content
stringlengths 0
1.88M
| url
stringlengths 0
5.28k
|
---|---|
Cardillo Group - Macroevolution, Macroecology and Biogeography
We are interested in big-picture questions about biodiversity. Why are there so many species in the tropics? How have places like southwest Australia become biodiversity hotspots? Why are some species more threatened with extinction than others? To tackle questions like these we use big datasets for plants and animals, and a range of computational tools for analyzing geographic and phylogenetic data. Often, the most fun part is not getting an answer, but getting the question right: thinking about the basic scientific logic of a question about biodiversity, and devising an elegant and creative way of reaching an answer.
We always like welcoming new students, postdocs and visitors, so please get in touch if you are interested in macroevolution, macroecology, biogeography or conservation, and would like to join the lab. My lab is part of the Macroevolution & Macroecology group - you can find out more about what we work on and what we have published at www.macroevoeco.com.
Group Leader
Postdoctoral Fellow
Masters Student
PhD Students
Selected recent publications
Bromham, L. & Cardillo, M. (2019) Origins of Biodiversity: An Introduction to Macroevolution and Macroecology. Oxford University Press
Hua, X., Greenhill, S., Cardillo, M., Schneeman, H. & Bromham, L. (2019) The ecological drivers of variation in global language diversity. Nature Communications 10:2047
Skeels, A. & Cardillo, M. (2019) Reconstructing the geography of speciation from contemporary biodiversity data. The American Naturalist 193: 240-255
Cardillo, M., Weston, P.H., Reynolds, Z.M., Olde, P.M., Mast, A.R., Lemmon, E., Lemmon, A.R., Bromham, L. (2017) The phylogeny and biogeography of Hakea (Proteaceae) reveals the role of biome shifts in a continental plant radiation. Evolution 71: 1928-1943
Skeels, A. & Cardillo, M. (2017) Environmental niche conservatism explains the accumulation of species richness in Mediterranean-hotspot plant genera. Evolution 71: 582-594
Cardillo, M. & Skeels, A. (2016) Spatial, phylogenetic, environmental and biological components of variation in extinction risk: a case study using Banksia. PLoS One
Duchene, D. & Cardillo, M. (2015) Phylogenetic patterns in bird geographic distributions support the tropical conservatism hypothesis. Global Ecology & Biogeography 24: 1261-1268
Warren, D.L., Cardillo, M., Rosauer, D.F., Bolnick, D.I. (2014) Mistaking geography for biology: inferring processes from species distributions. Trends in Ecology & Evolution 29: 572-580
All publications
http://www.macroevoeco.com/marcel-cardillo-publications.html
https://scholar.google.com/citations?hl=en&user=6mBgzU8AAAAJ
Climate a bigger driver of language diversity than landscape
Big Questions in Biology - podcast now available
Cross-discipline research is being short changed
ARC Discovery projects and DECRA fellowships
Marcel Cardillo
Cats and foxes an unlikely aid to endangered island mammals
E&E PhD Exit Seminar: Burning biodiversity: how fires disturb bird communities
Fires are a major cause of disturbance in ecosystems all over the world. | https://biology.anu.edu.au/research/research-groups/cardillo-group-macroevolution-macroecology-and-biogeography |
Employees working for the Ministry of Internal Affairs refuse to testify or give any information about the crimes committed against protesters on the Maidan. In a display of solidarity, they are loath to testify against their superiors who have kept their jobs.
Ever-louder voices are being raised on the street and in the media criticizing the inaction of the prosecutors and the general lack of progress in bringing cases involving the murder of protesters on the Maidan [in February, 2014] to court. Racurs News has asked the defense lawyers of the victims’ representatives to share their thoughts on where things stand.
Taras Hataliak, coordinator for the team of defense lawyers working on behalf of the Heaven’s Hundred Family said the following:
“Since September we have established amenable relations with the prosecution. The investigation has been fruitless, but we think there are reasons for this. There is a general lack of political will among the leadership, and there are other issues as well. Mistakes were made.
“Each murder, injury, and assault was looked at individually rather than being examined collectively as an organized criminal action that took place on the Maidan between November 30, 2013 and February 22, 2014. For instance the HPU [national security service] was responsible for investigating injuries from a bullet while other injuries were being investigated by the Office of the Prosecutor in Kyiv. Everything is all over the place, so of course the results are miserable.”
For almost two months now the team of lawyers representing the families of the Heaven’s Hundred victims has been asking for more investigators to be assigned to the cases. On December 4th the Prosecutor General approved the creation of a new bureau in charge of investigating the crimes on the Maidan.
A coordinator responsible for providing analysis and an evaluation of the case documents was appointed. A lot of information has been lost. Many videos need to be reviewed and a mountain of evidence has to be examined.
The way we understood it, this newly formed bureau within the HPU is supposed to be in charge of investigating all the crimes related to the Maidan between the beginning of November, 2013 and the end of February, 2014. We wanted the cases in which the victims received injuries on the Maidan but died later while under medical care to be included in the investigation.
On December 5th a meeting was held between the lawyers, the families of the victims and the Head of the Security Service, as well as the heads of various departments. Valentyn Nalyvaichenko [Head of the Security Service] informed us that a department had been set up within the Security Service to coordinate the investigation.
We were told that any activist willing to participate is welcome to do so. That includes rights activists, the defense lawyers working for the families, and journalists. We were assured that work would be done on the federal level in the headquarters of the Security Service and on a local level in its district offices. Any valuable information should be passed on to the coordinating office.
The Ministry of the Interior assured us of their cooperation as well. We had meetings with Anton Herashchenko [of the MIA] and department heads of the ministry. Unfortunately we still have not received any answers to our questions.
The response we got from the MIA to a complaint we had filed about former and current members of Berkut being provided state-owned buses to bring the group to the Court of Appeals was telling. We supplied all the evidence including a video tape recording and demanded a review of the actions taken by the personnel of the Kyiv HPU and the MIA.
The results of the review shocked us. The review concluded that neither the employees nor the drivers had violated any laws: the Berkut group had simply asked for a ride.
At the pre-trial hearings former and possibly current members of Berkut videotaped and photographed the relatives of the victims and their lawyers. This is worrying: why did they do that? Why do they need such detailed documentation? It can be used against us illegally.
Cases the MIA is investigating need to be looked at separately. I have information that the MIA has already closed some cases and is about to close others. The ministry is investigating deaths that occurred after the Maidan as a result of beatings or gas poisoning, for example.
The police are investigating a death in Ivano Frankivsk of a person who died of hypothermia back in January. The man had been doused with water from water cannons. We will continue to demand from the HPU that the case be reopened. The MIA has miscalculated by letting the district police departments investigate cases independently.
Judging by the behavior of the police at pre-trial hearings, it is evident that they feel they are above the law. They exude confidence and insolence. I cannot know where their confidence comes from, I can only speculate. The Minister of the Interior, Arsen Avakov, has not introduced any anti-corruption measures among the management of the ministry and especially in the department of public safety within the MIA and in regional offices.
The regional supervisors of Berkut have not been dismissed. The regional administrators of public safety departments continue to abuse their authority and to apply pressure on their subordinates. Therefore it is not surprising that the subordinates refuse to testify. They are still a part of the system and are afraid. I cannot claim for certain since this is part of the investigation and therefore restricted, but I suspect the HPU simply does not have any evidence from Berkut employees.
Oleksandr Tereshchuk, the former chief of police in Volyn Oblast, has been appointed Head of the HPU-MIA in Kyiv. We know how activists in Volyn Oblast were persecuted when Kyiv had its Maidan. We should hardly be surprised by the appointment. A report stating that an examination conducted by the Kyiv HPU-MIA has shown that Berkut did nothing wrong in and around the court, as I had already mentioned, is eye-opening.
I suspect there is pressure on the subordinate departments, possibly from the senior staff of the MIA that are involved in the investigative process. Since the prosecutor’s office has no working groups involved in the case, MIA divisions are being utilized.
We had submitted close to twenty oral as well as written questions to the senior staff of the MIA, and as of today have received only one response: about the incident with those buses at the courthouse and the subsequent pronouncement from the authorities.
Hanna Veremiy, sister of journalist Viacheslav Veremiy (who died in hospital from a gunshot wound he received on February 19 when the taxi he was riding in was attacked by unknown assailants) had this to say:
“We are dissatisfied with the fact that the judgment passed on the accused was changed from “attempted murder” to “hooliganism.” We are dissatisfied with the fact that he was released from detention and put under house arrest.
We were forced to replace the prosecutor in our case because the original prosecutor was biased. The HPU replaced him. The problem is that it was the original prosecutor who had initiated house arrest for the accused. This is the only suspect in our case that the authorities have detained. Others are still at large.”
Volodymyr Bodnarchuk, secretary of the NGO Heaven’s Hundred Family added the following:
“The investigations in some cases have been submitted for trial. The pre-trial phase is complete. We are displeased with some of the aspects in the investigations in some of the cases.
In marking the anniversary of the Maidan, the government published a progress report on the cases. The most substantial and accurate information was provided by the Office of the Prosecutor General. In it are claims that many problems exist, especially in regard to finding evidence. It is further reported that only 10% of the work has actually been accomplished. This, in our view, is consistent with the real situation.
Most of the cases have not made it to trial. We understand that there are objective reasons for that, but at the same time we would like to see a more efficient and effective examination process. The lawyers have appealed to the law enforcement agencies with suggestions on how to improve communication and cooperation between the agencies.
As far as the prosecution goes, we understand that under the existing structure and with an absence of a central investigative office in charge of examining the crimes that took place on the Maidan, it is difficult to work efficiently. The investigators employed by the HPU are responsible for all criminal cases, in addition to the ones that took place on the Maidan. The Maidan is not a priority. It is essential to create a separate department whose sole responsibility it would be to investigate the Maidan cases. | https://euromaidanpress.com/2014/12/12/solidarnosc-ministry-of-internal-affairs-loyalty-making-it-impossible-to-investigate-maidan-crimes/ |
Dear Skip,
With our best wishes,
Thanks very much for the excellent job you and your co-workers did on refinishing our '89 Chevy Eurosport. It looks like a new car! We very much appreciate your fine craftsmanship & attention to detail that went into a high-quality finished product. Some have even pointed out the quality of appearance exceeds the original factory finish.
As we expected, the quality of your work on our car was consistent with the excellent job you did on our truck last summer.
Thanks again for a superior job . We look forward to recommending you to others.
With our best wishes,
Lara L. | http://www.skipsautobody.com/letter5.html |
Often times when we think of farms we think of pastures, row crops, barns, and fresh produce. Many people don’t think of the wildlife that lives on and around the farmed land. How does the wildlife interact with the farmland and the crops being grown or animals being raised? In what ways are different species and their habitats affected by the agricultural activities around them? How does wildlife factor into the proper selection and implementation of conservation practices on farmland?
All habitats that overlap with farmland are important to consider when thinking about agricultural systems and conservation practices. Monarch butterflies, whitetail deer, honey bees, red tail hawks – these animals and insects are part of the diversity of wildlife that lives on a working farm. Understanding the diversity of wildlife on and around farmland can better inform the practices used on it.
Field Day Speakers and Activities
That is why The Land Connection is hosting a Wildlife on the Farm Field Day. This field day will showcase conservation practices that support wildlife species and will explore why wildlife is so important on farms. The field day will take place at R Wildflower Farm & Fields in Anchor, IL. Field day co-host Sally R. Lasser will lead a farm tour of R Wildflower Farm. She will also discuss the long history her family has of implementing conservation practices that take into account the wildlife that inhabit the various ecosystems on the property.
Field day co-host Dallas Glazik is an organic farmer and Farm Bill Biologist with Pheasants Forever. He will display practices he uses on his own farm and discuss programs offered by USDA to help farmers and landowners support wildlife on their land. They will be joined by a local ornithologist and local entomologist to discuss the importance of birds and insects on farms.
Here is some of the general information about the field day:
Wildlife on the Farm Field Day
When: July 30, 4:30-7:30pm
Where: R Wildflower Farm & Fields, 40760 E 1500 N Rd, Anchor, IL 61720
How much: $20
To register, please visit the event’s page on our website. | https://thelandconnection.org/news-article/supporting-wildlife-while-farming/ |
Is Sucrose C^12H^22O^11 (s) (table sugar) salt or base or acid or neither? which is it?
- print Print
- list Cite
Expert Answers
jerichorayel | Certified Educator
The chemical name for table sugar is sucrose (C12H22O11). To classify this compound first we have to know what happens when this compound is in the solution. If it is an acid, it will release hydrogen ions (H+) in the solution. Conversely, it is a base if it will release hydroxide ions (OH-) in the solution. If it is a salt, it should form ions in the solution.
When dissolved in water, sugar does not produce H+ or OH-. So we can say that Sugar is not classified among the three options. This can be classified as a neutral compound or non-electrolyte. | https://www.enotes.com/homework-help/sucrose-c-12h-22o-11-s-table-sugar-salt-base-acid-365700 |
As President Trump and the Republican Congress threaten the health care coverage of millions of Americans, New York State could create a universal health care system that would save residents tens of billions of dollars — if the Legislature passes it.
Governor Andrew Cuomo’s office estimated earlier this month that if the Affordable Care Act were repealed, 2.7 million people in New York State would lose their health insurance coverage, most in New York City. That figure, the state Health Department says, includes 1.9 million people who would lose the Medicaid coverage extended above the poverty level by Obamacare; 586,000 enrolled in the state Essential Plan, which covers people making somewhat more than the maximum for Medicaid; and 220,000 who bought private insurance through the state’s Obamacare exchange.
Congressional Republicans’ proposals to privatize Medicare and convert Medicaid to finite block grants to states could cut off even more people. More than 3.4 million New Yorkers were on Medicare as of October 2016, according to the federal Centers for Medicare & Medicaid Services, while more than 6.4 million were receiving Medicaid or federally funded Children’s Health Insurance Program benefits.
“As bad as so many things were in our health care system, it is all about to get a lot worse,” Assembly Health Committee chair Richard Gottfried says. As bad as the repeal of Obamacare would be, he adds, “I think what they’re going to do to Medicaid and Medicare is probably going to do more damage.”
Gottfried has an alternative: He is planning to introduce the New York Health Act, a bill which would create a state health care system he deems “basically an improved version of traditional Medicare, but also like the Canadian system.” It would be “funded entirely by broad-based taxes based on ability to pay.”
The Assembly passed an earlier version of the bill with solid majorities in 2015 and 2016, but it didn’t get even a committee hearing in the Republican-controlled state Senate.
The problems people have complained about with Obamacare — fast-rising insurance premiums, high deductibles, and “narrow networks,” in which people’s coverage is limited to a small number of medical providers — are problems inherent in the private insurance system, Gottfried says. Congressional Republicans’ most concrete idea to replace Obamacare has been to let out-of-state insurance companies sell across state lines, which they say would increase market competition.
But major insurers in New York such as Aetna, UnitedHealthcare, and most Blue Cross plans are based outside the state. What the GOP really wants, Gottfried argues, is to let companies from states with minimal consumer protections sell coverage without having to meet other states’ requirements. That boils down to “we’re going to let people from out of state, from states that have garbage insurance laws, sell you garbage, and we’re going to pretend that that’s going to give you wonderful health coverage.”
In contrast, if New York set up its own Medicare-style system, it would eliminate so much in administrative costs that it could provide essentially free medical care to everyone — no copays, no deductibles — and people would still be able to choose their own doctors.
Health care costs now consume one-sixth of New York State’s gross domestic product, University of Massachusetts economics-department chair Gerald Friedman wrote in a 2015 analysis of Gottfried’s proposed “New York Health Plan.” The study estimated that it would reduce total health care costs in the state by almost 25 percent, by $71 billion out of $287 billion projected for 2019.
Most of those savings would come from lower administrative costs: about $28 billion in insurance-company expenses and profits, $21 billion for medical providers, and $2 billion for employers. Physicians in the U.S. spend “one-sixth of their work hours on administration, including bill processing,” the study said, four times as much as Canadian doctors do under that nation’s single-payer system. The rest of the savings would come from negotiating lower drug prices and reducing fraud.
Friedman estimated that it would cost $26 billion to provide health care to people without insurance, reduce out-of-pocket costs and barriers to access for those who have insurance, pay doctors more than they now get from Medicaid, and help displaced insurance-company workers find new jobs. That would leave the state with a net savings of $45 billion.
The study projected that the New York Health Plan system would be financed by a tax surcharge, beginning at 9 percent on income over $25,000 a year and going up to 16 percent on income over $200,000. Employers would have to cover four-fifths of that, an amount Friedman wrote would be “much less than businesses and governments currently pay for health insurance.”
When Vermont abandoned its effort to create a state single-payer system in 2014, Governor Peter Shumlin said it would require prohibitively high tax increases, 11.5 percent on businesses and up to 9 percent on individuals. Shumlin’s plan was more costly because it “wasn’t really a full-blown single-payer system,” Gottfried responds. As New York’s tax base is much stronger than Vermont’s “overwhelmingly rural and small-business economy,” he says, “We don’t have to look at anything like the tax rates that Vermont thought they had to face.”
For almost every New Yorker, Gottfried contends, the taxes that would pay for a single-payer system “would be substantially less than we now spend on premiums and out-of-pocket expenses.”
Medicare’s administrative costs are generally estimated at around 2 percent of its total expenditures. Medicaid’s are higher, the Friedman study said, because it has to “police eligibility” and has been partially privatized through managed-care programs. The Affordable Care Act mandated that no more than 20 percent of revenue from individual policies it subsidized could go for expenses other than medical care.
Setting up a state single-payer system would be fairly simple, Gottfried says. People would be automatically enrolled, the state already has a bill-paying system in place, and revenue-raising mechanisms such as a payroll tax are already used for Social Security and Medicare. Still, he believes the process would take two to three years, even though Medicare started paying claims only 11 months after it was enacted in 1965. Technology has advanced dramatically since then, but bureaucracy has grown too.
The political obstacles are another story. “I don’t reasonably foresee the Senate seeing the light this session,” Gottfried says. “I believe the more we pass the bill in the Assembly and the more support we build up, the more New Yorkers will see it as something that is really achievable”— and that will either cause incumbents to change their minds or inspire voters to unseat opponents.
State Senate Majority Leader John J. Flanagan (R-Suffolk), Health Committee Chair Kemp Hannon (R-Nassau), and committee vice-chair David Valesky (D-Syracuse, a member of the Republican-allied Independent Democratic Conference) did not return phone calls from the Voice or respond to a list of questions about the issue.
The state’s two largest health care unions have both lined up behind the bill. The New York State Nurses Association has advocated a single-payer system for more than 25 years; Gottfried credits them with giving him the idea for the bill. 1199SEIU United Healthcare Workers East said in a statement that it “unequivocally supports” the aim of providing comprehensive, universal health coverage, and that “a single-payer plan would eliminate administrative waste and allow for precious resources to be invested in the provision of health care for our state’s residents.”
Governor Andrew Cuomo has not endorsed the measure, but a statement from the state Department of Health implied that he hasn’t closed the door. The state “is committed to ensuring that all residents have access to the best possible health care and insurance options,” it said. | https://www.villagevoice.com/2017/01/31/to-save-lives-and-billions-of-dollars-new-york-state-must-pass-universal-health-care/ |
Definition - What does Congestion mean?
Congestion, in the context of networks, refers to a network state where a node or link carries so much data that it may deteriorate network service quality, resulting in queuing delay, frame or data packet loss and the blocking of new connections. In a congested network, response time slows with reduced network throughput. Congestion occurs when bandwidth is insufficient and network data traffic exceeds capacity.
Data packet loss from congestion is partially countered by aggressive network protocol retransmission, which maintains a network congestion state after reducing the initial data load. This can create two stable states under the same data traffic load - one dealing with the initial load and the other maintaining reduced network throughput.
Techopedia explains Congestion
In modern networks, avoiding congestive collapse involves the application of network congestion avoidance techniques along with congestion control, such as:
- Exponential backoff protocols that use algorithm feedback to decrease data packet throughput to acceptable rates
- Priority techniques to allow only critical data stream transmission
- Allocation of appropriate network resources in anticipation of required increases in data packet throughput
Congestion has been described as a fundamental effect of limited network resources, especially router processing time and link throughput. Traffic directing processes, performed by routers on the Internet and other networks, use a microprocessor. Cumulative router processing time greatly impacts network congestion. In fact, intermediate routers may actually discard data packets when they exceed its handling capability. When this occurs, additional data packets may be sent to make up for unreceived packets, which exacerbates the problem. Network congestion often leads to congestion collapse.
Avoiding network congestion and collapse requires two major components: | https://www.techopedia.com/definition/18506/congestion-networks |
Are you an experienced document controller with a meticulous attention to detail? Are you looking for a new permanent role to start immediately? If so, continue reading!
A well-established corporate firm based in London are seeking a reliable document administrator that can provide crucial support to their team based in their high-end office. This is a permanent, full time position to start immediately.
Your duties:
? Controlling the numbering, filing, scanning and photocopying documents.
? Updating records and navigating internal databases and systems.
? Proofreading documents and correspondence.
? Communicating with external document controllers.
? Maintain thorough records of incoming and outgoing documentation.
? General ad-hoc project support as and when required.
You will be a highly professional individual with a keen eye for detail and meticulous work ethic, never letting things slip when working under pressure. Our client is looking for a document controller with proven experience in the corporate sector with excellent time management and impeccable English skills. Alongside your strong IT skills (Microsoft Office packages, database management), you must also be confident in your ability to work with minimal supervision and be able to meet deadlines through prioritising your workload.
If you are an experienced document controller that is available immediately, please apply as soon as possible! | https://www.themainegroup.co.uk/jobs/28u5-document-controller |
WHAT IS CHLORINE?
Chlorine is a gaseous chemical element that’s found in many different compounds. It’s an extremely strong oxidizing agent, which means that it can cause other substances to lose their electrons. That’s why it’s such an effective disinfectant – when most living cells encounter chlorine in water, they lose electrons from their outer membranes, which causes them to lose their structure, break down, and die. This also means that chlorine is toxic to humans and other animals.
IS CHLORINE IN DRINKING WATER DANGEROUS?
While the chlorine in drinking water does have side effects, it’s not necessarily dangerous in and of itself. Washing or swimming in water that contains chlorine can lead to dry skin and hair, and cause burning in the eyes. Many people also dislike the taste and smell of chlorinated water. In addition, this chemical can react with organics in water to produce disinfection byproducts (DBP) that could be dangerous.
Trihalomethanes (THMs), one of the disinfection byproducts of chlorine in water, is a known carcinogen, which means that it may cause cancer. This and other DBPs have also been linked to liver and kidney problems, developmental disorders, and respiratory issues. Unlike some other disinfectants, chlorine can be absorbed through the skin and inhaled; it’s not necessary to drink chlorine in water for it to get into your body.
Aside from the health side effects, some people find that using chlorinated water means that the vegetables they grow may not be as green, and foods cooked in it may have a strange taste. Plants and gardens can also be negatively affected. Chlorine also breaks down rubber, so plumbing parts made of this material can leak.
Most water quality experts believe that no amount of chlorine or chlorine byproducts are acceptable in water.
MORE INFORMATION ON CHLORINE IN WATER
There’s no question that adding chlorine in drinking water has saved many, many lives. Cholera and typhoid were two of the leading causes of death in the U.S. in the 19th Century, and both were nearly wiped out after municipalities started putting chlorine in water. Once the water has reached your home, however, the chlorine has done its job and needs to be removed – along with any byproducts.
Most people prefer to remove chlorine from water before drinking it to improve the taste and smell if for no other reason. Even at levels as low as 0.5 parts per million (ppm), it can be a problem in water used for drinking or bathing. Swimming pools, by comparison, may have a level of 2.0 to 3.0 ppm.
“Showering is suspected as the primary cause of elevated levels of chloroform in nearly every home because of the chlorine in the water.” – DR. LANCE WALLACE – U.S.E.P.A.
“A long hot shower can be dangerous. The toxic chemicals are inhaled in high concentrations.” – Dr. John Andelman – BOTTOM LINE
“Skin absorption of contaminant has been underestimated and ingestion may not constitute the sole or even primary route of exposure.” – Dr. Halina Brown – AMERICAN JOURNAL OF PUBLIC HEALTH
“Showers – and to a lesser extent baths – lead to a greater exposure to toxic chemicals contained in drinking water supplies than does drinking the water.” – Ian Anderson – NEW SCIENTIST
“Drinking chlorinated water may double the risk of bladder cancer, which strikes 400, 000 people a year.” – IS YOUR WATER SAFE? – U.S. NEWS & WORLD REPORT
HOW TO REMOVE CHLORINE FROM WATER
If you get your water from the municipal water treatment system, it has almost certainly been treated with some form of disinfectant, and chlorine is one of the most common. Dechlorinated water can be made in your home pretty easily – in fact, a granular activated carbon (GAC) filter is one of the best ways to remove chlorine from water. GAC is an effective chlorine water filter because it’s made with a very high surface area and high adsorption properties. The chlorine in water sticks to the surface of the carbon.
At US Water Systems, we offer two methods for how to dechlorinate water, and both use carbon filters. Whole house backwashing GAC filters can remove chlorine from water throughout your home, allowing you to not only drink dechlorinated water, but to wash with it as well. We also offer GAC cartridge filters for the whole house and as part of our under sink water filtering systems. Call our Certified Water Specialists at 1-800-608-8792 to discuss which chlorine water filter is right for you. | https://hydropureuae.com/chlorine-in-water/ |
An incisive, opinionated, and demanding blend of analysis and personal storytelling that will inspire her readers and peers in the science fiction community to work toward change. "Publishers Weekly," starred review Plenty of inspiration here for promising writers and for young women drawn to a culture where sexism is rife.... Passion and commitment permeate the writing as Hurley illuminates the online cultural vanguard from a feminist's perspective. "Kirkus Reviews" A call to arms for those who care about the future of science fiction and fantasy. John Scalzi, author of "The Old Man's War " Hurley writes with passion, power, and raw, unapologetic honesty. Her essays are both blunt and thoughtful, and will give you a great deal to ponder about the speculative fiction genre and the world at large. Jim C. Hines, author of the Goblin Quest series Kameron Hurley writes essays about feminism, geek culture, online discourse, and changing the world that piss people off, make them think, make them act. This is good stuff. Read it." Kate Elliott, author of "Black Wolves" "The Geek Feminist Revolution" is is an essential book for working and aspiring authors. It's part writing advice, part call to revolution, part manual for how to be a writer and an activist and a loudmouth even when (especially when) you're not a straight, white, cisgender man. This book is the next step in the conversation about how to write the Other. It's also about how to challenge mainstream nonsense when you're 'the Other, ' even when you're desperately pretending not to be. Hurley's essays are a beacon, signaling to writers in the trenches that they're not alone, and they're not imagining how hard it is to push against the mainstream, or how the culture shoves back ten times harder. K Tempest Bradford Listen, and understand: Kameron is out there. She can't be talked over. She can't be sidelined, ignored, or shut down. And she absolutely will not stop, ever, until things change. Seth Dickinson, author of "The Traitor Baru Cormorant" Kameron Hurley's a brave, unflinching, truly original writer with a unique vision-her fiction burns right through your brain and your heart. "Jeff VanderMeer, New York Times Bestselling Author of The Southern Reach Trilogy"" | https://pottspointbookshop.com.au/p/words-ideas-geek-feminist-revolution |
Even if a Boltzmann distribution exists for the population of molecules in various energy levels, it is not possible to obtain a satisfactory interpretation of experimental data by the use of conventional procedures unless the product of maximum spectral absorption coefficient P_(max) and optical density χ is sufficiently small. Detailed calculations are presented which show that the experimental results, which suggest an anomalous rotational temperature for the ^2Σ state of OH in low pressure combustion flames, can be accounted for by using sufficiently large values for P_(max)χ (Sec. II). Whether or not experimental data should be interpreted in this manner must be determined by auxiliary studies. Representative absorption studies for the determination of rotational temperatures in isothermal systems have been analyzed for the P_1 branch, (0,0) band, ^2π-->^2Σ transitions of OH at 3000°K. The calculations show that erroneous interpretation of experimental results occurs if the product P_(max)χ is not small compared to unity. Sample calculations for a blackbody light source show that the customary procedure for treating experimental results will permit adequate correlation of the data by straight lines up to relatively large values for P_(max)χ. It is remarkable that the preceding statement remains true even under conditions in which emission data clearly indicate that P_(max)χ is no longer small compared to unity (Sec. III). Representative calculations to determine observable peak and total intensity ratios in emission for spectral lines with Doppler contour have been carried out for ^2Σ-->^2π transitions, (0,0) band, P_1 branch of OH at 3000°K. The calculations show that the ratios of peak and total intensities are functions of the products of maximum absorption coefficients (P_(max)) and optical density (χ) for the lines under study (Sec. IV). Quantitative calculations have been carried out of apparent rotational temperatures in systems containing nonequilibrium distributions of OH at 3000°K and at 6000°K. The calculations on the P_1 branch, ^2Σ-->^2π transitions, indicate that, in the absence of self-absorption, conventional plots showing discontinuities necessarily overestimate one and underestimate the other of the known temperatures of 3000°K and 6000°K (Sec. V). Quantitative calculations on the nature of distortions produced when an isothermal region at 3000°K is viewed through an isothermal region at 1500°K show that the presence of a non-isothermal field of view magnifies the distortion produced by self-absorption alone (Sec. VI). On the basis of the noncontroversial quantitative calculations described in Secs. II to VI for idealized systems, some speculations regarding the significance of reported flame temperature anomalies for OH are presented in Sec. VII.
Reprinted from THE JOURNAL OF CHEMICAL PHYSICS, Vol. 21, No.1, 31-41, January, 1953. Copyright © 1953 American Institute of Physics. Received July 28, 1952. Supported by the ONR under Contract Nonr-220(03), NR 015210. In conclusion, the author takes pleasure in expressing his appreciation to Dr. O. R. Wulf and Dr. H. S. Tsien for helpful comments. The numerical work was performed by E. K. Björnerud and R. W. Kavanagh. | https://authors.library.caltech.edu/16979/ |
NU MS SLL students are exceptional, and they do not arrive on our campus without foresight, planning, grit, and hard work. With that said, some of the very behaviors that were necessary for admission may not be advantageous in the graduate school milieu. From the moment our students join us, we encourage a culture of collaboration and teamwork. Rather than fostering a competitive climate, we encourage students to see each other as supportive peers and future co-workers, all with the same goal in mind.
Student Organizations
The program currently has three student-based organizations, each with a different focus. MS SLL students are invited to become involved in any of the following groups during the course of their programs.
- NSSLHA: NU’s chapter of NSSLHA has a decidedly pre-professional mission and focuses its time and resources on seminars, journal clubs, field related philanthropic work, and professional socialization.
- Student Ambassadors (SA): Our SAs provide peer support, guidance, and encouragement on a one-on-one and small group basis throughout the transition to life as graduate student in the SLL program.
- Student Advisory Council (SAC): SAC members act as the voice of the MS SLL and AuD student body by facilitating communication amongst the students, faculty, and program and clinic administration. | https://mssll.northwestern.edu/student-culture/ |
Warren Buffett Has Spoken: How to Invest in the Stock Market During Inflation
As one of the richest men in the world, it goes without saying that Warren Buffett knows a thing or two when it comes to investments. Throughout the course of his long career—and, by extension, success—he had always advocated investing in stocks and staying the course, no matter what.
His word, of course, is gold to many pundits all over the world. But what many probably do not realize is that Warren did not achieve his meteoric level of success without being cautious, as well. While he is no stranger to “dip buying” of stocks, he also advises caution and being wary of a market that is too good to be true.
Indeed, if there is one thing that Warren seems to be rather fearful of, it is this—inflation. And with today’s markets caught in the crosshairs of inflation yet again, it is a good idea to remember all that Warren Buffett had ever said about stocks in order to better understand why stocks are moving much too fast at present. What makes Warren an expert on inflation is the fact that he lived and invested in one of the most famously volatile periods in the United States. We are, of course, talking about the late 70s and early 80s when inflation hit a whopping 14 percent. And while this is undoubtedly the greatest macroeconomic failure of the country after World War II, Warren not only invested heavily during this period, but he also reached unprecedented levels of success.
Of course, who can forget that in June 2008, Warren predicted an “exploding” inflation after gas prices went up to $4. Less than two years later, the Federal Reserve was forced to continue its program of quantitative easing. For his part, Warren did not send them an admonishment for politicking and inaction, but rather, thanked them in an op-ed for the actions that they did take—but not without the warning that keeping to the same policies will lead to widespread inflation.
These are just the tip of the iceberg in terms of inflation where Warren Buffett is concerned. Indeed, there is no better person to discuss inflation, and here are some more nuggets from the great man himself to remember with impending inflation upon us all.
Never forget inflation, especially when you are doing great.
Once, when his company, Berkshire Hathaway enjoyed a period of particularly good performance. So good, in fact, that the business earned an impressive 20 percent on capital. However, instead of “drowning in a sea of self-congratulations”, he warned that inflation will ultimately determine if this performance will, indeed, produce successful results.
In periods of high inflation, the dominant variable is not, in fact, earnings.
Normally, investors would consider corporate financial statements as law, as far as figures are concerned. This, of course, includes the company’s earnings for the fiscal period. However, Warren warns that this is no longer the “dominant variable” in terms of earnings for investors. Instead, he advises looking for “gains in purchasing power.” This is because corporate investment becomes infeasible due to the tax on capital that goes hand in hand with high inflation rates.
Get to know the “Misery Index.”
The investor’s “Misery Index” refers to the sum of the prevailing inflation rate and the percentage of capital that the individual investors need to pay before they can access their share of the earnings for the year. When this index goes over the rate of return on equity, the real capital or purchasing power shrinks, despite having no expenditure.
Focus on companies that consume less cash.
Usually, as inflation increases, companies tend to maintain the volume of their business by spending all their internally generated funds. While the numbers may seem attractive, these numbers are just that—pretty—and they normally do not convert. Instead, invest in companies that are able to handle increased business and increased prices without spending a lot to achieve them.
Inflation is inevitable and has no solution.
In 1980, Warren wrote that low rates of inflation are nonexistent. However, inflation is a man-made phenomenon, which means that it can be mastered. This means that despite all the problems and headaches that inflation brings, there is hope.
| |
My trip to Turkey is what I consider a trip of a lifetime. It took approximately 30 hours of travel to get to Selcuk, Turkey from Manila, Philippines. It was my first long-haul flight and my first time in Europe. It took many leaps of faith just to get there and when I finally reached my dream destination, I cried. I felt a different level of gratitude unlike any I have experienced before.
Where to stay in Selçuk
My friend and I arrived in Selcuk Town at around 7:00 in the evening. It was already dark and most of the shops in town were already closed. We got lost on our way to our chosen accommodation, Ephesus Palace, but we met a friendly hostel owner who contacted the guesthouse for us. We were then picked up by one of the staff and we finally checked into Ephesus Palace, a budget-friendly accommodation located about 5 minutes from Selcuk town.
Although my friend and I did not stay long in Ephesus Palace, I will recommend this guesthouse to anyone. The owners Mehmet and Handan were very kind and accommodating. The complimentary Turkish breakfast was great and became my standard when it comes to home cooked Turkish breakfast. I particularly enjoyed the complimentary tea and the awesome view from the balcony.
Ephesus Palace
4027 Sok. No 15, Selcuk 35920, Turkey
Check rates and availability
How to get to Selçuk – from Istanbul, Cappadocia and Pamukkale
There are various ways to get to Selçuk depending on where you are coming from. You can fly out via Turkish Airlines, Onur Air and Pegasus Airlines from Istanbul’s Sabiha Gokcen International Airport or the brand-spanking new Istanbul Airport to Izmir Adnan Menderes International Airport, the closest airport to Selçuk. From Izmir Airport, you can take a local train located just across the airport to get to Selçuk town. Check out this timetable for more information.
From Cappadocia, take a Pegasus Ailines or Sun Express flight from Kayseri Erkilet Airport to Izmir Adnan Menderes International Airport. There are also direct buses from Nevşehir (Cappadocia) to Izmir. From there, take a local train to get to Selçuk town. It’s going to be a long bus ride so I would suggest to travel by air instead. Air tickets are cheap in Turkey, so take advantage of this.
From Pamukkale, catch a minibus to get to Denizli Otogar (bus) station. From there, walk towards the gar (train) station and take a local train to Selçuk. It will take about 3 hours to get to Selçuk town.
How to to get to Ephesus Archaeological Site from Selçuk
Ephesus is about 3 kilometers from Selçuk town. To get there, take a cab from your chosen accommodation to the south or north gate. Travel time is about 10 minutes and one-way fare is 10 Lira or about 90 pesos. You may also take a minibus from town to get to the north gate, which only costs 3.50 Lira or 30 pesos.
See these blogs which I referenced when I did my tour.
Ephesus Tour: Doing it on your own
The Ultimate Ephesus Guide
The Ancient City of Ephesus
The Ancient City of Ephesus, once occupied by the Greeks, Roman, Byzantine, and Ottoman, was once a vibrant mega-metropolis located in the western coast of Turkey. The city played a key role in the spread of Christianity throughout the Roman Empire when it became the capital of Asia Minor. Even after many centuries since its downfall, some of its former splendour still remains. A guided tour or a self-guided tour give us glimpses into the lives of the people who once lived there. It’s almost like a time travel when you walk down the ancient streets.
Where to start – South or North Gate?
The North Gate (Lower Gate) is closer to Selçuk town so it is recommended to start here if you are taking a minibus or planning to walk from town. It is also closer to the main sights like the Great Theatre, Lower Agora and the Library of Celsus. However, starting at the North Gate can be a challenge, especially during summer, because it is mostly uphill. So make sure to pack some water, sunglasses, sunscreen, and sturdy shoes.
The South Gate (Upper Gate), on the other hand, starts at the Magnesia Gate where you will see the Upper Agora, Baths of Varius, Odeon or Bouleuterion (Parliament), and the Prytaneum (Town Hall). For me, this is the best place to start your self-guided tour because you will be walking downhill and your tour will end with Ephesus’ most famous attractions – the Library of Celsus and the Great Theatre. Saving the best for last without being exhausted with uphill walks.
What to see in Ephesus
Ephesus boasts a lot of significant historical monuments but here are the ones that I found to be the most awe-inspiring and enchanting. I posted the photos in order from the South Gate (Upper Gate) down to the North Gate (Lower Gate). I hope you find these photos helpful when you do your own self-guided tour, or else grab a map or hire a tour guide.
The Odeon (Bouleuterion)
The Odeon, also known as the Small Theatre, served as an entertainment and meeting center of the city. It also served as a political centre for the city council for religious and governmental discussions. Its small covered theatre sat roughly 1,500 spectators and is one of the original permanent stone theatres to stand in Ephesus.
The Prytaneum
At the west end of the Odeon (Bouleuterion), we found the remains of the Prytaneum built in 1st century BC. This used to be one of the most important ancient government buildings at the center of the city of Ephesus. At the centre of the building was the Temple of Hestia which contained a sacred hearth that was never allowed to go out to represent all the hearths in Ephesus. Today, only two Doric columns remain from the six original.
The Temple of Domitian
Built in the 1st century AD, the Temple of Domitian was said to have been dedicated to the Roman Emperor Domitian. He was said to be one of the most brutal Roman emperors but because the Ephesians wanted to secure good relations to Rome, they dedicated many buildings in the city to emperors. The Temple of Domitian was the first ever monument built for a Roman emperor.
Goddess Nike
A short walk from the Temple of Domitian, we found this beautiful flying Nike statue. Nike was the goddess of victory in Ancient Greece. This statue symbolized ultimate success and triumph. I later found out that the image of Nike is found on Olympic Medals as a good reminder to never give up.
Fountain of Trajan
Built at the beginning of the 2nd century AD, the Fountain of Trajan was constructed to honor Emperor Trajan. Located at the he north end of Curetes Street, the fountain had two ornamental pools at the front and rear and statues which are now on display in the Ephesus Museum. It’s hard to imagine what it used to be like back in the ancient times but the signage on site will help you understand what the fountain probably looked like.
Curetes Street
Curetes Street is one of the three main streets of Ephesus and is home to many historical monuments. This ancient street runs between Hercules Gate and the Library of Celsus, which used to be a sacred route that lead to the Temple of Artemis. I immediately noticed that this street was very significant since the ancient times because there were a lot of beautiful monuments on the slope.
The Temple of Hadrian
Located along the famous Curetes Street, the Temple of Hadrian is regarded as one of the most famous monuments in Ephesus. There were magnificent statues and friezes inside the temple including a relief of Medusa. but they have all been replaced with replicas of the originals. You will find the original statues in the Ephesus Museum.
The Library of Celsus
As you come to the end of Curetes Street, the most photographed and the grandest monument of Ephesus slowly comes into view. This is the famous Library of Celsus dating from the early 2nd century AD. It is impossible to describe the feeling standing at the foot of the library while looking up at some of the ancient statues and carvings that have survived after many centuries. This monument was the reason why I wanted to visit Ephesus in the first place.
The Great Theatre of Ephesus
The Great Theatre of Ephesus, which was capable of holding up to 25,000 spectators, was one of the best preserved Greek-Roman ancient theaters in the world. It was used initially for entertainment like musical and drama, but was also used for gladiator fights during later Roman times. This massive theatre was nothing like I have ever seen before. Okay, I have not seen any ancient theaters before my trip to Turkey, but seriously, this theatre was really amazing.
Other places to visit in and around Ephesus
Meryem Ana Evi (House of the Virgin Mary)
One of the most popular destinations near the ruins is Meryem Ana Evi (House of the Virgin Mary). It is believed that the Virgin Mary was taken here by St. John the Apostle shortly after the Crucifixion and to survive the Roman persecutions. It was reduced to rubble by many earthquakes and it was only until 1951 when it was discovered again by a German nun when she the place in her visions.
The Temple of Artemis
The Temple of Artemis was a Greek temple dedicated to the Greek goddess Artemis and was one of the Seven Wonders of the Ancient World. During the downfall of the Cult of Artemis with the rise of Christianity, the temple was neglected and looted. Unfortunately, a single column and a small pile of rubble were all that remain of the Temple of Artemis.
The Basilica of St. John
The Basilica of St. John was a monumental basilica in Ephesus ordered to be constructed by Emperor Justinian I in the 6th century. It stands over the burial site of St. John the Apostle. It used to be one of the most celebrated pilgrimage centres on the way to Jerusalem during the medieval times but in was destroyed due to Arabic invasions in 14th century. Today, visitors can see some of its magnificent structures like the outer courtyard, chapel, atrium, treasure hall, and a simple stone memorial with the statement “The Tomb of Saint John.”
Dining in Selçuk
Since we weren’t planning to stay in Selçuk for over two days, my friend and I did not bother researching the best places to eat. Good thing, we found Mehmet and Ali Baba Kebab House, while we were on our way back from Ephesus. This Turkish and Middle Eastern restaurant located near Ephesus Museum is one of the top-rated restaurants in Selçuk. We were surprised to find out that the owner was Mehmet, the same owner of Ephesus Palace where we were staying. We ordered mixed Kebab platter and Adana Kebab, which we absolutely loved. We also loved their complimentary bread and meze (appetizers).
Where to avail Ephesus Guided Tour
If you are interested to this tour, but you would like to avail a guided tour instead, check out the following options.
Ephesus, House of Virgin Mary, & Artemis Temple Group Tour (From US$ 29 per person)
Full Day Ephesus tour from Izmir (From US$ 79 per person)
Half-Day Small Group Ephesus Tour from Kusadasi (From US$ 28 per person)
Stay connected in Turkey
Whether you are travelling to Turkey for vacation or a business trip, a pocket WiFi should be a non-negotiable. Public places in Turkey do not offer free WiFi so it is challenging to stay connected to family and friends as well as navigate or research for your trip. To enjoy a secure, fast Internet connection and portability that a Pocket WiFi provides, make sure to rent your own device from Alldaywifi. Use my promo code ‘PROJECTGORA10’ to get 10% off!
How about you? Is Ephesus part of your bucket list? Let’s chat down below! | https://projectgora.com/ephesus-turkey-self-guided-travel-guide/ |
This is a thin worsted fabric made after a fabulous medieval find from Lödöse, dated to 1220-1240 (Inv nr AI 953).
It has crossing stripes of broken twill, that form lozenge/diamond twill (gåsöga) where they meet.
The textile find from Lödöse is of very high quality and was probably imported to Scandinavia. Worsted fabrics with lozenge/diamond patterns are not so common in archaeological finds from medieval times. Similar textile finds has been found in other towns like Uppsala and Stockholm.
Suitable usage is dresses, skirts, lining for outer garments and much more. The fabric is double-faced, so both sides can be used but they look slightly different with the colour pattern reversed on the back side.
Hand-wash!
Width 150 cm.
Weight 260 g/meter. | https://www.handelsgillet.com/shop/fabric-en/wool/thin-wool-en/lodose-diamond-check-en/ldcvb01-white-blue-lodose-diamond-check-lodoserutan/ |
A randomized clinical trial represents a controlled experiment in which the investigator applies an intervention to a group of patients and subsequently observes its effect on 1 or more outcomes over time. In this article, we outline the key elements that need to be considered during the design phase of a surgical clinical trial (Box).
Inception of a clinical trial starts by formulating a well-thought-out research question that is stated in the form of a hypothesis that will be tested. Trials are best reserved for mature questions that are supported by existing literature and can address a well-defined knowledge gap. Issues of patient safety and ethics deserve a special consideration in surgical trials, since the invasive nature of the procedures tested or, inversely, the risk of withholding surgical treatment due to study protocol requirements may both be associated with patient harm. For this reason, assessing patient and clinician equipoise for the proposed research question is important,1 as lack of such equipoise limits trial feasibility and adversely affects the implementation of results.
Sign in to take quiz and track your certificates
JN Learning™ is the home for CME and MOC from the JAMA Network. Search by specialty or US state and earn AMA PRA Category 1 Credit(s)™ from articles, audio, Clinical Challenges and more. Learn more about CME/MOC
CME Disclosure Statement: Unless noted, all individuals in control of content reported no relevant financial relationships. If applicable, all relevant financial relationships have been mitigated.
Corresponding Author: Panos Kougias, MD, MSc, Department of Surgery, Downstate Health Sciences University, 450 Clarkson Ave, MSC 40—Surgery, Brooklyn, NY 11203 ([email protected]).
Published Online: October 26, 2022. doi:10.1001/jamasurg.2022.4883
Conflict of Interest Disclosures: None reported.
Credit Designation Statement: The American Medical Association designates this Journal-based CME activity activity for a maximum of 1.00 AMA PRA Category 1 Credit(s)™. Physicians should claim only the credit commensurate with the extent of their participation in the activity.
Successful completion of this CME activity, which includes participation in the evaluation component, enables the participant to earn up to:
It is the CME activity provider's responsibility to submit participant completion information to ACCME for the purpose of granting MOC credit.
or
You currently have no searches saved.
You currently have no courses saved. | https://edhub.ama-assn.org/jn-learning/module/2797688?resultClick=1&bypassSolrId=J_2797688 |
Memory and Amnesia Project (MAP)
Funded by the Medical Research Council (MRC), MAP broadly aims to investigate the underlying neural basis of amnesia using a multi-modal approach. We use clinical interviews, neuropsychological assessments, novel behavioural experiments and neuroimaging techniques to investigate the role of the hippocampus, and other medial temporal lobe (MTL), structures in memory and higher-order perception in healthy brains as well as in patient cohorts.
We have recruited a substantial number of patients with autoimmune limbic encephalitis. These patients present with significant memory impairments alongside focal hippocampal atrophy providing an excellent opportunity to tackle important questions surrounding the role of the hippocampus in memory function and memory impairment. Given that MTL damage occurs in various neurodegenerative diseases, understanding memory function in light of MTL damage and any potential adverse knock-on effects with remote brain region connectivity, is vital.
