content
stringlengths
0
1.88M
url
stringlengths
0
5.28k
Speak to: If you think your child is upset, then the class teacher is the first person to contact. The best approach: You should not abruptly corner your child’s teacher. Yes, you must be worried, but haste may only aggravate the problem. You can make an appointment with the teacher after school during which you can discuss the problem thoroughly. The meeting should be informal, but prepare some notes on what to say and the expected outcomes. Also check – School Supplies List For All Grades What serves as evidence: State clear examples of situations that are causing your child to be unhappy. Also, prepare examples of how their studies and school life are getting affected by their unhappiness. It is important to state explicit incidents to avoid sounding vague. How to follow up: End the meeting by confirming what the teacher has said to avoid uncertainty. You can do this either verbally, or by letter or email. Schedule a follow-up meeting after a week or so to keep a tab on the progress. School work struggle Speak to: Your child’s class teacher is the best person to approach to begin. The best approach: Once again, make an appointment, and don’t rely on parent-teacher conferences as other parents are also waiting for their turn. During the conversation, explain your concerns and whether your child is experiencing hardships in a specific subject or they are performing poorly overall. Listen to the teacher’s suggestions and carefully follow them. Make sure to complete any at-home tasks they recommend. What serves as evidence: You can present the school transcript with a particular poor grade or two pieces of work done with a year-long gap that demonstrates your child’s slower progress. How to follow up: A special education needs coordinator (SENCO) might be required if the problem persists. This extra support may even help students who are not diagnosed with any special education needs. The teacher has some problems with my child Speak to: In this situation, you should not directly confront the teacher, but you should rather approach a member of the senior leadership team (SLT), like the head of Key Stage or deputy head. The best approach: Be cautious! You should not start speaking harshly about the teacher, but rather focus on discussing your child’s feelings. You should first put the concerns in a written format before going to an in-person meeting, allowing more time for the school authority to talk to the teacher. What serves as evidence: Try to find examples of incidents where you think the teacher behaved differently with your child. Focus and clearly state what you want to say! Saying that “Miss Brown was harsh on my son” is very ambiguous. Instead, say, “Miss Brown asked only my son to stay in detention while the whole class was not present in the assembly”. How to follow up: Give the school an ample amount of time to resolve the issue, but if the issue stays unheeded for too long, then ask for an appointment with the headmaster. My child needs special education Speak to: It is best to speak to the teacher and SENCO at the same time. The best approach: In this situation, you will need to book an appointment with the school. Go through the school’s policies for special education needs, which will explain what you can expect from the school in the special education programs. Furthermore, you can seek advice from the local Parent Partnership Service, which offers advice and support to parents and caregivers of children & young people with special education needs. What serves as evidence: Jot down all the difficulties faced by your child and include examples on how they have hindered his or her studies. Keep in mind that special educational needs can also comprise of social and behavioural problems, difficulties in reading and writing, problems with focus and understanding, and even physical needs. How to follow up: Wait for the school to take action; if they find that your child needs special education then they will arrange Special Education Needs support within the campus. For more complex issues, ask for an Education, Health and Care needs assessment. Ask for details about timing and procedures for feedback. My child does not want to attend school Speak to: Contact your child’s class teacher. He or she might be aware of the problem already but you can also involve a member from the SLT. The best approach: Again, we advise you to set up a meeting to discuss the problem and work towards a strategy. You should try to get a senior staff member involved, especially if the strategy needs your child to deviate from the routine, like going directly into the classroom rather than waiting in a queue. What serves as evidence: Have a conversation with your child about their feelings about school and why they are not willing to attend school. Take notes during your discussion. How to follow up: Confirm the plan at the end of the meeting, be it verbal or in writing. After that, request regular catch-ups to review your child’s progress. Someone bullies my child Speak to: Initially, the best person to contact is your child’s class teacher. If bully does not mend their ways, then you must involve another senior staff member, such as a deputy head or head teacher. The best approach: Write down every single concern you have and request a meeting to discuss all you concerns. Become acquainted with the school’s policies for bullying so that you have a clear idea about how the school can help you and their obligations. You can also make suggestions to the school on certain areas that are not followed by them. What serves as evidence: Maintain a journal with all bullying events, their times, details of witnesses and incident descriptions. Discuss examples that clearly show that bullying is having a clear impact on your child’s school and home life. How to follow up: The school must take the necessary steps immediately. Ask for a timescale from the school and arrange another meeting to follow up on the situation. Keep copies of all the correspondence in case you need to pursue the matter with the governors –this will be the next step if the problem persists. I have a problem with the school Speak to: Minor problems can be addressed directly to the class teacher while serious concerns should be discussed with the head teacher or governors. The approach to follow: Small gripes don’t need much attention and can be easily solved by talking to the teacher after school or even by written communication in the form of a note. But, if you want to make the complaint official then become acquainted with school’s procedures. These will tell you with whom you should speak to and what kind of guidance you can expect from the school. What serves as evidence: Just as you should keep a log of bullying activities, you should keep a log of all school correspondences on the issue. Don’t forget about the guide provided by the school and be sure to highlight areas where you think the school was weak. How to follow up: Most of your problems should be solved easily, but if you are not satisfied even after talking to the headmaster, then you should write a complaint to the governors. However, be sure to notify the head of the school about your intentions beforehand.
https://getschoolsupplieslist.com/major-school-problems/
Sense of gratitude or utang na loob. Very dependent on interpersonal relationships; gives sense of security Camaraderie and a feeling of closeness to one another. FAMILY TIES Filipinos possess a genuine and deep love for family - source of personal identity, emotional and material support Honor and respect given to parents and elders; care given to the children; the generosity towards kin in need great sacrifices one endures for the welfare of the family. Sense of family results in a feeling of belongingness and rootedness in a basic sense of security. JOY AND HUMOR Filipinos have a cheerful and fun-loving approach to life and its ups and downs; pleasant disposition, a sense of humor and a propensity for happiness that contribute not only to the Filipino charm but also to the indomitability of the Filipino spirit. Laughing at ourselves and the mess we are in is an important coping mechanism; playful, sometimes, disrespectful, we laugh at those we love and at those we hate and we make jokes about our good fortune and bad. manifested in the Filipino’s love for socials and celebrations, to laugh even in the most trying of times. The result is a certain emotional balance, optimism, a healthy disrespect for power and office and the capacity to survive. 1|Page NIEVA, VANESSA ICI 3-IE1 SOCSCI1 FLEXIBILITY, ADAPTABILITY AND CREATIVITY We can adjust and to adapt to circumstances and the surrounding environment, both physical and social; adjusts to whatever happens even in unplanned or anticipated events. We possess a tolerance for ambiguity that enables us to remain unfazed by uncertainly or lack of information. HARD WORK AND INDUSTRY We have the capacity for hard work given proper conditions;• to raise one’s standard of living and to possess the essentials of a decent life for one’s family We are willing to take the risks with jobs abroad and, while there, to work at two or three jobs. The result is productivity and entrepreneurship for some and survival despite poverty FAITH AND RELIGIOSITY Our innate religiosity enables us to comprehend and genuinely accept reality in the context of God’s will and plan.• Religious expressions is very tangible expressed everyday; we relate to God like a human being – threaten, thank, ask forgiveness, appease tragedy and bad fortune are accepted and some optimism characterizes even the poorest lives.• related to bahala na which may be considered positively as a reservoir of psychic energy, a psychological prop on which we can lean during hard times. This pampalakas ng loob allows us to act despite POSITIVE VALUES: 1. Hospitality 2. Helpful to others/Bayanihan 3. Respectful(mano,po and opo,halik sa kamay) Weakness of the Filipino Character EXTREME PERSONALISM Filipinos view the world in terms of personal relationships; no separation between and objective task and emotional involvement. We tend to give personal interpretations to actions, i.e., “take things personally”. Thus, a sincere question may be viewed as a challenge to one’s competence or positive feedback may be interpreted as a sign of special affection. We tend to be uncomfortable with bureaucracy, with rules and regulations and with standard procedures, all of which tend to be impersonal. We tend to ignore them or we ask for exceptions. Personal contacts are involved in any transaction and these are difficult to turn down. Preference is usually given to family and friends in hiring, delivery of services and even in voting. 2|Page NIEVA, VANESSA ICI 3-IE1 SOCSCI1 EXTREME FAMILY CENTEREDNESS Excessive concern for family manifests itself in the use of one’s office and power as a means of promoting the interest of the family, factionalism, patronage and political dynasties, and in the protection of erring family members. Family centeredness results to a lack of concern for the common good and acts as a block to national consciousness. LACK OF DISCIPLINE The Filipino’s lack of discipline is manifested in a casual and relaxed attitude towards time and space which manifests itself in lack of precision and compulsiveness, in poor time management and procrastination. We are impatient and unable to delay gratification or reward, resulting in the use of short-cuts, in skirting the rules (the palusot syndrome) and in foolhardiness. We are guilty of ningascogon, starting out projects with full vigor and interest which abruptly die down leaving things unfinished. Our lack of discipline often results in efficient and wasteful work systems violations of rules leading to more serious transgressions and a casual work ethic leading to carelessness and lack of follow- through. PASSIVITY AND LACK OF INITIATIVE Filipinos are generally passive and lacking ininitiative. There is strong reliance on others(e.g., leaders,government) to do things for us related to our need for a strong authority. COLONIAL MENTALITY Filipinos have a colonial mentality which is made up of two dimensions :the first is a lack of patriotism or an active awareness, appreciation and love of the Philippines; the second is an actual preference for things foreign. KANYA-KANYA SYNDROME Filipinos have a selfish, self-serving attitude that generates a feeling of envy and competitiveness toward others, particularly one’s peers who seem to have gained some status or prestige. LACK OF SELF-ANALYSIS AND SELF-REFLECTION There is a tendency in the Filipino to be superficial and even somewhat flighty. In the face of serious problems, both personal and social, there is lack of analysis or reflection. The Filipino lack of self-analysis and our emphasis on norms is reinforced by an educational system that is often more form than substance and a legal system that tends to substitute law for reality.
https://pdfcoffee.com/filipino-values-and-moral-development-strengths-and-weaknesses-of-the-filipino-character-pdf-free.html
In music, see below. Intensity is a measure of the time averaged Energy Flux. To find the intensity, take the energy density (that is, the energy per unit volume) and multiply it by the Velocity at which the energy is moving. The resulting Vector has the units of Power divided by Area (i.e. Watt/m²). Anything that can carry energy can have an intensity associated with it (i.e. it is possible to define the intensity of the water coming from a garden sprinkler), but intensity is used most frequently with Waves (i.e. Sound or Light). If a point source is radiating energy in three dimensions, and there is no energy lost to the medium, then the intensity drops off as the distance from the object squared. The reason why this is so is one part physics, one part geometry. The physics comes from the conservation of energy (i.e. if the energy isn't being lost to the medium, it can't just disappear). The consequence of this is that the net power coming from the source must be constant, thus: P = ∫I·dA where P is the net power radiated, I is the intensity as a function of position, and dA is a differential element of a closed surface that contains the source. That P is a constant. If the source is radiating uniformly, that is, the same in all directions, and we take A to be a sphere centered on the source (so that I will be constant on it's surface), the equation becomes: P = |I|(4πr²) Where I is the intensity at the surface of the sphere, and r is the radius of the sphere (note: enclosed in parentheses is the expression for the surface area of a sphere). Solving for I, we get: |I| = P (4πr²)-1 If the medium is damped (i.e. both sound and light in air slowly lose energy), then the intensity drops off more quickly than the above equation suggests. In music, intensity is the perceived loudness or volume of a sound. It is often cited as one of the fundamental aspects of music.
https://www.infomutt.com/i/in/intensity.html
Summary Sentence: Van Hentenryck joins the ISyE faculty as A. Russell Chandler III Chair and Professor. Full Summary: Van Hentenryck joins the ISyE faculty as A. Russell Chandler III Chair and Professor. Pascal Van Hentenryck has joined Georgia Tech’s H. Milton Stewart School of Industrial and Systems Engineering (ISyE) faculty as the A. Russell Chandler III Chair and Professor. Prior to this appointment, he was a professor of computer science at Brown University for about 20 years, led the optimization research group at National ICT Australia, and was the Seth Bonder Collegiate Professor of Engineering at the University of Michigan. His current work focuses on artificial intelligence, data science, and operations research with the goal of developing methodologies, algorithms, and systems for addressing challenging problems in mobility, energy systems, resilience, and privacy. In fact, Atlanta’s well-known traffic issues present a particularly intriguing puzzle for Van Hentenryck, who has a project with MARTA already in place. One aspect of the project involves working to determine how autonomous vehicles, such as rail line “pods,” can be used to more efficiently deliver people to where they’re trying to go. Such pods would be smaller than today’s current train cars, but they would depart and arrive on a more frequent schedule. “Transportation will likely undergo substantial changes in the next decade,” said Van Hentenryck. “Finding how to design effective, equitable, and sustainable mobility systems is one of the fundamental challenges faced by society. The convergence of a number of technological enablers, including machine learning and optimization, provide truly exciting opportunities.” Van Hentenryck’s research on energy systems and resilience involves looking at how renewable energies such as solar and wind impact the availability of electricity across large power grids. These energy sources are very unpredictable compared to traditional sources and lead to increased volatility in the system. He is working to solve this complex problem and shape the future grid. He is also working with the French transmission system, RTE France, on a project called Grid Research for Good. The goal is to generate test cases that capture the complexity of actual electrical networks. The test cases will be based on RTE’s transmission system, which spans over 100,000 km and operates at three different voltage levels. “Energy research is another fundamental societal challenge where new advances in optimization and machine learning are strongly needed in order to deal with the additional stochasticity introduced by renewable energy, the scale of these systems, and the underlying physics,” he noted. In addition, Van Hentenryck brings with him to Georgia Tech the Seth Bonder Summer Camp in Computational and Data Science, which is funded through a gift from the Seth Bonder Foundation and will be administered by CEISMC and overseen by Van Hentenryck and his students. This camp aims to attract rural and lower-income high school students in Georgia who have had limited or no exposure to data science and computer programming. Throughout the course of the week, students will gain facility with computer programming, machine learning, optimization, computational social science, and genomics. “I always believed – and we now have shown – that high school students can learn and be excited by computer science and engineering,” Van Hentenryck said. “Every year, I look forward to the Seth Bonder camp and to getting rejuvenated by teaching the next generation of students.” Van Hentenryck is a Fellow of AAAI (the Association for the Advancement of Artificial Intelligence) and of INFORMS. He has been awarded honorary doctoral degrees from both the University of Louvain and the University of Nantes, the IFORS Distinguished Lecturer Award, the Philip J. Bray Award for teaching excellence in the physical sciences at Brown University, the ACP Award for Research Excellence in Constraint Programming, the ICS INFORMS Prize for Research Excellence at the Intersection of Computer Science and Operations Research, and an NSF National Young Investigator Award. He received a Test of Time Award from the Association of Logic Programming and numerous best paper awards, including at IJCAI and AAAI.
http://hg.gatech.edu/node/613891
Red Sprite.. ..over Southern Bavaria 2015 Photographed at the 9th of August 2015 from Germerswang, Fuerstenfeldbruck Th.Boeckel 9th of August 2015 Heavy thunderstorms in the Garmisch-Partenkirchen region were already announced on the radio during the whole afternoon. Viewing from Fuerstenfeldbruck in the southern direction at 22.30h (total darkness) very bright strokes in a distance of may 80-100 km illuminated sometimes the whole southern part of the Bavarian Alp region. A nearly clear sky was situated over that spectacle and it was nearly new moon. Ohh.. best condition for catching Red Sprites. On our grass hill in Germerswang a very strong storm took place and made the photographing work very difficult. Also the illuminted area around Munich was not the best precondition. Despite the feeling to get such a seldom Red Sprite-phenomenon never in my lifetime on chip , I was such surprised that it will take only 25 minutes ;-). So try your luck .... Full HD Video ca.55MB After checking out 600 photos, surprisingly a little Red Sprite appeared clearly left up at 21:07 UTC. Canon5D MIII,24mm, f2.8, ASA 3200, Exp. 5sec A more amplified image A cutout from the image shows more details More images of the thunderstorm scenery, but without sprites About Red Sprites The appearance of a Red Sprites takes less than 2/100 seconds, and could be very bright and be seen with the naked eye. However, the brightness is several times under a lightning discharge. 'Red Sprites' can appear on an average altitude of 60-80 km in the mesosphere. Also sightings to a height of 90 km to the edge of the ionosphere are possible. The height of the sprite can vary from 10 km to 20 km. The width of the discharge can reach up from 40 to 60 km. But how does the rare luminous phenomena come to this name, when they were discovered and what is the reason of origin? Until 1989, the existence of Red Sprites was generally denied because only jet pilots announced sporadic sightings. Here they reaped rather grumpy and sarcastic reactions :-(. Thus, many sightings have been omitted. 1989 the first Red Sprite photos did succeed, but due to the not yet advanced camera technology the results were scientifically useless. 1991 the astronauts of the former Space shuttle mission succeeded photographically to capture this phenomenon specifically the first time from space. These photos served as the first meaningful evidence. Afterwards high-tech peppered research aircrafts were inserted by very costly experiments from the NASA and NOAA, which should explain and analyze these phenomena further. After this efforts yielded no results for months, and the researchers literally get messed around with this situation, the called these discharges almost mischievously 'Sprites'. But after a while and patient effords impressive high speed filmings succeeded. Incidentally, we don’t have a plausible explanation of the origin of Red Sprites until today, but there are countless theories. Look out for the scientific article in the Washington post. The most common version declares that during heavy thunderstorms larger areas of electrical tension build itself up over the super cells, which consequently discharge due to the oversaturation by itself. Another theory says, that the electrical tension is changing inside the thunderstorm cells etc.. . The actual luminous phenomenon gets produced in the mesosphere by collision of electrons with the always present cosmic gamma radiation. More at (Sprite link) Scientific article in the Washington post All Red Sprites & Auroras | | Etna Stromboli Volcano world Cinema From Etna to Stromboli Planets & Space ©2015 photos& text by Thorsten Boeckel (tb) This private, non-commercial web site Etna Stromboli Volcano world Cinema From Etna to Stromboli Planets & Space ©2015 photos& text by Thorsten Boeckel (tb)
http://eruptionen.de/EFSF/efsf_ps/Red%20Sprites%202015%20Bavaria/Red%20Sprites_e.htm
...Classifying Abnormality Paper Alycia Moss PSY/410 September 7, 2011 Laurie Rhia Classifying Abnormality Paper Many efforts have been made to try to classify abnormal behavior, by utilizing some type of diagnostic categorizing system. These efforts have progressed from methods that vaguely lists disorders, to more thorough, modern methods, like DSM- IV- TR, this method lists numerous amounts of different mental disorders. Psychopathology is the study of mental illness, abnormal/maladaptive behavior. Psychopathology is a term commonly used in psychiatry whereas pathology relates to disease progressions. The standard classification system for psychopathology is the Diagnostic and Statistics Manual (DSM-1). The DSM is a manual, published by the American Psychiatric Association, listing the official diagnostic classifications of mental disorders. The Diagnostic and Statistical Manual of Mental Disorders (DMS-1) is the official manual listing psychiatric and psychological disorders. This manual was published by the American Psychiatric Association in 1952, takes its coding scheme from the International Classification of Diseases (ICD), which is a diagnostic manual for all medical diseases. The DSM was commonly used by physicians/medical professionals, insurance companies and many courts systems. Courts used the DSM to define and diagnose mental disorders, and the diagnostics code that was attached to the case would regulate insurance...... Words: 839 - Pages: 4 ...Abnormal Psychology Roshaun Hatchett PSY/410 April 25, 2012 Dr. Christopher Daub Abnormal Psychology Abnormal psychology has been in existence for more than a century. Mental illness was approached from a spiritual point of view. Individuals of certain beliefs would misdiagnose others from the spiritual perspective and would assume that evil spirits controlled his or her’s physical, mental, and observable world (Tyrer, 2010). The following will be covered in this document: the origins of abnormal psychology, classification of normal and abnormal behaviors, how abnormal psychology evolved into a scientific discipline, and the theoretical models related to the development of abnormal psychology. The practice of trephination, a procedure that bore holes in a individuals skull to release evil spirits, was taken place in 3000 B.C. in Peru and Bolivia (Tyrer, 2010). Hippocrates was the first to approach abnormal behaviors from a biological perspective. He believed, “When the fluids were out of balance, this was the cause of mental illness” (Tyrer, 2010, para. 6). His theory was considered and almost close to the truth, in time his theory was proven to be inaccurate. Years later, Freud suggested the idea of conscious and subconscious processes to be the explanation of odd behaviors. He continued to suggest ideas from a psychodynamic perspective, but in the end lacked evidence in his theory. Freud’s theory inspired Wilhelm Wundt to elaborate on his theory. He... Words: 979 - Pages: 4 ...Abnormal Psychology Psychology is the study of the mind and behavior. It seeks to comprehend people by understanding mental functions and social behavior. It also explores neurobiological and physiological processes that can drive cognitive functions and behaviors. It is this drive to understand mental processes that pushes psychologists to want to learn about what is normal and abnormal behavior. People have tried for thousands of years to understand and define abnormal behavior. In the past 100 years it has undergone “tremendous change, progress, and controversy”(Hansell, J & Damour, L., 2009, p.3). Throughout the modifications certain principles have remained which are known as the core concepts. These core concepts are what define abnormal behavior. There is no clear precise definition for abnormal, which gives rise to challenges in classifying abnormal and normal behavior. Abnormal psychology is a scientific discipline, in which a person acquires information on a person’s behavior and then measures the behavior to hypothesize a cause and treatment. There is a core concept that says that there are multiple causes to abnormal behavior, understanding this can lead to learning about and treating abnormal behavior. These multiple causes can be comprehended by learning about the psychosocial, biological, and sociocultural theoretical models related to the development of abnormal behavior. Abnormal The study of abnormal behavior began early in time when people tried to...... Words: 1597 - Pages: 7 ...Historical Perspectives of Abnormal Psychology Abnormal psychology focuses on abnormal behavior, its definition, classifications, explanations, and treatment (Hansell & Damour, 2008). Although its history is merely 100 years old, its story is richly textured. During its evolution, decisions regarding areas of focus evolved into six core concepts that enabled a more accurate definition of the field. To fully understand the scope and significance of contemporary abnormal psychology one must consider psychopathology and its origins, its distinct evolution, and the theoretical models of abnormality, which, in their diversity, attempt to treat those suffering from various disorders. Origins of Abnormal Psychology The relatively young science of abnormal psychology has existed for approximately one hundred years although many forms of mental illness have been recorded throughout history. Stories from biblical times describe suffering similar to contemporary illnesses such as depression and schizophrenia (Bark, 1988; Kahn, 1975, as cited by Hansell & Damour, 2008). One of the earliest known explanations for mental illness in primitive cultures was animism, predicated on belief in the power of the spirit world (Hansell & Damour, 2008). According to this view, mental affliction was associated with possession by an evil or hateful spirit. Archeologists have documented evidence of a treatment called trephination as early as 3000 BCE. This medical procedure...... Words: 1012 - Pages: 5 ...According to Saul McLeod, abnormal behavior is defined as a person’s trait, thinking, or behavior is classified as abnormal if its rare a trait or statistically unusual, (McLeod, Saul (2014) “Abnormal Psychology”). Recently, I was walking in downtown Atlanta and there was a woman who popped out of this walkway, which startled us. Unfortunately, she caused us extreme discomfort since she was screaming at a person (which we didn’t see) and started to come near us but crossed the street eventually to grab something off the ground to come back to where she was at but we were further down the street. The element that can be used to describe the woman is danger which is behavior that can become dangerous to others or oneself by a lack of functioning that is caused by hostility or carelessness that can jeopardize their well being and others as well. Moreover, her behavior would be considered abnormal to me in culture since it disregards the rights of others and can be very disruptive to others. Overall, a limitation could be that it’s functional or adaptive for the individual in their everyday life. Another example of abnormal behavior that has been in the news is Bruce Jenner transitioning to Caitlyn Jenner. Basically, Bruce Jenner didn’t feel that he was meant to be a man anymore and used to try on women’s clothing throughout his life. Once divorced from his wife, he decided to pursue with his deepest desire: to become a woman. Soon, he altered his face and body to appear like...... Words: 516 - Pages: 3 ...abnormal psycology Historical Perspectives of Abnormal Psychology Jessica University of Phoenix PSY/410 Facilitator: Maria Neely; MA; M.ed. 19 December 2011 Historical Perspectives of Abnormal Psychology * There is a fine line when comparing normal and abnormal behavior. What appears to be abnormal is considered normal by others. Abnormal behaviors are defined as psychopathology, which relates to abnormal behavior that can be defined, classified, explains, and treated (Hansell & Damour, 2008). This paper will examine the origins of abnormal psychology, include challenges to defining and classifying normal and abnormal behavior, provide a brief overview of how abnormal psychology has evolved into a scientific discipline, and the last part will analyze the psychosocial, biological/medical, and socio-cultural theoretical models related to the development of abnormal psychology. When assessing a person with a mental health problems looking at factors such as feelings, thoughts, and behaviors can play a very important role. The origins of abnormal behavior...... Words: 743 - Pages: 3 ...PSY/410 - ABNORMAL PSYCHOLOGY Historical Perspectives of Abnormal Psychology Week 1: Individual Assignment Instructor: Melda Jones May 2011 The earliest account and confirmation of mental illness were the spiritual approach, which originated from the belief that the supernatural or spirits and gods of an unknown realm has an effect on what happens within their earthly domain. This generated a very distinctive way of explaining mental disorders that stem from the physicians of ancient Greece and Rome, yet there were individuals who took a less animistic approach and viewed the behaviors and actions from a biological and scientific aspect (Hansell, 2008). According to the New World Encyclopedia, abnormal psychology is defined as; “a field devoted to the study of causes of mental dysfunctions” (NWE, 2010). Remarkably, this definition as well as many others is indefinite and very vague giving that this field is about 100 years old. The description of what signifies as being abnormal has fluctuated over time as well as cultures. In addition, individuals in society vary in what they may regard as being normal or abnormal behavior. However, throughout the history of this field, decisions on how to define, classify, and explain what abnormal or normal is has been a very difficult task to do. The reason for such difficulty is because of the awareness that defining abnormality creates certain concrete glitches like individuals...... Words: 794 - Pages: 4 ...in unconventional ways are easily targeted, this could be dangerous for those who are just following their culture norms and may be persecuted and stigmatized as their labeled mentally ill. When identifying abnormal from normal one must first understand abnormal behaviors and the context in which abnormal behavior falls under three crucial contexts. According to (Hansel, J, & Damour, L, (2008).) One must first understand the circumstances that are correlated within any behavior, which is essential to whether or not the behavior is normal or abnormal. While the field of abnormal psychology is a hundred years old , throughout its history decisions about how to define and classify as well as explain and treat these behaviors that fall under certain discrepancies, as it makes diagnosing easier to understand in an individual who posses abnormal behaviors. Continuum between normal and abnormal is vital to look at especially cultural and historical relativism as well as the advantages and limitations at hand; one must first on the principle of multiple casualties as well as focusing on the connection of the body and mind. (Hansel, J, & Damour, L, (2008).) However while diagnosing a client one must be really careful due to the challenges of diagnosing someone with abnormal behaviors. What makes diagnosing so challenging is that it can be a bit complicated as well as diversely challenging mental disorders that usually involve both precipitating and predisposing causes. While...... Words: 826 - Pages: 4 ...Team C Abnormal Psychology and Therapy Laura Carranza Armanda Meadows Quoc Nguyen Andrea Sanchez Julann Wygal PSY/300 May 8, 2012 Mary Madrigal PhD Abnormal Psychology and Therapy The purpose of this paper is to discuss abnormal psychology and therapy. First this paper will define what abnormal psychology is. Then this paper will compare and contrast normal and abnormal psychology. Then the paper will examine at least two mental disorders from the perspective of psychology. Next the paper will examine two mental illnesses from the perspective of psychology. Finally the paper will discuss the similarities and difference among two different therapies in the schools of thought in psychology for treating mental disorders. Normal and Abnormal Psychology Normal vs. Abnormal Psychology The study of "normal" psychology is simply the study of someone who is in good health both mentally and physically. Said person adheres to and is responsive to social norms, and engages in activities that are socially acceptable and do not stray from the norm. Normal psychology is the study of the mind and the study of behavior. When unusual patterns of behavior, thought and emotion are studied, it falls under the branch of psychology called Abnormal psychology. The control and understanding of behavior that is considered to be deviant or aberrant either statistically or morally, has been the subject of much research and debate. Psychologists who focus on abnormal psychology identify...... Words: 2140 - Pages: 9 ...and women. Buddy's untraditional approach to therapy is confrontational and abrasive and Dave is bewildered by it. Then, after yet another mishap, Judge Daniels orders Dave to step up his therapy or wind up in jail. So, Buddy moves in with Dave to help him battle his inner demons. Buddy himself has no inner demons since he acts out at every opportunity and that includes making vulgar comments about Dave's girlfriend Linda and forcing Dave into confronting every slight, past or present, head-on. But Buddy finally goes too far and Dave must decide whether to crawl back into his shell or stand up for himself. Behavior, thoughts, and emotions that break norms of psychological functioning are known as abnormal (Comer, 2011). Looking at Dave you wouldn’t see his behavior as abnormal. He’s always been the type of guy to let people walk all over him. The incident that scarred him for life goes back to fifth grade when he was asked to play a game of truth or dare. Just when he was about to get the kiss of his dreams, the bully of the neighborhood came and pulled his pants down in front of everyone. He lacked self confidence and felt... Words: 1236 - Pages: 5 ...portrays beauty as women and men who weigh ninety-five pounds. Due to this current obsession to be skinny in today’s society, many young girls and boys will develop an eating disorder, or turn to drugs and alcohol as a way to escape from the daily pressures to be beautiful in today’s society. This paper will analyze the biological, emotional, cognitive, and behavioral components of eating, substance abuse, sex/gender/sexual, and personality disorders. The DSM-IV-TR includes two axis I categories of eating disorders, anorexia nervosa—restricting and binge-eating/purging types—and bulimia nervosa—purging and non-purging types. Biological factors involved with eating disorders include genetic basis, hormonal excesses and deficiencies and abnormal neural activity. People who suffer from anorexia and bulimia usually have low serotonin levels as well as structural brain abnormalities. High expectations set by parents is a key factor in the emotional aspect of this disorder. Many strive toward high expectations and suffer the effects of not reaching them (Hansell & Damour, 2008). Parents may not realize their behavior towards weight loss has an effect on their children. The reality television show, Toddlers and Tiaras on TLC is an example of how mothers influence their daughters to conform to the current trends of society. A person suffering from an eating disorder will cognitively focus on eating or starvation... Words: 1149 - Pages: 5 ...of Abnormal Psychology Ann Bacon Psy/410 Abnormal Psychology October 24, 2011 Kristi Lane University of Phoenix Perspectives of Abnormal Psychology What is abnormal psychology? Abnormal psychology is the branch of psychology that deals with behaviors that are not considered normal as well as psychological phenomena such as dreams and altered mental states, which have not been explained. The goal of this branch of psychology is to understand abnormal behavior as well as to determine how and if the behavior needs to be addressed and to develop a treatment plan that will help individuals. This branch of psychology also recognizes that there are many influences such as environmental influences on psychological development. The goal of many mental health professionals is not to force an individual to achieve normality but to help individuals who struggle with mental and emotional disorders to achieve fulfilling and active lives. However, to completely understand what abnormal psychology is we need to understand the origins of abnormal psychology as well as the challenges of defining and classifying normal and abnormal behavior. It is also important to understand how abnormal psychology evolved into a scientific discipline as well as the different viewpoints or models of abnormal psychology. The following paragraphs will hopefully help us to completely understand the branch of abnormal psychology. Origins of Abnormal Psychology The field of abnormal...... Words: 1738 - Pages: 7 ...Abnormal Psychology and Therapy April Gressett, Michelle Baker, Celia Mikhael, Nick Mccullough Psychology 300 University of Phoenix Betsy Ferronato July 11th, 2013 Abnormal Psychology and Therapy Introduction Normal vs. Abnormal Psychology In the scientific world, psychology is best described as the “scientific investigation of mental processes and behavior.” (Kowalski & Westen, 2011)The question; what is the difference between normal psychology and that of abnormal psychology? To answer this particular question, one must know the parameters of each individual thought of study. Normal psychology is the study of metal processes and behaviors within a range generally accepted behaviors. Abnormal psychology is the study of mental processes and behaviors the reach outside the parameters of the norm, and is thus considered abnormal. So who decides what is normal and abnormal? There are cultural differences in this area of thought; what may be considered as normal to an American citizen may be construed as abnormal in another country. This train of thought goes both ways, behaviors that are deemed normal in Russia, or the Middle East, may in fact be considered abnormal to a visiting foreigner. So it is with this thought, that the line between normal and abnormal may in fact be somewhat subjective. (Kowalski & Westen, 2011) Abnormal psychology is the study of behaviors found to be outside the scope of the norm, and is generally found in people that exhibit...... Words: 539 - Pages: 3 ...Abnormal Psychology and Therapy Stella Cook April 30, 2012 Sarah Bihms MA Psychology Psychology 300 University of Phoenix College of Social Science Abnormal psychology is a field of study that is devoted to the study of mental dysfunction mental illness, psychopathology, maladjustment, and emotional disturbance. Abnormal behavior is expressed because of a psychological factor and can have features of deviance depending on the distress and the possibility of injury to their self or others. Abnormal psychology has a long history and has numerous types of dysfunction and abnormal psychology studies the causes and the possible treatments of the dysfunction of this disease. Primarily the research in the field has been done with Western perspectives and research method. Spiritually understanding of mental illness was recognized in ancient Western civilizations and in Eastern culture the scientific community has dismissed by the majority of the psychologist in modern times. The twentieth century there are two opposing perspectives on the etiology of mental disorders developed somatogenic physical origins and psychogenic psychological origins. The two have produced research and treatment methods. In...... Words: 1123 - Pages: 5 ...Abnormal Psychology Timeline Ashley Giacosa University of Phoenix TITLE : Abnormal Psychology Timeline * Stone Age (Approximately half a million years ago. * Trephination- chipping an area of the skull away with a crude object like a stone to create a hole in order for the evil spirits to escape. * Demonology, gods, and magic * Preformed mainly by the Chinese, Greeks, Egyptians, and Hebrews. * They believed a person was possessed by a evil or a good spirit. * The primary treatment of this time was an exorcism. * The Early Greek Thinkers * Hippocrates known as “the Father of Modern medicine. His ideas practiced from 460 BC to 377 BC. * He believed there was a natural causation for mental diseases. Hippocrates taught that a person’s bloodline or heredity was extremely important to their mental health. * He classified these disorders into three categories: mania, melancholia, and phrenitis better known as “brain fever”. * Hippocrates also emphasized the importance of dreams in understanding a person. * Closely following Hippocrates was Galen. * Galen founded the idea of the Doctrine of four humors. The temperaments are: Sanguine, Melancholic, Phlegmatic, and Choleric. * Next in line was Plato who constructed the idea that the mentally ill could not be held responsible for criminal acts. He also started the act that hospital care should be provided for the mentally ill. *......
https://www.termpaperwarehouse.com/essay-on/Abnormal-Psychology/283049
The steps to design the Lead Compensator are: - Determine K from the error constants given - Sketch the bode plot - Determine phase margin - The amount of phase angle to be contributed by lead network is , where is the required phase margin and is 5 initially. if the angle is greater than 60then we have to design the compensator as 2 cascade compensator with lead angle as - calculate from bode plot find such that it is the frequency corresponding to the gain - calculate - a lead compensator has the form - form the complete transfer function with the lead compensator added in series to th original system - plot the new Bode plot and determine phase margin and observe that it is the required phase margin - if not satisfactory repeat steps from step 4 by changing value of by 5 Now to do this In Matlab let us take a question. I will be solving the question number 6.2 in Control Systems By Nagoor Kani. In the text book the question has been solved without using matlab you can go through it to understand the steps better. The question is the phase margin should be atleast 33 and velocity error constant is 30. Solution: The velocity error constant is On solving we get K =9600 The code below shows the matlab commands to obtain the design.
https://thebeautifullmind.com/2012/05/24/lead-compensator-design-with-bode-plot/
EUGENE, Ore. -- Feb. 23, 2016 -- Scientists have unlocked the mystery of mimicry used by Dracula orchids to attract flies and ensure their survival. A team led by University of Oregon researchers did it using a 3-D printer. The research, done in Ecuador, is a win in the field of evolutionary biology, and the approach used in the project is readily applicable to studies of other plant-pollinator systems, said the UO's Barbara "Bitty" Roy, a professor of biology. Information gleaned from such research, she added, should help improve conservation efforts in endangered habitats. The National Geographic Society and National Science Foundation, including a $573,000 grant under the American Recovery and Reinvestment Act in 2009, supported the research, which is detailed in a paper placed online ahead of print in the journal New Phytologist. "Mimicry is one of the best examples of natural selection that we have," Roy said. "How mimicry evolves is a big question in evolutionary biology. In this case, there are about 150 species of these orchids. How are they pollinated? What sorts of connections are there? It's a case where these orchids plug into an entire endangered system. This work was done in the last unlogged watershed in western Ecuador, where cloud forests are disappearing at an alarming rate." Dracula orchids grow in Central America and northwest reaches of the Andes Mountains in South America. The Dracula label literally means "little dragon" because of a face-like feature in the flowers, but many observers say the feature resembles the image of Count Dracula as a bat that is widely known in vampire depictions found in literature and the movies. One orchid species is named Dracula vampira. "Dracula orchids look and smell like mushrooms," said the study's lead author Tobias Policha, an adjunct instructor and plant scientist in the UO's Institute of Ecology and Evolution. "We wanted to understand what it is about the flowers that is attractive to these mushroom-visiting flies." The researchers closely studied 22 orchids, looking piece-by-piece, to determine where specific scents are produced in the flowers and which ones possibly lure pollinators -- in this case 11 species of fruit flies that thrive among wild mushrooms that grow near the orchids. The 3-D copies -- the same shape and size of real ones -- allowed team members to apply various color patterns and extracts of the various scents. Among the mix of experiments they also used chimeras -- 3D-bassed copies with real and artificial parts -- enabling them to disentangle which parts were attractive. Flies were drawn to the fabricated plants as if they were real. The 3-D versions were produced by co-author Melinda Barnadas, co-owner of Magpie Studio, which fabricates scientific artwork for museums. Barnadas, also a visual artist at the University of California, San Diego, spent time with the team studying the orchids in Ecuador. "What the orchid wants the fly to do when it arrives is to crawl into the column, whereupon the orchid sticks a pollinium onto the fly so that the fly can't possibly get it off," Roy said. "The fly then goes to another orchid, which then pulls it off." A pollinium is gooey package, resembling a saddlebag, and contains an orchid's pollen. Flies spend up to an hour inside the plant's reproductive column, which is a snug fit to a select few of the more than 80 species of drosophilid flies that have been identified so far in the area. The flies also feast on yeast in the flowers, often mate on the orchids and then lay their eggs on nearby wild mushrooms, ensuring their own survival. Other co-authors were Aleah Davis, a UO undergraduate student in the Robert D. Clark Honors College during the research and who has since graduated; Bryn T.M. Dentinger, a former UO postdoctoral researcher; and Robert A. Raguso of Cornell University's Department of Neurobiology and Behavior. Dentinger now is with the Jodrell Laboratory of the Royal Botanic Gardens, Kew, and the Institute of Biological, Environmental and Rural Sciences at Aberystwyth University, both in the United Kingdom.
https://www.eurekalert.org/pub_releases/2016-02/uoo-mod022216.php
--- abstract: 'We study the solution set to multivariate Chebyshev approximation problem, focussing on the ill-posed case when the uniqueness of solutions can not be established via strict polynomial separation. We obtain an upper bound on the dimension of the solution set and show that nonuniqueness is generic for the ill-posed problems on discrete domains. Moreover, given a prescribed set of points of minimal and maximal deviation we construct a function for which the dimension of the set of best approximating polynomials is maximal for any choice of domain. We also present several examples that illustrate the aforementioned phenomena, demonstrate practical application of our results and propose a number of open questions.' address: - UNSW Sydney - Swinburne University of Technology - Deakin University author: - Vera Roshchina - Nadia Sukhorukova - Julien Ugon bibliography: - 'refs.bib' title: Uniqueness of solutions in multivariate Chebyshev approximation problems --- Introduction ============ The classical Chebyshev approximation problem is to construct a polynomial of a given degree that has the smallest possible absolute deviation from some continuous function on a given interval. For univariate polynomials of degree $d\geq 0$ the solution is unique and satisfies an elegant alternation condition: there exist $d+2$ points of alternating minimal and maximal deviation of the function from approximating polynomial [@Cheb] (see Fig. \[fig:alternation\]). [![A typical distribution of the points of minimal and maximal deviation of a continuous function ($f$, shown in blue) from its best Chebyshev approximation by a polynomial of degree at most 5 (denoted by $q$, shown in orange) on a bounded interval $[a,b]$.[]{data-label="fig:alternation"}](classic-illustration "fig:"){width="45.00000%"}\ ]{} Once we depart from the classical case and consider approximating a continuous function on a compact subset $X$ of ${\mathbb{R}}^n$ by multivariate polynomials, the uniqueness is lost: the result of Mairhuber [@Mairhuber] demonstrates that a multivariate Chebyshev approximation problem has a unique solution generically (for all continuous functions on a given compact subset of ${\mathbb{R}}^n$) if and only if the underlying set $X$ is homeomorphic to a closed subset of a circle. In particular, if $X\subset{\mathbb{R}}^n$ contains an interior point, then there is no Haar space of dimension $n \geq 2$ for $X$. An example of such nonunique approximation is shown in Fig. \[fig:nonunique\]. [![The function $f(x,y) = x^6 +y^6+ 3 x^4 y^2 + 3 x^2 y^4 + 6 x y^2 - 2 x^3$ has several best quadratic approximations on the disk $x^2+y^2\leq 1$. The plot of the function in orange colour is shown together with two different best approximations in blue: $q_0(x,y) = 1$ (on the left) and $q_1(x,y) = 3 x^2 + 3 y^2-2$ (on the right). []{data-label="fig:nonunique"}](multivariate-flat "fig:"){width="45.00000%"}![The function $f(x,y) = x^6 +y^6+ 3 x^4 y^2 + 3 x^2 y^4 + 6 x y^2 - 2 x^3$ has several best quadratic approximations on the disk $x^2+y^2\leq 1$. The plot of the function in orange colour is shown together with two different best approximations in blue: $q_0(x,y) = 1$ (on the left) and $q_1(x,y) = 3 x^2 + 3 y^2-2$ (on the right). []{data-label="fig:nonunique"}](multivariate-curved "fig:"){width="45.00000%"}\ ]{} Even though the uniqueness of solutions is lost in the multivariate case, the alternation result holds in the form of algebraic separation. It was first shown in [@Rice] that a polynomial approximation of degree $d$ is optimal if the sets of points of minimal and maximal deviation can not be separated by a polynomial of degree at most $d$. This result can be reproduced using the standard tools of modern convex analysis, as demonstrated in [@ModernAlt]. Another approach to generalise the notion of alternation to multivariate problems is based on the alternating signs of certain determinants [@DemyanovMalozemov]. The classical alternation result was obtained by Chebyshev in 1854 [@Cheb], but little is known about the shape of the solutions of a more general multivariate problem. In particular, related work [@IntCheb] that studies a version of this problem for polynomials with integer coefficients, mentions that the multivariate problem is ‘virtually untouched’. Even though the solutions to the multivariate problem satisfy a form of an alternation condition, the structure of the solutions and the location of points of maximal and minimal deviation are more complex compared to the univariate case, which results in many interesting challenges. From the point of view of classical approximation theory multivariate polynomial approximation is relatively inefficient: for a range of key applications some other approaches such as the radial basis functions [@radialbasisbook] provide superior results. However modern optimisation is increasingly fusing with computational algebraic geometry, successfully tackling problems that were insurmountable in the past, and polynomial approximation emerges in this context as valuable not only for solving computationally challenging problems, but also as an analytic tool that together with Gröbner basis methods may lead to algorithmic solutions for finding extrema in nonconvex problems. Another potential application is a generalisation of trust-region methods, where instead of local quadratic approximations to the function locally more versatile higher order polynomial approximations may be used. Consider the space $\mathbb{P}_d({\mathbb{R}}^n)$ of real polynomials in $n$ variables of degree at most $d$. Let $f:X\to {\mathbb{R}}$ be a continuous function defined on a compact set $X\subset {\mathbb{R}}^n$. A polynomial $q^*\in \mathbb{P}_d({\mathbb{R}}^n)$ solves the multivariate Chebyshev approximation problem for $f$ on $X$ if $$\max_{x\in X}|f(x) - q^*(x)|\leq \max_{x\in X} |f(x)-q(x)|\quad \forall q\in \mathbb{P}_d({\mathbb{R}}^n).$$ We are interested in the set $Q\subset\mathbb{P}_d({\mathbb{R}}^n)$ of all such solutions. In some special cases the solution to the multivariate Chebyshev approximation problem is known explicitly. For instance, the best approximation by monomials on a unit cube is obtained from the products of classical Chebyshev polynomials (see [@ThiranDetaille] and a more recent overview [@xuyuan]); this is related to another generalisation of Chebyshev’s results, when the problem of a best approximation of zero with polynomials having a fixed highest degree coefficient is considered: in some special cases, solutions on the unit cube are known from [@sloss]; solutions for the unit ball were obtained in [@Reimer]. There is a different approach to generalising Chebyshev polynomials, based on extending the relation $T_k(\cos x) = \cos k x$ to the multivariate case. In [@MuntheKaasChapter; @MuntheKaasFoCM] more general functions $h:{\mathbb{R}}^n\to {\mathbb{R}}^n$ periodic with respect to fundamental domains of affine Weyl groups are considered, and the aforementioned relation is replaced by $P_k(h(x)) = h(kx)$. Such generalised Chebyshev polynomials are in fact systems of polynomials, as $P_k:{\mathbb{R}}^n\to {\mathbb{R}}^n$. We note here that the aforementioned work, as well as other approximation techniques based on Chebyshev polynomials (common in numerical PDEs), use nodal interpolation with Chebyshev polynomials. This is a conceptually different framework compared to our optimisation setting; in particular, this approach requires a careful choice of interpolation nodes on the domain to ensure the quality of approximation. For the univariate problem the optimal solutions to the Chebyshev approximation problem can be obtained using numerical techniques that fit in the context of linear programming and the simplex method, and exchange algorithm pioneered by Remez [@remez] is perhaps the most well-known technique. Even though the multivariate problem can be solved approximately by linear programming, the problem rapidly becomes intractable with the increase in the degree and number of variables, and hence there is much need for more efficient methods. This is another exciting research direction, as the rich structure of the problem is likely to yield specialised methods which surpass the performance of direct linear programming discretisation. The general framework for the potential generalisation of the exchange approach was laid out in [@VP], however several implementation issues need to be resolved for a practically viable version of the method. For any polynomial $q$ we can define the sets of points of minimal and maximal deviation, i.e. such $x\in X$ for which the values $q(x)-f(x)$ and $f(x)-q(x)$ respectively coincide with the maximum $\max_{x'\in X}|f(x')-q(x')|$. These sets may be different for different polynomials in the optimal set $Q$. We show that it is possible to identify an intrinsic pair of such subsets pertaining to all polynomials in $Q$ (see Theorem \[thm:minimalset\]); moreover the location of these points determines the maximal possible dimension of the solution set (see Lemma \[lem:dim\]). We also show that for any prescribed arrangement of points of minimal and maximal deviation and any choice of the maximal degree there exists a continuous function and a relevant approximating polynomial for which these points are precisely the points of minimal and maximal deviation; moreover, the set of all best approximations has the largest possible dimension, for any choice of domain $X$ (Lemma \[lem:sharpbump\]). Finally, we show that the set of best Chebyshev approximations is always of the maximal possible dimension if the domain $X$ is finite (Lemma \[lem:finite\]). We begin with some preliminaries and examples in Section \[sec:prelim\], focussing on the well-known separation characterisation of optimality and Mairhuber’s uniqueness result. In Section \[sec:structure\] we present our new results. We then summarise our findings and present some open problems in Section \[sec:concl\]. Preliminaries and Examples {#sec:prelim} ========================== Multivariate polynomials ------------------------ A multivariate polynomial of degree $d$ with real coefficients can be represented as $$q(x) = \sum_{|\alpha|\leq d} a_\alpha x^\alpha,$$ where $\alpha = (\alpha_1,\dots, \alpha_n)$ is an $n$-tuple of nonnegative integers, $x^d = x_1^{\alpha_1} x_2^{\alpha_2}\cdots x_n^{\alpha_n}$, $|\alpha| = |\alpha_1|+|\alpha_2|+\cdots+ |\alpha_n|$, and $a_\alpha\in {\mathbb{R}}$ are the coefficients. All polynomials of degree not exceeding $d$ constitute a vector space $\mathbb{P}_d({\mathbb{R}}^n)= \operatorname*{span}\{x^\alpha\,|\, |\alpha|\leq d\}$ of dimension ${{n+d} \choose {d}}$. Note that, generally speaking, we can consider any finite set of (linearly independent) polynomials in $n$ variables, $G = (g_1,\dots, g_N)$ and instead of the space $\mathbb{P}_d({\mathbb{R}}^n)$ consider the linear span $V$ of $G$, i.e. $$\label{eq:V} V = \operatorname*{span}\{g_i\,|\, i \in \{1,\dots, N\}\}.$$ Then the solution set $Q\subseteq V$ to the Chebyshev approximation problem for a given continuous function $f$ defined on a compact set $X\subseteq {\mathbb{R}}^n$ is $$\label{eq:p} Q: = \operatorname*{Arg\,min}_{q\in V}\|f-q\|_\infty,$$ where $$\|f-q\|_{\infty} = \max_{x\in X}|f(x) - q(x)|.$$ Fixing a continuous function $f:X\to {\mathbb{R}}$, for every polynomial $q\in V$ we define the sets of points of minimal and maximal deviation explicitly as $$\begin{aligned} \label{eq:defNP} {\mathcal{N}}(q)& := \{x\in X\,|\, q(x)-f(x) = \|f-q\|_\infty\},\notag\\ {\mathcal{P}}(q)& := \{x\in X\,|\, f(x)-q(x) = \|f-q\|_\infty\}.\end{aligned}$$ Observe that for any given polynomial $q$ at least one of these sets is nonempty, and for any $q^*\in Q$ both of them are nonempty (otherwise one can add an appropriate small constant to $q^*$ and decrease the value of the maximal absolute deviation). Also observe that the sets ${\mathcal{N}}(q)$ and ${\mathcal{P}}(q)$ are disjoint unless $q\equiv f$ on $X$ (in this case ${\mathcal{N}}(q) = {\mathcal{P}}(q) = X$). The minimisation problem of is an unconstrained convex optimisation problem: the objective function $\|f-q\|_\infty$ can be interpreted as the maximum over two families of linear functions parametrised by the domain variable $x\in X$, i.e. $$\label{eq:max} \|f-q\|_\infty = \max_{x\in X}|f(x)-q(x)|= \max_{\substack{x\in X\\ s}\in \{-1,1\}}s(f(x)-q(x)).$$ The solution set $Q$ is nonempty, since it represents the metric projection of $f$ onto a finite-dimensional linear subspace $V$ of the normed linear space of functions bounded on $X$. It is also easy to see from the continuity of $f$ that this set is closed. Moreover, since a maximum function over a family of linear functions is convex, $Q$ is convex (e.g. see [@JBHU Proposition [2.1.2]{}]). We consider a degenerate case of the problem: find the best linear approximation to $f(x,y) = x^2$ on $X=[-1,1]\times\{0\}$. Since the domain is effectively restricted to the line segment $[-1,1]$, the solution reduces to the classical univariate case: there is a unique best approximation, which happens to be constant, $\frac{1}{2}$. Observe however that in the true two-dimensional setting any linear polynomial of the form $q(x,y) = \frac{1}{2}+\alpha y$ is also a best approximation of $f$ on $X$. This means that the solution set of best approximations is unbounded, $Q = \{\frac{1}{2}+ \alpha y, \, \alpha \in {\mathbb{R}}\}$, even though all such optimal solutions coincide on $X$, and effectively—on the set $X$—provide the same unique best approximation. Optimality conditions --------------------- We say that a polynomial $p\in V$ separates two sets $N,P\subset {\mathbb{R}}^n$ if $$\label{eq:separation} p(x)\cdot p(y) \leq 0 \quad \forall x\in N, y\in P;$$ we say that the separation is *strict* if the inequality in is strict, i.e. $$\label{eq:strictseparation} p(x)\cdot p(y) < 0 \quad \forall x\in N, y\in P.$$ Recall the well-known characterisations of optimality (see [@Rice] and [@ModernAlt] for modern proofs). \[thm:classicsep\] Let $X$ be a compact subset of ${\mathbb{R}}^n$, and assume that $f: X\to {\mathbb{R}}$ is a continuous function. A polynomial $q\in V$ is an optimal solution to the Chebyshev approximation problem if and only if there exists no $p\in V$ that strictly separates the sets ${\mathcal{N}}(q)$ and ${\mathcal{P}}(q)$. \[eg:nonunique\] We focus on the function $f(x,y) = x^6 +y^6+ 3 x^4 y^2 + 3 x^2 y^4 + 6 x y^2 - 2 x^3$ discussed in the Introduction and demonstrate that it does indeed have multiple best quadratic approximations on the disk $x^2+y^2\leq 1$ (see Fig. \[fig:nonunique\]). For two different polynomials $q_0(x,y) = 1$ and $q_1(x,y) = 3 x^2 + 3 y^2-2$ the points of maximal negative and positive deviation of $f$ from these polynomials are $${\mathcal{N}}(q_0) = \{z_1,z_3,z_5\}, \quad {\mathcal{N}}(q_1) = {\mathcal{N}}(q_0)\cup\{z_0\}, \quad {\mathcal{P}}(q_0) = {\mathcal{P}}(q_1) = \{z_2,z_4,z_6\},$$ where $$z_0 = (0,0),\; z_1 = (1,0),\; z_2 = \left(\frac{1}{2},\frac{\sqrt{3}}{2}\right),\; z_3 = \left(-\frac{1}{2},\frac{\sqrt{3}}{2}\right),$$ $$\label{eq:defz} z_4 = (-1,0), \; z_5 = \left(-\frac{1}{2},-\frac{\sqrt{3}}{2}\right),\; z_6 = \left(\frac{1}{2},-\frac{\sqrt{3}}{2}\right).$$ This is not difficult to verify using standard calculus techniques (see appendix). Location of maximal and minimal deviation points ------------------------------------------------ Observe that the points $z_1,z_2,\dots, z_6$ lie on the unit circle. By the Bézout theorem, this circle can have at most 4 intersections with any other quadratic curve. However if we could find a quadratic polynomial that strictly separates the points of maximal and minimal deviation, the relevant curve would intersect the circle in at most six points, as shown in Fig. \[fig:circle-curve\]. [![On the left: the intersection of two quadratic curves at six points contradicts the Bézout theorem; on the right: a subset of the unit disk homeomorphic to a circle.[]{data-label="fig:circle-curve"}](circle-curve "fig:"){width="30.00000%"}![On the left: the intersection of two quadratic curves at six points contradicts the Bézout theorem; on the right: a subset of the unit disk homeomorphic to a circle.[]{data-label="fig:circle-curve"}](homeomorphic "fig:"){width="30.00000%"}\ ]{} Hence such separation is impossible, so both $q_0$ and $q_1$ are optimal. We conclude this section with the well-known result of Mairhuber [@Mairhuber] (generalised to compact Hausdorff spaces by Brown [@brown]). A compact subset $X$ of ${\mathbb{R}}^n$ containing at least $k \geq 2$ points may serve as the domain of definition of a set of real continuous functions $f_1(x),\dots,f_k(x)$ that provide a unique Chebyshev approximation to any continuous function $f$ on the set $X$, if and only if $X$ is homeomorphic to a closed subset of the circumference of a circle. With relation to our setting, Mairhuber’s result is effectively a necessary condition for generic uniqueness, since our choice of the system of functions is restricted to multivariate polynomials. Hence it is possible to identify a compact set $X$ homeomorphic to a circle and a set of polynomials linearly independent on $X$ that do not provide a unique multivariate approximation to a continuous function on $X$. Observe that any best approximation to $f$ from Example \[eg:nonunique\] on the disk is also the best approximation to $f$ on any subset of the disk that contains the sets ${\mathcal{N}}(q_0)$ and ${\mathcal{P}}(q_0)$. Even though the two different best approximations $q_0$ and $q_1$ coincide on the boundary of the disk, they take different values everywhere in the interior, and hence we can choose another subset of the unit disk that is homeomorphic to a circle (like the one shown in Fig. \[fig:circle-curve\] on the right) to obtain two different optimal solutions. This does not contradict Mairhuber’s theorem, since in this case we have restricted ourselves to a very specific choice of the basic functions. Structure of the solution set {#sec:structure} ============================= The location of maximal and minimal deviation points for different optimal solutions ------------------------------------------------------------------------------------ The key technical result of this section is the following theorem that establishes the existence of uniquely defined subsets of points of maximal and minimal deviation across all optimal solutions. This means that the points of maximal and minimal deviation do not wander around the domain $X$ as we move from one optimal solution to another. \[thm:minimalset\] Let $f:X\to {\mathbb{R}}$ be a continuous function defined on a compact set $X\subset{\mathbb{R}}^n$, let $V$ be a subspace of multivariate polynomials in $n$ variables , and suppose that $Q$ is the set of optimal solutions to the relevant optimisation problem, as in . Then - ${\mathcal{N}}(q) = {\mathcal{N}}(p)$, ${\mathcal{P}}(q) = {\mathcal{P}}(p)$ $\forall p,q\in \operatorname*{ri}Q$; - ${\mathcal{N}}(q) \subseteq {\mathcal{N}}(p)$, ${\mathcal{P}}(q) \subseteq {\mathcal{P}}(p)$ $\forall q\in \operatorname*{ri}Q, p \in Q$. Here the relative interior is considered with respect to the convex sets of the coefficients in the representation of the solutions as linear combinations of polynomials in $V$. For the proof of this lemma, we will need the following elementary result about max-type convex functions. \[prop:linmax\] Let $f:{\mathbb{R}}^n\to {\mathbb{R}}$ be a pointwise maximum over a family of linear functions, $$f(x) = \max_{t\in T} f_t(x), \quad f_t:{\mathbb{R}}^n\to {\mathbb{R}}\text{ linear } \forall t\in T.