice of the change with the trustee, which in this case would have included Ms. Tierno as a co-trustee. Although Paragraph 19 provides that the amendments are effective when executed by the Grantor, it does not specifically exclude any other method of amendment. Given the general and broad language contained in Paragraph 16, and the provisions of RSA 564-B:6-602(c) requiring that a trust “expressly” prohibit those methods not provide din the trust, this Court finds that the plaintiff has pled sufficient facts which, if proven as true, would permit the relief sought.
Order, pp. 3-4 (emphasis added).
Death or disability may intervene to prevent a client from signing a clearly intended trust amendment. If that occurs, counsel should evaluate whether the trust instrument expressly prohibits a non-execution amendment, and, if it does not, whether the trustee should treat the client instructions as an effective amendment and/or petition the Court for declaratory relief. | https://www.probatetrial.com/trust-amendment-by-methods-not-provided-in-trust-instrument/ |
Q:
JavaFX - FadeOut --> Switch Stage
I have been searching around the internet and I can't find a answer to my question, so I will try to make it myself and hope for the best!
I have a primarystage which provides a Welcome and then fades out, but I want to switch stage in that moment that the fade is gone! Do anyone have a answer to this?
The small code below to get a better understanding:
import java.util.Timer;
import java.util.TimerTask;
import javafx.animation.FadeTransition;
import javafx.application.Application;
import javafx.geometry.Insets;
import javafx.geometry.Pos;
import javafx.stage.Stage;
import javafx.scene.Scene;
import javafx.scene.layout.BorderPane;
import javafx.scene.layout.GridPane;
import javafx.scene.text.Font;
import javafx.scene.text.FontWeight;
import javafx.scene.text.Text;
import javafx.util.Duration;
public class TextFileOPG extends Application {
private Stage switchStage;
@Override
public void start(Stage primaryStage) {
try {
switchStage = primaryStage;
GridPane root = new GridPane();
root.setAlignment(Pos.CENTER);
Text scenetitle = new Text("Welcome");
scenetitle.setFont(Font.font("Tahoma", FontWeight.NORMAL, 40));
root.add(scenetitle, 3, 2);
FadeTransition ftOUT = new FadeTransition(Duration.millis(3000), root);
ftOUT.setFromValue(1.0);
ftOUT.setToValue(0.0);
ftOUT.play();
if(ftOUT.equals(Duration.millis(3000)))
{
loggedIn();
}
primaryStage.setTitle("Welcome");
Scene scene = new Scene(root,350,400);
primaryStage.setScene(scene);
primaryStage.show();
} catch(Exception e) {
e.printStackTrace();
}
}
public void loggedIn()
{
switchStage.setTitle("Try");
GridPane grid = new GridPane();
grid.setAlignment(Pos.CENTER);
Text thisIsSoCoolText = new Text("Welcome Again");
thisIsSoCoolText.setFont(Font.font("Tahoma", FontWeight.NORMAL, 40));
grid.add(thisIsSoCoolText, 3, 2);
Scene scene = new Scene(grid, 350, 400);
switchStage.setScene(scene);
switchStage.show();
}
public static void main(String[] args) {
launch(args);
}
}
A:
Try using a timeline instead of a fade transition. Timeline can be used for all sorts of animations and UI updates.
Here is the code that worked for me:
import java.util.Timer;
import java.util.TimerTask;
import javafx.animation.FadeTransition;
import javafx.animation.KeyFrame;
import javafx.animation.Timeline;
import javafx.application.Application;
import javafx.event.ActionEvent;
import javafx.event.EventHandler;
final double opacity=1;
Timeline tick0 = new Timeline();
tick0.setCycleCount(Timeline.INDEFINITE);
tick0.getKeyFrames().add(
new KeyFrame(new Duration(30), new EventHandler<ActionEvent>() {
public void handle(ActionEvent t) {
root.setOpacity(root.getOpacity()-0.01);
if(root.getOpacity()<0.01){//30 divided by 0.01 equals 3000 so you take the duration and divide it be the opacity to get your transition time in milliseconds
loggedIn();
tick0.stop();
}
}}));
tick0.play();
}
}
{
}
}
}
| |
The International Panel of Experts on Sustainable Food Systems (IPES-Food), propose in a report a new policy architecture for a sustainable food system.
“A Common Food Policy can spark a wholesale transition to sustainable food systems in a way that the CAP, as a Common Agricultural Policy, cannot,” said Olivier De Schutter, IPES-Food co-chair and former UN Special Rapporteur on the right for food.
The proposal includes concrete steps forward such as: phasing out routine use of chemical inputs, introducing livestock density limits and introducing an EU-wide “agroecology premium” as a new rationale for CAP.
Besides the panel’s own expertise, more than 400 farmers, food entrepreneurs, civil society activists, scientists and policymakers were consulted during the three-year process of research and reflection. | http://airclim.org/acidnews/vision-common-food-policy-eu |
Q:
Question about additivity of integration on intervals
I was taught the following regarding integration (it's vaguely explained but my book does not go into further specifications).
If $c$ is any element of $[a,b]$:
$$\int_a^bf(x) \, dx = \int_a^cf(x)\,dx+\int_c^bf(x)\,dx$$
Today, during a lecture, the professor did the following:
$$\int_x^{\sin x}f(x)\,dx=\int_x^0f(x)\,dx+\int_0^{\sin x}f(x)\, dx$$
He argued that:
$$\int_x^{\sin x}f(x)\,dx=\int_x^{17000}f(x)\,dx+\int_{17000}^{\sin x}f(x)\, dx$$
is also correct (the point being that $0$ is not the only number with which the expression is correct but that any arbitrary number will do).
I am confused about why the last two expressions are true and how are they related to the property at the beginning. I don't see how there can be an interval $[x,\sin x]$ where every real number can be found.
A:
The first formula that you wrote down, which we shall call the original Additivity Theorem, can be generalized to the case when $ c \notin [a,b] $.
Suppose that $ c < a \leq b $. Using the definition $ \displaystyle \int_{a}^{c} f(x) ~ d{x} \stackrel{\text{def}}{=} - \int_{c}^{a} f(x) ~ d{x} $, we see that
\begin{align}
\int_{a}^{c} f(x) ~ d{x} + \int_{c}^{b} f(x) ~ d{x}
&= - \int_{c}^{a} f(x) ~ d{x} + \underbrace{\left[ \int_{c}^{a} f(x) ~ d{x} + \int_{a}^{b} f(x) ~ d{x} \right]}_{\text{By the original Additivity Theorem.}} \\
&= \int_{a}^{b} f(x) ~ d{x}.
\end{align}
Suppose that $ a \leq b < c $. Using the definition $ \displaystyle \int_{c}^{b} f(x) ~ d{x} \stackrel{\text{def}}{=} - \int_{b}^{c} f(x) ~ d{x} $, we see that
\begin{align}
\int_{a}^{c} f(x) ~ d{x} + \int_{c}^{b} f(x) ~ d{x}
&= \underbrace{\left[ \int_{a}^{b} f(x) ~ d{x} + \int_{b}^{c} f(x) ~ d{x} \right]}_{\text{By the original Additivity Theorem.}} - \int_{b}^{c} f(x) ~ d{x} \\
&= \int_{a}^{b} f(x) ~ d{x}.
\end{align}
Therefore, the Additivity Theorem holds, whether or not $ c \in [a,b] $. This means that the precise order relations among the numbers $ x $, $ \sin(x) $, $ 0 $ and $ 17,000 $ should not matter in the second and third formulae in the wording of your problem.
| |
The onshore & offshore petrochemical industry assets have a well-established, installed base of safety integrity level (SIL) rated systems. SIL is defined as the probability of a safety instrumented function (SIF) satisfactorily performing the required safety functions under all stated conditions within a set period of time. Put simply, SIL is a measure of performance required from a safety instrumented system to maintain or achieve the safety state.
However, there is a common misconception amongst end users that once a SIS is installed then they automatically have a functional, certified safety system going forwards. The reality is that from when a plant has a completed Stage 3 functional safety assessment (FSA) the SIS is only compliant until the date of the first cycle of proof testing.
Following the Stage 3 FSA, operators must follow a defined proof test schedule, performing tests as directed in the schedule and at the requisite frequency, or the SIS will no longer be compliant. More importantly, the real possibility exists that the plant is actually unsafe; as you can no longer expect that the SIS will operate correctly on demand.
Proof testing regimes must continue until decommissioning is completed, or the system is no longer needed for risk reduction. Periodic proof testing is not revalidating the SIS as a whole; it is checking that dangerous undetected failures (identified in the earlier stages of the life cycle) have not occurred, and if necessary, perform rectification measures.
Types of dangerous faults found during proof testing might include, for example, a level switch in a tank that must detect a low level (a dangerous state) sticking above this level. The level sensor spuriously indicating a low-level state is not dangerous as this is the trip state, but the switch sticking at a high level is dangerous as a genuine low level in the tank would not be signalled. Although oversimplified, this identifies the need for (and importance of) proof testing to identify faults that may have occurred and be silently awaiting a demand it cannot action.
Of course, a more effective approach to the above scenario would be to use an intelligent level transmitter that provides a level of self-diagnostics (and preferably independently certified for use at the SIL duty required). Close inspection of the device’s safety manual is required, and appropriate proof tests carried out.
To ensure effective proof testing, a good proof test procedure is required that clearly describes each test to be carried out, alongside clear pass/fail criteria, with space for recording results and signing off the system as returned to normal operation. This procedure should be developed in line with the SRS.
Defining the frequency at which the testing needs to take place and the expected rate of detection of faults (proof test coverage) provided by the proof test is part of the SIS design. The onus is then on the plant owners/operators to ensure that testing occurs to this schedule (and as per procedure). Proof testing schedules need to be considered with regards to plant operations. Plant operators need to consider whether they have the resources in-house to carry out the work effectively and, if not, outsourcing is often the most viable option.
Benefits of outsourcing proof testing
Proof tests are often carried out during plant shutdown and the lack of process product could reduce the effectiveness of the proof testing. It is important to ask the question “does your procedure actually meet the proof test coverage claim?”
Increasingly plant owners/operators are falling foul of HSE inspections by not addressing the above questions. The HSE is now paying particular attention and has specialists with an in-depth understanding of the intricacies of SIS and the requisite legislation.
With operational demands, de-manning strategies, retraining of existing in-house teams, such notices from the HSE are prompting oil & gas plants to outsource SIF proof testing to specialists to ensure the ongoing integrity of their SIS. This also provides a level of independence in the proof testing.
The benefit of outsourcing these specialist services is more than simply carrying out the tests. The first element of the service should be a thorough independent review of the actual proof testing procedures. Benefits of this include a practical review of the tests from a specialist company that understands both control systems and functional safety, ensuring proof testing procedures are realistic and can actually achieve the intended outcome.
In some cases, experts in this field have identified proof test procedures that are overly complex and ultimately unnecessary to fulfil the need of the safety life-cycle. Over testing impacts on operation by the cost of time to carry out the tests, as well as increasing the likelihood of tests not being carried out properly (or worse, not at all!).
Where proof test procedures are identified that are missing potentially dangerous faults then the basis of design may need revisiting – there is also a real possibility that the plant/process is not actually safe.
By outsourcing proof testing, plant operators can be confident that fully qualified personnel are reviewing their procedures and performing this essential service, ensuring they are compliant with all relevant legislation. Ultimately, this provides peace of mind and reduces risks.
Inspec Solutions provides a rigorous proof testing service to make sure that tests are done irrespective of customer plant demands/operator staffing. The company employs highly skilled and qualified engineers with the expertise to review procedures and perform accurate proof testing. | |
1. Field of the Invention
The present invention relates to transporting wind turbine blades. More particularly, the present invention relates to a system and method for transporting long airfoils via railroad using a weighted assembly that applies a lateral straightening force to a curved airfoil.
2. Description of the Related Art
Large-scale wind turbines are used to generate electrical power. Such wind turbines consist of a tall tower with a generator nacelle rotatably coupled about the top of tower's vertical axis. A rotor hub extends out a horizontal axis of the nacelle. Two or more turbine blades are connected to the rotor hub at right angles to the horizontal axis. During operation, prevailing winds cause the turbine blades to rotate about the rotor hub's horizontal axis. The rotational forces are coupled to a generator within the nacelle, which produces electricity. The nacelle rotates about the vertical axis of the tower to maintain the wind turbine blades in proper orientation with the prevailing winds.
The various components of a large-scale wind turbine may be manufactured at different geographic locations, and are then transported to the ultimate power generation site where they are assembled, erected, and placed into operation. Since the manufacturing operations may be spread across the world, transportation of the components to the generation site may utilize various modes of transportation, including ships, barges, trains and trucks. The various components are expensive to manufacture, and include fragile components that must be protected and handled properly during transportation. The wind turbine blades are frequently transported by rail during some portion of the transportation process.
The evolution of technology and the economies of scale have led to the development and deployment of large-scale wind turbines with larger and larger proportions. The power generation capacity of large-scale wind turbines is directly related to the length of the turbine blades, which define the swept area and power capacity of the turbine. The wind loading stresses involved during operation, and the need to keep the total mass of the turbine blades reasonably low, has lead engineers to design and build turbine blades as monocoque structures, typically employing composite materials. The lengths of wind turbine blades now exceed 180 feet, and the trend is for longer blades in the future. Transportation of long turbine blades presents significant challenges to transportation engineers, particularly in the case of railroads, where the railroad track clearance profile is tightly limited and where the trains must traverse curved sections and complex rail yards.
Another notable aspect of wind turbine blade design is the fact that the blades flex under wind loading, and thus bend backwardly from the wind. Since the blades sweep in front of the supporting tower assembly, the increased length has created an issue where the blades may be pushed into the tower and cause damage. Wind turbine blade designers have addressed this issue by building blades with a curved profile, which are curved toward the wind and away from the tower. While this has solved the basic problem at hand, it has created new challenges for the transportation process. This is particularly true for railway transport, where limited track clearance profiles will not allow a blade to extend beyond some reasonable clearance limits both laterally and vertically. Thus it can be appreciated that there is a need in the art for a system and method addressing the problems related to transportation of curved wind turbine blades as well as other long and curved airfoil devices via rail.
| |
The Tumultuous Relationship Of Paul McCartney And George Harrison
The images often reflected on musicians’ audiences are often either how glamorous their rock and roll lifestyle is or how their career makes them happy. Many musicians involved in bands eventually experienced some form of drama with their band members, which they often revealed in future interviews. Some even confessed their shocking unhappiness due to having to ‘endure’ some people for the sake of music.
Hence, it has been proven many times that the rock and roll fame and glory is not necessarily a beautiful experience for the artist. When we think about the most dramatic events regarding rock and roll in history, our minds undoubtfully go to the Beatles. They are not only the most known rock and roll figures in history but also a band that never ceases to make it to the headlines. Even before their break up, the band went through tumultuous events that mainly involved Paul McCartney, John Lennon, and George Harrison, which made Harrison hate being in the band.
Why Did George Harrison Feel Unhappy In The Beatles?
The main issue in the band was probably the fact that Paul McCartney and John Lennon dominated the band’s songwriting and composing section. George Harrison was left out of most things in the band, even if it was unintentional. However, it is also known that McCartney and Lennon would treat Harrison as their little brother and not give him much chance to speak up or present ideas.
Already feeling overwhelmed by the band’s fame, Harrison’s anxiety started to increase, and he eventually felt that there was no point in being in the band anymore. In 1969 he quit the band without hesitation because he knew he wasn’t happy anymore. Hence, in 1970, after ‘Let It Be’ was released, the Beatles disbanded, and each member continued on their solo path.
Was Paul McCartney The Main Reason For George Harrison To Quit The Band?
Pattie Boyd was married to Harrison between the years 1966 and 1977. Since she was with him when everything went down, she had previously spoken about George’s thoughts, state of mind, and feelings throughout these anxious times. She specifically targeted McCartney for being disrespectful towards Harrison.
According to Boyd, Harrison didn’t like McCartney’s personality, and it didn’t seem like they had a mutual love for each other. Their arguments made him unhappy, and she described the Beatles’ attitude towards George as pushing their ‘little brother’ into the background. At the time, Harrison had returned from India at a Zen state and could not tolerate McCartney’s behavior anymore, and the fights between the band members made him miserable.