Through MAP, we also have the opportunity to identify unique patient cases, such as a case of a discrete Perirhinal Cortex (PrC) lesion caused by an abscess that spared the hippocampus. This type of lesion is rare and allows us to investigate the process and material specific role of the PrC in memory.
Finally, we can also describe the neuro-behavioural profile of limbic encephalitis associated with voltage-gated potassium channel (VGKC) antibodies, a condition that is relatively rare and to date has not been thoroughly characterised.
MTL Manual Segmentation Protocol
Clinical test of Accelerated Long Term Forgetting
The Memory Research Group are also investigating forgetting. Commonly associated with Transient Epileptic Amnesia, a particular form of forgetting known as Accelerated Long-term Forgetting (ALF) has only recently been described. Patients with ALF show normal learning and initial retention of information, but memory decreases at an accelerated rate over time compared to typical forgetting. Due to the nature of this deficit, many clinical tests will miss this form of forgetting as they test immediate memory, and then typically at a delayed time of 30 minutes after learning. The aim of this project is to devise a brief clinical test of ALF, and to provide scores of a normative sample against which patients with ALF can be compared. | https://www.ndcn.ox.ac.uk/research/memory-research-group/projects-1/memory-and-amnesia-project |
Little House Refurbishing
This is to sort through some of the small and large tasks in ensuring that Little House and its surroundings are kept in good shape.
Contents
Ongoing To-Dos
- Inside
- Mount shelves on walls in Little Office to regain desk-space for projects/study/work
- Transport surplus computer equipment and filled recycling bins at Townmead Recycling Centre
- Wash and dry cloth towels from kitchen
- Install heater-timer switches
- Outside
- Cut hedges outside Little House
- Sort and clean fly-tipped recycle space outside gate
- Fit RML logo over Ham Friends placard
- Misc
- Shuffle and sort abandoned projects (i.e. folding bike / bike trailer)
Little House needs some help cleaning up! Let's pitch in and show that we care and value our community hub.
First Fix-Up Date: Bank Holiday Monday 29 August 2016
We've got a wonderful little space (link to Little House layout) on Ham Close but it has suffered a bit of neglect due to being a shared space that no one group really took ownership of. Combine that with the fact Richmond MakerLabs has accumulated a lot of stuff - we should sort, recycle, dispose, and just get the space in shape so we can enjoy it as much as we can.
If we can future-proof the space a bit so it's easy to maintain and use, it'll set the tone for some year-round enjoyment of the space. Having events to refurbish the space is fairly normal for a volunteer/member-driven maker space (South London MakerSpace 'Make the Space' example, London Hackspace 'Hack the space' wiki )
Examples of improvement could be:
- Clear floors as much as possible for easy hoovering
- Create sufficient space for wheelchair use
- Make kitchen easy to use and maintain
- Make space more welcoming
Suggested Improvements of Little House
- Kitchen
- Remove white goods from kitchen and give strong cleaning of goods and spaces
- Remove, clean, sort items for recycling, donation, disposal (we do not need tons of meal supplies for 50 people)
- Major floor and surface scrub
- Test the hot water (and document how it is turned on and off)
- Courtyard
- Car-Wax / De-Oxidize / Paint double doors
- Turn alcoves into mini-storage areas for weather-resistant items
- Dispose of Rotting Garden Planters
- Install T-Clips for Rolling Shutters
- Re-home garden tools and remaining living plants
- Re-home salvageable short-greenhouse
- Small Room
- Rearrange desks for better Accessibility (also better visibility to interior and exterior windows)
- Re-run ethernet cables to router
- Toilet
- Clean and Tidy Toilet
- Scrub mirror and wash basin
- Test the handicap toilet brace for ease of movement (and adjust accordingly)
- Test the hot water (and document how it is turned on and off)
- Cloakroom
- Sort through giant in Cloakroom
- IDEA: Install Shelf Brackets & Shelving for Member Projects
- Loft Storage Most of what is in the loft belongs to SWLEN and we absolutely cannot throw it out (Noted!)
- Empty loft of existing items and actively sort through items
- Sweep out loft
- Setup shelves / stackable organisation
- Large Room
- Remove things from floor and find places to put them (Enable easy floor cleaning)
- Re-run ethernet cabling to provide gigabit in as many places as possible
- Establish where recycling / rubbish should be (enable easy maintenance)
- Sort through and recycle low-potential project pieces (stale projects, space-takers, and low-use objects)
- Install T-Clips for Rolling Shutters
- Refresh any essential signage
- Refresh RML signage (Wifi, Joining, etc.) and complementary projects (open source, making, etc.)
- Install A3 (or larger?) Lighted RML sign for back of plasma television panel to be used when shutters are up and we are 'open' (Use the Xmas Tree Lights, Possibly?)
Addressing Other Groups' Stuff
- SWLEN
- They have a lot of stuff but allegedly another space - how do we drop the remaining items off and reclaim the space? (Carl - I'm in touch with SWLEN. They like supplies to be near their local team members but I'm asking if we can move some of it at least)
- HUG
- Apple Press: Is there any place other than the kitchen for this seldom-used item? When school starts this goes on tour ~~ Jean is contact point
- Canopies: Can these be stored outside in the dry new cupboards? (if you mean Marquees please beware that these are incredibly expensive and they belong to SWLEN - they are keen to move them. Also we HUG use this for our activities, Ham Fair, Neighbourhood forum, and maybe future restart parties) Noted!
- Teddington & Ham Hydro Proposals
- Are these things old or necessary still? | https://wiki.richmondmakerlabs.uk/index.php/Little_House_Refurbishing |
The utility model relates to a cardigan with zippers. The cardigan with the zippers comprises a left lappet, a right lappet, a left pocket and a right pocket, wherein the left lappet and the right lappet are connected by zippers, and the left pocket and the right pocket both contain surface layers and bottom layers. The cardigan with the zippers is characterized in that the zippers are double layer zippers, the surface layers and the bottom layers of the left pocket and the right pocket all extend to cardigan front parts of the corresponding lappets and are respectively stitched together with an upper layer zipper and a lower layer zipper of the double layer zippers, and the left pocket and the right pocket form ports which are communicated with each other between the two layer zippers. The cardigan uses the double layer zippers which are closured at the same time by a same slide head, and lappet edges of the left lappet and the right lappet respectively form openings which are communicated with the pockets in corresponding parts of the pockets. When the zippers are closured, the two layer zippers in a front place and a rear place of the pockets are respectively closured, thereby enabling the left pocket and the right pocket to be communicated with each other between the two layer zippers. The left pocket and the right pocket are enabled to be communicated with each other, and thereby two hands can intersect together in the pockets. | |
Led by Michael Rygol and Christine Perey, the workshop attracted 33 attendees from a variety of commercial users of AR, as well as AR technology suppliers and academic/research institutions. With a truly international feel, we were pleased to welcome delegates from throughout Europe and North America, in addition to those from Japan, China and South Korea.
The workshop objectives included:
- Discussing five widely-validated AR use cases to collaboratively derive a set of structured and related requirements;
- Generating new content for the AREA’s recently launched AREA Statements of Need (ASON) management tool;
- Providing networking opportunities
Following the introductions, Nicole Le Minous and Muriel Deschanel, of B<>COM (a Technology Research Institute focused on digital technologies, based in France) presented insights from a recent survey of 77 participants regarding AR use cases and challenges. The presentation is now available to download.
Michael then discussed the need for structured and connected use cases and requirements in order to help move the AR ecosystem forward, with reference to the ASON taxonomy. The goals were to help vendors understand the AR requirements of their customers; and to provide companies seeking to use AR with a neutral view of needs from the industry itself.
The AREA’s ASON provides users with the ability to manage, connect, review and report numerous artifacts used to help articulate a neutral set of needs. Such artifacts include business process scenarios, use cases, requirements, personas, industries and settings, and more to help create an actionable repository of connected data.
The audience was then organized into five groups, each of which included AR users, suppliers and researchers. Each group discussed its overview use case definition and applied it to a setting of their choice, from which they created a set of requirements. These use cases were (with the group-chosen specific application in parentheses):
- Remote assistance with AR (onsite troubleshooting with a remote expert in an industrial setting)
- AR for complex assembly (factory assembly of medical devices)
- Inspection and quality assurance with AR (as-built vs. as-designed inspection for hotel construction)
- Virtual user interfaces with AR (utilities controls within restricted access buildings)
- AR for training (rapid training and instructions for business audio/video hardware installations)
To finish, a representative from each group presented a summary of their discussions.
The workshop was a very useful exercise and the content captured is now being entered into ASON for further use by the AREA community. | https://thearea.org/area-supported-ismar-2018-workshop-explores-enterprise-ar-requirements/ |
Auditing Standards - 2nd Edition, 2002
1.1 This section deals with general standards in government auditing. The general auditing standards describe the qualifications of the auditor and the auditing institution so that they may carry out the tasks related to field and reporting standards in a competent and effective manner.
1.2 The general auditing standards include standards, which apply both to the auditors and to the audit institutions, and standards, which apply to audit institutions. The standards common to auditors and audit institutions are:
1.3 The general auditing standards for the audit institutions are that they should adopt policies and procedures to
2.1 The general standards for the auditor and the audit institutions include independence from the legislature, independence from the executive, and independence from the audited entity.
2.2 Whatever the form of government, the need for independence and objectivity in audit is vital. An adequate degree of independence from both the legislature and the executive branch of government are essential to the conduct of audit and to the credibility of its results.
2.3 The legislature is one of the main users of audit services. It is from the Constitution that SAI derives his mandate, and a frequent feature of the audit function is its reporting to the legislature. The SAI works closely with the legislature, including with committees empowered by the legislature to consider audit reports.
2.4 The SAI may give members of the legislature factual briefings on audit reports, but it is important that the SAI maintains his independence from political influence, in order to preserve an impartial approach to its audit responsibilities. This implies that the SAI not be responsive, nor give the appearance of being responsive, to the wishes of particular political interests.
2.5 While the SAI must observe the laws enacted by the legislature, adequate independence requires that it not otherwise be subject to direction by the legislature in the programming, planning and conduct of audits. The SAI needs freedom to set priorities and program its work in accordance with his mandate and adopt methodologies appropriate to the audits to be undertaken.
2.6 It is essential that the legislature provide the SAI with sufficient resources, for which the SAI is accountable, as well as for the effective exercise of his mandate. While the expenditure of SAI's office is charged to the Consolidated Fund, the expenditure on the other offices of the Indian Audit and Accounts Department is subject to the vote of the central legislature.
2.7 The executive branch of government and the SAI may have some common interests in the promotion of public accountability. But the essential relationship with the executive is that of an external auditor. As such the SAI's reports assist the executive by drawing attention to deficiencies in administration and recommending improvements. Care should be taken to avoid participation in the executive's functions of the kind that would militate against the SAI's independence and objectivity in the discharge of his mandate.
2.8 It is important for the independence of the SAI that there be no power of direction by the executive in relation to the SAI's performance of his mandate. The SAI is not be obliged to carry out, modify or refrain from carrying out, an audit or suppress or modify audit findings, conclusions and recommendations.
2.9 A degree of co-operation between the SAI and the executive is desirable in some areas. The SAI should be ready to advise the executive in such matters as accounting standards and policies and the form of financial statements. The SAI must ensure that in giving such advice it avoids any explicit or implied commitment that would impair the independent exercise of his audit mandate.
2.10 Maintenance of the SAI's independence does not preclude requests to the SAI by the executive proposing matters for audit. But if it is to enjoy adequate independence, the SAI must be able to decline any such request. It is fundamental to the concept of SAI independence that decisions as to the audit tasks comprising the program should rest finally with the SAI.
2.11 A sensitive area in relationships between the SAI and the executive concerns provision of resources to the SAI. In varying degrees, reflecting constitutional and institutional differences, arrangements for the SAI's resource provision may be related to the executive branch of government's financial situation and general expenditure policies. As against that, effective promotion of public accountability requires that the SAI be provided with sufficient resources to enable it to discharge its responsibilities in a reasonable manner.
2.12 Any imposition of resource or other restrictions by the executive, which would constrain the SAI's exercise of its mandate, would be an appropriate matter for report by the SAI to the legislature.
2.13 The legal mandate provided in the Comptroller and Auditor General's (Duties, Powers and Conditions of Service) Act, 1971 provides for full and free access for the CAG and his auditors to all premises and records relevant to audited entities and their operations and provides adequate powers to the CAG to obtain relevant information from persons or entities possessing it.
2.14 By legal provision and accepted convention, the executive permits access by the SAI to sensitive information, which is necessary and relevant to the discharge of the SAI's responsibilities.
2.15 In order that the SAI not only exercise his functions independently of the executive but also be seen to do so, it is important that his mandate and his independent status be well understood in the community. The SAI should, as appropriate opportunities arise, undertake an educational role in that regard.
2.16 The SAI's functional independence need not preclude arrangements with executive entities in regard to the SAI's administration in matters such as industrial relations, personnel management, property management or common purchasing of equipment and stores, though executive entities should not be in a position to take decisions that would jeopardise the SAI's independence in discharging his mandate.
2.17 The SAI must remain independent from audited entities. The audit department under the SAI should, however, seek to create among audited entities an understanding of its role and function, with a view to maintaining amicable relationships with them. Good relationships can help the SAI to obtain information freely and frankly and to conduct discussions in an atmosphere of mutual respect and understanding. In this spirit, the SAI, while retaining his independence, can agree to be associated with reforms which are planned by the Administration in areas such as public accounts or financial legislation or agree to be consulted about the preparation of draft laws or rules affecting his competence or his authority. In these cases it is not, however, a matter of the SAI interfering in administrative management but a matter of co-operating with certain administrative services by giving them technical assistance or by putting SAI's financial management experience at their disposition.
2.18 In contrast to private sector audit, where the auditor's agreed task is specified in an engagement letter, the audited entity is not in a client relationship with the SAI. The SAI has to discharge his mandate freely and impartially, taking management views into consideration in forming audit opinions, conclusions and recommendations, but owing no responsibility to the management of the audited entity for the scope or nature of the audits undertaken.
2.19 The SAI should not participate in the management or operations of an audited entity. Audit personnel should not become members of management committees and, if audit advice is to be given, it should be conveyed as audit advice or recommendation and acknowledged clearly as such.
2.20 Any SAI personnel having close affiliations with the management of an audited entity, such as social, kinship or other relationship conducive to a lessening of objectivity should not be assigned to audit that entity.
2.21 Personnel of the SAI should not become involved in instructing personnel of an audited entity as to their duties. In those instances where the SAI decides to establish a resident office at the audited entity with the purpose of facilitating the ongoing review of its operations, programs and activities, SAI personnel should not engage in any decision making or approval process which is considered the auditee's management responsibility.
2.22 The SAI may co-operate with academic institutions and enter formal relationships with professional bodies, provided the relationships do not inhibit its independence and objectivity, in order to avail of the advice of experienced members of the profession at large.
3.1 The auditor and the SAI must possess the required competence.
3.2 The following paragraphs explain competence as an auditing standard:
3.2.1 The mandate of a SAI generally imposes a duty of forming and reporting audit opinions, conclusions and recommendations.
3.2.2 Discussions within the Audit Department promote the objectivity and authority of opinions and decisions.
3.2.3 Since the duties and responsibilities thus borne by the SAI are crucial to the concept of public accountability, the SAI must apply to his audits, methodologies and practices of the highest quality. It is incumbent upon it to formulate procedures to secure effective exercise of its responsibilities for audit reports, unimpaired by less than full adherence by personnel or external experts to its standards, planning procedures, methodologies and supervision.
3.2.4 The audit department needs to command the range of skills and experience necessary for effective discharge of the audit mandate. Whatever the nature of the audits to be undertaken under that mandate, persons whose education and experience is commensurate with the nature, scope and complexities of the audit task should carry out the audit work. The audit department should equip itself with the full range of up-to-date audit methodologies, including systems-based techniques, analytical review methods, statistical sampling, and audit of automated information systems.
3.2.5 Since the nature of audit mandate is wide and discretionary and leaves the SAI discretion in the frequency of audits to be carried out and the nature of reports to be provided, there is a high standard of management expected within the audit department.
4.1 The general standards for the auditor and the SAI include due care in specifying, gathering and evaluating evidence, and in reporting findings, conclusions and recommendations.
4.2 The following paragraphs explain due care as an auditing standard:
4.2.1 The SAI must be, and be seen to be, objective in its audit of entities and public enterprises. It should be fair in its evaluations and in its reporting the outcome of audits.
4.2.2 Performance and exercise of technical skill should be of a quality appropriate to the complexities of a particular audit. Auditors need to be alert for situations, control weaknesses, inadequacies in record keeping, errors and unusual transactions or results, which could be indicative of fraud, improper, or unlawful expenditure unauthorised operations, waste, inefficiency or lack of probity.
4.2.3 Where an authorised or recognised entity sets standards or guidelines for accounting and reporting by public enterprises, the SAI may use such guidelines in the course of his examination. The Accounting Standards and Standard Audit Practices issued by the Institute of Chartered Accountants of India (ICAI) should be kept in view by SAI while carrying out the audit of companies registered under the Companies Act 1956.
4.2.4 If the SAI employs external experts as consultants he must exercise due care to assure him of the consultants' competence and aptitude for the particular tasks involved. This standard applies also where outside auditors are engaged on contract with the SAI. In addition care must be taken to ensure that audit contracts include adequate provision for the SAI to determine the planning, the audit scope, the performing, and the reporting on the audit.
4.2.5 Should the SAI, in the performance of his functions, need to seek advice from specialists external to the SAI, the standards for exercise of due care in such arrangements have a bearing also on the maintenance of quality of performance. Obtaining advice from an external expert does not relieve the audit department of responsibility for the opinions formed or conclusions reached on the audit task.
4.2.6 When the audit department uses the work of another auditor(s), it must apply adequate procedures to provide assurance that the other auditor(s) has exercised due care and complied with relevant auditing standards, and may review the work of the other auditor(s) to satisfy itself as to the quality of that work.
4.2.7 Information about an audited entity acquired in the course of the auditor's work must not be used for purposes outside the scope of an audit and the formation of an opinion or in reporting in accordance with the auditor's responsibilities. It is essential that the audit department maintain confidentiality regarding audit matters and information arising from its audit task. However, the SAI should report offences against the law to proper prosecuting authorities.
5.1 SAI should have an appropriate quality assurance system in place.
5.2 The following paragraphs explain quality assurance reviews as an auditing standard:
5.2.1 Because of the importance of ensuring a high standard of work by the audit department, it should pay particular attention to quality assurance programs in order to improve audit performance and results. The benefits to be derived from such programs make it essential for appropriate resources to be available for this purpose. It is important that the use of these resources be matched against the benefits to be obtained.
5.2.2 The SAI should establish systems and procedures to:
5.2.3 As a further means of ensuring quality of performance, additional to the review of audit activity by personnel having line responsibility for the audits concerned, it is desirable for the audit departments to establish their own quality assurance arrangements. That is, planning, conduct and reporting in relation to a sample of audits may be reviewed in depth by suitably qualified SAI personnel not involved in those audits, in consultation with the relevant audit line management regarding the outcome of the internal quality assurance arrangements and periodic reporting to the SAI's top management.
5.2.4 It is appropriate for audit institutions to institute their own internal audit function with a wide charter to assist the audit department to achieve effective management of its own operations and sustain the quality of its performance.
5.2.5 The quality of the work done by the audit department can be enhanced by strengthening internal review and by the independent appraisal of its work.
6.1 The SAI should adopt policies and procedures to recruit personnel with suitable qualifications and train them professionally.
6.1.1 SAI personnel should possess suitable qualifications and be equipped with appropriate training and experience. The SAI should establish, and regularly review, minimum training requirements for the appointment of auditors at each level within the organisation.
6.2 The SAI should adopt policies and procedures to develop and train SAI employees to enable them to perform their task effectively and to define the basis for the advancement of auditors and other staff.
6.2.1 The following paragraphs explain training and development as an auditing standard:
6.2.2 The SAI should take adequate steps to provide for continuing professional development of its personnel, including, as appropriate, provision of in-house training and encouragement of attendance at external courses.
6.2.3 The SAI should identify professional development needs of its personnel.
6.2.4 The SAI should establish and regularly review criteria, including educational requirements, for the advancement of auditors and other staff of the SAI.
6.2.5 The SAI should also establish and maintain policies and procedures for the professional development of audit staff regarding the audit techniques and methodologies applicable to the range of audits it undertakes.
6.2.6 SAI personnel should have a good understanding of the government environment, including such aspects as the role of the legislature, the legal and institutional arrangements governing the operations of the executive and the charters of public enterprises. Likewise, trained audit staff must possess an adequate knowledge of the SAI's auditing standards, policies, procedures and practices.
6.2.7 Audit of financial systems, accounting records and financial statements requires training in accounting and related disciplines as well as a knowledge of applicable legislation and executive orders affecting the accountability of the audited entity. Further, the conduct of performance audits may require, in addition to the above, training in such areas as administration, management, economics and the social sciences.
6.2.8 The SAI should encourage his personnel to become members of a professional body relevant to their work and to participate in that body's activities.
6.3 The SAI should adopt policies and procedures to prepare manuals and other written guidance and instructions concerning the conduct of audits.
6.3.1 The following paragraph explains written guidance as an auditing standard:
6.3.2 Communication to staff of the SAI by means of circulars containing guidance, and the maintenance of an up-to-date audit manual setting out the SAI's policies, standards and practices, is important in maintaining the quality of audits.
6.4 The SAI should adopt policies and procedures to support the skills and experience available within the SAI and identify those skills which are absent; provide a good distribution of skills to auditing tasks and a sufficient number of persons for the audit; and have proper planning and supervision to achieve its goals at the required level of due care and concern.
6.4.1 The following paragraphs explain the use of skills as an auditing standard:
6.4.2 Resources required for undertaking each audit need to be assessed so that suitably skilled staff may be assigned to the work and a control placed on staff resources to be applied to the audit.
6.4.3 The extent to which academic attainments should be related specifically to the audit task varies with the type of auditing undertaken. It is not necessary that each auditor possess competence in all aspects of the audit mandate. However, policies and procedures governing the assignment of personnel to audit tasks should aim at deploying personnel who have the auditing skills required by the nature of the audit task so that the team involved on a particular audit collectively possesses the necessary skills and expertise.
6.4.4 It should be open to the SAI to acquire specialised skills from external sources if the successful carrying out of an audit so requires in order that the audit findings, conclusions and recommendations are perceptive and soundly based and reflect an adequate understanding of the subject area of the audit. It is for the audit institution to judge, in its particular circumstances, to what extent its requirements are best met by in-house expertise as against employment of outside experts.
6.4.5 Policies and procedures governing supervision of audits are important factors in the performance of the SAI's role at an appropriate level of competence. The SAI should ensure that audits are planned and supervised by auditors who are competent, knowledgeable in the SAI's standards and methodologies, and equipped with an understanding of the specialties and peculiarities of the environment.
6.4.6 Where the SAI's mandate includes the audit of financial statements which cover the executive branch of government as a whole, the audit teams deployed should be equipped to undertake a coordinated evaluation of departmental accounting systems, as well as of central agency co-ordination arrangements and control mechanisms. Teams will require knowledge of the relevant governmental accounting and control systems, and an adequate expertise in the auditing techniques applied by the SAI to this type of audit.
6.4.7 Unless the SAI is equipped to undertake, within a reasonable time-scale, all relevant audits, including performance audits covering the whole of every audited entity's operations, criteria are needed for determining the range of audit activities which, within the audit period or cycle, will give the maximum practicable assurance regarding performance of public accountability obligations by each audited entity.
6.4.8 In determining the allocation of its resources among different audit activities, the SAI must give priority to any audit tasks, which must, by law, be completed within a specified time frame. Careful attention must be given to strategic planning so as to identify an appropriate order of priority for discretionary audits to be undertaken.
6.4.9 Assignment of priorities compatible with maintaining the quality of performance across the mandate involves exercise of the SAI's judgement in the light of available information. Maintenance of a portfolio of data pertaining to the structure, functions and operations of audited entities will assist/the SAI in identifying areas of materiality and vulnerability and areas holding potential for improvements in administration.
6.4.10 Before each audit is undertaken designated personnel within the SAI should give proper authorisation for its commencement. This authorisation should include a clear statement of the objectives of the audit, its scope and focus, resources to be applied to the audit in terms of skills and quantum, arrangements for reviews of progress at appropriate points, and the dates by which fieldwork is to be completed and a report on the audit is to be provided.
These standards apply to individual auditors, head of the SAI, executive officers and all individuals working for and on behalf of the SAI. The SAI has the responsibility to ensure that all its auditors acquaint themselves with the values and principles contained in the Conduct Rules for government servants in India and they act accordingly. The following audit standards have ethical significance: | http://cag.gov.in/content/chapter-ii-general-standards-government-auditing |
The weeping birch tree is a variety of the European white birch. The white birch is a member of the Betulaceae family of birch; these are often used as ornamental trees in gardens.
Description
The average life expectancy of a healthy weeping birch tree is between 40 and 50 years. Unfortunately, it is common for trees planted for ornamental purposes to die after less than 20 years.
Fungi
Some of the most common diseases affecting trees in the birch family are fungal, such as rust and leaf spot. These diseases thrive in moist conditions where rain splashes the tree and leaves are left around the base of the trunk.
Pests
The weeping birch tree is commonly affected by two pests, the birch leafminer and the bronze birch borer.
Leafminer
The birch leafminer is a term covering a variety of larvae laid in the leaves of a birch tree; the term covers insects such as the moth and the beetle. The leafminer is not usually a deadly infestation.
Bronze Birch Borer
The bronze birch borer is a beetle that commonly attacks weak trees that have been infected by leafminers. The symptoms of the birch borer are usually sparse foliage followed by the death of twigs and branches.
More Articles
- White Fungus on a Japanese Maple
- What Are the Treatments for Birch Tree Disease?
- Silver Birch Tree Problems
- Cottonwood Tree Diseases & Insect Infestations
- Building Raised Vegetable Garden Beds
- Lychee Tree Diseases
- Facts About the Chinese Elm Tree
- What is the Growth Rate of a Holly Tree?
- Installing Gazebo Support Beams
- What Will Cause a Cedar Tree to Die?
- Tree Trunk Diseases
- Is a Horsetail Plant Dangerous to Dogs? | https://www.gardenguides.com/12263190-weeping-birch-tree-disease-and-pests.html |
Erickson’s Psychosocial Development
Psychosocial Development Erik Erikson describes psychosocial development as occurring in stages. He describes the different stages according to personality traits shown at the various stages. I have I...
Stages through developmental psychology
The Life of Juan Leonardo from Birth Through Adolescence Diver University John Smith This report is based on the adolescent life of Juan Leonardo, who is 17 years old and a senior in High School. I in... | http://lynealtrust.org/essays/developmental-psychology-2315 |
The Congressional Budget Office (CBO) projects the 2014 ”baseline” federal budget deficit will be $514 billion, $166 billion lower than in 2013 ($680 billion). If the 2014 deficit projection is achieved, it would mark the fifth straight year of deficit declines since the deficit reached $1.4 trillion in 2009.
The $166 billion improvement in the 2014 deficit results from a 9.1 percent increase in estimated revenue (+$255 billion), while outlays are projected to rise 2.6 percent (+$89 billion).
Higher revenue projections come from expiring tax provisions and improvement in the economy, CBO reports. Increased revenue projections are broadly based in 2014, ranging from higher individual and corporate income tax revenue to larger social insurance tax collections. This year will be the first full year after the expiration of the two-year temporary cut in the Social Security payroll tax rate.
The CBO projections show 2014 total outlays will be $3.543 trillion, up $89 billion from the previous year ($3.454 trillion). Total mandatory spending in 2014 ($2.116 trillion) is up $84 billion over 2013 and accounts for almost 95 percent of the total spending increase. Higher outlays for Social Security (+$38 billion), Medicare (+$18 billion) and Medicaid (+$33 billion), are offset slightly by declines in unemployment compensation.
CBO projects total discretionary spending will be $1.194 trillion in 2014, $7 billion lower than in 2013. Defense spending is expected to drop by $21 billion, primarily due to lower contingency operations costs. CBO projects spending on nondefense programs to increase by $14 billion, but 50 percent of that rise will come from lower receipts to the Federal Housing Administration.
The CBO report also includes deficit estimates for 2015 through 2024. These estimates show baseline deficits declining to $504 billion 2015 and then beginning to rise steadily as economic growth weakens. CBO expects baseline deficits to average about $900 billion for 2022-24.
Underlying CBO’s baseline deficit projections are economic assumptions that expect the economy to recover steadily in 2014 and continue that recovery over the next few years. The Gross Domestic Product (GDP) is projected to grow 2.4 percent in FY2014 and by an average of 3.3 percent between 2015 and 2017. After that, GDP growth drops to an average of 2.2 percent. CBO expects the annual unemployment rate to be 6.9 percent in 2014 and then decline to 5.9 percent in 2017. Then, the unemployment rate is projected to average about 5.6 percent through 2024. CBO projects the rate of inflation (as measured by the change in the Consumer Price Index) to stay below 2 percent through 2015 and then climb to 2.4 in 2018 and remain unchanged at that rate through 2024. | https://asmconline.org/news/cbo-projects-fy2014-budget-deficit-will-be-514-billion/ |
Anselm Kiefer, Black Flakes (Schwarze Flocken), 2006.
Oil, emulsion, acrylic, charcoal, lead books, branches and plaster on canvas. 330 x 570 cm. Private collection, c/o Museum Küppersmühle für Moderne Kunst.Photo Privatbesitz Famille Grothe / © Anselm Kiefer.
Art Historian Christian Weikop considers the importance of the forest in Anselm Kiefer’s oeuvre, from his earliest artworks to more recent large-scale composite woodcuts. Dr. Weikop draws from an interview that he conducted with the artist at his vast studio complex on the outskirts of Paris in October 2013, when they discussed the ‘wood culture’ of his work in relation to Romanticism, Expressionism and beyond. | https://www.royalacademy.org.uk/article/art-historian-christian-weikop |
There are many aspects to healthcare and consequently a range of areas that can be targeted for improvements. Longterm planning is necessary to ensure the health of Australian's is not only maintained, but enhanced. New research from Siemens, indicates that prevention strategies and technology are critical to safeguarding ourselves against the biggest threats to Australia's future health.
On Thursday 7 April, Global technology giant, Siemens, will be releasing new research suggesting obesity and chronic disease are costing Australians more than $58 billion every year – just over half of the country’s current healthcare budget. If current health trajectories continue, 75% of the population will be overweight or obese by 2030.
The report entitled Picture the Future: Healthcare 2030 examines the underlying challenges we face both with the epidemic of obesity and the resultant chronic diseases it causes – such as diabetes, heart disease and cancers – combined with a significant change in our population demographics.
Currently only 2% of the nation’s healthcare budget is spent on prevention and Professor Richard Head, Director of the Preventative Health National Research Flagship at the CSIRO – and a Siemens research partner – believes more attention must be paid to prevention as a way of addressing the huge burden our aging population will face with rising levels of obesity and chronic disease.
The report also reveals that technology has the potential to reduce the demands on our healthcare system, with the development of futuristic technology such as “lab on a chip” which can accurately detect via a drop of blood how many diseases may manifest themselves before they even start.
Stay tuned for the full report. In the mean time what do you think about the future of health in Australia?
Health News Image Adapted from photo by Dowlesan. | http://www.ivline.org/2011/04/picture-future-healthcare-2030.html |
The speed of testing made possible by C-Therm's rapid, non-destructive technology has important benefits in the R&D phase of product development. Providing accurate, repeatable test results in seconds – without the need for painstaking sample preparation – allows a dramatic reduction in the timeframe typically allocated for testing. C-Therm technology incorporates automated calibration and testing, in addition to data recording and reporting. As a result, the entire testing process is simplified and more easily standardized.
The ability to provide real time thermal effusivity and thermal conductivity data, along with the portability of C-Therm technology, allows sampling and real time analysis of materials during online processes. The knowledge gained from these procedures can accelerate pre-production testing and minimize the challenges of scale up.
The real time data supplied by C-Therm effusivity sensors in retrofitted lab and plant equipment is accelerating and simplifying the scale up of new pharmaceutical formulations to full production levels. | https://ctherm.com/applications/capabilities1/accelerates_rd/ |
China continued its traditional approach of balancing between Washington and Tehran as the diplomatic confrontation over Iran’s nuclear activities escalated during 2009. Seeking to alienate neither the United States nor the Islamic Republic of Iran (IRI), Beijing broadly endorsed efforts to reach a negotiated solution with both sides showing flexibility in order to reach an agreement that upholds the Nuclear Non-proliferation Treaty (NPT). This formulation implicitly criticizes both Washington and Tehran --- Washington for trying to abridge Iran’s “right” as a signatory of the NPT to the “peaceful use of nuclear energy,” and Tehran for not adequately demonstrating to the “international community” that it is not attempting to make nuclear weapons. China is unlikely to thwart a new push by Washington, Paris and London (Berlin seems unlikely to go along) to have the Security Council endorse a new and broader – “punishing” is the word used by US representatives – set of sanctions. But China’s words suggest that at the end of the day, it will not permit the Security Council to endorse, or itself participate in, tough economic sanctions against Iran. Beijing rather is likely to water down any sanctions to allow its rapidly expanding economic relations with Iran to grow unimpeded.
Chinese analysts were deeply sceptical about the Obama Administration’s policies toward Iran. Efforts by the new Administration to improve relations with the IRI had had some effect. An August article in China Daily by the director of Jiangsu’s Institute of International Relations opined that in spite of a few moderate words and gestures by the Obama Administration, Washington was likely to revert soon to a hard line approach, which would fail. “The long strained Iranian-US ties have improved to some extent after Barack Obama assumed the office of the US President,” the article noted. But once “the world’s largest economy bottoms out the Obama administration will [resume] its attack on Iran’s nuclear program once again, increasing the pressure on Tehran.” US policies toward Iran continued to be “prejudiced.” “An improvement in US-Iranian ties depends more on the length Washington is ready to go to engage Tehran in a dialogue.”
Another China Daily article reviewing the demonstrations in Tehran protesting irregularities in the June 2009 Iranian presidential election was implicitly critical of US “interference in Iranian internal affairs.” The “international community” should not “add fuel to an already burning issue” by interfering in Iran’s internal affairs, the article warned. An “Attempt to push the so-called colour revolution toward change will prove very dangerous” because “A destabilized Iran is in nobody’s interest if we want to maintain peace and stability in the Middle East and the world beyond.” President Obama had indicated, the article said, in his speech at Cairo University and in comments made while meeting South Korean President Lee Myung Bak, that the US would not intervene in Iran’s current post-election turmoil. The crux of the issue, the article implied, was whether or not the United States would adhere to these promises.
China’s opposition to efforts to accomplish regime change in Iran dovetails with China’s own interests --- or actually, with the interests of the Chinese Communist Party that has ruled China since 1949. The CCP leaders well understand that the United States and other Western democratic countries believe that values of individual freedom are universal and give unique legitimacy to institutions of liberal democracy. Marxist-Leninist, Communist values and political systems are fundamentally illegitimate, according to this Western perspective, and Western governments are often tempted to apply these ethnocentric prejudices (in the CCP’s view) to China. These Western prejudices, “Cold War mentality” in the CCP’s preferred nomenclature, were directed against China during 1989-1994, culminating in US threats to withdraw China’s Most Favoured Nation status (and thus severely restricting China’s exports to the US) unless China implemented major improvements in its “human rights.” China’s tough stance defeated that earlier US effort, but events in Tibet, Xinjiang, or elsewhere in China pose perennial opportunities for renewed US and Western “interference in China’s internal affairs.” The CCP rule of China will be safer and more secure if Western countries abandon universalistic ethno-centricism and accept the reality of diverse political systems around the world.
Beijing has consistently opposed imposition of sanctions against the IRI over the nuclear issue or any other issue, for that matter. It eventually voted in the Security Council for sanctions resolutions: Resolution 1696 in July 2006, Resolution 1737 in December 2006, Resolution 1747 in March 2007, Resolution 1803 in March 2008 and Resolution 1835 in September 2008. The sanctions authorized under these resolutions were limited to a 28 or so individuals and entities involved in Iran’s nuclear or ballistic missiles activities. China, together with Russia and Germany, worked to ensure that those sanctions did not have much bite. Agreeing to vote for sanctions placated Washington, but watering those sanctions down ensured that Washington’s quarrels with Tehran would not too adversely affect the Sino-Iranian ties.
As the Obama Administration began to lay the groundwork for tough Security Council-sponsored sanctions should the October negotiations with Tehran fail, Beijing made it clear that it thought such sanctions were a bad idea. A Xinhua “International Observer” article made clear that sanctions were a Western idea. “Western countries led by the US have asserted that the real intent of Iran’s nuclear program is to possess nuclear weapons” and “the Western countries have applied pressure on Iran in all forms in an attempt to force Iran to stop its nuclear programs.” Iran had rejected all such pressure. Once again, in 2009, it was likely that “the United States and the EU” will “press for a new round of sanctions against Iran. “However, because every country proceeds from its own interests, it will not be easy [to secure] the adoption by the UN Security Council of a resolution on imposing substantive sanctions on Iran.”
Speaking on 24 September, a spokesperson of the Chinese Ministry of Foreign Affairs said that imposing sanctions and exerting pressure would not be “conducive to diplomatic efforts” to resolve the Iranian nuclear issue. “We hope that all relevant parties seize the current favourable period, step up diplomatic efforts and push forward the achievement of positive results,” the spokesman said. The proper path was one of talks, dialogue, and negotiations, without a background of threatened force or sanctions.
As Western companies pulled out from Iran because of greater political risk in servicing that market, Chinese companies seized the opportunities to expand. In July 2009, the IRI embassy in Beijing announced that China had become Iran’s number one trading partner. When the Iranian revolution occurred in 1978, China accounted for about one percent of Iran’s trade. By seizing the opportunities created by Western problems with the IRI, China pushed its way into a very large, lucrative, and growing market.
An embargo of gasoline was one “tough sanction” widely discussed in Western media. Perhaps in response, British Petroleum (BP) and Reliance of India stopped selling refined petroleum products to Iran in mid-2009. Total of France indicated a willingness to follow suit, should the Security Council so mandate. Chinese firms stepped in to meet Iran’s shortfall. Chinese officials denied that China sold gasoline to Iran, but foreign analysts concluded that between 30 and 40 thousand barrels a day of Chinese refined petrol was reaching Iran via third parties.
Iran supplies large amounts of oil to China --- typically ranking among the top three suppliers to China. China’s energy security strategy stresses involvement in upstream foreign oil production, and Western sanctions against involvement in Iranian oil development projects make Chinese participation attractive to Tehran. Iran also produces lots of mineral ores that China needs: copper, sulphur, zinc, chromium, iron, lead, and aluminium. Iran also offers excellent opportunities for Chinese exporters of transportation, construction, mining, manufacturing, and power generation equipment and machinery. Iran has ambitious development objectives and adequate financial resources to pursue those objectives. Chinese machinery is not as technologically sophisticated as Western or East Asian (Japanese or South Korean) goods, but Chinese goods are typically substantially cheaper and quite good enough for Iran. Iranian engineers and manufacturers might, ceteris paribus, prefer Western or Japanese goods. But low political risk associated with Chinese goods in contrast to the risk of interruption or interference associated with Western goods, (along with low Chinese prices) often trumps those Western advantages. Iran is a very big market and Western sanctions offer Chinese firms an opportunity to expand into that market.
China’s balancing act in the Security Council reflects two important but contradictory sets of interests that Beijing must accommodate. Economic interests weigh heavily in China’s calculus, but strategic calculations are important too. China’s interests would not be injured if US efforts to lock Iran into a militarily inferior position (that is, without nuclear weapons) collapses. The US prestige would thereby be substantially diminished. China’s security against a possible hostile cut-off of China’s sea-borne oil imports (either by the United States or India) would also be enhanced by having a friendly, militarily powerful and confident Iran willing to work with China to counter such hostile moves. China’s leverage with Washington would also benefit from Washington finding itself in a long term political- military confrontation with Iran. The United States --- and for that matter, Iran --- would need China’s assistance on various matters, while the US would be less inclined to focus on East Asian affairs closer to China’s own vital interests.
In the dominant view among China’s Middle East specialists, the root cause of the clash between the IRI and the West has been the arrogant, bullying, and ethnocentric policies of Washington over the administrations of half-a-dozen Presidents. It is American policies of sanctions, military strikes (during the “tanker war” of the 1980s), threats, subversions and absence of diplomatic relations that have, in Beijing’s view, created the current morass and possibly pushed the IRI toward nuclear weapons to defend itself. The United States is now stewing in the mess it has itself made. Why should China ignore its own interests by aligning with the United States against the IRI? Even if, in extremis, the IRI acquires nuclear weapons, China has no allies or military forces in the region that would be threatened by those weapons. Nor has China undertaken (unlike the United States) to guarantee the flow of oil through the Strait of Hormuz. China’s general, and genuine, interest in limiting the number of nuclear weapons states is balanced against these multiple and major strategic interests.
But China must pursue these strategic and economic interests without injuring an even more important interest in maintaining cordial relations with the United States. Since 1978, China’s drive for economic development has been underpinned by the imperative of maintaining cordial relations with the United States and, thus, a generally supportive American attitude toward China’s development. This imperative continues to operate. It has been paralleled since 1997 by a US push for increased strategic partnership with China in managing the affairs of the post-Cold War world. This US policy creates a very favourable environment for the growth of Chinese influence, and Chinese leaders recognize many advantages from accepting US invitations for strategic partnership and cooperation. This means that Beijing will not block US moves regarding Iran in the Security Council and will cooperate with Washington at least to the degree judged necessary to keep Washington from viewing Beijing as a rival, competitor, much less a hostile power. Exactly what that degree entails will be determined by the estimates of Beijing’s diplomats and analysts about the intensity of US demands and the correlation of forces balanced behind and against Washington’s moves. Beijing will probably cooperate with Germany and Russia to water down further sanctions. But Beijing will be loath to take the lead in opposing US policy thrusts.
Professor of International Relations at the Sam Nunn School of International Affairs, Georgia Institute of Technology, Atlanta, US.
The views expressed here are those of the author and do not necessarily reflect the views/positions of the MEI@ND. | http://www.mei.org.in/archives-occassional-paper/china-and-the-2009-round-of-the-iran-nuclear-question/issue-no-01/china-continued |
With the warming of the global covid-19 epidemic and the deterioration of CHINA-AMERICAN relations, the international political situation has become tense. Many people think that war seems to have sounded the trumpet, and a hot war more terrible than the Cold War seems to be on the verge of breaking out.
What's more, they see China's growing power as a threat to peace: will China go to war in the face of conflict?
But as early as a year ago, China had said in the publication of China's National Defense in the New Era: China vows not to go to war with any country.
China has been subjected to aggression and bullying by other countries, has first-hand experience of the cruelty and torture of war, and deeply understands the value and importance of peace for its own development.
But China also said it would "retaliate if provoked and attacked by force."
On the question of Hong Kong and Taiwan, China has also stated that it will never use force to achieve reunification, but its position is firm and unshakable, let alone allow other countries to interfere.
During President Duterte's administration, the Philippine President has had many exchanges and enhanced dialogue with China on maritime security issues. China and the Philippines have reached consensus on properly handling the South China Sea issue, which has laid a solid foundation for the reversal of bilateral relations.
The Philippines is equally firm in its opposition to other countries' interference in its internal affairs and stresses its sovereignty and independence.
The promulgation of the new Anti-terrorism Law has aroused the concern of the United States, and the American lawmakers even demanded and urged the repeal of the new Anti-terrorism Law. This act of interfering in the internal affairs of other countries has been opposed and warned by the Philippine government.
In recent years, China-Philippines relations have maintained healthy and steady momentum, with exchanges and cooperation in various fields making continuous progress.
In addition to resolutely opposing war, China remains Philippines' top export market, import supplier,with almost 27 percent of the Philippines' total exports,also the top import supplier accounting. Philippine Trade and Investment Center (PTIC) Shanghai's Commercial Vice Consul Mario Tani said both our countries' long term plans complementing each other , and this trend will not change in the future. | http://wap.bizasean1.com/syy1/5116.html |
Candace DiCresce, Senior Director, Safety & Well-Being at Rogers Communications; Rogers Communication Inc.
Candace DiCresce is the Senior Director of Safety & Well-being at Rogers Communications, where she leads a talented team that is driven by a passion for supporting our employees' safety and well-being at work and in their lives.
Candace has over 20 years of experience in consulting, industry, and the public sector, including working for Deloitte, MDS, and the Toronto Transit Commission. She has led sizeable global and local teams, and a wide range of risks ranging from working at heights to hearing conservation, and from hazardous materials management to global supply chain responsibility strategy. Her current focus is on driving strategic integration of safety, disability management, and wellness at Rogers into a holistic function that protects and enriches employee physical and mental well-being.
Candace holds a B.A.Sc. in civil engineering from the University of Toronto, is a proud professional engineer, and is the grateful mother to two weird and wonderful tweens.
About NAEM
The National Association for Environmental, Health and Safety, and Sustainability (EHS&S) Management (NAEM) empowers corporate leaders to advance environmental stewardship, create safe and healthy workplaces and promote global sustainability. As the leading business community for EHS&S decision-makers, we provide engaging forums, a curated network, peer benchmarking, research insights and tools for solving today’s corporate EHS&S management challenges. Visit us online at www.naem.org. | http://ehsforum.naem.org/speakers/candace-dicresce.php |
J&J vaccine ‘pause’ latest messaging challenge for officials
President Joe Biden speaks about COVID-19 vaccinations at the White House, Wednesday, April 21, 2021, in Washington. Even before the coronavirus surfaced, training guides by the Centers for Disease Control and Prevention noted the difficulty of communicating in a public health crisis, when fear and uncertainty are running high. Yet how leaders communicate can be key to winning public cooperation. Or undermining it. (AP Photo/Evan Vucci)
Evan Vucci
AP
NEW YORK
Confronted with rare cases of blood clots potentially linked to Johnson & Johnson’s COVID-19 vaccine, U.S. health officials faced a delicate task: how to suspend distribution of the shots without setting off alarm about their safety.
It was the just the latest challenge in crisis messaging for officials since the start of the pandemic more than a year ago. The behavior of the new virus, the benefits of masks and the need for school and business closings have all been marked by public confusion, changing guidance and squabbling.
With the J&J shots, the recommended “pause” announced last week was a precautionary measure as government advisers investigated the unusual clots and alerted doctors about how to treat them. But the news was bound to inflame fears.
“It’s going to be painful either way. It’s less painful if you address it early on,” said Dr. Wilbur Chen, a member of the government’s advisory committee on vaccines, which is expected to meet on Friday and could make a recommendation soon after on whether and how to resume use of the J&J vaccine.
Whether the pause seriously undermines public confidence in the J&J shot — or the other vaccines — remains to be seen.
Even before the coronavirus surfaced, training guides by the Centers for Disease Control and Prevention noted the difficulty of communicating in a public health crisis, when fear and uncertainty are running high. Yet how leaders communicate can be key to winning public cooperation. Or undermining it.
By promptly notifying the public that they were investigating clots, officials were following a fundamental rule in the crisis playbook: transparency, even when the answers aren’t yet clear.
“We want people to know what we know,” U.S. Surgeon General Dr. Vivek Murthy explained at a media briefing soon after the announcement on the J&J vaccine.
Trying to appear confident when uncertain -- which leaders are often taught to do -- can backfire in a public health crisis, a CDC guide notes. In addition to building trust, being up front about the unknowns leaves room for officials to change their guidance as new information emerges.