$$ Let $I(x) = \{t\,|\, f_t(x) = f(x)\} $, $Q:= \operatorname*{Arg\,min}\limits_{x\in {\mathbb{R}}^n}f(x)$. If $Q\neq \emptyset$, then $$I(x) \subseteq I(y)\quad \forall x\in \operatorname*{ri}Q, y\in Q.$$ Let $x\in \operatorname*{ri}Q$, $y\in Q$. Assume that there exists $t\in T$ such that $t\in I(x)\setminus I(y)$. Then $f(x) = f(y) = f_t(x)>f_t(y)$, and since $f_t$ is linear, we then have $$f(x-\alpha (y-x) ) \geq f_t(x-\alpha (y-x)) = f_t(x) - \alpha (f_t(y)-f_t(x)) > f(x) \quad \forall \alpha>0,$$ hence, $x-\alpha (y-x)\notin Q$ for $\alpha >0$, while $y=x+(y-x)\in Q$, which means $x\notin \operatorname*{ri}Q$, a contradiction. Recall that our objective function can be represented as the maximum over a family of linear functions, as in . For every polynomial $q\in V$ define the set of active indices $$I(q) = \{(x,s)\in X\times\{-1,1\}\,|\, s (f(x)-q(x)) = \|f-q\|_\infty\}.$$ It is evident from the definition of ${\mathcal{N}}(q)$ and ${\mathcal{P}}(q)$ that $$x\in {\mathcal{N}}(q) \; \Leftrightarrow (x,-1) \in I(q); \quad x\in {\mathcal{P}}(q) \; \Leftrightarrow (x,1) \in I(q).$$ The result now follows from Proposition \[prop:linmax\]. The following corollary of Theorem \[thm:minimalset\] characterises the structure of the location of maximal deviation points corresponding to different optimal solutions. The sets of points of minimal and maximal deviation remain constant if the optimal solutions belong to the relative interior of the solution set. Additional maximal and minimal deviation points can only occur if an optimal solution is on the relative boundary. For any given continuous function $f$ defined on a compact set $X$ we can hence define the *minimal* or *essential* sets of points of minimal and maximal deviation, $${\mathcal{P}}= {\mathcal{P}}(q), \; {\mathcal{N}}= {\mathcal{N}}(q), \; q\in \operatorname*{ri}Q,$$ where ${\mathcal{P}}(q)$ and ${\mathcal{N}}(q)$ are defined in the standard way, as in . For instance, in Example \[eg:nonunique\] we have ${\mathcal{N}}= \{z_1,z_3,z_5\}$ and ${\mathcal{P}}= \{z_2,z_4,z_6\}$, while ${\mathcal{N}}(q_1)$ contains an additional point $z_0$. Note that the essential pair of sets is uniquely defined, and is different to the definition of critical subsets given in [@Rice]. Dimension of the solution set ----------------------------- We next focus on the relation between the family of separating polynomials and the dimension of solution set. For a fixed continuous function $f:X\to {\mathbb{R}}$ and a polynomial $q\in V$ consider the set of all polynomials in $V$ that separate the points of minimal and maximal deviation, $$S(q) = \{s\in V\,|\, s(x)\cdot s(y)\leq 0 \, \forall x\in {\mathcal{P}}(q),y\in {\mathcal{N}}(q)\}.$$ Notice that the zero polynomial is always in $S(q)$, and for the polynomials in the optimal solution set we may have a nontrivial set of separating functions. This happens in particular when all points of minimal and maximal deviation are located on an algebraic variety of a subset of $V$. Since the pair of sets of minimal and maximal deviation is minimal on the interior of $Q$, and such minimal pair is unique according to Theorem \[thm:minimalset\], we can define the *maximal* set of separating polynomials as $S = S(q) $ for $q\in \operatorname*{ri}Q$. For the rest of the section, we work with an arbitrary fixed continuous real-valued function $f$ defined on a compact set $X\subset {\mathbb{R}}^n$, so we do not repeat this assumption in each statement, and simply refer to the solution set $Q$ of the corresponding Chebyshev approximation problem. \[lem:dim\] For the solution set $Q$ we have $\dim Q\leq \dim S$; moreover, for any $q,p\in Q$ we have $p-q\in S(p)\subseteq S$. Observe that it is enough to show that for any $q\in \operatorname*{ri}Q$ and any $p\in Q$ we have $p-q\in S$. It then follows that $\operatorname*{aff}Q \subseteq S+q$, and hence $\dim Q \leq \dim S$. Let $q\in \operatorname*{ri}Q$ and assume $p\in Q$. By Theorem \[thm:minimalset\] we have ${\mathcal{N}}(q) \subseteq {\mathcal{N}}(p)$, ${\mathcal{P}}(q)\subseteq {\mathcal{P}}(p)$, therefore $$\begin{aligned} f(u) - p(u) &\leq f(u) -q(u)\quad \forall u \in {\mathcal{N}}(p), \\ f(u) - p(u) &\geq f(u) -q(u)\quad \forall u \in {\mathcal{P}}(p).\end{aligned}$$ Let $s(x) = p(x)-q(x)$. We have $$s(u) = p(u) - q(u) \geq 0 \quad \forall u\in {\mathcal{N}}(p), \qquad s(u) = p(u)- q(u) \leq 0 \quad \forall u\in {\mathcal{P}}(p),$$ and so $s(u) \in S(p)\subseteq S(q)$. If for the solution set $Q$ we have $\dim Q >0$, then all essential points of minimal and maximal deviation lie *on* a variety of some nontrivial polynomial $s\in V$. This follows directly from a modification of the proof of Lemma \[lem:dim\]: if $Q$ is of dimension 1 or higher, then there exist two different polynomials $q\in \operatorname*{ri}Q$ and $p\in Q$. We have $$\begin{aligned} f(u) - p(u) &= f(u) -q(u)\quad \forall u \in {\mathcal{N}}= {\mathcal{N}}(q), \\ f(u) - p(u) &= f(u) -q(u)\quad \forall u \in {\mathcal{P}}= {\mathcal{P}}(q).\end{aligned}$$ Hence, for $s(x) =p(x)-q(x)$ we have $s(u) = p(u)-q(u) = 0 \quad \forall u \in {\mathcal{N}}\cup {\mathcal{P}}$. The next corollary is a well-known uniqueness result. \[cor:unique\] If the set $S$ is trivial, then the optimal solution is unique. If $S=\{0\}$, then $\dim S = 0$, and by Lemma \[lem:dim\] we have $\dim Q = 0$. Uniqueness and smoothness ------------------------- It may happen that the dimensions of $Q$ and $S$ do not coincide, as we demonstrate in the next example. \[eg:unique-and-not\] Let $f(x,y) = (x^2 - \frac{1}{2})(1 - y^2)$ and consider the problem of finding a best linear approximation of this function on the square $X = [-1,1]\times[-1,1]$. [![The function $f(x,y) = (x^2 - \frac{1}{2})(1 - y^2)$ (on the left), the absolute deviation of $f$ from the constant $q_0(x,y) \equiv 0$, $|d_0(x,y)| = |f(x,y)-q_0(x,y)|$ (middle), and the function $g(x,y)$.[]{data-label="fig:function1"}](function-01 "fig:"){width="30.00000%"} ![The function $f(x,y) = (x^2 - \frac{1}{2})(1 - y^2)$ (on the left), the absolute deviation of $f$ from the constant $q_0(x,y) \equiv 0$, $|d_0(x,y)| = |f(x,y)-q_0(x,y)|$ (middle), and the function $g(x,y)$.[]{data-label="fig:function1"}](function-01-dev "fig:"){width="30.00000%"} ![The function $f(x,y) = (x^2 - \frac{1}{2})(1 - y^2)$ (on the left), the absolute deviation of $f$ from the constant $q_0(x,y) \equiv 0$, $|d_0(x,y)| = |f(x,y)-q_0(x,y)|$ (middle), and the function $g(x,y)$.[]{data-label="fig:function1"}](function-03 "fig:"){width="30.00000%"}\ ]{} It is not difficult to verify that the constant function $q_0(x,y)\equiv 0$ is an optimal solution: the points of maximal deviation are the maxima of $f(x,y)$ on the square, attained at ${\mathcal{P}}(q_0) = \{(1,0),(-1,0)\}$; the set of points of minimal deviation is a singleton ${\mathcal{N}}(q_0) = \{(0,0)\}$ (we provide technical details in the appendix). Since these three alternating points of maximal and minimal deviation lie on a straight line $y=0$, there is no strict linear separator between them (see the left image in Fig. \[fig:function2dev\]), hence this constant solution must be optimal by Theorem \[thm:classicsep\]. Also notice that taking any point out of either ${\mathcal{N}}(q_0)$ or ${\mathcal{P}}(q_0)$ ruins the optimality condition (in fact, our configuration of the points of minimal and maximal deviation is *critical* in the notation of [@Rice]). Hence we must have ${\mathcal{N}}= {\mathcal{N}}(q_0)$ and ${\mathcal{P}}= {\mathcal{P}}(q_0)$, so these are the essential sets of the points of minimal and maximal deviation. These three points can be separated non-strictly by the linear functions of the form $l(x,y)= \alpha y$, $\alpha \in{\mathbb{R}}$. We therefore have $$S = \{\alpha y \,|\, \alpha \in {\mathbb{R}}\}.$$ Even though $\dim S = 1$, the best linear approximation is unique. It follows from Lemma \[lem:dim\] that $Q\subseteq S$, and hence any best linear approximation should have the form $q_\alpha(x,y) = \alpha y$ for some $\alpha \in {\mathbb{R}}$. When $x = \pm 1$, we have the deviation $d_\alpha (x,y) = f(x,y) - q_\alpha(x,y) = \frac{1-y^2}{2}- \alpha y $. The maximun of $d_\alpha (x,y)$ is attained at $y=-\alpha$, with the value $d_\alpha(\pm 1, -\alpha) = \frac{1}{2}+\frac{\alpha^2}{2}>\frac{1}{2}$ for $\alpha\neq 0$, which means that there are no optimal solutions in the neighbourhood of $q_0(x,y)\equiv 0$, and hence, due to the convexity of $Q$, the best approximation is unique. [![The points of minimal and maximal deviation for different cases: on the left for $f$ and $h$ and $q_0$; in the middle for $h$ and $q_{\frac{1}{2}}(x,y) = \frac{y}{2}$; on the right for $h$ and $q_{-\frac{1}{2}}(x,y) = -\frac{y}{2}$.[]{data-label="fig:function2dev"}](deviation-square-example-f1 "fig:"){width="30.00000%"} ![The points of minimal and maximal deviation for different cases: on the left for $f$ and $h$ and $q_0$; in the middle for $h$ and $q_{\frac{1}{2}}(x,y) = \frac{y}{2}$; on the right for $h$ and $q_{-\frac{1}{2}}(x,y) = -\frac{y}{2}$.[]{data-label="fig:function2dev"}](deviation-square-example2a "fig:"){width="30.00000%"} ![The points of minimal and maximal deviation for different cases: on the left for $f$ and $h$ and $q_0$; in the middle for $h$ and $q_{\frac{1}{2}}(x,y) = \frac{y}{2}$; on the right for $h$ and $q_{-\frac{1}{2}}(x,y) = -\frac{y}{2}$.[]{data-label="fig:function2dev"}](deviation-square-example2b "fig:"){width="30.00000%"}\ ]{} Now consider a modified example: let $h(x,y) = (x^2 - \frac{1}{2})(1 - |y|)$ (see Fig. \[fig:function2\], left hand side). The same trivial constant function $q_0(x,y)\equiv 0$ is a best linear approximation to $h$, with the same sets of points of minimal and maximal deviation (see Fig. \[fig:function1\], right). However, this best approximation is not unique: any function $q_\alpha(x,y)=\alpha y $ for $\alpha \in \left[-\frac{1}{2},\frac{1}{2}\right]$ is also a best linear approximation of $f$ on the square $X$ (see appendix for technical computations). Moreover, the sets of points of maximal and minimal deviation are different at the endpoints of the optimal interval, i.e. for $\alpha = \pm \frac 12$, see Fig. \[fig:function2dev\] (the technical computations are presented in appendix). [![The function $h(x,y) = (x^2 - \frac{1}{2})(1 - |y|)$ on the left, and the same function shown together with two different best approximations: $q_{\frac{1}{2}}(x,y) = \frac{y}{2}$ and $q_{-\frac{1}{2}}(x,y) = -\frac{y}{2}$.[]{data-label="fig:function2"}](function2 "fig:"){width="32.00000%"} ![The function $h(x,y) = (x^2 - \frac{1}{2})(1 - |y|)$ on the left, and the same function shown together with two different best approximations: $q_{\frac{1}{2}}(x,y) = \frac{y}{2}$ and $q_{-\frac{1}{2}}(x,y) = -\frac{y}{2}$.[]{data-label="fig:function2"}](function2a "fig:"){width="32.00000%"} ![The function $h(x,y) = (x^2 - \frac{1}{2})(1 - |y|)$ on the left, and the same function shown together with two different best approximations: $q_{\frac{1}{2}}(x,y) = \frac{y}{2}$ and $q_{-\frac{1}{2}}(x,y) = -\frac{y}{2}$.[]{data-label="fig:function2"}](function2b "fig:"){width="32.00000%"}\ ]{} Finally, we would like to point out that smoothness of the function that we are approximating is not necessary for the uniqueness of a best approximation, as one may be tempted to conclude from the study of the functions $f$ and $h$. Note that for yet another modification, $$g(x,y) := (\min\{ |2x|, 2-|2x|\} - 1/2)(1-y^2),$$ the function $q_0(x,y) \equiv 0$ is a unique best approximation, while the points of maximal and minimal deviation are distributed in a similar fashion, along the line $y=0$, potentially allowing for nonuniqueness. Notice that the function $g(x,y)$ is nondifferentiable at the points of minimal and maximal deviation. This function is however smooth in $y$ for every fixed $x$. This observation is related to the problem of relating the specific (partial) smoothness properties of the function we are approximating with the solution set. We discuss this open question in some detail in the conclusions section. We have seen from the preceding example that whether the Chebyshev approximation problem has a solution is determined not only by the location of points of maximal and minimal deviation, but also by the properties of the function that is being approximated; in particular the smoothness of the function at the points of minimal and maximal deviation appears to be a decisive factor. \[eg:bumps\]For the distribution of points of maximal and minimal deviation from Example \[eg:nonunique\], i.e. $N = \{z_1,z_3,z_5\}$, $P = \{z_2,z_4,z_6\}$, where $z_1,z_2,\dots z_6$ are defined by , we construct a nonsmooth continuous function $$f(x) = \min\{ 2 \|x-z_1\|, 2 \|x-z_3\|, 2 \|x-z_5\|, 1\}- \min\{ 2 \|x-z_2\|, 2 \|x-z_4\|, 2 \|x-z_6\|, 1\},$$ shown in Fig. \[fig:nonsmoothbumpy\] on the left. [![The functions $f$ and $h$ in Example \[eg:bumps\].[]{data-label="fig:nonsmoothbumpy"}](nonsmoothbumpy "fig:"){width="40.00000%"} ![The functions $f$ and $h$ in Example \[eg:bumps\].[]{data-label="fig:nonsmoothbumpy"}](smoothbumpy "fig:"){width="40.00000%"}\ ]{} The function $g(x,y) = 0$ is an optimal solution to the quadratic approximation problem for the function $f$ on $X = \{x\,|\, \|x\|\leq 2\}$ (since this is exactly the same pattern of points of minimal and maximal deviation as discussed in one of the two cases in Example \[eg:nonunique\]). Moreover, the polynomial $$q_\alpha(x,y) = \alpha (x^2+y^2-1)$$ is also a best approximation of $f$ for sufficiently small values of $\alpha$ (this may be already evident to the reader from the plot; the mathematically rigorous reasons for this will be laid out in the proof of Lemma \[lem:sharpbump\]). Modifying the ‘bump’ that defines each of the peaks that correspond to the points of minimal and maximal deviation so that the function $f$ smooth around these points, results in the uniqueness of the approximation $q_0$. Indeed, let $$h(x) = \min\{ 4 \|x-z_1\|^2, 4 \|x-z_3\|^2, 4 \|x-z_5\|^2, 1\}- \min\{ 4 \|x-z_2\|^2, 4 \|x-z_4\|^2, 4 \|x-z_6\|^2, 1\},$$ this function is shown in Fig. \[fig:nonsmoothbumpy\] on the right. The same constant polynomial $q_0(x,y) = 0$ is optimal for $h$, however, this time the solution is unique: indeed, suppose that another polynomial in $S$ provides a best approximation. This polynomial must be of the form $p_\alpha(x,y) = \alpha (x^2+y^2 -1)$ for some $\alpha \neq 0$. By convexity of the solution set, $p_{\alpha'}$ should also be optimal for any $\alpha'$ between 0 and $\alpha$. In the neighbourhood of the point $z_1$ we have $h(x,y) = 4 \|x-z_1\|^2-1 = 4\left[(x-1)^2 + y^2\right]-1$. Then for a sufficiently small $|\alpha'|$ $$h\left(\frac{4}{4-\alpha'},0\right)-p_{\alpha'}\left(\frac{4}{4-\alpha'},0\right) = -1-\frac{(\alpha')^2}{4-\alpha'}<-1,$$ hence this is not a solution. The next result provides a more general justification for the non-uniqueness of the approximation to a nonsmooth function $f$ that we have just considered. \[lem:sharpbump\] Let $V$ be as in , and let $N$ and $P$ be two disjoint compact subsets of ${\mathbb{R}}^n$ such that they can not be separated strictly by a polynomial in $V$. Let $$S = \{s\in V\,|\, s(x)\cdot s(y)\leq 0 \, \forall x\in P,y\in N\}.$$ There exists a continuous function $f:{\mathbb{R}}^n\to {\mathbb{R}}$ such that for any compact $X\in {\mathbb{R}}^n$ such that $N,P\subseteq X$, the optimal solution set $Q$ to the relevant optimisation problem satisfies $\dim Q = \dim S$, moreover, there exists $q_0\in Q$ such that ${\mathcal{P}}(q_0) = P$, ${\mathcal{N}}(q_0) = N$. Let $$f(x):=\max_{u\in P}\varphi_u(x)-\max_{v\in N}\varphi_v(x),$$ where $$\varphi_u(x) = \max\left\{1-\frac{2}{d}\|x-u\|,0\right\}, \quad d= \min_{\substack{u\in P\\v\in N}}\|u-v\|.$$ Fix a compact set $X\subset {\mathbb{R}}^n$ such that $P\cup N \subseteq X$. First observe that $q_0(x,y)\equiv 0$ is an optimal solution to the Chebyshev approximation problem: the deviation $f-q_0$ coincides with the function $f$, and we have for all $x\in X$ $$\begin{aligned} \label{eq:001} f(x) & = \max_{u\in P}\varphi_u(x)-\max_{v\in N}\varphi_v(x) \notag\\ & \leq \max_{u\in P}\varphi_u(x)\notag\\ & = \max_{u\in P}\max\left\{1-\frac{2}{d}\|x-u\|,0\right\}\notag \\ & \leq \max_{u\in P}\max\left\{1-\frac{2}{d}\min_{u\in P}\|x-u\|,0\right\}\\ & = \max\left\{1-\frac{2}{d}\min_{u\in P}\|x-u\|,0\right\}\notag\\ & = 1 - \frac{2}{d} \min\left\{\min_{u\in P}\|x-u\|,\frac{d}{2}\right\}\leq 1;\notag\end{aligned}$$ likewise $$\begin{aligned} \label{eq:002} f(x) & \geq -1 + \frac{2}{d} \min\left\{\min_{v\in N}\|x-v\|,\frac{d}{2}\right\}\geq -1\quad \forall x\in X.\end{aligned}$$ Moreover, for $x\in P$ we have $f(x) =1$, for $x\in N$ we have $f(x) = -1$, and it follows from and that for $x\notin P\cap U$ we have $-1<f(x)<1$, hence, $N= {\mathcal{N}}(q_0) $ and $P= {\mathcal{P}}(q_0)$, so $q_0$ satisfies the very last statement of the lemma. We have assumed that $N$ and $P$ can not be strictly separated by a polynomial in $V$, hence we deduce that $q_0\equiv 0$ is a best Chebyshev approximation of $f$ on $X$. We will next show that for any direction $p\in S$ such that $p(N)\leq 0$ and $p(P)\geq 0$ there exists a sufficiently small $\alpha>0$ such that $\alpha p$ is another best Chebyshev approximation of $f$ on $X$. Note that this guarantees that for any set of linearly independent vectors in $S$ we can produce a simplex with vertices at zero and at nonzero vectors along these linearly independent vectors. This yields $\dim Q = \dim S$. Since $p\in S$ is a polynomial, and the set $X$ is compact, $p$ is Lipschitz on $X$ with some constant $L$, and its absolute value is bounded by some $M> 0$ on $X$. Let $\alpha: = \min\left\{\frac 1M,\frac{2}{d L}\right\}$, then for $q = \alpha p$ we have $$|q(x)| = |\alpha p(x)|\leq \alpha \cdot M \leq 1 \; \forall x\in X,$$ $$|q(x) -q(y)| = |\alpha p(x) - \alpha p(y)| = \alpha | p(x) - p(y)|\leq \alpha L \|x-y\| \leq \frac{2}{d}\|x-y\|\quad \forall x,y \in X;$$ $$q(y)- \frac{2}{d}\|x-y\| \leq q(x) \leq q(y)+\frac{2}{d}\|x-y\|\quad \forall x,y \in X;$$ From $q(N)\leq 0 $ and $p(P)\geq 0$ we have for all $x\in X$ $$\frac{2}{d}\min_{y\in P} \|x-y\| \leq \max_{y\in P} (q(y)- \frac{2}{d}\|x-y\| ) \leq q(x) \leq \min_{y\in N} (q(y)+\frac{2}{d}\|x-y\|)\leq \frac{2}{d}\min_{y\in N} \|x-y\|.$$ Hence, $$\max\left \{\frac{2}{d}\min_{y\in P} \|x-y\| ,-1\right\} \leq q(x) \leq \min\left \{ \frac{2}{d}\min_{y\in N} \|x-y\|,1\right\}.$$ We hence have for every $x\in X$ $$- 1 \leq f(x)-q(x)\leq 1 ,$$ therefore $q$ is a best Chebyshev approximation of $f$ on $X$. Finally, we turn our attention to the relation between the uniqueness of best Chebyshev approximation and the geometry of the domain. We show that on finite domains the best approximation is nonunique whenever the dimension of $S$ allows for this (that is, $\dim S>0$ ). \[lem:finite\] If $X\subset {\mathbb{R}}^n$ is finite, then for any $f:X\to {\mathbb{R}}$ we have $\dim Q = \dim S$. If $\dim S=0$, the result follows directly from Corollary \[cor:unique\]. For the rest of the proof, assume $\dim S>0$. Let $q\in \operatorname*{ri}Q$, $s\in S$. Then $$s(x)\cdot s(y)\leq 0 \, \forall x\in {\mathcal{P}},y\in {\mathcal{N}}.$$ Let $$q_t: = q+ t s.$$ Without loss of generality, assume that $s(x)\geq 0$ for $x\in {\mathcal{P}}$ and $s(x)\leq 0$ for $x\in {\mathcal{N}}$ (otherwise consider $-s$). Let $$\alpha:= \|f-q\|_{\infty}-\max_{x\in X\setminus ({\mathcal{N}}\cup {\mathcal{P}})} |f(x)-q(x)|,$$ where we use the standard convention that the maximum over an empty set equals $-\infty$, so $\alpha =+\infty$ in the case when $X={\mathcal{N}}\cup {\mathcal{P}}$. Since $X$ is finite, $\alpha>0$. Let $$\beta:= \max_{x\in X}|s(x)|.$$ We have for all $t\geq 0$ and $x\in {\mathcal{N}}$ $$\|f-q\|_\infty = q(x) - f(x) \geq q(x)-f(x)+ts(x)\geq q(x)-f(x) - t \beta = \|f-q\|_\infty - t \beta;$$ for $t\geq 0$ and $x\in {\mathcal{P}}$ $$\|f-q\|_\infty = f(x) - q(x) \geq f(x)-q(x)-ts(x)\geq f(x)-q(x) - t \beta = \|f-q\|_\infty - t \beta;$$ For $x\in X\setminus ({\mathcal{N}}\cap {\mathcal{P}})$ and all $t\geq 0$ $$|f(x)-q_t(x)| \leq | f(x) -q(x)| + t|s(x)|\leq \|f-q\|_\infty-\alpha + t\beta.$$ Note that $\alpha=+\infty$ only for the case when $X={\mathcal{N}}\cap {\mathcal{P}}$. Therefore, for $t$ such that $t \beta \leq\min\{\alpha,\|f-q\|_\infty\}$ we have $$\|q_t -f\|_\infty \leq \|f-q\|_\infty,$$ and hence $q_t\in Q$ for some positive $t$. It remains to pick a maximal linearly independent system $\{s_1,s_2,\dots, s_d\}\subset S$, and observe that $\operatorname*{co}\{q,q+t_1 s_1,\dots, q+ t_d s_d\}\subseteq Q$ for some nonzero $t_1,\dots, t_d$. Therefore, $\dim Q \geq \dim S$. By Lemma \[lem:dim\] the converse is true, and we are done. It follows from the previous lemma that the uniqueness of solutions depends not only on the function itself, but also on the domain of its definition. In particular, it may happen that a function defined on a continuous domain has a unique best approximation, but a discretisation of this domain would lead to nonuniqueness of best approximation. This observation is crucial, since most numerical methods do require a certain level of discretisation. In this case there is a potential danger of finding an optimal solution to the discretised problem, while it is not relevant to the original one. Conclusions {#sec:concl} =========== We have identified and discussed in detail key structural properties pertaining to the solution set of the multivariate Chebyshev approximation problem. We have clarified the relations between the points of maximal and minimal deviation for different optimal solutions, related the set of optimal solutions to the set of separating polynomials, and elucidated the relations between the geometry of the domain and smoothness of the function and uniqueness of the solutions. However many questions remain unanswered, some of them pertinent to the potential algorithmic solutions, and more remains to be done to fully understand the relation between the uniqueness of the solutions and structure of the problem. Namely, the following questions are of paramount importance. 1. Can we refine Mairhuber’s theorem for the case of multivariate Chebyshev approximation by polynomials of degree at most $d$? Example \[eg:nonunique\] indicates that to have a unique approximation of any continuous function on a given domain by a system of multivariate polynomials, it may not be enough to restrict the domain to a set homeomorphic to a subset of a circle. Perhaps a more algebraic condition would work, for instance, restricting the domain to sets with one-dimensional Zariski closure. 2. What are the sufficient conditions for the uniqueness of the best Chebyshev approximation in terms of the function $f$ only? Can we guarantee that for a given set of points of maximal and minimal deviation there exists a domain $X$ that contains them and a function $f$ for which an optimal solution is unique and has specifically this distribution of points of minimal and maximal deviation? 3. Can we bridge the gap between Lemmas \[lem:dim\] and \[lem:finite\] and show that given a distribution of points of minimal and maximal deviation, for any $d\in \{0,\dots, \dim S\}$ there exists a function $f$ and domain $X$ with $\dim Q = d$? This question is closely related to our discussion at the end of Example \[eg:unique-and-not\], where smoothness appears to be important only with relation to the orthogonal direction to the varieties separating the points of maximal and minimal deviation. Acknowledgements {#acknowledgements .unnumbered} ================ We are grateful to the Australian Research Council for supporting this work via Discovery Project DP180100602. appendix {#appendix .unnumbered} ======== Technical computations for Example \[eg:nonunique\] --------------------------------------------------- Consider the polynomial $q_\alpha(x,y) = 3 \alpha (x^2+y^2 - 1)+1$, $\alpha\in [0,1]$, of which the polynomials $q_0$ and $q_1$ are special cases. Explicitly our deviation $d_\alpha(x,y) = f(x,y) - q_\alpha(x,y)$ has the form $$d_\alpha(x,y) = x^6 +y^6+ 3 x^4 y^2 + 3 x^2 y^4 + 6 x y^2 - 2 x^3-1- 3\alpha(x^2+y^2-1).$$ The points of maximal and minimal deviation are the global extrema of $d_\alpha$ on the unit disk. To obtain all such extrema, we first find the global minima and maxima of $d_\alpha$ on the boundary of the disk, using the method of Lagrange multipliers, and then study the behaviour of $d_\alpha$ on the interior of the disk. Our Lagrangian function is $L_\alpha(x,y,\lambda) = d_\alpha(x,y) + 6\lambda (x^2+y^2-1)$ (where we have multiplied the constraint by 6 for convenience), and the necessary condition for the constrained global stationary points on the unit circle is $$\begin{aligned} \nabla L_\alpha(x,y,\lambda) & = 6\begin{bmatrix} ( y^2 -x^2)+ x [(x^2+ y^2)^2-\alpha+ 2\lambda]\\ 2 xy + y[(x^2+ y^2)^2-\alpha+ 2\lambda] \\ x^2+y^2 -1 \end{bmatrix} = 0_3.\end{aligned}$$ Multiplying the first line by $y$, and the second line by $x$, and subtracting, we obtain the consequence of the first two equations in the Lagrangian system: $y ( y^2 - 3 x^2) = 0$. Together with the constraint $x^2= 1-y^2$ this yields six candidates for the stationary points on the boundary, $$z_1 = (1,0),\; z_2 = \left(\frac{1}{2},\frac{\sqrt{3}}{2}\right),\; z_3 = \left(-\frac{1}{2},\frac{\sqrt{3}}{2}\right),$$ $$z_4 = (-1,0), \; z_5 = \left(-\frac{1}{2},-\frac{\sqrt{3}}{2}\right),\; z_6 = \left(\frac{1}{2},-\frac{\sqrt{3}}{2}\right).$$ It is not difficult to check that $$d_\alpha (z_1) = d_\alpha(z_3) = d_\alpha(z_5) = -2, \quad d_\alpha (z_2) = d_\alpha(z_4) = d_\alpha(z_6) = 2.$$ Note that these values do not depend on $\alpha$. It remains to study the behaviour of the deviation $d_\alpha$ on the interior of the disk. If $d_\alpha$ attains a global minimum or maximum in an interior point of the disk, then such extrema must satisfy the unconstrained optimality condition $\nabla d_\alpha(x,y) = 0_2$. We have explicitly $$\begin{aligned} \nabla d_\alpha(x,y) &= 6\begin{bmatrix} ( y^2 -x^2)+ x [(x^2+ y^2)^2-\alpha]\\ 2 xy + y[(x^2+ y^2)^2-\alpha] \end{bmatrix} = 0_2.\end{aligned}$$ As before, premultiplying the equations by $y$ and $x$ and subtracting, we conclude that any stationary point must satisfy the equality $y ( y^2 - 3 x^2) = 0$. Hence any maximum or minimum must lie on one of the lines $$y=0, \quad y = - \sqrt{3} x, \quad y = \sqrt{3}x.$$ Observe that both our polynomial and the constraint are symmetric with respect to the rotation of the plane by $2\pi/3$, the restrictions of the polynomial $d_\alpha$ to each of those lines are identical (under the relevant rotations), hence it is sufficient for us to study the behaviour of the restriction of $d_\alpha$ to the open line segment $(-1,1)\times\{0\}$. For convenience, we let $$\varphi_\alpha(x) : = d_\alpha(x,y) = x^6- 2 x^3 - 1 - 3 \alpha (x^2 -1).$$ Observe that $$\varphi'_\alpha(x) = 6 x^5- 6 x^2 - 6 \alpha x = 6x(x(x^3 - 1) -1)<0 \quad \forall x\in (0,1),$$ hence $\varphi_\alpha(x)$ is strictly decreasing on $(0,1)$, and can only have minima or maxima on the endpoints of $[0,1]$. For the open line segment $(-1,0)$ and $\alpha \in [0,1]$ we have $$\varphi_\alpha(x) = (x^3 -1)^2 + 3\alpha (1-x^2)-2 < 1+ 3 - 2 = 2\quad \forall x\in (-1,0);$$ likewise $$\varphi_\alpha(x) = (x^3 -1)^2 + 3\alpha (1-x^2)-2 > 0 + 0 -2 = -2 \quad \forall x\in (-1,0).$$ Since $\varphi(1) = -2$, and $\varphi(1) = 2$, this means that no global minimum or maximum can be achieved on $(-1,1)$. We are hence left with the only candidate $x=0$, for which we have $$\varphi_\alpha(0) = -1 + 3\alpha \in [-1,2) \quad \text{for } \alpha \in [0,1),$$ and $\varphi_1(0) = -2$. This yields the distribution of points of minimal and maximal deviation of $f$ from $q_0$ and $q_1$ as described in Example \[eg:nonunique\]. Computations for Example \[eg:unique-and-not\] ----------------------------------------------- To find the points of maximal and minimal deviation of $f(x,y) = (x^2 - \frac{1}{2})(1 - y^2)$ from the constant polynomial $q_0(x,y)\equiv 0$ on the square $[-1,1]\times [-1,1]$, observe that the optimality condition on the interior of the square gives $$\nabla f(x,y) = \begin{pmatrix} 2 x (1-y^2)\\ - y\left(x^2-\frac{1}{2}\right) \end{pmatrix} = 0_2,$$ and out of the five solutions to $\nabla f(x,y) = 0$ $$(0,0), \; \left(-\frac{1}{\sqrt 2},-1\right), \; \left(\frac{1}{\sqrt 2},-1\right),\; \left(-\frac{1}{\sqrt 2},1\right),\; \left(\frac{1}{\sqrt 2},1\right)$$ only $(0,0)$ is in the interior of the square. Hence we have only one stationary point $(0,0)$ within the interior of the square, with deviation $d_0 (0,0) = f(0,0)- q_0(0,0) = f(0,0) = -\frac{1}{2}$. We now study the boundary of the square: restricting to $x=\pm 1$, and $y\in [-1,1]$, we have the function $\frac{1}{2}(1-y^2)$, which attains minima at the endpoints of the sides of the square, at $(\pm 1,\pm 1)$ with deviation $d_0(\pm 1,\pm 1) = 0$, and maxima at $(\pm 1,0)$, with the value $d_0(\pm 1,0) = f(\pm 1,0) = \frac{1}{2}$. For $y=\pm 1$ the function is identically zero. We conclude that the points of maximal and minimal deviation of $f$ from zero, on the square $X = [-1,1]\times [-1,1]$, are $${\mathcal{P}}(q) = \{(0,0)\}, \qquad {\mathcal{N}}(q) = \{(-1,0), (1,0)\}.$$ We next study the deviation of the function $h(x,y) = (x^2 - \frac{1}{2})(1 - |y|)$ from polynomials $q_\alpha(x,y) = \alpha y$ for $\alpha \in \left[-\frac{1}{2}, \frac{1}{2}\right]$. First of all, observe that for $y =0$ we have $$d_\alpha(x,y) = h(x,y) - q_\alpha(x,y) =x^2 - \frac{1}{2},$$ and hence $d_\alpha(x,0)$ is minimal at $(0,0)$ with the value $d_\alpha(0,0) = -\frac{1}{2}$, and maximal at $(\pm 1,0)$ with the value $d_\alpha(\pm 1,0)= \frac{1}{2}$, independent on $\alpha$. For $y>0$ we have $d_\alpha(x,y) = h(x,y) - q_\alpha(x,y) = (x^2 - \frac{1}{2})(1 - y)- \alpha y $, hence the unconstrained optimality condition gives $$\nabla d_\alpha(x,y) = \begin{pmatrix} 2 x (1-y)\\ - x^2 +\frac 12 - \alpha \end{pmatrix} = 0_2,$$ and the only case when we have solutions in the intersection of the interior of the square and $y>0$ is when $\alpha = \frac 1 2$; likewise, $\nabla d_\alpha(x,y)=0$ gives no solutions in the interior of the square intersected with $y<0$ except for $\alpha = -\frac{1}{2}$. In both cases we have $$d_{\frac 1 2}(0,y) = -\frac 1 2 (1-y) - \frac{1}{2} y= - \frac{1}{2}, \quad y >0;$$ $$d_{-\frac 1 2}(0,y) = -\frac 1 2 (1+y) + \frac{1}{2} y= - \frac{1}{2}, \quad y <0.$$ For the sides of the square that correspond to $x=\pm 1$, and $y\in [-1,1]$, we have a piecewise linear function $$d_\alpha(\pm 1,y) = \frac{1}{2}(1 - |y|)- \alpha y = \begin{cases} \frac{1}{2}- (\alpha + \frac 1 2) y, & y\geq 0,\\ \frac{1}{2}- (\alpha - \frac 1 2) y, & y< 0, \end{cases}$$ hence its behaviour is completely determined by the endpoints of the relevant segments: $(\pm 1,\pm 1)$, $(\pm 1,0)$. We have $$\label{eq:additional} d_\alpha(\pm 1,-1) = \alpha; \quad d_\alpha(\pm 1,1) = -\alpha;\quad d_\alpha(\pm 1,0) = \frac{1}{2}.$$ For the remaining case of the interior of the sides, $(-1,1)\times \{\pm 1\}$ we have $$\label{eq:endpoints} d_\alpha(x,-1) = \alpha; \quad d_\alpha(x,1) = - \alpha.$$ Observe that for $\alpha =0$ the only points of maximal and minimal deviation lie on the line $y=0$, and hence the polynomial $q_0(x,y) = 0$ is a best approximation of the function $h$ on the square $X$. Also note that for $|\alpha|> \frac 1 2$ the relations give worse values of minimal and maximal deviation, hence, $q_\alpha$ can not be a best approximation for $|\alpha |>\frac 1 2 $. For $|\alpha| \in (0,\frac 1 2 ) $ we observe that there are no additional points of minimal and maximal deviation on top of the three alternating points on $y=0$ that are present for $\alpha = 0$. It remains to consider the values $|\alpha| = \frac 1 2 $. For $\alpha = -\frac 1 2$ we have from and the piecewise linear observation $$d_{-\frac 1 2}(\pm 1,y) = \frac{1}{2} \qquad \forall y \in [0,1],$$ and gives $$d_{-\frac 1 2}(x,-1) = -\frac 1 2; \quad d_{- \frac 1 2 }(x,1) = \frac 1 2 .$$ Likewise, for $\alpha = \frac 1 2 $ we obtain $$d_{\frac 1 2}(\pm 1,y) = \frac{1}{2} \qquad \forall y \in [-1,0], \qquad d_{\frac 1 2}(x,-1) = \frac 1 2; \quad d_{\frac 1 2 }(x,1) = -\frac 1 2 .$$
Disclaimer: This article originally appeared in the April 2022 issue of Cannabis Science & Technology. Too much moisture in the air, on plant leaves and buds or around the roots is the most common culprit for the development of pathogenic infection of cannabis plants. Concurrent fluctuations in temperature can be detrimental to plant vitality as infectious organisms infiltrate deeper into plant tissues during those windows of time when optimal conditions are lost. Ascomycetes (powdery mildew), fusarium (crown rot), botrytis (bud rot), pythium (root rot) and many more pathogens do not need optimal conditions in order to infect. They can lie dormant inside the plant (endophytic) or on its surface (ectophytic), slowly growing their way into or across the plant until the perfect moment when conditions fall outside of a safe range for the plant. Temperature, relative humidity and pathogens When environmental control is lost, even if only for short periods of time, diseases can quickly grow deeper into the plant’s tissues. Cannabis has an optimum temperature range for highly productive growth and so do pathogens. The peak of productivity for both pathogens of cannabis and the plant itself overlap quite a bit. Typically, if the preferred temperature range for the plant is maintained, the pathogen is unable to grow at a rate that can keep up with the plant’s development and so its influence is never seen, even though the infection persists. However, if for a short period of time the temperature shifts out of the optimum range for the plant, but still lies in the optimum range for the pathogen, there will be a rapid growth response by the pathogen and symptoms may become visible as plant growth slows. This effect is often seen with fungal diseases such as fusarium or botrytis as one day the plant looks healthy and vigorous and the next it is chlorotic with water-soaked and mushy tissue. Damage from temperature swings is not limited to direct impacts on plant tissues and stress can occur even if humidity is in a sufficient range. Only certain organisms such as powdery mildew and botrytis are directly dependent on the room air conditions, as opposed to water-borne diseases like pythium or fusarium which would thrive in high humidity indirectly as water movement in the rootzone is suppressed by a high-humidity induced low vapor-pressure deficit (VPD). Excessive moisture in the air (high humidity), even if only for moments at a time, greatly encourages the growth of diseases like powdery mildew and bud rot. It is not enough to simply monitor your room humidity sensors that control your conditioning equipment, you must identify the microclimates within your cultivation facility. If the sensor for humidity is only a panel mounted on the wall, there could be a plethora of environmental conditions happening in the room. Perhaps your humidity sensor reads right at your setpoint most of the day, but if this is showing an average over a longer period of time it may not be informing you of the fluctuations in room air conditions. It could be that your sensor shows an average over a ten-minute period and during that time the humidity swings are ±10%, which could enter the pathogen favoring zone quite frequently. It’s not just about knowing what value is the optimum, you must ensure that you are providing those conditions uniformly and consistently. Using HVACD systems to mitigate risk The most sophisticated (and legal) pest management products will be unable to stop the proliferation of plant pathogens if the environmental conditions cannot be kept within an acceptable range. Exposure to the pathogen is extremely difficult to avoid and even harder to maintain for extended periods of operation, especially without fully clearing material from a grow room in between each production cycle. Although air filtration and sterilization systems can greatly reduce the threat of pathogen propagation by eliminating airborne spores or organisms, the vitality of plants must be protected and favorable conditions for those pathogens must be eliminated by ensuring excess moisture is kept at bay and that excessive temperature swings are avoided. Heating, ventilation, air conditioning and dehumidification (HVACD) systems have advanced quickly as the needs of the commercial cannabis industry have evolved to support a much larger market. Legacy producers have primarily maintained environmental conditions using multiple pieces of equipment (i.e. oscillating fans, standalone dehumidifiers, air conditioners and heaters) to address individual environmental conditions. The upside to this approach is the ease of accessing retail equipment that can be added in a series to meet the changing needs of production and to provide redundancy in the case of equipment failure. The downside to this method is the variability of environmental conditions within a grow room is greatly increased as the plants are essentially located in an air mixing chamber. Pockets of high humidity form where the air is not mixed as frequently. This is most likely to happen in corners or near a source of moisture such as the grow tray, substrate or leaves where water is evaporating continuously. Very quickly, white fuzz can form in high humidity conditions as ascomycetes colonize juicy leaves. Think of a newly sprouted seed – if it emerges and then conditions become dry, it is likely to die. If humid conditions remain, the roots have more time to establish a water column in the vascular tissue as the leaves acclimate to the air conditions. If it stays too wet, the root will likely rot as it is suffocated by oxygen-deficient water, leaving an opening for a pathogen to attack. You may have noticed some seedlings turn to white or gray mush when left in a tray that is too wet. Some producers will keep humidity levels very low to avoid any chance of pathogens growing, but leaves need a certain amount of moisture in the air as well to remain healthy and this changes depending on the air temperature, light source, and maturity of the plant. If conditions are too dry while the lights are on, photosynthesis can be inhibited for a number of reasons. If they are too dry while the lights are off, xylem-based nutrient movement into the newly developing tissues can be inhibited, specifically calcium movement into the new growth is inhibited. Cell wall development requires a constant supply of calcium in order to form rigid structures that effectively prevent intrusion by pathogens. Calcium primarily enters plants through meristematic tissues (the foremost tip of a root or shoot) as the cell wall is still forming at this location exposing the vascular tissue where calcium is able to enter the plant and be transported into developing tissues through the unidirectional water stream called the xylem. If VPD is very high, calcium is likely to be shuttled into the tissues where transpiration is the highest, which is likely to be the large mature leaves with the most developed stomata. This shuttling of calcium away from newly developing tissues encourages poor cell wall development leaving plants weak and susceptible to attack. Final thoughts Ultimately, plant vitality will be strongest when plants are able to thrive without constantly adapting to shifting conditions. In nature, a plant must deal with an array of stressful circumstances, and it is loaded with mechanisms to ward off threats and protect itself from a shifting environment. However, these adaptations cost metabolic energy and will reduce plant productivity, yield and end-product quality. Many of these points are often overlooked as producers seek out short-term solutions to chronic issues caused by poor HVACD design and subsequently environmental control. Rather than pursue topical products to suppress pest issues, investigate what aspects of your environmental control systems might be providing an optimum habitat for pests to thrive rather than plants. Identify the microclimates and make attempts to de-stratify these pockets and you will see great improvements in the overall health of your facility.
https://inspire.ag/2022/04/19/poor-environmental-control-creates-pest-pressure/
The legislative requirements for handling cyanide containing wastewater have become stringent internationally. Cyanide properties make it indispensable in the mining industry especially for gold recovery. The resultant wastewater generated is discarded to tailing ponds. Any leakages or total collapse of tailing ponds can result in the contamination of surface water bodies; endangering aquatic organisms’ and humans’ alike. The over reliance on physical and/or chemical treatment methods for cyanide wastewater treatment is not sustainable due to high input costs and the generation of by-products. A feasible alternative treatment method for cyanide contaminated wastewater is the biodegradation method, as a wide range of microorganisms can degrade cyanide. In this study, the cyanide biodegradation ability of Fusarium oxysporum was assessed in two stages. Firstly, optimal operating conditions for maximum cyanide biodegradation were determined using a central composite design (CCD) at an elevated cyanide concentration, i.e. 500 mg F-CN/L. Thereafter, using the optimum conditions obtained, (i.e temperature 22°C and pH 11), cyanide biodegradation kinetics and microbial growth kinetics in the cultures at lower cyanide concentrations of 100, 200 and 300 mg F-CN/L were assessed. This was followed by the assessment of cyanide biodegradation at a temperature of 5°C, which was used to simulate winter conditions. In general, lower cyanide concentrations are used in the extraction of gold, therefore, the resultant wastewater will contain free cyanide concentration less than 300 mg F-CN/L. For the first stage of experiments, an isolate, Fusarium oxysporum from cyanide containing pesticides was cultured on potato dextrose agar (PDA) plates, followed by incubation at 25°C for 5 days. A response surface methodology (RSM) was used to evaluate design parameters for the biodegradation of cyanide by this fungus. The temperature evaluated at this stage ranged from 9°C to 30°C and pH range of 6 to 11 in cultures solely supplemented with agrowaste, i.e Beta vulgaris waste. Beta vulgaris is commonly known as Beetroot. The Fusarium oxysporum inoculum (2% v/v) was grown on a Beta vulgaris waste solution (20% v/v), as the sole carbon source in a synthetic gold mine wastewater (39% v/v) containing heavy metals; arsenic (7.1 mg/L), iron (4.5 mg/L), copper (8 mg/L), lead (0.2 mg/L) and zinc (0.2 mg/L), for 48 hours using a rotary shaker at 70 rpm. Thereafter, free cyanide as a potassium cyanide solution (39% v/v), was added to the cultures to make a final cyanide concentration of 500 mg F-CN/L in the culture medium which was incubated for a further 72 hours at 70 rpm. Optimal operating conditions for the biodegradation of cyanide were then determined using a numerical option in the Design-Expert® software version 6.0.8 (Stat-Ease Inc., USA). Subsequently, using the optimal pH obtained (pH =11) and a preselected temperature of 5°C (to represent winter conditions), cyanide biodegradation rates and microbial growth kinetic studies were carried out using Beta vulgaris waste containing a Fusarium oxysporum (0.7% v/v; grown overnight) inoculum in wastewater (32.7% v/v) and potassium cyanide in phosphate buffer (53.7% v/v). The cultures contained 100, 200 and 300 mg F-CN/L. The cultures were incubated in an orbital shaker at 70 rpm for 144 hours and samples taking every 24 hours. An Ordinary Differential Equation (ODE) solver (Polymath) was used for modelling cyanide degradation kinetics while the Monod’s growth kinetic model was used to monitor the microbial growth parameters of the cultures. For the first stage, the optimum operating conditions were determined as a temperature of 22°C and a pH of 11 for maximum cyanide biodegradation of 277 mg F-CN/L from an initial cyanide concentration of 500 mg F-CN/L over a 72 hour period, with residual ammonium-nitrogen and nitrate-nitrogen of 150 mg NH4+-N/L and 37 mg NO3--N/L, respectively. Although, the residual ammonium-nitrogen inhibited cyanide biodegradation, it was consumed as a nitrogen source for microbial growth. The Beta vulgaris waste was determined to be a suitable substrate for cyanide degradation. From the biodegradation response quadratic model, temperature was determined to influence cyanide biodegradation. For the cyanide degradation kinetics, at an optimum temperature of 22°C, the biodegradation efficiency was 77%, 58% and 62% with the corresponding maximum microbial population of 1.56 x 107, 1.55 x 107 and 1.57 x 107 CFU/mL for 100, 200 and 300 mg F-CN/L, being achieved. An indication that the F. oxysporum cultures were efficient at lower cyanide concentration. Furthermore, at a temperature of 5°C, the biodegradation efficiency, although slightly lower, was 51%, 43% and 44% with the corresponding maximum microbial population of 1.21 x107, 1.11 x 107 and 1.12 x 107 CFU/mL for 100, 200 and 300 mg F-CN/L cultures, respectively, with minimal differences observed for cultures with 200 and 300 mg F-CN/L. The cyanide biodegradation rates increased with temperature increases and varied with different cyanide concentrations below 500 mg F-CN/L. The estimated energy of activation for cyanide degradation for a change in temperature from 5°C to 22°C using the Arrhenius model was 19.6, 12.7 and 14.9 kJ/mol for 100, 200 and 300 mg F-CN/L, respectively. The means and standard deviations for rate of degradation of cyanide at 5°C and 22°C for the ODE models was 0.0052 (± 0.0011) h-1 and 0.0084 (± 0.0027) h-1, respectively. The inhibitory effect of the cyanide was quantitatively pronounced under cold temperature as the heavy metals, residual ammonium-nitrogen and nitrate-nitrogen hindered the cyanide degradation. Similarly, microbial growth rates increased with a temperature rise (from 5°C to 22°C), resulting with a reduction in the microbial populations’ doubling time. When compared with the simulated winter conditions, the specific population growth rate increased 4-fold, 5-fold and 6-fold in 100, 200 and 300 mg F-CN/L, respectively, for higher temperatures; an indication that the Fusarium oxysporum isolate prefers higher temperature. The estimated energy of activation for cellular respiration was 44.9, 54 and 63.5 kJ/mol for 100, 200 and 300 mg F-CN/L cultures, respectively, for the change in temperature from 5°C to 22°C. The means and standard deviations of microbial growth rate at 5°C and 22°C were: 0.0033 (± 0.0013) h-1 and 0.0151 (± 0.0027) h-1, respectively. The difference in error (standard deviation) of the cyanide biodegradation rate and microbial growth rate was insignificant (0.02% at 5°C) especially at temperature 22°C where there were minimal differences, indicating the reliability and reproducibility of this biodegradation system in batch operated bioreactors.
http://etd.cput.ac.za/handle/20.500.11838/918
Good readers use the following 7 Keys to unlock meaning: - Create mental images: Good readers create a wide range of visual, auditory, and other sensory images as they read, and they become emotionally involved with what they read. - Use background knowledge: Good readers use their relevant prior knowledge before, during, and after reading to enhance their understanding of what they’re reading. - Ask questions: Good readers generate questions before, during, and after reading to clarify meaning, make predictions, and focus their attention on what’s important. - Make inferences: good readers use their prior knowledge and information from what they read to make predictions, seek answers to questions, draw conclusions, and create interpretations that deepen their understanding of the text. - Determine the most important ideas or themes: Good readers identify key ideas or themes as they read, and they can distinguish between important and unimportant information. - Synthesize information: good readers track their thinking as it evolves during reading, to get the overall meaning. - Use fix up strategies: Good readers are aware of when they understand and when they don’t. If they have trouble understanding specific words, phrases, or longer passages, they use a wide range of problem-solving strategies including skipping ahead, rereading, asking questions, using a dictionary, and reading the passage aloud.
https://www.medford.k12.nj.us/Page/1550
Particle physics is the study of the elementary building blocks of matter and radiation and their interaction. The fundamental particles are summarised by the standard model. This includes leptons (such as the electron), the quarks that make up protons and neutrons, and gauge bosons, which mediate forces between the other particles. Latest Research and Reviews - - Research | Open Access Experimental demonstration of optical stochastic cooling Stochastic cooling at optical frequencies is demonstrated in an experiment at the Fermi National Accelerator Laboratory’s Integrable Optics Test Accelerator, substantially increasing the bandwidth of stochastic cooling compared with conventional systems.Nature 608, 287-292 - Research | Open Access Learning to rank Higgs boson candidatesScientific Reports 12, 13094 - Research | Neural Error Mitigation of Near-Term Quantum Simulations So-called noisy intermediate-scale quantum devices will be capable of a range of quantum simulation tasks, provided that the effects of noise can be sufficiently reduced. A neural error mitigation approach is developed that uses neural networks to improve the estimates of ground states and ground-state observables of molecules and quantum systems obtained using quantum simulations on near-term devices.Nature Machine Intelligence 4, 618-624 - Reviews | The Higgs boson turns ten Ten years since the discovery of the Higgs boson, the exploration of the Higgs sector, as this overview shows, has progressed far beyond original expectations, but many research questions still remain open.Nature 607, 41-47 - Research | Open Access A detailed map of Higgs boson interactions by the ATLAS experiment ten years after the discovery Ten years after the discovery of the Higgs boson, the ATLAS experiment at CERN probes its kinematic properties with a significantly larger dataset from 2015–2018 and provides further insights on its interaction with other known particles.Nature 607, 52-59 News and Comment - News | Particle physicists want to build the world’s first muon collider The accelerator would smash together this heavier version of the electron and, researchers hope, discover new particles. - Comments & Opinion | How high-energy physics plans its future Past and present chairs of the Division of Particles and Fields of the American Physical Society explain how the high-energy physics community in the US decides the priorities for research through regular planning exercises that started 40 years ago at Snowmass, Colorado. - News | Higgs boson at 10: a deep dive into the mysterious, mass-giving particle We discuss the discovery of the Higgs boson and the impact it's had on physics.
http://www-nature-com-s.caas.cn/subjects/particle-physics?error=cookies_not_supported&code=053b663f-e892-45c0-848d-a10b235ec110
Townsquare Media Grand Rapids currently has these openings: __________________________________________________________________________ IT Support Technician Job Title: IT Support Technician Department: IT Reports To: Head Engineer Summary This full-time position in Grand Rapids, MI serves dual functions of Information Systems (IS) and Media Production support duties. Your ‘customers’ are two groups: Administrative staff which consists of the business side of the operation (management/sales) and the creative staff who produce our on-air and online products. Essential Duties and Responsibilities - Ensure compliance with all Company Engineering and Information Technology practices. - Interface with Vice President of Engineering and Director of Information Technology on a regular basis. - Talking to customers to get details of faults, working out the reasons for a fault and explaining these to the customer. - Logging of problems and their solutions for future reference. - Perform ongoing performance tuning, hardware upgrades, and resource optimization. - Perform daily system monitoring, verifying the integrity and availability of all hardware, server resources, systems and key processes, reviewing system and application logs, and verifying completion of scheduled jobs such as backups. - Monitor daily backup operations, ensuring all required file systems and system data are successfully backed up to the appropriate media, recovery disks are created, and media is recycled and sent off site as necessary. - Installation, maintenance and repair of PC, servers, printers, software, LAN systems. - Audio and Video Web streaming systems maintenance. - Telephone and voicemail systems maintenance and updating. - Training and helping creative staff with studio equipment and computer issues. - After hours and weekend work as required. - Other duties as necessary. Qualifications To perform this job successfully, an individual must be able to perform each essential duty satisfactorily. The requirements listed below are representative of the knowledge, skill, and/or ability required. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. Education/Experience: AA/AS degree or certification in Electronics, or equivalent electronics and/or IT training/experience. Will consider previous work experience in lieu of degree. Language Ability: Ability to read and interpret documents such as safety rules, operating and maintenance instructions, and procedure manuals. Ability to write routine reports and correspondence. Ability to speak effectively before groups of customers or employees of organization. Reasoning Ability: Ability to solve practical problems and deal with a variety of concrete variables in situations where only limited standardization exists. Ability to interpret a variety of instructions furnished in written, oral, diagram, or schedule form. Key Competencies: - A high aptitude in technology and the ability to grasp complex concepts quickly is required. - Must have solid working knowledge of PC hardware, be familiar with Microsoft Windows (all versions), Microsoft Office, Networking concepts and computer hardware, wireless and handheld devices. - Possess IT networking skills; knowledge of TCP/IP, UDP and local area networking. - Demonstrates the ability and desire to learn new technologies quickly. - Candidate must be a self-starter capable of independent work, study, problem analysis and problem solving; thrives on technical challenges and takes pride in solving them. - Customer service orientation with attention to detail, Ability to train others - Radio Broadcast tech support experience is desirable. Certificates and Licenses: SBE or computer related certification desired. Physical Demands The physical demands described here are representative of those that must be met by an employee to successfully perform the essential functions of this job. Reasonable accommodations may be made to enable individuals with disabilities to perform the essential functions. The employee must frequently lift and/or move up to 10 pounds and occasionally lift and/or move up to 50 pounds. While performing the duties of this job, the employee is frequently required to stand; walk; sit; use hands to finger, handle, or feel; reach with hands and arms and talk or hear. The employee is occasionally required to climb or balance and stoop, kneel, crouch, or crawl. The worker is required to have close visual acuity to perform an activity such as: preparing and analyzing data and figures; transcribing; viewing a computer terminal; expansive reading; visual inspection involving small defects, small parts and/or operation of machines (including inspection); using measurement devices; and/or assembly of fabrication of parts at distances close to the eyes. This job specification should not be construed to imply that these requirements are the exclusive standards of the position. Incumbent will follow any other instructions, and perform any other related duties, as may be required by the supervisor. To Apply Qualified Applicants please E-mail resume to: [email protected] Equal Employment Opportunity Policy Townsquare Media of Grand Rapids, Inc. is an Equal Opportunity Employer (EOE). The Company provides equal employment opportunities to all employees and applicants without regard to race, color, religious creed, sex, national origin, ancestry, citizenship, status, pregnancy, childbirth, physical disability, mental disability, age, military status or stats as a Vietnam-era or special disabled veteran, marital status, registered domestic partner or civil union status, gender, medical condition, or sexual orientation in accordance with applicable federal, state and local laws. In addition, the Company complies with applicable state and local laws governing nondiscrimination in employment in every location in which the Company has facilities. This policy applies to all terms and conditions of employment, including, but not limited to, hiring, placement, promotion, termination, layoff, recall, transfer, leaves of absence, compensation and training. _________________________________________________________________________ Promotions Assistant Part-Time Promotions Assistant Position Job Title: Part-Time Promotions Assistant Department: Promotions Reports To: Promotions Director Job Summary: Support the Promotions Department by attending live events, station appearances, and remote broadcasts. Promote our stations through positive, face-to-face interactions with listeners. Essential Duties and Responsibilities: - Assist with setup, tear down, and recording broadcasts at station events - Communicate with listeners and clients as the “face” of our stations - Distribute prizes to event attendees - Expand the listener database - Inventory promotions equipment used on-location - Provide office support as receptionist back-up - Assist at the office where needed Qualifications: - Willing to work flexible hours, especially evenings and weekends - Superior interpersonal skills - Self-motivated - Willing to learn - Ability to work with minimal supervision - Good driving record - Experienced with Microsoft Word, PowerPoint, and Excel CONTACT: If you are interested in working with our Promotions Team, please e-mail your resume to Bethany Antill at [email protected]. Please be sure to place “Promotions Assistant Position” in the subject line. E-mails without resumes attached will not be considered. Townsquare Media Broadcasting, LLC maintains a drug-free workplace and is an equal employment opportunity employer. Applicants must be eligible to work in the U.S. Current Townsquare Media Broadcasting Employee Qualification Statement: It is preferred that current employees of Townsquare Media Broadcasting, LLC and affiliated companies have a minimum of six months of service in their current position, and a fully competent performance rating to be eligible to apply for this position. ______________________________________________________________________ Media and Digital Sales Executive – Grand Rapids, MI Townsquare Media Group Grand Rapids, MI, United States Full-Time MEDIA AND DIGITAL SALES EXECUTIVE Are you Commission driven? Have a sense of what it takes to win? If you want to grow professionally, can move at the speed of light and still have fun – Well then we want to talk to you. RESPONSIBILITIES - Promote and sell advertising programs which may include local radio, digital products such as display, streaming, loyalty programs, e-commerce, and digital marketing services - Leverage our live event platform to sell sponsorship and sales programs to new and existing clients - Create new relationships with local and regional businesses in our area - Inquiring and crafting advertising programs for your clients, both new and existing - Work with local and corporate marketing teams to develop campaign support materials - Responsible to accurately project revenues, meet and exceed monthly budgets for all product lines and overachieve annual budgets - Enters new customer data and other sales contract details for station clients into computer database - Follow accountabilities set forth by your Sales Manager to help guide you to success achieving monthly sales quotas consistently - Provide insight and value to executive management to shape the future of our organization QUALIFICATIONS - Goal oriented and a sense of what it takes to win is essential - Strong desire to be coached, mentored, and developed while comfortable being an individual contributor - Comfortable with prospecting and cold calling - Candidates must demonstrate passion for sales - Ability to engage clients quickly and develop rapport - Must be proficient at conducting needs analysis - Excellent communication and problem-solving skills - Previous sales experience preferred - Broadcast/digital sales experience a plus - Associates/Bachelor’s business/marketing-related degree or equivalent experience ABOUT US Townsquare Media Group is a diversified media, entertainment and digital marketing services company that owns and operates radio, digital and live event properties. The Company specializes in creating and distributing original entertainment, music and lifestyle content. Its assets include 311 radio stations and over 325 local companion websites in 66 small to mid-sized markets, a national portfolio of music and entertainment digital properties reaching over 50 million US unique visitors monthly, including Taste of Country, Diffuser.fm, Ultimate Classic Rock, Loudwire, The FW, GuySpeed, ScreenCrush and PopCrush, approximately 500 live music and non-music events annually, and Seize the Deal, an E-commerce business. APPLICATIONS Detailed resume’, cover letter, recent references, and salary requirements to Account Executive Position, Townsquare Media, 50 Monroe Ave NW, Grand Rapids, MI 49503. CONTACT: Stephanie Gonda, (616) 459-1633 or [email protected] TOWNSQUARE MEDIA BROADCASTING, LLC MAINTAINS A DRUG-FREE WORKPLACE AND IS AN EQUAL EMPLOYMENT OPPORTUNITY EMPLOYER. APPLICANTS MUST BE ELIGIBLE TO WORK IN THE U.S. Plus, Townsquare Media of Grand Rapids is always looking for good people. CONTACT: Rick Sarata at (616) 459-1631 or [email protected] TOWNSQUARE MEDIA BROADCASTING, LLC, MAINTAINS A DRUG-FREE WORKPLACE AND IS AN EQUAL EMPLOYMENT OPPORTUNITY EMPLOYER. APPLICANTS MUST BE ELIGIBLE TO WORK IN THE U.S.
https://wgrd.com/jobs/?source=desktopnav
My goal is to promote deep social science analysis of the challenges of global environmental change drawing on a range of social science theories, such as political economy as well as theories of decision-making and risk. I seek to promote theoretically-informed social science and develop strong empirical evidence in specific areas and to promote interdisciplinary dialogues on environmental challenges. I have published articles that have been widely cited on adaptation to climate change; the nature and implications of vulnerability to climate change; contributions to resilience theory; ecological and institutional economics; and the political economy of the environment. Citations to articles can be followed though a profile on Google Scholar. Research projects Adaptation to climate change The world is in the throes of confronting the reality of climate change. It has altered the landscape of risk and is likely to alter the economic and human geography of every part of the world in the coming decades. Hence I have sought to develop insights into the social processes that deal with these risks. Some of this work is published in a book, Adapting to Climate Change: Thresholds, Values, Governance resulting from five years of work as leader of the Adaptation Theme within the Tyndall Centre for Climate Change Research. I have sought to elaborate how extreme events and risks interact to produce adaptation action, showing that the evolution of social contracts is a potential mechanism for such change, published in a paper in Nature Climate Change. Sustainability, resilience and vulnerability of social-ecological systems Resilience theories and applications across the natural and social sciences offer a significant potential to explain how change occurs in a globalizing and uncertain world. I collaborate with colleagues in the Resilience Alliance on research, and we organize the Exeter node of the Alliance, with Katrina Brown of the Environment and Sustainability Institute. We have applied resilience theories to assess whether present adaptation strategies to climate change promote system resilience, in a paper in WIREs Climate Change, and have sought to examine cultural dimensions to resilience and adaptation – with these papers in Global Environmental Politics and Nature Climate Change. Migration in response to environmental change One of the major responses to environmental change has been the movement of people, settlements and investments – the evidence is around us in how and where we live. Migration is as natural as breathing. I have contributed to the emerging reconsideration of migration and environmental change that seeks to refocus analysis and policy away from displacement (as one specific issue in migration-environment relations to a broader analysis of the role of mobility and migration in dealing with environmental change. Early work focused on resilience of migrants’ livelihoods, funded by the MacArthur Foundation, and published in Ambio. Recently I have been a member of the Lead Expert Group and author of the UK Foresight report, Migration and Global Environmental Change. Work in Bangladesh, as part of ESPA Deltas with Helen Adams seeks to examine the interaction of mobility with ecosystem services. Current Grants and Funding: Safe and Sustainable Cities: Human Security, Migration and Well-being ESRC-DFID funded research on integration of new migrant populations into planning and sustainabilty, focussed on the coastal city of Chittagong in Bangladesh. Deltas and Adaptation to Climate Change DFID-IDRC funded research on migration and climate change in the world's deltas, working in Ghana, Bangladesh and India. Environmental Change and Health: Health Protection Research Unit National Institute for Health Research (NIHR) funded research on health and well-being mpacts of climate resilience, focussed on flood risks and outcomes. Recently completed (2012-2017): Winter floods and policy change ESRC funded research on policy evolution following the major floods in the UK in winter 2013/14 Assessing health, livelihoods, ecosystem services and poverty alleviation in populous deltas. Funded by NERC/ESRC/DFID Ecosystem Services and Poverty Alleviation programme (with Universities of Southampton, Oxford, Dundee; Bangladesh University of Engineering and Technology and Plymouth Marine Laboratory) 2012-2016. Part of the Ecosystem Services and Poverty Alleviation Programme Climate Change, Hydro-Conflicts and Human Security (CLICO). Funded by EU FP7 (with Autonomous University of Barcelona). 2010-2013. See the project website Climate and Security International Workshop. Funded by Department of Energy and Climate Change, British Council, Paris, and the French Department of Defense. (with Sciences Po, Paris, and Woodrow Wilson Center, Washington DC). 2012. Strengthening Resilience in Volcanic Areas (STREVA). Funded by NERC/ESRC Resilience and Natural Hazards Programme. (led by University of East Anglia). 2012-2016.