Here are Boyd’s words:
“George saw Paul as difficult. They would tolerate each other, but I think George basically didn’t like Paul’s personality. I just think they really didn’t love each other. George was terribly unhappy. The Beatles made him unhappy, with the constant arguments. They were vicious to each other.
That was really upsetting and even more so for him because he had this new spiritual avenue. Like a little brother, he was pushed into the background. He would come home from recording and be full of anger. It was a very bad state that he was in.”
The subsequent years helped Harrison forget about the bullying he had been through while still in the band. They all ventured off into other directions and faced several tragedies. While Lennon was murdered in 1980, and Harrison died of lung cancer in 2001. Currently, the remaining two members, McCartney and Ringo Starr, are making sure their legacy survives by releasing documentaries and talking about the band’s memories in interviews. | https://rockcelebrities.net/the-tumultuous-relationship-of-paul-mccartney-and-george-harrison/ |
all photos by the author, except where otherwise noted
This article will use fresh ethnographic testimony from the Sahel concerning the role of animals as spiritual protectors during births to advance an hypothesis that figurines in several groups of stone sculptures from the south-central Sahara or the adjacent Sahel may have been used in historic, protohistoric, and even, in the case of one group (IV), prehistoric times as birthing amulets. It will also try to answer questions about the true origins of the deracinated artifacts, which have been sold with vague or even misleading proveniences by dealers in Europe and Africa (Cotter 2012). The purpose of this effort is to give researchers, institutions, and governments a better idea of where illicit excavations might be taking place, so they can refine their efforts to find the sculptures’ sources. Unless this is done with considerable urgency, the sites where the figurines are coming from will almost certainly be thoroughly pillaged, robbing both the sculptures and everything associated with them of their proper place in African history.
DETERMINING THE AGES AND ORIGINS OF GROUPS I AND II
The recent appearance of numerous anthropomorphic and zoomorphic figurines in museum catalogs (Cohen 2008:26, Leloup 2011:350) and sales literature (Levy 2006, Dartevelle 2006, Casanova and Casanova 2009) with descriptions indicating that they are Neolithic and were found in the Azawagh Valley on the border of Mali and Niger led to an effort to verify their age and proveniences (Caldwell 2013a). This investigation first led to Burkina Faso, where at least one figurine was found, rather than the Sahara. This quartzite sculpture of a bovid (Fig. 1) has three pairs of knobs along the bottom, which may represent front and back legs with appendages hanging between them. The head is as strange as the three pairs of “legs,” since the top and bottom are divided, making it look like the figurine has two merged heads—one a bit bigger than the other—although the heads have been designed to be seen as one from the sides. This asymmetry extends to the whole body, since the side with the bigger half-head is slightly more massive than the other and even has longer basal appendages, suggesting that the differences between the two sides express the sexual dimorphism of male and female cattle in a single entity. If this interpretation is correct, then the appendages between the four legs of the “double-bovine” with site data may be read as a penis from one side and udder from the other.
The iconography of the figurine, which is the sole piece in Group I of the “central sub-Saharan canon” (CSSC), as I shall call the entire assemblage, is intriguing because of:
• the use of a hermaphroditic bovine as a “symbol of the universe” in Peul (Fulɓbe, also known as Fulani) mythology (Hampaté Bâ and Dieterlen 1966:146),
• a debate over possible relationships between Peul mythology involving cattle and ancient works of art (Fouilleux 2007:180–82), and
• the existence of numerous Saharan petroglyphs showing variations on the theme of merged or double animals (Le Quellec 1993a & b:99–122).
In March 2003, the sculpture was traced back from a bead merchant in Djibo in the Yatenga region of Burkina Faso to an itinerant animal dealer, who had, in turn, bought it from a woman named Aissatou Dicko from the hamlet of Binguèl Dafèdji (Lat. 14°31'7″3 N; Long. 0°53'33″8 W) (Messili and Maurel 2004), which is 91 km northeast of Djibo. It is interesting to note, in passing, that Binguèl Dafèdji—where the woman's son, a shepherd, found the figurine on the surface of a pasture—means “child born of the Earth” in Peul. The exactitude of this provenience is particularly important because the sculpture would almost certainly have been described as coming from the Sahara, like so many other figurines that arrived in Europe via merchants in Niamey, if it had appeared without contextual evidence, since it is similar to a bovine sculpture with a somewhat split head illustrated in Eckhard Klenkler's second volume on “Saharan” artifacts (2003:128, 194–95).
The figurine whose location comes closest to the fused bovid from Binguèl Dafèdji is a grayish-brown anthropomorph with a matte patina (Fig. 2N), which was first seen approximately 25 km to the southwest of the same Djibo in Burkina Faso, before appearing again at a merchant's in Niamey. What makes this so intriguing is that the “Djibo” figurine, as I shall call this second sculpture, is the same shape as a figurine sold by Pierre Dartevelle to the Barbier-Mueller Museum (Cohen 2008:26, inv. 1000–59), which has been described as coming from the “Azouarwak valley” (Cohen 2008:26) in the south-central Sahara. This museum's example is made of the same stone—green amphibolite—as most of the other figurines in Group II (Figs. 2A–G, K–L, P–U, W–X; 3A–G, J, L–O), which is a catch-all for all but four (those in Groups I and IV) of the first figurines to appear in the CSSC, since they share many lithic and stylistic resemblances and were almost always ascribed to the Azawagh.
There are three more reasons why reports placing the two figurines near Djibo are so intriguing. The first is that the Dogon used to live in the surrounding region, which is called the Yatenga (Marchal 1978:462–63, Zahan 1961:12, 20) (Fig. 4), before they fled to the Bandiagara Plateau, which is only about 160 km away. The second is that a kneeling ceramic figure with the same stance as the Barbier-Mueller and Djibo figurines was found in the Yatenga as well. This 11.3 cm tall, male, terracotta figure, which is comparable to ones from Djenne, was dated by thermoluminescence to the period between 654 and 1086 ce (based on 1080 BP ± 20% BP, ASA No. 231036-TL307151:) (Fig. 2O). And the third is that other stone anthropomorphs have been found in Burkina Faso, which have been loosely associated with a Mossi (Nyonyose) sculptural tradition in the fifteenth century (Phillips 2004:514–15).
The investigation also led to the realization that at least two of the zoomorphs in Group II have a hump and long neck like dromedaries (Fig. 3J–K), even though they are typical of all the other statuettes in the group in their size, materials, patinas, manufacturing marks, and even style. There may even be a third dromedary in the group, since Fig. 3L has a hump, too. The oldest sign of camels in Africa is a calibrated radiocarbon date of 1295 to 832 cal bce for their dung from Qasr Ibrim, in Lower Nubia (Rowley-Conwy 1988). The oldest indications of dromedaries in Niger, on the other hand, only date to 41 cal bce–47 cal ce (Le Quellec 2006). Even if one admits that camels may have reached the area encompassing Niger, the Azawagh, and Yatenga some years before that, the camel figurines and their group (II)—not to mention Group III, which overlaps its corpus iconographically (Caldwell 2013a)—may have been made within the last two millennia.
DETERMINING THE AGE AND ORIGINS OF GROUP III
The next pieces of information concerning proveniences involve the entirety of Group III (Figs. 5, 3Q). This group—in which I have placed all thirty figurines acquired by a single owner from one seller (Figs. 5A–V, X–Y; 3Q), another one that the same collector obtained from a second source (Fig. 5W), and a final specimen that appeared in a New York Times article about the imperiled archaeological legacy of central Mali (Cotter 2012:1)—shares a family likeness with the dark hardstone statuettes in Group II (Caldwell 2013a). The association of figurines in Group III with a zone encompassing Mopti and the Bandiagara Plateau is supported by the fact that the owner of the thirty-one examples told the author, before the appearance of Cotter's article, that that is where his pieces came from. The link between Group III and an area associated with the Dogon-Djenné iconographic complex reinforces the possibility that the figurines in Groups I and II from the Yatenga, where the Dogon used to live, could be related to that people as well, but it must be said that the collector who cited the Mopti/Bandiagara zone as the provenience of all his Group III figurines later listed four of the same figurines (Fig. 5D, M, U, Y) on French eBay as coming from four different Saharan locations, thus adulterating their proveniences.
Regardless of where the sculptures in Group III come from, the group is also a bit of an artifice, since it contains two distinct families—one with seated, squatting, or bent legs, generally distended bellies, and flat or bulbous heads, which I shall call the “seated” family (Group III1–6), and the other with extended legs and ogival heads, which I will call the “standing” family (Group III7–8). These two broad families differ so greatly in their postures and lithics that they probably come from different localities or even cultures.
The “seated” family includes one subset (Group III1), which consists entirely of anthropomorphs in seated or kneeling positions (Fig. 5A–J) that are made of dense silicified bone—apparently from dinosaurs! Having discovered dinosaur tracks myself on the Bandiagara Plateau (which I hope to describe once the area becomes safer for Western visitors, since the trackways occur together with petroglyphs), it would not be surprising to find a major fossil deposit in the same area. If such an outcropping can be located, the origin of these seated figurines will probably follow.
What is strange about the second or “standing” family in Group III (Group III6, 7, 9), which consists of anthropomorphs with extended legs (Fig. 5Q–U, Y), is that they do not include a single sculpture made of such fossilized bone, even though they were purchased by their owner from the same African source at the same time as the first set. This family seems to fall between the seated subgroup and Group II, with which it has stylistic affinities (Caldwell 2013a).
More importantly, for the purposes of this study, Group III is composed almost entirely of anthropomorphs—many of which are highly pregnant (Fig. 5A–J, L–P, S, W)—with just three zoomorphs (Fig. 5V, X, and an unillustrated “elephant”), two of which (Figs. 5V, X; 3Q) can also be read dorsally as the torsos of pregnant women. The breasts of these “torsos” are formed by the rounded horns or eyes of the “animals” while their bellies are formed by the humps of the “animals.” Although Group II is more diverse than Group III, both in having a higher rate and diversity of zoomorphs and in the variety of its anthropomorphs, a great many of its human figures also have swollen bellies (Fig. 2B, E, G, H, I, U, Y).
THE AGE AND CULTURAL ASSOCIATIONS OF GROUP IV
Although one figure in the last group of figurines in the CSSC (Group IV) has been linked to the Azawagh (Dartevelle 2006), the other two figures (Figs. 6–7) in the small family have been linked by two anonymous sources to equally desertic regions farther to the east, around Agadez. The three figurines (Figs. 6–7) share the following two commonalities, which set them apart from the rest of the figurines in the CSSC:
• fused legs, which form a single tapering peg, instead of separating at the bottoms, and
• unusually light-colored rocks, which are quite different from the darker stones of the other sculptures.
Two of the figurines in Group IV (Fig. 6, left and center) are also unusually big for the CSSC, suggesting that they might have been used differently, while a second pairing (Fig. 6, center and right) has steatopygic buttocks, grooves around their ankles, and differential erosion, which is missing on many other figures in the southern groups. The strong resemblance between the last two figurines even makes it likely that they were found in the same vicinity—a possibility which is reinforced by the fact that they were traced back through various owners to the same source, who had sold them at the same time to separate clients in Brussels.
But the bigger of the two figures with protruding buttocks (Figs. 6 center, 7) has one feature—double shoulders—which is so unusual in statuary from anywhere in the world that it distinguishes it from its smaller sister and forces us to look for an explanation. It turns out that the double “shoulders,” which are pointed and suggestive of horns, make sense when the figure is laid on its back and viewed from the side. Suddenly the figure, which looks in one vertical position like a woman (Figs. 6 center, 7A), whose body is flexed at the waist, and then, when inverted, like a phallus (Fig. 7B), becomes a naturalistic herbivore's head (Fig. 7C). The end of the fused “legs” or “phallus,” which is separated from the rest of the figure by the groove, becomes a differentiated muzzle, while the doubled “shoulders” turn into a horn and ear. It even looks as if the sculptor positioned the carving to take advantage of a dark inclusion, which reads as the herbivore's eye.
Although nothing quite like these nearly identical figurines seems to be known from elsewhere in the Sahara, there are still some points of comparison. The first one may be with both phallic sculptures and a group of “eyed cobbles” (Caldwell 2013b:183–84) from the western Sahara, since the sculptures in the two groups often have an annular groove around one end to differentiate a head, which is reminiscent of the glans penis. But the comparison is so distant and limited that it does not suggest a close relationship, so we must look elsewhere.
The second set of comparisons is more likely to represent a real link, since the sculptures, which come from the Jebel el-'Uweynāt in southeastern Libya (Sukova 2011:117–24, VI–VII) and Kadruka in Sudan (Reinold 2000:67, 84/SNM 26861 and SNM 28731) have fused legs that form a single peg at the bottom of each figure, atrophied knobular heads, and swollen buttocks, in the case of the statue found in Neolithic cemetery KDK 21, near Kadruka—making them look like they could be related to their similarly designed mid-continental sisters. The sculptures in both the Sudanese and central sub-Saharan canons (including Groups II and III) were all pecked into shape and then polished, a process which encouraged the sculptors to produce anthropomorphs without narrow necks or breakable extremities such as hands or feet. The only anatomical details of the minimalist figurine from Cemetery 1 are its rectangular eyes and suggestion of shoulders, while the main ones on the figurine from Cemetery 21 are its shoulders, protuberant buttocks, and two bulging ridges across the belly. This emphasis on a woman's sagging or wrinkled belly is reminiscent both of the overhang at the bottom of the atypically large “Azawagh” figurine's belly (Dartevelle 2006) (Fig. 6 center) and of postpartum wrinkles or pregnancy. Most of the Neolithic ceramic figurines of women from Sudan are almost as minimalist as most of the “standing” figurines in the CSSC, with an emphasis on wide pelvises and, in the most realistic figurines (Reinold 2000:81/SNM 26969), the portrayal of full-term pregnancy—indicating that they were associated with childbirth and women's regenerative capacity.
Another intriguing aspect about the three stone statuettes from the Jebel el-'Uweynāt and Sudan is that they are linked with the desert west of the Nile, since they are made of a type of banded sandstone that occurs 150 km west of the river at Laqiya Arbaïn (Sukova 2011). This fact, plus their distribution across a 600 km stretch of the eastern Sahara, proves that communication took place along an east-west axis, which could have continued as far as Niger as long as the rain-belt covered that part of the Sahara and there were no natural barriers.
Luckily, all three of the eastern figurines have also been dated, if only indirectly. The ‘Uweynāt figurine was dated on the basis of shards from the site where it was found, which were “decorated with packed dotted zigzag and incised and dotted wavy designs attributable to Phase B (c. 6600–4400 cal bce) and the herringbone motif characteristic of Phase C (c. 4400–3000 cal bce)” (Sukova 2011:120). The Sudanese statuettes, on the other hand, were dated on the basis of other tombs in the necropoli, which were carbon-dated to 4230 cal bce at Cemetery 1 and between 4790 and 4720 cal bce at Cemetery 21 (Sukova 2011:120–21). Although the feminine figurines from such sites as es-Sour were not stone, but ceramic, one of them provides yet another point of reference with dates of 4240 to 3955 cal bce (Sadig 2009:48, 53). In passing, it should be noted that feminine images with even more exaggerated buttocks became typical of rock art in parts of the Libyan Desert and Nubian Nile valley in C-Horizon times, which lasted from 2620 to 1620 cal bce (2100 to 1400 bce in ČervéČek 1992–93:41–48).
In conclusion, the three figurines in Group IV probably have the best chance of any of the statuettes in the CSSC of being Neolithic. If they are that old, then they may be the ancestors of the objects in the other three groups, making Groups I, II, and III the descendants of a south-central Saharan sculptural tradition, as opposed to northern ones described by myself (Caldwell 2013b) and Le Quellec (2008), among others.
EVIDENCE OF WEAR, PATINAS, AND HUMAN POLISHING
Although two of the figurines in Group IV appear to exhibit differential erosion, hardly any of the figurines in the other groups have overt signs of heavy weathering, although it must be said that they are often made of denser rocks and there are a few partial exceptions. Two figures in Group II, for example, seem to show a little differential erosion (Fig. 2G, I) while a closely related figurine, which is unique in its dark black stone (Fig. 8A) and source (having been sold by an African who said he had bought it in Lomé, Togo), even seems to have been pitted by sand. But sand storms can strip the paint off vehicles and pit some rocks within decades, so such erosion does not prove that the figurine is Neolithic.