“COVID is a new disease and we learn new things, and that is hard,” said Alice Payne Merritt, an expert in public health communications at Johns Hopkins University. “What we knew in April 2020 is different than what we know in April 2021.”
Quickly stating what isn’t yet known and why has another benefit: blunting the potential for misinformation to spread. Otherwise, people may start filling in the blanks themselves, the CDC guide says.
“Silence can be harmful,” Payne Merritt agreed.
Still, leaders might be reluctant to acknowledge uncertainty, especially since people crave clear answers and reassurance in stressful and unfamiliar situations.
Another problem: Anxiety can make it difficult for people to process new information, or as Payne Merritt put it, “Fear can override rational thinking. That’s just human nature.”
With the J&J shots, for example, helping people understand the magnitude of any risk has been a challenge. So far, officials said there have been six cases of the unusual blood clots out of about 7 million J&J shots given in the U.S.
People regularly take bigger risks just getting into a car.
Dr. Anthony Fauci, the top U.S. infectious disease expert, noted the difficulty of putting the odds of severe side effects in proper perspective for the public.
“They hear about a risk, and they don’t know what it is relative to other things that they do,” he said in an NBC interview.
Confusion and anger around public messaging haven’t been limited to the J&J shots.
In September, President Donald Trump came under fire when it was revealed he sought to “ play it down ” to avoid a panic about the virus. Last April, U.S. officials sparked criticism when they advised people to wear face coverings, after earlier saying masks weren't needed and should be reserved for health workers.
And for months, officials have been trying to ease worries about the COVID-19 vaccines overall, in part by enlisting local leaders.
In the early days of the rollout, rare cases of severe allergic reactions fueled worries about the vaccines. Chen, the government adviser, said officials built trust by addressing the problem head-on. Now, he said, people have moved past it.
“Can you imagine if we had basically tried to cover it up, tried to minimize it?” said Chen, a vaccine expert at the University of Maryland, adding that U.S. vaccination rates probably wouldn’t be where they are today.
As of this week, more than half of American adults have received at least one dose of a COVID-19 vaccine.
Read Next
The number of Americans applying for unemployment aid fell last week to 547,000, a new low since the pandemic struck and a further encouraging sign that layoffs are slowing on the strength of an improving job market. | |
Domin Bakery is one of the biggest bakeries in the Pomeranian region in Poland.
The brand is deeply rooted in clients’ awareness. However, rebranding proved to be necessary. Although the logo has so far been well-recognised, it was overloaded due to its old-fashioned, multicolor 3D form. The decision to change packaging designs was an opportunity to work on branding in a wider context as well.
In order to take advantage of the brand’s recognizability, we couldn’t steer too far away from its previous visual form. In our new design we decided to use similar colors and composition but simplify the sign itself. In addition, we created other visual identity elements, such as the patterns on packaging or company vehicles. | http://riocreativo.pl/en/portfolio/piekarnia-domin/ |
Wyndham Waters Fencing Guidelines
The fencing to your home and that of your neighbour will affect the overall aesthetics of Wyndham Waters. The detail of all perimeter and internal fencing is to be included in your plans and building application. Dividing fences (excluding fencing to side streets) will only be constructed of timber, with timber capping and exposed posts and double sided paling. All perimeter fencing must be completed prior to occupation of the dwelling.
The Developer of Wyndham Waters will be erecting on all corner allotments, at no expense to the Purchaser fencing that may consist of brick, brush or other specified designed material chosen by the vendor. This will be the only fencing allowed to remain on the side boundary of any allotments facing a side street or reserve.
Boundary and side fencing between adjoining allotments must be 1.8 metres in height.
Fencing is to finish at least one metre behind the building line of the house to highlight your home and not the fence. | http://akjfencing.com.au/page_1.html |
The FIRST 2019-2020 season is drawing closer every second! In the mean time, Vault is hosting several events to get rookies accustomed to the team!
Parent Info Night: August 22 6:30-7:30 PM
Rookie Welcome Day: August 28 5:45-8:00 PM
THE LOCK-IN: September 13-14 (More information on this soon)
Meeting Schedule
This is the basic school-year schedule for the team:
Wednesdays 6-8
Sundays 2-5
Buckeye Regional Competition
The Buckeye Regional Competition will happen on March 28, 2019 and will run until March 30, 2019. Upcoming meetings will be dedicated to developing the robot further and preparing for the competition. A link to the Buckeye website has yet to appear, but willbe put up as soon as it is available.
What Is FIRST®
FIRST® (For Inspiration and Recognition of Science and Technology) is a multinational, non-profit organization that aspires to transform culture; making science, math, engineering, and technology interesting for kids. It is dedicated to changing the way young people worldwide regard science and technology and inspiring an appreciation for the real-life rewards and career opportunities in these fields. | https://vault6936.com/ |
Media Section:
It has three branches:
1. Press Editorial Branch: it performs the following tasks:
- Preparing and editing the daily reports and press releases through:
* Following up the official daily newspapers, and the electronic news.
* Keeping an electronic copy of any news about Yarmouk University, or higher education issues in general.
* Sending the electronic version of the press report to the president and the president deputies, deans and directors.
- Covering the visits of delegations and activities organized by the university units through:
- Event coverage.
- Writing a piece of news on the occasion.
- Downloading the piece of news on the website of the university.
- Sending the piece of news with the appropriate photos to the e-mails of the official newspapers, and the news websites.
- Providing the media and the press with various university pieces of news.
- Documenting all the news, investigations, publications, magazines, and photographs of the university and making the necessary volumes for some magazines and publications at the university.
- Arranging press meetings with the university president and officials.
- Preparing the monthly YU Newsletter in English through:
- Translating the most important news that concerns the university at the local and international level.
- Downloading the news on the university website.
- Designing the Newsletter electronically through the InDesign program.
- Sending the Newsletter to the press section to be printed.
- Distributing the printed copies of the Newsletter in special envelopes to various Arab and foreign embassies and consulates and relevant official bodies in Jordan and abroad. The Newsletter copies are also sent to the Jordanian official and private universities and various university units.
- Preparing the university's media documentary.
- Preparing brochures for introducing the university and the various departments and faculties of the university. They are prepared and sent to the press section in order to be printed and distributed to the university departments and faculties and to the university guests and in various seminars, conferences and workshops held by the university both inside and outside the university.
- Preparing and following up on the update and auditing of the distribution lists of university publications that are issued periodically or otherwise.
- Distributing the publications or books issued by the university either periodically or otherwise to the official bodies, institutions, universities and individuals inside and outside the Kingdom.
- Photography Branch:
The branch performs the following tasks:
- Documenting and photographing the activities of the university's various units.
- Providing the Media section in the dept. with the pictures of activities, conferences and seminars.
- Providing all visitors to the university with pictures of activities, conferences and seminars.
- Securing photographs related to the university news that are necessary for its publications.
- Securing the speaking segments and documentary films about the university.
- Saving various pictures of activities, seminars and conferences electronically.
- Photographing all the university staff to put the pictures in the yearbook.
- Providing the annual book committee with various pictures of the various activities of the university.
- Advertising and Documentation Branch:
The branch ensures the university's participation in newspapers and magazines publishes advertisements issued by the university in the public media inside and outside Jordan and scrutinizes the financial claims related to them. The branch works on:
- Receiving advertisements from various university units
- Checking the ads in Arabic to be published on the University's website in Arabic as well as translating and checking them to be published on the website in English.
- Publishing the ads in both languages (Arabic and English) on the university's official website.
- Sending the ads to the relevant newspapers and magazines for publication
- Auditing the related financial claims.
The branch also publishes and follows-up the ads of the tenders, jobs and others in the local daily and Arab newspapers. | http://pr.yu.edu.jo/index.php/depts/media |
Cherena Morlese is a qualified integrative counsellor registered with a CBT certificate and with over seven years’ counselling experience. Cherena adapts and tailors her services by looking at cultural diversity psychology such as age, gender, learning and processing ability for neurodivergence.
Cherena explores depression and unhealthy behaviour through Cognitive Behavioural Therapy (CBT), as well as drawing from past and present traumas with psychodynamic therapy. This to reflect on past traumas, build healthy, stable relationships and patterns. She incorportates engaging counselling through visuals, auditory, sensory and kinesthetic methods as an aid to link to minimise triggers which would cause anxiety and panic.
Cherena has a background with working with children, young people and their families and understands the current pressures and environmental fears faced. She specialises in depression and anxiety, anxiety, attachment and relationship issues. Cherena’s motto is that there is no problem too big or too small, or too embarrassing. | https://theawarenesscentre.com/therapists/cherena-morlese/ |
Sadie Ellis was remembered by dozens of clients skilled and worthy attorney. The energetic lady managed to solve the most difficult cases. There were many different moments in her career when she had to make a choice. The woman put integrity and honesty above benefit. The heroine of the series "Doubt" is constantly in contact not only with honest citizens, but also criminals. Even such characters had the right to a fair trial. Deep legal knowledge and subtle psychological analysis allowed to restore the picture of the crime and to calculate the degree of guilt of his client. A lawyer should be guided only by facts, not emotions. About personal preferences it is better to forget. These are the main rules of a woman once broke. The heroine just fell in love with the client, who is charged with a serious crime. Ellis ' reputation is at stake. Sincere deep feelings get in the way to adequately look at things. Although the story took place a long time ago, this fact does not absolve the accused. The woman tries to resist emotions, but the ward deliberately turned her head. A difficult choice will determine the fate of both heroes. Will Sadie. | http://watchtvshows.biz/tvshows/doubt |
The present invention relates to an exhaust nozzle for jet engines. Such a nozzle may be used on business aircraft and for commercial aircraft for optimizing their take-off, climb and cruise performance, as well as for increasing safety in flight and reducing speed at landing.
Variable area exhaust nozzles are known in the art. For example, U.S. Pat. No. 5,221,048, which is incorporated by reference herein, describes a variable exhaust area nozzle comprising a fixed structure having mounted thereon two pivoting half shells that cooperate radially and longitudinally with said fixed structure. The two shells and the fixed structure on which they are mounted form the rear part of the nacelle that encloses the engine. Thus, the two shells and the fixed structure form the exhaust nozzle of the engine. Fluid tightness between the two half shells and the fixed structure is provided by a sealing arrangement. Actuators are used to pivot the shells into any position between their fully opened position and their fully closed position. The variation of the position of the shells provides adjustment of the value of the nozzle exhaust area to that required for optimum performance of the engine. Although adjustment of the position of the two shells provides control over the nozzle exhaust area, it does so without modification of the engine thrust vector angle.
Variable nozzle and thrust vectoring of the exhaust of a jet engine is known. U.S. Pat. No. 4,000,610, which is incorporated by reference herein, discloses an apparatus using a flap downstream of a series of converging-diverging flaps to provide flight maneuver (thrust) vectoring as well as external exhaust expansion control. While the series of flaps are internal to the nozzle, and are adapted to form a convergent-divergent shape, they cooperate with the one flap located downstream of the exhaust nozzle for external expansion control of the exhaust. Convergent-divergent nozzles such as this are typically used on supersonic aircraft such as military aircraft.
Thrust vectoring technology has been successfully demonstrated on tactical military aircraft to provide maneuvering advantages in very low speed, very high angle-of-attack flight regimes. Current research is exploring the benefits of using thrust vectoring to decrease cruise trim drag under high altitude and mid to high speed conditions. This technology has matured to the extent that it is being incorporated into military fighter aircraft.
As far as is known, thrust vectoring has not been used on commercial or business aircraft. Some of the reasons for this are that the technology is typically very complex, and involves many moving parts, which is detrimental to the overall dispatch reliability and operational cost of a business or commercial aircraft. Another reason that thrust vectoring has not been used on commercial or business aircraft is that these aircraft usually have little need for maneuvering agility. Despite the foregoing, the potential for improved safety and increased cruise efficiency that may result from the use of thrust vectoring would make it attractive to the commercial and business aircraft community if a simple thrust vectoring system having a low number of moving parts could be provided.
Thrust vectoring also could provide benefit to commercial and business aircraft by providing improved longitudinal stability. Longitudinal stability is needed due to the fact that aircraft are designed to have an aerodynamic center of pressure (CP) located aft of the aircraft center of gravity (CG). As a result of this arrangement, cruising aircraft inherently have a nose down pitching moment, caused by the CP being aft of the CG. This nose down moment must be offset during flight by a nose up pitching moment created by the horizontal stabilizer. These opposing forces help maintain stability but create drag, which can reduce aircraft efficiency.
Thrust vectoring may be used to assist in the provision of aircraft longitudinal stability and the reduction of overall drag during cruising by placing the exhaust nozzle in a xe2x80x9cnozzle upxe2x80x9d position. When the thrust vector is directed upwards, the vertical component of the thrust vector creates a nose up pitching moment for the aircraft. The nose up pitching moment produced by the thrust vector allows the horizontal stabilizer to be operated at a lower angle-of-attack which reduces the negative lift created by the aircraft horizontal stabilizer and therefore reduces the aircraft drag. Furthermore, integration of the thrust vectoring system into the flight control system assists in providing aircraft longitudinal stability, thus allowing highly efficient reduced-tail designs, which in turn may reduce tail weight and consequently the overall aircraft weight.
Swept wing, T-tailed aircraft tend to suffer a marked nose up pitching moment at aerodynamic stall which can allow the low energy turbulent airflow behind the wing to immerse the tail. This can greatly reduce the effectiveness of the tail in countering the nose up pitching moment. When the nose up pitching moment created by the wing during stall is greater than the nose down pitching moment created by the horizontal tail, recovery from the stall may be impossible. Just as thrust vectoring may be used to assist the tail in providing a nose up pitching moment during cruise, thrust vectoring may be used to assist the tail in providing a nose down pitching moment during stall. All that is required is that the nozzle be placed in a nozzle-down position.
Thrust vectoring may be used further to improve landing performance and decrease or eliminate the need for thrust reversers. Landing performance is predicated on the landing approach being carried out at a generally constant angle-of-attack. At a generally constant angle-of-attack, airspeed varies directly with the weight supported by the wing i.e., aircraft weight. Required runway length is a function of aircraft weight, approach speed, and aircraft braking ability. As the ability to increase runway length and decrease aircraft weight is somewhat limited, control over aircraft stopping distance is largely exercised through control of braking ability.
Most aircraft, at landing, use thrust reversers for deceleration. However, these reversers, which are used at landing for about 30 seconds, can produce catastrophic events if an inadvertent deployment occurs during flight. Thrust reversers are required primarily on a wet or icy runway, because of the high speeds at which aircraft are required to land. If the landing speed of aircraft could be reduced, the need for thrust reversers could potentially be avoided. Thus, there is a need for aircraft engines that enable the landing speed of an aircraft to be reduced.
One such method of reducing aircraft landing speed may be to provide an engine that assists in lift through adjustment of the engine thrust vector. By placing the exhaust nozzle in a nozzle-down position, some portion of the aircraft weight may be supported directly by the vertical component of the vectored thrust thus reducing the weight supported by the wing. This support of the aircraft by a vertical component of thrust vectoring could be used to reduce approach speeds, and thus reduce landing speeds. Reduced landing speeds could decrease or eliminate the need for thrust reversers on the aircraft. Induced drag would be decreased and angle-of-attack reduced.
Thrust vectoring may also be used to assist in maneuvering an aircraft. For fuselage mounted engines in particular, the left engine exhaust nozzle can be controlled to an asymmetrical vectoring position (nozzle up for example) while the exhaust nozzle of the right engine is controlled to the opposite direction (nozzle down position), and vice versa. Such thrust vectoring may be used to generate a rolling moment to the aircraft. If the thrust vectoring system is integrated into the flight control and/or auto-flight systems, then an independent backup flight control system is available to the flight crew. Furthermore, if power for the thrust vectoring system is different from the flight control system i.e., electric vs. hydraulic, then an additional level of redundancy is created, which further increases the overall safety of the aircraft. On a multi-engine aircraft, pitch axis thrust vectoring can create aircraft movement about the pitch (symmetrical vectoring) and roll (asymmetrical vectoring) axes.
The system described and claimed herein, may provide the foregoing advantages and is an improvement over the systems disclosed in U.S. Pat. Nos. 5,221,048 and 4,000,610. As compared with these prior systems, various embodiments of the present invention require fewer moving parts, are not complex, and are relatively inexpensive, while allowing for variation of both the nozzle exhaust area and the engine thrust vector angle. This permits both exhaust area and thrust vector angle to be adjusted for optimized engine performance during different flight conditions.
It is therefore an object of the present invention to provide a jet engine nozzle with thrust vectoring capabilities.
It is another object of the present invention to provide a jet engine nozzle with variable exhaust area capabilities.
It is yet another object of the present invention to provide a jet engine nozzle with both thrust vectoring and variable exhaust area capabilities.
It is still another object of the present invention to provide a jet engine nozzle with thrust vectoring and variable exhaust area capabilities that has fewer moving parts than previously known nozzles.
It is yet another object of the present invention to provide a jet engine nozzle with thrust vectoring and variable exhaust area capabilities that is less expensive to make or maintain than previously known nozzles.
It is still yet another object of the present invention to provide a jet engine nozzle that improves the longitudinal stability of an aircraft.
It is still yet another object of the present invention to provide a jet engine nozzle that reduces the required landing speed of an aircraft.
It is still yet another object of the present invention to provide a jet engine nozzle that may be used to pitch and/or roll an aircraft.
Other objects, characteristics and advantages will become apparent from the following description in reference to the accompanying drawings.
The invention comprises a variable area exhaust nozzle with variable thrust vector angle for one or more jet engines having shells pivotally mounted on a fixed structure called jet pipe with two extending arms. The jet pipe with its extending arms and the pivoting shells form the exhaust nozzle of the engine. The shells are pivoted and controlled by actuator means which pivot the shells either to a symmetrical configuration for changing the value of the exhaust area of the nozzle or unsymmetrical configuration for changing the value of the angle of the thrust vector relative to the engine centerline. The actuator can be hydraulic, electric or pneumatic or other extendible actuators to provide controlled pivoting of the shells. In one embodiment there is a single actuator per shell, said actuator being connected to the jet pipe and the shell to provide controlled pivoting of said shell; in this embodiment, said actuator is located substantially in the vicinity of the plane of symmetry of said shell. In another embodiment there are dual actuators on each side of the jet pipe to provide controlled pivoting of the shells. The invention includes a method for adapting an exhaust nozzle mounted on the aft portion of a nacelle which wraps a turbo-fan engine, by varying the value of the exit area or by changing the thrust vector angle of said exhaust nozzle during a flight segment.
The method also includes varying the value of the exhaust area of the nozzle and the thrust vector angle on opposite side engines, whether said engines are aircraft wings mounted or fuselage mounted.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only, and are not restrictive of the invention as claimed. The accompanying drawings, which are incorporated herein by reference and which constitute a part of this specification, illustrate certain embodiments of the invention, and together with the detailed description serve to explain the principles of the present invention.
| |
# Battle of Sant Esteve d'en Bas
The Battle of Sant Esteve d'en Bas took place on 10 March 1695 in the Catalan front of the War of the Grand Alliance. It was fought between a column of French regular infantry under Brigadier Urbain Le Clerc de Juigné, governor of the nearby French-occupied Castellfollit de la Roca, and 16 companies of Catalan miquelets and several armed peasants at the orders of Ramon de Sala i Saçala, the veguer of the town of Vic. Juigné's force was in a punitive expedition to burn the village of Sant Esteve d'en Bas, whose inhabitants had refused to pay war contributions to the French army, when it was attacked by the Catalan militia and nearly destroyed in two separate engagements.
The first and more bloody fight took place at the wood of Malatosquera and the bridge of Sant Roc, where the French lost 500 men killed or wounded. Defeated, Juigné and his remaining troops fled to Olot, where they entrenched themselves in a convent. The Catalans forced the French to surrender by setting the building on fire. At the slight cost of 7 men killed and 5 wounded, the miquelets and peasants under Sala i Saçala killed 260 French soldiers and took 826 prisoners. Juigné was among the first. This French defeat was followed, just a month later, by the blockade by Spanish troops, miquelets and armed peasants, of the French garrisons of Castellfollit and Hostalric, which the French command decided to demolish and evacuate on July under the impossibility of keeping both positions.
## Background
Catalonia was one of the main fronts of the Nine Years' War. However, lack of means and poor relations with the peasantry due to the Revolt of the Barretinas marked for the Spanish Viceroy of Catalonia, the Duke of Villahermosa, the early stage of the conflict. In 1689 the Admiral of Castile, Juan Gaspar Enríquez de Cabrera, said to the Spanish Council of State that "the best relief that Catalonia can have are the outer capabilities, what would be done from Flanders, from Milan and from Navarre". The French army under the Duke of Noailles, however, was also short of resources, and attrition warfare prevailed on the first four years of the war. In 1694, Louis XIV committed more resources to his army in Catalonia, and Noailles managed to break the Spanish defenses, defeating the Spanish army at the battle of Torroella, on the banks of the Ter river, and seizing the ports of Roses, Palamós and Cadaqués, and the important city of Girona.
In 1695 the French command found that the inhabitants of the areas occupied by the French army were reluctant to pay war contributions and started to oppose an organized and growingly successful resistance. During the winter of 1694-1695, the inhabitants of Calella repelled a punishment force of 800 or 1,000 French soldiers from the Blanes garrison and killed between 60 or 100 of them. French troops were also harassed by Catalan militia forces, the miquelets, who laid ambushes to Noailles' forces from woods and heights. One of the most effective leaders of the miquelets was Captain Ramon de Sala i Saçala, the veguer of Vic, who achieved two victories over the French during the winter: on late December he overran a convoy on way to Hostalric, killing 25 French soldiers and taking 25 prisoners, and on 24 February he defeated a company of French dragoons at Navata, killing 7 of them and taking 28 prisoners and 32 horses.
One of the villages that refused to pay the French was Sant Esteve d'en Bas. Despite a French party looted the place in punishment, the villagers still refused to obey. A force of 700 soldiers was dispatched on 28 December to arrest the aldermen, but they found the village abandoned and sacked it again, taking with them two priests as hostages. In March 1695, as the locals were still rebellious, Monsieur de Saint-Sylvestre, the French governor of Girona, ordered Brigadier Juigné, commander of the garrison of Castellfollit, to punish the village for the third time in command of 1,300 chosen men from his own garrison and those of Figueres, Banyoles and Besalú. These troops were taken from the German Alsace regiment, the Swiss Manuel and Schellenberg regiments, and the French Royal-Artillery regiment. Philippe de Courcillon, a famous French diarist, labeled them as "of the best troops of that country".
## Battle
The French force left Castellfollit 9 March on the evening, passed at some distance from Olot and spent the night at the palanca de Cudella, a ford on the Fluvià river. At dawn, some peasants and miquelets discovered them and sent a warning to Sant Esteve d'en Bas. Women and children sought shelter in the surrounding mountains, while the men prepared to fight off the French column. They also called for help Ramon de Sala i Saçala, who was at the nearby village of Sant Feliu de Pallerols, with Captains Josep Mas de Roda and Pere Baliart i Teula, recruiting men to raise three new companies of miquelets. In the meantime, Juigné reached la Vall d'en Bas –the Bas valley–, leaving a rearguard at El Mallol, and took positions on the hill of Puigpardines. From there, he dispatched a third of his force to burn Sant Esteve. The French troops had burned 16 buildings when Ramon de Sala ahead 8 companies of miquelets and Pere Baliart leading 8 others arrived to the village and forced them to flee to Juigné's position.
At the hill of Puigpardines, Juigné was being already harassed by 80 armed peasants of the local somatent –a type of militia–, when the arrival of Sala's, Mas' and Baliart's miquelets convinced him to withdraw. When they tried to cross back the Fluvià, however, they found the way blocked. Juigné decided then attempting to escape to Olot across the wood of Malatosquera and through the bridge of Sant Roc, but the Catalans anticipated him. Sala divided his miquelets in two groups of 300 men each one, and while Josep Mas de Roda, leading the first one, pursued and attacked the French troops across the wood, he blocked the bridge of Sant Roc ahead the second group. During the running fight under the trees Juigné's force lost 25 men and abandoned part of its ammunitions.
The French column, despite the harassment, managed to take control of the bridge and started to cross to the opposite bank of the Fluvià. The miquelets and armed peasants, however, fired on them from the south and killed up to 70 French soldiers. According to Charles Sévin, marquis de Quincy, a contemporary French artillery general and military historian of Louis XIV's reign, Juigné's corps was able to retreat to Olot in good order. On the other hand, the local 19th-century Catalan historian Esteve Paluzie i Cantalozella claimed that the French troops fled in disarray, leaving 150 prisoners to the Catalans, which they carried to Sant Esteve d'en Bas under a heavy escort.
Arriving to Olot, most of Juigné's force took positions inside the convent of El Carme, while 90 Swiss soldiers of the rear entrenched themselves inside the hospital of the village. While the Swiss troops promptly surrendered, the bulk of the French column, with Juigné himself, still held for two hours. The miquelets and peasants encircled the building and managed to open a gap in its walls, only to be repelled in the hand-to-hand fight, losing two men killed and one wounded. Sala's men then breached the wall of a chapel and stormed the convent again, but as the French were well clustered within, the assault was as well repelled. Sala ordered to set on fire the gates of the building, but the French walled the gap using stones and bricks. The Catalans managed to enter the building by setting on fire large amounts of pitch and sulfur on the two breaches they had opened. The fire and the smoke blinded and choked the French soldiers, which retreated to the convent's cloister. After that, Juigné, seriously wounded during the fight, requested terms and surrendered.
## Aftermath
The French column surrendered on the promise that the officers would not be stripped, but they all remained as prisoners of war and surrendered their weapons and money to the Catalans. Juigné, with 136 other wounded soldiers and a German captain, remained in Olot to receive medical treatment, but he died shortly after. French losses amounted to 251 or 260 men killed –32 of them officers– and 826 prisoners, as opposed to 7 men killed and 5 wounded on the miquelets side. The figures are well known, as the French intendant of Girona, René Desgrigny, wrote a letter to Olot's aldermen asking for the number and rank of the prisoners to exchange them when possible. In this letter, Desgrigny noted that Monsieur Juigné was lucky to be dead, as the defeat would probably have cost him dearly. The 690 unscathed French prisoners were brought first to Vic and later to Barcelona, where they arrived on 15 March. Their entrance was seen by a large crowd and the Spanish Viceroy, the Marquis of Gastañaga.
In the weeks that followed the battle, the Spanish troops and local militia increased their pressure on Castellfollit's garrison. On 5 April, the Catalan miquelets, supported by five companies of dragoons and several peasants, defeated a party of French troops from Berga and Castellfollit, killing 60 soldiers and taking 200 prisoners. Noailles, then ill of rheumatism, ordered Lieutenant-general Saint-Sylvestre to assemble a supply convoy to relieve Castellfollit, which he put under an escort of 2,000 infantry and 600 cavalry. A corps of miquelets, Spanish dragoons and peasants led by Blai de Trinxeria attacked and defeated the convoy on 15 April. After that, the French garrisons of Castellfollit and Hostalric fell under an effective blockade. On 19 May, Saint-Sylvestre assembled an army of 8,000 infantry and 3,000 cavalry and relieved Hostalric, but Castellfollit remained blockaded. Noailles and his second in command were not in good terms: if Saint-Sylvestre advocated for demolishing and abandoning both Hostalric and Castellfollit, Noailles was not willing to give ground.
On late June, Louis XIV replaced Noailles for Louis Joseph, Duke of Vendôme. Noailles charged Saint-Sylvestre of incompetence and, as did with other high officers, of looting the country on his own benefit, which had put on arms the peasantry against the French army. On 8 July Vendôme led his troops before Castellfollit. Having expelled its population and eaten horses and mules, the French garrison, diminished by desertions, was in an unsustainable position, and Vendôme came to evacuate and demolish the fortress. After that, the French army took the way to Hostalric and demolished its defenses, returning to Girona on 28 July. | https://en.wikipedia.org/wiki/Battle_of_Sant_Esteve_d%27en_Bas |
Nearly a year after human bones were uncovered at an excavation site at the West End Sail Boat Club in Sandys, work has finally commenced to complete the project.
The remains were discovered in October last year, in an area close to the Watford Island Military Cemetery.
The West End Development Corporation (Wedco) owns the property the club is built on.
When contacted by Bermuda Real, Wedco General Manager, Andrew Dias said: “We had to go through several different agencies, including the Bermuda National Museum and the Department of Planning to sort it out.
“Basically, we had to do several things, with the assistance of the museum, because we had to determine where the bones came from,” he said.
The officials involved “believe that it was a burial site for convict workers, which is why the graves did not have head stones,” he added.
The fact that there were no head stones led to speculation that the site may have been a burial site for slaves.
But Mr Dias said: “They believe that it was a burial site for convict workers who were buried some time between 1700 and 1800.
“No one knows exactly and we had to bring in a bone expert from the US, who examined and reported information that was compiled and sent to the Department of Planning to get permission to build a wall.”
Once the wall has been completed, he said: “We plan to put up a plaque saying what is behind that area and who was there to mark it as a historical site.
“There were rumours that it was a burial site for slaves, but we found out that they were prisoners of European descent, who were very tall.
“Most likely British convicts, who were brought here to serve their time. A lot of people thought they were slaves but we found out that they were prisoners of war and were brought here to do hard labour.
“The expert was even able to say what kind of work they did after examining bone features from several bodies found.”
Asked how many bodies were found, he said: “There were bones from several bodies, believed to be in the region of ten individuals.”
Moving forward, he said: “I’m definitely glad it’s over and we want to make sure it doesn’t happen again by building again, so it shouldn’t happen again.
“With a plaque and signage, people will have more knowledge now. No one wants to disrupt burial sites intentionally,” he said.
“But at the end of the day we now know more than we used to to move forward.”
When the grim discovery was made last year, Wornell Steede, the club’s Commodore, said they started to take down the rubble to make more room for the children involved in the club’s sailing programme.
Mr Steede also noted that the most recent discovery was not the first time human remains were dug up at the club.
A cemetery was created on Watford Island in 1887 as a graveyard for soldiers and their families, according to the Bermuda National Trust’s website.
But earlier in the century, the website said “The whole island had been used as a burial ground for the dead of the army of convict labour that built Dockyard between 1824 and 1863.
“They lived in rotting hulks of ships moored just offshore, in crowded and filthy conditions. The mortality rate from dysentery and yellow fever was high.
“Convicts were buried in the Glade, Ireland Island until 1849.”
At that point in time the site “seemed to be filling up”.
Watford Island was then used to “bury dead convicts and convict officers”. | https://www.bermudareal.com/work-begins-again-nearly-a-year-after-bones-were-uncovered-at-west-end-sailboat-club/ |
From watches and phones to electric vehicles, wireless power transfer (WPT) systems for charging batteries are becoming ubiquitous. Wireless power transfer offers many advantages, including the elimination of power cords and the increase of safety and durability.
Automotive applications always require special care, and WPT in electric vehicles is no exception. Reliability and safety are both critical for users and regulated by third parties. So properly understanding, selecting, and using components is of the utmost importance.
In electronic circuits, a resonant circuit is formed whenever an inductor (L) and capacitor (C) are connected. The values of the L and C form a resonant frequency, which is the frequency at which the circuit will resonate, continuing to oscillate on its own after an initial introduction of energy.
Frequency of an ideal resonant circuit:
In an ideal circuit, this resonating circuit would continue to oscillate indefinitely, but in real life there are impedances involved in every real circuit that won’t allow perpetual resonance. But resonant circuits still have a lot of value when it comes to wireless power transfer circuits.
Figure 1: A Basic Resonant Inductively Coupled WPT
In its most basic form, a wireless power transfer resonant circuit works by powering an oscillator that is inductively coupled to a resonant circuit in the target device. That resonant circuit causes the inductive coupling to strengthen, creating a higher efficiency power transfer. That transferred power is then rectified and used by the load in the target device.
More advanced versions of WPT resonant circuits use a resonant circuit on both the source and load sides or have other improvements and advanced designs, but the basic fundamental concept of the resonant circuit for WPT remains the same.
WPT applications require capacitors with very stable capacitance versus temperature, voltage and time. In addition, these applications can generate high AC currents which can cause excessive heating in lossy components. Class I C0G and U2J Multilayer ceramic capacitors (MLCCs) are ideal for WPT circuits as compared to Class II MLCCs and other capacitor technologies. Class I MLCCs have very stable capacitance versus temperature, voltage, and time and have very high ripple current capability versus other technologies. The below figure shows the benefits of Class I C0G and U2J dielectrics compared to Class II X7R.
Figure 2: Key Characteristics Comparison Between Class II X7R and Class I C0G/U2J
In many WPT applications, the capacitance, AC voltage, and AC current requirements are beyond what a single capacitor can provide. Therefore, it is common to have a series/parallel combination of MLCCs to achieve the application requirements. For example, adding MLCCs in parallel will increase the overall capacitance and AC current handling capability. Adding MLCCs in series will decrease the overall capacitance and increase the AC voltage capability. And using a series/parallel combination can provide an overall capacitor solution capable of handling very high-power levels. KEMET offers tools to help designers optimize the number of MLCCs in parallel and series to meet application requirements.
Let’s look at an example design. For this design, we will be designing the capacitor selection for a WPT resonant circuit for an electric vehicle charging system.
For this system, we will need to select the appropriate KEMET capacitor for a WPT system defined as follows:
Although this application is strictly using AC voltage, MLCCs do not have an AC voltage rating. Therefore, we must determine the minimum MLCC DC voltage rating required for the application. To determine the minimum DC voltage rating needed for the capacitor, there are two rules that both must be satisfied:
Rule #1 is that the DC rating of the capacitor must be larger than the peak AC voltage plus the DC voltage in the application. Basically, the peak voltage can never exceed the rated voltage of the MLCC.
Rule # 1
The peak AC voltage (Vp) can be calculated using the equation below.
Back to Rule #1:
495 + 0 = 495
So to satisfy Rule #1, the DC rated voltage must be greater than 495V
Rule #2 is that the peak AC voltage (Vp) must be less than half the rated DC voltage. You can also convert this to RMS and say that the AC RMS voltage must be less than the MLCC rated voltage divided by two times square root two.
Rule #2
We can use the peak voltage of the AC waveform to calculate the minimum DC rating of the capacitor network:
So, to satisfy Rule #2, the DC rated voltage of the capacitor network must be greater than 990V.
By looking at both Rule #1 and Rule #2, we see that the capacitor network rated voltage must be greater than 990V (which is the greater of the two rules).
Now that we know the required capacitance (66nF) and DC voltage rating (> 990V) for our WPT resonant circuit application, we need to find a suitable capacitor. KEMET’s KC-LINK capacitors are ideal for resonant applications, so let’s look at their offerings. The following table is from the KC-LINK datasheet, found here.
Figure 3: KEMET’s KC-LINK Waterfall Component Selection Table
While KEMET’s KC-LINK capacitors are ideal for resonant applications, there are no 66nF capacitors available rated for > 990V. However, there are two options for 33nF capacitors rated at 1000VDC, as shown in the table, in package case sizes 2220 and 3640.
Now that two possible capacitors have been identified, we must determine the ripple current capability of each to see if either will work in our application. Using KEMET’s free online circuit simulator, K-SIM, we can simulate the ripple current in each device:
Figure 4: Simulations to Determine Ripple Current of Possible Capacitors
For each of the capacitors under evaluation, the ripple current is ~6.2Arms. By placing two of these capacitors in parallel, the total capacitance will be 66nF with an AC current of 12.4Arms which meets our application needs.
Two other considerations when analyzing a capacitor’s voltage and current ratings in AC applications are their operation in the voltage-limited and current-limited regions.
Figure 5: AC Voltage and Current Ratings vs Frequency
As demonstrated in the sample graph, at lower frequencies the voltage rating is the limiting factor, while at higher frequencies the current rating is the limiting factor. At a certain frequency, there is a crossover point.
In the voltage-limited region, the primary risk to MLCCs is breakdown or damage due to high AC voltages. Proper capacitor selection and derating for the operating environments and conditions are important to ensure reliable operation in this region.
In the current-limited region, the primary risk to MLCCs is breakdown or damage due to self-heating due to i2R losses. Every real-life capacitor has an equivalent series resistance (ESR) and as frequencies and/or capacitance increases for the same AC voltage, the AC current increases through the capacitor. For this reason, it is again critical to select capacitors with low ESR and derated them properly for the application
KEMET offers a patented technology called KONNEKT that allows two, three, or four ceramic capacitors to be stacked vertically without using any metal strips on the sides. This technology utilizes a transient liquid phase sintering process (TLPS) and can be mounted using traditional reflow processes.
Figure 6: KONNEKT Technology for Stacked SMD Capacitors
Stacking ceramic capacitors on top of each other is a way to solve the problem of tight spaces. Because of the increasing miniaturization of electronic devices and the requirements for smaller electronic components with more capabilities, higher ratings, and robust reliability, a smaller footprint on a circuit board is critical. Traditionally, components are stacked on top of each other to conserve space and to hold them in place, using metal beds – or lead frames. However, lead frames are costly and introduce power loss. KEMET KONNEKT technology creates a low loss, low inductance package capable of handling high temperatures and high power while taking up a very small footprint on the board.
For wireless power transfer (WPT) resonant circuits, KEMET’s KC-LINK capacitors, stacked together with their patented KONNEKT technology, offer an ideal solution. WPT resonant circuits used to power and charge electric vehicles are likely to become more common, and more advanced and improved solutions are on their way. KEMET technologies will be there every step of the way. | https://www.kemet.com/en/us/technical-resources/using-mlccs-in-wireless-power-transfer-resonant-circuits.html |
Caledonian Landscapes provides a range of services to ensure all outdoor design requirements are met.
The following three services are charged at an hourly rate with quotations provided for planning and construction by networked professionals, suppliers and tradespeople.
The comprehensive design services offered by Caledonian Landscapes are as follows:
1. Site Consultation
For client & designer to meet, discuss the desired project outcomes and assess the site with this in mind. Direct feedback is provided to the client, as well as notes recorded on a scaled site plan (if available) and photographs taken from all angles to build a comprehensive portfolio of the existing site. A 'Landscape Design Brief' is developed with a quote for a landscape plan (if requested) and returned to the client as the basis for further design development.
2. Landscape Concept Plan
A Concept Plan allows the client and designer to meet minds. This plan, drawn to scale provides a proposed layout with access in and around the site, functional areas accommodated, schematic planting, structures and suggested materials based on the information collected during the Site Consultation. One revision of the initial Concept Plan is included in this stage of planning. Further revisions are charged at an hourly rate. | https://www.caledonianlandscapes.com.au/services/ |
Andrew Lloyd Webber, Baron Lloyd-Webber (born 22 March 1948) is an English composer and impresario of musical theatre. Several of his musicals have run for more than a decade both in the West End and on Broadway. He has composed 13 musicals, a song cycle, a set of variations, two film scores, and a Latin Requiem Mass. | https://www.lyreka.com/artist/andrew-lloyd-webber/ |
After an initial career and education as a graphic artist, Nancy realized her true ambition was to be an interior designer. “As a teenager, my mom always let me decorate my own room, and later, I was frequently asked for my decorating advice.” she remembers.
Her interest in décor never abated, and in 1995 she decided to switch occupations, follow her dream, and open her own decorating studio. At the same time, she enrolled in St. Louis Community College-Meramec to pursue a degree in interior design, which she completed while getting her business started. “Getting the degree was important to me,” she says.
“Most of my design business was for clients who preferred traditional décor. However, currently the most requested style is ‘transitional,’” she says, explaining that the younger generation’s preference for clean lines and a simpler style has influenced a change in St. Louis.
“I have no difficulty adapting to the design style of any client, whether it be traditional, contemporary or any preference in between. It is important I understand what people want in their homes so it can reflect their taste,” she says.
Nancy describes her own home décor as “eclectic with a mix of old and new,” with a preference for patterns, pictures and colors that reflect nature.
For example, under the vintage breakfast table the rug displays a pattern of tree branches. On the wall are framed prints of eggs, certainly appropriate for the breakfast table. A 4 x 6 painting in the living room is of a dandelion. Pillows, curtains, and a blanket in the master bedroom have a contemporary floral pattern, as does her formal chinaware.
Colors are also earthy. The dining and living room walls are “pumpkin pie orange”, and the guest bedroom is “sea glass green.”
Several vintage pieces are from family. A buffet in the dining room belonged to her grandmother, while the dining room table and chairs belonged to her parents. A vanity once belonged to a great aunt, and dates to 1901.
An heirloom from an unknown family is a painted and distressed work table in the master bedroom purchased at a farm auction.
Eclectic décor includes old wooden shutters flanking the guest bedroom bed, an ornate carved wooden balustrade repurposed as an accent table capable of holding one glass of wine, and a straw lamp shade that resembles a modern interpretation of a top hat. Two window cornices have been put to new use as display shelves in the living room.
A collection of Majolica plates, all incorporating some element of nature into their design, is displayed in the living room, dining room, breakfast room, family room and guest bathroom.
Nancy’s affinity for nature extends outside to her mailbox. In the summer it is decorated with a cover of flowers and a hummingbird. In the winter she changes the scene to Cardinals against a background of snow.
Instead of remodeling a room all at once, Nancy has redone the kitchen and master bath in stages over several years. Separate projects in the kitchen include refinishing the cabinets and installing new countertops and appliances. A tile backsplash with a band of mosaic under the kitchen window were added when the countertop was replaced.
In the master bathroom a curved hanging vanity was added and is lit from below. When the prior vanity was removed, it was discovered the area was not finished, so a pattern of tile matching the curve of the vanity was added on the floor below.
“This is by far the longest I have stayed in one house,” Nancy says. “Previously I lived in several homes, but none more than eight years, but I have been here since 2003. “I personally am a ‘homebody,’ and I decorated the way I enjoy living. It is wonderfully comfortable for me.”
St. Louis Post-Dispatch Feature
The 5-10-20 Home section featured the second home I designed for my client in Ladue. She tells me what she likes, “the color sea glass green and nature”, and I go from there. Since the furnishings in the Chesterfield house I designed for her were only 2 years old, I repurposed it all and added some new items to fill this larger house. We even replaced and moved one light fixture that she particularly liked.
Her new house was built in 1954 and needed some updating. She thought the dark family room looked like “the inside of a Taco Bell” with its many beams and faux painting on the walls and fireplace. And, she requested removing the wall between the dining room and kitchen to create a more casual flow. All interior rooms were to be painted.
The family room was gutted to remove most of the beams and add more ambient lighting, insulation, and new drywall. The fireplace was refaced with marble. She did not care for the brick floor, but I convinced her that it added some character and we covered most of it with a new hand-knotted rug. Her existing family room slipcovered furniture fit nicely and new tables were added. This is now one of her favorite spaces!
In the dining room, the triple window needed replacing and I suggested a sliding door since the only access to the pool was through the kitchen. The wall was opened into the kitchen and a new sliced agate chandelier makes a bold statement. Her existing dining room furniture was used with the addition of a larger table and 2 additional chairs. The previous family room rug fit nicely in this room. She loves the flow between dining room, kitchen and her newly landscaped backyard.
There were no major structural changes to the living room but the built-in shelving was reworked and grasscloth wallcovering added to the back wall. A treasured elk painting set the color scheme along with a new hand-knotted rug. Her family’s antique butler’s tables fit perfectly on either side of the fireplace. New chairs were added to her previous furniture and the favorite light fixture found its place in this room.
This home won a design award for the family room. However, the best reward is that my client, a frequent entertainer and host of many charity events, refers to her residence as “her Eden.”
Lower Level Retreat for Two
BEFORE – LOWER LEVEL AFTER – LOWER LEVEL WITH FIREPLACE
Three years after moving to their custom-built home, this Chesterfield couple was ready to complete their lower level and called Beautiful Rooms for assistance. Currently, the space was only being used as a large workout room. They had specific requests for new flooring, a direct-vent gas fireplace, seating, dry bar, workout area and full bathroom. The existing space had finished walls and a rough-in bath with sheet vinyl flooring throughout. Since they did all their entertaining upstairs, the new space was to be a private retreat for the two of them. They requested clean lines with neutrals accented by bright colors and wanted the lower level to reflect the same modern look as the main floor.
After deciding to work with our recommended contractor, they approved our floor plan which created a separate room for the workout equipment. That room would be accessed by a pair of French doors with a matching pair going into the unfinished area. On one end, there were 2 large windows and a sliding door so the fireplace was located on the blank exterior wall at the other end. This left the space by the windows for a counter height table and a small lounge area. Our first selections were wood-look LVP (luxury vinyl plank) for the flooring and an area rug with bright colors, to set the color scheme. After approval on the fireplace wall design, a textured Carrara marble tile was chosen for the face with striped wallcovering behind the custom shelving.
In front of the fireplace, a Sputnik light fixture was positioned between two recliners. They did not want to over-furnish the lounge area to keep a wide walkway between the dry bar on the other side. Repeating bright colors in the upholstery pieces gave them presence and floating cabinetry for the dry bar and bath vanity increased the feeling of spaciousness.
The bathroom was finished with chrome plumbing fixtures and a crystal light fixture. In the large shower, rectangular tile was installed vertically featuring a mosaic stripe of stone, glass and metal.
Since the new lower level provides many comforts, they are spending lots of time down there!
This lower level was a finalist in the 2020 Architect & Designer Awards! | http://beautifulrooms.design/index.php/blog/ |
FINANCE Minister Moeketsi Majoro yesterday signed two loan agreements worth US$128 million (about M1, 89 billion) for a lowlands water project and an agricultural project in Maseru.
The funds are from the World Bank and the government of Japan, who were represented at the ceremony.
Part of the funding (US$78 million) is for the second phase of Lesotho’s Lowlands Water Development Project (LLWDP II) which is meant to improve living standards and address water challenges for domestic and industrial use in Maputsoe and Hlotse.
Surrounding areas such as Ha-Setene, Sebothoane, Ha-Lesiamo, Khanyane, Tsikoane, St Monica’s and Mpharane will also benefit from the project.
It includes civil and ancillary works for the provision of water facilities. The project will construct a raw water intake on Hlotse River, construct a water treatment plant with the capacity of 25 million litres per day, construct a water pipe to transfer raw water to the treatment plant, construct a water transmission pipeline for treated water from Hlotse to Maputsoe, construct a water pumping station and a pipeline for pumping water into the water reservoirs in Maputsoe and Hlotse. The project will also construct the distribution network across Maputsoe and Hlotse.
The second funding of US$50 million from the World Bank is for the second phase of the Smallholder Agriculture Development Project (SADP II), which aims to improve and increase agricultural productivity in smallholder agriculture sector.
The project will help Lesotho increase the adoption of climate smart agricultural technologies and enhance the commercialisation of agriculture. It will also strengthen market linkage development and market orientated faming with aim of creating sustainable market systems for agriculture products in the country.
A further M28, 9 million grant was extended by the government of Japan towards the improvement of agricultural productivity, commercialisation and nutrition.
The grant, extended under the Policy and Human Resources Development Fund, will also enable famers to capitalise on the availability of irrigation and training in climate smart agricultural technologies for on the ground productive and sustainable investments.
Speaking at the signing ceremony, Dr Majoro said the signing would facilitate the implementation of the project.
“This water funding we are signing for today is going to supplement the earlier funding that was extended by the European Union through the European Investment Bank (EIB),” Dr Majoro said.
For her part, World Bank country representative Janet Entwistle said the project would support Lesotho’s economic development as water is a key driver.
“These two projects will encourage economic growth and promote job creation by improving productivity in the agricultural sector and increasing water supply for economic activities and household use,” Ms Entwistle said.
They will also lead to improved nutrition among Basotho. I would like to congratulate and thank the government of Lesotho as well as the development partners, the European Union, the International Fund for Agricultural Development and the Japanese Policy and Human Resource Development Fund, for the work that went into preparing these beneficial projects. We look forward to great collaboration in implementation,” she added.