http://geography.exeter.ac.uk/staff/index.php?web_id=Neil_Adger&tab=research
Niccolo Codazzi (1648-1693) was the son of Viviano, possibly the greatest of the Italian vedute painters of the seventeenth century. He very much continued the work initiated by his father of producing architectural scenes, capricci and ruins. He is known to have been in Rome from 1675 and painted the piano nobile of the Palazzo Altieri al Gesù and later whilst in France collaborated on the Queen’s grand staircase at Versailles. His subject matter and style of painting show the growing popularity of Classical Rome with collectors in the 17th century but despite his popularity, competition was fierce, resulting in many years in France. This fine architectural vista within the environs of a palazzo displays well the type of scene which Codazzi excelled at. In this instance the painter has achieved the strong chiaroscuro which he was noted for and further combined this with majestic elements of grand baroque design resulting in a carefully balanced and urbane order both in structure and colour. This is further enhanced by the carefully considered groups and individuals within the composition whose presence draws the eye and subtly enlivens the scene. The capriccio or architectural fantasy is regarded as having come to prominence through the skill of Viviano Codazzi as well as Marco Ricci who enjoyed popular success with his imagined views of ruins when he came to England in 1710. The style was later developed by Giovanni Paolo Panini (b.1691 – d.1765) whose works of Rome included views of the architecture arranged as pictures in a gallery. In the 1740s, Giovanni Battista Piranesi created a famous series of engravings entitled ‘Prisons (Carceri)‘ which, instead of the idealised and tourist-friendly views of Rome, created an imagined labyrinth of vaulted, subterranean spaces dramatically lit. The creation of entirely imagined spaces moved the art of the capricci out of strict reality and gave artists the space to dream any number of fantastical schemes. Such compositions were avidly sought by travellers embarking on the grand tour across the continent and were stable pictures in many English country house collections of the 18th century.
http://www.milesbarton.com/product/a-palazzo-vista/
Filipinos are very clannish and are known for recognizing relatives up to the 10th or even the 20th degree. A person’s siblings (“mga kapatid”) would be one’s brothers or sisters. The terms “Kuya” and “Ate” are used to address an older brother and sister respectively as a sign of respect. What are the Filipino social relationships? Filipinos also extend the circle of social alliances with friendship. Friendship often is placed on a par with kinship as the most central of Filipino relationships. … Thus two individuals may be cousins, become friends, and then cement their friendship through godparenthood. What is Filipino family relationship? Filipinos trace their family relations bilaterally through the mothers’ and fathers’ lines. … Households in the Philippines are commonly made up of extended family members, which may included grandparents, aunts, uncles, nephews, and nieces. How do you describe the family systems in the Philippines? In general, Filipino families are bilaterally extended and residentially nuclear. … Like in other cultures in Asia, families in the Philippines uphold the principle of seniority in assigning authority within kinship groups. The kinship system is established through blood ties, marriage, and rituals. How important is the family in shaping the Filipino society in general? Family is considered to be the foundation of social life for most Filipinos. … Observing one’s duties and responsibilities is important in order to correctly respect others and to ensure harmony among family members. For example, family members are required to show respect to their elders at all times. What are the Filipino family values? Enumeration of Filipino values - Family orientation. The basic and most important unit of a Filipino’s life is the family. … - Joy and humor. … - Flexibility, adaptability, and creativity. … - Religious adherence. … - Ability to survive. … - Hard work and industriousness. … - Hospitality. Why Filipino is hospitable? Hospitality. This is the most common terminology that describes how Filipinos welcome foreigners or tourists who visit the country. … For Filipinos, it is a pleasure and the country’s honor to accept foreigners as visitors and build genuine relationships and friendship with them. What are the characteristics of Filipino? Filipino Traits and Characteristics - Hospitable. This is one of the most popular qualities of Filipinos. … - Respectful. This is often observed not just from younger people but also from older ones. … - Strong Family Ties and Religious. Yes. … - Generosity and Helpful. … - Hardworking. … - Loving and Caring.
https://projekbrunei.com/southeast-asian-countries/you-asked-what-are-the-filipino-concept-of-kinship.html
Somewhere under that wonderful ganache sits a gluten-free vanilla sponge cake. Oh, and a chocolate whipped cream. And, let me tell you, it’s amazing, and I don’t think anyone would be able to tell it’s gluten-free. Let me tell you a story before I launch into the details of this cake: when Downton Abbey was on locally on our PBS station, right before it every week, they ran The Great British Baking Show. And every night, we’d watch, mouths watering, as the bakers would create amazing things as part of the competition. Frequently, there were cakes or cupcakes, and most of these were sponge cakes of some sort. Jenni would tell me I needed to make one or more cake from each week. And I said “Sure,” because, why not? But I’ve never, ever, made a sponge cake. Now, for ages, I’ve watched for great recipes online, both gluten-free and non-gluten-free, and I’ve collected a relatively large number of recipes in my folder in Evernote. And I occasionally make them. At least, I’ve promised myself to make them and try them. Someday. Last week, during a stop at a gluten-free blog I follow, they posted this cake: a vanilla sponge cake with whipped cream and chocolate ganache. I’m the chocolate lover in the house. But it also had a sponge cake…and a gluten-free sponge cake, at that. So what better time to make it then now? So after looking over the recipe a couple of times late this afternoon, I decided to make it: it looked pretty easy, wonderfully chocolatey, and a nice test to see if I can make a good gluten-free sponge cake. You can find a link to the recipe here. Of note, though, is that I did not use their gluten-free flour blend: I used the America’s Test Kitchen blend, mostly because I already had some mixed, but also because for the most part, I’ve found their blend to not turn out gritty or grainy in whatever I’m baking.
http://www.lathropworld.com/2015/05/25/gluten-free-vanilla-sponge-cake/
Limited natural resources force us to keep on looking for new opportunities and their sustainable use, which also brings many opportunities and challenges for new entrepreneurial stories. We talked with Nina Meglič, National Coordinator of SRIP – Circular Economy, about this issue and the opportunities that the circular economy is bringing. Have a look at the interview below, and at Podim you will also have the opportunity to learn more about the circular economy and the work of our partner SRIP – Circular Economy – Chamber of Commerce and Industry of the Štajerska region of Slovenia. Nature’s resources are limited and we are increasingly aware of this. What opportunities does this bring for companies? The so-called green transition, or transition to a circular economy, brings not only environmental and social benefits, but also economic ones. It is estimated that the net economic benefits will amount to €1.8 billion by 2030, in Europe alone. This means that closing the material loop, which is at the heart of the circular economy, creates new business opportunities in terms of higher value-added products, processes and services. At the same time, of course, we need to ensure new human resources profiles and the development of so-called green competences. What is the role of SRIP – Circular Economy in this area? What is your mission? The role of SRIP – Circular Economy is to create an ecosystem in Slovenia that connects the economy, with a focus on small and medium-sized enterprises, but increasingly also start-ups and scale-ups, development and educational institutions, NGOs, business support organisations, with the aim of creating new value chains based on the principles of the closed material flow economy. SRIP was established by the State in order to realise the objectives of the Slovenian Smart Specialisation Strategy, so we act as a development partner of the State in a way that we transfer the information and needs from the field, from practice, to the State representatives. In other words, in SRIP we co-create conditions and provide services for our members in order to accelerate the transition to a circular economy in Slovenia. How do you assess the development of the circular economy in the CEE region? Where do you see the most untapped opportunities? I believe that Europe as a whole, with the European Union at the forefront, is a global pioneer in this field, and this is being translated into ever more ambitious legislation. The CEE region is following Northern Europe in terms of its development capacity, with, of course, some countries such as Germany and Austria leading the way. I believe that more could be done if public-private partnerships worked more effectively, if there were more investments in science and technology, less corruption and a more cooperative spirit. What challenges do startups and companies face in the transition to a circular economy? The biggest challenge at the moment, in my opinion and according to experience, is the lack of adequate human resources, development funds and venture capital, as well as the “leaky” legislation. In addition, there are the high prices of raw materials, energy, interrupted supply chains, the consequences of the pandemics, the emphasis on digital transformation, etc. Since this is an area in which something new happens every day, it should be a strategic decision for companies to dedicate a minimum of one employee to it, which very few can afford to do. Can you share any success stories with us? There are already many good practices in Slovenia, both at the level of companies, NGOs and cities or local communities. However, as we are the only SRIP (9 were founded) in the Eastern Cohesion Region with its headquarters in Maribor, we are especially proud of the good practices of our members, who are also close to us in terms of location. I would like to highlight the small, high-tech company IOS, which, as a result of a major European project, has set up a pilot device for the processing of waste textiles in Maribor. As you know, textiles are a highly problematic source of waste, as well as production itself being very wasteful of natural resources. Therefore, breakthrough technologies such as this and similar ones will shape our future. This pilot device or the processes at the device are being upgraded to recycle also other polymer wastes, such as plastic and paper packaging. We are working towards establishing a Validation Centre for Industry in the region for obtaining secondary raw materials from synthetic and natural wastes, with this pilot device as a technology hub. What kind of startups, scaleups, companies, researchers are you looking for at Podim? Who would you like to meet in the Deal Room? At Podim, we want to meet start-ups that offer environmentally friendly products and services and whose business model is fundamentally circular, be it in the areas of emissions reduction, waste recovery, eco-design, digital and circular. We are also very interested in the position of investors on green, circular technologies, as we have a number of members who are looking for capital to scale up existing technologies. What can you offer to startups, companies, researchers? Our services focus on supporting the transformation and establishment of a circular business model, human resources development, project preparation, marketing, advocacy and networking with relevant development partners in Slovenia and internationally, as well as the organisation of knowledge transfer events. Could you give any advice to companies, startups entering the circular economy market? The circular economy is even more effective when it comes to collaboration and networking, because the nature of circular business models is such that it is impossible to succeed if you are not actively engaged in the whole innovation ecosystem. Therefore, it is very important to be open for new partnerships along the whole value chain and with types of organisations that we might not think of first when building a business, e.g. NGOs. Do you have any other messages you would like to pass on to Podimo participants? The message I would like to send to PODIM participants is that every contribution, no matter how big, to a greener way of living and doing business is important to leaving the next generations with as healthy a planet as possible.
https://podim.org/the-key-of-success-in-the-circular-economy-lies-in-cooperation-and-networking/
The Municipal Climate Change Plan was born as the culmination of a series of actions carried out around energy saving and efficiency in the municipality. The main objective of the Town Hall of Noáin-Valle de Elorz at the time of implementing these actions, within the Local Agenda 21, was not only to consume less energy, but the fight against climate change. The actions started in 2004 began with three energy audits and the subsequent implementation of the respective corrective measures. This led to a Municipal Energy Plan that covered all municipal facilities and is currently being implemented. At the same time, and in parallel, several renewable energy facilities have been developed, awareness-raising and information campaigns have been carried out for the public and the workers of the Town Hall. Actions have been undertaken to save water and reforestation work was carried out in the Elorz Valley. Thus, among the achievements are the implementation of eight municipal renewable energy facilities and the change in the trend of energy consumption in these municipal facilities (in 2006, electricity consumption in these facilities decreased by 10%, and in 2007 by 6%). Likewise, the population of the municipality is becoming more and more aware. 80 of the 130 families that participated in the Kyoto Homes programme of the Navarra Environmental Resources Centre Foundation (CRANA) were from the municipality of Noáin-Valle de Elorz. In addition, 31,169 trees and shrubs have been planted since 2003, both in bush reforestation work and in linear plantations in the Elorz Valley. Lessons learned One of the main lessons learned has been to verify that these types of initiatives are long-term approaches, which require a lot of patience, since sometimes the measures to be applied have to do with the change of policies and habits and with awareness raising among both the workers of the City Council and of the population. In short, it is a long-distance race. Mainstreaming is fundamental in such a plan. It is important that there is a department in the Town Hall that coordinates it, but the plan will not work if the information on climate change and the actions to be taken in the other departments does not materialise. Without real mainstreaming, it is difficult for City Council employees to incorporate energy saving and efficiency criteria into their day-to-day work. On the other hand, to carry out an initiative of this type, it is important to have a budget for projects that need economic investment, but it is not essential. In most cases, raising awareness and changing habits are the best energy-saving measures. There is little point in improving a heating system or the insulation of offices only for people to seize the opportunity to work in lighter clothing in winter.
https://politikak-elikatzen.bizilur.eus/en/experiences/plan-municipal-de-cambio-climatico-de-noain-valle-de-elorz/
Question-1: Air Pollution is one of the major reason for mortality among Indian population. Explain the need for policies to tackle pollution related death in the country. Answer: Air Pollution is a process of contamination of air due to the presence of substances in the atmosphere that are harmful to the health of humans and other living organisms. Different pollution related health concerns - Cancers Pollutants present in air such as lead are Known carcinogens. They can cause cancers in humans, affecting health of population. - Asthma and bronchitis Breathing related health problems such as asthma and bronchitis have grown is high proportion due to pollution in air. - Blood pressure and cardiac problems Health related studies have shown that blood pressure and cardiac problems are caused due to pollutants present in air. Sources of air Pollution - Industrial pollutants Industrial manufacturing units, coal plants, chemical manufacturing etc emit large amounts of harmful pollutants. They have the potential to create health issues. - Domestic pollutants Domestic pollutants include cooking fuels such as wood and dung cakes release harmful chemicals. Similarly, stubble burning has polluted many cities. - Vehicular pollutants India’s vehicular presence has grown manifold in recent years. Emissions from vehicles such as carbon dioxide and lead can harm health. Need for creating policies - Reduce health burden India’s disease burden has steadily grown due to rapid urbanization. Both government and private sectors are unable to handle such high burden. - Increase productivity Disease burden has had a major role in decreasing human productivity. By having a plan for addressing such concerns,overall development can be ensured. Thus, air pollution is indeed a health concern. A long term policy is the need of the hour to tackle pollution related deaths in the country.
https://www.upsciq.com/air-pollution-major-reason-mortality-indian-population/
Air pollution has been an issue. Ever since the industrial revolution, this issue has become a significant factor that aggravates the environment and the quality of our life in an exponential rate. In metropolitan cities, vehicle emissions, industrial activities and other anthropogenic sources all contribute to the deteriorating air quality. In developing countries, the keen desire for prosperity meets the weighty challenge of environmental pollution from increasing number of vehicles, coal and biomass burning etc. All of those are the makers of the "blanket" of pollutants covering the cities where we live and floating in the air that we breathe everyday. Though the role of air pollutants, with a focus of airborne particulate matters, in worsening environment and threatening public health seems evident, the current understanding of their formation and evolution, their mechanistic cause of adverse health effect and their cost-effective control technologies are still inadequate and incomplete. This is where the air pollution research kicks in to bridge the gap between the actuality and the ideality to protect our environment and public health. Source characterization: Both natural and anthropogenic activities emit particles at different extent. Understanding of the physico-chemical properties of air pollutants from individual different sources is the key to develop emission control technologies and methodologies. Atmospheric processes: Upon the emissions of air pollutants from their source, they undergo various atmospheric processes, which alter, both physically and chemically, the PM properties in the ambient, thus affecting their fate in the health end point of human exposure. Ambient PM characterization: Ambient PM are directly exposed to the environment and the public. PM in the different ambient environments, such as industrial zone, nearby freeway, indoor and outdoor, have different characterization which in turn cause differential damage to the environment and public health. PM toxicity and exposure: Exposure to the airborne PM can adversely affect the human respiratory, cardiovascular and neurological systems. The in-vitro cell exposure and in-vivo animal exposure are the key to understand the mechanisms of PM-induced adverse health outcome. My other research interests also include the development of instrumentation for PM measurement and the modeling of PM behavior in the atmosphere.
http://143.89.195.161/old/USC/index.html
Organizations don’t fundraise just to raise funds – they fundraise in order to implement programming that meets their mission. In the case of Main Street organizations, this includes having a measurable, positive and visible impact on their community and their district. This is why measuring the efficiency and effectiveness of fundraising efforts is so important. BoardSource, along with their colleagues at the Association of Fundraising Professionals, BBB Wise Giving Alliance and GuideStar, developed a new framework for evaluating fundraising effectiveness — one that provides a balanced approach that emphasizes how important it is to invest in strong and sustainable fundraising programs. It is grounded in the following principles: - A belief in the work of nonprofit organizations and the awareness that the most important measure of their effectiveness is the impact that it is having in communities and society as whole. - The knowledge that charitable support from donors and funders are what makes impact possible, which means fundraising is absolutely mission critical. - The expectation that it is reasonable for nonprofits to care about efficiency and return on investment in their fundraising efforts, but that it is not the only way of measuring fundraising effectiveness. The organizations with the most strategic and sophisticated fundraising strategies work to build a robust program that balances the risks and rewards of different fundraising tactics through a blended portfolio or strategy. They acknowledge that different fundraising tactics have different strengths and work to build a cohesive strategy that matures and grows over time. Find an overview of this new framework here, along with a free toolkit for boards and leadership teams to help calculate fundraising effectiveness.
https://virginiamainstreet.com/2019/02/20/measuring-your-organizations-fundraising-effectiveness/
Significance Little is known about the neural dynamics underlying previously reported associations of organophosphate (OP) pesticides with adverse neurodevelopment. We used functional near-infrared spectroscopy (fNIRS) to examine cortical brain activation in relation to residential proximity to OP use during pregnancy among 95 adolescents enrolled in a longitudinal birth cohort. We found that prenatal OP exposure was associated with altered brain activation during tasks of executive function. We also found sex differences for OPs and brain activation during a language comprehension task. Use of fNIRS, an inexpensive and easily accessible technology, enhances our efforts to assess the impact of environmental exposures on brain function. Abstract We have reported consistent associations of prenatal organophosphate pesticide (OP) exposure with poorer cognitive function and behavior problems in our Center for the Health Assessment of Mothers and Children of Salinas (CHAMACOS), a birth cohort of Mexican American youth in California’s agricultural Salinas Valley. However, there is little evidence on how OPs affect neural dynamics underlying associations. We used functional near-infrared spectroscopy (fNIRS) to measure cortical activation during tasks of executive function, attention, social cognition, and language comprehension in 95 adolescent CHAMACOS participants. We estimated associations of residential proximity to OP use during pregnancy with cortical activation in frontal, temporal, and parietal regions using multiple regression models, adjusting for sociodemographic characteristics. OP exposure was associated with altered brain activation during tasks of executive function. For example, with a 10-fold increase in total OP pesticide use within 1 km of maternal residence during pregnancy, there was a bilateral decrease in brain activation in the prefrontal cortex during a cognitive flexibility task (β = −4.74; 95% CI: −8.18, −1.31 and β = −4.40; 95% CI: −7.96, −0.84 for the left and right hemispheres, respectively). We also found that prenatal OP exposure was associated with sex differences in brain activation during a language comprehension task. This first functional neuroimaging study of prenatal OP exposure suggests that pesticides may impact cortical brain activation, which could underlie previously reported OP-related associations with cognitive and behavioral function. Use of fNIRS in environmental epidemiology offers a practical alternative to neuroimaging technologies and enhances our efforts to assess the impact of chemical exposures on neurodevelopment. Over 800 million pounds of pesticide active ingredients are applied in the United States each year, with organophosphates (OPs) the most commonly applied class of insecticides (1). Exposure to OP pesticides, which are endocrine-disrupting compounds (2), is widespread in the US population, including among pregnant women and children (3⇓⇓–6). The predominant route of exposure to OP pesticides is diet, including pesticide residues on fruits and vegetables (7). Individuals living in proximity to agriculture or living with individuals working in agricultural settings are also exposed to pesticides via other routes, including from residue on clothing and drift from nearby fields (8, 9). The Center for the Health Assessment of Mothers and Children of Salinas (CHAMACOS) study is a longitudinal cohort study based in California’s Salinas Valley, known as “America’s Salad Bowl” for its agricultural production. Since 1999, we have followed CHAMACOS mothers and children to investigate pesticides as they relate to childhood growth and development. We previously reported associations of children’s prenatal OP pesticide exposure, measured as dialkyl phosphate (DAP) metabolites in their mothers’ pregnancy urine samples—a matrix that primarily reflects dietary OP exposure (10)—with a number of neurodevelopmental outcomes, including poorer cognitive development, attention problems, and autistic traits such as poor social cognition (11⇓⇓–14). We have also reported that higher amounts of OP pesticides applied to agricultural crops within 1 km of mothers’ homes during pregnancy—a matrix which reflects potential pesticide drift exposure (15)—are associated with poorer intellectual development (15, 16), although not with autistic traits (14). The observed associations between prenatal OP exposure and neurobehavioral outcomes imply that OPs impact children’s brain structure and/or function. To date, the only neuroimaging study that explored this hypothesis is a volumetric MRI study conducted on 40 school-age children: 20 with high and 20 with low prenatal exposure to the OP insecticide chlorpyrifos. This study reported systematic volume differences for higher-exposed versus lower-exposed children in the brain structures summarized in the first column of Table 1 (17). In this table, we parallel these structural neuroimaging findings with domains associated with prenatal OP exposure in epidemiologic studies that have used neuropsychological testing, including CHAMACOS (11⇓–13) and other cohorts (18⇓–20) (Table 1, column 2). Table 1. Regions of interest for fNIRS study based on structures identified in an MRI study of chlorpyrifos-exposed children and epidemiologic studies of OPs and neurodevelopment To investigate OP-related effects on cortical brain activation, and to localize these effects, we conducted functional neuroimaging with a subset of 95 adolescent CHAMACOS participants using functional near-infrared spectroscopy (fNIRS), a technology well-suited to a nonclinical research environment (21) that correlates well with functional MRI (fMRI) (22, 23). Our primary objective was to examine neural activity during tasks of cognitive flexibility, working memory, attention, social cognition, and language comprehension in relation to exposure to OP pesticides applied to agricultural crops in close proximity to mothers’ homes during pregnancy. Results from this preliminary research of 95 participants form the basis for conducting neuroimaging among the full CHAMACOS cohort of ∼600 participants. Results Table 2 shows sociodemographic data for the n = 95 participants who participated in fNIRS data collection compared to those who did not (n = 214). Similar to those without fNIRS, most fNIRS participants were born to mothers who did not graduate high school (70.5%) and to families at or below the poverty level (74.7%). fNIRS participants were more likely to be born to older mothers (46.3% were age 30+ y at delivery) compared with nonparticipants (24.7%). The vast majority of fNIRS participants were right hand-dominant (93.7%) and did not report alcohol or marijuana use in the 24 h prior to their fNIRS (91.6%). Table 2. Characteristics of n = 95 participants with fNIRS data in the CHAM2 study, enrolled 2009 in Salinas Valley, California We present estimates of exposure to OP pesticides as wind-adjusted kilograms of OP pesticide use within a 1-km radius of maternal residence during pregnancy in Table 3. Diazinon use was substantially higher than any of the other individual OPs, followed by malathion. Spearman correlation coefficients between these individual pesticides ranged from moderate to high (0.19 to 0.84) (Table 3). Table 3. OP pesticide use (wind-adjusted kilograms) within a 1-km radius of maternal residence during pregnancy from the California Pesticide Use Reporting program for n = 95 participants with fNIRS data in the CHAM2 study, enrolled 2009 in Salinas Valley, California OPs and fNIRS Activation. We present associations of total OP pesticide exposure and measures of brain activation, measured with fNIRS, for the 6 tasks in Tables 4 and 5. We found that with every 10-fold increase in total OP pesticide use within a 1-km radius of maternal residence during pregnancy there was a bilateral decrease in brain activation in the inferior frontal poles of the prefrontal cortex (localization clusters 1 and 9) during the Wisconsin Card Sorting Test (covariate-adjusted but not false discovery rate [FDR]-corrected β = −4.74; 95% CI: −8.18, −1.31 and β = −4.40; 95% CI: −7.96, −0.84 for the left and right hemispheres, respectively) (Table 4 and Fig. 1). There was also slightly lower bilateral activation across other regions of the frontal, temporal, and parietal lobes during the Wisconsin Card Sorting Test. We found similar, albeit much weaker, decreases in activation in regions of the frontal lobe during the visuospatial working memory N-back task, also in the inferior frontal poles of the prefrontal cortex (β = −2.27; 95% CI: −4.82, 0.28 and β = −2.78; 95% CI: −5.58, 0.02 for the left and right hemispheres, respectively) (Table 4). In contrast to the Wisconsin and N-back task findings, we found increased activation for the Sternberg working memory task, with significantly higher activation in the left superior parietal lobe (β = 4.00; 95% CI: 0.90, 7.10) and the right posterior superior/middle temporal sulcus (β = 2.21; 95% CI: 0.03, 4.38) (Table 4). We found no strong or consistent associations of OP pesticides with brain activation during the other 3 tasks (attention/impulsivity, language comprehension, and social cognition), with effect estimates all hovering at the null (Table 5). There were no statistically significant associations after adjusting for multiple comparisons with FDR correction. In addition, effect sizes estimated with the f2 were all in the small range (<0.15). Associations were more or less the same for individual OPs (SI Appendix, Tables S1–S5). Table 4. Adjusted* associations for a 10-fold increase in of total OP pesticide use within a 1-km radius of maternal residence during pregnancy and fNIRS brain activation by task and region of interest for cognitive flexibility and working memory tasks among participants with fNIRS data in the CHAM2 study, enrolled 2009 in Salinas Valley, California Table 5. Adjusted* associations for a 10-fold increase in total OP pesticide use within a 1-km radius of maternal residence during pregnancy and fNIRS brain activation by task and region of interest for attention/impulse control, semantic language, and social cognition tasks among participants with fNIRS data in the CHAM2 study, enrolled 2009 in Salinas Valley, California Fig. 1. Regions with significant (non-FDR corrected P < 0.05) associations of total OPs with brain activation (reduced activation) during the Wisconsin Card Sorting Test for n = 95 participants of the CHAM2 study, enrolled 2009 in Salinas Valley, California. We found predominantly null associations for prenatal total OP use and performance (e.g., accuracy, errors, and reaction time) on the tasks administered with the fNIRS (SI Appendix, Table S6). The 1 exception was for Sternberg letter-retrieval working memory, where we observed that higher prenatal total OP use was associated with slightly longer reaction time (β = 0.25; 95% CI: 0.06, 0.45). When we stratified OP–fNIRS associations by task performance, we observed differences only for the Wisconsin Card Sorting Test. As shown in Table 6 and SI Appendix, Fig. S1, we found that OP–fNIRS associations were much stronger among high performers (fewer total and perseverative errors) vs. low performers. For example, for the left inferior frontal pole, brain activation was reduced by 10.84 (95% CI: −16.01, −5.66) per 10-fold increase in prenatal OP use among high performers vs. only a reduction of 1.35 (95% CI: −6.26, 3.55) among low performers (Table 6). A number of these estimates remained statistically significant after adjusting for multiple comparisons (FDR-corrected P value <0.05). We did not see a strong or consistent pattern of differences in OP–fNIRS associations across performance for any of the other fNIRS tasks (SI Appendix, Tables S7–S9). Table 6. Adjusted* associations for a 10-fold increase in total OP pesticide use within a 1-km radius of maternal residence during pregnancy and fNIRS brain activation during the Wisconsin Card Sorting Test, stratified by test performance (dichotomized at the median for perseverative errors [median = 2] and total errors [median = 24]), by region of interest for participants with fNIRS data in the CHAM2 study, enrolled 2009 in Salinas Valley, California Sex Differences. When we stratified OP use and fNIRS associations by child sex, we found the strongest sex differences for the Pyramids and Palm Trees (semantic language) task (Table 7). Total OP use was associated with increased activation in males and reduced activation in females across nearly all of the 15 localization clusters (P value for sex interaction was <0.05 for 7 of the 15 clusters and <0.20 for all but 1 cluster) but was particularly marked for the frontal and temporal regions. There were a few suggestive (though many were not statistically significant) patterns across cognitive flexibility/working memory tasks (SI Appendix, Table S10) and no notable sex differences for the Go/No-Go and Dynamic Social Gestures tasks (SI Appendix, Table S11). Table 7. Sex-specific adjusted* associations of total OP pesticide use within a 1-km radius of maternal residence during pregnancy and fNIRS brain activation by region of interest for Pyramids and Palm Trees (semantic language) among participants with fNIRS data in the CHAM2 study, enrolled 2009 in Salinas Valley, California Sensitivity Analyses. We did not see any material differences in total OP use and fNIRS associations when we restricted our sample to right-handed individuals, those that reported no substance use in the previous 24 h, or individuals whose mothers did not move during the pregnancy. Estimates were also unchanged when we adjusted our models for family poverty level. Discussion Most of the previous epidemiologic evidence for associations of prenatal OP pesticide exposure with neurodevelopment comes from studies that employ neuropsychological testing or behavioral rating scales administered to the parent, teacher, or the individual. While these assessments are critical for identifying the impact of pesticides on cognitive and behavioral function, they provide limited information on the brain structures or neural functions targeted by these exposures. In the current study, we took a first step toward examining the impact of prenatal OP pesticide exposure on brain activation as measured with fNIRS, a convenient and cost-effective neuroimaging technique. We found several noteworthy associations in this preliminary study of 95 participants. Our most salient finding was that prenatal OP exposure was associated with altered brain activation patterns during tasks of executive function, including cognitive flexibility and working memory. We also found strong sex differences in prenatal OP and brain activation associations during a language comprehension task. However, we did not observe any consistent associations of prenatal OPs with brain activation during tasks of attention/response inhibition or social cognition. Only 1 published study of 40 children aged 6 to 12 y examined the influence of prenatal pesticide exposure on brain structure using volumetric MRI (17). This study reported associations of exposure to the OP chlorpyrifos with reduced cortical thickness of frontal, temporal, and parietal regions using MRI (Table 1). In addition, 2 studies have examined functional neuroimaging in children in relation to other early life environmental exposures. Higher childhood blood lead levels among 42 young adults in the Cincinnati Lead Study were linked with reduced activation on fMRI in left hemisphere regions associated with semantic language during a language task (left frontal gyrus and left middle temporal gyrus) and increased activation in the right hemisphere regions (Wernicke’s area) (24). A study in a subset of 12 adolescent boys in the Faroe Islands birth cohort showed that adolescents with higher prenatal exposure to methylmercury and polychlorinated biphenyls had greater brain activation during tasks requiring visual processing (photic stimulation) and manual motor movement (finger tapping) than those with lower exposure (25). This growing body of neuroimaging literature complements studies of environmental exposures and neurodevelopment by identifying the neural underpinnings of previously observed associations with cognitive and behavioral function. These neuroimaging studies may also detect subtle exposure-induced impacts on neural structure and function that could be missed in traditional studies of neuropsychological assessment due to compensatory mechanisms and brain plasticity. We found both an increase and decrease in brain activation in association with prenatal OPs during tests of executive function. We observed a negative association (i.e., lower relative activation) during tests of cognitive flexibility (Wisconsin Card Sorting Test) and visuospatial working memory (N-back) in relation to OP exposure that were most pronounced in the inferior frontal poles. We also observed a positive association (i.e., greater relative activation) during a test of letter-retrieval working memory (Sternberg) with higher OP exposure, though in different brain regions–primarily the left parietal lobule and right temporal/parietal regions. The inconsistent directions of these associations, aside from their emergence in different regions of the brain, could be explained by the variable cognitive demands of these tasks. For example, higher activation with increased exposure could indicate an increase in recruitment of neural resources to effectively meet the demands of a straightforward working memory task (Sternberg), as has been observed in older persons with beta-amyloid deposition (26⇓–28). Reduced activation, on the other hand, could indicate that exposure has altered the overall neural response, including the ability of a region or network to marshal a typical response to a task, particularly one with higher complexity (e.g., Wisconsin Card Sorting Test). Similar findings have also been observed in cognitively impaired neurogenetic groups previously assessed with fMRI (29, 30). We previously reported associations of working memory with nonspecific OPs measured via urinary DAP metabolites during pregnancy, where a 10-fold increase in DAPs was associated with reduced age 7 y Wechsler Intelligence Scale for Children, fourth edition (WISC-IV) working memory subtest scores of 4.3 points (95% CI: −7.7 to −0.9) (11). This is consistent with associations with poorer working memory found in associations with cord blood chlorpyrifos, a single OP pesticide, in the Columbia Center for Children's Environmental Health (20). More relevant to our current findings, we also found associations of OP use within a 1-km radius of maternal residence during pregnancy (estimated using Pesticide Use Reporting [PUR] data) and poorer age 10 y WISC-IV working memory in CHAMACOS (working memory scores decreased by 2.8 points [95% CI: −5.6, −0.1] for the fourth vs. first quartile of pesticide use) (16). Notably, the latter associations were independent of our prenatal DAP metabolite associations. In contrast with our previous OP–working memory findings (11, 16), we did not detect associations of prenatal OP use with performance (e.g., errors, accuracy, and reaction time) on any of the working memory or executive function tasks administered with the fNIRS. This could be explained by our smaller sample size, or the differences between these experimental tasks, optimized for fNIRS testing, and standardized neuropsychological tests. Notably, while there was insufficient sensitivity to detect associations of OPs with task performance, we did observe associations with brain activation. This underscores the potential for neuroimaging to detect very subtle impacts of pesticide exposure on the brain. We found strong sex differences for prenatal OPs and brain activation during a semantic language task (Pyramids and Palm Trees); increased OP exposure was associated with higher activation among males and lower activation among females across nearly all brain regions assessed. We previously reported associations of prenatal urinary OP metabolites with lower age 7 y WISC-IV verbal comprehension scores in CHAMACOS (β = −5.3; 95% CI:−8.6,−2.0 per 10-fold increase in DAPs) (11); associations were similar for PUR OP use within a 1-km radius of maternal residence during pregnancy (β = −2.9; 95% CI: −4.4, −1.3 for an SD increase in OP pesticide use) (16). However, we did not report sex differences for any of these associations, nor did the Columbia study, which also reported main effects with verbal comprehension (20). Previous studies show sexual dimorphism in brain activation when engaged in semantic language processing tasks (31⇓–33). In addition, there is rationale for differences in the impact of endocrine-disrupting chemicals like OP pesticides among males and females (34). However, there was no a priori reason to expect that associations of OPs with brain activation during a semantic language task would be different across child sex. These findings should therefore be interpreted with caution and replicated in larger study samples. We did not detect any strong or consistent associations of prenatal OP exposure with alterations in brain activation during tasks of attention/response inhibition (Go/No-Go task) and social cognition (Dynamic Social Gestures task), despite our previous findings that higher prenatal DAPs were associated with poorer attention and social cognition (including traits related to autism spectrum disorders) in CHAMACOS (12⇓–14). Inconsistent with DAPs, but perhaps more consistent with the current findings, we reported null associations of PUR-estimated OPs with social cognition (14). This could be due to different exposure routes (DAPs are predominantly from diet, vs. PUR estimates which represent ambient exposure). In addition, since PUR-estimated OP exposure does not consider exposures that may have occurred through diet, agricultural work, or home pesticide use, this measure may underestimate exposure or lead to exposure measurement error that may have attenuated findings, reducing our ability to detect associations of OPs with brain activation. Nonetheless, PUR-estimated exposure is well correlated with environmental pesticide concentrations (8) and has been linked with intelligence quotient at age 7 y in CHAMACOS (15). There were other notable limitations of our study. First, fNIRS measures activity at the cortical surface and therefore cannot detect hemodynamic changes in subcortical, deep-brain regions where OP exposure may exert an effect. Second, our sample size, while large for a neuroimaging study, which typically measures brain activation in a case group with a specific disorder vs. a control group, was modest for a study examining sometimes very subtle effects of environmental toxicant exposures. This may have limited our ability to detect OP-related associations with precision. Third, we took a rather crude approach to controlling for test performance in our OPs–brain activation findings. Adjusting for performance in our multivariable models was inappropriate as performance could be affected by OP exposure and by brain activation, and conditioning on a common effect of both exposure and outcome could induce bias in effect estimates (35). The same problem could be present in our stratified analysis (high vs. low performers), in addition to the problem of small numbers in our strata which reduced the precision of our estimates. We therefore interpret these results with caution and continue to explore methods for appropriately accounting for test performance when examining associations of exposures with brain activation. Finally, due to the large number of tasks (6), localization clusters (15), and OP exposure measures (6, including total OPs) as well as many other comparisons, multiple testing is certainly a concern when interpreting these data. When we applied an FDR correction, we found no statistically significant associations, likely due to our small sample size, but also because FDR correction is an extremely conservative approach to adjusting for multiple comparisons. We therefore interpret our non-FDR-corrected estimates with caution, not highlighting any isolated findings but rather focusing on patterns of associations. Conclusions In summary, we found that prenatal OP exposure was associated with altered brain activation patterns during tasks of executive function and sex-specific activation patterns for language comprehension in this population-based CHAMACOS study. This study of prenatal OP exposure and brain activation in humans suggests that OPs may be impacting cognitive function at the neural level. We anticipate that this work will pave the way for more widespread use of neuroimaging, and more specifically fNIRS, a relatively inexpensive and easily accessible technology, in assessing the impact of a range of environmental exposures on brain function. Methods Study Sample and Recruitment for Functional Neuroimaging Study. We recruited youth who participated in the present study into the CHAMACOS cohort in years 2009 to 2011, when they were 9 y old. This constituted the second wave of enrollment to the CHAMACOS study (“CHAMACOS 2” or “CHAM2” enrollment), which was intended to augment the existing (“CHAM1”) portion of the cohort enrolled prenatally, with additional, demographically similar children. Children were eligible for CHAM2 enrollment if they were 1) born in 2000 to 2002 to mothers who were Spanish- or English-speaking, 2) had lived in the Salinas Valley during pregnancy and still resided there at child age 9 y, 3) were MediCal-eligible during pregnancy, 4) had received prenatal care, and 5) were at least 18 y old at time of delivery. We recruited eligible families through elementary schools, libraries, churches, food banks, and outreach at community events. In total, we enrolled 305 children in the CHAM2 portion of the cohort, of whom 288 completed study visits 5 y later (2014 to 2016) at age 14 y. In 2017, we recruited a subset of participants for this preliminary fNIRS study from among these 288 active CHAM2 participants. Our target number of participants for this preliminary study was between 80 and 100. To optimize the precision of our pesticide exposure measure, which is based on the primary residential address during pregnancy as reported by the mother at child age 9 y, we recruited youth whose mothers 1) had provided a mappable (i.e., valid) primary pregnancy address at the age 9 y visit and 2) had reported living at the same address for the majority of their pregnancy (of the 95 participants in this study, 86 reported that they did not move during their pregnancy; the 9 mothers who did move spent a median of 87% of their pregnancy at the primary address). We recruited eligible participants primarily by phone, although some who were due for a routine 16-y study visit during the data collection period were invited to participate when they attended that visit. In all cases, our research field coordinator first described the fNIRS study visit to the parent of the youth and then requested permission to describe the visit to the youth. The most common reason for nonparticipation was that the participant had a disconnected phone line or lived out of town; other reasons included refusal (n = 7 youth or their mothers refused to participate) and house arrest (n = 2). When both parent and youth were in agreement that the youth could participate, we scheduled an fNIRS study visit. Parents provided written permission and youth (ages 15 to 16 y) provided written assent to participate. All research activities were approved by the Office for the Protection of Human Subjects at University of California, Berkeley. We ultimately completed a full fNIRS visit with 95 youth. Functional Neuroimaging Data Collection. We measured cortical neural activation using fNIRS, a method of optical neuroimaging which characterizes hemodynamic changes at the brain’s surface (i.e., just beneath the scalp) in a priori-identified regions of the brain. Specifically, we employed the NIRScout (NIRx Medical Technologies), a versatile neuroimaging platform that allows customization of optode placement to target activity in specific regions of the brain. We positioned the optodes over standard 10 to 20 system locations using individually sized caps (Brain Products) selected based on head circumference. The 10 to 20 locations were spatially adjusted across all cap sizes to maintain consistent coverage of our regions of interest despite changes in head size across participants (36, 37). Consistent 3-cm channel distance was achieved using plastic supports between each source/detector pair that constituted a recording channel. We synchronized our fNIRS data collection with a computerized neurobehavioral test battery, monitoring hemodynamic changes in response to specific stimuli and tasks. At the start of the visit, trained study staff measured participant head size, selected an appropriately sized cap, placed it on a mannequin, and fit 28 optodes (16 sources and 12 detectors) on the cap in a set configuration (Figs. 2 and 3), designed to optimize coverage of brain structures in the frontal, temporal, and parietal lobes. Fig. 3 shows source and detector locations on the scalp and Fig. 2 shows the channel locations (visualized as the midpoint between each source and detector pair) as well as the functional localization clusters (described later). We selected these regions (Table 1, column 3) based on the previous neuroimaging study of prenatal OP exposure (20) (Table 1, column 1) as well as epidemiologic studies of prenatal OP exposure and neurobehavioral outcomes (11⇓–13, 18, 19) (Table 1, column 2). Prior to placement of the cap on the participant’s head, we asked participants to complete a brief survey (Covariate Data Collection). Staff also presented a PowerPoint-based visual practice session of each neurobehavioral task along with instructions on how to complete it. Staff then placed the optode-fitted cap on the participant’s head, performed calibration tests, and adjusted optodes as needed. Fig. 2. fNIRS channel (n = 36) locations and functional localization clusters (n = 15) in the CHAM2 study, enrolled 2009 in Salinas Valley, California. Red circles represent channel locations visualized as the midpoint between each source and detector pair. Yellow circles are clusters based on proximity of channels and anatomy, and include 1 = left inferior frontal pole; 2 = left superior frontal pole; 3 = left Broca’s/Brodmann areas 44 and 45; 4 = left dorsolateral prefrontal cortex; 5 = left Broca’s/Brodmann areas 44 and 6; 6 = left superior/inferior temporal gyrus/postcentral gyrus; 7 = left inferior parietal lobule; 8 = left superior parietal lobule; 9 = right inferior frontal pole; 10 = right Broca’s/Brodmann areas 44 and 45; 11 = right superior frontal pole/dorsolateral prefrontal cortex; 12 = right premotor/somatosensory cortex; 13 = right posterior superior/middle temporal sulcus; 14 = right inferior parietal lobule; 15 = right superior parietal lobule. Fig. 3. Source and detector locations on the scalp. Sources (16) are shown in red and detectors (12) in blue. Orange dots indicate 10 to 20 positions and purple lines indicate measurement channels. Semitransparent scalp surface rendering is shown on top of an opaque brain surface. All source and detector positions were based on a major 10 to 20 landmark. Plastic supports were used to maintain a consistent 3-cm channel distance between each source/detector pair that constituted a recording channel. Participants engaged in 6 tasks that assess neurobehavioral functions previously linked with prenatal OP exposure in epidemiologic studies, including attention, working memory, cognitive flexibility, response inhibition, social cognition, and language comprehension. We generated all tasks using code written in-house for Psychtoolbox-3 Psychophysics Toolbox Version 3 in MATLAB 2014b, with trial order and timing optimized to maximize detectable changes in hemodynamic response using OptSeq2 (38). Tasks were presented on a MacBook Pro connected to a 20-inch light-emitting diode monitor. We collected hemodynamic activity data, including oxygenated hemoglobin (HbO) and deoxygenated hemoglobin (HbR), with a sampling frequency of 3.9063 Hz from 36 channels, grouped into 15 functional localization clusters on both the right and left hemispheres, including 9 clusters in the prefrontal cortex, 2 in the temporal, and 4 in the parietal regions (Fig. 3). To avoid bias associated with test fatigue, we presented the 6 tasks in a randomized order across 2 testing sessions (3 tasks in each session with a break in between). The 1 exception was the Go/No-Go, a test of attention and vigilance, which was always presented at the end of 1 of the 2 testing sessions. The tasks included 1) the Wisconsin Card Sorting Test, a test of cognitive flexibility and executive function where the participant matches cards based on an unstated rule (shape, number, or color); 2) the Sternberg working memory task, a test of letter-retrieval working memory where the participant is asked to recall if a presented letter was in a previously viewed string of 7 to 8 letters; 3) the Visuospatial N-back, a test of visuospatial working memory where the participant is instructed to respond if a stimulus is presented in the same location as the previous trial (1-back) or 2 trials previous (2-back); 4) the Go/No-Go, a test of attention and response inhibition where the participant is instructed to press a button when any letter other than “X” appears (i.e., Go trials) and withhold a button press when “X” is shown (i.e., No-Go trials); 5) Pyramids and Palm Trees, a test of verbal comprehension where the participant decides which of 2 words is semantically related to a stimulus word; and 6) the Dynamic Social Gestures task, an implicit test of social cognition, where the participant views video clips portraying social gestures (e.g., friendly wave) and nonsocial gestures (e.g., looking at a book). We provide more comprehensive task descriptions in SI Appendix. We assessed patterns of brain activation for each task of interest using a generalized linear model (GLM) approach, which has been well established for analysis of event-related as well as blocked fNIRS designs (39). The onset and duration of each condition of interest were submitted to the GLM procedure as predictor variables used to estimate standardized β coefficients for each condition and within each channel. The sign and magnitude of each β coefficient provides an indicator of the direction (positive/negative) and intensity of blood oxygen level-dependent change (i.e., brain activity) that occurs during each condition. We estimated β coefficients for all task and control conditions (we describe control conditions in SI Appendix). In order to capture the brain activation unique to the task demands, and thus not expected to be present in signals corresponding to the control conditions, we made contrasts between each β coefficient and its corresponding control. We included data from all trials in the GLM, with the exception of the Wisconsin Card Sorting task, in which we only included data collected for correct responses (6 times in a row, the number required to reach criteria). We utilized a functional localization approach (40⇓–42) to account for variation in cortical activation in response to our tasks. This procedure allows for minor individual variation in the location of task-responsive brain regions across participants and reduces the risk of committing type II (i.e., false negative) errors due to averaging across nonresponsive channels. We grouped channels based on proximity and anatomical location (Fig. 2) to create 15 clusters. Within each of the 15 functional localization clusters (42), we selected the channel with the greatest contrast value. Technical problems with data collection as well as data cleaning (see SI Appendix for details) led to some exclusions that reduced our sample sizes; these exclusions varied across tasks and localization clusters. OP Pesticide Exposure Assessment. We quantified ambient, prenatal exposure to agricultural pesticides by linking the latitude and longitude coordinates of mothers’ self-reported (at child age 9 y) primary pregnancy address with California’s unique PUR database (43). The PUR database, compiled by California’s Department of Pesticide Regulation, contains geocoded location (in square-mile sections) and date-stamped records with the amount of active ingredients used for every commercial agricultural pesticide application in the state dating back to 1990 (43). We estimated the amount (kilograms) of agricultural OP pesticide use within a 1-km buffer distance of the pregnancy address and weighted pesticide use based on the amount of time the residence was downwind of the applications using wind direction data. We selected a 1-km buffer distance for this analysis because it best captures the spatial scale most strongly correlated with measured agricultural pesticide concentrations in house dust samples (8, 44). We replaced PUR data outliers with unusually high application rates (>2 SD above the mean application rate), that were likely data entry errors, with the median application rate for that pesticide and crop combination (44). We examined exposure to the 5 most common OP pesticides (acephate, chlorpyrifos, diazinon, malathion, and oxydemeton-methyl) and the sum of all OP pesticides used in the region (15 total) (15). Note that because the participants in CHAM2 did not join the CHAMACOS study until age 9 y we do not have prenatal biomarker of their pesticide exposure, such as urinary DAPs. Covariate Data Collection. We obtained sociodemographic data from in-person maternal interviews at all visits between enrollment and child age 14 y. We administered the Home Observation for the Measurement of the Environment-Short Form (HOME-SF) (45) to assess the home learning environment when the child was 10.5 y of age. In addition, just before fNIRS testing, youth completed a brief, self-administered, tablet-based survey regarding their handedness and other factors that could affect their performance. This included recent intake of nicotine, alcohol, marijuana, medications, and caffeine; how well they had slept the night before testing; whether or not they had eaten that morning; and their self-assessed levels of sleepiness and mental fatigue. Statistical Analysis. We used 1-sample t tests to determine whether there was significant brain activation (increased HbO and decreased HbR) in each localization cluster for each task contrast of interest. Although we used HbO for all subsequent analysis, localization based on both HbO and HbR ensured we were ascertaining valid activations and taking advantage of the full scope of the fNIRS data. Contrast conditions included maintenance/encoding vs. recall for the Sternberg working memory task; semantic meaning vs. control condition for the Pyramids and Palm Trees task; card sort vs. control for the Wisconsin Card Sorting Test; No-Go vs. Go for the Go/No-Go task; 2-back vs. 1-back vs. control, parametrically analyzed, for the N-back; and social vs. nonsocial gestures for the Dynamic Social Gesture task. We fit linear regression models to estimate associations (β and 95% CI) of log 10 -transformed OP pesticide exposure with brain activation; β coefficients represented the change in brain activity during a challenge vs. control task per 10-fold increase in exposure. In this preliminary study of n = 95, we primarily examined associations without correcting for multiple comparisons. In secondary analysis, to account for multiple comparisons, we controlled for type I error using the Benjamini–Hochberg FDR at <0.05 (46). We tested for linearity of the exposure–outcome associations using generalized additive models with 3 degrees of freedom cubic splines. Since linearity was justified across most associations, we present the results of our linear regression models. We selected covariates to adjust for in multivariable regression models a priori using a causal model framework (47) (refer to SI Appendix, Fig. S2 for a directed acyclic graph). We adjusted for age of child at assessment (continuous variable), child’s sex, maternal age at delivery (continuous), maternal education at delivery (<sixth grade, 7th to 12th grade, completed high school), and quality of the home environment at the 10.5-y visit (continuous HOME score, standardized within our sample using z-scores). When available, we used data from earlier time points to replace missing covariate data. To facilitate comparison of effect size measures from these multilevel models across other studies, we computed the proportion of variance explained by the given effect (R2 2 ) relative to the proportion of outcome variance unexplained (R2 1 ) f2 = (R2 2 − R2 1 )/(1 − R2 2 ) (48), where a value of 0.02 is considered a small effect, 0.15 a medium effect, and 0.35 a large effect (49). In addition to estimating associations of OPs with brain activation on the fNIRS, we also examined associations of total OPs with task performance, including, where applicable, errors, accuracy, and reaction time. We also examined total OPs and brain activation associations across test performance by dichotomizing performance at the median score for each task and estimating OP-fNIRS associations for those who performed above and below the median. We did not examine task performance for Dynamic Social Gestures. The performance aspect of this task (pressing a button when a red dot appeared on the screen) was to ensure that the participant was attending to the task so that we could record their neural response to a social vs. nonsocial gesture; performance accuracy therefore did not reflect social cognition. We examined effect modification by sex by including an interaction term between OP exposure and sex in the multivariable linear regression models and computing sex-specific effect estimates. We conducted the following sensitivity analyses to examine how robust findings were to the following adjustments: 1) restricted to right-handed individuals (n = 6 were left-handed); 2) restricted to those who reported no substance use (alcohol or marijuana) in the previous 24 h (n = 8 reported substance use); 3) restricted to individuals whose mothers did not move during the pregnancy (n = 9 moved during their pregnancy); and 4) adjusting for family poverty level. Acknowledgments We thank the CHAMACOS and Center for Interdisciplinary Brain Sciences Research staff and students, whose work allowed us to develop and implement this study, with special thanks to volunteer Vivian Wan. We also thank the CHAMACOS youth who volunteered their time to participate. This work was supported by NIH grants UG3 OD023356, P01 ES009605, R01 ES015572, T32 MH019908, K99 HD092883, and K99 HD092883; grants RD 83171001 and RD 83451301 from the US Environmental Protection Agency (EPA); the Stanford Maternal and Child Health Institute; and a gift from the Albert Yu and Mary Bechmann Foundation. The contents of this publication are solely the authors’ responsibility and do not necessarily represent the official views of the National Institute of Environmental Health Sciences, NIH, or EPA. Footnotes Author contributions: S.K.S., J.L.B., J.M.B., R.G., A.L.R., and B.E. designed research; S.K.S., V.P., K.K., R.G., and A.M.M. performed research; J.L.B., J.M.B., and R.G. contributed new reagents/analytic tools; S.K.S., J.L.B., J.M.B., V.P., and S.R. analyzed data; and S.K.S., J.L.B., and J.M.B. wrote the paper. The authors declare no conflict of interest. This article is a PNAS Direct Submission. This article contains supporting information online at www.pnas.org/lookup/suppl/doi:10.1073/pnas.1903940116/-/DCSupplemental.
Interview with Colette Chrétien of La Fille Colette Our team sat down with Colette Chrétien the founder and designer of La Fille Colette, a Boston based fashion brand. La Fille Colette is very proud to be made in the United States and prioritizes socially and environmentally responsible practices. We obviously had many questions related to their beginnings, the inspiration behind the brand and their future plans. Read on if you want to learn more. Luevo: How did you start your design journey? CC: I’ve been designing for as long as I can remember. I used to love drawing princess dresses when I was very young. In high school, I started to sew what I was designing, and once I started I couldn’t stop. I felt I had to make an original dress for each big event that was coming up. I generally procrastinated on these projects and remember finishing sewing my Prom dress after friends had started to arrive at my house to take Prom pictures. Luevo: What is your favourite thing about being a designer? What path would you have followed, had you not become a designer? CC: My favorite thing about being a designer is getting the opportunity to be doing what I love for a career, and not just as a hobby on the side. When I was younger, before I fell in love with designing clothes, I wanted to act, so perhaps I would be in New York or LA waitressing and going on auditions. I think I would make a fairly good actor, but a terrible waitress. Luevo: What do you think has helped you most with your designing to date? CC: Being a woman and having the kind of body I am designing for helps me immensely. I think that sometimes male womenswear designers believe women only want fantasy in fashion. Women want a touch of fantasy, but in clothing that they can comfortably sit down in at a desk all day or run to catch the train in. Luevo: What obstacles have you had to face and overcome to get where you are today? CC: The biggest obstacle for me has been starting a business from scratch. I have no formal training or experience in managing a company. When I started, I knew how to design and make dresses, and I have taught myself the rest along the way. Wearing so many hats is challenging, but it is also one of the most rewarding aspects of running a business. Luevo: What inspirations did you draw on to create your latest collection? CC: I looked to the works of Victor Vasarely and the op art movement for the graphic, geometric elements and contrasting color combinations. Luevo: How would you describe your process of inspiration? What do you do to keep your ideas fresh and interesting? CC: Inspiration strikes me the most when I am lying in bed about to fall asleep. This is the time designs will often come to me fully formed and the best time for me to really think through a design and work out the kinks. I think for a designer or anyone creating any kind of visual art, it’s important to get out of the house or office as much as possible and be surrounded by new sites. I also love to collect and flip through art and fashion books full of beautiful and inspiring photography Luevo: If you could describe your new collection with one word, what would it be and why? What would you say the overall theme of this collection would be? CC: Versatility. I wanted this collection to be about getting a lot of mileage out of each piece. It was very important to me to design exciting clothes that women really want to wear, while still producing pieces that are easy to wear, and can be worn to a variety of events, and styled in a variety of ways. Luevo: When will your latest collection be available online? CC: My Fall/Winter 2015 collection will be available on my website, for pre-order July 15 and for immediate purchase by the end of August. If you want to learn more about La Fille Colette, you can visit their website, Facebook, Twitter and Instagram.