Another aspect of two green amphibolite figurines in Group II (Figs. 2F, 3B), which turned up when they were studied microscopically by Dr. Erik Gonthier at the Muséum national d'Histoire naturelle in Paris in the presence of the author, is that their gloss and shiny crusts, which had often been interpreted as wind gloss, turned out to be caused by a combination of human polishing and a waxy substance mixed with fine silica dust, suggesting that they had been heavily handled or that the wax laden with abrasive silica was even a remnant of polishing. One of the anthropomorphs (Fig. 2F), which did not have signs of either being fake or being very ancient, had such intense wear, including discoloration, on the top of its head, as opposed to its face or other surfaces, that Dr. Gonthier even wondered whether rubbing the cranium had some special significance.
BIRTHING AMULETS
When Randall White and Michel Bisson looked for an explanation for the small sizes and manual polish on another corpus of feminine figurines—this time the fifteen Gravettian sculptures found in the Grimaldi caves—they wondered whether they might have been used as “birthing amulets” by would-be mothers, traditional midwives, or fertility practitioners (White and Bisson 1998) like Zuni figurines cited by Peter Ucko (1968). This line of reasoning led me to wonder if there was any evidence for such practices in the south-central Sahara and adjacent areas of the Sahel which could explain the figurines. One reason for thinking that such customs might have existed in the zone is that similar ones involving anthropomorphized bones and small sculptures are known to have survived among women and fertility practitioners elsewhere in the desert and Sahel. These practices include:
• The jilankonnde of the Peul in the Casamance. In the words of Souleymane Baldé, a Peul author of several works on sub-Saharan sterility, fertility, and birthing practices, including Stérilité au Fouladou (Baldé 1986),
A Peul woman who wants to become a mother is given a leg bone from a goat which is variously called a jilankonnde or simply a boobo or biddo—both of which mean “baby.” The bone is drilled with holes for its sex and sometimes other orifices and perhaps the insertion of jewelry like earrings. The woman feeds and cares for the bone—which has a personal name—exactly as if it were her infant, and wears it under her clothes. During labor, she grips the protective figure to help her. Then, after the baby is born, the bone is called the child's elder sister or brother and is still imbued with power since it remains the interface between dimensions. First with animals, which sleep so lightly that we believe that they are never truly asleep, but are aware of the invisible in all directions; and, secondly, with the dead, who return to the wilderness where they commune with animals and the invisible. For without the accord of the ancestors, we believe there can be no birth (Baldé, personal communication published in Caldwell 2009).
• Frequent visits by Tuareg women to a circular tomb at Tazerouk, which is thought to have been protohistoric, where a stone sculpture of a bovine head was found with an array of “Neolithic” artifacts, including querns, pestles, polished axes, and a polished white stone, and such recent offerings as candles, soap, needles, and bits of cloth. The Tuareg associated the white grinding stone with a “white” Tuareg woman and black bovine head with her “black” servant and referred to the Tazerouk statues as the Tibaradin, meaning pubescent girls (Lhote 1950, Camps-Fabrer 1966:260–61). Like the jilankonnde, the sculptures were associated with successful pregnancy and childbirth (Hachid 1998:148–53), while the name suggests that the site had been used in recent times for female initiations.
• The reuse of a set of apparently Neolithic statues, whose features reflect those of both humans and owls, at Tabelbalet, on the northern edge of the Tasīli-n-ajjer, by Tuareg women who painted the statues’ eyebrows with paint and make-up (Camps-Fabrer 1966:260–61) and associated the sculptures, once again, with divination, making wishes, ensuring veracity, successful childbirth, and overcoming sterility (Hachid 1998:148–53).
The problem with this line of speculation in the case of Groups I, II, and III would seem to be that they include zoomorphs, although some of the zoomorphs (Figs. 5J, K, V, X; 3A, Q; 9) look like pregnant women from certain angles. But oral testimony from African informants revealed that references to animals were common in birth-protection rituals in the central Sahel until the mid twentieth century.
DOCUMENTATION FOR THE WIDESPREAD USE OF ANIMALS IN BIRTH-PROTECTION RITUALS
Some of the most common associations of childbirth with animals involved rites in which an animal was brought into a birthing hut to provide a mother and her baby with an animal's supernatural protection. According to Dramane Uoba, a source in the zone inhabited by the Gurma (also called the Gourma or Gourmantché), which roughly corresponds to the Est administrative region, his grandmother, who was a traditional midwife named Marie-Jeanne Barkimba-Yoni, known to her familiars as “Aunt Jeanne,” used to bring a sheep or goat into the birthing hut to make sure the birth was successful. She practiced this ritual in Niamey in the early 1940s, then in Fada N'gourma, and finally in the 1960s in Bogandé.
Another informant named Daouda Diallo, who is a Peul-Rimaiɓbé, from Bango near Ouagadougou, recorded his maternal great-grandmother Kumba Diallo's description of her people's traditional birthing practices in the following words:
Part I—Bango, the 19th of June 1980: A bride and the children she will have are protected by animals. When she becomes pregnant, the husband's family gives her a lamb, which will accompany her during her pregnancy. The day of the birth, the animal is tethered inside the hut. The names that we give to the animals are Bala (which means goat), Beiva (which means sheep or lamb), and Naguè (which means cow or calf). When the woman in labor cries out, the animal cries and the women in attendance call the animal by its name and ask it to be quiet. If the animal doesn't cry, the child won't come out, but when it stops crying, the mother gives birth and the animal gives its name to the new child. My grandmother, whose ears I must not touch,1 has promised to tell me the secrets for giving birth with an animal next time.
Part II—What happens in the hut: The woman is carried into the interior of the birthing hut feet first, with a tether from the pasture tied to her ankles. Before putting her down, the participants say “Come child in serenity!” (Souko Warou Djans!) thirteen times two (twenty-six times). Once water begins flowing from between the woman's legs, a little of it is collected and mixed with other water and given to the animal tethered in the hut. The root of a tree, which is called “Gogui,” is moistened and as soon as the woman drinks from it and the animal has cried, the child appears.
To extract the root, one must gather dew very early in the morning and pour the water under the tree. If the water from this root is given to any living pregnant being, she will give birth within fifteen minutes.
The bottle gourd of the statue that you see here allows one to do many things but I cannot tell you what they are yet, because you are too young. But if you put water in it and leave it for three days and have a childless woman drink it, she will have a child without problems in ten months. One day, I will show you another thing you can do with the bottle gourd and ladle.
To be successful in these things, one must give a lot of things and a 5 franc bill to the blacksmith.
When a woman gives birth outside the birthing hut, one must bring the baby to the house in a basket made out of “Goungoumi” stems and the father must come to bury the placenta. The names of the trees which are good for this ritual are Goungoumi, Gagaye, Hédi, Guéléki and Gogui.
It should be noted that Kumba Diallo wore a special homespun garment covered in amulets while helping women give birth, but that it did not look like a typical hunter's tunic, although such garments are also covered with amulets.
Yet another source, this time a Soninke from the Bamako region of Mali, reported that Soninke would bring a chicken into the birthing hut to provide an animal's protection and went on to say that Bambara use any animal while Peul prefer a calf. This was confirmed by a Peul, who was born near Timbuktu at Nianfaounké in Mali. According to this source (who asked to remain anonymous after the conquest of eastern Mali by Islamists, since he was afraid that his knowledge about traditional practices would be used to define him as “anti-Islamic”), Diawando Peul—who claim, by the way, to be descendants of the Queen of Sheba—do indeed use a calf in birth protection rites.
Before passing on, it should also be noted that the maternal grandmother, Gani Diao, of another highly informed source, Dr. Aminata Salamata Kiello, who worked for the Fonds de Solidarité Africain and does research at the Centre d'Études Linguistiques et Historiques par Tradition Orale in Niamey, came from a village named Malanga (24 km from the original capital of the Mossi Empire, Tenkodogo), where a song with five verses in a forgotten language was sung exclusively during the weddings of eldest daughters. To her astonishment, Kiello thought she heard a longer version of the same song on a taxi radio when she was visiting Addis Ababa in the late 1980s and discovered that it was in Amharic, and that Ethiopians believe it was written by the Queen of Sheba for her marriage to King Solomon. When Kiello told the co-director of her dissertation, Jean Rouch, about the incident, he encouraged her to record her grandmother, but the old woman died before Kiello could do so. Although one might be tempted to think that the perceived resemblance was due to an Afrocentric impulse to demonstrate the antiquity and grandeur of a local custom, there is no doubt that “The population of Africa was (once) a gigantic, matted, crisscrossing web,” as Ryszard Kapuściński put it, “spanning the entire continent and in constant motion, endlessly undulating, bunching up in one place and spreading out in another, a rich fabric, a colorful arras” (2001:20). While we are on the subject of migrations like the movement of a small group of Falasha, which Dr. Kiello thinks may have taken place centuries ago, it is worth noting that part of Kiello's maternal line, which was the Peul royal family in Tenkodogo, originally came from a place almost equally as far away as Ethiopia, but in the opposite direction: the Casamance in southern Senegal (via Ghana), showing how one person—let alone an ethnicity—in the central Sahel might be loosely associated with both of the zone's extremities.
Although most informants who have spoken of the use of animals in the context of birthing have suggested that the participants were invoking their protection, Kiello also gave a practical if still supernatural explanation for this, since she noted that animals usually give birth (or in the case of birds, lay their eggs) with far less difficulty than women, so the association can be seen as an attempt to borrow the animal's ability while also shifting the danger onto it. Even if there are no actual supernatural benefits, it is easy to imagine how such an association could have reduced both the expectant mother's and her community's anxiety and even provided a placebo effect. These benefits may have been particularly pronounced in societies in which women had a 1–3% chance of dying with each birth, and a cumulative risk of at least 10% for five pregnancies (Dobbie 1982:79–90, Loudon 1992, Schofield 1986), despite the existence of indigenous medical practices with some experimentally proven benefits (Helwig 2005, Mackraj and Ramesar 2007).
Finally, Dr. Katimou Maga, who is Songhai and a medical doctor, reported that Songhai would bring a horse into the birthing hut when a woman was having trouble giving birth and would name the child Barkèré, meaning “under the horse,” if the child survived. He went on to say that only people over 40 or 50 years old have this first name, although the name has sometimes become a family name. Dr. Maga is the brother of Abdoulaye Maga, who was the Director of the Institut de Recherche en Sciences Humaines (IRSH) in Niamey, which Jean Rouch founded, so it is interesting to note that even such a great Africanist as Rouch apparently never learned of or mentioned such birth protection rituals using animals.
A linguist at the IRSH named Aveymatou Mazou stipulated that the name Barkèré is neuter and was given to both boys and girls. She also reported that two other names were used in association with such births under the protection of a horse: Vercougné, meaning “mare,” for girls, and Kangey, which refers to the post to which a horse is tethered in a hut. She also thinks that the practice was “just a custom” and not a relic of “animist” thinking.
Be that as it may, the widespread use of animals as spiritual guardians, maternal surrogates, or targets of deflected menace during birthing rites across much of the Sahel suggests that the practices must have ancient antecedents. The presence of squatting women in conjunction with animals in rock art just to the north, in the Sahara, suggests that those antecedents may even be prehistoric, in which case the insight provided by recent testimony might provide an avenue for interpreting such ancient scenes as:
• an engraving of a woman and “baby” from Wadi Alamas in the Messak, which has been interpreted as a birth scene (Gauthier and Gauthier 1994:90, Fig. 1), and
• a woman in the “gynecological position” next to a bovine connected to a “placenta” and ewe connected to another possible placenta in the Messak Mellet (Fezzan) (Le Quellec and Gauthier 1992–93:29–40).
The rituals that we have examined from the Sahel are especially reminiscent of Henri Lhote's impression of a painting at Sefar, Algeria (of a pregnant anthropomorph, whose labia are distended as if in childbirth, overlapping a giant antelope), which he described as follows:
[To the left of a huge horned man] five women were walking one behind the other in a sort of procession. Their hands were raised towards the main figure, apparently in supplication. To the right was a large antelope in red ochre and a woman lying on her belly. Her legs were apart and her belly so swollen that she seemed upon the point of giving birth. This scene certainly has a magic character connected with some fertility or maternity cult. The women, whose whole attitude showed clearly enough fear of, and respect for, the main personage, could only be praying to become mothers or to have easy delivery (Lhote 1959:120).
The use of amulets that could be clenched in a woman's fist(s) as she gave birth might even explain a set of small prehistoric artifacts with parallel grooves across their base and rounded backs (Fig. 10), which Yves and Christine Gauthier2 found in a surface area that could have been covered by a single tent or hut. Upon seeing this manuscript, Yves Gauthier wondered whether the enigmatic objects could have been held by women in a birthing hut, since the domed backs fit neatly into the palm of a hand, while the grooves provide a firm grip for ones fingers—somewhat like the grooves between the anomalous number of knobs along the bases of the fused bovine (Fig. 1) and elephant (Fig. 3O). Although the use of such Saharan objects and figurines in the southern group as birthing or any other kind of amulets cannot be proved yet, such uses must be considered, given their small size, resistance to breakage, and intense polish.
Finally, there might be an explanation why some of the artifacts exhibit a strange combination of polish and ferruginous clay deposits in dimples left by pecking as well as repeated references to figurines being found on the surface after hard rains.
Some of them could have been hidden in niches within termite mounds, which often serve as “altars,” between rites for objects with special powers. This makes sense for several reasons. First, termitaries are associated with femininity by at least one people, the Dogon, according to Marcel Griaule's informant Ogotemměli, who said that the earth is a female body and that “an ant nest is her vulva (while) a termitarium is her clitoris” (Griaule 1948:15–16); two, termite clay is especially adhesive, which may explain the consistency of some of the deposits on the objects; three, the technical characteristics of such clay make possible the magical transformations of traditional African metallurgy, with all of its sexual connotations for cultures like the Dogon. Dogon blacksmiths, for example, specifically use termite clay to make the refractory aeration pipes and linings of their furnaces, since its high silica content and purity makes it particularly fire resistant when baked (Huysecom et al. 1997). They also believe that the primordial blacksmith,3 who sprang from the umbilical cord of the fifth nommo when that being was sacrificed by the celestial deity Amma (Laude 1973, Griaule and Dieterlen 1986), landed upon the Earth with the sacrificed nommo's “penis and testicles, which he used to make the pipe and bellows of the first forge” (de Heusch 1985:135). The aperture of the blowpipe, in turn, was associated with the vagina and fecundity, uniting male and female principles into a single powerful instrument. If the figurines were indeed hidden in termite mounds with such rich associations, then it would explain why the figurines have been found—according to some sources, who wish to remain anonymous—after torrential rains, which make old mounds melt.
But that is just a conjecture, which will have to be tested in the field. In the meantime, we must assume on the basis of the sudden appearance of the fairly uniform assemblages represented by Groups III1 and III7, which have traces of slightly caked laterite on them—a soil which is more typical of the Sahel than the Sahara—that several concentrations of buried objects from related traditions have been found—quite possibly in mounds, altars, or tombs—making archaeological intervention to complement what has been reported here urgent.
CONCLUSIONS
This article has provided new evidence to feed the debate over possible links between some pre- and protohistoric art, on the one hand, and recent beliefs, on the other. I have already explored Paleolithic imagery showing relationships between zoomorphs and pregnant figures (Caldwell 2009, 2010, 2012), and have advanced the hypothesis that some prehistoric societies believed women's generative capacities made them essential not only for regenerating killed prey, but as part of a triad with hunters and game. The testimony cited in this article suggests that imagery fusing feminine and zoomorphic features may also be based on the use of animals to protect women and their babies during labor. We have seen how this protection can be construed as a simultaneous borrowing of the animal's ability to bear young easily and transference of a woman's risks. We have also seen a case, among Peul-Rimaiɓbé in Burkina Faso, where the cries of expectant mothers and their animal “assistants” or “surrogates” are believed to fall into sync, suggesting that they come to represent one another, and the animal “gives” its name to the newborn, indicating that its association with the mother is transferred to the child, who has benefited and will apparently continue to benefit from its protection. Finally, we saw another case, where birth is not possible without the consent of one's ancestors and a link to animals, which commune with them, since animals are seen as being alert to the visible and invisible. This appears to mean that Peul in the Casamance, at least, view animals both as conduits between the living and dead and as sentinels against invisible spiritual threats.