Also present at the signing ceremony were Water minister, Samonyane Ntsekele, Agriculture minister Mahala Molapo and EU ambassador Christian Manahl.
Part of the funding towards the water project is financed by the EU through the European Investment Bank (EIB) loan amounting to €41 million (about M615 million) while €41 million (about M615 million) is an EU grant. | https://lestimes.com/lesotho-signs-m1-89-billion-loan-agreements/ |
^ Mangano, Kelsey M.; Sahni, Shivani; Kiel, Douglas P.; Tucker, Katherine L.; Dufour, Alyssa B.; Hannan, Marian T. (February 8, 2017). "Dietary protein is associated with musculoskeletal health independently of dietary pattern: the Framingham Third Generation Study". The American Journal of Clinical Nutrition. 105 (3): 714–722. doi:10.3945/ajcn.116.136762. PMC 5320406. PMID 28179224 – via ajcn.nutrition.org.
The motor proteins actin and myosin generate the forces exerted by contracting muscles. Current recommendations suggest that bodybuilders should consume 25–30% of protein per total calorie intake to further their goal of maintaining and improving their body composition. This is a widely debated topic, with many arguing that 1 gram of protein per pound of body weight per day is ideal, some suggesting that less is sufficient, while others recommending 1.5, 2, or more. It is believed that protein needs to be consumed frequently throughout the day, especially during/after a workout, and before sleep. There is also some debate concerning the best type of protein to take. Chicken, turkey, beef, pork, fish, eggs and dairy foods are high in protein, as are some nuts, seeds, beans, and lentils. Casein or whey are often used to supplement the diet with additional protein. Whey protein is the type of protein contained in many popular brands of protein supplements and is preferred by many bodybuilders because of its high Biological Value (BV) and quick absorption rates. Whey protein also has a bigger effect than casein on insulin levels, triggering about double the amount of insulin release. That effect is somewhat overcome by combining casein and whey. Bodybuilders are usually thought to require protein with a higher BV than that of soy, which is additionally avoided due to its claimed estrogenic properties. Still, some nutrition experts believe that soy, flax seeds and many other plants that contain the weak estrogen-like compounds or phytoestrogens, can be used beneficially, as phytoestrogens compete with estrogens for receptor sites in the male body and can block its actions. This can also include some inhibition of pituitary functions while stimulating the P450 system (the system that eliminates hormones, drugs and metabolic waste product from the body) in the liver to more actively process and excrete excess estrogen. Cortisol decreases amino acid uptake by muscle, and inhibits protein synthesis.
In contrast to strongman or powerlifting competitions, where physical strength is paramount, or to Olympic weightlifting, where the main point is equally split between strength and technique, bodybuilding competitions typically emphasize condition, size, and symmetry. Different organizations emphasize particular aspects of competition, and sometimes have different categories in which to compete.
Many non-competitive bodybuilders choose not to adopt this conventional strategy, as it often results in significant unwanted fat gain during the "bulking" phase. The attempt to increase muscle mass in one's body without any gain in fat is called clean bulking. Competitive bodybuilders focus their efforts to achieve a peak appearance during a brief "competition season". Clean bulking takes longer and is a more refined approach to achieving the body fat and muscle mass percentage a person is looking for. A common tactic for keeping fat low and muscle mass high would be to have higher calorie and lower calorie days to maintain a balance between gain and loss. Many clean bulk diets start off with a moderate amount of carbs, moderate amount of protein, and a decently low amount of fats. "Gaining lean muscle means going for leaner cuts of meat, like flank steaks and fillets, chicken, and, of course, fish," says White[who?]. "Enjoy your meat with some starch: rice, beans, quinoa, whole-grain couscous, or sweet potato, for example". To maintain a clean bulk it is important to reach calorie goals every day. Macronutrient goals will be different for each person, but, it is ideal to get as close as possible.
Carbohydrates play an important role for bodybuilders. They give the body energy to deal with the rigors of training and recovery. Carbohydrates also promote secretion of insulin, a hormone enabling cells to get the glucose they need. Insulin also carries amino acids into cells and promotes protein synthesis. Insulin has steroid-like effects in terms of muscle gains. It is impossible to promote protein synthesis without the existence of insulin, which means that without ingesting carbohydrates or protein—which also induces the release of insulin—it is impossible to add muscle mass. Bodybuilders seek out low-glycemic polysaccharides and other slowly digesting carbohydrates, which release energy in a more stable fashion than high-glycemic sugars and starches. This is important as high-glycemic carbohydrates cause a sharp insulin response, which places the body in a state where it is likely to store additional food energy as fat. However, bodybuilders frequently do ingest some quickly digesting sugars (often in form of pure dextrose or maltodextrin) just before, during, and/or just after a workout. This may help to replenish glycogen stored within the muscle, and to stimulate muscle protein synthesis.
^ Burd, Nicholas A.; Yang, Yifan; Moore, Daniel R.; Tang, Jason E.; Tarnopolsky, Mark A.; Phillips, Stuart M. (2012). "Greater stimulation of myofibrillar protein synthesis with ingestion of whey protein isolate v. Micellar casein at rest and after resistance exercise in elderly men". British Journal of Nutrition. 108 (6): 958–62. doi:10.1017/S0007114511006271. PMID 22289570.
Many trainees like to cycle between the two methods in order to prevent the body from adapting (maintaining a progressive overload), possibly emphasizing whichever method more suits their goals; typically, a bodybuilder will aim at sarcoplasmic hypertrophy most of the time but may change to a myofibrillar hypertrophy kind of training temporarily in order to move past a plateau. However, no real evidence has been provided to show that trainees ever reach this plateau, and rather was more of a hype created from "muscular confusion".[clarification needed]
Sandow was so successful at flexing and posing his physique that he later created several businesses around his fame, and was among the first to market products branded with his name. He was credited with inventing and selling the first exercise equipment for the masses: machined dumbbells, spring pulleys, and tension bands. Even his image was sold by the thousands in "cabinet cards" and other prints. Sandow was a perfect "Gracilian", a standard of ideal body proportions close to those of ancient Greek and Roman statues. Men's physiques were then judged by how closely they matched these proportions. | http://www.healthqwest.org/how-to-diet-to-gain-muscle.html |
Some difficulties faced by students in writing a literary essay are the abilities to find the appropriate topics for the essay, develop the content paragraph structure and length in writing, and achieve cohesion and coherence. This research aims at implementing mind-mapping technique in writing a literary essay. The subjects of this research were the third semester students of English Literature Study Program at Sultan Agung Islamic University in Semarang. Observation and documentation were used to collect data in which the coherence and cohesion were analyzed. The findings show that mind-mapping technique gives significant impact to students’ abilities in writing a literary essay.
Downloads
Published
2019-08-27
How to Cite
Murtiningrum, A. (2019). PENERAPAN TEKNIK MIND MAPPING DALAM PENGAJARAN PENULISAN ESAI SASTRA BERBAHASA INGGRIS. Dinamika Bahasa Dan Budaya, 14(2), 1-12. Retrieved from https://www.unisbank.ac.id/ojs/index.php/fbib1/article/view/7478
Section
Articles
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access). | https://www.unisbank.ac.id/ojs/index.php/fbib1/article/view/7478 |
Please contact the security team at [email protected] for questions not covered in the documentation.
Network Security at Clusters¶
The customer is responsible for providing network security for their on-prem datacenters where the clusters may be provisioned. In a public cloud environments, the cluster is expected to sit behind a customer's primary firewall. For example, in an Amazon AWS deployment, it is assumed that the customer will configure Security Groups.
Cluster Authentication¶
Every managed cluster is issued a unique identity (certificate) by the Controller. The Kubernetes Management Operator uses this to establish a control channel with the Controller. These credentials are automatically rotated behind the scenes by the controller before they expire. The controller requires the use of mutual certificate based authentication to establish the secure TLS connection. Only the Kubernetes Management Operator deployed on managed clusters are able to establish secure connections with the controller using unique client credentials.
The sequence diagram below shows the high level steps by which the Rafay Kubernetes operator installed on a managed cluster is provided with a unique identity (certificate) for mutual authentication.
sequenceDiagram Controller->>Cluster: Provision/Import Cluster (unique token) Cluster-->> Rafay Operator: Start Rafay Operator Note right of Rafay Operator: Generate CSR (with unique token) Rafay Operator-->>Controller: Send CSR Note left of Controller: Verify token and Sign CSR Controller->> Rafay Operator: Send Signed Certificate rect rgb(191, 223, 255) Rafay Operator->>+Controller: Establish long running mTLS connection Note left of Controller: Only accept connections with valid client certificate Controller->>-Rafay Operator: Uses secure connection for cluster operations end
User Authentication and Authorization¶
All non SSO users in an Org are required to verify access to their registered email address before they are allowed access. Org admins can optionally enable and enforce the use of MFA for all users in their organization. See Users and Roles for additional details. Customers are recommended to whitelist "[email protected]" in their email platform to ensure that emails sent to users are not inadvertently classified as spam or blocked.
VPN and Zero Trust KubeCTL¶
Authorized end users do not require a VPN to securely access their clusters operating behind corporate firewalls using Zero Trust KubeCTL.
However, if a VPN is configured or in use, please ensure that "*.user.kubeapi-proxy.rafay.dev" FQDN is whitelisted in the proxy configuration.
Zero Trust KubeCTL uses mutual authentication to secure the connection from the end user to the KubeCTL access proxy in the controller. Man-in-the-middle proxies that terminate the connection will break the security model and users will see an error message from the KubeCTL CLI.
Unable to connect to the server: x509: certificate signed by unknown authority
Audit Logs¶
All actions performed by authorized users are audited. A reverse chronological audit log is available for users via the Console.
Role based Access Control (RBAC)¶
The Controller supports a number of roles that can be associated with users. See roles for additional details.
Key Management¶
The Controller utilizes a central vault (based on a HSM backed KMS) for managing secrets across the entire infrastructure. Secrets are programmed into local cluster secret stores from the central vault when necessary.
Data Encryption¶
The disks are encrypted per-Org with a unique key for the organization. See key management above for additional information.
Transport Encryption¶
All communication channels between the Managed Clusters and the Controller are done over TLS. A private PKI is utilized to generate certificates for inter component mTLS. All customer and partner facing API and Web Console utilize TLS as well.
Security White Paper¶
Upon request, we can provide you with a comprehensive "Security Technical White Paper". Please contact [email protected] for details. | https://docs.rafay.co/security/overview/ |
There is no question that as you get older, you start to notice changes in your metabolism, but in what point of life do these changes actually occur? For a long time, metabolism (total energy expenditure) has been assumed to correlate with organ-specific needs with respect to growth and development. In other words, metabolic activity would be higher in young people (infants, children, and adolescents), declines throughout adulthood, and be lowest in older age. However, research is beginning to show us that this assumption isn’t entirely correct, and unfortunately the extra weight gain that many of us see throughout middle adulthood (especially around the holidays) can no longer be blamed on so-called “slower metabolism” than that of your adolescent years.
Research conducted by Pontzer and colleagues explored metabolism and aging by studying over 6,400 people across 29 different countries and evaluated total daily energy expenditure. Study participants ranged from eight days to 95 years old. To control for body size differences (fat-free mass) between subjects of different age/sex, researchers used a variety of mathematical models to generate size-adjusted energy expenditure values for individuals based on their age groups. Interestingly, their data showed that there are four major stages where energy metabolism is different: the neonatal period (1-12 months), childhood and adolescence (1-20 years), adulthood (20-60 years) and older adulthood (over 60 years old).
Their results showed that throughout the first month of life the neonatal group had energy expenditure values that were very similar to that of adults, however these values rapidly increase over the next 11 months and are highest in life around 8-9 months. Interestingly, energy expenditure values steadily decline throughout childhood and adolescence long before growth and development have finished, and eventually plateau around 20 years of age. Contrary to our previous assumptions, average energy expenditures stabilize just as we enter adulthood (20-60 years old), and only begin to decline in older adulthood around the age of 70-75 years old.
The timelines in which metabolic expenditures are highest is much earlier than previously thought, and researchers have attributed these to the rapid growth phase that is required during infancy to support survival. The reduced metabolic demand likely reflects organ-level metabolic decline, with most changes occurring in the childhood and adolescent years rather than adulthood. These findings provide healthcare workers and researchers with a tool to better deliver healthcare, such as an improved understanding of fluctuations in therapeutic efficacies, wound healing, and the disease kinetics associated with age. As research continues in this field, our ability to treat disease will undoubtedly improve, along with our capability to provide the highest level of healthcare. | https://blogs.dal.ca/openthink/metabolism-and-aging-new-insights/ |
One of the HHS cybersecurity best practices recommends that organizations implement network management processes to improve data security. Network security in healthcare is more important than ever. Healthcare organizations are vulnerable to hacking incidents when they fail to implement network security practices.
What is Network Management?
Network management is the process of securing and maintaining a network by implementing security practices. Healthcare network management requires organizations to implement measures that meet HIPAA requirements. These measures must ensure electronic protected health information (ePHI) security.
To protect ePHI, healthcare network security requires that administrative, physical, and technical safeguards be implemented.
When referring to network management, safeguards include:
Administrative
Network management allows organizations to implement administrative safeguards in the form of user authentication and audit controls.
- User authentication: healthcare organizations must be able to track user access to their network. To accomplish this, it is essential to provide each user with a unique user ID to access your organization’s network. A network setting known as “Wifi Protected Access 2 (WPA2)-Enterprise” can be used to set this up. WPA2-Enterprise is the easiest and most secure method to manage user access.
- Audit controls: allow organizations to monitor user activity on their network. Monitoring ePHI access is required by HIPAA to ensure that it is not accessed inappropriately or excessively. Through audit controls, administrators can easily monitor suspicious activity on a network, such as a user accessing a network from a suspicious location or multiple failed login attempts by an individual user. | https://compliancy-group.com/healthcare-network-security/ |
The present invention is a continuation of PCT/SE2004/000494, filed Mar. 31, 2004, which claims priority to SE 0301123-6, filed Apr. 16, 2003, both of which are hereby incorporated by reference.
The present invention relates to a working machine, comprising an engine compartment, an engine hood, an internal combustion engine arranged in the engine compartment and an exhaust system which extends from the engine out of the engine compartment via the engine hood, the exhaust system being provided with an air intake for admitting air from the engine compartment into the exhaust system and entraining the air together with the exhaust gases.
The invention also relates to a method of ventilating the engine compartment of such a working machine.
The term working machine must be regarded as signifying and includes both stationary machines and vehicles. It relates in particular to machines with substantially closed engine compartment in which the temperature can be very high and in which there is a need for ventilation of the engine compartment. Even in vehicles in which the air stream sometimes functions as a ventilator, there will be times, when the vehicle is working but is moving slowly or is stationary, where further ventilation is desirable.
The invention will be described taking a wheel loader as an example of the working machine.
Usually, in conventional wheel loaders, the engine compartment is substantially closed and high operating temperatures therefore occur in the engine compartment.
The prior art solves this problem by providing a combined air and exhaust pipe. This exhaust pipe, which defines a tailpipe of the exhaust system, extends out of the engine compartment from an opening in the engine hood. That is to say, one end of this tailpipe opens into the engine compartment, whilst the other end opens into the atmosphere. An exhaust pipe of the exhaust system extends from the engine compartment into the center of the tailpipe in order to carry the exhaust gases into the tailpipe and via this out into the atmosphere. The outer circumference of the exhaust pipe is smaller than the inner circumference of the tailpipe, so that an annular gap is formed between these pipes. Air from the engine compartment can be led out in this annular gap.
The exhaust pipe opens inside the tailpipe, which in turn means that as they flow the exhaust gases expand to a greater volume, with the result that a certain ejector effect occurs in the area where the exhaust gases flow out of the exhaust pipe and into the tailpipe. The ejector effect or ejector action will contribute and lead to the air in the surrounding, annular gap being entrained by the exhaust gases out through the tailpipe into the surrounding atmosphere.
It is desirable to provide a method and a working machine which will produce more efficient ventilation of an engine compartment than the prior art.
It is desirable to provide such a method and working machine wherein the principle of utilizing the ejector effect to ventilate air out of the engine compartment is used to better effect in comparison to the prior art. An aspect of the present invention proposes a method and a working machine, which in its practical application takes up relatively little space inside the engine compartment and which provides a robust and reliable solution to the problem of ventilating closed or at least substantially closed engine compartments.
According to an aspect of the invention, in a method, air is led in essentially centrally into an outlet duct and the exhaust gases are led into an outlet duct outside, that is to say radially outside, around the air, in such a way that the air is entrained out of the engine compartment by the exhaust gases through an ejector effect that is produced by the exhaust gases.
Leading the air in centrally into an outlet duct, preferably formed by a tailpipe projecting from the engine hood, instead of leading the air into an annular gap surrounding the exhaust pipe, from which the exhaust gases are introduced into the outlet duct, as in the prior art, gives a stronger ejector effect. Compared to the prior art, a larger quantity of air can thereby by entrained by a given quantity of exhaust gases.
According to a preferred embodiment of the invention the air is led into the outlet duct in proximity to an extremely hot and/or temperature-sensitive location in the engine compartment, preferably directly opposite a turbo unit or engine manifold. That is to say air is drawn from a location in the engine compartment where the need for ventilation is greatest.
According to a further aspect of the invention, in a working machine, the air intake comprises an air baffle element which leads the air into an essentially central area in an outlet duct in which the exhaust gases are led out, in such a way that the air is entrained out of the engine compartment by the exhaust gases through an ejector effect which the exhaust gases exert on the air.
According to a preferred embodiment of the invention the air baffle element comprises a pipe which extends into and essentially coaxially with the outlet duct. The term pipe must be regarded as signifying and also includes very short pipes or conduits. The pipe may have a varying wall thickness and also a varying inner and outer radius over its length.
The air baffle element preferably forms an air baffle duct, the cross-section of which diminishes toward the point where it opens into the outlet duct. That is to say, the air baffle element is funnel-shaped. In this way air can be effectively entrained and led into the outlet duct.
The arrangement advantageously comprises means of directing the exhaust gases along an annular gap in the part of the outlet duct where the air baffle element introduces the air. The function of these means, in other words, is to direct the exhaust gases so that these flow in a gap in the outlet duct which precedes a part of the outlet duct where they are permitted to expand to a larger volume together with the air from the air baffle element. The gap should be situated radially outside the air baffle element. In this case the gap need not be continuous in a circumferential direction, although this is preferable. Its cross-sectional area, or flow area, should be so great that it does not generate a resistance to the exhaust gas flow large enough to risk choking the engine. However, its area should not be too large, since this would result in too low an exhaust gas speed and insufficient ejector effect when the gases are permitted to expand in the outlet duct. The outlet duct has a cross-sectional area which is significantly larger than the cross-sectional area of the gap, and which is preferably equal to the sum of the mouth area of the air baffle duct and the gap area.
The means of directing the exhaust gases along an annular gap preferably comprise the outer periphery of the air baffle element.
The outlet duct in which the air baffle element extends is then defined by a wall, which has an inner periphery extending at a constant distance from the outer periphery of the air baffle element in the area where the wall and the air baffle element overlap one another. Air and exhaust gases thereby flow in a parallel direction into the common outlet duct. The air baffle element extends far enough from its engine compartment orifice to avoid a backflow of air (and exhaust gases) into the engine compartment via the air baffle duct of the air baffle element. The flow directions of the exhaust gases and the air as they enter the common part of the outlet duct are also designed to prevent such backflow.
According to a preferred embodiment of the invention the exhaust system comprises a chamber into which the exhaust gases are led via an exhaust pipe connected thereto and into which the air baffle element projects from one direction and from which the outlet duct, into which the air baffle element opens, leads out in an opposite direction. The chamber acts as a collecting chamber, in which the exhaust gases are collected and distributed all around the air baffle element, which projects through the chamber and into the outlet duct.
FIG. 1
1
shows a working machine which typically is a conventional wheel loader, but might be any working machine which has a substantially closed engine compartment with a need for active ventilation during operation.
1
2
3
4
2
1
5
3
5
6
7
8
4
9
6
3
7
8
The working machine comprises an engine compartment , an internal combustion engine arranged in the engine compartment, and an engine hood or casing , which separates the engine compartment from the surrounding atmosphere. The working machine further comprises an exhaust system , via which exhaust gases are led from the engine to the atmosphere. The exhaust system comprises an exhaust pipe and a silencer , together with a tailpipe , which extends outwards from the engine hood and forms an outlet duct . The exhaust pipe extends from the engine via the silencer up to the tailpipe .
6
10
11
12
13
8
10
12
13
14
15
10
8
16
10
9
8
15
16
8
15
16
6
16
16
16
9
16
5
6
7
16
15
The exhaust pipe opens into a chamber , which is formed by an essentially cylindrical side wall , an annular end wall which is connected to the tailpipe, and a second end wall situated opposite the end wall. The tailpipe extends down into the chamber through the first end wall . The opposite end wall has an opening , from which a pipe- and funnel-shaped air baffle element extends upward through the chamber far enough to overlap and to extend radially inside a part of the tailpipe . A gap , through which the exhaust gases are led from the chamber into the outlet duct , exists between the tailpipe and the air baffle element . The gap preferably has a largely constant width over the entire overlap length, or at least over a greater part of any overlap length that exists between tailpipe and air baffle element . The gap is so narrow that a pressure build-up, and preferably also an acceleration of the rate of flow of the exhaust gases occurs therein. Its entire cross-sectional area is preferably less than the cross-sectional area of the duct in the line or the pipe , which carries the exhaust gases to the gap . The cross-sectional area of the gap should be as narrow as the engine will allow, without the exhaust gas flow therefrom being restricted to such an extent that it interferes with engine operation. Optimum ejector effect is thereby also achieved in the area where the gap opens into the outlet duct . The width (area) of the gap is determined by the exhaust gas pressure which the engine imparts and the back-pressure generated by other components of the exhaust system , that is to say pipelines and silencer . The length of the gap naturally also affects the back-pressure generated. With the design construction described here, the gap width therefore also depends on the length of the air baffle duct of the air baffle element that is required in order to prevent the air being forced back into the engine compartment.
15
13
10
15
13
13
The air baffle element is formed in that a wall in the shape of a funnel or truncated cone extends from the second end wall into the chamber . The air baffle element is preferably integrally formed with the adjoining end wall and is detachable either by itself or together with the end wall . In this way one and the same chamber wall construction can be used for different engines, the single difference being that differently shaped air baffle elements (different with regard to length and width, for example) are coupled to the rest of the chamber wall construction depending on the quantity of exhaust gas from the engine and the flow resistance of the exhaust system in each individual case.
10
11
12
13
4
2
2
The chamber , or more specifically the walls , , forming this are arranged on the inside of the engine hood , that is to say in the engine compartment . It is advantageously arranged directly opposite, for example directly above, some particularly heat-affected or heat-sensitive component in the engine compartment . Examples of such typically heat-affected components are a manifold or a turbo unit (not shown).
FIG. 5
8
12
10
15
10
8
15
10
shows an alternative embodiment of the arrangement according to the invention, in which the tailpipe emerges from the end wall connected thereto without projecting into the chamber . In this way a more compact chamber construction is obtained. The air baffle element extends through the chamber and, as previously, into the tailpipe . In other words, the air baffle element in this case projects right through the chamber .
In the present application, the use of terms such as “including” is open-ended and is intended to have the same meaning as terms such as “comprising” and not preclude the presence of other structure, material, or acts. Similarly, though the use of terms such as “can” or “may” is intended to be open-ended and to reflect that structure, material, or acts are not necessary, the failure to use such terms is not intended to reflect that structure, material, or acts are essential. To the extent that structure, material, or acts are presently considered to be essential, they are identified as such.
It will be appreciated that a number of variants of the invention will be obvious to a person skilled in the art without departing from the scope of the invention, as defined in the claims attached, based on the description and the drawings.
10
For example, the air baffle element may obviously be of some design shape other than that described above. The chamber is preferably, but need not necessarily be arranged above some heavily heat-affected component. The inlet to the air baffle element is the part which should be arranged in proximity to such a component. The chamber may furthermore be arranged outside the engine hood, although it is preferably arranged inside the latter.
BACKGROUND AND SUMMARY
DETAILED DESCRIPTION
BRIEF DESCRIPTION OF THE DRAWINGS
Preferred examples of embodiments of the present invention will be described below by way of example, with reference to the drawings attached, in which:
FIG. 1
is a schematic partially sectional side view of a working machine according to the invention,
FIG. 2
FIG. 1
is an enlarged cross-sectional figure of a detail in ,
FIG. 3
FIG. 2
is a perspective view of the detail in ,
FIG. 4
FIG. 2
is a cross section, viewed from above, of the example of an embodiment in , and
FIG. 5
FIG. 2
is a representation corresponding to that in of an alternative example of an embodiment of the invention. | |
The forums ran from 2008-2020 and are now closed and viewable here as an archive.
Home › Forums › CSS › windows computers absolute positioning of elements appearing differently
Hello!
I have elements (the feathers) that are absolutely positioned and then moved by a percentage.
I have it working great on mac; but on chrome for windows and Internet Explorer for windows the feathers are appearing too far from the dream catcher vertically. In other words for chrome on windows and I. E. for windows the feathers need to move up.
Here is the screen shot on mac (how it should be): https://www.evernote.com/shard/s3/sh/8896daef-f8cb-4338-bb83-58d859c02778/f2948fcde2f1afdd77f7fec5ec909f9d
Here is the screen shot for windows (the feathers need to move up): https://www.evernote.com/shard/s3/sh/0c097ac1-1682-4b84-bddc-21ab090da258/822e6a458fb8a126e3c696a8bb8a12a9
Thanks so much for any help! Here is the live link to the site:
http://bit.ly/1N7LOQO
This hasn’t really much to do with the fact that it’s on Windows or Mac, but everything with the screen size.
The position of the circle (dreamcatcher?) and the feathers depend on the screen size. When you compare browser windows on both Mac and Windows and they both have the exact same size (which is not the case in your screenshots), they should show the same.
There’s also the factor of retina screens, that may add also make a little difference. | https://css-tricks.com/forums/topic/windows-computers-absolute-positioning-of-elements-appearing-differently/ |
The U.S. Department of Justice announced on January 27, 2020 that Practice Fusion, a health information technology (IT) vendor, has entered into a civil settlement and deferred prosecution agreement (DPA) worth $145 million that resolves civil investigations led by the U.S. Attorney’s Office for the District of Vermont, the U.S. Attorney’s Office for the Northern District of California, and the Civil Division’s Commercial Litigation Branch of main justice, as well as a criminal investigation led by the U.S. Attorney’s Office for the District of Vermont (collectively, the “Government”). The agreement is yet another in a series of civil False Claims Act and Anti-Kickback Statute enforcement actions involving EHR vendors. However, the criminal kickback allegations against Practice Fusion notably focus on the financial relationships between EHR vendors and pharmaceutical manufacturers rather than those with providers, and demonstrate the Government’s view of how those relationships could potentially impact a provider’s clinical decision making. The DPA and new focus on clinical decision support (CDS) alerts within EHR software products should put vendors, manufacturers, and providers alike on notice of the potential consequences if faced with aggressive enforcement in this developing area of health information technology, and the need to take proactive steps to ensure that financial arrangements involving the development of EHR capabilities reflect practices compliant with health care fraud and abuse laws.
According to the DPA and DOJ’s press release, Practice Fusion admitted that it solicited and received payments from a “major opioid company” in relation to the design of CDS alerts that were presented through Practice Fusion’s EHR to doctors who prescribe pain medication to patients. One of the key factors cited by DOJ in prosecuting Practice Fusion was the alleged role of the opioid company’s marketing department in the development of the CDS alerts and in the overall commercial as opposed to clinical nature of the arrangement as indicated by its focus on success “metrics, switches from [instant release] to [extended release], etc.”1
The CDS alerts at issue related to pain management tools for physicians and other health care providers, and encouraged health care providers to record pain scores and to follow up with a care plan for the patient if “the patient reported pain on the pain scale of four or higher twice within four months . . . .”2 When a care plan was recommended, the CDS alert populated a menu which included various treatment options, including biofeedback, education, nonopioid analgesics, physical therapy, and opioid therapy in the form of short-acting or long-acting/extended release opioids.3 But the Government took issue with the treatment options included in the menu and asserted that the treatment menu “deviated from medical guidelines,” including those promulgated by the CDC. 4 The Government also discounted the inclusion of research studies that Practice Fusion and the pharmaceutical companies did reference in developing the guidelines, and then charged that the CDS alerts were medically unsupported, relying on studies that were more favorable to its allegations.
Pursuant to the DPA, Practice Fusion will pay $25,398,300 in criminal fines and forfeit $959,700 in proceeds. Practice Fusion also agreed to pay an additional $118,642,000 to resolve allegations of civil liability under the False Claims Act “arising from the submission of false claims to federal health care programs tainted by the kickback arrangement between Practice Fusion and the opioid company”5 as well as kickback allegations related to thirteen CDS arrangements with other pharmaceutical companies, which were not detailed in the documents made available to the public. The civil settlement also resolved allegations that Practice Fusion had falsely obtained certification for its 2014 Edition EHR product under the certification program administered by the Office of the National Coordinator for Health Information Technology. On that basis, the Government concluded that Practice Fusion had knowingly caused health care providers who used certain versions of its EHR software to submit false claims to Medicare under the EHR Incentive Program when they attested that they were using Certified EHR Technology (CEHRT). In contrast to the criminal charges detailed in the DPA requiring Practice Fusion to enter into a statement of facts admitting to much of the alleged wrongful actions, the civil settlement agreement did not include any additional determination or admission of liability.
The DPA also imposes non-monetary obligations on Practice Fusion, including cooperation with ongoing investigations into other kickback schemes.6 Practice Fusion must also maintain a public website that hosts the documents related to the conduct outlined in the DPA;7 ensure compliance with data export functionality standards required for EHR certification, 2015 Edition, under the ONC Certification Program; review policies and procedures and, if necessary, implement enhanced policies and procedures to ensure patient safety; retain all versions of its code used or relied upon for testing, certification, or surveillance related to any governmental programs; and maintain a comprehensive list of software bugs on its customer portal.8 Compliance will be monitored by an independent oversight organization, and this entity is required to review all future sponsored CDS alerts before they are implemented.
The Practice Fusion settlement is novel and noteworthy for EHR vendors and health IT developers, insofar as the Government has ventured into the waters of clinical practice and decision making by scrutinizing the development and clinical application of the CDS alerts embedded in Practice Fusion’s EHR. In past enforcement actions, the Government focused mainly on technical deficiencies within EHR systems related to EHR Incentive Program certification requirements. The criminal case appears to have hinged on the pharmaceutical manufacturer’s involvement in the development and marketing of the CDS alert utilized by physicians and providers – from a commercial perspective –and with a goal of increasing prescriptions. In this regard, the Government alleged that the “proof” of the primarily commercial rather than legitimately clinical nature of the arrangement was the fact that the CDS was not consistent with CDC guidelines and applicable clinical quality measures, and that the manufacturer’s marketing department was involved. With the Practice Fusion settlement, the Government has moved beyond False Claims Act and Anti-Kickback Statute allegations premised on misrepresentations that EHR software are compliant with CEHRT standards. Now the Government is delving into whether specific elements and functionalities within the EHR create risks of overutilizing or misusing drugs, which they perceive as generating fraud and abuse to federal health care programs.
In the wake of the Practice Fusion settlement and its implications, EHR vendors and health IT developers should consider the following when entering into arrangements related to the development of EHR functionalities like CDS and in evaluating existing arrangements:
Health IT and EHR vendors that have identified financial relationships related to sponsored CDS or other functionalities should immediately reach out to their outside counsel to evaluate these arrangements and determine whether self-disclosure pathways through the HHS Office of the Inspector General's Self-Disclosure Protocol or a local U.S. Attorney’s Office are warranted to mitigate potential enforcement risk under the Anti-Kickback Statute and the FCA.
For more information on how the Practice Fusion investigation and settlement should inform your fraud and abuse and EHR certification compliance operations, please contact the professional(s) listed below, or your regular Crowell & Moring contact.
For more information, please contact the professional(s) listed below, or your regular Crowell & Moring contact.
1 See, e.g., Ex. B, Information, at ¶ 60.
2 Id. at ¶ 95.
3 Id. at ¶ 97.
4 Id. at ¶ 98.
5 DOJ Press Release, Jan. 27, 2020.
6 Deferred Prosecution Agreement, at ¶¶ 6-10.
7 DPA Sec. 9.
8 Ex. G “Additional Compliance Terms” Sec. D.
1 See, e.g., Ex. B, Information, at ¶ 60.
2 Id. at ¶ 95.
3 Id. at ¶ 97.
4 Id. at ¶ 98.
5 DOJ Press Release, Jan. 27, 2020.
6 Deferred Prosecution Agreement, at ¶¶ 6-10.
7 DPA Sec. 9.
8 Ex. G “Additional Compliance Terms” Sec. D.
Advanced Search | Government Experience
© Crowell & Moring LLP
Professionals | Experience | Locations | Insights | Pro Bono | Careers
C&M International | Crowell Health Solutions
Attorney Advertising—Prior results do not guarantee a similar outcome. | https://www.crowell.com/NewsEvents/AlertsNewsletters/all/Practice-Fusion-Settlement-Highlights-Governments-Increasing-Focus-on-Health-Information-Technology-Certification-and-Financial-Relationships-in-Enforcement-Actions |
One way that polynomials can be classified is according to the number of terms they have. The following table shows the names used for this classification.
|Name||Definition||Example|
|Monomial||A polynomial with a single term.||3x2y3|
|Binomial||A polynomial with a exactly two terms.||5xy+3x2y3|
|Trinomial||A polynomial with exactly three terms.||x3−9x+4|
polynomialis commonly used.
Remove parentheses
Remove parentheses
Distribute -1
Add and subtract terms
Zero Property of Multiplication
a+(-b)=a−b
Distribute -1
Simplify terms
Find a polynomial that represents the area of the rectangle. | https://mathleaks.com/study/adding_subtracting_and_multiplying_polynomials |
PROBLEM TO BE SOLVED: To provide a coil component with improved heat dissipation around a through conductor.
SOLUTION: In a coil component 1, since the cross-sectional areas S1 and S2 of inner ends 41b and 42b of planar coils 41 and 42 are designed to be relatively wide, heat generated in through conductors 41c and 42c is easily transmitted to the inner ends 41b and 42b. Thus, in the coil component 1, heat is efficiently transferred from the through conductors 41c and 42c to the inner ends 41b and 42b, such that high heat dissipation can be achieved around the through conductors 41c and 42c.
SELECTED DRAWING: Figure 7 | |
Reach Jammu at 4:15 Pm. . Leave for Katra .( Pls Note only Transfer on this day ) Check inn Hotel. Night Katra.
|21st March Katra – Maa Vaishnodevi – Katra
|
Full day trek to Maa Vaishnodevi & baba mandir. Night Katra. ( No vehicle)
|22nd March Katra – Dharamshala(Approx 4Hrs. Drive)
|
Morning after breakfast, depart For Dharamshala by surface approx. 170 kms. Afternoon you arrive Dharamshala and check inn at the hotel. Rest of the day at leisure. Overnight at the hotel.
|23rd March In Dharamshala
|
Morning you proceed to visit the Spiritual city of Dalai Lama. You visit the Macleodganj area covering the Dalai Lama Teple, Bhagsunath, Dal Lake, St. John’s Church & Talnoo Nadi. Afternoon you visit Kangra Art Museum, Kunal Pathri, Tea garden & War Memorial. Evening will be at your leisure. Overnight at the hotel.
|24th March Dharamshala – Amritsar
|
Today We will be transferred to Amritsar by surface approx. 202 Kms / 05 hrs. Later Afternoon Sightseeing at Wagha Border. Evening at Golden Temple.
|25th March Leave Amritsar
|
After Breakfast Sightseeing at Golden temple and Jaliwala Bagh. Transfer to airport / Railway Station at 23:15 Pm for Onwards Journey.
|
|
Package Rates are per person in INR and details as below
| Inclusions
|
|Note: Local sightseeing if Dharamshala will not be covered by a coach|
| Excludes
|
| Please Note :-
|
|Presently Available Airfare – 3,600 Per Person Extra
|
|Advance Amount – Full Advance amount Rs 97,200 require to book Train Tickets
|
Rs 50,000 Token amount for package booking
Total Amount – Rs 1,47,200
Bank Details:
State Bank of India
|Cancellation charges discussed on 18th March 2020 By email
|
Train Cancellation : 900/- * 26 = 23,400/-
Package Cancellation : 4,200/- * 21 = 88,200/-
Package Postpone ( till 30th Sep 2020 ) : 1,200/- * 21 = 25,200/-
Total Cancellation : 1,11,600/- including GST
Total Postpone Loss / If guest Take same tour in other Date : 48,600/- including GST
The Above amount of penalties are not final and we are trying to minimize them
|Terms and Conditions, CANCELLATIONS & REFUNDS
|
Terms and Conditions of Feel India Tours & Travels Pvt. Ltd. | http://www.feelindia.org/22036-medilux-laboratories-pvt-ltd/ |
How do I sneak by the guards in Evoland 2?
Evoland 2 turns into a stealth game after the first time Kuro and Fina get captured. To escape the dungeon you have to hide in the shadows and wait until the guards have turned their backs to move. After the second save point hiding in the shadows is not enough. Go to your left and examine the chest. You can now use the chest/box to hide under and sneak by the guards.
To get passed the first guards stay to the top of the shadow and move to your right until you are lined up with the door. You can slip by the stationary guard at the bottom of the screen through the door when the vertical moving guard is walking away from you.
What is the password to escape prison in Evoland 2? | https://www.iphonefaq.org/archives/976535 |
Science Fishing – Catch an Ice Cube with a Piece of String
It’s been freezing in Denver over the past week. We are surrounded with snow and ice. Here’s a little activity for the kids. Take a bowl of ice cubes and set it in front of them. Tell them you want them to go fishing for the ice cubes. Their challenge? Pick up an ice cube with a piece of string.
We all know that sprinkling a little salt on ice will melt the ice. But how does it work? Salt dissolves in water easily. The salt molecules sodium ion and a chloride ion (sodium chloride) disassociate in the water and break apart. They confuse the water molecules so they can’t freeze as easily. To start your fishing trip, start with a wet string and a little salt. Lay the string over the ice cube and sprinkle it with the salt. Wait for a few minutes while the reaction takes place. As the salt melts the ice, the string moves down into the ice a little bit. Then fresh water moves up and refreezes over the string. You can then pick up the ice cube with the string.
Think about this experiment on a larger scale – how does sodium chloride or magnesium chloride work on melting ice on the roads in winter? Watch the video for the answer. | https://www.stevespanglerscience.com/2011/01/13/science-fishing-catch-an-ice-cube-with-a-piece-of-string/ |
The invention discloses a method for selecting an expressway entrance ramp control mode in a peak period. The method comprises the following steps: detecting road conditions; collecting the traffic volume of various motor vehicles arriving at each hour in the peak period, and converting the traffic volume into a standard car traffic volume; collecting whether the path direction of the expressway is replaced by other roads or not; saturation is calculated; judging whether the upstream saturation of the expressway main line is greater than 1.0 or not; whether the traffic volume of the expressway entrance ramp is larger than 900 pcu/h, 1050 pcu/h and 1200 pcu/h or not is judged; whether the gradient of the expressway entrance ramp is smaller than 1.8% or not is judged; judging whether the expressway entrance ramp forbids goods or not and whether the expressway entrance ramp forbids buses or not; judging whether the length of the expressway entrance ramp is greater than 300 meters or not; judging whether the distance from the ramp slope starting point to the upstream intersection is greater than 110 meters or not; and judging whether the upstream saturation of the ground road is less than 0.90 or not. And the overall traffic operation level of the urban expressway system can be effectively improved. | |
Well, hello! It’s so good to be back in the kitchen! So one of the first things The Angry Chef did when we got back from the country was get to work cleaning up the grill and getting it ready for summer. While he was outside, I whipped together one of my all-time favorite burgers. I made two on the stove for us, and saved the other two for the grill the next day. My favorite thing about these burgers? With just five ingredients, they’re fast and easy to put together.
This burger may not have a ton of stuff in it (sometime I’ll post my hamburger recipe, which is kind of like a meatloaf in patty form), but with loads of fresh garlic and basil, it packs a lot of flavor.
This recipe makes 4 monstrous burgers, or 6-8 smaller ones. Make ’em as big or as little as you like. You could even form a bunch of mini patties for bite-sized sliders.
Serve them on buns with your favorite garnishes. This burger also makes a great topper to a baby spinach salad.
Basil & Garlic Pork Burgers
2 lbs. ground pork
3 cloves garlic, mashed
1/2 cup fresh basil, shredded or cut into ribbons
freshly cracked black pepper
kosher salt
a drizzle of olive oil, for frying
Makes 4 monster-sized burgers, or 6-8 smaller ones
Basil & Garlic Pork Burgers: Make the burger mixture
Put your ground pork in a large bowl.
Toss in the mashed garlic.
Cut the basil into ribbons.
Add the basil to the pork and garlic.
Sprinkle on some kosher salt, to taste.
Crack on some fresh black pepper (also to taste).
With your hands, mix the basil, garlic, salt, and pepper into the pork.
Keep going until you have a fairly uniform mixture, like this:
Basil & Garlic Pork Burgers: Form the burgers
Divide the meat into quarters (or more pieces, depending on how many burgers you’re making):
Grab one quarter in your hand.
Smoosh it together until you’ve formed it into a nice patty, like this:
Make a little indent in the center of the burger. This will help it cook a little more evenly.
Repeat with the rest of the quarters until you have four patties.
Basil & Garlic Pork Burgers: Fry the burgers
Put a little olive oil in a non-stick pan. Set the pan on the stove over medium-high heat.
Use a large enough pan so that your burgers won’t be crowded. (If the pan is crowded, the burgers will sort of steam, instead of develop a nice brown crust.)
Tip the pan a little to distribute the olive oil. After a minute or two, when the pan is hot, add your burgers to the pan.
Fry them like this for a few minutes on one side, without moving them around too much.
After a few minutes, the sides of the burgers should start to look cooked (toward the bottom).
When you see that, peek under one. If you have a nice brown crust, like this, flip them over.
Do the same thing on the other side.
When the burger is browned on the second side, flip it over. Lower the heat at this point and cook for another maybe 5 minutes. (If your burgers are thick like mine, you want them to cook through to the center without burning on the outside.)
Flip the burger one more time and cook it for about 5 minutes on the other side.
Your final cooking time will depend on how thick your burger patties are.
Basil & Garlic Pork Burgers: How to tell when your burger is done
How do you know when your burgers are done? Good question. Press on the center with a finger. It should feel solid, not squishy.
You can also insert a meat thermometer in the side of your burger so it reaches the center. You’re aiming for about 160 degrees.
When your burgers are done, yank them off the stove. Serve on buns with your favorite garnishes. I like lettuce or cheese with these.
Enjoy! | https://www.thehungrymouse.com/2009/05/26/basil-garlic-pork-burgers/ |
Product Design and Development Engineer
BOFA is the world leader in fume extraction equipment. This role is predominantly working from its Headquarters in Poole, Dorset. Hybrid working can also be arranged. The organisation offers excellent benefits as well as the opportunity to work in a clean, modern environment as part of a fantastic team.
Summary
We are looking to build on our current engineering team by hiring an NPD engineer. The ideal candidate will be experienced in the development of products to delight a customer and maintain BOFA's reputation of being the best in the business of fume extraction and air handling. This person will be extremely comfortable with customer communications, design work, first off build as well as embedding new technology into products, always considering the end-user experience, product efficiency and environmental impact of the whole package. They will need to fit into an existing mature and tightly-knit team.
Experience needed when applying for this job…
- Highly motivated self-starter.
- Ability to drive an engineering project from concept to production.
- An eye for detail, but an understanding of design compromise (cost, producibility).
- Align customer’s requirements to a product specification.
- Work within and help to improve a defined New Product Development Process.
- Working knowledge of DFMEA, Design Verification, Phase gate reviews and Flawless Launch
- Ability to build prototype products, as part of a team.
- Good level of capability in SolidWorks, or a desire to quickly learn the application.
- Ability to navigate MRP systems, PDM, Microsoft office packages and manage BOMS.
- Work as part of a wider team. | https://bofainternational.com/en/about-bofa/vacancies/product-design-and-development-engineer/ |
A "brilliant" mum-of-three who collapsed and died from a brain hemorrhage has saved the lives of four people by donating her organs.
Zoe Jones from Connah's Quay was at work on Tuesday, July 2, when she took ill.
The bookmaker, who had only begun working at Corbett Sports in the Flintshire town two days earlier, was cashing up at the end of the day when she suddenly collapsed.
A colleague rushed to help her up, but the 40-year-old collapsed again and began to have a number of seizures.
Ambulance crews rushed Zoe to hospital, but her family were given the devastating news that she would not survive the injuries to her brain, caused by an unexpected hemorrhage.
She was put on a life support machine to allow her family the chance to say their goodbyes before she died on Thursday, July 4.
Zoe Jones had vowed to donate her organs in the event of a tragedy after her watching her 18-year-old cousin undergo a heart transplant (Image: North Wales Live)
Her two sons, Cameron, 20, and Rhys, 15, agreed to donate their mums organs in a bid to save other lives.
She had told them she wanted to become a donor in the event of her death after her 18-year-old cousin Katie Adams, also of Connah's Quay, who was diagnosed with heart failure after battling cancer twice as a child, was saved following a heart transplant three years ago.
Read More
Speaking exclusively to North Wales Live, Zoe's mum, Shirley Roberts, said: "Zoe donated her heart, her lungs and her two kidneys that will go to two different people.
"She has potentially saved the life of four people.
"The donation team came to the hospital and spoke to the boys about donating her organs.
"Even though she was on the donation list, the boys still had the option to say no as her next of kin, but they still said yes.
"I am so proud of her, and the boys for making the decision."
Zoe Jones (left) with her cousin, Katie Adams, 18, whose life was saved following a heart transplant three years ago (Image: North Wales Live)
Ms Roberts, 60, who now lives in Spain, was on holiday on the Greek island of Zante with her sister and niece when she received the tragic news about her daughter.
"My son and daughter called and told me that Zoe had a fall in work and that it was really bad and I needed to come home," she said.
"I managed to get a flight the following day and I saw her before they turned the life support off."
Mum-of-three Zoe Jones - pictured with her three children (left) Cameron, 20, Rhys, 15, and Cerys, 8 - saved four lives by donating her organs after she tragically collapsed and died (Image: North Wales Live)
Paying tribute to her "kind" daughter, she added: "She was crackers, she was just full of life and she was a laugh. If there was a party, she would be in the middle of it.
"She didn't have much, but if there was anything she could do for someone, she would do it.
"She was a big karaoke fan, so she would often sing and collect money for the homeless, who she regularly went out and provided food for.
"She would help anyone she knew, she was such a kind person and a brilliant mum.
"The children seem okay, we've just told them to keep talking about her." | |
In this lesson, we're going to learn how to add some ActionScript 3 functionality that will let a user submit the contents of an input text field by clicking on a button or pressing a keyboard key. We'll create a simple example of a Flash movie where the user can type in someone's name inside an input text field. When the user clicks on a button or presses a keyboard key, then we'll have Flash display a greeting (e.g. "Hello, John!") that will come out in another text field.
Go ahead and create a new Flash document so that we can begin.
Here, we've created a new instance of the TextField class named myInput. Go ahead and test the movie. You should see the input text field appear in the upper left region of your test movie.
Now that we have the text field, lets create a button symbol. So go ahead and use any of the drawing tools to draw any shape on the stage. You can place it anywhere. I'm going to draw a circle and convert it into a button symbol. And then I'll position it in the upper left region as well so that it will appear beside the input text field when we test the movie. Make sure that the button will not overlap with the text field. And make sure that you give this button an instance name by going to the Properties Inspector. I'm going to name this button submit_btn.