https://www.luevo.com/interview-with-colette-chretien-of-la-fille-colette/
Introduction {#S1} ============ Nucleotide-binding site (NBS)-encoding genes are the largest type (∼80%) of disease resistance genes (*R* genes) found in plants and are responsible for the protection against various pathogens ([@B33]; [@B12]). A typical NBS-encoding gene consists of a variable domain at the N-terminal, a highly conserved NBS domain in the middle, and a diverse leucine-rich repeat (LRR) domain at the C-terminal. Therefore, according to the structure of N-terminal domains that possess a coiled-coil (CC), *Drosophila* toll and mammalian interleukin-1 receptor-like (TIR), or resistance to powdery mildew8 (RPW8) domain, NBS-encoding genes can be classified into three subclasses: CC-NBS-LRR (CNL), TIR-NBS-LRR (TNL), and RPW8-NBS-LRR (RNL) ([@B40]; [@B49], [@B48], [@B47]; [@B66], [@B65]; [@B46]; [@B58]). As an example of function, the CNL gene, *RPP8*, in *Arabidopsis thaliana* provides resistance against downy mildew after *Peronospora parasiticia* infection ([@B36]). Another CNL gene, *Pik*, confers resistance to rice blast caused by *Magnaporthe grisea* infection ([@B62]). The tobacco TNL gene, *N*, prevents tobacco mosaic virus invasion ([@B56]). Functionally, CNL and TNL genes act as detectors that recognize specific pathogen effectors encoded by avirulence genes and initiate downstream hypersensitive reactions in the resistance pathway ([@B13]; [@B37]), while RNL genes appear to function downstream and transduce signals from CNL or TNL genes through interactions with corresponding partners ([@B7]; [@B10]; [@B51]). Therefore, NBS-encoding *R* genes are of great importance to plant growth and would tangibly benefit humankind if properly used in disease resistance breeding. NBS-encoding genes constitute a large gene family found in plant genomes. With the accumulation of more plant whole-genome sequences, genome-wide evolutionary analyses of NBS-encoding genes have been performed in many plants since the first comprehensive study on NBS-encoding genes in *A. thaliana* ([@B40]). Furthermore, comparative genomic studies on the NBS-encoding gene family have been performed among a few closely related plant species, which exhibited different evolutionary patterns. For example, frequent gene losses and limited gene duplications resulted in small number of NBS-encoding genes in three Cucurbitaceae species ([@B30]). Both [@B29] and [@B35] investigated the NBS-encoding genes in four Poaceae species, including rice, maize, sorghum, and brachypodium, which exhibited a "contraction" evolutionary pattern and may have been caused by gene losses or frequent gene deletions and translocations. Similar analyses were performed on Fabaceae, Rosaceae, and Brassicaceae species, of which Fabaceae and Rosaceae species exhibited a "consistent expansion" evolutionary pattern ([@B49]; [@B19]), while five Brassicaceae species exhibited a "first expansion and then contraction" evolutionary pattern ([@B66]). Moreover, although plants belonged to the same family, the evolutionary patterns of NBS-encoding genes were also diverse. For example, in three Solanaceae crop species, pepper exhibited a "contraction" pattern, tomato showed a "first expansion and then contraction" pattern, and potato presented a "consistent expansion" pattern ([@B46]). In four orchid species, *Phalaenopsis equestris* and *Dendrobium catenatum* exhibited an "early contraction to recent expansion" evolutionary pattern, while *Gastrodia elata* and *Apostasia shenzhenica* showed a "contraction" evolutionary pattern ([@B58]). Recently, a large scale analysis of the NBS-encoding genes in 22 representative angiosperms demonstrated that CNL genes exhibited a "gradual expansion" evolutionary pattern during the first 100 million years of angiosperm evolution, then underwent intense expansion along with TNL genes, which corresponded with the explosion of fungal diversity ([@B48]). The soapberry family (Sapindaceae) consists of 135 genera and ∼1500 species, which is comprised mostly of trees or shrubs and some herbaceous climbers, which are widely distributed throughout the tropics and subtropics, especially in Southeastern Asia (Flora of China^[1](#footnote1){ref-type="fn"}^). Sapindaceae species possess many great economic uses. For example, the seed kernels of Yellowhorn (*Xanthoceras sorbifolium*), a major woody oil plant species, contains as much as 67% oil ([@B53]), and extractions from its husks improve learning and memory that could be used to treat Alzheimer's disease ([@B17]; [@B64]). Longan (*Dinnocarpus longan*), an important evergreen fruit tree, is mainly grown in Southern China and serves as a source of traditional medicine and timber ([@B9]; [@B38]). *Acer yangbiense* is a charismatic landscape plant that possesses a colorful foliage is a newly described critically endangered endemic maple tree found in Southwestern China ([@B8]), and it possesses many bioactive compounds ([@B6]; [@B59]). Recently, the high-quality genome sequences of *X. sorbifolium*, *D. longan*, and *A. yangbiense* were made available and all recovered \>94% complete BUSCO genes by BUSCO analysis ([@B31]; [@B5]; [@B59]). An analysis of the NBS-encoding genes in *D. longan* was performed, and researchers found high number and recent expansions/contractions of these genes that may be attributed to the genomic basis for insect, fungus, and bacteria resistance ([@B31]). However, these findings require further elucidation of this phenomenon caused by gene duplication/loss events. Additionally, the systematic evaluation and comparison of NBS-encoding genes at the genome level in more Sapindaceae species is needed to obtain a better understanding of this family's molecular evolutionary history. In this study, *X. sorbifolium*, *D. longan*, and *A. yangbiense* genome sequence data were utilized to perform comparative genomic analyses in order to uncover the evolutionary features and patterns of NBS-encoding genes in the Sapindaceae family, as well as further investigate the mechanisms of these evolutionary changes. Materials and Methods {#S2} ===================== Identification and Classification of the NBS-Encoding Genes {#S2.SS1} ----------------------------------------------------------- The whole genomes of the *X. sorbifolium*, *D. longan*, and *A. yangbiense* were used in this study ([Supplementary Figure S1](#FS1){ref-type="supplementary-material"}). Genomic sequences and annotation files were obtained from the GigaScience database (*X. sorbifolium*^[2](#footnote2){ref-type="fn"}^, [@B5]; *D. longan*^[3](#footnote3){ref-type="fn"}^, [@B31]; *A. yangbiense*^[4](#footnote4){ref-type="fn"}^, [@B59]). The method for NBS-encoding gene identification was described in a previous study ([@B48]). Briefly, BLAST and hidden Markov model (HMM) searches were simultaneously conducted using the NB-ARC domain (Pfam accession No.: [PF00931](PF00931)) as the query sequence to identify candidate NBS-encoding genes in the three genomes. The threshold expectation value was set to 1.0 for the BLAST search. For the HMM search^[5](#footnote5){ref-type="fn"}^, default settings were used. Then, the identified candidate sequences were merged and the redundant hits were removed. In order to confirm the presence of the NBS domain, the remaining sequence hits were subjected to online Pfam analysis^[6](#footnote6){ref-type="fn"}^ with an E-value of 10^--4^. All of the identified NBS-encoding genes were subjected to NCBI's conserved domain database^[7](#footnote7){ref-type="fn"}^ using the default settings to determine whether they encoded CC, TIR, RPW8, or LRR domains. Chromosomal Distribution and Cluster Arrangement of Identified NBS-Encoding Genes {#S2.SS2} --------------------------------------------------------------------------------- The chromosomal locations of all identified NBS-encoding genes in Sapindaceae genomes were determined by retrieving relevant information from the downloaded gff files. Gene cluster was determined according to the criterion used for *Medicago truncatula* ([@B1]): if two neighboring NBS-encoding genes were located within 250 kb on a chromosome, these two genes were regarded as members of the same gene cluster. Based on this criterion, the NBS-encoding genes in Sapindaceae genomes were assigned to clustered loci and singleton loci, which were mapped along the chromosomes. Sequence Alignment and Conserved Motif Analysis of the NBS Domain {#S2.SS3} ----------------------------------------------------------------- Amino acid sequences of the NBS domain were extracted from the identified NBS-encoding genes and used for multiple alignments using ClustalW integrated in MEGA 7.0 using the default settings ([@B23]). Sequences that were too short (\<190 amino acids, less than two-thirds of a regular NBS domain) or too divergent were removed to prevent interference with the alignments and subsequent phylogenetic analysis. The resulting alignments were manually corrected and improved using MEGA 7.0. The conserved protein motifs within the NBS domain of the three subclasses of NBS-encoding genes were analyzed by Multiple Expectation Maximization for Motif Elicitation (MEME) and WebLogo using the default settings ([@B11]; [@B3]). Additionally, structural motif annotation was performed using the Pfam analysis^[8](#footnote8){ref-type="fn"}^ and SMART tools^[9](#footnote9){ref-type="fn"}^. Phylogenetic and Gene Loss/Duplication Analysis of the NBS-Encoding Genes {#S2.SS4} ------------------------------------------------------------------------- To explore the relationships of NBS-encoding genes in the three Sapindaceae genomes, a phylogenetic tree was constructed based on the amino acid sequences of the conserved NBS domain using the NBS-encoding genes of *A. thaliana* as a reference. The NBS-encoding genes of *A. thaliana* were identified using the same method, and these NBS-encoding genes were also used in a previous study ([@B63]). Amino acid sequences were aligned as described above. The phylogenetic tree was constructed using IQ-TREE and the maximum likelihood method based on the best-fit model estimated by ModelFinder ([@B45]; [@B20]); branch support values were assessed using UFBoot2 tests ([@B42]). The short or divergent sequences that were removed from the phylogenetic analyses were BLASTp searched against all of the identified NBS genes to identify their potential phylogenetic positions by identifying their closest relatives. Additionally, in order to identify the gene duplication/loss events during the speciation of the three Sapindaceae species, the NBS-encoding gene phylogenetic tree was reconciled with the real species tree using Notung software ([@B50]). The NBS-encoding genes on the tree that formed a monophyletic branch and originated from one ancestral gene inherited from the common ancestor of the three Sapindaceae species was defined as a Sapindaceae lineage gene. One or more Sapindaceae lineage genes that formed a monophyletic branch with the *A. thaliana* NBS-encoding genes were inherited from a common ancestor of the three Sapindaceae species and *A. thaliana*, and were defined as Malvids lineage genes. Synteny Analyses Across/Within Sapindaceae Genomes and Gene Duplication Type Determination {#S2.SS5} ------------------------------------------------------------------------------------------ The MCScanX package ([@B27]; [@B54]) was used to identify syntenic blocks within a genome or between different genomes through pair-wise all-against-all blast of protein sequences. The purposes of synteny analysis were to explore the pattern of conservation of NBS-encoding gene loci among the Sapindaceae genomes and determine the types of NBS-encoding gene duplication. Synteny relationship of NBS-encoding genes was displayed by TBtools^[10](#footnote10){ref-type="fn"}^. Results {#S3} ======= Identification and Classification of the NBS-Encoding Genes {#S3.SS1} ----------------------------------------------------------- A total of 180, 252, and 568 non-redundant NBS-encoding genes were identified from the genomes of *X. sorbifolium*, *A. yangbiense*, and *D. longan*, respectively ([Table 1](#T1){ref-type="table"} and [Supplementary Table S1](#TS1){ref-type="supplementary-material"}), accounting for 0.73, 0.89, and 1.83% of the 24,672, 28,320, and 31,007 annotated protein-coding genes in *X. sorbifolium*, *A. yangbiense*, and *D. longan* genomes, respectively ([@B31]; [@B5]; [@B59]). The average lengths of NBS-encoding genes in *X. sorbifolium*, *D. longan*, and *A. yangbiense* were 6081, 5569, and 6199 bp, while the average lengths of the coding region of NBS-encoding genes in *X. sorbifolium*, *D. longan*, and *A. yangbiense* were 3082, 3132, and 3142 bp, respectively. *D. longan* possessed the largest number of NBS-encoding genes and was 3.16- and 2.25-times greater than *X. sorbifolium* and *A. yangbiense*, respectively. The identified NBS-encoding genes from the three Sapindaceae species were divided into the CNL, TNL, and RNL subclasses based on their domain compositions and primary phylogenies. Among the three subclassses, CNL genes overwhelmingly outnumbered TNL and RNL genes with proportions of 81.11, 89.26, and 89.68% in *X. sorbifolium*, *D. longan*, and *A. yangbiense*, respectively. The proportion of TNL genes was 17.78, 9.15, and 7.94% in *X. sorbifolium*, *D. longan*, and *A. yangbiense*, respectively, while the number of RNL genes was the smallest with only two, nine, and six genes, respectively. Not all of the identified NBS-encoding genes had intact structures possessing all three domains (CC/TIR/RNL) with many either lacking the CC/TIR/RPW8 domain at the N-terminus, the LRR domain at the C-terminus, or domains at both termini ([Table 1](#T1){ref-type="table"}). Additionally, some identified NBS-encoding genes were classified as "other" in TNL and CNL due to their atypical structural domain compositions ([Table 1](#T1){ref-type="table"}). For example, the *D. longan* genome encoded two "other" genes in TNL, including LN~TIR~L and TLTN, and 13 "other" genes in CNL, including CNLNL(2), N~CC~LN~CC~LN~CC~L(1), N~CC~N~CC~LN~CC~L(1), NLCNL(1), CNLCNL(4), CNLN(1), N~CC~N~CC~L(2), and CNN(1). ###### The number of identified NBS-encoding genes in the three Sapindaceae genomes. Domain compositions *X. sorbifolium* *A. yangbiense* *D. longan* ------------------------------------------ ------------------ ------------------ ------------------ **TNL subclass** **32 (17.78%)** **20 (7.94%)** **52 (9.15%)** *TNL* (intact) 24 3 24 *TN* 0 0 7 *NL* 5 10 6 *N* 3 4 13 *Other* 0 3 2 **CNL subclass** **146 (81.11%)** **226 (89.68%)** **507 (89.26%)** *CNL* (intact) 55 26 218 *CN* 27 30 88 *NL* 45 95 107 *N* 18 72 81 *Other* 1 3 13 **RNL subclass** **2 (1.11%)** **6 (2.38%)** **9 (1.58%)** *RNL* (intact) 2 2 5 *RN* 0 1 0 *NL* 0 1 1 *N* 0 2 3 *Other* 0 0 0 **Total number** **180** **252** **568** Proportion to total protein-coding genes 0.73% 0.89% 1.83% Average gene size (bp) 6081 6199 5569 Average length of coding sequence (bp) 3082 3142 3132 Distribution and Organization of NBS-Encoding Genes in Sapindaceae Genomes {#S3.SS2} -------------------------------------------------------------------------- The NBS-encoding genes were unevenly distributed among different chromosomes. For example, Chrom (chromosome) 9 of *X. sorbifolium* genome contains the most genes (42 genes), whereas the Chrom 1 and 11 contain the fewest (only two genes in each Chrom) ([Supplementary Figure S3](#FS3){ref-type="supplementary-material"}). In *A. yangbiense*, Chrom 3 contains the most genes (89 genes), whereas no NBS-encoding gene was detected on Chrom 11 ([Supplementary Figure S4](#FS4){ref-type="supplementary-material"}). Uneven distributions were also observed among the three subclasses of NBS-encoding genes ([Supplementary Figures S3](#FS3){ref-type="supplementary-material"}, [S4](#FS4){ref-type="supplementary-material"}). Chrom 9 (41 genes) of *X. sorbifolium* and Chrom 3 (86 genes) of *A. yangbiense* contained the most CNL genes, whereas Chrom 4 (20 genes) of *X. sorbifolium* and Chrom 2 (five genes) and 8 (five genes) of *A. yangbiense* contained the most TNL genes. All chromosomes of the two species contained CNL genes except Chrom 10 and 11 of *A. yangbiense*, whereas only seven chromosomes of *X. sorbifolium* and six chromosomes of *A. yangbiense* contain TNL genes. There were too few RNL genes for this analysis. The majority of NBS-encoding genes were organized into clusters rather than singletons in *X. sorbifolium* and *A. yangbiense* genomes, and their ratios were 2.98 and 5.31, respectively ([Table 2](#T2){ref-type="table"}). *A. yangbiense* contained more clustered genes than *X. sorbifolium* (207 genes vs 131 genes), and the largest gene cluster of *X. sorbifolium* and *A. yangbiense* were on Chrom 14 (14 genes) and Chrom 3 (21 genes), respectively. Since the NBS-encoding genes in *D. longan* genome were not anchored to chromosomes yet, the chromosomal locations and cluster assignments of these genes were not examined. ###### Organization of NBS-encoding genes in the three Sapindaceae genomes. Loci and genes *X. sorbifolium* *A. yangbiense* *D. longan* --------------------------------------------- ------------------ ----------------- ------------- No. of chromosome-anchored loci (and genes) 83 (175) 77 (246) / No. of singleton loci (no. of genes) 44 (44) 39 (39) / No. of clustered loci (no. of genes) 39 (131) 38 (207) / Clustered genes/singleton genes 2.98 5.31 / Average no. of genes in clusters 3.36 5.45 / No. of clusters with 10 or more genes 1 7 / No. of genes in the largest cluster 14 (Chrom 14) 21 (Chrom 3) / No., number; Chrom., chromosome; /, not detected. Motif Analysis of the NBS Domain {#S3.SS3} -------------------------------- The NBS domain consists of several functional motifs that were conserved and strictly ordered among the NBS-encoding genes ([@B61]). A total of six conserved motifs were identified in each subclass of the NBS domains in the three Sapindaceae species using MEME and WebLogo ([@B11]; [@B3]). From the N-terminus to the C-terminus, these motifs included the P-loop, Kinase-2, Kinase-3, RNBS-C, GLPL, and RNBS-D motifs. Comparisons of the amino acid sequences of these motifs are presented in [Figure 1](#F1){ref-type="fig"}. The P-loop, Kinase-2, Kinase-3, and GLPL motifs exhibited high similarity among the three subclasses of NBS-encoding genes, suggesting that the NBS domains with critical functions regulating the immune responses were homologous. The other two motifs, especially RNBS-D, were poorly conserved among the three subclasses of NBS-encoding genes. The variation of these motifs may be responsible for further functional divergences within these subclasses. The subclass-specific signatures within the six motifs were further analyzed, which could be used as preliminary labels to identify CNL, TNL, or RNL genes. For example, Tryptophan (W) at the seventh position of the RNBS-C and Cysteine (C) at the seventh position of RNBS-D in CNL genes, phenylalanine (F) at the 11th position of the RNBS-D in TNL genes, and serine (S) at the fourth position of the P-loop and glutamic acid (E) at the second position of the RNBS-D in RNL genes. Additionally, the amino acids at the final position of Kinase-2 could also be used to distinguish TNL genes from CNL and RNL genes ([Figure 1](#F1){ref-type="fig"}). Therefore, the subclass of a given NBS-encoding gene could be classified based on the amino acid signatures of the motif sequences. ![Six conserved motifs of NBS domains in the three Sapindaceae species. Amino acids of the six conserved motifs were extracted. Different conserved amino acids among CNL, TNL, and RNL subclass genes are labeled with a red star. Details of the amino acids of the whole NBS domain are presented in [Supplementary Figure S2](#FS2){ref-type="supplementary-material"}.](fgene-11-00737-g001){#F1} Phylogenetic Analysis of the NBS-Encoding Genes {#S3.SS4} ----------------------------------------------- To reconstruct the phylogenetic relationship of the NBS-encoding genes in Sapindaceae, a phylogenetic tree was constructed based on the amino acid sequences of NBS domain alignments using the NBS-encoding genes of *A. thaliana* as a reference. To attain better phylogeny, too short or extremely divergent NBS domains were removed from the data matrix. A total of 957 genes (*X. sorbifolium*, 159; *D. longan*, 468; *A. yangbiense*, 173; *A. thaliana*, 157) were obtained and used to reconstruct the evolutionary history of the NBS-encoding genes. The phylogenetic tree was composed of three monophyletic clades, RNL, TNL, and CNL, with support values \> 99%; many internal nodes had high (\>70%) support values ([Figure 2](#F2){ref-type="fig"} and [Supplementary Figure S5](#FS5){ref-type="supplementary-material"}). The three clades represented the divergence of RNL, TNL, and CNL genes. Compared to TNL and CNL, the branch lengths of RNL genes were short ([Figure 2](#F2){ref-type="fig"}), suggesting that they had a low evolutionary rate. ![Phylogenetic relationships of the NBS-encoding genes in *X. sorbifolium*, *A. yangbiense*, and *D. longan* based on the amino acids of conserved NBS domains. Red, blue, green, and black lines represent the NBS-encoding genes in *X. sorbifolium*, *A. yangbiense*, *D. longan*, and *A. thaliana*, respectively. Support values \> 70% for basal nodes are shown. The reconstructed phylogeny was divided into 43 Malvids and 181 Sapindaceae lineage NBS-encoding genes. The first column number 1--43 represents the Malvids lineage NBS-encoding genes, and the last column number 1--181 represents the Sapindaceae lineage NBS-encoding genes. The presence of Malvids lineage NBS-encoding genes in *A. thaliana* and the common ancestor of the three Sapindaceae species is indicated by "√." The scale bar indicated amino acid substitutions/sites. The detailed phylogenetic tree of the NBS-encoding genes, including gene names, evolutionary relationships among genes, and supporting values of all of the nodes, is presented in [Supplementary Figure S5](#FS5){ref-type="supplementary-material"}.](fgene-11-00737-g002){#F2} To gain insight on the evolution of the NBS-encoding genes before and after divergence of *A. thaliana* and the three Sapindaceae species, Notung software was used to reconcile gene duplication/loss events of the NBS-encoding genes at each node of the phylogenetic tree ([@B50]). Based on the definitions (refer to section "Materials and Methods" for details), 43 Malvids lineage genes were retrospected ([Figure 2](#F2){ref-type="fig"}). The ratio of RNL:TNL:CNL genes was 2:9:32. Among them, only 13 genes (two RNL, two TNL, and nine CNL) were reserved by both *A. thaliana* and the common ancestor of the three Sapindaceae species, while 19 genes (four TNL, 15 CNL) were lost by *A. thaliana* and 10 genes (three TNL, seven CNL) were lost by the common ancestor. A total of 33 Malvids lineage genes (two RNL, six TNL, 25 CNL) were inherited by the common ancestor of the three Sapindaceae species and these genes intensively expanded to 181 Sapindaceae lineage genes (three RNL, 23 TNL, 155 CNL) ([Figure 2](#F2){ref-type="fig"}). CNL genes exhibited a more active expansion rate than RNL or TNL genes, especially the CNL Malvids lineage 19, 20, and 43 expanded 16, 33, and 21 Sapindaceae lineages, respectively ([Figure 2](#F2){ref-type="fig"}). Further analysis revealed that 93, 122, and 58 of 181 Sapindaceae lineages were inherited by *X. sorbifolium*, *D. longan*, and *A. yangbiense*, respectively ([Figure 3](#F3){ref-type="fig"}), while only eight lineages were reserved in all three genomes. A total of 76 Sapindaceae lineages (*X. sorbifolium* and *D. longan*, 42; *D. longan* and *A. yangbiense*, 16; *X. sorbifolium* and *A. yangbiense*, 18) were maintained in only two genomes and 97 lineages were species-specific (*X. sorbifolium*, 25; *D. longan*, 56; *A. yangbiense*, 16). The distribution patterns suggest that these ancestral gene lineages have experienced differential gene duplication/loss events when the three Sapindaceae species diverged. ![Ancestral Sapindaceae linage genes in the *X. sorbifolium*, *A. yangbiense*, and *D. longan* genomes.](fgene-11-00737-g003){#F3} Syntenic Analysis of NBS-Encoding Genes in Sapindaceae Genomes {#S3.SS5} -------------------------------------------------------------- The synteny analysis was performed between and within the three Sapindaceae genomes (the *D. longan* genome was presented as scaffold form). A total of 33 syntenic NBS-encoding genes were detected between *X. sorbifolium* and *A. yangbiense* genome ([Figure 4A](#F4){ref-type="fig"} and [Supplementary Table S2](#TS2){ref-type="supplementary-material"}). Among them, the number of syntenic CNL and RNL subclass genes was 32 and one, respectively, whereas no syntenic TNL subclass genes were detected. The CNL, TNL, and RNL subclass syntenic genes were all detected between *X. sorbifolium* and *D. longan* genome ([Figure 4B](#F4){ref-type="fig"} and [Supplementary Table S2](#TS2){ref-type="supplementary-material"}), and the gene number was 26, 2, and 1, respectively. However, there were only 16 CNL subclass syntenic genes were detected between *A. yangbiense* and *D.longan* ([Figure 4C](#F4){ref-type="fig"} and [Supplementary Table S2](#TS2){ref-type="supplementary-material"}). Moreover, there were only seven syntenic NBS-encoding genes preserved by the three genomes and they all belong to the CNL subclass ([Supplementary Table S2](#TS2){ref-type="supplementary-material"}). The syntenic NBS-encoding genes revealed three different forms: singleton to singleton, singleton to cluster, and cluster to cluster. These forms were resulted from different extents of gene duplication/loss of the ancestor genes. The large number of NBS-encoding genes showing presence/absent (P/A) polymorphism and asymmetric gene numbers among co-linear loci indicate that the NBS-encoding genes have experienced dramatic gain and loss during the evolution of Sapindaceae species. ![Synteny of the three Sapindaceae species NBS-encoding genes. **(A)** Synteny of *X. sorbifolium* and *A. yangbiense* NBS-encoding genes. **(B)** Synteny of *X. sorbifolium* and *D. longan* NBS-encoding genes. **(C)** Synteny of *A. yangbiense* and *D. longan* NBS-encoding genes. LG1-15, *X. sorbifolium* chromosomes; chr01-13, *A. yangbiense* chromosomes; S, *D. longan* scaffolds. Red and gray lines represent synteny NBS-encoding genes and non-NBS-encoding genes, respectively.](fgene-11-00737-g004){#F4} There were three types of NBS-encoding gene duplications: local tandem duplication, dispersed (or ectopic) duplication, and whole genome duplications (WGDs) or segmental duplication ([@B28]). MCScanX software was adopted to determine the type of gene duplications in producing NBS-encoding genes during the evolution of Sapindaceae species. As shown in [Table 3](#T3){ref-type="table"}, tandem and dispersed duplication were the main contributors to gene expansion events in *X. sorbifolium* and *A. yangbiense* genomes. However, the proportion of segmental duplicated genes might have been underestimated because of the syntenic relationship of NBS-encoding genes would be disrupted during long-term evolution. The gene duplication types of the NBS-encoding genes in *D. longan* genome were not examined, since these genes were not anchored to chromosomes yet. ###### Contributions of three duplication types in producing NBS-encoding genes during the evolution of Sapindaceae species. Different types of duplication *X. sorbifolium* *A. yangbiense* *D. longan* --------------------------------- ------------------ ----------------- ------------- Total no. of NBS-encoding genes 180 252 568 Local tandem duplication 108 (60%) 172 (68.2%) / Dispersed duplication 55 (30.6%) 61 (24.2%) / WGD or segmental duplication 12 (6.7%) 13 (5.2%) / Unanchored genes 5 (2.7%) 6 (2.4%) 568 No., number; /, not detected. Gene Duplications/Losses Resulting in Dynamic Evolutionary Patterns of the NBS-Encoding Genes {#S3.SS6} --------------------------------------------------------------------------------------------- To assess the evolutionary patterns of the NBS-encoding genes during the speciation of the three Sapindaceae species, the gene duplication/loss events of the NBS-encoding genes were restored in the phylogenetic tree based on the conserved NBS domain sequences. The retrospective analysis revealed that 43 ancient NBS-encoding genes were shared by the common ancestor of *A. thaliana* and the three Sapindaceae species ([Figure 2](#F2){ref-type="fig"}). Among these ancient genes, 33 were inherited and duplicated into 181 genes in the common ancestor of the three Sapindaceae species. These 181 ancestral Sapindaceae genes experienced different evolutionary patterns, which were reflected by species-specific gene duplication/loss events during the speciation of *X. sorbifolium*, *D. longan*, and *A. yangbiense. X. sorbifolium* duplicated 66 genes (57 CNL, nine TNL) and lost 88 genes (80 CNL, seven TNL, one RNL) during speciation ([Figures 5A,B](#F5){ref-type="fig"} and [Supplementary Figure S6](#FS6){ref-type="supplementary-material"}), resulting in a slight decrease in the number of the NBS-encoding genes in its genome. Similarly, the common ancestor of *D. longan* and *A. yangbiense* after diverging from *X. sorbifolium* lost 25 genes (18 CNL, seven TNL) and duplicated 12 genes (11 CNL, one TNL), resulting in a decrease in the total number of genes (168). However, *D. longan* and *A. yangbiense* underwent considerably different evolutionary processes after divergence ([Figures 5A,B](#F5){ref-type="fig"} and [Supplementary Figure S6](#FS6){ref-type="supplementary-material"}). Specifically, *D. longan* duplicated 340 genes (321 CNL, 16 TNL, three RNL), but lost 40 genes (37 CNL, two TNL, one RNL), thus, the gene number clearly increased in its genome. *A. yangbiense* duplicated 106 genes (97 CNL, eight TNL, one RNL) and lost 101 genes (85 CNL, 14 TNL, two RNL), resulting in a slight increase in the number of NBS-encoding genes in its genome. Therefore, the NBS-encoding genes in the three Sapindaceae species exhibited dynamic and distinct evolutionary patterns. ![Duplication/loss events of the NBS-encoding genes during the speciation of *X. sorbifolium*, *A. yangbiense*, and *D. longan*. **(A)** Differential gene duplication and loss events of NBS-encoding genes. **(B)** Duplication/loss events of CNL, TNL, and RNL genes. Gene duplication/loss events are indicated by numbers with "+" or "−" on each branch, respectively. Detailed information for the duplication/loss events of the NBS-encoding genes are presented in [Supplementary Figure S6](#FS6){ref-type="supplementary-material"}.](fgene-11-00737-g005){#F5} Discussion {#S4} ========== Copy Number Variation of the NBS-Encoding Genes Among Different Species {#S4.SS1} ----------------------------------------------------------------------- The NBS-encoding gene family is one of the most divergent plant genome families with high copy number discrepancies among plant lineages/species ([@B16]). For example, several NBS-encoding gene sequences were identified in some orchid species genomes ([@B58]), which possess the smallest number of genes observed thus far. Dozens of NBS-encoding genes have been identified in papaya, melon, cucumber, and watermelon ([@B30]; [@B66]). Hundreds of gene copies in *Arabidopsis*, rice, potato, tomato, pepper, cotton, soybean, grape, poplar, barley, and sunflower have also been identified ([@B60]; [@B29]; [@B15]; [@B55]; [@B49]; [@B57]; [@B2]; [@B46]; [@B44]). Moreover, 1219 and 1303 copies were identified in wheat and apple genomes, respectively ([@B18], [@B19]). In this study, the gene number variation among the three Sapindaceae species was also quite large, with 180, 568, and 252 genes identified in *X. sorbifolium*, *D. longan*, and *A. yangbiense*, respectively. The proportion of NBS-encoding genes to all predicted genes in the three Sapindaceae genomes (0.73--1.83%) was higher than the proportions reported for Cucurbitaceae species (0.19--0.27%), similar to Rosaceae (0.78--2.05%) and Solanaceae (0.73--1.15%) species ([@B19]; [@B46]). The discrepancy of NBS-encoding genes among the three species should not be the result of ploidy variation, because all of the three analyzed species are diploids and have similar chromosomal numbers ([@B31]; [@B5]; [@B59]). Actually, a previous study has shown that no correlation exists between the NBS-encoding genes and species phylogeny or genome size ([@B16]). For example, in Fabaceae, soybean (465) possessed fewer NBS-encoding genes than *M. truncatula* (571), although the genomes size of the former was twice that of the latter ([@B49]). In Brassicaceae, the numbers of NBS-encoding genes were similar across some species even though these species exhibited variations in genome size ([@B66]). The *A. yangbiense* genome was sequenced using the combined Pacific Biosciences Single-molecule Real-time, Illumina HiSeq X, and Hi-C technologies, and BUSCO analysis recovered 95.5% complete BUSCO genes ([@B59]); the *X. sorbifolium* genome was sequenced using the combined Illumina HiSeq, Pacific Biosciences Sequel, and Hi-C technologies, and BUSCO analysis recovered 94.7% complete BUSCO genes ([@B5]); for *D. longan* genome sequencing: using the standard Illumina library preparation protocols, and BUSCO analysis recovered 94% complete BUSCO genes ([@B31]). Additionally, the assembly quality of *D. longan* genome sequence was assessed by aligning the scaffolds to a *D. longan* transcriptome assembly from the NCBI Sequence Read Archive (SRA; SRA050205). Of the 96,251 *D. longan* transcriptome sequences reported previously ([@B25]), 97.55% were identified in the genome assembly ([@B31]). Although all of the three analyzed genomes are of high quality (all recovered \> 94% complete BUSCO genes) according to the BUSCO analysis of the genome papers ([@B31]; [@B5]; [@B59]), the *D. longan* genome assembly has not reached a chromosomal level. A previous study revealed that genome sequence and annotation quality may affect the NBS-encoding gene identification ([@B4]). This raises a possibility that the fragmented assembled genome of *D. longan* may have contributed to its high NBS-encoding gene number by splitting of one NBS-encoding gene into multiple genes during annotation. However, this possibility was largely rejected by coding sequence length analysis, which revealed that the average coding sequence length of NBS-encoding genes in *D. longan* is larger than that of *X. sorbifolium*. Furthermore, a close look at NBS-encoding gene profiles in the three species revealed that the number of intact NBS-encoding genes in *D. longan* (247) is even larger than the total NBS-encoding gene number in *X. sorbifolium* (180) and close to the total NBS-encoding gene number in *A. yangbiense*. Therefore, the relatively larger number of NBS-encoding genes in *D. longan* is more likely a consequence of evolution rather than other artificial reasons. The rapid evolutionary feature of the NBS-encoding gene family caused by frequent gene duplications/loss events could elicit copy number discrepancies. The phylogenetic analysis and ancestral gene classification results of the NBS-encoding genes indicated that species-specific gene duplication/loss events occurred after species diverged from the common ancestor ([Figures 2](#F2){ref-type="fig"}, [5A](#F5){ref-type="fig"} and [Supplementary Figure S6](#FS6){ref-type="supplementary-material"}). Lots of *D. longan*-specific lineage genes were found in *D. longan* and these specific lineage genes experienced recent sharp expansions by more frequent gene duplications and less gene loss events (+340 vs. -40) after the divergence of *D. longan* from *A. yangbiense* ([Figure 4](#F4){ref-type="fig"}). The differences between gene duplication/loss events in *X. sorbifolium* (+66 vs. -88) or *A. yangbiense* (+106 vs. -101) were not as large ([Figure 5A](#F5){ref-type="fig"}). Therefore, a copy number discrepancy of NBS-encoding genes was observed among the three Sapindaceae species. The NBS-encoding gene number variations caused by independent gene duplication/loss events were common in Cucurbitaceae, Fabaceae, Rosaceae, Poaceae, Brasssicaceae, Solanaceae, and orchid species ([@B29]; [@B30]; [@B49]; [@B19]; [@B66]; [@B46]; [@B58]). The high copy number of NBS-encoding genes that resulted from recent expansions in *D. longan* could represent candidate resistance genes that responded to various pathogens, such as witches broom disease ([@B24]; [@B14]). From another perspective, high copy number of NBS-encoding genes might be a disadvantage for plants in the absence of corresponding pathogens due to the fitness cost of resistance genes ([@B52]). There should be some balancing mechanisms between resistance and fitness cost provided by the large number of NBS-encoding genes in *D. longan* genome. Chromosomal distribution analysis of NBS-encoding genes suggested an uneven distribution pattern among different chromosomes ([Supplementary Figure S3](#FS3){ref-type="supplementary-material"}, [S4](#FS4){ref-type="supplementary-material"}). The uneven distributing pattern was commonly observed in other lineages, like legume, Brassicaceae, Solanaceae species, *Vitis vinifera*, and *Populus trichocarpa* ([@B60]; [@B49]; [@B66]; [@B46]). Tandem duplication and dispersed duplication played major roles in the NBS-encoding gene expansion in *X. sorbifolium* and *A. yangbiense* genomes ([Table 3](#T3){ref-type="table"}). Random dispersed gene duplications and gene losses likely brought out the uneven distributions of these genes on different chromosomes, and this difference was made more apparent through local tandem duplications. This strategy made the NBS-encoding gene form clusters to overcome the limitations of R gene diversity during the coevolution of plants and pathogens ([@B41]; [@B26]). The dynamic evolution of NBS-encoding genes in the three Sapindaceae species and *A. thaliana* was traced back to different time periods by reconciling ancient genes in the common ancestor of the three Sapindaceae species and the common ancestor of Sapindaceae and *A. thaliana*. In total, 43 ancient Malvids lineage genes were restored in the common ancestor of Sapindaceae and *A. thaliana* ([Figure 2](#F2){ref-type="fig"}). Among these ancient genes, 10 were lost by the Sapindaceae common ancestor before the three Sapindaceae species diverged. The remaining 33 Malvids lineage genes were inherited and duplicated into 181 genes in the common ancestor of the three Sapindaceae species. These genes experienced further species-specific evolution during speciation and resulted in the currently observed NBS-encoding genes of the three genomes. Over time, the ancient NBS-encoding genes in the common ancestor of Sapindaceae and *A. thaliana* experienced different evolutionary patterns during the speciation of the three Sapindaceae species ([Figure 6](#F6){ref-type="fig"}). *X. sorbifolium* exhibited a "first expansion and then contraction" evolutionary pattern ([Figure 6I](#F6){ref-type="fig"}); more genes were duplicated in the common ancestor of Sapindaceae, but subsequently lost more genes during speciation. Although *A. yangbiense* and *D. longan* exhibited similar evolutionary patterns ([Figures 6II,III](#F6){ref-type="fig"}), expansion followed by contraction and further expansion, subsequent expansion in *D. longan* was stronger and gained more genes than *A. yangbiense* after their divergence ([Figure 5A](#F5){ref-type="fig"}). Furthermore, the evolutionary patterns of these three subclasses of NBS-encoding genes were also diverse among the three species. For example, the CNL and RNL genes exhibited similar patterns as the NBS-encoding genes of corresponding species ([Figure 5B](#F5){ref-type="fig"}), while the patterns of TNL genes were altered in *A. yangbiense* (recent further contraction) and *X. sorbifolium* (recent further expansion) ([Figure 5B](#F5){ref-type="fig"}). Such small changes in TNL genes had little effect on the overall trends of the NBS-encoding genes in *A. yangbiense* and *X. sorbifolium* due to the dominance of CNL genes (see discussion below). Therefore, distinct and dynamic evolutionary patterns of the NBS-encoding genes caused by independent gene duplication/loss events appeared during the speciation of the three Sapindaceae species. ![Evolutionary patterns of the NBS-encoding genes in the three Sapindaceae genomes. Gene number variation from the *A. thaliana*, *X. sorbifolium*, *A. yangbiense*, and *D. longan* (At-X-Ay-D) ancestor to *X. sorbifolium* (I), *A. yangbiense* (II), and *D. longan* (III).](fgene-11-00737-g006){#F6} Numbers of Subclass Genes and the Causes {#S4.SS2} ---------------------------------------- The number of CNL subclass genes in *X. sorbifolium*, *D. longan*, and *A. yangbiense* was considerably higher than TNL and RNL genes, accounting for 81.11, 89.26, and 89.68% of the NBS-encoding genes in each species, respectively. The greater number of CNL subclass genes is a common phenomenon observed among plant species, except for the Brassicaceae ([@B66]). For example, CNL subclass genes are the majority in the genome of *Glycine max* (57.8%), *Phaseolus vulgaris* (66.5%), *V. vinifera* (82.8%), *Capsicum annuum* (94.1%), *Solanum lycopersicum* (87.0%), *Solanum tuberosum* (83.7%), and *Amborella trichopoda* (84.8%) ([@B60]; [@B49], [@B48]; [@B19]; [@B46]). Extremely, monocots have only CNL genes due to the loss of TNL genes near dicot/monocot differentiation ([@B29]; [@B48]). Previously, it was reported that CNL genes underwent twice gene expansions and expanded earlier than TNL genes during angiosperm evolution ([@B48]). A total of 155 CNL, 23 TNL, and three RNL ancestral genes were reconciled in the common ancestor of the three Sapindaceae species. Therefore, when the common ancestor of the three Sapindaceae species emerged, its genome possessed more CNL genes than TNL or RNL genes. Although these ancestral genes have experienced frequent gene duplication/loss events during the divergence of the three Sapindaceae species, gene expansion in their common ancestor maintained the large number of CNL genes. Additionally, lots of recent expansions of CNL genes in the three Sapindaceae species may have given rise to the dominance of this subclass's genes ([Figures 2](#F2){ref-type="fig"}, [5](#F5){ref-type="fig"} and [Supplementary Figure S6](#FS6){ref-type="supplementary-material"}). An extremely small number of RNL genes were previously reported in angiosperms ([@B48]; [@B66]; [@B46]; [@B58]). In this study, two, six, and nine RNL genes were identified in *X. sorbifolium*, *A. yangbiense*, and *D. longan*, respectively. It was speculated that CNL and TNL genes were involved in recognizing specific pathogens, while RNL genes helped transduce signals in the downstream pathways of plant immunity ([@B7]; [@B10]; [@B51]). Therefore, RNL genes clearly participated in basic defense responses and without the divergent selection of pathogens, these genes did not necessarily expand in large numbers. Moreover, pairwise synteny analysis detected more syntenic CNL (74 genes) subclass genes than TNL (two genes) and RNL (one gene) subclass genes among the three Sapindaceae genomes ([Figure 4](#F4){ref-type="fig"} and [Supplementary Table S2](#TS2){ref-type="supplementary-material"}). These differences might be caused by the different evolutionary feature of the three subclass genes during angiosperm evolution: long-term contraction and fast evolution rate of TNL genes, gradual expansion of CNL genes, and conservative evolution of RNL genes ([@B63]; [@B48]). Notably, not all of the identified NBS-encoding genes in *X. sorbifolium*, *A. yangbiense*, and *D. longan* genomes had intact structures possessing all three domains. There were only 81 (24 TNL, 55 CNL, two RNL), 31 (three TNL, 26 CNL, two RNL), and 247 (24 TNL, 218 CNL, five RNL) NBS-encoding genes with intact structures in *X. sorbifolium*, *A. yangbiense*, and *D. longan* genomes ([Table 1](#T1){ref-type="table"}), respectively, accounting for 45.0, 12.3, and 43.5% of all identified NBS-encoding genes in these three species, respectively. Similarly, the relative small proportion of NBS-encoding genes with intact structures were also reported in *C. annuum* (23.2%), *S. lycopersicum* (42.7%), *S. tuberosum* (28.2%), *P. trichocarpa* (46.2%), *M. truncatula* (39.1%), *Lotus japonicus* (31.0%), and *Oryza sativa* (30.6%) genomes ([@B60]; [@B63]; [@B49]; [@B46]). In plants, the highly conserved NBS domain has been demonstrated to be able to bind and hydrolyze ATP or GTP and act as molecular switches in immune signaling, while the LRR and N-terminal domains (TIR and CC) are typically involved in the recognition of, and the activation of, corresponding partners, respectively ([@B39]; [@B13]; [@B34]). Theoretically, in order to trigger immune responses and transfer defense signals, an NBS-encoding gene should possess an intact structure. However, transient overexpression results showed that those NBS-encoding genes without intact structures also function in plant immunity ([@B43]; [@B21]). Data Availability Statement {#S5} =========================== The datasets generated for this study can be found in the *X. sorbifolium*: <http://dx.doi.org/10.5524/100606>, *D. longan*: <http://dx.doi.org/10.5524/100276>, and *A. yangbiense*: <http://dx.doi.org/10.5524/100610>. Author Contributions {#S6} ==================== G-CZ, WL, and Y-LW conceived and directed the project. G-CZ, WL, Y-MZ, and YL obtained and analyzed the data. Y-MZ, ML, MZ, YL, and G-QM conducted the phylogenetic analysis and constructed the discussion. G-CZ wrote the manuscript. All of the authors contributed to the discussion of the results, reviewed the manuscript, and approved of the final article. Conflict of Interest {#conf1} ==================== The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest. **Funding.** This work was funded by the Doctoral Fund (No. XY19BS15) and the First Training Program of Institute of Peony of Heze University (provided to G-CZ), and Qingchuang Science and Technology Support Program of Shandong Provincial College. The funders had no role in the study design, data collection, analysis, decision to publish, or preparation of the manuscript. We thank LetPub ([www.letpub.com](http://www.letpub.com)) for its linguistic assistance during the preparation of this manuscript. [www.iplant.cn/foc/](http://www.iplant.cn/foc/) <http://dx.doi.org/10.5524/100606> <http://dx.doi.org/10.5524/100276> <http://dx.doi.org/10.5524/100610> <http://hmmer.org> <http://pfam.sanger.ac.uk/> <https://www.ncbi.nlm.nih.gov/Structure/cdd/wrpsb.cgi> <http://pfam.janelia.org/> <http://smart.embl-heidelberg.de/> <https://github.com/CJ-Chen/TBtools> Supplementary Material {#S9} ====================== The Supplementary Material for this article can be found online at: <https://www.frontiersin.org/articles/10.3389/fgene.2020.00737/full#supplementary-material> ###### Phylogenetic relationship of *X. sorbifolium*, *A. yangbiense*, and *D. longan.* Time of divergence: million years ago (MYA) ([@B22]; [@B32]; [@B31]; [@B5]; [@B59]). ###### Click here for additional data file. ###### Details of the amino acid frequencies of the whole NBS domain of CNL, TNL, and RNL genes in the three Sapindaceae species (WebLogo). ###### Click here for additional data file. ###### The chromosomal distribution of identified NBS-encoding genes in the *X. sorbifolium* genome. ###### Click here for additional data file. ###### The chromosomal distribution of identified NBS-encoding genes in the *A. yangbiense* genome. ###### Click here for additional data file. ###### The detailed ML tree of the NBS-encoding genes. Sequence names and supporting values are presented on all of the nodes. The tree was reconstructed based on the amino acids of the NBS domain of the NBS-encoding genes in *X. sorbifolium*, *A. yangbiense*, and *D. longan* using NBS-encoding genes in the *A. thaliana* genome were used as a reference. ###### Click here for additional data file. ###### The reconciled NBS-encoding gene tree with real species phylogeny and restored various duplication/loss events. "n4" indicates a loss event that occurred in the common ancestor of *X. sorbifolium*, *A. yangbiense*, and *D. longan*. "n2" indicates a loss event that occurred in the common ancestor of *A. yangbiense* and *D. longan.* ###### Click here for additional data file. ###### A list of NBS-encoding genes identified from the three Sapindaceae genomes. ###### Click here for additional data file. ###### Detailed information of the synteny NBS-encoding genes in three Sapindaceae genomes. ###### Click here for additional data file. [^1]: Edited by: Madhav P. Nepal, South Dakota State University, United States [^2]: Reviewed by: Anna Maria Mastrangelo, Council for Agricultural and Economics Research (CREA), Italy; Jacqueline Batley, The University of Western Australia, Australia [^3]: This article was submitted to Evolutionary and Population Genetics, a section of the journal Frontiers in Genetics
Angkor and the Temples of Siem Reap Cambodia I thought of this quote while walking through the various temples in Siem Reap. One can immediately liken the temples to museums. They are all edifices of unparalleled beauty. Yet, unlike museums, you are free to explore without the constrictions of glass or velvet ropes to block you from the full experience. The temples are built sturdy enough (for now) that you can walk through them, touch, graze, explore and experience them in full. They look and feel incredibly different depending on the time of day you visit. At dusk or dawn, they act as the perfect silhouette against a creamy, deep Monet-like sky. Like a museum, each and every wall of a temple acts as its own work of art, like a Mona Lisa, or Sistine Chapel. For example, in Angkor Wat, there are more than 3000 beguiling apsaras (heavenly nymphs) carved onto its walls, each carving different down to the hairstyle. The temples at Angkor are said to be the ultimate expression of Khmer architecture and demonstration of faith; Angkor Wat is the largest religious monument in the world. It was originally constructed as a Hindu temple of god Vishnu for the Khmer Empire, gradually transforming into a Buddhist temple toward the end of the 12th century. According to inscriptions, the construction of Angkor Wat required over 300,000 workers and 6000 elephants to build, and still, it was never finished. Angkor Wat is massive, yet it beckons you to look ever closer. The level of detail of every facet of the temple is incredible. Angkor Wat stands as an important symbol for Khmer people and Cambodians. It’s featured front and center on the flag of Cambodia. Cambodia’s sordid history has been riddled with incredible trials and tribulations. Today, Cambodia still continues to suffer from underdevelopment, poverty, hunger and corruption. But if Angkor Wat is truly the symbol of Cambodia, well, they’ve already proved in the past they have the spirit to accomplish something incredible, seemingly impossible. I’m not religious, but I’ve seen the spirit of Cambodia. It will one day flourish again.
When it comes to graphs about real estate, the trend lines are almost always heading south. Whether it's prices, number of homes sold or some other measure of the market, we've endured a gloomy downward spiral for several years now. So in recognition of the optimism that spring brings, we thought it would be appropriate to illustrate that every cloud has a silver lining. For real estate, that comes in the form of home affordability. Since 1970, the National Association of Realtors has been publishing an index that tracks the affordability of housing by looking at the relationship of home prices, interest rates and median incomes. Specifically, the NAR's methodology for this index is as follows: "The NAR affordability index measures whether or not a typical family could qualify for a mortgage loan on a typical home. A typical home is defined as the national median-priced, existing single-family home as calculated by NAR. The typical family is defined as one earning the median family income as reported by the U.S. Bureau of the Census. The prevailing mortgage interest rate is the effective rate on loans closed on existing homes from the Federal Housing Finance Board and HSH Associates, Butler, N.J. These components are used to determine if the median income family can qualify for a mortgage on a typical home. "To interpret the indices, a value of 100 means that a family with the median income has exactly enough income to qualify for a mortgage on a median-priced home. An index above 100 signifies that a family earning the median income has more than enough income to qualify for a mortgage loan on a median-priced home, assuming a 20 percent down payment. For example, a composite home affordability index of 120.0 means a family earning the median family income has 120 percent of the income necessary to qualify for a conventional loan covering 80 percent of a median-priced existing single-family home. An increase in the HAI, then, shows that this family is more able to afford the median priced home. "The calculation assumes a down payment of 20 percent of the home price and it assumes a qualifying ratio of 25 percent. That means the monthly principle and interest payment cannot exceed 25 percent of the median family monthly income." The most recent data for this index (January 2012) recorded an all-time high of 206.1. That compares with 184.5 for 2011 and 174.0 for 2010. In fact, housing affordability has been climbing steadily since 2006, when the index stood at 107.6. The all-time low for this index was in 1980. At that time, it bottomed out at 79.9. Interestingly, even though 1980 was the low point for home affordability and 2012 has recorded a new high, the state of the world today is very similar to how it was 32 years ago. As many of you might remember, 1980 was the last year of the Carter Presidency. The Iranian hostage crisis had reached a boiling point, much as the Iranian nuclear crisis is peaking today. When adjusted for inflation, gas prices in 1980 were remarkably close to where they are today - near an all-time high. Unemployment was a significant concern in 1980 at 7.1 percent, just as our current rate of 8.3 percent is equally bothersome. The cumulative federal debt in 1980 was scaring people to death, because it was about to reach the unthinkable number of a trillion dollars. Today, we run a federal deficit of $1.5 trillion every year, and our total debt is now about $16 trillion. Apparently, a trillion dollars isn't so scary anymore, but the debt remains a significant problem. However, for real estate, there was one notable and important difference between 1980 and today. Back then, 30-year fixed-rate mortgages were at 15 percent and approaching a record high. Now, they're at historical lows, hovering slightly below 4 percent. When it comes to home affordability, the two biggest factors are prices and mortgage rates. Currently, the post-bubble price adjustments and rock-bottom mortgage rates are combining to provide a breakout in affordability. But, despite what the numbers show, many still feel stretched in the effort to buy or own a home. The post-recession hangover along with the lingering economic and geo-political issues that mirror 1980 are continuing to put a lid on better times for real estate. Hopefully, these financial and foreign policy issues will soon be resolved, and act as less of a drag on the good news we presently enjoy with reasonable home prices and affordable mortgage rates. Once there is a clear path forward to address these other concerns, we can all get rowing in the same direction of a real recovery. See a graph with this column here: Bob and Donna McWilliams are practicing real estate agents with more than 20 years of combined experience in the Annapolis area. Their website is , and you can email them at .
https://www.capitalgazette.com/cg2-arc-e0a6ad08-9c78-52c6-b210-fdc9de1fcfcd-20120311-story.html
Type: Open competition for architects and architecture students. International ideas competition that challenges participants to design a new Contemporary Design Museum to house a collection of contemporary designs by both Mexican and International designers. The proposed Museum’s collection will cover an exciting range from product, industrial, graphic, fashion to architectural designs. The proposed design should explore the role of Museums today and the relevance, expectation and possibility for an inspirational space where visitors can comfortably engage with design and architecture through the exhibits and space in itself. It should also apply and encourage the use of ecological and sustainable design principles where possible. It is the organiser’s intention for this general stage competition to be as design constraints free as possible to allow competitors’ ideas for the chosen site and designs to be as creative and test the boundaries of what is possible. However exciting and challenging the creative opportunity presented within such few parameters may be, it is equally important that any proposal exhibit an amount of functionality and viability.
https://thecompetitionsblog.com/amp/2014/04/competition-contemporary-design-museum-mexico/
A state bill filed recently to prohibit law enforcement officers from racially profiling people could help increase trust between the police and the public, despite the uphill battle it faces. Democratic legislators filed House Bill 99, known as the Anti-Discrimination Act of 2017, in the N.C. House. On top of prohibiting racial profling, it would require law enforcement agencies to collect homicide statistics, including data about people killed by law enforcement officers. It also — and this may be its most important provision — requires officers to receive annual training concerning discriminatory profiling. “The training components and homicide reporting components present a great opportunity for law enforcement and the community to continue growing their relationship toward more and more positive interactions,” State Rep. Ed Hanes, D-Forsyth, said an email. “If we can work together on the data side that can guide our training, conversation and continued growth.” Many provisions in the bill are already being carried out by the Winston-Salem Police Department, Chief Barry Rountree said, including the department’s policy on bias-free policing that prohibits officers from profiling people based on their race, ethnicity, origin, gender, gender identity and other characteristics. “Based on the way the current version of this proposed bill is written, I don’t see any issues for the police department,” Rountree told the Journal. Good for our local police force’s attention to this aspect of public service. Unfortunately, we doubt it’s a policy that every N.C. police department practices. And even with the department’s attention, there may be room for improvement. State Rep. Evelyn Terry, D-Forsyth, said some constituents say police racially profile them. “Racial profiling is a well-documented and deeply troubling problem that erodes trust between law enforcement and the communities they serve, particularly communities of color,” Sarah Gillooly, the policy director of the American Civil Liberties Union of North Carolina, told the Journal. “Right now, we are seeing too much violence in our communities,” state Rep. Cecil Brockman of High Point, a Democrat and a primary sponsor of the bill, told the Journal. “But it is hard to fix these problems if there is distrust between the community and law enforcement, especially if people feel like they are being profiled or discriminated against. “We need to work together to eliminate the biases that divide us so we can bring about safer situations for our next generation,” he told the Journal. And that’s the meat of the matter. In our current polarized climate, Republicans may be reluctant to pass a bill that originates with Democrats. But like it or not — and however we got here — there are segments of the public that distrust the police. That’s the situation and it requires attention. The bill could help resolve matters. The GOP should give it a shot. My Turn, Eric Perry: Why try to silence citizens?
https://www.salisburypost.com/2017/03/01/bill-boost-trust-public-police/
Defending Civil Rights UCA has been a national leader in defending the civil rights of Chinese Americans. Working with congressional leaders, media, and broad public support, UCA successfully campaigned for the rights of Sherry Chen and Xiaoxing Xi, two outstanding Chinese American scientists falsely charged with espionage-related crimes. As an increasing number of Chinese Americans are becoming unfortunate collateral damage, resulting from the deterioration of relations between the United States and China, UCA is fostering a multi-city dialogue between the Chinese American community and law enforcement agencies to address racial profiling and intellectual property protection as well as other urgent concerns. UCA also initiated the “Speak Up Campaign,” where 19 presidents of top U.S. universities publicly voiced their support for Chinese American faculty members and international students as well as for continued benefits of international collaboration in the sciences. To address the increasing racism and hate crime against Asian Americans due to the COVID-19 pandemic, UCA has built and strengthened relationships and conducted regular discussions with the Jewish American and African American communities to foster equal justice and civil rights for all. The Chinese American Convention, organized and convened biennially by UCA, is a national platform for Chinese American civic leaders, elected officials, scientists, entrepreneurs, youth leaders, and other stakeholders who share, discuss, and shape a common agenda for the future of the Chinese American community and this country. The conventions in 2016 and 2018 were quite successful, attracting some of the most influential speakers, and well attended with each drawing more than 400 active participants from over 35 states. Due to a unique set of familial, cultural, and societal factors, mental health issues among Asian American youth are on the rise but have received little attention. Working with local community organizations and a team of experts and counselors, UCA WAVES addresses this urgent need by creating culturally-informed programs to raise awareness and provide knowledge of mental health concerns. UCA WAVES has successfully organized 12 national and local youth mental health conferences, as well as four webinars specifically designed to address mental health needs resulting from the pandemic. We also have ongoing collaboratives such as Mental Health First Aid training and peer support groups for nursing students, parents, and youth. Check out our webpage for free resources and ways to get involved! UCA Next Generation Programs To help build a pipeline to nurture future Asian American leaders, UCA created a series of programs to foster leadership, including: Summer Civic Leadership Internship, to provide college and high school students with internship opportunities at all levels of the government; UCA Youth Leadership Camp in Washington DC, to train future leaders; and UCA Summer University, to provide summer online courses for students. UCA is also planning the inaugural Chinese American Youth Convention in 2021 to further engage and involve the younger generation. Culture and Heritage Programs To preserve and renew Chinese cultural traditions, ethnic identities and values, while supporting the universal practice of giving, UCA has spearheaded the celebration and commemoration of culturally significant holidays and customs, transforming them into charitable events, which include the traditional Lunar New Year Jiaozhi (dumpling) Festival, Hong Bao (red packets) Drives, and other community initiatives. Civic Leadership Forums To encourage more civic engagement in local communities across the nation, UCA, sponsored by CLUSA Foundation, successfully organized eight Civic Leadership Forums in Milwaukee, the Twin Cities, Chicago, Salt Lake City, Houston, Pittsburgh, and Indianapolis. Food of Love Charitable Giving Program To celebrate the Asian American and Pacific Islander Heritage Month in May 2020, UCA launched a nationwide “Food of Love” charity event to serve fellow Americans affected by the coronavirus pandemic. Working with the U.S.-China Restaurant Alliance, the Salvation Army, and other partner organizations, the program delivered thousands of hot meals to frontline and health care workers as well as people in need across all 50 states and in more than 128 cities. As part of its relief efforts, UCA also coordinated multiple personal protective equipment (PPE) donation drives to support vulnerable communities and medical facilities. UCA Summer University is part of UCA’s many important initiatives to train, catalyze and prepare Chinese Americans, especially its next generation, for a full participation in American democracy and civic life. Typically offered in summer, it conducts a wide range of training and topics in an interactive and stimulating manner. It offers great opportunity to learn from and network with prestigious Chinese American scholars, educators, elected officials, and civic leaders.
https://ucausa.org/uca-programs/
There's no need to dread organizing your closet when you have a game plan. Blogger and expert organizer Teresa Sharp is here to help even the most organizationally challenged with her step-by-step guide to cleaning out and organizing your clothing storage space. Now take a deep breath — you can do this! Step 1: Empty Hangers - Remove all empty hangers, putting all wire hangers and all broken/bent/weak hangers in a paper bag to be thrown away as you touch them. Keep bag nearby, and touch each hanger only once. - Place good empty hangers on your bed, dresser, or empty box. You should now have a tiny bit of room in your closet to maneuver a bit. Note: If you only own wire hangers, go out and buy as many plastic hangers as you can afford. Not the flimsiest version, but they don't have to be very expensive. It's nice to have a variety of styles: the smooth ones with a large opening and some with notches to keep spaghetti straps from slipping off. I also like to use about 10 of the felt-covered nonslip type for things that tend to slip off (they used to sell them at Costco). I do not like to use them for everything, though; it's too hard to remove garments. If you don't have any empty hangers, you can start with Step 2, but you will need a nearby bed to have space for sorting, so don't start close to bedtime or you will be moving a pile of clothes to get into bed. Step 2: Collect Supplies You will need: - 3-6 medium-size cardboard or plastic boxes that will fit on a shelf in your closet, on the floor under shorter pieces of clothing, or under a bed for storing your out-of-season clothes (unless you have an empty closet in another room that you can move them to). - Permanent marker for labeling boxes, stickers, or 3×5 cards if using plastic boxes. - Large plastic trash bags (clean) for taking clothes to charity. - Paper bags that stand on their own or a plastic-lined trash can for trashed items that cannot be passed on to someone else. - Clean laundry basket(s) or box(es) for sorting or moving clothing and other items to other rooms. Step 3: Sort Clothes Into Categories If your clothes are packed in so tight that you cannot easily move things around, then take several pieces out and lay them on the bed (if you have large items like coats or jackets, that is an easy category to start placing on the bed, and it will quickly give you room to maneuver in the closet). Also remove any ties or belts you might have hanging in the closet. Note: If you are easily distracted or overwhelmed, get a kitchen timer or use your smartphone to set the timer for 10- to 20-minute work periods. - Start with the spot you see first when you open the closet on one end or the other. Move all pants into that first section, then all skirts, then all shirts/tops, then sweaters/jackets, then robes, then dresses (make sure to place dresses in the longest section of the closet). At this point, you have not made any decisions about what to keep, what to store, or what to give away — just arrange by type so you can see how many of each type you have. You can probably do this in 20-30 minutes; set a timer if that helps. - Now go back through each section and arrange by color and type. In each section, I go light to dark in the Summer and dark to light in the Winter (but that's just me; you can keep it the same year-round if you prefer). I also go from less to more, like sleeveless to turtleneck. Since we are going into the Winter, my first section on the left of my square walk-in closet has solid black spaghetti strap and tank tops (for layering), then t-shirts, button-ups, long-sleeved shirts, and turtlenecks, followed by print tops that are predominately black. Next I placed all the brown shirts, then green, then blue, then violet, pink, red, orange, yellow, and white. In the back of the closet, I have coats and dresses. On the right side starting in the back, I have jackets, skirts, and pants. I have pants toward the front because I wear them most, and they are arranged by color/type (all light-colored pants, then jeans, then dark colors ending with black). This step might take a little longer, but the key is to move quickly, again not making any major decisions. - Go back through one section at a time and remove "out of season" clothing first*. I only do this twice a year, mid-Autumn and early Spring. I know this is hard in places with milder climates, but there are usually some clear-cut Winter or Summer extremes. I never keep turtlenecks, corduroy pants, or thick flannel in my closet in the Summer, and I never miss thin skirts and shirts in light colors (white, linen, etc.) in the Winter. I fold the clothes up neatly and place in one or more of the cardboard or plastic boxes or move to the spare bedroom closet if there is room. Never put anything in storage if there is any doubt if it's clean (you might need to do a few loads of laundry or take items to the dry cleaner before completing this step). You don't want to find moth holes at the beginning of the next season or set-in stains. If you have a lot of wool garments, you will need to add moth repellent of some kind. I've used whole cloves, mothballs, and cedar blocks; there is more info online. *As you remove last season's clothing, begin to ask yourself some questions: - Does it fit? Or has it recently fit? If it's been more than five years and you are not in the process of already losing or gaining weight so that it will likely fit by next year, then it's time to find a new home. - Does it flatter my figure? - Is it comfortable? - Do I love/hate it? - Did I put it on and take it off instead of wearing it out last season? - Is it severely outdated? - Is there someone who might be thrilled to wear this? If you have a friend or relative who might enjoy the clothes, tell her what you are doing, but ask her to come at the end of the day to go through the plastic bags for charity at HER HOUSE, not yours (or better yet, drop off the bags for her to go through) . . . she can drop off what she doesn't take at the charity drop-off spot. You want to get those bags out of your house before you have a chance to go pull something out to keep. Once that's done, you can start dividing up your wardrobe as such: - Anything that you can quickly decide to give to charity, put in the large plastic trash bag. Use a marker to label — Goodwill, Salvation Army, etc. or just Give Away. As each bag is filled, move it to the front door, and the first time you walk past the bags to the car, put them in the trunk with a sticky note on the dash to drop them at the charity drop-off place. - If you are undecided about an item, you can put it in your "out of season" box and decide next season. Or label one box "undecided" and see if you can live without it next year. If you need to be strict with yourself (and you are ready for that), then give it away. You probably won't miss it if it is outdated, doesn't fit, isn't comfortable, or is no longer your style. - If you find garments that you love but they need repairing, you can either put them in your "to be repaired by me" basket in your sewing room (does anyone do that anymore?!), place by your purse to be dropped off at the tailor or dry cleaner, or put in the charity bag and "Let it go!" - Anything that is severely damaged (torn or stained), throw in the trash can. What you should have left hanging in your closet are the current season's clothes arranged by type and color. Place the out-of-season boxes under the bed, at the top or bottom of the closet, or in the spare bedroom closet. Worst case, you can move them to the garage if there is no room in the house, but I don't recommend that. You are over your first big hurdle; now take a break and celebrate!
https://popsugar.dev9.onsugar.com/smart-living/Best-Way-Organize-Your-Closet-36125812
An Ongoing PD (Professional Development) course with Teaching House adds credibility to any English teacher’s resume. The central objectives of these courses are: • to help teachers focus on professional practice and knowledge • to enhance teachers’ professional status, both within their teaching institutions and within the profession as a whole Specific objectives include: • Fostering an in-depth awareness of latest theory and practice in ELT, in terms of approaches to teaching, techniques and lesson models • Promoting professional collegiality • Encouraging experimentation and creativity in teaching methodology The Creative Methodology Course syllabus includes approaches and methods (e.g. silent way, task-based learning, visualisation, multiple intelligences, lexical approach), classroom techniques, classroom management (e.g. instructions, eye contact, interaction, use of L1, discipline) and correction techniques (e.g. error analysis, recent changes in spoken English). Your observation of multilingual classes will give you the opportunity to explore the roles of observer and ‘observee’, to chart lesson stages and to see classroom management and techniques in practice. Important Information: • Class Size: 16 or under • Available Online • Requirements: English of at least CEFR B2 level • Enrol: Online Application Form here • Dates & Fees: Please find fees and dates detailed in the section below. • Teaching House certificate on course completion, including details of course dates, hours and details of topics covered. • Detailed and personalised report from the course director with suggestions for further professional development • Erasmus+ funding – approved for London courses. PIC 944411983 More information about Erasmus can be found here. Course Preparation All course participants receive a pre-course bibliography, which they can refer to prior to the start of their course (although the reading of these texts is not a requirement to complete the course). Participants who are already practising teachers are also invited to complete a brief selection of self-observation sheets to encourage them to analyse their own classroom performance in their own teaching situation, prior to the start of their course. These self-observation sheets are submitted to the Course Director at the start of the course, helping him or her to gain more insight into the teachers’ backgrounds and to better anticipate the teachers’ needs during the course. Course Outcomes These courses provide a forum for development of your professional skills, from insights into recent developments in English language teaching to practical classroom ideas and activities. They are also designed to develop your knowledge of contemporary English usage and provide you with the opportunity to improve your all-round competence in English. What is the course format? The course runs across one or two weeks. You can choose to only do one week, or the full two weeks. Course Schedule In the morning, you will work with an international group of fellow teaching professionals (maximum group size 16), discussing issues in language teaching and looking at materials and activities to give you practical ideas for your classroom. In the afternoon, you will also have the opportunity to observe our teachers putting the techniques we discuss into practice. Teachers who choose to study for 25 hours will also have a series of closed group language sessions to help improve your own level of English. Course Fees One week: £320 GBP/ $410 USD / $520 CAD Two weeks: £610 GBP / $805 USD / $995 CAD Upcoming Course Dates Week 1: June 27 – July 1, 2022 Week 2:
https://www.teachinghouse.com/courses/creative-methodology-for-teachers-of-english
- You should assume that everything you see or read on the Site is copyrighted unless otherwise noted, and may not be used without the written permission of La Curva De María. - All information contained in our websites has been carefully researched and tested. Despite of all care taken in this regard, we assume no liability for the correctness, completeness or currentness of the contents. The same applies to all other websites referred to via hyperlinks. We are not responsible for the contents of websites that can be accessed through such links. It may also happen that third parties have set a hyperlink to our website without our knowledge. We take no responsibility for content or portrayals received via link connections from third-party websites to us. - The content of other websites linked from this website is not the liability of La Curva De María. Therefore we cannot take any responsibility for the contents of any linked site, especially not for changes that have been done after having inserted the link. - Your use of and browsing of the Site is entirely at you own risk. Neither La Curva De María nor any other third party shall be liable for any damages arising solely out of your access to, or browsing in the Site. - La Curva De María assumes no responsibility, and shall not be liable for, any damages to, or viruses that may infect your computer equipment or other property on account of your access to, or browsing in the Site or your downloading of any materials from the Site. WHAT IS A COOKIE? A cookie, also known as an HTTP cookie, web cookie, or browser cookie, is usually a small piece of data sent from a website and stored in a user's web browser while a user is browsing a website. When the user browses the same website in the future, the data stored in the cookie can be retrieved by the website to notify the website of the user's previous activity. Cookies were designed to be a reliable mechanism for websites to remember the state of the website or activity the user had taken in the past. This can include clicking particular buttons, logging in, or a record of which pages were visited by the user. Other kinds of cookies perform essential functions in the modern Web. Perhaps most importantly, authentication cookies are the most common method used by web servers to know whether the user is logged in or not, and which account they are logged in under. Without such a mechanism, the website would not know whether to send a page containing sensitive information, or require the user to authenticate himself by logging-in. TYPES OF COOKIES IN USE The following types of cookie are in use within casaruralmaria.com systems: - Strictly necessary cookies - Performance cookies - Functionality cookies - Targeting / Advertising cookies These cookies are a mixture of first party cookies, which we set ourselves, and third party cookies, which are set by other websites. COOKIE FUNCTIONS - Personalisation – For example, a customer’s language preference is remembered. - Session management - To ensure that a user’s session is routed to the correct system within the casaruralmaria.com infrastructure for the duration of their visit. - Usage Tracking - casaruralmaria.com uses Google Analytics solution to provide analysis of a users’ ongoing usage of the website. This facilitates ongoing improvements to the website. - AB Testing / multivariate testing - We can display multiple versions of a page to a customer to assess which generates the best customer experience. - Advertising - Display advertising content depending on location, language, and your past browsing history. MANAGING COOKIES If you do not want your browser to accept cookies, you can turn off the cookie acceptance option in your browser settings. For further information about how to turn off cookie acceptance please refer to the “Help” function in your browser. Please note that disabling cookie support may prevent this website from functioning properly and you may not be able to fully utilise all of its features and services. FURTHER INFORMATION Further information about cookies and their usage can be found at http://www.allaboutcookies.org and http://www.youronlinechoices.com/.