These beliefs in areas which have been knit together to various degrees by family and tribal movements, as was seen in particular cases, suggest that many of the people in the Sahel subscribe to a complex ontology that blends three of the four ways that Philippe Descola (2010) thought humans could construct a worldview, depending on whether they think the entities around them (which may range from plants and animals to landmarks) are similar or dissimilar to people in their interiority and physicality. Although Descola has argued that the four ways of thinking in his ontological grid are fairly distilled in some parts of the world, the customs we have encountered seem to correspond to world-views in which:
• humans share intentionality and agency with non-humans but are differentiated by their bodies (when human and animal calls fall into sync),
• humans are both physically and morally distinct from other entities, but may be related to them by analogy (when people associate an animal, which can bear young easily, with a threatened woman by bringing them into conjunction), and
• humans are both physically and morally similar to other entities (when babies acquire the identity of animal protectors).
It would be interesting to investigate why the amalgam contains features that Descola thinks are often fairly isolated elsewhere. Is this complexity simply the result of syncretism, or could it also be a relic of the kind of belief systems with ingredients of all the cosmological distillates that a phylogenetic analyst would expect to find in an undifferentiated blend near their evolutionary root?
While we wait for answers, it is also worth determining whether the reliance on animals as protectors or supernatural substitutes for imperiled women and their babies during childbirth extends beyond the Sahel and whether such practices have had an impact on other kinds of African imagery than the ones suggested here. In the meantime, some things have become clearer: the figurines in the CSSC appear to cluster into several stylistically and lithically coherent groups, several of which seem to be related to one another, and indicators place them in the Sahel rather than the Sahara, and in the historic era, rather than the Neolithic. Taken together, these clues should provide a springboard for further investigations, which may lead to a better definition of these sculptural traditions and the preservation of archaeological sites.
Notes
I am grateful to the Alex Arthur of Tribal Art magazine, as well as numerous galleries and collectors, who have been kind enough to share information with me, even if some sources wished to remain anonymous. I am also deeply grateful to Aminata Salamata Kiello, Diouldé Laya, Katimou Maga, Dramane Uoba, Daouda Diallo, Aveymatou Mazou, and all my other African sources, who have sometimes allowed me to film their invaluable testimony concerning disappearing practices. I am especially grateful to Jacques Maurel for providing me with an unpublished manuscript about the double bovine from Burkina Faso, which he co-authored with Lamia Messili, and providing profound friendship. I must also thank Yves Gauthier for sharing his discovery of a series of enigmatic objects in Algeria, and Dr. Erik Gonthier for identifying the rock types and patinas on several representative objects. Although all these people have been immensely kind, they are in no way to blame for my conclusions or mistakes.
I am grateful to Diouldé Laya and Aminata Salamata Kiello for casting light on this phrase (personal communication, April 15, 2014). If I have understood them correctly, there are two variations on this expression in Songhai: Hanga sidi = One cannot catch his ear, and Hanga si ham = One cannot touch his ear. According to an Arawas myth, a grandson named Arawa “touched the ear” of his ancestor, causing the ancestor to return. Upon returning, the ancestor saw the grandson, who died as a consequence. One must not “touch an ancestor's ear,” which I assume means “ask anything of an elder or ancestor,” for several generations, because five or six generations separate a living person from a person who has attained ancestral status (representing a gap of about 100 to 150 years). In 1962, Hampaté Bâ sang and danced a text containing the expression “do not touch the ear” in front of Diouldé Laya and the Nigerien historian André Salifou in Niamey. The text he sang was called “Sambaré, ha houlan leïdi na?” = “Sambaré, would you fear the ground (the earth)?” “Sambaré” means the second son in Peul.
Yves and Christine Gauthier, personal communication, 2012.
The Blacksmith is also the seventh nommo of the four pairs of nommo twins, whose creation occurred after that of the Primordial Couple, who were the first nommos. | https://direct.mit.edu/afar/article/48/4/34/54876/The-Use-of-Animals-in-Birth-Protection-Rituals-and |
End of life planning, funerals, and memorial services
We trust that Jesus tells us the truth, but death can still be hard to talk about. We’re here to help you when a loved one dies or to prepare for your own passing. Our pastors and team members can help navigate difficult conversations, provide spiritual care, and offer practical guidance.
If you’ve had a death in the family, please contact Kelli Harrison, Care Coordinator, to make funeral arrangements and speak with a pastor.
Planning Ahead
Making plans for your funeral or memorial service in advance can provide peace of mind now and helpfully guide your loved ones later on. Meeting with one of our team members now provides time to prayerfully consider what's important as we celebrate this life and anticipate the next.
Reviewing the resources below may be helpful before your meeting.
End of Life Resources
Questions?
Contact Kelli Harrison, Care Coordinator, here or call 214-525-4230. | https://hppres.org/ministries/end-of-life/ |
It is a difficult time to be an investor.
Millions will be experiencing the pain of watching their portfolio drop in value as most stock markets around the world have fallen so far this year.
Investors will also be feeling a rollercoaster ride of emotions thanks to severe volatility that has set in.
There are many practical steps you can take to protect your portfolio, as we have laid out in Wealth in recent weeks.
Actions such as making sure it is balanced – across asset classes and stock markets – and that you are keeping investment costs down and investing for the long term.
However, practical steps are only one part of the battle. Dealing with emotions is also necessary to keep on track at such a difficult time.
Louis Williams is head of psychology and behavioural insights at financial software firm Dynamic Planner.
He says: 'Our emotional resilience, confidence, and optimism – despite what is happening around us – is key to bouncing back and being agile during these challenging times for investors.'
Williams believes that investors who are able to successfully navigate through times of financial turbulence share key traits.
Here are our tips to cultivate such mental skills to better weather any future investment storms.
1. Get comfortable with uncertainty
Investors are having to compute a seemingly endless list of unexpected events – from a global pandemic to the invasion of Ukraine and rapidly rising prices. This lack of control and predictability can be anxiety-inducing.
A natural reaction can be to attempt to take control by selling investments and turning our backs on the chaos.
However, this simply locks in losses and cuts off our ability to benefit if and when stock markets bounce back.
So the key is to find other ways to get comfortable with the uncertainty. Instead of focusing on the latest twists and turns, step back and look at the bigger picture.
There have been numerous market falls throughout history and prices always bounced back again. It can take time – but there is usually a recovery.
Greg Davies is head of behavioural finance at consultancy group Oxford Risk.
He says: 'In turbulent times, there is a big gap between the decision that feels emotionally comfortable for my short-term self – selling – and the decision that is right for my long-term needs – holding on.
'As humans, we constantly deviate from good long-term decisions in pursuit of the emotional comfort we crave in the short term. This is costly – we are effectively buying emotional comfort by giving up financial performance.'
But he believes that individual investors have a huge advantage over professional investors: time. 'Benign neglect – just leaving things alone – can be a very powerful investment strategy,' he says.
You cannot change the way stock markets behave, but you can control how much you pay in investment fees and tax. So ensure you use your allowances, such as the Individual Savings Account, which allows you to invest up to £20,000 tax-free every tax year.
2. Learn to regulate your emotions
It is hard not to allow your emotions to be buffeted by market rises and falls. After all, portfolios aren't just money, they're our means of financing dreams, holidays, helping our families and being able to retire.
However, emotion can sometimes cloud our judgment, for example by making us too quick to react when we are worried.
If you have built a well-diversified portfolio for the long term, there is no reason to check it frequently.
Emma Maslin, money coach and founder of The Money Whisperer personal finance website, says: 'In a world where we are used to checking phone apps several times a day, it's all too easy to be hyper vigilant about the value of our investments.
'But investing is long-term and investors shouldn't need to check investments too often, and certainly not numerous times a day. Perhaps delete your investment app if you are prone to checking it frequently and fretting.'
Also, remember the good times. Your portfolio may be down in value this year, but it is likely to be up over the past three years. Looked at in a wider context, things may not look so bad.
Clive Beagles is senior fund manager at investment fund JOHCM UK Equity Income.
He says: 'During periods of market sell-offs, the natural human reaction is to reduce our time horizons and focus on short-term negative noise.
'It's at such times, when our instincts may lead us in the wrong direction, that a well-established investment process can help to avoid behavioural pitfalls.'
3. Boost your confidence
When the value of your portfolio is falling, it is easy to start seeing it as a reflection of your abilities as an investor.
A lack of confidence in your financial plan can increase the risk that you will start tweaking and going off track.
So, remember why you made individual investment decisions in the first place. If your rationale has not changed, you can feel confident that you are still on track.
Also, swot up. By reading up on why your portfolio is falling, you should reassure yourself that most investors are in the same boat.
Help with financial advice and planning
Financial planning can help you grow your wealth, sort your pension, or make sure your finances are as tax efficient as possible.
A key driver for many people is investing for or in retirement and inheritance tax planning
If you are looking for help sorting your finances and want to work out whether you need advice, planning, or coaching, the following links can help you understand more:
> Financial adviser, planner or coach - what's the difference?
> Financial advice: What to ask and how much it might cost
4. Curb your impulses to trade rashly
Investors often mistakenly make rash decisions based on emotions rather than strategic thinking. This is normal. Yet there are things you can do to limit or prevent the resulting damage.
First, think about what is driving you to trade a particular investment.
For example, when buying, are you interested because it is the right investment for you, or because you fear missing out on an opportunity where you see others making a huge profit? Don't let others' decisions sway you.
Second, drip-feed money into your portfolio instead of adding lump sums.
That way, you minimise the risk of a market fall just when you have invested. It also saves you from trying to time the market, which is an almost impossible feat.
5) Boost your resilience with a cash buffer
Don't invest money you will need soon. Market falls are stressful enough, but if they wipe out money that you could be using to live on against a backdrop of rising prices, they can be especially painful.
Make sure you have a healthy cash safety net before putting any more money into financial markets.
You should have the equivalent of around three to six months of outgoings in cash before you start investing – or more if you are using your investments to live off (in retirement, for example).
By having a cash buffer, you do not have to sell when markets fall, locking in losses.
Also, pay down any unsecured debts. Reducing debt improves your financial resilience as you are less exposed if interest rates continue to rise – as they are forecast to do – or your income drops.
Compare the best DIY investing platforms and stocks & shares Isa
Investing online is simple, cheap and can be done from your computer, tablet or phone at a time and place that suits you.
When it comes to choosing a DIY investing platform, stocks & shares Isa or a general investing account, the range of options might seem overwhelming.
Every provider has a slightly different offering, charging more or less for trading or holding shares and giving access to a different range of stocks, funds and investment trusts.
When weighing up the right one for you, it's important to to look at the service that it offers, along with administration charges and dealing fees, plus any other extra costs.
To help you compare investment accounts, we've crunched the facts and pulled together a comprehensive guide to choosing the best and cheapest investing account for you.
We highlight the main players in the table below but would advise doing your own research and considering the points in our full guide linked here.
>> This is Money's full guide to the best investing platforms and Isas
Platforms featured below are independently selected by This is Money’s specialist journalists. If you open an account using links which have an asterisk, This is Money will earn an affiliate commission. We do not allow this to affect our editorial independence.
|Admin charge||Charges notes||Fund dealing||Standard share, trust, ETF dealing||Regular investing||Dividend reinvestment|
|AJ Bell YouInvest*||0.25%||Max £3.50 per month for shares, trusts, ETFs.||£1.50||£9.95||£1.50||£1.50 per deal||More details|
|Bestinvest*||0.40%||Account fee cut to 0.2% for ready made investments||Free||£4.95||n/a||n/a||More details|
|Charles Stanley Direct||0.35%||No platform fee on shares if a trade in that month and annual max of £240||Free||£11.50||n/a||n/a||More details|
|Fidelity*||0.35% on funds||£45 fee up to £7,500. Max £45 per year for shares, trusts, ETFs||Free||£10||Free funds £1.50 shares, trusts ETFs||£1.50||More details|
|Hargreaves Lansdown*||0.45%||Capped at £45 for shares, trusts, ETFs||Free||£11.95||£1.50||1% (£1 min, £10 max)||More details|
|Interactive Investor*||£119.88 as £9.99 per month||£7.99 per month back in trading credit||£7.99||£7.99||Free||£0.99||More details|
|iWeb||£100 one-off||£5||£5||n/a||2%, max £5||More details|
|Freetrade*||Free for standard account £3 month for Isa||Freetrade Plus with more investments is £9.99/month inc. Isa fee||No funds||Free||n/a||n/a||More details|
|Vanguard||0.15%|| |
Only Vanguard funds
|Free||Free only Vanguard ETFs||Free||n/a||More details|
|(Source: ThisisMoney.co.uk June 2022. Admin charges quoted annually, may be monthly or quarterly)|
- Guides for my finances
- The best savings rates
- Best cash Isas
- A better bank account
- A cheaper mortgage
- The best DIY investing platform
- The best credit cards
- A cheaper energy deal
- Better broadband and TV deals
- Cheaper car insurance
- Stock market data
- Power Portfolio investment tracker
- This is Money's newsletter
- This is Money's podcast
- Investing Show videos
- Help from This is Money
- Financial calculators
The comments below have not been moderated.
The views expressed in the contents above are those of our users and do not necessarily reflect the views of MailOnline.
We are no longer accepting comments on this article. | https://www.thisismoney.co.uk/money/investing/article-11064479/Five-mind-tricks-investors-track-turbulent-markets.html |
Waste management is the collection, transportation, processing and disposal of garbage. Weblogs which might be kept in this category address recycling, landfill, litter, and marine debris.
Regular Blogs
Discusses matters of intellectual property as they relate to clean technology, with subjects including biofuels, hybrid and electric vehicles, green buildings, and recycling.
http://www.greenpatentblog.com/
Topics presented here include medical waste, its removal, and the rules and laws surrounding them.
http://www.medassureservicesblog.com/
Addresses the issues involved with energy as well as the environment, including many posts about waste management, including how to get oil from discarded plastic, the methods which BP used to bolster their public relations after the gulf spill, and waste-to-ethanol.
http://green.blogs.nytimes.com/
The blogger, who feels it is her calling to keep the Earth clean of litter and waste, writes about such things as recycling Ziploc bags, building construction which utilizes garbage, and those which expose unsanctioned dumps and trash piles.
http://planettrash.wordpress.com/
This weblog, which is meant for those who are involved in the waste management field, contains articles about all aspects of the industry, including green methods used, landfills in the modern age, and waste conversion technology. | https://blogs.avivadirectory.com/Science/Natural-Sciences/Physical-Sciences/Environmental-Sciences/Environmental-Issues/Waste-Management/ |
Thomas Nagel (born July 4, 1937) is an American philosopher, currently University Professor of Philosophy and Law at New York University, where he has taught since 1980. His main areas of philosophical interest are philosophy of mind, political philosophy and ethics. He is well-known for his critique of reductionist accounts of the mind in his essay "What Is it Like to Be a Bat?" (1974), and for his contributions to deontological and liberal moral and political theory in The Possibility of Altruism (1970) and subsequent writings.
|
|
Contents
Biography
|This section requires expansion.|
Thomas Nagel was born July 4, 1937 in Belgrade, Yugoslavia (now Serbia); his family was Jewish. He received a BA from Cornell University in 1958, a BPhil from Oxford University in 1960, and a PhD from Harvard University in 1963 under the supervision of John Rawls. Before settling in New York, Nagel taught briefly at the University of California, Berkeley (from 1963 to 1966) and at Princeton University (from 1966 to 1980), where he trained many well-known philosophers including Susan Wolf, Shelly Kagan, and Samuel Scheffler, who is now his colleague at NYU. In 2006, he was made a member of the American Philosophical Society.
Nagel is a Fellow of the American Academy of Arts and Sciences and a Corresponding Fellow of the British Academy, and has held fellowships from the Guggenheim Foundation, the National Science Foundation, and the National Endowment for the Humanities. In 2008, he was awarded a Rolf Schock Prize for his work in philosophy, the Balzan prize, and the honorary degree of Doctor of Letters from Oxford University.