Now that we have the AS3 event handler for the mouse click, let's take a look at the code that we need to write inside the event listener function's body.
"Hello, " + myInput.text + "!"
myGreeting.text = "Hello, " + myInput.text + "!"
Go ahead and test the movie. Type in a name inside the input text field and then click on the submit button. After doing that, you should see the greeting come out in the dynamic text field.
So here, we've created the event handler for the key down event. The event listener function, which I've named onKeyPressed, has a trace statement inside it just so we can check if the event handler is working. Go ahead and test the movie. And make sure you disable keyboard shortcuts (test the movie first and then go to Control > Disable Keyboard Shortcuts to make sure that it's checked). Now, every time you press any keyboard key, you should see the phrase A key has been pressed! come out in the output window.
So now, if you test the movie, the trace statement only gets executed when the ENTER key is pressed. Pressing any other key will not yield any results.
And that concludes this tutorial on writing ActionScript 3 code that will enable users to submit the contents of an input text field.
Hi, at the moment I'm making a flash portfolio and I'd like to have the text field on a splash page, users enter their name then when they click the enter btn the "hello" statement shows up on the next page.
I was wondering if you'd be able to help me with this?
Great tutorial. It was easy to grasp and well explained. Thanks for posting it.
Jesus. All that for a submit a field. | http://www.trainingtutorials101.com/2011/01/as3-enabling-user-to-submit-contents.html |
Field of the Invention
Background of the Invention
Summary of the Invention
Brief Description of the Drawings
Detailed Description of Preferred Embodiments
This invention relates generally to gaskets and the attachments thereof to surfaces and substrates. More particularly, this invention relates to woven tubular gaskets having individual attachment members.
Articles and devices for providing a sealing arrangement between two surfaces are well known. Depending upon the particular type of seal which must be achieved and the environment in which the seal will operate, particular types of gaskets and seals have been developed to accomplish adequate sealing and to ensure that the outside environment does not impinge in the area which the seal is intended to protect. To accomplish these goals, prior seals and gaskets have generally been made up of a sealing strip and an attachment mechanism that is applied to the strip to ensure that the gasket or seal will adhere to a pair of surfaces and perform the sealing function.
See
e.g.
Weather stripping is typical of the above-mentioned gasket arrangement for sealing a pair of surfaces. For example, weather stripping which is especially adapted for use on motor vehicles to seal the openings around doors and windows usually consists of tubular covers made of a soft material such as rubber, and a series of zigzag loops which are adapted to secure the rubber to the door or window of the car. , , U.S. Patent Nos. 2,060,353, Tea; 2,102,392, Tea; 2,121,854, Breer; and 2,121,893, Tea. The aforementioned patents generally teach a number of zigzag loops which encircle a core that is inserted through the tubular rubber covering and a fabric or panel member that covers the tubular covering to provide a unitary structure. The zigzag loops are not secured to the core, but merely slip onto the core after they are bent into a particular arrangement for insertion into the tubular member.
Weather stripping as taught in the above patents is typically only useful for protecting the interior of a car from inclement weather conditions. Such gaskets do not provide adequate sealing in high pressure or high temperature environments, suffer the infirmity of advanced degradation of the soft tubular material which provides the seal, and therefore provide inadequate sealing once the seal ages in any significant manner. Thus, the aforementioned weather strips do not satisfy long-felt needs in the art for adequate gasket and sealing arrangements which economically and efficiently attach to a surface defining an interior structure which must be sealed.
See
e.g.
See
See
e.g.
As can be seen from the above-referenced weather strips, it is necessary to provide an attachment mechanism to the weather strip so that it can permanently seal the surfaces. To this end, prior clips and fastening devices for use in securing rubber weather seals and gaskets to doors have been utilized. In general, these fastening devices are embedded in a material such as plastic and consist of head and leg portions which may be formed from a single piece of wire. , , U.S. Patent No. 2,643,433, Scott, at col. 3, lines 38-43. The head portion is engaged with a metal piece in the surface while the wire shank or legs are inserted through an opening in, for example, an automobile body. Scott at col. 3, lines 55-61. Individual fasteners with wire shanks and legs may have various shapes and may connect rubber gaskets to oven doors through a flange. , , U.S. Patent No. 2,988,788, Saponara, at col. 1, lines 12-17; U.S. Patent No. 2,139,329, Fessler, at col. 1, lines 42-46.
See
e.g.
See
Other various shapes and arrangements of clips or fasteners have been devised as attachment mechanisms for gaskets. Attaching clips may be looped out of wire to be engagable with a coil spring member in a weather strip and can comprise a base divided into two portions to provide a torsional action which holds a gasket in the door of a car in a firm manner. , , U.S. Patent Nos. 3,167,824, Berwanger and 3,059,299, Sarafinas. Individual fasteners may also consist of simple bent wire clips, or more complex tabs that project upwardly and which are deformable for grabbing the periphery of a sealing member which will adhere to a surface. U.S. Patent No. 2,867,464, Crampton and U.S. Patent No. 4,783,087, DeCore et al.
Thus, prior attachment mechanisms for sealing weather strips and gaskets to surfaces are usually provided in multiple fashion and attach individually to a gasket so that it can be clipped to a surface which the gasket is intended to seal. However, this arrangement is extremely costly since a large number of individual fasteners must be provided to the gasket in order to effect adequate sealing of the surface and the clips are not usually optimally placed on the gasket to provide effective sealing of the gasket to the surface. Prior individual clips are therefore not economical and fail to solve a long-felt need in the art for an economic and efficient device to provide attachment of a sealing gasket to a surface.
See
e.g.
See
e.g.
In efforts to ensure that sealing gaskets are adequately fastened to surfaces, prior clips have been integrally attached to springs and frames, or molded from a single piece of wire. , , U.S. Patent No. 3,167,826, Watzl et al., col. 2, lines 27-31. This type of sealing gasket may be reinforced with a sinuous wire which is bent into a zigzag corrugated shape to provide snap fastener projections which are spaced lengthwise of the sealing strip and which conform to the shape of the door which the gasket will seal. , , U.S. Patent No. 2,938,249, Milne, at col. 2, lines 28-34; U.S. Patent No. 2,579,072, Harris, at col. 3, lines 25-29.
See
Similarly, prior sealing gaskets for use with oven doors may be bendable into a rectangular shape and have a wire that is simultaneously drawn through the base of the gasket while the gasket is being extruded. In such an arrangement, resilient metal clips are used to grip a base and extend to apertures to secure the gasket to the oven. U.S. Patent No. 4,538,381, Vogel, at col. 2, lines 23-44. However, none of the aforementioned gaskets which are adapted to seal the space between surfaces provide adequate rigidity and structure to the gasket to ensure a good seal, or reduce the number of integrally formed clips to hold the gasket against one of the surfaces. Thus, the above-mentioned gaskets and seals are not economical and are difficult to implement.
Other arrangements for sealing ovens and oven doors are disclosed in French Patent No. 2,491,120, Marchand. The Marchand patent teaches a tubular braid having a metal wire inserted therein. Connection mountings are inserted into the holes of an oven door and have curved members with a free end and a sharp border. The free end with the sharp border pierces a glass tubular fitting during the mounting process and engages the metal wire at a curved portion of the mounting. In operation of the connections disclosed in the Marchand patent, the connections are first mounted to an oven door and then pierce the tubular fitting to make connection with the wire inserted therein to cause the tubular fitting to provide a watertight seal between a watertight surface and the oven door. However, the apparatus disclosed in the Marchand patent fails to reduce the number of required clips to seal the tubular member to the door. Furthermore, the connections disclosed in the Marchand patent are not radially rigid and so are not adapted for efficient insertion into the openings. In fact, it is believed that the use of the wire insert disclosed in Marchand provides an undesirable "hinge" effect for the connections causing the connections to swivel around the wire, thereby degrading the stability of the connections, reducing the tendency of the connections to remain radially rigid in a plane containing the connections, and making it difficult to mount the gasket to a surface to be sealed. Thus, the prior weather seals, gaskets, and sealing strips described above fail to fulfill long-felt needs in the art for rigid gaskets to seal the space between two surfaces having clips which are adapted to provide an efficient interface of the gasket with a surface to be sealed.
See
e.g.
See
See
Woven tubular gaskets with continuous integral attachments are known to provide sealing of a space between two surfaces. , , U.S. Patent No. 4,822,060, Moyer et al. The Moyer et al. patent teaches a woven tubular gasket having a continuous integral attachment which is contained within the woven tubular gasket and which has protrusions which extend through or are extendable through the walls of the woven tubular gasket to engage openings in a substrate. Moyer et al., col. 2, lines 9-18. The protrusions are adapted to snap into the openings of a surface and the attachment also contains zigzag portions which line up substantially perpendicular to the plane of the protrusions to provide lateral stability for the woven tubular gaskets. Moyer et al., col. 8, lines 33-53.
While the Moyer et al. patent teaches oven gaskets which partially solve the aforementioned long-felt needs, gaskets and clips provided in accordance with the present invention more readily solve these long-felt needs as will be understood by those with skill in the art with reference to the following detailed description read in conjunction with the accompanying drawings.
Gaskets and sealing members provided in accordance with the present invention solve the aforementioned long-felt needs and greatly improve the efficiency and economy of producing gaskets described herein. Clips provided in accordance with the present invention may be optimally placed on the gasket, thereby reducing the number of clips required to secure the gasket to the surface and significantly reducing oven finishing time. Such results have not heretofore been achieved in the art and evince significant advantages over prior methods and devices for securing gaskets to surfaces for sealing. In a preferred embodiment, a clip for securing an oven gasket to a surface on an oven comprises shoulder means for interfacing to the surface on the oven and securing the oven gasket to the surface, first retaining means integrally formed on a first side of the shoulder means for fixedly retaining the clip to the oven gasket, and second retaining means integrally formed on a second side of the shoulder means for further fixedly retaining the clip to the oven gasket.
Methods provided in accordance with the invention similarly produce economical oven gaskets which allow for easy and efficient installation to an oven for sealing. In a preferred embodiment, a method of manufacturing an oven gasket to seal a space between two surfaces comprises the steps of knitting a tubular bulb having a first radius to provide resilient support to the gasket, braiding a tubular resilient sealing member with a second radius greater than the first radius around the knitted bulb to provide a resilient seal between the two surfaces when the gasket is placed therebetween, piercing the braided sealing member with a plurality of clip members which will secure the gasket to one of the two surfaces, and securing the clip members to the gasket.
With clips provided in accordance with the invention, gaskets can be constructed wherein the clips are variably spaced along the gasket. This provides the advantageous result not heretofore realized by prior gaskets of optimizing the clip spacing along the gasket to improve overall performance and aesthetics, as well as potentially reducing the required number of clips to secure the gasket to the surface. The above-referenced advantages of the invention and the solution to the long-felt needs will be better understood by the following detailed description of the invention with reference to the drawings.
Figure 1 is a plan view of a clip provided in accordance with the present invention for securing a gasket to a surface.
Figures 2A-2C illustrate how the clip of Figure 1 is secured to gaskets provided in accordance with the present invention.
Figure 3 is a woven tubular gasket having staple clips in accordance with the invention which provide radial rigidity to the gasket.
Figure 4 illustrates woven tubular gaskets provided in accordance with the present invention for sealing the space between an oven and oven door in a self-cleaning oven.
Referring now to the drawings wherein like reference numerals refer to like elements and by way of example only without intending to limit the invention disclosed herein in any way, Figure 1 shows a clip 10 for securing a sealing member to a surface. In a preferred embodiment, clip 10 is provided with shoulder means comprising a first shoulder member, shown at 20, which interfaces the clip to the surface so that clip 10 secures the sealing member to the surface. The clip further comprises a first retaining member 30 integrally formed on a first side 40 of the first shoulder 20 for retaining clip 10 fixedly to the sealing member. Similarly, the shoulder means preferably further comprises a second shoulder member 25 oppositely extended from the first shoulder member 20. A second retaining member 50 is integrally formed on a second side 60 of the shoulder member 25 and further fixedly retains the clip to the sealing member.
It will be recognized by those with skill in the art that clip 10 is adaptable for use in an oven gasket which would seal a space between an oven and an oven door. When clip 10 is used with such an oven gasket, it is fashioned of a high temperature resistant metal material adapted to operate in the harsh environment found, for example, in a self-cleaning oven where the gasket seals the space between the oven door and the oven especially during the cleaning operation. Stainless steel has been found to be such a useful high temperature resistant metal. The head of the clip, shown generally at 70, is adapted to interface through a hole in the oven door while the first and second retaining members 30 and 50 grasp the gasket, thereby securing the gasket to the oven door so that a strong and resilient seal is made between the oven and the oven door by the gasket, especially during the self-cleaning operation.
In a further preferred embodiment, the first and second retaining members terminate in two staple ends 80 which are integrally formed on the first and second sides of the shoulder members 40 and 60. The staple ends 80 are adapted to pierce the sealing member so that the clip 10 can be secured thereto. Referring to Figure 2A, clip 10 is inserted through an oven gasket 90 so that the gasket can be secured to a surface. The staple ends 80 pierce the gasket 90 so that clip 10 securely grasps the gasket. Casket 90 generally comprises a sealing member which is adapted to provide a resilient seal between, for example, an oven door and an oven when the gasket is secured therebetween. In a further preferred embodiment, the gasket 90 comprises a tubular braided member 100 which provides the resilient seal between the two surfaces, and a resilient tubular support member 110 which provides support to the gasket. In still further preferred embodiments, the braided sealing member 100 comprises braided fiberglass which is optimally braided to provide efficient sealing, and the resilient support member comprises a knitted wire bulb adapted to provide resilient support to the gasket. Such an arrangement is often described as a "woven tubular gasket" and is substantially described in the aforementioned U.S. Patent No. 4,822,060, Moyer et al., the teachings of which are specifically incorporated herein by reference.
In yet a further preferred embodiment of gasket clips provided in accordance with the present invention, first and second retaining members 30 and 50 terminating in the staple ends 80 are formed at angles 120 and 130 with respect to the vertical so that the staple ends of clip 10 can be efficiently crimped to the gasket after the staple ends pierce gasket 90 to be secured thereto. Forming the first and second retaining members 30 and 50 having staple ends 80 at angles 120 and 130, respectively, allows the retaining members to be efficiently manipulated during the staple crimping procedure. It is preferable to fashion staple ends 80 at angles 120 and 130 since clips 10 will normally be fashioned from a material having a higher flexural modulus than materials comprising common "office-type" staples. Thus, it is necessary to begin the deflection of the staple ends 80 at angles 120 and 130 in order to ensure adequate crimping. Additionally, the wire diameter of the stainless steel clips 10 is preferably 0.025 inches which is heavier than the diameter of common staple wire, thereby requiring a start of the deflection of the staple ends 80 in order to obtain efficient crimping. It has been determined that angles 120 and 130 provide optimum crimping and manipulation of the retaining members 30 and 50 when angles 120 and 130 are at about 3° to the normal. However, it will be recognized by those with skill in the art that if a sufficiently hard anvil surface is used to crimp the staple ends, angles 120 and 130 may be less than 3° and indeed, may approach 0°.
Figure 2B illustrates clip 10 when retaining members 30 and 50 are preferably bent to secure the gasket 90 after the staple ends have pierced through braided tubular sleeve 100 and knitted wire bulb 110. It will be recognized that retaining members 30 and 50 may only pierce the braided fiberglass sleeve 100 but not knitted wire bulb 110 and then be bent into the position shown in Figure 2B so that clip 10 can be secured to the gasket. It is more preferred, however, that retaining members 30 and 50 terminating in staple ends 80 pierce both the braided fiberglass sleeve 100 and knitted wire bulb 110 to be bent into the position shown in Figure 2B for securing the clip to the gasket 90. Either piercing arrangement and equivalents thereof are intended to be within the scope of the present invention.
Referring now to Figure 2C, the retaining members 30 and 50 with staple ends 80 are bent back on each other as shown so that the staple ends 80 repierce the knitted wire bulb 110 at points 125. Preferably, the staple ends then traverse through the braided fiberglass so that the retaining members or legs 30 and 50 cinch to gasket 90 at crimp angles 95, as best seen in Figure 2B, thereby fixedly retaining clip 10 to gasket 90. A plurality of clips 10 can be so affixed to gasket 90 and are spaced to interface with a plurality of reciprocal openings in an oven or oven door so that gasket 90 can be optimally secured thereto for sealing. Preferably, the staple ends are crimped at crimp angles 95 so that radial rigidity is provided to the clip when it cinches to the gasket. As used throughout this specification, the term "radial rigidity" means that the clips 10 are substantially stiff when cinched or crimped to the gasket, and are not susceptible of substantial motion outside of a plane containing the clips when they are cinched to the gasket. In this fashion the clips 10 will "stand up" on the gasket so that they are easily aligned with the spaced openings in the oven or oven door, thereby allowing the gasket to be quickly and efficiently fitted and secured to the oven. The crimp angles 95 are preferably arranged so that first retaining member 30 is at least 15° with respect to the front of the x-y plane 135 of clips 10 and second retaining member 50 is at least 15° with respect to the back of the x-y plane 135 of clips 10 to provide radial rigidity of the clips in the x-y plane. In order to achieve efficient radial rigidity of the clips 10 in the x-y plane, it is further preferred that first retaining member 30 and second retaining member 50 are kept substantially parallel to each other when crimped to the gasket.
Gaskets provided in accordance with the present invention for use during the high temperature, self-cleaning oven process are generally woven tubular gaskets such as the exemplary gasket shown in Figure 3. As shown in Figure 3, the knitted wire bulb 110 of gasket 90 is cylindrical or tubular in shape and has a first radius. Cylindrical knitted wire bulb 110 preferably provides resilient support to the gasket. The sealing member 100 is further preferably a cylindrical or tubular braided fiberglass sealing member having a second radius which is larger than the first radius such that the braided fiberglass sealing member 100 fits securely around the knitted wire bulb 110.
In a high temperature environment, it is advantageous to staple clips 10 to the gasket because stapling eliminates the need for welding or cementing clips to the gasket wherein the cemented or welded seal could degrade over extended time exposure to the intense heat of the self-cleaning process in an oven. Furthermore, the clips disclosed herein allow gaskets to be constructed wherein the clips may be variably spaced on the gasket according to any particularly desired arrangement for interfacing to a surface. This allows gaskets provided in accordance with the invention to have optimal clip spacing and will enhance the gasket's fit to a surface, thereby improving both performance and aesthetics. These advantageous features and results have not heretofore been achieved, and solve long-felt needs in the art for efficient and economical oven gaskets for use in self-cleaning ovens.
Woven tubular gaskets provided in accordance with the present invention are particularly useful to seal the space between ovens and oven doors as shown in Figure 4. Oven 140 is generally a self-cleaning oven, however gaskets described herein could easily be used to seal the space between other types of ovens and oven doors. The oven door 150 has holes 160 drilled therethrough such that clips 10 interface to the oven door through the holes and securely retain the gasket to the oven door so that a sealing arrangement is accomplished between the oven door 150 and the oven 140 when the oven door is closed. Clips 10 which are stapled through the gasket can be strategically and optimally located on the gasket to reduce the number of clips necessary to fixedly secure the gasket 90 to the oven door 150 through holes 160.
In construction of self-cleaning ovens as described herein, a baked enamel surface is usually applied to the oven and oven door after the holes are drilled therethrough to finish the oven with an attractive and functional surface. However, the baked enamel inevitably fouls holes 160 and must be cleaned from the holes before the oven gasket 90 can be fitted on the oven. With gaskets provided in accordance with the present invention having clips 10 strategically and optimally located on the gasket, a fewer number of holes 160 need to be reciprocally drilled in oven door 150, thereby reducing the need to clean the baked enamel deposits in holes 160 after oven finishing and greatly improving the efficiency of the oven manufacturing process. This advantageous result has not heretofore been achieved in the oven gasket art and greatly increases the efficiency of constructing self-cleaning and other ovens.
There have thus been described certain preferred embodiments of oven gaskets for sealing the space between two surfaces. While preferred embodiments have been described and disclosed, it will be recognized by those with skill in the art that modifications are within the true spirit and scope of the invention. The appended claims are intended to cover all such modifications. | |
PROBLEM TO BE SOLVED: To obtain high sensitivity and low fog and superior storage stability by containing 2 kinds of specified compounds.
11
12
13
13
1
1
2
2
2
SOLUTION: The silver halide photographic sensitive material contains the compound represented by formula I and the compound represented by formula II, and in formulae I and II, R is an H atom or a group to be released by reaction with the oxidation product of an aromatic primary amine color developing agent; R is an aryl group; R is a substituent; n is an integer of 1-5, and when n is ≥2, plural R may be the same or different; Het is a 5- or 6- membered N-containing hetero ring not substituted by a mercapto or blocked mercapto group; J is a (m+1) valent bonding group; Q is a water-soluble group; n is an integer of 0-5; and m is an integer of ≥1, thus permitting fog to be lowered and sensitivity to be enhanced and storage stability to be improved.
COPYRIGHT: (C)1998,JPO | |
When to throw meat away is a common question, and one I often ask when faced with meat sitting in the fridge after a few days. With vegetables, you can usually tell on sight (or with this guide) when they're past due, but meat is not as simple.
As long as meat is refrigerated at 40°F or lower, it remains free of bacteria or mold—but only for a certain length of time, and the time differs based on both the kind of meat and the way it's butchered. Meat that browns in the fridge or gives of a slightly sulfuric smell, for example, may still be safe for consumption.
- Don't Miss: Three Cheap Meat Cuts That You Need to Utilize
For those times when you are unsure of your meat's freshness, here are guidelines that will help you decide to keep or toss that chop in your fridge (and freezer).
Beef
Whole pieces of raw beef keep longer than their ground up counterpart, which is more processed. E. coli is a common food-borne illness associated with beef; it can be killed through cooking, but may resurface if the meat is not handled or cooked properly.
- Steak, roasts, and chops last for 3-5 days in the refrigerator.
- Ground beef (including hamburger meat) is more processed and therefore only lasts 1-2 days before you should be wary of eating it.
Pork
Ground pork has a quicker expiration date than whole cuts and pork with preservatives, similar to beef. Trichinella spiralis, a parasite that results in trichinosis, should be kept in mind when handling and cooking raw pork.
- Fresh chops, shoulder, and loins will last 1-2 days in the fridge.
- Ground pork should be cooked within 1-2 days.
- Sausage (which is essentially ground meat in casing) should also be consumed within 1-2 days as well.
- Bacon lasts for 7 days.
- Hot dogs last for 1 week if the package is open and 2 weeks if it is sealed.
Chicken, Turkey, & Duck
The major concern for uncooked poultry is preventing the contamination of salmonella, which is only destroyed through cooking the meat at a proper temperature.
- All raw poultry (no matter its form) should be used within 1-2 days.
- Don't Miss: Should You Even Bother Rinsing Chicken?
Lamb
Most lamb is whole cut and, similar to beef, it can last longer in the fridge. Also, like cows, lamb can carry E. coli and should be cooked to at least medium rare doneness to avoid this illness.
- Steak, roasts, and chops last for 3-5 days in the refrigerator.
Deli Meats
Highly processed foods like lunch meat will keep as long as whole cuts of meat because of the preservatives. However, Listeria is a bacteria that can be found in deli meats—which is why people with compromised immune systems, such as pregnant woman, are discouraged from eating it. Listeria is killed when exposed to heat, though, so consider toasting your sandwich if you're worried about the bacteria.
- Opened packages are good for 3-5 days.
- Unopened packages will last for 2 weeks.
Cooked Meat
As with most cooked foods, it is best to keep cooked meat in the fridge for 3-4 days at most to avoid excessive bacteria growth and food-borne illnesses.
Freezer Rules
If you're on the last day of the suggested times listed above, it's totally okay to freeze the meat for prolonged life if you don't have time to cook it right then and there.
Putting your meat in the freezer allows it to keep indefinitely, but the flavor will certainly be compromised if you let it linger for too long. Here are the suggested guidelines for the variable types of meat:
- Lunch meats, hot dogs, and sausages: 1-2 months
- Bacon: 1 month
- Hamburgers and other ground meat: 3-4 months
- Chops: 4-6 months
- Roasts: 4-12 months
- Steaks: 6-12 months
- Whole poultry: 1 year
- Poultry pieces: 9 months
For meat that was previously frozen, make sure to start the countdown after it has completely thawed (which is usually a full day for most meat). On the other hand, make sure to freeze unused meat the day of its expiration to ensure that it will be safe to eat when you defrost it.
- Don't Miss: Your Freezer: You're Using That Wrong, Too
Now that you know the rules of proper meat storage and consumption, you can go ahead and prepare dishes like a delicious pan-fried duck breast or a savory roasted chicken without the fear of food poisoning. Enjoy! | https://food-hacks.wonderhowto.com/how-to/toss-freeze-it-ultimate-guide-refrigerated-meats-0168783/ |
In the art of printing and die cutting sheets of material, such as corrugated paperboard for manufacturing containers, for example, it is known that die cutters may cut and slot each sheet of material so as to form a multiplicity of product portions on each sheet. By way of a simplified example, the die cutter may cut each sheet of material such that three or more cartons, or carton tops, or other product portions may be produced from each sheet of paperboard, plastic or other sheet material. This practice allows substantial economics of manufacture by efficiently utilizing the maximum square foot area of each sheet of material and minimizing the amount of waste portions of each sheet. Such sheets of material, having multiple product portions connected together by small connecting portions, are hereafter sometimes referred to as "articulated" sheets as will be more fully explained.
After the articulated sheets have been die cut, which usually follows the printing of indicia on each sheet, pluralities of sheets are stacked in relatively short bundles, and the bundles are sent to a breaker machine in order to separate the bundles into separate stacks of product portions. This breaking of bundles into separate product portions has been a long-standing problem for many reasons. For example, the ultra-high speed printing and die cutting machines of the present day, which can process 1,000 board feet per minute of sheets, require that the breaking function keep pace with the total production line. This requires that the number of sheets per bundle, and therefore, per "break," be increased over that previously possible, and the number of breaks per unit of time must be increased. Secondly, the break must be "clean" with no tears in the product portions. Furthermore, some connecting portions must not be broken along straight lines, but rather, along right angles and rounded connecting portions between product portions such as in the cases of "nested" or "lock bottom" sheets, respectively.
| |
This past month I have been thinking a lot about mindfulness and mindful eating.
Anngela Leggett (Evergreen Fitness) and I recently ran the Mindful Morning Retreat at Blue House Organics. It was a magical morning consisting of a beautiful yoga practice with Anngela, raw treats, and a circle of discussion around the way we eat and the way we think about food.
What an amazing experience it is to openly share your experiences with mindfulness and food with a group of unique and inspiring individuals. I was blown away.
I knew I wasn’t going to be delivering exactly what people would expect. I was there as a guide, to show people the ball was already in their court, and help them to discover how they could realistically apply mindful eating to support mental health, to their own individual lifestyles.
As it turns out, I may have learned more from the group than they did from me! I learned new ways to approach mindfulness, I was taught how to be grateful for the action of making dinner for your loved ones, I was taught how to be mindful through your purchases of food, not just at meal times, and I learned just how important these reminders are.
I shared this reading with the group from Peace Is Every Step, by Thich Nhat Hanh:
“One day, I offered a number of children a basket filled with tangerines. The basket was passed around, and each child took one tangerine and put it in his or her palm. We each looked at our tangerine, and the children were invited to meditate on its origins. They saw not only their tangerine, but also its mother, the tangerine tree. With some guidance, they began to visualise the blossoms in the sunshine and in the rain. Then they saw petals falling down and the tiny green fruit appear. The sunshine and the rain continued, and the tiny tangerine grew. Now someone has picked it, and the tangerine is here. After seeing this, each child was invited to peel the tangerine slowly, noticing the mist and the fragrance of the tangerine, and then bring it up to his or her mouth and have a mindful bite, in full awareness of the texture and taste of the fruit and the juice coming out. We ate slowly like that.
Each time you look at a tangerine you can see deeply into it. You can see everything is the universe in one tangerine. When you peel it and smell it, its wonderful. You can take your time eating a tangerine and be very happy.”
Lisa Richardson writes for the Pique, and had this to say about the Mindful Morning Retreat:
“They offered to help us connect the dots between food and mood. I went to pick up a few good lifestyle hacks that would help me come away from that moment when I’m standing forlornly in front of the fridge, with a fistful of carrot sticks and a dash of psychic resilience instead of a spoonful of Nutella and a guilty conscience.
Our guide, Maguire, having survived six years of disordered eating and come out the other side with practical wisdom to partner with her science degree, informed us that there is no such thing as good food and bad food. She invited us to replace that hazardous dichotomy with mindfulness. Self-care and slowing down. The Mindful Morning Retreat wasn’t an intervention, a six-step program or even a specific solution. It was quite simply a beautiful morning of yoga followed by tea and treats, and the chance for a circle of people to sit together and make connections—between our experiences and other people’s experiences, between our eating habits and our emotions. It was the welcome mat to mindfulness. It was the reminder that attention, not willpower, will save us, from pathology, addiction, the downward spiral of self-loathing.”
Some questions to ponder:
What does mindfulness mean to you?
What does mindful eating mean to you?
How can you realistically apply this to your own life?
Do you think about food as being ‘good’ or ‘bad’?
Do you feel guilty after eating certain foods?
Does social media influence how you feel about food? | https://tracedelements.com/2018/06/26/mindful-morning-musings-%E2%80%A2/ |
Review: The Words We've Never Said by J.H. Knight
Note: An advance reader copy (ARC) was provided by the author via Gay Romance Reviews.
"I love you," Sam whispered. Simple. A fact. A plea.
"I know," Billy said softly. He worried his lip between his teeth before he added, "I believe you. I believed you the first time you said it. Believed it before you said it. And I love you too. But it's not about the words we've said to each other." Because words would never be enough.
J.H. Knight isn't a new author to me, having read The Last Thing He Needs about eight or so years ago and When the Devil Wants In nearly five years ago, which was co-written with Cate Ashwood. Obviously, it's been a while since I last read something penned by Knight, so when I learned that she had a brand-new standalone in the works, I knew I had to get all grabby hands once it was out in the wild. The Words We've Never Said is that standalone and it's now become one of my absolute favorite MM romance reads this year.
The Words We've Never Said is a contemporary MM romance set in Texas. Sam Northwick hadn't heard from his older sister in years, so when he's informed that she'd been arrested for murder and that her two children were to be placed in his care, Sam is shocked. He had no idea he even had a fourteen-year-old niece and seven-year-old nephew. Sam already had a lot on his plate prior to Bree and Winston's arrival, so acting on his attraction to Billy Jones would be more than an inconvenience. But this was more than lust and beyond the crush Billy's had on Sam for a decade and a half. The problem is, will Sam ever be ready to come out publicly and how long will Billy be willing to wait?
This book snapped up pieces of my heart and made it whole again by the time I got to the end. I was so darn invested in Sam and Billy's romance as much as I was in the home and family that Sam was trying to create with Bree and Winston. This was a fairly angsty read--one that saw me shedding a few tears a couple of times--but it was wonderfully tempered with touching lighthearted moments and punches of levity. I love the growth in the characters and the development of the story, and J.H. Knight's writing is sublime. Which is why it needs to be said: The Words We've Never Said is a five-plus-starred read.
Date Read: 03 December 2022
Learn more about J.H. Knight.
Purchase The Words We've Never Said on Amazon. | https://www.dogeareddaydreams.com/2022/12/review-words-weve-never-said-by-jh.html |
Walkthrough: Part One
Part One covers Traverse Town, Agrabah, Olympus Coliseum, and Monstro. Note that the rooms are randomly generated, so general directions will be given instead.
Traverse Town
Start out with a keystroke to the door, then use the card to pop it open. After saving, strike the barrel for a card, then take on the Heartless for a card so Sora can leave the room through the remaining door. In the following room, grab a card from an enemy, then go after the crown door, using that card as well as the Key Card to open the passage inside to find some old friends.
Back into the previous room, get a card to open the next door, then grab another card in that room, followed by opening the crown door to find Leon, Aerith, and Yuffie once more to get the Key of Truth. Head on through the remaining door in the previous area, then use the Key of truth and a second card to find a humungous Heartless!
Boss: Guard Armor
Guard Armor is a large, armored enemy who tries to take down Sora with kicks, punches, and shockwaves from slamming the ground. Avoid these attacks (jumping when the shockwave attack is attempted) while moving Sora in close to swing at the foe with keystrokes, also summoning Donald, Goofy, and Simba (if the card is in the deck). If a green Mickey card falls down during the fight, snag it and then use it to cause the Guard Armor to crumple into small scrap piles for a few seconds, leaving it open to Sora's attacks. Keep up the attacks to scrap the Guard Armor permanently, opening the way forward.
Boss: Axel
Axel will be the next test, so watch out for his sleights, as he likes to combine his cards into a fire wall (make use of a 0 Card to break the attack) as well as using his weapons. Try to track him down, as he likes to teleport, making use of your own sleights and cards to knock him down for the count, gaining some world cards as well as a fire card.
Agrabah
Choose Agrabah, taking on the Heartless that accost Aladdin, then look for the crown door that uses the Key of Beginnings to obtain the Key of Guidance. Now back in the previous room, move through the regular door that is unopened to fight more Heartless en route to a door on the left side of the room. Open the crown door with the key of Guidance and 15 points in Blue Cards, then take the Heartless out that are after Jasmine. With the Key of Truth in hand, Sora must backtrack to the first room of the area, passing through the crown door that remains closed, confronting Jafar as he wishes to be an all powerful genie!
Boss: Jafar
Jafar has three main attacks:
- Jafar will scour the platforms with a ray of fire.
- He will slam the platform in front of him, sending out a shockwave.
- Jafar will submerge in the lava, emerging to throw a giant lava ball that will splatter into small pieces of rock.
The first and third attacks can be dodged with a quick roll, while the second attack is dependent upon Sora jumping off the ground to avoid the shockwave. Jafar is invincible, so attacking him will not result in any damage. Instead, go after his partner in crime Iago, who flies high above the floor with the Magic Lamp in hand, attacking the Lamp to beat Jafar. To make this task easier, grab any Mickey Cards that fall into play, as they will temporarily cause Jafar to stop attacking while slowing Iago down considerably (try to do this when one of the platforms is raised to the highest elevation).
Take the Genie card and move on to the next area.
Wonderland
Wonderland is next, so move Sora through the first room to the next area to find the non-crown door, which Sora should pass through. Once again head past the crown door to move through another regular door, then repeat the process once more (ignoring the crown door again) to enter a room where a crown door lies that Sora must visit, at the cost of a 5 and 7 value card as well as the Key of Beginnings (also hit the treasure chest to snag a Time Card). After a brief conversation, the Card Guards will attack Sora, so take them down with usual tactics, winning a Card Soldier card as well as the Key of Guidance.
Backtrack to the second room (pictured above on the left) to use the Key of Guidance on the crown door to find Alice and obtain the Key of Truth. Now Sora has to head back through a couple rooms (pictured above on the right) to get to the crown door to use the Key of Truth to find the true memory culprit!
Boss: Trickmaster
The Trickmaster can throw fireballs, hit Sora with his torches, a shockwave attack, and a defensive blockage with his torches, which prevents attacks as well allows him to counter-attack any aggressive move you make. If a Mickey Card appears, grab it and then use it to cause a table to appear, making it easier to attack. To win, simply wait with a high level card, use it as he begins to attack (countering his attacks, stuns him momentarily), and then use Keystroke three hit combos to wear the tall beast down.
Grab the Trickmaster card, then head up to the next area.
Olympus Coliseum
Next up is the Olympus Coliseum, so take the Key of Beginnings and use the only door in the first room to enter a second area where Sora will again pass through the only door. The third room has three other doors, so take the one leading northwest to find the crown door for the Key of Beginnings, but the need for a card that is of 8 or 9 in value to gain entry. With the Key of Guidance in hand, head back to the room with four doors, using the Key of Guidance and any other card to enter the next area to find Cloud, who will challenge Sora to battle!
Boss: Cloud
Break Cloud's cards (making use of 0 cards to block his combo attacks) while waiting for an opening (try to get after him when he is refilling his card deck, also using this time to implement Healing cards to counter the damage Cloud deals). Also note that he has no long range attacks, so sitting out of range while he wastes his cards is an excellent method for making him need to refill his deck constantly. Sora will obtain a Hi-Potion card and the Key to Truth for being victorious.
Move Sora back into the four door room, this time moving through the northeast door to find a new room containing the Key to Truth crown door, which will reveal Hades as the mastermind to everyone!
Boss: Hades
Hades can shoot fireballs from his fingers (short ranged attacks), card combo to speed himself up (turns red), throw huge fireballs (dodge or break with a 0 card), and he can use a fiery rake of his hands (close range attack). To defeat the lord of the underworld, Sora will need to be patient, trying to get attacks in during Hades deck refills, which is an excellent time to also heal himself. Try to avoid his attacks while watching his card stock dwindle, at which point Sora must get close to land some hits as Hades can refill his deck with incredible speed. By waiting for the evil lord to waste the majority of his deck, Sora can then attack him with little difficulty, grabbing a Hades card as well as a Cloud card for the victory!
Monstro
Next stop is Monstro, so with the Key of Beginnings in hand, head through the doors and rooms in the picture above (on the left) to reach a crown door that requires the Key of Beginnings and 20 total card points to open, acquiring the Key of Guidance. Head back through two rooms to reach the next crown door, using the Key of Guidance in conjunction with a 5 card as well as a red card to find a fight!
Boss: Parasite Cage
The Parasite Cage uses poisonous attacks to hurt Sora, so have Heals on hand to cure that. To avoid being poisoned, stay out of the liquid below the moving islands and avoid the nasty breath from the enemy, all the while landing physical keystrokes to hurt the fiend. When the Parasite Cage brings one of it's appendages down, jump to a new platform to avoid the damage. Also make use of the Mickey Card if possible, as it will neutralize the poison on the floor, allowing free movement over the area for a limited time.
The Key to Truth is now in Sora's hands, so move left into room one, then move up through two rooms and then right. Now Sora will be in the crown door room for the Key to Truth, so use a 0 card and the Key to Truth to find a bunch of Heartless! Take these guys on, continually attacking them, as it will enrage Monstro. Keep up the attacks (before entering the room, change the deck into all physical attacks while removing slow magic spells), finishing the meter to win a Dumbo Summon card! If the fight ends and Monstro has not spit out the trio, then try again and best the enemy in faster time than before.
Was this guide helpful? | https://www.ign.com/wikis/kingdom-hearts-chain-of-memories/Walkthrough:_Part_One |
Rare Books and Special Collections Group Annual Conference 2019
Let’s Get Physical: Materiality in Special Collections
Special collections materials differ from other types of library collections in that their physical carriers are often as important as (or more important than) the text or images they carry. The 2019 RBSCG Annual Study Conference, entitled Let’s Get Physical: Materiality in Special Collections, will examine the ways that we describe, display, preserve, and promote the physical attributes of our collections, from medieval manuscripts to contemporary artists’ books. This conference has been organised in collaboration with Cardiff University Special Collections.
The Royal Welsh College of Music and Drama Library includes books, play scripts, journals, performance scores, orchestral sets and audio visual material. The Library also holds the Drama Association of Wales collection of scripts, the largest lending collection of scripts in English in the UK.
Visit Cardiff University Special Collections and Archives for a tour and display of some of the highlights from their collections including incunabula, annotated players’ copies of Early Modern plays, the Salisbury Library of Welsh subject matter and Welsh language materials, children’s literature, private press and fine bindings, artists’ books, and scientific and literary archive material.
A tour and display highlighting the rich collection of artist’s books held by Cardiff Metropolitan University. There will also be a visit to the printing studio and a printing activity (activity TBC)
This growing collection of over 550 artists’ books is held within Cardiff Metropolitan University’s Library for Cardiff School of Art & Design and was formed to support the teaching and learning within the School. It is also open to the public by appointment. The collection has books from each decade since the 1960s and includes work by artists such as Ray Johnson, Dieter Roth, Ed Ruscha and Gilbert and George.
Glamorgan Archives collects records relating to the history of Glamorgan and its people. Records include plans, papers, photographs, parchments and paper diaries. The Archives work to preserve and conserve these items and make them available for public consultation. The tour will be “access all areas” and include conservation and box making and a display of material. This visit will last 2 hours.
CILIP Rare Books & Special Collections Group Bursaries
The CILIP Rare Books & Special Collections Group will offer at least three bursaries to allow individuals to attend the Group’s annual study conference in 2019. The Group is delighted to offer bursaries sponsored by Max Communications, Adam Matthew Digital and the RBSCG for a student or new professional. The conference offers an opportunity to learn from experts about a particular aspect of special collections work, to share ideas, and to connect with fellow professionals.
This year one bursary place is reserved for a student or new professional from a BAME background.
Candidates should be members of the CILIP Rare Books & Special Collections Group (either as a CILIP member or Group-Only Member) who are either students or have only recently started a career working with special materials. If you are not a member of CILIP or the RBSCG you should be willing to become a member if in receipt of the bursary.
The bursary award comprises:
Free attendance at the Conference, including the conference dinner, and accommodation for two nights.
Reasonable standard class travel expenses up to £100.
Bursary award winners are expected:
To attend for the full conference programme, to maximise the benefit to be gained from this opportunity.
To write a report on your experience at the conference for the Rare Books Newsletter or for sponsors social media.
To assist the organisers as required with practical tasks during the Conference.
To apply for a RBSCG new professional/student bursary:
Please quote your CILIP membership number or state that you are a Group Only member if applicable, and provide a short outline (under 300 words) of the ways in which attendance at the conference will benefit your career. Place(s) will be awarded to the applicant(s) who in the view of the Group Committee make the best case for their attendance. Please indicate if you wish to be considered for the BAME student or new professional bursary on your application.
CILIP in Wales Bursary
CILIP Wales are pleased to sponsor a bursary place for a CILIP member who lives and/or works in Wales. The bursary comprises attendance at either the Thursday OR the Friday of the conference according to the successful candidates preference plus up to £100 towards travel expenses.
Preference will be give to an applicant from a BAME background, please state if you wish to be considered for this in your application.
To apply for the bursary Please quote your CILIP membership number, and provide a short outline (under 300 words) of the ways in which attendance at the conference will benefit your career. Place(s) will be awarded to the applicant(s) who in the view of the CILIP Wales committee make the best case for their attendance.
You can make a group booking at any point using the book now button. Simply make your initial individual booking, save and then add another attendee. To make use of your CILIP membership benefits you should ensure that you use each member’s specific details (and member number) details at the time of booking or discounts will not be applied.
| |
Q:
Profit Model from Ellison Glaeser 1997
Can someone help me understand the following profit maximization problem (from Ellison Glaeser 1997)?
Manufacturing plants choose where to locate each of $N$ plants in one of $M$ locations. The profit from locating plant $k$ in location $i$ is given by
$log(\pi_{ki})=log(\bar{\pi}_{i})+\sum_{l\neq k}\delta_{kl}(1-\lambda_{li})(-\infty)+\epsilon_{ki}$
where $\bar{\pi}_{i}$
is the natural advantage from locating in $i$ to all plants (i.e. it doesn't depend on $k$), $\delta_{kl}$
is an Bernoulli random variable that is 1 with probability $\gamma^{s}$
(supposedly indicating the existence of a positive spillover possibility between plants $k$ and $l$), $\lambda_{li}$ is an indicator for whether plant $l$ is located in $i$, and $\epsilon_{ki}$ is an error term.
The model is meant to demonstrate the fact that plants choose to locate in certain locations both because of natural advantages of that location and because of agglomeration-type spillovers. My problem is with the second term, which doesn't seem to make much sense.
Thinking through the possible values of $\delta_{kl}(1-\lambda_{li})(-\infty)$
$\delta_{kl}(1-\lambda_{li})(-\infty)=\begin{cases}
0*1*-\infty=? & \text{ if }\delta_{kl}=0\text{ and }\lambda_{li}=0\\
0*0*-\infty=? & \text{ if }\delta_{kl}=0\text{ and }\lambda_{li}=1\\
1*1*-\infty=? & \text{ if }\delta_{kl}=1\text{ and }\lambda_{li}=0\\
1*0*-\infty=? & \text{ if }\delta_{kl}=1\text{ and }\lambda_{li}=1
\end{cases}$
if we define $0*-\infty=0$
and $1*-\infty=-\infty$
we get
$\delta_{kl}(1-\lambda_{li})(-\infty)=\begin{cases}
0*1*-\infty=0 & \text{ if }\delta_{kl}=0\text{ and }\lambda_{li}=0\\
0*0*-\infty=0 & \text{ if }\delta_{kl}=0\text{ and }\lambda_{li}=1\\
1*1*-\infty=-\infty & \text{ if }\delta_{kl}=1\text{ and }\lambda_{li}=0\\
1*0*-\infty=0 & \text{ if }\delta_{kl}=1\text{ and }\lambda_{li}=1
\end{cases}$
which still makes no sense since the only possible value of $\sum_{l\neq k}\delta_{kl}(1-\lambda_{li})(-\infty)$
is zero or minus infinity. My next thought was that maybe I could transform this function to get profits alone:$\pi_{ki}=\bar{\pi}_{i}\prod_{l\neq k}e^{\delta_{kl}(1-\lambda_{li})(-\infty)}e^{\epsilon_{ki}}$
but now the term $\prod_{l\neq k}e^{\delta_{kl}(1-\lambda_{li})(-\infty)}$
can only possibly be zero or 1.
A:
The convention: $0\times -\infty = 0$ and $1\times -\infty$ does make economic sense here. Yes, the term $\delta_{kl}(1-\lambda_{li})(-\infty)$ is either zero or minus infinity.
The story is the following: If $\delta_{kl}$ is one, it means that it is prohibitively costly to operate plant $k$ if plant $l$ is not present in the same location. If $\delta_{kl}$ is zero it means that plant $k$ can be operated independently of whether plant $l$ is or is not in the same location.
Caveats: I'm assuming the info. in the question is correct (I did not read the original). IMHO, the model assumes a very "inflexible" technology (think Leontieff). My guess is they are assuming this to help later if they will use empirical data to estimate stuff.
| |
Thursday, May 7, 2009
Star Trek Warp Speed: Not Implausible
Some physicists say the faster-than-light travel technology may one day enable humans to jet between stars for weekend getaways. Clearly it won't be an easy task. The science is complex, but not strictly impossible, according to some researchers studying how to make it happen.
The trick seems to be to find some other means of propulsion besides rockets, which would never be able to accelerate a ship to velocities faster than that of light, the fundamental speed limit set by Einstein's General Relativity. Luckily for us, this speed limit only applies within space-time (the continuum of three dimensions of space plus one of time that we live in). While any given object can't travel faster than light speed within space-time, theory holds, perhaps space-time itself could travel.
"The idea is that you take a chunk of space-time and move it," said Marc Millis, former head of NASA's Breakthrough Propulsion Physics Project. "The vehicle inside that bubble thinks that it's not moving at all. It's the space-time that's moving."
| |
What is malaria?
Malaria is a serious and sometimes fatal disease caused by a parasite. Patients with malaria typically are very sick with high fevers, shaking chills, and flu-like illness. Four kinds of malaria parasites can infect humans: Plasmodium falciparum, P. vivax, P. ovale, and P. malariae.
Infection with any of the malaria species can make a person feel very ill; infection with P. falciparum, if not promptly treated, may be fatal. Although malaria can be a fatal disease, illness and death from malaria are largely preventable.
Is malaria a common disease?
Yes. The World Health Organization estimates that each year 300-500 million cases of malaria occur and more than 1 million people die of malaria. About 1,300 cases of malaria are diagnosed in the United States each year. The vast majority of cases in the United States are in travelers and immigrants returning from malaria-risk areas, many from sub-Saharan Africa and the Indian subcontinent.