https://casaruralmaria.com/en/terms/
Interesting facts... Amanda Steel is a multi-genre author. She sometimes writes under the pen name Aleesha Black. She is also a creative writing student and the co-host of "Reading in Bed", a monthly book review podcast. Tell us a little about yourself? I grew up in Bradford in the UK, and now live in Manchester. After studying two creative writing modules as part of my degree, which led me to act upon lifelong passion of writing, by publishing some of my work. Tell us your latest news I have a book out under my pen name Aleesha Black. The book is called Lost and Found. It’s about a young woman who was kidnapped as a child, then sold to a childless couple. Before being reunited with her parents, she believed the people who bought her were her parents. This leads her struggle with her identity and the search for where she really belongs. My other book “First Charge” is out soon. This is a completely different book. The genre is YA. The story follows Meredith, a mermaid descendant (and a strong female LGBT lead character) as she tries to do what she believes is right by protecting people with an important destiny. When and why did you begin writing? I’ve written for as long as I can remember. As a young child I rewrote some fairy tales, although I can’t remember if they were any good or not. Then as a teenager, I used to sit at the back of science class writing song lyrics for my band. Nothing happened with the bands though, as none of us could sing. What inspired you to write your first book? My mum inspired my first book. I had started novels before, but was never able to get past a few chapters. Then my mum’s idea about kidnapped children got me thinking. She believes that there is a black market where kidnapped children are sold to childless couples. This got me imagining what it would be like if one of them was reunited with their real family as an adult. The ideas stuck with me and I completed my first novel. How did you come up with the title? The original title was “While I was Gone” because one of the underlining themes of the story is everything Kayla has missed out with her real family while she was gone. However, the it’s a two-part series, and the series titles Lost and Found. So, when my unscrupulous publisher ran off with my royalties and a certain website refused to take the book down, despite the fact I had the rights returned to me, I had to call it “Lost and Found” and use the pen name “Aleesha Black” to separate it from the original book. How much of the book is realistic? Sadly, the events of “Lost and Found” can happen. The storyline for “First Charge” is less realistic though. So far, I have met any mermaid descendants. What book are you reading now? I’m reading five different books at the moments; most of them are non-fiction. I’m finding “Screenwriting for Dummies” very helpful. What are your current projects? I've started the first draft of the third book in my YA series. I’m also onto the first round of editing on my Paranormal Crime, and I’m writing a screenplay. In-between all that I like to write poetry whenever I’m inspired. Can you share a little of your current work with us? (from Lost and Found by Aleesha Black) Kayla studied his face and realised he was genuinely sorry, but she was still angry. She turned to Patricia who hadn’t said anything. “And do you regret it too?” “Of course I do,” Patricia replied defensively. “So given the chance to go back and change things, you'd do something different?” “There's no sense in talking like that,” Patricia told her, “nobody gets to go back and change things.” Do you have any advice for other writers? Don’t give up. You’ll have rejections (unless you’re very lucky) but keep going and read as much as you can; both fiction to learn what works and what doesn’t, and non-fiction to learn how to improve. What TV shows/films do you enjoy watching? Supernatural, Glitch Travellers, Stranger Things and most of the superhero shows. Favorite foods I love KFC burgers, Chicken Bhuna, Cake and Ice cream. If you were not a writer what else would you like to have done? When I was a child I wanted to be a singer. I don’t think it would have happened though; mainly because I can’t sing. New Release Imagine finding out your parents weren't your parents; that they bought you on the black market and lied to you for fifteen years. This is what Kayla Marshall has to deal with after she is reunited with her real family. She struggles to find where she belongs. Is it with the couple she grew up with and called Mum and Dad? Or is it her genetic family who she grew up thinking were a figment of her over-active imagination? Other Work... A collection of poetry involving bad dates and failed relationships, hopefully seeing the funny of it all, unless of course you made it into one of the poems.
https://melaniepsmith.com/amanda-steel/
On 25th June, H.E. Ambassador Zahir Tanin, Permanent Representative of Afghanistan to the United Nations, delivered a statement at the Security Council’s quarterly debate on the situation in Afghanistan. Special Representative of the Secretary General, Mr. Jan Kubis, opened the debate. A timely political transition with a stable unifying outcome, he said, is the wish of the Afghan people and the necessary foundation for Afghanistan’s political, security and development challenges. Referring to one Presidential candidate’s decision to disengage from the electoral process, citing alleged fraud, Mr. Kubis urged the candidates to immediately engage with one another and the mandated electoral institutions to define solutions to help move the process forward. Rising tensions, he warned, risk sliding into protracted confrontation and violence. To this end, he appealed to the candidates to exhibit “statesmanship, not brinkmanship” at this crucial stage. Mr. Yuri Fedotov, Executive Director of the United Nations Office on Drugs and Crime (UNODC), also delivered a statement. He noted the willingness of UNODC to support Afghanistan’s efforts to engage with its neighbors and “promote regional and interregional cooperation in an integrated, comprehensive response to illicit drugs.” Taking the floor, Ambassador Tanin declared this moment as “pivotal…for Afghanistan,” as the country arrived at the last stage of its historic presidential elections. This democratic transition is the cornerstone of the Afghan-led and Afghan-owned progression to peace, stability, and prosperity, he said. The Presidential elections on 5 April and on 14 June, he continued, generated an unprecedented surge of democratic spirit in Afghanistan. “In an exceptional show of faith in democracy, Afghans cast their ballots despite intimidation by the Taliban and other extremist and terrorist groups so that they could have a say in the country’s political destiny,” he remarked. Ambassador Tanin pointed out the dozens of national institutions that ensured the administration, integrity, and legitimacy of the first entirely Afghan-managed electoral process, highlighting the thousands of independent domestic and international observers and candidate monitors who covered the polling stations and continue to oversee the entire electoral cycle. Electoral institutions, he added, are managing issues related to the electoral process in the second round, attempting to avoid potential crises and to protect “the legitimacy of our historic elections.” He noted with appreciation the United Nations’ readiness to stand up for the interests of the Afghan people by supporting the integrity of the Afghan-led, Afghan-managed electoral process, and noted that their support is “a positive step towards addressing the political concerns of the second round.” Following Ambassador Tanin’s statement, members of the Security Council including representatives of Australia, Chile, Rwanda, Lithuania, Nigeria, United States, Luxembourg, Jordan, Republic of Korea, China, Chad, Argentina, United Kingdom, France, and the Russian Federation delivered remarks, as did representatives of India, Canada, Pakistan, Japan, Italy, European Union, Germany, Spain, Latvia, Kyrgystan and Turkey. Statements focused on the historic nature of the recent Presidential elections, as well as the necessity of adherence to Afghanistan’s constitutional and electoral laws at this important time. In addition, the Security Council adopted two Presidential Statements on elections and illicit drugs in Afghanistan, respectively.
https://afghanistan-un.org/2014/06/h-e-ambassador-tanin-highlights-the-importance-of-peaceful-transition-at-the-security-council-debate-on-the-situation-in-afghanistan/
In this section we consider several different approaches that can be used to evaluate this and other more complex expressions using different functions on your calculator. While the first method – considered in Activity 9 – is probably the most straightforward for this relatively simple expression, it is useful to see how you might use other calculator functions when you are faced with more complicated expressions to evaluate. The expression for the volume of wood requires the value of . You could enter an approximate value for by hand, but this is time-consuming and may be prone to error. The calculator has an approximation for built into it, which is obtained using the key sequence . The key is located on the bottom row of the keypad. Activity 9 Using the fraction key The most obvious way of calculating is to enter it as a fraction on your calculator. What key sequence is needed, and what is the final answer to 3 significant figures? Answer (to 3 significant figures). The key sequence used was . Note that it is not strictly necessary to include the multiplication between the 4 and the in the denominator since if the sign is omitted, it will be assumed by the calculator. Another way to carry out the calculation in Activity 9 is to use the key. Activity 10 Using the key You will not obtain the correct answer to the calculation if you type into your calculator and press . Can you explain why? Insert a pair of brackets into the expression with the ÷ sign so that it will give the correct answer. Then type this new expression into the calculator and check that you obtain the same answer as in the activity above. Answer Typing into the calculator and pressing will not give the correct answer because the calculator will follow the BIDMAS rules and divide by 4 and then multiply by , instead of dividing by . To obtain the correct result, you have to type . (Alternatively, you can type .) (Note that on some later models of the calculator, the correct answer is obtained without adding the brackets to the denominator; however it is good practice to add the brackets to ensure the correct calculation is carried out).
https://www.open.edu/openlearn/science-maths-technology/mathematics-statistics/using-scientific-calculator/content-section-4
Weill Cornell Medical College (WCMC) has established the Brain and Mind Research Institute (BMRI). The BMRI is directed by Dr. Costantino Iadecola, the Anne Parrish Titzell Professor of Neurology. A basic science entity with departmental privileges, the Institute provides a home for basic and clinical research focused on the brain and its diseases. Bridging the translational gap in the neurosciences is of paramount importance to public health. Owing to a convergence of scientific knowledge and technology, it is widely recognized that brain sciences are on the verge of numerous crucial breakthroughs, which will have a transformative impact not only on our understanding of the inner workings of the brain, but also on neurotherapeutics. The institute conducts bench-to-bedside research to develop novel therapeutics for neurological diseases to be tested in cutting-edge clinical trials, as well as bedside-to-bench investigations to enhance current treatments and to truly bridge the current gap in translational medicine. Central to the institute's mission is the use and development of innovative preventive and diagnostic tools, leveraging advances in neuroimaging, genetics, genomics, epigenetics, metabolomics, computational biology and bioinformatics technology, as well as biomarkers for early disease detection and intervention. In addition, new preventive strategies will be developed to identify how individual risk factors may increase brain disease risk, and by studying the impact that comorbidities, such as hypertension and metabolic diseases, have on brain health. With the Brain and Mind Research Institute, WCMC seeks to harness these dramatic advances to further enhance our position as a leading institution at the cutting edge of neuroscience research. Within the institute, basic and clinical neuroscientists are working side by side, sharing ideas, resources, and technology. The department of Neurology at Weill Cornell is a close partner in these efforts (Weill Cornell Medical College Department of Neurology). The resulting synergistic interactions are setting the stage for basic discoveries and advances elucidating disease mechanisms, as well as promoting new and more effective therapeutic approaches.
https://brainandmind.weill.cornell.edu/about-bmri
# Human memory process Numerous theoretical accounts of memory have differentiated memory for facts and memory for context. Psychologist Endel Tulving (1972; 1983) further defined these two declarative memory conceptions of explicit memory (in which information is consciously registered and recalled) into semantic memory wherein general world knowledge not tied to specific events is stored and episodic memory involving the storage of context-specific information about personal experiences (i.e. time, location, and surroundings of personal knowledge). Conversely, implicit memory (non declarative) involves perhaps unconscious registration (lack of awareness during encoding), yet definite unconscious recollection. Skills and habits, priming, and classical conditioning all utilize implicit memory. An essential aspect of episodic memory includes date and time encoding in the subject's past. For such processing, the details surrounding the memory (where, when, and with whom the experience took place) must be preserved and are necessary for an episodic memory to form, otherwise the memory would be semantic. For instance, one may possess an episodic memory of John F. Kennedy's assassination, including the fact that he was watching Walter Cronkite announce that Kennedy had been murdered. However, if the contextual details of this event were lost, remaining would be a semantic memory that John F. Kennedy was assassinated. The ability to recall episodic information concerning a memory has been termed source monitoring, and is subject to distortion that may lead to source amnesia.
https://en.wikipedia.org/wiki/Human_memory_process
. The following workshop and service manual describes the procedures for the Honda GL1800 Service Manual. This manual is divided into sections which are: General Information Frame/Body Panel/Exhaust System Maintenance Procedures Lubrication System Fuel System Cooling System Engine Removal/Installation Cylinder Head/Valve Clutch Gearshift Linkage/Transmission Cylinder/Piston/Crankshaft Final Drive Front Wheel/Suspension and Steering Rear Wheel/Suspension Brake System (standard and ABS) Battery/Charging System Ignition System Starter/Reverse System Lights/Meters and Switches Cruise Control System Audio System Wiring Diagram Technical Features Troubleshooting and Index Follow the Maintenance Schedule (Section 3) recommendations to ensure that the vehicle is in peak operating condition and emission levels are within the standards set by the California Air Resources Board (CARB). Sections 1 and 3 apply to the whole motorcycle. Section 2 illustrates procedures for removal/installation of components that may be required to perform service described in the following sections. Sections 4 through 22 describe parts of the motorcycle, grouped according to location. Is the most complete Manual for the Honda GL1800/GL1800A 2004 ever compiled by mankind? This Service Repair Manual contains over 757 pages of high quality diagrams and instructions on how to service and repair your Honda GL1800 from the front fender to the rear.
https://www.hondaservicerepairmanual.com/honda-gl1800-service-manual-rar/
Sometimes the simplest questions—questions that seem so basic we never expect them to be asked— can stop us in our tracks if we’re not equipped to engage them. For example, central to the Gospel is the notion of goodness. God is good; we’re not good. God’s goodness prompts Him to rescue us from our non-goodness, our sin. Seems clear enough. To some people, though, it’s not clear at all. Something so central to Christianity is hopelessly vague to them: “What is ‘good’?” they ask. “Well, that’s simple,” you may be tempted to say. “‘Good’ is whatever God says it is.” That answer—though true as far as it goes, in my opinion—only magnifies the problem in the minds of skeptics. It may explain what we mean when we say certain actions are good (i.e., they are consistent with what God wants us to do or be), but it makes it impossible to ever say God Himself is good (“God always does what He tells Himself to do”?). And if we can’t make sense out of the claim that God is good, then a Gospel based on God’s goodness loses its legs. I want to explain how defining goodness by making a bare appeal to God’s divine commands can make us vulnerable to an ancient challenge—one that’s also raised frequently today. Then I want to show you how to answer the objection and clarify what we mean by the good. This problem goes back a long way, at least to the 4th century before Christ. Plato’s famous dilemma concerning the nature of goodness is still being raised today as a serious challenge to Christianity. Is an act right because God says it’s so, or does God say it’s so because it’s right? Russell’s version is an attempt to show an internal flaw in the Christian’s notion of God and goodness. Is a thing right simply because God declares it so, or does God say it is good because He recognizes a moral code superior even to Him? This problem presents a dilemma because one is forced to choose one of two options, both ultimately hostile to Christian theism. The believer is caught between a rock and a hard place. On the one horn of the dilemma, God reigns and His Law is supreme. As the ultimate Sovereign, He establishes the moral rules of the universe. His commands are absolute. We must obey. Ethicist Scott Rae describes the view: “A ‘divine command’ theory of ethics is one in which the ultimate foundation for morality is the revealed will of God, or the commands of God found in Scripture.”[iv] This view is known as ethical voluntarism. At first blush this seems correct, until we realize the liabilities we run into unless it is properly qualified. The content of morality seems to be arbitrary, dependent on God’s whim. Though God has declared murder, theft, and debauchery wrong, it could have been otherwise had God willed it so. Any “immoral” act could suddenly become “moral” by a simple declaration (fiat) by God. This is Russell’s point. This is the position of Islam,[v] but it is unacceptable to the Christian. Morality is not arbitrary. God is not free to call what is wrong right, and what is right wrong. The text is clear: “It is impossible for God to lie” (Hebrews 6:18). The Psalmist writes, “No evil dwells with you” (Ps 5:4). God cannot sin. But the alternative horn of the dilemma seems no better. If the Christian asserts that morality is not arbitrary, he is caught on the second horn of the dilemma. If the standard is an absolute that even God can’t violate, doesn’t this make the Almighty Himself beholden to a higher law? The sovereign becomes the subordinate. In each case, Christianity loses. Either God is not good (in any meaningful sense), or He’s not sovereign. That’s the dilemma. Plato’s challenge forces us to consider an important detail in any discussion on the nature of morality: grounding. The word “ground” originally meant “the lowest part, base, or bottom of anything.”[vi] In philosophy it refers to the foundation or logical basis of a claim. Euthyphro’s task was to identify the logical grounding of piety or virtue. What base does morality “stand on”? Frank Beckwith and I chose a title for our book on relativism that paints a word picture: Relativism: Feet Firmly Planted in Mid-Air. Our point: Relativists who make any claim to morality have no basis for their assertion. They are standing not on solid ground, but on thin air. A law is only as legitimate as the authority upon which it rests. The U.S. government can’t pass laws governing Canadians. Our federal laws apply only to the people of this country. Individual citizens can’t fabricate laws that regulate their neighbors. They don’t have that authority. The founders of our country argued that even governments are subject to a higher law. Certain truths are transcendent, they observed, grounded not in human institutions but in God Himself. This appeal to higher Law was their moral justification for the American Revolution. The problem of grounding morality is a difficult one for atheists who claim they can be good without God. Certainly, an atheist can act in a manner some people consider “moral,” but it’s hard to know what the term ultimately refers to. It generally means to comply with an objective standard of good, a Law given by legitimate authority. However, without a transcendent Lawmaker (God), there can be no transcendent Law, and therefore no corresponding obligation to be good. As I wrote in Relativism, “a ‘moral’ atheist is like a man sitting down to dinner who doesn’t believe in farmers, ranchers, fishermen, or cooks. He believes the food just appears, with no explanation and no sufficient cause.”[viii] The atheist’s morality has no grounding. Does the Christian fare any better, though? That is the challenge of Euthyphro’s dilemma. The general strategy used to defeat a dilemma is to show that it’s a false one. There are not two options, but three. The Christian rejects the first option, that morality is an arbitrary function of God’s power. He also rejects the second option, that God is responsible to a higher law. There is no Law above God. The third option is that an objective standard exists (this avoids the first horn of the dilemma). However, the standard is not external to God, but internal for Him (avoiding the second horn). Morality is grounded in the immutable character of God, who is perfectly good. His commands are not whims, but rooted in His holiness. Could God simply decree that torturing babies was moral? “No,” the Christian answers, “God would never do that.” It’s not a matter of external command. It’s a matter of internal character. So the Christian answer avoids the dilemma entirely. Morality is not anterior to God—logically prior to Him—as Bertrand Russell suggests, but rooted in His nature. As Scott Rae puts it, “Morality is not grounded ultimately in God’s commands, but in His character, which then expresses itself in His commands.”[ix] In other words, whatever a good God commands will always be good. The Christian’s job is not done, though, because Bertrand Russell’s observation suggests a second problem. Socrates’ challenge to Euthyphro has not been entirely met. What is “good”? It doesn’t help to say that God is good unless we know what the term refers to. If the word “good” means “in accord with the nature and character of God,” we have a problem. When the Bible says “God is good,” it simply means “God has the nature and character that God has.” If God and goodness are the very same thing, then the statement “God is good” means nothing more than “God is God,” a useless tautology. The answer to this problem hinges on the philosophical notion of identity, expressed symbolically as A = A. When one thing is identical to another (in the way I’m using the term), there are not two things, but one.[x] For example, the president of Stand to Reason (Gregory Koukl) is identical to the author of this article. Everything that’s true of the one is true of the other.[xi] The author and the president are the same. They are not two, but one. So, what is “good”? How can we know goodness if we don’t define it first? Here’s the question: How did Abraham know that justice required God not treat the wicked and the righteous alike? As of yet, no commandments had been formally handed down. An example might help here. How would you respond if someone asked you why you believe in colors? You’d simply say, “Because I can see them. You can, too. Look, there they are.” We have a built in perceptual ability to recognize colors and when the faculty is working as it ought,[xiv] the colors simply present themselves to us. In this case, seeing is believing. No other appeal is necessary. One doesn’t need to define color to be able to see color. In the same way, we have an innate perceptual ability to “see” moral qualities, and when the faculty is working as it ought,[xv] virtue and vice jump right out at us. Again, this kind of “seeing” is believing. Formal definitions are not necessary. Even the atheist understands what moral terms mean. He can “see” good and bad just fine. By his own admission he does not need God in order to recognize morality. What the atheist doesn’t see, though, is that he needs God to make sense of what he recognizes. This is precisely why the moral argument for God’s existence is such a good one, in my view. The awareness of morality leads to God much as the awareness of falling apples leads to gravity. Our moral intuitions recognize the effect, but what is the adequate cause? If God does not exist, then moral terms are reduced to mere relativistic preferences or emotional exclamations (“Murder—ugh!”). Ultimately, there’s nothing to them. Christians need not fear Plato’s famous dilemma. When Euthyphro’s problem is applied to Christianity, it mischaracterizes the biblical view of God. Goodness is neither above God nor merely willed by Him. Instead, ethics are grounded in His holy character. Moral notions are not arbitrary or capricious. They are objective and purposeful, grounded in God’s immutable nature. Further, no outside definition of piety is necessary because morality is known directly through the faculty of moral intuition. God’s laws express His character and—if our moral intuitions have not been corrupted—we immediately recognize those laws as good. This solution speaks volumes in favor of the Christian worldview because it shows that problems vexing other views simply don’t arise when Christianity is properly understood. Even though the challenge is still raised against Christianity today, we are not handicapped by Plato’s challenge to Euthyphro. [ii] Plato, The Dialogues of Plato, translated by J. Harward, Robert Maynard Hutchins, ed., vol. 7 of Great Books of the Western World (Chicago: Encyclopedia Britannica, Inc., 1952), 195. [iii] Bertrand Russell, Why I Am Not a Christian (New York: Touchstone, Simon & Schuster, 1957), 12. [vi] Webster’s New World Dictionary, Second College Edition. [viii] Frank Beckwith and Gregory Koukl, Relativism—Feet Firmly Planted in Mid-Air (Grand Rapids: Baker, 1998), 169. [x] The term “identical twins” is, strictly speaking, a misnomer. Twins aren’t identical to each other. Each twin is identical to herself and only similar to the other. [xi] Philosophers know this as Leibnitz’ law of the indiscernability of identicals. [xiii] Something like this has to be the case. Regardless of how one grounds the concept of goodness, another could always ask, “But what makes that notion good?” To avoid a vicious regress, one must eventually appeal to some irreducible, primitive concept known by intuition. [xiv] Blind or colorblind people notwithstanding.
https://www.str.org/publications/who-says-god-is-good
Hello, world. My name is David Fahim. I am an aspiring computer scientist. I enjoy spending my free time running (cross country), studying computer science, and programming. I am a full stack developer and currently specialize in web development. I love mentoring and teaching others about computer science. I am very passionate about computers and am especially fascinated by virtual reality social networking (or the "metaverse"). I see the metaverse as a decentralized, open source platform. I aspire to build that reality (or virtual reality), and in the process, expand my knowledge of computer science.
https://www.davidfahim.com/
During my time at The Hoffman Agency, I have had opportunities to develop a diverse expertise in communications, from message development and social media communications to designing strategic plans. Today, I’d like to share a few easy tips on improving the quality of your blog content, based upon my recent experience in managing a client’s official blog to attract more readers. Redesign a blog layout Blog thumbnails are the first thing visitors see when they arrive at the blog (or any social platform). It would be helpful for them if there were a short description on the thumbnail with a relevant photo to tell what the content is about. The thumbnails of the WD Blog could be a good example. Also, don’t forget to set the main color theme to reinforce the site’s character. It should echo the official website and other communication platforms to maintain consistency. Reorganize categories The clear navigation helps visitors to quickly and effectively find what they want from the site. Making a well-organized category chart is really important to improve the engagement, since it helps make the visitors feel comfortable and stay longer. Some blogs have a maze-like structure, so that readers need quite an amount of time to find certain information and may never get to the right place. We can assume they will never come back to the blog once they experience something like that. Listen to social suggestions In many cases, social media platforms are being used to deliver messages from a company or brand to its target audiences. However, we can use those communication channels, including a blog, as a way to collect ideas on creating new content. I regularly check the questions and feedback from followers on social media platforms and utilize them to develop new posts that can highly reflect the audiences’ interests. Doing so enables better user engagement.
https://onlinepr-blog.com/how-to-improve-your-clients-blog/
Health Law Institute is a Geneva based think tank that aims to: - Promote knowledge, understanding and awareness of health worker concerns at international, regional, national and grassroots levels based on independent, evidence-based research, analysis and recommendations. - Improve health workers’ legal awareness and literacy to enable them better address legal, regulatory and human rights challenges in their day to day work. - Provide a non-partisan and informal platform for dialogue, information sharing and cooperation among relevant stakeholders to advocate for standards, written policy and regulatory procedures on health worker concerns Our vision The Health Law Institute (HLI) envisions a world where “All health workers will be supported and motivated to provide care commensurate with their skills, in safe environments, under decent working conditions, and empowered to be true stakeholders in the development of sustainable healthcare systems”.
https://www.healthlawinst.org/?lightbox=dataItem-k83fciro4
Twenty five years ago, the Brundtland report – formally titled “Our Common Future” – launched the concept of sustainable development as “the process of change in which the exploitation of resources, the direction of investments, the orientation of technological development, and institutional change are all in harmony and enhance both current and future potential to meet human needs and aspirations.” At the heart of the concept of sustainable development lie two interrelated challenges: how to address our growth needs, in particular those of the developing countries, given the limitations imposed by the state of technology and social organization on our ability to meet present and future needs. Despite significant progress made since the publication of the Brundtland report, the twin challenges of sustainable development remain valid to the present day. What type of governance structures, business practices, technological innovations, legal agreements or policy tools can best bridge the needs-limitation gap in order to facilitate and accelerate sustainable development? The rapid economic growth of the developing countries in Asia in the recent decades has added a new dimension to this process, by shifting the leverage of change from the West to the East. Designing infrastructure, products, enterprises and processes with sustainability in mind can have an enormous impact on environmental and social systems. Building on the success from the last year, the 2013 Conference on Sustainable Development and Business in Asia, to be held in Bangkok, Thailand, in November 2013 offers a platform for scholarly and applied conversations among a wide variety of stakeholders concerned with the continual challenge of advancing the sustainable development and business agenda: people, planet, and growth. Because this is an emerging paradigm, there is much research and exploration that is needed. Academics, researchers, students and representatives from industry, government and non-governmental organizations need to both share their findings and learn from each other, in order to facilitate the transformation in how economic activity is conducted, allowing human societies to be sustained and to thrive. As the fields of sustainable development and sustainable business cross over into multiple areas and disciplines, authors are welcome to submit from a range of topics, perspectives, and disciplines. The range of research submissions may include conceptual, empirical, experimental, and case studies. We particularly invite papers making empirical and theoretical contributions about the social and economic processes impacting on sustainable development; global environmental governance, business and public policy approaches; technological innovations; climate change adaptation & mitigation; renewable energy development. Major themes - Sustainable business, production and consumption - Science & Technology of Sustainability - Global governance of sustainable development - Climate Change and sustainability - Sustainable energy policies Special themes - Tourism (Eco, Geo, Sustainable) - Agribusiness and Aquaculture - Corporate social responsibility - The digital divide in Asia - Water footprints: blue, green and grey Abstracts COSA 2013 invites scholarly interactions among academics, researchers, doctoral students, entrepreneurs, representatives from industry, non-profit and non-governmental organization professionals to submit abstracts of up to 300 words by July 1, 2013. Proposals must be submitted through our online system. For more details on submissions, click here.
https://lawlex.org/lex-bulletin/2nd-annual-conference-on-sustainable-business-in-asia-thailand/1914
Evgeny Charkin, Director of Information Technologies at JSC Russian Railways writes that in this modern world it is impossible to ensure the further dynamic growth of any business without focusing on digitalisation. As such, Russian Railways Holding has started to develop digital technologies in order to safeguard its future. The key document defining the digital transformation of the Russian railways by 2025 is its ‘Digital Transformation Strategy’, which was developed under the instruction of the company’s Board of Directors and considers not only the unique characteristics of our transportation and logistics Holding, but also developments within IT and key global trends. The basis of the digital transformation of Russian Railways is improving – and sometimes radically transforming – the applied technologies, processes and cultural perception of IT. I believe it is vital that we look at this in terms of transformation, and emphasise it so, as the digital technology is only a tool, not the vehicle to change. At the same time, it is vital to understand that not a single solution in the field of digital transformation is isolated. We’re talking about changing the business model of Russian Railways and altering the operational, investment, financial and technological parameters of any processes implemented within the company. Moreover, transformation is impossible without changing the culture of employees, who, in the framework of the new paradigm, must conduct themselves differently, set different goals and use the unique capabilities of digital technologies. Determining targets for the company once the digital change has occurred is quite difficult. It is necessary to consider the interests of all stakeholders: Even though the state may be the advocate of digitalisation, we must ensure that it gives industry regulators, shareholders and passengers the journey and experience they demand as the technology on offer effects them as well as the government. Moreover, we cannot forget the interests of the workers who will expect to see a decrease in the amount of monotonous data work that they do as the technology that can carry out this work for them becomes more advanced. This in turn will allow individuals to present a more creative side to themselves, which will increase creative output and lead to the launch of many promising projects. To ensure that the entire company concurs with the overall belief in digitalisation, each department is individually assessed to see where digitalisation can be implemented in the most efficient way. In some cases, classical automation will not work: A complete reengineering of processes will be required, some of which will be retired and replaced with more progressive ones. Key digital transformation initiatives The digital transformation strategy is structured as follows. Its technological basis consists of the following eight digital platforms: - Infrastructure - Transportation - Cargo - Passengers - Traction - Electronic commerce - Transport and logistics hub - Non-production processes. During the transformation we will optimise processes and develop the necessary regulatory framework, as well as a ‘digital culture’. The result of this work will be a wide range of digital services provided both to external (shippers, passengers, etc.) and internal customers (divisions, managers and company employees). The platform approach is one of the basic principles of changing the technological architecture of a company. Within the framework of platforms, digital services and products will be developed which are aimed at achieving specific business goals: Increasing market share, revenue, profit and asset efficiency. They can be created both inside Russian Railways and by external companies – in this case they are used according to the service model, and subsequently they can be acquired by the Holding. The result of this approach in the future will be the creation of their own ecosystem: A combination of developers and business partners using data standards and digital platforms of Russian Railways to provide services to customers. Externally, development will be aimed at penetrating fundamentally new segments of services that are possible only through digital technology. The most promising area here is the monetisation of the data available to the company. Such analytics may be relevant not only to the Russian market, but to foreign ones as well, which means that the work must be GDPR compliant. Of course, the more complex the digital technologies introduced into production and management processes are, the more potential vulnerabilities appear. We ensure information security at the very start of digital development, when determining the architecture and choosing the best technical solutions. Regarding the digital products that we purchase, it is important for us to have information concerning the algorithms they use and all their technical documentation. In short, we are doing our best to exclude unauthorised access to sensitive information by taking technical and organisational measures. Promising technology To make the ‘Digital Transformation Strategy’ as effective as possible, it is important to get the right portfolio of promising end-to-end technologies. This is further complicated as none of these technologies have been running long enough to produce reliable results. Based on an analysis of industry characteristics, we rely on the following key technologies: - Internet of Things (IoT) - Big data - Distributed registries (blockchain) - Artificial intelligence - Virtual and augmented reality - New data-transfer technologies (including quantum communications). This is why we have been chosen by the government to be a national developmental leader. We already have working services that demonstrate high developmental dynamics; first and foremost, the Freight Transportation electronic trading platform and Innovative Mobility passenger services. We hope that we will see quick results in the fields of digital projects using blockchain, electric power, traction and electronic document management as well. Blockchain The Service for Monitoring Smart Freight Contracts pilot project began in 2018 to create a common information space between consignors, carriers and consignees for the online tracking of rail transportation. The main aspects of commercial contracts with Russian Railways customers will be carried out using smart contracts through this project. The project will reduce the number of claims, shorten the time it takes to approve transportation documents and provide automatic calculation of payments for additional services or fines. At the next stage, we plan to exploit the use of smart contracts even more, including automatic settlements between counterparties. International engagement We are in discussions on digitalising the global transport and logistics market with our international partners, most importantly, the International Union of Railways (UIC). I was appointed co-Chair of the UIC Digital Platform at the 89th UIC General Assembly. One significant contribution that the platform has made to the digital development of railways in 2018-2019 is the DIGIM project – the Impact of Digital Technologies on Business Processes strategy. Its main goal is to study the possible impact of digital technologies on the business processes of the railway industry and a pilot implementation of useful innovations based on digital technologies. A working group has been created (including directors for digital technologies of UIC member companies) that will select digital technologies whose development does not require significant investment, and which will quickly benefit the railway industry. The UIC strategic project to introduce blockchain technology will begin implementation by 2020. Based on the results of the pilot project, two products will be available: Blockchain as a service solution and a detailed concept of an application programming interface (API) that ensures full compatibility with other blockchain concepts, affecting all parts of the logistics process. The continuation of this work is extremely important because without the widespread introduction of end-to-end digital processes by various participants in transportation and logistics, it will be extremely difficult for us to compete in the global market and offer our customers an end-to-end logistics service that meets the high standards of the modern era. Biography Evgeny Charkin graduated from the Finance Academy under the Government of the Russian Federation with a degree in economics, finance and credit in 1999. Between 2002 and 2015, Evgeny held various management positions in several companies including JSC Severstal, Rosatom and LLC MC Metalloinvest, before joining JSC Russian Railways as Director of Information Technologies in December 2015.
https://www.globalrailwayreview.com/article/88386/russian-railways-digital-transformation/
Why did the Khmer civilization build this enormous Hindu shrine in the middle of the jungle? Stirling Castle in Scotland - one of Europe’s most celebrated forts and the legendary home of King Arthur’s round table Using laser scanning, carbon dating and forensic technologies, archaeologists are finally piecing together the full story of the stones A team of top architects attempt to solve the riddle of the Taj’s towering dome Archaeologists discovered this mountain-top city 100 years ago, but its purpose remains a hotly debated mystery Historians reveal the dark secrets of a super-tomb built at the birth of China Archaeologists are using new techniques to solve ancient mysteries about this spectacular ruin Bringing back to life the city’s astonishing monuments The Terracotta Army in Xi’an, China is perhaps the greatest archaeological discovery in the last 50 years, but it remains shrouded in mystery. Historians now use 3D scanning technology to reconstruct the shattered remains of the warriors and reveal the dark secrets of a super-tomb built at the birth of China. The discovery of real weapons and bizarre stone-plated armor amongst the statues reveals the supernatural enemy the army was designed to face, and the discovery of dismembered skeletons thrown into pits, hint at the violent struggle for power that followed the death of China’s first emperor.
https://windfallfilms.com/show/7030/episode-10-treasures-of-the-terracotta-army.aspx
Today, the country has one of the world's most ambitious tourism development plans, concentrated on the Sinai Peninsula and Red Sea Coast. How is it tackling the challenge of making large scale tourism development sustainable? As the fastest-growing economic sector, tourism has become one of Egypt's largest industries and its Tourism Development Authority (TDA) has plans for around 200,000 new hotel rooms over the next 15 years. Most of this capacity expansion is concentrated in the Sinai Peninsula and Red Sea Coast where large tourism development centres are planned on unoccupied coastal land. Before the TDA was established under the umbrella of the Ministry of Tourism in 1991, the subject of sustainable tourism was rarely discussed in Egypt and the Middle East. The Red Sea Sustainable Tourism Initiative (RSSTI), set up in 1999, is one of the first tourism programmes in the Middle East and Africa to embrace the principles of sustainable development. The RSSTI is a TDA-implemented programme with funding provided by the US Agency for International Development (USAID) and technical assistance from the international firm PA Consulting Group. From the outset it has helped the TDA to focus on implementing a methodical work programme that a) integrates international standards of sustainable tourism development and b) promotes the sustainable development of tourism in Egypt's key tourism destinations. As Ahmed Hassan, Task Manager at the RSSTI explains: "We have constantly emphasised the importance of considering tourism within the context of sustainable development in Egypt. To work towards this ambitious goal, we looked very carefully at international standards such as Agenda 21 for the Travel and Tourism Industry. Our work at the RSSTI is a proactive effort to engage stakeholders in more responsible Red Sea tourism development by disseminating information on best practice and increasing environmental awareness. We do this by developing industry guidelines and standards, workshops and training courses for tourism development decision-makers and key managers in the hospitality industry, to promote the benefits of 'green' hotels and sustainable tourism destinations". The RSSTI has introduced improved systems and regulations for environmental impact assessments (EIA) and monitoring, environmental management best practices for alternative tourism and developed an ecologically sensitive zoning plan for the TDA land to be developed in the southern Red Sea region. "This means that now, new centres of tourism development, individual projects and a wide range of support facilities have to be assessed according to an integrated system of environmental management before they can be approved by the TDA and the Egyptian Environmental Affairs Agency" says Ahmed. Through the RSSTI programme, the TDA has formulated a 'mandate' for sustainable tourism development throughout Egypt. The mandate encompasses ten key principles to advance sustainable tourism development, including developing environmentally, socially and culturally compatible forms of tourism; integrating planning strategies; forming partnerships and encouraging local community participation; developing eco-efficiency and environmental management systems and 'designing with nature' to create low impact buildings. It also places a high priority on enforcing legislation against any kind of illegal or exploitative tourist activity, informing tourists about cultural ecological and other values and organising and taking part in international and regional efforts to address issues relevant to sustainable tourism development. The TDA is currently finalising an ecologically-based zoning ordinance and master plan for the South Red Sea region, which defines ecological zones in order to assure that tourism development preserves the marine and terrestrial ecosystems of highly sensitive areas. This involved a meticulous process to determine an optimum land-use management plan that identifies various zones for different types and levels of development and environmental management -including the development and marketing of eco-tourism. The zoning effort recognises the importance of conservation policies in securing long-term benefits from development in this sector. Since 2000, the TDA has implemented more than 30 national and regional conferences, workshops and training seminars, the most recent of which was held in Cairo in May 2003, Called Sustainable Tourism Egypt (STE) 2003 with the underlying theme 'Tourism Development in Environmentally Sensitive Areas' it marked the first of a series of conferences on the sustainable development of resorts and hotels and included the launch of the first integrated environmental guidelines for tourism development centres. Attended by over 700 people, the event invited delegates to join efforts to push forward with Egypt's progressive sustainable tourism programme and put environmental protection and conservation at the top of the agenda, Calling for delegates' support, Egypt's Minister of Tourism Dr. Mamdouh El-Beltaugi said: "Now more than ever, there is a need to further consider the importance of sustainable tourism in the context of our development plans for the 21st century. A particular concern is the continued degradation of biodiversity and fragile ecosystems, such as coral reefs, deserts, coastal areas and wildlife, Policy development and implementation of sustainable tourism as a true need, not a luxury, must take place in co-operation with all interested parties, especially the private sector and local communities and through stakeholders' consultation vehicles like the one demonstrated by your alliance and grouping of today". International Visitors Per Year: 5 million, up from 2,6 million in 1990, Tourism contributes 7.5% of GDP and supports employment for approximately 1.7 million people, The Red Sea area currently constitutes 32% of tourist nights. This is predicted to rise from 1,300 beds in 1982 to an estimated 400,000 beds in 2012. During the past decade, tourism development along Egypt's Red Sea Coast has evolved from a generally unplanned approach to a growing application of sustainability principles; Aiming not to repeat the mistakes of unplanned development in Hurghada, the TDA is responsible for developing over 1,000 km of coastline along the Red Sea, Gulf of Aqaba and Gulf of Suez. The main attraction is scuba diving, with growing interest in other marine activities such as windsurfing and sport fishing. Many of the offshore islands are included in a nature reserve. While the tourism development strategy of the Red Sea region relies on the private sector, the TDA plays a vital role in guiding developers to adopt the highest quality standards in design, construction and operation, It recognises that any development or human activity may have negative impacts if not properly managed. Although the TDA has drawn up regulations and legal requirements, its policy when dealing with developers is to encourage rather than discourage, provide incentives rather than penalise and guide rather than command. To this end, a set of economic instruments has been developed to encourage developers to adopt and implement best practices in design, construction and operation of their projects; this covers issues such as incentives for private contractors to provide solid waste management services. The TDA's preferred development model is a Tourism Centre, Ranging from 500,000m' to several million square metres of land area, the centres are a planned concentration of tourism facilities within a defined area according to an approved Master Plan. Private developers are responsible for all facilities and infrastructure and operate under a contract with TDA. The centres consist of tourist accommodation, recreational, commercial, and cultural facilities, together with workers' housing and urban services (such as schools and medical services). Single or multiple investors are required to co-ordinate construction and operations according to a specified timetable. Most Tourism Centres include a range of accommodation types, from 3 star Egyptian-run hotels to 5-Star international flag hotels, All the major chains are present and a number of properties that are owned and/or operated by international tour operators such as TUI (lberotel and Robinsons) and Viaggi del Ventaglio (Venta Clubs), An estimated 70% of all international visitors to the Red Sea Coast come through international tour operator packages. The TDA has released national guidelines for Best Practices for Tourism Centre Development along the Red Sea Coast which provides information, support and mentoring to developers and their consultants so that they can adapt and apply internationally-recognised best practices in environmental planning and design. Comprehensive guides have also been published covering solid waste management landscaping, water and sanitation, energy efficiency and environmental management systems with practical examples to guide developers and practitioners. Through RSSTI the TDA is also encouraging the implementation of Environmental Management Systems (EMS) in resorts as an example of voluntary initiatives and self-monitoring, eight resorts have implemented a resort-wide EMS which resulted in significant savings. Two resorts so far, Steigenberger Golf Resort and The Oberoi Sahl Hasheesh have been awarded Green Globe certification and others have been awarded certificates of excellence by the Ministry of Tourism. The EMS programme includes stakeholder training courses, certification for hotel environmental officers and disseminating self-evaluation criteria for hotel environmental performance. Developers and operators are actively encouraged to display awareness materials on domestic routes, access roads to hotel properties, within the resorts and facilities and in the in-room publicity materials. A regional awareness campaign with the theme 'Give the Environment a Hand' was launched in 1999 and continues to promote community and tourist involvement in protecting the Red Sea environment. RSSTI has issued guidelines for ecotourism development in the Eastern Desert and mountains separating the Nile Valley from the Red Sea in an area known as the Deep Range of the Red Sea region. The TDA's goal for ecotourism development here is 'to enable people to enjoy and learn about the unique natural historical and cultural resources in this region while simultaneously preserving their integrity and stimulating regional economic development'. Within the southern zone lies an environmentally and historically important area called Wadi al Gimal which has recently been declared a national protectorate. Although it is one of the world's most arid regions, the Deep Range is adjacent to the Red Sea, a major body of water. Disparities such as this have created many environmental and cultural characteristics that have the potential to provide unique ecotourism experiences. The second highest peak in Egypt, Gabal Shayeb El-Banat (2,187m) offers a stark contrast to the coastal plains at the edge of the Red Sea where the abundance of water and marine life contrasts with the hyper-aridity of the Eastern desert. Wadi al Gimal in particular, provides critical habitats for numerous resident or migratory bird species. The region was the source of substantial mineral wealth and a vital part of the economic foundation of ancient empires. Careful site inspections and mapping of the Wadi al Gimal by the RSSTI's study team have revealed the ruins of hundreds of residences, mines, sentry posts, public buildings, temples and fortresses. Because of the harsh physical conditions, there are virtually no permanent human settlements -the population consists of a few hundred nomadic people and a small number of fishermen who live along the coast of the Red Sea. As part of its strategy to create new communities along the Red Sea, the TDA aims to create a resident population in response to increased employment opportunities generated through ecotourism. However, this remote wilderness area presents substantial challenges for ecotourism development. The harsh conditions of the Deep Range require specialised recreation service delivery techniques, appropriately designed facilities and highly trained personnel in order to provide a safe and enjoyable ecotourism experience. Access to the southern part of the region has been significantly improved by the recent completion of the Marsa Alam International Airport and large-scale marina facility. To date, outdoor recreation for tourists has focused primarily on marine-based activities with scuba diving, snorkelling, and pleasure boating. A limited number of land-based activities have also been established such as jeep tours, camel riding and guided hiking and there are desert safari operations offering day and overnight expeditions into the Eastern Desert. "The designation of part of Egypt's Red Sea as a protected area brings both challenges and opportunities for TDA in planning tourism development," notes Bill Meade, RSSTI Project Director and head of PA Consulting Group's sustainable tourism practice. "On the plus side, the declaration will give the destination an added selling point, especially given the rise in nature-based tourism. However, tourism development will necessarily be more restrictive, including lower density of development and lower impact forms of tourism services and activities." Published in English in 2001 and in Arabic in 2003 in association with Denmark-based DHI Water and Environment 'Shoreline Management Guidelines' is a 200-page handbook which explains in ordinary language the terminology and mechanisms relating to shoreline management and impact assessment and management. There is increasing pressure on the Egyptian coasts (of which there are more than 3000km) partly from the land-side from the development of tourism, infrastructure and habitation and the need for recreational shores and partly from sea-based impacts such as marine sports. The guidelines are not only aimed at regulatory authorities, but also developers, planners, environmental specialists, landscape architects, political decision-makers, NGOs, contractors, landowners and other groups that use or are involved in planning, management and preservation of the coasts. The publication is the first of its kind in the Middle East and will contribute to the promotion of sustainable solutions and to an environmentally responsible administration of the Red Sea coasts. In 2002, PA Consulting Group launched the Certified Hotel Environmental Manager programme to meet the professional development needs of hotel managers with responsibility for environmental affairs. To achieve the CHEM certification, applicants must meet educational and work experience pre-requisites and achieve a pass grade on the exam. A five-day preparatory training course is offered in advance of the exam, focusing on EMS, water, energy and solid waste management emergency preparedness and environmental communication, CHEM was first offered in Jamaica, and course offerings are scheduled for Egypt and Barbados, An international board oversees the CHEM program, with representatives from Cornell University, IHE!, TUI Netherlands, Green Seal, and Fairmont Hotels. The Energy and Environmental Managers Institute administers the certification. Located close to the Red Sea region's spectacular nature reserve, the 148-room Steigenberger Golf Resort is inspired by traditional Egyptian/Bedouin architectural styles and sits surrounded by lagoons in the middle of an 18-hole USPGA Championship Golf course. Through the RSSTI, Steigenberger has implemented a full Environmental Management System (EMS) according to the requirements of Green Globe 21 and received Green Globe certification in April this year. In order to comply with the requirements of the EMS, Steigenberger developed an environmental policy which was communicated to guests, employees and service providers. The resort also implemented a property-wide water and energy conservation programme and has begun an ambitious solid waste management project. Waste is being minimised from source by avoiding the use of disposable plastic liners in waste bins, requesting suppliers to take back packages and replacing disposable amenities with refillable ones. Waste is now separated into four streams: organic, glass, paper and metal. Batteries and photocopier toners are separated and returned to local recyclers. Steigenberger has also supported social and community development programmes with financial support for local schools and taken part in clean-up campaigns.
https://www.greenhotelier.org/destinations/beyond-the-nile-valley-to-the-red-sea-coast/
Hot Topics: Police recover trailer filled with toys for Berthoud kids It took police eight hours to recover the trailer that was stolen Wednesday morning By Jessica Maher Posted: 11/29/2012 04:00:06 PM MST Updated: 11/29/2012 04:00:12 PM MST BERTHOUD -- More than 150 children here almost missed out on a Christmas gift this year when a trailer filled with toys was stolen early Wednesday morning from the parking lot of Grace Place Church. Berthoud Police recovered the trailer -- and all its contents -- about eight hours after it was reported missing from the church at 250 Mountain Avenue. Those eight hours were nerve-wracking for Kim Land, outreach pastor at Grace Place and president of Christmas in Berthoud, the annual community event that kicks off on Saturday. “Since Berthoud's a small community we don't have United Way or Santa Cops, so as a community we try to work together to get kids the things they need,” Land said. Land woke up to an early morning phone call on Wednesday. She was told that a street sweeper called police around 4 a.m. after witnessing two men hooking a silver Ford pickup truck up to the trailer and driving away. After the truck and trailer were spotted driving northbound on Highway 287 in Loveland around 7:30 a.m., the trailer was recovered by police just before noon. It was found behind buildings north of Berthoud in Larimer County but police have not released the address. The lock on the trailer had not been tampered with and all toys were still inside. A spokesperson for the police department said Thursday that they have identified suspects but have not yet made arrests. The incident is still under investigation. This year, 170 children were nominated as recipients for Christmas in Berthoud gifts, an increase of more than 50 children over last year. Community members nominate needy families for the program, which also seeks to provide families with a monetary donation so parents have an opportunity to pick out gifts for their children. Events held this weekend will raise money for the families. The toys in the trailer were donated by Habitat for Humanity and include two pallets of Ninja Hamsters. Habitat for Humanity, who had a surplus of toys donated to them, gave the toys to Christmas in Berthoud back in August. They have been in the trailer since then. “It was the whole principle of the thing,” Land said. “I'm sure the person who took the trailer didn't know the toys were in there.” Police said they are unsure of a motive. Anyone with information on the incident should contact Berthoud Police at 532-2611. For more information on Christmas in Berthoud events, or to donate, visit www.christmasinberthoud.org. Jessica Maher can be reached at 669-5050 ext. 516 or [email protected]. Follow her on Twitter: @JessicaMaherRH. Missy Franklin, Jenny Simpson, Adeline Gray and three other Colorado women could be big players at the 2016 Rio OlympicsWhen people ask Missy Franklin for her thoughts about the Summer Olympics that will begin a year from Wednesday in Rio de Janeiro, she hangs a warning label on her answer.
I am a qualified psychotherapist practising both privately and within the third sector. I hold a Clinical Diploma and MSc in Transactional Analysis Psychotherapy, a Post-Graduate Diploma in Transactional Analysis Psychotherapeutic Counselling, and a Foundation Certificate in Interpersonal and Counselling Skills. I trained at the Metanoia Institute, one of the leading clinical and academic institutions for psychotherapy in the UK. I am a registered member of the UK Council for Psychotherapy (UKCP) and I abide by their ethical framework. I am therefore committed to my personal development as a practitioner: I attend regular clinical supervision and CPD to support my work. I am also a member of Psychotherapists and Counsellors for Social Responsibility (PCSR). I have worked with clients from a range of cultural backgrounds, across a variety of settings, including at the Metanoia Counselling and Psychotherapy Service, Refugee Council, Highbury Counselling Centre, Centrepoint and Room to Heal. I have experience of working with people suffering with a range of difficulties including: - Low mood and depression - Relationship difficulties - Generalised anxiety, social anxiety and panic attacks - Trauma and post-traumatic stress disorder (PTSD) - Issues related to gender, sexuality or identity - Intergenerational and transgenerational trauma - Racial trauma and internalised racism - Parenting related struggles - Sexual, physical and emotional abuse - Hearing voices - Intrusive thoughts and rumination - Self-harm - Low self-esteem or self-confidence - Sexual difficulties - Addiction - Bereavement and loss, including pregnancy loss - Bullying - Suicidal thoughts or feelings - Dissociation Find out about my approach, and what to expect from the therapy, here. If you would like enquire about private counselling or book an initial consultation, please contact me.
https://emilywhitepsychotherapy.com/about/
Sound design for experiments on soil is based on two fundamental principles: replication and randomization. Replication enables investigators to detect and measure contrasts between treatments against the backdrop of natural variation. Random allocation of experimental treatments to units enables effects to be estimated without bias and hypotheses to be tested. For inferential tests of effects to be valid an analysis of variance (anova) of the experimental data must match exactly the experimental design. Completely randomized designs are usually inefficient. Blocking will usually increase precision, and its role must be recognized as a unique entry in an anova table. Factorial designs enable questions on two or more factors and their interactions to be answered simultaneously, and split‐plot designs may enable investigators to combine factors that require disparate amounts of land for each treatment. Each such design has its unique correct anova; no other anova will do. One outcome of an anova is a test of significance. If it turns out to be positive then the investigator may examine the contrasts between treatments to discover which themselves are significant. Those contrasts should have been ones in which the investigator was interested at the outset and which the experiment was designed to test. Post‐hoc testing of all possible contrasts is deprecated as unsound, although the procedures may guide an investigator to further experimentation. Examples of the designs with simulated data and programs in GenStat and R for the analyses of variance are provided as File S1.
https://repository.rothamsted.ac.uk/item/8v593/analysis-of-variance-in-soil-research-let-the-analysis-fit-the-action
Tag Archives: BBG Effective immediately, the Broadcasting Board of Governors (BBG), an independent U.S. government agency that employs thousands of talented journalists, storytellers, and media professionals, is now the U.S. Agency for Global Media (USAGM). The U.S. Agency for Global Media is a modern media organization, operating far beyond the traditional broadcast mediums of television and radio to include digital and mobile platforms. The term “broadcasting” does not accurately describe what we do. The new name reflects our modernization and forward momentum while honoring our enduring mission to inform, engage and connect people around the world in support of freedom and democracy. We recognize the overdue need to communicate the evolving, global scope of our work as well as our renewed, urgent focus on the agency’s global priorities, which reflect U.S. national security and public diplomacy interests. USAGM is an independent federal agency that provides accurate, professional, and objective news and information around-the-globe in a time of shifting politics, challenging media landscapes, and weaponized information. Our identity and name will now address these realities. The decision to change our name was a result of thorough research and extensive consultation with numerous internal and external stakeholders, including the BBG Board of Governors, agency staff and leadership at all levels, the five networks, Congress, the Administration, and interagency colleagues. As with the BBG, the U.S. Agency for Global Media encompasses five networks: the Voice of America (VOA), Radio Free Europe/Radio Liberty (RFE/RL), the Office of Cuba Broadcasting (Television and Radio Martí), Radio Free Asia (RFA), and the Middle East Broadcasting Networks (MBN). These networks collectively reach an unduplicated weekly audience of 278 million people in 59 languages and in more than 100 countries. Insulated by a firewall from political influence, these networks will continue to deliver truth and professional journalism to people living in some of the world’s most closed societies. Now more than ever, people around the world need access to the truth. USAGM continues to tell the truth, and illuminate the world like no other news organization in the world. Brian A. Nichols, of Rhode Island, a Career Member of the Senior Foreign Service, Class of Career Minister, to be Ambassador Extraordinary and Plenipotentiary of the United States of America to the Republic of Zimbabwe. Michael Pack, of Maryland, to be Chief Executive Officer of the Broadcasting Board of Governors for the term of three years. (New Position) Elad L. Roisman, of Maine, to be a Member of the Securities and Exchange Commission for a term expiring June 5, 2023, vice Michael Sean Piwowar, resigned. Geoffrey Adam Starks, of Kansas, to be a Member of the Federal Communications Commission for a term of five years from July 1, 2017, vice Mignon L. Clyburn, term expired. Casey Wardynski, of Alabama, to be an Assistant Secretary of the Army, vice Debra S. Wada. Michael Pack is a Senior Fellow of the Claremont Institute, formerly serving as president from 2015 to 2017. Pack founded Manifold Productions, an independent film and television production company, in 1977. From 2003-2006, Mr. Pack served as senior vice president for television programming at the Corporation for Public Broadcasting, where he restructured the programming department and launched several new initiatives. These included: America at a Crossroads (a series of 20 documentary films addressing issues facing America in the wake of the attacks of 9/11) and the American History and Civics Initiative (innovative, new media designed to address the crisis of historical amnesia in middle and high school students). In 2002, President Bush nominated and the Senate confirmed Mr. Pack to serve on the National Council on the Humanities, which oversees the National Endowment for the Humanities. He served from July 2002 to February 2005. In 1993, Mr. Pack served as co-chair of the International TV Council at the Corporation for Public Broadcasting. In this capacity, he oversaw the Council’s efforts to determine the feasibility of launching a cooperative program between American public television producers and stations and their counterparts in Eastern Europe and the former Soviet Union. Previously, Mr. Pack received a political appointment as director of WORLDNET, the U.S. Information Agency’s global satellite network. WORLDNET produced, acquired, and distributed programs to over 127 countries and over 200 cities on all continents twenty-four hours a day. WORLDNET, now called VOA-TV, has merged with the Voice of America. Mr. Pack attended Yale College, the University of California at Berkeley, and studied film at New York University. BBG Sets Itself a Series of Five-Year Goals The Broadcasting Board of Governors has a definite goal for the next five years — advance America’s national interests, work in tandem with the current administration’s national security strategies, and keep its networks up to speed with the way the media landscape has changed. The board, known widely as BBG, recently released its 2018–2022 Strategic Plan titled “Information Matters: Impact and Agility in U.S. International Media.” The plan was presented to the board during the group’s March board meeting in Washington. “This plan is a comprehensive roadmap for moving the agency forward in the next five years, including significantly increasing our audience reach,” said BBG Chief Executive Officer and Director John F. Lansing.[…] Many thanks to SWLing Post contributor, Richard Langley who shares the following item from Kim Elliott. Note that this news is dated February 22, 2018 (yes, it was lost in my drafts folder!): Broadcasting Board of Governors budget request includes plans for shortwave Kim Andrew Elliott 22 February 2018 The Broadcasting Board of Governors, consisting of VOA, RFE/RL, Radio Free Asia, Radio/TV Martí, Radio Sawa and Alhurra, is slated for a $24 million budget reduction in fiscal year (FY) 2019. Of course, Congress will review and probably will modify the President’s budget request for BBG and other agencies. Here are excerpts from the budget request pertaining to shortwave: “TSI [Technology, Services and Innovation, i.e. BBG engineering] continues to move the BBG from traditional broadcasting technologies, such as cross-border radio transmissions shortwave (SW) and medium wave (MW serving regions where these platforms are no longer popular, to other delivery systems that are rapidly growing in effectiveness and are less expensive to operate (e.g., FM radio, DTH satellite, internet streaming, mobile, and social media). … “As part of its multi-year global network realignment, TSI will continue to focus efforts on upgrading its shortwave capacity at the Kuwait Transmitting Station, even as use of SW decreases. With superior strategic location and extremely low operating costs, this station will be able to serve the overwhelming majority of legacy SW audiences in the most cost-effective manner possible, at a fraction of the cost of other BBG operated site or expensive leased capacity. … “Over the years, the use of shortwave (SW) radio has declined globally. TSI has responded by consolidating broadcasts to more cost-effective transmitting stations and reducing or even eliminating SW where it is no longer relevant. In markets where SW does still retain a sizable, valuable audience, TSI is committed to making SW service available in the most cost-effective way possible. To meet this need, TSI has been upgrading the Kuwait Transmitting Station (KTS), which enjoys a superior strategic location and extremely low operating costs. In FY 2017 TSI continued to expand that facility, and in FY 2018 TSI will procure and install new antennas. In FY 2019, TSI is committed to investing in the KTS expansion further, utilizing whatever resources may be available, in order to realize longer-term savings. Ultimately, the BBG’s goal is to be able to serve most legacy SW audiences from this one site, at a fraction of the cost of all the other transmitting stations, so that other, more expensive sites may be scaled back or closed. Philippines relay will close “In FY 2017, TSI completed the closure of the station in Sri Lanka and in FY 2018 will close the BBG facility in Poro, Philippines. TSI’s systematic and thorough review of all transmission leases will continue in FY 2019, identifying further opportunities for savings. In the years between 2010 and 2016, total costs associated with Cross Border Radio (SW and MW ) have declined by over $25 million (34.5%), and we expect this decrease to continue as we respond to market needs and as the Administration and Congress authorize us to shutter less effective legacy facilities … “[I]n China, including Tibet, TSI will continue to provide satellite TV and radio service via Telstar 18, the most popular satellite in China, for only a fraction of the cost of the BBG’s legacy shortwave and medium wave transmissions to the region. This allows TSI to leverage the widespread use of satellite receiver dishes across the country and provide accessible programming where local cable and internet access is restricted. In FY 2018, TSI will procure additional satellite capacity on this satellite, allowing BBG to simultaneously distribute HD and SD TV programming and capitalize on the migration of Chinese audiences to HDTV, while not stranding legacy SD users. … “Radio remains a very popular platform in many BBG markets, particularly Africa. BBG global weekly radio audiences increased by a stunning 28 million in 2016 alone and by 35 million since 2012. While shortwave continues to be a relevant means of delivery in several African markets, in most countries rapid growth and competition in the media market have shifted radio habits almost entirely towards FM. The BBG provides 24/7 FM radio programming in over 30 markets across the continent. … But good news for Kuwait and Greenville stations “As part of its multi-year global network realignment, TSI will continue to focus efforts on upgrading its shortwave capacity at the Kuwait Transmitting Station, even as use of SW decreases. With superior strategic location and extremely low operating costs, this station will be able to serve the overwhelming majority of legacy SW audiences in the most cost-effective manner possible, at a fraction of the cost of other BBG operated site or expensive leased capacity. … “The BCI [broadcasting capital improvement] funds in FY 2018 (and base funds in FY 2019) will be used to continue the planned reconfiguration and expansion of the shortwave broadcast infrastructure at the Kuwait Transmitting Station. This will allow BBG to enhance transmission to multiple regions, including Africa, and achieve cost savings for shortwave broadcasts. Because of the very low cost of electrical power in Kuwait, the Kuwait Transmitting Station is the least expensive IBB station to operate. This project will allow the agency to shift mission-critical but higher cost transmissions from other stations in the IBB network to Kuwait. “TSI will install and deploy three newer SW transmitters at the Greenville, NC Edward R. Murrow transmitting station enabling a doubling of frequencies servicing Cuba and making it extremely difficult for the Cuban government to effectively block Radio Marti signals into the Island. … “To serve audiences in less developed areas of the world, the BBG must continue to broadcast via traditional technologies, such as shortwave, and maintain capability and improve efficiency on these platforms by replacing antiquated equipment. But to stay relevant in competitive news markets and serve current and future audiences, the BBG must continue to invest in new cutting-edge technology. In areas where ownership and usage of shortwave radio has declined significantly, the Agency has evolved away from broadcasting in that medium. The BBG has closed transmission stations, repurposed equipment and invested these savings in platforms that the audience has shifted to, primarily television and digital media.” Affiliate links Many of you have suggested in the past that the SWLing Post join an affiliate links program. The SWLing Post now participates in two affiliate advertising programs with two large retailers that still sell shortwave radios, the Amazon Services LLC Associates Program and the eBay Partnership, designed to provide a means for sites like ours to earn advertising fees by advertising and linking to these retailers of radio products. Many of our links now function as affiliate links. This means that by clicking on these links, a small percentage of the purchase price for goods you purchase from these sellers will help support our site’s running costs. We hope you understand, and are grateful for your support. But please note that we will never create a post and product link explicitly to receive a commission. Additionally, we always try to include links to other retail options if they are available, as we support and freely advertise independent ham radio retailers. Thank you, too, for your support of these sites. Please support the SWLing Post by adding us to your whitelist in your ad blocker. Our advertisers are by invite only and are only radio related--no junk ads here! Ads are what helps us bring you premium SWLing content! Thank you so much!