Work
|This section requires expansion.|
Thomas Nagel began to publish philosophy at the age of twenty two; his career now spans fifty years of publication. It can, however, all be understood as structured around a central distinction between subjective and objective points of view of a subject matter. Nagel thinks that each of us, owing to our capacity to reason, instinctively seeks a unified world view. However, if this aspiration leads us to believe that there is one way to understand our intellectual commitments, whether about the external world, knowledge, or what our practical and moral reasons ought to be then this leads us into error. For contingent, limited and finite creatures such as ourselves no such unified world view is possible. That is because ways of understanding are not always better when they are more objective.
Like the British philosopher Bernard Williams, Nagel believes that the rise of modern science has permanently changed how we think of the world and our place in it. A modern scientific understanding is one way of thinking about the world and our place in it that is more objective than the common sense view it replaces. It is more objective because it is less dependent on our peculiarities as the kinds of thinkers that we are. Our modern scientific understanding involves the mathematicised understanding of the world represented by modern physics. Understanding this bleached out view of the world draws on our capacities as purely rational thinkers and does not involve the specific nature of our perceptual sensibility. The way in which modern science and philosophy has drawn a distinction between the mathematically and structurally describable "primary qualities" of objects such as shape and solidity and those properties dependent on our sensory apparatus, "secondary qualities" such as taste and colour, is a prime example that Nagel returns to repeatedly in his work.
Contrary to this seeming scepticism about the objective claims of science Nagel thinks that it is importantly true that science describes the world that exists independently of us. But this central case should not lead us to believe that the understanding a subject matter is better simply if it is more objective. Importantly, the objective viewpoint is fundamentally unable to help us fully understand ourselves. Taking the proper methods of an objective scientific understanding and applying it to the mind leaves out something essential. It cannot describe what it is to be a thinker who conceives of the world from a particular perspective.
Some phenomena are not best grasped from a more objective perspective. The standpoint of the thinker does not present itself to him: he is that standpoint. One learns and uses mental concepts by being directly acquainted with one's own mind. But any attempt to think more objectively about mentality would abstract away from this fact. It would, of its nature, leave out what it is to be a thinker. And that, Nagel believes, would be a falsely objectifying view. Being a thinker is to have a subjective perspective on the world; if you abstract away from this perspective you leave out what you sought to explain.
Nagel thinks that philosophers over-impressed by the paradigm of the kind of objective understanding represented by modern science tend to produce theories of the mind that are falsely objectifying in precisely this kind of way. They are right to be impressed - modern science really is objective - but are wrong to be over-impressed. The kind of understanding that science represents does not transfer to everything that we would like to understand. Mapping out, for different areas of inquiry, whether they are better understood in a more or less objective way is the central aim of Nagel's philosophy.
As a philosophical rationalist, Nagel believes that a proper understanding of the place of mental properties in nature will involve a revolution in our understanding of both the physical and the mental, and that this is a reasonable prospect that we can anticipate in the near future. A plausible science of the mind will give an account of the stuff that underpins mental and physical properties in such a way that we will simply be able to see that it necessitates both of these aspects. At present, it seems to us that the mental and the physical are irreducibly distinct but that is not a metaphysical insight, or an acknowledgement of an irreducible explanatory gap, but simply where we are at our present stage of understanding.
Nagel's rationalism and tendency to present our human nature as a composite, structured around our capacity to reason, explains why he thinks therapeutic or deflationary accounts of philosophy are simply complacent and radical scepticism is, strictly speaking, irrefutable. The therapeutic or deflationary philosopher, influenced by the later philosophy of Ludwig Wittgenstein, reconciles us to the dependence of our worldview on our "form of life". Nagel accuses Wittgenstein and American philosopher of mind and language Donald Davidson of philosophical idealism. In both cases that ask us to take up an interpretative perspective to making sense of other speakers in the context of a shared, objective world. This, for Nagel, elevates contingent conditions of our make-up into criteria for that which is real. The result 'cuts the world down to size' and makes what there is dependent on what there can be interpreted to be. Nagel claims this is no better than more orthodox forms of idealism in which reality is claimed to be made up of mental items or claimed to be constitutively dependent on a form supplied by the mind.
Philosophy of mind
Nagel is probably most widely known within the field of philosophy of mind as an advocate of the idea that consciousness and subjective experience cannot, at least with the contemporary understanding of physicalism, be reduced to brain activity. This position was primarily discussed by Nagel in one of his most famous articles: "What is it Like to Be a Bat?" (1974). The article's title question, though often attributed to Nagel, was originally posed by Timothy L.S. Sprigge. The article was originally published in 1974 in The Philosophical Review. However, the essay has been reprinted in several books that are concerned with consciousness and the mind, such as The Mind's I (edited by Daniel Dennett and Douglas Hofstadter), Readings in the Philosophy of Psychology (edited by Ned Block), Nagel's Mortal Questions (1979), The Nature of Mind (edited by David M. Rosenthal), and Philosophy of Mind: Classical and Contemporary Readings (edited by David J. Chalmers).
In "What is it Like to Be a Bat?", Nagel argues that consciousness has essential to it a subjective character, a what it is like aspect. He states that "an organism has conscious mental states if and only if there is something that it is to be that organism—something it is like for the organism." Nagel also suggests that the subjective aspect of the mind may not ever be sufficiently accounted for by the objective methods of reductionistic science. He claims that "[i]f we acknowledge that a physical theory of mind must account for the subjective character of experience, we must admit that no presently available conception gives us a clue how this could be done." Furthermore, he states that "it seems unlikely that any physical theory of mind can be contemplated until more thought has been given to the general problem of subjective and objective."
While Nagel is sometimes categorized as a dualist for these sorts of remarks, he is more precisely categorized as an anti-reductionist. Nagel (1998) writes:
|“||...I believe that there is a necessary connection in both directions between the physical and the mental, but that it cannot be discovered a priori. Opinion is strongly divided on the credibility of some kind of functionalist reductionism, and I won't go through my reasons for being on the antireductionist side of that debate. Despite significant attempts by a number of philosophers to describe the functional manifestations of conscious mental states, I continue to believe that no purely functionalist characterization of a system entails—simply in virtue of our mental concepts—that the system is conscious.||”|
Ethics
Nagel has been highly influential in the related fields of moral and political philosophy. Supervised by John Rawls, Nagel has been a long-standing proponent of a Kantian and rationalist approach to moral philosophy. His distinctive ideas were first presented in the short monograph The Possibility of Altruism, published in 1970. That book seeks by reflection on the nature of practical reasoning to uncover the formal principles that underly reason in practice and the related general beliefs about the self that are necessary for those principles to be truly applicable to us. Nagel defends motivated desire theory about the motivation of moral action. According to motivated desire theory when a person is motivated to moral action its is indeed true that such actions are motivated, like all intentional actions, by a belief and a desire. But it is important to get the justificatory relations right: when a person accepts a moral judgement he or she is necessarily motivated to act. But it is the reason that does the justificatory work of justifying both the action and the desire. Nagel contrasts this view with a rival view which believes that a moral agent can only accept that he or she has a reason to act if the desire to carry out the action has an independent justification (an account based on presupposing sympathy would be of this kind).
The most striking claim of the book is that there is a very close parallel between prudential reasoning in one's own interests and moral reasons to act to further the interests of another person. When you reason prudentially, for example about the future reasons that you will have, you allow the reason in the future to justify your current action without reference to the strength of your current desires. If a hurricane destroys your car next year at that point you will want your insurance company to pay you to replace it: that future reason gives you a reason, now, to take out insurance. The strength of the reason ought not to be hostage to the strength of your current desires. The denial of this view of prudence, Nagel argues, means that you do not really believe that you are one and the same person through time. You are dissolving yourself into distinct person stages.
This is the basis of his analogy between prudential actions and moral actions: in cases of altruistic action for another person's good that person's reasons quite literally become reasons for you if they are timeless and intrinsic reasons. Genuine reasons are reasons for anyone. Comparable to the views of the nineteenth century moral philosopher Henry Sidgwick, Nagel believes that you need to conceive of your good as an impersonal good and your reasons as objective reasons. That means, practically, that a timeless and intrinsic value generates reasons for anyone. A person who denies the truth of this claim is committed, as in the case of a similar mistake about prudence, to false view of him or her self. In this case the false view is that your reasons are irreducibly yours, in a way that does not allow them to be reasons for anyone: Nagel argues this commits such a person to the view that he or she cannot make the same judgements about her own reasons third personally that she can make first personally. Nagel calls this "dissociation" and the practical analogue of solipsism where the latter is the false belief that yours is the only mind that exists. Once again, a false view of what is involve in reasoning properly is refuted by showing that it leads to a false view of the nature of people.
In his later work on ethics Nagel no longer places as much weight on the distinction between a person's personal or "subjective" reasons and his or her "objective" reasons. In the Possibility of Altruism if your reasons really are about intrinsic and timeless values then, qua subjective reason, you can only take them to be the guise of the reasons that there really are - the objective ones. In his later discussions Nagel treats this view as an incomplete grasp of the fact that there are distinct classes of reasons and values. In the case of agent-relative reasons (the successor to subjective reasons) specifying the content of the reason makes essential reference back to the agent for whom it is a reason. (An example might be: "Anyone has a reason to honour his or her parents") In the case of agent-neutral reasons (the successor to objective reasons) specifying the content of the reason does not make any essential reference back to the person for whom it is a reason. (An example might be "anyone has a reason to promote the good of parenthood".)
This emphasis on different classes of reasons and values, however, remains committed to the Sidgwickian model of thinking objectively about your moral commitments such that your reasons are values are only incomplete parts of an impersonal whole. The structure of Nagel's later ethical view is that all reasons must be brought into relation to this objective view of oneself. Those of your reasons and values that withstand detached critical scrutiny are objective; but other reasons and values that are more subjective can be objectively tolerated. However, the most striking part of the earlier argument and of Sidgwick's view is preserved: agent neutral reasons are literally reasons for anyone so all objectifiable reasons become yours no matter whose they are. When you think reflectively about ethics you come to see that every other agent's standpoint on value has to be taken as seriously as yours as your perspective is just your take on an inter-subjective whole. So that which you took to be your personal set of reasons is swamped by the objective reasons of all others.
This is similar to "World Agent" consequentialist views in which you take up the standpoint of a collective subject whose reasons are those of everyone. But Nagel remains an individualist who believes in the separateness of persons so his task is to explain why this objective viewpoint does not swallow up the individual standpoint of each of us. He provides an extended rationale for the importance to each of us of our personal point of view. The result is a hybrid ethical theory of the kind defended by Nagel's Princeton PhD student Samuel Scheffler in the Rejection of Consequentialism. The objective standpoint and its demands have to be balanced with the subjective personal point of view of each of us and its demands. You can always be maximally objective but you do not have to be. You can legitimately "cap" the demands placed on you by the objective reasons of others. In addition, in his later work, Nagel finds a rationale for so-called deontic constraints in a way Scheffler could not. Following Warren Quinn and Frances Kamm Nagel grounds them on the inviolability of persons.
The extent to which you can lead a good life as an individual while respecting the demands on others leads inevitably to political philosophy. In the Locke lectures published as the book Equality and Partiality Nagel exposes John Rawls's theory of justice to detailed scrutiny. Once again Nagel places such intellectual authority on the objective point of view and its demands that he finds Rawls's view of liberal equality not demanding enough. Rawls's aim to redress, not remove, the inequalities that arise from class and talent seems to Nagel to lead to a view that does not sufficiently respect the needs of others. He recommends a gradual move to much more demanding conceptions of equality, motivated by the special nature of political responsiblity. Normally we draw a distinction between that which we do and that which we fail to bring about. But this thesis, true of individuals, does not apply to the state which is our collective agent. A Rawlsian state permits intolerable inequalities and we need to develop a more ambitious view of equality to do justice to the demands of the objective recognition of the reasons of others. For Nagel honouring the objective point of view demands nothing less.
Selected publications
Books
- The Possibility of Altruism (1970), Oxford University Press. (Reprinted in 1978, Princeton University Press.)
- Mortal Questions (1979), Cambridge University Press, ISBN 978 0 521 40676 5
- The View from Nowhere (1986), Oxford University Press.
- What Does It All Mean?: A Very Short Introduction to Philosophy (1987), Oxford University Press.
- Equality and Partiality (1991), Oxford University Press.
- Other Minds: Critical Essays, 1969-1994 (1995), Oxford University Press.
- The Last Word (1997), Oxford University Press.
- The Myth of Ownership: Taxes and Justice (2002), (with Liam Murphy) Oxford University Press.
- Concealment and Exposure and Other Essays (2002), Oxford University Press.
Articles
- 1959, "Hobbes's Concept of Obligation", Philosophical Review, pp. 68-83.
- 1959, "Dreaming", Analysis, pp. 112-6.
- 1965, "Physicalism", Philosophical Review, pp. 339-56.
- 1969, "Sexual Perversion", Journal of Philosophy, pp. 5-17.
- 1969, "The Boundaries of Inner Space", Journal of Philosophy, pp. 452-8.
- 1970, "Death", Nous, pp. 73-80.
- 1970, "Armstrong on the Mind", Philosophical Review, pp. 394-403 (a discussion review f A Materialist Theory of the Mind by D. M. Armstrong).
- 1971, "Brain Bisection and the Unity of Consciousness", Synthese, pp. 396-413.
- 1971, "The Absurd", Journal of Philosophy, pp. 716-27.
- 1972, "War and Massacre", Philosophy & Public Affairs, vol. 1, pp. 123-44.
- 1973, "Rawls on Justice", Philosophical Review, pp. 220-34 (a discussion review of A Theory of Justice by John Rawls).
- 1973, "Equal Treatment and Compensatory Discrimination", Philosophy & Public Affairs, vol. 2, pp. 348-62.
- 1974, "What Is it Like to Be a Bat?", Philosophical Review, pp. 435-50. Online text
- 1976, "Moral Luck", Proceedings of the Aristotelian Society Supplementary vol. 50, pp. 137-55.
- 1979, "The Meaning of Equality", Washington University Law Quarterly, pp. 25-31.
- 1981, "Tactical Nuclear Weapons and the Ethics of Conflict", Parameters: Journal of the U.S. Army War College, pp. 327-8.
- 1983, "The Objective Self", in Carl Ginet and Sydney Shoemaker (eds.), Knowledge and Mind, Oxford University Press, pp. 211-232.
- 1987, "Moral Conflict and Political Legitimacy", Philosophy & Public Affairs, pp. 215-240.
- 1994, "Consciousness and Objective Reality", in R. Warner and T. Szubka (eds.), The Mind-Body Problem, Blackwell.
- 1995, "Personal Rights and Public Space", Philosophy & Public Affairs, vol. 24, no. 2, pp. 83-107.
- 1997, "Assisted Suicide: The Philosophers' Brief" (with R. Dworkin, R. Nozick, J. Rawls, T. Scanlon, and J. J. Thomson), New York Review of Books, March 27, 1997.
- 1998, "Reductionism and Antireductionism", in The Limits of Reductionism in Biology, Novartis Symposium 213, John Wiley & Sons, pp. 3-10.
- 1998, "Concealment and Exposure", Philosophy & Public Affairs, vol. 27, no. 1, pp. 3-30. Online text
- 1998, "Conceiving the Impossible and the Mind-Body Problem", Philosophy, vol. 73, no. 285, pp. 337-352. Online PDF
- 2000, "The Psychophysical Nexus", in Paul Boghossian and Christopher Peacocke (eds.) New Essays on the A Priori, Oxford: Clarendon Press, pp. 432-471. Online PDF
- 2003, "Rawls and Liberalism", in Samuel Freeman (ed.) The Cambridge Companion to Rawls, Cambridge University Press, pp. 62-85.
- 2003, "John Rawls and Affirmative Action", The Journal of Blacks in Higher Education, no. 39, pp. 82-4.
Secondary Reading
2008 Thomas Nagel, by Alan Thomas, Acumen Publishing UK, McGill/Queens University Press USA/Canada.
References
- ^ Biographical information from Nagel's CV at NYU (PDF).
- ^ From Nagel's faculty page at New York University.
- ^ "The Rolf Schock Prizes 2008". 2008-05-12. http://www.kva.se/KVA_Root/swe/_news/detail.asp?NewsId=1061&br=ns&ver=6up. Retrieved on 2008-09-20.