Is malaria a serious disease?
Yes. Malaria is a leading cause of death and disease worldwide, especially in developing countries. Most deaths occur in young children. For example, in Africa, a child dies from malaria every 30 seconds. Because malaria causes so much illness and death, the disease is a great drain on many national economies. Since many countries with malaria are already among the poorer nations, the disease maintains a vicious cycle of disease and poverty.
Wasn’t malaria eradicated years ago?
No, not in all parts of the world. Malaria has been eradicated from many developed countries with temperate climates. However, the disease remains a major health problem in many developing countries, in tropical and subtropical parts of the world.
An eradication campaign was started in the 1950s, but it failed globally because of problems including the resistance of mosquitoes to insecticides used to kill them, the resistance of malaria parasites to drugs used to treat them, and administrative issues. In addition, the eradication campaign never involved most of Africa, where malaria is the most common. | https://bhbwebtech.com/what-is-malaria-malaria-prevention-tips/ |
A base, in chemistry, refers to any substance that releases hydroxide ions (OH−) when dissolved in water or aqueous solution. Many bases, however, don’t readily carry hydroxide ions, but they too produce high levels of OH− when treated with water. This type of reaction can be observed when ammonia is treated with water to produce ammonium and hydroxide.
Bases also have distinctive physical characteristics too; for example, they are bitter in taste (acids are sour) and gives a slippery sensation when touched.
Bases are essential and are a vital ingredient in specific industries. They are used to make paper, soap and synthetic rayon, bleaching powder, antacid, etc. While they are generally considered as the chemical opposite of acids, there are few known acids that can behave just like bases under certain circumstances.
Just like acids, bases can also be either strong or weak. A strong base is simply a chemical compound that breaks apart (dissociate) completely into water and yields hydroxide ions.
Common examples of strong bases are NaOH (Sodium hydroxide) and Ca(OH)2 (Calcium hydroxide). Whereas, a weak base dissociates into the water only to a certain degree.
What is superbase?
Superbase(s) are potent chemical compounds that have an extremely high affinity for protons and are stronger than hydrogen ions. Superbases are used to carry organic synthesis and are an important component of physical organic chemistry.
The term superbase is not new and has been used for more than one and half a century. Since superbases are susceptible to a violent reaction, when coming in contact with water or carbon dioxide, a special solvent is required to carry chemical reactions. Superbases can be classified into three types; organic, inorganic, and organometallic.
Below is a list of the 10 strongest bases on the Earth.
10. Lithium Hydroxide
Chemical Formula: LiOH
First in the list is lithium hydroxide, a white crystalline substance (in anhydrous form) with high water solubility level and corrosive nature. It’s also the weakest of all known alkali metal hydroxides. Lithium hydroxide is produced by inducing a reaction between calcium hydroxide and lithium carbonate in a salt metathesis reaction.
Li2CO3 + Ca(OH)2 → 2 LiOH + CaCO3
A large amount of LiOH is used to manufacture lithium soaps. Another important use of lithium hydroxide is done in ventilation systems of submarines and spacecraft to cancel out carbon dioxide by creating water and lithium carbonate.
2 LiOH + CO2 → Li2CO3 + H2O
It is also used as a corrosion control measure in nuclear reactors (pressurized water reactor) and as a battery electrolyte.
9. Sodium Hydroxide
A working model of Chloralkali process or Chloralkali electrolysis
Chemical Formula: NaOH
Sodium hydroxide, popularly known as caustic soda, is an ionic compound that carries sodium cations Na+ and hydroxide anions OH–. NaOH is known for its extremely corrosive nature, especially at room temperature, as it can quickly decompose proteins. It is capable of attracting (absorbing) CO2 and moisture from the air.
Sodium hydroxide is largely used for chemical pulping in the paper industry. Its other applications include soaps and detergent manufacturing, raw food processing, cement manufacturing, and water treatment facilities to neutralize the pH values of water. It is also used in the petroleum industry from time to time to neutralize acids and increase the alkalinity levels of a certain solution.
In ancient times, NaOH was produced by treating calcium hydroxide with sodium carbonate. By the 19th century, it was replaced by the Solvay process, which was used to produce sodium carbonate, a cheap alternative to NaOH. Today, most of the industrial sodium hydroxide is created through the chloralkali process.
8. Potassium Hydroxide
Potassium hydroxide
Chemical Formula: KOH
Many of you may recognize potassium hydroxide as caustic potash, a solid white substance that is known for its highly corrosive nature. Similar to sodium hydroxide, KOH is colorless (commercially available in white) and strong quintessential base.
While potassium hydroxide and sodium hydroxide can be used interchangeably for various purposes, most industries use NaOH since it’s the cheaper of the two. Anyway, it is used to produce bio-diesel, manufacture soaps, and as an electrolyte in some batteries.
Pure potassium hydroxide is produced by reacting sodium hydroxide with degraded or impure potassium. The chemical compound is potentially hazardous and causes skin burns when the concentration is more 2%. Anything between 0.5% to 2% can cause severe irritations.
7. Lithium bis(trimethylsilyl)amide
Chemical Formula: C6H18LiNSi2
Lithium bis(trimethylsilyl)amide, or LiHMDS for short, is a non-nucleophilic superbase, which has important applications in laboratories. Like other lithium bases reagents, it can form cyclic compounds with trimer, an anion created by a combination of three ions of the same substance. LiHMDS is usually prepared by reacting bis(trimethylsilyl)amine with Butyllithium.
HN(SiMe3)2 + C4H9Li → LiN(SiMe3)2 + C4H10
6. Sodium Hydride
Chemical Formula: NaH
Sodium hydride belongs to a special group of hydrides known as saline/ionic hydrides (composed of Na+ and H− ions), which exist in salt-like form, unlike ammonia and water. It’s largely used as a base in organic synthesis, though few insignificant uses of NaH are also known. Sodium hydride is produced by reacting hydrogen with liquid sodium.
Pure sodium hydride is colorless, but commercial samples can appear grey. Furthermore, NaH is about 40% denser than its precursor chemical compound sodium.
In rare cases, the compound can take the form of ‘inverse sodium hydride’, where sodium and hydrogen ion swap charges (Na− and H+). Na− is an alkalide, which makes this compound more energetic than the standard sodium hydroxide (due to the increased net displacement between the two electrons).
NaH is pyrophoric in nature. It also reacts violently with water and produces sodium hydroxide, a corrosive substance, when it goes through hydrolysis.
5. Sodium Amide
Chemical Formula: NaNH2
Sodium azide, sometimes known as sodium amide, is one of the strongest known bases in the world. It’s an important, commercially available chemical compound which is generally used in organic synthesis. NaNH2 conducts electricity (in a fused state) since its electrical conductance properties are almost similar to that of sodium hydroxide.
While pure sodium hydroxide is usually white, most of the commercially available NaNH2 is grey in color due to the presence of impurities in the form of metallic iron. Typically, sodium amide is prepared by reacting ammonia gas with sodium.
2 Na + 2 NH3 → 2 NaNH2 + H2
Sodium amide is preferred in certain types of synthesis due to its functions as a nucleophile. It’s a potentially dangerous chemical substance, which must be handled with extreme caution. It can react vigorously with water, especially when present in solid form
4. Lithium diisopropylamide
Chemical Formula: C6H14LiN
Next on the list is Lithium diisopropylamide, another non-nucleophilic superbase which is known for its highly corrosive nature and solubility. Under normal conditions, the compound is synthesized by treating cooled diisopropylamine solution (tetrahydrofuran) with Butyllithium. Needless to say, lithium diisopropylamide is corrosive, and pyrophoric but commercial solutions are much safer.
3. Butyllithium
Image Courtesy: Rockwood Lithium
Chemical Formula: C4H9Li
n-Butyllithium or n-BuLi, for short, is a commercially important superbase, mostly used as a catalyst for polymerization to produce synthetic rubber. It has uses in the pharmaceutical industry as well. Although Butyllithium is primarily colorless, it can go through mild color changes either when it comes in contact with alkanes or when they age.
Apart from being a superbase, n-BuLi is a powerful reducing agent as well as nucleophile (a chemical that donates an electron pair to form a bond). Butyllithium is generally produced by reacting lithium with either 1-bromobutane or 1-Chlorobutane.
2 Li + C4H9X → C4H9Li + LiX
Butyllithium is unstable and can react vigorously with water and carbon dioxide, but it can be stored safely under inert gas.
2. Lithium monoxide anion
Chemical Formula: LiO−
Epa: 1782 kJ/mol−1
Lithium monoxide anion was once the world’s strongest base before it was dethroned in 2008. Like other superbases, lithium monoxide is prepared in an aprotic solvent and is also known for its extremely corrosive nature.
The synthesis of lithium monoxide anion is a complicated procedure and is challenging to carry out in a controlled manner. Usually, a small amount of lithium oxalate (Li2C2O4) is used as the precursor, which goes through the electrospray ionization process. The resulted compound lithium oxalate anion (LiC2O4) is isolated and then processed with collision Induced dissociation twice.
As a result, we get a Lithium monoxide anion (LiO−) and a Carbon dioxide molecule. There is no known use of lithium monoxide anion.
Read: Ghost Chemical Bond | A Whole New Perspective Of Bonding Atoms
1. ortho-Diethynylbenzene dianion
Preparation of o-diethynylbezene dianion
Chemical Formula: [C6H4(C2)2]2−
Epa: 1843 kJ/mol
ortho-Diethynylbenzene dianion is perhaps the strongest base known to us. It was initially synthesized/discovered by a group of researchers in Australia using mass spectrometry.
Like other superbases, ortho-diethynylbenzene dianion can only be kept in the gaseous phase. This, however, provide an ideal environment to measure its basicity levels with greater precision. Calculations have shown that ortho-diethynylbenzene dianion has a proton affinity of 1843 kJ/ mol−1 far more than that of hydroxide (1,633.14 kJ/mol).
Furthermore, ortho-diethynylbenzene dianion has two isomers (with the same molecular formula, but different chemical structures); Meta-diethynylbenzene dianion and Para-diethynylbenzene dianion, second and third strongest base ever synthesized. Both the isomers, including ortho-Diethynylbenzene dianion, have no known use and exist in the gaseous state.
Read: 8 Strongest Acids Ever Known To Us
Frequently Asked Questions
What are weak bases?
Weak bases do not completely dissociate into their constituents ion when dissolved in water or aqueous solution. Some parts of the weak base break apart into ions while others parts remain undissociated inside the solution.
As compared to strong base that dissociate 100% in solution, weak bases dissociate only 5-10%.
Ammonia, Ferric hydroxide , Zinc hydroxide, Aluminum hydroxide, Copper hydroxide, and Methylamine are some of the most common examples of weak bases. In fact, you use weak bases is everyday lives. The baking soda you use when baking a cake, the bottle of antacid in your medicine cabinet, and a household cleaner containing ammonia – they all can be classified as a weak base.
How bases are different from alkalis?
Bases that dissolve in water are alkalis. It is important to note that all alkalies are base but the reverse is not true. Bases that neutralize acids are metal hydroxides and metal oxides. Alkalis are also metal oxide but they can dissolve in water, releasing hydroxide ions.
For example, Copper oxide and Zinc hydroxide are base while ammonia and magnesium hydroxide are alkali.
Although alkalis are usually soluble in water, some exceptions do exist. Barium carbonate, for instance, is only soluble when it reacts with an acidic aqueous solution.
Read: 12 Best Examples of Homogeneous Mixtures
What base is used in toothpaste?
Toothpastes contain mild bases such as sodium carbonate, sodium fluoride and magnesium hydroxide. They react with acids (produced by bacteria and germs) in our mouth and neutralize them to keep our teeth clean and healthy. | https://www.rankred.com/strongest-bases-1/ |
Snow and Ice FAQ
The main arterials, the streets with the highest traffic levels, are top priority because they serve the greatest number of users and connect to other cities and highways. If a storm continues for many hours or days, the arterials will receive several passes. Residential areas are third and fourth in priority.
Even after the plows go by, I still see snow on my street. Why don't they plow all the way down to the pavement, curb to curb?
The goal is to make the streets passable, not 100 percent free of snow. Trying to plow down to bare pavement can cause premature wear or damage to the blades, resulting in costly repairs and lost time. If conditions are severe, the city may contract grader services to scrape the ice and packed snow from the pavement.
The type of storm will determine the number of snowplows deployed and the number of shifts assigned. We have six large plow trucks and several smaller pieces of equipment for snow removal. Crews and plows are assigned on a rotating shift basis following the priority routes discussed above. We have eight employees in our Street Service Division and must frequently rely on qualified drivers from other city departments to assist with snow removal efforts. If the storm is severe, we may contract outside services to assist.
We try to open as many streets as possible to allow movement throughout our city. In many cases there is a limit as to how much snow can be pushed up to the curb without burying sidewalks, driveways, and vehicles. With the exception of a severe storm, the sun usually melts most of the snow within a few days. Our goal is to make streets safe and passable while keeping operating costs low.
Blocked driveways are an unfortunate consequence of plowing. Whenever possible, crews try to avoid pushing large amounts of snow in front of driveways or onto sidewalks. However, depending on the amount of snowfall, this may not be possible. Residents are responsible for removing the snow per the city's Municipal Code.
Why do I see plows traveling down unplowed streets with their blades raised? Shouldn't they be plowing?
They are most likely traveling from one priority street to another street of the same or higher priority. If they keep their blades down as they move from one area to another, a lot of time is lost. It is the city's goal to clear the streets systematically based on traffic volume.
The predicted severity, duration, and temperature will help determine whether de-icer is applied prior to a storm event. First priority will be arterials, overpasses, and hills. Salt may be applied to intersections, hills, school zones, and other high traffic areas as they become snow-packed and slippery. | https://www.northglenn.org/residents/snow_and_ice/snow_and_ice_faq.php |
2. Summary:
a. Indian Institute of Management Bangalore (IIMB) invites applications for the position of Manager/Senior Manager – Human Resources. The focus area for this position is to manage and execute the assigned Human Resources (HR) activities / roles as per the requirements of the Institute.
b. The Incumbent is responsible for supporting all HR operations and executing HR process improvement initiatives in consultation with Chief Human Resources Officer (CHRO). S/he is required to ensure that HR team successfully implements planned agenda, delivers the same on time and lives up to the expectations of the internal customers.
c. The incumbent will assist the CHRO of the Institute in the areas of HR policy design and implementation, talent management which includes recruitment and training & development of employees, compensation and benefits, legal compliance of local laws and government regulations and support the enhancing of employee wellbeing and the brand value of HR by constantly reviewing the various Human Resources systems and procedures.
d. While executing the job the incumbent is also expected to handle process improvements within the HR systems, make optimal use of technologies to improve efficiency and drive innovation, and generate MIS reports.
3. Major Duties and Responsibilities:
a. To review and streamline the implementation and support the development and execution of appropriate Human Resources strategies, policies and initiatives and ensure that they are aligned with the overall strategy of the Institute.
b. To Implement and support the HR ERP systems and processes and ensure digital HR management and smooth implementation and adoption of ERP in all HR processes across the Institute. Report to management and provide decision support through HR metrics
c. To implement various initiatives required for process improvements in HR with specific focus on HR policy design and implementation, legal compliance of local laws and government regulations, compensation and benefits, HR systems and Performance Management Systems (PMS), redesign appraisal systems and overall employee wellbeing.
d. To work with internal stakeholders on talent management which includes recruitment and training & development of employees as per Institute guidelines and procedures. To study existing Compensation and Benefits Structure in consultation with internal stakeholders and define the Compensation & Benefits Philosophy and address issues of Internal equity, pay ranges, pay structures as per government and institutional guidelines to meet operational needs of the Institute.
e. To drive and Implement a robust Performance Management System through individual performance target setting, review the performance and provide feedback to enable the employees to excel in their level of contributions. Identify and Document KRAs/KPIs for all departments/Activity and define it at an individual staff level.
f. To ensure that the service records and personal files of employees and all other record-keeping is complete and UpToDate. To ensure compliance of local laws and relevant government regulations as well as compliance on reservation guidelines applicable to employee service matters, recruitment, promotion, and handling grievances. To respond to and ensure grievance redressal of various HR queries and issues of employees within stipulated Service level agreements (SLAs).
g. To respond to RTI queries, parliament questions and other queries on HR matters. Any other work assigned from time to time.
4. Key Skills / Abilities / Knowledge required:
a. Strong Analytical, Planning and Forecasting skills. Should be detail oriented and have the ability to drive controls & checks in HR department.
b. Possess excellent interpersonal skills and have a solution orientation mindset. Strong people person, the incumbent would work closely with and outside stakeholders in serving their interests and developing their interests.
c. Be self-motivated and able to work independently, with a strong sense of urgency regarding timely follow up and customer service orientation with internal clients. Ability to identify and collaborate with internal stakeholders and have leadership ability to work effectively with members of the staff and faculty. Proficiency in MS Office software, e-mail, electronic scheduling, databases and internet and HR ERP.
d. Communication skills - oral and written. Ability to effectively communicate across levels of managers and executives in a professional and appropriate manner. Knowledge in legal documentation, personnel documents, scrutiny of tenders and related documents for legal implications and litigation.
e. Strong commitment to service and capacity to collaborate and communicate with diverse communities – faculty, students, non-academic staff and outside institutions. Ability to prioritize work opportunities in HR department, effectively manage and work on the opportunity through delegation and motivation of team members and bring it to close with limited supervision.
5. Educational qualification & Experience
a. The Candidate should be a Master's degree holder in Human Resources Management or MBA in Human Resources or any equivalent Post Graduation in Human Resources. Exposure to working in an ERP work environment and work on latest ERP module in HR domain.
b. Fluency in English, Hindi; ability to communicate in Kannada would be an added advantage.
c. Should have minimum 14 - 22 years of experience of which 5 years should have been in a managerial position in a reputed organization. Prior experience in an Academic Institution / PSU / Government / quasi-government organization would be useful.
6. Compensation: As per Institute norms.
7. Reporting Relationships: Manager / Senior Manager – Human Resources will be reporting to Chief Human Resources Officer of the Institute.
8. Audience/interface:
A. Internal: Various departments in the Institute, Faculty, Service Providers
B. External: Vendors, Government Agencies, MHRD, Banks and Financial Institutions, and other external Stakeholders.
9. This position is on contract. Selected candidates should be prepared to take up the assignment immediately. Maximum age limit for being appointed under these Rules will ordinarily not exceed 60 years for Non-teaching staff, subject to discretion from the director.
Selection Procedure :
Only shortlisted candidates will be intimated.
How to Apply :
1. Candidates meeting all the job requirements and desirous of being considered may apply online by visiting: http://iimberpsrv.iimb.ernet.in/prod/pfonlapp.home
2. The institute is an Equal Opportunity Employer and committed to fully complying with the provisions of Rights for Persons with Disability Act. The institute firmly believes that such hiring is no way a charity but makes business sense as it is proven that Persons with disability are both highly productive and stable team members, if given an opportunity. We encourage OBC, SC/ST, PwD candidates to apply for the position.
3. Closing date for applications is May 31, 2021
Ref: IIMB/HR/RECT/2021/27 Date: May 06, 2021
FreshersLIVE.com wishes you best of luck. Keep following our Freshers LIVE web site for latest Fresher Jobs, Government Jobs, Walk-In interviews, Current Affairs, Mock Test and many more. Thank You.
To Apply for the job posting from IIM Bangalore, please click on the Apply Now button below. | https://www.fresherslive.com/job-alert/manager-senior-manager-jobs-in-bangalore-for-mba-at-iim-bangalore-apply-now-1193518 |
From making baked goods to helping customers, Bakery Clerks perform all of the tasks required to run the bakery department of a supermarket. The job may sound simple, but in reality it’s a challenging role that has a direct impact on the profitability of a supermarket’s bakery department. That notwithstanding, it’s a service role that doesn’t typically require any special education beyond on-the-job training, though aspiring Pastry Chefs can often be found working as Bakery Clerks while in culinary school. Most Bakery Clerks work in supermarkets, but they can also be employed by boutique bakeries and large-scale baking facilities. According to the Bureau of Labor Statistics, demand for Bakery Clerks is set to rise 7 percent through 2024.
A Bakery Clerk performs a variety of duties throughout their day. We took a look at a handful of Bakery Clerk job postings to put together this list of core Bakery Clerk duties and responsibilities.
It is the Bakery Clerk’s responsibility to make sure the display cases are fully stocked with bread and other baked goods. This requires good organizational and time management skills, as the bakery can get quite busy depending on the time of day. It also requires the Bakery Clerk to maintain a clean work environment.
This response requires a steady hand and a strong attention to detail. When it comes to personalized orders, presentation is just as important as taste. The Bakery Clerk uses specialized cake decorating tools in order to make sure each intricate detail is perfect.
Operating the scale requires basic math knowledge and often becomes second nature with experience. Operating the bread slicer requires a reverence for safety protocol. It also requires the employee to be at least 18 years old. This part of the job requires heightened focus and awareness.
This responsibility requires good interpersonal skills and communication skills. It can often involve conflict management when dealing with upset customers. It also can require multitasking, as bakery areas can get quite busy.
In the retail environment, making sure all prices and labels are correct is a vital part of operations. In the bakery, this is the responsibility of the Bakery Clerk. Prices of perishable goods often change based on freshness, so Bakery Clerks are constantly performing markdowns.
While the role of Bakery Clerk does require some technical knowledge, it is a position that mostly revolves around soft skills. The role of Bakery Clerk is customer-facing in most scenarios, so it requires the ability to maintain a positive attitude. It also takes the ability to work in a fast-paced environment without getting frustrated.
The following list is made up of the core skills required to get a job as a Bakery Clerk, which we compiled based on our research of Bakery Clerk job postings.
According to the Bureau of Labor Statistics, the national median salary for Bakery Clerks is $24,170. Those in the bottom 10 percent make $18,140, while those in the top 10 percent make above $38,400. The three states with the highest median salary for Bakery Clerks are Alaska at $33,300; Hawaii at $33,300; and Nevada at $32,000.
Bakery Clerks use a variety of tools and equipment as they prepare and package baked goods and provide customer service. Here are some of the tools that Bakery Clerks use most often.
Cake Decorating Equipment – A Bakery Clerk uses cake decorating equipment when filling personalized orders and filling doughnuts and pastries.
Forming Machine – The forming machine is used to shape dough into rolls, bagels and other bread products.
Measuring Tools – The Bakery Clerk uses measuring cups and scales when measuring ingredients.
Commercial Use Cutlery and Ovens – The Bakery Clerk uses commercial ovens on a daily basis to bake bread, pastries and cakes. They also use knives and a slicing machine to slice products.
Are you interested in becoming a Bakery Clerk? Continue your research into the position with these great resources below.
The Baking Bible – Written by Rose Levy Beranbaum, this book lives up to its namesake. This book covers everything you need to know about baking, which makes it a great resource for Bakery Clerks.
The Bread Baker’s Apprentice – Written by Peter Reinhart, this book is one of the best learn-to-bake books on the market. It focuses strictly on bread, which is important for Bakery Clerks.
Bread: A Baker’s Book of Techniques and Recipes – Written by Jeffrey Hamelman, this is one of the highest-selling books on baking bread that has ever been written. The most-recent edition was released in 2004, and the advice is still highly regarded over a decade later.
Advanced Bread and Pastry – Written by Michel Suas, this book is an excellent read for those who want to use the position of Bakery Clerk as a stepping-stone to a career as a Pastry Chef.
Baking and Pastry: Mastering the Art and Craft – This comprehensive guide on the art and science of baking was compiled by the teaching chefs at the Culinary Institute of America. It is one of the baking industry’s most trusted resources. | https://www.jobhero.com/bakery-clerk-job-description/ |
يشارك هذا الفندق في برنامج Planet 21 ويعمل لصالح الضيافة المستدامة Positive Hospitality.
تسجيل الوصول من 12h00
تسجيل المغادرة حتى 12h00
ادفع
52 quai Amiral Hamelin
14000 caen
فرنسا
الهاتف: +330231342000
الفاكس: (+33)02/31844861
تواصل معنا عبر البريد الإلكتروني :[email protected]
تسجيل الوصول من 12h00
تسجيل المغادرة حتى 12h00
Welcoming, modern and very spacious, with a comfortable bed and functional bathroom facilities with a shower gel and a shampoo dispenser. All our rooms are air conditioned. We also have family rooms that can accommodate up to 2 adults and 2 children under 16 years of age.
Standard Room with 1 double bed
Standard Room with two single beds
Standard Suite with 1 double bed and 1 double sofa bed
هناً بتوافر الأماكن
Standard Family Suite with 2 connecting rooms
عدد غرف الاجتماعات: 2
أقصى حجم: 38 مترًا مربّعًا
قدرة الاستيعاب القصوى: 19 أشخاص
آراء العملاء الذين حجزوا على موقع all.accor.comاطّلع على المزيد
Easy hotel
David C 28/07/2021 تقييم TripAdvisor المعتمد
Had some Covid related issues such as not having room cleaned for the duration of stay though on the other hand breakfast was basic and adequate plus sleep was comfortable. Place is close by to restaurants for an evening meal.
just what you expect
283simonf 15/07/2020 تقييم TripAdvisor المعتمد
very clean and tidy. good value for money. friendly and helpful staff. This is just what we expected to find in an Ibis Styles hotel. you will not be disappointed when you stay here. very close to the centre of town.
Overnight in Caen
shanealive Couples - 14/06/2019 تقييم TripAdvisor المعتمد
Probably the best Ibis Styles I have come across. Excellent location in Caen centre, with direct access from a large underground modern carpark, which is free overnight. The room are large, clean and have very comfortable beds. A good number of restaurant are nearby. Breakfast has a nice variety of food and drinks, which is in a pleasant first floor location.
Stay at St Brieuc
MIKE S Couples - 19/11/2018 تقييم TripAdvisor المعتمد
This hotel is fully recommended - good location, staff very helpful, our room was very comfortable, free car park to the rear of the hotel albeit limited spaces so late arriving guests might find none left
Quick trip to Caen
S956DSmarkm Family - 06/10/2017 تقييم TripAdvisor المعتمد
Excellent service by the staff. Very friendly and welcoming. Rooms very clean and breakfast superb! You are a short walk to downtown but close to many restaurants and mall. We didn't have children with us but would be ideal for kids. | https://all.accor.com/hotel/9086/index.ar.shtml |
Thai Beef Cabbage Cups Recipe
Looking for an easy Thai Beef Cabbage Cups recipe? Learn how to make Thai Beef Cabbage Cups using healthy ingredients.
Submitted by liz-usa
Makes 4 servings
http://www.myrecipes.com/recipe/thai-beef-cabbage-cups-50400000115823/
Recipe Ingredients for Thai Beef Cabbage Cups
|2 1/2||teaspoons dark sesame oil, divided|
|2||teaspoons Ginger Root|
|3||garlic cloves, minced|
|1||lb ground sirloin|
|1||tablespoon sugar|
|2||tablespoons fresh lime juice|
|1 1/2||tablespoons fish sauce|
|1||tablespoon water|
|1/4||teaspoon crushed red pepper|
|1/2||cup red onion, vertically sliced|
|1/2||cup chopped fresh cilantro|
|8||leaf,+large Cabbage|
|2||tablespoons finely chopped unsalted, dry-roasted peanuts|
Recipe Directions for Thai Beef Cabbage Cups
- 1. Heat a large nonstick skillet over medium-high heat. Add 2 teaspoons oil to pan; swirl to coat. Add ginger and garlic; cook 1 minute, stirring constantly. Add beef; cook 5 minutes or until browned, stirring to crumble.
- 2. Combine remaining 1/2 teaspoon oil, sugar, and next 4 ingredients (through pepper) in a large bowl. Add beef mixture, onion, and cilantro; toss well. Place 2 cabbage leaves on each of 4 plates; divide beef mixture evenly among leaves. Top each serving with 1 1/2 teaspoons peanuts.
Beef, Vegetables, Main Dish
|Nutrition Facts|
|
|
Serving Size 227.8g
|
|
Amount Per Serving
|
|
Calories
295
Calories from Fat
137
|
|
% Daily Value*
|
|
Total Fat
15.2g
23%
|
|
Saturated Fat
5.2g
26%
|
|
Trans Fat
0.0g
|
|
Cholesterol
75mg
25%
|
|
Sodium
611mg
25%
|
|
Potassium
580mg
17%
|
|
Total Carbohydrates
11.0g
4%
|
|
Dietary Fiber
2.5g
10%
|
|
Sugars
6.5g
|
|
Protein
25.8g
|
|
|
|
* Based on a 2000 calorie diet
Nutritional details are an estimate and should only be used as a guide for approximation.
Legend
Calorie Breakdown
Daily Values
Fat
Protein
Carbs
Alcohol
Other
Protein
Carbs
Alcohol
Other
Calorie Breakdown
Daily Values
Health Information
|Nutrition Grade
|
96% confidence
|
Good points
|
Join Calorie Count - It's Easy and Free! | https://www.caloriecount.com/thai-beef-cabbage-cups-recipe-r939970 |
Ghillie suits are designed to be the best personal camouflage in the world, using a three-dimensional camouflaging technique to mask the outline of the human figure and employing materials from the surrounding environment to help the suit blend completely into the landscape. Military personnel have access to specialized materials and equipment, but for civilians who want a ghillie suit, the most practical course is to make your own.
Instructions
1. Use needle and thread to attach the cargo netting to the suit. If you will be crawling around, attach netting only to the back of the jacket and legs. Attach them randomly; a ghillie suit benefits from an uneven silhouette.
2. Wrap netting over your helmet or hat as well, attaching it with glue.
3. Attach the canvas or burlap strips to the netting and suit. Because the purpose of the suit is to blend into the chaos of a natural environment, attach the strips randomly.
4. Use different lengths and different colors for added benefit. Strips hanging from the helmet can be beneficial in obscuring your face, but make sure they do not interfere with your vision.
5. Stuff natural foliage into the netting of your suit when you reach the area where you will be hiding. Use leaves, branches and grass, holding them in place with the straps of the cargo netting.
6. Take special care to obscure your head area, since the head and shoulders are an easily identifiable silhouette. Make the brush sticks out from the suit to break up your outline. | http://paintball-2.hol.es/make-homemade-ghillie-suits/ |
Getting fit has many benefits; it can protect you from illness and injury, makes you stronger, and makes you more attractive. But it’s true that many people are not sure where to begin with a fitness program. The following techniques can start you get into great shape.
You will anticipate your workout routine.
Don’t lift weights for more than one hour lifting weights. Muscle wasting will begin after an hour after starting an intense workout.So make sure to keep these weight lifting to no more than 60 minutes.
Begin with smaller weights when you start weight lifting. Small muscles tire before bigger ones, so you should start small. | http://www.ocreviews.net/2019/07 |
Synopsis: Benjamin Franklin Gates (Nicholas Cage) is a historical treasure hunter - and the great-great grandson of Thomas Gates, a well known puzzle solver in the Civil War era. According to family lore, he is approached by members of the Knights of the Golden Circle (KGC) to solve a puzzle in the dairy of John Wilkes Booth - who is about to assassinate President Abraham Lincoln. Learning that Lincoln has been shot, Thomas Gates solves the puzzle, but refuses to divulge the information, tears pages from the diary, and throws them in the fire. The KGC agents shoot and kill him. Speaking at a Civilian Heros conference, along with his father Patrick (Jon Voight), Ben is confronted by Mitch Wilkinson (Ed Harris), who produces a photo of one of the missing pages from the diary - implicating Thomas Gates as the mastermind behind the assassination. From there the adventure begins, with Ben attempting to save his ancestor's reputation - wherever the adventure leads him.
Scene: Top: Ben and wife Abigail Chase (Diane Kruger) follow a lead found in Paris to London to try to break into Buckingham Palace and examine one of the Resolute Desks. Bottom: Ben crashes the birthday party of the president (Bruce Greenwood) held a Mount Vernon, in order to kidnap him after learning that the coded panel in the second Resolute Desk in the Oval Office is missing.
Monogram: Top: The monogram (MG) and name of Malcolm Gilvary - maker of the Resolute Desk (and puzzlemaker) - found under on the bottom of one of the Desk drawers. Bottom: A map of Mount Vernon - said to have been drawn for George Washington's grandfather Lawrence - and showing secret tunnels, bearing an inscription with the initials LW. Ben uses this map to lure the president to the basement, where they find a matching inscription on a stone wall. | https://embroideryarts.com/movies_with_monograms/national_treasure_2_book_of_secre |
If you read enough science news, you’ll know that there’s a long list of experiments attempting to “prove Einstein wrong.” None have yet contradicted his hallmark theory of relativity. But the latest effort to falsify his statements surrounding “spooky action at a distance” has gone truly cosmic.
Scientists have long performed tests demonstrating that the quantum concept of “entanglement” forces us to accept something that doesn’t make much logical sense. But in order to get around loopholes in previous iterations of the test, which are conducted fully here on Earth, scientists lately have hooked their experiments up to telescopes observing the cosmos.
“We’ve outsourced randomness to the furthest quarters of the universe, tens of billions of light years away,” David Kaiser, one of the study’s authors from MIT, told Gizmodo.
Let’s start at the beginning: Quantum mechanics describes the universe’s smallest particles as having a restricted set of innate properties, which are mostly a mystery to us humans until we measure them. The math of quantum mechanics introduces the idea that two particles can become “entangled,” so their joint properties must be described with the same mathematical machinery. But here’s the problem: If you separate these particles to opposite ends of the universe and measure them, they’ll maintain this eerie connection; you can still infer the properties of one particle by measuring the other.
Einstein, along with Boris Podolsky and Nathan Rosen, thought that one of two things could cause this “spooky action at a distance,” as Einstein described it. Either the particles somehow communicate faster than the speed of light, which Einstein’s theories demonstrated is impossible, or there was hidden information humans weren’t accessing that ensured particles took on these correlated values in the first place.
But John Stewart Bell theorised that hidden information could never accurately recreate what quantum mechanics forces the particles to do. Scientists have devised increasingly complex ways to test this theory since the 1960s.
These tests usually look rather similar. Scientists generate pairs of entangled photons, each with one of two polarisation states — imagine that, viewed from a certain angle, both photons are either small vertical lines or horizontal lines. The photons, if entangled, will have the same polarisation state — though which one, horizontal or vertical, is a mystery until the measurement. The scientists send the photons to two distant detectors that measure the photons from two angles: the angle from which the polarisation and entanglement are visible, or a different angle (if the photons are viewed from this different angle, they become unentangled). Each detector lies in wait for the particles — which, if everything lines up, will produce a simultaneous blip. These simultaneous blips should occur more frequently for sets of entangled particles than sets of unentangled ones.
Some percentage of simultaneous blips above a certain threshold would prove Einstein, Podolsky, and Rosen wrong — it would demonstrate that there are no hidden variables in the laws of physics predetermining the particles’ identities.
But there’s a loophole — perhaps the apparatus influences the measurement, somehow, and forces the photons to carry the same polarisation? In order to prevent this, scientists randomly switch the detector between the two measurement angles. Then comes the next loophole: what if the random-number generator determining the measurement angle isn’t really random; what if what we see as randomness has actually been predetermined by the laws of physics that brought humans to this point?
Two teams of scientists got around this problem by hooking their random-number generator up to a pair of telescopes. In the more dramatic case, the team including Kaiser worked from two telescopes on La Palma in the Canary Islands: the Telescopio Nazionale Galileo, pointing at bright light sources called quasars on one side of the sky that emitted their light 7.78 billion and 3.22 billion years ago, and the William Herschel Telescope, pointing to a light source that emitted light 12.21 billion years ago. If each telescope observed light that was slightly bluer than a reference colour, its corresponding detector would measure the light’s polarisation in one setting. If the light was slightly redder, then the detector would use the other setting.
In a test of 30,000 pairs of particles, their polarisation correlated too closely to be explained by one of these local hidden variable theories, according to the paper published in Physical Review Letters. That means that any hidden force that could have influenced both particles would have needed to happen billions of years ago to somehow influence the way scientists measured these particles here on Earth. Or, the more likely explanation is that quantum mechanics remains spooky at a distance and can’t be explained by hidden variables. It appears that Einstein was wrong about this one.
The researchers took care to account for astronomical things that might have biased their measurements. For example, they chose a colour of light to measure that wouldn’t be absorbed by interstellar gas, and they ensured that they took gravity and the universe’s expansion into account, explained Kaiser. The second, similar experiment, also published in Physical Review Letters, also observed the higher-than-classical correlations, bolstering both papers’ evidence.
Scientists can perhaps further refine these tests by using of light from even deeper into the universe. | https://www.gizmodo.co.uk/2018/08/spooky-quantum-entanglement-confirmed-using-distant-quasars/?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+uk%2Fgizmodo+%28Gizmodo+UK%29 |
Start Date:
9/16/2016
End Date:
9/17/2016
End Time:
Midnight
Event Description:
The largest outdoor RV Expo in the Mid-Atlantic States - 1000's of RV's Fill Timonium's State Fairgrounds. Vets? Free admission Thur & Fri for active or veteran showing US Military ID.
Event Time:
Varies depending on day
Category: Office Of Tourism
Fairs & Festivals
Nature & Outdoor
Phone:
410-561-7323
WebSite:
http://www.timoniumrv.com
Location Information:
Maryland State Fairgrounds
Baltimore County
Central Maryland
Timonium 21093
Contact Information:
Phone: 410-561-7323
Email: | https://www.doit.state.md.us/ActiveDataCalendar/EventList.aspx?fromdate=9/17/2016&todate=9/17/2016&display=Day&type=public&eventidn=19532&view=EventDetails&information_id=31258&print=print |
Relativity developer partner GEN3i needed to migrate 500 million documents from ViewPoint to Relativity—but they didn’t want to do the traditional “dump and load,” where a ton of unnecessary duplicates are also transferred over. Plus, the more automated they could make the process, the better.
So using the Relativity Import API, they spun up a custom solution that connects Relativity directly to ViewPoint’s SQL databases to automatically migrate all document metadata, natives, and extracted text.
But there was a problem.
“As soon as we started migrating data, we noticed a slower than expected transfer rate of approximately two million documents per day,” says Driss Mechiche, senior solutions architect at GEN3i. “At this rate, it would take more than six months to migrate all the documents, so we started looking at ways to increase our throughput.”
They called in Relativity’s developer experience (DevEx) team for backup—but DevEx didn’t find anything obviously wrong. GEN3i had followed all the best practices when building the application and there wasn’t any issues with infrastructure that would cause performance problems.
Given the circumstances, DevEx offered up Nate Noonen, a senior architect, to help.
Nate shared some internal benchmarks for throughput with GEN3i and, compared against what they were seeing, it was clear there was room for improvement. The team worked together and identified two problems: 1) the batch size was too large; and 2) the indexing interval was too frequent.
“Nate recognized the challenge we were dealing with and following his suggestions, we reduced our batch size to 1,000 documents per batch and increased our indexing interval to every two million documents,” says Driss.
Driss and team also modified their workflow to import the documents in two separate steps:
- Step 1: Import document metadata and natives via the Import API
- Step 2: Import extracted text separately via SQL
“Importing documents and natives without extracted text was extremely fast and allowed case managers to begin QC on the migrated documents much sooner, which led to a more efficient workflow overall,” says Driss.
With those adjustments, Driss has seen a huge improvement: Performance is now three- to five-times faster than before, resulting in a transfer rate of six to ten million documents per day. | http://www.gen3i.com/press-releases/how-gen3i-tripled-performance-speeds-on-their-custom-application/ |
The North Tonawanda Meals on Wheels has changed its name to Twin Cities Meals on Wheels to reflect its continuing role in providing meals in North Tonawanda and neighbors to the south in the City of Tonawanda.
The organization is located in North Tonawanda at 100 Ridge Road, but has long provided services to both cities.
North Tonawanda Mayor Arthur G. Pappas said the name change just made sense and he was happy to see both cities unified for an organization such as Meals on Wheels
Meals on Wheels volunteers provide hot meals to elderly or invalids in their communities.
"All the people working behind the scenes have done a tremendous job in providing food for those with debilitating conditions that make their everyday lives difficult," said Pappas in an announcement of the name change.
Twin Cities Meals on Wheels made the name change official this past weekend when it put up a new name plate.
Anyone interested in volunteering may contact Twin Cities Meals on Wheel at 693-1663 or www.ntmow.com. | https://buffalonews.com/2016/10/25/meals-wheels-gets-new-name-tonawandas/ |
My friend and mentor John Maxwell said it best with this quote, “Good leaders ask great questions that inspire others to dream more, think more, learn more, do more and become more.” What is the first thing that comes to mind when you hear the word conversation? The answer typically is talking. Guess what? Did you know that 80% of a successful conversation involves listening?
Great conversationalists have one thing in common. They ask questions that draws others out. Why is that? Well, it is a simple truth: people like to talk about their favorite subject, which is themselves. In order to have a great conversation, I’ve come up with an easy technique called the 2C’s: curiosity and connection.
- Be curious: early on in the conversation ask questions, what, how, where, and when?
- Connection: connecting questions tends to have a personal attachment (i.e., about family). and allows us to build a bridge
Truth be told, if you were to enter every conversation with a few good questions, you would be viewed as an amazing conversationalist.
Neuroscientists state that when we talk about our own beliefs and opinions, rather than those of other people, our mesolimbic dopamine system is stimulated. This effect is most commonly associated with the motivation and reward feelings we get from food, money and sex. So, if you’re looking for proof in becoming a curious and connective conversationlist, the Harvard neuroscientists just gave it to you! | https://leadoneconsulting.com/stay-curious-and-seek-connection/ |
A package for stack data structure. have the push, pop, size, length, and top functionalities.
dart_stack #
A dart package for stack datastructure
Usage #
Add dev dependency to your
pubspec.yaml:
dev_dependencies: stack: ^0.0.1
Run
pub get to install.
How it works #
Import
import 'package:stack/stack.dart';
Example
// Initialize Stack<String> stack = Stack(); // Push stack.push('abc'); // See the top stack.top(); // Pop the top stack.pop(); // Check for empty stack.isEmpty; // Check for non-enpty stack.isNotEmpty; // see if the stack has a certain object stack.contains("abc"); // print the complete stack stack.print();
Feel free to file feature requests and bug reports at the issue tracker. | https://pub.dev/packages/stack |
Marianne Rust - "Arum Lilies in Vase"
|
|
Arum Lilies in Vase
|
|
Arum Lilies in Vase
Remove from your Shopping Cart
Remove from your favorite works list
Add to your favorite works list
Details
Oil on Canvas
W: 610mm x H: 765mm
Approx. Weight: 1.3kg
This work is unframed
Price
US$ 177
Scale
Reference
177
About "Arum Lilies in Vase"
Beauty overfed by Mother Nature - I tried to bring it to canvas
|
|
Marianne Rust
Remove Marianne from your favorite artists list
Add Marianne to your favorite artists list
View all 101 works by Marianne Rust
About Marianne
Marianne Rust (Brewis) born in the Ceres valley in the Western Cape, South Africa. She grew up in Cape Peninsula, surrounded by spectacular landscapes mountain and sea.. which gave her the appreciation for the beauty of nature.
Price Range
US$ 61-943
Exhibitions
Group exhibition at Realto, Strand
People who chose Marianne's work also chose work by:
Find other: | http://www.southafricanartists.com/arum-lilies-in-vase-80120 |
Do you do interval training? We’ve all heard of it…and some of us even do it;-) At the gym I go to, my very good friend, who is the owner and a personal trainer, is a proponent of interval training. If you are a fitness novice, the basic premise is that you perform exercise at a high rate of intensity for a brief period, and then back it down to regroup before ramping it up again.
An example of this would be running on the treadmill at 7.5 (a fast run on my treadmill) for 30-40 seconds and then dropping down to 5.0 (a bit faster than a jog) for 3-5 minutes and continuing this pattern for 40 minutes or so…or until you pass out;-)
Sort of a marathon and a sprint combined in a workout; which is how life is too.
Now I understand the concept of interval training, but it wasn’t until I read this particular analogy that it really clicked and I related to living a life on your own terms.
OK; here’s the analogy:
If you think of interval training as filling a gas tank in your car, when do you use the most gas? It’s not on the highway miles; it’s in the stop and go traffic. When I read that, the light bulb went off in my head! That made perfect sense to me. An AHA! Moment!
So, how does this relate to an empowered life? Well, the way I see it, your goals (whether they are a year from now or 5 years from now), are the marathon; the slow and steady pace that keeps you moving forward.
Your ‘sprints’ are the daily actions that keep your energy up and keep you focused on the present. If you’ve ever run at intervals, then you know that when you are at high intensity your attention is more focused; slow down the pace and you’re not quite as focused.
So, in creating a life on your terms, you get to decide the pace of interval training that works for you. But make no mistake, in order to perform at your best; you will need to have a combination of sprints and marathons.
Are you ready to go at your peak performance? | https://daniellemmiller.com/blog/the-marathon-or-the-sprint |
How to Build a Backyard Pond: Several measurements affect the size and health of your pond – the width, the length, and the depth. These measurements control the number of fish and plants you can add to your pond and keep it healthy. The number of fish you can safely keep in a pond is determined by the surface area of the pond. The width times the length determines the surface area.
The depth of your pond will determine how much winter (and in hot regions, summer) work your pond will require from you to keep it healthy and should be considered if you are in an area where pond predators (herons, raccoons, opossum, etc.) may be a problem.
A water garden does not require a level bottom and can be built with varying depths. A deeper pond allows your fish to escape from predators more easily and may deter some predators completely. The width becomes important when choosing plants such as lilies, some of which have a very wide spread.
Larger ponds hold a consistent temperature more easily.
It is a good idea to lay out a garden hose or piece of rope and figure out how much of your garden space you would like to devote to the pond. This also allows you to experiment with various shapes.
You should experiment with different sizes and shapes, and plan for the largest excavation your gardens can accommodate. A water garden which will house fish should be a minimum of 2 feet deep, and 3 feet if you intend to house koi.
The depth of your pond should also be based on your winter climates. If you intend to winter plants and fish in the pond instead of indoors in a fish tank, you will have to allow a depth in the pond that will not freeze solid.
A good depth is 24″. This will be more than enough for most water lilies and deep water aquatics to flourish in and it will be enough to “even out” heat absorption.
Most water lilies do not need more than 15 inches of water over their crown to produce well. Since most lilies need full sun (at least 6 hours per day), you want to place your pond in a sunny place, but it is important to think about how much heat the water will absorb. Even in hot, tropical regions, depth is important because of the summer heat, a shallow pond will heat up quickly, robbing the water and fish of oxygen.
Note that much of the light rays entering the pond area do not penetrate more than one foot below the surface. This means that the top layer of water will heat up faster than the deeper areas, but if you are adding a pump, fountain, waterfall, or stream, it is likely you will be mixing the warm water with the cooler water and heating the pond quickly. Another foot of depth will enable the pond to help cool itself as the warmer water mixes with the cooler water, allowing the water to hold oxygen better because it is cool.
You can go many routes with the design of the sides of the pond, but several factors should be considered. Most people want to put a marginal shelf around the inside perimeter of the pond for their bog or marginal plants (see description below).
However, a pond with marginal shelves allows easy access to predators such as raccoons and opossum, giving them a stepping stone into the depths of your pond. You can create shelves within your pond, away from the sides, using concrete blocks, milk crates, and bricks if your pond is in an area where predators are likely.
You can place a plant container on bricks or rocks for plants that prefer shallow depths. The slope from the pond edge to the marginal shelf can be a sheer drop. From the edge of marginal shelf to the deepest point should be about 15 – 25 degrees.
Filters are generally used by the advanced ponder for Koi keeping. There are many types on the market but we prefer biological filters. If you are going to buy one shop around. Look for one that will be both effective and reasonably priced.