Here in the dead of Winter, our year-round Herbal Allies in the evergreen family are a perfect way to entice yourself to get out into the cold, fresh air! With so many members & so many edible & medicinal ways to use them, it is hard to know where to start. They have been used in traditional Nordic & Indigenous Peoples cooking for centuries. Loaded with Vitamins C & A, as well as healing & pain-soothing properties, evergreens are main staple plants, especially for winter foraging. Easy to identify & available in nearly every climate, evergreens are a great place to start if you’re new to foraging as well. cardiovascular health. They are also traditionally used cosmetically to stimulate hair growth, & to support glowing skin & graceful ageing.
https://www.dujardinbeauty.com/learn/archives/01-2021
We are a world class research-intensive university. We deliver teaching and learning of the highest quality. We play a leading role in economic, social and cultural development of the North East of England. Attracting and retaining high-calibre people is fundamental to our continued success. What’s in it for you? Newcastle University is a great place to work, with excellent benefits. We have a generous holiday package; plus the opportunity to buy more, great pension schemes and a number of health and wellbeing initiatives to support you. Newcastle is an inclusive global University community where everyone is treated with dignity and respect. As a University of Sanctuary, we aim to provide a welcoming place of safety for all, offering opportunities to people fleeing violence and persecution. Newcastle University is committed to being a fully inclusive Global University which actively recruits, supports and retains colleagues from all sectors of society. We value diversity as well as celebrate, support and thrive on the contributions of all our employees and the communities they represent. We are proud to be an equal opportunities employer and encourage applications from everybody, regardless of race, sex, ethnicity, religion, nationality, sexual orientation, age, disability, gender identity, marital status/civil partnership, pregnancy and maternity, as well as being open to flexible working practices. Salary: Research Assistant: £29,619 - £30,502, with progression to £31,411 per annum Research Associate: £32,348 - £34,308, with progression to £42,155 per annum Closing Date: 04 September 2022 The Role A research position is available to a motivated and enthusiastic researcher interested in studying the mechanism of replication and segregation of the human mitochondrial genome. The position is in the recently established research group of Dr Tom Nicholls at the Wellcome Centre for Mitochondrial Research. The project will use a range of molecular, biochemical and cell biology techniques to study the mechanism of mtDNA segregation on a molecular and cellular level. The integration of basic science with clinical work at the Wellcome Centre for Mitochondrial Research also provides excellent opportunities for collaborative work into the molecular basis of human mitochondrial diseases. You must have an excellent primary degree in the life sciences and a PhD in mammalian or bacterial genetics, biochemistry or cell biology (or be studying towards a PhD for Research Assistant level). You must have a strong grounding in molecular biology techniques. Previous experience of confocal and super-resolution microscopy for the study of cultured cells (especially for the study of mitochondria) is desirable. You should have a strong capacity for independent scientific thought and be able to design and carry out research projects individually or as part of a team. Find out more about the Faculty of Medical Sciences here. Find out more about our Research Institutes here. This post is fixed term for a period of 19 months. For further information about the post please contact Dr Tom Nicholls at [email protected]. As part of our commitment to career development for research colleagues, the University has developed 3 levels of research role profiles. These profiles set out firstly the generic competences and responsibilities expected of role holders at each level and secondly the general qualifications and experiences needed for entry at a particular level. Key Accountabilities • Although working under the general guidance of an academic or Principal Investigator, the postholder will contribute ideas, including enhancements to the technical or methodological aspects of their studies, thus providing substantial 'added value' • Develop and carry out the specified project using appropriate techniques and equipment as outlined in the personal requirements • Determine appropriate methodologies for research, with advice and support where required • Contribute to grant applications submitted by others and in time develop own research objectives and proposals for funding • Begin to write, with appropriate support, proposals for individual research funding or, where funders do not permit this, contribute to the writing of collective bids • Assess research findings for the need/scope for further investigations • Contribute to the writing up of their research for publication and dissemination, either through seminar and conference presentations or through publications • Present research findings, either at conferences or through publications in reputable outlets appropriate to the discipline • May be involved in the supervision, with guidance, of final year undergraduate research projects and in providing support to postgraduate research students or Research Assistants • Will need to work with the support staff and, on occasions, with undergraduate and postgraduate students, and interact intellectually with other academic members of the Institute. • May contribute to events celebrating the public engagement of science/social sciences/humanities • Develop an awareness of University structures, policies and procedures and relevant issues in the higher education, research, social and political environment • Work to promote and uphold a positive research culture within the research environment The Person Knowledge, Skills and Experience • Ability to work well as part of a team and rapidly acquire new skills • Detailed subject knowledge on the topic of molecular genetics and cell biology • Likelihood of advanced skills directly related to the research projects • High level of analytical and problem-solving capability • Ability to communicate complex information with clarity and to encourage the commitment of others • Experience of research with clear transferable skills and some experience or awareness of the research environment • Presentations at conferences and/or high-quality publications Desirable • Experience of high-resolution microscopy • Prior knowledge of mitochondrial biology • Experience of molecular biology techniques, such as PCR and western blotting Qualifications • A PhD in molecular biology, cell biology or biochemistry (Research Associate) • Candidates studying for a PhD will be considered at Research Assistant level • Primary degree in the life sciences The University holds a silver Athena SWAN award in recognition of our good employment practices for the advancement of gender equality. The University also holds the HR Excellence in Research award for our work to support the career development of our researchers, and is a member of the Euraxess initiative supporting researchers in Europe.
https://jobs.ncl.ac.uk/job/Newcastle-Research-AssistantAssociate/837376001/
'The Crown' season 4 introduces the storyline of Prince Charles and Princess Diana as portrayed by Emma Corrin and Josh O'Connor. "The Crown" season 4 will introduce Emma Corrin as Princess Diana and Josh O'Connor as Prince Charles as it unveils the details of one of the most talked-about romance and marriage in the history of the British royal family. In recent interviews, Corrin sheds light on her thoughts about the Princess of Wales and portraying the iconic character. Corrin, who will be portraying the young Princess Diana and her story from the time she met and married Prince Charles, believes that Lady Diana Spencer did not expect what she got when she became a part of the British royal family. Her transition into the royal family came with lots of struggles that may have manifested into her battle with bulimia. "The coldness, the traditions, and the expectations of behavior...I don't think she expected that. I think she expected to join a family," Corrin said in the interview with Town & Country. The 22-year-old actress pointed out that history is repeating itself. "You just want to shake these tabloids and say, 'Can't you see history repeating itself?'" Meanwhile, Corrin reflected on how tough it was to get into the role with very little experience that she has on television and imitate Diana. Nevertheless, she did manage to impress a few people on sets including her co-star O'Connor and creator and writer Peter Morgan. "I was in awe of her," O'Connor said. Princess Diana is one of the most loved figures in the history of the British monarchy. Despite the controversies surrounding her relationship, she went on to become one of the most popular woman in the world. She was celebrated for her unconventional approach and personal charisma. Her friendliness and endearing reputation among the public had an impact on the royal family's reputation. However, Corrin believes that the young Diana had an "awful style." In another interview with Entertainment Weekly, Corrin states that she "loved young Diana" but it's important to "understand the trajectory that she underwent." Before Princess Diana became the fashion icon, her sense of style that reflects in Corrin's wardrobe on the show, was strange. The actress said that her sense of fashion grew with her. "That second time she meets Charles, when she's in those yellow dungarees, I just wanted to cry. I was like, are you joking? Awful. And those sweater vests. It really shows that fashion is something that grows with you," Corrin said. 3 June 1997: Diana, Princess of Wales, arrives at the Royal Albert Hall in London for a gala performance of Swan Lake by the English National BalletReuters
At the scene of a bicycle accident, if you were struck by a motor vehicle, you should consider taking the following actions to document your accident and injuries : - Call the police - Request medical attention from EMS - Record the names and addresses of any witnesses - Take pictures of any vehicles or roadway conditions that you believe were involved in your accident - Go to the hospital for an evaluation even if you don’t believe you have serious injuries Even if you are not thinking about a legal claim for your injuries, taking the above steps will protect your health as well as your rights if you later decide to bring a claim for damages. Protecting Yourself After a Bicycle Accident After getting hurt in a bicycle accident, you may be unsure of what actions you can take at the accident scene to benefit your interests and future. First and foremost, be careful what you say at the scene of an accident or later. Statements of fault can be used against you in your claim. Do not give any statements to representatives of the at-fault party or parties until you speak to a lawyer in order to protect your rights. Additionally, after a bicycle accident, the following actions serve both to protect your physical well-being as well as your legal interests: For a free legal consultation, call (212) 732-2929 Contact Law Enforcement to Report the Accident If your accident involves a collision with a motor vehicle, it is usually a good idea to call the police even if the driver suggests that the police not be involved. The New York State Department of Motor Vehicles (NYDMV) requires that following an accident that results in injury, death, or property damage of more than $1,000, the incident must be reported by a vehicle operator to law enforcement. If the involved parties fail to take this measure, they have 10 days from the accident date to report the incident to the NY DMV or their license can be suspended. Very often, a driver will suggest that the police not be involved. To be safe, always call the police and ask the driver to remain at the scene. A police report of your incident, if involving a motor vehicle, may do the following: - Connect your injuries to the accident - Compel law enforcement to write a police report, which could contain useful pieces of information, such as who was involved and who was at fault - Document the occurrence of the accident itself, which could prevent the other party from denying involvement or liability If the driver refuses to wait for the police to arrive or if you decide to allow the vehicle to leave the scene, be sure to record contact information from the driver and/or the license plate information for future reference. Request Medical Attention at the Accident Scene Following the accident, you may be tempted to refuse medical attention from the paramedics that arrive or fail to ask that paramedics come to the scene of your incident. This may not work in your best interest––especially if you sustained hidden injuries, like spinal cord trauma or a traumatic brain injury. By accepting medical attention at the accident scene, you begin a paper trail of your injuries. You also can assert from the very beginning that you were injured as a result of the accident, making it more difficult for the other party to contest certain aspects of your claim. Click to contact our personal injury lawyers today Follow-Up Care In the days following the accident, you should also follow through with your healthcare team’s recommended course of treatment. For instance, if physical therapy could help you regain a range of motion in an affected body part, you should keep up with those appointments. If you end up filing a personal injury claim or lawsuit in the future, you do not want to give the other party the chance to say that your injuries were exacerbated by your inability to follow through with medical care. Additionally, you want to do all that you can to treat your injuries and speed up your recovery. Complete a Free Case Evaluation form now Record the Names And Contact Information of All Witnesses Depending upon the circumstances of your bicycle accident, independent witnesses who can attest to the fault of a driver or the cause of your accident involving a dangerous roadway defect can make the difference between a strong claim and a weak one. If possible, identify all witnesses to your accident and record their contact information. Take Photographs at The Scene of Any Vehicles or Roadway Defects Involved Whether your bicycle accident involved a vehicle or a roadway condition, take photographs at the scene if possible which document the cause of your accident including any vehicle damage, vehicle location, roadway conditions, and other details. Even if you are physically unable to take photographs, ask another person to take photographs for you. These photographs could become quite helpful in proving our claim. Get Checked Out at the Hospital Even if you are not sure that you have sustained any serious injuries, it is always a good idea to go to the hospital after a bicycle accident to evaluate the full extent of your injuries. Not all injuries are immediately apparent and failing to obtain immediate medical attention can have catastrophic consequences. Hidden problems such as concussions or internal bleeding must be dealt with early before the conditions worsen and cause serious problems. Therefore, if EMS workers suggest that you go to the hospital, accept their advice. Review Your Case With a Lawyer After a crash, you should consult with a bicycle accident lawyer in NYC. A legal professional can review the details of your accident, establish who is at fault, and help you collect compensation for your damages. There are deadlines to filing a bicycle accident claim, so it’s crucial to take legal action swiftly. The Attorneys at Dansker & Aspromonte Associates Fight for Bicycle Accident Claimants If you or a loved one was injured in a bicycle accident, our team is determined to secure the best possible recovery in your case. We can help you secure fair and just financial compensation for your pain and suffering, healthcare expenses, and lost income. Call (212) 732-2929 for a free consultation.
https://www.dandalaw.com/faqs/what-should-i-do-at-the-scene-of-a-bicycle-accident/
Coco Chanel is a legend in the fashion world and a symbol of elegance. In fact, many consider her to be the most important fashion designer of the 20th century. She forever changed women’s fashion, mainly because she was the first to put forward the idea that women could also wear men’s clothing. Coco Chanel also forever banished fashion based on showy paraphernalia. Instead, she focused on elegance. In fact, she opted for simplicity and comfort, objectives that her company has retained to this day. Furthermore, although it wasn’t her real aim, she remains one of the figures who’s contributed the most to feminism over the tears. “During my childhood I only longed to be loved. Every day I thought about how to take my own life, although deep down I was already dead. Only my pride saved me.” -Coco Chanel- Coco Chanel’s life was extremely controversial. As often happens with successful people, she had several painful experiences, starting with her own childhood. However, she became a great creator, businesswoman, and fashion leader. She was also embroiled in several scandals. The early years of Coco Chanel Coco Chanel was born in Saumur, France, on August 19, 1883. Her real name was Gabrielle, given to her by the local nuns. She was the daughter of a street vendor and a laundrywoman, who were pretty poor. She had five siblings: Julia, Alphonse, Antoinette, Lucien, and Augustin, who died as a baby. They all grew up in squalid conditions. Her mother suffered from asthma but received little medical attention. In fact, she died of bronchitis when Coco was 11 years old. Coco and her sister then went to a charity house run by nuns. There, they were subjected to extreme discipline. However, they were also taught to embroider, sew, and iron. When Coco was 18, she went to another boarding school in Moulins. It was there that she met her aunt Adrianne, who was just two years older than her. The two were inseparable until death. For Coco, her sad and miserable past was a constant source of shame. In fact, she often made up stories to try and hide it. From apprentice to teacher Together with her aunt Adrianne, Coco began working as a tailor’s assistant in Moulins. There, they honed their sewing skills and learned hat-making. Coco also liked singing. In fact, she got a singing contract and often sung the song “Who’s seen Coco in the Trocadero?”. It was from here that she obtained her pseudonym under which she would later become famous. She began designing and later selling hats, with remarkable success. Around this time she met Etienne Balsan and became his lover. His riches allowed her to discover luxury and extravagance. He started inviting her to horse races and that’s when she decided to order pants from a tailor, to feel comfortable. Coco and Etienne went to Paris together. There, she met Arthur Capel. With his and Etienne’s help, she set up her first formal hat business. In 1910, thanks to Capel, she founded the first House of Chanel in Paris. Finally, she went to live with Capel, with whom she had long been in love. Coco Chanel: an unquestionable success From that time on, Coco Chanel was extremely successful. Her fame began to grow, and since she had the ability to always rise to a challenge, she started to consolidate her own particular style. In fact, Coco Chanel’s simplicity, comfort, and elegance were her hallmarks. At one point she was expecting a baby, but sadly, she lost him and with him the possibility of being a mother. After eight years, Arthur Capel left her to marry a noblewoman. Nevertheless, after a while, he left his wife and went back to Coco. Later, she designed a wedding dress for her sister. However, her sister was unhappy in her marriage and committed suicide. Since then, the House of Chanel has never designed wedding dresses. In 1919, Capel, her great love, died in a car accident. Those were dark days for Coco Chanel, but she later returned to her work. She introduced rabbit fur into clothing which was a resounding success. A little while later, she met Igor Stravinski and the two fell madly in love. Coco Chanel: an unexpected end Although her relationship with Igor Stravinsky lasted a long time, he was married. Coco then met Duke Dmitri, a nobleman expelled from Russia. He had been one of the assassins of the notorious Rasputin. The two began an affair and he gave her the Romanov dynasty’s pearls, which he’d managed to save. With that gift, Coco started a trend. She later introduced the fashion of knee-length skirts. Up to then, women had only worn long skirts. In 1921, she launched her famous Chanel No. 5 perfume. It contained 80 separate ingredients and became a classic. She also launched the fashion for “the little black dress”. Previously, black had only been worn for mourning. Later, she was appointed MGM’s official designer in Hollywood. In 1934, she became engaged to Paul Iribe, but he died of a heart attack shortly after. She then had an affair with a German diplomat. She continued to achieve success in the fashion world well into her 80s. However, one day she called out to her maid: “You see, this is how you die.” Then, she passed away. 10 Amazing Lessons from Coco Chanel The post Coco Chanel: Biography of a Symbol of Elegance appeared first on Exploring your mind.
https://chmpsy.com/2021/08/18/coco-chanel-biography-of-a-symbol-of-elegance/
Most research on framing has focused on media and elite frames: the ways that the mass media and politicians present information about issues and events to the public. Until now, the process by which citizens' opinions may affect the initial frame-building process has been largely ignored. The two-way flow of influence between public opinion and decision-makers has been analyzed more from a top-down than a bottom-up perspective. Olmastroni addresses this issue by introducing a cyclical model of framing. Additionally, most empirical studies on media framing have centered on the United States. Olmastroni's text seeks to overcome this limitation of prior research by examining different types of framing in three different countries.Framing War uses the recent war on Iraq as a case study, focusing on the elite and media framing of this event in order to examine the interaction between the political elite and the mass public in three Western democracies-France, Italy, and the US-during the early and on-going stages of the military crisis. The book analyzes whether and, potentially, the extent to which decision-makers tracked and responded to public opinion in presenting their foreign policy choices. It examines the strategies and approaches that governments potentially adopted to influence public opinion towards either the need for or the lack of need for a military intervention. By representing the framing paradigm as a cycle, Olmastroni shows how each actor within the system (i.e., government and other elites, news media, and public opinion) is linked to the others and contributes to the final representation of an issue.In contrast with other theoretical perspectives of framing, this book states that the framing influence does not only proceed from the government to the public, but it often moves at the same level of the system, with each actor playing different roles. Olmastroni's insights on framing are significant for researchers in international relations, political communication, public opinion, comparative politics, and political psychology, as well as policy analysts, journalists, and commentators.
https://www.hoferlife.at/de/ebook-download/sozialwissenschaften-recht-und-wirtschaft/paedagogik/framing-war/p/2014110300388
The Botanical Garden in Rio de Janeiro or Jardim Botânico is located at the Jardim Botânico district in the Zona Sul of Rio de Janeiro. The Botanical Garden of Rio sits at the top of the list of the world’s biggest gardens, with an impressive 1.400.000 square meters, out of which only 540.000 can be visited. It shows the diversity of Brazilian and foreign flora. There are around 6,500 species (some endangered) distributed throughout the park. There are numerous greenhouses, and the garden also houses monuments of historical, artistic and archaeological significance. There is an important research center, which includes the most complete library in the country specializing in botany with over 32,000 volumes. The garden also works as a botanic school, where PHD students from all over the world come try their degree. On this RioLIVE! Activity, as we walk around this huge garden, we are going to enjoy the views and beautiful natural corners around. We are going to see lots of different orchids, bromeliads, will know some Brazilian history and will discover why almost all the species on the Botanical Garden in Rio de Janeiro are not local species. If we are lucky we will get to see the garden’s wildlife as well, since the monkeys, toucans, cranes, armadillos and lizards live free in it. It’s going to be a pleasant and healthy walk! Join us and let us explore this amazing place together…is there a better set up to practice our Portuguese skills and learn on the go? Didn’t think so =) See on the links below how RioLIVE! Jardim Botânico visits are: Portuguese language Students at Botanical garden in Rio.
https://rioandlearn.com/botanical-garden-in-rio-de-janeiro/
Many people like trading foreign currencies on the foreign exchange forex market because it requires the least amount of capital to start day trading. Forex trades 24 hours a day during the week and offers a lot of profit potential due to the leverage provided by forex brokers. Forex trading can be extremely volatile, and an inexperienced trader can lose substantial sums. The following scenario shows the potential, using a risk-controlled forex day trading strategy. Every successful forex day trader manages their risk; it is one of, if not the most, crucial elements of ongoing profitability. The row called "Net Cash Flow" sums up the cash outflow and cash inflow for each year. The final column shows the total cash flows over the five-year period. In this case, the IRR is now only 5. The substantial difference in the IRR between these two scenarios—despite the initial investment and total net cash flows being the same in both cases—has to do with the timing of the cash inflows. In the first case, substantially larger cash inflows are received in the first four years. Because of the time value of money , these larger inflows in the earlier years have a positive impact on IRR. The biggest benefit of ROI is that it is a relatively uncomplicated metric; it is easy to calculate and intuitively easy to understand. ROI's simplicity means that it is often used as a standard, universal measure of profitability. As a measurement, it is not likely to be misunderstood or misinterpreted because it has the same connotations in every context. There are also some disadvantages of the ROI measurement. First, it does not take into account the holding period of an investment, which can be an issue when comparing investment alternatives. One cannot assume that X is the superior investment unless the time frame of each investment is also known. Calculating annualized ROI can overcome this hurdle when comparing investment choices. Second, ROI does not adjust for risk. It is common knowledge that investment returns have a direct correlation with risk: the higher the potential returns, the greater the possible risk. This can be observed firsthand in the investment world, where small-cap stocks typically have higher returns than large-cap stocks but are accompanied by significantly greater risk. If an investor hones in on only the ROI number without also evaluating the associated risk, the eventual outcome of the investment decision may be very different from the expected result. Third, ROI figures can be exaggerated if all the expected costs are not included in the calculation. This can happen either deliberately or inadvertently. For example, in evaluating the ROI on a piece of real estate , all associated expenses should be considered. These include mortgage interest , property taxes , insurance, and all costs of maintenance. These expenses can subtract a large amount from the expected ROI; without including all of them in the calculation, a ROI figure can be grossly overstated. Finally, like many profitability metrics, ROI only emphasizes financial gains when considering the returns on an investment. It does not consider ancillary benefits, such as social or environmental goods. Return on investment ROI is a simple and intuitive metric of the profitability of an investment. There are some limitations to this metric, including that it does not consider the holding period of an investment and is not adjusted for risk. However, despite these limitations, ROI is still a key metric used by business analysts to evaluate and rank investment alternatives. Financial Ratios. Your Money. Personal Finance. Your Practice. Popular Courses. Table of Contents Expand. Table of Contents. ROI Example. Investments and Annualized ROI. The Problem of Unequal Cash Flows. The Bottom Line. ROI has a wide range of applications; it can be used to measure the profitability of a stock investment, when deciding whether or not to invest in the purchase of a business, or evaluate the results of a real estate transaction. ROI is calculated by subtracting the initial value of the investment from the final value of the investment which equals the net return , then dividing this new number the net return by the cost of the investment, and, finally, multiplying it by ROI is relatively easy to calculate and understand, and its simplicity means that it is a standardized, universal measure of profitability. One disadvantage of ROI is that it doesn't account for how long an investment is held; so, a profitability measure that incorporates the holding period may be more useful for an investor that wants to compare potential investments. Compare Accounts. The offers that appear in this table are from partnerships from which Investopedia receives compensation. This compensation may impact how and where listings appear. Investopedia does not include all offers available in the marketplace. Related Articles. ROI: What's the difference? Partner Links. Related Terms Return on Investment ROI Return on investment ROI is a performance measure used to evaluate the efficiency of an investment or compare the efficiency of several investments. Going back to our example from Method 1, we want to identify the initial value of the investment. Now we must identify the final value of the investment. This is essentially your sale price less any costs you incurred during the sale. Next, we'll subtract the final value of the investment by the initial value before we divide by the cost of the investment:. You should get a decimal that reads 0. The final step is to take the 0. You'll notice that this figure is the same as our result from the first calculation since we did not add any other costs to the mix. This shows you 2 different ways to get to the same ROI result, so use whichever you feel the most comfortable with. Here is how we can calculate an annualized ROI for the real estate investment example we used above. If you were to use the straight-line method of calculating your Annualized ROI, the formula will be as simple as:. However, due to the straight-line method ignoring the effects of compounding over time, which can make an investment significantly more or less valuable depending on how you leverage the purchase, we will use the initial formula discussed above. Since this was a home you lived in, there were no additional income sources to increase your ROI. If you decided to rent the home out for 5 years instead, then your ROI would include the rental income received each year, making your ROI value a much bigger percentage, thus increasing your Annualized ROI accordingly. You can use ROI to:. You can then use the formula to identify your margin to figure out how much more you can put into the businesses to expand and make the value of your businesses even more profitable. Marketers can use ROI calculations to see the success of their outreach to potential customers. By measuring marketing efforts, you can also see the success of the company's sales team in the number of customers they were able to sign up for services offered or products sold through the marketing dollars spent. Overall, a company's executive can see how ROI is affecting the company's operations. Total capital employed refers to a figure that focuses on the number of total assets you have to invest in your business. These assets would help you increase production to create more products to sell. The cost of the additional assets or capital employed to marginally increase your production would help you determine ROI based on the increased business sales from assets. ROI can be beneficial in many business or investment cases and helps an investor understand how well they can leverage their current assets to produce more assets. The ROI is generally an easy calculation to see how attractive an investment can be for an investor. Here are a few added benefits of an ROI:. ROI shows the success you've had in investments, whether that means stocks, real estate or a business venture. You'll know the quality of the investments based on your returns. Buying additional assets or increasing marketing ad spend can usually generate a marginal increase in sales. While it is hard to determine an exact amount of results in certain cases, ROI helps you forecast how much growth can be achieved by spending on assets or marketing to expand your sales. While ROI can be beneficial in some areas, it is lacking in others. Below are a few disadvantages of an ROI:. The holding period of an investment can really make or break the decision of even getting into the investment in the first place. In real estate investments, for example, if there is no rental income opportunity from the property and there is more supply than demand for homes in the area over time, your ROI may show a false picture when compared to your annualized ROI. It may show you the investment to be profitable, but over time it may not be as valuable. When comparing multiple investment opportunities to choose from, ROI may not help you understand the risk associated with each investment. Select Region. United States. United Kingdom. Emily Guy Birken, Benjamin Curry. Contributor, Editor. Editorial Note: We earn a commission from partner links on Forbes Advisor. Commissions do not affect our editors' opinions or evaluations. What Is ROI? How to Calculate ROI To calculate return on investment, divide the amount you earned from an investment—often called the net profit, or the cost of the investment minus its present value—by the cost of the investment and multiply that by How to Use ROI ROI may be used by regular investors to evaluate their portfolios, or it can be applied to assess almost any type of expenditure. What will happen if I lose the money I invest? How much profit do I need for this investment to take on the prospect of losing money? The Bottom Line ROI is an understandable and easily calculated metric for determining the efficiency of an investment. Was this article helpful? Share your feedback. Send feedback to the editorial team. Rate this Article. Thank You for your feedback! Something went wrong. Please try again later. Best Ofs. Investing Reviews. More from. What Is A Limit Order? How Does It Work? By Kat Tretina Contributor. Information provided on Forbes Advisor is for educational purposes only. Your financial situation is unique and the products and services we review may not be right for your circumstances. We do not offer financial advice, advisory or brokerage services, nor do we recommend or advise individuals or to buy or sell particular stocks or securities. Performance information may have changed since the time of publication. Past performance is not indicative of future results. Forbes Advisor adheres to strict editorial integrity standards. To the best of our knowledge, all content is accurate as of the date posted, though offers contained herein may no longer be available. Emily Guy Birken Contributor. Benjamin Curry Editor. The Forbes Advisor editorial team is independent and objective. To help support our reporting work, and to continue our ability to provide this content for free to our readers, we receive compensation from the companies that advertise on the Forbes Advisor site. This compensation comes from two main sources. First , we provide paid placements to advertisers to present their offers. This site does not include all companies or products available within the market. The compensation we receive from advertisers does not influence the recommendations or advice our editorial team provides in our articles or otherwise impact any of the editorial content on Forbes Advisor. So ROI becomes a quick way for screening potential investments. This seems pretty simple, but actually doing the calculation can be quite involved. An ROI model is simply a list of all the inputs benefits and costs and the maths needed to turn those benefits and costs into dollars. It comprises a mix of data current call volume and assumptions by how much will we reduce call volume. This raises a really important point. It is, by definition, incomplete. As such, when you present your model, you should also list the important assumptions and inputs of that model. Accounting software. This blog looks at the ROI of accounting software. This is a pretty simple calculation based on taking a process and reducing the amount of time spent on that process - in this case, doing the accounting for your business. This article shows how you need to make assumptions in order to calculate the ROI of your investment in training. This article looks at how to calculate an ROI for a project. Risk reduction. This blog shows how the avoidance of risk can be quantified and built into your ROI model. Self-service operations. This blog shows how you can capture a number of benefits and aggregate them. It also highlights one of the biggest weaknesses of ROI as a metric - it completely misses the difficult to financially quantify improvement in customer experience. Automated services, as we all know, can make the customer service process better or worse, and this effect is simply not part of the ROI calculation. But imagine I now have 6 variables that drive my savings and 5 that drive my costs…. This is especially true when I need to do a few calculations before working out the final ROI. Using a spreadsheet can let you make your assumptions visible. The process of putting a spreadsheet together can be really helpful because it forces you to think through each step in the value-cost chain. This all helps make your ROI more robust and more credible. As we mentioned earlier, your ROI model will usually involve some assumptions. This will take you some effort to do in Excel, but is well worth it. Vendors will often provide you with online ROI calculators for their product. They are useful but you should be careful; they are often sales tools built to sell you the process or solution. Often, this is a black box where you put numbers and get a result. As such, it can be a good idea to use online ROI calculators as a quick check, but then build your own model based on the benefits and costs you are likely to realize within your organization. This blog gives some good tips for anyone planning to build an online ROI calculator. It might give you some inspiration… or it might just help you better understand the limitations of these tools. Here are some examples of ROI calculators that organizations have published online. They fall into two main categories; a problem with the ROI calculations or using ROI when you should use something else. They typically then go on to talk about mapping out cash flows and using discount rates to account for the time-value of money to calculate your ROI. Actually, these articles are plain wrong. The people writing these articles are not stupid - quite the opposite. They are wrestling with two conflicting forces. On one hand, managers like a good ROI. They feel like they know what to do with it. On the other hand, ROI is often the wrong tool. You should avoid ROI when. Your benefits are non-financial. In this case, techniques such as the analytic hierarchy process are far more appropriate and you can include ROI as one of the criteria. You are comparing projects or initiatives that have very different time- or risk-profiles. Will there be any supply-chain issues? If you compare the ROI of these two investments, it will be a totally unfair comparison and you may end up with a portfolio of very risky investments. This essentially comes down to the fact that ROI is incomplete as a way of making decisions. What are the common mistakes in the way ROI is used? This is where you overestimate the benefits and underestimate the cost. The best way to avoid it? Have someone who is impartial build or evaluate the ROI model and its assumptions. Is the model complete? Are the assumptions reasonable? Well, in that case, including the database upgrade cost in your project will unfairly reduce your ROI. Other projects that are going on around you can increase or decrease your ROI Your ROI is a number, derived from a model that was created at a particular point it time. This cost avoidance should be part of your ROI. If not, you have underestimated the cost of your project. Increases in working capital, upgrades to enabling infrastructure and compliance costs are all examples of potential hidden costs. Most of us operate in complex organizations. People from other teams will think of benefits and costs that you miss. They may spot errors in your calculation. In short, collaboration makes your model stronger. We touched on this with the tornado charts earlier - every model has its assumptions and there is usually some uncertainty in those assumptions. How do you actually use ROI to make decisions and win support? This is probably the most common use-case for ROI. This is about 2 things. Other ways might be to use market data or case studies to inform your assumptions e. Think about diamonds. But put a well-cut diamond into the right setting and it becomes a thing of true beauty. The document, or presentation, you wrap around your ROI will help you push your project through to approval. A summary of the key business benefits of your project. If possible, tie those benefits to your organization's strategic goals or KPIs. A list of benefits for different stakeholders - especially if some of those stakeholders are sitting at the table! The ROI you expect. This might take the form of a tornado chart see above and might include steps you could take to reduce the risks. Do you need people, budget, some executive time? I would usually also include next steps… the first of which is explicit agreement and support for your project. Imagine you are responsible for delivering a major project within your organization. How do you win support from stakeholders, from resource managers and from people who will be affected by your project? This support will be essential if your project is to succeed. Well, not surprisingly, the answer is a little bit like what you did to sell the project in the first place see above. This will help them understand why your initiative is important, how it might affect them and what they can do to minimize risk. But overall, performance will smooth out to around this amount. That said, determining the appropriate ROI for your investment strategy requires careful consideration rather than a simple benchmark. ROI is not without limitations. First and foremost, ROI does not take time into account. Annualized ROI can help avoid this limitation. To calculate annualized ROI, you need to employ a little bit of algebra. The value n in the superscript below is key, as it represents the number of years the investment is held. The formula would look like this:. Accurate ROI calculations depend on factoring in all costs, not merely the initial cost of the investment itself. Transaction costs, taxes, maintenance costs and other ancillary expenditures need to be baked into your calculations. Finally, an ROI calculation that depends on estimated future values but does not include any kind of assessment for risk can be a problem for investors. It is easy to be tempted by high potential ROIs. But the calculation itself does not give any indication of how likely that kind of return will be. This means investors should tread carefully. ROI is an understandable and easily calculated metric for determining the efficiency of an investment. This widely used calculation allows you to compare apple-to-apples among investment options. But ROI cannot be the only metric investors use to make their decisions as it does not account for risk or time horizon, and it requires an exact measure of all costs. Emily Guy Birken is a former educator, lifelong money nerd, and a Plutus Award-winning freelance writer who specializes in the scientific research behind irrational money behaviors. Her background in education allows her to make complex financial topics relatable and easily understood by the layperson. With two decades of business and finance journalism experience, Ben has covered breaking market news, written on equity markets for Investopedia, and edited personal finance content for Bankrate and LendingTree. Select Region. United States. United Kingdom. Emily Guy Birken, Benjamin Curry. Contributor, Editor. Editorial Note: We earn a commission from partner links on Forbes Advisor. Commissions do not affect our editors' opinions or evaluations. What Is ROI? How to Calculate ROI To calculate return on investment, divide the amount you earned from an investment—often called the net profit, or the cost of the investment minus its present value—by the cost of the investment and multiply that by How to Use ROI ROI may be used by regular investors to evaluate their portfolios, or it can be applied to assess almost any type of expenditure. What will happen if I lose the money I invest? How much profit do I need for this investment to take on the prospect of losing money? The Bottom Line ROI is an understandable and easily calculated metric for determining the efficiency of an investment. Was this article helpful? Share your feedback. Send feedback to the editorial team. Rate this Article. Thank You for your feedback! Something went wrong. Please try again later. Best Ofs. Another more accurate technique is the internal rate of return IRR method. All kinds of returns in the form of yields, benefits and inflows are basically taken into account when calculating the ROI. The definition of returns in project management is not that straightforward though. The benefits of projects are often more complex than those of plain-vanilla financial instruments. They may consist of both qualitative and monetary benefits — examples are:. You might also check existing requirements for profitability analyses and business case evaluations within the organization you are working for. The same recommendation holds true for the question of whether taxes are to be taken into account. While some organizations and investors prefer including tax effects into an ROI calculation, others may separate those aspects to reduce complexity or allow for a more holistic assessment of tax effects. Whichever scope of returns you are defining and using, make sure you are applying these criteria to all options you are comparing. This is to ensure a level playing field among the alternatives and ensure the comparability of your results. Similar to the considerations for the scope of returns, you will have to define the investment and cost that you include in your evaluation. For financial investments, you are probably able to determine the costs of incurring and managing an investment, besides the initial investment amount. In projects, there is usually a distinction in different types of costs. Most fundamental is the decision on how direct and indirect costs are treated. Certain costs may be part of the investment — e. While this does not necessarily change the return amount which is a net return anyway, it will affect the denominator. The more cost types you include in your total investment amount, the lower the ROI value. When you compare different alternatives, you should therefore allocate cost types in a consistent manner and be aware of the effects it may have depending on the characteristics of the alternatives. Fill in the expected returns and the calculated investment. For the assumptions and components that need to be considered, refer to the previous section. The calculator will determine the basic ROI which can be used for single-period tenors or investment alternatives with an identical timeline. In this example, a company is comparing 3 investment alternatives with different characteristics and returns. All three alternatives require an initial investment in year 0 negative cash flow and come with a single payment at maturity that consists of the repayment and the return. A calculation of the basic Return on Investment and the multi-year ROI leads to the following results:. The alternatives 1 and 2 are both repaid in period 3. Thus, the basic ROI would be sufficient to compare these two alternatives. If alternative 3 is included in the comparison, the multiple-period ROI needs to be used to consider the different tenors. Using the annualized return as the only criterion, alternative 3 would be the most profitable investment with In this example, three project options are compared with each other. These numbers have been used for other investment evaluation approaches as well — refer to our cost-benefit analysis overview to learn more details as well as the results of other methods. Comparing the ROIs of the 3 project options reveals a minor advantage of option 1 over option 3 while option 2 looks much less appealing. As the projections of all options have a time horizon of 6 years, a ranking based on the annualized return would lead to the same result unless returns were compounded. Considering the characteristics of the 3 cash flow projections, the use of the ROI methods for this example is not ideal. Inflows and outflows differ significantly among the options and periods. While the return on investment is a popular and widespread measure, it comes with a number of pros and cons described below. As important as the fundamental advantages and disadvantages of this technique is the way the ROI is used in your analysis. For use in project management, there are various alternatives to an ROI. These include payback period , benefit-cost ratio , net present value and internal rate of return. Each of these success measures comes with its respective advantages and disadvantages. Return on investment (ROI) is a performance measure used to evaluate the efficiency of an investment or compare the efficiency of several investments. In comparison to gross return, net return considers all costs associated with the acquisition of the investment. First of all, the costs of an investment. There are multiple methods for calculating ROI. The most common is net income divided by the total cost of the investment, or ROI = Net income / Cost of.
https://phisl.xyz/founder-of-forex/2020-01-18-net-return-investment.php
Acute blood loss leads to decreased cardiac output, tachycardia, hypotension, and hypovolemic shock. Inadequate organ perfusion and oxygen delivery interfere with aerobic metabolism. Increased anaerobic metabolism leads to production of lactic acid and metabolic acidosis. The body’s buffering capacity is reduced due to loss of bicarbonate and hemoglobin during hemorrhage. The kidneys can begin to compensate for a metabolic acidosis by reabsorbing bicarbonate and secreting hydrogen ions, but this process takes time. In awake patients, the primary mechanism by which a metabolic acidosis can be compensated is by increased minute ventilation. Both peripheral and central chemoreceptors respond to decrease pH by increasing alveolar ventilation.
https://keywords.selfstudy.app/awake-acute-blood-loss-acid-base/
Rutt, Kaitlin A. MetadataShow full item record Abstract Large Eddy Simulation (LES) is a numerical technique using a filtering approach of the Navier-Stokes equations. With sufficiently fine grid spacing, LES explicitly resolves the largest, most energy-containing eddies in the Planetary Boundary Layer (PBL) which are responsible for a majority of PBL turbulent transport. This study will specifically look at a clear daytime Convective Boundary Layer (CBL) using the weather research and forecasting model for large-eddy simulations (WRF-LES). A variety of grid spacings are used ranging from 12.5 to 150 meters in the both the horizontal and vertical. Three cases represent the data with an aspect ratio of 1, constant vertical grid spacing of 12.5 meters, and constant horizontal grid spacing of 100 meters. The grid resolution of convergence is defined through analysis of CBL characteristics from 11AM to 3PM for a single day. Looking into the mean, variance, and turbulent kinetic energy (TKE) of the CBL, results show the best grid spacing for each statistic varies with the variable of interest. Further emphasis will be placed on the two-dimensional energy spectrum with respect to model resolution to aid in determining future LES modeling capabilities. Overall, convergence is found the most in case 3 (constant horizontal grid spacing of 100 meters), which indicates very little dependence in the vertical grid spacing. Some of the statistics reveal similarities in the magnitudes between cases 1 and 2, which leads to the result that finer resolution in the vertical may not always be necessary. The conclusions made in this study may vary with a different PBL setup and model.
https://ttu-ir.tdl.org/handle/2346/72717
Our mission is to help people and institutions protect their information and their privacy. We think data that security is crucial in the current digital age. Our vision is develop best data security and innovate user-friendly product. Our philosophy is focusing on the users needs and to listen to our users recommendations Open source embodies some very positive aspects of the internet - collaboration, knowledge and skill sharing towards a common goal. The results are impressive and demonstrate what can be achieved from small contributions of time and effort by a large number of people. Eluvium Browser Extension is Now Open Source! Here is our values when developing products We Naturally take on the entrepreneur spirit of problem solving when it comes to our clients Customer reviews are important for us. We always listen to them when developing products Privacy allows us to be ourselves, to think and act without the presence, interference or judgement of others. Privacy is a human right. Simplicity is the soul of efficiency. Develop an user-friendly products is one of our vision. We value software that’s easy to understand and maintain and is intention-revealing, as we know that this allows us to continue making changes with confidence, as we learn more about the problem. We are always triying to find out what our customers want and what we can do about it. In everything we do. We accept responsibility and deliver on all of our commitments.
https://eluvium.info/Home/About
A new interactive online exhibition on the fascinating story of sound technology is launching thanks to a collaboration between the National Science and Media Museum in Bradford and the University of Nottingham. Sonic Futures is a series of three online exhibits which bring objects from the Museum’s Sound Technologies Collection to life, allowing people to experiment and play with sound as well as learning about the evolution of technology. The exhibits are part of the AHRC-funded Sonic Futures project that has set out to explore how audiences listen to sounds in a museum context and to work with them to create new ways to curate the subject and deliver listening experiences in the future. From the earliest ‘wireless’ radios and cathode ray TV sets to gramophones and synthesisers, the National Science and Media Museum wants to bring these objects to life and allow audiences to hear sounds that are evocative of past times, bringing historical events back to life through the listening experience. Highlights of the exhibition includes an innovative new instrument inspired by the BBC’s Radiophonic Workshop where Delia Derbyshire famously created the Dr Who theme tune, and a series of ‘sound postcards’ created during lockdown that can be played on a virtual turntable. The exhibits have been developed as a collaboration between audience volunteers and artists, guided by the research team, to build and test new audible ways to experience the sounds of the past. The Sonic Futures project was moved online because of the Covid-19 pandemic and lockdown and the three new exhibits will allow people to engage with the museum’s sound technology collection from anywhere in the world. The first exhibit, a web-app-based interactive ‘echo machine’ launches this Friday 25th September. Sound Postcards will go live on Friday 9th October followed by the BBC Radiophonic Workshop exhibit on Friday 23rd October. Links to these exhibits will be available here. We originally wanted to overcome the challenge of bringing sound technology objects back to life in museums – who hasn’t wanted to switch that old TV or radio back on to hear what it sounds like! – but because of COVID-19, and the closure of the National Science and Media Museum, the challenge of how to help audiences listen to museum objects became even more interesting. We moved online and created virtual, interactive, exhibits which help visitors listen to sound technologies wherever they are. Annie Jamieson, Curator of Science and Technology at the National Science and Media Museum added: “We’re so pleased to be able to work with artists and our audiences to make our collections more exciting and engaging for our visitors. Sound is a relatively new area for the museum and we welcome the opportunity to be part of this project, that allows us to raise awareness of the collection. Especially in the current situation, it’s been wonderful to work with the participants to develop these resources that we can share online with everyone”. The project team is aiming to recreate the online exhibits of Sonic Futures as physical interactive displays at the National Science and Media Museum and evaluate the differences in the responses and level of engagement from the public.
https://www.miragenews.com/history-of-sound-technologies-brought-to-life-online/
Cognitive and psychosocial features of childhood and juvenile MS. To assess the impact of multiple sclerosis (MS) on cognitive and psychosocial functioning in childhood and juvenile cases. We used an extensive neuropsychological battery assessing IQ, memory, attention/concentration, executive functions, and language. Fatigue and depression were also measured. An interview on school and daily living activities was obtained from the parents. Performance of cases was compared with that of demographically matched healthy controls. Sixty-three patients and 57 healthy controls were assessed. Five patients (8%) exhibited a particularly low IQ (<70). Criteria for cognitive impairment (failure on at least three tests) were fulfilled in 19 patients (31%), whereas 32 patients (53%) failed at least two tests. Beyond deficits in memory, complex attention, and executive functions, the profile of deficits was characterized by involvement of linguistic abilities. In the regression analysis, the only significant predictor of cognitive impairment was an IQ score lower than 90 (odds ratio [OR] 18.2, 95% CI 4.6-71.7, p < 0.001). Considering the IQ score as a dependent variable, the only significant predictor was represented by younger age at onset (OR 0.7, 95% CI 0.5-0.9, p = 0.009). Depressive symptoms were reported by 6% of the cases, and fatigue was reported by 73% of the cases. MS negatively affected school and everyday activities in 56% of the subjects. In childhood and juvenile cases, multiple sclerosis (MS) is associated with cognitive impairment and low IQ scores, the latter related to younger age at onset. These aspects are of critical importance in helping children and adolescents with MS to manage their difficulties and psychosocial challenges.
Research for chinese PV industrial standards In the Chinese coastal province of Jiangsu, the IKI is contributing to the enhancement of the industrial chain and recycling of the photovoltaic sector. From April 2021 to July 2022, the IKI project teamed up with the Credit Builder Certification Wuxi Co., Ltd (CBC), a state authorized provider of inspection, testing and certification and affiliated with the national Solar Photovoltaic Product Quality Supervision and Inspection Centre. Their aim was to carry out the research project "Research on Life-cycle Carbon Reduction of Photovoltaic Industrial Chain and Promoting Systematic Recycling in Jiangsu Province.” Experts and representatives from the Jiangsu Photovoltaic Industry Association, the Wuxi Industry and Information Bureau (under the Ministry of Industry and Information Technology) and the State Grid Wuxi Company (a local branch of the Chinese power utility) were among those involved in the project. Research Achievements on PV Industry Standards In order to reduce the carbon footprint of the PV Industry Sector, a common understanding regarding criteria and standards of carbon footprint of life cycle emissions assessment must be established. Therefore, as a first step, a study on the evaluation criteria for the carbon footprint of photovoltaic products has been carried out. Three product categories for photovoltaic industry products have been developed: - crystalline silicon photovoltaic modules, - photovoltaic welding strips, - solar streetlamps. The Chinese Ministry of Industry and Information Technology, a leading ministry for the industry perspective of the PV sector, presented the research results during a meeting where rules for product categories for the carbon footprint as well as evaluation methods were discussed. Furthermore, the project collected expertise and best practices from within China, as well as from abroad, on the relevant standards for the recovery of waste silicon photovoltaic modules. The resulting study for the management of decommissioned power stations, "Grading Evaluation Standard for the Recycle of Waste Crystalline Silicon Photovoltaic Modules," is intended to serve as a basis for the evaluation of state-owned scrapped assets. Development of a Footprint Calculation Tool In order to support the PV industry with more concrete and practical measures, the research project has developed a photovoltaic carbon footprint calculation tool. Through this tool it is easier and quicker for enterprises to calculate the footprint data and to understand the carbon foot printing through life cycle assessment. Enterprises who participated in the organized workshops and dissemination events showed particular interest in the tool. Apart from the complexity of calculation of products’ carbon footprint, with only a single accounting result, the platform can finally estimate three values corresponding to the scenarios of "no recycling," "only recycling frame" and "full recycling". In this way, photovoltaic module enterprises are encouraged to pay attention to the emission reduction effects of photovoltaic recycling and act accordingly. Outlook This research project provides rich theoretical research results and practical experience for low carbon development and recycling management in the photovoltaic industry. Many well-known PV companies are communicating with the team for in-depth cooperation on PV recycling system construction. In the future, the team plans to further promote the greening of the PV industry in terms of international standard exchange, industry cooperation and platform services. Background of PV industry in Jiangsu Province China is the world’s leading country in photovoltaic (PV) production and installation, with a comprehensive industry chain, advanced technology and an international competitive advantage. The Jiangsu Province is particularly important as a PV production hub in China – the province caters to all stages of the PV supply chain, has the largest industrial scale and the highest degree of PV enterprise agglomeration. By 2021, there were more than 400 photovoltaic manufacturing enterprises with nearly 110,000 employees in the province. The photovoltaic module production capacity was about 90GW, and the output was about 70GW (accounting for nearly 40% of the national output). The rapid development of the PV industry in the province brought about questions of waste recycling. Due to the high amount of installed PV modules in Jiangsu, a responsible recycling system including a process to recover materials for end-of-life solar panels is needed. PV modules contain valuable materials such as silicon, high-quality semiconductor materials and large quantities of glass. In addition, new materials, designs and practices can help to reduce PV manufacturing’s environmental impact by minimizing waste, energy use, negative effects on human health and pollution.
https://www.international-climate-initiative.com/en/iki-media/news/china-research-project-on-photovoltaics/
Enter the total file size and total upload speed into the calculator to determine the total upload time. - Video File Size Calculator - Bit Error Rate (BER) Calculator - Bandwidth Delay Product Calculator - Mbps Calculator (MB/s to Mbps Conversion) - Transmission Delay Calculator - Playback Speed Calculator Upload Time Formula The following formula is used to calculate the total upload time of a digital file. T = FS / US - Where T is the total time - FS is the total file size - US is the total upload speed Upload Time Definition An upload time is defined as the total time it takes to upload a digital file from your computer or server to another computer or server. Upload Time Example Problem How to calculate upload time? - First, determine the total digital file size. For example, we will say the digital file, in this case, is 500 MB. - Next, convert the file size from Bytes to bits. Since most uploads or displayed in bits per second, to accurately calculate the upload time you must convert the total number of bytes to bit. This is done by multiplying the Bytes by 8. So 500 * 8 = 4,000 bits. - Next, determine your upload speed or rate. For this example, the upload speed is found to be 100 Mbs. - Finally, calculate the upload time. Using the formula above, we can calculate the upload time. 4000/100 = 40 seconds upload time. Upload Time Do upload times really matter? Upload times can be extremely important depending on the application and the person being asked. For the average day person, having a video you made upload to youtube in 30 minutes instead of 15 minutes is not a big difference. For a huge publisher or business, time is money. If you can save 15 minutes of upload time per video, and are publishing thousands of videos, that equates to a lot more money.
https://calculator.academy/upload-time-calculator/
Material: Bamboo Wood and Jute Transportation Bag. Feature: Eco-Friendly and Reusable. Sizes: Knife: 17,5cm (6,9") Fork: 18cm (7,1") Spoon: 18cm (7,1") Chopsticks: 21cm (8,3") Drinking Straw: 18cm (7,1") Drinking Straw Cleaner Brush: 20cm (7,9") Quantity: 2 Knives, 2 Spoons, 2 pairs of Chopsticks, 2 Drinking Straws, 2 Drinking Straw Cleaner Brushes, 2 Carabiners and 2 Transportation Pockets. Payment & Security Your payment information is processed securely. We do not store credit card details nor have access to your credit card information.
https://www.myjapanesehome.com/products/2-outdoor-chopsticks-sets-kakegurui
‘No Time to Die’’, the latest installment in the highly lucrative James Bond film franchise, has been delayed until November of 2020 due to the global coronavirus outbreak. Originally set to be released in April of this year, MGM reportedly further delayed the film due to the potential risk of box office failure in conjunction with keeping moviegoers safe from increased exposure to the novel virus. In his article for CNN, Frank Pallotta argues that while this is the first major film studio to delay one of their features due to the outbreak, it will most likely not be the last. While most major studios currently are maintaining their films slated release dates, this could obviously be subject to change if the pandemic is not contained on a much broader scale in the coming weeks and months. While movie chains remain open across the United States, theaters in much of Asia, specifically in China, which is the second largest market for movies in the world, have closed down in order to contain the outbreak. Upcoming films such as the latest installment in the ‘Fast and the Furious’ franchise and ‘Top Gun: Maverick’ are highly reliant on international box office success and their release dates will likely be altered as well if sweeping containment of the virus is not successful on a global scale. The global containment efforts to contain this outbreak, the likes of which have not been seen in modern times, obviously have huge implications for the entertainment industry. It will be interesting to see in the coming weeks if the disease is managed enough to where restrictions can be lifted or if other major film releases will be forced to be delayed as well. Another aspect of these delays that remains to be seen is if these movies projected box office numbers will remain consistent with their altered release dates or if they will suffer financial loses ultimately.
https://mediaissues.home.blog/2020/03/11/no-time-to-die-delayed-due-to-coronavirus-outbreak/
The Graham Library has many resources and services available to help online students succeed in their research and coursework. Library services Connecting off-campus To access the library's online resources from off-campus, students must login with their library barcode and password using the "Connect Now" button on the library homepage. For more information, see the guide to connecting off campus. If you have not received or do not remember your library barcode number, contact the DE dept or email the library at [email protected] Interlibrary loan and book requests Online students can request books and articles from both the Graham Library collection and through Interlibrary Loan (ILL). The process is the same for both services. Items may be requested from the library catalog, by emailing request information to [email protected], or by completing an ILL form through the library catalog. See the ILL page for more information about requesting books and articles. Library homepage The library homepage provides access to all of the Graham Library resources, including print and ebooks, journal articles, library services, research guides, and more. A convenient search box allows students to quickly search the library catalog, journal databases, and online through a special Google Custom Search. Bookmark this page and use it as your first step in searching for resources. Library resources Books and ebooks The Graham Library has both print and ebook collections that may be used by online students. Using the library catalog, search for print books in the Graham Library and in libraries across North Dakota. To request books using the library catalog, see the Interlibrary Loan instructions above. For links to our best ebook collections and free online ebook collections, as well as more information about using the library catalog, see the guide to finding books. The WorldCat catalog allows students to search for resources in library catalogs around the world. To request books from WorldCat, see the Interlibrary Loan instructions above. Journals and articles Online Graham Library provides access to over 70 online databases. In these resources, find articles from journals, magazines, reference books, newspapers, and more. You can also find video clips, images, ebooks, study helps for tests, and much more. For more information about using these resources, see the guide to finding articles. The Graham library also subscribes to over 40 journals in print. It is possible to search the contents of these journals by either searching the article archives on the journal websites or searching for articles by keyword in the library databases. Our guide to finding journals lists our print journals and includes links to the journal websites or to the journal in the library databases. Requesting copies of articles You can request copies of articles from either the print or online journals by emailing the information for your article to [email protected] following the instructions above for Interlibrary Loan. Online Resources In addition to the Library resources, there are many online resources available for researching Bible, theology and general studies topics. These guides list some of the best sources online for ebooks, journals articles, dissertations and theses, Bible study tools, and many other types of resources. - Online Resources Guide There are a number of digital libraries and journal databases that are freely available online and that include resources from researchers and universities from around the world. This guide links to digital libraries and journal databases that you can use to research just about any topic. - Theology Online There are many resources available online for Bible, theology and religion topics. This guide links to commentaries, reference works, current journals and digital collections of these types of resources. - Dissertations and Theses Dissertations and theses can be valuable research tools and many are freely available online. This guide lists repositories and digital libraries that provide access to dissertations and theses from around the world.
https://www.trinitybiblecollege.edu/academics/distance-resources
New Delhi: Security has been tightened at the Ghazipur flower market in Delhi, a day after an improvised explosive device (IED) stuffed with RDX and ammonium nitrate was found inside an unattended bag there ahead of Republic Day, officials said on Saturday. The IED was defused around 1:30 pm on Friday. According to police, while the flower market is not exempted from Covid curbs in the national capital, the fruit and vegetable market is spared and is functioning. “The security has been tightened in the market. The fruit and vegetable market is open as it comes under exempted category. People are requested to follow the Covid- appropriate behaviour,” Additional Deputy Commissioner of Police (east) Vinit Kumar said. Police said that a person who had come to the market on Friday to purchase flowers spotted a suspicious unattended bag near his scooty at an abandoned place. He then informed some people and also alerted the Delhi Home Guards deployed there. The person then made a PCR call around 10.30 am about the unattended bag.
https://www.eastmojo.com/national-news/2022/01/15/security-tightened-at-delhis-flower-market-a-day-after-ied-found/
Botanical nomenclature is the formal, scientific naming of plants. It is related to, but distinct from taxonomy. Plant taxonomy is concerned with grouping and classifying plants; botanical nomenclature then provides names for the results of this process. The starting point for modern botanical nomenclature is Linnaeus' Species Plantarum of 1753. Botanical nomenclature is governed by the International Code of Nomenclature for algae, fungi, and plants (ICN), which replaces the International Code of Botanical Nomenclature (ICBN). Fossil plants are also covered by the code of nomenclature. Within the limits set by that code there is another set of rules, the International Code of Nomenclature for Cultivated Plants (ICNCP) which applies to plant cultivars that have been deliberately altered or selected by humans (see cultigen). Botanical nomenclature has a long history, going back beyond the period when Latin was the scientific language throughout Europe, to Theophrastus (c. 370–287 BC), Dioscorides (c. 40 – 90 AD) and other Greek writers. Many of these works have come down to us in Latin translations. The principal Latin writer on botany was Pliny the Elder (23–79 AD). From Mediaeval times, Latin became the universal scientific language (lingua franca) in Europe. Most written plant knowledge was the property of monks, particularly Benedictine, and the purpose of those early herbals was primarily medicinal rather than plant science per se. It would require the invention of the printing press (1450) to make such information more widely available. Leonhart Fuchs, a German physician and botanist, is often considered the originator of Latin names for the rapidly increasing number of plants known to science. For instance he coined the name Digitalis in his De Historia Stirpium Commentarii Insignes (1542). A key event was Linnaeus’ adoption of binomial names for plant species in his Species Plantarum (1753). In the nineteenth century it became increasingly clear that there was a need for rules to govern scientific nomenclature, and initiatives were taken to refine the body of laws initiated by Linnaeus. These were published in successively more sophisticated editions. For plants, key dates are 1867 (lois de Candolle) and 1906 (International Rules of Botanical Nomenclature, 'Vienna Rules'). The most recent is the Shenzhen Code, adopted in 2018. Another development was the insight into the delimitation of the concept of 'plant'. Gradually more and more groups of organisms are being recognised as being independent of plants. Nevertheless, the formal names of most of these organisms are governed by the (ICN), even today. Some protists that do not fit easily into either plant or animal categories are treated under either or both of the ICN and the ICZN. A separate Code was adopted to govern the nomenclature of Bacteria, the International Code of Nomenclature of Bacteria. Botanical nomenclature is closely linked to plant taxonomy, and botanical nomenclature serves plant taxonomy, but nevertheless botanical nomenclature is separate from plant taxonomy. Botanical nomenclature is merely the body of rules prescribing which name applies to that taxon (see correct name) and if a new name may (or must) be coined. Plant taxonomy is an empirical science, a science that determines what constitutes a particular taxon (taxonomic grouping, plural: taxa): e.g. "What plants belong to this species?" and "What species belong to this genus?". The definition of the limits of a taxon is called its 'circumscription'. For a particular taxon, if two taxonomists agree exactly on its circumscription, rank and position (i.e. the higher rank in which it is included) then there is only one name which can apply under the ICN. Where they differ in opinion on any of these issues, one and the same plant may be placed in taxa with different names. As an example, consider Siehe's Glory-of-the-Snow, Chionodoxa siehei: In summary, if a plant has different names or is placed in differently named taxa: Various botanical databases such as Plants of the World Online and World Flora Online make determinations as to whether a name is accepted, eg accepted species. If a name is not accepted, it may be because the name is a synonym for a name that is already accepted, and is listed as such. Another term is ambiguous to denote a name that is not accepted because its separate existence cannot be reliably determined. For instance, specimens that are damaged, immature or the necessary information or expertise ids not available. This can lead to abundances, multiple published names for the same entity.