- ^ "Balzan Prize 2008 (1 Million Swiss Francs) Awarded for Moral Philosophy". http://www.apaonline.org/news/Balzan.aspx. Retrieved on 2008-09-30.
- ^ http://www.ox.ac.uk/gazette/2007-8/supps/1_4850.htm#4Ref
- ^ Nagel, "What is it Like to Be a Bat?" (1974), p. 436.
- ^ Ibid., p. 445.
- ^ Ibid., p. 450.
- ^ Nagel, "Conceiving the Impossible and the Mind-Body Problem" (1998), p. 337.
External links
|Wikiquote has a collection of quotations related to: Thomas Nagel|
|Wikimedia Commons has media related to: Thomas Nagel|
- Thomas Nagel's faculty webpage - New York Univ.
- Thomas Nagel's CV (PDF) - New York Univ. | http://taggedwiki.zubiaga.org/new_content/6918711b0a1b2aeed7b5eea8cdac5f6f |
Vertigo is Alfred Hitchcock’s masterpiece, which is saying something of the director who also gave us such classics as Psycho, Rope, Rear Window, North by Northwest, and Strangers on a Train. Jimmy Stewart and Kim Novak turned in excellent performances. Somehow Hitchcock magically combines a technical masterpiece with an enjoyable viewing experience. Not easy to do.
Interestingly, the movie critics now hail as the best ever got mixed reviews at its release. “Too long…too slow…bogs down,” they wrote. It never caught fire at the box office, either. And it received only two Oscar nods (in minor categories), and didn’t win either one. But don’t tell the critics that Sight And Sound polled. They’ll give you quite an enthusiastic rebuke. | https://www.greatamericanthings.net/tv-movies/film-tv-movies/vertigo/ |
Job Description:
JOB SUMMARY
The Digital Service & Customer Experience organization at Charter is responsible for defining a holistic service experience for 31 million Spectrum customers, across all touch points, especially digital self-service.
The Digital Service & CX Analyst is an experience designer who will participate in creating and driving the adoption of industry-leading experiences covering key customer touch points while enjoying all Spectrum products and services including internet, cable, phone, and mobile. These experiences include digital customer onboarding, mobile app adoption, self-installation and customization of services.
The experience designer is responsible for supporting customer experience requirements, process design, system changes, testing, analysis and reporting. Additionally, the designer will participate in evaluating emerging technologies that contribute to Charter's vision to drive best in class digital self-service.
MAJOR DUTIES AND RESPONSIBILITIES
Actively and consistently support all efforts to simplify and enhance the customer experience.
Educate and socialize the Digital Service & CX strategy to internal and external partners.
Support the integration of new products and services, regulatory requirements, tools, technologies and markets into existing operations.
Ensure complete analysis and understanding of interdependencies, business risks, risk mitigators that could impact or be impacted by the delivery of new products, services, processes and/or support technologies.
Ensure all defined business rules/policies are documented, implemented as designed. Ensure process enablers are working as designed (automated as well as manual). Ensure available technology is leveraged to the fullest extent. Redesign business process where applicable to leverage available or new technologies.
Function as the liaison between the business unit and the other supporting functional organizations (IT, OSS, Billing, 3rd Party suppliers, etc.) to properly interpret and deliver to the functional specifications. Ensure alignment between the business operational strategies and technical solutions.
Leverage data to deeply understand and recommend enhancements to ensure the customer experience with Charter's implementation is industry-leading.
Responsible for independently completing recurring processes.
Utilizes understanding of both business process and technical capabilities to implement solutions.
Manage day to day efforts on small to mid-size projects.
Contribute to requirements and test plans for larger projects.
Perform other duties as required.
REQUIRED QUALIFICATIONS
Required Education
Bachelor's degree in Business Administration or related field or equivalent experience
Required Related Work Experience and Number of Years
3 years of experience Business Operations Analysis
3 years of experience Project management
3 years of experience Telecommunications and/or experience with technology/software products
PREFERRED QUALIFICATIONS
Preferred Skills/Abilities and Knowledge
Passion for customer centric solutions to deliver best in class customer experience
Understand the application of business objectives to functional area
Ability to read, write, speak and understand English
Analyze and synthesize complex data
Ability to quickly identify business problems/opportunities
Ability to communicate orally and in writing in a clear and straightforward manner
Ability to define key performance indicators / metrics
Ability to document, prepare and present data-driven presentations
Ability to make decisions and solve problems while working under pressure
Ability to manage multiple projects at one time
Ability to prioritize and organize effectively
Ability to show judgment and initiative and to accomplish job duties
Ability to use personal computer & software applications (i.e. Word, Excel, Visio, etc.)
Partner with internal and external stakeholders, including vendor relationships
Knowledge of process and project management
Knowledge of general accounting and billing procedures
WORKING CONDITIONS
Office environment
CSU310 307906 307906BR
JOB SUMMARY
Keywords: SPECTRUM, Stamford , Customer Experience Designer, Other , Stamford, Connecticut
|
Click
here to apply! | https://www.stamfordrecruiter.com/other-jobs/2800570683/customer-experience-designer |
Views: 2 Author: Site Editor Publish Time: 2020-12-03 Origin: Site
Engine crane is a kind of large machinery, so someone developed a telescopic boom crane, so how does the telescopic boom crane fold up the boom?
What is a engine crane?
How to use a engine crane?
How to make an engine crane fold up?
Engine crane refers to the vertical lifting and horizontal lifting machinery within a certain range of heavy lifting. The working characteristic of the engine crane in is to do the intermittent movement, that is, in a working cycle, the corresponding mechanism of the movement of material, transport, unloading is alternately working. The engine crane mainly includes lifting mechanism, operating mechanism, luffing mechanism, slewing mechanism and metal structure. Lifting mechanism is the basic working mechanism of engine crane, which is mostly composed of hanging system and winch, but also lifting heavy objects through hydraulic system. The operating mechanism is used to move heavy objects vertically and horizontally or to adjust the working position of the engine crane. It is generally composed of an electric motor, a reducer, a brake and a wheel. The luffing mechanism is only equipped on the boom crane. The amplitude decreases when the boom is raised upward and increases when the boom is lowered downward. There are two types of luffing amplitude: balanced luffing amplitude and non-balanced luffing amplitude. A slewing mechanism for making the boom turn is composed of a driving device and a slewing bearing device.
1. The operator must check the brake, hook, wire rope, safety device and other components of the crane, and rule out any abnormal situation.
2. When the heavy weight is lifted for the first time in each shift (or when the load reaches the maximum), the weight should be lowered again after the lifting height is 0.5 meters from the ground, so as to check the performance of the brake and carry out normal work after it is confirmed reliable.
3. During the operation, the operator shall ring the bell to alarm the following operations according to the provisions.
(1) Lifting and dropping heavy objects; When driving big cars or small cars.
(2) If the line of sight is not clear, the crane shall ring the bell to alarm continuously when moving or passing.
(3) When the crane moves close to another crane within the span.
(4) When lifting heavy objects and approaching personnel.
4. The operation shall be carried out according to the unified command signal.
5. In case of sudden power failure during work, all controller handles should be placed at the "zero" position, and check whether crane movement is normal before working again.
6. The limit position limiter of the crane shall not be used for parking, and the lifting mechanism brake shall not be adjusted under load.
7. During operation, keep a close eye on the direction of operation and the presence of unmanned or obstructions nearby. When the work is finished, the engine anchor should be located.
8. After work, raise the crane hook to a certain height, park the truck at the designated position, put the controller handle at the "zero" position, pull down the protection box knife switch handle, and cut off the power supply.
9. Carry out daily maintenance of the crane and make handover records.
Principle of single cylinder bolt telescopic arm, is a big arm inside a cylinder and a "lock", and then used the lock to lock or open, inside a layer of the main arm can be locked in its outer layer of the main arm, is this, the strength of the telescopic arm length is a fixed value. Usually each section can be locked in 0%, 50%, 100%, their is each section telescopic boom of 0% 46%, 92%, 100% of the location can be locked. This pattern as is very common in engine crane telescopic boom.
This is how to fold the jib of a engine crane, and this article will show you how to fold the jib safely. | https://www.hzjack.com/How-to-make-an-engine-crane-fold-up-id3349431.html |
By Eli Weiner (LACIS Social Media/Outreach Intern, BBA – Marketing, BA – LACIS ’15)
As a department that strives to expand the cultural knowledge and awareness of UW-Madison students, LACIS makes it a priority to help students travel internationally. So far this year, LACIS has given two Internship Grants to students for internships or volunteer programs in Latin America, the Caribbean, or the Iberian Peninsula. LACIS has further provided financial assistance to four students traveling to Cuba in the Spring via an International Business course offered by the Wisconsin School of Business.
Riley Sexton, a senior, and Haley Olig, a fifth-year senior, are the well-deserved recipients of the Internship Grant. Riley is triple-majoring in LACIS, History and Economics. He has received his grant to volunteer with Nuestros Pequeños Hermanos (NPH, translates to “Our Little Brothers”), and as he puts it, “NPH is an amazing organization that helps vulnerable children throughout Latin America establish a stable living and learning environment.” He will specifically work with NPH-Honduras in Rancho Santa Fe, Honduras to develop a financial literacy program for the children “graduating from 9th grade who are either going on into their vocation or on to secondary education.”
Riley’s plan is to write a preliminary research report focused on financial literacy programs already available in Central America. He will then conduct a series of interviews with various NPH-Honduras members, and finally, he will use his findings to create the financial literacy program for the students. He’s not stopping there, though. He hopes that his efforts to create the financial literacy program can lay the foundation for similar, more effective programs to be created throughout Central and South America in the future.
Haley is majoring in LACIS, Spanish, and International Studies, and has recently obtained an internship with the Colombia Support Network’s Dane County Chapter (CSN). According to Haley, “The Colombia Support Network is a non-profit organization based in Madison, Wisconsin, that aims to educate U.S. citizens and members of government, while assisting and supporting peaceful campesino movements in Colombia.” Haley will be traveling to San José, Colombia, a sister city of Madison that has endured many hardships via humanitarian crimes committed by the Colombian government and paramilitary forces.
Haley will use the grant to join the 2016 CSN Delegation that will visit the Peace Community of San José de Apartadó, which was nominated for the 2007 Nobel Peace Prize. Haley will meet with the Bogotá office of the United Nations High Commission for Human Rights to discuss continuing human rights abuses, and will then do research on the reactions of individuals to these abuses. She further explains that she “plans to research the violations of their (San José community members) most basic human rights and how the individual reactions align with the community’s reaction to the human rights abuses it (the community) suffers as a whole.”
Furthermore, students Kimberly McCormick, Julia Raupp (LACIS), Katherine Voelkers, and Jennifer Wagman have all received financial aid from LACIS to participate in the International Business/Management and Human Resources course offering titled, “Cuba Seminar and Field Study.” This is a three-credit class taught by Professor Randy Dunham that will meet once a week during the Spring semester and is accompanied by an 11-day trip to Cuba. The trip includes many cultural and historical activities that will ensure a new cultural perspective for the students.
For more information on the LACIS Internship Grants, click here. Additionally, click here to learn more about the trip to Cuba. We wish everyone the best of luck in their travels and volunteer opportunities! Everyone here at LACIS is confident the money is in good hands and that these students will be respectful and intelligent ambassadors for the University of Wisconsin-Madison and the LACIS department. | https://lacis.wisc.edu/2015/12/16/lacis-helps-uw-students-travel-with-generous-grants/ |
The capacity to recover quickly from difficulties; toughness
I think we can all agree that this is a highly desirable trait – the question is, how do we achieve and maintain it, and what do we do when it runs out?
My first thought is that I believe resilience is highly correlated with self-efficacy – one’s sense that they have some control over their own outcome. In other words, if you feel like you can do something, you are more likely to bounce back from difficulties encountered in actually trying to do it. Conversely, if you feel powerless, you probably aren’t going to even try, much less show resilience at the first sign of trouble. If you feel like you have no power, then by definition you are going to feel like you are at the mercy of outside forces.
And of course there’s more than one kind of resilience – some people are mentally tough but physically weak, and vice versa. Let’s also be clear: some are born with a greater capacity for resilience than others, but that doesn’t mean that we all don’t share this trait to some degree.
Ultimately however, I think our capacity for resilience is most closely tied to our desire. If we want something badly enough, we won’t stop until we get it. No matter how much pain and suffering are dished out along the way. And if we want it badly enough, a good argument could be made that it’s not even that important whether or not we actually get it. The journey in working for it, and bouncing back from the painful failures we invariably encounter, becomes its own reward.
Maybe our ability to absorb pain and bounce back from it is the whole point – if so, perhaps we should celebrate what seems in the moment to be overwhelming stress and adversity as a test to see what we are made of. | http://oddballmusicworks.com/resilience/ |
No. 2--00--0540
_________________________________________________________________
IN THE
APPELLATE COURT OF ILLINOIS
SECOND DISTRICT
_________________________________________________________________
BRANDI ROMANO, ) Appeal from the Circuit Court
) of DuPage County.
Plaintiff-Appellant, )
)
v. ) No. 96--L--0782
)
)
MICHAEL MORRISROE, ) Honorable
) Robert K. Kilander,
Defendant-Appellee. ) Judge, Presiding. _________________________________________________________________
JUSTICE O’MALLEY delivered the opinion of the court:
Plaintiff, Brandi Romano, appeals from the trial court’s order granting summary judgment in favor of defendant, Michael Morrisroe. We reverse and remand.
On August 2, 1996, plaintiff filed a one-count complaint against defendant and his partner, Paul Conarty, alleging legal malpractice for the failure to make a written demand for underinsured motorist (UIM) arbitration within the two-year time limit set by the applicable insurance policy. Plaintiff eventually nonsuited Conarty and filed her first amended complaint against defendant only. Cross-motions for summary judgment were filed, and the trial court granted defendant’s motion for summary judgment, finding that, as a matter of law, plaintiff’s suit was barred by the statute of limitations (735 ILCS 5/13-214.3(b)(West 2000)). This appeal followed.
Plaintiff now contends that the trial court erred in granting defendant’s motion for summary judgment. A motion for summary judgment should be granted only when no genuine issue of material fact exists and the moving party is entitled to judgment as a matter of law.
Lawrence & Allen, Inc. v. Cambridge Human Resource Group, Inc.
, 292 Ill. App. 3d 131, 135 (1997). The disposition of a summary judgment motion is not discretionary, and the standard of review is
de novo
.
Lawrence & Allen
, 292 Ill. App. 3d at 135. To determine whether a genuine issue of material fact exists, a reviewing court should consider the pleadings, depositions, admissions, exhibits, and affidavits on file and construe them liberally in favor of the opponent of the motion and strictly against the movant.
Lawrence & Allen
, 292 Ill. App. 3d at 135. While a plaintiff need not prove its case in opposition to a summary judgment motion, it must present some factual basis that would arguably entitle it to judgment in its favor; thus, if a plaintiff fails to establish an element of its cause of action, summary judgment in the defendant’s favor is proper.
Lawrence & Allen
, 292 Ill. App. 3d at 135.
A cause of action for legal malpractice requires (1) an attorney-client relationship; (2) a duty arising from that relationship; (3) a breach of that duty; and (4) actual damages or injury proximately caused by that breach.
Profit Management Development, Inc. v. Jacobson, Brandvik & Anderson, Ltd.
, 309 Ill App. 3d 289, 308 (1999). A suit for attorney malpractice must be brought "within 2 years from the time the person bringing the action knew or reasonably should have known of the injury for which damages are sought." 735 ILCS 5/13-214.3(b)(West 2000). Under the "discovery rule," the two-year period does not necessarily begin the day the plaintiff suffers his injury; rather, the period starts when the plaintiff knows or should know facts that would cause him to believe that his injury was wrongfully caused.
Racquet v. Grant
, 318 Ill. App. 3d 831, 836 (2000). The injury is not the negligent act itself; it is something caused by the negligent act or omission for which the plaintiff may seek damages.
Profit Management Development
, 309 Ill. App. 3d at 308. No cause of action accrues without actual damages, and damages are only speculative if their existence itself is uncertain.
Profit Management Development
, 309 Ill. App. 3d at 308. Ordinarily, when a party becomes charged with such knowledge is a question of fact, and judgment should be entered as a matter of law only when the undisputed facts allow for only one conclusion.