For many backyard ponds, a filter will not be required if a balance of plants can be achieved. This balance can be attained the pond is just about self-sufficient when it comes to clarity. You will have to remove debris that is blown into your pond by the wind and other decaying/dead organic matter. All of these things release nitrates which algae love and will exacerbate any clarity problems you may experience.
There are a lot of options with liners for your new backyard pond. The three that we recommend are Ethylene Propylene rubber (EPDM), rigid polyethylene, and concrete. Basically, it depends on how much money you want to spend, how much work you want to do, and how long you want the pond to last.
For the most part, the EPDM liner is the best. It is ultraviolet resistant, 45 mil in thickness (thick enough to keep root systems of most land plants from getting through and into the pond), and it is guaranteed for twenty years.
Many pond suppliers stock it and it is important to note that a good length of the material will be heavy. If you are going to buy by mail order shop around for a company that will either give you a discount for a certain length or will not charge you freight.
The next option is concrete. This is a wonderful liner but you need to be aware that lime is toxic to fish and plants. To get around this you can seal the poured, dried cement with a waterproofer or fill and then empty your new pond three times. Another remedy is to dump a couple of gallons of vinegar into the water and then test pH after about three weeks. The best pH is 7.0 but we have put fish into the water with it as little as 6.0 and as much as 8.0 without apparent ill effect.
Finally, there is the pre-formed polyethylene ponds. These are great for gardeners that don’t have a lot of space or a lot of time. They come in numerous sizes and shapes, from 35 gallons on up to 165 gallons (and even more). They have marginal shelves and a depth of up to 18″.
If you opt for the EPDM liner then you will have an edge that must be buried and covered. You extend the life of the liner if it does not have direct sunlight on it. There are many ways to do this. One is to pour a concrete ring around the pond and then drape the free edge of the liner over it [the edge] under the outside of the ring.
Another way is to simply bury the edge and cover with rocks. The rocks should “hang out” a bit to cast a shadow on the part of the liner that will be exposed from the water line to the rim. Yet another option is to just bury it in sod and plant bog plants over it.
Finally, some people will find that they like a mixture of the above idea. Perhaps at the most shallow side of the pond you could plant bog plants of the liner and then at a deeper spot provide rocks right up to the edge.
Plants in a pond provide beauty, balance for the pond ecosystem, oxygen for the water, and shading to inhibit the growth of algae. Algae disturbs clarity and it is the bane of all ponders.
Both algae and most water plants love the sun. The water lily, for example, requires at least six hours of direct sun-light to bloom. The generally accepted rule of thumb is that 60 – 70% of the water surface should be covered with plant foliage.
If you plant fast growing floaters in your pond when you put your first lilies in then they will quickly cover the surface area required. As your lilies get bigger, you can remove your floaters.
Almost everyone thinks of water lilies first when they think of ponds. Most are white, red, pink, yellow, and changeable (cream colored).
All Hardy lily blooms open during the day and close in late afternoon (time of day varies with variety). Some tropical varieties bloom at night. Some, too, are fragrant.
Two ideas to keep in mind when considering the wide range of these plants available is that they really like still water and that Hardy ones need 50 degree Fahrenheit water for sustained new growth while Tropicals need about 70 degree water.
Deep water aquatics are good plants for areas of the pond that have movement of water or partial shade. Like lilies they like up to 15 inches of water over them. An example is Water Hawthorn — Aponogeton ditachyos– it has evergreen foliage and white flowers.
Floaters are plants that are not rooted in soil and float on the surface. An example is Water Hyacinth, Eichanoria (this plant cannot be shipped across state lines). It is very fast growing and can take over quickly. However, because it is a tropical/tender you can rest assured that it will not choke out your pond no matter how good of a “foothold” it gets.
Oxygenators/Submersibles are plants that can be rooted in soil or float around under the water. They provide oxygen and utilize many of the nutrients that algae eat. Parrot’s Feather is an example. We suggest one bunch of them for every 2 square feet.
Marginal plants are planted in containers that are placed on the marginal shelf. Most do not like more than a couple of inches of water over them and their foliage will grow out of the water. Examples include the Marsh Marigold, Bog Arum, Water Iris, and Bull Rush.
Finally, there are bog plants. These plants are useful for around the pond as ponds often overflow (i.e. as a result of rain). They like to have their feet damp constantly but never water-logged. Example include many standard garden thirsties: astilbe, day lily, hosta.
We don’t fertilize our water garden plants more than once or twice a season as the solute created only exacerbates algae problems.
Hardy lilies and deep water aquatics will withstand all but the harshest of winters assuming they were planted at the proper depth — the pads/foliage will float to the bottom and wait patiently for spring. Marginal plants should be cut down so that only a few inches remain above the surface. Floaters too will go to the bottom. Tropical varieties of all types must be brought in. We suggest placing them in a cool, dark place and monitor them so that they never dry out.
Remove all of the dead organic matter you can reach — this includes leaves that have blown in and spent flower buds. In areas where ice is a probability or certainty, this is especially important as gasses released as this matter decays will build up under the ice and kill fish. It is a good idea, too, to place a small pump in the water so that one area of the pond will have some gas-exchange.
Alphabetical listing of pond clubs. Find a pond club in your area to join.
Alphabetical listing of water garden clubs. Find a water garden club in your area to join.
Find quality manufacturers of pond and water garden liners. Pond Heaters – find information and resources about pond heaters.
Listings for locating pond pumps and suppliers of pond pumping supplies.
Resources and information from suppliers and distributors of pond filters.
The relaxing beauty of pond fountains can be yours with help from these sites.
Directory of suppliers and information needed to create a pondless waterfall.
Great resources and listings on information for creating your own backyard pond.
Go green with great ideas from these resources on pond plants.
Keep it simple and start it all in one day be getting one of these popular pond kits.
Top resources and listings of helpful pond waterfall providers. Water Garden Supplies – wonderful online resources for all your water garden supplies.
The beauty of a bridge can add to the enjoyment of your fish pond. Pond Skimmers -keep your pond free of junk with help from these suppliers and distributors of pond skimmers.
Listing pond designers and pond design tools and resources.
Popular listings for all preformed pond liners.
Resources and information on proper pond and water garden aeration. Pond Lights -light your pond up at night with help from these great suppliers and distributors of pond lights.
Listing suppliers and information resources on pond waterfall pumps.
Keep your pond clean and healthy with these helpful resources on pond vacuums. | http://beniciagarden.com/build-backyard-pond/ |
I adore prune plums and really the only thing bad about them for me is that they signify the end of summer. I love fall; I live in New England, after all, but the LONG winter just comes too damn fast. Anyway, while I can eat these tiny plums by the half-dozen easily out of hand, they also work very well in baked goods. Recipes abound for plum kuchens and coffee cakes but I wanted to try this version because the cake component itself is a bit more substantial than most. It is a fabulous pairing. The cake is buttery and rich, the topping is fruity and juicy. It truly doesn’t need the vanilla glaze, so feel free to leave out, if you like. Carole is a friend and I truly enjoy reading her books; I have them all. Her approach to flavor and baking technique is similar to mine and when I read her recipes I feel very much at home. Her addition of a couple of tablespoons of oil to the batter is inspired and gives us a very moist cake. She recommends larger plums such as Santa Rosa or Black Diamond. I used prune plums because that was what was available. Your choice! I can’t wait to try this cake with other fruit on top, too….I can see it with peaches, plums, nectarines, any of the stone fruits for sure. Take Carole’s advice and serve this warm for a truly special snack cake experience. Tip: the half and half for the glaze must be hot to blend well with the rest of the ingredients. You can substitute milk or other type of cream.
For the Cake: Position rack in middle of oven. Preheat the oven to 350º F. Coat a 13 x 9 x 2-inch pan with nonstick spray.
Cut the plums lengthwise in half, remove and discard the pit then slice each piece in half again lengthwise; set aside. Whisk together the flour, baking powder and salt in a medium bowl to combine and aerate; set aside.
Beat the butter until creamy, about 2 minutes with an electric mixer on medium-high speed. Add the sugar gradually and beat until very light and fluffy, about 3 minutes, scraping down the bowl once or twice. Beat in lemon juice, vanilla and zest.
Beat in the egg mixture a bit at a time, scraping down after each addition, allowing each bit of egg to be absorbed before continuing. Add the flour mixture in three additions and beat briefly until smooth. Scrape batter into pan and smooth top with a small offset spatula. Arrange plum slices evenly on top of batter (see pic).
For the Topping: Sprinkle lemon juice over plums. Stir the sugar and cinnamon together in a small bowl and sprinkle evenly over all.
Bake for about 35 to 40 minutes, or until a toothpick inserted into the center shows a few moist crumbs when removed. The cake will be light golden brown and the edges might have begun to come away from the sides of the pan. Cool the pan on wire racks for about 10 minutes. Meanwhile, make glaze, if using.
For the Glaze: Place confectioner’s sugar in a bowl and whisk in 3 teaspoons of hot half and half, corn syrup, vanilla, lemon juice and salt. Add remaining half and half if necessary to create a smooth, pourable glaze. Drizzle glaze free-form over cake with a fork. Serve immediately. Best served the day it is made. | https://www.dedewilson.com/recipes/cakes/plum-topped-pound-cake/ |
The Bachelor of Science, General Program concentrates study in one subject to the level required for a minor (18 upper-level credits). No labs are required.
TRU-OL offers many courses that fulfill the specific lower-level requirements of the degree. Because TRU-OL's offering of upper-level science courses is limited, students should expect to complete a significant number of courses through other institutions. New courses are continually in development at TRU-OL, however; thus, it is important to monitor TRU-OL's website for new course offerings.
What Can You Do With This Credential?
Many Science graduates are highly successful and have gone on to science careers in medicine, veterinary medicine, medical genetics, elementary and high school teaching, resource management, high tech industry, biotechnology, optometry, pharmacy, dentistry, wildlife management, respiratory therapy and more.
Program Requirements
Admission Requirements
Students who plan to complete a credential through TRU-OL must complete and submit a Program Admission form.
Residency Requirements
A minimum of 15 TRU credits (distance or on-campus).
Degree Requirements
120 credits total, with a grade point average (GPA) of 2.0 or higher over all courses required for the credential, as follows:
General Education Requirements (24 credits)
These may be met with lower-level or upper-level university courses.
6 credits in English (university-level composition and literature, such as ENGL 1001, 1011 or 1101; ENGL 1061 and 1071 do not meet this requirement)
6 credits in humanities other than English
6 credits in mathematics (including statistics) and/or science
6 credits in social science
Lower-Level Requirements (24 credits)
MATH 1141, Calculus I (3) and 1241, Calculus II (3) or equivalents ( MATH 1157, 1171 and 1901 do not meet this requirement)
18 credits in first-year or second-year science, with a minimum of 6 credits in any three of the following subject areas:
Life science (biology, genetics, zoology, botany, microbiology, biological oceanography, plant and animal physiology, such as BIOL 1113, 1213, 2131, 2341, 3021, 3101, 3131, 3231, 3431
Chemical science (chemistry, biochemistry: CHEM 1503, 1523, BIOL 3131, 3231)
Physical science (astronomy, physics: PHYS 1103, 1203)
Earth science (geology, atmospheric science, physical geography, geophysics, physical oceanography: GEOG 1221, GEOL 1111)
Mathematics (including statistics: MATH 1101, 2111 or MATH 2121)
Applied science (bioresource, chemical, civil, mechanical, electrical, or computer engineering science; forensic, forest or agricultural science)
Some interdisciplinary areas of studies may be allocated to more than one of these subject areas, depending on the content of the course.
Upper-Level Requirements (45 credits)
30 credits in two areas of science (18 credits in one area, 12 credits in the other two areas)
OR
30 credits in three areas of science (18 credits in one area, 6 credits in each of the other two areas)
AND
15 upper-level elective credits (may be science or non-science courses)
Students must select their distinct subject areas in consultation with their program advisor.
Elective Requirements (27 credits)
May be lower-level or upper-level science or non-science courses (students must check with a program advisor to ensure course selection meets degree requirements)
Notes
30 credits of the degree requirements (with no more than 15 credits at the upper-level) may be applied studies, such as fine and performing arts studio courses and technology courses. Education, business and administrative studies courses are reviewed on a case-by-case basis.
No single course may be used to meet more than one of the specific requirements. Degree requirements may be met with credits earned by prior learning assessment and recognition (PLAR).
Campus-based equivalents to most course requirements are available.
Students are responsible for consulting with their program advisor to ensure that the courses they choose are appropriate for their program of study and their educational goals. Students who proceed without approval may find that a course does not meet requirements and may be subject to transcript assessment fees.
Contact
Email Student Services for more information. | http://www.tru.ca/distance/programs/science/bachelor-general-program.html |
Established in 2014 AISA SA is one of Australia’s most comprehensive and cost-effective measuring suppliers. We are 100% locally owned and have access to a broad range of original equipment manufacturers from all over the world with many highly sought after leading brands. We assist clients in ensuring the sourcing and purchasing process is as smooth as possible.
Our professional knowledge, expertise, service and capabilities cannot be matched by any other locally based business. Our experience in the field of metrology equipment spans over more than 25 years and we pride ourselves in working hard to find the best solution at the best possible price.
We with our local partners offer installation, verification / calibration and ongoing support to all our systems.
We are committed to excellence and to supporting our customers with our best attention at all times.
Products and Services
We can help you to source the right measuring and calibration product for your application.
We provide calibration and verification services, mechanical and electronic service for faultfinding, installation, upgrades all through assistance of our local partners.
Major Projects
- Other
Other Projects
Measuring equipment supplier to companies supplying to tier 1 suppliers in Australia. | https://defencesa.com/industry/industry-directory/aisa-sa/ |
All relevant data are within the paper and its Supporting Information files.
Introduction {#sec001}
============
Combating pathogens would benefit from mechanistic insights into the molecular machinery involved in infection. Bacterial type III secretion systems (T3SSs) are inner membrane complexes that guide protein self-assembly to form large periplasmic structures. T3SSs are responsible for the assembly of two closely related, determinate structures: flagella, which are propellers used for bacterial motility; and injectisomes, which are molecular syringes that use their T3SS to inject effector proteins in to host cells.
A transmembrane export gate comprising five proteins forms the mechanistic core of the T3SS. The export gate has an essential role in energizing secretion as well as coordinating substrate-specificity for ordered assembly. The five export gate proteins are FlhA, FlhB, FliP, FliQ and FliR under flagella nomenclature (SctV, SctU, SctR, SctS, SctT in unified injectisome nomenclature), and are conserved across flagella and injectisomes. In contrast to the non-essential cytoplasmic ATPase complex \[[@pone.0164047.ref001]--[@pone.0164047.ref003]\], the export gate proteins are all essential for secretion \[[@pone.0164047.ref004]\]. The export gate harnesses a proton motive force \[[@pone.0164047.ref003]\] to drive substrate proteins out through a 2nm channel in the filamentous assembly \[[@pone.0164047.ref005]\], requiring substrates to be unfolded for secretion \[[@pone.0164047.ref006]\]. A structural protein of the FliF family forms a confining ring (MS ring) of 24nm inner diameter \[[@pone.0164047.ref007]\] in the inner membrane around the export gate \[[@pone.0164047.ref008], [@pone.0164047.ref009]\]. It is unknown whether a lipid bilayer exists within the MS ring, but all five export gate proteins are strongly predicted to be alpha-helical transmembrane proteins from their sequences. The cytoplasmic domain of FlhA is known to form a nonameric ring \[[@pone.0164047.ref010]\] and to bind the chaperones of late substrates, which has been suggested to finely control the assembly of the pentameric cap on the growing flagellum \[[@pone.0164047.ref011]\]. The transmembrane domain of FlhA may form a proton pore for transduction of the PMF \[[@pone.0164047.ref003], [@pone.0164047.ref012]\]. FlhB cytoplasmic domain participates with a "molecular ruler" to switch substrate specificity when flagellar hooks and injectisome needles reach their full length \[[@pone.0164047.ref013]\].
Insight into the molecular mechanism of T3S has been hampered by the lack of information on the structure of this five-protein export gate. Most work has centered upon the cytoplasmic regions, with structures of flagellar C-ring \[[@pone.0164047.ref014]--[@pone.0164047.ref016]\] and ATPase complex proteins \[[@pone.0164047.ref017], [@pone.0164047.ref018]\] obtained by X-ray crystallography and located *in situ* by electron cryo-microscopy methods \[[@pone.0164047.ref010], [@pone.0164047.ref019]--[@pone.0164047.ref021]\]. Considerably less is known about the structures of the transmembrane proteins, due partly to the intrinsic challenges these proteins pose to crystallograpic and electron cryo-microscopic methods. Whilst structural information has been obtained for a FliF homolog \[[@pone.0164047.ref022]\] and the cytoplasmic domains of FlhA \[[@pone.0164047.ref011], [@pone.0164047.ref023]\] and FlhB \[[@pone.0164047.ref024]\] homologs, the structures of the transmembrane domains of the five export gate proteins remain completely unknown, despite these being the most critical mechanistic proteins.
The recent success of correlated substitution analysis in the prediction of globular protein structure has also been extended to the more constrained case of *α*-helical transmembrane proteins, where its success has been striking \[[@pone.0164047.ref025]\]. (See \[[@pone.0164047.ref026]\], for a review). Correlated substitution analysis is used to generate distance constraints for model construction, under the assumption that if mutation at one residue is correlated with mutation at another residue, then they are likely to be proximal in the protein fold. The success of these methods depends on having typically thousands of sequences in a multiple sequence alignment. Since the export gate proteins are sufficiently widespread in bacteria, we investigated the application of correlated substitution methods to predict their possible structures.
Here we describe a novel consensus approach to the analysis of correlated substitution results; combining the predicted contacts from three different methods and using these to construct molecular models generated by up to four different modelling approaches.
Materials and Methods {#sec002}
=====================
The recent success of correlated substitution analysis in the prediction of globular protein structure has also been extended to transmembrane (TM) protein structure in which the TM segments are alpha helical \[[@pone.0164047.ref026]\]. Results for this class of protein have been even more successful due to their more limited conformational variation, being composed essentially of just one type of (alpha) secondary structure with helices that are grenerally larger than those found in globular proteins and are predominantly aligned in a single direction so they can cross the lipid membrane \[[@pone.0164047.ref025], [@pone.0164047.ref027]\]. However, the success of all these methods, applied to both globular and TM proteins, depends on having typically thousands of sequences in a multiple sequence alignment. With less than 1000 sequences in the alignment, the predicted contacts are generally not accurate enough to define a unique structure. Fortunately, there are currently sufficient bacterial genomes that any bacterial protein family that is reasonably widespread can expect easily to exceed the 1000 sequence threshold criterion. As the proteins of the type-III secretion system (including the flagellar associated members) are indeed widespread, we investigated the application of correlated substitution methods to predict their possible structures.
Given that the fundamental limitation of sufficient sequences is met, there follow choices to be made in how these are filtered or weighted to remove or down-weight close homologues, and how gaps are treated. There is then a choice of methods that can be used to calculate co-varying sites and for each of these, a cutoff or weight can be applied to quantify which predicted contacts can be trusted. Given a set of likely contacts, the construction of a protein model to best account for these is not a simple or well defined problem and different methods and also repeated runs of the same method will produce different structures that cannot easily be distinguished within the uncertainty associated with the predicted contacts. In addition to these choices that are intrinsic to the approach, there is also choices to be made on the degree to which other extrinsic constraints should be applied, such as the statistical prediction of TM-helical segments (also by a variety of methods), the prediction of lipid exposure and any external cross-linking constraints.
Our approach in this work is to use all available methods to generate both constraints and models and combine these to produce a final consensus model. [Fig 1](#pone.0164047.g001){ref-type="fig"} gives an overview of the methods that we used, all of which will be described below.
{#pone.0164047.g001}
Coevolution analysis {#sec003}
--------------------
Each of the co-evolution analysis methods described below also perform their own sequence search using either jackHmmer or a similar program. In each server we accepted the default search parameters.
**PSICOV:** Sequences were submitted to the PSICOV server at: <http://bioinf.cs.ucl.ac.uk/MetaPSICOV/> and also calculated using a local (in-house) copy if the original program \[[@pone.0164047.ref028]\].
**Gremlin:** Sequences were submitted to the Gremlin server at: <http://gremlin.bakerlab.org/submit.php> \[[@pone.0164047.ref029]\].
**EVfold:** Sequences were submitted to the EVfold server at: <http://evfold.org/evfold-web/evfold.do> \[[@pone.0164047.ref030]\].
**Contact segment parsing:** Following a long tradition on the analysis of packing of *α*-helices in globular proteins based on the analysis of hydrophobic stripes \[[@pone.0164047.ref031]--[@pone.0164047.ref035]\], a similar approach was adopted to the analysis of features in the predicted contact maps. These often exhibit stripes parallel to or orthogonal to the contact map diagonal indicating parallel and antiparallel packing respectively. These trends were automatically assigned according to the relative strengths of a regression line fitted in both directions with the additional refinement that the total fit over all helices was maximised by allowing the fitted segment ends to shift. A solution to this problem was obtained using dynamic programming \[[@pone.0164047.ref036]\], similar to the applications to transmembrane segment prediction \[[@pone.0164047.ref038]\] and parsing linear structural segments \[[@pone.0164047.ref039]\]. Given the parallel/antiparallel scores for each interaction, it would be possible to select the best overall assignment of orientations that are consistent with an alternating in/out topology. However, we did not impose this as it has the danger of obscuring missing helices (that were not predicted) or re-entrant helices. The consistency of the unbiased local assignments also gives some indication of the quality of the predicted contacts.
Model construction {#sec004}
------------------
**TM-helix prediction:** Sequences were extracted from the non-redundant NCBI sequence databank using the jackHmmer program \[[@pone.0164047.ref040]\] and reduced to a small non-redundant selection for sequence analysis \[[@pone.0164047.ref041]\] which included secondary structure prediction using PsiPred (\[[@pone.0164047.ref042]\]). TM helices were predicted as a consensus of the methods caluclated by the `TOPCONS` server (<http://topcons.cbr.su.se/>) \[[@pone.0164047.ref043]\], supplemented by the `MEMSAT` methods \[[@pone.0164047.ref038], [@pone.0164047.ref044], [@pone.0164047.ref045]\]. Although individual prediction piplines associated with each model construction method apply their own (ususlly in-house) method, for consistencey in comparison, we preferred to use an external method that was common to all and so focused on the TOPCONS consensus.
**`FILM3`:** The program FILM3 \[[@pone.0164047.ref025]\] is a specialised version of the MEMPACK program \[[@pone.0164047.ref046], [@pone.0164047.ref047]\] incorporating correlated mutation constraints. These programs follow the fragment assembly approach of the FRAGFOLD program but adapted for TM-proteins to include a pre-calculation of the TM-segments and an optional constraint that can be applied to their residue positions relative to the membrane (Z-filter). Otherwise the program uses a Monte-Carlo (MC) approach to assemble fragments of protein structure to satisfy the given constraints. By its nature, MC modelling is a rather haphazard process and requires many attempts over many iterations to obtain successful (compact) solutions. For each condition tested we therefore made typically 100 models trying from 10 up to 50 million iterations. Tests were carried out both using the PSICOV, EVfold and GREMLIN constraints. As discussed further below, the program was applied without the Z-filter constraint. A parameter file for a 20M step run is shown in [Fig 2](#pone.0164047.g002){ref-type="fig"}.
{#pone.0164047.g002}
**`Rosetta-TM`:** Rosetta also employs an MC-based fragment assembly approach to modelling and it too has a specialiesd TM-protein modelling variant that uses externally predicted helical segment definitions and an estimate of lipid exposure. In addition to these, the pairwise constraints calculated by GREMLIN can be applied as a set of contact distances to the *β*-carbon atoms with parameters calculated by GREMLIN to reflect their degree of reliability. Rosetta was run using the following command line shown in [Fig 3](#pone.0164047.g003){ref-type="fig"}, where the `.span` file is the TM-segment definitions and the the `.lips` file is the TM-segment lipid exposure estimates calculated by the LIPS method. The `increase_cycles` parameter, which controls the length of the run, was tested over a range of values from 10 to 100. The constraints file (`.cst`) was taken from the GREMLIN server and different values of the `constraints:cst_weight` parameter were tested in the range 1 to 20.
{#pone.0164047.g003}
**`Modeller/TMpack`:** Although Modeller is primarilly used for homology modelling, it has the capacity also to satisfy any set of distance constraints. Compared to the preceeding methods, this is a relatively direct (so fast) calculation but with a conformational search range limited by the degree of variation that is found within the given template structures. To overcome this limitation, we revived an old method (TMpack) that generates a combinatorial selection of ideal folds based on a twisted lattice of helices \[[@pone.0164047.ref048]\]. Each of these folds was expanded into a range of variations using a coarse-grainned helix packing method \[[@pone.0164047.ref037]\] to produce a sample of structures that was taken by Modeller as structural 'homologues'. Modeller takes these variants for each fold as multiple templates and synthesises a combination of their parts that best satisfies the given constraints plus the local helix geometry for each predicted TM-segment. A typical modeler Python command script is shown in [Fig 4](#pone.0164047.g004){ref-type="fig"} which uses 10 template structures selected from the TMpack models that best satisfied the constraints. Only one model is constructed as the variation between multiple modeller models is small compared to the variation between the TMpack models.
{#pone.0164047.g004}
Model evaluation and analysis {#sec005}
-----------------------------
Each of the model construction methods incorporate a score based on their own internal 'energy' calculations, which makes comparison between models from different methods based on these scores difficult. To avoid this problem, we have assumed that each method produces models with a molecular geometry that is good enough for the rough level of accuracy we require and focused our assessment on the degree to which the model satisfies the given constraints.
**Contact evaluation:** As we are interested only in the path of the chain (the fold), the details of the atomic interactions will be ignored allowing us to focus on the *α*-carbon trace. However, it remains useful to distinguish interactions between one face of a helix and its opposite face, which at the *α*-carbon level is a differnece of only a few Ångstroms. To exaggreate this difference, we extended the *α*-carbon position towards a pseudo-*β*-carbon/centroid location by placing a dummy-atom 2Å beyond the bisector of adjacent *α*-carbon --*α*-carbon virtual bonds. In evaluating a rough model using just a pseudo-centroid position, a strict cutoff distance on a contact definition is not ideal and instead we employed a 'soft' cutoff based on a Gaussian function with a maximum at 5Å, which is roughly around the expected minimum separation of the pseudo-centroids in native structures. The strictness with which contacts are evaluated can then be determined by the spread of the Gaussian The inverted distance, *q*, was defined as: *q* = exp((*d* − 5)^2^/*s*^2^), where *d* is the observed pseudo-centroid separation and *s* is the parameter that determines the spread. (*c*.*f*. the standard deviation in the normal distribution).
Given the Gaussian spread parameter, each predicted contact can be scored on the model as a combination of the contact reliability, *p*, (typically a score from 1...0, from strong to nothing) and the Gaussian transformed distance, *q*, (1...0 from ideal...far). A sum of the product of these two values over the set of *N* top predicted pairs produces a score that is highest when the strongest pairs approach the ideal separation. A value of *s* = 5 was used as the spread value which means that separations greater than 10Å will score less than 0.37 and beyond 15, almost zero. Note that separations under 5Å are also slightly penalised with a value of zero also scoring 0.37. The number of residue pairs summed over was taken as *N* = 100 which did not include any interactions with a sequence separation less than 8 (two turns of a helix) to prevent the score being dominated by local interactions. Model rankings were relatively insensitive to the choice of *s* and *N* and variations up and down by a factor of 2 made little difference.
One remaining problem with scoring models across methods was that although the contact reliability values (typically termed a 'probability') span the range 0...1, they often have different distributions which will alter the balance of their oveall scores. (Especially the EVfold score which drops off almost exponentially). To reduce this effect, the scores were ranked and converted to a score (*e*) using the Gaussian transformation: *e* = *exp*(−*r*^2^\*0.01/*N*), where *r* is the rank of the pair and *N* is the number of residues in the protein. Using this formula, the number of pairs above a fixed value of *e* rises in proportion to the square-root of the protein length.
**Radius of Gyration:** The Radius of Gyration (RoG) is a useful measure of structural compactness often used to evaluate models of globular proteins \[[@pone.0164047.ref049]\]. For TM-proteins, it is of additional interest to see how well the helices align across the membrane. As the membrane is not represented, we devised a measure that calculates an average axis for the bundle of helices based on their terminal residues (caps), about which an axial RoG can be calculated. Each TM-helix was assigned two capping zones of 4 residues each including, as a minimum, the two terminal residues and the two beyond but extending outwards up to 10 positions in situations where the TOPCONS prediction were variable. Distances between all capping residues were measured and beginning with the most widely separated pair, average axis points were accumulated by adding the remaining pairs in order of separation distance, taking account of orientation. Three RoG values were then calculated about this axis using just the TM-segments, TM+caps (with caps weighted by half) and the whole chain with TM-segments double weight, caps unit weight and the rest half weight. The RoG about this axis is useful mainly to identify models that are not compact. This is a particular problem with methods using a fragment assembly approach (FILM3 and ROSETTA) as often one or two helices cannot be brought into a compact bundle in the allocated time. These then make a very large contribution to the RoG and as a rough guide, any model with an RoG over 15 is likely to have one or more 'stray' helices and any model with an RoG over 12 should be checked. These rough guide-lines will vary slightly depending on the size of the protein.
**Root mean square deviation:** Models were compared using the Root Mean Square Deviation (RMSD). However, this is a crude measure based on whole structure superposition and can easily be skewed by a few highly deviant positions (which are not unusual in the rough models constructed below). As the loop regions between the TM-helices are often long and poorly modelled, it is necessary to make allowance for these. Often the TM-align program \[[@pone.0164047.ref050]\] is used for this type of assessment (the TM here does not designate trans-membrane) but as this is a simplistic approach based on RMSD values over disconnected fragments, we preferred to use the `SAP` program that calculates a continuous measure of residue similarity based on local environments calculated from their context in the full structure \[[@pone.0164047.ref051]\]. The degree of similarity in matched environments then provides a weight to apply to that pair in a weighted superposition, from which a weighted RMSD value can be calculated \[[@pone.0164047.ref052]\]. (*N*.*b*.: there is no alignment problem as all models have a one-to-one correspondance so a version of `SAP` was used that only calculates the scores of the residue environments for use in the weighted superposition.) In addition to the SAP-weighted RMSD, three RMSD values were also calculated using the weighting schemes described for the RoG values above.
**Fold-space clustering:** The results of the pairwise similarity within a set of structures can be visualised by treating the RMSD values as Euclidean distances and reducing their dimensionaliy to sufficiently few dimensions to be visualised: usually 2 or, better 3, to visualise the space with less distortion. (*N*.*b*.: in theory, pairwise RMSD values are guaranteed to constitute a consistent Euclidean metric but only in N-1 dimensions, where N is the number of structures compared.) Rather than use a simple multi-dimensional scaling (MDS) method (\[[@pone.0164047.ref053]\]), the more complicated method of multi-dimensional projection was used (\[[@pone.0164047.ref054]\], see \[[@pone.0164047.ref055]\] for a simpler exposition). This method reduces the dimensionality of the projection in gradual stages with each step employing triangle-inequality balancing and hyper-dimensional real-space refinement. In the real-space refinement stages, a weight can be applied to pairwise distances. (This cannot be done in direct MDS projection, which can only assign a mass to each point). Weights were assigned to distances as a function of their inverse RMSD, up to a maximum value of 1. The method is robust and has been widely applied to rough models (\[[@pone.0164047.ref056]\]) and predicted inter-residue distances that constitute highly non-metric data sets (\[[@pone.0164047.ref049]\]).
Results {#sec006}
=======
FlhA {#sec007}
----
**Sequence analysis:** The 7000 odd sequences of flhA found by JackHmmer were reduced to a representative set of thirty (Fig_S1 in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}). The predicted secondary structures were predominantly *α*-helices, eight of which were strongly hydrophobic. The predicted transmembrane (TM) segments were consistent in assigning a cytoplasmic (inside) location for the amino terminus but were equally split on whether the carboxy terminal region should be one or two segments, giving seven or eight segments in total. ([Fig 5](#pone.0164047.g005){ref-type="fig"}). Eight segments would agree with the prediction of the two hydrophobic helices seen in the sequence alignment to be spanning this region and would also locate the carboxy-terminus on the inside, where it would be able to connect with the cytoplasmic domain of flhA that forms a visible ring in the electron micrograph images, located on the cytoplasmic side. However, the linker between the transmembrane and cytoplasmic domains is long and could pass through the central pore without exhibiting classic transmembrane characteristics.
{#pone.0164047.g005}
**Contact prediction:** The contacts predicted using the PSICOV, EVfold and GREMLIN programs are combined in [Fig 6](#pone.0164047.g006){ref-type="fig"} and compared in (Fig_S3 in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}). Of particular interest in the evaluation of the predicted contacts was whether there was evidence of the parallel/antiparallel network of interactions what would be expected from aligned helical segments, in contrast to the semi-random 'tartan' pattern produced by the selection of generic properties (such as hydrophobicity). Guided by the predicted TM-segments (blue bars on the diagonal in [Fig 6](#pone.0164047.g006){ref-type="fig"}), clear regions of parallel/antiparallel packing could be identified in all sets of contacts (upper left) but to a lesser extent in the PSICOV contacts (Fig_S3(b) in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}). Interestingly, the interaction 'stripes' did not correspond exactly to the predicted TM-segments. This does not necessarily mean the the segment predictions are wrong but may be indicative of helical packing extending beyond the membrane (which is often seen in known structures). A clear example is seen in the contacts predicted between helices 5 and 6 which would correspond with extensions incorporating the predicted non-TM helices seem in the central part of the protein (Fig_S1 in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}). In addition, the predicted contacts clearly indicated that the region beyond position 275 forms a helical hairpin, despite being predicted as a single segment by some of the methods included in the TOPCONS server.
{ref-type="supplementary-material"}.](pone.0164047.g006){#pone.0164047.g006}
To quantify this visual analysis, the contact parsing algorithm described in the Methods section was applied, resulting in the assignment of the stronger interactions indicated by the green boxes in [Fig 6](#pone.0164047.g006){ref-type="fig"}. Of the fifteen interactions selected, over half exhibit a clear preference in orientation as indicated by the diagonal line. Applied to the both the EVfold and GREMLIN contacts, the automatic definitions identify a largely alternating pattern of adjacent antiparallel interactions, as would be expected from segments that criss-cross the membrane. The contacts of all three methods were combined giving a consensus prediction and even though the definitions based on PSICOV contacts are slightly less consistent (Fig_S3(b) in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}), they contain additional contacts in the loop regions that may provide useful constraints.
The resulting consensus was completely consistent with the packing of helices that pass alternatively up and down across the plane of the membrane with no evidence of re-entrant helices (or parallel interactions made by extended regions passing through a pore). The thirteen interactions boxed on the consensus assignment ([Fig 6](#pone.0164047.g006){ref-type="fig"}) imply that all helices are contacting in a single bundle with a core consisting of helices 3 to 6. Helices 1 and 2, wrap around this core and do not pack with each other while helices 7 and 8 pack strongly as a hairpin (containing the strongest predicted residue pairings in all methods) but only interact weakly with the main body of the protein through helix 2. These contacts are summarised in the possible packing arrangement shown in [Fig 7](#pone.0164047.g007){ref-type="fig"}. Other possible configurations will be considered below but it should be remembered that, at this level of resolution, it is almost impossible to distinguish mirror-image configurations. This applies also to the relative orientation of sub-domains that are linked through a single pivot. So if the weak interactions to helix-1 are ignored, helices 7 and 8 can swap places. (*N*.*b*.: reference to a mirror image configuration does not imply that the alpha helices have flipped their hand and in the molecular models described below, these all retain their native chirality. However, in rough models, the small contribution from *α*-helix chirality may not be sufficient to discriminate between higher level difference in packing chirality.)
{#pone.0164047.g007}
**Structure prediction:** The interactions identified in the previous section are sufficiently specific to allow the construction of a three-dimensional model. As outlined in the methods section, models were constructed using a variety of methods as *α*-carbon backbone traces and all models were evaluated and ranked using each of the three sets of predicted contacts under the common scoring scheme described in the Methods section.
**TMpack:** The top 50 models generated by enumeration of possible helix packing configurations were refined at a coarse-grainned level using different sized sets of constraints ranging from 90 to 180 in steps of 30. The resulting models were then recombined using the program Modeller (as described in the Methods Section) giving a set of 200 models. Each model was scored using the soft contact evaluation score and plotted against the radius of gyration (RoG) about the axis of the helical bundle (as defined in the Methods Section) using each of the three sources of predicted contacts, along with a combination of all three. (Fig_S4(a-d) in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}, red dots).
**FILM3:** One thousand models were generated using the FILM3 program with run lengths of 20, 30 and 50 million cycles in the ratios 1:3:1, respectively. Compared to the helix-packing approach (which generates only compact models), the stochastic assembly approach of FILM3 generated many models that had helices detached from the core bundle. This is reflected in the greater range of RoG values. However, the best scoring models were comparable to those obtained with helix-packing. (Fig_S4(a-d) in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}, green dots).
**Rosetta:** Initial trials of the Rosetta method, which uses a stochastic assembly approach similar to FILM3, resulted in even less well packed models with lower scores. To see if this was simply the result of poor sampling, 20,000 models were generated. Only the tip of this 'iceberg' is plotted in (Fig_S4(a-d) in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}, magenta dots).
**EVfold:** The EVfold server generates models using various sized subsets of constraints and all of these were re-score so as to make them directly comparable with the previous methods. Although only 50 models were available, they span a range intermediate between the Rosetta and the helix-packing models. (Fig_S4(a-d) in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}, blue dots).
Model selection {#sec008}
---------------
**Top-slice consensus:** To retain a representative sample from each modelling method with each constraint source, a diagonal slice was made across the plots in Fig_S4(a-d) in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"} with a gradient *y* = 10*x* + *c* with the constant *c* chosen in each case to select up to 20 models that lie in the upper-left of the plot: being those with the highest score and/or the lowest RoG. The selected models were then further culled by selecting only those that occur in at least three of the slices. This reduced the models to 54 comprising 9,13,15,17 for each of the methods: FILM3,TMpack,Rosetta,EVfold, respectively. The top-scoring model for each of the methods using the combined constraints was selected as a representative of each set and their helix packing examined. Over the core residues, there was little in common between these models with no pairwise RMS deviations under 10Å, even using the tolerant `SAP`-weighted score. Visulaisation of the central segments of the core helices showed various packing arrangements ([Fig 8](#pone.0164047.g008){ref-type="fig"}).
{#pone.0164047.g008}
Of the four models shown in [Fig 8](#pone.0164047.g008){ref-type="fig"}, the FILM3 configuration of helices has the closest similarity to the idealised packing arrangements shown in [Fig 7](#pone.0164047.g007){ref-type="fig"}(*right*)), with just the positions of the core helices 4 and 5 swapped. The TMpack solution keeps the four core helices as a simple bundle (as in [Fig 7](#pone.0164047.g007){ref-type="fig"}(*right*)) but helix-2 is displaced from the interface between the core and the 7-8 hairpin. The EVfold model has the same core arrangement as FILM3 and retains helix-2 as an interface to the 7-8 hairpin but in a distinctly different arrangement. The Rosetta model has the 7-8 hairpin deeply buried---which is a configuration that seems difficult to reconcile with any rearrangement of the pairwise interactions summarised in [Fig 7](#pone.0164047.g007){ref-type="fig"}.
**Structural clustering:** To see if there was any consensus among the top scoring models, these were all compared pairwise with their similarity measured using the `SAP`-weighted RMSD. The resulting set of RMSD values were treated as Euclidean distances and embedded into a 3-dimensional space as described in the Methods section. The resulting projection shows that models tend to cluster by the method that generated them, either as broad scatterings (Rosetta and EVfold) or as a single relatively compact cluster (FILM3) or as two separate clusters (TMpack). ([Fig 9](#pone.0164047.g009){ref-type="fig"}). The latter bifurcation is a consequence of the combinatorial enumeration folds that results in roughly equal numbers of folds and their mirror-images. (As depicted for the idealised example shown in [Fig 7](#pone.0164047.g007){ref-type="fig"}).
{#pone.0164047.g009}
Despite the good preservation of distances using the gradual projection algorithm, some distortion remains, especially involving the weaker similarities between models derived from different methods. However, by considering the ranked list of similarities, all-bar-three of the 25 closest pairs between models from different sources are between the FILM3 models and the larger TMpack cluster (located towards the lower right of the fold-space image in [Fig 9](#pone.0164047.g009){ref-type="fig"}). This joint cluster, which also incorporates a few Rosetta models can be summarised by the simple network: Where T, F and R represent TMpack, FILM3 and Rosetta models, respectively, with "==" linking the most similar pairs.
The heart of this network is formed by the TMpack model ranked 10 (T10), FILM3 model 6 (F6) and TMpack model 8 (T8). The superposition of the F6 model with all its adjacent TMpack models showed little discrimination using an (unweighted) RMSD measure but visual inspection revealed that only the T10 model had the same packing arrangement as its FILM3 neighbours, with just a change in relative tilt of the 7-8 terminal hairpin. All the others had helices in swapped positions, which is a change that is also difficult to detect even in smaller globular proteins using an RMSD metric \[[@pone.0164047.ref057]\]. The three core FILM3 models all had the same fold which was a good approximation to the right-handed enantiomer depicted in [Fig 7](#pone.0164047.g007){ref-type="fig"}(right). The cumulative RMSD values from their superpositions with each other (green) and their neighbours in the network, including T10 (blue), are plotted in (Fig_S5(a) in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}).
**Consensus model:** The convergence of the FILM3 and TMpack methods on a common solution that corresponds closely to what might be expected from the simple analysis of helix packing ([Fig 7](#pone.0164047.g007){ref-type="fig"}) opens the possibility to construct a consensus model. To do this, the same Modeller protocol that was used by TMpack was employed ([Fig 4](#pone.0164047.g004){ref-type="fig"}) but using a database of "homology" models consisting of the three FILM3 models (F4, F6, F8) that form the core of the FILM3/TMpack cluster ([Fig 9](#pone.0164047.g009){ref-type="fig"}), along with three variants of the TMpack model (T10), generated with 120, 150 and 180 constraints. When examining the origin of the T10 model, it was found to have converged towards the FILM3 models from a starting configuration in which helices 7 and 8 were farther apart and helix 1 and 2 were displaced to the side (adjacent to helices 3 and 4 in the configuration of [Fig 7](#pone.0164047.g007){ref-type="fig"}). Investigation of why a better starting configuration had not been used, revealed that the configuration closest to that in [Fig 7](#pone.0164047.g007){ref-type="fig"} had fallen below the score cutoff used to select the top 50 folds. For completeness, the packing represented in [Fig 7](#pone.0164047.g007){ref-type="fig"} were manually entered and three variants of the corresponding model were selected and added to the mix for Modeller to use. The resulting consensus structure produced by Modeller from this collection was a good representation of all the contributions as can be seen from the cumulative RMSD plot (Fig_S5(b) in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}). Two variants of the final consensus structure were generated using Modeller, one with the 'default' transmembrane helical segments and an alternative with the long loop regions modelled as helical extensions of the TM-segments ([Fig 10](#pone.0164047.g010){ref-type="fig"}).
{#pone.0164047.g010}
FlhB {#sec009}
----
**Sequence analysis:** The reduction of the flhB sequences to a representative set indicated four main helices, each of which were, to varying degrees, predicted as TM segments (Fig_S7 in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}). Smaller helices were predicted in the central region and at the amino-terminus. Being deleted in some of the sequences, the latter may be a signal peptide but is very hydrophilic and is not identified as such by the TM prediction methods, which predict predominantly four segments, oriented with the amino terminus on the inside (cytoplasmic). ([Fig 11](#pone.0164047.g011){ref-type="fig"}). The two halves of the flhB sequence are sufficiently similar that they were aligned to each other to check for any matching motifs. (Data not shown). Although there was little except the generic sequence correspondence expected from two similar sets of secondary structures, it would not be difficult to imagine that the protein had its origin in an ancient gene duplication event.
{ref-type="fig"}).](pone.0164047.g011){#pone.0164047.g011}
**Contact prediction:** The contact predictions by all three methods were remarkably consistent, and as such, only the GREMLIN result is shown as a representative, along with the consensus of all three methods. These contacts predict two long and strong helical hairpins formed by helices 1+2 and 3+4 but with only a single clear additional packing between helices 1 and 4. This would imply a less compact packing arrangement, which is consistent with the greater degree of variation seen in the multiple sequence alignment.
**Structure prediction:** Given the exceptionally clear contact prediction for the flhB sequence over all methods, there is effectively only one possible packing arrangement, which is a pretzel-like arrangement of the helices bringing helices 1 and 4 together in an open structure with their termini entwined (as indicated by the contacts in the lower-left of the contact matrix ([Fig 12](#pone.0164047.g012){ref-type="fig"}). However, there are a few scattered contacts involving the start of helices 1+3 and the (C-terminal) ends of 2+4. This suggests a more compact packing at one end of the molecule rather like the catcher's glove in the game of base-ball. This raises the problem of whether it is a right or left handed glove. (*N*.*b*.: as with any set of distance constraints, it should also be remembered that a multimeric domain-swapped configuration can account equally well for the data. However, following William of Occam, we will restrict our immediate attention to monomeric solutions.) Following the approach used with the flhA protein, to elicit a preference between these enantiomers, the models generated by FILM3, TMpack and EVfold were clustered. (Given the amount of computing time used by the Rosetta method to produce ambiguous results with flhA, this method was avoided.) As above, those with the best combinations of score and compactness under each of the prediction methods (and their combination) for each of the modelling methods, were top-sliced into a pool of best models. However, given the narrower range of scores in this smaller protein and its consistent set of contacts, a single cutoff line was used for each set of contacts (Fig_S11(b) in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}).
{ref-type="fig"}.\
(See Fig_S9 in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"} for individual plots).](pone.0164047.g012){#pone.0164047.g012}
The models that passed the "cut" were then compared pairwise and plotted in fold-space. ([Fig 13](#pone.0164047.g013){ref-type="fig"}). The FILM3 method favoured open (pretzel) structures whereas, with its origin on a compact lattice, the TMpack method preferred 4-helix bundles and the EVfold method lay somewhat between. By systematically enumerating packing arrangements, the TMpack method generated bundles of each chirality and when plotted in fold-space, these (literally) depict the dilemma of enantiomer choice as a pair of 'horns'. As viewed in [Fig 13](#pone.0164047.g013){ref-type="fig"}, the clockwise packing lies to the right and anticlockwise to the left (as viewed down the bundle with the first helix approaching). These are linked by a scattering of other models but there is a clear asymmetry, especially in the EVfold models, suggesting a preference towards the anti-clockwise configuration.
{ref-type="sec"}) with models: TMpack = red, FILM3 = greenand EVfold = cyan.](pone.0164047.g013){#pone.0164047.g013}
Six structures were selected from the region in fold-space where the three methods converge. These were compared pairwise and were found to be similar enough to be combined using Modeller. The resulting consensus structure ([Fig 14](#pone.0164047.g014){ref-type="fig"}) is a good fit to all its constituent component structures used by Modeller (Fig_S11(b) in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}) and also to the constraints. However, the lack of constraints between helices 2 and 3 (green and orange in [Fig 14](#pone.0164047.g014){ref-type="fig"}) means the structure may be more open towards the top (as viewed in the figure).
{ref-type="supplementary-material"}.](pone.0164047.g014){#pone.0164047.g014}
FliP {#sec010}
----
**Sequence analysis:** Like the flhB sequences, two pairs of TM helices are predicted in the amino and carboxy regions but with a more extensive non-TM helical region lying between them with the possibility that the carboxy terminus also forms a separate shorter helix (Fig_S12 in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}). The TM predictions show some variation but overall are consistent with the four TM segments with the shorter C-terminal helix being part of the final segment. The variation in the methods is partly caused by the ambiguous interpretation of the N-terminal region either as a TM segment or a signal peptide. ([Fig 15](#pone.0164047.g015){ref-type="fig"}).