https://everything.explained.today/Botanical_nomenclature/
CROSS-REFERENCE TO RELATED APPLICATIONS BACKGROUND OF THE INVENTION SUMMARY OF THE INVENTION DETAILED DESCRIPTION This application claims the benefit of U.S. Provisional Application No. 61/463,765, filed Feb. 23, 2011. The content of the aforementioned application is relied upon and is incorporated by reference in its entirety. 1. Field of the Invention The field of the invention relates to fabrics and apparel, in particular women's fashion scarves. 2. Description of the Related Art A scarf comprises a piece of fabric generally worn around the neck, or near the head or around the waist for warmth, cleanliness, fashion or for religious reasons. Scarves can come in a variety of different colors and have different patterns or designs. Fashion scarves are placed around the neck of a user and folded or styled in various ways. However, all too frequently, the scarf does not hold its desired shape and often requires constant tugging, pulling, repositioning and/or tying of the scarf on the neck and shoulders of the user. Moreover, the scarves cannot be permanently sculpted and the number of ways in which the scarf can be tied is limited. U.S. Pat. No. 5,233,704 relates to a scarf or other band-like apparel member which includes a pliable metal wire positioned interiorly of the scarf and is adapted to be adjusted to the proper neck size of the wearer since the pliable metal wire which forms part of the scarf can be twisted to adjust the size of the scarf to the proper neck size. What is needed is a hassle-free fashion scarf which enables the user to create a freestyle sculpting design around the entire neck and shoulders of a user throughout the entire length of the scarf and which can be wrapped, styled, twisted and/or squeezed to create fresh new looks in fun and easy ways. This background information is provided for the purpose of making information believed by the applicant to be of possible relevance to the present invention. No admission is necessarily intended, nor should it be construed, that any of the preceding information constitutes prior art against the present invention. In one aspect, the invention provides a scarf which enables the user to create a freestyle sculpting design around their neck and shoulders. In another aspect, the invention provides a scarf comprising one or more pieces of fabric comprising one or more moldable wires that are located along at least two sides of the scarf enabling the scarf to be sculpted into a desired shape around the neck and shoulders of a user. In another aspect, the scarf is capable of being sculpted into a desired shape, and comprises a front comprising a first piece of fabric and a back comprising a second piece of fabric, wherein the first and second pieces of fabric are attached together forming a scarf with a substantially quadrilateral shape with four sides; wherein at least two sides comprise a moldable wire, wherein the wire is positioned at the periphery of the side and extends substantially along the entire length of the side of the scarf. It is to be understood that both the foregoing general description of the invention and the following detailed description are exemplary, and thus do not restrict the scope of the invention. For the purposes of promoting an understanding of the principles of the invention, reference will now be made to certain embodiments and specific language will be used to describe the same. It will nevertheless be understood that no limitation of the scope of the invention is thereby intended, and alterations and modifications in the illustrated article of manufacture, and further applications of the principles of the invention as illustrated therein are herein contemplated as would normally occur to one skilled in the art to which the invention relates. Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention pertains. For the purpose of interpreting this specification, the following definitions will apply and whenever appropriate, terms used in the singular will also include the plural and vice versa. In the event that any definition set forth below conflicts with the usage of that word in any other document, including any document incorporated herein by reference, the definition set forth below shall always control for purposes of interpreting this specification and its associated claims unless a contrary meaning is clearly intended (for example in the document where the term is originally used). The use of “or” means “and/or” unless stated otherwise. The use of “a” herein means “one or more” unless stated otherwise or where the use of “one or more” is clearly inappropriate. The use of “comprise,” “comprises,” “comprising,” “include,” “includes,” and “including” are interchangeable and not intended to be limiting. Furthermore, where the description of one or more embodiments uses the term “comprising,” those skilled in the art would understand that, in some specific instances, the embodiment or embodiments can be alternatively described using the language “consisting essentially of” and/or “consisting of.” As used herein, the term “about” refers to a ±10% variation from the nominal value. It is to be understood that such a variation is always included in any given value provided herein, whether or not it is specifically referred to. The present invention provides a fashion scarf which enables the user to create a freestyle sculpting design around their neck and shoulders. The entire scarf can be shaped and molded in a way the user wants it to look and it holds its position. The scarf comprises one or more pieces of fabric comprising one or more moldable wires that are located along at least two sides of the scarf enabling the scarf to be shaped and molded into a fixed position. The scarf provides the user with the ability to design many new and unique styles as well as conventional styles. The wires are easy to bend and control and remain relatively fixed in place. In some embodiments, the scarf can be wrapped, styled, twisted and/or squeezed to create fresh new looks in a fun and easy way. In some embodiments, the scarf has a quadrilateral shape having four sides or edges. In some embodiments, the scarf has a oblong shape with two longer sides having approximately equal length and two shorter sides having approximately equal length. In some embodiments, the scarf has a square shape. In some embodiments, the scarf has a triangular shape. Persons of skill in the art will appreciate that shapes that are substantially the same as the above noted shapes are encompassed by the invention. For example, the corners of the scarf can be rounded, instead of being at a defined angle. The scarf can comprise one or more pieces of fabric. In some embodiments, the scarf has a front and a back and comprises two pieces of fabric. In some embodiments, one piece of fabric is on the front side and one piece is on the back side and the two pieces are sewn or stitched together. In some embodiments, having two pieces of fabric makes the scarf “reversible” which enables the user to accessorize using the scarf to a greater extent possible than with a scarf made from only one piece of fabric, since different pieces of fabric having different designs, color schemes and/or patterns can be combined. In some embodiments, the two pieces of fabric are made from the same type of material and have the same color scheme, design and/or pattern. In some embodiments, the two pieces of fabric are made from the same type of material but have a different colors, designs and/or patterns. In some embodiments, the two pieces of fabric are made from different types of material. The nature of the design, color scheme and/or pattern of the fabric is not limiting. In some embodiments, the invention provides a scarf that is capable of being sculpted into a desired shape, comprising a front comprising a first piece of fabric and a back comprising a second piece of fabric, wherein the first and second pieces of fabric are attached together forming a scarf with a quadrilateral shape with four sides or edges; wherein at least two sides or edges comprise a moldable wire, wherein each wire is positioned at the periphery of the side or edge and extends substantially along the entire length of the side or edge of the scarf, wherein the wires facilitate the freestyle sculpting of the scarf into the desired design around the neck and shoulders of a user. The type of fabric that can be used to make the scarf is not limiting. In some embodiments, the fabric is made from a material selected from the group consisting of satin charmeuse, cotton, brocade, silk, chambray, challis, cendal, chiffon, nylon, georgette voile, crepe, crepon, damask, organza, satin, shantung, marocain, satinet, dupion, silkaline, velvet, velour, imitation suede, voile, poly silk and a suitable blend of different fibers, including the aforementioned materials. The size of the scarf or the pieces of fabric from which the scarf is made is not limiting. In some embodiments, the finished scarf is about 25 inches to about 85 inches by about 5 inches to about 45 inches in size. In some embodiments, the finished scarf is about 45 inches to about 65 inches by about 8 inches to about 25 inches in size. In some embodiments, the finished scarf is about 50 inches to about 60 inches by about 10 inches to about 15 inches in size. In some embodiments, the finished scarf is about 10 inches by about 58.5 inches in size. In some embodiments, the finished scarf is about 10 inches by about 54 inches in size. In some embodiments, the one or more pieces of fabric are about 28 inches to about 90 inches by about 6 inches to about 48 inches in size. In some embodiments, the one or more pieces of fabric are about 48 inches to about 70 inches by about 10 inches to about 25 inches in size. In some embodiments, the one or more pieces of fabric are about 53 inches to about 65 inches by about 12 inches to about 18 inches in size. In some embodiments, the one or more pieces of fabric are about 55.5 inches by about 10 inches in size. In some embodiments, the one or more pieces of fabric are about 56.5 inches by about 11 inches in size before being hemmed or sewn together. In some embodiments, the fabric is cut from a 58″ roll of fabric. In some embodiments, a scarf comprising two pieces of fabric is made according to a process comprising one or more of the following steps. The first and second pieces of fabric can be cut according to the desired dimensions or size, e.g. 56.5 inches by 11 inches. The two pieces of fabric are attached, e.g., sewn with their right sides together on three sides. By “right side” is meant the side of the fabric which is intended to show on the exterior of the scarf, which normally has a finer and/or more finished look or appearance. If the scarf is oblong in shape, in some embodiments, the three sides that are sewn or stitched together are typically the two longer sides and one of the shorter sides. In some embodiments, the fabric is stitched together on the three sides with a seam of about 0.25 to about 3.5 inches. In some embodiments, the fabric is stitched together on the three sides with a seam of about 0.5 inches on each side. The two pieces of fabric can then be turned with their right sides facing out to the exterior. If the scarf is oblong in shape, in some embodiments, one of the long sides can be top stitched in order to create a sleeve at the periphery of the side of the scarf for the wire to be housed or inserted, e.g., in some embodiments, of about 0.15 inches to about 0.75 inches from the periphery or edge. In some embodiments, the top stitching is about 0.25 inches from the periphery or edge. In the case of an oblong shape scarf, in some embodiments, one of the shorter sides is then top stitched, e.g., of about 0.15 inches to about 0.75 inches from the periphery or edge. In some embodiments, the top stitching of the shorter side is about 0.25 inches from the periphery or edge. In some embodiments, the other long side can then be top-stitched, e.g., in accordance with the top stitching of the other long side as discussed above. The wires can be inserted though the open ended side of the scarf and positioned at the periphery of the sides of the scarf before or after the top stitching. For example, the wires can be inserted into the sleeve or housing that is created by the top stitching of the long side through the open shorter side. In other embodiments, the wire is first placed into position at the periphery of the side and then the sleeve or housing is created by the top stitching. Once the wires are inserted, the last side of the scarf can be closed, e.g., with a seam of about 0.25 to about 3.5 inches. In some embodiments, the last side is closed with a seam of about 0.5 inches to about 0.75 inches. In some embodiments, the stitching is from about 5-20 stitches per inch. In some embodiments, the stitching is about 10 stitches per inch. In some embodiments, the scarf is made from a single piece of fabric. In some embodiments, the edge of the piece of fabric is hemmed in along the edge of the fabric creating a sleeve or housing which the wire is inserted in and the edge is then closed. In some embodiments, the stitching of the hem is typically about 0.25 inches to about 3.5 inches from the edge, or from about 0.5 inches to about 0.75 inches from the edge. The wire that can be incorporated in the scarf is not limiting, provided it is moldable. In some embodiments, the moldable wire comprises a metal selected from the group consisting of stainless steel, such as galvanized stainless steel (re-cooked), copper, aluminum, tin, titanium, and a metal alloy such as, for example, brass (copper and zinc) or bronze (copper and tin). In some embodiments, the wire has a diameter of about 0.3 mm to about 1.5 mm. In some embodiments, the size of the wire is about 0.8 mm. The wire is positioned at the periphery of the side of the scarf and extends substantially along the entire length of the side of the scarf. In some embodiments, the length of the wire is about 90% of the length of the side of the scarf where it is positioned. In some embodiments, the length of the wire is about 91%, about 92%, about 93%, about 94%, about 95%, about 96%, about 97%, about 98% or about 99% of the length of the side of the scarf where it is positioned. In some embodiments, the difference between the length of the sleeve or housing and the wire is about 1 to about 3 inches or less. In some embodiments, the difference between the length of the sleeve or housing and the wire is about 1.5 inches or less. Having the wires extend substantially along the entire sides of the scarf permit a greater degree of freestyle sculpting resulting in unique designs or designs that better hold their shape along the entire length of the scarf. In some embodiments, the wires are modified to prevent puncturing of the fabric. In some embodiments, the tips of the wires are coated, for example, with a polymer which prevents puncturing of the fabric. In some embodiments, the coating creates a tip of the wire having a bulbous or rounded shape that does not puncture the fabric. In some embodiments, the wires or tips of the wire are coated with a thermoreactive polymer, such as a RILSAN polymer. In some embodiments, the tips of the wire are coated by warming the ends followed by contacting the ends with the thermoreactive polymer. The powder form RILSAN polymer sticks to the ends of the wire and melts onto the wire due to the heat of the wire. The dipping and melting process can be performed one or more times to create a bulbous shaped end that does not puncture the fabric. Other means can also be employed to modify the tips of the wire to prevent puncturing. For example, in some embodiments, a soft material such as rubber can be affixed to the tip of the wire. In some embodiments, a soft tubing material can be inserted on the ends of the wires. The modifications of the wire can also facilitate the grasping and positioning of the wire. The scarf comprises one or more wires that are present on at least two sides of the scarf. In some embodiments, two wires are positioned on opposite sides or edges of the scarf such that the wires are substantially parallel to one another. In some embodiments, the scarf has an oblong shape with two shorter sides and two longer sides and two wires positioned at the periphery of the two longer sides. In some embodiments, one or more wires are present on three sides of the scarf. In some embodiments, one or more wires are present on all four sides of the scarf. In some embodiments, the wires can comprise one contiguous wire that is molded at the periphery of more than one side, or can comprise multiple individual wires present on each side or a combination thereof, such as, for example, one wire positioned at the periphery of three sides and a second wire positioned at the periphery of the fourth side. FIG. 1 100 101 101 102 101 103 104 103 105 103 106 Referring now to , there is shown a scarf . The scarf comprises moldable wires positioned at the periphery on two sides of the scarf. The wires are coated with a polymer at the tips creating a bulbous shape which prevents puncturing of the fabric. The wire is placed into a sleeve or housing that is created at the periphery of the side of the scarf by top stitching the two pieces of fabric and creating a seam at an edge or at side of the scarf. The sleeve or housing is closed at the bottom end by seam which can be top stitched. Once the wires have been inserted, the sleeve or housing can be closed at the top portion by creating a seam . FIGS. 2-15 The scarf can be styled in a number of ways as shown in . FIG. 10 In some embodiments, the scarf can be styled to create a look called “The Big Flip.” As shown in , to create this look, the scarf sides are adjusted around the neck to be of equal length. One side is flipped over the other side and the sides of the scarf are pulled out to create a full look. FIG. 11 In some embodiments, the scarf can be styled to create a look called “Shoulder Flower.” As shown in , to create this look, the scarf sides are adjusted around the neck to be of equal length. One side is flipped over the other side and the sides of the scarf are pulled out to create a full look. The final step is rolling all four ends under and towards the user's body. FIG. 12 In some embodiments, the scarf can be styled to create a look called “Necktie.” As shown in , to create this look, one side of the scarf is pulled down longer than the opposite side. The longer side is the side that is wrapped with while the opposite side should end at about waist level. The long side is wrapped two times at mid chest level and then the wrap is squeezed to stay in place. FIG. 13 In some embodiments, the scarf can be styled to create a look called “Side Sweep.” As shown in , to create this look, one side of the scarf is pulled down longer than the opposite side. The longer side is the side that is wrapped with while the opposite side should end at about chest level. The long side is swept up and bent at the chest level and wrapped around the short side two times. The wrap is squeezed to stay in place. FIG. 14 In some embodiments, the scarf can be styled to create a look called “Double Knot.” As shown in , to create this look, the scarf sides are adjusted around the neck to be of equal length. The right side is swept up and bent at the chest level and wrapped around the other side two times and the wrap is squeezed to stay in place. The same process is repeated on the left side. FIG. 15 In some embodiments, the scarf can be styled to create a look called “Double Wrap & Tie.” As shown in , to create this look, the scarf is wrapped around the neck from front to back and the scarf sides are brought around to the front. The corner ends are swept up to meet at the side of the neck. The corner ends are then folded over each other and squeezed to hold them in place. All references, including publications, patent applications, and patents, cited herein are hereby incorporated by reference to the same extent as if each reference were individually and specifically indicated to be incorporated by reference and were set forth in its entirety herein. BRIEF DESCRIPTION OF THE DRAWINGS The skilled artisan will understand that the drawings, described below, are for illustration purposes only. The drawings are not intended to limit the scope of the present teachings in any way. FIG. 1 100 shows an embodiment of a wired fashion scarf . FIG. 2 shows how the scarf can be styled in accordance with one embodiment. FIG. 3 shows how the scarf can be styled in accordance with one embodiment. FIG. 4 shows how the scarf can be styled in accordance with one embodiment. FIG. 5 shows how the scarf can be styled in accordance with one embodiment. FIG. 6 shows how the scarf can be styled in accordance with one embodiment. FIG. 7 shows how the scarf can be styled in accordance with one embodiment. FIG. 8 shows how the scarf can be styled in accordance with one embodiment. FIG. 9 shows how the scarf can be styled in accordance with one embodiment. FIG. 10 shows an instruction on how to style the scarf to create a look called “The Big Flip.” FIG. 11 shows an instruction on how to style the scarf to create a look called “Shoulder Flower.” FIG. 12 shows an instruction on how to style the scarf to create a look called “Necktie.” FIG. 13 shows an instruction on how to style the scarf to create a look called “Side Sweep.” FIG. 14 shows an instruction on how to style the scarf to create a look called “Double Knot.” FIG. 15 shows an instruction on how to style the scarf to create a look called “Double Wrap & Tie.” FIG. 16 107 shows an exemplary marker from which pieces of fabric can be cut to make the scarf.
NIH awards $2.5 million for health-care study of ethnic minorities Two USC occupational therapy researchers have been awarded a $2.5 million grant from the National Institutes of Health to study how minority patients can improve the care they receive from doctors. Previous research has documented health care disparities for minorities independent of socio-economic status, but few have suggested strategies to help those patients improve their outcomes, said occupational therapy professor Mary Lawlor. Lawlor and Cheryl Mattingly, also a professor of occupational therapy, will be drawing upon their previous research in their next study of how patients and doctors establish relationships and communicate with each other, and how that affects their treatment. “Families who care for children with diseases and disabilities need to learn about medical culture, and what a doctor needs to know about them,” Lawlor said. Likewise, medical professionals need to consider what other issues a family is dealing with besides one family member’s illness, and how much a caregiver can handle. The earlier research done by Lawlor, Mattingly, anthropologist Lanita Jacobs-Huey and a team of other researchers, followed African-American families who had a child with a chronic illness or disability and documented each of their health-care encounters over an eight-year period. “One of the things we’ve learned is that there’s a need to rethink cultural competence in health care systems,” Lawlor said. “We now recognize that while practitioners are working with diverse groups, there’s great heterogeneity within those groups.” To be most effective, medical providers need to identify early on a patient’s cultural definition of good care. Part of the group’s research is studying the stories that the patients use to describe their illnesses and its impact on their lives, Lawlor said. By following patients for a long time, the researchers hope to identify how an earlier medical encounter, such as a scary surgery as a child, will impact a young adult’s attitude toward medical treatment. The best care would allow a child’s life not to revolve around their illness or disability, Lawlor said, but instead focus on being a child.
https://news.usc.edu/22438/NIH-awards-2-5-million-for-health-care-study-of-ethnic-minorities/
------------------------- John Tzinieris Official Page ------------------------- FREE! DOWNLOAD NOW 8 HOURS OF JOHN TZINIERIS MUSIC! FREE! JUST CLICK HERE! Karlheinz Stockhausen (1928) (Article ID: 232 - republished on Sun 26/01/2020 from artissimo.gr) NATIONALITY Karlheinz Stockhausen (1928): Karlheinz Stockhausen is German. IN GENERAL Karlheinz Stockhausen (1928): Stockhausen is one of the biggest innovators and pioneers of modern music in Europe, who effectively used every technological means in order to promote the modern music to new directions, directions more effective and more "genuinely" artistic in relation to our epoch. As all of the composers that acted after the second world war in avant-garde music, Stockhausen began his career being influenced by the idiomorphic twelve-tome idiom of Webern, to advance rather fast to total serialism and aleatorism by making use of all available technological medium. STYLE Karlheinz Stockhausen (1928): Stockhausen was the first to be directed towards the idiom that considers music as a transformation of densities, timbres and textures that can be controlled by statistical means, and that this process by itself can give birth to new, original, "open" or accidental forms. Stockhausen's work is based on a series of proposals about the material of sound and how we can act upon it. Stockhausen used too much various electronic means - Stockhausen can easily be considered as the leader of movement of "Electronic Music" because of the studio he founded at Cologne (Germany). After the initial use of generalized serialism, Stockhausen turned - himself, too - to the Music of Accidental (aleatorism), as well as to the use of performance practices that mostly reminds us of American composers (special placement of performers at the concert space etc.). Generally, we can say that Stockhausen used every technological development in the service of avant-garde music and that he himself tried to function as both concentration point and dissemination centre of new ideas in modern music. WORKS Karlheinz Stockhausen (1928): Stockhausen's output is important and innovative - "Counterpoints" for chamber orchestra, "Groups" for three orchestras, "Crossplay" for 4 instruments, "Time Measures" for 5 winds, "Contacts" for recording tape, piano and percussion, "Star Sound", "Trans", "Autumn Music", "Sirius", "Piano Piece XI", "Moments". click here to find images of Karlheinz Stockhausen in "Google Images" (new window) Karlheinz Stockhausen (1928) Luigi Nono (1924-1990) <<< Classical Composers >>> Iannis Xenakis (1922-2001) FREE! DOWNLOAD NOW 8 HOURS OF JOHN TZINIERIS MUSIC! FREE! JUST CLICK HERE!
http://johntzinieris.com/articles_2/Karlheinz_Stockhausen.html
Although the holidays are often a time for cheer, thankfulness and positive reflection, the season can also be a difficult time for those suffering from seasonal stress, despite being surrounded by loved ones. In the busy holiday season, people tend to neglect self-care. The holidays are more enjoyable when you’re feeling rested and peaceful, so try and prioritize taking care of yourself. Not sure where to start? Here are five ways to practice self-care during the holidays. Ask for help Many people have a long to-do list during the holiday season, but it's important to remember that you don’t have to get everything done on your own. Therefore, if you’re hosting a holiday meal, make it a potluck. Jeffrey Zurofsky, Newport Academy’s Culinary Program Director, often asks his guests to help out with setting and decorating the holiday table. “One person brings flowers, another brings candles and someone else makes the centerpiece,” he said. Get enough sleep Sleep has a powerful impact on well-being and mental health. When we don’t get enough, especially during stressful times, it can wreak havoc with our emotions. In several recent studies, researchers found people who lost a night of sleep to exhibit higher levels of stress. Exercise. During the holidays, we often let our regular routines slide. Instead, stick to your exercise schedule. Multiple studies confirm that exercise positively impacts mental health. Families can even consider incorporating exercise into their holiday routines through fun activities such as turkey trots or other road races. Take moments of mindfulness wherever you find them. Stuck in a long line while grocery shopping or holiday shopping? Use the time to take six long, deep breaths. Waiting in a traffic jam at the mall? While sitting in your car, simply relax your body, moving from the toes up to the head. Even a moment or two of conscious breathing and relaxation can boost your mood significantly. Volunteer. Research shows that volunteering offers mental and physical health benefits. The holidays are a perfect time to reach out and help others. For example, families could help out at a food pantry or serve a holiday dinner at a local shelter. This is a great way to make holiday connections. To learn more about how to stay stress-free this holiday season, visit Newport Academy's website.
https://dailyvoice.com/connecticut/darien/lifestyle/create-healthy-holiday-connections-through-these-self-help-tips/745445/
The first freight train to travel from China’s East Coast trading center Yiwu to Britain arrives at a welcoming ceremony to mark the inaugural trip at Barking Intermodal Terminal near London. London is the 15th city in Europe to add China-Europe freight train service. Initiated in 2011, the service refers to the transcontinental cargo route connecting China, Europe and some other countries along the Belt and Road routes, with the goal of improving trade ties and strengthening connectivity. In light of trade protectionism and growing hostility to globalization, China is pointing to a new direction for the development of economic globalization. The new direction is an operational model of the market economy and also the optimal production model under high-tech development. The development of advanced technologies has laid a foundation for the free flow and allocation of production elements around the globe, reducing costs and enhancing labor productivity. The new direction of globalization diverges from the old pattern in terms of guiding concepts and therefore it observes different principles and regulations. Changing structure Globalization in the past few centuries was to some extent dominated by the capitalist mode of production, which aimed to maximize profits. Developed countries adopted policies to increase wages, raise employment and improve social welfare to promote this pattern of globalization. In the process, the economy grew, but under the capitalist system, every economic and technological advance also allowed cross-border monopoly capital to take in more and more excess profits, further deepening the basic contradiction of capitalism and producing increasingly negative effects, like income inequality. Also, it resulted in industry hollowing and capital virtualization of the real economy in capital-exporting countries. Nearly 10 years have passed since the international financial crisis hit in 2008, and the world economy is still recovering slowly. Growing populist sentiments prompted some parties and statesmen in Western capitalist countries to oppose globalization and solve domestic unemployment problems by building trade barriers. But, this will not prevent the global expansion of productivity driven by new technologies. The backlash against globalization can only intensify the fundamental contradictions of capitalist societies. Nowadays, the structure of the world economy is radically changing. As noted by the head of the International Monetary Fund Christine Lagarde, emerging economies and developing countries are now contributing 60 percent of world GDP and 80 percent of global economic growth. According to a report released by the World Bank in June, seven major emerging economies—China, Brazil, India, Indonesia, Mexico, Russia and Turkey—are contributing far more to world economic growth than the G7 countries: the United States, the United Kingdom, France, Canada, Italy, Japan and Germany. In this context, Western criteria should not be the sole standard for making globalization rules. Prime Minister of Hungary Viktor Orban said at the Belt and Road Forum for International Cooperation held in Beijing in May, that the world is at an epochal turning point. The old pattern of globalization is outmoded because it splits the world into two camps: teachers and students. Most regions are treated as students forced to listen to lectures by the West in areas like democratic standards, human rights and market economy. As economic globalization progresses in a new direction, countries must have the right to explore their own social development models based on national conditions. Mutually beneficial cooperation Greatly benefiting from economic globalization, China has become the world’s second-largest economy, driving more than 30 percent of global economic growth. China is also the largest trading country and the second-largest investor in the world, with foreign-exchange reserves of $3 trillion. In the backlash against globalization, China is shouldering its responsibility as a major country to offer a Chinese vision and plans to point to a new direction for economic globalization. Economic globalization is the objective requirement and inevitable result of the development of social productivity, said Chinese President Xi Jinping in the keynote speech at the opening plenary of the 2017 annual meeting of the World Economic Forum in Davos, Switzerland, on Jan. 17, 2017. Globalization creates momentum for world economic growth while promoting the flow of capital, technologies, products, industries and people between economies. The president called on the international community to face up to the problems caused by globalization instead of dodging them. “In the face of both the opportunities and challenges of economic globalization, the right thing to do is to seize every opportunity, jointly meet challenges and chart the right course for economic globalization,” he said. Xi is unequivocal in his opposition to the anti-globalization trend and rising protectionism. He proposed new development patterns and a blueprint for globalization as well as trade and investment facilitation. He stressed the importance of developing a dynamic innovation-driven growth model, a model of open and mutually beneficial cooperation featuring a well-coordinated and inter-connected approach, a model of fair and equitable governance that conforms to the trend of the times, and a balanced, equitable and inclusive development model. At the Belt and Road summit, Xi further advocated building the Belt and Road into an instrument of peace, prosperity, opening up, innovation and connecting different civilizations. He then affirmed his commitment to these goals. Xi discussed the vision and ultimate goals for the new round of globalization at the 17th Meeting of Council of Heads of States of the Shanghai Cooperation Organization in June, saying that the aim is to “build a community of shared future featuring equality, mutual support, solidarity, and sharing of weal and woe.” When addressing a welcome banquet during the Belt and Road Forum, Xi stated that the Belt and Road embodies the pursuit of common development. Implementing this initiative will help countries overcome obstacles to development, narrow development gaps and share the fruits of development. This way of thinking points to an orientation substantially opposed to the former, which pursues excess profits. The new direction focuses on a community of common destiny within which countries connect with and help each other and make joint efforts to create fruits that are shared by all. This community is formed during mankind’s struggle for survival and progress through the development of high technologies. Equal consultation Holding high the banner of peace, development, cooperation and mutual benefits, China will promote a new type of international relations featuring mutual respect, fairness, justice, and mutually beneficial cooperation and make economic globalization more open, inclusive and balanced so that its benefits are shared by all. In order to achieve these targets, several principles should be followed. China should uphold the principle of equal consultation as well as peace and development in economic globalization. All countries should be treated equally in globalization regardless of their territorial size, national strength, beliefs or social systems. With this prerequisite, transactions can be conducted in a fair and reasonable way and globalization can also be promoted smoothly. Inclusiveness and mutual learning are also important for economic globalization. Every country has its own advantages. With the attitude of mutual inclusiveness, countries can learn from each other. Globalization is a process of communication. The effects of communication depend on whether a nation is able to discover the advantages of other countries. Successful communication will facilitate trade, gradually establishing a pattern of equal consultation. In addition, China should also uphold the principle of fair and reasonable trade. Given the diversity of national conditions and levels of economic development, it is difficult to establish a general system of fair and reasonable trade that conforms to the national conditions of all countries. Therefore, what can be considered fair and reasonable is relative. On the basis of respecting national sovereignty, upholding the right of all countries to choose their own development path and treating countries equally regardless of size, trade criteria and principles should be made through democratic consultation, which takes into consideration the differing national conditions and levels of economic and technological development facing each country in developing its national economy. When implementing these criteria and principles, frequent amendments should be made to reflect the changing circumstances. Last of all, China should highlight mutually beneficial cooperation in economic globalization by achieving shared growth through collaboration in construction and creating opportunities. Economic globalization is an international platform established by the people in all countries with the help of high and new technologies. The platform has been established for mutual communication, learning and promotion. As long as these principles are upheld, progress will be made in communication, and innovation will also be possible through learning from each other. New technologies will constantly emerge, and pollution will be alleviated. As a result, the global economy will also grow rapidly. In order to reach this goal, the idea of achieving shared growth through mutually beneficial cooperation should be upheld in promoting economic globalization. China will never seek hegemony, nor will it pursue its own development at the expense of the interests of other countries. Liang Dongsheng is a research fellow from the Institute of World Economics and Politics at the Chinese Academy of Social Sciences. Tang Hongxin is from the Naval University of Engineering of the Chinese People’s Liberation Army.
http://www.csstoday.com/Item/5031.aspx
The collaborative problem-solving approach strives to build consensus. It involves identifying the problem or issue and then engaging group members in analyzing the facts of the current situation, generating creative ideas, and agreeing on a course of action. All group members are allowed to input ideas and are encouraged to listen and build on each other’s points. The Collaborative Conflict Management Process The steps in the collaborative conflict management process are as follows: - Create a clear statement of what the situation or problem is. - Insure that all members agree with the statement. - Help the members create a goal statement that describes what the situation would look like if the situation or problem were resolved. - Set time limits for each step of the collaborative conflict management process. - Make sure group norms are in place. - Explain the collaborative process by emphasizing the need to analyze objectively before jumping to solutions. - Make sure all group members are heard and that there’s an objective exploration of the current situation or problem. - Use brainstorming or anonymous brainstorming to generate a range of possible solutions. - Establish objective criteria for finding the best solution by using a decision grid. - Make sure that the what, how, who and when are specified when developing a plan to implement the agreed upon solutions. Compromising and Accommodating Compromising is used when two groups have formulated strong positions. Neither group feels they can accept the position of the other, so a neutral middle ground needs to be developed. Accommodating is appropriate in situations in which one group is only slightly interested in the problem, while the other group is deeply interested. Accommodating is focused on keeping the peace. This approach can involve asking everyone to just get along or asking one person in a conflict to give in to the others. Accommodating is the correct approach to take when investigation of the problem reveals that one person is wrong. The consequence of accommodating is that the underlying issues are often left unsolved in the interest of keeping the peace. General Principles of Good Feedback Following general principles of good feedback can help to foster good communication among group members. When Giving Feedback Tell the other person what you notice or what has happened in a factual manner. Do not comment about him or her as a person. The feedback should be descriptive rather than evaluative. The description of what has happened should be formed on facts rather than impressions. In most cases, feedback should not be imposed. Ask the other person if you can offer feedback. If the person says no, respect that the timing for feedback may not be right. Ask the person to schedule a more convenient time to talk keeping in mind that feedback should be given as soon as possible after the situation requiring feedback. Offer suggestions for improvements that the person receiving the feedback is capable of putting into practice. Make sure that your understanding is accurate and reasonable by checking with the person, or even with others. This can help avoid misjudging the situation. Show that you care about the other person by offering feedback with the intent of helping the other person. When Receiving Feedback Demonstrate that you are listening attentively by making eye contact with the speaker. Make sure that you understand what is being said by paraphrasing, or asking questions. Stay relaxed by taking a deep breath, relaxing your body posture, and speaking slowly. Make sure you understand the other person’s perspective before you offer your side of the story. Even if you don’t agree with the feedback, it is sure to contain some valuable ideas. By accepting these ideas, you are showing respect for the other person’s perspective. Offer your own ideas as well. Your energy should be focused on improving rather than disagreeing with observations. Summary The collaborative problem-solving approach helps to build respect and trust among group members. The more regularly the group meets to discuss problems or situations, the more respect and trust are built.
http://hrdevelopmentinfo.com/conflict-management-intervention-the-collaborative-problem-solving-approach/
Polypropylene (PP)/clay nanocomposites are usually processed by melt mixing. In this method, mixing conditions are important variables to improve nanocomposite properties. Some studies reported the effects of processing on mechanical properties of PP/clay, but there is no clear explanation on optimum conditions. This study aims to predict the optimum conditions of PP/clay nanocomposite prepared by an internal mixer using response surface methodology (DoE). The effect of mixing on flexural modulus and nanocomposite structures were analyzed. Temperature, rotation speed, and mixing time were varied. To improve interfacial bonding, polypropylene-graft-maleic anhydride (PP-g-MA) was added as a compatibilizer. PP/clay formulation was fixed at 88 wt% of PP, 9 wt% of PP-g-MA, and 3 wt% of clay. The results show that the optimum modulus was predicted at 222 °C, 83 rpm and 5 minutes, giving 2085 MPa or 18% improvement compared to control sample. XRD diffractograms showed that nanocomposite peaks shifted to lower angles, suggesting the presence of some intercalated structures that supported the resulting increase in modulus.
https://scholar.ui.ac.id/en/publications/polypropyleneclay-nanocomposites-prepared-in-an-internal-mixer-op
Through our years of educating, we’ve observed many children who experience stress and anxiety, lack of social and emotional skills, and difficulty regulating emotions and behaviours. As educators, we are able to support and nurture child development by facilitating programs rooted in Movement, Connection and Expression! Our goal is to create a safe and engaging workshop for children to feel a sense of belonging, express themselves in healthy ways, build on skills that support their physical, mental, emotional and social wellbeing, and HAVE FUN! Workshops for Children Yoga Movement We create an engaging play based learning experience for children. We use yoga poses, mindfulness based practices, games, storytelling, music, dance, movement, guided imagery, relaxation techniques and more to create a fun skill based learning experience for Toddlers - Grade 6 children. Our goal is for each group of children to have a unique and engaging experience, building on previous skills and introducing new ones. Creative Art Creating safe and engaging experiences for children to express themselves freely using creative art experiences. We incorporate mindfulness based strategies to support children during their art experience, empowering each child to feel confident in what they are creating.
https://www.mindfullittlethings.com/workshops
1. Introduction {#s0005} =============== Within the working population, rates of functional impairment due to treatable and often preventable mental illnesses such as anxiety and mood disorders have been steadily increasing ([@bb0065]). This increase corresponds with a shift in the leading cause of long-term sickness absence and work incapacity from musculoskeletal injuries to mental illness throughout most high-income countries ([@bb0055]; [@bb0115]; [@bb0160]; [@bb0150]). Being absent from work can negatively impact on self-esteem, increase social isolation, and lead to financial hardship ([@bb0125]; [@bb0145]) which can further delay the recovery process for individuals experiencing mental illness. Research has confirmed the importance of employment in helping individuals maintain positive mental health or facilitate recovery from an illness ([@bb0125]). However, the relationship between work and mental health can be complex, with evidence suggesting that in some circumstances an individual\'s work environment can increase their risk of developing mental health problems and act as a barrier for them returning to or remaining at work after difficulties arise ([@bb0080]). High levels of job demands and strain, low levels of job control or decision latitude, and poor collegial relationships and support, have been found to be associated with poor productivity for employees and increase the risk of mental health problems ([@bb0105]; [@bb0075]; [@bb0070]). When not adequately addressed, work-related mental health risk factors can result in substantial costs to the individual, their workplace, and to the economy ([@bb0070]; [@bb0050]; [@bb0135]; [@bb0140]; [@bb0015]; [@bb0060]; [@bb0085]). Therefore, there is an increasing consensus that organisations need to undertake actions at the individual employee level, within the team and across the organisation, to ensure the impact of these work-based mental ill-health risk factors are reduced as much as possible ([@bb0060]). Managers are in a key position to ensure changes can be implemented to modify these risk factors in order to create a mentally healthy workplace for the staff they supervise. There is increasing evidence that manager behaviour and attitudes can predict mental health outcomes amongst employees ([@bb0155]). In addition, the recovery process and occupational outcomes for an employee experiencing mental ill health, regardless of the underlying cause of the illness, can be influenced by the way their manager responds ([@bb0135]) with evidence suggesting a positive association between early and regular manager contact and employees\' recovery and return to work ([@bb0135]; [@bb0015]). Despite this potential for managers to have a positive impact, managers continue to report feeling uncertain about how to best support employees\' mental health needs ([@bb0080]; [@bb0060]). This is a major barrier, as managers\' confidence to discuss mental health issues with employees has been found to be the key predictor to inititating and maintaining conversations with staff ([@bb0005]). Several studies have been conducted evaluating various training programs designed to upskill managers to better support the mental health needs of the staff they supervise. To date, the majority of evaluations have involved face-to-face training. Certain studies have shown such training delivered face-to-face to be effective in improving managers\' confidence and the implementation of appropriate responses to support employee mental health ([@bb0120]; [@bb0025]; [@bb0130]), as well as a reduction of absenteeism amongst staff ([@bb0120]). However, an ongoing limitation with this mode of training is the potential for it to be expensive and logistically difficult to deliver with little opportunity for scalaibilty. With time-pressures and financial factors often influencing the capacity of a workplace to deliver training to staff, face-to-face training may not be a viable option for many organisations, particularly small-to-medium enterprises. This has led to the development and evaluation of similar training for managers delivered via an online format ([@bb0035]; [@bb0095]; [@bb0100]; [@bb0045]). Although value has been found in some online training ([@bb0035]; [@bb0045]) face-to-face and online training managers in mental health matters have not been directly compared to one another. The aim of this study is to bring results from a trial evaluating face-to-face training together with results from a separate study evaluating online delivery of the same educational content ([@bb0120]; [@bb0045]) to explore any apparent differences in their effectiveness. 2. Methods {#s0010} ========== Results from two separately conducted studies that delivered the same program content to managers via different learning methods were compared to establish whether a difference in change in confidence to support employee\'s mental health could be determined between face-to-face and online learning. One study evaluated the impact of a four-hour face-to-face training session called RESPECT ([@bb0120]) while the second study looked at the effectiveness of the same content delivered via an online format through a program called *HeadCoach* ([@bb0045]). Both studies used an identical scale to measure managers\' confidence in supporting the mental health needs of staff they supervise and initiating conversations about mental health matters. 2.1. Study 1 (face-to-face training) {#s0015} ------------------------------------ Study 1 was conducted with duty commanders from a large Australian state fire and rescue service to evaluate the effectiveness of RESPECT Manager Training, a 4-hour face-to-face educational program designed to upskill managers\' mental health literacy and improve their communication with staff about mental health issues. Details of the program and full trial have been published by Milligan-Saville et al. ([@bb0120]). The level of duty commanders was selected as appropriate managers for this study as this rank oversaw the operation of several fire stations and were responsible for managing sickness absence amongst staff they supervise. The 4-hour program was delivered in a single session by a clinical psychologist or psychiatrist to seven separate groups of 7--15 managers. The first part of the training focused on helping managers identify common mental disorders such as depression, anxiety, post-traumatic stress and alcohol mis-use amongst their staff. The second part aimed to upskill managers in appropriate response and positive communication strategies with the opportunity to practice new skills through interactive group discussions and role plays. At the commencement of the session, managers completed a baseline questionnaire. Additional assessments were conducted immediately after the 4-hour session was completed and 6-months following their training. In the 8-weeks following the 4-hour training session, participants in the intervention group received a single telephone call from an employee assistance programme representative specialising in assisting managers to address any questions or concerns. 2.2. Study 2 (online training) {#s0020} ------------------------------ Study 2 was conducted with two state ambulance services and an Australia-wide building and construction hire company to evaluate the potential effectiveness of an online manager mental health training program called *HeadCoach* ([@bb0045]). Similar to RESPECT, *HeadCoach* aimed to improve managers\' communication with staff about mental health issues. In addition, this online training program also included content discussing preventative strategies valuable in creating a mentally healthy workplace. This online program consisted of a series of 10-minute modules aimed to be completed at the individual participants\' own pace over a 6-week period. Modules consisted of learning material presented via text, videos, case vignettes and interactive exercises. Overlapping content in both the RESPECT and *HeadCoach* programs included introducing managers to common mental illnesses they might come across in the workplace and the signs and symptoms that might help them identify these conditions amongst staff. Both programs also aimed to upskill managers in appropriate strategies to better communicate with employees experiencing mental illness. [Table 1](#t0005){ref-type="table"} details the content and learning objectives of the two programs. Further details of the content development and evaluation of *HeadCoach* have been published previously ([@bb0035]; [@bb0045]; [@bb0040]).Table 1Program characteristics and participant rates of the two interventions.Table 1RESPECT (face-to-face)*HeadCoach* (online)Content/Iearning objectivesThe aims of the 4-hour face-to-face session is to increase managers\' knowledge and skills to:\ -Recognise the key features of common mental health issues, and the impact of these disorders on the individual and the organisation;-Implement strategies in approaching and supporting firefighters/officers who develop depression or other mental illness in the workplace;-Better support firefighters/officers experiencing mental ill-health and implement successful return to work strategies.The aims of this online program is to increase managers\' knowledge and skills to:-Better recognise and understand mental health in the workplace-Initiate conversations with and facilitate help-seeking for staff with mental health concerns-Better support staff experiencing mental ill-health and implement successful return to work strategies.-Help keep staff as healthy and productive as possible.Duration of intervention period/mode of deliveryA single 4-hour face-to-face session in groups of 7--15 managers18 × 10-minute modules completed online at the individual\'s own pace over a 6-week periodParticipants (Consent and baseline received)N = 45\ -Fire and Rescue = 45N = 86\ -Ambulance = 54-Construction Hire = 32 Within the two ambulance services included in the evaluation of *HeadCoach*, managers were defined as those responsible for the operational, clinical and financial activities of the individual stations on a day to day basis, in addition to overseeing front line paramedic staff. Managers at the construction hire company were those in supervisory roles responsible for branches of employees. Managers were recruited to participate in the online trial via email. They were informed of the study by their organisation prior to the researchers contacting them. Managers who opted into the study completed an online consent form and created an account. It was within this account the baseline questionnaire was available and the *HeadCoach* program content was accessed. The post questionnaire was available immediately after all training modules had been completed. For managers who did not complete all modules, notification of the post questionnaire was emailed to them at 6-weeks following their baseline questionnaire with a hyperlink directing participants to their account login page. All managers were invited by email to complete the follow-up questionnaire at 4-months following their baseline assessment. 2.3. Outcome {#s0025} ------------ An identical scale measuring managers\' self-reported confidence in supporting employee mental health issues was used in the evaluation of both RESPECT face-to-face manager training (Study 1) and *HeadCoach* online manager training (Study 2). This was a modified version of a previously published supervisor scale ([@bb0135]) evaluating confidence, which has been found to be a key predictor of manager behaviour ([@bb0005]). In this scale, managers are asked to indicate their level of confidence in dealing with the five different workplace scenarios. Ratings are provided on a five-point Likert scale ranging from *not at all* to *extremely confident*, resulting in an overall confidence score ranging from 5 to 25. Scenarios included: "Initiating contact with staff on sickness absence leave that you believe might be due to mental illness" and "Identifying barriers preventing a staff member returning to work and coming up with solutions to those barriers" ([@bb0035]). 2.4. Statistical measures {#s0030} ------------------------- All analysis was conducted using SPSS version 23. Given the data from the two study groups were collected through separate trials, with different samples and varying follow up timing, direct statistical comparisons between the two interventions were not conducted as part of this evaluation. Rather, mean change in manager confidence from baseline at both post-intervention and follow-up were examined for each study group, with the overall patterns of response compared. The differences in the mean percentage confidence scores between baseline and follow-up for each intervention were assessed using paired samples *t*-tests. In addition to the main analysis, which included all participants regardless of the amount of the training they completed, an additional analysis was completed which included only participants who completed all training requirements of either program. 3. Results {#s0035} ========== Baseline assessment data was available for 46 managers in the face-to-face training (Study 1) and 86 managers in the online intervention (Study 2). All managers who attended the face-to-face training completed the single training session. For managers in the online intervention group, 30 (37.5%) completed the entire training program. For the face-to-face training in Study 1, post-intervention data was available for 44 (97.8%) managers and follow-up data for 19 (43%) managers. Of the group of managers who began the online training (Study 2), post-intervention and follow-up data was available for 44 (52.4%) and 40 (47.6%) respectively. The mean change from baseline in managers\' confidence for the two studies at each occasion of measurement is displayed in [Fig. 1](#f0005){ref-type="fig"}. There was a larger change from baseline with face-to-face training than for online however, as shown in the figure, improvements in confidence occurred for managers in both face-to-face and online training at post-intervention, with this improved confidence remaining at each of their respective follow-up assessments. Further analyses indicate that at follow-up, these improvements in confidence from baseline are significant for both face-to-face (*t*~*18*~ = 5.99; *P* \< .001) and online training (*t*~*39*~ = 3.85; *P* \< .001).Fig. 1Demonstration of the change in confidence from baseline with ±standard error at each assessment point for both online and face-to-face training.Fig. 1 Within Study 2, of the 30 managers who completed the online training, all provided post-intervention data and 27 (90%) provided follow-up data. At baseline, this group had a mean confidence score of 17.8 (SD = 3.10) and a range of observed values between 8 and 24. For completers in the face-to-face training in Study 1, post-intervention and follow up data was available for 44 (97.8%) and 19 (43%) managers respectively. At baseline, the mean score for confidence was 15.70 (SD = 3.76) with values ranging between 5 and 21. The mean change in manager confidence from baseline at each occasion of measurement in each group for managers who completed their respective training is displayed in [Fig. 2](#f0010){ref-type="fig"}. Once again, significant improvements in confidence were found for both face-to-face (*t*~*18*~ = 5.99; *P* \< .001) and online training (*t*~*26*~ = 4.20; *P* \< .001) between baseline and the completion of training. However, amongst completers, the improvements seen with face-to-face and online training appear very similar. As with the main analysis, both types of training appeared to result in sustained improvements. These improvements correspond with effect sizes (standardised mean differences) of 0.64 and 0.56 for face-to-face and online training respectively.Fig. 2Change in confidence from baseline with ±standard error at each assessment point amongst managers who completed all training components of either the face-to-face or online intervention.Fig. 2 Further analyses were conducted to evaluate whether the impact of online training differed between managers based on industry type. While the change observed amongst those in the construction industry was greater than that seen in emergency service workers (increase of 4.2 vs 1.4, *p* = .02), there was still a significant difference in the mean change in confidence at 4-month follow-up for both construction workers (t5 = 4.776; *P* = .005) and emergency service workers (t20 = 2.828; *P* \< .01). 4. Discussion {#s0040} ============= Our findings suggest both face-to-face and online modes of delivery provide effective means of improving managers\' confidence to initiate conversations and address mental health issues within their teams. Both modes of delivery appear able to create sustained changes in confidence levels. However, a key challenge of online modes of delivery appears to be retention rates and program adherence. Although not dissimilar to completion rates in other studies of internet-based interventions ([@bb0010]; [@bb0030]; [@bb0020]), adherence rates in the online training program used in this study were low, which reduced the overall effect compared to face-to-face. Thus, at present, it appears that online mental health training can result in similar increases in managers\' confidence to that observed with face-to-face training, but only when managers complete the online training program. Additional strategies involving more engaging means of improving retention in online training need to be determined to maximise the impact of new online training programs. A key methodological strength of this study was the comparison of two training programs delivering the same content through different methods of learning with the outcome of manager confidence evaluated using an identical scale. However, this examination utilised data from two separately conducted trials, each containing different recruitment strategies, samples, length of program delivery, follow-up timing, and response rate at follow-up. Although the results provide valuable preliminary data supporting the comparable benefits of both face-to-face and online training, these differences between the two trials make direct comparison problematic. A further strength of the study was the inclusion of similar high-risk, male-dominated industries in both trials. However, although both studies included emergency service workers, the sample evaluating online training also included high-risk workers from the building and construction industry. Additional analyses suggested that the benefits of online training may differ according to industry groups, with greater gains of confidence found amongst construction workers. Further investigations are required with a larger sample size to ascertain whether there are a range of industries that may be more responsiveness to an online training program. An additional point of consideration is the risk for bias due to the different way in which each group was recruited; the face-to-face training group was recruited at the training sessions, while the online training group was recruited via email. This creates the potential for different rates of participant commitment at the commencement of the training program, which may impact on adherence and bias the observed effect. When analysing the intention to treat data ([Fig. 1](#f0005){ref-type="fig"}) which included all managers who commenced the program regardless of their adherence to the program, the mean change from baseline to follow-up was greater for the face-to-face group compared to the online group. This difference was reduced in the secondary analysis ([Fig. 2](#f0010){ref-type="fig"}) which included only program completers. However, this potentially creates a strong selection bias that should be considered when interpreting the results. Furthermore, during the follow-up period, the face-to-face training groups were provided with support calls by an employee assistance programme representative which may have influenced changes observed. Nevertheless, the mean change in confidence from baseline to post-intervention in the face-to-face and online intervention groups both corresponded to a medium effect size. It is uncertain what value this corresponds to within the workplace setting, and future studies would benefit from analysing this further to determine the impact of this effect size on actual behaviour change as reported by both the manager and their employees. The absence of a control group in this analysis may have also created further bias, by increasing the risk of a Hawthorne Effect. However, as previous RCTs have shown that both face-to-face and online manager training generate a significant improvement in confidence compared to control groups ([@bb0120]; [@bb0045]), a Hawthorne Effect is unlikely to explain all the observed effect in the improvement in confidence. In addition, although there are three measurements of occasion for both interventions, it is important to note the potential impact of the different time points data collection occurred in each group. For face-to-face training, post-intervention data was collected on the same day as the baseline with the final follow-up occurring 6-months post training, whereas for the online training, post-intervention data was collected when managers completed the program, which could have occurred at any point during the 6-weeks following baseline with final follow-up at 4-months. There was also the opportunity for managers who did not complete all online program requirements to still complete the post-intervention and follow-up questionnaires. As with any trial where loss to follow-up occurs, the program adherence and varied response rates in these studies, particularly for the online group, may have led to biases in the results. Furthermore, the follow-up response rate for the managers who completed the face-to-face was markedly lower than the managers who completed the online training. Due to logistical reasons, data-collection for the face-to-face group switched from paper-and-pencil for baseline and post intervention on the same day as the training session, to electronically via email at follow-up. This change in data collection method may have affected the response rate and thus impacted the results with managers who responded to the email possibly more attentive or invested in the study. Similarly, the possibility exists that managers who felt more confident with the program content completed the online intervention in full and may have been more likely to answer follow up questionnaires, thus impacting on the results for that sample. Further exploration of the motivations of managers to participate in and complete mental health training could be valuable to examine in future investigations. Finally, the generalisability of the results from the included sample may be limited. The construction company and first responder agencies involved in the investigations are high risk industries with specific work conditions and characteristics that may not be representative of the wider population. However, a one-size-fits-all approach is not relevant to manager training and thus a key feature incorporated into the design and development of these programs were tailoring of resources to each sample group included in the evaluation. This may have the potential to enhance the effectiveness of the core program content across industries when additional tailored content specific to that organisation is integrated. Although both face-to-face and online training delivering the same content appear to be effective means of training managers in mental health matters, it is uncertain whether they both offer the same type and degree of benefit to managers, and due to the absence of employee level data, it is uncertain whether these benefits flow onto their staff. In traditional statistical analyses, tests are conducted to examine the difference between two interventions. This is the type of analysis shown in this paper demonstrating that both modes of training resulted in improvements from baseline. In studies of equivalence, statistical measures are applied to determine whether the efficacies of two interventions are similar enough that neither one can be considered superior or inferior ([@bb0090]; [@bb0165]; [@bb0110]). It is hoped that in the future, larger controlled trials can be established with analyses of equivalence to gain more insight into the relative benefits of online and face-to-face training, in terms of both manager confidence and behaviour. Given the opportunity to role-play and practise skills learned during face-to-face learning, it is possible that a greater difference between methods of delivery may be evident for more behavioural outcomes. Analyses of employee level data may also help determine if equivalent effects flow onto the staff the managers supervise. Outcomes evaluating perceptions of supervisor support and psychosocial climate, as well as employee rates of sickness absence ([@bb0120]) would provide valuable information about the effect of these methods of manager training for their staff they supervise. Although the equivalence of face-to-face and online manager mental health training cannot yet be established with certainty, the available evidence suggests that both methods of training managers can be recommended as important and effective ways which help managers feel more confident to support the mental health needs of the staff they supervise. Until more data on equivalence is available, which also incorporates objective data from the managers\' employees to ascertain the flow on effects of manager training to their staff, workplaces should be reassured that both methods of training are able to improve managers\' confidence in initiating conversations with staff and addressing mental health matters in the workplace, and that these improvements appear to be sustained. However, when selecting a method of training for their managers, workplaces should expand their selection criteria beyond the cost benefits and scalability opportunities offered through online training. Other factors such as the likelihood workers will engage with an e-Learning platform should be considered as this may determine the benefits of training for an organisation. If employees do not utilise technology on a regular basis as part of their work, it may be that face-to-face training remains a better fit for their organisation. Therefore, decisions regarding which type of training are most suitable for different workplaces will need to continue to be made on the basis of which is likely to be the best logistical and cultural fit for each organisation, with the caveat that users of online training need to find ways to ensure adequate completion rates. Acknowledgements {#s0045} ================ The RESPECT study was funded by NSW Health and Employers Mutual Ltd. The *HeadCoach* study was funded by *beyondblue* with donations from the Movember Foundation (Project Code: LK 7139). Additional funding was provided by the icare Foundation. Ethics approval and consent to participate {#s0050} ========================================== The protocol for the RESPECT study was approved by the Human Research Ethics Committee of the University of New South Wales (HC12562). The *HeadCoach* study received ethical approval from the South Eastern Sydney Local Health District Human Research Ethics Committee HREC ref. no: 16/348 (HREC/16/POWH/684). Authors\' contributions {#s0055} ======================= AG and SBH designed the study. AG, LT, JMS collected the data. AG and SBH conducted the analyses. AG and SBH prepared the first draft of the manuscript. All authors approved the final manuscript for submission. Declaration of Competing Interest {#s0060} ================================= AG, ADL, NG and SBH co-own the intellectual property for *HeadCoach*. SBH and the Black Dog Institute co-own the intellectual property for RESPECT. MD, HC and SBH are employed by the Black Dog Institute who provide manager training to workplaces.