Racquet
, 318 Ill. App. 3d at 836.
The following facts are undisputed. Romano was involved in an automobile accident on August 29, 1990. She retained the services of defendant for all aspects of her claims until March 31, 1993. John Munday became plaintiff’s attorney on April 28, 1993. Munday proceeded to settle plaintiff’s claim against the driver of the other car involved in the accident. On April 27, 1994, Munday sent a written demand for arbitration on the underinsured motorist coverage provided by Country Mutual Insurance Company (Country) on the vehicle in which plaintiff had been a passenger at the time of the accident. On June 29, 1994, Country responded by notifying Munday that it was forwarding the demand to its legal counsel to determine whether the demand was made on a timely basis. The UIM policy required that a written demand for arbitration be filed within two years of the accident or of the claimant's reaching majority. In this case, plaintiff reached majority on January 14, 1991. The entire file of plaintiff’s case had been turned over to Munday when he began his representation of plaintiff, and there was no written demand for arbitration contained within.
On July 19, 1994, Country notified Munday that it would not name an arbitrator because of an "unresolved coverage question which must be decided by the [c]ircuit [c]ourt." Munday responded that same day that he was unaware of any such issue. By letters dated August 3, 1994, Country notified both Munday and plaintiff that it denied UIM coverage on the basis that the arbitration demand was untimely. Munday received this letter on August 6 or 8, 1994. Country then filed a declaratory action in the circuit court on September 21, 1994. Plaintiff filed this case on August 2, 1996. The declaratory action was decided in Country’s favor in December 1998, and this court affirmed that judgment. See
Country Mutual Insurance Co. v. Romano
, No. 2--98--0296 (1999) (unpublished order under Supreme Court Rule 23).
In its written ruling, the trial court held that it "must have been painfully, as well as plainly obvious" to Munday, upon receipt of plaintiff’s file, that the UIM coverage was lost by defendant’s failure to submit a timely written demand for arbitration. According to the court, Munday should have known of the injury on April 27, 1994, when he sent the letter demanding arbitration, and he certainly should have known no later than June 29, 1994, when he received the letter from Country questioning the timeliness of the demand. Thus, citing
Lucey v. Law Offices of Pretzel & Stouffer, Chartered
, 301 Ill. App. 3d 349 (1998), the court found this to be a case where it is plainly obvious prior to an adverse ruling that the plaintiff was injured as a result of professional negligence. The trial court held that the cause of action existed, and the statute of limitations began to run, no later than June 29, 1994, when Country notified Munday that it was forwarding the arbitration demand to legal counsel. The August 2, 1996, filing of the case against Morrisroe was, therefore, untimely.
We conclude that the trial court erred in granting defendant’s motion for summary judgment. The undisputed facts do not lead only to the conclusion drawn by the trial court. See
Racquet
, 318 Ill. App. 3d at 836. The absence from the file of a written demand for arbitration is not sufficient to cause someone, even an attorney, to realize that a breach of duty has occurred, let alone that an injury was wrongfully caused. It was not obvious to Country, when it received the written demand some 15 months after the demand was due, that the demand was not timely. On June 29, 1994, Country sent the demand to its legal counsel to make that determination, and, on July 19, 1994, Country notified Munday that there was an "unresolved coverage question which must be decided by the [c]ircuit [c]ourt." It was not until the letter dated August 3, 1994, that Country notified plaintiff and Munday that it was denying UIM coverage because it deemed the arbitration demand to be untimely. Thereafter, when it filed the declaratory action on September 21, 1994, Country retreated to its position that the coverage question required resolution by the circuit court. It was not obvious to defendant either, as is evidenced by the following exchanges that took place during defendant’s January 19, 2000, deposition (taken in connection with the declaratory action):
"Q. Now, we can make this long or fast. I’m going to ask you point-blank, do you think you breached a standard of care in not filing the demand for arbitration for Brandi Romano against Country Mutual prior to the expiration of that two-year period?
[Defendant] A. No.
Q. Why?
A. I believe that Country Mutual already had notice of her claim.
* * *
Q. Did you do that? Did you file a written demand for arbitration within the time specified in the policy covering Brandi Romano?
A. To the best of my knowledge, no.
Q. And as an attorney, would this be malpractice in that you failed to do that?
A. I think I go back to my earlier answer.
Q. And that answer is what? It’s the last time I’ll ask you. Your answer is, you don’t think so?
A. No. That’s correct."
Furthermore, in the area of insurance contracts, clauses imposing a period of limitation less than that required by the statute of limitations are strictly construed; they are allowed to be readily waived, and slight circumstances will be held sufficient to constitute waiver of such stipulations.
Ciaccio v. North River Insurance Co.
, 17 Ill. App. 3d 940, 942 (1974), citing Ill. L. & Prac.
Insurance
§526 (19__) (now 22A Ill. L. & Prac.
Insurance
§520 (1999)). Thus, it would not have been clear, immediately upon receipt of plaintiff’s file, that plaintiff would be precluded from seeking arbitration with Country, even though the date for filing a demand had passed. Defendant had been involved in discussions with Country prior to the expiration of the limitations period and believed that Country had been notified of the claim; potentially, Country could be found to have waived the limitations period or be estopped from invoking it, based on its conduct during those discussions. See
Ciaccio
, 17 Ill. App. 3d at 942.
The trial court quoted
Lucey
for the proposition that this was a case in which "it is plainly obvious, prior to any adverse ruling against the plaintiff, that [the plaintiff] has been injured as a result of professional negligence." See
Lucey
, 301 Ill. App. 3d at 358. However, the court in
Lucey
found such a situation to be the exception to the frequently recognized rule that a cause of action for legal malpractice rarely will accrue prior to the entry of an adverse judgment, settlement, or dismissal of the underlying action in which the plaintiff had become entangled due to the alleged negligence of his attorney. See
Lucey
, 301 Ill. App. 3d at 356-57 and cases cited therein. Thus, in
Lucey
, the plaintiff’s cause of action did not arise when he was alerted to the possibility that he had received incorrect legal advice. Rather, the plaintiff’s tentative damages would not become actionable "unless and until" the litigation that resulted from the advice ended adversely to him.
Lucey
, 301 Ill. App. 3d at 359.
The trial court followed
Dancor International, Ltd. v. Friedman, Goldberg & Mintz
, 288 Ill. App. 3d 666 (1997), which involved an accountant malpractice question, affirming the trial court's dismissal on the basis that the plaintiff's lawsuit had not been filed within the applicable statute of limitations period. However, in determining in this case whether plaintiff's lawsuit was filed within the applicable statute of limitations, the issue is compliance with the contractual limitations period contained in the Country insurance policy. As we have already noted, a contractual limitations period is a different animal from a statute of limitations period. This is especially so in the world of insurance policy contracts (as opposed to statutes of limitations), where waiver and estoppel are quite readily found.
Even if the trial court was correct in finding that a breach of duty was plainly obvious before the adverse ruling, we still determine that the court erred. It is the realized injury to the client, not the attorney’s misapplication of his legal expertise, that marks the point for measuring compliance with a statute of limitations period.
Goodman v. Harbor Market, Ltd.
, 278 Ill. App. 3d 684, 690 (1995), citing
Hermitage Corp. v. Contractors Adjustment Co.
, 166 Ill. 2d 72, 90 (1995) (Freeman, J., dissenting). At the earliest, it was the August 6 or 8, 1994, receipt of the August 3 letter that indicated a possible injury, as it was not evident until Country denied coverage that any injury occurred and that the injury was caused by defendant’s failure to file the arbitration demand in a timely fashion. Until Country denied coverage, the possibility existed that Country would waive the limitations period. Plaintiff suffered no injury for which she could seek damages until her claim was denied; therefore, the cause of action could not accrue until this occurred. See
Brite Lights, Inc. v. Gooch
, 305 Ill. App. 3d 322, 326 (1999).
Thus, the statute of limitations in this case would not have expired until August 6, 1996, at the earliest. As this case was filed on August 2, 1996, it was filed in a timely manner.
The logic supporting a finding that the cause of action accrued in August 1994, however, could lead to a surfeit of provisional and prophylactic malpractice cases. In this case, the malpractice case against Morrisroe was filed fully 28 months before the declaratory action was decided in Country’s favor. Had the declaratory action been decided in Romano’s favor, there would have been no valid malpractice claim, and the malpractice case would have spent over two years on a court docket, wasting judicial resources on a case in which no one was injured. Judicial economy suggests that we not encourage such unnecessary filings. See
Lucey
, 301 Ill. App. 3d at 357-58 (and cases cited therein). An August accrual date would have led to an absurd result here if defendant had not terminated his representation of plaintiff and had filed a written demand for arbitration in April 1994, as Munday did. An August accrual date would have required plaintiff to file a malpractice action against defendant while he still represented plaintiff in the underlying declaratory action. Such a situation would be awkward, to put it mildly. However, if the cause of action did not accrue until plaintiff received an adverse judgment in the declaratory action, such an outcome would be avoided. We believe that the principles set forth in
Lucey
are persuasive, and we determine that plaintiff’s injury was not certain, and her cause of action did not accrue, until the adverse judgment issued in the underlying declaratory action.
We conclude that plaintiff timely filed her complaint in this case, and the trial court erred in granting summary judgment for defendant. For these reasons, the judgment of the circuit court of DuPage County is reversed, and the cause is remanded for further proceedings.
Reversed and remanded.
McLAREN and CALLUM, JJ., concur.
| |
Most of the research we’ve led over the years relates to obesity management and prevention. However, working with colleagues and trainees in nutrition, a parallel stream of research has focused on food insecurity (FI), a phenomenon that is broadly defined as ‘economic and social conditions that lead to inadequate or uncertain access to quality food’. This week, a new publication showed how these two areas can converge.
Based at a pediatric weight management clinic in Minnesota, researchers (pdf below) measured food insecurity among families (n=116) enrolled in care, finding that (1) ~25% of families met their definition of FI and (2) ~33% were eligible for Supplemental Nutrition Assistance Program (SNAP) through a community-based food bank. Interestingly, only 8% (or 3 families) ended up completing the SNAP enrollment process.
A few ‘take home’ points:
1. FI may be more common than we think among families enrolled in pediatric weight management. As done in this study, the use of a valid and reliable measure of FI provides an objective assessment that is likely superior to clinicians’ anecdotal impressions.
2. FI is linked with a number of social and economic factors (e.g., race/ethnicity, family income, education, stigma), so while it’s easy to measure FI, helping families to address FI effectively is a more complex undertaking that requires effective and sensitive communication, collaboration, and rapport between families and clinicians.
3. The value of having a multi-disciplinary, weight management team whose members have a range of experiences and expertise (e.g., social worker, nutrition, psychology, pediatric medicine) is needed to support families who present with FI and obesity. This helps to ensure that families receive the best services possible to meet their most pressing health needs, which may include weight management, but also other pressing issues such as accessing acceptable and healthy foods on a consistent basis. | https://childhoodobesityresearchinsight.com/2016/06/22/food-insecurity-obesity-paradox/ |
I have been fascinated by stories in games ever since I fell more and more into the universe of gaming. When I started making games I was convinced stories were the most important thing in games. I read books on game design which stated that games couldn’t tell decent stories and probably never will. They told me the important thing about games was the mechanics, story was just a lick of paint. That was several years ago and ever since reading this I have been determined to make stories a part of games that people didn’t think of as a lick of paint.
As I learnt more about games I decided that some serious thought was needed to decided how stories in games should be treated. Thankfully 2013 has provided some amazing games that have finally given me confidence that storytelling has a place in games. But not like any other medium. This was the revelation I needed.
If we take a step back for a minute and look at storytelling in other mediums we notice something. Its different in every medium. Books, for example tell stories by describing situations and characters in a unique way that engages a persons imagination and lets them follow the story in a deep and meaningful way. Movies and television use completely different methods to tell stories, they rely on visuals to tell a story, however, books and television both have something in common. They are both forms of passive storytelling.
Passive storytelling is when the reader or viewer sits along and watches the story as told by someone else. They do not have any involvement in it. This allows the writers to craft a dramatic ark with twists and cliffhangers that get the viewer or reader on the edge of their seat as they follow the story.
This is were games come in. Games have always fascinated me far more than any other medium of entertainment and art because of how many levels of interaction they have. They are interactive and visual, which create a whole new level of psychology that the player experiences. This however, in my observations, ruins the normal methods of storytelling. Dramatic arks for example are not as effective because the player has direct effect over the outcome of the game. The player could walk forward and trigger a cutscene with a plot twist, or they could walk around in circles, breaking the pacing of the story. This makes it much harder to tell a story.
The player is now not a witness, he is not being guided through a story. He is now a part of it. Its not a case of watching a character. The player is the character, the character is an extension of the player in the same way a car is. The character therefore inherits all the personality traits of the player. This can create situations that detriment a linear story, for example if the character is presented as a shy and fearful, but the player can then take control and run over people in the street with a car. Admittedly this is an exaggerated example since many game developers carefully craft their characters and mechanics so its hard to do something that doesn’t make sense. But you are now taking away freedom from the player. A difficult problem to fix.
I have been quite negative so far so lets see how we can fix this problem. Lets start by looking at the strengths of games. Games are systems. Systems of mechanics, very often with a reward or achievement system. These achievements and rewards are often psychological more than literal. For example making a player feel powerful after using a massive weapon, or passing a difficult level. This must be the basis for telling a story, rather than using methods borrowed from other mediums. The problem still exists though, how can we get the player to behave in a way that makes sense to a story? It is clear games require whole new ways to tell stories than have ever existed before.
The way I think this should be done, and they way a lot of modern games are going now, is context. That is putting the player in a context that makes sense. A story is not a context, the world is the context. The universe the player is involved in. I have noticed that when a player is given a world that makes sense, they will likely fall deeper and deeper into it. They will take on behaviours that their subconscious think’s they should in the context. This is similar to social convention in the real world. We just need to use it in fictional worlds. The player however must need to feel like they want to be in this world. The Assassins Creed games are wonderful examples of this. The player is absorbed into a world that they feel makes sense, they feel like they want to be a part of this world. In AC4 the player is lost in a pirate world and so starts to do things pirates would, which make sense in the story.
Obviously this has a problem, it doesn’t always work. Everyone plays games differently, which means their experience of the game is going to be different, but this is okay. We need to accept that games are not linear. Everyones experience will be different, but that is because, unlike books or television, the player is actually a part of the story. This is something we need to celebrate about this medium and cherish for its uniqueness.
Doing this in games is not easy, I will not sugar coat that. You need to make the player feel like the character, and then give them a choice of actions that make sense, however the player must not feel restricted. The Elder Scrolls V: Skyrim is an example where I don’t think this has been done as well as it could be. For example players are given a race, which gives them a backstory and personality. It is fully the players responsibility to act like an elf for example, but when the player does something that an elf wouldn’t do, it doesn’t quite feel right. In this sense, a huge amount of games are essentially role-playing games, as in the player has to want to role-play the character.
The players imagination is another important part of this process. They need to become the character in their own head. Imagination can also be used to help the player experience a story rather than watch it. If you look at your own life as a story that you experienced you will see that nobody told you how your life is going, you figured it out yourself based on what was happening around you. Games need to tell stories in the same way. Put the player in a situation were he can use his imagination to connect the dots and realize what’s going on. The player will relish the moment he figured it out far more than when he was told what was going on. Its a case of show, don’t tell.
Now I want to tackle the problem with cutscenes and cinematics. They are a borrowed form of storytelling from another medium, this isn’t good. We need to figure out how to tell stories without cutscenes. We are getting much better at this though, which makes me exceedingly happy. A great example is Call of Duty. The call of duty games have very little cutscenes, other than the animated sequences shown during level loading. These sequences never have animated characters, rather visuals and voices. They are also short and snappy. The rest of the story is told with dialogue while the player plays the game, and the occasional moment of a super quick cinematic that blends seamlessly into gameplay. This, in my opinion, is a very good way of dealing with linear stories. While on the subject I’d like to mention how the gameplay of Call of Duty matches the personality of the character, so it never feels out of place in the story.