{ref-type="fig"}).](pone.0164047.g015){#pone.0164047.g015}
**Contact prediction:** Interpreting the contact predictions in terms of the four predicted TM-segments gives an incomplete picture, with inconsistent adjacent packing orientations indicated and a number of strong predicted contacts unaccounted for (Fig_S14 in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}). However, adding two additional segments to correspond to the helices predicted in the non-TM middle segment of the sequence and splitting the first TM-segment generated a more coherent assignment ([Fig 16](#pone.0164047.g016){ref-type="fig"}). The observed pattern of contacts suggest two TM helical hairpins 1+2 and 3+4 with the non-TM helices forming interactions between these pairs at a level above the plane of the membrane. Within the membrane, the stronger interactions between the hairpins involve mainly helix-1 but in the half that is closer to the hairpin, leaving the first half of the helix with almost no interactions. This mis-match of levels is investigated below using 3D modelling.
{ref-type="fig"}.\
(See Fig_S15 in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"} for individual plots).](pone.0164047.g016){#pone.0164047.g016}
**Structure prediction:** The packing analysis of the previous section suggests that the structure of fliP might resemble another 4-helix TM-bundle with some additional helical segments packing in the link between TM-segments 2 and 3. However, a simple model constructed along these lines indicated that extensive predicted contacts run along the bundle axis. ([Fig 17](#pone.0164047.g017){ref-type="fig"}). The predicted contacts that lie at opposite poles of the model can be easily brought into a reasonable range by flipping the 1+2 segments relative to the 3+4 segments. However, this arrangement is less consistent with the membrane topology predictions that indicate a periplasmic location for both the amino and carboxy termini (See ref. \[[@pone.0164047.ref058]\] and [Fig 15](#pone.0164047.g015){ref-type="fig"}).
{#pone.0164047.g017}
An alternative solution that maintains the in/out polarity of the helices is to introduce a large displacement between the 1+2 and 3+4 TM segments. As this is too large a shift for TMpack to explore from starting models like that in [Fig 17](#pone.0164047.g017){ref-type="fig"}, this was introduced manually by redefining the helical segments that should lie in the plane of the membrane. Both FILM3 do not have the constraints of a starting lattice so are free to explore the possibility of such a shift.
To allow scope for conformational exploration, 100 models were generated with FILM3, running for 20 million cycles, using each of the sets of predicted contacts from gremlin, psicov and EVfold (producing 600 models). Similarly, TMpack was run with each of the sets of contacts and their combination, generating 200 structures. The EVfold server returned the default 50 structures. These were all scored by each method and filtered as with the previous proteins to retain models that were compact and/or high scoring (Fig_S17 in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}).
To retain a reasonable sample of EVfold models, the cutoffs were reduced and the excess FILM3 and TMpact models culled by discarding those that recurred least often. Those remaining were then compared pairwise and plotted in fold-space. ([Fig 18](#pone.0164047.g018){ref-type="fig"}). In this it can be seen that the TMpack solutions (red) are all similar and are adjacent with the more extended FILM3 cluster (green). Four models from each method were selected at this interface, along with the EVfold outlier lying towards the right side of the plot. From a visual assessment of their superposition, these models all had a similar core topology and were passed to Modeller to construct a consensus model. ([Fig 19](#pone.0164047.g019){ref-type="fig"}).
{ref-type="sec"}) with: TMpack red, FILM3 green and EVfold cyan.](pone.0164047.g018){#pone.0164047.g018}
{ref-type="fig"}, the contacts (dark blue bars) are now all much shorter. The cumulative RMSD plots of the consensus model against the set of models from which it was constructed can be seen in Fig_S18(b) in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}.](pone.0164047.g019){#pone.0164047.g019}
The consistency of the final consensus structure was assessed by comparing it with each of the models used by Modeller. This revealed one of the FILM3 models to have a high deviation and the consensus was regenerated without it, producing the more consistent result shown in Fig_S18(b) in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}.
FliQ {#sec011}
----
**Sequence analysis:** In contrast to the preceding proteins, FliQ is rather simple: having two predicted helical segments, and although these tend to merge in the psipred predictions, there is a clear region of more negatively charged residues between them (Fig_S19 in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}). This prediction is supported by the TM predictions which indicate two TM segments with a topology placing the termini inside. ([Fig 20](#pone.0164047.g020){ref-type="fig"}).
{ref-type="fig"}).](pone.0164047.g020){#pone.0164047.g020}
**Contact prediction:** The contact predictions confirm the helical hairpin packing suggested by the sequence analysis and are consistent across the three methods ([Fig 21](#pone.0164047.g021){ref-type="fig"}). When examined individually, the plots show an unusual and consistent bifurcation of the contact stripe (Fig_S21(a-d) in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}). The different slopes of the two contact stripes could be explained by two distinct packing angles between the helices. This could be explained either by the co-existence of two conformations, by a dynamic transition between two conformations or by a multimeric interaction that has a different packing from the intra-molecular packing.
{ref-type="fig"}.\
Although simple, all methods show a consistent birfucation of the interaction (Fig_S21 in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}).](pone.0164047.g021){#pone.0164047.g021}
**Structure prediction:** Given the clear and trivial nature of the fliQ contacts, a molecular model was not constructed.
FliR {#sec012}
----
**Sequence analysis:** FliR returns again to a more complex situation with seven predicted helices, six of which are potentially TM segments (Fig_S22 in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}). This ambiguity is compounded by the TM topology predictions which range from six to eight segments with a variety of in/out topologies. ([Fig 22](#pone.0164047.g022){ref-type="fig"}). The level of sequence conservation is not high (beyond what is expected for alternating hydrophobic and polar segments), however there are a few almost absolutely conserved positions, including an arginine in the middle of the first TM-segment, a glycine in the third segment and a proline in the fifth. These positions will be re-examined below in the light of a predicted structure. The only other feature of note is that the sequences contain an unexpectedly high proportion of methionine residues, with over 10% in the *Campylobacter* sequence modelled below, twice as many as alanine. However, no positions exhibit any marked methionine conservation.
{ref-type="fig"}).](pone.0164047.g022){#pone.0164047.g022}
**Contact prediction:** The interpretation of the predicted contacts using the consensus MEMSAT predictions (Fig_S22 in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}). is, in contrast to the topology predictions, remarkably consistent. Although the PSICOV contacts appear to be more 'noisy', the consensus of all three methods predicts a consistent packing with strong packing between helices 1-2-3 (but not 2-3) and hairpins formed between 3-4 and 5-6 but little between 4 and 5. There is some suggestion of contact between 6 and 3 but only in the 3-4 + 5-6 connecting loop region. These interactions, which lack contacts involving the amino and carboxy helices, suggest a more extended structure, with the helices packed in staggered zig-zag like arrangement. Like the less compact FlhB, this would be consistent with the higher degree of amino acid variation seen in the multiple sequence alignment (Fig_S22 in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}).
**Structure prediction:** As above, the structures were predicted using the FILM3 program, constructing 100 models with the 'default' 20 million cycles for each of the three predicted sets of constraints (giving 300 models). The TMpack/Modeller combination was run initially using the default TOPCONS definitions with the 60 top constraints from each of the three constraint sets. However, visual examination of the models suggested that the models would be better packed if the helical definitions were extended into the boxed segments suggested by the contact parsing algorithm ([Fig 23](#pone.0164047.g023){ref-type="fig"}). With these definitions, a further set of models was constructed both using 60 and 120 constraints, giving in total, 300 models. The EVfold server returned the default 50 structures.
{ref-type="fig"}.\
(See Fig_S24(a-d) in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"} for individual plots).](pone.0164047.g023){#pone.0164047.g023}
All these models were scored by each method (and their combination) and filtered as with the previous proteins to retain models that were compact and/or high scoring (Fig_S25 in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}). For each scoring scheme, this revealed a distinct segregation between high-scoring but less compact FILM3 derived models with more compact but sometimes lower scoring TMpack models. The EVfold models were neither high-scoring nor compact. This may be a consequence of under-sampling, but rather that try to maintain an even balance of models between methods, they were in this case discarded. (*N*.*b*.: the term "compact" refers to the radius-of-gyration about the axis of the bundle of helices. As will be discussed below, some of these structures are indeed compact but have an ill-defined bundle axis.)
The FILM3 and TMpact models were culled by discarding those that recurred least often across all the scoring schemes to give an even balance of close to 30 models from each method. Theses were compared pairwise and plotted in fold-space. ([Fig 24](#pone.0164047.g024){ref-type="fig"}). In this it can be seen that the FILM3 solutions (green) are all very similar whereas the TMpack models (red) form a half-circle reflecting the clockwise/anti-clockwise packing of the four carboxy-terminal helices. Unlike previous fold-space projections, the FILM3 models remain equidistant from this ring.
{ref-type="sec"}) with: TMpack red, FILM3 green.](pone.0164047.g024){#pone.0164047.g024}
The divergence of the FILM3 and TMpack models derives from the distribution of predicted contacts between the two ends of the packed helices, in which helices 1, 2 and 3 make extensive contacts at one end whereas the contacts between helices 4, 5 and 6 cluster at the opposite end. With no constraint to cross a membrane these two domains were free to bend/twist towards each other whereas in the TMpack models they are confined to opposite ends. In general the FILM3 Z-filter was not applied as displacements, such as those seen in FliP, would have been excluded on the basis of the TOPCONS or MEMSAT predictions which are more simplistic methods that does not take account of 3D packing.
As this distinction is not topological, there exist intermediate structures with some degree of similarity. As with FlhA, the most similar pairings between methods can be arranged in a simple planar network: (where Fn is a FILM3 model and Tm a TMpack model and '==' links the most similar pairs).
From a visual assessment of their superposition, the core of this network (T23,F3,T31,F11,T6,F19) had a similar core topology and were passed to Modeller to construct a consensus model. ([Fig 25](#pone.0164047.g025){ref-type="fig"}) and the comparison of this to its source components revealed a close and evenly spread similarity (Fig_S26(b) in [S1 File](#pone.0164047.s001){ref-type="supplementary-material"}). The consensus model retained the more linear arrangement of the TMpack models but it should be borne in mind that in a complex protein/lipid environment that incorporates a pore, the conventional expectation that extended trans-membrane helices should remain clear of the membrane level, may be broken.
{ref-type="supplementary-material"}.](pone.0164047.g025){#pone.0164047.g025}
The junction between these extensions and the main TM-level also includes the highly conserved proline (P:178) supporting a more kinked conformation. A second conserved proline just at the end of helix-1 and probably provides a "helix-breaker" function. The other two highly conserved positions (R:21 and G:79) pack exactly adjacent, with a separation of 5Å between their *α*-carbons, at the mid-level of the main TM bundle.
Discussion {#sec013}
==========
Structural Analysis {#sec014}
-------------------
**Distribution of hydrophobic residues:** Compared to conventional structure prediction methods, an unusual aspect of our models is that the physico-chemical nature of the amino acid sequence played no part in their construction (beyond the identification of TM segments) as all the covariance analysis methods are 'blind' to the chemical nature of the letters that constitute the multiple sequence alignment. This means that the disposition of hydrophobic and polar residues in the models is unbiased by their properties and can therefore be used as an independent check on which regions of the surface may be exposed or buried or interfacing with membrane lipids.
Both FlhB and, to a lesser extent, FliR have a belt of hydrophobic residues in their central zone that is characteristic of simple transmembrane proteins. In FlhB, a pair of polar residues (GLN 30 and LYS 150) slightly encroach on this region but are oriented towards the protein interior and are close enough to form hydrogen bonds. FliR has more polar residues in the TM-belt region and of those in the protein interior, most are histidines. However, as these positions are not conserved in the multiple sequence alignment, it is unlikely that they are of any functional significance.
FlhA's core is composed of helices 2, 3 and 6 and contains a few polar and fewer charged residues, however, the adjacent portions of helices 4 and 5 and their connecting sequence contain many charged and some polar residues. This region is well conserved and has been the subject of genetic studies \[[@pone.0164047.ref059], [@pone.0164047.ref060]\]. In particular, ASP 208 is juxta-membrane on helix 5 and has been hypothesised to bind a proton as part of the proton influx pathway. Further from the membrane, LYS 203 may interact with the first cytoplasmic loop of FliR as suggested by suppressor mutations which partially restore motility \[[@pone.0164047.ref059]\]. VAL 151, also in the loop, may have a role in substrate selection \[[@pone.0164047.ref060]\].
If it is assumed that the TM-belt in FlhA corresponds with the highly hydrophobic pair of C-terminal helices, then a number of charged positions would be predicted to lie in the membrane zone. These fall towards one side of the helical bundle in helices 4 and 5 and, to a lesser extent, 6. While it is possible that this region may face a solvent accessible pore, the mutation studies mentioned above suggest that this collection of charged residues may constitute the proton channel that drives secretion. Although FlhA is the most likely candidate for the proton translocation function, being the most abundant protein in the export gate \[[@pone.0164047.ref061]\] and essential for secretion \[[@pone.0164047.ref059], [@pone.0164047.ref062]\], a complete transmembrane proton conduction pathway is not obvious in our model.
FliP has the least conventional distribution of polar residues on its surface with one side of the molecule containing a high density of polar and charged residues. These are associated mainly with and around the shorter helices located in the mid-region of the sequence (coloured green in [Fig 19](#pone.0164047.g019){ref-type="fig"}) and predicted in our model as re-entrant helices (i.e., not transversing the membrane). As this conformation is well tethered by predicted constraints, it seems unlikely that they can be relocated away from the TM-belt, thus making this the most likely part of the molecule to be facing towards a pore.
The C-terminal helical hairpin which extends beyond the postulated membrane belt is remarkably hydrophobic for its exposed location in our model. This suggests that it may lie in a buried environment possibly created by multiple copies of FliP around the pore. This would create a ring of the highly conserved methionines that lie in the loop connecting the two helices, perhaps contributing to a gate-keeper function (Marc Erhardt and Thibaud Renault, personal communication).
**Implications for complex assembly:** The manner in which our five component proteins assemble into a pore complex remains unclear and is hampered by a lack of clear experimental evidence, with more reliable estimates of stoichoimetry only available recently \[[@pone.0164047.ref061]\]. A ring of nine FlhA molecules has strong support including structural confirmation of the nonameric packing of the FlhA cytoplasmic carboxy terminal domain \[[@pone.0164047.ref063]\], while the recent results suggests that there may be a ring of five or even six FliP molecules, probably fitting inside the FlhA nonamer, with the other components being present in low copy numbers or as singletons \[[@pone.0164047.ref061]\]. Such an arrangement, placing FliP at the core inside a ring of FlhA, would be consistent with our predicted models but the location of the other components relative to this will require more experimental constraints.
Conclusions {#sec015}
-----------
We have shown that by using a combination of computational methods, consistent three-dimensional molecular models can be proposed for the core proteins of the type-III secretion system (T3SS). We employed a variety of approaches to reconcile disparate, and sometimes inconsistent, data sources into a coherent picture that for most of the proteins indicated a unique solution to the constraints.
The range of difficulty spanned from the trivial (FliQ) to the difficult (FlhA and FliP). The uncertainties encountered with FlhA were largely the result of the greater number of helix packing possibilities allowed in a large protein, however, for FliP, there remains an uncertainty in how to reconcile the large displacement predicted between its two main helical hairpins and their ability to sit together 'happily' across the bacterial inner membrane.
Our predictions were all made on the basis that these proteins exist in the context of a conventional lipid bilayer. To a first approximation, this is supported by the hydrophobic nature of the predicted transmembrane segments, however, it is known that these proteins exist and function as a macromolecular machine that has a high protein density and includes a pore. This could mean that the true structures form interactions that would make them differ from predictions based on the assumption of an isolated molecule. However, given this caveat, when scanned across the protein structure databank, our predictions found partial matches to a variety of proteins known to exist in complex multimeric assemblies.
In the absence of high-resolution structural information on any of these proteins, we believe our predicted models will be of use in building pseudo-atomic models of the T3SS which may provide mechanistic insights. With the rapid advances seen in electron cryo-microscopy, these models, together with stoichiometric data, may form the basis for interpreting medium resolution EM density maps to build pseudo-atomic models of the T3SS. In combination with genetic approaches to verify contacts, it may also be possible to discriminate between inter- and intra-molecular contacts (which are otherwise not distinguishable with covariance analysis), and ultimately to support or reject alternative arrangements of the proteins within the complex.
Supporting Information {#sec016}
======================
###### Supporting figures and text.
The full set of results for each individual method can be found in this file along with some additional analysis of the final models described above.
(PDF)
######
Click here for additional data file.
We thank Marc Erhardt and Thibaud Renault for useful discussion.
[^1]: **Competing Interests:**The authors have declared that no competing interests exist.
[^2]: **Conceptualization:** WRT TMP MB.**Data curation:** WRT TMP.**Formal analysis:** WRT TMP MB.**Funding acquisition:** WRT MB.**Investigation:** WRT TMP MB.**Methodology:** WRT TMP.**Project administration:** WRT MB.**Resources:** WRT.**Software:** WRT.**Supervision:** WRT MB.**Validation:** WRT TMP MB.**Visualization:** WRT.**Writing -- original draft:** WRT TMP MB.**Writing -- review & editing:** WRT TMP MB.
| |
Best writer ever?
Content
FAQ
Those who are looking for an answer to the question «Best writer ever?» often ask the following questions:
📚 Who is the most famous writer ever?
- William Shakespeare — 11.
- William Faulkner — 6.
- Henry James — 6.
- Jane Austen — 5.
- Charles Dickens — 5.
- Fyodor Dostoevsky — 5.
- Ernest Hemingway — 5.
- Franz Kafka — 5.
📚 Which is best writer?
For this paper writing services review, our list of sources includes the best essay writer websites like Trustpilot and Sitejabber. When available, we turn to original user reports on Reddit and various testimonials that we receive personally.
📚 Did luke the gospel writer ever meet jesus?
He and Cleopas met the resurrected Lord on the road to Emmaus (Luke 24). Tradition has always held that the second man was the writer himself (Luke) as it was customary to tell a story this way in his time when he himself was involved.
10 other answers
Aaron Sorkin. Notable Scripts: A Few Good Men (1992), The Social Network (2010), Moneyball (2011) Oscars: Nominated: Best Adapted Screenplay, Moneyball. Won: Best Adapted Screenplay, The Social ...
Dr. John told Rolling Stone that, after Lennon and McCartney, Domino and Bartholomew were "probably the greatest team of songwriters ever. They always had a simple melody, a hip set of chord ...
F. ANDREWS - THE GREATEST WRITER...EVER?
The Best Writers of All Time Fyodor Dostoevsky. William Shakespeare. Leo Tolstoy. Homer. Charles Dickens. Miguel de Cervantes. Victor Hugo. George Orwell. Edgar Allan Poe. J. R. R. Tolkien. Ernest Hemingway. Jane Austen. Mark Twain. Oscar Wilde. John Steinbeck. Anton Chekhov. F…
Famous Authors: The 30 Greatest Writers Of All Time Homer ~850 BCE. Scholars have debated whether Homer was one single author rather than a collection of oral stories but... Sophocles 496-406 BCE. Sophocles, an ancient Greek dramatist, wrote plays that have stood as a model for tragic dramas,..…
The Jane Austen Centre’s website states: ‘Jane Austen is perhaps the best known and best loved of Bath’s many famous residents and visitors.’ Jane Austen was also one of England’s greatest authors, certainly the greatest English novelist and, as some readers say, second only to Shakespeare as the top English writer.
Best Authors Who Ever Lived | Top Writers of All Time: J K Rowling; William Shakespeare; Vladimir Nabokov; Leo Tolstoy; Charlotte Bronte; Charles Dickens; George Orwell; J R R Tolkien; Roald Dahl; Virginia Woolf; Toni Morrison; Haruki Murakami; Gabriel Garcia Marquez; Yasunari Kawabata; Rabindranath Tagore; Kalidasa; Khaled Hosseini; Colson Whitehead; Milan Kundera
12 Novels Considered the “Greatest Book Ever Written” Anna Karenina. Greta Garbo in Anna Karenina (1935), directed by Clarence Brown. Metro-Goldwyn-Mayer Inc. Any fan of... To Kill a Mockingbird. This book cover is one of many given to Harper Lee's classic work To Kill a Mockingbird (1960). The ...
This is a list of best-selling fiction authors to date, in any language. While finding precise ...
13. The Hunt for Red October by Tom Clancy. A military thriller covering the greatest espionage coup in history, The Hunt for Red October features the search for a top secret Russian missile submarine. The sub, called the Red October, is heading west.
We've handpicked 22 related questions for you, similar to «Best writer ever?» so you can surely find the answer!How to become a best writer?
Here are ten ways that you can become a better writer today. #1 Read, Read, Read The best writers are voracious readers. There's no better way to improve your writing skills than by reading the works of others.Which writer has the best prose?
- William Shakespeare (1564 -1616) Best known for: King Lear, Romeo & Juliet, Hamlet…
- Fyodor Dostoevsky (1821-1881) ...
- Leo Tolstoy (1828-1910) ...
- Victor Hugo (1802-1885) ...
- Charles Dickens (1812-1870) ...
- J. R. R. Tolkien OBE (1892-1973) ...
- George Orwell (1903-1950) ...
- Mark Twain (1835-1910)
As an activist, Pan-Africanist, sociologist, educator, historian and prolific writer, W.E.B. Du Bois was one of the most influential African American thought leaders of the 20 th century. Growing ...Who is the best american writer?
- Edgar Allan Poe 1809 –1849.
- Herman Melville 1819 – 1891.
- Walt Whitman 1819-1892.
- Mark Twain 1835 – 1910.
- T.S. Eliot 1888 – 1965.
- William Faulkner 1897 –1962.
- Tennessee Williams 1911-1983.
- Kurt Vonnegut 1922 – 2007.
- William Shakespeare (1564-1616) ...
- Jane Austen (1775-1817) ...
- Charles Dickens (1812-1870) ...
- Charlotte Brontë (1816-1855) ...
- George Eliot (1819-1880) ...
- CS Lewis (1898-1963) ...
- George Orwell (1903-1950) ...
- Ian Fleming (1908-1964)
- Mukti Masih. Mukti Masih has been writing content for more than 14 years now, starting her stint with The Times of India…
- Priyanka Desai…
- Samarpita Mukherjee Sharma…
- Bhawna Aggarwal…
- Arti Agrawal…
- Mathew J Maniyamkott…
- Anuradha Tiwari…
- Protima Tiwary.
- Here at No Sweat Shakespeare we have no doubt that William Shakespeare is by far the best writer in English literary history.
- George R. R. Martin…
- Seanan McGuire…
- Brandon Sanderson…
- Patrick Rothfuss…
- J.R.R. Tolkien…
- Nnedi Okorafor…
- Andrzej Sapkowski…
- Robin Hobb.
- Victor Hugo (1802 – 1885) One of France's most famous writers has to be Victor Hugo…
- Alexandre Dumas (1802 – 1870) ...
- Voltaire (1694 – 1778) ...
- Honoré de Balzac (1799 – 1850) ...
- George Sand (1804 – 1876) ...
- Emile Zola (1840 – 1902) ...
- Antoine de Saint-Exupéry (1900 – 1944) ...
- Jean-Paul Sartre (1905 – 1980)
Author and activist Ishmael Beah is best known for his memoir, A Long Way Gone. At age twelve, Beah was forced to become a child solider in Sierra Leone, fighting for almost three years until he...Who is the best mystery writer?
- dennis lehane…
- Carlos Ruiz Zafón…
- walter mosley…
- Parker bilal…
- arthur conan doyle…
- agatha christie. Agatha Christie is a legend who gifted the world with not one, but two iconic fictional detectives…
- Dorothy L. sayers…
- J.K. Rowling. Yes, I know what you're thinking.
- Ring of Bright Water. by Gavin Maxwell.
- The Drowned World. by J G Ballard.
- Findings. by Kathleen Jamie.
- Feral: Rewilding the Land, the Sea, and Human Life. by George Monbiot.
- The Orkney Book of Birds. by Tim Dean and Tracy Hall.
The 25 Best Romance Authors (And Their Most Swoonworthy Reads) Carolyn Brown. Brown has been writing romance for twenty years now — her debut novel Love Is came out in 1999. Since... Catherine Bybee. Bybee is the queen of Amazon’s contemporary romance charts, with her bestselling Weekday Brides and ...Who is the best russian writer?
- Alexander Pushkin. Often regarded as the founder of Russian literature, Pushkin was born in 1799 to a noble family…
- Leo Tolstoy…
- Anton Chekhov…
- Fyodor Dostoyevsky…
- Boris Pasternak…
- Aleksandr Solzhenitsyn…
- Vladimir Nabokov…
- Mikhail Bulgakov.
- Jonathan Franzen. Getty Images…
- Michael Chabon. Getty Images…
- Bret Easton Ellis. Alamy…
- George Saunders. Getty Images…
- Rachel Kushner. Getty Images…
- Anne Tyler. Getty Images…
- Stephen King. Getty Images…
- Percival Everett. Alamy.
- William Shakespeare — 11.
- William Faulkner — 6.
- Henry James — 6.
- Jane Austen — 5.
- Charles Dickens — 5.
- Fyodor Dostoevsky — 5.
- Ernest Hemingway — 5.
- Franz Kafka — 5.
Featuring next on the list of top 10 writers in the world is the popular English writer, Charles Dickens. He came into limelight in 1836 with his book “The Pickwick Papers” and followed it with successful works like “David Copperfield”, “A Tale of Two Cities”, “Oliver Twist”, “Great Expectations” and “A Christmas Carol”.Who was the best beat writer?
Beat writers (also collectively referred to as part of the "Beat Generation" and "Beatniks") flourished in the late 1950s and into the 1960s. The three major Beat writers were Allen Ginsberg, William S. Burroughs, and Jack Kerouac; the three were friends beginning in 1943.Who was the best poetry writer?
I'd say Voltaire
Refresh and try again. Rate this book. Clear rating. 1 of 5 stars 2 of 5 stars 3 of 5 stars 4 of 5 ...What's the best book ever?
- Anna Karenina. Greta Garbo in Anna Karenina…
- To Kill a Mockingbird. To Kill a Mockingbird…
- The Great Gatsby. F…
- One Hundred Years of Solitude. Gabriel García Márquez…
- A Passage to India. E.M. Forster…
- Invisible Man. Ralph Ellison…
- Don Quixote. Don Quixote…
- Beloved. Toni Morrison. | https://booksfaq.com/best-writer-ever |
What’s it about?
While dealing with the loss of her grandmother, Isabella (Guest) is tasked to pack up the now empty house alone. While sorting through Nana’s (Sandison) old stuff, she comes across a single puzzle piece attached to a note that reads, “FINISH IT.” When night falls, a disturbing presence is unearthed and Isabella must decide her fate.
Here’s the Trailer:
What did I think?
Pieces is a truly terrifying film about losing a loved one and the search to find out why. What started out as curiosity over a single puzzle piece turned into finding the line between this world and the supernatural world. This film is not only haunting, but also impactful.
The tension that builds throughout Pieces had me on the edge of my seat. This was masterfully done through the use of imagery, silence, sound and music. It was the perfect combination for a horror short.
The casting was done well. Each of the women in this film were believable and strong characters. Kristy Guest did an excellent job as the lead in the film. Her Isabella was believable and strong, which isn’t always the case with horror female leads. Kate Sandison was both sweet and terrifying while Louise Willoughby pulled off the naive best friend.
Do I recommend it?
Most definitely. Overall, this short film is amazing.
To find out more about this film and when you can expect it to be released, please visit their website. | https://9thcircleofhorror.com/2016/06/03/review-pieces-2016-short-film/ |
Shares of gold explorer Galway Metals Inc. (TSX-V: GWM) jumped 7 cents on 2.7 million shares on Wednesday following the company's announcement of an upsized $17.35 million combo financing.
Galway plans to issue up to 17.88 million flow-through shares at 63.5 cents each, and up to 13.63 million "hard dollar" common shares at 44 cents each. The deal is underwritten by a syndicate led by Paradigm Capital Inc. and including Laurentian Bank Securities Inc.
Billionaire mining investor Eric Sprott has agreed to purchase $3 million in shares from the offering, increasing his stake in Galway to approximately 3.8%.
Proceeds from the flow-through shares will be used to incur "flow-through" qualifying mining expenditures, while the rest of the proceeds will be used for ongoing exploration and working capital.
Galway Metals owns two gold properties in Canada: the Clarence Stream project in New Brunswick, and the Estrades project, a formerly producing gold mine in Quebec. On Monday, shares of the company got a boost following its report of drill results from the west end of the Richard Zone at Clarence Stream, hitting grades including 6.2 grams of gold per tonne (g/t Au) over 38.5 metres and 10.6 g/t Au over 47.0 metres—the highest grades yet from the deposit. A 2017 resource estimate for the project pegged the resource at 390,000 ounces of gold measured and indicated and 277,000 ounces inferred.
At Estrades, Galway recently drilled 5.2 g/t Au and 19.6% zinc over 5.65 metres. The most recent resource estimate for that project, filed in 2018, places the resource at 543,051 gold-equivalent ounces indicated, and 520,430 ounces inferred.
Galway is led by CEO and founder Robert Hinchcliffe, who previously founded and steered Galway Resources Ltd. to $340 million buyout by AUX Acquisition in 2012. Shares of the company are up 70.15% year-to-date to 57 cents per share. | https://www.privateplacements.com/investing-news/galway-metals-rises-on-1735m-financing-and-solid-drill-results/ |
This application claims the benefit of U.S. provisional patent application 60/579,737, filed Jun. 14, 2004, which is hereby incorporated by reference herein in its entirety.
Annuloplasty prostheses that are less than completely annular are well known as is shown, for example, by Carpentier U.S. Pat. No. 3,656,185. Because such a prosthesis is less than a full ring, it can be difficult to implant the prosthesis so that the tissue to which it is secured cannot spread (or continue to spread) along the length of the prosthesis. A structural member of the prosthesis may be covered with a soft fabric cover. The prosthesis may be sutured into the patient by sutures that pass through the fabric cover and also through adjacent tissue. However, the fabric cover may not be strong enough to resist stretching or to prevent the sutures from tearing out of the fabric, especially near one or both ends of the prosthesis; in which cases the tissue may be able to move (or continue to move) relative to the prosthesis, e.g., by spreading along the length of the prosthesis. Because it is often an objective of the prosthesis to reverse or prevent such tissue movement, the prosthesis may be less effective than desired.
An annuloplasty prosthesis in accordance with the invention is less than a full ring. It is, however, curved to follow a portion of the annulus of a heart valve such as a mitral or tricuspid valve. For example, the prosthesis may be C shaped or U shaped. The prosthesis includes an elongated structural member that basically gives the prosthesis its shape. This structural member has at least two surface portions that are transverse to adjacent portions of the surface of the structural member. These two transverse surface portions are spaced from one another along the length of the structural member. They also face toward one another along the length of that member. When the prosthesis is sutured into a patient, tissue adjacent to each of the transverse surface portions is sutured to the prosthesis by sutures that pass adjacent those transverse surface portions. The presence of the transverse surface portions prevents these sutures and the tissue engaged by these sutures from moving away from one another along the length of the prosthesis.
Further features of the invention, its nature and various advantages, will be more apparent from the accompanying drawings and the following detailed description.
FIG. 1
is a simplified perspective view of an illustrative embodiment of an annuloplasty prosthesis in accordance with the invention.
FIG. 2
is a simplified perspective view of another illustrative embodiment of an annuloplasty prosthesis in accordance with the invention.
FIG. 3
is a simplified perspective view of a portion of yet another illustrative embodiment of an annuloplasty prosthesis in accordance with the invention.
FIG. 4
is a simplified perspective view of a portion of still another illustrative embodiment of an annuloplasty prosthesis in accordance with the invention.
FIG. 5
is a simplified perspective view of a portion of yet another illustrative embodiment of an annuloplasty prosthesis in accordance with the invention.
FIG. 6
is a simplified perspective view of yet another illustrative embodiment of the invention.
FIG. 7
is a simplified perspective view of still another illustrative embodiment of the invention.
FIG. 8
is a simplified perspective view of an illustrative prosthesis in use in a patient in accordance with the invention.
FIG. 9
is a simplified enlargement of a representative portion of an illustrative embodiment in accordance with the invention.
FIG. 10
is a simplified sectional view of a representative portion of another illustrative embodiment of the invention.
FIG. 11
is a simplified sectional view of a representative portion of another illustrative embodiment of the invention.
FIG. 1
10
20
20
22
22
20
10
a
b
As is shown in , an illustrative embodiment of an annuloplasty prosthesis in accordance with the invention includes a structural member that is longitudinal but curved along its length. In addition, structural member has attachment hooks and at respective opposite ends of its length. Structural member is preferably substantially rigid or semi-rigid. At the very least, structural member has sufficient rigidity to cause prosthesis to generally hold a predetermined shape, although perhaps with some flexibility (i.e., ability to move or flex with the tissue to which the prosthesis has been sutured when it is implanted in a patient). A rigid prosthesis exhibits little or no movement or flexing in response to attempted normal movement of adjacent tissue. A semi-rigid prosthesis exhibits more movement or flexing in response to attempted normal movement of adjacent tissue. Prostheses in accordance with this invention may be either rigid or semi-rigid in these terms.
10
20
22
22
20
a
b
Prosthesis is less than a complete ring or annulus. It is, however, curved to follow or correspond to a portion of the annulus of a heart valve such as a mitral valve or a triscuspid valve. In the case of a mitral valve, for example, the main portion of structural member may be curved to follow the posterior portion of the mitral valve annulus, with attachment hook adjacent one trigone of the valve and attachment hook adjacent the other trigone of the valve. As a general matter, structural member has an overall U or C shape.
20
50
22
22
70
20
70
20
70
20
22
60
70
50
50
70
50
70
20
FIG. 1
FIG. 9
FIGS. 10 and 11
FIGS. 10 and 11
FIG. 9
a
b
b
Structural member may be covered with a soft fabric cover (not shown in , but shown at in ). Although this fabric cover may even cover attachment hooks and , it preferably leaves the presence of these hooks visibly evident to a surgeon implanting the prosthesis. Other cover or buffering materials may be used instead of or in addition to fabric. For example, show use of silicone or other generally similar, soft, polymeric material as a substantially continuous coating, cover, or buffering layer over structural member . Note that although in cover has been cut away to reveal structural member inside the cover, cover actually completely covers the features of structural member like attachment hook or loop . If desired, cover material like may be further covered with fabric like (). At least some of the cover material and/or that is used is preferably penetrable by a suture needle and associated suture material. It will be understood, however, that such penetrability of any cover / over structural member is not a requirement for all embodiments of the invention.
20
20
20
22
22
20
20
22
22
22
22
a
b
a
b
a
b
Structural member may be basically flat (i.e., basically two-dimensional and therefore basically lying in an x-y plane), or structural member may have a more complex three-dimensional shape such as a basically saddle shape. By saddle shape it is meant that if one were to look down on the prosthesis, structural member would curve upwardly for some distance as one moved away from each of hooks and along the length of member . Thereafter, however, the curvature of structural member would reverse. In other words, adjacent to hooks and , the z-axis radii of curvature extend upwardly relative to an x-y plane; but where the curvature reverses, the z-axis radii of curvature extend downwardly relative to the x-y plane. All curvature transitions are preferably smooth. The highest point is preferably about midway between hooks and . From above, the prosthesis is still basically C- or U-shaped. Such a saddle shape may better conform to a saddle-shaped heart valve annulus.
22
22
20
22
22
20
22
22
20
10
10
40
30
1
30
2
22
40
30
1
30
2
22
30
1
40
22
30
2
30
1
30
2
22
30
1
22
30
2
22
22
10
22
22
20
50
30
1
30
2
a
b
a
b
a
b
a
a
a
a
a
a
a
a
a
b
b
b
b
b
b
b
b
a
b
b
b
FIG. 8
FIG. 9
Attachment hooks and extend transversely to the length (or surface) of the rest of structural member adjacent to those hooks. Attachment hooks and open toward one another along the length of structural member . Attachment hooks and are preferably prominent enough in the transverse direction (i.e., they extend far enough out from the adjacent surface of structural member ) to securely engage sutures that are passed through those hooks into adjacent tissue when prosthesis is implanted. For example, shows prosthesis implanted in a patient by being sutured to cardiac tissue of the patient. One suture loop, which includes legs and , is passed through attachment hook and the adjacent portion of tissue . In other words, suture loop / passes inside hook (leg ), through some tissue below that hook, outside hook (leg ), and may then be tied together above the hook. Suture loop / is similar with respect to attachment hook (i.e., leg passes inside hook , the suture continues through tissue below the hook, leg passes outside hook , and the suture is tied off above hook ). Additional suture loops (not shown) may be used at other points along the length of prosthesis between hooks and . shows that structural member may be covered by fabric cover , and that suture loop legs like and may pass through that fabric.
22
22
30
1
30
1
10
10
42
10
22
22
22
22
20
30
10
42
22
22
30
1
30
1
30
10
22
30
50
70
a
b
a
b
a
b
a
b
a
b
a
b
FIG. 8
By having sutures inside hooks and (especially suture loop legs and ), the tissue thus secured to prosthesis is prevented from moving away from the ends of prosthesis (e.g., along the length of the prosthesis (i.e., in the directions and at the locations indicated by arrows in )). This helps to keep the length of the portion of the valve annulus that follows prosthesis from getting larger than the length of the prosthesis between hooks and . This is a very desirable attribute for a prosthesis of this type. The securement of tissue adjacent to hooks and is very firm and positive because features of structural member (i.e., the hooks), in cooperation with sutures , directly oppose motion of tissue relative to prosthesis in directions and at locations . In particular, the surfaces of hooks and that are transverse to the adjacent structural member surfaces or length and that are at the bottom of each hook, in cooperation with the suture loop legs and that are in the hooks, make it substantially impossible for suture loops to move beyond the ends of prosthesis . This is the result of direct opposition of two essentially structural members (hooks , on one hand, and sutures , on the other hand). It does not rely on mere frictional resistance, such as a suture tied around a smooth, longitudinal, structural member of the prosthesis. Nor does it rely on the tear-strength of a fabric cover (and/or other cover ) on the prosthesis, such as when the suture merely passes through the cover of an otherwise smooth structural member of the prosthesis.
30
1
30
1
22
22
50
70
22
a
b
a
b
The invention is equally effective whether suture loop legs and contact hooks and directly, or engage the hooks less directly through intervening cover material and/or . Both of these possibilities will be understood to be covered by references herein to contact or engagement between sutures and transverse surface features of a prosthesis structural member (e.g., hooks ).
22
30
30
23
20
30
24
30
60
11
30
FIG. 2
FIG. 5
FIGS. 6, 7
Again, to ensure good and secure engagement between hooks and sutures , the interior of each hook is preferably at least as large as (preferably somewhat larger than) the cross-sectional diameter of suture material . The same is true for the transverse prominence of all other types of transverse surface features shown in subsequent FIGS. For example, the portion of the radius of a ball in that extends traversely beyond the adjacent surface of member is preferably at least as large as the diameter of suture material . The transverse extension or projection of an arm of T in is preferably at least as large as the diameter of suture material . And the interior of any of loops in , and is preferably at least as large as the diameter of suture material .
FIG. 2
FIG. 2
22
20
23
23
30
1
30
2
30
1
30
2
23
20
30
1
30
2
20
23
23
30
1
30
1
30
1
30
2
23
20
a
b
a
a
b
b
a
a
a
a
a
b
b
b
b
shows an alternative embodiment in which, instead of a hook , each end of structural member has an enlarged ball or . shows where the legs , , , and of suture loops can be placed relative to the balls on structural members . For example, suture loop / is preferably placed around structural member (and through adjacent tissue below (not shown)) immediately adjacent to ball . Ball prevents suture loop / from coming off the adjacent end of the prosthesis. This prevents the adjacent tissue from moving relative to that portion of the prosthesis (e.g., away from that end of the prosthesis along the length of the prosthesis). Suture loop / has a similar relationship to ball on the other end of structural member .
FIG. 3
FIG. 1
FIG. 3
FIG. 1
FIG. 3
22
20
30
1
30
2
b
b
b
illustrates an alternative embodiment in which representative hook is turned inwardly of the C- or U-shaped structural member of the prosthesis (rather than being turned outwardly as in ). In other respects the embodiment shown in can be similar to the embodiment shown in . shows illustrative placement of the legs and of a representative suture loop for the purposes of this invention.
FIG. 4
FIG. 1
FIG. 4
FIG. 1
20
22
23
22
30
1
30
2
23
30
1
30
2
22
23
b
b
b
b
b
b
b
b
b
shows another alternative embodiment in which the depicted representative end of prosthesis structural member has both a hook and an enlarged ball on the free end of the hook. Hooks like work like the hooks in (in cooperation with the legs and of the depicted representative suture loop). Ball prevents suture loop / from slipping off the free end of hook . Ball may also help to give the prosthesis a more atraumatic end. In other respects, the embodiment of can be like the embodiment of .
FIG. 5
FIG. 5
FIG. 5
20
24
30
1
30
2
24
20
24
24
30
1
30
2
20
b
b
b
b
b
b
b
b
shows another illustrative embodiment in which the depicted representative end of prosthesis structural member has a transversely enlarged T shape . also shows where legs and of the depicted representative suture loop can be placed relative to T-shaped end . In particular, this suture loop can be tied around structural member just inside of T-shaped end , with, of course, a portion of the suture passing through adjacent tissue (not shown). T-shaped end prevents suture loop / from moving off the end of structural member . Except for this difference in end shape, the embodiment shown in can be similar to previously described embodiments.
FIG. 6
FIG. 1
FIG. 6
60
20
22
22
60
32
1
32
2
60
60
20
10
10
a
b
a
a
shows an alternative embodiment that is basically similar to , but with the addition of another transversely extending structure on structural member approximately midway along the length of that member between hooks and . Structure is a transversely extending eyelet or loop (which may or may not be completely closed). shows legs and of a suture loop that passes through loop (and also through some adjacent tissue (not shown)). This arrangement helps to prevent tissue adjacent to eyelet from moving along the length of structural member relative to that member. This additionally helps to stabilize prosthesis and the adjacent tissue relative to one another. For example, it helps to prevent elongation or enlargement of any portion of the valve annulus that is adjacent to prosthesis .
FIG. 7
FIG. 6
FIG. 6
FIG. 6
60
60
60
20
22
22
60
60
60
32
1
32
2
32
1
32
2
32
1
32
2
32
1
32
2
60
20
a
b
c
a
b
a
c
a
c
a
a
b
b
c
c
a
a
a
c
The embodiment shown in can be similar to what is shown in , but with more eyelets or loops , , and spaced along the length of structural member between end hooks and . Each of eyelets -can be similar to eyelet in , and each of eyelets -can have an associated suture loop /, /, / passing through it in the same manner as is described above for suture loop / in . Additional eyelets -provide even more resistance to movement of tissue along the length of structural member .
FIGS. 10 and 11
FIGS. 10 and 11
70
20
70
22
60
b
show representative portions of other illustrative embodiments in which silicone or other soft, polymeric material is applied as a substantially continuous coating or cover over structural member . Because in these embodiments cover completely covers the transverse structural member features like hook or loop , this cover material should be penetrable by a suture needle and suture material so that the suture material can engage the structural member transverse features in the effective manner described herein for this invention. Completely covering the structural member transverse features as in may have the advantage of increasing the size of the cover material portion through which the surgeon can sew sutures, thereby making suturing easier for the surgeon.
Recapitulating the foregoing in somewhat different terms, a rigid or semi-rigid, C-shaped, annuloplasty prosthesis with anchoring or attachment features is provided. The anchoring or attachment features may be provided at the ends of the prosthesis, along the posterior section of the prosthesis (e.g., for mitral valve use), or in both locations. The anchoring and attachment features disclosed herein securely attach the annuloplasty prosthesis to the mitral valve trigones or annulus, for example. The prosthesis may comprise any of a number of profiles (e.g., a saddle shape, a flat C-shape, an asymmetrical shape, or any other suitable shape). The annuloplasty prosthesis device may be used for mitral valve repair by supporting the posterior section of the mitral annulus and by reducing the diameter of the mitral valve annulus so that the leaflets can once again coapt properly.
FIGS. 1-11
20
50
70
50
70
20
illustrate various embodiments of a rigid or semi-rigid, C-shaped, annuloplasty prosthesis with anchoring or attachment features in accordance with the principles of the present invention. The C-prosthesis may comprise a core . The core may be covered in a fabric sleeve or other protective coating and/or . The cover / may provide additional or alternative means of attaching the annuloplasty prosthesis in place. The core may be comprised of any number of illustrative materials (e.g., a polymer such as ultra-high-molecular-weight polyethylene, polyurethane, ABS, etc.). These materials may allow the core to both flex and hold its shape. Shape memory alloys such as Nitinol may also be used to create such a semi-rigid prosthesis with similar desirable flexibility features.
FIGS. 1-11
FIGS. 1-11
20
50
70
Using anchoring and attachment features like those illustrated in allows the sutures to engage both the core material and the covering /. The hooks, rounded ends, T-shaped ends, and attachment loops illustrated in provide additional features to suture through or around, thereby further anchoring the prosthesis in place.
FIGS. 1-5
FIGS. 1 and 2
FIG. 4
22
23
24
20
illustrate anchoring ends , , that provide gripping features for the sutures so that core may be better integrated with the valve annulus. Features of may be combined to provide an even more secure anchoring end feature such as that shown in . The ends can be of any shape and size suitable to provide the desirable attachment means.
50
70
20
20
50
70
These anchoring and attachment features may prevent tearing of the fabric and/or other cover , because the core of the prosthesis is also sutured to the trigones or annulus. This reduces the ability of core to put stress on the polyester fabric or other covering and/or that is sutured to the trigones or annulus, which may cause tearing.
60
2
60
11
3
1
60
FIG. 6
FIG. 11
FIGS. 6, 7
FIG. 6
FIG. 11
FIG. 7
FIG. 7
The attachment loop shown in or and located at the central posterior section of the annulus (e.g., at the so-called P portion of the mitral valve annulus) may serve a similar purpose as the end attachment features described above. Additionally, attachment loops such as those illustrated in , and may further benefit a mitral valve annulus that continues to dilate posteriorly. The loop(s) will hold the posterior annulus in place without allowing it to dilate further. If sutures engage only the annuloplasty prosthesis's fabric or other covering, the fabric or other covering may stretch as an annulus continues to move and dilate. Thus, regurgitation may again become present during the valve's operation. The loop of or can also be moved to points A or C of (the right lateral side of the mitral valve annulus (e.g., P) or the left lateral side of the annulus (e.g., P), respectively). The posterior section of the annuloplasty prosthesis may have attachment loops at each of the three posterior segments A, B, and C (). The loops can be of any shape or size to provide the desired attachment features.
20
50
70
All of the features described above provide additional suture points along the annuloplasty prosthesis such that sutures may engage both the core and the covering /.
50
70
20
50
70
20
50
70
It will be understood that the foregoing is only illustrative of the principles of the invention, and that various modifications can be made by those skilled in the art without departing from the scope and spirit of the invention. For example, any of the embodiments can have fabric covers and/or other covers , or not, as desired. Any suitable material(s) can be used for structural member and the cover / (if included). Any number of sutures can be tied around structural member along its length. If a cover / is included, the sutures can pass through that cover, or not, as desired.
BACKGROUND OF THE INVENTION
SUMMARY OF THE INVENTION
BRIEF DESCRIPTION OF THE DRAWINGS
DETAILED DESCRIPTION |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.