Author: Analisse Dunne Employee evaluations are exciting for some and scary for others, but, all around, they’re a routine and often mundane process. Traditionally, most companies have hosted these evaluations yearly. They tend to involve an assessment of an employee’s work performance and may or may not involve a raise. However, to attract and retain well-rounded talent, you can set your company apart by making the evaluation process something employees look forward to. Honing in on goals and creating an evaluation cycle that is bi-annual rather than once a year can help with keeping focus and expectations in line while accomplishing career goals at the same time. S.M.A.R.T. goals What are S.M.A.R.T. goals? The acronym S.M.A.R.T. stands for Specific, Measurable, Achievable, Relevant, and Time-bound. And the intention of S.M.A.R.T. goals is to tackle an employee’s major job responsibilities. S.M.A.R.T. goals are usually drafted within the first 30 days of beginning a new position and followed up on within 6 months — ideally lining up with evaluation cycles. By creating these goals, an employee’s performance, dedication, and priorities can be easily evaluated and expanded upon bi-annually with managers. This instills continuous trust in both employees and managers alike. Bi-annual performance reviews Bi-Annual performance reviews can be structured in two ways: within a calendar year (e.g. one in June and one in December) or based on an employee’s start date (e.g. the first review would be 6 months after starting, and the second review would be on their one year anniversary). The benefit of the first option is having everyone on the same review cycle, rather than spread out. The benefit of the second option is that it is less hectic to have employee evaluations spaced out throughout the year, giving managers time to focus on one employee at a time. Related: Recruitment in the time of remote work… Neither option is necessarily better than the other — it all depends on the preferences of upper management. Option one might work for smaller companies since they have a small number of people to evaluate, whereas option two may work for larger organizations where larger review groups might interrupt work. Another thing to consider is: will employees get a raise in both reviews? If your company has the budget for that, it might be a great added perk. The mid-year review More often than not, the mid-year review is solely focused on recent achievements, future goals, and immediate improvements. This can serve as a check-in between manager and employee to see if their goals are being achieved or if there are any current/potential roadblocks that could hinder their progress. The goals will be followed up with again during the end-of-year review, but they will not be the sole focus as they are in this review cycle. The mid-year review is also a great time to potentially work in performance improvement plans (PIP) for employees who are struggling in areas of their position. Performance improvement plans are like putting someone on academic probation — you create a 30-, 60-, or 90-day plan to improve areas of their work, and if in the time frame selected, nothing has improved or changed, disciplinary action (including but not limited to suspension or termination) will be taken. It is incredibly important to show employees that they can still succeed within your organization and that this PIP is meant to help them; it does not have to be a negative situation unless you allow it to become one. The end-of-year review During the end of the year review, things such as raises, title changes, potential bonuses, and promotions are the primary focus on an employee’s mind. Goals are touched upon and expanded on for next time, but this review is mostly preparation for the year ahead. This review should be conducted as an evaluation for both employees and managers. An evaluation form (with each question being rated on a scale of 1-5) will be filled out by the employee, and then by the manager. Each point and the overall score will be discussed at length during the review and will usually determine what kind of raise the employee will get — the higher the better of course. Additional feedback During all employee evaluations, it is crucial to hear what employees have to say as well. I have learned to always ask for feedback, both on myself and the company as a whole. What could we do better? Do you feel comfortable reaching out to management with any issues that arise? Are there any benefits or perks that you would like to suggest? These are just some of the questions that can help you get a bigger picture of what is going on in the employee’s mind and how they view you as an employer. It is important that both parties (manager and employee) feel that the process is productive. Following up with action items throughout the year can keep expectations realistic because in the end, communication is key!
https://www.odysseyassoc.com/news/running-effective-employee-evaluations-for-better-retention/
... 6. Different frequencies of vibration in endolymp stimulate different sets of receptor cells. 7. As a receptor cell depolarizes, its membrane becomes more permeable to calcium ions. 8. Inward diffusion of calcium ions causes vesicles at the base of the receptor cell to release neurotransmitters. 9. ... Neuro Objectives 24 ... Functions of efferent control: To hear sounds in a noisy environment (changes transmission sensitivities to “block out” background noise) Note: Loss of acoustic reflex will lead to hyperacousis in the damaged side. Since there is no stiffening of the ossicular chain (quieting effect), sounds will ... File ... corneal reflex, and ipsilateral loss of somato-sensation of the face) ... Spatial Hearing ... to spherical and globular bushy cells in the anteroventral cochlear nucleus (AVCN) via large, fast and secure synapses known as “endbulbs of Held”. Phase locking in bushy cells is even more precise than in the afferent nerve fibers. Bushy cells project to the superior olivary complex. ... The Story of Cochlear ... the ear of a deaf person. When used with a microphone and speech processor it electrically stimulates the auditory nerve and results in the person being able to hear sound. When the system was first developed in 1978 by Graeme Clark it was referred to as the bionic ear. Cochlear Limited was founded ... What is a Cochlear Implant? ... -Some hearing percepts were reported, although these early experimental devices allowed virtually no speech recognition. ... Cochlear-Implants-slides ... Improvement is long-term (Waltzman, et al. 5-15 yr f/u) Implantation is cost effective—even in the elderly (Francis, et al) Research indicates recipe for success includes: ... Auditory Neuroscience - University of Sunderland ... cell (Ray Meddis). Motion of the stereocilia modulates K+ influx, which causes Ca++ influx, but there is also background Ca++ leakage, so vesicles are released even without sound input. The release rate varies among synaptic terminals, resulting in variation in sensitivity. • The auditory neurons th ... Auditory Pathways ... o Lesions above cochlear nuclei results only in partial deafness o Ipsilateral deafness in one ear only results when there is conduction deafness, destruction of the cochlea, cochlear nerve or BOTH of the cochlear nuclei o Lesions of the lateral lemniscus will cause bilateral partial deafness due to ... Structure and function of cochlear afferent innervation ... from the auditory nerve . Although the range of audible frequencies varies, all species typically show a region where hearing thresholds are lowest in their midfrequencies. At the lower or higher end of the spectrum, thresholds usually increase by 20 dB SPL or more. There is no doubt that the sig ... AudVest8 ... B. Brainstem nuclei and their Projections 2. Auditory nuclei (cont’d): • Low-freq sounds are distinguished in space by interaural time difference. • High-freq sounds are distinguished by difference in intensity between the ears. • Different parts of the superior olivary n. (medial and lateral) are ... Cochlear Implant ... recess approach. Various incision designs are used to allow wide exposure of the mastoid and squamous portions of the temporal bone. The temporalis muscle and periosteum are widely stripped to accommodate a “table” for the pedestal of the Ineraid device or the receiver-stimulator of the other device ... GE 301 – Project Presentatıon ... • «Cochlear implantation started and developed thanks to society's demands which made us to conclude that it started with SCOT. However, after implantation became widespreaded, it started to act like a system growing with technological momentum.» ... 21_LectureSlides ... Cochlear prosthesis • Most deafness: SENSORI-NEURAL hearing loss. • Primarily from loss of cochlear hair cells, which do not regenerate. • Hearing loss means problems with language acquisition in kids, social isolation for adults. • When auditory nerve unaffected: cochlear prosthesis electrically s ... Glenda Froyland - Cochlear Awareness Network ... sudden attack of vertigo which resulted in me being bed-ridden for many hours on an average of four times per week. In desperation I agreed to accept a series of operations that I understood would only kill the symptoms and leave the disease silently aggressive within me. I knew there ... Cochlear Implants: A Closer Look ... and directly stimulate the nerve. These signals are then sent to the brain where they are interpreted into sound. ... Auditory Neuropathy ... advantages for C.I. in the management of AN/AD • Strategy---discrete, pulsatile signals better than high stimulation rates (increase synchronization of neural activity) • Endocholear lesion---by-pass the reduced number of inner hair cells ... Info ... A patient with a progressive hearing loss have high Arc / Arg 3.1 protein level that is slowly increasing with time during change in decreasing input stimulation level. Arc decrease synapses proportion to the level of the stimulation. The protein is released only at the moment when the nervous syst ... Cochlear-Implants ... Diagnosis of bilateral severe to profound sensorineural deafness with little or no benefit from a hearing (or vibrotactile) aid in patients whose auditory nerves are stimulable Freedom from middle ear infection and accessible cochlear lumen that is structurally suited to implantation, and freedo ... Atoh1-Lineal Neurons Are Required for Hearing and for the Survival ... brainstem, which comprise the superior olivary complex (SOC) and the nuclei of the trapezoid body (NTB). These nuclei are thought to function in the localization of the temporal and spatial origins of sounds (Willott, 2001). The etiologies of primary central deafness are varied; examples include bra ... PowerPoint-presentation ... Around 1790 Alessandro Volta experimentally discovered that electrical stimulation in the auditory system can create a perception of sound. “ It is like a thick boiling soup“, He said. ... Cochlear Implants at Columbia University Medical Center ... Ø Cochlear implants are not the appropriate choice for all hearing impaired persons, even when their hearing is in the severe to profound category. Ø Powerful hearing aids, vibrotactile devices, frequency compression aids, and FM assistive listening devi ... PDF ... are distributed in the central region of the VCN. They feature more diffuse cytoplasmic staining and a relatively small, highly eccentric nucleus that seems to bulge into the cell body (Fig. 1B). Multipolar cells, by de®nition, are polygonal in shape and distributed in the middle and caudal regions ... COCHLEAR IMPLANTS: Frequently Asked Questions…For Primary ... Some children receive an implant at older ages, particularly if they have had a progressive hearing loss. Some children who are making good progress with hearing aids plateau and then a cochlear implant may be considered at that time. ... Olivocochlear suppression of outer hair cells in vivo ... ␣9-/␣10-mediated OC effects, strychnine was injected (10 mg/kg im) at least 20 min before the OC assay. This concentration completely blocks the suppression of cochlear responses evoked by electrically shocking the OC bundle (Maison et al. 2007b). Acoustic injury. For studies of acoustic injury, ani ... 1 2 3 > Calyx of Held The Calyx of Held is a particularly large synapse in the mammalian auditory central nervous system, so named by Hans Held in his 1893 article Die centrale Gehörleitung because of its resemblance to the calyx of a flower. Globular bushy cells in the anteroventral cochlear nucleus (AVCN) send axons to the contralateral medial nucleus of the trapezoid body (MNTB), where they synapse via these calyces on MNTB principal cells. These principal cells then project to the ipsilateral lateral superior olive (LSO), where they inhibit postsynaptic neurons and provide a basis for interaural level detection (ILD), required for high frequency sound localization. This synapse has been described as the largest in the brain.The related endbulb of Held is also a large axon terminal smaller synapse (15-30 µm in diameter) found in other auditory brainstem structures, namely the cochlear nucleus. As with the calyces, these synapses promote fast, efficient information transfer.The calyx of Held holds vesicles containing glutamate on the presynaptic terminal, the vesicles are released upon stimulation (originating in the auditory system). The glutamate then binds to two known glutamate receptors, AMPA- and NMDA receptors.Commonly used in research due to its large size, the calyx of Held has been used to understand a variety of mechanisms related to development of, and vesicle release of the synapse.
https://studyres.com/concepts/10727/calyx-of-held
Maria Antonieta joined the team at Pratham that carried out two studies regarding the access to post-primary educational opportunities for girls in India.... At the OECD, Jorge conducted research on policies to increase the representation of women in corporate decision-making bodies. The goals were to better understand the dynamics that have led to the current low availability of senior level corporate positions for women and identify policies that have been successful on increasing their opportunities.... Read more about Jorge Andrés Tapia Viviann was an intern with the National Council of La Raza (NCLR), the largest Latino civil rights and advocacy organization in the United States. Under the education arm of NCLR, she supported research and implementation of education policy in Latino communities. ... Read more about Viviann Anguiano S Anukriti is an economist whose research examines how economic outcomes are shaped by social norms and public policy. Her research interests lie in the fields of development economics, demography, political economy, and the economics of gender. ... Read more about S Anukriti Anisha Asundi is a Research Fellow: Gender Specialist at the Women and Public Policy Program at the Harvard Kennedy School. At WAPPP, she manages the Gender Action Portal (gap.hks.harvard.edu) by editing and vetting articles for the Portal and by providing content management for the website.... Read more about Anisha Asundi Bio Lakshmi Balachandra is an Assistant Professor of Entrepreneurship at Babson College and a Fellow at the Women and Public Policy... Arthur interned with the Centre for Microfinance, part of the Institute for Financial Management and Research in India, working on an innovative and multifaceted Harvard-led research project that explores the impact of rural financial services on women's health and economic empowerment. Arthur's work focused around data analysis, field management, and policy engagement. His analysis directly addressed the gender gap as each survey module consists of separated questions for women and men. While working in close collaboration with policy makers, Arthur's contribution to this project helped them understand the effectiveness of financial inclusion as a tool to close the gender wage, health, and social empowerment gaps, and helped them refine future interventions to maximize the economic, health, and social gains of women. As a field manager, he shed light on what could be done to better address research questions and therefore, lead to a better understanding of how microfinance can both improve women's health and economic empowerment.... Read more about Arthur Bauer Julia B. Bear is an Associate Professor in the College of Business at Stony Brook University. Her research focuses on the influence of gender on negotiation, conflict management, and persistent gaps in parity in organizations and careers (e.g., career advancement, earnings). As a WAPPP Fellow, Julia looks forward to learning with and from others in the community tackling gender parity as she conducts new research on the role of caregiving ambition in perpetuating these gender gaps. ... Read more about Julia B. Bear Katie Beavan’s research is focused on how to (un)do gender in hyper-masculine cultures and accelerate the current slow pace of progress towards gender parity. ... Read more about Katie Beavan Abigail explored how to integrate gender into diplomacy through her internship at the US State Department’s Bureau of Democracy, Human Rights, and Labor...
https://wappp.hks.harvard.edu/people?page=1
being a former jazz saxophonist, jon ekeskov aka pixel has a slightly different approach to electronica. unconventional for modern electronic music, he studied at the conservatory with saxophone as his main instrument. with this, and later studies of konnakol (an ancient south indian rhythm system) he intends to bring "swing" and complex polyrhythmic structures to tightly quantized music. together with sensitive lyrical melodies that melt into each other and sometimes even melodic improvisation, he tries to expand the ears of the listener without them noticing. the music of pixel is based on both an intellectual side, but also responds to the listener in a more bodily fashion.
http://www.raster-media.net/artists/pixel?c=5
A new "templated growth" technique for fabricating nanoribbons of epitaxial graphene has produced structures just 15 to 40 nanometers wide that conduct current with almost no resistance. These structures could address the challenge of connecting graphene devices made with conventional architectures – and set the stage for a new generation of devices that take advantage of the quantum properties of electrons. "We can now make very narrow, conductive nanoribbons that have quantum ballistic properties," said Walt de Heer, a professor in the School of Physics at the Georgia Institute of Technology. "These narrow ribbons become almost like a perfect metal. Electrons can move through them without scattering, just like they do in carbon nanotubes." De Heer was scheduled to discuss recent results of this graphene growth process March 21st at the American Physical Society's March 2011 Meeting in Dallas. The research was sponsored by the National Science Foundation-supported Materials Research Science and Engineering Center (MRSEC). First reported Oct. 3 in the advance online edition of the journal Nature Nanotechnology, the new fabrication technique allows production of epitaxial graphene structures with smooth edges. Earlier fabrication techniques that used electron beams to cut graphene sheets produced nanoribbon structures with rough edges that scattered electrons, causing interference. The resulting nanoribbons had properties more like insulators than conductors. "In our templated growth approach, we have essentially eliminated the edges that take away from the desirable properties of graphene," de Heer explained. "The edges of the epitaxial graphene merge into the silicon carbide, producing properties that are really quite interesting." The "templated growth" technique begins with etching patterns into the silicon carbide surfaces on which epitaxial graphene is grown. The patterns serve as templates directing the growth of graphene structures, allowing the formation of nanoribbons and other structures of specific widths and shapes without the use of cutting techniques that produce the rough edges. In creating these graphene nanostructures, de Heer and his research team first use conventional microelectronics techniques to etch tiny "steps" – or contours – into a silicon carbide wafer whose surface has been made extremely flat. They then heat the contoured wafer to approximately 1,500 degrees Celsius, which initiates melting that polishes any rough edges left by the etching process. Established techniques are then used for growing graphene from silicon carbide by driving off the silicon atoms from the surface. Instead of producing a consistent layer of graphene across the entire surface of the wafer, however, the researchers limit the heating time so that graphene grows only on portions of the contours. The width of the resulting nanoribbons is proportional to the depth of the contours, providing a mechanism for precisely controlling the nanoribbon structures. To form complex structures, multiple etching steps can be carried out to create complex templates. "This technique allows us to avoid the complicated e-beam lithography steps that people have been using to create structures in epitaxial graphene," de Heer noted. "We are seeing very good properties that show these structures can be used for real electronic applications." Since publication of the Nature Nanotechnology paper, de Heer's team has been refining its technique. "We have taken this to an extreme – the cleanest and narrowest ribbons we can make," he said. "We expect to be able to do everything we need with the size ribbons that we are able to make right now, though we probably could reduce the width to 10 nanometers or less." While the Georgia Tech team is continuing to develop high-frequency transistors – perhaps even at the terahertz range – its primary effort now focuses on developing quantum devices, de Heer said. Such devices were envisioned in the patents Georgia Tech holds on various epitaxial graphene processes. "This means that the way we will be doing graphene electronics will be different," he explained. "We will not be following the model of using standard field-effect transistors (FETs), but will pursue devices that use ballistic conductors and quantum interference. We are headed straight into using the electron wave effects in graphene." Taking advantage of the wave properties will allow electrons to be manipulated with techniques similar to those used by optical engineers. For instance, switching may be carried out using interference effects – separating beams of electrons and then recombining them in opposite phases to extinguish the signals. Quantum devices would be smaller than conventional transistors and operate at lower power. Because of its ability to transport electrons with virtually no resistance, epitaxial graphene may be the ideal material for such devices, de Heer said. "Using the quantum properties of electrons rather than the standard charged-particle properties means opening up new ways of looking at electronics," he predicted. "This is probably the way that electronics will evolve, and it appears that graphene is the ideal material for making this transition." De Heer's research team hopes to demonstrate a rudimentary switch operating on the quantum interference principle within a year. Epitaxial graphene may be the basis for a new generation of high-performance devices that will take advantage of the material's unique properties in applications where higher costs can be justified. Silicon, today's electronic material of choice, will continue to be used in applications where high-performance is not required, de Heer said. "This is an important step in the process," he added. "There are going to be a lot of surprises as we move into these quantum devices and find out how they work. We have good reason to believe that this can be the basis for a new generation of transistors based on quantum interference." Can graphene nanoribbons replace silicon? While I usually love a little bit more technical terminology on physorg, I think "epitaxial" deserved to have "monocrystalline deposition" in parenthesis. Not that I mind looking up epitaxial, but I ended up on wikipedia and lost half an hour looking into it further. I don't have that kind of spare time! Sorry, if I included /sarcasm in my original comment you might have noticed I was being sarcastic as well. Sounds like the room-temperature superconductor, everyone is looking for. " Sounds like the room-temperature superconductor, everyone is looking for. ..."
https://phys.org/news/2011-03-templated-growth-technique-graphene-nanoribbons.html
Around 17 journalists, experts and civil society representatives, from the fields of security and organised crime, gathered in Tirana on October 2 for a workshop organised by BIRN Albania to discuss topics and strategies that investigative reporters can use in order to better report on organised crime and its role in society. The event was part of a project called ‘Strengthening Media’s Role in the Fight Against Corruption,” financed by the Open Society Foundation in Albania. The project’s aim is to strengthen journalist’s reporting on corruption in the country through cooperation with civil society, in order to contribute to a more informed citizenry that is engaged in the democratic process. Dalina Jashari from the Institute of Democracy and Mediation facilitated the workshop, in which participants suggested a series of key topics centred on organised crime, including the nexus between it and politics, the poor record of the justice system in enforcing extradition of drug pins wanted in the EU and money laundering, among others. The goal of the workshop was to inform the upcoming call for investigative reporting grants on the topic of organised crime, which will be launched in the coming week by BIRN Albania. Through the call, three journalists will be selected by an independent jury and will be mentored by BIRN editors for a period of three months to produce hard-hitting investigative reports on the topic of organised crime.
https://birn.eu.com/news-and-events/birn-albania-holds-workshop-on-organised-crime/
As part of an ongoing attempt to help law enforcement obtain data across international borders, the Council of Europe’s Cybercrime Convention— finalized in the weeks following 9/11, and ratified by the United States and over 50 countries around the world—is back on the global lawmaking agenda. This time, the Council’s Cybercrime Convention Committee (T-CY) has initiated a process to draft a second additional protocol to the Convention—a new text which could allow direct foreign law enforcement access to data stored in other countries’ territories. EFF has joined EDRi and a number of other organizations in a letter to the Council of Europe, highlighting some anticipated concerns with the upcoming process and seeking to ensure civil society concerns are considered in the new protocol. This new protocol needs to preserve the Council of Europe’s stated aim to uphold human rights, and not undermine privacy, and the integrity of our communication networks. How the Long Arm of Law Reaches into Foreign Servers Thanks to the internet, individuals and their data increasingly reside in different jurisdictions: your email might be stored on a Google server in the United States, while your shared Word documents might be stored by Microsoft in Ireland. Law enforcement agencies across the world have sought to gain access to this data, wherever it is held. That means police in one country frequently seek to extract personal, private data from servers in another. Currently, the primary international mechanism for facilitating governmental cross border data access is the Mutual Legal Assistance Treaty (MLAT) process, a series of treaties between two or more states that create a formal basis for cooperation between designated authorities of signatories. These treaties typically include some safeguards for privacy and due process, most often the safeguards of the country that hosts the data. The MLAT regime includes steps to protect privacy and due process, but frustrated agencies have increasingly sought to bypass it, by either cross-border hacking, or leaning on large service providers in foreign jurisdictions to hand over data voluntarily. The legalities of cross-border hacking remain very murky, and its operation is the very opposite of transparent and proportionate. Meanwhile, voluntary cooperation between service providers and law enforcement occurs outside the MLAT process and without any clear accountability framework. The primary window of insight into its scope and operation is the annual Transparency Reports voluntarily issued by some companies such as Google and Twitter. Hacking often blatantly ignores the laws and rights of a foreign state, but voluntary data handovers can be used to bypass domestic legal protections too. In Canada, for example, the right to privacy includes rigorous safeguards for online anonymity: private Internet companies are not permitted to identify customers without prior judicial authorization. By identifying often sensitive anonymous online activity directly through the voluntary cooperation of a foreign company not bound by Canadian privacy law, law enforcement agents can effectively bypass this domestic privacy standard. Faster, but not Better: Bypassing MLAT The MLAT regime has been criticized as slow and inefficient. Law enforcement officers have claimed that have to wait anywhere between 6-10 months—the reported average time frame for receiving data through an MLAT request—for data necessary to their local investigation. Much of this delay, however, is attributable to a lack of adequate resources, streamlining and prioritization for the huge increase in MLAT requests for data held the United States, plus the absence of adequate training for law enforcement officers seeking to rely on another state’s legal search and seizure powers. Instead of just working to make the MLAT process more effective, the T-CY committee is seeking to create a parallel mechanism for cross-border cooperation. While the process is still in its earliest stages, many are concerned that the resulting proposals will replicate many of the problems in the existing regime, while adding new ones. What the New Protocol Might Contain The Terms of Reference for the drafting of this new second protocol reveal some areas that may be included in the final proposal. Simplified mechanisms for cross border access T-CY has flagged a number of new mechanisms it believes will streamline cross-border data access. The terms of reference mention a simplified regime’ for legal assistance with respect to subscriber data. Such a regime could be highly controversial if it compelled companies to identify anonymous online activity without prior judicial authorization. The terms of reference also envision the creation of “international production orders.”. Presumably these would be orders issued by one court under its own standards, but that must be respected by Internet companies in other jurisdictions. Such mechanisms could be problematic where they do not respect the privacy and due process rights of both jurisdictions. Direct cooperation The terms of reference also call for "provisions allowing for direct cooperation with service providers in other jurisdictions with regard to requests for [i] subscriber information, [ii] preservation requests, and [iii] emergency requests." These mechanisms would be permissive, clearing the way for companies in one state to voluntarily cooperate with certain types of requests issued by another, and even in the absence of any form of judicial authorization. Each of the proposed direct cooperation mechanisms could be problematic. Preservation requests are not controversial per se. Companies often have standard retention periods for different types of data sets. Preservation orders are intended to extend these so that law enforcement have sufficient time to obtain proper legal authorization to access the preserved data. However, preservation should not be undertaken frivolously. It can carry an accompanying stigma, and exposes affected individuals’ data to greater risk if a security breach occurs during the preservation period. This is why some jurisdictions require reasonable suspicion and court orders as requirements for preservation orders. Direct voluntary cooperation on emergency matters is challenging as well. While in such instances, there is little time to engage the judicial apparatus and most states recognize direct access to private customer data in emergency situations, such access can still be subject to controversial overreach. This potential for overreach--and even abuse--becomes far higher where there is a disconnect between standards in requesting and responding jurisdictions. Direct cooperation in identifying customers can be equally controversial. Anonymity is critical to privacy in digital contexts. Some data protection laws (such as Canada’s federal privacy law) prevent Internet companies from voluntarily providing subscriber data to law enforcement voluntarily. Safeguards The terms of reference also envisions the adoption of “safeguards". The scope and nature of these will be critical. Indeed, one of the strongest criticisms against the original Cybercrime Convention has been its lack of specific protections and safeguards for privacy and other human rights. The EDRi Letter calls for adherence to the Council of Europe’s data protection regime, Convention 108, as a minimum prerequisite to participation in the envisioned regime for cross-border access, which would provide some basis for shared privacy protection. The letter also calls for detailed statistical reporting and other safeguards. What’s next? On 18 September, the T-CY Bureau will meet with European Digital Rights Group (EDRI) to discuss the protocol. The first meeting of the Drafting Group will be held on 19 and 20 September. The draft Protocol will be prepared and finalized by the T-CY, in closed session. Law enforcement agencies are granted extraordinary powers to invade privacy in order to investigate crime. This proposed second protocol to the Cybercrime Convention must ensure that the highest privacy standards and due process protections adopted by signatory states remain intact. We believe that the Council of Europe T-CY Committee — Netherlands, Romania, Canada, Dominica Republic, Estonia, Mauritius, Norway, Portugal, Sri Lanka, Switzerland, and Ukraine — should concentrate first on fixes to the existing MLAT process, and they should ensure that this new initiative does not become an exercise in harmonization to the lowest denominator of international privacy protection. We'll be keeping track of what happens next.
https://www.eff.org/ar/deeplinks/2017/09/cybercrime-conventions-new-protocol-needs-uphold-human-rights
Q: Scoring system for two-party game Suppose we have a game that operates with '$a~$' players for one party, and '$b~$' players on the opposing party. Each party has a long-run average win percentage for this game, with $A\%$ and $B\%~$(such that $(A + B) = 100~$) respectively for the first and second party. After $(a+b)$ players are willing to participate in the game, each will be assigned to a party (with equal chance of joining either party) Firstly, I was wondering if the expected long-run average win percentage for a random player joining this game, before his alignment has been assigned, can be calculated using the formula $\frac{aA + bB}{a + b}\% ~$, and if there are any improvements that can be made to this description. More particularly, this game is one of a system of games. The system aims to discourage players exclusively selecting games with a high $\frac{aA + bB}{a + b}\% ~$ percentage, or in other words, games in which a random player joining can more easily win (before his alignment has been assigned) Furthermore, suppose the first party wins the game, and one were to allocate points to the party based on some scoring system. The maximum number of points allowed to be allocated to a specific party is 100 points. Would the following formula allocate the points in a fair manner, under the assumption that loss rate of party $\propto$ points deserved ? $\displaystyle \frac{(100 - A) + (100 - \frac{aA + bB}{a + b})}{2}~$ noting that $(100 -A) = B$ How could this model possibly be improved? Please comment if this description is too vague or unclear, and I apologize if this question is not suitable for this website. Note: In the formula, I'm averaging functions of two values (long-run average win percentage before and after alignment has been dictated) to determine the points deserved. As an example, suppose a game has 9 players for the first party, and 1 player for the second. The long-run average win probabilities are 60% and 40% respectively for each party. By the first formula, the average win probability for a random player joining this game is $\frac{60\times9 + 40}{9 +1}\%=58\%$ The scoring system punishes joining games with a high win probability, hence, half the score will be determined by $(100 - 58) = 42~$, as loss rate $\propto$ points deserved. The scoring system also rewards games won by a party with a high win probability less, hence if the first party wins, the second half of the score is determined by $(100 - 60) = 40~$, as loss rate of party $\propto$ points deserved. Therefore, the final score is the average, $\frac{40 + 42}{2} = 41~$.This is modeled by the above formulas. Comment: Specifically, the variation in long-run average win percentages for the parties arises naturally as a result of specific methods, unique to each party, that can be exploited to win the game, and thus, this may unintentionally favor a specific party (as reflected in win probabilities, if $A\ne B$) A: Your calculation of the probability of a win before assignment is correct. One approach to make it fair is to make each game fair: Assign $B$ points for the $a$ side winning and $A$ points for the $b$ side. Then the expected win rate becomes $\frac {aAB+bAB}{a+b}=AB$ for each side.
While managers have a variety of responsibilities, the most critical one involves keeping teams working together effectively. An effective team reflects positively on the manager and provides value to the organization. When diverse viewpoints and personalities collaborate, innovative ideas emerge that can give a company competitive advantage. But sometimes collaboration turns to conflict. A manager needs to take immediate action to stop a conflict before the conflict stops the team. Gather the Facts Managers must always be the calm in the storm, taking a composed and objective approach to gathering the facts in any conflict situation. Conflicts, by nature, have a personal affect on the employees involved. Managers can only diffuse the situation by being unbiased and providing constructive directives. Lead by example while driving the team toward a resolution. Ask each employee to provide his point of view, and remind the team that everyone must have an opportunity to talk. Apply active listening skills to catch what is not being said, and to recognize the emotions behind the words. Refocus the Team Sometimes resolution is as simple as refocusing the team. Conflicts can result when teams lose focus by pulling in unspoken goals and objectives based on personal viewpoints or agendas. When the manager restates the team’s purpose, employees can come to realize they have infused firm requirements with soft expectations based on opinions rather than facts. Clarifying the requirements and objectives in a positive manner reintroduces a common point of reference. Brainstorm If refocusing the team does not resolve the conflict, challenge team members to try brainstorming to reach a workable solution. Engage everyone by incorporating ideas from each member of the team into the solution. By facilitating the brainstorming session in a positive and professional manner, a manager can also facilitate relationship building among the team members, promoting a positive outcome through effective collaboration. Recognize Conflict-Handling Styles Managers can identify and address team members’ conflict-handling styles. People have different conflict-handling styles just like they have different personalities. Some people are more prone to compete, others to accommodate, still others prefer to compromise or avoid a conflict altogether. Teams that can understand the variations within their conflict-handling styles can establish effective dialogues that avoid emotional reaction or over-reaction. The goal should be to balance the teams' various styles in conflict situations, respecting the needs and interests of all members of the team.
https://careertrend.com/managers-deal-conflict-workplace-2394.html
1. Buttonquail or hemipodes are members of a small family of birds, Turnicidae, which resemble, but are unrelated to, the quails of Phasianidae. They inhabit warm grasslands in Asia, Africa, Europe, and Australia. Lifespan: On average, males will live 3–5 years and females 2–4. Some individuals have lived up to 9 years old, making this species' life span well below 20 years. Order: Charadriiformes Scientific name: Turnicidae Higher classification: Shorebirds Rank: Family Family: Turnicidae; GR Gray, 1840 Lower classifications: Common buttonquail, Barred buttonquail, Turnix, Yellow-legged buttonquail, Black-breasted buttonquail 2. The budgerigar is a long-tailed, seed-eating parrot usually nicknamed the budgie, or in American English, the parakeet. Budgies are the only species in the genus Melopsittacus. Naturally, the species is green and yellow with black, scalloped markings on the nape, back, and wings. Lifespan: 5 – 10 years (In captivity) Family: Psittaculidae Clutch size: 4 – 6 Scientific name: Melopsittacus undulatus Length: 18 cm (Adult, In the wild) Mass: 30 – 40 g (Adult, In the wild) 3. The domestic canary, often simply known as the canary, is a domesticated form of the wild canary, a small songbird in the finch family originating from the Macaronesian Islands. Canaries were first bred in captivity in the 17th century. They were brought over by Spanish sailors to Europe. Family: Fringillidae Scientific name: Serinus canaria domestica Class: Aves Kingdom: Animalia Higher classification: Atlantic canary Lifespan: Can live 5–10 years on average, but some can live up to 15 or even 20. Red factor canary: 10 years, Harz Roller: 10 years. 4. The domestic pigeon is a pigeon subspecies that was derived from the rock dove. The rock pigeon is the world's oldest domesticated bird. Mesopotamian cuneiform tablets mention the domestication of pigeons more than 5,000 years ago, as do Egyptian hieroglyphics. Family: Columbidae Kingdom: Animalia Scientific name: Columba livia domestica Class: Aves Order: Columbiformes Higher classification: Rock dove Breeds: Homing pigeon, Racing Homer, Fantail pigeon, Indian Fantail, English Carrier pigeon Lifespan: Pigeons have short life spans of around 5 years in the wild, but in captivity, they are said to live about 15 years. One individual was recorded at 33 years. 5. Guineafowl are birds of the family Numididae in the order Galliformes. They are endemic to Africa and rank among the oldest of the gallinaceous birds. Phylogenetically, they branched off from the core Galliformes after the Cracidae and before the Odontophoridae. Lifespan: They can live up to 15 years. Scientific name: Numididae Family: Numididae; Longchamps, 1842 Mass: Helmeted guineafowl: 1.3 kg Class: Aves Clutch size: Helmeted guineafowl: 6 – 12, Vulturine guineafowl: 4 – 8 Height: Helmeted guineafowl: 53 – 58 cm, Vulturine guineafowl: 61 – 71 cm Lower classifications: Vulturine guineafowl, Crested guineafowl, Plumed guineafowl, Agelastes, Black guineafowl 6. Lovebird is the common name of Agapornis, a small genus of parrot. Eight species are native to the African continent, with the grey-headed lovebird being native to Madagascar. Lifespan: 10 – 15 years Scientific name: Agapornis Clutch size: 4 – 6 Family: Psittaculidae 7. Parrotlets are a group of the smallest New World parrot species, comprising several genera, namely Forpus, Nannopsittaca, and Touit. They have stocky builds and short tails and are endemic to Middle and South America. In the wild, parrotlets travel in flocks ranging in size from about four to over a hundred birds. Lifespan: These tiny birds are said to have a life span of 12–20; however, some owners have reported higher, possibly up to 30. Family: Psittacidae Order: Psittaciformes Class: Aves Mass: Pacific parrotlet: 26 g, Green-rumped parrotlet: 24 g, Mexican parrotlet: 34 g Representative species: Pacific parrotlet, Green-rumped parrotlet, Spectacled parrotlet, Blue-winged parrotlet, Yellow-faced parrotlet 8. The zebra finch is the most common estrildid finch of Central Australia and ranges over most of the continent, avoiding only the cool moist south and some areas of the tropical far north. It can also be found natively on Timor island. The bird has been introduced to Puerto Rico and Portugal. Lifespan: 2 – 5 years (In the wild). They can live around 5 years in the wild and 5–9 years on average in captivity. One individual lived to 14.5 years. Family: Estrildidae Clutch size: 2 – 7 Length: 10 – 11 cm Scientific name: Taeniopygia guttata Mass: 12 g 9. The cockatiel, also known as weiro bird, or quarrion, is a small parrot that is a member of its own branch of the cockatoo family endemic to Australia. They are prized as household pets and companion parrots throughout the world and are relatively easy to breed. Lifespan: In the wild, these immensely popular and affectionate birds can live 10–14 years, but in general most well-cared-for birds live about 20 years. There have been individuals exceeding this number, however, up to 32. Family: Cacatuidae Length: 30 – 33 cm (Adult) Scientific name: Nymphicus hollandicus Mass: 90 g (Adult) Order: Psittaciformes Breeds: Whiteface lutino cockatiel, Ashenfallow Cockatiel, Bronzefallow Cockatiel, ADMpied Cockatiel 10. Conures are a diverse, loosely defined group of small to medium-sized parrots. They belong to several genera within a long-tailed group of the New World parrot subfamily Arinae. The term "conure" is used primarily in bird keeping, though it has appeared in some scientific journals. Conure bird: Parrots, Green-cheeked parakeet, Sun conure, Cockatiel, Budgerigar Lifespan: Conures are popular meduim-small parrots with life spans that vary from 20–25 to 30 years. 11. The green aracari, or green araçari, is a toucan, a near-passerine bird. It is found in the lowland forests of northeastern South America, in the northeast Amazon Basin, the Guianas and the eastern Orinoco River drainage of Venezuela. Lifespan: They can live 20 years, with 26 being the longest recorded. Scientific name: Pteroglossus viridis Higher classification: Aracari Phylum: Chordata Order: Piciformes Rank: Species Class: Aves 12. The ring-necked dove, also known as the Cape turtle dove or half-collared dove, is a widespread and often abundant dove species in East and southern Africa. It is a mostly sedentary bird, found in a variety of open habitats. Lifespan: Their estimated life span is 15–27 years. Mass: 140 g Scientific name: Streptopelia capicola Higher classification: Streptopelia Conservation status: Least Concern (Population increasing) Phylum: Chordata Order: Columbiformes Lifespan: Their estimated life span is 15–27 years.
https://www.listph.com/2020/07/list-birds-shortest-lifespan-below-20.html
We prove that any family E1,.., E┌rn┐ of (not necessarily distinct) sets of edges in an r-uniform hypergraph, each having a fractional matching of size n, has a rainbow fractional matching of size n (that is, a set of edges from distinct Ei’s which supports such a fractional matching). When the hypergraph is r-partite and n is an integer, the number of sets needed goes down from rn to rn−r+1. The problem solved here is a fractional version of the corresponding problem about rainbow matchings, which was solved by Drisko and by Aharoni and Berger in the case of bipartite graphs, but is open for general graphs as well as for r-partite hypergraphs with r>2. Our topological proof is based on a result of Kalai and Meshulam about a simplicial complex and a matroid on the same vertex set.
https://asu.pure.elsevier.com/en/publications/rainbow-fractional-matchings
Are you a grateful person? Robert Emmons, Ph.D., a leading expert on gratitude, describes gratitude in two parts. Firstly, he says gratitude is an affirmation that there are good things in the world, gifts and benefits we’ve received. Secondly, it’s the recognition that the sources of this goodness are, at least partially, outside ourselves. This outside sources can be a higher power, the natural world or from social connections with others. In a world where more people today feel increasingly entitled and privileged, practicing gratitude for the familiar, everyday things couldn’t be more urgent, grounding, and beneficial for your well-being. It may be that some people are naturally more grateful than others, but expressing gratitude is a skill anyone can learn, and do more of. David Steindl-Rast, a practicing Benedictine monk, observes that, “In daily life, we must see that it is not happiness that makes us grateful, but gratefulness that makes us happy.” The individual impact of any one piece of gratitude may be small, but the cumulative effect is huge. That’s why it’s vital to develop the habit of gratitude and strengthen your gratitude muscles. Pay more attention to life and the people around you To develop and strengthen your gratitude muscle, pay more attention to life and the people around you. It’s hard to be grateful for that which you do not notice. Start by keeping a gratitude journal. Buy a blank paper journal and write down five things you are grateful for before you go to bed. It’s okay to start with the obvious or most basic things at first. Once you’ve started the habit of keeping a gratitude journal, get even more out of it by writing specifics—the more specific or detailed your journal entry, the better. A University of Southern California study found that writing five sentences about one thing you’re grateful for is more effective than writing one sentence about five things you’re grateful for. Share your joy Moreover, don’t hoard gratitude. Gratitude works better when it is shared. Tell at least one person every day what you appreciate about them and thank someone for a job or task well done daily. Again, it’s best to be specific than general when expressing your gratitude. For instance, instead of saying to a friend “Thanks for being there for me,” tell them “I appreciate what good company you are. You are such a good listener. I always feel better after hanging out with you.” Here’re more benefits you can expect when you develop the habit of gratitude in your life. 1. You’ll feel happier, alert and more energetic. According Dr. Emmons, one way gratitude works is by reducing underlying negative emotions, such as envy, regret, frustration, and resentment. You feel lighter, alert, more energetic, happy, and excited than those who are always grumpy and ungrateful. Even if you are already reasonably happy, gratitude can lift your mood and make you happier, particularly if you struggle with depression. Psychologists have actually found the more grateful you are, the less likely you are to experience depression. 2. You’ll be able to appreciate what you have more. Many people often say, “I’ll be happy when I get this done, or when she or he says they love me.” But it doesn’t work that way. Unless you are grateful from the start, even if you get those things you will soon feel unsatisfied and always reach for something new in the hopes it will make you happier. However, when you’re grateful it shifts your mind to what you have instead of what you lack. You stop thinking that you can’t feel satisfied until every physical and material need is met, and start feeling more warmth, love, contentment and joy in your heart for little blessings. 3. You’ll be less self-centered and narcissistic. We are all self-centered and narcissistic to some degree, but those who regularly express gratitude are better able to manage these potentially negative traits. That’s because grateful people are also kind and considerate of others—friends, foes, strangers, and even themselves. It takes courage to be kind and considerate. And, when you are kind and considerate, you are more empathetic, compassionate and less likely to be envious, materialistic and aggressive. 4. You’ll improve your relationships. Gratitude is immensely helpful in any relationship—romantic or otherwise—because if you’re grateful, you’re not fearful, and if you’re not fearful, you act out of a sense of security and not out of a sense of angst or contention. Some experts actually say gratitude is the glue that holds couples together. Research has also found that people exhibit enhanced brain activity in the anterior cingulate cortex (ACC) and the medial prefrontal cortex (mPFC) when they practice gratitude. These are areas of the brain linked to enhanced emotional processing, moral judgment, interpersonal bonding, and the ability to understand the mental states of others. 5. You’ll make your kids happier. Gratitude tells people that we not only appreciate them, but also admire and respect them. When these feelings are communicated to our kids, the kids learn to be grateful too and not focus too much on extrinsic goals, such as money, status and image. According to a study led by Jeffrey Froh, co-author of Making Grateful Kids, those extrinsic goals are empty and do not fulfill psychological needs. They actually contribute to depression in kids. However, when kids focus on gratitude they become happier, and when the kids are happy guess who else is happy—you are! Your joy is complete when the kids are happy and contented.
https://www.lifehack.org/353280/how-develop-the-habit-gratitude-happier
There have been 81 days of work on the project and although there have been significant wet and cold weather events since January, the contractor continues to make progress on-site with very few days off. The contractor currently has 39 pieces of drilling and excavation equipment on site with ten additional dump trucks to relocate excess material. Clearing operations are complete and blasting operations are approximately 80% complete. The contractor is approximately 60% complete with the storm drainage installation and is coordinating with multiple utility companies to begin relocation efforts. To date, Huntsville Utilities has completed electrical relocation and others are scheduled to begin their work next month. The contractor will also begin installation of the new water line next month in an effort to complete all utility work and will begin to construct the new roadway subgrade shortly thereafter. The project is expected to be fully complete by May 2020. The contractor is currently on schedule to restore two-way travel on the roadway by October 2019. Project completion is anticipated to extend an additional 8-10 months. Learn about alternate routes, safety, ride-sharing, and how to stay updated on the status of the project. Traffic laws will be strictly enforced by Huntsville Police. Expect delays and allocate additional time during peak morning and evening travel hours. Please drive safely and courteously. If you are involved in a motor vehicle accident that has no injuries, remember to move all involved vehicles to the shoulder of the road so traffic may flow smoothly. Help reduce traffic congestion, reduce wear and tear on your car and save on gas money by making use of City of Huntsville-vetted car and vanpooling options. Details are available at HuntsvilleAL.gov/rideshare. Some federal employees may be eligible for reimbursement for using ride-share programs. Check with your employer to see if you’re eligible. Important traffic or roadwork updates involving alternative routes will be available in real time via website, text and social media. If there are important traffic or roadwork updates involving alternative routes in the area, you can stay updated in real time via website, text and social media. The primary information hub for all information involving the Cecil Ashburn Drive Road Improvement Project. View project updates, budget, history, design considerations and more. View a comprehensive list of road alerts that are impacting traffic flow as well as project updates on major road construction. Nixle app – a downloadable app on your smartphone for updates on major traffic accidents impacting traffic flow, roadwork and more. Redstone Explorer – Redstone Arsenal’s notification app for installation closes, traffic accidents and other events of importance to the Arsenal and its team members. Waze – a GPS navigation app that provides turn-by-turn navigation information and user-submitted travel times and route details. Google Maps – web mapping service developed by Google offering satellite imagery, street maps and real-time traffic conditions. Twitter users may follow the hashtag #HsvRoads for updates on roadwork impacting traffic flow in the City of Huntsville. Download and/or print the Cecil Ashburn Info page or the Cecil Ashburn Drive Presentation. Read more about the Cecil Ashburn Improvement project.
https://www.huntsvilleal.gov/roadworkprojects/cecil-ashburn-boulevard/
Parthenogenesis is a natural reproduction process in lower plants and various animals. Parthenogenesis involves the development of embryos from unfertilized eggs. Parthenogenesis in animals can be apomictic or automictic. Apomictic parthenogenesis is the process by which mature eggs are produced via mitotic oogenesis while with automictic parthenogenesis, the egg cells undergo meiosis. Organisms produced through the former process are usually full clones of their mothers while the ones produced through the latter method are not. Some of the animals that exhibit parthenogenesis include: Komodo Dragon Komodo dragons are the largest living lizard species that can attain a maximum length of about 10ft and weigh approximately 150pounds. Komodo dragons are found in the Islands of Gili Motang, Flores, Rinca, and Komodo in Indonesia. Komodo dragons are sexual organisms that can also reproduce parthenogenetically. A komodo dragon known as Sungai laid eggs in 2005 at the London Zoo after being separated from male komodo dragons for over 2 years. Initially, scientists assumed that she had stored sperm which she had received from males, but another Komodo dragon, known as Flora, laid 11eggs at Chester Zoo in 2006. 7 out of the 11 unfertilized eggs hatched. Scientists from the University of Liverpool performed a genetic test on 3 of Flora’s eggs and determined that her eggs were not fertilized. Thus, Komodo dragons can reproduce via parthenogenesis when placed in an isolated habitat. Learn some more fascinating facts about these gigantic lizards in this article here. Aphids An aphid is a minute sap-sucking insect that belongs to the superfamily Aphidoidea. Aphids can reproduce both sexually and asexually. Often, in the simplest reproductive strategy, the aphid alternates the two methods of reproduction on a single host all year round. In other cases, aphids may reproduce solely by parthenogenesis. Hosts might also be changed during its life-cycle. Blacktip Sharks Blacktip sharks are requiem shark species that belong to the family Carcharhinidae. Blacktip sharks are quite common in the coastal subtropical and tropical waters on the planet. Blacktip sharks can reproduce both sexually and asexually. A 9-year-old female blacktip was found to be pregnant in 2007 at the Virginia-Aquarium and Marine-Science Center despite never being mated by any male. Genetic analysis confirmed that it had reproduced through parthenogenesis. Bonnethead Shark Bonnethead sharks belong to the Sphyrnidae family. Bonnethead sharks are the only omnivorous shark on the planet which can be found on the American coast. Its habitat ranges from Ecuador to California and from the Mexican Gulf to New England. Bonnethead sharks prefer warm water above 21°C. Therefore, they can be found near the equator in winter and the Mexican Gulf during summer. A bonnethead shark reproduced parthenogenetically in Nebraska at the Henry-Doorly Zoo. DNA analysis confirmed that the pup was produced via parthenogenesis in 2007. Epiperipatus Imthurni Epiperipatus imthurni is a velvet worm species that belongs to the Peripatidae family. The Epiperipatus imthurni can be found in Trinidad and Guyana. No male Epiperipatus imthurni species have ever been recorded. The females from Trinidad reproduce parthenogenetically. Epiperipatus imthurni is the only velvet worm species that reproduce through parthenogenesis. Triaeris Stenaspis Triaeris stenaspis is a spider species belonging to the Oonopidae family. Triaeris stenaspis can be found in the subtropical and tropical parts of the world including Australia, Madagascar, Argentina, the United States, and various isolated islands like Cook, Marquesas, Hawaii, and the Galapagos Islands. The Triaeris stenaspis is believed to be parthenogenetic since no male species has ever been found. Parthenogenesis has been proven in various Triaeris stenaspis species that were kept in laboratory-conditions. The spiders were reared since they were hatched until they died. All the spiders were female, and they laid fertile eggs which hatched into female offspring. Another spider species that is believed to be parthenogenetic is the Heteroonops spinimanus. Brahminy Blind Snake Brahminy blind snake, also known as Indotyphlops braminus, is a non-poisonous blind snake that is native to Asia and Africa. Brahminy blind snakes have been introduced in other parts of the world like Oceania, the Americas, and Australia. Brahminy blind snakes are fossorial creatures that resemble earthworms. These blind snakes are parthenogenetic, and so far all the specimens collected are females. These snakes can lay eggs or give birth to female offspring that are genetically identical. Indo-Pacific Gecko Indo-Pacific geckos, also known as fox geckos, is a species of geckos that can be found in Australia, Southeast Asia, and the Philippines. They are seen as dark brown or gray lizards with a pale-translucent color at night and some light markings during the day. Indo-Pacific geckos are parthenogenic animals. They are all females that lay eggs that hatch without being fertilized by a male. New Mexico Whiptail New Mexico whiptails are indigenous to Chihuahua (Mexico), Arizona, and New Mexico. New Mexico whiptail is one of the numerous lizards which can reproduce via parthenogenesis. Parthenogenesis has made it possible for this all-female lizard population to reproduce and grow into a unique species that can reproduce. Members of this species can also be created through the hybridization of the western whiptails and the little-striped whiptail. Daphnia Pulex Daphnia pulex is one of the most widespread water-flea species on the planet that can be found in a wide range of aquatic terrains. Daphnia pulex can be found in Australia, the Americas, and Europe. Daphnia pulex may appear reddish in hypereutrophic waters because of hemoglobin production while it may have little pigmentation in oligotrophic lakes. The head of the Daphnia pulex has 6 segments that are fused. Daphnia pulex can alternate between asexual and sexual reproduction.
https://www.worldatlas.com/articles/10-animals-that-exhibit-parthenogenesis.html
By ALABA-OLUSOLA OKE AKURE- Gov. Rotimi Akeredolu of Ondo State has assured residents of the state that the government would hunt down assailants that attacked and killed worshippers of St. Francis Catholic Church, Owo on Sunday. This is contained in a statement by Mr Richard Olatunde, the Chief Press Secretary to the Governor, on Sunday in Akure. “We are deeply saddened by the unprovoked attack and killing of innocent people of Owo, worshiping at the St. Francis Catholic Church, Owa-luwa Street, on Sunday. “The vile and satanic attack is a calculated assault on the peace-loving people of Owo Kingdom, who have enjoyed relative peace over the years. “It is a black Sunday in Owo. Our hearts are heavy. Our peace and tranquility have been attacked by the enemies of the people. This is a personal loss, an attack on our dear state. “I have spoken to the Bishop of the Catholic Diocese of Ondo, Most Reverend Jude Arogundade, who is presently on his way to Owo. “Similarly, I have had to cut short my party’s national assignment in Abuja and visit Owo immediately,” he stated. According to the governor, this is an unexpected development and I am shocked to say the least. “Nevertheless, We shall commit every available resource to hunt down these assailants and make them pay. “We shall never bow to the machinations of heartless elements in our resolves to rid our state of criminals,” he said. The governor condoled with the people of Owo, especially families of victims of the attack. “I commiserate with my people in Owo, particularly families of the those who lost their lives to this ugly and unfortunate attack. “I extend my condolences to Olowo of Owo, Oba Gbadegesin Ogunoye as well as the Catholic Church,” he stated. Akeredolu enjoined the people to be calm and be sensitive, asking them not to engage in any act that could complicate the crisis. “I urge our people to remain calm and vigilant. Do not take laws into your hands.
https://sundiatapost.com/owo-attack-we-will-hunt-down-assailants-make-them-pay-akeredolu/
Performance status is an important factor in determining quality of life, the choice of treatment, and prognostic tool in patients. All scoring systems currently in use measure the patient's performance subjectively. A new method of objective assessment of performance ECOG/WHO grades 2 and 3 was constructed and tested. This article was published in the following journal. Name: Supportive care in cancer : official journal of the Multinational Association of Supportive Care in Cancer ISSN: 1433-7339 Pages: Defining Optimal Comorbidity Measures for Patients with Early Stage Non-small Cell Lung Cancer (NSCLC) Treated with Stereotactic Body Radiation Therapy (SBRT). Comparison of overall survival (OS) between SBRT and other treatments for early stage NSCLC is confounded by differences in age, performance status, and medical comorbidity. We sought to define the mo... A Systematic Review of Fitness Apps and Their Potential Clinical and Sports Utility for Objective and Remote Assessment of Cardiorespiratory Fitness. Cardiorespiratory fitness (CRF) assessment provides key information regarding general health status that has high clinical utility. In addition, in the sports setting, CRF testing is needed to establi... On the complementarity of holistic and analytic approaches to performance assessment scoring. A holistic approach to performance assessment recognizes the theoretical complexity of multifaceted critical thinking (CT), a key objective of higher education. However, issues related to reliability,... 153Sm-EDTMP and 177Lu-EDTMP are equally safe and effective in pain palliation from skeletal metastases. Bone pain from multifocal blastic or mixed lytic-blastic metastatic lesions can be effectively addressed with radiopharmaceuticals with high affinity for such foci. Sm-ethylene diamine tetramethylene ... Performance and Symptom Validity Testing in Pediatric Assessment: A Review of the Literature. There has been an increased recognition that validity testing is an integral component of evaluations conducted with youth. The incorporation of validity testing provides an objective basis for placin... A Clinical Trial of Durvalumab (MEDI4736) as 1st Line Therapy in Advanced Non-small Cell Lung Cancer Patients With ECOG Performance Status of 2 This is a single-arm phase II clinical trial evaluating the safety and efficacy of the PD-L1 inhibitor durvalumab as first-line therapy in 50 patients with advanced NSCLC and ECOG Performa... S-1 vs Capecitabine in the Elderly and/or Poor Performance Status Patients With Recurrent or Metastatic Gastric Cancer This study is an open-label, single-center, and randomized phase II study designed to evaluate each efficacy and safety of S-1 and capecitabine in the elderly and/or poor performance statu... Afatinib in EGFR+NSCLC (Recurrent or Stage IV) - Patients With Poor Performance Status (ECOG 2 or 3) There is a medical need for improving treatment of poor performance status patients with EGFR driver mutations and documenting safety and tolerability of existing agents. Hydration Status and Cognitive Performance in Adolescents Objective: to evaluate hydration status and his impact on cognitive performance in adolescents-based cohort study. Methods: A randomized controlled pilot study is active in ten classes of... The Effect of Objective Structured Feedback on Live Surgical Performance: A Single-Blind Randomized Control Trial This study seeks to establish the effect of regular structured feedback on surgical performance using crowd sourced video assessments with validated objective performance scores and time t... Outcome And Process Assessment (health Care) Evaluation procedures that focus on both the outcome or status (OUTCOMES ASSESSMENT) of the patient at the end of an episode of care - presence of symptoms, level of activity, and mortality; and the process (ASSESSMENT, PROCESS) - what is done for the patient diagnostically and therapeutically. Nutrition Assessment Evaluation and measurement of nutritional variables in order to assess the level of nutrition or the NUTRITIONAL STATUS of the individual. NUTRITION SURVEYS may be used in making the assessment. Health Status The level of health of the individual, group, or population as subjectively assessed by the individual or by more objective measures. Employee Performance Appraisal The assessment of the functioning of an employee in relation to work. Karnofsky Performance Status A performance measure for rating the ability of a person to perform usual activities, evaluating a patient's progress after a therapeutic procedure, and determining a patient's suitability for therapy. It is used most commonly in the prognosis of cancer therapy, usually after chemotherapy and customarily administered before and after therapy. It was named for Dr. David A. Karnofsky, an American specialist in cancer chemotherapy.
https://www.bioportfolio.com/resources/pmarticle/2280936/Objective-assessment-of-WHO-ECOG-performance-status.html
London Fashion Week Announces Inaugural International Fashion Showcase The inaugural International Fashion Showcase is set to take place during London Fashion Week, February 2012. 19 embassies and cultural institutes across London will open their doors and display the work of over 80 international emerging designers. The public, together with international press and buyers, will have the opportunity to explore the collections of some of the most innovative, emerging fashion designers from around the world. The first project on which the British Council and the British Fashion Council (BFC) have collaborated, this new showcase is part of the Fashion 2012 Cultural Programme and has been developed to celebrate the year of the Olympics and Paralympics and honour its values of international respect, excellence, equality and friendship. Countries participating in this showcase include Australia, Belgium, Botswana, Caribbean, China, Croatia, Estonia, Italy, Japan, Korea, Netherlands, Nigeria, Philippines, Poland, Romania, Sierra Leone, United States and Uzbekistan. Each country has been asked to present a selection of emerging designers whom they feel most represents the future of fashion in their region. Sarah Mower, BFC Ambassador for Emerging Talent and Contributing Editor to US Vogue, will chair an advisory panel that will judge each piece of work, with an award given to the country that presents the best emerging fashion talent showcase. This will be announced on Sunday 19 February, during London Fashion Week.
https://thestyleexaminer.com/2012/01/london-fashion-week-announces-inaugural.html
wikiHow is a “wiki,” similar to Wikipedia, which means that many of our articles are co-written by multiple authors. To create this article, 20 people, some anonymous, worked to edit and improve it over time. There are 16 references cited in this article, which can be found at the bottom of the page. wikiHow marks an article as reader-approved once it receives enough positive feedback. In this case, 84% of readers who voted found the article helpful, earning it our reader-approved status. This article has been viewed 225,122 times. Learn more... Crab spiders are part of the large Thomisidae family of arachnids, with over 3,000 different kinds of crab spiders within this family. They are called crab spiders because they have uneven legs that are longer in front than in the back, which gives them the appearance and movements of a crab. Learning to identify a crab spider by its appearance and its habitat can help you to detect a Thomisidae arachnid. It can also help you know how to deal with a crab spider if you ever find one. Steps Method 1 of 3: Identifying a Crab Spider - 1Take note of the spider's legs. The most notable feature of a crab spider is its legs, which have longer front four legs than the back four legs. Sometimes these front legs also appear different than the other legs and are darker or hairier than their back counterparts. Like a crab, the crab spider's front 2 legs also have incredibly strong claws which they use to grab their prey. X Research source - 2Watch the spider move. While the crab spider's legs resemble those of a crab, it is really their gait and movements that make them most similar to their namesake. If you gently provoke a crab spider, you will see that it moves sideways like a crab on the beach. That is because their legs have something called “laterigrade leg orientation,” which means that their legs are rotated at the base, causing them to move sideways like crab. X Research source - 3Observe the color of the spider. Unlike some spider species like the brown recluse spider, the shared characteristic of crab spiders' coloring is that it's incredibly varied. Instead of looking for an all over color, as with the brown recluse, or the distinctive black and red coloring of a black widow spider, crab spiders are colored extravagantly to blend into their surroundings. Because crab spiders can camouflage themselves, they can be bright and vibrantly colored like a flower or a fruit, or they can be multicolored to blend into tree branches or leaves. X Research source - 4Note the size of the spider. With over 3,000 types of crab spiders, assigning a standard size to this type of spider is difficult. However, the vast majority of these species range from about 4 - 10 mm (which is the length of the body not including the legs). X Research source The female crab spiders are always larger than the males, especially when they are storing hundreds of egg sacs, and some male crab spiders are only 1/4 to 1/3 the size of their female counterparts. You should also look at the size and shape of the spider's abdomen, as crab spiders typically have much more bulbous and round abdomens than other spider species. X Research source - 5Look at the spider's eyes. While the prospect of getting close enough to a spider to check out its eyes can be unnerving to some, crab spiders have distinct eyes. Unlike other insects, spiders have eight eyes that are round and smooth instead of two compound eyes that have numerous surfaces like the outside of a golf ball. Crab spiders normally have two big front eyes and have excellent eyesight. The most common species of crab spiders are brightly colored around these two front eyes, or they have a noticeable ridge below these eyes called a “clypeal carina.” X Research sourceAdvertisement Method 2 of 3: Recognizing Crab Spider Habitats - 1Find out if crab spiders live in your area. With over 3,000 species of crab spiders, there is a fairly large range of climate zones that these spiders can withstand. While a few sighting of crab spiders have been noted in most parts of the world, they are most commonly found in: X Research source - Northwest Europe - Northern and eastern Australia - North America - 2Know where to look for crab spiders. If you live in an area where crab spiders are commonly found, the next step in identifying a crab spider is to recognize their preferred environments. Because crab spiders hunt by blending in with their surroundings, they will make a home wherever they blend in the best. While these habitats can vary depending on the specific species of crab spider, they most commonly make nests in: X Research source - Bunches of fruit - The leaves of plants - Thickets of grass - Flowers, especially brightly colored varieties - Pollen-producing plants - 3Watch how the spider hunts. Crab spiders are considered a hunter spider; however, the vast majority of crab spiders are not active hunters. X Research source This means that instead of actively pursuing prey, most crab spiders sit camouflaged in their nest for days or weeks at a time until an unsuspecting prey wanders too close. The clawed front legs of the crab spider are incredibly strong, and they use the additional length of these legs to reach out and grab insects. They then pull their prey in with their front legs and inject them with immobilizing venom, rarely moving their body or shorter back legs at all while hunting. X Research source - 4Note how the spider behaves. Unlike some other spider species, the crab spider is a non-aggressive spider. Crab spiders are not only passive while hunting, they are also incredibly timid and fearful of predators. Their uneven leg lengths make them fairly uncoordinated in comparison to other arachnids, which can leave them vulnerable to prey. Rather than attacking a predator, crab spiders will flee to the other side of their nest or abandon their home completely if they spot a predator nearby. X Research source - 5Search for any egg sacs. Crab spiders are unique in that they do not create webs like other species. Instead, crab spiders lay their eggs on whatever surface they've camouflaged themselves with, fastening the eggs to the surface with their silk. If you see any silken egg sacs that appear flat and are joined at the center, you most likely have identified a crab spider nest. Just keep in mind that female crab spiders will commonly remain near these egg sacs in order to protect them from predators, including you! X Research sourceAdvertisement Method 3 of 3: Handling Crab Spiders in your Area - 1Identify a crab spider bite. Spider bites from any arachnid family look like two distinct puncture marks. These puncture marks are caused by the hollow fangs that all spiders use to inject venom into their prey. A crab spider's bite is not dangerous to humans because the venom is not potent enough and most crab spiders are not big enough to break the skin with their fangs. However, some species like the giant crab spider (Olios giganteus) are big enough to puncture the skin, and the bite from the larger crab species is said to be pretty painful. X Research source - 2Manage crab spiders when found indoors. Due to the crab spider's preferred habitat, it is very unlikely to find this type of spider inside. If you do happen to find one inside though (and you're not too scared!), it is recommended that you gently capture the spider by scooting it into a cup, covering it, and releasing it outside. They are not harmful to humans and are a great way to control the population of other insects like bees, wasps, mosquitoes, and flies. Some other tips for reducing the number of crab spiders in your home include: X Research source - Check all flowers and plants for crab spiders before you bring them inside, especially flowers recently cut from a garden. - Capture and discard or relocate individual spiders that have wandered inside because they reproduce rapidly. - Remove or regularly inspect any potted plants and flowers inside the home as this is the most likely spot a crab spider would reside in indoors. - 3Cope with crab spiders outdoors. Crab spiders are harmless to humans, so eradicating them from your outdoor area is not advised unless there is an extreme infestation. Try to see the crab spider as helping to keep your home free of bees, wasps, mosquitoes, flies, and other pesky insects. However, if you prefer to reduce the number of crab spiders in your outdoor area, you can: X Research source Advertisement - Remove all piles of plant debris, like piles of kindling, grass clippings, or mulch. - Keep grassy areas near your home cut short. - Avoid planting pollen-producing plants. - Periodically remove crab spider nests with a broom or a hard spray of water. Community Q&A - QuestionAre there crab spiders in Malaysia?Community AnswerYes, there are crab spiders in Malaysia, they have solid colored legs and are round. - QuestionHow long do crab spider bites take to heal?Community AnswerIt can take a few weeks to heal completely. - QuestionDo crab spiders live in tropical regions?Community AnswerYes, crab spiders can be found in many parts of the world. They live in desert, tropical, and forest habitats. - QuestionAre crab spiders good or harmful for the environment?Community AnswerThey are not very harmful to the environment, though they have a painful bite if big enough to puncture the human skin. If you have insects like mosquitoes, wasps, or bees, it would be good to keep them around. If you find one inside, simply scoop it into a cup and gently place it outside on or under a plant. - QuestionWhat predators are crab spiders in danger from?Community AnswerThey are in danger from insect eating predators such as snakes, lizards, etc. - QuestionWhat kind of web do they make?Community AnswerThey don't make webs. They hunt with their strong legs, and hairs on their legs. - QuestionHow do I identify the gender of a crab spider?Community AnswerThe females are usually much larger than the males. The size dimorphism is very evident in these spiders. - QuestionAre there crab spiders in Ireland?Community AnswerYes, crab spiders are very common everywhere in Europe, so there should be plenty of them in Ireland as well. - QuestionWhat kind of species of crab spiders are found in the USA?Community AnswerThere are many hundreds of crab spider species in the United States, so it would take hours to list them all. Do an online search for Thomisidae USA and you will find many examples. Tips Warnings - If you are bitten by a spider (crab spider species or otherwise) and the area surrounding the two puncture marks becomes red, painful, or swollen, seek medical attention. If you can, bring the spider with you or try to remember what it looked like so you can describe it to the doctor. X Research sourceThanks! References - ↑ http://ednieuw.home.xs4all.nl/Spiders/Thomisidae/Thomisidae.htm - ↑ http://ednieuw.home.xs4all.nl/Spiders/Thomisidae/Thomisidae.htm - ↑ http://www.extension.umn.edu/garden/insects/find/common-spiders-in-and-around-homes/ - ↑ http://ednieuw.home.xs4all.nl/Spiders/Thomisidae/Thomisidae.htm - ↑ http://www.spiders.us/species/ - ↑ http://www.spiders.us/species/misumenoides-formosipes/ - ↑ http://www.spiders.us/species/ - ↑ http://www.orkin.com/other/spiders/crab-spiders/ - ↑ http://www.extension.umn.edu/garden/insects/find/common-spiders-in-and-around-homes/ - ↑ http://ednieuw.home.xs4all.nl/australian/thomisidae/crabspiders.html - ↑ http://ednieuw.home.xs4all.nl/australian/thomisidae/crabspiders.html - ↑ http://www.orkin.com/other/spiders/crab-spiders/ - ↑ http://www.orkin.com/other/spiders/crab-spiders/ - ↑ http://www.extension.umn.edu/garden/insects/find/common-spiders-in-and-around-homes/ - ↑ http://www.extension.umn.edu/garden/insects/find/common-spiders-in-and-around-homes/ - ↑ http://www.extension.umn.edu/garden/insects/find/potentially-dangerous-spiders/ About This Article Crab spiders are typically found in northwest Europe, North America, and northern and eastern Australia. They usually have uneven legs, with the front 4 legs being longer than the back 4 legs. Their front 2 legs also have large claws. Crab spiders walk sideways like their namesakes. The color of a crab spider can vary widely, since it camouflages itself to blend in with its surroundings. Crab spiders also usually have 2 bright front eyes, giving them excellent eye sight. Instead of actively hunting for prey, they usually sit in their nests and wait for insects to fly past, then grab them with their strong claws. To learn more about where you are likely to find crab spiders, keep reading!
https://www.wikihow.com/Identify-a-Crab-Spider
How do you not get tired in sports? Rest/Recovery – Complete a warm up and cool down for 5 to 10 minutes each time you exercise. Start off slowly and gradually increase workout intensity levels so that your muscles are gradually challenged and can build over time. Allow adequate rest between workout sessions and strength repetitions. Do footballers get tired? The high number of matches, combined with required training sessions and the amount of strain imposed on the body, results in players experiencing fatigue. How can I work all day without getting tired? Too Tired To Work? - Take a cold shower or splash water on your face. - Skip breakfast if you’re not hungry. - Delay coffee until after cortisol spikes at 9:30 a.m. - Tackle important tasks early. - Get outside. - Don’t eat at your desk. - Save creative tasks for the afternoon. - Don’t eat too much. 2 июл. 2018 г. How would muscle fatigue affect a footballer? Abstract. One of the consequences of sustaining exercise for 90 minutes of football match-play is that the capability of muscle to generate force declines. … The decline in muscle strength may increase the predisposition to injury in the lower limbs. Central fatigue may also occur with implications for muscle performance … Why do I get tired easily? You may be too exhausted even to manage your daily affairs. In most cases, there’s a reason for the fatigue. It might be allergic rhinitis, anemia, depression, fibromyalgia, chronic kidney disease, liver disease, lung disease (COPD), or some other health condition. Why do I feel tired all day after working out? It’s common to get tired after a long or tough workout. In general, this occurs because your muscles run out of energy. Your central nervous system also loses its ability to keep moving your muscles. This causes muscle fatigue, making you feel tired. How can I increase my stamina for football? 10 Ways to increase your stamina - Combine your strength and cardio sessions. … - Choose exercises using lots of muscles. … - Apply fast-paced, dynamic activities to training. … - Don’t forget to stretch. … - Throw out the old routine. … - Stay hydrated. … - Nutrition is key. … - Consider your rest time. 10 янв. 2017 г. How many hours of sleep does a soccer player need? Speaking to FourFourTwo Performance, Rooney explains his sleep pattern and needs: “I try to get at least eight hours of sleep a night, plus an hour or two in the afternoon. To do your best in training, eight hours is fine. How do you get fit for soccer? To get in shape fast, you’ll need to recover from intense workouts quickly so you can work out again without injury. Eat or drink a combination of carbs and protein soon after each workout. Get enough sleep each night, eat nutrient-rich food, and drink lots of water. How do I study when tired? How To Focus When Studying, Even When You’re Tired - #1. Study In A Brightly Lit Room. - #2. Don’t Get Too Comfortable. - #3. Remove All Distractions Before Studying. - #4. Study With Other Like-Minded People. - #5. Drink Enough Water. - #6. Have A Balanced Diet And Avoid Heavy Meals. - #7. Study Consistently And Keep Optimizing Your Routine. - #8. Go For A Walk (Or Just Get Up And Move) 30 нояб. 2020 г. What to do if you are tired of working? Even a brisk walk around the block can help boost your energy levels and mood. - Leave work at work. … - Ask for help. … - Spend your free time on rewarding hobbies. … - Make a self-care plan. … - Talk with loved ones. … - Break up the monotony. … - Evaluate options for the future. 22 окт. 2020 г. How can I study less and sleep more? Sleep better, study better - Stay out of bed. Studying should be done anywhere but on your bed. … - Limit naps. While it may seem like a good idea to take naps to make up for lost sleep because of that early lecture, science says it isn’t always a good idea. … - Wake up on the weekend. … - Avoid caffeine. … - Adjust the lights. … - Wind down. … - Eat a little. 15 авг. 2018 г. How long does it take to recover from a football match? The results from this study demonstrate that it takes approximately 48 hours after a match for an athlete to recover from a performance standpoint and up to 72 hours for certain biochemical markers to recover (e.g. CK).
https://rightbankwarsaw.com/players/how-do-you-not-get-tired-when-playing-football.html