I was thinking the other day about games and what I remember from games. After a chat with a friend I noticed something. I remember what I call “player engineered moments” far more than I do scripted moments of stories. What I mean by player engineered moments is memorable moments where whatever happens is as a result of my own actions. Examples of games that do this very well are Grand Theft Auto 5 and Just Cause 2. Both are sandbox games and both give the player huge choice over their actions. This is an example of a highly non-linear game, and it really does feel like a game. If a game is filled with moments like these you have a situation were the story can be completely and utterly player engineered. The player has full control over the story, and he feels this. Games with branching storylines tend to not feel as liberal as they intend to, I often feel like I’m missing out when I know there is another storyline I am missing. The key is to make the player feel completely in control of the story, as though it’s player engineered but isn’t as free as the player thinks.
The Walking Dead game, although obviously linear has moments of this done very well. I was discussing my experiences of the game with a friend when I noticed that our opinions of the characters vary wildly. They hated a character, that I loved. The game makes you feel involved in the story far more than a television show because you do genuinely have control over things, even though they are minor it makes a noticeable difference in the players experience.
When crafting stories for games one must remember that the player will enjoy a story he experienced far more than one he was told. Games are not like movies, and I think it is completely valid to think of storytelling in games as something different. To prove my point I will ask you to leave a comment telling me you’re most memorable moment in games. Is it a scripted moment? Or is it the time you went hunting in Red Dead Redemption and you fought a huge and vicious bear to the death?
I asked myself after thinking about player engineered moments if the actual systems of mechanics in a game could tell a story rather than dialogue and cutscenes. Its a difficult question to answer, although I do believe they can. It’s the other side of my previous argument. If the player does things that make sense in the world, they will contribute to the character development and therefore the story of the game. Bioshock Infinite uses subtle psychological cues to influence a player’s actions so they compliment the story. A particular example is when (SPOILERS) the statue in the city is collapsing, you walk out into the beach and everyone is looking at the statue. Your normal human reactions cause you to look in the direction of the statue, because everyone else is. This is superb, as you have shown the player something, without taking control away from him, and without using cutscenes or cinematics.
Another example of telling a story with few cutscenes is Brothers: A Tale of Two Sons. The game has no dialogue, although very effectively tell’s a story through body language. Can you imagine trying to sway a players thoughts by the way a character moves. It is an effective means of conveying emotion, just as I mentioned earlier, you show the player, instead of telling them. They will connect the dots and create a story. An important factor here is empathy. Emotional empathy is very powerful and can be used effectively to draw the player into the role of a character. If the events around the character in the game would make you feel sad, and you craft animations that make the character look sad, the player will follow. This is another thing games have over movies and books. The feeling of empathy is far more powerful and involving than the sympathy of watching someone else.
When the player has so much control over the story they may create situations were someone in real life would say “this is the stuff you cannot write”. This is perfect, when the player is feeling so involved in the world they can engineer a story from what they find around them, that makes sense in their head, a story in which they feel a part of, like it is real life. This is the power of games, a drastically different medium of entertainment and storytelling than anything we have ever seen before.
As I briefly mentioned earlier player interpretation is a factor here, a factor we cannot ignore. Although I am comfortable in the knowledge that that is okay. Think of a painting, think of how a painter can tell a story using just a simple image, were the viewers interpretation of the image fill in the gaps and create the story. Games are no different. This is also an argument towards games being art. As they share the way in which the player or viewer interprets something to create the story.
I am confident we are heading towards this in the games industry, 2013 has been the best year for storytelling in my opinion, games like BioShock Infinite, the Last of Us and indie games like Gone Home, The Stanley Parable and Brothers have made mind blowing leaps towards what storytelling in games should be like.
We must never forget that games are a completely different medium to anything humans have encountered before, therefore it is unfair to compare the storytelling in games to books and movies and then say it is bad. Its not bad it’s just very different, its storytelling where the player’s imagination tells the story, however it is possible however for you to have some control over how the player’s thoughts and imagination go, therefore you can tell a story, like never before. | http://peripherallabs.com/games-whole-new-form-storytelling/ |
The Stanley Slipper Gold Medal is amongst the highest honours awarded by the Canadian Society of Petroleum Geologists (CSPG). The Stanley Slipper Gold Medal was established in 1989 and is named for Mr. Stanley E. Slipper (1890-1982) who was the Alberta Society of Petroleum Geologists' first President and a pioneer of early exploration efforts in Alberta. The medal is presented annually for outstanding contributions to petroleum exploration and development either in Canada or by Canadian-based petroleum geologists working internationally. In contrast to other CSPG awards, the Stanley Slipper Award recognizes, in part, accomplishments in business and in the broader petroleum industry through the application of the knowledge of petroleum geology.
Nominee Eligibility
- Must be a member of the CSPG
- Must be living at the time of nomination
- Must be a petroleum geologist
- Must not be serving on the current CSPG Board of Directors of the Stanley Slipper Award Committee or have served on either in the last two years
- Must not have received the Award previously
- Must be recognized as having made significant contributions in one or more of the following areas:
- initiating and/or leading exploration or development programs
- making significant discoveries on new or existing exploration trends
- applying new technologies to exploration and exploitation
- teaching and/or training of petroleum geologists
To Nominate
- Provide a letter with compelling evidence to support the nominee's professional and career achievements. The letter should target 250 words. Submit the nomination letter to the CSPG office ([email protected]) by November 1st.
- Two separate letters of about 250 words from other CSPG members supporting the nomination should be submitted.
2021 Recipient
Dr. Thomas Moslow
Read the award citation here. | https://www.cspg.org/IMIS20/Society/Awards/Career/CSPGIMIS20/Members/Awards/Career_Awards.aspx?hkey=8180843a-6ece-4fff-9bfb-4a4466d36a4a |
A U.S. Geological Survey program coordinator has sent an alert to colleagues around the world, warning that the Trump administration’s proposed 2018 budget cuts, if approved, will undermine important data-gathering programs and cooperative studies in areas including forests, volcanoes, flooding, wildfires, extreme precipitation and climate change.
The email went to 500 researchers on June 19 to give them time to comment on the proposed changes and prepare. In it, Debra Willard, coordinator for the USGS Climate Research and Development Program, wrote that the cuts “would reduce or eliminate the availability of current data and collaborations between the USGS, other agencies and universities.”
The reductions threaten as many as 40 programs involved in monitoring the speed and severity of climate change impacts and the effects of other land use changes, Willard said.
So far, the agency has received responses from dozens of scientists in Europe, Asia, and North America.
“There was a consensus that suspension of the USGS projects would impede ongoing activities in the international research and policy communities,” Willard said of the responses.
Science advocacy groups say the proposed budget threatens U.S. leadership in important scientific fields and could leave American researchers isolated from the rest of the world.
Peter Frumhoff, science and policy director for the Union of Concerned Scientists, said that the USGS research programs targeted for cuts provide important information for predicting natural hazards like floods, landslides and fires.
“In the Northeast, where I live, the USGS monitors extreme precipitation events. We can’t afford to be flying blind. These programs provide fundamental understandings about how to manage water, fire and forests,” he said. “Taking the pulse on the health of our nation’s resources in real-time in a changing climate gives critical baseline data that we need to protect communities,” he said.
On the international stage, the cuts would also damage America’s scientific reputation and global leadership position, said Alistair Jump, a forest ecologist at the University of Stirling in Scotland, who has worked with the USGS studying extreme climate impacts to forests, including links between drought and forest die-offs.
That research helps forest-reliant communities plan for a sustainable future. USGS research shapes tree-planting programs, as well as strategies for recreation, wildfire mitigation, and water and wildlife management.
“Restricting USGS’s ability to operate broadly and effectively on the national and global stages risks setting back our ability to solve environmental problems by decades,” Jump wrote in his response to the USGS letter.
Nicholas Arndt, an earth sciences professor at the Université de Grenoble, France, and committee head for the European Geosciences Union, said international programs that could be affected include those monitoring earthquakes and volcanic hazards, and the search for new water sources and other natural resources.
“The USGS and other U.S. agencies such as NOAA are actively involved in these programs. As head of the EGU Outreach Committee, I greatly regret the proposed budget cuts which, if put into practice, will have a major impact on research that is crucial if we are to understand the fate on our planet,” Arndt wrote.
The overall shifts in the budget are of big concern to American Geophysical Union Director and CEO Christine McEntee.
“We do think it’s serious, and, if passed into law, it would have devastating effects on our efforts as a country to be innovative and competitive,” McEntee said. “From a U.S. perspective, cutting back on this type of research is counter to what the administration says it wants, like protecting public safety and national security, and spurring economic growth.”
McEntee said the AGU is organizing a lobbying effort, with scientists and citizens reaching out to lawmakers about the importance of USGS science. She’s hopeful that Congress will restore the funding during the budget process because there is a core of bipartisan support for earth and space science.
In a May 23 statement on the USGS budget, U.S. Interior Secretary Zinke said the cuts were aimed at “wasteful spending” and “a bloated Washington, D.C., bureaucracy,” and that funding would be redirected to exploiting domestic fossil fuel resources, with a focus on “Alaska, mid-continent and southeast regions of the United States.”
Willard explained in the email that “by fostering interdisciplinary research on the physical, chemical, and biological components of the Earth, climate R&D scientists are documenting the impacts of various changes on the Earth system to improve understanding of the vulnerability and resilience of different regions and sectors.”
Jump, the Scottish forest researcher, says being able to count on the support of USGS scientists like Craig Allen, a research ecologist based in New Mexico, has been critical to many international projects.
“I’m not sure that I’ve come across another individual who can talk with such knowledge and passion about so many different aspects of forest and landscape function, causes and implications of change, past present and future—and in the USA and wider world,” he said.
Jump says his research projects in the U.S. West, working with the USGS scientists, have been eye-opening. | https://insideclimatenews.org/news/15072017/usgs-geological-survey-trump-budget-scientific-data-access-research-climate-change/ |
Police investigate report of man with gun at Cedar High School in Iron County
CEDAR CITY, Utah, Dec. 8, 2020 (Gephardt Daily) — Police investigated a report of a man with a gun at Cedar High School on Tuesday, just a day after a bomb threat was called in to the school.
“On Dec. 8, at approximately 12:23 p.m., Cedar Communications received a 911 call regarding a male dressed in all black, wearing a black mask and with a gun at Cedar High School,” said a news release from Cedar City Police Sgt. Clint Pollock. “Iron County law enforcement and school administration were immediately notified.”
As officers were responding, the school was placed on a level 2 lockdown.
“Once officers arrived on scene, they started searching the school,” the news release said. “After the school was searched, and video was reviewed, this was determined to be a hoax call from the same phone number that called and reported the bomb threat yesterday.”
After the threat was determined to be a hoax with no valid threat, the school was no longer in lockdown and resumed classes.
“Our investigators are currently working on leads,” the news release said. “This is an active and ongoing investigation, and we will release more information as it becomes available.”
The school was also placed on a level 2 lockdown Monday after officials were notified of the possible bomb threat.
A 911 call reporting the potential bomb threat was received at about 2:08 p.m., and school administrators were notified immediately, according to a news release Monday.
The lockdown was put into effect and, upon arrival, officers safely evacuated all students, faculty and staff.
“A preliminary search of the building was conducted where a bag was located that appeared to be suspicious,” the news release said. “A bomb sniffing canine and the St. George bomb squad were called in to assist.”
It was determined that “there are no valid threats” and the lockdown was lifted, according to a subsequent news release from Cedar City Police Department.
“We would like to thank the Cedar High School staff, Iron County School District and the many agencies that responded with the cooperative efforts that took place during this incident,” Cedar City PD said.
Gephardt Daily | National and Utah News
Gephardt Daily, a Utah news team, is the fastest growing online news service in
the Rocky Mountain West. GephardtDaily.com is home to a
team of Emmy Award winning journalists, including veteran
news producers, reporters, writers, videographers and social
media experts. | |
Remedial Actions Have Begun at Sanford Cleaners Superfund Site in Sanford, Fla.
Release Date: 11/20/2014
Contact Information: Dawn Harris Young, EPA, (404) 562-8421 (Direct), (404) 562-8400 (Main), [email protected]
ATLANTA – The U.S. Environmental Protection Agency (EPA) has begun remedial action (RA) work at the Sanford Dry Cleaners Superfund site in Sanford, Fla. The RA involves the actual construction or implementation phase of Superfund site cleanup.
The RA to address contamination at the site will be conducted in five phases:
• Site preparation;
• contaminated soil excavation;
• In Situ Enhanced Bioremediation (ISEB) injections;
• Soil Vapor Extraction (SVE) treatment system installation;
• and site restoration.
The work will involve excavating, backfilling, and restoring areas not covered by site buildings that contain soils with concentrations of contaminants of concern above soil cleanup levels. Soil removal will be performed using a backhoe or similar excavation equipment. Excavated soil will be loaded directly onto dump trucks and hauled to an appropriate landfill for disposal. Excavated areas will be backfilled with clean soil and restored to match pre-excavation conditions.
ISEB injections will involve injecting chemical compounds into the groundwater to increase the number and vitality of native microorganisms to treat the contaminated plume. The SVE Treatment System phase includes installing six vapor extraction wells inside the Site building. The systems will be used to extract contaminated vapors from soils. This process is expected to remediate contaminated soils beneath the building and mitigate contamination in indoor air. The SVE system will be equipped with off-gas treatment to protect the surrounding community from being exposed to the extracted vapors.
After RA completion, several long-term operation and maintenance (O&M) tasks will be implemented to ensure the effectiveness and protectiveness of the remedy. This will include: O&M of the SVE system; periodic sampling and analysis of the groundwater and indoor air; and the performance of five-year reviews at the site to ensure that the cleanup conducted remains fully protective of human health and the environment.
For more information about the site, please visit: https://www.epa.gov/region4/superfund/sites/npl/florida/sfordryclfl.html
Connect with EPA Region 4 on Facebook: www.facebook.com/eparegion4
And on Twitter: @USEPASoutheast
Search this collection of releases | or search all news releases
View selected historical press releases from 1970 to 1998 in the EPA History website. | https://archive.epa.gov/epapages/newsroom_archive/newsreleases/2575377b06372c7085257d96005a277f.html |
During 2011 Archaetnos cc was requested by Ikwezi Mining to carry out a HIA for the proposed Ikwezi Doornkop Mine Development on various farms in the Dannhauser Local Municipality, Amajuba District Municipality of Kwazulu Natal. During the fieldwork for this assessment, a number of archaeological sites, including surface scatters of Stone Age artifacts, mainly located in erosion dongas in the area, were identified. As some of these sites were to be disturbed by the opencast coal mining operations, it was recommended that Phase 2 Archaeological Mitigation measures be implemented before the work could continue. Phase 2 Archaelogical Mitigation included mapping and the systematic recording and sampling of material from these sites. Other archaeological sites (Iron Age stone walled remains) will not be impacted on by the development and no mitigation was required.
In their Comments on the Heritage Impact Assessment Report (23 March 2011), Amafa agreed with the recommendations made by Archaetnos cc. As a result we were then appointed by Ikwezi Mining to conduct the Phase 2 Mitigation of the sites. After obtaining a permit from Amafa (Permit Reference No. 0012/02), the fieldwork was conducted during May 2012. Prof. Marlize Lombard, a Stone Age specialist, acted as our Principal Investigator and conducted the expert analysis of the material collected during the fieldwork.
During the mitigation an area containing a number of the sites (find spots) were chosen and mapped using a handheld GPS. All the Stone Age material (as well as some random finds of Iron Age pottery) in this area were then marked with pegs, either as individual objects or as denser concentrations, photographed and then representative stone tools were sampled to be analyzed in more detail. One control block of 5m x 5m was then also measured out on a concentration of material and the material sampled. One of the aims was to try and determine artifact density in the area. A total number of 146 Stone Artifacts were sampled and used in the expert analysis.
We believe that the work conducted, and the data retrieved through this work, was sufficient enough to enable us to make the necessary deductions. It is in line with the recommendations made during the HIA and the requirements of the permit issued by Amafa. Therefore it is recommended that the development can continue, taking cognizance of the final conclusions and recommendations at the end of this report. Finally, it is our recommendation that a Destruction Permit for the site area that will be developed be issued so that the development can continue. | https://www.archaetnos.co.za/ae01233p/2012/ |
Subsets and Splits
No saved queries yet
Save your SQL queries to embed, download, and access them later. Queries will appear here once saved.